What I want to share with you today is a few of the things I've learned along the way to getting Mad Penguin to where it's at today. Currently it is in the top 8,000 sites on the Internet (out of 74+ million sites monitored by NetCraft as of February 2006), and it was all done on a $25.00 budget.
Have you ever had to determine the virtual terminal that an X session is running on? Perhaps you may want this information for a program you have created.
A bootable disk with Knoppix can be a lifesaver when your computer goes awry. In this feature, we guide you through the process of fixing Linux with Knoppix, which includes repairing boot issues, working with key system files, and working with Linux partitions.
The Bourne Again Shell and TC Shell are command interpreters and high-level programming languages. As command interpreters, they process commands you enter on the command line in response to a prompt. This chapter focuses primarily on the Bourne Again Shell, while noting where it differs from the TC Shell.
I needed to run mysql5 on another port on my server
with already 2 mysql servers (3.x and 4.x) on it
and for this i had to do following steps
IBM has published the following new technical articles, tutorials, and downloads on its DeveloperWorks website. They cover a range of interesting (though not necessarily embedded) technical topics, primarily related to Linux and open source system development.
The ifconfig command line utility is used to get information about a Linux network interface configuration and to make changes to it. The ifconfig utility can be used either to simply get information about network interface configuration or to change configuration, depending on what options are used with the ifconfig command.
Ever wonder how Linux automatically mount all or many of your partitions at boot time ? It does so by reading the parameters from the /etc/fstab file.
Installation on a new or completely formatted HDD
- Installing MS Windows Xp on a new HDD
- Plug your HDD and set the BIOS configuration to boot your pc from CDROM.
- Start your Winddows Xp installation and do the partitioning step like the shots below.
System and network administrators and packagers alike may find a handy tool in y2pmsh, a shell interface for SUSE Linux's YaST2 package manager.
You just saw "Segmentation fault (core dumped)" or a message like "Unexpected Signal 11 ". Why? Short answer: it's most likely hardware unless you wrote the program or just now installed it on your machine.
I do almost everything in text mode when working with Linux. Some tasks -- such as browsing the Web and reading email -- are harder to do satisfactorily at the console. I use Firefox to browse the Web, but finally I found a good tool to quickly access my mail in text mode.
What is interesting about Apache is its stability and scalability which makes it possible to serve even very high traffic web sites without any hitch. It also helps that it comes with an unbeatable price (free). Here I will explain how one can set up Apache web server to serve ones web pages from your machine.
Recently I inheritted ownership of an SVN server which was misbehaving. Trying to determine why it wasn't working correctly involved a few hours of testing, careful thought, and caffeine. Eventually I got it working correctly using the often-overlooked tool strace.
I believe that any network or system administrator who wishes to maintain an iptables firewall should learn iptables well, and be able to easily whip up a basic firewall from scratch. But learning how to do this is the tricky part, so this is where firewall builder programs earn their beans. With a firewall building utility you can get a functioning firewall up and running, and have scripts and rulesets to study.
An important part of data recovery is knowing that the data which is stored is correct. This process is generally easier said than done, after all, how can you tell that data is complete and accurate? As important as this is, it is not something you would think can be easily accomplished without lots of time or some very fancy equipment.
Ben Goodger claims to have the clue About the Firefox "memory leak". He states, "What I think many people are talking about however with Firefox 1.5 is not really a memory leak at all. It is in fact a feature."
Think of all the ways you interact with a computer each day. Any action you take, or even don't take, conveys some meaning. For example, when listening to your music collection, you might sometimes skip songs. What does that mean? There are a number of possibilities. Maybe you do not like the song that was playing, or it does not suit your current mood, or, possibly, you've listened to this song too much and would rather it be played less often. Is it possible to build a system that uses this information to learn which music you prefer and play it more often?