The ifconfig command line utility is used to get information about a Linux network interface configuration and to make changes to it. The ifconfig utility can be used either to simply get information about network interface configuration or to change configuration, depending on what options are used with the ifconfig command.
Ever wonder how Linux automatically mount all or many of your partitions at boot time ? It does so by reading the parameters from the /etc/fstab file.
Installation on a new or completely formatted HDD
- Installing MS Windows Xp on a new HDD
- Plug your HDD and set the BIOS configuration to boot your pc from CDROM.
- Start your Winddows Xp installation and do the partitioning step like the shots below.
System and network administrators and packagers alike may find a handy tool in y2pmsh, a shell interface for SUSE Linux's YaST2 package manager.
You just saw "Segmentation fault (core dumped)" or a message like "Unexpected Signal 11 ". Why? Short answer: it's most likely hardware unless you wrote the program or just now installed it on your machine.
I do almost everything in text mode when working with Linux. Some tasks -- such as browsing the Web and reading email -- are harder to do satisfactorily at the console. I use Firefox to browse the Web, but finally I found a good tool to quickly access my mail in text mode.
What is interesting about Apache is its stability and scalability which makes it possible to serve even very high traffic web sites without any hitch. It also helps that it comes with an unbeatable price (free). Here I will explain how one can set up Apache web server to serve ones web pages from your machine.
Recently I inheritted ownership of an SVN server which was misbehaving. Trying to determine why it wasn't working correctly involved a few hours of testing, careful thought, and caffeine. Eventually I got it working correctly using the often-overlooked tool strace.
I believe that any network or system administrator who wishes to maintain an iptables firewall should learn iptables well, and be able to easily whip up a basic firewall from scratch. But learning how to do this is the tricky part, so this is where firewall builder programs earn their beans. With a firewall building utility you can get a functioning firewall up and running, and have scripts and rulesets to study.
An important part of data recovery is knowing that the data which is stored is correct. This process is generally easier said than done, after all, how can you tell that data is complete and accurate? As important as this is, it is not something you would think can be easily accomplished without lots of time or some very fancy equipment.
Ben Goodger claims to have the clue About the Firefox "memory leak". He states, "What I think many people are talking about however with Firefox 1.5 is not really a memory leak at all. It is in fact a feature."
Think of all the ways you interact with a computer each day. Any action you take, or even don't take, conveys some meaning. For example, when listening to your music collection, you might sometimes skip songs. What does that mean? There are a number of possibilities. Maybe you do not like the song that was playing, or it does not suit your current mood, or, possibly, you've listened to this song too much and would rather it be played less often. Is it possible to build a system that uses this information to learn which music you prefer and play it more often?
This document will describe the setup I made for automating the backup tasks for all laptops here in the house. My servers use the same backup server and infrastructure, but right now they don't have the checks and scripts because they are online 24/7 and my backup server is triggering the backup process. This is however not true at all for the laptops.
This is just a short note by way of encouragement for anyone who has considered making their notebook dual-bootable but either been daunted by the prospect or just hasn't got around to it. At the risk of making myself look like the village technological idiot, I spell out some details and try to make the writeup entertaining.
MySQL is a robust, lean database ideal for use on the web. In fact many of the forums and blogs use this database to store and manage the content. Here I will explain how I set up the MySQL database on my machine.
This tutorial explains how I was able to setup a web server in order to support Java Server Pages (JSP) and Servlets using virtually hosted websites.
Do you have a good Internet connection? Are you short of inspiration on what streaming radio stations to listen?
Troubleshooting often involves having to watch logfiles in real time. That means using tail or a similar utility to see new messages that are added to a logfile by Apache, MySQL, X.org, or whatever program you're trying to deal with at the time. While tail is usually readily available on *nix systems, I prefer to use MultiTail whenever possible. It has some features that you won't find in tail, such as filtering and a color display, and MultiTail allows you to follow the output from a command as easily as following a logfile.
An article about How Linux or UNIX Understand which program to run got picked up by a few dozen RSS feeds recently. It's not a bad article.
It's actually slightly incorrect though.
The problem is people even do not know how Linux or UNIX understands (knows) which program to run. I think many new UNIX Sys admin also does not understand the process. The method used by SHELL is straightforward but often creates confusion for new Linux or UNIX users. Therefore, I thought it is time to document it online.