The great AT Linux/BSD/*NIX FAQ project!

Page 7 - Seeking answers? Join the AnandTech community: where nearly half-a-million members share solutions and discuss the latest tech.

RedBeard0531

Senior member
Jun 25, 2001
292
0
0
Originally posted by: Electrode
From your original thread, I'm guessing what you want to do is run GUI apps on your server, and use them from the workstation. My method isn't very complex, and it's insecure as hell, but here's what I do:

1. xhost + ip.of.server.box
2. ssh ip.of.server.box
3. export DISPLAY=ip.of.workstation.box
4. Run desired GUI app

thnx
just wondren, can i runthis while x is up on my box or the other box.
 

burnedout

Diamond Member
Oct 12, 1999
6,249
2
0
OK, here's one that I think was left out of the basic command line tutorial in this faq. The 'locate' command. If I missed it, I'd rather take my thrashing now than later.

For example, to find files or folders named "mozilla", simply type:

locate mozilla

Now hold on. I know what you are about to say. "When I type this command, it scrolls down the term window so quickly I can't see anything".

Fear not. That's why they included pipes when *nix was refined.

locate mozilla | less and the output will be according to your term window and fill the screen appropriately. At the bottom, you'll see numbers like 1-20 or 1-36 depending upon your screen. Hit the space bar to advance. If you went too far, hit b to scroll backwards. Finished? Simply hit q to quit.

I'll start including more input here as I get time. Good faq, by the way.
 

Nighthawk69

Golden Member
Oct 10, 2000
1,113
0
0
How about..... lets see.... I'm looking into getting an APC UPS for my home fileserver/mailserver, dsl modem and smc router. So, how about info on setting up and configuring Linux to use a UPS effectively?

Just an idea, not sure how complicated that is as I haven't looked into it.
 

wurmyhi

Member
Sep 28, 2001
52
0
0
OS specific:

"How to rm a file that includes a hyphen as part of the file name?"

"How to move a directory structure to a different volume that starts with a left-bracket?"

8)


I think a good "recommended reading list" would be nice too...I like "Life with Unix" as a light starter...
 

Electrode

Diamond Member
May 4, 2001
6,063
2
81
For the hyphenated filenames:

rm -- screwy-file

The -- thing will also work any time you need to input something with a hyphen that isn't a switch, with almost any command.

As for the left bracket thing, I've never dealt with such a thing. Try quotes. If that doesn't work, try escaping the bracket. i.e. \[crazyfilename
 

Yossarian451

Senior member
Apr 11, 2002
886
0
0
Recently I switched to Linux, and one thing I was not willing to part with was the volume control on my keyboard (I had no hardware control for my speakers). I posted a thread and someone gave me this site and it was perfect, I figure I might want to pass it on for fellow newbies. http://www.linuxdude.co.uk/docs/Special-Keys/. Great thread though.
 

BML

Senior member
Jun 1, 2001
443
0
0
Quick questions.

How can I automount my samba shares at boot? fstab?
and
How about loading my default iptables at boot. iptables -A INPUT -p ALL -j DROP
 

n0cmonkey

Elite Member
Jun 10, 2001
42,936
1
0
Originally posted by: BML
Quick questions.

How can I automount my samba shares at boot? fstab?

That might work, if not, check the next answer.

and
How about loading my default iptables at boot. iptables -A INPUT -p ALL -j DROP

Create a script that executes on startup.
 

EmperorRob

Senior member
Mar 12, 2001
968
0
0
Originally posted by: BML
How about loading my default iptables at boot. iptables -A INPUT -p ALL -j DROP
create a script, say rc.iptables, that contains all your rules. Then make it executable (chmod 755) and add its path to the end of your startup script (RedHat /etc/rc.d/rc.local , Suse /etc/inittab -i think)
 

BML

Senior member
Jun 1, 2001
443
0
0
Ok here is what I did.

1: pico rc.iptables
2: added "iptables -A INPUT -p ALL -s my.ip.address -j ACCEPT
3: chmod 755 rc.iptables
4: added /etc/rc.d/rc.tables to the rc.local


It dosent load my tables any idea?
 

Yossarian451

Senior member
Apr 11, 2002
886
0
0
O.K. this may be basic but can you cover the process of mounting drives, specifically what modifiers to use especially for read-only of a drive using windows 98. Thanks, I wanted to know the basics of drive mounting and which modifiers do what.
 

Electrode

Diamond Member
May 4, 2001
6,063
2
81
I'll write a mounting FAQ later. For now, here's how to mount a FAT32 device read-only:

mount -t vfat -o ro,umask=222 device mount-point

Description:

mount: Runs mount
-t vfat: Specifies FAT filesystem with long filenames
-o ro,umask=222: ro causes the filesystem to mount read-only, umask=222 makes every file have read+execute permissions.
 

EmperorRob

Senior member
Mar 12, 2001
968
0
0
Originally posted by: BML
Ok here is what I did.

1: pico rc.iptables
2: added "iptables -A INPUT -p ALL -s my.ip.address -j ACCEPT
3: chmod 755 rc.iptables
4: added /etc/rc.d/rc.tables to the rc.local


It dosent load my tables any idea?
Which distro are you using?

 

Electrode

Diamond Member
May 4, 2001
6,063
2
81
Introduction to running apps remotely with *NIX
Since the very beginning, UNIX and related OS's were designed to be used by remote terminals, rather than a keyboard and display device connected directly to the system. Although nowadays most people control their *NIX systems with a keyboard, monitor, and possibly a mouse connected directly to the system, you can still do almost anything remotely that you can do locally.

Throughout this guide, the term 'Local System' will mean the computer you are sitting at, and 'Remote System' will mean the server that the applications are being run on.

If you want to run applications over your network, there are a few different programs that you will most likely use. Here's a description of them:

ssh: secure shell. Using an SSH server on the remote system, and an SSH client on the local system, you can log into and get a command prompt from the remote system. You can do anything at this prompt that you could at a command prompt on the remote system's screen.
The X Window System: This is a suite of programs that provide a graphics infrastrucure for *NIX. It consists of an X server, which creates a framebuffer for graphical apps, and X clients, software that uses the X server to display a graphical interface. When the X server is run on the local system and the X clients are run on the remote system, you've got remote X.

Running command-line apps remotely is trivial, to say the least. Just log in to your remote system with SSH and do it. If your local system runs *NIX, you almost cerainly have the OpenSSH client. To use it:

ssh username@name.or.ip.of.server

You'll be asked for your password. Enter it, and you will be logged in. If you're running Windows, and don't have Cygwin, you'll need an SSH client. I recommend PuTTY. Just download, unzip, and then run PuTTY.exe. The default options are fine, but if you know what you're doing, feel free to tweak it to whatever extent you want to. Just enter your remote system's name or IP, select SSH, and click Connect. Enter your username and password when asked, and you're in.

Running GUI apps is less trivial, as you need to set up remote X. There are a few ways to do this, such as setting up an SSH tunnel, and some simpler methods. What I will describe is a very simple method, which is not secure, and won't work through a router. The X client on the remote system will connect directly to the X server on the local system, with no tunneling.

You need an X server running on the local system. If you're using *NIX, I'll assume you have and are running X, since you almost certainly are. If you're using Windows, you will need to obtain and set up an X server. I recommend the one included in Cygwin. Anyway, here's how to do it:

1. Open up a local command prompt.
2. xhost + ip.of.remote.system
3. SSH into the remote system.
4. export DISPLAY="ip.of.local.system"
5. Run your graphical app. If all is well, you will see the app on the local screen.

There is also another method for remote GUIs, that is probably a lot easier to set up and use: VNC. Now, I'm sure that you've all heard of VNC in the past, and maybe even used it on Windows, but it's a bit different on *NIX. Instead of sharing the remote system's screen, it creates virtual screens of arbitrary size and color depth. I strongly recommend you use TightVNC, as it has quite a few more features and uses less bandwidth. Here's how to set it up:

1. Download and unpack the source code.
2. Follow the instructions in README to install it. Make sure you compile and install Xvnc, since there are some extra steps you need to do to get it.
3. Once it is installed, run the VNC server. To get a virtual 1024x768 desktop, run:
vncserver -geometry 1024x768 -depth 24
It will tell you what the display number of the VNC server is. You will need this number to use it. If you're not running X when you start VNC, it will probably be :0, if you are, it will probably be :1. the first time you run it, it will ask for a password. Enter one you can remember.

You can now use any VNC client, either for Windows or *NIX, to connect to it. Just start the client, then connect to ip.of.server:display#. You will be asked for your password, enter the one you gave when you started the VNC server. If all goes well, you will now get a window with the virtual desktop on it. Open an xterm, and run this:

export DISPLAY="127.0.0.1:display# of vnc server"

Then run whatever graphical apps you want to use, and they will pop up on the VNC display.

I hope this has been informative.
 

EmperorRob

Senior member
Mar 12, 2001
968
0
0
Originally posted by: BML
Red Hat 7.3
That's easy. Put all the rules you want into that rc.iptables file and make it executable (chmod 755).
Put it wherever you like. I like to keep mine in /etc/rc.d/ for simplicity's sake where all the other startup scripts are.
In the bottom of your /etc/rc.d/rc.local file add this:

## Added insert date you modified here ###
/etc/rc.d/rc.iptables


That will execute your iptables script at boot time. The date is just for your own tracking purposes.
 

Need4Speed

Diamond Member
Dec 27, 1999
5,383
0
0
This isn't really a FAQ per say, but I thought it was a good enough read to post it here. This was taken from the Smoothwall FAQ section and basically covers some simple etiquette when asking for help. You may or may not agree with all of this, but I think the author makes some very valid points.....

Before You Ask
Before asking a technical question by email, or in a
newsgroup, or on a web site chat board, do the following:
1. Try to find an answer by reading the manual.
2. Try to find an answer by reading a FAQ.
3. Try to find an answer by searching the Web.
4. Try to find an answer by asking a skilled friend.
When you ask your question, display the fact that you have
done these things first; this will help establish that you're not
being a lazy sponge and wasting peoples' time. Better yet,
display what you have learned from doing these things. We
like answering questions for people who have demonstrated
that they can learn from the answers.
Prepare your question. Think it through. Hasty-sounding
questions get hasty answers, or none at all. The more you do
to demonstrate that you have put thought and effort into
solving your problem before asking for help, the more likely
you are to actually get help.
Beware of asking the wrong question. If you ask one that is
based on faulty assumptions, J. Random Hacker is quite
likely to reply with a uselessly literal answer while thinking
"Stupid question...", and hoping that the experience of
getting what you asked for rather than what you needed will
teach you a lesson.

Never assume you are entitled to an answer. You are not;
you aren't, after all, paying for the service. You will earn an
answer, if you earn it, by asking a question that is
substantial, interesting, and thought-provoking, one that
implicitly contributes to the experience of the community
rather than merely passively demanding knowledge from
others.
On the other hand, making it clear that you are able and
willing to help in the process of developing the solution is a
very good start. "Can someone provide a pointer?", "What is
my example missing?" and "Is there a site I should have
checked?" are more likely to get answered than "Please post
the exact procedure I should use." because you're making it
clear that you're truly willing to complete the process if
someone can simply point you in the right direction.

When You Ask
Choose your forum carefully
Be sensitive in choosing where you ask your question. You
are likely to be ignored, or written off as a loser, if you:
post your question to a forum where it is off topic
post a very elementary question to a forum where
advanced technical questions are expected, or viceversa
cross-post to too many different newsgroups
Hackers blow off questions that are inappropriately targeted
in order to try to protect their communications channels from
being drowned in irrelevance. You don't want this to happen
to you.

In general, questions to a well-selected public forum are
more likely to get useful answers than equivalent questions
to a private one. There are multiple reasons for this. One is
simply the size of the pool of potential respondents. Another
is the size of the audience; hackers would rather answer
questions that educate a lot of people than questions, which
only serve a few.

Write in clear, grammatical, correctly-spelled language
We've found by experience that people who are careless and
sloppy writers are usually also careless and sloppy at
thinking and coding (often enough to bet on, anyway).
Answering questions for careless and sloppy thinkers is not
rewarding; we'd rather spend our time elsewhere.
So expressing your question clearly and well is important. If
you can't be bothered to do that, we can't be bothered to pay
attention. Spend the extra effort to polish your language. It
doesn't have to be stiff or formal - in fact, hacker culture
values informal, slangy and humorous language used with
precision. But it has to be precise; there has to be some
indication that you're thinking and paying attention.
Spell correctly. Don't confuse "its" with "it's" or "loose" with
"lose". Don't TYPE IN ALL CAPS, this is read as shouting
and considered rude. If you write like a semi-literate boob,
you will probably be ignored. Writing like a l33t script
kiddie hax0r is the absolute kiss of death and guarantees you
will receive nothing but stony silence (or, at best, a heaping
helping of scorn and sarcasm) in return.
If you are asking questions in a forum that does not use your
native language, you will get a limited amount of slack for
spelling and grammar errors, but no extra slack at all for
laziness (and yes, we can usually spot that difference). Also,
unless you know what your respondent's languages are, write
in English. Busy hackers tend to simply flush questions in
languages they don't understand, and English is the working
language of the net. By writing in English you minimise
your chances that your question will be discarded unread.

Send questions in formats that are easy to understand
If you make your question artificially hard to read, it is more
likely to be passed over in favour of one that isn't. So:
Send plain text mail, not HTML.
Don't send mail in which entire paragraphs are single
multiply-wrapped lines. (This makes it too difficult to
reply to just part of the message.)
Don't send MIME Quoted-Printable encoding either;
all those =20 glyphs scattered through the text are ugly
and distracting.
Never, ever expect hackers to be able to read closed
proprietary document formats like Microsoft Word.
Most hackers react to these about as well as you would
to having a pile of steaming pig manure dumped on
your doorstep.
If you're sending mail from a Windows machine, turn
off Microsoft's stupid "Smart Quotes" feature. This is
so you avoid sprinkling garbage characters through
your mail.

Use meaningful, specific subject headers
On mailing lists or newsgroups, the subject header is your
golden opportunity to attract qualified experts' attention in
around 50 characters or fewer. Don't waste it on babble like
"Please help me" (let alone "PLEASE HELP ME!!!!"). Don't
try to impress us with the depth of your anguish; use the
space for a super-concise problem description instead.
Stupid:
HELP! Video doesn't work properly on my laptop!
Smart:
XFree86 4.1 misshapen mouse cursor, Fooware
MV1005 vid. chipset

Be precise and informative about your problem
Describe the symptoms of your problem or bug
carefully and clearly.
Describe the environment in which it occurs (machine,
OS, application, whatever).
Describe the research you did to try and understand
the problem before you asked the question.
Describe the diagnostic steps you took to try and pin
down the problem yourself before you asked the
question.
Describe any recent changes in your computer or
software configuration that might be relevant.
Do the best you can to anticipate the questions a hacker will
ask, and to answer them in advance in your request for help.
Simon Tatham has written an excellent essay entitled How
to Report Bugs Effectively which can be found at
http://www.chiark.greenend.org.uk/~sgtatham/bugs.html. I
strongly recommend that you read it.

Volume is not precision
You need to be precise and informative. This end is not
served by simply dumping huge volumes of code or data into
a help request. If you have a large, complicated test case that
is breaking a program, try to trim it and make it as small as
possible.
This is useful for at least three reasons. One: being seen to
invest effort in simplifying the question makes it more likely
that you'll get an answer, Two: simplifying the question
makes it more likely you'll get a useful answer. Three: In the
process of refining your bug report, you may develop a fix or
workaround yourself.

Describe the problem's symptoms, not your guesses
It's not useful to tell hackers what you think is causing your
problem. (If your diagnostic theories were such hot stuff,
would you be consulting others for help?) So, make sure
you're telling them the raw symptoms of what goes wrong,
rather than your interpretations and theories. Let them do the
interpretation and diagnosis.
Stupid:
I'm getting back-to-back SIG11 errors on kernel
compiles, and suspect a hairline crack on one of the
motherboard traces. What's the best way to check for
those?
Smart:
My home-built K6/233 on an FIC-PA2007
motherboard (VIA Apollo VP2 chipset) with 256MB
Corsair PC133 SDRAM starts getting frequent SIG11
errors about 20 minutes after power-on during the
course of kernel compiles, but never in the first 20
minutes. Rebooting doesn't restart the clock, but
powering down overnight does. Swapping out all RAM
didn't help. The relevant part of a typical compile
session log follows.

Describe your problem's symptoms in chronological
order

The most useful clues in figuring out something that went
wrong often lie in the events immediately prior. So, your
account should describe precisely what you did, and what
the machine did, leading up to the blow up. In the case of
command-line processes, having a session log (e.g., using
the script utility) and quoting the relevant twenty or so lines
is very useful.
If the program that blew up on you has diagnostic options
(such as -v for verbose), try to think carefully about selecting
options that will add useful debugging information to the
transcript.
If your account ends up being long (more than about four
paragraphs), it might be useful to succinctly state the
problem up top, then follow with the chronological tale. That
way, hackers will know what to watch for in reading your
account.

Don't ask people to reply by private email
Hackers believe solving problems should be a public,
transparent process during which a first try at an answer can
and should be corrected if someone more knowledgeable
notices that it is incomplete or incorrect. Also, they get some
of their reward for being respondents from being seen to be
competent and knowledgeable by their peers.
When you ask for a private reply, you are disrupting both the
process and the reward. Don't do this. It's the respondent's
choice whether to reply privately, and if he does, it's usually
because he thinks the question is too obvious or ill formed to
be interesting to others.
There is one limited exception to this rule. If you think the
question is such that you are likely to get a lot of answers
that are all pretty similar, then the magic words are "email
me and I'll summarise the answers for the group". It is
courteous to try and save the mailing list or newsgroup a
flood of substantially identical postings, but you have to
keep the promise to summarise.

Prune pointless queries
Resist the temptation to close your request for help with
semantically-null questions like "Can anyone help me?" or
"Is there an answer?" First: if you've written your problem
description halfway competently, such tacked-on questions
are at best superfluous. Second: because they are
superfluous, hackers find them annoying, and are likely to
return logically impeccable but dismissive answers like
"Yes, you can be helped" and "No, there is no help for you."

Courtesy never hurts, and sometimes helps
Be courteous. Use "Please" and "Thanks in advance". Make
it clear that you appreciate the time people spend helping
you for free.
To be honest, this isn't as important as (and cannot substitute
for) being grammatical, clear, precise and descriptive,
avoiding proprietary formats etc.; hackers in general would
rather get somewhat brusque but technically sharp bug
reports than polite vagueness. (If this puzzles you, remember
that we value a question by what it teaches us.)
However, if you've got your technical ducks in a row,
politeness does increase your chances of getting a useful
answer.

Follow up with a brief note on the solution
Send a note after the problem has been solved to all who
helped you; let them know how it came out and thank them
again for their help. If the problem attracted general interest
in a mailing list or newsgroup, it's appropriate to post the
follow-up there.
Your follow-up doesn't have to be long and involved; a
simple "Howdy - it was a failed network cable! Thanks,
everyone. - Bill" would be better than nothing. In fact, a
short and sweet summary is better than a long dissertation
unless the solution has real technical depth.
Besides being courteous and informative, this sort of followup
helps everybody who assisted feel a satisfying sense of
closure about the problem. If you are not a techie or hacker
yourself, trust us that this feeling is very important to the
gurus and experts you tapped for help. Problem narratives
that trail off into unresolved nothingness are frustrating
things; hackers itch to see them resolved. The good karma
that scratching that itch earns you will be very, very helpful
to you next time you need to pose a question.

How to Interpret Answers
RTFM and STFW: How To Tell You've Seriously
Screwed Up

There is an ancient and hallowed tradition: if you get a reply
that reads "RTFM", the person who sent it thinks you should
have Read The F*cking Manual. He is almost certainly right.
Go read it.
RTFM has a younger relative. If you get a reply that reads
"STFW", the person who sent it thinks you should have
Searched The F*cking Web. He is almost certainly right. Go
search it.
Often, the person sending either of these replies has the
manual or the web page with the information you need open,
and is looking at it as he types. These replies mean that he
thinks (a) the information you need is easy to find, and (b)
you will learn more if you seek out the information than if
you have it spoon-fed to you.
You shouldn't be offended by this; by hacker standards, he is
showing you a rough kind of respect simply by not ignoring
you. You should instead thank him for his grandmotherly
kindness.

If you don't understand...
If you don't understand the answer, do not immediately
bounce back a demand for clarification. Use the same tools
that you used to try and answer your original question
(manuals, FAQs, the Web, skilled friends) to understand the
answer. If you need to ask for clarification, exhibit what you
have learned.
For example, suppose I tell you: "It sounds like you've got a
stuck zentry; you'll need to clear it." Then:
Here's a bad follow-up question:
"What's a zentry?"
Here's a good follow up question:
"OK, I read the man page and zentries are only
mentioned under the -z and -p switches. Neither of
them says anything about clearing zentries. Is it one of
these or am I missing something here?"

Dealing with rudeness
Much of what looks like rudeness in hacker circles is not
intended to give offence. Rather, it's the product of the
direct, cut-through-the-bullshit communications style that is
natural to people who are more concerned about solving
problems than making others feel warm and fuzzy.
When you perceive rudeness, try to react calmly. If someone
is really acting out, it is very likely that a senior person on
the list or newsgroup or forum will call him or her on it. If
that doesn't happen and you lose your temper, it is likely that
the person you lose it at was behaving within the hacker
community's norms and you will be considered at fault. This
will hurt your chances of getting the information or help you
want.
On the other hand, you will occasionally run across rudeness
and posturing that is quite gratuitous. The flip-side of the
above is that it is acceptable form to slam real offenders
quite hard, dissecting their misbehaviour with a sharp verbal
scalpel. Be very, very sure of your ground before you try
this, however. The line between correcting an incivility and
starting a pointless flame war is thin enough that hackers
themselves not infrequently blunder across it; if you are a
newbie or an outsider, your chances of avoiding such a
blunder are low. If you're after information rather than
entertainment, it's better to keep your fingers off the
keyboard than to risk this.
(Some people assert that many hackers have a mild form of
autism or Asperger's Syndrome, and are actually missing
some of the brain circuitry that lubricates `normal' human
social interaction. This may or may not be true. If you are
not a hacker yourself, it may help you cope if you think of us
as brain-damaged. Go ahead. We won't care; we like being
whatever it is we are, and generally have a healthy
scepticism about clinical labels.)
In the next section, we'll talk about a different issue; the kind
of `rudeness' you'll see when you misbehave.

On Not Reacting Like A Loser
Odds are, you'll screw up a few times, on hacker community
forums -- in ways detailed in this article, or similar. And
you'll be told exactly how you screwed up, possibly with
colourful asides. In public.
When this happens, the worst thing you can do is whine
about the experience, claim to have been verbally assaulted,
demand apologies, scream, hold your breath, threaten
lawsuits, complain to people's employers, leave the toilet
seat up, etc. Instead, here's what you do:
Get over it. It's normal. In fact, it's healthy and appropriate.
Community standards do not maintain themselves: They're
maintained by people actively applying them, visibly, in
public. Don't whine that all criticism should have been
conveyed via private mail: That's not how it works. Nor is it
useful to insist you've been personally insulted when
someone comments that one of your claims was wrong, or
that his views differ. Those are loser attitudes.
There have been hacker forums where, out of some
misguided sense of hyper-courtesy, participants are banned
from posting any fault-finding with another's posts, and told
"Don't say anything if you're unwilling to help the user." The
resulting departure of clueful participants to elsewhere
causes them to descend into meaningless babble and become
useless as technical forums.
Exaggeratedly "friendly" (in that fashion) or useful: Pick
one.
Remember: When that hacker tells you that you've screwed
up, and (no matter how gruffly) tells you not to do it again,
he's acting out of concern for (1) you and (2) his community.
It would be much easier for him to ignore you and filter you
out of his life. If you can't manage to be grateful, at least
have a little dignity, don't whine, and don't expect to be
treated like a fragile doll just because you're a newcomer
with a theatrically hypersensitive soul and delusions of
entitlement.

Questions Not To Ask
Here are some classic stupid questions, and what hackers are
thinking when they don't answer them.
Q: Where can I find program X?
A: The same place I'd find it, fool -- at the other end of
a web search. Ghod, doesn't everybody know how to
use Google yet?
Q: My {program, configuration, SQL statement}
doesn't work
A: This is not a question, and I'm not interested in
playing Twenty Questions to pry your actual
question out of you - I have better things to do. On
seeing something like this, my reaction is normally
of one of the following:
do you have anything else to add to that?
oh, that's too bad, I hope you get it fixed.
and this has exactly what to do with me?
Q: I'm having problems with my Windows machine.
Can you help?
A: Yes. Throw out that Microsoft trash and install
Linux.
Q: I'm having problems installing Linux or X. Can you
help?
A: No. I'd need hands-on access to your machine to
troubleshoot this. Go ask your local Linux user
group for hands-on help. (You can find a list of user
groups here:
http://www.linux.org/groups/index.html.
Q: How can I crack root/steal channel-ops
privileges/read someone's email?
A: You're a lowlife for wanting to do such things and a
moron for asking a hacker to help you.

Good and Bad Questions
Finally, I'm going to illustrate how to ask questions in a
smart way by example; pairs of questions about the same
problem, one asked in a stupid way and one in a smart way.
Stupid: Where can I find out stuff about the Foonly
Flurbamatic?
This question just begs for "STFW" as a reply.
Smart: I used Google to try to find "Foonly
Flurbamatic 2600" on the Web, but I got no
useful hits. Does anyone know where I can
find programming information on this device?
This one has already SFTWed, and sounds like
he might have a real problem.
Stupid: I can't get the code from project foo to
compile. Why is it broken?
He assumes that somebody else screwed up. Arrogant
of him.
Smart: The code from project foo doesn't compile
under Nulix version 6.2. I've read the FAQ, but
it doesn't have anything in it about Nulixrelated
problems. Here's a transcript of my
compilation attempt; is it something I did?
He's specified the environment, he's read the FAQ, he's
showing the error, and he's not assuming his problems
are someone else's fault. This guy might be worth some
attention.
Stupid: I'm having problems with my motherboard.
Can anybody help?
J. Random Hacker's response to this is likely to be
"Right. Do you need burping and diapering, too?"
followed by a punch of the delete key.
Smart: I tried X, Y, and Z on the S2464 motherboard.
When that didn't work, I tried A, B, and C.
Note the curious symptom when I tried C.
Obviously the florbish is grommicking, but the
results aren't what one might expect. What are
the usual causes of grommicking on MP
motherboards? Anybody got ideas for more
tests I can run to pin down the problem?
This person, on the other hand, seems worthy of an
answer. He has exhibited problem-solving intelligence
rather than waiting for an answer to drop from on high.
In the last question, notice the subtle but important
difference between demanding "Give me an answer" and
"Please help me figure out what additional diagnostics I can
run to achieve enlightenment."
In fact, the form of that last question is closely based on a
real incident that happened in August 2001 on the linuxkernel
mailing list. I (Eric) was the one asking the question
that time. I was seeing mysterious lockups on a Tyan S2464
motherboard. The list members supplied the critical
information I needed to solve them.
By asking the question in the way I did, I gave people
something to chew on; I made it easy and attractive for them
to get involved. I demonstrated respect for my peers' ability
and invited them to consult with me as a peer. I also
demonstrated respect for the value of their time by telling
them the blind alleys I had already run down.
Afterwards, when I thanked everyone and remarked how
well the process had worked, an lkml member observed that
he thought it had worked not because I'm a "name" on that
list, but because I asked the question in the proper form.
We hackers are in some ways a very ruthless meritocracy;
I'm certain he was right, and that if I had behaved like a
sponge I would have been flamed or ignored no matter who I
was. His suggestion that I write up the whole incident as an
instruction to others led directly to the composition of this
guide.

If You Can't Get an Answer
If you can't get an answer, please don't take it personally that
we don't feel we can help you. Sometimes the members of
the asked group may simply not know the answer. No
response is not the same as being ignored, though admittedly
it's hard to spot the difference from outside.
In general, simply re-posting your question is a bad idea.
This will be seen as pointlessly annoying.
There are other sources of help you can go to, often sources
better adapted to a novice's needs.
There are many online and local user groups who are
enthusiasts about the software, even though they may never
have written any software themselves. These groups often
form so that people can help each other and help new users.
There are also plenty of commercial companies you can
contract with for help, both large and small (Red Hat and
LinuxCare are two of the best known; there are many
others). Don't be dismayed at the idea of having to pay for a
bit of help! After all, if your car engine blows a head gasket,
chances are, you will take it to a repair shop and pay to get it
fixed. Even if the software didn't cost you anything, you
can't expect that support will always come for free.
For popular software like Linux, there are at least 10000
users per developer. It's just not possible for one person to
handle the support calls from over 10000 users. Remember
that even if you have to pay for support, you are still paying
much less than if you had to buy the software as well (and
support for closed-source software is usually more expensive
and less competent than support for open-source software).

 

Poontos

Platinum Member
Mar 9, 2000
2,799
0
0
Please attempt the following:

1.) How do I bring RedHat 7.2 up to date with security patches, etc.?

2.) How does one update KDE, & or Gnome, which might entail upgrading X?

3.) How do I configure TCP/IP, DHCP (client), with Linux/RedHat?
(Sort of figured this out, but trying to get the system to see my integrated 3Com NIC in Inspiron 4100 notebook).

Thank you varee much!
 

Electrode

Diamond Member
May 4, 2001
6,063
2
81
Originally posted by: Poontos
Please attempt the following:
k
1.) How do I bring RedHat 7.2 up to date with security patches, etc.?
up2date is the easiest way
2.) How does one update KDE, & or Gnome, which might entail upgrading X?
again, up2date. you could also download RPMs from the KDE and GNOME homepages and install them manually if you wanted to. You could also compile them from source, but that can take a long time, and is not easy. You will most likely never need to upgrade X.
3.) How do I configure TCP/IP, DHCP (client), with Linux/RedHat?
(Sort of figured this out, but trying to get the system to see my integrated 3Com NIC in Inspiron 4100 notebook).
there are plenty of GUI programs in redhat for this, but if you want to do it the right way, look through /etc/sysconfig/network, /etc/resolv.conf, and /etc/sysconfig/network-devices. Also read man ifconfig. As for DHCP, read man dhcpcd. Also look through /etc/rc.d/init.d/dhcp.
 

EmperorRob

Senior member
Mar 12, 2001
968
0
0
Originally posted by: Poontos
Please attempt the following:

2.) How does one update KDE, & or Gnome, which might entail upgrading X?[/i]
If you're coming from 7.2 u don't need to upgrade X. Easiest way (for KDE) is to go to www.kde.org and download all the rpms they have associated for RedHat with their latest release. Put all the rpms in one location in a temp directory. su as root then type this:
rpm -Fvh *.rpm

If you have any dependency problems you will get an error or 2 or 200 You'll then have to work from there which is another post.

3.) How do I configure TCP/IP, DHCP (client), with Linux/RedHat?
(Sort of figured this out, but trying to get the system to see my integrated 3Com NIC in Inspiron 4100 notebook).

Thank you varee much!
If your system isn't recognizing your NIC then you probably don't have 3Com support compiled into your kernel.

 

Poontos

Platinum Member
Mar 9, 2000
2,799
0
0
Thanks guys!

How do I get 3Com NIC support into the kernel, or at least the simplest way? It's an Inspiron 4100 w/ 3Com 3c920 Integrated Fast Ethernet Controller (3C905C-TX Compatible).

 
Mar 14, 2002
54
0
0
Originally posted by: Electrode
An introduction to the UNIX command promptOne of the most significant differences between Windows and *NIX operating systems is that you can go your whole life without ever opening a command prompt in Windows, but you have to use it every day in *NIX. If you intend to switch to a *NIX OS, you need to know how to use the command prompt.

First off, unlike DOS and Windows which only offered one shell (command.com and its ilk), *NIX operating systems offer several different ones. The default shell in Linux is BASH. The default shell in OpenBSD is KSH. Other *NIXen may have different default shells. Generally, however, you can install your favorite shell on any *NIX system if you don't like the default. I use BASH, and so this guide is a bit slanted towards it. If anyone who uses another shell could contribute info relevant to their shell, I'd appreciate it.


Getting help:
man command - Almost always shows you the manual for the specified program. When told to 'RTFM', this is what you must do.
apropos word - Kinda like a search engine for man.


Moving around the file system:
Navigating the *NIX file system is very similar to DOS. Some of the commands are a little different, but they behave the same.
cd dirname - Changes to the specified directory.
cd .. - Changes to the parent of the current directory.
pwd - Prints the current directory. Usefull if, for whatever reason, your prompt doesn't give this info.
ls - Directory listing. use the -lh switch to get a detailed listing. Use the -a switch to show hidden files.


Archives:
tar xzf file.tar.gz - Unpack a .tar.gz file. Doesn't work in all systems.
tar xf file.tar - Unpack an uncompressed .tar file.
gunzip file.gz - Uncompress any .gz file, tar or otherwise. If the file you are decompressing is a .tar.gz, it will not be unpacked, it will simply become a normal .tar file.
bunzip2 file.bz2 - Uncompress any .bz2 file.

tar cf file.tar dirname - Put the contents of a directory into a .tar file.
gzip file - GZip compress a file.
bzip2 file - BZip2 compress a file. This is a pretty good compression method, I suggest you use it.


Viewing and editing files:
cat - Outputs the contents of a text file. Only useful on small files.
more - A somewhat simple text file reader. Hit a key to go to the next page. Works a lot like the one in DOS.
less - A really nice text file reader. Lets you scroll up or down using arrow keys, pageup/down, space, and so on. Q exits. You can get a scrollable directory listing with ls -lha | less

vi file - A really nice text editor, albeit a bit tricky to use. My favorite.
nano file - I'm told this text editor works like Notepad and MS-DOS EDIT. I wouldn't know, I only use VI.
gvim file - If you have this editor on your site, it can't be beat.


Environment variables:
PATH - Tells the shell where to look for programs if you don't tell it exactly where it is. It works like the DOS PATH variable, but with colons (:) instead of semicolons (;) to seperate the entries. For example: /bin:/usr/bin:/usr/local/bin:/opt/bin:/usr/X11R6/bin:/opt/mozilla

export - In BASH, this command is used to set an environment variable.



This is a very rough and hastily thrown-together guide, more or less meant as a starting point for someone else to work on a better FAQ.


Arg.

Other shells:

csh/tcsh (use setenv VARIABLE value syntax)


Other ls switches:

ls -o (bsd specific, shows system flags such as append only, immutable, etc)
ls -r (reverse)
ls -t (sort by time)
ls -d (directory, rather than files within directory)


Other editors:

pico
emacs




 
Mar 14, 2002
54
0
0
Please!!!!!!!!!!!!


Stop suggesting xhost. It's insecure (especially in multi-user environments and on untrusted networks). Instead, teach them to tunnel x packets through ssh.

 
sale-70-410-exam    | Exam-200-125-pdf    | we-sale-70-410-exam    | hot-sale-70-410-exam    | Latest-exam-700-603-Dumps    | Dumps-98-363-exams-date    | Certs-200-125-date    | Dumps-300-075-exams-date    | hot-sale-book-C8010-726-book    | Hot-Sale-200-310-Exam    | Exam-Description-200-310-dumps?    | hot-sale-book-200-125-book    | Latest-Updated-300-209-Exam    | Dumps-210-260-exams-date    | Download-200-125-Exam-PDF    | Exam-Description-300-101-dumps    | Certs-300-101-date    | Hot-Sale-300-075-Exam    | Latest-exam-200-125-Dumps    | Exam-Description-200-125-dumps    | Latest-Updated-300-075-Exam    | hot-sale-book-210-260-book    | Dumps-200-901-exams-date    | Certs-200-901-date    | Latest-exam-1Z0-062-Dumps    | Hot-Sale-1Z0-062-Exam    | Certs-CSSLP-date    | 100%-Pass-70-383-Exams    | Latest-JN0-360-real-exam-questions    | 100%-Pass-4A0-100-Real-Exam-Questions    | Dumps-300-135-exams-date    | Passed-200-105-Tech-Exams    | Latest-Updated-200-310-Exam    | Download-300-070-Exam-PDF    | Hot-Sale-JN0-360-Exam    | 100%-Pass-JN0-360-Exams    | 100%-Pass-JN0-360-Real-Exam-Questions    | Dumps-JN0-360-exams-date    | Exam-Description-1Z0-876-dumps    | Latest-exam-1Z0-876-Dumps    | Dumps-HPE0-Y53-exams-date    | 2017-Latest-HPE0-Y53-Exam    | 100%-Pass-HPE0-Y53-Real-Exam-Questions    | Pass-4A0-100-Exam    | Latest-4A0-100-Questions    | Dumps-98-365-exams-date    | 2017-Latest-98-365-Exam    | 100%-Pass-VCS-254-Exams    | 2017-Latest-VCS-273-Exam    | Dumps-200-355-exams-date    | 2017-Latest-300-320-Exam    | Pass-300-101-Exam    | 100%-Pass-300-115-Exams    |
http://www.portvapes.co.uk/    | http://www.portvapes.co.uk/    |