Lost Root Password (Linux)

2010-05-26T11:21:45+00:00 May 11th, 2005|Linux|

I have a very good memory. I remember most of my client's passwords (there are a few I forget regularly for no reason that I can understand, but I really do know most), I remember telephone numbers, and of course I know my own passwords. That last isn't as easy as it might sound, because I have quite a few different systems and each has its own password, but though I might use the wrong one now and then, I'll get it on the second or third try.

How Can I Mount a ISO Image CD?

2010-05-26T11:21:59+00:00 May 11th, 2005|Linux|

You have an image of a CD or perhaps of a floppy disk. You may have downloaded it, or created it by reading a real device with "dd". Now you want to mount that image. You could write it back out to media and mount that, but that may not be convenient or even possible at the moment.

Linux Wireless Networking

2010-05-26T11:23:24+00:00 May 4th, 2005|Linux, Wireless|

These days you cannot talk about computers and networks without thinking of Linux and wireless networking. In this article, Sreekrishnan Venkateswaran explains wireless networking with WLAN, Bluetooth, GPRS, GSM, and IrDA from a Linux perspective. He uses various wireless devices and the corresponding kernel layers and user space tools to demonstrate how they work with Linux.

Magic Sysrq

2010-05-26T11:24:36+00:00 May 3rd, 2005|Linux|

The Magic Sysrequest Key is Alt (left or right Alt key) and Sysrq (up there under Print Screen, next to F12 on most keyboards). To use it, you need to have it enabled in your kernel (CONFIG_MAGIC_SYSRQ). It usually is; if you have a file called '/proc/sys/kernel/sysrq' you have this. To ENABLE the magic functions, you need a 1 in that file. If it has 0, Alt-SysRq just returns you to the previous console you were using.

BackupEDGE 2.1

2010-05-26T11:24:43+00:00 May 3rd, 2005|Linux|

The latest version of Microlite BackupEDGE adds several new features. For those who are not familiar with the product at all, a quick recap is in order:

Blacklist Unwanted IP Addresses

2010-05-26T11:24:23+00:00 May 3rd, 2005|Linux|

On Linux, it's easy enough to add an iptables rule to blacklist a particular ip address. You can even automate the process based on certain criteria that you define. However, you don't necessarily want to leave an ip blacklisted forever, because it may be transient (a legitimate user may have that ip address tomorrow), or the condition that triggered your block may have been an error. The ip address may even have been spoofed, thus denying access to legitimate users.

Writing and Compiling C programs on Linux

2010-05-26T11:28:40+00:00 April 22nd, 2005|Linux|

Most Linux and Unix programs are written in C. When you download source for a project, it will often be C or C++ source code. You don't necessarily need to know a darn thing about C or anything else to compile the source if you aren't changing it. It may be helpful for you to understand a bit if you are having problems with the compile, but even that isn't really necessary.

Running Free with Linux

2010-05-26T11:30:16+00:00 April 21st, 2005|Linux|

As Wi-Fi become ubiquitous, Linux has jumped on the bandwagon. In this article, Roman Vichr explains how Linux has helped -- and been helped by -- a number of wireless tools and projects.