Skip to main content

Home/ KIIT_CSE_IT/ Group items tagged Disk

Rss Feed Group items tagged

Parin Sharma

[wubi] after installation: hangs on grub - Page 2 - Ubuntu Forums - 0 views

  •  
    "Well you can boot into Ubuntu following the steps below. But first, my hard disk configuration is: one disk with 3 partitions: - 1st one (sda1): is laptop recover data NTFS (came from factory and it's hidden) - 2nd one (sda2): is where I have Windows (Vista) NTFS installation and from where I installed Ubuntu inside using WUBI. - 3rd one (sda3): just a data backup NTFS partition To boot up Ubuntu, just restart computer and choose "Ubuntu" at windows boot menu. When it drops to prompt "sh:grub>" enter the following 4 (four) commands (change it according to your hard disk configuration): Quote: set root=(hd0,2) linux (loop0)/boot/vmlinuz-2.6.31-14-generic root=/dev/sda2 loop=/ubuntu/disks/root.disk ro initrd (loop0)/boot/initrd.img-2.6.31-14-generic boot Remember: 1. that you can press TAB key after "(loop0)" and "loop=" to get completion help/guidance. 2. at prompt "sh:grub>" you can type the command 'ls' to list the partitions. 3. (hd0,1) equals to /dev/sda1, (hd0,2) equals to /dev/sda2, (hd0,3) equals to /dev/sda3, ... You should now be able to boot to Ubuntu. Once inside Ubuntu, open a console and try to resolve the grub/wubi problem with the following commands (this part I can't confirm that will work): sudo update-grub sudo update-grub2 sudo grub-install /dev/sda sudo grub-install /dev/sda2 I hope this will help you guys. Regards."
Parin Sharma

How to manage disk encryption passphrases and key slots - LinuxBSDos.com - 0 views

  • Disk encryption is one method you may use to enhance the physical security rating of your computer. From my experience, it is rarely used, which is a shame because it is one of the most effective safeguards against unauthorized physical access to data stored on a computer. Disk encryption, which can be full disk, or per partition, may be configured during or after installation, but the most effective is full disk during installation. The following Linux distributions listed on this website, have support for configuring full disk encryption during installation:
Parin Sharma

GRUB bootloader - Full tutorial - 0 views

  • Primary partitions are marked from 0 to 3 (hd?,0), (hd?,1), (hd?,2), (hd?,3). Logical partitions in the extended partition are counted from 4 up, regardless of the actual number of primary partitions on the hard disk, e.g. (hd1,7).
  • As the name implies, GRUB passes the control of the boot sequence to another bootloader, located on the device to which the menu entry points. This can be a Windows operating system, but also any other, including Linux.
Parin Sharma

How the Linux kernel works | TuxRadar Linux - 0 views

  • The kernel makes its services available to the application programs that run on it through a large collection of entry points, known technically as system calls.
  • From a programmer's viewpoint, these look just like ordinary function calls, although in reality a system call involves a distinct switch in the operating mode of the processor from user space to kernel space. Together, the repertoire of system calls provides a 'Linux virtual machine', which can be thought of as an abstraction of the underlying hardware.
  • An even less visible function of the kernel, even to programmers, is memory management. Each process runs under the illusion that it has an address space (a valid range of memory addresses) to call its own.
  • ...5 more annotations...
  • Note that specific application protocols such as FTP, DNS or HTTP are implemented by user-level programs and aren't part of the kernel.
  • the kernel provides a large collection of modules that know how to handle the low-level details of talking to hardware devices - how to read a sector from a disk, how to retrieve a packet from a network interface card and so on. These are sometimes called device drivers.
  • In contrast, modern Linux kernels are modular: a lot of the functionality is contained in modules that are loaded into the kernel dynamically.
  • This keeps the core of the kernel small and makes it possible to load or replace modules in a running kernel without rebooting.
  • This tells modprobe to include the probe_mask=1 option every time it loads the snd-hda-intel module. Some recent Linux distrubutions split this information up into multiple files under /etc/modprobe.d rather than putting it all in modprobe.conf.
1 - 13 of 13
Showing 20 items per page