Skip to main content

Home/ KIIT_CSE_IT/ Group items tagged WWW

Rss Feed Group items tagged

Parin Sharma

niyam: GnuLinux - 0 views

  • Guerrilla-Warfarefor Gyaan Date: 09 February 2004. Version: 0.1. License: FDL (www.gnu.org) Copyright 2004 Niyam Bhushan. www.niyam.com. Published under the Free Documentation License (FDL). More info about FDL at www.gnu.org Why is free software, that is both muft and mukt, not being adopted so widely and rapidly in schools and colleges across India? Please do a google-search for the phrase 'project shiksha and linux'. You
  • In Hindi, 'Gyaan' means 'Knowledge' but the word has roots in sanskrit, where it also is the root for both knowledge and meditative-awareness. Interestingly the same sanskrit word travelled to Japan, some believe in the days of Bodhidharma, and became the word 'Zen'.
  • Which is sad, because muft and mukt software can create a revolution in education today. It significantly lowers the entry-level price, thereby bridging the huge digital divide in India. IT students can learn how software truly works, as they have the freedom to study its source. A growing collection of muft and mukt software is available for all disciplines of education, at all levels. This helps further knowledge without penalizing educators and students. Most importantly, FLOSS in education ushers in a new value system in society: of building communities, creating and sharing wealth and knowledge. Indeed, FLOSS brings freedom to knowledge
Parin Sharma

How the Linux kernel works | TuxRadar Linux - 0 views

  • The kernel makes its services available to the application programs that run on it through a large collection of entry points, known technically as system calls.
  • From a programmer's viewpoint, these look just like ordinary function calls, although in reality a system call involves a distinct switch in the operating mode of the processor from user space to kernel space. Together, the repertoire of system calls provides a 'Linux virtual machine', which can be thought of as an abstraction of the underlying hardware.
  • An even less visible function of the kernel, even to programmers, is memory management. Each process runs under the illusion that it has an address space (a valid range of memory addresses) to call its own.
  • ...5 more annotations...
  • Note that specific application protocols such as FTP, DNS or HTTP are implemented by user-level programs and aren't part of the kernel.
  • the kernel provides a large collection of modules that know how to handle the low-level details of talking to hardware devices - how to read a sector from a disk, how to retrieve a packet from a network interface card and so on. These are sometimes called device drivers.
  • In contrast, modern Linux kernels are modular: a lot of the functionality is contained in modules that are loaded into the kernel dynamically.
  • This keeps the core of the kernel small and makes it possible to load or replace modules in a running kernel without rebooting.
  • This tells modprobe to include the probe_mask=1 option every time it loads the snd-hda-intel module. Some recent Linux distrubutions split this information up into multiple files under /etc/modprobe.d rather than putting it all in modprobe.conf.
Parin Sharma

Save Bandwidth by Setting Up a Fedora Mirror - LINUX For You Magazine - 0 views

  • : it’s about mirrorin
  • According to Wikipedia, “In computing, a mirror is an exact copy of a data set. On the Internet, a mirror site is an exact copy of another Internet site.” When you try to install a new package into your Fedora installation, either using PackageKit or Yum, it tries to fetch the packages from an Internet site along with the libraries and other software required for it, and install it on your computer. Now software like OpenOffice.org or OpenArena are very big and along with all their dependencies, the download size may be in the order of hundreds of megabytes.
Parin Sharma

How to manage disk encryption passphrases and key slots - LinuxBSDos.com - 0 views

  • Disk encryption is one method you may use to enhance the physical security rating of your computer. From my experience, it is rarely used, which is a shame because it is one of the most effective safeguards against unauthorized physical access to data stored on a computer. Disk encryption, which can be full disk, or per partition, may be configured during or after installation, but the most effective is full disk during installation. The following Linux distributions listed on this website, have support for configuring full disk encryption during installation:
Parin Sharma

Linux Doesn't Exist; Hacking Is Crime | Katonda - 0 views

  • Richard M Stallman has made it clear many times, "A hacker is someone who enjoys playful cleverness—not necessarily with computers. The programmers in the old MIT free software community of the 60s and 70s referred to themselves as hackers. Around 1980, journalists who discovered the hacker community mistakenly took the term to mean “security breaker.”
Parin Sharma

We Can Put an End to Word Attachments - GNU Project - Free Software Foundation (FSF) - 0 views

  •  
    End Word Attachments
Parin Sharma

Roll Out a Fedora Remix - LINUX For You Magazine - 0 views

  •  
    Remixing Fedora
1 - 20 of 305 Next › Last »
Showing 20 items per page