Skip to main content

Home/ Groups/ KIIT_CSE_IT
Parin Sharma

VirtualBox - Debian Wiki - 0 views

  •  
    Load VBOXDRV on boot
Parin Sharma

Debian User Forums * View topic - Aptitude wants to remove all of gnome - 0 views

  • Re: Aptitude wants to remove all of gnome by Telemachus » 2009-05-12 12:09 moezzie wrote:Hey there guys!I recently installed Debian Lenny on my desktop, ive been running Debian etch on my server for quite some time now and i love it.Anyways, everything worked find till i had to install build essential( aptitude install build-essential linux-headers-$(uname -r) ) for my nvidia drivers. Upon looking though the list of components up for installation and removal i notice that the removal list was huge. I thought this was kind of odd but still trusted aptitude to do the right thing so i hit enter. After everything finished pretty much all of gnome was gone...So i went ahead and aptitude install gnome, and i got pretty much all of my packages back, except there are still about 330 packages in my aptitude removal list.Aptitude seems to think that they are unnecessary and wants to remove them all. The list contains everything from gnome-network-manager to xsane to gedit...How can i tell aptitude otherwise? Thanks in advance!This is a well-known issue. In a nutshell, you installed Gnome via a metapackage. Metapackages are wrappers that help you to install and update a huge collection of items easily. The price you pay is that each of the individual packages is required in order for aptitude to keep all the rest. Therefore, if you remove even a small, apparently inconsequential piece of Gnome (which you probably did inadvertently), aptitude will cheerfully tell you "Ok, Gnome's got to go."
Parin Sharma

Computer Paathshala - 0 views

  •  
    My first exposure to Camera with FOSS !!
Parin Sharma

Java Plugin Install for Linux - 0 views

  •  
    "Manual Installation and Registration of Java Plugin for Linux"
Parin Sharma

Using cron - 0 views

  • [min] [hour] [day of month] [month] [day of week] [program to be run]
Parin Sharma

Unixmen - AWN - Just another launchbar for linux desktop | Unixmen - 0 views

  •  
    "sudo add-apt-repository ppa:awn-testing/ppa"
Parin Sharma

Fwd: [cslug] Fwd: [ilugd] Fwd: [Fsf-friends] Ankit Fadia : The real picture - 0 views

  •  
    "Ankit Fadia : The real picture"
Parin Sharma

LAMP Server on Ubuntu 9.10 Server | Ubuntu Course | Linux Server Training - 0 views

  • Linerd November 14th, 2009 You can also install a lamp server in Ubuntu with sudo apt-get install l
Parin Sharma

Why Upgrade to GPLv3 - GNU Project - Free Software Foundation (FSF) - 0 views

  • Software patents are a vicious and absurd system that puts all software developers in danger of being sued by companies they have never heard of, as well as by all the megacorporations in the field. Large programs typically combine thousands of ideas, so it is no surprise if they implement ideas covered by hundreds of patents. Megacorporations collect thousands of patents, and use those patents to bully smaller developers. Patents already obstruct free software development.
Parin Sharma

Grub2 - Community Ubuntu Documentation - 0 views

  •  
    "The main menu file, /boot/grub/grub.cfg, is not meant to be edited, even by 'root'. "
Parin Sharma

Understanding the StackOverflow Database Schema - SQLServerPedia - 0 views

  • In StackOverflow, questions and answers are both considered posts.
  • PostTypeId - 1 is a question, 2 is an answer. Answers will have a ParentId field populated to link back to the question post.
  • . Answer titles will be null.
  • ...1 more annotation...
  • answers aren't tagged
Parin Sharma

How the Linux kernel works | TuxRadar Linux - 0 views

  • The kernel makes its services available to the application programs that run on it through a large collection of entry points, known technically as system calls.
  • From a programmer's viewpoint, these look just like ordinary function calls, although in reality a system call involves a distinct switch in the operating mode of the processor from user space to kernel space. Together, the repertoire of system calls provides a 'Linux virtual machine', which can be thought of as an abstraction of the underlying hardware.
  • An even less visible function of the kernel, even to programmers, is memory management. Each process runs under the illusion that it has an address space (a valid range of memory addresses) to call its own.
  • ...5 more annotations...
  • Note that specific application protocols such as FTP, DNS or HTTP are implemented by user-level programs and aren't part of the kernel.
  • the kernel provides a large collection of modules that know how to handle the low-level details of talking to hardware devices - how to read a sector from a disk, how to retrieve a packet from a network interface card and so on. These are sometimes called device drivers.
  • In contrast, modern Linux kernels are modular: a lot of the functionality is contained in modules that are loaded into the kernel dynamically.
  • This keeps the core of the kernel small and makes it possible to load or replace modules in a running kernel without rebooting.
  • This tells modprobe to include the probe_mask=1 option every time it loads the snd-hda-intel module. Some recent Linux distrubutions split this information up into multiple files under /etc/modprobe.d rather than putting it all in modprobe.conf.
Parin Sharma

FedX - Gitorious - 0 views

  •  
    "FedX" is a tool for syncing, configuring Fedora offline repositories.
Parin Sharma

The Free Software Definition - GNU Project - Free Software Foundation (FSF) - 0 views

  • Freedom 1 includes the freedom to use your changed version in place of the original. If the program is delivered in a product designed to run someone else's modified versions but refuse to run yours — a practice known as “tivoization” or (through blacklisting) as “secure boot” — freedom 1 becomes a theoretical fiction rather than a practical freedom. This is not sufficient. In other words, these binaries are not free software even if the source code they are compiled from is free.
  • In order for these freedoms to be real, they must be permanent and irrevocable as long as you do nothing wrong; if the developer of the software has the power to revoke the license, or retroactively change its terms, without your doing anything wrong to give cause, the software is not free.
  • For example, copyleft (very simply stated) is the rule that when redistributing the program, you cannot add restrictions to deny other people the central freedoms. This rule does not conflict with the central freedoms; rather it protects them.
  • ...1 more annotation...
  • Free software does not mean non-commercial. A free program must be available for commercial use, commercial development, and commercial distribution. Commercial development of free software is no longer unusual; such free commercial software is very important. You may have paid money to get copies of free software, or you may have obtained copies at no charge. But regardless of how you got your copies, you always have the freedom to copy and change the software, even to sell copies.
Parin Sharma

An introduction to Linux kernel programming - Lesson 1: Building and running a new Linu... - 0 views

  •  
    Nice tutorial for Linux Compilation!!
Parin Sharma

Linux Help - Sudo Setup Guide - 0 views

  •  
    Sudo setup 
Parin Sharma

Save Bandwidth by Setting Up a Fedora Mirror - LINUX For You Magazine - 0 views

  • : it’s about mirrorin
  • According to Wikipedia, “In computing, a mirror is an exact copy of a data set. On the Internet, a mirror site is an exact copy of another Internet site.” When you try to install a new package into your Fedora installation, either using PackageKit or Yum, it tries to fetch the packages from an Internet site along with the libraries and other software required for it, and install it on your computer. Now software like OpenOffice.org or OpenArena are very big and along with all their dependencies, the download size may be in the order of hundreds of megabytes.
Parin Sharma

[wubi] after installation: hangs on grub - Page 2 - Ubuntu Forums - 0 views

  •  
    "Well you can boot into Ubuntu following the steps below. But first, my hard disk configuration is: one disk with 3 partitions: - 1st one (sda1): is laptop recover data NTFS (came from factory and it's hidden) - 2nd one (sda2): is where I have Windows (Vista) NTFS installation and from where I installed Ubuntu inside using WUBI. - 3rd one (sda3): just a data backup NTFS partition To boot up Ubuntu, just restart computer and choose "Ubuntu" at windows boot menu. When it drops to prompt "sh:grub>" enter the following 4 (four) commands (change it according to your hard disk configuration): Quote: set root=(hd0,2) linux (loop0)/boot/vmlinuz-2.6.31-14-generic root=/dev/sda2 loop=/ubuntu/disks/root.disk ro initrd (loop0)/boot/initrd.img-2.6.31-14-generic boot Remember: 1. that you can press TAB key after "(loop0)" and "loop=" to get completion help/guidance. 2. at prompt "sh:grub>" you can type the command 'ls' to list the partitions. 3. (hd0,1) equals to /dev/sda1, (hd0,2) equals to /dev/sda2, (hd0,3) equals to /dev/sda3, ... You should now be able to boot to Ubuntu. Once inside Ubuntu, open a console and try to resolve the grub/wubi problem with the following commands (this part I can't confirm that will work): sudo update-grub sudo update-grub2 sudo grub-install /dev/sda sudo grub-install /dev/sda2 I hope this will help you guys. Regards."
Parin Sharma

How to manage disk encryption passphrases and key slots - LinuxBSDos.com - 0 views

  • Disk encryption is one method you may use to enhance the physical security rating of your computer. From my experience, it is rarely used, which is a shame because it is one of the most effective safeguards against unauthorized physical access to data stored on a computer. Disk encryption, which can be full disk, or per partition, may be configured during or after installation, but the most effective is full disk during installation. The following Linux distributions listed on this website, have support for configuring full disk encryption during installation:
Parin Sharma

An IRC Tutorial - 0 views

  •  
    "An IRC Tutorial"
‹ Previous 21 - 40 Next › Last »
Showing 20 items per page