Search:
Type: Posts; User: shadov
Search:
Search took 0.08 seconds.
-
I don't think installing from source is really difficult (unless you run into dependancy problems in which case it fails to compile until you install what ever it needs). Just read whatever...
-
amarok
apache
blender
bluefish
eclipse
gimp
firefox
krusader
mplayer
mysql
-
It should be eth0="dhcp", not eth0=dhcp. And as retsaw pointed out you shouldn't disable lo.
Here's what I have:
lo="lo 127.0.0.1"
eth0="dhcp"
INTERFACES=(lo eth0)
...
-
I remember a lecturer (who also works for a company providing security auditions for corporations) saying that switch doesn't provide much protection against packet sniffing. Sniffing packets on a...
-
Java has a class called Integer for this.
-
If you are testing/debugging a program, you use shell history to execute it. Right? You only need to type the ./ once in the beginning of your coding session.
You don't need . in your path to be...
-
http://en.wikipedia.org/wiki/Quicksort contains some theory, pseudocode and implementation in several languages. Perhaps you find out what is wrong with your code by comparing it to the code in...
-
-
Command + S during startup boots into single user mode. IIRC no passwords asked. You should be then able to set root password.
-
Not everyone here agrees with that analogy.
Microsoft is a monopoly, Apple is not. Microsoft is trying to break open standards and replace them with their own proprietary technologies. Apple is...
-
I've never tried it, but shouldn't taking /etc/shadow and /etc/group from old install to the new do the trick?
For recreating the os: take backups of /etc and all other config files, make a list...
-
It is safe. Windows viruses can't run on Linux.
-
-
Right click on panel -> Add -> Panel -> Child Panel.
Everything else you need to arrange panels and add buttons and stuff to them is also under the right click menu.
-
I usually use SFTP because it comes free with sshd and I'm too lazy to configure and secure anything else. It's the easy and most secure way if you can trust the people you give access to your files....
-
Yes. If Apple had over 90% market share they would be worse than Microsoft. But the thing is they don't. Now they have to play nice. Apple is using a lot of open source software and they are...
-
Who is going to admin that box?
Most desktop distros are more or less the same from the end user point of view. If you are going to be the admin, then choose a distro you find easy and familiar....
-
Many screencapture programs default to PNG and I think most of Linux users have fast internet connection, so they don't pay attention to how big the image file is. I think that's why PNG is so...
-
If you use copyrighted material, you need permission from the copyright holder. With GPL you have the permission as long as you follow the licence. If you don't follow GPL, then you commit a...
-
You didn't say what method you use to log in to work computer. I assume you use ssh.
In that case you can use sftp or scp. Sftp is like ftp but it's secure. Borh graphical and CLI sftp clients are...
-
Did you access the file some other way before moving it? Linux caches recently used data in RAM. So maybe it didn't have to touch the USB disk at all. I'm not expert at this, but perhaps kernel just...
-
Bochs would probably suit better for that than wine.
-
OS X 10.3 has it with nice 3D effect. (I know it isn't Linux, but it's *nix anyway)
IMHO bunch of xterms and su is quite cool. But I understand that someone might make use of easy interface for...
-
I think theoretically you could use Linux software raid, linear mode, to appende the partitions. But you still need to format both partions, and it would be less reliable and perform worse. And...
-
I would just add it in KDE menu and define kb shortcut in there. Easier than installing additional software.
|
|