|
Member 8189522 wrote: Found a directory gl-system-install You need to search your directory tree for the executable (gl-system-install). Also you may like to check on the site where you downloaded this from to see if they have a support forum.
One of these days I'm going to think of a really clever signature.
|
|
|
|
|
See my answer to him... seems to me like he just missed the "log in as git user" step.
|
|
|
|
|
I did not bother to read the article, assuming any Linux user would understand about directory trees and search paths.
One of these days I'm going to think of a really clever signature.
|
|
|
|
|
Your error seems to indicate you didn't follow the step that said... log in under your git account:
Quote: Log in as the git user:
If you had logged in under the git account... you would be in the home directory for that user... which is:
/home/git/
...therefore when you typed the command...
src/gl-system-install ~/bin ~/share/gitolite/conf ~/share/gitolite/hooks
...you would already be in the git home directory... therefore the location src/gl-system-install would make sense... if you're ANYWHERE else in the system, the call will fail.
Edit: Going over the short article again... it seems to assume you've configured su to change you from your current directory to the home directory of the user you've logged in as. This isn't the default behavior of su. So you'll have to either log off and log back in to be in the right home directory or just cd into the right home directory (or change the default behavior of su).
|
|
|
|
|
there is no such work perform on authentication between two access points.I also not find any literature review at such topic.Problem is coming in methodology.I suggest to propose a framework on it.There must be some modules.I suggest use 802.1x technique and cryptography method.I want to explore it but no one helping me.Also my instructor.No one show me the right track or path.I donot know it is possible or not.But why it is not possible?how i make it possible.Please Please help me for God sake
modified 20-Oct-12 12:26pm.
|
|
|
|
|
built a trusted relation ship between two access point.How i propose a frame work for that problem or a protocol.i need a flow on that problem.
|
|
|
|
|
|
can authentication between two access points is possible or not?My field is networking and my thesis is related to wireless LAN security.All solution and work is done on authentication between access point and Mobile station.Can only authentication perform between two Access point devices or not?
|
|
|
|
|
Cisco company www.cisco.com[^] have a huge depository of information you may find of interest including stuff on "wireless access point authentication". But you will need to search their depository to find what you need.
That said, you may also find something to interest you here https://www.opennetworking.org/[^]
modified 1-Aug-19 21:02pm.
|
|
|
|
|
I did not find any thing on that side.Please how i design a layerd framework for access point authentication.What input and what will be out put.How define objectives for the authentication between two access points before perform a handoff for mobile user. Please you are network person help me.I am very sad.
|
|
|
|
|
How to convert VHDX to VHD file format on windows 8 / Windows server 2012?
|
|
|
|
|
|
I'm thinking of dual booting Windows 7 with one of the latest versions of Ubuntu. I'm curious which would be the better way to go: installing Windows first and then Ubuntu, or the other way around. For those that have gone down this road, what insights can you offer?
Thanks.
- DC
"One man's wage rise is another man's price increase." - Harold Wilson
"Fireproof doesn't mean the fire will never come. It means when the fire comes that you will be able to withstand it." - Michael Simmons
"Show me a community that obeys the Ten Commandments and I'll show you a less crowded prison system." - Anonymous
|
|
|
|
|
David,
While I haven't dual booted in many years I have been administrating CentOS servers for several years and playing with Ubuntu and Fedora on the desktop recently.
You have to go Windows first and then what ever version on Linux you want to use. The reason is the Windows installation likes to believe it is the only game in town and will generally blow the boot sector away and install it's own. Linux is nicer and if it does replace the boot sector it places the existing OS information in it's boot loader so you get the choice of both OS's.
I have read about changing the Windows boot loader to accomodate Linux, but I haven't tried it and wouldn't really like to touch it with a ten foot pole as the saying goes.
Michael Martin
Australia
"I controlled my laughter and simple said "No,I am very busy,so I can't write any code for you". The moment they heard this all the smiling face turned into a sad looking face and one of them farted. So I had to leave the place as soon as possible."
- Mr.Prakash One Fine Saturday. 24/04/2004
|
|
|
|
|
You could also opt to boot from a USB-stick. That way you needn't risk your primary environment
Bastard Programmer from Hell
if you can't read my code, try converting it here[^]
|
|
|
|
|
I would ALWAYS go with installing Windows first.... back in the day, Windows always overwrote the MBR and therefore you couldn't boot to other OS's present in the system until you fixed what Windows broke. I believe they have since fixed that little annoyance, but I'd still trust Linux to know how to handle other coexistant operating systems better than Windows would.
|
|
|
|
|
Hi I have a problem in subnetting, if anyone has an idea could help, the problem is: If I have 6 hosts and in a class A address, how do I get the number of subnets and the custom subnet mask if am given a network number 126.0.0.0, thank you.
|
|
|
|
|
Please don't crosspost on the forums.
Bastard Programmer from Hell
if you can't read my code, try converting it here[^]
|
|
|
|
|
Eddy Vluggen wrote: crosspost I think the word has gone out to a certain community that crossposting is the way to get more answers; it seems particularly bad today. We need a "zap the crossposter" button.
One of these days I'm going to think of a really clever signature.
|
|
|
|
|
How can I do setting internet connection in my red hat linux5 ?
|
|
|
|
|
Are you asking how to set your network settings on your RHL box so you can see other computers on your network and also get to the internet?
Can you see the other computers but not get to the internet?
Are you trying to do this in the GUI or at the CLI?
Michael Martin
Australia
"I controlled my laughter and simple said "No,I am very busy,so I can't write any code for you". The moment they heard this all the smiling face turned into a sad looking face and one of them farted. So I had to leave the place as soon as possible."
- Mr.Prakash One Fine Saturday. 24/04/2004
|
|
|
|
|
What's your problem? ...RH usually has rather straight forward settings for hooking up to a network... I've never really had issues with it.
|
|
|
|
|
Ndis->passthru is a sample in WDK, passthru can get packet data by MPSendPackets()
NdisQueryPacket( pPacket,NULL,NULL,NULL,&PacketSize);
NdisAllocateMemory( &pPacketContent, 2000, 0,HighestAcceptableMax);
NdisQueryBufferSafe(pPacket->Private.Head, &pBuf, &BufLength, 32 );
i = BufLength;
pNext = pPacket->Private.Head;
for(;;)
{
if(pNext == pPacket->Private.Tail)
break;
pNext = pNext->Next;
if(pNext == NULL)
break;
NdisQueryBufferSafe(pNext,&pBuf,&BufLength,32);
NdisMoveMemory(pPacketContent+i,pBuf,BufLength);
i+=BufLength;
}
DBGPRINT(("(char*)&pPacketContent[54] : %s \n",(char *)&pPacketContent[54]));
I want to modify data of pPacketContent[55], and remake the packet.
Can anyone give me a sample? Thanks!
|
|
|
|
|
I'm not a network/hardwre person, so bear with me.
I have a laptop connected wirelessly that I can't see in Network Neighborhood. If I connect it with cable, I can then see it. The firewall on the laptop is off. All the other pc's in the office can see each other in Network Neighborhood.
I could use some help troubleshooting this.
Thanks
If it's not broken, fix it until it is
modified 14-Aug-12 14:42pm.
|
|
|
|
|
That can happen for a number of reasons...
0. In newer versions of Windows, you have to tell Windows that you're in a trusted zone or else it blocks certain services. Make sure you've specified that you're in a home or work network as opposed to a public network.
1. Are you sure your wifi network can even access the rest of the network? In some places, the wifi is isolated so that you can't even access the rest of the network or placed in a different subnet so that there's virtual separation.
2. Make sure your adapter doesn't have NetBIOS turned off, not sure if this would cause that problem exactly but it should be on in a work network anyway.
3. Make sure your computer is on the same domain (should be if it works over the wire).
What OS are you using anyway?
|
|
|
|