|
The reply immediately above yours, posted back in March, already mentioned Eclipse.
And resurrecting an old thread to post a link immediately looks suspicious. I had to resort to Google to double-check that the link you posted is the real Eclipse site, and not some spam knock-off.
"These people looked deep within my soul and assigned me a number based on the order in which I joined."
- Homer
|
|
|
|
|
Dear Team,
I am learning about install ubuntu server on the server with multiple hard drive. Instead of investing on the real server and real physical hard drive, is it any solution that I can run the software simulator of partition hard drive in linux (Exp: Create RAID or LVM)?
Thank,
Kanel
|
|
|
|
|
Does Vmware or Virtual box not suit your needs?
Keep Calm and Carry On
|
|
|
|
|
Hi guys, first post on this discussion forum ever. Nice to meet you all. Hope this belongs here.
I have just returned to college for IT after a lapse in enrollment. We're going to be working with Linux more in the future, and even the Powershell in Windows too. I have been messing around with the Raspberry Pi I got for one of my classes, but I pretty much have to Google every command I use in the terminal for it since I'm not that familiar with Debian (sorry, Raspbian), the Powershell, or Linux terminals at all.
My question is this: what are some essential, need to know commands for moving around in and using the Powershell? You can give me one or several, list form, add a short description of what it does, whatever. I'll be jotting them all down in my notes with some extra fluff anyways for future reference.
Appreciate it guys, thanks.
TL;DR: Need useful, necessary Powershell / Linux terminal commands.
|
|
|
|
|
|
Okay, thank you for the resources then. Much appreciated!
|
|
|
|
|
|
|
Find a nice book/primer on Unix commands. They mostly work on Linux as well. You need 'cd' to move between folders, 'ls to list files, type to display text files, 'whereis' to find the location of a file 'su' to switch to root access. most commands will list command line options if you add the --help option. Conversely, you can try 'man '+ command to get help on most commands.
When I was working a lot on Linux/Unix, I found a book called "Tricks of the Un ix Masters". It helped immenselywith file editing and bash scripts.
Good Luck and Dive In,
Walt
|
|
|
|
|
Ben Whaley has a book "Unix and Linux System Administration Handbook" which is comprehensive.
On YouTube, there is a video titled "Interview: Ben Whaley, co-author of the Unix and Linux System Administration Handbook" on tutoriaLinux's channel.
|
|
|
|
|
|
Is it possible to flash Linux on my Samsung Galaxy Tab 6.
Essentially I wish to make it like a remarkable 2. Can I also obtain a pen that is compatible with a capacitive screen.
Any links would be helpful, I would also be willing to write an article.
AndRue
|
|
|
|
|
Android is essentially Linux, so if you can root it, you should be able to totally bork it trying to install some other sort of Linux.
|
|
|
|
|
I'm building a linux-based bluetooth speaker that uses speech recognition to display captions for what is playing on the speaker and I'm trying to figure out where to start in terms of where to intercept the bluetooth audio. I understand that ALSA and PulseAudio could be used to intercept audio from applications before they get sent to the audio hardware, but I haven't had much luck figuring out how a bluetooth source can be intercepted. Any help understanding how bluetooth fits into the audio architecture would be appreciated. Here's what I'm trying to do:
Phone->bluetooth->my custom linux-based bluetooth speaker->run raw audio through speech AI->audio out to speakers and captions out to display.
|
|
|
|
|
Seems simpler to run in parallel (i.e. track) than to "intercept" in series. You know the content and you know when it starts; you have one sync point.
It was only in wine that he laid down no limit for himself, but he did not allow himself to be confused by it.
― Confucian Analects: Rules of Confucius about his food
|
|
|
|
|
am I looking for someone who specializes in hardware programming? I have a sound card which is at the same time control surface is the digi 003 console of digidesign. at the time this card was dedicated and only worked with a specific software, protools 7, but as the company was acquired they stopped the software updates and now the control part is unusable, we only have access to the card are and at 2 out of 8. suddenly I was wondering if it was possible to reprogram it, it is in firewire. if it was possible to go into it somehow and unlock it?
suddenly on my 2008 macpro I installed the famous linux studio that you helped me to troubleshoot, thank you again but it's been a while since I wonder if I could not hack my card to be able to use it at 100 %
|
|
|
|
|
Hello folks, I am looking if linux is good enough for cyber security and ethical hacking? What are other OS's that supports ethical hacking and is efficient enough?
|
|
|
|
|
Yes, that should be enough to try out ethical hacking.
You can try Kali Linux.
The sh*t I complain about
It's like there ain't a cloud in the sky and it's raining out - Eminem
~! Firewall !~
|
|
|
|
|
Alternate OS options would include the BSD variants - Open,Net,Free, Dragonfly, etc. You can always install VMWare or VirtualBox and spin up a virtual host to get started.
Keep Calm and Carry On
|
|
|
|
|
If there is an IP hidden after a firewall, how Linux (or any) command should I use in order to know if this IP is alive ? Because PING is not working in this case ...
|
|
|
|
|
You might be able to use nmap to find out. You can use the -Pn option to tell nmap to skip the ping scan to determine if the host is up. Be aware that nmap will try to connect to a wide range of known ports, which might trigger watchdogs on the target network. In general, using nmap on networks that you are not a valid user of is considered bad manners, so discuss with the network owner before using.
Your success will depend on how the firewall is configured. If it is set up to block all access from WAN for that host (e.g. drop all inbound/outbound packets to/from the host you are interested in), you will never get any response from the host. Your only hope may be that you can access a different host on the target network and be able to try to ping or connect to the host from there.
Keep Calm and Carry On
|
|
|
|
|
|
If the target is behind a firewall, and that firewall is configured to quash inbound ICMP, you have no way of pinging the machine.
|
|
|
|
|
Exception - references to RTFM pertinent to subject are welcome.
Please do not clutter the issue with BIOS "stuff".
I am looking for old fashioned flow chart describing Linux ( Ubuntu) UEFI booting process.
I can RTFM for grub, UEFI - however I just do not understand how the entire process works,
I can start with
1. Install Linux using ISO
2. Select GPT partition format
3. Let installer build EFI (boot) partititon etc.
4. After install - on power -up - setup UEFI
5. Then setup "grub/grub2 "
....
6. After initial setup - what files are actually used during NEXT boot process?
/default/grub ?? grub.cfg ??
|
|
|
|
|