Loading [MathJax]/extensions/mml2jax.js
Skip to main content
Library homepage
 

Text Color

Text Size

 

Margin Size

 

Font Type

Enable Dyslexic Font
Engineering LibreTexts

Search

  • Filter Results
  • Location
  • Classification
    • Article type
    • Author
    • Set as Cover Page of Book
    • License
    • Show TOC
    • Transcluded
    • OER program or Publisher
    • Autonumber Section Headings
    • License Version
    • Print CSS
  • Include attachments
Searching in
About 258 results
  • https://eng.libretexts.org/Bookshelves/Computer_Science/Operating_Systems/Linux_-_The_Penguin_Marches_On_(McClanahan)/10%3A_Network_Management/2.02%3A_Server_Roles_in_Linux
    In the absence of a DHCP server, a computer or other device on the network needs to be manually assigned an IP address, or to assign itself an APIPA address, the latter of which will not enable it to ...In the absence of a DHCP server, a computer or other device on the network needs to be manually assigned an IP address, or to assign itself an APIPA address, the latter of which will not enable it to communicate outside its local subnet.
  • https://eng.libretexts.org/Bookshelves/Computer_Science/Operating_Systems/Linux_-_The_Penguin_Marches_On_(McClanahan)/05%3A_File_and_Directory_Management/1.02%3A_Creating_and_Editing_Text_files_-_Vim_Editor/1.02.03%3A_Vim_-_Command-Line_Mode
    Vim uses one mode to insert text into the file; one mode to navigate around the file - although vim allows use of the arrow keys to move while in insert mode; one mode that allows us to select chunks ...Vim uses one mode to insert text into the file; one mode to navigate around the file - although vim allows use of the arrow keys to move while in insert mode; one mode that allows us to select chunks of code to modify; and now we have the Command-Line mode where we can do a majority of the editing.
  • https://eng.libretexts.org/Bookshelves/Computer_Science/Operating_Systems/Linux_-_The_Penguin_Marches_On_(McClanahan)/12%3A_Linux_Systems_Security/1.04%3A_Security_Best_Practices
    There are numerous steps to take that increase the overall security of a Linux system. Cybersecurity is increasing in importance with the growing number of tools and technology at the hands of those a...There are numerous steps to take that increase the overall security of a Linux system. Cybersecurity is increasing in importance with the growing number of tools and technology at the hands of those attempting to infiltrate systems, steal data, and hold systems for ransom. Strong passwords - Good options to consider would be: a minimum length of at least 10 characters, require the use of special characters or upper and lowercase letters.
  • https://eng.libretexts.org/Bookshelves/Computer_Science/Operating_Systems/Linux_-_The_Penguin_Marches_On_(McClanahan)/07%3A_Linux_Boot_Process/1.03%3A_Configuring_initrd
    The bootloader will load the kernel and initial root file system image into memory and then start the kernel, passing in the memory address of the image. At the end of its boot sequence, the kernel tr...The bootloader will load the kernel and initial root file system image into memory and then start the kernel, passing in the memory address of the image. At the end of its boot sequence, the kernel tries to determine the format of the image from its first few blocks of data, which can lead either to the initrd or initramfs scheme.
  • https://eng.libretexts.org/Bookshelves/Computer_Science/Operating_Systems/Linux_-_The_Penguin_Marches_On_(McClanahan)/10%3A_Network_Management/1.01%3A_TCP_IP_Fundamentals/1.01.02%3A_TCP_IP_Fundamentals_-_Addressing
    In the original design of IPv4, an IP address was divided into two parts: the network identifier was the most significant octet of the address, and the host identifier was the rest of the address. The...In the original design of IPv4, an IP address was divided into two parts: the network identifier was the most significant octet of the address, and the host identifier was the rest of the address. The following diagram modifies the above example by moving two bits from the host part to the network prefix to form four smaller subnets, each one quarter of the previous size.
  • https://eng.libretexts.org/Bookshelves/Computer_Science/Operating_Systems/Linux_-_The_Penguin_Marches_On_(McClanahan)/01%3A_Introduction_to_Linux/3.05%3A_Sources_of_Online_Linux_Documentation
    With respect to the C library, the primary focus is the GNU, C library (glibc), although, where known, documentation of variations on other C libraries available for Linux is also included. Another op...With respect to the C library, the primary focus is the GNU, C library (glibc), although, where known, documentation of variations on other C libraries available for Linux is also included. Another option would be: 1) go to the Distro Watch website 2) select the desired distro 3) scroll down - on the left side is a listing for the distros documentation page.
  • https://eng.libretexts.org/Bookshelves/Computer_Science/Operating_Systems/Linux_-_The_Penguin_Marches_On_(McClanahan)/09%3A_Managing_Linux_Devices/2.02%3A_Configuring_Linux_Devices/2.02.01%3A_Configuring_Linux_Devices_-_Printing
    CUPS consists of a print spooler and scheduler, a filter system that converts the print data to a format that the printer will understand, and a backend system that sends this data to the print device...CUPS consists of a print spooler and scheduler, a filter system that converts the print data to a format that the printer will understand, and a backend system that sends this data to the print device. In order to perform administrative tasks via the web interface, a user must either have the root account enabled on the server, or authenticate as a user in the lpadmin group.
  • https://eng.libretexts.org/Bookshelves/Computer_Science/Operating_Systems/Linux_-_The_Penguin_Marches_On_(McClanahan)/06%3A_Kernel_Module_Management/1.01%3A_Examine_the_Linux_Kernel
    Memory is divided into 2 spaces, known as kernel space and user space, sometimes referred to as kernel and user mode.The kernel executes in the memory area referred to as kernel space, where it execut...Memory is divided into 2 spaces, known as kernel space and user space, sometimes referred to as kernel and user mode.The kernel executes in the memory area referred to as kernel space, where it executes the various services that it provides. The user services are kept in user address space, and kernel services are kept under kernel address space; thus also reducing the size of kernel and the size of operating system as well.
  • https://eng.libretexts.org/Bookshelves/Computer_Science/Operating_Systems/Linux_-_The_Penguin_Marches_On_(McClanahan)/06%3A_Kernel_Module_Management/3.08%3A_Kernel_Module_Monitoring
    For example, 'lsmod' is the same as 'cat /proc/modules' while 'lspci' is a synonym for 'cat /proc/pci'. By altering files located in this directory you can even read/change kernel parameters (sysctl) ...For example, 'lsmod' is the same as 'cat /proc/modules' while 'lspci' is a synonym for 'cat /proc/pci'. By altering files located in this directory you can even read/change kernel parameters (sysctl) while the system is running. The most distinctive thing about files in this directory is the fact that all of them have a file size of 0, with the exception of kcore, mtrr and self. Options passed to the kernel by the boot loader at boot time, such as mounting the kernel as read-only.
  • https://eng.libretexts.org/Bookshelves/Computer_Science/Operating_Systems/Linux_-_The_Penguin_Marches_On_(McClanahan)/07%3A_Linux_Boot_Process/1.04%3A_Boot_Process
    The typical desktop environment begins with a daemon, called the display manager, that starts a graphic environment which consists of a graphical server that provides a basic underlying graphical stac...The typical desktop environment begins with a daemon, called the display manager, that starts a graphic environment which consists of a graphical server that provides a basic underlying graphical stack and a login manager that provides the ability to enter credentials and select a session.
  • https://eng.libretexts.org/Bookshelves/Computer_Science/Operating_Systems/Linux_-_The_Penguin_Marches_On_(McClanahan)/12%3A_Linux_Systems_Security/2.05%3A_Identity_and_Access_Management
    Identity and access management (IAM), is a framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources. Identity and...Identity and access management (IAM), is a framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources. Identity and access management (IAM) is the organizational process for identifying, authenticating and authorizing individuals or groups of people to have access to applications, systems or networks by associating user rights and restrictions with established identities.

Support Center

How can we help?