Jump to content
xisto Community

yordan

Administrators
  • Content Count

    4,991
  • Joined

  • Last visited

  • Days Won

    21

Posts posted by yordan


  1. Ubuntu uses one additional partition as swap area. Make sure you have a small, spearate partition for it (about 250mb),

    Nice point, and nicely said.Nevertheless, keep in mind that the swap partition is not necessarily "small", and I would say that 250 Megs is definitively too small.
    One very simple rule for the swap file size, is that the swap area is about twice and a half the main memory.
    So, if your hardware has 2 gigs memory, the swap space should be about 5 gigs.
    You feel this far too much? Simply have a look at your current paging space on your Crosoft Windows. Usually you don't choose this size, but it's often 7 gigs if you have 3 gigs main memory.
    If you do not have enough main memory on a Linux system, everything slows down because you start using the swap space. And what happens if your swap space is full? The Linux system simply crashes! That's the reason of the two-and-a-half rule. Of course, you can monitor that, and shrink it if you measure that it's too large, but usually it's not!

  2. When you start learning Unix for professional purposes or at the University, you learn "vi".vi is probably the worst text file editor you could imagine, but it's the one all Unix manufacturers accepted to be included for free in each Unix distro, so each of us has to learn how to use it.By the way, exactly as Crosoft Word, vi has very few things you really need to know.You only need how to delete a character, add a character, insert a character, and save your text. It can do far more than that, but most of people can survive with only that.


  3. When you buy a commercial version of Linux, or when you buy Microsoft Windows, included is a license for commercial disk or other devices drivers. When you obtain a free version of Linux, you pay no license fees for commercial drivers, that's why these drivers are not included inside the free distro.Some manufacturers start adding free drivers for Linux, hoping that they will sell more devices, let's hope that this way of thinking will keep growing.


  4. easy step by step guide
    How to burn Hard Drive:

    1. Get Gasoline
    2. Get Lighter
    3. Pour Gasoline on Hard Drive
    4. Light it with Lighter
    5. Hard Drive Burned

    OK, you can laugh, this is poorly said, but it's a problem a lot of people among us really have.
    Each of the tools I use is on a bootable CD/DVD, saved as an iso file.
    Each time I want to use such a tool, I must first burn this iso file to a rewritable CD, then boot on that CD and do my job.
    The next job needs another bootable CD, so another iso file, so erase my rewritable media and burn the other iso.
    Things could be far simpler if I could boot on a removable media, which would lead me to a menu where I could choose between several iso files, and then boot from that iso file as if it were a bootable CD on my CD reader.
    There are several methods for creating a bootable USB drive from an iso file, but this is not the iso file directly used, this is a bootloader loading files extracted from an iso. Which means one iso, one USB drive.

  5. I think another great option would be to purchase a new hard drive :)

    First purchase an external USB drive.
    Backup all your personal files on the external drive.
    Then purchase a brand new internal drive. Get each driver you will need, and add these drivers on the external disk.
    Then replace the faulty drive by the new one. Proceed to a fresh install, creating a partition for the operating system.
    And then leave all your files on the external drives, get the necessary ones only each time you really need them. :D

  6. Sorry, maybe I have not been clear enough.
    The completely ignorant user knows how to use a web browser.
    You provide this user a link, like for instance http://forums.xisto.com/no_longer_exists/ , he clicks on that link and he is on the remote computer.
    The smart job you have to do is to be sure that this standard user is not able to destrou pecious files.
    For instance, as a root admin user, you create "my_very_important_text.txt", and then you connect as this standard user and you check that he is not able to destroy that file.
    Then, you can give this user full access to the remote computer, he only has his own password so he cannot do anything dangerous.
    And installing and using vnc, under Windows or under Linux, is a very simple task: you click "install" and you click "accept" each time you are propmted to.
    The only complicated parts are in our own mind, when I try to explain what security features and inter-computer communication links are involved. A standard user has only "click here", that's all.
    Sometimes it's slightly easier in windows than in Linux, because on Windows there is only one possible user, and on Linux there are may users. That's why under Windows you simply click "second_computer", and for Linux you click "remote_computer:1" or "remote_computer:2", depending if you want to connect as remote user 1 or remote user 2.


  7. And it has to be a cross-platform compiler, it has to work for intel or amd platforms, if intended for PC, which is also a very complicated thing. And, of course, ne debug mode would be possible, because you cannot execute it on the remote system, and you don't have the debugger on the final system.


  8. +1

    science has always been around us,

    Moreover, I would say that science has always been inside us. We see how the world behaves around us, and we create a model in order to understand how it behaves and how we can act over it.If the method is didactical, if we can share this model with our pairs, if we can reproduce the events and can remain predictive, this can be named science.
    If we act in a secret way without being able to explain why it behaves that way, it should be named magics.
    If we really master it, it's a power.
    And, unfortunately, as each time human beings and power are concerned, we can face power abuse.
    The guy who abuses his power is a bad guy.
    The power is not bad.
    And the power is not his master.
    Each bad guy is his own master, if he decides to be bad, he is the only responsible, science or magic or religion can be told being responsible of his acts.
    If I do something stupid in the name of science, science is not responsible for what I did, I am the only responsible. <_<

  9. you are the user exactly as if you were on the keyboard.What I do is the following :I physically go on the remote machine, and I create a standard user, preferably a "rksh" (restricted shell) user.I check that this user has permissions enough for doing his job (let's say administrating the webserver files).I check that this user does not have system permissions (he does not know the root password)This user starts vncserver.This user sets the vnc remote access password by means of typing "vncpasswd", you are prompted for the remote access password, keep this password secret. This remote access password should not be the user password, don't make things too simple. :Dvncserver tells something like "you can connect IP XXX.yyy.zzz:h" (h is the terminal ID, usually 1 for the first user, 2 for the second one, etc...)At this time your remove the keyboard and mouse and you go to your main compute.You start vnc, which asks you the remote system idi, you enter XXX.yyy.zzz:h You also enter the remote access password and you are on the remote system, exactly if you were on your own system. You can even click "full screen" and you even don't know that you are on a remote system. Simply you cannot alt-ctrl-del, you have to click "send ctrl-altdel" !


  10. What do you mean a "web based" c compiler?Do you mean that you open a web browser link on a remote system, you type your c source inside the window and you compile it ? And it generates the binary file for your computer, or for your smartphone, or your car or your washing machine?


  11. vnc is the solution.There is a vnc version for each Linux distro, some of them are directly installed when you install the OS and are somewhere on the administrator/user desktop.You start the vnc server on your remote system in the other room.Then you go to your favorite machine and you start vnc client, asking to access the remote system. And - TADAA - you are on the remote system, your friend on the remote system sees the mouse moving on the screen. At that moment you can remove the keyboard, mouse, display on the remote system; you use the keyboard/mouse on the vnc client system.


  12. OK, I was wrong on several points, so I have to change my mind consequently.

    I thought that you already have a system already working, and you installed that system by yourself.

    In that case, you should be able to install the operating system on the second machine, exactly the same way.

    The "dual attachment" thing is what you name external disk. If an external disk is connected to a computer, this is a single attachment. If the disk is connected to two computers, this is a dual-attachment organization.

    Concerning the clustering system, this is a concept where a standby machine automatically replaces the production server in case of crash. This is usually done in order to have a website or another application continue working in case of hardware failure of one component, each vital component (like a computer) is duplicated so that in case of loss of a component the other part automatically takes it's place.

    Rather few people are able to master this kind of threefold architecture, but it's explained in rather simple terms in wikipedia, see here :

    https://en.wikipedia.org/wiki/Computer_cluster

    Mostly pay attention to the Linux-HA project.

    "High-availability clusters" (also known as failover clusters, or HA clusters) improve the availability of the cluster approach. They operate by having redundant nodes, which are then used to provide service when system components fail. HA cluster implementations attempt to use redundancy of cluster components to eliminate single points of failure. There are commercial implementations of High-Availability clusters for many operating systems. The Linux-HA project is one commonly used free software HA package for the Linux operating system.

    I think the Linux-Ha project would be the most interesting one in your case, because I guess that you don't want to pay an expensive licence for another commercial very professional environment. However you will have to learn how to implement a Linux-HA cluster. Such is life : if you don't have a lot of money in order to by professional implementation services from a Unix security expert, you will have to do it yourself and spend a lot of time learning.

    What I would suggest is starting simple : take two virtual machines on your computer, install the operation system, add a third disk accessed by both virtual machines, create a filesystem on the first machine, switch the disk to the second machine and access the filesystem, then install the clustering environment, configure the resources, and test the failover.

    What I love when working with virtual machines, is that you add virtual hardware as long as you needed. No problem for having three Ethernet adapters and two separated network, no problem having shared disks with dual access. You can easily add a virtual Ethernet adapter if needed, or destroy an adapter in order to see if you really need it. And at any moment you can backup both machines, then destroy everything in order to test something different, it costs nothing except time. And once you were repeatedly able to create/install/configure the two systems, you can switch to physical systems.


  13. You can start with a minimum work to be done everyday, and then you can manage to make it automated.First of all, each computer is alone on the network.So, both computers can have the same network name. Clients browsers will not be able to detect if things are on the first or on the second computer.Secondly, the applications have te be installed in the same folder names (let's say on d:/myservice/mywebheme for instance).Then you need, before going to bed, to do the following :backup your current computer on a USB flashdisk, including the database backup.poweroff your "day" computer.Poweron your "night" computer.Restore the database backups, restore the files backup.start your webapps.Learn how to do that manually first.Then try to automatize the backup/restore thing.Then you can use a third computer as a fileserver for the backup as well as for the restore.When everything works fine, create the full startup automated marvellous script which does the same job.Of course, another better way of doing that is learning how Linux cluster work.Then put all your data on a shared external disk.And then everything will be easy, very automated because the cluster facilities will be used inside the crontab files, and you will have nothing to do personally.This should work with any, old or new, computers, provided that you learn how to install and use cluster services and provided that you learn how to install an dual-attachment disk.


  14. in some computers only we can convert these games

     

    its done by using 'LC ISO'CREATOR YOU CAN DOWNLOAD IT FROM www.softpeadia.com

     

    after downloading enter a PS2 game CD and lc iso creator will automatically regonize it.

     

    then create iso for that game after completing take that iso file and click autoplay and then you can play it.

     

    seems that LC ISO CREATOR is simply an iso creator : it creates an iso file from the CD.

    It does not have a PS2 console emulator in order to autoplay the PS2 game. So the autoplay will not work, except if you already installed a PS2 emulator and associated it with the .iso type?

    In that case, could you please tell us which emulator you use and how did you install it and configure it in order to make it work directly from an iso file?


  15. when scientists start talking about things they don't know or can't even check, it's some kind of a religion for me

    That should never occur.
    A scientist always has to talk about things he is able to demonstrate.
    Demonstrating, proving, is the basis of modern science.
    Of course, maybe you or I cannot easily understand what the scientist is talking about.
    But he has to talk about something that someone else is able to understand. Most of the times, the same scientist is forced to teach what he knows, in order to propagate the scientific knowledge.
    Moreover, the scientist has to give real facts.
    "If you push that button, a light will appear". This has to be true, and anybody should be able to push such a button and see the light appearing.
    Maybe the explanation why this light appears could be too complicated, not understandable by some people, but the fact remains, the light appears.
    And probably, when I will be wise enough, I will be able to demonstrate that the prior explanation was false, my explanation will be closer to the realty, but the fact remains, when I push that button the light appears. That is the fact that can be verified, and scientist have to explain it.
×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.