Get Solutions

Finding solutions with Technologies

How to Install and Configure WiFi Connection Using WiCD

Compatible with customary *nix networking commands (iwconfig, ifconfig, etc) Once designed, can connect even though the X show doesn't begin Can be managed and designed via the program line exploitation wicd-curses Support for wired networks, also as named profiles to avoid wasting multiple wired configurations. Supports configuring static information processing addresses and DHCP on a per network basis Store totally different static IPs, gateways, subnet masks, DNS server addresses per network Automatically connect at boot – no user intervention...

How to Change the Host name on Linux

There ar times you will return up with a desire for modification in your computer’s identity over network. this is often once you can need to modification the Hostname of your pc. The hostname is just about sort of a label to your pc or the device for identification over the network. The hostname is simply a straightforward name, Associate in Nursing scientific discipline Address or perhaps a site name. To change the hostname in Ubuntu, follow these straightforward steps: 1. determine your existing hostname by coming into this command in terminal: hostname So...

How to Change File Permissions on Linux

Ability to line file permissions for individual users or user-groups is one among the foremost asked for options of UNIX. If you're system admin for a faculty, school or a corporation you're employed for then correct file permission setting is among the foremost very important tasks. The command accustomed modify file permissions is chmod, short for modification mode of a file. you'll conjointly use Nautilus file browser to alter the file permissions. i'll cowl the main points once slightly background on the file permissions. to search out the...

How to install and Configure and Compile a Tar file in Linux

The .tar file format springs from the phrase “tape archive”. Developers usually use this format to compress and distribute their sources. By doing this, they have not worry regarding the platform, thus anyone on any platform will directly compile and install on their computers. This short guide can teach you ways to extract associate tar file, compile so install it on any UNIX distro. After you transfer a .tar file, open Terminal and navigate to the directory wherever the file exists mistreatment ‘cd’ command. Then perform following commands: xvzf...

How to Remove/delete Kerberos Password in Linux

This is a really rare scenario one would possibly face. Suddenly your Linux primarily based pc, VPS or server would possibly prompt you to enter Kerberos arcanum. Same factor happened to ME, I don’t bear in mind if I had set kerberos arcanum within the past. I had solely updated sure packages. This happened after I tried assign new arcanum to Associate in Nursing existing vsftpd user. during this case all I might consider is obtaining obviate Kerberos arcanum to proceed with my work. Kerberos arcanum is network authentication protocol which...

Step by Step for install and Configure Centos on VMware Workstation (Virtual workstation)

Introduction This procedure walks you thru a piecemeal installation of CentOS five.5.  This procedure is performed victimization VMware digital computer seven.1.3 to host the guest software.  Installation of CentOS during this procedure can occur in 5 distinct steps: 1) fitting the virtual drive; 2) partitioning the disk victimization CentOS Disk Druid; 3) playacting a default installation of CentOS five.5; 4) change CentOS; and 5)...