answersLogoWhite

0

📱

Linux

A free and open-source family of operating systems first started in 1991 and named after its creator, Linus Torvalds.

2,239 Questions

Where does Tux Paint save images?

I am running Tux Paint on Ubuntu 9.04 Jaunty Jackalope. Tux paint did not ask where to save the image. I could find the saved image in ~/.tuxpaint/saved

What is the relationhip between Linux and the GNU project?

The GNU project develops programs and utilities for an as yet rudimentary operating system known as "GNU." Since the programs are open-source, they have been adapted to work using the Linux kernel as well. Other than using its programs, there is no direct relationship.

Which tool is using to configure network devices in Linux?

1: GNOME Network ManagerThis is the nm-applet tool. It's the default connection method in many distributions (that default to GNOME) and is one of the most well done of all the tools. The nm-applet resides in the GNOME panel and matches the OS X wireless connection tool for simplicity and reliability. This tool is so good I have found it can be run without GNOME running. Say, for example, I am in the Enlightenment window manager. I can open up a terminal window and issue the command nm-applet and connect to a wireless access point that has previously been configured. To that end, I place a menu entry in the E16 menu for nm-applet, and when it is clicked I see nothing (no GUI opens no text flies by) - yet I am connected. Of course, this won't work with a wireless access point you haven't previously connected to. For that, you will have to be in GNOME and set that connection up through the GNOME Network Manger. Works with most encryption schemes. 2: WicdThis is one of my favorite wireless network managers. Wicd can be used in many distributions and many desktop environments/window managers. I have used this tool on nearly every laptop I have had. Like the GNOME Network Manager tool, Wicd can work with both wireless and wired networks and can connect to most encryption schemes. Wicd one-ups GNOME Network Manager by allowing you to add your own encryption scheme. The most useful aspect of Wicd is that it doesn't have the dependencies you will find on the default GNOME or KDE tools which makes this tool much more portable. 3: Wifi-wizIf you use a Debian system, you should take advantage of this tool - regardless of desktop environment. I have one particular laptop that no other wireless connection tool will work on save wifi-wiz. I discovered this tool thanks to the Elive Linux distribution. Wifi-wiz is a python-gtk program and is a front end for iwconfig, iwlist, ifconfig, ifup, and ifdown. One of the unique features of wifi-wiz is that it contains a daemon that will run in the background to check the status of your connection, and if your connection fails a gateway ping, it will check for other networks and connect to one if available. 4: YaST2If you're a SuSE user you know YaST well. YaST is one of those all-in-one tools that handles the bulk of administration for SuSE. Networking is no exception. The YaST2 wireless network is one of the easiest to use for new users because it doesn't bombard them with advanced settings. The more experienced users will be happy to know, however, that they can easily access the advanced settings. 5: getwifiThis is one of the few command-line tools on this list. I include command-line tools because they can often be the only option and they are so flexible. This particular tool is configured via a flat text file where you can configure multiple networks so that when you issue the getwifi command, it will connect to the first available wireless network (listed in the configuration file). This is handy in that you don't have to bother selecting a network. There is no "installation" of the application, you simply mv the getwifi executable file to /usr/bin and then mv the configuration file to /etc/getwifi.con.f (It's called config in the tar file.) 6: Wireless ToolsWireless Tools is the command-line foundation for many of front end tools. The included tools are iwconfig (manipulate wireless connections), iwspy (list wireless information), and iwpriv (manipulate wireless drivers). These tools are best used by advanced users or those wishing to create GUI tools for wireless devices (or other tools that require the use of underlying wireless connections). 7: Wireless AssistantThe wlassistant tool is a KDE wireless tool that makes connecting to a wireless network as simple as any other tool of this nature. Although Wireless Assistant is a KDE application, it is not integrated in the same way that GNOME Network Manager is. Because of this, you actually have to start this application when you want to make a connection. What this application is missing is the ability to minimize to the Notification Area. But this is not such a bad issue, because you can quit the application and your connection will remain up. 8: wifi-radarThis wireless tool is a unique application that has packages for Debian, Gentoo, OpenSuSE, and Ubuntu. It's a Python-PyGTK2 application that is unique, in that you can drag and drop your configured networks into order of importance for connection. One oddity with wifi-radar is that you do need to run it using sudo. Even though the application will install under Fedora, it will not run unless sudo is used. This makes wifi-radar an obvious choice for Ubuntu or any other distribution that depends upon sudo. 9: GTKWifiGTKWifi is a simple applet for GNOME written in Python/GTK that is similar to the Zeroconf tool used in Windows XP. GTKWifi shows your current network status and all available access points and allows you to connect to one. GTKWifi doesn't offer much to set it apart, outside of an easy-to-use interface. It is a good alternative if you are using GNOME and GNOME Network Manager can't manage to connect to your access point (on the rare occasion this might happen). 10: WavemonAlthough Wavemon is not a tool that will connect you to a wireless access point, it does give you a ton of information that can help you troubleshoot a wireless connection. Wavemon allows you to see real-time information on signal levels, as well as wireless and wired network information. From the main ncurses screen, you can see interface information such as SSID, Interface name, Noise Level, Signal Level, Signal to Noise Ratio, Frequency, and Sensitivity. If you're serious about wireless networking, this should definitely be in your toolkit.

What is a shell in Linux?

Typically.... Bash. Could also be tcsh, zsh, or pdksh. Or something really weird. Try:

echo $SHELL and see what that gets you. Shell is a software program that allows you to interact and access a computer system. User can enter commands in the shell prompt, which will be executed by the shell. Since the only means of communication through shell is text, it is known as Command-Line-Interfaceor CLI.
A shell is a command interpreter and serves as a user interface to the Linux kernel

What command displays the command list?

In Linux, command typed at a command prompt displays a list of commands that would likely contain the command you desire. For example, to find all of the commands that have word flush in their name or descriptions type the following: man -k flush

Which command is used to see the content of file?

You can get a list of all the files in the current directory with the "ls -a" command.

How do you run Linux?

In a typical desktop distro, a login screen similar to that of Windows should appear. it will have a place for you to enter your username and password. Then you can simply hit"Enter" or press the login button.

For a terminal login, you will see a prompt that looks like:

login:

Here, type your username and hit enter. it will then prompt you for a password. Enter it. Note that your password will not be echoed back to you, so you will not be able tosee how many characters you have entered.

Is Linux a multi-tasking operating system?

Answer:

Yes.

NOTE:

Linux is not only multi-tasking, it is also multi-user. This means two people or two hundred people may be logged into a Linux server simultaneously, each of those logged in users may be running multiple tasks, each may simultaneously have a fully graphical desktop environment, all with a single server. It is not necessary for those users to each have a desktop PC to enjoy their graphical environments with X-Windows and XDMCP, a thin client or X-Windows terminal is sufficient. If desktop PCs are available and are equipped with an X Windows server, their desktop PCs can also function as X-Windows desktops to the Linux server while also running their favorite desktop Operating System (MS Windows, Linux, FreeBSD, OpenBSD, Apple OSX etc.).

What are the differences between Windows and Linux access control lists?

In Windows, files have an owner (usually the creator), but not a group, to which they 'belong'. - and the owner isn't really important in determining access rights. Files either have an explicit list of people and groups or inherit it from a parent directory. These lists specify individual users and groups (in a list) who have access to the directory/file/subdirectories, and the specific rights granted to each item.

In Unix/Linux, each file and directory belongs to a specific user AND group - for example, configuration files may belong to user root and a group set up for administrators (typically called 'wheel'). Instead of having a list of people who can/cannot access the file, you simply specify read, write and execute privileges for the owner and group the file belongs to, and then anyone else.

In Windows, if you have a configuration file, the owner doesn't matter. Instead you set the ACL to include any Administrators you want to access the file, as well as any other users that may need to read it, including the program it configures.

In Linux, you'd perhaps set the same configuration file to belong to the root user, and the group to which the configured program runs in, and everyone to no rights at all - so only root and the program can read it. Or you could set the owner to the user the program runs under and the group that the Administrators belong to, so the program can read it and so that Administrators et.al. can change the file, but keep everyone set to no rights to keep the configuration secure.

They are two different ways of accomplishing security, each with their own configuration peculiarities and performance issues.

What are the options under ls command in Linux?

To see the full list of options for the ls command, type "ls --help".

Some of the more important options are:

* -a - show all files (do not hide files starting with .) * -h - human readable (e.g., show file size as 2K instead of 2048) * -l - long listing format (show much more information about each file) The options can be combined. For example "ls -lha".

[Note: I often need a long listing of all files with the most recently modified file(s) at the end of the listing so I frequently use the command:

ls -latr

to accomplish this task. JHM]

Which shell is used by Linux as the default command interpreter?

There is no "default" shell. Different distros are free to pick whatever shell they want. The most commonly used as the main shell is Bash, but other shells, including the Korn shell, C shell, Friendly Interactive Shell, or Almquist shell are also available. Many distros also use a variant of the Almquist shell provided by BusyBox in their initial ramdisks before switching to the real root and launching the main shell.

In what way is Linux security more secure than Windows security?

* Most Linux operators are more familiar with the inner workings of their systems than most Windows users, so they are usually more capable of setting up their machines securely.

* Many Windows "features" require execute and other priviledges on the machine. This means that, by default, Windows security is set up to be looser. These priviledges can be taken advantage of by people with malicious intentions against users that have not made adequate security adjustements on their machines.

* Most "hackers" want to get the most bang for their effort. Since Windows is used on far more computers than Linux, they focus their efforts on creating hacks or viruses that effect Windows systems.

What is man command?

The man command of the Linux operating system is the system's documentation pager. Each page argument given to man is normally the name of a program, utility or function. For example, to see the reference manual of the grep program: man grep

What switch to the LS command lets you view a list of files and their type?

syntax:

ls -aF

-a option is for hidden files

-F is for directories and executable files

Have a Dell 966 printer Is there a Lexmark cartridge that will work?

The answer seems to be "no" - I bought the Lexmark version of this cartridge, and it doesn't work - the chip on it causes the printer to read "invalid cartridge". Some older versions used an additional slot to differentiate between Dell and Lexmark, but they've now gone down the hardware route and there doesn't seem to be a way around it.

That means you have to order from Dell, and I need to print today. $50 from Office Depot down the drain and no other option. I'm selling this POS printer and buying one from a company that doesn't so blatantly screw its customers.

What is the password to extract files?

The password of the 7zip file archive deoends on the actiual owner of the file. Still if you want to unlock 7zip file password then go for eSoftTools 7z Password Unlocker Tool. It can can restore any type of pasword with any length including non-English and English characters Get full information here: https://www.esofttools.com/7z-password-recovery.html

What is the command to list all files in a directory?

ls (ie lower case LS)

In DOS: dir

If there are many files in the directory, type, "dir/p/o" ...this will stop the listing when the page fills up and list them in alphabetical order... press any key to continue to the next page of listed files.

If you're only interested in the name of the files (not the date/size etc.) you can add /B

What is a superuser in Linux?

The Linux superuser is called "root." There is very little root cannot do. This is why it is a Very Bad Idea to do anything as root unless absolutely necessary. Use sudo instead with commands that need it.

What is the meaning of the logo of Arch Linux?

The swirl used as Debian's logo refers to "magical smoke." When you blow up a computer, the "magical smoke" is released, and the computer no longer works. Debian is meant to be part of the magical smoke that makes your computer work.

Should a Swap partition for Linux 2.4 kernels be at least half the size of the physical RAM?

None. Swap is to be put on the hard disk.

Do NOT mistake secondary storage for "physical RAM." Physical RAM is actually the term used in context of the actual system memory in your computer.

Also, Linux 2.4 is an ancient codebase, obsolete kernel version that isn't even supported by kernel.org anymore. You should be using 2.6.32.61 or later.

Finally, the rule of thumb is 1.5 times the amount of physical RAM. So, if I have 4 GiB of system memory, then I'll make a 6 GiB swap partition.

Which Linux command can you use to display a file in alphabetical order?

Generally the default behavior of the 'ls' command will list them in alpha order.

What is the latest version of Linux Mint?

There is no one "current Linux operating system" due to the fact that Linux is developed and distributed in various forms by many different individuals and corporations. The current version of Linux depends on which of these "distributions" you are interested in installing.

For example, a popular distribution of Linux tailored for use as a Desktop system is Ubuntu (www.ubuntu.com), which is distributed by the company Canonical. The current release of Ubuntu is 8.04, which was released in April this year.

There are literally hundreds of distributions freely available online, but other distributions which are of note in the desktop arena include Fedora (www.fedoraproject.org), openSUSE (www.opensuse.org) and Debian (www.debian.org), each of which have their own advantages and disadvantages. Each distribution has its own release schedule, but you can find out what the current version is (and download it) from the official websites.

Do you need to create a primary partition for every os installed on a dual boot computer?

No. Windows is pretty much the only operating system that cares about primary vs. logical partitions when it comes to booting. Linux will happily live in logical partitions.

That being said, with UEFI becoming that standard, logical vs. primary partitions aren't even going to be concepts anymore, as the GPT scheme doesn't limit partition counts the same way as MBR, allowing hundreds of primary partitions, way more than even highly specialized applications would ever need.

Can you recover a root password in Linux?

No, none of the passwords used in a Linux system can be "recovered" because there isn't a reverse encryption for it.

However, you can "reset" the root password by using the single-user mode at boot time (which puts you in the root account automatically) and then changing at that time.

Who is author of Linux?

Nobody. Code is contributed by and remains the property of the many volunteers and employees of various companies.