What is a command for display all environment variables in Linux?
It depends on which shell program you are using. The 'set' command may be used in some shells, and the 'env' command may also be used. Just be aware that some of the commands will only show you variables that have been exported to the environment, whereas other commands will show all variables in the environment, whether they were exported or not.
A "pipe" is where output is redirected to another program. It exists in Windows as well as Unix (although you don't see much of it in Windows usage).
The character used in piping is the pipe character ('|').
For example, you wanted to create a MD5 hash of the message "Hello World!" you'd do echo "Hello World!" | md5sum. The echo command will output "Hello World" to standard output (also called stdout), and the pipe will redirect that to the md5sum utility, which will calculate the MD5 hash from the output as input.
Yes. Many Linux distributions were created that target PowerPC Macs (Yellow Dog Linux especially; Ubuntu, Debian, and Fedora also have ports). Any modern distro for PCs can also be used on an Intel Mac. Debian has / had a version for 68k Macs as well, but this is no longer well-maintained, and many programs lag behind the other ports in their versions.
Software such as Virtual Box allow you to create a virtual Linux computer on your Mac. (See links below)
Is Linux web hosting compatible with windows?
Yes. A new Linux server will happily found this article you assemble together with your glass windows computer's desktop to the globe. Only avoid front page, or OR language or Database SQL server and you will possibly be very good. You will not employ those ideas by mistake: will not be anxious. For more on POwer Up Hosting
How would you allow the users onto your SSH server and no one else?
It depends on what specific ssh server software you're using, but generally there's a configuration file where you can specify users that are allowed to use ssh.
For example, with OpenSSH, the file is probably /etc/ssh/sshd_config, and the line you would want in that file would be
AllowUsers Archie
Hmm... Slitaz is a minimalist Linux distro if I'm not mistaken. If you have your distribution media you should be able to at least recreate your /var directory structure.
If the /var directory structure is re-created, it shouldn't be too difficult to get most everything else working.
How do you record your desktop in KDE?
There are several applications available for recording your desktop (screencasting) in Linux. The most popular method is recordmydesktop, with both KDE and GTK frontends. Some other, less popular applications for this purpose include XVidCap (useful because you can select a specific area and size to record) and VLC. KDE 4 includes an application for recording the desktop built-in, although the output file isn't very compatible with most media players and will need to be converted.
Describe how is Samba's handling of users differs from that of NFS?
NFS directory hierarchies are mounted by root and NFS maps users on the client to usres on the server. A Samba share is mounted by a nonroot user an all accesses to that share occurs as in that user's name.
Why should one try Linux mint?
Most new users of open source try several distributions (distos) before settling on one main operating system. Linux Mint is simply one of many that it is recommended a new user try out.
It depends on the shell interpreter you are using, but in general the I/O redirection operators are >, >>, |.
What file on a Linux system hold sinformation about host names?
/etc/hosts
Only root can change it, users can view it
What is the Linux boot process?
The Linux boot process can be divided into six steps which are as follows: # Kernel loader loading, setup, and execution: In this step, the bootsect.s file is loaded into the memory by the BIOS. When the bootsect.s file sets up, it loads the rest of the kernel into the memory. # Parameter setup and switch to 32-bit mode: When the kernel has been loaded, the boot.s file sets up a temporary IDT and GDT and handles the switch to 32-bit mode. # Kernel decompression: The head.s file decompresses the kernel. # Kernel setup: After the kernel is decompressed, the real GDT and IDT are created by the head.s (second file). # Kernel and memory initialization (main.c): In this step, the kernel sets up all memory constraints and virtual memory is completely set up. # Init process creation (main.c): In the final step of booting, the init process is created, which switches a Linux computer to different run levels. Ref: http://www.ucertify.com/article/what-are-the-various-steps-of-the-linux-boot-process.html
What are the common issues discussed about the windows Linux and mac operating systems?
Windows is often considered buggy, and the registry system is inefficient and dangerous. Linux is stable and nearly bug-free, but often requires more knowledge to operate than the other two. Mac OS X has very few problems, but Apple ignores it's security because "mac's don't get viruses".
What commands will list the files in the working directory in their reverse alphabetical order?
ls | sort -r
Use ls command to list all files, in the present directory. Then pipe '|' the output of the ls command to sort -r. The -r option will reverse the sort.
A Linux Distribution (distro) is lika a flavour.
For example:
You can go to a dairy bar and ask for ice cream, but you need to specify which kind of ice cream. Chocolate ice cream, strawberry, bubble gum, etc...
You can run Linux, but you need to pick a specific type of Linux such as Ubuntu, OpenSuse, Fedora Core, Gentoo, Debian, Slackware, etc..
Different distros are generally suited for different things.
There are desktop distros like Ubuntu and Mint, that are focused on end users and doing your day to day stuff like browsing the internet, writing a report for work or school or MSNing your friends.
Some Linux distros are meant for running servers. These would be things like RedHat, Debian and Slackware. These will run your company website or an email server.
What command in Linux do you use to return to the root directory?
What is the main goal of Linux?
The initial main goal of Linux (as a kernel) was as a hobby and for fun. Even today as a kernel and operating system family, it still predominantly targets hobbyists and enthusiasts in the consumer sector while in the enterprise industry it's gained a major following for being one of the most reliable Unix-like operating system families.
Unlike Microsoft Windows, you don't need a license to download, use, copy or give away Linux or the many distributions associated with it. Linux is actually the kernel (the heart) from which many distributions of open source operating systems radiate outwards. Ubuntu, Linux Mint, are just two of many popular operating systems that are entirely free.
Icon is not an abbreviation or initialism. An icon, in the historical sense, was an object used to represent something else, usually a god or spirit. In today's usage, an icon is a representation of a program or file in a GUI (graphical user interface).
What is the current standard for Linux file systems?
There is no official standard, but currently most Linux distributions use either ext3 or ext4. Btrfs is looking to be the next de facto standard filesystem for Linux, but seems to be trapped in a very slow development cycle.
Where can one gain more information about how to use the Linux terminal?
At the command prompt, type 'man [command]' (removing the brackets and substituting the command for which you need information).
What are the drawbacks of FTP?
The only disadvantage there would be is the write and read speed. Most of FTP is based on networking so your network connection would be the most focused part on FTP servers. Otherwise it's the drive and you want an SSD for a file server because it will read faster but not get used as much as writing to the disk.
How do you identify the working directory in Linux?
The command 'pwd' will identify the full path of the present working directory.
Which is more vulnerable to a hacker attack a windows system or a Linux system?
it depends if firewall setup correctly or not , but in general windows is more vulnerable than Linux