Best of Technical Support
What are the .plan and .project files read by the finger command and what should they contain? —Chris MasonSlackware 2.0.29
In the good old days before the Web, there were no home pages. Instead, if I wanted to find out more about someone, I would “finger” them. The finger command asks the server to display information about a user, including the contents of the user's .plan and .project files. You can put any information you wish in these files: your name, e-mail address, fax and phone numbers or favorite sayings.
Note that many system administrators consider the finger command to be a potential security risk and have turned it off, so don't be surprised if you “finger” someone and receive a message along the lines of “access denied”. Also, many implementations of finger read only the .plan file. —Vince Waldon email@example.com
I have a PC with an Intel Pentium 150. Will Linux run on it? I've heard it runs on a 386 or a 486 but has trouble with certain IBMs—I'm not sure which ones. —Noah Roberts
You should have no problem running Linux on the machine you describe. Early versions of the Linux kernel were unable to support true IBM machines that used the microchannel architecture or MCA (the PS\2 line). That's probably the IBM computer referred to. —Vince Waldon firstname.lastname@example.org
My hard drive spins up and spins down constantly. There is a kernel patch called no_idle on Sunsite [http://sunsite.unc.edu/] to fix this problem, but when I attempt to apply the patch I get a reject file. It seems that the Makefile for the disk drivers has now been created, and as a result, the patch does not apply correctly. I am running 2.0.0. I would like to know if there is something else I could do to stop the spinning. I would appreciate any help. —John BarnitzSlackware 3.1
Most likely you need to find the hdparm package and use it to set the spin down times. I know it can do this for IDE drives. If it's not part of your distribution, you can find it on Sunsite. —Donnie Barnes, Red Hat Software email@example.com
Are there any drivers that provide SCSI support on the motherboard? —Ryan Red Hat 4.1
That depends on the type of SCSI you wish to use. You can check the hardware compatibility lists at http://www.redhat.com/. —Donnie Barnes, Red Hat Software firstname.lastname@example.org
After installing Linux, I noticed I am missing an option available in MS Windows: the US-International keyboard layout. This layout lets anyone with a US keyboard type the special punctuation needed for foreign languages. I live in Puerto Rico, and most, if not all, keyboards sold here are US versions. Since I write mostly in Spanish, I am interested in learning how to make a keymap that emulates Windows' US-International layout. Is there any information about the subject or any already-made keymap file that fits the job? —Carlos M. Fernandez Red Hat 4.1
There may indeed be a keyboard mapping that fits your keyboard. If not, you will have to take one that is close to your desired arrangement and modify it.
You should obtain the kbd package from ftp://sunsite.unc.edu/pub/Linux/system/keyboards/kbd-0.98.tar.gz. It contains tools, documentation and examples that will assist you in your remapping project. It also contains a file called kbd.FAQ, which contains answers to frequently asked questions about the operation of the keyboard under Linux. —Chad Robinson, BRT Technical Services Corporation email@example.com
I have a problem with hackers and one security hole is the command su. I have several users on my system. While I don't want to eliminate the capability of these users to change to other IDs, I do want to eliminate the capability to use su to change to root for all except one or two users. Is this possible? —Are Tysl Slackware 3.1
You may be missing a handy program called sudo, which you can obtain from your nearest Sunsite mirror. This program allows you to configure su actions for each user based on who the user is and what you wish him to be able to access.
If that does not meet your goal, why not fall back to the standard Unix security functions? Create a new group called su. Change the group on /bin/su from bin to su. The permissions are most likely 4755 (-rwsr-xr-x), which means anybody can execute it and the program will execute as root.bin.
You can then change the permissions of /bin/su. Try changing them to 4750 (-rwsr-x---), which allows root or any user in the su group to execute it. Then you can put those users you wish to have su privileges in the su group. —Chad Robinson, BRT Technical Services Corporation firstname.lastname@example.org
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- Profiles and RC Files
- Astronomy for KDE
- Git 2.9 Released
- Maru OS Brings Debian to Your Phone
- Understanding Ceph and Its Place in the Market
- OpenSwitch Finds a New Home
- SoftMaker FreeOffice
- Snappy Moves to New Platforms
- The Giant Zero, Part 0.x
With all the industry talk about the benefits of Linux on Power and all the performance advantages offered by its open architecture, you may be considering a move in that direction. If you are thinking about analytics, big data and cloud computing, you would be right to evaluate Power. The idea of using commodity x86 hardware and replacing it every three years is an outdated cost model. It doesn’t consider the total cost of ownership, and it doesn’t consider the advantage of real processing power, high-availability and multithreading like a demon.
This ebook takes a look at some of the practical applications of the Linux on Power platform and ways you might bring all the performance power of this open architecture to bear for your organization. There are no smoke and mirrors here—just hard, cold, empirical evidence provided by independent sources. I also consider some innovative ways Linux on Power will be used in the future.Get the Guide