Letters to the Editor
The correct price for the Happy Hacking Keyboard at the time of the article was $159, not $189. Today I cut the price again from $159 to $139 as a standard price. Please let your readers know.
—Ted Abe, PFU America, Inc. firstname.lastname@example.org
In the November 1998 “Best of Technical Support”, weird things have been happening to Eric Benoit's system. su misbehaves, as do man and less. Scott Maxwell thinks it may be terminal options, but the answer lies with /dev/tty. My bet is that somehow, something has changed the permissions on it and it is no longer readable. Just type:
chmod u+rw /dev/tty
and all will be well. You should probably make sure it is writable while you are at it.
I guess most programs that decide to access /dev/tty to talk to a real user never consider the possibility that they do not have permission to do so.
In general, processes inherit an open file handle to /dev/tty from their parent as stdin, stdout and stderr. The process that opens them in the first place is login which is running as root, so it has no problems. Either that or the top-level program opens a particular real or virtual terminal using a device name which will have the permission bits set differently.
—Adrian Pronk email@example.com
I have been a subscriber for about one year and I really like the articles. I am happy to see that Linux is stealing the spotlight from Microsoft.
I first got into Linux in 1996 after working with the HP-UX workstation on a job and realizing that you can connect to the Net with any OS, not just Macintosh, Windows 95 or Windows 3.x.
Red Hat is a good distribution and I have been running 5.0 for a year without any problems. I plan to get 5.2 soon.
For all you newbies, I recommend Linux for Dummies, UNIX for Dummies and Teach Yourself Linux in 24 Hours. These books include the operating system and some applications. I would recommend Red Hat to anyone.
—Fred Nance firstname.lastname@example.org
Regarding December's “Best of Technical Support”, “VFS Error Messages”: another reason for the failure to mount the root partition during boot is that the root file system was compiled as a module when the kernel was built, rather than compiled into the kernel itself. When the root file system is first mounted during the boot process, no modules are loaded, and modules cannot be loaded until the root file system is mounted. If the file system driver is a module, then the kernel cannot mount it—so it panics.
—Rob Singleton email@example.com
As a system integration tool, Linux has allowed us to prepare custom network file servers which can do the following:
Provide complete web-server services (Apache).
Provide Internet connectivity for many users on the local LAN (IP-Masquerade).
Provide file and printer services for Windows/DOS users (Samba).
Provide file and printer services for Netware users (MARS_NWE, NCPFS).
Provide complete internal/external e-mail services (Sendmail).
Provide inexpensive terminals in both graphical and text-based platforms with the X Window System which can be connected in a variety of ways (Ethernet, serial, etc.).
Provide complete point-to-point protocol (PPP) implementation for routing and other remote-oriented operations.
Provide a fully scalable system that can grow with the company.
All of the above have been thoroughly tested and implemented. We could not be happier with the performance and continued development of this OS.
—Larry Rivera firstname.lastname@example.org
In the review of Learning the Bash Shell, Second Edition (December 1998), Bob van der Poel points out that the book examples available by FTP are from the first edition and that the correct ones might be available by the time the review was printed. That should now be true, as I asked the publisher to correct this mistake in October.
—Cameron Newham, Author email@example.com
- The Tiny Internet Project, Part I
- Machine Learning with Python
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- Free Today: September Issue of Linux Journal (Retail value: $5.99)
- Bitcoin on Amazon! Sort of...
- Securing the Programmer
- Epiq Solutions' Sidekiq M.2
- Android Browser Security--What You Haven't Been Told
- The Many Paths to a Solution
Pick up any e-commerce web or mobile app today, and you’ll be holding a mashup of interconnected applications and services from a variety of different providers. For instance, when you connect to Amazon’s e-commerce app, cookies, tags and pixels that are monitored by solutions like Exact Target, BazaarVoice, Bing, Shopzilla, Liveramp and Google Tag Manager track every action you take. You’re presented with special offers and coupons based on your viewing and buying patterns. If you find something you want for your birthday, a third party manages your wish list, which you can share through multiple social- media outlets or email to a friend. When you select something to buy, you find yourself presented with similar items as kind suggestions. And when you finally check out, you’re offered the ability to pay with promo codes, gifts cards, PayPal or a variety of credit cards.Get the Guide