Best of Technical Support
I am new to Linux, so please don't laugh too loud at my question. I am using a 19-inch monitor, with a Stealth IIIs540 Diamond card. I have gotten Linux up, but I seem to be using the wrong screen resolution. It appears kind of bowed out at the edges. How can I change this? —Virgil Denny, firstname.lastname@example.org
If the text and window size look good to you, but just the edges are curvy, chances are you're running at the right resolution, but have some monitor or display attributes to change. Most monitors have controls at the bottom of the unit that allow you to change the width, height, color, angle, and even the convex and concave curves of your display. Try to use this to correct your problem first. If this doesn't resolve your problem, there is a program called xvidtune that allows you to adjust these qualities as well. If you do decide to play with xvidtune, make sure to click the auto button first. That will allow you to automatically see the changes you're making when you click various buttons. If you have indeed decided your resolution is not right, one of the most user friendly methods to changing your X (and other) configurations is XF86Setup. Get it installed if you don't have it already, you'll be glad you did. —Kara Pritchard, email@example.com
I need two drivers, one for a HP DeskJet 712C printer and one for a Umax Astra 1220P scanner. I do not understand why they are not supported by my distribution; this one is brand-new. Those drivers should be quite easy to install. I could not find them on any site, had no response from the newsgroups and do not know anybody who can help me. —Marc Nadeau, firstname.lastname@example.org
Something commonly confused by new Linux users is the difference between driver behavior in Linux and other operating systems. For your printer, either run control-panel and click on the printer tool, or run printtool directly (from Red Hat). You can then choose the driver for the series closest to yours (e.g., HP DeskJet 6xxC series) and your printer should work fine. To configure your scanner, visit http://www.mostang.com/sane/ . That is the web site for SANE, Scanner Access Now Easy. SANE is a universal scanner interface, and their supported scanners page lists multiple Umax Astra scanners that are supported. —Kara Pritchard, email@example.com
I have set up my Linux machine as a mail server using Sendmail. At this stage, it is just the mail server for the company network. All the other workstations are Windows machines using Outlook Express. I have set up the clients to use the Linux machine as their SMTP and POP3 server. When a user sends mail to another user, the message gets sent fine. Now, instead of the e-mail going to /var/spool/mail/John, for example, the e-mail goes to /var/spool/mail/root. When I read the e-mail in root's mail, it says both the sender and the receiver are named Unknown. I have set up user accounts successfully. How do I get the server to accept mail for each user and to recognize the users? My POP is working, as I am able to use telnet successfully with POP, but I cannot get POP-3 to work properly. When I type telnet localhost pop-3, it says:
Trying 127.0.0.1 Connected to localhost Escape character is ' ^ ] '.
then after about five seconds on its own, it says,
...Connection closed by foreign host...Where does the Linux server store the user's mail? When a user tries to retrieve their mail, nothing is coming through. How do I configure the server to direct the mail to the user's local machine? —Mark Wainman, firstname.lastname@example.org
A user's mail, after it has been received by Sendmail and (most of the time) processed through procmail, is stored in /var/spool/mail/userid where “userid” is the login user name. When retrieving mail with POP, mail is read from that location and transferred to the user's home directory, appending the message to the file mbox. POP actually reads the mail from mbox in the user's home directory. If your user's PCs are on a LAN, you must properly configure your e-mail clients (Outlook Express) to use SMTP for outgoing mails and POP for incoming ones. The user name and password must be correctly set up for remotely logging in to the Linux machine. Maybe it is worth mentioning that you need to have the POP service installed through the IMAP RPM on a Red Hat system. Also, it has to be enabled; that is, the POP-3 lines should not be commented out in /etc/services and /etc/inetd.conf. If this is correctly set, you should be able to retrieve mail from the server from the PCs. For Internet e-mail from the PCs through the server, Sendmail has to be correctly configured as well according to your external connection parameters. I think you may have a setup problem with your domains. The Linux box may not be able to find local users due to incorrect configuration of Sendmail, specifically in relation to localhostname and localdomain. Check the file /etc/sendmail.cw and put in the local domain name, for example “yourcompany.com”, and make sure the Linux machine is named after that, e.g., serverpc.yourcompany.com. —Felipe Barousse, email@example.com
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Death of RoboVM
- BitTorrent Inc.'s Sync
- The Humble Hacker?
- The US Government and Open-Source Software
- Open-Source Project Secretly Funded by CIA
- ACI Worldwide's UP Retail Payments
- New Container Image Standard Promises More Portable Apps
- AdaCore's SPARK Pro
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide