Best of Technical Support

Our experts answer your technical questions.
Network config Tools

In Windows NT there is a command-line utility (ipconfig) that lets you see the current ip configuration. Is there a utility in Linux for this? —Skip Bigelow,

Even though there are graphical tools to give the information you've asked (including Red Hat's netcfg command), you can always use /sbin/ifconfig. It will give you detailed information regarding all active interfaces (ethernet, ppp, loopback etc.). —Mario,

Sharing a Cable Modem

I have been browsing many different Linux web sites to look for any FAQ or guide on this topic: How to share a cable modem connection at home between a Linux and a Windows machine, which is where the cable modem installed. I would appreciate it if you would give me some pointers. —Samuel Fung,

I would move the cable modem to the Linux machine and share it with your other computers from there. Why? Because Windows has no provision, off the shelf, to serve as a router, enable security features such as packet filtering, masquerading, forwarding, etc., while Linux does all that quite naturally and quite well. You do not specify the cable modem you have, but I would suggest looking at for documents on networking and connecting network devices to your Linux box. After that, look at the how-to articles on connecting to an ISP. —Felipe Barousse,

Booting without Messages

Is it possible to turn off the kernel boot-up messages? —Nicholas,

The easiest way is to set console=ttyS3,38400n8, or something similar, on the LILO command line to redirect console output to a serial port. —Marc Merlin,

Root Compromise

When I tried to log in to my Linux box this morning, I was surprised to find out that I was no longer able to do this. The login prompt appears as usual, but when I type the user name and press Enter, instead of the password prompt a new login prompt appears. No messages appear except a line that says: /var/hackr0x/login: No such file or directory. This line disappears so quickly that I had to repeat the procedure of typing the user name a couple of times in order to decipher it. —Victor,

Your machine was indeed compromised. At this point you don't want to fix your machine, you just want to get your data off and re-install it. You don't know what's been modified nor how. In cases where you can't log in at all, you can always boot with linux init=/bin/bash at the LILO prompt, and then do: mount -wno remount/mount -a /etc/rc.d/init.d/network start (if you want to back up data over the Net). You can also boot from a rescue floppy or CD. Once you get your machine re-installed, do not just connect it to the Internet again without securing it properly. Make sure you have all the updates installed; do not run any unnecesary dæmons, and firewall the machine if possible. —Marc Merlin,

Every major distribution has an “announce” list for security updates. After you reinstall, get on the list for the distribution you run. Also, remove unused software—it's the cheapest, fastest security precaution you can take. —Don Marti,

Slash Notation for Netmasks

Nowadays I'm working with Linux firewalls, and I'm configuring one in a client organization. I found the following lines in the script that applies the rules of the firewall (IPCHAINS):


What is “/24” in the IP number?

Also can I put two networks in the same variable? For example:


—Fabio Losnak,

The “/24” in the IP number means the network with a netmask of /24 or You probably cannot put two networks in the same variable but that would really depend on the script that is parsing this. —Marc Merlin,

Can't Unlink Files

As root, I cannot get rid of the following files; they should belong to the deb package r-base, but in this case they seem to be some kind of links:

pimento:/home/ottoz# ls -l /usr/lib/R/library/ts/latex/
br-xr-srw-    1 25955    26473    116,  32 mar 20  1987 beavers.tex
br-xrwSr--    1 8301     31084    114,  32 ott 12  2021 sunspot.tex
br-srw-rw-    1 29281    8302     116, 108 set 27  2031 ts.union.tex

I get a message like cannot unlink. operation not permitted —Odoardo Zecca,

You had some file system corruption. chattr -i *.tex should remove the incorrectly set immutable flag and let you delete the files. —Marc Merlin,


White Paper
Linux Management with Red Hat Satellite: Measuring Business Impact and ROI

Linux has become a key foundation for supporting today's rapidly growing IT environments. Linux is being used to deploy business applications and databases, trading on its reputation as a low-cost operating environment. For many IT organizations, Linux is a mainstay for deploying Web servers and has evolved from handling basic file, print, and utility workloads to running mission-critical applications and databases, physically, virtually, and in the cloud. As Linux grows in importance in terms of value to the business, managing Linux environments to high standards of service quality — availability, security, and performance — becomes an essential requirement for business success.

Learn More

Sponsored by Red Hat

White Paper
Private PaaS for the Agile Enterprise

If you already use virtualized infrastructure, you are well on your way to leveraging the power of the cloud. Virtualization offers the promise of limitless resources, but how do you manage that scalability when your DevOps team doesn’t scale? In today’s hypercompetitive markets, fast results can make a difference between leading the pack vs. obsolescence. Organizations need more benefits from cloud computing than just raw resources. They need agility, flexibility, convenience, ROI, and control.

Stackato private Platform-as-a-Service technology from ActiveState extends your private cloud infrastructure by creating a private PaaS to provide on-demand availability, flexibility, control, and ultimately, faster time-to-market for your enterprise.

Learn More

Sponsored by ActiveState