Translate

Image of Operating System Concepts
Image of Advanced Programming in the UNIX Environment, Second Edition (Addison-Wesley Professional Computing Series)
Image of XSLT 2.0 and XPath 2.0 Programmer's Reference (Programmer to Programmer)
Image of Modern Operating Systems (3rd Edition)

GRUB2 and Post-MBR Gap

Section 3.2 of the current GRUB2 986431 and 979805 indicate not. In 986431, a Dell PC, the first partition (containing a Dell utility) started at sector 36 (maybe a 4K sector disk?) and in 979805, a refurbished Lenovo laptop, the first partition started at sector 28. The responses to these bug reports by some people was interesting: The best thing to do might be to contact NBWN and let them know that their disk partitioning is incompatible with Fedora The standard here is what the Windows installer does, not what Dell’s inept manufacturing process produces. Have you called Dell tech

Minimum FlexPod Configuration

This post describes a minimalistic FlexPod configuration based on Cisco 3048 switches and Cisco UCS 200 M3 servers.

Boot Linux Without An Initramfs

So you think you always need an initramfs to boot your Linux system. Not true and I will show you how. For example, here is my GRUB2 (/boot/grub2/grub.cfg) configuration file for Fedora 17: menuentry ‘Fedora Linux, no initramfs’ { set root=’hd0,msdos1′ linux /vmlinuz-3.3.4-5.fc17.i686.PAE rootfstype=ext4 root=/dev/sda2 rd.md=0 rd.lvm=0 rd.dm=0 SYSFONT=True KEYTABLE=us rd.luks=0 LANG=en_US.UTF-8 } Note there is no line specifying an initramfs! I was not aware that this was possible until I saw it demonstrated by Harald Hoyer. By the way, in case you were wondering, yes I manually edit my GRUB2 configuration file rather than using the numerous crazy GRUB2

Kerberos 5 Implementations

Kerberos is a client-server network authentication protocol which works on the basis of tickets to enable nodes communicating over a non-secure network to mutually prove their identity to one another in a secure manner. There are a number of free implementations of Kerberos 5. These include: MIT Kerberos (The original) Heimdal GNU Shishi Both Microsoft Windows and Sun’s Java come with implementations of Kerberos. See RFC 4120 for full details of the Kerberos v5 Network Authentication Service.

Custom Arithmetic Functions in Korn Shell 93

In modern versions of Korn Shell 93, arithmetic functions can be defined using the following shell function syntax: function .sh.math.fuctname x y z { … } where name is the function name invoked within the arithmetic syntax ((…)) and x, y and z are long double arguments passed to fuctname as name references. x, y and z are used for functions with one, two and three arguments respectively. The return value of the function is the value of the long double .sh.value variable when the function returns. Here is a simple example to try: #!/bin/ksh function .sh.math.mymath x { ((