Vinod Dev's blog

How to Play DVD in Ubantu


Ubuntu will probably not be able to play most of the DVDs that you own. This isn’t because of an oversight on the part of the Ubuntu developers; it’s simply because most DVDs you might buy are encrypted with a system called CSS (Content Scrambling System). While video-player packages such as totem-gstreamer, totem-xine, xine, mplayer, and vlc can all play unencrypted DVDs, to play CSS-encrypted DVDs, you will have to
actually circumvent the encryption scheme. (Note that in certain countries circumventing CSS is not legal, so here is a good place to stop reading and and phone up your attorney before proceeding.)

How To Take Backup of window system using Linux

Linux works nicely with a number of other computer systems, including Windows. With a few simple
commands, Linux will happily safeguard data in those systems as well.
For now, here's a quick Samba example. Pretend that you have a Windows PC called
speedy on your network. The user has shared the C: drive with the name SPEEDY_C. I can mount
that share on a Linux system running Samba like this:

Undertanding Linux Standard Directories

This Blog explain Linux Standard Directories . All Linux systems provide a standard set of core directories. The following directories are used to hold programs that must run when you are booting your Linux system, configuration files for those programs, libraries used by those programs, temporary files created by running programs, and so on:
* /: As the top-level directory of a Linux system, this directory must exist so that other directories can be located within it.
* /bin: A directory that holds core applications used by a Linux system.
* /dev: A directory that holds special files, known as device nodes, which are used to access any devices that are attached to your Linux system.
* /etc: A directory that holds system configuration information, contains the files that explain the sequence of applications that execute on a Linux system as part of its boot process, and stores configuration files for some of the applications that are executed by a Linux system.

How to Access Entire Desktop Remotely in Linux

There is no doubt that running X applications remotely is useful, but a truly killer feature is the ability to run the entire desktop from a remote computer on your local machine.
To do this, you need to use a feature called the X Display Manager Control Protocol (XDMCP), which is part of X. This protocol allows remote computers to access the GDM/KDM/XDM login program, which then gives access to the remote desktop. If you have a reasonably fast network connection—Ethernet speeds of 10-Mbit or greater are recommended—it is possible for a slow computer to be as responsive as a cutting-edge machine.This is possible because the local box is just a display device, like a television, and all the real work is done on the faster remote machine.

How to Automate your Life in Linux using Cron


One of the great benefits of using computers is that they are ideal candidates for performing the uninteresting jobs humans get tired of doing. Most of us would be bored senseless making database
backups everyday, cleaning out disks, updating report files, and managing system logs. These activities are typically linear, mundane processes that are straightforward enough to require little intervention, which makes them ideal candidates for automation.

One of the most fundamental pieces of the toolbox within all Unix-type operating systems is called cron. This small utility is like an alarm clock. When the alarm goes off, it tells the computer to do whatever you have configured it to do. As an example, if you perform a backup every day, you can get cron to perform this for you at a specific time. Another example is if you need to generate a weekly report about a project—cron can generate this report automatically.

Basic Shell Programming

The most popular Linux shell is bash. This stands for Bourne Again Shell, and is named after one of the original UNIX shell designers. bash has a lighter relative, ash, which lacks some features such as command-line histories, but requires substantially less memory and is therefore found in some Linux distributions and on emergency recovery disks. Clones of the standard UNIX shells, sh (the Bourne shell), csh (the c shell), and ksh (the Korn shell) are also available.

How to Recover Root Password

As Linux geeks, we have a responsibility to set a good example and avoid easy passwords. However, if you have to change your password frequently, there's a chance that you'll forget it.

Syndicate content