Search Results

Search found 31410 results on 1257 pages for 'disk based'.

Page 459/1257 | < Previous Page | 455 456 457 458 459 460 461 462 463 464 465 466  | Next Page >

  • Video crashes with 10.10

    - by John Mahon
    I have installed both the 64bit and 32 bit versions of 10.10 on my Compaq Presario PC. I first installed the 64 bit version of the OS.The video often crashed when switching user. It also went haywire occasionally when I visited some web-sites. I read that there may be some problems with the 64 bit OS. So I installed the 32 bit version on another disk. This version seemed even less well behaved. HP's model number for the computer is SR1838NX. The hardware is listed at http://bizsupport1.austin.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c00628274&lang=en&cc=us&contentType=SupportFAQ&prodSeriesId=1841793&prodTypeId=12454&printver=true#A0 I think the important info is that the chip set is "ATI Radeon Xpress 200" and the processor is "Athlon 64 (S) 3700+ 2.2 GHz" Has anyone else had video problems with similar machines? Is there a work around or an update? I have had previous versions of Ubuntu working on this machine and other flavors of Linux as well. Thanks in advance. John

    Read the article

  • Netbook partitioning scheme suggestions

    - by David B
    I got a new Asus EEE PC 1015PEM with 2GB RAM and a 250GB HD. After playing with the netbook edition a little, I would like to install the desktop edition I'm used to. In addition to ubunto partition(s), I would like to have one separate partition for data (documents, music, etc.), so I could try other OSs in the future without losing the data. What partition scheme would you recommend? I usually like to let the installation do it by itself, but when I try to that I can only use the entire disk, so I don't get the desired data partition. I wish there was a way to see the recommended default partitioning scheme, then just tweak it a bit to fit your needs (instead of building one from scratch). So, how would you recommend I partition my HD? Please be specific since I never manually partitioned before. Thanks!

    Read the article

  • Xubuntu, LXDE, USB Booting

    - by Kosciak
    Welcome, My problem appeared today - I was using Xubuntu for a long time, but find out that LXDE should be faster than Xfce, so I installed it. After installing I followed tutorial for removing Xfce, cause disk in my computer is very small and I wanted to release some free space. I used command from this tutorial: How to remove xubuntu-desktop? but instead of remove I entered purge command… and rebooted at the end. And I uninstalled whole my things. The problem is in installing system again - it's old Sony Vaio laptop (PCG-GR250) and I have broken CD-DVD drive. It's possible to boot from USB? I can access recovery mode, will this help me? Please answer fast, because it's my brother computer, and his going to kill me if I won't fix this fast :(

    Read the article

  • Regain Sudo rights after removing from admin group

    - by berkes
    Hello, I accidentally removed myself from the admin group when editing the user. Now I can no longer use sudo. The error says: ber is not in the sudoers file. This incident will be reported. I booted up in rescue mode, but, when going into root prompt, it asks me for the root password. I don't have one, and providing with my own (first and only ubuntu-user) password, it won't allow entrance. My harddisk is encrypted, but only the /home/user part, not the entire disk, afaik. What can I do?

    Read the article

  • How do I avoid the "S to Skip" message on boot?

    - by Marty
    After upgrading my laptop from karmic to lucid, my fat32 partition won't mount automatically. I get the message: The disk drive for /osshare is not ready yet or not present Continue to wait; or Press S to skip mounting or M for manual recovery Funny thing is, if I skip, then /osshare/ is mounted once I log in. I've a similar setup on my desktop, and it works fine. Fstab on desktop: UUID=4663-6853 /osshare vfat utf8,umask=007,gid=46 0 1 /etc/fstab on laptop: UUID=1234-5678 /osshare vfat utf8,auto,rw,user 0 0

    Read the article

  • Problem with dash - there are no programs on the list

    - by sky
    As I said. There are no programs on the dash list (seacher on appmenu). Yesterday I logged into my account and I tried to find some program but there wasn't any! Additionaly, I tried to view installed programs and manually find program which I looked for, but nothing was displayed :( And today, when I want to turn on Ubuntu Software Center, it just don't turn on .< I'm using Ubuntu 11.10 (64bit). I installed "fresh" O.S. few days ago. Ubuntu is updated and has many Gigabytes of disk memory available. Please help me and my unfortunate O.S. Thank you for all answers.

    Read the article

  • "mountall: Disconnected from Plymouth" error in VirtualBox

    - by jonpavelich
    I installed Ubuntu (from the 11.10 Alternate CD, selecting "command-line only" mode before installing) in Virtualbox (Mac OS X Lion host) like I've done numerous times before. Installation finished without any problems, and I rebooted into my new system. Got the splash screen, it loaded, and right where it should've given me a login prompt, I got (in orange) mountall: Disconnected from Plymouth. I can just hit control + alt (option) + F1 to get the login prompt on tty1, and the system acts normally. This happens on every boot. The disk has two partitions, a 250 MB /boot partition and a 99.75 GB encrypted partition. The encrypted partition has LVM on it. One volume group, 3 volumes (swap, / (root filesystem) , and /home. At first I thought the error was from one of the LVM volumes not mounting, but they are all accessible. It isn't a critical error, but it is annoying. Any ideas?

    Read the article

  • How can I get wireless working on an HP-Mini 110-3150?

    - by jfmessier
    I just got an HP Mini 110-3150, and booting from an external hard disk with Ubuntu 10.10 works all fine, except that there is no wireless detected. I noticed that the Wireless indicator is red under Ubuntu, but is enabled under whatever Windows 7 I got on it. So, I understand that it may not get detected at all by Ubuntu at startup time, and there is no manual switch that I can simply slide to turn on/off. How can I get the Wireless device turned ON by default at startup time, and is there any special driver I need to install (proprietary or not) to get it working ? Merci :-) Update: When actually installing on the computer, as a new install, the NIC is not detected at first, but upon restarting, I get a notification of a closed driver available for the wireless. Once installed, updated and restarted, it works fine.

    Read the article

  • How can I create a symlink to the location that Ubuntu 10.10 mounts a CD?

    - by Michael Curran
    In Ubuntu 10.10, when I insert a CD or DVD into my optical drive, the system mounts the CD in a folder called /media/XYZ where XYZ is the disk's label. This has cause problems with Wine, as in order for an application to verify that an application's CD is present, Wine uses a symlinks to point to a mounted CD's folder. In this case, that folder must be /media/XYZ, but when using a different application, the folder would be different. I would like to know if there is a way to create a symlink that will always point to the mounted folder from a given /dev/cdrom* device, or how to force the system to always mount CDs to the same address (i.e. /media/cdrom).

    Read the article

  • Oracle Linux Tips and Tricks: Using SSH

    - by Robert Chase
    Out of all of the utilities available to systems administrators ssh is probably the most useful of them all. Not only does it allow you to log into systems securely, but it can also be used to copy files, tunnel IP traffic and run remote commands on distant servers. It’s truly the Swiss army knife of systems administration. Secure Shell, also known as ssh, was developed in 1995 by Tau Ylonen after the University of Technology in Finland suffered a password sniffing attack. Back then it was common to use tools like rcp, rsh, ftp and telnet to connect to systems and move files across the network. The main problem with these tools is they provide no security and transmitted data in plain text including sensitive login credentials. SSH provides this security by encrypting all traffic transmitted over the wire to protect from password sniffing attacks. One of the more common use cases involving SSH is found when using scp. Secure Copy (scp) transmits data between hosts using SSH and allows you to easily copy all types of files. The syntax for the scp command is: scp /pathlocal/filenamelocal remoteuser@remotehost:/pathremote/filenameremote In the following simple example, I move a file named myfile from the system test1 to the system test2. I am prompted to provide valid user credentials for the remote host before the transfer will proceed.  If I were only using ftp, this information would be unencrypted as it went across the wire.  However, because scp uses SSH, my user credentials and the file and its contents are confidential and remain secure throughout the transfer.  [user1@test1 ~]# scp /home/user1/myfile user1@test2:/home/user1user1@test2's password: myfile                                    100%    0     0.0KB/s   00:00 You can also use ssh to send network traffic and utilize the encryption built into ssh to protect traffic over the wire. This is known as an ssh tunnel. In order to utilize this feature, the server that you intend to connect to (the remote system) must have TCP forwarding enabled within the sshd configuraton. To enable TCP forwarding on the remote system, make sure AllowTCPForwarding is set to yes and enabled in the /etc/ssh/sshd_conf file: AllowTcpForwarding yes Once you have this configured, you can connect to the server and setup a local port which you can direct traffic to that will go over the secure tunnel. The following command will setup a tunnel on port 8989 on your local system. You can then redirect a web browser to use this local port, allowing the traffic to go through the encrypted tunnel to the remote system. It is important to select a local port that is not being used by a service and is not restricted by firewall rules.  In the following example the -D specifies a local dynamic application level port forwarding and the -N specifies not to execute a remote command.   ssh –D 8989 [email protected] -N You can also forward specific ports on both the local and remote host. The following example will setup a port forward on port 8080 and forward it to port 80 on the remote machine. ssh -L 8080:farwebserver.com:80 [email protected] You can even run remote commands via ssh which is quite useful for scripting or remote system administration tasks. The following example shows how to  log in remotely and execute the command ls –la in the home directory of the machine. Because ssh encrypts the traffic, the login credentials and output of the command are completely protected while they travel over the wire. [rchase@test1 ~]$ ssh rchase@test2 'ls -la'rchase@test2's password: total 24drwx------  2 rchase rchase 4096 Sep  6 15:17 .drwxr-xr-x. 3 root   root   4096 Sep  6 15:16 ..-rw-------  1 rchase rchase   12 Sep  6 15:17 .bash_history-rw-r--r--  1 rchase rchase   18 Dec 20  2012 .bash_logout-rw-r--r--  1 rchase rchase  176 Dec 20  2012 .bash_profile-rw-r--r--  1 rchase rchase  124 Dec 20  2012 .bashrc You can execute any command contained in the quotations marks as long as you have permission with the user account that you are using to log in. This can be very powerful and useful for collecting information for reports, remote controlling systems and performing systems administration tasks using shell scripts. To make your shell scripts even more useful and to automate logins you can use ssh keys for running commands remotely and securely without the need to enter a password. You can accomplish this with key based authentication. The first step in setting up key based authentication is to generate a public key for the system that you wish to log in from. In the following example you are generating a ssh key on a test system. In case you are wondering, this key was generated on a test VM that was destroyed after this article. [rchase@test1 .ssh]$ ssh-keygen -t rsaGenerating public/private rsa key pair.Enter file in which to save the key (/home/rchase/.ssh/id_rsa): Enter passphrase (empty for no passphrase): Enter same passphrase again: Your identification has been saved in /home/rchase/.ssh/id_rsa.Your public key has been saved in /home/rchase/.ssh/id_rsa.pub.The key fingerprint is:7a:8e:86:ef:59:70:ef:43:b7:ee:33:03:6e:6f:69:e8 rchase@test1The key's randomart image is:+--[ RSA 2048]----+|                 ||  . .            ||   o .           ||    . o o        ||   o o oS+       ||  +   o.= =      ||   o ..o.+ =     ||    . .+. =      ||     ...Eo       |+-----------------+ Now that you have the key generated on the local system you should to copy it to the target server into a temporary location. The user’s home directory is fine for this. [rchase@test1 .ssh]$ scp id_rsa.pub rchase@test2:/home/rchaserchase@test2's password: id_rsa.pub                  Now that the file has been copied to the server, you need to append it to the authorized_keys file. This should be appended to the end of the file in the event that there are other authorized keys on the system. [rchase@test2 ~]$ cat id_rsa.pub >> .ssh/authorized_keys Once the process is complete you are ready to login. Since you are using key based authentication you are not prompted for a password when logging into the system.   [rchase@test1 ~]$ ssh test2Last login: Fri Sep  6 17:42:02 2013 from test1 This makes it much easier to run remote commands. Here’s an example of the remote command from earlier. With no password it’s almost as if the command ran locally. [rchase@test1 ~]$ ssh test2 'ls -la'total 32drwx------  3 rchase rchase 4096 Sep  6 17:40 .drwxr-xr-x. 3 root   root   4096 Sep  6 15:16 ..-rw-------  1 rchase rchase   12 Sep  6 15:17 .bash_history-rw-r--r--  1 rchase rchase   18 Dec 20  2012 .bash_logout-rw-r--r--  1 rchase rchase  176 Dec 20  2012 .bash_profile-rw-r--r--  1 rchase rchase  124 Dec 20  2012 .bashrc As a security consideration it's important to note the permissions of .ssh and the authorized_keys file.  .ssh should be 700 and authorized_keys should be set to 600.  This prevents unauthorized access to ssh keys from other users on the system.   An even easier way to move keys back and forth is to use ssh-copy-id. Instead of copying the file and appending it manually to the authorized_keys file, ssh-copy-id does both steps at once for you.  Here’s an example of moving the same key using ssh-copy-id.The –i in the example is so that we can specify the path to the id file, which in this case is /home/rchase/.ssh/id_rsa.pub [rchase@test1]$ ssh-copy-id -i /home/rchase/.ssh/id_rsa.pub rchase@test2 One of the last tips that I will cover is the ssh config file. By using the ssh config file you can setup host aliases to make logins to hosts with odd ports or long hostnames much easier and simpler to remember. Here’s an example entry in our .ssh/config file. Host dev1 Hostname somereallylonghostname.somereallylongdomain.com Port 28372 User somereallylongusername12345678 Let’s compare the login process between the two. Which would you want to type and remember? ssh somereallylongusername12345678@ somereallylonghostname.somereallylongdomain.com –p 28372 ssh dev1 I hope you find these tips useful.  There are a number of tools used by system administrators to streamline processes and simplify workflows and whether you are new to Linux or a longtime user, I'm sure you will agree that SSH offers useful features that can be used every day.  Send me your comments and let us know the ways you  use SSH with Linux.  If you have other tools you would like to see covered in a similar post, send in your suggestions.

    Read the article

  • How can I store all my level data in a single file instead of spread out over many files?

    - by Jon
    I am currently generating my level data, and saving to disk to ensure that any modifications done to the level are saved. I am storing "chunks" of 2048x2048 pixels into a file. Whenever the player moves over a section that doesn't have a file associated with the position, a new file is created. This works great, and is very fast. My issue, is that as you are playing the file count gets larger and larger. I'm wondering what are techniques that can be used to alleviate the file count, without taking a performance hit. I am interested in how you would store/seek/update this data in a single file instead of multiple files efficiently.

    Read the article

  • Bootable usb stick not boots

    - by Pavaroti Luciano
    i have problem. My bootable usb stick not boots any linux distribution.. it just stop at BIOS, like before turning on OS, but it does nothing. Windows xp/7/8.1 installs boots perfectly. It stopped booting every linux dist. after windows 8.1 installation. Later i deleted windows 8.1 and installed windows 7, and now i want to install ubuntu from usb, but i cant(From disk every linuxOS boots perfectly but not from usb) My computer now is like ~7years old. Specs: CPU: AMD Athlon 64 X2 5000+ Motherboard: GIGABYTE GA-M56S-S3 Video card: Nvidia n210 EDIT: It boots on my other laptop..its bootable, but from this.. NOpe, only windows installs

    Read the article

  • Discussion of a Distributed Data Storage implementation

    - by fegol
    I want to implement a distributed data storage using a client/server architecture. Each data item will be stored persistently in disk in one of several remote servers. The client uses a library to update and query the data, shielding the client from its actual location. This should allow a client to associate keys (String) to values(byte[]), much as a Map does. The system must ensure that the amount of data stored in each server is approximately the same. The set of servers is known beforehand by other servers and clients. Both the client and the server will be written in Java, using sockets, threads, and files. I open this topic with the objective of discussing the best way to implement this idea, assuming simplicity, what are the issues of this implementation, performance measurements and discussion of the limitations.

    Read the article

  • Will a Wubi install of Ubuntu effect my Windows installation in anyway? [closed]

    - by Oddysee
    Possible Duplicate: What are the benefits of a disk install vs. Wubi? And can I migrate my settings easily? Having never tried a Linux OS before, I want to dabble and take a look at one. Ubuntu seems like a good distro to go with (due to how popular it is) and I want to use Wubi to try it out. I just wanted to know if anything I do while trying out Ubuntu will effect my Windows Installation or the files pertaining to it in anyway? If so, is it potentially Windows breaking?

    Read the article

  • failure to restore backup from deja dup

    - by Layla Kosakov
    I had ubuntu 12.04.1 and I made a backup with deja dup of the home folder in an external hard disk. Today I installed ubuntu 14.4 and erased the ubuntu 12.04.1. Now I'm trying to restore my back up. First it ask where is the back up to restore, then it ask of what date to restore, and then it starts, after a wile ask for the password. I put the password and it says Restoring and stays in preparing with out any advancement. Don't show any error, just stays preparing. The window of details is in white. I had all my documents... it's very bad for me, all my personal data... lost? Thanks for any help, Layla.

    Read the article

  • Wubi 12.04 boot error message

    - by Leandro
    Im having a boot problem with my Wubi 12.04 system. When Ubuntu starts to boot up, a message will appear in my screen and it's something like: T#s..... does not exist Sorry, I couldn't read all the message. Then another message pop-out after Ubuntu loading screen this time the message is this: Gave up waiting for root device. Common problems: -Boot args (cat /proc/cmdline) -check rootdelay= (did the system wait long enough?) -check root= (did the system wait for the right device?) -missing module (cat /proc/module: ls /dev) ALERT! /dev/disk/by/by_uuid/EODC2345DC231576 does not exist. Dropping to a shell

    Read the article

  • Why is the dash so unresponsive, and is there a way to fix this?

    - by Jon
    I just upgraded to 12.04. When I press the super key to open the dash, there's a lag of 1-3 seconds before it displays, with no other programs running. (This is similar, but not identical, to the issue described in Dash application search unresponsive at startup about 11.10.) At login time, this lag is up to 10 seconds, and sometimes the dash doesn't respond at all to the super key. In contrast, the launcher Kupfer immediately responds to its hotkey, in milliseconds, and responds to my typing an application name also in fractions of a second. Is there a way to load the dash in memory or a RAM disk of some sort to make it more responsive?

    Read the article

  • Existing Instance, Shiny New Disks

    - by merrillaldrich
    Migrating an Instance of SQL Server to New Disks I get to do something pretty entertaining this week – migrate SQL instances on a 2008 cluster from one disk array to another! Zut alors! I am so excited I can hardly contain myself, so let’s get started. (Only a DBA could love this stuff, am I right? I know.) Anyway, here’s one method of many to migrate your data. Assumption : this is a host-based migration, which just means I’m using the Windows file system to push the data from one set of SAN disks...(read more)

    Read the article

  • No programs or applications show up in dash

    - by sky
    There are no programs on the dash list (seacher on appmenu). Yesterday I logged into my account and I tried to find a particular program, but there weren't any! Additionally, I tried to view installed programs and manually find programs, but nothing was displayed. And today, when I wanted to turn on Ubuntu Software Center, it just don't turn on. I'm using Ubuntu 11.10 (64bit). I installed this as a "fresh" OS a few days ago. Ubuntu is updated and has many Gigabytes of disk memory available.

    Read the article

  • The /usr/bin/x11 folder

    - by WrecklessT
    Why does the /usr/bin/x11 folder hold another x11 folder and when you open that === x11 you get another x11 and then another and another??? I did it about 6 times and got frustrated so I have no idea how deep this goes but What is the purpose (or is it a glich?)? Is this eating disk space more than it should? (I was going to delete one or more but thought I better ask first before I end up !fucked ) and finally Is it just me and I am going crazy maybe the pills are wearing off or maybe they are kicking in.. I am not sure but an answer would help. I can see no reason why this should be happening at all.

    Read the article

  • Desktop interface crashes after software updates

    - by N.C. Weber
    Recently, after installing Ubuntu software updates on the evening of December 7th, 2012, my desktop interface crashes regularly leaving me with a command line screen with a long string of automated commands showing (I assume what goes on behind the pretty desktop). At first, I thought it was only crashing whenever I played DirectX games in WINE, but now it crashes if I open the native Firefox browser or if it's doing nothing at all but sitting there. Apport attempts to report the bugs after restart, but often they crash as well. I've done a SMART check on the hard drive, and everything report OK. No read errors, no bad sectors. I am using an Acer Extensa 4620Z Memory: 2.0 GiB Processor: Intel Pentium Dual CPU T2370 @ 1.73GHz x 2 GraphicsL: Intel 965GM x86/MMX/SSE2 OS: Ubuntu 12.10 32-bit Disk: 116.0 GB with 33.4 GB Available

    Read the article

  • Install/upgrade ubuntu from another system

    - by Samarth Agarwal
    I have a new Laptop with latest Ubuntu preinstalled on it, its 12.04. I have another laptop with Ubuntu 10.04 on it. What I lack is a fast internet connection. I want to upgrade my Ubuntu 10 laptop to a ubuntu 12 version. How is this possible without using internet connection? Can I move/copy the installation from the new laptop to the older one? Is there a way so that the newer laptop can upgrade the older one using a usb disk or dvd/cd?

    Read the article

  • How to retrieve data from a corrupted volume

    - by explorex
    Hi, My Ubuntu 10.10 just crashed, probably due to hardware error (and in the end I was getting errors like Unknown filesystem ..... grub> .., and it went to the GRUB console before I could take any other action). I reinstalled the same version from a USB stick. I had Ubuntu installed with the ext4 file system and I also have the same filesystem in the same hard disk on a different drive. When I try to access my previous filesystem, I get errors: Error mounting: mount: wrong fs type, bad option, bad superblock on /dev/sda6, missing codepage or helper program, or other error In some cases useful info is found in syslog - try dmesg | tail or so I had some important files in the previous volume ; I don't know how to retrieve them. And what are the chances that I would get the same outcome (hardware error)? Please help me!

    Read the article

  • "Reverse" encryption? - EncFS the other way around?

    - by stwissel
    Currently I'm using EncFS to encrypt my directory "confidential" to ".encconfidential" and sync that encrypted directory using an online service (e.g. Dropbox, UbuntuOne etc). However my entire disk is already LUKS encrypted, so the double encryption takes a toll on performance. I wonder is there an "inverted" EncFS option? An unencrypted directory gets mounted and in the mounted directory you only see encrypted files. So I could work with the unencrypted documents while the sync tool sees and read/writes the encrypted files only.

    Read the article

  • How to Restrict Android App Permissions

    - by Chris Hoffman
    Android forces you to agree to every permission an app wants, assuming you want to use the app. After rooting your device, you can manage permissions on a per-app basis. Restricting permissions allows you to protect your contacts and other private data from apps that demand access you’d rather not allow. Many apps will continue working properly after you revoke the permissions. HTG Explains: What Is RSS and How Can I Benefit From Using It? HTG Explains: Why You Only Have to Wipe a Disk Once to Erase It HTG Explains: Learn How Websites Are Tracking You Online

    Read the article

< Previous Page | 455 456 457 458 459 460 461 462 463 464 465 466  | Next Page >