Once upon a time CPU power was low. In those days, what we have today, was termed to be Super Computers.
Thanks to tough competition and great engineering, we now have CPU in the range of Gigahertz and multiple cores. But on Destkops/Laptops, do we really have applications that utilize the ability of these processors ?
So I thought about making these powerful CPUs to do some work.
There are different views about Backups.
[Read More]
Backups && Recovery
Backups
Most of the users using computers have a very high dependency on it. Day-by- Day, our data is getting digitized. Everything is getting into electronic formats ( Movies/Pictures/Music et cetera). If you are one, you know how important it is to have a backup.
Lately, I haven’t been using Microsoft Windows on a daily basis. So I’ll comment on Linux here.
The definition of Backup can be different. People like backing-up only the Important data.
[Read More]
Operation Modes in a [Linux] Distribution
IMO, Linux Distributors should seriously think about Role Based Operations for their distributions.
Every linux user is going to be using his copy of the distribution in a different way. But from the distributor’s point of view, it should boil down to:
Desktop Users
Laptop Users
Server Users
Currently, some of the distributions apply this thought only to packages. For example, Ubuntu rolls out a desktop flavor and a server (generic) flavor of its kernel package.
[Read More]
Linux OOM
I’ve been working on a bug recently related to udev which under certain circumstances triggers an OOM on the Linux kernel. On another bug, I also wanted to look for the max open processes for a single file. The results I found and pretty good. The Linux Kernel’s OOM feature has imporved a lot.
This is the one liner used to trigger the OOM.
while true; do tail -f /tmp/test.txt & x=expr $x + 1; echo $x; done
[Read More]
Linux SCSI Persistent Device Detection
Many of us might be aware of the block level encryption features (LUKS for example) provided in Linux.
Most of the articles that I referred to over the internet mention the usage of the traditional scsi block device when creating it as an ecrypted device. Eg. sudo cryptsetup luksFormat /dev/sdb1
This actually poses a problem. The problem is with the way Linux detects SCSI devices. While many distributions have shifted to using ID/LABEL based access to devices, users still use the old traditional way of using a device.
[Read More]
Linux Power Management
I must admit, Linux Power Management is Fuckin’ Pathetic.
On a Dell XPS M1210 Laptop with a 6 Cell battery, I get a shitty 15 mins of power backup compared to 2 hrs on Microsoft Windows XP.
And woo, On my IBM T43 running Microsoft Windows XP, I watched a full movie on battery, and it still survived.
The Linux running laptop had no sound enabled.
Yes, Yes Yes!!! As many would say
[Read More]
ANSI Color Codes
So in the search of finding a simple solution for printing colored text in python, it took me some time to dig up. Most solutions people have done were using curses or some modules. My ultimate intention has always been to cut down on the dependency on the 3rd party modules.
I think the ANSI Color Codes would be good enough for my requirements to print colored text on an ANSI compliant terminal.
[Read More]
Data Synchronization in KDE
Synchronization is one of the common problems I face with my multiple machines. This article is about how KDE help me in keeping my data synchronized across machines without any problem.
ctime, atime and mtime
ctime, atime and mtime
It is important to distinguish between a file or directory ’s change time (ctime), access time (atime), and modify time (mtime).
ctime -- In UNIX, it is not possible to tell the actual creation time of a file. The ctime–change time–is the time when changes were made to the file or directory ’s inode (owner, permissions, etc.). It is needed by the dump command to determine if the file needs to be backed up.
[Read More]
Secure P2P Sharing
First,
DISCLAIMER: I ’m not a guru, I’m just a learner. So there might be a chance that the whole article might be fundamentally wrong.
I thought of this because I use P2P network a lot.
On my laptop, which is the repository of everything I have, it is necessary for me to make sure that it is secure enough.
To firewall it I use the single rule from iptables:
[Read More]