by Ramesh Natarajan
on March 15, 2012
If you’ve purchased a DELL server only with two disks in a RAID-1 configuration, you might want to add more disks later as your space requirement grows.
This article explains how to create a new Virtual Disk in both RAID 0 a d RAID 1 configuration using PERC H700 Integrated BIOS Configuration Utility, based on the new hard disks you just inserted into the DELL servers.
All the new DELL PowerEdge Servers (for example, Dell PowerEdge R610, Dell PowerEdge R710, etc.) comes with PERC H700 utility to manage the server’s hardware RAID controller.
[continue reading…]
by Himanshu Arora
on March 14, 2012
When you need to search for some files, you might typically use find command. find is a good search utility but it is slow.
However locate can search for files very quickly.
Though the locate command works very fast, it still has not out-thrown the find command because it has some limitations.
This article explains everything you need to know about locate command .
[continue reading…]
by Himanshu Arora
on March 12, 2012
This is the 1st article of a new series on the processes in Linux.
The focus of this series would be on the practical aspects of process environment, process control, process relationships etc.
In this article, we will discuss how to get and set environment variables inside a C program.
[continue reading…]
by Himanshu Arora
on March 9, 2012
In the part 1 of the Linux Signals series, we learned about the fundamental concepts behind Linux signals.
Building on the previous part, in this article we will learn about how to catch signals in a process. We will present the practical aspect of signal handling using C program code snippets.
[continue reading…]
by Lakshmanan Ganapathy
on March 7, 2012
This article explains about the tools and commands that can be used to reverse engineer an executable in a Linux environment.
Reverse engineering is the act of figuring out what a software does, to which there is no source code available. Reverse engineering may not give you the exact details of the software. But you can understand fairly well about how a software was implemented.
The reverse engineering involves the following three basic steps:
- Gathering the Info
- Determining Program behavior
- Intercepting the library calls
[continue reading…]
by Himanshu Arora
on March 5, 2012
What is a signal? Signals are software interrupts.
A robust program need to handle signals. This is because signals are a way to deliver asynchronous events to the application.
A user hitting ctrl+c, a process sending a signal to kill another process etc are all such cases where a process needs to do signal handling.
[continue reading…]
by Himanshu Arora
on March 2, 2012
The nm commands provides information on the symbols being used in an object file or executable file.
The default information that the ‘nm’ command provides is :
- Virtual address of the symbol
- A character which depicts the symbol type. If the character is in lower case then the symbol is local but if the character is in upper case then the symbol is external
- Name of the symbol
[continue reading…]
by Ramesh Natarajan
on February 29, 2012
Dig stands for domain information groper.
Using dig command you can query DNS name servers for your DNS lookup related tasks. This article explains 10 examples on how to use dig command.
1. Simple dig Command Usage (Understand dig Output)
When you pass a domain name to the dig command, by default it displays the A record (the ip-address of the site that is queried) as shown below.
[continue reading…]