Search results
From Linuxintro
- = Can you reach your computer = Find out if you can reach your own computer1 KB (199 words) - 09:01, 11 January 2014
- Cloning a computer means you have one computer and want to copy the complete harddisk to another. This can mean different * You want to have a [[backup]] of your computer. In this case it is enough to copy every file from hard disk A to hard disk5 KB (817 words) - 12:27, 28 March 2015
- Netstat is a [[command]] to show open [[network]] connections on a computer.171 bytes (25 words) - 07:18, 8 September 2010
- * [[controlling a computer]]440 bytes (39 words) - 11:28, 10 January 2013
- ...allows you to issue commands via the keyboard that will be executed by the computer. The theoretical background is very well explained on [http://en.wikipedia. ''Pictured: An ''xterm'' console on a computer named ''tweedleburg1 KB (172 words) - 09:21, 15 December 2014
- * resume your command line session on another computer even if it was disconnected * share your keyboard actions with another person on another computer997 bytes (165 words) - 09:02, 23 April 2014
- ...e computer could have the address mycomputer.dyndns.org. Even if your home computer's IP changed, you would still be able to access it via the public internet. * a daemon ddclient running on your computer3 KB (417 words) - 05:37, 8 January 2012
- ...'' command. When you re-attach them to your computer, you need to tell the computer how the disks belong together (RAID 0 or RAID 1 for example). That is what1 KB (169 words) - 09:42, 22 April 2014
- With Linux, it is possible to log in to a remote computer without having to type a password. You authenticate yourself with your "dig ;Goal: You want to log in using [[ssh]] to a remote computer without being asked for a password.2 KB (280 words) - 17:38, 27 April 2015
- = Virtualize your computer = ...copy of your notebook inside VirtualbOx. We call this to [[virtualize your computer]]. First, you will need a disk dump from your notebook's harddisk. You can2 KB (235 words) - 09:49, 29 May 2014
- Scanners can be used to store a digital copy of images to your computer. To scan under Linux, [[find out your distribution]] and proceed accordingl372 bytes (51 words) - 05:56, 16 June 2012
- ...er server. If successful, it will create a trust relationship between your computer and another so that you can log in without a password.274 bytes (45 words) - 13:54, 21 October 2010
- * Boot the computer into text mode, log in and enter * reboot the computer1 KB (183 words) - 07:13, 29 June 2014
- * [[open a console]] in a browser and [[control a computer via the network]]348 bytes (54 words) - 07:39, 6 April 2012
- ;Reason: When CUPS listens to 127.0.0.1 it does not listen to the computer's public IP address.1 KB (176 words) - 05:48, 3 April 2020
- ...ty]] considerations about physical access. To enable [[autologin]] on your computer, [[find out your distribution]] and proceed accordingly:1 KB (193 words) - 15:36, 1 May 2015
- * Connect your computer via wired network to the DSL modem * Assign your computer the IP 192.168.1.2:1 KB (182 words) - 10:29, 27 July 2012
- ...kspace is used by a Linux installation. To find out free diskspace on your computer, use the [[command]] [[df]].406 bytes (56 words) - 13:58, 9 November 2013
- * [[webex]] - take control of another computer over the internet376 bytes (60 words) - 14:53, 14 November 2013
- * connect the phone via USB cable to the computer282 bytes (49 words) - 06:57, 26 March 2014