Search results

From Linuxintro
  • = Can you reach your computer = Find out if you can reach your own computer
    1 KB (199 words) - 09:01, 11 January 2014
  • Cloning a computer means you have one computer and want to copy the complete harddisk to another. This can mean different * You want to have a [[backup]] of your computer. In this case it is enough to copy every file from hard disk A to hard disk
    5 KB (817 words) - 12:27, 28 March 2015
  • Netstat is a [[command]] to show open [[network]] connections on a computer.
    171 bytes (25 words) - 07:18, 8 September 2010
  • * [[controlling a computer]]
    440 bytes (39 words) - 11:28, 10 January 2013
  • ...allows you to issue commands via the keyboard that will be executed by the computer. The theoretical background is very well explained on [http://en.wikipedia. ''Pictured: An ''xterm'' console on a computer named ''tweedleburg
    1 KB (172 words) - 09:21, 15 December 2014
  • * resume your command line session on another computer even if it was disconnected * share your keyboard actions with another person on another computer
    997 bytes (165 words) - 09:02, 23 April 2014
  • ...e computer could have the address mycomputer.dyndns.org. Even if your home computer's IP changed, you would still be able to access it via the public internet. * a daemon ddclient running on your computer
    3 KB (417 words) - 05:37, 8 January 2012
  • ...'' command. When you re-attach them to your computer, you need to tell the computer how the disks belong together (RAID 0 or RAID 1 for example). That is what
    1 KB (169 words) - 09:42, 22 April 2014
  • With Linux, it is possible to log in to a remote computer without having to type a password. You authenticate yourself with your "dig ;Goal: You want to log in using [[ssh]] to a remote computer without being asked for a password.
    2 KB (280 words) - 17:38, 27 April 2015
  • = Virtualize your computer = ...copy of your notebook inside VirtualbOx. We call this to [[virtualize your computer]]. First, you will need a disk dump from your notebook's harddisk. You can
    2 KB (235 words) - 09:49, 29 May 2014
  • Scanners can be used to store a digital copy of images to your computer. To scan under Linux, [[find out your distribution]] and proceed accordingl
    372 bytes (51 words) - 05:56, 16 June 2012
  • ...er server. If successful, it will create a trust relationship between your computer and another so that you can log in without a password.
    274 bytes (45 words) - 13:54, 21 October 2010
  • * Boot the computer into text mode, log in and enter * reboot the computer
    1 KB (183 words) - 07:13, 29 June 2014
  • * [[open a console]] in a browser and [[control a computer via the network]]
    348 bytes (54 words) - 07:39, 6 April 2012
  • ;Reason: When CUPS listens to 127.0.0.1 it does not listen to the computer's public IP address.
    1 KB (176 words) - 05:48, 3 April 2020
  • ...ty]] considerations about physical access. To enable [[autologin]] on your computer, [[find out your distribution]] and proceed accordingly:
    1 KB (193 words) - 15:36, 1 May 2015
  • * Connect your computer via wired network to the DSL modem * Assign your computer the IP 192.168.1.2:
    1 KB (182 words) - 10:29, 27 July 2012
  • ...kspace is used by a Linux installation. To find out free diskspace on your computer, use the [[command]] [[df]].
    406 bytes (56 words) - 13:58, 9 November 2013
  • * [[webex]] - take control of another computer over the internet
    376 bytes (60 words) - 14:53, 14 November 2013
  • * connect the phone via USB cable to the computer
    282 bytes (49 words) - 06:57, 26 March 2014

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)