<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://hackepedia.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Frankk</id>
	<title>Hackepedia - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://hackepedia.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Frankk"/>
	<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Special:Contributions/Frankk"/>
	<updated>2026-05-08T16:52:40Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.45.3</generator>
	<entry>
		<id>https://hackepedia.org/index.php?title=Fsck&amp;diff=1926</id>
		<title>Fsck</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Fsck&amp;diff=1926"/>
		<updated>2005-11-20T22:21:48Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The &#039;&#039;&#039;filesystem consistency check and interactive repair&#039;&#039;&#039; program is needed on several [[UBO]] [[filesystem]]s.  When a [[filesystem]] is not properly unmounted before a reboot or halt the filesystem must be checked and any inconsistencies repaired.  This can be a lengthy process and [[FreeBSD]] has a background fsck so that the system can start while it works away at making the filesystem consistent.&lt;br /&gt;
&lt;br /&gt;
If you shut down improperly on Linux and know you will have to answer &amp;quot;yes&amp;quot; many times, you can simply add the -y flag which means say yes to the prompts:&lt;br /&gt;
&lt;br /&gt;
 # fsck -y&lt;br /&gt;
&lt;br /&gt;
If you have a journalling filesystem you don&#039;t need to fsck.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Fsck&amp;diff=550</id>
		<title>Fsck</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Fsck&amp;diff=550"/>
		<updated>2005-11-20T22:21:32Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The &#039;&#039;&#039;filesystem consistency check and interactive repair&#039;&#039;&#039; program is needed on several [[UBO]] [[filesystem]]s.  When a [[filesystem]] is not properly unmounted before a reboot or halt the filesystem must be checked and any inconsistencies repaired.  This can be a lengthy process and [[FreeBSD]] has a background fsck so that the system can start while it works away at making the filesystem consistent.&lt;br /&gt;
&lt;br /&gt;
If you shut down improperly on Linux and know you will have to answer &amp;quot;yes&amp;quot; many times, you can simply add the -y flag which means say yes to the prompts:&lt;br /&gt;
&lt;br /&gt;
 # fsck -y&lt;br /&gt;
&lt;br /&gt;
If you have a journaled filesystem you don&#039;t need to fsck.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Debugging&amp;diff=762</id>
		<title>Debugging</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Debugging&amp;diff=762"/>
		<updated>2005-11-13T02:56:58Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;If you have a program crash and create a .core file, like say Thunderbird crashes on you and you find the .core file:&lt;br /&gt;
 &lt;br /&gt;
 $ gdb thunderbird thunderbird-bin.core&lt;br /&gt;
&lt;br /&gt;
where thunderbird is the application and thunderbird-bin.core is the core file. In this case I got an error:&lt;br /&gt;
&lt;br /&gt;
 &amp;quot;/usr/X11R6/bin/thunderbird&amp;quot;: not in executable format: File format not recognized&lt;br /&gt;
&lt;br /&gt;
as when I looked at this file a little further I found out it is a shell script and not a binary. I did find a -g (debug) mode in this shell script which I used. Most cases it is a binary though, so the most common starting point is &lt;br /&gt;
&lt;br /&gt;
 (gdb) bt&lt;br /&gt;
&lt;br /&gt;
backtrace. This won&#039;t usually too much good unless you have compiled the program with debugging symbols.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== FreeBSD ==&lt;br /&gt;
&lt;br /&gt;
I had a case where Mozilla Thunderbird would core on me as soon as I started it. &lt;br /&gt;
&lt;br /&gt;
  $ ktrace [[variables|thunderbird]]&lt;br /&gt;
&lt;br /&gt;
which created a file called &amp;quot;ktrace.out&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
 $ kdump -f ./ktrace.out &lt;br /&gt;
&lt;br /&gt;
produced a lot of output, so much that I won&#039;t paste it here. These are the system calls that were made. You will most likely want to send that output to the appropriate helplist/bug report for that application.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Debugging&amp;diff=542</id>
		<title>Debugging</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Debugging&amp;diff=542"/>
		<updated>2005-11-13T02:47:28Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== FreeBSD ==&lt;br /&gt;
&lt;br /&gt;
I had a case where Mozilla Thunderbird would core on me as soon as I started it. &lt;br /&gt;
&lt;br /&gt;
  $ ktrace [[variables|thunderbird]]&lt;br /&gt;
&lt;br /&gt;
which created a file called &amp;quot;ktrace.out&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
 $ kdump -f ./ktrace.out &lt;br /&gt;
&lt;br /&gt;
produced a lot of output, so much that I won&#039;t paste it here. These are the system calls that were made. You will most likely want to send that output to the appropriate helplist/bug report for that application.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Linux&amp;diff=713</id>
		<title>Linux</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Linux&amp;diff=713"/>
		<updated>2005-11-13T02:39:14Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Linux is a UNIX-clone.  &lt;br /&gt;
&lt;br /&gt;
It was [http://groups.google.com/group/comp.os.minix/browse_thread/thread/76536d1fb451ac60?hl=en&amp;amp;lr=&amp;amp;ie=UTF-8&amp;amp;safe=off&amp;amp;rnum=9 created by Linus Torvalds] in 1991 as an alternative to [[Minix]].  Since then, many programmers around the world shaped Linux into a modern operating system. Most commonly today found as [http://www.gnu.org/gnu/linux-and-gnu.html GNU/Linux]. &lt;br /&gt;
&lt;br /&gt;
If you want to try Linux without affecting your computer permanently, all you need is to obtain [http://www.knoppix.org/ Knoppix] on a cd. You can either download it from their site and burn it, get a friend to, or buy it. Then when you boot off this cd-rom it will load the image into RAM. It won&#039;t delete anything you have on your harddrive. At any time you can decide you want to just got back to the operating system on your hard drive by taking out the cd, or you might want drop knoppix from cd onto your harddrive so it is a lot faster and more customizable. Or you might want to move onto a common distribution.&lt;br /&gt;
&lt;br /&gt;
If you have a spare computer, or are ready to move to linux, you can download and install any of the following for absolutely free.&lt;br /&gt;
[http://www.distrowatch.com Common Distributions] include the following:&lt;br /&gt;
&lt;br /&gt;
[[Slackware]]&lt;br /&gt;
[[Debian]]&lt;br /&gt;
[[Suse]]&lt;br /&gt;
[[Redhat]]&lt;br /&gt;
[[Gentoo]]&lt;br /&gt;
[[Mandriva]]&lt;br /&gt;
[[Ubuntu]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Handy Documentation can be found here:&lt;br /&gt;
&lt;br /&gt;
[http://www.tldp.org tldp.org]&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=IRC:3&amp;diff=1776</id>
		<title>IRC:3</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=IRC:3&amp;diff=1776"/>
		<updated>2005-11-08T00:32:58Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Asking to ask a question, instead of just asking your question, is so silly we&#039;ve decided you&#039;re only going to get this link instead of an answer.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Internet:Help Process]]&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Power&amp;diff=595</id>
		<title>Power</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Power&amp;diff=595"/>
		<updated>2005-11-07T04:53:25Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
Ultra 10 with one 200G disk - Averaging ~111watts.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Dsp&amp;diff=702</id>
		<title>Dsp</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Dsp&amp;diff=702"/>
		<updated>2005-11-07T01:30:11Z</updated>

		<summary type="html">&lt;p&gt;Frankk: /* Stop embedded audio in flash */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Sometimes you will have two applications trying to access your audio device. Here is an example screenshot of a user trying to run xmms, when something else is accessing the audio:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:dsp.jpg|error screenshot]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The culprit can be discovered with lsof assuming your audio device is /dev/dsp like it is on BSD:&lt;br /&gt;
&lt;br /&gt;
 $ lsof | grep dsp&lt;br /&gt;
 firefox-b 14905 frank    1w  VCHR       30,3        0t0     38 /dev/dsp0.0&lt;br /&gt;
 firefox-b 14905 frank    1w  VCHR       30,3        0t0     38 /dev/dsp0.0&lt;br /&gt;
 firefox-b 14905 frank    1w  VCHR       30,3        0t0     38 /dev/dsp0.0&lt;br /&gt;
 firefox-b 14905 frank    1w  VCHR       30,3        0t0     38 /dev/dsp0.0&lt;br /&gt;
&lt;br /&gt;
as you can see, one of the websites I am viewing with firefox has claimed access to my dsp first. I must now close that tab in firefox, and restart xmms, and all is well.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Stop embedded audio in Firefox ==&lt;br /&gt;
&lt;br /&gt;
 vi ~/.mozilla/firefox/[[variables|0wt4rci4.default]]/chrome/userContent.css&lt;br /&gt;
&lt;br /&gt;
and add these lines (creating the file if it doesn&#039;t already exist)&lt;br /&gt;
&lt;br /&gt;
 /* block embedded sounds */&lt;br /&gt;
 embed[src*=.mid] { display: none !important }&lt;br /&gt;
 embed[src*=.mp2] { display: none !important }&lt;br /&gt;
 embed[src*=.mp3] { display: none !important }&lt;br /&gt;
 embed[src*=.mp4] { display: none !important }&lt;br /&gt;
 embed[src*=.wav] { display: none !important }&lt;br /&gt;
 embed[src*=.wma] { display: none !important }&lt;br /&gt;
&lt;br /&gt;
== Stop embedded audio in flash ==&lt;br /&gt;
&lt;br /&gt;
Not a highly recommended hack, but I opened &lt;br /&gt;
&lt;br /&gt;
 vi ~/.mozilla/plugins/libflashplayer.so&lt;br /&gt;
&lt;br /&gt;
and did a &lt;br /&gt;
&lt;br /&gt;
 /dsp&lt;br /&gt;
&lt;br /&gt;
which found /dev/dsp which I replaced with /dev/xxx in order to stop flash from accessing my /dev/dsp, as it never released it properly.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Dsp&amp;diff=535</id>
		<title>Dsp</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Dsp&amp;diff=535"/>
		<updated>2005-11-07T01:29:47Z</updated>

		<summary type="html">&lt;p&gt;Frankk: /* Stop embedded audio in flash */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Sometimes you will have two applications trying to access your audio device. Here is an example screenshot of a user trying to run xmms, when something else is accessing the audio:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:dsp.jpg|error screenshot]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The culprit can be discovered with lsof assuming your audio device is /dev/dsp like it is on BSD:&lt;br /&gt;
&lt;br /&gt;
 $ lsof | grep dsp&lt;br /&gt;
 firefox-b 14905 frank    1w  VCHR       30,3        0t0     38 /dev/dsp0.0&lt;br /&gt;
 firefox-b 14905 frank    1w  VCHR       30,3        0t0     38 /dev/dsp0.0&lt;br /&gt;
 firefox-b 14905 frank    1w  VCHR       30,3        0t0     38 /dev/dsp0.0&lt;br /&gt;
 firefox-b 14905 frank    1w  VCHR       30,3        0t0     38 /dev/dsp0.0&lt;br /&gt;
&lt;br /&gt;
as you can see, one of the websites I am viewing with firefox has claimed access to my dsp first. I must now close that tab in firefox, and restart xmms, and all is well.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Stop embedded audio in Firefox ==&lt;br /&gt;
&lt;br /&gt;
 vi ~/.mozilla/firefox/[[variables|0wt4rci4.default]]/chrome/userContent.css&lt;br /&gt;
&lt;br /&gt;
and add these lines (creating the file if it doesn&#039;t already exist)&lt;br /&gt;
&lt;br /&gt;
 /* block embedded sounds */&lt;br /&gt;
 embed[src*=.mid] { display: none !important }&lt;br /&gt;
 embed[src*=.mp2] { display: none !important }&lt;br /&gt;
 embed[src*=.mp3] { display: none !important }&lt;br /&gt;
 embed[src*=.mp4] { display: none !important }&lt;br /&gt;
 embed[src*=.wav] { display: none !important }&lt;br /&gt;
 embed[src*=.wma] { display: none !important }&lt;br /&gt;
&lt;br /&gt;
== Stop embedded audio in flash ==&lt;br /&gt;
&lt;br /&gt;
Not a highly recommended hack, but I opened &lt;br /&gt;
&lt;br /&gt;
 vi ~/.mozilla/plugins/libflashplayer.so&lt;br /&gt;
&lt;br /&gt;
and did a &lt;br /&gt;
&lt;br /&gt;
 /dsp&lt;br /&gt;
&lt;br /&gt;
replacing /dev/dsp with /dev/xxx in order to stop flash from accessing my /dev/dsp, as it never released it properly.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Dsp&amp;diff=534</id>
		<title>Dsp</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Dsp&amp;diff=534"/>
		<updated>2005-11-07T01:29:22Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Sometimes you will have two applications trying to access your audio device. Here is an example screenshot of a user trying to run xmms, when something else is accessing the audio:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Image:dsp.jpg|error screenshot]] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The culprit can be discovered with lsof assuming your audio device is /dev/dsp like it is on BSD:&lt;br /&gt;
&lt;br /&gt;
 $ lsof | grep dsp&lt;br /&gt;
 firefox-b 14905 frank    1w  VCHR       30,3        0t0     38 /dev/dsp0.0&lt;br /&gt;
 firefox-b 14905 frank    1w  VCHR       30,3        0t0     38 /dev/dsp0.0&lt;br /&gt;
 firefox-b 14905 frank    1w  VCHR       30,3        0t0     38 /dev/dsp0.0&lt;br /&gt;
 firefox-b 14905 frank    1w  VCHR       30,3        0t0     38 /dev/dsp0.0&lt;br /&gt;
&lt;br /&gt;
as you can see, one of the websites I am viewing with firefox has claimed access to my dsp first. I must now close that tab in firefox, and restart xmms, and all is well.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Stop embedded audio in Firefox ==&lt;br /&gt;
&lt;br /&gt;
 vi ~/.mozilla/firefox/[[variables|0wt4rci4.default]]/chrome/userContent.css&lt;br /&gt;
&lt;br /&gt;
and add these lines (creating the file if it doesn&#039;t already exist)&lt;br /&gt;
&lt;br /&gt;
 /* block embedded sounds */&lt;br /&gt;
 embed[src*=.mid] { display: none !important }&lt;br /&gt;
 embed[src*=.mp2] { display: none !important }&lt;br /&gt;
 embed[src*=.mp3] { display: none !important }&lt;br /&gt;
 embed[src*=.mp4] { display: none !important }&lt;br /&gt;
 embed[src*=.wav] { display: none !important }&lt;br /&gt;
 embed[src*=.wma] { display: none !important }&lt;br /&gt;
&lt;br /&gt;
== Stop embedded audio in flash ==&lt;br /&gt;
&lt;br /&gt;
Not a highly recommended hack, but I opened &lt;br /&gt;
&lt;br /&gt;
 vi ~/.mozilla/plugins/libflashplayer.so&lt;br /&gt;
&lt;br /&gt;
and did a /dsp, replacing /dev/dsp with /dev/xxx in order to stop flash from accessing my /dev/dsp, as it never released it properly.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Manual&amp;diff=1795</id>
		<title>Manual</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Manual&amp;diff=1795"/>
		<updated>2005-11-07T01:13:34Z</updated>

		<summary type="html">&lt;p&gt;Frankk: /* Creating windex */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Most UNIX systems have online manual pages.  &lt;br /&gt;
&lt;br /&gt;
 MAN(1)                     OpenBSD Reference Manual                     MAN(1)&lt;br /&gt;
 NAME&lt;br /&gt;
     man - display the on-line manual pages&lt;br /&gt;
 SYNOPSIS&lt;br /&gt;
     man [-achw] [-C file] [-M path] [-m path] [-S subsection] [-s section]&lt;br /&gt;
         [section] name [...]&lt;br /&gt;
     man -f command&lt;br /&gt;
     man -k keyword&lt;br /&gt;
 DESCRIPTION&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The types of manpages have sections which they are grouped in.  Here is the manual page layout of [[BSD]]:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;Section 1 : General commands (tools and utilities)&lt;br /&gt;
; Section 2 : System calls and error numbers&lt;br /&gt;
; Section 3 : Library functions, especially for C and Tk&lt;br /&gt;
; Section 4  : Special files and hardware support&lt;br /&gt;
; Section 5 : File formats, especially configuration files&lt;br /&gt;
; Section 6 : Games&lt;br /&gt;
; Section 7 : Miscellaneous information pages&lt;br /&gt;
; Section 8 : System maintenance and operation commands&lt;br /&gt;
; Section 9 : Kernel internals&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
When someone tells you to run &amp;quot;man 6 tetris&amp;quot;, that means that you should read the tetris manpage found in section 6 of the manpages.  Sometimes the same manpage name exists, but in different sections. One example is the fstat manpage it exists in sections 1 and 2.  The lower number sections take precedence over higher numbered sections.  Thus, to see the manpage for fstat in section 2 you would type:&lt;br /&gt;
 $ man 2 fstat&lt;br /&gt;
&lt;br /&gt;
Similarely functions, [[syscall]]s or commands are sometimes mentioned with the section of manpages in brackets behind them like so:  &#039;&#039;&#039;fstat(2)&#039;&#039;&#039;, you&#039;ll see this mentioned a lot in this wiki.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Creating windex ===&lt;br /&gt;
&lt;br /&gt;
If you&#039;re looking for a man page and get the following:&lt;br /&gt;
 # man -k snoop&lt;br /&gt;
 /usr/share/man/windex: No such file or directory&lt;br /&gt;
&lt;br /&gt;
It means you have yet to create your Index:&lt;br /&gt;
 # [[variables|/usr/bin/catman]] -w &lt;br /&gt;
 #&lt;br /&gt;
&lt;br /&gt;
=== Searching for Manual Pages ===&lt;br /&gt;
&lt;br /&gt;
It is possible to do a keyword search in the manpage system.&lt;br /&gt;
&lt;br /&gt;
 $ man -k filesystem&lt;br /&gt;
 OpenBSD::Vstat (3p) - virtual filesystem for pkg_add(1) simulations&lt;br /&gt;
 dump (8) - filesystem backup&lt;br /&gt;
 fstab (5) - static information about the filesystems&lt;br /&gt;
 ...&lt;br /&gt;
&lt;br /&gt;
Another command synonymous to man -k is apropos:&lt;br /&gt;
&lt;br /&gt;
 $ apropos archiver&lt;br /&gt;
 tar (1) - tape archiver&lt;br /&gt;
&lt;br /&gt;
Do notice that the section of the manpage is displayed in the keyword search, this is to ease viewing the particular manpage.  &lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$MANPATH&amp;lt;/code&amp;gt; is used, unless something else is explicitly specified.&lt;br /&gt;
&lt;br /&gt;
=== Location of Manual Pages ===&lt;br /&gt;
&lt;br /&gt;
In [[BSD]] the default manual pages are located in /usr/share/man.  This can be changed with the MANPATH [[environment variable]]:&lt;br /&gt;
&lt;br /&gt;
 $ export MANPATH=/usr/local/man&lt;br /&gt;
 $ man ls&lt;br /&gt;
 man: no entry for ls in the manual. &lt;br /&gt;
 $ unset MANPATH&lt;br /&gt;
 $ man ls&lt;br /&gt;
 LS(1)                      OpenBSD Reference Manual                      LS(1)&lt;br /&gt;
 ...&lt;br /&gt;
&lt;br /&gt;
Another manpage section can be added on to the current MANPATH:&lt;br /&gt;
&lt;br /&gt;
 $ export MANPATH=/usr/share/man:/usr/local/man&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Searching in a man page ==&lt;br /&gt;
&lt;br /&gt;
Often you will want to search a man page you are viewing for a particular keyword. You can preceed this search word with a &amp;quot;/&amp;quot;. If I wanted to see what mediaopt(ions) my sis [[NIC]] has I could do &lt;br /&gt;
&lt;br /&gt;
 /mediaopt&lt;br /&gt;
&lt;br /&gt;
while reading the sis(4) manpage I have on my system. If the first result is not what I want, I don&#039;t have to type the full search word after the first time, I can simply use&lt;br /&gt;
 &lt;br /&gt;
 /&lt;br /&gt;
&lt;br /&gt;
which is to &amp;quot;find another instance&amp;quot;.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Solaris_10&amp;diff=1749</id>
		<title>Solaris 10</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Solaris_10&amp;diff=1749"/>
		<updated>2005-11-03T15:15:32Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;One major change I&#039;ve noticed in [[Solaris]] 10 is that admintool is gone. They have replaced it with smc (Solaris Management Console) which is a bloated client-server tool.&lt;br /&gt;
&lt;br /&gt;
You will want to install [http://www.blastwave.org/pkg-get.php pkg-get] and make sure you have gzip, and wget, in your [[path]].&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Mount&amp;diff=1927</id>
		<title>Mount</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Mount&amp;diff=1927"/>
		<updated>2005-11-03T14:56:50Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Manually mount and unmount a cd with Solaris 10 on an Ultra 10  ==&lt;br /&gt;
&lt;br /&gt;
Chances are you have a harddrive and a cd-rom, and for some reason [[vold]] isn&#039;t mounting your cd-rom.&lt;br /&gt;
&lt;br /&gt;
 $ ls /dev/dsk&lt;br /&gt;
 c0t0d0s0  c0t0d0s2  c0t0d0s4  c0t0d0s6  c0t2d0s0  c0t2d0s2  c0t2d0s4  c0t2d0s6&lt;br /&gt;
 c0t0d0s1  c0t0d0s3  c0t0d0s5  c0t0d0s7  c0t2d0s1  c0t2d0s3  c0t2d0s5  c0t2d0s7&lt;br /&gt;
&lt;br /&gt;
and you should see both disks, each with 7 slices. In my case the difference is c0t0d0 and c0t2d0.&lt;br /&gt;
&lt;br /&gt;
 $ mount | awk &#039;{print $3}&#039; | grep c0&lt;br /&gt;
 /dev/dsk/c0t0d0s0&lt;br /&gt;
 /dev/dsk/c0t0d0s7&lt;br /&gt;
&lt;br /&gt;
this shows me that my harddrive is c0t0d0, so now I can mount the cdrom. If /cdrom/cdrom0 doesn&#039;t exist:&lt;br /&gt;
&lt;br /&gt;
 # mkdir /cdrom/cdrom0&lt;br /&gt;
&lt;br /&gt;
(if /cdrom doesn&#039;t exist, mkdir it first). &lt;br /&gt;
&lt;br /&gt;
 # mount -F hsfs /dev/dsk/c0t2d0s0 /cdrom/cdrom0&lt;br /&gt;
&lt;br /&gt;
and now I have it mounted, I can &lt;br /&gt;
&lt;br /&gt;
 # cd /cdrom/cdrom0 &lt;br /&gt;
&lt;br /&gt;
to see the cd contents. When you&#039;re done:&lt;br /&gt;
&lt;br /&gt;
 # umount /cdrom/cdrom0&lt;br /&gt;
 umount: /cdrom/cdrom0 busy&lt;br /&gt;
&lt;br /&gt;
Just remember now when you&#039;re done that you have to &lt;br /&gt;
&lt;br /&gt;
 # cd /&lt;br /&gt;
&lt;br /&gt;
You can not be sitting in /cdrom/cdrom0, or have any application using that directory when you want to&lt;br /&gt;
&lt;br /&gt;
 # umount /cdrom/cdrom0&lt;br /&gt;
 #&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Ports&amp;diff=573</id>
		<title>Ports</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Ports&amp;diff=573"/>
		<updated>2005-11-03T05:19:09Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Ports are identifiers of protocols that work on the transport layer (layer 4) of the [[OSI]] model.  [[TCP]] and [[UDP]] are transport layer protocols that have ports.  In [[TCP]] and [[UDP]] a port is represented by a 16 bit short integer which is unsigned meaning that the possible port range is 0 through 65535.  Port 0 is illegal and no service resides on it.&lt;br /&gt;
&lt;br /&gt;
Say you want to know what is running on port 80 of your machine. The first hint would be to look in the file /etc/services as well as [http://www.iana.org/assignments/port-numbers IANAs list] to get an idea of what typically runs on that port. &lt;br /&gt;
&lt;br /&gt;
 http             80/tcp    www www-http #World Wide Web HTTP&lt;br /&gt;
 http             80/udp    www www-http #World Wide Web HTTP&lt;br /&gt;
&lt;br /&gt;
looks like it&#039;s the port typically used for the www. Now we can try netstat to actually see what is listening,&lt;br /&gt;
not just what should be there.&lt;br /&gt;
&lt;br /&gt;
 netstat -an | grep LISTEN&lt;br /&gt;
&lt;br /&gt;
however I prefer the flexibility of lsof which I install on all of my machines. &lt;br /&gt;
&lt;br /&gt;
 lsof -i:80&lt;br /&gt;
&lt;br /&gt;
will show you exactly what is listening on this port. If you want to see ports on your machine are open to the general public, which is often how computers are broken into, you can try Yashy&#039;s [http://crypto.yashy.com/nmap.php self port scan]. You don&#039;t want to see any ports open, or listening, unless you&#039;ve intentionally started that process for the public to connect to.&lt;br /&gt;
&lt;br /&gt;
Ideally if you see any ports open, you will close down the application that has that port open. Alternatively you can install and use a [[firewall]].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Solaris 10 ==&lt;br /&gt;
&lt;br /&gt;
 # lsof -i&lt;br /&gt;
&lt;br /&gt;
to see what you have running. All ports are now controlled out of:&lt;br /&gt;
&lt;br /&gt;
 # svcs&lt;br /&gt;
&lt;br /&gt;
which will give you a long list of services running (&amp;quot;online&amp;quot;) or not. You may want to [[pipe]] this output through [[less]].&lt;br /&gt;
&lt;br /&gt;
When I did &amp;quot;lsof -i&amp;quot; I saw that rpcbind was running which I don&#039;t want, so I found the svcs name by running:&lt;br /&gt;
&lt;br /&gt;
 # svcs | grep rpc&lt;br /&gt;
 online          23:43:56   svc:/network/rpc/bind:default&lt;br /&gt;
 uninitialized   23:43:44   svc:/network/rpc/gss:default&lt;br /&gt;
&lt;br /&gt;
and several more uninitialized services. I only want to stop the online one:&lt;br /&gt;
&lt;br /&gt;
 # svcadm disable svc:/network/rpc/bind:default&lt;br /&gt;
&lt;br /&gt;
and back to a prompt I go. I run &amp;quot;lsof -i&amp;quot; once more to confirm it&#039;s stopped, and it is. Both the svcs and svcadm [[Manual]] are worth reading if you&#039;re using them for the first time.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Manual&amp;diff=527</id>
		<title>Manual</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Manual&amp;diff=527"/>
		<updated>2005-11-03T02:08:31Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Most UNIX systems have online manual pages.  &lt;br /&gt;
&lt;br /&gt;
 MAN(1)                     OpenBSD Reference Manual                     MAN(1)&lt;br /&gt;
 NAME&lt;br /&gt;
     man - display the on-line manual pages&lt;br /&gt;
 SYNOPSIS&lt;br /&gt;
     man [-achw] [-C file] [-M path] [-m path] [-S subsection] [-s section]&lt;br /&gt;
         [section] name [...]&lt;br /&gt;
     man -f command&lt;br /&gt;
     man -k keyword&lt;br /&gt;
 DESCRIPTION&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The types of manpages have sections which they are grouped in.  Here is the manual page layout of [[BSD]]:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
;Section 1 : General commands (tools and utilities)&lt;br /&gt;
; Section 2 : System calls and error numbers&lt;br /&gt;
; Section 3 : Library functions, especially for C and Tk&lt;br /&gt;
; Section 4  : Special files and hardware support&lt;br /&gt;
; Section 5 : File formats, especially configuration files&lt;br /&gt;
; Section 6 : Games&lt;br /&gt;
; Section 7 : Miscellaneous information pages&lt;br /&gt;
; Section 8 : System maintenance and operation commands&lt;br /&gt;
; Section 9 : Kernel internals&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
When someone tells you to run &amp;quot;man 6 tetris&amp;quot;, that means that you should read the tetris manpage found in section 6 of the manpages.  Sometimes the same manpage name exists, but in different sections. One example is the fstat manpage it exists in sections 1 and 2.  The lower number sections take precedence over higher numbered sections.  Thus, to see the manpage for fstat in section 2 you would type:&lt;br /&gt;
 $ man 2 fstat&lt;br /&gt;
&lt;br /&gt;
Similarely functions, [[syscall]]s or commands are sometimes mentioned with the section of manpages in brackets behind them like so:  &#039;&#039;&#039;fstat(2)&#039;&#039;&#039;, you&#039;ll see this mentioned a lot in this wiki.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Creating windex ==&lt;br /&gt;
&lt;br /&gt;
If you&#039;re looking for a man page and get the following:&lt;br /&gt;
 # man -k snoop&lt;br /&gt;
 /usr/share/man/windex: No such file or directory&lt;br /&gt;
&lt;br /&gt;
It means you have yet to create your Index:&lt;br /&gt;
 # /usr/bin/catman -w &lt;br /&gt;
 #&lt;br /&gt;
&lt;br /&gt;
=== Searching for Manual Pages ===&lt;br /&gt;
&lt;br /&gt;
It is possible to do a keyword search in the manpage system.&lt;br /&gt;
&lt;br /&gt;
 $ man -k filesystem&lt;br /&gt;
 OpenBSD::Vstat (3p) - virtual filesystem for pkg_add(1) simulations&lt;br /&gt;
 dump (8) - filesystem backup&lt;br /&gt;
 fstab (5) - static information about the filesystems&lt;br /&gt;
 ...&lt;br /&gt;
&lt;br /&gt;
Another command synonymous to man -k is apropos:&lt;br /&gt;
&lt;br /&gt;
 $ apropos archiver&lt;br /&gt;
 tar (1) - tape archiver&lt;br /&gt;
&lt;br /&gt;
Do notice that the section of the manpage is displayed in the keyword search, this is to ease viewing the particular manpage.  Do note that when you are on Solaris you may have to build the manual page index in order to search for keywords.  This is done with the catman command:&lt;br /&gt;
&lt;br /&gt;
 $ catman -w &lt;br /&gt;
&lt;br /&gt;
&amp;lt;code&amp;gt;$MANPATH&amp;lt;/code&amp;gt; is used, unless something else is explicitly specified.&lt;br /&gt;
&lt;br /&gt;
=== Location of Manual Pages ===&lt;br /&gt;
&lt;br /&gt;
In [[BSD]] the default manual pages are located in /usr/share/man.  This can be changed with the MANPATH [[environment variable]]:&lt;br /&gt;
&lt;br /&gt;
 $ export MANPATH=/usr/local/man&lt;br /&gt;
 $ man ls&lt;br /&gt;
 man: no entry for ls in the manual. &lt;br /&gt;
 $ unset MANPATH&lt;br /&gt;
 $ man ls&lt;br /&gt;
 LS(1)                      OpenBSD Reference Manual                      LS(1)&lt;br /&gt;
 ...&lt;br /&gt;
&lt;br /&gt;
Another manpage section can be added on to the current MANPATH:&lt;br /&gt;
&lt;br /&gt;
 $ export MANPATH=/usr/share/man:/usr/local/man&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Searching in a man page ==&lt;br /&gt;
&lt;br /&gt;
Often you will want to search a man page you are viewing for a particular keyword. You can preceed this search word with a &amp;quot;/&amp;quot;. If I wanted to see what mediaopt(ions) my sis [[NIC]] has I could do &lt;br /&gt;
&lt;br /&gt;
 /mediaopt&lt;br /&gt;
&lt;br /&gt;
while reading the sis(4) manpage I have on my system. If the first result is not what I want, I don&#039;t have to type the full search word after the first time, I can simply use&lt;br /&gt;
 &lt;br /&gt;
 /&lt;br /&gt;
&lt;br /&gt;
which is to &amp;quot;find another instance&amp;quot;.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Fsck&amp;diff=549</id>
		<title>Fsck</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Fsck&amp;diff=549"/>
		<updated>2005-11-02T15:48:23Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The &#039;&#039;&#039;filesystem consistency check and interactive repair&#039;&#039;&#039; program is needed on several [[UBO]] [[filesystem]]s.  When a [[filesystem]] is not properly unmounted before a reboot or halt the filesystem must be checked and any inconsistencies repaired.  This can be a lengthy process and [[FreeBSD]] has a background fsck so that the system can start while it works away at making the filesystem consistent.&lt;br /&gt;
&lt;br /&gt;
If you show down improperly on Linux and know you will have to answer &amp;quot;yes&amp;quot; many times, you can simply add the -y flag which means say yes to the prompts&lt;br /&gt;
&lt;br /&gt;
 # fsck -y&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Fsck&amp;diff=523</id>
		<title>Fsck</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Fsck&amp;diff=523"/>
		<updated>2005-11-02T04:31:53Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The &#039;&#039;&#039;filesystem consistency check and interactive repair&#039;&#039;&#039; program.  When a filesystem is not properly unmounted before a reboot or halt the filesystem must be checked and any inconsistencies repaired.  This can be a lengthy process and [[FreeBSD]] has a background fsck so that the system can start while it works away at making the filesystem consistent.&lt;br /&gt;
&lt;br /&gt;
If you show down improperly on Linux and know you will have to answer &amp;quot;yes&amp;quot; many times, you can simply add the -y flag which means say yes to the prompts&lt;br /&gt;
&lt;br /&gt;
 # fsck -y&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Gdb&amp;diff=1923</id>
		<title>Gdb</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Gdb&amp;diff=1923"/>
		<updated>2005-11-01T15:51:25Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;You have a corefile, like xine.core. gdb $program $corefile:&lt;br /&gt;
&lt;br /&gt;
 gdb [[variables|/usr/X11R6/bin/xine]] [[variables|./xine.core]]&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Ddos&amp;diff=736</id>
		<title>Ddos</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Ddos&amp;diff=736"/>
		<updated>2005-10-31T15:57:24Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Distributed Denial of Service (see [[DoS]]).&lt;br /&gt;
&lt;br /&gt;
A distributed denial of service is many computers on the [[Internet]] coordinating a [[DoS]] against a single host, network or network infrastructure.  A DDoS doesn&#039;t need to fully exhaust your services, but keep a steady monetary burden on the current state of your service, forcing you to eventually give in and stop the service altogether.&lt;br /&gt;
&lt;br /&gt;
A DDoS can be done by people who have hijacked a great number of hosts (known as zombie hosts) or done by members of organizations who have moral, political, religious or capitalistic motives.&lt;br /&gt;
&lt;br /&gt;
*Stories posted to Slashdot can be seen as the control for a DDoS, and all the slashdotters clicking on the link of a site contribute to the load on that remote web server.  When a web server is unable to handle the loads of HTTP demand it is said to have been &amp;quot;slashdotted&amp;quot;.  This drives home the point that freedom of speech on the [[Internet]] can be a costly affair.  You can have a good idea but if you can&#039;t put money behind it, popularity like being featured on slashdot will put you to ruins.  Looking at it another way slashdot may be an engine designed on forcing people to use advertising which pays the owner of a webpage enough to sustain slashdot hits on their content on the  [[Internet]], but it also allows outside influence and unwanted advertisement on their site which may cost the owner of the site popularity or possible capitalistic gain from their idea.&lt;br /&gt;
*Google works the same way as slashdot,if they dislike you they can move you up in their search causing more hits, forcing you to possibly feature google ads on your site which they (google) control.&lt;br /&gt;
*Large organizations also have the power of &amp;quot;slashdotting&amp;quot; sites that they have a moral disagreement with.  Sometimes they&#039;ll ask you to reload the site a few times to create the extra load on the remote servers.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Cracker&amp;diff=1914</id>
		<title>Cracker</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Cracker&amp;diff=1914"/>
		<updated>2005-10-31T15:48:03Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Most commonly referred to by the media as a [[hacker]], a cracker is the person who malciously compromises hosts that are not his/her own. &lt;br /&gt;
&lt;br /&gt;
There are several levels of cracker. &lt;br /&gt;
&lt;br /&gt;
#The most notorious is the least skilled, known commonly as a &amp;quot;script kiddie&amp;quot;. These are the people that will use a script or program written by someone else, and use it to compromise remote hosts. They often do not even know what is exactly happening, and don&#039;t care, they just like breaking into other machines for whatever purpose.&lt;br /&gt;
#There are government and corporate crackers, who are hired to crack into remote hosts usually for information, specifically IP (Intellectual property) of a remote government/competitor.&lt;br /&gt;
#There are a few &amp;quot;good crackers&amp;quot; who will break into a remote host, patch the hole that they used to get in so others can&#039;t do the same, and then leave undetected. (&#039;&#039;As romantic as it sounds one should not forget that cracking another persons system is illegal.  Even when your intentions are meant well, the law will have no mercy on you&#039;&#039;).&lt;br /&gt;
#Then there are the crackers who discover remote holes/weaknesses, and/or write the exploits for these vulnerabilites. Some like to publish these exploits, either for the fame from other crackers, or to watch the script kiddies wreak havoc with them.  (&#039;&#039;It should be noted that providing an exploit to a security advisory hastens the patch effort and scenarios where a bug is misunderstood or even ignored rarely happen.  Exploits are a ticket of guarantee that someone will address this security issue sooner rather than later&#039;&#039;).&lt;br /&gt;
&lt;br /&gt;
How much time one should wait between notifying the vendor of an issue and releasing an exploit is a hotly debated issues in the information security community. Some vendors are a lot faster and remediating issues then others.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Locate&amp;diff=755</id>
		<title>Locate</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Locate&amp;diff=755"/>
		<updated>2005-10-31T04:08:27Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
Trying to locate a file, if you&#039;re lucky you can try&lt;br /&gt;
&lt;br /&gt;
 $ locate [[variables|$file]]&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Vi&amp;diff=1919</id>
		<title>Vi</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Vi&amp;diff=1919"/>
		<updated>2005-10-31T04:05:13Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;For some reason you have to edit a file on unix, and have never done so before, and the only editor around is &amp;quot;vi&amp;quot;. We&#039;ll use httpd.conf and the example file to edit:&lt;br /&gt;
&lt;br /&gt;
 vi httpd.conf&lt;br /&gt;
&lt;br /&gt;
this opens the file in command mode, assuming you&#039;re in the directory that contains httpd.conf. The other mode is insert mode, where we want to insert text. so we type&lt;br /&gt;
&lt;br /&gt;
 i&lt;br /&gt;
&lt;br /&gt;
and now we&#039;re in insert mode. We can move throughout the text and edit as we please. If we make a typo we hit the ESCape key to go back to command mode and type&lt;br /&gt;
&lt;br /&gt;
 :u&lt;br /&gt;
&lt;br /&gt;
which means undo last edit. If you&#039;ve made a few mistakes and want to start over&lt;br /&gt;
&lt;br /&gt;
 :e &lt;br /&gt;
&lt;br /&gt;
will do this. Remember to hit &amp;quot;i&amp;quot; to get back into Insert mode to edit again.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Once you&#039;re happy with your changes, hit ESCape to get back to command mode and then:&lt;br /&gt;
&lt;br /&gt;
 :wq! &lt;br /&gt;
&lt;br /&gt;
will force the changes to be saved to disk. I would recommend trying it without the ! and just do &lt;br /&gt;
&lt;br /&gt;
 :wq&lt;br /&gt;
&lt;br /&gt;
but watch for errors like file permission issues. The ! forces the changes to be made.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Vi&amp;diff=507</id>
		<title>Vi</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Vi&amp;diff=507"/>
		<updated>2005-10-31T04:04:36Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;For some reason you have to edit a file on unix, and have never done so before, and the only editor around is &amp;quot;vi&amp;quot;. We&#039;ll use httpd.conf and the example file to edit:&lt;br /&gt;
&lt;br /&gt;
 vi httpd.conf&lt;br /&gt;
&lt;br /&gt;
this opens the file in command mode. The other mode is insert mode, where we want to insert text. so we type&lt;br /&gt;
&lt;br /&gt;
 i&lt;br /&gt;
&lt;br /&gt;
and now we&#039;re in insert mode. We can move throughout the text and edit as we please. If we make a typo we hit the ESCape key to go back to command mode and type&lt;br /&gt;
&lt;br /&gt;
 :u&lt;br /&gt;
&lt;br /&gt;
which means undo last edit. If you&#039;ve made a few mistakes and want to start over&lt;br /&gt;
&lt;br /&gt;
 :e &lt;br /&gt;
&lt;br /&gt;
will do this. Remember to hit &amp;quot;i&amp;quot; to get back into Insert mode to edit again.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Once you&#039;re happy with your changes, hit ESCape to get back to command mode and then:&lt;br /&gt;
&lt;br /&gt;
 :wq! &lt;br /&gt;
&lt;br /&gt;
will force the changes to be saved to disk. I would recommend trying it without the ! and just do &lt;br /&gt;
&lt;br /&gt;
 :wq&lt;br /&gt;
&lt;br /&gt;
but watch for errors like file permission issues. The ! forces the changes to be made.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Vi&amp;diff=506</id>
		<title>Vi</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Vi&amp;diff=506"/>
		<updated>2005-10-31T04:03:59Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;For some reason you have to edit a file on unix, and have never done so before, and the only editor around is &amp;quot;vi&amp;quot;. We&#039;ll use httpd.conf and the example file to edit:&lt;br /&gt;
&lt;br /&gt;
 vi httpd.conf&lt;br /&gt;
&lt;br /&gt;
this opens the file in command mode. The other mode is insert mode, where we want to insert text. so we type&lt;br /&gt;
&lt;br /&gt;
 i&lt;br /&gt;
&lt;br /&gt;
and now we&#039;re in insert mode. We can move throughout the text and edit as we please. If we make a typo we hit the ESCape key to go back to command mode and type&lt;br /&gt;
&lt;br /&gt;
 :u&lt;br /&gt;
&lt;br /&gt;
which means undo last edit. If you&#039;ve made a few mistakes and want to start over&lt;br /&gt;
&lt;br /&gt;
 :e &lt;br /&gt;
&lt;br /&gt;
will do this. Remember to hit &amp;quot;i&amp;quot; to get back into Insert mode to edit again.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Once you&#039;re happy with your changes, hit ESCape to get back to command mode and then:&lt;br /&gt;
&lt;br /&gt;
 :wq! &lt;br /&gt;
&lt;br /&gt;
will force the changes to be saved to disk. I would recommend trying it without the ! and just do &lt;br /&gt;
&lt;br /&gt;
 :wq&lt;br /&gt;
&lt;br /&gt;
but watch for errors like file permission issues.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Vi&amp;diff=505</id>
		<title>Vi</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Vi&amp;diff=505"/>
		<updated>2005-10-31T04:03:50Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;For some reason you have to edit a file on unix, and have never done so before, and the only editor around is &amp;quot;vi&amp;quot;. We&#039;ll use httpd.conf and the example file to edit:&lt;br /&gt;
&lt;br /&gt;
 vi httpd.conf&lt;br /&gt;
&lt;br /&gt;
this opens the file in command mode. The other mode is insert mode, where we want to insert text. so we type&lt;br /&gt;
&lt;br /&gt;
 i&lt;br /&gt;
&lt;br /&gt;
and now we&#039;re in insert mode. We can move throughout the text and edit as we please. If we make a typo we hit the ESCape key to go back to command mode and type&lt;br /&gt;
&lt;br /&gt;
 :u&lt;br /&gt;
&lt;br /&gt;
which means undo last edit. If you&#039;ve made a few mistakes and want to start over&lt;br /&gt;
&lt;br /&gt;
 :e &lt;br /&gt;
&lt;br /&gt;
will do this. Remember to hit &amp;quot;i&amp;quot; to get back into Insert mode to edit again.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 Once you&#039;re happy with your changes, hit ESCape to get back to command mode and then:&lt;br /&gt;
&lt;br /&gt;
 :wq! &lt;br /&gt;
&lt;br /&gt;
will force the changes to be saved to disk. I would recommend trying it without the ! and just do &lt;br /&gt;
&lt;br /&gt;
 :wq&lt;br /&gt;
&lt;br /&gt;
but watch for errors like file permission issues.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Vi&amp;diff=504</id>
		<title>Vi</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Vi&amp;diff=504"/>
		<updated>2005-10-31T04:02:37Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;For some reason you have to edit a file on unix, and have never done so before, and the only editor around is &amp;quot;vi&amp;quot;. We&#039;ll use httpd.conf and the example file to edit:&lt;br /&gt;
&lt;br /&gt;
 vi httpd.conf&lt;br /&gt;
&lt;br /&gt;
this opens the file in command mode. The other mode is insert mode, where we want to insert text. so we type&lt;br /&gt;
&lt;br /&gt;
 i&lt;br /&gt;
&lt;br /&gt;
and now we&#039;re in insert mode. We can move throughout the text and edit as we please. If we make a typo we hit the ESCape key to go back to command mode and type&lt;br /&gt;
&lt;br /&gt;
 :u&lt;br /&gt;
&lt;br /&gt;
which means undo last edit. If you&#039;ve made a few mistakes and want to start over&lt;br /&gt;
&lt;br /&gt;
 :e &lt;br /&gt;
&lt;br /&gt;
will do this. Once you&#039;re happy with your changes, &lt;br /&gt;
&lt;br /&gt;
 :wq! &lt;br /&gt;
&lt;br /&gt;
will force the changes to be saved to disk. I would recommend trying it without the ! and just do &lt;br /&gt;
&lt;br /&gt;
 :wq&lt;br /&gt;
&lt;br /&gt;
but watch for errors like file permission issues.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Searches&amp;diff=1918</id>
		<title>Searches</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Searches&amp;diff=1918"/>
		<updated>2005-10-30T23:35:12Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Here are the most popular searches so far:&lt;br /&gt;
&lt;br /&gt;
code+for+tapped+lines&lt;br /&gt;
&lt;br /&gt;
connect&lt;br /&gt;
&lt;br /&gt;
cracker&lt;br /&gt;
&lt;br /&gt;
ddos&lt;br /&gt;
&lt;br /&gt;
default&lt;br /&gt;
&lt;br /&gt;
denial&lt;br /&gt;
&lt;br /&gt;
depth&lt;br /&gt;
&lt;br /&gt;
device&lt;br /&gt;
&lt;br /&gt;
editors&lt;br /&gt;
&lt;br /&gt;
file&lt;br /&gt;
&lt;br /&gt;
ipsec&lt;br /&gt;
&lt;br /&gt;
link&lt;br /&gt;
&lt;br /&gt;
offsite&lt;br /&gt;
&lt;br /&gt;
permissions&lt;br /&gt;
&lt;br /&gt;
pipe&lt;br /&gt;
&lt;br /&gt;
setuid&lt;br /&gt;
&lt;br /&gt;
unix&lt;br /&gt;
&lt;br /&gt;
virus&lt;br /&gt;
&lt;br /&gt;
windows&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Searches&amp;diff=503</id>
		<title>Searches</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Searches&amp;diff=503"/>
		<updated>2005-10-30T23:34:33Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Here are the most popular searches so far:&lt;br /&gt;
&lt;br /&gt;
code+for+tapped+lines&lt;br /&gt;
connect&lt;br /&gt;
cracker&lt;br /&gt;
ddos&lt;br /&gt;
default&lt;br /&gt;
denial&lt;br /&gt;
depth&lt;br /&gt;
device&lt;br /&gt;
editors&lt;br /&gt;
file&lt;br /&gt;
ipsec&lt;br /&gt;
link&lt;br /&gt;
offsite&lt;br /&gt;
permissions&lt;br /&gt;
pipe&lt;br /&gt;
setuid&lt;br /&gt;
unix&lt;br /&gt;
virus&lt;br /&gt;
windows&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Message_authentication_check&amp;diff=1904</id>
		<title>Message authentication check</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Message_authentication_check&amp;diff=1904"/>
		<updated>2005-10-30T23:26:57Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A message authentication check, or [[MAC]] is a cryptographic check that a&lt;br /&gt;
message is from a given origin.&lt;br /&gt;
&lt;br /&gt;
Most MACs are constructed from keyed [[one way hash]] functions.&lt;br /&gt;
The method is for the sender and receiver to agree on a symmetric key,&lt;br /&gt;
and to then calculate:&lt;br /&gt;
&lt;br /&gt;
  C = hash(K_a | message)&lt;br /&gt;
&lt;br /&gt;
[[ipsec]] uses the HMAC methods, which actually calculate:&lt;br /&gt;
  C = hash(&#039;55555555&#039;, hash(K_a | message | &#039;uuuuuuuuu&#039;))&lt;br /&gt;
&lt;br /&gt;
this usage makes HMAC-MD5 and HMAC-SHA1 immune to recently discovered birthday&lt;br /&gt;
attacks on MD5 and SHA1.&lt;br /&gt;
&lt;br /&gt;
HMAC is defined in [[RFC]] 2104.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Browser&amp;diff=1917</id>
		<title>Browser</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Browser&amp;diff=1917"/>
		<updated>2005-10-30T23:25:58Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Have you ever wondered what happens when you are surfing the www? How does the text show up so pretty in your web browser?&lt;br /&gt;
&lt;br /&gt;
 $ telnet [[variables|yashy.com]] 80&lt;br /&gt;
&lt;br /&gt;
and once you see&lt;br /&gt;
&lt;br /&gt;
 Trying 206.248.137.44...&lt;br /&gt;
 Connected to yashy.com.&lt;br /&gt;
 Escape character is &#039;^]&#039;.&lt;br /&gt;
&lt;br /&gt;
then type&lt;br /&gt;
&lt;br /&gt;
 GET / HTTP/1.0&lt;br /&gt;
&lt;br /&gt;
and watch the text scroll by, this is the information ([[HTML]]) that is sent to your web browser. You may also be interested in the extra information transfered when using [[SSL]]&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=SSL&amp;diff=568</id>
		<title>SSL</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=SSL&amp;diff=568"/>
		<updated>2005-10-30T23:21:32Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Originally created by the people at Netscape, the Secure Socket Layer (SSL) has been adopted as a standard for transfering data over the internet. If you&#039;ve ever been to a website where the URL starts with &amp;lt;nowiki&amp;gt;https://&amp;lt;/nowiki&amp;gt; instead of the typical &amp;lt;nowiki&amp;gt;http://&amp;lt;/nowiki&amp;gt;, you are using SSL. This means there is an encrypted tunnel between you and the remote machine, so everything transferred not be done in the typical plain text which is fairly trivially [[packet sniffed]].&lt;br /&gt;
&lt;br /&gt;
Only enter personal information or credit card information into a website that is using &amp;lt;nowiki&amp;gt;https://&amp;lt;/nowiki&amp;gt; in the URL, this is covered in the [[User Registration|Registration:User]] process.&lt;br /&gt;
&lt;br /&gt;
To get an idea of what happens behind the scenes when you surf the web using your browser to an SSL website:&lt;br /&gt;
 $ openssl s_client -connect [[variables|http://www.example.com]]:443&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=SSL&amp;diff=501</id>
		<title>SSL</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=SSL&amp;diff=501"/>
		<updated>2005-10-30T23:20:40Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Originally created by the people at Netscape, the Secure Socket Layer (SSL) has been adopted as a standard for transfering data over the internet. If you&#039;ve ever been to a website where the URL starts with https:// instead of the typical http://, you are using SSL. This means there is an encrypted tunnel between you and the remote machine, so everything transferred not be done in the typical plain text which is fairly trivially [[packet sniffed]].&lt;br /&gt;
&lt;br /&gt;
Only enter personal information or credit card information into a website that is using https:// in the URL, this is covered in the [[User Registration|Registration:User]] process.&lt;br /&gt;
&lt;br /&gt;
To get an idea of what happens behind the scenes when you surf the web using your browser to an SSL website:&lt;br /&gt;
 $ openssl s_client -connect [[variables|http://www.example.com]]:443&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=AES&amp;diff=1915</id>
		<title>AES</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=AES&amp;diff=1915"/>
		<updated>2005-10-30T22:57:23Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Advanced Encryption Standard&lt;br /&gt;
&lt;br /&gt;
In 1997 [[NIST]] requested proposals for a new advanced encryption standard. Three years later they officially announced that [http://rijndael.info/ Rijndael] was selected as the AES as can be seen in [http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf FIPS-197]. &lt;br /&gt;
It is expected to be the standard for approximately 20-30 years, unless an exploit is published before then.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=AES&amp;diff=500</id>
		<title>AES</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=AES&amp;diff=500"/>
		<updated>2005-10-30T22:54:46Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Advanced Encryption Standard&lt;br /&gt;
&lt;br /&gt;
In 1997 [[NIST]] requested proposals for a new advanced encryption standard. Three years later they officially announced that [[Rijndael]] was selected as the AES as can be seen in [http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf FIPS-197]. &lt;br /&gt;
It is expected to be the standard for approximately 20-30 years, unless an exploit is published before then.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Cracker&amp;diff=508</id>
		<title>Cracker</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Cracker&amp;diff=508"/>
		<updated>2005-10-30T22:42:55Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Most commonly referred to by the media as a [[hacker]], a cracker is the person who malciously compromises hosts that are not his/her own. &lt;br /&gt;
&lt;br /&gt;
There are several levels of cracker. &lt;br /&gt;
&lt;br /&gt;
#The most notorious is the least skilled, known commonly as a &amp;quot;script kiddie&amp;quot;. These are the people that will use a script or program written by someone else, and use it to compromise remote hosts. They often do not even know what is exactly happening, and don&#039;t care, they just like breaking into other machines for whatever purpose.&lt;br /&gt;
#There are government and corporate crackers, who are hired to crack into remote hosts usually for information, specifically IP (Intellectual property) of a remote government/competitor.&lt;br /&gt;
#There are a few &amp;quot;good crackers&amp;quot; who will break into a remote host, patch the hole that they used to get in so others can&#039;t do the same, and then leave undetected.&lt;br /&gt;
#Then there are the crackers who discover remote holes/weaknesses, and/or write the exploits for these vulnerabilites. Some like to publish these exploits, either for the fame from other crackers, or to watch the script kiddies wreak havoc with them.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Message_authentication_check&amp;diff=499</id>
		<title>Message authentication check</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Message_authentication_check&amp;diff=499"/>
		<updated>2005-10-30T18:02:58Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;A message authentication check, or [[MAC]] is a cryptographic check that a&lt;br /&gt;
message is from a given origin.&lt;br /&gt;
&lt;br /&gt;
Most MACs are constructed from keyed [[one way hash]] functions.&lt;br /&gt;
The method is for the sender and receiver to agree on a symmetric key,&lt;br /&gt;
and to then calculate:&lt;br /&gt;
&lt;br /&gt;
  C = hash(K_a | message)&lt;br /&gt;
&lt;br /&gt;
[[ipsec]] uses the HMAC methods, which actually calculate:&lt;br /&gt;
  C = hash(&#039;55555555&#039;, hash(K_a | message | &#039;uuuuuuuuu&#039;))&lt;br /&gt;
&lt;br /&gt;
this usage makes HMAC-MD5 and HMAC-SHA1 immune to recently discovered birthday&lt;br /&gt;
attacks on MD5 and SHA1.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Ethernet&amp;diff=564</id>
		<title>Ethernet</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Ethernet&amp;diff=564"/>
		<updated>2005-10-30T18:02:30Z</updated>

		<summary type="html">&lt;p&gt;Frankk: /* Wireless LAN */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Ethernet is a method for communication also called CSMA/CD (carrier sense, media access / collision detect).  It was developed at DEC first.  It was cheaper than [[token ring]] for a Local Area Network ([[LAN]]) so it became the industrial standard.  Ethernet has historically been used on copper cabling up to Gigabit speeds, but fibre-optic cabling is becoming very popular especially at Gigabit speeds.  When ethernet is in a half-duplex setting (possibly connected to a [[hub]]) collisions can occur when two or more NICS broadcast at the same time.  When a collission is detected a NIC will back off a random amount of time and try again, because the other cards also back off a random amount of time the odds are low that they will collide again.  Today [[hub]]s are not used anymore but [[switch]]es which eliminate the need to put cards in [[half duplex]] mode.&lt;br /&gt;
If you only have one network card,&lt;br /&gt;
 # /sbin/ifconfig -a | grep media&lt;br /&gt;
 media: Ethernet autoselect (100baseTX &amp;lt;full-duplex&amp;gt;)&lt;br /&gt;
should show you what your network card is currently running at. If you have multiple cards, or are not getting the anticipated response, just try &lt;br /&gt;
 # /sbin/ifconfig -a&lt;br /&gt;
&lt;br /&gt;
On [[BSD]], once you&#039;ve determined your network device you can see what options it has in section 4 of the [[Manual]]. In this case I&#039;m using sis0:&lt;br /&gt;
 man 4 sis&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Thinnet &amp;amp; Thicknet ===&lt;br /&gt;
----&lt;br /&gt;
=== 10base2 ===&lt;br /&gt;
&lt;br /&gt;
Called Thin-net or Cheapernet.  Today this is not used anymore.&lt;br /&gt;
&lt;br /&gt;
=== 10base5 ===&lt;br /&gt;
&lt;br /&gt;
Uses coaxial cable for a range of 500 meters without repeaters.  Today this is not used anymore.&lt;br /&gt;
&lt;br /&gt;
=== Twisted Pair &amp;amp; Fibre optics ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== 10baseT Ethernet ===&lt;br /&gt;
&lt;br /&gt;
Has a bandwidth of 10 Mbps (Mega bit per second).  It can work in [[full duplex]] and [[half duplex]] mode.  The maximum length of one copper ethernet cable between 2 NIC&#039;s is 100 meters, 200 meters if a ethernet repeater is used, which boosts the signal. &lt;br /&gt;
&lt;br /&gt;
=== 100baseT Fast Ethernet ===&lt;br /&gt;
&lt;br /&gt;
Has a bandwidth of 100 Mbps.  It can work in [[full duplex]] and [[half duplex]] mode.  The maximum length between 2 NICS is the same as 10 Mbps ethernet.&lt;br /&gt;
&lt;br /&gt;
=== 1000baseT Gigabit Ethernet ===&lt;br /&gt;
&lt;br /&gt;
Has a bandwidth of 1000 Mbps.  It can work in [[full duplex]] and [[half duplex]] mode.&lt;br /&gt;
&lt;br /&gt;
=== 10 Gigabit Ethernet ===&lt;br /&gt;
&lt;br /&gt;
Has a bandwidth of 10 Gbps (Giga bit per second).  It probably works in [[full duplex]] mode.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
=== Twisted Pair Copper Cabling ===&lt;br /&gt;
&lt;br /&gt;
Ethernet copper cabling also called Twisted Pair cabling is composed of 4 pairs of copper wire which are twisted between the pairs and also twisted around in their plastic protective coating. The twist is to ensure shielding which is questionable.  The ends of ethernet cabling are connectors called RJ-45 bits.  The individual wires are colour coded and are visible in the RJ-45 connector from the top.  The most common sequence is 1. green-white 2. green 3. orange-white 4. blue  5. blue-white 6. orange  7. brown-white 8. brown.  This is the setup on both ends for what is called a straight-thru cable.  The only wires actually used are positions 1, 2, 3 and 6.  When you want to connect 2 ethernet cards directly without use of a [[hub]] or [[switch]] you require a cable that is crossed-over or a cross-over cable.  This is called so because positions 1 and 3 and 2 and 6 are crossed, so the end of the crossed end looks like this 1. orange-white 2. orange 3. green-white  4. blue  5. blue-white 6. green 7. brown-white 8. brown.  The most common type of cabling for ethernet is category 5 cabling although there is category 5e now for gigabit.  To attach the RJ-45 bits to the cabling a special tool called a RJ-45 crimper is used.  Cheap version s are about $30 (CA) at cabling surplus stores.&lt;br /&gt;
&lt;br /&gt;
=== Wireless LAN ===&lt;br /&gt;
&lt;br /&gt;
WLAN also called Wifi was first developed at Lucent with their Wavelan product.  It is a standard based around IEEE 802.11b and g.  At first Wifi could speak only 11 Mbps maximum which was then upgraded to 54 Mbps with the 802.11g standard.  Wifi came with built-in encryption at first called WEP but the implementation of this [[cryptography]] was breakable.  It should be noted that all Wifi should be encrypted with [[ipsec]] to ensure additional security.&lt;br /&gt;
&lt;br /&gt;
=== PPPoE ===&lt;br /&gt;
&lt;br /&gt;
[[PPP]] over Ethernet is a hack of protocol spoken with most DSL home end-user connections.  It is covered in [[RFC]] 2516 and involves packet encasulation, a packet within a packet. As a result a PPPoE user will often have to dumb down their [[MTU]] and/or [[MRU]] settings. Although the default is usually 1500, this author has the following in his ppp.conf:&lt;br /&gt;
 set mru 1492&lt;br /&gt;
 set mtu 1452&lt;br /&gt;
as the best setting for his PPPoE sDSL connection.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Full_duplex&amp;diff=766</id>
		<title>Full duplex</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Full_duplex&amp;diff=766"/>
		<updated>2005-10-29T16:51:51Z</updated>

		<summary type="html">&lt;p&gt;Frankk: /* Forcing an interface into full duplex mode */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Full duplex means 2 channels where each channel goes in the opposite direction of the other.  What this means is that at 100 Mbps full duplex you can send 100 Mbps of data and receive 100 Mbps of data for an aggregate of 200 Mbps.  Collisions in full duplex cannot happen.  [[Ethernet]] [[switch]]es are full-duplex most of the time.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Forcing an interface into full duplex mode ===&lt;br /&gt;
&lt;br /&gt;
In [[OpenBSD]] you can see the media modes of an interface with the [[ifconfig]] command:&lt;br /&gt;
&lt;br /&gt;
 $ ifconfig -m [[variables|$xl0]]&lt;br /&gt;
 xl0: flags=8843&amp;lt;UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST&amp;gt; mtu 1500&lt;br /&gt;
        lladdr 00:60:08:5a:86:82&lt;br /&gt;
        media: Ethernet 100baseTX full-duplex&lt;br /&gt;
        status: no carrier&lt;br /&gt;
        supported media:&lt;br /&gt;
                media none&lt;br /&gt;
                media 10baseT&lt;br /&gt;
                media 10baseT mediaopt full-duplex&lt;br /&gt;
                media 100baseTX&lt;br /&gt;
                media 100baseTX mediaopt full-duplex&lt;br /&gt;
                media autoselect&lt;br /&gt;
        inet 172.16.2.2 netmask 0xfffffe00 broadcast 172.16.3.255&lt;br /&gt;
        inet6 fe80::260:8ff:fe5a:8682%xl0 prefixlen 64 scopeid 0x2&lt;br /&gt;
&lt;br /&gt;
To set it to full duplex you would type:&lt;br /&gt;
&lt;br /&gt;
 $ ifconfig [[variables|$xl0]] media 100baseTX mediaopt full-duplex&lt;br /&gt;
&lt;br /&gt;
In [[Linux]] you&#039;d use [[mii-tool]] to see the duplex setting of an interface.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Mtime&amp;diff=795</id>
		<title>Mtime</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Mtime&amp;diff=795"/>
		<updated>2005-10-28T22:04:18Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Time of last modification of a file, the information is taken from the [[inode]].&lt;br /&gt;
&lt;br /&gt;
 $ stat -s [[variables|$file]] | tr &#039; &#039; &#039;\n&#039; | grep mtime&lt;br /&gt;
 st_mtime=1130490970&lt;br /&gt;
 $ date -r 1130490970&lt;br /&gt;
 Fri Oct 28 11:16:10 CEST 2005&lt;br /&gt;
 $ ls -lT [[variables|$file]]&lt;br /&gt;
 -rw-r--r--  1 root  wheel  33554432 Oct 28 11:16:10 2005 file&lt;br /&gt;
&lt;br /&gt;
If a file has been modified the mtime will change to that date.  The mtime can be changed in a file:&lt;br /&gt;
&lt;br /&gt;
 # date -r 0&lt;br /&gt;
 Thu Jan  1 01:00:00 CET 1970&lt;br /&gt;
 # touch -mt 197001010100.01 [[variables|$file]]&lt;br /&gt;
 # ls -lT [[variables|$file]]                    &lt;br /&gt;
 -rw-r--r--  1 root  wheel  33554432 Jan  1 01:00:01 1970 file&lt;br /&gt;
&lt;br /&gt;
When a files mtime is changed the [[ctime]] will update naturally to the date when this happened.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Mtime&amp;diff=485</id>
		<title>Mtime</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Mtime&amp;diff=485"/>
		<updated>2005-10-28T22:04:06Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Time of last modification of a file, the information is taken from the [[inode]].&lt;br /&gt;
&lt;br /&gt;
 $ stat -s [[variables|$file]] | tr &#039; &#039; &#039;\n&#039; | grep mtime&lt;br /&gt;
 st_mtime=1130490970&lt;br /&gt;
 $ date -r 1130490970&lt;br /&gt;
 Fri Oct 28 11:16:10 CEST 2005&lt;br /&gt;
 $ ls -lT [[variables|$file]]&lt;br /&gt;
 -rw-r--r--  1 root  wheel  33554432 Oct 28 11:16:10 2005 file&lt;br /&gt;
&lt;br /&gt;
If a file has been modified the mtime will change to that date.  The mtime can be changed in a file:&lt;br /&gt;
&lt;br /&gt;
 # date -r 0&lt;br /&gt;
 Thu Jan  1 01:00:00 CET 1970&lt;br /&gt;
 # touch -mt 197001010100.01 $file&lt;br /&gt;
 # ls -lT $file                     &lt;br /&gt;
 -rw-r--r--  1 root  wheel  33554432 Jan  1 01:00:01 1970 file&lt;br /&gt;
&lt;br /&gt;
When a files mtime is changed the [[ctime]] will update naturally to the date when this happened.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Atime&amp;diff=481</id>
		<title>Atime</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Atime&amp;diff=481"/>
		<updated>2005-10-28T19:43:55Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Time of last access of a file, the information is taken from the [[inode]], only if the [[filesystem]] doesn&#039;t have the noatime option.&lt;br /&gt;
&lt;br /&gt;
 $ stat -s [[variables|$file_or_diskname]] | tr &#039; &#039; &#039;\n&#039; | grep atime&lt;br /&gt;
 st_atime=1130490958&lt;br /&gt;
 $ date -r 1130490958&lt;br /&gt;
 Fri Oct 28 11:15:58 CEST 2005&lt;br /&gt;
 $ ls -luT disk&lt;br /&gt;
 -rw-r--r--  1 root  wheel  33554432 Oct 28 11:15:58 2005 disk&lt;br /&gt;
&lt;br /&gt;
It can be helpful reading the atime of a script to see when it was last run.  Perhaps an rc script to see when a service was started/stoppped/restarted.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Ctime&amp;diff=483</id>
		<title>Ctime</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Ctime&amp;diff=483"/>
		<updated>2005-10-28T19:43:38Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Time of last change of the [[inode]].  This time is taken from the [[inode]] itself.&lt;br /&gt;
&lt;br /&gt;
 $ stat -s [[variables|$file_or_diskname]] | tr &#039; &#039; &#039;\n&#039; | grep ctime&lt;br /&gt;
 st_ctime=1130490970&lt;br /&gt;
 $ date -r 1130490970&lt;br /&gt;
 Fri Oct 28 11:16:10 CEST 2005&lt;br /&gt;
 $ ls -lcT disk&lt;br /&gt;
 -rw-r--r--  1 root  wheel  33554432 Oct 28 11:16:10 2005 disk&lt;br /&gt;
&lt;br /&gt;
Usually when the [[mtime]] gets updated the [[ctime]] will be updated as well for example when the file size changes this has to be reflected in the [[inode]].&lt;br /&gt;
&lt;br /&gt;
The ctime is also a good place to check for new files written or updated in your system in the last few days (2 in this example)&lt;br /&gt;
&lt;br /&gt;
 $ find . -ctime -2 -print | wc -l&lt;br /&gt;
      38&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Mtime&amp;diff=482</id>
		<title>Mtime</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Mtime&amp;diff=482"/>
		<updated>2005-10-28T19:43:20Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Time of last modification of a file, the information is taken from the [[inode]].&lt;br /&gt;
&lt;br /&gt;
 $ stat -s [[variables|$file_or_diskname]] | tr &#039; &#039; &#039;\n&#039; | grep mtime&lt;br /&gt;
 st_mtime=1130490970&lt;br /&gt;
 $ date -r 1130490970&lt;br /&gt;
 Fri Oct 28 11:16:10 CEST 2005&lt;br /&gt;
 $ ls -lT disk&lt;br /&gt;
 -rw-r--r--  1 root  wheel  33554432 Oct 28 11:16:10 2005 disk&lt;br /&gt;
&lt;br /&gt;
If a file has been modified the mtime will change to that date.  The mtime can be changed in a file:&lt;br /&gt;
&lt;br /&gt;
 # date -r 0&lt;br /&gt;
 Thu Jan  1 01:00:00 CET 1970&lt;br /&gt;
 # touch -mt 197001010100.01 disk&lt;br /&gt;
 # ls -lT disk                     &lt;br /&gt;
 -rw-r--r--  1 root  wheel  33554432 Jan  1 01:00:01 1970 disk&lt;br /&gt;
&lt;br /&gt;
When a files mtime is changed the [[ctime]] will update naturally to the date when this happened.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Mtime&amp;diff=478</id>
		<title>Mtime</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Mtime&amp;diff=478"/>
		<updated>2005-10-28T19:43:01Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Time of last modification of a file, the information is taken from the [[inode]].&lt;br /&gt;
&lt;br /&gt;
 $ stat -s [[variables|$disk]] | tr &#039; &#039; &#039;\n&#039; | grep mtime&lt;br /&gt;
 st_mtime=1130490970&lt;br /&gt;
 $ date -r 1130490970&lt;br /&gt;
 Fri Oct 28 11:16:10 CEST 2005&lt;br /&gt;
 $ ls -lT disk&lt;br /&gt;
 -rw-r--r--  1 root  wheel  33554432 Oct 28 11:16:10 2005 disk&lt;br /&gt;
&lt;br /&gt;
If a file has been modified the mtime will change to that date.  The mtime can be changed in a file:&lt;br /&gt;
&lt;br /&gt;
 # date -r 0&lt;br /&gt;
 Thu Jan  1 01:00:00 CET 1970&lt;br /&gt;
 # touch -mt 197001010100.01 disk&lt;br /&gt;
 # ls -lT disk                     &lt;br /&gt;
 -rw-r--r--  1 root  wheel  33554432 Jan  1 01:00:01 1970 disk&lt;br /&gt;
&lt;br /&gt;
When a files mtime is changed the [[ctime]] will update naturally to the date when this happened.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Atime&amp;diff=480</id>
		<title>Atime</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Atime&amp;diff=480"/>
		<updated>2005-10-28T19:42:41Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Time of last access of a file, the information is taken from the [[inode]], only if the [[filesystem]] doesn&#039;t have the noatime option.&lt;br /&gt;
&lt;br /&gt;
 $ stat -s [[variables|$disk]] | tr &#039; &#039; &#039;\n&#039; | grep atime&lt;br /&gt;
 st_atime=1130490958&lt;br /&gt;
 $ date -r 1130490958&lt;br /&gt;
 Fri Oct 28 11:15:58 CEST 2005&lt;br /&gt;
 $ ls -luT disk&lt;br /&gt;
 -rw-r--r--  1 root  wheel  33554432 Oct 28 11:15:58 2005 disk&lt;br /&gt;
&lt;br /&gt;
It can be helpful reading the atime of a script to see when it was last run.  Perhaps an rc script to see when a service was started/stoppped/restarted.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Atime&amp;diff=476</id>
		<title>Atime</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Atime&amp;diff=476"/>
		<updated>2005-10-28T19:41:57Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Time of last access of a file, the information is taken from the [[inode]], only if the [[filesystem]] doesn&#039;t have the noatime option.&lt;br /&gt;
&lt;br /&gt;
 $ stat -s [[variable|$disk]] | tr &#039; &#039; &#039;\n&#039; | grep atime&lt;br /&gt;
 st_atime=1130490958&lt;br /&gt;
 $ date -r 1130490958&lt;br /&gt;
 Fri Oct 28 11:15:58 CEST 2005&lt;br /&gt;
 $ ls -luT disk&lt;br /&gt;
 -rw-r--r--  1 root  wheel  33554432 Oct 28 11:15:58 2005 disk&lt;br /&gt;
&lt;br /&gt;
It can be helpful reading the atime of a script to see when it was last run.  Perhaps an rc script to see when a service was started/stoppped/restarted.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Solaris&amp;diff=1879</id>
		<title>Solaris</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Solaris&amp;diff=1879"/>
		<updated>2005-10-28T19:31:57Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Solaris is a UNIX operating system made at [[Sun Microsystems]].  Before version 2 it was BSD based, after version 2 it was based on [[SVR4]]. The current version is [[Solaris_10]]. It works on x86 (PC) hardware but is more commonly found on [http://www.sparc.com/ Sparc] hardware.&lt;br /&gt;
&lt;br /&gt;
I&#039;ll never understand why they don&#039;t add a little more to the single &amp;quot;hostname&amp;quot; binary for example, so that when you run &amp;quot;hostname foo&amp;quot; it would update the +5 neccesary files that need touched to change ones hostname. You might want to try &lt;br /&gt;
&lt;br /&gt;
 sys-unconfig&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Atime&amp;diff=475</id>
		<title>Atime</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Atime&amp;diff=475"/>
		<updated>2005-10-28T17:19:54Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Time of last access of a file, the information is taken from the [[inode]], only if the [[filesystem]] doesn&#039;t have the noatime option. Please change the $disk [[variable]].&lt;br /&gt;
&lt;br /&gt;
 $ stat -s $disk | tr &#039; &#039; &#039;\n&#039; | grep atime&lt;br /&gt;
 st_atime=1130490958&lt;br /&gt;
 $ date -r 1130490958&lt;br /&gt;
 Fri Oct 28 11:15:58 CEST 2005&lt;br /&gt;
 $ ls -luT disk&lt;br /&gt;
 -rw-r--r--  1 root  wheel  33554432 Oct 28 11:15:58 2005 disk&lt;br /&gt;
&lt;br /&gt;
It can be helpful reading the atime of a script to see when it was last run.  Perhaps an rc script to see when a service was started/stoppped/restarted.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Ethernet&amp;diff=497</id>
		<title>Ethernet</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Ethernet&amp;diff=497"/>
		<updated>2005-10-28T09:03:45Z</updated>

		<summary type="html">&lt;p&gt;Frankk: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Ethernet is a method for communication also called CSMA/CD (carrier sense, media access / collision detect).  It was developed at DEC first.  It was cheaper than [[token ring]] for a Local Area Network ([[LAN]]) so it became the industrial standard.  Ethernet has historically been used on copper cabling up to Gigabit speeds, but fibre-optic cabling is becoming very popular especially at Gigabit speeds.  When ethernet is in a half-duplex setting (possibly connected to a [[hub]]) collisions can occur when two or more NICS broadcast at the same time.  When a collission is detected a NIC will back off a random amount of time and try again, because the other cards also back off a random amount of time the odds are low that they will collide again.  Today [[hub]]s are not used anymore but [[switch]]es which eliminate the need to put cards in [[half duplex]] mode.&lt;br /&gt;
If you only have one network card,&lt;br /&gt;
 # /sbin/ifconfig -a | grep media&lt;br /&gt;
 media: Ethernet autoselect (100baseTX &amp;lt;full-duplex&amp;gt;)&lt;br /&gt;
should show you what your network card is currently running at. If you have multiple cards, or are not getting the anticipated response, just try &lt;br /&gt;
 # /sbin/ifconfig -a&lt;br /&gt;
&lt;br /&gt;
On [[BSD]], once you&#039;ve determined your network device you can see what options it has in section 4 of the [[Manual]]. In this case I&#039;m using sis0:&lt;br /&gt;
 man 4 sis&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Thinnet &amp;amp; Thicknet ===&lt;br /&gt;
----&lt;br /&gt;
=== 10base2 ===&lt;br /&gt;
&lt;br /&gt;
Called Thin-net or Cheapernet.  Today this is not used anymore.&lt;br /&gt;
&lt;br /&gt;
=== 10base5 ===&lt;br /&gt;
&lt;br /&gt;
Uses coaxial cable for a range of 500 meters without repeaters.  Today this is not used anymore.&lt;br /&gt;
&lt;br /&gt;
=== Twisted Pair &amp;amp; Fibre optics ===&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== 10baseT Ethernet ===&lt;br /&gt;
&lt;br /&gt;
Has a bandwidth of 10 Mbps (Mega bit per second).  It can work in [[full duplex]] and [[half duplex]] mode.  The maximum length of one copper ethernet cable between 2 NIC&#039;s is 100 meters, 200 meters if a ethernet repeater is used, which boosts the signal. &lt;br /&gt;
&lt;br /&gt;
=== 100baseT Fast Ethernet ===&lt;br /&gt;
&lt;br /&gt;
Has a bandwidth of 100 Mbps.  It can work in [[full duplex]] and [[half duplex]] mode.  The maximum length between 2 NICS is the same as 10 Mbps ethernet.&lt;br /&gt;
&lt;br /&gt;
=== 1000baseT Gigabit Ethernet ===&lt;br /&gt;
&lt;br /&gt;
Has a bandwidth of 1000 Mbps.  It can work in [[full duplex]] and [[half duplex]] mode.&lt;br /&gt;
&lt;br /&gt;
=== 10 Gigabit Ethernet ===&lt;br /&gt;
&lt;br /&gt;
Has a bandwidth of 10 Gbps (Giga bit per second).  It probably works in [[full duplex]] mode.&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
=== Twisted Pair Copper Cabling ===&lt;br /&gt;
&lt;br /&gt;
Ethernet copper cabling also called Twisted Pair cabling is composed of 4 pairs of copper wire which are twisted between the pairs and also twisted around in their plastic protective coating. The twist is to ensure shielding which is questionable.  The ends of ethernet cabling are connectors called RJ-45 bits.  The individual wires are colour coded and are visible in the RJ-45 connector from the top.  The most common sequence is 1. green-white 2. green 3. orange-white 4. blue  5. blue-white 6. orange  7. brown-white 8. brown.  This is the setup on both ends for what is called a straight-thru cable.  The only wires actually used are positions 1, 2, 3 and 6.  When you want to connect 2 ethernet cards directly without use of a [[hub]] or [[switch]] you require a cable that is crossed-over or a cross-over cable.  This is called so because positions 1 and 3 and 2 and 6 are crossed, so the end of the crossed end looks like this 1. orange-white 2. orange 3. green-white  4. blue  5. blue-white 6. green 7. brown-white 8. brown.  The most common type of cabling for ethernet is category 5 cabling although there is category 5e now for gigabit.  To attach the RJ-45 bits to the cabling a special tool called a RJ-45 crimper is used.  Cheap version s are about $30 (CA) at cabling surplus stores.&lt;br /&gt;
&lt;br /&gt;
=== Wireless LAN ===&lt;br /&gt;
&lt;br /&gt;
WLAN also called Wifi was first developed at Lucent with their Wavelan product.  It is a standard based around IEEE 802.11b and g.  At first Wifi could speak only 11 Mbps maximum which was then upgraded to 54 Mbps with the 802.11g standard.  Wifi came with built-in encryption at first called WEP but the implementation of this [[cryptography]] was breakable.  It should be noted that all Wifi should be encrypted with [[IPsec]] to ensure additional security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== PPPoE ===&lt;br /&gt;
&lt;br /&gt;
[[PPP]] over Ethernet is a hack of protocol spoken with most DSL home end-user connections.  It is covered in [[RFC]] 2516 and involves packet encasulation, a packet within a packet. As a result a PPPoE user will often have to dumb down their [[MTU]] and/or [[MRU]] settings. Although the default is usually 1500, this author has the following in his ppp.conf:&lt;br /&gt;
 set mru 1492&lt;br /&gt;
 set mtu 1452&lt;br /&gt;
as the best setting for his PPPoE sDSL connection.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
	<entry>
		<id>https://hackepedia.org/index.php?title=Firefox&amp;diff=664</id>
		<title>Firefox</title>
		<link rel="alternate" type="text/html" href="https://hackepedia.org/index.php?title=Firefox&amp;diff=664"/>
		<updated>2005-10-28T08:54:58Z</updated>

		<summary type="html">&lt;p&gt;Frankk: /* Ad blocking */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Ad blocking ==&lt;br /&gt;
&lt;br /&gt;
Sick of seeing advertisements on webpages? It&#039;s very easy to combat this with the [http://adblock.mozdev.org adblock plugin]. If you attempt to download/install it and it fails, with a beige bar appearing across the top of your browser, and a tab on the far right of that bar that reads &amp;quot;Edit options&amp;quot;, choose &amp;quot;Allow&amp;quot; and then &amp;quot;Okay&amp;quot; and then you should be able to install it okay.&lt;br /&gt;
&lt;br /&gt;
If you don&#039;t want to wait while you build your own adblock rules, do a search for &amp;quot;adblock rules&amp;quot; online and download that list to your desktop. Once you&#039;ve restarted firefox, hit SHIFT+CTRL+P (or go to Tools -&amp;gt; Adblock -&amp;gt; Preferences) and select &amp;quot;Adblock options&amp;quot; where you will see an option to &amp;quot;import filters&amp;quot;. Use this on the adblock.txt you found from your &amp;quot;adblock rules&amp;quot; search and you should be set now. Go to your favourite ad loving website and see if you can see any banners.&lt;br /&gt;
&lt;br /&gt;
Anytime you see a banner on a website now, you can simply right click on the banner and choose to adblock the image. You can also use [[wildcards]] in adblock rules which is very handy as you may have noticed in your adblock rules.&lt;br /&gt;
&lt;br /&gt;
 *adserver* &lt;br /&gt;
&lt;br /&gt;
is one of my rules for example, which blocks any file with the word adserver in the URL.&lt;br /&gt;
&lt;br /&gt;
== Remove lockfile ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you&#039;re forced to kill firefox, or it crashes, it will often leave a &amp;quot;hidden&amp;quot; lock file around. You will know this has happened when you open firefox and a window opens up asking if you want to to use &amp;quot;Default profile&amp;quot; or not.&lt;br /&gt;
&lt;br /&gt;
 find ~/.moz* -depth -name lock&lt;br /&gt;
&lt;br /&gt;
This should find the lock file for you. If it has, then you can add | xargs rm to the end to remove it.&lt;br /&gt;
&lt;br /&gt;
 find ~/.moz* -depth -name lock | xargs rm&lt;br /&gt;
&lt;br /&gt;
and now you can open firefox as per normal now.&lt;/div&gt;</summary>
		<author><name>Frankk</name></author>
	</entry>
</feed>