Disk Hacks Introduction: Hacks #40-57 Hack 40

Total Page:16

File Type:pdf, Size:1020Kb

Disk Hacks Introduction: Hacks #40-57 Hack 40 < Day Day Up > PC Hacks By Jim Aspinwall Publisher: O'Reilly Pub Date: October 2004 ISBN: 0-596-00748-5 Pages: 320 Table of • Contents • Index • Reviews Reader Covering both Windows and Linux, PC Hacks combines the bestselling • Reviews Hacks series style with the world's most popular computing hardware. • Errata Hacks for enhancing performance and preventing problems with your PC • Academic include overclocking CPU and video cards, tweaking RAM timing, selecting PC Hacks for the best performing components, and more. The guide includes advice on • Windows reusing an old PC to off-load work from newer systems as well as ways to PC Hacks for prevent security hacks. • Linux < Day Day Up > < Day Day Up > PC Hacks By Jim Aspinwall Publisher: O'Reilly Pub Date: October 2004 ISBN: 0-596-00748-5 Pages: 320 Table of • Contents • Index • Reviews Reader • Reviews • Errata • Academic PC Hacks for • Windows PC Hacks for • Linux Copyright Credits About the Author Contributors Acknowledgments Preface Why PC Hacks? How to Use This Book How This Book Is Organized Conventions Using Code Examples Disclaimer How to Contact O'Reilly Got a Hack? Chapter 1. Basic System Board Hacks Introduction: Hacks #1-10 Hack 1. Lock Others Out of Your Computer Hack 2. Bypass the BIOS Password Hack 3. Recover a BIOS That Won't Boot Hack 4. Boot Faster Hack 5. Display a Boot-Time Graphic Hack 6. Configure Boot Device Order Hack 7. Set Your Clock Back Hack 8. Avoid the Legacy USB Option Hack 9. Hack an Unhackable BIOS Hack 10. Upgrade Your Flash BIOS Chapter 2. Basic System Board Setup Introduction: Hacks #11-18 Hack 11. Step Away from the Legacy Device Hack 12. Manage Devices Hack 13. Configure Serial Ports Hack 14. Configure Parallel Ports Hack 15. Configure Sound Cards Hack 16. Configure SCSI Host Adapters Hack 17. Configure Network Cards Hack 18. Reeducate Plug and Play Chapter 3. CPU Hacks Hacks #19-29 Hack 19. Get More Power Hack 20. Identify Your CPU Hack 21. Which CPUs Are Hackable? Hack 22. Which System Boards Are Hackable? Hack 23. Determine Your CPU Speed Hack 24. Keep It Cool Hack 25. Control CPU Clock Speed from the BIOS Hack 26. As Goes Voltage, So Goes Speed Hack 27. Set the CPU Multiplier Hack 28. Unlock Your CPU Multiplier Hack 29. Check the Vents Chapter 4. Memory Hacks Introduction: Hacks #30-39 Hack 30. Install More RAM Hack 31. Recognize Memory Limitations Hack 32. Install the RAM Your Operating System Needs Hack 33. Tame the Windows 95 and 98 Cache Hack 34. Manage the Paging File Hack 35. Manage Windows System Resources Hack 36. Force Windows 98 and Me to Swap Less Hack 37. Pin the Kernel in RAM Hack 38. Speed Up Your RAM Hack 39. Enable Memory Interleave for Via Chipsets Chapter 5. Disk Hacks Introduction: Hacks #40-57 Hack 40. Partition and Format Wisely Hack 41. Determine Your Filesystem Hack 42. Create a New Partition with NT, 2000, XP, and 2003 Hack 43. Create a New Partition with PartitionMagic Hack 44. Merge Partitions with PartitionMagic Hack 45. Convert FAT to NTFS Hack 46. Create or Delete NTFS Partitions from the Recovery Console Hack 47. Fix the Master Boot Record on FAT Partitions Hack 48. Fix the Master Boot Record on NTFS Partitions Hack 49. Fix the Partition Boot Sector on NTFS Partitions Hack 50. Fix GRUB or LILO Boot Problems Hack 51. Format Your Disk Hack 52. Change Logical Drive Letters Hack 53. Restore DOS Bootability Hack 54. Rescue a Blown 2000 or XP Installation Hack 55. Fix the Windows 95 File-Caching Bug Hack 56. Avoid the Delayed-Write-Caching Blues Hack 57. Detect Drive Failure Before It Happens Chapter 6. Disk Drive Performance Hacks Introduction: Hacks #58-67 Hack 58. Choose the Fastest Hard Drive Hack 59. Use an 80-Wire Cable Hack 60. Upgrade Your IDE Interface Hack 61. Kick It Up a Notch with Serial ATA Hack 62. Get the Fastest IDE Driver for Intel Chipsets Hack 63. Get the Fastest IDE Driver for Via Chipsets Hack 64. Speed It Up with RAID Hack 65. Speed Up DOS with SMARTDRV Hack 66. Speed Up Windows with VCACHE Hack 67. Linux's Drive Performance Booster Chapter 7. Video Hacks Introduction: Hacks #68-74 Hack 68. Get off the PCI Bus Hack 69. Upgrade from Built-in Video Hack 70. Don't Expect Much from AGP Aperture Size Hack 71. Choose the Correct AGP Mode Hack 72. Overclock Your nVidia Adapter Hack 73. Overclock Your ATI Radeon Hack 74. Overclock Anything Chapter 8. I/O Device Hacks Introduction: Hacks #75-84 Basic PC Configuration Rules Hack 75. Let Windows Tell You About I/O Card Conflicts Hack 76. Break the Rules with LPT Ports Hack 77. Break the Rules with COM Ports Hack 78. Rewire Your COM Ports Hack 79. Boost COM Port Performance Hack 80. New Uses for an Old Port Hack 81. Use USB for Peer-to-Peer Networking Hack 82. Get the Most out of USB Hack 83. Install the Driver Before You Install the Hardware Hack 84. Please Continue Anyway Chapter 9. Boot-Up Hacks Introduction: Hacks #85-94 Hack 85. Make a Bare Disk Bootable Hack 86. Configure a Multiboot System Hack 87. Multiboot with Third-Party Utilities Hack 88. Speed up Operating System Installation and Maintenance Hack 89. Access NTFS Files from Other Operating Systems Hack 90. Give Your XP Installation Access to the Recovery Console Hack 91. Hack the Windows 95/98/Me DOS Startup Hack 92. Hack the MS-DOS Configuration File Hack 93. Hack the MS-DOS Startup File Hack 94. Hack the Windows NT/2000/XP Boot Loader Chapter 10. Configuring a New PC Introduction: Hacks #95-100 Hack 95. Clone Your Hard Disk Hack 96. Move Applications and Settings from One PC to Another Hack 97. Protect Your PC from Viruses Hack 98. Protect Your PC from Malware Hack 99. Surround Yourself with a Firewall Hack 100. Do Your Backups Colophon Index < Day Day Up > < Day Day Up > Copyright © 2005 O'Reilly Media, Inc. All rights reserved. Printed in the United States of America. Published by O'Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O'Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or [email protected]. Copyright © 2005 O'Reilly Media, Inc. All rights reserved. Printed in the United States of America. Published by O'Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O'Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or [email protected]. Nutshell Handbook, the Nutshell Handbook logo, and the O'Reilly logo are registered trademarks of O'Reilly Media, Inc. The Hacks series designations, PC Hacks, the image of a screwdriver, "Hacks 100 Industrial-Strength Tips and Tools," and related trade dress are trademarks of O'Reilly Media, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O'Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. Small print: The technologies discussed in this publication, the limitations on these technologies that technology and content owners seek to impose, and the laws actually limiting the use of these technologies are constantly changing. Thus, some of the hacks described in this publication may not work, may cause unintended harm to systems on which they are used, or may not be consistent with applicable user agreements. Your use of these hacks is at your own risk, and O'Reilly Media, Inc. disclaims responsibility for any damage or expense resulting from their use. In any event, you should take care that your use of these hacks does not violate any applicable laws, including copyright laws. < Day Day Up > < Day Day Up > Credits About the Author Contributors Acknowledgments < Day Day Up > < Day Day Up > About the Author Jim Aspinwall is the coauthor and author of four books about computers and networking. His writing spans not only books but feature articles and how-to columns for a handful of PC magazines and web sites, including Computer User, PC World, and CNET.com. His journey into the digital world began at a humble grass roots, learning the nuances of bits and bytes as a communications system and field service engineer when raw logic was truly raw logic in the 70s and the 8008 processor was programmed with paper tape and Teletype machines. From cross-country, arm-lengthening toolbox- toting he moved to more desktop- and keyboard-bound roles in support engineering helping transition minicomputer and microcomputer systems from research labs through production to customers. Acquiring his first "turbo XT" PC in 1986 and totally baffled by a blank DOS prompt, he sought out the mentoring of a good friend to lead him gently into the PC abyss from where he has yet to surface. That mentoring led to his first collaborative work about PCs published in 1990, to his first COMDEX experience, and to his first real job working with PCs full-time for DiagSoft: supporting, testing, and marketing PC diagnostic software.
Recommended publications
  • Systems Programmer, Heal Thy PC Part 2: Tune-Up Time Session
    Systems Programmer, Heal Thy PC Part 2: Tune-Up Time Session 10254, Thursday, March 15, 2012 James Willette, Sunrise e-Services Victor Freyer, Lemon Bay Computer Service Do-It-Yourself PC Tune-Up • Why do it yourself? • Personal privacy • Can’t live without your computer • Sense of accomplishment • Second career? • The Geek Squad™ wants to charge what!? • What do you need? • A plan • A toolkit full of free tools Simple 15-Step Process • Boot to Windows • Remove unneeded • Shutdown Windows programs from startup • Evaluate hard drive health • Remove Internet Explorer • Backup Windows partition toolbars • • Virus review and removal Remove temporary files • • Correct file system errors Defragment Windows • partition Windows System File • Checker Update system BIOS • • Uninstall unnecessary Update programs programs • Install anti-virus software Boot and Shutdown • Computer must not be Suspended or Hibernating • Likelihood of corrupting your file system • Benchmark startup time • So you can compare when you’re done • Shutdown to insure a clean file system close • Save yourself from problems later Evaluate Hard Drive Health • Boot SystemRescueCD • Download the live Linux cd www.sysresccd.org • Burn with isorecorder.alexfeinman.com • Review hard drive SMART statistics • smartctl -a /dev/sda • Run SMART self test • smartctl -t short /dev/sda • smartctl -l selftest /dev/sda SMART Statistics • smartctl -a /dev/sda Model Family: Western Digital Scorpio family Device Model: WDC WD800BEVE-00UYT0 Serial Number: WD-WXE408L96343 Firmware Version: 01.04A01 User Capacity: 80,026,361,856 bytes ... SMART Attributes Data Structure revision number: 16 Vendor Specific SMART Attributes with Thresholds: ID# ATTRIBUTE_NAME FLAG VALUE WORST THRESH TYPE UPDATED WHEN_FAILED RAW_VALUE ..
    [Show full text]
  • MSI Afterburner V4.6.4
    MSI Afterburner v4.6.4 MSI Afterburner is ultimate graphics card utility, co-developed by MSI and RivaTuner teams. Please visit https://msi.com/page/afterburner to get more information about the product and download new versions SYSTEM REQUIREMENTS: ...................................................................................................................................... 3 FEATURES: ............................................................................................................................................................. 3 KNOWN LIMITATIONS:........................................................................................................................................... 4 REVISION HISTORY: ................................................................................................................................................ 5 VERSION 4.6.4 .............................................................................................................................................................. 5 VERSION 4.6.3 (PUBLISHED ON 03.03.2021) .................................................................................................................... 5 VERSION 4.6.2 (PUBLISHED ON 29.10.2019) .................................................................................................................... 6 VERSION 4.6.1 (PUBLISHED ON 21.04.2019) .................................................................................................................... 7 VERSION 4.6.0 (PUBLISHED ON
    [Show full text]
  • Netinfo 2009-06-11 Netinfo 2009-06-11
    Netinfo 2009-06-11 Netinfo 2009-06-11 Microsoft släppte 2009-06-09 tio uppdateringar som täpper till 31 stycken säkerhetshål i bland annat Windows, Internet Explorer, Word, Excel, Windows Search. 18 av buggfixarna är märkta som kritiska och elva av dem är märkta som viktiga, uppdateringarna finns för både servrar och arbetsstationer. Säkerhetsuppdateringarna finns tillgängliga på Windows Update. Den viktigaste säkerhetsuppdateringen av de som släpptes är den för Internet Explorer 8. Netinfo 2009-06-11 Security Updates available for Adobe Reader and Acrobat Release date: June 9, 2009 Affected software versions Adobe Reader 9.1.1 and earlier versions Adobe Acrobat Standard, Pro, and Pro Extended 9.1.1 and earlier versions Severity rating Adobe categorizes this as a critical update and recommends that users apply the update for their product installations. These vulnerabilities would cause the application to crash and could potentially allow an attacker to take control of the affected system. Netinfo 2009-06-11 SystemRescueCd Description: SystemRescueCd is a Linux system on a bootable CD-ROM for repairing your system and recovering your data after a crash. It aims to provide an easy way to carry out admin tasks on your computer, such as creating and editing the partitions of the hard disk. It contains a lot of system tools (parted, partimage, fstools, ...) and basic tools (editors, midnight commander, network tools). It is very easy to use: just boot the CDROM. The kernel supports most of the important file systems (ext2/ext3/ext4, reiserfs, reiser4, btrfs, xfs, jfs, vfat, ntfs, iso9660), as well as network filesystems (samba and nfs).
    [Show full text]
  • Systems Programmer, Heal Thy PC Part 1: Virus Removal Session
    Systems Programmer, Heal Thy PC Part 1: Virus Removal Session 10255, Tuesday, March 13, 2012 James Willette, Sunrise e-Services Victor Freyer, Lemon Bay Computer Service Disclaimer • I use “virus” to refer to the whole class of malware that may infect your PC. • Purists would say that virii are programs that spread themselves. • Most of today’s malware is installed by the end user, and by definition is not a virus. Do-It-Yourself Virus Removal • Why do it yourself? • Company has Draconian rules about PC use • Anger and disbelief • Pride • Second career? • The Geek Squad™ wants to charge what!? • What do you need? • Clean boot environment • An eye for what’s unusual • A toolkit full of free tools So you think you have a virus? • Signs of malware • Computer is slow • Click on a Google result and go to some unrelated page • Lots of “undeliverable message” alerts in your inbox • “Warning, you have 732 viruses!!!!!” • Unable to run Windows updates • Unable to update your anti-virus program • Unable to connect to the Internet • Excessive TCP connections popup warning • “Do you want to allow this program to run?” So you think you have a virus? • Simple five step process • Turn the machine off – no graceful shutdown • Boot to a clean environment • Back up the boot drive • Disable the virus program • Fix corrupted registry and configuration files Boot to a Clean Envionment • WinBuilder – freeware to build Windows boot disks http://reboot.pro/forum/22 (registration required) • XP, Vista, Windows 7, Windows 8, Driveimage XML • EaseUS Todo Backup
    [Show full text]
  • Clonezilla an Open and Flexible Imaging-Based Architecture for System Deployment
    Clonezilla An Open and Flexible Imaging-based Architecture for System Deployment Steven Shiau, Ceasar Sun, Jazz Wang, Thomas Tsai {steven , ceasar , jazz , thomas }@ nchc . org . tw Free Software Lab NCHC, Taiwan ABSTRACT Clonezilla is an open-source disk imaging and cloning suite. It Saving disk image Restoring disk image is based on Partclone, Partition Image, ntfsclone, and UDPcast Start with features such as plug-ins for subsystems like partitioning and Start a multicast mode for massive deployments. In this research, its Parse partition Find the file table system of Read image open architecture (Figure 1 and 2) and the comparisons (Table 1 device and 2) with other similar software would be presented. NO Create partition table Use dd http://clonezilla.org , http://clonezilla.sourceforge.net/ to save Smart Create LV if LV Find the copying? image Device to image found in (partition stdout image dir FEATURES /LV) YES Decide partclone Free (GPL) Software device YES partimage File systems supported: Ext2/3/4, ReiserFS, Reiser4, XFS, JFS, imaging p p Save Find the Decide n ntfsclone a a engine t MBR/GPT data r Btrfs (testing), HFS+, FAT, NTFS , UFS+ and VMFS (Table 1) f image r t device s t i c c Linux Logical Volume Manager 2 (LVM2) stackable block device of m l imaging l o o Save device device a n n (Table 2) is supported engine g e Save partition image to stdout e e Grub 1 and grub 2 is supported table gzip NO Serial console is supported Decide bzip2 Tune the file compressing lzma Multicast supported in Clonezilla Server Edition (SE) engine lzip system size to fit Save xz partition size Restore the The MBR, partition table, partition(s) or entire disk(s) can be hardware info image of saved and restored Save stdin as Reinstall grub device to Smart copying on supported file systems whereas use sector-to- file in the device sector copying via dd image dir if assigned A tunable image format is implemented (Figure 2) End End Imaging and compressing engines can be easily added Figure 1.
    [Show full text]
  • Linux Based Diskless System Using RSYNC Algorithm
    International Journal of Computer Applications (0975 – 8887) Volume 155 – No 3, December 2016 Linux based Diskless System using RSYNC Algorithm August Anthony N. Balute Dennis B. Gonzales, PhD CAP College Foundation Inc. University of the East Makati, Philippines Manila, Philippines Mateo D. Macalaguing Jr., Ed.D Caroline J. Aga-ab CAP College Foundation Inc. AMA University Makati Philippines Quezon City, Philippines ABSTRACT Centers, Offices, Cybercafe, Karaoke, and can likewise be The objective of this venture is to give a cost effective open utilized as a part of bunch registering. Diskless workstation is source Remote Desktop based registering environment to a PC framework with no plate drives introduced locally along clients by utilizing Virtualization Technology and existing these lines booting it's working framework from a server in open source programming and apparatuses. In this venture, we the neighborhood. Now and then when a PC framework is have utilized LTSP (Linux Terminal Server Project) to get to having a circle drive yet don't utilizing it that framework is Remote Desktop and Xen hypervisor to give virtual desktop additionally called a diskless workstation. Diskless environment at server. A client gets a customized desktop as a Workstations give less expensive however more secure VM (Virtual Machine) running over remote server. It is not systems administration answers for undertakings. Qualities of the same as the old Remote Desktop arrangements in a route diskless workstations are, the working framework is stacked that rather than a login session on single OS remote server, from the server when booting up. Clearly the various client will get a completely fledged desktop with fancied OS.
    [Show full text]
  • Disk Imaging Technologies
    Disk Imaging Technologies Backup and Restoration Challenges Topics • Manufacture Firmware Changes • File System Landscape – UEFI – Introduction to GUID Partition Table (GPT) – Partitions & Limitations • Imaging Utilities Windows & Linux • Full Disk Encryption • Source Web-Links Manufacture Firmware Changes • Industry push to a new standard: – BIOS vs. UEFI • UEFI is to replace and extend the old BIOS firmware. • UEFI is not a new thing. Intel has been working in EFI/UEFI since mid 1990s, and there are vendors like HP or Apple that provided EFI machines since a long time ago. But it is when Microsoft announced Windows 8 that UEFI became the required way to boot the new certified machines. • Secure boot is an extension of UEFI. One of the key points of UEFI is that it can be extended. UEFI has an internal virtual machine that is independent of the architecture that it is using. The standard accepts special binary files compiled for this virtual machine (EFI binaries) that can be executed inside the environment. These binaries can be device drivers, applications or extensions to the UEFI standard. UEFI, in some sense, is like a small operative system that runs when the machine is powered on and whose main task is to find and load another operating system. Unified Extensible Firmware Interface Unified Extensible Firmware Interface (UEFI) is meant as a replacement for the Basic Input/Output System (BIOS) firmware interface ● Initially (1998) designed by Intel for Itanium processor ● Since 2005 managed by the Unified EFI Forum (uefi.org) Source: http://loadays.org/archives/2013/static/slides/Integrating-UEFI-into-rear.pdf Why UEFI? • BIOS has its (aging) limitations – 16-bit processes – max.
    [Show full text]
  • The Ultimate Guide to Hard Drive Partitioning
    Home SQL Server Cloud Computing Windows Server Cisco Exchange Windows 7 Active Directory Virtualization Forums IT Job Board Get Our FREE Newsletter! Search Site Gain access to white The Ultimate Guide to Hard Drive Partitioning papers, special offers and by Daniel Petri - March 11, 2009 the most recent IT tips! Printer Friendly Version Sponsors Email Address Disk partitioning divides the data storage space of a hard disk into separate areas referred to as Sign Up Now! Windows Application 'partitions'. Partitions are usually created when the hard disk is first being prepared for usage. Once a Monitoring Made Easy disk is divided into partitions, directories and files may be stored on them. Because of later changes on Quick Links the computer and operating system, often an administrator or power user will be faced with the need to Knowledge Base resize partitions, create new partitions in the unallocated space, and sometimes even undelete Take the guesswork out of Backup & Storage partitions that were previously removed or deleted. which WMI counters to use Security for apps like Microsoft® Active Directory Active Directory™ and Cisco and Routing Hard disk partitioning tools will allow you to create additional partitions from existing ones by resizing SharePoint™. SolarWinds Windows Networking FREE WMI Monitor makes it Exchange Server the existing partitions and creating empty, un-used space on which you can create new partitions. The easy! Download this FREE Virtualization desktop tool now! Windows Server 2008 most important aspect of such tools is their ability to do this without losing your data that is currently on Windows 7 your existing partitions.
    [Show full text]
  • 99 Pages to Linux V1.2 Page 1
    99 Pages to™ 99 Pages to Linux v1.2 Page 1 Preface This book is a collection from various online and offline sources. It is assembled from publicly available contents as a free service to the community, and organized in a way that simplifies progressive understanding of Linux fundamentals while keeping it structured for use as a quick reference for your toolset. The contents are independent of distributions and should apply to most Linux systems; however, it is always useful to check man pages from your specific vendor. The trademark “99 Pages to™” is owned by Manceps, Inc. Other than that, NO other copyrights or ownership are claimed by making this text available. Feedback: [email protected] The next 99 pages will take you from absolute beginner to advanced user in 4 easy sections. The detailed table of contents is a quick way to locate information so you can use this as a reference. Click here to skip the table of contents and get right to the book. Now let’s dig right into Linux… 99 Pages to Linux v1.2 Page 2 Table of Contents Preface .......................................................................................................................................................... 2 Introducing bash ......................................................................................................................................... 10 The shell .................................................................................................................................................. 10 Are you running bash? .......................................................................................................................
    [Show full text]
  • Mystwood Manor by Faerin Games Frequently Asked Questions (F.A.Q)
    Mystwood Manor By Faerin Games Frequently Asked Questions (F.A.Q) Introduction: This document will help you install MwM and fix the most common problems you might run into. If the solution to your problem is not listed in this document, please join us on Discord or email me at [email protected]. Q: Where can I download Mystwood Manor? A: For more information about Mystwood Manor or to become a Patron and download your copy today, please visit: https://www.patreon.com/faerin Q: I’m having trouble with my game. Can you help? A: For game-play help or technical support with Mystwood Manor, please visit us on Discord. Q: What are the system requirements? A: Minimum system requirements: Operating system: Windows 7/8.1/10 (recommended). CPU: Dual-Core Intel processor (3.20 GHz) or better. RAM: 4GB or better. HDD Space: at least 5GB. Minimum screen resolution: 1280 x 720 (full screen mode) 720 x 400 (windowed mode) Recommended resolution: 1920 x 1080 (16:9 aspect ratio). GPU: Graphics card with DX10 (shader model 4.0) capabilities (2GB VRAM minimum, 4GB VRAM recommended). Q: “The game won’t load” A1: If you use Nahimic or FMOD for audio boosting, Strix, Aegis 3, Sonic Studio 2, RivaTuner Statistics Server, Portrait Displays\Pivot Software or any Apple products such as QuickTime, these programs will need to be temporarily disabled during your gameplay. A2: If you have to have Citrix installed, open up Control Panel, then run the Device Manager applet. Click the arrow next to “System Devices” and disable “Citrix Virtual Bus Enumerator”.
    [Show full text]
  • Ibm Linux Tutorials
    VISIT… LPI certification 101 (release 2) exam prep, Part 4 Presented by developerWorks, your source for great tutorials ibm.com/developerWorks Table of Contents If you're viewing this document online, you can click any of the topics below to link directly to that section. 1. Before you start......................................................... 2 2. Filesystems, partitions, and block devices ......................... 4 3. Booting the system..................................................... 21 4. Runlevels ................................................................ 25 5. Filesystem quotas...................................................... 28 6. System logs ............................................................. 34 7. Summary and resources .............................................. 38 LPI certification 101 (release 2) exam prep, Part 4 Page 1 of 40 ibm.com/developerWorks Presented by developerWorks, your source for great tutorials Section 1. Before you start About this tutorial Welcome to "Advanced administration," the last of four tutorials designed to prepare you for the Linux Professional Institute's 101 (release 2) exam. In this tutorial (Part 4), we'll bolster your knowledge of advanced Linux administration skills by covering a variety of topics including Linux filesystems, the Linux boot process, runlevels, filesystem quotas, and system logs. This tutorial is particularly appropriate for someone who may be serving as the primary sysadmin for the first time, since we cover a lot of low-level issues that all system administrators should know. If you are new to Linux, we recommend that you start with Part 1 and work through the series from there. For some, much of this material will be new, but more experienced Linux users may find this tutorial to be a great way of "rounding out" their foundational Linux system administration skills and preparing for the next LPI certification level.
    [Show full text]
  • Clonezilla an Open and Flexible Imaging-Based Architecture for System Deployment
    Clonezilla An Open and Flexible Imaging-based Architecture for System Deployment Steven Shiau, Ceasar Sun, Jazz Wang, Thomas Tsai {steven , ceasar , jazz , thomas }@ nchc . org . tw Free Software Lab ABSTRACT NCHC, Taiwan Clonezilla is an open-source disk imaging and cloning Saving disk image Restoring disk image suite. It is based on Partclone, Partition Image, ntfsclone, and Start UDPcast with features such as plug-ins for subsystems like Start partitioning and a multicast mode for massive deployments. In Parse partition Find the file table system of Read image this research, its open architecture (Figure 1 and 2) and the device comparisons (Table 1 and 2) with other similar software would NO Create partition table be presented. Use dd to save Smart Create LV if LV http://clonezilla.org , http://clonezilla.sourceforge.net/ Find the copying? image Device to image found in (partition stdout image dir FEATURES /LV) YES Decide partclone Free (GPL) Software device YES partimage File systems supported: Ext2/3/4, ReiserFS, Reiser4, XFS, imaging p p Save Find the Decide n ntfsclone a a engine t r MBR/GPT data f JFS, Btrfs (testing), HFS+, FAT, NTFS , UFS+ and VMFS image r t device s t i c c of m l (Table 1) imaging l o o Save device device a n n engine g Linux Logical Volume Manager 2 (LVM2) stackable block e Save partition image to stdout e e device (Table 2) is supported table gzip NO Grub 1 and grub 2 is supported Decide bzip2 Tune the file compressing lzma Serial console is supported engine lzip system size to fit Save xz partition size Restore the Multicast supported in Clonezilla Server Edition (SE) hardware info image of The MBR, partition table, partition(s) or entire disk(s) can be Save stdin as device to saved and restored file in the Reinstall grub if assigned device Smart copying on supported file systems whereas use image dir End sector-to-sector copying via dd End A tunable image format is implemented (Figure 2) Imaging and compressing engines can be easily added Figure 1.
    [Show full text]