RISC-V & SiFive – Open Source Meets Hardware

RISC V is open source RISC ( Reduced Instruction Set Computing ) instruction code which can be modified freely and used to try out new Ideas. So far the idea of modification and actually building something out of it  was a expensive preposition until SiFive announced its plan to build processors based on RISC V.

fedora 24 : Top Features You Should Know

Fedora 24  is releasing on June 2 and here are some prominent features of fedora 24  that you should know.

Workstation Features

GNOME 3.20 –  it incorporates many usability improvements like easier input device and printer settings, better search interface, shortcuts for keyboard commands and more convenient music controls.

Bash in Windows 10 : Ten Facts You Must Know

Bash in Windows 10

Bash in Windows : Learn about top 10 must know facts for use and setting the expectation right. 

HeartBleed bug : Frequently Asked questions


What Exactly is HeartBleed bug ?
This bug allows hackers to reads sensitive data from the memory of victim host in 64 k chunks. The memory can have user names , passwords , decrypted information or certificates & keys or other confidential information.

Running Old Internet Explorer Based Applications in ie10

Windows Xp support is stopping on April 8, 2014 and one of the issues is that when you migrate to current Windows operating systems ( windows 8 ) old ie browsers are not supported for installation. Current OS Windows 8 comes with ie 10 and older versions of ie are not supported.
The biggest problem is that many of corporate applications which are designed long back and no longer supported may still need older ie 7 , 8 or 9

cpio ( GNU )

CoPy In Out

Usage: cpio [OPTION…] [destination-directory]
GNU `cpio’ copies files to and from archives

# Copy files named in name-list to the archive
cpio -o < name-list [> archive]
# Extract files from the archive
cpio -i [< archive]
# Copy files named in name-list to destination-directory
cpio -p destination-directory < name-list

Main operation mode:

-i, –extract
Extract files from an archive (run in copy-in
mode) -o, –create Create the archive (run in copy-out mode) -p, –pass-through Run in copy-pass mode

-t, –list Print a table of contents of the input

Operation modifiers valid in any mode:

–block-size=BLOCK-SIZE  Set the I/O block size to BLOCK-SIZE * 512
-B  Set the I/O block size to 5120 bytes
-c  Identical to “-H newc”, use the new (SVR4)
portable format.If you wish the old portable
(ASCII) archive format, use “-H odc” instead.
-C, –io-size=NUMBER  Set the I/O block size to the given NUMBER of
–force-local  Archive file is local, even if its name contains
-f, –nonmatching Only copy files that do not match any of the given patterns
Use this FILE-NAME instead of standard input or output. Optional USER and HOST specify the user and host names in case of a remote archive
-H, –format=FORMAT  Use given archive FORMAT
-M, –message=STRING  Print STRING when the end of a volume of the
backup media is reached
-n, –numeric-uid-gid In the verbose table of contents listing, show
numeric UID and GID
–quiet  Do not print the number of blocks copied
–rsh-command=COMMAND  Use remote COMMAND instead of rsh
-v, –verbose  Verbosely list the files processed
-V, –dot  Print a “.” for each file processed
-W, –warning=FLAG  Control warning display. Currently FLAG is one of
‘none’, ‘truncate’, ‘all’. Multiple options

Operation modifiers valid only in copy-in mode:

-b, –swap  Swap both halfwords of words and bytes of
halfwords in the data. Equivalent to -sS
-r, –rename  Interactively rename files
-s, –swapbytes Swap the bytes of each halfword in the files
-S, –swap-halfwords  Swap the halfwords of each word (4 bytes) in the
–to-stdout  Extract files to standard output

-E, –pattern-file=FILE  Read additional patterns specifying filenames to
extract or list from FILE
–only-verify-crc  When reading a CRC format archive, only verify the
checksum of each file in the archive, don’t
actually extract the files

Operation modifiers valid only in copy-out mode:

-A, –append  Append to an existing archive.
-O [[USER@]HOST:]FILE-NAME Archive filename to use instead of standard  output. Optional USER and HOST specify the user and host names in case of a remote archive

Operation modifiers valid only in copy-pass mode:

-l, –link  Link files instead of copying them, when

Operation modifiers valid in copy-in and copy-out modes:

–absolute-filenames  Do not strip file system prefix components from
the file names
–no-absolute-filenames  Create all files relative to the current

Operation modifiers valid in copy-out and copy-pass modes:

-0, –null  A list of filenames is terminated by a null
character instead of a newline
-a, –reset-access-time  Reset the access times of files after reading
-I [[USER@]HOST:]FILE-NAME  Archive filename to use instead of standard input. Optional USER and HOST specify the user and host
names in case of a remote archive
-L, –dereference  Dereference symbolic links (copy the files
that they point to instead of copying the links).
-R, –owner=[USER][:.][GROUP]  Set the ownership of all files created to the specified USER and/or GROUP

Operation modifiers valid in copy-in and copy-pass modes:

-d, –make-directories  Create leading directories where needed
-m, –preserve-modification-time
Retain previous file modification times when creating files
–no-preserve-owner  Do not change the ownership of the files
–sparse  Write files with large blocks of zeros as sparse
-u, –unconditional  Replace all files unconditionally

-?, –help  give this help list
–usage  give a short usage message
–version  print program version

Mandatory or optional arguments to long options are also mandatory or optional for any corresponding short options.

Report bugs to <[email protected]>.

What is Hadoop ? Facts you must know about Apache Hadoop

Apache hadoop

What Is Hadoop?
Apache Hadoop is an open source software frame work developed by Apache Hadoop Project.
The framework allows distributed data processing spread over a large number of computers.
Hadoop 2.x is the latest version with major changes in its architecture & current release is 2.3.0 , released on 20 February, 2014.

Site Hacked with Pharmacy Spammy Content on search listings

Got a email* today today that adminschoice.com searches on google.com are resulting in pharmacy spammy urls and contents. It took around three hours to find out what is happening and fixing it. Finally the site should be free of spam now. It may take a while to update google index entries but redirect is not happening any more.

Linux & Unix Date Format Examples

Learn about Linux and Unix date & time formating with the help of simple explanation and added example. Date command in Unix & Linux is used to format date as well as time. First portion of this article covers Date  function and the second portion has the  time function covered.

Linux RPMs – All you need to know

This document contains an overview of the principal RPM commands for installing, uninstalling, upgrading, querying, listing, and checking RPM packages on your Red Hat Linux system.
This document uses apache rpm httpd-2.0.49-4.i386.rpm , as an example.

Php Date Format

Date time formatting in PHP
Many scripts written in php need date and time function . PHP has many predfined date formats and you can also customized it as per your need .
Here are some of the date format examples and additional details for php.

ssh Without Password in Few Simple Steps

How to configure passwordless ssh &sftp access in Unix & Linux systems? Follow these simple steps with examples with a basic troubleshooting section at the end. sftp uses underlaying ssh access for authentication and after you establish passwordless ssh access you will have passwordless sftp access as well.

This a real life example of configuring passwordless access for two users . The user ‘web’ in this case needs a secure password less access to another user james in a server ‘devserver’

NISplus Installation & Administration

NISplus is network which allows you to store client information at a
central place where all the clients have access. This enables system
administrators to manage a group of servers from a central place.
This article discusses the nisplus objects, installation of servers ,clients and administration commands.

Strategy for Multiple Choice Certification Exams


  • Take the list of exam objective and study carefully its
  • Organize your study keeping these objectives in mind.

Sample Question – Solaris Certification

Sample Question – Solaris Certification
Following are some sample questions . These are some of the representative questions and is meant to demonstrate the type of question you might expect in Solaris Certification examination and plan your study accordingly. No answers are given out of the belief that anyone preparing for the exam should be able to work it out .