Header Shadow Image


Archive for the 'NIX Posts' Category

Linux LVM: Resizing partitions.

This post is designed as a blind test, meaning its sole purpose is for testing and learning LVM functionality.  In this process we will work with an existing LVM that contains live data to grow, shrink and move it's contents around.  Before we do anything, a disclaimer is in order: DISCLAIMER: Aside from the disclaimer […]

Linux LVM: Recovering a lost volume.

  It may become necessary to recover or rebuild an LVM in case either a backup /etc/lvm/backup/<VOLGROUP> is not available or becomes lost or other conditions arise causing loss of system volume data.  What might otherwise appear destroyed, deleted or inaccessible, LVM comes with a few backup options in case of disaster.  Here are the […]

Red Hat Linux Fedora: Fedora 13 to Fedora 14(64) upgrade.

In this upgrade, I planned to skip a version to see how things go jumping up two levels.  Unfortunately reading this post from The Register about Linus Torvalds had me thinking back to F14 again.  (This brings back fond memories of the KDE 4.0 desktop upgrade issues in F9 that didn't go so well.  I […]

VLC: VideoLAN video player: Failed to connect to the D-Bus session daemon: /bin/dbus-launch terminated abnormally with the following error: No protocol specified

The VLC player is rumoured to be one of the best players to day for playing many different formats including mts and m2ts proprietary SONY formats. (Which just so happens to be the format of my Camcorder movies)  This is the way my camcorder has been saving them in and to date, there are few […]

Linux Wireless Networking Step by Step HowTo

For this howto we will be using the TP-LINK line of USB wireless cards.  More precisely the 54Mbps TL-WN321G and the 300M TL-WN821N adapters otherwise known for running the Atheros Communications, Inc.  Atheros eXtended Range™ technology.  This is an important note because this is how this card will appear under Linux. I find these adapters […]

Linux / Windows Networking: Configuring and securing a router for Wireless and Wired Networks.

Here I would like to take you through the steps to configuring and securing a router (In this case we will use the WRT54G as an example) for your home or small office setup.  Securing a router can be very important especially when the wireless function is enabled.  Likely the most important reason is to […]

Red Hat Linux Fedora: Fedora 12 to Fedora 13 upgrade.

Fedora 13 has been out now since around May 25th, so it's time for the semi annual upgrade.  Unlike with previous versions, I've now switched to the GNOME desktop since I have been finding the KDE desktop to be far less intuitive then it's former competitor and far less responsive.  (As you recall from the […]

Linux: The source of ssh_exchange_identification: Connection closed by remote host

PROBLEM You get this when trying to SSH to a host from some IP (Let's assume it's 111.22.33.44 for the scope of this problem): ssh_exchange_identification: Connection closed by remote host What to do?

Microsoft Word: A delete key that doesn’t delete.

PROBLEM A little tidbit of Windows knowledge.  When highlighting a section of a Microsoft Word document and pressing the delete key, nothing happens.  No errors or messages at all.  Try this to fix it… SOLUTION

Skype configuration problems and resolutions.

Skype is a popular text, video and voice (VoIP) chat client.  A more detailed article can be found on the Wikipedia Skype page.  Here is a list of some of the hurdles I've ran into getting the client to work on my own distribution. PROBLEM Skype for Linux had poor video in the not so […]


     
  Copyright © 2003 - 2025 Tom Kacperski (microdevsys.com). All rights reserved.

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 Unported License

 

The IT Development and Technology Mini Vault | MicroDevSys.com
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.