/etc/udev/rules/70-persistent-net.rules before you update. If it contains the string ATTRS{address}, edit it so that it becomes ATTR{address}. Now the network configuration will be preserved after the upgrade.
A place for things I might forget - till someone buys me a pensieve.
/etc/udev/rules/70-persistent-net.rules before you update. If it contains the string ATTRS{address}, edit it so that it becomes ATTR{address}. Now the network configuration will be preserved after the upgrade.
case $0 in
-*) # Login shell
;;
*) # non-interactive shell
;;
esac
In csh:
switch ($0)
case -*:
# login shell stuff
breaksw
default:
# non-interactive stuff
breaksw
endsw
eval var2=$"$var1"Turns out a variable indirection feature has been around since bash 2! Sheesh!
var2=${!var1}
is the official way to do this.
Alternately this should also do:
eval var2=\$${var1}
getent passwd username1 [username2 ...]Lookup database entry for an existing group:
getent group groupname1 [groupname2 ...]
lsb_release -i -dor
lsb_release -a
xephyr -query localhost -screen 1280x1024 :1Got a blank screen for my efforts. Grrrr... I ran:
netstat -aunp | grep ":177"only to figure that kdm was listening at port 177 over IPv6! Recalling an old KDE bug, I edited /etc/X11/xdm/Xaccess to read:
LISTEN 0.0.0.0and restarted kdm. That did the trick - phew!
ifconfig eth0 mtu 1492or alternately
ip link set eth0 mtu 1492fixed the problem. Phew! [Hey you newbie network admin types: Set your f/w to allow ICMP unreachable -- fragmentation needed messages. These are type 3, code 4 messages. Don't just blindly block ICMP because you read somewhere that it's unsafe. i.e. in Linux:
iptables -A FORWARD -p icmp --icmp-type fragmentation-needed -j ACCEPT iptables -A INPUT -p icmp --icmp-type fragmentation-needed -j ACCEPT ... iptables -A FORWARD -p icmp -j DROP iptables -A INPUT -p icmp -j DROP]
#!
#
# chkconfig: runlevel startpriority stoppriority
# description: brief, possibly multi-line description \
# follows
#!/bin/bash
#
# Init file for OpenSSH server daemon
#
# chkconfig: 2345 55 25
# description: OpenSSH server daemon
resize2fs program (part of e2fsprogs). While resize2fs could be used to shrink and grow ext3 partitions, the one bundled with e2fsprogs-1.36+ can apparently resize even mounted partitions! Woo hoo!