Skip to main content

Posts

Showing posts from July, 2011

Using GREP in UNIX

How To Use grep Command In Linux / UNIX by  VIVEK GITE  on  AUGUST 2, 2007  ·  147 COMMENTS H ow do I use grep command in Linux? grep command searches the given file for lines containing a match to the given strings or words. By default, grep prints the matching lines. Use grep to search for lines of text that match one or many regular expressions, and outputs only the matching lines. The name, "grep", derives from the command used to perform a similar operation, using the Unix/Linux text editor ed: g/re/p grep command syntax grep 'word' filename grep 'string1 string2' filename cat otherfile | grep 'something' command | grep 'something' Use grep to search file Search /etc/passwd for boo user: $ grep boo /etc/passwd You can force grep to ignore word case i.e match boo, Boo, BOO and all other combination with -i option: $ grep -i "boo" /etc/passwd Use grep recursively You can search recursively i.e. read all files under each

What is an IP address?

Every machine on the  Internet­  has a unique identifying number, called an IP Address. A typical IP address looks like this: 216.27.61.137 To make it easier for us humans to remember, IP addresses are normally expressed in decimal format as a " dotted decimal number " like the one above. But computers communicate in binary form. Look at the same IP address in binary: 11011000.00011011.00111101.10001001 The four numbers in an IP address are called  octets , because they each have eight positions when viewed in binary form. If you add all the positions together, you get 32, which is why IP addresses are considered 32-bit numbers. Since each of the eight positions can have two different states (1 or 0) the total number of possible combinations per octet is 2 8  or 256. So each octet can contain any value between 0 and 255. Combine the four octets and you get 2 32  or a possible 4,294,967,296 unique values! Out of the almost 4.3 billion possible combinations, certain values a

Making Oracle Database XE Server Available to Remote Clients

After you install Oracle Database XE Server, its graphical user interface is only available from the local server, not remotely. Security Note: With remote HTTP access to Oracle Database XE, all information exchanged between the browser and the database is in clear text—that is, unencrypted—including database user names and passwords. If this is cause for concern, do not enable remote HTTP connection to the database. If you want to use a Web browser, follow these steps: Start Oracle Database XE. Click the  Application  menu (on Gnome) or the  K  menu (on KDE), then point to  Oracle Database 10g Express Edition , and then  Go To Database Home Page . In the Database Login page, log in as  SYSTEM , enter the password, and then click  Login . In the Oracle Database XE home page, click  Administration . Under Tasks, click  Manage HTTP Access . Under Manage HTTP Access, select  Available from local server and remove clients . Click  Apply Changes . If you pre

PPPoE vs PPPoA

PPPoE vs PPPoA Many internet users are often plagued with the decision of what kind of protocol to use with their connection. There are many questions, experimentation, and flip-flopping between PPPoE and PPPoA. Unfortunately, many of the confusions hover above these two protocols. Both of these protocols give internet service providers (ISP) the capability to rollout broadband use. Using these protocols gives relative security as it obliges the end-user to verify or authenticate to a server before having network access. PPPoE and PPPoA are mainly used with Digital Subscriber Line (DSL). Both protocols provide flexibility in billing which is very advantageous to providers. Moreover, the use of network resources can be monitored easily and along with this feature, troubleshooting and managing network usage is less problematic. PPPoE is an abbreviation Point-to-Point Protocol over Ethernet and it is a kind of networking protocol that encapsulates PPP frames inside the Ethernet

DOC & DOCX

DOC & DOCX DOC and DOCX are file formats that are used in Microsoft’s Word application; a part of the Microsoft Office productivity suite. The main difference between DOC and DOCX is their current status. The DOC format has been used my Microsoft until the 2003 version of Word. In Word 2007, they introduced the DOCX as the new default format. Users can still revert to using the DOC format if they want to. The single biggest problem with the DOCX format is compatibility as Word 2003 and older version are unable to open DOCX files. This is a major problem when sharing files as not all people update their software with every new version. To solve the problem, Microsoft released a compatibility pack that allows older versions of Office to open the DOCX and other related formats. In DOC, the document is stored in a binary file that also contains the related formatting and other relevant information. On the other hand, a DOCX file is basically a zip file that contains all the XML files

3G and HSDPA

3G and HSDPA 3G is the common name for the third generation of mobile phone technologies. But instead of being a single standard, 3G is composed of multiple technologies that provide the same level of service. HSDPA (High Speed Downlink Packet Access) is a later addition to the 3G technologies to provide better and faster data speeds to subscribers. 3G is an improvement of the older 2G standard and introduces multiple advanced features. The most significant is video calling, which allows the two parties to see each other during the call. Another improvement is the much faster internet connection speeds that are being offered by 3G. But as more people are using the service and the demand for better and faster connection rose, HSDPA was added to 3G. HSDPA does not offer any new features like 3G did, it simply offered a faster connection that the 3G features can take advantage of. HSDPA also provides better latency compared to the older technologies of 3G. Latency is the time betw