Archive for the ‘Linux/UNIX/Open Source’ Category

Using cgminer’s OpenCL interface with ATI HD 4850 video card

Wednesday, November 6th, 2013

The problem:  Older versions of AMD’s APP (Accelerated Parallel Processing) OpenCL SDK are recommended for use with older Radeon chipsets, but produce segmentation faults in string handling code or other inoperability when used with newer Linux distributions.  Version 2.4 through 2.6 exhibit the problem.  However, version 2.8 does not support, probably among others, the RV770 chipset used in the HD 4850.

The solution:  Use version 2.7 of AMD’s APP when using cgminer with an ATI HD 4850 video card on current Linux distributions.

Upgrade Cisco Aironet 340/350 16-bit PCMCIA Card WPA Firmware For Linux

Friday, March 29th, 2013

To get an Aironet 16-bit PCMCIA card working with the WPA-supported drivers, the firmware must be upgraded.

I found it was difficult to do this, so I put together a live CD that accomplishes it.  It has a few bugs but will work.  You will need a Windows 98 Second Edition CD handy in order to supply files that are not in the live CD image.  The firmware will be version 5.30.17 which is not the latest but is good enough to support WPA with the Linux driver.  (With an XP live CD you could install the latest 5.60.22 firmware, if XP will run on your laptop you are using this old 16-bit card on, and if you have some other media on which to access the drivers while the BartPE or other XP livecd is inserted.)

(more…)

Problems with FTPS? (FTP-SSL, TLS, etc)

Wednesday, January 6th, 2010

More and more hosting providers are moving to FTPS to replace FTP. But there are several aspects of modern networks that make using FTPS more challenging than FTP or the other alternatives.

(more…)

Getting along with the VIA EPIA-M10000 Mini-ITX HTPC motherboard

Saturday, December 12th, 2009

I got this motherboard for free with a 933MHz Ezra-T C3 processor. It is still the cheapest option for a HTPC/MythTV box. Linux has low enough system overhead to make it usable and also has fairly well maintained open source drivers for the aging VIA hardware. But there are a few things you need to know.

(more…)

Notes on programming Creative Sound Blaster series ISA cards

Monday, July 6th, 2009

In the world of PC hardware, Sound Blaster cards were the market leader in terms of install base. There are three different types of Sound Blaster cards which interest us. The types are derived from the BLASTER environment variable from DOS. We discuss the non-Vibra and non-PCI types only, because compatibility with software written for the standard “classic” Sound Blaster series was really suffering with PCI and Vibra.
(more…)

Why doesn’t Slackware run on my old 386?

Monday, July 6th, 2009

It might seem like a laughable question. After all, who uses a 386 anymore? Well, one reason might be for integrating legacy industrial hardware with newer technology. Or utilizing legacy PC hardware for which a modern equivalent does not exist.

In any case, it is common knowledge that the Slackware kernels up to and including version 8.1 were compiled as 386 kernels. But in Slackware 9.0 and later, the kernels are compiled as 486 kernels, with the exception of the lowmem.i kernel.

(more…)

How to change encryption type on your encrypted LVM

Sunday, June 28th, 2009

If you are like a lot of users who were “early adopters” of Linux disk encryption, you probably installed with the aes-cbc-essiv encryption scheme, which is decent, but not as secure as the new aes-xts-plain encryption method.

There is a helpful post on the Ubuntu bugtracker explaining how to install Ubuntu with i.e. XTS support. Unfortunately, this does not help a user who wishes i.e. to change encryption methods while upgrading his hard disk.
(more…)

VirtualBox eats excessive CPU, up to 100% usage

Sunday, May 24th, 2009

If your VirtualBox guest operating system is eating excessive CPU on the host, perhaps causing your laptop fan to spin up and excessive heat to be generated, you may try this list of ways this can possibly be fixed.
(more…)

What if my SATA controller doesn’t see my new 1TB SATA hard disk?

Wednesday, April 29th, 2009

First-generation SATA controllers have several problems getting along with newer SATA drives, among them: inability to negotiate transfer rate of the drive down from 3.0Gb/s to 1.5Gb/s, and failure to account for the large capacity of the drive (>527GB).  There is more information on this issue in this excellent post.

Unfortunately, it is difficult to tell which issue is being experienced when the BIOS merely locks up, or the controller locks up during drive inquiry and is invisible to the system thereafter. Assuming first that the problem persists under a newer version of the Linux kernel with the libata drivers mostly sorted out, there are several other potential compatibility fixes that do not involve buying and installing a newer SATA controller card that you are sure will work:

(more…)

SSH tunnel through HTTPS

Thursday, March 12th, 2009

Many people at corporate jobs find themselves behind a firewall which only allows outgoing traffic to destination ports 21 (ftp), 80 (http) and 443 (https). To access one’s network at home, the workaround is to run the SSH server at home on port 443 instead of the usual port 22, then use the SSH client to create a tunnel so that arbitrary traffic will be sent through your home machine instead of through the firewall.

Some people who are even unluckier find themselves behind a firewall which does layer 7 packet inspection, meaning that traffic outgoing to a destination port of 443 that does not look like HTTPS traffic will be dropped by the firewall.

Fortunately, PuTTY combined with proxytunnel will allow the passing of non-HTTPS traffic through this type of firewall. It is accomplished through a “triple-proxy” method, where a connection is made to your HTTPS proxy web server at home through your restrictive corporate proxy, then an SSH session is tunneled through the HTTPS connection, and then the SSH connection acts as a proxy for the network traffic that is not permitted to pass through the corporate network. All traffic is encrypted and completely unidentifiable by packet inspection as anything other than a normal encrypted HTTPS session.
(more…)