admin ubuntu

Advertisements

synchronize clipboards in opensuse 12.3

[scope]
Installed a Opensuse 12.3 with Lxde as a guest os in vmware player 6.0.2 within an Opensuse 13.1 Host.

[issue]
clipboard synchronization between the Host OS and the Guest OS is broken.

[Workarround]
It seems to be an issue of host system. Linux uses different primay and secondary clipboard manager, i need to synchronize them all with “autocutsel”. After installed autocutsel this problem seems to be solved.

[Solution]
It seems to be an host kernel based issue. The copy of the same guest os is working well on another host.

 

 

custom the min-max-button in gnome 3 terminal

[issue]
After installing the gnome 3 for my opensuse 13.1 the minimize and maximize button is missing by defaut.

[solution]
Start the gnome tweak tool in your system terminal with your current user (not root)

$: gnome-tweak-tool &

choose -> Windows -> Titlebar Buttons -> Maximize and Minimize : on

This is also the way to enable icons on Desktop,

choose -> Desktop -> icons on Desktop : on

My system kernel : Linux VI3LINUX2 3.11.10-11-desktop

 

suse init script for DFS Mount with kerberos and AD Login

#! /bin/bash
#
# This script is used to control during bootup.
#
# usage: nasmount [start|stop]
#
# start
# stop
# modified by Yingding Wang 06.11.2012

### BEGIN INIT INFO
# Provides:          nasmount
# Required-Start:    $network
# Required-Stop:
# Default-Start:     3 5
# Default-Stop:      0 1 2 6
# Short-Description: init script for nas mount
# Description: this script mount the DFS (NAS) with Kerberos User from AD during the starting up
### END INIT INFO

mountDIR=/nas #your mount point in your linux system
mountingDIR=//nas/subdirectory #your mounting point in your window DFS or NAS

# AD User and AD password
ad_user=<your ad_user>
ad_password=<your ad_user_pw>
# Access User for Mounting Directory in DFS
user=$ad_user
password=$ad_password

# DFS Domin
dom=Your_Realm

# Access Richts Setting for Mount Point
ac_user_name=<access username>
ac_group_name=<access groupname>
uid=`id -u $ac_user_name`
gid=`getent group $ac_group_name | cut -d: -f3`

# Logging prefix
prompt=Logging:

#
# Main
#
case $1 in
  start)
   #creat mount point directory
   if [ ! -d $mountDIR ]
   then
     echo "$prompt mount point $mountDIR doesn't exist"
     mkdir $mountDIR;
     echo "$prompt mount point $mountDIR is created"
   else
   #checking if mountDIR is amountpoint
     if /bin/mountpoint -q $mountDIR
     then
       echo "$prompt Directory exist, it will be unmounted"
       /bin/umount $mountDIR
     else
     # do nothing
     echo "$prompt Directory not mounted"
     fi
   fi

   if [ $? -gt 0 ]; then
      echo "cached error"
      $?=0
   fi

   # get kerbos granting ticket from AD, the user AD_USER muss be a memeber of Realm in AD
   echo "$prompt getting kerberos ticket with kinit"
   echo $ad_password | kinit $ad_user;

   # after the ticket successfully granted, mount nas Directory to mount point /nas1
   # use uid and gid option to specify the user id and group id for mount point access rights
   /sbin/mount.cifs $mountingDIR $mountDIR -o user=$user,dom=$dom,password=$password,uid=$uid,gid=$gid
   if [ $? -gt 0 ]; then
     echo "catched error"
     $?=0
   fi

   #Log output line
   #echo `date` >> /var/log/nasmount.log
   #echo "mount successful" >> /var/log/nasmount.log
   echo "$prompt done."
  ;;

  stop)
   #checking if mountDIR is a mountpoint
   if /bin/mountpoint -q $mountDIR
   then
     echo "$prompt Directory exist, it will be unmounted"
     /bin/umount $mountDIR
   else
   #do nothing
     echo "$prompt Directory not mounted"
   fi
   if [ $? -gt 0 ]; then
     echo "cached error";
     $?=0
   fi
   echo "$prompt done."
  ;;

  *)
  ## If no parameters are given, print which are availabel.
   echo "Usage: $0 {start|stop}"
   exit 1
  ;;
esac

exit

use grep to compare checksum

Check the integrity of your download files:

you can use this command to check your sha1 sum in linux

 sha1sum <filename.filetype> | grep "sha1sum-key" 

you can use this command to check your md5 sum in linux

 md5sum <filename.filetype> | grep "md5sum-key"

After the execution of above commands, if you see your xxxsum-key, everything is fine.
If you don’t see anything your file is broken.