wiki.xw3.org

Welcome to the xw3 Wiki! Powered by hanez

User Tools

Site Tools


linux

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
linux [2019-03-08] hanezlinux [2025-03-18] (current) – ↷ Page moved from user:hanez:linux to linux hanez
Line 1: Line 1:
-====== Linux Stuff ======+====== Linux ====== 
 + 
 +<nspages user:hanez:linux -h1 -r -textPages="" -tree> 
 + 
 +  * [[https://www.cyberciti.biz/faq/howto-create-lage-files-with-dd-command/|Create empty large files]] 
 +  * [[https://www.addictivetips.com/ubuntu-linux-tips/back-up-email-linux-imap-grab/|How To Back Up Email On Linux With IMAP Grab]] 
 + 
 +===== AMDGPU ===== 
 + 
 +  * [[https://www.amd.com/de/support/kb/release-notes/amdgpu-installation|Radeon Software for Linux Installation]] 
 +  * [[https://wiki.archlinux.org/index.php/AMDGPU|AMDGPU]] 
 +  * [[https://wiki.archlinux.org/index.php/AMDGPU_PRO|AMDGPU PRO]] 
 +  * [[https://math.dartmouth.edu/~sarunas/amdgpu.html|AMDGPU-PRO OpenCL with the open-source amdgpu kernel module]]
  
 ===== Useful commands ===== ===== Useful commands =====
Line 16: Line 28:
  
 <code>xhost +SI:localuser:testuser && su - testuser -c "export DISPLAY=:0.0 && firefox && exit" && xhost -SI:localuser:testuser</code> <code>xhost +SI:localuser:testuser && su - testuser -c "export DISPLAY=:0.0 && firefox && exit" && xhost -SI:localuser:testuser</code>
- 
-==== Clean unused deps in Arch Linux ==== 
- 
-<code>yaourt -Rsn $(yaourt -Qdtq)</code> 
- 
-==== Install local pkg.tar in Arch Linux ==== 
- 
-<code>pacman -U .pkg.tar.gz or .pkg.tar.xz</code> 
  
 ==== Howto create and mount encrypted disk ==== ==== Howto create and mount encrypted disk ====
  
-Create:+=== Create: ===
  
 <code>cryptsetup luksFormat /dev/sdb1 <code>cryptsetup luksFormat /dev/sdb1
Line 33: Line 37:
 mkfs.ext2 /dev/mapper/crypto</code> mkfs.ext2 /dev/mapper/crypto</code>
  
-Mount:+=== Mount: === 
  
 <code>cryptsetup luksOpen /dev/sdb1 crypto <code>cryptsetup luksOpen /dev/sdb1 crypto
 mount /dev/mapper/crypto /mnt/crypto</code> mount /dev/mapper/crypto /mnt/crypto</code>
  
-Unmount:+=== Unmount: === 
  
 <code>umount /dev/mapper/crypto <code>umount /dev/mapper/crypto
 cryptsetup luksClose /dev/mapper/crypto</code> cryptsetup luksClose /dev/mapper/crypto</code>
  
-Change Key:+=== Change Key: === 
  
 In LUKS scheme, you have 8 "slots" for passwords or key files. First, check, which of them are used: In LUKS scheme, you have 8 "slots" for passwords or key files. First, check, which of them are used:
linux.1552084383.txt.gz · Last modified: 2019-03-08 by hanez