The Netbook Newbie's Guide to Linux

Back to the Bluez

Internet Security Threat Report 2014

Download linker3000's two files, bluetooth.tgz and bluetooth2.tgz and move them, as he suggests, to the /lib/modules/ and /lib/modules/ directories. It's easiest to do this as root from the command line:

sudo mv <filename> <target directory>

Then you'll need to unpack them.

These are gzipped .tar files. tar is a longstanding Unix tool for bundling up directory hierarchies into a single file. gzip is the GNU equivalent of the familiar Zip compression tool. Double-clicking files like these while in the GUI obligingly unwraps them automatically, but as we're already down at the command line, let's 'get back to the blues' and do this manually. First the unzipping:

gunzip bluetooth2.tgz

This deletes the .tgz file and replaces it with the expanded .tar file. Now the next stage:

tar -xvf bluetooth2.tar

...where x stands for 'eXtract', v means 'be verbose' - ie. show me the result - and f introduces the name of the file to be untarred (see More Fun with Tar).

Now do the same for the bluetooth.tgz file in the ../drivers/net directory.

More Fun with Tar

Old Unix hands would do this in one line, using a 'pipe', like this:

gunzip < bluetooth2.tgz | tar -xvf -

...and GNU's own version of tar, gtar, even allows you to do this in one fell swoop:

gtar xvzf bluetooth2.tgz

Top 5 reasons to deploy VMware with Tegile


Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.