Feeds

The Netbook Newbie's Guide to Linux

Back to the Bluez

Choosing a cloud hosting partner with confidence

Download linker3000's two files, bluetooth.tgz and bluetooth2.tgz and move them, as he suggests, to the /lib/modules/2.6.23.9lw/kernel/drivers and /lib/modules/2.6.23.9lw/kernel/drivers/net directories. It's easiest to do this as root from the command line:

sudo mv <filename> <target directory>

Then you'll need to unpack them.

These are gzipped .tar files. tar is a longstanding Unix tool for bundling up directory hierarchies into a single file. gzip is the GNU equivalent of the familiar Zip compression tool. Double-clicking files like these while in the GUI obligingly unwraps them automatically, but as we're already down at the command line, let's 'get back to the blues' and do this manually. First the unzipping:

gunzip bluetooth2.tgz

This deletes the .tgz file and replaces it with the expanded .tar file. Now the next stage:

tar -xvf bluetooth2.tar

...where x stands for 'eXtract', v means 'be verbose' - ie. show me the result - and f introduces the name of the file to be untarred (see More Fun with Tar).

Now do the same for the bluetooth.tgz file in the ../drivers/net directory.

More Fun with Tar

Old Unix hands would do this in one line, using a 'pipe', like this:

gunzip < bluetooth2.tgz | tar -xvf -

...and GNU's own version of tar, gtar, even allows you to do this in one fell swoop:

gtar xvzf bluetooth2.tgz

Security for virtualized datacentres

Whitepapers

A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.