Month: July 2017

How to manually install Nvidia Driver and cuda in ubuntu linux

Go to nvidia website and download driver, for this tutorial i am using .run file copy the file to your desktop , after that simply right click and select properties > select permissions > tick Execute : allow executing file as program , click this link to learn how to make file executable using terminal after that you need to black list nouveau for that type following command in the terminal   sudo nano /etc/modprobe.d/blacklist-nouveau.conf then copy following text in the nano editor in terminal then save it blacklist nouveau blacklist lbm-nouveau options nouveau modeset=0 alias nouveau off alias...

Read More

How to make file executable using terminal

To give permission to execute a file you should navigate to file copied location in terminal by default when you open-up the terminal your terminal location will look some thing like this [email protected] ~ $ if you type “pwd” you can see current directory in the terminal [email protected] ~ $ pwd /home/george                                         <—-  currently i have mounted to /home/user for this tutorial i have copied file in a folder in the desktop so i have to navigate to that directory for eg: my folder name is called “Dashboard” to navigate that folder i have to type in cd /Desktop/Dashboard...

Read More

How to configure raid in HP Z840 workstation

Power on your workstation and press Ctrl + C in the post screen now you can find LSI config utility is initializing with in the utility you can find the LSISAS2308 adapter select it in the next screen select raid properties in the next screen you can find available raids , in our case we have used 512 mb x 3 ssd’s in the current configuration of this workstation available raid is Raid 1 , Raid 1E , and 10 , and Raid 0 i have selected Raid 1E in the next menu you have to select raid disks...

Read More


  A Distributed Denial-of-Service (DDoS) attack is an attack in which multiple compromised computer systems attack a target, such as a server, website or other network resource, and cause a denial of service for users of the targeted resource. The flood of incoming messages, connection requests or malformed packets to the target system forces it to slow down or even crash and shut down, thereby denying service to legitimate users or systems.   How DDoS Attacks Work In a DDoS attack, the incoming traffic flooding the victim originates from many different sources – potentially hundreds of thousands or more....

Read More

Pin It on Pinterest