SlideShare a Scribd company logo
1 of 1
Download to read offline
installation Steps for r8168 Network Card in SuSe Linux 11
1 Download the driver from FTP link
2 Copy the driver file /opt Directory
ESICHO-Linux34:~# cp -rvf r8168-8.018.00 /opt/
3 Change permission to executeble
ESICHO-Linux34:/opt # chmod -r 777 r8168-8.018.00
4 ESICHO-Linux34:/opt #ll
drwxrwxrwx 3 root root 4096 2010-07-01 10:26 r8168-8.018.00
5 ESICHO-Linux34:/opt # cd r8168-8.018.00/
6 ESICHO-Linux34:/opt/r8168-8.018.00 # ll
total 16
-rwxr-xr-x 1 root root 1247 2010-07-01 10:26 autorun.sh
-rwxr-xr-x 1 root root 1789 2010-07-01 10:26 Makefile
-rwxr-xr-x 1 root root 4072 2010-07-01 10:26 readme
drwxr-xr-x 2 root root 4096 2010-07-01 10:26 src
7 execute the shell file
ESICHO-Linux34:/opt/r8168-8.018.00 #./autorun.sh
Check old driver and unload it.
Build the module and install
Backup r8169.ko
rename r8169.ko to r8169.bak
Depending module. Please wait.
load module r8168
Completed.
ESICHO-Linux34:/opt/r8168-8.018.00 #
8 ESICHO-Linux34:/opt/r8168-8.018.00 #ping 10.10.10.200

More Related Content

What's hot

Managing the system and network connection Linux
Managing the system and network connection LinuxManaging the system and network connection Linux
Managing the system and network connection LinuxShriharsh Shendre
 
XPDS14: Linux on Xen: A Status Update - David Vrabel, Citrix
XPDS14: Linux on Xen: A Status Update - David Vrabel, CitrixXPDS14: Linux on Xen: A Status Update - David Vrabel, Citrix
XPDS14: Linux on Xen: A Status Update - David Vrabel, CitrixThe Linux Foundation
 
Hacking and Computer Forensics
Hacking and Computer ForensicsHacking and Computer Forensics
Hacking and Computer ForensicsKristian Arjianto
 
Nessus scan report using the defualt scan policy - Tareq Hanaysha
Nessus scan report using the defualt scan policy - Tareq HanayshaNessus scan report using the defualt scan policy - Tareq Hanaysha
Nessus scan report using the defualt scan policy - Tareq HanayshaHanaysha
 
TFTP - Trivial File Transfer Protocol
TFTP - Trivial File Transfer ProtocolTFTP - Trivial File Transfer Protocol
TFTP - Trivial File Transfer ProtocolPeter R. Egli
 
How Microsoft will MiTM your network
How Microsoft will MiTM your networkHow Microsoft will MiTM your network
How Microsoft will MiTM your networkBrandon DeVault
 
Nessus scan report using microsoft patchs scan policy - Tareq Hanaysha
Nessus scan report using microsoft patchs scan policy - Tareq HanayshaNessus scan report using microsoft patchs scan policy - Tareq Hanaysha
Nessus scan report using microsoft patchs scan policy - Tareq HanayshaHanaysha
 
First Responder Course - Session 9 - Volatile Evidence Collection [2004]
First Responder Course - Session 9 - Volatile Evidence Collection [2004]First Responder Course - Session 9 - Volatile Evidence Collection [2004]
First Responder Course - Session 9 - Volatile Evidence Collection [2004]Phil Huggins FBCS CITP
 
Telnet configuration
Telnet configurationTelnet configuration
Telnet configurationMdAlAmin187
 
How to troubleshoot and verifying ospf configuration
How to troubleshoot and verifying ospf configurationHow to troubleshoot and verifying ospf configuration
How to troubleshoot and verifying ospf configurationIT Tech
 
SDN OpenFlow Load Balancer 시나리오
SDN OpenFlow Load Balancer 시나리오SDN OpenFlow Load Balancer 시나리오
SDN OpenFlow Load Balancer 시나리오ymtech
 
Ftp (file transfer protocol)
Ftp (file transfer protocol)Ftp (file transfer protocol)
Ftp (file transfer protocol)Raghu nath
 

What's hot (19)

Managing the system and network connection Linux
Managing the system and network connection LinuxManaging the system and network connection Linux
Managing the system and network connection Linux
 
I pv6
I pv6I pv6
I pv6
 
XPDS14: Linux on Xen: A Status Update - David Vrabel, Citrix
XPDS14: Linux on Xen: A Status Update - David Vrabel, CitrixXPDS14: Linux on Xen: A Status Update - David Vrabel, Citrix
XPDS14: Linux on Xen: A Status Update - David Vrabel, Citrix
 
Readme
ReadmeReadme
Readme
 
Hacking and Computer Forensics
Hacking and Computer ForensicsHacking and Computer Forensics
Hacking and Computer Forensics
 
Nessus scan report using the defualt scan policy - Tareq Hanaysha
Nessus scan report using the defualt scan policy - Tareq HanayshaNessus scan report using the defualt scan policy - Tareq Hanaysha
Nessus scan report using the defualt scan policy - Tareq Hanaysha
 
FTP & TFTP
FTP & TFTPFTP & TFTP
FTP & TFTP
 
TFTP - Trivial File Transfer Protocol
TFTP - Trivial File Transfer ProtocolTFTP - Trivial File Transfer Protocol
TFTP - Trivial File Transfer Protocol
 
Ftp tftp
Ftp tftpFtp tftp
Ftp tftp
 
How Microsoft will MiTM your network
How Microsoft will MiTM your networkHow Microsoft will MiTM your network
How Microsoft will MiTM your network
 
Nessus scan report using microsoft patchs scan policy - Tareq Hanaysha
Nessus scan report using microsoft patchs scan policy - Tareq HanayshaNessus scan report using microsoft patchs scan policy - Tareq Hanaysha
Nessus scan report using microsoft patchs scan policy - Tareq Hanaysha
 
First Responder Course - Session 9 - Volatile Evidence Collection [2004]
First Responder Course - Session 9 - Volatile Evidence Collection [2004]First Responder Course - Session 9 - Volatile Evidence Collection [2004]
First Responder Course - Session 9 - Volatile Evidence Collection [2004]
 
DNS SERVER
DNS SERVERDNS SERVER
DNS SERVER
 
03 linuxfirewall1
03 linuxfirewall103 linuxfirewall1
03 linuxfirewall1
 
Telnet configuration
Telnet configurationTelnet configuration
Telnet configuration
 
How to troubleshoot and verifying ospf configuration
How to troubleshoot and verifying ospf configurationHow to troubleshoot and verifying ospf configuration
How to troubleshoot and verifying ospf configuration
 
SDN OpenFlow Load Balancer 시나리오
SDN OpenFlow Load Balancer 시나리오SDN OpenFlow Load Balancer 시나리오
SDN OpenFlow Load Balancer 시나리오
 
Computer networks
Computer networksComputer networks
Computer networks
 
Ftp (file transfer protocol)
Ftp (file transfer protocol)Ftp (file transfer protocol)
Ftp (file transfer protocol)
 

Viewers also liked

1.1 sistema de comunicaciones electrónicas
1.1 sistema de comunicaciones electrónicas1.1 sistema de comunicaciones electrónicas
1.1 sistema de comunicaciones electrónicasjkn2012
 
Universidad técnica particular de loja
Universidad técnica particular de lojaUniversidad técnica particular de loja
Universidad técnica particular de lojaGisela Toledo
 
Media Evaluation 1
Media   Evaluation 1Media   Evaluation 1
Media Evaluation 1katiewhu1993
 
Rekabet Kurumunun Elder Hakkındaki Raporu
Rekabet Kurumunun Elder Hakkındaki RaporuRekabet Kurumunun Elder Hakkındaki Raporu
Rekabet Kurumunun Elder Hakkındaki Raporubulentcb
 
Thriller conventions
Thriller conventionsThriller conventions
Thriller conventions06hamiltonkyl
 
O papel do advogado na luta pela justa tributação
O papel do advogado na luta pela justa tributaçãoO papel do advogado na luta pela justa tributação
O papel do advogado na luta pela justa tributaçãoFabio Pugliesi
 
Animal testing
Animal testingAnimal testing
Animal testing11jbarnard
 

Viewers also liked (9)

Quark screenshots
Quark screenshotsQuark screenshots
Quark screenshots
 
1.1 sistema de comunicaciones electrónicas
1.1 sistema de comunicaciones electrónicas1.1 sistema de comunicaciones electrónicas
1.1 sistema de comunicaciones electrónicas
 
night cream
night creamnight cream
night cream
 
Universidad técnica particular de loja
Universidad técnica particular de lojaUniversidad técnica particular de loja
Universidad técnica particular de loja
 
Media Evaluation 1
Media   Evaluation 1Media   Evaluation 1
Media Evaluation 1
 
Rekabet Kurumunun Elder Hakkındaki Raporu
Rekabet Kurumunun Elder Hakkındaki RaporuRekabet Kurumunun Elder Hakkındaki Raporu
Rekabet Kurumunun Elder Hakkındaki Raporu
 
Thriller conventions
Thriller conventionsThriller conventions
Thriller conventions
 
O papel do advogado na luta pela justa tributação
O papel do advogado na luta pela justa tributaçãoO papel do advogado na luta pela justa tributação
O papel do advogado na luta pela justa tributação
 
Animal testing
Animal testingAnimal testing
Animal testing
 

Similar to Lan card installation in su se linux 11

Linux 4.x Tracing: Performance Analysis with bcc/BPF
Linux 4.x Tracing: Performance Analysis with bcc/BPFLinux 4.x Tracing: Performance Analysis with bcc/BPF
Linux 4.x Tracing: Performance Analysis with bcc/BPFBrendan Gregg
 
Docker - container and lightweight virtualization
Docker - container and lightweight virtualization Docker - container and lightweight virtualization
Docker - container and lightweight virtualization Sim Janghoon
 
Linux Capabilities - eng - v2.1.5, compact
Linux Capabilities - eng - v2.1.5, compactLinux Capabilities - eng - v2.1.5, compact
Linux Capabilities - eng - v2.1.5, compactAlessandro Selli
 
Computer technicians-quick-reference-guide
Computer technicians-quick-reference-guideComputer technicians-quick-reference-guide
Computer technicians-quick-reference-guideShathees Rao
 
OSSNA 2017 Performance Analysis Superpowers with Linux BPF
OSSNA 2017 Performance Analysis Superpowers with Linux BPFOSSNA 2017 Performance Analysis Superpowers with Linux BPF
OSSNA 2017 Performance Analysis Superpowers with Linux BPFBrendan Gregg
 
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemCyber Security Alliance
 
USENIX ATC 2017 Performance Superpowers with Enhanced BPF
USENIX ATC 2017 Performance Superpowers with Enhanced BPFUSENIX ATC 2017 Performance Superpowers with Enhanced BPF
USENIX ATC 2017 Performance Superpowers with Enhanced BPFBrendan Gregg
 
Linux-Fu for PHP Developers
Linux-Fu for PHP DevelopersLinux-Fu for PHP Developers
Linux-Fu for PHP DevelopersLorna Mitchell
 
BKK16-505 Kernel and Bootloader Consolidation and Upstreaming
BKK16-505 Kernel and Bootloader Consolidation and UpstreamingBKK16-505 Kernel and Bootloader Consolidation and Upstreaming
BKK16-505 Kernel and Bootloader Consolidation and UpstreamingLinaro
 
HTTP/2, HTTP/3 and SSL/TLS State of the Art in Our Servers
HTTP/2, HTTP/3 and SSL/TLS State of the Art in Our ServersHTTP/2, HTTP/3 and SSL/TLS State of the Art in Our Servers
HTTP/2, HTTP/3 and SSL/TLS State of the Art in Our ServersJean-Frederic Clere
 
IPv6 for Pentesters
IPv6 for PentestersIPv6 for Pentesters
IPv6 for Pentesterscamsec
 
The true story_of_hello_world
The true story_of_hello_worldThe true story_of_hello_world
The true story_of_hello_worldfantasy zheng
 

Similar to Lan card installation in su se linux 11 (20)

Linux 4.x Tracing: Performance Analysis with bcc/BPF
Linux 4.x Tracing: Performance Analysis with bcc/BPFLinux 4.x Tracing: Performance Analysis with bcc/BPF
Linux 4.x Tracing: Performance Analysis with bcc/BPF
 
Debugging 2013- Jesper Brouer
Debugging 2013- Jesper BrouerDebugging 2013- Jesper Brouer
Debugging 2013- Jesper Brouer
 
Docker - container and lightweight virtualization
Docker - container and lightweight virtualization Docker - container and lightweight virtualization
Docker - container and lightweight virtualization
 
Basic Linux kernel
Basic Linux kernelBasic Linux kernel
Basic Linux kernel
 
Linux Capabilities - eng - v2.1.5, compact
Linux Capabilities - eng - v2.1.5, compactLinux Capabilities - eng - v2.1.5, compact
Linux Capabilities - eng - v2.1.5, compact
 
C&C Botnet Factory
C&C Botnet FactoryC&C Botnet Factory
C&C Botnet Factory
 
Rac on NFS
Rac on NFSRac on NFS
Rac on NFS
 
Docker practice
Docker practiceDocker practice
Docker practice
 
Computer technicians-quick-reference-guide
Computer technicians-quick-reference-guideComputer technicians-quick-reference-guide
Computer technicians-quick-reference-guide
 
Introduction to UNIX
Introduction to UNIXIntroduction to UNIX
Introduction to UNIX
 
OSSNA 2017 Performance Analysis Superpowers with Linux BPF
OSSNA 2017 Performance Analysis Superpowers with Linux BPFOSSNA 2017 Performance Analysis Superpowers with Linux BPF
OSSNA 2017 Performance Analysis Superpowers with Linux BPF
 
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande Modem
 
USENIX ATC 2017 Performance Superpowers with Enhanced BPF
USENIX ATC 2017 Performance Superpowers with Enhanced BPFUSENIX ATC 2017 Performance Superpowers with Enhanced BPF
USENIX ATC 2017 Performance Superpowers with Enhanced BPF
 
Linux-Fu for PHP Developers
Linux-Fu for PHP DevelopersLinux-Fu for PHP Developers
Linux-Fu for PHP Developers
 
BKK16-505 Kernel and Bootloader Consolidation and Upstreaming
BKK16-505 Kernel and Bootloader Consolidation and UpstreamingBKK16-505 Kernel and Bootloader Consolidation and Upstreaming
BKK16-505 Kernel and Bootloader Consolidation and Upstreaming
 
HTTP/2, HTTP/3 and SSL/TLS State of the Art in Our Servers
HTTP/2, HTTP/3 and SSL/TLS State of the Art in Our ServersHTTP/2, HTTP/3 and SSL/TLS State of the Art in Our Servers
HTTP/2, HTTP/3 and SSL/TLS State of the Art in Our Servers
 
IPv6 for Pentesters
IPv6 for PentestersIPv6 for Pentesters
IPv6 for Pentesters
 
IPv6 for Pentesters
IPv6 for PentestersIPv6 for Pentesters
IPv6 for Pentesters
 
TekTape Manual
TekTape ManualTekTape Manual
TekTape Manual
 
The true story_of_hello_world
The true story_of_hello_worldThe true story_of_hello_world
The true story_of_hello_world
 

Lan card installation in su se linux 11

  • 1. installation Steps for r8168 Network Card in SuSe Linux 11 1 Download the driver from FTP link 2 Copy the driver file /opt Directory ESICHO-Linux34:~# cp -rvf r8168-8.018.00 /opt/ 3 Change permission to executeble ESICHO-Linux34:/opt # chmod -r 777 r8168-8.018.00 4 ESICHO-Linux34:/opt #ll drwxrwxrwx 3 root root 4096 2010-07-01 10:26 r8168-8.018.00 5 ESICHO-Linux34:/opt # cd r8168-8.018.00/ 6 ESICHO-Linux34:/opt/r8168-8.018.00 # ll total 16 -rwxr-xr-x 1 root root 1247 2010-07-01 10:26 autorun.sh -rwxr-xr-x 1 root root 1789 2010-07-01 10:26 Makefile -rwxr-xr-x 1 root root 4072 2010-07-01 10:26 readme drwxr-xr-x 2 root root 4096 2010-07-01 10:26 src 7 execute the shell file ESICHO-Linux34:/opt/r8168-8.018.00 #./autorun.sh Check old driver and unload it. Build the module and install Backup r8169.ko rename r8169.ko to r8169.bak Depending module. Please wait. load module r8168 Completed. ESICHO-Linux34:/opt/r8168-8.018.00 # 8 ESICHO-Linux34:/opt/r8168-8.018.00 #ping 10.10.10.200