Install Jupyter Notebook without Anaconda

I love the Jupyter Notebook for working in Python.  However, I have been fairly disappointed with the performance (start-up time, cpu and memory utilization) of Anaconda on my Window’s computers.  I have also wanted to use Jupyter on a Dell laptop running Ubuntu Linux with limited memory and disk space, without the bloat of Anaconda.

Installing Jupyter without Anaconda is actually fairly simple.  See: Installing Jupyter with pip.  It’s so easy that I don’t see why they put the “strongly recommend” using Anaconda to run Juypter in bold.   Since pip is installed already on the latest versions of Python, you don’t even have to go out looking for a separate script to install or update it.  It works like a charm.

Load all available PowerShell Modules

I’ve had to look this tip up a number of times, so here it is.

Say you are running PowerShell on a Windows server, however it does not automatically load all available modules and you need one for a specific script you’ve got.  Load all available PowerShell modules on a Windows server by running this command:

Get-Module -ListAvailable | Import-Module

From the “Hey, Scripting Guy! Blog.”  Thank you!

Edit nofiles

Running an Oracle ODI installer on a CentOS vm, I encountered an error of the type:

checking for hardnofiles = 4096; found hardnofiles = 1024 Failed
checking for softnofiles = 4096; softnofiles = 1024 Failed

The fix was to edit my/etc/security/limits.conf file:

* soft nofile 16384
* hard nofile 65536

Add/view/delete an entry to iptables to enable Apache/VNCServer/FTP, etc.

The default CentOS 5.6 firewall configuration does not allow Apache httpd traffic on port 80.  In order to open the port for utilization, a change must be made to the firewall configuration.

iptables -I INPUT -p tcp -m tcp ––dport 80 -j ACCEPT

To open a hole for VNCServer (running on display 20):

iptables -I INPUT -p tcp -m tcp ––dport 5920 -j ACCEPT

To open a hole for VNCServer (running on display 20) web base interface:

iptables -I INPUT -p tcp -m tcp ––dport 5820 -j ACCEPT

To display the openings you’ve created in your firewall:

iptables -L INPUT -n ––line-numbers

To remove a line entry from your iptables file (for example, entry #3):

iptables -D INPUT 3

Notes:

There are two dashes in front of parameters such as “––line-numbers” and “––dport.”

The iptables service must be saved, and restarted before changes take effect.

service iptables save

service iptables restart

manually add new user to Red Hat/Fedora/CentOS

To manually add a new user to a  Red Hat/Fedora/CentOS intall which is utilizing shadow passwords:

As root

  • cp /etc/passwd /etc/passwd.bak (make a back-up copy of your password file)
  • cp /etc/shadow /etc/shadow.bak (make a back-up copy of your shadow password file)
  • cp /etc/group /etc/group.bak (make a back-up copy of your group file)
  • vipw  (to open passwd file in vi)
  • <shift> g  (to get to end of file)
  • a (append at end of cursor)
  • user01:x:501:501:User 01:/home/user01:/bin/bash  (add the new user)
  • :wq  (write file and quit vi)
  • A prompt will indicate that you are using shadow passwords, and do you want to edit the /etc/shadow now.  Answer: n
  • vi /etc/group  (to open group file in vi)
  • <shift> g  (to get to end of file)
  • a (append at end of cursor)
  • user01:x:501:user01 <enter>
  • admins:x:502:user01 (create a new group called admins and put user01 into it)
  • :wq  (write file and quit vi)
  • pwconv  (add the new entry from your passwd file into shadow password file)
  • passwd user01  (set the new user password)
  • (prompted twice for new user password)
  • mkdir /home/user01
  • cp /etc/skel/.* /home/user01 (copy all files from skel to new user home directory)
  • cp -r /etc/skel/.kde /home/user01
  • cp -r /etc/skel/.mozilla /home/user01
  • chown -R user01:user01 /home/user01  (Change the owner of user01 home directory to user01)
  • visudo -f /etc/sudoers
  • After root   ALL=(ALL)    ALL add new line and:  %admins   ALL=(ALL)    NOPASSWD: ALL  (this allows members of admins group to sudo as root, without a password.)