Skip to main content

CF-29 Intel wifi driver gnu/linux backtrack


CF-29 Toughbook

I received an old Toughbook CF-29 laptop from a friend and decided to install backtrack 5.3. An issue i was having was getting the intel driver to install.

I verified the firmware was in the correct location via

root@bt:~# ls /lib/firmware/ | grep ipw
ipw2100-1.3.fw
ipw2100-1.3-i.fw
ipw2100-1.3-p.fw
ipw2200-bss.fw
ipw2200-ibss.fw
ipw2200-sniffer.fw
ipw_firmware

Next i ran the following command

root@bt:~# dmesg | grep ipw2200
[   26.409354] ipw2200: Intel(R) PRO/Wireless 2200/2915 Network Driver, 1.2.2kmprq
[   26.409359] ipw2200: Copyright(c) 2003-2006 Intel Corporation
[   26.409494] ipw2200 0000:02:01.0: PCI INT A -> Link[LNKD] -> GSI 9 (level, low) -> IRQ 9
[   26.409520] ipw2200: Detected Intel PRO/Wireless 2915ABG Network Connection
[   26.509132] ipw2200: ipw2200-bss.fw request_firmware failed: Reason -2
[   26.509141] ipw2200: Unable to load firmware: -2
[   26.509146] ipw2200: failed to register network device
[   26.509193] ipw2200 0000:02:01.0: PCI INT A disabled
[   26.509242] ipw2200: probe of 0000:02:01.0 failed with error -5
[   39.384317] ipw2200: Intel(R) PRO/Wireless 2200/2915 Network Driver, 1.2.2kmprq
[   39.384323] ipw2200: Copyright(c) 2003-2006 Intel Corporation
[   39.384455] ipw2200 0000:02:01.0: PCI INT A -> Link[LNKD] -> GSI 9 (level, low) -> IRQ 9
[   39.384483] ipw2200: Detected Intel PRO/Wireless 2915ABG Network Connection
[   39.387815] ipw2200: ipw2200-bss.fw request_firmware failed: Reason -2
[   39.387822] ipw2200: Unable to load firmware: -2
[   39.387827] ipw2200: failed to register network device
[   39.387870] ipw2200 0000:02:01.0: PCI INT A disabled
[   39.387907] ipw2200: probe of 0000:02:01.0 failed with error -5



Searched google and found
http://ubuntuforums.org/showthread.php?t=2100934
Ran this command the the issue was corrected
sudo modprobe -r ipw2200 && sudo modprobe ipw2200

Comments

Popular posts from this blog

Excel document for pinging list of computers VBA

Here is an excel document I created that will ping a list of nodes in column A and give results in column B. There are much better tools that can be used such as angry ip scanner  http://www.angryip.org/w/Home . I just wrote this as an example Requirements: Tested with Office 2010 Download: Download

Powershell - Com+ Application Recycle

Needed a script to recycle a com+ application nightly and this is what i came up with. This script will write each recycle it does to the event log under application. Run locally or via a scheduled task. #Recycle COM+ Application and write to the event log the status # 1.0 Release # Run script locally # Write to the event log ######################################## #Configurable ######################################## #Com+ ApplicationName $ComPlusLikeAppName = "Put the name of Com+ Application here a like statement is used to eval so you can get away with putting part of it" #EventLog to write to. $eventlog = "Application" #Source for eventlog. $source = "RecycleComObject" #Successful Event ID $SEventID = 0 #Error Event ID $EEventID = 666 #Process that COM+ runs under $process = "dllhost.exe". ######################################## #Clear $CurrentMemory = $null $PRocessID = $null $Commandline = $null $GUID = $null $AppID = $null $Messag

Powershell : Certutil Find Expired Certs on CA server

Wrote this to get certificate expiration information for certificates that expired 5 days ago to ones that expire in 90 days. Wrap an invoke-command around this for remote query. $Before = (get-date).adddays(90).ToString("MM/dd/yyyy") $After = (get-date).AddDays(-5).ToString("MM/dd/yyyy") <# https://blogs.technet.microsoft.com/poshchap/2016/01/01/powershell-and-certutil-exe/ We create a date range with $Before, i.e. certificates expiring before this date, and $After, i.e. certificates expiring after this date. These values are converted into something that certutil can understand - $Restrict. This is then used with the certutil -restrict parameter. #> $Restrict = "NotAfter<=$Before,NotAfter>=$After" $Report = @() $cmd = & certutil.exe -view -restrict $Restrict -out "RequesterName,CommonName,Certificate Expiration Date","Certificate Template" $SplitLines = $cmd.Split("`n`r") $Index = 0 foreach ($line in $Sp