Beruflich Dokumente
Kultur Dokumente
By
at info@pcb.gov.pk
November, 2008
Table of Contents
II
4.3.5. Other Partitioning Problems 50
4.3.6. Other Partitioning Problems for Itanium System Users 51
4.3.7. Are You Seeing Python Errors? 51
4.4. Problems After Installation 52
4.4.1. Trouble With the Graphical GRUB Screen on an x86-
52
based System?
4.4.2. Booting into a Graphical Environment 52
4.4.3. Problems with the X Window System (GUI) 54
4.4.4. Problems with the X Server Crashing and Non-Root
54
Users
4.4.5. Problems When You Try to Log In 54
4.4.6. Is Your RAM Not Being Recognized? 55
4.4.7. Your Printer Does Not Work 56
4.4.8. Problems with Sound Configuration 56
4.4.9. Apache-based httpd service/Sendmail Hangs During
57
Startup
5. The GRUB Boot Loader 58
5.1. Boot Loaders and System Architecture 58
5.2. GRUB 58
5.2.1. GRUB and the x86 Boot Process 58
5.2.2. Features of GRUB 59
5.3. Installing GRUB 60
5.4. GRUB Terminology 61
5.4.1. Device Names 61
5.4.2. File Names and Block lists 62
5.4.3. The Root File System and GRUB 63
5.5. GRUB Interfaces 63
5.5.1. Interfaces Load Order 64
5.6. GRUB Commands 65
5.7. GRUB Menu Configuration File 67
5.7.1. Configuration File Structure 67
5.7.2. Configuration File Directives 67
5.8. Changing Run levels at Boot Time 69
5.9. Additional Resources 70
5.9.1. Installed Documentation 70
III
5.9.2. Useful Websites 70
6. Swap Space 71
6.1. What is Swap Space? 71
6.2. Adding Swap Space 72
6.2.1. Extending Swap on an LVM2 Logical Volume 72
6.2.2. Creating an LVM2 Logical Volume for Swap 72
6.2.3. Creating a Swap File. 73
6.3. Removing Swap Space 74
6.3.1. Reducing Swap on an LVM2 Logical Volume 74
6.3.2. Removing an LVM2 Logical Volume for Swap 74
6.3.3. Removing a Swap File 75
6.4. Moving Swap Space 75
7. Managing Disk Storage 76
7.1. Standard Partitions using parted 76
7.1.1. Viewing the Partition Table 77
7.1.2. Creating a Partition 78
7.1.3. Removing a Partition 80
7.1.4. Resizing a Partition 80
7.2. LVM Partition Management 81
8. Access Control Lists 84
8.1. Mounting File Systems 84
8.1.1. NFS 84
8.2. Setting Access ACLs 84
8.3. Setting Default ACLs 86
8.4. Retrieving ACLs 86
8.5. Archiving File Systems With ACLs 86
8.6. Compatibility with Older Systems 87
8.7. Useful Websites 87
9. Package Management with RPM 88
9.1. RPM Design Goals 88
9.2. Using RPM 90
9.2.1. Finding RPM Packages 90
9.2.2. Installing 90
IV
9.2.3. Uninstalling 93
9.2.4. Upgrading 93
9.2.5. Freshening 94
9.2.6. Querying 95
9.2.7. Verifying 96
9.3. Checking a Package's Signature 97
9.3.1. Importing Keys 98
9.3.2. Verifying Signature of Packages 98
9.4. Practical and Common Examples of RPM Usage 98
9.5. Additional Resources 100
9.5.1. Installed Documentation 100
9.5.2. Useful Websites 101
9.5.3. Related Books 101
10. Samba 102
10.1. Introduction to Samba 102
10.1.1. Samba Features 102
10.2. Samba Daemons and Related Services 103
10.2.1. Samba Daemons 103
11. Date and Time Configuration 104
11.1. Time and Date Properties 104
11.2. Network Time Protocol (NTP) Properties 105
11.3. Time Zone Configuration 106
12. The X Window System 107
12.1. The X11R7.1 Release 107
12.2. Desktop Environments and Window Managers 108
12.2.1. Desktop Environments 108
12.2.2. Window Managers 109
12.3. X Server Configuration Files 111
12.3.1. xorg.conf 111
12.4. Fonts 120
12.4.1. Fontconfig 121
12.4.2. Core X Font System 122
12.5. Runlevels and X 124
V
12.5.1. Runlevel 3 124
12.5.2. Runlevel 5 125
13. X Window System Configuration 127
13.1. Display Settings 127
13.2. Display Hardware Settings 127
13.3. Dual Head Display Settings 128
14. Users and Groups 130
14.1. User and Group Configuration 130
14.1.1. Adding a New User 131
14.1.2. Modifying User Properties 133
14.1.3. Adding a New Group 134
14.1.4. Modifying Group Properties 134
14.2. User and Group Management Tools 135
14.2.1. Command Line Configuration 135
14.2.2. Adding a User 135
14.2.3. Adding a Group 135
14.2.4. Password Aging 136
14.2.5. Explaining the Process 138
14.3. Standard Users 140
14.4. Standard Groups 141
14.5. User Private Groups 143
14.5.1. Group Directories 143
15. Open Office 146
15.1. Introduction to Open Office 146
15.1 System Requirements 146
15.2 How to Run 147
15.1 Starting Writer
148
15.1.1 From the system menu
148
15.2 Creating a Document
148
15.2 .1 Creating A Blank Document
148
15.2.2 Creating a Document from a Template
149
15.2.3 Creating a Document with an Autopilot
149
VI
15.3 Loading an Existing Document
149
15.4 Saving Document
149
15.4.1 Saving a Document
149
15.4.2 Saving As MS Word Document
150
15.5 Closing A Document
150
15.6 Exiting Writer
150
15.7 Formatting Documents
150
15.8 Cut, Copy and Paste
152
15.9 Inserting Pictures and Graphics
152
15.10 Draw Functions
154
15.11 Tables and Lists
156
15.12 Page and Section Breaks
158
15.13 Spell Check, Auto Correct and Word Count
158
15.14 Hyperlinks
160
15.15 Find/Replace
160
15.16 Print Preview/Printing
161
15.17 Navigator
162
15.18 Save as HTML
163
15.19 Tracking Changes
163
15.20 Versioning
164
16.1 What is Calc?
166
16.2 Spreadsheets, sheets and cells
166
16.3 Title bar and Menu bar
166
16.4 Toolbars
166
16.5 Formula bar
166
16.6 Individual cells
167
16.7 Starting new spreadsheets
167
VII
16.7.1 from the File menu
167
16.7.2 from the toolbar
167
16.7.3 from the keyboard
168
16.8 Opening existing spreadsheets
168
16.8.1 from the File menu
168
16.8.2 from the toolbar
168
16.8.3 from the keyboard
168
16.8.4 from a template
168
16.9 Saving spreadsheets
168
16.9.1 from the File menu
168
16.9.2 from the toolbar
168
16.9.3 from the keyboard
168
16.10 Navigating within spreadsheets
169
16.10.1 Going to a particular cell
169
16.10.1.1 Using the mouse
169
16.10.1.2 Using a cell reference
169
16.10.2.3 Using the Navigator
169
16.10.3 Moving from cell to cell
169
16.10.3.1 Using the Tab and Enter keys
169
16.10.3.2 Using the cursor keys
169
6.10.4 Moving from sheet to sheet
170
16.10.4.1Using the keyboard
170
16.10.4.2 Using the mouse
170
16.11 Selecting items in a sheet or spreadsheet
171
16.11.1 Selecting cells
171
16.11.2 Single cell
171
16.11.3 Range of contiguous cells
171
VIII
16.11.4 To select a range of cells by dragging the mouse
171
16.11.5 To select a range of cells without dragging the mouse
171
16.11.6 To select a range of cells without using the mouse
171
16.11.7 Range of non-contiguous cells
172
16.11.8 Selecting columns and rows
172
16.11.8.1 Single column
172
16.11.8.2 Single row
172
16.11.8.3 Multiple columns or rows
172
16.11.8.4 Entire sheet
172
16.12 Selecting sheets
172
16.12.1 Single sheet
172
16.12.2 Multiple contiguous sheets
172
16.12.3 Multiple non contiguous sheets
173
16.12.4 All sheets
173
16.13 Working with columns and rows
173
16.13.1 Inserting columns and rows
173
16.13.2 Single column or row
173
16.13.3 Multiple columns or rows
173
16.14 Deleting columns and rows
173
16.14.1 Single column or row
173
16.14.2 Multiple columns or rows
174
16.15 Working with sheets
174
16.15.1 Inserting new sheets
174
16.15.2 Deleting sheets
174
16.15.2.1 Single sheet
174
16.15.2.2 Multiple sheets
174
16.15.2.3 Renaming sheets
174
IX
16.16 Viewing Calc
175
16.16.1 Using the zoom function
175
16.17 Freezing/Unfreezing rows and columns
175
16.17.1 Freezing single rows or columns
176
16.17.2 Freezing a row and a column
176
16.17.3 Unfreezing
176
16.18 Splitting the window
176
16.18.1 To split the screen horizontally
176
16.18.2 To split the screen vertically
177
16.18.3 Removing split views
177
16.19 Entering data into a sheet
177
16.19.1 Entering numbers
177
16.19.2 Entering text
177
16.19.2.1 Entering numbers as text
177
16.19.3 Entering dates and times
178
16.19.4 Entering data into Calc
178
16.19.5 Inputting data
178
16.20 Moving between cells
178
16.20.1 Using the mouse
178
16.20.2 Using the arrow keys
178
16.20.3 Using the Enter key
178
16.21 Multiple lines of text
179
16.22 Wrapping text
179
16.23 Line breaks
179
16.24 Shrinking to fit cell
179
16.25 Editing data in Calc
179
16.26 Removing Data
179
X
16.26.1 Removing data from a cell
179
16.26.2 Removing data and formatting
179
16.27 Changing part of the data in a cell
180
16.27.1 Keyboard shortcut
180
16.27.2 Mouse
180
16.28 Formatting data in Calc
180
16.28.1 Numbers
180
16.28.2 Font
181
16.28.3 Font effects
181
16.29 Charts and Graphs
181
16.29.1 Creating a chart
181
16.30 Data range and labels
181
16.31 Chart, Axis Titles and Legend
182
16.32 A simple scatter plot
182
16.33 Moving and resizing a chart
183
16.34 Grid lines and background
183
16.35 Data labels
183
16.36 Printing a spreadsheet
183
16.37 Print options
184
16.38 Page breaks
184
16.39 Inserting a page break
184
16.39.1 To insert a page break
184
16.39.2 Row break
184
16.39.3 Column break
184
16.40 Deleting a page break
184
16.40.1 To remove a page break
184
16.41 Headers and footers
185
XI
16.41.1 Setting a header or a footer
185
16.41.2 Margin
185
16.42.3 Spacing
185
16.42.4 Height
185
16.42.5 Custom header
185
16.43 Inserting pictures
186
16.44 Mathematical functions
186
16.45 Statistical analysis functions
191
16.46 Date and time functions
199
16.47 Logical functions
202
16.48 Informational functions
203
16.49 Database functions
205
17.1 Introduction to Draw
208
17.2 The Workplace
208
17.3 The Toolbars
209
17.3.1 The Function Bar
209
17.3.2 The Object Bar
210
17.3.3 The Main Toolbar
210
17.3.4 The Color Bar
210
17.3.5 The Option Bar
212
17.3.6 The Rulers
212
17.3.7 The Status Bar
213
17.4 Drawing Basic Shapes
213
17.4.1 Drawing a segment of a straight line
213
17.4.2 Drawing a rectangle
216
17.4.3 Drawing a circle
216
17.4.4 The Texts
217
XII
17.4.5 Rectangles and Squares
218
17.4.6 Circles, Ellipses and Arcs
219
17.4.7 3D Objects
219
17.4.8 Curves
220
17.4.9 Lines and Arrows
221
17.5 Connectors
221
17.5.1 Connector toolbar
222
17.5.2 Editing Glue points
222
17.6 Selecting Objects
222
17.6.1 Direct selection
222
17.6.2 Selection by framing
222
17.6.3 Moving and Dynamically Adjusting the Size of an Object
223
17.6.4 Dynamic movement of objects
223
17.6.5 Dynamic size modification of objects
224
17.6.6 Rotating an Object
224
17.6.7 Inclination
225
17.6.8 Changing Object Attributes
225
17.7 Using the Stylist
225
17.7.1 Applying a Style
226
17.8 Special Transformations
226
17.9 3 D Rotation Objects
227
17.9.1 3D effects
227
17.10 The Bitmap Image Toolbar
227
17.11 Grouping and Combining Objects
227
17.12 Grouping & Combining Functions
228
17.12.1 Group by common selection
228
17.12.2 Maintaining groups and group dissociation
228
XIII
17.12.3 Combination Functions
228
17.13 Aligning Objects
229
17.14 Distribution of Objects
230
17.15 Managing Object Arrangement
231
17.16 Drawing Aid Tools
231
17.16.1 Zoom using the status bar
231
17.16.2 Zoom Toolbar
231
17.17 Managing Layers
232
17.18 Specific Functions
232
17.19 Duplication
232
18.1 Starting Open Office Impress
234
18.2 Custom or Empty Presentation
235
18.3 Normal View
236
18.4 Alternate Views
237
18.5 Design Templates and Images
240
18.5.1 Design Templates
241
18.6 Drawing Tools
242
18.7 Printing and Saving
246
18.7.1 To print the actual-size Impress presentation
246
18.7.2 Creating a PDF file
246
18.7.3 Saving as PowerPoint
247
18.7.4 Exporting as Alternate Formats
248
18.8 Displaying Your Presentation on the Web
248
XIV
1.1. Is Your Hardware Compatible?
Hardware compatibility is particularly important if you have an older system or a
system that you built yourself. Red Hat Enterprise Linux 5 should be compatible
with most hardware in systems that were factory built within the last two years.
However, hardware specifications change almost daily, so it is difficult to
guarantee that your hardware is 100% compatible. The most recent list of
supported hardware can be found at:
• http://hardware.redhat.com/hcl/
The disk space used by Red Hat Enterprise Linux must be separate from the disk
space used by other OSes you may have installed on your system, such as
Windows, OS/2, or even a different version of Linux. For x86, AMD64, and
Intel® 64 systems, at least two partitions (/ and swap) must be dedicated to Red
Hat Enterprise Linux. For Itanium systems, at least three partitions (/, /boot/efi/,
and swap) must be dedicated to Red Hat Enterprise Linux.
To boot using a USB pen drive, use the dd command to copy the diskboot.img
image file from the /images/ directory on the DVD or CD-ROM #1.
For example:
• dd if=diskboot.img of=/dev/sda
Your BIOS must support booting from a USB device in order for this boot
method to work.
Copy the isolinux / directory from the Red Hat Enterprise Linux DVD or CD #1
into a temporary directory (referred to here as <path-to-workspace>) using the
following command:
• cp -r <path-to-cd>/isolinux/<path-to-workspace>
Make sure the files you have copied have appropriate permissions:
• chmod u+w isolinux/*
Finally, issue the following command to create the ISO image file:
• mkisofs -o file.iso -b isolinux.bin -c boot.cat -no-emul-boot \ -boot-load-
size 4 -boot-info-table -R -J -v -T isolinux/
Note
The above command was split into two lines for printing purposes only. When you
execute this command, be sure to type it as a single command, all on the same line.
Burn the resulting ISO image (named file.iso and located in <path-to-workspace>) to a
CD-ROM as you normally would.
Hard drive installations only work from ext2, ext3, or FAT file systems. If you have a
file system other than those listed here, such as reiserfs, you will not be able to perform
a hard drive installation.
Hard drive installations require the use of the ISO or DVD/CD-ROM images. An
ISO image is a file containing an exact copy of a DVD/CD-ROM image. After
placing the required ISO images (the binary Red Hat Enterprise Linux DVD/CD-
ROMs) in a directory, choose to install from the hard drive. You can then point
the installation program at that directory to perform the installation.
To prepare your system for a hard drive installation, you must set the system up
in one of the following ways:
• Using a set of CD-ROMs, or a DVD — Create ISO image files from each
installation CD-ROM, or from the DVD. For each CD-ROM (once for the
DVD), execute the following command on a Linux system:
• dd if=/dev/cdrom of=/tmp/file-name.iso
Verifying that ISO images are intact before you attempt an installation helps to
avoid problems. To verify the ISO images are intact prior to performing an
installation, use an md5sum program (many md5sum programs are available for
various operating systems). An md5sum program should be available on the
same Linux machine as the ISO images.
Note
The Red Hat Enterprise Linux installation program has the ability to test the integrity of
the installation media. It works with the CD / DVD, hard drive ISO, and NFS ISO
installation methods. Red Hat recommends that you test all installation media before
starting the installation process, and before reporting any installation-related bugs
(many of the bugs reported are actually due to improperly-burned CDs). To use this
test, type the following command at the boot: prompt (prepend with elilo for Itanium
systems): linux media check
You can also navigate through the installation using the keyboard. The Tab
key allows you to move around the screen, the Up and Down arrow keys to
scroll through lists, + and - keys expand and collapse lists, while Space and
Enter selects or removes from selection a highlighted item. You can also use
the Alt-X key command combination as a way of clicking on buttons or
making other screen selections, where X is replaced with any underlined letter
appearing within that screen.
Note
If you are using an x86, AMD64, or Intel® 64 system, and you do not wish to use
the GUI installation program, the text mode installation program is also available.
To start the text mode installation program, use the following command at the boot:
prompt: linux text
Note
If you are using an Itanium system, and you do not wish to use the GUI installation
program, the text mode installation program is also available. To start the text
mode installation program, type the following command at the EFI Shell prompt:
elilo linux text
Generally, there is no reason to leave the default console (virtual console #6)
for graphical installations unless you are attempting to diagnose installation
problems.
Note
While text mode installations are not explicitly documented, those using the text
mode installation program can easily follow the GUI installation instructions. One
thing to note is that manipulation of LVM (Logical Volume Management) disk
volumes is only possible in graphical mode. In text mode it is only possible to view
and accept the default LVM setup.
Here is a list of the most important widgets shown in Figure 2.1, “Installation
Program Widgets as seen in Boot Loader Configuration” and Figure 2.2,
“Installation Program Widgets as seen in Disk Druid”:
Window
Windows (usually referred to as dialogs in this manual) appear on your
screen throughout the installation process. At times, one window may overlay
another; in these cases, you can only interact with the window on top. When
Pakistan Computer Bureau 6
you are finished in that window, it disappears, allowing you to continue
working in the window underneath.
Checkbox
Checkboxes allow you to select or deselect a feature. The box displays either
an asterisk (selected) or a space (unselected). When the cursor is within a
checkbox, press Space to select or deselect a feature.
Text Input
Text input lines are regions where you can enter information required by the
installation program. When the cursor rests on a text input line, you may enter
and/or edit information on that line.
Text Widget
Text widgets are regions of the screen for the display of text. At times, text
widgets may also contain other widgets, such as checkboxes. If a text widget
contains more information than can be displayed in the space reserved for it, a
scroll bar appears; if you position the cursor within the text widget, you can
then use the Up and Down arrow keys to scroll through all the information
available. Your current position is shown on the scroll bar by a # character,
which moves up and down the scroll bar as you scroll.
Scroll Bar
Scroll bars appear on the side or bottom of a window to control which part of
a list or document is currently in the window's frame. The scroll bar makes it
easy to move to any part of a file.
Button Widget
Button widgets are the primary method of interacting with the installation
program. You progress through the windows of the installation program by
navigating these buttons, using the Tab and Enter keys. Buttons can be
selected when they are highlighted.
Cursor
Although not a widget the cursor is used to select (and interact with), a
particular widget. As the cursor is moved from widget to widget, it may cause
the widget to change color, or the cursor itself may only appear positioned in
or next to the widget.
To "press" a button, position the cursor over the button (using Tab, for
example) and press Space or Enter. To select an item from a list of items,
Pakistan Computer Bureau 7
move the cursor to the item you wish to select and press Enter. To select an
item with a checkbox, move the cursor to the checkbox and press Space to
select an item. To deselect, press Space a second time.
Pressing F12 accepts the current values and proceeds to the next dialog; it is
equivalent to pressing the OK button.
Caution
Unless a dialog box is waiting for your input, do not press any keys during the
installation process (doing so may result in unpredictable behavior).
Note
Boot CD-ROM
• Your machine supports a bootable CD-ROM drive and you want to
perform network or hard drive installation.
Insert the boot media and reboot the system. Your BIOS settings may need to
be changed to allow you to boot from the CD-ROM or USB device.
Pakistan Computer Bureau 8
Tip
To change your BIOS settings on an x86, AMD64, or Intel® 64 system, watch the
instructions provided on your display when your computer first boots. A line of text
appears, telling you which key to press to enter the BIOS settings.
Once you have entered your BIOS setup program, find the section where you
can alter your boot sequence. The default is often C, A or A, C (depending on
whether you boot from your hard drive [C] or a diskette drive [A]). Change
this sequence so that the CD-ROM is first in your boot order and that C or A
(whichever is your typical boot default) is second. This instructs the computer
to first look at the CD-ROM drive for bootable media; if it does not find
bootable media on the CD-ROM drive, it then checks your hard drive or
diskette drive. Save your changes before exiting the BIOS. For more
information, refer to the documentation that came with your system.
After a short delay, a screen containing the boot: prompt should appear. The
screen contains information on a variety of boot options. Each boot option
also has one or more help screens associated with it. To access a help screen,
press the appropriate function key as listed in the line at the bottom of the
screen. As you boot the installation program, be aware of two issues:
If you press a help screen function key, there is a slight delay while the help
screen is read from the boot media. Normally, you only need to press Enter to
boot. Be sure to watch the boot messages to review if the Linux kernel detects
your hardware. If your hardware is properly detected, continue to the next
section. If it does not properly detect your hardware, you may need to restart
the installation and use one of the boot options provided further.
You must create an LS-120 boot image file diskette from the boot image file
on CD #1: images/boot.img. To create this diskette in Linux, insert a blank
LS-120 diskette and type the following command at a shell prompt:
• dd if=boot.img of=/dev/hda bs=180k
Replace boot.img with the full path to the boot image file and /dev/hda with
the correct device name for the LS-120 diskette drive.
If you are not using the Red Hat Enterprise Linux CD, the installation
program starts in text mode and you must choose a few basic options for your
system.
• Insert the LS-120 diskette you made from the boot image file
boot.img. If you are performing a local CD-ROM installation but
booting off the LS-120 diskette, insert the Red Hat Enterprise Linux
CD #1 also. If you are performing a hard drive, NFS, FTP, or HTTP
installation, you do not need the CD-ROM.
• From the Boot Option menu choose EFI Shell.
• At the Shell> prompt, change the device to the LS-120 drive by typing
the command fs0: using the example map output above.
• Type elilo linux to boot into the installation program.
Also in the images/ directory is the boot.iso file. This file is an ISO image
than can be used to boot the installation program. To use the boot.iso, your
computer must be able to boot from its CD-ROM drive, and its BIOS settings
must be configured to do so. You must then burn the boot.iso file onto a
recordable/rewriteable CD-ROM.
If you need to perform the installation in serial mode, type the following
command:
• linux console=<device>
• Linux updates
This command will prompt you to insert a floppy diskette containing updates
for anaconda. It is not needed if you are performing a network installation and
have already placed the updates image contents in rhupdates/ on the server.
After entering any options, press Enter to boot using those options.
If you need to specify boot options to identify your hardware, please write
them down. The boot options are needed during the boot loader configuration
portion of the installation.
• DVD/CD-ROM
If you have a DVD/CD-ROM drive and the Red Hat Enterprise Linux CD-
ROMs or DVD you can use this method.
Hard Drive
If you have copied the Red Hat Enterprise Linux ISO images to a local hard
drive, you can use this method. You need a boot CD-ROM (use the linux
askmethod boot option).
NFS
If you are installing from an NFS server using ISO images or a mirror image
of Red Hat Enterprise Linux, you can use this method. You need a boot CD-
ROM (use the linux askmethod boot option). Note that NFS installations may
also be performed in GUI mode.
FTP
If you are installing directly from an FTP server, use this method. You need a
boot CD-ROM (use the linux askmethod boot option).
HTTP
If you are installing directly from an HTTP (Web) server, use this method.
You need a boot CD-ROM (use the linux askmethod boot option).
The installation program then probes your system and attempts to identify
your CD-ROM drive. It starts by looking for an IDE (also known as an
ATAPI) CD-ROM drive.
Pakistan Computer Bureau 12
Note
To abort the installation process at this time, reboot your machine and then eject
the boot media. You can safely cancel the installation at any point before the About
to Install screen. Refer to Section 24, “Preparing to Install” for more information.
If the DVD/CD-ROM drive is found and the driver loaded, the installer will
present you with the option to perform a media check on the DVD/CD-ROM.
This will take some time, and you may opt to skip over this step. However, if
you later encounter problems with the installer, you should reboot and
perform the media check before calling for support. From the media check
dialog, continue to the next stage of the installation process.
Enter the device name of the partition containing the Red Hat Enterprise
Linux ISO images. This partition must be formatted with an ext2 or vfat
Filesystem, and cannot be a logical volume. There is also a field labeled
Directory holding images.
If the ISO images are in the root (top-level) directory of a partition, enter a /.
If the ISO images are located in a subdirectory of a mounted partition, enter
the name of the directory holding the ISO images within that partition. For
example, if the partition on which the ISO images is normally mounted as
/home/ and the images are in /home/new/, you would enter /new/. After you
have identified the disk partition, the Welcome dialog appears.
Tip
To change your keyboard layout type after you have completed the installation, use
the Keyboard Configuration Tool. Type the system-config-keyboard command in a
shell prompt to launch the Keyboard Configuration Tool. If you are not root, it
prompts you for the root password to continue.
On this screen you can choose to create the default layout or choose to
manual partition using the 'Create custom layout' option of Disk Druid.
The first three options allow you to perform an automated installation without
having to partition your drive(s) yourself. If you do not feel comfortable with
partitioning your system, it is recommended that you do not choose to create a
custom layout and instead let the installation program partition for you.
You can configure an iSCSI target for installation, or disable a dmraid device
from this screen by clicking on the 'Advanced storage configuration' button.
Warning
If you receive an error after the Disk Partitioning Setup phase of the installation saying
something similar to: "The partition table on device hda was unreadable. To create
new partitions it must be initialized, causing the loss of ALL DATA on this drive."
You may not have a partition table on that drive or the partition table on the drive
may not be recognizable by the partitioning software used in the installation
program. Users who have used programs such as EZ-BIOS have experienced
similar problems, causing data to be lost (assuming the data was not backed up
before the installation began). No matter what type of installation you are
From this screen you can choose to disable a dmraid device, in which case the
individual elements of the dmraid device will appear as separate hard drives. You
can also choose to configure an iSCSI (SCSI over TCP/IP) target.
• To configure an ISCSI target invoke the 'Configure ISCSI Parameters'
dialog by selecting 'Add ISCSI target' and clicking on the 'Add Drive'
button. Fill in the details for the ISCSI target IP and provide a unique
ISCSI initiator name to identify this system.
• Click the 'Add target' button to attempt connection to the ISCSI target
using this information.
Caution
If you select this option, all data on the selected hard drive(s) is removed by the
installation program. Do not select this option if you have information that you want to
keep on the hard drive(s) where you are installing Red Hat Enterprise Linux.
Using your mouse, choose the storage drive(s) on which you want Red Hat
Enterprise Linux to be installed. If you have two or more drives, you can choose
which drive(s) should contain this installation. Unselected drives, and any data
on them, are not touched.
Caution
It is always a good idea to back up any data that you have on your systems. For
example, if you are upgrading or creating a dual-boot system, you should back up any
data you wish to keep on your drive(s). Mistakes do happen and can result in the loss of
all your data.
Tip
If you have a RAID card, be aware that some BIOSes do not support booting from the
RAID card. In cases such as these, the /boot/ partition must be created on a partition
outside of the RAID array, such as on a separate hard drive. An internal hard drive is
necessary to use for partition creation with problematic RAID cards.
Note
Please note that in the text mode installation it is not possible to work with LVM
(Logical Volumes) beyond viewing the existing setup. LVM can only be set up using
the graphical Disk Druid program in a graphical installation.
If you chose to create a custom layout, you must tell the installation program
where to install Red Hat Enterprise Linux. This is done by defining mount points
for one or more disk partitions in which Red Hat Enterprise Linux is installed.
You may also need to create and/or delete partitions at this time.
Note
If you have not yet planned how to set up your partitions, At a bare minimum, you need
an appropriately-sized root partition, and a swap partition equal to twice the amount of
RAM you have on the system. Itanium system users should have a /boot/efi/ partition of
approximately 100 MB and of type FAT (VFAT), a swap partition of at least 512 MB,
and an appropriately-sized root (/) partition.
The partitioning tool used by the installation program is Disk Druid. With the
exception of certain esoteric situations, Disk Druid can handle the partitioning
requirements for a typical installation.
New:
Used to request a new partition, when selected, a dialog box appears containing
fields (such as the mount point and size fields) that must be filled in.
Edit:
It’s used to modify attributes of the partition currently selected in the Partitions
section. Selecting Edit opens a dialog box. Some or all of the fields can be
edited, depending on whether the partition information has already been written
to disk. You can also edit free space as represented in the graphical display to
create a new partition within that space. Either highlight the free space and then
select the Edit button, or double-click on the free space to edit it. To make a
RAID device, you must first create (or reuse existing) software RAID partitions.
Once you have created two or more software RAID partitions, select Make RAID
to join the software RAID partitions into a RAID device.
Delete:
It’s used to remove the partition currently highlighted in the Current Disk
Partitions section. You will be asked to confirm the deletion of any partition.
Reset:
It’s used to restore Disk Druid to its original state. All changes made will be lost
if you Reset the partitions.
RAID:
It’s Used to provide redundancy to any or all disk partitions. It should only be
used if you have experience using RAID. To read more about RAID, refer to the
Red Hat Enterprise Linux Deployment Guide.
To make a RAID device, you must first create software RAID partitions. Once
you have created two or more software RAID partitions, select RAID to join the
software RAID partitions into a RAID device.
LVM:
It allows you to create an LVM logical volume. The role of LVM (Logical
Volume Manager) is to present a simple logical view of underlying physical
storage space, such as a hard drive(s). LVM manages individual physical disks —
or to be more precise, the individual partitions present on them. It should only be
used if you have experience using LVM. To read more about LVM, refer to the
Red Hat Enterprise Linux Deployment Guide. Note, LVM is only available in the
graphical installation program.
Device:
This field displays the partition's device name.
Mount Point/RAID/Volume:
A mount point is the location within the directory hierarchy at which a volume
exists; the volume is "mounted" at this location. This field indicates where the
partition is mounted. If a partition exists, but is not set, then you need to define
its mount point. Double-click on the partition or click the Edit button.
Type:
This field shows the partition's file system type (for example, ext2, ext3, or vfat).
Format:
This field shows if the partition being created will be formatted.
Size (MB):
This field shows the partition's size (in MB).
Start:
This field shows the cylinder on your hard drive where the partition begins.
End:
This field shows the cylinder on your hard drive where the partition ends. Hide
RAID device/LVM Volume Group members: Select this option if you do not
want to view any RAID device or LVM Volume Group members that have been
created.
Warning
You must create a /boot/efi/ partition of type VFAT and at least 100 MB in size as the
first primary partition.
A swap partition (at least 256 MB) — swap partitions are used to support virtual
memory. In other words, data is written to a swap partition when there is not
enough RAM to store the data your system is processing.
If you are unsure about what size swap partition to create, make it twice the
amount of RAM on your machine. It must be of type swap.
Swap should equal 2x physical RAM for up to 2 GB of physical RAM, and then
an additional 1x physical RAM for any amount above 2 GB, but never less than
32 MB. So, if: M = Amount of RAM in GB, and S = Amount of swap in GB,
then
If M < 2
S = M *2
Else
S=M + 2
A root partition (3.0 GB - 5.0 GB) — this is where "/" (the root directory) is
located. In this setup, all files (except those stored in /boot/efi) are on the root
A swap partition (at least 256 MB) — swap partitions are used to support virtual
memory. In other words, data is written to a swap partition when there is not
enough RAM to store the data your system is processing.
If you are unsure about what size swap partition to create, make it twice the
amount of RAM on your machine. It must be of type swap.
Swap should equal 2x physical RAM for up to 2 GB of physical RAM, and then
an additional 1x physical RAM for any amount above 2 GB, but never less than
32 MB.
So, if:
M = Amount of RAM in GB, and S = Amount of swap in GB, then
If M < 2
S = M *2
Else
S=M+2
For systems with really large amounts of RAM (more than 32 GB) you can likely
get away with a smaller swap partition (around 1x, or less, of physical RAM).
A /boot/ partition (100 MB) — the partition mounted on /boot/ contains the
operating system kernel (which allows your system to boot Red Hat Enterprise
Tip
If your hard drive is more than 1024 cylinders (and your system was manufactured
more than two years ago), you may need to create a /boot/partition if you want the /
(root) partition to use all of the remaining space on your hard drive.
Tip
If you have a RAID card, be aware that some BIOSes do not support booting from the
RAID card. In cases such as these, the /boot/ partition must be created on a partition
outside of the RAID array, such as on a separate hard drive.
A root partition (3.0 GB - 5.0 GB) — this is where "/" (the root directory) is
located. In this setup, all files (except those stored in /boot) are on the root
partition. A 3.0 GB partition allows you to install a minimal installation; while a
5.0 GB root partition lets you perform a full installation, choosing all package
groups.
Note
You must dedicate at least one partition for this installation, and optionally more.
Mount Point:
Enter the partition's mount point. For example, if this partition should be the root
partition, enter /; enter /boot for the /boot partition, and so on. You can also use
the pull-down menu to choose the correct mount point for your partition. For a
swap partition the mount point should not be set - setting the filesystem type to
swap is sufficient.
Allowable Drives:
This field contains a list of the hard disks installed on your system. If a hard
disk's box is highlighted, then a desired partition can be created on that hard disk.
If the box is not checked, then the partition will never be created on that hard
disk. By using different checkbox settings, you can have Disk Druid place
Size (MB):
Enter the size (in megabytes) of the partition. Note, this field starts with 100 MB;
unless changed; only a 100 MB partition will be created.
If you choose fill all space up to (MB), you must give size constraints in the field
to the right of this option. This allows you to keep a certain amount of space free
on your hard drive for future use. Force to be a primary partition: Select whether
the partition you are creating should be one of the first four partitions on the hard
drive. If unselected, the partition is created as a logical partition.
OK:
Select OK once you are satisfied with the settings and wish to create the
partition.
Cancel:
Select cancel if you do not want to create the partition.
ext2
An ext2 file system supports standard UNIX file types (regular files,
directories, symbolic links, etc). It provides the ability to assign long file
names, up to 255 characters.
ext3
The ext3 file system is based on the ext2 file system and has one main advantage
— journaling. Using a journaling file system reduces time spent recovering a file
system after a crash as there is no need to fsck the file system. The ext3 file
system is selected by default and is highly recommended.
software RAID
Creating two or more software RAID partitions allows you to create a RAID
device. For more information regarding RAID, refer to the chapter RAID
(Redundant Array of Independent Disks) in the Red Hat Enterprise Linux
Deployment Guide.
Swap
Swap partitions are used to support virtual memory. In other words, data is
written to a swap partition when there is not enough RAM to store the data your
system is processing. Refer to the Red Hat Enterprise Linux Deployment Guide
for additional information.
Vfat
The VFAT file system is a Linux file system that is compatible with Microsoft
Windows long filenames on the FAT file system. This file system must be used
for the /boot/efi/
Note
If the partition already exists on your disk, you can only change the partition's mount
point. To make any other changes, you must delete the partition and recreate it.
If you do not want to install GRUB as your boot loader, click Change boot
loader, where you can choose not to install a boot loader at all. If you already
have a boot loader that can boot Red Hat Enterprise Linux and do not want to
overwrite your current boot loader, choose Do not install a boot loader by
clicking on the Change boot loader button.
Caution
If you choose not to install GRUB for any reason, you will not be able to boot the
system directly, and you must use another boot method (such as a commercial boot
loader application). Use this option only if you are sure you have another way of
booting the system!
Note
The Label column lists what you must enter at the boot prompt, in non-graphical boot
loaders, in order to boot the desired operating system.
Once you have loaded the GRUB boot screen, use the arrow keys to choose a
boot label or type e for edit. You are presented with a list of items in the
configuration file for the boot label you have selected. Boot loader passwords
provide a security mechanism in an environment where physical access to your
server is available.
If you are installing a boot loader, you should create a password to protect your
system. Without a boot loader password, users with access to your system can
pass options to the kernel which can compromise your system security. With a
boot loader password in place, the password must first be entered before
selecting any non-standard boot options. However, it is still possible for someone
with physical access to the machine to boot from a diskette, CD-ROM, or USB
Media if the BIOS support it. Security plans which include boot loader passwords
should also address alternate boot methods. If you choose to use a boot loader
password to enhance your system security, be sure to select the checkbox labeled
Use a boot loader password. Once selected, enter a password and confirm it.
To configure more advanced boot loader options, such as changing the drive
order or passing options to the kernel, be sure Configure advanced boot loader
options is selected before clicking Next.
Tip
If you have a RAID card, be aware that some BIOSes do not support booting from the
RAID card. In cases such as these, the boot loader should not be installed on the MBR
of the RAID array. Rather, the boot loader should be installed on the MBR of the same
drive as the /boot/ partition was created.
If your system only uses Red Hat Enterprise Linux, you should choose the MBR.
Click the Change Drive Order button if you would like to rearrange the drive
order or if your BIOS does not return the correct drive order. Changing the drive
order may be useful if you have multiple SCSI adapters, or both SCSI and IDE
adapters, and you want to boot from the SCSI device.
The Force LBA32 (not normally required) option allows you to exceed the 1024
cylinder limit for the /boot/ partition. If you have a system which supports the
LBA32 extension for booting operating systems above the 1024 cylinder limit,
Tip
While partitioning your hard drive, keep in mind that the BIOS in some older systems
cannot access more than the first 1024 cylinders on a hard drive. If this is the case,
Leave enough room for the /boot Linux partition on the first 1024 cylinders of your
hard drive to boot Linux. The other Linux partitions can be after cylinder 1024.
In parted, 1024 cylinders equals 528MB. For more information, refer to:
http://www.pcguide.com/ref/hdd/bios/size MB504-c.html. To add default options
to the boot command, enter them into the Kernel parameters field. Any options
you enter are passed to the Linux kernel every time it boots.
LOADLIN:
You can load Linux from MS-DOS. Unfortunately, this requires a copy of the
Linux kernel (and an initial RAM disk, if you have a SCSI adapter) to be
available on an MS-DOS partition. The only way to accomplish this is to boot
your Red Hat Enterprise Linux system using some other method (for example,
from a boot CD-ROM) and then copy the kernel to an MS-DOS partition.
LOADLIN is available from
ftp://metalab.unc.edu/pub/Linux/system/boot/dualboot/
ftp://metalab.unc.edu/pub/Linux/system/boot/loaders/
Note
Boot loaders such as LOADLIN and System Commander are considered to be third-
party boot loaders and are not supported by Red Hat.
Using your mouse, click on the interactive map to select a specific city
(represented by a yellow dot). A red X appears indicating your selection.
You can also scroll through the list at the bottom of the screen to select your time
zone. Using your mouse, click
Tip
To change your time zone configuration after you have completed the installation, use
the Time and Date Properties Tool.
Type the system-config-date command in a shell prompt to launch the Time and
Date Properties Tool. If you are not root, it prompts you for the root password to
continue. To run the Time and Date Properties Tool as a text-based application,
use the command timeconfig.
The root user (also known as the superuser) has complete access to the entire system;
for this reason, logging in as the root user is best done only to perform system
maintenance or administration.
Use the root account only for system administration. Create a non-root account
for your general use and su - to root when you need to fix something quickly.
These basic rules minimize the chances of a typo or an incorrect command doing
damage to your system.
Tip
To become root, type su - at the shell prompt in a terminal window and then press
Enter. Then, enter the root password and press Enter.
The installation program prompts you to set a root password2 for your system.
You cannot proceed to the next stage of the installation process without entering
a root password.
You should make the root password something you can remember, but not
something that is easy for someone else to guess. Your name, your phone
number, qwerty, password, root, 123456, and anteater are all examples of bad
passwords. Good passwords mix numerals with upper and lower case letters and
do not contain dictionary words: Aard387vark or 420BMttNT, for example.
Remember that the password is case-sensitive. If you write down your password,
keep it in a secure place. However, it is recommended that you do not write
down this or any password you create.
Note
Do not use one of the example passwords offered in this manual. Using one of
these passwords could be considered a security risk.
Tip
To change your root password after you have completed the installation, use the Root
Password Tool.
Note
Users of Itanium systems who want support for developing or running 32-bit
applications are encouraged to select the Compatibility Arch Support and
Select each component you wish to install.Once a package group has been
selected, if optional components are available you can click on Optional
packages to view which packages are installed by default, and to add or remove
Optional packages from that group. If there are no optional components this
button will be disabled.
Warning
If, for some reason, you would rather not continue with the installation process, this is
your last opportunity to safely cancel the process and reboot your machine. Once you
press the Next button, partitions are written and packages are installed. If you wish to
abort the installation, you should reboot now before any existing information on any
hard drive is rewritten.
To cancel this installation process, press your computer's Reset button or use the
Control-Alt-Delete key combination to restart your machine.
The installation program prompts you to prepare your system for reboot.
Remember to remove any installation media if it is not ejected automatically
upon reboot. After your computer's normal power-up sequence has completed,
the graphical boot loader prompt appears at which you can do any of the
following things:
Select a boot label, followed by Enter — causes the boot loader to boot the
operating system corresponding to the boot label.
Do nothing — after the boot loader's timeout period, (by default, five seconds)
the boot loader automatically boots the default boot entry.
elilo linux
If you do not know the names of the installed kernels, you can view the
/boot/efi/elilo.conf file in EFI with the following instructions:
2. Type ls at the fs0:\> to make sure you are in the correct partition.
This command displays the contents of the configuration file. Each stanza
contains a line beginning with label followed by a label name for that kernel. The
label name is what you type after elilo to boot the different kernels.
1. Boot the Itanium system and choose Boot option maintenance menu from the
EFI Boot Manager menu.
2. Choose Add a Boot Option from the Main Menu.
3. Select the system partition that is mounted as /boot/efi/ in Linux.
You can either create this file after booting into Red Hat Enterprise Linux or use
the editor built into the EFI shell. To use the EFI shell, at the Shell> prompt,
change devices to the system partition (mounted as /boot/efi in Linux). For
example, if fs0 is the system boot partition, type fs0: at the EFI Shell prompt.
Type ls to make sure you are in the correct partition. Then type edit startup.nsh.
Type the contents of the file and save it.
The next time the system boots, EFI detects the startup.nsh file and use it to boot
the system. To stop EFI from loading the file, type Ctrl-C. This aborts the
process, and returns you to the EFI shell prompt.
Note
It is always a good idea to backup any data that you have on your system(s). Mistakes
do happen and can result in the loss all of your data.
In DOS and Windows, use the Windows fdisk utility to create a new MBR with
the undocumented flag /mbr. This ONLY rewrites the MBR to boot the primary
DOS partition. The command should look like the following:
• fdisk /mbr
If you need to remove Linux from a hard drive and have attempted to do this
with the default DOS (Windows) fdisk, you will experience the Partitions exist
but they do not exist problem. The best way to remove non-DOS partitions is
with a tool that understands partitions other than DOS.
To begin, insert the Red Hat Enterprise Linux CD #1 and boot your system.
Once you have booted off the CD, a boot prompt appears. At the boot prompt,
type: Linux rescue. This starts the rescue mode program. You are prompted for
your keyboard and language requirements. Enter these values as you would
during the installation of Red Hat Enterprise Linux.
Next, a screen appears telling you that the program attempts to find a Red Hat
Enterprise Linux install to rescue. Select Skip on this screen. After selecting
Skip, you are given a command prompt where you can access the partitions you
would like to remove.
First, type the command list-harddrives. This command lists all hard drives on
your system that are recognizable by the installation program, as well as their
sizes in megabytes.
Warning
Be careful to remove only the necessary Red Hat Enterprise Linux partitions. Removing
other partitions could result in data loss or a corrupted system environment.
• parted /dev/hda
Using the print command, view the current partition table to determine the minor
number of the partition to remove:
The print command also displays the partition's type (such as Linux-swap, ext2,
ext3, and so on). Knowing the type of the partition helps you in determining
whether to remove the partition. Remove the partition with the command rm. For
example, to remove the partition with minor number 3:
• rm 3
Important
The changes start taking place as soon as you press [Enter], so review the command
before committing to it.
After removing the partition, use the print command to confirm that it is removed
from the partition table. Once you have removed the Linux partitions and made
all of the changes you need to make, type quit to quit parted.
After quitting parted, type exit at the boot prompt to exit rescue mode and reboot
your system, instead of continuing with the installation. The system should
reboot automatically. If it does not, you can reboot your computer using Control-
Alt-Delete.
You must also install your preferred boot loader (GRUB or LILO) on the MBR of
a drive that is outside of the RAID array. This should be the same drive that hosts
the /boot/ partition. Once these changes have been made, you should be able to
finish your installation and boot the system properly.
Ensure that you have the latest installation updates and images from Red Hat.
Review the online errata to see if newer versions are available. If the latest
images still fail, it may be due to a problem with your hardware. Commonly,
these errors are in your memory or CPU-cache. A possible solution for this error
is turning off the CPU-cache in the BIOS, if your system supports this. You
could also try to swap your memory around in the motherboard slots to check if
the problem is either slot or memory related.
• linux mediacheck
• http://www.bitwizard.nl/sig11/
One possible solution is to try using the resolution= boot option. This option
may be most helpful for laptop users. Another solution to try is the driver=
option to specify the driver that should be loaded for your video card. If this
works, it should be reported as a bug as the installer has failed to autodetect your
videocard.
Note
To disable frame buffer support and allow the installation program to run in text mode,
try using the nofb boot option. This command may be necessary for accessibility with
some screen reading hardware.
• http://hardware.redhat.com/hcl/
When the traceback dialog appears, the traceback error message is automatically
written to a file named /tmp/anacdump.txt. Once the dialog appears, switch over
to a new tty (virtual console) by pressing the keys Ctrl-Alt-F2 and scp the
message written to /tmp/anacdump.txt to a known working remote system.
Users who have used programs such as EZ-BIOS have experienced similar problems,
causing data to be lost (assuming the data was not backed up before the installation
began) that could not be recovered. No matter what type of installation you are
performing, backups of the existing data on your systems should always be made.
If your hard drive is more than 1024 cylinders, you must create a /boot partition
if you want the / (root) partition to use all of the remaining space on your hard
drive.
• A / (root) partition
• A <swap> partition of type swap
Tip
When defining a partition's type as swap, do not assign it a mount point. Disk Druid
automatically assigns the mount point for you.
Tip
When defining a partition's type as swap, you do not have to assign it a mount point.
Disk Druid automatically assigns the mount point for you.
in run
rc = self.todo.doInstall ()
File "/var/tmp/anaconda-7.1//usr/lib/anaconda/todo.py",
line 1468, in doInstall
self.fstab.savePartitions ()
File "fstab.py", line 221, in savePartitions sys.exit(0)
SystemExit: 0
Local variables in innermost frame:
self: <fstab.GuiFstab instance at 8446fe0>
If you experience such an error, first try to download any available errata for
anaconda. Errata can be found at:
• http://www.redhat.com/support/errata/
The anaconda website may also be a useful reference and can be found online at:
• http://rhlinux.redhat.com/anaconda/
You can also search for bug reports related to this problem. To search Red Hat's
bug tracking system, go to:
• http://bugzilla.redhat.com/bugzilla/
Finally, if you are still facing problems related to this error, register your product
and contact our support team. To register your product, go to:
• http://www.redhat.com/apps/activate/
Once you reboot, the grub.conf file is reread and any changes you have made
take effect. You may re-enable the graphical boot screen by uncommenting (or
adding) the above line back into the grub.conf file.
To set up your system so that you can log in at a graphical login screen, you
must edit one file, /etc/inittab, by changing just one number in the runlevel
section. When you are finished, reboot the computer. The next time you log in,
you are presented with a graphical login prompt. Open a shell prompt. If you are
in your user account, become root by typing the su command. Now, type gedit
/etc/inittab to edit the file with gedit. The file /etc/inittab opens. Within the first
screen, a section of the file which looks like the following appears:
To change from a console to a graphical login, you should change the number in
the line id:3:initdefault: from a 3 to a 5.
Warning
• id:5:initdefault:
When you are satisfied with your change, save and exit the file using the Ctrl-Q
keys. A window appears and asks if you would like to save the changes. Click
Save. The next time you log in after rebooting your system, you are presented
with a graphical login prompt.
• If you want X, you can either install the packages from the Red Hat
Enterprise Linux CD-ROMs or perform an upgrade.
• df -h
The df command should help you diagnose which partition is full. For additional
information about df and an explanation of the options available (such as the -h
option used in this example), refer to the df man page by typing man df at a shell
prompt.
• If you cannot remember your root password, boot your system as linux
single. Itanium users must enter boot commands with elilo followed by
the boot command.
• If you are using an x86-based system and GRUB is your installed boot
loader, type e for edit when the GRUB boot screen has loaded. You are
• Choose the line that starts with kernel and type e to edit this boot entry.
At the end of the kernel line, add:
o Single
o Press Enter to exit edit mode.
o Once the boot loader screen has returned, type b to boot the
system.
Once you have booted into single user mode and have access to the # prompt,
you must type passwd root, which allows you to enter a new password for root.
At this point you can type shutdown -r now to reboot the system with the new
root password.
• If you cannot remember your user account password, you must become
root. To become root, type su - and enter your root password when
prompted. Then, type passwd <username>. This allows you to enter a
new password for the specified user account.
• If the graphical login screen does not appear, check your hardware for
compatibility issues. The Hardware Compatibility List can be found at:
o http://hardware.redhat.com/hcl/
• mem=xxM
Once you reboot, the changes made to grub.conf are reflected on your system.
Once you have loaded the GRUB boot screen, type e for edit. You are presented
with a list of items in the configuration file for the boot label you have selected.
Choose the line that starts with kernel and type e to edit this boot entry. At the
end of the kernel line, add
• mem=xxM
where xx equals the amount of RAM in your system. Press Enter to exit edit
mode. Once the boot loader screen has returned, type b to boot the system.
Itanium users must enter boot commands with elilo followed by the boot
command. Remember to replace xx with the amount of RAM in your system.
To use the Sound Card Configuration Tool, choose Main Menu => System
=>Administration => Soundcard Detection in GNOME, or Main Menu =>
Administration =>Soundcard Detection in KDE. A small text box pops up
prompting you for your root password.
IBM®eServer™System i™ OS/400®
IBM®eServer™System p™ YABOOT
IBM®System z® z/IPL
IBM®System z® z/IPL
Intel®Itanium™ ELILO
X86 GRUB
This chapter discusses commands and configuration options for the GRUB boot
loader included with Red Hat Enterprise Linux, for the x86 architecture.
5.2. GRUB
The GNU GRand Unified Boot loader (GRUB) is a program which enables the
selection of the installed operating system or kernel to be loaded at system boot
time. It also allows the user to pass arguments to the kernel.
1. The Stage 1 or primary boot loader is read into memory by the BIOS
from the MBR1. The primary boot loader exists on less than 512 bytes of
The method used to boot Red Hat Enterprise Linux is called direct loading
because the boot loader loads the operating system directly. There is no
intermediary between the boot loader and the kernel. The boot process used by
other operating systems may differ. For example, the Microsoft®Windows®
operating system, as well as other operating systems, is loaded using chain
loading. Under this method, the MBR points to the first sector of the partition
holding the operating system, where it finds the files necessary to actually boot
that operating system.GRUB supports both direct and chain loading boot
methods, allowing it to boot almost any operating system.
Warning
3. GRUB supports Logical Block Addressing (LBA) mode. LBA places the
addressing conversion used to find files in the hard drive's firmware, and
is used on many IDE and all SCSI hard devices. Before LBA, boot
loaders could encounter the 1024-cylinder BIOS limitation, where the
BIOS could not find a file after the 1024 cylinder head of the disk. LBA
support allows GRUB to boot operating systems from partitions beyond
the 1024-cylinder limit, so long as the system BIOS supports LBA mode.
Most modern BIOS revisions support LBA mode.
4. GRUB can read ext2 partitions. This functionality allows GRUB to access
its configuration file, /boot/grub/grub.conf, every time the system boots,
eliminating the need for the user to write a new version of the first stage
boot loader to the MBR when configuration changes are made. The only
time a user needs to reinstall GRUB on the MBR is if the physical
location of the /boot/ partition is moved on the disk.
• /sbin/grub-install /dev/hda
The next time the system boots, the GRUB graphical boot loader menu appears
before the kernel loads into memory.
Important
If GRUB is installed on a RAID 1 array, the system may become unbootable in the
event of disk failure. An unsupported workaround is provided online at the following
URL: http://www.dur.ac.uk/a.d.stribblehill/mirrored_grub.html
• (<type-of-device><bios-device-number>,<partition-number>)
The <type-of-device> specifies the type of device from which GRUB boots. The
two most common options are hd for a hard disk or fd for a 3.5 diskette. A lesser
used device type is also available called nd for a network disk. Instructions on
configuring GRUB to boot over the network are available online at
• http://www.gnu.org/software/grub/manual/.
The <bios-device-number> is the BIOS device number. The primary IDE hard
drive is numbered 0 and a secondary IDE hard drive is numbered 1. This syntax
is roughly equivalent to that used for devices by the kernel. For example, the a in
hda for the kernel is analogous to the 0 in hd0 for GRUB, the b in hdb is
analogous to the 1 in hd1, and so on.
Tip
The numbering system for devices under GRUB always begins with 0, not 1. Failing to
make this distinction is one of the most common mistakes made by new users.
To give an example, if a system has more than one hard drive, GRUB refers to
the first hard drive as (hd0) and the second as (hd1). Likewise, GRUB refers to
the first partition on the first drive as (hd0,0) and the third partition on the
second hard drive as (hd1,2).
In general the following rules apply when naming devices and partitions under
GRUB:
To specify an entire device without respect to partitions, leave off the comma
and the partition number. This is important when telling GRUB to configure the
MBR for a particular disk. For example, (hd0) specifies the MBR on the first
device and (hd3) specifies the MBR on the fourth device.
If a system has multiple drive devices, it is very important to know how the drive
boot order is set in the BIOS. This is a simple task if a system has only IDE or
SCSI drives, but if there is a mix of devices, it becomes critical that the type of
drive with the boot partition be accessed first.
• (<device-type><device-number>,<partition-number>)</path/to/file>
In this example, replace <device-type> with hd, fd, or nd. Replace <device-
number> with the integer for the device. Replace </path/to/file> with an absolute
path relative to the top-level of the device. It is also possible to specify files to
GRUB that do not actually appear in the file system, such as a chain loader that
appears in the first few blocks of a partition. To load such files, provide a
blocklist that specifies block by block where the file is located in the partition.
Since a file is often comprised of several different sets of blocks, blocklists use a
special syntax. Each block containing the file is specified by an offset number of
blocks, followed by the number of blocks from that offset point. Block offsets
are listed sequentially in a comma-delimited list. The following is a sample
blocklist:
• 0+50,100+25,200+1
This sample blocklist specifies a file that starts at the first block on the partition
and uses blocks 0 through 49, 100 through 124, and 200. Knowing how to write
blocklists is useful when using GRUB to load operating systems which require
chain loading. It is possible to leave off the offset number of blocks if starting at
block 0. As an example, the chain loading file in the first partition of the first
hard drive would have the following name:
• (hd0,0)+1
• chainloader +1
Next, the kernel command is executed with the location of the kernel file as an
option. Once the Linux kernel boots, it sets up the root file system that Linux
users are familiar with. The original GRUB root file system and its mounts are
forgotten; they only existed to boot the kernel file.
Note
The following GRUB interfaces can only be accessed by pressing any key within the
three seconds of the GRUB menu bypass screen.
Menu Interface
This is the default interface shown when GRUB is configured by the installation
program. A menu of operating systems or preconfigured kernels are displayed as
a list, ordered by name. Use the arrow keys to select an operating system or
kernel version and press the Enter key to boot it. If you do nothing on this
screen, then after the time out period expires GRUB will load the default option.
Press the e key to enter the entry editor interface or the c key to load a command
line interface.
After all changes are made, the b key executes the commands and boots the
operating system. The Esc key discards any changes and reloads the standard
menu interface. The c key loads the command line interface.
Tip
For information about changing runlevels using the GRUB menu entry editor, refer to
Section 8, “Changing Runlevels at Boot Time”.
Relevant GRUB commands followed by the Enter key to execute them. This
interface features some advanced shell-like features, including Tab key
completion based on context, and Ctrl key combinations when typing
commands, such as Ctrl-a to move to the beginning of a line and Ctrl-e to move
to the end of a line. In addition, the arrow, Home, End, and Delete keys work as
they do in the bash shell.
• If the configuration file is not valid, GRUB prints out the error and asks
for input. This helps the user see precisely where the problem occurred.
Pressing any key reloads the menu interface, where it is then possible to
edit the menu option and correct the problem based on the error reported
by GRUB. If the correction fails, GRUB reports an error and reloads the
menu interface.
Boot
Boots the operating system or chain loader that was last loaded.
chainloader </path/to/file>
Loads the specified file as a chain loader. If the file is located on the first sector
of the specified partition, use the blocklist notation, +1, instead of the file name.
The following is an example chainloader command:
• chainloader +1
Displaymem
It displays the current use of memory, based on information from the BIOS. This
is useful to determine how much RAM a system has prior to booting it.
initrd </path/to/initrd>
It enables users to specify an initial RAM disk to use when booting. An initrd is
necessary when the kernel needs certain modules in order to boot properly, such
as when the root partition is formatted with the ext3 file system.
• initrd /initrd-2.6.8-1.523.img
• install <stage-1><install-disk><stage-2>pconfig-file
• Installs GRUB to the system MBR.
<stage-1>
Signifies a device, partition, and file where the first boot loader image can be
found, such as (hd0,0)/grub/stage1.
<install-disk>
Specifies the disk where the stage 1 boot loader should be installed, such as
(hd0).
<stage-2>
• p<config-file>
This option tells the install command to look for the menu configuration file
specified by <config-file>, such as (hd0,0)/grub/grub.conf.
Warning
The install command overwrites any information already located on the MBR.
kernel </path/to/kernel><option-1><option-N>
It specifies the kernel file to load when booting the operating system. Replace
</path/to/kernel> with an absolute path from the partition specified by the root
command. Replace <option-1> with options for the Linux kernel, such as
root=/dev/VolGroup00/LogVol00 to specify the device on which the root
partition for the system is located. Multiple options can be passed to the kernel in
a space separated list. The following is an example kernel command:
The option in the previous example specifies that the root file system for Linux
is located on the hda5 partition.
• root (<device-type><device-number>,<partition>)
Configures the root partition for GRUB, such as (hd0,0), and mounts the
partition. The following is an example root command:
• root (hd0,0)
rootnoverify (<device-type><device-number>,<partition>)
It configures the root partition for GRUB, just like the root command, but does
not mount the partition.
Other commands are also available; type help --all for a full list of commands.
For a description of all GRUB commands, refer to the documentation available
online at http://www.gnu.org/software/grub/manual/.
The following is a very basic GRUB menu configuration file designed to boot
either Red Hat Enterprise Linux or Microsoft Windows 2000:
• default=0
• timeout=10
• splashimage=(hd0,0)/grub/splash.xpm.gz
• hiddenmenu title Red Hat Enterprise Linux Server (2.6.18-2.el5PAE)
• root (hd0,0)
• kernel /boot/vmlinuz-2.6.18-2.el5PAE ro root=LABEL=/1 rhgb quiet
initrd /boot/initrd-2.6.18-2.el5PAE.img
This file configures GRUB to build a menu with Red Hat Enterprise Linux as the
default operating system and sets it to autoboot after 10 seconds. Two sections
are given, one for each operating system entry, with commands specific to the
system disk partition table.
Note
Note that the default is specified as an integer. This refers to the first title line in
the GRUB configuration file. For the Windows section to be set as the default in
the previous example, change the default=0 to default=1.
Loads the specified file as a chain loader. Replace </path/to/file> with the
absolute path to the chain loader. If the file is located on the first sector of the
specified partition, use the blocklist notation, +1.
• color <normal-color><selected-color>
Allows specific colors to be used in the menu, where two colors are configured
as the foreground and background. Use simple color names such as red/black.
For example:
Hiddenmenu
Prevents the GRUB menu interface from being displayed, loading the default
entry when the timeout period expires. The user can see the standard GRUB
menu by pressing the Esc key.
• initrd </path/to/initrd>
Enables users to specify an initial RAM disk to use when booting. Replace
</path/to/initrd> with the absolute path to the initial RAM disk.
kernel </path/to/kernel><option-1><option-N>
Specifies the kernel file to load when booting the operating system. Replace
</path/to/kernel> with an absolute path from the partition specified by the root
directive. Multiple options can be passed to the kernel when it is loaded.
password=<password>
Prevents a user who does not know the password from editing the entries for
this menu option. Optionally, it is possible to specify an alternate menu
configuration file after the password=<password> directive. In this case, GRUB
restarts the second stage boot loader and uses the specified alternate
configuration file to build the menu. If an alternate menu configuration file is left
root (<device-type><device-number>,<partition>)
Configures the root partition for GRUB, such as (hd0,0), and mounts the
partition.
rootnoverify (<device-type><device-number>,<partition>)
Configures the root partition for GRUB, just like the root command, but does not
mount the partition.
timeout=<integer>
Specifies the interval, in seconds, that GRUB waits before loading the entry
designated in the default command.
splashimage=<path-to-image>
Specifies the location of the splash screen image to be used when GRUB boots.
title group-title
Specifies a title to be used with a particular group of commands used to load a
kernel or operating system.
To add human-readable comments to the menu configuration file, begin the line
with the hash mark character (#).
When the GRUB menu bypass screen appears at boot time, press any key to
enter the GRUB menu (within the first three seconds).
Add <space><runlevel> at the end of the boot options line to boot to the desired
runlevel.For example, the following entry would initiate a boot process into
runlevel 3:
This directory contains good information about using and configuring GRUB,
where <version-number> corresponds to the version of the GRUB package
installed.
info grub
The GRUB info page contains a tutorial, a user reference manual, a programmer
reference manual, and a FAQ document about GRUB and its usage.
• 512*2 = 1024MB
Or
• If M < 2
• S = M *2
• Else
• S=M+2
Important
File systems and LVM2 volumes assigned as swap space cannot be in use when being
modified. For example, no system processes can be assigned the swap space, as well as
no amount of swap should be allocated and used by the kernel. Use the free and cat
/proc/swaps commands to verify how much and where swap is in use.
The best way to achieve swap space modifications is to boot your system in rescue
mode, and then follow the instructions (for each scenario) in the remainder of this
chapter. Refer to the Red Hat Enterprise Linux Installation Guide for instructions on
booting into rescue mode. When prompted to mount the file system, select Skip.
• # swapoff -v /dev/VolGroup00/LogVol01
• # mkswap /dev/VolGroup00/LogVol01
• # swapon –va
• # mkswap /dev/VolGroup00/LogVol02
• # swapon –va
• mkswap /swapfile
To enable the swap file immediately but not automatically at boot time:
• swapon /swapfile
After adding the new swap file and enabling it, verify it is enabled by viewing
the output of the command cat /proc/swaps or free.
• # swapoff -v /dev/VolGroup00/LogVol01
• # mkswap /dev/VolGroup00/LogVol01
• # swapon –va
• # swapoff -v /dev/VolGroup00/LogVol02
• # swapoff -v /swapfile
• # rm /swapfile
By default, the parted package is included when installing Red Hat Enterprise
Linux. To start parted, log in as root and type the command parted /dev/sda at a
shell prompt (where /dev/sda is the device name for the drive you want to
configure).
Table below contains a list of commonly used parted commands. The sections
that follow explain some of these commands and arguments in more detail.
Command Description
check minor-num Perform a simple check of the file system
Copy file system from one partition to
cp fromto another; from and to are the minor
numbers of the partitions
Help Display list of available commands
mktable label Create a disk label for the partition table
Create a file system of type
mkfs minor-numfile-system-type
file-system-type
Make a partition without creating a new
mkpart part-typefs-typestart-mbend-mb
file system
Make a partition and create the specified
Mkpartfs part-typefs-typestart-mbend-mb file system
move minor-numstart-mbend-mb
The first line contains the disk type, manufacturer, model number and interface,
and the second line displays the disk label type. The remaining output below the
fourth line shows the partition table. In the partition table, the Minor number is
the partition number. For example, the partition with minor number 1
corresponds to /dev/sda1. The Start and End values are in megabytes. Valid Types
are metadata, free, primary, extended, or logical. The File system is the file
system type, which can be any of the following:
ext2
ext3
fat16
fat32
hfs
jfs
Pakistan Computer Bureau 77
linux-swap
ntfs
reiserfs
hp-ufs
sun-ufs
xfs
If a File system of a device shows no value, this means that its file system type is
unknown. The Flags column lists the flags set for the partition. Available flags
are boot, root, swap, hidden, raid, lvm, or lba.
Tip
To select a different device without having to restart parted, use the select command
followed by the device name (for example, /dev/sda). Doing so allows you to view or
configure the partition table of a device.
Before creating a partition, boot into rescue mode (or unmount any partitions on
the device and turn off any swap space on the device). Start parted, where
/dev/sda is the device on which to create the partition:
parted /dev/sda
View the current partition table to determine if there is enough free space:
print
If there is not enough free space, you can resize an existing partition.
logical partitions within the extended. For example, to create a primary partition
with an ext3 file system from 1024 megabytes until 2048 megabytes on a hard
drive type the following command:
If you use the mkpartfs command instead, the file system is created after the partition is
created. However, parted does not support creating an ext3 file system. Thus, if you
wish to create an ext3 file system, use mkpart and create the file system with the mkfs
command as described later.
The changes start taking place as soon as you press Enter, so review the
command before executing to it. After creating the partition, use the print
command to confirm that it is in the partition table with the correct partition
type, file system type, and size. Also remember the minor number of the new
partition so that you can label it. You should also view the output of
cat /proc/partitions
to make sure the kernel recognizes the new partition.
Formatting the partition permanently destroys any data that currently exists on the
partition.
Before removing a partition, boot into rescue mode (or unmount any partitions
on the device and turn off any swap space on the device). Start parted, where
/dev/sda is the device on which to remove the partition:
parted /dev/sda
View the current partition table to determine the minor number of the partition to
remove:
print
Remove the partition with the command rm. For example, to remove the
partition with minor number 3:
rm 3
The changes start taking place as soon as you press Enter, so review the
command before committing to it. After removing the partition, use the print
command to confirm that it is removed from the partition table. You should also
view the output of
cat /proc/partitions
to make sure the kernel knows the partition is removed. The last step is to
remove it from the /etc/fstab file. Find the line that declares the removed
partition, and remove it from the file.
Before resizing a partition, boot into rescue mode (or unmount any partitions on
the device and turn off any swap space on the device). Start parted, where
/dev/sda is the device on which to resize the partition:
Pakistan Computer Bureau 80
parted /dev/sda
View the current partition table to determine the minor number of the partition to
resize as well as the start and end points for the partition:
print
To resize the partition, use the resize command followed by the minor number
for the partition, the starting place in megabytes, and the end place in megabytes.
For example:
resize 3 1024 2048
Warning
A partition cannot be made larger than the space available on the device
After resizing the partition, use the print command to confirm that the partition
has been resized correctly, is the correct partition type, and is the correct file
system type. After rebooting the system into normal mode, use the command df
to make sure the partition was mounted and is recognized with the new size.
Alternatively, if the partition is listed in the /etc/fstab file, the entry for the
partition can include the acl option:
LABEL=/work /work ext3 acl 1 2
If an ext3 file system is accessed via Samba and ACLs have been enabled for it,
the ACLs are recognized because Samba has been compiled with the --with-acl-
support option. No special flags are required when accessing or mounting a
Samba share.
8.1.1. NFS
By default, if the file system being exported by an NFS server supports ACLs and
the NFS client can read ACLs, ACLs are utilized by the client system. To disable
ACLs on NFS shares when configuring the server, include the no_acl option in
the /etc/exports file. To disable ACLs on an NFS share when mounting it on a
client, mount it with the no_acl option via the command line or the /etc/fstab file.
Per user
Per group
Via the effective rights mask
For users not in the user group for the file
The setfacl utility sets ACLs for files and directories. Use the -m option to add or
modify the ACL of a file or directory:
setfacl -m <rules><files>
Rules (<rules>) must be specified in the following formats. Multiple rules can
be specified in the same command if they are separated by commas.
u:<uid>:<perms>
Sets the access ACL for a user. The user name or UID may be specified. The
user may be any valid user on the system.
g:<gid>:<perms>
Sets the access ACL for a group. The group name or GID may be specified.
The group may be any valid group on the system.
m:<perms>
Sets the effective rights mask. The mask is the union of all permissions of the
owning group and all of the user and group entries.
o:<perms>
Sets the access ACL for users other than the ones in the group for the file.
If a directory with a default ACL is specified, the default ACL is also displayed
as illustrated below.
The star utility is similar to the tar utility in that it can be used to generate
archives of files. The star package is required to use this utility. The command
line options for Star are as follows
Option Description
-c Creates an archive file.
-n Do not extract the files; use in
conjunction with -x to show what
extracting the files does.
Important
When installing a package, please ensure it is compatible with your operating system
and architecture. This can usually be determined by checking the package name.
During upgrades, RPM handles configuration files carefully, so that you never
lose your customizations — something that you cannot accomplish with regular
.tar, .gz files. For the developer, RPM allows you to take software source
code and package it into source and binary packages for end users. This process
is quite simple and is driven from a single file and optional patches that you
create. This clear delineation between pristine sources and your patches
along with build instructions eases the maintenance of the package as new
versions of the software are released.
Note
Because RPM makes changes to your system, you must be logged in as root to install,
remove, or upgrade an RPM package.
Upgradability
With RPM, you can upgrade individual components of your system without
Powerful Querying
RPM is designed to provide powerful querying options. You can do
searches through your entire database for packages or just for certain files.
You can also easily find out what package a file belongs to and from
where the package came. The files an RPM package contains are in a
compressed archive, with a custom binary header containing useful
information about the package and its contents, allowing you to query
individual packages quickly and easily.
System Verification
Another powerful RPM feature is the ability to verify packages. If you are
worried that you deleted an important file for some package, you can
verify the package. You are then notified of any anomalies, if any — at
which point, you can reinstall the package if necessary. Any configuration
files that you modified are preserved during reinstallation.
Pristine Sources
A crucial design goal was to allow the use of pristine software
sources, as distributed by the original authors of the software. With RPM,
you have the pristine sources along with any patches that were used, plus
complete build instructions. This is an important advantage for several
reasons. For instance, if a new version of a program is released, you do not
necessarily have to start from scratch to get it to compile. You can look at
the patch to see what you might need to do. All the compiled-in defaults,
and all of the changes that were made to get the software to build properly,
are easily visible using this technique. The goal of keeping sources pristine
may seem important only for developers, but it results in higher quality
9.2.2. Installing
RPM packages typically have file names like foo-1.0-1.i386.rpm. The file name
includes the package name (foo), version (1.0), release (1), and architecture
(i386). To install a package, log in as root and type the following command at
a shell prompt:
rpm -ivh foo-1.0-1.i386.rpm
Alternatively, the following command can also be used:
rpm -Uvh foo-1.0-1.i386.rpm
If the installation is successful, the following output is displayed:
Preparing...
########################################### [100%]
1:foo ###########################################
[100%]
As you can see, RPM prints out the name of the package and then prints a
succession of hash marks as a progress meter while the package is installed. The
signature of a package is checked automatically when installing or upgrading a
package. The signature confirms that the package was signed by an authorized
Warning
If you are installing a kernel package, you should use rpm -ivh instead.
Preparing...
########################################### [100%]
package
foo-1.0-1 is already installed
However, if you want to install the package anyway, you can use the --
replacepkgs option, which tells RPM to ignore the error:
rpm -ivh --replacepkgs foo-1.0-1.i386.rpm
This option is helpful if files installed from the RPM were deleted or if you want
the original configuration files from the RPM to be installed.
If you are installing a package from the Red Hat Enterprise Linux CD-
ROM set, it usually suggests the package(s) needed to resolve the dependency.
Find the suggested package(s) on the Red Hat Enterprise Linux CD-
ROMs or from Red Hat Network, and add it to the command:
########################################### [100%]
If it does not suggest a package to resolve the dependency, you can try the –
redhat provides option to determine which package contains the required
file. You need the rpmdb-redhat package installed to use this option.
rpm -q --redhatprovides bar.so.2
9.2.3. Uninstalling
Uninstalling a package is just as simple as installing one. Type the following
command at a shell prompt:
rpm -e foo
Note
Notice that we used the package namefoo, not the name of the original package
filefoo-1.0-1.i386.rpm. To uninstall a package, replace foo with the actual
package name of the original package.
To make RPM ignore this error and uninstall the package anyway (which may
break the package dependent on it) use the --nodeps option.
9.2.4. Upgrading
Upgrading a package is similar to installing one. Type the following command
at a shell prompt:
It is not advisable to use the -U option for installing kernel packages, because RPM
replaces the previous kernel package. This does not affect a running system, but if the
9.2.5. Freshening
Freshening is similar to upgrading, except that only existent packages are
upgraded. Type the following command at a shell prompt:
rpm -Fvh foo-1.2-1.i386.rpm
RPM's freshen option checks the versions of the packages specified on the
command line against the versions of packages that have already been installed
on your system. When a newer version of an already-installed package is
processed by RPM's freshen option, it is upgraded to the newer version.
However, RPM's freshen option does not install a package if no previously-
installed package of the same name exists. This differs from RPM's upgrade
RPM automatically upgrades only those packages that are already installed.
9.2.6. Querying
The RPM database stores information about all RPM packages installed in your
system. It is stored in the directory /var/lib/rpm/, and is used to query
what packages are installed, what versions each package is, and any changes to
any files in the package since installation, among others.
To query this database, use the -q option. The rpm -q package name
command displays the package name, version, and release number of the
installed package name. For example, using rpm -q foo to query installed
package foo might generate the following output:
foo-2.0-1
You can also use the following Package Selection Options with -q to further
refine or qualify
Your query:
There are a number of ways to specify what information to display about queried
packages. The following options are used to select the type of information for
which you are searching. These are called Information Query Options.
9.2.7. Verifying
Verifying a package compares information about files installed from a package
with the same information from the original package. Among other things,
verifying compares the size, MD5 sum, permissions, type, owner, and group of
each file. The command rpm -V verifies a package. You can use any of the
Package Verify Options listed for querying to specify the packages you
wish to verify. A simple use of verifying is rpm -V foo, which verifies that all
the files in the foo package are as they were when they were originally
installed. For example:
In this example, /usr/bin/foo is the absolute path to the file used to query a
package.
This command can be useful if you suspect that your RPM databases are corrupt.
If everything verified properly, there is no output. If there are any discrepancies,
they are displayed. The format of the output is a string of eight characters (a c
denotes a configuration file) and then the file name. Each of the
If you see any output, use your best judgment to determine if you should remove
the package, reinstall it, or fix the problem in another way.
On the other hand, how trustworthy is the developer who created the package? If
the package is signed with the developer's GnuPG key, you know that the
developer really is who they say they are. An RPM package can be signed using
Gnu Privacy Guard (or GnuPG), to help you make certain your
downloaded package is trustworthy.
GnuPG is a tool for secure communication; it is a complete and free replacement
for the encryption technology of PGP, an electronic privacy program. With
GnuPG, you can authenticate the validity of documents and
encrypt/decrypt data to and from other recipients. GnuPG is capable of
decrypting and verifying PGP 5.x files as well.
During installation, GnuPG is installed by default. That way you can
To display details about a specific key, use rpm -qi followed by the output
from the previous command:
Perhaps you have deleted some files by accident, but you are not sure
what you deleted. To verify your entire system and see what might be
missing, you could try the following command:
o rpm -Va
Do you want to find out more information about a particular program? You can
try the following command to locate the documentation which came with the
package that owns that program:
Perhaps you now want to see what files the crontabs RPM installs. You
would enter the following:
smbd
The smbd server daemon provides file sharing and printing services to
Windows clients. In addition, it is responsible for user authentication,
resource locking, and data sharing through the SMB protocol. The default
ports on which the server listens for SMB traffic are TCP ports 139 and 445.
The smbd daemon is controlled by the smb service. nmbd.
The nmbd server daemon understands and replies to NetBIOS name service
requests such as those produced by SMB/CIFS in Windows-based systems.
These systems include Windows 95/98/ME, Windows NT, Windows 2000,
Windows XP, and LanManager clients. It also participates in the browsing
protocols that make up the Windows Network Neighborhood view. The
default port that the server listens to for NMB traffic is UDP port 137. The
nmbddaemon is controlled by the smbservice.
winbindd
The winbind service resolves user and group information on a server running
Windows NT 2000 or Windows Server 2003. This makes Windows user /
group information understandable by UNIX platforms. This is achieved by
using Microsoft RPC calls, Pluggable Authentication Modules (PAM), and
the Name Service Switch (NSS). This allows Windows NT domain users to
appear and operate as UNIX users on a UNIX machine. Though bundled with
the Samba distribution, the winbind service is controlled separately from the
smbservice.
The winbindd daemon is controlled by the winbind service and does not
require the smb service to be started in order to operate. Winbindd is also used
when Samba is an Active Directory member, and may also be used on a
Samba domain controller (to implement nested groups and/or interdomain
trust). Because winbind is a client-side service used to connect to Windows
NT-based servers, further discussion of winbind is beyond the scope of this
manual.
The Time and Date Properties Tool allows the user to change the system date and
time, to configure the time zone used by the system, and to setup the Network
Time Protocol (NTP) daemon to synchronize the system clock with a time server.
You must be running the X Window System and have root privileges to use the
tool. There are three ways to start the application:
• From the desktop, go to Applications (the main menu on the panel) =>
System Settings => Date & Time
• From the desktop, right-click on the time in the toolbar and select Adjust
Date and Time.
• Type the command system-config-date, system-config-time, or dateconfig at
a shell prompt (for example, in an XTerm or a GNOME terminal).
To change the date, use the arrows to the left and right of the month to change the
month, use the arrows to the left and right of the year to change the year, and
click on the day of the week to change the day of the week.
To change the time, use the up and down arrow buttons beside the Hour, Minute
and Second in the Time section. Clicking the OK button applies any changes
made to the date and time, the NTP daemon settings, and the time zone settings. It
also exits the program.
The Network Time Protocol (NTP) daemon synchronizes the system clock with a
remote time server or time source. The application allows you to configure an
NTP daemon to synchronize your system clock with a remote server. To enable
this feature, select Enable Network Time Protocol. This enables the NTP Servers
list and other options. You can choose one of the predefined servers, edit a
predefined server by clicking the Edit or add a new server name by clicking Add.
Your system does not start synchronizing with the NTP server until you click OK.
After clicking OK, the configuration is saved and the NTP daemon is started (or
restarted if it is already running). Clicking the OK button applies any changes
made to the date and time, the NTP daemon settings, and the time zone settings. It
Alternatively, you can also use the list below the map. In the same way that the
map lets you choose a region before choosing a city, the list of time zones is now
a treelist, with cities and countries grouped within their specific continents. Non-
geographic time zones have also been added to address needs in the scientific
community. Click OK to apply the changes and exit the program.
If your system clock is set to use UTC, select the System clock uses UTC option.
UTC stands for the Universal Time, Coordinated, also known as Greenwich Mean
Time (GMT).
The graphical environment for Red Hat Enterprise Linux is supplied by the
X.Org Foundation, an open source organization created to manage development
and strategy for the X Window System and related technologies. X.Org is a
large-scale, rapidly developing project with hundreds of developers around the
world. It features a wide degree of support for a variety of hardware devices and
architectures, and can run on a variety of different operating systems and
platforms. This release for Red Hat Enterprise Linux specifically includes the
X11R7.1 release of the X Window System. The X Window System uses a
client-server architecture. The X server (the Xorg binary) listens for connections
from X client applications via a network or local loopback interface. The server
communicates with the hardware, such as the video card, monitor, keyboard, and
mouse. X client applications exist in the user-space, creating a graphical user
interface (GUI) for the user and passing user requests to the X server.
Important
Red Hat Enterprise Linux no longer provides the XFree86™ server packages. Before
upgrading a system to the latest version of Red Hat Enterprise Linux, be sure that the
system's video card is compatible with the X11R7.1 release by checking the Red Hat
Hardware Compatibility List located online at http://hardware.redhat.com/.
In the X11R7.1 release, all libraries, headers, and binaries now live under /usr/
• GNOME
• The default desktop environment for Red Hat Enterprise Linux based on
the GTK+ 2 graphical toolkit.
• KDE
• An alternative desktop environment based on the Qt 3 graphical toolkit.
Both GNOME and KDE have advanced productivity applications, such as word
processors, spreadsheets, and Web browsers; both also provide tools to
customize the look and feel of the GUI. Additionally, if both the GTK+ 2 and
the Qt libraries are present, KDE applications can run in GNOME and vice-
versa.
kwin
The KWin window manager is the default window manager for KDE. It is an
efficient window manager which supports custom themes.
metacity
The Metacity window manager is the default window manager for GNOME.
It is a simple and efficient window manager which also supports custom
themes. To run this window manager, you need to install the metacity
package.
Twm
The minimalist Tab Window Manager (twm, which provides the most basic
tool set of any of the window managers, can be used either as a stand-alone
or with a desktop environment. It is installed as part of the X11R7.1 release.
To run any of the aforementioned window managers, you will first need to
boot into Runlevel 3. For instructions on how to do this, refer to Section
2.2.1, “Run levels”.
Once you are logged in to Run level 3, you will be presented with a terminal
prompt, not a graphical environment. To start a window manager, type xinit –e
<path-to-window-manager> at the prompt. <path-to-window-manager> is the
location of the window manager binary file. The binary file can be located by
typing which window-manager-name, where window-manager-name is the name
of the window manager you want to run.
For example:
user@host# which twm/usr/bin/twm
user@host# xinit -e /usr/bin/twm
The first command above returns the absolute path to the twm window manager,
the second command starts twm. To exit a window manager, close the last
window or press Ctrl-Alt-Backspace. Once you have exited the window
manager, you can log back into Runlevel 5 by typing startx at the prompt.
12.2.2.1. Runlevels
Before you can configure access to services, you must understand Linux
runlevels. A runlevel is a state, or mode, that is defined by the services listed in
the directory /etc/rc.d/rc<x>.d, where <x> is the number of the runlevels. The
following runlevels exist:
If you use a text login screen, you are operating in runlevel 3. If you use a
graphical login screen, you are operating in runlevel 5. The default runlevel can
be changed by modifying the /etc/inittab file, which contains a line near the top
of the file similar to the following:
• id:5:initdefault:
Change the number in this line to the desired runlevel. The change does not take
effect until you reboot the system.
12.3.1. xorg.conf
While there is rarely a need to manually edit the /etc/X11/xorg.conf file, it is
useful to understand the various sections and optional parameters available,
especially when troubleshooting.
Some options within the /etc/X11/xorg.conf file accept a Boolean switch which
turns the feature on or off. Acceptable Boolean values are:
The following are some of the more important sections in the order in which
they appear in a typical /etc/X11/xorg.conf file. More detailed information about
the X server configuration file can be found in the xorg.conf man page.
The following entries are commonly used in the Server Layout section:
Identifier
Specifies a unique name for this Server Layout section.
Screen
Specifies the name of a Screen section to be used with the X server. More than
one Screen option may be present. The following is an example of a typical
Screen entry:
Screen 0 "Screen0" 0 0
The first number in this example Screen entry (0) indicates that the first monitor
connector or head on the video card uses the configuration specified in the
Screen section with the identifier "Screen0". An example of a Screen section with
the identifier "Screen0" can be found in Section 3.1.9, “Screen”.
• If the video card has more than one head, another Screen entry with a
different number and a different Screen section identifier is necessary .
• InputDevice
Specifies the name of an Input Device section to be used with the X server. It
is advisable that there be at least two InputDevice entries: one for the default
mouse and one for the default keyboard. The options CorePointer and
CoreKeyboard indicate that these are the primary mouse and keyboard.
12.3.1.4. Files
The Files section sets paths for services vital to the X server, such as the font
path. This is an optional section, these paths are normally detected
automatically. This section may be used to override any automatically detected
defaults. The following example illustrates a typical Files section:
• RgbPath
Specifies the location of the RGB color database. This database defines all valid
color names in X and ties them to specific RGB values.
• FontPath
Specifies where the X server must connect to obtain fonts from the xfs font
server. By default, the FontPath is unix/:7100. This tells the X server to obtain
font information using UNIX-domain sockets for inter-process communication
• (IPC) on port 7100.
• ModulePath
An optional parameter which specifies alternate directories which store X
server modules.
• extmod
• dbe
• glx
• freetype
• type1
• record
• dri
The default directory for loading these modules can be changed by specifying a
different directory with the optional ModulePath parameter in the Files section.
Refer to Section 3.1.4, “Files” for more information on this section. Adding a
Module section to /etc/X11/xorg.conf instructs the X server to load the modules
listed in this section instead of the default modules.For example, the following
typical Module section:
Instructs the X server to load the fbdevhw instead of the default modules. As
such, if you add a Module section to /etc/X11/xorg.conf, you will need to specify
any default modules you want to load as well as any extra modules.
• Identifier
Specifies a unique name for this InputDevice section. This is a required entry.
• Driver
Pakistan Computer Bureau 115
Specifies the name of the device driver X must load for the device.
• Option
Specifies necessary options pertaining to the device.
A mouse may also be specified to override any autodetected defaults for the
device. The following options are typically included when adding a mouse in
the xorg.conf:
• Protocol
Specifies the protocol used by the mouse, such as IMPS/2.
• Device
Specifies the location of the physical device.
• Emulate3Buttons
Specifies whether to allow a two-button mouse to act like a three-button
mouse when both mouse buttons are pressed simultaneously.
12.3.1.7. Monitor
Each Monitor section configures one type of monitor used by the system. This is
an optional entry as well, as most monitors are now automatically detected. The
easiest way to configure a monitor is to configure X during the installation
process or by using the X Configuration Tool. For more information about
using the X Configuration Tool, refer to X Window System Configuration. This
example illustrates a typical Monitor section for a monitor:
Warning
• Identifier
Specifies a unique name for this Monitor section. This is a required entry.
• ModelName
An optional parameter which specifies the monitor's model name.
• DisplaySize
An optional parameter which specifies, in millimeters, the physical size of the
monitor's picture area.
• HorizSync
Specifies the range of horizontal sync frequencies compatible with the
monitor in kHz. These values help the X server determine the validity of
built-in or specified Modeline entries for the monitor.
• VertRefresh
Specifies the range of vertical refresh frequencies supported by the monitor,
in kHz. These values help the X server determine the validity of built in or
specified Modeline entries for the monitor.
• Modeline
An optional parameter which specifies additional video modes for the monitor
at particular resolutions, with certain horizontal sync and vertical refresh
resolutions. Refer to the xorg.conf man page for a more detailed explanation
of Modeline entries.
• Option "<option-name>"
An optional entry which specifies extra parameters for the section. Replace
<option-name> with a valid option listed for this section in the xorg.conf man
page.
12.3.1.8. Device
Each Device section configures one video card on the system. While one Device
section is the minimum, additional instances may occur for each video card
installed on the machine. The best way to configure a video card is to configure
• Identifier
Specifies a unique name for this Device section. This is a required entry.
• Driver
Specifies which driver the X server must load to utilize the video card. A list
of drivers can be found in /usr/share/hwdata/videodrivers, which is installed
with the hwdata package.
• Vendor Name
An optional parameter which specifies the vendor of the video card.
• BoardName
An optional parameter which specifies the name of the video card.
• VideoRam
An optional parameter which specifies the amount of RAM available on
the video card in kilobytes. This setting is only necessary for video cards
the X server cannot probe to detect the amount of video RAM.
• BusID
An entry which specifies the bus location of the video card. On systems with
only one video card a BusID entry is optional and may not even be present in
the default /etc/X11/xorg.conf file. On systems with more than one video
Card, however, a BusID entry must be present.
• Screen
An optional entry which specifies which monitor connector or head on the
video card the Device section configures. This option is only useful for video
cards with multiple heads. If multiple monitors are connected to different
heads on the same video card, separate Device sections must exist and each of
these sections must have a different Screen value. Values for the Screen entry
must be an integer. The first head on the video card has a value of 0. The
Pakistan Computer Bureau 118
value for each additional head increments this value by one.
• Option "<option-name>"
An optional entry which specifies extra parameters for the section. Replace
<option-name> with a valid option listed for this section in the xorg.conf man
page. One of the more common options is "dpms" (for Display Power
Management Signaling, a VESA standard), which activates the Service Star
energy compliance setting for the monitor.
12.3.1.9. Screen
Each Screen section binds one video card (or video card head) to one monitor by
referencing the Device section and the Monitor section for each. While one Screen
section is the minimum, additional instances may occur for each video card and
monitor combination present on the machine. The following example illustrates a
typical Screen section:
Section "Screen" Identifier "Screen0" Device "Videocard0" Monitor "Monitor0"
DefaultDepth 16 SubSection "Display" Depth 24 Modes "1280x1024"
"1280x960" "1152x864" "1024x768" "800x600" "640x480" EndSubSection
SubSection "Display" Depth 16 Modes "1152x864" "1024x768" "800x600"
"640x480" EndSubSection EndSection
• Identifier
Specifies a unique name for this Screen section. This is a required entry.
• Device
Specifies the unique name of a Device section. This is a required entry.
• Monitor
Specifies the unique name of a Monitor section. This is only required if a
specific Monitor section is defined in the xorg.conf file. Normally, monitors
are automatically detected.
• Default Depth
Specifies the default color depth in bits. In the previous example, 16 (which
• Subsection "Display"
Specifies the screen modes available at a particular color depth. The Screen
section can have multiple Display subsections, which are entirely optional
since screen modes are automatically detected.
This subsection is normally used to override autodetected modes.
• Option "<option-name>"
An optional entry which specifies extra parameters for the section. Replace
<option-name> with a valid option listed for this section in the xorg.conf
man page.
12.3.1.10. DRI
The optional DRI section specifies parameters for the Direct Rendering
Infrastructure (DRI). DRI is an interface which allows 3D software applications
to take advantage of 3D hardware acceleration capabilities built into most
modern video hardware. In addition, DRI can improve 2D performance via
hardware acceleration, if supported by the video card driver. This section rarely
appears, as the DRI Group and Mode are automatically initialized to default
values. If a different Group or Mode is desired, then adding this section to the
xorg.conf file will override those defaults. The following example illustrates a
typical DRI section:
• Section "DRI" Group 0 Mode 0666 EndSection
Since different video cards use DRI in different ways, do not add to this
section without first referring to http://dri.sourceforge.net/.
12.4. Fonts
Red Hat Enterprise Linux uses two subsystems to manage and display fonts
under X:
• Fontconfig and xfs.
The newer Fontconfig font subsystem simplifies font management and provides
advanced display features, such as anti-aliasing. This system is used
automatically for applications programmed using the Qt 3 or GTK+ 2 graphical
toolkit. For compatibility, Red Hat Enterprise Linux includes the original font
subsystem, called the core X font subsystem. This system, which is over 15
12.4.1. Fontconfig
The Fontconfig font subsystem allows applications to directly access fonts on
the system and use Xft or other rendering mechanisms to render Fontconfig
fonts with advanced anti-aliasing. Graphical applications can use the Xft library
with Fontconfig to draw text to the screen. Over time, the Fontconfig/Xft font
subsystem replaces the core X font subsystem.
Important
The Fontconfig font subsystem does not yet work for OpenOffice.org, which uses its
own font rendering technology.
Tip
Due to the transition to the new font system, GTK+ 1.2 applications are not affected by
any changes made via the Font Preferences dialog (accessed by selecting System (on the
panel) => Preferences => Fonts). For these applications, a font can be configured by
adding the following lines to the file .gtkrc.mine:
1. To add fonts system-wide, copy the new fonts into the /usr/share/fonts/
directory. It is a good idea to create a new subdirectory, such as local/ or
similar, to help distinguish between user-installed and default fonts.
Tip
Individual users may also install fonts graphically, by typing fonts:/// into theNautilus
address bar, and dragging the new font files there.
Important
If the font file name ends with a .gz extension, it is compressed and cannot be used until
uncompressed. To do this, use the gunzip command or double-click the file and drag the
font to a directory in Nautilus.
• Alternate-servers
Specifies a list of alternate font servers to be used if this font server is not
available. A comma must separate each font server in a list.
• Catalogue
Specifies an ordered list of font paths to use. A comma must separate each font
path in a list. Use the string :unscaled immediately after the font path to make
the unscaled fonts in that path load first. Then specify the entire path again, so
Pakistan Computer Bureau 122
that other scaled fonts are also loaded.
• Client-limit
Specifies the maximum number of clients the font server services. The default
is 10.
• Clone-self
Allows the font server to clone a new version of itself when the client-limit is
hit. By default, this option is on.
• Default-point-size
Specifies the default point size for any font that does not specify this value.
The value for this option is set in decipoints. The default of 120 corresponds to
a 12 point font.
• Default-resolutions
Specifies a list of resolutions supported by the X server. Each resolution in the
list must be separated by a comma.
• defer glyphs
Specifies whether to defer loading glyphs (the graphic used to visually
represent a font). To disable this feature use none, to enable this feature for all
fonts use all, or to turn this feature on only for 16-bit fonts use 16.
• Error-file
Specifies the path and file name of a location where xfs errors are logged.
• No-listen
Prevents xfs from listening to particular protocols. By default, this option is set
to tcp to prevent xfs from listening on TCP ports for security reasons.
Tip
If xfs is used to serve fonts over the network, remove this line.
• Port
Specifies the TCP port that xfs listens on if no-isten does not exist or is
commented out.
• Use-syslog
Specifies whether to use the system error log.
Pakistan Computer Bureau 123
12.4.2.2. Adding Fonts to xfs
To add fonts to the core X font subsystem (xfs), follow these steps:
4. Reload the xfs font server configuration file by issuing the following
command as root:
service xfs reload
The default xinitrc script then searches for user-defined files and default system
files, including .Xresources, .Xmodmap, and .Xkbmap in the user's home
directory, and Xresources, Xmodmap, and Xkbmap in the /etc/X11/ directory.
The Xmodmap and Xkbmap files, if they exist, are used by the xmodmap utility to
configure the keyboard. The Xresources file is read to assign specific preference
values to applications.
After setting these options, the xinitrc script executes all scripts located in the
/etc/X11/xinit/xinitrc.d/ directory. One important script in this directory is
xinput.sh, which configures settings such as the default language. Next, the
xinitrc script attempts to execute .Xclients in the user's home directory and
turns to /etc/X11/xinit/Xclients if it cannot be found. The purpose of the
Xclients file is to start the desktop environment or, possibly, just a basic
window manager. The .Xclients script in the user's home directory starts the
user-specified desktop environment in the .Xclients-default file. If .Xclients
does not exist in the user's home directory, the standard /etc/X11/xinit/Xclients
script attempts to start another desktop environment, trying GNOME first and
then KDE followed by twm. When in run level 3, the user is returned to a text
mode user session after ending an X session.
• GNOME
The default display manager for Red Hat Enterprise Linux, GNOME allows the
user to configure language settings, shutdown, restart or log in to the system.
• KDE
KDE's display manager which allows the user to shutdown, restart or log
in to the system.
• xdm
Pakistan Computer Bureau 125
A very basic display manager which only lets the user log in to the system.
When booting into runlevel 5, the prefdm script determines the preferred display
manager by referencing the /etc/sysconfig/desktop file. A list of options for this file
is available in this file:
/usr/share/doc/initscripts-<version-number>/sysconfig.txt
where <version-number> is the version number of the initscripts package. Each
of the display managers reference the /etc/X11/xdm/Xsetup_0 file to set up the
login screen. Once the user logs into the system, the /etc/X11/xdm/GiveConsole
script runs to assign ownership of the console to the user. Then, the
/etc/X11/xdm/Xsession script runs to accomplish many of the tasks normally
performed by the xinitrc script when starting X from runlevel 3, including setting
system and user resources, as well as running the scripts in the
/etc/X11/xinit/xinitrc.d/ directory.
Users can specify which desktop environment they want to utilize when they
authenticate using the GNOME or KDE display managers by selecting it from the
Sessions menu item (accessed by selecting System (on the panel) => Preferences
=> More Preferences => Sessions). If the desktop environment is not specified
in the display manager, the /etc/X11/xdm/Xsession script checks the .xsession and
.Xclients files in the user's home directory to decide which desktop environment
to load. As a last resort, the /etc/X11/xinit/Xclients file is used to select a desktop
environment or window manager to use in the same way as runlevel 3.
When the user finishes an X session on the default display (:0) and logs out, the
/etc/X11/xdm/TakeConsole script runs and reassigns ownership of the
console to the root user. The original display manager, which continues
running after the user logged in, takes control by spawning a new display
manager. This restarts the X server, displays a new login window, and starts
the entire process over again. The user is returned to the display manager
after logging out of X from runlevels 5.
To change the monitor type or any of its settings, click the corresponding
Configure button. To change the video card type or any of its settings, click the
Configure button beside its settings.
• To enable use of Dual head, check the Use dual head checkbox.
• To configure the second monitor type, click the corresponding
Configure button. You can also configure the other Dual head
settings by using the corresponding drop-down list.
Tip
It is advisable to use a much longer password, as this makes it more difficult for an
intruder to guess it and access the account without permission. It is also
recommended that the password not be based on a dictionary term; use a
combination of letters, numbers and special characters.
Select a login shell. If you are not sure which shell to select, accept the default
value of /bin/bash. The default home directory is /home/<username>/. You
can change the home directory that is created for the user, or you can choose
not to create the home directory by unselecting Create home directory. If you
select to create the home directory, default configuration files are copied from
the /etc/skel/ directory into the new home directory. Red Hat Enterprise Linux
uses a user private group (UPG) scheme. The UPG scheme does not add or
change anything in the standard UNIX way of handling groups; it offers a new
convention. Whenever you
• User Data — shows the basic user information configured when you added
the user. Use this tab to change the user's full name, password, home
directory, or login shell.
• Account Info — Select Enable account expiration if you want the account
to expire on a certain date. Enter the date in the provided fields. Select
Local password is locked to lock the user account and prevent the user
from logging into the system.
• Password Info — displays the date that the user's password last changed. To
force the user to change passwords after a certain number of days, select
Enable password expiration and enter a desired value in the Days before
change required: field. The number of days before the user's password expires,
Click OK to create the group. The new group appears in the group list.
Important
Option Description
You can configure a password to expire the first time a user logs in. This forces
users to change passwords the first time they log in.
Note
This process will not work if the user logs in using the SSH protocol.
1.Lock the user password — If the user does not exist, use the useradd
command to create the user account, but do not give it a password so that it
remains locked. If the password is already enabled, lock it with the command:
• usermod -L username
• chage -d 0 username
This command sets the value for the date the password was last changed to
the epoch (January 1, 1970). This value forces immediate password
expiration no matter what password aging policy, if any, is in place.
3. Unlock the account — There are two common approaches to this step. The
administrator can assign an initial password or assign a null password.
Warning
Do not use the passwd command to set the password as it disables the immediate
password expiration just configured.
• Start the command line Python interpreter with the python command.
import crypt;
print crypt.crypt("<password>","<salt>")
Caution
In either case, upon initial log in, the user is prompted for a new password.
1. A new line for juan is created in /etc/passwd. The line has the following
characteristics:
2.A new line for juan is created in /etc/shadow. The line has the following
characteristics:
• It begins with the username juan.
• Two exclamation points (!!) appear in the password field of the /etc/shadow
file, which locks the account.
Note
If an encrypted password is passed using the -p flag, it is placed in the /etc/shadow file
on the new line for the user.
3.A new line for a group named juan is created in /etc/group. A group with the
same name as a user is called a user private group. For more information on
user private groups, refer to Section 1.1, “Adding a New User”.
4. A new line for a group named juanis created in /etc/gshadow. The line has
the following characteristics:
5. A directory for user juan is created in the /home/ directory. This directory is
owned by user juan and group juan. However, it has read, write, and execute
6. The files within the /etc/skel/ directory (which contain default user settings)
are copied into the new /home/juan/ directory.
At this point, a locked account called juan exists on the system. To activate it,
the administrator must next assign a password to the account using the passwd
command and, optionally, set password aging guidelines.
Kmem 9
Wheel 10 root
Mail 12 mail, postfix, exim
News 13 news
Uucp 14 uucp
Man 15
Games 20
Gopher 30
Dip 40
ftp 50
Lock 54
Nobody 99
Users 100
Rpm 37
Utmp 22
Floppy 19
Vcsa 69
dbus 81
ntp 38
canna 39
rpc 32
postdrop 90
postfix 89
mailman 41
exim 93
named 25
postgres 26
sshd 74
rpcuser 29
apache 48
xfs 43
gdm 42
The setting which determines what permissions are applied to a newly created
file or directory is called a umask and is configured in the /etc/bashrc file.
Traditionally on UNIX systems, the umask is set to 022, which allows only the
user who created the file or directory to make modifications. Under this
scheme, all other users, including members of the creator's group, are not
allowed to make any modifications. However, under the UPG scheme, this
"group protection" is not necessary since every user has their own private
group.
The setgid bit makes managing group projects that share a common directory
very simple because any files a user creates within the directory are owned by
the group which owns the directory.
Let us say, for example, that a group of people need to work on files in the
/usr/share/emacs/site-lisp/ directory. Some people are trusted to modify the
directory, but certainly not everyone is trusted. First create an emacs group, as
in the following command:
• /usr/sbin/groupadd emacs
Now, it is possible to add the proper users to the group with the gpasswd
command:
• /usr/bin/gpasswd -a <username> emacs
To allow users to create files within the directory, use the following command:
When a user creates a new file, it is assigned the group of the user's default
private group. Next, set the setgid bit, which assigns everything created in the
directory the same group permission as the directory itself (emacs). Use the
following command:
• chmod 2775 /usr/share/emacs/site-lisp
At this point, because the default umask of each user is 002, all members of
the emacs group can create and edit files in the /usr/share/emacs/site-lisp/
directory without the administrator having to change file permissions every
time users write new files. In multiuser environments it is very important to
use shadow passwords (provided by the shadow-utils package). Doing so
Linux
• PC with Pentium or compatible processor, or PowerPC processor
• 64 MB RAM.
• 170 MB hard disk space.
• Linux Kernel 2.0.7 or higher
• X Server with a minimum of 256 colors or gray-scale.
• glibc2 2.1.3 or higher (2.2.1 for PPC).
• VGA or higher resolution graphic device with at least 256 colours,
800 x 600.
Solaris
• 128 MB of RAM.
• 240 MB hard disk space.
• Solaris 7 or higher (SPARC).
• For accessibility support GNOME 2.0 or higher is required.
• VGA or higher resolution graphic device with at least 256 colors 800
x 600.
• Gnome 2.0 required for accessibility.
146
Mac OS X
• Mac OS X v10.2 or higher
• 256 MB RAM, 512 MB recommended.
• 300 MB hard disk space (including X11).
• G4/400 or higher recommended.
Windows
• Pentium-compatible PC.
• Microsoft Windows 95 or higher.
• Win98 or higher required for Asian/CJK versions (2000 or higher
recommended).
• 64 MB of RAM.
• 170 MB hard disk space.
147
OpenOffice Writer is a word processing application similar to Microsoft Word.
OpenOffice is an open source software suite, and in addition to the Writer
application, it includes Base, Calc, Draw, Impress and Math, all comparable to
Microsoft Office applications.
15.2Creating a Document
15.2 .1 Creating A Blank Document
You can create a new, blank document in Writer in a number of ways.
• By using the Control+N keystroke. When you press Control+N you get a
new empty document to work with. If you already have a document open,
a new document window will be created.
• By using File > New > Text Document. The result is similar to using the
Control+N keystroke.
• Finally, by clicking a button on the main toolbar.
• Press Control-S.
• Select File > Save. You also can tell Writer to save your document
automatically at regular intervals. To enable this, you must configure
OpenOffice.org to save all documents automatically.
1. Save your document (see “Saving a document”). If you don't, any changes
you made since the last time you saved will only appear in the Microsoft
Word version of the document.
2. Select File > Save As. A file browser appears. See Figure 12.
3. In the File type drop-down menu, select the type of Word format you need.
4. Click Save.
The font size, type and color can be changed by using the drop down menus
located within the tool bar, or they can be changed by clicking on FONT in the
FORMAT menu. To edit paragraph features, including spacing, alignment, text
flow, tabs and borders, choose PARAGRAPH from the FORMAT menu.
Figure 4
Troubleshooting tip:
The default font setting for Writer documents is Times New Roman. If you experience
problems while using the format paintbrush, where it reverts some text to Times New
Roman instead of the font you have chosen, make sure to change the font setting by going
to FORMAT and then FONT in the menu bar instead of changing it in the drop down box
in the tool bar. Using the drop down box only applies the font setting to sections of the
document, while changing it from the menu applies it to the entire document.
Like Microsoft Word, Writer enables you to cut copy and paste
text and objects. This can be done within one document or between
multiple documents. There are a number of ways to do this.
• It can be done through the EDIT menu by highlighting text you want to
copy or cut, select COPY or CUT. Place the mouse where the text will be
inserted, and select PASTE from the EDIT menu.
• You can also use the cut, copy and paste icons in the tool bar (pictured
above).
• These key commands speed up the process if you will be using the cut,
copy and paste features often:
o Ctrl + C = Copy
o Ctrl + V = Paste
o Ctrl + X = Cut
• OLE Objects: Object Linking and Embedding objects. These can link to
another type of Open Office document, or the other documents can be
embedded within the text.
• Plug-in: If your document is to be displayed as a web page, it allows you to
insert a plug-in, or software component that expands the capabilities of a
web browser.
• Sound: Inserts an audio file located on your computer.
• Video: Inserts a video file.
A floating frame allows you to insert another document within the text. It is most
applicable when you are saving a Writer document as a web page. An example of
a floating frame is a software agreement that must be read before installation.
Once you choose to insert a floating frame, you will be prompted to locate the file
you want it to display. The frame allows the user to scroll through the document.
An example of a floating frame:
Figure 6
15.10 Draw Functions
To activate the drawing tool bar, go to VIEW, then TOOLBARS, and select the
drawing toolbar. A set of drawing tools should appear along either the top or
bottom of the page.
This button allows access to the fontworks gallery. Click on the button, and
select which type of text you would like. Once the text has been inserted, adjust
the size and location by dragging with the mouse. Double click on the text, and
This button allows you to insert pictures or graphics from a file just as you
would from the INSERT menu.
Figure 8
Tables can also be added by clicking on the left icon in the tool bar. You
can click on the button, and you will get the same pop-up menu as in figure 7, or
you can click on the drop down arrow next to the button, and you will have the
option to drag your mouse to choose the number of rows and columns:
Figure 9
You also have the option of using the default bullet and numbering
settings by clicking on the buttons in the tool bar, which are pictured above.
Figure 10
15.13 Spell Check, Auto Correct and Word Count
OpenOffice Writer has the ability to check for spelling mistakes. You can
check the spelling by going to TOOLS and then SPELL CHECK, or you can
click on the button in the tool bar pictured above. By highlighting a particular
word or section, Writer will only check the spelling in that section. If nothing is
highlighted, it will check the entire document. Writer automatically underlines
misspelled words with a red, wavy line. This feature can be turned off by clicking
on the following button in the tool bar:
Within this window, you have the option of setting exceptions for words to be
corrected, and you can add other words that you may commonly misspell to be
corrected automatically.
Figure 12
You can count the total number of words in a document or highlighted section by
going to TOOLS, then WORD COUNT.
Figure 13
15.15 Find/Replace
Writer has a feature that allows you to find and replace a word that appears
throughout the document. This can be done by going to EDIT, FIND/REPLACE
in the menu bar, or you can click on the button with binoculars (pictured above) in
the tool bar. A screen will pop in which you will type the words to find and
replace. Type the text you would like to find in the top box and the text you want
to replace it with in the bottom box. Make sure to check the “Match Case” box if
you want it to be case specific.
Figure 17
15.19 Tracking Changes
When multiple people are working on a document or project, Writer has a feature
that allows changes in the document to be tracked by user. Go to EDIT,
CHANGES, and select RECORD. Make sure that SHOW is also selected. This
will highlight or underline changes added by other users, and the final editor of the
document can review these changes and accept or reject them. By rolling the
Figure 18
Writer also allows the option of protecting the document by setting a password to
allow any changes to be made. This can be done by selecting PROTECT
RECORDS from the CHANGES menu.
15.20 Versioning
The versioning feature of Writer tracks multiple versions of the document that
have been saved by date and user. Go to FILE then VERSIONS, and you will get
a pop-up window that lists all of the versions that have been saved (figure 19).
Pakistan Computer Bureau 164
Each version can be saved individually, and notes can be added to explain the
changes to the version. You can check “Always save a version on closing,” to
make sure all versions are saved and nothing important is deleted. The
COMPARE feature will highlight changes from the selected version and compare
them to the current document.
Figure 19
16.4 Toolbars
Under the Menu bar by default are three toolbars: the Standard toolbar, the
Formatting toolbar, and the Formula toolbar. The icons on these toolbars provide a
wide range of common commands and functions. The toolbars can be modified, as
discussed in the chapter titled Menus and Toolbars in the Getting Started guide.
Placing the mouse pointer over any of the icons displays a small box, called a tool
tip it gives a brief explanation of the icon function. Fora more detailed
explanation, select Help > what’s this? And hover the mouse pointer over the icon
you need more help with. In the Formatting toolbar, there are two rectangular
areas on the left. They are the Font Name and Font Size menus. If there is
something already in the box, it tells what the current setting for the selected area
is.
Note
If the spreadsheet has been previously saved, then saving will overwrite the existing copy
without opening the Save As dialog box. If you want to save the spreadsheet in a different
location or with a different name, then select File > Save As.
TIP
Note
The sheet tab arrows that appear in Figure 9 only appear if you have some sheet tabs
that can not be seen. Otherwise they will appear faded.
TIP
You can also directly select a range of cells using the Name box. Click into the Name box
as described in “Using a cell reference†on page 10. To select a range of cells, enter
the cell reference for the upper left hand cell, followed by a colon (:), and then the lower
right hand cell reference. For example, to select the range that would go from A3 to C6,
you would enter A3:C6.
When you insert a single new column, it is inserted to the left of the highlighted column.
When you insert a single new row, it is inserted above the highlighted row.
A single column or row can also be added using the mouse: Select the column or
rows where you want the new column or row inserted. Right-click the header.Select
Insert Rows or Insert Columns.
Each method will open the Insert Sheet dialog. Here you can select whether the
new sheet is to go before or after the selected sheet and how many sheets you want
to insert.
• Enter the name in the name box when you create the sheet, or
• Right-click on a sheet tab and select Rename Sheet from the popup menu
and replace the existing name with a better one.
Sheet names must start with either a letter or a number; other characters including
spaces are not allowed, although spaces can be used between words. Attempting to
rename a sheet with an invalid name will produce an error message.
Both methods will open the Zoom dialog. This dialog has the following options
listed on the left side. Entire Page this option changes the view so that an entire
page fits within the height and width of the window. The page is defined by the
page format that has been applied to the sheet. This can be modified through
Format > Page > Page tab or through Format > Styles and Formatting > Page
Styles. In general, OOo will show at least one page within the window.
Page Width this option changes the view so that the width of the page fits within
the width of the screen. The page is defined as above. Where Entire Page can
make cells appear quite small, Page Width will show the width of the page while
possibly sacrificing the view of the entire height of the page. Optimal this option
zooms up the selected range to fit the screen and is normally greyed out to show
that it is not available. To use this option, you must first highlight a range of cells.
Percentages these options zoom the screen to a particular size, 100% being full
size. Variable this option allows you to set a zoom percentage of your choice.
Either use the up or down arrows to the right of the entry field or click three times
in the field to select the current amount and type in your desired zoom level.
You will see two lines appear on the screen, a horizontal line above this cell and a
vertical line to the left of this cell. Now as you scroll around the screen everything
above and to the left of these lines will remain in view.
16.17.3 Unfreezing
To unfreeze rows or columns
• Select Window > Freeze.
Note
Splitting the screen horizontally and vertically at the same time will give four views, each
with its own vertical and horizontal scroll bars.
TIP
Numbers can have leading zeros and be regarded as numerical entries if the the cell is
formatted appropriately. Right-click on the cell and chose the Format Cells > Numbers.
Adjusting the leading zeros setting can add leading zeros to numbers.
16.27.2 Mouse
Using the mouse, select the appropriate cell to edit. Once the cell is selected, move
the mouse pointer up to the input line and click into it to place the cursor for
editing. You can either edit the data from the input line or, once the cursor is in the
input line, click the mouse in the original cell for editing.
manually to the cell. To access the options to format a cell, select the appropriate
cell or cells, right-click on it, and select Format Cells. All of the format options are
discussed below.
Note
All the settings that will be discussed below can also be set as a part of the style using the
Styles and Formatting window
16.28.1 Numbers
On the Number stab, the behavior of the data in the cell can be controlled: Any of
the data types in the Category list can be applied to the data. The number of
16.28.2 Font
The font for the cell can be chosen on the Font tab. The display on the bottom
shows a preview of the cell. Here you can also set the language of the cell. The
language setting is useful, because it allows different languages to exist in the
same document and be spell checked correctly.
If the AutoFormat Chart dialog was opened from the Insert menu, the Chart results in
worksheet option is available. From this list box you can select the sheet on which the
new chart will reside. Opening the dialog from the toolbars requires you to select a
location for the new chart before it is opened, so this list box is not available. Since the
data range is specified in Absolute references no matter where the new chart is placed in
the current spreadsheet, it will update as the data change in the source ranges.
The current selection, shown with a border around it, is the Columns chart. The
selected chart’s name is shown just below the icons. For the moment, we will stick
with the Columns chart and click on Next again. This takes us to the Choose a
Variant page (not shown here) where we have a choice of five different types of
column chart. Again we need to scroll down to see all the choices. We will stay
with the suggested format, Normal, and click on Next again.
Multiple manual row and column breaks can exist on the same page. When you want to
remove them, you have to remove each one individually. This may be confusing at times,
because although there may be a column break set on the page, when you go to Edit >
Manual Break column break may be grayed out. In order to remove the break, you have
to be in the cell next to the break. So, for example if you set the column break while you
are in H15, you can not remove it if you are in cell D15. However, you can remove it
from any cell in column H.
From here you can also set the margins, the spacing, and height for the header or
footer. You can check the AutoFit height box to have the height of the header or
footer automatically adjusts.
16.41.2 Margin
Changing the size of the left or right margin adjusts how far the header or footer is
from the side of the page.
16.42.3 Spacing
Spacing affects how far above or below the sheet the header or footer will print.
So, if spacing is set to 1.00, then there will be 1 inch between the header or footer
and the sheet.
16.42.4 Height
Height affects how big the header or footer will be.
• From a file
• From the gallery
• From another application by copying and pasting
Caution
When entering dates, slashes or dashes used as date separators may be interpreted as
arithmetic operators. To keep dates from being interpreted as parts of formulas, and thus
returning erroneous results, always place them in quotation marks, for example,
"12/08/52".
Syntax Description
AND(logical_value_1; Returns TRUE if all arguments are TRUE. If any element is
logical_value_2; FALSE, this function returns the FALSE value.
...logical_value_30) Logical_value_1; logical_value_2; ...logical_value_30 are
Note
All of the search-criteria arguments for the database functions support regular
expressions. For example, all.* can be entered to find the first location of all followed by
any characters. To search for text that is also a regular expression, precede every
character with a \ character. You can switch the automatic evaluation of regular
expressions on and off in Tools > Options > OpenOffice.org Calc > Calculate.
Syntax Description
DAVERAGE(database; Returns the average of the values of all cells (fields) in all
database_field; rows (database records) that match the specified
search_criteria) search_criteria. The search supports regular expressions.
DCOUNT(database; Counts the number of rows (records) in a database that match
database_field; the specified search_criteria and contain numerical values.
search_criteria) The search supports regular expressions. For the
database_field parameter, enter a cell address to specify the
column, or enter the number 0 for the entire database. The
parameter cannot be empty.
DCOUNTA(database; Counts the number of rows (records) in a database that match
database_field; the specified search_criteria and contain numeric or
search_criteria) alphanumeric values. The search supports regular
expressions.
DGET(database; Returns the contents of the referenced cell in a database
database_field; which matches the specified search_criteria. In case of an
search_criteria) error, the function returns either #VALUE! for no row found,
or Err502 for more than one cell found.
DMAX(database; Returns the maximum content of a cell (field) in a database
database_field; (all records) that matches the specified search_criteria. The
search_criteria) search supports regular expressions.
DMIN(database; Returns the minimum content of a cell (field) in a database
database_field; that matches the specified search_criteria. The search
search_criteria) supports regular expressions.
The Draw module functionality is very extensive and complete. Even though it
was not designed to rival high end graphics applications, it still possesses more
functions than the majority of drawing tools that are integrated into office
productivity suites. A few examples of drawing functions might whet your
appetite: layer management, magnetic grid point system, dimensions and
measurement display, connectors for making organization charts, 3D functions
enabling small three-dimensional drawings to be created (with texture and lighting
effects), drawing and page style integration, and Bezier curves, just to name a few.
Many toolbar buttons are marked with a small arrow in the upper right corner of
the button. The arrow indicates that this button has additional functions. If you
long-click (left-click and hold), a submenu appears showing its additional
functions.
You may wish to keep this submenu displayed on your screen, but in a different
position than the default location. You can make this submenu into a floating
toolbar by detaching and repositioning it. Click the submenu title bar and drag it to
your desired screen location, then release the mouse button. Most buttons marked
with the small arrow can become floating toolbars. The floating toolbar capability
is common to all modules of the OpenOffice.org suite. The tools available in the
various toolbars are explained in the following paragraphs.
The available functions enable you to change the color of the line drawn, the fill
color, etc., of the object currently selected. If the selected object is text, the toolbar
will have the following appearance:
The toolbar is shown here horizontally, but by default it is placed vertically on the
left-hand side of the workspace. As for other toolbars in OpenOffice.org, the
buttons having a small rightward pointing arrow enable you to gain access to
further functionality. For example, if you click on the icon representing a
rectangle, the following window appears:
It is therefore possible to choose the type of rectangle you want to draw (for
example, straight or rounded, filled or empty, and so on). What's more, if you
choose another option from the icon with the arrow, this new option will be
displayed as the default for all following operations carried out using this button.
If you click on the Load Color List button that is circled, the file selector asks you
to choose a palette file (bearing the file extension .soc). Several palettes are
supplied as standard with OpenOffice.org. For example, web.soc is a color palette
that is particularly adapted to creating drawings that are going to appear in web
pages, because the colors will be correctly displayed on workstations with screens
displaying at least 256 colors. The color selection box also lets you individually
change any color by modifying the numerical values that you can enter in the
Fields provided to the right of the color palette. You can also click on Edit to
display a dialog box making the choice of colors easier. You can use the color
schemes known as CMYK (Cyan, Magenta, Yellow, and Black), RGB (Red,
Green, and Blue) or HSB (Hue, Saturation, and Brightness).
Pakistan Computer Bureau 211
17.3.5 The Option Bar
This toolbar lets you activate or deactivate various mechanisms that make drawing
easier. As opposed to the other toolbars, the Option Bar isn't displayed by default.
In order to display it from the menu bar, click View > Toolbars > Option Bar.
When it is displayed, it can generally be found at the bottom of the screen and
looks like this:
The sizes are given in the current unit (not to be confused with the ruler units).
This unit can be defined via Tools > Options > Draw > General. This dialog box
also lets you change the scale of the page.
Drag the mouse while keeping the button pressed down. Let go of the mouse
button when you want to stop drawing the line. Two blue or green handle points
located at each end of the line will appear, showing that this is the currently
selected object. The handle colors depend on the default select mode (they will be
green for simple selection and blue when in point edit mode).
While drawing the segment, if you hold down the Shift key as well, you will force
the line to be drawn at angle which is a multiple of 45° with respect to the
horizontal. The star in dots shows the angles that are permitted for the straight line
when the Shift key is pressed.
If you hold down the [Alt] key, the line will be drawn symmetrically with respect
to the start point. This technique lets you draw straight lines by starting from the
middle of the line.
Note:
You must press the left mouse button BEFORE you press the [Alt] key todraw your line.
Pressing the [Alt] key first will cause you to move the program panel instead of drawing
a line.
The line drawn with the mouse shows the diagonal of the rectangle.
If you hold the [Shift] key, you will get a square and the [Alt] key enables you to
draw a rectangle starting from its center.
Note:
You must press the left mouse button BEFORE you press the [Alt] key to draw your
circle. Pressing the [Alt] key first will cause you to move the program panel instead of
drawing a circle. >>Ctrl-circle - snaps to grid lines.
The Text tool lets you write text in the default font, color and size.
When you type your text, you will notice that the upper ruler includes the usual
paragraph attributes: indents, first line, tab stops. You can, as in Writer, change the
style of all or part of the characters you enter. The Stylist also works here, so you
can create styles that you can use again in other text frames exactly as you would
with Writer. The text frames can also be manipulated just like any other draw
objects. You can assign them fill colors, shadows etc. You can also rotate the
frame and write the text at any angle. The Fit Text To Frame tool lets you type in
text, but you can also change the size of the resulting text by manipulating the
object's selection handles.
In the example above, the same text has been duplicated, but the selection
rectangle has been changed. In order to make the effect clearer, we have displayed
the border of the rectangle. The Callout tool in the palette is used for creating
captions (callouts or figure labels). In fact it's a tool that puts a frame around text
and provides a connector (an articulated arrow). This tool has been used many
times for the captions in this manual.
17.4.7 3D Objects
Draw lets you draw three dimensional objects. The 3D object palette offers a
choice of 8 basic primitives that can be used to create more complex objects
through merging or combination.
17.4.8 Curves
The curve palette offers 8 tools for drawing non-linear profiles.
These icons represent the basic tools for drawing curves. The resulting
curve can be manipulated by Bezier curves as we have seen previously. The
principle behind the tools is as follows:
Click on the drawing area to position the first point. Keeping the mouse button pressed
down, move the mouse to draw the tangent to the curve that passes through the start
point. Let go of the mouse button and move the mouse to draw the curve.
To finish the shape, double-click on the left mouse button. This operation can be
repeated immediately starting from the newly created end point. The shape you
create will be filled or empty depending on the button you pressed. Where the
shape is filled, a segment will be drawn from the start point to the end point. The
object that results can be manipulated like any other, but you can also play with
the tangents of the object in edit points mode.
The way it works is fairly simple: just click on the workspace to set the first point,
move the mouse to the next position where you want to set a second point and
click, and a segment will be drawn between the two. The polygon is drawn by
repeating this procedure until all of the points have been drawn. When you have
finished, double-click on the mouse to release the polygon from edit mode. If you
chose to create a closed shape, a segment will link the start point to the end of the
last segment that you have drawn.
This tool is similar to the previous one, but various segments will all have
angles that are a multiple of 45° in relation to a horizontal axis. The shape drawn
will be open or filled depending on the button chosen.
When you click on these buttons, you can draw a freehand line. The
principle behind this is as follows: move the mouse and at the same time hold
down the left mouse button. The movement of the mouse as shown on screen will
become the curve that is drawn. OpenOffice.org actually draws a curve composed
of several control points. You can check this by switching into edit points mode.
Here again, depending on the icon chosen, you can draw a closed or open freehand
curve.
17.5 Connectors
Connectors are a particular type of curve, the ends of which are attached to glue
points on other objects, and which stick to these glue points when the associated
The results will differ depending on which handle you use. If you choose a corner
handle you will resize the object along two axes at the same time. If, on the other
hand, you use a side handle the objects will only be resized along one axis.
Note:
If you press the Shift key at the same time as you carry out the resizing operation, the size
change will be carried out symmetrically with respect to the two axes, which enables you
to keep the height/length ratio of the object. With the Alt key, the object is resized
symmetrically starting from its center.
Rotations are made about an axis which is displayed as a small symbol. You can
move the axis of rotation with the mouse, as shown below:
17.6.7 Inclination
To incline or slant an object, use the red handles located on one of the edges of the
selected object. The inclination axis is shown as the nearest handle to the opposite
edge:
This toolbar is split into two parts. To go from one to the other, use the arrow
button located at the right end of the Object toolbar. The second part of the toolbar
will then appear; it is the default Object toolbar shown above.
17.9.1 3D effects
3D objects have their own configuration dialog. This dialog is called the 3D
Controller or the 3D Effects dialog5. Click on the button to display it (Main
toolbar). The dialog contains several pages that can be selected through the
buttons at the top.
As indicated at the beginning of the chapter, the objects of a group maintain their
Individuality and it is possible to undo a group via the context menu (Ungroup) or
using the keyboard shortcut Alt + Control + Shift + G or even the main menu
Modify > Ungroup.
At first glance, this can seem rather surprising. Fortunately, once you have
understood the rules governing combination in OpenOffice.org, it will become
clear:
• The attribute of the resulting object is the attribute of the object that is the
furthest back from the viewer. In our example, it is the circle. The resulting
drawing has the same color, line thickness, etc., as the circle.
• The result of the combination is a Bezier curve.
• Where the objects overlap, the overlapping zones will be represented as a
filled or empty zone depending on the number of overlaps. When there is
an even number of overlaps, you get an empty space (represented by a
'hole') in the drawing. When the overlaps are odd in number, you get a
filled area. In our example, we can count the number of super positions:
If you double-click on the zoom value, a window is displayed in which you can
change the zoom percentage value:
17.19 Duplication
This function duplicates a given shape while at the same time enabling you to
change the options applied to the duplicated shapes. To start duplication, click on
an object (or on a group of selected objects), then choose Edit > Duplicate. The
following dialog box appears:
• Empty Presentation
• From template, and
• Open existing presentation
The Open existing presentation option will allow you to navigate to a presentation
that is already created, while from template option allows you to choose from
existing templates. There are two types of templates, Introducing a New Product
or Recommendation of a Strategy. These templates choices contain seven different
types of slide designs that help you organize information. Once you select a style
type, you will be presented with two color schemes. The Auto Pilot will also ask
general questions, such as company name in order to auto fill some fields.
Design Tip
Choose your transitions and effects judiciously. While they can add to a presentation's
appeal, they can also detract from the message that you are presenting. Do not mix too
many transitions or effects on one slide. Consider the presentation's audience, tone, and
message when choosing transitions. Transitions such as Venetian Blinds or Check board
are more playful, while a simple fade-out transition is more serious. Select how the
presentation will be timed through the Select presentation type options. If you choose
Default, the speed of the slide show will be controlled by the presenter during the
presentation.
• Master Pages
• Layouts
• Custom Animations
• Slide Transitions
Normal View
This view is where you will create and edit your presentation.
Outline View
This view shows the titles of all the slides in an outline form. You can change or
add titles by clicking to the left of the outline bullet.
Notes View
This view allows you to add notes about slides. The notes will not show in the
presentation, but will print on the handouts.
You will see a frame at the bottom of the window labeled "Click to add notes."
• Click once in this window and add text.
On the right-hand side of the window there will be five different handout designs
that you can choose from.
To rearrange slides, click on the slide you wish to move, hold down the mouse
button, and move the object to a new location in the presentation (between slides,
at the beginning or at the end). Lift up on the mouse button when you are satisfied
with the new location. A vertical line between the slides indicates the position to
which you are moving the slide. To return to Normal view, go to View-> Normal.
Layouts, Text, and Slides. This section describes how to apply a layout; insert,
format, and delete text; and insert and delete slides. To apply a layout to your new
slide :
NOTE:
To insert and format text in a slide: If you have selected a layout with a text box
included, click on the text that says "Click to add an outline," and begin typing
your text. The layout will automatically format your text.
You can add additional text boxes by clicking on the text box icon located on
the bottom tool bar. Place the cursor inside the presentation and create a rectancle
text box. Click inside the box and begin typing your text.
You can add artistic text by clicking on the Fontwork icon. This option is
similar to Microsoft's WordArt. The Fontwork Gallery will open. Click on you
preferred text format and click OK. The font art will be inserted into your
presentation with the word "Fontwork" spelled out. Double click on the text and a
small, editable version of the word "Fontwork" will appear in front of the larger
word. Type your text over the small, editable text.
To delete text:
Option #1: Highlight the text you want to delete by dragging the cursor over the
letters, and press the delete key.
Option #2: Click on the selection rectangle around the text so that its border
changes from hatch marks to dots, and then press the delete key
Option #2: Click on the "Slide" button on the formatting toolbar at the top of the
Impress window.
Option #3: On the Slides pane (on the left), position your cursor to the point in the
presentation where you would like the new slide to appear (i.e. between slides, at
the beginning of the presentation, or at the end of the presentation). Right click,
and choose "New slide."
To delete a slide:
Option #1: Go to Edit->Delete Slide. The current slide will disappear from the
workspace.
Option #2: On the Slides pane (off to the left), click on the slide you would like to
delete, and then hit the <Delete> key.
Note
Design Tip
To insert a picture into your presentation: If you have already saved the
picture, and you would like to insert, go to Insert->Picture->From File and
navigate to your picture file. Select your file, and click "Insert". Your picture will
appear on the current slide. Images can also be pasted into your Impress
presentation. If you have an image within another source, copy the image in the
original source. Go to Edit->Paste and paste the art work into your presentation.
To change the shape of a picture: Move your cursor over the picture and click
once to select it. You will see a number of small green squares appear along the
edge of the picture. These squares are called "sizing handles."
Click on one of the sizing handles that appear on a side of the picture; hold the
mouse button down; drag the handle to change the shape of the picture. Your
pointer will be a double-sided arrow when you are directly over a sizing handle.
Pakistan Computer Bureau 241
Be aware that you are distorting the picture by stretching or squishing it. Release
the mouse button when you have achieved the desired shape.
To change the size of a picture: Move your cursor over the picture and click
once. You will see the sizing handles described above. Click your cursor on one of
the sizing handles that appears on the corner of the picture; hold the mouse button
down; drag the picture to make it smaller or larger. Using these corner handles
maintains the original proportions of the image (it does not stretch or squish).
Release the mouse button when you have achieved the desired size.
To move a picture:
Option #1: Using the mouse:
Move your cursor over the picture until the cursor looks like a cross. Click the
mouse button, hold the button down, and drag the picture to change its location.
Release the mouse button when you are satisfied with the location of the image.
Select
This button looks like the cursor arrow. Click this button to then select and move
objects on your slide.
Text Box
Clicking this tool and then clicking in your slide inserts a box in which you can
type an unlimited amount of text. This box is mentioned in the "Layouts" section
of this tutorial. The box expands to accommodate what you type. Hitting the
<enter> key on the keyboard takes you to the next line of text. You can move a
text box by clicking on the border (your cursor should be a 4points arrow) and
dragging it to the desired position. You can also resize a text box using the sizing
handles, the same way you resize an image.
Curve
This tool allows you to create free-drawn lines or curved vector-based objects.
Note the drop down arrow on the right of the graphic that gives additional options.
Connectors
This tool allows you to connect graphics to create flow charts or diagrams.
Basic Shapes
This tool gives you the option to insert pre-designed shapes such as diamonds,
pentagons and cylinders. Note the drop down arrow on the right of the graphic that
gives additional options.
Symbol Shapes
This tool gives the option to insert pre-designed fun shapes such as hearts or happy
faces. Note the drop down arrow on the right of the graphic that gives additional
options.
Block Arrows
This tool allows you to insert block shapped arrows. Note the drop down arrow on
the right of the graphic that gives additional options.
Flowcharts
This tool allows you to insert flowchart shapes. Note the drop down arrow on the
right of the graphic that gives additional options.
Callouts
This tool allows you to insert callouts. Note the drop down arrow on the right of
the graphic that gives additional options.
Points
This tool allows you to change the size of points on a vector-created image. Click
on the image and then click on a handle box. Drag the handle box to a different
location to edit the vector-based image.
Glue Points
This tool displays the points on a custom-drawn object. Click once on the object to
select and then click on the glue point icon to display points on the object. The
glue points can then selected and moved to alter the image.
Insert Picture
This tool allows you insert pictures from file.
Gallery
This tool opens a gallery of images, sounds, bullets, web page icons, and rule
dividers that can be inserted into a presentation for sound and graphic appeal.
Rotate
This tool allows you to rotate on an object by clicking on the object. When a circle
handle appears, click on the circle and rotate the object by moving the mouse.
Alignment
This tool allows you to change the alignment of objects. Note the drop down
arrow on the right of the graphic that gives additional options.
Arrange
This tool allows you to change the layering of objects. Objects can be moved
backwards or brought forward. Note the drop down arrow on the right of the
graphic that gives additional options.
Interaction
This tool allows you to add interactive effects at the click of a mouse.
Line
This tool allows you to change the width and style of lines. It can also be accessed
by right-mouse clicking on an object.
Arrow Style
This tool allows you to change the direction and arrow head by clicking on a line
or arrow that has been added to the presentation. It can also be accessed by right-
mouse clicking on an object.
Line Style
This tool allows you to adjust the line format.
Line Width
This tool adjusts the line width of objects.
Line Color
This tool allows you to change the line color of objects.
Area
This tool opens a window that gives you many options for changing the fill, color,
gradient, and texture of a shape object.
Area Style/Filling
This tool is a two part tool. Select an option from the first window, such as
gradient. Review the many choices for gradient in the second window and click on
one to choose it.
Shadow tool
This tool applies a shadow.
• Go to File->Print.
• To print notes, handouts, or outlines:
• Go to File->Print. Click on the Options button in the bottom left side of the
window.
The Printer Options window will open, under the Content section, click on the
desired format that you would like to print. Click Ok and then Ok again.
NOTE
You can also export your presentation as a PDF file. See the Export section below.
• Go to File->Save As.
• In the Save As window, navigate to Save as type:
• Click on the drop-down menu and choose the option: Microsoft PowerPoint
97/2000/XP.ppt
• Name your file and choose the save destination.
• Click on Save
Go to File->Export. In the
Export window, navigate to File
format: Click on the drop-down
menu and choose from the
many options. Name your file
and choose the save destination.
Click on Save
NOTE:
before you begin, you must create a folder entitled "public_html" in your directory on the
iSchool server. If you have not already done this, consult the iSchool tutorial "How-to
Publish Web Pages" or contact a "purpleshirt" for help.
The next window will prompt you to select the button style for navigating through
your presentation when it is on the web. If you choose text only, your web page
will display the navigation choices as text only.
For Example:
Select button style and Click Next. The final window will ask you to choose the
color scheme for your presentation on the web. Select Apply color scheme from
document and click on Create. To upload your presentation to the iSchool server :
Step 1: Start a FTP (File Transfer Protocol) program. FTP programs are generally
available from the Start menu. If you need help doing this, consult the iSchool
tutorials on SSH or Fugu.
Step 4: Select ALL the files and folders associated with your presentation. Drag
them to the public_html folder displayed in the FTP session.
NOTE:
Your published presentation may look slightly different viewed in different browsers. Also
note that security settings in the browser of a particular computer may require extra
steps to view your presentation.
251
Installing Packages
Installation Complete
Itanium Systems — Booting Your Machine and Post-Installation
Setup
Post-Installation Boot Loader Options
Booting Red Hat Enterprise Linux Automatically
3. Removing Red Hat Enterprise Linux DAY 3
DAY
4. Troubleshooting Installation on an Intel® or AMD System
4, 5
You are Unable to Boot Red Hat Enterprise Linux
Are You Unable to Boot With Your RAID Card?
Is Your System Displaying Signal 11 Errors?
Trouble Beginning the Installation
Problems with Booting into the Graphical Installation
Trouble During the Installation
No devices found to install Red Hat Enterprise Linux Error
Message
Saving Trace back Messages Without a Diskette Drive
Trouble with Partition Tables
Using Remaining Space
Other Partitioning Problems
Other Partitioning Problems for Itanium System Users
Are You Seeing Python Errors?
Problems After Installation
Trouble With the Graphical GRUB Screen on an x86-based
System?
Booting into a Graphical Environment
Problems with the X Window System (GUI)
Problems with the X Server Crashing and Non-Root Users
Problems When You Try to Log In
Is Your RAM Not Being Recognized?
Your Printer Does Not Work
Problems with Sound Configuration
Apache-based httpd service/Sendmail Hangs During Startup
5. The GRUB Boot Loader DAY 6
Boot Loaders and System Architecture
GRUB
GRUB and the x86 Boot Process
Features of GRUB
Installing GRUB
GRUB Terminology
Device Names
File Names and Block lists
The Root File System and GRUB
GRUB Interfaces
Interfaces Load Order
GRUB Commands
GRUB Menu Configuration File
Configuration File Structure
Configuration File Directives
Changing Run levels at Boot Time
Additional Resources
252
Installed Documentation
Useful Websites
6. Swap Space DAY 7
What is Swap Space?
Adding Swap Space
Extending Swap on an LVM2 Logical Volume
Creating an LVM2 Logical Volume for Swap
Creating a Swap File.
Removing Swap Space
Reducing Swap on an LVM2 Logical Volume
Removing an LVM2 Logical Volume for Swap
Removing a Swap File
Moving Swap Space
7. Managing Disk Storage DAY 8
Standard Partitions using parted
Viewing the Partition Table
Creating a Partition
Removing a Partition
Resizing a Partition
LVM Partition Management
8. Access Control Lists DAY 9
Mounting File Systems
NFS
Setting Access ACLs
Setting Default ACLs
Retrieving ACLs
Archiving File Systems With ACLs
Compatibility with Older Systems
Useful Websites
DAY
9. Package Management with RPM
10
RPM Design Goals
Using RPM
Finding RPM Packages
Installing
Uninstalling
Upgrading
Freshening
Querying
Verifying
Checking a Package's Signature
Importing Keys
Verifying Signature of Packages
Practical and Common Examples of RPM Usage
Additional Resources
Installed Documentation
Useful Websites
Related Books
253
DAY
10. Samba
11
Introduction to Samba
Samba Features
Samba Daemons and Related Services
Samba Daemons
DAY
11. Date and Time Configuration
11
Time and Date Properties
Network Time Protocol (NTP) Properties
Time Zone Configuration
DAY
12. The X Window System
12
The X11R7.1 Release
Desktop Environments and Window Managers
Desktop Environments
Window Managers
X Server Configuration Files
xorg.conf
Fonts
Fontconfig
Core X Font System
Runlevels and X
Runlevel 3
Runlevel 5
DAY
13. X Window System Configuration
13
Display Settings
Display Hardware Settings
Dual Head Display Settings
DAY
14. Users and Groups
14
User and Group Configuration
Adding a New User
Modifying User Properties
Adding a New Group
Modifying Group Properties
User and Group Management Tools
Command Line Configuration
Adding a User
Adding a Group
Password Aging
Explaining the Process
Standard Users
Standard Groups
User Private Groups
Group Directories
DAY
15. Open Office
15, 30
Introduction to Open Office
254
System Requirements
How to Run
Starting Writer
Creating a Document
Saving Document
Saving a Document
Closing A Document
Exiting Writer
Formatting Documents
Draw Functions
Hyperlinks
Find/Replace
Print Preview/Printing
Navigator
Save as HTML
Tracking Changes
Versioning
What is Calc?
255
Toolbars
Formula bar
Individual cells
from a template
Saving spreadsheets
Selecting cells
Single cell
256
Range of contiguous cells
Single column
Single row
Entire sheet
Selecting sheets
Single sheet
All sheets
Deleting sheets
Single sheet
Multiple sheets
Renaming sheets
Viewing Calc
257
Freezing/Unfreezing rows and columns
Unfreezing
Entering numbers
Entering text
Inputting data
Wrapping text
Line breaks
Removing Data
Keyboard shortcut
Mouse
258
Formatting data in Calc
Numbers
Font
Font effects
Creating a chart
Data labels
Printing a spreadsheet
Print options
Page breaks
Row break
Column break
Margin
Spacing
Height
Custom header
Inserting pictures
Mathematical functions
259
Date and time functions
Logical functions
Informational functions
Database functions
Introduction to Draw
The Workplace
The Toolbars
The Rulers
Drawing a rectangle
Drawing a circle
The Texts
3D Objects
Curves
Connectors
Connector toolbar
Selecting Objects
Direct selection
Selection by framing
260
Moving and Dynamically Adjusting the Size of an Object
Rotating an Object
Inclination
Applying a Style
Special Transformations
3 D Rotation Objects
3D effects
Combination Functions
Aligning Objects
Distribution of Objects
Zoom Toolbar
Managing Layers
Specific Functions
Duplication
Normal View
Alternate Views
261
Design Templates and Images
Design Templates
Drawing Tools
Saving as PowerPoint
262