You can also find out if the manufacturer even supports Linux. Trademarks: All brand names and product names used in this book are trade names, service marks, trademarks, or registered trademarks of their respective owners. Changing the package archive source. This new operating system kernel was refined for maximum performance on the Intel 386 microprocessor, which made this new Linux kernel platform specific. Without their hard work, high standards, and volunteer efforts, this Linux distribution would not have the reputation it does today. Booting Linux directly from the hard drive.
Iomega drives Zip, Jaz, and so on. Experienced Linux users can use this chapter as a reference for things to watch for during the installation process. Tips help you to get the job done faster and more safely. Therefore, having companies involved in the development of Linux is a good thing. Please understand I mean no disrespect to the developers. Either way, you need to select at least one window manager. For a private network, using the default is fine.
Compiling and installing a new kernel. Initializing the operating system kernel and modules Configuring device driver modules. In addition to the kernel, the user interface, device drivers, file system, and system services complete the whole operating system and make it functional for someone to use. This is similar to getting information about a Debian package using the -i option. Since then, many other distributions have begun to use this package manager.
This becomes important as you begin to organize a collection of files. Connecting to a Samba server from Linux. Press Enter to accept the partition. Gnome-apt still relies on the other Apt tools to complete the tasks. This practical learning tool is ideal for anyone eager to set up a new Linux desktop system at home or curious to learn how to manage Linux server systems at work. See Chapter 17 for more information about hardware or Chapter 15 for the kernel details.
The second section the mouse device is the most important. Monitoring system log files Disk monitoring. Systems not using shadow passwords can have the password file read straight from the file. The default keyboard 101 does not have these additional keys on either side of the Spacebar. You are always prompted to log in with a name and password, as shown in Figure 3-1. Root is the foundation for the entire directory structure that Linux uses.
Sharing files between Linux and Windows machines. Setting Controls for Web Pages. Table 3-1 shows the filesystem breakdown. You can get there a couple of ways, but the easiest is by pressing Enter twice — once for the path shown, and again for the default stable archive. Essentially, this option enables longer, more secure passwords.
This emulation takes advantage of those extra features. The following code shows the configuration file as it would exist on your system after installing Debian for the first time: See sources. You can add as many supported resolutions as you would like. You will also need space on the hard drive to install the operating system. These men and women spend their free time working on the code with an understanding that the software is shared freely around the world.
However, those of you with fast, direct connections to the Internet such as with cable modems , you may want to use the network option. It brings up a text-based display for you to navigate through, as seen in Figure 2-8. Tarballs are very easy to work with, which is why many people prefer to use them to distribute software. Table 3-8 shutdown command options Option Description -t sec Waits sec seconds after sending processes the warning and kill signal and before changing to another run level -k Only sends the warning messages to those logged in. You can also think of sbin as holding system binaries. Table 3-9 shows the options for manually using mount load a filesystem. Therefore, proper preparation will save you the headaches later.