Advanced Science & Technology Institute




Bayanihan Linux 5
MANUAL
Bayanihan Linux 5


1    Copyright c 2008-2009 Emman Balintec, Rage Callao, Yvonne Carpo, Pearliezl Dy
2    Tiongco, Mariesonn Florendo, Aileen Cruzado, Russel Baisas. All rights reserved.

3    This document is free; you can redistribute it and/or modify it under the terms of
4    the GNU General Public License as published by the Free Software Foundation; either
5    version 2 of the License, or (at your option) any later version.

6    This document is distributed in the hope that it will be useful, but WITHOUT ANY
7    WARRANTY; without even the implied warranty of MERCHANTABILITY or FIT-
8    NESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
9    more details.

10   You should have received a copy of the GNU General Public License along with this
11   document; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge,
12   MA 02139, USA.




     2
13                                                                        CONTENTS




14   Preface                                                                                 7


15   1 Installing the Bayanihan Linux OS                                                     9
16     1.1     Getting the installer . . . . . . . . . . . . . . . . . . . . . . . . . .     9
17     1.2     Checking disc integrity . . . . . . . . . . . . . . . . . . . . . . . . .    10
18     1.3     Advanced Installer Options . . . . . . . . . . . . . . . . . . . . . .       11
19     1.4     Graphical installation guide . . . . . . . . . . . . . . . . . . . . . .     11
20     1.5     First Look . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   18


21   2 Desktop Overview                                                                     21
22     2.1     From power on to desktop . . . . . . . . . . . . . . . . . . . . . . .       21
23     2.2     Desktop components . . . . . . . . . . . . . . . . . . . . . . . . . .       22
24     2.3     Menu button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .      22
25     2.4     Taskbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    23
26     2.5     System tray . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .    24


27   3 Working with Files and Folders                                                       25
28     3.1     Folders and Paths . . . . . . . . . . . . . . . . . . . . . . . . . . .      26
29     3.2     Introduction to Konqueror . . . . . . . . . . . . . . . . . . . . . . .      26

                                                 3
Bayanihan Linux 5                                                               Contents


30       3.3   Navigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   30

31       3.4   Deleting Files and Folders . . . . . . . . . . . . . . . . . . . . . . .     32

32       3.5   Moving and Copying . . . . . . . . . . . . . . . . . . . . . . . . . .       33

33       3.6   Selecting Multiple Files . . . . . . . . . . . . . . . . . . . . . . . .     36

34       3.7   Create New . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .     37

35       3.8   Changing Names and Permissions . . . . . . . . . . . . . . . . . . .         39

36       3.9   Configuring File Association . . . . . . . . . . . . . . . . . . . . . .      40

37       3.10 At the Command Line . . . . . . . . . . . . . . . . . . . . . . . . .         40

38       3.11 Linux Filesystem Hierarchy . . . . . . . . . . . . . . . . . . . . . .        42


39   4 Connecting to the Internet                                                           47

40       4.1   Dial-Up using KPPP . . . . . . . . . . . . . . . . . . . . . . . . . .       47

41       4.2   LAN/WiFi connectivity with KNetworkManager . . . . . . . . . .               53

42       4.3   Using FireFox and Konqueror for browsing the web . . . . . . . . .           56

43       4.4   Setting the proxy for firefox and konqueror . . . . . . . . . . . . .         59

44       4.5   E-Mail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .   60

45       4.6   VOIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .     65

46       4.7   Instant Messaging With Pidgin . . . . . . . . . . . . . . . . . . . .        69

47       4.8   Desktop Sharing/Remote Desktop . . . . . . . . . . . . . . . . . .           70


48   5 Using OpenOffice.org 3                                                                 73

49       5.1   OpenOffice.org 3 Writer . . . . . . . . . . . . . . . . . . . . . . . .        73

50       5.2   OpenOffice.org 3 Calc . . . . . . . . . . . . . . . . . . . . . . . . .        78

51       5.3   OpenOffice.org 3 Impress . . . . . . . . . . . . . . . . . . . . . . .         82


52   6 Using Graphics Tools                                                                 89

53       6.1   Image Editing Using Gimp . . . . . . . . . . . . . . . . . . . . . .         89

54       6.2   Gwenview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .     90

     4
Contents                                                           Bayanihan Linux 5


55      6.3     Installing/Using Digikam . . . . . . . . . . . . . . . . . . . . . . .       93
56      6.4     Other graphics tools . . . . . . . . . . . . . . . . . . . . . . . . . .     93


57   7 Using WindowsTM applications with WINE                                                95
58      7.1     Installing WindowsTM software . . . . . . . . . . . . . . . . . . . .        96
59      7.2     Configuring WINE . . . . . . . . . . . . . . . . . . . . . . . . . . .        97
60      7.3     Tested applications . . . . . . . . . . . . . . . . . . . . . . . . . . .    98


61   8 Using Multimedia Applications                                                        99
62      8.1     Amarok . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .     99
63      8.2     KsCD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
64      8.3     KMix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
65      8.4     KRec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
66      8.5     XVidCap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
67      8.6     MPlayer Video Player . . . . . . . . . . . . . . . . . . . . . . . . . 102
68      8.7     K3B - CD/DVD Burning . . . . . . . . . . . . . . . . . . . . . . . 104
69      8.8     KAudioCreator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105


70   9 Using the Terminal/Commandline                                                       107
71      9.1     Access the Terminal/Console . . . . . . . . . . . . . . . . . . . . . 107
72      9.2     File and Folder Navigation . . . . . . . . . . . . . . . . . . . . . . . 108
73      9.3     Filesystem Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
74      9.4     User-related Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
75      9.5     File Permissions    . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
76      9.6     Other Essential Commandline Tools . . . . . . . . . . . . . . . . . 116
77      9.7     Text Editors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119


78   10 System Administration                                                               123
79      10.1 Installing/Removing/Upgrading software . . . . . . . . . . . . . . . 123

                                                                                              5
Bayanihan Linux 5                                                             Contents


80       10.2 KDE Control Center . . . . . . . . . . . . . . . . . . . . . . . . . . 130
81       10.3 Managing Printers . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
82       10.4 Managing Private Folders . . . . . . . . . . . . . . . . . . . . . . . 133
83       10.5 Setting up a firewall with Guarddog . . . . . . . . . . . . . . . . . 133
84       10.6 Updating/Using Klamav . . . . . . . . . . . . . . . . . . . . . . . . 134
85       10.7 Managing users with Kuser/Adduser/Deluser . . . . . . . . . . . . 135

86   11 Special Topics                                                                 137
87       11.1 Installing a C/C++ development environment           . . . . . . . . . . . 137
88       11.2 Compiling a custom kernel or third-party driver . . . . . . . . . . . 138
89       11.3 Installing a webserver . . . . . . . . . . . . . . . . . . . . . . . . . 139
90       11.4 Installing an ftp/file server . . . . . . . . . . . . . . . . . . . . . . . 146
91       11.5 Installing an email server . . . . . . . . . . . . . . . . . . . . . . . 146
92       11.6 Configuring NFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
93       11.7 BIND / DNS servers . . . . . . . . . . . . . . . . . . . . . . . . . . 158

94   Appendix A GNU GPL                                                                159

95   Bibliography                                                                      173

96   Index                                                                             174




     6
97                      Preface




98   Sample text.




                    7
Bayanihan Linux 5   Contents




8
99


100                                                                          CHAPTER

101                                                                              ONE
102




103                                   Installing the Bayanihan Linux OS



104   Chapter Author : Rage Callao
105


106   The system uses the Debian Installer[8], a software developed by the Debian
107   Project1 . This version features a fully graphical installation as well as console,
108   expert and rescue modes. The following sections will describe the stages and
109   options available for each of these modes.



110   1.1     Getting the installer

111   Bayanihan Linux is freely downloadable as an ISO image from the Bayanihan
112   Linux website at http://bayanihan.gov.ph or can be obtained as a CD from
113   the Advanced Science and Technology Institute office.
114   After downloading the ISO image, please verify that the image was downloaded
115   correctly by using a file integrity checking software such as md5sum.exe or
116   sha256sum.exe and compare the generated values with those posted at our
117   website.
118   If the ISO image integrity check is successful, use a CD burning software and select
119   the Burn as image option to burn the ISO image to a blank CD. This process will
120   produce a bootable Bayanihan Linux CDROM Installer. Then insert the disc

         1 http://www.debian.org



                                               9
Bayanihan Linux 5                     Chapter 1. Installing the Bayanihan Linux OS


121   into the CDROM drive and restart your computer making sure it boots from the
122   CDROM.



123   1.2     Checking disc integrity

124   Before beginning your installation you should also check whether the ISO image
125   was properly “burned” onto the CD. To do this, boot the CD and select Advanced
126   options from the boot menu and then select Graphical expert install as shown in
127   Figure 1.1. On the next screen (shown in Figure 1.2) select Check the CDROM(s)
128   integrity. If the check is successful, proceed with the Graphical installation guide
129   shown in Figure 1.4.
130   Important: Perform a BACK-UP of your valuable data before proceeding with
131   the installation.




      Figure 1.1: Graphical expert install




      Figure 1.2: Check the CD-
      ROM(s) integrity




      10
Chapter 1. Installing the Bayanihan Linux OS                   Bayanihan Linux 5


132   1.3     Advanced Installer Options

133   Additional installer options are available by selecting Advanced options (use the up
134   and down arrow keys and press Enter on the highlighted entry) from the installer
135   menu shown in Figure 1.4. The various options are shown in Figure 1.3 and
136   described below.


137   Expert install runs the installer in a text-mode environment and displays all
138       available options

139   Rescue mode runs the installer and provides a shell from which a preinstalled
140       system can be accessed and configured

141   Graphical expert install runs the installer in a full graphical environment and
142       displays all available options

143   Graphical rescue mode runs the installer in a full graphical environment and
144       provides a shell from which a preinstalled system can be accessed and con-
145       figured

146   Test physical memory runs memtest which is a program to check the system
147        memory




                                                Figure 1.3: Advanced options menu




148   1.4     Graphical installation guide

149   The full graphical installation mode is selected as the default mode when booting
150   the Bayanihan Linux CDROM Installer. This is the easiest mode mainly because
151   most of the available options have already been preselected. Figures 1.4 to 1.20
152   shows the installation steps.

                                                                                       11
Bayanihan Linux 5                    Chapter 1. Installing the Bayanihan Linux OS


153   For low memory machines (less than 128 MB of RAM ) you may want to select
154   the Text-mode install option. The installer will also automatically switch to this
155   mode when it detects low physical memory.
156   The installer will prompt for partitioning information in all modes. The term
157   partition refers to the act of dividing the harddisk so that the divisions can be
158   used by the operating system for different tasks or data. For instance, if you
159   accept all the default options in the partitioning stage, the installer will create
160   two partitions by default. One for the / or root partition and another for the
161   swap partition. The root partition will be used for storing files the operating
162   system needs as well as users files. The swap partition will be used for temporary
163   storage of data by the operating system’s processes.




      Figure 1.4: STEP 1. Dis-
      plays the available options for
      the installer. To proceed, press
      the Enter key on the high-
      lighted entry. Several screens
      will appear while the installer
      initializes.




      Figure 1.5: Network config-
      uration. The installer will at-
      tempt to configure your net-
      work connections.




      12
Chapter 1. Installing the Bayanihan Linux OS             Bayanihan Linux 5




                                               Figure 1.6: STEP 2. Only ap-
                                               pears when automatic network
                                               configuration has failed. Select
                                               the option Do not configure the
                                               network at this time. The net-
                                               work connection will need to be
                                               configured upon logging in.




                                               Figure 1.7: STEP 3. Prompts
                                               for a hostname for the com-
                                               puter. You can accept the de-
                                               fault and then press Enter or
                                               you can type in any single-word
                                               unique name to identify this
                                               machine on the network. Use
                                               small letters.




                                               Figure 1.8: STEP 4. Only ap-
                                               pears when automatic network
                                               configuration has been success-
                                               ful. Prompts for a domain
                                               name. You can safely accept
                                               the default.




                                                                           13
Bayanihan Linux 5                   Chapter 1. Installing the Bayanihan Linux OS




Figure 1.9: STEP 5. The de-
fault is to use the Guided - use
entire harddisk option. Click
Continue to proceed to the next
screen.




Figure 1.10: STEP 6. Select
the harddisk where the system
will be installed.




Figure 1.11: STEP 7. Select a
partitioning option. There are
3 predefined configurations to
choose from. Selecting the de-
fault will create two partitions,
one for the /root and one for
the swap partitions.




14
Chapter 1. Installing the Bayanihan Linux OS              Bayanihan Linux 5




                                               Figure 1.12: STEP 8. Click
                                               Continue to confirm the infor-
                                               mation on partitioning changes
                                               and proceed to the next screen.




                                               Figure 1.13: STEP 9. Select
                                               Yes to continue. NOTE: Se-
                                               lecting Continue will delete all
                                               data in your harddisk. The
                                               new partition information will
                                               be written to the harddisk and
                                               the installer will format the
                                               new partitions.




                                               Figure 1.14: STEP 10. Type-
                                               in your administrator or “root”
                                               password here. The root ac-
                                               count is used to modify system-
                                               wide settings.




                                                                            15
Bayanihan Linux 5                 Chapter 1. Installing the Bayanihan Linux OS




Figure 1.15: STEP 11. Type
in your name. This informa-
tion will be used to generate
a suggested username for the
next step.




Figure 1.16: STEP 12. Type-
in your preferred username if
you skipped the previous step
otherwise accept the suggested
username. An account with
this username will be created
near the end of the installa-
tion process.     You will use
this account to login. This
is a regular, non-administrator
account.




Figure 1.17: STEP 13. Type
in your preferred password for
the account created in the pre-
ceeding screen. Use the user-
name you entered in STEP 12
and the password here to login
at screen shown in Figure 1.23




16
Chapter 1. Installing the Bayanihan Linux OS              Bayanihan Linux 5




                                               Figure 1.18: The system will
                                               now proceed with the installa-
                                               tion. This will take between
                                               30 minutes to 1 hour depending
                                               on the speed of your machine.




                                               Figure 1.19: STEP 14. The
                                               installer will attempt to de-
                                               tect other operating systems
                                               installed in the harddisk. You
                                               can safely select Yes here and
                                               click Continue to proceed to the
                                               next screen.




                                               Figure 1.20: STEP 15. This
                                               is the end of the installation
                                               process. Remove the CD and
                                               click Continue to reboot into
                                               your new Bayanihan Linux 5
                                               system.




                                                                            17
Bayanihan Linux 5                         Chapter 1. Installing the Bayanihan Linux OS


164   1.5       First Look

165   After rebooting/booting your computer, the first screen you will see is the GrUB2
166   menu show in Figure 1.21 which displays the available boot options for this system.




                                         Figure 1.21: GrUB Menu




               Figure 1.22: Splash screen                  Figure 1.23: Login screen



           2 Grand   Unified Bootloader


      18
Chapter 1. Installing the Bayanihan Linux OS               Bayanihan Linux 5




    Figure 1.24: Welcome greeting         Figure 1.25: The Bayanihan Desktop




                       Figure 1.26: Map of the Desktop


                                                                           19
Bayanihan Linux 5   Chapter 1. Installing the Bayanihan Linux OS




20
167


168                                                                        CHAPTER

169                                                                          TWO
170




171                                                          Desktop Overview



172   Chapter Author : Rage Callao
173


174   Finding your way around a typical Linux desktop can be a challenging experience
175   especially if you come from a Windows background. However once you get passed
176   the initial hurdles, it becomes quite easy to do things. Many of the desktop
177   components behave and function in a very familiar way and almost everything
178   can be customized to your heart’s content.




179   2.1     From power on to desktop

180   The boot process begins when you power on your computer. The first screen
181   to appear after the typical BIOS messages and warnings is the GrUB menu.
182   GrUB is an acronym for Grand Unified Bootloader. Bayanihan Linux is the default
183   operating system selected. You can press Enter or wait a few seconds indicated
184   by the timer at the bottom of the screen and the system will boot to the selected
185   operating system. The process of booting up your computer begins with the
186   kernel, the core of the operating system, being loaded into memory. System
187   components are detected, filesystems are mounted and the desktop initialized
188   for use. Afterwards you are presented with a graphical login screen. Type in the
189   username and password you provided during installation and you will be presented
190   with the desktop environment. This should just take a few minutes.

                                             21
Bayanihan Linux 5                                    Chapter 2. Desktop Overview


191   2.2     Desktop components

192   The desktop is made up of a these components:

193   Menu button contains the shortcuts to run the various programs bundled with
194      Bayanihan Linux
195   Taskbar displays links to windows that are currently open and holds various
196       other utilities such as applets (pager, quick shortcuts, systray)
197   System tray contains running applications that are frequently accessed
198   Desktop where icons to frequently accessed applications or folders can be placed
199       and where windows of various applications appear when opened

200   After logging in, you are presented with the desktop shown below displaying the
201   components discussed the preceeding section:




202




203   2.3     Menu button

204   The Menu contains links to graphical applications and are conveniently catego-
205   rized according to general use. For instance, all the graphical applications that
206   you install that need to connect to the internet can be accessed from the Internet

      22
Chapter 2. Desktop Overview                                   Bayanihan Linux 5


207   category. This category includes web browsers, email clients, chat clients, VOIP
208   and videoconferencing software.
209   This category also includes links to various system utilities such as the Help man-
210   ual, system settings, system folders and the Control Center where you can set your
211   preferences.
212   You will also find quick shortcuts to run applications, search for files and folders
213   and logoff from the desktop.


214   Menu Editor

215   Most graphical applications when installed will place a shortcut in the Menu. You
216   can also manually add entries and change the arrangement of the various entries
217   using the Menu Editor.
218   To run this application, simply click on the link found in the Menu:


219                        → Settings (in All Applications) → Menu Editor


220   Menu updating tool

221   This tool can search your system for common applications and update the Menu.



222   2.4     Taskbar

223   The taskbar is the horizontal area at the bottom of the screen that contains links
224   to open windows, the Menu, clock and systray as well as various other utilities.
225   To configure the taskbar, right-click on an empty area on the taskbar and click
226   Unlock panels. Right-click on an empty area again and click Configure Panel. A
227   window will appear containing several categories. Click on the Help for more
228   information on configuring this component.
229   Many applets (small applications that reside in the taskbar) can also be placed
230   here allowing for more customized control of system. To access these optional
231   applets, right-click on an empty area and click Add applet to panel. To remove
232   and applet, right-click on an empty area and select Remove from Panel → Applet.
233   You can also add icons for your frequently used applications by selecting Add
234   Application to Panel.

                                                                                      23
Bayanihan Linux 5                                  Chapter 2. Desktop Overview


235   2.5     System tray

236   Some frequently used applications place an icon here for quick access. This ap-
237   plications typically run in the background




      24
238


239                                                                          CHAPTER

240                                                                        THREE
241




242                                        Working with Files and Folders



243   Chapter Author : Aileen Cruzado

244   After having been able to successfully install Bayanihan Linux in your system,
245   what now should you expect from it?
246   When moving from Windows to Linux, you must first understand how Linux
247   view files varies from how Windows handle files. In this chapter, you will have an
248   overview of the Linux file system and how important it is to make Linux work.
249   Here, you will learn that under Linux, everything is a file[4]. In addition to data
250   and executable files, Linux treat folders and even the various components of your
251   computer as a file. This means that there are files that represent your keyboard,
252   terminal, printer, CD-ROM, and even your system’s RAM. These special files are
253   called devices. When Linux needs to talk to physical hardware device, it does so
254   by simply reading from or writing to one of these special files1 . In this chapter,
255   you will be introduced to elementary concepts such as basics of creating new files,
256   changing ownerships and permissions and the principal method of accessing them
257   via the Konqueror file manager.
258   Additionally, you will learn about the fundamentals of configuring file associations;
259   working at the command line level; and the Linux Filesystem Heirarchy.




         1 http://lowfatlinux.com/linux-files.html



                                              25
Bayanihan Linux 5                        Chapter 3. Working with Files and Folders


260   3.1     Folders and Paths

261   In UNIX and Linux all folders are arranged in a simple inverted tree structure
262   descending and branching down from a single top level folder[5]. This means that
263   you can get from any folder to any other by going “up” until you reach a common
264   point then “down” through the appropriate subfolders until you reach your target.
265   The position of any file or folder in the tree can be described by its “path”, which
266   is a simple list of the folders you would have to descend through to get to the
267   target folder or file. For example, /home/aileen is the subfolder /aileen of the
268   subfolder /home of the top level folder, and /home/aileen/words.txt is the file
269   words.txt in that subfolder. The leading “/” in these paths represents the top
270   level folder.
271   Every folder accessible by your system including those on other hard disk par-
272   titions, your floppy and CD-ROM will appear in the tree descending from “/”,
273   their exact paths will depend on how your system was set up. See Section 3.3.
274   Every user on a UNIX / Linux system has their own “home” folder to hold their
275   personal files and settings; for example /home/russel and /home/mariesonn.
276   The tilde symbol (∼) is often used to represent the user’s home folder, so that
277   ∼/letter.txt refers to the file letter.txt in my /home folder.
278   Note that the term “directory” is often used instead of “folder”.



279   3.2     Introduction to Konqueror

280   All operating systems come with a so-called “file manager” which is an application
281   that helps you view files and folders as well as navigate graphically through the
282   entire filesystem tree. The file manager bundled with Bayanihan Linux is called
283   Konqueror.
284   To run this application, simply click on the link found in the Menu. You can also
285   click on the Home icon your desktop or the taskbar.

286                                   → Home – Personal Files

287   From help:/konqueror/index.html:

288         Konqueror is an advanced file manager for the K Desktop Environ-
289         ment, providing file management functions ranging from simple cut/copy
290         and paste operations to advanced local and remote network file brows-
291         ing. Folder contents can be displayed in a variety of text and icon view

      26
Chapter 3. Working with Files and Folders                    Bayanihan Linux 5




                                                  Figure 3.1: Icon View. Displays the
                                                  name and a suitable icon for each file
                                                  or folder.




                                                  Figure 3.2: MultiColumn View.
                                                  Similar to Icon View except that the
                                                  display is neatly formatted into regu-
                                                  lar columns.




292        modes, which can include thumbnail preview images of file contents.
293        File and folder properties can easily be examined and changed and
294        applications launched with a simple click of the left mouse button



295   View Modes

296   In File Manager mode, Konqueror shows you what files and subfolders are held
297   in a folder, and can provide you with some information about them.
298   The “path” of the folder you are looking at is shown in the Titlebar, and also in
299   the Location Toolbar, prefixed with “file:” to indicate that the folder is part of
300   your computer’s normal file system. For example “file:/home/aileen”.
301   The way that Konqueror displays the files and folders depends mainly on your
302   choice of View Mode. This can be selected from the View → View Mode sub
303   menu, which gives you the following options: Icon View, MultiColumn View,
304   Tree View, Info List View, Detailed List View and Text View as shown
305   in Figures 2.1 to 2.6.

                                                                                     27
Bayanihan Linux 5                          Chapter 3. Working with Files and Folders




Figure 3.3: Tree View. This option
is useful for navigating through the
folder tree below the current folder.
This display is similar to Detailed List
View except that the start of each line
will show a small “+” sign in a box
if the item is a folder. Left clicking
on the box will expand the display to
show the contents of the folder.




Figure 3.4: Info List View. Simi-
lar to Detailed List View except that,
where applicable, it shows the number
of lines, words and characters and file
format for each file.




Figure 3.5: Detailed List View.
Displays each file or folder on a sep-
arate line, as a small icon followed
by the file or folder name followed
by information about the item. The
amount of information shown is con-
trolled by the View → Show Details
submenu settings.




28
Chapter 3. Working with Files and Folders                    Bayanihan Linux 5




                                                  Figure 3.6: Text View. Similar to
                                                  Detailed List View except thaticons
                                                  are not shown and the first character
                                                  in each line will be “/” if the item is
                                                  a folder.




306   The default file icons shown in Icon View and MultiColumn View modes can be
307   replaced by small preview images of the file contents. See File Previews on 29
308   on for more details.


309   File Tip Info

310   Checking the Show file tips box in the Behavior page of the Konqueror Configura-
311   tion dialog causes a small pop up information window to appear when the mouse
312   pointer is hovered over a file or folder name or icon in Icon View or MultiColumn
313   View mode.
314   If the Show previews... in file tips checkbox is checked the pop up window will
315   also show a small image of the file contents as shown in Figure 2.7.


316   File Previews

317   Selecting View → Preview from the Menubar will bring up a sub menu that lets
318   you enable file previews for certain types of file.
319   Generally this means that the file’s icon will be replaced by a small image showing
320   the file contents. If file preview is enabled for Sound Files the file will be played
321   whenever the mouse cursor is hovering over the file name or icon.
322   Note that file previews are only available in Icon View and MultiColumn View
323   modes.
324   Because Konqueror has to read much more data than just the file name details
325   to generate a preview, file previews may not be appropriate when viewing files
326   on a floppy or from a remote system. The Previews page of the File Manager
327   Configuration dialog allows you to disable file previews for protocols such as ftp
328   where reading the extra data would take too long.

                                                                                      29
Bayanihan Linux 5                        Chapter 3. Working with Files and Folders




      Figure 3.7: To preview a file, hold the mouse cursor over the name of the file for
      about a second. A popup window will appear showing the contents of the file and
      useful information like file size and which user owns the file.


329   3.3       Navigation

330   To get to a file with Konqueror you first need to navigate through the folder tree
331   to find the folder containing that file.
332   To move between folders you can simply step up and down the tree:


333        • To descend into a subfolder, left click on its name or icon – or if you have
334          already “selected” it (see below) – then just press Enter.


335        • To go up the folder tree, you can click on the Up button in the Toolbar, use
336          Alt+Up Arrow, or use the Menubar Go → Up option.


337   To “select” a file or folder in the displayed folder without opening it in any way
338   use the up and down arrow keys to move through the items. The selected item
339   will be highlighted and some information about it will be displayed in the Status
340   Bar.
341   Setting the View Mode to Tree View can help you locate folders in the tree below
342   the current folder; in this mode each folder is shown with a small box at the left.

      30
Chapter 3. Working with Files and Folders                     Bayanihan Linux 5


343   If the box contains a + sign, left clicking on the box (not on the folder name or
344   icon) will display a sub tree showing files and subfolders contained in that folder.
345   The small box will then change to show a sign. Left click on that to collapse the
346   sub tree. Once you have found the folder you are looking for, left click on the
347   folder name or icon to open it.
348   The Navigation Panel can also help you find your way around the file system.
349   You can go directly to any folder by typing its path into the Location Toolbar
350   window or into the dialog box invoked by the Menubar Location → Open Location
351   item or by Ctrl+ O. Konqueror’s Text Completion feature may be useful when
352   you do this. Don’t forget that in Linux / UNIX file and folder names are case
353   sensitive.
354   When you have moved to a new folder you can go back to your previous choice by
355   using the Toolbar Back button, the Menubar Go → Back item, or Alt+Left Arrow.
356   Once you have gone back you can go forward. Use the Toolbar Forward button,
357   the Menubar Go → Forward item or Alt+Right Arrow.
358   Alternatively, you can also choose to enter the parent folder by clicking on the
359   Toolbar Up, the Go → Up item, or with Alt+Up Arrow.



360   Tip. Holding the left mouse button pressed while the mouse pointer is over the
361        Toolbar Up, Back or Forward buttons brings up a menu of recently visited
362        locations.




363   Finding Files and Folders

364   If you don’t know or can’t remember where a file or folder is within your system,
365   then use the Toolbar Find File button or the Menubar Tools → Find File... option.
366   This will embed the file finder application KFind into Konqueror’s window.



367   Note. If the name of a file or folder begins with a period or a dot, then it is a
368       “hidden” file or folder, and will not normally be shown by Konqueror. To
369       see files or folders, use the Menubar View → Show Hidden Files option.


370              Another reason Konqueror may not show the file or folder you
371              are looking for is that you may have the View Filter plugin set to
372              display only certain types of file.

                                                                                      31
Bayanihan Linux 5                        Chapter 3. Working with Files and Folders


373   Floppy and CD-ROM Drives

374   Any floppy disk, CD drive or other hard disk partition that you have on your
375   system will usually appear in the / , /media, /mnt or /auto folder, having a path
376   something like /mnt/floppy or /cdrom. The details will depend on how your
377   system was set up.
378   UNIX / Linux requires that you mount a floppy disk or CD-ROM when you have
379   inserted it into the drive, and mount other hard disk partitions when you want
380   to access them. You also need to unmount a floppy disk or CD-ROM before
381   removing it to register that it is no longer available.
382   How you do this will depend on how your system:

383        • You may have an Automount facility, in which case you don’t have to bother
384          about explicitly mounting and unmounting, although you may find that the
385          CD-ROM occasionally starts up by itself for no apparent reason.
386        • You may have Floppy, CD-ROM and hard disk icons on your desktop, in
387          which case, left mouse button click on the icon to mount it. Doing this
388          should also bring up a balloon notification, a Removable Device icon and
389          a window asking you what you want to do with the mounted device. To
390          unmount, right click on the icon and choose the Safely Remove item and a
391          balloon notification will appear to indicate that the device has been safely
392          removed. The Removable Device icon will then turn gray to indicate inac-
393          tivity. See Figure 3.8.
394        • Or you can do it the traditional way by typing into a text console window:
395               mount /mnt/floppy to mount, for example, the floppy drive; and
396               umount /mnt/floppy to unmount it (umount not unmount)


397   Note. Rather than having to open a text console to type the mount or umount
398       commands, you may prefer to use Konqueror’s Tools → Execute Shell Com-
399       mand (Ctrl+E) feature.



400   3.4      Deleting Files and Folders

401   Konqueror gives you two ways to dispose of an unwanted file or folder:

402        • You can move it to the Trash folder, which is the safest method as you can
403          get it back if you realize that you have made a mistake.

      32
Chapter 3. Working with Files and Folders                      Bayanihan Linux 5




                                                  Figure 3.8: This illustration shows
                                                  that apart from the change of color,
                                                  a small arrow is visible beside the Re-
                                                  movable Device Icon when it is Ac-
                                                  tive and disappearswhen it is Inac-
                                                  tive




404      • You can just plain Delete it, which removes the entry from the folder and
405        adds the disk area occupied by the file(s) to the system’s list of free disk
406        areas, in the same way as the rm command.


407   The simplest way to remove a file or folder is to position the mouse pointer over
408   its name or icon and press the right mouse button, which will bring up a menu
409   containing the options Move to Trash and Delete.
410   Or, if you have selected the item, the Menubar Edit menu will give you the choice
411   of “Move to Trash” and ‘‘Delete” options.
412   Del will move the selected item or items to Trash. Shift+Del will really, truly and
413   irrevocably delete the selected item or items.


414   Note. You won’t be able to remove a file or folder if you don’t have the necessary
415       permissions; see Section 3.8 for further details.



416   3.5     Moving and Copying

417   To copy a file or subfolder between folders you can:


418      • Position the mouse pointer over its name or icon and hold down the right
419        mouse button, which will bring up a menu containing the Copy option.
420        Choose that.
421         Or if the item is selected you can use the Copy button on the Toolbar or the
422         Menubar Edit → Copy item, or the Ctrl+C shortcut key combination. You
423         can also select multiple files or folders to copy/move as well.

                                                                                        33
Bayanihan Linux 5                        Chapter 3. Working with Files and Folders


424        • Navigate to the folder you want to copy the item into then Paste the item
425          into the new folder by using the Toolbar Paste button or the Menubar Edit
426          → Paste option or the Ctrl+V shortcut, or by moving the mouse pointer
427          to a clear area of the window and holding the right mouse button down to
428          bring up a menu containing the Paste option.


429   Moving a file or subfolder between folders can be done in the same way as copying,
430   except that you choose the Cut option or Ctrl+X instead of Copy. The item that
431   you have Cut will be removed from the original folder when you do the Paste into
432   the new folder.
433   You can also copy or move selected item(s) to another folder by using Edit →
434   Copy Files (F7) or Edit → Move docFiles (F8), or by selecting Copy To or Move To
435   from the drop down menu you get when you right click on an file or folder name
436   in the File Manager window.


437   Note. You may not be able to copy or move a file or folder if you don’t have the
438       necessary permissions. See Section 3.8 for further details.


439   Using Drag ’n Drop

440   Konqueror also supports Drag and Drop copying and moving of files and folders.
441   You can do this by having two instances of Konqueror, one showing the folder
442   you want to copy from, the other showing the target folder. Position the mouse
443   pointer over the item you wish to copy or move, then, holding the left mouse
444   button pressed, “drag” it to a clear space in the target folder. Release the button
445   and you will be presented with a menu choice of Copy or Move. Take care to
446   “drop” the item into an empty area of the target folder view - dropping it on top
447   of another file name or icon can cause problems.
448   You can also set up Konqueror to show more than one folder within its window
449   and drag & drop between them.
450   To be able to show different folders in each view they should not be linked; the
451   little boxes at the bottom right of each view should be empty.
452   The active view, that is the one whose path is shown in the Location Toolbar
453   and which responds to navigation and Menubar commands, is shown by the little
454   green light in the bottom left corner. To make a view active, left click on an
455   empty area of the view or on its Status Bar.
456   To remove an active view from Konqueror’s window use the Ctrl+Shift+R short-
457   cut, or the Menubar Window → Remove Active View option, or right mouse button

      34
Chapter 3. Working with Files and Folders                     Bayanihan Linux 5




      Figure 3.9: This screenshot illustrates the use of the Menubar Window → Split
      View Left/Right option, also available with the shortcut Ctrl+Shift+L, to split the
      main Konqueror window into two views, each showing the contents of a different
      folder.

458   click on the Status Bar and choose the Remove Active View option from the re-
459   sulting menu.
460   If you use Konqueror tabs, you can drag and drop between tabs by dragging the
461   file to the tab label, without letting go yet. The destination tab will pop to the
462   front, allowing you to continue dragging and then drop the file.


463   Duplicate File Names

464   If you try to paste a file into a folder that already contains a file with the same
465   name, Konqueror will pop up a dialog box warning you that the file already exists.
466   You can then choose to:

467      • Overwrite the old file with the newly copied one. The Overwrite All button
468        can be used if you have copied multiple items.
469      • Cancel the paste operation by pressing the Skip or Skip All button.
470      • Give the file that is being copied a different name. You can do this by typing
471        a new name into the text entry box or get Konqueror to Propose one. When
472        you have done this press, the Rename button.

                                                                                      35
Bayanihan Linux 5                        Chapter 3. Working with Files and Folders


473   3.6       Selecting Multiple Files

474   You sometimes want to delete, copy or move a number of files that are similar in
475   some way. For example, you may wish to move all of the .png graphics files from
476   one folder to another. Konqueror makes this easy by letting you select multiple
477   files based on similarities in their file names.
478   Use the Menubar Edit → Selection → Select... item or the shortcut Ctrl++. This
479   brings up a little dialog box in which you enter a filename containing the wildcard
480   characters *, which matches any number of characters, and ? which matches a
481   single character. Press OK and Konqueror will highlight all files with matching
482   names. For example;


483        • flag*.png will select all filenanes starting with the letters “flag” and end-
484          ing with “.png”.

485        • memo?.txt will select memo1.txt and memo9.txt but not memo99.txt.


486   When you have selected a range of files, you can narrow down the selection by
487   uing the Menubar Edit → Unselect... option or Ctrl+- to specify which of the
488   selected files should be removed from the selection.
489   Use Ctrl+U or the Menubar Edit → Unselect All option or just left mouse button
490   click on a clear area of the view to cancel the selection.
491   You can even invert the selection: that is, deselect all selected files and select
492   those that were previously unselected. Use the Menubar Edit → Invert Selection
493   option or Ctrl+* to do this.
494   You can also select multiple files and folders by holding the Ctrl button while you
495   click on each individual file or folder. This enables you to then move or copy
496   multiple files and folders to a different location the same method above.
497   A number of useful shortcut keys can be used in list, tree and text view modes:


498          Space. Toggle the current selection.


499          Insert. Toggle the current selection and move down to the next item.


500          Ctrl+Up Arrow, Ctrl+Down Arrow, Ctrl+Home, Ctrl+End,
501          Ctrl+Page Up, Ctrl+Page Down. Move the selection, toggling
502          the selection of everything on the way.

      36
Chapter 3. Working with Files and Folders                      Bayanihan Linux 5


503         Shift+Up Arrow, Shift+Down Arrow, Shift+Home,Shift+End,
504         Shift+Page Up, Shift+Page Down. Deselect everything, then
505         move the selection, selecting everything on the way.

506   Once you have selected the right files then the normal delete, copy or move com-
507   mands will act on all of the selected files at once.

508   Note. Depending on your keyboard type and locale, you may find that the
509       Ctrl++, Ctrl+- and Ctrl+* shortcuts only work with the Numeric keypad
510       +, - and * keys.



511   3.7     Create New

512   When Konqueror is in File Manager mode, picking Create New from the Edit menu
513   or from the context menu you get by right mouse button clicking on a free area
514   in a folder view gives you a submenu letting you create any of the following in
515   the current folder:

516   File → Link To Application...

517   This option is most useful if you want to create an icon that will open a particular
518   application. It opens a dialog box with three tabbed pages. The first, General, is
519   where you choose an icon and the text that will appear with it. The second page,
520   Permissions, lets you select who can use or modify the icon. In the Application page
521   you must enter the Command that will run the application. For example, kwrite
522   to start up the KWrite text editor. kwrite /home/aileen/todo.txt would open
523   the file /home/aileen/todo.txt in KWrite. Advanced options such as the file
524   types which the application can open are also available from this page.
525   To make the application icon appear on your desktop, create the link in your
526   /Desktop folder (this may be called something slightly different depending on
527   how KDE was installed on your system) or get to the Create New... sub menu by
528   right clicking on a free area of the desktop instead of within Konqueror’s window.
529   If you have a lot of specialized application links and don’t want to clutter up
530   the desktop, then why not create them in your Applications folder. You can
531   get there in Konqueror by choosing Go → Applications. Then create a sin-
532   gle icon on your desktop to open your Applications folder, which is usually in
533   /.kde/share/applnk.
534   To put an application link icon into the panel, first create it in the Applications
535   folder then drag the icon onto a clear area of the panel.

                                                                                       37
Bayanihan Linux 5                        Chapter 3. Working with Files and Folders


536   File → Link To Location (URL)...

537   This lets you create an icon to open Konqueror at a particular folder or web page.
538   As with Link To Application... you can make the application icon appear on your
539   desktop by creating the link in your /Desktop folder or going to the Create New...
540   sub menu by right clicking on a free area of the desktop. When you first create it
541   the text shown with the icon will be the full path or URL. You can change it by
542   right clicking on the icon, selecting Properties... and entering the preferred text
543   in the General tab page.

544   Device → Floppy Device...

545   Use this option to create an icon that will mount a floppy disk and open an
546   instance of Konqueror showing the disk’s contents. To unmount the disk when
547   you have finished with it right click on the icon and select Unmount. In practice
548   it doesn’t have to be a floppy disk but can be any hard disk or partition on your
549   system that is not normally mounted.

550        Hard Disk. This option is similar to Floppy Device... but for a hard disk
551        drive or partition.

552        CD/DVD-ROM Device. This option is similar to Floppy Device... but
553        for a CD or DVD drive.

554        Folder. An easy way of creating a new (sub)folder.

555        Text File. Use this to create an ordinary, empty, text file. A dialog box
556        will be opened for you to enter the name of your new file.

557        HTML File. Creates a skeleton HTML source file. When you type the
558        new file’s name into the dialog box it is probably best to give it a .html
559        extension to avoid confusion.

560        Presentation Document. Creates a skeleton OpenOffice.org Impress doc-
561        ument. Give its name a .odp extension.

562        Text Document. Creates a skeleton OpenOffice.org Writer document us-
563        ing the standard Writer style template. Give its name a .odt extension.

564        Spread Sheet Document. Use this to create a new OpenOffice.org Calc
565        file, and name it with a .ods extension.

      38
Chapter 3. Working with Files and Folders                      Bayanihan Linux 5


566         Illustration Document. Creates a new OpenOffice.org Draw document.
567         Name it with the extension .odg.


568   3.8     Changing Names and Permissions

569   The two easiest ways to change the name of a file or folder is to either right click
570   on it and select Rename, or select the file or folder and then press the F2 button.
571   To change the name or permissions of a file or folder, right click on its name or
572   icon and select the Properties... item, or if you have “selected” the file or folder,
573   then you can use the Menubar Edit → Properties option.
574   This will bring up the Properties dialog box with two tabbed pages:

575      • General, which gives you some information about the item and lets you
576        change its name and, for a folder, the associated icon.
577      • Permissions, which shows you the item’s ownership and access permissions
578        and lets you change the permissions.


579   Copy and Rename

580   If you want to make a copy of an existing file with a different name – perhaps as a
581   backup – in the same folder as the original file, do a normal Copy then when you
582   Paste it a dialog box will pop up complaining that the file already exists. Just
583   type the new name into the dialog’s text box and press the Rename button (or
584   if you are feeling lazy pressing the Propose button will generate a new name for
585   you).


586   Super User Mode

587   If you are running as a normal user and try to access files outside of your own
588   /home folder you will often be prevented from doing so and get an error message
589   such as Access Denied.
590   To access these files you need to be logged in as the system administrator, often
591   known as the Super User or root.
592   Rather than logging out then in again, you can launch Konqueror from the Menu
593   in Super User mode by selecting System → File Manager - Super User Mode. You
594   will be asked for the root login password but as long as you can provide that
595   Konqueror will be started up with full access privileges to all files on your system.

                                                                                       39
Bayanihan Linux 5                          Chapter 3. Working with Files and Folders


596    Warning! Take care. As Super User (root), you have complete control of your
597       system, and a wrong command can easily do irrevocable damage.
598               Also, connecting to the internet as root is an extremely bad idea,
599               as it seriously increases your vulnerability to malicious hacking.



600   3.9       Configuring File Association

601   KDE provides many applications which can open many different types of file.
602   Most of the time, the defaults will work with no problems, but Konqueror provides
603   a powerful system to allow you to change the applications used to open each file
604   type. For more details, choose the Settings → Configure Konqueror... menu item,
605   select File Associations in the configuration dialog, and click on Help.



606   3.10        At the Command Line

607   Although Konqueror is a very powerful and flexible GUI file manager, there are
608   occasions when the experienced Linux / UNIX user wants to get down to the
609   basics and work at the text command line level.
610   You can, of course, open an instance of Konsole, perhaps with Konqueror’s
611   Menubar Tools → Open Terminal option or with Ctrl+T.
612   If you only want to launch a program or view a URL, the Tools → Run Command
613   (Alt+F2) option may be easier.
614   Tools → Execute Shell Command... (Ctrl+E) opens a small command line dialog
615   window where you can enter a shell command such as ps -ax | grep kdeinit .
616   Note that it does not support full featured terminal control characters, so appli-
617   cations such as top and less will not work properly, but it is available immediately
618   without the delay involved in starting Konsole.
619   For more complex operations, Konqueror has another nice feature: the Menubar
620   Window → Show Terminal Emulator option, which opens up a terminal window
621   as a new view within Konqueror (See Figure 2.10). As long as the link icon is
622   visible at the bottom right corner of each view, the terminal will follow any folder
623   changes you make in the normal file manager view2 .




           2 http://docs.kde.org/stable/en/kdebase-apps/konqueror/index.html



      40
Chapter 3. Working with Files and Folders                Bayanihan Linux 5




Figure 3.10: The Terminal Emulator option opens up a terminal window as a new
view within Konqueror




                                                                          41
Bayanihan Linux 5                             Chapter 3. Working with Files and Folders


624   3.11        Linux Filesystem Hierarchy

625   The first thing that most new users shifting from Windows will find confusing is
626   navigating the Linux filesystem[6]. The Linux filesystem does things a lot more
627   differently than the Windows filesystem3 . To put it simply, it can be visualized as
628   a tree with its roots and all[3]. At the top of the hierarchy is invariably the root
629   path which is represented by ‘‘/’’. All other directories are created beneath this
630   root path. And each of the sub directories have a specific purpose. For example,
631   ‘‘/etc’’ contain the configuration files, the ‘‘/opt’’ directory is used to install
632   third party software, ‘‘/boot’’ contain the grub files and the Linux kernel and
633   so on4 .
634   In the Filesystem Hierarchy Standard (FHS), all files and directories appear under
635   the root directory ‘‘/’’, even if they are stored on different physical devices[2].
636   Note however that some of these directories may or may not be present on a UNIX
637   system depending on whether certain subsystems, such as the X Window System,
638   are installed.
639   The majority of these directories exist in all UNIX operating systems and are
640   generally used in much the same way; however, the descriptions here are those
641   used specifically for the FHS, and are not considered authoritative for platforms
642   other than Linux5 .

643    / This is the base, or root, of the file system. Everything in the Linux system is
644        housed in this directory[1].

645    /bin This directory contains a number of essential commands that are available
646        to unprivileged users (such as cat, chmod, chown, etc). The /bin directory
647        also houses the shells (such as bash).

648    /boot This directory contains everything necessary for the boot process. With-
649       out the /boot directory, your machine would not be able to boot up.

650    /dev This directory contains all of the special and device files. With Linux all
651       devices and drives have a name. Hard drives tend be labeled as hda, hdb,
652       hdc. Special devices such as external usb devices can be labeled as sda,
653       sdb, sdc. If you look in the /dev directory you will see quite a few files that
654       can be associated with devices. Most of the devices found here are either
655       block or character devices. Block devices hold data (such as a hard drive)
656       and character devices transmit data (such as a mouse).
           3 http://www.freeos.com/articles/3102/
           4 http://linuxhelp.blogspot.com/2008/05/linux-file-system-hierarchy-fun-easy.

      html
           5 http://en.wikipedia.org/wiki/Filesystem_Hierarchy_Standard



      42
Chapter 3. Working with Files and Folders                      Bayanihan Linux 5


657    /etc This is a very special directory that contains numerous configuration files
658        and directories. This directory will contain the X configurations, Apache,
659        Samba, the init system, etc. The /etc directory also houses the sources for
660        package management systems like apt and yum. One of the most important
661        subdirectoris in /etc is the /etc/init.d.

662    /home This is where all user data is housed. Each user on the system will
663       have their own subdirectory within /home. All user data and user-specific
664       configuration files are saved here.

665    /lib This is where all kernel modules needed for system boot libraries that are
666        required by root system commands (commands found in /bin and /sbin.)

667    /lost+found If your system crashes or is shut down improperly any lost data
668        will be stored here. During a recovery boot the fsck application will attempt
669        to recover corrupt files found here.

670    /media This is where all external media (or extra internal drives) is mounted.
671       If you make or edit entries in the /etc/fstab file you will point devices
672       (such as /dev/sda to directories withing /media.)

673    /mnt This is another directory where external (and internal) drives and devices
674       are mounted. This is a holdover to older school thought. Most modern
675       distributions are moving to the /media directory.

676    /opt This is a directory that can be used for installing applications that are out-
677       side of the default installation. When you install applications here they can
678       be used system wide by all users. Only the root user can install applications
679       here.

680    /proc This is a special directory that is actually a virtual filesystem. The /proc
681        directory acts as a process information center for the kernel.

682    /root This is the root users home directory.

683    /sbin This is where all system maintenance/administration executable files are
684        stored. These commands differ from those in /usr/sbin in that they are
685        system commands used for critical system administration and maintenance
686        whereas /usr/sbin are non-critical tasks such as user administration, net-
687        work administration, etc.

                                                                                       43
Bayanihan Linux 5                          Chapter 3. Working with Files and Folders


688    /usr This is one of the largest directories on your system as it contains all user-
689        executable binaries as well as the libraries, documentation, and header files
690        for these executables. One of the most important subdirectories is /usr/bin
691        where all user application executables are stored.

692    /var This directory contains all variable data such as log files. On a server
693        environment the document root directory of most servers will be found here
694        (/var/www and /var/ftp are examples.)

695    /srv This directory can contain the services (such as www) directory in some
696        distributions.

697    /tmp This directory, as you would expect, contains temporary files that are
698       stored as needed. Many files you will find here are lock files created by
699       applications. Do not remove anything from this directory as the cron system
700       has a job specifically created for the removal of these files6 .




           6 http://www.ghacks.net/2008/12/11/get-to-know-linux-file-system-hierarchy/



      44
Chapter 3. Working with Files and Folders                Bayanihan Linux 5




                                                                               7


Figure 3.11: The diagram represents (part of) a Linux file system know as
Filesystem Hierarchy Standard[7]. A line from one node to a node on its
right indicates containment. For example, the student directory is contained
within the home directory.




                                                                         45
Bayanihan Linux 5   Chapter 3. Working with Files and Folders




46
701


702                                                                          CHAPTER

703                                                                          FOUR
704




705                                               Connecting to the Internet



706   Chapter Author : Russel Baisas
707


708   Connecting to the Internet has become easier with this release of Bayanihan Linux.
709   The following sections describe the steps necessary for connecting your machine
710   to the World Wide Web using the different applications that are bundled with
711   this release.



712   4.1     Dial-Up using KPPP

713   KPPP is a graphical fronted to the ppp tools that are bundled with the system.
714   These tools allow you to connect to the Internet using a dial-up modem, a tele-
715   phone line and an account with an ISP.
716


717   To run this application, simply click on the link found at the Menu:

718                         → Internet → KPPP - Internet Dial-Up Tool

719   To begin with the setup, Click on the Configure button.
720   In Figure 4.2, Setup for an account is the first step. Click on New button to
721   configure for new account.

                                             47
Bayanihan Linux 5                           Chapter 4. Connecting to the Internet




                Figure 4.1:   KPPP Dial-Up
                Tool




                        Figure 4.2:  KPPP
                        Configuration




722   If it is your first time to run Kppp, configuration of modem and account is re-
723   quired. An option prompt box will appear to let you choose for the wizard con-
724   nection or the manual connection. Normally for first time users, it is required to
725   setup the account in manual mode because wizard connection is mainly use for
726   existing account setup. Click on Manual Setup button to start configuring
727   When the new account dialog appears, fill up the specified information for every
728   tab such as account connection details, phone number, and and others that are
729   mandatory. Refer to Figure 4.4.
730   KPPP Account Dialog Box Customize argument are pass on pppd using
731   customize pppd button.(This button is optional).




                Figure 4.3: KPPP Wizard




      48
Chapter 4. Connecting to the Internet                       Bayanihan Linux 5




                                        Figure 4.4: KPPP Account
                                        Dialog Box




                                        Figure 4.5: It is use for con-
                                        figuring your IP address, if
                                        the service provider has pro-
                                        vide you with a static IP ad-
                                        dress. you may specify it in
                                        static IP address field. The
                                        default field is dynamic IP
                                        address.




                                        Figure 4.6: For the gate-
                                        way tab, you can select on
                                        either Default Gateway or
                                        Static Gateway. If your ISP
                                        has specified an IP address
                                        you should use it as a static
                                        gateway.




                                                                           49
Bayanihan Linux 5                         Chapter 4. Connecting to the Internet




        Figure 4.7: For the DNS tab,
        input for domain name are
        given by your ISP provider.
        Automatic is the default con-
        figuration on this.




         Figure 4.8: The login script
         tab allows the user to cus-
         tomize the way of configuring
         the setup and logging in on
         kppp. If you use the script-
         based login in the Authenti-
         cation on the dial up tab you
         can specify it here.




         Figure 4.9: This option is
         use to input a certain com-
         mand to be use by the real
         user ID. It is best advise not
         to use root as a user unless
         an admin has allow the ordi-
         nary user to use it. You can
         customize your command by
         adding a script. for exam-
         ple, we can make a script for
         backup of logs during your lo-
         gin process.



50
Chapter 4. Connecting to the Internet                       Bayanihan Linux 5


                                              Figure 4.10: The purpose of
                                              accounting tabs is to check on
                                              how much bytes are sent to
                                              and from the internet while
                                              you are log in. It is best to
                                              check for this because most
                                              internet provider base their
                                              costing on how much bytes
                                              are transfered while login on
                                              the internet.



732   Configuring the Modem on KPPP

733   The Device Tab

734   After configuring the accounts for kppp, next step to configure is the modem. It
735   is require to know your modem’s specification for you to configure it on kppp.



736   The Modem tab

737     → Busy wait - This is the length of time that a modem will wait before redi-
738       aling.


739     → Modem volume - This sets the volume of the modem.


740     → Modem commands - This field is any name that will represent the command
741       on your modem but it should be relevant to the command to avoid chaos.


742     → Query modem - It provides information on your modem but still depends
743       on the resource if it has the exact information from resource. This may be
744       not as informative.


745     → Terminal - This mini terminal is use for modem configurationa and some
746       experimentation to play around with the modem.


747   The graph tab is use to customize the color of your kppp application.

                                                                                 51
Bayanihan Linux 5                        Chapter 4. Connecting to the Internet




              Figure 4.11: Modem
              Configuration




                    Figure 4.12:   The
                    Graph Tab




                    Figure 4.13:   The
                    miscellanous   tab
                    have some option
                    that    might   be
                    needed in con-
                    figuring       kppp
                    application.




52
Chapter 4. Connecting to the Internet                       Bayanihan Linux 5




                                                                 Figure 4.14:
                                                                 Knetworkmanager
                                                                 Main Window




748   4.2     LAN/WiFi connectivity with KNetworkMan-
749           ager

750   Knetworkmanager is the network application use by K desktop environment. It
751   is a user friendly gui application use for configuring and switching of network
752   environment.




753   Starting up knetworkmanager

754   To start on knetworkmanager, go to:



755                               → Setting → Network Settings



756   knetworkmanager needs to ba a root user to access it. you can press on the
757   administrator mode then a dialog box will prompt a password. Figure 4.14 and
758   Figure 4.15

                                                                                   53
Bayanihan Linux 5              Chapter 4. Connecting to the Internet




Figure 4.15:
Knetworkmanager
password to root




Figure 4.16: It displays on
what network card is de-
tected, if no network inter-
face are display, it is pos-
sible that the lan cards are
not yet install. For config-
uring lan card and wireless
card




54
Chapter 4. Connecting to the Internet    Bayanihan Linux 5




                                        Figure 4.17:
                                        Normally        when
                                        knetworkmanager
                                        detects a network, it
                                        automatically    con-
                                        figures the default
                                        gateway if the routed
                                        daemon is up and
                                        running. A Default
                                        Gateway is the node
                                        on the computer net-
                                        work that is chosen
                                        when the IP address
                                        does not belong to
                                        any other entities in
                                        the Routing Table.




                                        Figure 4.18:
                                        Knetworkmanager
                                        automatically     gen-
                                        erates a dns for it.
                                        If dns was not auto-
                                        matically configured,
                                        there might be a
                                        problem with the
                                        network or a problem
                                        with /etc/resolv.conf.
                                        you can refer to
                                        chapter 9 of system
                                        administration     for
                                        troubleshooting.




                                                           55
Bayanihan Linux 5                           Chapter 4. Connecting to the Internet




      Figure 4.19: If you
      have     a   different
      ethernet       settings
      you can load your
      network profile that
      would fit on your
      network setup for
      your ethernet.




759   4.3     Using FireFox and Konqueror for browsing
760           the web

761   FireFoxTM (shown in Figure ??) is a popular open-source web browser developed
762   by the Mozilla Foundation.


763   Starting firefox

764   To run this application, simply click on the link found at the Menu:


765                             → Internet → FireFox - Web Browser


766   Opening, Selecting and Closing tabs

767   A tabs can be found below the bookmark toolbars, it allows firefox to use multiple
768   firefox window taskbar to be open one at a time.
769   By pressing on [Ctrl]+[t] or you may choose to click

770                                   File → New Tab

771   ,

      56
Chapter 4. Connecting to the Internet                         Bayanihan Linux 5


                                                Figure 4.20: Multiple Tabs
                                                for Firefox




                                                Figure 4.21: Miscellaneous Pref-
                                                erence Dialog on Firefox Which lets
                                                you customize and configure your
                                                firefox browser




772   Using the Konqueror for Browsing the Web

773   Konqueror is a web browser, file manager and file viewer designed as a core part
774   of the K Desktop Environment. It is developed by volunteers and can run on most
775   Unix-like operating systems. Konqueror, along with the rest of the components in
776   the KDEBase package, is licensed and distributed under the GNU General Public
777   License. This section will describe the use of konqueror as a web browser.Figure ??


778   Starting konqueror

779   To start konqueror, go to .


780                                   → Internet → konqueror


781   Creating, Opening and Closing tabs

782   tabs in konqueror are found underneath the location toolbar, same as the func-
783   tionality of firefox, it allows for a multiple access of konqueror windows. You can
784   also press [Ctrl] + [t] or go to


                                                             Figure 4.22: Multiple Tabs


                                                                                      57
Bayanihan Linux 5                           Chapter 4. Connecting to the Internet


                           Figure 4.23:
                           Quick Search on
                           Konqueror




                      Figure 4.24: Find Tool-
                      bars on Konqueror




785   Bookmarks

786   You can bookmark a page on konqueror by going to

787                             Bookmark → Add Bookmark


788   Quick Search

789   You can find the quick search on konqueror at the upper right beside the location
790   toolbar Figure 4.23


791   Find Toolbar

792   The find toolbar on konqueror are found on

793                                     Edit → Find

794   or you can type [Ctrl] + [f] Figure 4.24


795   Miscellaneous

796   You con configure konqueror by going to

797                            Settings → Configure Konqueror

798   Figure 4.25

      58
Chapter 4. Connecting to the Internet                          Bayanihan Linux 5




                                                     Figure 4.25: Preferences Configu-
                                                     ration for Konqueror




799   4.4     Setting the proxy for firefox and konqueror

800   To set the proxy for Mozilla firefox:

801                       Edit → Preferences → Advance → Network

802   To set the proxy for Konqueror:

803                       Settings → Configure Konqueror → Proxy


804   Installing Additional Plugins

805   Plugins are tools use to enhance your internet browser by adding more function-
806   alities to it. There are lots of plugin that you can find on the internet and you can
807   download it for free. We will be focusing on installing plugin for mozilla firefox
808   and konqueror since these 2 are the default internet browser use by bayanihan
809   linux.
810   To install the plugin on firefox:

811     1. Open a new browser window using Firefox.
812     2. Go to the Firefox plugins Web page(see https://addons.mozilla.org/
813        en-US/firefox/browse/type:7).
814     3. Browse through the list of plugins that are available. Choose from items
815        such as Flash player, Java, Gxine and many more.
816     4. Look beneath the plugin you’d like to download. You’ll be re-routed to the
817        downloads page for the specific plugin you wish to add.

                                                                                       59
Bayanihan Linux 5                              Chapter 4. Connecting to the Internet


818        5. Look for the ’Download’ or ’Download Now’ button and click it. You may
819           be prompted to save a file. Click ’Save File.’ A dialog box will show the
820           download progress. When the download is complete, click ’Clean Up.’

821        6. Open the plugin after it finishes downloading. If you left the default setting
822           in place, the plugin will be on your desktop. Simply clicking the icon will
823           install it in Firefox.

824   To install the plugin in konqueror:

825        1. Start up Konqueror, then do a Web search for ’plugins’ for konqueror. When
826           you find a plugin you think you might use and enjoy, click on it and follow
827           the instructions for downloading found on that Web site. Note that other
828           plugins may have different download instructions.

829        2. Set Konqueror to read the plugin: Once your chosen plugin has been down-
830           loaded to your computer, go to the Konqueror tool bar and click on ’Con-
831           figure Konqueror.’

832        3. Choose ’plugins.’

833        4. Hit ’Refresh.’

834        5. Close Konqueror, then re-open it. Once you have re-opened Konqueror, it
835           will be all set to read and use the plugin you just downloaded.



836   4.5       E-Mail

837   Electronic mail(E-mail) is any method of communicating and storing data using
838   digital device such as computers. Bayanihan uses a Kmail as dafault for sending
839   and receiving email.


840   Configuring/Using KMail

841   KMail is the e-mail client of the KDE desktop environment. It is use by Bayanihan
842   Linux as the default email client.


843   Starting KMail

844   To start kmail.

      60
Chapter 4. Connecting to the Internet                       Bayanihan Linux 5




                                  Figure 4.26: KMail Start


845   It if is your first time to use kmail just follow the wizard to setup your mail
846   account.


847                                     → Internet → Kmail



848   Composing a message

849   After you have setup your account, we will now compose a new message to test
850   your new account. To compose message window go to:

851                             → Message → New Message

852   Fill in the appropriate fields in the composer window. You can use the View menu
853   to select which header fields you want to display.
854   Organizing your address can easily be remember if you will be sending message
855   to multiple address or single address.You can use the address book by clicking
856   on the select button beside the To field then from that it will list your current
857   contact email address.
858   Whenever you want to add more than one recipient in one of the fields, use a
859   comma to separate each address from the next one. You may need to specify
860   fully qualified addresses (i.e. user@example.com) even for local users, depending
861   on your system configuration.

                                                                                   61
Bayanihan Linux 5                             Chapter 4. Connecting to the Internet




      Figure 4.27: Composing Mes-
      sage on KMail




862   When you are finished with your message, click the Send Now icon (the envelope)
863   to send the message. Figure 4.27
864   Message Folders
865   Message Folders are used to organize your email messages. By default, if you have
866   no existing message folders, messages are stored in the folder $KDEHOME/share/apps/kmail/.
867   If you have existing message folders in /Mail, these will be used instead. When
868   you first start KMail the inbox, outbox, sent-mail, trash and drafts folders are
869   created. These folders each have special functions
870   Inbox:
871   Where KMail by default puts your new messages when you ask it to check your
872   mail.
873   Outbox:
874   Where messages are put while they are waiting to be delivered. Note that you
875   should not drag and drop messages here to send them, use the Send icon in the
876   composer window instead. Sent-mail:
877   By default copies of all messages that you have sent are put into this folder. Trash:
878   By default all messages that you have moved to trash are moved into this folder.
879   Drafts:
880   Contains messages you started to edit but then saved to this folder instead of
881   sending them.

      62
Chapter 4. Connecting to the Internet                       Bayanihan Linux 5




                                                        Figure 4.28: Main Window of
                                                        Thunderbird




882   Installing/Using Thunderbird

883   Mozilla Thunderbird is the open source e-mail client develop by Mozilla founda-
884   tion. Figure 4.28
885   To install thunderbird, go to the directory where you download the source and
886   untar/unzip the source by using the command below.

887     1. cp thunderbird-2.0.0.19.tar.gz /opt/
888     2. cd /opt
889     3. tar -zxvf thunderbird-2.0.0.19.tar.gz
890     4. ln -s /opt/thunderbird/thunderbird /bin/thunderbird

891   If you want to create a desktop shortcut for thunderbird, you can follow on this
892   procedure:
893   Right click on the desktop → create new → link to application. Go to application
894   and fill up the field required.
895   If you want to open thunderbird on the commandline, just type in thunderbird in
896   the terminal.


897   Starting up Thunderbird

898   After finishing your installation and everything went well. We can now start using
899   thunderbird.

                                                                                    63
Bayanihan Linux 5                          Chapter 4. Connecting to the Internet




      Figure 4.29: Configuring and
      Starting up Thunderbird




      Figure 4.30: Configuring and
      Starting up Thunderbird




900   First is you have to setup your account. Thunderbird has a user friendly wizard
901   which will guide you in configuring your account name and other configuration.
902   Figure 4.29
903   Figure 4.30




904   Composing a Message

905   To compose a new message for Thunderbird, go and click on the Write button
906   located beside Get Mail button. Figure 4.31

      64
Chapter 4. Connecting to the Internet                     Bayanihan Linux 5




                                                      Figure 4.31: Main Window
                                                      for Composing a Message on
                                                      Thunderbird




907   Message Folders

908   Thunderbird has a 4 default message folders on the main window, the inbox,
909   drafts, trash and the local folders. everytime you got a new message on your
910   mailbox it is automatically put in the inbox. you can make a rule on how to
911   organize your incoming message to where it be put.



912   Address Book

913   Address book stores the email address of your contacts. You can find the icon
914   Address Book on the upper tool bar beside the Write icon



915   4.6     VOIP

916   VoIp(Voice over Internet Protocol) is a service that convert your voice into a
917   digital signal that travels on internet. A broadband(high speed internet and a
918   headset microphone computer device is require.



919   Configuring/Using Ekiga

920   Ekiga(Formerly Gnome Meeting) is an open source VoIP and video conferencing
921   application by gnome. Ekiga is default in bayanihan linux.

                                                                                 65
Bayanihan Linux 5                            Chapter 4. Connecting to the Internet




            Figure 4.32: Ekiga 10 Easy
            COnfiguration




922   Newbie users

923   If it is your first time to use ekiga, ekiga has a pop up wizard with 10 easy
924   configuration that is applicable for first time users. Simply follow the steps that
925   starts from creating an account to configuring hardware device. Figure 4.32


926   Calling using Ekiga

927   If you want to call other users, you need a SIP address. It is an address known
928   to be like a phone number. You can get a SIP address for free from (http:
929   //www.ekiga.netasdescribedhere). You can use the online address book of
930   Ekiga to find the SIP addresses of other Ekiga users. It is of course possible to
931   call people who are using another provider (other than ekiga.net) using Peering
932   or Enum. You can actually call any user using SIP software or hardware, and
933   registered to any public SIP provider. Ekiga can also be use to do PC-to-PC calls,
934   PC-to-phone calls or vice versa.


935   Messaging using Ekiga

936   You can also chat with your friends using ekiga. You can do this by clicking on
937   the left, above the Change the view mode.To send a text message to a user, simply
938   enter his/her SIP address into the sip: input box at the top of the screen, enter
939   your text message, and click on Send. Figure 4.33


940   Video Calls

941   Your camera must be supported by the linux kernel and compatible with Video4linux/Video4linux2
942   API in order to use webcams for video calls.

      66
Chapter 4. Connecting to the Internet                       Bayanihan Linux 5




                                              Figure 4.33: Messaging with
                                              Ekiga




                                                      Figure 4.34:    Ekiga Address
                                                      Book




943   Ekiga has an assistant for configuring video support: just run the Configuration
944   Assistant until the end.



945   Testing your webcam

946   To test your webcam you can do this:
947   There are 6 icons on the left side of the main Ekiga window. Push the 4th button
948   from the top (a grey round webcam). If eveything is ok, you’ll see the output of
949   the webcam. If not, you’ll see the Ekiga logo bouncing slowly.



950   Managing your Address Book

951   To see the address book on ekiga, go to Tools → Address Book. A pop up window
952   will appear for choosing your contact list. Figure 4.34

                                                                                   67
Bayanihan Linux 5                             Chapter 4. Connecting to the Internet




                            Figure 4.35:
                            Skype




      Figure 4.36:  Installing Skype on
      Bayanihan Linux




953   Installing/Using Skype

954   Skype is a software that allows us call the user over using the internet with free of
955   charge but calls to other landlines and mobile might have charges depend on the
956   telecom company. It also allows for chatting and video conferencing. Figure 4.35


957   Installing Skype

958   Download Skype on their website (http://www.skype.com/intl/en/download/skype/linux/choose/).
959   You can choose on debian etch as the source for bayanihan linux. after you have
960   downloaded skype use the command dpkg -i skype-debian 2.0.0.72-1 i386.deb.
961   you must be a root user to use it. Figure 4.36


962   Using Skype

963   In order to use skype, you must have an account and you can get it on their web-
964   site https://secure.skype.com/account/login?message=login required, After your
965   account is done, you can now login to skype. Figure 4.37

      68
Chapter 4. Connecting to the Internet                        Bayanihan Linux 5




                                              Figure 4.37:
                                              Logging in      to
                                              Skype




                                              Figure 4.38:
                                              Pidgin       Main
                                              Window




966   4.7     Instant Messaging With Pidgin

967   Pidgin is an instant messaging client that support different account on other
968   instant messaging applications. It supports AIM, ICQ, Jabber/XMPP, MSN,
969   Yahoo!, Bonjour, Gadu-Gadu, IRC, QQ, SILC, Simple.
970   Pidgin can log you to different account but you must be register on a specifi
971   account before you login to pidgin. Figure 4.38




972   Add an Account on Pidgin

973   You can go to Accounts → Manage or click on [ctrl] + [a]. Then click on the add
974   button, then you can choose which account that you want. Figure 4.39

                                                                                  69
Bayanihan Linux 5                             Chapter 4. Connecting to the Internet




       Figure 4.39:    Adding Account on
       Pidgin




      Figure 4.40:
      Composing a        Mes-
      sage on Pidgin




975   Compose a Message

976   Just click on the name of the user if you like to talk or give a message. Figure 4.40



977   4.8     Desktop Sharing/Remote Desktop

978   Desktop Sharing is an application that allows you to use and share an existing
979   session to another machine. The user may also control your desktop which is like
980   sharing one session using 2 computers.


981   Using Krfb

982   To start krfb, go to:


983                                      → Internet → Krfb

      70
Chapter 4. Connecting to the Internet                       Bayanihan Linux 5




                                                 Figure 4.41: Starting Up Krfb




                                               Figure 4.42: Creating Personal In-
                                               vitation for krfb




984   You can share desktop right away by choosing on the create personal invitation
985   it will create a host and a password which you will be giving to other station to
986   connect to your desktop.


987   Using Krdc

988   After Creating an invitation, you can now access the desktop using the krdc. To
989   open krdc go to:

990                                     → Internet → Krdc




                                                                                    71
Bayanihan Linux 5                      Chapter 4. Connecting to the Internet




                        Figure 4.43: Gui of Krdc




           Figure 4.44: Gui of Krdc




72
991


992                                                                          CHAPTER

993                                                                            FIVE
994




995                                                    Using OpenOffice.org 3



996    Chapter Author : Pearliezl Dy Tioco
997




998    5.1     OpenOffice.org 3 Writer

999    What is Writer?
1000   Writer is the word processor component of OpenOffice.org (OOo). In addition
1001   to the usual features of a word processor (spelling check, thesaurus, hyphenation,
1002   autocorrect, find and replace, automatic generation of tables of contents and
1003   indexes, mail merge, and others), Writer provides important features:

1004      • Templates and styles
1005      • Page-layout methods, including frames, columns, and tables
1006      • Embedding or linking of graphics, spreadsheets, and other objects
1007      • Built-in drawing tools
1008      • Master documentsto group a collection of documents into a single document
1009      • Change tracking during revisions
1010      • Database integration, including a bibliography database

                                               73
Bayanihan Linux 5                             Chapter 5. Using OpenOffice.org 3


1011        • Export to PDF, including bookmarks

1012        • And many more


1013   Starting from the system menu

1014   The most common way to start Writer is by using the system menu, on GNOME,
1015   it is called the Applications menu, on KDE, it is identified by the KDE logo.
1016   The Writer interface
1017   The main Writer workspace is shown below.




1018


1019   Menus
1020   The Menu bar is located across the top of the Writer window, just below the
1021   Title bar. When you choose one of the menus, a submenu drops down to show
1022   commands like File, Edit, View, Insert, Format, Table, Tools, Window and Help.
1023   Toolbars

       74
Chapter 5. Using OpenOffice.org 3                             Bayanihan Linux 5


1024   The first toolbar is a Standard Toolbar is consistent across the OpenOffice.org ap-
1025   plication. The second toolbar across the top is a Formating Toolbar that provides
1026   tools for formatting graphics and has a context-sensitive bar.
1027   Status Bar
1028   This provides information about the document and can change some document
1029   features. It has Page number, Page style, Language, Insert mode, Selection mode,
1030   Digital signature, Section or object information (Picture, List item, Heading and
1031   Table), View Layout and Zoom.


1032   Changing Document views

1033   There are several ways to view a document: Print Layout, Web Layout and Full
1034   Screen. Go to View menu and click on the required view. Print Layout is the
1035   default document view. Ctrl+Shift+J the Full Screen view, press the Esc key to
1036   return to either Print or Web Layout view.
1037   When in Print Layout and Web Layout you can Zoom slider on the menu bar.
1038   You can use both Zoom slide and View Layout icons on the Menu Bar. In Web
1039   Layout view, most of the choices are not available.


1040   Starting a new document

1041   Creating a blank document

1042   When OpenOffice.org Writer is open a Welcome screen is shown. Click one of
1043   the icons to open a new document or click the Templates icon to start a new
1044   document using a template.
1045   You can also start a new document in one of the following ways.


1046      • If a document is already open in OpenOffice.org, the new document opens
1047        in a new window.

1048      • Press the Control+N keys. A new empty document opens. If you already
1049        have a document open, the new document appears in a new window.

1050      • Use File ¿ New ¿ Text Document. The result is the same as pressing the
1051        Control+N keys.

1052      • Click the New button on the main toolbar .

                                                                                     75
Bayanihan Linux 5                               Chapter 5. Using OpenOffice.org 3


1053   Creating a document from a template

1054   You can use templates to create new documents. If you want to have a document
1055   with similar layout use Templates. As a result, all the documents look alike; they
1056   have the same headers and footers, use the same fonts, and so on.
1057   Once you do have an existing templates, you can create new documents based
1058   on them by using File ¿ New ¿ Templates and Documents. This opens a window
1059   where you can choose the template you want to use for your document.
1060   A new document is created based on the formats defined in the template.




1061




1062   Opening an existing document

1063   When no document is open, the Welcome screen provides an icon for opening
1064   an existing document. You can also open an existing document in one of the
1065   following ways. If a document is already open in OpenOffice.org, the second
1066   document opens in a new window.

       76
Chapter 5. Using OpenOffice.org 3                               Bayanihan Linux 5


1067   Click File > Open.
1068   Click the Open button on the main toolbar.
1069   Press Control+O on the keyboard.


1070   In each case, the Open dialog box appears. Select the file you want, and then
1071   click Open.
1072   In the Open dialog box, you can reduce the list of files by selecting the type of
1073   file you are looking for. For example, if you choose Text documents as the file
1074   type, you will only see documents Writer can open (including *.odt, *.doc, *.txt).
1075   This method opens Word (*.doc) files, as well as OpenOffice.org files and other
1076   formats.



1077   Saving a document

1078   To save a new document, do one of the following:


1079   Press Control+S.
1080   Select File > Save.
1081   Click the Save button on the main toolbar.


1082   When the Save As dialog box appears, enter the file name and verify the file type
1083   (if applicable).
1084   To save an open document with the current file name, choose File ¿ Save. This
1085   will overwrite the last saved state of the file.



1086   Password protection

1087   To protect an entire document from being viewable without a password, use the
1088   option on the Save As dialog box to enter a password. This option is only available
1089   for files saved in OpenDocument formats. Passwords must contain a minimum
1090   of 5 characters. The OK button appear if it reached the minimum characters
1091   required.


1092      • On the Save As dialog box, select the Save and tick the password option,
1093        and then click Save. You will receive a prompt:

                                                                                       77
Bayanihan Linux 5                                Chapter 5. Using OpenOffice.org 3




1094




1095        • Type the same password in the Password field and the Confirm field, and
1096          then click OK. If the passwords match, the document is saved and the file is
1097          password protected. If the passwords do not match, you receive the prompt
1098          to enter the password again.




1099   5.2      OpenOffice.org 3 Calc

1100   Calc is a spreadsheet software that is a free alternative to Microsoft Excel. It
1101   allows you to store, organize and analyze numerical information. Shown below is
1102   the OpenOffice.org Calc default window.

       78
Chapter 5. Using OpenOffice.org 3                              Bayanihan Linux 5




1103




1104      • Tool Bars - contains commands that have pictures or icons associated with
1105        them. The Calc Toolbars are Main Menu toolbar, Function toolbar, For-
1106        mating toolbar and Formula toolbar.

1107             1. Main Menu Toolbar - this gives you access to many of the basic
1108             commands used in Calc.
1109             2. Function Toolbar - contains icons to provide quick access to
1110             commands.
1111             3. Formating Toolbar - has icons plus drop-down menus that
1112             allow you to select a font, font color, alignments, number formats,
1113             border options and background colors.
1114             4. Formula Toolbar - contains the Name Box drop-down menu
1115             and a ling white box called Input Line.

1116      • Cells - is the fundamental element of worksheet and has an intersection of a
1117        column and row. A Cell Address is a combination of the column letter and
1118        the row number of a cell, such as A2 or B16, etc.

1119      • Column Headings - this contains 256 columns and named by a letter or
1120        combination of letters.

                                                                                       79
Bayanihan Linux 5                               Chapter 5. Using OpenOffice.org 3


1121        • Row Headings - this contains 65,536 rows and named by a number.




1122        • Navigation Bars - allows you to move from on worksheet to another, this
1123          buttons display the first, previous, next and last worksheets.




1124        • Sheet Tabs - separate a sheet into specific worksheets.




1125   Using Functions


1126   A function is a predefined formula that helps perform mathematical functions.
1127   Functions save you the time of writing lengthy formulas. Function has a specific
1128   order called syntax.




1129          1. All functions begin with the = (equal sign). 2. Define the function
1130          name (e.g., Sum, Average, Count, Max and Min). 3. Enclose one or
1131          more arguments - numbers, text or cell references with parentheses.
1132          Separate a comma for each argument that is more than one.




1133   Accessing Calc Functions


1134   Click the Function Wizard button on the Standard toolbar. The Function Wizard
1135   dialogue box appears.

       80
Chapter 5. Using OpenOffice.org 3                              Bayanihan Linux 5




1136


1137   The drop-down menu of the Functions tab to display a list of function categories
1138   available for you to use in Calc. Click the desired Function that you would like
1139   to use in the spreadsheet.


1140   Grouping and Ungrouping Worksheets

1141   A workbook is a multi-page spreadsheet with multiple worksheets.

1142      • Worksheets can also be combined together into a group. Grouping work-
1143        sheets allows you to apply identical formulas and/or formatting across all
1144        the worksheets in the group.
1145      • When you group worksheets, any change made to one worksheet will also
1146        be applied to the other worksheets.
1147      • if you want several worksheets to have the same data – regions, depart-
1148        ments, quarters, months, weeks and days – and you’ve decided to group
1149        your worksheets, all you need to do is type that information once and it will
1150        appear on every worksheet included in the grouping.

                                                                                      81
Bayanihan Linux 5                                Chapter 5. Using OpenOffice.org 3


1151          To group worksheets: 1. To select one worksheet, click on the first
1152          sheet tab. 2. To select more than one worksheet, hold the Control key
1153          down and click on the additional worksheet tabs in the workbook.




1154   5.3      OpenOffice.org 3 Impress

1155   What is Impress?
1156   Impress is a presentation component (slide show). OpenOffice.org’s presentations
1157   can create slides that contain many different elements, including text, bulleted
1158   and numbered lists, tables charts clip art and a wide range of graphic objects.
1159   It also has a spelling checker and thesaurus and with pre-packaged text styles,
1160   background styles and only help.
1161   The main Impress window has three parts:




1162        • Slides pane - contains thumbnail pictures of the slides. You can Add, Mark,
1163          Delete, Rename, Copy and Move Slides.




1164        • Workspace - has five tabs: Normal, Outline, Notes, Handout and Slide
1165          Sorter.




1166        • Tasks pane - has five sections: Master Pages (28 slide masters), Layout
1167          (20 prepackaged layouts), Table Design (11 standard table styles), Custom
1168          Animation, Slide Transition (56 available transition).

       82
Chapter 5. Using OpenOffice.org 3                             Bayanihan Linux 5




1169




1170   Creating a quick Presentation


1171   To create a quick presentation Impress offered three choices: Empty Presentation,
1172   From Template or Open an existing Presentation. When Impress refers to tem-
1173   plates it means presentations that are both predesigned and also contain sample
1174   content.
1175   The standard way of getting started is to create an empty presentation. You’ll
1176   also be given a chance to choose which format you want the presentation to take,
1177   whether it’s designed primarily to be viewed on-screen or printed out.

                                                                                    83
Bayanihan Linux 5                                Chapter 5. Using OpenOffice.org 3




1178

1179   The Impress Presentation Wizard




1180

1181   The Impress Presentation Wizard - slide design




       84
Chapter 5. Using OpenOffice.org 3                             Bayanihan Linux 5




1182

1183   The Impress Presentation Wizard - slide transition




1184   Creating your own Templates


1185   To create a template from a presentation and Save:




1186        1. Open the presentation that you want to use for a template. 2.
1187        From the main menu, choose File ¿ Templates ¿ Save. The Templates
1188        window opens. 3. In the New Template field, type a name for the
1189        new template. 4. In the Categories list, click the folder in which you
1190        want to store the template. 5. Click OK. OpenOffice.org saves the
1191        new template and the Templates window closes.

                                                                                     85
Bayanihan Linux 5                              Chapter 5. Using OpenOffice.org 3




1192


1193   Importing a template
1194   If the template is in different location you can import it. To import a template
1195   into a template folder from another location on your computer.

1196        1. In the Template Management dialog box, click the folder into which
1197        you want to import the template. 2. Click the Commands button and
1198        choose Import Template from the drop-down menu. A standard file
1199        browser window opens. 3. Find and select the template that you
1200        want to import and click Open. The file browser window closes and
1201        the template appears.

1202   Exporting a template
1203   To export a template from a template folder to another location:

1204        1. In the Template Management dialog box, double-click the folder
1205        that contains the template you want to export. A list of all the tem-
1206        plates contained in that folder appears underneath the folder name. 2.
1207        Click the template that you want to export. 3. Click the Commands
1208        button and choose Export Template from the drop-down menu. The
1209        Save As window opens. 4. Find the folder into which you want to
1210        export the template and click Save.


1211   Applying Fontwork

1212   The Fontwork tool lets you manipulate text in various ways. This located at
1213   the Drawing toolbar. When you click the icon, the Fontwork Gallery dialog box
1214   appears, offering a choice of predefined font effects. Once the selection was made
1215   the dummy text ”Fondwork” will appear on the workspace.

       86
Chapter 5. Using OpenOffice.org 3                              Bayanihan Linux 5


1216   To remove a Fontwork item, just select its border and press the Delete Keys on
1217   your keyboard.




1218




1219   Using 3D Effects

1220   In addition to Fontwork effects, Impress includes a powerful 3D tool. To use
1221   it, create a text box or shape using the Drawing toolbar at the bottom of the
1222   screen. Then right-click the text box or shape and select Convert ¿ 3D. If you
1223   want to create a 3D object that you can rotate in 3D space, select the 3D Rotation
1224   Object.




                                                                                      87
Bayanihan Linux 5   Chapter 5. Using OpenOffice.org 3




88
1225


1226                                                                          CHAPTER

1227                                                                              SIX
1228




1229                                                      Using Graphics Tools



1230   Chapter Author : Yvonne Carpo
1231


1232   Bayanihan Linux version has some powerful, world-class graphics tools and ap-
1233   plications available. It includes several photo manipulation and cataloging tools.
1234   Among these is a professional-level image-editing program called GIMP (for GNU
1235   Image Manipulation Program).



1236   6.1     Image Editing Using Gimp

1237   Gimp is an open-source alternative to high priced, professional graphics editing
1238   programs such as Fireworks or Adobe Photoshop. Although GIMP is not aimed
1239   at beginners, those new to image editing can get a lot from it, provided they put
1240   in a little work.
1241


1242   To run this application, simply click on the link found at the Menu:

1243               → Graphics → GNU Image Manipulation Program - Image Editor

1244   The sample screenshot when you open GIMP as shown in Figure 6.1.
1245   The Gimp normally enables you to keep several windows open at once, rather

                                              89
Bayanihan Linux 5                                Chapter 6. Using Graphics Tools




       Figure 6.1: Sample
       Screenshot. When
       you    first   open
       GIMP.




1246   than having all its functions available from one window. This gives you control
1247   over where the various windows are positioned and which ones remain visible.
1248   GIMP uses 3 most important windows which is Main Toolbox Windows as
1249   shown in Figure 6.2, the Layers Dialog Windows shown in Figure 6.3 and the
1250   Image Windows shown in Figure 6.4.



1251   6.2       Gwenview

1252   Gwenview is a fast and easy to use image viewer for KDE. It is free software,
1253   licensed under the GNU General Public License1 .
1254


1255   Gwenview features a folder tree window and a file list window to provide easy
1256   navigation of your files. It also uses docked windows, so you can alter any layout
1257   you wish for. You can also browse images in full-sreen mode, or embedded within
1258   Konqueror using the Image View and Kpart.


1259   Installing extra plugins (KIPI-plugins)

1260   KIPI (KDE Image Plugin Interface) is a common development effort by the Gwen-
1261   view developers, DigiKam,. Its aim is to share image plugins among graphic
1262   applications. Kipi is based on the old digiKam plugins implementation.
            1 http://www.gnu.org



       90
Chapter 6. Using Graphics Tools                 Bayanihan Linux 5




                                  Figure 6.2: GIMP’s Main Tool-
                                  box. This can be considered the
                                  heart of GIMP, because when you
                                  close it, all the other program win-
                                  dows are closed too. It contains
                                  the highest level menu, plus a set
                                  of icon buttons that can be used
                                  to select tools, and more.




                                                                   91
Bayanihan Linux 5                      Chapter 6. Using Graphics Tools




Figure 6.3: Layers Dialog. The
main interface to edit, modify and
manage your layers. It shows the
layer structure of the currently ac-
tive image, and allows it to be ma-
nipulated in a variety of ways. You
can close this if you want, and re-
open it later by selecting File →
Dialogs → Layers.




92
Chapter 6. Using Graphics Tools                              Bayanihan Linux 5




                                                             Figure 6.4: GIMP’s Im-
                                                             age Window.          Each
                                                             image open in GIMP is
                                                             displayed in a separate
                                                             window.     Many images
                                                             can be open at the same
                                                             time:the limit is set only
                                                             by the amount of system
                                                             resources.




1263   6.3     Installing/Using Digikam

1264   Digikam is a simple digital photo management application, which makes import-
1265   ing and organizing digital photos a ”snap”. The photos can be organized in
1266   albums which are automatically sorted chronologically. An easy to use interface
1267   is provided that enables you to connect to your camera and preview, download
1268   and/or delete your images.



1269   6.4     Other graphics tools

1270   Installing/Using Inkscape

1271   To create vector artwork, a better choice is a program like Inkscape(http://
1272   www.inkscape.org), which can be downloaded via Synaptic Package Manager
1273   (to learn about software installation, see Chapter 10).
1274   Inkscape as shown in Figure ?? is a powerful open source vector graphics editor,
1275   using the W3C standard Scalable Vector Graphics (SVG) file format with similar
1276   capabilities to Illustrator, CorelDraw, or Xara X.
1277


1278   To run this application, simply click on the link found at the Menu:

1279                       → Graphics → Inkscape Vector Graphics Editor

1280   Inkcape Tools: The vertical toolbar on the left shows Inkscape’s drawing and edit-
1281   ing tools. In the top part of the window, below the menu, there’s the Commands
1282   bar with general command buttons and the Tool Controls bar with controls that

                                                                                      93
Bayanihan Linux 5                                Chapter 6. Using Graphics Tools


1283   are specific to each tool. The status bar at the bottom of the window will display
1284   useful hints and messages as you work.


1285   Creating and Managing Documents

1286   To create a new empty document, use File → New or press Ctrl+N


1287   Installing/Using Blender

1288   Blender as shown in Figure ?? is an integrated 3D suite for modelling, animation,
1289   rendering, interactive creation and playback.




       94
1290


1291                                                                         CHAPTER

1292                                                                        SEVEN
1293




1294                       Using WindowsTM applications with WINE



1295   Chapter Author : Rage Callao
1296


1297   This version of Bayanihan Linux comes bundled with a program that allows
1298   WindowsTM applications to run in a non-WindowsTM environment. The soft-
1299   ware is called WINE1 which is a recursive acronym for WINE Is Not an Emulator.
1300


1301   From http://winehq.org:

1302            Wine is a translation layer (a program loader) capable of running
1303        Windows applications on Linux and other POSIX compatible oper-
1304        ating systems. Windows programs running in Wine act as native
1305        programs would, running without the performance or memory usage
1306        penalties of an emulator, with a similar look and feel to other appli-
1307        cations on your desktop.
1308            Wine is still under development, and it is not yet suitable for gen-
1309        eral use. Nevertheless, many people find it useful in running a growing
1310        number of Windows programs.




          1 http://www.winehq.org/



                                              95
Bayanihan Linux 5            Chapter 7. Using WindowsTM applications with WINE


1311   7.1     Installing WindowsTM software

1312   Installing software via WINE is quite easy. Just click on its executable file in the
1313   Konqueror file manager. If that doesn’t work, open a console (see 9) and type the
1314   command “wine <name of executable file>”
1315   For example, we will install 7-Zip, a popular open-source archiving program sim-
1316   ilar to Winzip. Download the installer from http://www.7-zip.org/ and save it
1317   into your ∼/Download directory. Run Konqueror or double-click the Home icon on
1318   your desktop. Go to the Downloads folder and double-click the .exe file as shown in
1319   Figure 7.1 or open a console and type the command “wine ∼/Download/7z464.exe”.




                                Figure 7.1: Running Konqueror


1320   When the application first starts, it creates a hidden folder in your /home directory
1321   called .wine where it saves its configuration files as well as creates a filesystem
1322   that is similar to the one found in WindowsTM . You can browse this hidden
1323   folder by clicking on the Konqueror menubar View → Show hidden files.
1324   When setup finishes successfully, a link to the WindowsTM application will be
1325   found at:




1326                                → Wine → Programs → 7-Zip

       96
Chapter 7. Using WindowsTM applications with WINE             Bayanihan Linux 5


1327   7.2     Configuring WINE

1328   winecfg

1329   To configure Wine using the winecfg2 tool, simply click on the link found at the
1330   Menu:

1331                               → System → Wine configuration


1332   regedit

1333   From http://winehq.org/docs/wineusr-guide/using-regedit

1334             All of the settings you change in winecfg, with exception of the
1335         drive settings, are ultimately stored in the registry. In Windows, this
1336         is a central repository for the configuration of applications and the
1337         operating system. Likewise, Wine implements a registry and some
1338         settings not found in Winecfg can be changed within it.

1339   To run the registry editor, open a terminal as discussed in Chapter 9 on page 107
1340   and type the command regedit then press Enter.




             Figure 7.2: winecfg                  Figure 7.3: regedit



          2 http://winehq.org/docs/wineusr-guide/config-wine-main



                                                                                       97
Bayanihan Linux 5           Chapter 7. Using WindowsTM applications with WINE


1341   7.3     Tested applications

1342   For a list of applications that have been tested on Wine, please visit the Wine
1343   Application Database found at http://appdb.winehq.org/.




       98
1344


1345                                                                          CHAPTER

1346                                                                          EIGHT
1347




1348                                         Using Multimedia Applications



1349   Chapter Authors: Rage Callao
1350


1351   Bayanihan Linux 5 comes bundled with various software that allow you to play
1352   or view multimedia files in your computer. The following sections briefly describe
1353   the capabilities of each software and its typical uses




1354   8.1     Amarok

1355   Amarok (shown in Figure 8.1)is a multimedia audio player capable of playing audio
1356   files of different formats. It features an intuitive interface that allows the user to
1357   easily search, catalog tracks and create playlists.
1358   More information about configuring and using Amarok is available by pressing
1359   Alt+F2 and entering the command help:/amarok.
1360


1361   To run this application, simply click on the link found in the Menu:


1362                            → Multimedia → Amarok - Audio Player



                                               99
Bayanihan Linux 5                        Chapter 8. Using Multimedia Applications




                 Figure 8.1: Amarok                Figure 8.2: Amarok in system tray


1363   8.2     KsCD

1364   KsCD (shown in Figure 8.3) is a fast, CDDB enabled CD player for the *nix
1365   platform. KsCD stands for “The KDE Project’s small/simple CD player”.
1366   On first run, the application places a shortcut icon in the system tray as shown
1367   in Figure 8.4
1368   To run this application, simply click on the link found in the Menu:

1369                              → Multimedia → KsCD - CD Player




         Figure 8.3: KsCD AudioCD Player          Figure 8.4: KsCD in the system tray

1370   Tip: If you hear no sound when playing an audioCD but you hear a sound after
1371   logging in, you may need to enable digital playback. To do this, click Extras on the
1372   KsCD application then click Configure KsCD. On the window shown in Figure 8.5
1373   enable digital playback and then click Apply for the changes to take effect.



1374   8.3     KMix

1375   KMix is KDE’s soundcard mixer program. Though small, it is full-featured. The
1376   program should give controls for each of your soundcards. This application will
1377   let you can adjust the volume and activate or deactivate channels. On first run,
1378   KMix will put a shortcut icon on the system tray. Typically no configuration is

       100
Chapter 8. Using Multimedia Applications                      Bayanihan Linux 5




                                                  Figure 8.5: KsCD Configuration to
                                                  enable digital playback




1379   necessary, but if you do not hear a sound when logging in the volume may be set
1380   to low or muted by default.
1381   The system automatically detects and configures all available soundcards in your
1382   system provided there is support for the devices in the built-in kernel.
1383   To run this application, simply click on the link found in the Menu:

1384                            → Multimedia → KMix - Sound Mixer




                  Figure 8.6: KMix                Figure 8.7: KMix on the system tray



1385   8.4     KRec

1386   KRec connects to the aRts server and records what is routed to it into files. These
1387   files are in a special KRec format but it is possible to export to wave, ogg and mp3

                                                                                      101
Bayanihan Linux 5                       Chapter 8. Using Multimedia Applications




                    Figure 8.8: KRec Record-
                    ing Tool




1388   files. But KRec has much more functionality. You can do multiple recordings in
1389   one file even with overlaying functionality.
1390


1391   To run this application, simply click on the link found in the Menu:

1392                           → Multimedia → KRec - Recording Tool



1393   8.5     XVidCap

1394   XVidCap is a small tool to capture things going on in an X-Windows display to
1395   either individual frames or an MPEG video. This means you can select an area
1396   on your desktop and use this application to record whatever happens in that
1397   particular area.
1398   To select an area of the screen to record, simply place the cursor over the one of
1399   the red borders, hold down the left mouse button and drag over the desired area
1400   of the screen. Press the red button to begin recording. To stop recording, click
1401   the white square button. The video file will be saved in the folder. To configure
1402   the application, right-click on the main button on the application interface.
1403


1404   To run this application, simply click on the link found in the Menu:

1405                 → Multimedia → XVidCap Screen Capture - X11 Screencam



1406   8.6     MPlayer Video Player

1407   MPlayer is a movie player which runs on many systems. It plays most MPEG/VOB,
1408   AVI, Ogg/OGM, VIVO, ASF/WMA/WMV, QT/MOV/MP4, RealMedia, Ma-
1409   troska, NUT, NuppelVideo, FLI, YUV4MPEG, FILM, RoQ, PVA files, supported

       102
Chapter 8. Using Multimedia Applications                     Bayanihan Linux 5




                                                                 Figure 8.9: XVidCap
                                                                 Screen Recording Tool




                                                  Figure 8.10: MPlayer Video Player




1410   by many native, XAnim, and Win32 DLL codecs. You can watch VideoCD,
1411   SVCD, DVD, 3ivx, DivX 3/4/5, WMV and even H.264 movies.
1412   To play a video file, right-click on the main window and select Open → Play file.
1413   When playing a file, pressing F will toggle fullscreen display.
1414


1415   To run this application, simply click on the link found in the Menu:

1416                        → Multimedia → MPlayer - Multimedia player



1417   Installing additional codecs

1418   Many video files are distributed under proprietary formats and in order to play
1419   these you need to install decoders that can interpret and playback these files. For

                                                                                     103
Bayanihan Linux 5                        Chapter 8. Using Multimedia Applications


1420   legal reasons, these decoders cannot be shipped with Bayanihan Linux but can be
1421   easily installed (see page 123). The w32codecs package will provide the necessary
1422   decoders to playback proprietary video files.



1423   8.7     K3B - CD/DVD Burning

1424   K3b is a CD and DVD burning application for Linux systems optimized for KDE.
1425   It provides a comfortable user interface to perform most CD/DVD burning tasks
1426   like creating an Audio CD from a set of audio files or copying a CD. While the
1427   experienced user can take influence in all steps of the burning process, the begin-
1428   ner may find comfort in the automatic settings and the reasonable K3b defaults
1429   which allow a quick start. The actual burning in K3b is done by the command
1430   line utilities wodim, cdrdao, and growisofs.
1431


1432   To run this application, simply click on the link found in the Menu:


1433                          → Multimedia → K3b - CD and DVD Burning




       Figure 8.11:     K3b     Burning
       Application




1434   On first run, the application automatically searches for and configures all attached
1435   CD/DVD burners. If no CD/DVD burner is found, a prompt will appear.
1436   To burn an CD-sized ISO file, simply click on the Burn CD Image icon on the
1437   application interface. To burn data onto a disk, simply drag and drop files from the
1438   upper right window into the lower right window and click Burn. More information
1439   on using and configuring K3b can be found at help:/k3b.

       104
Chapter 8. Using Multimedia Applications                    Bayanihan Linux 5


1440   8.8     KAudioCreator

1441   KAudioCreator is an audio CD ripper for KDE. With it you can easily rip your
1442   audio CDs to mp3 or ogg files or other formats, depending on whatever encoder
1443   you have installed on your system.
1444


1445   To run this application, simply click on the link found in the Menu:

1446                        → Multimedia → KAudioCreator - CD Ripper




                                                  Figure 8.12:
                                                  KAudioCreator




                                                                                 105
Bayanihan Linux 5   Chapter 8. Using Multimedia Applications




106
1447


1448                                                                     CHAPTER

1449                                                                       NINE
1450




1451                                   Using the Terminal/Commandline



1452   Chapter Authors: Rage Callao
1453


1454   There are times when you will need to run applications without the benefit of a
1455   graphical user interface (GUI) because the command/application does not have
1456   one or because it is more convenient to use a terminal or console. A terminal
1457   or console is similar to the WindowsTM command shell or prompt but offers far
1458   more capabilities.
1459   The following sections describe how to run the most commonly used commandline
1460   tools in a terminal.




1461   9.1     Access the Terminal/Console

1462   To run the application, simply click on the link found at Menu:
1463




1464                          → System → Konsole - Terminal Program




                                             107
Bayanihan Linux 5                       Chapter 9. Using the Terminal/Commandline




               Figure 9.1: Konsole




1465   9.2     File and Folder Navigation

1466   ls - List

1467   The ls command lists the content of a directory. It is one of the most used Linux
1468   command.
1469   Syntax: ls [options] [file/directory]
1470   Typical Options:
        -a   shows ALL the files, including hidden files.
        -l   gives a long listing format. This option gives a more detailed result, it
             shows owner, size, date last modified, etc.
1471
        -R   traverses the directories recursively. This option shows files of all the
             directories within the specified directory.
        -h   shows filesizes “human readable” format.
1472


1473   Typical Usage:
        ls                        - shows the files in the current directory.
        ls                        - shows files in the home directory.
        ls /                      - shows files in the root directory.
1474    ls /path/to/files/        - shows files in the directory /path/to/files/.
        ls -lah                   - shows a long listing of all the files in the current
                                  directory with a “human readable” format.
        ls /home/                 - displays the contents of /home/ directory.
1475




1476   cd - Change Directory

1477   The cd command is used to change to another directory.

       108
Chapter 9. Using the Terminal/Commandline                                Bayanihan Linux 5


1478   Syntax: cd [directory]
1479   Typical Usage:
        cd                                -   changes   to   the   home directory of the current user.
        cd ../                            -   changes   to   the   parent directory.
1480
        cd /                              -   changes   to   the   root directory.
        cd /path/to/mydirectory/          -   changes   to   the   directory /path/to/mydirectory/.
1481




1482   mkdir - Make Directory

1483   The mkdir command is used to create a directory.
1484   Syntax: mkdir [options] [/path/to]directoryname
1485   Typical Options:
1486    -p   create directory including parent directory.
1487


1488   Typical Usage:
        mkdir mydirectory                         - creates a directory named mydirectory in
                                                  the current directory.
        mkdir /path/to/mydirectory                - creates a directory named mydirectory in
1489                                              the /path/to/ directory.
        mkdir -p /path/to/mydirectory             - creates a directory named mydirectory in-
                                                  cluding the parent directories if they don’t ex-
                                                  ist.
1490




1491   rmdir - Remove Directory

1492   The rmdir command is used to remove a directory. Note that it can only remove
1493   an empty directory.
1494   Syntax: rmdir [/path/to]directoryname
1495   Typical Usage:
        rmdir mydirectory                     - deletes the directory named mydirectory in the
                                              current directory.
1496
        rmdir /path/to/mydirectory            - deletes the directory named myirectory in the
                                              /path/to/ directory.
1497




                                                                                                  109
Bayanihan Linux 5                        Chapter 9. Using the Terminal/Commandline


1498   cp - Copy

1499   The cp command is used to copy files and directories.
1500   Syntax: cp [options] [source] [destination]
1501   Typical Options:
        -a   archive; copies recursively, preserving file attributes, and does not follow
             symbolic links.
        -b   backup; backs up existing destination files.
        -f   force; forces copy, overwriting existing files without promting the user.
        -i   interactive; prompts user before overwriting existing files.
1502    -p   preserve; preserves file attributes if possible.
        -r   recursive; copies files and subdirectories recursively.
        -s   symbolic link; makes symbolic link instead of copying.
        -u   update; copies the SOURCE only when it is newer or when the DES-
             TINATION does not exist.
        -v   verbose; shows details while performing copy.
1503


1504   Typical Usage:
        cp myfile1 myfile2                               - copies (duplicates) myfile1 to myfile2
                                                         in the current directory.
        cp myfile mydirectory/                           - copies myfile to the mydirectory in the
                                                         current directory.
        cp -f myfile1 myfile2                            - duplicates myfile1 if myfile2 doesn’t ex-
                                                         ist, otherwise overwrites it.
        cp -u mydirectory1/* mydirectory2/               - copies newer files from mydirectory1 to
1505                                                     mydirectory2.
        cp myfile1 myfile2 mydirectory/                  - copies the files myfile1 and myfile2 to
                                                         mydirectory.
        cp -s myfile /path/to/mylink                     - creates a symbolic link of myfile named
                                                         mylink in the /path/to/ directory.
        cp -rv mydirectory1/ mydirectory2/               - copies mydirectory1 to mydirectory2,
                                                         including subdirectories and displays some
                                                         details.
1506




1507   rm - Remove

1508   The rm command is used to remove files and directories.
1509   Syntax: rm [options] [target]

       110
Chapter 9. Using the Terminal/Commandline                         Bayanihan Linux 5


1510   Typical Options:
        -f         force; forces removal of target files without promting the user.
        -i         interactive; prompts user before removing existing files.
1511
        -r or -R   recursive; removes files and subdirectories recursively.
        -v         verbose; shows details while performing removal.
1512


1513   Typical Usage:
        rm myfile                  - deletes myfile in the current directory.
        rm -rfv mydirectory        - verbosely deletes the directory named mydirectory in
1514
                                   the current directory, including its subdirectories, without
                                   prompting the user.
1515




1516   9.3     Filesystem Tools

1517   df - Disk Free

1518   The df command is used to report system free disk space and usage.
1519   Syntax: df [options] [target]
1520   Typical Options:
        -a   includes all dummy/virtual filesystems in the report.
1521    -h   prints filesystem sizes in “human readable” format.
        -l   limits list to local filesystems only.
1522


1523   Typical Usage:
        df -h             - shows disk usage in “human readable” format.
        df -lh /home      - shows disk usage of filesystem where /home resides.
1524
        df -ah            - shows disk usage of all filesystems, including dummy/virtual
                          filesystems.
1525




1526   du - Disk Usage

1527   The du command is used to report disk space usage size of each file for directories
1528   recursively.
1529   Syntax: du [options] [target]
1530   Typical Options:

                                                                                             111
Bayanihan Linux 5                         Chapter 9. Using the Terminal/Commandline


        -a   reports sizes of all files, not just directories.
        -c   prints a grand total at the end of the report.
1531
        -h   prints in “human readable” format.
        -s   displays only the total for each argument.
1532


1533   Typical Usage:
        du -ch             - prints sizes in “human readable” format and a grand total of
                           the current directory.
1534
        du -ah /home       - shows sizes of all files in /home.
        du -chs /tmp       - shows the summary of sizes of /tmp directory.
1535




1536   mount - Mount

1537   The mount command is used to mount a filesystem. Note that only the root
1538   account can mount filesystems and not ordinary users. Ordinary users should use
1539   pmount instead.
1540   Syntax: mount [options] [filesystem] [mountpoint]
1541   Typical Options:
        -a                                - mounts all filesystems specified in /etc/fstab.
        -o option1, option2, ..           - specifies the options to be used when mounting the
1542
                                          filesystem.
        -t filesystemtype                 - indicates the filesystem type to be mounted.
1543


1544   Typical Usage:
        mount -a                                                - especially useful when changes to
                                                                /etc/fstab have been made.
        mount /mnt/mymount                                      - works only if /mnt/mymount exists
                                                                in /etc/fstab.
        mount /dev/sdb1 /mnt/mymount                            - mounts the filesystem /dev/sdb1
                                                                to the mountpoint /mnt/mymount.
1545    mount -o loop CDImage.iso /mnt/mymount                  - mounts the CD image as a loop
                                                                device.
        mount -t cifs                                          - mounts a WindowsTM share
         -o username=myuser,password=mypassword                with account credits.
         //10.10.5.5/MyShare /mnt/mymount
        mount -o uid=1000 /dev/sdb1 /mnt/mymount                - mounts the /dev/sdb1 as the ac-
                                                                count with user ID 1000.
1546




       112
Chapter 9. Using the Terminal/Commandline                 Bayanihan Linux 5


1547   umount - Unmount

1548   The umount command is used to unmount a filesystem. Note that only the root
1549   account can unmount filesystems and not ordinary users. Ordinary users should
1550   use pumount instead.
1551   Syntax: umount [mountpoint|filesystem]
1552   Typical Usage:
        umount /mnt/mymount     - unmounts the mountpoint /mnt/mymount.
1553
        umount /dev/sdb3        - unmounts the device /dev/sdb3.
1554




1555   pmount - Policy Mount

1556   The pmount command is used to mount hotpluggable devices as ordinary user.
1557   Syntax: pmount [filesystem] [mountname]
1558   Typical Usage:
        pmount /dev/sdb1 myflashdrive       - mounts the filesystem /dev/sdb1 to the mount-
1559
                                            point /media/myflashdrive.
1560




1561   pumount - Policy Unmount

1562   The pumount command is used to unmount hotpluggable devices as ordinary user.
1563   Syntax: pumount [mountpoint|filesystem]
1564   Typical Usage:
        pumount /mnt/mymount     - unmounts the mountpoint /mnt/mymount.
1565
        pumount /dev/sdb3        - unmounts the device /dev/sdb3.
1566




1567   9.4     User-related Tools

1568   adduser - Add User

1569   The adduser command is used to add a system account. It sets up the user’s
1570   home directory and group memberships. Note that this tool can only be used by

                                                                                  113
Bayanihan Linux 5                     Chapter 9. Using the Terminal/Commandline


1571   the root account.
1572   Syntax: adduser [username]
1573   Typical Usage:
        adduser myuser     - starts the interactive tool that sets up the account’s user envi-
1574
                           ronment and group memberships.
1575




1576   deluser - Delete User

1577   The deluser command is used to remove a system account. Note that this can
1578   only be used by the root account.
1579   Syntax: deluser [username]
1580   Typical Usage:
        deluser myuser     - removes the account myuser.
1581
        deluser            - lets you specify the user account to be removed.
1582




1583   addgroup - Add Group

1584   The addgroup command is used to add a system group. Note that this tool can
1585   only be used by the root account.
1586   Syntax: addgroup [groupname]
1587   Typical Usage:
1588    addgroup mygroup     - creates a group called mygroup.
1589




1590   delgroup - Delete Group

1591   The delgroup command is used to remove a system group. Note that this tool
1592   can only be used by the root account.
1593   Syntax: delgroup [groupname]
1594   Typical Usage:
        delgroup mygroup     - removes the group mygroup.
1595
        delgroup             - lets you specify the group to be removed.
1596




       114
Chapter 9. Using the Terminal/Commandline                          Bayanihan Linux 5


1597   9.5     File Permissions

1598   chown - Change Owner

1599   The chown command is used to change file ownership. Note that this tool can
1600   only be used by the root account.
1601   Syntax: chown [options] [owner][:][group] [target]
1602   Typical Options:
        -c   - shows the changes made during the operation.
1603    -R   - recursively changes the owner of the files in the current directory in-
             cluding subdirectories.
1604


1605   Typical Usage:
        chown myuser *                                        - changes the file ownership to myuser
                                                              of the files in the current directory.
1606    chown -R myuser1:mygroup /home/myuser2                - changes the file ownership to myuser1
                                                              with group mygroup of the files in the
                                                              directory /home/myuser2.
1607




1608   chmod - Change Mode Bits

1609   The chmod command is used to change file permissions. Note that this tool can
1610   only be used by the root account.
1611   Syntax: chown [options] [a|u|g|o][+|-][permissions] [target]
1612   Typical Options:
        -c   - shows the changes made during the operation.
1613    -R   - recursively changes the permissions of the files in the current directory
             including subdirectories.
1614


1615   Typical Usage:
        chmod o-rwx *                - removes access to the files in the current directory by users
                                     other than the owner.
1616
        chmod -R +x RunMe.sh         - makes the file RunMe.sh executable.
        chmod +s myfile              - sets the set user ID bit of the file myfile.
1617




                                                                                            115
Bayanihan Linux 5                        Chapter 9. Using the Terminal/Commandline


1618   chgrp - Change Group

1619   The chgrp command is used to change group ownership. Note that this tool can
1620   only be used by the root account.
1621   Syntax: chgrp [options] [group] [target]
1622   Typical Options:
        -c    - shows the changes made during the operation.
1623    -R    - recursively changes the owner of the files in the current direc-
              tory including subdirectories.
1624


1625   Typical Usage:
        chgrp mygroup *                            - changes the group ownership of the files in the
                                                   current directory to mygroup.
1626
        chgrp -R mygroup /home/myuser2             - changes the group ownership of the files in the
                                                   directory /home/myuser2 to mygroup.
1627




1628   9.6      Other Essential Commandline Tools

1629   cat

1630   The cat command is used to display the contents of a file.
1631   Syntax: cat [file/s]
1632   Typical Usage:
        cat myfile                  - displays the contents of myfile to standard output.
1633
        cat myfile1 myfile2         - displays the contents of myfile1 and myfile2.
1634




1635   less

1636   The less is a tool used to display the contents of a file which can be browsed.
1637   Some commands are based on vi.
1638   Syntax: less [file]
1639




       116
Chapter 9. Using the Terminal/Commandline                               Bayanihan Linux 5


1640   find

1641   This command is used to search for files.
1642   Syntax: find [options] [path/s] [expression]
1643   Typical Options for Expression:
        -delete                       -   removes    searched files.
        -exec [command]               -   executes   the given command on the files that were found.
1644    -name [pattern]               -   searches   for files with the given pattern.
        -mtime [n*24hours]            -   matches    files that were last modified n*24hours ago.
        -executable                   -   matches    files that are executable.
1645


1646   Typical Usage:
        find /home/myuser -name *.mp3                       - searches the home directory of myuser for
                                                            .mp3 files.
        find /var/tmp /tmp -name *.bak                     - searches for .bak files in the /var/tmp
1647
         -exec /bin/rm -fv ’{}’ ;                          and /tmp directories and then deletes them.
        find ./ -mtime 0                                    - searches the current directory for modified
                                                            files within the last 24 hours.
1648




1649   grep

1650   This command is used to print lines that match a given pattern.
1651   Syntax: grep [options] [pattern] [file]
1652   Typical Options:
        -a    -   treats a binary file as if it were a text file.
        -i    -   makes the match case-insensitive.
1653
        -n    -   also prints line number for each output.
        -v    -   prints non-matching lines.
1654


1655   Typical Usage:
        grep -i sd /var/log/messages                        - outputs the lines with the characters “sd”,
1656                                                        regardless of case.
        grep -v list /home/myuser/myfile                    - outputs the lines without the word “list”.
1657




                                                                                                117
Bayanihan Linux 5                    Chapter 9. Using the Terminal/Commandline


1658   sed

1659   This tool edits or transforms text from a stream.
1660   Syntax: sed ’[command]’ [input]
1661   Typical commands:
        s/texttofind/texttoreplace/        - replaces the instance of “texttofind” with “text-
                                           toreplace”.
1662
        n,md                               - deletes the lines from n to m.
        n,mp                               - prohibits the display of the lines from n to m.
1663


1664   Typical Usage:
        sed ’3,10d’ myfile                   - outputs the contents of myfile but with lines 3-
                                             10 deleted.
1665
        sed ’s/hello/goodbye/’ myfile        - outputs the contents of myfile but with the first
                                             occurrence of “hello” to “goodbye”.
1666




1667   The Pipe Character

1668   The pipe character “|” is used to put commands in a “pipeline”. The output of
1669   the previous command is passed on to the next.
1670   Typical Usage:
        grep EE /var/log/Xorg.0.log | less          - generates a list of lines with the char-
                                                    acters “EE” in /var/log/Xorg.0.log that
1671                                                can be browsed.
        cat myfile | sed ’s/hello/hi/g’             - outputs the contents of myfile but
                                                    changes all instances of “hello” to “hi”.
1672




1673   Redirecting Outputs

1674   Outputs of commands can be redirected into a file using the greater than (>)
1675   character.
1676   Typical Usage:

       118
Chapter 9. Using the Terminal/Commandline                   Bayanihan Linux 5


        grep EE /var/log/Xorg.0.log > XorgErrors              -    creates    a    file    called
                                                              XorgErrors       with    contents
                                                              from the output of the grep
                                                              command. If the file already
1677                                                          exists, it simply overwrites it.
        grep WW /var/log/Xorg.0.log >> XorgWarnings           - appends the file XorgWarnings
                                                              with the output of the grep com-
                                                              mand. If the file doesn’t exist, it
                                                              creates it.
1678




1679   man - The Manual Pages

1680   More information about these and other commands can be obtained by using the
1681   man command. This invokes the reference manuals for each command.
1682   Syntax: man [command]


1683   The TAB Key

1684   The TAB key is the command completion key. Pressing the TAB once after the
1685   first few letters are typed on the console completes the command. In case when
1686   more than one command share the same first few letters, pressing the TAB twice
1687   shows a list of the commands that share common first letters.
1688




1689   The ALT+. Key Combination

1690   The combination of ALT + . (dot) keys invokes the last argument of the last
1691   command. If repeatedly pressed, it scrolls through the last argument of the pre-
1692   vious commands.
1693




1694   9.7     Text Editors

1695   Vim

1696   From the manual page at man:/vim
1697




                                                                                      119
Bayanihan Linux 5                     Chapter 9. Using the Terminal/Commandline


1698   Vi IMproved, a programmer’s text editor.
1699   Vim is a text editor that is upwards compatible to Vi. It can be used to edit all
1700   kinds of plain text. It is especially useful for editing programs.
1701   There are a lot of enhancements above Vi: multi level undo, multi windows
1702   and buffers, syntax highlighting, command line editing, filename completion, on-
1703   line help, visual selection, etc. See :help vi diff.txt for a summary of the
1704   differences between Vim and Vi.
1705   To run this command, type vim in a terminal which displays the following screen:




                           Figure 9.2: Vi Improved Opening Screen



1706   Nano

1707   From the manual page at man:/nano
1708


1709   Nano’s ANOther editor is an enhanced free Pico clone.
1710   nano is a small, free, and friendly editor which aims to replace Pico, the default
1711   editor included in the non-free Pine package. Rather than just copying Picos look
1712   and feel, nano also implements some missing (or disabled by default) features in
1713   Pico, such as ”search and replace” and ”go to line and column number”.

       120
Chapter 9. Using the Terminal/Commandline                   Bayanihan Linux 5


1714   To run this command, type nano in a terminal which displays the following screen:




                              Figure 9.3: Nano Editor Interface


1715   Midnight Commander

1716   From the manual page at man:/mc
1717


1718   GNU Midnight Commander is a directory browser/file manager for Unix-like op-
1719   erating systems.
1720   The screen of the Midnight Commander is divided into four parts. Almost all
1721   of the screen space is taken up by two directory panels. By default, the second
1722   line from the bottom of the screen is the shell command line, and the bottom line
1723   shows the function key labels. The topmost line is the menu bar line. The menu
1724   bar line may not be visible, but appears if you click the topmost line with the
1725   mouse or press the F9 key.
1726   The Midnight Commander provides a view of two directories at the same time.
1727   One of the panels is the current panel (a selection bar is in the current panel).
1728   Almost all operations take place on the current panel. Some file operations like
1729   Rename and Copy by default use the directory of the unselected panel as a des-
1730   tination (don’t worry, they always ask you for confirmation first). For more
1731   information, see the sections on the Directory Panels, the Left and Right Menus

                                                                                    121
Bayanihan Linux 5                   Chapter 9. Using the Terminal/Commandline


1732   and the File Menu.
1733   You can execute system commands from the Midnight Commander by simply
1734   typing them. Everything you type will appear on the shell command line, and
1735   when you press Enter the Midnight Commander will execute the command line
1736   you typed; read the Shell Command Line and Input Line Keys sections to learn
1737   more about the command line.
1738   To run this command, type mc in a terminal which displays the following screen:




                             Figure 9.4: Midnight Commander




       122
1739


1740                                                                        CHAPTER

1741                                                                            TEN
1742




1743                                                   System Administration



1744   Chapter Author : Rage Callao
1745




1746   10.1      Installing/Removing/Upgrading software

1747   Every operating system has a way of installing and removing software. There
1748   are several ways to install an application in Bayanihan Linux and it is somewhat
1749   different from what users of other operating systems are used to. Nevertheless it
1750   is quite easy to learn how to do.
1751   The following sections describe the apt, Synaptic and aptitude tools as well as
1752   several guides on installing some commonly used applications that cannot be
1753   shipped with Bayanihan but are freely available.
1754   It is also possible to install some WindowsTM applications. See Chapter 7.


1755   Synaptic Package Manager

1756   Synaptic (shown in Figure 10.1) is a graphical package manager that you can use
1757   to easily add/remove packages (also called “software applications” in other oper-
1758   ating systems).
1759




                                             123
Bayanihan Linux 5                               Chapter 10. System Administration




                            Figure 10.1: Synaptic Package Manager


1760   To run this application, simply click on the link found at the Menu:


1761                           → System → Synaptic Package Manager



1762   Configuring/Using Synaptic

1763   In order to perform the following steps, you will need a connection to the internet
1764   as discussed in Chapter 4
1765   Once you have an internet connection, configure Synaptic to fetch the list of
1766   available packages for your system. Do this by clicking Settings → Reposito-
1767   ries as shown in Figure 10.2. A new window will appear (shown in Figure 10.3)
1768   displaying several lines with unchecked boxes. Check the box beside the text
1769   deb http://apt.bayanihan.gov.ph/kalumbata then click Ok. Click Ok again when
1770   the Repositories changed window appears then click the Reload button to update
1771   the list of available packages for your system.

       124
Chapter 10. System Administration                            Bayanihan Linux 5




         Figure 10.2: Settings → Repositories          Figure 10.3: Repositories




1772   The square icons at the leftmost column describe the status of each individual
1773   package. Click Help → Icon legend in the menubar to see a description of the
1774   meanings of these icons as shown in Figure 10.4. To select a package for instal-
1775   lation or removal, simply click on its icon and select the appropriate item in the
1776   pop-up menu.




                                   Figure 10.4: Icon legend




                                                                                     125
Bayanihan Linux 5                              Chapter 10. System Administration


1777   apt, aptitude, dpkg, tasksel

1778   The following tools can only be run inside a console (see Chapter 9) as root
1779   (administrator). For this, you need to su, sudo or sux to gain root privileges.
1780   So for example, if you wanted to run aptitude as root, then you would do the
1781   following in a console:



       rage@bl5dev:~$ su
       Password: <type root password here>
       bl5dev:/home/rage# aptitude



1782   Apt is a commandline package manager without the graphical interface like that
1783   of Synaptic or aptitude. Its manual page can be accessed by typing “man apt”
1784   inside a console or typing “man:/apt” via Alt+F2.
1785   The configuration files for apt resides in the /etc/apt directory. You will need
1786   to edit the file /etc/apt/sources.list and add repositories such as http://apt.
1787   bayanihan.gov.ph to query. The entries are typically of the format:
1788   deb http://apt.bayanihan.gov.ph/kalumbata stable main contrib non-free

1789   For example, to install the package apache from the commandline using apt you
1790   would do the following in a console:



       rage@bl5dev:~$ su
       Password: <type root password here>
       bl5dev:/home/rage# apt-get updates
       bl5dev:/home/rage# apt-get install apache



1791   Aptitude, shown in Figure 10.5 is a console-mode package manager with similar
1792   features to Synaptic. Its manual page can be accessed by typing “man aptitude”
1793   inside a console or typing “man:/aptitude” via Alt+F2.
1794   When it runs, it reads the same configuration files as apt located at /etc/apt/.
1795   Shortcut commands are accessed by pressing Shift+?. For instance to install or
1796   upgrade a package, use the arrow keys to highlight its name then press +. To
1797   remove a package, use the arrow keys to highlight its name then press -. To “hold”
1798   a package in order to prevent future upgrades, press =. To keep a package at its
1799   currently state, press :.

       126
Chapter 10. System Administration                            Bayanihan Linux 5


1800   After marking the packages you would like to remove or install, press g and then
1801   press g again to confirm. The application will now proceed and apply these
1802   changes to your system. To cancel the process, press Ctrl+C.
1803   To return to previous screens, press q. To exit, continue pressing q until you see
1804   the prompt confirming that you want to exit the program.
1805   dpkg is a more advanced commandline tool for installing, removing or configuring
1806   packages. Its manual page can be accessed by typing “man dpkg” inside a console
1807   or typing “man:/dpkg” via Alt+F2.
1808   Typically, this tool is used to manually install files with a *.deb extension. For
1809   example, say you downloaded a package called superduperapp.deb and want to
1810   install it, you would do the following in a console:



       rage@bl5dev:~$ su
       Password: <type root password here>
       bl5dev:/home/rage# dpkg -I superduperapp.deb
       bl5dev:/home/rage# dpkg -i superduperapp.deb




                                    Figure 10.5: aptitude

                                                                                     127
Bayanihan Linux 5                               Chapter 10. System Administration


1811   Unlike apt, Synaptic and aptitude, this tool cannot automatically install other
1812   packages that is depended upon by the package you are trying to install. It is up
1813   to you to manually install the packages’s dependencies.
1814   This tool can also be used to list packages which have been installed in the system
1815   (dpkg -l), view the status of each package (dpkg -s packagename) or list the
1816   files installed by a particular package (dpkg -L packagename).


1817   Extras

1818   There are thousands of software available for you to use in your Bayanihan Linux
1819   system. Most of these are distributed freely from our repository at http://apt.
1820   bayanihan.gov.ph. However, there are those which cannot be freely redistributed
1821   but can easily be obtained from the author’s or publisher’s website.


1822   Installing RealPlayer

1823   RealPlayer is a multimedia player capable of playing streaming video from the
1824   web.
1825   Go to http://www.real.com and click on the link “Linux / Unix Player” at the
1826   bottom of the page. You will be redirected to a new page where you can download
1827   the Linux packages. Then click on the link “DEB Package”. After downloading the
1828   file, open a terminal, navigate to where you downloaded it and type the command
1829   “dpkg -i RealPlayer11GOLD.deb” to install this application. A configuration
1830   wizard will pop-up the first time you run this application.
1831   To run this application, simply click on the link found at the Menu:


1832                        → Multimedia → RealPlayer 11 - Media Player


1833   Installing Acrobat Reader

1834   Adobe Reader is a multi-platform PDF viewer.
1835   Go to http://get.adobe.com/reader/otherversions/ and select “Linux - x86
1836   (*.deb)” from the Select an operating system drop-down menu then click Continue.
1837   Click the “Download now” button and save the file to your system. Next, open
1838   a terminal and navigate to where you saved the file then type the command
1839   “dpkg -i AdobeReader_enu-8.1.3-1.i386.deb”.
1840   To run this application, simply click on the link found at the Menu:

       128
Chapter 10. System Administration                              Bayanihan Linux 5


1841                          → Office → Adobe Reader 8 - PDF Viewer


1842   Installing Flash Player Plugin

1843   Athough, gnash, a free and open source flash player is shipped with Bayanihan,
1844   there are many websites that require the Adobe Flash Player plugin to be in-
1845   stalled. To install this plugin, go to http://www.adobe.com and click Download
1846   Flash Player. You will be prompted to accept the license. Once you accept, save
1847   the file into your /home folder and extract its contents by right-clicking on the file
1848   in Konqueror and selecting Extract → Extract here. Then copy the file libflash-
1849   player.so into ∼/.mozilla/plugins folder. Restart FireFox for this change to take
1850   effect.


1851   Installing Java Plugin

1852   Go to http://www.java.com and download the self-extracting archive. Open a
1853   console, change into the directory where the downloaded file is kept and run the
1854   commands below. After that restart FireFox for the changes to take effect.



       rage@bl5dev:~$ su
       Password: <type root password here>
       bl5dev:/home/rage# cd Downloads
       bl5dev:/home/rage/Downloads# sh jre-6u11-linux-i586.bin
               <Press Enter at the more prompt to scroll to the end.>

       Please enter "yes" or "no".
       Do you agree to the above license terms? [yes or no]
               <Type yes then press Enter>
       bl5dev:/home/rage/Downloads# mkdir -p /usr/lib/java
       bl5dev:/home/rage/Downloads# mv jre1.6.0_11 /usr/lib/java/
       bl5dev:/home/rage/Downloads# <Press Ctrl-D to leave root>
       rage@bl5dev:~/Downloads$ cd ../
       rage@bl5dev:~$ ln -sf /usr/lib/java/jre1.6.0_11/plugin/i386/ 
                       ns7/libjavaplugin_oji.so ~/.mozilla/plugins/




1855   Installing Mozilla FireFox

1856   Bayanihan Linux is bundled with the latest version of the Mozilla FireFox web
1857   browser. This section describes how you can manually download the latest version

                                                                                       129
Bayanihan Linux 5                               Chapter 10. System Administration


1858   without using a package management system such as Synaptic, apt or aptitude.
1859   There are consequences to installing this application manually. For instance, you
1860   will need to manually update this package yourself when a new version comes out.
1861   Go to http://www.mozilla.com and click the download link then save the file
1862   to your computer. Using Konqueror navigate to where you downloaded the file
1863   right-click on the file and select Extract → Extract to firefox-3.0.5. Navigate to the
1864   extracted folder and then double-click the file “firefox”.


1865   Installing Mozilla Thunderbird

1866   Mozilla Thunderbird is a multi-platform email client.
1867   Go to http://www.mozilla.com and click the Thunderbird link then click the
1868   download link and save the file to your computer. Using Konqueror navigate to
1869   where you downloaded the file right-click on the file and select Extract → Extract
1870   to thunderbird-2.0.0.19. Navigate to the extracted folder and then double-click the
1871   file “thunderbird”.



1872   10.2      KDE Control Center

1873   The KDE Control Center (kcontrol) is the central configuration utility for the K
1874   Desktop Environment. It is made up of multiple modules grouped into categories
1875   and each module is used to configure the different parts of the system.
1876   To run this application, simply click on the link found at the Menu:

1877                                       → Control Center



1878   Appearance & Themes

1879   This module allows you to change various settings related to how your desktop
1880   looks. You can select the background, set colors and fonts and more. More
1881   information regarding this module can be found by clicking on the Help button.


1882   Desktop

1883   This module allows you to change how different components of the desktop feels
1884   or behaves. For instance, you can set whether the system displays mountable

       130
Chapter 10. System Administration                           Bayanihan Linux 5


1885   devices on your desktop and how many virtual desktops to enable.


1886   Internet & Network

1887   This module configures settings related to the network. However, this should not
1888   be necessary in most cases since Bayanihan Linux 5 can now automatically detect
1889   the network and configure network devices using network-manager.


1890   KDE Components

1891   This module allows you to configure your KDE session, the default applications
1892   as well as enable/disable system services.


1893   Peripherals

1894   This module allows you to change the various settings associated with the devices
1895   attached to your computer such as the keyboard, mouse, display and printers.




                              Figure 10.6: KDE Control Center

                                                                                    131
Bayanihan Linux 5                             Chapter 10. System Administration


1896   Regional & Accessibility

1897   This module allows you to configure keyboard layouts, select the region where the
1898   computer is located and enable/disable accessibility features.



1899   Security & Privacy

1900   This module allows you to set the information regarding your account, set ciphers
1901   to use and other privacy settings.



1902   Sound & Multimedia

1903   This module lets you configure various settings for your audio device as well as
1904   system notifications.



1905   System Administration

1906   This module lets you configure various system components such as the login
1907   screen, install fonts and set the system’s date and time.




1908   10.3      Managing Printers

1909   Managing printers in Bayanihan Linux is done through the Control Center module
1910   shown in Figure 10.7 or via the menu shortcut Menu → Settings → Printer
1911   You can also configure printers via the CUPS web interface which you can access
1912   by running a web browser such as FireFox or Konqueror and entering the following
1913   at the address bar: http://localhost:631
1914   Another method if you have an HP printer is to use HPLIP Toolbox which you
1915   can run via the link in the Menu:


1916                       → System → HPLIP Toolbox - Printer Toolbox

       132
Chapter 10. System Administration                              Bayanihan Linux 5




                               Figure 10.7: Printer configuration


1917   10.4      Managing Private Folders

1918   Private Folders is a new feature in Bayanihan Linux allowing users to create an
1919   encrypted folder in their /home folders for them to be able to store files in a secure
1920   fashion. This encrypted folder is only accessible by the user that created it and
1921   is automatically opened and closed on login and logout.
1922   To enable your encrypted Private folder, simply run the wizard via the Menu:


1923                           → Settings → Private folder configuration



1924   10.5      Setting up a firewall with Guarddog

1925   Guarddog is a user friendly firewall generation and management utility for KDE
1926   running on Linux. It allows you to simply specify which network protocols should
1927   be allowed between which groups of computers without requiring you to have
1928   knowledge of port numbers or packets. Guarddog is built on top of Linux’s
1929   ipchains and iptables packet filtering commands. For more information, press
1930   Alt+F2, type the command help:/guarddog then press Enter.
1931   To run this application, simply click on the link found at the Menu:

                                                                                        133
Bayanihan Linux 5                              Chapter 10. System Administration




                                    Figure 10.8: Guarddog


1932                    → Internet → Guarddog - Firewall configuration utility




1933   10.6      Updating/Using Klamav

1934   Linux has a reputation for being immune to viruses. However, it is normally a
1935   good policy for organizations that work in mixed-environments (Windows and
1936   non-Windows PCs in the same network) to implement virus-free computing by
1937   scanning files that are frequently shared before sending them over the network.
1938   This is where an anti-virus manager will come in.
1939   KlamAV is an anti-virus manager for the KDE desktop that allows you to manage
1940   your virus-scanning, scheduling, virus research and software/database updates.
1941   A graphical wizard will run the first time you use this application. You can
1942   safely accept the defaults and press Skip. You will need an internet connection to
1943   download virus updates for KlamAV.
1944   To run this application, simply click on the link found at the Menu:


1945                         → System → KlamAV - Anti-Virus Manager


       134
Chapter 10. System Administration                           Bayanihan Linux 5




                                     Figure 10.9: Klamav


1946   10.7      Managing users with Kuser/Adduser/Deluser

1947   Adding/removing users or groups is easily done using KUser. More information
1948   can be found by pressing Alt+F2 and entering the command help:/kuser.
1949   To run this application, simply click on the link found at the Menu:

1950                            → System → KUser - User Manager




                                     Figure 10.10: KUser


                                                                                 135
Bayanihan Linux 5   Chapter 10. System Administration




136
1951


1952                                                                          CHAPTER

1953                                                                      ELEVEN
1954




1955                                                                 Special Topics



1956   11.1      Installing a C/C++ development environ-
1957             ment

1958   Section Author : Rage Callao
1959


1960   Several packages need to be installed in order to compile C/C++ source files.
1961   You can use any of the available tools for installing packages as described in sec-
1962   tion 10.1 in page 123. For the rest of this section we will be using commandline
1963   tools so you should already be familiar with using the console (see Chapter 9) and
1964   a text editor like vi, nano or MC.
1965


1966   Open a terminal: Menu → System → Konsole - Terminal Program
1967


1968   And enter the commands below:



       rage@bl5dev:~$ su
       Password: <enter your root password here>
       bl5dev:/home/rage# apt-get update
       bl5dev:/home/rage# apt-get install build-essential



                                              137
Bayanihan Linux 5                                      Chapter 11. Special Topics


1969   Optionally install the following:

1970         • fakeroot
1971         • autotools-dev
1972         • dh-make
1973         • automake1.9

1974   Additionally, if you want to build sources that depend on the graphical toolkits
1975   (such as Xorg, or Qt) you will need to install the following:

1976         • xorg-dev
1977         • libqt3-mt-dev
1978         • kdelibs4-dev
1979         • libglu1-mesa-dev
1980         • qt3-designer
1981         • qt3-linguist



1982   11.2         Compiling a custom kernel or third-party
1983                driver

1984   If you need to compile your own custom kernel or driver you will need to download
1985   and install the following packages:

1986         • kernel-package
1987         • module-assistant
1988         • libncurses5-dev
1989         • linux-headers-2.6-686
1990         • fakeroot

1991   To compile your own custom kernel, you will need to:

1992     1. Download a kernel tarball acompressedf ile from http://www.kernel.org.

       138
Chapter 11. Special Topics                                   Bayanihan Linux 5


1993      2. Extract the tarball to a folder of your choice.

1994      3. cd (change directory) into the extracted folder.

1995      4. Run “make menuconfig” to configure the kernel.

1996      5. Edit /etc/kernel-pkg.conf and edit the maintainer and email fields.

1997      6. Run “fakeroot make-kpkg --initrd --revision=CUSTOM-1 binary”


1998   Warning: Compiling a custom kernel is for experts and advanced users and may
1999   render your machine unbootable. Before performing the installation of custom
2000   self-compiled kernels, make sure to backup your data.
2001   To compile a third-party module, you will need to:


2002      1. Download the module sources.

2003      2. Extract the sources to a folder of your choice.

2004      3. cd (change directory) into the extracted folder.

2005      4. Typically, run make and then make install



2006   11.3       Installing a webserver

2007   Section Author : Pearliezl S. Dy Tioco
2008   Setting this all up assumes you have a running version of Linux already installed.
2009   I won´ walk you through that part.
             t
2010
                                                   ´               ´
       If you don´ have one and have an old box youd like to use, Id suggest using Debian
                 t
2011   as we are about to. But if you are new to Linux, you might want to try using a
2012   hard disk installation of Knoppix as the procedure will be identical.
2013   Of course, you aren´ limited to Linux exclusively. All elements of LAMP have
                          t
2014   been ported to most operating systems.


2015   Setting up Apache

2016   For the actual web server portion of our web server we’ll be using Apache 2. In
2017   addition to being free and open source, Apache is by far the most used web server
2018   software on the Web.

                                                                                     139
Bayanihan Linux 5                                       Chapter 11. Special Topics


2019   Either shell or connecting remotely, we’ll start by checking for updates to the
2020   Debian package lists. This will require root access.
2021   The package lists are updated, we’ll tell Linux to go grab Apache. To fully install
2022   Apache, we’ll need more than one package. Thanks to Debian’s APT, we’ll be
2023   able to download and install all those dependencies with minimal work.



       bayanihan:/home/pearliezl# apt-get install apache2
       Reading Package Lists... Done
       Building Dependency Tree... Done
       The following extra packages will be installed:
       apache2-common apache2-mpm-worker apache2-utils
       Suggested packages:
       apache2-doc lynx www-browser
       The following NEW packages will be installed:
       apache2 apache2-common apache2-mpm-worker apache2-utils
       0 upgraded, 4 newly installed, 0 to remove and 5 not upgraded.
       Need to get 1097kB/1131kB of archives.
       After unpacking 4018kB of additional disk space will be used.
       Do you want to continue? [Y/n] y



2024   Although it isn’t a requirement, APT suggested installing the Apache documen-
2025   tation. So we’ll go ahead and install that just in case. It suggested Lynx too but
2026   we probably won’t be needing that.



       bayanihan:/home/pearliezl# apt-get install apache2-doc
       Reading Package Lists... Done
       Building Dependency Tree... Done
       The following NEW packages will be installed:
       apache2-doc
       0 upgraded, 1 newly installed, 0 to remove and 5 not upgraded.
       Need to get 0B/3861kB of archives.



2027   Now we’ll do a quick check to verify Apache is running.



       bayanihan:/home/pearliezl# /etc/init.d/apache2 start
       Starting web server: Apache2httpd (pid 11205) already running



       140
Chapter 11. Special Topics                                    Bayanihan Linux 5


2028   So it looks like Apache is running, but let’s not take that scripts word for it.
2029   I mean, we’re setting up a web server so why not use a web browser? To do
2030   this, just plug the IP address of your server into the address box of your favorite
2031   browser. This should forward you to http://servername/apache2default/ where
2032   you’ll find a page congratulating you on your successful Apache installation.
2033   If you’d like to start by editing this sample page, it´ easy enough to do. The
                                                             s
2034   default Apache files are stored in /var/www/apache2default on your server.
2035   To edit the English version of the page, we’ll just have to use Nano (or another
2036   text editor) to edit /var/www/apache2default/index.html.en.




       bayanihan:/home/pearliezl# nano /var/www/apache2-default/index.html.en




2037   If you’d like to play with a few of Apache’s settings, the main configuration
2038   file is /etc/apache2/apache2.conf. Since by default Debian will allow external
2039   connections to Apache, you may want to limit connections to your localhost or
2040   local network only.
2041   Go to this file /etc/apache2/apache2.conf for apache setting.




       bayanihan:/home/pearliezl# nano /etc/apache2/apache2.conf




       Change this line from – ServerRoot ”/etc/apache2” to – ServerRoot ”/var/www”
       Change this line from – PidFile AP ACHEP IDF ILEto−−P idF ile/var/run/apache2.pidEn
       DocumentRoot”/var/www”U serwww − dataGroupwww − data
2042   If you’d like to make web folders for individual accounts, all that is needed to
2043   make a directory in the user’s home directory called /public html. For example,
2044   if your username is pearliezl, you’ll need to mkdir /home/pearliezl/public html.
2045   Files stored in that directory will then be viewable in your web browser at the
2046   address http://servername/ pearliezl/.
2047   At this point, if all you want to work on and host are static pages, you are done.
2048   But for those who want to do more interesting things using the LAMP platform,
2049   we’ll move on.

                                                                                      141
Bayanihan Linux 5                                      Chapter 11. Special Topics


2050   Setting up MySQL

2051   There are plenty of Apache-friendly database servers available, but MySQL is
2052   certainly a popular option. Again, this one is free and open source.
2053   We’ll start by installing MySQL in a manner similar to the way we installed
2054   Apache.


       bayanihan:/home/pearliezl# apt-get install mysql-server
       The following extra packages will be installed:
       libdbd-mysql-perl libmysqlclient12 mysql-client mysql-common
       Suggested packages:
       mysql-doc
       The following NEW packages will be installed:
       libdbd-mysql-perl libmysqlclient12 mysql-client mysql-common mysql-server
       0 upgraded, 5 newly installed, 0 to remove and 5 not upgraded.
       Need to get 4523kB of archives.
       After unpacking 10.5MB of additional disk space will be used.
       Do you want to continue? [Y/n] y



2055   Once MySQL begins to install, we’ll get a brief warning screen. This is mainly to
2056   fill us in a little on how passwords will work. By default, the root user MySQL
2057   has no password (something you will want to change for a public server).
2058   Before moving on, we’ll make sure the MySQL service is running.


       bayanihan:/home/pearliezl# /etc/init.d/mysql start
       Starting MySQL database server: mysqld...already running.



2059   If you’d like to change some of MySQL’s settings from their default values, take
2060   a look at the files located in /etc/mysql.
2061   As with Apache, APT suggests we install the MySQL documentation. Just to be
2062   safe, we’ll go ahead and do that.


       bayanihan:/home/pearliezl# apt-get install mysql-doc
       Reading Package Lists... Done
       Building Dependency Tree... Done
       Package mysql-doc is not available, but is referred to by another package.


       142
Chapter 11. Special Topics                                   Bayanihan Linux 5


       This may mean that the package is missing, has been obsoleted, or
       is only available from another source
       E: Package mysql-doc has no installation candidate



2063   Unfortunately, this package has been removed from Debian. So if we want the
2064   documentation, we’ll have to grab the documents directly from MySQL.com.
2065   If you are already comfortable using MySQL from the command line, you can
2066   probably skip the section on phpMyAdmin further down. But if you aren’t,
2067   phpMyAdmin will make your life much easier.


2068   Setting up PHP

2069   While HTML is a useful markup language, it lacks the sophisticated scripting
2070   ability that the modern Web user expects. This is where scripting languages like
2071   JavaScript, ASP, and PHP are needed. In particular, server-side scripts like those
2072   used in PHP and ASP provide a framework for building security-minded Web
2073   interfaces.
2074   It is with good reason that most Linux-based hosts use PHP over ASP (and not
2075   because LAMA just doesn’t sound all that desirable). PHP is a completely free
2076   and open source operating system. Cost aside, there are security considerations
2077   here. PHP has certainly not had a spotless record of security, but flaws are found
2078   much more quickly and are fixed almost immediately.
2079   Now if you really want to use ASP, Apache can be made to support it. However,
2080   support is limited.
2081   Most of us, though, are using PHP (hence the popularity of LAMP) so we’ll go
2082   ahead and set it up. Again, this starts on the command line.


       bayanihan:/home/pearliezl# apt-get install php5
       Reading Package Lists... Done
       Building Dependency Tree... Done
       The following extra packages will be installed:
       apache-common libapache-mod-php4
       Suggested packages:
       apache apache-ssl apache-perl php4-pear
       The following NEW packages will be installed:
       apache-common libapache-mod-php4 php4
       0 upgraded, 3 newly installed, 0 to remove and 5 not upgraded.
       Need to get 2460kB of archives.


                                                                                     143
Bayanihan Linux 5                                      Chapter 11. Special Topics


       After unpacking 6357kB of additional disk space will be used.
       Do you want to continue? [Y/n] y



2083   Since we will be using both PHP and MySQL on our server, we’ll go ahead and
2084   install the PHP’s MySQL module to help them play together better. We’ll also
2085   install PHP’s Pear extensions since so many packages will require it.


       bayanihan:/home/pearliezl# apt-get install php5-mysql php5-pear
       Reading Package Lists... Done
       Building Dependency Tree... Done
       The following extra packages will be installed:
       php5-cli
       Suggested packages:
       php5-dev
       The following NEW packages will be installed:
       php5-cli php5-mysql php5-pear
       0 upgraded, 3 newly installed, 0 to remove and 5 not upgraded.
       Need to get 1860kB/1882kB of archives.
       After unpacking 5095kB of additional disk space will be used.
       Do you want to continue? [Y/n] y



2086   There are a few other packages we’ll need to install to get Apache working with
2087   PHP.


       bayanihan:/home/pearliezl# apt-get install libapache2-mod-php5 php5-cgi
       Reading Package Lists... Done
       Building Dependency Tree... Done
       The following extra packages will be installed:
       apache2-mpm-prefork
       The following packages will be REMOVED:
       apache2-mpm-worker
       The following NEW packages will be installed:
       apache2-mpm-prefork libapache2-mod-php4 php4-cgi
       0 upgraded, 3 newly installed, 1 to remove and 5 not upgraded.
       Need to get 5024kB of archives.
       After unpacking 9441kB of additional disk space will be used.
       Do you want to continue? [Y/n] y



2088   All the necessary packages are installed, but we aren’t quite done yet. Using your
2089   favorite text editor, we’ll need to make some changes to /etc/apache2/apache2.conf.

       144
Chapter 11. Special Topics                                   Bayanihan Linux 5


2090   First, locate the line ”#AddType application/xhttpdphp .php” and uncomment
2091   the line by removing the # from the beginning. Next, we’ll need to add the line
2092   below.
2093   LoadModule php4 module /usr/lib/apache2/modules/libphp5.so
2094   To get those changes to take effect, we’ll have to restart Apache. If we don’t, web
2095   browsers will be downloading our full PHP files rather than Apache processing
2096   them first.
2097   bayanihan:/home/pearliezl# /etc/init.d/apache2 restart
2098   To show that PHP is working, we’ll make a small PHP file and stick it in our web
2099   folder. Within the directory /home/pearliezl/public html, I’m going to add a file
2100   called index.php with the following contents:

2101   <?php
2102   phpinfo();
2103   ?>

2104   This will generate a PHP page at http://servername/ pearliezl/ that will tell us
2105   a lot about our PHP installation.


2106   Setting up phpMyAdmin

2107   Don’t listen to the people who’ll tell you that you are cheating if you don’t run
2108   MySQL from the command line. Not only is that method more difficult, but you
2109   risk doing more damage if you make a mistake.
2110   phpMyAdmin is a web interface designed specifically for administering MySQL.
2111   While there are times that MySQL is best used directly (like when you are moving
2112   a 50 MB database to a new co-located server), phpMyAdmin is commonly used
2113   to handle day-to-day database issues.
2114   The installation of phpMyAdmin is fairly straightforward.



       bayanihan:/home/pearliezl# apt-get install phpmyadmin
       Reading Package Lists... Done
       Building Dependency Tree... Done
       Suggested packages:
       php5-gd
       The following NEW packages will be installed:
       phpmyadmin


                                                                                     145
Bayanihan Linux 5                                       Chapter 11. Special Topics


       0 upgraded, 1 newly installed, 0 to remove and 5 not upgraded.
       Need to get 2768kB of archives.




2115   Once the installation begins, we’ll be presented with a question about which web
2116   servers to reconfigure. Since we used Apache2, be sure to check that. When
2117   prompted, go ahead and have Apache2 restarted.
2118   To test out phpMyAdmin, we’ll first point our web browser to http://servername/phpmyadmin/.
2119   We will connect using the username ”root” and a blank password. Once we do,
2120   phpMyAdmin will greet us with stern warning about our blank password. Click-
2121   ing on ”Change password” will allow us to set one and get rid of that warning.



2122   11.4       Installing an ftp/file server

2123   11.5       Installing an email server

2124   Section Author : Pearliezl S. Dy Tioco
2125


2126   This guide will show you how to setup Postfix mail server running alongside Cyrus
2127   SASL, Courier-IMAP and SquirrelMail. Once everything is setup you will be able
2128   to read and write emails using the SquirrelMail web interface and be able to access
2129   your email anywhere in the world!
2130   Install and Configure Postfix Postfix requires a DNS service running otherwise it
2131   will not work, follow this Debian Lenny Bind Howto guide if required. During the
2132   Postfix installation, Select Internet Site and enter your domain name for System
2133   mail name, ie example.com
2134   # apt-get install postfix
2135   Make sure you read the comments and change accordingly.
2136   # nano /etc/postfix/main.cf
2137   smtpd banner = $myhostname ESMTP $mail name (example.com) biff = no ap-
2138   pend dot mydomain = no
2139   ### your hostname here myhostname = server
2140   mydomain = example.com myorigin = $mydomain inet interfaces = all mydesti-
2141   nation = $mydomain, localhost.$mydomain, localhost

       146
Chapter 11. Special Topics                                    Bayanihan Linux 5


2142   ### your allowed networks mynetworks = 127.0.0.0/8,192.168.1.0/24
2143   smtpd sasl auth enable = yes smtpd sasl security options = noanonymous smtpd sasl local d
2144   = $mydomain broken sasl auth clients = yes
2145   smtpd require helo = yes smtpd helo restrictions = permit mynetworks, reject unknown clie
2146   reject invalid hostname, reject unknown hostname, reject non fqdn helo hostname
2147   smtpd client restrictions = permit mynetworks, reject unknown client, reject unknown addr
2148   smtpd sender restrictions = permit mynetworks, reject unknown client, reject unknown add
2149   smtpd recipient restrictions = permit mynetworks, permit sasl authenticated, re-
2150   ject unknown client, reject unauth destination
2151   home mailbox = Maildir/ alias maps = hash:/etc/aliases
2152   ### your ISP SMTP relay relayhost = relay.yourisp.net
2153   smtpd recipient limit = 250
2154   readme directory = /usr/share/doc/postfix html directory = /usr/share/doc/postfix/html
2155   Setup Postfix SASL Authentication
2156   # nano /etc/postfix/sasl/smtpd.conf
2157   pwcheck method: saslauthd mech list: plain login
2158   Aliases are used to map names with email accounts. This example will map all
2159   mail for root with you@example.com. You can add as many aliases as you like,
2160   my.nick and my.name are just examples.
2161   # nano /etc/aliases
2162   postmaster: root root: you@example.com my.nick: you@example.com my.name:
2163   you@example.com
2164   # newaliases
2165   Install SASL Authentication Edit saslauthd and change START=yes, dont touch
2166   the rest of the configuration.
2167   # apt-get install sasl2-bin libsasl2-2 libsasl2-modules # nano /etc/default/saslauthd
2168   START=yes
2169   We need to make sure chrooted Postfix can communicate with saslauthd.
2170   # rm -r /var/run/saslauthd/ # mkdir -p /var/spool/postfix/var/run/saslauthd #
2171   ln -s /var/spool/postfix/var/run/saslauthd /var/run # chgrp sasl /var/spool/postfix/var/ru
2172   # adduser postfix sasl
2173   Install Courier-IMAP During the install process it will ask Create directories for

                                                                                      147
Bayanihan Linux 5                                      Chapter 11. Special Topics


2174   web-based administration? say No.
2175   # apt-get install courier-imap # nano /etc/courier/authmodulelist
2176   authdaemon
2177   Install Squirrelmail
2178   # apt-get install squirrelmail # ln -s /etc/squirrelmail/apache.conf /etc/apache2/conf.d/squirrelmail.c
2179   # ln -s /usr/share/squirrelmail squirrelmail /var/www/squirrelmail # chgrp -R
2180   www-data /usr/share/squirrelmail/
2181   Add User and Setup Mailbox You will be asked for user you password, make sure
2182   you remember this password as this account will be used to access your email.
2183   # adduser you # su you $ maildirmake.courier /home/you/Maildir
2184   Start Postfix, Cyrus SASL, Courier-IMAP and Apache
2185   # /etc/init.d/postfix start # /etc/init.d/courier-imap start # /etc/init.d/courier-
2186   authdaemon start # /etc/init.d/saslauthd start # /etc/init.d/apache2 restart
2187   Test Postfix SMTP with Telnet This will create a string for SASL authentication,
2188   dont forget to insert 0 when they are needed.
2189   # perl -MMIME::Base64 -e ’print encode base64(”you0you0yourPASSWORD”);’
2190   eW91AHlvdQB5b3VyUEFTU1dPUkQ=
2191   Now we can telnet into the Postfix SMTP server and send a test email. Type in
2192   the commands in the places where I have indicated ¡¡¡’
2193   # telnet 192.168.1.20 25
2194   220 debian ESMTP Postfix (example.com) EHLO LOCALHOST ¡¡¡ 250-debian
2195   250-PIPELINING 250-SIZE 10240000 250-VRFY 250-ETRN 250-AUTH PLAIN
2196   LOGIN 250-AUTH=PLAIN LOGIN 250-ENHANCEDSTATUSCODES 250-8BITMIME
2197   250 DSN AUTH PLAIN eW91AHlvdQB5b3VyUEFTU1dPUkQ= ¡¡¡ 235 2.7.0 Au-
2198   thentication successful MAIL FROM:¡you@example.com¿ ¡¡¡ 250 2.1.0 Ok RCPT
2199   TO:¡you@example.com¿ ¡¡¡ 250 2.1.5 Ok DATA ¡¡¡ 354 End data with . THIS IS
2200   A TEST MESSAGE!! ¡¡¡ . ¡¡¡ 250 2.0.0 Ok: queued as 832291812D QUIT 221
2201   2.0.0 Bye
2202   Check Squirrelmail Fire up, http://example.com/squirrelmail and log in as the
2203   user you we created previously, hopefully you should see the test email we sent
2204   using telnet! You should now be able to send and receive email. Make sure the
2205   MX record in your registered domain name is pointing at your box, and you have
2206   forwarded port 25 on your firewall.



       148
Chapter 11. Special Topics                                     Bayanihan Linux 5


2207   11.6       Configuring NFS

2208   Section Author : Pearliezl S. Dy Tioco
2209


2210   1. Introduction 1.1 What is NFS?
2211   The Network File System (NFS) was developed to allow machines to mount a
2212   disk partition on a remote machine as if it were on a local hard drive. This allows
2213   for fast, seamless sharing of files across a network.
2214   It also gives the potential for unwanted people to access your hard drive over the
2215   network if you set it up incorrectly. So please read the Security section of this
2216   document carefully if you intend to implement an NFS setup.
2217   There are other systems that provide similar functionality to NFS. Samba provides
2218   file services to Windows clients. The Andrew File System fro IBM, recently open-
2219   sourced, provides a file sharing mechanism with some additional secutiry and
2220   performance features. The Coda File System is still in development as of this
2221   writhing but is designed to work well with disconected clients. Many of the
2222   features of the Andrew and Coda file systems are slated for inclusion in the next
2223   version of NFS (Version 4). The advantage of NFS today is that it is mature,
2224   standard, well understood, and supported robustly across a variety of platforms.
2225   1.2 The Purpose of this Document
2226   What is the HOWTO and what is it NOT?
2227   This HOWTO is intended as a complete, step-by-step guide to setting up NFS
2228   correctly and effectively. Setting up NFS involves two steps, namely configuring
2229   the server and then configuring the client. Each of these steps is dealt with in
2230   order. The document then offers some tips for people with particular needs and
2231   hardware setups, as well as security and troubleshooting advice.
2232   This HOWTO is not a description of the guts and underlying structure of NFS.
2233   For that you may wish to read Managing NFS and NIS by Hal Stern, published
2234
             ´
       by OReilly & Associates, Inc. While that book is severely out of date, much of
2235   the structure of NFS has not changed, and the book describes it very articulately.
2236   A much more advanced and up-to-ate technical description of NFS is available in
2237   NFS illustrated by Brent Callaghan.
2238   2. Setting Up an NFS Server
2239   2.1 Introduction to Server Setup
2240   It is assumed that you will be setting up both a server and a client. If you are just
2241   setting up a client to work off of somebody else’s server, you can skip to ”Setting

                                                                                        149
Bayanihan Linux 5                                         Chapter 11. Special Topics


2242   up an NFS Client”. However, every client that is set up requires modifications
2243   on the server to authorize that client (unless the server setup is done in a very
2244   insecure way), so even if you are not setting up a server you may wish to read
2245   this section to get an idea what kind of authorization problems to look out for.
2246   Setting up the server will be done in two steps: Setting up the configuration files
2247   for NFS, and then starting the NFS services.
2248   2.2 Setting up the Configuration files
2249   There are three main configuration files you will need to edit to set up an NFS
2250   server: /etc/exports, /etc/hosts.allow, and /etc/host.deny . Strictly speaking,
2251   you only need to edit /etc/exports to get NFS to work, but you would be left
2252   with an extremely insecure setup. You may also need to edit your startup scripts;
2253   ”Setting Up an NFS Server” for more on that.
2254   2.2.1 /etc/exports
2255   This file contains a list of entries; each entry indicates a volume that is shared and
2256   how it is shared. Check the man pages (man exports) for a complete description
2257   of all the setup options for the file, although the description here will probably
2258   satisfy most peoples needs.
2259   An entry in /etc/exports will typically look like this:
2260   directory machine1(option11, option12) machine2(option21, option22)
2261   where
2262   directory
2263   the directory that you want to share. It may be an entire volume thought it need
2264   not be. If you share a directory, then all directories under it within the same file
2265   system will be shared as well.
2266   machine1 and machine2
2267   client machines that will have access to the directory. The machines may be
2268   listed by their DNS address or their IP address (e.g. machine. company.com or
2269   192.168.0.1). Using IP addresses is more reliable and more secure. If you need to
2270   use DNS addresses, and they do not seem to be resolving to the right machine,
2271   ”Troubleshooting”.
2272   optionxx
2273   the option listing for each machine will describe what kind of access that machine
2274   will have. Important options are:
2275   ro: The directory is shared read only; the client machine will not be able to write


       150
Chapter 11. Special Topics                                     Bayanihan Linux 5


2276   it. This is the default.
2277   rw: The client machine will have read and write access to the directory.
2278   no root squash: By default, any file request made by user root on the client
2279   machine is treated as if it is made by user nobody on the server. (Exactly which
2280   UID the request is mapped to depends on the UID of user ”nobody” on the server,
2281   not the client.) If no root squash is selected, then root on the client machine will
2282   have the same level of access to the files on the system as root on the server.
2283   This can have serious security implications, although it may be necessary if you
2284   want to perform any administrative work on the client machine that involves the
2285   exported directories. You should not specify this option without a good reason.
2286   no subtree check: If only part of a volume is exported, a routine called subtree
2287   checking verifies that a file that is requested from the client is in the appropriate
2288   part of the volume. If the entire volume is exported. disabling this check will
2289   speed up transfers.
2290   sync: By default, all but the most recent version (version 1.11) of the exportfs
2291   command will use async behavior, telling a client machine that a file write is
2292   complete that is, has been written to stable storage when NFS has finished
2293   handling the write over to the filesystem. This behavior may cause data corruption
2294   if the server reboots, and the sync option prevents this. See ”Optimizing NFS
2295   Performance” for a complete discussion of sync and async behavior. Suppose we
2296   have two client machines, slave1 and slave2, that have IP addresses 192.168.0.1
2297   and 192.168.0.2, respectively. We wish to share our software binaries and home
2298   directories with these machines. A typical setup for /etc/exports might look like
2299   this:
2300   /usr/local 192.168.0.1(ro) 192.168.0.2(ro) /home 192.168.0.1(rw) 192.168.0.2(rw)
2301   Here we are sharing /usr/local read-only to slave1 and slave2, because it probably
2302   contains our software and there may not be benefits to allowing slave1 and slave2
2303   to write to it that outweigh security concerns. On the other hand, home directories
2304   need to be exported read-write if users are to save their work on them.
2305   If you have a large installation, you may find that you have a bunch of computers
2306   all on the same local network that require access to your server. There are a few
2307   ways of simplifying references to large numbers of machines. First, you can give
2308   access to a range of machines at once by specifying a network and a netmask.
2309   For example, if you wanted to allow access to all the machines with IP addresses
2310   between 192.168.0.0 and 192.168.0.255 then you could have the entries:
2311   /usr/local 192.168.0.0/255.255.255.0(ro) /home 192.168.0.0/255.255.255.0(rw)
2312   See the ”Networking-Overview HOWTO” for further information on how net-
2313   masks, and you may also wish to look at the man pages for init and hosts.allow.


                                                                                       151
Bayanihan Linux 5                                        Chapter 11. Special Topics


2314   Second, you can use NIS netgroups in your entry. To specify a netgroup in your
2315   exports file, simple prepend the name of the netgroup with an ”@”. See the ”NIS
2316   HOWTO” for details on how netgroups work.
2317   Third, you can use wildcards such as *.foo.com or 192.168. instead of hostnames.
2318   There were problems with wildcard implementation in the 2.2 kernel series that
2319   were fixed in kernel 2.219.
2320   However, you should keep in mind that any of these simplications could cause a
2321   security risk if there are machines in your netgroup or local network that you do
2322   not trust completely.
2323   A few cautions are in order about wat cannot (or should not) be exported. First,
2324   if a directory is exported, its parent and child directories cannot be exported if
2325   they are in the same filesystem. However, exporting both should not be neces-
2326   sary because listing the parent directory in the /etc/exports file will cause all
2327   underlying directories within that file system to be exported.
2328   Second, it is a poor idea to export a FAT or VFAT (i.e, MS-DOS or Windows
2329   95/98) filesystem with NFS. FAT is not designed for use on a multi-user machine,
2330   and as a result, operations that depend on permissions will not work well. More-
2331   over, some of the underlying filesystem design is reported to work poorly with
2332   NFSs expectations.
2333   Third, device or other special files may not export correctly to non-Linux clients.
2334   See ”Using Linux NFS with other OSes” for details on particular operating sys-
2335   tems.
2336   2.2.2 /etc/hosts.allow and /etc/hosts.deny
2337   These two files specify which computers on the network can use services on your
2338   machine. Each line of the file contains a single entry listing a service and a set of
2339   machines. When the server gets a request from a machine, it does the following:
2340   1. It first checks host.allow to see if the machine a rule listed hee. If it does,
2341   then the machine is allowed access. 2. If the machine does not match an entry
2342   in hosts.allow the server then checks hosts.deny to see if the client matches a rule
2343   listed there. If it does then the machine is denied access. 3. If the client matches
2344   no listings in either file, then it is allowed access. In addition to controlling
2345   access to services handled by inetd(such as telnet and FTP), this file can also
2346   control access to NFS by restricting connections to the daemons that provide
2347   NFS services. Restrictions are done on a per-service basis.
2348   The first daemon to restrict access to is the portmapper. This daemon essen-
2349   tially just tells requesting clients how to find all the NFS services on the system.
2350   Restricting access to the portmapper is the best defense against someone break-
2351   ing into your system through NFS because completely unauthorized clients wont


       152
Chapter 11. Special Topics                                        Bayanihan Linux 5


2352   know where to find the NFS daemons. However, there are two things to watch out
2353   for. First, restricting portmapper will also restrict requests to NIS. That should
2354   usually be harmless since you usually want to restrict NFS and IS in a similar
2355   way but just be cautioned. (Running NIS is generally a good idea if you are
2356   running NFS, because the client machines need a way of knowing who owns what
2357   files on the exported volumes. OF course there are other ways of doing this such
2358   as syncing password files. See the ”NIS HOWTO” for information on setting up
2359   NIS.)
2360   In general it is a good idea with NFS (as with most internet services) to explicitly
2361   deny access to IP addresses that you dont need to allow access to.
2362   The first step in doing this is to add the following entry to /etc/hosts.deny:
2363   portmap:ALL
2364   Starting with nfs-utils 0.2.0, you can be a bit more carefule by controlling access
2365   to individual daemons. It’s a good precaution since an intruder will often be able
2366   to weasel around the portmapper. If you have a newer version of nfs-utils, add
2367   entries for each of the NFS daemons.
2368   lockd:ALL mountd:ALL rquotad:ALL statd:ALL
2369   Even if you have an older version of nfs-utils, adding these entries is at worst
2370   harmless and at best will save you some trouble when you upgrade. Some sys
2371   admins choose to put the entry ALL:ALL in the file /etc/hosts.deny, which causes
2372   any service that looks at these files to deny access to all hosts unless it is explicitly
2373   allowed. While this is more secure behavior, it may also get you in trouble when
2374   you are installing new services. you forget you put it there and you cant figure
2375   out for the life of you why they wont work.
2376   Next, we need to add an entry to hosts.allow to give any hosts access that we
2377   want to have access. (If we just leave the above lines in hosts.deny then nobody
2378   will have access to NFS.) Entries in hosts.allow follow the format:
2379   service: host[or network/netmask] , host [or network/netmask]
2380   Here, host is IP address of a potential client; it may be possible in some versions
2381   to use the DNS name of the host, but it is strongly discouraged.
2382   Suppose we have the setup above and we just want to allow access to slave1.foo.com
2383   and slave2.foo.com, and suppose that the IP addresses of these machines are
2384   192.168.0.1 and 192.168.0.2, respectively. We could add the following entry to
2385   /etc/hosts.allow:
2386   portmap: 192.168.0.1 , 192.168.0.2
2387   For recent nfs-utils versions, we would also add the following (again, these entries


                                                                                           153
Bayanihan Linux 5                                       Chapter 11. Special Topics


2388   are harmless even if they are not supported):
2389   lockd: 192.168.0.1 , 192.168.0.2 rquotad: 192.168.0.1 , 192.168.0.2 mountd: 192.168.0.1
2390   , 192.168.0.2 statd: 192.168.0.1 , 192.168.0.2
2391   2.3 Getting the services Started
2392   2.3.1 Pre-requisites
2393   The NFS server should now be configured and we can start it running. First, you
2394   will need to have the appropriate packages installed. This consists mainly of a
2395   new enough kernel and a new enough version of the nfs-utils package. See Section
2396   2, Introduction if you are in doubt.
2397   Next, before you can start NFS, you will need to have TCP/IP networking func-
2398   tioning correctly on your machine. If you can use telnet, FTP, and so on, then
2399   chances are your TCP networking is fine.
2400   That said, with most recent Linux distributions you may be able to get NFS up
2401   and running simply by rebooting your machine, and the startup scripts should
2402   detect that you have set up your /etc/exports file and will start up NFS correctly.
2403   If you try this, see Section 4, Setting up an NFS Client Verifying that NFS
2404   is running. If this does not work, or if you are not in a position to reboot your
2405   machine, then the following section will tell you which daemons need to be started
2406   in order to run NFS services. If for some reason nfsd was already running when
2407   you edited your configuration files above, you will have to flush your configuration;
2408   see Section 4, Setting up an NFS Client for details.
2409   2.3.2 Starting the Portmapper
2410   NFS depends on the portmapper daemon, either called portmap or rpc.portmap.
2411   It will need to be started first. It should be located in /sbin but is sometimes in
2412   /usr/sbin. Most recent Linux distributions start this daemon in the boot scripts,
2413   but it is worth making sure that it is running before you begin working with NFS
2414   (just type ps aux — grep portmap).
2415   2.3.3 The Daemons
2416   NFS serving is taken care of by five daemons: rpc.nfsd, which does most of
2417   the work; rpc.lockd and rpc.statd, which handle file locking; rpc.mountd, which
2418   handles the initial mount requests, and rpc.rquotad, which handles user file quotas
2419   on exported volumes. Starting with 2.2.18, lockd is called by nfsd upon demand,
2420   so you do not need to worry about starting it yourself. statd will need to be
2421   started separately. Most recent Linux distributions will have startup scripts for
2422   these daemons.
2423   The daemons are all part of the nfs-utils package, and may be either in the /sbin
2424   directory or the /usr/sbin directory.

       154
Chapter 11. Special Topics                                    Bayanihan Linux 5


2425   If your distribution does not include them in the startup scripts, then then you
2426   should add them, configured to start in the following order:
2427   rpc.portmap rpc.mountd, rpc.nfsd rpc.statd, rpc.lockd (if necessary), and rpc.rquotad
2428   The nfs-utils package has sample startup scripts for RedHat and Debian. If you
2429   are using a different distribution, in general you can just copy the RedHat script,
2430   but you will probably have to take out the line that says:
2431   . ../init.d/functions
2432   to avoid getting error messages.
2433   2.3.4 Verifying that NFS is running
2434   To do this, query the portmapper with the command rpcinfo quota to find out
2435   what services it is providing. You should get something like this:
2436   program vers proto port 100000 2 tcp 111 portmapper 100000 2 udp 111 portmap-
2437   per 100011 1 udp 749 rquotad 100011 2 udp 749 rquotad 100005 1 udp 759 mountd
2438   100005 1 tcp 761 mountd 100005 2 udp 764 mountd 100005 2 tcp 766 mountd
2439   100005 3 udp 769 mountd 100005 3 tcp 771 mountd 100003 2 udp 2049 nfs 100003
2440   3 udp 2049 nfs 300019 1 tcp 830 amd 300019 1 udp 831 amd 100024 1 udp 944
2441   status 100024 1 tcp 946 status 100021 1 udp 1042 nlockmgr 100021 3 udp 1042
2442   nlockmgr 100021 4 udp 1042 nlockmgr 100021 1 tcp 1629 nlockmgr 100021 3 tcp
2443   1629 nlockmgr 100021 4 tcp 1629 nlockmgr
2444   This says that we have NFS versions 2 and 3, rpc.statd version 1, network lock
2445   manager (the service name for rpc.lockd) versions 1, 3, and 4. There are also
2446   different service listings depending on whether NFS is travelling over TCP or
2447   UDP. Linux systems use UDP by default unless TCP is explicitly requested;
2448   however other OSes such as Solaris default to TCP.
2449   If you do not at least see a line that says portmapper, a line that says nfs, and a
2450   line that says mountd then you will need to backtrack and try again to start up
2451   the daemons (see Troubleshooting if this still doesn’t work).
2452   If you do see these services listed, then you should be ready to set up NFS clients
2453   to access files from your server.
2454   2.3.5 Making Changes to /etc/exports later on
2455   If you come back and change your /etc/exports file, the changes you make may
2456   not take effect immediately. You should run the command exportfs -ra to force
2457   nfsd to re-read the /etc/exports file. If you can’t find the exportfs command, then
2458   you can kill nfsd with the -HUP flag (see the man pages for kill for details).
2459   If that still doesn’t work, don’t forget to check hosts.allow to make sure you


                                                                                      155
Bayanihan Linux 5                                      Chapter 11. Special Topics


2460   haven’t forgotten to list any new client machines there. Also check the host
2461   listings on any firewalls you may have set up (see Troubleshooting and Security
2462   and NFS for more details on firewalls and NFS).
2463   3. Setting up an NFS Client
2464   3.1 Mounting Remote Directories
2465   Before beginning, you should double-check to make sure your mount program is
2466   new enough (version 2.10m if you want to use Version 3 NFS), and that the client
2467   machine supports NFS mounting, though most standard distributions do. If you
2468   are using a 2.2 or later kernel with the /proc filesystem you can check the latter
2469   by reading the file /proc/filesystems and making sure there is a line containing
2470   nfs. If not, typing insmod nfs may make it magically appear if NFS has been
2471   compiled as a module; otherwise, you will need to build (or download) a kernel
2472   that has NFS support built in. In general, kernels that do not have NFS compiled
2473   in will give a very specific error when the mount command below is run.
2474   To begin using machine as an NFS client, you will need the portmapper running
2475   on that machine, and to use NFS file locking, you will also need rpc.statd and
2476   rpc.lockd running on both the client and the server. Most recent distributions
2477   start those services by default at boot time; if yours doesn’t, see Setting up an
2478   NFS Client for information on how to start them up.
2479   With portmap, lockd, and statd running, you should now be able to mount the
2480   remote directory from your server just the way you mount a local hard drive,
2481   with the mount command. Continuing our example from the previous section,
2482   suppose our server above is called master.foo.com,and we want to mount the
2483   /home directory on slave1.foo.com. Then, all we have to do, from the root prompt
2484   on slave1.foo.com, is type:
2485   # mount master.foo.com:/home /mnt/home
2486   and the directory /home on master will appear as the directory /mnt/home on
2487   slave1. (Note that this assumes we have created the directory /mnt/home as an
2488   empty mount point beforehand.)
2489   If this does not work, see Troubleshooting.
2490   You can get unmount the file system by typing:
2491   # umount /mnt/home
2492   Just like you would for a local file system.
2493   3.2 Getting NFS File Systems to be Mounted at Boot Time
2494   NFS file systems can be added to your /etc/fstab file the same way local file


       156
Chapter 11. Special Topics                                     Bayanihan Linux 5


2495   systems can, so that they mount when your system starts up. The only difference
2496   is that the file system type will be set to nfs and the dump and fsck order (the
2497   last two entries) will have to be set to zero. So for our example above, the entry
2498   in /etc/fstab would look like:
2499   # device mountpoint fs-type options dump fsckorder ... master.foo.com:/home
2500   /mnt nfs rw 0 0 ...
2501   See the man pages for fstab if you are unfamiliar with the syntax of this file. If you
2502   are using an automounter such as amd or autofs, the options in the corresponding
2503   fields of your mount listings should look very similar if not identical.
2504   At this point you should have NFS working, though a few tweaks may still be
2505   necessary to get it to work well. You should also read Section 6, Security and
2506   NFS to be sure your setup is reasonably secure.
2507   3.3 Mount Options
2508   3.3.1 Soft versus Hard Mounting
2509   There are some options you should consider adding at once. They govern the way
2510   the NFS client handles a server crash or network outage. One of the cool things
2511   about NFS is that it can handle this gracefully. If you set up the clients right.
2512   There are two distinct failure modes:
2513   soft
2514   If a file request fails, the NFS client will report an error to the process on the
2515   client machine requesting the file access. Some programs can handle this with
2516   composure, most won’t. We do not recommend using this setting; it is a recipe
2517   for corrupted files and lost data. You should especially not use this for mail disks
2518   — if you value your mail, that is.
2519   hard
2520   The program accessing a file on a NFS mounted file system will hang when the
2521   server crashes. The process cannot be interrupted or killed (except by a ”sure
2522   kill”) unless you also specify intr. When the NFS server is back online the program
2523   will continue undisturbed from where it was. We recommend using hard,intr on
2524   all NFS mounted file systems.
2525   Picking up from the previous example, the fstab would now look like:
2526   # device mountpoint fs-type options dump fsckord ... master.foo.com:/home
2527   /mnt/home nfs rw,hard,intr 0 0 ...
2528   The rsize and wsize mount options specify the size of the chunks of data that the
2529   client and server pass back and forth to each other.


                                                                                        157
Bayanihan Linux 5                                       Chapter 11. Special Topics


2530   The defaults may be too big or to small; there is no size that works well on all or
2531   most setups. On the one hand, some combinations of Linux kernels and network
2532   cards (largely on older machines) cannot handle blocks that large. On the other
2533   hand, if they can handle larger blocks, a bigger size might be faster.
2534   Getting the block size right is an important factor in performance and is a must if
2535   you are planning to use the NFS server in a production environment. See Section
2536   5, Optimizing NFS Performance for details.



2537   11.7      BIND / DNS servers




       158
2538


2539                                                                        APPENDIX

2540                                                                                  A
2541




2542                                                                       GNU GPL



2543            GNU GENERAL PUBLIC LICENSE Version 3, 29 June 2007
2544        Copyright c 2007 Free Software Foundation, Inc. http://fsf.org/


2545         Everyone is permitted to copy and distribute verbatim copies of this
2546                   license document, but changing it is not allowed.


2547   The GNU General Public License is a free, copyleft license for software and other
2548   kinds of works.
2549   The licenses for most software and other practical works are designed to take away
2550   your freedom to share and change the works. By contrast, the GNU General
2551   Public License is intended to guarantee your freedom to share and change all
2552   versions of a program–to make sure it remains free software for all its users. We,
2553   the Free Software Foundation, use the GNU General Public License for most of
2554   our software; it applies also to any other work released this way by its authors.
2555   You can apply it to your programs, too.
2556   When we speak of free software, we are referring to freedom, not price. Our
2557   General Public Licenses are designed to make sure that you have the freedom
2558   to distribute copies of free software (and charge for them if you wish), that you
2559   receive source code or can get it if you want it, that you can change the software
2560   or use pieces of it in new free programs, and that you know you can do these
2561   things.

                                              159
Bayanihan Linux 5                                          Appendix A. GNU GPL


2562   To protect your rights, we need to prevent others from denying you these rights
2563   or asking you to surrender the rights. Therefore, you have certain responsibilities
2564   if you distribute copies of the software, or if you modify it: responsibilities to
2565   respect the freedom of others.
2566   For example, if you distribute copies of such a program, whether gratis or for a
2567   fee, you must pass on to the recipients the same freedoms that you received. You
2568   must make sure that they, too, receive or can get the source code. And you must
2569   show them these terms so they know their rights.
2570   Developers that use the GNU GPL protect your rights with two steps: (1) as-
2571   sert copyright on the software, and (2) offer you this License giving you legal
2572   permission to copy, distribute and/or modify it.
2573   For the developers’ and authors’ protection, the GPL clearly explains that there
2574   is no warranty for this free software. For both users’ and authors’ sake, the GPL
2575   requires that modified versions be marked as changed, so that their problems will
2576   not be attributed erroneously to authors of previous versions.
2577   Some devices are designed to deny users access to install or run modified versions
2578   of the software inside them, although the manufacturer can do so. This is fun-
2579   damentally incompatible with the aim of protecting users’ freedom to change the
2580   software. The systematic pattern of such abuse occurs in the area of products for
2581   individuals to use, which is precisely where it is most unacceptable. Therefore,
2582   we have designed this version of the GPL to prohibit the practice for those prod-
2583   ucts. If such problems arise substantially in other domains, we stand ready to
2584   extend this provision to those domains in future versions of the GPL, as needed
2585   to protect the freedom of users.
2586   Finally, every program is threatened constantly by software patents. States should
2587   not allow patents to restrict development and use of software on general-purpose
2588   computers, but in those that do, we wish to avoid the special danger that patents
2589   applied to a free program could make it effectively proprietary. To prevent this,
2590   the GPL assures that patents cannot be used to render the program non-free.
2591   The precise terms and conditions for copying, distribution and modification follow.


2592                         Terms and Conditions

2593     0. Definitions.
2594         “This License” refers to version 3 of the GNU General Public License.
2595         “Copyright” also means copyright-like laws that apply to other kinds of
2596         works, such as semiconductor masks.
2597         “The Program” refers to any copyrightable work licensed under this License.

       160
Appendix A. GNU GPL                                          Bayanihan Linux 5


2598       Each licensee is addressed as “you”. “Licensees” and “recipients” may be
2599       individuals or organizations.
2600       To “modify” a work means to copy from or adapt all or part of the work in
2601       a fashion requiring copyright permission, other than the making of an exact
2602       copy. The resulting work is called a “modified version” of the earlier work
2603       or a work “based on” the earlier work.
2604       A “covered work” means either the unmodified Program or a work based
2605       on the Program.
2606       To “propagate” a work means to do anything with it that, without permis-
2607       sion, would make you directly or secondarily liable for infringement under
2608       applicable copyright law, except executing it on a computer or modifying a
2609       private copy. Propagation includes copying, distribution (with or without
2610       modification), making available to the public, and in some countries other
2611       activities as well.
2612       To “convey” a work means any kind of propagation that enables other par-
2613       ties to make or receive copies. Mere interaction with a user through a
2614       computer network, with no transfer of a copy, is not conveying.
2615       An interactive user interface displays “Appropriate Legal Notices” to the
2616       extent that it includes a convenient and prominently visible feature that (1)
2617       displays an appropriate copyright notice, and (2) tells the user that there is
2618       no warranty for the work (except to the extent that warranties are provided),
2619       that licensees may convey the work under this License, and how to view a
2620       copy of this License. If the interface presents a list of user commands or
2621       options, such as a menu, a prominent item in the list meets this criterion.

2622     1. Source Code.
2623       The “source code” for a work means the preferred form of the work for
2624       making modifications to it. “Object code” means any non-source form of a
2625       work.
2626       A “Standard Interface” means an interface that either is an official standard
2627       defined by a recognized standards body, or, in the case of interfaces speci-
2628       fied for a particular programming language, one that is widely used among
2629       developers working in that language.
2630       The “System Libraries” of an executable work include anything, other than
2631       the work as a whole, that (a) is included in the normal form of packaging
2632       a Major Component, but which is not part of that Major Component, and
2633       (b) serves only to enable use of the work with that Major Component, or
2634       to implement a Standard Interface for which an implementation is available
2635       to the public in source code form. A “Major Component”, in this context,
2636       means a major essential component (kernel, window system, and so on) of
2637       the specific operating system (if any) on which the executable work runs,

                                                                                     161
Bayanihan Linux 5                                         Appendix A. GNU GPL


2638         or a compiler used to produce the work, or an object code interpreter used
2639         to run it.
2640         The “Corresponding Source” for a work in object code form means all the
2641         source code needed to generate, install, and (for an executable work) run
2642         the object code and to modify the work, including scripts to control those
2643         activities. However, it does not include the work’s System Libraries, or
2644         general-purpose tools or generally available free programs which are used
2645         unmodified in performing those activities but which are not part of the
2646         work. For example, Corresponding Source includes interface definition files
2647         associated with source files for the work, and the source code for shared
2648         libraries and dynamically linked subprograms that the work is specifically
2649         designed to require, such as by intimate data communication or control flow
2650         between those subprograms and other parts of the work.
2651         The Corresponding Source need not include anything that users can regen-
2652         erate automatically from other parts of the Corresponding Source.
2653         The Corresponding Source for a work in source code form is that same work.

2654     2. Basic Permissions.
2655         All rights granted under this License are granted for the term of copyright
2656         on the Program, and are irrevocable provided the stated conditions are
2657         met. This License explicitly affirms your unlimited permission to run the
2658         unmodified Program. The output from running a covered work is covered
2659         by this License only if the output, given its content, constitutes a covered
2660         work. This License acknowledges your rights of fair use or other equivalent,
2661         as provided by copyright law.
2662         You may make, run and propagate covered works that you do not con-
2663         vey, without conditions so long as your license otherwise remains in force.
2664         You may convey covered works to others for the sole purpose of having
2665         them make modifications exclusively for you, or provide you with facilities
2666         for running those works, provided that you comply with the terms of this
2667         License in conveying all material for which you do not control copyright.
2668         Those thus making or running the covered works for you must do so ex-
2669         clusively on your behalf, under your direction and control, on terms that
2670         prohibit them from making any copies of your copyrighted material outside
2671         their relationship with you.
2672         Conveying under any other circumstances is permitted solely under the con-
2673         ditions stated below. Sublicensing is not allowed; section 10 makes it un-
2674         necessary.

2675     3. Protecting Users’ Legal Rights From Anti-Circumvention Law.
2676         No covered work shall be deemed part of an effective technological measure
2677         under any applicable law fulfilling obligations under article 11 of the WIPO

       162
Appendix A. GNU GPL                                         Bayanihan Linux 5


2678       copyright treaty adopted on 20 December 1996, or similar laws prohibiting
2679       or restricting circumvention of such measures.
2680       When you convey a covered work, you waive any legal power to forbid
2681       circumvention of technological measures to the extent such circumvention is
2682       effected by exercising rights under this License with respect to the covered
2683       work, and you disclaim any intention to limit operation or modification of
2684       the work as a means of enforcing, against the work’s users, your or third
2685       parties’ legal rights to forbid circumvention of technological measures.

2686     4. Conveying Verbatim Copies.
2687       You may convey verbatim copies of the Program’s source code as you receive
2688       it, in any medium, provided that you conspicuously and appropriately pub-
2689       lish on each copy an appropriate copyright notice; keep intact all notices
2690       stating that this License and any non-permissive terms added in accord
2691       with section 7 apply to the code; keep intact all notices of the absence of
2692       any warranty; and give all recipients a copy of this License along with the
2693       Program.
2694       You may charge any price or no price for each copy that you convey, and
2695       you may offer support or warranty protection for a fee.

2696     5. Conveying Modified Source Versions.
2697       You may convey a work based on the Program, or the modifications to
2698       produce it from the Program, in the form of source code under the terms of
2699       section 4, provided that you also meet all of these conditions:

2700        (a) The work must carry prominent notices stating that you modified it,
2701            and giving a relevant date.
2702        (b) The work must carry prominent notices stating that it is released under
2703            this License and any conditions added under section 7. This require-
2704            ment modifies the requirement in section 4 to “keep intact all notices”.
2705        (c) You must license the entire work, as a whole, under this License to
2706            anyone who comes into possession of a copy. This License will there-
2707            fore apply, along with any applicable section 7 additional terms, to the
2708            whole of the work, and all its parts, regardless of how they are pack-
2709            aged. This License gives no permission to license the work in any other
2710            way, but it does not invalidate such permission if you have separately
2711            received it.
2712        (d) If the work has interactive user interfaces, each must display Appropri-
2713            ate Legal Notices; however, if the Program has interactive interfaces
2714            that do not display Appropriate Legal Notices, your work need not
2715            make them do so.

                                                                                    163
Bayanihan Linux 5                                           Appendix A. GNU GPL


2716         A compilation of a covered work with other separate and independent works,
2717         which are not by their nature extensions of the covered work, and which are
2718         not combined with it such as to form a larger program, in or on a volume of
2719         a storage or distribution medium, is called an “aggregate” if the compilation
2720         and its resulting copyright are not used to limit the access or legal rights of
2721         the compilation’s users beyond what the individual works permit. Inclusion
2722         of a covered work in an aggregate does not cause this License to apply to
2723         the other parts of the aggregate.

2724     6. Conveying Non-Source Forms.
2725         You may convey a covered work in object code form under the terms of
2726         sections 4 and 5, provided that you also convey the machine-readable Cor-
2727         responding Source under the terms of this License, in one of these ways:

2728          (a) Convey the object code in, or embodied in, a physical product (includ-
2729              ing a physical distribution medium), accompanied by the Correspond-
2730              ing Source fixed on a durable physical medium customarily used for
2731              software interchange.
2732         (b) Convey the object code in, or embodied in, a physical product (includ-
2733             ing a physical distribution medium), accompanied by a written offer,
2734             valid for at least three years and valid for as long as you offer spare
2735             parts or customer support for that product model, to give anyone who
2736             possesses the object code either (1) a copy of the Corresponding Source
2737             for all the software in the product that is covered by this License, on
2738             a durable physical medium customarily used for software interchange,
2739             for a price no more than your reasonable cost of physically perform-
2740             ing this conveying of source, or (2) access to copy the Corresponding
2741             Source from a network server at no charge.
2742          (c) Convey individual copies of the object code with a copy of the written
2743              offer to provide the Corresponding Source. This alternative is allowed
2744              only occasionally and noncommercially, and only if you received the
2745              object code with such an offer, in accord with subsection 6b.
2746         (d) Convey the object code by offering access from a designated place
2747             (gratis or for a charge), and offer equivalent access to the Correspond-
2748             ing Source in the same way through the same place at no further charge.
2749             You need not require recipients to copy the Corresponding Source along
2750             with the object code. If the place to copy the object code is a network
2751             server, the Corresponding Source may be on a different server (oper-
2752             ated by you or a third party) that supports equivalent copying facilities,
2753             provided you maintain clear directions next to the object code saying
2754             where to find the Corresponding Source. Regardless of what server
2755             hosts the Corresponding Source, you remain obligated to ensure that
2756             it is available for as long as needed to satisfy these requirements.

       164
Appendix A. GNU GPL                                           Bayanihan Linux 5


2757        (e) Convey the object code using peer-to-peer transmission, provided you
2758            inform other peers where the object code and Corresponding Source
2759            of the work are being offered to the general public at no charge under
2760            subsection 6d.

2761       A separable portion of the object code, whose source code is excluded from
2762       the Corresponding Source as a System Library, need not be included in
2763       conveying the object code work.
2764       A “User Product” is either (1) a “consumer product”, which means any
2765       tangible personal property which is normally used for personal, family, or
2766       household purposes, or (2) anything designed or sold for incorporation into a
2767       dwelling. In determining whether a product is a consumer product, doubtful
2768       cases shall be resolved in favor of coverage. For a particular product received
2769       by a particular user, “normally used” refers to a typical or common use of
2770       that class of product, regardless of the status of the particular user or of the
2771       way in which the particular user actually uses, or expects or is expected to
2772       use, the product. A product is a consumer product regardless of whether
2773       the product has substantial commercial, industrial or non-consumer uses,
2774       unless such uses represent the only significant mode of use of the product.
2775       “Installation Information” for a User Product means any methods, pro-
2776       cedures, authorization keys, or other information required to install and
2777       execute modified versions of a covered work in that User Product from a
2778       modified version of its Corresponding Source. The information must suffice
2779       to ensure that the continued functioning of the modified object code is in
2780       no case prevented or interfered with solely because modification has been
2781       made.
2782       If you convey an object code work under this section in, or with, or specif-
2783       ically for use in, a User Product, and the conveying occurs as part of a
2784       transaction in which the right of possession and use of the User Product is
2785       transferred to the recipient in perpetuity or for a fixed term (regardless of
2786       how the transaction is characterized), the Corresponding Source conveyed
2787       under this section must be accompanied by the Installation Information.
2788       But this requirement does not apply if neither you nor any third party re-
2789       tains the ability to install modified object code on the User Product (for
2790       example, the work has been installed in ROM).
2791       The requirement to provide Installation Information does not include a re-
2792       quirement to continue to provide support service, warranty, or updates for
2793       a work that has been modified or installed by the recipient, or for the User
2794       Product in which it has been modified or installed. Access to a network
2795       may be denied when the modification itself materially and adversely af-
2796       fects the operation of the network or violates the rules and protocols for
2797       communication across the network.

                                                                                       165
Bayanihan Linux 5                                          Appendix A. GNU GPL


2798         Corresponding Source conveyed, and Installation Information provided, in
2799         accord with this section must be in a format that is publicly documented
2800         (and with an implementation available to the public in source code form),
2801         and must require no special password or key for unpacking, reading or copy-
2802         ing.

2803     7. Additional Terms.
2804         “Additional permissions” are terms that supplement the terms of this Li-
2805         cense by making exceptions from one or more of its conditions. Additional
2806         permissions that are applicable to the entire Program shall be treated as
2807         though they were included in this License, to the extent that they are valid
2808         under applicable law. If additional permissions apply only to part of the
2809         Program, that part may be used separately under those permissions, but
2810         the entire Program remains governed by this License without regard to the
2811         additional permissions.
2812         When you convey a copy of a covered work, you may at your option remove
2813         any additional permissions from that copy, or from any part of it. (Addi-
2814         tional permissions may be written to require their own removal in certain
2815         cases when you modify the work.) You may place additional permissions on
2816         material, added by you to a covered work, for which you have or can give
2817         appropriate copyright permission.
2818         Notwithstanding any other provision of this License, for material you add
2819         to a covered work, you may (if authorized by the copyright holders of that
2820         material) supplement the terms of this License with terms:

2821         (a) Disclaiming warranty or limiting liability differently from the terms of
2822             sections 15 and 16 of this License; or
2823         (b) Requiring preservation of specified reasonable legal notices or author
2824             attributions in that material or in the Appropriate Legal Notices dis-
2825             played by works containing it; or
2826          (c) Prohibiting misrepresentation of the origin of that material, or requir-
2827              ing that modified versions of such material be marked in reasonable
2828              ways as different from the original version; or
2829         (d) Limiting the use for publicity purposes of names of licensors or authors
2830             of the material; or
2831          (e) Declining to grant rights under trademark law for use of some trade
2832              names, trademarks, or service marks; or
2833          (f) Requiring indemnification of licensors and authors of that material
2834              by anyone who conveys the material (or modified versions of it) with
2835              contractual assumptions of liability to the recipient, for any liability
2836              that these contractual assumptions directly impose on those licensors
2837              and authors.

       166
Appendix A. GNU GPL                                           Bayanihan Linux 5


2838       All other non-permissive additional terms are considered “further restric-
2839       tions” within the meaning of section 10. If the Program as you received it,
2840       or any part of it, contains a notice stating that it is governed by this License
2841       along with a term that is a further restriction, you may remove that term.
2842       If a license document contains a further restriction but permits relicensing
2843       or conveying under this License, you may add to a covered work material
2844       governed by the terms of that license document, provided that the further
2845       restriction does not survive such relicensing or conveying.
2846       If you add terms to a covered work in accord with this section, you must
2847       place, in the relevant source files, a statement of the additional terms that
2848       apply to those files, or a notice indicating where to find the applicable terms.
2849       Additional terms, permissive or non-permissive, may be stated in the form of
2850       a separately written license, or stated as exceptions; the above requirements
2851       apply either way.

2852     8. Termination.
2853       You may not propagate or modify a covered work except as expressly pro-
2854       vided under this License. Any attempt otherwise to propagate or modify
2855       it is void, and will automatically terminate your rights under this License
2856       (including any patent licenses granted under the third paragraph of section
2857       11).
2858       However, if you cease all violation of this License, then your license from a
2859       particular copyright holder is reinstated (a) provisionally, unless and until
2860       the copyright holder explicitly and finally terminates your license, and (b)
2861       permanently, if the copyright holder fails to notify you of the violation by
2862       some reasonable means prior to 60 days after the cessation.
2863       Moreover, your license from a particular copyright holder is reinstated per-
2864       manently if the copyright holder notifies you of the violation by some rea-
2865       sonable means, this is the first time you have received notice of violation
2866       of this License (for any work) from that copyright holder, and you cure the
2867       violation prior to 30 days after your receipt of the notice.
2868       Termination of your rights under this section does not terminate the licenses
2869       of parties who have received copies or rights from you under this License. If
2870       your rights have been terminated and not permanently reinstated, you do
2871       not qualify to receive new licenses for the same material under section 10.

2872     9. Acceptance Not Required for Having Copies.
2873       You are not required to accept this License in order to receive or run a copy
2874       of the Program. Ancillary propagation of a covered work occurring solely as
2875       a consequence of using peer-to-peer transmission to receive a copy likewise
2876       does not require acceptance. However, nothing other than this License
2877       grants you permission to propagate or modify any covered work. These

                                                                                       167
Bayanihan Linux 5                                          Appendix A. GNU GPL


2878         actions infringe copyright if you do not accept this License. Therefore, by
2879         modifying or propagating a covered work, you indicate your acceptance of
2880         this License to do so.
2881    10. Automatic Licensing of Downstream Recipients.
2882         Each time you convey a covered work, the recipient automatically receives a
2883         license from the original licensors, to run, modify and propagate that work,
2884         subject to this License. You are not responsible for enforcing compliance by
2885         third parties with this License.
2886         An “entity transaction” is a transaction transferring control of an organi-
2887         zation, or substantially all assets of one, or subdividing an organization, or
2888         merging organizations. If propagation of a covered work results from an
2889         entity transaction, each party to that transaction who receives a copy of
2890         the work also receives whatever licenses to the work the party’s predecessor
2891         in interest had or could give under the previous paragraph, plus a right to
2892         possession of the Corresponding Source of the work from the predecessor in
2893         interest, if the predecessor has it or can get it with reasonable efforts.
2894         You may not impose any further restrictions on the exercise of the rights
2895         granted or affirmed under this License. For example, you may not impose
2896         a license fee, royalty, or other charge for exercise of rights granted under
2897         this License, and you may not initiate litigation (including a cross-claim or
2898         counterclaim in a lawsuit) alleging that any patent claim is infringed by
2899         making, using, selling, offering for sale, or importing the Program or any
2900         portion of it.
2901    11. Patents.
2902         A “contributor” is a copyright holder who authorizes use under this License
2903         of the Program or a work on which the Program is based. The work thus
2904         licensed is called the contributor’s “contributor version”.
2905         A contributor’s “essential patent claims” are all patent claims owned or con-
2906         trolled by the contributor, whether already acquired or hereafter acquired,
2907         that would be infringed by some manner, permitted by this License, of mak-
2908         ing, using, or selling its contributor version, but do not include claims that
2909         would be infringed only as a consequence of further modification of the con-
2910         tributor version. For purposes of this definition, “control” includes the right
2911         to grant patent sublicenses in a manner consistent with the requirements of
2912         this License.
2913         Each contributor grants you a non-exclusive, worldwide, royalty-free patent
2914         license under the contributor’s essential patent claims, to make, use, sell,
2915         offer for sale, import and otherwise run, modify and propagate the contents
2916         of its contributor version.
2917         In the following three paragraphs, a “patent license” is any express agree-
2918         ment or commitment, however denominated, not to enforce a patent (such

       168
Appendix A. GNU GPL                                          Bayanihan Linux 5


2919       as an express permission to practice a patent or covenant not to sue for
2920       patent infringement). To “grant” such a patent license to a party means to
2921       make such an agreement or commitment not to enforce a patent against the
2922       party.
2923       If you convey a covered work, knowingly relying on a patent license, and the
2924       Corresponding Source of the work is not available for anyone to copy, free
2925       of charge and under the terms of this License, through a publicly available
2926       network server or other readily accessible means, then you must either (1)
2927       cause the Corresponding Source to be so available, or (2) arrange to deprive
2928       yourself of the benefit of the patent license for this particular work, or (3)
2929       arrange, in a manner consistent with the requirements of this License, to
2930       extend the patent license to downstream recipients. “Knowingly relying”
2931       means you have actual knowledge that, but for the patent license, your
2932       conveying the covered work in a country, or your recipient’s use of the
2933       covered work in a country, would infringe one or more identifiable patents
2934       in that country that you have reason to believe are valid.
2935       If, pursuant to or in connection with a single transaction or arrangement,
2936       you convey, or propagate by procuring conveyance of, a covered work, and
2937       grant a patent license to some of the parties receiving the covered work
2938       authorizing them to use, propagate, modify or convey a specific copy of the
2939       covered work, then the patent license you grant is automatically extended
2940       to all recipients of the covered work and works based on it.
2941       A patent license is “discriminatory” if it does not include within the scope of
2942       its coverage, prohibits the exercise of, or is conditioned on the non-exercise
2943       of one or more of the rights that are specifically granted under this License.
2944       You may not convey a covered work if you are a party to an arrangement
2945       with a third party that is in the business of distributing software, under
2946       which you make payment to the third party based on the extent of your
2947       activity of conveying the work, and under which the third party grants,
2948       to any of the parties who would receive the covered work from you, a dis-
2949       criminatory patent license (a) in connection with copies of the covered work
2950       conveyed by you (or copies made from those copies), or (b) primarily for and
2951       in connection with specific products or compilations that contain the cov-
2952       ered work, unless you entered into that arrangement, or that patent license
2953       was granted, prior to 28 March 2007.
2954       Nothing in this License shall be construed as excluding or limiting any
2955       implied license or other defenses to infringement that may otherwise be
2956       available to you under applicable patent law.
2957    12. No Surrender of Others’ Freedom.
2958       If conditions are imposed on you (whether by court order, agreement or
2959       otherwise) that contradict the conditions of this License, they do not excuse
2960       you from the conditions of this License. If you cannot convey a covered

                                                                                      169
Bayanihan Linux 5                                           Appendix A. GNU GPL


2961         work so as to satisfy simultaneously your obligations under this License and
2962         any other pertinent obligations, then as a consequence you may not convey
2963         it at all. For example, if you agree to terms that obligate you to collect a
2964         royalty for further conveying from those to whom you convey the Program,
2965         the only way you could satisfy both those terms and this License would be
2966         to refrain entirely from conveying the Program.

2967    13. Use with the GNU Affero General Public License.
2968         Notwithstanding any other provision of this License, you have permission
2969         to link or combine any covered work with a work licensed under version 3
2970         of the GNU Affero General Public License into a single combined work, and
2971         to convey the resulting work. The terms of this License will continue to
2972         apply to the part which is the covered work, but the special requirements of
2973         the GNU Affero General Public License, section 13, concerning interaction
2974         through a network will apply to the combination as such.

2975    14. Revised Versions of this License.
2976         The Free Software Foundation may publish revised and/or new versions of
2977         the GNU General Public License from time to time. Such new versions will
2978         be similar in spirit to the present version, but may differ in detail to address
2979         new problems or concerns.
2980         Each version is given a distinguishing version number. If the Program spec-
2981         ifies that a certain numbered version of the GNU General Public License
2982         “or any later version” applies to it, you have the option of following the
2983         terms and conditions either of that numbered version or of any later version
2984         published by the Free Software Foundation. If the Program does not specify
2985         a version number of the GNU General Public License, you may choose any
2986         version ever published by the Free Software Foundation.
2987         If the Program specifies that a proxy can decide which future versions of the
2988         GNU General Public License can be used, that proxy’s public statement of
2989         acceptance of a version permanently authorizes you to choose that version
2990         for the Program.
2991         Later license versions may give you additional or different permissions. How-
2992         ever, no additional obligations are imposed on any author or copyright
2993         holder as a result of your choosing to follow a later version.

2994    15. Disclaimer of Warranty.
2995         THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT
2996         PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE
2997         STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER
2998         PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY
2999         OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING,

       170
Appendix A. GNU GPL                                           Bayanihan Linux 5


3000        BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-
3001        CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
3002        THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF
3003        THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE
3004        DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SER-
3005        VICING, REPAIR OR CORRECTION.
3006    16. Limitation of Liability.
3007        IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED
3008        TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER
3009        PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM AS
3010        PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUD-
3011        ING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL
3012        DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE
3013        PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR
3014        DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED
3015        BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM
3016        TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH
3017        HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POS-
3018        SIBILITY OF SUCH DAMAGES.
3019    17. Interpretation of Sections 15 and 16.
3020        If the disclaimer of warranty and limitation of liability provided above can-
3021        not be given local legal effect according to their terms, reviewing courts shall
3022        apply local law that most closely approximates an absolute waiver of all civil
3023        liability in connection with the Program, unless a warranty or assumption
3024        of liability accompanies a copy of the Program in return for a fee.

3025                     End of Terms and Conditions
3026                    How to Apply These Terms to Your New Programs

3027        If you develop a new program, and you want it to be of the greatest possible
3028        use to the public, the best way to achieve this is to make it free software
3029        which everyone can redistribute and change under these terms.
3030        To do so, attach the following notices to the program. It is safest to attach
3031        them to the start of each source file to most effectively state the exclusion
3032        of warranty; and each file should have at least the “copyright” line and a
3033        pointer to where the full notice is found.

3034        <one line to give the program’s name and a brief idea of what it does.>
3035
3036        Copyright (C) <textyear>   <name of author>
3037




                                                                                       171
Bayanihan Linux 5                                           Appendix A. GNU GPL


3038         This program is free software: you can redistribute it and/or modify
3039         it under the terms of the GNU General Public License as published by
3040         the Free Software Foundation, either version 3 of the License, or
3041         (at your option) any later version.
3042
3043         This program is distributed in the hope that it will be useful,
3044         but WITHOUT ANY WARRANTY; without even the implied warranty of
3045         MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
3046         GNU General Public License for more details.
3047
3048         You should have received a copy of the GNU General Public License
3049         along with this program. If not, see <http://www.gnu.org/licenses/>.


3050         Also add information on how to contact you by electronic and paper mail.
3051         If the program does terminal interaction, make it output a short notice like
3052         this when it starts in an interactive mode:

3053         <program>   Copyright (C) <year>   <name of author>
3054
3055         This program comes with ABSOLUTELY NO WARRANTY; for details type ‘show w’.
3056         This is free software, and you are welcome to redistribute it
3057         under certain conditions; type ‘show c’ for details.


3058         The hypothetical commands show w and show c should show the appropri-
3059         ate parts of the General Public License. Of course, your program’s com-
3060         mands might be different; for a GUI interface, you would use an “about
3061         box”.
3062         You should also get your employer (if you work as a programmer) or school,
3063         if any, to sign a “copyright disclaimer” for the program, if necessary. For
3064         more information on this, and how to apply and follow the GNU GPL, see
3065         http://www.gnu.org/licenses/.
3066         The GNU General Public License does not permit incorporating your pro-
3067         gram into proprietary programs. If your program is a subroutine library,
3068         you may consider it more useful to permit linking proprietary applica-
3069         tions with the library. If this is what you want to do, use the GNU
3070         Lesser General Public License instead of this License. But first, please read
3071         http://www.gnu.org/philosophy/why-not-lgpl.html.




       172
3072                                                        BIBLIOGRAPHY




3073   [1] jack.       Get   to   Know   Linux:     File   System Hierarchy.
3074       Martin       Brinkmann,        http://www.ghacks.net/2008/12/11/
3075       get-to-know-linux-file-system-hierarchy/, 2005-2008.
3076   [2] GNU Free Documentation License. Filesystem Hierarchy Standard. Wikimedia
3077       Foundation, Inc, http://en.wikipedia.org/wiki/Filesystem_Hierarchy_
3078       Standard, January 22, 2009.
3079   [3] PAT. Linux filesystem heirarchy - the fun easy way. Ravi, http://linuxhelp.
3080       blogspot.com/2008/05/linux-file-system-hierarchy-fun-easy.html,
3081       May 04, 2008.

3082   [4] Bob Rankin. How Does The Linux File System Work? Bob Rankin, http:
3083       //lowfatlinux.com/linux-files.html, 2009.
3084   [5] Pamela Roberts.  The Konqueror Handbook.   Erwan Loisant, Pamela
3085       Roberts,   http://docs.kde.org/stable/en/kdebase-apps/konqueror/
3086       filemanager.html#dirfolders, 2000, 2002.

3087   [6] Mayank Sarup. The Linux filesystem explained. FreeOS Technologies (I) Pvt.
3088       Ltd., http://www.freeos.com/articles/3102/, 1998-2004.
3089   [7] Andrew Solomon. Filesystem Basics. Linux Config Wiki, http://www.
3090       linuxconfig.org/Filesystem_Basics, March 13, 2008.

3091   [8] Debian Installer Team. Debian GNU/Linux Installation Guide. Debian In-
3092       staller team, http://www.debian.org/releases/lenny/i386/, 2004, 2005,
3093       2006, 2007, 2008.




                                            173
INDEX




3094   addgroup, 114       3122   files, 25
3095   adduser, 113        3123   Filesystem Hierarchy Standard, 42
3096   Amarok, 99          3124   find, 117
3097   applications, 95    3125   folder, 26
3098   audio, 105          3126        hidden, 31
3099   automount, 32       3127   folders, 25

3100   Blender, 94         3128   grep, 117
3101   burning, 104        3129   growisofs, 104
                           3130   GUI, 107
3102   capture, 102
3103   cat, 116            3131   home, 26
3104   CD, 104, 105
3105   cd, 108             3132   Inkscape, 93
3106   cdrdao, 104
3107   chgrp, 116          3133   K3b, 104
3108   chmod, 115          3134   KDE, 26
3109   chown, 115          3135   keyboard, 25
3110   console, 107, 137   3136   kfind, 31
3111   copying, 33         3137   KMix, 100
3112   cp, 110             3138   Konqueror, 25–27
                           3139       Menubar, 33
3113   delete, 33          3140   KRec, 101
3114   delgroup, 114       3141   KsCD, 100
3115   deluser, 114
3116   df, 111             3142   less, 116
3117   directory, 26       3143   Linux, 25
3118   drag, 34            3144   ls, 108
3119   du, 111
3120   DVD, 104            3145   mc, 121
                           3146   mkdir, 109
3121   filemanager, 25      3147   mount, 112

                              174
Index                  Bayanihan Linux 5


3148   movie, 102
3149   movie player, 102
3150   moving, 33
3151   mp3, 105
3152   MPlayer, 102

3153   nano, 120
3154   navigate, 26, 30, 34

3155   ogg, 105

3156   packages, 123
3157   partitions, 26
3158   path, 26, 27
3159   pipe, 118
3160   pmount, 113
3161   pumount, 113

3162   Qt, 138

3163   record, 101, 102
3164   removable, 32
3165   ripper, 105
3166   rm, 110
3167   rmdir, 109

3168   sed, 118
3169   software, 123
3170   soundcard, 100
3171   Super User, 40
3172   Synaptic, 123

3173   taskbar, 26
3174   terminal, 107
3175   trash, 32

3176   umount, 113
3177   unmount, 32

3178   vim, 119

3179   wodim, 104

3180   Xorg, 138
3181   XVidCap, 102


                                            175

Bayanihan linux 5_manual

  • 1.
    Advanced Science &Technology Institute Bayanihan Linux 5 MANUAL
  • 2.
    Bayanihan Linux 5 1 Copyright c 2008-2009 Emman Balintec, Rage Callao, Yvonne Carpo, Pearliezl Dy 2 Tiongco, Mariesonn Florendo, Aileen Cruzado, Russel Baisas. All rights reserved. 3 This document is free; you can redistribute it and/or modify it under the terms of 4 the GNU General Public License as published by the Free Software Foundation; either 5 version 2 of the License, or (at your option) any later version. 6 This document is distributed in the hope that it will be useful, but WITHOUT ANY 7 WARRANTY; without even the implied warranty of MERCHANTABILITY or FIT- 8 NESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for 9 more details. 10 You should have received a copy of the GNU General Public License along with this 11 document; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, 12 MA 02139, USA. 2
  • 3.
    13 CONTENTS 14 Preface 7 15 1 Installing the Bayanihan Linux OS 9 16 1.1 Getting the installer . . . . . . . . . . . . . . . . . . . . . . . . . . 9 17 1.2 Checking disc integrity . . . . . . . . . . . . . . . . . . . . . . . . . 10 18 1.3 Advanced Installer Options . . . . . . . . . . . . . . . . . . . . . . 11 19 1.4 Graphical installation guide . . . . . . . . . . . . . . . . . . . . . . 11 20 1.5 First Look . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 21 2 Desktop Overview 21 22 2.1 From power on to desktop . . . . . . . . . . . . . . . . . . . . . . . 21 23 2.2 Desktop components . . . . . . . . . . . . . . . . . . . . . . . . . . 22 24 2.3 Menu button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 25 2.4 Taskbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 26 2.5 System tray . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 27 3 Working with Files and Folders 25 28 3.1 Folders and Paths . . . . . . . . . . . . . . . . . . . . . . . . . . . 26 29 3.2 Introduction to Konqueror . . . . . . . . . . . . . . . . . . . . . . . 26 3
  • 4.
    Bayanihan Linux 5 Contents 30 3.3 Navigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30 31 3.4 Deleting Files and Folders . . . . . . . . . . . . . . . . . . . . . . . 32 32 3.5 Moving and Copying . . . . . . . . . . . . . . . . . . . . . . . . . . 33 33 3.6 Selecting Multiple Files . . . . . . . . . . . . . . . . . . . . . . . . 36 34 3.7 Create New . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 35 3.8 Changing Names and Permissions . . . . . . . . . . . . . . . . . . . 39 36 3.9 Configuring File Association . . . . . . . . . . . . . . . . . . . . . . 40 37 3.10 At the Command Line . . . . . . . . . . . . . . . . . . . . . . . . . 40 38 3.11 Linux Filesystem Hierarchy . . . . . . . . . . . . . . . . . . . . . . 42 39 4 Connecting to the Internet 47 40 4.1 Dial-Up using KPPP . . . . . . . . . . . . . . . . . . . . . . . . . . 47 41 4.2 LAN/WiFi connectivity with KNetworkManager . . . . . . . . . . 53 42 4.3 Using FireFox and Konqueror for browsing the web . . . . . . . . . 56 43 4.4 Setting the proxy for firefox and konqueror . . . . . . . . . . . . . 59 44 4.5 E-Mail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 45 4.6 VOIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 46 4.7 Instant Messaging With Pidgin . . . . . . . . . . . . . . . . . . . . 69 47 4.8 Desktop Sharing/Remote Desktop . . . . . . . . . . . . . . . . . . 70 48 5 Using OpenOffice.org 3 73 49 5.1 OpenOffice.org 3 Writer . . . . . . . . . . . . . . . . . . . . . . . . 73 50 5.2 OpenOffice.org 3 Calc . . . . . . . . . . . . . . . . . . . . . . . . . 78 51 5.3 OpenOffice.org 3 Impress . . . . . . . . . . . . . . . . . . . . . . . 82 52 6 Using Graphics Tools 89 53 6.1 Image Editing Using Gimp . . . . . . . . . . . . . . . . . . . . . . 89 54 6.2 Gwenview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90 4
  • 5.
    Contents Bayanihan Linux 5 55 6.3 Installing/Using Digikam . . . . . . . . . . . . . . . . . . . . . . . 93 56 6.4 Other graphics tools . . . . . . . . . . . . . . . . . . . . . . . . . . 93 57 7 Using WindowsTM applications with WINE 95 58 7.1 Installing WindowsTM software . . . . . . . . . . . . . . . . . . . . 96 59 7.2 Configuring WINE . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 60 7.3 Tested applications . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 61 8 Using Multimedia Applications 99 62 8.1 Amarok . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 63 8.2 KsCD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 64 8.3 KMix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100 65 8.4 KRec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 66 8.5 XVidCap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 67 8.6 MPlayer Video Player . . . . . . . . . . . . . . . . . . . . . . . . . 102 68 8.7 K3B - CD/DVD Burning . . . . . . . . . . . . . . . . . . . . . . . 104 69 8.8 KAudioCreator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105 70 9 Using the Terminal/Commandline 107 71 9.1 Access the Terminal/Console . . . . . . . . . . . . . . . . . . . . . 107 72 9.2 File and Folder Navigation . . . . . . . . . . . . . . . . . . . . . . . 108 73 9.3 Filesystem Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 74 9.4 User-related Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 75 9.5 File Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 76 9.6 Other Essential Commandline Tools . . . . . . . . . . . . . . . . . 116 77 9.7 Text Editors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 78 10 System Administration 123 79 10.1 Installing/Removing/Upgrading software . . . . . . . . . . . . . . . 123 5
  • 6.
    Bayanihan Linux 5 Contents 80 10.2 KDE Control Center . . . . . . . . . . . . . . . . . . . . . . . . . . 130 81 10.3 Managing Printers . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 82 10.4 Managing Private Folders . . . . . . . . . . . . . . . . . . . . . . . 133 83 10.5 Setting up a firewall with Guarddog . . . . . . . . . . . . . . . . . 133 84 10.6 Updating/Using Klamav . . . . . . . . . . . . . . . . . . . . . . . . 134 85 10.7 Managing users with Kuser/Adduser/Deluser . . . . . . . . . . . . 135 86 11 Special Topics 137 87 11.1 Installing a C/C++ development environment . . . . . . . . . . . 137 88 11.2 Compiling a custom kernel or third-party driver . . . . . . . . . . . 138 89 11.3 Installing a webserver . . . . . . . . . . . . . . . . . . . . . . . . . 139 90 11.4 Installing an ftp/file server . . . . . . . . . . . . . . . . . . . . . . . 146 91 11.5 Installing an email server . . . . . . . . . . . . . . . . . . . . . . . 146 92 11.6 Configuring NFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149 93 11.7 BIND / DNS servers . . . . . . . . . . . . . . . . . . . . . . . . . . 158 94 Appendix A GNU GPL 159 95 Bibliography 173 96 Index 174 6
  • 7.
    97 Preface 98 Sample text. 7
  • 8.
    Bayanihan Linux 5 Contents 8
  • 9.
    99 100 CHAPTER 101 ONE 102 103 Installing the Bayanihan Linux OS 104 Chapter Author : Rage Callao 105 106 The system uses the Debian Installer[8], a software developed by the Debian 107 Project1 . This version features a fully graphical installation as well as console, 108 expert and rescue modes. The following sections will describe the stages and 109 options available for each of these modes. 110 1.1 Getting the installer 111 Bayanihan Linux is freely downloadable as an ISO image from the Bayanihan 112 Linux website at http://bayanihan.gov.ph or can be obtained as a CD from 113 the Advanced Science and Technology Institute office. 114 After downloading the ISO image, please verify that the image was downloaded 115 correctly by using a file integrity checking software such as md5sum.exe or 116 sha256sum.exe and compare the generated values with those posted at our 117 website. 118 If the ISO image integrity check is successful, use a CD burning software and select 119 the Burn as image option to burn the ISO image to a blank CD. This process will 120 produce a bootable Bayanihan Linux CDROM Installer. Then insert the disc 1 http://www.debian.org 9
  • 10.
    Bayanihan Linux 5 Chapter 1. Installing the Bayanihan Linux OS 121 into the CDROM drive and restart your computer making sure it boots from the 122 CDROM. 123 1.2 Checking disc integrity 124 Before beginning your installation you should also check whether the ISO image 125 was properly “burned” onto the CD. To do this, boot the CD and select Advanced 126 options from the boot menu and then select Graphical expert install as shown in 127 Figure 1.1. On the next screen (shown in Figure 1.2) select Check the CDROM(s) 128 integrity. If the check is successful, proceed with the Graphical installation guide 129 shown in Figure 1.4. 130 Important: Perform a BACK-UP of your valuable data before proceeding with 131 the installation. Figure 1.1: Graphical expert install Figure 1.2: Check the CD- ROM(s) integrity 10
  • 11.
    Chapter 1. Installingthe Bayanihan Linux OS Bayanihan Linux 5 132 1.3 Advanced Installer Options 133 Additional installer options are available by selecting Advanced options (use the up 134 and down arrow keys and press Enter on the highlighted entry) from the installer 135 menu shown in Figure 1.4. The various options are shown in Figure 1.3 and 136 described below. 137 Expert install runs the installer in a text-mode environment and displays all 138 available options 139 Rescue mode runs the installer and provides a shell from which a preinstalled 140 system can be accessed and configured 141 Graphical expert install runs the installer in a full graphical environment and 142 displays all available options 143 Graphical rescue mode runs the installer in a full graphical environment and 144 provides a shell from which a preinstalled system can be accessed and con- 145 figured 146 Test physical memory runs memtest which is a program to check the system 147 memory Figure 1.3: Advanced options menu 148 1.4 Graphical installation guide 149 The full graphical installation mode is selected as the default mode when booting 150 the Bayanihan Linux CDROM Installer. This is the easiest mode mainly because 151 most of the available options have already been preselected. Figures 1.4 to 1.20 152 shows the installation steps. 11
  • 12.
    Bayanihan Linux 5 Chapter 1. Installing the Bayanihan Linux OS 153 For low memory machines (less than 128 MB of RAM ) you may want to select 154 the Text-mode install option. The installer will also automatically switch to this 155 mode when it detects low physical memory. 156 The installer will prompt for partitioning information in all modes. The term 157 partition refers to the act of dividing the harddisk so that the divisions can be 158 used by the operating system for different tasks or data. For instance, if you 159 accept all the default options in the partitioning stage, the installer will create 160 two partitions by default. One for the / or root partition and another for the 161 swap partition. The root partition will be used for storing files the operating 162 system needs as well as users files. The swap partition will be used for temporary 163 storage of data by the operating system’s processes. Figure 1.4: STEP 1. Dis- plays the available options for the installer. To proceed, press the Enter key on the high- lighted entry. Several screens will appear while the installer initializes. Figure 1.5: Network config- uration. The installer will at- tempt to configure your net- work connections. 12
  • 13.
    Chapter 1. Installingthe Bayanihan Linux OS Bayanihan Linux 5 Figure 1.6: STEP 2. Only ap- pears when automatic network configuration has failed. Select the option Do not configure the network at this time. The net- work connection will need to be configured upon logging in. Figure 1.7: STEP 3. Prompts for a hostname for the com- puter. You can accept the de- fault and then press Enter or you can type in any single-word unique name to identify this machine on the network. Use small letters. Figure 1.8: STEP 4. Only ap- pears when automatic network configuration has been success- ful. Prompts for a domain name. You can safely accept the default. 13
  • 14.
    Bayanihan Linux 5 Chapter 1. Installing the Bayanihan Linux OS Figure 1.9: STEP 5. The de- fault is to use the Guided - use entire harddisk option. Click Continue to proceed to the next screen. Figure 1.10: STEP 6. Select the harddisk where the system will be installed. Figure 1.11: STEP 7. Select a partitioning option. There are 3 predefined configurations to choose from. Selecting the de- fault will create two partitions, one for the /root and one for the swap partitions. 14
  • 15.
    Chapter 1. Installingthe Bayanihan Linux OS Bayanihan Linux 5 Figure 1.12: STEP 8. Click Continue to confirm the infor- mation on partitioning changes and proceed to the next screen. Figure 1.13: STEP 9. Select Yes to continue. NOTE: Se- lecting Continue will delete all data in your harddisk. The new partition information will be written to the harddisk and the installer will format the new partitions. Figure 1.14: STEP 10. Type- in your administrator or “root” password here. The root ac- count is used to modify system- wide settings. 15
  • 16.
    Bayanihan Linux 5 Chapter 1. Installing the Bayanihan Linux OS Figure 1.15: STEP 11. Type in your name. This informa- tion will be used to generate a suggested username for the next step. Figure 1.16: STEP 12. Type- in your preferred username if you skipped the previous step otherwise accept the suggested username. An account with this username will be created near the end of the installa- tion process. You will use this account to login. This is a regular, non-administrator account. Figure 1.17: STEP 13. Type in your preferred password for the account created in the pre- ceeding screen. Use the user- name you entered in STEP 12 and the password here to login at screen shown in Figure 1.23 16
  • 17.
    Chapter 1. Installingthe Bayanihan Linux OS Bayanihan Linux 5 Figure 1.18: The system will now proceed with the installa- tion. This will take between 30 minutes to 1 hour depending on the speed of your machine. Figure 1.19: STEP 14. The installer will attempt to de- tect other operating systems installed in the harddisk. You can safely select Yes here and click Continue to proceed to the next screen. Figure 1.20: STEP 15. This is the end of the installation process. Remove the CD and click Continue to reboot into your new Bayanihan Linux 5 system. 17
  • 18.
    Bayanihan Linux 5 Chapter 1. Installing the Bayanihan Linux OS 164 1.5 First Look 165 After rebooting/booting your computer, the first screen you will see is the GrUB2 166 menu show in Figure 1.21 which displays the available boot options for this system. Figure 1.21: GrUB Menu Figure 1.22: Splash screen Figure 1.23: Login screen 2 Grand Unified Bootloader 18
  • 19.
    Chapter 1. Installingthe Bayanihan Linux OS Bayanihan Linux 5 Figure 1.24: Welcome greeting Figure 1.25: The Bayanihan Desktop Figure 1.26: Map of the Desktop 19
  • 20.
    Bayanihan Linux 5 Chapter 1. Installing the Bayanihan Linux OS 20
  • 21.
    167 168 CHAPTER 169 TWO 170 171 Desktop Overview 172 Chapter Author : Rage Callao 173 174 Finding your way around a typical Linux desktop can be a challenging experience 175 especially if you come from a Windows background. However once you get passed 176 the initial hurdles, it becomes quite easy to do things. Many of the desktop 177 components behave and function in a very familiar way and almost everything 178 can be customized to your heart’s content. 179 2.1 From power on to desktop 180 The boot process begins when you power on your computer. The first screen 181 to appear after the typical BIOS messages and warnings is the GrUB menu. 182 GrUB is an acronym for Grand Unified Bootloader. Bayanihan Linux is the default 183 operating system selected. You can press Enter or wait a few seconds indicated 184 by the timer at the bottom of the screen and the system will boot to the selected 185 operating system. The process of booting up your computer begins with the 186 kernel, the core of the operating system, being loaded into memory. System 187 components are detected, filesystems are mounted and the desktop initialized 188 for use. Afterwards you are presented with a graphical login screen. Type in the 189 username and password you provided during installation and you will be presented 190 with the desktop environment. This should just take a few minutes. 21
  • 22.
    Bayanihan Linux 5 Chapter 2. Desktop Overview 191 2.2 Desktop components 192 The desktop is made up of a these components: 193 Menu button contains the shortcuts to run the various programs bundled with 194 Bayanihan Linux 195 Taskbar displays links to windows that are currently open and holds various 196 other utilities such as applets (pager, quick shortcuts, systray) 197 System tray contains running applications that are frequently accessed 198 Desktop where icons to frequently accessed applications or folders can be placed 199 and where windows of various applications appear when opened 200 After logging in, you are presented with the desktop shown below displaying the 201 components discussed the preceeding section: 202 203 2.3 Menu button 204 The Menu contains links to graphical applications and are conveniently catego- 205 rized according to general use. For instance, all the graphical applications that 206 you install that need to connect to the internet can be accessed from the Internet 22
  • 23.
    Chapter 2. DesktopOverview Bayanihan Linux 5 207 category. This category includes web browsers, email clients, chat clients, VOIP 208 and videoconferencing software. 209 This category also includes links to various system utilities such as the Help man- 210 ual, system settings, system folders and the Control Center where you can set your 211 preferences. 212 You will also find quick shortcuts to run applications, search for files and folders 213 and logoff from the desktop. 214 Menu Editor 215 Most graphical applications when installed will place a shortcut in the Menu. You 216 can also manually add entries and change the arrangement of the various entries 217 using the Menu Editor. 218 To run this application, simply click on the link found in the Menu: 219 → Settings (in All Applications) → Menu Editor 220 Menu updating tool 221 This tool can search your system for common applications and update the Menu. 222 2.4 Taskbar 223 The taskbar is the horizontal area at the bottom of the screen that contains links 224 to open windows, the Menu, clock and systray as well as various other utilities. 225 To configure the taskbar, right-click on an empty area on the taskbar and click 226 Unlock panels. Right-click on an empty area again and click Configure Panel. A 227 window will appear containing several categories. Click on the Help for more 228 information on configuring this component. 229 Many applets (small applications that reside in the taskbar) can also be placed 230 here allowing for more customized control of system. To access these optional 231 applets, right-click on an empty area and click Add applet to panel. To remove 232 and applet, right-click on an empty area and select Remove from Panel → Applet. 233 You can also add icons for your frequently used applications by selecting Add 234 Application to Panel. 23
  • 24.
    Bayanihan Linux 5 Chapter 2. Desktop Overview 235 2.5 System tray 236 Some frequently used applications place an icon here for quick access. This ap- 237 plications typically run in the background 24
  • 25.
    238 239 CHAPTER 240 THREE 241 242 Working with Files and Folders 243 Chapter Author : Aileen Cruzado 244 After having been able to successfully install Bayanihan Linux in your system, 245 what now should you expect from it? 246 When moving from Windows to Linux, you must first understand how Linux 247 view files varies from how Windows handle files. In this chapter, you will have an 248 overview of the Linux file system and how important it is to make Linux work. 249 Here, you will learn that under Linux, everything is a file[4]. In addition to data 250 and executable files, Linux treat folders and even the various components of your 251 computer as a file. This means that there are files that represent your keyboard, 252 terminal, printer, CD-ROM, and even your system’s RAM. These special files are 253 called devices. When Linux needs to talk to physical hardware device, it does so 254 by simply reading from or writing to one of these special files1 . In this chapter, 255 you will be introduced to elementary concepts such as basics of creating new files, 256 changing ownerships and permissions and the principal method of accessing them 257 via the Konqueror file manager. 258 Additionally, you will learn about the fundamentals of configuring file associations; 259 working at the command line level; and the Linux Filesystem Heirarchy. 1 http://lowfatlinux.com/linux-files.html 25
  • 26.
    Bayanihan Linux 5 Chapter 3. Working with Files and Folders 260 3.1 Folders and Paths 261 In UNIX and Linux all folders are arranged in a simple inverted tree structure 262 descending and branching down from a single top level folder[5]. This means that 263 you can get from any folder to any other by going “up” until you reach a common 264 point then “down” through the appropriate subfolders until you reach your target. 265 The position of any file or folder in the tree can be described by its “path”, which 266 is a simple list of the folders you would have to descend through to get to the 267 target folder or file. For example, /home/aileen is the subfolder /aileen of the 268 subfolder /home of the top level folder, and /home/aileen/words.txt is the file 269 words.txt in that subfolder. The leading “/” in these paths represents the top 270 level folder. 271 Every folder accessible by your system including those on other hard disk par- 272 titions, your floppy and CD-ROM will appear in the tree descending from “/”, 273 their exact paths will depend on how your system was set up. See Section 3.3. 274 Every user on a UNIX / Linux system has their own “home” folder to hold their 275 personal files and settings; for example /home/russel and /home/mariesonn. 276 The tilde symbol (∼) is often used to represent the user’s home folder, so that 277 ∼/letter.txt refers to the file letter.txt in my /home folder. 278 Note that the term “directory” is often used instead of “folder”. 279 3.2 Introduction to Konqueror 280 All operating systems come with a so-called “file manager” which is an application 281 that helps you view files and folders as well as navigate graphically through the 282 entire filesystem tree. The file manager bundled with Bayanihan Linux is called 283 Konqueror. 284 To run this application, simply click on the link found in the Menu. You can also 285 click on the Home icon your desktop or the taskbar. 286 → Home – Personal Files 287 From help:/konqueror/index.html: 288 Konqueror is an advanced file manager for the K Desktop Environ- 289 ment, providing file management functions ranging from simple cut/copy 290 and paste operations to advanced local and remote network file brows- 291 ing. Folder contents can be displayed in a variety of text and icon view 26
  • 27.
    Chapter 3. Workingwith Files and Folders Bayanihan Linux 5 Figure 3.1: Icon View. Displays the name and a suitable icon for each file or folder. Figure 3.2: MultiColumn View. Similar to Icon View except that the display is neatly formatted into regu- lar columns. 292 modes, which can include thumbnail preview images of file contents. 293 File and folder properties can easily be examined and changed and 294 applications launched with a simple click of the left mouse button 295 View Modes 296 In File Manager mode, Konqueror shows you what files and subfolders are held 297 in a folder, and can provide you with some information about them. 298 The “path” of the folder you are looking at is shown in the Titlebar, and also in 299 the Location Toolbar, prefixed with “file:” to indicate that the folder is part of 300 your computer’s normal file system. For example “file:/home/aileen”. 301 The way that Konqueror displays the files and folders depends mainly on your 302 choice of View Mode. This can be selected from the View → View Mode sub 303 menu, which gives you the following options: Icon View, MultiColumn View, 304 Tree View, Info List View, Detailed List View and Text View as shown 305 in Figures 2.1 to 2.6. 27
  • 28.
    Bayanihan Linux 5 Chapter 3. Working with Files and Folders Figure 3.3: Tree View. This option is useful for navigating through the folder tree below the current folder. This display is similar to Detailed List View except that the start of each line will show a small “+” sign in a box if the item is a folder. Left clicking on the box will expand the display to show the contents of the folder. Figure 3.4: Info List View. Simi- lar to Detailed List View except that, where applicable, it shows the number of lines, words and characters and file format for each file. Figure 3.5: Detailed List View. Displays each file or folder on a sep- arate line, as a small icon followed by the file or folder name followed by information about the item. The amount of information shown is con- trolled by the View → Show Details submenu settings. 28
  • 29.
    Chapter 3. Workingwith Files and Folders Bayanihan Linux 5 Figure 3.6: Text View. Similar to Detailed List View except thaticons are not shown and the first character in each line will be “/” if the item is a folder. 306 The default file icons shown in Icon View and MultiColumn View modes can be 307 replaced by small preview images of the file contents. See File Previews on 29 308 on for more details. 309 File Tip Info 310 Checking the Show file tips box in the Behavior page of the Konqueror Configura- 311 tion dialog causes a small pop up information window to appear when the mouse 312 pointer is hovered over a file or folder name or icon in Icon View or MultiColumn 313 View mode. 314 If the Show previews... in file tips checkbox is checked the pop up window will 315 also show a small image of the file contents as shown in Figure 2.7. 316 File Previews 317 Selecting View → Preview from the Menubar will bring up a sub menu that lets 318 you enable file previews for certain types of file. 319 Generally this means that the file’s icon will be replaced by a small image showing 320 the file contents. If file preview is enabled for Sound Files the file will be played 321 whenever the mouse cursor is hovering over the file name or icon. 322 Note that file previews are only available in Icon View and MultiColumn View 323 modes. 324 Because Konqueror has to read much more data than just the file name details 325 to generate a preview, file previews may not be appropriate when viewing files 326 on a floppy or from a remote system. The Previews page of the File Manager 327 Configuration dialog allows you to disable file previews for protocols such as ftp 328 where reading the extra data would take too long. 29
  • 30.
    Bayanihan Linux 5 Chapter 3. Working with Files and Folders Figure 3.7: To preview a file, hold the mouse cursor over the name of the file for about a second. A popup window will appear showing the contents of the file and useful information like file size and which user owns the file. 329 3.3 Navigation 330 To get to a file with Konqueror you first need to navigate through the folder tree 331 to find the folder containing that file. 332 To move between folders you can simply step up and down the tree: 333 • To descend into a subfolder, left click on its name or icon – or if you have 334 already “selected” it (see below) – then just press Enter. 335 • To go up the folder tree, you can click on the Up button in the Toolbar, use 336 Alt+Up Arrow, or use the Menubar Go → Up option. 337 To “select” a file or folder in the displayed folder without opening it in any way 338 use the up and down arrow keys to move through the items. The selected item 339 will be highlighted and some information about it will be displayed in the Status 340 Bar. 341 Setting the View Mode to Tree View can help you locate folders in the tree below 342 the current folder; in this mode each folder is shown with a small box at the left. 30
  • 31.
    Chapter 3. Workingwith Files and Folders Bayanihan Linux 5 343 If the box contains a + sign, left clicking on the box (not on the folder name or 344 icon) will display a sub tree showing files and subfolders contained in that folder. 345 The small box will then change to show a sign. Left click on that to collapse the 346 sub tree. Once you have found the folder you are looking for, left click on the 347 folder name or icon to open it. 348 The Navigation Panel can also help you find your way around the file system. 349 You can go directly to any folder by typing its path into the Location Toolbar 350 window or into the dialog box invoked by the Menubar Location → Open Location 351 item or by Ctrl+ O. Konqueror’s Text Completion feature may be useful when 352 you do this. Don’t forget that in Linux / UNIX file and folder names are case 353 sensitive. 354 When you have moved to a new folder you can go back to your previous choice by 355 using the Toolbar Back button, the Menubar Go → Back item, or Alt+Left Arrow. 356 Once you have gone back you can go forward. Use the Toolbar Forward button, 357 the Menubar Go → Forward item or Alt+Right Arrow. 358 Alternatively, you can also choose to enter the parent folder by clicking on the 359 Toolbar Up, the Go → Up item, or with Alt+Up Arrow. 360 Tip. Holding the left mouse button pressed while the mouse pointer is over the 361 Toolbar Up, Back or Forward buttons brings up a menu of recently visited 362 locations. 363 Finding Files and Folders 364 If you don’t know or can’t remember where a file or folder is within your system, 365 then use the Toolbar Find File button or the Menubar Tools → Find File... option. 366 This will embed the file finder application KFind into Konqueror’s window. 367 Note. If the name of a file or folder begins with a period or a dot, then it is a 368 “hidden” file or folder, and will not normally be shown by Konqueror. To 369 see files or folders, use the Menubar View → Show Hidden Files option. 370 Another reason Konqueror may not show the file or folder you 371 are looking for is that you may have the View Filter plugin set to 372 display only certain types of file. 31
  • 32.
    Bayanihan Linux 5 Chapter 3. Working with Files and Folders 373 Floppy and CD-ROM Drives 374 Any floppy disk, CD drive or other hard disk partition that you have on your 375 system will usually appear in the / , /media, /mnt or /auto folder, having a path 376 something like /mnt/floppy or /cdrom. The details will depend on how your 377 system was set up. 378 UNIX / Linux requires that you mount a floppy disk or CD-ROM when you have 379 inserted it into the drive, and mount other hard disk partitions when you want 380 to access them. You also need to unmount a floppy disk or CD-ROM before 381 removing it to register that it is no longer available. 382 How you do this will depend on how your system: 383 • You may have an Automount facility, in which case you don’t have to bother 384 about explicitly mounting and unmounting, although you may find that the 385 CD-ROM occasionally starts up by itself for no apparent reason. 386 • You may have Floppy, CD-ROM and hard disk icons on your desktop, in 387 which case, left mouse button click on the icon to mount it. Doing this 388 should also bring up a balloon notification, a Removable Device icon and 389 a window asking you what you want to do with the mounted device. To 390 unmount, right click on the icon and choose the Safely Remove item and a 391 balloon notification will appear to indicate that the device has been safely 392 removed. The Removable Device icon will then turn gray to indicate inac- 393 tivity. See Figure 3.8. 394 • Or you can do it the traditional way by typing into a text console window: 395 mount /mnt/floppy to mount, for example, the floppy drive; and 396 umount /mnt/floppy to unmount it (umount not unmount) 397 Note. Rather than having to open a text console to type the mount or umount 398 commands, you may prefer to use Konqueror’s Tools → Execute Shell Com- 399 mand (Ctrl+E) feature. 400 3.4 Deleting Files and Folders 401 Konqueror gives you two ways to dispose of an unwanted file or folder: 402 • You can move it to the Trash folder, which is the safest method as you can 403 get it back if you realize that you have made a mistake. 32
  • 33.
    Chapter 3. Workingwith Files and Folders Bayanihan Linux 5 Figure 3.8: This illustration shows that apart from the change of color, a small arrow is visible beside the Re- movable Device Icon when it is Ac- tive and disappearswhen it is Inac- tive 404 • You can just plain Delete it, which removes the entry from the folder and 405 adds the disk area occupied by the file(s) to the system’s list of free disk 406 areas, in the same way as the rm command. 407 The simplest way to remove a file or folder is to position the mouse pointer over 408 its name or icon and press the right mouse button, which will bring up a menu 409 containing the options Move to Trash and Delete. 410 Or, if you have selected the item, the Menubar Edit menu will give you the choice 411 of “Move to Trash” and ‘‘Delete” options. 412 Del will move the selected item or items to Trash. Shift+Del will really, truly and 413 irrevocably delete the selected item or items. 414 Note. You won’t be able to remove a file or folder if you don’t have the necessary 415 permissions; see Section 3.8 for further details. 416 3.5 Moving and Copying 417 To copy a file or subfolder between folders you can: 418 • Position the mouse pointer over its name or icon and hold down the right 419 mouse button, which will bring up a menu containing the Copy option. 420 Choose that. 421 Or if the item is selected you can use the Copy button on the Toolbar or the 422 Menubar Edit → Copy item, or the Ctrl+C shortcut key combination. You 423 can also select multiple files or folders to copy/move as well. 33
  • 34.
    Bayanihan Linux 5 Chapter 3. Working with Files and Folders 424 • Navigate to the folder you want to copy the item into then Paste the item 425 into the new folder by using the Toolbar Paste button or the Menubar Edit 426 → Paste option or the Ctrl+V shortcut, or by moving the mouse pointer 427 to a clear area of the window and holding the right mouse button down to 428 bring up a menu containing the Paste option. 429 Moving a file or subfolder between folders can be done in the same way as copying, 430 except that you choose the Cut option or Ctrl+X instead of Copy. The item that 431 you have Cut will be removed from the original folder when you do the Paste into 432 the new folder. 433 You can also copy or move selected item(s) to another folder by using Edit → 434 Copy Files (F7) or Edit → Move docFiles (F8), or by selecting Copy To or Move To 435 from the drop down menu you get when you right click on an file or folder name 436 in the File Manager window. 437 Note. You may not be able to copy or move a file or folder if you don’t have the 438 necessary permissions. See Section 3.8 for further details. 439 Using Drag ’n Drop 440 Konqueror also supports Drag and Drop copying and moving of files and folders. 441 You can do this by having two instances of Konqueror, one showing the folder 442 you want to copy from, the other showing the target folder. Position the mouse 443 pointer over the item you wish to copy or move, then, holding the left mouse 444 button pressed, “drag” it to a clear space in the target folder. Release the button 445 and you will be presented with a menu choice of Copy or Move. Take care to 446 “drop” the item into an empty area of the target folder view - dropping it on top 447 of another file name or icon can cause problems. 448 You can also set up Konqueror to show more than one folder within its window 449 and drag & drop between them. 450 To be able to show different folders in each view they should not be linked; the 451 little boxes at the bottom right of each view should be empty. 452 The active view, that is the one whose path is shown in the Location Toolbar 453 and which responds to navigation and Menubar commands, is shown by the little 454 green light in the bottom left corner. To make a view active, left click on an 455 empty area of the view or on its Status Bar. 456 To remove an active view from Konqueror’s window use the Ctrl+Shift+R short- 457 cut, or the Menubar Window → Remove Active View option, or right mouse button 34
  • 35.
    Chapter 3. Workingwith Files and Folders Bayanihan Linux 5 Figure 3.9: This screenshot illustrates the use of the Menubar Window → Split View Left/Right option, also available with the shortcut Ctrl+Shift+L, to split the main Konqueror window into two views, each showing the contents of a different folder. 458 click on the Status Bar and choose the Remove Active View option from the re- 459 sulting menu. 460 If you use Konqueror tabs, you can drag and drop between tabs by dragging the 461 file to the tab label, without letting go yet. The destination tab will pop to the 462 front, allowing you to continue dragging and then drop the file. 463 Duplicate File Names 464 If you try to paste a file into a folder that already contains a file with the same 465 name, Konqueror will pop up a dialog box warning you that the file already exists. 466 You can then choose to: 467 • Overwrite the old file with the newly copied one. The Overwrite All button 468 can be used if you have copied multiple items. 469 • Cancel the paste operation by pressing the Skip or Skip All button. 470 • Give the file that is being copied a different name. You can do this by typing 471 a new name into the text entry box or get Konqueror to Propose one. When 472 you have done this press, the Rename button. 35
  • 36.
    Bayanihan Linux 5 Chapter 3. Working with Files and Folders 473 3.6 Selecting Multiple Files 474 You sometimes want to delete, copy or move a number of files that are similar in 475 some way. For example, you may wish to move all of the .png graphics files from 476 one folder to another. Konqueror makes this easy by letting you select multiple 477 files based on similarities in their file names. 478 Use the Menubar Edit → Selection → Select... item or the shortcut Ctrl++. This 479 brings up a little dialog box in which you enter a filename containing the wildcard 480 characters *, which matches any number of characters, and ? which matches a 481 single character. Press OK and Konqueror will highlight all files with matching 482 names. For example; 483 • flag*.png will select all filenanes starting with the letters “flag” and end- 484 ing with “.png”. 485 • memo?.txt will select memo1.txt and memo9.txt but not memo99.txt. 486 When you have selected a range of files, you can narrow down the selection by 487 uing the Menubar Edit → Unselect... option or Ctrl+- to specify which of the 488 selected files should be removed from the selection. 489 Use Ctrl+U or the Menubar Edit → Unselect All option or just left mouse button 490 click on a clear area of the view to cancel the selection. 491 You can even invert the selection: that is, deselect all selected files and select 492 those that were previously unselected. Use the Menubar Edit → Invert Selection 493 option or Ctrl+* to do this. 494 You can also select multiple files and folders by holding the Ctrl button while you 495 click on each individual file or folder. This enables you to then move or copy 496 multiple files and folders to a different location the same method above. 497 A number of useful shortcut keys can be used in list, tree and text view modes: 498 Space. Toggle the current selection. 499 Insert. Toggle the current selection and move down to the next item. 500 Ctrl+Up Arrow, Ctrl+Down Arrow, Ctrl+Home, Ctrl+End, 501 Ctrl+Page Up, Ctrl+Page Down. Move the selection, toggling 502 the selection of everything on the way. 36
  • 37.
    Chapter 3. Workingwith Files and Folders Bayanihan Linux 5 503 Shift+Up Arrow, Shift+Down Arrow, Shift+Home,Shift+End, 504 Shift+Page Up, Shift+Page Down. Deselect everything, then 505 move the selection, selecting everything on the way. 506 Once you have selected the right files then the normal delete, copy or move com- 507 mands will act on all of the selected files at once. 508 Note. Depending on your keyboard type and locale, you may find that the 509 Ctrl++, Ctrl+- and Ctrl+* shortcuts only work with the Numeric keypad 510 +, - and * keys. 511 3.7 Create New 512 When Konqueror is in File Manager mode, picking Create New from the Edit menu 513 or from the context menu you get by right mouse button clicking on a free area 514 in a folder view gives you a submenu letting you create any of the following in 515 the current folder: 516 File → Link To Application... 517 This option is most useful if you want to create an icon that will open a particular 518 application. It opens a dialog box with three tabbed pages. The first, General, is 519 where you choose an icon and the text that will appear with it. The second page, 520 Permissions, lets you select who can use or modify the icon. In the Application page 521 you must enter the Command that will run the application. For example, kwrite 522 to start up the KWrite text editor. kwrite /home/aileen/todo.txt would open 523 the file /home/aileen/todo.txt in KWrite. Advanced options such as the file 524 types which the application can open are also available from this page. 525 To make the application icon appear on your desktop, create the link in your 526 /Desktop folder (this may be called something slightly different depending on 527 how KDE was installed on your system) or get to the Create New... sub menu by 528 right clicking on a free area of the desktop instead of within Konqueror’s window. 529 If you have a lot of specialized application links and don’t want to clutter up 530 the desktop, then why not create them in your Applications folder. You can 531 get there in Konqueror by choosing Go → Applications. Then create a sin- 532 gle icon on your desktop to open your Applications folder, which is usually in 533 /.kde/share/applnk. 534 To put an application link icon into the panel, first create it in the Applications 535 folder then drag the icon onto a clear area of the panel. 37
  • 38.
    Bayanihan Linux 5 Chapter 3. Working with Files and Folders 536 File → Link To Location (URL)... 537 This lets you create an icon to open Konqueror at a particular folder or web page. 538 As with Link To Application... you can make the application icon appear on your 539 desktop by creating the link in your /Desktop folder or going to the Create New... 540 sub menu by right clicking on a free area of the desktop. When you first create it 541 the text shown with the icon will be the full path or URL. You can change it by 542 right clicking on the icon, selecting Properties... and entering the preferred text 543 in the General tab page. 544 Device → Floppy Device... 545 Use this option to create an icon that will mount a floppy disk and open an 546 instance of Konqueror showing the disk’s contents. To unmount the disk when 547 you have finished with it right click on the icon and select Unmount. In practice 548 it doesn’t have to be a floppy disk but can be any hard disk or partition on your 549 system that is not normally mounted. 550 Hard Disk. This option is similar to Floppy Device... but for a hard disk 551 drive or partition. 552 CD/DVD-ROM Device. This option is similar to Floppy Device... but 553 for a CD or DVD drive. 554 Folder. An easy way of creating a new (sub)folder. 555 Text File. Use this to create an ordinary, empty, text file. A dialog box 556 will be opened for you to enter the name of your new file. 557 HTML File. Creates a skeleton HTML source file. When you type the 558 new file’s name into the dialog box it is probably best to give it a .html 559 extension to avoid confusion. 560 Presentation Document. Creates a skeleton OpenOffice.org Impress doc- 561 ument. Give its name a .odp extension. 562 Text Document. Creates a skeleton OpenOffice.org Writer document us- 563 ing the standard Writer style template. Give its name a .odt extension. 564 Spread Sheet Document. Use this to create a new OpenOffice.org Calc 565 file, and name it with a .ods extension. 38
  • 39.
    Chapter 3. Workingwith Files and Folders Bayanihan Linux 5 566 Illustration Document. Creates a new OpenOffice.org Draw document. 567 Name it with the extension .odg. 568 3.8 Changing Names and Permissions 569 The two easiest ways to change the name of a file or folder is to either right click 570 on it and select Rename, or select the file or folder and then press the F2 button. 571 To change the name or permissions of a file or folder, right click on its name or 572 icon and select the Properties... item, or if you have “selected” the file or folder, 573 then you can use the Menubar Edit → Properties option. 574 This will bring up the Properties dialog box with two tabbed pages: 575 • General, which gives you some information about the item and lets you 576 change its name and, for a folder, the associated icon. 577 • Permissions, which shows you the item’s ownership and access permissions 578 and lets you change the permissions. 579 Copy and Rename 580 If you want to make a copy of an existing file with a different name – perhaps as a 581 backup – in the same folder as the original file, do a normal Copy then when you 582 Paste it a dialog box will pop up complaining that the file already exists. Just 583 type the new name into the dialog’s text box and press the Rename button (or 584 if you are feeling lazy pressing the Propose button will generate a new name for 585 you). 586 Super User Mode 587 If you are running as a normal user and try to access files outside of your own 588 /home folder you will often be prevented from doing so and get an error message 589 such as Access Denied. 590 To access these files you need to be logged in as the system administrator, often 591 known as the Super User or root. 592 Rather than logging out then in again, you can launch Konqueror from the Menu 593 in Super User mode by selecting System → File Manager - Super User Mode. You 594 will be asked for the root login password but as long as you can provide that 595 Konqueror will be started up with full access privileges to all files on your system. 39
  • 40.
    Bayanihan Linux 5 Chapter 3. Working with Files and Folders 596 Warning! Take care. As Super User (root), you have complete control of your 597 system, and a wrong command can easily do irrevocable damage. 598 Also, connecting to the internet as root is an extremely bad idea, 599 as it seriously increases your vulnerability to malicious hacking. 600 3.9 Configuring File Association 601 KDE provides many applications which can open many different types of file. 602 Most of the time, the defaults will work with no problems, but Konqueror provides 603 a powerful system to allow you to change the applications used to open each file 604 type. For more details, choose the Settings → Configure Konqueror... menu item, 605 select File Associations in the configuration dialog, and click on Help. 606 3.10 At the Command Line 607 Although Konqueror is a very powerful and flexible GUI file manager, there are 608 occasions when the experienced Linux / UNIX user wants to get down to the 609 basics and work at the text command line level. 610 You can, of course, open an instance of Konsole, perhaps with Konqueror’s 611 Menubar Tools → Open Terminal option or with Ctrl+T. 612 If you only want to launch a program or view a URL, the Tools → Run Command 613 (Alt+F2) option may be easier. 614 Tools → Execute Shell Command... (Ctrl+E) opens a small command line dialog 615 window where you can enter a shell command such as ps -ax | grep kdeinit . 616 Note that it does not support full featured terminal control characters, so appli- 617 cations such as top and less will not work properly, but it is available immediately 618 without the delay involved in starting Konsole. 619 For more complex operations, Konqueror has another nice feature: the Menubar 620 Window → Show Terminal Emulator option, which opens up a terminal window 621 as a new view within Konqueror (See Figure 2.10). As long as the link icon is 622 visible at the bottom right corner of each view, the terminal will follow any folder 623 changes you make in the normal file manager view2 . 2 http://docs.kde.org/stable/en/kdebase-apps/konqueror/index.html 40
  • 41.
    Chapter 3. Workingwith Files and Folders Bayanihan Linux 5 Figure 3.10: The Terminal Emulator option opens up a terminal window as a new view within Konqueror 41
  • 42.
    Bayanihan Linux 5 Chapter 3. Working with Files and Folders 624 3.11 Linux Filesystem Hierarchy 625 The first thing that most new users shifting from Windows will find confusing is 626 navigating the Linux filesystem[6]. The Linux filesystem does things a lot more 627 differently than the Windows filesystem3 . To put it simply, it can be visualized as 628 a tree with its roots and all[3]. At the top of the hierarchy is invariably the root 629 path which is represented by ‘‘/’’. All other directories are created beneath this 630 root path. And each of the sub directories have a specific purpose. For example, 631 ‘‘/etc’’ contain the configuration files, the ‘‘/opt’’ directory is used to install 632 third party software, ‘‘/boot’’ contain the grub files and the Linux kernel and 633 so on4 . 634 In the Filesystem Hierarchy Standard (FHS), all files and directories appear under 635 the root directory ‘‘/’’, even if they are stored on different physical devices[2]. 636 Note however that some of these directories may or may not be present on a UNIX 637 system depending on whether certain subsystems, such as the X Window System, 638 are installed. 639 The majority of these directories exist in all UNIX operating systems and are 640 generally used in much the same way; however, the descriptions here are those 641 used specifically for the FHS, and are not considered authoritative for platforms 642 other than Linux5 . 643 / This is the base, or root, of the file system. Everything in the Linux system is 644 housed in this directory[1]. 645 /bin This directory contains a number of essential commands that are available 646 to unprivileged users (such as cat, chmod, chown, etc). The /bin directory 647 also houses the shells (such as bash). 648 /boot This directory contains everything necessary for the boot process. With- 649 out the /boot directory, your machine would not be able to boot up. 650 /dev This directory contains all of the special and device files. With Linux all 651 devices and drives have a name. Hard drives tend be labeled as hda, hdb, 652 hdc. Special devices such as external usb devices can be labeled as sda, 653 sdb, sdc. If you look in the /dev directory you will see quite a few files that 654 can be associated with devices. Most of the devices found here are either 655 block or character devices. Block devices hold data (such as a hard drive) 656 and character devices transmit data (such as a mouse). 3 http://www.freeos.com/articles/3102/ 4 http://linuxhelp.blogspot.com/2008/05/linux-file-system-hierarchy-fun-easy. html 5 http://en.wikipedia.org/wiki/Filesystem_Hierarchy_Standard 42
  • 43.
    Chapter 3. Workingwith Files and Folders Bayanihan Linux 5 657 /etc This is a very special directory that contains numerous configuration files 658 and directories. This directory will contain the X configurations, Apache, 659 Samba, the init system, etc. The /etc directory also houses the sources for 660 package management systems like apt and yum. One of the most important 661 subdirectoris in /etc is the /etc/init.d. 662 /home This is where all user data is housed. Each user on the system will 663 have their own subdirectory within /home. All user data and user-specific 664 configuration files are saved here. 665 /lib This is where all kernel modules needed for system boot libraries that are 666 required by root system commands (commands found in /bin and /sbin.) 667 /lost+found If your system crashes or is shut down improperly any lost data 668 will be stored here. During a recovery boot the fsck application will attempt 669 to recover corrupt files found here. 670 /media This is where all external media (or extra internal drives) is mounted. 671 If you make or edit entries in the /etc/fstab file you will point devices 672 (such as /dev/sda to directories withing /media.) 673 /mnt This is another directory where external (and internal) drives and devices 674 are mounted. This is a holdover to older school thought. Most modern 675 distributions are moving to the /media directory. 676 /opt This is a directory that can be used for installing applications that are out- 677 side of the default installation. When you install applications here they can 678 be used system wide by all users. Only the root user can install applications 679 here. 680 /proc This is a special directory that is actually a virtual filesystem. The /proc 681 directory acts as a process information center for the kernel. 682 /root This is the root users home directory. 683 /sbin This is where all system maintenance/administration executable files are 684 stored. These commands differ from those in /usr/sbin in that they are 685 system commands used for critical system administration and maintenance 686 whereas /usr/sbin are non-critical tasks such as user administration, net- 687 work administration, etc. 43
  • 44.
    Bayanihan Linux 5 Chapter 3. Working with Files and Folders 688 /usr This is one of the largest directories on your system as it contains all user- 689 executable binaries as well as the libraries, documentation, and header files 690 for these executables. One of the most important subdirectories is /usr/bin 691 where all user application executables are stored. 692 /var This directory contains all variable data such as log files. On a server 693 environment the document root directory of most servers will be found here 694 (/var/www and /var/ftp are examples.) 695 /srv This directory can contain the services (such as www) directory in some 696 distributions. 697 /tmp This directory, as you would expect, contains temporary files that are 698 stored as needed. Many files you will find here are lock files created by 699 applications. Do not remove anything from this directory as the cron system 700 has a job specifically created for the removal of these files6 . 6 http://www.ghacks.net/2008/12/11/get-to-know-linux-file-system-hierarchy/ 44
  • 45.
    Chapter 3. Workingwith Files and Folders Bayanihan Linux 5 7 Figure 3.11: The diagram represents (part of) a Linux file system know as Filesystem Hierarchy Standard[7]. A line from one node to a node on its right indicates containment. For example, the student directory is contained within the home directory. 45
  • 46.
    Bayanihan Linux 5 Chapter 3. Working with Files and Folders 46
  • 47.
    701 702 CHAPTER 703 FOUR 704 705 Connecting to the Internet 706 Chapter Author : Russel Baisas 707 708 Connecting to the Internet has become easier with this release of Bayanihan Linux. 709 The following sections describe the steps necessary for connecting your machine 710 to the World Wide Web using the different applications that are bundled with 711 this release. 712 4.1 Dial-Up using KPPP 713 KPPP is a graphical fronted to the ppp tools that are bundled with the system. 714 These tools allow you to connect to the Internet using a dial-up modem, a tele- 715 phone line and an account with an ISP. 716 717 To run this application, simply click on the link found at the Menu: 718 → Internet → KPPP - Internet Dial-Up Tool 719 To begin with the setup, Click on the Configure button. 720 In Figure 4.2, Setup for an account is the first step. Click on New button to 721 configure for new account. 47
  • 48.
    Bayanihan Linux 5 Chapter 4. Connecting to the Internet Figure 4.1: KPPP Dial-Up Tool Figure 4.2: KPPP Configuration 722 If it is your first time to run Kppp, configuration of modem and account is re- 723 quired. An option prompt box will appear to let you choose for the wizard con- 724 nection or the manual connection. Normally for first time users, it is required to 725 setup the account in manual mode because wizard connection is mainly use for 726 existing account setup. Click on Manual Setup button to start configuring 727 When the new account dialog appears, fill up the specified information for every 728 tab such as account connection details, phone number, and and others that are 729 mandatory. Refer to Figure 4.4. 730 KPPP Account Dialog Box Customize argument are pass on pppd using 731 customize pppd button.(This button is optional). Figure 4.3: KPPP Wizard 48
  • 49.
    Chapter 4. Connectingto the Internet Bayanihan Linux 5 Figure 4.4: KPPP Account Dialog Box Figure 4.5: It is use for con- figuring your IP address, if the service provider has pro- vide you with a static IP ad- dress. you may specify it in static IP address field. The default field is dynamic IP address. Figure 4.6: For the gate- way tab, you can select on either Default Gateway or Static Gateway. If your ISP has specified an IP address you should use it as a static gateway. 49
  • 50.
    Bayanihan Linux 5 Chapter 4. Connecting to the Internet Figure 4.7: For the DNS tab, input for domain name are given by your ISP provider. Automatic is the default con- figuration on this. Figure 4.8: The login script tab allows the user to cus- tomize the way of configuring the setup and logging in on kppp. If you use the script- based login in the Authenti- cation on the dial up tab you can specify it here. Figure 4.9: This option is use to input a certain com- mand to be use by the real user ID. It is best advise not to use root as a user unless an admin has allow the ordi- nary user to use it. You can customize your command by adding a script. for exam- ple, we can make a script for backup of logs during your lo- gin process. 50
  • 51.
    Chapter 4. Connectingto the Internet Bayanihan Linux 5 Figure 4.10: The purpose of accounting tabs is to check on how much bytes are sent to and from the internet while you are log in. It is best to check for this because most internet provider base their costing on how much bytes are transfered while login on the internet. 732 Configuring the Modem on KPPP 733 The Device Tab 734 After configuring the accounts for kppp, next step to configure is the modem. It 735 is require to know your modem’s specification for you to configure it on kppp. 736 The Modem tab 737 → Busy wait - This is the length of time that a modem will wait before redi- 738 aling. 739 → Modem volume - This sets the volume of the modem. 740 → Modem commands - This field is any name that will represent the command 741 on your modem but it should be relevant to the command to avoid chaos. 742 → Query modem - It provides information on your modem but still depends 743 on the resource if it has the exact information from resource. This may be 744 not as informative. 745 → Terminal - This mini terminal is use for modem configurationa and some 746 experimentation to play around with the modem. 747 The graph tab is use to customize the color of your kppp application. 51
  • 52.
    Bayanihan Linux 5 Chapter 4. Connecting to the Internet Figure 4.11: Modem Configuration Figure 4.12: The Graph Tab Figure 4.13: The miscellanous tab have some option that might be needed in con- figuring kppp application. 52
  • 53.
    Chapter 4. Connectingto the Internet Bayanihan Linux 5 Figure 4.14: Knetworkmanager Main Window 748 4.2 LAN/WiFi connectivity with KNetworkMan- 749 ager 750 Knetworkmanager is the network application use by K desktop environment. It 751 is a user friendly gui application use for configuring and switching of network 752 environment. 753 Starting up knetworkmanager 754 To start on knetworkmanager, go to: 755 → Setting → Network Settings 756 knetworkmanager needs to ba a root user to access it. you can press on the 757 administrator mode then a dialog box will prompt a password. Figure 4.14 and 758 Figure 4.15 53
  • 54.
    Bayanihan Linux 5 Chapter 4. Connecting to the Internet Figure 4.15: Knetworkmanager password to root Figure 4.16: It displays on what network card is de- tected, if no network inter- face are display, it is pos- sible that the lan cards are not yet install. For config- uring lan card and wireless card 54
  • 55.
    Chapter 4. Connectingto the Internet Bayanihan Linux 5 Figure 4.17: Normally when knetworkmanager detects a network, it automatically con- figures the default gateway if the routed daemon is up and running. A Default Gateway is the node on the computer net- work that is chosen when the IP address does not belong to any other entities in the Routing Table. Figure 4.18: Knetworkmanager automatically gen- erates a dns for it. If dns was not auto- matically configured, there might be a problem with the network or a problem with /etc/resolv.conf. you can refer to chapter 9 of system administration for troubleshooting. 55
  • 56.
    Bayanihan Linux 5 Chapter 4. Connecting to the Internet Figure 4.19: If you have a different ethernet settings you can load your network profile that would fit on your network setup for your ethernet. 759 4.3 Using FireFox and Konqueror for browsing 760 the web 761 FireFoxTM (shown in Figure ??) is a popular open-source web browser developed 762 by the Mozilla Foundation. 763 Starting firefox 764 To run this application, simply click on the link found at the Menu: 765 → Internet → FireFox - Web Browser 766 Opening, Selecting and Closing tabs 767 A tabs can be found below the bookmark toolbars, it allows firefox to use multiple 768 firefox window taskbar to be open one at a time. 769 By pressing on [Ctrl]+[t] or you may choose to click 770 File → New Tab 771 , 56
  • 57.
    Chapter 4. Connectingto the Internet Bayanihan Linux 5 Figure 4.20: Multiple Tabs for Firefox Figure 4.21: Miscellaneous Pref- erence Dialog on Firefox Which lets you customize and configure your firefox browser 772 Using the Konqueror for Browsing the Web 773 Konqueror is a web browser, file manager and file viewer designed as a core part 774 of the K Desktop Environment. It is developed by volunteers and can run on most 775 Unix-like operating systems. Konqueror, along with the rest of the components in 776 the KDEBase package, is licensed and distributed under the GNU General Public 777 License. This section will describe the use of konqueror as a web browser.Figure ?? 778 Starting konqueror 779 To start konqueror, go to . 780 → Internet → konqueror 781 Creating, Opening and Closing tabs 782 tabs in konqueror are found underneath the location toolbar, same as the func- 783 tionality of firefox, it allows for a multiple access of konqueror windows. You can 784 also press [Ctrl] + [t] or go to Figure 4.22: Multiple Tabs 57
  • 58.
    Bayanihan Linux 5 Chapter 4. Connecting to the Internet Figure 4.23: Quick Search on Konqueror Figure 4.24: Find Tool- bars on Konqueror 785 Bookmarks 786 You can bookmark a page on konqueror by going to 787 Bookmark → Add Bookmark 788 Quick Search 789 You can find the quick search on konqueror at the upper right beside the location 790 toolbar Figure 4.23 791 Find Toolbar 792 The find toolbar on konqueror are found on 793 Edit → Find 794 or you can type [Ctrl] + [f] Figure 4.24 795 Miscellaneous 796 You con configure konqueror by going to 797 Settings → Configure Konqueror 798 Figure 4.25 58
  • 59.
    Chapter 4. Connectingto the Internet Bayanihan Linux 5 Figure 4.25: Preferences Configu- ration for Konqueror 799 4.4 Setting the proxy for firefox and konqueror 800 To set the proxy for Mozilla firefox: 801 Edit → Preferences → Advance → Network 802 To set the proxy for Konqueror: 803 Settings → Configure Konqueror → Proxy 804 Installing Additional Plugins 805 Plugins are tools use to enhance your internet browser by adding more function- 806 alities to it. There are lots of plugin that you can find on the internet and you can 807 download it for free. We will be focusing on installing plugin for mozilla firefox 808 and konqueror since these 2 are the default internet browser use by bayanihan 809 linux. 810 To install the plugin on firefox: 811 1. Open a new browser window using Firefox. 812 2. Go to the Firefox plugins Web page(see https://addons.mozilla.org/ 813 en-US/firefox/browse/type:7). 814 3. Browse through the list of plugins that are available. Choose from items 815 such as Flash player, Java, Gxine and many more. 816 4. Look beneath the plugin you’d like to download. You’ll be re-routed to the 817 downloads page for the specific plugin you wish to add. 59
  • 60.
    Bayanihan Linux 5 Chapter 4. Connecting to the Internet 818 5. Look for the ’Download’ or ’Download Now’ button and click it. You may 819 be prompted to save a file. Click ’Save File.’ A dialog box will show the 820 download progress. When the download is complete, click ’Clean Up.’ 821 6. Open the plugin after it finishes downloading. If you left the default setting 822 in place, the plugin will be on your desktop. Simply clicking the icon will 823 install it in Firefox. 824 To install the plugin in konqueror: 825 1. Start up Konqueror, then do a Web search for ’plugins’ for konqueror. When 826 you find a plugin you think you might use and enjoy, click on it and follow 827 the instructions for downloading found on that Web site. Note that other 828 plugins may have different download instructions. 829 2. Set Konqueror to read the plugin: Once your chosen plugin has been down- 830 loaded to your computer, go to the Konqueror tool bar and click on ’Con- 831 figure Konqueror.’ 832 3. Choose ’plugins.’ 833 4. Hit ’Refresh.’ 834 5. Close Konqueror, then re-open it. Once you have re-opened Konqueror, it 835 will be all set to read and use the plugin you just downloaded. 836 4.5 E-Mail 837 Electronic mail(E-mail) is any method of communicating and storing data using 838 digital device such as computers. Bayanihan uses a Kmail as dafault for sending 839 and receiving email. 840 Configuring/Using KMail 841 KMail is the e-mail client of the KDE desktop environment. It is use by Bayanihan 842 Linux as the default email client. 843 Starting KMail 844 To start kmail. 60
  • 61.
    Chapter 4. Connectingto the Internet Bayanihan Linux 5 Figure 4.26: KMail Start 845 It if is your first time to use kmail just follow the wizard to setup your mail 846 account. 847 → Internet → Kmail 848 Composing a message 849 After you have setup your account, we will now compose a new message to test 850 your new account. To compose message window go to: 851 → Message → New Message 852 Fill in the appropriate fields in the composer window. You can use the View menu 853 to select which header fields you want to display. 854 Organizing your address can easily be remember if you will be sending message 855 to multiple address or single address.You can use the address book by clicking 856 on the select button beside the To field then from that it will list your current 857 contact email address. 858 Whenever you want to add more than one recipient in one of the fields, use a 859 comma to separate each address from the next one. You may need to specify 860 fully qualified addresses (i.e. user@example.com) even for local users, depending 861 on your system configuration. 61
  • 62.
    Bayanihan Linux 5 Chapter 4. Connecting to the Internet Figure 4.27: Composing Mes- sage on KMail 862 When you are finished with your message, click the Send Now icon (the envelope) 863 to send the message. Figure 4.27 864 Message Folders 865 Message Folders are used to organize your email messages. By default, if you have 866 no existing message folders, messages are stored in the folder $KDEHOME/share/apps/kmail/. 867 If you have existing message folders in /Mail, these will be used instead. When 868 you first start KMail the inbox, outbox, sent-mail, trash and drafts folders are 869 created. These folders each have special functions 870 Inbox: 871 Where KMail by default puts your new messages when you ask it to check your 872 mail. 873 Outbox: 874 Where messages are put while they are waiting to be delivered. Note that you 875 should not drag and drop messages here to send them, use the Send icon in the 876 composer window instead. Sent-mail: 877 By default copies of all messages that you have sent are put into this folder. Trash: 878 By default all messages that you have moved to trash are moved into this folder. 879 Drafts: 880 Contains messages you started to edit but then saved to this folder instead of 881 sending them. 62
  • 63.
    Chapter 4. Connectingto the Internet Bayanihan Linux 5 Figure 4.28: Main Window of Thunderbird 882 Installing/Using Thunderbird 883 Mozilla Thunderbird is the open source e-mail client develop by Mozilla founda- 884 tion. Figure 4.28 885 To install thunderbird, go to the directory where you download the source and 886 untar/unzip the source by using the command below. 887 1. cp thunderbird-2.0.0.19.tar.gz /opt/ 888 2. cd /opt 889 3. tar -zxvf thunderbird-2.0.0.19.tar.gz 890 4. ln -s /opt/thunderbird/thunderbird /bin/thunderbird 891 If you want to create a desktop shortcut for thunderbird, you can follow on this 892 procedure: 893 Right click on the desktop → create new → link to application. Go to application 894 and fill up the field required. 895 If you want to open thunderbird on the commandline, just type in thunderbird in 896 the terminal. 897 Starting up Thunderbird 898 After finishing your installation and everything went well. We can now start using 899 thunderbird. 63
  • 64.
    Bayanihan Linux 5 Chapter 4. Connecting to the Internet Figure 4.29: Configuring and Starting up Thunderbird Figure 4.30: Configuring and Starting up Thunderbird 900 First is you have to setup your account. Thunderbird has a user friendly wizard 901 which will guide you in configuring your account name and other configuration. 902 Figure 4.29 903 Figure 4.30 904 Composing a Message 905 To compose a new message for Thunderbird, go and click on the Write button 906 located beside Get Mail button. Figure 4.31 64
  • 65.
    Chapter 4. Connectingto the Internet Bayanihan Linux 5 Figure 4.31: Main Window for Composing a Message on Thunderbird 907 Message Folders 908 Thunderbird has a 4 default message folders on the main window, the inbox, 909 drafts, trash and the local folders. everytime you got a new message on your 910 mailbox it is automatically put in the inbox. you can make a rule on how to 911 organize your incoming message to where it be put. 912 Address Book 913 Address book stores the email address of your contacts. You can find the icon 914 Address Book on the upper tool bar beside the Write icon 915 4.6 VOIP 916 VoIp(Voice over Internet Protocol) is a service that convert your voice into a 917 digital signal that travels on internet. A broadband(high speed internet and a 918 headset microphone computer device is require. 919 Configuring/Using Ekiga 920 Ekiga(Formerly Gnome Meeting) is an open source VoIP and video conferencing 921 application by gnome. Ekiga is default in bayanihan linux. 65
  • 66.
    Bayanihan Linux 5 Chapter 4. Connecting to the Internet Figure 4.32: Ekiga 10 Easy COnfiguration 922 Newbie users 923 If it is your first time to use ekiga, ekiga has a pop up wizard with 10 easy 924 configuration that is applicable for first time users. Simply follow the steps that 925 starts from creating an account to configuring hardware device. Figure 4.32 926 Calling using Ekiga 927 If you want to call other users, you need a SIP address. It is an address known 928 to be like a phone number. You can get a SIP address for free from (http: 929 //www.ekiga.netasdescribedhere). You can use the online address book of 930 Ekiga to find the SIP addresses of other Ekiga users. It is of course possible to 931 call people who are using another provider (other than ekiga.net) using Peering 932 or Enum. You can actually call any user using SIP software or hardware, and 933 registered to any public SIP provider. Ekiga can also be use to do PC-to-PC calls, 934 PC-to-phone calls or vice versa. 935 Messaging using Ekiga 936 You can also chat with your friends using ekiga. You can do this by clicking on 937 the left, above the Change the view mode.To send a text message to a user, simply 938 enter his/her SIP address into the sip: input box at the top of the screen, enter 939 your text message, and click on Send. Figure 4.33 940 Video Calls 941 Your camera must be supported by the linux kernel and compatible with Video4linux/Video4linux2 942 API in order to use webcams for video calls. 66
  • 67.
    Chapter 4. Connectingto the Internet Bayanihan Linux 5 Figure 4.33: Messaging with Ekiga Figure 4.34: Ekiga Address Book 943 Ekiga has an assistant for configuring video support: just run the Configuration 944 Assistant until the end. 945 Testing your webcam 946 To test your webcam you can do this: 947 There are 6 icons on the left side of the main Ekiga window. Push the 4th button 948 from the top (a grey round webcam). If eveything is ok, you’ll see the output of 949 the webcam. If not, you’ll see the Ekiga logo bouncing slowly. 950 Managing your Address Book 951 To see the address book on ekiga, go to Tools → Address Book. A pop up window 952 will appear for choosing your contact list. Figure 4.34 67
  • 68.
    Bayanihan Linux 5 Chapter 4. Connecting to the Internet Figure 4.35: Skype Figure 4.36: Installing Skype on Bayanihan Linux 953 Installing/Using Skype 954 Skype is a software that allows us call the user over using the internet with free of 955 charge but calls to other landlines and mobile might have charges depend on the 956 telecom company. It also allows for chatting and video conferencing. Figure 4.35 957 Installing Skype 958 Download Skype on their website (http://www.skype.com/intl/en/download/skype/linux/choose/). 959 You can choose on debian etch as the source for bayanihan linux. after you have 960 downloaded skype use the command dpkg -i skype-debian 2.0.0.72-1 i386.deb. 961 you must be a root user to use it. Figure 4.36 962 Using Skype 963 In order to use skype, you must have an account and you can get it on their web- 964 site https://secure.skype.com/account/login?message=login required, After your 965 account is done, you can now login to skype. Figure 4.37 68
  • 69.
    Chapter 4. Connectingto the Internet Bayanihan Linux 5 Figure 4.37: Logging in to Skype Figure 4.38: Pidgin Main Window 966 4.7 Instant Messaging With Pidgin 967 Pidgin is an instant messaging client that support different account on other 968 instant messaging applications. It supports AIM, ICQ, Jabber/XMPP, MSN, 969 Yahoo!, Bonjour, Gadu-Gadu, IRC, QQ, SILC, Simple. 970 Pidgin can log you to different account but you must be register on a specifi 971 account before you login to pidgin. Figure 4.38 972 Add an Account on Pidgin 973 You can go to Accounts → Manage or click on [ctrl] + [a]. Then click on the add 974 button, then you can choose which account that you want. Figure 4.39 69
  • 70.
    Bayanihan Linux 5 Chapter 4. Connecting to the Internet Figure 4.39: Adding Account on Pidgin Figure 4.40: Composing a Mes- sage on Pidgin 975 Compose a Message 976 Just click on the name of the user if you like to talk or give a message. Figure 4.40 977 4.8 Desktop Sharing/Remote Desktop 978 Desktop Sharing is an application that allows you to use and share an existing 979 session to another machine. The user may also control your desktop which is like 980 sharing one session using 2 computers. 981 Using Krfb 982 To start krfb, go to: 983 → Internet → Krfb 70
  • 71.
    Chapter 4. Connectingto the Internet Bayanihan Linux 5 Figure 4.41: Starting Up Krfb Figure 4.42: Creating Personal In- vitation for krfb 984 You can share desktop right away by choosing on the create personal invitation 985 it will create a host and a password which you will be giving to other station to 986 connect to your desktop. 987 Using Krdc 988 After Creating an invitation, you can now access the desktop using the krdc. To 989 open krdc go to: 990 → Internet → Krdc 71
  • 72.
    Bayanihan Linux 5 Chapter 4. Connecting to the Internet Figure 4.43: Gui of Krdc Figure 4.44: Gui of Krdc 72
  • 73.
    991 992 CHAPTER 993 FIVE 994 995 Using OpenOffice.org 3 996 Chapter Author : Pearliezl Dy Tioco 997 998 5.1 OpenOffice.org 3 Writer 999 What is Writer? 1000 Writer is the word processor component of OpenOffice.org (OOo). In addition 1001 to the usual features of a word processor (spelling check, thesaurus, hyphenation, 1002 autocorrect, find and replace, automatic generation of tables of contents and 1003 indexes, mail merge, and others), Writer provides important features: 1004 • Templates and styles 1005 • Page-layout methods, including frames, columns, and tables 1006 • Embedding or linking of graphics, spreadsheets, and other objects 1007 • Built-in drawing tools 1008 • Master documentsto group a collection of documents into a single document 1009 • Change tracking during revisions 1010 • Database integration, including a bibliography database 73
  • 74.
    Bayanihan Linux 5 Chapter 5. Using OpenOffice.org 3 1011 • Export to PDF, including bookmarks 1012 • And many more 1013 Starting from the system menu 1014 The most common way to start Writer is by using the system menu, on GNOME, 1015 it is called the Applications menu, on KDE, it is identified by the KDE logo. 1016 The Writer interface 1017 The main Writer workspace is shown below. 1018 1019 Menus 1020 The Menu bar is located across the top of the Writer window, just below the 1021 Title bar. When you choose one of the menus, a submenu drops down to show 1022 commands like File, Edit, View, Insert, Format, Table, Tools, Window and Help. 1023 Toolbars 74
  • 75.
    Chapter 5. UsingOpenOffice.org 3 Bayanihan Linux 5 1024 The first toolbar is a Standard Toolbar is consistent across the OpenOffice.org ap- 1025 plication. The second toolbar across the top is a Formating Toolbar that provides 1026 tools for formatting graphics and has a context-sensitive bar. 1027 Status Bar 1028 This provides information about the document and can change some document 1029 features. It has Page number, Page style, Language, Insert mode, Selection mode, 1030 Digital signature, Section or object information (Picture, List item, Heading and 1031 Table), View Layout and Zoom. 1032 Changing Document views 1033 There are several ways to view a document: Print Layout, Web Layout and Full 1034 Screen. Go to View menu and click on the required view. Print Layout is the 1035 default document view. Ctrl+Shift+J the Full Screen view, press the Esc key to 1036 return to either Print or Web Layout view. 1037 When in Print Layout and Web Layout you can Zoom slider on the menu bar. 1038 You can use both Zoom slide and View Layout icons on the Menu Bar. In Web 1039 Layout view, most of the choices are not available. 1040 Starting a new document 1041 Creating a blank document 1042 When OpenOffice.org Writer is open a Welcome screen is shown. Click one of 1043 the icons to open a new document or click the Templates icon to start a new 1044 document using a template. 1045 You can also start a new document in one of the following ways. 1046 • If a document is already open in OpenOffice.org, the new document opens 1047 in a new window. 1048 • Press the Control+N keys. A new empty document opens. If you already 1049 have a document open, the new document appears in a new window. 1050 • Use File ¿ New ¿ Text Document. The result is the same as pressing the 1051 Control+N keys. 1052 • Click the New button on the main toolbar . 75
  • 76.
    Bayanihan Linux 5 Chapter 5. Using OpenOffice.org 3 1053 Creating a document from a template 1054 You can use templates to create new documents. If you want to have a document 1055 with similar layout use Templates. As a result, all the documents look alike; they 1056 have the same headers and footers, use the same fonts, and so on. 1057 Once you do have an existing templates, you can create new documents based 1058 on them by using File ¿ New ¿ Templates and Documents. This opens a window 1059 where you can choose the template you want to use for your document. 1060 A new document is created based on the formats defined in the template. 1061 1062 Opening an existing document 1063 When no document is open, the Welcome screen provides an icon for opening 1064 an existing document. You can also open an existing document in one of the 1065 following ways. If a document is already open in OpenOffice.org, the second 1066 document opens in a new window. 76
  • 77.
    Chapter 5. UsingOpenOffice.org 3 Bayanihan Linux 5 1067 Click File > Open. 1068 Click the Open button on the main toolbar. 1069 Press Control+O on the keyboard. 1070 In each case, the Open dialog box appears. Select the file you want, and then 1071 click Open. 1072 In the Open dialog box, you can reduce the list of files by selecting the type of 1073 file you are looking for. For example, if you choose Text documents as the file 1074 type, you will only see documents Writer can open (including *.odt, *.doc, *.txt). 1075 This method opens Word (*.doc) files, as well as OpenOffice.org files and other 1076 formats. 1077 Saving a document 1078 To save a new document, do one of the following: 1079 Press Control+S. 1080 Select File > Save. 1081 Click the Save button on the main toolbar. 1082 When the Save As dialog box appears, enter the file name and verify the file type 1083 (if applicable). 1084 To save an open document with the current file name, choose File ¿ Save. This 1085 will overwrite the last saved state of the file. 1086 Password protection 1087 To protect an entire document from being viewable without a password, use the 1088 option on the Save As dialog box to enter a password. This option is only available 1089 for files saved in OpenDocument formats. Passwords must contain a minimum 1090 of 5 characters. The OK button appear if it reached the minimum characters 1091 required. 1092 • On the Save As dialog box, select the Save and tick the password option, 1093 and then click Save. You will receive a prompt: 77
  • 78.
    Bayanihan Linux 5 Chapter 5. Using OpenOffice.org 3 1094 1095 • Type the same password in the Password field and the Confirm field, and 1096 then click OK. If the passwords match, the document is saved and the file is 1097 password protected. If the passwords do not match, you receive the prompt 1098 to enter the password again. 1099 5.2 OpenOffice.org 3 Calc 1100 Calc is a spreadsheet software that is a free alternative to Microsoft Excel. It 1101 allows you to store, organize and analyze numerical information. Shown below is 1102 the OpenOffice.org Calc default window. 78
  • 79.
    Chapter 5. UsingOpenOffice.org 3 Bayanihan Linux 5 1103 1104 • Tool Bars - contains commands that have pictures or icons associated with 1105 them. The Calc Toolbars are Main Menu toolbar, Function toolbar, For- 1106 mating toolbar and Formula toolbar. 1107 1. Main Menu Toolbar - this gives you access to many of the basic 1108 commands used in Calc. 1109 2. Function Toolbar - contains icons to provide quick access to 1110 commands. 1111 3. Formating Toolbar - has icons plus drop-down menus that 1112 allow you to select a font, font color, alignments, number formats, 1113 border options and background colors. 1114 4. Formula Toolbar - contains the Name Box drop-down menu 1115 and a ling white box called Input Line. 1116 • Cells - is the fundamental element of worksheet and has an intersection of a 1117 column and row. A Cell Address is a combination of the column letter and 1118 the row number of a cell, such as A2 or B16, etc. 1119 • Column Headings - this contains 256 columns and named by a letter or 1120 combination of letters. 79
  • 80.
    Bayanihan Linux 5 Chapter 5. Using OpenOffice.org 3 1121 • Row Headings - this contains 65,536 rows and named by a number. 1122 • Navigation Bars - allows you to move from on worksheet to another, this 1123 buttons display the first, previous, next and last worksheets. 1124 • Sheet Tabs - separate a sheet into specific worksheets. 1125 Using Functions 1126 A function is a predefined formula that helps perform mathematical functions. 1127 Functions save you the time of writing lengthy formulas. Function has a specific 1128 order called syntax. 1129 1. All functions begin with the = (equal sign). 2. Define the function 1130 name (e.g., Sum, Average, Count, Max and Min). 3. Enclose one or 1131 more arguments - numbers, text or cell references with parentheses. 1132 Separate a comma for each argument that is more than one. 1133 Accessing Calc Functions 1134 Click the Function Wizard button on the Standard toolbar. The Function Wizard 1135 dialogue box appears. 80
  • 81.
    Chapter 5. UsingOpenOffice.org 3 Bayanihan Linux 5 1136 1137 The drop-down menu of the Functions tab to display a list of function categories 1138 available for you to use in Calc. Click the desired Function that you would like 1139 to use in the spreadsheet. 1140 Grouping and Ungrouping Worksheets 1141 A workbook is a multi-page spreadsheet with multiple worksheets. 1142 • Worksheets can also be combined together into a group. Grouping work- 1143 sheets allows you to apply identical formulas and/or formatting across all 1144 the worksheets in the group. 1145 • When you group worksheets, any change made to one worksheet will also 1146 be applied to the other worksheets. 1147 • if you want several worksheets to have the same data – regions, depart- 1148 ments, quarters, months, weeks and days – and you’ve decided to group 1149 your worksheets, all you need to do is type that information once and it will 1150 appear on every worksheet included in the grouping. 81
  • 82.
    Bayanihan Linux 5 Chapter 5. Using OpenOffice.org 3 1151 To group worksheets: 1. To select one worksheet, click on the first 1152 sheet tab. 2. To select more than one worksheet, hold the Control key 1153 down and click on the additional worksheet tabs in the workbook. 1154 5.3 OpenOffice.org 3 Impress 1155 What is Impress? 1156 Impress is a presentation component (slide show). OpenOffice.org’s presentations 1157 can create slides that contain many different elements, including text, bulleted 1158 and numbered lists, tables charts clip art and a wide range of graphic objects. 1159 It also has a spelling checker and thesaurus and with pre-packaged text styles, 1160 background styles and only help. 1161 The main Impress window has three parts: 1162 • Slides pane - contains thumbnail pictures of the slides. You can Add, Mark, 1163 Delete, Rename, Copy and Move Slides. 1164 • Workspace - has five tabs: Normal, Outline, Notes, Handout and Slide 1165 Sorter. 1166 • Tasks pane - has five sections: Master Pages (28 slide masters), Layout 1167 (20 prepackaged layouts), Table Design (11 standard table styles), Custom 1168 Animation, Slide Transition (56 available transition). 82
  • 83.
    Chapter 5. UsingOpenOffice.org 3 Bayanihan Linux 5 1169 1170 Creating a quick Presentation 1171 To create a quick presentation Impress offered three choices: Empty Presentation, 1172 From Template or Open an existing Presentation. When Impress refers to tem- 1173 plates it means presentations that are both predesigned and also contain sample 1174 content. 1175 The standard way of getting started is to create an empty presentation. You’ll 1176 also be given a chance to choose which format you want the presentation to take, 1177 whether it’s designed primarily to be viewed on-screen or printed out. 83
  • 84.
    Bayanihan Linux 5 Chapter 5. Using OpenOffice.org 3 1178 1179 The Impress Presentation Wizard 1180 1181 The Impress Presentation Wizard - slide design 84
  • 85.
    Chapter 5. UsingOpenOffice.org 3 Bayanihan Linux 5 1182 1183 The Impress Presentation Wizard - slide transition 1184 Creating your own Templates 1185 To create a template from a presentation and Save: 1186 1. Open the presentation that you want to use for a template. 2. 1187 From the main menu, choose File ¿ Templates ¿ Save. The Templates 1188 window opens. 3. In the New Template field, type a name for the 1189 new template. 4. In the Categories list, click the folder in which you 1190 want to store the template. 5. Click OK. OpenOffice.org saves the 1191 new template and the Templates window closes. 85
  • 86.
    Bayanihan Linux 5 Chapter 5. Using OpenOffice.org 3 1192 1193 Importing a template 1194 If the template is in different location you can import it. To import a template 1195 into a template folder from another location on your computer. 1196 1. In the Template Management dialog box, click the folder into which 1197 you want to import the template. 2. Click the Commands button and 1198 choose Import Template from the drop-down menu. A standard file 1199 browser window opens. 3. Find and select the template that you 1200 want to import and click Open. The file browser window closes and 1201 the template appears. 1202 Exporting a template 1203 To export a template from a template folder to another location: 1204 1. In the Template Management dialog box, double-click the folder 1205 that contains the template you want to export. A list of all the tem- 1206 plates contained in that folder appears underneath the folder name. 2. 1207 Click the template that you want to export. 3. Click the Commands 1208 button and choose Export Template from the drop-down menu. The 1209 Save As window opens. 4. Find the folder into which you want to 1210 export the template and click Save. 1211 Applying Fontwork 1212 The Fontwork tool lets you manipulate text in various ways. This located at 1213 the Drawing toolbar. When you click the icon, the Fontwork Gallery dialog box 1214 appears, offering a choice of predefined font effects. Once the selection was made 1215 the dummy text ”Fondwork” will appear on the workspace. 86
  • 87.
    Chapter 5. UsingOpenOffice.org 3 Bayanihan Linux 5 1216 To remove a Fontwork item, just select its border and press the Delete Keys on 1217 your keyboard. 1218 1219 Using 3D Effects 1220 In addition to Fontwork effects, Impress includes a powerful 3D tool. To use 1221 it, create a text box or shape using the Drawing toolbar at the bottom of the 1222 screen. Then right-click the text box or shape and select Convert ¿ 3D. If you 1223 want to create a 3D object that you can rotate in 3D space, select the 3D Rotation 1224 Object. 87
  • 88.
    Bayanihan Linux 5 Chapter 5. Using OpenOffice.org 3 88
  • 89.
    1225 1226 CHAPTER 1227 SIX 1228 1229 Using Graphics Tools 1230 Chapter Author : Yvonne Carpo 1231 1232 Bayanihan Linux version has some powerful, world-class graphics tools and ap- 1233 plications available. It includes several photo manipulation and cataloging tools. 1234 Among these is a professional-level image-editing program called GIMP (for GNU 1235 Image Manipulation Program). 1236 6.1 Image Editing Using Gimp 1237 Gimp is an open-source alternative to high priced, professional graphics editing 1238 programs such as Fireworks or Adobe Photoshop. Although GIMP is not aimed 1239 at beginners, those new to image editing can get a lot from it, provided they put 1240 in a little work. 1241 1242 To run this application, simply click on the link found at the Menu: 1243 → Graphics → GNU Image Manipulation Program - Image Editor 1244 The sample screenshot when you open GIMP as shown in Figure 6.1. 1245 The Gimp normally enables you to keep several windows open at once, rather 89
  • 90.
    Bayanihan Linux 5 Chapter 6. Using Graphics Tools Figure 6.1: Sample Screenshot. When you first open GIMP. 1246 than having all its functions available from one window. This gives you control 1247 over where the various windows are positioned and which ones remain visible. 1248 GIMP uses 3 most important windows which is Main Toolbox Windows as 1249 shown in Figure 6.2, the Layers Dialog Windows shown in Figure 6.3 and the 1250 Image Windows shown in Figure 6.4. 1251 6.2 Gwenview 1252 Gwenview is a fast and easy to use image viewer for KDE. It is free software, 1253 licensed under the GNU General Public License1 . 1254 1255 Gwenview features a folder tree window and a file list window to provide easy 1256 navigation of your files. It also uses docked windows, so you can alter any layout 1257 you wish for. You can also browse images in full-sreen mode, or embedded within 1258 Konqueror using the Image View and Kpart. 1259 Installing extra plugins (KIPI-plugins) 1260 KIPI (KDE Image Plugin Interface) is a common development effort by the Gwen- 1261 view developers, DigiKam,. Its aim is to share image plugins among graphic 1262 applications. Kipi is based on the old digiKam plugins implementation. 1 http://www.gnu.org 90
  • 91.
    Chapter 6. UsingGraphics Tools Bayanihan Linux 5 Figure 6.2: GIMP’s Main Tool- box. This can be considered the heart of GIMP, because when you close it, all the other program win- dows are closed too. It contains the highest level menu, plus a set of icon buttons that can be used to select tools, and more. 91
  • 92.
    Bayanihan Linux 5 Chapter 6. Using Graphics Tools Figure 6.3: Layers Dialog. The main interface to edit, modify and manage your layers. It shows the layer structure of the currently ac- tive image, and allows it to be ma- nipulated in a variety of ways. You can close this if you want, and re- open it later by selecting File → Dialogs → Layers. 92
  • 93.
    Chapter 6. UsingGraphics Tools Bayanihan Linux 5 Figure 6.4: GIMP’s Im- age Window. Each image open in GIMP is displayed in a separate window. Many images can be open at the same time:the limit is set only by the amount of system resources. 1263 6.3 Installing/Using Digikam 1264 Digikam is a simple digital photo management application, which makes import- 1265 ing and organizing digital photos a ”snap”. The photos can be organized in 1266 albums which are automatically sorted chronologically. An easy to use interface 1267 is provided that enables you to connect to your camera and preview, download 1268 and/or delete your images. 1269 6.4 Other graphics tools 1270 Installing/Using Inkscape 1271 To create vector artwork, a better choice is a program like Inkscape(http:// 1272 www.inkscape.org), which can be downloaded via Synaptic Package Manager 1273 (to learn about software installation, see Chapter 10). 1274 Inkscape as shown in Figure ?? is a powerful open source vector graphics editor, 1275 using the W3C standard Scalable Vector Graphics (SVG) file format with similar 1276 capabilities to Illustrator, CorelDraw, or Xara X. 1277 1278 To run this application, simply click on the link found at the Menu: 1279 → Graphics → Inkscape Vector Graphics Editor 1280 Inkcape Tools: The vertical toolbar on the left shows Inkscape’s drawing and edit- 1281 ing tools. In the top part of the window, below the menu, there’s the Commands 1282 bar with general command buttons and the Tool Controls bar with controls that 93
  • 94.
    Bayanihan Linux 5 Chapter 6. Using Graphics Tools 1283 are specific to each tool. The status bar at the bottom of the window will display 1284 useful hints and messages as you work. 1285 Creating and Managing Documents 1286 To create a new empty document, use File → New or press Ctrl+N 1287 Installing/Using Blender 1288 Blender as shown in Figure ?? is an integrated 3D suite for modelling, animation, 1289 rendering, interactive creation and playback. 94
  • 95.
    1290 1291 CHAPTER 1292 SEVEN 1293 1294 Using WindowsTM applications with WINE 1295 Chapter Author : Rage Callao 1296 1297 This version of Bayanihan Linux comes bundled with a program that allows 1298 WindowsTM applications to run in a non-WindowsTM environment. The soft- 1299 ware is called WINE1 which is a recursive acronym for WINE Is Not an Emulator. 1300 1301 From http://winehq.org: 1302 Wine is a translation layer (a program loader) capable of running 1303 Windows applications on Linux and other POSIX compatible oper- 1304 ating systems. Windows programs running in Wine act as native 1305 programs would, running without the performance or memory usage 1306 penalties of an emulator, with a similar look and feel to other appli- 1307 cations on your desktop. 1308 Wine is still under development, and it is not yet suitable for gen- 1309 eral use. Nevertheless, many people find it useful in running a growing 1310 number of Windows programs. 1 http://www.winehq.org/ 95
  • 96.
    Bayanihan Linux 5 Chapter 7. Using WindowsTM applications with WINE 1311 7.1 Installing WindowsTM software 1312 Installing software via WINE is quite easy. Just click on its executable file in the 1313 Konqueror file manager. If that doesn’t work, open a console (see 9) and type the 1314 command “wine <name of executable file>” 1315 For example, we will install 7-Zip, a popular open-source archiving program sim- 1316 ilar to Winzip. Download the installer from http://www.7-zip.org/ and save it 1317 into your ∼/Download directory. Run Konqueror or double-click the Home icon on 1318 your desktop. Go to the Downloads folder and double-click the .exe file as shown in 1319 Figure 7.1 or open a console and type the command “wine ∼/Download/7z464.exe”. Figure 7.1: Running Konqueror 1320 When the application first starts, it creates a hidden folder in your /home directory 1321 called .wine where it saves its configuration files as well as creates a filesystem 1322 that is similar to the one found in WindowsTM . You can browse this hidden 1323 folder by clicking on the Konqueror menubar View → Show hidden files. 1324 When setup finishes successfully, a link to the WindowsTM application will be 1325 found at: 1326 → Wine → Programs → 7-Zip 96
  • 97.
    Chapter 7. UsingWindowsTM applications with WINE Bayanihan Linux 5 1327 7.2 Configuring WINE 1328 winecfg 1329 To configure Wine using the winecfg2 tool, simply click on the link found at the 1330 Menu: 1331 → System → Wine configuration 1332 regedit 1333 From http://winehq.org/docs/wineusr-guide/using-regedit 1334 All of the settings you change in winecfg, with exception of the 1335 drive settings, are ultimately stored in the registry. In Windows, this 1336 is a central repository for the configuration of applications and the 1337 operating system. Likewise, Wine implements a registry and some 1338 settings not found in Winecfg can be changed within it. 1339 To run the registry editor, open a terminal as discussed in Chapter 9 on page 107 1340 and type the command regedit then press Enter. Figure 7.2: winecfg Figure 7.3: regedit 2 http://winehq.org/docs/wineusr-guide/config-wine-main 97
  • 98.
    Bayanihan Linux 5 Chapter 7. Using WindowsTM applications with WINE 1341 7.3 Tested applications 1342 For a list of applications that have been tested on Wine, please visit the Wine 1343 Application Database found at http://appdb.winehq.org/. 98
  • 99.
    1344 1345 CHAPTER 1346 EIGHT 1347 1348 Using Multimedia Applications 1349 Chapter Authors: Rage Callao 1350 1351 Bayanihan Linux 5 comes bundled with various software that allow you to play 1352 or view multimedia files in your computer. The following sections briefly describe 1353 the capabilities of each software and its typical uses 1354 8.1 Amarok 1355 Amarok (shown in Figure 8.1)is a multimedia audio player capable of playing audio 1356 files of different formats. It features an intuitive interface that allows the user to 1357 easily search, catalog tracks and create playlists. 1358 More information about configuring and using Amarok is available by pressing 1359 Alt+F2 and entering the command help:/amarok. 1360 1361 To run this application, simply click on the link found in the Menu: 1362 → Multimedia → Amarok - Audio Player 99
  • 100.
    Bayanihan Linux 5 Chapter 8. Using Multimedia Applications Figure 8.1: Amarok Figure 8.2: Amarok in system tray 1363 8.2 KsCD 1364 KsCD (shown in Figure 8.3) is a fast, CDDB enabled CD player for the *nix 1365 platform. KsCD stands for “The KDE Project’s small/simple CD player”. 1366 On first run, the application places a shortcut icon in the system tray as shown 1367 in Figure 8.4 1368 To run this application, simply click on the link found in the Menu: 1369 → Multimedia → KsCD - CD Player Figure 8.3: KsCD AudioCD Player Figure 8.4: KsCD in the system tray 1370 Tip: If you hear no sound when playing an audioCD but you hear a sound after 1371 logging in, you may need to enable digital playback. To do this, click Extras on the 1372 KsCD application then click Configure KsCD. On the window shown in Figure 8.5 1373 enable digital playback and then click Apply for the changes to take effect. 1374 8.3 KMix 1375 KMix is KDE’s soundcard mixer program. Though small, it is full-featured. The 1376 program should give controls for each of your soundcards. This application will 1377 let you can adjust the volume and activate or deactivate channels. On first run, 1378 KMix will put a shortcut icon on the system tray. Typically no configuration is 100
  • 101.
    Chapter 8. UsingMultimedia Applications Bayanihan Linux 5 Figure 8.5: KsCD Configuration to enable digital playback 1379 necessary, but if you do not hear a sound when logging in the volume may be set 1380 to low or muted by default. 1381 The system automatically detects and configures all available soundcards in your 1382 system provided there is support for the devices in the built-in kernel. 1383 To run this application, simply click on the link found in the Menu: 1384 → Multimedia → KMix - Sound Mixer Figure 8.6: KMix Figure 8.7: KMix on the system tray 1385 8.4 KRec 1386 KRec connects to the aRts server and records what is routed to it into files. These 1387 files are in a special KRec format but it is possible to export to wave, ogg and mp3 101
  • 102.
    Bayanihan Linux 5 Chapter 8. Using Multimedia Applications Figure 8.8: KRec Record- ing Tool 1388 files. But KRec has much more functionality. You can do multiple recordings in 1389 one file even with overlaying functionality. 1390 1391 To run this application, simply click on the link found in the Menu: 1392 → Multimedia → KRec - Recording Tool 1393 8.5 XVidCap 1394 XVidCap is a small tool to capture things going on in an X-Windows display to 1395 either individual frames or an MPEG video. This means you can select an area 1396 on your desktop and use this application to record whatever happens in that 1397 particular area. 1398 To select an area of the screen to record, simply place the cursor over the one of 1399 the red borders, hold down the left mouse button and drag over the desired area 1400 of the screen. Press the red button to begin recording. To stop recording, click 1401 the white square button. The video file will be saved in the folder. To configure 1402 the application, right-click on the main button on the application interface. 1403 1404 To run this application, simply click on the link found in the Menu: 1405 → Multimedia → XVidCap Screen Capture - X11 Screencam 1406 8.6 MPlayer Video Player 1407 MPlayer is a movie player which runs on many systems. It plays most MPEG/VOB, 1408 AVI, Ogg/OGM, VIVO, ASF/WMA/WMV, QT/MOV/MP4, RealMedia, Ma- 1409 troska, NUT, NuppelVideo, FLI, YUV4MPEG, FILM, RoQ, PVA files, supported 102
  • 103.
    Chapter 8. UsingMultimedia Applications Bayanihan Linux 5 Figure 8.9: XVidCap Screen Recording Tool Figure 8.10: MPlayer Video Player 1410 by many native, XAnim, and Win32 DLL codecs. You can watch VideoCD, 1411 SVCD, DVD, 3ivx, DivX 3/4/5, WMV and even H.264 movies. 1412 To play a video file, right-click on the main window and select Open → Play file. 1413 When playing a file, pressing F will toggle fullscreen display. 1414 1415 To run this application, simply click on the link found in the Menu: 1416 → Multimedia → MPlayer - Multimedia player 1417 Installing additional codecs 1418 Many video files are distributed under proprietary formats and in order to play 1419 these you need to install decoders that can interpret and playback these files. For 103
  • 104.
    Bayanihan Linux 5 Chapter 8. Using Multimedia Applications 1420 legal reasons, these decoders cannot be shipped with Bayanihan Linux but can be 1421 easily installed (see page 123). The w32codecs package will provide the necessary 1422 decoders to playback proprietary video files. 1423 8.7 K3B - CD/DVD Burning 1424 K3b is a CD and DVD burning application for Linux systems optimized for KDE. 1425 It provides a comfortable user interface to perform most CD/DVD burning tasks 1426 like creating an Audio CD from a set of audio files or copying a CD. While the 1427 experienced user can take influence in all steps of the burning process, the begin- 1428 ner may find comfort in the automatic settings and the reasonable K3b defaults 1429 which allow a quick start. The actual burning in K3b is done by the command 1430 line utilities wodim, cdrdao, and growisofs. 1431 1432 To run this application, simply click on the link found in the Menu: 1433 → Multimedia → K3b - CD and DVD Burning Figure 8.11: K3b Burning Application 1434 On first run, the application automatically searches for and configures all attached 1435 CD/DVD burners. If no CD/DVD burner is found, a prompt will appear. 1436 To burn an CD-sized ISO file, simply click on the Burn CD Image icon on the 1437 application interface. To burn data onto a disk, simply drag and drop files from the 1438 upper right window into the lower right window and click Burn. More information 1439 on using and configuring K3b can be found at help:/k3b. 104
  • 105.
    Chapter 8. UsingMultimedia Applications Bayanihan Linux 5 1440 8.8 KAudioCreator 1441 KAudioCreator is an audio CD ripper for KDE. With it you can easily rip your 1442 audio CDs to mp3 or ogg files or other formats, depending on whatever encoder 1443 you have installed on your system. 1444 1445 To run this application, simply click on the link found in the Menu: 1446 → Multimedia → KAudioCreator - CD Ripper Figure 8.12: KAudioCreator 105
  • 106.
    Bayanihan Linux 5 Chapter 8. Using Multimedia Applications 106
  • 107.
    1447 1448 CHAPTER 1449 NINE 1450 1451 Using the Terminal/Commandline 1452 Chapter Authors: Rage Callao 1453 1454 There are times when you will need to run applications without the benefit of a 1455 graphical user interface (GUI) because the command/application does not have 1456 one or because it is more convenient to use a terminal or console. A terminal 1457 or console is similar to the WindowsTM command shell or prompt but offers far 1458 more capabilities. 1459 The following sections describe how to run the most commonly used commandline 1460 tools in a terminal. 1461 9.1 Access the Terminal/Console 1462 To run the application, simply click on the link found at Menu: 1463 1464 → System → Konsole - Terminal Program 107
  • 108.
    Bayanihan Linux 5 Chapter 9. Using the Terminal/Commandline Figure 9.1: Konsole 1465 9.2 File and Folder Navigation 1466 ls - List 1467 The ls command lists the content of a directory. It is one of the most used Linux 1468 command. 1469 Syntax: ls [options] [file/directory] 1470 Typical Options: -a shows ALL the files, including hidden files. -l gives a long listing format. This option gives a more detailed result, it shows owner, size, date last modified, etc. 1471 -R traverses the directories recursively. This option shows files of all the directories within the specified directory. -h shows filesizes “human readable” format. 1472 1473 Typical Usage: ls - shows the files in the current directory. ls - shows files in the home directory. ls / - shows files in the root directory. 1474 ls /path/to/files/ - shows files in the directory /path/to/files/. ls -lah - shows a long listing of all the files in the current directory with a “human readable” format. ls /home/ - displays the contents of /home/ directory. 1475 1476 cd - Change Directory 1477 The cd command is used to change to another directory. 108
  • 109.
    Chapter 9. Usingthe Terminal/Commandline Bayanihan Linux 5 1478 Syntax: cd [directory] 1479 Typical Usage: cd - changes to the home directory of the current user. cd ../ - changes to the parent directory. 1480 cd / - changes to the root directory. cd /path/to/mydirectory/ - changes to the directory /path/to/mydirectory/. 1481 1482 mkdir - Make Directory 1483 The mkdir command is used to create a directory. 1484 Syntax: mkdir [options] [/path/to]directoryname 1485 Typical Options: 1486 -p create directory including parent directory. 1487 1488 Typical Usage: mkdir mydirectory - creates a directory named mydirectory in the current directory. mkdir /path/to/mydirectory - creates a directory named mydirectory in 1489 the /path/to/ directory. mkdir -p /path/to/mydirectory - creates a directory named mydirectory in- cluding the parent directories if they don’t ex- ist. 1490 1491 rmdir - Remove Directory 1492 The rmdir command is used to remove a directory. Note that it can only remove 1493 an empty directory. 1494 Syntax: rmdir [/path/to]directoryname 1495 Typical Usage: rmdir mydirectory - deletes the directory named mydirectory in the current directory. 1496 rmdir /path/to/mydirectory - deletes the directory named myirectory in the /path/to/ directory. 1497 109
  • 110.
    Bayanihan Linux 5 Chapter 9. Using the Terminal/Commandline 1498 cp - Copy 1499 The cp command is used to copy files and directories. 1500 Syntax: cp [options] [source] [destination] 1501 Typical Options: -a archive; copies recursively, preserving file attributes, and does not follow symbolic links. -b backup; backs up existing destination files. -f force; forces copy, overwriting existing files without promting the user. -i interactive; prompts user before overwriting existing files. 1502 -p preserve; preserves file attributes if possible. -r recursive; copies files and subdirectories recursively. -s symbolic link; makes symbolic link instead of copying. -u update; copies the SOURCE only when it is newer or when the DES- TINATION does not exist. -v verbose; shows details while performing copy. 1503 1504 Typical Usage: cp myfile1 myfile2 - copies (duplicates) myfile1 to myfile2 in the current directory. cp myfile mydirectory/ - copies myfile to the mydirectory in the current directory. cp -f myfile1 myfile2 - duplicates myfile1 if myfile2 doesn’t ex- ist, otherwise overwrites it. cp -u mydirectory1/* mydirectory2/ - copies newer files from mydirectory1 to 1505 mydirectory2. cp myfile1 myfile2 mydirectory/ - copies the files myfile1 and myfile2 to mydirectory. cp -s myfile /path/to/mylink - creates a symbolic link of myfile named mylink in the /path/to/ directory. cp -rv mydirectory1/ mydirectory2/ - copies mydirectory1 to mydirectory2, including subdirectories and displays some details. 1506 1507 rm - Remove 1508 The rm command is used to remove files and directories. 1509 Syntax: rm [options] [target] 110
  • 111.
    Chapter 9. Usingthe Terminal/Commandline Bayanihan Linux 5 1510 Typical Options: -f force; forces removal of target files without promting the user. -i interactive; prompts user before removing existing files. 1511 -r or -R recursive; removes files and subdirectories recursively. -v verbose; shows details while performing removal. 1512 1513 Typical Usage: rm myfile - deletes myfile in the current directory. rm -rfv mydirectory - verbosely deletes the directory named mydirectory in 1514 the current directory, including its subdirectories, without prompting the user. 1515 1516 9.3 Filesystem Tools 1517 df - Disk Free 1518 The df command is used to report system free disk space and usage. 1519 Syntax: df [options] [target] 1520 Typical Options: -a includes all dummy/virtual filesystems in the report. 1521 -h prints filesystem sizes in “human readable” format. -l limits list to local filesystems only. 1522 1523 Typical Usage: df -h - shows disk usage in “human readable” format. df -lh /home - shows disk usage of filesystem where /home resides. 1524 df -ah - shows disk usage of all filesystems, including dummy/virtual filesystems. 1525 1526 du - Disk Usage 1527 The du command is used to report disk space usage size of each file for directories 1528 recursively. 1529 Syntax: du [options] [target] 1530 Typical Options: 111
  • 112.
    Bayanihan Linux 5 Chapter 9. Using the Terminal/Commandline -a reports sizes of all files, not just directories. -c prints a grand total at the end of the report. 1531 -h prints in “human readable” format. -s displays only the total for each argument. 1532 1533 Typical Usage: du -ch - prints sizes in “human readable” format and a grand total of the current directory. 1534 du -ah /home - shows sizes of all files in /home. du -chs /tmp - shows the summary of sizes of /tmp directory. 1535 1536 mount - Mount 1537 The mount command is used to mount a filesystem. Note that only the root 1538 account can mount filesystems and not ordinary users. Ordinary users should use 1539 pmount instead. 1540 Syntax: mount [options] [filesystem] [mountpoint] 1541 Typical Options: -a - mounts all filesystems specified in /etc/fstab. -o option1, option2, .. - specifies the options to be used when mounting the 1542 filesystem. -t filesystemtype - indicates the filesystem type to be mounted. 1543 1544 Typical Usage: mount -a - especially useful when changes to /etc/fstab have been made. mount /mnt/mymount - works only if /mnt/mymount exists in /etc/fstab. mount /dev/sdb1 /mnt/mymount - mounts the filesystem /dev/sdb1 to the mountpoint /mnt/mymount. 1545 mount -o loop CDImage.iso /mnt/mymount - mounts the CD image as a loop device. mount -t cifs - mounts a WindowsTM share -o username=myuser,password=mypassword with account credits. //10.10.5.5/MyShare /mnt/mymount mount -o uid=1000 /dev/sdb1 /mnt/mymount - mounts the /dev/sdb1 as the ac- count with user ID 1000. 1546 112
  • 113.
    Chapter 9. Usingthe Terminal/Commandline Bayanihan Linux 5 1547 umount - Unmount 1548 The umount command is used to unmount a filesystem. Note that only the root 1549 account can unmount filesystems and not ordinary users. Ordinary users should 1550 use pumount instead. 1551 Syntax: umount [mountpoint|filesystem] 1552 Typical Usage: umount /mnt/mymount - unmounts the mountpoint /mnt/mymount. 1553 umount /dev/sdb3 - unmounts the device /dev/sdb3. 1554 1555 pmount - Policy Mount 1556 The pmount command is used to mount hotpluggable devices as ordinary user. 1557 Syntax: pmount [filesystem] [mountname] 1558 Typical Usage: pmount /dev/sdb1 myflashdrive - mounts the filesystem /dev/sdb1 to the mount- 1559 point /media/myflashdrive. 1560 1561 pumount - Policy Unmount 1562 The pumount command is used to unmount hotpluggable devices as ordinary user. 1563 Syntax: pumount [mountpoint|filesystem] 1564 Typical Usage: pumount /mnt/mymount - unmounts the mountpoint /mnt/mymount. 1565 pumount /dev/sdb3 - unmounts the device /dev/sdb3. 1566 1567 9.4 User-related Tools 1568 adduser - Add User 1569 The adduser command is used to add a system account. It sets up the user’s 1570 home directory and group memberships. Note that this tool can only be used by 113
  • 114.
    Bayanihan Linux 5 Chapter 9. Using the Terminal/Commandline 1571 the root account. 1572 Syntax: adduser [username] 1573 Typical Usage: adduser myuser - starts the interactive tool that sets up the account’s user envi- 1574 ronment and group memberships. 1575 1576 deluser - Delete User 1577 The deluser command is used to remove a system account. Note that this can 1578 only be used by the root account. 1579 Syntax: deluser [username] 1580 Typical Usage: deluser myuser - removes the account myuser. 1581 deluser - lets you specify the user account to be removed. 1582 1583 addgroup - Add Group 1584 The addgroup command is used to add a system group. Note that this tool can 1585 only be used by the root account. 1586 Syntax: addgroup [groupname] 1587 Typical Usage: 1588 addgroup mygroup - creates a group called mygroup. 1589 1590 delgroup - Delete Group 1591 The delgroup command is used to remove a system group. Note that this tool 1592 can only be used by the root account. 1593 Syntax: delgroup [groupname] 1594 Typical Usage: delgroup mygroup - removes the group mygroup. 1595 delgroup - lets you specify the group to be removed. 1596 114
  • 115.
    Chapter 9. Usingthe Terminal/Commandline Bayanihan Linux 5 1597 9.5 File Permissions 1598 chown - Change Owner 1599 The chown command is used to change file ownership. Note that this tool can 1600 only be used by the root account. 1601 Syntax: chown [options] [owner][:][group] [target] 1602 Typical Options: -c - shows the changes made during the operation. 1603 -R - recursively changes the owner of the files in the current directory in- cluding subdirectories. 1604 1605 Typical Usage: chown myuser * - changes the file ownership to myuser of the files in the current directory. 1606 chown -R myuser1:mygroup /home/myuser2 - changes the file ownership to myuser1 with group mygroup of the files in the directory /home/myuser2. 1607 1608 chmod - Change Mode Bits 1609 The chmod command is used to change file permissions. Note that this tool can 1610 only be used by the root account. 1611 Syntax: chown [options] [a|u|g|o][+|-][permissions] [target] 1612 Typical Options: -c - shows the changes made during the operation. 1613 -R - recursively changes the permissions of the files in the current directory including subdirectories. 1614 1615 Typical Usage: chmod o-rwx * - removes access to the files in the current directory by users other than the owner. 1616 chmod -R +x RunMe.sh - makes the file RunMe.sh executable. chmod +s myfile - sets the set user ID bit of the file myfile. 1617 115
  • 116.
    Bayanihan Linux 5 Chapter 9. Using the Terminal/Commandline 1618 chgrp - Change Group 1619 The chgrp command is used to change group ownership. Note that this tool can 1620 only be used by the root account. 1621 Syntax: chgrp [options] [group] [target] 1622 Typical Options: -c - shows the changes made during the operation. 1623 -R - recursively changes the owner of the files in the current direc- tory including subdirectories. 1624 1625 Typical Usage: chgrp mygroup * - changes the group ownership of the files in the current directory to mygroup. 1626 chgrp -R mygroup /home/myuser2 - changes the group ownership of the files in the directory /home/myuser2 to mygroup. 1627 1628 9.6 Other Essential Commandline Tools 1629 cat 1630 The cat command is used to display the contents of a file. 1631 Syntax: cat [file/s] 1632 Typical Usage: cat myfile - displays the contents of myfile to standard output. 1633 cat myfile1 myfile2 - displays the contents of myfile1 and myfile2. 1634 1635 less 1636 The less is a tool used to display the contents of a file which can be browsed. 1637 Some commands are based on vi. 1638 Syntax: less [file] 1639 116
  • 117.
    Chapter 9. Usingthe Terminal/Commandline Bayanihan Linux 5 1640 find 1641 This command is used to search for files. 1642 Syntax: find [options] [path/s] [expression] 1643 Typical Options for Expression: -delete - removes searched files. -exec [command] - executes the given command on the files that were found. 1644 -name [pattern] - searches for files with the given pattern. -mtime [n*24hours] - matches files that were last modified n*24hours ago. -executable - matches files that are executable. 1645 1646 Typical Usage: find /home/myuser -name *.mp3 - searches the home directory of myuser for .mp3 files. find /var/tmp /tmp -name *.bak - searches for .bak files in the /var/tmp 1647 -exec /bin/rm -fv ’{}’ ; and /tmp directories and then deletes them. find ./ -mtime 0 - searches the current directory for modified files within the last 24 hours. 1648 1649 grep 1650 This command is used to print lines that match a given pattern. 1651 Syntax: grep [options] [pattern] [file] 1652 Typical Options: -a - treats a binary file as if it were a text file. -i - makes the match case-insensitive. 1653 -n - also prints line number for each output. -v - prints non-matching lines. 1654 1655 Typical Usage: grep -i sd /var/log/messages - outputs the lines with the characters “sd”, 1656 regardless of case. grep -v list /home/myuser/myfile - outputs the lines without the word “list”. 1657 117
  • 118.
    Bayanihan Linux 5 Chapter 9. Using the Terminal/Commandline 1658 sed 1659 This tool edits or transforms text from a stream. 1660 Syntax: sed ’[command]’ [input] 1661 Typical commands: s/texttofind/texttoreplace/ - replaces the instance of “texttofind” with “text- toreplace”. 1662 n,md - deletes the lines from n to m. n,mp - prohibits the display of the lines from n to m. 1663 1664 Typical Usage: sed ’3,10d’ myfile - outputs the contents of myfile but with lines 3- 10 deleted. 1665 sed ’s/hello/goodbye/’ myfile - outputs the contents of myfile but with the first occurrence of “hello” to “goodbye”. 1666 1667 The Pipe Character 1668 The pipe character “|” is used to put commands in a “pipeline”. The output of 1669 the previous command is passed on to the next. 1670 Typical Usage: grep EE /var/log/Xorg.0.log | less - generates a list of lines with the char- acters “EE” in /var/log/Xorg.0.log that 1671 can be browsed. cat myfile | sed ’s/hello/hi/g’ - outputs the contents of myfile but changes all instances of “hello” to “hi”. 1672 1673 Redirecting Outputs 1674 Outputs of commands can be redirected into a file using the greater than (>) 1675 character. 1676 Typical Usage: 118
  • 119.
    Chapter 9. Usingthe Terminal/Commandline Bayanihan Linux 5 grep EE /var/log/Xorg.0.log > XorgErrors - creates a file called XorgErrors with contents from the output of the grep command. If the file already 1677 exists, it simply overwrites it. grep WW /var/log/Xorg.0.log >> XorgWarnings - appends the file XorgWarnings with the output of the grep com- mand. If the file doesn’t exist, it creates it. 1678 1679 man - The Manual Pages 1680 More information about these and other commands can be obtained by using the 1681 man command. This invokes the reference manuals for each command. 1682 Syntax: man [command] 1683 The TAB Key 1684 The TAB key is the command completion key. Pressing the TAB once after the 1685 first few letters are typed on the console completes the command. In case when 1686 more than one command share the same first few letters, pressing the TAB twice 1687 shows a list of the commands that share common first letters. 1688 1689 The ALT+. Key Combination 1690 The combination of ALT + . (dot) keys invokes the last argument of the last 1691 command. If repeatedly pressed, it scrolls through the last argument of the pre- 1692 vious commands. 1693 1694 9.7 Text Editors 1695 Vim 1696 From the manual page at man:/vim 1697 119
  • 120.
    Bayanihan Linux 5 Chapter 9. Using the Terminal/Commandline 1698 Vi IMproved, a programmer’s text editor. 1699 Vim is a text editor that is upwards compatible to Vi. It can be used to edit all 1700 kinds of plain text. It is especially useful for editing programs. 1701 There are a lot of enhancements above Vi: multi level undo, multi windows 1702 and buffers, syntax highlighting, command line editing, filename completion, on- 1703 line help, visual selection, etc. See :help vi diff.txt for a summary of the 1704 differences between Vim and Vi. 1705 To run this command, type vim in a terminal which displays the following screen: Figure 9.2: Vi Improved Opening Screen 1706 Nano 1707 From the manual page at man:/nano 1708 1709 Nano’s ANOther editor is an enhanced free Pico clone. 1710 nano is a small, free, and friendly editor which aims to replace Pico, the default 1711 editor included in the non-free Pine package. Rather than just copying Picos look 1712 and feel, nano also implements some missing (or disabled by default) features in 1713 Pico, such as ”search and replace” and ”go to line and column number”. 120
  • 121.
    Chapter 9. Usingthe Terminal/Commandline Bayanihan Linux 5 1714 To run this command, type nano in a terminal which displays the following screen: Figure 9.3: Nano Editor Interface 1715 Midnight Commander 1716 From the manual page at man:/mc 1717 1718 GNU Midnight Commander is a directory browser/file manager for Unix-like op- 1719 erating systems. 1720 The screen of the Midnight Commander is divided into four parts. Almost all 1721 of the screen space is taken up by two directory panels. By default, the second 1722 line from the bottom of the screen is the shell command line, and the bottom line 1723 shows the function key labels. The topmost line is the menu bar line. The menu 1724 bar line may not be visible, but appears if you click the topmost line with the 1725 mouse or press the F9 key. 1726 The Midnight Commander provides a view of two directories at the same time. 1727 One of the panels is the current panel (a selection bar is in the current panel). 1728 Almost all operations take place on the current panel. Some file operations like 1729 Rename and Copy by default use the directory of the unselected panel as a des- 1730 tination (don’t worry, they always ask you for confirmation first). For more 1731 information, see the sections on the Directory Panels, the Left and Right Menus 121
  • 122.
    Bayanihan Linux 5 Chapter 9. Using the Terminal/Commandline 1732 and the File Menu. 1733 You can execute system commands from the Midnight Commander by simply 1734 typing them. Everything you type will appear on the shell command line, and 1735 when you press Enter the Midnight Commander will execute the command line 1736 you typed; read the Shell Command Line and Input Line Keys sections to learn 1737 more about the command line. 1738 To run this command, type mc in a terminal which displays the following screen: Figure 9.4: Midnight Commander 122
  • 123.
    1739 1740 CHAPTER 1741 TEN 1742 1743 System Administration 1744 Chapter Author : Rage Callao 1745 1746 10.1 Installing/Removing/Upgrading software 1747 Every operating system has a way of installing and removing software. There 1748 are several ways to install an application in Bayanihan Linux and it is somewhat 1749 different from what users of other operating systems are used to. Nevertheless it 1750 is quite easy to learn how to do. 1751 The following sections describe the apt, Synaptic and aptitude tools as well as 1752 several guides on installing some commonly used applications that cannot be 1753 shipped with Bayanihan but are freely available. 1754 It is also possible to install some WindowsTM applications. See Chapter 7. 1755 Synaptic Package Manager 1756 Synaptic (shown in Figure 10.1) is a graphical package manager that you can use 1757 to easily add/remove packages (also called “software applications” in other oper- 1758 ating systems). 1759 123
  • 124.
    Bayanihan Linux 5 Chapter 10. System Administration Figure 10.1: Synaptic Package Manager 1760 To run this application, simply click on the link found at the Menu: 1761 → System → Synaptic Package Manager 1762 Configuring/Using Synaptic 1763 In order to perform the following steps, you will need a connection to the internet 1764 as discussed in Chapter 4 1765 Once you have an internet connection, configure Synaptic to fetch the list of 1766 available packages for your system. Do this by clicking Settings → Reposito- 1767 ries as shown in Figure 10.2. A new window will appear (shown in Figure 10.3) 1768 displaying several lines with unchecked boxes. Check the box beside the text 1769 deb http://apt.bayanihan.gov.ph/kalumbata then click Ok. Click Ok again when 1770 the Repositories changed window appears then click the Reload button to update 1771 the list of available packages for your system. 124
  • 125.
    Chapter 10. SystemAdministration Bayanihan Linux 5 Figure 10.2: Settings → Repositories Figure 10.3: Repositories 1772 The square icons at the leftmost column describe the status of each individual 1773 package. Click Help → Icon legend in the menubar to see a description of the 1774 meanings of these icons as shown in Figure 10.4. To select a package for instal- 1775 lation or removal, simply click on its icon and select the appropriate item in the 1776 pop-up menu. Figure 10.4: Icon legend 125
  • 126.
    Bayanihan Linux 5 Chapter 10. System Administration 1777 apt, aptitude, dpkg, tasksel 1778 The following tools can only be run inside a console (see Chapter 9) as root 1779 (administrator). For this, you need to su, sudo or sux to gain root privileges. 1780 So for example, if you wanted to run aptitude as root, then you would do the 1781 following in a console: rage@bl5dev:~$ su Password: <type root password here> bl5dev:/home/rage# aptitude 1782 Apt is a commandline package manager without the graphical interface like that 1783 of Synaptic or aptitude. Its manual page can be accessed by typing “man apt” 1784 inside a console or typing “man:/apt” via Alt+F2. 1785 The configuration files for apt resides in the /etc/apt directory. You will need 1786 to edit the file /etc/apt/sources.list and add repositories such as http://apt. 1787 bayanihan.gov.ph to query. The entries are typically of the format: 1788 deb http://apt.bayanihan.gov.ph/kalumbata stable main contrib non-free 1789 For example, to install the package apache from the commandline using apt you 1790 would do the following in a console: rage@bl5dev:~$ su Password: <type root password here> bl5dev:/home/rage# apt-get updates bl5dev:/home/rage# apt-get install apache 1791 Aptitude, shown in Figure 10.5 is a console-mode package manager with similar 1792 features to Synaptic. Its manual page can be accessed by typing “man aptitude” 1793 inside a console or typing “man:/aptitude” via Alt+F2. 1794 When it runs, it reads the same configuration files as apt located at /etc/apt/. 1795 Shortcut commands are accessed by pressing Shift+?. For instance to install or 1796 upgrade a package, use the arrow keys to highlight its name then press +. To 1797 remove a package, use the arrow keys to highlight its name then press -. To “hold” 1798 a package in order to prevent future upgrades, press =. To keep a package at its 1799 currently state, press :. 126
  • 127.
    Chapter 10. SystemAdministration Bayanihan Linux 5 1800 After marking the packages you would like to remove or install, press g and then 1801 press g again to confirm. The application will now proceed and apply these 1802 changes to your system. To cancel the process, press Ctrl+C. 1803 To return to previous screens, press q. To exit, continue pressing q until you see 1804 the prompt confirming that you want to exit the program. 1805 dpkg is a more advanced commandline tool for installing, removing or configuring 1806 packages. Its manual page can be accessed by typing “man dpkg” inside a console 1807 or typing “man:/dpkg” via Alt+F2. 1808 Typically, this tool is used to manually install files with a *.deb extension. For 1809 example, say you downloaded a package called superduperapp.deb and want to 1810 install it, you would do the following in a console: rage@bl5dev:~$ su Password: <type root password here> bl5dev:/home/rage# dpkg -I superduperapp.deb bl5dev:/home/rage# dpkg -i superduperapp.deb Figure 10.5: aptitude 127
  • 128.
    Bayanihan Linux 5 Chapter 10. System Administration 1811 Unlike apt, Synaptic and aptitude, this tool cannot automatically install other 1812 packages that is depended upon by the package you are trying to install. It is up 1813 to you to manually install the packages’s dependencies. 1814 This tool can also be used to list packages which have been installed in the system 1815 (dpkg -l), view the status of each package (dpkg -s packagename) or list the 1816 files installed by a particular package (dpkg -L packagename). 1817 Extras 1818 There are thousands of software available for you to use in your Bayanihan Linux 1819 system. Most of these are distributed freely from our repository at http://apt. 1820 bayanihan.gov.ph. However, there are those which cannot be freely redistributed 1821 but can easily be obtained from the author’s or publisher’s website. 1822 Installing RealPlayer 1823 RealPlayer is a multimedia player capable of playing streaming video from the 1824 web. 1825 Go to http://www.real.com and click on the link “Linux / Unix Player” at the 1826 bottom of the page. You will be redirected to a new page where you can download 1827 the Linux packages. Then click on the link “DEB Package”. After downloading the 1828 file, open a terminal, navigate to where you downloaded it and type the command 1829 “dpkg -i RealPlayer11GOLD.deb” to install this application. A configuration 1830 wizard will pop-up the first time you run this application. 1831 To run this application, simply click on the link found at the Menu: 1832 → Multimedia → RealPlayer 11 - Media Player 1833 Installing Acrobat Reader 1834 Adobe Reader is a multi-platform PDF viewer. 1835 Go to http://get.adobe.com/reader/otherversions/ and select “Linux - x86 1836 (*.deb)” from the Select an operating system drop-down menu then click Continue. 1837 Click the “Download now” button and save the file to your system. Next, open 1838 a terminal and navigate to where you saved the file then type the command 1839 “dpkg -i AdobeReader_enu-8.1.3-1.i386.deb”. 1840 To run this application, simply click on the link found at the Menu: 128
  • 129.
    Chapter 10. SystemAdministration Bayanihan Linux 5 1841 → Office → Adobe Reader 8 - PDF Viewer 1842 Installing Flash Player Plugin 1843 Athough, gnash, a free and open source flash player is shipped with Bayanihan, 1844 there are many websites that require the Adobe Flash Player plugin to be in- 1845 stalled. To install this plugin, go to http://www.adobe.com and click Download 1846 Flash Player. You will be prompted to accept the license. Once you accept, save 1847 the file into your /home folder and extract its contents by right-clicking on the file 1848 in Konqueror and selecting Extract → Extract here. Then copy the file libflash- 1849 player.so into ∼/.mozilla/plugins folder. Restart FireFox for this change to take 1850 effect. 1851 Installing Java Plugin 1852 Go to http://www.java.com and download the self-extracting archive. Open a 1853 console, change into the directory where the downloaded file is kept and run the 1854 commands below. After that restart FireFox for the changes to take effect. rage@bl5dev:~$ su Password: <type root password here> bl5dev:/home/rage# cd Downloads bl5dev:/home/rage/Downloads# sh jre-6u11-linux-i586.bin <Press Enter at the more prompt to scroll to the end.> Please enter "yes" or "no". Do you agree to the above license terms? [yes or no] <Type yes then press Enter> bl5dev:/home/rage/Downloads# mkdir -p /usr/lib/java bl5dev:/home/rage/Downloads# mv jre1.6.0_11 /usr/lib/java/ bl5dev:/home/rage/Downloads# <Press Ctrl-D to leave root> rage@bl5dev:~/Downloads$ cd ../ rage@bl5dev:~$ ln -sf /usr/lib/java/jre1.6.0_11/plugin/i386/ ns7/libjavaplugin_oji.so ~/.mozilla/plugins/ 1855 Installing Mozilla FireFox 1856 Bayanihan Linux is bundled with the latest version of the Mozilla FireFox web 1857 browser. This section describes how you can manually download the latest version 129
  • 130.
    Bayanihan Linux 5 Chapter 10. System Administration 1858 without using a package management system such as Synaptic, apt or aptitude. 1859 There are consequences to installing this application manually. For instance, you 1860 will need to manually update this package yourself when a new version comes out. 1861 Go to http://www.mozilla.com and click the download link then save the file 1862 to your computer. Using Konqueror navigate to where you downloaded the file 1863 right-click on the file and select Extract → Extract to firefox-3.0.5. Navigate to the 1864 extracted folder and then double-click the file “firefox”. 1865 Installing Mozilla Thunderbird 1866 Mozilla Thunderbird is a multi-platform email client. 1867 Go to http://www.mozilla.com and click the Thunderbird link then click the 1868 download link and save the file to your computer. Using Konqueror navigate to 1869 where you downloaded the file right-click on the file and select Extract → Extract 1870 to thunderbird-2.0.0.19. Navigate to the extracted folder and then double-click the 1871 file “thunderbird”. 1872 10.2 KDE Control Center 1873 The KDE Control Center (kcontrol) is the central configuration utility for the K 1874 Desktop Environment. It is made up of multiple modules grouped into categories 1875 and each module is used to configure the different parts of the system. 1876 To run this application, simply click on the link found at the Menu: 1877 → Control Center 1878 Appearance & Themes 1879 This module allows you to change various settings related to how your desktop 1880 looks. You can select the background, set colors and fonts and more. More 1881 information regarding this module can be found by clicking on the Help button. 1882 Desktop 1883 This module allows you to change how different components of the desktop feels 1884 or behaves. For instance, you can set whether the system displays mountable 130
  • 131.
    Chapter 10. SystemAdministration Bayanihan Linux 5 1885 devices on your desktop and how many virtual desktops to enable. 1886 Internet & Network 1887 This module configures settings related to the network. However, this should not 1888 be necessary in most cases since Bayanihan Linux 5 can now automatically detect 1889 the network and configure network devices using network-manager. 1890 KDE Components 1891 This module allows you to configure your KDE session, the default applications 1892 as well as enable/disable system services. 1893 Peripherals 1894 This module allows you to change the various settings associated with the devices 1895 attached to your computer such as the keyboard, mouse, display and printers. Figure 10.6: KDE Control Center 131
  • 132.
    Bayanihan Linux 5 Chapter 10. System Administration 1896 Regional & Accessibility 1897 This module allows you to configure keyboard layouts, select the region where the 1898 computer is located and enable/disable accessibility features. 1899 Security & Privacy 1900 This module allows you to set the information regarding your account, set ciphers 1901 to use and other privacy settings. 1902 Sound & Multimedia 1903 This module lets you configure various settings for your audio device as well as 1904 system notifications. 1905 System Administration 1906 This module lets you configure various system components such as the login 1907 screen, install fonts and set the system’s date and time. 1908 10.3 Managing Printers 1909 Managing printers in Bayanihan Linux is done through the Control Center module 1910 shown in Figure 10.7 or via the menu shortcut Menu → Settings → Printer 1911 You can also configure printers via the CUPS web interface which you can access 1912 by running a web browser such as FireFox or Konqueror and entering the following 1913 at the address bar: http://localhost:631 1914 Another method if you have an HP printer is to use HPLIP Toolbox which you 1915 can run via the link in the Menu: 1916 → System → HPLIP Toolbox - Printer Toolbox 132
  • 133.
    Chapter 10. SystemAdministration Bayanihan Linux 5 Figure 10.7: Printer configuration 1917 10.4 Managing Private Folders 1918 Private Folders is a new feature in Bayanihan Linux allowing users to create an 1919 encrypted folder in their /home folders for them to be able to store files in a secure 1920 fashion. This encrypted folder is only accessible by the user that created it and 1921 is automatically opened and closed on login and logout. 1922 To enable your encrypted Private folder, simply run the wizard via the Menu: 1923 → Settings → Private folder configuration 1924 10.5 Setting up a firewall with Guarddog 1925 Guarddog is a user friendly firewall generation and management utility for KDE 1926 running on Linux. It allows you to simply specify which network protocols should 1927 be allowed between which groups of computers without requiring you to have 1928 knowledge of port numbers or packets. Guarddog is built on top of Linux’s 1929 ipchains and iptables packet filtering commands. For more information, press 1930 Alt+F2, type the command help:/guarddog then press Enter. 1931 To run this application, simply click on the link found at the Menu: 133
  • 134.
    Bayanihan Linux 5 Chapter 10. System Administration Figure 10.8: Guarddog 1932 → Internet → Guarddog - Firewall configuration utility 1933 10.6 Updating/Using Klamav 1934 Linux has a reputation for being immune to viruses. However, it is normally a 1935 good policy for organizations that work in mixed-environments (Windows and 1936 non-Windows PCs in the same network) to implement virus-free computing by 1937 scanning files that are frequently shared before sending them over the network. 1938 This is where an anti-virus manager will come in. 1939 KlamAV is an anti-virus manager for the KDE desktop that allows you to manage 1940 your virus-scanning, scheduling, virus research and software/database updates. 1941 A graphical wizard will run the first time you use this application. You can 1942 safely accept the defaults and press Skip. You will need an internet connection to 1943 download virus updates for KlamAV. 1944 To run this application, simply click on the link found at the Menu: 1945 → System → KlamAV - Anti-Virus Manager 134
  • 135.
    Chapter 10. SystemAdministration Bayanihan Linux 5 Figure 10.9: Klamav 1946 10.7 Managing users with Kuser/Adduser/Deluser 1947 Adding/removing users or groups is easily done using KUser. More information 1948 can be found by pressing Alt+F2 and entering the command help:/kuser. 1949 To run this application, simply click on the link found at the Menu: 1950 → System → KUser - User Manager Figure 10.10: KUser 135
  • 136.
    Bayanihan Linux 5 Chapter 10. System Administration 136
  • 137.
    1951 1952 CHAPTER 1953 ELEVEN 1954 1955 Special Topics 1956 11.1 Installing a C/C++ development environ- 1957 ment 1958 Section Author : Rage Callao 1959 1960 Several packages need to be installed in order to compile C/C++ source files. 1961 You can use any of the available tools for installing packages as described in sec- 1962 tion 10.1 in page 123. For the rest of this section we will be using commandline 1963 tools so you should already be familiar with using the console (see Chapter 9) and 1964 a text editor like vi, nano or MC. 1965 1966 Open a terminal: Menu → System → Konsole - Terminal Program 1967 1968 And enter the commands below: rage@bl5dev:~$ su Password: <enter your root password here> bl5dev:/home/rage# apt-get update bl5dev:/home/rage# apt-get install build-essential 137
  • 138.
    Bayanihan Linux 5 Chapter 11. Special Topics 1969 Optionally install the following: 1970 • fakeroot 1971 • autotools-dev 1972 • dh-make 1973 • automake1.9 1974 Additionally, if you want to build sources that depend on the graphical toolkits 1975 (such as Xorg, or Qt) you will need to install the following: 1976 • xorg-dev 1977 • libqt3-mt-dev 1978 • kdelibs4-dev 1979 • libglu1-mesa-dev 1980 • qt3-designer 1981 • qt3-linguist 1982 11.2 Compiling a custom kernel or third-party 1983 driver 1984 If you need to compile your own custom kernel or driver you will need to download 1985 and install the following packages: 1986 • kernel-package 1987 • module-assistant 1988 • libncurses5-dev 1989 • linux-headers-2.6-686 1990 • fakeroot 1991 To compile your own custom kernel, you will need to: 1992 1. Download a kernel tarball acompressedf ile from http://www.kernel.org. 138
  • 139.
    Chapter 11. SpecialTopics Bayanihan Linux 5 1993 2. Extract the tarball to a folder of your choice. 1994 3. cd (change directory) into the extracted folder. 1995 4. Run “make menuconfig” to configure the kernel. 1996 5. Edit /etc/kernel-pkg.conf and edit the maintainer and email fields. 1997 6. Run “fakeroot make-kpkg --initrd --revision=CUSTOM-1 binary” 1998 Warning: Compiling a custom kernel is for experts and advanced users and may 1999 render your machine unbootable. Before performing the installation of custom 2000 self-compiled kernels, make sure to backup your data. 2001 To compile a third-party module, you will need to: 2002 1. Download the module sources. 2003 2. Extract the sources to a folder of your choice. 2004 3. cd (change directory) into the extracted folder. 2005 4. Typically, run make and then make install 2006 11.3 Installing a webserver 2007 Section Author : Pearliezl S. Dy Tioco 2008 Setting this all up assumes you have a running version of Linux already installed. 2009 I won´ walk you through that part. t 2010 ´ ´ If you don´ have one and have an old box youd like to use, Id suggest using Debian t 2011 as we are about to. But if you are new to Linux, you might want to try using a 2012 hard disk installation of Knoppix as the procedure will be identical. 2013 Of course, you aren´ limited to Linux exclusively. All elements of LAMP have t 2014 been ported to most operating systems. 2015 Setting up Apache 2016 For the actual web server portion of our web server we’ll be using Apache 2. In 2017 addition to being free and open source, Apache is by far the most used web server 2018 software on the Web. 139
  • 140.
    Bayanihan Linux 5 Chapter 11. Special Topics 2019 Either shell or connecting remotely, we’ll start by checking for updates to the 2020 Debian package lists. This will require root access. 2021 The package lists are updated, we’ll tell Linux to go grab Apache. To fully install 2022 Apache, we’ll need more than one package. Thanks to Debian’s APT, we’ll be 2023 able to download and install all those dependencies with minimal work. bayanihan:/home/pearliezl# apt-get install apache2 Reading Package Lists... Done Building Dependency Tree... Done The following extra packages will be installed: apache2-common apache2-mpm-worker apache2-utils Suggested packages: apache2-doc lynx www-browser The following NEW packages will be installed: apache2 apache2-common apache2-mpm-worker apache2-utils 0 upgraded, 4 newly installed, 0 to remove and 5 not upgraded. Need to get 1097kB/1131kB of archives. After unpacking 4018kB of additional disk space will be used. Do you want to continue? [Y/n] y 2024 Although it isn’t a requirement, APT suggested installing the Apache documen- 2025 tation. So we’ll go ahead and install that just in case. It suggested Lynx too but 2026 we probably won’t be needing that. bayanihan:/home/pearliezl# apt-get install apache2-doc Reading Package Lists... Done Building Dependency Tree... Done The following NEW packages will be installed: apache2-doc 0 upgraded, 1 newly installed, 0 to remove and 5 not upgraded. Need to get 0B/3861kB of archives. 2027 Now we’ll do a quick check to verify Apache is running. bayanihan:/home/pearliezl# /etc/init.d/apache2 start Starting web server: Apache2httpd (pid 11205) already running 140
  • 141.
    Chapter 11. SpecialTopics Bayanihan Linux 5 2028 So it looks like Apache is running, but let’s not take that scripts word for it. 2029 I mean, we’re setting up a web server so why not use a web browser? To do 2030 this, just plug the IP address of your server into the address box of your favorite 2031 browser. This should forward you to http://servername/apache2default/ where 2032 you’ll find a page congratulating you on your successful Apache installation. 2033 If you’d like to start by editing this sample page, it´ easy enough to do. The s 2034 default Apache files are stored in /var/www/apache2default on your server. 2035 To edit the English version of the page, we’ll just have to use Nano (or another 2036 text editor) to edit /var/www/apache2default/index.html.en. bayanihan:/home/pearliezl# nano /var/www/apache2-default/index.html.en 2037 If you’d like to play with a few of Apache’s settings, the main configuration 2038 file is /etc/apache2/apache2.conf. Since by default Debian will allow external 2039 connections to Apache, you may want to limit connections to your localhost or 2040 local network only. 2041 Go to this file /etc/apache2/apache2.conf for apache setting. bayanihan:/home/pearliezl# nano /etc/apache2/apache2.conf Change this line from – ServerRoot ”/etc/apache2” to – ServerRoot ”/var/www” Change this line from – PidFile AP ACHEP IDF ILEto−−P idF ile/var/run/apache2.pidEn DocumentRoot”/var/www”U serwww − dataGroupwww − data 2042 If you’d like to make web folders for individual accounts, all that is needed to 2043 make a directory in the user’s home directory called /public html. For example, 2044 if your username is pearliezl, you’ll need to mkdir /home/pearliezl/public html. 2045 Files stored in that directory will then be viewable in your web browser at the 2046 address http://servername/ pearliezl/. 2047 At this point, if all you want to work on and host are static pages, you are done. 2048 But for those who want to do more interesting things using the LAMP platform, 2049 we’ll move on. 141
  • 142.
    Bayanihan Linux 5 Chapter 11. Special Topics 2050 Setting up MySQL 2051 There are plenty of Apache-friendly database servers available, but MySQL is 2052 certainly a popular option. Again, this one is free and open source. 2053 We’ll start by installing MySQL in a manner similar to the way we installed 2054 Apache. bayanihan:/home/pearliezl# apt-get install mysql-server The following extra packages will be installed: libdbd-mysql-perl libmysqlclient12 mysql-client mysql-common Suggested packages: mysql-doc The following NEW packages will be installed: libdbd-mysql-perl libmysqlclient12 mysql-client mysql-common mysql-server 0 upgraded, 5 newly installed, 0 to remove and 5 not upgraded. Need to get 4523kB of archives. After unpacking 10.5MB of additional disk space will be used. Do you want to continue? [Y/n] y 2055 Once MySQL begins to install, we’ll get a brief warning screen. This is mainly to 2056 fill us in a little on how passwords will work. By default, the root user MySQL 2057 has no password (something you will want to change for a public server). 2058 Before moving on, we’ll make sure the MySQL service is running. bayanihan:/home/pearliezl# /etc/init.d/mysql start Starting MySQL database server: mysqld...already running. 2059 If you’d like to change some of MySQL’s settings from their default values, take 2060 a look at the files located in /etc/mysql. 2061 As with Apache, APT suggests we install the MySQL documentation. Just to be 2062 safe, we’ll go ahead and do that. bayanihan:/home/pearliezl# apt-get install mysql-doc Reading Package Lists... Done Building Dependency Tree... Done Package mysql-doc is not available, but is referred to by another package. 142
  • 143.
    Chapter 11. SpecialTopics Bayanihan Linux 5 This may mean that the package is missing, has been obsoleted, or is only available from another source E: Package mysql-doc has no installation candidate 2063 Unfortunately, this package has been removed from Debian. So if we want the 2064 documentation, we’ll have to grab the documents directly from MySQL.com. 2065 If you are already comfortable using MySQL from the command line, you can 2066 probably skip the section on phpMyAdmin further down. But if you aren’t, 2067 phpMyAdmin will make your life much easier. 2068 Setting up PHP 2069 While HTML is a useful markup language, it lacks the sophisticated scripting 2070 ability that the modern Web user expects. This is where scripting languages like 2071 JavaScript, ASP, and PHP are needed. In particular, server-side scripts like those 2072 used in PHP and ASP provide a framework for building security-minded Web 2073 interfaces. 2074 It is with good reason that most Linux-based hosts use PHP over ASP (and not 2075 because LAMA just doesn’t sound all that desirable). PHP is a completely free 2076 and open source operating system. Cost aside, there are security considerations 2077 here. PHP has certainly not had a spotless record of security, but flaws are found 2078 much more quickly and are fixed almost immediately. 2079 Now if you really want to use ASP, Apache can be made to support it. However, 2080 support is limited. 2081 Most of us, though, are using PHP (hence the popularity of LAMP) so we’ll go 2082 ahead and set it up. Again, this starts on the command line. bayanihan:/home/pearliezl# apt-get install php5 Reading Package Lists... Done Building Dependency Tree... Done The following extra packages will be installed: apache-common libapache-mod-php4 Suggested packages: apache apache-ssl apache-perl php4-pear The following NEW packages will be installed: apache-common libapache-mod-php4 php4 0 upgraded, 3 newly installed, 0 to remove and 5 not upgraded. Need to get 2460kB of archives. 143
  • 144.
    Bayanihan Linux 5 Chapter 11. Special Topics After unpacking 6357kB of additional disk space will be used. Do you want to continue? [Y/n] y 2083 Since we will be using both PHP and MySQL on our server, we’ll go ahead and 2084 install the PHP’s MySQL module to help them play together better. We’ll also 2085 install PHP’s Pear extensions since so many packages will require it. bayanihan:/home/pearliezl# apt-get install php5-mysql php5-pear Reading Package Lists... Done Building Dependency Tree... Done The following extra packages will be installed: php5-cli Suggested packages: php5-dev The following NEW packages will be installed: php5-cli php5-mysql php5-pear 0 upgraded, 3 newly installed, 0 to remove and 5 not upgraded. Need to get 1860kB/1882kB of archives. After unpacking 5095kB of additional disk space will be used. Do you want to continue? [Y/n] y 2086 There are a few other packages we’ll need to install to get Apache working with 2087 PHP. bayanihan:/home/pearliezl# apt-get install libapache2-mod-php5 php5-cgi Reading Package Lists... Done Building Dependency Tree... Done The following extra packages will be installed: apache2-mpm-prefork The following packages will be REMOVED: apache2-mpm-worker The following NEW packages will be installed: apache2-mpm-prefork libapache2-mod-php4 php4-cgi 0 upgraded, 3 newly installed, 1 to remove and 5 not upgraded. Need to get 5024kB of archives. After unpacking 9441kB of additional disk space will be used. Do you want to continue? [Y/n] y 2088 All the necessary packages are installed, but we aren’t quite done yet. Using your 2089 favorite text editor, we’ll need to make some changes to /etc/apache2/apache2.conf. 144
  • 145.
    Chapter 11. SpecialTopics Bayanihan Linux 5 2090 First, locate the line ”#AddType application/xhttpdphp .php” and uncomment 2091 the line by removing the # from the beginning. Next, we’ll need to add the line 2092 below. 2093 LoadModule php4 module /usr/lib/apache2/modules/libphp5.so 2094 To get those changes to take effect, we’ll have to restart Apache. If we don’t, web 2095 browsers will be downloading our full PHP files rather than Apache processing 2096 them first. 2097 bayanihan:/home/pearliezl# /etc/init.d/apache2 restart 2098 To show that PHP is working, we’ll make a small PHP file and stick it in our web 2099 folder. Within the directory /home/pearliezl/public html, I’m going to add a file 2100 called index.php with the following contents: 2101 <?php 2102 phpinfo(); 2103 ?> 2104 This will generate a PHP page at http://servername/ pearliezl/ that will tell us 2105 a lot about our PHP installation. 2106 Setting up phpMyAdmin 2107 Don’t listen to the people who’ll tell you that you are cheating if you don’t run 2108 MySQL from the command line. Not only is that method more difficult, but you 2109 risk doing more damage if you make a mistake. 2110 phpMyAdmin is a web interface designed specifically for administering MySQL. 2111 While there are times that MySQL is best used directly (like when you are moving 2112 a 50 MB database to a new co-located server), phpMyAdmin is commonly used 2113 to handle day-to-day database issues. 2114 The installation of phpMyAdmin is fairly straightforward. bayanihan:/home/pearliezl# apt-get install phpmyadmin Reading Package Lists... Done Building Dependency Tree... Done Suggested packages: php5-gd The following NEW packages will be installed: phpmyadmin 145
  • 146.
    Bayanihan Linux 5 Chapter 11. Special Topics 0 upgraded, 1 newly installed, 0 to remove and 5 not upgraded. Need to get 2768kB of archives. 2115 Once the installation begins, we’ll be presented with a question about which web 2116 servers to reconfigure. Since we used Apache2, be sure to check that. When 2117 prompted, go ahead and have Apache2 restarted. 2118 To test out phpMyAdmin, we’ll first point our web browser to http://servername/phpmyadmin/. 2119 We will connect using the username ”root” and a blank password. Once we do, 2120 phpMyAdmin will greet us with stern warning about our blank password. Click- 2121 ing on ”Change password” will allow us to set one and get rid of that warning. 2122 11.4 Installing an ftp/file server 2123 11.5 Installing an email server 2124 Section Author : Pearliezl S. Dy Tioco 2125 2126 This guide will show you how to setup Postfix mail server running alongside Cyrus 2127 SASL, Courier-IMAP and SquirrelMail. Once everything is setup you will be able 2128 to read and write emails using the SquirrelMail web interface and be able to access 2129 your email anywhere in the world! 2130 Install and Configure Postfix Postfix requires a DNS service running otherwise it 2131 will not work, follow this Debian Lenny Bind Howto guide if required. During the 2132 Postfix installation, Select Internet Site and enter your domain name for System 2133 mail name, ie example.com 2134 # apt-get install postfix 2135 Make sure you read the comments and change accordingly. 2136 # nano /etc/postfix/main.cf 2137 smtpd banner = $myhostname ESMTP $mail name (example.com) biff = no ap- 2138 pend dot mydomain = no 2139 ### your hostname here myhostname = server 2140 mydomain = example.com myorigin = $mydomain inet interfaces = all mydesti- 2141 nation = $mydomain, localhost.$mydomain, localhost 146
  • 147.
    Chapter 11. SpecialTopics Bayanihan Linux 5 2142 ### your allowed networks mynetworks = 127.0.0.0/8,192.168.1.0/24 2143 smtpd sasl auth enable = yes smtpd sasl security options = noanonymous smtpd sasl local d 2144 = $mydomain broken sasl auth clients = yes 2145 smtpd require helo = yes smtpd helo restrictions = permit mynetworks, reject unknown clie 2146 reject invalid hostname, reject unknown hostname, reject non fqdn helo hostname 2147 smtpd client restrictions = permit mynetworks, reject unknown client, reject unknown addr 2148 smtpd sender restrictions = permit mynetworks, reject unknown client, reject unknown add 2149 smtpd recipient restrictions = permit mynetworks, permit sasl authenticated, re- 2150 ject unknown client, reject unauth destination 2151 home mailbox = Maildir/ alias maps = hash:/etc/aliases 2152 ### your ISP SMTP relay relayhost = relay.yourisp.net 2153 smtpd recipient limit = 250 2154 readme directory = /usr/share/doc/postfix html directory = /usr/share/doc/postfix/html 2155 Setup Postfix SASL Authentication 2156 # nano /etc/postfix/sasl/smtpd.conf 2157 pwcheck method: saslauthd mech list: plain login 2158 Aliases are used to map names with email accounts. This example will map all 2159 mail for root with you@example.com. You can add as many aliases as you like, 2160 my.nick and my.name are just examples. 2161 # nano /etc/aliases 2162 postmaster: root root: you@example.com my.nick: you@example.com my.name: 2163 you@example.com 2164 # newaliases 2165 Install SASL Authentication Edit saslauthd and change START=yes, dont touch 2166 the rest of the configuration. 2167 # apt-get install sasl2-bin libsasl2-2 libsasl2-modules # nano /etc/default/saslauthd 2168 START=yes 2169 We need to make sure chrooted Postfix can communicate with saslauthd. 2170 # rm -r /var/run/saslauthd/ # mkdir -p /var/spool/postfix/var/run/saslauthd # 2171 ln -s /var/spool/postfix/var/run/saslauthd /var/run # chgrp sasl /var/spool/postfix/var/ru 2172 # adduser postfix sasl 2173 Install Courier-IMAP During the install process it will ask Create directories for 147
  • 148.
    Bayanihan Linux 5 Chapter 11. Special Topics 2174 web-based administration? say No. 2175 # apt-get install courier-imap # nano /etc/courier/authmodulelist 2176 authdaemon 2177 Install Squirrelmail 2178 # apt-get install squirrelmail # ln -s /etc/squirrelmail/apache.conf /etc/apache2/conf.d/squirrelmail.c 2179 # ln -s /usr/share/squirrelmail squirrelmail /var/www/squirrelmail # chgrp -R 2180 www-data /usr/share/squirrelmail/ 2181 Add User and Setup Mailbox You will be asked for user you password, make sure 2182 you remember this password as this account will be used to access your email. 2183 # adduser you # su you $ maildirmake.courier /home/you/Maildir 2184 Start Postfix, Cyrus SASL, Courier-IMAP and Apache 2185 # /etc/init.d/postfix start # /etc/init.d/courier-imap start # /etc/init.d/courier- 2186 authdaemon start # /etc/init.d/saslauthd start # /etc/init.d/apache2 restart 2187 Test Postfix SMTP with Telnet This will create a string for SASL authentication, 2188 dont forget to insert 0 when they are needed. 2189 # perl -MMIME::Base64 -e ’print encode base64(”you0you0yourPASSWORD”);’ 2190 eW91AHlvdQB5b3VyUEFTU1dPUkQ= 2191 Now we can telnet into the Postfix SMTP server and send a test email. Type in 2192 the commands in the places where I have indicated ¡¡¡’ 2193 # telnet 192.168.1.20 25 2194 220 debian ESMTP Postfix (example.com) EHLO LOCALHOST ¡¡¡ 250-debian 2195 250-PIPELINING 250-SIZE 10240000 250-VRFY 250-ETRN 250-AUTH PLAIN 2196 LOGIN 250-AUTH=PLAIN LOGIN 250-ENHANCEDSTATUSCODES 250-8BITMIME 2197 250 DSN AUTH PLAIN eW91AHlvdQB5b3VyUEFTU1dPUkQ= ¡¡¡ 235 2.7.0 Au- 2198 thentication successful MAIL FROM:¡you@example.com¿ ¡¡¡ 250 2.1.0 Ok RCPT 2199 TO:¡you@example.com¿ ¡¡¡ 250 2.1.5 Ok DATA ¡¡¡ 354 End data with . THIS IS 2200 A TEST MESSAGE!! ¡¡¡ . ¡¡¡ 250 2.0.0 Ok: queued as 832291812D QUIT 221 2201 2.0.0 Bye 2202 Check Squirrelmail Fire up, http://example.com/squirrelmail and log in as the 2203 user you we created previously, hopefully you should see the test email we sent 2204 using telnet! You should now be able to send and receive email. Make sure the 2205 MX record in your registered domain name is pointing at your box, and you have 2206 forwarded port 25 on your firewall. 148
  • 149.
    Chapter 11. SpecialTopics Bayanihan Linux 5 2207 11.6 Configuring NFS 2208 Section Author : Pearliezl S. Dy Tioco 2209 2210 1. Introduction 1.1 What is NFS? 2211 The Network File System (NFS) was developed to allow machines to mount a 2212 disk partition on a remote machine as if it were on a local hard drive. This allows 2213 for fast, seamless sharing of files across a network. 2214 It also gives the potential for unwanted people to access your hard drive over the 2215 network if you set it up incorrectly. So please read the Security section of this 2216 document carefully if you intend to implement an NFS setup. 2217 There are other systems that provide similar functionality to NFS. Samba provides 2218 file services to Windows clients. The Andrew File System fro IBM, recently open- 2219 sourced, provides a file sharing mechanism with some additional secutiry and 2220 performance features. The Coda File System is still in development as of this 2221 writhing but is designed to work well with disconected clients. Many of the 2222 features of the Andrew and Coda file systems are slated for inclusion in the next 2223 version of NFS (Version 4). The advantage of NFS today is that it is mature, 2224 standard, well understood, and supported robustly across a variety of platforms. 2225 1.2 The Purpose of this Document 2226 What is the HOWTO and what is it NOT? 2227 This HOWTO is intended as a complete, step-by-step guide to setting up NFS 2228 correctly and effectively. Setting up NFS involves two steps, namely configuring 2229 the server and then configuring the client. Each of these steps is dealt with in 2230 order. The document then offers some tips for people with particular needs and 2231 hardware setups, as well as security and troubleshooting advice. 2232 This HOWTO is not a description of the guts and underlying structure of NFS. 2233 For that you may wish to read Managing NFS and NIS by Hal Stern, published 2234 ´ by OReilly & Associates, Inc. While that book is severely out of date, much of 2235 the structure of NFS has not changed, and the book describes it very articulately. 2236 A much more advanced and up-to-ate technical description of NFS is available in 2237 NFS illustrated by Brent Callaghan. 2238 2. Setting Up an NFS Server 2239 2.1 Introduction to Server Setup 2240 It is assumed that you will be setting up both a server and a client. If you are just 2241 setting up a client to work off of somebody else’s server, you can skip to ”Setting 149
  • 150.
    Bayanihan Linux 5 Chapter 11. Special Topics 2242 up an NFS Client”. However, every client that is set up requires modifications 2243 on the server to authorize that client (unless the server setup is done in a very 2244 insecure way), so even if you are not setting up a server you may wish to read 2245 this section to get an idea what kind of authorization problems to look out for. 2246 Setting up the server will be done in two steps: Setting up the configuration files 2247 for NFS, and then starting the NFS services. 2248 2.2 Setting up the Configuration files 2249 There are three main configuration files you will need to edit to set up an NFS 2250 server: /etc/exports, /etc/hosts.allow, and /etc/host.deny . Strictly speaking, 2251 you only need to edit /etc/exports to get NFS to work, but you would be left 2252 with an extremely insecure setup. You may also need to edit your startup scripts; 2253 ”Setting Up an NFS Server” for more on that. 2254 2.2.1 /etc/exports 2255 This file contains a list of entries; each entry indicates a volume that is shared and 2256 how it is shared. Check the man pages (man exports) for a complete description 2257 of all the setup options for the file, although the description here will probably 2258 satisfy most peoples needs. 2259 An entry in /etc/exports will typically look like this: 2260 directory machine1(option11, option12) machine2(option21, option22) 2261 where 2262 directory 2263 the directory that you want to share. It may be an entire volume thought it need 2264 not be. If you share a directory, then all directories under it within the same file 2265 system will be shared as well. 2266 machine1 and machine2 2267 client machines that will have access to the directory. The machines may be 2268 listed by their DNS address or their IP address (e.g. machine. company.com or 2269 192.168.0.1). Using IP addresses is more reliable and more secure. If you need to 2270 use DNS addresses, and they do not seem to be resolving to the right machine, 2271 ”Troubleshooting”. 2272 optionxx 2273 the option listing for each machine will describe what kind of access that machine 2274 will have. Important options are: 2275 ro: The directory is shared read only; the client machine will not be able to write 150
  • 151.
    Chapter 11. SpecialTopics Bayanihan Linux 5 2276 it. This is the default. 2277 rw: The client machine will have read and write access to the directory. 2278 no root squash: By default, any file request made by user root on the client 2279 machine is treated as if it is made by user nobody on the server. (Exactly which 2280 UID the request is mapped to depends on the UID of user ”nobody” on the server, 2281 not the client.) If no root squash is selected, then root on the client machine will 2282 have the same level of access to the files on the system as root on the server. 2283 This can have serious security implications, although it may be necessary if you 2284 want to perform any administrative work on the client machine that involves the 2285 exported directories. You should not specify this option without a good reason. 2286 no subtree check: If only part of a volume is exported, a routine called subtree 2287 checking verifies that a file that is requested from the client is in the appropriate 2288 part of the volume. If the entire volume is exported. disabling this check will 2289 speed up transfers. 2290 sync: By default, all but the most recent version (version 1.11) of the exportfs 2291 command will use async behavior, telling a client machine that a file write is 2292 complete that is, has been written to stable storage when NFS has finished 2293 handling the write over to the filesystem. This behavior may cause data corruption 2294 if the server reboots, and the sync option prevents this. See ”Optimizing NFS 2295 Performance” for a complete discussion of sync and async behavior. Suppose we 2296 have two client machines, slave1 and slave2, that have IP addresses 192.168.0.1 2297 and 192.168.0.2, respectively. We wish to share our software binaries and home 2298 directories with these machines. A typical setup for /etc/exports might look like 2299 this: 2300 /usr/local 192.168.0.1(ro) 192.168.0.2(ro) /home 192.168.0.1(rw) 192.168.0.2(rw) 2301 Here we are sharing /usr/local read-only to slave1 and slave2, because it probably 2302 contains our software and there may not be benefits to allowing slave1 and slave2 2303 to write to it that outweigh security concerns. On the other hand, home directories 2304 need to be exported read-write if users are to save their work on them. 2305 If you have a large installation, you may find that you have a bunch of computers 2306 all on the same local network that require access to your server. There are a few 2307 ways of simplifying references to large numbers of machines. First, you can give 2308 access to a range of machines at once by specifying a network and a netmask. 2309 For example, if you wanted to allow access to all the machines with IP addresses 2310 between 192.168.0.0 and 192.168.0.255 then you could have the entries: 2311 /usr/local 192.168.0.0/255.255.255.0(ro) /home 192.168.0.0/255.255.255.0(rw) 2312 See the ”Networking-Overview HOWTO” for further information on how net- 2313 masks, and you may also wish to look at the man pages for init and hosts.allow. 151
  • 152.
    Bayanihan Linux 5 Chapter 11. Special Topics 2314 Second, you can use NIS netgroups in your entry. To specify a netgroup in your 2315 exports file, simple prepend the name of the netgroup with an ”@”. See the ”NIS 2316 HOWTO” for details on how netgroups work. 2317 Third, you can use wildcards such as *.foo.com or 192.168. instead of hostnames. 2318 There were problems with wildcard implementation in the 2.2 kernel series that 2319 were fixed in kernel 2.219. 2320 However, you should keep in mind that any of these simplications could cause a 2321 security risk if there are machines in your netgroup or local network that you do 2322 not trust completely. 2323 A few cautions are in order about wat cannot (or should not) be exported. First, 2324 if a directory is exported, its parent and child directories cannot be exported if 2325 they are in the same filesystem. However, exporting both should not be neces- 2326 sary because listing the parent directory in the /etc/exports file will cause all 2327 underlying directories within that file system to be exported. 2328 Second, it is a poor idea to export a FAT or VFAT (i.e, MS-DOS or Windows 2329 95/98) filesystem with NFS. FAT is not designed for use on a multi-user machine, 2330 and as a result, operations that depend on permissions will not work well. More- 2331 over, some of the underlying filesystem design is reported to work poorly with 2332 NFSs expectations. 2333 Third, device or other special files may not export correctly to non-Linux clients. 2334 See ”Using Linux NFS with other OSes” for details on particular operating sys- 2335 tems. 2336 2.2.2 /etc/hosts.allow and /etc/hosts.deny 2337 These two files specify which computers on the network can use services on your 2338 machine. Each line of the file contains a single entry listing a service and a set of 2339 machines. When the server gets a request from a machine, it does the following: 2340 1. It first checks host.allow to see if the machine a rule listed hee. If it does, 2341 then the machine is allowed access. 2. If the machine does not match an entry 2342 in hosts.allow the server then checks hosts.deny to see if the client matches a rule 2343 listed there. If it does then the machine is denied access. 3. If the client matches 2344 no listings in either file, then it is allowed access. In addition to controlling 2345 access to services handled by inetd(such as telnet and FTP), this file can also 2346 control access to NFS by restricting connections to the daemons that provide 2347 NFS services. Restrictions are done on a per-service basis. 2348 The first daemon to restrict access to is the portmapper. This daemon essen- 2349 tially just tells requesting clients how to find all the NFS services on the system. 2350 Restricting access to the portmapper is the best defense against someone break- 2351 ing into your system through NFS because completely unauthorized clients wont 152
  • 153.
    Chapter 11. SpecialTopics Bayanihan Linux 5 2352 know where to find the NFS daemons. However, there are two things to watch out 2353 for. First, restricting portmapper will also restrict requests to NIS. That should 2354 usually be harmless since you usually want to restrict NFS and IS in a similar 2355 way but just be cautioned. (Running NIS is generally a good idea if you are 2356 running NFS, because the client machines need a way of knowing who owns what 2357 files on the exported volumes. OF course there are other ways of doing this such 2358 as syncing password files. See the ”NIS HOWTO” for information on setting up 2359 NIS.) 2360 In general it is a good idea with NFS (as with most internet services) to explicitly 2361 deny access to IP addresses that you dont need to allow access to. 2362 The first step in doing this is to add the following entry to /etc/hosts.deny: 2363 portmap:ALL 2364 Starting with nfs-utils 0.2.0, you can be a bit more carefule by controlling access 2365 to individual daemons. It’s a good precaution since an intruder will often be able 2366 to weasel around the portmapper. If you have a newer version of nfs-utils, add 2367 entries for each of the NFS daemons. 2368 lockd:ALL mountd:ALL rquotad:ALL statd:ALL 2369 Even if you have an older version of nfs-utils, adding these entries is at worst 2370 harmless and at best will save you some trouble when you upgrade. Some sys 2371 admins choose to put the entry ALL:ALL in the file /etc/hosts.deny, which causes 2372 any service that looks at these files to deny access to all hosts unless it is explicitly 2373 allowed. While this is more secure behavior, it may also get you in trouble when 2374 you are installing new services. you forget you put it there and you cant figure 2375 out for the life of you why they wont work. 2376 Next, we need to add an entry to hosts.allow to give any hosts access that we 2377 want to have access. (If we just leave the above lines in hosts.deny then nobody 2378 will have access to NFS.) Entries in hosts.allow follow the format: 2379 service: host[or network/netmask] , host [or network/netmask] 2380 Here, host is IP address of a potential client; it may be possible in some versions 2381 to use the DNS name of the host, but it is strongly discouraged. 2382 Suppose we have the setup above and we just want to allow access to slave1.foo.com 2383 and slave2.foo.com, and suppose that the IP addresses of these machines are 2384 192.168.0.1 and 192.168.0.2, respectively. We could add the following entry to 2385 /etc/hosts.allow: 2386 portmap: 192.168.0.1 , 192.168.0.2 2387 For recent nfs-utils versions, we would also add the following (again, these entries 153
  • 154.
    Bayanihan Linux 5 Chapter 11. Special Topics 2388 are harmless even if they are not supported): 2389 lockd: 192.168.0.1 , 192.168.0.2 rquotad: 192.168.0.1 , 192.168.0.2 mountd: 192.168.0.1 2390 , 192.168.0.2 statd: 192.168.0.1 , 192.168.0.2 2391 2.3 Getting the services Started 2392 2.3.1 Pre-requisites 2393 The NFS server should now be configured and we can start it running. First, you 2394 will need to have the appropriate packages installed. This consists mainly of a 2395 new enough kernel and a new enough version of the nfs-utils package. See Section 2396 2, Introduction if you are in doubt. 2397 Next, before you can start NFS, you will need to have TCP/IP networking func- 2398 tioning correctly on your machine. If you can use telnet, FTP, and so on, then 2399 chances are your TCP networking is fine. 2400 That said, with most recent Linux distributions you may be able to get NFS up 2401 and running simply by rebooting your machine, and the startup scripts should 2402 detect that you have set up your /etc/exports file and will start up NFS correctly. 2403 If you try this, see Section 4, Setting up an NFS Client Verifying that NFS 2404 is running. If this does not work, or if you are not in a position to reboot your 2405 machine, then the following section will tell you which daemons need to be started 2406 in order to run NFS services. If for some reason nfsd was already running when 2407 you edited your configuration files above, you will have to flush your configuration; 2408 see Section 4, Setting up an NFS Client for details. 2409 2.3.2 Starting the Portmapper 2410 NFS depends on the portmapper daemon, either called portmap or rpc.portmap. 2411 It will need to be started first. It should be located in /sbin but is sometimes in 2412 /usr/sbin. Most recent Linux distributions start this daemon in the boot scripts, 2413 but it is worth making sure that it is running before you begin working with NFS 2414 (just type ps aux — grep portmap). 2415 2.3.3 The Daemons 2416 NFS serving is taken care of by five daemons: rpc.nfsd, which does most of 2417 the work; rpc.lockd and rpc.statd, which handle file locking; rpc.mountd, which 2418 handles the initial mount requests, and rpc.rquotad, which handles user file quotas 2419 on exported volumes. Starting with 2.2.18, lockd is called by nfsd upon demand, 2420 so you do not need to worry about starting it yourself. statd will need to be 2421 started separately. Most recent Linux distributions will have startup scripts for 2422 these daemons. 2423 The daemons are all part of the nfs-utils package, and may be either in the /sbin 2424 directory or the /usr/sbin directory. 154
  • 155.
    Chapter 11. SpecialTopics Bayanihan Linux 5 2425 If your distribution does not include them in the startup scripts, then then you 2426 should add them, configured to start in the following order: 2427 rpc.portmap rpc.mountd, rpc.nfsd rpc.statd, rpc.lockd (if necessary), and rpc.rquotad 2428 The nfs-utils package has sample startup scripts for RedHat and Debian. If you 2429 are using a different distribution, in general you can just copy the RedHat script, 2430 but you will probably have to take out the line that says: 2431 . ../init.d/functions 2432 to avoid getting error messages. 2433 2.3.4 Verifying that NFS is running 2434 To do this, query the portmapper with the command rpcinfo quota to find out 2435 what services it is providing. You should get something like this: 2436 program vers proto port 100000 2 tcp 111 portmapper 100000 2 udp 111 portmap- 2437 per 100011 1 udp 749 rquotad 100011 2 udp 749 rquotad 100005 1 udp 759 mountd 2438 100005 1 tcp 761 mountd 100005 2 udp 764 mountd 100005 2 tcp 766 mountd 2439 100005 3 udp 769 mountd 100005 3 tcp 771 mountd 100003 2 udp 2049 nfs 100003 2440 3 udp 2049 nfs 300019 1 tcp 830 amd 300019 1 udp 831 amd 100024 1 udp 944 2441 status 100024 1 tcp 946 status 100021 1 udp 1042 nlockmgr 100021 3 udp 1042 2442 nlockmgr 100021 4 udp 1042 nlockmgr 100021 1 tcp 1629 nlockmgr 100021 3 tcp 2443 1629 nlockmgr 100021 4 tcp 1629 nlockmgr 2444 This says that we have NFS versions 2 and 3, rpc.statd version 1, network lock 2445 manager (the service name for rpc.lockd) versions 1, 3, and 4. There are also 2446 different service listings depending on whether NFS is travelling over TCP or 2447 UDP. Linux systems use UDP by default unless TCP is explicitly requested; 2448 however other OSes such as Solaris default to TCP. 2449 If you do not at least see a line that says portmapper, a line that says nfs, and a 2450 line that says mountd then you will need to backtrack and try again to start up 2451 the daemons (see Troubleshooting if this still doesn’t work). 2452 If you do see these services listed, then you should be ready to set up NFS clients 2453 to access files from your server. 2454 2.3.5 Making Changes to /etc/exports later on 2455 If you come back and change your /etc/exports file, the changes you make may 2456 not take effect immediately. You should run the command exportfs -ra to force 2457 nfsd to re-read the /etc/exports file. If you can’t find the exportfs command, then 2458 you can kill nfsd with the -HUP flag (see the man pages for kill for details). 2459 If that still doesn’t work, don’t forget to check hosts.allow to make sure you 155
  • 156.
    Bayanihan Linux 5 Chapter 11. Special Topics 2460 haven’t forgotten to list any new client machines there. Also check the host 2461 listings on any firewalls you may have set up (see Troubleshooting and Security 2462 and NFS for more details on firewalls and NFS). 2463 3. Setting up an NFS Client 2464 3.1 Mounting Remote Directories 2465 Before beginning, you should double-check to make sure your mount program is 2466 new enough (version 2.10m if you want to use Version 3 NFS), and that the client 2467 machine supports NFS mounting, though most standard distributions do. If you 2468 are using a 2.2 or later kernel with the /proc filesystem you can check the latter 2469 by reading the file /proc/filesystems and making sure there is a line containing 2470 nfs. If not, typing insmod nfs may make it magically appear if NFS has been 2471 compiled as a module; otherwise, you will need to build (or download) a kernel 2472 that has NFS support built in. In general, kernels that do not have NFS compiled 2473 in will give a very specific error when the mount command below is run. 2474 To begin using machine as an NFS client, you will need the portmapper running 2475 on that machine, and to use NFS file locking, you will also need rpc.statd and 2476 rpc.lockd running on both the client and the server. Most recent distributions 2477 start those services by default at boot time; if yours doesn’t, see Setting up an 2478 NFS Client for information on how to start them up. 2479 With portmap, lockd, and statd running, you should now be able to mount the 2480 remote directory from your server just the way you mount a local hard drive, 2481 with the mount command. Continuing our example from the previous section, 2482 suppose our server above is called master.foo.com,and we want to mount the 2483 /home directory on slave1.foo.com. Then, all we have to do, from the root prompt 2484 on slave1.foo.com, is type: 2485 # mount master.foo.com:/home /mnt/home 2486 and the directory /home on master will appear as the directory /mnt/home on 2487 slave1. (Note that this assumes we have created the directory /mnt/home as an 2488 empty mount point beforehand.) 2489 If this does not work, see Troubleshooting. 2490 You can get unmount the file system by typing: 2491 # umount /mnt/home 2492 Just like you would for a local file system. 2493 3.2 Getting NFS File Systems to be Mounted at Boot Time 2494 NFS file systems can be added to your /etc/fstab file the same way local file 156
  • 157.
    Chapter 11. SpecialTopics Bayanihan Linux 5 2495 systems can, so that they mount when your system starts up. The only difference 2496 is that the file system type will be set to nfs and the dump and fsck order (the 2497 last two entries) will have to be set to zero. So for our example above, the entry 2498 in /etc/fstab would look like: 2499 # device mountpoint fs-type options dump fsckorder ... master.foo.com:/home 2500 /mnt nfs rw 0 0 ... 2501 See the man pages for fstab if you are unfamiliar with the syntax of this file. If you 2502 are using an automounter such as amd or autofs, the options in the corresponding 2503 fields of your mount listings should look very similar if not identical. 2504 At this point you should have NFS working, though a few tweaks may still be 2505 necessary to get it to work well. You should also read Section 6, Security and 2506 NFS to be sure your setup is reasonably secure. 2507 3.3 Mount Options 2508 3.3.1 Soft versus Hard Mounting 2509 There are some options you should consider adding at once. They govern the way 2510 the NFS client handles a server crash or network outage. One of the cool things 2511 about NFS is that it can handle this gracefully. If you set up the clients right. 2512 There are two distinct failure modes: 2513 soft 2514 If a file request fails, the NFS client will report an error to the process on the 2515 client machine requesting the file access. Some programs can handle this with 2516 composure, most won’t. We do not recommend using this setting; it is a recipe 2517 for corrupted files and lost data. You should especially not use this for mail disks 2518 — if you value your mail, that is. 2519 hard 2520 The program accessing a file on a NFS mounted file system will hang when the 2521 server crashes. The process cannot be interrupted or killed (except by a ”sure 2522 kill”) unless you also specify intr. When the NFS server is back online the program 2523 will continue undisturbed from where it was. We recommend using hard,intr on 2524 all NFS mounted file systems. 2525 Picking up from the previous example, the fstab would now look like: 2526 # device mountpoint fs-type options dump fsckord ... master.foo.com:/home 2527 /mnt/home nfs rw,hard,intr 0 0 ... 2528 The rsize and wsize mount options specify the size of the chunks of data that the 2529 client and server pass back and forth to each other. 157
  • 158.
    Bayanihan Linux 5 Chapter 11. Special Topics 2530 The defaults may be too big or to small; there is no size that works well on all or 2531 most setups. On the one hand, some combinations of Linux kernels and network 2532 cards (largely on older machines) cannot handle blocks that large. On the other 2533 hand, if they can handle larger blocks, a bigger size might be faster. 2534 Getting the block size right is an important factor in performance and is a must if 2535 you are planning to use the NFS server in a production environment. See Section 2536 5, Optimizing NFS Performance for details. 2537 11.7 BIND / DNS servers 158
  • 159.
    2538 2539 APPENDIX 2540 A 2541 2542 GNU GPL 2543 GNU GENERAL PUBLIC LICENSE Version 3, 29 June 2007 2544 Copyright c 2007 Free Software Foundation, Inc. http://fsf.org/ 2545 Everyone is permitted to copy and distribute verbatim copies of this 2546 license document, but changing it is not allowed. 2547 The GNU General Public License is a free, copyleft license for software and other 2548 kinds of works. 2549 The licenses for most software and other practical works are designed to take away 2550 your freedom to share and change the works. By contrast, the GNU General 2551 Public License is intended to guarantee your freedom to share and change all 2552 versions of a program–to make sure it remains free software for all its users. We, 2553 the Free Software Foundation, use the GNU General Public License for most of 2554 our software; it applies also to any other work released this way by its authors. 2555 You can apply it to your programs, too. 2556 When we speak of free software, we are referring to freedom, not price. Our 2557 General Public Licenses are designed to make sure that you have the freedom 2558 to distribute copies of free software (and charge for them if you wish), that you 2559 receive source code or can get it if you want it, that you can change the software 2560 or use pieces of it in new free programs, and that you know you can do these 2561 things. 159
  • 160.
    Bayanihan Linux 5 Appendix A. GNU GPL 2562 To protect your rights, we need to prevent others from denying you these rights 2563 or asking you to surrender the rights. Therefore, you have certain responsibilities 2564 if you distribute copies of the software, or if you modify it: responsibilities to 2565 respect the freedom of others. 2566 For example, if you distribute copies of such a program, whether gratis or for a 2567 fee, you must pass on to the recipients the same freedoms that you received. You 2568 must make sure that they, too, receive or can get the source code. And you must 2569 show them these terms so they know their rights. 2570 Developers that use the GNU GPL protect your rights with two steps: (1) as- 2571 sert copyright on the software, and (2) offer you this License giving you legal 2572 permission to copy, distribute and/or modify it. 2573 For the developers’ and authors’ protection, the GPL clearly explains that there 2574 is no warranty for this free software. For both users’ and authors’ sake, the GPL 2575 requires that modified versions be marked as changed, so that their problems will 2576 not be attributed erroneously to authors of previous versions. 2577 Some devices are designed to deny users access to install or run modified versions 2578 of the software inside them, although the manufacturer can do so. This is fun- 2579 damentally incompatible with the aim of protecting users’ freedom to change the 2580 software. The systematic pattern of such abuse occurs in the area of products for 2581 individuals to use, which is precisely where it is most unacceptable. Therefore, 2582 we have designed this version of the GPL to prohibit the practice for those prod- 2583 ucts. If such problems arise substantially in other domains, we stand ready to 2584 extend this provision to those domains in future versions of the GPL, as needed 2585 to protect the freedom of users. 2586 Finally, every program is threatened constantly by software patents. States should 2587 not allow patents to restrict development and use of software on general-purpose 2588 computers, but in those that do, we wish to avoid the special danger that patents 2589 applied to a free program could make it effectively proprietary. To prevent this, 2590 the GPL assures that patents cannot be used to render the program non-free. 2591 The precise terms and conditions for copying, distribution and modification follow. 2592 Terms and Conditions 2593 0. Definitions. 2594 “This License” refers to version 3 of the GNU General Public License. 2595 “Copyright” also means copyright-like laws that apply to other kinds of 2596 works, such as semiconductor masks. 2597 “The Program” refers to any copyrightable work licensed under this License. 160
  • 161.
    Appendix A. GNUGPL Bayanihan Linux 5 2598 Each licensee is addressed as “you”. “Licensees” and “recipients” may be 2599 individuals or organizations. 2600 To “modify” a work means to copy from or adapt all or part of the work in 2601 a fashion requiring copyright permission, other than the making of an exact 2602 copy. The resulting work is called a “modified version” of the earlier work 2603 or a work “based on” the earlier work. 2604 A “covered work” means either the unmodified Program or a work based 2605 on the Program. 2606 To “propagate” a work means to do anything with it that, without permis- 2607 sion, would make you directly or secondarily liable for infringement under 2608 applicable copyright law, except executing it on a computer or modifying a 2609 private copy. Propagation includes copying, distribution (with or without 2610 modification), making available to the public, and in some countries other 2611 activities as well. 2612 To “convey” a work means any kind of propagation that enables other par- 2613 ties to make or receive copies. Mere interaction with a user through a 2614 computer network, with no transfer of a copy, is not conveying. 2615 An interactive user interface displays “Appropriate Legal Notices” to the 2616 extent that it includes a convenient and prominently visible feature that (1) 2617 displays an appropriate copyright notice, and (2) tells the user that there is 2618 no warranty for the work (except to the extent that warranties are provided), 2619 that licensees may convey the work under this License, and how to view a 2620 copy of this License. If the interface presents a list of user commands or 2621 options, such as a menu, a prominent item in the list meets this criterion. 2622 1. Source Code. 2623 The “source code” for a work means the preferred form of the work for 2624 making modifications to it. “Object code” means any non-source form of a 2625 work. 2626 A “Standard Interface” means an interface that either is an official standard 2627 defined by a recognized standards body, or, in the case of interfaces speci- 2628 fied for a particular programming language, one that is widely used among 2629 developers working in that language. 2630 The “System Libraries” of an executable work include anything, other than 2631 the work as a whole, that (a) is included in the normal form of packaging 2632 a Major Component, but which is not part of that Major Component, and 2633 (b) serves only to enable use of the work with that Major Component, or 2634 to implement a Standard Interface for which an implementation is available 2635 to the public in source code form. A “Major Component”, in this context, 2636 means a major essential component (kernel, window system, and so on) of 2637 the specific operating system (if any) on which the executable work runs, 161
  • 162.
    Bayanihan Linux 5 Appendix A. GNU GPL 2638 or a compiler used to produce the work, or an object code interpreter used 2639 to run it. 2640 The “Corresponding Source” for a work in object code form means all the 2641 source code needed to generate, install, and (for an executable work) run 2642 the object code and to modify the work, including scripts to control those 2643 activities. However, it does not include the work’s System Libraries, or 2644 general-purpose tools or generally available free programs which are used 2645 unmodified in performing those activities but which are not part of the 2646 work. For example, Corresponding Source includes interface definition files 2647 associated with source files for the work, and the source code for shared 2648 libraries and dynamically linked subprograms that the work is specifically 2649 designed to require, such as by intimate data communication or control flow 2650 between those subprograms and other parts of the work. 2651 The Corresponding Source need not include anything that users can regen- 2652 erate automatically from other parts of the Corresponding Source. 2653 The Corresponding Source for a work in source code form is that same work. 2654 2. Basic Permissions. 2655 All rights granted under this License are granted for the term of copyright 2656 on the Program, and are irrevocable provided the stated conditions are 2657 met. This License explicitly affirms your unlimited permission to run the 2658 unmodified Program. The output from running a covered work is covered 2659 by this License only if the output, given its content, constitutes a covered 2660 work. This License acknowledges your rights of fair use or other equivalent, 2661 as provided by copyright law. 2662 You may make, run and propagate covered works that you do not con- 2663 vey, without conditions so long as your license otherwise remains in force. 2664 You may convey covered works to others for the sole purpose of having 2665 them make modifications exclusively for you, or provide you with facilities 2666 for running those works, provided that you comply with the terms of this 2667 License in conveying all material for which you do not control copyright. 2668 Those thus making or running the covered works for you must do so ex- 2669 clusively on your behalf, under your direction and control, on terms that 2670 prohibit them from making any copies of your copyrighted material outside 2671 their relationship with you. 2672 Conveying under any other circumstances is permitted solely under the con- 2673 ditions stated below. Sublicensing is not allowed; section 10 makes it un- 2674 necessary. 2675 3. Protecting Users’ Legal Rights From Anti-Circumvention Law. 2676 No covered work shall be deemed part of an effective technological measure 2677 under any applicable law fulfilling obligations under article 11 of the WIPO 162
  • 163.
    Appendix A. GNUGPL Bayanihan Linux 5 2678 copyright treaty adopted on 20 December 1996, or similar laws prohibiting 2679 or restricting circumvention of such measures. 2680 When you convey a covered work, you waive any legal power to forbid 2681 circumvention of technological measures to the extent such circumvention is 2682 effected by exercising rights under this License with respect to the covered 2683 work, and you disclaim any intention to limit operation or modification of 2684 the work as a means of enforcing, against the work’s users, your or third 2685 parties’ legal rights to forbid circumvention of technological measures. 2686 4. Conveying Verbatim Copies. 2687 You may convey verbatim copies of the Program’s source code as you receive 2688 it, in any medium, provided that you conspicuously and appropriately pub- 2689 lish on each copy an appropriate copyright notice; keep intact all notices 2690 stating that this License and any non-permissive terms added in accord 2691 with section 7 apply to the code; keep intact all notices of the absence of 2692 any warranty; and give all recipients a copy of this License along with the 2693 Program. 2694 You may charge any price or no price for each copy that you convey, and 2695 you may offer support or warranty protection for a fee. 2696 5. Conveying Modified Source Versions. 2697 You may convey a work based on the Program, or the modifications to 2698 produce it from the Program, in the form of source code under the terms of 2699 section 4, provided that you also meet all of these conditions: 2700 (a) The work must carry prominent notices stating that you modified it, 2701 and giving a relevant date. 2702 (b) The work must carry prominent notices stating that it is released under 2703 this License and any conditions added under section 7. This require- 2704 ment modifies the requirement in section 4 to “keep intact all notices”. 2705 (c) You must license the entire work, as a whole, under this License to 2706 anyone who comes into possession of a copy. This License will there- 2707 fore apply, along with any applicable section 7 additional terms, to the 2708 whole of the work, and all its parts, regardless of how they are pack- 2709 aged. This License gives no permission to license the work in any other 2710 way, but it does not invalidate such permission if you have separately 2711 received it. 2712 (d) If the work has interactive user interfaces, each must display Appropri- 2713 ate Legal Notices; however, if the Program has interactive interfaces 2714 that do not display Appropriate Legal Notices, your work need not 2715 make them do so. 163
  • 164.
    Bayanihan Linux 5 Appendix A. GNU GPL 2716 A compilation of a covered work with other separate and independent works, 2717 which are not by their nature extensions of the covered work, and which are 2718 not combined with it such as to form a larger program, in or on a volume of 2719 a storage or distribution medium, is called an “aggregate” if the compilation 2720 and its resulting copyright are not used to limit the access or legal rights of 2721 the compilation’s users beyond what the individual works permit. Inclusion 2722 of a covered work in an aggregate does not cause this License to apply to 2723 the other parts of the aggregate. 2724 6. Conveying Non-Source Forms. 2725 You may convey a covered work in object code form under the terms of 2726 sections 4 and 5, provided that you also convey the machine-readable Cor- 2727 responding Source under the terms of this License, in one of these ways: 2728 (a) Convey the object code in, or embodied in, a physical product (includ- 2729 ing a physical distribution medium), accompanied by the Correspond- 2730 ing Source fixed on a durable physical medium customarily used for 2731 software interchange. 2732 (b) Convey the object code in, or embodied in, a physical product (includ- 2733 ing a physical distribution medium), accompanied by a written offer, 2734 valid for at least three years and valid for as long as you offer spare 2735 parts or customer support for that product model, to give anyone who 2736 possesses the object code either (1) a copy of the Corresponding Source 2737 for all the software in the product that is covered by this License, on 2738 a durable physical medium customarily used for software interchange, 2739 for a price no more than your reasonable cost of physically perform- 2740 ing this conveying of source, or (2) access to copy the Corresponding 2741 Source from a network server at no charge. 2742 (c) Convey individual copies of the object code with a copy of the written 2743 offer to provide the Corresponding Source. This alternative is allowed 2744 only occasionally and noncommercially, and only if you received the 2745 object code with such an offer, in accord with subsection 6b. 2746 (d) Convey the object code by offering access from a designated place 2747 (gratis or for a charge), and offer equivalent access to the Correspond- 2748 ing Source in the same way through the same place at no further charge. 2749 You need not require recipients to copy the Corresponding Source along 2750 with the object code. If the place to copy the object code is a network 2751 server, the Corresponding Source may be on a different server (oper- 2752 ated by you or a third party) that supports equivalent copying facilities, 2753 provided you maintain clear directions next to the object code saying 2754 where to find the Corresponding Source. Regardless of what server 2755 hosts the Corresponding Source, you remain obligated to ensure that 2756 it is available for as long as needed to satisfy these requirements. 164
  • 165.
    Appendix A. GNUGPL Bayanihan Linux 5 2757 (e) Convey the object code using peer-to-peer transmission, provided you 2758 inform other peers where the object code and Corresponding Source 2759 of the work are being offered to the general public at no charge under 2760 subsection 6d. 2761 A separable portion of the object code, whose source code is excluded from 2762 the Corresponding Source as a System Library, need not be included in 2763 conveying the object code work. 2764 A “User Product” is either (1) a “consumer product”, which means any 2765 tangible personal property which is normally used for personal, family, or 2766 household purposes, or (2) anything designed or sold for incorporation into a 2767 dwelling. In determining whether a product is a consumer product, doubtful 2768 cases shall be resolved in favor of coverage. For a particular product received 2769 by a particular user, “normally used” refers to a typical or common use of 2770 that class of product, regardless of the status of the particular user or of the 2771 way in which the particular user actually uses, or expects or is expected to 2772 use, the product. A product is a consumer product regardless of whether 2773 the product has substantial commercial, industrial or non-consumer uses, 2774 unless such uses represent the only significant mode of use of the product. 2775 “Installation Information” for a User Product means any methods, pro- 2776 cedures, authorization keys, or other information required to install and 2777 execute modified versions of a covered work in that User Product from a 2778 modified version of its Corresponding Source. The information must suffice 2779 to ensure that the continued functioning of the modified object code is in 2780 no case prevented or interfered with solely because modification has been 2781 made. 2782 If you convey an object code work under this section in, or with, or specif- 2783 ically for use in, a User Product, and the conveying occurs as part of a 2784 transaction in which the right of possession and use of the User Product is 2785 transferred to the recipient in perpetuity or for a fixed term (regardless of 2786 how the transaction is characterized), the Corresponding Source conveyed 2787 under this section must be accompanied by the Installation Information. 2788 But this requirement does not apply if neither you nor any third party re- 2789 tains the ability to install modified object code on the User Product (for 2790 example, the work has been installed in ROM). 2791 The requirement to provide Installation Information does not include a re- 2792 quirement to continue to provide support service, warranty, or updates for 2793 a work that has been modified or installed by the recipient, or for the User 2794 Product in which it has been modified or installed. Access to a network 2795 may be denied when the modification itself materially and adversely af- 2796 fects the operation of the network or violates the rules and protocols for 2797 communication across the network. 165
  • 166.
    Bayanihan Linux 5 Appendix A. GNU GPL 2798 Corresponding Source conveyed, and Installation Information provided, in 2799 accord with this section must be in a format that is publicly documented 2800 (and with an implementation available to the public in source code form), 2801 and must require no special password or key for unpacking, reading or copy- 2802 ing. 2803 7. Additional Terms. 2804 “Additional permissions” are terms that supplement the terms of this Li- 2805 cense by making exceptions from one or more of its conditions. Additional 2806 permissions that are applicable to the entire Program shall be treated as 2807 though they were included in this License, to the extent that they are valid 2808 under applicable law. If additional permissions apply only to part of the 2809 Program, that part may be used separately under those permissions, but 2810 the entire Program remains governed by this License without regard to the 2811 additional permissions. 2812 When you convey a copy of a covered work, you may at your option remove 2813 any additional permissions from that copy, or from any part of it. (Addi- 2814 tional permissions may be written to require their own removal in certain 2815 cases when you modify the work.) You may place additional permissions on 2816 material, added by you to a covered work, for which you have or can give 2817 appropriate copyright permission. 2818 Notwithstanding any other provision of this License, for material you add 2819 to a covered work, you may (if authorized by the copyright holders of that 2820 material) supplement the terms of this License with terms: 2821 (a) Disclaiming warranty or limiting liability differently from the terms of 2822 sections 15 and 16 of this License; or 2823 (b) Requiring preservation of specified reasonable legal notices or author 2824 attributions in that material or in the Appropriate Legal Notices dis- 2825 played by works containing it; or 2826 (c) Prohibiting misrepresentation of the origin of that material, or requir- 2827 ing that modified versions of such material be marked in reasonable 2828 ways as different from the original version; or 2829 (d) Limiting the use for publicity purposes of names of licensors or authors 2830 of the material; or 2831 (e) Declining to grant rights under trademark law for use of some trade 2832 names, trademarks, or service marks; or 2833 (f) Requiring indemnification of licensors and authors of that material 2834 by anyone who conveys the material (or modified versions of it) with 2835 contractual assumptions of liability to the recipient, for any liability 2836 that these contractual assumptions directly impose on those licensors 2837 and authors. 166
  • 167.
    Appendix A. GNUGPL Bayanihan Linux 5 2838 All other non-permissive additional terms are considered “further restric- 2839 tions” within the meaning of section 10. If the Program as you received it, 2840 or any part of it, contains a notice stating that it is governed by this License 2841 along with a term that is a further restriction, you may remove that term. 2842 If a license document contains a further restriction but permits relicensing 2843 or conveying under this License, you may add to a covered work material 2844 governed by the terms of that license document, provided that the further 2845 restriction does not survive such relicensing or conveying. 2846 If you add terms to a covered work in accord with this section, you must 2847 place, in the relevant source files, a statement of the additional terms that 2848 apply to those files, or a notice indicating where to find the applicable terms. 2849 Additional terms, permissive or non-permissive, may be stated in the form of 2850 a separately written license, or stated as exceptions; the above requirements 2851 apply either way. 2852 8. Termination. 2853 You may not propagate or modify a covered work except as expressly pro- 2854 vided under this License. Any attempt otherwise to propagate or modify 2855 it is void, and will automatically terminate your rights under this License 2856 (including any patent licenses granted under the third paragraph of section 2857 11). 2858 However, if you cease all violation of this License, then your license from a 2859 particular copyright holder is reinstated (a) provisionally, unless and until 2860 the copyright holder explicitly and finally terminates your license, and (b) 2861 permanently, if the copyright holder fails to notify you of the violation by 2862 some reasonable means prior to 60 days after the cessation. 2863 Moreover, your license from a particular copyright holder is reinstated per- 2864 manently if the copyright holder notifies you of the violation by some rea- 2865 sonable means, this is the first time you have received notice of violation 2866 of this License (for any work) from that copyright holder, and you cure the 2867 violation prior to 30 days after your receipt of the notice. 2868 Termination of your rights under this section does not terminate the licenses 2869 of parties who have received copies or rights from you under this License. If 2870 your rights have been terminated and not permanently reinstated, you do 2871 not qualify to receive new licenses for the same material under section 10. 2872 9. Acceptance Not Required for Having Copies. 2873 You are not required to accept this License in order to receive or run a copy 2874 of the Program. Ancillary propagation of a covered work occurring solely as 2875 a consequence of using peer-to-peer transmission to receive a copy likewise 2876 does not require acceptance. However, nothing other than this License 2877 grants you permission to propagate or modify any covered work. These 167
  • 168.
    Bayanihan Linux 5 Appendix A. GNU GPL 2878 actions infringe copyright if you do not accept this License. Therefore, by 2879 modifying or propagating a covered work, you indicate your acceptance of 2880 this License to do so. 2881 10. Automatic Licensing of Downstream Recipients. 2882 Each time you convey a covered work, the recipient automatically receives a 2883 license from the original licensors, to run, modify and propagate that work, 2884 subject to this License. You are not responsible for enforcing compliance by 2885 third parties with this License. 2886 An “entity transaction” is a transaction transferring control of an organi- 2887 zation, or substantially all assets of one, or subdividing an organization, or 2888 merging organizations. If propagation of a covered work results from an 2889 entity transaction, each party to that transaction who receives a copy of 2890 the work also receives whatever licenses to the work the party’s predecessor 2891 in interest had or could give under the previous paragraph, plus a right to 2892 possession of the Corresponding Source of the work from the predecessor in 2893 interest, if the predecessor has it or can get it with reasonable efforts. 2894 You may not impose any further restrictions on the exercise of the rights 2895 granted or affirmed under this License. For example, you may not impose 2896 a license fee, royalty, or other charge for exercise of rights granted under 2897 this License, and you may not initiate litigation (including a cross-claim or 2898 counterclaim in a lawsuit) alleging that any patent claim is infringed by 2899 making, using, selling, offering for sale, or importing the Program or any 2900 portion of it. 2901 11. Patents. 2902 A “contributor” is a copyright holder who authorizes use under this License 2903 of the Program or a work on which the Program is based. The work thus 2904 licensed is called the contributor’s “contributor version”. 2905 A contributor’s “essential patent claims” are all patent claims owned or con- 2906 trolled by the contributor, whether already acquired or hereafter acquired, 2907 that would be infringed by some manner, permitted by this License, of mak- 2908 ing, using, or selling its contributor version, but do not include claims that 2909 would be infringed only as a consequence of further modification of the con- 2910 tributor version. For purposes of this definition, “control” includes the right 2911 to grant patent sublicenses in a manner consistent with the requirements of 2912 this License. 2913 Each contributor grants you a non-exclusive, worldwide, royalty-free patent 2914 license under the contributor’s essential patent claims, to make, use, sell, 2915 offer for sale, import and otherwise run, modify and propagate the contents 2916 of its contributor version. 2917 In the following three paragraphs, a “patent license” is any express agree- 2918 ment or commitment, however denominated, not to enforce a patent (such 168
  • 169.
    Appendix A. GNUGPL Bayanihan Linux 5 2919 as an express permission to practice a patent or covenant not to sue for 2920 patent infringement). To “grant” such a patent license to a party means to 2921 make such an agreement or commitment not to enforce a patent against the 2922 party. 2923 If you convey a covered work, knowingly relying on a patent license, and the 2924 Corresponding Source of the work is not available for anyone to copy, free 2925 of charge and under the terms of this License, through a publicly available 2926 network server or other readily accessible means, then you must either (1) 2927 cause the Corresponding Source to be so available, or (2) arrange to deprive 2928 yourself of the benefit of the patent license for this particular work, or (3) 2929 arrange, in a manner consistent with the requirements of this License, to 2930 extend the patent license to downstream recipients. “Knowingly relying” 2931 means you have actual knowledge that, but for the patent license, your 2932 conveying the covered work in a country, or your recipient’s use of the 2933 covered work in a country, would infringe one or more identifiable patents 2934 in that country that you have reason to believe are valid. 2935 If, pursuant to or in connection with a single transaction or arrangement, 2936 you convey, or propagate by procuring conveyance of, a covered work, and 2937 grant a patent license to some of the parties receiving the covered work 2938 authorizing them to use, propagate, modify or convey a specific copy of the 2939 covered work, then the patent license you grant is automatically extended 2940 to all recipients of the covered work and works based on it. 2941 A patent license is “discriminatory” if it does not include within the scope of 2942 its coverage, prohibits the exercise of, or is conditioned on the non-exercise 2943 of one or more of the rights that are specifically granted under this License. 2944 You may not convey a covered work if you are a party to an arrangement 2945 with a third party that is in the business of distributing software, under 2946 which you make payment to the third party based on the extent of your 2947 activity of conveying the work, and under which the third party grants, 2948 to any of the parties who would receive the covered work from you, a dis- 2949 criminatory patent license (a) in connection with copies of the covered work 2950 conveyed by you (or copies made from those copies), or (b) primarily for and 2951 in connection with specific products or compilations that contain the cov- 2952 ered work, unless you entered into that arrangement, or that patent license 2953 was granted, prior to 28 March 2007. 2954 Nothing in this License shall be construed as excluding or limiting any 2955 implied license or other defenses to infringement that may otherwise be 2956 available to you under applicable patent law. 2957 12. No Surrender of Others’ Freedom. 2958 If conditions are imposed on you (whether by court order, agreement or 2959 otherwise) that contradict the conditions of this License, they do not excuse 2960 you from the conditions of this License. If you cannot convey a covered 169
  • 170.
    Bayanihan Linux 5 Appendix A. GNU GPL 2961 work so as to satisfy simultaneously your obligations under this License and 2962 any other pertinent obligations, then as a consequence you may not convey 2963 it at all. For example, if you agree to terms that obligate you to collect a 2964 royalty for further conveying from those to whom you convey the Program, 2965 the only way you could satisfy both those terms and this License would be 2966 to refrain entirely from conveying the Program. 2967 13. Use with the GNU Affero General Public License. 2968 Notwithstanding any other provision of this License, you have permission 2969 to link or combine any covered work with a work licensed under version 3 2970 of the GNU Affero General Public License into a single combined work, and 2971 to convey the resulting work. The terms of this License will continue to 2972 apply to the part which is the covered work, but the special requirements of 2973 the GNU Affero General Public License, section 13, concerning interaction 2974 through a network will apply to the combination as such. 2975 14. Revised Versions of this License. 2976 The Free Software Foundation may publish revised and/or new versions of 2977 the GNU General Public License from time to time. Such new versions will 2978 be similar in spirit to the present version, but may differ in detail to address 2979 new problems or concerns. 2980 Each version is given a distinguishing version number. If the Program spec- 2981 ifies that a certain numbered version of the GNU General Public License 2982 “or any later version” applies to it, you have the option of following the 2983 terms and conditions either of that numbered version or of any later version 2984 published by the Free Software Foundation. If the Program does not specify 2985 a version number of the GNU General Public License, you may choose any 2986 version ever published by the Free Software Foundation. 2987 If the Program specifies that a proxy can decide which future versions of the 2988 GNU General Public License can be used, that proxy’s public statement of 2989 acceptance of a version permanently authorizes you to choose that version 2990 for the Program. 2991 Later license versions may give you additional or different permissions. How- 2992 ever, no additional obligations are imposed on any author or copyright 2993 holder as a result of your choosing to follow a later version. 2994 15. Disclaimer of Warranty. 2995 THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT 2996 PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE 2997 STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER 2998 PARTIES PROVIDE THE PROGRAM “AS IS” WITHOUT WARRANTY 2999 OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, 170
  • 171.
    Appendix A. GNUGPL Bayanihan Linux 5 3000 BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER- 3001 CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. 3002 THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF 3003 THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE 3004 DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SER- 3005 VICING, REPAIR OR CORRECTION. 3006 16. Limitation of Liability. 3007 IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED 3008 TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER 3009 PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM AS 3010 PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUD- 3011 ING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL 3012 DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE 3013 PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR 3014 DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED 3015 BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM 3016 TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH 3017 HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POS- 3018 SIBILITY OF SUCH DAMAGES. 3019 17. Interpretation of Sections 15 and 16. 3020 If the disclaimer of warranty and limitation of liability provided above can- 3021 not be given local legal effect according to their terms, reviewing courts shall 3022 apply local law that most closely approximates an absolute waiver of all civil 3023 liability in connection with the Program, unless a warranty or assumption 3024 of liability accompanies a copy of the Program in return for a fee. 3025 End of Terms and Conditions 3026 How to Apply These Terms to Your New Programs 3027 If you develop a new program, and you want it to be of the greatest possible 3028 use to the public, the best way to achieve this is to make it free software 3029 which everyone can redistribute and change under these terms. 3030 To do so, attach the following notices to the program. It is safest to attach 3031 them to the start of each source file to most effectively state the exclusion 3032 of warranty; and each file should have at least the “copyright” line and a 3033 pointer to where the full notice is found. 3034 <one line to give the program’s name and a brief idea of what it does.> 3035 3036 Copyright (C) <textyear> <name of author> 3037 171
  • 172.
    Bayanihan Linux 5 Appendix A. GNU GPL 3038 This program is free software: you can redistribute it and/or modify 3039 it under the terms of the GNU General Public License as published by 3040 the Free Software Foundation, either version 3 of the License, or 3041 (at your option) any later version. 3042 3043 This program is distributed in the hope that it will be useful, 3044 but WITHOUT ANY WARRANTY; without even the implied warranty of 3045 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 3046 GNU General Public License for more details. 3047 3048 You should have received a copy of the GNU General Public License 3049 along with this program. If not, see <http://www.gnu.org/licenses/>. 3050 Also add information on how to contact you by electronic and paper mail. 3051 If the program does terminal interaction, make it output a short notice like 3052 this when it starts in an interactive mode: 3053 <program> Copyright (C) <year> <name of author> 3054 3055 This program comes with ABSOLUTELY NO WARRANTY; for details type ‘show w’. 3056 This is free software, and you are welcome to redistribute it 3057 under certain conditions; type ‘show c’ for details. 3058 The hypothetical commands show w and show c should show the appropri- 3059 ate parts of the General Public License. Of course, your program’s com- 3060 mands might be different; for a GUI interface, you would use an “about 3061 box”. 3062 You should also get your employer (if you work as a programmer) or school, 3063 if any, to sign a “copyright disclaimer” for the program, if necessary. For 3064 more information on this, and how to apply and follow the GNU GPL, see 3065 http://www.gnu.org/licenses/. 3066 The GNU General Public License does not permit incorporating your pro- 3067 gram into proprietary programs. If your program is a subroutine library, 3068 you may consider it more useful to permit linking proprietary applica- 3069 tions with the library. If this is what you want to do, use the GNU 3070 Lesser General Public License instead of this License. But first, please read 3071 http://www.gnu.org/philosophy/why-not-lgpl.html. 172
  • 173.
    3072 BIBLIOGRAPHY 3073 [1] jack. Get to Know Linux: File System Hierarchy. 3074 Martin Brinkmann, http://www.ghacks.net/2008/12/11/ 3075 get-to-know-linux-file-system-hierarchy/, 2005-2008. 3076 [2] GNU Free Documentation License. Filesystem Hierarchy Standard. Wikimedia 3077 Foundation, Inc, http://en.wikipedia.org/wiki/Filesystem_Hierarchy_ 3078 Standard, January 22, 2009. 3079 [3] PAT. Linux filesystem heirarchy - the fun easy way. Ravi, http://linuxhelp. 3080 blogspot.com/2008/05/linux-file-system-hierarchy-fun-easy.html, 3081 May 04, 2008. 3082 [4] Bob Rankin. How Does The Linux File System Work? Bob Rankin, http: 3083 //lowfatlinux.com/linux-files.html, 2009. 3084 [5] Pamela Roberts. The Konqueror Handbook. Erwan Loisant, Pamela 3085 Roberts, http://docs.kde.org/stable/en/kdebase-apps/konqueror/ 3086 filemanager.html#dirfolders, 2000, 2002. 3087 [6] Mayank Sarup. The Linux filesystem explained. FreeOS Technologies (I) Pvt. 3088 Ltd., http://www.freeos.com/articles/3102/, 1998-2004. 3089 [7] Andrew Solomon. Filesystem Basics. Linux Config Wiki, http://www. 3090 linuxconfig.org/Filesystem_Basics, March 13, 2008. 3091 [8] Debian Installer Team. Debian GNU/Linux Installation Guide. Debian In- 3092 staller team, http://www.debian.org/releases/lenny/i386/, 2004, 2005, 3093 2006, 2007, 2008. 173
  • 174.
    INDEX 3094 addgroup, 114 3122 files, 25 3095 adduser, 113 3123 Filesystem Hierarchy Standard, 42 3096 Amarok, 99 3124 find, 117 3097 applications, 95 3125 folder, 26 3098 audio, 105 3126 hidden, 31 3099 automount, 32 3127 folders, 25 3100 Blender, 94 3128 grep, 117 3101 burning, 104 3129 growisofs, 104 3130 GUI, 107 3102 capture, 102 3103 cat, 116 3131 home, 26 3104 CD, 104, 105 3105 cd, 108 3132 Inkscape, 93 3106 cdrdao, 104 3107 chgrp, 116 3133 K3b, 104 3108 chmod, 115 3134 KDE, 26 3109 chown, 115 3135 keyboard, 25 3110 console, 107, 137 3136 kfind, 31 3111 copying, 33 3137 KMix, 100 3112 cp, 110 3138 Konqueror, 25–27 3139 Menubar, 33 3113 delete, 33 3140 KRec, 101 3114 delgroup, 114 3141 KsCD, 100 3115 deluser, 114 3116 df, 111 3142 less, 116 3117 directory, 26 3143 Linux, 25 3118 drag, 34 3144 ls, 108 3119 du, 111 3120 DVD, 104 3145 mc, 121 3146 mkdir, 109 3121 filemanager, 25 3147 mount, 112 174
  • 175.
    Index Bayanihan Linux 5 3148 movie, 102 3149 movie player, 102 3150 moving, 33 3151 mp3, 105 3152 MPlayer, 102 3153 nano, 120 3154 navigate, 26, 30, 34 3155 ogg, 105 3156 packages, 123 3157 partitions, 26 3158 path, 26, 27 3159 pipe, 118 3160 pmount, 113 3161 pumount, 113 3162 Qt, 138 3163 record, 101, 102 3164 removable, 32 3165 ripper, 105 3166 rm, 110 3167 rmdir, 109 3168 sed, 118 3169 software, 123 3170 soundcard, 100 3171 Super User, 40 3172 Synaptic, 123 3173 taskbar, 26 3174 terminal, 107 3175 trash, 32 3176 umount, 113 3177 unmount, 32 3178 vim, 119 3179 wodim, 104 3180 Xorg, 138 3181 XVidCap, 102 175