Академический Документы
Профессиональный Документы
Культура Документы
com)
Contents
Introduction ................................................................................................................................ 4 A.1 Installing & configuring windows ............................................................................................ 6 Start the installation ........................................................................................................................... 6 Partition the hard drive(s)................................................................................................................... 7 Basic Settings .................................................................................................................................... 10 Formatting the second partition ....................................................................................................... 20 A.2 Setting up Automatic Updates and Anti-virus protection ....................................................... 21 Installing updates .............................................................................................................................. 21 Installing Microsoft Security Essentials............................................................................................. 24 Configuring daily scans ..................................................................................................................... 27 Enabling the Firewall......................................................................................................................... 28 A.3 Users, Groups & Security ...................................................................................................... 30 Setting up user accounts ................................................................................................................... 30 Setting up groups .............................................................................................................................. 32 User file storage ................................................................................................................................ 34 Security and Sharing files & folders .................................................................................................. 35 Blocking websites .............................................................................................................................. 40 A.4 Remote Connectivity ............................................................................................................ 43 Enabling remote desktop .................................................................................................................. 43 Changing connection port ................................................................................................................. 44 Editing firewall settings ..................................................................................................................... 46 A.5 Networking .......................................................................................................................... 48 Setting static IP in Windows XP ........................................................................................................ 48 Setting static IP in Debian ................................................................................................................. 50 Testing the connection ..................................................................................................................... 52 A.6 Performance enhancement .................................................................................................. 53 Benchmarking the system................................................................................................................. 53 Editing the Paging file ....................................................................................................................... 56 Retesting the system......................................................................................................................... 58 A.7 Outlook Express Email Accounts ........................................................................................... 59 Setting up an account ....................................................................................................................... 59 A.8 System restore ..................................................................................................................... 63 Creating a restore point .................................................................................................................... 63 Making changes to the system ......................................................................................................... 65 Restore the system ........................................................................................................................... 69 Testing the result .............................................................................................................................. 70 2
James McDermott (jamesmcd05@gmail.com) A.9 System registry .................................................................................................................... 71 Backing up the registry ..................................................................................................................... 71 A.10 Driver compatibility ........................................................................................................... 74 Restricting driver installation ............................................................................................................ 74 B.1 Installing Debian .................................................................................................................. 77 B.2 Web servers ......................................................................................................................... 83 Installing apache webserver on Debian ............................................................................................ 83 Enabling IIS on Windows XP .............................................................................................................. 85 File hosting on Windows or Linux? ................................................................................................... 89 B.3 Setting up Users and Groups ................................................................................................. 90 Setting up user accounts ................................................................................................................... 90 Setting up groups .............................................................................................................................. 92 B.4 Installing software on Debian ............................................................................................... 94 Installing Tunderbird Email Mail Client ............................................................................................. 94 Installing a Firewall ......................................................................................................................... 101 Installing image editing software .................................................................................................... 105 Installing Anti-virus ......................................................................................................................... 107 References............................................................................................................................... 111
Introduction
This guide will demonstrate the installation and configuration of two different operating systems (OS). It is intended to give a good overview of the basic setup and features available in both Microsoft Windows XP Professional and Debian 6.0.6 (Linux). The guide is divided into two sections, section A and section B. Section A deals primarily with the Windows installation and will cover the following topics: i. ii. iii. iv. v. vi. vii. viii. ix. x. Installing & configuring windows Setting up Automatic Updates and Anti-virus protection Users, Groups & Security Remote Connectivity Networking Performance enhancement Outlook Express Email Accounts System restore System registry Driver compatibility
Section B deals primarily with the Debian installation and will cover the following topics: i. ii. iii. iv. Installing Debian Web servers Setting up Users and Groups Installing software on Debian
The guide is aimed at people with a basic understanding of computers, with this in mind there are some terms and annotations that need to be understood. For ease of reading this document uses to demonstrate proceed to next option e.g. Start My Computer means click on Start, then click on My Computer. In some cases right clicking the mouse will be necessary, in these cases (Right Click) is used e.g. Start My Computer (Right Click) Properties The term default installation indicates to software can be installed by repeatidly clicking Next (or Forward) until finished.
SECTION A:
Windows XP Professional
The disk will now load Windows setup. Firstly to install any operating system/software you must agree to the licensing agreement 3. Press F8 key to agree to the licensing agreement (See Figure 2: Licensing agreement)
Here we are going to set up two partitions; one for the operating system (OS) and the other for user data storage. This can help with data security and OS stability as it keeps the OS files separate from user files. 2. Set the size of the first partition to 11GB (11000MB), press Enter. (See Figure 4: Partitioning drive 1)
James McDermott (jamesmcd05@gmail.com) Now we will create the second (user data) partition. 3. To create the second partition, highlight Unpartitioned Space (press down arrow) and press C (Figure 5: Partitioning Drive 2) Set the size of the second partition to the maximum available and hit Enter.
Now windows must format the C: partition in order install windows. Formatting defines the file system of the partition. Basically, it tells the OS how information is stored on the partition. Different file systems will have different features, compatibilities and functions. It is advisable to consider what tools and functions will be needed of the drive before formatting. This system will require that the OS partition is accessible by different operating systems and MS-DOS (Microsoft DOS) tools. For this reason FAT32 (File Allocation Table 32bit) is the best file system, as NTFS is not accessible by older versions of windows or MS-DOS tools (Bott, Siechert & Stinson, 2005). 4. At the partition window highlight C: Partition1 and press Enter (See Figure 6: Selecting C: Drive)
James McDermott (jamesmcd05@gmail.com) 5. Highlight FAT file system from the bottom of the list. Press Enter. (See Figure 7: Format to FAT File System)
6. Windows will format the drive and restart automatically to continue installation. (See Figure 8: Windows Installation)
Basic Settings
During the installation you will be prompted to configure some windows setting including registration, network and regional and language options. This will configure what language the operating system will run in and what inputs it will accept. It will also define what charcaters will be displayed e.g. Chinese, Roman, Arabic etc. Note: these settings are based on the computers region and keyboard layout. Use whatever settings are appropriate for the system you are setting up. 7. Regional and Language Options: a. Select Customize from the regional and Langugae options window (See Figure 9: Regional and Language Options)
10
James McDermott (jamesmcd05@gmail.com) b. In the regional options tab select English (Ireland) from the Standards and formats dropdown and choose Ireland from the Location dropdown. (See Figure 10: Langauge and Fomat Settings)
c. Select the Advanced tab from the top of the window. Choose English (Ireland) from the Program and Non-Unicode settings. Click OK Unicode is a method of representing characters in digital format. It uses a standardised coding system that can be understood by many different systems. Non-unicode characters are chararacters that have not been defined by unicode (Lindenberg, 2008). These characters can be displayed based on language settings. This is set up during installation. (See Figure 11: Advanced Language Settings)
11
James McDermott (jamesmcd05@gmail.com) d. Select Details from the Regional and Language Options (See Figure 12: Details option). Here the keyboard layout is set up.
8. If your keyboard layout is not listed in the main window pane select Add (See Figure 13: Add Keyboard Language).
12
James McDermott (jamesmcd05@gmail.com) Select Input Language and Keyboard Layout settings from the pop up window. Click OK (See Figure 14: Add Input Language Window)
9. Select the correct input language from the dropdown menu under Default input language.
Click OK, and then Click Next at the Regional and Language Options.
13
James McDermott (jamesmcd05@gmail.com) 10. Registration Details: a. Enter your name in the Name: field and click Next
b. Enter the Windows product key (usually located on the back of the windows disk cover). Click next.
14
James McDermott (jamesmcd05@gmail.com) c. Set date and time information. Choose the computers time zone from the dropdown. Press Next
11. Network and Workgroup Options: a. On the Network Settings select window click Next
15
James McDermott (jamesmcd05@gmail.com) b. Assign the computer to a workgroup Select No, this computer is not on a network... Type WORKGROUP J-MCD into the field, then click Next
Windows now will start. 12. Windows by default has some drivers preinstalled in order to facilitate installation. As it uses a generic video driver it will prompt you to make sure that the driver it is working works.
16
James McDermott (jamesmcd05@gmail.com) 13. Next Windows will set up the basic settings: a. Click Next on the Welcome to Microsoft Windows page. b. Turn on Automatic Updates and click Next
Windows will now check for an internet connection to configure internet connections. Click Next c. Set up computer to connect directly to the internet and click Next
You can now choose to register with Microsoft online. Then click Next.
17
James McDermott (jamesmcd05@gmail.com) d. Set up user accounts. Enter the name of all users and click Next
Windows desktop will now load. 14. Change computer name a. Click on the start button (bottom left of the screen) b. Select My Computer by right clicking with the mouse. Select Properties.
18
James McDermott (jamesmcd05@gmail.com) c. The system properties window will pop up. Select the Computer Name tab from the top of the window
Select Change. d. In the Computer Name Changes window type a name into the Computer Name field. Click OK until each window is closed.
Windows will prompt for a restart to make these changes. Click OK and allow the restart. 19
3. Select Format The Format window will appear. This drive will use file and folder security and sharing. File level security is only available in NTFS; therefore this drive should be formatted to NTFS. 4. Select NTFS from the file system dropdown and select Start
There are now two hard drives formatted to different file systems.
20
Installing updates
Automatic updates should be set up from the installation, however sometimes you may want to manually install updates. To do this: 1. Go to Start My Computer (Right Click) Properties (See Figure 1: System properties option)
2. On the System Properties window select the Automatic Updates tab at the top of the window. Ensure Automatic is selected. Then click on Windows Update Web site (See Figure 2: System Properties Automatic Updates).
21
James McDermott (jamesmcd05@gmail.com) 3. The internet browser will now open and go to the windows update web page. When prompted to install windows update software click Instal (See Figure 3: Security Warning)
4. After installation the web page will load completely. Click Express (See Figure 4: Update site)
5. Click Download and Install Now at the bottom of the next page (See Figure 5: Download and Install option)
22
James McDermott (jamesmcd05@gmail.com) 6. Updates will now install (See Figure 6: Updates Installation)
7. When installation completes click Restart Now (See Figure 7: Updates install complete).
23
4. Select the top link from the search results Download Microsoft Security Essentials. (See Figure 9: Search Results)
5. Select the correct version for the operating system 32bit (x86) or 64bit. (See Figure 10: Download version)
24
James McDermott (jamesmcd05@gmail.com) 6. Select Run on the security warning windows (there are two security warnings). (See Figure 11: Open file security warning)
7. Click Next then click I accept to the licensing agreement window. (See Figure 12: Security Essentials Licensing Agreement)
Next you can opt to send user statistics to Microsoft or not. Click Next after selecting an option.
25
James McDermott (jamesmcd05@gmail.com) 8. On the Optimize security page. Turn on windows firewall and click Next (See Figure 13: Security Essentials Firewall Settings)
9. Click Install on the next page. (See Figure 14: Install option)
When installation is finished check Scan my computer for potential threats..., then click Finish
26
2. On the settings tab click Run a scheduled scan, choose Quick Scan from the Scan Type Select the day and time from the next dropdowns. E.g. Monday at 3:00. Click Save Changes (See Figure 16: Security Essentials Settings)
27
The layout of the right panel will change. 2. Select Windows Firewall (See Figure 18: Windows Firewall Option)
28
James McDermott (jamesmcd05@gmail.com) 3. On the Windows Firewall window. Select On then click OK (See Figure 19: Firewall Settings)
The Windows firewall is now enabled. Note that there are tabs at the top of the firewall windows, this allows for further configuration of the firewall if needed.
29
Lets set up user accounts and groups for the following users. Name Samantha Grace Rachel Mathews Sam Smith Paul Daniels Stephanie Brown Francis Brennan Username s.grace r.mathews s.smith p.daniels s.brown f.brennan
Table 1: User account details
30
James McDermott (jamesmcd05@gmail.com) 4. Enter the user details into the New User window. Make sure Account is Disabled and User must change password on next logon are unchecked (See Figure 2: New User Details). Set a password for each user.
5. In the left panel of the Computer Management window select Groups (See Figure 3: Groups Settings)
31
James McDermott (jamesmcd05@gmail.com) We are now going to set up a group for each department i.e. IS, Finance and HR
Setting up groups
Now that we have all the user accounts set up, we will assign them to groups based on Department (See Setting up user accounts - Table 1: Users account details) 1. On the right pane of the Computer Management window (with groups selected). Right click and choose New Group (See Figure 4: Add New Group)
2. Enter the Group Name and Description in the New Group window (See Figure 5: New Group Window). 3. Click Add to add users to this group.
32
4. Type the username you want to add to the group. The click OK (See Figure 6: Add User to Group).
Do this for all users and groups. Add s.grace to the administrative group. 5. Back the Computer management window. Right click on Administrators and choose Add to Group. On the Admisitrators Properties window click Add (See Figure 7: Add to Group). Repeat step 4 to add s.grace to the administrators group.
33
2. Right click and select New Folder Create a folder for each department listed in step 3 of Setting up user accounts. (See Figure 9: Group Folders)
3. Create a folder for each user in their relevant department folder (See Figure 10: User folders)
34
2. Select the View tab in the Folder Options window (See Figure 12: View Folder Options)
3. Scroll to the bottom of the Advanced Settings menu and uncheck Use Simple File Sharing. Click OK (See Figure 13: Set advanced sharing)
35
Figure 13: Set Advanced Sharing
1. Go to Start My Computer Local Disk (E: ). Right click on a department folder and select Sharing and Security (See Figure 12: Sharing and Security).
2. In the folder properties window select the Sharing tab from the top of the window. Select Share this folder and click Apply (See Figure 13: Folder Sharing)
36
James McDermott (jamesmcd05@gmail.com) We will now set up security on the folders. By default files and folders inherit their settings from the upper level folders. To allow files and folders to ignore parent restrictions we must changed the advance security settings. 3. Select the Security tab, then click Advanced (See Figure 14: Folder Security Properties)
4. On the Advanced Security Settings window uncheck Inherit from parent the permission.., then click Copy in the security window. Press OK (See Figure 15: Remove inheritance)
37
James McDermott (jamesmcd05@gmail.com) 5. At the Folder properties window, on the Security tab. Select the all user names and groups (except Administrators) from Group or user names window and choose Remove Add the department Group associated with that folder to allow permissions and access. 6. Click Add and then type the group name into the users or groups window e.g. finance (See Figure 16: Opening Users and Groups Window)
7. Set the permissions by checking Allow or Deny and then pressing OK. Here we set the finance group to Read, List Folder Contents and Read & Execute (See Figure 17: Setting Permissions)
38
James McDermott (jamesmcd05@gmail.com) Repeat this process for each department folder. Once this is done, only the administrators and members of the folders group will have access. Now that we have set the folder permissions for the department level folders . The user subfolders must be restricted so that only the administrators and individual users will hav access to them. 8. Set the permissions for the user subfolders using the same method as setting permissions to the department folders. i.e. Only s.smith and Administrators can access Samantha Smiths folder (See Figure 18: User Folder Restrictions)
Files and folders should now have restricted access set up. To test this, log out and log back in as a user with a restricted account. Note: As the s.smith account is administrator, this user will have access to all files and folders on the data drive.
39
Blocking websites
There may be times when you will need to block access to websites, this can be on a home computer (to enforce parental guidance) or on a business machine to block recreational use. The simplest way to universally block access to websites is to edit the host file. The host file is used when browsing the web, it is like an address book, when you seach for a website, if the address is not contained in the website the query is sent to the Internet Service Provider (ISP) (Kishore, 2010). To block access to a website we simply add the address to the systems host file and redirect the traffic to the local host. 1. Open the host file by navigating to C:\Windows\system32\drivers\etc 2. Right click on the hosts file and choose Open (See Figure 19: Opening the Hosts file)
3. In the Open with window, choose Notepad, then click OK (See Figure 20: Open with Notepad)
40
James McDermott (jamesmcd05@gmail.com) 4. When the file opens naviagate to the bottom and append it to read: 127.0.0.1 sitename.com 127.0.0.1 www.sitename.com When you have added all desired sites, go to File Save. Close the file. In this guide we block three social media sites, Facebook, Twitter and Myspace (See Figure 21: Edited host file).
5. As editing the host file may be a security risk you may be prompted by antivirus software to allow or deny the change. Choose Allow (See Figure 22: Security Essentials Alert)
41
James McDermott (jamesmcd05@gmail.com) 6. Verify blocking was successful by opening an internet browser and navigating to one of the blocked addresses. If it was successful you should see a Page cannot be displayed message (See Figure 23: Blocked website)
42
2. Click on the Remote tab at the top of the System Properties window. Then click Allow users to connect remotely to this computer (See Figure 2: System Properties Remote Desktop tab)
43
44
James McDermott (jamesmcd05@gmail.com) 3. In the find window type RDP-TCP. It should be located in HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\TerminalServer\WinStations\R DP-Tcp\PortNumber (See Figure 5: Finding RDP-Tcp settings)
4. Right click PortNumber from the right panel and choose Modify (See Figure 6: RDP port number key)
5. Select Decimal and then change the Value data field to the new port number. E.g. 4480. Click OK (See Figure 7: Changing port number)
45
2. Uncheck Remote Desktop to close the standard remote desktop port. Next select Add Port.. (See Figure 9: Add Port to windws firewall)
46
James McDermott (jamesmcd05@gmail.com) 3. In the Add a Port window, enter the name of the new open port, and enter the port number. E.g. RDP and 4480. Then click OK (See Figure 10: Add a Port window)
Windows firewall will now allow connections through port 4480. When a remote client tries to connect to remote desktop it will need to specifiy port 4480 to get access.
47
A.5 Networking
Networking allows machines to communicate to each other and share resources. Information is directed to and from computers by using IP (Internet Protocol) addresses to idetify each other (Meyers, 2012). Today the majority of computers we use are networked (the internet being one big network). To communicate between two machines two things are needed: 1. Both machines must be on the same network 2. The IP addresses of both machines must be known Once both machines are connected to the same network the easiest way of communicating between then is to set a static ip on each machine and communicate directly with that IP.
3. Right click on the machines Connected network connection. Click Properties (See Figure 2: Connection Properties)
48
James McDermott (jamesmcd05@gmail.com) 4. In the Connection Properties window, select TCP/IP and click Properties (See Figure 3: Set connection properties)
5. On the TCP/IP Properties window choose Uses the following IP Address The IP address is the address of your machine, the default gateway is the router address. The DNS is the domain name server, it is usually the same address as the default gateway. (See Figure 4: TCP/IP Settings)
49
James McDermott (jamesmcd05@gmail.com) Windows now has a static IP (in this example is is 192.168.0.51). Now lets set up a static IP on our debian system.
2. In terminal privlages must be elevated to allow system changes to be made. To do this type su. You will be prompted to enter the administrator (root) password. Type the password and press Enter. Note: it will not look like anything is typing in terminal as the password is hidden whilst being typed. 3. Now we must open the network interfaces (network settings) file. To do this we use an inbuilt terminal file editor called nano. Type nano /etc/network/interfaces and press Enter (See Figure 6: Opening file in Nano)
50
4. Alter the file as in Figure 7: Static IP settings. Use the IP addresses for your network
5. To exit out of nano editor press Ctrl and X. When prompted (at the bottom of the screen) type Y to save the changes. Then press Enter to exit out of the file. 6. Now we must restart the network connection to apply the settings. Back in the terminal window type /etc/init.d/networking restart (See Figure 8: Restarting Network)
The debian machine now has a static IP. (192.168.0.50 in this example)
51
Both machines can now communicate statically. Benefits of Dynamic IP over Static In some cases static IP addresses may not be available to our systems. The router gives out an IP to all the machines connected to it. In some cases if an IP address has been reused or is being used by another machine, machines with a static IP may lose connectivity. Dynamic IPs are generally the default setup for computers today (Simpson, 2005). This allows the machine to accept any IP address that it has been assigned. It is the best setting for netbooks as they often connect to a variety of networks and cannot garuntee that the static IP address requested will be available.
52
53
James McDermott (jamesmcd05@gmail.com) 3. When the security warning window appears click Run. Follow the setup steps and click I accept the agreement then click next. Follow the default installation process (Figure 2: Novabench license agreement)
Continue to click Next then click Install (Figure 3: Novabench install window).
54
James McDermott (jamesmcd05@gmail.com) Run NovaBench to benchmark the system. 4. Go to Start All Programs NovaBench NovaBench (See Figure 4: Novabench start window)
5. Click Start Benchmark Tests. Click OK to the message popup. Leave the test to run. Do not use the machine. Note the results when process finishes and click Close. (See Figure 5: Novabench results page)
55
56
James McDermott (jamesmcd05@gmail.com) 3. Highlight the C: option and then choose No paging file and click Set (See Figure 7: Removing paging file from C: )
4. Select E: choose Custom size and enter a value in the two fields below. E.g. 384. Click OK (See Figure: 8: Moving paging file to second hard drive).
57
58
Setting up an account
To set up an email account in outlook express: 1. Go to StartE-mail (See Figure 1: Start menu Email option)
Microsoft Outlook Express will now start. If you are prompted to enter settings on start up, skip to step 4.
59
James McDermott (jamesmcd05@gmail.com) 2. Go to Tools Accounts (See Figure 2: Outlook Express Accounts option)
60
James McDermott (jamesmcd05@gmail.com) 4. Enter in the account display name and click Next. E.g. enter Samantha Grace. Click Next (See Figure 4: Display Name window)
5. Enter the email server details. E.g. enter mail1.pretendacc.com in both fields Then click Next (See Figure 5: Mail Server Settings)
61
James McDermott (jamesmcd05@gmail.com) 6. Enter in account email address. E.g. s.grace@pretendacc.com. Then click Next 7. (See Figure 6: Email address setting)
8. Enter in account login details. E.g. s.grace. Then click Next (See Figure 7: User login details)
62
63
James McDermott (jamesmcd05@gmail.com) 2. When the System Restore window opens select Create a restore point then click Next (See Figure 2: System restore window)
3. Name the restore point First Restore and then click Create (See Figure 3: Restore point description window)
64
65
b. Right click and select New Folder and name it backup (See Figure 5: Backup Folder)
2. Disable the floppy drive. a. Go to Start My Computer (Right Click) Manage The computer management window will appear. b. From the left hand panel choose Device Manager (See Figure 6: Device Manager) This will display a list of all devices that are installed on the computer
66
James McDermott (jamesmcd05@gmail.com) c. Select Floppy Disk Drives from the left hand pain. The menu will expand. Right click on the Floppy Disk Drive and select Disable (See Figure 7: Disable Floppy disk drive)
Close all windows. The floppy drive should now be disabled. This can be verified by checking in My Computer there should be no floppy drive present. 3. Change the name of the PC a. Go to Start My Computer (Right click) Properties The system properties window will appear. Select Computer Name from the tabs at the top of the window. (See Figure 8: System properties window)
67
James McDermott (jamesmcd05@gmail.com) b. Select Change. The computer name change window will appear. Type mc1 in the computer name field, then click OK (See Figure 9: Computer Name Window)
c. Click OK on each window to close. You will be prompted to restart. Click Yes The computer will restart and apply the new computer name
68
3. Next select the restore point created earlier (First Restore) from the list in the right pane. Click Next. Windows will now restore to the previous state and restart. (See Figure 11: Restore point window)
69
70
71
James McDermott (jamesmcd05@gmail.com) 3. Click File Export (See Figure 2: Exporting registry)
4. Navigate to the Registry Backup folder on the desktop. Type reg-export in the File name field and click Save (See Figure 3: Save export file)
72
James McDermott (jamesmcd05@gmail.com) 5. To verify the export was successful open the Registry Backup folder on the desktop. There should be a file name reg-export (See Figure 4: Exported registry file)
73
74
James McDermott (jamesmcd05@gmail.com) 4. When the Driver Signing Options window appears, click Block Never installed unsigned driver software, and then click OK (See Figure 2: Block unsigned drivers window).
Windows will now only allow signed drivers to be installed to the operating system.
75
SECTION B:
Debian 6.0.6
76
2. Follow a default installation select language, keyboard and location info and click Continue (See Figure 2: Language, keyboard and location setup)
77
James McDermott (jamesmcd05@gmail.com) 3. Configure network setting. Here enter the domain or workgroup name your system will use. I used the same workgroup as in the windows system. (See Figure 3: Debian Network Settings)
4. Set a root (administrative) password. Keep this safe as it will be needed throughout the following tasks. Click continue. (See Figure 4: Root Password)
78
James McDermott (jamesmcd05@gmail.com) 5. Set up user account details enter Full Name, Username and Password. Click Continue. (see Figure 5: Debain user settings)
6. Set up hard drive and partition settings. Select disk and choose Continue. Select All Files in one partition and click continue (See Figure 6: Disk Partitioning)
79
James McDermott (jamesmcd05@gmail.com) 7. Confirm changes by highlighting Finish partitioning and write changes to disk. Click Continue (See Figure 7: Finish Partitioning)
8. Click Yes and then Continue (See Figure 8: Write Changes). Debian will now install.
80
James McDermott (jamesmcd05@gmail.com) 9. You will be prompted to add to you package. Click Use a Network Mirror to add new content to the installation. Choose a connection close to your location in the mirror country section (See Figure 9: Package Manager).
10. Enter in any HTTP proxies if needed. Click Continue 11. Select Yes to Install the GRUB Bootloader to the Master Record, click Continue. 12. Installation will now complete (See Figure 10: Debian Installed)
81
James McDermott (jamesmcd05@gmail.com) Debian will now start up. 13. Log in with the user details set up during the installation. 14. Click the update notification icon at the top of the screen (See Figure 11: Debian update Notifications).
2. In terminal type sudo su. Enter your account password. Then type apt-get install apache2 (See Figure 2: Using terminal)
83
James McDermott (jamesmcd05@gmail.com) Apache will now start download 3. Click Y to confirm the download. (See Figure 3: Confirm download)
4. Restart the machine to apply the new settings. 5. Open the web browser and go to http://localhost/ if your server is installed correctly you will see It Works! web page (See Figure 4: Localhost success page)
84
2. Click on Add/Remove Windows Components window on the left of the Add or Remove (See Figure 6: Add/Remove Windows Components)
85
James McDermott (jamesmcd05@gmail.com) 3. Scroll down and select Internet Information Services (IIS) then click Next. (See Figure 7: Windows Components Wizard)
IIS will now install (See Figure 8: IIS Installation). Insert Windows XP Professional disk if needed.
86
James McDermott (jamesmcd05@gmail.com) 5. After restart go to Start My Computer Local disk (C: ) Intepub wwwroot (See Figure 9: Localhost Directory) This is the root directory for the localhost site
6. Go to Start Control Panel Administrative Tools (See Figure 10: Administrative tools window)
87
James McDermott (jamesmcd05@gmail.com) 7. The Internet Information Services window contains localhost settings including security settings. (See Figure 11: Internet Information Services window)
To test access to the localhost. Create a html file and save it into the root directory of the localhost (See step 6). More information on making a html file: http://www.webmonkey.com/2010/02/make_an_html_document/ 8. Go to Start Internet and type http://localhost/YOURFILE.html . In this example we use a named hello.html (See Figure 12: Testing localhost)
88
89
2. Click Add from the bottom left of the Users and Groups window 3. Enter the root password which was set during installation.. (See Figure 2: Enter Root Password)
90
James McDermott (jamesmcd05@gmail.com) We will use the same account information as we used in A.3 (Table 1: User account details). Remember: Due to linux compatibility issues, usernames must ommit the dot from the name i.e. s.grace = sgrace and so on. 4. Enter in the Name and Short Name (username) of the user. Click OK. Next enter a password and click OK (See Figure 3: Create User)
Do this for all uses listed in A.3, remembering to ommit the dot from the username
91
Setting up groups
1. At the User Settings window click on Manage Groups (See Figure 4: User Settings Window)
2. On the Group Settings window click Add. Enter the root password again (See Figure 5: Group Settings Window).
92
3. Enter the Group name and then check the box beside the members you wish to include in the group (See Figure 6: New Group Setup).
Debian is now configured with the same users and groups as the Windows installation. Debian, like windows can use permissions to secure files and folders (McCarthy, 1999). However this guide will not go into this in detail. For more information on permissions in Debian/Linux check out: http://wiki.debian.org/Permissions
93
Click Thunderbird free Download and wait for download to finish. When the download finishes Debians archive software will open the downloaded file 3. Click Extract to extract the file contents to a directory (Figure 3: Debian archive software) 94
4. Navigate to the home folder of the current user (See Figure 4: User home folder) and select Extract
95
James McDermott (jamesmcd05@gmail.com) 5. Navigate to the home folder and open thunderbird. Select thunderbird (right click) then choose Make Link (See Figure 5: Make Debian link). A link is the same as a shortcut in windows
6. Right click on the new link and select Move to Desktop (See Figure 6: Move link)
96
James McDermott (jamesmcd05@gmail.com) 7. Navigate to the desktop, right click on the Link to thunderbird link and choose Properties (See Figure 7: Link Properties)
8. Change Name: field to Thunderbird, click on the icon logo (See Figure 8: Link Properties settings).
97
James McDermott (jamesmcd05@gmail.com) 9. Navigate to Home (User folder)/Thunderbird/chrome/icons/default and select default256.png, click Open. (See figure 9: Thunderbird Icons)
There should now be a link to Thunderbird on the desktop (See Figure 10: Thunderbird Desktop Link)
98
James McDermott (jamesmcd05@gmail.com) To set Thunderbird to appear in the applications menu 10. Right click on Appliocations ad choose Edit Menus (See Figure 11: Editing debian Menus)
11. Select Internet from the left panel then choose New Item (See Figure 12: New Menu Item)
99
12. Change the icon as in step 8. And then type Thunderbird in the name field. Click Browse, then navigate to the desktop and choose the Thunderbird link. Type a descriptive comment in the Comment field if desired. Click OK (Figure 13: Menu Link Settings)
13. Test both shortcuts to ensure thunderbird launches (See Figure 14: Launching Thunderbird).
More information on installing Thunderbird visit: https://support.mozillamessaging.com/en-US/kb/installing-thunderbird-linux More information on editing GNOME menus visit: http://www.ubuntugeek.com/howto-add-entries-in-gnome-menu.html
100
James McDermott (jamesmcd05@gmail.com) As part of Debian there is an inbuilt software centre, which allows users easily search and install a variety of software. Here this will be used to install firewall software (Firestarter), and a graphic and image editing software (GIMP).
Installing a Firewall
1. On the destop go to System Administration Software Center (See Figure 11: Opening Software Center)
2.
Type Firestarter and press Enter. Then click Install (See Figure 12: Searching for Firestarter)
101
James McDermott (jamesmcd05@gmail.com) 3. On the Anthenticate window enter the root password and click Authenticate (See Figure 13: Root Password Prompt)
4. Run Firestarter by going to Applications Internet Firestarter (See Figure 14: Firestarter in Menu)
102
5. Setup Firestart by clicking Forward on the launch screen, follow a default installation. (See Figure 15: Firestarter Setup)
6. On the device setup screen select IP address is assigned via DHCP, then click forward. (See Figure 15: Network Device Setup)
103
James McDermott (jamesmcd05@gmail.com) Finish installation by checking Start Firewall Now and clicking on Save 7. Firestarter will now start (See Figure 16: Firestarter Main Screen)
104
105
James McDermott (jamesmcd05@gmail.com) 3. Verify the installation was successful by going to Applications Graphics GNU Image Manipulation Program (See Figure 18: Launching GIMP)
106
James McDermott (jamesmcd05@gmail.com) The final method of software installation that we will look at is through the use of deb files. A deb file is an executable file which is designed specifically for debian. To demonstrate this we will install Avast antivirus.
Installing Anti-virus
Just as with Windows it is important to keep the linux environment and network safe. To facilitate this we must install anti-virus software. 1. Open browser and go to www.avast.com/linux-home-edition and select DOWNLOAD (See Figure 19: Downloading Avast)
2. Select the DEB package from the pop up window (See Figure 20: DEB selection)
107
3. When download completes, navigate to Home (User folder)/Download. Right click on Avast4workstation...deb and choose Open with GDebi Package Installer (See Figure 21: Opening file with Gdebi Package Installer)
4. On the Package Installer window click Install Package (See Figure 22: Package Installer)
108
James McDermott (jamesmcd05@gmail.com) 5. Launch Avast by going to Applications Accessories avast! Antivirus 6. You will be prompted to register click Click here to obtain license key (See Figure 23: Register Avast Prompt)
This will launch the avast registration site (See Figure 24: Avast Registration Site)
A registration code will be emailed to the address provided; this can take up to 30 mins. 7. Re-launch Avast and enter the code once received.
109
James McDermott (jamesmcd05@gmail.com) 8. Avast will now launch (See Figure 25: Avast Main Screen).
110
References
Ballew, J. (2005).Hardcore Windows Xp. USA: McGraw-Hill Bott, R., Siechert, C. & Stinson, C. (2005). Microsoft Windows XP Inside Out. Washington: Microsoft Press
Bowen, R. (2002). Apache Administrators Handbook. USA: Sams Publishing
Hunger, S. (2001). Debian GNU/Linux Bible. NY: Hungry Minds Inc. Kishore, A. (2010). Blocking Websites Using the Windows Hosts File. Retrieved February 11th, 2013 from http://helpdeskgeek.com/how-to/block-websites-using-hosts-file/ Laurie, B. & Laurie, P. (2002). Apache The Definitive Guide.Sebastopol: O'Reilly & Associates Lindenberg, N. (2008). Mirgrate to Unicode. Retrieved February 12th, 2013 from http://www.w3.org/International/articles/unicode-migration/ Maor, G. (1997). ADDUSER. Retrieved February 12th, 2013 from http://www.cs.vassar.edu/cgibin/man/man2html?adduser+8 McCarthy, B. (1999). Learning Debian Gnu/Linux. CA: O'Reilly Meyers, M. (2012). All-in-One CompTIA A+ Certification Exam Guide 8th Edition.USA: McGraw-Hill Companies. Nichol, A. (2006). Virtual Memory in Windows XP. Retrieved February 11th, 2013 from http://www.aumha.org/win5/a/xpvm.htm Rathbone, A. (2004). Windows XP For Dummies, Second Edition. NJ: Wiley Publishing, Inc. Simpson, A. (2005). Alan Simpsons Windows XP Bible, Second Edition. Indianapolis: Wiley Publishing Inc.
111