Вы находитесь на странице: 1из 175

Advanced Science & Technology Institute

Bayanihan Linux 5
MANUAL
Bayanihan Linux 5

1 Copyright 2008-2009
c Emman Balintec, Rage Callao, Yvonne Carpo, Pearliezl Dy
2 Tiongco, Mariesonn Florendo, Aileen Cruzado, Russel Baisas. All rights reserved.

3 This document is free; you can redistribute it and/or modify it under the terms of
4 the GNU General Public License as published by the Free Software Foundation; either
5 version 2 of the License, or (at your option) any later version.

6 This document is distributed in the hope that it will be useful, but WITHOUT ANY
7 WARRANTY; without even the implied warranty of MERCHANTABILITY or FIT-
8 NESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
9 more details.

10 You should have received a copy of the GNU General Public License along with this
11 document; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge,
12 MA 02139, USA.

2
13 CONTENTS

14 Preface 7

15 1 Installing the Bayanihan Linux OS 9


16 1.1 Getting the installer . . . . . . . . . . . . . . . . . . . . . . . . . . 9
17 1.2 Checking disc integrity . . . . . . . . . . . . . . . . . . . . . . . . . 10
18 1.3 Advanced Installer Options . . . . . . . . . . . . . . . . . . . . . . 11
19 1.4 Graphical installation guide . . . . . . . . . . . . . . . . . . . . . . 11
20 1.5 First Look . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

21 2 Desktop Overview 21
22 2.1 From power on to desktop . . . . . . . . . . . . . . . . . . . . . . . 21
23 2.2 Desktop components . . . . . . . . . . . . . . . . . . . . . . . . . . 22
24 2.3 Menu button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
25 2.4 Taskbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
26 2.5 System tray . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

27 3 Working with Files and Folders 25


28 3.1 Folders and Paths . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
29 3.2 Introduction to Konqueror . . . . . . . . . . . . . . . . . . . . . . . 26

3
Bayanihan Linux 5 Contents

30 3.3 Navigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

31 3.4 Deleting Files and Folders . . . . . . . . . . . . . . . . . . . . . . . 32

32 3.5 Moving and Copying . . . . . . . . . . . . . . . . . . . . . . . . . . 33

33 3.6 Selecting Multiple Files . . . . . . . . . . . . . . . . . . . . . . . . 36

34 3.7 Create New . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

35 3.8 Changing Names and Permissions . . . . . . . . . . . . . . . . . . . 39

36 3.9 Configuring File Association . . . . . . . . . . . . . . . . . . . . . . 40

37 3.10 At the Command Line . . . . . . . . . . . . . . . . . . . . . . . . . 40

38 3.11 Linux Filesystem Hierarchy . . . . . . . . . . . . . . . . . . . . . . 42

39 4 Connecting to the Internet 47

40 4.1 Dial-Up using KPPP . . . . . . . . . . . . . . . . . . . . . . . . . . 47

41 4.2 LAN/WiFi connectivity with KNetworkManager . . . . . . . . . . 53

42 4.3 Using FireFox and Konqueror for browsing the web . . . . . . . . . 56

43 4.4 Setting the proxy for firefox and konqueror . . . . . . . . . . . . . 59

44 4.5 E-Mail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60

45 4.6 VOIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

46 4.7 Instant Messaging With Pidgin . . . . . . . . . . . . . . . . . . . . 69

47 4.8 Desktop Sharing/Remote Desktop . . . . . . . . . . . . . . . . . . 70

48 5 Using OpenOffice.org 3 73

49 5.1 OpenOffice.org 3 Writer . . . . . . . . . . . . . . . . . . . . . . . . 73

50 5.2 OpenOffice.org 3 Calc . . . . . . . . . . . . . . . . . . . . . . . . . 78

51 5.3 OpenOffice.org 3 Impress . . . . . . . . . . . . . . . . . . . . . . . 82

52 6 Using Graphics Tools 89

53 6.1 Image Editing Using Gimp . . . . . . . . . . . . . . . . . . . . . . 89

54 6.2 Gwenview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90

4
Contents Bayanihan Linux 5

55 6.3 Installing/Using Digikam . . . . . . . . . . . . . . . . . . . . . . . 93


56 6.4 Other graphics tools . . . . . . . . . . . . . . . . . . . . . . . . . . 93

57 7 Using WindowsTM applications with WINE 95


58 7.1 Installing WindowsTM software . . . . . . . . . . . . . . . . . . . . 96
59 7.2 Configuring WINE . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
60 7.3 Tested applications . . . . . . . . . . . . . . . . . . . . . . . . . . . 98

61 8 Using Multimedia Applications 99


62 8.1 Amarok . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
63 8.2 KsCD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
64 8.3 KMix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
65 8.4 KRec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
66 8.5 XVidCap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
67 8.6 MPlayer Video Player . . . . . . . . . . . . . . . . . . . . . . . . . 102
68 8.7 K3B - CD/DVD Burning . . . . . . . . . . . . . . . . . . . . . . . 104
69 8.8 KAudioCreator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105

70 9 Using the Terminal/Commandline 107


71 9.1 Access the Terminal/Console . . . . . . . . . . . . . . . . . . . . . 107
72 9.2 File and Folder Navigation . . . . . . . . . . . . . . . . . . . . . . . 108
73 9.3 Filesystem Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
74 9.4 User-related Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
75 9.5 File Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
76 9.6 Other Essential Commandline Tools . . . . . . . . . . . . . . . . . 116
77 9.7 Text Editors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119

78 10 System Administration 123


79 10.1 Installing/Removing/Upgrading software . . . . . . . . . . . . . . . 123

5
Bayanihan Linux 5 Contents

80 10.2 KDE Control Center . . . . . . . . . . . . . . . . . . . . . . . . . . 130


81 10.3 Managing Printers . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
82 10.4 Managing Private Folders . . . . . . . . . . . . . . . . . . . . . . . 133
83 10.5 Setting up a firewall with Guarddog . . . . . . . . . . . . . . . . . 133
84 10.6 Updating/Using Klamav . . . . . . . . . . . . . . . . . . . . . . . . 134
85 10.7 Managing users with Kuser/Adduser/Deluser . . . . . . . . . . . . 135

86 11 Special Topics 137


87 11.1 Installing a C/C++ development environment . . . . . . . . . . . 137
88 11.2 Compiling a custom kernel or third-party driver . . . . . . . . . . . 138
89 11.3 Installing a webserver . . . . . . . . . . . . . . . . . . . . . . . . . 139
90 11.4 Installing an ftp/file server . . . . . . . . . . . . . . . . . . . . . . . 146
91 11.5 Installing an email server . . . . . . . . . . . . . . . . . . . . . . . 146
92 11.6 Configuring NFS . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
93 11.7 BIND / DNS servers . . . . . . . . . . . . . . . . . . . . . . . . . . 158

94 Appendix A GNU GPL 159

95 Bibliography 173

96 Index 174

6
97 Preface

98 Sample text.

7
Bayanihan Linux 5 Contents

8
99

100 CHAPTER

101 ONE
102

103 Installing the Bayanihan Linux OS

104 Chapter Author : Rage Callao


105

106 The system uses the Debian Installer[8], a software developed by the Debian
107 Project1 . This version features a fully graphical installation as well as console,
108 expert and rescue modes. The following sections will describe the stages and
109 options available for each of these modes.

110 1.1 Getting the installer

111 Bayanihan Linux is freely downloadable as an ISO image from the Bayanihan
112 Linux website at http://bayanihan.gov.ph or can be obtained as a CD from
113 the Advanced Science and Technology Institute office.
114 After downloading the ISO image, please verify that the image was downloaded
115 correctly by using a file integrity checking software such as md5sum.exe or
116 sha256sum.exe and compare the generated values with those posted at our
117 website.
118 If the ISO image integrity check is successful, use a CD burning software and select
119 the Burn as image option to burn the ISO image to a blank CD. This process will
120 produce a bootable Bayanihan Linux CDROM Installer. Then insert the disc

1 http://www.debian.org

9
Bayanihan Linux 5 Chapter 1. Installing the Bayanihan Linux OS

121 into the CDROM drive and restart your computer making sure it boots from the
122 CDROM.

123 1.2 Checking disc integrity

124 Before beginning your installation you should also check whether the ISO image
125 was properly burned onto the CD. To do this, boot the CD and select Advanced
126 options from the boot menu and then select Graphical expert install as shown in
127 Figure 1.1. On the next screen (shown in Figure 1.2) select Check the CDROM(s)
128 integrity. If the check is successful, proceed with the Graphical installation guide
129 shown in Figure 1.4.
130 Important: Perform a BACK-UP of your valuable data before proceeding with
131 the installation.

Figure 1.1: Graphical expert install

Figure 1.2: Check the CD-


ROM(s) integrity

10
Chapter 1. Installing the Bayanihan Linux OS Bayanihan Linux 5

132 1.3 Advanced Installer Options

133 Additional installer options are available by selecting Advanced options (use the up
134 and down arrow keys and press Enter on the highlighted entry) from the installer
135 menu shown in Figure 1.4. The various options are shown in Figure 1.3 and
136 described below.

137 Expert install runs the installer in a text-mode environment and displays all
138 available options

139 Rescue mode runs the installer and provides a shell from which a preinstalled
140 system can be accessed and configured

141 Graphical expert install runs the installer in a full graphical environment and
142 displays all available options

143 Graphical rescue mode runs the installer in a full graphical environment and
144 provides a shell from which a preinstalled system can be accessed and con-
145 figured

146 Test physical memory runs memtest which is a program to check the system
147 memory

Figure 1.3: Advanced options menu

148 1.4 Graphical installation guide

149 The full graphical installation mode is selected as the default mode when booting
150 the Bayanihan Linux CDROM Installer. This is the easiest mode mainly because
151 most of the available options have already been preselected. Figures 1.4 to 1.20
152 shows the installation steps.

11
Bayanihan Linux 5 Chapter 1. Installing the Bayanihan Linux OS

153 For low memory machines (less than 128 MB of RAM ) you may want to select
154 the Text-mode install option. The installer will also automatically switch to this
155 mode when it detects low physical memory.
156 The installer will prompt for partitioning information in all modes. The term
157 partition refers to the act of dividing the harddisk so that the divisions can be
158 used by the operating system for different tasks or data. For instance, if you
159 accept all the default options in the partitioning stage, the installer will create
160 two partitions by default. One for the / or root partition and another for the
161 swap partition. The root partition will be used for storing files the operating
162 system needs as well as users files. The swap partition will be used for temporary
163 storage of data by the operating systems processes.

Figure 1.4: STEP 1. Dis-


plays the available options for
the installer. To proceed, press
the Enter key on the high-
lighted entry. Several screens
will appear while the installer
initializes.

Figure 1.5: Network config-


uration. The installer will at-
tempt to configure your net-
work connections.

12
Chapter 1. Installing the Bayanihan Linux OS Bayanihan Linux 5

Figure 1.6: STEP 2. Only ap-


pears when automatic network
configuration has failed. Select
the option Do not configure the
network at this time. The net-
work connection will need to be
configured upon logging in.

Figure 1.7: STEP 3. Prompts


for a hostname for the com-
puter. You can accept the de-
fault and then press Enter or
you can type in any single-word
unique name to identify this
machine on the network. Use
small letters.

Figure 1.8: STEP 4. Only ap-


pears when automatic network
configuration has been success-
ful. Prompts for a domain
name. You can safely accept
the default.

13
Bayanihan Linux 5 Chapter 1. Installing the Bayanihan Linux OS

Figure 1.9: STEP 5. The de-


fault is to use the Guided - use
entire harddisk option. Click
Continue to proceed to the next
screen.

Figure 1.10: STEP 6. Select


the harddisk where the system
will be installed.

Figure 1.11: STEP 7. Select a


partitioning option. There are
3 predefined configurations to
choose from. Selecting the de-
fault will create two partitions,
one for the /root and one for
the swap partitions.

14
Chapter 1. Installing the Bayanihan Linux OS Bayanihan Linux 5

Figure 1.12: STEP 8. Click


Continue to confirm the infor-
mation on partitioning changes
and proceed to the next screen.

Figure 1.13: STEP 9. Select


Yes to continue. NOTE: Se-
lecting Continue will delete all
data in your harddisk. The
new partition information will
be written to the harddisk and
the installer will format the
new partitions.

Figure 1.14: STEP 10. Type-


in your administrator or root
password here. The root ac-
count is used to modify system-
wide settings.

15
Bayanihan Linux 5 Chapter 1. Installing the Bayanihan Linux OS

Figure 1.15: STEP 11. Type


in your name. This informa-
tion will be used to generate
a suggested username for the
next step.

Figure 1.16: STEP 12. Type-


in your preferred username if
you skipped the previous step
otherwise accept the suggested
username. An account with
this username will be created
near the end of the installa-
tion process. You will use
this account to login. This
is a regular, non-administrator
account.

Figure 1.17: STEP 13. Type


in your preferred password for
the account created in the pre-
ceeding screen. Use the user-
name you entered in STEP 12
and the password here to login
at screen shown in Figure 1.23

16
Chapter 1. Installing the Bayanihan Linux OS Bayanihan Linux 5

Figure 1.18: The system will


now proceed with the installa-
tion. This will take between
30 minutes to 1 hour depending
on the speed of your machine.

Figure 1.19: STEP 14. The


installer will attempt to de-
tect other operating systems
installed in the harddisk. You
can safely select Yes here and
click Continue to proceed to the
next screen.

Figure 1.20: STEP 15. This


is the end of the installation
process. Remove the CD and
click Continue to reboot into
your new Bayanihan Linux 5
system.

17
Bayanihan Linux 5 Chapter 1. Installing the Bayanihan Linux OS

164 1.5 First Look

165 After rebooting/booting your computer, the first screen you will see is the GrUB2
166 menu show in Figure 1.21 which displays the available boot options for this system.

Figure 1.21: GrUB Menu

Figure 1.22: Splash screen Figure 1.23: Login screen

2 Grand Unified Bootloader

18
Chapter 1. Installing the Bayanihan Linux OS Bayanihan Linux 5

Figure 1.24: Welcome greeting Figure 1.25: The Bayanihan Desktop

Figure 1.26: Map of the Desktop

19
Bayanihan Linux 5 Chapter 1. Installing the Bayanihan Linux OS

20
167

168 CHAPTER

169 TWO
170

171 Desktop Overview

172 Chapter Author : Rage Callao


173

174 Finding your way around a typical Linux desktop can be a challenging experience
175 especially if you come from a Windows background. However once you get passed
176 the initial hurdles, it becomes quite easy to do things. Many of the desktop
177 components behave and function in a very familiar way and almost everything
178 can be customized to your hearts content.

179 2.1 From power on to desktop

180 The boot process begins when you power on your computer. The first screen
181 to appear after the typical BIOS messages and warnings is the GrUB menu.
182 GrUB is an acronym for Grand Unified Bootloader. Bayanihan Linux is the default
183 operating system selected. You can press Enter or wait a few seconds indicated
184 by the timer at the bottom of the screen and the system will boot to the selected
185 operating system. The process of booting up your computer begins with the
186 kernel, the core of the operating system, being loaded into memory. System
187 components are detected, filesystems are mounted and the desktop initialized
188 for use. Afterwards you are presented with a graphical login screen. Type in the
189 username and password you provided during installation and you will be presented
190 with the desktop environment. This should just take a few minutes.

21
Bayanihan Linux 5 Chapter 2. Desktop Overview

191 2.2 Desktop components

192 The desktop is made up of a these components:

193 Menu button contains the shortcuts to run the various programs bundled with
194 Bayanihan Linux
195 Taskbar displays links to windows that are currently open and holds various
196 other utilities such as applets (pager, quick shortcuts, systray)
197 System tray contains running applications that are frequently accessed
198 Desktop where icons to frequently accessed applications or folders can be placed
199 and where windows of various applications appear when opened

200 After logging in, you are presented with the desktop shown below displaying the
201 components discussed the preceeding section:

202

203 2.3 Menu button

204 The Menu contains links to graphical applications and are conveniently catego-
205 rized according to general use. For instance, all the graphical applications that
206 you install that need to connect to the internet can be accessed from the Internet

22
Chapter 2. Desktop Overview Bayanihan Linux 5

207 category. This category includes web browsers, email clients, chat clients, VOIP
208 and videoconferencing software.
209 This category also includes links to various system utilities such as the Help man-
210 ual, system settings, system folders and the Control Center where you can set your
211 preferences.
212 You will also find quick shortcuts to run applications, search for files and folders
213 and logoff from the desktop.

214 Menu Editor

215 Most graphical applications when installed will place a shortcut in the Menu. You
216 can also manually add entries and change the arrangement of the various entries
217 using the Menu Editor.
218 To run this application, simply click on the link found in the Menu:

219 Settings (in All Applications) Menu Editor

220 Menu updating tool

221 This tool can search your system for common applications and update the Menu.

222 2.4 Taskbar

223 The taskbar is the horizontal area at the bottom of the screen that contains links
224 to open windows, the Menu, clock and systray as well as various other utilities.
225 To configure the taskbar, right-click on an empty area on the taskbar and click
226 Unlock panels. Right-click on an empty area again and click Configure Panel. A
227 window will appear containing several categories. Click on the Help for more
228 information on configuring this component.
229 Many applets (small applications that reside in the taskbar) can also be placed
230 here allowing for more customized control of system. To access these optional
231 applets, right-click on an empty area and click Add applet to panel. To remove
232 and applet, right-click on an empty area and select Remove from Panel Applet.
233 You can also add icons for your frequently used applications by selecting Add
234 Application to Panel.

23
Bayanihan Linux 5 Chapter 2. Desktop Overview

235 2.5 System tray

236 Some frequently used applications place an icon here for quick access. This ap-
237 plications typically run in the background

24
238

239 CHAPTER

240 THREE
241

242 Working with Files and Folders

243 Chapter Author : Aileen Cruzado

244 After having been able to successfully install Bayanihan Linux in your system,
245 what now should you expect from it?
246 When moving from Windows to Linux, you must first understand how Linux
247 view files varies from how Windows handle files. In this chapter, you will have an
248 overview of the Linux file system and how important it is to make Linux work.
249 Here, you will learn that under Linux, everything is a file[4]. In addition to data
250 and executable files, Linux treat folders and even the various components of your
251 computer as a file. This means that there are files that represent your keyboard,
252 terminal, printer, CD-ROM, and even your systems RAM. These special files are
253 called devices. When Linux needs to talk to physical hardware device, it does so
254 by simply reading from or writing to one of these special files1 . In this chapter,
255 you will be introduced to elementary concepts such as basics of creating new files,
256 changing ownerships and permissions and the principal method of accessing them
257 via the Konqueror file manager.
258 Additionally, you will learn about the fundamentals of configuring file associations;
259 working at the command line level; and the Linux Filesystem Heirarchy.

1 http://lowfatlinux.com/linux-files.html

25
Bayanihan Linux 5 Chapter 3. Working with Files and Folders

260 3.1 Folders and Paths

261 In UNIX and Linux all folders are arranged in a simple inverted tree structure
262 descending and branching down from a single top level folder[5]. This means that
263 you can get from any folder to any other by going up until you reach a common
264 point then down through the appropriate subfolders until you reach your target.
265 The position of any file or folder in the tree can be described by its path, which
266 is a simple list of the folders you would have to descend through to get to the
267 target folder or file. For example, /home/aileen is the subfolder /aileen of the
268 subfolder /home of the top level folder, and /home/aileen/words.txt is the file
269 words.txt in that subfolder. The leading / in these paths represents the top
270 level folder.
271 Every folder accessible by your system including those on other hard disk par-
272 titions, your floppy and CD-ROM will appear in the tree descending from /,
273 their exact paths will depend on how your system was set up. See Section 3.3.
274 Every user on a UNIX / Linux system has their own home folder to hold their
275 personal files and settings; for example /home/russel and /home/mariesonn.
276 The tilde symbol () is often used to represent the users home folder, so that
277 /letter.txt refers to the file letter.txt in my /home folder.
278 Note that the term directory is often used instead of folder.

279 3.2 Introduction to Konqueror

280 All operating systems come with a so-called file manager which is an application
281 that helps you view files and folders as well as navigate graphically through the
282 entire filesystem tree. The file manager bundled with Bayanihan Linux is called
283 Konqueror.
284 To run this application, simply click on the link found in the Menu. You can also
285 click on the Home icon your desktop or the taskbar.

286 Home Personal Files

287 From help:/konqueror/index.html:

288 Konqueror is an advanced file manager for the K Desktop Environ-


289 ment, providing file management functions ranging from simple cut/copy
290 and paste operations to advanced local and remote network file brows-
291 ing. Folder contents can be displayed in a variety of text and icon view

26
Chapter 3. Working with Files and Folders Bayanihan Linux 5

Figure 3.1: Icon View. Displays the


name and a suitable icon for each file
or folder.

Figure 3.2: MultiColumn View.


Similar to Icon View except that the
display is neatly formatted into regu-
lar columns.

292 modes, which can include thumbnail preview images of file contents.
293 File and folder properties can easily be examined and changed and
294 applications launched with a simple click of the left mouse button

295 View Modes

296 In File Manager mode, Konqueror shows you what files and subfolders are held
297 in a folder, and can provide you with some information about them.
298 The path of the folder you are looking at is shown in the Titlebar, and also in
299 the Location Toolbar, prefixed with file: to indicate that the folder is part of
300 your computers normal file system. For example file:/home/aileen.
301 The way that Konqueror displays the files and folders depends mainly on your
302 choice of View Mode. This can be selected from the View View Mode sub
303 menu, which gives you the following options: Icon View, MultiColumn View,
304 Tree View, Info List View, Detailed List View and Text View as shown
305 in Figures 2.1 to 2.6.

27
Bayanihan Linux 5 Chapter 3. Working with Files and Folders

Figure 3.3: Tree View. This option


is useful for navigating through the
folder tree below the current folder.
This display is similar to Detailed List
View except that the start of each line
will show a small + sign in a box
if the item is a folder. Left clicking
on the box will expand the display to
show the contents of the folder.

Figure 3.4: Info List View. Simi-


lar to Detailed List View except that,
where applicable, it shows the number
of lines, words and characters and file
format for each file.

Figure 3.5: Detailed List View.


Displays each file or folder on a sep-
arate line, as a small icon followed
by the file or folder name followed
by information about the item. The
amount of information shown is con-
trolled by the View Show Details
submenu settings.

28
Chapter 3. Working with Files and Folders Bayanihan Linux 5

Figure 3.6: Text View. Similar to


Detailed List View except thaticons
are not shown and the first character
in each line will be / if the item is
a folder.

306 The default file icons shown in Icon View and MultiColumn View modes can be
307 replaced by small preview images of the file contents. See File Previews on 29
308 on for more details.

309 File Tip Info

310 Checking the Show file tips box in the Behavior page of the Konqueror Configura-
311 tion dialog causes a small pop up information window to appear when the mouse
312 pointer is hovered over a file or folder name or icon in Icon View or MultiColumn
313 View mode.
314 If the Show previews... in file tips checkbox is checked the pop up window will
315 also show a small image of the file contents as shown in Figure 2.7.

316 File Previews

317 Selecting View Preview from the Menubar will bring up a sub menu that lets
318 you enable file previews for certain types of file.
319 Generally this means that the files icon will be replaced by a small image showing
320 the file contents. If file preview is enabled for Sound Files the file will be played
321 whenever the mouse cursor is hovering over the file name or icon.
322 Note that file previews are only available in Icon View and MultiColumn View
323 modes.
324 Because Konqueror has to read much more data than just the file name details
325 to generate a preview, file previews may not be appropriate when viewing files
326 on a floppy or from a remote system. The Previews page of the File Manager
327 Configuration dialog allows you to disable file previews for protocols such as ftp
328 where reading the extra data would take too long.

29
Bayanihan Linux 5 Chapter 3. Working with Files and Folders

Figure 3.7: To preview a file, hold the mouse cursor over the name of the file for
about a second. A popup window will appear showing the contents of the file and
useful information like file size and which user owns the file.

329 3.3 Navigation

330 To get to a file with Konqueror you first need to navigate through the folder tree
331 to find the folder containing that file.
332 To move between folders you can simply step up and down the tree:

333 To descend into a subfolder, left click on its name or icon or if you have
334 already selected it (see below) then just press Enter.

335 To go up the folder tree, you can click on the Up button in the Toolbar, use
336 Alt+Up Arrow, or use the Menubar Go Up option.

337 To select a file or folder in the displayed folder without opening it in any way
338 use the up and down arrow keys to move through the items. The selected item
339 will be highlighted and some information about it will be displayed in the Status
340 Bar.
341 Setting the View Mode to Tree View can help you locate folders in the tree below
342 the current folder; in this mode each folder is shown with a small box at the left.

30
Chapter 3. Working with Files and Folders Bayanihan Linux 5

343 If the box contains a + sign, left clicking on the box (not on the folder name or
344 icon) will display a sub tree showing files and subfolders contained in that folder.
345 The small box will then change to show a sign. Left click on that to collapse the
346 sub tree. Once you have found the folder you are looking for, left click on the
347 folder name or icon to open it.
348 The Navigation Panel can also help you find your way around the file system.
349 You can go directly to any folder by typing its path into the Location Toolbar
350 window or into the dialog box invoked by the Menubar Location Open Location
351 item or by Ctrl+ O. Konquerors Text Completion feature may be useful when
352 you do this. Dont forget that in Linux / UNIX file and folder names are case
353 sensitive.
354 When you have moved to a new folder you can go back to your previous choice by
355 using the Toolbar Back button, the Menubar Go Back item, or Alt+Left Arrow.
356 Once you have gone back you can go forward. Use the Toolbar Forward button,
357 the Menubar Go Forward item or Alt+Right Arrow.
358 Alternatively, you can also choose to enter the parent folder by clicking on the
359 Toolbar Up, the Go Up item, or with Alt+Up Arrow.

360 Tip. Holding the left mouse button pressed while the mouse pointer is over the
361 Toolbar Up, Back or Forward buttons brings up a menu of recently visited
362 locations.

363 Finding Files and Folders

364 If you dont know or cant remember where a file or folder is within your system,
365 then use the Toolbar Find File button or the Menubar Tools Find File... option.
366 This will embed the file finder application KFind into Konquerors window.

367 Note. If the name of a file or folder begins with a period or a dot, then it is a
368 hidden file or folder, and will not normally be shown by Konqueror. To
369 see files or folders, use the Menubar View Show Hidden Files option.

370 Another reason Konqueror may not show the file or folder you
371 are looking for is that you may have the View Filter plugin set to
372 display only certain types of file.

31
Bayanihan Linux 5 Chapter 3. Working with Files and Folders

373 Floppy and CD-ROM Drives

374 Any floppy disk, CD drive or other hard disk partition that you have on your
375 system will usually appear in the / , /media, /mnt or /auto folder, having a path
376 something like /mnt/floppy or /cdrom. The details will depend on how your
377 system was set up.
378 UNIX / Linux requires that you mount a floppy disk or CD-ROM when you have
379 inserted it into the drive, and mount other hard disk partitions when you want
380 to access them. You also need to unmount a floppy disk or CD-ROM before
381 removing it to register that it is no longer available.
382 How you do this will depend on how your system:

383 You may have an Automount facility, in which case you dont have to bother
384 about explicitly mounting and unmounting, although you may find that the
385 CD-ROM occasionally starts up by itself for no apparent reason.
386 You may have Floppy, CD-ROM and hard disk icons on your desktop, in
387 which case, left mouse button click on the icon to mount it. Doing this
388 should also bring up a balloon notification, a Removable Device icon and
389 a window asking you what you want to do with the mounted device. To
390 unmount, right click on the icon and choose the Safely Remove item and a
391 balloon notification will appear to indicate that the device has been safely
392 removed. The Removable Device icon will then turn gray to indicate inac-
393 tivity. See Figure 3.8.
394 Or you can do it the traditional way by typing into a text console window:
395 mount /mnt/floppy to mount, for example, the floppy drive; and
396 umount /mnt/floppy to unmount it (umount not unmount)

397 Note. Rather than having to open a text console to type the mount or umount
398 commands, you may prefer to use Konquerors Tools Execute Shell Com-
399 mand (Ctrl+E) feature.

400 3.4 Deleting Files and Folders

401 Konqueror gives you two ways to dispose of an unwanted file or folder:

402 You can move it to the Trash folder, which is the safest method as you can
403 get it back if you realize that you have made a mistake.

32
Chapter 3. Working with Files and Folders Bayanihan Linux 5

Figure 3.8: This illustration shows


that apart from the change of color,
a small arrow is visible beside the Re-
movable Device Icon when it is Ac-
tive and disappearswhen it is Inac-
tive

404 You can just plain Delete it, which removes the entry from the folder and
405 adds the disk area occupied by the file(s) to the systems list of free disk
406 areas, in the same way as the rm command.

407 The simplest way to remove a file or folder is to position the mouse pointer over
408 its name or icon and press the right mouse button, which will bring up a menu
409 containing the options Move to Trash and Delete.
410 Or, if you have selected the item, the Menubar Edit menu will give you the choice
411 of Move to Trash and Delete options.
412 Del will move the selected item or items to Trash. Shift+Del will really, truly and
413 irrevocably delete the selected item or items.

414 Note. You wont be able to remove a file or folder if you dont have the necessary
415 permissions; see Section 3.8 for further details.

416 3.5 Moving and Copying

417 To copy a file or subfolder between folders you can:

418 Position the mouse pointer over its name or icon and hold down the right
419 mouse button, which will bring up a menu containing the Copy option.
420 Choose that.
421 Or if the item is selected you can use the Copy button on the Toolbar or the
422 Menubar Edit Copy item, or the Ctrl+C shortcut key combination. You
423 can also select multiple files or folders to copy/move as well.

33
Bayanihan Linux 5 Chapter 3. Working with Files and Folders

424 Navigate to the folder you want to copy the item into then Paste the item
425 into the new folder by using the Toolbar Paste button or the Menubar Edit
426 Paste option or the Ctrl+V shortcut, or by moving the mouse pointer
427 to a clear area of the window and holding the right mouse button down to
428 bring up a menu containing the Paste option.

429 Moving a file or subfolder between folders can be done in the same way as copying,
430 except that you choose the Cut option or Ctrl+X instead of Copy. The item that
431 you have Cut will be removed from the original folder when you do the Paste into
432 the new folder.
433 You can also copy or move selected item(s) to another folder by using Edit
434 Copy Files (F7) or Edit Move docFiles (F8), or by selecting Copy To or Move To
435 from the drop down menu you get when you right click on an file or folder name
436 in the File Manager window.

437 Note. You may not be able to copy or move a file or folder if you dont have the
438 necessary permissions. See Section 3.8 for further details.

439 Using Drag n Drop

440 Konqueror also supports Drag and Drop copying and moving of files and folders.
441 You can do this by having two instances of Konqueror, one showing the folder
442 you want to copy from, the other showing the target folder. Position the mouse
443 pointer over the item you wish to copy or move, then, holding the left mouse
444 button pressed, drag it to a clear space in the target folder. Release the button
445 and you will be presented with a menu choice of Copy or Move. Take care to
446 drop the item into an empty area of the target folder view - dropping it on top
447 of another file name or icon can cause problems.
448 You can also set up Konqueror to show more than one folder within its window
449 and drag & drop between them.
450 To be able to show different folders in each view they should not be linked; the
451 little boxes at the bottom right of each view should be empty.
452 The active view, that is the one whose path is shown in the Location Toolbar
453 and which responds to navigation and Menubar commands, is shown by the little
454 green light in the bottom left corner. To make a view active, left click on an
455 empty area of the view or on its Status Bar.
456 To remove an active view from Konquerors window use the Ctrl+Shift+R short-
457 cut, or the Menubar Window Remove Active View option, or right mouse button

34
Chapter 3. Working with Files and Folders Bayanihan Linux 5

Figure 3.9: This screenshot illustrates the use of the Menubar Window Split
View Left/Right option, also available with the shortcut Ctrl+Shift+L, to split the
main Konqueror window into two views, each showing the contents of a different
folder.

458 click on the Status Bar and choose the Remove Active View option from the re-
459 sulting menu.
460 If you use Konqueror tabs, you can drag and drop between tabs by dragging the
461 file to the tab label, without letting go yet. The destination tab will pop to the
462 front, allowing you to continue dragging and then drop the file.

463 Duplicate File Names

464 If you try to paste a file into a folder that already contains a file with the same
465 name, Konqueror will pop up a dialog box warning you that the file already exists.
466 You can then choose to:

467 Overwrite the old file with the newly copied one. The Overwrite All button
468 can be used if you have copied multiple items.
469 Cancel the paste operation by pressing the Skip or Skip All button.
470 Give the file that is being copied a different name. You can do this by typing
471 a new name into the text entry box or get Konqueror to Propose one. When
472 you have done this press, the Rename button.

35
Bayanihan Linux 5 Chapter 3. Working with Files and Folders

473 3.6 Selecting Multiple Files

474 You sometimes want to delete, copy or move a number of files that are similar in
475 some way. For example, you may wish to move all of the .png graphics files from
476 one folder to another. Konqueror makes this easy by letting you select multiple
477 files based on similarities in their file names.
478 Use the Menubar Edit Selection Select... item or the shortcut Ctrl++. This
479 brings up a little dialog box in which you enter a filename containing the wildcard
480 characters *, which matches any number of characters, and ? which matches a
481 single character. Press OK and Konqueror will highlight all files with matching
482 names. For example;

483 flag*.png will select all filenanes starting with the letters flag and end-
484 ing with .png.

485 memo?.txt will select memo1.txt and memo9.txt but not memo99.txt.

486 When you have selected a range of files, you can narrow down the selection by
487 uing the Menubar Edit Unselect... option or Ctrl+- to specify which of the
488 selected files should be removed from the selection.
489 Use Ctrl+U or the Menubar Edit Unselect All option or just left mouse button
490 click on a clear area of the view to cancel the selection.
491 You can even invert the selection: that is, deselect all selected files and select
492 those that were previously unselected. Use the Menubar Edit Invert Selection
493 option or Ctrl+* to do this.
494 You can also select multiple files and folders by holding the Ctrl button while you
495 click on each individual file or folder. This enables you to then move or copy
496 multiple files and folders to a different location the same method above.
497 A number of useful shortcut keys can be used in list, tree and text view modes:

498 Space. Toggle the current selection.

499 Insert. Toggle the current selection and move down to the next item.

500 Ctrl+Up Arrow, Ctrl+Down Arrow, Ctrl+Home, Ctrl+End,


501 Ctrl+Page Up, Ctrl+Page Down. Move the selection, toggling
502 the selection of everything on the way.

36
Chapter 3. Working with Files and Folders Bayanihan Linux 5

503 Shift+Up Arrow, Shift+Down Arrow, Shift+Home,Shift+End,


504 Shift+Page Up, Shift+Page Down. Deselect everything, then
505 move the selection, selecting everything on the way.

506 Once you have selected the right files then the normal delete, copy or move com-
507 mands will act on all of the selected files at once.

508 Note. Depending on your keyboard type and locale, you may find that the
509 Ctrl++, Ctrl+- and Ctrl+* shortcuts only work with the Numeric keypad
510 +, - and * keys.

511 3.7 Create New

512 When Konqueror is in File Manager mode, picking Create New from the Edit menu
513 or from the context menu you get by right mouse button clicking on a free area
514 in a folder view gives you a submenu letting you create any of the following in
515 the current folder:

516 File Link To Application...

517 This option is most useful if you want to create an icon that will open a particular
518 application. It opens a dialog box with three tabbed pages. The first, General, is
519 where you choose an icon and the text that will appear with it. The second page,
520 Permissions, lets you select who can use or modify the icon. In the Application page
521 you must enter the Command that will run the application. For example, kwrite
522 to start up the KWrite text editor. kwrite /home/aileen/todo.txt would open
523 the file /home/aileen/todo.txt in KWrite. Advanced options such as the file
524 types which the application can open are also available from this page.
525 To make the application icon appear on your desktop, create the link in your
526 /Desktop folder (this may be called something slightly different depending on
527 how KDE was installed on your system) or get to the Create New... sub menu by
528 right clicking on a free area of the desktop instead of within Konquerors window.
529 If you have a lot of specialized application links and dont want to clutter up
530 the desktop, then why not create them in your Applications folder. You can
531 get there in Konqueror by choosing Go Applications. Then create a sin-
532 gle icon on your desktop to open your Applications folder, which is usually in
533 /.kde/share/applnk.
534 To put an application link icon into the panel, first create it in the Applications
535 folder then drag the icon onto a clear area of the panel.

37
Bayanihan Linux 5 Chapter 3. Working with Files and Folders

536 File Link To Location (URL)...

537 This lets you create an icon to open Konqueror at a particular folder or web page.
538 As with Link To Application... you can make the application icon appear on your
539 desktop by creating the link in your /Desktop folder or going to the Create New...
540 sub menu by right clicking on a free area of the desktop. When you first create it
541 the text shown with the icon will be the full path or URL. You can change it by
542 right clicking on the icon, selecting Properties... and entering the preferred text
543 in the General tab page.

544 Device Floppy Device...

545 Use this option to create an icon that will mount a floppy disk and open an
546 instance of Konqueror showing the disks contents. To unmount the disk when
547 you have finished with it right click on the icon and select Unmount. In practice
548 it doesnt have to be a floppy disk but can be any hard disk or partition on your
549 system that is not normally mounted.

550 Hard Disk. This option is similar to Floppy Device... but for a hard disk
551 drive or partition.

552 CD/DVD-ROM Device. This option is similar to Floppy Device... but


553 for a CD or DVD drive.

554 Folder. An easy way of creating a new (sub)folder.

555 Text File. Use this to create an ordinary, empty, text file. A dialog box
556 will be opened for you to enter the name of your new file.

557 HTML File. Creates a skeleton HTML source file. When you type the
558 new files name into the dialog box it is probably best to give it a .html
559 extension to avoid confusion.

560 Presentation Document. Creates a skeleton OpenOffice.org Impress doc-


561 ument. Give its name a .odp extension.

562 Text Document. Creates a skeleton OpenOffice.org Writer document us-


563 ing the standard Writer style template. Give its name a .odt extension.

564 Spread Sheet Document. Use this to create a new OpenOffice.org Calc
565 file, and name it with a .ods extension.

38
Chapter 3. Working with Files and Folders Bayanihan Linux 5

566 Illustration Document. Creates a new OpenOffice.org Draw document.


567 Name it with the extension .odg.

568 3.8 Changing Names and Permissions

569 The two easiest ways to change the name of a file or folder is to either right click
570 on it and select Rename, or select the file or folder and then press the F2 button.
571 To change the name or permissions of a file or folder, right click on its name or
572 icon and select the Properties... item, or if you have selected the file or folder,
573 then you can use the Menubar Edit Properties option.
574 This will bring up the Properties dialog box with two tabbed pages:

575 General, which gives you some information about the item and lets you
576 change its name and, for a folder, the associated icon.
577 Permissions, which shows you the items ownership and access permissions
578 and lets you change the permissions.

579 Copy and Rename

580 If you want to make a copy of an existing file with a different name perhaps as a
581 backup in the same folder as the original file, do a normal Copy then when you
582 Paste it a dialog box will pop up complaining that the file already exists. Just
583 type the new name into the dialogs text box and press the Rename button (or
584 if you are feeling lazy pressing the Propose button will generate a new name for
585 you).

586 Super User Mode

587 If you are running as a normal user and try to access files outside of your own
588 /home folder you will often be prevented from doing so and get an error message
589 such as Access Denied.
590 To access these files you need to be logged in as the system administrator, often
591 known as the Super User or root.
592 Rather than logging out then in again, you can launch Konqueror from the Menu
593 in Super User mode by selecting System File Manager - Super User Mode. You
594 will be asked for the root login password but as long as you can provide that
595 Konqueror will be started up with full access privileges to all files on your system.

39
Bayanihan Linux 5 Chapter 3. Working with Files and Folders

596 Warning! Take care. As Super User (root), you have complete control of your
597 system, and a wrong command can easily do irrevocable damage.
598 Also, connecting to the internet as root is an extremely bad idea,
599 as it seriously increases your vulnerability to malicious hacking.

600 3.9 Configuring File Association

601 KDE provides many applications which can open many different types of file.
602 Most of the time, the defaults will work with no problems, but Konqueror provides
603 a powerful system to allow you to change the applications used to open each file
604 type. For more details, choose the Settings Configure Konqueror... menu item,
605 select File Associations in the configuration dialog, and click on Help.

606 3.10 At the Command Line

607 Although Konqueror is a very powerful and flexible GUI file manager, there are
608 occasions when the experienced Linux / UNIX user wants to get down to the
609 basics and work at the text command line level.
610 You can, of course, open an instance of Konsole, perhaps with Konquerors
611 Menubar Tools Open Terminal option or with Ctrl+T.
612 If you only want to launch a program or view a URL, the Tools Run Command
613 (Alt+F2) option may be easier.
614 Tools Execute Shell Command... (Ctrl+E) opens a small command line dialog
615 window where you can enter a shell command such as ps -ax | grep kdeinit .
616 Note that it does not support full featured terminal control characters, so appli-
617 cations such as top and less will not work properly, but it is available immediately
618 without the delay involved in starting Konsole.
619 For more complex operations, Konqueror has another nice feature: the Menubar
620 Window Show Terminal Emulator option, which opens up a terminal window
621 as a new view within Konqueror (See Figure 2.10). As long as the link icon is
622 visible at the bottom right corner of each view, the terminal will follow any folder
623 changes you make in the normal file manager view2 .

2 http://docs.kde.org/stable/en/kdebase-apps/konqueror/index.html

40
Chapter 3. Working with Files and Folders Bayanihan Linux 5

Figure 3.10: The Terminal Emulator option opens up a terminal window as a new
view within Konqueror

41
Bayanihan Linux 5 Chapter 3. Working with Files and Folders

624 3.11 Linux Filesystem Hierarchy

625 The first thing that most new users shifting from Windows will find confusing is
626 navigating the Linux filesystem[6]. The Linux filesystem does things a lot more
627 differently than the Windows filesystem3 . To put it simply, it can be visualized as
628 a tree with its roots and all[3]. At the top of the hierarchy is invariably the root
629 path which is represented by /. All other directories are created beneath this
630 root path. And each of the sub directories have a specific purpose. For example,
631 /etc contain the configuration files, the /opt directory is used to install
632 third party software, /boot contain the grub files and the Linux kernel and
633 so on4 .
634 In the Filesystem Hierarchy Standard (FHS), all files and directories appear under
635 the root directory /, even if they are stored on different physical devices[2].
636 Note however that some of these directories may or may not be present on a UNIX
637 system depending on whether certain subsystems, such as the X Window System,
638 are installed.
639 The majority of these directories exist in all UNIX operating systems and are
640 generally used in much the same way; however, the descriptions here are those
641 used specifically for the FHS, and are not considered authoritative for platforms
642 other than Linux5 .

643 / This is the base, or root, of the file system. Everything in the Linux system is
644 housed in this directory[1].

645 /bin This directory contains a number of essential commands that are available
646 to unprivileged users (such as cat, chmod, chown, etc). The /bin directory
647 also houses the shells (such as bash).

648 /boot This directory contains everything necessary for the boot process. With-
649 out the /boot directory, your machine would not be able to boot up.

650 /dev This directory contains all of the special and device files. With Linux all
651 devices and drives have a name. Hard drives tend be labeled as hda, hdb,
652 hdc. Special devices such as external usb devices can be labeled as sda,
653 sdb, sdc. If you look in the /dev directory you will see quite a few files that
654 can be associated with devices. Most of the devices found here are either
655 block or character devices. Block devices hold data (such as a hard drive)
656 and character devices transmit data (such as a mouse).
3 http://www.freeos.com/articles/3102/
4 http://linuxhelp.blogspot.com/2008/05/linux-file-system-hierarchy-fun-easy.

html
5 http://en.wikipedia.org/wiki/Filesystem_Hierarchy_Standard

42
Chapter 3. Working with Files and Folders Bayanihan Linux 5

657 /etc This is a very special directory that contains numerous configuration files
658 and directories. This directory will contain the X configurations, Apache,
659 Samba, the init system, etc. The /etc directory also houses the sources for
660 package management systems like apt and yum. One of the most important
661 subdirectoris in /etc is the /etc/init.d.

662 /home This is where all user data is housed. Each user on the system will
663 have their own subdirectory within /home. All user data and user-specific
664 configuration files are saved here.

665 /lib This is where all kernel modules needed for system boot libraries that are
666 required by root system commands (commands found in /bin and /sbin.)

667 /lost+found If your system crashes or is shut down improperly any lost data
668 will be stored here. During a recovery boot the fsck application will attempt
669 to recover corrupt files found here.

670 /media This is where all external media (or extra internal drives) is mounted.
671 If you make or edit entries in the /etc/fstab file you will point devices
672 (such as /dev/sda to directories withing /media.)

673 /mnt This is another directory where external (and internal) drives and devices
674 are mounted. This is a holdover to older school thought. Most modern
675 distributions are moving to the /media directory.

676 /opt This is a directory that can be used for installing applications that are out-
677 side of the default installation. When you install applications here they can
678 be used system wide by all users. Only the root user can install applications
679 here.

680 /proc This is a special directory that is actually a virtual filesystem. The /proc
681 directory acts as a process information center for the kernel.

682 /root This is the root users home directory.

683 /sbin This is where all system maintenance/administration executable files are
684 stored. These commands differ from those in /usr/sbin in that they are
685 system commands used for critical system administration and maintenance
686 whereas /usr/sbin are non-critical tasks such as user administration, net-
687 work administration, etc.

43
Bayanihan Linux 5 Chapter 3. Working with Files and Folders

688 /usr This is one of the largest directories on your system as it contains all user-
689 executable binaries as well as the libraries, documentation, and header files
690 for these executables. One of the most important subdirectories is /usr/bin
691 where all user application executables are stored.

692 /var This directory contains all variable data such as log files. On a server
693 environment the document root directory of most servers will be found here
694 (/var/www and /var/ftp are examples.)

695 /srv This directory can contain the services (such as www) directory in some
696 distributions.

697 /tmp This directory, as you would expect, contains temporary files that are
698 stored as needed. Many files you will find here are lock files created by
699 applications. Do not remove anything from this directory as the cron system
700 has a job specifically created for the removal of these files6 .

6 http://www.ghacks.net/2008/12/11/get-to-know-linux-file-system-hierarchy/

44
Chapter 3. Working with Files and Folders Bayanihan Linux 5

Figure 3.11: The diagram represents (part of) a Linux file system know as
Filesystem Hierarchy Standard[7]. A line from one node to a node on its
right indicates containment. For example, the student directory is contained
within the home directory.

45
Bayanihan Linux 5 Chapter 3. Working with Files and Folders

46
701

702 CHAPTER

703 FOUR
704

705 Connecting to the Internet

706 Chapter Author : Russel Baisas


707

708 Connecting to the Internet has become easier with this release of Bayanihan Linux.
709 The following sections describe the steps necessary for connecting your machine
710 to the World Wide Web using the different applications that are bundled with
711 this release.

712 4.1 Dial-Up using KPPP

713 KPPP is a graphical fronted to the ppp tools that are bundled with the system.
714 These tools allow you to connect to the Internet using a dial-up modem, a tele-
715 phone line and an account with an ISP.
716

717 To run this application, simply click on the link found at the Menu:

718 Internet KPPP - Internet Dial-Up Tool

719 To begin with the setup, Click on the Configure button.


720 In Figure 4.2, Setup for an account is the first step. Click on New button to
721 configure for new account.

47
Bayanihan Linux 5 Chapter 4. Connecting to the Internet

Figure 4.1: KPPP Dial-Up


Tool

Figure 4.2: KPPP


Configuration

722 If it is your first time to run Kppp, configuration of modem and account is re-
723 quired. An option prompt box will appear to let you choose for the wizard con-
724 nection or the manual connection. Normally for first time users, it is required to
725 setup the account in manual mode because wizard connection is mainly use for
726 existing account setup. Click on Manual Setup button to start configuring
727 When the new account dialog appears, fill up the specified information for every
728 tab such as account connection details, phone number, and and others that are
729 mandatory. Refer to Figure 4.4.
730 KPPP Account Dialog Box Customize argument are pass on pppd using
731 customize pppd button.(This button is optional).

Figure 4.3: KPPP Wizard

48
Chapter 4. Connecting to the Internet Bayanihan Linux 5

Figure 4.4: KPPP Account


Dialog Box

Figure 4.5: It is use for con-


figuring your IP address, if
the service provider has pro-
vide you with a static IP ad-
dress. you may specify it in
static IP address field. The
default field is dynamic IP
address.

Figure 4.6: For the gate-


way tab, you can select on
either Default Gateway or
Static Gateway. If your ISP
has specified an IP address
you should use it as a static
gateway.

49
Bayanihan Linux 5 Chapter 4. Connecting to the Internet

Figure 4.7: For the DNS tab,


input for domain name are
given by your ISP provider.
Automatic is the default con-
figuration on this.

Figure 4.8: The login script


tab allows the user to cus-
tomize the way of configuring
the setup and logging in on
kppp. If you use the script-
based login in the Authenti-
cation on the dial up tab you
can specify it here.

Figure 4.9: This option is


use to input a certain com-
mand to be use by the real
user ID. It is best advise not
to use root as a user unless
an admin has allow the ordi-
nary user to use it. You can
customize your command by
adding a script. for exam-
ple, we can make a script for
backup of logs during your lo-
gin process.

50
Chapter 4. Connecting to the Internet Bayanihan Linux 5

Figure 4.10: The purpose of


accounting tabs is to check on
how much bytes are sent to
and from the internet while
you are log in. It is best to
check for this because most
internet provider base their
costing on how much bytes
are transfered while login on
the internet.

732 Configuring the Modem on KPPP

733 The Device Tab

734 After configuring the accounts for kppp, next step to configure is the modem. It
735 is require to know your modems specification for you to configure it on kppp.

736 The Modem tab

737 Busy wait - This is the length of time that a modem will wait before redi-
738 aling.

739 Modem volume - This sets the volume of the modem.

740 Modem commands - This field is any name that will represent the command
741 on your modem but it should be relevant to the command to avoid chaos.

742 Query modem - It provides information on your modem but still depends
743 on the resource if it has the exact information from resource. This may be
744 not as informative.

745 Terminal - This mini terminal is use for modem configurationa and some
746 experimentation to play around with the modem.

747 The graph tab is use to customize the color of your kppp application.

51
Bayanihan Linux 5 Chapter 4. Connecting to the Internet

Figure 4.11: Modem


Configuration

Figure 4.12: The


Graph Tab

Figure 4.13: The


miscellanous tab
have some option
that might be
needed in con-
figuring kppp
application.

52
Chapter 4. Connecting to the Internet Bayanihan Linux 5

Figure 4.14:
Knetworkmanager
Main Window

748 4.2 LAN/WiFi connectivity with KNetworkMan-


749 ager

750 Knetworkmanager is the network application use by K desktop environment. It


751 is a user friendly gui application use for configuring and switching of network
752 environment.

753 Starting up knetworkmanager

754 To start on knetworkmanager, go to:

755 Setting Network Settings

756 knetworkmanager needs to ba a root user to access it. you can press on the
757 administrator mode then a dialog box will prompt a password. Figure 4.14 and
758 Figure 4.15

53
Bayanihan Linux 5 Chapter 4. Connecting to the Internet

Figure 4.15:
Knetworkmanager
password to root

Figure 4.16: It displays on


what network card is de-
tected, if no network inter-
face are display, it is pos-
sible that the lan cards are
not yet install. For config-
uring lan card and wireless
card

54
Chapter 4. Connecting to the Internet Bayanihan Linux 5

Figure 4.17:
Normally when
knetworkmanager
detects a network, it
automatically con-
figures the default
gateway if the routed
daemon is up and
running. A Default
Gateway is the node
on the computer net-
work that is chosen
when the IP address
does not belong to
any other entities in
the Routing Table.

Figure 4.18:
Knetworkmanager
automatically gen-
erates a dns for it.
If dns was not auto-
matically configured,
there might be a
problem with the
network or a problem
with /etc/resolv.conf.
you can refer to
chapter 9 of system
administration for
troubleshooting.

55
Bayanihan Linux 5 Chapter 4. Connecting to the Internet

Figure 4.19: If you


have a different
ethernet settings
you can load your
network profile that
would fit on your
network setup for
your ethernet.

759 4.3 Using FireFox and Konqueror for browsing


760 the web

761 FireFoxTM (shown in Figure ??) is a popular open-source web browser developed
762 by the Mozilla Foundation.

763 Starting firefox

764 To run this application, simply click on the link found at the Menu:

765 Internet FireFox - Web Browser

766 Opening, Selecting and Closing tabs

767 A tabs can be found below the bookmark toolbars, it allows firefox to use multiple
768 firefox window taskbar to be open one at a time.
769 By pressing on [Ctrl]+[t] or you may choose to click

770 File New Tab

771 ,

56
Chapter 4. Connecting to the Internet Bayanihan Linux 5

Figure 4.20: Multiple Tabs


for Firefox

Figure 4.21: Miscellaneous Pref-


erence Dialog on Firefox Which lets
you customize and configure your
firefox browser

772 Using the Konqueror for Browsing the Web

773 Konqueror is a web browser, file manager and file viewer designed as a core part
774 of the K Desktop Environment. It is developed by volunteers and can run on most
775 Unix-like operating systems. Konqueror, along with the rest of the components in
776 the KDEBase package, is licensed and distributed under the GNU General Public
777 License. This section will describe the use of konqueror as a web browser.Figure ??

778 Starting konqueror

779 To start konqueror, go to .

780 Internet konqueror

781 Creating, Opening and Closing tabs

782 tabs in konqueror are found underneath the location toolbar, same as the func-
783 tionality of firefox, it allows for a multiple access of konqueror windows. You can
784 also press [Ctrl] + [t] or go to

Figure 4.22: Multiple Tabs

57
Bayanihan Linux 5 Chapter 4. Connecting to the Internet

Figure 4.23:
Quick Search on
Konqueror

Figure 4.24: Find Tool-


bars on Konqueror

785 Bookmarks

786 You can bookmark a page on konqueror by going to

787 Bookmark Add Bookmark

788 Quick Search

789 You can find the quick search on konqueror at the upper right beside the location
790 toolbar Figure 4.23

791 Find Toolbar

792 The find toolbar on konqueror are found on

793 Edit Find

794 or you can type [Ctrl] + [f] Figure 4.24

795 Miscellaneous

796 You con configure konqueror by going to

797 Settings Configure Konqueror

798 Figure 4.25

58
Chapter 4. Connecting to the Internet Bayanihan Linux 5

Figure 4.25: Preferences Configu-


ration for Konqueror

799 4.4 Setting the proxy for firefox and konqueror

800 To set the proxy for Mozilla firefox:

801 Edit Preferences Advance Network

802 To set the proxy for Konqueror:

803 Settings Configure Konqueror Proxy

804 Installing Additional Plugins

805 Plugins are tools use to enhance your internet browser by adding more function-
806 alities to it. There are lots of plugin that you can find on the internet and you can
807 download it for free. We will be focusing on installing plugin for mozilla firefox
808 and konqueror since these 2 are the default internet browser use by bayanihan
809 linux.
810 To install the plugin on firefox:

811 1. Open a new browser window using Firefox.


812 2. Go to the Firefox plugins Web page(see https://addons.mozilla.org/
813 en-US/firefox/browse/type:7).
814 3. Browse through the list of plugins that are available. Choose from items
815 such as Flash player, Java, Gxine and many more.
816 4. Look beneath the plugin youd like to download. Youll be re-routed to the
817 downloads page for the specific plugin you wish to add.

59
Bayanihan Linux 5 Chapter 4. Connecting to the Internet

818 5. Look for the Download or Download Now button and click it. You may
819 be prompted to save a file. Click Save File. A dialog box will show the
820 download progress. When the download is complete, click Clean Up.

821 6. Open the plugin after it finishes downloading. If you left the default setting
822 in place, the plugin will be on your desktop. Simply clicking the icon will
823 install it in Firefox.

824 To install the plugin in konqueror:

825 1. Start up Konqueror, then do a Web search for plugins for konqueror. When
826 you find a plugin you think you might use and enjoy, click on it and follow
827 the instructions for downloading found on that Web site. Note that other
828 plugins may have different download instructions.

829 2. Set Konqueror to read the plugin: Once your chosen plugin has been down-
830 loaded to your computer, go to the Konqueror tool bar and click on Con-
831 figure Konqueror.

832 3. Choose plugins.

833 4. Hit Refresh.

834 5. Close Konqueror, then re-open it. Once you have re-opened Konqueror, it
835 will be all set to read and use the plugin you just downloaded.

836 4.5 E-Mail

837 Electronic mail(E-mail) is any method of communicating and storing data using
838 digital device such as computers. Bayanihan uses a Kmail as dafault for sending
839 and receiving email.

840 Configuring/Using KMail

841 KMail is the e-mail client of the KDE desktop environment. It is use by Bayanihan
842 Linux as the default email client.

843 Starting KMail

844 To start kmail.

60
Chapter 4. Connecting to the Internet Bayanihan Linux 5

Figure 4.26: KMail Start

845 It if is your first time to use kmail just follow the wizard to setup your mail
846 account.

847 Internet Kmail

848 Composing a message

849 After you have setup your account, we will now compose a new message to test
850 your new account. To compose message window go to:

851 Message New Message

852 Fill in the appropriate fields in the composer window. You can use the View menu
853 to select which header fields you want to display.
854 Organizing your address can easily be remember if you will be sending message
855 to multiple address or single address.You can use the address book by clicking
856 on the select button beside the To field then from that it will list your current
857 contact email address.
858 Whenever you want to add more than one recipient in one of the fields, use a
859 comma to separate each address from the next one. You may need to specify
860 fully qualified addresses (i.e. user@example.com) even for local users, depending
861 on your system configuration.

61
Bayanihan Linux 5 Chapter 4. Connecting to the Internet

Figure 4.27: Composing Mes-


sage on KMail

862 When you are finished with your message, click the Send Now icon (the envelope)
863 to send the message. Figure 4.27
864 Message Folders
865 Message Folders are used to organize your email messages. By default, if you have
866 no existing message folders, messages are stored in the folder $KDEHOME/share/apps/kmail/.
867 If you have existing message folders in /Mail, these will be used instead. When
868 you first start KMail the inbox, outbox, sent-mail, trash and drafts folders are
869 created. These folders each have special functions
870 Inbox:
871 Where KMail by default puts your new messages when you ask it to check your
872 mail.
873 Outbox:
874 Where messages are put while they are waiting to be delivered. Note that you
875 should not drag and drop messages here to send them, use the Send icon in the
876 composer window instead. Sent-mail:
877 By default copies of all messages that you have sent are put into this folder. Trash:
878 By default all messages that you have moved to trash are moved into this folder.
879 Drafts:
880 Contains messages you started to edit but then saved to this folder instead of
881 sending them.

62
Chapter 4. Connecting to the Internet Bayanihan Linux 5

Figure 4.28: Main Window of


Thunderbird

882 Installing/Using Thunderbird

883 Mozilla Thunderbird is the open source e-mail client develop by Mozilla founda-
884 tion. Figure 4.28
885 To install thunderbird, go to the directory where you download the source and
886 untar/unzip the source by using the command below.

887 1. cp thunderbird-2.0.0.19.tar.gz /opt/


888 2. cd /opt
889 3. tar -zxvf thunderbird-2.0.0.19.tar.gz
890 4. ln -s /opt/thunderbird/thunderbird /bin/thunderbird

891 If you want to create a desktop shortcut for thunderbird, you can follow on this
892 procedure:
893 Right click on the desktop create new link to application. Go to application
894 and fill up the field required.
895 If you want to open thunderbird on the commandline, just type in thunderbird in
896 the terminal.

897 Starting up Thunderbird

898 After finishing your installation and everything went well. We can now start using
899 thunderbird.

63
Bayanihan Linux 5 Chapter 4. Connecting to the Internet

Figure 4.29: Configuring and


Starting up Thunderbird

Figure 4.30: Configuring and


Starting up Thunderbird

900 First is you have to setup your account. Thunderbird has a user friendly wizard
901 which will guide you in configuring your account name and other configuration.
902 Figure 4.29
903 Figure 4.30

904 Composing a Message

905 To compose a new message for Thunderbird, go and click on the Write button
906 located beside Get Mail button. Figure 4.31

64
Chapter 4. Connecting to the Internet Bayanihan Linux 5

Figure 4.31: Main Window


for Composing a Message on
Thunderbird

907 Message Folders

908 Thunderbird has a 4 default message folders on the main window, the inbox,
909 drafts, trash and the local folders. everytime you got a new message on your
910 mailbox it is automatically put in the inbox. you can make a rule on how to
911 organize your incoming message to where it be put.

912 Address Book

913 Address book stores the email address of your contacts. You can find the icon
914 Address Book on the upper tool bar beside the Write icon

915 4.6 VOIP

916 VoIp(Voice over Internet Protocol) is a service that convert your voice into a
917 digital signal that travels on internet. A broadband(high speed internet and a
918 headset microphone computer device is require.

919 Configuring/Using Ekiga

920 Ekiga(Formerly Gnome Meeting) is an open source VoIP and video conferencing
921 application by gnome. Ekiga is default in bayanihan linux.

65
Bayanihan Linux 5 Chapter 4. Connecting to the Internet

Figure 4.32: Ekiga 10 Easy


COnfiguration

922 Newbie users

923 If it is your first time to use ekiga, ekiga has a pop up wizard with 10 easy
924 configuration that is applicable for first time users. Simply follow the steps that
925 starts from creating an account to configuring hardware device. Figure 4.32

926 Calling using Ekiga

927 If you want to call other users, you need a SIP address. It is an address known
928 to be like a phone number. You can get a SIP address for free from (http:
929 //www.ekiga.netasdescribedhere). You can use the online address book of
930 Ekiga to find the SIP addresses of other Ekiga users. It is of course possible to
931 call people who are using another provider (other than ekiga.net) using Peering
932 or Enum. You can actually call any user using SIP software or hardware, and
933 registered to any public SIP provider. Ekiga can also be use to do PC-to-PC calls,
934 PC-to-phone calls or vice versa.

935 Messaging using Ekiga

936 You can also chat with your friends using ekiga. You can do this by clicking on
937 the left, above the Change the view mode.To send a text message to a user, simply
938 enter his/her SIP address into the sip: input box at the top of the screen, enter
939 your text message, and click on Send. Figure 4.33

940 Video Calls

941 Your camera must be supported by the linux kernel and compatible with Video4linux/Video4linux2
942 API in order to use webcams for video calls.

66
Chapter 4. Connecting to the Internet Bayanihan Linux 5

Figure 4.33: Messaging with


Ekiga

Figure 4.34: Ekiga Address


Book

943 Ekiga has an assistant for configuring video support: just run the Configuration
944 Assistant until the end.

945 Testing your webcam

946 To test your webcam you can do this:


947 There are 6 icons on the left side of the main Ekiga window. Push the 4th button
948 from the top (a grey round webcam). If eveything is ok, youll see the output of
949 the webcam. If not, youll see the Ekiga logo bouncing slowly.

950 Managing your Address Book

951 To see the address book on ekiga, go to Tools Address Book. A pop up window
952 will appear for choosing your contact list. Figure 4.34

67
Bayanihan Linux 5 Chapter 4. Connecting to the Internet

Figure 4.35:
Skype

Figure 4.36: Installing Skype on


Bayanihan Linux

953 Installing/Using Skype

954 Skype is a software that allows us call the user over using the internet with free of
955 charge but calls to other landlines and mobile might have charges depend on the
956 telecom company. It also allows for chatting and video conferencing. Figure 4.35

957 Installing Skype

958 Download Skype on their website (http://www.skype.com/intl/en/download/skype/linux/choose/).


959 You can choose on debian etch as the source for bayanihan linux. after you have
960 downloaded skype use the command dpkg -i skype-debian 2.0.0.72-1 i386.deb.
961 you must be a root user to use it. Figure 4.36

962 Using Skype

963 In order to use skype, you must have an account and you can get it on their web-
964 site https://secure.skype.com/account/login?message=login required, After your
965 account is done, you can now login to skype. Figure 4.37

68
Chapter 4. Connecting to the Internet Bayanihan Linux 5

Figure 4.37:
Logging in to
Skype

Figure 4.38:
Pidgin Main
Window

966 4.7 Instant Messaging With Pidgin

967 Pidgin is an instant messaging client that support different account on other
968 instant messaging applications. It supports AIM, ICQ, Jabber/XMPP, MSN,
969 Yahoo!, Bonjour, Gadu-Gadu, IRC, QQ, SILC, Simple.
970 Pidgin can log you to different account but you must be register on a specifi
971 account before you login to pidgin. Figure 4.38

972 Add an Account on Pidgin

973 You can go to Accounts Manage or click on [ctrl] + [a]. Then click on the add
974 button, then you can choose which account that you want. Figure 4.39

69
Bayanihan Linux 5 Chapter 4. Connecting to the Internet

Figure 4.39: Adding Account on


Pidgin

Figure 4.40:
Composing a Mes-
sage on Pidgin

975 Compose a Message

976 Just click on the name of the user if you like to talk or give a message. Figure 4.40

977 4.8 Desktop Sharing/Remote Desktop

978 Desktop Sharing is an application that allows you to use and share an existing
979 session to another machine. The user may also control your desktop which is like
980 sharing one session using 2 computers.

981 Using Krfb

982 To start krfb, go to:

983 Internet Krfb

70
Chapter 4. Connecting to the Internet Bayanihan Linux 5

Figure 4.41: Starting Up Krfb

Figure 4.42: Creating Personal In-


vitation for krfb

984 You can share desktop right away by choosing on the create personal invitation
985 it will create a host and a password which you will be giving to other station to
986 connect to your desktop.

987 Using Krdc

988 After Creating an invitation, you can now access the desktop using the krdc. To
989 open krdc go to:

990 Internet Krdc

71
Bayanihan Linux 5 Chapter 4. Connecting to the Internet

Figure 4.43: Gui of Krdc

Figure 4.44: Gui of Krdc

72
991

992 CHAPTER

993 FIVE
994

995 Using OpenOffice.org 3

996 Chapter Author : Pearliezl Dy Tioco


997

998 5.1 OpenOffice.org 3 Writer

999 What is Writer?


1000 Writer is the word processor component of OpenOffice.org (OOo). In addition
1001 to the usual features of a word processor (spelling check, thesaurus, hyphenation,
1002 autocorrect, find and replace, automatic generation of tables of contents and
1003 indexes, mail merge, and others), Writer provides important features:

1004 Templates and styles


1005 Page-layout methods, including frames, columns, and tables
1006 Embedding or linking of graphics, spreadsheets, and other objects
1007 Built-in drawing tools
1008 Master documentsto group a collection of documents into a single document
1009 Change tracking during revisions
1010 Database integration, including a bibliography database

73
Bayanihan Linux 5 Chapter 5. Using OpenOffice.org 3

1011 Export to PDF, including bookmarks

1012 And many more

1013 Starting from the system menu

1014 The most common way to start Writer is by using the system menu, on GNOME,
1015 it is called the Applications menu, on KDE, it is identified by the KDE logo.
1016 The Writer interface
1017 The main Writer workspace is shown below.

1018

1019 Menus
1020 The Menu bar is located across the top of the Writer window, just below the
1021 Title bar. When you choose one of the menus, a submenu drops down to show
1022 commands like File, Edit, View, Insert, Format, Table, Tools, Window and Help.
1023 Toolbars

74
Chapter 5. Using OpenOffice.org 3 Bayanihan Linux 5

1024 The first toolbar is a Standard Toolbar is consistent across the OpenOffice.org ap-
1025 plication. The second toolbar across the top is a Formating Toolbar that provides
1026 tools for formatting graphics and has a context-sensitive bar.
1027 Status Bar
1028 This provides information about the document and can change some document
1029 features. It has Page number, Page style, Language, Insert mode, Selection mode,
1030 Digital signature, Section or object information (Picture, List item, Heading and
1031 Table), View Layout and Zoom.

1032 Changing Document views

1033 There are several ways to view a document: Print Layout, Web Layout and Full
1034 Screen. Go to View menu and click on the required view. Print Layout is the
1035 default document view. Ctrl+Shift+J the Full Screen view, press the Esc key to
1036 return to either Print or Web Layout view.
1037 When in Print Layout and Web Layout you can Zoom slider on the menu bar.
1038 You can use both Zoom slide and View Layout icons on the Menu Bar. In Web
1039 Layout view, most of the choices are not available.

1040 Starting a new document

1041 Creating a blank document

1042 When OpenOffice.org Writer is open a Welcome screen is shown. Click one of
1043 the icons to open a new document or click the Templates icon to start a new
1044 document using a template.
1045 You can also start a new document in one of the following ways.

1046 If a document is already open in OpenOffice.org, the new document opens


1047 in a new window.

1048 Press the Control+N keys. A new empty document opens. If you already
1049 have a document open, the new document appears in a new window.

1050 Use File New Text Document. The result is the same as pressing the
1051 Control+N keys.

1052 Click the New button on the main toolbar .

75
Bayanihan Linux 5 Chapter 5. Using OpenOffice.org 3

1053 Creating a document from a template

1054 You can use templates to create new documents. If you want to have a document
1055 with similar layout use Templates. As a result, all the documents look alike; they
1056 have the same headers and footers, use the same fonts, and so on.
1057 Once you do have an existing templates, you can create new documents based
1058 on them by using File New Templates and Documents. This opens a window
1059 where you can choose the template you want to use for your document.
1060 A new document is created based on the formats defined in the template.

1061

1062 Opening an existing document

1063 When no document is open, the Welcome screen provides an icon for opening
1064 an existing document. You can also open an existing document in one of the
1065 following ways. If a document is already open in OpenOffice.org, the second
1066 document opens in a new window.

76
Chapter 5. Using OpenOffice.org 3 Bayanihan Linux 5

1067 Click File > Open.


1068 Click the Open button on the main toolbar.
1069 Press Control+O on the keyboard.

1070 In each case, the Open dialog box appears. Select the file you want, and then
1071 click Open.
1072 In the Open dialog box, you can reduce the list of files by selecting the type of
1073 file you are looking for. For example, if you choose Text documents as the file
1074 type, you will only see documents Writer can open (including *.odt, *.doc, *.txt).
1075 This method opens Word (*.doc) files, as well as OpenOffice.org files and other
1076 formats.

1077 Saving a document

1078 To save a new document, do one of the following:

1079 Press Control+S.


1080 Select File > Save.
1081 Click the Save button on the main toolbar.

1082 When the Save As dialog box appears, enter the file name and verify the file type
1083 (if applicable).
1084 To save an open document with the current file name, choose File Save. This
1085 will overwrite the last saved state of the file.

1086 Password protection

1087 To protect an entire document from being viewable without a password, use the
1088 option on the Save As dialog box to enter a password. This option is only available
1089 for files saved in OpenDocument formats. Passwords must contain a minimum
1090 of 5 characters. The OK button appear if it reached the minimum characters
1091 required.

1092 On the Save As dialog box, select the Save and tick the password option,
1093 and then click Save. You will receive a prompt:

77
Bayanihan Linux 5 Chapter 5. Using OpenOffice.org 3

1094

1095 Type the same password in the Password field and the Confirm field, and
1096 then click OK. If the passwords match, the document is saved and the file is
1097 password protected. If the passwords do not match, you receive the prompt
1098 to enter the password again.

1099 5.2 OpenOffice.org 3 Calc

1100 Calc is a spreadsheet software that is a free alternative to Microsoft Excel. It


1101 allows you to store, organize and analyze numerical information. Shown below is
1102 the OpenOffice.org Calc default window.

78
Chapter 5. Using OpenOffice.org 3 Bayanihan Linux 5

1103

1104 Tool Bars - contains commands that have pictures or icons associated with
1105 them. The Calc Toolbars are Main Menu toolbar, Function toolbar, For-
1106 mating toolbar and Formula toolbar.

1107 1. Main Menu Toolbar - this gives you access to many of the basic
1108 commands used in Calc.
1109 2. Function Toolbar - contains icons to provide quick access to
1110 commands.
1111 3. Formating Toolbar - has icons plus drop-down menus that
1112 allow you to select a font, font color, alignments, number formats,
1113 border options and background colors.
1114 4. Formula Toolbar - contains the Name Box drop-down menu
1115 and a ling white box called Input Line.

1116 Cells - is the fundamental element of worksheet and has an intersection of a


1117 column and row. A Cell Address is a combination of the column letter and
1118 the row number of a cell, such as A2 or B16, etc.

1119 Column Headings - this contains 256 columns and named by a letter or
1120 combination of letters.

79
Bayanihan Linux 5 Chapter 5. Using OpenOffice.org 3

1121 Row Headings - this contains 65,536 rows and named by a number.

1122 Navigation Bars - allows you to move from on worksheet to another, this
1123 buttons display the first, previous, next and last worksheets.

1124 Sheet Tabs - separate a sheet into specific worksheets.

1125 Using Functions

1126 A function is a predefined formula that helps perform mathematical functions.


1127 Functions save you the time of writing lengthy formulas. Function has a specific
1128 order called syntax.

1129 1. All functions begin with the = (equal sign). 2. Define the function
1130 name (e.g., Sum, Average, Count, Max and Min). 3. Enclose one or
1131 more arguments - numbers, text or cell references with parentheses.
1132 Separate a comma for each argument that is more than one.

1133 Accessing Calc Functions

1134 Click the Function Wizard button on the Standard toolbar. The Function Wizard
1135 dialogue box appears.

80
Chapter 5. Using OpenOffice.org 3 Bayanihan Linux 5

1136

1137 The drop-down menu of the Functions tab to display a list of function categories
1138 available for you to use in Calc. Click the desired Function that you would like
1139 to use in the spreadsheet.

1140 Grouping and Ungrouping Worksheets

1141 A workbook is a multi-page spreadsheet with multiple worksheets.

1142 Worksheets can also be combined together into a group. Grouping work-
1143 sheets allows you to apply identical formulas and/or formatting across all
1144 the worksheets in the group.
1145 When you group worksheets, any change made to one worksheet will also
1146 be applied to the other worksheets.
1147 if you want several worksheets to have the same data regions, depart-
1148 ments, quarters, months, weeks and days and youve decided to group
1149 your worksheets, all you need to do is type that information once and it will
1150 appear on every worksheet included in the grouping.

81
Bayanihan Linux 5 Chapter 5. Using OpenOffice.org 3

1151 To group worksheets: 1. To select one worksheet, click on the first


1152 sheet tab. 2. To select more than one worksheet, hold the Control key
1153 down and click on the additional worksheet tabs in the workbook.

1154 5.3 OpenOffice.org 3 Impress

1155 What is Impress?


1156 Impress is a presentation component (slide show). OpenOffice.orgs presentations
1157 can create slides that contain many different elements, including text, bulleted
1158 and numbered lists, tables charts clip art and a wide range of graphic objects.
1159 It also has a spelling checker and thesaurus and with pre-packaged text styles,
1160 background styles and only help.
1161 The main Impress window has three parts:

1162 Slides pane - contains thumbnail pictures of the slides. You can Add, Mark,
1163 Delete, Rename, Copy and Move Slides.

1164 Workspace - has five tabs: Normal, Outline, Notes, Handout and Slide
1165 Sorter.

1166 Tasks pane - has five sections: Master Pages (28 slide masters), Layout
1167 (20 prepackaged layouts), Table Design (11 standard table styles), Custom
1168 Animation, Slide Transition (56 available transition).

82
Chapter 5. Using OpenOffice.org 3 Bayanihan Linux 5

1169

1170 Creating a quick Presentation

1171 To create a quick presentation Impress offered three choices: Empty Presentation,
1172 From Template or Open an existing Presentation. When Impress refers to tem-
1173 plates it means presentations that are both predesigned and also contain sample
1174 content.
1175 The standard way of getting started is to create an empty presentation. Youll
1176 also be given a chance to choose which format you want the presentation to take,
1177 whether its designed primarily to be viewed on-screen or printed out.

83
Bayanihan Linux 5 Chapter 5. Using OpenOffice.org 3

1178

1179 The Impress Presentation Wizard

1180

1181 The Impress Presentation Wizard - slide design

84
Chapter 5. Using OpenOffice.org 3 Bayanihan Linux 5

1182

1183 The Impress Presentation Wizard - slide transition

1184 Creating your own Templates

1185 To create a template from a presentation and Save:

1186 1. Open the presentation that you want to use for a template. 2.
1187 From the main menu, choose File Templates Save. The Templates
1188 window opens. 3. In the New Template field, type a name for the
1189 new template. 4. In the Categories list, click the folder in which you
1190 want to store the template. 5. Click OK. OpenOffice.org saves the
1191 new template and the Templates window closes.

85
Bayanihan Linux 5 Chapter 5. Using OpenOffice.org 3

1192

1193 Importing a template


1194 If the template is in different location you can import it. To import a template
1195 into a template folder from another location on your computer.

1196 1. In the Template Management dialog box, click the folder into which
1197 you want to import the template. 2. Click the Commands button and
1198 choose Import Template from the drop-down menu. A standard file
1199 browser window opens. 3. Find and select the template that you
1200 want to import and click Open. The file browser window closes and
1201 the template appears.

1202 Exporting a template


1203 To export a template from a template folder to another location:

1204 1. In the Template Management dialog box, double-click the folder


1205 that contains the template you want to export. A list of all the tem-
1206 plates contained in that folder appears underneath the folder name. 2.
1207 Click the template that you want to export. 3. Click the Commands
1208 button and choose Export Template from the drop-down menu. The
1209 Save As window opens. 4. Find the folder into which you want to
1210 export the template and click Save.

1211 Applying Fontwork

1212 The Fontwork tool lets you manipulate text in various ways. This located at
1213 the Drawing toolbar. When you click the icon, the Fontwork Gallery dialog box
1214 appears, offering a choice of predefined font effects. Once the selection was made
1215 the dummy text Fondwork will appear on the workspace.

86
Chapter 5. Using OpenOffice.org 3 Bayanihan Linux 5

1216 To remove a Fontwork item, just select its border and press the Delete Keys on
1217 your keyboard.

1218

1219 Using 3D Effects

1220 In addition to Fontwork effects, Impress includes a powerful 3D tool. To use


1221 it, create a text box or shape using the Drawing toolbar at the bottom of the
1222 screen. Then right-click the text box or shape and select Convert 3D. If you
1223 want to create a 3D object that you can rotate in 3D space, select the 3D Rotation
1224 Object.

87
Bayanihan Linux 5 Chapter 5. Using OpenOffice.org 3

88
1225

1226 CHAPTER

1227 SIX
1228

1229 Using Graphics Tools

1230 Chapter Author : Yvonne Carpo


1231

1232 Bayanihan Linux version has some powerful, world-class graphics tools and ap-
1233 plications available. It includes several photo manipulation and cataloging tools.
1234 Among these is a professional-level image-editing program called GIMP (for GNU
1235 Image Manipulation Program).

1236 6.1 Image Editing Using Gimp

1237 Gimp is an open-source alternative to high priced, professional graphics editing


1238 programs such as Fireworks or Adobe Photoshop. Although GIMP is not aimed
1239 at beginners, those new to image editing can get a lot from it, provided they put
1240 in a little work.
1241

1242 To run this application, simply click on the link found at the Menu:

1243 Graphics GNU Image Manipulation Program - Image Editor

1244 The sample screenshot when you open GIMP as shown in Figure 6.1.
1245 The Gimp normally enables you to keep several windows open at once, rather

89
Bayanihan Linux 5 Chapter 6. Using Graphics Tools

Figure 6.1: Sample


Screenshot. When
you first open
GIMP.

1246 than having all its functions available from one window. This gives you control
1247 over where the various windows are positioned and which ones remain visible.
1248 GIMP uses 3 most important windows which is Main Toolbox Windows as
1249 shown in Figure 6.2, the Layers Dialog Windows shown in Figure 6.3 and the
1250 Image Windows shown in Figure 6.4.

1251 6.2 Gwenview

1252 Gwenview is a fast and easy to use image viewer for KDE. It is free software,
1253 licensed under the GNU General Public License1 .
1254

1255 Gwenview features a folder tree window and a file list window to provide easy
1256 navigation of your files. It also uses docked windows, so you can alter any layout
1257 you wish for. You can also browse images in full-sreen mode, or embedded within
1258 Konqueror using the Image View and Kpart.

1259 Installing extra plugins (KIPI-plugins)

1260 KIPI (KDE Image Plugin Interface) is a common development effort by the Gwen-
1261 view developers, DigiKam,. Its aim is to share image plugins among graphic
1262 applications. Kipi is based on the old digiKam plugins implementation.
1 http://www.gnu.org

90
Chapter 6. Using Graphics Tools Bayanihan Linux 5

Figure 6.2: GIMPs Main Tool-


box. This can be considered the
heart of GIMP, because when you
close it, all the other program win-
dows are closed too. It contains
the highest level menu, plus a set
of icon buttons that can be used
to select tools, and more.

91
Bayanihan Linux 5 Chapter 6. Using Graphics Tools

Figure 6.3: Layers Dialog. The


main interface to edit, modify and
manage your layers. It shows the
layer structure of the currently ac-
tive image, and allows it to be ma-
nipulated in a variety of ways. You
can close this if you want, and re-
open it later by selecting File
Dialogs Layers.

92
Chapter 6. Using Graphics Tools Bayanihan Linux 5

Figure 6.4: GIMPs Im-


age Window. Each
image open in GIMP is
displayed in a separate
window. Many images
can be open at the same
time:the limit is set only
by the amount of system
resources.

1263 6.3 Installing/Using Digikam

1264 Digikam is a simple digital photo management application, which makes import-
1265 ing and organizing digital photos a snap. The photos can be organized in
1266 albums which are automatically sorted chronologically. An easy to use interface
1267 is provided that enables you to connect to your camera and preview, download
1268 and/or delete your images.

1269 6.4 Other graphics tools

1270 Installing/Using Inkscape

1271 To create vector artwork, a better choice is a program like Inkscape(http://


1272 www.inkscape.org), which can be downloaded via Synaptic Package Manager
1273 (to learn about software installation, see Chapter 10).
1274 Inkscape as shown in Figure ?? is a powerful open source vector graphics editor,
1275 using the W3C standard Scalable Vector Graphics (SVG) file format with similar
1276 capabilities to Illustrator, CorelDraw, or Xara X.
1277

1278 To run this application, simply click on the link found at the Menu:

1279 Graphics Inkscape Vector Graphics Editor

1280 Inkcape Tools: The vertical toolbar on the left shows Inkscapes drawing and edit-
1281 ing tools. In the top part of the window, below the menu, theres the Commands
1282 bar with general command buttons and the Tool Controls bar with controls that

93
Bayanihan Linux 5 Chapter 6. Using Graphics Tools

1283 are specific to each tool. The status bar at the bottom of the window will display
1284 useful hints and messages as you work.

1285 Creating and Managing Documents

1286 To create a new empty document, use File New or press Ctrl+N

1287 Installing/Using Blender

1288 Blender as shown in Figure ?? is an integrated 3D suite for modelling, animation,


1289 rendering, interactive creation and playback.

94
1290

1291 CHAPTER

1292 SEVEN
1293

1294 Using WindowsTM applications with WINE

1295 Chapter Author : Rage Callao


1296

1297 This version of Bayanihan Linux comes bundled with a program that allows
1298 WindowsTM applications to run in a non-WindowsTM environment. The soft-
1299 ware is called WINE1 which is a recursive acronym for WINE Is Not an Emulator.
1300

1301 From http://winehq.org:

1302 Wine is a translation layer (a program loader) capable of running


1303 Windows applications on Linux and other POSIX compatible oper-
1304 ating systems. Windows programs running in Wine act as native
1305 programs would, running without the performance or memory usage
1306 penalties of an emulator, with a similar look and feel to other appli-
1307 cations on your desktop.
1308 Wine is still under development, and it is not yet suitable for gen-
1309 eral use. Nevertheless, many people find it useful in running a growing
1310 number of Windows programs.

1 http://www.winehq.org/

95
Bayanihan Linux 5 Chapter 7. Using WindowsTM applications with WINE

1311 7.1 Installing WindowsTM software

1312 Installing software via WINE is quite easy. Just click on its executable file in the
1313 Konqueror file manager. If that doesnt work, open a console (see 9) and type the
1314 command wine <name of executable file>
1315 For example, we will install 7-Zip, a popular open-source archiving program sim-
1316 ilar to Winzip. Download the installer from http://www.7-zip.org/ and save it
1317 into your /Download directory. Run Konqueror or double-click the Home icon on
1318 your desktop. Go to the Downloads folder and double-click the .exe file as shown in
1319 Figure 7.1 or open a console and type the command wine /Download/7z464.exe.

Figure 7.1: Running Konqueror

1320 When the application first starts, it creates a hidden folder in your /home directory
1321 called .wine where it saves its configuration files as well as creates a filesystem
1322 that is similar to the one found in WindowsTM . You can browse this hidden
1323 folder by clicking on the Konqueror menubar View Show hidden files.
1324 When setup finishes successfully, a link to the WindowsTM application will be
1325 found at:

1326 Wine Programs 7-Zip

96
Chapter 7. Using WindowsTM applications with WINE Bayanihan Linux 5

1327 7.2 Configuring WINE

1328 winecfg

1329 To configure Wine using the winecfg2 tool, simply click on the link found at the
1330 Menu:

1331 System Wine configuration

1332 regedit

1333 From http://winehq.org/docs/wineusr-guide/using-regedit

1334 All of the settings you change in winecfg, with exception of the
1335 drive settings, are ultimately stored in the registry. In Windows, this
1336 is a central repository for the configuration of applications and the
1337 operating system. Likewise, Wine implements a registry and some
1338 settings not found in Winecfg can be changed within it.

1339 To run the registry editor, open a terminal as discussed in Chapter 9 on page 107
1340 and type the command regedit then press Enter.

Figure 7.2: winecfg Figure 7.3: regedit

2 http://winehq.org/docs/wineusr-guide/config-wine-main

97
Bayanihan Linux 5 Chapter 7. Using WindowsTM applications with WINE

1341 7.3 Tested applications

1342 For a list of applications that have been tested on Wine, please visit the Wine
1343 Application Database found at http://appdb.winehq.org/.

98
1344

1345 CHAPTER

1346 EIGHT
1347

1348 Using Multimedia Applications

1349 Chapter Authors: Rage Callao


1350

1351 Bayanihan Linux 5 comes bundled with various software that allow you to play
1352 or view multimedia files in your computer. The following sections briefly describe
1353 the capabilities of each software and its typical uses

1354 8.1 Amarok

1355 Amarok (shown in Figure 8.1)is a multimedia audio player capable of playing audio
1356 files of different formats. It features an intuitive interface that allows the user to
1357 easily search, catalog tracks and create playlists.
1358 More information about configuring and using Amarok is available by pressing
1359 Alt+F2 and entering the command help:/amarok.
1360

1361 To run this application, simply click on the link found in the Menu:

1362 Multimedia Amarok - Audio Player

99
Bayanihan Linux 5 Chapter 8. Using Multimedia Applications

Figure 8.1: Amarok Figure 8.2: Amarok in system tray

1363 8.2 KsCD

1364 KsCD (shown in Figure 8.3) is a fast, CDDB enabled CD player for the *nix
1365 platform. KsCD stands for The KDE Projects small/simple CD player.
1366 On first run, the application places a shortcut icon in the system tray as shown
1367 in Figure 8.4
1368 To run this application, simply click on the link found in the Menu:

1369 Multimedia KsCD - CD Player

Figure 8.3: KsCD AudioCD Player Figure 8.4: KsCD in the system tray

1370 Tip: If you hear no sound when playing an audioCD but you hear a sound after
1371 logging in, you may need to enable digital playback. To do this, click Extras on the
1372 KsCD application then click Configure KsCD. On the window shown in Figure 8.5
1373 enable digital playback and then click Apply for the changes to take effect.

1374 8.3 KMix

1375 KMix is KDEs soundcard mixer program. Though small, it is full-featured. The
1376 program should give controls for each of your soundcards. This application will
1377 let you can adjust the volume and activate or deactivate channels. On first run,
1378 KMix will put a shortcut icon on the system tray. Typically no configuration is

100
Chapter 8. Using Multimedia Applications Bayanihan Linux 5

Figure 8.5: KsCD Configuration to


enable digital playback

1379 necessary, but if you do not hear a sound when logging in the volume may be set
1380 to low or muted by default.
1381 The system automatically detects and configures all available soundcards in your
1382 system provided there is support for the devices in the built-in kernel.
1383 To run this application, simply click on the link found in the Menu:

1384 Multimedia KMix - Sound Mixer

Figure 8.6: KMix Figure 8.7: KMix on the system tray

1385 8.4 KRec

1386 KRec connects to the aRts server and records what is routed to it into files. These
1387 files are in a special KRec format but it is possible to export to wave, ogg and mp3

101
Bayanihan Linux 5 Chapter 8. Using Multimedia Applications

Figure 8.8: KRec Record-


ing Tool

1388 files. But KRec has much more functionality. You can do multiple recordings in
1389 one file even with overlaying functionality.
1390

1391 To run this application, simply click on the link found in the Menu:

1392 Multimedia KRec - Recording Tool

1393 8.5 XVidCap

1394 XVidCap is a small tool to capture things going on in an X-Windows display to


1395 either individual frames or an MPEG video. This means you can select an area
1396 on your desktop and use this application to record whatever happens in that
1397 particular area.
1398 To select an area of the screen to record, simply place the cursor over the one of
1399 the red borders, hold down the left mouse button and drag over the desired area
1400 of the screen. Press the red button to begin recording. To stop recording, click
1401 the white square button. The video file will be saved in the folder. To configure
1402 the application, right-click on the main button on the application interface.
1403

1404 To run this application, simply click on the link found in the Menu:

1405 Multimedia XVidCap Screen Capture - X11 Screencam

1406 8.6 MPlayer Video Player

1407 MPlayer is a movie player which runs on many systems. It plays most MPEG/VOB,
1408 AVI, Ogg/OGM, VIVO, ASF/WMA/WMV, QT/MOV/MP4, RealMedia, Ma-
1409 troska, NUT, NuppelVideo, FLI, YUV4MPEG, FILM, RoQ, PVA files, supported

102
Chapter 8. Using Multimedia Applications Bayanihan Linux 5

Figure 8.9: XVidCap


Screen Recording Tool

Figure 8.10: MPlayer Video Player

1410 by many native, XAnim, and Win32 DLL codecs. You can watch VideoCD,
1411 SVCD, DVD, 3ivx, DivX 3/4/5, WMV and even H.264 movies.
1412 To play a video file, right-click on the main window and select Open Play file.
1413 When playing a file, pressing F will toggle fullscreen display.
1414

1415 To run this application, simply click on the link found in the Menu:

1416 Multimedia MPlayer - Multimedia player

1417 Installing additional codecs

1418 Many video files are distributed under proprietary formats and in order to play
1419 these you need to install decoders that can interpret and playback these files. For

103
Bayanihan Linux 5 Chapter 8. Using Multimedia Applications

1420 legal reasons, these decoders cannot be shipped with Bayanihan Linux but can be
1421 easily installed (see page 123). The w32codecs package will provide the necessary
1422 decoders to playback proprietary video files.

1423 8.7 K3B - CD/DVD Burning

1424 K3b is a CD and DVD burning application for Linux systems optimized for KDE.
1425 It provides a comfortable user interface to perform most CD/DVD burning tasks
1426 like creating an Audio CD from a set of audio files or copying a CD. While the
1427 experienced user can take influence in all steps of the burning process, the begin-
1428 ner may find comfort in the automatic settings and the reasonable K3b defaults
1429 which allow a quick start. The actual burning in K3b is done by the command
1430 line utilities wodim, cdrdao, and growisofs.
1431

1432 To run this application, simply click on the link found in the Menu:

1433 Multimedia K3b - CD and DVD Burning

Figure 8.11: K3b Burning


Application

1434 On first run, the application automatically searches for and configures all attached
1435 CD/DVD burners. If no CD/DVD burner is found, a prompt will appear.
1436 To burn an CD-sized ISO file, simply click on the Burn CD Image icon on the
1437 application interface. To burn data onto a disk, simply drag and drop files from the
1438 upper right window into the lower right window and click Burn. More information
1439 on using and configuring K3b can be found at help:/k3b.

104
Chapter 8. Using Multimedia Applications Bayanihan Linux 5

1440 8.8 KAudioCreator

1441 KAudioCreator is an audio CD ripper for KDE. With it you can easily rip your
1442 audio CDs to mp3 or ogg files or other formats, depending on whatever encoder
1443 you have installed on your system.
1444

1445 To run this application, simply click on the link found in the Menu:

1446 Multimedia KAudioCreator - CD Ripper

Figure 8.12:
KAudioCreator

105
Bayanihan Linux 5 Chapter 8. Using Multimedia Applications

106
1447

1448 CHAPTER

1449 NINE
1450

1451 Using the Terminal/Commandline

1452 Chapter Authors: Rage Callao


1453

1454 There are times when you will need to run applications without the benefit of a
1455 graphical user interface (GUI) because the command/application does not have
1456 one or because it is more convenient to use a terminal or console. A terminal
1457 or console is similar to the WindowsTM command shell or prompt but offers far
1458 more capabilities.
1459 The following sections describe how to run the most commonly used commandline
1460 tools in a terminal.

1461 9.1 Access the Terminal/Console

1462 To run the application, simply click on the link found at Menu:
1463

1464 System Konsole - Terminal Program

107
Bayanihan Linux 5 Chapter 9. Using the Terminal/Commandline

Figure 9.1: Konsole

1465 9.2 File and Folder Navigation

1466 ls - List

1467 The ls command lists the content of a directory. It is one of the most used Linux
1468 command.
1469 Syntax: ls [options] [file/directory]
1470 Typical Options:
-a shows ALL the files, including hidden files.
-l gives a long listing format. This option gives a more detailed result, it
shows owner, size, date last modified, etc.
1471
-R traverses the directories recursively. This option shows files of all the
directories within the specified directory.
-h shows filesizes human readable format.
1472

1473 Typical Usage:


ls - shows the files in the current directory.
ls - shows files in the home directory.
ls / - shows files in the root directory.
1474 ls /path/to/files/ - shows files in the directory /path/to/files/.
ls -lah - shows a long listing of all the files in the current
directory with a human readable format.
ls /home/ - displays the contents of /home/ directory.
1475

1476 cd - Change Directory

1477 The cd command is used to change to another directory.

108
Chapter 9. Using the Terminal/Commandline Bayanihan Linux 5

1478 Syntax: cd [directory]


1479 Typical Usage:
cd - changes to the home directory of the current user.
cd ../ - changes to the parent directory.
1480
cd / - changes to the root directory.
cd /path/to/mydirectory/ - changes to the directory /path/to/mydirectory/.
1481

1482 mkdir - Make Directory

1483 The mkdir command is used to create a directory.


1484 Syntax: mkdir [options] [/path/to]directoryname
1485 Typical Options:
1486 -p create directory including parent directory.
1487

1488 Typical Usage:


mkdir mydirectory - creates a directory named mydirectory in
the current directory.
mkdir /path/to/mydirectory - creates a directory named mydirectory in
1489 the /path/to/ directory.
mkdir -p /path/to/mydirectory - creates a directory named mydirectory in-
cluding the parent directories if they dont ex-
ist.
1490

1491 rmdir - Remove Directory

1492 The rmdir command is used to remove a directory. Note that it can only remove
1493 an empty directory.
1494 Syntax: rmdir [/path/to]directoryname
1495 Typical Usage:
rmdir mydirectory - deletes the directory named mydirectory in the
current directory.
1496
rmdir /path/to/mydirectory - deletes the directory named myirectory in the
/path/to/ directory.
1497

109
Bayanihan Linux 5 Chapter 9. Using the Terminal/Commandline

1498 cp - Copy

1499 The cp command is used to copy files and directories.


1500 Syntax: cp [options] [source] [destination]
1501 Typical Options:
-a archive; copies recursively, preserving file attributes, and does not follow
symbolic links.
-b backup; backs up existing destination files.
-f force; forces copy, overwriting existing files without promting the user.
-i interactive; prompts user before overwriting existing files.
1502 -p preserve; preserves file attributes if possible.
-r recursive; copies files and subdirectories recursively.
-s symbolic link; makes symbolic link instead of copying.
-u update; copies the SOURCE only when it is newer or when the DES-
TINATION does not exist.
-v verbose; shows details while performing copy.
1503

1504 Typical Usage:


cp myfile1 myfile2 - copies (duplicates) myfile1 to myfile2
in the current directory.
cp myfile mydirectory/ - copies myfile to the mydirectory in the
current directory.
cp -f myfile1 myfile2 - duplicates myfile1 if myfile2 doesnt ex-
ist, otherwise overwrites it.
cp -u mydirectory1/* mydirectory2/ - copies newer files from mydirectory1 to
1505 mydirectory2.
cp myfile1 myfile2 mydirectory/ - copies the files myfile1 and myfile2 to
mydirectory.
cp -s myfile /path/to/mylink - creates a symbolic link of myfile named
mylink in the /path/to/ directory.
cp -rv mydirectory1/ mydirectory2/ - copies mydirectory1 to mydirectory2,
including subdirectories and displays some
details.
1506

1507 rm - Remove

1508 The rm command is used to remove files and directories.


1509 Syntax: rm [options] [target]

110
Chapter 9. Using the Terminal/Commandline Bayanihan Linux 5

1510 Typical Options:


-f force; forces removal of target files without promting the user.
-i interactive; prompts user before removing existing files.
1511
-r or -R recursive; removes files and subdirectories recursively.
-v verbose; shows details while performing removal.
1512

1513 Typical Usage:


rm myfile - deletes myfile in the current directory.
rm -rfv mydirectory - verbosely deletes the directory named mydirectory in
1514
the current directory, including its subdirectories, without
prompting the user.
1515

1516 9.3 Filesystem Tools

1517 df - Disk Free

1518 The df command is used to report system free disk space and usage.
1519 Syntax: df [options] [target]
1520 Typical Options:
-a includes all dummy/virtual filesystems in the report.
1521 -h prints filesystem sizes in human readable format.
-l limits list to local filesystems only.
1522

1523 Typical Usage:


df -h - shows disk usage in human readable format.
df -lh /home - shows disk usage of filesystem where /home resides.
1524
df -ah - shows disk usage of all filesystems, including dummy/virtual
filesystems.
1525

1526 du - Disk Usage

1527 The du command is used to report disk space usage size of each file for directories
1528 recursively.
1529 Syntax: du [options] [target]
1530 Typical Options:

111
Bayanihan Linux 5 Chapter 9. Using the Terminal/Commandline

-a reports sizes of all files, not just directories.


-c prints a grand total at the end of the report.
1531
-h prints in human readable format.
-s displays only the total for each argument.
1532

1533 Typical Usage:


du -ch - prints sizes in human readable format and a grand total of
the current directory.
1534
du -ah /home - shows sizes of all files in /home.
du -chs /tmp - shows the summary of sizes of /tmp directory.
1535

1536 mount - Mount

1537 The mount command is used to mount a filesystem. Note that only the root
1538 account can mount filesystems and not ordinary users. Ordinary users should use
1539 pmount instead.
1540 Syntax: mount [options] [filesystem] [mountpoint]
1541 Typical Options:
-a - mounts all filesystems specified in /etc/fstab.
-o option1, option2, .. - specifies the options to be used when mounting the
1542
filesystem.
-t filesystemtype - indicates the filesystem type to be mounted.
1543

1544 Typical Usage:


mount -a - especially useful when changes to
/etc/fstab have been made.
mount /mnt/mymount - works only if /mnt/mymount exists
in /etc/fstab.
mount /dev/sdb1 /mnt/mymount - mounts the filesystem /dev/sdb1
to the mountpoint /mnt/mymount.
1545 mount -o loop CDImage.iso /mnt/mymount - mounts the CD image as a loop
device.
mount -t cifs \ - mounts a WindowsTM share
-o username=myuser,password=mypassword \ with account credits.
//10.10.5.5/MyShare /mnt/mymount
mount -o uid=1000 /dev/sdb1 /mnt/mymount - mounts the /dev/sdb1 as the ac-
count with user ID 1000.
1546

112
Chapter 9. Using the Terminal/Commandline Bayanihan Linux 5

1547 umount - Unmount

1548 The umount command is used to unmount a filesystem. Note that only the root
1549 account can unmount filesystems and not ordinary users. Ordinary users should
1550 use pumount instead.
1551 Syntax: umount [mountpoint|filesystem]
1552 Typical Usage:
umount /mnt/mymount - unmounts the mountpoint /mnt/mymount.
1553
umount /dev/sdb3 - unmounts the device /dev/sdb3.
1554

1555 pmount - Policy Mount

1556 The pmount command is used to mount hotpluggable devices as ordinary user.
1557 Syntax: pmount [filesystem] [mountname]
1558 Typical Usage:
pmount /dev/sdb1 myflashdrive - mounts the filesystem /dev/sdb1 to the mount-
1559
point /media/myflashdrive.
1560

1561 pumount - Policy Unmount

1562 The pumount command is used to unmount hotpluggable devices as ordinary user.
1563 Syntax: pumount [mountpoint|filesystem]
1564 Typical Usage:
pumount /mnt/mymount - unmounts the mountpoint /mnt/mymount.
1565
pumount /dev/sdb3 - unmounts the device /dev/sdb3.
1566

1567 9.4 User-related Tools

1568 adduser - Add User

1569 The adduser command is used to add a system account. It sets up the users
1570 home directory and group memberships. Note that this tool can only be used by

113
Bayanihan Linux 5 Chapter 9. Using the Terminal/Commandline

1571 the root account.


1572 Syntax: adduser [username]
1573 Typical Usage:
adduser myuser - starts the interactive tool that sets up the accounts user envi-
1574
ronment and group memberships.
1575

1576 deluser - Delete User

1577 The deluser command is used to remove a system account. Note that this can
1578 only be used by the root account.
1579 Syntax: deluser [username]
1580 Typical Usage:
deluser myuser - removes the account myuser.
1581
deluser - lets you specify the user account to be removed.
1582

1583 addgroup - Add Group

1584 The addgroup command is used to add a system group. Note that this tool can
1585 only be used by the root account.
1586 Syntax: addgroup [groupname]
1587 Typical Usage:
1588 addgroup mygroup - creates a group called mygroup.
1589

1590 delgroup - Delete Group

1591 The delgroup command is used to remove a system group. Note that this tool
1592 can only be used by the root account.
1593 Syntax: delgroup [groupname]
1594 Typical Usage:
delgroup mygroup - removes the group mygroup.
1595
delgroup - lets you specify the group to be removed.
1596

114
Chapter 9. Using the Terminal/Commandline Bayanihan Linux 5

1597 9.5 File Permissions

1598 chown - Change Owner

1599 The chown command is used to change file ownership. Note that this tool can
1600 only be used by the root account.
1601 Syntax: chown [options] [owner][:][group] [target]
1602 Typical Options:
-c - shows the changes made during the operation.
1603 -R - recursively changes the owner of the files in the current directory in-
cluding subdirectories.
1604

1605 Typical Usage:


chown myuser * - changes the file ownership to myuser
of the files in the current directory.
1606 chown -R myuser1:mygroup /home/myuser2 - changes the file ownership to myuser1
with group mygroup of the files in the
directory /home/myuser2.
1607

1608 chmod - Change Mode Bits

1609 The chmod command is used to change file permissions. Note that this tool can
1610 only be used by the root account.
1611 Syntax: chown [options] [a|u|g|o][+|-][permissions] [target]
1612 Typical Options:
-c - shows the changes made during the operation.
1613 -R - recursively changes the permissions of the files in the current directory
including subdirectories.
1614

1615 Typical Usage:


chmod o-rwx * - removes access to the files in the current directory by users
other than the owner.
1616
chmod -R +x RunMe.sh - makes the file RunMe.sh executable.
chmod +s myfile - sets the set user ID bit of the file myfile.
1617

115
Bayanihan Linux 5 Chapter 9. Using the Terminal/Commandline

1618 chgrp - Change Group

1619 The chgrp command is used to change group ownership. Note that this tool can
1620 only be used by the root account.
1621 Syntax: chgrp [options] [group] [target]
1622 Typical Options:
-c - shows the changes made during the operation.
1623 -R - recursively changes the owner of the files in the current direc-
tory including subdirectories.
1624

1625 Typical Usage:


chgrp mygroup * - changes the group ownership of the files in the
current directory to mygroup.
1626
chgrp -R mygroup /home/myuser2 - changes the group ownership of the files in the
directory /home/myuser2 to mygroup.
1627

1628 9.6 Other Essential Commandline Tools

1629 cat

1630 The cat command is used to display the contents of a file.


1631 Syntax: cat [file/s]
1632 Typical Usage:
cat myfile - displays the contents of myfile to standard output.
1633
cat myfile1 myfile2 - displays the contents of myfile1 and myfile2.
1634

1635 less

1636 The less is a tool used to display the contents of a file which can be browsed.
1637 Some commands are based on vi.
1638 Syntax: less [file]
1639

116
Chapter 9. Using the Terminal/Commandline Bayanihan Linux 5

1640 find

1641 This command is used to search for files.


1642 Syntax: find [options] [path/s] [expression]
1643 Typical Options for Expression:
-delete - removes searched files.
-exec [command] - executes the given command on the files that were found.
1644 -name [pattern] - searches for files with the given pattern.
-mtime [n*24hours] - matches files that were last modified n*24hours ago.
-executable - matches files that are executable.
1645

1646 Typical Usage:


find /home/myuser -name *.mp3 - searches the home directory of myuser for
.mp3 files.
find /var/tmp /tmp -name *.bak \ - searches for .bak files in the /var/tmp
1647
-exec /bin/rm -fv {} \; and /tmp directories and then deletes them.
find ./ -mtime 0 - searches the current directory for modified
files within the last 24 hours.
1648

1649 grep

1650 This command is used to print lines that match a given pattern.
1651 Syntax: grep [options] [pattern] [file]
1652 Typical Options:
-a - treats a binary file as if it were a text file.
-i - makes the match case-insensitive.
1653
-n - also prints line number for each output.
-v - prints non-matching lines.
1654

1655 Typical Usage:


grep -i sd /var/log/messages - outputs the lines with the characters sd,
1656 regardless of case.
grep -v list /home/myuser/myfile - outputs the lines without the word list.
1657

117
Bayanihan Linux 5 Chapter 9. Using the Terminal/Commandline

1658 sed

1659 This tool edits or transforms text from a stream.


1660 Syntax: sed [command] [input]
1661 Typical commands:
s/texttofind/texttoreplace/ - replaces the instance of texttofind with text-
toreplace.
1662
n,md - deletes the lines from n to m.
n,mp - prohibits the display of the lines from n to m.
1663

1664 Typical Usage:


sed 3,10d myfile - outputs the contents of myfile but with lines 3-
10 deleted.
1665
sed s/hello/goodbye/ myfile - outputs the contents of myfile but with the first
occurrence of hello to goodbye.
1666

1667 The Pipe Character

1668 The pipe character | is used to put commands in a pipeline. The output of
1669 the previous command is passed on to the next.
1670 Typical Usage:
grep EE /var/log/Xorg.0.log | less - generates a list of lines with the char-
acters EE in /var/log/Xorg.0.log that
1671 can be browsed.
cat myfile | sed s/hello/hi/g - outputs the contents of myfile but
changes all instances of hello to hi.
1672

1673 Redirecting Outputs

1674 Outputs of commands can be redirected into a file using the greater than (>)
1675 character.
1676 Typical Usage:

118
Chapter 9. Using the Terminal/Commandline Bayanihan Linux 5

grep EE /var/log/Xorg.0.log > XorgErrors - creates a file called


XorgErrors with contents
from the output of the grep
command. If the file already
1677 exists, it simply overwrites it.
grep WW /var/log/Xorg.0.log >> XorgWarnings - appends the file XorgWarnings
with the output of the grep com-
mand. If the file doesnt exist, it
creates it.
1678

1679 man - The Manual Pages

1680 More information about these and other commands can be obtained by using the
1681 man command. This invokes the reference manuals for each command.
1682 Syntax: man [command]

1683 The TAB Key

1684 The TAB key is the command completion key. Pressing the TAB once after the
1685 first few letters are typed on the console completes the command. In case when
1686 more than one command share the same first few letters, pressing the TAB twice
1687 shows a list of the commands that share common first letters.
1688

1689 The ALT+. Key Combination

1690 The combination of ALT + . (dot) keys invokes the last argument of the last
1691 command. If repeatedly pressed, it scrolls through the last argument of the pre-
1692 vious commands.
1693

1694 9.7 Text Editors

1695 Vim

1696 From the manual page at man:/vim


1697

119
Bayanihan Linux 5 Chapter 9. Using the Terminal/Commandline

1698 Vi IMproved, a programmers text editor.


1699 Vim is a text editor that is upwards compatible to Vi. It can be used to edit all
1700 kinds of plain text. It is especially useful for editing programs.
1701 There are a lot of enhancements above Vi: multi level undo, multi windows
1702 and buffers, syntax highlighting, command line editing, filename completion, on-
1703 line help, visual selection, etc. See :help vi diff.txt for a summary of the
1704 differences between Vim and Vi.
1705 To run this command, type vim in a terminal which displays the following screen:

Figure 9.2: Vi Improved Opening Screen

1706 Nano

1707 From the manual page at man:/nano


1708

1709 Nanos ANOther editor is an enhanced free Pico clone.


1710 nano is a small, free, and friendly editor which aims to replace Pico, the default
1711 editor included in the non-free Pine package. Rather than just copying Picos look
1712 and feel, nano also implements some missing (or disabled by default) features in
1713 Pico, such as search and replace and go to line and column number.

120
Chapter 9. Using the Terminal/Commandline Bayanihan Linux 5

1714 To run this command, type nano in a terminal which displays the following screen:

Figure 9.3: Nano Editor Interface

1715 Midnight Commander

1716 From the manual page at man:/mc


1717

1718 GNU Midnight Commander is a directory browser/file manager for Unix-like op-
1719 erating systems.
1720 The screen of the Midnight Commander is divided into four parts. Almost all
1721 of the screen space is taken up by two directory panels. By default, the second
1722 line from the bottom of the screen is the shell command line, and the bottom line
1723 shows the function key labels. The topmost line is the menu bar line. The menu
1724 bar line may not be visible, but appears if you click the topmost line with the
1725 mouse or press the F9 key.
1726 The Midnight Commander provides a view of two directories at the same time.
1727 One of the panels is the current panel (a selection bar is in the current panel).
1728 Almost all operations take place on the current panel. Some file operations like
1729 Rename and Copy by default use the directory of the unselected panel as a des-
1730 tination (dont worry, they always ask you for confirmation first). For more
1731 information, see the sections on the Directory Panels, the Left and Right Menus

121
Bayanihan Linux 5 Chapter 9. Using the Terminal/Commandline

1732 and the File Menu.


1733 You can execute system commands from the Midnight Commander by simply
1734 typing them. Everything you type will appear on the shell command line, and
1735 when you press Enter the Midnight Commander will execute the command line
1736 you typed; read the Shell Command Line and Input Line Keys sections to learn
1737 more about the command line.
1738 To run this command, type mc in a terminal which displays the following screen:

Figure 9.4: Midnight Commander

122
1739

1740 CHAPTER

1741 TEN
1742

1743 System Administration

1744 Chapter Author : Rage Callao


1745

1746 10.1 Installing/Removing/Upgrading software

1747 Every operating system has a way of installing and removing software. There
1748 are several ways to install an application in Bayanihan Linux and it is somewhat
1749 different from what users of other operating systems are used to. Nevertheless it
1750 is quite easy to learn how to do.
1751 The following sections describe the apt, Synaptic and aptitude tools as well as
1752 several guides on installing some commonly used applications that cannot be
1753 shipped with Bayanihan but are freely available.
1754 It is also possible to install some WindowsTM applications. See Chapter 7.

1755 Synaptic Package Manager

1756 Synaptic (shown in Figure 10.1) is a graphical package manager that you can use
1757 to easily add/remove packages (also called software applications in other oper-
1758 ating systems).
1759

123
Bayanihan Linux 5 Chapter 10. System Administration

Figure 10.1: Synaptic Package Manager

1760 To run this application, simply click on the link found at the Menu:

1761 System Synaptic Package Manager

1762 Configuring/Using Synaptic

1763 In order to perform the following steps, you will need a connection to the internet
1764 as discussed in Chapter 4
1765 Once you have an internet connection, configure Synaptic to fetch the list of
1766 available packages for your system. Do this by clicking Settings Reposito-
1767 ries as shown in Figure 10.2. A new window will appear (shown in Figure 10.3)
1768 displaying several lines with unchecked boxes. Check the box beside the text
1769 deb http://apt.bayanihan.gov.ph/kalumbata then click Ok. Click Ok again when
1770 the Repositories changed window appears then click the Reload button to update
1771 the list of available packages for your system.

124
Chapter 10. System Administration Bayanihan Linux 5

Figure 10.2: Settings Repositories Figure 10.3: Repositories

1772 The square icons at the leftmost column describe the status of each individual
1773 package. Click Help Icon legend in the menubar to see a description of the
1774 meanings of these icons as shown in Figure 10.4. To select a package for instal-
1775 lation or removal, simply click on its icon and select the appropriate item in the
1776 pop-up menu.

Figure 10.4: Icon legend

125
Bayanihan Linux 5 Chapter 10. System Administration

1777 apt, aptitude, dpkg, tasksel

1778 The following tools can only be run inside a console (see Chapter 9) as root
1779 (administrator). For this, you need to su, sudo or sux to gain root privileges.
1780 So for example, if you wanted to run aptitude as root, then you would do the
1781 following in a console:

rage@bl5dev:~$ su
Password: <type root password here>
bl5dev:/home/rage# aptitude

1782 Apt is a commandline package manager without the graphical interface like that
1783 of Synaptic or aptitude. Its manual page can be accessed by typing man apt
1784 inside a console or typing man:/apt via Alt+F2.
1785 The configuration files for apt resides in the /etc/apt directory. You will need
1786 to edit the file /etc/apt/sources.list and add repositories such as http://apt.
1787 bayanihan.gov.ph to query. The entries are typically of the format:
1788 deb http://apt.bayanihan.gov.ph/kalumbata stable main contrib non-free

1789 For example, to install the package apache from the commandline using apt you
1790 would do the following in a console:

rage@bl5dev:~$ su
Password: <type root password here>
bl5dev:/home/rage# apt-get updates
bl5dev:/home/rage# apt-get install apache

1791 Aptitude, shown in Figure 10.5 is a console-mode package manager with similar
1792 features to Synaptic. Its manual page can be accessed by typing man aptitude
1793 inside a console or typing man:/aptitude via Alt+F2.
1794 When it runs, it reads the same configuration files as apt located at /etc/apt/.
1795 Shortcut commands are accessed by pressing Shift+?. For instance to install or
1796 upgrade a package, use the arrow keys to highlight its name then press +. To
1797 remove a package, use the arrow keys to highlight its name then press -. To hold
1798 a package in order to prevent future upgrades, press =. To keep a package at its
1799 currently state, press :.

126
Chapter 10. System Administration Bayanihan Linux 5

1800 After marking the packages you would like to remove or install, press g and then
1801 press g again to confirm. The application will now proceed and apply these
1802 changes to your system. To cancel the process, press Ctrl+C.
1803 To return to previous screens, press q. To exit, continue pressing q until you see
1804 the prompt confirming that you want to exit the program.
1805 dpkg is a more advanced commandline tool for installing, removing or configuring
1806 packages. Its manual page can be accessed by typing man dpkg inside a console
1807 or typing man:/dpkg via Alt+F2.
1808 Typically, this tool is used to manually install files with a *.deb extension. For
1809 example, say you downloaded a package called superduperapp.deb and want to
1810 install it, you would do the following in a console:

rage@bl5dev:~$ su
Password: <type root password here>
bl5dev:/home/rage# dpkg -I superduperapp.deb
bl5dev:/home/rage# dpkg -i superduperapp.deb

Figure 10.5: aptitude

127
Bayanihan Linux 5 Chapter 10. System Administration

1811 Unlike apt, Synaptic and aptitude, this tool cannot automatically install other
1812 packages that is depended upon by the package you are trying to install. It is up
1813 to you to manually install the packagess dependencies.
1814 This tool can also be used to list packages which have been installed in the system
1815 (dpkg -l), view the status of each package (dpkg -s packagename) or list the
1816 files installed by a particular package (dpkg -L packagename).

1817 Extras

1818 There are thousands of software available for you to use in your Bayanihan Linux
1819 system. Most of these are distributed freely from our repository at http://apt.
1820 bayanihan.gov.ph. However, there are those which cannot be freely redistributed
1821 but can easily be obtained from the authors or publishers website.

1822 Installing RealPlayer

1823 RealPlayer is a multimedia player capable of playing streaming video from the
1824 web.
1825 Go to http://www.real.com and click on the link Linux / Unix Player at the
1826 bottom of the page. You will be redirected to a new page where you can download
1827 the Linux packages. Then click on the link DEB Package. After downloading the
1828 file, open a terminal, navigate to where you downloaded it and type the command
1829 dpkg -i RealPlayer11GOLD.deb to install this application. A configuration
1830 wizard will pop-up the first time you run this application.
1831 To run this application, simply click on the link found at the Menu:

1832 Multimedia RealPlayer 11 - Media Player

1833 Installing Acrobat Reader

1834 Adobe Reader is a multi-platform PDF viewer.


1835 Go to http://get.adobe.com/reader/otherversions/ and select Linux - x86
1836 (*.deb) from the Select an operating system drop-down menu then click Continue.
1837 Click the Download now button and save the file to your system. Next, open
1838 a terminal and navigate to where you saved the file then type the command
1839 dpkg -i AdobeReader_enu-8.1.3-1.i386.deb.
1840 To run this application, simply click on the link found at the Menu:

128
Chapter 10. System Administration Bayanihan Linux 5

1841 Office Adobe Reader 8 - PDF Viewer

1842 Installing Flash Player Plugin

1843 Athough, gnash, a free and open source flash player is shipped with Bayanihan,
1844 there are many websites that require the Adobe Flash Player plugin to be in-
1845 stalled. To install this plugin, go to http://www.adobe.com and click Download
1846 Flash Player. You will be prompted to accept the license. Once you accept, save
1847 the file into your /home folder and extract its contents by right-clicking on the file
1848 in Konqueror and selecting Extract Extract here. Then copy the file libflash-
1849 player.so into /.mozilla/plugins folder. Restart FireFox for this change to take
1850 effect.

1851 Installing Java Plugin

1852 Go to http://www.java.com and download the self-extracting archive. Open a


1853 console, change into the directory where the downloaded file is kept and run the
1854 commands below. After that restart FireFox for the changes to take effect.

rage@bl5dev:~$ su
Password: <type root password here>
bl5dev:/home/rage# cd Downloads
bl5dev:/home/rage/Downloads# sh jre-6u11-linux-i586.bin
<Press Enter at the more prompt to scroll to the end.>

Please enter "yes" or "no".


Do you agree to the above license terms? [yes or no]
<Type yes then press Enter>
bl5dev:/home/rage/Downloads# mkdir -p /usr/lib/java
bl5dev:/home/rage/Downloads# mv jre1.6.0_11 /usr/lib/java/
bl5dev:/home/rage/Downloads# <Press Ctrl-D to leave root>
rage@bl5dev:~/Downloads$ cd ../
rage@bl5dev:~$ ln -sf /usr/lib/java/jre1.6.0_11/plugin/i386/ \
ns7/libjavaplugin_oji.so ~/.mozilla/plugins/

1855 Installing Mozilla FireFox

1856 Bayanihan Linux is bundled with the latest version of the Mozilla FireFox web
1857 browser. This section describes how you can manually download the latest version

129
Bayanihan Linux 5 Chapter 10. System Administration

1858 without using a package management system such as Synaptic, apt or aptitude.
1859 There are consequences to installing this application manually. For instance, you
1860 will need to manually update this package yourself when a new version comes out.
1861 Go to http://www.mozilla.com and click the download link then save the file
1862 to your computer. Using Konqueror navigate to where you downloaded the file
1863 right-click on the file and select Extract Extract to firefox-3.0.5. Navigate to the
1864 extracted folder and then double-click the file firefox.

1865 Installing Mozilla Thunderbird

1866 Mozilla Thunderbird is a multi-platform email client.


1867 Go to http://www.mozilla.com and click the Thunderbird link then click the
1868 download link and save the file to your computer. Using Konqueror navigate to
1869 where you downloaded the file right-click on the file and select Extract Extract
1870 to thunderbird-2.0.0.19. Navigate to the extracted folder and then double-click the
1871 file thunderbird.

1872 10.2 KDE Control Center

1873 The KDE Control Center (kcontrol) is the central configuration utility for the K
1874 Desktop Environment. It is made up of multiple modules grouped into categories
1875 and each module is used to configure the different parts of the system.
1876 To run this application, simply click on the link found at the Menu:

1877 Control Center

1878 Appearance & Themes

1879 This module allows you to change various settings related to how your desktop
1880 looks. You can select the background, set colors and fonts and more. More
1881 information regarding this module can be found by clicking on the Help button.

1882 Desktop

1883 This module allows you to change how different components of the desktop feels
1884 or behaves. For instance, you can set whether the system displays mountable

130
Chapter 10. System Administration Bayanihan Linux 5

1885 devices on your desktop and how many virtual desktops to enable.

1886 Internet & Network

1887 This module configures settings related to the network. However, this should not
1888 be necessary in most cases since Bayanihan Linux 5 can now automatically detect
1889 the network and configure network devices using network-manager.

1890 KDE Components

1891 This module allows you to configure your KDE session, the default applications
1892 as well as enable/disable system services.

1893 Peripherals

1894 This module allows you to change the various settings associated with the devices
1895 attached to your computer such as the keyboard, mouse, display and printers.

Figure 10.6: KDE Control Center

131
Bayanihan Linux 5 Chapter 10. System Administration

1896 Regional & Accessibility

1897 This module allows you to configure keyboard layouts, select the region where the
1898 computer is located and enable/disable accessibility features.

1899 Security & Privacy

1900 This module allows you to set the information regarding your account, set ciphers
1901 to use and other privacy settings.

1902 Sound & Multimedia

1903 This module lets you configure various settings for your audio device as well as
1904 system notifications.

1905 System Administration

1906 This module lets you configure various system components such as the login
1907 screen, install fonts and set the systems date and time.

1908 10.3 Managing Printers

1909 Managing printers in Bayanihan Linux is done through the Control Center module
1910 shown in Figure 10.7 or via the menu shortcut Menu Settings Printer
1911 You can also configure printers via the CUPS web interface which you can access
1912 by running a web browser such as FireFox or Konqueror and entering the following
1913 at the address bar: http://localhost:631
1914 Another method if you have an HP printer is to use HPLIP Toolbox which you
1915 can run via the link in the Menu:

1916 System HPLIP Toolbox - Printer Toolbox

132
Chapter 10. System Administration Bayanihan Linux 5

Figure 10.7: Printer configuration

1917 10.4 Managing Private Folders

1918 Private Folders is a new feature in Bayanihan Linux allowing users to create an
1919 encrypted folder in their /home folders for them to be able to store files in a secure
1920 fashion. This encrypted folder is only accessible by the user that created it and
1921 is automatically opened and closed on login and logout.
1922 To enable your encrypted Private folder, simply run the wizard via the Menu:

1923 Settings Private folder configuration

1924 10.5 Setting up a firewall with Guarddog

1925 Guarddog is a user friendly firewall generation and management utility for KDE
1926 running on Linux. It allows you to simply specify which network protocols should
1927 be allowed between which groups of computers without requiring you to have
1928 knowledge of port numbers or packets. Guarddog is built on top of Linuxs
1929 ipchains and iptables packet filtering commands. For more information, press
1930 Alt+F2, type the command help:/guarddog then press Enter.
1931 To run this application, simply click on the link found at the Menu:

133
Bayanihan Linux 5 Chapter 10. System Administration

Figure 10.8: Guarddog

1932 Internet Guarddog - Firewall configuration utility

1933 10.6 Updating/Using Klamav

1934 Linux has a reputation for being immune to viruses. However, it is normally a
1935 good policy for organizations that work in mixed-environments (Windows and
1936 non-Windows PCs in the same network) to implement virus-free computing by
1937 scanning files that are frequently shared before sending them over the network.
1938 This is where an anti-virus manager will come in.
1939 KlamAV is an anti-virus manager for the KDE desktop that allows you to manage
1940 your virus-scanning, scheduling, virus research and software/database updates.
1941 A graphical wizard will run the first time you use this application. You can
1942 safely accept the defaults and press Skip. You will need an internet connection to
1943 download virus updates for KlamAV.
1944 To run this application, simply click on the link found at the Menu:

1945 System KlamAV - Anti-Virus Manager

134
Chapter 10. System Administration Bayanihan Linux 5

Figure 10.9: Klamav

1946 10.7 Managing users with Kuser/Adduser/Deluser

1947 Adding/removing users or groups is easily done using KUser. More information
1948 can be found by pressing Alt+F2 and entering the command help:/kuser.
1949 To run this application, simply click on the link found at the Menu:

1950 System KUser - User Manager

Figure 10.10: KUser

135
Bayanihan Linux 5 Chapter 10. System Administration

136
1951

1952 CHAPTER

1953 ELEVEN
1954

1955 Special Topics

1956 11.1 Installing a C/C++ development environ-


1957 ment

1958 Section Author : Rage Callao


1959

1960 Several packages need to be installed in order to compile C/C++ source files.
1961 You can use any of the available tools for installing packages as described in sec-
1962 tion 10.1 in page 123. For the rest of this section we will be using commandline
1963 tools so you should already be familiar with using the console (see Chapter 9) and
1964 a text editor like vi, nano or MC.
1965

1966 Open a terminal: Menu System Konsole - Terminal Program


1967

1968 And enter the commands below:

rage@bl5dev:~$ su
Password: <enter your root password here>
bl5dev:/home/rage# apt-get update
bl5dev:/home/rage# apt-get install build-essential

137
Bayanihan Linux 5 Chapter 11. Special Topics

1969 Optionally install the following:

1970 fakeroot
1971 autotools-dev
1972 dh-make
1973 automake1.9

1974 Additionally, if you want to build sources that depend on the graphical toolkits
1975 (such as Xorg, or Qt) you will need to install the following:

1976 xorg-dev
1977 libqt3-mt-dev
1978 kdelibs4-dev
1979 libglu1-mesa-dev
1980 qt3-designer
1981 qt3-linguist

1982 11.2 Compiling a custom kernel or third-party


1983 driver

1984 If you need to compile your own custom kernel or driver you will need to download
1985 and install the following packages:

1986 kernel-package
1987 module-assistant
1988 libncurses5-dev
1989 linux-headers-2.6-686
1990 fakeroot

1991 To compile your own custom kernel, you will need to:

1992 1. Download a kernel tarball acompressedf ile from http://www.kernel.org.

138
Chapter 11. Special Topics Bayanihan Linux 5

1993 2. Extract the tarball to a folder of your choice.

1994 3. cd (change directory) into the extracted folder.

1995 4. Run make menuconfig to configure the kernel.

1996 5. Edit /etc/kernel-pkg.conf and edit the maintainer and email fields.

1997 6. Run fakeroot make-kpkg --initrd --revision=CUSTOM-1 binary

1998 Warning: Compiling a custom kernel is for experts and advanced users and may
1999 render your machine unbootable. Before performing the installation of custom
2000 self-compiled kernels, make sure to backup your data.
2001 To compile a third-party module, you will need to:

2002 1. Download the module sources.

2003 2. Extract the sources to a folder of your choice.

2004 3. cd (change directory) into the extracted folder.

2005 4. Typically, run make and then make install

2006 11.3 Installing a webserver

2007 Section Author : Pearliezl S. Dy Tioco


2008 Setting this all up assumes you have a running version of Linux already installed.
2009 I wont walk you through that part.
2010
like to use, Id
If you dont have one and have an old box youd suggest using Debian
2011 as we are about to. But if you are new to Linux, you might want to try using a
2012 hard disk installation of Knoppix as the procedure will be identical.
2013 Of course, you arent limited to Linux exclusively. All elements of LAMP have
2014 been ported to most operating systems.

2015 Setting up Apache

2016 For the actual web server portion of our web server well be using Apache 2. In
2017 addition to being free and open source, Apache is by far the most used web server
2018 software on the Web.

139
Bayanihan Linux 5 Chapter 11. Special Topics

2019 Either shell or connecting remotely, well start by checking for updates to the
2020 Debian package lists. This will require root access.
2021 The package lists are updated, well tell Linux to go grab Apache. To fully install
2022 Apache, well need more than one package. Thanks to Debians APT, well be
2023 able to download and install all those dependencies with minimal work.

bayanihan:/home/pearliezl# apt-get install apache2


Reading Package Lists... Done
Building Dependency Tree... Done
The following extra packages will be installed:
apache2-common apache2-mpm-worker apache2-utils
Suggested packages:
apache2-doc lynx www-browser
The following NEW packages will be installed:
apache2 apache2-common apache2-mpm-worker apache2-utils
0 upgraded, 4 newly installed, 0 to remove and 5 not upgraded.
Need to get 1097kB/1131kB of archives.
After unpacking 4018kB of additional disk space will be used.
Do you want to continue? [Y/n] y

2024 Although it isnt a requirement, APT suggested installing the Apache documen-
2025 tation. So well go ahead and install that just in case. It suggested Lynx too but
2026 we probably wont be needing that.

bayanihan:/home/pearliezl# apt-get install apache2-doc


Reading Package Lists... Done
Building Dependency Tree... Done
The following NEW packages will be installed:
apache2-doc
0 upgraded, 1 newly installed, 0 to remove and 5 not upgraded.
Need to get 0B/3861kB of archives.

2027 Now well do a quick check to verify Apache is running.

bayanihan:/home/pearliezl# /etc/init.d/apache2 start


Starting web server: Apache2httpd (pid 11205) already running

140
Chapter 11. Special Topics Bayanihan Linux 5

2028 So it looks like Apache is running, but lets not take that scripts word for it.
2029 I mean, were setting up a web server so why not use a web browser? To do
2030 this, just plug the IP address of your server into the address box of your favorite
2031 browser. This should forward you to http://servername/apache2default/ where
2032 youll find a page congratulating you on your successful Apache installation.
2033 If youd like to start by editing this sample page, its easy enough to do. The
2034 default Apache files are stored in /var/www/apache2default on your server.
2035 To edit the English version of the page, well just have to use Nano (or another
2036 text editor) to edit /var/www/apache2default/index.html.en.

bayanihan:/home/pearliezl# nano /var/www/apache2-default/index.html.en

2037 If youd like to play with a few of Apaches settings, the main configuration
2038 file is /etc/apache2/apache2.conf. Since by default Debian will allow external
2039 connections to Apache, you may want to limit connections to your localhost or
2040 local network only.
2041 Go to this file /etc/apache2/apache2.conf for apache setting.

bayanihan:/home/pearliezl# nano /etc/apache2/apache2.conf

Change this line from ServerRoot /etc/apache2 to ServerRoot /var/www


Change this line from PidFile AP ACHEP IDF ILEtoP idF ile/var/run/apache2.pidEn
DocumentRoot/var/wwwU serwww dataGroupwww data
2042 If youd like to make web folders for individual accounts, all that is needed to
2043 make a directory in the users home directory called /public html. For example,
2044 if your username is pearliezl, youll need to mkdir /home/pearliezl/public html.
2045 Files stored in that directory will then be viewable in your web browser at the
2046 address http://servername/ pearliezl/.
2047 At this point, if all you want to work on and host are static pages, you are done.
2048 But for those who want to do more interesting things using the LAMP platform,
2049 well move on.

141
Bayanihan Linux 5 Chapter 11. Special Topics

2050 Setting up MySQL

2051 There are plenty of Apache-friendly database servers available, but MySQL is
2052 certainly a popular option. Again, this one is free and open source.
2053 Well start by installing MySQL in a manner similar to the way we installed
2054 Apache.

bayanihan:/home/pearliezl# apt-get install mysql-server


The following extra packages will be installed:
libdbd-mysql-perl libmysqlclient12 mysql-client mysql-common
Suggested packages:
mysql-doc
The following NEW packages will be installed:
libdbd-mysql-perl libmysqlclient12 mysql-client mysql-common mysql-server
0 upgraded, 5 newly installed, 0 to remove and 5 not upgraded.
Need to get 4523kB of archives.
After unpacking 10.5MB of additional disk space will be used.
Do you want to continue? [Y/n] y

2055 Once MySQL begins to install, well get a brief warning screen. This is mainly to
2056 fill us in a little on how passwords will work. By default, the root user MySQL
2057 has no password (something you will want to change for a public server).
2058 Before moving on, well make sure the MySQL service is running.

bayanihan:/home/pearliezl# /etc/init.d/mysql start


Starting MySQL database server: mysqld...already running.

2059 If youd like to change some of MySQLs settings from their default values, take
2060 a look at the files located in /etc/mysql.
2061 As with Apache, APT suggests we install the MySQL documentation. Just to be
2062 safe, well go ahead and do that.

bayanihan:/home/pearliezl# apt-get install mysql-doc


Reading Package Lists... Done
Building Dependency Tree... Done
Package mysql-doc is not available, but is referred to by another package.

142
Chapter 11. Special Topics Bayanihan Linux 5

This may mean that the package is missing, has been obsoleted, or
is only available from another source
E: Package mysql-doc has no installation candidate

2063 Unfortunately, this package has been removed from Debian. So if we want the
2064 documentation, well have to grab the documents directly from MySQL.com.
2065 If you are already comfortable using MySQL from the command line, you can
2066 probably skip the section on phpMyAdmin further down. But if you arent,
2067 phpMyAdmin will make your life much easier.

2068 Setting up PHP

2069 While HTML is a useful markup language, it lacks the sophisticated scripting
2070 ability that the modern Web user expects. This is where scripting languages like
2071 JavaScript, ASP, and PHP are needed. In particular, server-side scripts like those
2072 used in PHP and ASP provide a framework for building security-minded Web
2073 interfaces.
2074 It is with good reason that most Linux-based hosts use PHP over ASP (and not
2075 because LAMA just doesnt sound all that desirable). PHP is a completely free
2076 and open source operating system. Cost aside, there are security considerations
2077 here. PHP has certainly not had a spotless record of security, but flaws are found
2078 much more quickly and are fixed almost immediately.
2079 Now if you really want to use ASP, Apache can be made to support it. However,
2080 support is limited.
2081 Most of us, though, are using PHP (hence the popularity of LAMP) so well go
2082 ahead and set it up. Again, this starts on the command line.

bayanihan:/home/pearliezl# apt-get install php5


Reading Package Lists... Done
Building Dependency Tree... Done
The following extra packages will be installed:
apache-common libapache-mod-php4
Suggested packages:
apache apache-ssl apache-perl php4-pear
The following NEW packages will be installed:
apache-common libapache-mod-php4 php4
0 upgraded, 3 newly installed, 0 to remove and 5 not upgraded.
Need to get 2460kB of archives.

143
Bayanihan Linux 5 Chapter 11. Special Topics

After unpacking 6357kB of additional disk space will be used.


Do you want to continue? [Y/n] y

2083 Since we will be using both PHP and MySQL on our server, well go ahead and
2084 install the PHPs MySQL module to help them play together better. Well also
2085 install PHPs Pear extensions since so many packages will require it.

bayanihan:/home/pearliezl# apt-get install php5-mysql php5-pear


Reading Package Lists... Done
Building Dependency Tree... Done
The following extra packages will be installed:
php5-cli
Suggested packages:
php5-dev
The following NEW packages will be installed:
php5-cli php5-mysql php5-pear
0 upgraded, 3 newly installed, 0 to remove and 5 not upgraded.
Need to get 1860kB/1882kB of archives.
After unpacking 5095kB of additional disk space will be used.
Do you want to continue? [Y/n] y

2086 There are a few other packages well need to install to get Apache working with
2087 PHP.

bayanihan:/home/pearliezl# apt-get install libapache2-mod-php5 php5-cgi


Reading Package Lists... Done
Building Dependency Tree... Done
The following extra packages will be installed:
apache2-mpm-prefork
The following packages will be REMOVED:
apache2-mpm-worker
The following NEW packages will be installed:
apache2-mpm-prefork libapache2-mod-php4 php4-cgi
0 upgraded, 3 newly installed, 1 to remove and 5 not upgraded.
Need to get 5024kB of archives.
After unpacking 9441kB of additional disk space will be used.
Do you want to continue? [Y/n] y

2088 All the necessary packages are installed, but we arent quite done yet. Using your
2089 favorite text editor, well need to make some changes to /etc/apache2/apache2.conf.

144
Chapter 11. Special Topics Bayanihan Linux 5

2090 First, locate the line #AddType application/xhttpdphp .php and uncomment
2091 the line by removing the # from the beginning. Next, well need to add the line
2092 below.
2093 LoadModule php4 module /usr/lib/apache2/modules/libphp5.so
2094 To get those changes to take effect, well have to restart Apache. If we dont, web
2095 browsers will be downloading our full PHP files rather than Apache processing
2096 them first.
2097 bayanihan:/home/pearliezl# /etc/init.d/apache2 restart
2098 To show that PHP is working, well make a small PHP file and stick it in our web
2099 folder. Within the directory /home/pearliezl/public html, Im going to add a file
2100 called index.php with the following contents:

2101 <?php
2102 phpinfo();
2103 ?>

2104 This will generate a PHP page at http://servername/ pearliezl/ that will tell us
2105 a lot about our PHP installation.

2106 Setting up phpMyAdmin

2107 Dont listen to the people wholl tell you that you are cheating if you dont run
2108 MySQL from the command line. Not only is that method more difficult, but you
2109 risk doing more damage if you make a mistake.
2110 phpMyAdmin is a web interface designed specifically for administering MySQL.
2111 While there are times that MySQL is best used directly (like when you are moving
2112 a 50 MB database to a new co-located server), phpMyAdmin is commonly used
2113 to handle day-to-day database issues.
2114 The installation of phpMyAdmin is fairly straightforward.

bayanihan:/home/pearliezl\# apt-get install phpmyadmin


Reading Package Lists... Done
Building Dependency Tree... Done
Suggested packages:
php5-gd
The following NEW packages will be installed:
phpmyadmin

145
Bayanihan Linux 5 Chapter 11. Special Topics

0 upgraded, 1 newly installed, 0 to remove and 5 not upgraded.


Need to get 2768kB of archives.

2115 Once the installation begins, well be presented with a question about which web
2116 servers to reconfigure. Since we used Apache2, be sure to check that. When
2117 prompted, go ahead and have Apache2 restarted.
2118 To test out phpMyAdmin, well first point our web browser to http://servername/phpmyadmin/.
2119 We will connect using the username root and a blank password. Once we do,
2120 phpMyAdmin will greet us with stern warning about our blank password. Click-
2121 ing on Change password will allow us to set one and get rid of that warning.

2122 11.4 Installing an ftp/file server

2123 11.5 Installing an email server

2124 Section Author : Pearliezl S. Dy Tioco


2125

2126 This guide will show you how to setup Postfix mail server running alongside Cyrus
2127 SASL, Courier-IMAP and SquirrelMail. Once everything is setup you will be able
2128 to read and write emails using the SquirrelMail web interface and be able to access
2129 your email anywhere in the world!
2130 Install and Configure Postfix Postfix requires a DNS service running otherwise it
2131 will not work, follow this Debian Lenny Bind Howto guide if required. During the
2132 Postfix installation, Select Internet Site and enter your domain name for System
2133 mail name, ie example.com
2134 # apt-get install postfix
2135 Make sure you read the comments and change accordingly.
2136 # nano /etc/postfix/main.cf
2137 smtpd banner = $myhostname ESMTP $mail name (example.com) biff = no ap-
2138 pend dot mydomain = no
2139 ### your hostname here myhostname = server
2140 mydomain = example.com myorigin = $mydomain inet interfaces = all mydesti-
2141 nation = $mydomain, localhost.$mydomain, localhost

146
Chapter 11. Special Topics Bayanihan Linux 5

2142 ### your allowed networks mynetworks = 127.0.0.0/8,192.168.1.0/24


2143 smtpd sasl auth enable = yes smtpd sasl security options = noanonymous smtpd sasl local d
2144 = $mydomain broken sasl auth clients = yes
2145 smtpd require helo = yes smtpd helo restrictions = permit mynetworks, reject unknown clie
2146 reject invalid hostname, reject unknown hostname, reject non fqdn helo hostname
2147 smtpd client restrictions = permit mynetworks, reject unknown client, reject unknown addr
2148 smtpd sender restrictions = permit mynetworks, reject unknown client, reject unknown add
2149 smtpd recipient restrictions = permit mynetworks, permit sasl authenticated, re-
2150 ject unknown client, reject unauth destination
2151 home mailbox = Maildir/ alias maps = hash:/etc/aliases
2152 ### your ISP SMTP relay relayhost = relay.yourisp.net
2153 smtpd recipient limit = 250
2154 readme directory = /usr/share/doc/postfix html directory = /usr/share/doc/postfix/html
2155 Setup Postfix SASL Authentication
2156 # nano /etc/postfix/sasl/smtpd.conf
2157 pwcheck method: saslauthd mech list: plain login
2158 Aliases are used to map names with email accounts. This example will map all
2159 mail for root with you@example.com. You can add as many aliases as you like,
2160 my.nick and my.name are just examples.
2161 # nano /etc/aliases
2162 postmaster: root root: you@example.com my.nick: you@example.com my.name:
2163 you@example.com
2164 # newaliases
2165 Install SASL Authentication Edit saslauthd and change START=yes, dont touch
2166 the rest of the configuration.
2167 # apt-get install sasl2-bin libsasl2-2 libsasl2-modules # nano /etc/default/saslauthd
2168 START=yes
2169 We need to make sure chrooted Postfix can communicate with saslauthd.
2170 # rm -r /var/run/saslauthd/ # mkdir -p /var/spool/postfix/var/run/saslauthd #
2171 ln -s /var/spool/postfix/var/run/saslauthd /var/run # chgrp sasl /var/spool/postfix/var/ru
2172 # adduser postfix sasl
2173 Install Courier-IMAP During the install process it will ask Create directories for

147
Bayanihan Linux 5 Chapter 11. Special Topics

2174 web-based administration? say No.


2175 # apt-get install courier-imap # nano /etc/courier/authmodulelist
2176 authdaemon
2177 Install Squirrelmail
2178 # apt-get install squirrelmail # ln -s /etc/squirrelmail/apache.conf /etc/apache2/conf.d/squirrelmail.c
2179 # ln -s /usr/share/squirrelmail squirrelmail /var/www/squirrelmail # chgrp -R
2180 www-data /usr/share/squirrelmail/
2181 Add User and Setup Mailbox You will be asked for user you password, make sure
2182 you remember this password as this account will be used to access your email.
2183 # adduser you # su you $ maildirmake.courier /home/you/Maildir
2184 Start Postfix, Cyrus SASL, Courier-IMAP and Apache
2185 # /etc/init.d/postfix start # /etc/init.d/courier-imap start # /etc/init.d/courier-
2186 authdaemon start # /etc/init.d/saslauthd start # /etc/init.d/apache2 restart
2187 Test Postfix SMTP with Telnet This will create a string for SASL authentication,
2188 dont forget to insert 0 when they are needed.
2189 # perl -MMIME::Base64 -e print encode base64(you0you0yourPASSWORD);
2190 eW91AHlvdQB5b3VyUEFTU1dPUkQ=
2191 Now we can telnet into the Postfix SMTP server and send a test email. Type in
2192 the commands in the places where I have indicated
2193 # telnet 192.168.1.20 25
2194 220 debian ESMTP Postfix (example.com) EHLO LOCALHOST 250-debian
2195 250-PIPELINING 250-SIZE 10240000 250-VRFY 250-ETRN 250-AUTH PLAIN
2196 LOGIN 250-AUTH=PLAIN LOGIN 250-ENHANCEDSTATUSCODES 250-8BITMIME
2197 250 DSN AUTH PLAIN eW91AHlvdQB5b3VyUEFTU1dPUkQ= 235 2.7.0 Au-
2198 thentication successful MAIL FROM:you@example.com 250 2.1.0 Ok RCPT
2199 TO:you@example.com 250 2.1.5 Ok DATA 354 End data with . THIS IS
2200 A TEST MESSAGE!! . 250 2.0.0 Ok: queued as 832291812D QUIT 221
2201 2.0.0 Bye
2202 Check Squirrelmail Fire up, http://example.com/squirrelmail and log in as the
2203 user you we created previously, hopefully you should see the test email we sent
2204 using telnet! You should now be able to send and receive email. Make sure the
2205 MX record in your registered domain name is pointing at your box, and you have
2206 forwarded port 25 on your firewall.

148
Chapter 11. Special Topics Bayanihan Linux 5

2207 11.6 Configuring NFS

2208 Section Author : Pearliezl S. Dy Tioco


2209

2210 1. Introduction 1.1 What is NFS?


2211 The Network File System (NFS) was developed to allow machines to mount a
2212 disk partition on a remote machine as if it were on a local hard drive. This allows
2213 for fast, seamless sharing of files across a network.
2214 It also gives the potential for unwanted people to access your hard drive over the
2215 network if you set it up incorrectly. So please read the Security section of this
2216 document carefully if you intend to implement an NFS setup.
2217 There are other systems that provide similar functionality to NFS. Samba provides
2218 file services to Windows clients. The Andrew File System fro IBM, recently open-
2219 sourced, provides a file sharing mechanism with some additional secutiry and
2220 performance features. The Coda File System is still in development as of this
2221 writhing but is designed to work well with disconected clients. Many of the
2222 features of the Andrew and Coda file systems are slated for inclusion in the next
2223 version of NFS (Version 4). The advantage of NFS today is that it is mature,
2224 standard, well understood, and supported robustly across a variety of platforms.
2225 1.2 The Purpose of this Document
2226 What is the HOWTO and what is it NOT?
2227 This HOWTO is intended as a complete, step-by-step guide to setting up NFS
2228 correctly and effectively. Setting up NFS involves two steps, namely configuring
2229 the server and then configuring the client. Each of these steps is dealt with in
2230 order. The document then offers some tips for people with particular needs and
2231 hardware setups, as well as security and troubleshooting advice.
2232 This HOWTO is not a description of the guts and underlying structure of NFS.
2233 For that you may wish to read Managing NFS and NIS by Hal Stern, published
2234

by OReilly & Associates, Inc. While that book is severely out of date, much of
2235 the structure of NFS has not changed, and the book describes it very articulately.
2236 A much more advanced and up-to-ate technical description of NFS is available in
2237 NFS illustrated by Brent Callaghan.
2238 2. Setting Up an NFS Server
2239 2.1 Introduction to Server Setup
2240 It is assumed that you will be setting up both a server and a client. If you are just
2241 setting up a client to work off of somebody elses server, you can skip to Setting

149
Bayanihan Linux 5 Chapter 11. Special Topics

2242 up an NFS Client. However, every client that is set up requires modifications
2243 on the server to authorize that client (unless the server setup is done in a very
2244 insecure way), so even if you are not setting up a server you may wish to read
2245 this section to get an idea what kind of authorization problems to look out for.
2246 Setting up the server will be done in two steps: Setting up the configuration files
2247 for NFS, and then starting the NFS services.
2248 2.2 Setting up the Configuration files
2249 There are three main configuration files you will need to edit to set up an NFS
2250 server: /etc/exports, /etc/hosts.allow, and /etc/host.deny . Strictly speaking,
2251 you only need to edit /etc/exports to get NFS to work, but you would be left
2252 with an extremely insecure setup. You may also need to edit your startup scripts;
2253 Setting Up an NFS Server for more on that.
2254 2.2.1 /etc/exports
2255 This file contains a list of entries; each entry indicates a volume that is shared and
2256 how it is shared. Check the man pages (man exports) for a complete description
2257 of all the setup options for the file, although the description here will probably
2258 satisfy most peoples needs.
2259 An entry in /etc/exports will typically look like this:
2260 directory machine1(option11, option12) machine2(option21, option22)
2261 where
2262 directory
2263 the directory that you want to share. It may be an entire volume thought it need
2264 not be. If you share a directory, then all directories under it within the same file
2265 system will be shared as well.
2266 machine1 and machine2
2267 client machines that will have access to the directory. The machines may be
2268 listed by their DNS address or their IP address (e.g. machine. company.com or
2269 192.168.0.1). Using IP addresses is more reliable and more secure. If you need to
2270 use DNS addresses, and they do not seem to be resolving to the right machine,
2271 Troubleshooting.
2272 optionxx
2273 the option listing for each machine will describe what kind of access that machine
2274 will have. Important options are:
2275 ro: The directory is shared read only; the client machine will not be able to write

150
Chapter 11. Special Topics Bayanihan Linux 5

2276 it. This is the default.


2277 rw: The client machine will have read and write access to the directory.
2278 no root squash: By default, any file request made by user root on the client
2279 machine is treated as if it is made by user nobody on the server. (Exactly which
2280 UID the request is mapped to depends on the UID of user nobody on the server,
2281 not the client.) If no root squash is selected, then root on the client machine will
2282 have the same level of access to the files on the system as root on the server.
2283 This can have serious security implications, although it may be necessary if you
2284 want to perform any administrative work on the client machine that involves the
2285 exported directories. You should not specify this option without a good reason.
2286 no subtree check: If only part of a volume is exported, a routine called subtree
2287 checking verifies that a file that is requested from the client is in the appropriate
2288 part of the volume. If the entire volume is exported. disabling this check will
2289 speed up transfers.
2290 sync: By default, all but the most recent version (version 1.11) of the exportfs
2291 command will use async behavior, telling a client machine that a file write is
2292 complete that is, has been written to stable storage when NFS has finished
2293 handling the write over to the filesystem. This behavior may cause data corruption
2294 if the server reboots, and the sync option prevents this. See Optimizing NFS
2295 Performance for a complete discussion of sync and async behavior. Suppose we
2296 have two client machines, slave1 and slave2, that have IP addresses 192.168.0.1
2297 and 192.168.0.2, respectively. We wish to share our software binaries and home
2298 directories with these machines. A typical setup for /etc/exports might look like
2299 this:
2300 /usr/local 192.168.0.1(ro) 192.168.0.2(ro) /home 192.168.0.1(rw) 192.168.0.2(rw)
2301 Here we are sharing /usr/local read-only to slave1 and slave2, because it probably
2302 contains our software and there may not be benefits to allowing slave1 and slave2
2303 to write to it that outweigh security concerns. On the other hand, home directories
2304 need to be exported read-write if users are to save their work on them.
2305 If you have a large installation, you may find that you have a bunch of computers
2306 all on the same local network that require access to your server. There are a few
2307 ways of simplifying references to large numbers of machines. First, you can give
2308 access to a range of machines at once by specifying a network and a netmask.
2309 For example, if you wanted to allow access to all the machines with IP addresses
2310 between 192.168.0.0 and 192.168.0.255 then you could have the entries:
2311 /usr/local 192.168.0.0/255.255.255.0(ro) /home 192.168.0.0/255.255.255.0(rw)
2312 See the Networking-Overview HOWTO for further information on how net-
2313 masks, and you may also wish to look at the man pages for init and hosts.allow.

151
Bayanihan Linux 5 Chapter 11. Special Topics

2314 Second, you can use NIS netgroups in your entry. To specify a netgroup in your
2315 exports file, simple prepend the name of the netgroup with an @. See the NIS
2316 HOWTO for details on how netgroups work.
2317 Third, you can use wildcards such as *.foo.com or 192.168. instead of hostnames.
2318 There were problems with wildcard implementation in the 2.2 kernel series that
2319 were fixed in kernel 2.219.
2320 However, you should keep in mind that any of these simplications could cause a
2321 security risk if there are machines in your netgroup or local network that you do
2322 not trust completely.
2323 A few cautions are in order about wat cannot (or should not) be exported. First,
2324 if a directory is exported, its parent and child directories cannot be exported if
2325 they are in the same filesystem. However, exporting both should not be neces-
2326 sary because listing the parent directory in the /etc/exports file will cause all
2327 underlying directories within that file system to be exported.
2328 Second, it is a poor idea to export a FAT or VFAT (i.e, MS-DOS or Windows
2329 95/98) filesystem with NFS. FAT is not designed for use on a multi-user machine,
2330 and as a result, operations that depend on permissions will not work well. More-
2331 over, some of the underlying filesystem design is reported to work poorly with
2332 NFSs expectations.
2333 Third, device or other special files may not export correctly to non-Linux clients.
2334 See Using Linux NFS with other OSes for details on particular operating sys-
2335 tems.
2336 2.2.2 /etc/hosts.allow and /etc/hosts.deny
2337 These two files specify which computers on the network can use services on your
2338 machine. Each line of the file contains a single entry listing a service and a set of
2339 machines. When the server gets a request from a machine, it does the following:
2340 1. It first checks host.allow to see if the machine a rule listed hee. If it does,
2341 then the machine is allowed access. 2. If the machine does not match an entry
2342 in hosts.allow the server then checks hosts.deny to see if the client matches a rule
2343 listed there. If it does then the machine is denied access. 3. If the client matches
2344 no listings in either file, then it is allowed access. In addition to controlling
2345 access to services handled by inetd(such as telnet and FTP), this file can also
2346 control access to NFS by restricting connections to the daemons that provide
2347 NFS services. Restrictions are done on a per-service basis.
2348 The first daemon to restrict access to is the portmapper. This daemon essen-
2349 tially just tells requesting clients how to find all the NFS services on the system.
2350 Restricting access to the portmapper is the best defense against someone break-
2351 ing into your system through NFS because completely unauthorized clients wont

152
Chapter 11. Special Topics Bayanihan Linux 5

2352 know where to find the NFS daemons. However, there are two things to watch out
2353 for. First, restricting portmapper will also restrict requests to NIS. That should
2354 usually be harmless since you usually want to restrict NFS and IS in a similar
2355 way but just be cautioned. (Running NIS is generally a good idea if you are
2356 running NFS, because the client machines need a way of knowing who owns what
2357 files on the exported volumes. OF course there are other ways of doing this such
2358 as syncing password files. See the NIS HOWTO for information on setting up
2359 NIS.)
2360 In general it is a good idea with NFS (as with most internet services) to explicitly
2361 deny access to IP addresses that you dont need to allow access to.
2362 The first step in doing this is to add the following entry to /etc/hosts.deny:
2363 portmap:ALL
2364 Starting with nfs-utils 0.2.0, you can be a bit more carefule by controlling access
2365 to individual daemons. Its a good precaution since an intruder will often be able
2366 to weasel around the portmapper. If you have a newer version of nfs-utils, add
2367 entries for each of the NFS daemons.
2368 lockd:ALL mountd:ALL rquotad:ALL statd:ALL
2369 Even if you have an older version of nfs-utils, adding these entries is at worst
2370 harmless and at best will save you some trouble when you upgrade. Some sys
2371 admins choose to put the entry ALL:ALL in the file /etc/hosts.deny, which causes
2372 any service that looks at these files to deny access to all hosts unless it is explicitly
2373 allowed. While this is more secure behavior, it may also get you in trouble when
2374 you are installing new services. you forget you put it there and you cant figure
2375 out for the life of you why they wont work.
2376 Next, we need to add an entry to hosts.allow to give any hosts access that we
2377 want to have access. (If we just leave the above lines in hosts.deny then nobody
2378 will have access to NFS.) Entries in hosts.allow follow the format:
2379 service: host[or network/netmask] , host [or network/netmask]
2380 Here, host is IP address of a potential client; it may be possible in some versions
2381 to use the DNS name of the host, but it is strongly discouraged.
2382 Suppose we have the setup above and we just want to allow access to slave1.foo.com
2383 and slave2.foo.com, and suppose that the IP addresses of these machines are
2384 192.168.0.1 and 192.168.0.2, respectively. We could add the following entry to
2385 /etc/hosts.allow:
2386 portmap: 192.168.0.1 , 192.168.0.2
2387 For recent nfs-utils versions, we would also add the following (again, these entries

153
Bayanihan Linux 5 Chapter 11. Special Topics

2388 are harmless even if they are not supported):


2389 lockd: 192.168.0.1 , 192.168.0.2 rquotad: 192.168.0.1 , 192.168.0.2 mountd: 192.168.0.1
2390 , 192.168.0.2 statd: 192.168.0.1 , 192.168.0.2
2391 2.3 Getting the services Started
2392 2.3.1 Pre-requisites
2393 The NFS server should now be configured and we can start it running. First, you
2394 will need to have the appropriate packages installed. This consists mainly of a
2395 new enough kernel and a new enough version of the nfs-utils package. See Section
2396 2, Introduction if you are in doubt.
2397 Next, before you can start NFS, you will need to have TCP/IP networking func-
2398 tioning correctly on your machine. If you can use telnet, FTP, and so on, then
2399 chances are your TCP networking is fine.
2400 That said, with most recent Linux distributions you may be able to get NFS up
2401 and running simply by rebooting your machine, and the startup scripts should
2402 detect that you have set up your /etc/exports file and will start up NFS correctly.
2403 If you try this, see Section 4, Setting up an NFS Client Verifying that NFS
2404 is running. If this does not work, or if you are not in a position to reboot your
2405 machine, then the following section will tell you which daemons need to be started
2406 in order to run NFS services. If for some reason nfsd was already running when
2407 you edited your configuration files above, you will have to flush your configuration;
2408 see Section 4, Setting up an NFS Client for details.
2409 2.3.2 Starting the Portmapper
2410 NFS depends on the portmapper daemon, either called portmap or rpc.portmap.
2411 It will need to be started first. It should be located in /sbin but is sometimes in
2412 /usr/sbin. Most recent Linux distributions start this daemon in the boot scripts,
2413 but it is worth making sure that it is running before you begin working with NFS
2414 (just type ps aux grep portmap).
2415 2.3.3 The Daemons
2416 NFS serving is taken care of by five daemons: rpc.nfsd, which does most of
2417 the work; rpc.lockd and rpc.statd, which handle file locking; rpc.mountd, which
2418 handles the initial mount requests, and rpc.rquotad, which handles user file quotas
2419 on exported volumes. Starting with 2.2.18, lockd is called by nfsd upon demand,
2420 so you do not need to worry about starting it yourself. statd will need to be
2421 started separately. Most recent Linux distributions will have startup scripts for
2422 these daemons.
2423 The daemons are all part of the nfs-utils package, and may be either in the /sbin
2424 directory or the /usr/sbin directory.

154
Chapter 11. Special Topics Bayanihan Linux 5

2425 If your distribution does not include them in the startup scripts, then then you
2426 should add them, configured to start in the following order:
2427 rpc.portmap rpc.mountd, rpc.nfsd rpc.statd, rpc.lockd (if necessary), and rpc.rquotad
2428 The nfs-utils package has sample startup scripts for RedHat and Debian. If you
2429 are using a different distribution, in general you can just copy the RedHat script,
2430 but you will probably have to take out the line that says:
2431 . ../init.d/functions
2432 to avoid getting error messages.
2433 2.3.4 Verifying that NFS is running
2434 To do this, query the portmapper with the command rpcinfo quota to find out
2435 what services it is providing. You should get something like this:
2436 program vers proto port 100000 2 tcp 111 portmapper 100000 2 udp 111 portmap-
2437 per 100011 1 udp 749 rquotad 100011 2 udp 749 rquotad 100005 1 udp 759 mountd
2438 100005 1 tcp 761 mountd 100005 2 udp 764 mountd 100005 2 tcp 766 mountd
2439 100005 3 udp 769 mountd 100005 3 tcp 771 mountd 100003 2 udp 2049 nfs 100003
2440 3 udp 2049 nfs 300019 1 tcp 830 amd 300019 1 udp 831 amd 100024 1 udp 944
2441 status 100024 1 tcp 946 status 100021 1 udp 1042 nlockmgr 100021 3 udp 1042
2442 nlockmgr 100021 4 udp 1042 nlockmgr 100021 1 tcp 1629 nlockmgr 100021 3 tcp
2443 1629 nlockmgr 100021 4 tcp 1629 nlockmgr
2444 This says that we have NFS versions 2 and 3, rpc.statd version 1, network lock
2445 manager (the service name for rpc.lockd) versions 1, 3, and 4. There are also
2446 different service listings depending on whether NFS is travelling over TCP or
2447 UDP. Linux systems use UDP by default unless TCP is explicitly requested;
2448 however other OSes such as Solaris default to TCP.
2449 If you do not at least see a line that says portmapper, a line that says nfs, and a
2450 line that says mountd then you will need to backtrack and try again to start up
2451 the daemons (see Troubleshooting if this still doesnt work).
2452 If you do see these services listed, then you should be ready to set up NFS clients
2453 to access files from your server.
2454 2.3.5 Making Changes to /etc/exports later on
2455 If you come back and change your /etc/exports file, the changes you make may
2456 not take effect immediately. You should run the command exportfs -ra to force
2457 nfsd to re-read the /etc/exports file. If you cant find the exportfs command, then
2458 you can kill nfsd with the -HUP flag (see the man pages for kill for details).
2459 If that still doesnt work, dont forget to check hosts.allow to make sure you

155
Bayanihan Linux 5 Chapter 11. Special Topics

2460 havent forgotten to list any new client machines there. Also check the host
2461 listings on any firewalls you may have set up (see Troubleshooting and Security
2462 and NFS for more details on firewalls and NFS).
2463 3. Setting up an NFS Client
2464 3.1 Mounting Remote Directories
2465 Before beginning, you should double-check to make sure your mount program is
2466 new enough (version 2.10m if you want to use Version 3 NFS), and that the client
2467 machine supports NFS mounting, though most standard distributions do. If you
2468 are using a 2.2 or later kernel with the /proc filesystem you can check the latter
2469 by reading the file /proc/filesystems and making sure there is a line containing
2470 nfs. If not, typing insmod nfs may make it magically appear if NFS has been
2471 compiled as a module; otherwise, you will need to build (or download) a kernel
2472 that has NFS support built in. In general, kernels that do not have NFS compiled
2473 in will give a very specific error when the mount command below is run.
2474 To begin using machine as an NFS client, you will need the portmapper running
2475 on that machine, and to use NFS file locking, you will also need rpc.statd and
2476 rpc.lockd running on both the client and the server. Most recent distributions
2477 start those services by default at boot time; if yours doesnt, see Setting up an
2478 NFS Client for information on how to start them up.
2479 With portmap, lockd, and statd running, you should now be able to mount the
2480 remote directory from your server just the way you mount a local hard drive,
2481 with the mount command. Continuing our example from the previous section,
2482 suppose our server above is called master.foo.com,and we want to mount the
2483 /home directory on slave1.foo.com. Then, all we have to do, from the root prompt
2484 on slave1.foo.com, is type:
2485 # mount master.foo.com:/home /mnt/home
2486 and the directory /home on master will appear as the directory /mnt/home on
2487 slave1. (Note that this assumes we have created the directory /mnt/home as an
2488 empty mount point beforehand.)
2489 If this does not work, see Troubleshooting.
2490 You can get unmount the file system by typing:
2491 # umount /mnt/home
2492 Just like you would for a local file system.
2493 3.2 Getting NFS File Systems to be Mounted at Boot Time
2494 NFS file systems can be added to your /etc/fstab file the same way local file

156
Chapter 11. Special Topics Bayanihan Linux 5

2495 systems can, so that they mount when your system starts up. The only difference
2496 is that the file system type will be set to nfs and the dump and fsck order (the
2497 last two entries) will have to be set to zero. So for our example above, the entry
2498 in /etc/fstab would look like:
2499 # device mountpoint fs-type options dump fsckorder ... master.foo.com:/home
2500 /mnt nfs rw 0 0 ...
2501 See the man pages for fstab if you are unfamiliar with the syntax of this file. If you
2502 are using an automounter such as amd or autofs, the options in the corresponding
2503 fields of your mount listings should look very similar if not identical.
2504 At this point you should have NFS working, though a few tweaks may still be
2505 necessary to get it to work well. You should also read Section 6, Security and
2506 NFS to be sure your setup is reasonably secure.
2507 3.3 Mount Options
2508 3.3.1 Soft versus Hard Mounting
2509 There are some options you should consider adding at once. They govern the way
2510 the NFS client handles a server crash or network outage. One of the cool things
2511 about NFS is that it can handle this gracefully. If you set up the clients right.
2512 There are two distinct failure modes:
2513 soft
2514 If a file request fails, the NFS client will report an error to the process on the
2515 client machine requesting the file access. Some programs can handle this with
2516 composure, most wont. We do not recommend using this setting; it is a recipe
2517 for corrupted files and lost data. You should especially not use this for mail disks
2518 if you value your mail, that is.
2519 hard
2520 The program accessing a file on a NFS mounted file system will hang when the
2521 server crashes. The process cannot be interrupted or killed (except by a sure
2522 kill) unless you also specify intr. When the NFS server is back online the program
2523 will continue undisturbed from where it was. We recommend using hard,intr on
2524 all NFS mounted file systems.
2525 Picking up from the previous example, the fstab would now look like:
2526 # device mountpoint fs-type options dump fsckord ... master.foo.com:/home
2527 /mnt/home nfs rw,hard,intr 0 0 ...
2528 The rsize and wsize mount options specify the size of the chunks of data that the
2529 client and server pass back and forth to each other.

157
Bayanihan Linux 5 Chapter 11. Special Topics

2530 The defaults may be too big or to small; there is no size that works well on all or
2531 most setups. On the one hand, some combinations of Linux kernels and network
2532 cards (largely on older machines) cannot handle blocks that large. On the other
2533 hand, if they can handle larger blocks, a bigger size might be faster.
2534 Getting the block size right is an important factor in performance and is a must if
2535 you are planning to use the NFS server in a production environment. See Section
2536 5, Optimizing NFS Performance for details.

2537 11.7 BIND / DNS servers

158
2538

2539 APPENDIX

2540 A
2541

2542 GNU GPL

2543 GNU GENERAL PUBLIC LICENSE Version 3, 29 June 2007


2544 Copyright
c 2007 Free Software Foundation, Inc. http://fsf.org/

2545 Everyone is permitted to copy and distribute verbatim copies of this


2546 license document, but changing it is not allowed.

2547 The GNU General Public License is a free, copyleft license for software and other
2548 kinds of works.
2549 The licenses for most software and other practical works are designed to take away
2550 your freedom to share and change the works. By contrast, the GNU General
2551 Public License is intended to guarantee your freedom to share and change all
2552 versions of a programto make sure it remains free software for all its users. We,
2553 the Free Software Foundation, use the GNU General Public License for most of
2554 our software; it applies also to any other work released this way by its authors.
2555 You can apply it to your programs, too.
2556 When we speak of free software, we are referring to freedom, not price. Our
2557 General Public Licenses are designed to make sure that you have the freedom
2558 to distribute copies of free software (and charge for them if you wish), that you
2559 receive source code or can get it if you want it, that you can change the software
2560 or use pieces of it in new free programs, and that you know you can do these
2561 things.

159
Bayanihan Linux 5 Appendix A. GNU GPL

2562 To protect your rights, we need to prevent others from denying you these rights
2563 or asking you to surrender the rights. Therefore, you have certain responsibilities
2564 if you distribute copies of the software, or if you modify it: responsibilities to
2565 respect the freedom of others.
2566 For example, if you distribute copies of such a program, whether gratis or for a
2567 fee, you must pass on to the recipients the same freedoms that you received. You
2568 must make sure that they, too, receive or can get the source code. And you must
2569 show them these terms so they know their rights.
2570 Developers that use the GNU GPL protect your rights with two steps: (1) as-
2571 sert copyright on the software, and (2) offer you this License giving you legal
2572 permission to copy, distribute and/or modify it.
2573 For the developers and authors protection, the GPL clearly explains that there
2574 is no warranty for this free software. For both users and authors sake, the GPL
2575 requires that modified versions be marked as changed, so that their problems will
2576 not be attributed erroneously to authors of previous versions.
2577 Some devices are designed to deny users access to install or run modified versions
2578 of the software inside them, although the manufacturer can do so. This is fun-
2579 damentally incompatible with the aim of protecting users freedom to change the
2580 software. The systematic pattern of such abuse occurs in the area of products for
2581 individuals to use, which is precisely where it is most unacceptable. Therefore,
2582 we have designed this version of the GPL to prohibit the practice for those prod-
2583 ucts. If such problems arise substantially in other domains, we stand ready to
2584 extend this provision to those domains in future versions of the GPL, as needed
2585 to protect the freedom of users.
2586 Finally, every program is threatened constantly by software patents. States should
2587 not allow patents to restrict development and use of software on general-purpose
2588 computers, but in those that do, we wish to avoid the special danger that patents
2589 applied to a free program could make it effectively proprietary. To prevent this,
2590 the GPL assures that patents cannot be used to render the program non-free.
2591 The precise terms and conditions for copying, distribution and modification follow.

2592 Terms and Conditions

2593 0. Definitions.
2594 This License refers to version 3 of the GNU General Public License.
2595 Copyright also means copyright-like laws that apply to other kinds of
2596 works, such as semiconductor masks.
2597 The Program refers to any copyrightable work licensed under this License.

160
Appendix A. GNU GPL Bayanihan Linux 5

2598 Each licensee is addressed as you. Licensees and recipients may be


2599 individuals or organizations.
2600 To modify a work means to copy from or adapt all or part of the work in
2601 a fashion requiring copyright permission, other than the making of an exact
2602 copy. The resulting work is called a modified version of the earlier work
2603 or a work based on the earlier work.
2604 A covered work means either the unmodified Program or a work based
2605 on the Program.
2606 To propagate a work means to do anything with it that, without permis-
2607 sion, would make you directly or secondarily liable for infringement under
2608 applicable copyright law, except executing it on a computer or modifying a
2609 private copy. Propagation includes copying, distribution (with or without
2610 modification), making available to the public, and in some countries other
2611 activities as well.
2612 To convey a work means any kind of propagation that enables other par-
2613 ties to make or receive copies. Mere interaction with a user through a
2614 computer network, with no transfer of a copy, is not conveying.
2615 An interactive user interface displays Appropriate Legal Notices to the
2616 extent that it includes a convenient and prominently visible feature that (1)
2617 displays an appropriate copyright notice, and (2) tells the user that there is
2618 no warranty for the work (except to the extent that warranties are provided),
2619 that licensees may convey the work under this License, and how to view a
2620 copy of this License. If the interface presents a list of user commands or
2621 options, such as a menu, a prominent item in the list meets this criterion.

2622 1. Source Code.


2623 The source code for a work means the preferred form of the work for
2624 making modifications to it. Object code means any non-source form of a
2625 work.
2626 A Standard Interface means an interface that either is an official standard
2627 defined by a recognized standards body, or, in the case of interfaces speci-
2628 fied for a particular programming language, one that is widely used among
2629 developers working in that language.
2630 The System Libraries of an executable work include anything, other than
2631 the work as a whole, that (a) is included in the normal form of packaging
2632 a Major Component, but which is not part of that Major Component, and
2633 (b) serves only to enable use of the work with that Major Component, or
2634 to implement a Standard Interface for which an implementation is available
2635 to the public in source code form. A Major Component, in this context,
2636 means a major essential component (kernel, window system, and so on) of
2637 the specific operating system (if any) on which the executable work runs,

161
Bayanihan Linux 5 Appendix A. GNU GPL

2638 or a compiler used to produce the work, or an object code interpreter used
2639 to run it.
2640 The Corresponding Source for a work in object code form means all the
2641 source code needed to generate, install, and (for an executable work) run
2642 the object code and to modify the work, including scripts to control those
2643 activities. However, it does not include the works System Libraries, or
2644 general-purpose tools or generally available free programs which are used
2645 unmodified in performing those activities but which are not part of the
2646 work. For example, Corresponding Source includes interface definition files
2647 associated with source files for the work, and the source code for shared
2648 libraries and dynamically linked subprograms that the work is specifically
2649 designed to require, such as by intimate data communication or control flow
2650 between those subprograms and other parts of the work.
2651 The Corresponding Source need not include anything that users can regen-
2652 erate automatically from other parts of the Corresponding Source.
2653 The Corresponding Source for a work in source code form is that same work.

2654 2. Basic Permissions.


2655 All rights granted under this License are granted for the term of copyright
2656 on the Program, and are irrevocable provided the stated conditions are
2657 met. This License explicitly affirms your unlimited permission to run the
2658 unmodified Program. The output from running a covered work is covered
2659 by this License only if the output, given its content, constitutes a covered
2660 work. This License acknowledges your rights of fair use or other equivalent,
2661 as provided by copyright law.
2662 You may make, run and propagate covered works that you do not con-
2663 vey, without conditions so long as your license otherwise remains in force.
2664 You may convey covered works to others for the sole purpose of having
2665 them make modifications exclusively for you, or provide you with facilities
2666 for running those works, provided that you comply with the terms of this
2667 License in conveying all material for which you do not control copyright.
2668 Those thus making or running the covered works for you must do so ex-
2669 clusively on your behalf, under your direction and control, on terms that
2670 prohibit them from making any copies of your copyrighted material outside
2671 their relationship with you.
2672 Conveying under any other circumstances is permitted solely under the con-
2673 ditions stated below. Sublicensing is not allowed; section 10 makes it un-
2674 necessary.

2675 3. Protecting Users Legal Rights From Anti-Circumvention Law.


2676 No covered work shall be deemed part of an effective technological measure
2677 under any applicable law fulfilling obligations under article 11 of the WIPO

162
Appendix A. GNU GPL Bayanihan Linux 5

2678 copyright treaty adopted on 20 December 1996, or similar laws prohibiting


2679 or restricting circumvention of such measures.
2680 When you convey a covered work, you waive any legal power to forbid
2681 circumvention of technological measures to the extent such circumvention is
2682 effected by exercising rights under this License with respect to the covered
2683 work, and you disclaim any intention to limit operation or modification of
2684 the work as a means of enforcing, against the works users, your or third
2685 parties legal rights to forbid circumvention of technological measures.

2686 4. Conveying Verbatim Copies.


2687 You may convey verbatim copies of the Programs source code as you receive
2688 it, in any medium, provided that you conspicuously and appropriately pub-
2689 lish on each copy an appropriate copyright notice; keep intact all notices
2690 stating that this License and any non-permissive terms added in accord
2691 with section 7 apply to the code; keep intact all notices of the absence of
2692 any warranty; and give all recipients a copy of this License along with the
2693 Program.
2694 You may charge any price or no price for each copy that you convey, and
2695 you may offer support or warranty protection for a fee.

2696 5. Conveying Modified Source Versions.


2697 You may convey a work based on the Program, or the modifications to
2698 produce it from the Program, in the form of source code under the terms of
2699 section 4, provided that you also meet all of these conditions:

2700 (a) The work must carry prominent notices stating that you modified it,
2701 and giving a relevant date.
2702 (b) The work must carry prominent notices stating that it is released under
2703 this License and any conditions added under section 7. This require-
2704 ment modifies the requirement in section 4 to keep intact all notices.
2705 (c) You must license the entire work, as a whole, under this License to
2706 anyone who comes into possession of a copy. This License will there-
2707 fore apply, along with any applicable section 7 additional terms, to the
2708 whole of the work, and all its parts, regardless of how they are pack-
2709 aged. This License gives no permission to license the work in any other
2710 way, but it does not invalidate such permission if you have separately
2711 received it.
2712 (d) If the work has interactive user interfaces, each must display Appropri-
2713 ate Legal Notices; however, if the Program has interactive interfaces
2714 that do not display Appropriate Legal Notices, your work need not
2715 make them do so.

163
Bayanihan Linux 5 Appendix A. GNU GPL

2716 A compilation of a covered work with other separate and independent works,
2717 which are not by their nature extensions of the covered work, and which are
2718 not combined with it such as to form a larger program, in or on a volume of
2719 a storage or distribution medium, is called an aggregate if the compilation
2720 and its resulting copyright are not used to limit the access or legal rights of
2721 the compilations users beyond what the individual works permit. Inclusion
2722 of a covered work in an aggregate does not cause this License to apply to
2723 the other parts of the aggregate.

2724 6. Conveying Non-Source Forms.


2725 You may convey a covered work in object code form under the terms of
2726 sections 4 and 5, provided that you also convey the machine-readable Cor-
2727 responding Source under the terms of this License, in one of these ways:

2728 (a) Convey the object code in, or embodied in, a physical product (includ-
2729 ing a physical distribution medium), accompanied by the Correspond-
2730 ing Source fixed on a durable physical medium customarily used for
2731 software interchange.
2732 (b) Convey the object code in, or embodied in, a physical product (includ-
2733 ing a physical distribution medium), accompanied by a written offer,
2734 valid for at least three years and valid for as long as you offer spare
2735 parts or customer support for that product model, to give anyone who
2736 possesses the object code either (1) a copy of the Corresponding Source
2737 for all the software in the product that is covered by this License, on
2738 a durable physical medium customarily used for software interchange,
2739 for a price no more than your reasonable cost of physically perform-
2740 ing this conveying of source, or (2) access to copy the Corresponding
2741 Source from a network server at no charge.
2742 (c) Convey individual copies of the object code with a copy of the written
2743 offer to provide the Corresponding Source. This alternative is allowed
2744 only occasionally and noncommercially, and only if you received the
2745 object code with such an offer, in accord with subsection 6b.
2746 (d) Convey the object code by offering access from a designated place
2747 (gratis or for a charge), and offer equivalent access to the Correspond-
2748 ing Source in the same way through the same place at no further charge.
2749 You need not require recipients to copy the Corresponding Source along
2750 with the object code. If the place to copy the object code is a network
2751 server, the Corresponding Source may be on a different server (oper-
2752 ated by you or a third party) that supports equivalent copying facilities,
2753 provided you maintain clear directions next to the object code saying
2754 where to find the Corresponding Source. Regardless of what server
2755 hosts the Corresponding Source, you remain obligated to ensure that
2756 it is available for as long as needed to satisfy these requirements.

164
Appendix A. GNU GPL Bayanihan Linux 5

2757 (e) Convey the object code using peer-to-peer transmission, provided you
2758 inform other peers where the object code and Corresponding Source
2759 of the work are being offered to the general public at no charge under
2760 subsection 6d.

2761 A separable portion of the object code, whose source code is excluded from
2762 the Corresponding Source as a System Library, need not be included in
2763 conveying the object code work.
2764 A User Product is either (1) a consumer product, which means any
2765 tangible personal property which is normally used for personal, family, or
2766 household purposes, or (2) anything designed or sold for incorporation into a
2767 dwelling. In determining whether a product is a consumer product, doubtful
2768 cases shall be resolved in favor of coverage. For a particular product received
2769 by a particular user, normally used refers to a typical or common use of
2770 that class of product, regardless of the status of the particular user or of the
2771 way in which the particular user actually uses, or expects or is expected to
2772 use, the product. A product is a consumer product regardless of whether
2773 the product has substantial commercial, industrial or non-consumer uses,
2774 unless such uses represent the only significant mode of use of the product.
2775 Installation Information for a User Product means any methods, pro-
2776 cedures, authorization keys, or other information required to install and
2777 execute modified versions of a covered work in that User Product from a
2778 modified version of its Corresponding Source. The information must suffice
2779 to ensure that the continued functioning of the modified object code is in
2780 no case prevented or interfered with solely because modification has been
2781 made.
2782 If you convey an object code work under this section in, or with, or specif-
2783 ically for use in, a User Product, and the conveying occurs as part of a
2784 transaction in which the right of possession and use of the User Product is
2785 transferred to the recipient in perpetuity or for a fixed term (regardless of
2786 how the transaction is characterized), the Corresponding Source conveyed
2787 under this section must be accompanied by the Installation Information.
2788 But this requirement does not apply if neither you nor any third party re-
2789 tains the ability to install modified object code on the User Product (for
2790 example, the work has been installed in ROM).
2791 The requirement to provide Installation Information does not include a re-
2792 quirement to continue to provide support service, warranty, or updates for
2793 a work that has been modified or installed by the recipient, or for the User
2794 Product in which it has been modified or installed. Access to a network
2795 may be denied when the modification itself materially and adversely af-
2796 fects the operation of the network or violates the rules and protocols for
2797 communication across the network.

165
Bayanihan Linux 5 Appendix A. GNU GPL

2798 Corresponding Source conveyed, and Installation Information provided, in


2799 accord with this section must be in a format that is publicly documented
2800 (and with an implementation available to the public in source code form),
2801 and must require no special password or key for unpacking, reading or copy-
2802 ing.

2803 7. Additional Terms.


2804 Additional permissions are terms that supplement the terms of this Li-
2805 cense by making exceptions from one or more of its conditions. Additional
2806 permissions that are applicable to the entire Program shall be treated as
2807 though they were included in this License, to the extent that they are valid
2808 under applicable law. If additional permissions apply only to part of the
2809 Program, that part may be used separately under those permissions, but
2810 the entire Program remains governed by this License without regard to the
2811 additional permissions.
2812 When you convey a copy of a covered work, you may at your option remove
2813 any additional permissions from that copy, or from any part of it. (Addi-
2814 tional permissions may be written to require their own removal in certain
2815 cases when you modify the work.) You may place additional permissions on
2816 material, added by you to a covered work, for which you have or can give
2817 appropriate copyright permission.
2818 Notwithstanding any other provision of this License, for material you add
2819 to a covered work, you may (if authorized by the copyright holders of that
2820 material) supplement the terms of this License with terms:

2821 (a) Disclaiming warranty or limiting liability differently from the terms of
2822 sections 15 and 16 of this License; or
2823 (b) Requiring preservation of specified reasonable legal notices or author
2824 attributions in that material or in the Appropriate Legal Notices dis-
2825 played by works containing it; or
2826 (c) Prohibiting misrepresentation of the origin of that material, or requir-
2827 ing that modified versions of such material be marked in reasonable
2828 ways as different from the original version; or
2829 (d) Limiting the use for publicity purposes of names of licensors or authors
2830 of the material; or
2831 (e) Declining to grant rights under trademark law for use of some trade
2832 names, trademarks, or service marks; or
2833 (f) Requiring indemnification of licensors and authors of that material
2834 by anyone who conveys the material (or modified versions of it) with
2835 contractual assumptions of liability to the recipient, for any liability
2836 that these contractual assumptions directly impose on those licensors
2837 and authors.

166
Appendix A. GNU GPL Bayanihan Linux 5

2838 All other non-permissive additional terms are considered further restric-
2839 tions within the meaning of section 10. If the Program as you received it,
2840 or any part of it, contains a notice stating that it is governed by this License
2841 along with a term that is a further restriction, you may remove that term.
2842 If a license document contains a further restriction but permits relicensing
2843 or conveying under this License, you may add to a covered work material
2844 governed by the terms of that license document, provided that the further
2845 restriction does not survive such relicensing or conveying.
2846 If you add terms to a covered work in accord with this section, you must
2847 place, in the relevant source files, a statement of the additional terms that
2848 apply to those files, or a notice indicating where to find the applicable terms.
2849 Additional terms, permissive or non-permissive, may be stated in the form of
2850 a separately written license, or stated as exceptions; the above requirements
2851 apply either way.

2852 8. Termination.
2853 You may not propagate or modify a covered work except as expressly pro-
2854 vided under this License. Any attempt otherwise to propagate or modify
2855 it is void, and will automatically terminate your rights under this License
2856 (including any patent licenses granted under the third paragraph of section
2857 11).
2858 However, if you cease all violation of this License, then your license from a
2859 particular copyright holder is reinstated (a) provisionally, unless and until
2860 the copyright holder explicitly and finally terminates your license, and (b)
2861 permanently, if the copyright holder fails to notify you of the violation by
2862 some reasonable means prior to 60 days after the cessation.
2863 Moreover, your license from a particular copyright holder is reinstated per-
2864 manently if the copyright holder notifies you of the violation by some rea-
2865 sonable means, this is the first time you have received notice of violation
2866 of this License (for any work) from that copyright holder, and you cure the
2867 violation prior to 30 days after your receipt of the notice.
2868 Termination of your rights under this section does not terminate the licenses
2869 of parties who have received copies or rights from you under this License. If
2870 your rights have been terminated and not permanently reinstated, you do
2871 not qualify to receive new licenses for the same material under section 10.

2872 9. Acceptance Not Required for Having Copies.


2873 You are not required to accept this License in order to receive or run a copy
2874 of the Program. Ancillary propagation of a covered work occurring solely as
2875 a consequence of using peer-to-peer transmission to receive a copy likewise
2876 does not require acceptance. However, nothing other than this License
2877 grants you permission to propagate or modify any covered work. These

167
Bayanihan Linux 5 Appendix A. GNU GPL

2878 actions infringe copyright if you do not accept this License. Therefore, by
2879 modifying or propagating a covered work, you indicate your acceptance of
2880 this License to do so.
2881 10. Automatic Licensing of Downstream Recipients.
2882 Each time you convey a covered work, the recipient automatically receives a
2883 license from the original licensors, to run, modify and propagate that work,
2884 subject to this License. You are not responsible for enforcing compliance by
2885 third parties with this License.
2886 An entity transaction is a transaction transferring control of an organi-
2887 zation, or substantially all assets of one, or subdividing an organization, or
2888 merging organizations. If propagation of a covered work results from an
2889 entity transaction, each party to that transaction who receives a copy of
2890 the work also receives whatever licenses to the work the partys predecessor
2891 in interest had or could give under the previous paragraph, plus a right to
2892 possession of the Corresponding Source of the work from the predecessor in
2893 interest, if the predecessor has it or can get it with reasonable efforts.
2894 You may not impose any further restrictions on the exercise of the rights
2895 granted or affirmed under this License. For example, you may not impose
2896 a license fee, royalty, or other charge for exercise of rights granted under
2897 this License, and you may not initiate litigation (including a cross-claim or
2898 counterclaim in a lawsuit) alleging that any patent claim is infringed by
2899 making, using, selling, offering for sale, or importing the Program or any
2900 portion of it.
2901 11. Patents.
2902 A contributor is a copyright holder who authorizes use under this License
2903 of the Program or a work on which the Program is based. The work thus
2904 licensed is called the contributors contributor version.
2905 A contributors essential patent claims are all patent claims owned or con-
2906 trolled by the contributor, whether already acquired or hereafter acquired,
2907 that would be infringed by some manner, permitted by this License, of mak-
2908 ing, using, or selling its contributor version, but do not include claims that
2909 would be infringed only as a consequence of further modification of the con-
2910 tributor version. For purposes of this definition, control includes the right
2911 to grant patent sublicenses in a manner consistent with the requirements of
2912 this License.
2913 Each contributor grants you a non-exclusive, worldwide, royalty-free patent
2914 license under the contributors essential patent claims, to make, use, sell,
2915 offer for sale, import and otherwise run, modify and propagate the contents
2916 of its contributor version.
2917 In the following three paragraphs, a patent license is any express agree-
2918 ment or commitment, however denominated, not to enforce a patent (such

168
Appendix A. GNU GPL Bayanihan Linux 5

2919 as an express permission to practice a patent or covenant not to sue for


2920 patent infringement). To grant such a patent license to a party means to
2921 make such an agreement or commitment not to enforce a patent against the
2922 party.
2923 If you convey a covered work, knowingly relying on a patent license, and the
2924 Corresponding Source of the work is not available for anyone to copy, free
2925 of charge and under the terms of this License, through a publicly available
2926 network server or other readily accessible means, then you must either (1)
2927 cause the Corresponding Source to be so available, or (2) arrange to deprive
2928 yourself of the benefit of the patent license for this particular work, or (3)
2929 arrange, in a manner consistent with the requirements of this License, to
2930 extend the patent license to downstream recipients. Knowingly relying
2931 means you have actual knowledge that, but for the patent license, your
2932 conveying the covered work in a country, or your recipients use of the
2933 covered work in a country, would infringe one or more identifiable patents
2934 in that country that you have reason to believe are valid.
2935 If, pursuant to or in connection with a single transaction or arrangement,
2936 you convey, or propagate by procuring conveyance of, a covered work, and
2937 grant a patent license to some of the parties receiving the covered work
2938 authorizing them to use, propagate, modify or convey a specific copy of the
2939 covered work, then the patent license you grant is automatically extended
2940 to all recipients of the covered work and works based on it.
2941 A patent license is discriminatory if it does not include within the scope of
2942 its coverage, prohibits the exercise of, or is conditioned on the non-exercise
2943 of one or more of the rights that are specifically granted under this License.
2944 You may not convey a covered work if you are a party to an arrangement
2945 with a third party that is in the business of distributing software, under
2946 which you make payment to the third party based on the extent of your
2947 activity of conveying the work, and under which the third party grants,
2948 to any of the parties who would receive the covered work from you, a dis-
2949 criminatory patent license (a) in connection with copies of the covered work
2950 conveyed by you (or copies made from those copies), or (b) primarily for and
2951 in connection with specific products or compilations that contain the cov-
2952 ered work, unless you entered into that arrangement, or that patent license
2953 was granted, prior to 28 March 2007.
2954 Nothing in this License shall be construed as excluding or limiting any
2955 implied license or other defenses to infringement that may otherwise be
2956 available to you under applicable patent law.
2957 12. No Surrender of Others Freedom.
2958 If conditions are imposed on you (whether by court order, agreement or
2959 otherwise) that contradict the conditions of this License, they do not excuse
2960 you from the conditions of this License. If you cannot convey a covered

169
Bayanihan Linux 5 Appendix A. GNU GPL

2961 work so as to satisfy simultaneously your obligations under this License and
2962 any other pertinent obligations, then as a consequence you may not convey
2963 it at all. For example, if you agree to terms that obligate you to collect a
2964 royalty for further conveying from those to whom you convey the Program,
2965 the only way you could satisfy both those terms and this License would be
2966 to refrain entirely from conveying the Program.

2967 13. Use with the GNU Affero General Public License.
2968 Notwithstanding any other provision of this License, you have permission
2969 to link or combine any covered work with a work licensed under version 3
2970 of the GNU Affero General Public License into a single combined work, and
2971 to convey the resulting work. The terms of this License will continue to
2972 apply to the part which is the covered work, but the special requirements of
2973 the GNU Affero General Public License, section 13, concerning interaction
2974 through a network will apply to the combination as such.

2975 14. Revised Versions of this License.


2976 The Free Software Foundation may publish revised and/or new versions of
2977 the GNU General Public License from time to time. Such new versions will
2978 be similar in spirit to the present version, but may differ in detail to address
2979 new problems or concerns.
2980 Each version is given a distinguishing version number. If the Program spec-
2981 ifies that a certain numbered version of the GNU General Public License
2982 or any later version applies to it, you have the option of following the
2983 terms and conditions either of that numbered version or of any later version
2984 published by the Free Software Foundation. If the Program does not specify
2985 a version number of the GNU General Public License, you may choose any
2986 version ever published by the Free Software Foundation.
2987 If the Program specifies that a proxy can decide which future versions of the
2988 GNU General Public License can be used, that proxys public statement of
2989 acceptance of a version permanently authorizes you to choose that version
2990 for the Program.
2991 Later license versions may give you additional or different permissions. How-
2992 ever, no additional obligations are imposed on any author or copyright
2993 holder as a result of your choosing to follow a later version.

2994 15. Disclaimer of Warranty.


2995 THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT
2996 PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE
2997 STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER
2998 PARTIES PROVIDE THE PROGRAM AS IS WITHOUT WARRANTY
2999 OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING,

170
Appendix A. GNU GPL Bayanihan Linux 5

3000 BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MER-


3001 CHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
3002 THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF
3003 THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE
3004 DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SER-
3005 VICING, REPAIR OR CORRECTION.
3006 16. Limitation of Liability.
3007 IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED
3008 TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER
3009 PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM AS
3010 PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUD-
3011 ING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL
3012 DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE
3013 PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR
3014 DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED
3015 BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM
3016 TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH
3017 HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POS-
3018 SIBILITY OF SUCH DAMAGES.
3019 17. Interpretation of Sections 15 and 16.
3020 If the disclaimer of warranty and limitation of liability provided above can-
3021 not be given local legal effect according to their terms, reviewing courts shall
3022 apply local law that most closely approximates an absolute waiver of all civil
3023 liability in connection with the Program, unless a warranty or assumption
3024 of liability accompanies a copy of the Program in return for a fee.

3025 End of Terms and Conditions


3026 How to Apply These Terms to Your New Programs

3027 If you develop a new program, and you want it to be of the greatest possible
3028 use to the public, the best way to achieve this is to make it free software
3029 which everyone can redistribute and change under these terms.
3030 To do so, attach the following notices to the program. It is safest to attach
3031 them to the start of each source file to most effectively state the exclusion
3032 of warranty; and each file should have at least the copyright line and a
3033 pointer to where the full notice is found.

3034 <one line to give the programs name and a brief idea of what it does.>
3035
3036 Copyright (C) <textyear> <name of author>
3037

171
Bayanihan Linux 5 Appendix A. GNU GPL

3038 This program is free software: you can redistribute it and/or modify
3039 it under the terms of the GNU General Public License as published by
3040 the Free Software Foundation, either version 3 of the License, or
3041 (at your option) any later version.
3042
3043 This program is distributed in the hope that it will be useful,
3044 but WITHOUT ANY WARRANTY; without even the implied warranty of
3045 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
3046 GNU General Public License for more details.
3047
3048 You should have received a copy of the GNU General Public License
3049 along with this program. If not, see <http://www.gnu.org/licenses/>.

3050 Also add information on how to contact you by electronic and paper mail.
3051 If the program does terminal interaction, make it output a short notice like
3052 this when it starts in an interactive mode:

3053 <program> Copyright (C) <year> <name of author>


3054
3055 This program comes with ABSOLUTELY NO WARRANTY; for details type show w.
3056 This is free software, and you are welcome to redistribute it
3057 under certain conditions; type show c for details.

3058 The hypothetical commands show w and show c should show the appropri-
3059 ate parts of the General Public License. Of course, your programs com-
3060 mands might be different; for a GUI interface, you would use an about
3061 box.
3062 You should also get your employer (if you work as a programmer) or school,
3063 if any, to sign a copyright disclaimer for the program, if necessary. For
3064 more information on this, and how to apply and follow the GNU GPL, see
3065 http://www.gnu.org/licenses/.
3066 The GNU General Public License does not permit incorporating your pro-
3067 gram into proprietary programs. If your program is a subroutine library,
3068 you may consider it more useful to permit linking proprietary applica-
3069 tions with the library. If this is what you want to do, use the GNU
3070 Lesser General Public License instead of this License. But first, please read
3071 http://www.gnu.org/philosophy/why-not-lgpl.html.

172
3072 BIBLIOGRAPHY

3073 [1] jack. Get to Know Linux: File System Hierarchy.


3074 Martin Brinkmann, http://www.ghacks.net/2008/12/11/
3075 get-to-know-linux-file-system-hierarchy/, 2005-2008.
3076 [2] GNU Free Documentation License. Filesystem Hierarchy Standard. Wikimedia
3077 Foundation, Inc, http://en.wikipedia.org/wiki/Filesystem_Hierarchy_
3078 Standard, January 22, 2009.
3079 [3] PAT. Linux filesystem heirarchy - the fun easy way. Ravi, http://linuxhelp.
3080 blogspot.com/2008/05/linux-file-system-hierarchy-fun-easy.html,
3081 May 04, 2008.

3082 [4] Bob Rankin. How Does The Linux File System Work? Bob Rankin, http:
3083 //lowfatlinux.com/linux-files.html, 2009.
3084 [5] Pamela Roberts. The Konqueror Handbook. Erwan Loisant, Pamela
3085 Roberts, http://docs.kde.org/stable/en/kdebase-apps/konqueror/
3086 filemanager.html#dirfolders, 2000, 2002.

3087 [6] Mayank Sarup. The Linux filesystem explained. FreeOS Technologies (I) Pvt.
3088 Ltd., http://www.freeos.com/articles/3102/, 1998-2004.
3089 [7] Andrew Solomon. Filesystem Basics. Linux Config Wiki, http://www.
3090 linuxconfig.org/Filesystem_Basics, March 13, 2008.

3091 [8] Debian Installer Team. Debian GNU/Linux Installation Guide. Debian In-
3092 staller team, http://www.debian.org/releases/lenny/i386/, 2004, 2005,
3093 2006, 2007, 2008.

173
INDEX

3094 addgroup, 114 3122 files, 25


3095 adduser, 113 3123 Filesystem Hierarchy Standard, 42
3096 Amarok, 99 3124 find, 117
3097 applications, 95 3125 folder, 26
3098 audio, 105 3126 hidden, 31
3099 automount, 32 3127 folders, 25

3100 Blender, 94 3128 grep, 117


3101 burning, 104 3129 growisofs, 104
3130 GUI, 107
3102 capture, 102
3103 cat, 116 3131 home, 26
3104 CD, 104, 105
3105 cd, 108 3132 Inkscape, 93
3106 cdrdao, 104
3107 chgrp, 116 3133 K3b, 104
3108 chmod, 115 3134 KDE, 26
3109 chown, 115 3135 keyboard, 25
3110 console, 107, 137 3136 kfind, 31
3111 copying, 33 3137 KMix, 100
3112 cp, 110 3138 Konqueror, 2527
3139 Menubar, 33
3113 delete, 33 3140 KRec, 101
3114 delgroup, 114 3141 KsCD, 100
3115 deluser, 114
3116 df, 111 3142 less, 116
3117 directory, 26 3143 Linux, 25
3118 drag, 34 3144 ls, 108
3119 du, 111
3120 DVD, 104 3145 mc, 121
3146 mkdir, 109
3121 filemanager, 25 3147 mount, 112

174
Index Bayanihan Linux 5

3148 movie, 102


3149 movie player, 102
3150 moving, 33
3151 mp3, 105
3152 MPlayer, 102

3153 nano, 120


3154 navigate, 26, 30, 34

3155 ogg, 105

3156 packages, 123


3157 partitions, 26
3158 path, 26, 27
3159 pipe, 118
3160 pmount, 113
3161 pumount, 113

3162 Qt, 138

3163 record, 101, 102


3164 removable, 32
3165 ripper, 105
3166 rm, 110
3167 rmdir, 109

3168 sed, 118


3169 software, 123
3170 soundcard, 100
3171 Super User, 40
3172 Synaptic, 123

3173 taskbar, 26
3174 terminal, 107
3175 trash, 32

3176 umount, 113


3177 unmount, 32

3178 vim, 119

3179 wodim, 104

3180 Xorg, 138


3181 XVidCap, 102

175

Вам также может понравиться