Академический Документы
Профессиональный Документы
Культура Документы
Bayanihan Linux 5
MANUAL
Bayanihan Linux 5
1 Copyright
2008-2009
c Emman Balintec, Rage Callao, Yvonne Carpo, Pearliezl Dy
2 Tiongco, Mariesonn Florendo, Aileen Cruzado, Russel Baisas. All rights reserved.
3 This document is free; you can redistribute it and/or modify it under the terms of
4 the GNU General Public License as published by the Free Software Foundation; either
5 version 2 of the License, or (at your option) any later version.
6 This document is distributed in the hope that it will be useful, but WITHOUT ANY
7 WARRANTY; without even the implied warranty of MERCHANTABILITY or FIT-
8 NESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for
9 more details.
10 You should have received a copy of the GNU General Public License along with this
11 document; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge,
12 MA 02139, USA.
2
13 CONTENTS
14 Preface 7
21 2 Desktop Overview 21
22 2.1 From power on to desktop . . . . . . . . . . . . . . . . . . . . . . . 21
23 2.2 Desktop components . . . . . . . . . . . . . . . . . . . . . . . . . . 22
24 2.3 Menu button . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
25 2.4 Taskbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
26 2.5 System tray . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
3
Bayanihan Linux 5 Contents
30 3.3 Navigation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
44 4.5 E-Mail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
45 4.6 VOIP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
48 5 Using OpenOffice.org 3 73
54 6.2 Gwenview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
4
Contents Bayanihan Linux 5
5
Bayanihan Linux 5 Contents
95 Bibliography 173
96 Index 174
6
97 Preface
98 Sample text.
7
Bayanihan Linux 5 Contents
8
99
100 CHAPTER
101 ONE
102
106 The system uses the Debian Installer[8], a software developed by the Debian
107 Project1 . This version features a fully graphical installation as well as console,
108 expert and rescue modes. The following sections will describe the stages and
109 options available for each of these modes.
111 Bayanihan Linux is freely downloadable as an ISO image from the Bayanihan
112 Linux website at http://bayanihan.gov.ph or can be obtained as a CD from
113 the Advanced Science and Technology Institute office.
114 After downloading the ISO image, please verify that the image was downloaded
115 correctly by using a file integrity checking software such as md5sum.exe or
116 sha256sum.exe and compare the generated values with those posted at our
117 website.
118 If the ISO image integrity check is successful, use a CD burning software and select
119 the Burn as image option to burn the ISO image to a blank CD. This process will
120 produce a bootable Bayanihan Linux CDROM Installer. Then insert the disc
1 http://www.debian.org
9
Bayanihan Linux 5 Chapter 1. Installing the Bayanihan Linux OS
121 into the CDROM drive and restart your computer making sure it boots from the
122 CDROM.
124 Before beginning your installation you should also check whether the ISO image
125 was properly burned onto the CD. To do this, boot the CD and select Advanced
126 options from the boot menu and then select Graphical expert install as shown in
127 Figure 1.1. On the next screen (shown in Figure 1.2) select Check the CDROM(s)
128 integrity. If the check is successful, proceed with the Graphical installation guide
129 shown in Figure 1.4.
130 Important: Perform a BACK-UP of your valuable data before proceeding with
131 the installation.
10
Chapter 1. Installing the Bayanihan Linux OS Bayanihan Linux 5
133 Additional installer options are available by selecting Advanced options (use the up
134 and down arrow keys and press Enter on the highlighted entry) from the installer
135 menu shown in Figure 1.4. The various options are shown in Figure 1.3 and
136 described below.
137 Expert install runs the installer in a text-mode environment and displays all
138 available options
139 Rescue mode runs the installer and provides a shell from which a preinstalled
140 system can be accessed and configured
141 Graphical expert install runs the installer in a full graphical environment and
142 displays all available options
143 Graphical rescue mode runs the installer in a full graphical environment and
144 provides a shell from which a preinstalled system can be accessed and con-
145 figured
146 Test physical memory runs memtest which is a program to check the system
147 memory
149 The full graphical installation mode is selected as the default mode when booting
150 the Bayanihan Linux CDROM Installer. This is the easiest mode mainly because
151 most of the available options have already been preselected. Figures 1.4 to 1.20
152 shows the installation steps.
11
Bayanihan Linux 5 Chapter 1. Installing the Bayanihan Linux OS
153 For low memory machines (less than 128 MB of RAM ) you may want to select
154 the Text-mode install option. The installer will also automatically switch to this
155 mode when it detects low physical memory.
156 The installer will prompt for partitioning information in all modes. The term
157 partition refers to the act of dividing the harddisk so that the divisions can be
158 used by the operating system for different tasks or data. For instance, if you
159 accept all the default options in the partitioning stage, the installer will create
160 two partitions by default. One for the / or root partition and another for the
161 swap partition. The root partition will be used for storing files the operating
162 system needs as well as users files. The swap partition will be used for temporary
163 storage of data by the operating systems processes.
12
Chapter 1. Installing the Bayanihan Linux OS Bayanihan Linux 5
13
Bayanihan Linux 5 Chapter 1. Installing the Bayanihan Linux OS
14
Chapter 1. Installing the Bayanihan Linux OS Bayanihan Linux 5
15
Bayanihan Linux 5 Chapter 1. Installing the Bayanihan Linux OS
16
Chapter 1. Installing the Bayanihan Linux OS Bayanihan Linux 5
17
Bayanihan Linux 5 Chapter 1. Installing the Bayanihan Linux OS
165 After rebooting/booting your computer, the first screen you will see is the GrUB2
166 menu show in Figure 1.21 which displays the available boot options for this system.
18
Chapter 1. Installing the Bayanihan Linux OS Bayanihan Linux 5
19
Bayanihan Linux 5 Chapter 1. Installing the Bayanihan Linux OS
20
167
168 CHAPTER
169 TWO
170
174 Finding your way around a typical Linux desktop can be a challenging experience
175 especially if you come from a Windows background. However once you get passed
176 the initial hurdles, it becomes quite easy to do things. Many of the desktop
177 components behave and function in a very familiar way and almost everything
178 can be customized to your hearts content.
180 The boot process begins when you power on your computer. The first screen
181 to appear after the typical BIOS messages and warnings is the GrUB menu.
182 GrUB is an acronym for Grand Unified Bootloader. Bayanihan Linux is the default
183 operating system selected. You can press Enter or wait a few seconds indicated
184 by the timer at the bottom of the screen and the system will boot to the selected
185 operating system. The process of booting up your computer begins with the
186 kernel, the core of the operating system, being loaded into memory. System
187 components are detected, filesystems are mounted and the desktop initialized
188 for use. Afterwards you are presented with a graphical login screen. Type in the
189 username and password you provided during installation and you will be presented
190 with the desktop environment. This should just take a few minutes.
21
Bayanihan Linux 5 Chapter 2. Desktop Overview
193 Menu button contains the shortcuts to run the various programs bundled with
194 Bayanihan Linux
195 Taskbar displays links to windows that are currently open and holds various
196 other utilities such as applets (pager, quick shortcuts, systray)
197 System tray contains running applications that are frequently accessed
198 Desktop where icons to frequently accessed applications or folders can be placed
199 and where windows of various applications appear when opened
200 After logging in, you are presented with the desktop shown below displaying the
201 components discussed the preceeding section:
202
204 The Menu contains links to graphical applications and are conveniently catego-
205 rized according to general use. For instance, all the graphical applications that
206 you install that need to connect to the internet can be accessed from the Internet
22
Chapter 2. Desktop Overview Bayanihan Linux 5
207 category. This category includes web browsers, email clients, chat clients, VOIP
208 and videoconferencing software.
209 This category also includes links to various system utilities such as the Help man-
210 ual, system settings, system folders and the Control Center where you can set your
211 preferences.
212 You will also find quick shortcuts to run applications, search for files and folders
213 and logoff from the desktop.
215 Most graphical applications when installed will place a shortcut in the Menu. You
216 can also manually add entries and change the arrangement of the various entries
217 using the Menu Editor.
218 To run this application, simply click on the link found in the Menu:
221 This tool can search your system for common applications and update the Menu.
223 The taskbar is the horizontal area at the bottom of the screen that contains links
224 to open windows, the Menu, clock and systray as well as various other utilities.
225 To configure the taskbar, right-click on an empty area on the taskbar and click
226 Unlock panels. Right-click on an empty area again and click Configure Panel. A
227 window will appear containing several categories. Click on the Help for more
228 information on configuring this component.
229 Many applets (small applications that reside in the taskbar) can also be placed
230 here allowing for more customized control of system. To access these optional
231 applets, right-click on an empty area and click Add applet to panel. To remove
232 and applet, right-click on an empty area and select Remove from Panel Applet.
233 You can also add icons for your frequently used applications by selecting Add
234 Application to Panel.
23
Bayanihan Linux 5 Chapter 2. Desktop Overview
236 Some frequently used applications place an icon here for quick access. This ap-
237 plications typically run in the background
24
238
239 CHAPTER
240 THREE
241
244 After having been able to successfully install Bayanihan Linux in your system,
245 what now should you expect from it?
246 When moving from Windows to Linux, you must first understand how Linux
247 view files varies from how Windows handle files. In this chapter, you will have an
248 overview of the Linux file system and how important it is to make Linux work.
249 Here, you will learn that under Linux, everything is a file[4]. In addition to data
250 and executable files, Linux treat folders and even the various components of your
251 computer as a file. This means that there are files that represent your keyboard,
252 terminal, printer, CD-ROM, and even your systems RAM. These special files are
253 called devices. When Linux needs to talk to physical hardware device, it does so
254 by simply reading from or writing to one of these special files1 . In this chapter,
255 you will be introduced to elementary concepts such as basics of creating new files,
256 changing ownerships and permissions and the principal method of accessing them
257 via the Konqueror file manager.
258 Additionally, you will learn about the fundamentals of configuring file associations;
259 working at the command line level; and the Linux Filesystem Heirarchy.
1 http://lowfatlinux.com/linux-files.html
25
Bayanihan Linux 5 Chapter 3. Working with Files and Folders
261 In UNIX and Linux all folders are arranged in a simple inverted tree structure
262 descending and branching down from a single top level folder[5]. This means that
263 you can get from any folder to any other by going up until you reach a common
264 point then down through the appropriate subfolders until you reach your target.
265 The position of any file or folder in the tree can be described by its path, which
266 is a simple list of the folders you would have to descend through to get to the
267 target folder or file. For example, /home/aileen is the subfolder /aileen of the
268 subfolder /home of the top level folder, and /home/aileen/words.txt is the file
269 words.txt in that subfolder. The leading / in these paths represents the top
270 level folder.
271 Every folder accessible by your system including those on other hard disk par-
272 titions, your floppy and CD-ROM will appear in the tree descending from /,
273 their exact paths will depend on how your system was set up. See Section 3.3.
274 Every user on a UNIX / Linux system has their own home folder to hold their
275 personal files and settings; for example /home/russel and /home/mariesonn.
276 The tilde symbol () is often used to represent the users home folder, so that
277 /letter.txt refers to the file letter.txt in my /home folder.
278 Note that the term directory is often used instead of folder.
280 All operating systems come with a so-called file manager which is an application
281 that helps you view files and folders as well as navigate graphically through the
282 entire filesystem tree. The file manager bundled with Bayanihan Linux is called
283 Konqueror.
284 To run this application, simply click on the link found in the Menu. You can also
285 click on the Home icon your desktop or the taskbar.
26
Chapter 3. Working with Files and Folders Bayanihan Linux 5
292 modes, which can include thumbnail preview images of file contents.
293 File and folder properties can easily be examined and changed and
294 applications launched with a simple click of the left mouse button
296 In File Manager mode, Konqueror shows you what files and subfolders are held
297 in a folder, and can provide you with some information about them.
298 The path of the folder you are looking at is shown in the Titlebar, and also in
299 the Location Toolbar, prefixed with file: to indicate that the folder is part of
300 your computers normal file system. For example file:/home/aileen.
301 The way that Konqueror displays the files and folders depends mainly on your
302 choice of View Mode. This can be selected from the View View Mode sub
303 menu, which gives you the following options: Icon View, MultiColumn View,
304 Tree View, Info List View, Detailed List View and Text View as shown
305 in Figures 2.1 to 2.6.
27
Bayanihan Linux 5 Chapter 3. Working with Files and Folders
28
Chapter 3. Working with Files and Folders Bayanihan Linux 5
306 The default file icons shown in Icon View and MultiColumn View modes can be
307 replaced by small preview images of the file contents. See File Previews on 29
308 on for more details.
310 Checking the Show file tips box in the Behavior page of the Konqueror Configura-
311 tion dialog causes a small pop up information window to appear when the mouse
312 pointer is hovered over a file or folder name or icon in Icon View or MultiColumn
313 View mode.
314 If the Show previews... in file tips checkbox is checked the pop up window will
315 also show a small image of the file contents as shown in Figure 2.7.
317 Selecting View Preview from the Menubar will bring up a sub menu that lets
318 you enable file previews for certain types of file.
319 Generally this means that the files icon will be replaced by a small image showing
320 the file contents. If file preview is enabled for Sound Files the file will be played
321 whenever the mouse cursor is hovering over the file name or icon.
322 Note that file previews are only available in Icon View and MultiColumn View
323 modes.
324 Because Konqueror has to read much more data than just the file name details
325 to generate a preview, file previews may not be appropriate when viewing files
326 on a floppy or from a remote system. The Previews page of the File Manager
327 Configuration dialog allows you to disable file previews for protocols such as ftp
328 where reading the extra data would take too long.
29
Bayanihan Linux 5 Chapter 3. Working with Files and Folders
Figure 3.7: To preview a file, hold the mouse cursor over the name of the file for
about a second. A popup window will appear showing the contents of the file and
useful information like file size and which user owns the file.
330 To get to a file with Konqueror you first need to navigate through the folder tree
331 to find the folder containing that file.
332 To move between folders you can simply step up and down the tree:
333 To descend into a subfolder, left click on its name or icon or if you have
334 already selected it (see below) then just press Enter.
335 To go up the folder tree, you can click on the Up button in the Toolbar, use
336 Alt+Up Arrow, or use the Menubar Go Up option.
337 To select a file or folder in the displayed folder without opening it in any way
338 use the up and down arrow keys to move through the items. The selected item
339 will be highlighted and some information about it will be displayed in the Status
340 Bar.
341 Setting the View Mode to Tree View can help you locate folders in the tree below
342 the current folder; in this mode each folder is shown with a small box at the left.
30
Chapter 3. Working with Files and Folders Bayanihan Linux 5
343 If the box contains a + sign, left clicking on the box (not on the folder name or
344 icon) will display a sub tree showing files and subfolders contained in that folder.
345 The small box will then change to show a sign. Left click on that to collapse the
346 sub tree. Once you have found the folder you are looking for, left click on the
347 folder name or icon to open it.
348 The Navigation Panel can also help you find your way around the file system.
349 You can go directly to any folder by typing its path into the Location Toolbar
350 window or into the dialog box invoked by the Menubar Location Open Location
351 item or by Ctrl+ O. Konquerors Text Completion feature may be useful when
352 you do this. Dont forget that in Linux / UNIX file and folder names are case
353 sensitive.
354 When you have moved to a new folder you can go back to your previous choice by
355 using the Toolbar Back button, the Menubar Go Back item, or Alt+Left Arrow.
356 Once you have gone back you can go forward. Use the Toolbar Forward button,
357 the Menubar Go Forward item or Alt+Right Arrow.
358 Alternatively, you can also choose to enter the parent folder by clicking on the
359 Toolbar Up, the Go Up item, or with Alt+Up Arrow.
360 Tip. Holding the left mouse button pressed while the mouse pointer is over the
361 Toolbar Up, Back or Forward buttons brings up a menu of recently visited
362 locations.
364 If you dont know or cant remember where a file or folder is within your system,
365 then use the Toolbar Find File button or the Menubar Tools Find File... option.
366 This will embed the file finder application KFind into Konquerors window.
367 Note. If the name of a file or folder begins with a period or a dot, then it is a
368 hidden file or folder, and will not normally be shown by Konqueror. To
369 see files or folders, use the Menubar View Show Hidden Files option.
370 Another reason Konqueror may not show the file or folder you
371 are looking for is that you may have the View Filter plugin set to
372 display only certain types of file.
31
Bayanihan Linux 5 Chapter 3. Working with Files and Folders
374 Any floppy disk, CD drive or other hard disk partition that you have on your
375 system will usually appear in the / , /media, /mnt or /auto folder, having a path
376 something like /mnt/floppy or /cdrom. The details will depend on how your
377 system was set up.
378 UNIX / Linux requires that you mount a floppy disk or CD-ROM when you have
379 inserted it into the drive, and mount other hard disk partitions when you want
380 to access them. You also need to unmount a floppy disk or CD-ROM before
381 removing it to register that it is no longer available.
382 How you do this will depend on how your system:
383 You may have an Automount facility, in which case you dont have to bother
384 about explicitly mounting and unmounting, although you may find that the
385 CD-ROM occasionally starts up by itself for no apparent reason.
386 You may have Floppy, CD-ROM and hard disk icons on your desktop, in
387 which case, left mouse button click on the icon to mount it. Doing this
388 should also bring up a balloon notification, a Removable Device icon and
389 a window asking you what you want to do with the mounted device. To
390 unmount, right click on the icon and choose the Safely Remove item and a
391 balloon notification will appear to indicate that the device has been safely
392 removed. The Removable Device icon will then turn gray to indicate inac-
393 tivity. See Figure 3.8.
394 Or you can do it the traditional way by typing into a text console window:
395 mount /mnt/floppy to mount, for example, the floppy drive; and
396 umount /mnt/floppy to unmount it (umount not unmount)
397 Note. Rather than having to open a text console to type the mount or umount
398 commands, you may prefer to use Konquerors Tools Execute Shell Com-
399 mand (Ctrl+E) feature.
401 Konqueror gives you two ways to dispose of an unwanted file or folder:
402 You can move it to the Trash folder, which is the safest method as you can
403 get it back if you realize that you have made a mistake.
32
Chapter 3. Working with Files and Folders Bayanihan Linux 5
404 You can just plain Delete it, which removes the entry from the folder and
405 adds the disk area occupied by the file(s) to the systems list of free disk
406 areas, in the same way as the rm command.
407 The simplest way to remove a file or folder is to position the mouse pointer over
408 its name or icon and press the right mouse button, which will bring up a menu
409 containing the options Move to Trash and Delete.
410 Or, if you have selected the item, the Menubar Edit menu will give you the choice
411 of Move to Trash and Delete options.
412 Del will move the selected item or items to Trash. Shift+Del will really, truly and
413 irrevocably delete the selected item or items.
414 Note. You wont be able to remove a file or folder if you dont have the necessary
415 permissions; see Section 3.8 for further details.
418 Position the mouse pointer over its name or icon and hold down the right
419 mouse button, which will bring up a menu containing the Copy option.
420 Choose that.
421 Or if the item is selected you can use the Copy button on the Toolbar or the
422 Menubar Edit Copy item, or the Ctrl+C shortcut key combination. You
423 can also select multiple files or folders to copy/move as well.
33
Bayanihan Linux 5 Chapter 3. Working with Files and Folders
424 Navigate to the folder you want to copy the item into then Paste the item
425 into the new folder by using the Toolbar Paste button or the Menubar Edit
426 Paste option or the Ctrl+V shortcut, or by moving the mouse pointer
427 to a clear area of the window and holding the right mouse button down to
428 bring up a menu containing the Paste option.
429 Moving a file or subfolder between folders can be done in the same way as copying,
430 except that you choose the Cut option or Ctrl+X instead of Copy. The item that
431 you have Cut will be removed from the original folder when you do the Paste into
432 the new folder.
433 You can also copy or move selected item(s) to another folder by using Edit
434 Copy Files (F7) or Edit Move docFiles (F8), or by selecting Copy To or Move To
435 from the drop down menu you get when you right click on an file or folder name
436 in the File Manager window.
437 Note. You may not be able to copy or move a file or folder if you dont have the
438 necessary permissions. See Section 3.8 for further details.
440 Konqueror also supports Drag and Drop copying and moving of files and folders.
441 You can do this by having two instances of Konqueror, one showing the folder
442 you want to copy from, the other showing the target folder. Position the mouse
443 pointer over the item you wish to copy or move, then, holding the left mouse
444 button pressed, drag it to a clear space in the target folder. Release the button
445 and you will be presented with a menu choice of Copy or Move. Take care to
446 drop the item into an empty area of the target folder view - dropping it on top
447 of another file name or icon can cause problems.
448 You can also set up Konqueror to show more than one folder within its window
449 and drag & drop between them.
450 To be able to show different folders in each view they should not be linked; the
451 little boxes at the bottom right of each view should be empty.
452 The active view, that is the one whose path is shown in the Location Toolbar
453 and which responds to navigation and Menubar commands, is shown by the little
454 green light in the bottom left corner. To make a view active, left click on an
455 empty area of the view or on its Status Bar.
456 To remove an active view from Konquerors window use the Ctrl+Shift+R short-
457 cut, or the Menubar Window Remove Active View option, or right mouse button
34
Chapter 3. Working with Files and Folders Bayanihan Linux 5
Figure 3.9: This screenshot illustrates the use of the Menubar Window Split
View Left/Right option, also available with the shortcut Ctrl+Shift+L, to split the
main Konqueror window into two views, each showing the contents of a different
folder.
458 click on the Status Bar and choose the Remove Active View option from the re-
459 sulting menu.
460 If you use Konqueror tabs, you can drag and drop between tabs by dragging the
461 file to the tab label, without letting go yet. The destination tab will pop to the
462 front, allowing you to continue dragging and then drop the file.
464 If you try to paste a file into a folder that already contains a file with the same
465 name, Konqueror will pop up a dialog box warning you that the file already exists.
466 You can then choose to:
467 Overwrite the old file with the newly copied one. The Overwrite All button
468 can be used if you have copied multiple items.
469 Cancel the paste operation by pressing the Skip or Skip All button.
470 Give the file that is being copied a different name. You can do this by typing
471 a new name into the text entry box or get Konqueror to Propose one. When
472 you have done this press, the Rename button.
35
Bayanihan Linux 5 Chapter 3. Working with Files and Folders
474 You sometimes want to delete, copy or move a number of files that are similar in
475 some way. For example, you may wish to move all of the .png graphics files from
476 one folder to another. Konqueror makes this easy by letting you select multiple
477 files based on similarities in their file names.
478 Use the Menubar Edit Selection Select... item or the shortcut Ctrl++. This
479 brings up a little dialog box in which you enter a filename containing the wildcard
480 characters *, which matches any number of characters, and ? which matches a
481 single character. Press OK and Konqueror will highlight all files with matching
482 names. For example;
483 flag*.png will select all filenanes starting with the letters flag and end-
484 ing with .png.
485 memo?.txt will select memo1.txt and memo9.txt but not memo99.txt.
486 When you have selected a range of files, you can narrow down the selection by
487 uing the Menubar Edit Unselect... option or Ctrl+- to specify which of the
488 selected files should be removed from the selection.
489 Use Ctrl+U or the Menubar Edit Unselect All option or just left mouse button
490 click on a clear area of the view to cancel the selection.
491 You can even invert the selection: that is, deselect all selected files and select
492 those that were previously unselected. Use the Menubar Edit Invert Selection
493 option or Ctrl+* to do this.
494 You can also select multiple files and folders by holding the Ctrl button while you
495 click on each individual file or folder. This enables you to then move or copy
496 multiple files and folders to a different location the same method above.
497 A number of useful shortcut keys can be used in list, tree and text view modes:
499 Insert. Toggle the current selection and move down to the next item.
36
Chapter 3. Working with Files and Folders Bayanihan Linux 5
506 Once you have selected the right files then the normal delete, copy or move com-
507 mands will act on all of the selected files at once.
508 Note. Depending on your keyboard type and locale, you may find that the
509 Ctrl++, Ctrl+- and Ctrl+* shortcuts only work with the Numeric keypad
510 +, - and * keys.
512 When Konqueror is in File Manager mode, picking Create New from the Edit menu
513 or from the context menu you get by right mouse button clicking on a free area
514 in a folder view gives you a submenu letting you create any of the following in
515 the current folder:
517 This option is most useful if you want to create an icon that will open a particular
518 application. It opens a dialog box with three tabbed pages. The first, General, is
519 where you choose an icon and the text that will appear with it. The second page,
520 Permissions, lets you select who can use or modify the icon. In the Application page
521 you must enter the Command that will run the application. For example, kwrite
522 to start up the KWrite text editor. kwrite /home/aileen/todo.txt would open
523 the file /home/aileen/todo.txt in KWrite. Advanced options such as the file
524 types which the application can open are also available from this page.
525 To make the application icon appear on your desktop, create the link in your
526 /Desktop folder (this may be called something slightly different depending on
527 how KDE was installed on your system) or get to the Create New... sub menu by
528 right clicking on a free area of the desktop instead of within Konquerors window.
529 If you have a lot of specialized application links and dont want to clutter up
530 the desktop, then why not create them in your Applications folder. You can
531 get there in Konqueror by choosing Go Applications. Then create a sin-
532 gle icon on your desktop to open your Applications folder, which is usually in
533 /.kde/share/applnk.
534 To put an application link icon into the panel, first create it in the Applications
535 folder then drag the icon onto a clear area of the panel.
37
Bayanihan Linux 5 Chapter 3. Working with Files and Folders
537 This lets you create an icon to open Konqueror at a particular folder or web page.
538 As with Link To Application... you can make the application icon appear on your
539 desktop by creating the link in your /Desktop folder or going to the Create New...
540 sub menu by right clicking on a free area of the desktop. When you first create it
541 the text shown with the icon will be the full path or URL. You can change it by
542 right clicking on the icon, selecting Properties... and entering the preferred text
543 in the General tab page.
545 Use this option to create an icon that will mount a floppy disk and open an
546 instance of Konqueror showing the disks contents. To unmount the disk when
547 you have finished with it right click on the icon and select Unmount. In practice
548 it doesnt have to be a floppy disk but can be any hard disk or partition on your
549 system that is not normally mounted.
550 Hard Disk. This option is similar to Floppy Device... but for a hard disk
551 drive or partition.
555 Text File. Use this to create an ordinary, empty, text file. A dialog box
556 will be opened for you to enter the name of your new file.
557 HTML File. Creates a skeleton HTML source file. When you type the
558 new files name into the dialog box it is probably best to give it a .html
559 extension to avoid confusion.
564 Spread Sheet Document. Use this to create a new OpenOffice.org Calc
565 file, and name it with a .ods extension.
38
Chapter 3. Working with Files and Folders Bayanihan Linux 5
569 The two easiest ways to change the name of a file or folder is to either right click
570 on it and select Rename, or select the file or folder and then press the F2 button.
571 To change the name or permissions of a file or folder, right click on its name or
572 icon and select the Properties... item, or if you have selected the file or folder,
573 then you can use the Menubar Edit Properties option.
574 This will bring up the Properties dialog box with two tabbed pages:
575 General, which gives you some information about the item and lets you
576 change its name and, for a folder, the associated icon.
577 Permissions, which shows you the items ownership and access permissions
578 and lets you change the permissions.
580 If you want to make a copy of an existing file with a different name perhaps as a
581 backup in the same folder as the original file, do a normal Copy then when you
582 Paste it a dialog box will pop up complaining that the file already exists. Just
583 type the new name into the dialogs text box and press the Rename button (or
584 if you are feeling lazy pressing the Propose button will generate a new name for
585 you).
587 If you are running as a normal user and try to access files outside of your own
588 /home folder you will often be prevented from doing so and get an error message
589 such as Access Denied.
590 To access these files you need to be logged in as the system administrator, often
591 known as the Super User or root.
592 Rather than logging out then in again, you can launch Konqueror from the Menu
593 in Super User mode by selecting System File Manager - Super User Mode. You
594 will be asked for the root login password but as long as you can provide that
595 Konqueror will be started up with full access privileges to all files on your system.
39
Bayanihan Linux 5 Chapter 3. Working with Files and Folders
596 Warning! Take care. As Super User (root), you have complete control of your
597 system, and a wrong command can easily do irrevocable damage.
598 Also, connecting to the internet as root is an extremely bad idea,
599 as it seriously increases your vulnerability to malicious hacking.
601 KDE provides many applications which can open many different types of file.
602 Most of the time, the defaults will work with no problems, but Konqueror provides
603 a powerful system to allow you to change the applications used to open each file
604 type. For more details, choose the Settings Configure Konqueror... menu item,
605 select File Associations in the configuration dialog, and click on Help.
607 Although Konqueror is a very powerful and flexible GUI file manager, there are
608 occasions when the experienced Linux / UNIX user wants to get down to the
609 basics and work at the text command line level.
610 You can, of course, open an instance of Konsole, perhaps with Konquerors
611 Menubar Tools Open Terminal option or with Ctrl+T.
612 If you only want to launch a program or view a URL, the Tools Run Command
613 (Alt+F2) option may be easier.
614 Tools Execute Shell Command... (Ctrl+E) opens a small command line dialog
615 window where you can enter a shell command such as ps -ax | grep kdeinit .
616 Note that it does not support full featured terminal control characters, so appli-
617 cations such as top and less will not work properly, but it is available immediately
618 without the delay involved in starting Konsole.
619 For more complex operations, Konqueror has another nice feature: the Menubar
620 Window Show Terminal Emulator option, which opens up a terminal window
621 as a new view within Konqueror (See Figure 2.10). As long as the link icon is
622 visible at the bottom right corner of each view, the terminal will follow any folder
623 changes you make in the normal file manager view2 .
2 http://docs.kde.org/stable/en/kdebase-apps/konqueror/index.html
40
Chapter 3. Working with Files and Folders Bayanihan Linux 5
Figure 3.10: The Terminal Emulator option opens up a terminal window as a new
view within Konqueror
41
Bayanihan Linux 5 Chapter 3. Working with Files and Folders
625 The first thing that most new users shifting from Windows will find confusing is
626 navigating the Linux filesystem[6]. The Linux filesystem does things a lot more
627 differently than the Windows filesystem3 . To put it simply, it can be visualized as
628 a tree with its roots and all[3]. At the top of the hierarchy is invariably the root
629 path which is represented by /. All other directories are created beneath this
630 root path. And each of the sub directories have a specific purpose. For example,
631 /etc contain the configuration files, the /opt directory is used to install
632 third party software, /boot contain the grub files and the Linux kernel and
633 so on4 .
634 In the Filesystem Hierarchy Standard (FHS), all files and directories appear under
635 the root directory /, even if they are stored on different physical devices[2].
636 Note however that some of these directories may or may not be present on a UNIX
637 system depending on whether certain subsystems, such as the X Window System,
638 are installed.
639 The majority of these directories exist in all UNIX operating systems and are
640 generally used in much the same way; however, the descriptions here are those
641 used specifically for the FHS, and are not considered authoritative for platforms
642 other than Linux5 .
643 / This is the base, or root, of the file system. Everything in the Linux system is
644 housed in this directory[1].
645 /bin This directory contains a number of essential commands that are available
646 to unprivileged users (such as cat, chmod, chown, etc). The /bin directory
647 also houses the shells (such as bash).
648 /boot This directory contains everything necessary for the boot process. With-
649 out the /boot directory, your machine would not be able to boot up.
650 /dev This directory contains all of the special and device files. With Linux all
651 devices and drives have a name. Hard drives tend be labeled as hda, hdb,
652 hdc. Special devices such as external usb devices can be labeled as sda,
653 sdb, sdc. If you look in the /dev directory you will see quite a few files that
654 can be associated with devices. Most of the devices found here are either
655 block or character devices. Block devices hold data (such as a hard drive)
656 and character devices transmit data (such as a mouse).
3 http://www.freeos.com/articles/3102/
4 http://linuxhelp.blogspot.com/2008/05/linux-file-system-hierarchy-fun-easy.
html
5 http://en.wikipedia.org/wiki/Filesystem_Hierarchy_Standard
42
Chapter 3. Working with Files and Folders Bayanihan Linux 5
657 /etc This is a very special directory that contains numerous configuration files
658 and directories. This directory will contain the X configurations, Apache,
659 Samba, the init system, etc. The /etc directory also houses the sources for
660 package management systems like apt and yum. One of the most important
661 subdirectoris in /etc is the /etc/init.d.
662 /home This is where all user data is housed. Each user on the system will
663 have their own subdirectory within /home. All user data and user-specific
664 configuration files are saved here.
665 /lib This is where all kernel modules needed for system boot libraries that are
666 required by root system commands (commands found in /bin and /sbin.)
667 /lost+found If your system crashes or is shut down improperly any lost data
668 will be stored here. During a recovery boot the fsck application will attempt
669 to recover corrupt files found here.
670 /media This is where all external media (or extra internal drives) is mounted.
671 If you make or edit entries in the /etc/fstab file you will point devices
672 (such as /dev/sda to directories withing /media.)
673 /mnt This is another directory where external (and internal) drives and devices
674 are mounted. This is a holdover to older school thought. Most modern
675 distributions are moving to the /media directory.
676 /opt This is a directory that can be used for installing applications that are out-
677 side of the default installation. When you install applications here they can
678 be used system wide by all users. Only the root user can install applications
679 here.
680 /proc This is a special directory that is actually a virtual filesystem. The /proc
681 directory acts as a process information center for the kernel.
683 /sbin This is where all system maintenance/administration executable files are
684 stored. These commands differ from those in /usr/sbin in that they are
685 system commands used for critical system administration and maintenance
686 whereas /usr/sbin are non-critical tasks such as user administration, net-
687 work administration, etc.
43
Bayanihan Linux 5 Chapter 3. Working with Files and Folders
688 /usr This is one of the largest directories on your system as it contains all user-
689 executable binaries as well as the libraries, documentation, and header files
690 for these executables. One of the most important subdirectories is /usr/bin
691 where all user application executables are stored.
692 /var This directory contains all variable data such as log files. On a server
693 environment the document root directory of most servers will be found here
694 (/var/www and /var/ftp are examples.)
695 /srv This directory can contain the services (such as www) directory in some
696 distributions.
697 /tmp This directory, as you would expect, contains temporary files that are
698 stored as needed. Many files you will find here are lock files created by
699 applications. Do not remove anything from this directory as the cron system
700 has a job specifically created for the removal of these files6 .
6 http://www.ghacks.net/2008/12/11/get-to-know-linux-file-system-hierarchy/
44
Chapter 3. Working with Files and Folders Bayanihan Linux 5
Figure 3.11: The diagram represents (part of) a Linux file system know as
Filesystem Hierarchy Standard[7]. A line from one node to a node on its
right indicates containment. For example, the student directory is contained
within the home directory.
45
Bayanihan Linux 5 Chapter 3. Working with Files and Folders
46
701
702 CHAPTER
703 FOUR
704
708 Connecting to the Internet has become easier with this release of Bayanihan Linux.
709 The following sections describe the steps necessary for connecting your machine
710 to the World Wide Web using the different applications that are bundled with
711 this release.
713 KPPP is a graphical fronted to the ppp tools that are bundled with the system.
714 These tools allow you to connect to the Internet using a dial-up modem, a tele-
715 phone line and an account with an ISP.
716
717 To run this application, simply click on the link found at the Menu:
47
Bayanihan Linux 5 Chapter 4. Connecting to the Internet
722 If it is your first time to run Kppp, configuration of modem and account is re-
723 quired. An option prompt box will appear to let you choose for the wizard con-
724 nection or the manual connection. Normally for first time users, it is required to
725 setup the account in manual mode because wizard connection is mainly use for
726 existing account setup. Click on Manual Setup button to start configuring
727 When the new account dialog appears, fill up the specified information for every
728 tab such as account connection details, phone number, and and others that are
729 mandatory. Refer to Figure 4.4.
730 KPPP Account Dialog Box Customize argument are pass on pppd using
731 customize pppd button.(This button is optional).
48
Chapter 4. Connecting to the Internet Bayanihan Linux 5
49
Bayanihan Linux 5 Chapter 4. Connecting to the Internet
50
Chapter 4. Connecting to the Internet Bayanihan Linux 5
734 After configuring the accounts for kppp, next step to configure is the modem. It
735 is require to know your modems specification for you to configure it on kppp.
737 Busy wait - This is the length of time that a modem will wait before redi-
738 aling.
740 Modem commands - This field is any name that will represent the command
741 on your modem but it should be relevant to the command to avoid chaos.
742 Query modem - It provides information on your modem but still depends
743 on the resource if it has the exact information from resource. This may be
744 not as informative.
745 Terminal - This mini terminal is use for modem configurationa and some
746 experimentation to play around with the modem.
747 The graph tab is use to customize the color of your kppp application.
51
Bayanihan Linux 5 Chapter 4. Connecting to the Internet
52
Chapter 4. Connecting to the Internet Bayanihan Linux 5
Figure 4.14:
Knetworkmanager
Main Window
756 knetworkmanager needs to ba a root user to access it. you can press on the
757 administrator mode then a dialog box will prompt a password. Figure 4.14 and
758 Figure 4.15
53
Bayanihan Linux 5 Chapter 4. Connecting to the Internet
Figure 4.15:
Knetworkmanager
password to root
54
Chapter 4. Connecting to the Internet Bayanihan Linux 5
Figure 4.17:
Normally when
knetworkmanager
detects a network, it
automatically con-
figures the default
gateway if the routed
daemon is up and
running. A Default
Gateway is the node
on the computer net-
work that is chosen
when the IP address
does not belong to
any other entities in
the Routing Table.
Figure 4.18:
Knetworkmanager
automatically gen-
erates a dns for it.
If dns was not auto-
matically configured,
there might be a
problem with the
network or a problem
with /etc/resolv.conf.
you can refer to
chapter 9 of system
administration for
troubleshooting.
55
Bayanihan Linux 5 Chapter 4. Connecting to the Internet
761 FireFoxTM (shown in Figure ??) is a popular open-source web browser developed
762 by the Mozilla Foundation.
764 To run this application, simply click on the link found at the Menu:
767 A tabs can be found below the bookmark toolbars, it allows firefox to use multiple
768 firefox window taskbar to be open one at a time.
769 By pressing on [Ctrl]+[t] or you may choose to click
771 ,
56
Chapter 4. Connecting to the Internet Bayanihan Linux 5
773 Konqueror is a web browser, file manager and file viewer designed as a core part
774 of the K Desktop Environment. It is developed by volunteers and can run on most
775 Unix-like operating systems. Konqueror, along with the rest of the components in
776 the KDEBase package, is licensed and distributed under the GNU General Public
777 License. This section will describe the use of konqueror as a web browser.Figure ??
782 tabs in konqueror are found underneath the location toolbar, same as the func-
783 tionality of firefox, it allows for a multiple access of konqueror windows. You can
784 also press [Ctrl] + [t] or go to
57
Bayanihan Linux 5 Chapter 4. Connecting to the Internet
Figure 4.23:
Quick Search on
Konqueror
785 Bookmarks
789 You can find the quick search on konqueror at the upper right beside the location
790 toolbar Figure 4.23
795 Miscellaneous
58
Chapter 4. Connecting to the Internet Bayanihan Linux 5
805 Plugins are tools use to enhance your internet browser by adding more function-
806 alities to it. There are lots of plugin that you can find on the internet and you can
807 download it for free. We will be focusing on installing plugin for mozilla firefox
808 and konqueror since these 2 are the default internet browser use by bayanihan
809 linux.
810 To install the plugin on firefox:
59
Bayanihan Linux 5 Chapter 4. Connecting to the Internet
818 5. Look for the Download or Download Now button and click it. You may
819 be prompted to save a file. Click Save File. A dialog box will show the
820 download progress. When the download is complete, click Clean Up.
821 6. Open the plugin after it finishes downloading. If you left the default setting
822 in place, the plugin will be on your desktop. Simply clicking the icon will
823 install it in Firefox.
825 1. Start up Konqueror, then do a Web search for plugins for konqueror. When
826 you find a plugin you think you might use and enjoy, click on it and follow
827 the instructions for downloading found on that Web site. Note that other
828 plugins may have different download instructions.
829 2. Set Konqueror to read the plugin: Once your chosen plugin has been down-
830 loaded to your computer, go to the Konqueror tool bar and click on Con-
831 figure Konqueror.
834 5. Close Konqueror, then re-open it. Once you have re-opened Konqueror, it
835 will be all set to read and use the plugin you just downloaded.
837 Electronic mail(E-mail) is any method of communicating and storing data using
838 digital device such as computers. Bayanihan uses a Kmail as dafault for sending
839 and receiving email.
841 KMail is the e-mail client of the KDE desktop environment. It is use by Bayanihan
842 Linux as the default email client.
60
Chapter 4. Connecting to the Internet Bayanihan Linux 5
845 It if is your first time to use kmail just follow the wizard to setup your mail
846 account.
849 After you have setup your account, we will now compose a new message to test
850 your new account. To compose message window go to:
852 Fill in the appropriate fields in the composer window. You can use the View menu
853 to select which header fields you want to display.
854 Organizing your address can easily be remember if you will be sending message
855 to multiple address or single address.You can use the address book by clicking
856 on the select button beside the To field then from that it will list your current
857 contact email address.
858 Whenever you want to add more than one recipient in one of the fields, use a
859 comma to separate each address from the next one. You may need to specify
860 fully qualified addresses (i.e. user@example.com) even for local users, depending
861 on your system configuration.
61
Bayanihan Linux 5 Chapter 4. Connecting to the Internet
862 When you are finished with your message, click the Send Now icon (the envelope)
863 to send the message. Figure 4.27
864 Message Folders
865 Message Folders are used to organize your email messages. By default, if you have
866 no existing message folders, messages are stored in the folder $KDEHOME/share/apps/kmail/.
867 If you have existing message folders in /Mail, these will be used instead. When
868 you first start KMail the inbox, outbox, sent-mail, trash and drafts folders are
869 created. These folders each have special functions
870 Inbox:
871 Where KMail by default puts your new messages when you ask it to check your
872 mail.
873 Outbox:
874 Where messages are put while they are waiting to be delivered. Note that you
875 should not drag and drop messages here to send them, use the Send icon in the
876 composer window instead. Sent-mail:
877 By default copies of all messages that you have sent are put into this folder. Trash:
878 By default all messages that you have moved to trash are moved into this folder.
879 Drafts:
880 Contains messages you started to edit but then saved to this folder instead of
881 sending them.
62
Chapter 4. Connecting to the Internet Bayanihan Linux 5
883 Mozilla Thunderbird is the open source e-mail client develop by Mozilla founda-
884 tion. Figure 4.28
885 To install thunderbird, go to the directory where you download the source and
886 untar/unzip the source by using the command below.
891 If you want to create a desktop shortcut for thunderbird, you can follow on this
892 procedure:
893 Right click on the desktop create new link to application. Go to application
894 and fill up the field required.
895 If you want to open thunderbird on the commandline, just type in thunderbird in
896 the terminal.
898 After finishing your installation and everything went well. We can now start using
899 thunderbird.
63
Bayanihan Linux 5 Chapter 4. Connecting to the Internet
900 First is you have to setup your account. Thunderbird has a user friendly wizard
901 which will guide you in configuring your account name and other configuration.
902 Figure 4.29
903 Figure 4.30
905 To compose a new message for Thunderbird, go and click on the Write button
906 located beside Get Mail button. Figure 4.31
64
Chapter 4. Connecting to the Internet Bayanihan Linux 5
908 Thunderbird has a 4 default message folders on the main window, the inbox,
909 drafts, trash and the local folders. everytime you got a new message on your
910 mailbox it is automatically put in the inbox. you can make a rule on how to
911 organize your incoming message to where it be put.
913 Address book stores the email address of your contacts. You can find the icon
914 Address Book on the upper tool bar beside the Write icon
916 VoIp(Voice over Internet Protocol) is a service that convert your voice into a
917 digital signal that travels on internet. A broadband(high speed internet and a
918 headset microphone computer device is require.
920 Ekiga(Formerly Gnome Meeting) is an open source VoIP and video conferencing
921 application by gnome. Ekiga is default in bayanihan linux.
65
Bayanihan Linux 5 Chapter 4. Connecting to the Internet
923 If it is your first time to use ekiga, ekiga has a pop up wizard with 10 easy
924 configuration that is applicable for first time users. Simply follow the steps that
925 starts from creating an account to configuring hardware device. Figure 4.32
927 If you want to call other users, you need a SIP address. It is an address known
928 to be like a phone number. You can get a SIP address for free from (http:
929 //www.ekiga.netasdescribedhere). You can use the online address book of
930 Ekiga to find the SIP addresses of other Ekiga users. It is of course possible to
931 call people who are using another provider (other than ekiga.net) using Peering
932 or Enum. You can actually call any user using SIP software or hardware, and
933 registered to any public SIP provider. Ekiga can also be use to do PC-to-PC calls,
934 PC-to-phone calls or vice versa.
936 You can also chat with your friends using ekiga. You can do this by clicking on
937 the left, above the Change the view mode.To send a text message to a user, simply
938 enter his/her SIP address into the sip: input box at the top of the screen, enter
939 your text message, and click on Send. Figure 4.33
941 Your camera must be supported by the linux kernel and compatible with Video4linux/Video4linux2
942 API in order to use webcams for video calls.
66
Chapter 4. Connecting to the Internet Bayanihan Linux 5
943 Ekiga has an assistant for configuring video support: just run the Configuration
944 Assistant until the end.
951 To see the address book on ekiga, go to Tools Address Book. A pop up window
952 will appear for choosing your contact list. Figure 4.34
67
Bayanihan Linux 5 Chapter 4. Connecting to the Internet
Figure 4.35:
Skype
954 Skype is a software that allows us call the user over using the internet with free of
955 charge but calls to other landlines and mobile might have charges depend on the
956 telecom company. It also allows for chatting and video conferencing. Figure 4.35
963 In order to use skype, you must have an account and you can get it on their web-
964 site https://secure.skype.com/account/login?message=login required, After your
965 account is done, you can now login to skype. Figure 4.37
68
Chapter 4. Connecting to the Internet Bayanihan Linux 5
Figure 4.37:
Logging in to
Skype
Figure 4.38:
Pidgin Main
Window
967 Pidgin is an instant messaging client that support different account on other
968 instant messaging applications. It supports AIM, ICQ, Jabber/XMPP, MSN,
969 Yahoo!, Bonjour, Gadu-Gadu, IRC, QQ, SILC, Simple.
970 Pidgin can log you to different account but you must be register on a specifi
971 account before you login to pidgin. Figure 4.38
973 You can go to Accounts Manage or click on [ctrl] + [a]. Then click on the add
974 button, then you can choose which account that you want. Figure 4.39
69
Bayanihan Linux 5 Chapter 4. Connecting to the Internet
Figure 4.40:
Composing a Mes-
sage on Pidgin
976 Just click on the name of the user if you like to talk or give a message. Figure 4.40
978 Desktop Sharing is an application that allows you to use and share an existing
979 session to another machine. The user may also control your desktop which is like
980 sharing one session using 2 computers.
70
Chapter 4. Connecting to the Internet Bayanihan Linux 5
984 You can share desktop right away by choosing on the create personal invitation
985 it will create a host and a password which you will be giving to other station to
986 connect to your desktop.
988 After Creating an invitation, you can now access the desktop using the krdc. To
989 open krdc go to:
71
Bayanihan Linux 5 Chapter 4. Connecting to the Internet
72
991
992 CHAPTER
993 FIVE
994
73
Bayanihan Linux 5 Chapter 5. Using OpenOffice.org 3
1014 The most common way to start Writer is by using the system menu, on GNOME,
1015 it is called the Applications menu, on KDE, it is identified by the KDE logo.
1016 The Writer interface
1017 The main Writer workspace is shown below.
1018
1019 Menus
1020 The Menu bar is located across the top of the Writer window, just below the
1021 Title bar. When you choose one of the menus, a submenu drops down to show
1022 commands like File, Edit, View, Insert, Format, Table, Tools, Window and Help.
1023 Toolbars
74
Chapter 5. Using OpenOffice.org 3 Bayanihan Linux 5
1024 The first toolbar is a Standard Toolbar is consistent across the OpenOffice.org ap-
1025 plication. The second toolbar across the top is a Formating Toolbar that provides
1026 tools for formatting graphics and has a context-sensitive bar.
1027 Status Bar
1028 This provides information about the document and can change some document
1029 features. It has Page number, Page style, Language, Insert mode, Selection mode,
1030 Digital signature, Section or object information (Picture, List item, Heading and
1031 Table), View Layout and Zoom.
1033 There are several ways to view a document: Print Layout, Web Layout and Full
1034 Screen. Go to View menu and click on the required view. Print Layout is the
1035 default document view. Ctrl+Shift+J the Full Screen view, press the Esc key to
1036 return to either Print or Web Layout view.
1037 When in Print Layout and Web Layout you can Zoom slider on the menu bar.
1038 You can use both Zoom slide and View Layout icons on the Menu Bar. In Web
1039 Layout view, most of the choices are not available.
1042 When OpenOffice.org Writer is open a Welcome screen is shown. Click one of
1043 the icons to open a new document or click the Templates icon to start a new
1044 document using a template.
1045 You can also start a new document in one of the following ways.
1048 Press the Control+N keys. A new empty document opens. If you already
1049 have a document open, the new document appears in a new window.
1050 Use File New Text Document. The result is the same as pressing the
1051 Control+N keys.
75
Bayanihan Linux 5 Chapter 5. Using OpenOffice.org 3
1054 You can use templates to create new documents. If you want to have a document
1055 with similar layout use Templates. As a result, all the documents look alike; they
1056 have the same headers and footers, use the same fonts, and so on.
1057 Once you do have an existing templates, you can create new documents based
1058 on them by using File New Templates and Documents. This opens a window
1059 where you can choose the template you want to use for your document.
1060 A new document is created based on the formats defined in the template.
1061
1063 When no document is open, the Welcome screen provides an icon for opening
1064 an existing document. You can also open an existing document in one of the
1065 following ways. If a document is already open in OpenOffice.org, the second
1066 document opens in a new window.
76
Chapter 5. Using OpenOffice.org 3 Bayanihan Linux 5
1070 In each case, the Open dialog box appears. Select the file you want, and then
1071 click Open.
1072 In the Open dialog box, you can reduce the list of files by selecting the type of
1073 file you are looking for. For example, if you choose Text documents as the file
1074 type, you will only see documents Writer can open (including *.odt, *.doc, *.txt).
1075 This method opens Word (*.doc) files, as well as OpenOffice.org files and other
1076 formats.
1082 When the Save As dialog box appears, enter the file name and verify the file type
1083 (if applicable).
1084 To save an open document with the current file name, choose File Save. This
1085 will overwrite the last saved state of the file.
1087 To protect an entire document from being viewable without a password, use the
1088 option on the Save As dialog box to enter a password. This option is only available
1089 for files saved in OpenDocument formats. Passwords must contain a minimum
1090 of 5 characters. The OK button appear if it reached the minimum characters
1091 required.
1092 On the Save As dialog box, select the Save and tick the password option,
1093 and then click Save. You will receive a prompt:
77
Bayanihan Linux 5 Chapter 5. Using OpenOffice.org 3
1094
1095 Type the same password in the Password field and the Confirm field, and
1096 then click OK. If the passwords match, the document is saved and the file is
1097 password protected. If the passwords do not match, you receive the prompt
1098 to enter the password again.
78
Chapter 5. Using OpenOffice.org 3 Bayanihan Linux 5
1103
1104 Tool Bars - contains commands that have pictures or icons associated with
1105 them. The Calc Toolbars are Main Menu toolbar, Function toolbar, For-
1106 mating toolbar and Formula toolbar.
1107 1. Main Menu Toolbar - this gives you access to many of the basic
1108 commands used in Calc.
1109 2. Function Toolbar - contains icons to provide quick access to
1110 commands.
1111 3. Formating Toolbar - has icons plus drop-down menus that
1112 allow you to select a font, font color, alignments, number formats,
1113 border options and background colors.
1114 4. Formula Toolbar - contains the Name Box drop-down menu
1115 and a ling white box called Input Line.
1119 Column Headings - this contains 256 columns and named by a letter or
1120 combination of letters.
79
Bayanihan Linux 5 Chapter 5. Using OpenOffice.org 3
1121 Row Headings - this contains 65,536 rows and named by a number.
1122 Navigation Bars - allows you to move from on worksheet to another, this
1123 buttons display the first, previous, next and last worksheets.
1129 1. All functions begin with the = (equal sign). 2. Define the function
1130 name (e.g., Sum, Average, Count, Max and Min). 3. Enclose one or
1131 more arguments - numbers, text or cell references with parentheses.
1132 Separate a comma for each argument that is more than one.
1134 Click the Function Wizard button on the Standard toolbar. The Function Wizard
1135 dialogue box appears.
80
Chapter 5. Using OpenOffice.org 3 Bayanihan Linux 5
1136
1137 The drop-down menu of the Functions tab to display a list of function categories
1138 available for you to use in Calc. Click the desired Function that you would like
1139 to use in the spreadsheet.
1142 Worksheets can also be combined together into a group. Grouping work-
1143 sheets allows you to apply identical formulas and/or formatting across all
1144 the worksheets in the group.
1145 When you group worksheets, any change made to one worksheet will also
1146 be applied to the other worksheets.
1147 if you want several worksheets to have the same data regions, depart-
1148 ments, quarters, months, weeks and days and youve decided to group
1149 your worksheets, all you need to do is type that information once and it will
1150 appear on every worksheet included in the grouping.
81
Bayanihan Linux 5 Chapter 5. Using OpenOffice.org 3
1162 Slides pane - contains thumbnail pictures of the slides. You can Add, Mark,
1163 Delete, Rename, Copy and Move Slides.
1164 Workspace - has five tabs: Normal, Outline, Notes, Handout and Slide
1165 Sorter.
1166 Tasks pane - has five sections: Master Pages (28 slide masters), Layout
1167 (20 prepackaged layouts), Table Design (11 standard table styles), Custom
1168 Animation, Slide Transition (56 available transition).
82
Chapter 5. Using OpenOffice.org 3 Bayanihan Linux 5
1169
1171 To create a quick presentation Impress offered three choices: Empty Presentation,
1172 From Template or Open an existing Presentation. When Impress refers to tem-
1173 plates it means presentations that are both predesigned and also contain sample
1174 content.
1175 The standard way of getting started is to create an empty presentation. Youll
1176 also be given a chance to choose which format you want the presentation to take,
1177 whether its designed primarily to be viewed on-screen or printed out.
83
Bayanihan Linux 5 Chapter 5. Using OpenOffice.org 3
1178
1180
84
Chapter 5. Using OpenOffice.org 3 Bayanihan Linux 5
1182
1186 1. Open the presentation that you want to use for a template. 2.
1187 From the main menu, choose File Templates Save. The Templates
1188 window opens. 3. In the New Template field, type a name for the
1189 new template. 4. In the Categories list, click the folder in which you
1190 want to store the template. 5. Click OK. OpenOffice.org saves the
1191 new template and the Templates window closes.
85
Bayanihan Linux 5 Chapter 5. Using OpenOffice.org 3
1192
1196 1. In the Template Management dialog box, click the folder into which
1197 you want to import the template. 2. Click the Commands button and
1198 choose Import Template from the drop-down menu. A standard file
1199 browser window opens. 3. Find and select the template that you
1200 want to import and click Open. The file browser window closes and
1201 the template appears.
1212 The Fontwork tool lets you manipulate text in various ways. This located at
1213 the Drawing toolbar. When you click the icon, the Fontwork Gallery dialog box
1214 appears, offering a choice of predefined font effects. Once the selection was made
1215 the dummy text Fondwork will appear on the workspace.
86
Chapter 5. Using OpenOffice.org 3 Bayanihan Linux 5
1216 To remove a Fontwork item, just select its border and press the Delete Keys on
1217 your keyboard.
1218
87
Bayanihan Linux 5 Chapter 5. Using OpenOffice.org 3
88
1225
1226 CHAPTER
1227 SIX
1228
1232 Bayanihan Linux version has some powerful, world-class graphics tools and ap-
1233 plications available. It includes several photo manipulation and cataloging tools.
1234 Among these is a professional-level image-editing program called GIMP (for GNU
1235 Image Manipulation Program).
1242 To run this application, simply click on the link found at the Menu:
1244 The sample screenshot when you open GIMP as shown in Figure 6.1.
1245 The Gimp normally enables you to keep several windows open at once, rather
89
Bayanihan Linux 5 Chapter 6. Using Graphics Tools
1246 than having all its functions available from one window. This gives you control
1247 over where the various windows are positioned and which ones remain visible.
1248 GIMP uses 3 most important windows which is Main Toolbox Windows as
1249 shown in Figure 6.2, the Layers Dialog Windows shown in Figure 6.3 and the
1250 Image Windows shown in Figure 6.4.
1252 Gwenview is a fast and easy to use image viewer for KDE. It is free software,
1253 licensed under the GNU General Public License1 .
1254
1255 Gwenview features a folder tree window and a file list window to provide easy
1256 navigation of your files. It also uses docked windows, so you can alter any layout
1257 you wish for. You can also browse images in full-sreen mode, or embedded within
1258 Konqueror using the Image View and Kpart.
1260 KIPI (KDE Image Plugin Interface) is a common development effort by the Gwen-
1261 view developers, DigiKam,. Its aim is to share image plugins among graphic
1262 applications. Kipi is based on the old digiKam plugins implementation.
1 http://www.gnu.org
90
Chapter 6. Using Graphics Tools Bayanihan Linux 5
91
Bayanihan Linux 5 Chapter 6. Using Graphics Tools
92
Chapter 6. Using Graphics Tools Bayanihan Linux 5
1264 Digikam is a simple digital photo management application, which makes import-
1265 ing and organizing digital photos a snap. The photos can be organized in
1266 albums which are automatically sorted chronologically. An easy to use interface
1267 is provided that enables you to connect to your camera and preview, download
1268 and/or delete your images.
1278 To run this application, simply click on the link found at the Menu:
1280 Inkcape Tools: The vertical toolbar on the left shows Inkscapes drawing and edit-
1281 ing tools. In the top part of the window, below the menu, theres the Commands
1282 bar with general command buttons and the Tool Controls bar with controls that
93
Bayanihan Linux 5 Chapter 6. Using Graphics Tools
1283 are specific to each tool. The status bar at the bottom of the window will display
1284 useful hints and messages as you work.
1286 To create a new empty document, use File New or press Ctrl+N
94
1290
1291 CHAPTER
1292 SEVEN
1293
1297 This version of Bayanihan Linux comes bundled with a program that allows
1298 WindowsTM applications to run in a non-WindowsTM environment. The soft-
1299 ware is called WINE1 which is a recursive acronym for WINE Is Not an Emulator.
1300
1 http://www.winehq.org/
95
Bayanihan Linux 5 Chapter 7. Using WindowsTM applications with WINE
1312 Installing software via WINE is quite easy. Just click on its executable file in the
1313 Konqueror file manager. If that doesnt work, open a console (see 9) and type the
1314 command wine <name of executable file>
1315 For example, we will install 7-Zip, a popular open-source archiving program sim-
1316 ilar to Winzip. Download the installer from http://www.7-zip.org/ and save it
1317 into your /Download directory. Run Konqueror or double-click the Home icon on
1318 your desktop. Go to the Downloads folder and double-click the .exe file as shown in
1319 Figure 7.1 or open a console and type the command wine /Download/7z464.exe.
1320 When the application first starts, it creates a hidden folder in your /home directory
1321 called .wine where it saves its configuration files as well as creates a filesystem
1322 that is similar to the one found in WindowsTM . You can browse this hidden
1323 folder by clicking on the Konqueror menubar View Show hidden files.
1324 When setup finishes successfully, a link to the WindowsTM application will be
1325 found at:
96
Chapter 7. Using WindowsTM applications with WINE Bayanihan Linux 5
1328 winecfg
1329 To configure Wine using the winecfg2 tool, simply click on the link found at the
1330 Menu:
1332 regedit
1334 All of the settings you change in winecfg, with exception of the
1335 drive settings, are ultimately stored in the registry. In Windows, this
1336 is a central repository for the configuration of applications and the
1337 operating system. Likewise, Wine implements a registry and some
1338 settings not found in Winecfg can be changed within it.
1339 To run the registry editor, open a terminal as discussed in Chapter 9 on page 107
1340 and type the command regedit then press Enter.
2 http://winehq.org/docs/wineusr-guide/config-wine-main
97
Bayanihan Linux 5 Chapter 7. Using WindowsTM applications with WINE
1342 For a list of applications that have been tested on Wine, please visit the Wine
1343 Application Database found at http://appdb.winehq.org/.
98
1344
1345 CHAPTER
1346 EIGHT
1347
1351 Bayanihan Linux 5 comes bundled with various software that allow you to play
1352 or view multimedia files in your computer. The following sections briefly describe
1353 the capabilities of each software and its typical uses
1355 Amarok (shown in Figure 8.1)is a multimedia audio player capable of playing audio
1356 files of different formats. It features an intuitive interface that allows the user to
1357 easily search, catalog tracks and create playlists.
1358 More information about configuring and using Amarok is available by pressing
1359 Alt+F2 and entering the command help:/amarok.
1360
1361 To run this application, simply click on the link found in the Menu:
99
Bayanihan Linux 5 Chapter 8. Using Multimedia Applications
1364 KsCD (shown in Figure 8.3) is a fast, CDDB enabled CD player for the *nix
1365 platform. KsCD stands for The KDE Projects small/simple CD player.
1366 On first run, the application places a shortcut icon in the system tray as shown
1367 in Figure 8.4
1368 To run this application, simply click on the link found in the Menu:
Figure 8.3: KsCD AudioCD Player Figure 8.4: KsCD in the system tray
1370 Tip: If you hear no sound when playing an audioCD but you hear a sound after
1371 logging in, you may need to enable digital playback. To do this, click Extras on the
1372 KsCD application then click Configure KsCD. On the window shown in Figure 8.5
1373 enable digital playback and then click Apply for the changes to take effect.
1375 KMix is KDEs soundcard mixer program. Though small, it is full-featured. The
1376 program should give controls for each of your soundcards. This application will
1377 let you can adjust the volume and activate or deactivate channels. On first run,
1378 KMix will put a shortcut icon on the system tray. Typically no configuration is
100
Chapter 8. Using Multimedia Applications Bayanihan Linux 5
1379 necessary, but if you do not hear a sound when logging in the volume may be set
1380 to low or muted by default.
1381 The system automatically detects and configures all available soundcards in your
1382 system provided there is support for the devices in the built-in kernel.
1383 To run this application, simply click on the link found in the Menu:
1386 KRec connects to the aRts server and records what is routed to it into files. These
1387 files are in a special KRec format but it is possible to export to wave, ogg and mp3
101
Bayanihan Linux 5 Chapter 8. Using Multimedia Applications
1388 files. But KRec has much more functionality. You can do multiple recordings in
1389 one file even with overlaying functionality.
1390
1391 To run this application, simply click on the link found in the Menu:
1404 To run this application, simply click on the link found in the Menu:
1407 MPlayer is a movie player which runs on many systems. It plays most MPEG/VOB,
1408 AVI, Ogg/OGM, VIVO, ASF/WMA/WMV, QT/MOV/MP4, RealMedia, Ma-
1409 troska, NUT, NuppelVideo, FLI, YUV4MPEG, FILM, RoQ, PVA files, supported
102
Chapter 8. Using Multimedia Applications Bayanihan Linux 5
1410 by many native, XAnim, and Win32 DLL codecs. You can watch VideoCD,
1411 SVCD, DVD, 3ivx, DivX 3/4/5, WMV and even H.264 movies.
1412 To play a video file, right-click on the main window and select Open Play file.
1413 When playing a file, pressing F will toggle fullscreen display.
1414
1415 To run this application, simply click on the link found in the Menu:
1418 Many video files are distributed under proprietary formats and in order to play
1419 these you need to install decoders that can interpret and playback these files. For
103
Bayanihan Linux 5 Chapter 8. Using Multimedia Applications
1420 legal reasons, these decoders cannot be shipped with Bayanihan Linux but can be
1421 easily installed (see page 123). The w32codecs package will provide the necessary
1422 decoders to playback proprietary video files.
1424 K3b is a CD and DVD burning application for Linux systems optimized for KDE.
1425 It provides a comfortable user interface to perform most CD/DVD burning tasks
1426 like creating an Audio CD from a set of audio files or copying a CD. While the
1427 experienced user can take influence in all steps of the burning process, the begin-
1428 ner may find comfort in the automatic settings and the reasonable K3b defaults
1429 which allow a quick start. The actual burning in K3b is done by the command
1430 line utilities wodim, cdrdao, and growisofs.
1431
1432 To run this application, simply click on the link found in the Menu:
1434 On first run, the application automatically searches for and configures all attached
1435 CD/DVD burners. If no CD/DVD burner is found, a prompt will appear.
1436 To burn an CD-sized ISO file, simply click on the Burn CD Image icon on the
1437 application interface. To burn data onto a disk, simply drag and drop files from the
1438 upper right window into the lower right window and click Burn. More information
1439 on using and configuring K3b can be found at help:/k3b.
104
Chapter 8. Using Multimedia Applications Bayanihan Linux 5
1441 KAudioCreator is an audio CD ripper for KDE. With it you can easily rip your
1442 audio CDs to mp3 or ogg files or other formats, depending on whatever encoder
1443 you have installed on your system.
1444
1445 To run this application, simply click on the link found in the Menu:
Figure 8.12:
KAudioCreator
105
Bayanihan Linux 5 Chapter 8. Using Multimedia Applications
106
1447
1448 CHAPTER
1449 NINE
1450
1454 There are times when you will need to run applications without the benefit of a
1455 graphical user interface (GUI) because the command/application does not have
1456 one or because it is more convenient to use a terminal or console. A terminal
1457 or console is similar to the WindowsTM command shell or prompt but offers far
1458 more capabilities.
1459 The following sections describe how to run the most commonly used commandline
1460 tools in a terminal.
1462 To run the application, simply click on the link found at Menu:
1463
107
Bayanihan Linux 5 Chapter 9. Using the Terminal/Commandline
1466 ls - List
1467 The ls command lists the content of a directory. It is one of the most used Linux
1468 command.
1469 Syntax: ls [options] [file/directory]
1470 Typical Options:
-a shows ALL the files, including hidden files.
-l gives a long listing format. This option gives a more detailed result, it
shows owner, size, date last modified, etc.
1471
-R traverses the directories recursively. This option shows files of all the
directories within the specified directory.
-h shows filesizes human readable format.
1472
108
Chapter 9. Using the Terminal/Commandline Bayanihan Linux 5
1492 The rmdir command is used to remove a directory. Note that it can only remove
1493 an empty directory.
1494 Syntax: rmdir [/path/to]directoryname
1495 Typical Usage:
rmdir mydirectory - deletes the directory named mydirectory in the
current directory.
1496
rmdir /path/to/mydirectory - deletes the directory named myirectory in the
/path/to/ directory.
1497
109
Bayanihan Linux 5 Chapter 9. Using the Terminal/Commandline
1498 cp - Copy
1507 rm - Remove
110
Chapter 9. Using the Terminal/Commandline Bayanihan Linux 5
1518 The df command is used to report system free disk space and usage.
1519 Syntax: df [options] [target]
1520 Typical Options:
-a includes all dummy/virtual filesystems in the report.
1521 -h prints filesystem sizes in human readable format.
-l limits list to local filesystems only.
1522
1527 The du command is used to report disk space usage size of each file for directories
1528 recursively.
1529 Syntax: du [options] [target]
1530 Typical Options:
111
Bayanihan Linux 5 Chapter 9. Using the Terminal/Commandline
1537 The mount command is used to mount a filesystem. Note that only the root
1538 account can mount filesystems and not ordinary users. Ordinary users should use
1539 pmount instead.
1540 Syntax: mount [options] [filesystem] [mountpoint]
1541 Typical Options:
-a - mounts all filesystems specified in /etc/fstab.
-o option1, option2, .. - specifies the options to be used when mounting the
1542
filesystem.
-t filesystemtype - indicates the filesystem type to be mounted.
1543
112
Chapter 9. Using the Terminal/Commandline Bayanihan Linux 5
1548 The umount command is used to unmount a filesystem. Note that only the root
1549 account can unmount filesystems and not ordinary users. Ordinary users should
1550 use pumount instead.
1551 Syntax: umount [mountpoint|filesystem]
1552 Typical Usage:
umount /mnt/mymount - unmounts the mountpoint /mnt/mymount.
1553
umount /dev/sdb3 - unmounts the device /dev/sdb3.
1554
1556 The pmount command is used to mount hotpluggable devices as ordinary user.
1557 Syntax: pmount [filesystem] [mountname]
1558 Typical Usage:
pmount /dev/sdb1 myflashdrive - mounts the filesystem /dev/sdb1 to the mount-
1559
point /media/myflashdrive.
1560
1562 The pumount command is used to unmount hotpluggable devices as ordinary user.
1563 Syntax: pumount [mountpoint|filesystem]
1564 Typical Usage:
pumount /mnt/mymount - unmounts the mountpoint /mnt/mymount.
1565
pumount /dev/sdb3 - unmounts the device /dev/sdb3.
1566
1569 The adduser command is used to add a system account. It sets up the users
1570 home directory and group memberships. Note that this tool can only be used by
113
Bayanihan Linux 5 Chapter 9. Using the Terminal/Commandline
1577 The deluser command is used to remove a system account. Note that this can
1578 only be used by the root account.
1579 Syntax: deluser [username]
1580 Typical Usage:
deluser myuser - removes the account myuser.
1581
deluser - lets you specify the user account to be removed.
1582
1584 The addgroup command is used to add a system group. Note that this tool can
1585 only be used by the root account.
1586 Syntax: addgroup [groupname]
1587 Typical Usage:
1588 addgroup mygroup - creates a group called mygroup.
1589
1591 The delgroup command is used to remove a system group. Note that this tool
1592 can only be used by the root account.
1593 Syntax: delgroup [groupname]
1594 Typical Usage:
delgroup mygroup - removes the group mygroup.
1595
delgroup - lets you specify the group to be removed.
1596
114
Chapter 9. Using the Terminal/Commandline Bayanihan Linux 5
1599 The chown command is used to change file ownership. Note that this tool can
1600 only be used by the root account.
1601 Syntax: chown [options] [owner][:][group] [target]
1602 Typical Options:
-c - shows the changes made during the operation.
1603 -R - recursively changes the owner of the files in the current directory in-
cluding subdirectories.
1604
1609 The chmod command is used to change file permissions. Note that this tool can
1610 only be used by the root account.
1611 Syntax: chown [options] [a|u|g|o][+|-][permissions] [target]
1612 Typical Options:
-c - shows the changes made during the operation.
1613 -R - recursively changes the permissions of the files in the current directory
including subdirectories.
1614
115
Bayanihan Linux 5 Chapter 9. Using the Terminal/Commandline
1619 The chgrp command is used to change group ownership. Note that this tool can
1620 only be used by the root account.
1621 Syntax: chgrp [options] [group] [target]
1622 Typical Options:
-c - shows the changes made during the operation.
1623 -R - recursively changes the owner of the files in the current direc-
tory including subdirectories.
1624
1629 cat
1635 less
1636 The less is a tool used to display the contents of a file which can be browsed.
1637 Some commands are based on vi.
1638 Syntax: less [file]
1639
116
Chapter 9. Using the Terminal/Commandline Bayanihan Linux 5
1640 find
1649 grep
1650 This command is used to print lines that match a given pattern.
1651 Syntax: grep [options] [pattern] [file]
1652 Typical Options:
-a - treats a binary file as if it were a text file.
-i - makes the match case-insensitive.
1653
-n - also prints line number for each output.
-v - prints non-matching lines.
1654
117
Bayanihan Linux 5 Chapter 9. Using the Terminal/Commandline
1658 sed
1668 The pipe character | is used to put commands in a pipeline. The output of
1669 the previous command is passed on to the next.
1670 Typical Usage:
grep EE /var/log/Xorg.0.log | less - generates a list of lines with the char-
acters EE in /var/log/Xorg.0.log that
1671 can be browsed.
cat myfile | sed s/hello/hi/g - outputs the contents of myfile but
changes all instances of hello to hi.
1672
1674 Outputs of commands can be redirected into a file using the greater than (>)
1675 character.
1676 Typical Usage:
118
Chapter 9. Using the Terminal/Commandline Bayanihan Linux 5
1680 More information about these and other commands can be obtained by using the
1681 man command. This invokes the reference manuals for each command.
1682 Syntax: man [command]
1684 The TAB key is the command completion key. Pressing the TAB once after the
1685 first few letters are typed on the console completes the command. In case when
1686 more than one command share the same first few letters, pressing the TAB twice
1687 shows a list of the commands that share common first letters.
1688
1690 The combination of ALT + . (dot) keys invokes the last argument of the last
1691 command. If repeatedly pressed, it scrolls through the last argument of the pre-
1692 vious commands.
1693
1695 Vim
119
Bayanihan Linux 5 Chapter 9. Using the Terminal/Commandline
1706 Nano
120
Chapter 9. Using the Terminal/Commandline Bayanihan Linux 5
1714 To run this command, type nano in a terminal which displays the following screen:
1718 GNU Midnight Commander is a directory browser/file manager for Unix-like op-
1719 erating systems.
1720 The screen of the Midnight Commander is divided into four parts. Almost all
1721 of the screen space is taken up by two directory panels. By default, the second
1722 line from the bottom of the screen is the shell command line, and the bottom line
1723 shows the function key labels. The topmost line is the menu bar line. The menu
1724 bar line may not be visible, but appears if you click the topmost line with the
1725 mouse or press the F9 key.
1726 The Midnight Commander provides a view of two directories at the same time.
1727 One of the panels is the current panel (a selection bar is in the current panel).
1728 Almost all operations take place on the current panel. Some file operations like
1729 Rename and Copy by default use the directory of the unselected panel as a des-
1730 tination (dont worry, they always ask you for confirmation first). For more
1731 information, see the sections on the Directory Panels, the Left and Right Menus
121
Bayanihan Linux 5 Chapter 9. Using the Terminal/Commandline
122
1739
1740 CHAPTER
1741 TEN
1742
1747 Every operating system has a way of installing and removing software. There
1748 are several ways to install an application in Bayanihan Linux and it is somewhat
1749 different from what users of other operating systems are used to. Nevertheless it
1750 is quite easy to learn how to do.
1751 The following sections describe the apt, Synaptic and aptitude tools as well as
1752 several guides on installing some commonly used applications that cannot be
1753 shipped with Bayanihan but are freely available.
1754 It is also possible to install some WindowsTM applications. See Chapter 7.
1756 Synaptic (shown in Figure 10.1) is a graphical package manager that you can use
1757 to easily add/remove packages (also called software applications in other oper-
1758 ating systems).
1759
123
Bayanihan Linux 5 Chapter 10. System Administration
1760 To run this application, simply click on the link found at the Menu:
1763 In order to perform the following steps, you will need a connection to the internet
1764 as discussed in Chapter 4
1765 Once you have an internet connection, configure Synaptic to fetch the list of
1766 available packages for your system. Do this by clicking Settings Reposito-
1767 ries as shown in Figure 10.2. A new window will appear (shown in Figure 10.3)
1768 displaying several lines with unchecked boxes. Check the box beside the text
1769 deb http://apt.bayanihan.gov.ph/kalumbata then click Ok. Click Ok again when
1770 the Repositories changed window appears then click the Reload button to update
1771 the list of available packages for your system.
124
Chapter 10. System Administration Bayanihan Linux 5
1772 The square icons at the leftmost column describe the status of each individual
1773 package. Click Help Icon legend in the menubar to see a description of the
1774 meanings of these icons as shown in Figure 10.4. To select a package for instal-
1775 lation or removal, simply click on its icon and select the appropriate item in the
1776 pop-up menu.
125
Bayanihan Linux 5 Chapter 10. System Administration
1778 The following tools can only be run inside a console (see Chapter 9) as root
1779 (administrator). For this, you need to su, sudo or sux to gain root privileges.
1780 So for example, if you wanted to run aptitude as root, then you would do the
1781 following in a console:
rage@bl5dev:~$ su
Password: <type root password here>
bl5dev:/home/rage# aptitude
1782 Apt is a commandline package manager without the graphical interface like that
1783 of Synaptic or aptitude. Its manual page can be accessed by typing man apt
1784 inside a console or typing man:/apt via Alt+F2.
1785 The configuration files for apt resides in the /etc/apt directory. You will need
1786 to edit the file /etc/apt/sources.list and add repositories such as http://apt.
1787 bayanihan.gov.ph to query. The entries are typically of the format:
1788 deb http://apt.bayanihan.gov.ph/kalumbata stable main contrib non-free
1789 For example, to install the package apache from the commandline using apt you
1790 would do the following in a console:
rage@bl5dev:~$ su
Password: <type root password here>
bl5dev:/home/rage# apt-get updates
bl5dev:/home/rage# apt-get install apache
1791 Aptitude, shown in Figure 10.5 is a console-mode package manager with similar
1792 features to Synaptic. Its manual page can be accessed by typing man aptitude
1793 inside a console or typing man:/aptitude via Alt+F2.
1794 When it runs, it reads the same configuration files as apt located at /etc/apt/.
1795 Shortcut commands are accessed by pressing Shift+?. For instance to install or
1796 upgrade a package, use the arrow keys to highlight its name then press +. To
1797 remove a package, use the arrow keys to highlight its name then press -. To hold
1798 a package in order to prevent future upgrades, press =. To keep a package at its
1799 currently state, press :.
126
Chapter 10. System Administration Bayanihan Linux 5
1800 After marking the packages you would like to remove or install, press g and then
1801 press g again to confirm. The application will now proceed and apply these
1802 changes to your system. To cancel the process, press Ctrl+C.
1803 To return to previous screens, press q. To exit, continue pressing q until you see
1804 the prompt confirming that you want to exit the program.
1805 dpkg is a more advanced commandline tool for installing, removing or configuring
1806 packages. Its manual page can be accessed by typing man dpkg inside a console
1807 or typing man:/dpkg via Alt+F2.
1808 Typically, this tool is used to manually install files with a *.deb extension. For
1809 example, say you downloaded a package called superduperapp.deb and want to
1810 install it, you would do the following in a console:
rage@bl5dev:~$ su
Password: <type root password here>
bl5dev:/home/rage# dpkg -I superduperapp.deb
bl5dev:/home/rage# dpkg -i superduperapp.deb
127
Bayanihan Linux 5 Chapter 10. System Administration
1811 Unlike apt, Synaptic and aptitude, this tool cannot automatically install other
1812 packages that is depended upon by the package you are trying to install. It is up
1813 to you to manually install the packagess dependencies.
1814 This tool can also be used to list packages which have been installed in the system
1815 (dpkg -l), view the status of each package (dpkg -s packagename) or list the
1816 files installed by a particular package (dpkg -L packagename).
1817 Extras
1818 There are thousands of software available for you to use in your Bayanihan Linux
1819 system. Most of these are distributed freely from our repository at http://apt.
1820 bayanihan.gov.ph. However, there are those which cannot be freely redistributed
1821 but can easily be obtained from the authors or publishers website.
1823 RealPlayer is a multimedia player capable of playing streaming video from the
1824 web.
1825 Go to http://www.real.com and click on the link Linux / Unix Player at the
1826 bottom of the page. You will be redirected to a new page where you can download
1827 the Linux packages. Then click on the link DEB Package. After downloading the
1828 file, open a terminal, navigate to where you downloaded it and type the command
1829 dpkg -i RealPlayer11GOLD.deb to install this application. A configuration
1830 wizard will pop-up the first time you run this application.
1831 To run this application, simply click on the link found at the Menu:
128
Chapter 10. System Administration Bayanihan Linux 5
1843 Athough, gnash, a free and open source flash player is shipped with Bayanihan,
1844 there are many websites that require the Adobe Flash Player plugin to be in-
1845 stalled. To install this plugin, go to http://www.adobe.com and click Download
1846 Flash Player. You will be prompted to accept the license. Once you accept, save
1847 the file into your /home folder and extract its contents by right-clicking on the file
1848 in Konqueror and selecting Extract Extract here. Then copy the file libflash-
1849 player.so into /.mozilla/plugins folder. Restart FireFox for this change to take
1850 effect.
rage@bl5dev:~$ su
Password: <type root password here>
bl5dev:/home/rage# cd Downloads
bl5dev:/home/rage/Downloads# sh jre-6u11-linux-i586.bin
<Press Enter at the more prompt to scroll to the end.>
1856 Bayanihan Linux is bundled with the latest version of the Mozilla FireFox web
1857 browser. This section describes how you can manually download the latest version
129
Bayanihan Linux 5 Chapter 10. System Administration
1858 without using a package management system such as Synaptic, apt or aptitude.
1859 There are consequences to installing this application manually. For instance, you
1860 will need to manually update this package yourself when a new version comes out.
1861 Go to http://www.mozilla.com and click the download link then save the file
1862 to your computer. Using Konqueror navigate to where you downloaded the file
1863 right-click on the file and select Extract Extract to firefox-3.0.5. Navigate to the
1864 extracted folder and then double-click the file firefox.
1873 The KDE Control Center (kcontrol) is the central configuration utility for the K
1874 Desktop Environment. It is made up of multiple modules grouped into categories
1875 and each module is used to configure the different parts of the system.
1876 To run this application, simply click on the link found at the Menu:
1879 This module allows you to change various settings related to how your desktop
1880 looks. You can select the background, set colors and fonts and more. More
1881 information regarding this module can be found by clicking on the Help button.
1882 Desktop
1883 This module allows you to change how different components of the desktop feels
1884 or behaves. For instance, you can set whether the system displays mountable
130
Chapter 10. System Administration Bayanihan Linux 5
1885 devices on your desktop and how many virtual desktops to enable.
1887 This module configures settings related to the network. However, this should not
1888 be necessary in most cases since Bayanihan Linux 5 can now automatically detect
1889 the network and configure network devices using network-manager.
1891 This module allows you to configure your KDE session, the default applications
1892 as well as enable/disable system services.
1893 Peripherals
1894 This module allows you to change the various settings associated with the devices
1895 attached to your computer such as the keyboard, mouse, display and printers.
131
Bayanihan Linux 5 Chapter 10. System Administration
1897 This module allows you to configure keyboard layouts, select the region where the
1898 computer is located and enable/disable accessibility features.
1900 This module allows you to set the information regarding your account, set ciphers
1901 to use and other privacy settings.
1903 This module lets you configure various settings for your audio device as well as
1904 system notifications.
1906 This module lets you configure various system components such as the login
1907 screen, install fonts and set the systems date and time.
1909 Managing printers in Bayanihan Linux is done through the Control Center module
1910 shown in Figure 10.7 or via the menu shortcut Menu Settings Printer
1911 You can also configure printers via the CUPS web interface which you can access
1912 by running a web browser such as FireFox or Konqueror and entering the following
1913 at the address bar: http://localhost:631
1914 Another method if you have an HP printer is to use HPLIP Toolbox which you
1915 can run via the link in the Menu:
132
Chapter 10. System Administration Bayanihan Linux 5
1918 Private Folders is a new feature in Bayanihan Linux allowing users to create an
1919 encrypted folder in their /home folders for them to be able to store files in a secure
1920 fashion. This encrypted folder is only accessible by the user that created it and
1921 is automatically opened and closed on login and logout.
1922 To enable your encrypted Private folder, simply run the wizard via the Menu:
1925 Guarddog is a user friendly firewall generation and management utility for KDE
1926 running on Linux. It allows you to simply specify which network protocols should
1927 be allowed between which groups of computers without requiring you to have
1928 knowledge of port numbers or packets. Guarddog is built on top of Linuxs
1929 ipchains and iptables packet filtering commands. For more information, press
1930 Alt+F2, type the command help:/guarddog then press Enter.
1931 To run this application, simply click on the link found at the Menu:
133
Bayanihan Linux 5 Chapter 10. System Administration
1934 Linux has a reputation for being immune to viruses. However, it is normally a
1935 good policy for organizations that work in mixed-environments (Windows and
1936 non-Windows PCs in the same network) to implement virus-free computing by
1937 scanning files that are frequently shared before sending them over the network.
1938 This is where an anti-virus manager will come in.
1939 KlamAV is an anti-virus manager for the KDE desktop that allows you to manage
1940 your virus-scanning, scheduling, virus research and software/database updates.
1941 A graphical wizard will run the first time you use this application. You can
1942 safely accept the defaults and press Skip. You will need an internet connection to
1943 download virus updates for KlamAV.
1944 To run this application, simply click on the link found at the Menu:
134
Chapter 10. System Administration Bayanihan Linux 5
1947 Adding/removing users or groups is easily done using KUser. More information
1948 can be found by pressing Alt+F2 and entering the command help:/kuser.
1949 To run this application, simply click on the link found at the Menu:
135
Bayanihan Linux 5 Chapter 10. System Administration
136
1951
1952 CHAPTER
1953 ELEVEN
1954
1960 Several packages need to be installed in order to compile C/C++ source files.
1961 You can use any of the available tools for installing packages as described in sec-
1962 tion 10.1 in page 123. For the rest of this section we will be using commandline
1963 tools so you should already be familiar with using the console (see Chapter 9) and
1964 a text editor like vi, nano or MC.
1965
rage@bl5dev:~$ su
Password: <enter your root password here>
bl5dev:/home/rage# apt-get update
bl5dev:/home/rage# apt-get install build-essential
137
Bayanihan Linux 5 Chapter 11. Special Topics
1970 fakeroot
1971 autotools-dev
1972 dh-make
1973 automake1.9
1974 Additionally, if you want to build sources that depend on the graphical toolkits
1975 (such as Xorg, or Qt) you will need to install the following:
1976 xorg-dev
1977 libqt3-mt-dev
1978 kdelibs4-dev
1979 libglu1-mesa-dev
1980 qt3-designer
1981 qt3-linguist
1984 If you need to compile your own custom kernel or driver you will need to download
1985 and install the following packages:
1986 kernel-package
1987 module-assistant
1988 libncurses5-dev
1989 linux-headers-2.6-686
1990 fakeroot
1991 To compile your own custom kernel, you will need to:
138
Chapter 11. Special Topics Bayanihan Linux 5
1996 5. Edit /etc/kernel-pkg.conf and edit the maintainer and email fields.
1998 Warning: Compiling a custom kernel is for experts and advanced users and may
1999 render your machine unbootable. Before performing the installation of custom
2000 self-compiled kernels, make sure to backup your data.
2001 To compile a third-party module, you will need to:
2016 For the actual web server portion of our web server well be using Apache 2. In
2017 addition to being free and open source, Apache is by far the most used web server
2018 software on the Web.
139
Bayanihan Linux 5 Chapter 11. Special Topics
2019 Either shell or connecting remotely, well start by checking for updates to the
2020 Debian package lists. This will require root access.
2021 The package lists are updated, well tell Linux to go grab Apache. To fully install
2022 Apache, well need more than one package. Thanks to Debians APT, well be
2023 able to download and install all those dependencies with minimal work.
2024 Although it isnt a requirement, APT suggested installing the Apache documen-
2025 tation. So well go ahead and install that just in case. It suggested Lynx too but
2026 we probably wont be needing that.
140
Chapter 11. Special Topics Bayanihan Linux 5
2028 So it looks like Apache is running, but lets not take that scripts word for it.
2029 I mean, were setting up a web server so why not use a web browser? To do
2030 this, just plug the IP address of your server into the address box of your favorite
2031 browser. This should forward you to http://servername/apache2default/ where
2032 youll find a page congratulating you on your successful Apache installation.
2033 If youd like to start by editing this sample page, its easy enough to do. The
2034 default Apache files are stored in /var/www/apache2default on your server.
2035 To edit the English version of the page, well just have to use Nano (or another
2036 text editor) to edit /var/www/apache2default/index.html.en.
2037 If youd like to play with a few of Apaches settings, the main configuration
2038 file is /etc/apache2/apache2.conf. Since by default Debian will allow external
2039 connections to Apache, you may want to limit connections to your localhost or
2040 local network only.
2041 Go to this file /etc/apache2/apache2.conf for apache setting.
141
Bayanihan Linux 5 Chapter 11. Special Topics
2051 There are plenty of Apache-friendly database servers available, but MySQL is
2052 certainly a popular option. Again, this one is free and open source.
2053 Well start by installing MySQL in a manner similar to the way we installed
2054 Apache.
2055 Once MySQL begins to install, well get a brief warning screen. This is mainly to
2056 fill us in a little on how passwords will work. By default, the root user MySQL
2057 has no password (something you will want to change for a public server).
2058 Before moving on, well make sure the MySQL service is running.
2059 If youd like to change some of MySQLs settings from their default values, take
2060 a look at the files located in /etc/mysql.
2061 As with Apache, APT suggests we install the MySQL documentation. Just to be
2062 safe, well go ahead and do that.
142
Chapter 11. Special Topics Bayanihan Linux 5
This may mean that the package is missing, has been obsoleted, or
is only available from another source
E: Package mysql-doc has no installation candidate
2063 Unfortunately, this package has been removed from Debian. So if we want the
2064 documentation, well have to grab the documents directly from MySQL.com.
2065 If you are already comfortable using MySQL from the command line, you can
2066 probably skip the section on phpMyAdmin further down. But if you arent,
2067 phpMyAdmin will make your life much easier.
2069 While HTML is a useful markup language, it lacks the sophisticated scripting
2070 ability that the modern Web user expects. This is where scripting languages like
2071 JavaScript, ASP, and PHP are needed. In particular, server-side scripts like those
2072 used in PHP and ASP provide a framework for building security-minded Web
2073 interfaces.
2074 It is with good reason that most Linux-based hosts use PHP over ASP (and not
2075 because LAMA just doesnt sound all that desirable). PHP is a completely free
2076 and open source operating system. Cost aside, there are security considerations
2077 here. PHP has certainly not had a spotless record of security, but flaws are found
2078 much more quickly and are fixed almost immediately.
2079 Now if you really want to use ASP, Apache can be made to support it. However,
2080 support is limited.
2081 Most of us, though, are using PHP (hence the popularity of LAMP) so well go
2082 ahead and set it up. Again, this starts on the command line.
143
Bayanihan Linux 5 Chapter 11. Special Topics
2083 Since we will be using both PHP and MySQL on our server, well go ahead and
2084 install the PHPs MySQL module to help them play together better. Well also
2085 install PHPs Pear extensions since so many packages will require it.
2086 There are a few other packages well need to install to get Apache working with
2087 PHP.
2088 All the necessary packages are installed, but we arent quite done yet. Using your
2089 favorite text editor, well need to make some changes to /etc/apache2/apache2.conf.
144
Chapter 11. Special Topics Bayanihan Linux 5
2090 First, locate the line #AddType application/xhttpdphp .php and uncomment
2091 the line by removing the # from the beginning. Next, well need to add the line
2092 below.
2093 LoadModule php4 module /usr/lib/apache2/modules/libphp5.so
2094 To get those changes to take effect, well have to restart Apache. If we dont, web
2095 browsers will be downloading our full PHP files rather than Apache processing
2096 them first.
2097 bayanihan:/home/pearliezl# /etc/init.d/apache2 restart
2098 To show that PHP is working, well make a small PHP file and stick it in our web
2099 folder. Within the directory /home/pearliezl/public html, Im going to add a file
2100 called index.php with the following contents:
2101 <?php
2102 phpinfo();
2103 ?>
2104 This will generate a PHP page at http://servername/ pearliezl/ that will tell us
2105 a lot about our PHP installation.
2107 Dont listen to the people wholl tell you that you are cheating if you dont run
2108 MySQL from the command line. Not only is that method more difficult, but you
2109 risk doing more damage if you make a mistake.
2110 phpMyAdmin is a web interface designed specifically for administering MySQL.
2111 While there are times that MySQL is best used directly (like when you are moving
2112 a 50 MB database to a new co-located server), phpMyAdmin is commonly used
2113 to handle day-to-day database issues.
2114 The installation of phpMyAdmin is fairly straightforward.
145
Bayanihan Linux 5 Chapter 11. Special Topics
2115 Once the installation begins, well be presented with a question about which web
2116 servers to reconfigure. Since we used Apache2, be sure to check that. When
2117 prompted, go ahead and have Apache2 restarted.
2118 To test out phpMyAdmin, well first point our web browser to http://servername/phpmyadmin/.
2119 We will connect using the username root and a blank password. Once we do,
2120 phpMyAdmin will greet us with stern warning about our blank password. Click-
2121 ing on Change password will allow us to set one and get rid of that warning.
2126 This guide will show you how to setup Postfix mail server running alongside Cyrus
2127 SASL, Courier-IMAP and SquirrelMail. Once everything is setup you will be able
2128 to read and write emails using the SquirrelMail web interface and be able to access
2129 your email anywhere in the world!
2130 Install and Configure Postfix Postfix requires a DNS service running otherwise it
2131 will not work, follow this Debian Lenny Bind Howto guide if required. During the
2132 Postfix installation, Select Internet Site and enter your domain name for System
2133 mail name, ie example.com
2134 # apt-get install postfix
2135 Make sure you read the comments and change accordingly.
2136 # nano /etc/postfix/main.cf
2137 smtpd banner = $myhostname ESMTP $mail name (example.com) biff = no ap-
2138 pend dot mydomain = no
2139 ### your hostname here myhostname = server
2140 mydomain = example.com myorigin = $mydomain inet interfaces = all mydesti-
2141 nation = $mydomain, localhost.$mydomain, localhost
146
Chapter 11. Special Topics Bayanihan Linux 5
147
Bayanihan Linux 5 Chapter 11. Special Topics
148
Chapter 11. Special Topics Bayanihan Linux 5
149
Bayanihan Linux 5 Chapter 11. Special Topics
2242 up an NFS Client. However, every client that is set up requires modifications
2243 on the server to authorize that client (unless the server setup is done in a very
2244 insecure way), so even if you are not setting up a server you may wish to read
2245 this section to get an idea what kind of authorization problems to look out for.
2246 Setting up the server will be done in two steps: Setting up the configuration files
2247 for NFS, and then starting the NFS services.
2248 2.2 Setting up the Configuration files
2249 There are three main configuration files you will need to edit to set up an NFS
2250 server: /etc/exports, /etc/hosts.allow, and /etc/host.deny . Strictly speaking,
2251 you only need to edit /etc/exports to get NFS to work, but you would be left
2252 with an extremely insecure setup. You may also need to edit your startup scripts;
2253 Setting Up an NFS Server for more on that.
2254 2.2.1 /etc/exports
2255 This file contains a list of entries; each entry indicates a volume that is shared and
2256 how it is shared. Check the man pages (man exports) for a complete description
2257 of all the setup options for the file, although the description here will probably
2258 satisfy most peoples needs.
2259 An entry in /etc/exports will typically look like this:
2260 directory machine1(option11, option12) machine2(option21, option22)
2261 where
2262 directory
2263 the directory that you want to share. It may be an entire volume thought it need
2264 not be. If you share a directory, then all directories under it within the same file
2265 system will be shared as well.
2266 machine1 and machine2
2267 client machines that will have access to the directory. The machines may be
2268 listed by their DNS address or their IP address (e.g. machine. company.com or
2269 192.168.0.1). Using IP addresses is more reliable and more secure. If you need to
2270 use DNS addresses, and they do not seem to be resolving to the right machine,
2271 Troubleshooting.
2272 optionxx
2273 the option listing for each machine will describe what kind of access that machine
2274 will have. Important options are:
2275 ro: The directory is shared read only; the client machine will not be able to write
150
Chapter 11. Special Topics Bayanihan Linux 5
151
Bayanihan Linux 5 Chapter 11. Special Topics
2314 Second, you can use NIS netgroups in your entry. To specify a netgroup in your
2315 exports file, simple prepend the name of the netgroup with an @. See the NIS
2316 HOWTO for details on how netgroups work.
2317 Third, you can use wildcards such as *.foo.com or 192.168. instead of hostnames.
2318 There were problems with wildcard implementation in the 2.2 kernel series that
2319 were fixed in kernel 2.219.
2320 However, you should keep in mind that any of these simplications could cause a
2321 security risk if there are machines in your netgroup or local network that you do
2322 not trust completely.
2323 A few cautions are in order about wat cannot (or should not) be exported. First,
2324 if a directory is exported, its parent and child directories cannot be exported if
2325 they are in the same filesystem. However, exporting both should not be neces-
2326 sary because listing the parent directory in the /etc/exports file will cause all
2327 underlying directories within that file system to be exported.
2328 Second, it is a poor idea to export a FAT or VFAT (i.e, MS-DOS or Windows
2329 95/98) filesystem with NFS. FAT is not designed for use on a multi-user machine,
2330 and as a result, operations that depend on permissions will not work well. More-
2331 over, some of the underlying filesystem design is reported to work poorly with
2332 NFSs expectations.
2333 Third, device or other special files may not export correctly to non-Linux clients.
2334 See Using Linux NFS with other OSes for details on particular operating sys-
2335 tems.
2336 2.2.2 /etc/hosts.allow and /etc/hosts.deny
2337 These two files specify which computers on the network can use services on your
2338 machine. Each line of the file contains a single entry listing a service and a set of
2339 machines. When the server gets a request from a machine, it does the following:
2340 1. It first checks host.allow to see if the machine a rule listed hee. If it does,
2341 then the machine is allowed access. 2. If the machine does not match an entry
2342 in hosts.allow the server then checks hosts.deny to see if the client matches a rule
2343 listed there. If it does then the machine is denied access. 3. If the client matches
2344 no listings in either file, then it is allowed access. In addition to controlling
2345 access to services handled by inetd(such as telnet and FTP), this file can also
2346 control access to NFS by restricting connections to the daemons that provide
2347 NFS services. Restrictions are done on a per-service basis.
2348 The first daemon to restrict access to is the portmapper. This daemon essen-
2349 tially just tells requesting clients how to find all the NFS services on the system.
2350 Restricting access to the portmapper is the best defense against someone break-
2351 ing into your system through NFS because completely unauthorized clients wont
152
Chapter 11. Special Topics Bayanihan Linux 5
2352 know where to find the NFS daemons. However, there are two things to watch out
2353 for. First, restricting portmapper will also restrict requests to NIS. That should
2354 usually be harmless since you usually want to restrict NFS and IS in a similar
2355 way but just be cautioned. (Running NIS is generally a good idea if you are
2356 running NFS, because the client machines need a way of knowing who owns what
2357 files on the exported volumes. OF course there are other ways of doing this such
2358 as syncing password files. See the NIS HOWTO for information on setting up
2359 NIS.)
2360 In general it is a good idea with NFS (as with most internet services) to explicitly
2361 deny access to IP addresses that you dont need to allow access to.
2362 The first step in doing this is to add the following entry to /etc/hosts.deny:
2363 portmap:ALL
2364 Starting with nfs-utils 0.2.0, you can be a bit more carefule by controlling access
2365 to individual daemons. Its a good precaution since an intruder will often be able
2366 to weasel around the portmapper. If you have a newer version of nfs-utils, add
2367 entries for each of the NFS daemons.
2368 lockd:ALL mountd:ALL rquotad:ALL statd:ALL
2369 Even if you have an older version of nfs-utils, adding these entries is at worst
2370 harmless and at best will save you some trouble when you upgrade. Some sys
2371 admins choose to put the entry ALL:ALL in the file /etc/hosts.deny, which causes
2372 any service that looks at these files to deny access to all hosts unless it is explicitly
2373 allowed. While this is more secure behavior, it may also get you in trouble when
2374 you are installing new services. you forget you put it there and you cant figure
2375 out for the life of you why they wont work.
2376 Next, we need to add an entry to hosts.allow to give any hosts access that we
2377 want to have access. (If we just leave the above lines in hosts.deny then nobody
2378 will have access to NFS.) Entries in hosts.allow follow the format:
2379 service: host[or network/netmask] , host [or network/netmask]
2380 Here, host is IP address of a potential client; it may be possible in some versions
2381 to use the DNS name of the host, but it is strongly discouraged.
2382 Suppose we have the setup above and we just want to allow access to slave1.foo.com
2383 and slave2.foo.com, and suppose that the IP addresses of these machines are
2384 192.168.0.1 and 192.168.0.2, respectively. We could add the following entry to
2385 /etc/hosts.allow:
2386 portmap: 192.168.0.1 , 192.168.0.2
2387 For recent nfs-utils versions, we would also add the following (again, these entries
153
Bayanihan Linux 5 Chapter 11. Special Topics
154
Chapter 11. Special Topics Bayanihan Linux 5
2425 If your distribution does not include them in the startup scripts, then then you
2426 should add them, configured to start in the following order:
2427 rpc.portmap rpc.mountd, rpc.nfsd rpc.statd, rpc.lockd (if necessary), and rpc.rquotad
2428 The nfs-utils package has sample startup scripts for RedHat and Debian. If you
2429 are using a different distribution, in general you can just copy the RedHat script,
2430 but you will probably have to take out the line that says:
2431 . ../init.d/functions
2432 to avoid getting error messages.
2433 2.3.4 Verifying that NFS is running
2434 To do this, query the portmapper with the command rpcinfo quota to find out
2435 what services it is providing. You should get something like this:
2436 program vers proto port 100000 2 tcp 111 portmapper 100000 2 udp 111 portmap-
2437 per 100011 1 udp 749 rquotad 100011 2 udp 749 rquotad 100005 1 udp 759 mountd
2438 100005 1 tcp 761 mountd 100005 2 udp 764 mountd 100005 2 tcp 766 mountd
2439 100005 3 udp 769 mountd 100005 3 tcp 771 mountd 100003 2 udp 2049 nfs 100003
2440 3 udp 2049 nfs 300019 1 tcp 830 amd 300019 1 udp 831 amd 100024 1 udp 944
2441 status 100024 1 tcp 946 status 100021 1 udp 1042 nlockmgr 100021 3 udp 1042
2442 nlockmgr 100021 4 udp 1042 nlockmgr 100021 1 tcp 1629 nlockmgr 100021 3 tcp
2443 1629 nlockmgr 100021 4 tcp 1629 nlockmgr
2444 This says that we have NFS versions 2 and 3, rpc.statd version 1, network lock
2445 manager (the service name for rpc.lockd) versions 1, 3, and 4. There are also
2446 different service listings depending on whether NFS is travelling over TCP or
2447 UDP. Linux systems use UDP by default unless TCP is explicitly requested;
2448 however other OSes such as Solaris default to TCP.
2449 If you do not at least see a line that says portmapper, a line that says nfs, and a
2450 line that says mountd then you will need to backtrack and try again to start up
2451 the daemons (see Troubleshooting if this still doesnt work).
2452 If you do see these services listed, then you should be ready to set up NFS clients
2453 to access files from your server.
2454 2.3.5 Making Changes to /etc/exports later on
2455 If you come back and change your /etc/exports file, the changes you make may
2456 not take effect immediately. You should run the command exportfs -ra to force
2457 nfsd to re-read the /etc/exports file. If you cant find the exportfs command, then
2458 you can kill nfsd with the -HUP flag (see the man pages for kill for details).
2459 If that still doesnt work, dont forget to check hosts.allow to make sure you
155
Bayanihan Linux 5 Chapter 11. Special Topics
2460 havent forgotten to list any new client machines there. Also check the host
2461 listings on any firewalls you may have set up (see Troubleshooting and Security
2462 and NFS for more details on firewalls and NFS).
2463 3. Setting up an NFS Client
2464 3.1 Mounting Remote Directories
2465 Before beginning, you should double-check to make sure your mount program is
2466 new enough (version 2.10m if you want to use Version 3 NFS), and that the client
2467 machine supports NFS mounting, though most standard distributions do. If you
2468 are using a 2.2 or later kernel with the /proc filesystem you can check the latter
2469 by reading the file /proc/filesystems and making sure there is a line containing
2470 nfs. If not, typing insmod nfs may make it magically appear if NFS has been
2471 compiled as a module; otherwise, you will need to build (or download) a kernel
2472 that has NFS support built in. In general, kernels that do not have NFS compiled
2473 in will give a very specific error when the mount command below is run.
2474 To begin using machine as an NFS client, you will need the portmapper running
2475 on that machine, and to use NFS file locking, you will also need rpc.statd and
2476 rpc.lockd running on both the client and the server. Most recent distributions
2477 start those services by default at boot time; if yours doesnt, see Setting up an
2478 NFS Client for information on how to start them up.
2479 With portmap, lockd, and statd running, you should now be able to mount the
2480 remote directory from your server just the way you mount a local hard drive,
2481 with the mount command. Continuing our example from the previous section,
2482 suppose our server above is called master.foo.com,and we want to mount the
2483 /home directory on slave1.foo.com. Then, all we have to do, from the root prompt
2484 on slave1.foo.com, is type:
2485 # mount master.foo.com:/home /mnt/home
2486 and the directory /home on master will appear as the directory /mnt/home on
2487 slave1. (Note that this assumes we have created the directory /mnt/home as an
2488 empty mount point beforehand.)
2489 If this does not work, see Troubleshooting.
2490 You can get unmount the file system by typing:
2491 # umount /mnt/home
2492 Just like you would for a local file system.
2493 3.2 Getting NFS File Systems to be Mounted at Boot Time
2494 NFS file systems can be added to your /etc/fstab file the same way local file
156
Chapter 11. Special Topics Bayanihan Linux 5
2495 systems can, so that they mount when your system starts up. The only difference
2496 is that the file system type will be set to nfs and the dump and fsck order (the
2497 last two entries) will have to be set to zero. So for our example above, the entry
2498 in /etc/fstab would look like:
2499 # device mountpoint fs-type options dump fsckorder ... master.foo.com:/home
2500 /mnt nfs rw 0 0 ...
2501 See the man pages for fstab if you are unfamiliar with the syntax of this file. If you
2502 are using an automounter such as amd or autofs, the options in the corresponding
2503 fields of your mount listings should look very similar if not identical.
2504 At this point you should have NFS working, though a few tweaks may still be
2505 necessary to get it to work well. You should also read Section 6, Security and
2506 NFS to be sure your setup is reasonably secure.
2507 3.3 Mount Options
2508 3.3.1 Soft versus Hard Mounting
2509 There are some options you should consider adding at once. They govern the way
2510 the NFS client handles a server crash or network outage. One of the cool things
2511 about NFS is that it can handle this gracefully. If you set up the clients right.
2512 There are two distinct failure modes:
2513 soft
2514 If a file request fails, the NFS client will report an error to the process on the
2515 client machine requesting the file access. Some programs can handle this with
2516 composure, most wont. We do not recommend using this setting; it is a recipe
2517 for corrupted files and lost data. You should especially not use this for mail disks
2518 if you value your mail, that is.
2519 hard
2520 The program accessing a file on a NFS mounted file system will hang when the
2521 server crashes. The process cannot be interrupted or killed (except by a sure
2522 kill) unless you also specify intr. When the NFS server is back online the program
2523 will continue undisturbed from where it was. We recommend using hard,intr on
2524 all NFS mounted file systems.
2525 Picking up from the previous example, the fstab would now look like:
2526 # device mountpoint fs-type options dump fsckord ... master.foo.com:/home
2527 /mnt/home nfs rw,hard,intr 0 0 ...
2528 The rsize and wsize mount options specify the size of the chunks of data that the
2529 client and server pass back and forth to each other.
157
Bayanihan Linux 5 Chapter 11. Special Topics
2530 The defaults may be too big or to small; there is no size that works well on all or
2531 most setups. On the one hand, some combinations of Linux kernels and network
2532 cards (largely on older machines) cannot handle blocks that large. On the other
2533 hand, if they can handle larger blocks, a bigger size might be faster.
2534 Getting the block size right is an important factor in performance and is a must if
2535 you are planning to use the NFS server in a production environment. See Section
2536 5, Optimizing NFS Performance for details.
158
2538
2539 APPENDIX
2540 A
2541
2547 The GNU General Public License is a free, copyleft license for software and other
2548 kinds of works.
2549 The licenses for most software and other practical works are designed to take away
2550 your freedom to share and change the works. By contrast, the GNU General
2551 Public License is intended to guarantee your freedom to share and change all
2552 versions of a programto make sure it remains free software for all its users. We,
2553 the Free Software Foundation, use the GNU General Public License for most of
2554 our software; it applies also to any other work released this way by its authors.
2555 You can apply it to your programs, too.
2556 When we speak of free software, we are referring to freedom, not price. Our
2557 General Public Licenses are designed to make sure that you have the freedom
2558 to distribute copies of free software (and charge for them if you wish), that you
2559 receive source code or can get it if you want it, that you can change the software
2560 or use pieces of it in new free programs, and that you know you can do these
2561 things.
159
Bayanihan Linux 5 Appendix A. GNU GPL
2562 To protect your rights, we need to prevent others from denying you these rights
2563 or asking you to surrender the rights. Therefore, you have certain responsibilities
2564 if you distribute copies of the software, or if you modify it: responsibilities to
2565 respect the freedom of others.
2566 For example, if you distribute copies of such a program, whether gratis or for a
2567 fee, you must pass on to the recipients the same freedoms that you received. You
2568 must make sure that they, too, receive or can get the source code. And you must
2569 show them these terms so they know their rights.
2570 Developers that use the GNU GPL protect your rights with two steps: (1) as-
2571 sert copyright on the software, and (2) offer you this License giving you legal
2572 permission to copy, distribute and/or modify it.
2573 For the developers and authors protection, the GPL clearly explains that there
2574 is no warranty for this free software. For both users and authors sake, the GPL
2575 requires that modified versions be marked as changed, so that their problems will
2576 not be attributed erroneously to authors of previous versions.
2577 Some devices are designed to deny users access to install or run modified versions
2578 of the software inside them, although the manufacturer can do so. This is fun-
2579 damentally incompatible with the aim of protecting users freedom to change the
2580 software. The systematic pattern of such abuse occurs in the area of products for
2581 individuals to use, which is precisely where it is most unacceptable. Therefore,
2582 we have designed this version of the GPL to prohibit the practice for those prod-
2583 ucts. If such problems arise substantially in other domains, we stand ready to
2584 extend this provision to those domains in future versions of the GPL, as needed
2585 to protect the freedom of users.
2586 Finally, every program is threatened constantly by software patents. States should
2587 not allow patents to restrict development and use of software on general-purpose
2588 computers, but in those that do, we wish to avoid the special danger that patents
2589 applied to a free program could make it effectively proprietary. To prevent this,
2590 the GPL assures that patents cannot be used to render the program non-free.
2591 The precise terms and conditions for copying, distribution and modification follow.
2593 0. Definitions.
2594 This License refers to version 3 of the GNU General Public License.
2595 Copyright also means copyright-like laws that apply to other kinds of
2596 works, such as semiconductor masks.
2597 The Program refers to any copyrightable work licensed under this License.
160
Appendix A. GNU GPL Bayanihan Linux 5
161
Bayanihan Linux 5 Appendix A. GNU GPL
2638 or a compiler used to produce the work, or an object code interpreter used
2639 to run it.
2640 The Corresponding Source for a work in object code form means all the
2641 source code needed to generate, install, and (for an executable work) run
2642 the object code and to modify the work, including scripts to control those
2643 activities. However, it does not include the works System Libraries, or
2644 general-purpose tools or generally available free programs which are used
2645 unmodified in performing those activities but which are not part of the
2646 work. For example, Corresponding Source includes interface definition files
2647 associated with source files for the work, and the source code for shared
2648 libraries and dynamically linked subprograms that the work is specifically
2649 designed to require, such as by intimate data communication or control flow
2650 between those subprograms and other parts of the work.
2651 The Corresponding Source need not include anything that users can regen-
2652 erate automatically from other parts of the Corresponding Source.
2653 The Corresponding Source for a work in source code form is that same work.
162
Appendix A. GNU GPL Bayanihan Linux 5
2700 (a) The work must carry prominent notices stating that you modified it,
2701 and giving a relevant date.
2702 (b) The work must carry prominent notices stating that it is released under
2703 this License and any conditions added under section 7. This require-
2704 ment modifies the requirement in section 4 to keep intact all notices.
2705 (c) You must license the entire work, as a whole, under this License to
2706 anyone who comes into possession of a copy. This License will there-
2707 fore apply, along with any applicable section 7 additional terms, to the
2708 whole of the work, and all its parts, regardless of how they are pack-
2709 aged. This License gives no permission to license the work in any other
2710 way, but it does not invalidate such permission if you have separately
2711 received it.
2712 (d) If the work has interactive user interfaces, each must display Appropri-
2713 ate Legal Notices; however, if the Program has interactive interfaces
2714 that do not display Appropriate Legal Notices, your work need not
2715 make them do so.
163
Bayanihan Linux 5 Appendix A. GNU GPL
2716 A compilation of a covered work with other separate and independent works,
2717 which are not by their nature extensions of the covered work, and which are
2718 not combined with it such as to form a larger program, in or on a volume of
2719 a storage or distribution medium, is called an aggregate if the compilation
2720 and its resulting copyright are not used to limit the access or legal rights of
2721 the compilations users beyond what the individual works permit. Inclusion
2722 of a covered work in an aggregate does not cause this License to apply to
2723 the other parts of the aggregate.
2728 (a) Convey the object code in, or embodied in, a physical product (includ-
2729 ing a physical distribution medium), accompanied by the Correspond-
2730 ing Source fixed on a durable physical medium customarily used for
2731 software interchange.
2732 (b) Convey the object code in, or embodied in, a physical product (includ-
2733 ing a physical distribution medium), accompanied by a written offer,
2734 valid for at least three years and valid for as long as you offer spare
2735 parts or customer support for that product model, to give anyone who
2736 possesses the object code either (1) a copy of the Corresponding Source
2737 for all the software in the product that is covered by this License, on
2738 a durable physical medium customarily used for software interchange,
2739 for a price no more than your reasonable cost of physically perform-
2740 ing this conveying of source, or (2) access to copy the Corresponding
2741 Source from a network server at no charge.
2742 (c) Convey individual copies of the object code with a copy of the written
2743 offer to provide the Corresponding Source. This alternative is allowed
2744 only occasionally and noncommercially, and only if you received the
2745 object code with such an offer, in accord with subsection 6b.
2746 (d) Convey the object code by offering access from a designated place
2747 (gratis or for a charge), and offer equivalent access to the Correspond-
2748 ing Source in the same way through the same place at no further charge.
2749 You need not require recipients to copy the Corresponding Source along
2750 with the object code. If the place to copy the object code is a network
2751 server, the Corresponding Source may be on a different server (oper-
2752 ated by you or a third party) that supports equivalent copying facilities,
2753 provided you maintain clear directions next to the object code saying
2754 where to find the Corresponding Source. Regardless of what server
2755 hosts the Corresponding Source, you remain obligated to ensure that
2756 it is available for as long as needed to satisfy these requirements.
164
Appendix A. GNU GPL Bayanihan Linux 5
2757 (e) Convey the object code using peer-to-peer transmission, provided you
2758 inform other peers where the object code and Corresponding Source
2759 of the work are being offered to the general public at no charge under
2760 subsection 6d.
2761 A separable portion of the object code, whose source code is excluded from
2762 the Corresponding Source as a System Library, need not be included in
2763 conveying the object code work.
2764 A User Product is either (1) a consumer product, which means any
2765 tangible personal property which is normally used for personal, family, or
2766 household purposes, or (2) anything designed or sold for incorporation into a
2767 dwelling. In determining whether a product is a consumer product, doubtful
2768 cases shall be resolved in favor of coverage. For a particular product received
2769 by a particular user, normally used refers to a typical or common use of
2770 that class of product, regardless of the status of the particular user or of the
2771 way in which the particular user actually uses, or expects or is expected to
2772 use, the product. A product is a consumer product regardless of whether
2773 the product has substantial commercial, industrial or non-consumer uses,
2774 unless such uses represent the only significant mode of use of the product.
2775 Installation Information for a User Product means any methods, pro-
2776 cedures, authorization keys, or other information required to install and
2777 execute modified versions of a covered work in that User Product from a
2778 modified version of its Corresponding Source. The information must suffice
2779 to ensure that the continued functioning of the modified object code is in
2780 no case prevented or interfered with solely because modification has been
2781 made.
2782 If you convey an object code work under this section in, or with, or specif-
2783 ically for use in, a User Product, and the conveying occurs as part of a
2784 transaction in which the right of possession and use of the User Product is
2785 transferred to the recipient in perpetuity or for a fixed term (regardless of
2786 how the transaction is characterized), the Corresponding Source conveyed
2787 under this section must be accompanied by the Installation Information.
2788 But this requirement does not apply if neither you nor any third party re-
2789 tains the ability to install modified object code on the User Product (for
2790 example, the work has been installed in ROM).
2791 The requirement to provide Installation Information does not include a re-
2792 quirement to continue to provide support service, warranty, or updates for
2793 a work that has been modified or installed by the recipient, or for the User
2794 Product in which it has been modified or installed. Access to a network
2795 may be denied when the modification itself materially and adversely af-
2796 fects the operation of the network or violates the rules and protocols for
2797 communication across the network.
165
Bayanihan Linux 5 Appendix A. GNU GPL
2821 (a) Disclaiming warranty or limiting liability differently from the terms of
2822 sections 15 and 16 of this License; or
2823 (b) Requiring preservation of specified reasonable legal notices or author
2824 attributions in that material or in the Appropriate Legal Notices dis-
2825 played by works containing it; or
2826 (c) Prohibiting misrepresentation of the origin of that material, or requir-
2827 ing that modified versions of such material be marked in reasonable
2828 ways as different from the original version; or
2829 (d) Limiting the use for publicity purposes of names of licensors or authors
2830 of the material; or
2831 (e) Declining to grant rights under trademark law for use of some trade
2832 names, trademarks, or service marks; or
2833 (f) Requiring indemnification of licensors and authors of that material
2834 by anyone who conveys the material (or modified versions of it) with
2835 contractual assumptions of liability to the recipient, for any liability
2836 that these contractual assumptions directly impose on those licensors
2837 and authors.
166
Appendix A. GNU GPL Bayanihan Linux 5
2838 All other non-permissive additional terms are considered further restric-
2839 tions within the meaning of section 10. If the Program as you received it,
2840 or any part of it, contains a notice stating that it is governed by this License
2841 along with a term that is a further restriction, you may remove that term.
2842 If a license document contains a further restriction but permits relicensing
2843 or conveying under this License, you may add to a covered work material
2844 governed by the terms of that license document, provided that the further
2845 restriction does not survive such relicensing or conveying.
2846 If you add terms to a covered work in accord with this section, you must
2847 place, in the relevant source files, a statement of the additional terms that
2848 apply to those files, or a notice indicating where to find the applicable terms.
2849 Additional terms, permissive or non-permissive, may be stated in the form of
2850 a separately written license, or stated as exceptions; the above requirements
2851 apply either way.
2852 8. Termination.
2853 You may not propagate or modify a covered work except as expressly pro-
2854 vided under this License. Any attempt otherwise to propagate or modify
2855 it is void, and will automatically terminate your rights under this License
2856 (including any patent licenses granted under the third paragraph of section
2857 11).
2858 However, if you cease all violation of this License, then your license from a
2859 particular copyright holder is reinstated (a) provisionally, unless and until
2860 the copyright holder explicitly and finally terminates your license, and (b)
2861 permanently, if the copyright holder fails to notify you of the violation by
2862 some reasonable means prior to 60 days after the cessation.
2863 Moreover, your license from a particular copyright holder is reinstated per-
2864 manently if the copyright holder notifies you of the violation by some rea-
2865 sonable means, this is the first time you have received notice of violation
2866 of this License (for any work) from that copyright holder, and you cure the
2867 violation prior to 30 days after your receipt of the notice.
2868 Termination of your rights under this section does not terminate the licenses
2869 of parties who have received copies or rights from you under this License. If
2870 your rights have been terminated and not permanently reinstated, you do
2871 not qualify to receive new licenses for the same material under section 10.
167
Bayanihan Linux 5 Appendix A. GNU GPL
2878 actions infringe copyright if you do not accept this License. Therefore, by
2879 modifying or propagating a covered work, you indicate your acceptance of
2880 this License to do so.
2881 10. Automatic Licensing of Downstream Recipients.
2882 Each time you convey a covered work, the recipient automatically receives a
2883 license from the original licensors, to run, modify and propagate that work,
2884 subject to this License. You are not responsible for enforcing compliance by
2885 third parties with this License.
2886 An entity transaction is a transaction transferring control of an organi-
2887 zation, or substantially all assets of one, or subdividing an organization, or
2888 merging organizations. If propagation of a covered work results from an
2889 entity transaction, each party to that transaction who receives a copy of
2890 the work also receives whatever licenses to the work the partys predecessor
2891 in interest had or could give under the previous paragraph, plus a right to
2892 possession of the Corresponding Source of the work from the predecessor in
2893 interest, if the predecessor has it or can get it with reasonable efforts.
2894 You may not impose any further restrictions on the exercise of the rights
2895 granted or affirmed under this License. For example, you may not impose
2896 a license fee, royalty, or other charge for exercise of rights granted under
2897 this License, and you may not initiate litigation (including a cross-claim or
2898 counterclaim in a lawsuit) alleging that any patent claim is infringed by
2899 making, using, selling, offering for sale, or importing the Program or any
2900 portion of it.
2901 11. Patents.
2902 A contributor is a copyright holder who authorizes use under this License
2903 of the Program or a work on which the Program is based. The work thus
2904 licensed is called the contributors contributor version.
2905 A contributors essential patent claims are all patent claims owned or con-
2906 trolled by the contributor, whether already acquired or hereafter acquired,
2907 that would be infringed by some manner, permitted by this License, of mak-
2908 ing, using, or selling its contributor version, but do not include claims that
2909 would be infringed only as a consequence of further modification of the con-
2910 tributor version. For purposes of this definition, control includes the right
2911 to grant patent sublicenses in a manner consistent with the requirements of
2912 this License.
2913 Each contributor grants you a non-exclusive, worldwide, royalty-free patent
2914 license under the contributors essential patent claims, to make, use, sell,
2915 offer for sale, import and otherwise run, modify and propagate the contents
2916 of its contributor version.
2917 In the following three paragraphs, a patent license is any express agree-
2918 ment or commitment, however denominated, not to enforce a patent (such
168
Appendix A. GNU GPL Bayanihan Linux 5
169
Bayanihan Linux 5 Appendix A. GNU GPL
2961 work so as to satisfy simultaneously your obligations under this License and
2962 any other pertinent obligations, then as a consequence you may not convey
2963 it at all. For example, if you agree to terms that obligate you to collect a
2964 royalty for further conveying from those to whom you convey the Program,
2965 the only way you could satisfy both those terms and this License would be
2966 to refrain entirely from conveying the Program.
2967 13. Use with the GNU Affero General Public License.
2968 Notwithstanding any other provision of this License, you have permission
2969 to link or combine any covered work with a work licensed under version 3
2970 of the GNU Affero General Public License into a single combined work, and
2971 to convey the resulting work. The terms of this License will continue to
2972 apply to the part which is the covered work, but the special requirements of
2973 the GNU Affero General Public License, section 13, concerning interaction
2974 through a network will apply to the combination as such.
170
Appendix A. GNU GPL Bayanihan Linux 5
3027 If you develop a new program, and you want it to be of the greatest possible
3028 use to the public, the best way to achieve this is to make it free software
3029 which everyone can redistribute and change under these terms.
3030 To do so, attach the following notices to the program. It is safest to attach
3031 them to the start of each source file to most effectively state the exclusion
3032 of warranty; and each file should have at least the copyright line and a
3033 pointer to where the full notice is found.
3034 <one line to give the programs name and a brief idea of what it does.>
3035
3036 Copyright (C) <textyear> <name of author>
3037
171
Bayanihan Linux 5 Appendix A. GNU GPL
3038 This program is free software: you can redistribute it and/or modify
3039 it under the terms of the GNU General Public License as published by
3040 the Free Software Foundation, either version 3 of the License, or
3041 (at your option) any later version.
3042
3043 This program is distributed in the hope that it will be useful,
3044 but WITHOUT ANY WARRANTY; without even the implied warranty of
3045 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
3046 GNU General Public License for more details.
3047
3048 You should have received a copy of the GNU General Public License
3049 along with this program. If not, see <http://www.gnu.org/licenses/>.
3050 Also add information on how to contact you by electronic and paper mail.
3051 If the program does terminal interaction, make it output a short notice like
3052 this when it starts in an interactive mode:
3058 The hypothetical commands show w and show c should show the appropri-
3059 ate parts of the General Public License. Of course, your programs com-
3060 mands might be different; for a GUI interface, you would use an about
3061 box.
3062 You should also get your employer (if you work as a programmer) or school,
3063 if any, to sign a copyright disclaimer for the program, if necessary. For
3064 more information on this, and how to apply and follow the GNU GPL, see
3065 http://www.gnu.org/licenses/.
3066 The GNU General Public License does not permit incorporating your pro-
3067 gram into proprietary programs. If your program is a subroutine library,
3068 you may consider it more useful to permit linking proprietary applica-
3069 tions with the library. If this is what you want to do, use the GNU
3070 Lesser General Public License instead of this License. But first, please read
3071 http://www.gnu.org/philosophy/why-not-lgpl.html.
172
3072 BIBLIOGRAPHY
3082 [4] Bob Rankin. How Does The Linux File System Work? Bob Rankin, http:
3083 //lowfatlinux.com/linux-files.html, 2009.
3084 [5] Pamela Roberts. The Konqueror Handbook. Erwan Loisant, Pamela
3085 Roberts, http://docs.kde.org/stable/en/kdebase-apps/konqueror/
3086 filemanager.html#dirfolders, 2000, 2002.
3087 [6] Mayank Sarup. The Linux filesystem explained. FreeOS Technologies (I) Pvt.
3088 Ltd., http://www.freeos.com/articles/3102/, 1998-2004.
3089 [7] Andrew Solomon. Filesystem Basics. Linux Config Wiki, http://www.
3090 linuxconfig.org/Filesystem_Basics, March 13, 2008.
3091 [8] Debian Installer Team. Debian GNU/Linux Installation Guide. Debian In-
3092 staller team, http://www.debian.org/releases/lenny/i386/, 2004, 2005,
3093 2006, 2007, 2008.
173
INDEX
174
Index Bayanihan Linux 5
3173 taskbar, 26
3174 terminal, 107
3175 trash, 32
175