Global network block device, using gnbd with red hat global file system (24 pages)
Summary of Contents for Red Hat ENTERPRISE LINUX 4 - STEP BY STEP GUIDE
Page 1
Red Hat Enterprise Linux 4 Red Hat Enterprise Linux Step By Step Guide...
Page 2
All other trademarks referenced herein are the property of their respective owners. The GPG fingerprint of the security@redhat.com key is: CA 20 86 86 2B D6 9D FC 65 F6 EC C4 21 91 80 CD DB 42 A6 0E...
Table of Contents Introduction............................i 1. Architecture-specific Information ..................i 2. Changes to This Manual ......................i 3. Document Conventions ......................ii 4. Copying and Pasting Text With X..................iv 5. Using the Mouse ........................v 6. We Need Feedback! ......................v I.
Page 4
7. Email Applications......................81 7.1. Evolution......................82 7.2. Thunderbird......................84 7.3. Plain Text Email Clients ..................86 8. Working with OpenOffice.org..................... 89 8.1. Feature overview of OpenOffice.org ..............89 8.2. OpenOffice.org Writer ..................91 8.3. OpenOffice.org Calc .................... 94 8.4. OpenOffice.org Impress ..................95 8.5.
Page 5
IV. Appendix ........................... 133 A. KDE: The K Desktop Environment ................. 135 A.1. Customizing KDE ..................... 135 A.2. Introducing Konqueror ..................136 A.3. Using Konqueror ..................... 138 A.4. Using the KDE Desktop..................140 A.5. Using the Panel ....................141 A.6. Browsing the Web with Konqueror ..............144 A.7.
Introduction to System Administration, and the Red Hat Enterprise Linux Security Guide. HTML, PDF, and RPM versions of the manuals are available on the Red Hat Enterprise Linux Docu- mentation CD and online at http://www.redhat.com/docs/. Note Although this manual reflects the most current information possible, read the Red Hat Enterprise Linux Release Notes for information that may not have been available prior to our documentation being finalized.
Introduction 2. Changes to This Manual This manual was previously published under the title Red Hat Linux Getting Started Guide. It has been renamed and incorporated into the Red Hat Enterprise Linux documentation set. It has been modified to include new features in Red Hat Enterprise Linux 4 and to reflect changes in documented procedures that are not supported in Red Hat Enterprise Linux.
Page 9
Introduction [key] A key on the keyboard is shown in this style. For example: To use [Tab] completion, type in a character and then press the [Tab] key. Your terminal displays the list of files in the directory that start with that letter. [key]-[combination] A combination of keystrokes is represented in this way.
Page 10
Introduction user input Text that the user has to type, either on the command line, or into a text box on a GUI screen, is displayed in this style. In the following example, text is displayed in this style: To boot your system into the text based installation program, you must type in the text com- mand at the prompt.
If you spot a typographical error in the Red Hat Enterprise Linux Step By Step Guide, or if you have thought of a way to make this manual better, we would love to hear from you! Please submit a report in Bugzilla: http://bugzilla.redhat.com/bugzilla/ against the component rhel-sbs. When submitting a bug report, be sure to mention the manual’s identifier: rhel-sbs(EN)-4-Print-RHI (2005-02-16T01:05) If you have a suggestion for improving the documentation, try to be as specific as possible when de-...
I. Starting Out To begin the journey of using your Red Hat Enterprise Linux system, you need to learn the basics. This part introduces the concepts and terms that help you get the most out of Red Hat Enterprise Linux, and learn some of its exciting features. From configuring your system with Setup Agent to using your graphical desktop and the shell prompt, this part helps you get acquainted with your Red Hat Enterprise Linux system.
Chapter 1. Getting Started From booting up to shutting down, whether you are working or playing, Red Hat Enterprise Linux provides tools and applications to help you get the most out of your computing environment. This chapter guides you through some basic tasks that you can perform on your Red Hat Enterprise Linux system.
Page 16
Chapter 1. Getting Started The Setup Agent first prompts you to read and agree to the License Agreement, which discusses your rights in using Red Hat Enterprise Linux. Click Yes, I agree to the License Agreement and click Next to continue. Important You must agree to the License Agreement to continue using Red Hat Enterprise Linux.
Page 17
Chapter 1. Getting Started You may also synchronize your date and time automatically with a network time server — a computer that sends accurate date and time settings to your system through a network connection. Select, the Network Time Protocol, check the box labeled Enable Network Time Protocol, and use the drop- down menu to select a time server.
Page 18
Chapter 1. Getting Started Figure 1-7. Activation To activate an existing Red Hat subscription, enter the Activation Number in the appropriate field. Otherwise, select I do not have a subscription number. Click Next to continue. Figure 1-8. User Account Next, you should create a user account to use on a routine basis. It is not recommended to log in to your root account for common computing tasks, as you may damage your system or unintentionally delete a file.
Page 19
Chapter 1. Getting Started Figure 1-9. Sound Card The Setup Agent probes your system for sound cards and attempts to configure the correct settings for use with Red Hat Enterprise Linux. You can then click the Play test sound button to play a sound sample.
Chapter 1. Getting Started Figure 1-11. Finish Setup Now that your system is configured, you are ready to log in and start using Red Hat Enterprise Linux. Press Forward to exit the Setup Agent. 1.2. Introductory Terms When you learn about a new operating system, you should also learn new terminology. This section defines a few basic terms you should learn.
Chapter 1. Getting Started using the root account, which can reduce the chance of damaging your Red Hat Enterprise Linux installation or applications permanently. RPM: RPM stands for RPM Package Manager and is how Red Hat builds and delivers its software •...
Page 22
Chapter 1. Getting Started If you have already created and logged in to a user account, you can skip ahead to Chapter 2 Using the Graphical Desktop. If you created only the root account, refer to Section 1.6 Creating a User Account to learn how to set up a user account. If you did not create a user account using the Setup Agent, you must log in as root.
Chapter 1. Getting Started Kernel 2.4.21-3.EL on an i686 localhost login: Unless you have chosen to give your machine its own hostname, which is primarily used in a network setting, your machine will probably be called localhost.localdomain To log in as root from the console, type root at the login prompt, press [Enter], then type the root password that you chose during installation at the password prompt and press [Enter].
Page 24
You can also start the User Manager by typing at a shell prompt. redhat-config-users 2. If you are not logged in as root, you will be prompted for your root password. 3. The window shown in Figure 1-16 will appear. Click Add User.
Chapter 1. Getting Started 6. At the prompt, enter the same password to confirm your selection. Retype new password: Important You should take precautions when you choose a password. The password is the key to your account, so it should be both unique and easy for you to remember. Your password should be at least six characters.
Page 26
Linux Documentation CD. All of the Red Hat Enterprise Linux manuals are on this CD. Individual downloads of our documentation in HTML, RPM, PDF, and compressed tarball format ) are also available at http://www.redhat.com/docs/. Once you have logged in to your user .tar.gz account, inserting the Documentation CD in your CD-ROM drive should automatically start the Pack- age Management Tool and allow you to install any of the Red Hat Enterprise Linux documentation.
Figure 1-18. Package Management Tool Displaying Documentation Available for Installation If you have downloaded individual documentation RPM packages from the Red Hat website at http://www.redhat.com/docs/ you can install these manuals from a shell prompt. Open a shell prompt, and type the following at the command line: su - Press [Enter].
Chapter 1. Getting Started Figure 1-19. Logout Confirmation 1.8.2. Virtual Console Logout If you are not using the X Window System, and you logged in at the console, type or [Ctrl]-[D] exit to log out of the console session. 1.9. Shutting Down your Computer Before turning off your computer, it is important to properly shut down Red Hat Enterprise Linux.
Chapter 2. Using the Graphical Desktop Red Hat Enterprise Linux includes a powerful graphical desktop environment where you can easily access your applications, files, and system resources. Both new and experienced users can take full advantage of their Red Hat Enterprise Linux systems using the graphical desktop. This chapter covers the fundamentals of the desktop and how to configure it for your needs.
Page 30
Chapter 2. Using the Graphical Desktop 2.1.1. Using the Computer icon Figure 2-2. Double-clicking the Computer icon takes you to a list of all of the devices on your system. A device is anything connected to your computer to which data is sent or from which it is received. (You have probably heard of a ’device driver’...
Page 31
Chapter 2. Using the Graphical Desktop under the icon varies according to your user name. If you are logged in as root, the label reads root’s Home. User "joe" would see the label joe’s Home. Figure 2-3. User’s Home Double-clicking on the User’s Home icon allows you to navigate through your home directory or the rest of the file system.
Page 32
Chapter 2. Using the Graphical Desktop Figure 2-4. Customizing Nautilus - View Tab Views Tab The Views tab allows you to choose how your files and folders are displayed. You can also choose a Default Zoom Level. Zooming in on icons not only increases the size of the icons, but adds to the displayed information about each file or folder.
Chapter 2. Using the Graphical Desktop 2.2. Using the Desktop Other icons on the desktop can be shortcuts to files, folders, and application launchers. To open a folder or launch an application, double-click on its icon. Figure 2-5. The Graphical Desktop 2.2.1.
Page 34
Chapter 2. Using the Graphical Desktop To manually create an application launcher: 1. First, you must know the name of the application for which you are creating a launcher. For the purpose of this example, assume the application is gedit. 2.
Chapter 2. Using the Graphical Desktop Figure 2-7. Example of a link to a file 2.3. Using the Panel The long gray bars across the top and bottom of the screen are the Panels. The top Panel contains both the Applications and Actions menus. It also contains application launch- ers, the notification area, and the time and date.
Page 36
Chapter 2. Using the Graphical Desktop 2.3.1. Standard Applets There are a few applets that run on the panels by default. These important applets are covered in the following sections. 2.3.1.1. Workspace Switcher Figure 2-10. The Workspace Switcher The graphical desktop allows for the use of multiple workspaces. Workspaces are virtual desktops —...
Page 37
Chapter 2. Using the Graphical Desktop Red Hat Network Alert Notification Tool Part of the Notification Area, the Red Hat Network Alert Notification Tool provides you with an easy way to make sure your system is up-to-date with current errata and security updates from Red Hat Network.
Page 38
Chapter 2. Using the Graphical Desktop Figure 2-13. The Weather Report Applet on the Panel Individual applets may also be configured. By right-clicking on any applet icon on the Panel, you are given a short menu that includes Preferences. These preferences are different for each applet. 2.3.3.
Chapter 2. Using the Graphical Desktop 2.3.4. Adding Additional Panels Figure 2-15. The Desktop with two additional Panels It may at times be convenient to have additional Panels. It is easy to add as many panels to your desktop as fits on the screen. Right-click on an unused area of the existing panel and choose New Panel.
Chapter 2. Using the Graphical Desktop Printing: The Printer Configuration Tool allows you to add a new printer to your system, • whether it is connected to your computer or is available on a network. Soundcard Detection: The Sound Card Configuration Tool tool probes your system for •...
Page 41
Chapter 2. Using the Graphical Desktop 2.5.1. Configuring your Background Figure 2-16. The Desktop Background Preferences tool One way to dramatically alter the appearance of your graphical desktop is to change the background using the Desktop Background Preferences tool. You can choose from several background images included with Red Hat Enterprise Linux in the directory, or you can /usr/share/backgrounds/...
Page 42
Chapter 2. Using the Graphical Desktop Figure 2-17. The Desktop with a new background 2.5.2. Keyboard Shortcuts Figure 2-18. The Keyboard Shortcuts application You can create keyboard shortcuts — pressing a combination of keys on the keyboard — to perform actions within an application or on your desktop.
Page 43
Chapter 2. Using the Graphical Desktop 6. Pressing [Ctrl]-[Alt]-[2] at any time takes you to Workspace 2. Likewise, pressing [Ctrl]-[Alt]- [3] takes you to workspace 3, [Ctrl]-[Alt]-[4] takes you to workspace 4, and [Ctrl]-[Alt]-[1] takes you back to workspace 1. 2.5.3.
Page 44
Chapter 2. Using the Graphical Desktop Figure 2-20. Selecting sounds to accompany events 2.5.4. Screensaver Figure 2-21. The screensaver tool Double-click the Screensaver icon to launch the Screensaver Preferences tool. The list on the left displays the available screensavers. Nearly all screensavers can be customized by clicking on the Set- tings...
Chapter 2. Using the Graphical Desktop 2.5.5. Removable Storage Figure 2-22. Options for usage of removable storage Launch the Removable Storage tool from the Applications => Preferences sub-menu. The application opens a list of options for the way your system handles removable storage media such as floppy diskettes and CD-ROMs.
Page 46
Chapter 2. Using the Graphical Desktop 1. Select Session from the menu at the bottom left of the login screen. A window appears with a list of several different desktop environments. 2. Choose one, and select OK. 3. Enter your login and password as usual. A dialog box appears, warning you that this change is for the current session only.
Chapter 3. Managing Files and Directories This chapter explores the general format of your Red Hat Enterprise Linux file system. It bridges the differences between using Nautilus to manage the files on your system and using a shell prompt to manage them.
Page 48
Chapter 3. Managing Files and Directories You might think of the file system as a tree and directories as branches. There would be no tree without a root, and the same is true for the Red Hat Enterprise Linux file system. No matter how far away the directories branch, everything is connected to the root directory, which is represented as a singe forward slash (/).
Chapter 3. Managing Files and Directories . The relative path is: ../birthday/. The absolute path is: /var/www/html/pics/birthday/ /var/www/html/pics/birthday/. Clearly, the relative path is shorter in this case. There is no right or wrong choice: both relative and absolute paths point to the same branch of the tree.
Page 50
Chapter 3. Managing Files and Directories 3.3.1.3. System Files — a configuration file; configuration files sometimes use the extension, as well • .conf .cfg — a lock file; determines whether a program or device is in use • .lock — a Red Hat Package Manager file used to install software •...
Chapter 3. Managing Files and Directories There are a few special characters you cannot use in file names. You cannot use a "/" — this indicates a directory. You cannot name a file "." or "..", for reasons discussed in Section 3.2.1 Paths. 3.3.2.4.
Page 52
Chapter 3. Managing Files and Directories If you are using a file manager (such as Nautilus), you can double-click the file you wish to unar- chive or decompress to start File Roller. The File Roller browser window appears with the decom- pressed/unarchived file in a folder for you to extract or browse.
Page 53
Chapter 3. Managing Files and Directories 3.4.1.2. Creating Archives with File Roller Figure 3-3. Creating an Archive with File Roller File Roller allows you to create archives of your files and directories. To create a new archive, click New on the toolbar. A file browser pops up, allowing you to specify an archive name and the com- pression technique.
Page 54
Chapter 3. Managing Files and Directories Table 3-1. Compression Tools By convention, files compressed with are given the extension , files compressed with bzip2 .bz2 are given the extension , and files compressed with are given the extension gzip .zip Files compressed with are uncompressed with , files compressed with...
Page 55
Chapter 3. Managing Files and Directories The above command compresses , and the contents of the file1 file2 file3 directory (assuming this directory exists) and places them in a file named /usr/work/school/ filename.gz For more information, enter at a shell prompt to read the man pages for man gzip man gunzip gzip...
Page 56
Chapter 3. Managing Files and Directories — show the progress of the files being archived • — extract files from an archive • — compress the file with • gzip — compress the file with • bzip2 To create a tar file, enter: tar -cvf filename.tar directory/file In this example, represents the file you are creating and...
Chapter 3. Managing Files and Directories files compressed with are conventionally given the extension gzip .tgz This command creates the archive file and compresses it as the file filename.tar filename.tgz (The file is not saved.) If you uncompress the file with the filename.tar filename.tgz gunzip...
Page 58
Chapter 3. Managing Files and Directories...
Chapter 4. Shell Prompt Basics 4.1. Why Use a Shell Prompt Graphical environments for Linux have come a long way in the past few years. You can be perfectly productive in the X Window System and only have to open a shell prompt to complete a few tasks. However, many Red Hat Enterprise Linux functions can be completed faster from the shell prompt than from a graphical user interface (GUI).
Chapter 4. Shell Prompt Basics When the Free Software Foundation sought a royalty-free shell, developers began to work on the language behind the Bourne shell as well as some of the popular features from other shells available at the time. The result was the Bourne Again Shell, or .
Page 61
Chapter 4. Shell Prompt Basics than any others, "$" and "#". The first symbol, "$", is the last character in the prompt when you are logged in as a normal user. The shell prompt for a normal user looks something like this: [username@localhost.localdomain username]$ The second symbol, "#", is the last character in the prompt when you are logged in as root.
Page 62
Chapter 4. Shell Prompt Basics 4.3.4.1. Tab Completion Tab completion is one of the most useful shortcuts available at the command line. Red Hat Enterprise Linux has the ability to "guess" what command, directory, or filename you are entering at the shell prompt.
Page 63
Chapter 4. Shell Prompt Basics Commands that you only typed partially and did not follow with [Enter] are not saved into your command history file. To clear your command history, type history -c. By default, Red Hat Enterprise Linux stores 1000 commands. Each terminal window or shell prompt stores a separate set of commands.
Page 64
Chapter 4. Shell Prompt Basics Using the backslash ( ), you can specify that you do not want to search out everything by using the asterisk, but you are instead looking for a file with an asterisk in the name. If the file is called , type: sneak*.txt...
Chapter 4. Shell Prompt Basics Sometimes, you may accidentally open a program file or some other non-text file in a terminal window. When you close the file, you could find that the text you are typing does not match the output on the monitor.
Page 66
Chapter 4. Shell Prompt Basics Action Command Format Details Move a file To move a file from one mv which_file directory to another, use destination Rename a file The use of the command mv oldname newname changes the name of the file from oldname newname...
Page 67
Chapter 4. Shell Prompt Basics Figure 4-3. Sample Output for the Directory /etc The following is a brief list of options commonly used with . Remember, you can view the full list by reading the man page ( man ls (all) —...
Page 68
Chapter 4. Shell Prompt Basics To copy a file to a different direcoty, specify a path as the third word on the command line: cp original_file /dir1/dir2/ This command creates a copy of . If the last part of the path is a filename original_file dir2/ instead of a directory, the copy has that new name.
Page 69
Chapter 4. Shell Prompt Basics Note You can only move files to a directory that already exists: Linux will not create a new directory with command. 4.5.4. Renaming files with mv To rename a file or directory, use the command. To rename a file with , the third word on the command line must end in the new filename.
Chapter 4. Shell Prompt Basics The interactive, or -i, option for rm causes it to ask if you are sure before permanently deleting a file or directory. You can make this the default behavior for rm by editing the file. This file is .bashrc located in your home directory.
Chapter 4. Shell Prompt Basics cd ~ — Also returns you to your login directory • cd / — Takes you to the entire system’s root directory. • cd /root — Takes you to the home directory of the root user. You must be the root user to access •...
Page 72
Chapter 4. Shell Prompt Basics With , you can see every file or directory whose name contains the search criterion. For ex- locate ample, to search for all files with the word in the name, type: finger locate finger command uses a database to locate files and directories that have the word locate finger the file or directory name.
Chapter 4. Shell Prompt Basics Checking the usage of a command using whatis before reading the man page can save you some time. 4.8. Viewing text files from the shell prompt Red Hat Enterprise Linux has several applications that allow you to view and manipulate text files at the shell prompt.
Chapter 4. Shell Prompt Basics The main difference between is that allows backward and single-line movement more less less using the same navigation as man pages: press the [Space] bar to go down one page, the [B] to go back one page, the directional (or "arrow") keys to move one line at a time, and [Q] to quit. To search the output of a text file using , press [/] and enter the keyword to search for within the less...
Page 75
Chapter 4. Shell Prompt Basics Using , the pipe (|), and together displays the file one page at a time. You can then use the less up and down arrow keys to move backward and forward through the pages. filename | less <...
Page 76
Chapter 4. Shell Prompt Basics The following screen is another example, redirecting three more lines of text to create the file bar.txt Figure 4-5. Redirecting Output to a Second File The following screen demonstrates ’s concatenate function, adding the contents of bar.txt the end of .
Page 77
Chapter 4. Shell Prompt Basics Figure 4-7. Contents of example1.txt Caution Be careful when you redirect the output to a file, because you can easily overwrite an existing file! Make sure the name of the file you are creating does not match the name of a pre-existing file, unless you want to replace it.
Chapter 4. Shell Prompt Basics Figure 4-9. diff Comparison of example1.txt and foo.txt 4.9.4. Redirecting Standard Input You can also perform the same type of redirection with standard input. When you use the redirect standard input symbol <, you are telling the shell that you want a file to be read as input for a command.
Chapter 4. Shell Prompt Basics 4.11. Ownership and Permissions As a regular user, try to enter root’s home directory by entering the command . Note the cd /root/ error message: -bash: cd: /root/: Permission denied That was one demonstration of Linux’s security features. Linux, like UNIX, is a multi-user system and file permissions are one way the system protects against malicious tampering.
Page 80
Chapter 4. Shell Prompt Basics — a directory • (dash) — a regular file (rather than directory or link) • — a symbolic link to another program or file elsewhere on the system • Others are possible, but are beyond the scope of this manual. Refer to the Red Hat Enterprise Linux System Administration Guide for more information.
Page 81
Chapter 4. Shell Prompt Basics Now, type the following: chmod o+w foo.txt command tells the system you want to give others write permission to the file . To foo.txt check the results, list the file’s details again. Now, the file looks like this: -rw-rw-rw- 1 user user 150 Mar 19 08:08 foo.txt...
Page 82
Chapter 4. Shell Prompt Basics chmod u+rw foo.txt Use the command to verify that you, the file owner, can read the file again. cat foo.txt Here are some common examples of settings that can be used with chmod — adds write access for the group •...
Page 83
Chapter 4. Shell Prompt Basics Each permission setting can be represented by a numerical value: r = 4 • w = 2 • x = 1 • - = 0 • When these values are added together, the total is used to set specific permissions. For example, if you want read and write permissions, you would have a value of 6;...
Page 84
Chapter 4. Shell Prompt Basics Setting Numerical Meaning (700) Only the owner has read, write, and execute permissions. -rwx------ (755) The owner has read, write, and execute permissions; the -rwxr-xr-x group and others have only read and execute. (711) The owner has read, write, and execute permissions; the -rwx--x--x group and others have only execute.
II. Using Your System Now that you have begun exploring your Red Hat Enterprise Linux system, you can start using some of the many applications that are included with it. From Internet surfing and personal productivity, to games and beyond, this part details some popular software programs that help you become more pro- ductive with your computer, and tap the power of the Internet for your research and communications.
Chapter 5. Connecting to the Internet Perhaps the most important change in communication since the telephone, the Internet is a large part of our world today. Red Hat Enterprise Linux has the tools necessary to allow you to connect to that world.
Chapter 5. Connecting to the Internet 5.1. The Internet Configuration Wizard Figure 5-1. Internet Configuration Wizard Red Hat Enterprise Linux includes the Internet Configuration Wizard. The Internet Configuration Wizard is available from the Applications (the main menu on the panel) => System Tools sub-menu, or from a shell prompt via the command .
Chapter 5. Connecting to the Internet 4. The left pane lists each of the possible connections. Choose Modem connection and click the Forward button. 5. Red Hat Enterprise Linux probes for a working modem installed on your computer. If it does not find one, make sure that you have a hardware modem, and that it is installed correctly.
Chapter 5. Connecting to the Internet DHCP You may be required to configure your sytem to obtain an IP address through DHCP. To configure this type of connection, start the Internet Configuration Wizard, select Ethernet Connection, and select DHCP from the Configure Network Settings screen. Some DSL providers and most cable modem providers use this configuration.
Chapter 6. Web Browsing Once you have configured your Internet connection (refer to Chapter 5 Connecting to the Internet), you are ready to browse the Internet. Red Hat Enterprise Linux comes with several Web browsers, graphical applications that use your Internet connection to access the World Wide Web: news, research, shopping, banking, and more.
Page 92
Chapter 6. Web Browsing Figure 6-2. Navigation Toolbar Enter a Uniform Resource Locator (URL) — the name or address of a web site — into the address field. Firefox moves immediately to the web site. The Search field uses the most popular search engines to look for sites related to the keywords you enter.
Page 93
Chapter 6. Web Browsing Figure 6-5. Open Tabs 6.1.3. Plug-ins Plug-ins, applications that expand the abilities of Firefox, are available for download. A full list of plugins can be found at : http://channels.netscape.com/ns/browsers/plugins.jsp. 6.1.4. Extensions and Themes There are many extensions and themes available for Firefox. Extensions are small applets (smaller than plug-ins) that provide additional functionality to Firefox.
Chapter 7. Email Applications Email is a very popular way of communicating with others over the Internet. An application that allows users to send, receive, and read email is called an email client. Red Hat Enterprise Linux includes several email applications, including graphical email clients like Evolution and Thunderbird, and text-based clients like mutt.
Chapter 7. Email Applications If you have any questions regarding what information you need, contact your ISP or network admin- istrator. Unless properly configured, you cannot make full use of the email clients discussed in this chapter. 7.1. Evolution Evolution is more than just an email client. It provides all of the standard email client features, including powerful mailbox management, user-defined filters, and quick searches.
Page 97
Chapter 7. Email Applications Figure 7-2. Evolution Main Screen To view what is in your inbox or to send an email, click on the Mail button in the left toolbar, then select the Inbox icon from the list of folders. Figure 7-3.
Chapter 7. Email Applications Figure 7-4. Evolution New Email Message Screen While Evolution does much more than read and send email, this chapter focuses exclusively on its email capabilities. To learn more about Evolution’s other features, refer to the Help text. 7.2.
Page 99
Chapter 7. Email Applications Figure 7-5. Account Setup Figure 7-6. Thunderbird Mail To create a new email message, click the Write button. A blank message will open in a new window. Enter the address(es) of the recipient(s) of your email in the To field(s). Enter the subject of your email in the Subject field.
Chapter 7. Email Applications Figure 7-7. Thunderbird Mail New Email Message Screen To read email, click on the Get Mail icon to check for new mail. Click on the folders in the left sidebar to open them. If there are any messsages in that folder, they appear as a list in the top-right pane of the window.
Page 101
Chapter 7. Email Applications 7.3. Plain Text Email Clients Most modern email clients allow the user to select whether they want to send their emails in plain text or in HTML. HTML formatted email can contain formated text, graphics, and interactive links to Web sites.
Page 102
Chapter 7. Email Applications These messages are in a default mail folder, called the inbox or mailspool. Use the [K] and [J] keys on your keyboard to move the highlighted cursor up and down the list of messages. In the index or pager views, use the [R] key to reply to a message or the [M] key to create a new one. Mutt prompts for the To: address and the Subject: line.
Chapter 8. Working with OpenOffice.org 8.1. Feature overview of OpenOffice.org OpenOffice.org is a powerful office suite that includes word processing, spreadsheets, and slides. It has all of the functionality of the best-known office suites, and uses some powerful additional tools to help you easily create professional-looking documents.
Page 104
Chapter 8. Working with OpenOffice.org Use the Stylist to apply styles to text. It can be reached by clicking on the yellow diamond icon on your toolbar, by going to Format => Styles, or by pressing [F11]. To apply a style, highlight a block of text, then double-click on the appropriate style in the Stylist, such as Heading1 or Text body.
Chapter 8. Working with OpenOffice.org => Spellcheck => AutoSpellcheck and remove the checkmark there by clicking on it once. To turn it back on, click on it again. Thesaurus OpenOffice.org also includes a thesaurus. Click on the word to replace or double-click it to highlight the word.
Page 106
Chapter 8. Working with OpenOffice.org When OpenOffice.org Writer opens, you are presented with a blank document. The margins of the document are represented by the gray box drawn on the main screen. You can start entering text immediately. You may notice as you type that OpenOffice.org Writer fills in the rest of a word you are typing. OpenOffice.org Writer guesses the word you are typing based on longer words used earlier in the document.
Page 107
Chapter 8. Working with OpenOffice.org To save your document as a .pdf file, go to File => Export as pdf. While OpenOffice.org Writer can save as a .pdf, it cannot read or edit them. To view a .pdf file, see FIXME. To print a document: 1.
Chapter 8. Working with OpenOffice.org 8.3. OpenOffice.org Calc 8.3.1. Overview of OpenOffice.org Calc OpenOffice.org Calc functions similarly to other spreadsheet applications. It is useful for creating forms as well as calculations. To create a new spreadsheet: 1. Start OpenOffice.org Calc from the Applications menu bu going to Application => Office => OpenOffice.org Calc or enter oocalc at a shell prompt.
Chapter 8. Working with OpenOffice.org 3. The AutoPilot window opens. 4. Select the function you would like to use from the pane on the left. You select by double-clicking on the name of the function. 5. In the right pane, information about the selected function is displayed. Fields for the data are just below the function information.
Chapter 8. Working with OpenOffice.org To start Impress, go to Applications => Office => OpenOffice.org Impress. When the application first starts, the AutoPilot guides you through the initial set up of your slide show. Make your selections and click Create. A blank slide opens and you can edit your presentation. 1.
Page 111
Chapter 8. Working with OpenOffice.org 3. Select a variant of the tool from the list by clicking on it once. 4. Move your mouse pointer to the blank page and use the drawing tool. 8.5.2. OpenOffice.org Math OpenOffice.org Math is a useful tool for creating properly formatted functions to import for display in any of the OpenOffice.org applications.
Chapter 9. Working with Other Text Applications Text editors fall somewhere between word processors like OpenOffice.org Writer and pager appli- cations like less. These programs are useful for tasks like writing HTML, C, or SGML; they are best suited for any task that is text-oriented, and is not necessarily intended for print. Programs that allow you to view PDF and PS files are referred to as text viewers.
Chapter 9. Working with Other Text Applications commands are available via either method. Emacs can be customized extensively. Programs that customize syntax highlighting or add other functionality can be written and installed. Emacs even contains several games available from the Tools =>...
Chapter 10. Audio, Video, and Games This chapter presents you with the lighter side of Red Hat Enterprise Linux. From games and toys to multimedia applications, Red Hat Enterprise Linux provides many packages to assist you in having some fun with your computer. 10.1.
Chapter 10. Audio, Video, and Games 10.2. Playing Digital Audio Files Digital audio has become very popular in recent years. Users enjoy the technology because the sound quality is excellent compared to analog tape or records, and the files are compact (audio files can easily be transferred across the Internet).
Most sound cards are supported by Red Hat Enterprise Linux, but there are some sound cards that are not completely compatible or may not work at all. If you are having trouble configuring your sound card, check the Hardware Compatibility List at http://hardware.redhat.com/hcl/ to see if your card is supported.
Chapter 10. Audio, Video, and Games Figure 10-5. Sound Card Configuration Tool 10.3.1. If Sound Card Configuration Tool Does Not Work If the Sound Card Configuration Tool does not work (if the sample does not play and you still do not have audio sounds), there are alternatives, although they are not quite as simple as running the Sound Card Configuration Tool.
Chapter 10. Audio, Video, and Games To run the X Configuration Tool, click Applications => System Settings => Display. A pop-up window prompts you for your root password. You can also start from a shell prompt by typing the command , which then prompts you to enter your root password.
Chapter 10. Audio, Video, and Games To start a game, click Applications => Games and select the game of your choice. Figure 10-7 shows a fun game for kids of all ages called Same GNOME. In this game you point your mouse at matching marbles until they start to spin;...
Chapter 11. Working with Digital Cameras Digital cameras have recently grown in popularity because of their increasing image quality and easy interaction with desktop PCs. Digital cameras create high-quality images that you can to others over the Internet or print on a color printer. Red Hat Enterprise Linux supports several brands of digital cameras and has applications that help you access, view, and modify your digital photographs.
Page 122
Chapter 11. Working with Digital Cameras click the OK button. At the Import Photos screen, select the destination of your photos and click the Import button. FIXME - Image of Import Screen FIXME - Image of Camera Model Screen Figure 11-1. Adding a Camera in gThumb Imported photos are listed in the right pane of the main screen.
Chapter 12. Working with Images Digital images are ubiquitous — they are available on the Internet, through email, and even on CD from film developers. These images are files, and can be manipulated with software available on your Red Hat Enterprise Linux system. Red Hat Enterprise Linux allows you to save, view, edit, and create image files.
Chapter 12. Working with Images Figure 12-1. gThumb Displaying a Folder of Images The gThumb interface has a text field for you to enter a particular path to your image directories. Right-clicking on an image in the display area opens a pop-up menu of file management options such as renaming, moving, copying, and converting an image from one file format to another.
Page 125
Chapter 12. Working with Images Depending on the file type you selected, another window with options may open. Ingeneral, it is a good idea to accept the settings that the GIMP suggests. Click the OK button again to complete the save process.
Page 126
Chapter 12. Working with Images 5. Save your file. While this chapter covers image applications briefly, there is much more detailed information avail- able. Refer to the following resources if you are interested in learning more about the applications in this chapter.
Chapter 13. Diskettes and CD-ROMs Using removable media with Red Hat Enterprise Linux requires some explanation. This chapter dis- cusses how to read and write files to and from diskettes, CD-ROMs, and USB Flash Drives. 13.1. Using Diskettes Diskettes are one of the oldest removable media solutions available for the personal computer (PC). Diskettes are ideal as a portable storage solution for small files that need to be physically moved around.
Page 128
Chapter 13. Diskettes and CD-ROMs 2. Select Unmount Volume from the menu. Once the diskette has been unmounted, you can safely eject it from the drive. Note If you do not unmount a diskette before ejecting it, the files you meant to transfer to it will not actually be written on the diskette.
Chapter 13. Diskettes and CD-ROMs Figure 13-1. gfloppy Change the settings in gfloppy to suit your needs; then click Format. A status box appears on top of the main window, showing you the status of formatting and verification. Once complete, close gfloppy and either eject or mount and use the diskette.
Page 130
Chapter 13. Diskettes and CD-ROMs CDs, Nautilus starts CD Player; for data CDs and DVDs, Nautilus opens a file browser window that displays the contents of the disk. Figure 13-2. Contents of a CD-ROM in Nautilus When Nautilus auto-mounts a CD or DVD, it places an icon on the desktop that matches the type of media inserted.
Chapter 13. Diskettes and CD-ROMs 13.3. CD/DVD-Rs and CD/DVD-RWs CD-writable (CD-R) media are an inexpensive way to back up as much as 760MB of data, includ- ing applications, personal files, and multimedia files. CD-rewritable (CD-RW) media are also very common, and allow the user to write files to the media multiple times. Recently, the DVD equivalents of these media have become more common and more affordable.
Page 132
Chapter 13. Diskettes and CD-ROMs Figure 13-4. The CD/DVD Creator Write Dialog Box By default, the CD or DVD should automatically eject from your drive when it is finished. Since it is generally recommended to periodically backup personal files, CD/DVD Creator can help you do so quickly.
Page 133
Chapter 13. Diskettes and CD-ROMs Option Function Sets an Application ID — a text string that will be written into the volume header of the image which can be useful to determine what applications are on the CD. Sets a Volume ID — a name that is assigned to it if the image is burned, and the disc is mounted in Solaris and Windows environments.
Chapter 13. Diskettes and CD-ROMs 13.4. Additional Resources This section briefly covers several applications. Refer to the following resources for more information about the applications in this chapter. 13.4.1. Installed Documentation man page — Discusses how to burn data, audio and mixed-mode CDs and DVDs. Offers •...
Page 135
Chapter 13. Diskettes and CD-ROMs To mount your USB drive manually: 1. Open a terminal window. 2. Enter the command mount /media/ < manufacturer > / To mount your USB drive with Nautilus 1. Open the Computer window from the desktop. 2.
III. Troubleshooting Your System If you ever run into problems using your Red Hat Enterprise Linux system, there are steps you can take and tools you can use to recover from issues that get you back to using your system normally. From booting into rescue mode to changing a forgotten password, this part can show you how to troubleshoot several common issues that you may run into in the course of using Red Hat Enterprise Linux.
Chapter 14. Frequently Asked Questions This chapter answers some of the most common questions about using Red Hat Enterprise Linux that you may ask as you become more familiar with it. From recovering forgotten passwords to trou- bleshooting package installation problems, this chapter guides you step-by-step through some com- mon tasks to get you on your way.
Chapter 14. Frequently Asked Questions 14.3. Forgotten user Password I’ve forgotten my user password. How do I get a new one? Passwords are stored in encrypted files on your Red Hat Enterprise Linux system: users cannot read a file and see their own or other passwords. If you forget your user password, you must create a new one.
Page 141
Chapter 14. Frequently Asked Questions The reason you may need to type the full pathnames in order to start an application is because the executable was not placed in a directory where your user shell environment knew it could be found (such as /usr/local/bin You can customize your settings so that you are not required to use the type the full path to the...
Chapter 14. Frequently Asked Questions 14.7. Finding Commands Quickly I was looking at a man page yesterday, but I cannot remember the name of the command I was reading about, and I did not write it down. How do I get the man page back? The command you used is stored in a file called .
Chapter 14. Frequently Asked Questions 14.9. Keep Output from Scrolling Whenever I type I can barely see the output of the directory because it scrolls by too quickly. How can I actually read the output? To prevent the output of from scrolling by too quickly, pipe the output to a utility such as less .
Page 144
Chapter 14. Frequently Asked Questions Figure 14-1. Hardware Browser hard disk device listing Select Hard Drives from the panel and find your Windows partition from the Disk Information displayed. Windows partitions normally use the FAT or FAT32 file system type. This file system type can be mounted and read within Linux;...
For more information about using RPM and Package Management Tool, refer to the Red Hat Enterprise Linux System Administration Guide on the Red Hat Enterprise Linux Documentation CD or online at http://www.redhat.com/docs/. 14.12. Changing Login from Console to X at Startup...
Page 146
Chapter 14. Frequently Asked Questions id:3:initdefault: To change from a console to a graphical login, you should change the number in the line from a to a id:3:initdefault: Warning Change only the number of the default runlevel from Your changed line should look like the following: id:5:initdefault: When you are satisfied with your change, save and exit the file using the [Ctrl]-[x] keys.
IV. Appendix This part contains supplemental information and instruction that you may find useful during the course of your Red Hat Enterprise Linux usage. Perhaps you want to use the KDE graphical desktop envi- ronment, or learn more about configuring your system to send and receive encrypted email. This section shows you time-saving keyboard shortcuts, discusses the Red Hat Enterprise Linux directory structure, and more.
Appendix A. KDE: The K Desktop Environment The K Desktop Environment (KDE) is a graphical desktop, similar in function to the GNOME desktop explored in the main text of the manual. It uses many of the same freatures as GNOME, including icons, windows, menus, and a panel.
Appendix A. KDE: The K Desktop Environment and window border appearance. You can also customize mouse and keyboard events which makes working with the desktop as efficient for your needs as possible. Regional & Accessibility This section allows you to set country and language options to your particular locale. For users with sight or hearing impairments, you can also configure accessibility features such as audible and visual cues and keyboard/mouse customization.
Page 151
Appendix A. KDE: The K Desktop Environment A.2.3. Removable Media KDE works with removable media, including diskettes, CD-, and DVD-ROMs. A.2.3.1. Diskettes Recall that diskettes must be mounted before use and unmounted after use to be sure that your files are not damaged.
Appendix A. KDE: The K Desktop Environment Figure A-2. The Konqueror Configuration Window The configuration window opens. in the left pane is a list of icons representing the types of cus- tomizatins you can make. Clicking on each icon in turn displays customization options. For example, the Appearance icon allows you to select the font face and size of your Konqueror windows.
Page 153
Appendix A. KDE: The K Desktop Environment Figure A-3. The Konqueror File Manager You can navigate through the file system by clicking on folders within the main window pane or through the hierarchical file system viewer on the navigation panel as shown in Figure A-3. Files and folders in the main window frame can be moved or copied to another folder or sent to the trash.
Appendix A. KDE: The K Desktop Environment Figure A-4. Working with the Navigation Panel The navigation panel lets you access your Web bookmarks, browsing history, network resources, file system, and has a built-in media player for playing multimedia files without opening a separate application.
Appendix A. KDE: The K Desktop Environment Figure A-5. Desktop Background Configuration Two of the options you can set are the number and names of your desktops. Figure A-6. Virtual Desktop Configuration Click on the Multiple Desktops icon. Select the number of desktops available to you, then enter names for the desktops in the text fields.
Page 156
Appendix A. KDE: The K Desktop Environment Figure A-7. The Panel Applets are small applications that run on the panel. There are several types of applets: some perform functions such as system monitoring, time and date display, and others launch applications. Some applets run on the panel by default.
Page 157
Appendix A. KDE: The K Desktop Environment A.5.3. The Main Menu is the central point for using KDE. Clicking on the Main Menu icon on the The Main Menu panel displays a large master menu from which you can perform tasks such as launch applications, find files, and configure your desktop.
Figure A-11. Welcome to Konqueror To begin your Web session, enter a URL in the Location field. For example, enter http://www.redhat.com/ into the field. If your internet connection is working properly, Konqueror displays a web page similar to the one pictured in Figure A-11.
Appendix A. KDE: The K Desktop Environment Figure A-12. The Konqueror Handbook A.7. Using Konqueror to View Images You can also use the Konqueror file manager to view images. Using Konqueror as an image browser works similarly to Nautilus. Konqueror automatically generates thumbnail preview icons within the file browser window.
Appendix A. KDE: The K Desktop Environment Figure A-14. Image viewing configuration on the Konqueror Toolbar You can also open the image with more advanced image viewers, such as the GIMP. Right-click on the image, choose Open With... and select the GIMP. You can also select Other..., which opens a pop-up menu that lists all available applications.
Page 161
Appendix A. KDE: The K Desktop Environment tion, refer to the KMail user manual (Help => KMail Handbook) or visit KMail’s homepage at http://kmail.kde.org. Figure A-16. KMail Main Screen Once you have configured the email settings, begin sending and receiving email by clicking on the Get Mail icon in the upper left of the screen.
Appendix A. KDE: The K Desktop Environment Once you have composed a message and entered an email address to send the email to, click Send in the toolbar: A.9. Logging Out of KDE There are two ways to log out of your KDE session. From the Main Menu, select Logout User, where User is your account username.
Page 163
Appendix A. KDE: The K Desktop Environment You can access the HelpCenter from the Main Menu by selecting Help. To access HelpCenter from the desktop, right-click on the desktop and select the Help => K Desktop Handbook. The opening screen of the HelpCenter browser appears like Figure A-19. From this main page, you can view help documentation on topics such as using and configuring the desktop, working with the many applications included with KDE, and working with the Konquerer file manager.
Page 164
Appendix A. KDE: The K Desktop Environment...
Appendix B. Getting Started with Gnu Privacy Guard Have you ever wondered if your email can be read during its transmission from you to other people, or from other people to you? Unfortunately, complete strangers could conceivably intercept or even tamper with your email.
Appendix B. Getting Started with Gnu Privacy Guard mv ~/.gnupg/options ~/.gnupg/gpg.conf If you are upgrading from a version prior to 1.0.7, you can create signature caches in your keyring to decrease the keyring access time. To perform this operation, execute the following command once: gpg --rebuild-keydb-caches B.2.
Appendix B. Getting Started with Gnu Privacy Guard B.3. Generating a Keypair To begin using GnuPG, you must first generate a new keypair: a public key and a private key. To generate a keypair, at a shell prompt, type the following command: gpg --gen-key Since you work with your user account most frequently, you should perform this action while logged in to your user account (not as root).
Appendix B. Getting Started with Gnu Privacy Guard Once you enter and verify your passphrase, your keys are generated, and a message similar to the following is displayed: We need to generate a lot of random bytes. It is a good idea to perform some other action (type on the keyboard, move the mouse, utilize the disks) during the prime generation;...
Appendix B. Getting Started with Gnu Privacy Guard output to a file in your login directory. That way, you can keep the certificate for use later, or move it to a diskette and store it someplace safe. The output looks similar to the following: Your Name you@example.com 1024D/823D25A9 2000-04-26...
Page 170
Appendix B. Getting Started with Gnu Privacy Guard iLyPH1QAoI33Ft/0HBqLtqdtP4vWYQRbibjW =BMEc -----END PGP PUBLIC KEY BLOCK----- B.5.1. Exporting to a Keyserver If you are only writing to a few correspondents, you can export your public key and send it to them personally.
Appendix B. Getting Started with Gnu Privacy Guard Figure B-1. Copying Your Public Key Note that if you are submitting your key to another Web-based keyserver, the above transaction is essentially the same. That is all you need to do. Regardless of whether you use the shell prompt or the Web, you see a message that your key was successfully submitted —...
Appendix B. Getting Started with Gnu Privacy Guard The output looks similar to the following: gpg: key F78FFE84: public key imported gpg: Total number processed: 1 gpg: imported: 1 To check that the process was successful, use the command; you should see your gpg --list-keys newly imported key listed on your keyring.
Page 173
Appendix B. Getting Started with Gnu Privacy Guard B.8.3. Related Books The Official PGP User’s Guide by Philip R. Zimmerman; MIT Press • PGP: Pretty Good Privacy by Simson Garfinkel; O’Reilly & Associates, Inc. • E-Mail Security: How to Keep Your Electronic Messages Private by Bruce Schneier; John Wiley & •...
Page 174
Appendix B. Getting Started with Gnu Privacy Guard...
Appendix C. Applications The following table is a quick reference guide to the applications available on your Red Hat Enterprise Linux system. While these are the recommended applications, many other commands and applicatons are available. Category Application Location Audio Playback XMMS Applications (the main menu on the panel) =>...
Page 176
Appendix C. Applications Category Application Location Kolourpaint Applications (the main menu on the panel) => Graphics => Kolourpaint Image Viewers Nautilus Applications (the main menu on the panel) => File Browser KView Applications (the main menu on the panel) => Graphics =>...
Page 177
Appendix C. Applications Category Application Location Konquerer, Applications (the main menu on the panel) => links Internet => Konqueror or enter the command at a shell prompt. links OpenOffice.org Applications (the main menu on the panel) => Word Processors Writer Office =>...
Appendix D. A Comparison of Common DOS and Linux Commands Many Linux commands typed at a shell prompt are similar to the commands you would type in DOS. In fact, some commands are identical. This appendix provides common commands used at the DOS prompt in Windows and their coun- terparts in Linux.
Page 180
Appendix D. A Comparison of Common DOS and Linux Commands Command’s MS-DOS Linux Basic Linux Example Purpose Displays your chdir location in the file system Changes directories cd /directory/directory with a specified pathname pathname path (absolute path) Changes directories cd.. cd ..
Appendix E. System Directories This is a list of the primary Red Hat Enterprise Linux system directories. Each directory is described briefly. For additional directory information, refer to the Red Hat Enterprise Linux System Adminis- tration Guide and the Red Hat Enterprise Linux Reference Guide. —...
Appendix F. Keyboard Shortcuts Here are a few keyboard shortcuts you can use to perform common tasks quickly. Many more are available in addition to what is listed here. For more command line and keyboard shortcuts, visit: http://linux-newbie.sunsite.dk/html/lnag.html [Ctrl] + [Alt] + [Backspace] = kills your current X session. Kills your graphical desktop session •...
Colophon The manuals are written in DocBook SGML v4.1 format. The HTML and PDF formats are produced using custom DSSSL stylesheets and custom jade wrapper scripts. The DocBook SGML files are written in Emacs with the help of PSGML mode. Garrett LeSage created the admonition graphics (note, tip, important, caution, and warning).
Page 190
Nadine Richter — German translations Audrey Simons — French translations Francesco Valente — Italian translations Sarah Wang — Simplified Chinese translations Ben Hung-Pin Wu — Traditional Chinese translations...
Need help?
Do you have a question about the ENTERPRISE LINUX 4 - STEP BY STEP GUIDE and is the answer not in the manual?
Questions and answers