Table of Contents

Advertisement

Quick Links

Red Hat Enterprise Linux 4
Red Hat Enterprise Linux Step
By Step Guide

Advertisement

Table of Contents
loading

Summary of Contents for Red Hat ENTERPRISE LINUX 4 - STEP BY STEP GUIDE

  • Page 1 Red Hat Enterprise Linux 4 Red Hat Enterprise Linux Step By Step Guide...
  • Page 2 All other trademarks referenced herein are the property of their respective owners. The GPG fingerprint of the security@redhat.com key is: CA 20 86 86 2B D6 9D FC 65 F6 EC C4 21 91 80 CD DB 42 A6 0E...
  • Page 3: Table Of Contents

    Table of Contents Introduction............................i 1. Architecture-specific Information ..................i 2. Changes to This Manual ......................i 3. Document Conventions ......................ii 4. Copying and Pasting Text With X..................iv 5. Using the Mouse ........................v 6. We Need Feedback! ......................v I.
  • Page 4 7. Email Applications......................81 7.1. Evolution......................82 7.2. Thunderbird......................84 7.3. Plain Text Email Clients ..................86 8. Working with OpenOffice.org..................... 89 8.1. Feature overview of OpenOffice.org ..............89 8.2. OpenOffice.org Writer ..................91 8.3. OpenOffice.org Calc .................... 94 8.4. OpenOffice.org Impress ..................95 8.5.
  • Page 5 IV. Appendix ........................... 133 A. KDE: The K Desktop Environment ................. 135 A.1. Customizing KDE ..................... 135 A.2. Introducing Konqueror ..................136 A.3. Using Konqueror ..................... 138 A.4. Using the KDE Desktop..................140 A.5. Using the Panel ....................141 A.6. Browsing the Web with Konqueror ..............144 A.7.
  • Page 7: Introduction

    Introduction to System Administration, and the Red Hat Enterprise Linux Security Guide. HTML, PDF, and RPM versions of the manuals are available on the Red Hat Enterprise Linux Docu- mentation CD and online at http://www.redhat.com/docs/. Note Although this manual reflects the most current information possible, read the Red Hat Enterprise Linux Release Notes for information that may not have been available prior to our documentation being finalized.
  • Page 8: Changes To This Manual

    Introduction 2. Changes to This Manual This manual was previously published under the title Red Hat Linux Getting Started Guide. It has been renamed and incorporated into the Red Hat Enterprise Linux documentation set. It has been modified to include new features in Red Hat Enterprise Linux 4 and to reflect changes in documented procedures that are not supported in Red Hat Enterprise Linux.
  • Page 9 Introduction [key] A key on the keyboard is shown in this style. For example: To use [Tab] completion, type in a character and then press the [Tab] key. Your terminal displays the list of files in the directory that start with that letter. [key]-[combination] A combination of keystrokes is represented in this way.
  • Page 10 Introduction user input Text that the user has to type, either on the command line, or into a text box on a GUI screen, is displayed in this style. In the following example, text is displayed in this style: To boot your system into the text based installation program, you must type in the text com- mand at the prompt.
  • Page 11: Copying And Pasting Text With X

    If you spot a typographical error in the Red Hat Enterprise Linux Step By Step Guide, or if you have thought of a way to make this manual better, we would love to hear from you! Please submit a report in Bugzilla: http://bugzilla.redhat.com/bugzilla/ against the component rhel-sbs. When submitting a bug report, be sure to mention the manual’s identifier: rhel-sbs(EN)-4-Print-RHI (2005-02-16T01:05) If you have a suggestion for improving the documentation, try to be as specific as possible when de-...
  • Page 12 Introduction...
  • Page 13: Starting Out

    I. Starting Out To begin the journey of using your Red Hat Enterprise Linux system, you need to learn the basics. This part introduces the concepts and terms that help you get the most out of Red Hat Enterprise Linux, and learn some of its exciting features. From configuring your system with Setup Agent to using your graphical desktop and the shell prompt, this part helps you get acquainted with your Red Hat Enterprise Linux system.
  • Page 15: Getting Started

    Chapter 1. Getting Started From booting up to shutting down, whether you are working or playing, Red Hat Enterprise Linux provides tools and applications to help you get the most out of your computing environment. This chapter guides you through some basic tasks that you can perform on your Red Hat Enterprise Linux system.
  • Page 16 Chapter 1. Getting Started The Setup Agent first prompts you to read and agree to the License Agreement, which discusses your rights in using Red Hat Enterprise Linux. Click Yes, I agree to the License Agreement and click Next to continue. Important You must agree to the License Agreement to continue using Red Hat Enterprise Linux.
  • Page 17 Chapter 1. Getting Started You may also synchronize your date and time automatically with a network time server — a computer that sends accurate date and time settings to your system through a network connection. Select, the Network Time Protocol, check the box labeled Enable Network Time Protocol, and use the drop- down menu to select a time server.
  • Page 18 Chapter 1. Getting Started Figure 1-7. Activation To activate an existing Red Hat subscription, enter the Activation Number in the appropriate field. Otherwise, select I do not have a subscription number. Click Next to continue. Figure 1-8. User Account Next, you should create a user account to use on a routine basis. It is not recommended to log in to your root account for common computing tasks, as you may damage your system or unintentionally delete a file.
  • Page 19 Chapter 1. Getting Started Figure 1-9. Sound Card The Setup Agent probes your system for sound cards and attempts to configure the correct settings for use with Red Hat Enterprise Linux. You can then click the Play test sound button to play a sound sample.
  • Page 20: Introductory Terms

    Chapter 1. Getting Started Figure 1-11. Finish Setup Now that your system is configured, you are ready to log in and start using Red Hat Enterprise Linux. Press Forward to exit the Setup Agent. 1.2. Introductory Terms When you learn about a new operating system, you should also learn new terminology. This section defines a few basic terms you should learn.
  • Page 21: Logging In

    Chapter 1. Getting Started using the root account, which can reduce the chance of damaging your Red Hat Enterprise Linux installation or applications permanently. RPM: RPM stands for RPM Package Manager and is how Red Hat builds and delivers its software •...
  • Page 22 Chapter 1. Getting Started If you have already created and logged in to a user account, you can skip ahead to Chapter 2 Using the Graphical Desktop. If you created only the root account, refer to Section 1.6 Creating a User Account to learn how to set up a user account. If you did not create a user account using the Setup Agent, you must log in as root.
  • Page 23: Graphical Interface

    Chapter 1. Getting Started Kernel 2.4.21-3.EL on an i686 localhost login: Unless you have chosen to give your machine its own hostname, which is primarily used in a network setting, your machine will probably be called localhost.localdomain To log in as root from the console, type root at the login prompt, press [Enter], then type the root password that you chose during installation at the password prompt and press [Enter].
  • Page 24 You can also start the User Manager by typing at a shell prompt. redhat-config-users 2. If you are not logged in as root, you will be prompted for your root password. 3. The window shown in Figure 1-16 will appear. Click Add User.
  • Page 25: Documentation And Help

    Chapter 1. Getting Started 6. At the prompt, enter the same password to confirm your selection. Retype new password: Important You should take precautions when you choose a password. The password is the key to your account, so it should be both unique and easy for you to remember. Your password should be at least six characters.
  • Page 26 Linux Documentation CD. All of the Red Hat Enterprise Linux manuals are on this CD. Individual downloads of our documentation in HTML, RPM, PDF, and compressed tarball format ) are also available at http://www.redhat.com/docs/. Once you have logged in to your user .tar.gz account, inserting the Documentation CD in your CD-ROM drive should automatically start the Pack- age Management Tool and allow you to install any of the Red Hat Enterprise Linux documentation.
  • Page 27: Logging Out

    Figure 1-18. Package Management Tool Displaying Documentation Available for Installation If you have downloaded individual documentation RPM packages from the Red Hat website at http://www.redhat.com/docs/ you can install these manuals from a shell prompt. Open a shell prompt, and type the following at the command line: su - Press [Enter].
  • Page 28: Shutting Down Your Computer

    Chapter 1. Getting Started Figure 1-19. Logout Confirmation 1.8.2. Virtual Console Logout If you are not using the X Window System, and you logged in at the console, type or [Ctrl]-[D] exit to log out of the console session. 1.9. Shutting Down your Computer Before turning off your computer, it is important to properly shut down Red Hat Enterprise Linux.
  • Page 29: Using The Graphical Desktop

    Chapter 2. Using the Graphical Desktop Red Hat Enterprise Linux includes a powerful graphical desktop environment where you can easily access your applications, files, and system resources. Both new and experienced users can take full advantage of their Red Hat Enterprise Linux systems using the graphical desktop. This chapter covers the fundamentals of the desktop and how to configure it for your needs.
  • Page 30 Chapter 2. Using the Graphical Desktop 2.1.1. Using the Computer icon Figure 2-2. Double-clicking the Computer icon takes you to a list of all of the devices on your system. A device is anything connected to your computer to which data is sent or from which it is received. (You have probably heard of a ’device driver’...
  • Page 31 Chapter 2. Using the Graphical Desktop under the icon varies according to your user name. If you are logged in as root, the label reads root’s Home. User "joe" would see the label joe’s Home. Figure 2-3. User’s Home Double-clicking on the User’s Home icon allows you to navigate through your home directory or the rest of the file system.
  • Page 32 Chapter 2. Using the Graphical Desktop Figure 2-4. Customizing Nautilus - View Tab Views Tab The Views tab allows you to choose how your files and folders are displayed. You can also choose a Default Zoom Level. Zooming in on icons not only increases the size of the icons, but adds to the displayed information about each file or folder.
  • Page 33: Using The Desktop

    Chapter 2. Using the Graphical Desktop 2.2. Using the Desktop Other icons on the desktop can be shortcuts to files, folders, and application launchers. To open a folder or launch an application, double-click on its icon. Figure 2-5. The Graphical Desktop 2.2.1.
  • Page 34 Chapter 2. Using the Graphical Desktop To manually create an application launcher: 1. First, you must know the name of the application for which you are creating a launcher. For the purpose of this example, assume the application is gedit. 2.
  • Page 35: Using The Panel

    Chapter 2. Using the Graphical Desktop Figure 2-7. Example of a link to a file 2.3. Using the Panel The long gray bars across the top and bottom of the screen are the Panels. The top Panel contains both the Applications and Actions menus. It also contains application launch- ers, the notification area, and the time and date.
  • Page 36 Chapter 2. Using the Graphical Desktop 2.3.1. Standard Applets There are a few applets that run on the panels by default. These important applets are covered in the following sections. 2.3.1.1. Workspace Switcher Figure 2-10. The Workspace Switcher The graphical desktop allows for the use of multiple workspaces. Workspaces are virtual desktops —...
  • Page 37 Chapter 2. Using the Graphical Desktop Red Hat Network Alert Notification Tool Part of the Notification Area, the Red Hat Network Alert Notification Tool provides you with an easy way to make sure your system is up-to-date with current errata and security updates from Red Hat Network.
  • Page 38 Chapter 2. Using the Graphical Desktop Figure 2-13. The Weather Report Applet on the Panel Individual applets may also be configured. By right-clicking on any applet icon on the Panel, you are given a short menu that includes Preferences. These preferences are different for each applet. 2.3.3.
  • Page 39: Using The Applications And Actions Menus

    Chapter 2. Using the Graphical Desktop 2.3.4. Adding Additional Panels Figure 2-15. The Desktop with two additional Panels It may at times be convenient to have additional Panels. It is easy to add as many panels to your desktop as fits on the screen. Right-click on an unused area of the existing panel and choose New Panel.
  • Page 40: Customizing Your Gnome Session

    Chapter 2. Using the Graphical Desktop Printing: The Printer Configuration Tool allows you to add a new printer to your system, • whether it is connected to your computer or is available on a network. Soundcard Detection: The Sound Card Configuration Tool tool probes your system for •...
  • Page 41 Chapter 2. Using the Graphical Desktop 2.5.1. Configuring your Background Figure 2-16. The Desktop Background Preferences tool One way to dramatically alter the appearance of your graphical desktop is to change the background using the Desktop Background Preferences tool. You can choose from several background images included with Red Hat Enterprise Linux in the directory, or you can /usr/share/backgrounds/...
  • Page 42 Chapter 2. Using the Graphical Desktop Figure 2-17. The Desktop with a new background 2.5.2. Keyboard Shortcuts Figure 2-18. The Keyboard Shortcuts application You can create keyboard shortcuts — pressing a combination of keys on the keyboard — to perform actions within an application or on your desktop.
  • Page 43 Chapter 2. Using the Graphical Desktop 6. Pressing [Ctrl]-[Alt]-[2] at any time takes you to Workspace 2. Likewise, pressing [Ctrl]-[Alt]- [3] takes you to workspace 3, [Ctrl]-[Alt]-[4] takes you to workspace 4, and [Ctrl]-[Alt]-[1] takes you back to workspace 1. 2.5.3.
  • Page 44 Chapter 2. Using the Graphical Desktop Figure 2-20. Selecting sounds to accompany events 2.5.4. Screensaver Figure 2-21. The screensaver tool Double-click the Screensaver icon to launch the Screensaver Preferences tool. The list on the left displays the available screensavers. Nearly all screensavers can be customized by clicking on the Set- tings...
  • Page 45: Logging Out

    Chapter 2. Using the Graphical Desktop 2.5.5. Removable Storage Figure 2-22. Options for usage of removable storage Launch the Removable Storage tool from the Applications => Preferences sub-menu. The application opens a list of options for the way your system handles removable storage media such as floppy diskettes and CD-ROMs.
  • Page 46 Chapter 2. Using the Graphical Desktop 1. Select Session from the menu at the bottom left of the login screen. A window appears with a list of several different desktop environments. 2. Choose one, and select OK. 3. Enter your login and password as usual. A dialog box appears, warning you that this change is for the current session only.
  • Page 47: Managing Files And Directories

    Chapter 3. Managing Files and Directories This chapter explores the general format of your Red Hat Enterprise Linux file system. It bridges the differences between using Nautilus to manage the files on your system and using a shell prompt to manage them.
  • Page 48 Chapter 3. Managing Files and Directories You might think of the file system as a tree and directories as branches. There would be no tree without a root, and the same is true for the Red Hat Enterprise Linux file system. No matter how far away the directories branch, everything is connected to the root directory, which is represented as a singe forward slash (/).
  • Page 49: Managing Files

    Chapter 3. Managing Files and Directories . The relative path is: ../birthday/. The absolute path is: /var/www/html/pics/birthday/ /var/www/html/pics/birthday/. Clearly, the relative path is shorter in this case. There is no right or wrong choice: both relative and absolute paths point to the same branch of the tree.
  • Page 50 Chapter 3. Managing Files and Directories 3.3.1.3. System Files — a configuration file; configuration files sometimes use the extension, as well • .conf .cfg — a lock file; determines whether a program or device is in use • .lock — a Red Hat Package Manager file used to install software •...
  • Page 51: File Compression And Archiving

    Chapter 3. Managing Files and Directories There are a few special characters you cannot use in file names. You cannot use a "/" — this indicates a directory. You cannot name a file "." or "..", for reasons discussed in Section 3.2.1 Paths. 3.3.2.4.
  • Page 52 Chapter 3. Managing Files and Directories If you are using a file manager (such as Nautilus), you can double-click the file you wish to unar- chive or decompress to start File Roller. The File Roller browser window appears with the decom- pressed/unarchived file in a folder for you to extract or browse.
  • Page 53 Chapter 3. Managing Files and Directories 3.4.1.2. Creating Archives with File Roller Figure 3-3. Creating an Archive with File Roller File Roller allows you to create archives of your files and directories. To create a new archive, click New on the toolbar. A file browser pops up, allowing you to specify an archive name and the com- pression technique.
  • Page 54 Chapter 3. Managing Files and Directories Table 3-1. Compression Tools By convention, files compressed with are given the extension , files compressed with bzip2 .bz2 are given the extension , and files compressed with are given the extension gzip .zip Files compressed with are uncompressed with , files compressed with...
  • Page 55 Chapter 3. Managing Files and Directories The above command compresses , and the contents of the file1 file2 file3 directory (assuming this directory exists) and places them in a file named /usr/work/school/ filename.gz For more information, enter at a shell prompt to read the man pages for man gzip man gunzip gzip...
  • Page 56 Chapter 3. Managing Files and Directories — show the progress of the files being archived • — extract files from an archive • — compress the file with • gzip — compress the file with • bzip2 To create a tar file, enter: tar -cvf filename.tar directory/file In this example, represents the file you are creating and...
  • Page 57: Managing Directories

    Chapter 3. Managing Files and Directories files compressed with are conventionally given the extension gzip .tgz This command creates the archive file and compresses it as the file filename.tar filename.tgz (The file is not saved.) If you uncompress the file with the filename.tar filename.tgz gunzip...
  • Page 58 Chapter 3. Managing Files and Directories...
  • Page 59: Shell Prompt Basics

    Chapter 4. Shell Prompt Basics 4.1. Why Use a Shell Prompt Graphical environments for Linux have come a long way in the past few years. You can be perfectly productive in the X Window System and only have to open a shell prompt to complete a few tasks. However, many Red Hat Enterprise Linux functions can be completed faster from the shell prompt than from a graphical user interface (GUI).
  • Page 60: Basics

    Chapter 4. Shell Prompt Basics When the Free Software Foundation sought a royalty-free shell, developers began to work on the language behind the Bourne shell as well as some of the popular features from other shells available at the time. The result was the Bourne Again Shell, or .
  • Page 61 Chapter 4. Shell Prompt Basics than any others, "$" and "#". The first symbol, "$", is the last character in the prompt when you are logged in as a normal user. The shell prompt for a normal user looks something like this: [username@localhost.localdomain username]$ The second symbol, "#", is the last character in the prompt when you are logged in as root.
  • Page 62 Chapter 4. Shell Prompt Basics 4.3.4.1. Tab Completion Tab completion is one of the most useful shortcuts available at the command line. Red Hat Enterprise Linux has the ability to "guess" what command, directory, or filename you are entering at the shell prompt.
  • Page 63 Chapter 4. Shell Prompt Basics Commands that you only typed partially and did not follow with [Enter] are not saved into your command history file. To clear your command history, type history -c. By default, Red Hat Enterprise Linux stores 1000 commands. Each terminal window or shell prompt stores a separate set of commands.
  • Page 64 Chapter 4. Shell Prompt Basics Using the backslash ( ), you can specify that you do not want to search out everything by using the asterisk, but you are instead looking for a file with an asterisk in the name. If the file is called , type: sneak*.txt...
  • Page 65: Determining Your Current Directory With Pwd

    Chapter 4. Shell Prompt Basics Sometimes, you may accidentally open a program file or some other non-text file in a terminal window. When you close the file, you could find that the text you are typing does not match the output on the monitor.
  • Page 66 Chapter 4. Shell Prompt Basics Action Command Format Details Move a file To move a file from one mv which_file directory to another, use destination Rename a file The use of the command mv oldname newname changes the name of the file from oldname newname...
  • Page 67 Chapter 4. Shell Prompt Basics Figure 4-3. Sample Output for the Directory /etc The following is a brief list of options commonly used with . Remember, you can view the full list by reading the man page ( man ls (all) —...
  • Page 68 Chapter 4. Shell Prompt Basics To copy a file to a different direcoty, specify a path as the third word on the command line: cp original_file /dir1/dir2/ This command creates a copy of . If the last part of the path is a filename original_file dir2/ instead of a directory, the copy has that new name.
  • Page 69 Chapter 4. Shell Prompt Basics Note You can only move files to a directory that already exists: Linux will not create a new directory with command. 4.5.4. Renaming files with mv To rename a file or directory, use the command. To rename a file with , the third word on the command line must end in the new filename.
  • Page 70: Leaving Your Current Working Directory

    Chapter 4. Shell Prompt Basics The interactive, or -i, option for rm causes it to ask if you are sure before permanently deleting a file or directory. You can make this the default behavior for rm by editing the file. This file is .bashrc located in your home directory.
  • Page 71: Locating Files And Directories

    Chapter 4. Shell Prompt Basics cd ~ — Also returns you to your login directory • cd / — Takes you to the entire system’s root directory. • cd /root — Takes you to the home directory of the root user. You must be the root user to access •...
  • Page 72 Chapter 4. Shell Prompt Basics With , you can see every file or directory whose name contains the search criterion. For ex- locate ample, to search for all files with the word in the name, type: finger locate finger command uses a database to locate files and directories that have the word locate finger the file or directory name.
  • Page 73: Viewing Text Files From The Shell Prompt

    Chapter 4. Shell Prompt Basics Checking the usage of a command using whatis before reading the man page can save you some time. 4.8. Viewing text files from the shell prompt Red Hat Enterprise Linux has several applications that allow you to view and manipulate text files at the shell prompt.
  • Page 74: Manipulating Information From The Shell

    Chapter 4. Shell Prompt Basics The main difference between is that allows backward and single-line movement more less less using the same navigation as man pages: press the [Space] bar to go down one page, the [B] to go back one page, the directional (or "arrow") keys to move one line at a time, and [Q] to quit. To search the output of a text file using , press [/] and enter the keyword to search for within the less...
  • Page 75 Chapter 4. Shell Prompt Basics Using , the pipe (|), and together displays the file one page at a time. You can then use the less up and down arrow keys to move backward and forward through the pages. filename | less <...
  • Page 76 Chapter 4. Shell Prompt Basics The following screen is another example, redirecting three more lines of text to create the file bar.txt Figure 4-5. Redirecting Output to a Second File The following screen demonstrates ’s concatenate function, adding the contents of bar.txt the end of .
  • Page 77 Chapter 4. Shell Prompt Basics Figure 4-7. Contents of example1.txt Caution Be careful when you redirect the output to a file, because you can easily overwrite an existing file! Make sure the name of the file you are creating does not match the name of a pre-existing file, unless you want to replace it.
  • Page 78: Using Multiple Commands

    Chapter 4. Shell Prompt Basics Figure 4-9. diff Comparison of example1.txt and foo.txt 4.9.4. Redirecting Standard Input You can also perform the same type of redirection with standard input. When you use the redirect standard input symbol <, you are telling the shell that you want a file to be read as input for a command.
  • Page 79: Ownership And Permissions

    Chapter 4. Shell Prompt Basics 4.11. Ownership and Permissions As a regular user, try to enter root’s home directory by entering the command . Note the cd /root/ error message: -bash: cd: /root/: Permission denied That was one demonstration of Linux’s security features. Linux, like UNIX, is a multi-user system and file permissions are one way the system protects against malicious tampering.
  • Page 80 Chapter 4. Shell Prompt Basics — a directory • (dash) — a regular file (rather than directory or link) • — a symbolic link to another program or file elsewhere on the system • Others are possible, but are beyond the scope of this manual. Refer to the Red Hat Enterprise Linux System Administration Guide for more information.
  • Page 81 Chapter 4. Shell Prompt Basics Now, type the following: chmod o+w foo.txt command tells the system you want to give others write permission to the file . To foo.txt check the results, list the file’s details again. Now, the file looks like this: -rw-rw-rw- 1 user user 150 Mar 19 08:08 foo.txt...
  • Page 82 Chapter 4. Shell Prompt Basics chmod u+rw foo.txt Use the command to verify that you, the file owner, can read the file again. cat foo.txt Here are some common examples of settings that can be used with chmod — adds write access for the group •...
  • Page 83 Chapter 4. Shell Prompt Basics Each permission setting can be represented by a numerical value: r = 4 • w = 2 • x = 1 • - = 0 • When these values are added together, the total is used to set specific permissions. For example, if you want read and write permissions, you would have a value of 6;...
  • Page 84 Chapter 4. Shell Prompt Basics Setting Numerical Meaning (700) Only the owner has read, write, and execute permissions. -rwx------ (755) The owner has read, write, and execute permissions; the -rwxr-xr-x group and others have only read and execute. (711) The owner has read, write, and execute permissions; the -rwx--x--x group and others have only execute.
  • Page 85: Using Your System

    II. Using Your System Now that you have begun exploring your Red Hat Enterprise Linux system, you can start using some of the many applications that are included with it. From Internet surfing and personal productivity, to games and beyond, this part details some popular software programs that help you become more pro- ductive with your computer, and tap the power of the Internet for your research and communications.
  • Page 87: Connecting To The Internet

    Chapter 5. Connecting to the Internet Perhaps the most important change in communication since the telephone, the Internet is a large part of our world today. Red Hat Enterprise Linux has the tools necessary to allow you to connect to that world.
  • Page 88: Creating A Dial-Up Connection

    Chapter 5. Connecting to the Internet 5.1. The Internet Configuration Wizard Figure 5-1. Internet Configuration Wizard Red Hat Enterprise Linux includes the Internet Configuration Wizard. The Internet Configuration Wizard is available from the Applications (the main menu on the panel) => System Tools sub-menu, or from a shell prompt via the command .
  • Page 89: Creating A High Speed Connection

    Chapter 5. Connecting to the Internet 4. The left pane lists each of the possible connections. Choose Modem connection and click the Forward button. 5. Red Hat Enterprise Linux probes for a working modem installed on your computer. If it does not find one, make sure that you have a hardware modem, and that it is installed correctly.
  • Page 90: Creating A Wireless Connection

    Chapter 5. Connecting to the Internet DHCP You may be required to configure your sytem to obtain an IP address through DHCP. To configure this type of connection, start the Internet Configuration Wizard, select Ethernet Connection, and select DHCP from the Configure Network Settings screen. Some DSL providers and most cable modem providers use this configuration.
  • Page 91: Web Browsing

    Chapter 6. Web Browsing Once you have configured your Internet connection (refer to Chapter 5 Connecting to the Internet), you are ready to browse the Internet. Red Hat Enterprise Linux comes with several Web browsers, graphical applications that use your Internet connection to access the World Wide Web: news, research, shopping, banking, and more.
  • Page 92 Chapter 6. Web Browsing Figure 6-2. Navigation Toolbar Enter a Uniform Resource Locator (URL) — the name or address of a web site — into the address field. Firefox moves immediately to the web site. The Search field uses the most popular search engines to look for sites related to the keywords you enter.
  • Page 93 Chapter 6. Web Browsing Figure 6-5. Open Tabs 6.1.3. Plug-ins Plug-ins, applications that expand the abilities of Firefox, are available for download. A full list of plugins can be found at : http://channels.netscape.com/ns/browsers/plugins.jsp. 6.1.4. Extensions and Themes There are many extensions and themes available for Firefox. Extensions are small applets (smaller than plug-ins) that provide additional functionality to Firefox.
  • Page 94 Chapter 6. Web Browsing...
  • Page 95: Email Applications

    Chapter 7. Email Applications Email is a very popular way of communicating with others over the Internet. An application that allows users to send, receive, and read email is called an email client. Red Hat Enterprise Linux includes several email applications, including graphical email clients like Evolution and Thunderbird, and text-based clients like mutt.
  • Page 96: Evolution

    Chapter 7. Email Applications If you have any questions regarding what information you need, contact your ISP or network admin- istrator. Unless properly configured, you cannot make full use of the email clients discussed in this chapter. 7.1. Evolution Evolution is more than just an email client. It provides all of the standard email client features, including powerful mailbox management, user-defined filters, and quick searches.
  • Page 97 Chapter 7. Email Applications Figure 7-2. Evolution Main Screen To view what is in your inbox or to send an email, click on the Mail button in the left toolbar, then select the Inbox icon from the list of folders. Figure 7-3.
  • Page 98: Thunderbird

    Chapter 7. Email Applications Figure 7-4. Evolution New Email Message Screen While Evolution does much more than read and send email, this chapter focuses exclusively on its email capabilities. To learn more about Evolution’s other features, refer to the Help text. 7.2.
  • Page 99 Chapter 7. Email Applications Figure 7-5. Account Setup Figure 7-6. Thunderbird Mail To create a new email message, click the Write button. A blank message will open in a new window. Enter the address(es) of the recipient(s) of your email in the To field(s). Enter the subject of your email in the Subject field.
  • Page 100: Plain Text Email Clients

    Chapter 7. Email Applications Figure 7-7. Thunderbird Mail New Email Message Screen To read email, click on the Get Mail icon to check for new mail. Click on the folders in the left sidebar to open them. If there are any messsages in that folder, they appear as a list in the top-right pane of the window.
  • Page 101 Chapter 7. Email Applications 7.3. Plain Text Email Clients Most modern email clients allow the user to select whether they want to send their emails in plain text or in HTML. HTML formatted email can contain formated text, graphics, and interactive links to Web sites.
  • Page 102 Chapter 7. Email Applications These messages are in a default mail folder, called the inbox or mailspool. Use the [K] and [J] keys on your keyboard to move the highlighted cursor up and down the list of messages. In the index or pager views, use the [R] key to reply to a message or the [M] key to create a new one. Mutt prompts for the To: address and the Subject: line.
  • Page 103: Working With Openoffice.org

    Chapter 8. Working with OpenOffice.org 8.1. Feature overview of OpenOffice.org OpenOffice.org is a powerful office suite that includes word processing, spreadsheets, and slides. It has all of the functionality of the best-known office suites, and uses some powerful additional tools to help you easily create professional-looking documents.
  • Page 104 Chapter 8. Working with OpenOffice.org Use the Stylist to apply styles to text. It can be reached by clicking on the yellow diamond icon on your toolbar, by going to Format => Styles, or by pressing [F11]. To apply a style, highlight a block of text, then double-click on the appropriate style in the Stylist, such as Heading1 or Text body.
  • Page 105: Openoffice.org Writer

    Chapter 8. Working with OpenOffice.org => Spellcheck => AutoSpellcheck and remove the checkmark there by clicking on it once. To turn it back on, click on it again. Thesaurus OpenOffice.org also includes a thesaurus. Click on the word to replace or double-click it to highlight the word.
  • Page 106 Chapter 8. Working with OpenOffice.org When OpenOffice.org Writer opens, you are presented with a blank document. The margins of the document are represented by the gray box drawn on the main screen. You can start entering text immediately. You may notice as you type that OpenOffice.org Writer fills in the rest of a word you are typing. OpenOffice.org Writer guesses the word you are typing based on longer words used earlier in the document.
  • Page 107 Chapter 8. Working with OpenOffice.org To save your document as a .pdf file, go to File => Export as pdf. While OpenOffice.org Writer can save as a .pdf, it cannot read or edit them. To view a .pdf file, see FIXME. To print a document: 1.
  • Page 108: Openoffice.org Calc

    Chapter 8. Working with OpenOffice.org 8.3. OpenOffice.org Calc 8.3.1. Overview of OpenOffice.org Calc OpenOffice.org Calc functions similarly to other spreadsheet applications. It is useful for creating forms as well as calculations. To create a new spreadsheet: 1. Start OpenOffice.org Calc from the Applications menu bu going to Application => Office => OpenOffice.org Calc or enter oocalc at a shell prompt.
  • Page 109: Openoffice.org Impress

    Chapter 8. Working with OpenOffice.org 3. The AutoPilot window opens. 4. Select the function you would like to use from the pane on the left. You select by double-clicking on the name of the function. 5. In the right pane, information about the selected function is displayed. Fields for the data are just below the function information.
  • Page 110: Openoffice.org Draw And Math

    Chapter 8. Working with OpenOffice.org To start Impress, go to Applications => Office => OpenOffice.org Impress. When the application first starts, the AutoPilot guides you through the initial set up of your slide show. Make your selections and click Create. A blank slide opens and you can edit your presentation. 1.
  • Page 111 Chapter 8. Working with OpenOffice.org 3. Select a variant of the tool from the list by clicking on it once. 4. Move your mouse pointer to the blank page and use the drawing tool. 8.5.2. OpenOffice.org Math OpenOffice.org Math is a useful tool for creating properly formatted functions to import for display in any of the OpenOffice.org applications.
  • Page 112 Chapter 8. Working with OpenOffice.org...
  • Page 113: Working With Other Text Applications

    Chapter 9. Working with Other Text Applications Text editors fall somewhere between word processors like OpenOffice.org Writer and pager appli- cations like less. These programs are useful for tasks like writing HTML, C, or SGML; they are best suited for any task that is text-oriented, and is not necessarily intended for print. Programs that allow you to view PDF and PS files are referred to as text viewers.
  • Page 114: Viewing Pdf And Ps Files

    Chapter 9. Working with Other Text Applications commands are available via either method. Emacs can be customized extensively. Programs that customize syntax highlighting or add other functionality can be written and installed. Emacs even contains several games available from the Tools =>...
  • Page 115: Audio, Video, And Games

    Chapter 10. Audio, Video, and Games This chapter presents you with the lighter side of Red Hat Enterprise Linux. From games and toys to multimedia applications, Red Hat Enterprise Linux provides many packages to assist you in having some fun with your computer. 10.1.
  • Page 116: Playing Digital Audio Files

    Chapter 10. Audio, Video, and Games 10.2. Playing Digital Audio Files Digital audio has become very popular in recent years. Users enjoy the technology because the sound quality is excellent compared to analog tape or records, and the files are compact (audio files can easily be transferred across the Internet).
  • Page 117: Troubleshooting Your Sound Card

    Most sound cards are supported by Red Hat Enterprise Linux, but there are some sound cards that are not completely compatible or may not work at all. If you are having trouble configuring your sound card, check the Hardware Compatibility List at http://hardware.redhat.com/hcl/ to see if your card is supported.
  • Page 118: Troubleshooting Your Video Card

    Chapter 10. Audio, Video, and Games Figure 10-5. Sound Card Configuration Tool 10.3.1. If Sound Card Configuration Tool Does Not Work If the Sound Card Configuration Tool does not work (if the sample does not play and you still do not have audio sounds), there are alternatives, although they are not quite as simple as running the Sound Card Configuration Tool.
  • Page 119: Games

    Chapter 10. Audio, Video, and Games To run the X Configuration Tool, click Applications => System Settings => Display. A pop-up window prompts you for your root password. You can also start from a shell prompt by typing the command , which then prompts you to enter your root password.
  • Page 120: Finding Games Online

    Chapter 10. Audio, Video, and Games To start a game, click Applications => Games and select the game of your choice. Figure 10-7 shows a fun game for kids of all ages called Same GNOME. In this game you point your mouse at matching marbles until they start to spin;...
  • Page 121: Working With Digital Cameras

    Chapter 11. Working with Digital Cameras Digital cameras have recently grown in popularity because of their increasing image quality and easy interaction with desktop PCs. Digital cameras create high-quality images that you can to others over the Internet or print on a color printer. Red Hat Enterprise Linux supports several brands of digital cameras and has applications that help you access, view, and modify your digital photographs.
  • Page 122 Chapter 11. Working with Digital Cameras click the OK button. At the Import Photos screen, select the destination of your photos and click the Import button. FIXME - Image of Import Screen FIXME - Image of Camera Model Screen Figure 11-1. Adding a Camera in gThumb Imported photos are listed in the right pane of the main screen.
  • Page 123: Working With Images

    Chapter 12. Working with Images Digital images are ubiquitous — they are available on the Internet, through email, and even on CD from film developers. These images are files, and can be manipulated with software available on your Red Hat Enterprise Linux system. Red Hat Enterprise Linux allows you to save, view, edit, and create image files.
  • Page 124: Editing And Creating Images With The Gimp

    Chapter 12. Working with Images Figure 12-1. gThumb Displaying a Folder of Images The gThumb interface has a text field for you to enter a particular path to your image directories. Right-clicking on an image in the display area opens a pop-up menu of file management options such as renaming, moving, copying, and converting an image from one file format to another.
  • Page 125 Chapter 12. Working with Images Depending on the file type you selected, another window with options may open. Ingeneral, it is a good idea to accept the settings that the GIMP suggests. Click the OK button again to complete the save process.
  • Page 126 Chapter 12. Working with Images 5. Save your file. While this chapter covers image applications briefly, there is much more detailed information avail- able. Refer to the following resources if you are interested in learning more about the applications in this chapter.
  • Page 127: Diskettes And Cd-Roms

    Chapter 13. Diskettes and CD-ROMs Using removable media with Red Hat Enterprise Linux requires some explanation. This chapter dis- cusses how to read and write files to and from diskettes, CD-ROMs, and USB Flash Drives. 13.1. Using Diskettes Diskettes are one of the oldest removable media solutions available for the personal computer (PC). Diskettes are ideal as a portable storage solution for small files that need to be physically moved around.
  • Page 128 Chapter 13. Diskettes and CD-ROMs 2. Select Unmount Volume from the menu. Once the diskette has been unmounted, you can safely eject it from the drive. Note If you do not unmount a diskette before ejecting it, the files you meant to transfer to it will not actually be written on the diskette.
  • Page 129: Cd- And Dvd-Roms

    Chapter 13. Diskettes and CD-ROMs Figure 13-1. gfloppy Change the settings in gfloppy to suit your needs; then click Format. A status box appears on top of the main window, showing you the status of formatting and verification. Once complete, close gfloppy and either eject or mount and use the diskette.
  • Page 130 Chapter 13. Diskettes and CD-ROMs CDs, Nautilus starts CD Player; for data CDs and DVDs, Nautilus opens a file browser window that displays the contents of the disk. Figure 13-2. Contents of a CD-ROM in Nautilus When Nautilus auto-mounts a CD or DVD, it places an icon on the desktop that matches the type of media inserted.
  • Page 131: Cd/Dvd-Rs And Cd/Dvd-Rws

    Chapter 13. Diskettes and CD-ROMs 13.3. CD/DVD-Rs and CD/DVD-RWs CD-writable (CD-R) media are an inexpensive way to back up as much as 760MB of data, includ- ing applications, personal files, and multimedia files. CD-rewritable (CD-RW) media are also very common, and allow the user to write files to the media multiple times. Recently, the DVD equivalents of these media have become more common and more affordable.
  • Page 132 Chapter 13. Diskettes and CD-ROMs Figure 13-4. The CD/DVD Creator Write Dialog Box By default, the CD or DVD should automatically eject from your drive when it is finished. Since it is generally recommended to periodically backup personal files, CD/DVD Creator can help you do so quickly.
  • Page 133 Chapter 13. Diskettes and CD-ROMs Option Function Sets an Application ID — a text string that will be written into the volume header of the image which can be useful to determine what applications are on the CD. Sets a Volume ID — a name that is assigned to it if the image is burned, and the disc is mounted in Solaris and Windows environments.
  • Page 134: Additional Resources

    Chapter 13. Diskettes and CD-ROMs 13.4. Additional Resources This section briefly covers several applications. Refer to the following resources for more information about the applications in this chapter. 13.4.1. Installed Documentation man page — Discusses how to burn data, audio and mixed-mode CDs and DVDs. Offers •...
  • Page 135 Chapter 13. Diskettes and CD-ROMs To mount your USB drive manually: 1. Open a terminal window. 2. Enter the command mount /media/ < manufacturer > / To mount your USB drive with Nautilus 1. Open the Computer window from the desktop. 2.
  • Page 136 Chapter 13. Diskettes and CD-ROMs...
  • Page 137: Troubleshooting Your System

    III. Troubleshooting Your System If you ever run into problems using your Red Hat Enterprise Linux system, there are steps you can take and tools you can use to recover from issues that get you back to using your system normally. From booting into rescue mode to changing a forgotten password, this part can show you how to troubleshoot several common issues that you may run into in the course of using Red Hat Enterprise Linux.
  • Page 139: Frequently Asked Questions

    Chapter 14. Frequently Asked Questions This chapter answers some of the most common questions about using Red Hat Enterprise Linux that you may ask as you become more familiar with it. From recovering forgotten passwords to trou- bleshooting package installation problems, this chapter guides you step-by-step through some com- mon tasks to get you on your way.
  • Page 140: Forgotten User Password

    Chapter 14. Frequently Asked Questions 14.3. Forgotten user Password I’ve forgotten my user password. How do I get a new one? Passwords are stored in encrypted files on your Red Hat Enterprise Linux system: users cannot read a file and see their own or other passwords. If you forget your user password, you must create a new one.
  • Page 141 Chapter 14. Frequently Asked Questions The reason you may need to type the full pathnames in order to start an application is because the executable was not placed in a directory where your user shell environment knew it could be found (such as /usr/local/bin You can customize your settings so that you are not required to use the type the full path to the...
  • Page 142: Finding Commands Quickly

    Chapter 14. Frequently Asked Questions 14.7. Finding Commands Quickly I was looking at a man page yesterday, but I cannot remember the name of the command I was reading about, and I did not write it down. How do I get the man page back? The command you used is stored in a file called .
  • Page 143: Accessing A Windows Partition

    Chapter 14. Frequently Asked Questions 14.9. Keep Output from Scrolling Whenever I type I can barely see the output of the directory because it scrolls by too quickly. How can I actually read the output? To prevent the output of from scrolling by too quickly, pipe the output to a utility such as less .
  • Page 144 Chapter 14. Frequently Asked Questions Figure 14-1. Hardware Browser hard disk device listing Select Hard Drives from the panel and find your Windows partition from the Disk Information displayed. Windows partitions normally use the FAT or FAT32 file system type. This file system type can be mounted and read within Linux;...
  • Page 145: Error Messages During Installation Of Rpms

    For more information about using RPM and Package Management Tool, refer to the Red Hat Enterprise Linux System Administration Guide on the Red Hat Enterprise Linux Documentation CD or online at http://www.redhat.com/docs/. 14.12. Changing Login from Console to X at Startup...
  • Page 146 Chapter 14. Frequently Asked Questions id:3:initdefault: To change from a console to a graphical login, you should change the number in the line from a to a id:3:initdefault: Warning Change only the number of the default runlevel from Your changed line should look like the following: id:5:initdefault: When you are satisfied with your change, save and exit the file using the [Ctrl]-[x] keys.
  • Page 147: Appendix

    IV. Appendix This part contains supplemental information and instruction that you may find useful during the course of your Red Hat Enterprise Linux usage. Perhaps you want to use the KDE graphical desktop envi- ronment, or learn more about configuring your system to send and receive encrypted email. This section shows you time-saving keyboard shortcuts, discusses the Red Hat Enterprise Linux directory structure, and more.
  • Page 149: Kde: The K Desktop Environment

    Appendix A. KDE: The K Desktop Environment The K Desktop Environment (KDE) is a graphical desktop, similar in function to the GNOME desktop explored in the main text of the manual. It uses many of the same freatures as GNOME, including icons, windows, menus, and a panel.
  • Page 150: Introducing Konqueror

    Appendix A. KDE: The K Desktop Environment and window border appearance. You can also customize mouse and keyboard events which makes working with the desktop as efficient for your needs as possible. Regional & Accessibility This section allows you to set country and language options to your particular locale. For users with sight or hearing impairments, you can also configure accessibility features such as audible and visual cues and keyboard/mouse customization.
  • Page 151 Appendix A. KDE: The K Desktop Environment A.2.3. Removable Media KDE works with removable media, including diskettes, CD-, and DVD-ROMs. A.2.3.1. Diskettes Recall that diskettes must be mounted before use and unmounted after use to be sure that your files are not damaged.
  • Page 152: Using Konqueror

    Appendix A. KDE: The K Desktop Environment Figure A-2. The Konqueror Configuration Window The configuration window opens. in the left pane is a list of icons representing the types of cus- tomizatins you can make. Clicking on each icon in turn displays customization options. For example, the Appearance icon allows you to select the font face and size of your Konqueror windows.
  • Page 153 Appendix A. KDE: The K Desktop Environment Figure A-3. The Konqueror File Manager You can navigate through the file system by clicking on folders within the main window pane or through the hierarchical file system viewer on the navigation panel as shown in Figure A-3. Files and folders in the main window frame can be moved or copied to another folder or sent to the trash.
  • Page 154: Using The Kde Desktop

    Appendix A. KDE: The K Desktop Environment Figure A-4. Working with the Navigation Panel The navigation panel lets you access your Web bookmarks, browsing history, network resources, file system, and has a built-in media player for playing multimedia files without opening a separate application.
  • Page 155: Using The Panel

    Appendix A. KDE: The K Desktop Environment Figure A-5. Desktop Background Configuration Two of the options you can set are the number and names of your desktops. Figure A-6. Virtual Desktop Configuration Click on the Multiple Desktops icon. Select the number of desktops available to you, then enter names for the desktops in the text fields.
  • Page 156 Appendix A. KDE: The K Desktop Environment Figure A-7. The Panel Applets are small applications that run on the panel. There are several types of applets: some perform functions such as system monitoring, time and date display, and others launch applications. Some applets run on the panel by default.
  • Page 157 Appendix A. KDE: The K Desktop Environment A.5.3. The Main Menu is the central point for using KDE. Clicking on the Main Menu icon on the The Main Menu panel displays a large master menu from which you can perform tasks such as launch applications, find files, and configure your desktop.
  • Page 158: Browsing The Web With Konqueror

    Figure A-11. Welcome to Konqueror To begin your Web session, enter a URL in the Location field. For example, enter http://www.redhat.com/ into the field. If your internet connection is working properly, Konqueror displays a web page similar to the one pictured in Figure A-11.
  • Page 159: Using Konqueror To View Images

    Appendix A. KDE: The K Desktop Environment Figure A-12. The Konqueror Handbook A.7. Using Konqueror to View Images You can also use the Konqueror file manager to view images. Using Konqueror as an image browser works similarly to Nautilus. Konqueror automatically generates thumbnail preview icons within the file browser window.
  • Page 160: Kmail

    Appendix A. KDE: The K Desktop Environment Figure A-14. Image viewing configuration on the Konqueror Toolbar You can also open the image with more advanced image viewers, such as the GIMP. Right-click on the image, choose Open With... and select the GIMP. You can also select Other..., which opens a pop-up menu that lists all available applications.
  • Page 161 Appendix A. KDE: The K Desktop Environment tion, refer to the KMail user manual (Help => KMail Handbook) or visit KMail’s homepage at http://kmail.kde.org. Figure A-16. KMail Main Screen Once you have configured the email settings, begin sending and receiving email by clicking on the Get Mail icon in the upper left of the screen.
  • Page 162: Logging Out Of Kde

    Appendix A. KDE: The K Desktop Environment Once you have composed a message and entered an email address to send the email to, click Send in the toolbar: A.9. Logging Out of KDE There are two ways to log out of your KDE session. From the Main Menu, select Logout User, where User is your account username.
  • Page 163 Appendix A. KDE: The K Desktop Environment You can access the HelpCenter from the Main Menu by selecting Help. To access HelpCenter from the desktop, right-click on the desktop and select the Help => K Desktop Handbook. The opening screen of the HelpCenter browser appears like Figure A-19. From this main page, you can view help documentation on topics such as using and configuring the desktop, working with the many applications included with KDE, and working with the Konquerer file manager.
  • Page 164 Appendix A. KDE: The K Desktop Environment...
  • Page 165: Getting Started With Gnu Privacy Guard

    Appendix B. Getting Started with Gnu Privacy Guard Have you ever wondered if your email can be read during its transmission from you to other people, or from other people to you? Unfortunately, complete strangers could conceivably intercept or even tamper with your email.
  • Page 166: Warning Messages

    Appendix B. Getting Started with Gnu Privacy Guard mv ~/.gnupg/options ~/.gnupg/gpg.conf If you are upgrading from a version prior to 1.0.7, you can create signature caches in your keyring to decrease the keyring access time. To perform this operation, execute the following command once: gpg --rebuild-keydb-caches B.2.
  • Page 167: Generating A Keypair

    Appendix B. Getting Started with Gnu Privacy Guard B.3. Generating a Keypair To begin using GnuPG, you must first generate a new keypair: a public key and a private key. To generate a keypair, at a shell prompt, type the following command: gpg --gen-key Since you work with your user account most frequently, you should perform this action while logged in to your user account (not as root).
  • Page 168: Generating A Revocation Certificate

    Appendix B. Getting Started with Gnu Privacy Guard Once you enter and verify your passphrase, your keys are generated, and a message similar to the following is displayed: We need to generate a lot of random bytes. It is a good idea to perform some other action (type on the keyboard, move the mouse, utilize the disks) during the prime generation;...
  • Page 169: Exporting Your Public Key

    Appendix B. Getting Started with Gnu Privacy Guard output to a file in your login directory. That way, you can keep the certificate for use later, or move it to a diskette and store it someplace safe. The output looks similar to the following: Your Name you@example.com 1024D/823D25A9 2000-04-26...
  • Page 170 Appendix B. Getting Started with Gnu Privacy Guard iLyPH1QAoI33Ft/0HBqLtqdtP4vWYQRbibjW =BMEc -----END PGP PUBLIC KEY BLOCK----- B.5.1. Exporting to a Keyserver If you are only writing to a few correspondents, you can export your public key and send it to them personally.
  • Page 171: Importing A Public Key

    Appendix B. Getting Started with Gnu Privacy Guard Figure B-1. Copying Your Public Key Note that if you are submitting your key to another Web-based keyserver, the above transaction is essentially the same. That is all you need to do. Regardless of whether you use the shell prompt or the Web, you see a message that your key was successfully submitted —...
  • Page 172: What Are Digital Signatures

    Appendix B. Getting Started with Gnu Privacy Guard The output looks similar to the following: gpg: key F78FFE84: public key imported gpg: Total number processed: 1 gpg: imported: 1 To check that the process was successful, use the command; you should see your gpg --list-keys newly imported key listed on your keyring.
  • Page 173 Appendix B. Getting Started with Gnu Privacy Guard B.8.3. Related Books The Official PGP User’s Guide by Philip R. Zimmerman; MIT Press • PGP: Pretty Good Privacy by Simson Garfinkel; O’Reilly & Associates, Inc. • E-Mail Security: How to Keep Your Electronic Messages Private by Bruce Schneier; John Wiley & •...
  • Page 174 Appendix B. Getting Started with Gnu Privacy Guard...
  • Page 175: Applications

    Appendix C. Applications The following table is a quick reference guide to the applications available on your Red Hat Enterprise Linux system. While these are the recommended applications, many other commands and applicatons are available. Category Application Location Audio Playback XMMS Applications (the main menu on the panel) =>...
  • Page 176 Appendix C. Applications Category Application Location Kolourpaint Applications (the main menu on the panel) => Graphics => Kolourpaint Image Viewers Nautilus Applications (the main menu on the panel) => File Browser KView Applications (the main menu on the panel) => Graphics =>...
  • Page 177 Appendix C. Applications Category Application Location Konquerer, Applications (the main menu on the panel) => links Internet => Konqueror or enter the command at a shell prompt. links OpenOffice.org Applications (the main menu on the panel) => Word Processors Writer Office =>...
  • Page 178 Appendix C. Applications...
  • Page 179: A Comparison Of Common Dos And Linux Commands

    Appendix D. A Comparison of Common DOS and Linux Commands Many Linux commands typed at a shell prompt are similar to the commands you would type in DOS. In fact, some commands are identical. This appendix provides common commands used at the DOS prompt in Windows and their coun- terparts in Linux.
  • Page 180 Appendix D. A Comparison of Common DOS and Linux Commands Command’s MS-DOS Linux Basic Linux Example Purpose Displays your chdir location in the file system Changes directories cd /directory/directory with a specified pathname pathname path (absolute path) Changes directories cd.. cd ..
  • Page 181: System Directories

    Appendix E. System Directories This is a list of the primary Red Hat Enterprise Linux system directories. Each directory is described briefly. For additional directory information, refer to the Red Hat Enterprise Linux System Adminis- tration Guide and the Red Hat Enterprise Linux Reference Guide. —...
  • Page 182 Appendix E. System Directories...
  • Page 183: Keyboard Shortcuts

    Appendix F. Keyboard Shortcuts Here are a few keyboard shortcuts you can use to perform common tasks quickly. Many more are available in addition to what is listed here. For more command line and keyboard shortcuts, visit: http://linux-newbie.sunsite.dk/html/lnag.html [Ctrl] + [Alt] + [Backspace] = kills your current X session. Kills your graphical desktop session •...
  • Page 184 Appendix F. Keyboard Shortcuts...
  • Page 185: Index

    Index chmod, 65 numerical settings, 68 clear, 50 DOS, 165 finding, 128 history, 128 accounts locate, 57 creating, 10 appending standard output, 63 keeping output from scrolling, 129 applet ls -al, 52 definition, 21 ls, common options with, 53 Applets multiple, 64 adding to the Panel, 23 print working directory (pwd), 51...
  • Page 186 definition, 73 formatting diskettes, 114 documents, 89 drag and drop, v games and amusements, 105 finding more online, 106 email clients, 81 Evolution, 82 getting started KMail, 146 logging in, 7 mutt, 87 Setup Agent, 1 plain text, 87 GNOME desktop mutt, 87 (see graphical desktop) Thunderbird, 84...
  • Page 187 Main Menu, 25 images in KDE, 143 manipulation, 109 mke2fs, 115 viewing, 109, 109 mkisofs, 118 gThumb, 109 mouse Konqueror, 145 how to use, v introduction, i music IP address, 73 Ogg Vorbis, 102 Wave, 102 XMMS, 102 using, 102 mutt KDE, 135 (see email clients)
  • Page 188 peripherals digital cameras, 107 Taskbar, 22 gThumb, 107 KDE, 142 permissions terminal numerical settings, 68 (see shell prompt) setting for new RPMs, 131 terms permissions and ownership, 65 introductory, 6 Printer Notification Icon, 22 The Graphical Desktop, 9 pwd, 51 thumbnail definition, 17 Thunderbird...
  • Page 189: Colophon

    Colophon The manuals are written in DocBook SGML v4.1 format. The HTML and PDF formats are produced using custom DSSSL stylesheets and custom jade wrapper scripts. The DocBook SGML files are written in Emacs with the help of PSGML mode. Garrett LeSage created the admonition graphics (note, tip, important, caution, and warning).
  • Page 190 Nadine Richter — German translations Audrey Simons — French translations Francesco Valente — Italian translations Sarah Wang — Simplified Chinese translations Ben Hung-Pin Wu — Traditional Chinese translations...

This manual is also suitable for:

Enterprise linux 4

Table of Contents