Startup en
Startup en
Startup en
Start-Up
July 01, 2010
Start-Up
Copyright 20062010 Novell, Inc. and contributors. All rights reserved.
Permission is granted to copy, distribute and/or modify this document
under the terms of the GNU Free Documentation License, Version 1.2
or (at your option) version 1.3; with the Invariant Section being this
copyright notice and license. A copy of the license version 1.2 is included in the section entitled GNU Free Documentation License.
SUSE, openSUSE, the openSUSE logo, Novell, the Novell logo,
the N logo, are registered trademarks of Novell, Inc. in the United
States and other countries. Linux* is a registered trademark of Linus
Torvalds. All other third party trademarks are the property of their respective owners. A trademark symbol (, , etc.) denotes a Novell
trademark; an asterisk (*) denotes a third-party trademark.
All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy.
Neither Novell, Inc., SUSE LINUX Products GmbH, the authors, nor the
translators shall be held liable for possible errors or the consequences
thereof.
Contents
vii
Hardware Information .
Setting Up Sound Cards
Setting Up a Printer . .
Setting Up a Scanner .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
3
4
7
7
7
10
11
13
13
14
17
20
23
23
27
29
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
29
29
31
36
39
3.1
3.2
39
42
Installing Software . . . . . . . . . . . . . . . . . . . . .
Removing Software . . . . . . . . . . . . . . . . . . . .
3.3
44
51
4.1
4.2
51
53
Using NetworkManager
5.1
5.2
5.3
5.4
5.5
5.6
5.7
5.8
5.9
5.10
55
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
55
55
56
59
62
64
65
67
68
69
Part II Basics
71
Basic Concepts
73
6.1
6.2
6.3
73
75
81
User Concept . . . . . . . . . . . . . . . . . . . . . . .
The Linux File System . . . . . . . . . . . . . . . . . . .
File Access Permissions . . . . . . . . . . . . . . . . . .
Shell Basics
7.1
7.2
7.3
7.4
7.5
7.6
7.7
7.8
7.9
7.10
7.11
7.12
Starting a Shell . . . . . . . . . . . . . . . . . . . . . .
Entering Commands . . . . . . . . . . . . . . . . . . . .
Working with Files and Directories . . . . . . . . . . . . . .
Becoming Root . . . . . . . . . . . . . . . . . . . . . .
Modifying File Permissions . . . . . . . . . . . . . . . . .
Useful Features of the Shell . . . . . . . . . . . . . . . . .
Editing Texts . . . . . . . . . . . . . . . . . . . . . . .
Searching for Files or Contents . . . . . . . . . . . . . . .
Viewing Text Files . . . . . . . . . . . . . . . . . . . . .
Redirection and Pipes . . . . . . . . . . . . . . . . . . .
Starting Programs and Handling Processes . . . . . . . . .
Important Linux Commands . . . . . . . . . . . . . . . .
85
85
86
89
93
94
96
100
101
102
103
104
106
115
117
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
129
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
GNU Licenses
A.1
A.2
Index
117
119
120
121
121
124
129
132
138
140
145
149
161
161
163
167
1 Available Documentation
We provide HTML and PDF versions of our books in different languages. The following
manuals for users and administrators are available on this product:
Start-Up (page 1)
Guides you through the installation and basic configuration of your system. For
newcomers, the manual also introduces basic Linux concepts such as the file
system, the user concept and access permissions and gives an overview of the
features openSUSE offers to support mobile computing. Provides help and advice
in troubleshooting.
viii
Start-Up
2 Feedback
Several feedback channels are available:
Bugs and Enhancement Requests
To report bugs for a product component, or to submit enhancement requests,
please use https://bugzilla.novell.com/. For documentation bugs, submit a
bug against the component Documentation for the respective product.
If you are new to Bugzilla, you might find the following articles helpful:
http://en.opensuse.org/openSUSE:Submitting_bug_reports
http://en.opensuse.org/openSUSE:Bug_reporting_FAQ
User Comments
We want to hear your comments and suggestions about this manual and the
other documentation included with this product. Use the User Comments feature
at the bottom of each page in the online documentation or go to http://www
.novell.com/documentation/feedback.html and enter your comments there.
3 Documentation Conventions
The following typographical conventions are used in this manual:
/etc/passwd: directory names and filenames
placeholder: replace placeholder with the actual value
PATH: the environment variable PATH
ls, --help: commands, options, and parameters
user: users or groups
[Alt], [Alt] + [F1]: a key to press or a key combination; keys are shown in uppercase as on a keyboard
File, File > Save As: menu items, buttons
Dancing Penguins (Chapter Penguins, Another Manual): This is a reference to
a chapter in another manual.
ix
5 Source Code
The source code of openSUSE is publicly available. To download the source code,
proceed as outlined under http://www.novell.com/products/suselinux/source_code
.html. If requested we send you the source code on a DVD. We need to charge a $15
or 15 fee for creation, handling and postage. To request a DVD of the source code,
send an e-mail to [email protected] [mailto:[email protected]] or mail the request
to:
SUSE Linux Products GmbH
Product Management
openSUSE
Maxfeldstr. 5
D-90409 Nrnberg
Germany
6 Acknowledgments
With a lot of voluntary commitment, the developers of Linux cooperate on a global
scale to promote the development of Linux. We thank them for their effortsthis
distribution would not exist without them. Furthermore, we thank Frank Zappa and
Pawar. Special thanks, of course, goes to Linus Torvalds.
Have a lot of fun!
Your SUSE Team
Start-Up
Choose this medium option for a first look at openSUSE. The LiveCD version runs
on your computer using RAM without touching your hard drive and no installation
is needed. However, you can also install openSUSE from the running live system.
There is no network connection required beyond the mere downloading of the
medium.
TIP: Booting the LiveCD from an USB Stick
Live CD iso images can also be used as boot images for USB sticks. Create a
bootable USB stick by using the command-line program dd with the following
syntax:
dd if=ISO_IMAGE of=USB_STICK_DEVICE bs=4M
dd is available on Linux and MacOS by default. A Microsoft Windows* version
can be downloaded from http://www.chrysocome.net/dd.
Warning: Using this dd command will erase all data on the USB device!
Mini CD
The Mini CD contains the minimal Linux system needed to run the installation.
The installation system itself and the installation data are loaded from a network
source. To install from a network providing SLP, please start the installation as
described in Section 1.2.1, Installing from a Network Server Using SLP (page 6).
To install from a HTTP, FTP, NFS, or SMB server, follow the instructions in Section 1.2.2, Installing from a Network Source without SLP (page 6).
IMPORTANT: Add-On CDsInstalling Additional Software
Although add-on CDs (extensions or third-party products) cannot be used as standalone installation media, they can be embedded as additional software sources
during the installation. Currently CDs with additional languages are available as
add-on CDs for openSUSE.
Start-Up
Boot Options
Boot Option
Description
DVD
This is the easiest boot option. This option can be used if the
system has a local DVD-ROM drive that is supported by Linux.
openSUSE 11.3
Installer
PXE or BOOTP
Hard Disk
Start-Up
Use the function keys indicated in the bar at the bottom of the screen to change the
language, screen resolution, installation source or to add an additional driver from
your hardware vendor:
Start-Up
[F1]Help
Get context-sensitive help for the active element of the boot screen. Use the arrow
keys to navigate, [Enter] to follow a link, and [Esc] to leave the help screen.
[F2]Language
Select the display language and a corresponding keyboard layout for the installation. The default language is English (US).
[F3]Video Mode
Select various graphical display modes for the installation. Select Text Mode if
the graphical installation causes problems.
[F4]Source
Normally, the installation is performed from the inserted installation medium.
Here, select other sources, like FTP or NFS servers. If the installation is deployed
on a network with an SLP server, select an installation source available on the
server with this option. Find information about SLP in Chapter 22, SLP Services
in the Network (Reference).
[F5]Kernel
If you encounter problems with the regular installation, this menu offers to disable
a few potentially problematic functions. If your hardware does not support ACPI
(advanced configuration and power interface) select No ACPI to install without
ACPI support. No local APIC disables support for APIC (Advanced Programmable
Interrupt Controllers) which may cause problems with some hardware. Safe Settings boots the system with the DMA mode (for CD/DVD-ROM drives) and power
management functions disabled.
If you are not sure, try the following options first: InstallationACPI Disabled or
InstallationSafe Settings. Experts can also use the command line (Boot Options)
to enter or change kernel parameters.
[F6]Driver
Press this key to notify the system that you have an optional driver update for
openSUSE. With File or URL, load drivers directly before the installation starts. If
you select Yes, you are prompted to insert the update disk at the appropriate
point in the installation process.
[F7]Arch
If you install from an installation medium supporting 32bit and 64bit architectures
and have a processor with 64-bit support, select whether to install a 64-bit or 32bit system. By default, a 64-bit system is installed on a computer with 64-bit
support. To install a 32-bit system, press [F7] then select 32bit.
TIP: Using IPv6 during the Installation
By default you can only assign IPv4 network addresses to your machine. To enable
IPv6 during installation, enter one of the following parameters at the bootprompt:
ipv6=1 (accept IPv4 and IPv6) or ipv6only=1 (accept IPv6 only).
After starting the installation, openSUSE loads and configures a minimal Linux system
to run the installation procedure. To view the boot messages and copyright notices
during this process, press [Esc]. On completion of this process, the YaST installation
program starts and displays the graphical installer.
TIP: Installation without a Mouse
If the installer does not detect your mouse correctly, use [Tab] for navigation, arrow
keys to scroll, and [Enter] to confirm a selection. Various buttons or selection fields
contain a letter with an underscore. Use [Alt] + [Letter] to select a button or a
selection directly instead of navigating there with the [Tab] button.
1.6 Welcome
Start the installation of openSUSE by choosing your language. Changing the language
will automatically preselect a corresponding keyboard layout. Override this proposal
by selecting a different keyboard layout from the drop-down menu. The language
selected here is also used to assume a time zone for the system clock. This settingalong with the selection of secondary languages to install on your systemcan
be modified later in the Installation Summary, described in Section 1.12, Installation
Settings (page 20). For information about language settings in the installed system,
see Chapter 9, Changing Language and Country Settings with YaST (Reference).
Read the license agreement that is displayed beneath the language and keyboard
selection thoroughly. Use License Translations... to access translations. If you agree
to the terms, click Next to proceed with the installation. If you do not agree to the
license agreement click Abort to terminate the installation.
Figure 1.2
10
Welcome
Start-Up
Installation Mode
11
Check Include Add-On Products from Separate Media to include add-on products
during the installation. An add-on product can include extensions, third-party products
or additional software for your system such as support for additional languages.
Click Next to proceed. If you selected to include an add-on product, proceed with
Section 1.7.1, Add-On Products (page 12), otherwise skip the next section and
advance to Section 1.8, Clock and Time Zone (page 13).
Network Setup
When invoking the network setup, YaST scans for available network cards. If more
than one network card is found, you must choose the card to configure from the list.
If an ethernet network adapter is not already connected, a warning will open. Make
sure the network cable is plugged in and choose Yes, Use It. If your network is
equipped with a DHCP server, choose Automatic Address Setup (via DHCP). To
manually set up the network choose Static Address Setup and specify IP Address,
Netmask, Default Gateway IP, and the DNS Server IP.
Some networks require the use of a proxy server to access the Internet. Tick the
check box Use Proxy for Accessing the Internet and enter the appropriate specifications. Click Accept to perform the network setup. The installation procedure will
12
Start-Up
continue with the add-on products or repositories setup as described in Section 1.7.1,
Add-On Products (page 12).
To set up the clock, choose whether the Hardware Clock is Set to UTC. If you run
another operating system on your machine, such as Microsoft Windows, it is likely
your system uses local time instead. If you only run Linux on your machine, set the
hardware clock to UTC and have the switch from standard time to daylight saving
time performed automatically.
If a network is already configured, the time is automatically synced via Network Time
Protocol (NTP) with a time server. Click Change to either alter the NTP settings or to
Manually set the time. See Chapter 25, Time Synchronization with NTP (Reference)
for more information on configuring the NTP service. When finished, click Accept to
continue the installation.
13
Guide (GNOME User Guide). This step is skipped when installing from a LiveCD,
since this medium is already preconfigured to either use KDE or GNOME.
If you prefer a different desktop, choose Other for more options. The XFCE Desktop
and the LXDE Desktop are fast and lightweight desktop environments suitable for
modest hardware. With Minimal X Window, install a graphical window manager that
allows for running stand-alone X applications and console windows but does not
provide the usual integrated desktop functionality. In Minimal Server Selection (Text
Mode), only console terminals are available.
Figure 1.5
Desktop Selection
14
Start-Up
Figure 1.6
Suggested Partitioning
15
2. Run scandisk.
3. Run defrag.
After these preparations, restart the openSUSE installation. When you turn to the
partitioning setup, proceed as before and select Shrink Windows Partition. After a
quick check of the partition, the dialog for resizing the Windows partition opens.
The bar graph shows how much disk space is currently occupied by Windows and
how much space is still available. To change the proposed settings use the slider or
the input fields to adjust the partition sizing.
Figure 1.7
If you leave this dialog by selecting Next, the settings are stored and you are returned
to the previous dialog. The actual resizing takes place later, before the hard disk is
formatted.
IMPORTANT: Writing on NTFS Partitions
By default, the Windows versions NT, 2000, and XP use the NTFS file system.
openSUSE includes read and write access to the NTFS file system, but this feature
has a few limitations. This means that you cannot read or write encrypted or
compressed files. Furthermore, the Windows file permissions are not honored at
the moment. See http://en.opensuse.org/NTFS for more information.
16
Start-Up
17
18
Start-Up
LDAP
Users are administered centrally on an LDAP server for all systems in the network.
More information is available in Section Configuring an LDAP Client with YaST
(Chapter 4, LDAPA Directory Service, Security Guide).
NIS
Users are administered centrally on an NIS server for all systems in the network.
See Section Configuring NIS Clients (Chapter 3, Using NIS, Security Guide) for
more information.
Windows Domain
SMB authentication is often used in mixed Linux and Windows networks. and
Section Configuring a Linux Client for Active Directory (Chapter 5, Active Directory Support, Security Guide).
Along with user administration via LDAP and NIS, you can use Kerberos authentication.
To use it, select Set Up Kerberos Authentication. For more information on Kerberos,
refer to Chapter 6, Network Authentication with Kerberos (Security Guide).
19
Installation Settings
1.12.1 Partitioning
Review and, if necessary, change the partition setup you configured earlier. Modifying
the partition setup opens the Expert Partitioner described in Section Using the YaST
Partitioner (Chapter 2, Advanced Disk Setup, Reference).
1.12.2 Booting
YaST proposes a boot configuration for your system. Other operating systems found
on your computer, such as Microsoft Windows or other Linux installations, will automatically be detected and added to the boot loader. However, openSUSE will be
booted by default. Normally, you can leave these settings unchanged. If you need a
custom setup, modify the proposal for your system. For information, see Section Con-
20
Start-Up
figuring the Boot Loader with YaST (Chapter 17, The Boot Loader GRUB, Reference).
The boot method should only be changed by experienced users.
1.12.3 Software
openSUSE contains a number of software patterns for various application purposes.
Click Software to start the pattern selection and modify the installation scope according to your needs. Select your pattern from the list and see a pattern description in
the right part of the window. Each pattern contains a number of software packages
needed for specific functions (e.g. Multimedia or Office software). For a more detailed
selection based on software packages to install, select Details to switch to the YaST
Software Manager.
You can also install additional software packages or remove software packages from
your system at any later time with the YaST Software Manager. For more information,
refer to Chapter 3, Installing or Removing Software (Reference).
Figure 1.10
21
1.12.8 System
This dialog presents all the hardware information YaST could obtain about your
computer. When called, the hardware detection routine is started. Depending on
your system, this may take some time. Select any item in the list and click Details
to see detailed information about the selected item. Use Save to File to save a detailed
list to either the local file system or a floppy. Advanced users can also change the
PCI ID setup and Kernel Settings by choosing Kernel Settings.
22
Start-Up
1.12.10 Firewall
By default SuSEfirewall2 is enabled on all configured network interfaces. To globally
disable the firewall for this computer, click on Disable. If the firewall is enabled, you
may Open the SSH port in order to allow remote connections via secure shell.
23
Network Configuration
If you are installing openSUSE on a laptop computer, Interfaces Controlled by NetworkManager is enabled. NetworkManager is a tool that enables automatic connection
with minimal user intervention. It is ideal for WLAN and mobile computing. If you
want to use the traditional method without NetworkManager, click Disable NetworkManager. Find detailed information about NetworkManager in Chapter 5, Using NetworkManager (page 55). If you are installing openSUSE on any other type of machine,
the traditional method without NetworkManager is selected by default. This configuration step also lets you configure the network devices of your system and make
security settings, for example, for a firewall or proxy.
The network can also be configured after the system installation has been completed.
If you skip it now, your system is left offline unable to retrieve any available updates.
To configure your network connection later, select Skip Configuration and click Next.
The following network settings can be configured in this step:
24
Start-Up
25
prerequisite for the automatic addition of the default repositories and for updating
online.
If you have multiple network interfaces, verify that the desired card is used to connect
to the Internet. If not, click Change Device.
To start the test, select Yes, Test Connection to the Internet and click Next. In the
following dialog, view the progress of the test and the results. Detailed information
about the test process is available via View Logs. If the test fails, click Back to return
to the network configuration to correct your entries.
Proceed with Next. If the test was successful, the official software repositories for
openSUSE and the update repository will be configured. Downloading the repository
data for the first time may take some time.
If you do not want to test the connection at this point, select No, Skip This Test then
Next. This also skips downloading the release notes, and updating online. These
steps can be performed any time after the system has been initially configured.
Online Update
If an Internet connection has been established, and updates are available, select
whether to perform a YaST online update. If there are any patched packages available
on the servers, download and install them now to fix known bugs or security issues.
For detailed instructions see Chapter 4, YaST Online Update (Reference). Directives
on how to perform an online update in the installed system are available at Section 3.3, Keeping the System Up-to-date (page 44) or Chapter 4, YaST Online Update
(Reference). This step is skipped if no updates are available or no Internet connection
has been established. Patches fixing security issues and recommended patches applying to your installation are automatically preselected. Click Accept to install them
and Next to proceed with the system configuration.
IMPORTANT: Downloading Software Updates
The download of updates might take quite some time, depending on the bandwidth
of the Internet connection and the size of the update files. In case the patch system
itself is updated, the online update will restart and download more patches after
the restart. If the kernel was updated, the system will reboot before completing
the configuration.
26
Start-Up
Release Notes
After completing the user authentication setup, YaST displays the release notes.
Reading them is recommended, because they contain important up-to-date information which was not available when the manuals were printed. If you successfully
tested the Internet connection, read the most recent version of the release notes,
as fetched from openSUSE's servers. Use Miscellaneous > Release Notes in YaST or
start the SUSE Help Center to view the release notes after installation.
Hardware Configuration
At the end of the installation, YaST opens a dialog for the configuration of a printer,
the sound system and TV cards. Click the individual components to start the hardware
configuration. For the most part, YaST detects and configures the devices automatically.
You can skip any peripheral devices and configure them later, as described in
Chapter 2, Setting Up Hardware Components with YaST (page 29). To skip the configuration, select Skip Configuration and click Next.
TIP: Resetting Hardware Configuration to the Default Values
You can cancel any changes to the hardware configuration by clicking Change >
Reset to Defaults. YaST then shows the original proposal again.
Installation Completed
After a successful installation, YaST shows the Installation Completed dialog. In this
dialog, select whether to clone your newly installed system for AutoYaST. To clone
your system, select Clone This System for AutoYaST. The profile of the current system
is stored in /root/autoyast.xml.
AutoYaST is a system for installing one or more openSUSE systems automatically
without user intervention. AutoYaST installations are performed using a control file
with installation and configuration data. Finish the installation of openSUSE with
Finish in the final dialog.
27
the GNOME User Guide (GNOME User Guide). These manuals can be accessed via
the Help function in both KDE and GNOME.
28
Start-Up
29
The dialog shows all sound cards that are already configured.
If YaST cannot detect your sound card automatically, configure it manually as described in Procedure 2.1, Configuring a New Sound Card (page 30). For this, you
need to know your sound card vendor and model. If in doubt, refer to your sound
card documentation for the required information. During configuration, you can
choose between various setup options:
Quick Automatic Setup
You are not required to go through any of the further configuration stepsthe
sound card is configured automatically. You can set the volume or any options
you want to change later.
Normal Setup
Allows you to adjust the output volume and play a test sound during the configuration.
Advanced setup with possibility to change options
For experts only. Allows you to customize all parameters of the sound card.
IMPORTANT: Advanced Configuration
Only use this option if you know exactly what your are doing. Otherwise leave
the parameters untouched and use the normal or the automatic setup options.
Procedure 2.1
30
Start-Up
6 To remove a sound card configuration that you no longer need, select the
respective entry and click Delete.
7 Click OK to save the changes and leave the YaST sound module.
Procedure 2.2
31
It is also possible to share printers over the network. Further information about
printing (general information, technical details, and troubleshooting) is available in
Chapter 11, Printer Operation (Reference).
In YaST, click Hardware > Printer to start the printer module. By default it opens in
the Printer Configurations view, displaying a list of all printers that are available and
configured. This is especially useful when having access to a lot of printers via the
network. From here you can also Print a Test Page and configure local printers.
32
Start-Up
33
4 Enter the full path to the PPD file into the input box under Make a Printer
Description File Available or choose the file from a dialog box by clicking
on Browse
5 Click OK to return to the Add New Printer Configuration screen.
6 In order to directly use this PPD file, proceed as described in Procedure 2.3,
Adding a New Local Printer (page 32). Otherwise, click Cancel.
Using CUPS
In a Linux environment CUPS is usually used to print via the network. The simplest
setup is to only print via a single CUPS server which can directly be accessed by all
clients. Printing via more than one CUPS server requires a running local CUPS daemon
that communicates with the remote CUPS servers.
34
Start-Up
Procedure 2.6
35
Procedure 2.8
Sharing Printers
1 Connect your USB or SCSI scanner to your computer and turn it on.
2 Start YaST and select Hardware > Scanner. YaST builds the scanner database
and tries to detect your scanner model automatically.
If a USB or SCSI scanner is not properly detected, try Other > Restart Detection.
3 To activate the scanner select it from the list of detected scanners and click
Edit.
4 Choose your model form the list and click Next and Finish.
5 Use Other > Test to make sure you have chosen the correct driver.
36
Start-Up
37
4 Leave with OK. The network scanner is now listed in the Scanner Configuration
window and is ready to use.
38
Start-Up
1 Start YaST and click Software > Software Management to start the package
manager.
2 Enter the name of the software you want to install in the search field (for example, jhead, a tool for manipulating JPEG meta data) and press [Enter].
If you do not now the package name of the desired software, the RPM Groups
view may help. The software packages are sorted by functionality in this view.
jhead, for example, can be found under Productivity > Graphics.
3 The packages found are listed in the right pane. Select a package for installation by right clicking it and choosing Install. If this option is not available, the
package is either already installed or marked as taboo. The package status
is indicated by the symbol in front of the package namehit [Shift] + [F1] for
help.
4 In order to select more packages, repeat the steps mentioned above. Once
you are finished click Accept to start the installation.
5 Certain packages are dependent on other packages, such as shared libraries.
YaST automatically resolves these dependencies. In this case, a list of additional packages that have automatically been chosen for installation is presented. Accept them by clicking Continue.
39
On the other hand, some packages cannot co-exist with others on the system.
In this case a list of packages that have automatically been chosen for deletion
is presented. Accept them by clicking Continue.
If your choice results in a dependency conflict that cannot be automatically
solved, you need to manually solve these conflicts as described in Section Checking Software Dependencies (Chapter 3, Installing or Removing
Software, Reference).
6 Once all selected packages are installed, the YaST package manager automatically terminates.
Procedure 3.2
1 Start YaST and click Software > Software Management to start the package
manager.
2 From the grouping menu in the upper left corner, select Groups. Choose All
Packages from the left pane. Enter the name of the software you want to install
in the search field (for example, jhead, a tool for manipulating JPEG meta data).
3 Right-click the package you want to install in the main pane and click Install.
4 In order to select more packages, repeat the previous steps. Once you are
finished click Apply twice to start the installation.
5 Certain packages are dependent on other packages, such as shared libraries.
YaST automatically resolves these dependencies. In this case, a list of additional packages that have automatically been chosen for installation is presented in the Summary Of Changes window. Accept them by clicking Apply.
On the other hand, some packages cannot co-exist with others on the system.
In this case a list of packages that have automatically been chosen for deletion
is presented. Accept them by clicking Apply.
If your choice results in a dependency conflict that cannot be automatically
solved, you will need to manually solve these conflicts as described in Section Checking Software Dependencies (Chapter 3, Installing or Removing
Software, Reference).
You can also install software patterns. Patterns are a set of packages consisting of
tools for a specific task; for example, there is a pattern for Technical Writing that
consists of XML tools, special editors, the LaTeX environment, and more. To install
a pattern, proceed as follows (if you have KDE runningfor GNOME see below):
Procedure 3.3
1 Start YaST and click Software > Software Management to start the YaST
package manager.
40
Start-Up
2 From the View button in the upper left corner, select Patterns. Now you see
various pattern sets listed in the left pane.
3 Click on a pattern name for a list of all packages included in the pattern.
Choose one or more patterns for installation by clicking the checkbox on front
of the pattern's name.
4 Click Accept to proceed.
5 Confirm the automatic changes that were made to resolve dependencies with
Continue.
Procedure 3.4
1 Start YaST and click Software > Software Management to start the package
manager.
2 From the grouping menu in the upper left corner, select Patterns. Now you
see various pattern sets listed in the left pane.
41
3 Clicking on a pattern's name, for example on Technical Writing, opens the list
of packages it contains in the right pane. To install the pattern, right-click on
the pattern's name and choose Install. Add or deselect single packages in the
right pane.
4 Click Apply to install the listed packages.
1 Start YaST and click Software > Software Management to start the package
manager.
2 Search for single packages as described in Section 3.1, Installing Software
(page 39).
3 Mark packages for deletion by right-clicking them and choosing Delete.
4 Click Accept to proceed.
5 If you have chosen to delete a package on which other packages are dependent, your choice results in a dependency conflict that cannot be automatically
solved. In this case, it is recommended to not delete the package. You can
try to manually solve this conflict as described in Section Checking Software
Dependencies (Chapter 3, Installing or Removing Software, Reference), but
42
Start-Up
be aware that each change you make may lead to other conflicts. To discard
all changes you made, click Cancel two times and then Abandon.
With GNOME running, proceed as follows:
1 Start YaST and click Software > Software Management to start the package
manager.
2 From the grouping menu in the upper left corner, select Groups. From the left
pane choose All Packages from the top list and Installed from the bottom list.
Search for single packages as described in Section 3.1, Installing Software
(page 39).
3 Right-click the package you want to remove in the main pane and click Remove.
4 In order to select more packages, repeat the previous steps. Once you are
finished click Apply to start the removal.
5 If you have chosen to delete a package on which other packages are dependent, your choice results in a dependency conflict that cannot be automatically
solved. In this case, it is recommended to not delete the package. You can
try to manually solve this conflict as described in Section Checking Software
Dependencies (Chapter 3, Installing or Removing Software, Reference), but
be aware that each change you make may lead to other conflicts. To discard
all changes you made, click Undo in the bottom status line.
43
44
Start-Up
Installing Patches
The Online Update Applet offers two modes for installing patches: the simple installation mode will automatically install all security and recommended patches, while
the detailed mode lets you choose which patches to install.
Procedure 3.6
Procedure 3.7
45
Start-Up
availability of updates, click on the icon to launch the software installation window.
Click on Details and then on the Upgrade tab to open the list with new software
versions. Either select single packages by activating the box in front of an entry, or
click Select All Packages. Install starts the installation of the selected software
packages. You will be prompted for the root password. See the system tray for status
messages and a progress meter.
NOTE: The YaST Online Update
The YaST Online Update offers advanced features to customize the installation of
software updates. Please refer to Chapter 4, YaST Online Update (Reference)
for more information.
47
48
Start-Up
You will be prompted for the root password after having proceeded with Install Updates. The update applet performs the installation of the software updates. After
having finished the installation, choose whether to Install More Updates or Close the
Software Update applet.
NOTE: The YaST Online Update
The YaST Online Update offers advanced features to customize the installation of
software updates. Please refer to Chapter 4, YaST Online Update (Reference)
for more information.
49
50
Start-Up
51
connecting). Regardless whether you choose an ISP from the list or add a custom
provider, you need to enter at least your login and password.
For configuration details, refer to Section DSL (Chapter 21, Basic Networking,
Reference).
Start-Up
53
5 Using NetworkManager
NetworkManager is the ideal solution for laptops and other portable computers. It
supports state-of-the-art encryption types and standards for network connections,
including connections to 802.1X protected networks. 802.1X is the IEEE Standard
for Local and Metropolitan Area NetworksPort-Based Network Access Control. With
NetworkManager, you do not need to worry about configuring network interfaces
and switching between wired or wireless networks when you are moving. NetworkManager can automatically connect to known wireless networks or manage several
network connections in parallelthe fastest connection is then used as default. Furthermore, you can manually switch between available networks and manage your
network connection using an applet in the system tray.
Instead of only one connection being active, multiple connections may be active at
once. This enables you to unplug your laptop from an Ethernet and remain connected
via a wireless connection.
Using NetworkManager
55
5 After choosing the method for managing network connections, set up your
network card using automatic configuration via DHCP or a static IP address
or configure your modem (for dial-up connections, use Network Devices >
Modem). To configure an internal or USB ISDN modem, select Network Devices
> ISDN. To configure an internal or USB DSL modem, select Network Devices
> DSL.
Find a detailed description of the network configuration with YaST in Section Configuring a Network Connection with YaST (Chapter 21, Basic Networking, Reference) and Chapter 32, Wireless LAN (Reference).
After having enabled NetworkManager, configure your network connections with the
NetworkManager as described in Section 5.3, Configuring Network Connections
(page 56).
If you want to deactivate NetworkManager and control network the traditional way,
choose the Traditional Method with ifup option in the Network Setup Method field.
56
Start-Up
Figure 5.1
If you use KDE, open the main menu and click Configure Desktop. In the Personal
Settings then select Network Settings on the General tab to open the network configuration dialog.
Figure 5.2
Alternatively, you can also start the configuration dialogs from the NetworkManager
applet in the system tray. In KDE, left-click the icon and select Manage Connections.
In GNOME, right-click the icon and select Edit Connections.
NOTE: Availability of Options
Depending on your system set-up, you may not be allowed to configure connections. In a secured environment, some options might be locked or require root
permission. Ask your system administrator for details.
Using NetworkManager
57
Procedure 5.1
When configuring network connections with NetworkManager, you can also define
system connections that can be shared by all users. In contrast to user connections,
system connections are made available right after NetworkManager is startedbefore any users log in. For more details about both types of connections, refer to
Section 5.7.1, User and System Connections (page 66).
Currently, the system connection option is not available in KNetworkManager. To
set up system connections, you need to use YaST in this case.
NOTE: Hidden Networks
To connect to a hidden network (a network that does not broadcast its service)
you have to know the Service Set Identifier or Extended Service Set Identifier
(SSID or ESSID) of the network because it cannot be detected automatically.
1 To add a new connection, click the tab for the connection type you want to
use and click Add.
2 Enter a Connection Name and your connection details.
3 For a hidden network, enter the (E)SSID and in the Wireless Security tab the
encryption parameters.
4 You can tie the connection to a certain device, if more than one physical device
per connection type is available (for example, your machine is equipped with
two ethernet cards or two wireless cards).
If you use KDE, do so by using the Restrict to Interface option. If you use
GNOME, enter the MAC address of the device you want to tie the connection
to and confirm your settings.
5 If you want NetworkManager to automatically use a certain connection, activate
Connect Automatically for this connection.
6 To turn a connection into a system connection activate Available to all users
(GNOME). To create and edit system connections, root permission is required.
After having confirmed your changes, the newly configured network connection appears in the list of available networks you get by left-clicking the NetworkManager
applet.
58
Start-Up
Figure 5.3
Using NetworkManager
59
1 Left-click the applet icon and select Wireless 802.11 (Create Network Connection). KNetworkManager shows a list of available visible wireless networks,
including details about signal strength and security.
2 To connect to a visible network, select the network from the list and click
Connect. If the network is encrypted, a dialog opens. Choose the type of Security the network uses and enter the appropriate credentials.
3 To connect to a network that does not broadcast its service set identifier
((E)SSID) and therefore cannot be detected automatically, select Connect to
Other Network.
4 In the dialog that opens, enter the ESSID and set encryption parameters, if
necessary.
5 Confirm your changes and click OK. NetworkManager now activates the new
connection.
6 To terminate a connection and to disable wireless networking, click the applet
icon and uncheck Enable Wireless. This can be useful if you are on a plane or
in any other environment where wireless networking is not allowed.
A wireless network that has been chosen explicitly will remain connected as long as
possible. If a network cable is plugged in during that time, any connections that have
been set to Connect Automatically will be connected, while the wireless connection
remains up.
60
Start-Up
Using NetworkManager
61
Procedure 5.2
As KNetworkManager can keep multiple connections active at once, you might wish
to be informed about the connection status for several connections at one glance.
You can do so by using multiple NetworkManager icons in your system tray, each
representing a different group of connection types (for example, one icon for wired
connections, another icon for wireless connections).
1 In the configuration dialog, switch to the Tray Icon tab.
2 Click More Icons. A new icon entry appears in the list.
3 Select the network connection types you want to be represented by this icon
and group them under the respective icon.
62
Start-Up
If your system tray does not show any network connection icon, the applet is probably
not started. Press [Alt] + [F2] and enter nm-applet to start it manually.
Using NetworkManager
63
2 Enter a Network Name and set the encryption to use with the Wireless Security drop-down list.
IMPORTANT: Unprotected Wireless Networks Are a Security Risk
If you set Wireless Security to None, everybody can connect to your network,
reuse your connectivity and intercept your network connection. To restrict
access to your access point and to secure your connection, use encryption.
You can choose between various WEP and WPAbased encryptions. If you
are not sure which technology is best for you, read Section Authentication
(Chapter 32, Wireless LAN, Reference).
Start-Up
NetworkManager-novellvpn-kde4 or NetworkManager-novellvpn-gnome.
NovellVPN support for KDE is not available yet, but is currently being worked on.
OpenVPN
To use this VPN technology, install
NetworkManager-openvpn and
NetworkManager-openvpn-kde4 or NetworkManager-openvpn-gnome.
vpnc (Cisco)
To use this VPN technology, install
NetworkManager-vpnc and
NetworkManager-vpnc-kde4 or NetworkManager-vpnc-gnome.
PPTP (Point-to-Point Tunneling Protocol)
To use this VPN technology, install
NetworkManager-pptp and
NetworkManager-pptp-kde4 or NetworkManager-pptp-gnome.
After you have installed the packages, configure your VPN connection as described
in Section 5.3, Configuring Network Connections (page 56).
Using NetworkManager
65
66
Start-Up
Using NetworkManager
67
down list, choose Shared. That will enable IP traffic forwarding and run a DHCP
server on the device. Confirm your changes in NetworkManager.
2. As the DCHP server uses port 67, make sure that it is not blocked by the firewall:
On the machine sharing the connections, start YaST and select Security and
Users > Firewall. Switch to the Allowed Services category. If DCHP Server is
not already shown as Allowed Service, select DCHP Server from Services to
Allow and click Add. Confirm your changes in YaST.
How to provide static DNS information with automatic (DHCP, PPP, VPN) addresses?
In case a DHCP server provides invalid DNS information (and/or routes), you can
override it. Start the dialog for configuring network connections from the GNOME
Control Center with System > Network Configurations or in KDE 4 from the Personal Settings with Advanced > Network Settings. Choose the connection you
want to modify and click Edit. If you are using GNOME, switch to the IPv4 Settings
tab, and from the Method drop-down list, choose Automatic (DHCP) addresses
only. If you are using KDE, switch to the IP Address tab, and from the Configure
drop-down list, choose Automatic (DHCP) addresses only. Enter the DNS information in the DNS Servers and Search Domains fields. From the drop-down list at
the bottom of the tab, select Routes if you want to Ignore automatically obtained
routes. Confirm your changes.
How to make NetworkManager connect to password protected networks before a
user logs in?
Define a system connection that can be used for such purposes. For more information, refer to Section 5.7, NetworkManager and Security (page 65).
5.9 Troubleshooting
Connection problems can occur. Some common problems related to NetworkManager
include the applet not starting or a missing VPN option. Methods for resolving and
preventing these problems depend on the tool used.
NetworkManager Desktop Applet Does Not Start
The GNOME and KDE NetworkManager applets start automatically if the network
is set up for NetworkManager control. If the applet does not start, check if NetworkManager is enabled in YaST as described in Section 5.2, Enabling NetworkManager (page 55). Then make sure that the appropriate package for your
desktop environment is also installed. If you are using KDE 4, the package is
NetworkManager-kde4. For GNOME users the package is NetworkManager-gnome.
If the desktop applet is installed but is not running for some reason, start it
manually with the command nm-applet (GNOME) or knetworkmanager (KDE).
NetworkManager Applet Does Not Include the VPN Option
Support for NetworkManager, applets, and VPN for NetworkManager is distributed
in separate packages. If your NetworkManager applet does not include the VPN
option, check if the packages with NetworkManager support for your VPN technol-
68
Start-Up
ogy are installed. For more information, see Section 5.6, NetworkManager and
VPN (page 64).
No Network Connection Available
If you have configured your network connection correctly and all other components
for the network connection (router, etc.) are also up and running, it sometimes
helps to restart the network interfaces on your computer. To do so, log in to a
command line as root and run rcnetwork restart.
Using NetworkManager
69
6 Basic Concepts
If this is your first encounter with a Linux system you probably want to learn something
about the basic concepts of Linux before getting started. The graphical user interfaces
of Linux, Mac OS* and Windows* show rather similar desktop components, which
makes it easy to move from one graphical environment to the next. However, if you
take a look at the underlying system you will soon notice some differences.
The following sections are meant to guide you through the first steps with your Linux
system and to help Linux newbies to familiarize themselves in their new operating
system. You will learn about the user concept of Linux, the structure of the Linux file
system (where to find what in the directory tree) and how to deal with access permissions for files and directories, which are an essential feature in Linux.
Users who have been working with Mac OS will probably recognize that the concepts
explained in the following sections are rather similar to what they know already from
Mac OS. Windows users may realize some crucial differences which are worth noticing.
Basic Concepts
73
For your daily work, you usually log in to your system as normal user. Performing
some administrative tasks or running certain programs such as YaST requires root
permissions. You can easily switch from your normal account to root and back to
your normal user account after accomplishing the administrative task. How to do so
in a shell is described in Section 7.4, Becoming Root (page 93). If you are working
with a graphical user interface you are usually prompted to enter the root password
when necessary. Closing the application which required root permissions results in
withdrawal of the root privileges: you automatically switch back to your normal user
account.
While this concept might not look very appealing at first, it adds to security. A user
without root privileges cannot damage the entire system. Any damage caused is
strictly limited to the user's own account and data. Any operation executed with root
privileges may potentially harm the entire system. Anyone intending to harm a running
Linux system must gain root privileges first. This is why it is much harder to create
viruses for Linux systems. They must overcome the root barrier first.
6.1.2 Groups
Every user in a Linux system belongs at least to one group. A group, in this case,
can be defined as a set of connected users with certain collective privileges. Groups
are usually defined according to functional roles or the data and resources the
members of the group need to access. When a new user account is created on your
system, the user is usually assigned to a default, primary group. The system administrator can change this primary group or assign the user to an additional group, if
necessary.
Figure 6.1
74
Start-Up
75
on a partition or a device unless it is mounted. But don't worry most of the time
you do not have to mount partitions or devices manually. During the installation
of your system, you can define partitions to be mounted automatically when the
system is started. Removable devices are usually also detected and mounted
automatically by your system. The desktop environments such as KDE or GNOME
will inform you about the appearance of a new device.
Figure 6.2
76
Start-Up
Figure 6.3
Hidden Files
Similar to Windows, Linux also distinguishes between normal files and hidden
files which are often configuration files that you usually do not want to access or
see as a normal user. In Linux, hidden files are indicated by a dot in front (for
example, .hiddenfile). In order to access hidden files you can switch view in the
file managers as described in Section Using Dolphin File Manager (Chapter 2,
Working with Your Desktop, KDE User Guide) or use a certain command in the
shell as described in Section 7.2.2, Using Commands with Options (page 87).
File System Permissions
Because Linux is a multiuser system, every file in a Linux file system belongs to
a user and a group. Only the owner of a file or directory (or, of course, root) can
grant other users access permission to it. Linux basically distinguishes between
three different types of access permissions: write permission, read permission
and execute permission. You can only access a file or a folder if you have at least
read permission to it. There are several ways to change the access permissions
of files and folders: either traditionally via the shell or with the help of your
desktop's file manager. If you have root privileges, you can also change the
owner and the group of a file or folder. Read how to do so in a shell in Section 7.5,
Modifying File Permissions (page 94).
For more detailed information about file system permissions refer to Section 6.3,
File Access Permissions (page 81). Apart from the traditional permission concept
for file system objects there are also extensions available which handle permissions more flexibly. Read more in Chapter 10, Access Control Lists in Linux
(Security Guide).
Basic Concepts
77
Directory
Contents
/bin
/boot
/dev
/etc
/home
/lib
/media
/mnt
/opt
/root
/sbin
/srv
/tmp
Temporary files.
78
Start-Up
Directory
Contents
/usr
/var
/windows
The following list provides more detailed information and gives some examples of
which files and subdirectories can be found in the directories:
/bin
Contains the basic shell commands that may be used both by root and by other
users. These commands include ls, mkdir, cp, mv, rm and rmdir. /bin also contains
Bash, the default shell in openSUSE.
/boot
Contains data required for booting, such as the boot loader, the kernel, and other
data that is used before the kernel begins executing user-mode programs.
/dev
Holds device files that represent hardware components.
/etc
Contains local configuration files that control the operation of programs like the
X Window System. The /etc/init.d subdirectory contains scripts that are executed
during the boot process.
/home/username
Holds the private data of every user who has an account on the system. The files
located here can only be modified by their owner or by the system administrator.
By default, your e-mail directory and personal desktop configuration are located
here in the form of hidden files and directories. KDE users find the personal configuration data for their desktop in .kde4 and GNOME users find it in .gconf. For
information about hidden files, refer to Section 6.2.1, Key Features (page 75).
NOTE: Home Directory in a Network Environment
If you are working in a network environment, your home directory may be
mapped to a directory in the file system other than /home.
/lib
Contains the essential shared libraries needed to boot the system and to run the
commands in the root file system. The Windows equivalent for shared libraries
are DLL files.
Basic Concepts
79
/media
Contains mount points for removable media, such as CD-ROMs, USB sticks and
digital cameras (if they use USB). /media generally holds any type of drive except
the hard drive of your system. As soon as your removable medium has been inserted or connected to the system and has been mounted, you can access it from
here.
/mnt
This directory provides a mount point for a temporarily mounted file system. root
may mount file systems here.
/opt
Reserved for the installation of third-party software. Optional software and larger
add-on program packages can be found here.
/root
Home directory for the root user. The personal data of root is located here.
/sbin
As the s indicates, this directory holds utilities for the superuser. /sbin contains
the binaries essential for booting, restoring and recovering the system in addition
to the binaries in /bin.
/srv
Holds data for services provided by the system, such as FTP and HTTP.
/tmp
This directory is used by programs that require temporary storage of files.
IMPORTANT: Cleaning up /tmp at Boot Time
Data stored in /tmp are not guaranteed to survive a system reboot. It, for example, depends on settings in /etc/sysconfig/cron.
/usr
/usr has nothing to do with users, but is the acronym for UNIX system resources.
The data in /usr is static, read-only data that can be shared among various hosts
compliant with the Filesystem Hierarchy Standard (FHS). This directory contains
all application programs and establishes a secondary hierarchy in the file system.
KDE4 and GNOME are also located here. /usr holds a number of subdirectories,
such as /usr/bin, /usr/sbin, /usr/local, and /usr/share/doc.
/usr/bin
Contains generally accessible programs.
/usr/sbin
Contains system daemons and programs reserved for the system administrator
that are not essential for booting the system.
80
Start-Up
/usr/local
In this directory the system administrator can install local, distribution-independent
extensions.
/usr/share/doc
Holds various documentation files and the release notes for your system. In the
manual subdirectory find an online version of this manual. If more than one language is installed, this directory may contain versions of the manuals for different
languages.
Under packages find the documentation included in the software packages installed
on your system. For every package, a subdirectory /usr/share/doc/
packages/packagename is created that often holds README files for the package
and sometimes examples, configuration files or additional scripts.
If HOWTOs are installed on your system /usr/share/doc also holds the howto
subdirectory in which to find additional documentation on many tasks related to
the setup and operation of Linux software.
/var
Whereas /usr holds static, read-only data, /var is for data which is written during
system operation and thus is variable data, such as log files or spooling data. For
an overview of the most important log files you can find under /var/log/, refer
to Table 9.1, Log Files (page 129).
/windows
Only available if you have both Microsoft Windows and Linux installed on your
system. Contains the Windows data available on the Windows partition of your
system. Whether you can edit the data in this directory depends on the file system
your Windows partition uses. If it is FAT32, you can open and edit the files in this
directory. For NTFS, openSUSE also includes write access support. However, the
driver for the NTFS-3g file system has limited functionality. Learn more in Section Accessing Files on Different OS on the Same Computer (Chapter 34,
Copying and Sharing Files, Reference).
81
The following example shows the output of an ls -l command in a shell. This command lists the contents of a directory and shows the details for each file and folder
in that directory.
Example 6.1 Access Permissions For Files and Folders
-rw-r-----rw-r--r--rw-rw----rw-r--r--rw-r--r-drwxr-xr-x
-r-xr-xr-x
1
1
1
1
1
2
1
tux
tux
tux
tux
tux
tux
tux
users
0
users 53279
users
0
users 70733
users 47896
users
48
users 624398
2006-06-23
2006-06-21
2006-06-23
2006-06-21
2006-06-21
2006-06-23
2006-06-23
16:08
13:16
16:08
09:35
09:46
16:09
15:43
checklist.txt
gnome_quick.xml
index.htm
kde-start.xml
kde_quick.xml
local
tux.jpg
As shown in the third column, all objects belong to user tux. They are assigned to
the group users which is the primary group the user tux belongs to. To retrieve the
access permissions the first column of the list must be examined more closely. Let's
have a look at the file kde-start.xml:
82
Start-Up
Type
User Permissions
Group Permissions
rw-
r--
r--
The first column of the list consists of one leading character followed by nine characters grouped in three blocks. The leading character indicates the file type of the object:
in this case, the hyphen () shows that kde-start.xml is a file. If you find the character
d instead, this shows that the object is a directory, like local in Example 6.1, Access
Permissions For Files and Folders (page 82).
The next three blocks show the access permissions for the owner, the group and
other users (from left to right). Each block follows the same pattern: the first position
shows read permissions (r), the next position shows write permissions (w), the last
one shows execute permission (x). A lack of either permission is indicated by -. In
our example, the owner of kde-start.xml has read and write access to the file but
cannot execute it. The users group can read the file but cannot write or execute it.
The same holds true for the other users as shown in the third block of characters.
Access
Permission
File
Folder
Read (r)
Write
(w)
Basic Concepts
83
Access
Permission
File
Folder
Users can change into the directory and execute files there. If
they do not have read access to
that directory they cannot list
the files but can access them
nevertheless if they know of
their existence.
Note that access to a certain file is always dependent on the correct combination of
access permissions for the file itself and the directory it is located in.
84
Start-Up
7 Shell Basics
When working with Linux these days, you can communicate with the system almost
without ever requiring a command line interpreter (the shell). After booting your
Linux system, you are usually directed to a graphical user interface that guides you
through the login process and the following interactions with the operating system.
The graphical user interface in Linux (the X Window System or X11) is initially configured during installation. Both KDE and GNOME desktop (and other window managers
you can install) use it for interaction with the user.
Nevertheless, it is useful to have some basic knowledge of working with a shell because you might encounter situations where the graphical user interface is not
available. For example, if some problem with the X Window System occurs. If you
are not familiar with a shell, you might feel a bit uncomfortable at first when entering
commands, but the more you get used to it, the more you will realize that the command line is often the quickest and easiest way to perform some daily tasks.
For UNIX or Linux several shells are available which differ slightly in behavior and in
the commands they accept. The default shell in openSUSE is Bash (GNU BourneAgain Shell).
The following sections will guide you through your first steps with the Bash shell and
will show you how to complete some basic tasks via the command line. If you are
interested in learning more or rather feel like a shell power user already, refer to
Chapter 20, Bash and Bash Scripts (Reference).
Shell Basics
85
word and press [Enter]. The prompt now changes and shows some useful information
as in the following example:
tux@linux:~>
Your login.
The hostname of your computer.
Path to the current directory. Directly after login, the current directory usually is
your home directory, indicated by the ~ symbol (tilde) .
When you are logged in at a remote computer the information provided by the prompt
always shows you which system you are currently working on.
When the cursor is located behind this prompt, you can pass commands directly to
your computer system. For example, you can now enter ls -l to list the contents of
the current directory in a detailed format. If this is enough for your first encounter
with the shell and you want to go back to the graphical user interface, you should
log out from your shell session first. To do so, type exit and press [Enter]. Then press
[Alt] + [F7] to switch back to the graphical user interface. You will find your desktop
and the applications running on it unchanged.
When you are already logged in to the GNOME or the KDE desktop and want to start
a terminal window within the desktop, press [Alt] + [F2] and enter konsole (for KDE)
or gnome-terminal (for GNOME). This opens a terminal window on your desktop. As
you are already logged in to your desktop, the prompt shows information about your
system as described above. You can now enter commands and execute tasks just
like in any shell which runs parallel to your desktop. To switch to another application
on the desktop just click on the corresponding application window or select it from
the taskbar of your panel. To close the terminal window press [Alt] + [F4].
86
Start-Up
Also keep this in mind for commands to delete objects. Before entering a command
like rm (without any option) for removing a file, you should know if you really want
to get rid of the object: it will be deleted irretrievably, without confirmation.
48
53279
280
70733
47896
2006-06-23
2006-06-21
2006-06-23
2006-06-21
2006-06-21
16:08
13:16
16:08
09:35
09:46
bin
Desktop
Documents
public_html
tux.txt
Shell Basics
87
Start-Up
(for example, info ls). You can browse an info page with a viewer directly in the
shell and display the different sections, called nodes. Use [Space] to move forward and [<] to move backwards. Within a node, you can also browse with
[Page ] and [Page ] but only [Space] and [<] will take you also to the previous
or subsequent node. Like for the man pages, press [Q] to end the viewing mode.
Note that man pages and info pages do not exist for all commands. Sometimes both
are available (usually for key commands), sometimes only a man page or an info
page exists, and sometimes neither of them are available.
Function
[Ctrl] + [L]
[Ctrl] + [C]
[Shift] + [Page ]
Scrolls upwards.
[Shift] + [Page ]
Scrolls downwards.
[Ctrl] + [U]
[Ctrl] + [K]
[Ctrl] + [D]
[], []
Shell Basics
89
Relative Path
Enter a path to the relevant file or directory by using the current directory as a
starting point. This implies to give the levels you have to move up or down in the
file system tree to reach the target directory of file, starting from the current directory.
Paths contain filenames, directories or both, separated by slashes. Absolute paths
always start with a slash. Relative paths do not have a slash at the beginning, but
can have one or two dots.
When entering commands, you can choose either way to specify a path, depending
on your preferences or the amount of typing, both will lead to the same result. To
change directories, use the cd command and specify the path to the directory.
NOTE: Handling Blanks in Filenames or Directory Names
If a filename or the name of a directory contains a space, either escape the space
using a back slash (\) in front of the blank or enclose the filename in single quotes.
Otherwise Bash interprets a filename like My Documents as the names of two files
or directories, My and Documents in this case.
When specifying paths, the following shortcuts can save you a lot of typing:
The tilde symbol (~) is a shortcut for home directories. For example, to list the
contents of your home directory, use ls ~. To list the contents of another user's
home directory, enter ls ~username (or course, this will only work if you have
permission to view the contents, see Section 6.3, File Access Permissions
(page 81)). For example, entering ls ~tux would list the contents of the home
directory of a user named tux. You can use the tilde symbol as shortcut for home
directories also if you are working in a network environment where your home
directory may not be called /home but can be mapped to any directory in the
file system.
From anywhere in the file system, you can reach your home directory by entering
cd ~ or by simply entering cd without any options.
When using relative paths, refer to the current directory with a dot (.). This is
mainly useful for commands such as cp or mv by which you can copy or move
files and directories.
The next higher level in the tree is represented by two dots (..). In order to
switch to the parent directory of your current directory, enter cd .., to go up
two levels from the current directory enter cd ../.. etc.
To apply your knowledge, find some examples below. They address basic tasks you
may want to execute with files or folders using Bash.
90
Start-Up
/tmp/test
mkdir stands for make directory. This command creates a new directory
named test in the /tmp directory. In this case, you are using an absolute path
to create the test directory.
2 To check what happened, now enter
ls -l /tmp
The new directory test should appear in the list of contents of the /tmp directory.
3 Switch to the newly created directory with
cd /tmp/test
Procedure 7.2
Now create a new file in a subdirectory of your home directory and copy it to /tmp/
test. Use a relative path for this task.
IMPORTANT: Overwriting of Existing Files
Before copying, moving or renaming a file, check if your target directory already
contains a file with the same name. If yes, consider changing one of the filenames
or use cp or mv with options like -i, which will prompt before overwriting an existing file. Otherwise Bash will overwrite the existing file without confirmation.
1 To list the contents of your home directory, enter
ls -l ~
It should contain a subdirectory called Documents by default. If not, create this
subdirectory with the mkdir command you already know:
mkdir ~/Documents
Shell Basics
91
Now suppose you want to rename myfile.txt into tuxfile.txt. Finally you decide
to remove the renamed file and the test subdirectory.
1 To rename the file, enter
mv myfile.txt tuxfile.txt
2 To check what happened, enter
ls -l
Instead of myfile.txt, tuxfile.txt should appear in the list of contents.
mv stands for move and is used with two options: the first option specifies the
source, the second option specifies the target of the operation. You can use
mv either
to rename a file or a directory,
92
Start-Up
7.4.1 Using su
In order to temporarily become root in a shell, proceed as follows:
1 Enter su. You are prompted for the root password.
2 Enter the password. If you mistyped the root password, the shell displays a
message. In this case, you have to re-enter su before retyping the password.
If your password is correct, a hash symbol # appears at the end of the prompt,
signaling that you are acting as root now.
3 Execute your task. For example, transfer ownership of a file to a new user
which only root is allowed to do:
chown wilber kde_quick.xml
4 After having completed your tasks as root, switch back to your normal user
account. To do so, enter
exit
The hash symbol disappears and you are acting as normal user again.
Shell Basics
93
Start-Up
As root, you can also change the ownership of a file: with the command chown
(change owner) you can transfer ownership to a new user.
1
1
1
1
1
2
1
tux
tux
tux
tux
tux
tux
tux
users
0
users 53279
users
0
users 70733
users 47896
users
48
users 624398
2006-06-23
2006-06-21
2006-06-23
2006-06-21
2006-06-21
2006-06-23
2006-06-23
16:08
13:16
16:08
09:35
09:46
16:09
15:43
checklist.txt
gnome_quick.xml
index.htm
kde-start.xml
kde_quick.xml
local
tux.jpg
In the example above, user tux owns the file kde-start.xml and has read and write
access to the file but cannot execute it. The users group can read the file but cannot
write or execute it. The same holds true for the other users as shown by the third
block of characters.
Procedure 7.4
Suppose you are tux and want to modify the access permissions to your files:
1 If you want to grant the users group also write access to kde-start.xml, enter
chmod g+w kde-start.xml
2 To grant the users group and other users write access to kde-start.xml, enter
chmod go+w kde-start.xml
3 To remove write access for all users, enter
chmod -w kde-start.xml
If you do not specify any kind of users, the changes apply to all users the
owner of the file, the owning group and the others. Now even the owner tux
does not have write access to the file without first reestablishing write permissions.
4 To prohibit the usersgroup and others to change into the directory local,
enter
chmod go-x local
5 To grant others write permissions for two files, for kde_quick.xml and gnome
_quick.xml, enter
Shell Basics
95
chmod o+w
Procedure 7.5
kde_quick.xml gnome_quick.xml
Changing Ownership
Suppose you are tux and want to transfer the ownership of the file kde_quick.xml
to an other user, named wilber. In this case, proceed as follows:
1 Enter the username and password for root.
2 Enter
chown wilber kde_quick.xml
3 Check what happened with
ls -l kde_quick.xml
You should get the following output:
-rw-r--r-- 1 wilber users
4 If the ownership is set according to your wishes, switch back to your normal
user account.
96
Start-Up
Just type one or several letters from the command you are searching for. Each
character you enter narrows down the search. The corresponding search result
is shown on the right side of the colon whereas your input appears on the left of
the colon. To accept a search result, press [Esc]. The prompt now changes to its
normal appearance and shows the command you chose. You can now edit the
command or directly execute it by pressing [Enter].
Completion
Completing a filename or directory name to its full length after typing its first
letters is another helpful feature of Bash. To do so, type the first letters then press
[|] (Tabulator). If the filename or path can be uniquely identified, it is completed
at once and the cursor moves to the end of the filename. You can then enter the
next option of the command, if necessary. If the filename or path cannot be
uniquely identified (because there are several filenames starting with the same
letters), the filename or path is only completed up to the point where it becomes
ambiguous again. You can then obtain a list of them by pressing [|] a second
time. After this, you can enter the next letters of the file or path then try completion again by pressing [|]. When completing filenames and paths with the help
of [|], you can simultaneously check whether the file or path you want to enter
really exists (and you can be sure of getting the spelling right).
Wild Cards
You can replace one or more characters in a filename with a wild card for pathname expansion. Wild cards are characters that can stand for other characters.
There are three different types of these in Bash:
Wild Card
Function
[set]
If you already did the example Section 7.3.1, Examples for Working with Files and
Directories (page 91) your shell buffer should be filled with commands which you
can retrieve using the history function.
Shell Basics
97
Documents/ tux@knox:~> cd D
5 The prompt still shows your initial input. Type the next character of the subdirectory you want to go to and press [|] again.
Bash now completes the path.
6 You can now execute the command with [Enter].
Procedure 7.7
Using Wildcards
Now suppose that your home directory contains a number of files with various file
extensions. It also holds several versions of one file which you saved under different
filenames myfile1.txt, myfile2.txt etc. You want to search for certain files according to their properties.
1 First, create some test files in your home directory:
1a Use the touch command to create several (empty) files with different
file extensions, for example .pdf, .xml and .jpg.
You can do this consecutively (do not forget to use the Bash history
function) or with only one touch command: simply add several filenames
separated by a space.
1b Create at least two files that have the same file extension, for example
.html.
1c To create several versions of one file, enter
touch myfile{1..5}.txt
This command creates five consecutively numbered files:
myfile1.txt,,myfile5.txt
98
Start-Up
1d List the contents of your home directory. It should look similar to this:
-rw-r--r--rw-r--r--rw-r--r--rw-r--r--rw-r--r--rw-r--r--rw-r--r--rw-r--r--rw-r--r--rw-r--r--rw-r--r--
1
1
1
1
1
1
1
1
1
1
1
tux
tux
tux
tux
tux
tux
tux
tux
tux
tux
tux
users
users
users
users
users
users
users
users
users
users
users
0
0
0
0
0
0
0
0
0
0
0
2006-07-14
2006-07-14
2006-07-14
2006-07-14
2006-07-14
2006-07-14
2006-07-14
2006-07-14
2006-07-14
2006-07-14
2006-07-14
13:34
13:47
13:47
13:47
13:34
13:49
13:49
13:49
13:49
13:49
13:32
foo.xml
home.html
index.html
toc.html
manual.pdf
myfile1.txt
myfile2.txt
myfile3.txt
myfile4.txt
myfile5.txt
tux.png
2 With the help of wild cards, select certain subsets of the files according to
various criteria:
2a To list all files with the .html extension, enter
ls -l *.html
2b To list all versions of myfile.txt, enter
ls -l myfile?.txt
Note that you can only use the ? wild card here because the numbering
of the files is single-digit. As soon as you have a file named myfile10
.txt you must to use the * wild card to view all versions of myfile.txt
(or add another question mark, so your string looks like myfile??.txt).
2c To remove, for example, version 1-3 and version 5 of myfile.txt, enter
rm myfile[1-3,5].txt
2d Check the result with
ls -l
Of all myfile.txt versions only myfile4.txt should be left.
You can also combine several wild cards in one command. In the example above, rm
myfile[1-3,5].* would lead to the same result as rm myfile[1-3,5].txt because
there are only files with the extension .txt available.
Shell Basics
99
Start-Up
3 Write some sentences. If you want to insert a new line, first press [Esc] to
switch back to command mode. Press [O] to insert a new line and to switch
to insert mode again.
4 In the insert mode, you can edit the text with the arrow keys and with [Del].
5 To leave vi, press [Esc] to switch to command mode again. Then press [:]
which takes you to the extended mode. The bottom line now shows a colon.
6 To leave vi and save your changes, type wq (w for write; q for quit) and press
[Enter]. If you want to save the file under a different name, type w filename
and press [Enter].
To leave vi without saving, type q! instead and press [Enter].
Shell Basics
101
Start-Up
takes you to the beginning, and [End] to the end of the document. To end the
viewing mode, press [Q].
more
Instead of less, you can also use the older program more. It has basically the
same functionhowever, it is less convenient because it does not allow you to
scroll backwards. Use [Space] to move forward. When you reach the end of the
document, the viewer closes automatically.
cat
The cat command displays the contents of a file, printing the entire contents to
the screen without interruption. As cat does not allow you to scroll it is not very
useful as viewer but it is rather often used in combination with other commands.
Shell Basics
103
104
Start-Up
If you have started several background processes (also named jobs) from the same
shell, the jobs command gives you an overview of the jobs. It also shows the job
number in brackets and their status:
tux@linux:~> jobs
[1]
Running
[2]- Running
[3]+ Stopped
Shell Basics
105
File Administration
ls [options] [files]
If you run ls without any additional parameters, the program lists the contents
of the current directory in short form.
-l
Detailed list
-a
Displays hidden files
cp [options] source target
Copies source to target.
-i
Waits for confirmation, if necessary, before an existing target is overwritten
-r
Copies recursively (includes subdirectories)
106
Start-Up
Shell Basics
107
108
Start-Up
109
place it in the background by appending an ampersand (&), so you can immediately continue working on the same command line (updatedb &). This command
usually runs as a daily cron job (see cron.daily).
find [options]
With find, search for a file in a given directory. The first argument specifies the
directory in which to start the search. The option -name must be followed by a
search string, which may also include wild cards. Unlike locate, which uses a
database, find scans the actual directory.
110
Start-Up
File Systems
mount [options] [device] mountpoint
This command can be used to mount any data media, such as hard disks, CDROM drives, and other drives, to a directory of the Linux file system.
-r
Mount read-only
-t filesystem
Specify the file system, commonly ext2 for Linux hard disks, msdos for MS-DOS
media, vfat for the Windows file system, and iso9660 for CDs
For hard disks not defined in the file /etc/fstab, the device type must also be
specified. In this case, only root can mount it. If the file system needs to also be
mounted by other users, enter the option user in the appropriate line in the /etc/
fstab file (separated by commas) and save this change. Further information is
available in the mount(1) man page.
umount [options] mountpoint
This command unmounts a mounted drive from the file system. To prevent data
loss, run this command before taking a removable data medium from its drive.
Normally, only root is allowed to run the commands mount and umount. To enable
other users to run these commands, edit the /etc/fstab file to specify the option
user for the relevant drive.
System Information
df [options] [directory]
The df (disk free) command, when used without any options, displays information
about the total disk space, the disk space currently in use, and the free space on
Shell Basics
111
all the mounted drives. If a directory is specified, the information is limited to the
drive on which that directory is located.
-h
Shows the number of occupied blocks in gigabytes, megabytes, or kilobytesin
human-readable format
-T
Type of file system (ext2, nfs, etc.)
du [options] [path]
This command, when executed without any parameters, shows the total disk
space occupied by files and subdirectories in the current directory.
-a
Displays the size of each individual file
-h
Output in human-readable form
-s
Displays only the calculated total size
free [options]
The command free displays information about RAM and swap space usage,
showing the total and the used amount in both categories. See Section The free
Command (Chapter 18, Special System Features, Reference) for more information.
-b
Output in bytes
-k
Output in kilobytes
-m
Output in megabytes
date [options]
This simple program displays the current system time. If run as root, it can also
be used to change the system time. Details about the program are available in
the date(1) man page.
Processes
top [options]
top provides a quick overview of the currently running processes. Press [H] to
access a page that briefly explains the main options for customizing the program.
112
Start-Up
ps [options] [process_ID]
If run without any options, this command displays a table of all your own programs
or processesthose you started. The options for this command are not preceded
by hyphen.
aux
Displays a detailed list of all processes, independent of the owner
kill [options] process_ID
Unfortunately, sometimes a program cannot be terminated in the normal way.
In most cases, you should still be able to stop such a runaway program by executing the kill command, specifying the respective process ID (see top and ps).
kill sends a TERM signal that instructs the program to shut itself down. If this
does not help, the following parameter can be used:
-9
Sends a KILL signal instead of a TERM signal, bringing the specified process
to an end in almost all cases
killall [options] processname
This command is similar to kill, but uses the process name (instead of the process
ID) as an argument, killing all processes with that name.
Network
ping [options] hostname_or_IP address
The ping command is the standard tool for testing the basic functionality of TCP/IP
networks. It sends a small data packet to the destination host, requesting an immediate reply. If this works, ping displays a message to that effect, which indicates
that the network link is basically functioning.
-cnumber
Determines the total number of packages to send and ends after they have
been dispatched (by default, there is no limitation set)
-f
flood ping: sends as many data packages as possible; a popular means, reserved for root, to test networks
-ivalue
Specifies the interval between two data packages in seconds (default: one
second)
host [options] hostname [server]
The domain name system resolves domain names to IP addresses. With this tool,
send queries to name servers (DNS servers).
Shell Basics
113
Miscellaneous
passwd [options] [username]
Users may change their own passwords at any time using this command. The
administrator root can use the command to change the password of any user on
the system.
su [options] [username]
The su command makes it possible to log in under a different username from a
running session. Specify a username and the corresponding password. The
password is not required from root, because root is authorized to assume the
identity of any user. When using the command without specifying a username,
you are prompted for the root password and change to the superuser (root). Use
su - to start a login shell for a different user.
halt [options]
To avoid loss of data, you should always use this program to shut down your
system.
reboot [options]
Does the same as halt except the system performs an immediate reboot.
clear
This command cleans up the visible area of the console. It has no options.
114
Start-Up
117
Figure 8.1
The menu and the toolbar provide options for printing contents from the help center,
searching the currently displayed page, and navigating and customizing the help
center. The display field in the right part of the window always shows the currently
selected contents, such as online manuals, search results, or Web pages.
The navigation area in the left part of the window contains several tabs:
Contents
Presents a tree view of all available information sources. The help center addresses
various target groups, such as users, administrators, and developers. Click on an
entry to open and browse the individual categories. The help center also provides
access to some online databases that cover special hardware and software issues
for your product. All these sources can be searched conveniently once a search
index has been generated.
The contents of your help center depends on which software packages are currently installed and which languages are selected as your system languages.
Glossary
Provides a quick reference where you can look up the definitions of words that
might be unfamiliar to you.
Search Options
Holds options for the full text search of the help center. You can combine several
search criteria.
Procedure 8.1
To use the full text search KDE help center offers, generate a search index and set
the search parameters. If the search index has not yet been generated, the system
automatically prompts you to do so when you click the Search tab.
1 To search for a term, click into the text field and enter the search string.
118
Start-Up
2 To combine your search strings with operands, click Method and select the
operand to use.
3 Choose an option from Max. Results to limit the number of hits to display.
4 To restrict your search to certain types of documentation, choose an option
from Scope selection. With Default, a predefined selection of documents is
searched. All includes all types of documents in the search. Custom lets you
define which documents to include in your search. Just activate the documents
you want in the list.
5 When you have set the options according to your wishes, click Search. The
search results are then displayed as a list of links in the display field and can
be navigated with mouse clicks.
Procedure 8.2
1 To create a new search index, select Settings > Build Search Index from the
menu. A window opens, showing a list of the documentation currently available
in the help center. In case no search index exists, you are automatically asked
to build one, once you enter a search term into the search field.
2 Select the documents to integrate in the search index and click Build Index.
After the index has been generated, you can use the full text search.
119
The menu and the toolbar provide options for navigating and customizing the help
center, for searching and for printing contents from Help. To view a table of contents,
click the home icon or press [Alt] + [Home]. The help topics are grouped into categories presented as links. Click one of the links to open a list of topics for that category. To search for an item, just enter the search string into the search field at the
top of the window.
120
Start-Up
121
HOWTOs
HOWTOs are usually a short, informal, step-by-step guides to accomplishing specific
tasks. HOWTOs can also be found in the package howto and are installed under /usr/
share/doc/howto.
Guides
Manuals and guides for various topics or programs can be found at http://www.tldp
.org/guides.html. They range from Bash Guide for Beginners to Linux Filesystem
Hierarchy to Linux Administrator's Security Guide . Generally, guides are more detailed
and exhaustive than HOWTOs or FAQs. They are usually written by experts for experts.
8.5.3 Usenet
Created in 1979 before the rise of the Internet, Usenet is one of the oldest computer
networks and still in active use. The format and transmission of Usenet articles is
very similar to e-mail, but is developed for a many-to-many communication.
Usenet is organized into seven topical categories: comp.* for computer-related discussions, misc.* for miscellaneous topics, news.* for newsgroup-related matters,
rec.* for recreation and entertainment, sci.* for science-related discussions, soc.*
for social discussions, and talk.* for various controversial topics. The top levels are
split in subgroups. For instance, comp.os.linux.hardware is a newsgroup for Linuxspecific hardware issues.
Before you can post an article, have your client connect to a news server and subscribe to a specific newsgroup. News clients include Knode or Evolution. Each news
server communicates to other news servers and exchanges articles with them. Not
all newsgroups may be available on your news server.
Interesting
newsgroups
for
Linux
users
are
comp.os.linux.apps,
comp.os.linux.questions, and comp.os.linux.hardware. If you cannot find a specific
newsgroup, go to http://www.linux.org/docs/usenetlinux.html. Follow the general
Usenet rules available online at http://www.faqs.org/faqs/usenet/posting-rules/
part1/.
Start-Up
123
http://www.din.de , http://www.din.com
The Deutsches Institut fr Normung (DIN) is a registered technical and scientific
association. It was founded in 1917. According to DIN, the organization is the
institution responsible for standards in Germany and represents German interests
in worldwide and European standards organizations.
The association brings together manufacturers, consumers, trade professionals,
service companies, scientists and others who have an interest in the establishment
of standards. The standards are subject to a fee and can be ordered using the
DIN home page.
124
Start-Up
125
Important Notes
1. Free installation support is offered to customers with a valid and activated registration code. You can activate your registration code at http://www.open-slx
.com/register.
2. The registration code is not transferable to another person.
3. The free support covers the initial installation on one computer. Refer to our Web
site for further information http://support.open-slx.com/products/suselinux/
support_overview.html.
Contact Recommendations
We recommend using http://support.open-slx.com/eService to open a service request and to provide us with the relevant information like problem description and
log files. It helps us to avoid misspelled commands, links, or directory names, which
often cause frustrating problems and are particularly common during phone conversations. You will receive a reply soon, providing a practical solution.
126
Start-Up
a variety of problems. The SUSE Help Center on your desktop provides additional
information about installed packages, the vital HOWTOs, and info pages.
You can access the latest Support Database articles online at http://www.open-slx
.com/usersupport or access the community Support Database at http://en.open-slx
.org/SDB. The Support Database, one of the most frequently used databases in the
Linux world, offers our customers a wealth of analysis and solution approaches. You
can retrieve tested solutions using the keyword search, history function, or versiondependent search.
127
Log Files
Log File
Description
~/.xsession-errors
/var/log/apparmor/
Log files from AppArmor, see Part Confining Privileges with Novell AppArmor (Security Guide) for
detailed information.
/var/log/audit/audit.log
Log file from Audit to track any access to files, directories, or resources of your system, and trace system
calls. See Part The Linux Audit Framework (Security Guide) for detailed information.
/var/log/boot.msg
/var/log/mail.*
129
Log File
Description
/var/log/messages
/var/log/NetworkManager
/var/log/samba/
/var/log/SaX.log
/var/log/warn
/var/log/wtmp
Binary file containing user login records for the current machine session. View it with last.
/var/log/Xorg.*.log
/var/log/YaST2/
/var/log/zypper.log
Apart from log files, your machine also supplies you with information about the running
system. See Table 9.2: System Information With the /proc File System
Table 9.2
File
Description
/proc/cpuinfo
/proc/dma
/proc/interrupts
130
Start-Up
File
Description
/proc/iomem
/proc/ioports
/proc/meminfo
/proc/modules
/proc/mounts
/proc/partitions
/proc/version
Apart from the /proc file system, the Linux kernel exports information with the sysfs
module, an in-memory filesystem. This module represents kernel objects, their attributes and relationships. For more information about sysfs, see the context of udev
in Chapter 19, Dynamic Kernel Device Management with udev (Reference). Table 9.3
contains an overview of the most common directories under /sys.
Table 9.3
File
Description
/sys/block
/sys/bus
/sys/class
/sys/device
Linux comes with a number of tools for system analysis and monitoring. See Chapter 13, System Monitoring Utilities (Reference) for a selection of the most important
ones used in system diagnostics.
131
Each of the following scenarios begins with a header describing the problem followed
by a paragraph or two offering suggested solutions, available references for more
detailed solutions, and cross-references to other scenarios that are related.
132
Start-Up
1 Enter the BIOS using the proper key as announced by the boot routines and
wait for the BIOS screen to appear.
2 To change the boot sequence in an AWARD BIOS, look for the BIOS FEATURES
SETUP entry. Other manufacturers may have a different name for this, such
as ADVANCED CMOS SETUP. When you have found the entry, select it and
confirm with [Enter].
133
3 In the screen that opens, look for a subentry called BOOT SEQUENCE or BOOT
ORDER. The boot sequence looks something like C,A or A,C. In the former
case, the machine first searches the hard disk (C) then the floppy drive (A) to
find a bootable medium. Change the settings by pressing [PgUp] or [PgDown]
until the sequence is A,CDROM,C.
4 Leave the BIOS setup screen by pressing [Esc]. To save the changes, select
SAVE & EXIT SETUP, or press [F10]. To confirm that your settings should be
saved, press [Y].
Procedure 9.2
US Keyboard Layout
Start-Up
135
pci=noacpi
Disable PCI IRQ routing of the new ACPI system.
pnpacpi=off
This option is for serial or parallel problems when your BIOS setup contains wrong
interrupts or ports.
notsc
Disable the time stamp counter. This option can be used to work around timing
problems on your systems. It is a recent feature, if you see regressions on your
machine, especially time related or even total hangs, this option is worth a try.
nohz=off
Disable the nohz feature. If your machine hangs, this option may help. Otherwise
it is of no use.
Once you have determined the right parameter combination, YaST automatically
writes them to the boot loader configuration to make sure that the system boots
properly next time.
If unexplainable errors occur when the kernel is loaded or during the installation,
select Memory Test in the boot menu to check the memory. If Memory Test returns
an error, it is usually a hardware error.
Start-Up
VNC Installation
137
Boot Options
Unlike the graphical interface, the different boot options cannot be selected using
the cursor keys of your keyboard. The boot menu of the text mode boot screen
offers some keywords to enter at the boot prompt. These keywords map to the
options offered in the graphical version. Enter your choice and hit [Enter] to launch
the boot process.
Custom Boot Options
After selecting a boot option, enter the appropriate keyword at the boot prompt
or enter some custom boot options as described in Section 9.2.5, Fails to Boot
(page 134). To launch the installation process, press [Enter].
Screen Resolutions
Use the F keys to determine the screen resolution for installation. If you need to
boot in text mode, choose [F3].
138
Start-Up
BIOS Settings
Check your BIOS for references to your hard drive. GRUB may simply not be
started if the hard drive itself cannot be found with the current BIOS settings.
BIOS Boot Order
Check whether your system's boot order includes the hard disk. If the hard disk
option was not enabled, your system may install properly, but fails to boot when
access to the hard disk is required.
139
Start-Up
5 Boot into the full multiuser and network mode by entering telinit 5 at the
command line.
141
the log file for your desktop applications (.xsession-errors in the user's home
directory) for any irregularities.
6 If the desktop could not start because of corrupt configuration files, proceed
with Section 9.4.4, Login Successful but GNOME Desktop Fails (page 144) or
Section 9.4.5, Login Successful but KDE Desktop Fails (page 144).
The following are some common reasons why network authentication for a particular
user may fail on a specific machine:
The user may have entered the wrong password.
The username exists in the machine's local authentication files and is also provided by a network authentication system, causing conflicts.
The home directory exists but is corrupt or unavailable. Perhaps it is write protected or is on a server that is inaccessible at the moment.
The user does not have permission to log in to that particular host in the authentication system.
The machine has changed hostnames, for whatever reason, and the user does
not have permission to log in to that host.
The machine cannot reach the authentication server or directory server that
contains that user's information.
There may be problems with the X Window System authenticating this particular
user, especially if the user's home has been used with another Linux distribution
prior to installing the current one.
To locate the cause of the login failures with network authentication, proceed as
follows:
1 Check whether the user remembered their password correctly before you
start debugging the whole authentication mechanism.
2 Determine the directory server which the machine relies on for authentication
and make sure that it is up and running and properly communicating with the
other machines.
3 Determine that the user's username and password work on other machines
to make sure that his authentication data exists and is properly distributed.
4 See if another user can log in to the misbehaving machine. If another user
can log in without difficulty or if root can log in, log in and examine the /var/
log/messages file. Locate the time stamps that correspond to the login attempts
and determine if PAM has produced any error messages.
5 Try to log in from a console (using [Ctrl] + [Alt] + [F1]). If this is successful,
the problem is not with PAM or the directory server on which the user's home
142
Start-Up
143
144
Start-Up
Corrupted desktop configuration files can always be replaced with the initial configuration files. If you want to recover the user's adjustments, carefully copy them back
from their temporary location after the configuration has been restored, using the
default configuration values.
To replace a corrupted desktop configuration with the initial configuration values,
proceed as follows:
1 Switch to a text console by pressing [Ctrl] + [Alt] + [F1].
2 Log in with your username.
3 Move the KDE configuration directory and the .skel files to a temporary location:
For KDE3 use these commands:
mv .kde .kde-ORIG-RECOVER
mv .skel .skel-ORIG-RECOVER
For KDE4 use these commands:
mv .kde4 .kde4-ORIG-RECOVER
mv .skel .skel-ORIG-RECOVER
4 Log out.
5 Log in again.
6 After the desktop has started successfully, copy the user's own configurations
back into place:
cp -a KDEDIR/share .kde/share
Replace KDEDIR with the directory from Step 3 (page 145).
IMPORTANT
If the user's own adjustments caused the login to fail and continue to do
so, repeat the procedure as described above, but do not copy the .kde/
share directory.
145
in may be a network problem of some kind. This section introduces a simple check
list you can apply to identify the cause of any network problem encountered.
Procedure 9.6
Start-Up
147
/etc/resolv.conf
This file is used to keep track of the name server and domain you
are currently using. It can be modified manually or automatically
adjusted by YaST or DHCP. Automatic adjustment is preferable.
However, make sure that this file has the following structure and all
network addresses and domain names are correct:
search fully_qualified_domain_name
nameserver ipaddress_of_nameserver
This file can contain more than one name server address, but at
least one of them must be correct to provide name resolution to
your host. If needed, adjust this file using the YaST Network Setting
module (Hostname/DNS tab).
If your network connection is handled via DHCP, enable DHCP to
change hostname and name service information by selecting Change
Hostname via DHCP and Update Name Servers and Search List via
DHCP in the YaST DNS and Hostname module.
/etc/nsswitch.conf
This file tells Linux where to look for name service information. It
should look like this:
...
hosts: files dns
networks: files dns
...
The dns entry is vital. It tells Linux to use an external name server.
Normally, these entries are automatically managed by YaST, but it
would be prudent to check.
If all the relevant entries on the host are correct, let your system
administrator check the DNS server configuration for the correct
zone information. For detailed information about DNS, refer to
Chapter 23, The Domain Name System (Reference). If you have
made sure that the DNS configuration of your host and the DNS
server are correct, proceed with checking the configuration of your
network and network device.
4c If your system cannot establish a connection to a network server and
you have excluded name service problems from the list of possible
culprits, check the configuration of your network card.
Use the command ifconfig network_device (executed as root) to check
whether this device was properly configured. Make sure that both inet
address and Mask are configured correctly. An error in the IP address
or a missing bit in your network mask would render your network con-
148
Start-Up
149
150
Start-Up
2e Determine the backup options to use, such as whether files not belonging to any package should be backed up and whether a list of files
should be displayed prior to creating the archive. Also determine
whether changed files should be identified using the time-consuming
MD5 mechanism.
Use Expert to enter a dialog for the backup of entire hard disk areas.
Currently, this option only applies to the Ext2 file system.
2f Finally, set the search constraints to exclude certain system areas from
the backup area that do not need to be backed up, such as lock files
or cache files. Add, edit, or delete items until your needs are met and
leave with OK.
3 Once you have finished the profile settings, you can start the backup right
away with Create Backup or configure automatic backup. It is also possible
to create other profiles tailored for various other purposes.
To configure automatic backup for a given profile, proceed as follows:
1 Select Automatic Backup from the Profile Management menu.
2 Select Start Backup Automatically.
3 Determine the backup frequency. Choose daily, weekly, or monthly.
4 Determine the backup start time. These settings depend on the backup frequency selected.
5 Decide whether to keep old backups and how many should be kept. To receive
an automatically generated status message of the backup process, check
Send Summary Mail to User root.
6 Click OK to apply your settings and have the first backup start at the time
specified.
151
152
Start-Up
153
Figure 9.2
The following main test runs are performed with every run. They contain, in
turn, a number of individual subtests:
Check Partition Tables
Checks the validity and coherence of the partition tables of all detected
hard disks.
Check Swap Areas
The swap partitions of the installed system are detected, tested, and offered
for activation, where applicable. This offer should be accepted for the sake
of a higher system repair speed.
Check File Systems
All detected file systems are subjected to a file systemspecific check.
Check fstab Entries
The entries in the file are checked for completeness and consistency. All
valid partitions are mounted.
Check Package Database
This checks whether all packages necessary for the operation of a minimal
installation are present. While it is optionally possible to also analyze the
base packages, this takes a long time because of their vast number.
Check Boot Loader Configuration
The boot loader configuration of the installed system (GRUB or LILO) is
checked for completeness and coherence. Boot and root devices are examined and the availability of the initrd modules is checked.
6 Whenever an error is encountered, the procedure stops and a dialog opens
outlining the details and possible solutions.
154
Start-Up
Read the screen messages carefully before accepting the proposed fix. If you
decide to decline a proposed solution, your system remains unchanged.
7 After the repair process has been terminated successfully, click OK and Finish
and remove the installation media. The system automatically reboots.
Customized Repair
To launch the Customized Repair mode and selectively check certain components
of your installed system, proceed as follows:
1 Insert the installation medium of openSUSE into your DVD drive.
2 Reboot the system.
3 At the boot screen, select Repair Installed System.
4 Confirm the license agreement and click Next.
5 Select Customized Repair.
Choosing Customized Repair shows a list of test runs that are all marked for
execution at first. The total range of tests matches that of automatic repair.
If you already know where no damage is present, unmark the corresponding
tests. Clicking Next starts a narrower test procedure that probably has a significantly shorter running time.
Not all test groups can be applied individually. The analysis of the fstab entries
is always bound to an examination of the file systems, including existing swap
partitions. YaST automatically resolves such dependencies by selecting the
smallest number of necessary test runs. YaST does not support encrypted
partitions. If you have one, YaST informs you about it.
6 Whenever an error is encountered, the procedure stops and a dialog opens
outlining the details and possible solutions.
Read the screen messages carefully before accepting the proposed fix. If you
decide to decline a proposed solution, your system remains unchanged.
7 After the repair process has been terminated successfully, click OK and Finish
and remove the installation media. The system automatically reboots.
Expert Tools
If you are knowledgeable with openSUSE and already have a very clear idea of what
needs to be repaired in your system, directly apply the tools, skipping the system
analysis.
To make use of the Expert Tools feature of the YaST System Repair module, proceed
as follows:
1 Insert the installation medium of openSUSE into your DVD drive.
Common Problems and Their Solutions
155
156
Start-Up
157
A shell and many other useful utilities, such as the mount program, are available in
the /bin directory. The sbin directory contains important file and network utilities
for reviewing and repairing the file system. This directory also contains the most
important binaries for system maintenance, such as fdisk, mkfs, mkswap, mount,
mount, init, and shutdown, and ifconfig, ip, route, and netstat for maintaining the
network. The directory /usr/bin contains the vi editor, find, less, and ssh.
To see the system messages, either use the command dmesg or view the file /var/
log/messages.
Checking and Manipulating Configuration Files
As an example for a configuration that might be fixed using the rescue system,
imagine you have a broken configuration file that prevents the system from booting
properly. You can fix this using the rescue system.
To manipulate a configuration file, proceed as follows:
1 Start the rescue system using one of the methods described above.
2 To mount a root file system located under /dev/sda6 to the rescue system,
use the following command:
mount /dev/sda6 /mnt
All directories of the system are now located under /mnt
3 Change the directory to the mounted root file system:
cd /mnt
4 Open the problematic configuration file in the vi editor. Adjust and save the
configuration.
5 Unmount the root file system from the rescue system:
umount /mnt
6 Reboot the machine.
Repairing and Checking File Systems
Generally, file systems cannot be repaired on a running system. If you encounter
serious problems, you may not even be able to mount your root file system and the
system boot may end with a kernel panic. In this case, the only way is to repair
the system from the outside. It is strongly recommended to use the YaST System
Repair for this task (see Section Using YaST System Repair (page 152) for details).
However, if you need to do a manual file system check or repair, boot the rescue
system. It contains the utilities to check and repair the ext2, ext3, ext4, reiserfs,
xfs, dosfs, and vfat file systems.
158
Start-Up
159
To check the boot loader configuration and reinstall the boot loader, proceed as follows:
1 Perform the necessary steps to access the installed system as described in
Section Accessing the Installed System (page 159).
2 Check whether the following files are correctly configured according to the
GRUB configuration principles outlined in Chapter 17, The Boot Loader GRUB
(Reference) and apply fixes if necessary.
/etc/grub.conf
/boot/grub/device.map
/boot/grub/menu.lst
/etc/sysconfig/bootloader
3 Reinstall the boot loader using the following command sequence:
grub --batch < /etc/grub.conf
4 Unmount the partitions, log out from the change root environment, and reboot the system:
umount -a
exit
reboot
160
Start-Up
A GNU Licenses
This appendix contains the GNU General Public License version 2 and the GNU Free
Documentation License version 1.2.
GNU General Public License
Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc. 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
Preamble
The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License
applies to most of the Free Software Foundations software and to any other program whose authors commit to using it. (Some other Free Software
Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the
freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that
you can change the software or use pieces of it in new free programs; and that you know you can do these things.
To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions
translate to certain responsibilities for you if you distribute copies of the software, or if you modify it.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You
must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights.
We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute
and/or modify the software.
Also, for each authors protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If
the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems
introduced by others will not reflect on the original authors reputations.
Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed
for everyones free use or not licensed at all.
The precise terms and conditions for copying, distribution and modification follow.
GNU GENERAL PUBLIC LICENSE TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
0.
This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under
the terms of this General Public License. The Program, below, refers to any such program or work, and a work based on the Program means
either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or
with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term modification.) Each
licensee is addressed as you.
Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program
is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having
been made by running the Program). Whether that is true depends on what the Program does.
1.
You may copy and distribute verbatim copies of the Programs source code as you receive it, in any medium, provided that you conspicuously
and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License
and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program.
You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.
2.
You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute
such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions:
a)
You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change.
b)
You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any part thereof,
to be licensed as a whole at no charge to all third parties under the terms of this License.
c)
If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use
in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or
else, saying that you provide a warranty) and that users may redistribute the program under these conditions, and telling the user how to view a
copy of this License. (Exception: if the Program itself is interactive but does not normally print such an announcement, your work based on the
Program is not required to print an announcement.)
These requirements apply to the modified work as a whole. If identifiable sections of that work are not derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute
them as separate works. But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of
the whole must be on the terms of this License, whose permissions for other licensees extend to the entire whole, and thus to each and every part
regardless of who wrote it.
Thus, it is not the intent of this section to claim rights or contest your rights to work written entirely by you; rather, the intent is to exercise the
right to control the distribution of derivative or collective works based on the Program.
In addition, mere aggregation of another work not based on the Program with the Program (or with a work based on the Program) on a volume of
a storage or distribution medium does not bring the other work under the scope of this License.
3. You may copy and distribute the Program (or a work based on it, under Section 2) in object code or executable form under the terms of Sections
1 and 2 above provided that you also do one of the following:
a)
Accompany it with the complete corresponding machine-readable source code, which must be distributed under the terms of Sections 1 and
2 above on a medium customarily used for software interchange; or,
b)
Accompany it with a written offer, valid for at least three years, to give any third party, for a charge no more than your cost of physically
performing source distribution, a complete machine-readable copy of the corresponding source code, to be distributed under the terms of Sections
1 and 2 above on a medium customarily used for software interchange; or,
c)
Accompany it with the information you received as to the offer to distribute corresponding source code. (This alternative is allowed only for
noncommercial distribution and only if you received the program in object code or executable form with such an offer, in accord with Subsection
b above.)
The source code for a work means the preferred form of the work for making modifications to it. For an executable work, complete source code
means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and
installation of the executable. However, as a special exception, the source code distributed need not include anything that is normally distributed
(in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs,
unless that component itself accompanies the executable.
If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to copy the
source code from the same place counts as distribution of the source code, even though third parties are not compelled to copy the source along
with the object code.
4.
You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License. Any attempt otherwise to
copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License. However, parties who
have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.
5.
You are not required to accept this License, since you have not signed it. However, nothing else grants you permission to modify or distribute
the Program or its derivative works. These actions are prohibited by law if you do not accept this License. Therefore, by modifying or distributing
the Program (or any work based on the Program), you indicate your acceptance of this License to do so, and all its terms and conditions for copying,
distributing or modifying the Program or works based on it.
6.
Each time you redistribute the Program (or any work based on the Program), the recipient automatically receives a license from the original
licensor to copy, distribute or modify the Program subject to these terms and conditions. You may not impose any further restrictions on the recipients exercise of the rights granted herein. You are not responsible for enforcing compliance by third parties to this License.
7.
If, as a consequence of a court judgment or allegation of patent infringement or for any other reason (not limited to patent issues), conditions
are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from
the conditions of this License. If you cannot distribute so as to satisfy simultaneously your obligations under this License and any other pertinent
obligations, then as a consequence you may not distribute the Program at all. For example, if a patent license would not permit royalty-free redistribution of the Program by all those who receive copies directly or indirectly through you, then the only way you could satisfy both it and this License
would be to refrain entirely from distribution of the Program.
If any portion of this section is held invalid or unenforceable under any particular circumstance, the balance of the section is intended to apply and
the section as a whole is intended to apply in other circumstances.
It is not the purpose of this section to induce you to infringe any patents or other property right claims or to contest validity of any such claims;
this section has the sole purpose of protecting the integrity of the free software distribution system, which is implemented by public license practices.
Many people have made generous contributions to the wide range of software distributed through that system in reliance on consistent application
of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot
impose that choice.
This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License.
8.
If the distribution and/or use of the Program is restricted in certain countries either by patents or by copyrighted interfaces, the original
copyright holder who places the Program under this License may add an explicit geographical distribution limitation excluding those countries, so
that distribution is permitted only in or among countries not thus excluded. In such case, this License incorporates the limitation as if written in the
body of this License.
9.
The Free Software Foundation may publish revised and/or new versions of the General Public License from time to time. Such new versions
will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Program specifies a version number of this License which applies to it and any later
version, you have the option of following the terms and conditions either of that version or of any later version published by the Free Software
Foundation. If the Program does not specify a version number of this License, you may choose any version ever published by the Free Software
Foundation.
10.
If you wish to incorporate parts of the Program into other free programs whose distribution conditions are different, write to the author to
ask for permission. For software which is copyrighted by the Free Software Foundation, write to the Free Software Foundation; we sometimes make
exceptions for this. Our decision will be guided by the two goals of preserving the free status of all derivatives of our free software and of promoting
the sharing and reuse of software generally.
NO WARRANTY
11.
BECAUSE THE PROGRAM IS LICENSED FREE OF CHARGE, THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM AS
162
Start-Up
IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH
YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
12.
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY
WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL,
SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED
TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM
TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
one line to give the programs name and an idea of what it does.
Copyright (C) yyyy name of author
This program is
modify it under
as published by
of the License,
You should have received a copy of the GNU General Public License
along with this program; if not, write to the Free Software
Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
Also add information on how to contact you by electronic and paper mail.
If the program is interactive, make it output a short notice like this when it starts in an interactive mode:
The hypothetical commands `show w and `show c should show the appropriate parts of the General Public License. Of course, the commands you
use may be called something other than `show w and `show c; they could even be mouse-clicks or menu items--whatever suits your program.
You should also get your employer (if you work as a programmer) or your school, if any, to sign a copyright disclaimer for the program, if necessary.
Here is a sample; alter the names:
This General Public License does not permit incorporating your program into proprietary programs. If your program is a subroutine library, you may
consider it more useful to permit linking proprietary applications with the library. If this is what you want to do, use the GNU Lesser General Public
License [http://www.fsf.org/licenses/lgpl.html] instead of this License.
GNU Licenses
163
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
PREAMBLE
The purpose of this License is to make a manual, textbook, or other functional and useful document free in the sense of freedom: to assure everyone the effective freedom to copy and redistribute it, with or without modifying it, either commercially or noncommercially. Secondarily, this
License preserves for the author and publisher a way to get credit for their work, while not being considered responsible for modifications made
by others.
This License is a kind of copyleft, which means that derivative works of the document must themselves be free in the same sense. It complements
the GNU General Public License, which is a copyleft license designed for free software.
We have designed this License in order to use it for manuals for free software, because free software needs free documentation: a free program
should come with manuals providing the same freedoms that the software does. But this License is not limited to software manuals; it can be used
for any textual work, regardless of subject matter or whether it is published as a printed book. We recommend this License principally for works
whose purpose is instruction or reference.
VERBATIM COPYING
You may copy and distribute the Document in any medium, either commercially or noncommercially, provided that this License, the copyright notices,
and the license notice saying this License applies to the Document are reproduced in all copies, and that you add no other conditions whatsoever
to those of this License. You may not use technical measures to obstruct or control the reading or further copying of the copies you make or distribute.
However, you may accept compensation in exchange for copies. If you distribute a large enough number of copies you must also follow the conditions
in section 3.
You may also lend copies, under the same conditions stated above, and you may publicly display copies.
COPYING IN QUANTITY
If you publish printed copies (or copies in media that commonly have printed covers) of the Document, numbering more than 100, and the Documents
license notice requires Cover Texts, you must enclose the copies in covers that carry, clearly and legibly, all these Cover Texts: Front-Cover Texts
on the front cover, and Back-Cover Texts on the back cover. Both covers must also clearly and legibly identify you as the publisher of these copies.
The front cover must present the full title with all words of the title equally prominent and visible. You may add other material on the covers in
addition. Copying with changes limited to the covers, as long as they preserve the title of the Document and satisfy these conditions, can be
treated as verbatim copying in other respects.
If the required texts for either cover are too voluminous to fit legibly, you should put the first ones listed (as many as fit reasonably) on the actual
cover, and continue the rest onto adjacent pages.
If you publish or distribute Opaque copies of the Document numbering more than 100, you must either include a machine-readable Transparent
copy along with each Opaque copy, or state in or with each Opaque copy a computer-network location from which the general network-using public
164
Start-Up
has access to download using public-standard network protocols a complete Transparent copy of the Document, free of added material. If you use
the latter option, you must take reasonably prudent steps, when you begin distribution of Opaque copies in quantity, to ensure that this Transparent
copy will remain thus accessible at the stated location until at least one year after the last time you distribute an Opaque copy (directly or through
your agents or retailers) of that edition to the public.
It is requested, but not required, that you contact the authors of the Document well before redistributing any large number of copies, to give them
a chance to provide you with an updated version of the Document.
MODIFICATIONS
You may copy and distribute a Modified Version of the Document under the conditions of sections 2 and 3 above, provided that you release the
Modified Version under precisely this License, with the Modified Version filling the role of the Document, thus licensing distribution and modification
of the Modified Version to whoever possesses a copy of it. In addition, you must do these things in the Modified Version:
A.
Use in the Title Page (and on the covers, if any) a title distinct from that of the Document, and from those of previous versions (which should,
if there were any, be listed in the History section of the Document). You may use the same title as a previous version if the original publisher of
that version gives permission.
B.
List on the Title Page, as authors, one or more persons or entities responsible for authorship of the modifications in the Modified Version, together with at least five of the principal authors of the Document (all of its principal authors, if it has fewer than five), unless they release you from
this requirement.
C.
State on the Title page the name of the publisher of the Modified Version, as the publisher.
D.
E.
Add an appropriate copyright notice for your modifications adjacent to the other copyright notices.
F.
Include, immediately after the copyright notices, a license notice giving the public permission to use the Modified Version under the terms of
this License, in the form shown in the Addendum below.
G.
Preserve in that license notice the full lists of Invariant Sections and required Cover Texts given in the Documents license notice.
H.
I.
Preserve the section Entitled History, Preserve its Title, and add to it an item stating at least the title, year, new authors, and publisher of
the Modified Version as given on the Title Page. If there is no section Entitled History in the Document, create one stating the title, year, authors,
and publisher of the Document as given on its Title Page, then add an item describing the Modified Version as stated in the previous sentence.
J. Preserve the network location, if any, given in the Document for public access to a Transparent copy of the Document, and likewise the network
locations given in the Document for previous versions it was based on. These may be placed in the History section. You may omit a network location for a work that was published at least four years before the Document itself, or if the original publisher of the version it refers to gives permission.
K.
For any section Entitled Acknowledgements or Dedications, Preserve the Title of the section, and preserve in the section all the substance
and tone of each of the contributor acknowledgements and/or dedications given therein.
L.
Preserve all the Invariant Sections of the Document, unaltered in their text and in their titles. Section numbers or the equivalent are not considered part of the section titles.
M.
Delete any section Entitled Endorsements. Such a section may not be included in the Modified Version.
N.
Do not retitle any existing section to be Entitled Endorsements or to conflict in title with any Invariant Section.
O.
If the Modified Version includes new front-matter sections or appendices that qualify as Secondary Sections and contain no material copied from
the Document, you may at your option designate some or all of these sections as invariant. To do this, add their titles to the list of Invariant Sections
in the Modified Versions license notice. These titles must be distinct from any other section titles.
You may add a section Entitled Endorsements, provided it contains nothing but endorsements of your Modified Version by various parties--for
example, statements of peer review or that the text has been approved by an organization as the authoritative definition of a standard.
You may add a passage of up to five words as a Front-Cover Text, and a passage of up to 25 words as a Back-Cover Text, to the end of the list of
Cover Texts in the Modified Version. Only one passage of Front-Cover Text and one of Back-Cover Text may be added by (or through arrangements
made by) any one entity. If the Document already includes a cover text for the same cover, previously added by you or by arrangement made by
the same entity you are acting on behalf of, you may not add another; but you may replace the old one, on explicit permission from the previous
publisher that added the old one.
The author(s) and publisher(s) of the Document do not by this License give permission to use their names for publicity for or to assert or imply
endorsement of any Modified Version.
COMBINING DOCUMENTS
You may combine the Document with other documents released under this License, under the terms defined in section 4 above for modified versions,
provided that you include in the combination all of the Invariant Sections of all of the original documents, unmodified, and list them all as Invariant
Sections of your combined work in its license notice, and that you preserve all their Warranty Disclaimers.
The combined work need only contain one copy of this License, and multiple identical Invariant Sections may be replaced with a single copy. If
there are multiple Invariant Sections with the same name but different contents, make the title of each such section unique by adding at the end
of it, in parentheses, the name of the original author or publisher of that section if known, or else a unique number. Make the same adjustment to
the section titles in the list of Invariant Sections in the license notice of the combined work.
In the combination, you must combine any sections Entitled History in the various original documents, forming one section Entitled History;
likewise combine any sections Entitled Acknowledgements, and any sections Entitled Dedications. You must delete all sections Entitled Endorsements.
GNU Licenses
165
COLLECTIONS OF DOCUMENTS
You may make a collection consisting of the Document and other documents released under this License, and replace the individual copies of this
License in the various documents with a single copy that is included in the collection, provided that you follow the rules of this License for verbatim
copying of each of the documents in all other respects.
You may extract a single document from such a collection, and distribute it individually under this License, provided you insert a copy of this License
into the extracted document, and follow this License in all other respects regarding verbatim copying of that document.
TRANSLATION
Translation is considered a kind of modification, so you may distribute translations of the Document under the terms of section 4. Replacing Invariant
Sections with translations requires special permission from their copyright holders, but you may include translations of some or all Invariant Sections
in addition to the original versions of these Invariant Sections. You may include a translation of this License, and all the license notices in the Document, and any Warranty Disclaimers, provided that you also include the original English version of this License and the original versions of those
notices and disclaimers. In case of a disagreement between the translation and the original version of this License or a notice or disclaimer, the
original version will prevail.
If a section in the Document is Entitled Acknowledgements, Dedications, or History, the requirement (section 4) to Preserve its Title (section
1) will typically require changing the actual title.
TERMINATION
You may not copy, modify, sublicense, or distribute the Document except as expressly provided for under this License. Any other attempt to copy,
modify, sublicense or distribute the Document is void, and will automatically terminate your rights under this License. However, parties who have
received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance.
If you have Invariant Sections, Front-Cover Texts and Back-Cover Texts, replace the with...Texts. line with this:
with the Invariant Sections being LIST THEIR TITLES, with the
Front-Cover Texts being LIST, and with the Back-Cover Texts being LIST.
If you have Invariant Sections without Cover Texts, or some other combination of the three, merge those two alternatives to suit the situation.
If your document contains nontrivial examples of program code, we recommend releasing these examples in parallel under your choice of free
software license, such as the GNU General Public License, to permit their use in free software.
166
Start-Up
Index
Symbols
A
access permissions
directory, 83
file, 83
file system, 81
AutoYaST
cloning system, 27
B
Bash
commands, 86
completion, 97
features, 96
history, 96
jobs, 104
pipes, 103
processes, 104
redirection, 103
searching, 101
shortcut keys, 89
wild cards, 97
boot screen, 7
booting
DVDs, from, 133
C
cards
sound, 29
case-sensitivity
directory name, 76
file name, 76
cat, 103, 110
cd, 107
chgrp, 107
chmod, 108
chown, 107
clear, 114
commands, 102-103, 106-114
bg, 104
cat, 110
cd, 107
chgrp, 107
chmod, 94, 108
chown, 95, 107
clear, 114
cp, 106
date, 112
df, 111
diff, 111
du, 112
fg, 105
file, 110
find, 101, 110
free, 112
grep, 101, 110
gzip, 108
halt, 114
help, 88
host, 113
info, 88
jobs, 105
kill, 105, 113
killall, 113
less, 110
ln, 107
locate, 101, 109
ls, 106
man, 88, 106
mkdir, 107
mount, 111
mv, 107
passwd, 114
ping, 113
ps, 105, 113
reboot, 114
rm, 107
rmdir, 107
ssh, 114
su, 114
tar, 109
top, 112
umount, 111
updatedb, 109
Completion
Bash, 97
configuration files
asound.conf, 31
fstab, 111
modprobe.d/sound, 31
configuring
printing, 31-36
local printers, 32
network printing, 34
sharing printers, 35
scanner, 36
HP All-In-One, 37
network, 37
sound cards, 29
cp, 106
D
date, 112
device
mount, 75
df, 111
diff, 111
directories
/, 78
/bin, 78-79
/boot, 78-79
/dev, 78-79
/etc, 78-79
/home, 78-79
/lib, 78-79
/media, 78, 80
/mnt, 78, 80
/opt, 78, 80
/root, 78, 80
/sbin, 78, 80
/srv, 78, 80
/tmp, 78, 80
/usr, 79-80
/var, 79, 81
/windows, 79, 81
changing, 107
creating, 107
deleting, 107
paths, 89
structure, 78
directory
access permissions, 83
documentation (see help)
drive
mount, 75
drives
mounting, 111
unmounting, 111
du, 112
DVDs
booting from, 133
checking, 132
E
editor
vi, 100
encrypting
home partition problem, 143
F
file , 110
access permissions, 83
file system, 75
access permissions, 81
devices, 75
directories, 75
mount, 75
partitions, 75
paths, 75
permissions, 77
unmount, 75
file systems
NTFS, 16
repairing, 158
files
archiving, 109
comparing, 111
compressing, 108
copying, 106
deleting, 107
editing, 100
moving, 107
paths, 89
searching, 101
searching contents, 110
searching for, 109-110
viewing, 102, 110
find, 110
firmware test, 8
free, 112
G
grep, 110
groups
concept, 74
gzip, 108
H
halt, 114
hardware
information, 132
head, 102
help, 117
Help, 119
help center, 117
info pages, 88
KDE help center, 117
Linux documentation project (TLDP),
121
man pages, 88, 106
Novell/SUSE manuals, vii
online documentation, 121
options, 88
specifications, 123
standards, 123
TLDP
FAQs, 122
guides, 122
Usenet, 122
Wikipedia, 122
History
Bash, 96
host, 113
I
info pages, 88
installation, 3-28
add-on, 12
automatic configuration, 24
boot screen, 7
clock, 13
desktop selection, 13
domain name, 24
hardware configuration, 27
hostname, 24
internet connection, 25
keyboard, 10
language, 10
manual configuration, 24
media, 3
media check, 8
method, 4
mode, 11
network, 12
other, 6
SLP, 6
network configuration, 24
online update, 26
partitioning, 14
resizing Windows, 15
performing, 23
release notes, 23, 27
root password, 19
settings, 20
software updates, 26
summary, 20
system start-up, 7
system type, 13
time zone, 13
user, 17, 26
expert settings, 18
windows, 6
workflow, 7
installing
YaST, with, 3-28
internet
cable modem, 53
cable modem checklist, 53
configuring, 51
direct connection, 51
dsl, 51
dsl checklist, 51
isdn, 52
isdn checklist, 52
modem, 52
modem checklist, 52
network checklist, 53
network connection, 53
Internet
connecting to, 55
J
jobs
shell, 104
K
kill, 113
killall, 113
L
less, 102, 110
license agreement, 10
Linux
basic concepts, 73
case-sensitivity, 76
file extensions, 76
file system, 75
hidden files, 77
multiuser system, 73
ln, 107
locate, 109
ls, 86-87, 106
options, 87
M
man pages, 88, 106
memory test, 8
mkdir, 107
more, 103
mount, 111
device, 75
drive, 75
partition, 75
removable media, 75
mv, 107
N
NetworkManager, 55
configuring, 56
enabling, 55
GNOME NetworkManager applet, 62
KNetworkManager, 59
security, 65
troubleshooting, 68
VPN, 64
Novell/SUSE manuals, vii
O
options
--help, 88
P
partition
mount, 75
partitions
creating, 14
resizing Windows, 15
passwd, 114
passwords
changing, 114
paths, 89
absolute, 89
relative, 90
permissions
changing, 94, 108
execute, 82
read, 82
write, 82
ping, 113
pipes
shell, 103
printing
configuration with YaST, 31-36
local printers, 32
network printing, 34
sharing printers, 35
processes, 112
killing, 113
overview, 113
shell, 104
ps, 113
R
reboot, 114
recovering partitions, 156
recovering systems, 152
redirection
shell, 103
removable media
mount, 75
repairing systems, 152
rescue system, 157
starting from medium, 157
starting from network source, 157
rm, 107
rmdir, 107
S
scanning
configuring, 36
HP All-In-One, 37
network, 37
security
users, 74
shell
basics, 85
jobs, 104
pipes, 103
processes, 104
prompt, 86
redirection, 103
root, 93
starting, 85
shells
commands, 106-114
sound
configuring in YaST, 29
fonts, 31
MIDI, 31
ssh, 114
su, 114
system
rebooting, 114
rescuing, 157
shutdown, 114
T
tail, 102
tar, 109
TLDP, 121
HOWTOs, 122
top, 112
U
umount, 111
updatedb, 109
US Keyboard Layout, 134
users
concept, 73
groups, 74
roles, 73
root, 73
superuser, 73
system administrator, 73
V
vi, 100
VPN, 64
W
Wild Cards
Bash, 97
wild cards, 109
Y
YaST
add-on, 12
clock, 13
desktop selection, 13
domain name, 24
hardware
information, 132
hostname, 24
installation mode, 11
installation settings, 20
installation summary, 20
installing with, 3-28
keyboard, 10
language, 10
media check, 8, 132
network configuration, 24
online update, 26
partitioning, 14
printer configuration, 31-36
local printers, 32
network printing, 34
sharing printers, 35
repairing systems, 152
rescue system, 8
root password, 19
scanner, 36
HP All-In-One, 37
network, 37
software updates, 26
sound cards, 29
starting, 7
system start-up, 7
system type, 13
time zone, 13