Free Essay

Configure Linux Machine

In:

Submitted By rnbarne
Words 634
Pages 3
I would like to preface this instructional document regarding the installation of Ubuntu through VirtualBox by stating that I encountered several occurrences of trial and error and this is the final resolution. I chose option two which was using VirtualBox® virtual machine on a local computer host platform. This installation was done on a desktop currently running Windows 7.

First and foremost it is recommended that you free up enough space on your hard drive to install these programs. I personally allotted myself about 12GB just to play it safe but I didn't end up using near that much. To do this you can do a number of things including the following: Perform a disk cleanup on your main hard drive Remove any unused programs through the control panel Move any files possible to another drive with more space Next, download VirtualBox from http://www.virtualbox.org/wiki/Downloads. (select package x86/amd64) Once downloaded, run the installation file and select all default settings. If required, restart the machine when prompted to complete the installation.

Now you're ready to install the virtual machine using VirtualBox. Download the required software from the following Web address: http://webapps.national.edu/linuxiso/ubuntu-10.04.iso I discovered you will also need to download another Ubuntu iso file that you will use later in this document. Visit http://ubuntu-release.locaweb.com.br/10.04/ and download the link titled: ubuntu-10.04.1-desktop-i386.iso Once you've got all your essentials downloaded, you will now run VirtualBox by launching the shortcut contained on the desktop. Now that VirtualBox is open, you must click the New button on the toolbar to launch the New Virtual Machine Wizard. Proceed with the installation. When you reach the VM Name and OS Type dialogue box, use Ubuntu 10.04.1 for the name, linux 64bit (or 32bit if that's what your machine requires) for the operating system, and Ubuntu for the version. Use the default memory setting of 512MB. When you reach the Virtual Hard Disk dialogue box, select Boot Hard Disk as well as Create new hard disk. Proceed on. When you are asked which hard disk storage type to use, select fixed-sized storage. Select your preferred disk size. It may be adjusted to any size as long as sufficient disk drive space is available. Proceed through to the finish. When you've navigated through to the end of the Virtual Machine Wizard, you will return to the Oracle VM VirtualBox Manager screen and there will now be an entry for your newly created virtual machine. Select ‘Display’ and adjust the Video Memory to 32MB. Next, click on ‘Storage’ and set the virtual CD to the Ubuntu ISO image that I previously spoke about (the one I said you would need later in the document on step 2). You've now properly configured the virtual machine.

Now we're moving on to the installation of Ubuntu 10.04.1 Linux into the Virtual Machine.

Double-click the “Ubuntu 10.04.1” entry. This will launch the new virtual machine and install Ubuntu from the specified virtual CD. If warnings appear, just click your way through them. I personally didn't experience any. Select the language and click on the “Install Ubuntu 10.04.1 LTS” button. Set your time zone. Select the default option for the keyboard layout. Now is the step you'll be thanking me for having you free up some disk space prior to now. Select “erase and use the entire disk”. Next, you will enter some requested user information (i.e. username, password, etc.). You are now ready to install. Click the install button and wait. You may be prompted to restart when done. If so, go ahead and restart. You have now installed Ubuntu through VirtualBox.

Similar Documents

Free Essay

Redhat

...LINUX-6 Curriculum chnoworld ive Development | Training | Consultancy Rh124 Red Hat System Administration I Red Hat System Administration I (RH124) is designed for IT professionals who are new to Linux and require core Red Hat Enterprise Linux skills. Focused on administration tasks that will be encountered in the workplace, this course will actively engage students in task-focused activities, labbased knowledge checks, and facilitative discussions to ensure maximum skill transfer and retention. In addition, GUI-based tools will be featured to build on the students' existing technical knowledge, while key command line concepts will be introduced to provide a foundation for students planning to become fulltime Linux system administrators. By the end of the five-day course, students will be able to perform installation, establish network connectivity, manage physical storage, and perform basic security administration. LINUX-6 Course Outline Unit 1: Get Started with the GNOME Graphical Desktop Objective: Get started with GNOME and edit text files with gedit Unit 2: Manage Files Graphically with Nautilus Objective: Manage files graphically and access remote systems with Nautilus Unit 3: Get Help in a Graphical Environment Objective: Access documentation, both locally and online Unit 4: Configure Local Services Objective: Configure the date and time and configure a printer Unit 5: Manage Physical Storage I Objective: Understand basic disk concepts and manage system...

Words: 1463 - Pages: 6

Premium Essay

Unix Administration Chapter 2

...Advanced SUSE Linux Enterprise Server Administration (Course 3038) Chapter 2 Configure the Network Manually Objectives • • • • Understand Linux Network Terms Set Up Network Devices with the ip Tools Save Device Settings to a Configuration File Set Up Routing with the ip Tool Advanced SUSE Linux Enterprise Server Administration (Course 3038) 2 Objectives (continued) • Save Routing Settings to a Configuration File • Configure Host Name and Name Resolution • Test the Network Connection with Command-Line Tools Advanced SUSE Linux Enterprise Server Administration (Course 3038) 3 Understand Linux Network Terms • Device – Network adapter built into the system • Link – Used by command-line tool ip to refer to the connection of a device to the network • Address – IP address assigned to a device • Broadcast – Refers to the broadcast address of a network • Route – Path IP packet takes from source to destination host Advanced SUSE Linux Enterprise Server Administration (Course 3038) 4 Set Up Network Devices with the ip Tool • Command-line ip tool – Changes the network card configuration • Used to perform the following tasks – Display the Current Network Configuration – Change the Current Network Configuration Advanced SUSE Linux Enterprise Server Administration (Course 3038) 5 Display the Current Network Configuration • IP address setup – Syntax • ip address show Advanced SUSE Linux Enterprise Server Administration (Course...

Words: 1162 - Pages: 5

Free Essay

Network Implementation

...| | | | | | | | | | Network Implementation Plan Network Implementation Plan Table of Contents Implementing IPv6 3 Great Clips: Implementing a Network Plan Configuring IPv6 on a Juniper Router Network Infrastructure Design 6 Installing Ubuntu on Virtual Box Linux Networking 9 Linux Network Commands Analyzing Network Traffic 14 Network Sniffer Applications: Compare and Contrast Installing Wireshark: Running a TCP Packet Trace Network Security 16 Access Control Lists (ACL) ACL Command Examples To configure an ACL on a router To configure an ACL on a switch References 18 Implementing IPv6 Great Clips: Implementing a Network Plan Great Clips is a hair salon franchise through the United States and Canada. The first salon opened in 1982 and the first franchise opened in 1983 both in the state of Minnesota. In 1988, there were 150 franchises and by 2014, there are now well over 3000. Because of this tremendous growth, I have selected this company for which I will implement a network plan that will support seamless sharing and connection between various company locations. The routing protocols for IPv6 are similar to IPv4 but have been adjusted accordingly. There are two forms of routing protocols, Distance Vector routing and Link-State routing protocols. Distance Vector rules consider distance between nodes and the number of hops data must travel through before it reaches its destination. Distance Vector protocols...

Words: 2004 - Pages: 9

Free Essay

Securing Linux Lab Assignment

...demonstration. Part #1 Apply Hardened Security for Linux Services & Applications Learning Objectives and Outcomes Upon completing this lab, students will learn about the following tasks: * Harden Linux server services when enabling and installing them, and keep a security perspective during configuration * Create an Apache Web Server installation and perform basic security configurations to assure that the system has been hardened before hosting a web site * Configure and perform basic security for a MySQL database, understanding the ramifications of a default installation and recommending hardening steps for the database instance * Install, setup and perform basic security configuration for Sendmail to be able to leverage the built-in messaging capabilities of the Linux System * Enable and implement secure SSH for encrypted remote access over the network or across the Internet of a Linux server system Overview This lab is an extension of the previous hands-on labs, and it incorporates security hardening for Linux services and applications loaded in the physical server. This demonstration will configure security and hardened services and applications to ensure C-I-A of these services. It will take the steps to configure and secure an Apache web server and MySQL database and the components necessary to security harden the implementation of both. The students will also see how to use and configure the Sendmail application for secure local messaging...

Words: 2020 - Pages: 9

Free Essay

Dr Powell

...I have learned a lot of informative information in this class. From reading the book to doing the actual virtual assigned labs. The labs were very detailed which made is very interesting to work on them. Completing the class labs made the book make a lot more sense because I was able to do the actual hands on part with the labs on the virtual network. One interesting thing I learned taking this class was about the CAC card that I thought was just a very simple access card, but taking this class Dr. Powell broke it down into sections of how it works. I also worked on Linux and have a better understanding of the operating system. The Common Access Card, usually known as the CAC card, is a smart card about the size of a credit card. This card is the standard identification for United States Department of Defense (DoD) civilian employees, active-duty military personnel, Selected Reserve, and eligible contractor personnel. The CAC is designed to provide two factors of authentication; what the user has which is the physical card, and what the user and only the user themselves know which is the pin/password. It's also the principal card that’s used to enable physical access to buildings and controlled spaces, and it also provides access to defense computer systems and networks. The integrated circuit chip (ICC) which is the the little gold chip that is usually located at the bottom of the card contains information about the owner, including the PIN and one or more PKI digital certificates...

Words: 1397 - Pages: 6

Free Essay

Nt 1430 Final Review

...EM64T) v. Mac PowerPC (PPC) 3. Know how the root of the file system is represented. a. The root is represented by a / b. Fedora uses the Filesystem Hierarchy Standard (FHS) file system structure, which defines the names, locations, and permissions for many file types and directories. c. The two most important elements of FHS compliance are: i. Compatibility with other FHS-compliant systems ii. The ability to mount a /usr/ partition as read-only. This is especially crucial, since /usr/ contains common executables and should not be changed by users. In addition, since /usr/ is mounted as read-only, it should be mountable from the CD-ROM drive or from another machine via a read-only NFS mount. 4. Know what the cp command is used for. a. The Linux cp command is usually used to copy files and copy directory in Linux operating system. The cp command also can be used to make a link to other file in the system. 5. Know what the mv command is used for. a. The mv command is used to move files or rename to a different location or directory. 6. Know what the tail command does. a. Tail prints the last N number of lines from given input. By default, it prints last 10 lines of each given file. 7. Know what...

Words: 1334 - Pages: 6

Free Essay

Step-by-Step Install Guide Liferay Portal Enterprise on Linux V1.0

...Labs Step-by-Step Install Guide Enterprise Liferay Portal v1.0 Global Open Versity IT Systems Integration Hands-on Labs Training Manual Step by Step Install Guide Liferay Portal Enterprise on Linux Kefa Rabah Global Open Versity, Vancouver Canada krabah@globalopenversity.org www.globalopenversity.org Table of Contents Page No. STEP-BY-STEP INSTALL GUIDE LIFERAY PORTAL ENTERPRISE ON LINUX Part 1: Install JDK6 Part 2: Quick Liferay Portal Installation with Default HSQL Database Part 3: Install MySQL Database for Liferay Enterprise Step 1: Install and configure MySQL Database Server Part 4: Install Liferay for an Enterprise Step 1: Remove Default Bundled Sample Data Step 2: Create Portal.Ext.Properties File Part 5: Need More Training 2 3 4 6 6 7 8 8 11 © A GOV Open Knowledge Access Technical Academic Publications License Enhancing education & empowering people worldwide through eLearning in the 21st Century © April 2007, Kefa Rabah, Global Open Versity, Vancouver Canada 1 www.globalopenversity.org ICT202 - Linux Enterprise Infrastructure Engineering Diploma Global Open Versity Labs Step-by-Step Install Guide Enterprise Liferay Portal v1.0 Global Open Versity IT Systems Integration Hands-on Labs Training Manual Step-by-Step Install Guide Liferay Portal Enterprise on Linux By Kefa Rabah, krabah@globalopenversity.org Feb 09, 2010 SerengetiSys Labs Project: your company – an enterprise business concern recently is deploying a new network infrastructure and they would...

Words: 3512 - Pages: 15

Premium Essay

Ubuntu Dns Server

...| 15 | Code | NW701 | Level | 7 | Id | | Name | | Date | | Signature | | Aims: 1. To equip students with the skills necessary to enable them to manage network operating systems. Date | 6/08/2014 | Time | 9:30 | Learning Outcomes | 1, 2,3 | Assessment Weightings: | 100 Marks in total converted to 40% of final grade | Conditions: | In class individual test. Closed book. Practical task in laboratory conditions, and presentation | Time Allowed: | 1 Hours (practical not included) (plus 15-30 minutes practical time for each student) | Learning Outcomes Assessed: Learning outcomes assessed | Questions | Marks | Assessment Weighting % | 2 | Perform and evaluate tasks that will deploy and configure a network operating system | Task1 Task 2Task 3 | 30 2020 | 50% | 4 | Evaluate how a networking operating system uses the OSI model | Task 1 | 30 | 20% | 5 | Compare and contrast two network operating systems | Task 4 | 30 | 30% | Task Number | Marks allocated | Marks obtained | 1 | 30 | | 2 | 20 | | 3 | 20 | | 4 | 30 | | Total Marks | 100 | | Instructions: 1. You should attempt ALL the questions in this test. 2. Check all the tasks in the assessment 3. Task One is an individual project. 4. Task Two ,Three and Four are practical tasks 5. Read instructions carefully. 6. Write your full name and student ID number on the cover sheet of the answer booklet. 7. Write your full name on...

Words: 1296 - Pages: 6

Premium Essay

Is3440 Linux Security Lab 1

...sure you label each section accordingly and answer all the questions. For this lab it is recommended that you review the Demo Lab presentations in the Unit 1 and Unit 2 Learning Space. Click the PRACTICE link > DEMO LAB > then click the hyperlink to launch the demonstration. Part # 1 Install a Core Linux Operating System on a Server Learning Objectives and Outcomes Upon completing this lab, students should know more about the following tasks: * Install a base Linux operating system using a Fedora core Linux server for production use on the VM server farm * Create secured partitions within the core Linux server for desired security hardening, performance, and application support * Enable a network time server during installation to maintain a synchronized time setting throughout the system * Set a hostname that is descriptive of the role of the server to maintain standard and concise naming conventions during installation * Create a non-privileged user account for system administration access as a secure alternative to logging in as root user Overview In this lab the students will see how to install and partition a Fedora Core Linux Server. The installation process, applying passwords, creating partitions, and system administrator access controls will be part of the operating system configuration requirements. The demonstration will show how to use the terminal or terminal emulator for command line configurations and implementation. ...

Words: 1494 - Pages: 6

Free Essay

Python

...NOS 120 Linux/UNIX Single User Compiling Linux Software from Source Code Objectives After reading this chapter and completing the exercises, you will be able to: * Understand basic elements of C programming * Debug C programs * Create, compile, and test C programs Text Reference: Chapter 10 – Developing UNIX/Linux Applications in C and C++ Programming Overview A computer program is a list of instructions given to a computer to make it perform a specific task or series of tasks. A programmer communicates these instructions to the computer in a language the computer understands. Computers, however, can only operate using binary code (1’s and 0’s), which makes a computer’s language very difficult for humans to understand. The solution to this problem is to create an intermediate language that both humans and computers can understand. These are called programming languages. Programmers create a list of instructions for the computer in a programming language such as C, C++, or Java. The C Programming Language The C programming language was released in 1973. C was created by Brian Kernighan, Dennis Ritchie and Ken Thompson working at Bell Labs. Both the UNIX and Linux operating systems are written in C. The C programming language is a high-level language because the code itself is written in relatively English-like statements. In 1978, Kernighan and Ritchie wrote "The C Programming Language," still one of the best C programming books available...

Words: 2308 - Pages: 10

Free Essay

Hardware Support

...SYSTEM RESEARCHED: LINUX) A common boast among Linux kernel developers is that Linux supports more devices than any other operating system in history. Indeed, device drivers account for more than half of the code in the Linux kernel. However, many devices exist that are still unsupported by Linux, and one of the best ways for a developer to get his or her code into the Linux kernel is by writing a driver for one of these. Writing a driver is also one of the most common tasks initially assigned to those hired by a company to do Linux kernel development. For these reasons, students find it particularly interesting to write a device driver as a project. Unfortunately, since our development environment involves VMs hosted on a remote server and because we are constrained to work within a ten-week quarter, it is difficult to find real devices for which students can easily write drivers. Moreover, providing devices to students might be financially infeasible, even if an appropriate device could be found. We have thus found it easiest for students to write a driver for a virtual device. Specifically, we have them implement a RAM disk driver, which allocates a large block of memory and presents it in the form of a block device ------------------------------------------------- Supported Hardware Ubuntu does not impose hardware requirements beyond the requirements of the Linux kernel and the GNU tool-sets. Therefore, any architecture or platform to which the Linux kernel, libc, gcc...

Words: 2453 - Pages: 10

Free Essay

Oracle Rac Setup

...Build Your Own Oracle RAC Cluster on Oracle Enterprise Linux and iSCSI (Continued) The information in this guide is not validated by Oracle, is not supported by Oracle, and should only be used at your own risk; it is for educational purposes only. 12. Create "oracle" User and Directories Perform the following tasks on both Oracle RAC nodes in the cluster! In this section we will create the oracle UNIX user account, recommended O/S groups, and all required directories. The following O/S groups will be created: Description | Oracle Privilege | Oracle Group Name | UNIX Group name | Oracle Inventory and Software Owner |   |   | oinstall | Database Administrator | SYSDBA | OSDBA | dba | Database Operator | SYSOPER | OSOPER | oper | We will be using the Oracle Cluster File System, Release 2 (OCFS2) to store the files required to be shared for the Oracle Clusterware software. When using OCFS2, the UID of the UNIX user " oracle" and GID of the UNIX group " oinstall" must be the same on both of the Oracle RAC nodes in the cluster. If either the UID or GID are different, the files on the OCFS2 file system will show up as "unowned" or may even be owned by a different user. For this article, I will use 501 for the " oracle" UID and 501 for the " oinstall" GID. Note that members of the UNIX group oinstall are considered the "owners" of the Oracle software. Members of the dba group can administer Oracle databases, for example starting up and shutting down databases. Members...

Words: 13991 - Pages: 56

Premium Essay

Redhat

...edhat® ® Te r r y C o l l i n g s & K u r t W a l l UR ON IT OOLS IN Y T C E CD-R L TH O ED UD M Linux Solutions from the Experts at Red Hat ® ® P R E S S™ SEC Red Hat® Linux® Networking and System Administration Red Hat® Linux® Networking and System Administration Terry Collings and Kurt Wall M&T Books An imprint of Hungry Minds, Inc. Best-Selling Books G Digital Downloads G e-Books G Answer Networks e-Newsletters G Branded Web Sites G e-Learning New York, NY G Cleveland, OH G Indianapolis, IN Red Hat® Linux® Networking and System Administration Published by Hungry Minds, Inc. 909 Third Avenue New York, NY 10022 www.hungryminds.com Copyright © 2002 Hungry Minds, Inc. All rights reserved. No part of this book, including interior design, cover design, and icons, may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording, or otherwise) without the prior written permission of the publisher. Library of Congress Control Number: 2001093591 ISBN: 0-7645-3632-X Printed in the United States of America 10 9 8 7 6 5 4 3 2 1 1O/RT/QT/QS/IN Distributed in the United States by Hungry Minds, Inc. Distributed by CDG Books Canada Inc. for Canada; by Transworld Publishers Limited in the United Kingdom; by IDG Norge Books for Norway; by IDG Sweden Books for Sweden; by IDG Books Australia Publishing Corporation Pty. Ltd. for Australia and New Zealand; by TransQuest Publishers Pte Ltd. for Singapore, Malaysia, Thailand...

Words: 220815 - Pages: 884

Free Essay

Public Administration

...Terrez Ellis 68745 February 2, 2011 A+ Computer Operating Systems Crt 1101 Physical Security Physical Security The first layer of security you need to take into account is the physical security of your computer systems. Who has direct physical access to your machine? Should they? Can you protect your machine from their tampering? Should you? How much physical security you need on your system is very dependent on your situation, and/or budget. If you are a home user, you probably don't need a lot (although you might need to protect your machine from tampering by children or annoying relatives). If you are in a lab, you need considerably more, but users will still need to be able to get work done on the machines. Many of the following sections will help out. If you are in an office, you may or may not need to secure your machine off-hours or while you are away. At some companies, leaving your console unsecured is a termination offense. Obvious physical security methods such as locks on doors, cables, locked cabinets, and video surveillance are all good ideas, but beyond the scope of this document. :) Computer locks Many modern PC cases include a "locking" feature. Usually this will be a socket on the front of the case that allows you to turn an included key to a locked or unlocked position. Case locks can help prevent someone from stealing your PC, or opening up the case and directly manipulating/stealing your hardware. They can also sometimes prevent someone from...

Words: 804 - Pages: 4

Free Essay

Linux as a Personal Desktop Operating System

...Table of Contents Beginning Red Hat Linux 9 ...............................................................................................................................1 Introduction.........................................................................................................................................................4 Who Is This Book For?...........................................................................................................................4 What You Need to Use This Book.........................................................................................................4 What Is Linux? ........................................................................................................................................5 Linus Torvalds and the Birth of Linux.............................................................................................5 Why Choose Linux?.........................................................................................................................6 What Is Red Hat Linux 9?................................................................................................................7 What Is Covered in This Book?..............................................................................................................8 Conventions in This Book......................................................................................................................9 Customer Support...............

Words: 155032 - Pages: 621