Free Essay

How to Install Ubuntu

In: Computers and Technology

Submitted By BadestB
Words 867
Pages 4
How To Install Ubuntu Linux

By: Iptisam “Sam” Petzold Brown Mackie College SSE0050 Due: March 22, 2016

How to Install Ubuntu Linux Ubuntu is a version of Linux created to be easy to use, especially for those who are new to Linux. It has a Linux kernel based on Debian and is distributed as a free and open source software, not to mention that it is one of the most popular distributions for the desktop and server. Ubuntu also runs on phones. Ubuntu offers a LiveCD environment that lets you run the operating system from a media without making any changes to your hard drives. This is a pretty cool feature because you can essentially test-drive the OS before you actually install it. Once you create a bootable USB installation media, you can plug it into any computer, boot into Ubuntu, and download any data on the usable/ data storage partition. Before using Linux, my suggestion is that you brush up on your familiarity working with commands in the command line, because Ubuntu primarily uses the command line for most everything… then good luck and enjoy!
Required supplies: * Downloaded ISO image (derives its name from the group’s standard for optical disc file systems, ISO 9660) of Ubuntu * Universal Serial Bus (USB) Bootable Ubuntu Installation Media (Thumb Drive 2GB or larger) * A laptop running Windows7 (with partitioned hard drive). * ***Possibly one or all of these programs installed to help you achieve the items required above: Startup Disk Creator, Partition Magic, & Gnome Partition Editor (GParted).***
Pre-Installation:
1)Create a bootable installation media prior to this installation on a thumb drive that is at least 2GB, but preferably larger, from ISO image downloaded on your computer. (Use Startup Disk Creator or Partition Magic which are both good programs to help you create bootable media from ISO files).
2)Partition your hard drive prior to this installation. ***Please use caution because modifying your operating systems partitions is inherently dangerous and can result in data loss if not done correctly!!!***(GParted is a program that allows the user to create, delete, and re-format any partition on their hard drive with just a few simple clicks!) ***Note: One of the partitions needs to be New Technology File System (NTFS format for Windows) and the other partition needs to be Forth Extended File System (ext4 for Ubuntu). ***
3)The main bootloader for Ubuntu is called Grand Unified Bootloader version two (Grub2), and presents itself every time you boot up your computer. If you want to continue having Grub2 manage your operating systems in a dual boot scenario, install Windows first on the machine, then Ubuntu. Windows also has a bootloader and it does not like to show you that there is another OS on the computer… (let’s just say it gets jealous)!
Installation of Ubuntu:
1)Insert the USB installation media into a free port on the computer which you want to run Ubuntu on. (You’ll need to change the boot order in the BIOs BIOs of the computer, that way it will start-up using the installation media rather than your usual operating system.)
2)Turn off & turn back on pressing either F2, F5, F6, F8, or F10. Then go to the boot order list and move the USB port to the top of the list. Save your changes and then exit the BIOs.
3)When the installation wizard brings you into the Ubuntu Live System, click the install icon on the desktop.
4)Then, choose your language and click the install Ubuntu button.
5)If you have an internet connection, you can check “Download update while installing” and “install this third-party software,” but this takes time. So, I recommend skipping them and then installing them after you have installed Ubuntu.
6)Now, choose either: to format the hard drive and install Ubuntu, Install Ubuntu & Windows7, side-by-side (which is the way we are doing in this instruction), or Something else; like manually partitioning your hard disk.
7)Once the computer is booting from the USB drive, Ubuntu will load basic services and bring you to the main install screen, which can take a while to show up. So, allow up to 5 minutes for lower spec computers.
8)Click install Ubuntu
9)Click install this third-party software
10)Select erase disk and install now button.
11)Choose your time zone, then click continue.
12)Next, choose your keyboard layout & language.
13) Enter a username and password, leave the other options at default.
14)Then click the log-in later button.
15)Ubuntu will now be installing, this can take up to one hour, so grab and ice cream or go for a smoke break!!! You’ve earned it!!!
16)Afterwards, click the restart now button.
17) After reboot, enter your newly created username and password to log-in to Ubuntu.
18)You should now be on your new Ubuntu Unity Desktop!!! Congratulations!!! You can now explore your own free and open source software which is available using the built-in software center (the icon on the left-pane) and also customize the Ubuntu Unity Desktop to your own personal preferences!!! Enjoy!

Similar Documents

Free Essay

How to Dualboot Linux and Windows

...How to Dual-boot Linux and Windows (on a PC with Windows 7 already installed) The purpose of this Instructable is to set up your computer to dual-boot Windows 7 and Ubuntu Linux. Dual-booting is a technique which allows a single physical computer to run two or more operating systems (OSes). This is useful for experimenting with new OSes without putting all your eggs in one basket. Step 1: Getting Prepared Prerequisites: 1. A PC running Windows 7, with at least 30 GB of free hard-drive space. 2. A CD/DVD burner and blank CD/ DVD or a USB drive with a capacity of 1GB or more 3. An external Harddrive big enough to backup your Windows installation 4. Administrative access to the PC 5. Internet Connectivity Most PCs sold in the last three years should meet the criteria for number 1. To confirm what version of Windows you are running, go to My Computer and click on “System properties.” The listed version should be Windows 7. From that same screen, you should see how much free space you have left, which is underneath the blue bar for each disk. In the example image, there is "8.49 GB free of 55.7GB". NOTE: The 8.49GB shown in the example is not enough space for most people. While you can install Ubuntu to a partition this size, you will typically want more space store documents and applications. 20GB is probably the minimum size you would want. Step 2: Select a Linux Distro Linux comes in many flavors. Some distributions are aimed at full......

Words: 1716 - Pages: 7

Premium Essay

University of Phoenix Pos/355 Introduction to Operating Systems Week 3

...Windows 8 on my Asus machine the windows operating system was installed when I purchased my machine. For my Virtual operating system I chose an Ubuntu (64bit) operating system since I had no former experience with it I will be running the operating system on the Oracle VM Box Manager. My first experience with the Virtual Operating system is that I had to go to https://www.virtualbox.org/ to download the files to use to get the program for the virtual operating system. This took some leg work for me because I wanted to make sure that I was doing this correctly I didn’t want to accidently download a virus or something that would hurt my machine or break it so to speak. I consulted http://www.pythian.com and I found that the information there seemed legitimate so I went ahead with the downloading process. When you look on the site for the Oracle VM Box Manager they do include a very detailed manual so I found the correct install for my host which is windows it only took a couple of minutes for it to download. Once downloaded you go through the wizard which is pretty straight forward but I do highly suggest keeping the manual open for a reference so that you are able to know how much RAM to allocate your guest operating system. Once you have your virtual machine named and set up with a virtual hard drive you are ready to install your guest your operating system. Don’t worry there is a wizard for this and again there is also the handy manual located on their site.......

Words: 985 - Pages: 4

Free Essay

Blah

...NOS 120 Journal Ubuntu 10.04 This document is a periodical listing of all assignments and instructions completed in the NOS 120 class. 2011 NOS 120 Journal Ubuntu 10.04 This document is a periodical listing of all assignments and instructions completed in the NOS 120 class. 2011 ------------------------------------------------- Table of Contents: Table of Contents ………………………………………………………………………………………………………………………………… 2 Table of Contents (cont.) …………………………………………………………………………………………………………………….. 3 Course Syllabus ……………………………………………………………………………………………………………………………………. 4 Journal Post (8/17) ……………………………………………………………………………………………………………………………… 13 Chapter 1 Questions …………………………………………………………………………………………………………………………… 14 Journal Post (8/24) ……………………………………………………………………………………………………………………………… 16 Chapter 2 Questions ……………………………………………………………………………………………………………………………. 17 Journal Post (9/7) ………………………………………………………………………………………………………………………………… 18 Chapter 3 Questions ……………………………………………………………………………………………………………………………. 19 Journal Post (9/12) ……………………………………………………………………………………………………………………………… 20 Chapter 4 Questions …………………………………………………………………………………………………………………………… 21 Chapter 5 Questions …………………………………………………………………………………………………………………………… 23 NOS 120 Test 2 …………………………………………………………………………………………………………………………………… 24 Linux File System vs. Windows File System …………………………………………………………………………………………. 27 Journal Post (9/14) ……………………………………………………………………………………………………………………………… 28 10.04 Sources List......

Words: 17866 - Pages: 72

Free Essay

Hardware Support

...it is difficult to find real devices for which students can easily write drivers. Moreover, providing devices to students might be financially infeasible, even if an appropriate device could be found. We have thus found it easiest for students to write a driver for a virtual device. Specifically, we have them implement a RAM disk driver, which allocates a large block of memory and presents it in the form of a block device ------------------------------------------------- Supported Hardware Ubuntu does not impose hardware requirements beyond the requirements of the Linux kernel and the GNU tool-sets. Therefore, any architecture or platform to which the Linux kernel, libc, gcc, etc. have been ported, and for which an Ubuntu port exists, can run Ubuntu. Rather than attempting to describe all the different hardware configurations which are supported for AMD64, this section contains general information and pointers to where additional information can be found. Supported Architectures Ubuntu 12.04 supports...

Words: 2453 - Pages: 10

Free Essay

Hadoop Setup

...(GFS) and of the MapReduce computing paradigm. Hadoop’s HDFS is a highly fault-tolerant distributed file system and, like Hadoop in general, designed to be deployed on low-cost hardware. This document describes how to install, configure and manage non-trivial Hadoop clusters ranging from a few nodes to extremely large clusters with thousands of nodes. Required Software Required software for Linux and Windows include: 1. Java 1.6.x, preferably from Sun, must be installed. 2. ssh must be installed and sshd must be running to use the Hadoop scripts that manage remote Hadoop daemons. Installation Installing a Hadoop cluster typically involves unpacking the software on all the machines in the cluster. Typically one machine in the cluster is designated as the NameNode and another machine the as JobTracker, exclusively. These are the masters. The rest of the machines in the cluster act as both DataNode and TaskTracker. These are the slaves. The root of the distribution is referred to as HADOOP_HOME. All machines in the cluster usually have the same HADOOP_HOME path. Steps for Installation 1. Install java 1.6 Check java version: $ java –version 2. Adding dedicated user group $ sudo addgroup hadoop $ sudo adduser --ingroup hadoop hduser 3. Install ssh $ su - hduser Generate keypairs: $ ssh-keygen -t rsa -P "" Enable access to the local machine: $ cat $HOME/.ssh/id_rsa.pub >> $HOME/.ssh/authorized_keys $ ssh localhost 4. Disable IPV6 $ sudo gedit......

Words: 1213 - Pages: 5

Free Essay

Linux

...was the first Linux operating system distributed via a live CD-ROM. It included an automatic configuration of the software installation, much like we see today, making it very easy for even a novice user to set it up. Yggdrasil was not free, however, the company charged $39.95 per copy (Yggdrasil Computing). After conducting research of the number of distribution of Linux, the exact number could not be pinpointed. There are so many developers tweaking the Linux kernel and submitting their version for the public. However, after navigating to DistroWatch, I found a lost list of variation of Linux. After scrolling through the list of their recognized distribution, I counted 301 different distributions of Linux. They ranged from CentOS, to Ubuntu, to Yellow Dog. I even found a distribution named “Damn Small” that is based on Debian and KNOPPIX. The 301 versions I...

Words: 1003 - Pages: 5

Free Essay

Digital Forensic Investigation Bsc Submission

...Assessment Criteria (Marks Breakdown) Please note that during the preparation of your assignment documentation, you must include the following marking table. Ensure you fill in the details of your full name and student ID. Name/ Student ID: Preperation of the executive summary and legal warrants (10) Documentation (10) Conclusions/recommendations (10) Referencing (10) Evidence identification and preservation (15) Critical analysis and evaluation of the case (15) Q&A session during presentation (30) Total (100) The marking table must be placed on a single page, located as either the second or third page of your final assignment documentation.   Contents EXECUTIVE SUMMARY 2 AUTHORIZATION 3 IDENTIFICATION 4 COLLECTION AND PRESERVATION 5 Mr. Mike’s Work-Station 5 TTBANK Server 5 CHAIN OF CUSTODY FORM 7 EXAMINATION AND ANALYSIS 8 EVIDENCES RECOVERED 8 RECONSTRUCTION 11 RELATIONAL ANALYSIS 12 CONCLUSION & RECOMMENDATION 13   EXECUTIVE SUMMARY This is the case involving the staff of TTBANK that was suspected of misuse of company property due to that staff bragging about gaining access to privileged information to his colleagues that he should have otherwise not have gotten access to. The issue first came to the attention of Mr. Ali, the Enterprise Systems Administrator of TT Bank who had investigated silently to discover the identity of the staff and that the person was a member of the Loans Department and his name was Mr.......

Words: 1635 - Pages: 7

Free Essay

Security Summarized

...Security summarized 1. First of all: there is no 100 % security. Not in real life and not in the digital world. Not even when your computer is running Linux. You should always use your common sense. And even then it can go wrong. A certain amount of risk, however small, is unavoidable. A Frenchman would say: c'est la vie. About viruses, firewalls and exploits I can be brief: Antivirus software 1.1. You don't need antivirus software in Ubuntu, Linux Mint and Debian. Because a virus can't do anything in Linux. Mainly because of this: in order to install on your computer, a virus needs your password. And that it doesn't have. Furthermore, you generally only install software from the secured "software store" (repositories) of your Linux distribution. This is a very effective barrier against malware. Therefore there are no Linux viruses "in the wild" (with the exception of web servers, but securing web servers is quite a different cup of tea). The best protection against viruses is this: - install a well-supported Linux, like Ubuntu or Linux Mint; - check daily for updates; - don't use antivirus, as antivirus in Linux gives only a false sense of security, but simply use your common sense. For the full story, read on (item 2 and further). Firewall 1.2. A firewall is already installed by default. It's called IPtables. IPtables can be managed through the application Uncomplicated Firewall (ufw), which is also installed by default. By default the......

Words: 2232 - Pages: 9

Free Essay

Paper

...Full Circle THE INDEPENDENT MAGAZINE FOR THE UBUNTU LINUX COMMUNITY ISSUE #90 - October 201 4 Photo: miss_millions (Flickr.com) P R I S O N AR C H I T E C T BUILD YOUR OWN OPEN SOURCE PRISON Fu ll Ci rcle M a g a zi n e i s n e i th e r a ffi li a te d wi th , n o r e n d o rse d b y, Ca n o n i ca l Ltd . full circle magazine #90 1 contents ^ HowTo OpenConnect to Cisco p.1 4 Full Circle THE INDEPENDENT MAGAZINE FOR THE UBUNTU LINUX COMMUNITY Linux News p.04 BACK NEXT MONTH LibreOffice p.1 5 Command & Conquer p.1 2 Arduino p.25 LinuxLabs p.XX Broadcast With WCS p.1 7 Linux Labs p.28 Review p.36 My Story p.37 BACK NEXT MONTH Blender p.XX Letters p.40 Tuxidermy p.41 Q&A p.42 BACK NEXT MONTH Inkscape BACK NEXT MONTH Ubuntu Women p.XX Ubuntu Games p.44 Graphics p.22 Security p.XX The articles contained in this magazine are released under the Creative Commons Attribution-Share Alike 3.0 Unported license. This means you can adapt, copy, distribute and transmit the articles but only under the following conditions: you must attribute the work to the original author in some way (at least a name, email or URL) and to this magazine by name ('Full Circle Magazine') and the URL www.fullcirclemagazine.org (but not attribute the article(s) in any way that suggests that they endorse you or your use of the work). If you alter, transform, or build upon this work, you must distribute the resulting work......

Words: 22047 - Pages: 89

Free Essay

Haddoop Installation

...running on Ubuntu Linux. Installing Python $ sudo apt-get install python-software-properties $ sudo add-apt-repository ppa:ferramroberto/java Update the source list $ sudo apt-get update Install Sun Java 6 JDK $ sudo apt-get install sun-java6-jdk Select Sun's Java as the default on your machine. (See 'sudo update-alternatives --config java' for more information.) $ sudo update-java-alternatives -s java-6-sun The full JDK which will be placed in /usr/lib/jvm/java-6-sun (well, this directory is actually a symlink on Ubuntu). After installation, make a quick check whether Sun’s JDK is correctly set up: $ java –version java version "1.6.0_20" Java(TM) SE Runtime Environment (build 1.6.0_20-b02) Java HotSpot(TM) Client VM (build 16.3-b01, mixed mode, sharing) Adding a dedicated Hadoop system user $ sudo addgroup hadoop $ sudo adduser --ingroup hadoop hduser This will add the user hduser and the group hadoop to your local machine. Configuring SSH user@ubuntu:~$ su – hduser hduser@ubuntu:~$ ssh-keygen -t rsa -P "" Generating public/private rsa key pair. Enter file in which to save the key (/home/hduser/.ssh/id_rsa): Created directory '/home/hduser/.ssh'. Your identification has been saved in /home/hduser/.ssh/id_rsa. Your public key has been saved in /home/hduser/.ssh/id_rsa.pub. The key fingerprint is: 9b:82:ea:58:b4:e0:35:d7:ff:19:66:a6:ef:ae:0e:d2 hduser@ubuntu The key's randomart image is: [...snipp...] hduser@ubuntu:~$ cat......

Words: 2067 - Pages: 9

Free Essay

Niloy

...The Hacker’s Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems By: David Melnichuk http://www.learn-how-to-hack.net http://www.MrCracker.com 1 Copyright Notice This report may not be copied or reproduced unless specific permissions have been personally given to you by the author David Melnichuk. Any unauthorized use, distributing, reproducing is strictly prohibited. Liability Disclaimer The information provided in this eBook is to be used for educational purposes only. The eBook creator is in no way responsible for any misuse of the information provided. All of the information in this eBook is meant to help the reader develop a hacker defense attitude in order to prevent the attacks discussed. In no way should you use the information to cause any kind of damage directly or indirectly. The word “Hack” or “Hacking” in this eBook should be regarded as “Ethical Hack” or “Ethical hacking” respectively. You implement the information given at your own risk. © Copyright 2008 Learn-How-To-Hack.net. All Rights Reserved. 2 Table of Contents A. Introduction..............................................................................................5 1. How can I use this eBook? 2. What is a hacker 3. Hacker Hierarchy 4. What does it take to become a hacker? 5. Disclaimer B. Programming............................................................................................9 1. Do I really need it? 2. Where should......

Words: 16651 - Pages: 67

Premium Essay

Linux Research Paper

...NT1430 Linux Networking Research Paper Nicholas Lorick ITT Technical Institute St. Petersburg Campus NT1430 Linux Networking Research Paper All people in the IT field are familiar with the IPv4 protocol and they are quickly becoming familiar with the IPv6 protocol. Bradley (2012) states the following: Since the beginning of the internet, IPv4 has been synonymous with IP and few people ever stopped to think about which version of the protocol it was. But IPv4 has outlived its usefulness. Its successor, IPv6, after nearly two decades of development is finally ready to replace IPv4 as the backbone of the Internet. (p. 34) With all the new technology and devices now accessing the internet the move to IPv6 will eventually happen. According to Bradley (2012), IPv4 is out of IP addresses. IPv4 supports only 4.3 billion addresses; and with PCs, smartphones, tablets, and gaming systems connecting to the Internet, we are running out of IP address. IPv6 uses 128-bit addresses and can maintain 340 undecillion (340 × 1036) addresses. The IPv6 protocol brings with it other benefits. With IPv4 most of the internet relies on Network Address Translation. With IPv6, every device can have its own unique public IP address. Most home and small-business users have one IP address on the Internet -- the one for the router that links their hardware to their ISP. The router issues IP addresses internally to the devices that attach to it, but it must constantly keep track of which......

Words: 1059 - Pages: 5

Premium Essay

Ubuntu Dns Server

...Signature | | Aims: 1. To equip students with the skills necessary to enable them to manage network operating systems. Date | 6/08/2014 | Time | 9:30 | Learning Outcomes | 1, 2,3 | Assessment Weightings: | 100 Marks in total converted to 40% of final grade | Conditions: | In class individual test. Closed book. Practical task in laboratory conditions, and presentation | Time Allowed: | 1 Hours (practical not included) (plus 15-30 minutes practical time for each student) | Learning Outcomes Assessed: Learning outcomes assessed | Questions | Marks | Assessment Weighting % | 2 | Perform and evaluate tasks that will deploy and configure a network operating system | Task1 Task 2Task 3 | 30 2020 | 50% | 4 | Evaluate how a networking operating system uses the OSI model | Task 1 | 30 | 20% | 5 | Compare and contrast two network operating systems | Task 4 | 30 | 30% | Task Number | Marks allocated | Marks obtained | 1 | 30 | | 2 | 20 | | 3 | 20 | | 4 | 30 | | Total Marks | 100 | | Instructions: 1. You should attempt ALL the questions in this test. 2. Check all the tasks in the assessment 3. Task One is an individual project. 4. Task Two ,Three and Four are practical tasks 5. Read instructions carefully. 6. Write your full name and student ID number on the cover sheet of the answer booklet. 7. Write your full name on EACH page of the answer booklet. 8. Write in blue or black ink only; no......

Words: 1296 - Pages: 6

Free Essay

The Hackers Underground Book

...The Hacker’s Underground Handbook Learn What it Takes to Crack Even the Most Secure Systems By: David Melnichuk http://www.learn-how-to-hack.net http://www.MrCracker.com 1 Copyright Notice This report may not be copied or reproduced unless specific permissions have been personally given to you by the author David Melnichuk. Any unauthorized use, distributing, reproducing is strictly prohibited. Liability Disclaimer The information provided in this eBook is to be used for educational purposes only. The eBook creator is in no way responsible for any misuse of the information provided. All of the information in this eBook is meant to help the reader develop a hacker defense attitude in order to prevent the attacks discussed. In no way should you use the information to cause any kind of damage directly or indirectly. The word “Hack” or “Hacking” in this eBook should be regarded as “Ethical Hack” or “Ethical hacking” respectively. You implement the information given at your own risk. © Copyright 2008 Learn-How-To-Hack.net. All Rights Reserved. 2 Table of Contents A. Introduction..............................................................................................5 1. How can I use this eBook? 2. What is a hacker 3. Hacker Hierarchy 4. What does it take to become a hacker? 5. Disclaimer B. Programming............................................................................................9 1. Do I really need it? 2. Where should I start? 3. Best way......

Words: 16651 - Pages: 67

Free Essay

Linux Shortcut

...* Reference: ** Basics: *** Getting help: # View the manual for target command man command # Get help with a target command (probably the same as above, but not always): command -h # In case you forget the name of a command, print possible commands relating to any given word: apropos word # View index of help pages: info *** Command Line Utilities: **** Basic File and Directory Operations: # Print current working directory: pwd # Show files in current directory: ls # Show maximum information about all files, including hidden: ls -a # Recurse into subdirectories and list those as well: ls -R # List files by modification time, most recent first. ls -lt # Move/rename a file or directory (be careful that you don't move the source over a destination with the same name): mv source destination # Delete target forever (be very careful), use -r recursive flag for directories: rm target # Copy file or directory: cp source destination # Mount filesytem: mount /dev/device_name /media/device_name # Unmount: umount /media/device_name # Forensically clone filesystems and do other low-level operations on files. Be careful with this one. Can be destructive: dd # Work with disk partitions: parted # Filesystem creation tool: mkfs **** System Administration: # Execute command as an administrator (can be destructive/insecure. Use only for system administration tasks): sudo command # Become system......

Words: 1920 - Pages: 8