Premium Essay

Introduction Fedora

In:

Submitted By cindyloucornez
Words 7515
Pages 31
01 558366 ch01.qxd

11/24/03

10:15 AM

Page 1

C H A P T E R

Getting Started ou’ll find that Fedora is remarkably friendly and easy to use for work, play, or for just surfing the Internet. This chapter helps you to get logged in and use the friendly Fedora Bluecurve desktop and demonstrates how to log out and shut down the computer. You also learn how to configure the date, time, and your time zone, how to set up any printer you may have connected to your computer, and how to get your computer connected to the Internet. Even if you are eager and able to start using the many powerful applications with little or no help, please take the time to familiarize yourself with the terms and important concepts contained in this chapter, especially the information about users and security in the section “Before You Log In.”

1
✦ ✦

Y





Introductory Terms
When you learn about a new operating system, you also need to learn new terminology. Here are a few basic terms you should learn to use Fedora. You will see these terms often throughout this book: ✦ Graphical User Interface (GUI) — A screen with icons, menus, and panels for the user to click on to initiate actions such as starting applications and opening files. ✦ Point and click — You move the mouse to point to something on the screen, and then click one of the mouse buttons to perform a task. By default, you click the left mouse button to do most tasks, but very often you can get a custom menu of options when you click the right mouse button. ✦ Double-click — Click the left mouse button twice in succession, rapidly, usually something you do to an icon (see the following entry) to launch an application or perform another important action. You can customize your Fedora to make this action easier if this is difficult for you. ✦ Icons — Small images representing an application, folder, shortcut, or

Similar Documents

Free Essay

Criminal Evidence

...Introduction Assignment Understand how to install Fedora Core Linux on x86 processor machines. Understand how to perform a custom Linux installation. Understand how to use the text book and lab notes to determine hardware and software installation requirements. Understand how to select, activate, load, and troubleshoot system options and parameters. Understand how to use the Disk Druid graphical tool to create and format hard drive partitions. Story You have been asked to install Fedora 13. Conditions You are doing this remotely, so the text based Red Hat installer will be used. Lab Diagram During your session you will have access to the following lab configuration. Connecting to your lab In this module you will be working on the following equipment to carry out the steps defined in each exercise.  PLABWINBUILD (Build Server) Each exercise will detail which console you are required to work on to carry out the steps. To start simply click on the named Server from the device list (located on the left hand side of the screen) and click the Power on from the in tools bar. In some cases the devices may power on automatically. During the boot up process an activity indicator will be displayed in the name tab:    Black - Powered Off Orange - Working on your request Green - Ready to access If the remote console is not displayed automatically in the main window (or popup) click the Connect icon located in the tools bar to start your session. If the remote...

Words: 1198 - Pages: 5

Free Essay

Ssaassd

...A Practical Guide to Fedora™ and Red Hat® Enterprise Linux®, Sixth Edition Lab Manual Mark G. Sobell Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Capetown • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals. The author and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein. The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact: U.S. Corporate and Government Sales (800) 382-3419 corpsales@pearsontechgroup.com For sales outside the United States, please contact: International Sales international@pearson.com Visit us on the Web: informit.com/ph Copyright © 2012 Mark G. Sobell All rights reserved...

Words: 38351 - Pages: 154

Free Essay

Linux Introduction an Basics

...Lecture 1 – Linux introduction and basics Module 1. Linux introduction ♦ Linux distributions ♦ Linux kernel What is a Linux distribution? ♦ it is a collection of applications, packages, management, and features ♦ ♦ ♦ ♦ that run on top of the Linux kernel. The kernel is what all distributions have in common (it is sometimes customized by the distribution maintainers) If they are all “Linux”, why are there so many different names, and which do I choose?” You may have heard names like Red Hat, Fedora, Debian, Ubuntu Distributions differ in several ways, and three of the most important are: ► ► ► Purpose Configuration and packaging Support model What’s a kernel? ♦ As you already know from the Operating Systems course ► the kernel is the core of all computer operating systems ► is usually the layer that allows the operating system to interact with the hardware in your computer ♦ The kernel contains software that allows you to make uniform use of ► hard disk drives, ► network cards, ► RAM, ► and other hardware components. ♦ In the Linux world, the kernel is based on code originally developed by Linux’s founder, Finnish developer Linus Torvalds. Back to distributions – Purpose, Configuration, Support ♦ Purpose ► Different distributions are often designed for different purposes and provide different user experiences. ► Some distributions are designed as servers, others as desktops, and some are designed to perform particular functions, for example, as embedded...

Words: 1486 - Pages: 6

Free Essay

Computer Analysis

...Fedora 12 Security-Enhanced Linux User Guide Murray McAllister Scott Radvan Daniel Walsh Dominick Grift Eric Paris James Morris Security-Enhanced Linux Fedora 12 Security-Enhanced Linux User Guide Edition 1.4 Author Author Author Author Author Author Copyright © 2009 Red Hat, Inc. Copyright © 2009 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. For guidelines on the permitted uses of the Fedora trademarks, refer to https://fedoraproject.org/wiki/ Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. All other trademarks are the property of their respective owners...

Words: 26838 - Pages: 108

Free Essay

It302 Activity 1

...Chapter 2 Installation Overview 1. A Net Boot CD is a way to install a new system from a hard disk or over a network. 2. Three considerations for planning an installation are; a. SELinux improves system security by implementing mandatory access control policies in the Fedora kernel b. Install a Graphical desktop environment (GUI) such as GNOME and/or KDE. c. Install additional software and services packages to fit the need of the user. 3. By default Fedora divides the disk into three partitions, including ‘/boot’ and Logical Volume Manager (LVM). 4. Manual partitioning the hard disk has its advantages, such as being able to isolate a filesystem for security or backup needs. 5. The / (root) partition is the main filesystem on the hard disk. Any new created directories will become part of the root filesystem unless a filesystem is created. 6. The swap partition is where Linux temporarily stores programs and data when it does not have enough RAM to hold all the information it is processing. 7. The /boot partition holds the hernel and other data the system needs when it boots. In order for the /boot partition to work properly it must be one of the first partitions on the disk. 8. The /var (variable) partition holds the bulk of system logs, package information, and accounting data. The /var/log partition is commonly used in a separate partition to isolate system logs from other files in the /var directory. 9. The /home partition is...

Words: 831 - Pages: 4

Free Essay

Cis 206 Slingshot Academy / Tutorialrank.Com

...----------------------------------------------------------- CIS 206 Case Study 2-4 Discussing How Applications Interact with Operating Systems (DEVRY) For more course tutorials visit www.tutorialrank.com You have been asked to prepare a short lecture for users in the Accounting Department. They have expressed interest in learning more about how the operating system supports the applications they use. Your boss would like to review your lecture notes prior to the class, so you need to save them to a document. Your notes should provide details of your lecture. ----------------------------------------------------------- CIS 206 Case Study 8-2 Researching Background and Font Combinations in Fedora Core 4 (DEVRY) For more course tutorials visit www.tutorialrank.com Case 8-2: Researching Background and Font Combinations in Fedora Core 4 You have been asked to prepare a presentation on the poor choices users make when working with desktop backgrounds and fonts. For your presentation, you need to research three different background choices, each with a different font. Your presentation should include information about font size and icons, how they look with different backgrounds, and how different backgrounds work with the fonts. Can you still read the...

Words: 3261 - Pages: 14

Free Essay

Netw240 Week 1 Lab

...Name: DSI# Date | 11/03/13 | NETW240 Week 1 Lab Report: Installing Fedora Linux 20 points In the space provided below, write a minimum of five college-level sentences in your own words that describe your experiences with this lab assignment. Include an overview of the major tasks accomplished in this lab and any difficulties you encountered in the completion of this lab assignment. Installing the Fedora 13 seemed easy enough but did take a long time when it came to the part of loading everything. I followed the lab instruction that helped me accomplished this which wasn’t too bad to follow. I did wish it had the explanation of each step like the other labs because it helped me understand what I’m doing and given the reason I never dealt with Linux before. The overview of the whole installation started with the “disc” and running it, then from the initial I was able to customize a few things (language, date and time, storage drive, own password, partition, software package, etc.). Luckily I did not encounter any problem that I was not able to install it but instead it went smooth. Something I did notice different was the appearance and where the taskbar was located. Installing the Fedora 13 seemed easy enough but did take a long time when it came to the part of loading everything. I followed the lab instruction that helped me accomplished this which wasn’t too bad to follow. I did wish it had the explanation of each step like the other labs because it helped me understand...

Words: 367 - Pages: 2

Free Essay

Red Hat

...kernel of Linux, known as Linux version 0.0.1 Free software, as defined by the FSF (Free Software Foundation), is a "matter of liberty, not price." To qualify as free software by FSF standards, you must be able to: Run the program for any purpose you want to, rather than be restricted in what you can use it for. View the program's source code. Study the program's source code and modify it if you need to. Share the program with others. Improve the program and release those improvements so that others can use them. Red Hat Linux : One of the original Linux distribution. The commercial, nonfree version is Red Hat Enterprise Linux, which is aimed at big companies using Linux servers and desktops in a big way. (NJIT) Free version: Fedora Project. Debian GNU/Linux : A free software distribution. Popular for use on servers. However, Debian is not what many would consider a distribution for beginners, as it's not designed with ease of use in mind. SuSE Linux : SuSE was recently purchased by Novell. This distribution is primarily available for pay because it contains many commercial programs, although there's a stripped-down free version that you can download. Mandrake Linux : Mandrake is perhaps strongest on the desktop. Originally based off of Red Hat Linux. Gentoo Linux : Gentoo is a specialty distribution meant for programmers. A runlevel is a software configuration of the system which allows only a selected group of processes to exist The processes spawned...

Words: 7097 - Pages: 29

Free Essay

Linux Security Technologies

...shapes and sizes which is why operating systems such as Linux develop ways to keep your personal files safe from these unwarranted threats. Some of these measures include, but is not limited to; iptables, SELinux, chroot jail, TCP Wrappers, firewalls, PolicyKit, NX or No eXecute, PIE or Position Independent Executables, Netfilter, and the list goes on (“Fedora Projects” & Vepstas). When a user first approaches Linux it looks similar to what a windows operating system would resemble. With Linux a user has the ability to access every file within the operating system through the use of a terminal or command prompt. Through the use of Linux programming potential threats can gain access to you file system and everything housed within it. Linux is free software that comes with many great security features that any user or administrator greater access and control over the system. The choice can be a bit much for most, but we will discuss a few of these choices here. Security-Enhanced Linux also known as SELinux is a security program that was developed in partner by the National Security Agency or NSA and Red Hat Developers (“Fedora Project”). So what exactly is it that SELinux does? SELinux was designed so that the Administrator could enforce policies that will limit what a user or particular program...

Words: 1082 - Pages: 5

Free Essay

Security Enhanced Linux (Selinux), Chroot Jail, and Iptables

...important types of Linux security technologies are Security Enhanced Linux (SELinux), chroot jail, and iptables. These security measures aide in the subversion of theft and malicious activity. We will discuss these items in depth to address who created them and for what reason. Along with how these technologies changed the operating system to enforce security, and the types of threats that these security systems are design to eliminate. Security Enhanced Linux was released in December of 2000 from the National Security Agency (NSA), under the GNU general public license. SELinux is not a Linux distribution; it is a set of kernel modifications and tools that can be added to a variety of Linux distributions. SELinux is currently a part of Fedora Core, and it is supported by Red Hat. Incarnations of SELinux packages are also available for Debian, SuSe, and Gentoo. Security-enhanced Linux is a set of patches to the Linux kernel and some utilities to incorporate a strong, flexible Mandatory Access Control (MAC). MAC provides an enhanced process to enforce the separation of information based on confidentiality and integrity requirements, as well as the confinement of damage that can be caused by malicious or flawed applications. The previous security structure, discretionary access control (DAC), allowed threats of tampering and avoidance of security mechanisms, because DAC gives the user ownership of files and allows users the ability to make policy decisions and assign security...

Words: 848 - Pages: 4

Premium Essay

Install a Core Linux Operating System on a Server

...recommended that you review the Demo Lab presentations in the Unit 1 and Unit 2 Learning Space. Click the PRACTICE link > DEMO LAB > then click the hyperlink to launch the demonstration. Part # 1 Install a Core Linux Operating System on a Server Learning Objectives and Outcomes Upon completing this lab, students should know more about the following tasks: * Install a base Linux operating system using a Fedora core Linux server for production use on the VM server farm * Create secured partitions within the core Linux server for desired security hardening, performance, and application support * Enable a network time server during installation to maintain a synchronized time setting throughout the system * Set a hostname that is descriptive of the role of the server to maintain standard and concise naming conventions during installation * Create a non-privileged user account for system administration access as a secure alternative to logging in as root user Overview In this lab the students will see how to install and partition a Fedora Core Linux Server. The installation process, applying passwords, creating partitions, and system administrator access controls will be part of the operating system configuration requirements. The demonstration will show how to use the terminal or terminal emulator for command line configurations and implementation. Lab Assessment Questions & Answers 1. During the install, the...

Words: 1168 - Pages: 5

Free Essay

Proposal Report

...Company: Red Hat Inc. Team Members Project Progress Report Project Status Summary Percent Complete: 45% Project Timeline: Oct 10th | Company Overview | We analyzed about the company , its products and services, industry reports, competitors, etc. | Oct 17th | Balance sheets and financial analysis | We met Anthony and he showed us the different databases from where we can access information. We were able to understand their annual and quarterly reports from the analyst reports. | Oct 24th | Information Sharing on respective tasks | This week we shared a lot of information among each other on our respective tasks. | Oct 30th | Concluding to a single view point and summarizing on all the tasks. | | Nov 7th | Project Report and Presentation | | Nov 14th | Project Report and Presentation | | Nov 21st | Buffer | | Nov 24th | Final Report | | Dec 7th | Final Submission | | As a team, we feel we are 5% behind schedule. We have another meet tomorrow where we would finalize on our findings and discuss about it. Anthony has showcased us an array of sources from where we can get help with the Project and there seems just too much of information for us to conclude on in our next meet. Company information, Market Information, Latest news, Financial Data, Products and Operations, etc. and a lot more articles and analyst reports are helping us put up a good presentation report for Red Hat Inc. Red Hat’s primary mission is to develop...

Words: 429 - Pages: 2

Free Essay

Linux

...Red Hat Enterprise Linux 5.3 Release Manifest Package Manifest for all Architectures. Red Hat Enterprise Linux Documentation Don Domingo Copyright © 2008 . This material may only be distributed subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version of the OPL is presently available at http://www.opencontent.org/openpub/). Red Hat and the Red Hat "Shadow Man" logo are registered trademarks of Red Hat, Inc. in the United States and other countries. All other trademarks referenced herein are the property of their respective owners. 1801 Varsity Drive Raleigh, NC 27606-2072 USA Phone: +1 919 754 3700 Phone: 888 733 4281 Fax: +1 919 754 3701 PO Box 13588 Research Triangle Park, NC 27709 USA Abstract This document is a record of all package changes since the last minor update of Red Hat Enterprise Linux 5 1. Added Packages ................................................................................................................... 1 2. Dropped Packages .............................................................................................................. 19 3. Updated Packages ............................................................................................................... 20 1. Added Packages cmirror-1.1.36-1.el5 • Group: System Environment/Base • Summary: cmirror - The Cluster Mirror Package • Description: cmirror - Cluster Mirroring 1 Release Manifest cmirror-kmod-0.1.21-10.el5 • Group: System...

Words: 32183 - Pages: 129

Free Essay

Linux Security Technologies

...Linux Security Technologies   SELinux (Security Enhanced Linux) is a mandatory access control in the Linux kernel that was originally developed by NSA (National Security Agency) with direct contributions provided by Red Hat Enterprise Linux (RHEL) via the Fedora Project. In the day and age of identity theft and attempted sabotage from terrorists against our country, it should be very apparent why an organization like NSA had such an interest in heading up development of a more secure way to better protect our nation’s computer systems. In a world so largely dependent on computer systems, inadequate security measures could lead to anything from having a single person’s financial information compromised to an electronic 9/11 against some of our country’s most secure federal computer networks. In the modern computer based society we live in, security is essential to protecting everything from personal desktops all the way up to the most secure federal databases. And many corporate and government level computers are based on the Linux kernel. SELinux has 3 states it can be in if on a system: Enabled, Disabled, and Permissive. Enforcing means SELinux security policy is active, Disabled means SELinux security policy is not active, and Permissive is a diagnostic state commonly used for troubleshooting. To better understand what improvements Mandatory Access Control (MAC) can provide for security, one needs to know about the standard Linux security provision called Discretionary...

Words: 1124 - Pages: 5

Free Essay

It302 Linux System Administration Research Assignment 1

...IT302 Linux System Administration Research Assignment 1 SELinux or Security Enhanced Linux uses an architecture that separates enforcement from access policy decisions. With this architecture different types of policies can be implemented, including Role-Based Access Control (RBAC), Type Enforcement (TE), and Multi-Level Security (MLS). The module assigns security labels to each subject or object. It uses a security class to determine the kinds of relationship a pair of labels might have. The triplet consisting of a pair of labels and a class are then sent to a policy server to determine if access is allowed. The security labels are assigned dynamic integer security ID's (SID's); the reply from the policy server is cached in an 'access vector cache' for performance reasons. SELinux was developed in coordination with the open source community and the National Security Agency (NSA) to provide the highest level of security for the Linux operating system. Linux V-Server – The three basic elements of the VServer are: * The security context. A process in one security context cannot see processes in other security contexts, neither with the 'ps' command, nor with 'cat /proc' nor in any other way. As side-effect, this means that a process in one context cannot kill processes in other contexts. * Capabilities. The existing Linux kernel provides a wide variety of capabilities which can be taken away from processes. These include the ability to change network addresses...

Words: 423 - Pages: 2