Red Hat Linux 6.0

Total Page:16

File Type:pdf, Size:1020Kb

Red Hat Linux 6.0 Red Hat Linux 6.0 The Official Red Hat Linux Installation Guide Red Hat Software, Inc. Durham, North Carolina Copyright ­c 1995, 1996, 1997, 1998, 1999 Red Hat Software, Inc. Red Hat is a registered trademark and the Red Hat Shadow Man logo, RPM, the RPM logo, and Glint are trademarks of Red Hat Software, Inc. Linux is a registered trademark of Linus Torvalds. Motif and UNIX are registered trademarks of The Open Group. Alpha is a trademark of Digital Equipment Corporation. SPARC is a registered trademark of SPARC International, Inc. Products bearing the SPARC trade- marks are based on an architecture developed by Sun Microsystems, Inc. Netscape is a registered trademark of Netscape Communications Corporation in the United States and other countries. TrueType is a registered trademark of Apple Computer, Inc. Windows is a registered trademark of Microsoft Corporation. All other trademarks and copyrights referred to are the property of their respective owners. ISBN: 1-888172-28-2 Revision: Inst-6.0-Print-RHS (04/99) Red Hat Software, Inc. 2600 Meridian Parkway Durham, NC 27713 P. O. Box 13588 Research Triangle Park, NC 27709 (919) 547-0012 http://www.redhat.com While every precaution has been taken in the preparation of this book, the publisher assumes no responsibility for errors or omissions, or for damages resulting from the use of the information con- tained herein. The Official Red Hat Linux Installation Guide may be reproduced and distributed in whole or in part, in any medium, physical or electronic, so long as this copyright notice remains intact and unchanged on all copies. Commercial redistribution is permitted and encouraged, but you may not redistribute it, in whole or in part, under terms more restrictive than those under which you received it. Printed in Canada Contents 1 New Features of Red Hat Linux 6.0 1 1.1Installation-RelatedEnhancements............................. 1 1.2DesktopandWindowManagers............................... 3 1.3MiscellaneousNewFeatures................................. 4 2 Before You Begin 5 2.1 Getting Documentation .................................... 6 2.2GettingtheRightRedHatLinuxComponents....................... 6 2.3ThingsYouShouldKnow................................... 10 2.4InstallationMethods...................................... 14 2.5NeedaNetworkBootDisk?................................. 18 2.6NeedaPCMCIASupportDiskette?............................. 18 2.7InstallationClasses...................................... 19 2.8DiskPartitions......................................... 21 2.9ANoteAboutKernelDrivers................................ 31 2.10IfYouHaveProblems... ................................... 32 2.11OneLastNote......................................... 32 3 Starting the Installation 33 3.1TheInstallationProgramUserInterface........................... 33 3.2StartingtheInstallationProgram............................... 36 3.3BeginningtheInstallation................................... 39 iv CONTENTS 3.4SelectinganInstallationMethod............................... 41 4 Local Media Installations 43 4.1SelectinganInstallationMethod............................... 43 4.2 Installing from CD-ROM ................................... 43 4.3 Installing from a Hard Drive ................................. 45 4.4 Upgrading or Installing .................................... 45 4.5InstallationClass........................................ 46 4.6SCSISupport.......................................... 47 4.7CreatingPartitionsforRedHatLinux............................ 48 4.8InitializingSwapSpace.................................... 58 4.9ForHardDriveInstallationsOnly... ............................ 58 4.10 Formatting Partitions . .................................... 60 4.11 Selecting and Installing Packages .............................. 60 5 Network Installations 65 5.1SelectinganInstallationMethod............................... 65 5.2 Installing via NFS . .................................... 68 5.3 Installing via FTP . .................................... 69 5.4 Installing via HTTP . .................................... 69 5.5 Upgrading or Installing .................................... 70 5.6InstallationClass........................................ 72 5.7SCSISupport.......................................... 74 5.8CreatingPartitionsforRedHatLinux............................ 74 5.9InitializingSwapSpace.................................... 85 5.10 Formatting Partitions . .................................... 85 5.11 Selecting and Installing Packages .............................. 86 6 Finishing the Installation 91 6.1ConfiguringaMouse..................................... 91 CONTENTS v 6.2ConfiguringNetworking................................... 92 6.3ConfiguringtheTimeZone.................................. 95 6.4SelectingServicesforStartonReboot............................ 95 6.5ConfiguringaPrinter..................................... 96 6.6SettingaRootPassword................................... 102 6.7AuthenticationConfiguration................................ 103 6.8CreatingaBootDiskette................................... 104 6.9 Installing LILO ......................................... 105 6.10ConfiguringtheXWindowSystem............................. 108 6.11FinishingUp... ........................................ 109 7 Finding Documentation 111 7.1OnLineHelp.......................................... 111 7.2HelpfromtheInternetCommunity............................. 117 8 System Configuration 119 8.1SystemConfigurationWithLinuxconf........................... 120 8.2SystemConfigurationwiththeControlPanel....................... 158 9 Package Management with RPM 173 9.1RPMDesignGoals....................................... 174 9.2UsingRPM........................................... 174 9.3ImpressingYourFriendswithRPM............................. 180 9.4OtherRPMResources..................................... 182 10 GnoRPM 183 10.1StartingGnoRPM....................................... 184 10.2ThePackageDisplay..................................... 185 10.3 Installing New Packages . ................................ 187 10.4Configuration......................................... 188 vi CONTENTS 10.5PackageManipulation..................................... 191 11 System Administration 195 11.1FilesystemStructure...................................... 195 11.2SpecialRedHatFileLocations................................ 199 11.3Users,GroupsandUser-PrivateGroups.......................... 199 11.4ConfiguringConsoleAccess................................. 203 11.5 The floppy Group...................................... 205 11.6UserAuthenticationwithPAM................................ 206 11.7 Shadow Utilities ........................................ 209 11.8BuildingaCustomKernel.................................. 210 11.9Sendmail............................................ 214 11.10Controlling Access to Services ................................ 215 11.11AnonymousFTP........................................ 215 11.12NFSConfiguration....................................... 216 11.13TheBootProcess,Init,andShutdown............................ 217 11.14RescueModes......................................... 228 A Getting Technical Support 229 A.1AnOverviewofOurSupportPolicy............................. 229 A.2GettingSupport........................................ 231 A.3SupportFAQ(FrequentlyAskedQuestions)........................ 234 B Making Installation Diskettes 237 B.1MakingaDisketteUnderMS-DOS............................. 238 B.2MakingaDisketteUnderaLinux-likeO/S......................... 238 C An Introduction to Disk Partitions 239 C.1HardDiskBasicConcepts.................................. 239 D Package List 247 D.1Amusements.......................................... 249 CONTENTS vii D.2Applications.......................................... 252 D.3Development.......................................... 288 D.4 Documentation ......................................... 306 D.5SystemEnvironment..................................... 312 D.6UserInterface......................................... 339 E General Parameters and Modules 351 E.1CD-ROMparameters..................................... 352 E.2SCSIparameters........................................ 353 E.3Ethernetparameters...................................... 355 F Information Specific to Red Hat Linux/SPARC 361 F.1SupportedHardware..................................... 361 F.2InstallationOverview..................................... 362 F.3ConsoleCommands...................................... 363 F.4Ramdisk-basedInstallationCriteria............................. 363 F.5ChoosingaBootMethod................................... 364 F.6ChoosinganInstallationMethod.............................. 368 F.7InstallationUsingaSerialTerminal............................. 369 F.8SILOConfiguration...................................... 369 F.9Partitioning........................................... 369 G Glossary 371 H Kickstart Installations 381 H.1WheretoPutAKickstartFile................................. 381 H.2StartingaKickstartInstallation................................ 383 H.3TheKickstartFile....................................... 383 Index 395 Index of Packages 405 viii CONTENTS Preface Welcome! And thanks for your interest in Red Hat Linux. We have what we think is the best Linux distribution on the market today, and we work hard to keep it that way. Red Hat Linux 6.0 is the latest in a long line of software from Red Hat Software. We hope you like it, and that you enjoy using Red Hat Linux as much as we’ve enjoyed
Recommended publications
  • Technical and Legal Approaches to Unsolicited Electronic Mail, 35 USFL Rev
    UIC School of Law UIC Law Open Access Repository UIC Law Open Access Faculty Scholarship 1-1-2001 Technical and Legal Approaches to Unsolicited Electronic Mail, 35 U.S.F. L. Rev. 325 (2001) David E. Sorkin John Marshall Law School, [email protected] Follow this and additional works at: https://repository.law.uic.edu/facpubs Part of the Computer Law Commons, Internet Law Commons, Marketing Law Commons, and the Privacy Law Commons Recommended Citation David E. Sorkin, Technical and Legal Approaches to Unsolicited Electronic Mail, 35 U.S.F. L. Rev. 325 (2001). https://repository.law.uic.edu/facpubs/160 This Article is brought to you for free and open access by UIC Law Open Access Repository. It has been accepted for inclusion in UIC Law Open Access Faculty Scholarship by an authorized administrator of UIC Law Open Access Repository. For more information, please contact [email protected]. Technical and Legal Approaches to Unsolicited Electronic Mailt By DAVID E. SORKIN* "Spamming" is truly the scourge of the Information Age. This problem has become so widespread that it has begun to burden our information infrastructure. Entire new networks have had to be constructed to deal with it, when resources would be far better spent on educational or commercial needs. United States Senator Conrad Burns (R-MT)1 UNSOLICITED ELECTRONIC MAIL, also called "spain," 2 causes or contributes to a wide variety of problems for network administrators, t Copyright © 2000 David E. Sorkin. * Assistant Professor of Law, Center for Information Technology and Privacy Law, The John Marshall Law School; Visiting Scholar (1999-2000), Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University.
    [Show full text]
  • KDE 2.0 Development, Which Is Directly Supported
    23 8911 CH18 10/16/00 1:44 PM Page 401 The KDevelop IDE: The CHAPTER Integrated Development Environment for KDE by Ralf Nolden 18 IN THIS CHAPTER • General Issues 402 • Creating KDE 2.0 Applications 409 • Getting Started with the KDE 2.0 API 413 • The Classbrowser and Your Project 416 • The File Viewers—The Windows to Your Project Files 419 • The KDevelop Debugger 421 • KDevelop 2.0—A Preview 425 23 8911 CH18 10/16/00 1:44 PM Page 402 Developer Tools and Support 402 PART IV Although developing applications under UNIX systems can be a lot of fun, until now the pro- grammer was lacking a comfortable environment that takes away the usual standard activities that have to be done over and over in the process of programming. The KDevelop IDE closes this gap and makes it a joy to work within a complete, integrated development environment, combining the use of the GNU standard development tools such as the g++ compiler and the gdb debugger with the advantages of a GUI-based environment that automates all standard actions and allows the developer to concentrate on the work of writing software instead of managing command-line tools. It also offers direct and quick access to source files and docu- mentation. KDevelop primarily aims to provide the best means to rapidly set up and write KDE software; it also supports extended features such as GUI designing and translation in con- junction with other tools available especially for KDE development. The KDevelop IDE itself is published under the GNU Public License (GPL), like KDE, and is therefore publicly avail- able at no cost—including its source code—and it may be used both for free and for commer- cial development.
    [Show full text]
  • Herramientas En GNU/Linux Para Estudiantes Universitarios
    Herramientas en GNU/Linux para estudiantes universitarios El Escritorio KDE David Vaquero Santiago Herramientas en GNU/Linux para estudiantes universitarios: El Escritorio KDE por David Vaquero Santiago Copyright (c) 2.003 David Vaquero Santiago Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled "GNU Free Documentation License". Tabla de contenidos 1. El Escritorio KDE..............................................................................................................................................1 1.1. La Historia de KDE.................................................................................................................................1 1.2. .................................................................................................................................................................1 2. ..............................................................................................................................................................................3 2.1. El escritorio KDE....................................................................................................................................3 3. Konqueror: La herramienta polivalente..........................................................................................................8
    [Show full text]
  • A Java Implementation of a Portable Desktop Manager Scott .J Griswold University of North Florida
    UNF Digital Commons UNF Graduate Theses and Dissertations Student Scholarship 1998 A Java Implementation of a Portable Desktop Manager Scott .J Griswold University of North Florida Suggested Citation Griswold, Scott .,J "A Java Implementation of a Portable Desktop Manager" (1998). UNF Graduate Theses and Dissertations. 95. https://digitalcommons.unf.edu/etd/95 This Master's Thesis is brought to you for free and open access by the Student Scholarship at UNF Digital Commons. It has been accepted for inclusion in UNF Graduate Theses and Dissertations by an authorized administrator of UNF Digital Commons. For more information, please contact Digital Projects. © 1998 All Rights Reserved A JAVA IMPLEMENTATION OF A PORTABLE DESKTOP MANAGER by Scott J. Griswold A thesis submitted to the Department of Computer and Information Sciences in partial fulfillment of the requirements for the degree of Master of Science in Computer and Information Sciences UNIVERSITY OF NORTH FLORIDA DEPARTMENT OF COMPUTER AND INFORMATION SCIENCES April, 1998 The thesis "A Java Implementation of a Portable Desktop Manager" submitted by Scott J. Griswold in partial fulfillment of the requirements for the degree of Master of Science in Computer and Information Sciences has been ee Date APpr Signature Deleted Dr. Ralph Butler Thesis Advisor and Committee Chairperson Signature Deleted Dr. Yap S. Chua Signature Deleted Accepted for the Department of Computer and Information Sciences Signature Deleted i/2-{/1~ Dr. Charles N. Winton Chairperson of the Department Accepted for the College of Computing Sciences and E Signature Deleted Dr. Charles N. Winton Acting Dean of the College Accepted for the University: Signature Deleted Dr.
    [Show full text]
  • The Role of Ansel in Tracy Letts' Killer Joe: a Production Thesis in Acting
    Louisiana State University LSU Digital Commons LSU Master's Theses Graduate School 2003 The oler of Ansel in Tracy Letts' Killer Joe: a production thesis in acting Ronald William Smith Louisiana State University and Agricultural and Mechanical College Follow this and additional works at: https://digitalcommons.lsu.edu/gradschool_theses Part of the Theatre and Performance Studies Commons Recommended Citation Smith, Ronald William, "The or le of Ansel in Tracy Letts' Killer Joe: a production thesis in acting" (2003). LSU Master's Theses. 3197. https://digitalcommons.lsu.edu/gradschool_theses/3197 This Thesis is brought to you for free and open access by the Graduate School at LSU Digital Commons. It has been accepted for inclusion in LSU Master's Theses by an authorized graduate school editor of LSU Digital Commons. For more information, please contact [email protected]. THE ROLE OF ANSEL IN TRACY LETTS’ KILLER JOE: A PRODUCTION THESIS IN ACTION A Thesis Submitted to the Graduate Faculty of the Louisiana State University and Agricultural and Mechanical College in partial fulfillment of the Requirements for the degree of Master of Fine Arts in The Department of Theatre by Ronald William Smith B.S., Clemson University, 2000 May 2003 Acknowledgements I would like to thank my professors, Bob and Annmarie Davis, Jo Curtis Lester, Nick Erickson and John Dennis for their knowledge, dedication, and care. I would like to thank my classmates: Deb, you are a friend and I’ve learned so much from your experiences. Fire, don’t ever lose the passion you have for life and art, it is beautiful and contagious.
    [Show full text]
  • List of New Applications Added in ARL #2603
    List of New Applications Added in ARL #2603 Application Name Publisher DataConnect 11.5 Actian Source Sans Pro 1.0 Adobe PDF Broker Process for Internet Explorer 21.1 Adobe Creative Suite CS6 Standard Adobe Collaboration Synchronizer 20.1 Adobe Collaboration Synchronizer 21.1 Adobe Connect 2020.12 Adobe AD Group Manager 1.1 Albus Bit AD Group Manager 1.2 Albus Bit Query Reporter 3.3 Allround Automations Monarch 13.0 Classic Altair Engineering IMAGEPro 1.1 AMETEK CrystalControl 2.1 AMETEK NekoHTML 1.9 Andy Clark Sherlock 6.2 Ansys Flash Banner Maker 1.0 Anvsoft Any Video Converter 5.5 Anvsoft TomeePlus 9.0 Apache Software Foundation Falcon 0.1 Apache Software Foundation JaxMe 0.5 Apache Software Foundation A-PDF Split A-PDF.com WealthTrack 9.0 Applied Systems Call Status Report 1.0 Aspect Software Inbound 7.3 Aspect Software CLIQ Web Manager 9.2 ASSA ABLOY CLIQ Web Manager 8.0 ASSA ABLOY Centerprise Data Integrator 7.6 Astera Software Bitbucket 2.0 Atlassian Jira Capture Chrome 1.0 Atlassian AudaEnterprise 4.0 Audatex Encode And Decode Files - Base64 1.0 Automation Anywhere Expert PDF 14.0 Avanquest Software ASG Plugin Avaya Discovery Tool 3.3 AvePoint DocAve 6.6 AvePoint DocAve 6.12 AvePoint DocAve 6.11 AvePoint DocAve 6.3 AvePoint DocAve 6.8 AvePoint DocAve 6.9 AvePoint FLY 4.5 AvePoint Wonderware Application Server Client 2020 AVEVA Group Cloud for Business On-Premises 2.0 Axure Software Solutions Automator 4.5 Axway Convene 5.8 Azeus Zulu 8.50 Azul Systems Zulu 11.35 Azul Systems Zulu 8.48 Azul Systems Zulu 15.28 Azul Systems Zulu
    [Show full text]
  • Newscache – a High Performance Cache Implementation for Usenet News 
    THE ADVANCED COMPUTING SYSTEMS ASSOCIATION The following paper was originally published in the Proceedings of the USENIX Annual Technical Conference Monterey, California, USA, June 6-11, 1999 NewsCache – A High Performance Cache Implementation for Usenet News _ _ _ Thomas Gschwind and Manfred Hauswirth Technische Universität Wien © 1999 by The USENIX Association All Rights Reserved Rights to individual papers remain with the author or the author's employer. Permission is granted for noncommercial reproduction of the work for educational or research purposes. This copyright notice must be included in the reproduced paper. USENIX acknowledges all trademarks herein. For more information about the USENIX Association: Phone: 1 510 528 8649 FAX: 1 510 548 5738 Email: [email protected] WWW: http://www.usenix.org NewsCache – A High Performance Cache Implementation for Usenet News Thomas Gschwind Manfred Hauswirth g ftom,M.Hauswirth @infosys.tuwien.ac.at Distributed Systems Group Technische Universitat¨ Wien Argentinierstraße 8/E1841 A-1040 Wien, Austria, Europe Abstract and thus provided to its clients are defined by the news server’s administrator. Usenet News is reaching its limits as current traffic strains the available infrastructure. News data volume The world-wide set of cooperating news servers makes increases steadily and competition with other Internet up the distribution infrastructure of the News system. services has intensified. Consequently bandwidth re- Articles are distributed among news servers using the quirements are often beyond that provided by typical Network News Transfer Protocol (NNTP) which is de- links and the processing power needed exceeds a sin- fined in RFC977 [2]. In recent years several exten- gle system’s capabilities.
    [Show full text]
  • Version 7.8-Systemd
    Linux From Scratch Version 7.8-systemd Created by Gerard Beekmans Edited by Douglas R. Reno Linux From Scratch: Version 7.8-systemd by Created by Gerard Beekmans and Edited by Douglas R. Reno Copyright © 1999-2015 Gerard Beekmans Copyright © 1999-2015, Gerard Beekmans All rights reserved. This book is licensed under a Creative Commons License. Computer instructions may be extracted from the book under the MIT License. Linux® is a registered trademark of Linus Torvalds. Linux From Scratch - Version 7.8-systemd Table of Contents Preface .......................................................................................................................................................................... vii i. Foreword ............................................................................................................................................................. vii ii. Audience ............................................................................................................................................................ vii iii. LFS Target Architectures ................................................................................................................................ viii iv. LFS and Standards ............................................................................................................................................ ix v. Rationale for Packages in the Book .................................................................................................................... x vi. Prerequisites
    [Show full text]
  • Présentation Ligne De Commande
    Kit de survie en lignes de commandes ... pour les nuls. Ceci est la version légèrement corrigée, étendue et complétée de la présentation du jeudi 2 juin 2018. Pourquoi la ligne de commande ? La ligne de commande est une chose qui a, pour des raisons marketting et en lien avec la massification de l'usage de l'outil informatique, peu à peu disparue alors qu'elle faisait partie intégrante des ordinateurs dans les années 80 et jusqu'en 1995 pour le grand public. Actuellement, la ligne de commande est perçue par les néophytes comme un objet de toute puissance ou de diabolisation. Les stéréotypes véhiculés par les media traditionnels associent souvent la ligne de commande, et in extenso le terminal, à un outil de hacker. Alors que cela a été pendant longtemps le quotidien de beaucoup d'utilisateurs. Posons un peu de vocabulaire : Linux est un noyau c'est à dire un binaire qui communique avec le matériel. Autour de lui est le système GNU (pour GNU is Not Unix). Le système GNU a été pensé dans les années 80 comme étant une alternative Libre au système (gratuit) mais propriétaire Unix. Dans les années 80, à la préhistoire informatique, les systèmes d'ordinateurs n'avaient pour ainsi dire pas d'interface graphique (et encore moins de souris) : un noyau, un interpréteur de commande (shell) et quelques utilitaires suffisaient à faire un ordinateur fonctionnel. Ici le système Microsoft Disk Operating System fonctionnant avec les fichier : msdos.sys et io.sys (l'équivalent du noyau), config.sys et autoexec.bat, à partir de là l'interpréteur de commande (ou shell) : COMMAND.COM s'exécute et affiche l'image précédente.
    [Show full text]
  • Catalogo De Apliciones Para Gnu/Linux
    Universidad Luterana Salvadoreña SOFTWARE LIBRE SOFTWARE LIBRE CATALOGO DE APLICIONES PARA GNU/LINUX AUTORES: RUBEN ERNESTO MEJIA CORTEZ MARVIN FERNANDO RAMIREZ DAVID ARMANDO CORNEJO SOFTWARE LIBRE INDICE Contenido Pagina Introducción .........................................................................................1 Objetivos ...............................................................................................2 Que es software libre ? ..........................................................................3 Editores de texto ....................................................................................6 Exploradores ..........................................................................................17 Correo Electrónico .................................................................................28 Editores de audio ...................................................................................40 Reproductores de audio ........................................................................51 Ofimática .................................................................................................61 Reproductores multimedia ......................................................................67 Editores de video .....................................................................................76 Compresores ...........................................................................................87 Creadores de CD'S ..................................................................................96
    [Show full text]
  • Pluggable Authentication Modules
    Who this book is written for This book is for experienced system administrators and developers working with multiple Linux/UNIX servers or with both UNIX and Pluggable Authentication Windows servers. It assumes a good level of admin knowledge, and that developers are competent in C development on UNIX-based systems. Pluggable Authentication Modules PAM (Pluggable Authentication Modules) is a modular and flexible authentication management layer that sits between Linux applications and the native underlying authentication system. The PAM framework is widely used by most Linux distributions for authentication purposes. Modules Originating from Solaris 2.6 ten years ago, PAM is used today by most proprietary and free UNIX operating systems including GNU/Linux, FreeBSD, and Solaris, following both the design concept and the practical details. PAM is thus a unifying technology for authentication mechanisms in UNIX. This book provides a practical approach to UNIX/Linux authentication. The design principles are thoroughly explained, then illustrated through the examination of popular modules. It is intended as a one-stop introduction and reference to PAM. What you will learn from this book From Technologies to Solutions • Install, compile, and configure Linux-PAM on your system • Download and compile third-party modules • Understand the PAM framework and how it works • Learn to work with PAM’s management groups and control fl ags • Test and debug your PAM confi guration Pluggable Authentication Modules • Install and configure the pamtester utility
    [Show full text]
  • Xcode Package from App Store
    KH Computational Physics- 2016 Introduction Setting up your computing environment Installation • MAC or Linux are the preferred operating system in this course on scientific computing. • Windows can be used, but the most important programs must be installed – python : There is a nice package ”Enthought Python Distribution” http://www.enthought.com/products/edudownload.php – C++ and Fortran compiler – BLAS&LAPACK for linear algebra – plotting program such as gnuplot Kristjan Haule, 2016 –1– KH Computational Physics- 2016 Introduction Software for this course: Essentials: • Python, and its packages in particular numpy, scipy, matplotlib • C++ compiler such as gcc • Text editor for coding (for example Emacs, Aquamacs, Enthought’s IDLE) • make to execute makefiles Highly Recommended: • Fortran compiler, such as gfortran or intel fortran • BLAS& LAPACK library for linear algebra (most likely provided by vendor) • open mp enabled fortran and C++ compiler Useful: • gnuplot for fast plotting. • gsl (Gnu scientific library) for implementation of various scientific algorithms. Kristjan Haule, 2016 –2– KH Computational Physics- 2016 Introduction Installation on MAC • Install Xcode package from App Store. • Install ‘‘Command Line Tools’’ from Apple’s software site. For Mavericks and lafter, open Xcode program, and choose from the menu Xcode -> Open Developer Tool -> More Developer Tools... You will be linked to the Apple page that allows you to access downloads for Xcode. You wil have to register as a developer (free). Search for the Xcode Command Line Tools in the search box in the upper left. Download and install the correct version of the Command Line Tools, for example for OS ”El Capitan” and Xcode 7.2, Kristjan Haule, 2016 –3– KH Computational Physics- 2016 Introduction you need Command Line Tools OS X 10.11 for Xcode 7.2 Apple’s Xcode contains many libraries and compilers for Mac systems.
    [Show full text]