O'reilly Knoppix Hacks (2Nd Edition).Pdf

Total Page:16

File Type:pdf, Size:1020Kb

O'reilly Knoppix Hacks (2Nd Edition).Pdf SECOND EDITION KNOPPIX HACKSTM Kyle Rankin Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo Knoppix Hacks,™ Second Edition by Kyle Rankin Copyright © 2008 O’Reilly Media, Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or [email protected]. Editor: Brian Jepson Cover Designer: Karen Montgomery Production Editor: Adam Witwer Interior Designer: David Futato Production Services: Octal Publishing, Inc. Illustrators: Robert Romano and Jessamyn Read Printing History: October 2004: First Edition. November 2007: Second Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. The Hacks series designations, Knoppix Hacks, the image of a pocket knife, “Hacks 100 Industrial-Strength Tips and Tools,” and related trade dress are trademarks of O’Reilly Media, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. Small print: The technologies discussed in this publication, the limitations on these technologies that technology and content owners seek to impose, and the laws actually limiting the use of these technologies are constantly changing. Thus, some of the hacks described in this publication may not work, may cause unintended harm to systems on which they are used, or may not be consistent with applicable user agreements. Your use of these hacks is at your own risk, and O’Reilly Media, Inc. disclaims responsibility for any damage or expense resulting from their use. In any event, you should take care that your use of these hacks does not violate any applicable laws, including copyright laws. This book uses RepKover™, a durable and flexible lay-flat binding. ISBN: 978-0-596-51493-8 [C] Contents Foreword . xi Credits . xv Preface . xix Chapter 1. Boot Knoppix . 1 1. Boot Knoppix on a Desktop 2 2. Boot Virtualized Knoppix 5 3. Get Knoppix 6 4. Use Knoppix Cheat Codes 9 5. Speak Different Languages 11 6. Free Your CD to Make Knoppix Run Faster 13 7. Straighten Out Your X Settings 16 8. Use Advanced Knoppix Cheat Codes 19 9. Run Knoppix on a Laptop 21 10. Explore Expert Mode 22 11. Check RAM for Errors with Memtest86+ 23 Chapter 2. Use Your Knoppix Desktop . 27 12. Explore the Desktop 28 13. Customize the Desktop Look 34 14. Get Office Work Done 39 15. Configure Your Printer 44 16. Use Peripheral Devices 46 17. Have Fun and Play Some Games 49 v 18. Rock Out with Knoppix Multimedia 50 19. Connect to the Internet 55 20. Connect to the Internet with GPRS Bluetooth 57 21. Explore the Internet 62 22. Get Help 65 23. Try Other Desktop Environments 66 24. Become Root 70 Chapter 3. Tweak Your Desktop . 72 25. Use Aufs 72 26. Create Persistent Knoppix Settings 75 27. Use Your Linux Desktop Settings 79 28. Use Your Windows Desktop Settings 83 29. Make a Kiosk 86 30. Make a Party Arcade 90 31. Network Boot Knoppix 94 32. Create a Knoppix “Thin Client” 96 33. Develop Applications 97 34. Install Nvidia 3D Drivers 100 35. Point-and-Klik to Install Applications 104 36. Create Your Own Klik Recipe 106 37. Install Programs to the Live Disk 107 38. Browse the Web Anonymously 109 39. Install Multimedia Codecs 111 Chapter 4. Install Linux with Knoppix . 112 40. Explore the Knoppix Installer 113 41. Install Knoppix as a Single-Boot System 118 42. Install Knoppix on a Multiboot System 120 43. Convert Knoppix to Debian Unstable 122 44. Install Gentoo with Knoppix 124 45. Update a Knoppix Install from the CD 126 vi | Contents Chapter 5. Put Knoppix in Your Toolbox . 128 46. Run Remote Desktops 129 47. Run X Remotely with FreeNX 133 48. Browse Windows Shares 138 49. Create an Emergency Router 139 50. Create an Emergency File Server 146 51. Create an Emergency Web Server 148 52. Make an Emergency Mail Relay 150 53. Run Other Emergency Services 154 54. Wardrive with Knoppix 158 55. Audit Network Security 166 56. Check for Root Kits 174 57. Collect Forensics Data 176 58. Clone Hard Drives 180 59. Wipe a Hard Drive 184 60. Test Hardware Compatibility 186 61. Copy Settings to Other Distributions 192 62. Add Knoppix to Your PXE Boot Environment 194 63. Set Up a Webcam Server in a Snap 197 64. Create a Weekend Wiki 198 Chapter 6. Repair Linux . 201 65. Repair Lilo 202 66. Repair Grub 203 67. Kill and Resurrect the Master Boot Record 205 68. Find Lost Partitions 207 69. Resize Linux Partitions 209 70. Repair Damaged Filesystems 211 71. Recover Deleted Files 214 72. Rescue Files from Damaged Hard Drives 217 73. Back Up and Restore 221 74. Migrate to a New Hard Drive 223 75. Mount Linux Software RAID 225 76. Create Linux Software RAID 227 77. Migrate to Software RAID 230 Contents | vii 78. Migrate Software RAID 1 to RAID 5 233 79. Add an Extra Drive to a Software RAID 5 Array 235 80. Mount LVM Partitions 237 81. Reset Linux Passwords 239 82. Fix Broken Init Services 240 83. Repair Debian Packages 243 84. Repair RPM Packages 245 85. Copy a Working Kernel 246 86. Turn a Physical Machine into a VMware Virtual Machine 247 Chapter 7. Rescue Windows . 253 87. Fix the Windows Boot Selector 254 88. Back Up Files and Settings 256 89. Resize Windows Partitions 258 90. Reset Lost NT Passwords 261 91. Edit the Windows Registry 264 92. Restore Corrupted System Files 267 93. Scan for Viruses 269 94. Download Windows Patches Securely 272 95. Knoppix on Intel Macs 273 Chapter 8. Knoppix Reloaded . 276 96. Master Morphix 277 97. Educate Yourself with Freeduc 279 98. Damn Small Linux 281 99. INSERT Security Here 284 100. Download Local Area Security 287 101. Full Protection with S-T-D 290 102. Distribute Compiles with distccKNOPPIX 314 103. Distribute the Load with ClusterKnoppix 315 104. Analyze Quantian 322 105. Find GIS Knoppix on the Map 325 106. TiVo Your Computer 326 107. Compose Musix 329 108. Contribute to Knoppix 331 viii | Contents Chapter 9. Knoppix Remastered . 333 109. Create a Customized Knoppix 334 110. Trim the Fat 341 111. Personalize Knoppix 344 112. Keep Your Custom Disk Up to Date 349 113. Automate Knoppix Remastering 351 114. Morph Morphix 353 115. Auto-Build Morphix Modules MapLab Tutorial Map 356 116. Change the Default Language on an ISO Image 358 117. Remaster Knoppix Without Remastering 360 118. Change Boot Defaults Without Remastering 363 119. Tweak the initrd Without Remastering 366 120. Put Knoppix on a USB Drive 367 Index . 369 Contents | ix 0 Foreword Apart from its applicability for everyday work, GNU/Linux is a great way to learn about operating systems. The Free Software license allows you to take the software apart, see inside, and understand how it works. You can also change the software to fit your needs. It can make you feel like a child hap- pily taking a colorful and complex toy apart into thousands of little gears and switches, just to see how it functions, disregarding the fact that it may be very difficult to ever reassemble that toy again. The difference with GNU/Linux, of course, is that you can work on a copy of the software source code and won’t break the original. And sometimes, while reassembling, you can build something entirely different and colorful without even planning to. The Past When, in 1999, bootable business card–sized Linux “Rescue CDs” appeared as giveaways at computer expos, I was extremely curious about how they worked. And since they were free software, I was able to look inside and try to figure out how the software worked. After I successfully made a bootable CD, I decided to make a “personal rescue CD.” That way, it would be possi- ble to use the software that I needed from a CD, rather than carry around an expensive and fragile laptop. Computers are available everywhere anyway, so why not just have the software in your pocket instead? The idea was to put in the CD and start working right away, without having to worry about installation or configuration of any kind. But hardware is evil. (Everyone knows this, even if he’s not a computer expert.) Vendors seem to create their own standards on demand, which are not standardized at all, and don’t even provide technical specifications. Compatibility in hardware depends more on luck or chance than on approved norms, so I had to decide among choosing a system that was so cheap in its hardware requirements that it would work on virtually every PC (which would probably mean that graphics worked only in VESA mode, at xi best), installing a manual hardware selector in order to load the necessary drivers, or scripting some kind of automatic configuration. For some reason, the last option seemed the most flexible and optimized solution, so I started writing scripts that would automatically install a Linux distribution on hard- ware components: identify hardware components, load the matching driv- ers, and create configuration files that are optimized for the hardware, yet tolerant enough to work around small glitches in the hardware specification.
Recommended publications
  • Linux on a Stick Everyone Knows You Can Boot Linux from a Live CD, but Have You Thought About Putting Linux on a Compact and Highly Portable USB
    KNOW HOW Memory Stick Linux Booting Linux from a USB Memory Stick Linux on a Stick Everyone knows you can boot Linux from a live CD, but have you thought about putting Linux on a compact and highly portable USB memory stick? BY FABRIZIO CIACCHI bootable “live” CD like Knoppix much more common. Part of our pur- ent from DSL, but it includes more [1] or Kanotix [2] gives the user a pose is to create an inexpensive system, software (about 14 MB plus), and it Afully portable operating environ- so I will base this discussion on the stan- has already been refined and tested for ment. You can carry your system with dard and very common 128 MB size. USB devices. you and boot it from anywhere. However, the procedure I describe in this • Flonix [8]: Flonix is also based on Your tools, your files, and your work- article can also be used to put a larger DSL, but it uses some different pro- space will follow you wherever you go – Knoppix-based distribution on a larger grams (for instance, IceWM instead even to another PC with a different USB memory stick. of Fluxbox). The Flonix project also operating system. Live CDs are also used Assuming you want room to work and introduced a useful web install by system administrators for trouble- store documents, it is a good idea to only process. Ultimately, Flonix was so shooting computers that won’t boot use half of the available space (64 MB) successful that it become a commer- normally. for the Linux system and related tools.
    [Show full text]
  • Linux on the Road
    Linux on the Road Linux with Laptops, Notebooks, PDAs, Mobile Phones and Other Portable Devices Werner Heuser <wehe[AT]tuxmobil.org> Linux Mobile Edition Edition Version 3.22 TuxMobil Berlin Copyright © 2000-2011 Werner Heuser 2011-12-12 Revision History Revision 3.22 2011-12-12 Revised by: wh The address of the opensuse-mobile mailing list has been added, a section power management for graphics cards has been added, a short description of Intel's LinuxPowerTop project has been added, all references to Suspend2 have been changed to TuxOnIce, links to OpenSync and Funambol syncronization packages have been added, some notes about SSDs have been added, many URLs have been checked and some minor improvements have been made. Revision 3.21 2005-11-14 Revised by: wh Some more typos have been fixed. Revision 3.20 2005-11-14 Revised by: wh Some typos have been fixed. Revision 3.19 2005-11-14 Revised by: wh A link to keytouch has been added, minor changes have been made. Revision 3.18 2005-10-10 Revised by: wh Some URLs have been updated, spelling has been corrected, minor changes have been made. Revision 3.17.1 2005-09-28 Revised by: sh A technical and a language review have been performed by Sebastian Henschel. Numerous bugs have been fixed and many URLs have been updated. Revision 3.17 2005-08-28 Revised by: wh Some more tools added to external monitor/projector section, link to Zaurus Development with Damn Small Linux added to cross-compile section, some additions about acoustic management for hard disks added, references to X.org added to X11 sections, link to laptop-mode-tools added, some URLs updated, spelling cleaned, minor changes.
    [Show full text]
  • Free Dmin Password Download Windows 10 3 Ways on How to Crack Administrator Password on Windows 10/8/7/XP
    free dmin password download windows 10 3 Ways on How to Crack Administrator Password on Windows 10/8/7/XP. Password is a very important security feature that lets you protect your important files from unauthorized users. If you have multiple accounts on your computer, then your administrator account will be the main account. To stop unauthorized users from gaining access to your important files, you would have likely set up a password to your administrator account. But what happens when you forget your administrator account password. You get a computer in which you can't go to the desktop or access your files. When you want to crack administrator password , then you will need the tricks to crack your administrator account password so that you can get access to your computer. Part 1. How to Crack Administrator Password Using CMD Part 2. Crack Administrator Password on Windows with Software Part 3. How to Crack Administrator Password Without Software. Part 1. How to Crack Administrator Password Using CMD. CMD or command prompt is an administrative tool in the Windows operating system. The command prompt is a command line tool that looks like MS-DOS and thus can be difficult to use for beginners. You can use various commands and utilities in command prompt to fix various system errors and issues. So it is no wonder that it can help crack administrator password. What you need for operating CMD is a little bit of skill and knowledge of the right commands. Command prompt not really shows you the old password, instead lets you reset the password.
    [Show full text]
  • Linux 与windows 互操作综述
    2012 年 第 21 卷 第 4 期 http://www.c-s-a.org.cn 计 算 机 系 统 应 用 Linux 与 Windows 互操作综述① 王亚军 (中国人民武装警察部队学院,廊坊 065000) 摘 要:针对 Linux 与 Windows 在桌面领域、网络领域和嵌入式领域的互操作问题,做了综合阐述。在桌面领 域,两者可以互运行对方程序、互处理数据文件、互访问文件系统;在网络领域,两者可以采用共同的网络协议 来支持对方系统中的资源与服务在网络环境下的共享操作;在嵌入式领域,两者可以采用虚拟化和代码重构等 技术来支持对方应用软件在本系统中的交叉开发和向本系统的移植等。 关键词:操作系统;互操作性;兼容内核;虚拟化;文件系统;网络协议;嵌入式系统 Overview of the Interoperability of Linux and Windows WANG Ya-Jun (Chinese People’s Armed Police Forces Academy, Langfang 065000, China) Abstract: Aiming at the problems of interoperability between Linux and Windows in desktop domain, network domain and embedded domain, solutions are systematically illustrated in this paper. In desktop domain, the two operating systems can mutually run programs, can mutually deal with data files, and can mutually access file systems. In network domain, the two systems can support the shared operations of resources and services between them under the network environment by adopting the same network protocols. In embedded domain, by adopting the technologies such as virtualization and code refactoring, the two systems can mutually support the cross development of application softwares in local system, mutually support the transplanting of application softwares to local system. Key words: operating system; interoperability; unified kernel; virtualization; file system; network protocol; embedded system 众所周知,Windows 是迄今为止在商业上最成功 境之间架起桥梁,即实现两者的互操作。 的操作系统,而 Linux 则是目前成长最快的操作系统。 在全球范围内,两者在桌面领域、网络领域和嵌入式 1 操作系统互操作技术 领域展开了激烈的竞争。在桌面领域,各种新版本的 操作系统互操作技术是通过约定的接口或协议实 Linux 系统相继推出,在很大程度上改善了用户体验,
    [Show full text]
  • HTTP-FUSE Xenoppix
    HTTP-FUSE Xenoppix Kuniyasu Suzaki† Toshiki Yagi† Kengo Iijima† Kenji Kitagawa†† Shuichi Tashiro††† National Institute of Advanced Industrial Science and Technology† Alpha Systems Inc.†† Information-Technology Promotion Agency, Japan††† {k.suzaki,yagi-toshiki,k-iijima}@aist.go.jp [email protected], [email protected] Abstract a CD-ROM. Furthermore it requires remaking the entire CD-ROM when a bit of data is up- dated. The other solution is a Virtual Machine We developed “HTTP-FUSE Xenoppix” which which enables us to install many OSes and ap- boots Linux, Plan9, and NetBSD on Virtual plications easily. However, that requires in- Machine Monitor “Xen” with a small bootable stalling virtual machine software. (6.5MB) CD-ROM. The bootable CD-ROM in- cludes boot loader, kernel, and miniroot only We have developed “Xenoppix” [1], which and most part of files are obtained via Internet is a combination of CD/DVD bootable Linux with network loopback device HTTP-FUSE “KNOPPIX” [2] and Virtual Machine Monitor CLOOP. It is made from cloop (Compressed “Xen” [3, 4]. Xenoppix boots Linux (KNOP- Loopback block device) and FUSE (Filesys- PIX) as Host OS and NetBSD or Plan9 as Guest tem USErspace). HTTP-FUSE CLOOP can re- OS with a bootable DVD only. KNOPPIX construct a block device from many small block is advanced in automatic device detection and files of HTTP servers. In this paper we describe driver integration. It prepares the Xen environ- the detail of the implementation and its perfor- ment and Guest OSes don’t need to worry about mance. lack of device drivers.
    [Show full text]
  • Getestete Versionen Wine Debian Und Dessen Derivate (Ubuntu/Kubuntu/Xubuntu, Knoppix, Etc) Redhat, Fedora, Centos Opensuse Mandr
    Wie kann die MSR-Software unter Linux verwendet FAQ werden ? MSR Electronics GmbH Getestete Versionen Gentoo Linux 2.6.34 64-Bit Wine 1.3.3 MSR PC-Software V5.10.18 → VERSION Wine Für den Betrieb der MSR PC-Software unter Linux ist die Software Wine1 erforderlich. Diese muss zuerst installiert werden. Für die verschiedenen Linux Distributionen wird dies mittels ver­ schiedener Kommandos getan. Debian und dessen Derivate (Ubuntu/Kubuntu/Xubuntu, Knoppix, etc) Entweder die offiziellen Pakete der Distribution verwenden (oft veraltet): $ sudo apt-get install wine Oder die neusten Pakete der Wine Maintainer verwenden (empfohlen): $ sudo add-apt-repository ppa:ubuntu-wine/ppa $ sudo apt-get updates $ sudo apt-get install wine1.3 RedHat, Fedora, CentOS Wine sollte sich in den offiziellen Quellen befinden. $ sudo yum install wine die Option --enablerepo=updates-testing erzwingt die neuste Version aus dem testing Repository: openSUSE Mittels YaST2 oder yum (siehe RedHat). Eventuell lohnt es sich auch, die neuste Version vom openSUSE Build Server herunterzuladen respektive diesen einzubinden, siehe dazu auch die entsprechende Webseite2. Mandriva Offizielle Version: $ su $ urpmi wine oder neuste Version von der Sourceforge Seite3. Gentoo $ emerge wine 1 Wine Is Not an Emulator: ist eine Windows-kompatible Laufzeitumgebung für POSIX-kompatible Betriebssyste­ me. Mit Wine ist es möglich, viele Programme, die für die Microsoft-Windows-Betriebssysteme kompiliert wur­ den, auch unter Unix mit dem X Window System laufen zu lassen. 2 http://download.opensuse.org/repositories/Emulators:/Wine/ 3 http://sourceforge.net/projects/wine/files/Mandriva Packages/ Version 0.9 Draft 1/5 Wie kann die MSR-Software unter Linux verwendet FAQ werden ? MSR Electronics GmbH Eventuell funktionieren oben genannte Kommandos nicht unter allen Versionen der entspre­ chenden Distributionen.
    [Show full text]
  • Is -Open Source- a Keyword for a Successful Gis Development ?
    IS -OPEN SOURCE- A KEYWORD FOR A SUCCESSFUL GIS DEVELOPMENT ? Umit Isikdag(MSc,BSc) University of Salford,UK School of Construction & Property Management [email protected] 1.What is a Geographical Information System ? A GIS can be defined as an information system capable of assembling, storing, manipulating, and displaying geographically referenced information. GIS is also regarded as “a computer system for capturing, storing, checking, integrating, manipulating, analysing and displaying data related to positions on the Earth's surface. Typically, a Geographical Information System (or Spatial Information System) is used for handling maps of one kind or another. These might be represented as several different layers where each layer holds data about a particular kind of feature. Each feature is linked to a position on the graphical image of a map.”12 Figure 1.1-Typical Components of a GIS 1.1 The basic functions of a GIS The basic functions of a GIS are defined as13 capturing the data,integrating the data,projection and registration,sturucturing and modelling the data.The USGS web site(http://www.usgs.gov) defines these functions in detail as: Data Capture:Maps can be digitized, or hand-traced with at computer mouse, to collect the coordinates of features. Data capture - putting the information into the system - is the time-consuming component of GIS work. Identities of the objects on the map must be specified, as well as their spatial relationships. Editing of information that is automatically captured can also be difficult. Electronic scanners record blemishes on a map just as faithfully as they record the map features.
    [Show full text]
  • How to Create a Custom Live CD for Secure Remote Incident Handling in the Enterprise
    How to Create a Custom Live CD for Secure Remote Incident Handling in the Enterprise Abstract This paper will document a process to create a custom Live CD for secure remote incident handling on Windows and Linux systems. The process will include how to configure SSH for remote access to the Live CD even when running behind a NAT device. The combination of customization and secure remote access will make this process valuable to incident handlers working in enterprise environments with limited remote IT support. Bert Hayes, [email protected] How to Create a Custom Live CD for Remote Incident Handling 2 Table of Contents Abstract ...........................................................................................................................................1 1. Introduction ............................................................................................................................5 2. Making Your Own Customized Debian GNU/Linux Based System........................................7 2.1. The Development Environment ......................................................................................7 2.2. Making Your Dream Incident Handling System...............................................................9 2.3. Hardening the Base Install.............................................................................................11 2.3.1. Managing Root Access with Sudo..........................................................................11 2.4. Randomizing the Handler Password at Boot Time ........................................................12
    [Show full text]
  • Experience with a Livecd in an Education Process
    EXPERIENCE WITH A LIVECD IN AN EDUCATION PROCESS Experience with a LiveCD in an education process Jan R˚uˇziˇcka, FrantiˇsekKl´ımek Institute of Geoinformatics Faculty of Mining and Geology, VSB-TUO E-mail: [email protected] Key words: LiveCD, GIS´akLiveCD, Distance Learning, E-learning Abstract The paper describes how can be LiveCD (Bootable CD) used for geoinformatics distance learn- ing. We have prepared one LiveCD with basic software for learning geoinformatics and we have some feedback from users and teachers. The paper should evaluate this feedback. LiveCD is a CD-ROM, that can be used as a bootable device. After booting from the CD, the user can access all resources compiled to the CD. There are operating system (usually based on GNU/Linux) and (user, desktop) software installed and configured to be used directly after boot. Our CD named GIS´akLiveCD contains basic GIS software such as UMN MapServer, GRASS, Quantum GIS, Thuban, JUMP, GPS Drive, Blender and we work on other soft- ware packages such as MapLab for UMN MapServer, PostGIS, GeoNetwork Open Source, CatMDEdit, gvSIG, uDIG. GIS´akLiveCD contains set of spatial data from the Czech Re- public. Main part of the CD are tutorials for GIS software. CD is open for other e-learning materials. Now we have about 20 students using our LiveCD and few other users that are not curently our students. The paper should show Pros & Cons of the LiveCD usage for a distance learning. LiveCD Live CD is bootable CD-ROM with operating system and installed and configured programs. It is ready to use as full installed system directly after boot from CD-ROM drive.
    [Show full text]
  • Cyber Security Manual V1.0.Pdf
    St. Angelo‘s Professional Education Lab Manual v1.0 Contributing Authors: Rajesh Vishwakarma Vinod Singh Satish Jha Lalit Jha 1 St. Angelo‘s Professional Education Lab Manual v1.0 Table of Contents Program Overview ............................................................................................................................ 5 What is penetration testing? ........................................................................................................ 5 Objectives ..................................................................................................................................... 5 Pre-requisites ............................................................................................................................... 5 Course Contents ........................................................................................................................... 6 Module One: Art of Hacking ..................................................................................................... 6 Module Two: Scenario of Enterprise security .......................................................................... 6 Module Three: Planning and gathering Information................................................................ 6 Module Four: Social Engineering .............................................................................................. 6 Module Five: Taking on the system .......................................................................................... 7 Module Six: Attacking passwords
    [Show full text]
  • Filesystems HOWTO Filesystems HOWTO Table of Contents Filesystems HOWTO
    Filesystems HOWTO Filesystems HOWTO Table of Contents Filesystems HOWTO..........................................................................................................................................1 Martin Hinner < [email protected]>, http://martin.hinner.info............................................................1 1. Introduction..........................................................................................................................................1 2. Volumes...............................................................................................................................................1 3. DOS FAT 12/16/32, VFAT.................................................................................................................2 4. High Performance FileSystem (HPFS)................................................................................................2 5. New Technology FileSystem (NTFS).................................................................................................2 6. Extended filesystems (Ext, Ext2, Ext3)...............................................................................................2 7. Macintosh Hierarchical Filesystem − HFS..........................................................................................3 8. ISO 9660 − CD−ROM filesystem.......................................................................................................3 9. Other filesystems.................................................................................................................................3
    [Show full text]
  • Debian Edu / Skolelinux Wheezy 7.1+Edu0 Manual
    Debian Edu / Skolelinux Wheezy 7.1+edu0 Manual May 28, 2016 i CONTENTS CONTENTS Contents 1 Manual for Debian Edu 7.1+edu0 Codename Wheezy1 2 About Debian Edu and Skolelinux1 2.1 Some history and why two names . .1 3 Architecture 2 3.1 Network . .2 3.1.1 The default network setup . .3 3.1.2 Main server (tjener) . .3 3.1.3 Services running on the main server . .3 3.1.4 LTSP server(s) (Thin client server(s)) . .5 3.1.5 Thin clients . .5 3.1.6 Diskless workstations . .5 3.1.7 Networked clients . .5 3.2 Administration . .5 3.2.1 Installation . .5 3.2.2 File system access configuration . .6 4 Requirements 6 4.1 Hardware requirements . .6 4.2 Hardware known to work . .7 5 Requirements for network setup7 5.1 Default Setup . .7 5.2 Internet router . .7 6 Installation and download options8 6.1 Where to find additional information . .8 6.2 Download the installation media for Debian Edu 7.1+edu0 Codename "Wheezy" . .8 6.2.1 netinstall CD image for i386, amd64 . .8 6.2.2 USB flash drive / Blue-ray disc ISO image for i386 and amd64 . .8 6.2.3 Source image . .8 6.3 Request a CD / DVD by mail . .8 6.4 Installing Debian Edu . .9 6.4.1 Select type of installation . .9 6.4.1.1 Additional boot parameters for installations . 12 6.4.2 The installation process . 12 6.4.3 Notes on some characteristics . 14 6.4.3.1 A note on notebooks .
    [Show full text]