The Linux Cookbook

Total Page:16

File Type:pdf, Size:1020Kb

The Linux Cookbook The Linux Cookbook The Linux Cookbook Tips and Techniques for Everyday Use Michael Stutz PRESS An imprint of No Starch Press, Inc. San Francisco The Linux Cookbook. Copyright ­c 2001 by Michael Stutz. All rights reserved. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechan- ical, including photocopying, recording, or by any information storage or retrieval system, without the prior written permission of the copyright owner and the publisher. Printed in the United States of America 12345678910–04 03 02 01 Trademarked names are used throughout this book. Rather than use a trademark symbol with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. Co-publishers: William Pollock and Phil Hughes Project Editor: Karol Jurado Assistant Editor: Nick Hoff Cover Design: Octopod Studios Typesetting and Design: Michael Stutz Technical Editor: Scott Schwartz Copyeditor: Andy Carroll Proofreader: Elisabeth Beller Distributed to the book trade in the United States by Publishers Group West, 1700 Fourth Street, Berkeley, California 94710, phone: 800-788-3123 or 510-528-1444, fax: 510-528-3444 Distributed to the book trade in Canada by Jacqueline Gross & Associates, Inc., 195 Allstate Parkway, Markham, Ontario L3R 4T8 Canada, phone: 905-477-0722, fax: 905-477-8619 For information on translations or book distributors outside the United States, please contact No Starch Press, Inc. directly: No Starch Press, Inc. 555 De Haro Street, Suite 250, San Francisco, CA 94107 phone: 415-863-9900; fax: 415-863-9950; [email protected]; www.nostarch.com The information in this book is distributed on an “As Is” basis, without warranty. While every precaution has been taken in the preparation of this work, neither the author nor No Starch Press, Inc. shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in it. This official author’s edition is published by exclusive arrangement with No Starch Press, Inc. Library of Congress Cataloging-in-Publication Data Stutz, Michael. The Linux cookbook / Michael Stutz. p. cm. ISBN 1-886411-48-4 (pbk.) 1. Linux. 2. Operating systems (Computers) I. Title. QA76.76.O63 S788 2000 005.4’32--dc21 00-046057 A note on the type in which this book is set The name of the font family used in this book is Computer Modern. These are free fonts designed by Donald E. Knuth for his TEX typesetting system, and are described in Volume E of the Computers & Typesetting series, Computer Modern Typefaces (Addison–Wesley, 1986). This book was written and produced using the free software tools it describes. It was prepared with Texinfo, a system for generating both hardcopy and electronic output from a single source document. The Texinfo input files were composed in GNU Emacs, and the screen shots were taken and processed with the Image Magick suite of tools. The output was converted to PostScript for printing using Tomas Rokicki’s Dvips, GNU Ghostscript, and Angus Duggan’s PostScript Utilities. The system was a 100MHz 586 personal computer running Debian GNU/Linux 2.2. Preface Because of its robust and stable nature, the Linux-based system is the choice of millions today. But what some may not know is that the free software movement, of which Linux is a part, is very much a counter-cultural phenomenon: the design by which it is produced and published is contrary to the notions of proprietary, intellectual “property” that have dominated mainstream culture so long. While some programmers turn their research into corporate-backed software that you cannot openly change, share, or examine (but only purchase and run on your system), Linux and other free software is the product of many individuals who courageously published and shared their research and work openly, for everyone to benefit from. I wrote this book because I want everyone to know how to use this software, because I think every- one deserves the freedom that comes with it. I don’t willingly use proprietary software—not because it is always inferior to free software but because its use precludes freedoms that I find I cannot exist without . freedoms that should be everyone’s right by default in a free, open society. (See Chapter 1 [Introduction], page 9.) I know that Linux isn’t difficult to use, especially when compared with other software and operating systems, but what was needed was a guide to show people how to use it to get things done: “Oh, you want to do that? Here, type this.” That explains the premise of the book—it’s a hands-on guide to getting things done on a Linux system, designed for the everyday user who is not necessarily a computer programmer. The traditional approach to the subject is to either provide laundry lists of all available commands and applications, or focus on their use in a programming or otherwise technical environment. This book takes a different approach, showing how everyday users—be they artists, designers, businessmen, scholars, or scientists—can use these tools and applications to get things done. When I speak of “things,” I mean (hopefully) the kind of things that you—the sort of person possibly and partially described above— might want to do with a modern computer system: view text and images, play and record sounds, perform mathematic operations, print to your printer, format text, access the Internet, check your grammar, and so forth. Like a culinary cookbook, this book presents “recipes” for preparing or accomplishing a particular, specific thing. I’ve selected what I consider to be the easiest and most effective methods for accomplish- ing particular tasks, and have arranged these recipes in general sections according to subject matter—the first part of the book is all about getting started, and contains the most essential information you need to know about using Linux; the remaining chapters deal with general categories of usage: Files, Text, Images, Sound, Productivity, and Networking. Format of Recipes Each recipe is numbered with at least two figures. These figures are constructed as follows: the first number always corresponds to the chapter number, and the second to the section of the recipe. For example, Chapter 3 is The Shell, and Recipe No. 3.5 is the fifth recipe on shells, Section 3.5 [Recording a Shell Session], page 41. Sometimes recipes are divided into subsections, with a third number specifying the specific recipe— for example, Recipe No. 3.4 is on the subject of command history in the shell, and is divided further into subsections; Recipe No. 3.4.2 is the second recipe on command history, Section 3.4.2 [Specifying a Command from Your History], page 41. Each recipe describes a method for completing a specific task on the system; these tasks require at least one software program. The software programs or files a recipe calls for are its ingredients. The recipes are structured as follows: 1. Recipe number and title of the recipe. 2. Special ingredients, if any. The Debian package(s) and/or or URLs where the program(s) can be obtained are listed, if they are available. The Linux Cookbook: Tips and Techniques for Everyday Use Debian classifies packages in varying level of importance, from ‘required’ packages that all systems must have in order to run, to ‘optional’ and ‘extra’ packages that you only install if you want them. If a described software package is in the first two given categories—‘required’ and ‘important’—then I assume you have it installed, and the package name isn’t listed here. In the rare case that a software package I describe is not yet available as a Debian package, I just give the URL where to obtain the source packages for that software; have your system administrator install it. 3. Special preparation methods or description, if any. When a configurable program is described, the standard setup as provided by the Debian distribution is assumed, unless otherwise specified here. 4. Description of the recipe and “cooking” method proper. 5. Remarks concerning the results and use. 6. Bulleted example of the method in a specific context. 7. Extra commands or actions you might want to do next. 8. Variations on the recipe, with additional examples. 9. Special notes or references to further information. Not all of these items may be present in a given recipe. Assumptions, Scope, and Exclusions There a few assumptions that this book makes about you, the reader, and about your Linux system. The Cookbook assumes that you have at least minimal understanding of your computer hardware— you don’t have to know how to take it apart or anything like that, but you ought to know how to operate the mouse, where the power button is on your computer and monitor, how to load paper in your printer, and so forth. If you need help with any of these tasks or concepts, ask your dealer or the party who set up your computer. This book also assumes that you have Linux installed and properly set up, and that you have your own user account set up on your system. If you need help with this, please see Section 1.3 [If You Need More Help], page 14. While this book can and should be used by the newcomer to Linux, I like to think that I’ve presented broad enough coverage of the Linux-based system, and have included enough interesting or obscure material, so that wizards, hackers, and members of the Linux Cabal may find some of it useful—and that said users will not feel ashamed to have a copy of this book on their desk or as part of their library.
Recommended publications
  • ISDN TA PC Card User Manual INTRODUCTION the ISDN TA PC Card Brings the Latest in Mobile Communication Technology with Flexibility and Convenience
    ISDN TA PC Card User Manual INTRODUCTION The ISDN TA PC Card brings the latest in mobile communication technology with flexibility and convenience. With the wide range ISDN signaling protocols switches supports, mobile experts may enjoy the mobile communication across the world and the high speed digital service. System Requirements Pentium 75 or above At least 30MB free hard disk space At least 16MB RAM PCMCIA Type II/III slot PCMCIA Card Services and Socket Services v.2.1 or higher pre-installed Windows 95/98/2000 or Windows NT pre-installed Specifications Standard PCMCIA 2.1 & JEIDA 4.1 compliant ISDN standards Basic Rate Access (2B+D) S/T-Interface: Compliant with ITU-T I.430 D-channel: ITU-T Q.921, Q.931 ETSI NET3 B-channel: V.120, V.110, X.75/T.70NL/ISO8208 Async-to-Sync PPP conversion Multilink PPP, 56 K Modem (CAPI only) G3 fax (CAPI only) - 1 - Voice (CAPI only) Line Rate 64/56 Kbps on 1 B-channel 128/112 Kbps on 2 B-channel (PPP/MP) 64/56Kbps on 1 B-channel 16Kbps on D-channel ISDN Network & Switch Compatibility National ISDN-1 (NI-1) AT&T 5ESS Custom Northen Telecom DMS-100 Custom DSS1 (Euro-ISDN) INS-Net 64 Application Program Interface Supported VCOMM WinISDN CAPI 2.0 NDIS WAN Operating System Supported Windows 95 and OSR2 Windows 98 Windows 2000 Windows NT 4.0 Physical Specifications RJ-45 ISDN line interface Dimension: 85.6 x 54 x 5 (mm) PCMCIA Type II - 2 - Parts Names 15-pin PC Card Connector ISDN Network Connection Cable - 3 - HARDWARE INSTALLATION If you are using the ISDN TA PC Card under Windows 95/98/2000, Do NOT insert the PCMCIA card until after the software installation is completed.
    [Show full text]
  • Linux on the Road
    Linux on the Road Linux with Laptops, Notebooks, PDAs, Mobile Phones and Other Portable Devices Werner Heuser <wehe[AT]tuxmobil.org> Linux Mobile Edition Edition Version 3.22 TuxMobil Berlin Copyright © 2000-2011 Werner Heuser 2011-12-12 Revision History Revision 3.22 2011-12-12 Revised by: wh The address of the opensuse-mobile mailing list has been added, a section power management for graphics cards has been added, a short description of Intel's LinuxPowerTop project has been added, all references to Suspend2 have been changed to TuxOnIce, links to OpenSync and Funambol syncronization packages have been added, some notes about SSDs have been added, many URLs have been checked and some minor improvements have been made. Revision 3.21 2005-11-14 Revised by: wh Some more typos have been fixed. Revision 3.20 2005-11-14 Revised by: wh Some typos have been fixed. Revision 3.19 2005-11-14 Revised by: wh A link to keytouch has been added, minor changes have been made. Revision 3.18 2005-10-10 Revised by: wh Some URLs have been updated, spelling has been corrected, minor changes have been made. Revision 3.17.1 2005-09-28 Revised by: sh A technical and a language review have been performed by Sebastian Henschel. Numerous bugs have been fixed and many URLs have been updated. Revision 3.17 2005-08-28 Revised by: wh Some more tools added to external monitor/projector section, link to Zaurus Development with Damn Small Linux added to cross-compile section, some additions about acoustic management for hard disks added, references to X.org added to X11 sections, link to laptop-mode-tools added, some URLs updated, spelling cleaned, minor changes.
    [Show full text]
  • The Elinks Manual the Elinks Manual Table of Contents Preface
    The ELinks Manual The ELinks Manual Table of Contents Preface.......................................................................................................................................................ix 1. Getting ELinks up and running...........................................................................................................1 1.1. Building and Installing ELinks...................................................................................................1 1.2. Requirements..............................................................................................................................1 1.3. Recommended Libraries and Programs......................................................................................1 1.4. Further reading............................................................................................................................2 1.5. Tips to obtain a very small static elinks binary...........................................................................2 1.6. ECMAScript support?!...............................................................................................................4 1.6.1. Ok, so how to get the ECMAScript support working?...................................................4 1.6.2. The ECMAScript support is buggy! Shall I blame Mozilla people?..............................6 1.6.3. Now, I would still like NJS or a new JS engine from scratch. .....................................6 1.7. Feature configuration file (features.conf).............................................................................7
    [Show full text]
  • GNU Emacs Manual
    GNU Emacs Manual GNU Emacs Manual Sixteenth Edition, Updated for Emacs Version 22.1. Richard Stallman This is the Sixteenth edition of the GNU Emacs Manual, updated for Emacs version 22.1. Copyright c 1985, 1986, 1987, 1993, 1994, 1995, 1996, 1997, 1998, 1999, 2000, 2001, 2002, 2003, 2004, 2005, 2006, 2007 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with the Invariant Sections being \The GNU Manifesto," \Distribution" and \GNU GENERAL PUBLIC LICENSE," with the Front-Cover texts being \A GNU Manual," and with the Back-Cover Texts as in (a) below. A copy of the license is included in the section entitled \GNU Free Documentation License." (a) The FSF's Back-Cover Text is: \You have freedom to copy and modify this GNU Manual, like GNU software. Copies published by the Free Software Foundation raise funds for GNU development." Published by the Free Software Foundation 51 Franklin Street, Fifth Floor Boston, MA 02110-1301 USA ISBN 1-882114-86-8 Cover art by Etienne Suvasa. i Short Contents Preface ::::::::::::::::::::::::::::::::::::::::::::::::: 1 Distribution ::::::::::::::::::::::::::::::::::::::::::::: 2 Introduction ::::::::::::::::::::::::::::::::::::::::::::: 5 1 The Organization of the Screen :::::::::::::::::::::::::: 6 2 Characters, Keys and Commands ::::::::::::::::::::::: 11 3 Entering and Exiting Emacs ::::::::::::::::::::::::::: 15 4 Basic Editing
    [Show full text]
  • HTTP Cookie - Wikipedia, the Free Encyclopedia 14/05/2014
    HTTP cookie - Wikipedia, the free encyclopedia 14/05/2014 Create account Log in Article Talk Read Edit View history Search HTTP cookie From Wikipedia, the free encyclopedia Navigation A cookie, also known as an HTTP cookie, web cookie, or browser HTTP Main page cookie, is a small piece of data sent from a website and stored in a Persistence · Compression · HTTPS · Contents user's web browser while the user is browsing that website. Every time Request methods Featured content the user loads the website, the browser sends the cookie back to the OPTIONS · GET · HEAD · POST · PUT · Current events server to notify the website of the user's previous activity.[1] Cookies DELETE · TRACE · CONNECT · PATCH · Random article Donate to Wikipedia were designed to be a reliable mechanism for websites to remember Header fields Wikimedia Shop stateful information (such as items in a shopping cart) or to record the Cookie · ETag · Location · HTTP referer · DNT user's browsing activity (including clicking particular buttons, logging in, · X-Forwarded-For · Interaction or recording which pages were visited by the user as far back as months Status codes or years ago). 301 Moved Permanently · 302 Found · Help 303 See Other · 403 Forbidden · About Wikipedia Although cookies cannot carry viruses, and cannot install malware on 404 Not Found · [2] Community portal the host computer, tracking cookies and especially third-party v · t · e · Recent changes tracking cookies are commonly used as ways to compile long-term Contact page records of individuals' browsing histories—a potential privacy concern that prompted European[3] and U.S.
    [Show full text]
  • Front Matter + Functional
    Infortrend External RAID Controller & Subsystem Generic Operation Manual Revision 1.62 Firmware Version: 3.31h Asia Pacific Americas (International headquarter) Infortrend Technology, Inc. Infortrend Corporation 8F, No. 102 Chung-Shan Rd., Sec. 3 3150 Coronado Drive, Unit C Chung-Ho City, Taipei Hsien, Taiwan Santa Clara, CA 95054, USA Tel: (886)-2-2226-0126 Tel: (408) 988-5088 Fax: (886)-2-2226-0020 Fax: (408) 988-6288 [email protected] [email protected] [email protected] [email protected] www.infortrend.com.tw www.infortrend.com China Europe (EMEA) Infortrend Technology, Limited Infortrend Europe Limited Room 1210, West Wing, Tower One, 5 Elmwood, Crockford Lane Junefield Plaza, No. 6 Xuanwumen Street, Chineham Business Park Xuanwu District, Beijing, China. Basingstoke, Hampshire Post code: 100052 RG24 8WG, UK Tel: 8610-63106168 Tel: +44-1256-70-77-00 Fax: 8610-63106188 Fax:+44-1256-70-78-89 [email protected] [email protected] [email protected] [email protected] www.infortrend.com.cn www.infortrend-europe.com Copyright © 2003 This Edition First Published 2003 All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise, without the prior written consent of Infortrend Technology, Inc. Disclaimer Infortrend Technology makes no representations or warranties with respect to the contents hereof and specifically disclaims any implied warranties of merchantability or fitness for any particular purpose. Furthermore, Infortrend Technology reserves the right to revise this publication and to make changes from time to time in the content hereof without oblig- ation to notify any person of such revisions or changes.
    [Show full text]
  • INSECURE-Mag-9.Pdf
    Another year is almost over and a plethora of information security problems are behind us. To let 2006 go out in style, we bring you a feature packed issue of (IN)SECURE. As the feature interview for this issue we had the pleasure of talking with Kurt Sauer, the CSO at Skype, one of the most well-known companies in the digital world. We’ll be back next year with many new ideas in the pipeline. Stay tuned for coverage from a few conferences including the RSA Conference in San Francisco and the Black Hat Briefings &Training in Amsterdam. If you’re attending, be sure to drop me an e-mail and we’ll grab a drink. We wish you a safe 2007! Mirko Zorz Chief Editor Visit the magazine website at www.insecuremag.com (IN)SECURE Magazine contacts Feedback and contributions: Mirko Zorz, Chief Editor - [email protected] Marketing: Berislav Kucan, Director of Marketing - [email protected] Distribution (IN)SECURE Magazine can be freely distributed in the form of the original, non modified PDF document. Distribution of modified versions of (IN)SECURE Magazine content is prohibited without the explicit permission from the editor. For reprinting information please send an email to [email protected] or send a fax to 1-866-420-2598. Copyright HNS Consulting Ltd. 2006. www.insecuremag.com New enterprise single sign-on authentication software DigitalPersona announced the latest version of its award-winning enterprise product, DigitalPersona Pro 4.0. The new and improved software delivers a complete, accurate and trusted fingerprint Enterprise Single Sign-On (ESSO) solution with more secure authentication, improved manageability and the broadest support available for the world’s leading biometrically-enabled notebooks including models from Lenovo, HP, Dell, and Toshiba.
    [Show full text]
  • The PC Weasel PCI
    The PC Weasel PCI Making servers run headless since 1999 User Documentation - Version 1.01 PC Weasel PCI Table of Contents Section . .Page Contact Information . 3 Documentation Revision History . 3 Introduction . 5 Installation Guide . 7 PC Weasel User Guide . 11 Loading the PC Weasel firmware . 29 Application notes . 33 Appendix 1: Motorola Format . 39 Copyright 2002 Middle Digital Incorporated 1 PC Weasel PCI User Documentation - Version 1.01 Blank page alert. 2 Copyright 2002 Middle Digital Incorporated User Documentation - Version 1.01 PC Weasel PCI Contact Information Web Page http://www.realweasel.com/ FTP Server ftp://ftp.realweasel.com/pub/realweasel/ Demo System PCI: telnet://pci-demo.realweasel.com ISA: telnet://isa-demo.realweasel.com Technical Support [email protected] Sales [email protected] Documentation [email protected] (for comments & corrections) Mailing Address Middle Digital Incorporated PO Box 2621, Station M Calgary, Alberta, Canada T2P 3C1 Address for Courier Service Middle Digital Incorporated not Post 238 11th Avenue SE Calgary, Alberta, Canada T2G 0X8 Vox 403-705-2025 Fax 403-705-2026 Documentation Revision History First release: 1.00 (somewhat premature) December 15th, 2001. Second release: 1.01 (minor corrections) March 4th, 2002. Copyright 2002 Middle Digital Incorporated 3 PC Weasel PCI User Documentation - Version 1.01 Blank page test. 4 Copyright 2002 Middle Digital Incorporated User Documentation - Version 1.01 PC Weasel PCI 1. Introduction The PC Weasel PCI is the mutant bastard child of Big Blue, open-source computing, and an inbred mass-murdering hillbilly. Depending on your point of view, it's either: a) a video board with serial output instead of a monitor and a keyboard with serial input instead of keys, or b) a serial board that emulates a video board and a keyboard.
    [Show full text]
  • A Zahlensysteme
    A Zahlensysteme Außer dem Dezimalsystem sind das Dual-,dasOktal- und das Hexadezimalsystem gebräuchlich. Ferner spielt das Binär codierte Dezimalsystem (BCD) bei manchen Anwendungen eine Rolle. Bei diesem sind die einzelnen Dezimalstellen für sich dual dargestellt. Die folgende Tabelle enthält die Werte von 0 bis dezimal 255. Be- quemlichkeitshalber sind auch die zugeordneten ASCII-Zeichen aufgeführt. dezimal dual oktal hex BCD ASCII 0 0 0 0 0 nul 11111soh 2102210stx 3113311etx 4 100 4 4 100 eot 5 101 5 5 101 enq 6 110 6 6 110 ack 7 111 7 7 111 bel 8 1000 10 8 1000 bs 9 1001 11 9 1001 ht 10 1010 12 a 1.0 lf 11 101 13 b 1.1 vt 12 1100 14 c 1.10 ff 13 1101 15 d 1.11 cr 14 1110 16 e 1.100 so 15 1111 17 f 1.101 si 16 10000 20 10 1.110 dle 17 10001 21 11 1.111 dc1 18 10010 22 12 1.1000 dc2 19 10011 23 13 1.1001 dc3 20 10100 24 14 10.0 dc4 21 10101 25 15 10.1 nak 22 10110 26 16 10.10 syn 430 A Zahlensysteme 23 10111 27 17 10.11 etb 24 11000 30 18 10.100 can 25 11001 31 19 10.101 em 26 11010 32 1a 10.110 sub 27 11011 33 1b 10.111 esc 28 11100 34 1c 10.1000 fs 29 11101 35 1d 10.1001 gs 30 11110 36 1e 11.0 rs 31 11111 37 1f 11.1 us 32 100000 40 20 11.10 space 33 100001 41 21 11.11 ! 34 100010 42 22 11.100 ” 35 100011 43 23 11.101 # 36 100100 44 24 11.110 $ 37 100101 45 25 11.111 % 38 100110 46 26 11.1000 & 39 100111 47 27 11.1001 ’ 40 101000 50 28 100.0 ( 41 101001 51 29 100.1 ) 42 101010 52 2a 100.10 * 43 101011 53 2b 100.11 + 44 101100 54 2c 100.100 , 45 101101 55 2d 100.101 - 46 101110 56 2e 100.110 .
    [Show full text]
  • Does Hardware Configuration and Processor Load Impact Software Fault Observability?
    Does Hardware Configuration and Processor Load Impact Software Fault Observability? Raza Abbas Syed1, Brian Robinson2, Laurie Williams1 1Department of Computer Science, North Carolina State University, Raleigh, NC 27695-8206 {rsyed, lawilli3}@ncsu.edu 2ABB Inc., US Corporate Research, Raleigh, NC 27606 [email protected] Abstract. Intermittent failures and nondeterministic behavior test teams during the product development cycle. For failures complicate and compromise the effectiveness of software detected in test, it is difficult to determine the underlying testing and debugging. To increase the observability of fault when reproducing the failure is not possible. When the software faults, we explore the effect hardware configurations underlying fault cannot be determined, the failure report is and processor load have on intermittent failures and the often closed and no additional effort is spent on it until nondeterministic behavior of software systems. We conducted additional occurrences are detected. For faults detected in the a case study on Mozilla Firefox with a selected set of reported field, developers spent considerable effort in either remotely field failures. We replicated the conditions that caused the debugging the fault or traveling to the customer site itself to reported failures ten times on each of nine hardware determine the fault and fix it. configurations by varying processor speed, memory, hard Nondeterministic behavior in software systems can be drive capacity, and processor load. Using several observability tools, we found that hardware configurations that had less attributed to a number of sources. Testers may not have processor speed and memory observed more failures than enough visibility or control over all of the inputs to the others.
    [Show full text]
  • Words You Should Know How to Spell by Jane Mallison.Pdf
    WO defammasiont priveledgei Spell it rigHt—everY tiMe! arrouse hexagonnalOver saicred r 12,000 Ceilling. Beleive. Scissers. Do you have trouble of the most DS HOW DS HOW spelling everyday words? Is your spell check on overdrive? MiSo S Well, this easy-to-use dictionary is just what you need! acheevei trajectarypelled machinry Organized with speed and convenience in mind, it gives WordS! you instant access to the correct spellings of more than 12,500 words. YOUextrac t grimey readallyi Also provided are quick tips and memory tricks, such as: SHOUlD KNOW • Help yourself get the spelling of their right by thinking of the phrase “their heirlooms.” • Most words ending in a “seed” sound are spelled “-cede” or “-ceed,” but one word ends in “-sede.” You could say the rule for spelling this word supersedes the other rules. Words t No matter what you’re working on, you can be confident You Should Know that your good writing won’t be marred by bad spelling. O S Words You Should Know How to Spell takes away the guesswork and helps you make a good impression! PELL hoW to spell David Hatcher, MA has taught communication skills for three universities and more than twenty government and private-industry clients. He has An A to Z Guide to Perfect SPellinG written and cowritten several books on writing, vocabulary, proofreading, editing, and related subjects. He lives in Winston-Salem, NC. Jane Mallison, MA teaches at Trinity School in New York City. The author bou tique swaveu g narl fabulus or coauthor of several books, she worked for many years with the writing section of the SAT test and continues to work with the AP English examination.
    [Show full text]
  • District 63 Thitr Taxlevyup 2S Per Copy VOL 32, NO
    . Three injured in . Nues Police cancel Golf Roädcaràccidèt : Santa visits Dear Virginia: Yes. there socancelled. Sergeant John Kot- byNiacyXtearniall Santa Class, but he aunt be mottas. us's manpower was the Emergency imIta from Motii December 12, causIng rush hourpaseengero in atti volildes. pulling up in a Nues sqoad car problem. Grove, GIenvew and Golf were treBle to be rerouted for nearly According to Uetttonant Ralph thisChriotanas.ThePolice- t'be program required three summ%ed (o a three ear pileup 45 mInutes whll paramedics at-Ozerwinaht, a Merino Greve aponnored Ctirtstmns Eve visita, Sontas, coatisned helpers and itl45 Golf Road at apprex- tem to extricate three ht-paramedic. two cars atnick each accuonpanled by jingling hells threesquad carL Kataeollas took huatelyIghl a.m. Monday jored drivers. There were no Conttaaedoit Page II and flashing more lights, are Coadaaedis Page 48 Increase necessary for salaries, life and safety work '41g iit' Edition - , District 63 thitr taXlevyup 2S per copy VOL 32, NO. fl TIIC OUCIEThURSDAY, PECEMOER lt. tOSO 4.92,percent Fina! MG recycling by Eileen Hinchield From the Board members 08 East Maine Last year'o levy lacetano was decision due in January ueipercentunttertmrottita byNaacy eeamtaaa slt,al.4it, or a 4.52 percent In- Taxation Act. a taxing body ¿osp £4t j4aiut creaieoverlaztyetrataregutartrip op to a 5 percent tnereaae Morton Grove ta one step away Ing at the forefront ¿8 gest contrat 13 eettn. from being one of theUral and senior legislation. The cono- bBeUer Qdcago suburban CoadanedoePage 44 to a v1Ude recycling YOa canbeaure Santa qUI proauL At the lad 1* viSage Christmas trees onisp1ay be at your bo iblo ye.r but beldDecemberl2,the teNUes.
    [Show full text]