Fedora 16 System Administrator's Guide

Total Page:16

File Type:pdf, Size:1020Kb

Fedora 16 System Administrator's Guide Fedora 16 System Administrator's Guide Deployment, Configuration, and Administration of Fedora 16 Jaromír Hradílek Douglas Silas Martin Prpič Eva Kopalová Eliška Slobodová Tomáš Čapek Petr Kovář Miroslav Svoboda System Administrator's Guide John Ha David O'Brien Michael Hideo Don Domingo Fedora 16 System Administrator's Guide Deployment, Configuration, and Administration of Fedora 16 Edition 1 Author Jaromír Hradílek [email protected] Author Douglas Silas [email protected] Author Martin Prpič [email protected] Author Eva Kopalová [email protected] Author Eliška Slobodová [email protected] Author Tomáš Čapek [email protected] Author Petr Kovář [email protected] Author Miroslav Svoboda [email protected] Author John Ha Author David O'Brien Author Michael Hideo Author Don Domingo Copyright © 2011 Red Hat, Inc. and others. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. For guidelines on the permitted uses of the Fedora trademarks, refer to https://fedoraproject.org/wiki/ Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. Java® is a registered trademark of Oracle and/or its affiliates. XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries. All other trademarks are the property of their respective owners. The System Administrator's Guide documents relevant information regarding the deployment, configuration, and administration of Fedora 16. It is oriented towards system administrators with a basic understanding of the system. Preface xv 1. Target Audience ............................................................................................................ xv 2. How to Read this Book .................................................................................................. xv 3. Document Conventions ................................................................................................ xviii 3.1. Typographic Conventions .................................................................................. xviii 3.2. Pull-quote Conventions ....................................................................................... xix 3.3. Notes and Warnings ........................................................................................... xx 4. Feedback ...................................................................................................................... xx 5. Acknowledgments ......................................................................................................... xxi I. Basic System Configuration 1 1. Configuring the Language and Keyboard 3 1.1. Changing the Language ....................................................................................... 3 1.2. Changing the Date, Time, and Numeric Format ...................................................... 4 1.3. Changing the Keyboard Layout ............................................................................. 6 1.4. Viewing the Current Configuration ......................................................................... 8 2. Configuring the Date and Time 9 2.1. Using the Date and Time Configuration Tool .......................................................... 9 2.2. Using the Command Line Tools .......................................................................... 10 2.2.1. Changing the Date ................................................................................... 10 2.2.2. Changing the Time .................................................................................. 10 2.2.3. Configuring the Network Time Protocol ..................................................... 10 2.3. Additional Resources .......................................................................................... 12 2.3.1. Installed Documentation ........................................................................... 12 3. Managing Users and Groups 13 3.1. Introduction to Users and Groups ........................................................................ 13 3.1.1. User Private Groups ................................................................................ 13 3.1.2. Shadow Passwords ................................................................................. 13 3.2. Using the User Accounts Tool ............................................................................. 14 3.2.1. Configuring an Account ............................................................................ 15 3.2.2. Adding a New User ................................................................................. 16 3.2.3. Removing a User ..................................................................................... 16 3.3. Using the User Manager Tool ............................................................................. 17 3.3.1. Viewing Users and Groups ....................................................................... 17 3.3.2. Adding a New User ................................................................................. 18 3.3.3. Adding a New Group ............................................................................... 19 3.3.4. Modifying User Properties ........................................................................ 19 3.3.5. Modifying Group Properties ...................................................................... 20 3.4. Using Command Line Tools ................................................................................ 21 3.4.1. Adding a New User ................................................................................. 21 3.4.2. Adding a New Group ............................................................................... 24 3.4.3. Enabling Password Aging ......................................................................... 25 3.4.4. Enabling Automatic Logouts ..................................................................... 26 3.4.5. Creating Group Directories ....................................................................... 27 3.5. Additional Resources .......................................................................................... 28 3.5.1. Installed Documentation ........................................................................... 28 II. Package Management 29 4. Yum 31 4.1. Checking For and Updating Packages ................................................................. 31 4.1.1. Checking For Updates ............................................................................. 31 v System Administrator's Guide 4.1.2. Updating Packages .................................................................................. 32 4.1.3. Preserving Configuration File Changes ..................................................... 34 4.2. Packages and Package Groups .......................................................................... 34 4.2.1. Searching Packages ................................................................................ 34 4.2.2. Listing Packages ..................................................................................... 34 4.2.3. Displaying Package Information ................................................................ 37 4.2.4. Installing Packages .................................................................................. 38 4.2.5. Removing Packages ................................................................................ 40 4.2.6. Working with Transaction History .............................................................. 41 4.3. Configuring Yum and Yum Repositories ............................................................... 46 4.3.1. Setting [main] Options .............................................................................. 46 4.3.2. Setting [repository] Options ...................................................................... 49 4.3.3. Using Yum Variables ............................................................................... 50 4.3.4. Viewing the Current Configuration ............................................................. 51 4.3.5. Adding, Enabling, and Disabling a Yum Repository .................................... 52 4.3.6. Creating a Yum Repository ...................................................................... 53 4.4. Yum Plug-ins ..................................................................................................... 54 4.4.1. Enabling, Configuring, and Disabling Yum Plug-ins .................................... 54 4.4.2. Installing Additional Yum Plug-ins ............................................................. 55 4.4.3. Plug-in
Recommended publications
  • Adu FTP Server Adu FTP Server Supriyanto [email protected] IINDENDEKKSS
    ADU SOFTWARE Berita | Ulasan | Adu Software | Utama | Bisnis | Apa Sih Sebenarnya... | Tutorial Adu FTP Server Adu FTP Server Supriyanto [email protected] IINDENDEKKSS ADU FTP SERVER oftpd 0.3.7 27 ProFTPD 1.2.10 27 PureFTPd 1.0.19 28 vsftpd 2.0.3 28 Wu-FTPD 2.6.2 29 WzdFTPD 0.5.2 29 auh sebelum protokol HTTP dibuat, pa- Wu-FTPD, WzdFTPD dan otftpd. Kriteria pengujian: ra pengguna Internet zaman dahulu su- Untuk pengujian keenam FTP server ini, Kali ini kami menguji enam buah aplikasi dah menggunakan protokol FTP sebagai yang menjadi penilaian terbesar bagi kami FTP Server yang ada di Linux. Sama seperti J sarana bertukar file. File Transfer Protocol adalah di masalah security. Program FTP pengujian yang telah dilakukan, kami tetap (FTP) merupakan aplikasi standar Internet server yang baik, harus memiliki catatan se- menggunakan empat kriteria sebagai bah- yang pertama kali di buat pada tahun 1971 curity hole yang sedikit. Banyak kasus yang an penilaian. Kriteria pertama adalah fung- sebagai bagian dari U.S Department of terjadi pada FTP Server yang berkaitan de- sionalitas. Sebuah program FTP Server yang Defense’s ARPANET (DARPANET) proto- ngan root exploit, yang didapat dari secu- baik harus memiliki fitur keamanan yang cols, yang kemudian juga melahirkan TCP rity hole aplikasi FTP Server. Untuk krite- baik dan memiliki kecepatan dalam mena- dan Internet Protocol (TCP/IP). ria lainnya adalah fitur pendukung aplikasi ngani request dari banyak user dalam satu Fungsi utama dari FTP sendiri adalah tersebut. Seperti adanya Authentification waktu. Untuk kriteria ini kami memberikan untuk berbagi file antar file system yang ber- Based SQL, LDAP atau PAM, virtual host porsi 40%.
    [Show full text]
  • General Infrastructure Vsftpd FTPS Setup Red Hat Enterprise Linux 5
    HAC Maarssen General Infrastructure vsftpd FTPS setup Red Hat Enterprise Linux 5 / CentOS 5 Author: René Hartman Version: 1.2.2 HAC Maarssen DOCUMENT HISTORY Document Location Ensure that this document is the current version. Printed documents and locally stored copies may become obsolete due to changes in the master document. Revision History Document name: FTPS_Setup_RHEL5.doc Version: 1.2.2 Date of 1 st version: 14-May-2010 Date of this version: 14-May-2010 Note: in the following table the revision number does not necessarily match with the version number of the document. The version number of the document is merely meant to control the number of saved changes. Version Date Author Status* Brief Description, Remarks Cpt FA Ap 1.0 14-May-2010 René Hartman X Initial Draft * Cpt = Concept; FA = For Approval; Ap = Approved HAC Maarssen Reviewers The following people have reviewed this document Version Name Role Required date of feedback Classifications Status: For approval HAC Maarssen TABLE OF CONTENTS Document History.......................................................................................................................... 1 Table Of Contents ......................................................................................................................... 3 1 Introduction ........................................................................................................................... 4 1.1 Overview .........................................................................................................................
    [Show full text]
  • Ubuntu Kung Fu
    Prepared exclusively for Alison Tyler Download at Boykma.Com What readers are saying about Ubuntu Kung Fu Ubuntu Kung Fu is excellent. The tips are fun and the hope of discov- ering hidden gems makes it a worthwhile task. John Southern Former editor of Linux Magazine I enjoyed Ubuntu Kung Fu and learned some new things. I would rec- ommend this book—nice tips and a lot of fun to be had. Carthik Sharma Creator of the Ubuntu Blog (http://ubuntu.wordpress.com) Wow! There are some great tips here! I have used Ubuntu since April 2005, starting with version 5.04. I found much in this book to inspire me and to teach me, and it answered lingering questions I didn’t know I had. The book is a good resource that I will gladly recommend to both newcomers and veteran users. Matthew Helmke Administrator, Ubuntu Forums Ubuntu Kung Fu is a fantastic compendium of useful, uncommon Ubuntu knowledge. Eric Hewitt Consultant, LiveLogic, LLC Prepared exclusively for Alison Tyler Download at Boykma.Com Ubuntu Kung Fu Tips, Tricks, Hints, and Hacks Keir Thomas The Pragmatic Bookshelf Raleigh, North Carolina Dallas, Texas Prepared exclusively for Alison Tyler Download at Boykma.Com Many of the designations used by manufacturers and sellers to distinguish their prod- ucts are claimed as trademarks. Where those designations appear in this book, and The Pragmatic Programmers, LLC was aware of a trademark claim, the designations have been printed in initial capital letters or in all capitals. The Pragmatic Starter Kit, The Pragmatic Programmer, Pragmatic Programming, Pragmatic Bookshelf and the linking g device are trademarks of The Pragmatic Programmers, LLC.
    [Show full text]
  • Communication Between Desktop and Web Applications
    Communication between desktop and web applications Author: Manuel Rego Casasnovas Contact: [email protected] Date: 20/11/2009 Copyright: Some rights reserved. This document is distributed under the Creative Commons Attribution-ShareAlike 3.0 licence, available in http://creativecommons.org/licenses/by-sa/3.0/. Abstract: Nowadays, everybody uses web applications. Despite of their advantages, like being available at any place with Internet, they have some usability problems with regard to common desktop applications. This article tries to analyze the possible solutions in order to interconnect desktop and web applications, centered in the GNOME platform and using RTM-GLib as example and study case. Table of Contents Introduction 2 State of the art in the GNOME platform . .2 Goals .......................................7 The library: RTM-GLib 7 Dependencies . .7 Development . .8 License ......................................8 Roadmap . .8 Usage example . .9 Future ideas 9 Mojito.......................................9 Trackerminer................................... 10 EDSbackend................................... 11 Conclusion 11 1 Introduction There are a large amount of web services in the Internet. A general definition of web service said that it is a system which provides an interface to allow interaction between machines over a network. As time passes more and more web applications provide some kind of API in order to access their services. This number is growing and it seems that will keep growing for some time. Some examples of these applications: Flickr, Facebook, Twitter, etc. Web applications has some advantages compared with desktop applications: All the data is shared and in a centralized place. They do not need any special configuration or installation, just a simple web browser is enough.
    [Show full text]
  • The GNOME Census: Who Writes GNOME?
    The GNOME Census: Who writes GNOME? Dave Neary & Vanessa David, Neary Consulting © Neary Consulting 2010: Some rights reserved Table of Contents Introduction.........................................................................................3 What is GNOME?.............................................................................3 Project governance...........................................................................3 Why survey GNOME?.......................................................................4 Scope and methodology...................................................................5 Tools and Observations on Data Quality..........................................7 Results and analysis...........................................................................10 GNOME Project size.......................................................................10 The Long Tail..................................................................................11 Effects of commercialisation..........................................................14 Who does the work?.......................................................................15 Who maintains GNOME?................................................................17 Conclusions........................................................................................22 References.........................................................................................24 Appendix 1: Modules included in survey...........................................25 2 Introduction What
    [Show full text]
  • Pembuatan Ftp Server Pada Server Redhat 4 Dengan Vsftpd
    Media Informatika Vol.13 No.1 (2014) PEMBUATAN FTP SERVER PADA SERVER REDHAT 4 DENGAN VSFTPD Hendy Djaja Siswaja E-mail : [email protected] Sekolah Tinggi Manajemen Informatika dan Komputer LIKMI Jl. Ir. H. Juanda 96 Bandung 40132 ABSTRAK FTP merupakan salah satu dari protokol pada jaringan komputer yang memiliki fungsi untuk memberi akses upload dan download file antar komputer yang terhubung dalam suatu jaringan komputer. FTP disukai karena mudah untuk dibuat dandapat dengan mudah untuk diakses dengan menggunakan web browser pada komputer. FTP paling banyak digunakan pada sistem operasi berbasis Linux, bahkan banyak distro-distro Linux yang menyediakan layanan FTP sebagai sarana bagi para user-nya untuk mendownload sistem operasi, update,aplikasi atau repositori lainnya. Kata kunci : ftp, VSFTPD, protokol, linux, jaringan komputer. 1. PENDAHULUAN Dalam setiap jaringan komputer, selalu muncul suatu kebutuhan dalam membagikan file-file komputer dari satu komputer ke komputer yang lain dan kebutuhan ini dapat dikatakan sebagai sesuatu hal yang bersifat primer (mendasar). Mengirimkan dan menerima file komputer mungkin merupakan suatu hal yang sederhana, bisa saja seseorang membagikan file komputer yang dimilikinya tanpa melalui jaringan komputer, misalnya melalui media perangkat penyimpanan sekunder seperti CD, DVD atau flashdisk. Namun cara seperti ini memiliki kekurangan terutama untuk file komputer yang sifatnya dinamis (sering mengalami perubahan) atau ketika pengirim dan penerima berada pada tempat yang berjauhan, misalnya berbeda kota maka pemindahan file dari satu komputer ke komputer yang lain dengan menggunakan media penyimpanan sekunder akan membutuhkan waktu cukup lama. Berangkat dari kebutuhan inilah maka para ahli jaringan komputer memikirkan suatu protokol yang memungkinkan satu komputer mengirimkan dan atau menerima data dari komputer yang lain melalui jaringan komputer sehingga kekurangan 44 45 Hendy Djaja Siswaja/ Pembuatan FTP Server pada Server Redhat 4 dengan VSFTPD dalam pembagian file melalui media penyimpanan sekunder dapat teratasi.
    [Show full text]
  • Log-Management-Tenshi.Pdf
    Network Monitoring and Management Log Management Network Startup Resource Center www.ws.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Log Management & Monitoring • Keep your logs in a secure place • Where they can be easily inspected • Watch your log file • They contain important information – Many things happen – Someone needs to review them – It’s not practical to do this manually Log Management & Monitoring On your routers and switches And, on your servers Log Management • Centralize and consolidate log files • Send all log messages from your routers, switches and servers to a single node – a log server. • All network hardware and UNIX/Linux servers can be monitored using some version of syslog (we use either syslog-ng or rsyslog for this workshop). • Windows can, also, use syslog with extra tools. • Save a copy of the logs locally, but, also, save them to a central log server. Syslog Basics Uses UDP protocol, port 514 Syslog messages have two attributes (in addition to the message itself): Facility Level Auth Security | Emergency (0) Authpriv User | Alert (1) Console Syslog | Critical (2) Cron UUCP | Error (3) Daemon Mail | Warning (4) Ftp Ntp | Notice (5) Kern News | Info (6) Lpr | Debug (7) Local0 ...Local7 | Centralized Logging Configuring Centralized Logging Cisco hardware – At a minimum: logging ip.of.logging.host Unix and Linux nodes – In syslogd.conf, or in rsyslog.conf, add: *.* @ip.of.log.host – Restart syslogd, rsyslog or syslog-ng Other equipment have similar options – Options to control facility and level Receiving Messages – syslog-ng • Identify the facility that the equipment is going to use to send its messages.
    [Show full text]
  • Virtual Environment for Ipv6 Analysis
    Virtual Environment for IPv6 Analysis ____________________________ Ricardo Alexander Saladrigas Advisor: Dr. Anna Calveras Barcelona DEDICATION To my parents, for giving me opportunities of immeasurable value and supporting me and my farfetched ideas. To my near family, for their accumulated efforts of improving our collective life. And to Maria Alexandra Siso, Robert Baumgartner, Alyssa Juday and Marc Ramirez for keeping me sane. i ACKNOWLEDGMENTS I extend my gratitude to everyone that has made my work possible. I express my thanks to the communities of VirtualBox, StackOverflow, ServerFault and Ubuntu Help as well as the Reddit communities for Linux and Networking for answering all my technical questions in detail and without prejudice I would like to thank Dr Anna Calveras for her guidance and patience. ii RESUMEN Nuestro objetivo fue la creación de una red compuesta de máquinas virtuales conectadas de forma específica a través de interfaces virtuales y con una seria de protocolos pre configurados que permiten la fácil creación de túneles IPv6 y traductores IPv6 a IPv4. Esta red les permitirá a profesores y estudiantes analizar y observar trafico IPv6 real sin la necesidad de una red física. La red está compuesta de múltiples Máquinas Virtuales Ubuntu y una Máquina Virtual Windows 7. La red puede ser fácilmente instalada en un ordenador corriendo Ubuntu o una distribución basada en Ubuntu. Un USB arrancable fue desarrollado para usar la red en un ordenador sin la necesidad de una instalación o de un sistema operativo especifico. Todas las máquinas virtuales Linux pueden fácilmente ser controladas a través de una terminal sin necesidad de clave utilizando una serie de scripts.
    [Show full text]
  • NXLOG Community Edition Reference Manual for V2.9.1716 I
    Ed. v2.9.1716 NXLOG Community Edition Reference Manual for v2.9.1716 i NXLOG Community Edition Reference Manual for v2.9.1716 Ed. v2.9.1716 Ed. v2.9.1716 NXLOG Community Edition Reference Manual for v2.9.1716 ii Copyright © 2009-2014 NXLog Ltd. Ed. v2.9.1716 NXLOG Community Edition Reference Manual for v2.9.1716 iii Contents 1 Introduction 1 1.1 Overview . .1 1.2 Features . .1 1.2.1 Multiplatform . .1 1.2.2 Modular architecture . .1 1.2.3 Client-server mode . .2 1.2.4 Log message sources and destinations . .2 1.2.5 Importance of security . .2 1.2.6 Scalable multi-threaded architecture . .2 1.2.7 High performance I/O . .2 1.2.8 Message buffering . .2 1.2.9 Prioritized processing . .3 1.2.10 Avoiding lost messages . .3 1.2.11 Apache-style configuration syntax . .3 1.2.12 Built-in config language . .3 1.2.13 Scheduled tasks . .3 1.2.14 Log rotation . .3 1.2.15 Different log message formats . .4 1.2.16 Advanced message processing capabilites . .4 1.2.17 Offline processing mode . .4 1.2.18 Character set and i18n support . .4 2 Installation and quickstart 5 2.1 Microsoft Windows . .5 2.2 GNU/Linux . .6 2.2.1 Installing from DEB packages (Debian, Ubuntu) . .6 2.2.2 Installing from RPM packages (CentOS, RedHat) . .6 2.2.3 Configuring nxlog on GNU/Linux . .6 Ed. v2.9.1716 NXLOG Community Edition Reference Manual for v2.9.1716 iv 3 Architecture and concepts 7 3.1 History .
    [Show full text]
  • Ubuntu Server Guide Basic Installation Preparing to Install
    Ubuntu Server Guide Welcome to the Ubuntu Server Guide! This site includes information on using Ubuntu Server for the latest LTS release, Ubuntu 20.04 LTS (Focal Fossa). For an offline version as well as versions for previous releases see below. Improving the Documentation If you find any errors or have suggestions for improvements to pages, please use the link at thebottomof each topic titled: “Help improve this document in the forum.” This link will take you to the Server Discourse forum for the specific page you are viewing. There you can share your comments or let us know aboutbugs with any page. PDFs and Previous Releases Below are links to the previous Ubuntu Server release server guides as well as an offline copy of the current version of this site: Ubuntu 20.04 LTS (Focal Fossa): PDF Ubuntu 18.04 LTS (Bionic Beaver): Web and PDF Ubuntu 16.04 LTS (Xenial Xerus): Web and PDF Support There are a couple of different ways that the Ubuntu Server edition is supported: commercial support and community support. The main commercial support (and development funding) is available from Canonical, Ltd. They supply reasonably- priced support contracts on a per desktop or per-server basis. For more information see the Ubuntu Advantage page. Community support is also provided by dedicated individuals and companies that wish to make Ubuntu the best distribution possible. Support is provided through multiple mailing lists, IRC channels, forums, blogs, wikis, etc. The large amount of information available can be overwhelming, but a good search engine query can usually provide an answer to your questions.
    [Show full text]
  • Memory Debugging
    Arm Forge User Guide Version 20.0.2 Arm Forge 20.0.2 Non-Confidential Proprietary Notice This document is protected by copyright and other related rights and the practice or implementation of the information contained in this document may be protected by one or more patents or pending patent applications. No part of this document may be reproduced in any form by any means without the express prior written permission of Arm. No license, express or implied, by estoppel or otherwise to any intellectual property rights is granted by this document unless specifically stated. Your access to the information in this document is conditional upon your acceptance that you will not use or permit others to use the information for the purposes of determining whether implementations infringe any third party patents. THIS DOCUMENT IS PROVIDED “AS IS”. ARM PROVIDES NO REPRESENTATIONS AND NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY, SATISFACTORY QUALITY, NONIN- FRINGEMENT OR FITNESS FOR A PARTICULAR PURPOSE WITH RESPECT TO THE DOCU- MENT. For the avoidance of doubt, Arm makes no representation with respect to, and has undertaken no analysis to identify or understand the scope and content of, third party patents, copyrights, trade secrets, or other rights. This document may include technical inaccuracies or typographical errors. TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT WILL ARM BE LIABLE FOR ANY DAMAGES, INCLUDING WITHOUT LIMITATION ANY DIRECT, INDIRECT, SPECIAL, INCI- DENTAL, PUNITIVE, OR CONSEQUENTIAL DAMAGES, HOWEVER CAUSED AND REGARD- LESS OF THE THEORY OF LIABILITY, ARISING OUT OF ANY USE OF THIS DOCUMENT, EVEN IF ARM HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Manuel Utilisateur Inkscape 1 / 174
    Manuel Utilisateur Inkscape 1 / 174 Manuel Utilisateur Inkscape Ed. Manuel Utilisateur Inskcape Ed. Manuel Utilisateur Inskcape Manuel Utilisateur Inkscape 2 / 174 Copyright © 2004-2007 Inkscape Team Permission to use, copy, modify and distribute under the terms of the General Public License. Ed. Manuel Utilisateur Inskcape Manuel Utilisateur Inkscape 3 / 174 COLLABORATORS TITLE : REFERENCE : Manuel Utilisateur Inkscape ACTION NAME DATE SIGNATURE WRITTEN BY Cedric Gemy, Kevin August 11, 2007 Wixson, and Elisa de Castro Guerra REVISION HISTORY NUMBER DATE DESCRIPTION NAME Ed. Manuel Utilisateur Inskcape Manuel Utilisateur Inkscape 4 / 174 Contents 1 Présentation d’Inkscape 27 1.1 Qu’est-ce qu’Inkscape ? . 27 1.1.1 I........................................................ 27 1.2 LeSVG........................................................ 27 1.2.1 Scalable Vector Graphics . 27 1.2.2 Objectifs du SVG . 28 1.3 Interface . 29 1.3.1 La fenêtre Inkscape . 29 1.3.2 Le menu . 30 1.3.3 La barre de commande . 30 1.3.4 Les outils . 31 1.3.5 La barre de contrôle des outils ou les options des outils . 31 1.3.6 Le canevas . 32 1.3.7 La palette . 32 1.3.8 La barre d’état et d’information . 32 1.3.9 Infos additionnelles . 32 1.3.10 Lire aussi . 33 1.4 Contextualité . 33 1.4.1 Contextualité . 33 1.5 Dialogues . 33 1.5.1 ........................................................ 33 1.5.2 Infos additionnelles . 33 1.6 Canevas . 34 1.6.1 Déplacement dans la fenêtre . 35 1.7 Règles . 35 1.7.1 Infos additionnelles . 35 1.8 Repères . 36 1.8.1 Apercu .
    [Show full text]