1. Trang chủ
  2. » Công Nghệ Thông Tin

Red Hat Linux 7.2 Bible, Unlimited ed phần 10 pot

92 296 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 92
Dung lượng 198,67 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Chapter 26: Getting Red Hat Linux “up2date”Fixes and improvements continue to arise well after a distribution, such as Red Hat Linux 7.2, is released.You can incorporate those fixes and

Trang 1

Troubleshooting a Wireless LAN

If you set up your two (or more) wireless LAN cards for Red Hat Linux systems to communicate together andthey are not communicating, you can troubleshoot the problem in several different ways

Check wireless settings

You can use the iwlist and iwconfig commands to check your wireless settings The iwconfig command cangive you a quick overview of your wireless settings, while the iwlist command shows you information aboutspecific parameters you are interested in

Use the iwconfig command, along with the name of the wireless LAN interface, to see information about thatinterface For example, if the wireless interface were eth0, you could type the following:

# iwconfig eth0

eth0 IEEE 802.11−DS ESSID:"Homelan" Nickname:"pine"

Mode:Ad−Hoc Frequency:2.412GHz Cell: 02:02:2D:2D:3B:30

Bit Rate=11Mb/s Tx−Power=15 dBm Sensitivity:1/3

RTS thr:off Fragment thr:off

Encryption key:7365−6375−31

Power Management:off

Link Quality:0/92 Signal level:−102 dBm Noise level:−102 dBm

Rx invalid nwid:0 invalid crypt:0 invalid misc:0

With iwconfig, you can see details about the wireless aspects of the Ethernet interface In this example, thenetwork name (ESSID) is Homelan and the station name (Nickname) is pine The interface is operating inAd−Hoc mode on channel 1 (frequency of 2.412GHz) Transmission rates are at the maximum speed of 11Mbps The encryption key that must be used by every node the card connects with is 7365−6375−31 Othersettings describe the link and signal quality

The iwlist command lets you request specific information about the wireless LAN interface The syntax is tofollow the iwlist command with the interface name and the information you are interested in For example:

# iwlist eth0 freq

eth 0 14 channels in total; available frequencies :

# iwlist eth0 rate

eth0 4 available bit−rates :

1 Mb/s

2 Mb/s

5.5 Mb/s

11 Mb/s

Trang 2

shown above, the 1, 2, 5.5, and 11 Mbps rates are all available for the current interface.

# iwlist eth0 keys

eth0 2 key sizes : 40, 104bits

Current Transmit Key: [1]

The keys parameter lets you see the encryption keys that are available with the interface It also shows thecurrent key sizes that are available Because the card reflected in the example above supports 64− and 128−bitencryption, the key sizes available are 40 and 104 bits (The encryption algorithm automatically generates thelast 24 bits of each key.)

If you are troubleshooting your wireless LAN connection, some settings are more likely than others to becausing problems It is important to set the following wireless LAN settings properly — if you don’t, theymay keep your network from working:

Network ID (ESSID) — You may not be able to communicate among peer computers if the Network

ID (ESSID) doesn't match on each of them Case is important — for example, Mylan will not matchMyLAN

Encryption key — Having encryption keys that don't match is like trying to log in to Linux without a

password Check that all nodes are using the same key

Mode — If you are communicating through an access point, your mode should be set to Managed and

you must provide the MAC address for that access point In most single cell networks, you should setall nodes to Ad hoc The Ad hoc mode allows all nodes to communicate directly to each other aspeers

Channel or Frequency — The channel and frequency options are just two different ways of setting

the same value For example, setting the channel to 1 is the same as setting the frequency to2.412G(GHz) Make sure that the nodes on your network are able to communicate on the same frequency

Check TCP/IP

To check that your wireless LAN is communicating with its peers, use the ping command (as described earlier

in this chapter) If you believe that your cards are working properly, but the ping command continues to giveyou a "Network Unreachable" message, there may be a problem with your TCP/IP configuration Here aresome items you can check from the Network Configuration window:

IP address — Check that you know the correct IP address of the peer you are trying to reach.

Host name — If you are pinging the peer computer by name, make sure that your computer can

properly resolve that name into the correct IP address or have the peer's host name and IP addressproperly listed in the /etc/hosts file locally The former probably requires that you have one or more

Trang 3

If you are able to reach another wireless computer on the wireless LAN, but are not able to reach computersoutside of that LAN (such as an Internet address), check that you have properly identified the location of yourgateway If the gateway address is correct, and you can reach that gateway, the problem may be that thegateway itself is not configured to allow packet forwarding.

If you find that any of the above information above was wrong and you corrected it, you should restart thewireless LAN interface One way to do that is to restart the PCMCIA interface as follows:

# /etc/init.d/pcmcia restart

Adapt to poor reception

Your wireless LAN might be working fine while your two wireless computers are sitting on the same desk.However, if performance degrades when you separate the computers, you may need to determine if there areobstacles in the way and, if so, how to get around them For desktop systems, a small indoor antenna canbring the signal out from under a desk or out of a closet For adjacent buildings, a roof antenna might be theanswer

In cities or other congested areas, many people and pieces of equipment can be competing for the 2.4 GHzrange You may want to move a microwave oven or certain highưend remote phones that are interfering withyour wireless LAN Here are a few ways you can adapt to poor reception:

Reduce transmission rate — Instead of using 11 Mbps, you can explicitly ramp down to 5.5, 2, or 1

Mbps Slower rates of speed can operate more efficiently in noisy environments

Smaller frame sizes — Though there is more total overhead to transmitting smaller frames, small

frames can often provide better overall performance Failures during transmissions of large framescause smaller hits than when small frames fail

Different frequencies — You can specifically request that certain frequencies (or channels) be used

for transmission You can try to use this technique to avoid congested channels

Use debugging tools

Because Orinoco cards and most other wireless LAN cards were created for Windows systems, some of thebetter debugging tools are available only on those systems If your computer is a dualưboot system (Windowsand Linux), you can try booting in Windows to test the quality of your wireless network For Orinoco cards inparticular, you should run the Client Manager to view information about the quality of your wireless links

In Red Hat Linux, you can use many of the tools you use for wired Ethernet networks and other TCP/IPnetwork interfaces Here are a couple of examples:

Ethereal — The Ethereal window (type ethereal as root user from a Terminal window) lets you watch

Ethernet frames as they are sent and received by your wireless LAN interface For example, theoutput of Ethereal can tell you whether a failed connection reflects a lack of reception or rejectedrequests

/var/log/messages — When the wireless LAN interface starts up, messages related to that startưup

Trang 4

being set for the wireless LAN module.

Summary

A wireless LAN can offer an effective way of extending your network to areas that are difficult or expensive

to reach with wired connections Using lowưcost wireless LAN cards, you can create peerưtoưpeer or

pointưtoưpoint networks Add Red Hat Linux systems as one or more of your wireless nodes and you can usepowerful security, routing, and monitoring tools to further expand and secure your network

You can control your wireless LAN card in Red Hat Linux by passing options to the card's module at startưuptime Once the interface is running, you can use the iwconfig command to change wireless settings, eitherfrom the command line or by adding iwconfig options to a configuration file so they are loaded automatically

Trang 5

Chapter 26: Getting Red Hat Linux “up2date”

Fixes and improvements continue to arise well after a distribution, such as Red Hat Linux 7.2, is released.You can incorporate those fixes and features into your version of Red Hat Linux by using a connection to theInternet and one of several tools for grabbing updated Red Hat software The tool that Red Hat prefers forkeeping its software up to date is called up2date

This chapter helps you to determine what updates are available for your Red Hat Linux system, and it

describes how you can register to use the Red Hat Network and use the up2date tool to gather those updates

Checking for Updates

How do you know when you need to upgrade the kernel or software packages that make up Red Hat Linux?One way to keep abreast of changes is to visit the Red Hat Errata page (Red Hat errata information is alsoavailable from the Red Hat Network, which is described later in this chapter.) You can also check for updates

to individual projects whose software is included in Red Hat Linux

Red Hat Errata page

Red Hat gathers together information you need to upgrade your system on the Red Hat Errata page

(http://www.redhat.com/errata) As the page proclaims, this is your way of finding “Security Alerts, BugFixes, and Enhancements” for Red Hat Linux Select the link to the current release (Red Hat Linux 7.2) Thelist of advisories that appears contains the package name, a synopsis of the problem addressed by the

corrected package, and the date the update was released

Many of the advisories are aimed at plugging potential security holes In particular, these advisories ofteninclude package fixes that address vulnerabilities in network services or mishandled permissions Click on apackage name in the list to get a detailed description of the package update, as well as links to where you candownload the updated package

Going directly to the Red Hat Errata page is probably the best way to check on vulnerabilities and bugsrelating to your version of Red Hat Linux You can either download and install each new package individually

or use the up2date application (described later in this chapter) to install multiple updates at once

Project Web sites

Most open−source projects have Web sites that are used to track software development, post news, andanswer questions about a project In some cases, critical bugs or security issues may be posted at a project’sWeb site before Red Hat hears of it If you’re operating a public server on the Internet, you might be

particularly interested in keeping up on potential problems relating to the network services you are running.For example, if you are using wu−ftpd as your FTP server software, you can refer to the WU−FTPD

Development Group site (http://www.wu−ftpd.org) Recent news items are posted on that site — news

regarding security issues might be particularly useful to you You can also subscribe to wu−ftpd mailing listsfrom this site If you don’t want to be flooded with email, you might simply want to subscribe to the

wuftpd−announce list to get occasional announcements about security problems

The following are other project sites that you might want to check for problems and issues that arise:

Apache Software Foundation (http://www.apache.org) ( Get updates about Apache Web server issues

Trang 6

Samba.org (http://www.samba.org) ( Find information relating to Windows file− and print−sharingissues (SMB).

Getting Updates from Red Hat Network

Red Hat has created a system that automatically notifies you of available updates and lets you easily

download and install them on your Red Hat Linux system The service is called Red Hat Network Registeringwith the Red Hat Network allows you to run the up2date program from your Red Hat Linux computer

whenever you are ready to do the updates

Red Hat Network provides a mechanism that can:

Alert you to the latest fixes and enhancements available for Red Hat Linux

Install the packages that include those changes to your system

There is a lot of information available about the Red Hat Network from its Web page (http://rhn.redhat.com).This section provides an overview of how that service works and guides you through the registration process

If you don’t mind giving out your e−mail address, street address, and phone number, there are some prettygood reasons for creating a Red Hat Network account for yourself With a free Red Hat Network account, youcan register your Red Hat Linux system and create system profiles Registering your first machine also

entitles you to receive all updates for that machine To get more services (or entitle more machines), you canpurchase a subscription to the Red Hat Network

Note Because the Red Hat Network is fairly new and constantly evolving, it is possible that many of thefeatures and entitlements described in this section will change Check the Red Hat Network site

(http://rhn.redhat.com/) for information on new features if the procedures in this section seem to havechanged

Running rhn_register

To register your system with Red Hat Network, you can use the rhn_register command Using rhn_registerrequires a connection to the Internet and root access to your computer The latter is because the registrationprogram needs to access your computer’s RPM database Though only the first computer you register canreceive free automatic updates, you can register as many computers as you want with this tool (for additionalfees) Here is how it works

1

Open a Terminal window as root user

Trang 7

Type rhn_register A Network Settings window appears, allowing you to add a proxy server setting incase you need to go through a proxy server to reach the Internet.

5

Read the Privacy Statement and, if it is acceptable, click Next to continue The Register or Update

“User Account” window appears

A “Register a System Profile – Hardware” window appears This includes information about yourRed Hat Linux version, hostname, IP address, CPU mode, CPU speed, and memory

Trang 8

Check that the packages that appear in the window are all OK to include in your system profile (anddeselect the ones you don’t want to included) and click Next to continue.

The “Send Profile Information to Red Hat Network” window appears

10

Click Next to have the system profile information registered with the Red Hat Network (You can alsochoose to not send the information by clicking Cancel.) Your information is sent and the RegistrationFinished window appears

11

Click on Finish to end the session

After you have finished registering with the Red Hat Network, you can go to the Red Hat Network site andlog in to use the service You are also ready now to run the up2date command to update your software

packages

Running up2date

After you have registered your computer with the Red Hat Network, you can use the up2date command tofind and install updates As with rhn_register, you need root access to your computer to run up2date This isbecause up2date needs permission to change configuration files and install packages

The up2date configuration file (/etc/sysconfig/rhn/up2date) determines the behavior of up2date In order tohelp you understand what up2date will do when you launch it, here are a few of the key settings in the up2dateconfiguration file:

There are other settings in the up2date configuration file you can use to further refine your up2date session.For example, you can identify an HTTP proxy server, change the number of failed network connection

attempts before exiting, or set to retrieve source packages along with the binary packages If you would ratherchange the configuration file from the desktop GUI, run the up2date−config command (you need root

permission)

In most cases, the default up2date settings will work well The following is an example of an up2date session.Note You need version 2.5.4 or higher of up2date in order to upgrade kernel packages using up2date If you

Trang 9

upgrade kernel packages, remember to comment out the removeSkipList=kernel* line so that kernelpackages can be upgraded After it’s installed, the new kernel will be booted by default If the kernelupgrade doesn’t work, your GRUB or LILO prompt will allow you to select the old kernel to boot from.

1

Open a Terminal window as root user

2

Type up2date If your system does not yet have the Red Hat public key, you will be asked if you want

to have up2date install the key (The key is needed to verify that the packages you are receiving aresigned by Red Hat You may need to restart up2date after you add the key.)

Click Next to continue The update agent begins checking your available packages

The “Packages Flagged to be Skipped” window appears By default, kernel packages are always set to

be skipped This is because updating the kernel requires some special action and has some risks Tooverride any of these packages, you need to click on the checkbox next to the package you want toupdate

To find out more about advisories associated with recommended updates on any of these packages,click on the package and click View Advisory Each advisory related to the package is displayed in aseparate window

6

If the skipped package list is acceptable to you, click Next to continue The “Available PackageUpdates” window appears, displaying packages that are installed on your system for which updatesare available Figure 26−1 shows an example of the “Available Package Updates” window

Trang 10

Figure 26−1: Select packages you want Red Hat Network to update.

7

Click each package you want to update or click Select All Packages to have all available packagesupdated As with the skipped packages, you can click on a package, then click on View Advisory tosee which advisories are addressed by updates for the package

10

Click Next to begin downloading the packages to your computer (This may take a while, depending

on the speed of your Internet connection and the number of packages you are downloading.)

Click Finish to end the session

If you are interested in seeing how the upgrades went, you can do the following:

Check the log file (/var/log/up2date)

See if any packages were left behind in the spool directory (/var/spool/up2date)

Though you don’t necessarily have to reboot Linux at this point, if there are new daemon processes installedwith any of the updated packages you might want to restart them For example, to restart your Web server(httpd daemon), you could type the following as root user:

# /etc/init.d/httpd restart

Trang 11

Using the Red Hat Network

Once you have an account with Red Hat Network, you can log in to the Red Hat Network site and take

advantage of the services it offers As noted earlier, each registered user is “entitled” to register one computer

to receive automatic updates Other services that you receive by simply registering with the Red Hat NetworkWeb site include:

Viewing complete listings of available errata, including security, bug fix, and enhancement alerts.Separate errata listings exist for each Red Hat Linux version, which takes the guess work out ofcompatibility issues

A feature for scheduling actions, such as automatically updating packages at a specified time

Go to the Red Hat Network site (http://rhn.redhat.com) and log in using the user name and account youcreated during the rhn_register session described earlier Traverse the site using the menu bar in the leftcolumn Available sections include:

Entitlements ( Shows which of your Red Hat Linux systems are entitled to use the up2date service.You can also purchase additional entitlement licenses from this page

Systems ( Lets you view a System List, which contains all the systems you have registered with RHN,

or use a Search tool to search your list of systems

Channels and Packages ( A channel designates a version of Red Hat Linux that has package updatesassociated with it By selecting the Channel List, you can see what package versions are available forthe Red Hat Linux version you are using By selecting the Package List for your channel, you canview and select to download individual package updates to your system

Errata ( From the Errata page, you can display all errata, show only those that apply to your system, or

do keyword searches of available errata

Trang 12

Scheduled Actions ( You can schedule package installations to occur at a later time By accessing theScheduled Actions page, you can see pending, completed, and archived actions.

Help Desk ( For more help with Red Hat Network, the Help Desk offers the RHN FAQ, a Customer Servicesupport link, Support Forums, and the RHN Reference Guide

Each “entitlement” lets you receive updates for a single machine, using up2date and related utilities If youwant to purchase additional entitlements, check the Red Hat Network site for the latest prices At the time ofthis writing, the price was $19.95 per month for each additional system you entitle

Without purchasing additional entitlements, you can still register additional systems with the Red Hat

Network However, you can’t use the up2date mechanism to update those additional systems To registeradditional systems, simply run the rhn_register command from each system you want to register Whenprompted, give the Red Hat Network your existing user name and password The next time you visit thenetwork, you can see the newly registered system in your system list, although there will be no entitlementlisted to let you do automatic updates

Summary

The chore of keeping your Red Hat Linux system upgraded with the latest bug fixes, security patches, andenhancements has been simplified greatly with Red Hat’s up2date tool Using up2date, you can automaticallycheck for updates, download updated packages to your computer, and install them By registering your systemwith the Red Hat Network, you can take advantage of services that let you manage your computers and trackupdates You can receive free automatic upgrades for the first computer you register; updates for subsequentcomputers involve a fee

Chris Negus has been working with UNIX systems, the Internet, and (more recently) Linux systems for more

than two decades During that time, Chris worked at AT&T Bell Laboratories, UNIX System Laboratories,and Novell, helping to develop the UNIX operating system Features from many of the UNIX projects Chrisworked on at AT&T have found their way into Red Hat and other Linux systems

During the past few years, Chris has written several books on UNIX and the Internet, including Caldera

OpenLinux Bible, Internet Explorer 4 Bible, and Netscape Plug−ins For Dummies for Hungry Minds

(formerly IDG Books Worldwide) He also co−wrote several books for Que Corporation, including The

Complete Idiot’s Guide to Networking (second and third editions) and Using UNIX (second edition) Chris’s

other writings include articles for Internet World, NetWare Connection, and Visual Developer magazines.

At home, Chris enjoys spending time with his wife, Sheree, and his boys, Caleb and Seth His hobbies includesoccer, singing, and exercising with Sheree

Trang 13

Appendix A: What’s on the CD−ROMs?

The CD−ROMs that accompany this book consist of two Red Hat Linux 7.2 Installation CDs and one

Documentation CD To install Red Hat Linux 7.2:

Follow the instructions contained in Chapter 2 and on the CD−ROM Installation page in the back ofthis book

Refer to Appendix B for a complete list of the Red Hat software packages

If for some reason you don't have your CDs handy, you can download any of these packages from a Red HatLinux mirror site (see www.redhat.com/download/mirror.html) The RPMfind.net is an excellent resource forfinding additional software packages for Red Hat Linux I also recommend that you consider installingsoftware packages that are available from the Red Hat Linux ContribNet site (http://rhcontrib.bero.org/).RPMfind.net and ContribNet locations can help you find extra, useful software packages that were onceincluded with the Red Hat Linux PowerTools CD Red Hat, Inc., no longer maintains PowerTools

Note All CD−ROM files are read−only The CD−ROM is intended primarily for users to install the binaryRed Hat Linux software However, a CD−ROM containing source code for the Red Hat Linux

distribution is also available by using a mail−in coupon that’s on the CDs Advanced users can modifythis source code to change the behavior of Red Hat Linux Changing this source code requires someknowledge of programming and software compilation tools

Trang 14

Appendix B: Red Hat Linux RPMs

More than 1,200 Red Hat Package Manager (RPM) software packages are delivered with Red Hat Linux 7.2.Many of these packages are added to your computer automatically when you first install Red Hat Linux.Others can be added later, using one of several software installation tools

This appendix contains an alphabetical listing and descriptions of the Red Hat Linux 7.2 software packages.The descriptions in this appendix will help you determine the contents of those packages

Note Red Hat Linux software packages are contained on the first two CDs packaged with this book (CD−1and CD−2) The third CD contains FAQs, HOW−TOs, and Red Hat–specific manuals (Installation,Configuration, Getting Started, and Reference guides)

Applications — Contains application program packages for a dozen subcategories These categories

include Archiving, Communications, Editors, Emulators, Engineering, File, Internet, Multimedia,Productivity, Publishing, System, and Text

Development — Contains software development packages for the following categories: Debuggers,

Languages, Libraries, System, and Tools

Documentation — Contains documentation packages, which include such things as the GNOME

User’s Guide, help tools, man pages, FAQs, HOW−TOs, System Administrator's Guide, and XFree86documentation

System Environment — Contains basic Red Hat Linux system software packages Categories of

packages include Base, Daemons, Kernel, Libraries, and Shells

User Interface — Contains software packages related to the Desktops (such as window managers), X

(the X Window System), and X Hardware Support (such as Xconfigurator for configuring videocards)

A command−line tool for adding, deleting, and displaying the contents of RPMs is the rpm command Withthe rpm command, you can even view the contents of a package that you haven’t installed yet

Cross−Reference See Chapter 5 for descriptions of the RPM package format and tools for installing RPM

packages

Trang 15

alchemist: Contains back−end configuration tools used by such features as printing, DNS, and

Apache Web server

Trang 16

anonftp: Contains utilities that are made available to anonymous FTP users.

Trang 17

aumix: Contains the aumix program (which runs in a Terminal window) for adjusting audio mixing

device (/dev/mixer) settings

Trang 18

bg5ps: Contains a tool that converts BIG5 encoded Chinese into printable postscript.

blas: Contains the Basic Linear Algebra Subprograms (BLAS) libraries for performing many basic

linear algebra algorithms

busybox: Contains a statically linked binary that provides simplified versions of system commands;

useful for recovering from certain types of system failures

Trang 19

bzip2: Contains the bzip2 and bzcat utilities for compressing and uncompressing files.

Trang 20

chkconfig: Contains the chkconfig command for changing run−level information for system services.

cipe: Contains the Crypto IP Encapsulation tool (cipe), which is used for creating virtual private

networks across public networks (such as the Internet) using tunneling

compat−libs: Contains run−time libraries that allow you to do development for earlier Red Hat Linux

systems (such as Red Hat Linux 6.2)

compat−libstdc++: Contains several Run−Time Libraries that provide applications that are backward

compatible with C++ in Red Hat 5.2

Trang 21

control−center−devel: Contains components needed to develop capplets used as panels in the

GNOME control center

cproto: Contains the cproto tool for creating function prototypes and variable declaration for X

language source code

cWnn−devel: Contains the library and header files required to develop applications that use the

cWnn or tWnn Chinese character input system

cyrus−sasl: Contains the Cyrus version of the Simple Authentication and Security Layer, which is

used to provide authentication support for connection−based applications

Trang 22

cyrus−sasl−md5: Contains plugins for cyrus−sasl that support CRAM−MD5 and DIGEST−MD5

Trang 23

dhcp: Contains components needed to support the dynamic host configuration protocol, which is

needed to configure a DHCP server on your network

dhcpcd: Contains the DHCP daemon processes needed by a DHCP client to get network

configuration information about itself from a DHCP server system

diffstat: Contains the diffstat command for converting diff output to display file changes in a form

that is easier to read

dmalloc: Contains the dmalloc memory management library, which can be used to replace other

memory management tools

docbook*: This set of packages contains the DocBook SGML DTD for working with SGML

documents, as well as other related tools and style sheets

doxygen: Contains the doxygen command for creating documentation from C or C++ programming

language source code that is documented

Trang 24

dump−static: Contains static versions of commands for backing up (dump−static) and restoring

Trang 25

enlightenment: Contains Enlightenment, an X−based window manager Enlightenment is the default

window manager used with the GNOME desktop environment

fam: Contains the File Alteration Monitor tool, which provides notification of changes in specific

files or directories to an application

Trang 26

fetchmail: Contains the fetchmail mail retrieval utilities, which are used to get mail over TCP/IP

serial connections (such as SLIP and PPP)

Trang 27

freetypeưutils: Contains several utilities for managing fonts.

Trang 28

GConf−devel: Contains library files required for developing with GConf.

ghostscript: Contains the Ghostscript (gs) program for displaying PostScript files and for producing

output from PostScript files so they can be printed on non−PostScript printers

Trang 29

ghostscript−fonts: Contains a set of type fonts used with the Ghostscript program.

giftrans: Contains the giftrans utility for converting GIF87 files to GIF89 format.

gimp: Contains the GIMP image manipulation program, which can be used to retouch photos, create

images, and work with images

gimp−perl: Contains libraries used for communications between GIMP and GIMP Perl extensions

and plug−in programs

gkermit: Contains the gkermit utility for transferring files using the Kermit protocol.

gkrellm: Contains a collection of monitoring software that charts the usage of resources including

CPU, disk activity, and network traffic

Trang 30

glibc−devel: Contains the standard header and object files needed to develop most C language

programs

glibc−profile: Contains the libraries that are needed to create programs being profiled with gprof.

glms: Contains tools for using LM processors (which are hardware sensors that monitor such things

as fan speed, processor temperature, and performance of your power supply

Trang 31

gnomeưlibsưdevel: Contains libraries needed to create applications to run on a GNOME desktop

gnomeưpim: Contains the GNOME Personal Information Manager, which includes applications such

as gnomecal (personal calendar) and gnomecard (contact lists)

gnomeưpimưdevel: Contains components needed to develop applications that communicate with

GNOMEưPIM applications using Corba

gnomeưuserưdocs: Contains the GNOME glossary, introduction to GNOME, and a UNIX primer for

the GNOME Desktop Environment

gnomeưvfsưextras: Contains extra modules that are not distributed with the core GNOMEưVFS

package, including a Sambaưbased smb network browser

Trang 32

gnumeric: Contains the gnumeric spreadsheet program that runs in the GNOME desktop

grub: Contains the Grand Unified Boot Loader, an experimental utility capable of booting into most

of the major free and commercial operating systems

gsl: Contains the GNU Scientific Library for numerical analysis and other high−level mathematics.

Trang 33

gsm: Contains the toast and untoast sound compression utilities.

guile−devel: Contains libraries and header files required to develop programs that are linked with the

GUILE extensibility library

Trang 34

guppi: Contains a GNOME−based data analysis and visualization system.

htdig: Contains the htdig Web indexing and search system This system was created specifically for

use on private intranets and campuses

Trang 35

im: Contains a set of Internet Message (im•) commands for integrating mail and news programs.

indexhtml: Contains the indexhtml package, which includes Red Hat Linux welcome page that

appears when you start your Web browser

initscripts: Contains many of the basic Linux system initialization scripts, which are started at

different run levels

Trang 36

inn: Contains the InterNetNews server for creating and maintaining a news server in Linux.

inn−devel: Contains components needed to develop applications that use the InterNetNews system.

internet−config: Contains the internet−config graphical tool for configuring the following types of

network connections: ADSL or T−DSL, ISDN, or modem

ipchains: Contains components for implementing firewalls and IP masquerading on IP networks.

iproute: Contains the ip command and related utilities used for routing IP traffic Features in this

package include routing, multicasting, and tunneling, including IPv6 support

Trang 37

isdn4kưutilsưvboxgetty: Contains vboxgetty and vboxputty tools, which are needed for an ISDN

Trang 38

kbdconfig: Contains the kbdconfig command for configuring keyboard mappings.

kdebase: Contains the basic applications that are used with the KDE desktop environment, including

the kwm window manager, kfm file manager, and konsole terminal window

kdegames: Contains games such as kasteroids, kblackbox, and ksmiletris that are compatible with the

KDE desktop interface

Trang 39

kdegraphics: Contains graphics applications created for the KDE desktop environment, including the

kdvi TeX display utility, the kfax Fax display utility, and the kicon icon editor

kdemultimedia−devel: Contains development files needed to develop applications that use

kdemultimedia, such as plugins for the noatun media player

Trang 40

kdesdk−devel: Contains development files for kdesdk.

kdetoys: Contains some fun utilities, such as kmoon (moon phase indicator) and kworldwatch (which

indicates areas in sunlight and times around the world)

kernel−BOOT: Contains a trimmed−down version of the Linux kernel suitable for placing on an

installation boot disk

Ngày đăng: 14/08/2014, 06:22