Chapter 26: Getting Red Hat Linux “up2date”Fixes and improvements continue to arise well after a distribution, such as Red Hat Linux 7.2, is released.You can incorporate those fixes and
Trang 1Troubleshooting a Wireless LAN
If you set up your two (or more) wireless LAN cards for Red Hat Linux systems to communicate together andthey are not communicating, you can troubleshoot the problem in several different ways
Check wireless settings
You can use the iwlist and iwconfig commands to check your wireless settings The iwconfig command cangive you a quick overview of your wireless settings, while the iwlist command shows you information aboutspecific parameters you are interested in
Use the iwconfig command, along with the name of the wireless LAN interface, to see information about thatinterface For example, if the wireless interface were eth0, you could type the following:
# iwconfig eth0
eth0 IEEE 802.11−DS ESSID:"Homelan" Nickname:"pine"
Mode:Ad−Hoc Frequency:2.412GHz Cell: 02:02:2D:2D:3B:30
Bit Rate=11Mb/s Tx−Power=15 dBm Sensitivity:1/3
RTS thr:off Fragment thr:off
Encryption key:7365−6375−31
Power Management:off
Link Quality:0/92 Signal level:−102 dBm Noise level:−102 dBm
Rx invalid nwid:0 invalid crypt:0 invalid misc:0
With iwconfig, you can see details about the wireless aspects of the Ethernet interface In this example, thenetwork name (ESSID) is Homelan and the station name (Nickname) is pine The interface is operating inAd−Hoc mode on channel 1 (frequency of 2.412GHz) Transmission rates are at the maximum speed of 11Mbps The encryption key that must be used by every node the card connects with is 7365−6375−31 Othersettings describe the link and signal quality
The iwlist command lets you request specific information about the wireless LAN interface The syntax is tofollow the iwlist command with the interface name and the information you are interested in For example:
# iwlist eth0 freq
eth 0 14 channels in total; available frequencies :
# iwlist eth0 rate
eth0 4 available bit−rates :
1 Mb/s
2 Mb/s
5.5 Mb/s
11 Mb/s
Trang 2shown above, the 1, 2, 5.5, and 11 Mbps rates are all available for the current interface.
# iwlist eth0 keys
eth0 2 key sizes : 40, 104bits
Current Transmit Key: [1]
The keys parameter lets you see the encryption keys that are available with the interface It also shows thecurrent key sizes that are available Because the card reflected in the example above supports 64− and 128−bitencryption, the key sizes available are 40 and 104 bits (The encryption algorithm automatically generates thelast 24 bits of each key.)
If you are troubleshooting your wireless LAN connection, some settings are more likely than others to becausing problems It is important to set the following wireless LAN settings properly — if you don’t, theymay keep your network from working:
•
Network ID (ESSID) — You may not be able to communicate among peer computers if the Network
ID (ESSID) doesn't match on each of them Case is important — for example, Mylan will not matchMyLAN
•
Encryption key — Having encryption keys that don't match is like trying to log in to Linux without a
password Check that all nodes are using the same key
•
Mode — If you are communicating through an access point, your mode should be set to Managed and
you must provide the MAC address for that access point In most single cell networks, you should setall nodes to Ad hoc The Ad hoc mode allows all nodes to communicate directly to each other aspeers
•
Channel or Frequency — The channel and frequency options are just two different ways of setting
the same value For example, setting the channel to 1 is the same as setting the frequency to2.412G(GHz) Make sure that the nodes on your network are able to communicate on the same frequency
Check TCP/IP
To check that your wireless LAN is communicating with its peers, use the ping command (as described earlier
in this chapter) If you believe that your cards are working properly, but the ping command continues to giveyou a "Network Unreachable" message, there may be a problem with your TCP/IP configuration Here aresome items you can check from the Network Configuration window:
•
IP address — Check that you know the correct IP address of the peer you are trying to reach.
•
Host name — If you are pinging the peer computer by name, make sure that your computer can
properly resolve that name into the correct IP address or have the peer's host name and IP addressproperly listed in the /etc/hosts file locally The former probably requires that you have one or more
Trang 3If you are able to reach another wireless computer on the wireless LAN, but are not able to reach computersoutside of that LAN (such as an Internet address), check that you have properly identified the location of yourgateway If the gateway address is correct, and you can reach that gateway, the problem may be that thegateway itself is not configured to allow packet forwarding.
If you find that any of the above information above was wrong and you corrected it, you should restart thewireless LAN interface One way to do that is to restart the PCMCIA interface as follows:
# /etc/init.d/pcmcia restart
Adapt to poor reception
Your wireless LAN might be working fine while your two wireless computers are sitting on the same desk.However, if performance degrades when you separate the computers, you may need to determine if there areobstacles in the way and, if so, how to get around them For desktop systems, a small indoor antenna canbring the signal out from under a desk or out of a closet For adjacent buildings, a roof antenna might be theanswer
In cities or other congested areas, many people and pieces of equipment can be competing for the 2.4 GHzrange You may want to move a microwave oven or certain highưend remote phones that are interfering withyour wireless LAN Here are a few ways you can adapt to poor reception:
•
Reduce transmission rate — Instead of using 11 Mbps, you can explicitly ramp down to 5.5, 2, or 1
Mbps Slower rates of speed can operate more efficiently in noisy environments
•
Smaller frame sizes — Though there is more total overhead to transmitting smaller frames, small
frames can often provide better overall performance Failures during transmissions of large framescause smaller hits than when small frames fail
•
Different frequencies — You can specifically request that certain frequencies (or channels) be used
for transmission You can try to use this technique to avoid congested channels
Use debugging tools
Because Orinoco cards and most other wireless LAN cards were created for Windows systems, some of thebetter debugging tools are available only on those systems If your computer is a dualưboot system (Windowsand Linux), you can try booting in Windows to test the quality of your wireless network For Orinoco cards inparticular, you should run the Client Manager to view information about the quality of your wireless links
In Red Hat Linux, you can use many of the tools you use for wired Ethernet networks and other TCP/IPnetwork interfaces Here are a couple of examples:
•
Ethereal — The Ethereal window (type ethereal as root user from a Terminal window) lets you watch
Ethernet frames as they are sent and received by your wireless LAN interface For example, theoutput of Ethereal can tell you whether a failed connection reflects a lack of reception or rejectedrequests
•
/var/log/messages — When the wireless LAN interface starts up, messages related to that startưup
Trang 4being set for the wireless LAN module.
Summary
A wireless LAN can offer an effective way of extending your network to areas that are difficult or expensive
to reach with wired connections Using lowưcost wireless LAN cards, you can create peerưtoưpeer or
pointưtoưpoint networks Add Red Hat Linux systems as one or more of your wireless nodes and you can usepowerful security, routing, and monitoring tools to further expand and secure your network
You can control your wireless LAN card in Red Hat Linux by passing options to the card's module at startưuptime Once the interface is running, you can use the iwconfig command to change wireless settings, eitherfrom the command line or by adding iwconfig options to a configuration file so they are loaded automatically
Trang 5Chapter 26: Getting Red Hat Linux “up2date”
Fixes and improvements continue to arise well after a distribution, such as Red Hat Linux 7.2, is released.You can incorporate those fixes and features into your version of Red Hat Linux by using a connection to theInternet and one of several tools for grabbing updated Red Hat software The tool that Red Hat prefers forkeeping its software up to date is called up2date
This chapter helps you to determine what updates are available for your Red Hat Linux system, and it
describes how you can register to use the Red Hat Network and use the up2date tool to gather those updates
Checking for Updates
How do you know when you need to upgrade the kernel or software packages that make up Red Hat Linux?One way to keep abreast of changes is to visit the Red Hat Errata page (Red Hat errata information is alsoavailable from the Red Hat Network, which is described later in this chapter.) You can also check for updates
to individual projects whose software is included in Red Hat Linux
Red Hat Errata page
Red Hat gathers together information you need to upgrade your system on the Red Hat Errata page
(http://www.redhat.com/errata) As the page proclaims, this is your way of finding “Security Alerts, BugFixes, and Enhancements” for Red Hat Linux Select the link to the current release (Red Hat Linux 7.2) Thelist of advisories that appears contains the package name, a synopsis of the problem addressed by the
corrected package, and the date the update was released
Many of the advisories are aimed at plugging potential security holes In particular, these advisories ofteninclude package fixes that address vulnerabilities in network services or mishandled permissions Click on apackage name in the list to get a detailed description of the package update, as well as links to where you candownload the updated package
Going directly to the Red Hat Errata page is probably the best way to check on vulnerabilities and bugsrelating to your version of Red Hat Linux You can either download and install each new package individually
or use the up2date application (described later in this chapter) to install multiple updates at once
Project Web sites
Most open−source projects have Web sites that are used to track software development, post news, andanswer questions about a project In some cases, critical bugs or security issues may be posted at a project’sWeb site before Red Hat hears of it If you’re operating a public server on the Internet, you might be
particularly interested in keeping up on potential problems relating to the network services you are running.For example, if you are using wu−ftpd as your FTP server software, you can refer to the WU−FTPD
Development Group site (http://www.wu−ftpd.org) Recent news items are posted on that site — news
regarding security issues might be particularly useful to you You can also subscribe to wu−ftpd mailing listsfrom this site If you don’t want to be flooded with email, you might simply want to subscribe to the
wuftpd−announce list to get occasional announcements about security problems
The following are other project sites that you might want to check for problems and issues that arise:
•
Apache Software Foundation (http://www.apache.org) ( Get updates about Apache Web server issues
Trang 6Samba.org (http://www.samba.org) ( Find information relating to Windows file− and print−sharingissues (SMB).
Getting Updates from Red Hat Network
Red Hat has created a system that automatically notifies you of available updates and lets you easily
download and install them on your Red Hat Linux system The service is called Red Hat Network Registeringwith the Red Hat Network allows you to run the up2date program from your Red Hat Linux computer
whenever you are ready to do the updates
Red Hat Network provides a mechanism that can:
•
Alert you to the latest fixes and enhancements available for Red Hat Linux
•
Install the packages that include those changes to your system
There is a lot of information available about the Red Hat Network from its Web page (http://rhn.redhat.com).This section provides an overview of how that service works and guides you through the registration process
If you don’t mind giving out your e−mail address, street address, and phone number, there are some prettygood reasons for creating a Red Hat Network account for yourself With a free Red Hat Network account, youcan register your Red Hat Linux system and create system profiles Registering your first machine also
entitles you to receive all updates for that machine To get more services (or entitle more machines), you canpurchase a subscription to the Red Hat Network
Note Because the Red Hat Network is fairly new and constantly evolving, it is possible that many of thefeatures and entitlements described in this section will change Check the Red Hat Network site
(http://rhn.redhat.com/) for information on new features if the procedures in this section seem to havechanged
Running rhn_register
To register your system with Red Hat Network, you can use the rhn_register command Using rhn_registerrequires a connection to the Internet and root access to your computer The latter is because the registrationprogram needs to access your computer’s RPM database Though only the first computer you register canreceive free automatic updates, you can register as many computers as you want with this tool (for additionalfees) Here is how it works
1
Open a Terminal window as root user
Trang 7Type rhn_register A Network Settings window appears, allowing you to add a proxy server setting incase you need to go through a proxy server to reach the Internet.
5
Read the Privacy Statement and, if it is acceptable, click Next to continue The Register or Update
“User Account” window appears
A “Register a System Profile – Hardware” window appears This includes information about yourRed Hat Linux version, hostname, IP address, CPU mode, CPU speed, and memory
Trang 8Check that the packages that appear in the window are all OK to include in your system profile (anddeselect the ones you don’t want to included) and click Next to continue.
The “Send Profile Information to Red Hat Network” window appears
10
Click Next to have the system profile information registered with the Red Hat Network (You can alsochoose to not send the information by clicking Cancel.) Your information is sent and the RegistrationFinished window appears
11
Click on Finish to end the session
After you have finished registering with the Red Hat Network, you can go to the Red Hat Network site andlog in to use the service You are also ready now to run the up2date command to update your software
packages
Running up2date
After you have registered your computer with the Red Hat Network, you can use the up2date command tofind and install updates As with rhn_register, you need root access to your computer to run up2date This isbecause up2date needs permission to change configuration files and install packages
The up2date configuration file (/etc/sysconfig/rhn/up2date) determines the behavior of up2date In order tohelp you understand what up2date will do when you launch it, here are a few of the key settings in the up2dateconfiguration file:
There are other settings in the up2date configuration file you can use to further refine your up2date session.For example, you can identify an HTTP proxy server, change the number of failed network connection
attempts before exiting, or set to retrieve source packages along with the binary packages If you would ratherchange the configuration file from the desktop GUI, run the up2date−config command (you need root
permission)
In most cases, the default up2date settings will work well The following is an example of an up2date session.Note You need version 2.5.4 or higher of up2date in order to upgrade kernel packages using up2date If you
Trang 9upgrade kernel packages, remember to comment out the removeSkipList=kernel* line so that kernelpackages can be upgraded After it’s installed, the new kernel will be booted by default If the kernelupgrade doesn’t work, your GRUB or LILO prompt will allow you to select the old kernel to boot from.
1
Open a Terminal window as root user
2
Type up2date If your system does not yet have the Red Hat public key, you will be asked if you want
to have up2date install the key (The key is needed to verify that the packages you are receiving aresigned by Red Hat You may need to restart up2date after you add the key.)
Click Next to continue The update agent begins checking your available packages
The “Packages Flagged to be Skipped” window appears By default, kernel packages are always set to
be skipped This is because updating the kernel requires some special action and has some risks Tooverride any of these packages, you need to click on the checkbox next to the package you want toupdate
To find out more about advisories associated with recommended updates on any of these packages,click on the package and click View Advisory Each advisory related to the package is displayed in aseparate window
6
If the skipped package list is acceptable to you, click Next to continue The “Available PackageUpdates” window appears, displaying packages that are installed on your system for which updatesare available Figure 26−1 shows an example of the “Available Package Updates” window
Trang 10Figure 26−1: Select packages you want Red Hat Network to update.
7
Click each package you want to update or click Select All Packages to have all available packagesupdated As with the skipped packages, you can click on a package, then click on View Advisory tosee which advisories are addressed by updates for the package
10
Click Next to begin downloading the packages to your computer (This may take a while, depending
on the speed of your Internet connection and the number of packages you are downloading.)
Click Finish to end the session
If you are interested in seeing how the upgrades went, you can do the following:
•
Check the log file (/var/log/up2date)
•
See if any packages were left behind in the spool directory (/var/spool/up2date)
Though you don’t necessarily have to reboot Linux at this point, if there are new daemon processes installedwith any of the updated packages you might want to restart them For example, to restart your Web server(httpd daemon), you could type the following as root user:
# /etc/init.d/httpd restart
Trang 11Using the Red Hat Network
Once you have an account with Red Hat Network, you can log in to the Red Hat Network site and take
advantage of the services it offers As noted earlier, each registered user is “entitled” to register one computer
to receive automatic updates Other services that you receive by simply registering with the Red Hat NetworkWeb site include:
•
Viewing complete listings of available errata, including security, bug fix, and enhancement alerts.Separate errata listings exist for each Red Hat Linux version, which takes the guess work out ofcompatibility issues
A feature for scheduling actions, such as automatically updating packages at a specified time
Go to the Red Hat Network site (http://rhn.redhat.com) and log in using the user name and account youcreated during the rhn_register session described earlier Traverse the site using the menu bar in the leftcolumn Available sections include:
•
Entitlements ( Shows which of your Red Hat Linux systems are entitled to use the up2date service.You can also purchase additional entitlement licenses from this page
•
Systems ( Lets you view a System List, which contains all the systems you have registered with RHN,
or use a Search tool to search your list of systems
•
Channels and Packages ( A channel designates a version of Red Hat Linux that has package updatesassociated with it By selecting the Channel List, you can see what package versions are available forthe Red Hat Linux version you are using By selecting the Package List for your channel, you canview and select to download individual package updates to your system
•
Errata ( From the Errata page, you can display all errata, show only those that apply to your system, or
do keyword searches of available errata
Trang 12Scheduled Actions ( You can schedule package installations to occur at a later time By accessing theScheduled Actions page, you can see pending, completed, and archived actions.
Help Desk ( For more help with Red Hat Network, the Help Desk offers the RHN FAQ, a Customer Servicesupport link, Support Forums, and the RHN Reference Guide
Each “entitlement” lets you receive updates for a single machine, using up2date and related utilities If youwant to purchase additional entitlements, check the Red Hat Network site for the latest prices At the time ofthis writing, the price was $19.95 per month for each additional system you entitle
Without purchasing additional entitlements, you can still register additional systems with the Red Hat
Network However, you can’t use the up2date mechanism to update those additional systems To registeradditional systems, simply run the rhn_register command from each system you want to register Whenprompted, give the Red Hat Network your existing user name and password The next time you visit thenetwork, you can see the newly registered system in your system list, although there will be no entitlementlisted to let you do automatic updates
Summary
The chore of keeping your Red Hat Linux system upgraded with the latest bug fixes, security patches, andenhancements has been simplified greatly with Red Hat’s up2date tool Using up2date, you can automaticallycheck for updates, download updated packages to your computer, and install them By registering your systemwith the Red Hat Network, you can take advantage of services that let you manage your computers and trackupdates You can receive free automatic upgrades for the first computer you register; updates for subsequentcomputers involve a fee
Chris Negus has been working with UNIX systems, the Internet, and (more recently) Linux systems for more
than two decades During that time, Chris worked at AT&T Bell Laboratories, UNIX System Laboratories,and Novell, helping to develop the UNIX operating system Features from many of the UNIX projects Chrisworked on at AT&T have found their way into Red Hat and other Linux systems
During the past few years, Chris has written several books on UNIX and the Internet, including Caldera
OpenLinux Bible, Internet Explorer 4 Bible, and Netscape Plug−ins For Dummies for Hungry Minds
(formerly IDG Books Worldwide) He also co−wrote several books for Que Corporation, including The
Complete Idiot’s Guide to Networking (second and third editions) and Using UNIX (second edition) Chris’s
other writings include articles for Internet World, NetWare Connection, and Visual Developer magazines.
At home, Chris enjoys spending time with his wife, Sheree, and his boys, Caleb and Seth His hobbies includesoccer, singing, and exercising with Sheree
Trang 13Appendix A: What’s on the CD−ROMs?
The CD−ROMs that accompany this book consist of two Red Hat Linux 7.2 Installation CDs and one
Documentation CD To install Red Hat Linux 7.2:
•
Follow the instructions contained in Chapter 2 and on the CD−ROM Installation page in the back ofthis book
•
Refer to Appendix B for a complete list of the Red Hat software packages
If for some reason you don't have your CDs handy, you can download any of these packages from a Red HatLinux mirror site (see www.redhat.com/download/mirror.html) The RPMfind.net is an excellent resource forfinding additional software packages for Red Hat Linux I also recommend that you consider installingsoftware packages that are available from the Red Hat Linux ContribNet site (http://rhcontrib.bero.org/).RPMfind.net and ContribNet locations can help you find extra, useful software packages that were onceincluded with the Red Hat Linux PowerTools CD Red Hat, Inc., no longer maintains PowerTools
Note All CD−ROM files are read−only The CD−ROM is intended primarily for users to install the binaryRed Hat Linux software However, a CD−ROM containing source code for the Red Hat Linux
distribution is also available by using a mail−in coupon that’s on the CDs Advanced users can modifythis source code to change the behavior of Red Hat Linux Changing this source code requires someknowledge of programming and software compilation tools
Trang 14Appendix B: Red Hat Linux RPMs
More than 1,200 Red Hat Package Manager (RPM) software packages are delivered with Red Hat Linux 7.2.Many of these packages are added to your computer automatically when you first install Red Hat Linux.Others can be added later, using one of several software installation tools
This appendix contains an alphabetical listing and descriptions of the Red Hat Linux 7.2 software packages.The descriptions in this appendix will help you determine the contents of those packages
Note Red Hat Linux software packages are contained on the first two CDs packaged with this book (CD−1and CD−2) The third CD contains FAQs, HOW−TOs, and Red Hat–specific manuals (Installation,Configuration, Getting Started, and Reference guides)
Applications — Contains application program packages for a dozen subcategories These categories
include Archiving, Communications, Editors, Emulators, Engineering, File, Internet, Multimedia,Productivity, Publishing, System, and Text
•
Development — Contains software development packages for the following categories: Debuggers,
Languages, Libraries, System, and Tools
•
Documentation — Contains documentation packages, which include such things as the GNOME
User’s Guide, help tools, man pages, FAQs, HOW−TOs, System Administrator's Guide, and XFree86documentation
•
System Environment — Contains basic Red Hat Linux system software packages Categories of
packages include Base, Daemons, Kernel, Libraries, and Shells
•
User Interface — Contains software packages related to the Desktops (such as window managers), X
(the X Window System), and X Hardware Support (such as Xconfigurator for configuring videocards)
A command−line tool for adding, deleting, and displaying the contents of RPMs is the rpm command Withthe rpm command, you can even view the contents of a package that you haven’t installed yet
Cross−Reference See Chapter 5 for descriptions of the RPM package format and tools for installing RPM
packages
Trang 15alchemist: Contains back−end configuration tools used by such features as printing, DNS, and
Apache Web server
Trang 16anonftp: Contains utilities that are made available to anonymous FTP users.
Trang 17aumix: Contains the aumix program (which runs in a Terminal window) for adjusting audio mixing
device (/dev/mixer) settings
Trang 18bg5ps: Contains a tool that converts BIG5 encoded Chinese into printable postscript.
blas: Contains the Basic Linear Algebra Subprograms (BLAS) libraries for performing many basic
linear algebra algorithms
busybox: Contains a statically linked binary that provides simplified versions of system commands;
useful for recovering from certain types of system failures
Trang 19bzip2: Contains the bzip2 and bzcat utilities for compressing and uncompressing files.
Trang 20chkconfig: Contains the chkconfig command for changing run−level information for system services.
cipe: Contains the Crypto IP Encapsulation tool (cipe), which is used for creating virtual private
networks across public networks (such as the Internet) using tunneling
compat−libs: Contains run−time libraries that allow you to do development for earlier Red Hat Linux
systems (such as Red Hat Linux 6.2)
•
compat−libstdc++: Contains several Run−Time Libraries that provide applications that are backward
compatible with C++ in Red Hat 5.2
Trang 21control−center−devel: Contains components needed to develop capplets used as panels in the
GNOME control center
cproto: Contains the cproto tool for creating function prototypes and variable declaration for X
language source code
cWnn−devel: Contains the library and header files required to develop applications that use the
cWnn or tWnn Chinese character input system
•
cyrus−sasl: Contains the Cyrus version of the Simple Authentication and Security Layer, which is
used to provide authentication support for connection−based applications
Trang 22cyrus−sasl−md5: Contains plugins for cyrus−sasl that support CRAM−MD5 and DIGEST−MD5
Trang 23dhcp: Contains components needed to support the dynamic host configuration protocol, which is
needed to configure a DHCP server on your network
•
dhcpcd: Contains the DHCP daemon processes needed by a DHCP client to get network
configuration information about itself from a DHCP server system
diffstat: Contains the diffstat command for converting diff output to display file changes in a form
that is easier to read
dmalloc: Contains the dmalloc memory management library, which can be used to replace other
memory management tools
•
docbook*: This set of packages contains the DocBook SGML DTD for working with SGML
documents, as well as other related tools and style sheets
doxygen: Contains the doxygen command for creating documentation from C or C++ programming
language source code that is documented
Trang 24dump−static: Contains static versions of commands for backing up (dump−static) and restoring
Trang 25enlightenment: Contains Enlightenment, an X−based window manager Enlightenment is the default
window manager used with the GNOME desktop environment
fam: Contains the File Alteration Monitor tool, which provides notification of changes in specific
files or directories to an application
Trang 26fetchmail: Contains the fetchmail mail retrieval utilities, which are used to get mail over TCP/IP
serial connections (such as SLIP and PPP)
Trang 27freetypeưutils: Contains several utilities for managing fonts.
Trang 28GConf−devel: Contains library files required for developing with GConf.
ghostscript: Contains the Ghostscript (gs) program for displaying PostScript files and for producing
output from PostScript files so they can be printed on non−PostScript printers
Trang 29ghostscript−fonts: Contains a set of type fonts used with the Ghostscript program.
•
giftrans: Contains the giftrans utility for converting GIF87 files to GIF89 format.
•
gimp: Contains the GIMP image manipulation program, which can be used to retouch photos, create
images, and work with images
gimp−perl: Contains libraries used for communications between GIMP and GIMP Perl extensions
and plug−in programs
•
gkermit: Contains the gkermit utility for transferring files using the Kermit protocol.
•
gkrellm: Contains a collection of monitoring software that charts the usage of resources including
CPU, disk activity, and network traffic
Trang 30glibc−devel: Contains the standard header and object files needed to develop most C language
programs
•
glibc−profile: Contains the libraries that are needed to create programs being profiled with gprof.
•
glms: Contains tools for using LM processors (which are hardware sensors that monitor such things
as fan speed, processor temperature, and performance of your power supply
Trang 31gnomeưlibsưdevel: Contains libraries needed to create applications to run on a GNOME desktop
gnomeưpim: Contains the GNOME Personal Information Manager, which includes applications such
as gnomecal (personal calendar) and gnomecard (contact lists)
•
gnomeưpimưdevel: Contains components needed to develop applications that communicate with
GNOMEưPIM applications using Corba
gnomeưuserưdocs: Contains the GNOME glossary, introduction to GNOME, and a UNIX primer for
the GNOME Desktop Environment
gnomeưvfsưextras: Contains extra modules that are not distributed with the core GNOMEưVFS
package, including a Sambaưbased smb network browser
Trang 32gnumeric: Contains the gnumeric spreadsheet program that runs in the GNOME desktop
grub: Contains the Grand Unified Boot Loader, an experimental utility capable of booting into most
of the major free and commercial operating systems
•
gsl: Contains the GNU Scientific Library for numerical analysis and other high−level mathematics.
Trang 33gsm: Contains the toast and untoast sound compression utilities.
guile−devel: Contains libraries and header files required to develop programs that are linked with the
GUILE extensibility library
Trang 34guppi: Contains a GNOME−based data analysis and visualization system.
htdig: Contains the htdig Web indexing and search system This system was created specifically for
use on private intranets and campuses
Trang 35im: Contains a set of Internet Message (im•) commands for integrating mail and news programs.
indexhtml: Contains the indexhtml package, which includes Red Hat Linux welcome page that
appears when you start your Web browser
initscripts: Contains many of the basic Linux system initialization scripts, which are started at
different run levels
Trang 36inn: Contains the InterNetNews server for creating and maintaining a news server in Linux.
•
inn−devel: Contains components needed to develop applications that use the InterNetNews system.
•
internet−config: Contains the internet−config graphical tool for configuring the following types of
network connections: ADSL or T−DSL, ISDN, or modem
•
ipchains: Contains components for implementing firewalls and IP masquerading on IP networks.
•
iproute: Contains the ip command and related utilities used for routing IP traffic Features in this
package include routing, multicasting, and tunneling, including IPv6 support
Trang 37isdn4kưutilsưvboxgetty: Contains vboxgetty and vboxputty tools, which are needed for an ISDN
Trang 38kbdconfig: Contains the kbdconfig command for configuring keyboard mappings.
kdebase: Contains the basic applications that are used with the KDE desktop environment, including
the kwm window manager, kfm file manager, and konsole terminal window
kdegames: Contains games such as kasteroids, kblackbox, and ksmiletris that are compatible with the
KDE desktop interface
Trang 39kdegraphics: Contains graphics applications created for the KDE desktop environment, including the
kdvi TeX display utility, the kfax Fax display utility, and the kicon icon editor
kdemultimedia−devel: Contains development files needed to develop applications that use
kdemultimedia, such as plugins for the noatun media player
Trang 40kdesdk−devel: Contains development files for kdesdk.
•
kdetoys: Contains some fun utilities, such as kmoon (moon phase indicator) and kworldwatch (which
indicates areas in sunlight and times around the world)
kernel−BOOT: Contains a trimmed−down version of the Linux kernel suitable for placing on an
installation boot disk