<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.ihitc.net/mediawiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Klae0010</id>
	<title>ITCwiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.ihitc.net/mediawiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Klae0010"/>
	<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/w/Special:Contributions/Klae0010"/>
	<updated>2026-04-23T08:25:48Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.38.5</generator>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=A_Brief_Early_History_of_Cypher_text&amp;diff=5846</id>
		<title>A Brief Early History of Cypher text</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=A_Brief_Early_History_of_Cypher_text&amp;diff=5846"/>
		<updated>2012-05-04T18:41:42Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: /* Scytale */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;A Brief History of Early Cypher text&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Scytale&#039;&#039;&#039; ===&lt;br /&gt;
One of the earliest forms of Cryptography is the scytale. (sounds like “Italy” in pronunciation). &lt;br /&gt;
&lt;br /&gt;
The earliest known reference to this type of coded message dates back to the 7th Century B.C. Though it was mentioned that early, the &lt;br /&gt;
references did not make clear on just how this method of cryptography worked. That is until Plutarch (a Greek historian, biographer, &lt;br /&gt;
essayist who lived approx 46-120 A.D.) explained the method in his books “Parallel Lives”, in particular Volume 19 which talked about &lt;br /&gt;
the Spartan General Lysander and how he communicated with his army.  &lt;br /&gt;
&lt;br /&gt;
Plutarch goes into detail on just how this method works..As shown in this quote from the aforementioned volume, &lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;lt;i&amp;gt;“The dispatch-scroll is of the following character. When the ephors send out an admiral or a general, they make two round pieces of &lt;br /&gt;
wood exactly alike in length and thickness, so that each corresponds to the other in its dimensions, and keep one themselves, while &lt;br /&gt;
they give the other to their envoy. These pieces of wood they call scytalae. Whenever, then, they wish to send some secret and &lt;br /&gt;
important message, they make a scroll of parchment long and narrow, like a leathern strap, and wind it round their scytale, leaving no &lt;br /&gt;
vacant space thereon, but covering its surface all round with the parchment. After doing this, they write what they wish on the &lt;br /&gt;
parchment, just as it lies wrapped about the scytale; and when they have written their message, they take the parchment off and send &lt;br /&gt;
it, without the piece of wood, to the commander. He, when he has received it, cannot otherwise get any meaning out of it,--since the &lt;br /&gt;
letters have no connection, but are disarranged,--unless he takes his own scytale and winds the strip of parchment about it, so that, &lt;br /&gt;
when its spiral course is restored perfectly, and that which follows is joined to that which precedes, he reads around the staff, and &lt;br /&gt;
so discovers the continuity of the message. And the parchment, like the staff, is called scytale, as the thing measured bears the name &lt;br /&gt;
of the measure.” &amp;lt;/i&amp;gt;&amp;lt;/blockquote&amp;gt; &lt;br /&gt;
:::—Plutarch, Lives (Lysander 19), ed. Bernadotte Perrin.&lt;br /&gt;
&lt;br /&gt;
The idea behind this method of encryption was transposition.  Not too dissimilar to the method used for the Caesar cipher explained later.  Unlike the Caesar cipher though, the transposition in this case was achieved by using a rod (staff, baton) of a fixed width. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Scytale&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Plutarch#Parallel_Lives&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/LysanderScytale&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Caesar Wheel&#039;&#039;&#039;===&lt;br /&gt;
Another early form of ciphering was the Caesar wheel, also known as the Caesar Cipher.. Named after Julius Caesar  (100 B.C. – 44 B.C.) who was documented as having used it. &lt;br /&gt;
&lt;br /&gt;
This was essentially two disks of difference sizes. The smaller one on top of the larger one, joined in the center in such a . Each wheel would then be sectioned along its edge. Each of these sections had a letter of the alphabet.  The key is set in advance such that both the sender and receiver what it is. The key was nothing more than a number which indicated the letter shift needed to encode or decode a message.&lt;br /&gt;
&lt;br /&gt;
For example.. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;lt;i&amp;gt;“If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet,that not a word could be made out. “If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter of the alphabet, namely D, for A, and so with the others.”&amp;lt;/i&amp;gt;&amp;lt;/blockquote&amp;gt; &lt;br /&gt;
:::—Suetonius, Life of Julius Caesar &lt;br /&gt;
&lt;br /&gt;
Caesar relied on a few things for this cipher to work, in particular the general illiteracy and the ignorance of the common man. What this means is that the average person couldn’t read and those who could would assume the coded message was another language.  Now, consider this same cipher can be seen today on your average box of cereal which has activities on the back of the box, you have an idea of just how illiterate the average person was in Caesar’s time. It’s so easy to break, even a caveman—oops, a child can break it. &lt;br /&gt;
&lt;br /&gt;
All Caesar did was off-set the alphabet by 4 spots. Even without knowing the off-set there are two ways by which to break this code. One is by letter frequency. Knowing which letters are used the most in the dominate language of the cipher. For instance, in English the top five most common letters used are “e”, ”t”, “a”, “o”, and “i”. The second is by brute force.  Assuming for a moment that Caesar’s wheel had only 26 spots (one for each letter and no numbers) there would be 25 possibilities. &lt;br /&gt;
&lt;br /&gt;
As recently as 1915 the Russian Army was using a variation of this cipher, mainly because the more common complicated ciphers were too difficult for their troops to decode. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Caesar_cipher&#039;&#039;&lt;br /&gt;
::      &#039;&#039;http://en.wikipedia.org/wiki/Letter_frequency&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://www.scholastic.com/spyx/pdfs/Cipher_Wheel.pdf&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Jefferson Disk&#039;&#039;&#039; ===&lt;br /&gt;
  &lt;br /&gt;
The Caesar Cipher would be the inspiration for Thomas Jefferson many centuries later. In 1795, Jefferson developed a cipher system &lt;br /&gt;
with used a series of 36 wheels (or disks) positioned along a central spinal. Each wheel had on it’s edge a series of letters. Each disk &lt;br /&gt;
is numbered and can be removed from the spinal, then put back on in any order. The order of the disks is the key.&lt;br /&gt;
&lt;br /&gt;
How this works is this… Both the sender and the receiver must have the disks in the same order. For example, for a 10 disk version might have a key like this 2,4,6,8,10,1,3,5,7,9.   From there, the sender would arrange the wheels to spell out the message they wanted along one row. Then finding another row, copy the message from another row and that would be the coded message that would be sent. Since the receiver would have the disks in the same order, all they’d have to do would be spell out the coded message on the individual wheels then rotate them all at once until the sender’s message was shown. &lt;br /&gt;
&lt;br /&gt;
Though Jefferson invented the encryption, it didn’t catch on until later when it was also independently invented by Étienne Bazeries (French Cryptanalyst) about a century later. The Bazieries Cylinder was an improvement on the Jefferson Disk. With even further improvements, this would become the basis for the encoding system (M-94)  the U.S. Army used from 1932- 1942. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Jefferson_disk&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Bazeries_Cylinder&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://www.monticello.org:8081/wheelcipher/wheelcipher.html&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
=== Rob Klaers, Billy Andersen, &amp;amp; Matt Mortiz ===&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=A_Brief_Early_History_of_Cypher_text&amp;diff=5845</id>
		<title>A Brief Early History of Cypher text</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=A_Brief_Early_History_of_Cypher_text&amp;diff=5845"/>
		<updated>2012-05-03T16:51:44Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: /* Caesar Wheel */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;A Brief History of Early Cypher text&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Scytale&#039;&#039;&#039; ===&lt;br /&gt;
One of the earliest forms of Cryptography is the scytale. (sounds like “Italy” in pronunciation). &lt;br /&gt;
&lt;br /&gt;
The earliest known reference to this type of coded message dates back to the 7th Century B.C. Though it was mentioned that early, the &lt;br /&gt;
references did not make clear on just how this method of cryptography worked. That is until Plutarch (a Greek historian, biographer, &lt;br /&gt;
essayist who lived approx 46-120 A.D.) explained the method in his books “Parallel Lives”, in particular Volume 19 which talked about &lt;br /&gt;
the Spartan General Lysander and how he communicated with his army.  &lt;br /&gt;
&lt;br /&gt;
Plutarch goes into detail on just how this method works..As shown in this quote from the aforementioned volume, &lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;lt;i&amp;gt;“The dispatch-scroll is of the following character. When the ephors send out an admiral or a general, they make two round pieces of &lt;br /&gt;
wood exactly alike in length and thickness, so that each corresponds to the other in its dimensions, and keep one themselves, while &lt;br /&gt;
they give the other to their envoy. These pieces of wood they call scytalae. Whenever, then, they wish to send some secret and &lt;br /&gt;
important message, they make a scroll of parchment long and narrow, like a leathern strap, and wind it round their scytale, leaving no &lt;br /&gt;
vacant space thereon, but covering its surface all round with the parchment. After doing this, they write what they wish on the &lt;br /&gt;
parchment, just as it lies wrapped about the scytale; and when they have written their message, they take the parchment off and send &lt;br /&gt;
it, without the piece of wood, to the commander. He, when he has received it, cannot otherwise get any meaning out of it,--since the &lt;br /&gt;
letters have no connection, but are disarranged,--unless he takes his own scytale and winds the strip of parchment about it, so that, &lt;br /&gt;
when its spiral course is restored perfectly, and that which follows is joined to that which precedes, he reads around the staff, and &lt;br /&gt;
so discovers the continuity of the message. And the parchment, like the staff, is called scytale, as the thing measured bears the name &lt;br /&gt;
of the measure.” &amp;lt;/i&amp;gt;&amp;lt;/blockquote&amp;gt; &lt;br /&gt;
:::—Plutarch, Lives (Lysander 19), ed. Bernadotte Perrin.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Scytale&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Plutarch#Parallel_Lives&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/LysanderScytale&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Caesar Wheel&#039;&#039;&#039;===&lt;br /&gt;
Another early form of ciphering was the Caesar wheel, also known as the Caesar Cipher.. Named after Julius Caesar  (100 B.C. – 44 B.C.) who was documented as having used it. &lt;br /&gt;
&lt;br /&gt;
This was essentially two disks of difference sizes. The smaller one on top of the larger one, joined in the center in such a . Each wheel would then be sectioned along its edge. Each of these sections had a letter of the alphabet.  The key is set in advance such that both the sender and receiver what it is. The key was nothing more than a number which indicated the letter shift needed to encode or decode a message.&lt;br /&gt;
&lt;br /&gt;
For example.. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;lt;i&amp;gt;“If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet,that not a word could be made out. “If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter of the alphabet, namely D, for A, and so with the others.”&amp;lt;/i&amp;gt;&amp;lt;/blockquote&amp;gt; &lt;br /&gt;
:::—Suetonius, Life of Julius Caesar &lt;br /&gt;
&lt;br /&gt;
Caesar relied on a few things for this cipher to work, in particular the general illiteracy and the ignorance of the common man. What this means is that the average person couldn’t read and those who could would assume the coded message was another language.  Now, consider this same cipher can be seen today on your average box of cereal which has activities on the back of the box, you have an idea of just how illiterate the average person was in Caesar’s time. It’s so easy to break, even a caveman—oops, a child can break it. &lt;br /&gt;
&lt;br /&gt;
All Caesar did was off-set the alphabet by 4 spots. Even without knowing the off-set there are two ways by which to break this code. One is by letter frequency. Knowing which letters are used the most in the dominate language of the cipher. For instance, in English the top five most common letters used are “e”, ”t”, “a”, “o”, and “i”. The second is by brute force.  Assuming for a moment that Caesar’s wheel had only 26 spots (one for each letter and no numbers) there would be 25 possibilities. &lt;br /&gt;
&lt;br /&gt;
As recently as 1915 the Russian Army was using a variation of this cipher, mainly because the more common complicated ciphers were too difficult for their troops to decode. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Caesar_cipher&#039;&#039;&lt;br /&gt;
::      &#039;&#039;http://en.wikipedia.org/wiki/Letter_frequency&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://www.scholastic.com/spyx/pdfs/Cipher_Wheel.pdf&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Jefferson Disk&#039;&#039;&#039; ===&lt;br /&gt;
  &lt;br /&gt;
The Caesar Cipher would be the inspiration for Thomas Jefferson many centuries later. In 1795, Jefferson developed a cipher system &lt;br /&gt;
with used a series of 36 wheels (or disks) positioned along a central spinal. Each wheel had on it’s edge a series of letters. Each disk &lt;br /&gt;
is numbered and can be removed from the spinal, then put back on in any order. The order of the disks is the key.&lt;br /&gt;
&lt;br /&gt;
How this works is this… Both the sender and the receiver must have the disks in the same order. For example, for a 10 disk version might have a key like this 2,4,6,8,10,1,3,5,7,9.   From there, the sender would arrange the wheels to spell out the message they wanted along one row. Then finding another row, copy the message from another row and that would be the coded message that would be sent. Since the receiver would have the disks in the same order, all they’d have to do would be spell out the coded message on the individual wheels then rotate them all at once until the sender’s message was shown. &lt;br /&gt;
&lt;br /&gt;
Though Jefferson invented the encryption, it didn’t catch on until later when it was also independently invented by Étienne Bazeries (French Cryptanalyst) about a century later. The Bazieries Cylinder was an improvement on the Jefferson Disk. With even further improvements, this would become the basis for the encoding system (M-94)  the U.S. Army used from 1932- 1942. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Jefferson_disk&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Bazeries_Cylinder&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://www.monticello.org:8081/wheelcipher/wheelcipher.html&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
=== Rob Klaers, Billy Andersen, &amp;amp; Matt Mortiz ===&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=A_Brief_Early_History_of_Cypher_text&amp;diff=5844</id>
		<title>A Brief Early History of Cypher text</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=A_Brief_Early_History_of_Cypher_text&amp;diff=5844"/>
		<updated>2012-05-03T16:49:06Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: /* Scytale */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;A Brief History of Early Cypher text&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Scytale&#039;&#039;&#039; ===&lt;br /&gt;
One of the earliest forms of Cryptography is the scytale. (sounds like “Italy” in pronunciation). &lt;br /&gt;
&lt;br /&gt;
The earliest known reference to this type of coded message dates back to the 7th Century B.C. Though it was mentioned that early, the &lt;br /&gt;
references did not make clear on just how this method of cryptography worked. That is until Plutarch (a Greek historian, biographer, &lt;br /&gt;
essayist who lived approx 46-120 A.D.) explained the method in his books “Parallel Lives”, in particular Volume 19 which talked about &lt;br /&gt;
the Spartan General Lysander and how he communicated with his army.  &lt;br /&gt;
&lt;br /&gt;
Plutarch goes into detail on just how this method works..As shown in this quote from the aforementioned volume, &lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;lt;i&amp;gt;“The dispatch-scroll is of the following character. When the ephors send out an admiral or a general, they make two round pieces of &lt;br /&gt;
wood exactly alike in length and thickness, so that each corresponds to the other in its dimensions, and keep one themselves, while &lt;br /&gt;
they give the other to their envoy. These pieces of wood they call scytalae. Whenever, then, they wish to send some secret and &lt;br /&gt;
important message, they make a scroll of parchment long and narrow, like a leathern strap, and wind it round their scytale, leaving no &lt;br /&gt;
vacant space thereon, but covering its surface all round with the parchment. After doing this, they write what they wish on the &lt;br /&gt;
parchment, just as it lies wrapped about the scytale; and when they have written their message, they take the parchment off and send &lt;br /&gt;
it, without the piece of wood, to the commander. He, when he has received it, cannot otherwise get any meaning out of it,--since the &lt;br /&gt;
letters have no connection, but are disarranged,--unless he takes his own scytale and winds the strip of parchment about it, so that, &lt;br /&gt;
when its spiral course is restored perfectly, and that which follows is joined to that which precedes, he reads around the staff, and &lt;br /&gt;
so discovers the continuity of the message. And the parchment, like the staff, is called scytale, as the thing measured bears the name &lt;br /&gt;
of the measure.” &amp;lt;/i&amp;gt;&amp;lt;/blockquote&amp;gt; &lt;br /&gt;
:::—Plutarch, Lives (Lysander 19), ed. Bernadotte Perrin.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Scytale&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Plutarch#Parallel_Lives&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/LysanderScytale&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Caesar Wheel&#039;&#039;&#039;===&lt;br /&gt;
Another early form of ciphering was the Caesar wheel, also known as the Caesar Cipher.. Named after Julius Caesar  (100 B.C. – 44 B.C.) who was documented as having used it. &lt;br /&gt;
&lt;br /&gt;
This was essentially two disks of difference sizes. The smaller one on top of the larger one, joined in the center in such a . Each wheel would then be sectioned along its edge. Each of these sections had a letter of the alphabet.  The key is set in advance such that both the sender and receiver what it is. The key was nothing more than a number which indicated the letter shift needed to encode or decode a message.&lt;br /&gt;
&lt;br /&gt;
For example.. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;lt;i&amp;gt;“If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet,that not a word could be made out. “If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter of the alphabet, namely D, for A, and so with the others.”&amp;lt;/i&amp;gt;&amp;lt;/blockquote&amp;gt; &lt;br /&gt;
:::—Suetonius, Life of Julius Caesar &lt;br /&gt;
&lt;br /&gt;
This is the easiest of the substitution ciphers. For example , it can be easily reverse engineered without having to know the key used. You’d just have to know the frequency of letters used in the language you. For example, in English if you know that “E” ,“T” and “A” were the most used letters in the alphabet you’d be well on your way to breaking the code. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Caesar_cipher&#039;&#039;&lt;br /&gt;
::      &#039;&#039;http://en.wikipedia.org/wiki/Letter_frequency&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://www.scholastic.com/spyx/pdfs/Cipher_Wheel.pdf&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Jefferson Disk&#039;&#039;&#039; ===&lt;br /&gt;
  &lt;br /&gt;
The Caesar Cipher would be the inspiration for Thomas Jefferson many centuries later. In 1795, Jefferson developed a cipher system &lt;br /&gt;
with used a series of 36 wheels (or disks) positioned along a central spinal. Each wheel had on it’s edge a series of letters. Each disk &lt;br /&gt;
is numbered and can be removed from the spinal, then put back on in any order. The order of the disks is the key.&lt;br /&gt;
&lt;br /&gt;
How this works is this… Both the sender and the receiver must have the disks in the same order. For example, for a 10 disk version might have a key like this 2,4,6,8,10,1,3,5,7,9.   From there, the sender would arrange the wheels to spell out the message they wanted along one row. Then finding another row, copy the message from another row and that would be the coded message that would be sent. Since the receiver would have the disks in the same order, all they’d have to do would be spell out the coded message on the individual wheels then rotate them all at once until the sender’s message was shown. &lt;br /&gt;
&lt;br /&gt;
Though Jefferson invented the encryption, it didn’t catch on until later when it was also independently invented by Étienne Bazeries (French Cryptanalyst) about a century later. The Bazieries Cylinder was an improvement on the Jefferson Disk. With even further improvements, this would become the basis for the encoding system (M-94)  the U.S. Army used from 1932- 1942. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Jefferson_disk&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Bazeries_Cylinder&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://www.monticello.org:8081/wheelcipher/wheelcipher.html&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
=== Rob Klaers, Billy Andersen, &amp;amp; Matt Mortiz ===&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=A_Brief_Early_History_of_Cypher_text&amp;diff=5843</id>
		<title>A Brief Early History of Cypher text</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=A_Brief_Early_History_of_Cypher_text&amp;diff=5843"/>
		<updated>2012-05-03T16:48:33Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: /* Scytale */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;A Brief History of Early Cypher text&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Scytale&#039;&#039;&#039; ===&lt;br /&gt;
One of the earliest forms of Cryptography is the scytale. (sounds like “Italy” in pronunciation). &lt;br /&gt;
&lt;br /&gt;
The earliest known reference to this type of coded message dates back to the 7th Century B.C. Though it was mentioned that early, the &lt;br /&gt;
references did not make clear on just how this method of cryptography worked. That is until Plutarch (a Greek historian, biographer, &lt;br /&gt;
essayist who lived approx 46-120 A.D.) explained the method in his books “Parallel Lives”, in particular Volume 19 which talked about &lt;br /&gt;
the Spartan General Lysander and how he communicated with his army.  &lt;br /&gt;
&lt;br /&gt;
Plutarch goes into detail on just how this method works..As shown in this quote from the aforementioned volume, &lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;lt;i&amp;gt;“The dispatch-scroll is of the following character. When the ephors send out an admiral or a general, they make two round pieces of &lt;br /&gt;
wood exactly alike in length and thickness, so that each corresponds to the other in its dimensions, and keep one themselves, while &lt;br /&gt;
they give the other to their envoy. These pieces of wood they call scytalae. Whenever, then, they wish to send some secret and &lt;br /&gt;
important message, they make a scroll of parchment long and narrow, like a leathern strap, and wind it round their scytale, leaving no &lt;br /&gt;
vacant space thereon, but covering its surface all round with the parchment. After doing this, they write what they wish on the &lt;br /&gt;
parchment, just as it lies wrapped about the scytale; and when they have written their message, they take the parchment off and send &lt;br /&gt;
it, without the piece of wood, to the commander. He, when he has received it, cannot otherwise get any meaning out of it,--since the &lt;br /&gt;
letters have no connection, but are disarranged,--unless he takes his own scytale and winds the strip of parchment about it, so that, &lt;br /&gt;
when its spiral course is restored perfectly, and that which follows is joined to that which precedes, he reads around the staff, and &lt;br /&gt;
so discovers the continuity of the message. And the parchment, like the staff, is called scytale, as the thing measured bears the name &lt;br /&gt;
of the measure.” &amp;lt;/i&amp;gt;&amp;lt;/blockquote&amp;gt; &lt;br /&gt;
:::—Plutarch, Lives (Lysander 19), ed. Bernadotte Perrin.&lt;br /&gt;
&lt;br /&gt;
Caesar relied on a few things for this cipher to work, in particular the general illiteracy and the ignorance of the rest of the world of the common man. What this means is that the average person couldn’t read and those who could would assume the coded message was another language.  Now, consider this same cipher can be seen today on your average box of cereal which as activities on the back of the box, you have an idea of just how illiterate the average person was in Caesar’s time. It’s so easy to break, even a caveman—oops, a child can break it. &lt;br /&gt;
&lt;br /&gt;
All Caesar did was off-set the alphabet by 4 spots. Even without knowing the off-set there are two ways by which to break this code. One is by letter frequency. Knowing which letters are used the most in the dominate language of the cipher. For instance, in English the top five most common letters used are “e”, ”t”, “a”, “o”, and “I”.  The second is by brute force.  Assuming for a moment that Caesar’s wheel had only 26 spots (one for each letter) there would in effect be 25 possibilities. &lt;br /&gt;
&lt;br /&gt;
As recently as 1915 the Russian Army was using a variation of this cipher, mainly because the more common complicated ciphers were too difficult for their troops to decode. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Scytale&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Plutarch#Parallel_Lives&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/LysanderScytale&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Caesar Wheel&#039;&#039;&#039;===&lt;br /&gt;
Another early form of ciphering was the Caesar wheel, also known as the Caesar Cipher.. Named after Julius Caesar  (100 B.C. – 44 B.C.) who was documented as having used it. &lt;br /&gt;
&lt;br /&gt;
This was essentially two disks of difference sizes. The smaller one on top of the larger one, joined in the center in such a . Each wheel would then be sectioned along its edge. Each of these sections had a letter of the alphabet.  The key is set in advance such that both the sender and receiver what it is. The key was nothing more than a number which indicated the letter shift needed to encode or decode a message.&lt;br /&gt;
&lt;br /&gt;
For example.. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;lt;i&amp;gt;“If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet,that not a word could be made out. “If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter of the alphabet, namely D, for A, and so with the others.”&amp;lt;/i&amp;gt;&amp;lt;/blockquote&amp;gt; &lt;br /&gt;
:::—Suetonius, Life of Julius Caesar &lt;br /&gt;
&lt;br /&gt;
This is the easiest of the substitution ciphers. For example , it can be easily reverse engineered without having to know the key used. You’d just have to know the frequency of letters used in the language you. For example, in English if you know that “E” ,“T” and “A” were the most used letters in the alphabet you’d be well on your way to breaking the code. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Caesar_cipher&#039;&#039;&lt;br /&gt;
::      &#039;&#039;http://en.wikipedia.org/wiki/Letter_frequency&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://www.scholastic.com/spyx/pdfs/Cipher_Wheel.pdf&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Jefferson Disk&#039;&#039;&#039; ===&lt;br /&gt;
  &lt;br /&gt;
The Caesar Cipher would be the inspiration for Thomas Jefferson many centuries later. In 1795, Jefferson developed a cipher system &lt;br /&gt;
with used a series of 36 wheels (or disks) positioned along a central spinal. Each wheel had on it’s edge a series of letters. Each disk &lt;br /&gt;
is numbered and can be removed from the spinal, then put back on in any order. The order of the disks is the key.&lt;br /&gt;
&lt;br /&gt;
How this works is this… Both the sender and the receiver must have the disks in the same order. For example, for a 10 disk version might have a key like this 2,4,6,8,10,1,3,5,7,9.   From there, the sender would arrange the wheels to spell out the message they wanted along one row. Then finding another row, copy the message from another row and that would be the coded message that would be sent. Since the receiver would have the disks in the same order, all they’d have to do would be spell out the coded message on the individual wheels then rotate them all at once until the sender’s message was shown. &lt;br /&gt;
&lt;br /&gt;
Though Jefferson invented the encryption, it didn’t catch on until later when it was also independently invented by Étienne Bazeries (French Cryptanalyst) about a century later. The Bazieries Cylinder was an improvement on the Jefferson Disk. With even further improvements, this would become the basis for the encoding system (M-94)  the U.S. Army used from 1932- 1942. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Jefferson_disk&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Bazeries_Cylinder&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://www.monticello.org:8081/wheelcipher/wheelcipher.html&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
=== Rob Klaers, Billy Andersen, &amp;amp; Matt Mortiz ===&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_Current_Student_Projects&amp;diff=5784</id>
		<title>Franske Current Student Projects</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_Current_Student_Projects&amp;diff=5784"/>
		<updated>2012-05-01T21:02:05Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: /* CNT 2831 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=SPRING 2012=&lt;br /&gt;
==CNT 2612==&lt;br /&gt;
* STP Study Guide - Kevin M.&lt;br /&gt;
* Reformating Wiki Course Guide - Billy A. &amp;amp; Matt M.&lt;br /&gt;
* Asterisk Configuration - C.Hermanson&lt;br /&gt;
* Implementing QOS on a Multilayer Switch - M.Luger&lt;br /&gt;
* Add topics to the CCNA and A+ courses - Corey Steiner&lt;br /&gt;
&lt;br /&gt;
==CNT 2311==&lt;br /&gt;
*&lt;br /&gt;
&lt;br /&gt;
==CNT 2831==&lt;br /&gt;
*Caesar Cipher, Scytale, and Jefferson Wheel --  Matt M., Billy A., Rob K.&lt;br /&gt;
&lt;br /&gt;
=FALL 2011=&lt;br /&gt;
==CNT 2520==&lt;br /&gt;
* Routing Protocol Comparison Chart &amp;amp; Configuration Instructions - John Cocchiarella, Tyler Grey&lt;br /&gt;
* IPv6 Routing Protocol Configurations - David Favilla, Christopher Abel&lt;br /&gt;
* GPON Gigabit Passive Optical Networks (ITU-T G.948) - Jesse Thorpe&lt;br /&gt;
* Exam Question Formatting - Josh K.&lt;br /&gt;
&lt;br /&gt;
==CNT 2540==&lt;br /&gt;
* Enterprise Network Case Study and Diagramming - Christopher Moosbrugger&lt;br /&gt;
* Update CCNA 4 SDM Labs to CCP Labs - Billy &amp;amp; Matt&lt;br /&gt;
* Ethernet Link Aggregation - Monique&lt;br /&gt;
* IPv6 Over IPv4 Tunnel - Clay &amp;amp; Curt&lt;br /&gt;
&lt;br /&gt;
==CNT 2722==&lt;br /&gt;
&lt;br /&gt;
==CNT 2820==&lt;br /&gt;
* Pen Testing and ethics - Curt H. and Byron S.&lt;br /&gt;
&lt;br /&gt;
=SPRING 2011=&lt;br /&gt;
==CNT 2510==&lt;br /&gt;
* List of resources that correspond to chapter for self study - John Cocchiarella&lt;br /&gt;
&lt;br /&gt;
==CNT 2520==&lt;br /&gt;
* Add to and update [[Intro to IPv6]]&lt;br /&gt;
* Create router/switch reference guide for CCNA 1 students&lt;br /&gt;
* Update VirtualBox startup script and create instructions for moving VMs between home and school with new version of Virualbox&lt;br /&gt;
&lt;br /&gt;
==CNT 2530==&lt;br /&gt;
* De-tableize [[Franske CNT-2510 SP10 Schedule]] and add chapter topics&lt;br /&gt;
* Create detailed instructions for clearing the configurations (invluding VLANs) for the [[Switch Documentation]] and [[Router Documentation]] pages&lt;br /&gt;
&lt;br /&gt;
==CNT 2612==&lt;br /&gt;
* CatOS Guide, comparison to IOS - Mike Kaschner, Nouthou Vang, Mark Benolken&lt;br /&gt;
&lt;br /&gt;
* Cisco IOS Command Shortcuts - Monique Moison, Greg Haug&lt;br /&gt;
&lt;br /&gt;
=FALL 2010=&lt;br /&gt;
==CNT 2311==&lt;br /&gt;
* [[Understanding Linux Permission Sets]] - Casey McBride&lt;br /&gt;
* [[How to Setup NAT|NAT with a Linux System]] - Tsega Terefe&lt;br /&gt;
* Alphabetical Linux Command List - Don Bliss&lt;br /&gt;
* Linux vs. Windows 7 vs. Mac OS X - Andrew Westin&lt;br /&gt;
&lt;br /&gt;
==CNT 2540==&lt;br /&gt;
* Lab Maintenance - Samuel Francis&lt;br /&gt;
* Update/Correct Frame Relay and ISDN Labs - Adam Nelson &amp;amp; Dan Martin&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=A_Brief_Early_History_of_Cypher_text&amp;diff=5701</id>
		<title>A Brief Early History of Cypher text</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=A_Brief_Early_History_of_Cypher_text&amp;diff=5701"/>
		<updated>2012-04-25T02:16:14Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: /* A Brief History of Cypher text */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;A Brief History of Early Cypher text&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Scytale&#039;&#039;&#039; ===&lt;br /&gt;
One of the earliest forms of Cryptography is the scytale. (sounds like “Italy” in pronunciation). &lt;br /&gt;
&lt;br /&gt;
The earliest known reference to this type of coded message dates back to the 7th Century B.C. Though it was mentioned that early, the &lt;br /&gt;
references did not make clear on just how this method of cryptography worked. That is until Plutarch (a Greek historian, biographer, &lt;br /&gt;
essayist who lived approx 46-120 A.D.) explained the method in his books “Parallel Lives”, in particular Volume 19 which talked about &lt;br /&gt;
the Spartan General Lysander and how he communicated with his army.  &lt;br /&gt;
&lt;br /&gt;
Plutarch goes into detail on just how this method works..As shown in this quote from the aforementioned volume, &lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;lt;i&amp;gt;“The dispatch-scroll is of the following character. When the ephors send out an admiral or a general, they make two round pieces of &lt;br /&gt;
wood exactly alike in length and thickness, so that each corresponds to the other in its dimensions, and keep one themselves, while &lt;br /&gt;
they give the other to their envoy. These pieces of wood they call scytalae. Whenever, then, they wish to send some secret and &lt;br /&gt;
important message, they make a scroll of parchment long and narrow, like a leathern strap, and wind it round their scytale, leaving no &lt;br /&gt;
vacant space thereon, but covering its surface all round with the parchment. After doing this, they write what they wish on the &lt;br /&gt;
parchment, just as it lies wrapped about the scytale; and when they have written their message, they take the parchment off and send &lt;br /&gt;
it, without the piece of wood, to the commander. He, when he has received it, cannot otherwise get any meaning out of it,--since the &lt;br /&gt;
letters have no connection, but are disarranged,--unless he takes his own scytale and winds the strip of parchment about it, so that, &lt;br /&gt;
when its spiral course is restored perfectly, and that which follows is joined to that which precedes, he reads around the staff, and &lt;br /&gt;
so discovers the continuity of the message. And the parchment, like the staff, is called scytale, as the thing measured bears the name &lt;br /&gt;
of the measure.” &amp;lt;/i&amp;gt;&amp;lt;/blockquote&amp;gt; &lt;br /&gt;
:::—Plutarch, Lives (Lysander 19), ed. Bernadotte Perrin.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Scytale&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Plutarch#Parallel_Lives&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/LysanderScytale&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Caesar Wheel&#039;&#039;&#039;===&lt;br /&gt;
Another early form of ciphering was the Caesar wheel, also known as the Caesar Cipher.. Named after Julius Caesar  (100 B.C. – 44 B.C.) who was documented as having used it. &lt;br /&gt;
&lt;br /&gt;
This was essentially two disks of difference sizes. The smaller one on top of the larger one, joined in the center in such a . Each wheel would then be sectioned along its edge. Each of these sections had a letter of the alphabet.  The key is set in advance such that both the sender and receiver what it is. The key was nothing more than a number which indicated the letter shift needed to encode or decode a message.&lt;br /&gt;
&lt;br /&gt;
For example.. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;lt;i&amp;gt;“If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet,that not a word could be made out. “If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter of the alphabet, namely D, for A, and so with the others.”&amp;lt;/i&amp;gt;&amp;lt;/blockquote&amp;gt; &lt;br /&gt;
:::—Suetonius, Life of Julius Caesar &lt;br /&gt;
&lt;br /&gt;
This is the easiest of the substitution ciphers. For example , it can be easily reverse engineered without having to know the key used. You’d just have to know the frequency of letters used in the language you. For example, in English if you know that “E” ,“T” and “A” were the most used letters in the alphabet you’d be well on your way to breaking the code. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Caesar_cipher&#039;&#039;&lt;br /&gt;
::      &#039;&#039;http://en.wikipedia.org/wiki/Letter_frequency&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://www.scholastic.com/spyx/pdfs/Cipher_Wheel.pdf&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Jefferson Disk&#039;&#039;&#039; ===&lt;br /&gt;
  &lt;br /&gt;
The Caesar Cipher would be the inspiration for Thomas Jefferson many centuries later. In 1795, Jefferson developed a cipher system &lt;br /&gt;
with used a series of 36 wheels (or disks) positioned along a central spinal. Each wheel had on it’s edge a series of letters. Each disk &lt;br /&gt;
is numbered and can be removed from the spinal, then put back on in any order. The order of the disks is the key.&lt;br /&gt;
&lt;br /&gt;
How this works is this… Both the sender and the receiver must have the disks in the same order. For example, for a 10 disk version might have a key like this 2,4,6,8,10,1,3,5,7,9.   From there, the sender would arrange the wheels to spell out the message they wanted along one row. Then finding another row, copy the message from another row and that would be the coded message that would be sent. Since the receiver would have the disks in the same order, all they’d have to do would be spell out the coded message on the individual wheels then rotate them all at once until the sender’s message was shown. &lt;br /&gt;
&lt;br /&gt;
Though Jefferson invented the encryption, it didn’t catch on until later when it was also independently invented by Étienne Bazeries (French Cryptanalyst) about a century later. The Bazieries Cylinder was an improvement on the Jefferson Disk. With even further improvements, this would become the basis for the encoding system (M-94)  the U.S. Army used from 1932- 1942. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Jefferson_disk&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Bazeries_Cylinder&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://www.monticello.org:8081/wheelcipher/wheelcipher.html&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
=== Rob Klaers, Billy Andersen, &amp;amp; Matt Mortiz ===&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=A_Brief_Early_History_of_Cypher_text&amp;diff=5700</id>
		<title>A Brief Early History of Cypher text</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=A_Brief_Early_History_of_Cypher_text&amp;diff=5700"/>
		<updated>2012-04-25T02:15:55Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: Created page with &amp;quot;== &amp;#039;&amp;#039;&amp;#039;A Brief History of Cypher text&amp;#039;&amp;#039;&amp;#039; ==  === &amp;#039;&amp;#039;&amp;#039;Scytale&amp;#039;&amp;#039;&amp;#039; === One of the earliest forms of Cryptography is the scytale. (sounds like “Italy” in pronunciation).   The earl...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;A Brief History of Cypher text&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Scytale&#039;&#039;&#039; ===&lt;br /&gt;
One of the earliest forms of Cryptography is the scytale. (sounds like “Italy” in pronunciation). &lt;br /&gt;
&lt;br /&gt;
The earliest known reference to this type of coded message dates back to the 7th Century B.C. Though it was mentioned that early, the &lt;br /&gt;
references did not make clear on just how this method of cryptography worked. That is until Plutarch (a Greek historian, biographer, &lt;br /&gt;
essayist who lived approx 46-120 A.D.) explained the method in his books “Parallel Lives”, in particular Volume 19 which talked about &lt;br /&gt;
the Spartan General Lysander and how he communicated with his army.  &lt;br /&gt;
&lt;br /&gt;
Plutarch goes into detail on just how this method works..As shown in this quote from the aforementioned volume, &lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;lt;i&amp;gt;“The dispatch-scroll is of the following character. When the ephors send out an admiral or a general, they make two round pieces of &lt;br /&gt;
wood exactly alike in length and thickness, so that each corresponds to the other in its dimensions, and keep one themselves, while &lt;br /&gt;
they give the other to their envoy. These pieces of wood they call scytalae. Whenever, then, they wish to send some secret and &lt;br /&gt;
important message, they make a scroll of parchment long and narrow, like a leathern strap, and wind it round their scytale, leaving no &lt;br /&gt;
vacant space thereon, but covering its surface all round with the parchment. After doing this, they write what they wish on the &lt;br /&gt;
parchment, just as it lies wrapped about the scytale; and when they have written their message, they take the parchment off and send &lt;br /&gt;
it, without the piece of wood, to the commander. He, when he has received it, cannot otherwise get any meaning out of it,--since the &lt;br /&gt;
letters have no connection, but are disarranged,--unless he takes his own scytale and winds the strip of parchment about it, so that, &lt;br /&gt;
when its spiral course is restored perfectly, and that which follows is joined to that which precedes, he reads around the staff, and &lt;br /&gt;
so discovers the continuity of the message. And the parchment, like the staff, is called scytale, as the thing measured bears the name &lt;br /&gt;
of the measure.” &amp;lt;/i&amp;gt;&amp;lt;/blockquote&amp;gt; &lt;br /&gt;
:::—Plutarch, Lives (Lysander 19), ed. Bernadotte Perrin.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Scytale&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Plutarch#Parallel_Lives&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/LysanderScytale&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Caesar Wheel&#039;&#039;&#039;===&lt;br /&gt;
Another early form of ciphering was the Caesar wheel, also known as the Caesar Cipher.. Named after Julius Caesar  (100 B.C. – 44 B.C.) who was documented as having used it. &lt;br /&gt;
&lt;br /&gt;
This was essentially two disks of difference sizes. The smaller one on top of the larger one, joined in the center in such a . Each wheel would then be sectioned along its edge. Each of these sections had a letter of the alphabet.  The key is set in advance such that both the sender and receiver what it is. The key was nothing more than a number which indicated the letter shift needed to encode or decode a message.&lt;br /&gt;
&lt;br /&gt;
For example.. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;lt;i&amp;gt;“If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet,that not a word could be made out. “If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter of the alphabet, namely D, for A, and so with the others.”&amp;lt;/i&amp;gt;&amp;lt;/blockquote&amp;gt; &lt;br /&gt;
:::—Suetonius, Life of Julius Caesar &lt;br /&gt;
&lt;br /&gt;
This is the easiest of the substitution ciphers. For example , it can be easily reverse engineered without having to know the key used. You’d just have to know the frequency of letters used in the language you. For example, in English if you know that “E” ,“T” and “A” were the most used letters in the alphabet you’d be well on your way to breaking the code. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Caesar_cipher&#039;&#039;&lt;br /&gt;
::      &#039;&#039;http://en.wikipedia.org/wiki/Letter_frequency&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://www.scholastic.com/spyx/pdfs/Cipher_Wheel.pdf&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Jefferson Disk&#039;&#039;&#039; ===&lt;br /&gt;
  &lt;br /&gt;
The Caesar Cipher would be the inspiration for Thomas Jefferson many centuries later. In 1795, Jefferson developed a cipher system &lt;br /&gt;
with used a series of 36 wheels (or disks) positioned along a central spinal. Each wheel had on it’s edge a series of letters. Each disk &lt;br /&gt;
is numbered and can be removed from the spinal, then put back on in any order. The order of the disks is the key.&lt;br /&gt;
&lt;br /&gt;
How this works is this… Both the sender and the receiver must have the disks in the same order. For example, for a 10 disk version might have a key like this 2,4,6,8,10,1,3,5,7,9.   From there, the sender would arrange the wheels to spell out the message they wanted along one row. Then finding another row, copy the message from another row and that would be the coded message that would be sent. Since the receiver would have the disks in the same order, all they’d have to do would be spell out the coded message on the individual wheels then rotate them all at once until the sender’s message was shown. &lt;br /&gt;
&lt;br /&gt;
Though Jefferson invented the encryption, it didn’t catch on until later when it was also independently invented by Étienne Bazeries (French Cryptanalyst) about a century later. The Bazieries Cylinder was an improvement on the Jefferson Disk. With even further improvements, this would become the basis for the encoding system (M-94)  the U.S. Army used from 1932- 1942. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Jefferson_disk&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Bazeries_Cylinder&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://www.monticello.org:8081/wheelcipher/wheelcipher.html&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
=== Rob Klaers, Billy Andersen, &amp;amp; Matt Mortiz ===&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2831&amp;diff=5699</id>
		<title>Franske CNT-2831</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2831&amp;diff=5699"/>
		<updated>2012-04-25T02:12:17Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: /* Projects */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the homepage for the CNT-2831: Implementing Cisco IOS Network Security (CCNA Security) classes taught by Dr. Ben Franske.&lt;br /&gt;
&lt;br /&gt;
= General Course Information =&lt;br /&gt;
* [[Franske CNT-2831 Syllabus|Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2831 SP12 Schedule|Spring 2012 Course Schedule]]&lt;br /&gt;
* [[Franske CNT-2831 How to do well|How to do well in CNT-2831]]&lt;br /&gt;
* [[Franske CNT-2831 Labs|Lab Assignments]]&lt;br /&gt;
* [[Franske Lab Report Format|Lab Report Format]]&lt;br /&gt;
* [[Franske CNT Service Project Assignment|Service Project Assignment]]&lt;br /&gt;
&lt;br /&gt;
= Projects =&lt;br /&gt;
* [[CCP Setup Instructions]]&lt;br /&gt;
* [[SmallBusinessSecurity]]&lt;br /&gt;
* [[DynDns]]&lt;br /&gt;
* [[Steganography]]&lt;br /&gt;
* [[Cryptographic Hashing Function (SHA-1 and MD5)]]&lt;br /&gt;
* [http://www.youtube.com/watch?v=Ij85Ke5_9IQ Minecraft Models of Cisco Devices]&lt;br /&gt;
* [[A Brief Early History of Cypher text]]&lt;br /&gt;
&lt;br /&gt;
= Resources =&lt;br /&gt;
== AAA ==&lt;br /&gt;
* [http://www.pro-bono-publico.de/projects/ Pro-Bono-Publico open source TACACS+ server and configuration manual]&lt;br /&gt;
* [http://www.shrubbery.net/tac_plus/ Shrubbery open source TACACS+ server]&lt;br /&gt;
* [http://tacacs.org/ TACACS+ Blog: Casting Light on the Dark Art of TACACS+]&lt;br /&gt;
== Cryptography ==&lt;br /&gt;
* Security Now Episode 35: Cryptographic Hashes [http://media.grc.com/sn/sn-035.mp3 Audio], [http://www.grc.com/sn/sn-035.htm Text]&lt;br /&gt;
* Security Now Episode 185: Cryptographic HMACs [http://www.podtrac.com/pts/redirect.mp3/aolradio.podcast.aol.com/sn/SN-185.mp3 Audio], [http://www.grc.com/sn/sn-185.htm Text] Content starts at 55:30&lt;br /&gt;
* Security Now Episode 31: Symmetric Stream Ciphers [http://media.grc.com/sn/sn-031.mp3 Audio], [http://www.grc.com/sn/sn-031.htm Text]&lt;br /&gt;
* Security Now Episode 33: Symmetric Block Ciphers [http://media.grc.com/sn/sn-033.mp3 Audio], [http://www.grc.com/sn/sn-033.htm Text]&lt;br /&gt;
* Security Now Episode 34: Public Key Cryptography [http://media.grc.com/sn/sn-034.mp3 Audio], [http://www.grc.com/sn/sn-034.htm Text]&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5698</id>
		<title>ITCwiki:Current events</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5698"/>
		<updated>2012-04-25T02:08:35Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;A Brief History of Cypher text&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Scytale&#039;&#039;&#039; ===&lt;br /&gt;
One of the earliest forms of Cryptography is the scytale. (sounds like “Italy” in pronunciation). &lt;br /&gt;
&lt;br /&gt;
The earliest known reference to this type of coded message dates back to the 7th Century B.C. Though it was mentioned that early, the &lt;br /&gt;
references did not make clear on just how this method of cryptography worked. That is until Plutarch (a Greek historian, biographer, &lt;br /&gt;
essayist who lived approx 46-120 A.D.) explained the method in his books “Parallel Lives”, in particular Volume 19 which talked about &lt;br /&gt;
the Spartan General Lysander and how he communicated with his army.  &lt;br /&gt;
&lt;br /&gt;
Plutarch goes into detail on just how this method works..As shown in this quote from the aforementioned volume, &lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;lt;i&amp;gt;“The dispatch-scroll is of the following character. When the ephors send out an admiral or a general, they make two round pieces of &lt;br /&gt;
wood exactly alike in length and thickness, so that each corresponds to the other in its dimensions, and keep one themselves, while &lt;br /&gt;
they give the other to their envoy. These pieces of wood they call scytalae. Whenever, then, they wish to send some secret and &lt;br /&gt;
important message, they make a scroll of parchment long and narrow, like a leathern strap, and wind it round their scytale, leaving no &lt;br /&gt;
vacant space thereon, but covering its surface all round with the parchment. After doing this, they write what they wish on the &lt;br /&gt;
parchment, just as it lies wrapped about the scytale; and when they have written their message, they take the parchment off and send &lt;br /&gt;
it, without the piece of wood, to the commander. He, when he has received it, cannot otherwise get any meaning out of it,--since the &lt;br /&gt;
letters have no connection, but are disarranged,--unless he takes his own scytale and winds the strip of parchment about it, so that, &lt;br /&gt;
when its spiral course is restored perfectly, and that which follows is joined to that which precedes, he reads around the staff, and &lt;br /&gt;
so discovers the continuity of the message. And the parchment, like the staff, is called scytale, as the thing measured bears the name &lt;br /&gt;
of the measure.” &amp;lt;/i&amp;gt;&amp;lt;/blockquote&amp;gt; &lt;br /&gt;
:::—Plutarch, Lives (Lysander 19), ed. Bernadotte Perrin.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Scytale&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Plutarch#Parallel_Lives&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/LysanderScytale&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Caesar Wheel&#039;&#039;&#039;===&lt;br /&gt;
Another early form of ciphering was the Caesar wheel, also known as the Caesar Cipher.. Named after Julius Caesar  (100 B.C. – 44 B.C.) who was documented as having used it. &lt;br /&gt;
&lt;br /&gt;
This was essentially two disks of difference sizes. The smaller one on top of the larger one, joined in the center in such a . Each wheel would then be sectioned along its edge. Each of these sections had a letter of the alphabet.  The key is set in advance such that both the sender and receiver what it is. The key was nothing more than a number which indicated the letter shift needed to encode or decode a message.&lt;br /&gt;
&lt;br /&gt;
For example.. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;lt;i&amp;gt;“If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet,that not a word could be made out. “If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter of the alphabet, namely D, for A, and so with the others.”&amp;lt;/i&amp;gt;&amp;lt;/blockquote&amp;gt; &lt;br /&gt;
:::—Suetonius, Life of Julius Caesar &lt;br /&gt;
&lt;br /&gt;
This is the easiest of the substitution ciphers. For example , it can be easily reverse engineered without having to know the key used. You’d just have to know the frequency of letters used in the language you. For example, in English if you know that “E” ,“T” and “A” were the most used letters in the alphabet you’d be well on your way to breaking the code. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Caesar_cipher&#039;&#039;&lt;br /&gt;
::      &#039;&#039;http://en.wikipedia.org/wiki/Letter_frequency&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://www.scholastic.com/spyx/pdfs/Cipher_Wheel.pdf&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Jefferson Disk&#039;&#039;&#039; ===&lt;br /&gt;
  &lt;br /&gt;
The Caesar Cipher would be the inspiration for Thomas Jefferson many centuries later. In 1795, Jefferson developed a cipher system &lt;br /&gt;
with used a series of 36 wheels (or disks) positioned along a central spinal. Each wheel had on it’s edge a series of letters. Each disk &lt;br /&gt;
is numbered and can be removed from the spinal, then put back on in any order. The order of the disks is the key.&lt;br /&gt;
&lt;br /&gt;
How this works is this… Both the sender and the receiver must have the disks in the same order. For example, for a 10 disk version might have a key like this 2,4,6,8,10,1,3,5,7,9.   From there, the sender would arrange the wheels to spell out the message they wanted along one row. Then finding another row, copy the message from another row and that would be the coded message that would be sent. Since the receiver would have the disks in the same order, all they’d have to do would be spell out the coded message on the individual wheels then rotate them all at once until the sender’s message was shown. &lt;br /&gt;
&lt;br /&gt;
Though Jefferson invented the encryption, it didn’t catch on until later when it was also independently invented by Étienne Bazeries (French Cryptanalyst) about a century later. The Bazieries Cylinder was an improvement on the Jefferson Disk. With even further improvements, this would become the basis for the encoding system (M-94)  the U.S. Army used from 1932- 1942. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Jefferson_disk&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Bazeries_Cylinder&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://www.monticello.org:8081/wheelcipher/wheelcipher.html&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
=== Rob Klaers, Billy Andersen, &amp;amp; Matt Mortiz ===&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5697</id>
		<title>ITCwiki:Current events</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5697"/>
		<updated>2012-04-25T02:07:21Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: /* Jefferson Disk */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;A Brief History of Cypher text&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Scytale&#039;&#039;&#039; ===&lt;br /&gt;
:One of the earliest forms of Cryptography is the scytale. (sounds like “Italy” in pronunciation). &lt;br /&gt;
&lt;br /&gt;
The earliest known reference to this type of coded message dates back to the 7th Century B.C. Though it was mentioned that early, the &lt;br /&gt;
references did not make clear on just how this method of cryptography worked. That is until Plutarch (a Greek historian, biographer, &lt;br /&gt;
essayist who lived approx 46-120 A.D.) explained the method in his books “Parallel Lives”, in particular Volume 19 which talked about &lt;br /&gt;
the Spartan General Lysander and how he communicated with his army.  &lt;br /&gt;
&lt;br /&gt;
Plutarch goes into detail on just how this method works..As shown in this quote from the aforementioned volume, &lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;lt;i&amp;gt;“The dispatch-scroll is of the following character. When the ephors send out an admiral or a general, they make two round pieces of &lt;br /&gt;
wood exactly alike in length and thickness, so that each corresponds to the other in its dimensions, and keep one themselves, while &lt;br /&gt;
they give the other to their envoy. These pieces of wood they call scytalae. Whenever, then, they wish to send some secret and &lt;br /&gt;
important message, they make a scroll of parchment long and narrow, like a leathern strap, and wind it round their scytale, leaving no &lt;br /&gt;
vacant space thereon, but covering its surface all round with the parchment. After doing this, they write what they wish on the &lt;br /&gt;
parchment, just as it lies wrapped about the scytale; and when they have written their message, they take the parchment off and send &lt;br /&gt;
it, without the piece of wood, to the commander. He, when he has received it, cannot otherwise get any meaning out of it,--since the &lt;br /&gt;
letters have no connection, but are disarranged,--unless he takes his own scytale and winds the strip of parchment about it, so that, &lt;br /&gt;
when its spiral course is restored perfectly, and that which follows is joined to that which precedes, he reads around the staff, and &lt;br /&gt;
so discovers the continuity of the message. And the parchment, like the staff, is called scytale, as the thing measured bears the name &lt;br /&gt;
of the measure.” &amp;lt;/i&amp;gt;&amp;lt;/blockquote&amp;gt; &lt;br /&gt;
:::—Plutarch, Lives (Lysander 19), ed. Bernadotte Perrin.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Scytale&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Plutarch#Parallel_Lives&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/LysanderScytale&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Caesar Wheel&#039;&#039;&#039;===&lt;br /&gt;
:: Another early form of ciphering was the Caesar wheel, also known as the Caesar Cipher.. Named after Julius Caesar  (100 B.C. – 44 B.C.) who was documented as having used it. &lt;br /&gt;
&lt;br /&gt;
This was essentially two disks of difference sizes. The smaller one on top of the larger one, joined in the center in such a . Each wheel would then be sectioned along its edge. Each of these sections had a letter of the alphabet.  The key is set in advance such that both the sender and receiver what it is. The key was nothing more than a number which indicated the letter shift needed to encode or decode a message.&lt;br /&gt;
&lt;br /&gt;
For example.. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;lt;i&amp;gt;“If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet,that not a word could be made out. “If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter of the alphabet, namely D, for A, and so with the others.”&amp;lt;/i&amp;gt;&amp;lt;/blockquote&amp;gt; &lt;br /&gt;
:::—Suetonius, Life of Julius Caesar &lt;br /&gt;
&lt;br /&gt;
This is the easiest of the substitution ciphers. For example , it can be easily reverse engineered without having to know the key used. You’d just have to know the frequency of letters used in the language you. For example, in English if you know that “E” ,“T” and “A” were the most used letters in the alphabet you’d be well on your way to breaking the code. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Caesar_cipher&#039;&#039;&lt;br /&gt;
::      &#039;&#039;http://en.wikipedia.org/wiki/Letter_frequency&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://www.scholastic.com/spyx/pdfs/Cipher_Wheel.pdf&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Jefferson Disk&#039;&#039;&#039; ===&lt;br /&gt;
  &lt;br /&gt;
The Caesar Cipher would be the inspiration for Thomas Jefferson many centuries later. In 1795, Jefferson developed a cipher system &lt;br /&gt;
with used a series of 36 wheels (or disks) positioned along a central spinal. Each wheel had on it’s edge a series of letters. Each disk &lt;br /&gt;
is numbered and can be removed from the spinal, then put back on in any order. The order of the disks is the key.&lt;br /&gt;
&lt;br /&gt;
How this works is this… Both the sender and the receiver must have the disks in the same order. For example, for a 10 disk version might have a key like this 2,4,6,8,10,1,3,5,7,9.   From there, the sender would arrange the wheels to spell out the message they wanted along one row. Then finding another row, copy the message from another row and that would be the coded message that would be sent. Since the receiver would have the disks in the same order, all they’d have to do would be spell out the coded message on the individual wheels then rotate them all at once until the sender’s message was shown. &lt;br /&gt;
&lt;br /&gt;
Though Jefferson invented the encryption, it didn’t catch on until later when it was also independently invented by Étienne Bazeries (French Cryptanalyst) about a century later. The Bazieries Cylinder was an improvement on the Jefferson Disk. With even further improvements, this would become the basis for the encoding system (M-94)  the U.S. Army used from 1932- 1942. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Jefferson_disk&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Bazeries_Cylinder&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://www.monticello.org:8081/wheelcipher/wheelcipher.html&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
=== Rob Klaers, Billy Andersen, &amp;amp; Matt Mortiz ===&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5696</id>
		<title>ITCwiki:Current events</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5696"/>
		<updated>2012-04-25T02:02:07Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;A Brief History of Cypher text&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Scytale&#039;&#039;&#039; ===&lt;br /&gt;
:One of the earliest forms of Cryptography is the scytale. (sounds like “Italy” in pronunciation). &lt;br /&gt;
&lt;br /&gt;
The earliest known reference to this type of coded message dates back to the 7th Century B.C. Though it was mentioned that early, the &lt;br /&gt;
references did not make clear on just how this method of cryptography worked. That is until Plutarch (a Greek historian, biographer, &lt;br /&gt;
essayist who lived approx 46-120 A.D.) explained the method in his books “Parallel Lives”, in particular Volume 19 which talked about &lt;br /&gt;
the Spartan General Lysander and how he communicated with his army.  &lt;br /&gt;
&lt;br /&gt;
Plutarch goes into detail on just how this method works..As shown in this quote from the aforementioned volume, &lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;lt;i&amp;gt;“The dispatch-scroll is of the following character. When the ephors send out an admiral or a general, they make two round pieces of &lt;br /&gt;
wood exactly alike in length and thickness, so that each corresponds to the other in its dimensions, and keep one themselves, while &lt;br /&gt;
they give the other to their envoy. These pieces of wood they call scytalae. Whenever, then, they wish to send some secret and &lt;br /&gt;
important message, they make a scroll of parchment long and narrow, like a leathern strap, and wind it round their scytale, leaving no &lt;br /&gt;
vacant space thereon, but covering its surface all round with the parchment. After doing this, they write what they wish on the &lt;br /&gt;
parchment, just as it lies wrapped about the scytale; and when they have written their message, they take the parchment off and send &lt;br /&gt;
it, without the piece of wood, to the commander. He, when he has received it, cannot otherwise get any meaning out of it,--since the &lt;br /&gt;
letters have no connection, but are disarranged,--unless he takes his own scytale and winds the strip of parchment about it, so that, &lt;br /&gt;
when its spiral course is restored perfectly, and that which follows is joined to that which precedes, he reads around the staff, and &lt;br /&gt;
so discovers the continuity of the message. And the parchment, like the staff, is called scytale, as the thing measured bears the name &lt;br /&gt;
of the measure.” &amp;lt;/i&amp;gt;&amp;lt;/blockquote&amp;gt; &lt;br /&gt;
:::—Plutarch, Lives (Lysander 19), ed. Bernadotte Perrin.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Scytale&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Plutarch#Parallel_Lives&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/LysanderScytale&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Caesar Wheel&#039;&#039;&#039;===&lt;br /&gt;
:: Another early form of ciphering was the Caesar wheel, also known as the Caesar Cipher.. Named after Julius Caesar  (100 B.C. – 44 B.C.) who was documented as having used it. &lt;br /&gt;
&lt;br /&gt;
This was essentially two disks of difference sizes. The smaller one on top of the larger one, joined in the center in such a . Each wheel would then be sectioned along its edge. Each of these sections had a letter of the alphabet.  The key is set in advance such that both the sender and receiver what it is. The key was nothing more than a number which indicated the letter shift needed to encode or decode a message.&lt;br /&gt;
&lt;br /&gt;
For example.. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;lt;i&amp;gt;“If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet,that not a word could be made out. “If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter of the alphabet, namely D, for A, and so with the others.”&amp;lt;/i&amp;gt;&amp;lt;/blockquote&amp;gt; &lt;br /&gt;
:::—Suetonius, Life of Julius Caesar &lt;br /&gt;
&lt;br /&gt;
This is the easiest of the substitution ciphers. For example , it can be easily reverse engineered without having to know the key used. You’d just have to know the frequency of letters used in the language you. For example, in English if you know that “E” ,“T” and “A” were the most used letters in the alphabet you’d be well on your way to breaking the code. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Caesar_cipher&#039;&#039;&lt;br /&gt;
::      &#039;&#039;http://en.wikipedia.org/wiki/Letter_frequency&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://www.scholastic.com/spyx/pdfs/Cipher_Wheel.pdf&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Jefferson Disk&#039;&#039;&#039; ===&lt;br /&gt;
::The Caesar Cipher would be the inspiration for Thomas Jefferson many centuries later. In 1795, Jefferson developed a cipher system with used a series of 36 wheels (or disks) positioned along a central spinal. Each wheel had on it’s edge a series of letters. Each disk is numbered and can be removed from the spinal, then put back on in any order. The order of the disks is the key.&lt;br /&gt;
&lt;br /&gt;
How this works is this… Both the sender and the receiver must have the disks in the same order. For example, for a 10 disk version might have a key like this 2,4,6,8,10,1,3,5,7,9.   From there, the sender would arrange the wheels to spell out the message they wanted along one row. Then finding another row, copy the message from another row and that would be the coded message that would be sent. Since the receiver would have the disks in the same order, all they’d have to do would be spell out the coded message on the individual wheels then rotate them all at once until the sender’s message was shown. &lt;br /&gt;
&lt;br /&gt;
Though Jefferson invented the encryption, it didn’t catch on until later when it was also independently invented by Étienne Bazeries (French Cryptanalyst) about a century later. The Bazieries Cylinder was an improvement on the Jefferson Disk. With even further improvements, this would become the basis for the encoding system (M-94)  the U.S. Army used from 1932- 1942. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Jefferson_disk&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Bazeries_Cylinder&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://www.monticello.org:8081/wheelcipher/wheelcipher.html&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
=== Rob Klaers, Billy Andersen, &amp;amp; Matt Mortiz ===&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5695</id>
		<title>ITCwiki:Current events</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5695"/>
		<updated>2012-04-25T01:57:03Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;A Brief History of Cypher text&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Scytale&#039;&#039;&#039; ===&lt;br /&gt;
:One of the earliest forms of Cryptography is the scytale. (sounds like “Italy” in pronunciation). &lt;br /&gt;
&lt;br /&gt;
The earliest known reference to this type of coded message dates back to the 7th Century B.C. Though it was mentioned that early, the &lt;br /&gt;
references did not make clear on just how this method of cryptography worked. That is until Plutarch (a Greek historian, biographer, &lt;br /&gt;
essayist who lived approx 46-120 A.D.) explained the method in his books “Parallel Lives”, in particular Volume 19 which talked about &lt;br /&gt;
the Spartan General Lysander and how he communicated with his army.  &lt;br /&gt;
&lt;br /&gt;
Plutarch goes into detail on just how this method works..As shown in this quote from the aforementioned volume, &lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;lt;i&amp;gt;“The dispatch-scroll is of the following character. When the ephors send out an admiral or a general, they make two round pieces of &lt;br /&gt;
wood exactly alike in length and thickness, so that each corresponds to the other in its dimensions, and keep one themselves, while &lt;br /&gt;
they give the other to their envoy. These pieces of wood they call scytalae. Whenever, then, they wish to send some secret and &lt;br /&gt;
important message, they make a scroll of parchment long and narrow, like a leathern strap, and wind it round their scytale, leaving no &lt;br /&gt;
vacant space thereon, but covering its surface all round with the parchment. After doing this, they write what they wish on the &lt;br /&gt;
parchment, just as it lies wrapped about the scytale; and when they have written their message, they take the parchment off and send &lt;br /&gt;
it, without the piece of wood, to the commander. He, when he has received it, cannot otherwise get any meaning out of it,--since the &lt;br /&gt;
letters have no connection, but are disarranged,--unless he takes his own scytale and winds the strip of parchment about it, so that, &lt;br /&gt;
when its spiral course is restored perfectly, and that which follows is joined to that which precedes, he reads around the staff, and &lt;br /&gt;
so discovers the continuity of the message. And the parchment, like the staff, is called scytale, as the thing measured bears the name &lt;br /&gt;
of the measure.” &amp;lt;/i&amp;gt;&amp;lt;/blockquote&amp;gt; —Plutarch, Lives (Lysander 19), ed. Bernadotte Perrin.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Scytale&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Plutarch#Parallel_Lives&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/LysanderScytale&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Caesar Wheel&#039;&#039;&#039;===&lt;br /&gt;
:: Another early form of ciphering was the Caesar wheel, also known as the Caesar Cipher.. Named after Julius Caesar  (100 B.C. – 44 B.C.) who was documented as having used it. &lt;br /&gt;
&lt;br /&gt;
This was essentially two disks of difference sizes. The smaller one on top of the larger one, joined in the center in such a . Each wheel would then be sectioned along its edge. Each of these sections had a letter of the alphabet.  The key is set in advance such that both the sender and receiver what it is. The key was nothing more than a number which indicated the letter shift needed to encode or decode a message.&lt;br /&gt;
&lt;br /&gt;
For example.. &lt;br /&gt;
&lt;br /&gt;
:::” If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet, &lt;br /&gt;
:::that not a word could be made out. “If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter &lt;br /&gt;
:::of the alphabet, namely D, for A, and so with the others.” —Suetonius, Life of Julius Caesar &lt;br /&gt;
&lt;br /&gt;
This is the easiest of the substitution ciphers. For example , it can be easily reverse engineered without having to know the key used. You’d just have to know the frequency of letters used in the language you. For example, in English if you know that “E” ,“T” and “A” were the most used letters in the alphabet you’d be well on your way to breaking the code. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Caesar_cipher&#039;&#039;&lt;br /&gt;
::      &#039;&#039;http://en.wikipedia.org/wiki/Letter_frequency&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://www.scholastic.com/spyx/pdfs/Cipher_Wheel.pdf&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Jefferson Disk&#039;&#039;&#039; ===&lt;br /&gt;
::The Caesar Cipher would be the inspiration for Thomas Jefferson many centuries later. In 1795, Jefferson developed a cipher system with used a series of 36 wheels (or disks) positioned along a central spinal. Each wheel had on it’s edge a series of letters. Each disk is numbered and can be removed from the spinal, then put back on in any order. The order of the disks is the key.&lt;br /&gt;
&lt;br /&gt;
How this works is this… Both the sender and the receiver must have the disks in the same order. For example, for a 10 disk version might have a key like this 2,4,6,8,10,1,3,5,7,9.   From there, the sender would arrange the wheels to spell out the message they wanted along one row. Then finding another row, copy the message from another row and that would be the coded message that would be sent. Since the receiver would have the disks in the same order, all they’d have to do would be spell out the coded message on the individual wheels then rotate them all at once until the sender’s message was shown. &lt;br /&gt;
&lt;br /&gt;
Though Jefferson invented the encryption, it didn’t catch on until later when it was also independently invented by Étienne Bazeries (French Cryptanalyst) about a century later. The Bazieries Cylinder was an improvement on the Jefferson Disk. With even further improvements, this would become the basis for the encoding system (M-94)  the U.S. Army used from 1932- 1942. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Jefferson_disk&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Bazeries_Cylinder&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://www.monticello.org:8081/wheelcipher/wheelcipher.html&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
=== Rob Klaers, Billy Andersen, &amp;amp; Matt Mortiz ===&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5694</id>
		<title>ITCwiki:Current events</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5694"/>
		<updated>2012-04-25T01:56:16Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: /* Scytale */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;A Brief History of Cypher text&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Scytale&#039;&#039;&#039; ===&lt;br /&gt;
:One of the earliest forms of Cryptography is the scytale. (sounds like “Italy” in pronunciation). &lt;br /&gt;
&lt;br /&gt;
The earliest known reference to this type of coded message dates back to the 7th Century B.C. Though it was mentioned that early, the &lt;br /&gt;
references did not make clear on just how this method of cryptography worked. That is until Plutarch (a Greek historian, biographer, &lt;br /&gt;
essayist who lived approx 46-120 A.D.) explained the method in his books “Parallel Lives”, in particular Volume 19 which talked about &lt;br /&gt;
the Spartan General Lysander and how he communicated with his army.  &lt;br /&gt;
&lt;br /&gt;
Plutarch goes into detail on just how this method works..As shown in this quote from the aforementioned volume, &lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;lt;i&amp;gt;“The dispatch-scroll is of the following character. When the ephors send out an admiral or a general, they make two round pieces of &lt;br /&gt;
wood exactly alike in length and thickness, so that each corresponds to the other in its dimensions, and keep one themselves, while &lt;br /&gt;
they give the other to their envoy. These pieces of wood they call scytalae. Whenever, then, they wish to send some secret and &lt;br /&gt;
important message, they make a scroll of parchment long and narrow, like a leathern strap, and wind it round their scytale, leaving no &lt;br /&gt;
vacant space thereon, but covering its surface all round with the parchment. After doing this, they write what they wish on the &lt;br /&gt;
parchment, just as it lies wrapped about the scytale; and when they have written their message, they take the parchment off and send &lt;br /&gt;
it, without the piece of wood, to the commander. He, when he has received it, cannot otherwise get any meaning out of it,--since the &lt;br /&gt;
letters have no connection, but are disarranged,--unless he takes his own scytale and winds the strip of parchment about it, so that, &lt;br /&gt;
when its spiral course is restored perfectly, and that which follows is joined to that which precedes, he reads around the staff, and &lt;br /&gt;
so discovers the continuity of the message. And the parchment, like the staff, is called scytale, as the thing measured bears the name &lt;br /&gt;
of the measure.” &amp;lt;/i&amp;gt;&amp;lt;/blockquote&amp;gt; —Plutarch, Lives (Lysander 19), ed. Bernadotte Perrin.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Scytale&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/Plutarch#Parallel_Lives&#039;&#039;&lt;br /&gt;
::	&#039;&#039;http://en.wikipedia.org/wiki/LysanderScytale&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Caesar Wheel&#039;&#039;&#039;===&lt;br /&gt;
:: Another early form of ciphering was the Caesar wheel, also known as the Caesar Cipher.. Named after Julius Caesar  (100 B.C. – 44 B.C.) who was documented as having used it. &lt;br /&gt;
&lt;br /&gt;
This was essentially two disks of difference sizes. The smaller one on top of the larger one, joined in the center in such a . Each wheel would then be sectioned along its edge. Each of these sections had a letter of the alphabet.  The key is set in advance such that both the sender and receiver what it is. The key was nothing more than a number which indicated the letter shift needed to encode or decode a message.&lt;br /&gt;
&lt;br /&gt;
For example.. &lt;br /&gt;
&lt;br /&gt;
:::” If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet, &lt;br /&gt;
:::that not a word could be made out. “If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter &lt;br /&gt;
:::of the alphabet, namely D, for A, and so with the others.” —Suetonius, Life of Julius Caesar &lt;br /&gt;
&lt;br /&gt;
This is the easiest of the substitution ciphers. For example , it can be easily reverse engineered without having to know the key used. You’d just have to know the frequency of letters used in the language you. For example, in English if you know that “E” ,“T” and “A” were the most used letters in the alphabet you’d be well on your way to breaking the code. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Caesar_cipher&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Letter_frequency&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://www.scholastic.com/spyx/pdfs/Cipher_Wheel.pdf&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Jefferson Disk&#039;&#039;&#039; ===&lt;br /&gt;
::The Caesar Cipher would be the inspiration for Thomas Jefferson many centuries later. In 1795, Jefferson developed a cipher system with used a series of 36 wheels (or disks) positioned along a central spinal. Each wheel had on it’s edge a series of letters. Each disk is numbered and can be removed from the spinal, then put back on in any order. The order of the disks is the key.&lt;br /&gt;
&lt;br /&gt;
How this works is this… Both the sender and the receiver must have the disks in the same order. For example, for a 10 disk version might have a key like this 2,4,6,8,10,1,3,5,7,9.   From there, the sender would arrange the wheels to spell out the message they wanted along one row. Then finding another row, copy the message from another row and that would be the coded message that would be sent. Since the receiver would have the disks in the same order, all they’d have to do would be spell out the coded message on the individual wheels then rotate them all at once until the sender’s message was shown. &lt;br /&gt;
&lt;br /&gt;
Though Jefferson invented the encryption, it didn’t catch on until later when it was also independently invented by Étienne Bazeries (French Cryptanalyst) about a century later. The Bazieries Cylinder was an improvement on the Jefferson Disk. With even further improvements, this would become the basis for the encoding system (M-94)  the U.S. Army used from 1932- 1942. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Jefferson_disk&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Bazeries_Cylinder&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://www.monticello.org:8081/wheelcipher/wheelcipher.html&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
=== Rob Klaers, Billy Andersen, &amp;amp; Matt Mortiz ===&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5693</id>
		<title>ITCwiki:Current events</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5693"/>
		<updated>2012-04-25T01:55:57Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: /* Scytale */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;A Brief History of Cypher text&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Scytale&#039;&#039;&#039; ===&lt;br /&gt;
:One of the earliest forms of Cryptography is the scytale. (sounds like “Italy” in pronunciation). &lt;br /&gt;
&lt;br /&gt;
The earliest known reference to this type of coded message dates back to the 7th Century B.C. Though it was mentioned that early, the &lt;br /&gt;
references did not make clear on just how this method of cryptography worked. That is until Plutarch (a Greek historian, biographer, &lt;br /&gt;
essayist who lived approx 46-120 A.D.) explained the method in his books “Parallel Lives”, in particular Volume 19 which talked about &lt;br /&gt;
the Spartan General Lysander and how he communicated with his army.  &lt;br /&gt;
&lt;br /&gt;
Plutarch goes into detail on just how this method works..As shown in this quote from the aforementioned volume, &lt;br /&gt;
&lt;br /&gt;
&amp;lt;blockquote&amp;gt;&amp;lt;i&amp;gt;“The dispatch-scroll is of the following character. When the ephors send out an admiral or a general, they make two round pieces of &lt;br /&gt;
wood exactly alike in length and thickness, so that each corresponds to the other in its dimensions, and keep one themselves, while &lt;br /&gt;
they give the other to their envoy. These pieces of wood they call scytalae. Whenever, then, they wish to send some secret and &lt;br /&gt;
important message, they make a scroll of parchment long and narrow, like a leathern strap, and wind it round their scytale, leaving no &lt;br /&gt;
vacant space thereon, but covering its surface all round with the parchment. After doing this, they write what they wish on the &lt;br /&gt;
parchment, just as it lies wrapped about the scytale; and when they have written their message, they take the parchment off and send &lt;br /&gt;
it, without the piece of wood, to the commander. He, when he has received it, cannot otherwise get any meaning out of it,--since the &lt;br /&gt;
letters have no connection, but are disarranged,--unless he takes his own scytale and winds the strip of parchment about it, so that, &lt;br /&gt;
when its spiral course is restored perfectly, and that which follows is joined to that which precedes, he reads around the staff, and &lt;br /&gt;
so discovers the continuity of the message. And the parchment, like the staff, is called scytale, as the thing measured bears the name &lt;br /&gt;
of the measure.” &amp;lt;/i&amp;gt;&amp;lt;/blockquote&amp;gt; —Plutarch, Lives (Lysander 19), ed. Bernadotte Perrin.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Scytale&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Plutarch#Parallel_Lives&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/LysanderScytale&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Caesar Wheel&#039;&#039;&#039;===&lt;br /&gt;
:: Another early form of ciphering was the Caesar wheel, also known as the Caesar Cipher.. Named after Julius Caesar  (100 B.C. – 44 B.C.) who was documented as having used it. &lt;br /&gt;
&lt;br /&gt;
This was essentially two disks of difference sizes. The smaller one on top of the larger one, joined in the center in such a . Each wheel would then be sectioned along its edge. Each of these sections had a letter of the alphabet.  The key is set in advance such that both the sender and receiver what it is. The key was nothing more than a number which indicated the letter shift needed to encode or decode a message.&lt;br /&gt;
&lt;br /&gt;
For example.. &lt;br /&gt;
&lt;br /&gt;
:::” If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet, &lt;br /&gt;
:::that not a word could be made out. “If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter &lt;br /&gt;
:::of the alphabet, namely D, for A, and so with the others.” —Suetonius, Life of Julius Caesar &lt;br /&gt;
&lt;br /&gt;
This is the easiest of the substitution ciphers. For example , it can be easily reverse engineered without having to know the key used. You’d just have to know the frequency of letters used in the language you. For example, in English if you know that “E” ,“T” and “A” were the most used letters in the alphabet you’d be well on your way to breaking the code. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Caesar_cipher&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Letter_frequency&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://www.scholastic.com/spyx/pdfs/Cipher_Wheel.pdf&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Jefferson Disk&#039;&#039;&#039; ===&lt;br /&gt;
::The Caesar Cipher would be the inspiration for Thomas Jefferson many centuries later. In 1795, Jefferson developed a cipher system with used a series of 36 wheels (or disks) positioned along a central spinal. Each wheel had on it’s edge a series of letters. Each disk is numbered and can be removed from the spinal, then put back on in any order. The order of the disks is the key.&lt;br /&gt;
&lt;br /&gt;
How this works is this… Both the sender and the receiver must have the disks in the same order. For example, for a 10 disk version might have a key like this 2,4,6,8,10,1,3,5,7,9.   From there, the sender would arrange the wheels to spell out the message they wanted along one row. Then finding another row, copy the message from another row and that would be the coded message that would be sent. Since the receiver would have the disks in the same order, all they’d have to do would be spell out the coded message on the individual wheels then rotate them all at once until the sender’s message was shown. &lt;br /&gt;
&lt;br /&gt;
Though Jefferson invented the encryption, it didn’t catch on until later when it was also independently invented by Étienne Bazeries (French Cryptanalyst) about a century later. The Bazieries Cylinder was an improvement on the Jefferson Disk. With even further improvements, this would become the basis for the encoding system (M-94)  the U.S. Army used from 1932- 1942. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Jefferson_disk&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Bazeries_Cylinder&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://www.monticello.org:8081/wheelcipher/wheelcipher.html&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
=== Rob Klaers, Billy Andersen, &amp;amp; Matt Mortiz ===&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5692</id>
		<title>ITCwiki:Current events</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5692"/>
		<updated>2012-04-25T01:36:57Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: /* Scytale */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;A Brief History of Cypher text&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Scytale&#039;&#039;&#039; ===&lt;br /&gt;
:   One of the earliest forms of Cryptography is the scytale. (sounds like “Italy” in pronunciation). &lt;br /&gt;
:   The earliest known reference to this type of coded message dates back to the 7th Century B.C. Though it was mentioned that early, the &lt;br /&gt;
:references did not make clear on just how this method of cryptography worked. That is until Plutarch (a Greek historian, biographer, &lt;br /&gt;
:essayist who lived approx 46-120 A.D.) explained the method in his books “Parallel Lives”, in particular Volume 19 which talked about &lt;br /&gt;
:the Spartan General Lysander and how he communicated with his army.  &lt;br /&gt;
&lt;br /&gt;
::Plutarch goes into detail on just how this method works..As shown in this quote from the aforementioned volume, &lt;br /&gt;
&lt;br /&gt;
:::“The dispatch-scroll is of the following character. When the ephors send out an admiral or a general, they make two round pieces of &lt;br /&gt;
:::wood exactly alike in length and thickness, so that each corresponds to the other in its dimensions, and keep one themselves, while &lt;br /&gt;
:::they give the other to their envoy. These pieces of wood they call scytalae. Whenever, then, they wish to send some secret and &lt;br /&gt;
:::important message, they make a scroll of parchment long and narrow, like a leathern strap, and wind it round their scytale, leaving no &lt;br /&gt;
:::vacant space thereon, but covering its surface all round with the parchment. After doing this, they write what they wish on the &lt;br /&gt;
:::parchment, just as it lies wrapped about the scytale; and when they have written their message, they take the parchment off and send &lt;br /&gt;
:::it, without the piece of wood, to the commander. He, when he has received it, cannot otherwise get any meaning out of it,--since the &lt;br /&gt;
:::letters have no connection, but are disarranged,--unless he takes his own scytale and winds the strip of parchment about it, so that, &lt;br /&gt;
:::when its spiral course is restored perfectly, and that which follows is joined to that which precedes, he reads around the staff, and &lt;br /&gt;
:::so discovers the continuity of the message. And the parchment, like the staff, is called scytale, as the thing measured bears the name &lt;br /&gt;
:::of the measure.” —Plutarch, Lives (Lysander 19), ed. Bernadotte Perrin.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Scytale&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Plutarch#Parallel_Lives&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/LysanderScytale&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Caesar Wheel&#039;&#039;&#039;===&lt;br /&gt;
:: Another early form of ciphering was the Caesar wheel, also known as the Caesar Cipher.. Named after Julius Caesar  (100 B.C. – 44 B.C.) who was documented as having used it. &lt;br /&gt;
&lt;br /&gt;
This was essentially two disks of difference sizes. The smaller one on top of the larger one, joined in the center in such a . Each wheel would then be sectioned along its edge. Each of these sections had a letter of the alphabet.  The key is set in advance such that both the sender and receiver what it is. The key was nothing more than a number which indicated the letter shift needed to encode or decode a message.&lt;br /&gt;
&lt;br /&gt;
For example.. &lt;br /&gt;
&lt;br /&gt;
:::” If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet, &lt;br /&gt;
:::that not a word could be made out. “If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter &lt;br /&gt;
:::of the alphabet, namely D, for A, and so with the others.” —Suetonius, Life of Julius Caesar &lt;br /&gt;
&lt;br /&gt;
This is the easiest of the substitution ciphers. For example , it can be easily reverse engineered without having to know the key used. You’d just have to know the frequency of letters used in the language you. For example, in English if you know that “E” ,“T” and “A” were the most used letters in the alphabet you’d be well on your way to breaking the code. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Caesar_cipher&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Letter_frequency&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://www.scholastic.com/spyx/pdfs/Cipher_Wheel.pdf&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Jefferson Disk&#039;&#039;&#039; ===&lt;br /&gt;
::The Caesar Cipher would be the inspiration for Thomas Jefferson many centuries later. In 1795, Jefferson developed a cipher system with used a series of 36 wheels (or disks) positioned along a central spinal. Each wheel had on it’s edge a series of letters. Each disk is numbered and can be removed from the spinal, then put back on in any order. The order of the disks is the key.&lt;br /&gt;
&lt;br /&gt;
How this works is this… Both the sender and the receiver must have the disks in the same order. For example, for a 10 disk version might have a key like this 2,4,6,8,10,1,3,5,7,9.   From there, the sender would arrange the wheels to spell out the message they wanted along one row. Then finding another row, copy the message from another row and that would be the coded message that would be sent. Since the receiver would have the disks in the same order, all they’d have to do would be spell out the coded message on the individual wheels then rotate them all at once until the sender’s message was shown. &lt;br /&gt;
&lt;br /&gt;
Though Jefferson invented the encryption, it didn’t catch on until later when it was also independently invented by Étienne Bazeries (French Cryptanalyst) about a century later. The Bazieries Cylinder was an improvement on the Jefferson Disk. With even further improvements, this would become the basis for the encoding system (M-94)  the U.S. Army used from 1932- 1942. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Jefferson_disk&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Bazeries_Cylinder&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://www.monticello.org:8081/wheelcipher/wheelcipher.html&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
=== Rob Klaers, Billy Andersen, &amp;amp; Matt Mortiz ===&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5691</id>
		<title>ITCwiki:Current events</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5691"/>
		<updated>2012-04-25T01:36:10Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;A Brief History of Cypher text&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Scytale&#039;&#039;&#039; ===&lt;br /&gt;
::One of the earliest forms of Cryptography is the scytale. (sounds like “Italy” in pronunciation). &lt;br /&gt;
::The earliest known reference to this type of coded message dates back to the 7th Century B.C. Though it was mentioned that early, the &lt;br /&gt;
:references did not make clear on just how this method of cryptography worked. That is until Plutarch (a Greek historian, biographer, &lt;br /&gt;
:essayist who lived approx 46-120 A.D.) explained the method in his books “Parallel Lives”, in particular Volume 19 which talked about &lt;br /&gt;
:the Spartan General Lysander and how he communicated with his army.  &lt;br /&gt;
&lt;br /&gt;
::Plutarch goes into detail on just how this method works..As shown in this quote from the aforementioned volume, &lt;br /&gt;
&lt;br /&gt;
:::“The dispatch-scroll is of the following character. When the ephors send out an admiral or a general, they make two round pieces of &lt;br /&gt;
:::wood exactly alike in length and thickness, so that each corresponds to the other in its dimensions, and keep one themselves, while &lt;br /&gt;
:::they give the other to their envoy. These pieces of wood they call scytalae. Whenever, then, they wish to send some secret and &lt;br /&gt;
:::important message, they make a scroll of parchment long and narrow, like a leathern strap, and wind it round their scytale, leaving no &lt;br /&gt;
:::vacant space thereon, but covering its surface all round with the parchment. After doing this, they write what they wish on the &lt;br /&gt;
:::parchment, just as it lies wrapped about the scytale; and when they have written their message, they take the parchment off and send &lt;br /&gt;
:::it, without the piece of wood, to the commander. He, when he has received it, cannot otherwise get any meaning out of it,--since the &lt;br /&gt;
:::letters have no connection, but are disarranged,--unless he takes his own scytale and winds the strip of parchment about it, so that, &lt;br /&gt;
:::when its spiral course is restored perfectly, and that which follows is joined to that which precedes, he reads around the staff, and &lt;br /&gt;
:::so discovers the continuity of the message. And the parchment, like the staff, is called scytale, as the thing measured bears the name &lt;br /&gt;
:::of the measure.” —Plutarch, Lives (Lysander 19), ed. Bernadotte Perrin.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Scytale&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Plutarch#Parallel_Lives&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/LysanderScytale&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Caesar Wheel&#039;&#039;&#039;===&lt;br /&gt;
:: Another early form of ciphering was the Caesar wheel, also known as the Caesar Cipher.. Named after Julius Caesar  (100 B.C. – 44 B.C.) who was documented as having used it. &lt;br /&gt;
&lt;br /&gt;
This was essentially two disks of difference sizes. The smaller one on top of the larger one, joined in the center in such a . Each wheel would then be sectioned along its edge. Each of these sections had a letter of the alphabet.  The key is set in advance such that both the sender and receiver what it is. The key was nothing more than a number which indicated the letter shift needed to encode or decode a message.&lt;br /&gt;
&lt;br /&gt;
For example.. &lt;br /&gt;
&lt;br /&gt;
:::” If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet, &lt;br /&gt;
:::that not a word could be made out. “If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter &lt;br /&gt;
:::of the alphabet, namely D, for A, and so with the others.” —Suetonius, Life of Julius Caesar &lt;br /&gt;
&lt;br /&gt;
This is the easiest of the substitution ciphers. For example , it can be easily reverse engineered without having to know the key used. You’d just have to know the frequency of letters used in the language you. For example, in English if you know that “E” ,“T” and “A” were the most used letters in the alphabet you’d be well on your way to breaking the code. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Caesar_cipher&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Letter_frequency&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://www.scholastic.com/spyx/pdfs/Cipher_Wheel.pdf&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Jefferson Disk&#039;&#039;&#039; ===&lt;br /&gt;
::The Caesar Cipher would be the inspiration for Thomas Jefferson many centuries later. In 1795, Jefferson developed a cipher system with used a series of 36 wheels (or disks) positioned along a central spinal. Each wheel had on it’s edge a series of letters. Each disk is numbered and can be removed from the spinal, then put back on in any order. The order of the disks is the key.&lt;br /&gt;
&lt;br /&gt;
How this works is this… Both the sender and the receiver must have the disks in the same order. For example, for a 10 disk version might have a key like this 2,4,6,8,10,1,3,5,7,9.   From there, the sender would arrange the wheels to spell out the message they wanted along one row. Then finding another row, copy the message from another row and that would be the coded message that would be sent. Since the receiver would have the disks in the same order, all they’d have to do would be spell out the coded message on the individual wheels then rotate them all at once until the sender’s message was shown. &lt;br /&gt;
&lt;br /&gt;
Though Jefferson invented the encryption, it didn’t catch on until later when it was also independently invented by Étienne Bazeries (French Cryptanalyst) about a century later. The Bazieries Cylinder was an improvement on the Jefferson Disk. With even further improvements, this would become the basis for the encoding system (M-94)  the U.S. Army used from 1932- 1942. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Jefferson_disk&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Bazeries_Cylinder&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://www.monticello.org:8081/wheelcipher/wheelcipher.html&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
=== Rob Klaers, Billy Andersen, &amp;amp; Matt Mortiz ===&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5690</id>
		<title>ITCwiki:Current events</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5690"/>
		<updated>2012-04-25T01:35:18Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;A Brief History of Cypher text&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Scytale&#039;&#039;&#039; ===&lt;br /&gt;
::One of the earliest forms of Cryptography is the scytale. (sounds like “Italy” in pronunciation). &lt;br /&gt;
The earliest known reference to this type of coded message dates back to the 7th Century B.C. Though it was mentioned that early, the references did not make clear on just how this method of cryptography worked. That is until Plutarch (a Greek historian, biographer, essayist who lived approx 46-120 A.D.) explained the method in his books “Parallel Lives”, in particular Volume 19 which talked about the Spartan General Lysander and how he communicated with his army.  &lt;br /&gt;
&lt;br /&gt;
Plutarch goes into detail on just how this method works..As shown in this quote from the aforementioned volume, &lt;br /&gt;
&lt;br /&gt;
:::“The dispatch-scroll is of the following character. When the ephors send out an admiral or a general, they make two round pieces of &lt;br /&gt;
:::wood exactly alike in length and thickness, so that each corresponds to the other in its dimensions, and keep one themselves, while &lt;br /&gt;
:::they give the other to their envoy. These pieces of wood they call scytalae. Whenever, then, they wish to send some secret and &lt;br /&gt;
:::important message, they make a scroll of parchment long and narrow, like a leathern strap, and wind it round their scytale, leaving no &lt;br /&gt;
:::vacant space thereon, but covering its surface all round with the parchment. After doing this, they write what they wish on the &lt;br /&gt;
:::parchment, just as it lies wrapped about the scytale; and when they have written their message, they take the parchment off and send &lt;br /&gt;
:::it, without the piece of wood, to the commander. He, when he has received it, cannot otherwise get any meaning out of it,--since the &lt;br /&gt;
:::letters have no connection, but are disarranged,--unless he takes his own scytale and winds the strip of parchment about it, so that, &lt;br /&gt;
:::when its spiral course is restored perfectly, and that which follows is joined to that which precedes, he reads around the staff, and &lt;br /&gt;
:::so discovers the continuity of the message. And the parchment, like the staff, is called scytale, as the thing measured bears the name &lt;br /&gt;
:::of the measure.” —Plutarch, Lives (Lysander 19), ed. Bernadotte Perrin.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Scytale&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Plutarch#Parallel_Lives&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/LysanderScytale&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Caesar Wheel&#039;&#039;&#039;===&lt;br /&gt;
:: Another early form of ciphering was the Caesar wheel, also known as the Caesar Cipher.. Named after Julius Caesar  (100 B.C. – 44 B.C.) who was documented as having used it. &lt;br /&gt;
&lt;br /&gt;
This was essentially two disks of difference sizes. The smaller one on top of the larger one, joined in the center in such a . Each wheel would then be sectioned along its edge. Each of these sections had a letter of the alphabet.  The key is set in advance such that both the sender and receiver what it is. The key was nothing more than a number which indicated the letter shift needed to encode or decode a message.&lt;br /&gt;
&lt;br /&gt;
For example.. &lt;br /&gt;
&lt;br /&gt;
:::” If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet, &lt;br /&gt;
:::that not a word could be made out. “If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter &lt;br /&gt;
:::of the alphabet, namely D, for A, and so with the others.” —Suetonius, Life of Julius Caesar &lt;br /&gt;
&lt;br /&gt;
This is the easiest of the substitution ciphers. For example , it can be easily reverse engineered without having to know the key used. You’d just have to know the frequency of letters used in the language you. For example, in English if you know that “E” ,“T” and “A” were the most used letters in the alphabet you’d be well on your way to breaking the code. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Caesar_cipher&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Letter_frequency&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://www.scholastic.com/spyx/pdfs/Cipher_Wheel.pdf&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Jefferson Disk&#039;&#039;&#039; ===&lt;br /&gt;
::The Caesar Cipher would be the inspiration for Thomas Jefferson many centuries later. In 1795, Jefferson developed a cipher system with used a series of 36 wheels (or disks) positioned along a central spinal. Each wheel had on it’s edge a series of letters. Each disk is numbered and can be removed from the spinal, then put back on in any order. The order of the disks is the key.&lt;br /&gt;
&lt;br /&gt;
How this works is this… Both the sender and the receiver must have the disks in the same order. For example, for a 10 disk version might have a key like this 2,4,6,8,10,1,3,5,7,9.   From there, the sender would arrange the wheels to spell out the message they wanted along one row. Then finding another row, copy the message from another row and that would be the coded message that would be sent. Since the receiver would have the disks in the same order, all they’d have to do would be spell out the coded message on the individual wheels then rotate them all at once until the sender’s message was shown. &lt;br /&gt;
&lt;br /&gt;
Though Jefferson invented the encryption, it didn’t catch on until later when it was also independently invented by Étienne Bazeries (French Cryptanalyst) about a century later. The Bazieries Cylinder was an improvement on the Jefferson Disk. With even further improvements, this would become the basis for the encoding system (M-94)  the U.S. Army used from 1932- 1942. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Jefferson_disk&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Bazeries_Cylinder&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://www.monticello.org:8081/wheelcipher/wheelcipher.html&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
=== Rob Klaers, Billy Andersen, &amp;amp; Matt Mortiz ===&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5689</id>
		<title>ITCwiki:Current events</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5689"/>
		<updated>2012-04-25T01:33:44Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;A Brief History of Cypher text&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Scytale&#039;&#039;&#039; ===&lt;br /&gt;
::One of the earliest forms of Cryptography is the scytale. (sounds like “Italy” in pronunciation). &lt;br /&gt;
The earliest known reference to this type of coded message dates back to the 7th Century B.C. Though it was mentioned that early, the references did not make clear on just how this method of cryptography worked. That is until Plutarch (a Greek historian, biographer, essayist who lived approx 46-120 A.D.) explained the method in his books “Parallel Lives”, in particular Volume 19 which talked about the Spartan General Lysander and how he communicated with his army.  &lt;br /&gt;
&lt;br /&gt;
Plutarch goes into detail on just how this method works..As shown in this quote from the aforementioned volume, &lt;br /&gt;
&lt;br /&gt;
“The dispatch-scroll is of the following character. When the ephors send out an admiral or a general, they make two round pieces of wood exactly alike in length and thickness, so that each corresponds to the other in its dimensions, and keep one themselves, while they give the other to their envoy. These pieces of wood they call scytalae. Whenever, then, they wish to send some secret and important message, they make a scroll of parchment long and narrow, like a leathern strap, and wind it round their scytale, leaving no vacant space thereon, but covering its surface all round with the parchment. After doing this, they write what they wish on the parchment, just as it lies wrapped about the scytale; and when they have written their message, they take the parchment off and send it, without the piece of wood, to the commander. He, when he has received it, cannot otherwise get any meaning out of it,--since the letters have no connection, but are disarranged,--unless he takes his own scytale and winds the strip of parchment about it, so that, when its spiral course is restored perfectly, and that which follows is joined to that which precedes, he reads around the staff, and so discovers the continuity of the message. And the parchment, like the staff, is called scytale, as the thing measured bears the name of the measure.” —Plutarch, Lives (Lysander 19), ed. Bernadotte Perrin.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Scytale&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Plutarch#Parallel_Lives&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/LysanderScytale&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Caesar Wheel&#039;&#039;&#039;===&lt;br /&gt;
:: Another early form of ciphering was the Caesar wheel, also known as the Caesar Cipher.. Named after Julius Caesar  (100 B.C. – 44 B.C.) who was documented as having used it. &lt;br /&gt;
&lt;br /&gt;
This was essentially two disks of difference sizes. The smaller one on top of the larger one, joined in the center in such a . Each wheel would then be sectioned along its edge. Each of these sections had a letter of the alphabet.  The key is set in advance such that both the sender and receiver what it is. The key was nothing more than a number which indicated the letter shift needed to encode or decode a message.&lt;br /&gt;
&lt;br /&gt;
For example.. &lt;br /&gt;
&lt;br /&gt;
” If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet, that not a word could be made out. “If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter of the alphabet, namely D, for A, and so with the others.”&lt;br /&gt;
—Suetonius, Life of Julius Caesar &lt;br /&gt;
&lt;br /&gt;
This is the easiest of the substitution ciphers. For example , it can be easily reverse engineered without having to know the key used. You’d just have to know the frequency of letters used in the language you. For example, in English if you know that “E” ,“T” and “A” were the most used letters in the alphabet you’d be well on your way to breaking the code. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Caesar_cipher&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Letter_frequency&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://www.scholastic.com/spyx/pdfs/Cipher_Wheel.pdf&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Jefferson Disk&#039;&#039;&#039; ===&lt;br /&gt;
::The Caesar Cipher would be the inspiration for Thomas Jefferson many centuries later. In 1795, Jefferson developed a cipher system with used a series of 36 wheels (or disks) positioned along a central spinal. Each wheel had on it’s edge a series of letters. Each disk is numbered and can be removed from the spinal, then put back on in any order. The order of the disks is the key.&lt;br /&gt;
&lt;br /&gt;
How this works is this… Both the sender and the receiver must have the disks in the same order. For example, for a 10 disk version might have a key like this 2,4,6,8,10,1,3,5,7,9.   From there, the sender would arrange the wheels to spell out the message they wanted along one row. Then finding another row, copy the message from another row and that would be the coded message that would be sent. Since the receiver would have the disks in the same order, all they’d have to do would be spell out the coded message on the individual wheels then rotate them all at once until the sender’s message was shown. &lt;br /&gt;
&lt;br /&gt;
Though Jefferson invented the encryption, it didn’t catch on until later when it was also independently invented by Étienne Bazeries (French Cryptanalyst) about a century later. The Bazieries Cylinder was an improvement on the Jefferson Disk. With even further improvements, this would become the basis for the encoding system (M-94)  the U.S. Army used from 1932- 1942. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Jefferson_disk&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Bazeries_Cylinder&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://www.monticello.org:8081/wheelcipher/wheelcipher.html&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
=== Rob Klaers, Billy Andersen, &amp;amp; Matt Mortiz ===&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5688</id>
		<title>ITCwiki:Current events</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5688"/>
		<updated>2012-04-25T01:29:40Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;A Brief History of Cypher text&#039;&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Scytale&#039;&#039;&#039; ===&lt;br /&gt;
::One of the earliest forms of Cryptography is the scytale. (sounds like “Italy” in pronunciation). &lt;br /&gt;
The earliest known reference to this type of coded message dates back to the 7th Century B.C. Though it was mentioned that early, the references did not make clear on just how this method of cryptography worked. That is until Plutarch (a Greek historian, biographer, essayist who lived approx 46-120 A.D.) explained the method in his books “Parallel Lives”, in particular Volume 19 which talked about the Spartan General Lysander and how he communicated with his army.  &lt;br /&gt;
&lt;br /&gt;
Plutarch goes into detail on just how this method works..As shown in this quote from the aforementioned volume, &lt;br /&gt;
&lt;br /&gt;
“The dispatch-scroll is of the following character. When the ephors send out an admiral or a general, they make two round pieces of wood exactly alike in length and thickness, so that each corresponds to the other in its dimensions, and keep one themselves, while they give the other to their envoy. These pieces of wood they call scytalae. Whenever, then, they wish to send some secret and important message, they make a scroll of parchment long and narrow, like a leathern strap, and wind it round their scytale, leaving no vacant space thereon, but covering its surface all round with the parchment. After doing this, they write what they wish on the parchment, just as it lies wrapped about the scytale; and when they have written their message, they take the parchment off and send it, without the piece of wood, to the commander. He, when he has received it, cannot otherwise get any meaning out of it,--since the letters have no connection, but are disarranged,--unless he takes his own scytale and winds the strip of parchment about it, so that, when its spiral course is restored perfectly, and that which follows is joined to that which precedes, he reads around the staff, and so discovers the continuity of the message. And the parchment, like the staff, is called scytale, as the thing measured bears the name of the measure.” —Plutarch, Lives (Lysander 19), ed. Bernadotte Perrin.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Scytale&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Plutarch#Parallel_Lives&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/LysanderScytale&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Caesar Wheel&#039;&#039;&#039;===&lt;br /&gt;
:: Another early form of ciphering was the Caesar wheel, also known as the Caesar Cipher.. Named after Julius Caesar  (100 B.C. – 44 B.C.) who was documented as having used it. &lt;br /&gt;
&lt;br /&gt;
This was essentially two disks of difference sizes. The smaller one on top of the larger one, joined in the center in such a . Each wheel would then be sectioned along its edge. Each of these sections had a letter of the alphabet.  The key is set in advance such that both the sender and receiver what it is. The key was nothing more than a number which indicated the letter shift needed to encode or decode a message.&lt;br /&gt;
&lt;br /&gt;
For example.. &lt;br /&gt;
&lt;br /&gt;
” If he had anything confidential to say, he wrote it in cipher, that is, by so changing the order of the letters of the alphabet, that not a word could be made out. “If anyone wishes to decipher these, and get at their meaning, he must substitute the fourth letter of the alphabet, namely D, for A, and so with the others.”&lt;br /&gt;
—Suetonius, Life of Julius Caesar &lt;br /&gt;
&lt;br /&gt;
This is the easiest of the substitution ciphers. For example , it can be easily reverse engineered without having to know the key used. You’d just have to know the frequency of letters used in the language you. For example, in English if you know that “E” ,“T” and “A” were the most used letters in the alphabet you’d be well on your way to breaking the code. &lt;br /&gt;
&lt;br /&gt;
References:&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Caesar_cipher&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://en.wikipedia.org/wiki/Letter_frequency&#039;&#039;&lt;br /&gt;
::::	&#039;&#039;http://www.scholastic.com/spyx/pdfs/Cipher_Wheel.pdf&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Performing the Installation stages&#039;&#039;&#039; ===&lt;br /&gt;
::*	Start installation&lt;br /&gt;
::*	Choosing language, keyboard and storage type&lt;br /&gt;
::*	Selecting hostname, time zone &amp;amp; root password&lt;br /&gt;
::*	Configuring storage devices&lt;br /&gt;
::*	Configuring the boot loader&lt;br /&gt;
::*	Selecting and installing packages&lt;br /&gt;
::*	Completing first boot wizard&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
=== Rob Klaers, Billy Andersen, &amp;amp; Matt Mortiz ===&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5687</id>
		<title>ITCwiki:Current events</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5687"/>
		<updated>2012-04-25T01:21:04Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;A Brief History of Cypher text&#039;&#039;&#039; ==&lt;br /&gt;
::^	Preparation and installation of Fedora Linux using good practices.&lt;br /&gt;
::^	Outline the structure of Linux interface.&lt;br /&gt;
::^	Enter basic shell commands and find command documentation.&lt;br /&gt;
::^	Properly shutdown the Linux OS&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Preparing for Installation&#039;&#039;&#039; ===&lt;br /&gt;
::*	Hardware Compatibility List (HCL)&lt;br /&gt;
::*	The minimum requirement s for Fedora 13 Linux can be found :&lt;br /&gt;
::::	&#039;&#039;http://docs.fedoraproject.org&#039;&#039;&lt;br /&gt;
::*	Preinstallation checklist&lt;br /&gt;
::*	A system checklist that can compared against the HCL during installation. &lt;br /&gt;
::*	Information will include :&lt;br /&gt;
:::•	CPU (Type /MHz)&lt;br /&gt;
:::•	RAM (Mb)&lt;br /&gt;
:::•	Keyboard model and layout&lt;br /&gt;
:::•	Hard Disk size (MB)&lt;br /&gt;
:::•	Host Name&lt;br /&gt;
:::•	Network card IP configuration&lt;br /&gt;
:::•	IP address, Netmask Gatway, DNS servers, and DHCP&lt;br /&gt;
:::•	Linux Packages to install &lt;br /&gt;
:::•	Video Card Make and Model&lt;br /&gt;
:::•	Video Card RAM (Mb)&lt;br /&gt;
:::•	Monitor make and model&lt;br /&gt;
:::•	Monitor Vsync and HSync ranges&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Installation Methods&#039;&#039;&#039;===&lt;br /&gt;
::*	FTP server across network&lt;br /&gt;
::*	HTTP web server across network&lt;br /&gt;
::*	NFS server across network&lt;br /&gt;
::*	SMB (SAMBA) server across network&lt;br /&gt;
::*	Packages located on HD&lt;br /&gt;
::*	CD-ROM or bootable DVD media&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Performing the Installation stages&#039;&#039;&#039; ===&lt;br /&gt;
::*	Start installation&lt;br /&gt;
::*	Choosing language, keyboard and storage type&lt;br /&gt;
::*	Selecting hostname, time zone &amp;amp; root password&lt;br /&gt;
::*	Configuring storage devices&lt;br /&gt;
::*	Configuring the boot loader&lt;br /&gt;
::*	Selecting and installing packages&lt;br /&gt;
::*	Completing first boot wizard&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
=== Rob Klaers, Billy Andersen, &amp;amp; Matt Mortiz ===&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5686</id>
		<title>ITCwiki:Current events</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5686"/>
		<updated>2012-04-25T01:19:17Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Chapter 2 Linux Installation and Usage&#039;&#039;&#039; ==&lt;br /&gt;
::^	Preparation and installation of Fedora Linux using good practices.&lt;br /&gt;
::^	Outline the structure of Linux interface.&lt;br /&gt;
::^	Enter basic shell commands and find command documentation.&lt;br /&gt;
::^	Properly shutdown the Linux OS&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Preparing for Installation&#039;&#039;&#039; ===&lt;br /&gt;
::*	Hardware Compatibility List (HCL)&lt;br /&gt;
::*	The minimum requirement s for Fedora 13 Linux can be found :&lt;br /&gt;
::::	&#039;&#039;http://docs.fedoraproject.org&#039;&#039;&lt;br /&gt;
::*	Preinstallation checklist&lt;br /&gt;
::*	A system checklist that can compared against the HCL during installation. &lt;br /&gt;
::*	Information will include :&lt;br /&gt;
:::•	CPU (Type /MHz)&lt;br /&gt;
:::•	RAM (Mb)&lt;br /&gt;
:::•	Keyboard model and layout&lt;br /&gt;
:::•	Hard Disk size (MB)&lt;br /&gt;
:::•	Host Name&lt;br /&gt;
:::•	Network card IP configuration&lt;br /&gt;
:::•	IP address, Netmask Gatway, DNS servers, and DHCP&lt;br /&gt;
:::•	Linux Packages to install &lt;br /&gt;
:::•	Video Card Make and Model&lt;br /&gt;
:::•	Video Card RAM (Mb)&lt;br /&gt;
:::•	Monitor make and model&lt;br /&gt;
:::•	Monitor Vsync and HSync ranges&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Installation Methods&#039;&#039;&#039;===&lt;br /&gt;
::*	FTP server across network&lt;br /&gt;
::*	HTTP web server across network&lt;br /&gt;
::*	NFS server across network&lt;br /&gt;
::*	SMB (SAMBA) server across network&lt;br /&gt;
::*	Packages located on HD&lt;br /&gt;
::*	CD-ROM or bootable DVD media&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Performing the Installation stages&#039;&#039;&#039; ===&lt;br /&gt;
::*	Start installation&lt;br /&gt;
::*	Choosing language, keyboard and storage type&lt;br /&gt;
::*	Selecting hostname, time zone &amp;amp; root password&lt;br /&gt;
::*	Configuring storage devices&lt;br /&gt;
::*	Configuring the boot loader&lt;br /&gt;
::*	Selecting and installing packages&lt;br /&gt;
::*	Completing first boot wizard&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
=== Rob Klaers, Billy Andersen, &amp;amp; Matt Mortiz ===&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5685</id>
		<title>ITCwiki:Current events</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5685"/>
		<updated>2012-04-25T01:18:47Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Chapter 2 Linux Installation and Usage&#039;&#039;&#039; ==&lt;br /&gt;
::^	Preparation and installation of Fedora Linux using good practices.&lt;br /&gt;
::^	Outline the structure of Linux interface.&lt;br /&gt;
::^	Enter basic shell commands and find command documentation.&lt;br /&gt;
::^	Properly shutdown the Linux OS&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Preparing for Installation&#039;&#039;&#039; ===&lt;br /&gt;
::*	Hardware Compatibility List (HCL)&lt;br /&gt;
::*	The minimum requirement s for Fedora 13 Linux can be found :&lt;br /&gt;
::::	&#039;&#039;http://docs.fedoraproject.org&#039;&#039;&lt;br /&gt;
::*	Preinstallation checklist&lt;br /&gt;
::*	A system checklist that can compared against the HCL during installation. &lt;br /&gt;
::*	Information will include :&lt;br /&gt;
:::•	CPU (Type /MHz)&lt;br /&gt;
:::•	RAM (Mb)&lt;br /&gt;
:::•	Keyboard model and layout&lt;br /&gt;
:::•	Hard Disk size (MB)&lt;br /&gt;
:::•	Host Name&lt;br /&gt;
:::•	Network card IP configuration&lt;br /&gt;
:::•	IP address, Netmask Gatway, DNS servers, and DHCP&lt;br /&gt;
:::•	Linux Packages to install &lt;br /&gt;
:::•	Video Card Make and Model&lt;br /&gt;
:::•	Video Card RAM (Mb)&lt;br /&gt;
:::•	Monitor make and model&lt;br /&gt;
:::•	Monitor Vsync and HSync ranges&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Installation Methods&#039;&#039;&#039;===&lt;br /&gt;
::*	FTP server across network&lt;br /&gt;
::*	HTTP web server across network&lt;br /&gt;
::*	NFS server across network&lt;br /&gt;
::*	SMB (SAMBA) server across network&lt;br /&gt;
::*	Packages located on HD&lt;br /&gt;
::*	CD-ROM or bootable DVD media&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Performing the Installation stages&#039;&#039;&#039; ===&lt;br /&gt;
::*	Start installation&lt;br /&gt;
::*	Choosing language, keyboard and storage type&lt;br /&gt;
::*	Selecting hostname, time zone &amp;amp; root password&lt;br /&gt;
::*	Configuring storage devices&lt;br /&gt;
::*	Configuring the boot loader&lt;br /&gt;
::*	Selecting and installing packages&lt;br /&gt;
::*	Completing first boot wizard&lt;br /&gt;
&lt;br /&gt;
==Credit==&lt;br /&gt;
=== All info compiled, edited and coded by : Rob Klaers, Billy Andersen, &amp;amp; Matt Mortiz ===&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=User:Klae0010&amp;diff=5684</id>
		<title>User:Klae0010</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=User:Klae0010&amp;diff=5684"/>
		<updated>2012-04-25T00:46:13Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Here is a list of my wiki pages.. &lt;br /&gt;
&lt;br /&gt;
Chapter 5 Linux&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Chapter 2 Linux&lt;br /&gt;
Chapter 8 Linux &lt;br /&gt;
Linux+ Giude to Certificationn, 3rd Ed. &lt;br /&gt;
&lt;br /&gt;
Service project for CCNA Security.&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=User:Klae0010&amp;diff=5683</id>
		<title>User:Klae0010</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=User:Klae0010&amp;diff=5683"/>
		<updated>2012-04-25T00:44:27Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: Blanked the page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=User:Klae0010&amp;diff=5682</id>
		<title>User:Klae0010</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=User:Klae0010&amp;diff=5682"/>
		<updated>2012-04-25T00:44:10Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: /* Wiki page credit */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Chpt 5 Study Guide&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Boot Process *(pg. 240) ==  &lt;br /&gt;
	&#039;&#039;System power &amp;gt; CPU looks for BIOS &amp;gt; CPU Runs Bios&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
::BIOS checks for new hardware, configure hardware, and looks for boot sector.This is when the BIOS finds the boot loader in &lt;br /&gt;
::the boot sector.Boot loader takes over from BIOS. If a multistage loader is available, a secondary loader is searched for. &lt;br /&gt;
::Finally, the boot loader finds the kernel, loads it into memory and then executes it. Once the LINUX kernel takes over, it then &lt;br /&gt;
::begins to initial devices, mounting root partition and other such tasks.The initial program is also started at this stage.It &lt;br /&gt;
::gets a process ID of 1 because it’s the first program run on the system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Retrieving Information about the boot process *(pg. 239)===&lt;br /&gt;
:	Certain information about the Linux kernel and module log info can be found in the kernel ring buffer. &lt;br /&gt;
:	This info is displayed during the boot process, but is shown too fast to be read. &lt;br /&gt;
:	To access this info type the following command..&lt;br /&gt;
::	  &#039;&#039;&#039;#dmesg | less&#039;&#039;&#039; &lt;br /&gt;
::	  &#039;&#039;&#039;#dmesg &amp;gt; boot.messages&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
=== 	Locating and Interpreting Boot Messages (pg. 239) ===&lt;br /&gt;
:	Use &#039;&#039;less&#039;&#039; and it’s search functions&lt;br /&gt;
:	Look for hardware type names&lt;br /&gt;
:	Look for hardware chipset names&lt;br /&gt;
:	Study output from a working system&lt;br /&gt;
&lt;br /&gt;
== 	Installing Boot Loaders (pg. 226) ==&lt;br /&gt;
::	The master boot record (MBR) contains a partition table and a boot loader (aka &#039;&#039;boot manager&#039;&#039;). The boot loader is &lt;br /&gt;
:: software which the BIOS reads and executes when the system begins to boot&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 	Two main boot loaders for Linux ===&lt;br /&gt;
====	&#039;&#039;&#039;LILO&#039;&#039;&#039;  &#039;&#039;(Linux Loader)&#039;&#039; (pg. 228)====&lt;br /&gt;
::	&#039;&#039;Once the default boot loader.&#039;&#039;&lt;br /&gt;
::	 &#039;&#039;Slowly being overtaken by GRUB.&#039;&#039; &lt;br /&gt;
::	&#039;&#039;Small, and useful.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
::	&#039;&#039;Can be configured using the &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; file.&#039;&#039;&lt;br /&gt;
::	Which is broken into two main sections :&lt;br /&gt;
	&lt;br /&gt;
:: &#039;&#039;&#039;Global options&#039;&#039;&#039;  &lt;br /&gt;
:::	Boot loader location&lt;br /&gt;
:::	Default stanza&lt;br /&gt;
:::	Boot prompt &lt;br /&gt;
:::	Boot timeout&lt;br /&gt;
:: &#039;&#039;&#039;Per-Image&#039;&#039;&#039; &lt;br /&gt;
:::	Kept in sections known  as &#039;&#039;stanzas&#039;&#039;. &lt;br /&gt;
:::	&#039;&#039;Can also be further separated depending on if they’re for a kernel or OS.&#039;&#039; &lt;br /&gt;
:::	Linux Boot Image&lt;br /&gt;
:::	Non-Linux Boot Partition&lt;br /&gt;
:::	OS Label&lt;br /&gt;
:::	RAM Disk &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====	&#039;&#039;&#039;GRUB&#039;&#039;&#039;  &#039;&#039;(Grand Unified Boot Loader)&#039;&#039; (pg. 233) ====&lt;br /&gt;
::	&#039;&#039;Has taken over as default boot loader for many LINUX distributions&#039;&#039;&lt;br /&gt;
::	&#039;&#039;Offers more configurations than LILO&#039;&#039;&lt;br /&gt;
:::	GRUB has some ‘quirks’&lt;br /&gt;
::::	Unlike Linux, GRUB numbers drives. &lt;br /&gt;
::::	Instead of &#039;&#039;&#039;/dev/hda&#039;&#039;&#039; .. It would be &#039;&#039;&#039;/dev/hd0&#039;&#039;&#039; &lt;br /&gt;
::::	Doesn’t distinguish between PATA, SATA, or SCSI drives.&lt;br /&gt;
::::	GRUB also numbers partitions on a drive starting with &#039;&#039;&#039;0&#039;&#039;&#039;, instead of &#039;&#039;&#039;1&#039;&#039;&#039;&lt;br /&gt;
:::::	&#039;&#039;So partition 1 on drive 1 would look like this &#039;&#039;&#039;(hd0,0)&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
:::::	&#039;&#039;Floppy devices are referred to as &#039;&#039;&#039;(fd0)&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
::	&#039;&#039;&#039;Global Options&#039;&#039;&#039;&lt;br /&gt;
:::	Default OS&lt;br /&gt;
:::	Timeout&lt;br /&gt;
:::	Background Graphic&lt;br /&gt;
::	&#039;&#039;&#039;Per Image Options&#039;&#039;&#039;&lt;br /&gt;
:::	Title&lt;br /&gt;
:::	GRUB root&lt;br /&gt;
:::	Kernel Specification&lt;br /&gt;
&lt;br /&gt;
== 	Runlevels And Initialization Process (pg. 241) ==&lt;br /&gt;
:	Linux relies on runlevels to determine which features are available. &lt;br /&gt;
:	Run levels are labels 0 thru 6. Each one being assigned to a set of services that should be active. &lt;br /&gt;
:	Understanding the purpose of runlevels makes for identifying services that are active easier. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 	Checking runlevel ===&lt;br /&gt;
: 	Generally done prior to changing or to check status if something isn’t working&lt;br /&gt;
:	This is done by inspecting the &#039;&#039;&#039;/etc/initab&#039;&#039;&#039; file with the &#039;&#039;less&#039;&#039; command or opening it in an editor.&lt;br /&gt;
&lt;br /&gt;
=== 	Managing Runlevels (pg. 245) ===&lt;br /&gt;
:	&#039;&#039;&#039;Chkconfig&#039;&#039;&#039; &lt;br /&gt;
::	Lists the services and their runlevels.&lt;br /&gt;
:::	Ex. Chkconfig –list &lt;br /&gt;
:	&#039;&#039;&#039;ntsysv&#039;&#039;&#039; &lt;br /&gt;
::	Used mainly on Red Hat&lt;br /&gt;
::	Interactive text tool&lt;br /&gt;
::	Use your arrow  keys to select a service. space bar to toggle the service on or off. &lt;br /&gt;
::      Use the &#039;&#039;&#039;--level&#039;&#039;&#039; option to select other or multiple runlevels.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== 	Runlevels (pg. 242) ===&lt;br /&gt;
:	&#039;&#039;&#039;0&#039;&#039;&#039; ... &#039;&#039;Transitional, Shuts down the system.&#039;&#039; &lt;br /&gt;
::&#039;&#039;Should completely power down the system.&#039;&#039;&lt;br /&gt;
:	&#039;&#039;&#039;1&#039;&#039;&#039;, &#039;&#039;&#039;s&#039;&#039;&#039;, or &#039;&#039;&#039;S&#039;&#039;&#039; ...  &#039;&#039;Single user mode.&#039;&#039;&lt;br /&gt;
::&#039;&#039;Used for low-level system maintenance impaired by normal system operation.&#039;&#039;&lt;br /&gt;
:	&#039;&#039;&#039;2&#039;&#039;&#039; ... &#039;&#039;Full muti-user mode with a graphical login.&#039;&#039;&lt;br /&gt;
::&#039;&#039;Used on Debian&#039;&#039;  &lt;br /&gt;
:	&#039;&#039;&#039;3&#039;&#039;&#039; ... &#039;&#039;Full multi-user mode with a console login.&#039;&#039;&lt;br /&gt;
::&#039;&#039;Used on Fedora, Mandriva,  Red Hat, and most other distributions.&#039;&#039; &lt;br /&gt;
:	&#039;&#039;&#039;4&#039;&#039;&#039; ... &#039;&#039;Undefined by default&#039;&#039;&lt;br /&gt;
::&#039;&#039;Used for customization&#039;&#039;&lt;br /&gt;
:	&#039;&#039;&#039;5&#039;&#039;&#039; ...&#039;&#039; Same as runlevel 3 with the addition of having X run with XDM (graphical) login.&#039;&#039;&lt;br /&gt;
:	&#039;&#039;&#039;6&#039;&#039;&#039; ...&#039;&#039;Used to reboot the system.&#039;&#039;&lt;br /&gt;
::&#039;&#039;Also a transitional runlevel.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== 	Determining Current Runlevel ===&lt;br /&gt;
:	Once system is up and running runlevel info can be checked by entering : &lt;br /&gt;
::	  &#039;&#039;&#039; # runlevel&#039;&#039;&#039; &lt;br /&gt;
::: &#039;&#039;&#039;N 2&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
::  &#039;&#039;The first character is the previous runlevel.&#039;&#039; &lt;br /&gt;
:: &#039;&#039;&#039;&#039;&#039;N&#039;&#039;&#039; = system hasn’t changed runlevel since starting&#039;&#039;&lt;br /&gt;
:: &#039;&#039;&#039;&#039;&#039;2&#039;&#039;&#039;	=  is the current runlevel&#039;&#039;&lt;br /&gt;
=== 	Changing runlevels on a running system ===&lt;br /&gt;
:	This can be done with the init (or telinit), shutdown, halt, reboot, or poweroff commands.&lt;br /&gt;
&lt;br /&gt;
::&#039;&#039;shutdown [option] [time] “[Message]” &#039;&#039;      	&lt;br /&gt;
::: ex. &#039;&#039;&#039;shutdown –r +15&#039;&#039;&#039; “System going down for maintenance.”   &lt;br /&gt;
&lt;br /&gt;
:Options  &lt;br /&gt;
:: &#039;&#039;&#039;-h&#039;&#039;&#039; ...Halt or power off the computer. (runlevel 0)  &lt;br /&gt;
:: &#039;&#039;&#039;-r&#039;&#039;&#039; ...Reboots the system. (runlevel 6)   &lt;br /&gt;
:: &#039;&#039;&#039;-c&#039;&#039;&#039; ...Cancels a scheduled shutdown.  Time   hh:mm		&lt;br /&gt;
:::&#039;&#039; Tells the computer when to run the shutdown command in a 24 hour format.&#039;&#039;   &lt;br /&gt;
:: &#039;&#039;&#039;+ t&#039;&#039;&#039; ...t = time to shutdown in minutes.   &lt;br /&gt;
:: &#039;&#039;&#039;Message&#039;&#039;&#039; ...Adds a message at the end of the command&lt;br /&gt;
&lt;br /&gt;
== 	Runlevel Services (pg.243) ==&lt;br /&gt;
&lt;br /&gt;
===	Two main ways to affect what programs run as you enter a new runlevel.===&lt;br /&gt;
&lt;br /&gt;
::	&#039;&#039;&#039;/etc/inittab&#039;&#039;&#039; &lt;br /&gt;
:::	&#039;&#039;Id:runlevels:action:process&#039;&#039; &lt;br /&gt;
:::	Identification code &lt;br /&gt;
:::	Consists of a sequence of 1-4 characters to identify its function&lt;br /&gt;
:::	Applicable runlevels &lt;br /&gt;
:::	List of runlevels for which this entry applies.&lt;br /&gt;
:::	Action to be taken&lt;br /&gt;
:::	Tells init how to treat the function.&lt;br /&gt;
:::	Process to run&lt;br /&gt;
:::	Process to run for this entry.&lt;br /&gt;
:::	Includes options and arguments&lt;br /&gt;
&lt;br /&gt;
::	&#039;&#039;&#039;SysV&#039;&#039;&#039; (pg.244)&lt;br /&gt;
:::	Controls what startup scrips start or stop services depending on the parameters that are passed.&lt;br /&gt;
:::&#039;&#039;&#039;S&#039;&#039;&#039; ...&#039;&#039;rc passes the start parameter to all scrips that begin with the letter &#039;&#039;&#039;S&#039;&#039;&#039;.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;&#039;K&#039;&#039;&#039; ...&#039;&#039;rc passes the stop services to all scrips that begin with the letter &#039;&#039;&#039;K&#039;&#039;&#039;.&#039;&#039;&lt;br /&gt;
== Vi (pg. 250) ==&lt;br /&gt;
	&lt;br /&gt;
:	&#039;&#039;First  full-screen text editor built for linux.&#039;&#039;&lt;br /&gt;
:	&#039;&#039;Used for a emergency recovery situations.&#039;&#039;&lt;br /&gt;
:	&#039;&#039;Small and simple.&#039;&#039;&lt;br /&gt;
:	&#039;&#039;Can fit on a floppy disk.&#039;&#039; &lt;br /&gt;
:	&#039;&#039;3 modes of operation.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
=== 	Vi Modes ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
; &#039;&#039;&#039;Command mode&#039;&#039;&#039; &lt;br /&gt;
: Accepts single letter commands.&lt;br /&gt;
:	&#039;&#039;&#039;i&#039;&#039;&#039; and a = enter insert mode&lt;br /&gt;
:	&#039;&#039;&#039;o&#039;&#039;&#039; =opens a line below the current one.&lt;br /&gt;
&lt;br /&gt;
; &#039;&#039;&#039;Ex mode&#039;&#039;&#039; 	&lt;br /&gt;
: Used to manipulate and save current flies and run outside programs.&lt;br /&gt;
:	Type :x from command mode to enter Ex mode. &lt;br /&gt;
:	&#039;&#039;&#039;x&#039;&#039;&#039; = the command you want to use.&lt;br /&gt;
:	Automatically returns to command mode when finished. &lt;br /&gt;
:	Also referred to as colon commands&lt;br /&gt;
&lt;br /&gt;
; &#039;&#039;&#039;Insert mode&#039;&#039;&#039;	&lt;br /&gt;
: Used to enter text.&lt;br /&gt;
:	Most input results in text appearing on the screen.&lt;br /&gt;
:	Use &#039;&#039;&#039;Esc&#039;&#039;&#039; key to return to command mode.&lt;br /&gt;
&lt;br /&gt;
=== 	Using Vi ===&lt;br /&gt;
:	Use vi [file name] to launch Vi&lt;br /&gt;
::	Ex. &#039;&#039;&#039;vi lilo.conf&#039;&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
==== 	Command mode ====&lt;br /&gt;
:	The up, down, left, and right keys are used to move the curser.&lt;br /&gt;
:	&#039;&#039;&#039;yy&#039;&#039;&#039; and &#039;&#039;&#039;dd&#039;&#039;&#039; to &#039;&#039;yank (copy)&#039;&#039; text to a buffer.&lt;br /&gt;
:	&#039;&#039;&#039;dd&#039;&#039;&#039; also &#039;&#039;deletes&#039;&#039; the lines that are yanked.&lt;br /&gt;
:	Extentions of the &#039;&#039;&#039;y&#039;&#039;&#039; and &#039;&#039;&#039;d&#039;&#039;&#039; commands.&lt;br /&gt;
:	&#039;&#039;&#039;p&#039;&#039;&#039; is used to paste the contents of the buffer.&lt;br /&gt;
&lt;br /&gt;
==== 	Ex mode ====&lt;br /&gt;
:	&#039;&#039;&#039;:w&#039;&#039;&#039; saves the file.&lt;br /&gt;
:	&#039;&#039;&#039;:q&#039;&#039;&#039; quits vi&lt;br /&gt;
::	Only works if the changes have been saved or used with &#039;&#039;&#039;!&#039;&#039;&#039;. (Ex. :q!)&lt;br /&gt;
:	&#039;&#039;&#039;:e&#039;&#039;&#039; edits a new file&lt;br /&gt;
::	Ex. &#039;&#039;&#039;:e /etc/inittab&#039;&#039;&#039; loads /etc/inittab for editing.&lt;br /&gt;
::	Only works if existing file has been saved or used with an !. (Ex. :e! /etc/inittab) &lt;br /&gt;
:	&#039;&#039;&#039;:![command]&#039;&#039;&#039; executes the external command.&lt;br /&gt;
::	Ex. :!ls executes the list command.&lt;br /&gt;
&lt;br /&gt;
==== 	Insert mode ====&lt;br /&gt;
:	In command mode you can use &#039;&#039;&#039;R&#039;&#039;&#039;, &#039;&#039;&#039;i&#039;&#039;&#039;, and &#039;&#039;&#039;a&#039;&#039;&#039; to enter insert mode. &lt;br /&gt;
::	&#039;&#039;&#039;R&#039;&#039;&#039;  - Enters text replacement.&lt;br /&gt;
:::	Replace appears in the status line.&lt;br /&gt;
::	&#039;&#039;&#039;i&#039;&#039;&#039; - Enters text insertion&lt;br /&gt;
::	&#039;&#039;&#039;a&#039;&#039;&#039; - Enters text insertion but advances the curser one space.&lt;br /&gt;
:::	Can be useful at the end of a line &lt;br /&gt;
::	&#039;&#039;&#039;~&#039;&#039;&#039; - Used to change the case of a single word.&lt;br /&gt;
::	&#039;&#039;&#039;u&#039;&#039;&#039; - Undo’s any changes&lt;br /&gt;
::	&#039;&#039;&#039;o&#039;&#039;&#039; - Opens any text.&lt;br /&gt;
:::	It inserts a new line below the current line while entering insert mode on that line.&lt;br /&gt;
::	&#039;&#039;&#039;G&#039;&#039;&#039; - Goes to a specific line. &lt;br /&gt;
::	&#039;&#039;&#039;:%s/[oringinal string]/[replacement]&#039;&#039;&#039; &lt;br /&gt;
:::	Replaces all occurrences of one string with another.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
 &#039;&#039;&#039;NOTE&#039;&#039;&#039; : &#039;&#039;all page numbers reference the CompTIA Linux+ Complete Study Guide  by Roderick W. Smith ISBN 978-0-470-88845-2&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_8_Study_Guide&amp;diff=5353</id>
		<title>Chapter 8 Study Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_8_Study_Guide&amp;diff=5353"/>
		<updated>2012-03-16T03:32:00Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Chapter  8 – System initialization and X-Windows&#039;&#039;&#039; &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Boot Process== &lt;br /&gt;
*Power on &lt;br /&gt;
*System initializes&lt;br /&gt;
*BIOS performs POST (power-on self test)&lt;br /&gt;
*BIOS checks configuration and checks for boot devices and an OS to execute&lt;br /&gt;
**   &#039;&#039;Typically floppy disks, CDs, DVDs, and USB devices are checked as they can contain installation media for an OS.&#039;&#039; &lt;br /&gt;
** &#039;&#039;If an OS isn’t found, the BIOS will check the MBR/GPT on the first HD.&#039;&#039; &lt;br /&gt;
** &#039;&#039;MBR/GPT may point to the partition where the boot loader found. If this is the case then the partition where the boot loader is found is called the active partition.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
::: &#039;&#039;&#039;&#039;&#039;See page 347 of the book for the flowchart of the boot process&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
:: &#039;&#039;Boot loader – main purpose is to load the OS kernel into memory.&#039;&#039; &lt;br /&gt;
::: &#039;&#039;&#039;NOTE:&#039;&#039;&#039;  &#039;&#039;There can only be one active partition per HD.&#039;&#039; &lt;br /&gt;
*Regardless of whether the boot loader is loaded from the MBR/GPT or the active partition the rest of the boot process continues as normal.  Which is.. The kernel is executed and loaded into memory. &lt;br /&gt;
*After loading the kernel, the boot loader becomes inactive. &lt;br /&gt;
*Kernel continues by loading daemons into memory&lt;br /&gt;
*Daemons are a system process which performs tasks such as printing scheduling, and OS maintenance. &lt;br /&gt;
**The first daemon process is called the initialize (init) daemon. It’s responsible for loading all the other daemons on the system required to bring the system to a usable state where users can interact with it.&lt;br /&gt;
&lt;br /&gt;
==	Boot Loaders==&lt;br /&gt;
&lt;br /&gt;
:As mentioned, the primary task of boot loaders is to load the OS kernel into memory. They do secondary tasks as well. This includes passing info the kernel during system startup and booting other OS’s which may be on the HD.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
::Using a boot loader to boot one of several OS’s is known as &#039;&#039;&#039;dual booting&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	GRUB===&lt;br /&gt;
:	The most common and only boot loader supported by Fedora 13.&lt;br /&gt;
:3 Stages&lt;br /&gt;
::Stage 1 : Generally resides in MBR/GPT and points to Stage 1.5&lt;br /&gt;
::Stages 1.5 :  Resides in the /boot/grub directory and loads the file support and loads Stage 2&lt;br /&gt;
::Stage 2 : Also, reside in the /boot/grub directory. This part actually performs the boot loader operations and displayed the graphic boot loader screen. &lt;br /&gt;
&lt;br /&gt;
:::	This can be configured by editing the config file found at &#039;&#039;&#039;(/boot/grub/grub.conf)&#039;&#039;&#039;.&lt;br /&gt;
:::		This is read by Stage 2, which is located on the partition called GRUB root partition.&lt;br /&gt;
:::	To be able to read the info in &#039;&#039;&#039;boot/grub/grub.conf&#039;&#039;&#039; you must first understand how GRUB refers to partitions on HDs.  &lt;br /&gt;
:	The format used is :  (&#039;&#039;&#039;hd&amp;lt;drive#&amp;gt;,&amp;lt;partition#&amp;gt;&#039;&#039;&#039;)&lt;br /&gt;
:Examples.		&lt;br /&gt;
::&#039;&#039; (hd0,0)&#039;&#039; = 1st HD , 1st Partition&lt;br /&gt;
::&#039;&#039;(hd0,1)&#039;&#039; = 1st HD , 2nd Partition&lt;br /&gt;
::&#039;&#039;(hd1,2)&#039;&#039; = 2st HD , 3st Partition&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command :&lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda&lt;br /&gt;
&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
&lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command line: &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda &lt;br /&gt;
:You can also use :  &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda1&lt;br /&gt;
: This is used to install GRUB Stage 1 to the front of the 1st primary part of the HD.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	LILO===&lt;br /&gt;
&lt;br /&gt;
:This is the traditional boot loader for Linux.&lt;br /&gt;
::	No longer supported. &lt;br /&gt;
::	Often found on distros which require a smaller boot loader, as well as legacy distros. &lt;br /&gt;
:Can reside on the first sector of an active Linux partition, as with GRUB can be found in the MBR/GPT of the HD. When this is the case, when the computer completes the POST and locates LILO, a LILO boot : prompt appears.  &lt;br /&gt;
:Hitting &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; will display a list of OSs to boot. &lt;br /&gt;
&lt;br /&gt;
::: A list of common &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; keywords used to edit that file can be found on on page 353 of your book.&lt;br /&gt;
&lt;br /&gt;
:As robust as LILO is from time to time you may encounter a problem during loading. When this happens you’ll get an error code representing the problem. &lt;br /&gt;
&lt;br /&gt;
:::A list of commmon LILO error messages can be found on page 354 of your book. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Dual Booting Linux===&lt;br /&gt;
&lt;br /&gt;
:Dual booting is the ability to boot to one of several different Oss which may be available on your computer. Basically the ability to boot a Linux system on the same computer you might also want to use to boot Win 7..or XP. &lt;br /&gt;
&lt;br /&gt;
::You can dual boot using either GRUB or LILO.&lt;br /&gt;
&lt;br /&gt;
::The recommended procedure to install the other OS(s) prior to installing Linux.&lt;br /&gt;
&lt;br /&gt;
::The reason behind this is that Linux will detect the other OS(s) and place the appropriate entry into the boot loader config file.&lt;br /&gt;
&lt;br /&gt;
:LILO cannot boot load the Window kernel directly. &lt;br /&gt;
::It needs the &#039;&#039;other=&#039;&#039; &#039;&#039;&#039;&#039;keyword&#039;&#039;&#039;&#039; in the &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; file to tell it where to find the boot loader for Windows. &lt;br /&gt;
&lt;br /&gt;
:By adding &#039;&#039;optional&#039;&#039;  this prevents the GRUB boot loader from looking for a Linux kernel. This is also followed by the label keyword which just IDs the OS being loaded should you his the &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; key at the LILO prompt.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Alternate way to Dual Boot&#039;&#039;&#039;&lt;br /&gt;
:You can use a Windows Boot Loader (WBL) the same way you can use a Linux Boot Loader. &lt;br /&gt;
&lt;br /&gt;
:As it’s not designed to boot the Linux kernel, you need to go into the WBL and modify some some components &lt;br /&gt;
&lt;br /&gt;
:This can be a bit involved so easier to just install Linux after any other OSs you may also want to Dual Boot. &lt;br /&gt;
:Page 358 details what you would need to do if this is how you want to dual boot. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Linux Initialization==&lt;br /&gt;
&lt;br /&gt;
:After the boot loader loads the Linux OS kernel into memory, the kernel resumes control and executes the first daemon, called &#039;&#039;init&#039;&#039;, on the system.&lt;br /&gt;
&lt;br /&gt;
:: Remember:  &#039;&#039;A daemon is a Linux system process that provides a certain service.&#039;&#039;  &lt;br /&gt;
&lt;br /&gt;
:The init daemon uses configuration file, &#039;&#039;/etc/initab&#039;&#039;  (short for “init table”) to determine the number of daemons that needs to be loaded on the system.&lt;br /&gt;
&lt;br /&gt;
:The init daemon is responsible for uploading daemons that are loaded into memory when the system  is halted or rebooted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runlevels===&lt;br /&gt;
&lt;br /&gt;
:The init  daemon often has to manage several daemons at once.&lt;br /&gt;
&lt;br /&gt;
:Each category is categorized into Runlevels.&lt;br /&gt;
&lt;br /&gt;
:What is a runlevel? A runlevel defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system.&lt;br /&gt;
&lt;br /&gt;
:They are seven standard runlevels:&lt;br /&gt;
::	&#039;&#039;&#039;0&#039;&#039;&#039; ... &#039;&#039;Transitional, Shuts down the system.&#039;&#039; &lt;br /&gt;
:::&#039;&#039;Should completely power down the system.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;1&#039;&#039;&#039;, &#039;&#039;&#039;s&#039;&#039;&#039;, or &#039;&#039;&#039;S&#039;&#039;&#039; ...  &#039;&#039;Single user mode.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for low-level system maintenance impaired by normal system operation.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;2&#039;&#039;&#039; ... &#039;&#039;Full muti-user mode with a graphical login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Debian&#039;&#039;  &lt;br /&gt;
::	&#039;&#039;&#039;3&#039;&#039;&#039; ... &#039;&#039;Full multi-user mode with a console login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Fedora, Mandriva,  Red Hat, and most other distributions.&#039;&#039; &lt;br /&gt;
::	&#039;&#039;&#039;4&#039;&#039;&#039; ... &#039;&#039;Undefined by default&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for customization&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;5&#039;&#039;&#039; ...&#039;&#039; Same as runlevel 3 with the addition of having X run with XDM (graphical) login.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;6&#039;&#039;&#039; ...&#039;&#039;Used to reboot the system.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Also a transitional runlevel.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;To check out the current and/or  previous runlevel.&#039;&#039;&#039;&lt;br /&gt;
:: Type the runlevel command.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::N=nonexistent&lt;br /&gt;
:::5=  current runlevel.&lt;br /&gt;
&lt;br /&gt;
::To change the runlevel from 5 to 1 type command&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # init 1&lt;br /&gt;
&lt;br /&gt;
::If you’re in single mode and you want to change the runlevel from 1 back to 5. Type the following command.:&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  init 5&lt;br /&gt;
&lt;br /&gt;
::The results are&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::[root@server1 ~1] # runlevel&lt;br /&gt;
:::S 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Notice that the runlevel command displays the most current and most recent runlevel.&lt;br /&gt;
:Unless you specify, the init daemon will run the default runlevel indicated in the &#039;&#039;&#039;/etc/inittab file&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runtime config scripts===&lt;br /&gt;
&lt;br /&gt;
:Scripts that run during the boot process.  The purpose is to start daemons and bring the system to a useable state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Configuring Daemon Setup===&lt;br /&gt;
&lt;br /&gt;
:Points  to the appropriate scripts within the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. &lt;br /&gt;
&lt;br /&gt;
:Most Daemon scripts accept the arguments &#039;&#039;&#039;start, stop,&#039;&#039;&#039; and &#039;&#039;&#039;restart&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
:After system startup you can execute them directly from the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;/etc/rc.d/init.d/crond restart&#039;&#039;&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:Or you can use the &#039;&#039;&#039;service command&#039;&#039;&#039; to start, stop or restart any daemons listed in the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. To restart the crond daemon type this.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # service cond restart&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To view and modify daemons that are started in each runlevel, you can use the &#039;&#039;&#039;chkconfig&#039;&#039;&#039; command.&lt;br /&gt;
&lt;br /&gt;
:The chkconfig command views and manipulates the appropriate runtime configuration files in the &#039;&#039;&#039;/etc/rc.d/rc*.d&#039;&#039;&#039; directories.&lt;br /&gt;
&lt;br /&gt;
:For example the following command indicates the ntpd daemon is not started in any runlevel,&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd           0:off 1:off 2:off 3:off 4:off 5:off 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To configure the ntpd daemon to start in runlevels 3 and 5, and to verify the results, you could run the following commands.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – level 35 ntpd on&#039;&#039;&#039;&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd             0:off 1:off 2:off 3:on 4:off 5:on 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	X Windows System==&lt;br /&gt;
:Components of the Linux GUI&lt;br /&gt;
:Graphical Programs (X Clients)&lt;br /&gt;
:Desktop environment&lt;br /&gt;
:Window Manager&lt;br /&gt;
:X Windows&lt;br /&gt;
:Video Hardware&lt;br /&gt;
&lt;br /&gt;
===	X Windows===&lt;br /&gt;
:Developed by Digital Equipment Corporation (DEC) and Massachusetts Institute of Technology (MIT) in 1984&lt;br /&gt;
:Maintained as Open Source Software by the X.Org Foundation&lt;br /&gt;
:The freely available version used in may Linux distributions is called XFree86&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Windows Manager and Desktop Environs===&lt;br /&gt;
&lt;br /&gt;
::Window managers are used to modify the look and feel of X Windows. &lt;br /&gt;
:: Common windows managers can be found on page 370 of your book. &lt;br /&gt;
&lt;br /&gt;
:&#039;&#039;&#039;K Desktop Environment (KDE)&#039;&#039;&#039;&lt;br /&gt;
::Released in 1996&lt;br /&gt;
::Uses K Window Manager (kwin) and Qt toolkit&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;GNOME&#039;&#039;&#039;&lt;br /&gt;
:: Created in 1997&lt;br /&gt;
:: Uses Metacity Window Manager and GTK+ toolkit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Starting and Stopping X Windows===&lt;br /&gt;
&lt;br /&gt;
:*GNOME Display Manager writes the chosen desktop environment in the Session menu to a &#039;&#039;&#039;.dmrc&#039;&#039;&#039; (display manager runtime configuration) file.   &#039;&#039;&#039;/home/user1/.dmrc&#039;&#039;&#039; file&lt;br /&gt;
&lt;br /&gt;
:::[user1@server1 ~]# &#039;&#039;&#039;cat . dmrc&#039;&#039;&#039;  &lt;br /&gt;
:::[Desktop]&lt;br /&gt;
:::Session=kde&lt;br /&gt;
:::[user1@server1 ~]#_&lt;br /&gt;
&lt;br /&gt;
:*Root user in not allowed to log into GNOME Display Manager by default.&lt;br /&gt;
::&#039;&#039;&#039;/etc/pam.d/gdm&#039;&#039;&#039;    and   &#039;&#039;&#039;/etc/pam.d/gdm-password&#039;&#039;&#039;  &lt;br /&gt;
::# auth required pam_succeed_if.so user !=root quiet&lt;br /&gt;
:*GNOME Display Manager can be start manually using the gdm command&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Configuring X Windows==&lt;br /&gt;
&lt;br /&gt;
:X.Org configuration file is /etc/X11/xorg.conf&lt;br /&gt;
:XFree86 configuration file is /etc/X11/XF86Config &lt;br /&gt;
:Mouse-test&lt;br /&gt;
:System-config-keyboard command&lt;br /&gt;
:System-config-display&lt;br /&gt;
:Xvidtune to fine tune vertical and horizontal refresh rate.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Information complied by Robert Klaers, LaPrice Ali, &amp;amp; Sean Benecker&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2311&amp;diff=5352</id>
		<title>Franske CNT-2311</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2311&amp;diff=5352"/>
		<updated>2012-03-16T03:31:07Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: /* Chapter Study Guides */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is the homepage for the CNT-2311 classes taught by Dr. Ben Franske.&lt;br /&gt;
&lt;br /&gt;
=Current Course Materials=&lt;br /&gt;
&lt;br /&gt;
== General Course Information ==&lt;br /&gt;
* [https://docs.google.com/a/ihcnt.net/spreadsheet/viewform?formkey=dE5lWno3NEQybjdLOW52OW5aNWpfdnc6MQ First Day Sign In Form]&lt;br /&gt;
* [[Franske CNT-2311 Syllabus|Course Syllabus]]&lt;br /&gt;
* [[Franske CNT-2311 SP12 Schedule|Spring 2012 Course Schedule]]&lt;br /&gt;
* [[Franske CNT-2311 SP12 Labs|Lab List]]&lt;br /&gt;
* [[Franske Lab Report Format|Lab Report Format]]&lt;br /&gt;
* [[Franske CNT-2311 SP12 Chapter Groups|Spring 2012 Chapter Groups]]&lt;br /&gt;
&lt;br /&gt;
== Chapter Study Guides ==&lt;br /&gt;
Put a link to the study guide you create for your chapter here. &amp;lt;br&amp;gt;&lt;br /&gt;
* [[Chapter 2 Study Guide]]&lt;br /&gt;
* [[Chapter 3 Study Guide]]&lt;br /&gt;
* [[Chapter 4 Study Guide]]&lt;br /&gt;
* [[Chapter 5 Study Guide]]&lt;br /&gt;
* [[Chapter 6 Study Guide]]&lt;br /&gt;
* [[Chapter 7 Study Guide]]&lt;br /&gt;
* [[Chapter 8 Study Guide]]&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
* [[Writing Moodle Questions]]&lt;br /&gt;
* [[Editing Moodle Questions]]&lt;br /&gt;
&lt;br /&gt;
=== Software ===&lt;br /&gt;
* [http://www.virtualbox.org Virtualbox]&lt;br /&gt;
** [[VirtualBox Startup Script]]&lt;br /&gt;
&lt;br /&gt;
==== Major Linux Distributions ====&lt;br /&gt;
* [http://www.debian.org Debian]&lt;br /&gt;
** [http://www.ubuntu.com Ubuntu]&lt;br /&gt;
* [http://www.redhat.com Redhat Enterprise Linux (RHEL)]&lt;br /&gt;
** [http://centos.org CentOS]&lt;br /&gt;
** [http://fedoraproject.org Fedora]&lt;br /&gt;
*** Old versions of Fedora are difficult to find on the site the version that the book uses is [http://mirror.rit.edu/fedora/linux/releases/13/Fedora/i386/iso/Fedora-13-i386-DVD.iso Fedora Core 13]&lt;br /&gt;
* [http://www.gentoo.org Gentoo]&lt;br /&gt;
* [http://www.opensuse.org OpenSUSE (Novell)]&lt;br /&gt;
&lt;br /&gt;
=== General Help ===&lt;br /&gt;
==== Online Linux Tutuorials ====&lt;br /&gt;
* [http://www.linux.org/lessons/beginner Beginning Linux from Linux.org]&lt;br /&gt;
* [https://help.ubuntu.com/community/PostfixBasicSetupHowto Postfix Basic Setup]&lt;br /&gt;
* [http://lartc.org Linux Advanced Routing &amp;amp; Traffic Control (Advanced Networking)]&lt;br /&gt;
&lt;br /&gt;
=== Command Guides ===&lt;br /&gt;
* [http://vic.gedris.org/Manual-ShellIntro/1.2/ShellIntro.pdf Inroduction to basic BASH shell commands]&lt;br /&gt;
* [http://www.digilife.be/quickreferences/QRC/The%20One%20Page%20Linux%20Manual.pdf The One Page Linux Manual]&lt;br /&gt;
&lt;br /&gt;
=== Specific Topic Help ===&lt;br /&gt;
==== GRUB2 ====&lt;br /&gt;
* [https://help.ubuntu.com/community/Grub2 Ubuntu Community Documentation - GRUB2]&lt;br /&gt;
* [http://www.dedoimedo.com/computers/grub-2.html GRUB2 Bootloader Full Tutorial]&lt;br /&gt;
* [http://ubuntuforums.org/showthread.php?t=1195275 The GRUB2 Guide]&lt;br /&gt;
&lt;br /&gt;
==== Runlevels ====&lt;br /&gt;
* [http://www.ibm.com/developerworks/linux/library/l-lpic1-v3-101-3/?ca=drs- IBM Learn Linux, 101: Runlevels, shutdown, and reboot]&lt;br /&gt;
* [http://www.linux.com/news/enterprise/systems-management/8116-an-introduction-to-services-runlevels-and-rcd-scripts An  introduction to services, runlevels, and rc.d scripts]&lt;br /&gt;
&lt;br /&gt;
==== Partitioning, Formatting and Mounting====&lt;br /&gt;
* [http://tldp.org/HOWTO/Partition/ Linux Partition HOWTO]&lt;br /&gt;
* [http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/4/html/Introduction_To_System_Administration/s2-storage-fs-mounting.html RedHat Documentation Mount Points]&lt;br /&gt;
* [http://docs.fedoraproject.org/en-US/Fedora/15/html/Installation_Guide/ch-partitions-x86.html Fedora Documentation: An Introduction to Disk Partitions]&lt;br /&gt;
&lt;br /&gt;
==== SSH ====&lt;br /&gt;
* [http://macnugget.org/projects/publickeys/ David McNett: using ssh public key authentication]&lt;br /&gt;
* [https://help.ubuntu.com/community/SSH/OpenSSH/Keys Ubuntu SSH Keys Documentation]&lt;br /&gt;
* [http://www.linuxtutorialblog.com/post/ssh-and-scp-howto-tips-tricks Linux Tutorial Blog: SSH and SCP: Howto, tips &amp;amp; tricks]&lt;br /&gt;
&lt;br /&gt;
==== Network Configuration ====&lt;br /&gt;
* [http://www.debian-administration.org/articles/254 Debian-style Network Configuration] (Ubuntu Server uses the same style)&lt;br /&gt;
* [http://docs.fedoraproject.org/en-US/Fedora/15/html/Deployment_Guide/s1-networkscripts-interfaces.html Fedora Nekwork Interface Configuration Files] &lt;br /&gt;
&lt;br /&gt;
==== Regular Expressions, Grep and SED ====&lt;br /&gt;
* [http://www.zytrax.com/tech/web/regex.htm Regular Expressions - A Simple User Guide]&lt;br /&gt;
* [http://linuxreviews.org/beginner/tao_of_regular_expressions Tao of Regular Expressions]&lt;br /&gt;
&lt;br /&gt;
=Archived Course Materials=&lt;br /&gt;
== General Course Information ==&lt;br /&gt;
* [[Franske CNT-2311 Labs|Lab List]]&lt;br /&gt;
* [[Franske CNT-2311 SU11 Labs|Summer 2011 Lab List]]&lt;br /&gt;
&lt;br /&gt;
== Chapter Project Notes ==&lt;br /&gt;
[[CNT-2311-Chapter 2 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 3 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 4 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 5 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 7 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 8 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 9 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[CNT-2311-Chapter 10 Notes]] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;&lt;br /&gt;
[http://wiki.ihcnt.net/w/Chapter_21_%26_24 CNT-2311-Chapter 21 &amp;amp; 24 Notes]&#039;&#039;&#039;&lt;br /&gt;
* [[Linux SSH and Samba Notes]]&lt;br /&gt;
* [[Linux Job Management Notes]]&lt;br /&gt;
&lt;br /&gt;
== Projects ==&lt;br /&gt;
&lt;br /&gt;
* [[Dual Booting Ubuntu and Windows 7]]&lt;br /&gt;
* [[GUID Partiton Table]]&lt;br /&gt;
* [[Linux VLAN Trunking]]&lt;br /&gt;
* [[Installing Webmin]]&lt;br /&gt;
* [[Nat Masquerading and Firewall]]&lt;br /&gt;
* [[Control Web Access With Squid]]&lt;br /&gt;
* [[Installing MyBB Forum]]&lt;br /&gt;
* [[openvpn]]&lt;br /&gt;
* [[Zoneminder]]&lt;br /&gt;
* [[Understanding Linux Permission Sets]]&lt;br /&gt;
* [[Franske CNT-2311 SP10 Commands|Spring 2010 Commands by Session]]&lt;br /&gt;
* [[Converting VMWare .vmdk To VirtualBox .vdi Using Qemu+ and VBoxManage]]&lt;br /&gt;
* [[Linux command guide]]&lt;br /&gt;
* [[Windows File Sharing and Printer Sharing with SAMBA]]&lt;br /&gt;
* [[How to Setup NAT]]&lt;br /&gt;
* [[Linux-command-list]]&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_8_Study_Guide&amp;diff=5351</id>
		<title>Chapter 8 Study Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_8_Study_Guide&amp;diff=5351"/>
		<updated>2012-03-16T03:30:13Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: Chapter  8 – System initialization and X-Windows&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;Chapter  8 – System initialization and X-Windows&#039;&#039;&#039; &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Boot Process== &lt;br /&gt;
*Power on &lt;br /&gt;
*System initializes&lt;br /&gt;
*BIOS performs POST (power-on self test)&lt;br /&gt;
*BIOS checks configuration and checks for boot devices and an OS to execute&lt;br /&gt;
**   &#039;&#039;Typically floppy disks, CDs, DVDs, and USB devices are checked as they can contain installation media for an OS.&#039;&#039; &lt;br /&gt;
** &#039;&#039;If an OS isn’t found, the BIOS will check the MBR/GPT on the first HD.&#039;&#039; &lt;br /&gt;
** &#039;&#039;MBR/GPT may point to the partition where the boot loader found. If this is the case then the partition where the boot loader is found is called the active partition.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
::: &#039;&#039;&#039;&#039;&#039;See page 347 of the book for the flowchart of the boot process&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
:: &#039;&#039;Boot loader – main purpose is to load the OS kernel into memory.&#039;&#039; &lt;br /&gt;
::: &#039;&#039;&#039;NOTE:&#039;&#039;&#039;  &#039;&#039;There can only be one active partition per HD.&#039;&#039; &lt;br /&gt;
*Regardless of whether the boot loader is loaded from the MBR/GPT or the active partition the rest of the boot process continues as normal.  Which is.. The kernel is executed and loaded into memory. &lt;br /&gt;
*After loading the kernel, the boot loader becomes inactive. &lt;br /&gt;
*Kernel continues by loading daemons into memory&lt;br /&gt;
*Daemons are a system process which performs tasks such as printing scheduling, and OS maintenance. &lt;br /&gt;
**The first daemon process is called the initialize (init) daemon. It’s responsible for loading all the other daemons on the system required to bring the system to a usable state where users can interact with it.&lt;br /&gt;
&lt;br /&gt;
==	Boot Loaders==&lt;br /&gt;
&lt;br /&gt;
:As mentioned, the primary task of boot loaders is to load the OS kernel into memory. They do secondary tasks as well. This includes passing info the kernel during system startup and booting other OS’s which may be on the HD.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
::Using a boot loader to boot one of several OS’s is known as &#039;&#039;&#039;dual booting&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	GRUB===&lt;br /&gt;
:	The most common and only boot loader supported by Fedora 13.&lt;br /&gt;
:3 Stages&lt;br /&gt;
::Stage 1 : Generally resides in MBR/GPT and points to Stage 1.5&lt;br /&gt;
::Stages 1.5 :  Resides in the /boot/grub directory and loads the file support and loads Stage 2&lt;br /&gt;
::Stage 2 : Also, reside in the /boot/grub directory. This part actually performs the boot loader operations and displayed the graphic boot loader screen. &lt;br /&gt;
&lt;br /&gt;
:::	This can be configured by editing the config file found at &#039;&#039;&#039;(/boot/grub/grub.conf)&#039;&#039;&#039;.&lt;br /&gt;
:::		This is read by Stage 2, which is located on the partition called GRUB root partition.&lt;br /&gt;
:::	To be able to read the info in &#039;&#039;&#039;boot/grub/grub.conf&#039;&#039;&#039; you must first understand how GRUB refers to partitions on HDs.  &lt;br /&gt;
:	The format used is :  (&#039;&#039;&#039;hd&amp;lt;drive#&amp;gt;,&amp;lt;partition#&amp;gt;&#039;&#039;&#039;)&lt;br /&gt;
:Examples.		&lt;br /&gt;
::&#039;&#039; (hd0,0)&#039;&#039; = 1st HD , 1st Partition&lt;br /&gt;
::&#039;&#039;(hd0,1)&#039;&#039; = 1st HD , 2nd Partition&lt;br /&gt;
::&#039;&#039;(hd1,2)&#039;&#039; = 2st HD , 3st Partition&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command :&lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda&lt;br /&gt;
&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
&lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command line: &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda &lt;br /&gt;
:You can also use :  &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda1&lt;br /&gt;
: This is used to install GRUB Stage 1 to the front of the 1st primary part of the HD.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	LILO===&lt;br /&gt;
&lt;br /&gt;
:This is the traditional boot loader for Linux.&lt;br /&gt;
::	No longer supported. &lt;br /&gt;
::	Often found on distros which require a smaller boot loader, as well as legacy distros. &lt;br /&gt;
:Can reside on the first sector of an active Linux partition, as with GRUB can be found in the MBR/GPT of the HD. When this is the case, when the computer completes the POST and locates LILO, a LILO boot : prompt appears.  &lt;br /&gt;
:Hitting &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; will display a list of OSs to boot. &lt;br /&gt;
&lt;br /&gt;
::: A list of common &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; keywords used to edit that file can be found on on page 353 of your book.&lt;br /&gt;
&lt;br /&gt;
:As robust as LILO is from time to time you may encounter a problem during loading. When this happens you’ll get an error code representing the problem. &lt;br /&gt;
&lt;br /&gt;
:::A list of commmon LILO error messages can be found on page 354 of your book. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Dual Booting Linux===&lt;br /&gt;
&lt;br /&gt;
:Dual booting is the ability to boot to one of several different Oss which may be available on your computer. Basically the ability to boot a Linux system on the same computer you might also want to use to boot Win 7..or XP. &lt;br /&gt;
&lt;br /&gt;
::You can dual boot using either GRUB or LILO.&lt;br /&gt;
&lt;br /&gt;
::The recommended procedure to install the other OS(s) prior to installing Linux.&lt;br /&gt;
&lt;br /&gt;
::The reason behind this is that Linux will detect the other OS(s) and place the appropriate entry into the boot loader config file.&lt;br /&gt;
&lt;br /&gt;
:LILO cannot boot load the Window kernel directly. &lt;br /&gt;
::It needs the &#039;&#039;other=&#039;&#039; &#039;&#039;&#039;&#039;keyword&#039;&#039;&#039;&#039; in the &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; file to tell it where to find the boot loader for Windows. &lt;br /&gt;
&lt;br /&gt;
:By adding &#039;&#039;optional&#039;&#039;  this prevents the GRUB boot loader from looking for a Linux kernel. This is also followed by the label keyword which just IDs the OS being loaded should you his the &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; key at the LILO prompt.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Alternate way to Dual Boot&#039;&#039;&#039;&lt;br /&gt;
:You can use a Windows Boot Loader (WBL) the same way you can use a Linux Boot Loader. &lt;br /&gt;
&lt;br /&gt;
:As it’s not designed to boot the Linux kernel, you need to go into the WBL and modify some some components &lt;br /&gt;
&lt;br /&gt;
:This can be a bit involved so easier to just install Linux after any other OSs you may also want to Dual Boot. &lt;br /&gt;
:Page 358 details what you would need to do if this is how you want to dual boot. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Linux Initialization==&lt;br /&gt;
&lt;br /&gt;
:After the boot loader loads the Linux OS kernel into memory, the kernel resumes control and executes the first daemon, called &#039;&#039;init&#039;&#039;, on the system.&lt;br /&gt;
&lt;br /&gt;
:: Remember:  &#039;&#039;A daemon is a Linux system process that provides a certain service.&#039;&#039;  &lt;br /&gt;
&lt;br /&gt;
:The init daemon uses configuration file, &#039;&#039;/etc/initab&#039;&#039;  (short for “init table”) to determine the number of daemons that needs to be loaded on the system.&lt;br /&gt;
&lt;br /&gt;
:The init daemon is responsible for uploading daemons that are loaded into memory when the system  is halted or rebooted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runlevels===&lt;br /&gt;
&lt;br /&gt;
:The init  daemon often has to manage several daemons at once.&lt;br /&gt;
&lt;br /&gt;
:Each category is categorized into Runlevels.&lt;br /&gt;
&lt;br /&gt;
:What is a runlevel? A runlevel defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system.&lt;br /&gt;
&lt;br /&gt;
:They are seven standard runlevels:&lt;br /&gt;
::	&#039;&#039;&#039;0&#039;&#039;&#039; ... &#039;&#039;Transitional, Shuts down the system.&#039;&#039; &lt;br /&gt;
:::&#039;&#039;Should completely power down the system.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;1&#039;&#039;&#039;, &#039;&#039;&#039;s&#039;&#039;&#039;, or &#039;&#039;&#039;S&#039;&#039;&#039; ...  &#039;&#039;Single user mode.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for low-level system maintenance impaired by normal system operation.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;2&#039;&#039;&#039; ... &#039;&#039;Full muti-user mode with a graphical login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Debian&#039;&#039;  &lt;br /&gt;
::	&#039;&#039;&#039;3&#039;&#039;&#039; ... &#039;&#039;Full multi-user mode with a console login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Fedora, Mandriva,  Red Hat, and most other distributions.&#039;&#039; &lt;br /&gt;
::	&#039;&#039;&#039;4&#039;&#039;&#039; ... &#039;&#039;Undefined by default&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for customization&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;5&#039;&#039;&#039; ...&#039;&#039; Same as runlevel 3 with the addition of having X run with XDM (graphical) login.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;6&#039;&#039;&#039; ...&#039;&#039;Used to reboot the system.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Also a transitional runlevel.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;To check out the current and/or  previous runlevel.&#039;&#039;&#039;&lt;br /&gt;
:: Type the runlevel command.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::N=nonexistent&lt;br /&gt;
:::5=  current runlevel.&lt;br /&gt;
&lt;br /&gt;
::To change the runlevel from 5 to 1 type command&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # init 1&lt;br /&gt;
&lt;br /&gt;
::If you’re in single mode and you want to change the runlevel from 1 back to 5. Type the following command.:&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  init 5&lt;br /&gt;
&lt;br /&gt;
::The results are&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::[root@server1 ~1] # runlevel&lt;br /&gt;
:::S 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Notice that the runlevel command displays the most current and most recent runlevel.&lt;br /&gt;
:Unless you specify, the init daemon will run the default runlevel indicated in the &#039;&#039;&#039;/etc/inittab file&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runtime config scripts===&lt;br /&gt;
&lt;br /&gt;
:Scripts that run during the boot process.  The purpose is to start daemons and bring the system to a useable state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Configuring Daemon Setup===&lt;br /&gt;
&lt;br /&gt;
:Points  to the appropriate scripts within the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. &lt;br /&gt;
&lt;br /&gt;
:Most Daemon scripts accept the arguments &#039;&#039;&#039;start, stop,&#039;&#039;&#039; and &#039;&#039;&#039;restart&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
:After system startup you can execute them directly from the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;/etc/rc.d/init.d/crond restart&#039;&#039;&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:Or you can use the &#039;&#039;&#039;service command&#039;&#039;&#039; to start, stop or restart any daemons listed in the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. To restart the crond daemon type this.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # service cond restart&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To view and modify daemons that are started in each runlevel, you can use the &#039;&#039;&#039;chkconfig&#039;&#039;&#039; command.&lt;br /&gt;
&lt;br /&gt;
:The chkconfig command views and manipulates the appropriate runtime configuration files in the &#039;&#039;&#039;/etc/rc.d/rc*.d&#039;&#039;&#039; directories.&lt;br /&gt;
&lt;br /&gt;
:For example the following command indicates the ntpd daemon is not started in any runlevel,&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd           0:off 1:off 2:off 3:off 4:off 5:off 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To configure the ntpd daemon to start in runlevels 3 and 5, and to verify the results, you could run the following commands.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – level 35 ntpd on&#039;&#039;&#039;&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd             0:off 1:off 2:off 3:on 4:off 5:on 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	X Windows System==&lt;br /&gt;
:Components of the Linux GUI&lt;br /&gt;
:Graphical Programs (X Clients)&lt;br /&gt;
:Desktop environment&lt;br /&gt;
:Window Manager&lt;br /&gt;
:X Windows&lt;br /&gt;
:Video Hardware&lt;br /&gt;
&lt;br /&gt;
===	X Windows===&lt;br /&gt;
:Developed by Digital Equipment Corporation (DEC) and Massachusetts Institute of Technology (MIT) in 1984&lt;br /&gt;
:Maintained as Open Source Software by the X.Org Foundation&lt;br /&gt;
:The freely available version used in may Linux distributions is called XFree86&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Windows Manager and Desktop Environs===&lt;br /&gt;
&lt;br /&gt;
::Window managers are used to modify the look and feel of X Windows. &lt;br /&gt;
:: Common windows managers can be found on page 370 of your book. &lt;br /&gt;
&lt;br /&gt;
:&#039;&#039;&#039;K Desktop Environment (KDE)&#039;&#039;&#039;&lt;br /&gt;
::Released in 1996&lt;br /&gt;
::Uses K Window Manager (kwin) and Qt toolkit&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;GNOME&#039;&#039;&#039;&lt;br /&gt;
:: Created in 1997&lt;br /&gt;
:: Uses Metacity Window Manager and GTK+ toolkit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Starting and Stopping X Windows===&lt;br /&gt;
&lt;br /&gt;
:*GNOME Display Manager writes the chosen desktop environment in the Session menu to a &#039;&#039;&#039;.dmrc&#039;&#039;&#039; (display manager runtime configuration) file.   &#039;&#039;&#039;/home/user1/.dmrc&#039;&#039;&#039; file&lt;br /&gt;
&lt;br /&gt;
:::[user1@server1 ~]# &#039;&#039;&#039;cat . dmrc&#039;&#039;&#039;  &lt;br /&gt;
:::[Desktop]&lt;br /&gt;
:::Session=kde&lt;br /&gt;
:::[user1@server1 ~]#_&lt;br /&gt;
&lt;br /&gt;
:*Root user in not allowed to log into GNOME Display Manager by default.&lt;br /&gt;
::&#039;&#039;&#039;/etc/pam.d/gdm&#039;&#039;&#039;    and   &#039;&#039;&#039;/etc/pam.d/gdm-password&#039;&#039;&#039;  &lt;br /&gt;
::# auth required pam_succeed_if.so user !=root quiet&lt;br /&gt;
:*GNOME Display Manager can be start manually using the gdm command&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Configuring X Windows==&lt;br /&gt;
&lt;br /&gt;
:X.Org configuration file is /etc/X11/xorg.conf&lt;br /&gt;
:XFree86 configuration file is /etc/X11/XF86Config &lt;br /&gt;
:Mouse-test&lt;br /&gt;
:System-config-keyboard command&lt;br /&gt;
:System-config-display&lt;br /&gt;
:Xvidtune to fine tune vertical and horizontal refresh rate.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Information complied by Robert Klaers, LaPrice Ali, &amp;amp; Sean Benecker&lt;br /&gt;
&lt;br /&gt;
== Chapter  8 – System initialization and X-Windows ==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
==	Boot Process== &lt;br /&gt;
*Power on &lt;br /&gt;
*System initializes&lt;br /&gt;
*BIOS performs POST (power-on self test)&lt;br /&gt;
*BIOS checks configuration and checks for boot devices and an OS to execute&lt;br /&gt;
**   &#039;&#039;Typically floppy disks, CDs, DVDs, and USB devices are checked as they can contain installation media for an OS.&#039;&#039; &lt;br /&gt;
** &#039;&#039;If an OS isn’t found, the BIOS will check the MBR/GPT on the first HD.&#039;&#039; &lt;br /&gt;
** &#039;&#039;MBR/GPT may point to the partition where the boot loader found. If this is the case then the partition where the boot loader is found is called the active partition.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
::: &#039;&#039;&#039;&#039;&#039;See page 347 of the book for the flowchart of the boot process&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
:: &#039;&#039;Boot loader – main purpose is to load the OS kernel into memory.&#039;&#039; &lt;br /&gt;
::: &#039;&#039;&#039;NOTE:&#039;&#039;&#039;  &#039;&#039;There can only be one active partition per HD.&#039;&#039; &lt;br /&gt;
*Regardless of whether the boot loader is loaded from the MBR/GPT or the active partition the rest of the boot process continues as normal.  Which is.. The kernel is executed and loaded into memory. &lt;br /&gt;
*After loading the kernel, the boot loader becomes inactive. &lt;br /&gt;
*Kernel continues by loading daemons into memory&lt;br /&gt;
*Daemons are a system process which performs tasks such as printing scheduling, and OS maintenance. &lt;br /&gt;
**The first daemon process is called the initialize (init) daemon. It’s responsible for loading all the other daemons on the system required to bring the system to a usable state where users can interact with it.&lt;br /&gt;
&lt;br /&gt;
==	Boot Loaders==&lt;br /&gt;
&lt;br /&gt;
:As mentioned, the primary task of boot loaders is to load the OS kernel into memory. They do secondary tasks as well. This includes passing info the kernel during system startup and booting other OS’s which may be on the HD.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
::Using a boot loader to boot one of several OS’s is known as &#039;&#039;&#039;dual booting&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	GRUB===&lt;br /&gt;
:	The most common and only boot loader supported by Fedora 13.&lt;br /&gt;
:3 Stages&lt;br /&gt;
::Stage 1 : Generally resides in MBR/GPT and points to Stage 1.5&lt;br /&gt;
::Stages 1.5 :  Resides in the /boot/grub directory and loads the file support and loads Stage 2&lt;br /&gt;
::Stage 2 : Also, reside in the /boot/grub directory. This part actually performs the boot loader operations and displayed the graphic boot loader screen. &lt;br /&gt;
&lt;br /&gt;
:::	This can be configured by editing the config file found at &#039;&#039;&#039;(/boot/grub/grub.conf)&#039;&#039;&#039;.&lt;br /&gt;
:::		This is read by Stage 2, which is located on the partition called GRUB root partition.&lt;br /&gt;
:::	To be able to read the info in &#039;&#039;&#039;boot/grub/grub.conf&#039;&#039;&#039; you must first understand how GRUB refers to partitions on HDs.  &lt;br /&gt;
:	The format used is :  (&#039;&#039;&#039;hd&amp;lt;drive#&amp;gt;,&amp;lt;partition#&amp;gt;&#039;&#039;&#039;)&lt;br /&gt;
:Examples.		&lt;br /&gt;
::&#039;&#039; (hd0,0)&#039;&#039; = 1st HD , 1st Partition&lt;br /&gt;
::&#039;&#039;(hd0,1)&#039;&#039; = 1st HD , 2nd Partition&lt;br /&gt;
::&#039;&#039;(hd1,2)&#039;&#039; = 2st HD , 3st Partition&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command :&lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda&lt;br /&gt;
&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
&lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command line: &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda &lt;br /&gt;
:You can also use :  &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda1&lt;br /&gt;
: This is used to install GRUB Stage 1 to the front of the 1st primary part of the HD.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	LILO===&lt;br /&gt;
&lt;br /&gt;
:This is the traditional boot loader for Linux.&lt;br /&gt;
::	No longer supported. &lt;br /&gt;
::	Often found on distros which require a smaller boot loader, as well as legacy distros. &lt;br /&gt;
:Can reside on the first sector of an active Linux partition, as with GRUB can be found in the MBR/GPT of the HD. When this is the case, when the computer completes the POST and locates LILO, a LILO boot : prompt appears.  &lt;br /&gt;
:Hitting &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; will display a list of OSs to boot. &lt;br /&gt;
&lt;br /&gt;
::: A list of common &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; keywords used to edit that file can be found on on page 353 of your book.&lt;br /&gt;
&lt;br /&gt;
:As robust as LILO is from time to time you may encounter a problem during loading. When this happens you’ll get an error code representing the problem. &lt;br /&gt;
&lt;br /&gt;
:::A list of commmon LILO error messages can be found on page 354 of your book. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Dual Booting Linux===&lt;br /&gt;
&lt;br /&gt;
:Dual booting is the ability to boot to one of several different Oss which may be available on your computer. Basically the ability to boot a Linux system on the same computer you might also want to use to boot Win 7..or XP. &lt;br /&gt;
&lt;br /&gt;
::You can dual boot using either GRUB or LILO.&lt;br /&gt;
&lt;br /&gt;
::The recommended procedure to install the other OS(s) prior to installing Linux.&lt;br /&gt;
&lt;br /&gt;
::The reason behind this is that Linux will detect the other OS(s) and place the appropriate entry into the boot loader config file.&lt;br /&gt;
&lt;br /&gt;
:LILO cannot boot load the Window kernel directly. &lt;br /&gt;
::It needs the &#039;&#039;other=&#039;&#039; &#039;&#039;&#039;&#039;keyword&#039;&#039;&#039;&#039; in the &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; file to tell it where to find the boot loader for Windows. &lt;br /&gt;
&lt;br /&gt;
:By adding &#039;&#039;optional&#039;&#039;  this prevents the GRUB boot loader from looking for a Linux kernel. This is also followed by the label keyword which just IDs the OS being loaded should you his the &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; key at the LILO prompt.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Alternate way to Dual Boot&#039;&#039;&#039;&lt;br /&gt;
:You can use a Windows Boot Loader (WBL) the same way you can use a Linux Boot Loader. &lt;br /&gt;
&lt;br /&gt;
:As it’s not designed to boot the Linux kernel, you need to go into the WBL and modify some some components &lt;br /&gt;
&lt;br /&gt;
:This can be a bit involved so easier to just install Linux after any other OSs you may also want to Dual Boot. &lt;br /&gt;
:Page 358 details what you would need to do if this is how you want to dual boot. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Linux Initialization==&lt;br /&gt;
&lt;br /&gt;
:After the boot loader loads the Linux OS kernel into memory, the kernel resumes control and executes the first daemon, called &#039;&#039;init&#039;&#039;, on the system.&lt;br /&gt;
&lt;br /&gt;
:: Remember:  &#039;&#039;A daemon is a Linux system process that provides a certain service.&#039;&#039;  &lt;br /&gt;
&lt;br /&gt;
:The init daemon uses configuration file, &#039;&#039;/etc/initab&#039;&#039;  (short for “init table”) to determine the number of daemons that needs to be loaded on the system.&lt;br /&gt;
&lt;br /&gt;
:The init daemon is responsible for uploading daemons that are loaded into memory when the system  is halted or rebooted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runlevels===&lt;br /&gt;
&lt;br /&gt;
:The init  daemon often has to manage several daemons at once.&lt;br /&gt;
&lt;br /&gt;
:Each category is categorized into Runlevels.&lt;br /&gt;
&lt;br /&gt;
:What is a runlevel? A runlevel defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system.&lt;br /&gt;
&lt;br /&gt;
:They are seven standard runlevels:&lt;br /&gt;
::	&#039;&#039;&#039;0&#039;&#039;&#039; ... &#039;&#039;Transitional, Shuts down the system.&#039;&#039; &lt;br /&gt;
:::&#039;&#039;Should completely power down the system.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;1&#039;&#039;&#039;, &#039;&#039;&#039;s&#039;&#039;&#039;, or &#039;&#039;&#039;S&#039;&#039;&#039; ...  &#039;&#039;Single user mode.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for low-level system maintenance impaired by normal system operation.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;2&#039;&#039;&#039; ... &#039;&#039;Full muti-user mode with a graphical login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Debian&#039;&#039;  &lt;br /&gt;
::	&#039;&#039;&#039;3&#039;&#039;&#039; ... &#039;&#039;Full multi-user mode with a console login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Fedora, Mandriva,  Red Hat, and most other distributions.&#039;&#039; &lt;br /&gt;
::	&#039;&#039;&#039;4&#039;&#039;&#039; ... &#039;&#039;Undefined by default&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for customization&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;5&#039;&#039;&#039; ...&#039;&#039; Same as runlevel 3 with the addition of having X run with XDM (graphical) login.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;6&#039;&#039;&#039; ...&#039;&#039;Used to reboot the system.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Also a transitional runlevel.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;To check out the current and/or  previous runlevel.&#039;&#039;&#039;&lt;br /&gt;
:: Type the runlevel command.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::N=nonexistent&lt;br /&gt;
:::5=  current runlevel.&lt;br /&gt;
&lt;br /&gt;
::To change the runlevel from 5 to 1 type command&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # init 1&lt;br /&gt;
&lt;br /&gt;
::If you’re in single mode and you want to change the runlevel from 1 back to 5. Type the following command.:&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  init 5&lt;br /&gt;
&lt;br /&gt;
::The results are&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::[root@server1 ~1] # runlevel&lt;br /&gt;
:::S 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Notice that the runlevel command displays the most current and most recent runlevel.&lt;br /&gt;
:Unless you specify, the init daemon will run the default runlevel indicated in the &#039;&#039;&#039;/etc/inittab file&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runtime config scripts===&lt;br /&gt;
&lt;br /&gt;
:Scripts that run during the boot process.  The purpose is to start daemons and bring the system to a useable state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Configuring Daemon Setup===&lt;br /&gt;
&lt;br /&gt;
:Points  to the appropriate scripts within the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. &lt;br /&gt;
&lt;br /&gt;
:Most Daemon scripts accept the arguments &#039;&#039;&#039;start, stop,&#039;&#039;&#039; and &#039;&#039;&#039;restart&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
:After system startup you can execute them directly from the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;/etc/rc.d/init.d/crond restart&#039;&#039;&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:Or you can use the &#039;&#039;&#039;service command&#039;&#039;&#039; to start, stop or restart any daemons listed in the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. To restart the crond daemon type this.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # service cond restart&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To view and modify daemons that are started in each runlevel, you can use the &#039;&#039;&#039;chkconfig&#039;&#039;&#039; command.&lt;br /&gt;
&lt;br /&gt;
:The chkconfig command views and manipulates the appropriate runtime configuration files in the &#039;&#039;&#039;/etc/rc.d/rc*.d&#039;&#039;&#039; directories.&lt;br /&gt;
&lt;br /&gt;
:For example the following command indicates the ntpd daemon is not started in any runlevel,&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd           0:off 1:off 2:off 3:off 4:off 5:off 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To configure the ntpd daemon to start in runlevels 3 and 5, and to verify the results, you could run the following commands.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – level 35 ntpd on&#039;&#039;&#039;&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd             0:off 1:off 2:off 3:on 4:off 5:on 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	X Windows System==&lt;br /&gt;
:Components of the Linux GUI&lt;br /&gt;
:Graphical Programs (X Clients)&lt;br /&gt;
:Desktop environment&lt;br /&gt;
:Window Manager&lt;br /&gt;
:X Windows&lt;br /&gt;
:Video Hardware&lt;br /&gt;
&lt;br /&gt;
===	X Windows===&lt;br /&gt;
:Developed by Digital Equipment Corporation (DEC) and Massachusetts Institute of Technology (MIT) in 1984&lt;br /&gt;
:Maintained as Open Source Software by the X.Org Foundation&lt;br /&gt;
:The freely available version used in may Linux distributions is called XFree86&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Windows Manager and Desktop Environs===&lt;br /&gt;
&lt;br /&gt;
::Window managers are used to modify the look and feel of X Windows. &lt;br /&gt;
:: Common windows managers can be found on page 370 of your book. &lt;br /&gt;
&lt;br /&gt;
:&#039;&#039;&#039;K Desktop Environment (KDE)&#039;&#039;&#039;&lt;br /&gt;
::Released in 1996&lt;br /&gt;
::Uses K Window Manager (kwin) and Qt toolkit&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;GNOME&#039;&#039;&#039;&lt;br /&gt;
:: Created in 1997&lt;br /&gt;
:: Uses Metacity Window Manager and GTK+ toolkit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Starting and Stopping X Windows===&lt;br /&gt;
&lt;br /&gt;
:*GNOME Display Manager writes the chosen desktop environment in the Session menu to a &#039;&#039;&#039;.dmrc&#039;&#039;&#039; (display manager runtime configuration) file.   &#039;&#039;&#039;/home/user1/.dmrc&#039;&#039;&#039; file&lt;br /&gt;
&lt;br /&gt;
:::[user1@server1 ~]# &#039;&#039;&#039;cat . dmrc&#039;&#039;&#039;  &lt;br /&gt;
:::[Desktop]&lt;br /&gt;
:::Session=kde&lt;br /&gt;
:::[user1@server1 ~]#_&lt;br /&gt;
&lt;br /&gt;
:*Root user in not allowed to log into GNOME Display Manager by default.&lt;br /&gt;
::&#039;&#039;&#039;/etc/pam.d/gdm&#039;&#039;&#039;    and   &#039;&#039;&#039;/etc/pam.d/gdm-password&#039;&#039;&#039;  &lt;br /&gt;
::# auth required pam_succeed_if.so user !=root quiet&lt;br /&gt;
:*GNOME Display Manager can be start manually using the gdm command&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Configuring X Windows==&lt;br /&gt;
&lt;br /&gt;
:X.Org configuration file is /etc/X11/xorg.conf&lt;br /&gt;
:XFree86 configuration file is /etc/X11/XF86Config &lt;br /&gt;
:Mouse-test&lt;br /&gt;
:System-config-keyboard command&lt;br /&gt;
:System-config-display&lt;br /&gt;
:Xvidtune to fine tune vertical and horizontal refresh rate.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Information complied by Robert Klaers, LaPrice Ali, &amp;amp; Sean Benecker&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_8_Study_Guide&amp;diff=5350</id>
		<title>Chapter 8 Study Guide</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Chapter_8_Study_Guide&amp;diff=5350"/>
		<updated>2012-03-16T03:26:23Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: Chapter  8 – System initialization and X-Windows&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;----&lt;br /&gt;
&lt;br /&gt;
==	Boot Process== &lt;br /&gt;
*Power on &lt;br /&gt;
*System initializes&lt;br /&gt;
*BIOS performs POST (power-on self test)&lt;br /&gt;
*BIOS checks configuration and checks for boot devices and an OS to execute&lt;br /&gt;
**   &#039;&#039;Typically floppy disks, CDs, DVDs, and USB devices are checked as they can contain installation media for an OS.&#039;&#039; &lt;br /&gt;
** &#039;&#039;If an OS isn’t found, the BIOS will check the MBR/GPT on the first HD.&#039;&#039; &lt;br /&gt;
** &#039;&#039;MBR/GPT may point to the partition where the boot loader found. If this is the case then the partition where the boot loader is found is called the active partition.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
::: &#039;&#039;&#039;&#039;&#039;See page 347 of the book for the flowchart of the boot process&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
:: &#039;&#039;Boot loader – main purpose is to load the OS kernel into memory.&#039;&#039; &lt;br /&gt;
::: &#039;&#039;&#039;NOTE:&#039;&#039;&#039;  &#039;&#039;There can only be one active partition per HD.&#039;&#039; &lt;br /&gt;
*Regardless of whether the boot loader is loaded from the MBR/GPT or the active partition the rest of the boot process continues as normal.  Which is.. The kernel is executed and loaded into memory. &lt;br /&gt;
*After loading the kernel, the boot loader becomes inactive. &lt;br /&gt;
*Kernel continues by loading daemons into memory&lt;br /&gt;
*Daemons are a system process which performs tasks such as printing scheduling, and OS maintenance. &lt;br /&gt;
**The first daemon process is called the initialize (init) daemon. It’s responsible for loading all the other daemons on the system required to bring the system to a usable state where users can interact with it.&lt;br /&gt;
&lt;br /&gt;
==	Boot Loaders==&lt;br /&gt;
&lt;br /&gt;
:As mentioned, the primary task of boot loaders is to load the OS kernel into memory. They do secondary tasks as well. This includes passing info the kernel during system startup and booting other OS’s which may be on the HD.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
::Using a boot loader to boot one of several OS’s is known as &#039;&#039;&#039;dual booting&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	GRUB===&lt;br /&gt;
:	The most common and only boot loader supported by Fedora 13.&lt;br /&gt;
:3 Stages&lt;br /&gt;
::Stage 1 : Generally resides in MBR/GPT and points to Stage 1.5&lt;br /&gt;
::Stages 1.5 :  Resides in the /boot/grub directory and loads the file support and loads Stage 2&lt;br /&gt;
::Stage 2 : Also, reside in the /boot/grub directory. This part actually performs the boot loader operations and displayed the graphic boot loader screen. &lt;br /&gt;
&lt;br /&gt;
:::	This can be configured by editing the config file found at &#039;&#039;&#039;(/boot/grub/grub.conf)&#039;&#039;&#039;.&lt;br /&gt;
:::		This is read by Stage 2, which is located on the partition called GRUB root partition.&lt;br /&gt;
:::	To be able to read the info in &#039;&#039;&#039;boot/grub/grub.conf&#039;&#039;&#039; you must first understand how GRUB refers to partitions on HDs.  &lt;br /&gt;
:	The format used is :  (&#039;&#039;&#039;hd&amp;lt;drive#&amp;gt;,&amp;lt;partition#&amp;gt;&#039;&#039;&#039;)&lt;br /&gt;
:Examples.		&lt;br /&gt;
::&#039;&#039; (hd0,0)&#039;&#039; = 1st HD , 1st Partition&lt;br /&gt;
::&#039;&#039;(hd0,1)&#039;&#039; = 1st HD , 2nd Partition&lt;br /&gt;
::&#039;&#039;(hd1,2)&#039;&#039; = 2st HD , 3st Partition&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command :&lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda&lt;br /&gt;
&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
&lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command line: &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda &lt;br /&gt;
:You can also use :  &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda1&lt;br /&gt;
: This is used to install GRUB Stage 1 to the front of the 1st primary part of the HD.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	LILO===&lt;br /&gt;
&lt;br /&gt;
:This is the traditional boot loader for Linux.&lt;br /&gt;
::	No longer supported. &lt;br /&gt;
::	Often found on distros which require a smaller boot loader, as well as legacy distros. &lt;br /&gt;
:Can reside on the first sector of an active Linux partition, as with GRUB can be found in the MBR/GPT of the HD. When this is the case, when the computer completes the POST and locates LILO, a LILO boot : prompt appears.  &lt;br /&gt;
:Hitting &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; will display a list of OSs to boot. &lt;br /&gt;
&lt;br /&gt;
::: A list of common &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; keywords used to edit that file can be found on on page 353 of your book.&lt;br /&gt;
&lt;br /&gt;
:As robust as LILO is from time to time you may encounter a problem during loading. When this happens you’ll get an error code representing the problem. &lt;br /&gt;
&lt;br /&gt;
:::A list of commmon LILO error messages can be found on page 354 of your book. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Dual Booting Linux===&lt;br /&gt;
&lt;br /&gt;
:Dual booting is the ability to boot to one of several different Oss which may be available on your computer. Basically the ability to boot a Linux system on the same computer you might also want to use to boot Win 7..or XP. &lt;br /&gt;
&lt;br /&gt;
::You can dual boot using either GRUB or LILO.&lt;br /&gt;
&lt;br /&gt;
::The recommended procedure to install the other OS(s) prior to installing Linux.&lt;br /&gt;
&lt;br /&gt;
::The reason behind this is that Linux will detect the other OS(s) and place the appropriate entry into the boot loader config file.&lt;br /&gt;
&lt;br /&gt;
:LILO cannot boot load the Window kernel directly. &lt;br /&gt;
::It needs the &#039;&#039;other=&#039;&#039; &#039;&#039;&#039;&#039;keyword&#039;&#039;&#039;&#039; in the &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; file to tell it where to find the boot loader for Windows. &lt;br /&gt;
&lt;br /&gt;
:By adding &#039;&#039;optional&#039;&#039;  this prevents the GRUB boot loader from looking for a Linux kernel. This is also followed by the label keyword which just IDs the OS being loaded should you his the &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; key at the LILO prompt.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Alternate way to Dual Boot&#039;&#039;&#039;&lt;br /&gt;
:You can use a Windows Boot Loader (WBL) the same way you can use a Linux Boot Loader. &lt;br /&gt;
&lt;br /&gt;
:As it’s not designed to boot the Linux kernel, you need to go into the WBL and modify some some components &lt;br /&gt;
&lt;br /&gt;
:This can be a bit involved so easier to just install Linux after any other OSs you may also want to Dual Boot. &lt;br /&gt;
:Page 358 details what you would need to do if this is how you want to dual boot. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Linux Initialization==&lt;br /&gt;
&lt;br /&gt;
:After the boot loader loads the Linux OS kernel into memory, the kernel resumes control and executes the first daemon, called &#039;&#039;init&#039;&#039;, on the system.&lt;br /&gt;
&lt;br /&gt;
:: Remember:  &#039;&#039;A daemon is a Linux system process that provides a certain service.&#039;&#039;  &lt;br /&gt;
&lt;br /&gt;
:The init daemon uses configuration file, &#039;&#039;/etc/initab&#039;&#039;  (short for “init table”) to determine the number of daemons that needs to be loaded on the system.&lt;br /&gt;
&lt;br /&gt;
:The init daemon is responsible for uploading daemons that are loaded into memory when the system  is halted or rebooted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runlevels===&lt;br /&gt;
&lt;br /&gt;
:The init  daemon often has to manage several daemons at once.&lt;br /&gt;
&lt;br /&gt;
:Each category is categorized into Runlevels.&lt;br /&gt;
&lt;br /&gt;
:What is a runlevel? A runlevel defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system.&lt;br /&gt;
&lt;br /&gt;
:They are seven standard runlevels:&lt;br /&gt;
::	&#039;&#039;&#039;0&#039;&#039;&#039; ... &#039;&#039;Transitional, Shuts down the system.&#039;&#039; &lt;br /&gt;
:::&#039;&#039;Should completely power down the system.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;1&#039;&#039;&#039;, &#039;&#039;&#039;s&#039;&#039;&#039;, or &#039;&#039;&#039;S&#039;&#039;&#039; ...  &#039;&#039;Single user mode.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for low-level system maintenance impaired by normal system operation.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;2&#039;&#039;&#039; ... &#039;&#039;Full muti-user mode with a graphical login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Debian&#039;&#039;  &lt;br /&gt;
::	&#039;&#039;&#039;3&#039;&#039;&#039; ... &#039;&#039;Full multi-user mode with a console login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Fedora, Mandriva,  Red Hat, and most other distributions.&#039;&#039; &lt;br /&gt;
::	&#039;&#039;&#039;4&#039;&#039;&#039; ... &#039;&#039;Undefined by default&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for customization&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;5&#039;&#039;&#039; ...&#039;&#039; Same as runlevel 3 with the addition of having X run with XDM (graphical) login.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;6&#039;&#039;&#039; ...&#039;&#039;Used to reboot the system.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Also a transitional runlevel.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;To check out the current and/or  previous runlevel.&#039;&#039;&#039;&lt;br /&gt;
:: Type the runlevel command.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::N=nonexistent&lt;br /&gt;
:::5=  current runlevel.&lt;br /&gt;
&lt;br /&gt;
::To change the runlevel from 5 to 1 type command&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # init 1&lt;br /&gt;
&lt;br /&gt;
::If you’re in single mode and you want to change the runlevel from 1 back to 5. Type the following command.:&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  init 5&lt;br /&gt;
&lt;br /&gt;
::The results are&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::[root@server1 ~1] # runlevel&lt;br /&gt;
:::S 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Notice that the runlevel command displays the most current and most recent runlevel.&lt;br /&gt;
:Unless you specify, the init daemon will run the default runlevel indicated in the &#039;&#039;&#039;/etc/inittab file&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runtime config scripts===&lt;br /&gt;
&lt;br /&gt;
:Scripts that run during the boot process.  The purpose is to start daemons and bring the system to a useable state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Configuring Daemon Setup===&lt;br /&gt;
&lt;br /&gt;
:Points  to the appropriate scripts within the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. &lt;br /&gt;
&lt;br /&gt;
:Most Daemon scripts accept the arguments &#039;&#039;&#039;start, stop,&#039;&#039;&#039; and &#039;&#039;&#039;restart&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
:After system startup you can execute them directly from the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;/etc/rc.d/init.d/crond restart&#039;&#039;&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:Or you can use the &#039;&#039;&#039;service command&#039;&#039;&#039; to start, stop or restart any daemons listed in the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. To restart the crond daemon type this.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # service cond restart&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To view and modify daemons that are started in each runlevel, you can use the &#039;&#039;&#039;chkconfig&#039;&#039;&#039; command.&lt;br /&gt;
&lt;br /&gt;
:The chkconfig command views and manipulates the appropriate runtime configuration files in the &#039;&#039;&#039;/etc/rc.d/rc*.d&#039;&#039;&#039; directories.&lt;br /&gt;
&lt;br /&gt;
:For example the following command indicates the ntpd daemon is not started in any runlevel,&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd           0:off 1:off 2:off 3:off 4:off 5:off 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To configure the ntpd daemon to start in runlevels 3 and 5, and to verify the results, you could run the following commands.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – level 35 ntpd on&#039;&#039;&#039;&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd             0:off 1:off 2:off 3:on 4:off 5:on 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	X Windows System==&lt;br /&gt;
:Components of the Linux GUI&lt;br /&gt;
:Graphical Programs (X Clients)&lt;br /&gt;
:Desktop environment&lt;br /&gt;
:Window Manager&lt;br /&gt;
:X Windows&lt;br /&gt;
:Video Hardware&lt;br /&gt;
&lt;br /&gt;
===	X Windows===&lt;br /&gt;
:Developed by Digital Equipment Corporation (DEC) and Massachusetts Institute of Technology (MIT) in 1984&lt;br /&gt;
:Maintained as Open Source Software by the X.Org Foundation&lt;br /&gt;
:The freely available version used in may Linux distributions is called XFree86&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Windows Manager and Desktop Environs===&lt;br /&gt;
&lt;br /&gt;
::Window managers are used to modify the look and feel of X Windows. &lt;br /&gt;
:: Common windows managers can be found on page 370 of your book. &lt;br /&gt;
&lt;br /&gt;
:&#039;&#039;&#039;K Desktop Environment (KDE)&#039;&#039;&#039;&lt;br /&gt;
::Released in 1996&lt;br /&gt;
::Uses K Window Manager (kwin) and Qt toolkit&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;GNOME&#039;&#039;&#039;&lt;br /&gt;
:: Created in 1997&lt;br /&gt;
:: Uses Metacity Window Manager and GTK+ toolkit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Starting and Stopping X Windows===&lt;br /&gt;
&lt;br /&gt;
:*GNOME Display Manager writes the chosen desktop environment in the Session menu to a &#039;&#039;&#039;.dmrc&#039;&#039;&#039; (display manager runtime configuration) file.   &#039;&#039;&#039;/home/user1/.dmrc&#039;&#039;&#039; file&lt;br /&gt;
&lt;br /&gt;
:::[user1@server1 ~]# &#039;&#039;&#039;cat . dmrc&#039;&#039;&#039;  &lt;br /&gt;
:::[Desktop]&lt;br /&gt;
:::Session=kde&lt;br /&gt;
:::[user1@server1 ~]#_&lt;br /&gt;
&lt;br /&gt;
:*Root user in not allowed to log into GNOME Display Manager by default.&lt;br /&gt;
::&#039;&#039;&#039;/etc/pam.d/gdm&#039;&#039;&#039;    and   &#039;&#039;&#039;/etc/pam.d/gdm-password&#039;&#039;&#039;  &lt;br /&gt;
::# auth required pam_succeed_if.so user !=root quiet&lt;br /&gt;
:*GNOME Display Manager can be start manually using the gdm command&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Configuring X Windows==&lt;br /&gt;
&lt;br /&gt;
:X.Org configuration file is /etc/X11/xorg.conf&lt;br /&gt;
:XFree86 configuration file is /etc/X11/XF86Config &lt;br /&gt;
:Mouse-test&lt;br /&gt;
:System-config-keyboard command&lt;br /&gt;
:System-config-display&lt;br /&gt;
:Xvidtune to fine tune vertical and horizontal refresh rate.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Information complied by Robert Klaers, LaPrice Ali, &amp;amp; Sean Benecker&lt;br /&gt;
&lt;br /&gt;
== Chapter  8 – System initialization and X-Windows ==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
==	Boot Process== &lt;br /&gt;
*Power on &lt;br /&gt;
*System initializes&lt;br /&gt;
*BIOS performs POST (power-on self test)&lt;br /&gt;
*BIOS checks configuration and checks for boot devices and an OS to execute&lt;br /&gt;
**   &#039;&#039;Typically floppy disks, CDs, DVDs, and USB devices are checked as they can contain installation media for an OS.&#039;&#039; &lt;br /&gt;
** &#039;&#039;If an OS isn’t found, the BIOS will check the MBR/GPT on the first HD.&#039;&#039; &lt;br /&gt;
** &#039;&#039;MBR/GPT may point to the partition where the boot loader found. If this is the case then the partition where the boot loader is found is called the active partition.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
::: &#039;&#039;&#039;&#039;&#039;See page 347 of the book for the flowchart of the boot process&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
:: &#039;&#039;Boot loader – main purpose is to load the OS kernel into memory.&#039;&#039; &lt;br /&gt;
::: &#039;&#039;&#039;NOTE:&#039;&#039;&#039;  &#039;&#039;There can only be one active partition per HD.&#039;&#039; &lt;br /&gt;
*Regardless of whether the boot loader is loaded from the MBR/GPT or the active partition the rest of the boot process continues as normal.  Which is.. The kernel is executed and loaded into memory. &lt;br /&gt;
*After loading the kernel, the boot loader becomes inactive. &lt;br /&gt;
*Kernel continues by loading daemons into memory&lt;br /&gt;
*Daemons are a system process which performs tasks such as printing scheduling, and OS maintenance. &lt;br /&gt;
**The first daemon process is called the initialize (init) daemon. It’s responsible for loading all the other daemons on the system required to bring the system to a usable state where users can interact with it.&lt;br /&gt;
&lt;br /&gt;
==	Boot Loaders==&lt;br /&gt;
&lt;br /&gt;
:As mentioned, the primary task of boot loaders is to load the OS kernel into memory. They do secondary tasks as well. This includes passing info the kernel during system startup and booting other OS’s which may be on the HD.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
::Using a boot loader to boot one of several OS’s is known as &#039;&#039;&#039;dual booting&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	GRUB===&lt;br /&gt;
:	The most common and only boot loader supported by Fedora 13.&lt;br /&gt;
:3 Stages&lt;br /&gt;
::Stage 1 : Generally resides in MBR/GPT and points to Stage 1.5&lt;br /&gt;
::Stages 1.5 :  Resides in the /boot/grub directory and loads the file support and loads Stage 2&lt;br /&gt;
::Stage 2 : Also, reside in the /boot/grub directory. This part actually performs the boot loader operations and displayed the graphic boot loader screen. &lt;br /&gt;
&lt;br /&gt;
:::	This can be configured by editing the config file found at &#039;&#039;&#039;(/boot/grub/grub.conf)&#039;&#039;&#039;.&lt;br /&gt;
:::		This is read by Stage 2, which is located on the partition called GRUB root partition.&lt;br /&gt;
:::	To be able to read the info in &#039;&#039;&#039;boot/grub/grub.conf&#039;&#039;&#039; you must first understand how GRUB refers to partitions on HDs.  &lt;br /&gt;
:	The format used is :  (&#039;&#039;&#039;hd&amp;lt;drive#&amp;gt;,&amp;lt;partition#&amp;gt;&#039;&#039;&#039;)&lt;br /&gt;
:Examples.		&lt;br /&gt;
::&#039;&#039; (hd0,0)&#039;&#039; = 1st HD , 1st Partition&lt;br /&gt;
::&#039;&#039;(hd0,1)&#039;&#039; = 1st HD , 2nd Partition&lt;br /&gt;
::&#039;&#039;(hd1,2)&#039;&#039; = 2st HD , 3st Partition&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command :&lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda&lt;br /&gt;
&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
&lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command line: &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda &lt;br /&gt;
:You can also use :  &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda1&lt;br /&gt;
: This is used to install GRUB Stage 1 to the front of the 1st primary part of the HD.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	LILO===&lt;br /&gt;
&lt;br /&gt;
:This is the traditional boot loader for Linux.&lt;br /&gt;
::	No longer supported. &lt;br /&gt;
::	Often found on distros which require a smaller boot loader, as well as legacy distros. &lt;br /&gt;
:Can reside on the first sector of an active Linux partition, as with GRUB can be found in the MBR/GPT of the HD. When this is the case, when the computer completes the POST and locates LILO, a LILO boot : prompt appears.  &lt;br /&gt;
:Hitting &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; will display a list of OSs to boot. &lt;br /&gt;
&lt;br /&gt;
::: A list of common &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; keywords used to edit that file can be found on on page 353 of your book.&lt;br /&gt;
&lt;br /&gt;
:As robust as LILO is from time to time you may encounter a problem during loading. When this happens you’ll get an error code representing the problem. &lt;br /&gt;
&lt;br /&gt;
:::A list of commmon LILO error messages can be found on page 354 of your book. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Dual Booting Linux===&lt;br /&gt;
&lt;br /&gt;
:Dual booting is the ability to boot to one of several different Oss which may be available on your computer. Basically the ability to boot a Linux system on the same computer you might also want to use to boot Win 7..or XP. &lt;br /&gt;
&lt;br /&gt;
::You can dual boot using either GRUB or LILO.&lt;br /&gt;
&lt;br /&gt;
::The recommended procedure to install the other OS(s) prior to installing Linux.&lt;br /&gt;
&lt;br /&gt;
::The reason behind this is that Linux will detect the other OS(s) and place the appropriate entry into the boot loader config file.&lt;br /&gt;
&lt;br /&gt;
:LILO cannot boot load the Window kernel directly. &lt;br /&gt;
::It needs the &#039;&#039;other=&#039;&#039; &#039;&#039;&#039;&#039;keyword&#039;&#039;&#039;&#039; in the &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; file to tell it where to find the boot loader for Windows. &lt;br /&gt;
&lt;br /&gt;
:By adding &#039;&#039;optional&#039;&#039;  this prevents the GRUB boot loader from looking for a Linux kernel. This is also followed by the label keyword which just IDs the OS being loaded should you his the &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; key at the LILO prompt.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Alternate way to Dual Boot&#039;&#039;&#039;&lt;br /&gt;
:You can use a Windows Boot Loader (WBL) the same way you can use a Linux Boot Loader. &lt;br /&gt;
&lt;br /&gt;
:As it’s not designed to boot the Linux kernel, you need to go into the WBL and modify some some components &lt;br /&gt;
&lt;br /&gt;
:This can be a bit involved so easier to just install Linux after any other OSs you may also want to Dual Boot. &lt;br /&gt;
:Page 358 details what you would need to do if this is how you want to dual boot. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Linux Initialization==&lt;br /&gt;
&lt;br /&gt;
:After the boot loader loads the Linux OS kernel into memory, the kernel resumes control and executes the first daemon, called &#039;&#039;init&#039;&#039;, on the system.&lt;br /&gt;
&lt;br /&gt;
:: Remember:  &#039;&#039;A daemon is a Linux system process that provides a certain service.&#039;&#039;  &lt;br /&gt;
&lt;br /&gt;
:The init daemon uses configuration file, &#039;&#039;/etc/initab&#039;&#039;  (short for “init table”) to determine the number of daemons that needs to be loaded on the system.&lt;br /&gt;
&lt;br /&gt;
:The init daemon is responsible for uploading daemons that are loaded into memory when the system  is halted or rebooted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runlevels===&lt;br /&gt;
&lt;br /&gt;
:The init  daemon often has to manage several daemons at once.&lt;br /&gt;
&lt;br /&gt;
:Each category is categorized into Runlevels.&lt;br /&gt;
&lt;br /&gt;
:What is a runlevel? A runlevel defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system.&lt;br /&gt;
&lt;br /&gt;
:They are seven standard runlevels:&lt;br /&gt;
::	&#039;&#039;&#039;0&#039;&#039;&#039; ... &#039;&#039;Transitional, Shuts down the system.&#039;&#039; &lt;br /&gt;
:::&#039;&#039;Should completely power down the system.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;1&#039;&#039;&#039;, &#039;&#039;&#039;s&#039;&#039;&#039;, or &#039;&#039;&#039;S&#039;&#039;&#039; ...  &#039;&#039;Single user mode.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for low-level system maintenance impaired by normal system operation.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;2&#039;&#039;&#039; ... &#039;&#039;Full muti-user mode with a graphical login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Debian&#039;&#039;  &lt;br /&gt;
::	&#039;&#039;&#039;3&#039;&#039;&#039; ... &#039;&#039;Full multi-user mode with a console login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Fedora, Mandriva,  Red Hat, and most other distributions.&#039;&#039; &lt;br /&gt;
::	&#039;&#039;&#039;4&#039;&#039;&#039; ... &#039;&#039;Undefined by default&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for customization&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;5&#039;&#039;&#039; ...&#039;&#039; Same as runlevel 3 with the addition of having X run with XDM (graphical) login.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;6&#039;&#039;&#039; ...&#039;&#039;Used to reboot the system.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Also a transitional runlevel.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;To check out the current and/or  previous runlevel.&#039;&#039;&#039;&lt;br /&gt;
:: Type the runlevel command.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::N=nonexistent&lt;br /&gt;
:::5=  current runlevel.&lt;br /&gt;
&lt;br /&gt;
::To change the runlevel from 5 to 1 type command&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # init 1&lt;br /&gt;
&lt;br /&gt;
::If you’re in single mode and you want to change the runlevel from 1 back to 5. Type the following command.:&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  init 5&lt;br /&gt;
&lt;br /&gt;
::The results are&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::[root@server1 ~1] # runlevel&lt;br /&gt;
:::S 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Notice that the runlevel command displays the most current and most recent runlevel.&lt;br /&gt;
:Unless you specify, the init daemon will run the default runlevel indicated in the &#039;&#039;&#039;/etc/inittab file&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runtime config scripts===&lt;br /&gt;
&lt;br /&gt;
:Scripts that run during the boot process.  The purpose is to start daemons and bring the system to a useable state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Configuring Daemon Setup===&lt;br /&gt;
&lt;br /&gt;
:Points  to the appropriate scripts within the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. &lt;br /&gt;
&lt;br /&gt;
:Most Daemon scripts accept the arguments &#039;&#039;&#039;start, stop,&#039;&#039;&#039; and &#039;&#039;&#039;restart&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
:After system startup you can execute them directly from the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;/etc/rc.d/init.d/crond restart&#039;&#039;&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:Or you can use the &#039;&#039;&#039;service command&#039;&#039;&#039; to start, stop or restart any daemons listed in the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. To restart the crond daemon type this.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # service cond restart&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To view and modify daemons that are started in each runlevel, you can use the &#039;&#039;&#039;chkconfig&#039;&#039;&#039; command.&lt;br /&gt;
&lt;br /&gt;
:The chkconfig command views and manipulates the appropriate runtime configuration files in the &#039;&#039;&#039;/etc/rc.d/rc*.d&#039;&#039;&#039; directories.&lt;br /&gt;
&lt;br /&gt;
:For example the following command indicates the ntpd daemon is not started in any runlevel,&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd           0:off 1:off 2:off 3:off 4:off 5:off 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To configure the ntpd daemon to start in runlevels 3 and 5, and to verify the results, you could run the following commands.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – level 35 ntpd on&#039;&#039;&#039;&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd             0:off 1:off 2:off 3:on 4:off 5:on 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	X Windows System==&lt;br /&gt;
:Components of the Linux GUI&lt;br /&gt;
:Graphical Programs (X Clients)&lt;br /&gt;
:Desktop environment&lt;br /&gt;
:Window Manager&lt;br /&gt;
:X Windows&lt;br /&gt;
:Video Hardware&lt;br /&gt;
&lt;br /&gt;
===	X Windows===&lt;br /&gt;
:Developed by Digital Equipment Corporation (DEC) and Massachusetts Institute of Technology (MIT) in 1984&lt;br /&gt;
:Maintained as Open Source Software by the X.Org Foundation&lt;br /&gt;
:The freely available version used in may Linux distributions is called XFree86&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Windows Manager and Desktop Environs===&lt;br /&gt;
&lt;br /&gt;
::Window managers are used to modify the look and feel of X Windows. &lt;br /&gt;
:: Common windows managers can be found on page 370 of your book. &lt;br /&gt;
&lt;br /&gt;
:&#039;&#039;&#039;K Desktop Environment (KDE)&#039;&#039;&#039;&lt;br /&gt;
::Released in 1996&lt;br /&gt;
::Uses K Window Manager (kwin) and Qt toolkit&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;GNOME&#039;&#039;&#039;&lt;br /&gt;
:: Created in 1997&lt;br /&gt;
:: Uses Metacity Window Manager and GTK+ toolkit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Starting and Stopping X Windows===&lt;br /&gt;
&lt;br /&gt;
:*GNOME Display Manager writes the chosen desktop environment in the Session menu to a &#039;&#039;&#039;.dmrc&#039;&#039;&#039; (display manager runtime configuration) file.   &#039;&#039;&#039;/home/user1/.dmrc&#039;&#039;&#039; file&lt;br /&gt;
&lt;br /&gt;
:::[user1@server1 ~]# &#039;&#039;&#039;cat . dmrc&#039;&#039;&#039;  &lt;br /&gt;
:::[Desktop]&lt;br /&gt;
:::Session=kde&lt;br /&gt;
:::[user1@server1 ~]#_&lt;br /&gt;
&lt;br /&gt;
:*Root user in not allowed to log into GNOME Display Manager by default.&lt;br /&gt;
::&#039;&#039;&#039;/etc/pam.d/gdm&#039;&#039;&#039;    and   &#039;&#039;&#039;/etc/pam.d/gdm-password&#039;&#039;&#039;  &lt;br /&gt;
::# auth required pam_succeed_if.so user !=root quiet&lt;br /&gt;
:*GNOME Display Manager can be start manually using the gdm command&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Configuring X Windows==&lt;br /&gt;
&lt;br /&gt;
:X.Org configuration file is /etc/X11/xorg.conf&lt;br /&gt;
:XFree86 configuration file is /etc/X11/XF86Config &lt;br /&gt;
:Mouse-test&lt;br /&gt;
:System-config-keyboard command&lt;br /&gt;
:System-config-display&lt;br /&gt;
:Xvidtune to fine tune vertical and horizontal refresh rate.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Information complied by Robert Klaers, LaPrice Ali, &amp;amp; Sean Benecker&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=User_talk:Klae0010&amp;diff=5349</id>
		<title>User talk:Klae0010</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=User_talk:Klae0010&amp;diff=5349"/>
		<updated>2012-03-16T03:16:44Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: /* Chapter  8 – System initialization and X-Windows */ new section&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
== &#039;&#039;Chapter  8 – System initialization and X-Windows&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
==	Boot Process== &lt;br /&gt;
*Power on &lt;br /&gt;
*System initializes&lt;br /&gt;
*BIOS performs POST (power-on self test)&lt;br /&gt;
*BIOS checks configuration and checks for boot devices and an OS to execute&lt;br /&gt;
**   &#039;&#039;Typically floppy disks, CDs, DVDs, and USB devices are checked as they can contain installation media for an OS.&#039;&#039; &lt;br /&gt;
** &#039;&#039;If an OS isn’t found, the BIOS will check the MBR/GPT on the first HD.&#039;&#039; &lt;br /&gt;
** &#039;&#039;MBR/GPT may point to the partition where the boot loader found. If this is the case then the partition where the boot loader is found is called the active partition.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
::: &#039;&#039;&#039;&#039;&#039;See page 347 of the book for the flowchart of the boot process&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
:: &#039;&#039;Boot loader – main purpose is to load the OS kernel into memory.&#039;&#039; &lt;br /&gt;
::: &#039;&#039;&#039;NOTE:&#039;&#039;&#039;  &#039;&#039;There can only be one active partition per HD.&#039;&#039; &lt;br /&gt;
*Regardless of whether the boot loader is loaded from the MBR/GPT or the active partition the rest of the boot process continues as normal.  Which is.. The kernel is executed and loaded into memory. &lt;br /&gt;
*After loading the kernel, the boot loader becomes inactive. &lt;br /&gt;
*Kernel continues by loading daemons into memory&lt;br /&gt;
*Daemons are a system process which performs tasks such as printing scheduling, and OS maintenance. &lt;br /&gt;
**The first daemon process is called the initialize (init) daemon. It’s responsible for loading all the other daemons on the system required to bring the system to a usable state where users can interact with it.&lt;br /&gt;
&lt;br /&gt;
==	Boot Loaders==&lt;br /&gt;
&lt;br /&gt;
:As mentioned, the primary task of boot loaders is to load the OS kernel into memory. They do secondary tasks as well. This includes passing info the kernel during system startup and booting other OS’s which may be on the HD.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
::Using a boot loader to boot one of several OS’s is known as &#039;&#039;&#039;dual booting&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	GRUB===&lt;br /&gt;
:	The most common and only boot loader supported by Fedora 13.&lt;br /&gt;
:3 Stages&lt;br /&gt;
::Stage 1 : Generally resides in MBR/GPT and points to Stage 1.5&lt;br /&gt;
::Stages 1.5 :  Resides in the /boot/grub directory and loads the file support and loads Stage 2&lt;br /&gt;
::Stage 2 : Also, reside in the /boot/grub directory. This part actually performs the boot loader operations and displayed the graphic boot loader screen. &lt;br /&gt;
&lt;br /&gt;
:::	This can be configured by editing the config file found at &#039;&#039;&#039;(/boot/grub/grub.conf)&#039;&#039;&#039;.&lt;br /&gt;
:::		This is read by Stage 2, which is located on the partition called GRUB root partition.&lt;br /&gt;
:::	To be able to read the info in &#039;&#039;&#039;boot/grub/grub.conf&#039;&#039;&#039; you must first understand how GRUB refers to partitions on HDs.  &lt;br /&gt;
:	The format used is :  (&#039;&#039;&#039;hd&amp;lt;drive#&amp;gt;,&amp;lt;partition#&amp;gt;&#039;&#039;&#039;)&lt;br /&gt;
:Examples.		&lt;br /&gt;
::&#039;&#039; (hd0,0)&#039;&#039; = 1st HD , 1st Partition&lt;br /&gt;
::&#039;&#039;(hd0,1)&#039;&#039; = 1st HD , 2nd Partition&lt;br /&gt;
::&#039;&#039;(hd1,2)&#039;&#039; = 2st HD , 3st Partition&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command :&lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda&lt;br /&gt;
&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
&lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command line: &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda &lt;br /&gt;
:You can also use :  &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda1&lt;br /&gt;
: This is used to install GRUB Stage 1 to the front of the 1st primary part of the HD.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	LILO===&lt;br /&gt;
&lt;br /&gt;
:This is the traditional boot loader for Linux.&lt;br /&gt;
::	No longer supported. &lt;br /&gt;
::	Often found on distros which require a smaller boot loader, as well as legacy distros. &lt;br /&gt;
:Can reside on the first sector of an active Linux partition, as with GRUB can be found in the MBR/GPT of the HD. When this is the case, when the computer completes the POST and locates LILO, a LILO boot : prompt appears.  &lt;br /&gt;
:Hitting &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; will display a list of OSs to boot. &lt;br /&gt;
&lt;br /&gt;
::: A list of common &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; keywords used to edit that file can be found on on page 353 of your book.&lt;br /&gt;
&lt;br /&gt;
:As robust as LILO is from time to time you may encounter a problem during loading. When this happens you’ll get an error code representing the problem. &lt;br /&gt;
&lt;br /&gt;
:::A list of commmon LILO error messages can be found on page 354 of your book. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Dual Booting Linux===&lt;br /&gt;
&lt;br /&gt;
:Dual booting is the ability to boot to one of several different Oss which may be available on your computer. Basically the ability to boot a Linux system on the same computer you might also want to use to boot Win 7..or XP. &lt;br /&gt;
&lt;br /&gt;
::You can dual boot using either GRUB or LILO.&lt;br /&gt;
&lt;br /&gt;
::The recommended procedure to install the other OS(s) prior to installing Linux.&lt;br /&gt;
&lt;br /&gt;
::The reason behind this is that Linux will detect the other OS(s) and place the appropriate entry into the boot loader config file.&lt;br /&gt;
&lt;br /&gt;
:LILO cannot boot load the Window kernel directly. &lt;br /&gt;
::It needs the &#039;&#039;other=&#039;&#039; &#039;&#039;&#039;&#039;keyword&#039;&#039;&#039;&#039; in the &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; file to tell it where to find the boot loader for Windows. &lt;br /&gt;
&lt;br /&gt;
:By adding &#039;&#039;optional&#039;&#039;  this prevents the GRUB boot loader from looking for a Linux kernel. This is also followed by the label keyword which just IDs the OS being loaded should you his the &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; key at the LILO prompt.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Alternate way to Dual Boot&#039;&#039;&#039;&lt;br /&gt;
:You can use a Windows Boot Loader (WBL) the same way you can use a Linux Boot Loader. &lt;br /&gt;
&lt;br /&gt;
:As it’s not designed to boot the Linux kernel, you need to go into the WBL and modify some some components &lt;br /&gt;
&lt;br /&gt;
:This can be a bit involved so easier to just install Linux after any other OSs you may also want to Dual Boot. &lt;br /&gt;
:Page 358 details what you would need to do if this is how you want to dual boot. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Linux Initialization==&lt;br /&gt;
&lt;br /&gt;
:After the boot loader loads the Linux OS kernel into memory, the kernel resumes control and executes the first daemon, called &#039;&#039;init&#039;&#039;, on the system.&lt;br /&gt;
&lt;br /&gt;
:: Remember:  &#039;&#039;A daemon is a Linux system process that provides a certain service.&#039;&#039;  &lt;br /&gt;
&lt;br /&gt;
:The init daemon uses configuration file, &#039;&#039;/etc/initab&#039;&#039;  (short for “init table”) to determine the number of daemons that needs to be loaded on the system.&lt;br /&gt;
&lt;br /&gt;
:The init daemon is responsible for uploading daemons that are loaded into memory when the system  is halted or rebooted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runlevels===&lt;br /&gt;
&lt;br /&gt;
:The init  daemon often has to manage several daemons at once.&lt;br /&gt;
&lt;br /&gt;
:Each category is categorized into Runlevels.&lt;br /&gt;
&lt;br /&gt;
:What is a runlevel? A runlevel defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system.&lt;br /&gt;
&lt;br /&gt;
:They are seven standard runlevels:&lt;br /&gt;
::	&#039;&#039;&#039;0&#039;&#039;&#039; ... &#039;&#039;Transitional, Shuts down the system.&#039;&#039; &lt;br /&gt;
:::&#039;&#039;Should completely power down the system.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;1&#039;&#039;&#039;, &#039;&#039;&#039;s&#039;&#039;&#039;, or &#039;&#039;&#039;S&#039;&#039;&#039; ...  &#039;&#039;Single user mode.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for low-level system maintenance impaired by normal system operation.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;2&#039;&#039;&#039; ... &#039;&#039;Full muti-user mode with a graphical login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Debian&#039;&#039;  &lt;br /&gt;
::	&#039;&#039;&#039;3&#039;&#039;&#039; ... &#039;&#039;Full multi-user mode with a console login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Fedora, Mandriva,  Red Hat, and most other distributions.&#039;&#039; &lt;br /&gt;
::	&#039;&#039;&#039;4&#039;&#039;&#039; ... &#039;&#039;Undefined by default&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for customization&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;5&#039;&#039;&#039; ...&#039;&#039; Same as runlevel 3 with the addition of having X run with XDM (graphical) login.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;6&#039;&#039;&#039; ...&#039;&#039;Used to reboot the system.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Also a transitional runlevel.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;To check out the current and/or  previous runlevel.&#039;&#039;&#039;&lt;br /&gt;
:: Type the runlevel command.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::N=nonexistent&lt;br /&gt;
:::5=  current runlevel.&lt;br /&gt;
&lt;br /&gt;
::To change the runlevel from 5 to 1 type command&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # init 1&lt;br /&gt;
&lt;br /&gt;
::If you’re in single mode and you want to change the runlevel from 1 back to 5. Type the following command.:&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  init 5&lt;br /&gt;
&lt;br /&gt;
::The results are&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::[root@server1 ~1] # runlevel&lt;br /&gt;
:::S 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Notice that the runlevel command displays the most current and most recent runlevel.&lt;br /&gt;
:Unless you specify, the init daemon will run the default runlevel indicated in the &#039;&#039;&#039;/etc/inittab file&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runtime config scripts===&lt;br /&gt;
&lt;br /&gt;
:Scripts that run during the boot process.  The purpose is to start daemons and bring the system to a useable state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Configuring Daemon Setup===&lt;br /&gt;
&lt;br /&gt;
:Points  to the appropriate scripts within the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. &lt;br /&gt;
&lt;br /&gt;
:Most Daemon scripts accept the arguments &#039;&#039;&#039;start, stop,&#039;&#039;&#039; and &#039;&#039;&#039;restart&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
:After system startup you can execute them directly from the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;/etc/rc.d/init.d/crond restart&#039;&#039;&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:Or you can use the &#039;&#039;&#039;service command&#039;&#039;&#039; to start, stop or restart any daemons listed in the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. To restart the crond daemon type this.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # service cond restart&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To view and modify daemons that are started in each runlevel, you can use the &#039;&#039;&#039;chkconfig&#039;&#039;&#039; command.&lt;br /&gt;
&lt;br /&gt;
:The chkconfig command views and manipulates the appropriate runtime configuration files in the &#039;&#039;&#039;/etc/rc.d/rc*.d&#039;&#039;&#039; directories.&lt;br /&gt;
&lt;br /&gt;
:For example the following command indicates the ntpd daemon is not started in any runlevel,&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd           0:off 1:off 2:off 3:off 4:off 5:off 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To configure the ntpd daemon to start in runlevels 3 and 5, and to verify the results, you could run the following commands.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – level 35 ntpd on&#039;&#039;&#039;&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd             0:off 1:off 2:off 3:on 4:off 5:on 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	X Windows System==&lt;br /&gt;
:Components of the Linux GUI&lt;br /&gt;
:Graphical Programs (X Clients)&lt;br /&gt;
:Desktop environment&lt;br /&gt;
:Window Manager&lt;br /&gt;
:X Windows&lt;br /&gt;
:Video Hardware&lt;br /&gt;
&lt;br /&gt;
===	X Windows===&lt;br /&gt;
:Developed by Digital Equipment Corporation (DEC) and Massachusetts Institute of Technology (MIT) in 1984&lt;br /&gt;
:Maintained as Open Source Software by the X.Org Foundation&lt;br /&gt;
:The freely available version used in may Linux distributions is called XFree86&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Windows Manager and Desktop Environs===&lt;br /&gt;
&lt;br /&gt;
::Window managers are used to modify the look and feel of X Windows. &lt;br /&gt;
:: Common windows managers can be found on page 370 of your book. &lt;br /&gt;
&lt;br /&gt;
:&#039;&#039;&#039;K Desktop Environment (KDE)&#039;&#039;&#039;&lt;br /&gt;
::Released in 1996&lt;br /&gt;
::Uses K Window Manager (kwin) and Qt toolkit&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;GNOME&#039;&#039;&#039;&lt;br /&gt;
:: Created in 1997&lt;br /&gt;
:: Uses Metacity Window Manager and GTK+ toolkit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Starting and Stopping X Windows===&lt;br /&gt;
&lt;br /&gt;
:*GNOME Display Manager writes the chosen desktop environment in the Session menu to a &#039;&#039;&#039;.dmrc&#039;&#039;&#039; (display manager runtime configuration) file.   &#039;&#039;&#039;/home/user1/.dmrc&#039;&#039;&#039; file&lt;br /&gt;
&lt;br /&gt;
:::[user1@server1 ~]# &#039;&#039;&#039;cat . dmrc&#039;&#039;&#039;  &lt;br /&gt;
:::[Desktop]&lt;br /&gt;
:::Session=kde&lt;br /&gt;
:::[user1@server1 ~]#_&lt;br /&gt;
&lt;br /&gt;
:*Root user in not allowed to log into GNOME Display Manager by default.&lt;br /&gt;
::&#039;&#039;&#039;/etc/pam.d/gdm&#039;&#039;&#039;    and   &#039;&#039;&#039;/etc/pam.d/gdm-password&#039;&#039;&#039;  &lt;br /&gt;
::# auth required pam_succeed_if.so user !=root quiet&lt;br /&gt;
:*GNOME Display Manager can be start manually using the gdm command&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Configuring X Windows==&lt;br /&gt;
&lt;br /&gt;
:X.Org configuration file is /etc/X11/xorg.conf&lt;br /&gt;
:XFree86 configuration file is /etc/X11/XF86Config &lt;br /&gt;
:Mouse-test&lt;br /&gt;
:System-config-keyboard command&lt;br /&gt;
:System-config-display&lt;br /&gt;
:Xvidtune to fine tune vertical and horizontal refresh rate.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Information complied by Robert Klaers, LaPrice Ali, &amp;amp; Sean Benecker&lt;br /&gt;
&lt;br /&gt;
== Chapter  8 – System initialization and X-Windows ==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
==	Boot Process== &lt;br /&gt;
*Power on &lt;br /&gt;
*System initializes&lt;br /&gt;
*BIOS performs POST (power-on self test)&lt;br /&gt;
*BIOS checks configuration and checks for boot devices and an OS to execute&lt;br /&gt;
**   &#039;&#039;Typically floppy disks, CDs, DVDs, and USB devices are checked as they can contain installation media for an OS.&#039;&#039; &lt;br /&gt;
** &#039;&#039;If an OS isn’t found, the BIOS will check the MBR/GPT on the first HD.&#039;&#039; &lt;br /&gt;
** &#039;&#039;MBR/GPT may point to the partition where the boot loader found. If this is the case then the partition where the boot loader is found is called the active partition.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
::: &#039;&#039;&#039;&#039;&#039;See page 347 of the book for the flowchart of the boot process&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
:: &#039;&#039;Boot loader – main purpose is to load the OS kernel into memory.&#039;&#039; &lt;br /&gt;
::: &#039;&#039;&#039;NOTE:&#039;&#039;&#039;  &#039;&#039;There can only be one active partition per HD.&#039;&#039; &lt;br /&gt;
*Regardless of whether the boot loader is loaded from the MBR/GPT or the active partition the rest of the boot process continues as normal.  Which is.. The kernel is executed and loaded into memory. &lt;br /&gt;
*After loading the kernel, the boot loader becomes inactive. &lt;br /&gt;
*Kernel continues by loading daemons into memory&lt;br /&gt;
*Daemons are a system process which performs tasks such as printing scheduling, and OS maintenance. &lt;br /&gt;
**The first daemon process is called the initialize (init) daemon. It’s responsible for loading all the other daemons on the system required to bring the system to a usable state where users can interact with it.&lt;br /&gt;
&lt;br /&gt;
==	Boot Loaders==&lt;br /&gt;
&lt;br /&gt;
:As mentioned, the primary task of boot loaders is to load the OS kernel into memory. They do secondary tasks as well. This includes passing info the kernel during system startup and booting other OS’s which may be on the HD.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
::Using a boot loader to boot one of several OS’s is known as &#039;&#039;&#039;dual booting&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	GRUB===&lt;br /&gt;
:	The most common and only boot loader supported by Fedora 13.&lt;br /&gt;
:3 Stages&lt;br /&gt;
::Stage 1 : Generally resides in MBR/GPT and points to Stage 1.5&lt;br /&gt;
::Stages 1.5 :  Resides in the /boot/grub directory and loads the file support and loads Stage 2&lt;br /&gt;
::Stage 2 : Also, reside in the /boot/grub directory. This part actually performs the boot loader operations and displayed the graphic boot loader screen. &lt;br /&gt;
&lt;br /&gt;
:::	This can be configured by editing the config file found at &#039;&#039;&#039;(/boot/grub/grub.conf)&#039;&#039;&#039;.&lt;br /&gt;
:::		This is read by Stage 2, which is located on the partition called GRUB root partition.&lt;br /&gt;
:::	To be able to read the info in &#039;&#039;&#039;boot/grub/grub.conf&#039;&#039;&#039; you must first understand how GRUB refers to partitions on HDs.  &lt;br /&gt;
:	The format used is :  (&#039;&#039;&#039;hd&amp;lt;drive#&amp;gt;,&amp;lt;partition#&amp;gt;&#039;&#039;&#039;)&lt;br /&gt;
:Examples.		&lt;br /&gt;
::&#039;&#039; (hd0,0)&#039;&#039; = 1st HD , 1st Partition&lt;br /&gt;
::&#039;&#039;(hd0,1)&#039;&#039; = 1st HD , 2nd Partition&lt;br /&gt;
::&#039;&#039;(hd1,2)&#039;&#039; = 2st HD , 3st Partition&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command :&lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda&lt;br /&gt;
&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
&lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command line: &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda &lt;br /&gt;
:You can also use :  &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda1&lt;br /&gt;
: This is used to install GRUB Stage 1 to the front of the 1st primary part of the HD.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	LILO===&lt;br /&gt;
&lt;br /&gt;
:This is the traditional boot loader for Linux.&lt;br /&gt;
::	No longer supported. &lt;br /&gt;
::	Often found on distros which require a smaller boot loader, as well as legacy distros. &lt;br /&gt;
:Can reside on the first sector of an active Linux partition, as with GRUB can be found in the MBR/GPT of the HD. When this is the case, when the computer completes the POST and locates LILO, a LILO boot : prompt appears.  &lt;br /&gt;
:Hitting &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; will display a list of OSs to boot. &lt;br /&gt;
&lt;br /&gt;
::: A list of common &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; keywords used to edit that file can be found on on page 353 of your book.&lt;br /&gt;
&lt;br /&gt;
:As robust as LILO is from time to time you may encounter a problem during loading. When this happens you’ll get an error code representing the problem. &lt;br /&gt;
&lt;br /&gt;
:::A list of commmon LILO error messages can be found on page 354 of your book. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Dual Booting Linux===&lt;br /&gt;
&lt;br /&gt;
:Dual booting is the ability to boot to one of several different Oss which may be available on your computer. Basically the ability to boot a Linux system on the same computer you might also want to use to boot Win 7..or XP. &lt;br /&gt;
&lt;br /&gt;
::You can dual boot using either GRUB or LILO.&lt;br /&gt;
&lt;br /&gt;
::The recommended procedure to install the other OS(s) prior to installing Linux.&lt;br /&gt;
&lt;br /&gt;
::The reason behind this is that Linux will detect the other OS(s) and place the appropriate entry into the boot loader config file.&lt;br /&gt;
&lt;br /&gt;
:LILO cannot boot load the Window kernel directly. &lt;br /&gt;
::It needs the &#039;&#039;other=&#039;&#039; &#039;&#039;&#039;&#039;keyword&#039;&#039;&#039;&#039; in the &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; file to tell it where to find the boot loader for Windows. &lt;br /&gt;
&lt;br /&gt;
:By adding &#039;&#039;optional&#039;&#039;  this prevents the GRUB boot loader from looking for a Linux kernel. This is also followed by the label keyword which just IDs the OS being loaded should you his the &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; key at the LILO prompt.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Alternate way to Dual Boot&#039;&#039;&#039;&lt;br /&gt;
:You can use a Windows Boot Loader (WBL) the same way you can use a Linux Boot Loader. &lt;br /&gt;
&lt;br /&gt;
:As it’s not designed to boot the Linux kernel, you need to go into the WBL and modify some some components &lt;br /&gt;
&lt;br /&gt;
:This can be a bit involved so easier to just install Linux after any other OSs you may also want to Dual Boot. &lt;br /&gt;
:Page 358 details what you would need to do if this is how you want to dual boot. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Linux Initialization==&lt;br /&gt;
&lt;br /&gt;
:After the boot loader loads the Linux OS kernel into memory, the kernel resumes control and executes the first daemon, called &#039;&#039;init&#039;&#039;, on the system.&lt;br /&gt;
&lt;br /&gt;
:: Remember:  &#039;&#039;A daemon is a Linux system process that provides a certain service.&#039;&#039;  &lt;br /&gt;
&lt;br /&gt;
:The init daemon uses configuration file, &#039;&#039;/etc/initab&#039;&#039;  (short for “init table”) to determine the number of daemons that needs to be loaded on the system.&lt;br /&gt;
&lt;br /&gt;
:The init daemon is responsible for uploading daemons that are loaded into memory when the system  is halted or rebooted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runlevels===&lt;br /&gt;
&lt;br /&gt;
:The init  daemon often has to manage several daemons at once.&lt;br /&gt;
&lt;br /&gt;
:Each category is categorized into Runlevels.&lt;br /&gt;
&lt;br /&gt;
:What is a runlevel? A runlevel defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system.&lt;br /&gt;
&lt;br /&gt;
:They are seven standard runlevels:&lt;br /&gt;
::	&#039;&#039;&#039;0&#039;&#039;&#039; ... &#039;&#039;Transitional, Shuts down the system.&#039;&#039; &lt;br /&gt;
:::&#039;&#039;Should completely power down the system.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;1&#039;&#039;&#039;, &#039;&#039;&#039;s&#039;&#039;&#039;, or &#039;&#039;&#039;S&#039;&#039;&#039; ...  &#039;&#039;Single user mode.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for low-level system maintenance impaired by normal system operation.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;2&#039;&#039;&#039; ... &#039;&#039;Full muti-user mode with a graphical login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Debian&#039;&#039;  &lt;br /&gt;
::	&#039;&#039;&#039;3&#039;&#039;&#039; ... &#039;&#039;Full multi-user mode with a console login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Fedora, Mandriva,  Red Hat, and most other distributions.&#039;&#039; &lt;br /&gt;
::	&#039;&#039;&#039;4&#039;&#039;&#039; ... &#039;&#039;Undefined by default&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for customization&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;5&#039;&#039;&#039; ...&#039;&#039; Same as runlevel 3 with the addition of having X run with XDM (graphical) login.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;6&#039;&#039;&#039; ...&#039;&#039;Used to reboot the system.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Also a transitional runlevel.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;To check out the current and/or  previous runlevel.&#039;&#039;&#039;&lt;br /&gt;
:: Type the runlevel command.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::N=nonexistent&lt;br /&gt;
:::5=  current runlevel.&lt;br /&gt;
&lt;br /&gt;
::To change the runlevel from 5 to 1 type command&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # init 1&lt;br /&gt;
&lt;br /&gt;
::If you’re in single mode and you want to change the runlevel from 1 back to 5. Type the following command.:&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  init 5&lt;br /&gt;
&lt;br /&gt;
::The results are&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::[root@server1 ~1] # runlevel&lt;br /&gt;
:::S 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Notice that the runlevel command displays the most current and most recent runlevel.&lt;br /&gt;
:Unless you specify, the init daemon will run the default runlevel indicated in the &#039;&#039;&#039;/etc/inittab file&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runtime config scripts===&lt;br /&gt;
&lt;br /&gt;
:Scripts that run during the boot process.  The purpose is to start daemons and bring the system to a useable state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Configuring Daemon Setup===&lt;br /&gt;
&lt;br /&gt;
:Points  to the appropriate scripts within the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. &lt;br /&gt;
&lt;br /&gt;
:Most Daemon scripts accept the arguments &#039;&#039;&#039;start, stop,&#039;&#039;&#039; and &#039;&#039;&#039;restart&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
:After system startup you can execute them directly from the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;/etc/rc.d/init.d/crond restart&#039;&#039;&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:Or you can use the &#039;&#039;&#039;service command&#039;&#039;&#039; to start, stop or restart any daemons listed in the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. To restart the crond daemon type this.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # service cond restart&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To view and modify daemons that are started in each runlevel, you can use the &#039;&#039;&#039;chkconfig&#039;&#039;&#039; command.&lt;br /&gt;
&lt;br /&gt;
:The chkconfig command views and manipulates the appropriate runtime configuration files in the &#039;&#039;&#039;/etc/rc.d/rc*.d&#039;&#039;&#039; directories.&lt;br /&gt;
&lt;br /&gt;
:For example the following command indicates the ntpd daemon is not started in any runlevel,&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd           0:off 1:off 2:off 3:off 4:off 5:off 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To configure the ntpd daemon to start in runlevels 3 and 5, and to verify the results, you could run the following commands.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – level 35 ntpd on&#039;&#039;&#039;&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd             0:off 1:off 2:off 3:on 4:off 5:on 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	X Windows System==&lt;br /&gt;
:Components of the Linux GUI&lt;br /&gt;
:Graphical Programs (X Clients)&lt;br /&gt;
:Desktop environment&lt;br /&gt;
:Window Manager&lt;br /&gt;
:X Windows&lt;br /&gt;
:Video Hardware&lt;br /&gt;
&lt;br /&gt;
===	X Windows===&lt;br /&gt;
:Developed by Digital Equipment Corporation (DEC) and Massachusetts Institute of Technology (MIT) in 1984&lt;br /&gt;
:Maintained as Open Source Software by the X.Org Foundation&lt;br /&gt;
:The freely available version used in may Linux distributions is called XFree86&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Windows Manager and Desktop Environs===&lt;br /&gt;
&lt;br /&gt;
::Window managers are used to modify the look and feel of X Windows. &lt;br /&gt;
:: Common windows managers can be found on page 370 of your book. &lt;br /&gt;
&lt;br /&gt;
:&#039;&#039;&#039;K Desktop Environment (KDE)&#039;&#039;&#039;&lt;br /&gt;
::Released in 1996&lt;br /&gt;
::Uses K Window Manager (kwin) and Qt toolkit&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;GNOME&#039;&#039;&#039;&lt;br /&gt;
:: Created in 1997&lt;br /&gt;
:: Uses Metacity Window Manager and GTK+ toolkit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Starting and Stopping X Windows===&lt;br /&gt;
&lt;br /&gt;
:*GNOME Display Manager writes the chosen desktop environment in the Session menu to a &#039;&#039;&#039;.dmrc&#039;&#039;&#039; (display manager runtime configuration) file.   &#039;&#039;&#039;/home/user1/.dmrc&#039;&#039;&#039; file&lt;br /&gt;
&lt;br /&gt;
:::[user1@server1 ~]# &#039;&#039;&#039;cat . dmrc&#039;&#039;&#039;  &lt;br /&gt;
:::[Desktop]&lt;br /&gt;
:::Session=kde&lt;br /&gt;
:::[user1@server1 ~]#_&lt;br /&gt;
&lt;br /&gt;
:*Root user in not allowed to log into GNOME Display Manager by default.&lt;br /&gt;
::&#039;&#039;&#039;/etc/pam.d/gdm&#039;&#039;&#039;    and   &#039;&#039;&#039;/etc/pam.d/gdm-password&#039;&#039;&#039;  &lt;br /&gt;
::# auth required pam_succeed_if.so user !=root quiet&lt;br /&gt;
:*GNOME Display Manager can be start manually using the gdm command&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Configuring X Windows==&lt;br /&gt;
&lt;br /&gt;
:X.Org configuration file is /etc/X11/xorg.conf&lt;br /&gt;
:XFree86 configuration file is /etc/X11/XF86Config &lt;br /&gt;
:Mouse-test&lt;br /&gt;
:System-config-keyboard command&lt;br /&gt;
:System-config-display&lt;br /&gt;
:Xvidtune to fine tune vertical and horizontal refresh rate.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Information complied by Robert Klaers, LaPrice Ali, &amp;amp; Sean Benecker&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=User_talk:Klae0010&amp;diff=5348</id>
		<title>User talk:Klae0010</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=User_talk:Klae0010&amp;diff=5348"/>
		<updated>2012-03-16T03:15:33Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: /* Chapter  8 – System initialization and X-Windows */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
== &#039;&#039;Chapter  8 – System initialization and X-Windows&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
==	Boot Process== &lt;br /&gt;
*Power on &lt;br /&gt;
*System initializes&lt;br /&gt;
*BIOS performs POST (power-on self test)&lt;br /&gt;
*BIOS checks configuration and checks for boot devices and an OS to execute&lt;br /&gt;
**   &#039;&#039;Typically floppy disks, CDs, DVDs, and USB devices are checked as they can contain installation media for an OS.&#039;&#039; &lt;br /&gt;
** &#039;&#039;If an OS isn’t found, the BIOS will check the MBR/GPT on the first HD.&#039;&#039; &lt;br /&gt;
** &#039;&#039;MBR/GPT may point to the partition where the boot loader found. If this is the case then the partition where the boot loader is found is called the active partition.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
::: &#039;&#039;&#039;&#039;&#039;See page 347 of the book for the flowchart of the boot process&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
:: &#039;&#039;Boot loader – main purpose is to load the OS kernel into memory.&#039;&#039; &lt;br /&gt;
::: &#039;&#039;&#039;NOTE:&#039;&#039;&#039;  &#039;&#039;There can only be one active partition per HD.&#039;&#039; &lt;br /&gt;
*Regardless of whether the boot loader is loaded from the MBR/GPT or the active partition the rest of the boot process continues as normal.  Which is.. The kernel is executed and loaded into memory. &lt;br /&gt;
*After loading the kernel, the boot loader becomes inactive. &lt;br /&gt;
*Kernel continues by loading daemons into memory&lt;br /&gt;
*Daemons are a system process which performs tasks such as printing scheduling, and OS maintenance. &lt;br /&gt;
**The first daemon process is called the initialize (init) daemon. It’s responsible for loading all the other daemons on the system required to bring the system to a usable state where users can interact with it.&lt;br /&gt;
&lt;br /&gt;
==	Boot Loaders==&lt;br /&gt;
&lt;br /&gt;
:As mentioned, the primary task of boot loaders is to load the OS kernel into memory. They do secondary tasks as well. This includes passing info the kernel during system startup and booting other OS’s which may be on the HD.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
::Using a boot loader to boot one of several OS’s is known as &#039;&#039;&#039;dual booting&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	GRUB===&lt;br /&gt;
:	The most common and only boot loader supported by Fedora 13.&lt;br /&gt;
:3 Stages&lt;br /&gt;
::Stage 1 : Generally resides in MBR/GPT and points to Stage 1.5&lt;br /&gt;
::Stages 1.5 :  Resides in the /boot/grub directory and loads the file support and loads Stage 2&lt;br /&gt;
::Stage 2 : Also, reside in the /boot/grub directory. This part actually performs the boot loader operations and displayed the graphic boot loader screen. &lt;br /&gt;
&lt;br /&gt;
:::	This can be configured by editing the config file found at &#039;&#039;&#039;(/boot/grub/grub.conf)&#039;&#039;&#039;.&lt;br /&gt;
:::		This is read by Stage 2, which is located on the partition called GRUB root partition.&lt;br /&gt;
:::	To be able to read the info in &#039;&#039;&#039;boot/grub/grub.conf&#039;&#039;&#039; you must first understand how GRUB refers to partitions on HDs.  &lt;br /&gt;
:	The format used is :  (&#039;&#039;&#039;hd&amp;lt;drive#&amp;gt;,&amp;lt;partition#&amp;gt;&#039;&#039;&#039;)&lt;br /&gt;
:Examples.		&lt;br /&gt;
::&#039;&#039; (hd0,0)&#039;&#039; = 1st HD , 1st Partition&lt;br /&gt;
::&#039;&#039;(hd0,1)&#039;&#039; = 1st HD , 2nd Partition&lt;br /&gt;
::&#039;&#039;(hd1,2)&#039;&#039; = 2st HD , 3st Partition&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command :&lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda&lt;br /&gt;
&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
&lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command line: &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda &lt;br /&gt;
:You can also use :  &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda1&lt;br /&gt;
: This is used to install GRUB Stage 1 to the front of the 1st primary part of the HD.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	LILO===&lt;br /&gt;
&lt;br /&gt;
:This is the traditional boot loader for Linux.&lt;br /&gt;
::	No longer supported. &lt;br /&gt;
::	Often found on distros which require a smaller boot loader, as well as legacy distros. &lt;br /&gt;
:Can reside on the first sector of an active Linux partition, as with GRUB can be found in the MBR/GPT of the HD. When this is the case, when the computer completes the POST and locates LILO, a LILO boot : prompt appears.  &lt;br /&gt;
:Hitting &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; will display a list of OSs to boot. &lt;br /&gt;
&lt;br /&gt;
::: A list of common &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; keywords used to edit that file can be found on on page 353 of your book.&lt;br /&gt;
&lt;br /&gt;
:As robust as LILO is from time to time you may encounter a problem during loading. When this happens you’ll get an error code representing the problem. &lt;br /&gt;
&lt;br /&gt;
:::A list of commmon LILO error messages can be found on page 354 of your book. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Dual Booting Linux===&lt;br /&gt;
&lt;br /&gt;
:Dual booting is the ability to boot to one of several different Oss which may be available on your computer. Basically the ability to boot a Linux system on the same computer you might also want to use to boot Win 7..or XP. &lt;br /&gt;
&lt;br /&gt;
::You can dual boot using either GRUB or LILO.&lt;br /&gt;
&lt;br /&gt;
::The recommended procedure to install the other OS(s) prior to installing Linux.&lt;br /&gt;
&lt;br /&gt;
::The reason behind this is that Linux will detect the other OS(s) and place the appropriate entry into the boot loader config file.&lt;br /&gt;
&lt;br /&gt;
:LILO cannot boot load the Window kernel directly. &lt;br /&gt;
::It needs the &#039;&#039;other=&#039;&#039; &#039;&#039;&#039;&#039;keyword&#039;&#039;&#039;&#039; in the &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; file to tell it where to find the boot loader for Windows. &lt;br /&gt;
&lt;br /&gt;
:By adding &#039;&#039;optional&#039;&#039;  this prevents the GRUB boot loader from looking for a Linux kernel. This is also followed by the label keyword which just IDs the OS being loaded should you his the &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; key at the LILO prompt.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Alternate way to Dual Boot&#039;&#039;&#039;&lt;br /&gt;
:You can use a Windows Boot Loader (WBL) the same way you can use a Linux Boot Loader. &lt;br /&gt;
&lt;br /&gt;
:As it’s not designed to boot the Linux kernel, you need to go into the WBL and modify some some components &lt;br /&gt;
&lt;br /&gt;
:This can be a bit involved so easier to just install Linux after any other OSs you may also want to Dual Boot. &lt;br /&gt;
:Page 358 details what you would need to do if this is how you want to dual boot. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Linux Initialization==&lt;br /&gt;
&lt;br /&gt;
:After the boot loader loads the Linux OS kernel into memory, the kernel resumes control and executes the first daemon, called &#039;&#039;init&#039;&#039;, on the system.&lt;br /&gt;
&lt;br /&gt;
:: Remember:  &#039;&#039;A daemon is a Linux system process that provides a certain service.&#039;&#039;  &lt;br /&gt;
&lt;br /&gt;
:The init daemon uses configuration file, &#039;&#039;/etc/initab&#039;&#039;  (short for “init table”) to determine the number of daemons that needs to be loaded on the system.&lt;br /&gt;
&lt;br /&gt;
:The init daemon is responsible for uploading daemons that are loaded into memory when the system  is halted or rebooted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runlevels===&lt;br /&gt;
&lt;br /&gt;
:The init  daemon often has to manage several daemons at once.&lt;br /&gt;
&lt;br /&gt;
:Each category is categorized into Runlevels.&lt;br /&gt;
&lt;br /&gt;
:What is a runlevel? A runlevel defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system.&lt;br /&gt;
&lt;br /&gt;
:They are seven standard runlevels:&lt;br /&gt;
::	&#039;&#039;&#039;0&#039;&#039;&#039; ... &#039;&#039;Transitional, Shuts down the system.&#039;&#039; &lt;br /&gt;
:::&#039;&#039;Should completely power down the system.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;1&#039;&#039;&#039;, &#039;&#039;&#039;s&#039;&#039;&#039;, or &#039;&#039;&#039;S&#039;&#039;&#039; ...  &#039;&#039;Single user mode.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for low-level system maintenance impaired by normal system operation.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;2&#039;&#039;&#039; ... &#039;&#039;Full muti-user mode with a graphical login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Debian&#039;&#039;  &lt;br /&gt;
::	&#039;&#039;&#039;3&#039;&#039;&#039; ... &#039;&#039;Full multi-user mode with a console login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Fedora, Mandriva,  Red Hat, and most other distributions.&#039;&#039; &lt;br /&gt;
::	&#039;&#039;&#039;4&#039;&#039;&#039; ... &#039;&#039;Undefined by default&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for customization&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;5&#039;&#039;&#039; ...&#039;&#039; Same as runlevel 3 with the addition of having X run with XDM (graphical) login.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;6&#039;&#039;&#039; ...&#039;&#039;Used to reboot the system.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Also a transitional runlevel.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;To check out the current and/or  previous runlevel.&#039;&#039;&#039;&lt;br /&gt;
:: Type the runlevel command.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::N=nonexistent&lt;br /&gt;
:::5=  current runlevel.&lt;br /&gt;
&lt;br /&gt;
::To change the runlevel from 5 to 1 type command&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # init 1&lt;br /&gt;
&lt;br /&gt;
::If you’re in single mode and you want to change the runlevel from 1 back to 5. Type the following command.:&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  init 5&lt;br /&gt;
&lt;br /&gt;
::The results are&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::[root@server1 ~1] # runlevel&lt;br /&gt;
:::S 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Notice that the runlevel command displays the most current and most recent runlevel.&lt;br /&gt;
:Unless you specify, the init daemon will run the default runlevel indicated in the &#039;&#039;&#039;/etc/inittab file&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runtime config scripts===&lt;br /&gt;
&lt;br /&gt;
:Scripts that run during the boot process.  The purpose is to start daemons and bring the system to a useable state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Configuring Daemon Setup===&lt;br /&gt;
&lt;br /&gt;
:Points  to the appropriate scripts within the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. &lt;br /&gt;
&lt;br /&gt;
:Most Daemon scripts accept the arguments &#039;&#039;&#039;start, stop,&#039;&#039;&#039; and &#039;&#039;&#039;restart&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
:After system startup you can execute them directly from the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;/etc/rc.d/init.d/crond restart&#039;&#039;&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:Or you can use the &#039;&#039;&#039;service command&#039;&#039;&#039; to start, stop or restart any daemons listed in the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. To restart the crond daemon type this.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # service cond restart&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To view and modify daemons that are started in each runlevel, you can use the &#039;&#039;&#039;chkconfig&#039;&#039;&#039; command.&lt;br /&gt;
&lt;br /&gt;
:The chkconfig command views and manipulates the appropriate runtime configuration files in the &#039;&#039;&#039;/etc/rc.d/rc*.d&#039;&#039;&#039; directories.&lt;br /&gt;
&lt;br /&gt;
:For example the following command indicates the ntpd daemon is not started in any runlevel,&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd           0:off 1:off 2:off 3:off 4:off 5:off 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To configure the ntpd daemon to start in runlevels 3 and 5, and to verify the results, you could run the following commands.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – level 35 ntpd on&#039;&#039;&#039;&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd             0:off 1:off 2:off 3:on 4:off 5:on 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	X Windows System==&lt;br /&gt;
:Components of the Linux GUI&lt;br /&gt;
:Graphical Programs (X Clients)&lt;br /&gt;
:Desktop environment&lt;br /&gt;
:Window Manager&lt;br /&gt;
:X Windows&lt;br /&gt;
:Video Hardware&lt;br /&gt;
&lt;br /&gt;
===	X Windows===&lt;br /&gt;
:Developed by Digital Equipment Corporation (DEC) and Massachusetts Institute of Technology (MIT) in 1984&lt;br /&gt;
:Maintained as Open Source Software by the X.Org Foundation&lt;br /&gt;
:The freely available version used in may Linux distributions is called XFree86&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Windows Manager and Desktop Environs===&lt;br /&gt;
&lt;br /&gt;
::Window managers are used to modify the look and feel of X Windows. &lt;br /&gt;
:: Common windows managers can be found on page 370 of your book. &lt;br /&gt;
&lt;br /&gt;
:&#039;&#039;&#039;K Desktop Environment (KDE)&#039;&#039;&#039;&lt;br /&gt;
::Released in 1996&lt;br /&gt;
::Uses K Window Manager (kwin) and Qt toolkit&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;GNOME&#039;&#039;&#039;&lt;br /&gt;
:: Created in 1997&lt;br /&gt;
:: Uses Metacity Window Manager and GTK+ toolkit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Starting and Stopping X Windows===&lt;br /&gt;
&lt;br /&gt;
:*GNOME Display Manager writes the chosen desktop environment in the Session menu to a &#039;&#039;&#039;.dmrc&#039;&#039;&#039; (display manager runtime configuration) file.   &#039;&#039;&#039;/home/user1/.dmrc&#039;&#039;&#039; file&lt;br /&gt;
&lt;br /&gt;
:::[user1@server1 ~]# &#039;&#039;&#039;cat . dmrc&#039;&#039;&#039;  &lt;br /&gt;
:::[Desktop]&lt;br /&gt;
:::Session=kde&lt;br /&gt;
:::[user1@server1 ~]#_&lt;br /&gt;
&lt;br /&gt;
:*Root user in not allowed to log into GNOME Display Manager by default.&lt;br /&gt;
::&#039;&#039;&#039;/etc/pam.d/gdm&#039;&#039;&#039;    and   &#039;&#039;&#039;/etc/pam.d/gdm-password&#039;&#039;&#039;  &lt;br /&gt;
::# auth required pam_succeed_if.so user !=root quiet&lt;br /&gt;
:*GNOME Display Manager can be start manually using the gdm command&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Configuring X Windows==&lt;br /&gt;
&lt;br /&gt;
:X.Org configuration file is /etc/X11/xorg.conf&lt;br /&gt;
:XFree86 configuration file is /etc/X11/XF86Config &lt;br /&gt;
:Mouse-test&lt;br /&gt;
:System-config-keyboard command&lt;br /&gt;
:System-config-display&lt;br /&gt;
:Xvidtune to fine tune vertical and horizontal refresh rate.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Information complied by Robert Klaers, LaPrice Ali, &amp;amp; Sean Benecker&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=User_talk:Klae0010&amp;diff=5347</id>
		<title>User talk:Klae0010</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=User_talk:Klae0010&amp;diff=5347"/>
		<updated>2012-03-16T03:15:05Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: /* Chapter  8 – System initialization and X-Windows */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;Chapter  8 – System initialization and X-Windows&#039;&#039; ==&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==	Boot Process== &lt;br /&gt;
*Power on &lt;br /&gt;
*System initializes&lt;br /&gt;
*BIOS performs POST (power-on self test)&lt;br /&gt;
*BIOS checks configuration and checks for boot devices and an OS to execute&lt;br /&gt;
**   &#039;&#039;Typically floppy disks, CDs, DVDs, and USB devices are checked as they can contain installation media for an OS.&#039;&#039; &lt;br /&gt;
** &#039;&#039;If an OS isn’t found, the BIOS will check the MBR/GPT on the first HD.&#039;&#039; &lt;br /&gt;
** &#039;&#039;MBR/GPT may point to the partition where the boot loader found. If this is the case then the partition where the boot loader is found is called the active partition.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
::: &#039;&#039;&#039;&#039;&#039;See page 347 of the book for the flowchart of the boot process&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
:: &#039;&#039;Boot loader – main purpose is to load the OS kernel into memory.&#039;&#039; &lt;br /&gt;
::: &#039;&#039;&#039;NOTE:&#039;&#039;&#039;  &#039;&#039;There can only be one active partition per HD.&#039;&#039; &lt;br /&gt;
*Regardless of whether the boot loader is loaded from the MBR/GPT or the active partition the rest of the boot process continues as normal.  Which is.. The kernel is executed and loaded into memory. &lt;br /&gt;
*After loading the kernel, the boot loader becomes inactive. &lt;br /&gt;
*Kernel continues by loading daemons into memory&lt;br /&gt;
*Daemons are a system process which performs tasks such as printing scheduling, and OS maintenance. &lt;br /&gt;
**The first daemon process is called the initialize (init) daemon. It’s responsible for loading all the other daemons on the system required to bring the system to a usable state where users can interact with it.&lt;br /&gt;
&lt;br /&gt;
==	Boot Loaders==&lt;br /&gt;
&lt;br /&gt;
:As mentioned, the primary task of boot loaders is to load the OS kernel into memory. They do secondary tasks as well. This includes passing info the kernel during system startup and booting other OS’s which may be on the HD.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
::Using a boot loader to boot one of several OS’s is known as &#039;&#039;&#039;dual booting&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	GRUB===&lt;br /&gt;
:	The most common and only boot loader supported by Fedora 13.&lt;br /&gt;
:3 Stages&lt;br /&gt;
::Stage 1 : Generally resides in MBR/GPT and points to Stage 1.5&lt;br /&gt;
::Stages 1.5 :  Resides in the /boot/grub directory and loads the file support and loads Stage 2&lt;br /&gt;
::Stage 2 : Also, reside in the /boot/grub directory. This part actually performs the boot loader operations and displayed the graphic boot loader screen. &lt;br /&gt;
&lt;br /&gt;
:::	This can be configured by editing the config file found at &#039;&#039;&#039;(/boot/grub/grub.conf)&#039;&#039;&#039;.&lt;br /&gt;
:::		This is read by Stage 2, which is located on the partition called GRUB root partition.&lt;br /&gt;
:::	To be able to read the info in &#039;&#039;&#039;boot/grub/grub.conf&#039;&#039;&#039; you must first understand how GRUB refers to partitions on HDs.  &lt;br /&gt;
:	The format used is :  (&#039;&#039;&#039;hd&amp;lt;drive#&amp;gt;,&amp;lt;partition#&amp;gt;&#039;&#039;&#039;)&lt;br /&gt;
:Examples.		&lt;br /&gt;
::&#039;&#039; (hd0,0)&#039;&#039; = 1st HD , 1st Partition&lt;br /&gt;
::&#039;&#039;(hd0,1)&#039;&#039; = 1st HD , 2nd Partition&lt;br /&gt;
::&#039;&#039;(hd1,2)&#039;&#039; = 2st HD , 3st Partition&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command :&lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda&lt;br /&gt;
&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
&lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command line: &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda &lt;br /&gt;
:You can also use :  &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda1&lt;br /&gt;
: This is used to install GRUB Stage 1 to the front of the 1st primary part of the HD.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	LILO===&lt;br /&gt;
&lt;br /&gt;
:This is the traditional boot loader for Linux.&lt;br /&gt;
::	No longer supported. &lt;br /&gt;
::	Often found on distros which require a smaller boot loader, as well as legacy distros. &lt;br /&gt;
:Can reside on the first sector of an active Linux partition, as with GRUB can be found in the MBR/GPT of the HD. When this is the case, when the computer completes the POST and locates LILO, a LILO boot : prompt appears.  &lt;br /&gt;
:Hitting &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; will display a list of OSs to boot. &lt;br /&gt;
&lt;br /&gt;
::: A list of common &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; keywords used to edit that file can be found on on page 353 of your book.&lt;br /&gt;
&lt;br /&gt;
:As robust as LILO is from time to time you may encounter a problem during loading. When this happens you’ll get an error code representing the problem. &lt;br /&gt;
&lt;br /&gt;
:::A list of commmon LILO error messages can be found on page 354 of your book. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Dual Booting Linux===&lt;br /&gt;
&lt;br /&gt;
:Dual booting is the ability to boot to one of several different Oss which may be available on your computer. Basically the ability to boot a Linux system on the same computer you might also want to use to boot Win 7..or XP. &lt;br /&gt;
&lt;br /&gt;
::You can dual boot using either GRUB or LILO.&lt;br /&gt;
&lt;br /&gt;
::The recommended procedure to install the other OS(s) prior to installing Linux.&lt;br /&gt;
&lt;br /&gt;
::The reason behind this is that Linux will detect the other OS(s) and place the appropriate entry into the boot loader config file.&lt;br /&gt;
&lt;br /&gt;
:LILO cannot boot load the Window kernel directly. &lt;br /&gt;
::It needs the &#039;&#039;other=&#039;&#039; &#039;&#039;&#039;&#039;keyword&#039;&#039;&#039;&#039; in the &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; file to tell it where to find the boot loader for Windows. &lt;br /&gt;
&lt;br /&gt;
:By adding &#039;&#039;optional&#039;&#039;  this prevents the GRUB boot loader from looking for a Linux kernel. This is also followed by the label keyword which just IDs the OS being loaded should you his the &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; key at the LILO prompt.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Alternate way to Dual Boot&#039;&#039;&#039;&lt;br /&gt;
:You can use a Windows Boot Loader (WBL) the same way you can use a Linux Boot Loader. &lt;br /&gt;
&lt;br /&gt;
:As it’s not designed to boot the Linux kernel, you need to go into the WBL and modify some some components &lt;br /&gt;
&lt;br /&gt;
:This can be a bit involved so easier to just install Linux after any other OSs you may also want to Dual Boot. &lt;br /&gt;
:Page 358 details what you would need to do if this is how you want to dual boot. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Linux Initialization==&lt;br /&gt;
&lt;br /&gt;
:After the boot loader loads the Linux OS kernel into memory, the kernel resumes control and executes the first daemon, called &#039;&#039;init&#039;&#039;, on the system.&lt;br /&gt;
&lt;br /&gt;
:: Remember:  &#039;&#039;A daemon is a Linux system process that provides a certain service.&#039;&#039;  &lt;br /&gt;
&lt;br /&gt;
:The init daemon uses configuration file, &#039;&#039;/etc/initab&#039;&#039;  (short for “init table”) to determine the number of daemons that needs to be loaded on the system.&lt;br /&gt;
&lt;br /&gt;
:The init daemon is responsible for uploading daemons that are loaded into memory when the system  is halted or rebooted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runlevels===&lt;br /&gt;
&lt;br /&gt;
:The init  daemon often has to manage several daemons at once.&lt;br /&gt;
&lt;br /&gt;
:Each category is categorized into Runlevels.&lt;br /&gt;
&lt;br /&gt;
:What is a runlevel? A runlevel defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system.&lt;br /&gt;
&lt;br /&gt;
:They are seven standard runlevels:&lt;br /&gt;
::	&#039;&#039;&#039;0&#039;&#039;&#039; ... &#039;&#039;Transitional, Shuts down the system.&#039;&#039; &lt;br /&gt;
:::&#039;&#039;Should completely power down the system.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;1&#039;&#039;&#039;, &#039;&#039;&#039;s&#039;&#039;&#039;, or &#039;&#039;&#039;S&#039;&#039;&#039; ...  &#039;&#039;Single user mode.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for low-level system maintenance impaired by normal system operation.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;2&#039;&#039;&#039; ... &#039;&#039;Full muti-user mode with a graphical login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Debian&#039;&#039;  &lt;br /&gt;
::	&#039;&#039;&#039;3&#039;&#039;&#039; ... &#039;&#039;Full multi-user mode with a console login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Fedora, Mandriva,  Red Hat, and most other distributions.&#039;&#039; &lt;br /&gt;
::	&#039;&#039;&#039;4&#039;&#039;&#039; ... &#039;&#039;Undefined by default&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for customization&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;5&#039;&#039;&#039; ...&#039;&#039; Same as runlevel 3 with the addition of having X run with XDM (graphical) login.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;6&#039;&#039;&#039; ...&#039;&#039;Used to reboot the system.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Also a transitional runlevel.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;To check out the current and/or  previous runlevel.&#039;&#039;&#039;&lt;br /&gt;
:: Type the runlevel command.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::N=nonexistent&lt;br /&gt;
:::5=  current runlevel.&lt;br /&gt;
&lt;br /&gt;
::To change the runlevel from 5 to 1 type command&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # init 1&lt;br /&gt;
&lt;br /&gt;
::If you’re in single mode and you want to change the runlevel from 1 back to 5. Type the following command.:&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  init 5&lt;br /&gt;
&lt;br /&gt;
::The results are&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::[root@server1 ~1] # runlevel&lt;br /&gt;
:::S 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Notice that the runlevel command displays the most current and most recent runlevel.&lt;br /&gt;
:Unless you specify, the init daemon will run the default runlevel indicated in the &#039;&#039;&#039;/etc/inittab file&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runtime config scripts===&lt;br /&gt;
&lt;br /&gt;
:Scripts that run during the boot process.  The purpose is to start daemons and bring the system to a useable state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Configuring Daemon Setup===&lt;br /&gt;
&lt;br /&gt;
:Points  to the appropriate scripts within the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. &lt;br /&gt;
&lt;br /&gt;
:Most Daemon scripts accept the arguments &#039;&#039;&#039;start, stop,&#039;&#039;&#039; and &#039;&#039;&#039;restart&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
:After system startup you can execute them directly from the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;/etc/rc.d/init.d/crond restart&#039;&#039;&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:Or you can use the &#039;&#039;&#039;service command&#039;&#039;&#039; to start, stop or restart any daemons listed in the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. To restart the crond daemon type this.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # service cond restart&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To view and modify daemons that are started in each runlevel, you can use the &#039;&#039;&#039;chkconfig&#039;&#039;&#039; command.&lt;br /&gt;
&lt;br /&gt;
:The chkconfig command views and manipulates the appropriate runtime configuration files in the &#039;&#039;&#039;/etc/rc.d/rc*.d&#039;&#039;&#039; directories.&lt;br /&gt;
&lt;br /&gt;
:For example the following command indicates the ntpd daemon is not started in any runlevel,&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd           0:off 1:off 2:off 3:off 4:off 5:off 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To configure the ntpd daemon to start in runlevels 3 and 5, and to verify the results, you could run the following commands.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – level 35 ntpd on&#039;&#039;&#039;&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd             0:off 1:off 2:off 3:on 4:off 5:on 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	X Windows System==&lt;br /&gt;
:Components of the Linux GUI&lt;br /&gt;
:Graphical Programs (X Clients)&lt;br /&gt;
:Desktop environment&lt;br /&gt;
:Window Manager&lt;br /&gt;
:X Windows&lt;br /&gt;
:Video Hardware&lt;br /&gt;
&lt;br /&gt;
===	X Windows===&lt;br /&gt;
:Developed by Digital Equipment Corporation (DEC) and Massachusetts Institute of Technology (MIT) in 1984&lt;br /&gt;
:Maintained as Open Source Software by the X.Org Foundation&lt;br /&gt;
:The freely available version used in may Linux distributions is called XFree86&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Windows Manager and Desktop Environs===&lt;br /&gt;
&lt;br /&gt;
::Window managers are used to modify the look and feel of X Windows. &lt;br /&gt;
:: Common windows managers can be found on page 370 of your book. &lt;br /&gt;
&lt;br /&gt;
:&#039;&#039;&#039;K Desktop Environment (KDE)&#039;&#039;&#039;&lt;br /&gt;
::Released in 1996&lt;br /&gt;
::Uses K Window Manager (kwin) and Qt toolkit&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;GNOME&#039;&#039;&#039;&lt;br /&gt;
:: Created in 1997&lt;br /&gt;
:: Uses Metacity Window Manager and GTK+ toolkit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Starting and Stopping X Windows===&lt;br /&gt;
&lt;br /&gt;
:*GNOME Display Manager writes the chosen desktop environment in the Session menu to a &#039;&#039;&#039;.dmrc&#039;&#039;&#039; (display manager runtime configuration) file.   &#039;&#039;&#039;/home/user1/.dmrc&#039;&#039;&#039; file&lt;br /&gt;
&lt;br /&gt;
:::[user1@server1 ~]# &#039;&#039;&#039;cat . dmrc&#039;&#039;&#039;  &lt;br /&gt;
:::[Desktop]&lt;br /&gt;
:::Session=kde&lt;br /&gt;
:::[user1@server1 ~]#_&lt;br /&gt;
&lt;br /&gt;
:*Root user in not allowed to log into GNOME Display Manager by default.&lt;br /&gt;
::&#039;&#039;&#039;/etc/pam.d/gdm&#039;&#039;&#039;    and   &#039;&#039;&#039;/etc/pam.d/gdm-password&#039;&#039;&#039;  &lt;br /&gt;
::# auth required pam_succeed_if.so user !=root quiet&lt;br /&gt;
:*GNOME Display Manager can be start manually using the gdm command&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Configuring X Windows==&lt;br /&gt;
&lt;br /&gt;
:X.Org configuration file is /etc/X11/xorg.conf&lt;br /&gt;
:XFree86 configuration file is /etc/X11/XF86Config &lt;br /&gt;
:Mouse-test&lt;br /&gt;
:System-config-keyboard command&lt;br /&gt;
:System-config-display&lt;br /&gt;
:Xvidtune to fine tune vertical and horizontal refresh rate.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Information complied by Robert Klaers, LaPrice Ali, &amp;amp; Sean Benecker&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=User_talk:Klae0010&amp;diff=5346</id>
		<title>User talk:Klae0010</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=User_talk:Klae0010&amp;diff=5346"/>
		<updated>2012-03-16T03:14:41Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Chapter  8 – System initialization and X-Windows=&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==	Boot Process== &lt;br /&gt;
*Power on &lt;br /&gt;
*System initializes&lt;br /&gt;
*BIOS performs POST (power-on self test)&lt;br /&gt;
*BIOS checks configuration and checks for boot devices and an OS to execute&lt;br /&gt;
**   &#039;&#039;Typically floppy disks, CDs, DVDs, and USB devices are checked as they can contain installation media for an OS.&#039;&#039; &lt;br /&gt;
** &#039;&#039;If an OS isn’t found, the BIOS will check the MBR/GPT on the first HD.&#039;&#039; &lt;br /&gt;
** &#039;&#039;MBR/GPT may point to the partition where the boot loader found. If this is the case then the partition where the boot loader is found is called the active partition.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
::: &#039;&#039;&#039;&#039;&#039;See page 347 of the book for the flowchart of the boot process&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
:: &#039;&#039;Boot loader – main purpose is to load the OS kernel into memory.&#039;&#039; &lt;br /&gt;
::: &#039;&#039;&#039;NOTE:&#039;&#039;&#039;  &#039;&#039;There can only be one active partition per HD.&#039;&#039; &lt;br /&gt;
*Regardless of whether the boot loader is loaded from the MBR/GPT or the active partition the rest of the boot process continues as normal.  Which is.. The kernel is executed and loaded into memory. &lt;br /&gt;
*After loading the kernel, the boot loader becomes inactive. &lt;br /&gt;
*Kernel continues by loading daemons into memory&lt;br /&gt;
*Daemons are a system process which performs tasks such as printing scheduling, and OS maintenance. &lt;br /&gt;
**The first daemon process is called the initialize (init) daemon. It’s responsible for loading all the other daemons on the system required to bring the system to a usable state where users can interact with it.&lt;br /&gt;
&lt;br /&gt;
==	Boot Loaders==&lt;br /&gt;
&lt;br /&gt;
:As mentioned, the primary task of boot loaders is to load the OS kernel into memory. They do secondary tasks as well. This includes passing info the kernel during system startup and booting other OS’s which may be on the HD.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
::Using a boot loader to boot one of several OS’s is known as &#039;&#039;&#039;dual booting&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	GRUB===&lt;br /&gt;
:	The most common and only boot loader supported by Fedora 13.&lt;br /&gt;
:3 Stages&lt;br /&gt;
::Stage 1 : Generally resides in MBR/GPT and points to Stage 1.5&lt;br /&gt;
::Stages 1.5 :  Resides in the /boot/grub directory and loads the file support and loads Stage 2&lt;br /&gt;
::Stage 2 : Also, reside in the /boot/grub directory. This part actually performs the boot loader operations and displayed the graphic boot loader screen. &lt;br /&gt;
&lt;br /&gt;
:::	This can be configured by editing the config file found at &#039;&#039;&#039;(/boot/grub/grub.conf)&#039;&#039;&#039;.&lt;br /&gt;
:::		This is read by Stage 2, which is located on the partition called GRUB root partition.&lt;br /&gt;
:::	To be able to read the info in &#039;&#039;&#039;boot/grub/grub.conf&#039;&#039;&#039; you must first understand how GRUB refers to partitions on HDs.  &lt;br /&gt;
:	The format used is :  (&#039;&#039;&#039;hd&amp;lt;drive#&amp;gt;,&amp;lt;partition#&amp;gt;&#039;&#039;&#039;)&lt;br /&gt;
:Examples.		&lt;br /&gt;
::&#039;&#039; (hd0,0)&#039;&#039; = 1st HD , 1st Partition&lt;br /&gt;
::&#039;&#039;(hd0,1)&#039;&#039; = 1st HD , 2nd Partition&lt;br /&gt;
::&#039;&#039;(hd1,2)&#039;&#039; = 2st HD , 3st Partition&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command :&lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda&lt;br /&gt;
&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
&lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command line: &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda &lt;br /&gt;
:You can also use :  &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda1&lt;br /&gt;
: This is used to install GRUB Stage 1 to the front of the 1st primary part of the HD.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	LILO===&lt;br /&gt;
&lt;br /&gt;
:This is the traditional boot loader for Linux.&lt;br /&gt;
::	No longer supported. &lt;br /&gt;
::	Often found on distros which require a smaller boot loader, as well as legacy distros. &lt;br /&gt;
:Can reside on the first sector of an active Linux partition, as with GRUB can be found in the MBR/GPT of the HD. When this is the case, when the computer completes the POST and locates LILO, a LILO boot : prompt appears.  &lt;br /&gt;
:Hitting &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; will display a list of OSs to boot. &lt;br /&gt;
&lt;br /&gt;
::: A list of common &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; keywords used to edit that file can be found on on page 353 of your book.&lt;br /&gt;
&lt;br /&gt;
:As robust as LILO is from time to time you may encounter a problem during loading. When this happens you’ll get an error code representing the problem. &lt;br /&gt;
&lt;br /&gt;
:::A list of commmon LILO error messages can be found on page 354 of your book. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Dual Booting Linux===&lt;br /&gt;
&lt;br /&gt;
:Dual booting is the ability to boot to one of several different Oss which may be available on your computer. Basically the ability to boot a Linux system on the same computer you might also want to use to boot Win 7..or XP. &lt;br /&gt;
&lt;br /&gt;
::You can dual boot using either GRUB or LILO.&lt;br /&gt;
&lt;br /&gt;
::The recommended procedure to install the other OS(s) prior to installing Linux.&lt;br /&gt;
&lt;br /&gt;
::The reason behind this is that Linux will detect the other OS(s) and place the appropriate entry into the boot loader config file.&lt;br /&gt;
&lt;br /&gt;
:LILO cannot boot load the Window kernel directly. &lt;br /&gt;
::It needs the &#039;&#039;other=&#039;&#039; &#039;&#039;&#039;&#039;keyword&#039;&#039;&#039;&#039; in the &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; file to tell it where to find the boot loader for Windows. &lt;br /&gt;
&lt;br /&gt;
:By adding &#039;&#039;optional&#039;&#039;  this prevents the GRUB boot loader from looking for a Linux kernel. This is also followed by the label keyword which just IDs the OS being loaded should you his the &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; key at the LILO prompt.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Alternate way to Dual Boot&#039;&#039;&#039;&lt;br /&gt;
:You can use a Windows Boot Loader (WBL) the same way you can use a Linux Boot Loader. &lt;br /&gt;
&lt;br /&gt;
:As it’s not designed to boot the Linux kernel, you need to go into the WBL and modify some some components &lt;br /&gt;
&lt;br /&gt;
:This can be a bit involved so easier to just install Linux after any other OSs you may also want to Dual Boot. &lt;br /&gt;
:Page 358 details what you would need to do if this is how you want to dual boot. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Linux Initialization==&lt;br /&gt;
&lt;br /&gt;
:After the boot loader loads the Linux OS kernel into memory, the kernel resumes control and executes the first daemon, called &#039;&#039;init&#039;&#039;, on the system.&lt;br /&gt;
&lt;br /&gt;
:: Remember:  &#039;&#039;A daemon is a Linux system process that provides a certain service.&#039;&#039;  &lt;br /&gt;
&lt;br /&gt;
:The init daemon uses configuration file, &#039;&#039;/etc/initab&#039;&#039;  (short for “init table”) to determine the number of daemons that needs to be loaded on the system.&lt;br /&gt;
&lt;br /&gt;
:The init daemon is responsible for uploading daemons that are loaded into memory when the system  is halted or rebooted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runlevels===&lt;br /&gt;
&lt;br /&gt;
:The init  daemon often has to manage several daemons at once.&lt;br /&gt;
&lt;br /&gt;
:Each category is categorized into Runlevels.&lt;br /&gt;
&lt;br /&gt;
:What is a runlevel? A runlevel defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system.&lt;br /&gt;
&lt;br /&gt;
:They are seven standard runlevels:&lt;br /&gt;
::	&#039;&#039;&#039;0&#039;&#039;&#039; ... &#039;&#039;Transitional, Shuts down the system.&#039;&#039; &lt;br /&gt;
:::&#039;&#039;Should completely power down the system.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;1&#039;&#039;&#039;, &#039;&#039;&#039;s&#039;&#039;&#039;, or &#039;&#039;&#039;S&#039;&#039;&#039; ...  &#039;&#039;Single user mode.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for low-level system maintenance impaired by normal system operation.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;2&#039;&#039;&#039; ... &#039;&#039;Full muti-user mode with a graphical login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Debian&#039;&#039;  &lt;br /&gt;
::	&#039;&#039;&#039;3&#039;&#039;&#039; ... &#039;&#039;Full multi-user mode with a console login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Fedora, Mandriva,  Red Hat, and most other distributions.&#039;&#039; &lt;br /&gt;
::	&#039;&#039;&#039;4&#039;&#039;&#039; ... &#039;&#039;Undefined by default&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for customization&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;5&#039;&#039;&#039; ...&#039;&#039; Same as runlevel 3 with the addition of having X run with XDM (graphical) login.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;6&#039;&#039;&#039; ...&#039;&#039;Used to reboot the system.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Also a transitional runlevel.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;To check out the current and/or  previous runlevel.&#039;&#039;&#039;&lt;br /&gt;
:: Type the runlevel command.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::N=nonexistent&lt;br /&gt;
:::5=  current runlevel.&lt;br /&gt;
&lt;br /&gt;
::To change the runlevel from 5 to 1 type command&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # init 1&lt;br /&gt;
&lt;br /&gt;
::If you’re in single mode and you want to change the runlevel from 1 back to 5. Type the following command.:&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  init 5&lt;br /&gt;
&lt;br /&gt;
::The results are&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::[root@server1 ~1] # runlevel&lt;br /&gt;
:::S 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Notice that the runlevel command displays the most current and most recent runlevel.&lt;br /&gt;
:Unless you specify, the init daemon will run the default runlevel indicated in the &#039;&#039;&#039;/etc/inittab file&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runtime config scripts===&lt;br /&gt;
&lt;br /&gt;
:Scripts that run during the boot process.  The purpose is to start daemons and bring the system to a useable state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Configuring Daemon Setup===&lt;br /&gt;
&lt;br /&gt;
:Points  to the appropriate scripts within the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. &lt;br /&gt;
&lt;br /&gt;
:Most Daemon scripts accept the arguments &#039;&#039;&#039;start, stop,&#039;&#039;&#039; and &#039;&#039;&#039;restart&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
:After system startup you can execute them directly from the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;/etc/rc.d/init.d/crond restart&#039;&#039;&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:Or you can use the &#039;&#039;&#039;service command&#039;&#039;&#039; to start, stop or restart any daemons listed in the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. To restart the crond daemon type this.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # service cond restart&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To view and modify daemons that are started in each runlevel, you can use the &#039;&#039;&#039;chkconfig&#039;&#039;&#039; command.&lt;br /&gt;
&lt;br /&gt;
:The chkconfig command views and manipulates the appropriate runtime configuration files in the &#039;&#039;&#039;/etc/rc.d/rc*.d&#039;&#039;&#039; directories.&lt;br /&gt;
&lt;br /&gt;
:For example the following command indicates the ntpd daemon is not started in any runlevel,&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd           0:off 1:off 2:off 3:off 4:off 5:off 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To configure the ntpd daemon to start in runlevels 3 and 5, and to verify the results, you could run the following commands.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – level 35 ntpd on&#039;&#039;&#039;&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd             0:off 1:off 2:off 3:on 4:off 5:on 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	X Windows System==&lt;br /&gt;
:Components of the Linux GUI&lt;br /&gt;
:Graphical Programs (X Clients)&lt;br /&gt;
:Desktop environment&lt;br /&gt;
:Window Manager&lt;br /&gt;
:X Windows&lt;br /&gt;
:Video Hardware&lt;br /&gt;
&lt;br /&gt;
===	X Windows===&lt;br /&gt;
:Developed by Digital Equipment Corporation (DEC) and Massachusetts Institute of Technology (MIT) in 1984&lt;br /&gt;
:Maintained as Open Source Software by the X.Org Foundation&lt;br /&gt;
:The freely available version used in may Linux distributions is called XFree86&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Windows Manager and Desktop Environs===&lt;br /&gt;
&lt;br /&gt;
::Window managers are used to modify the look and feel of X Windows. &lt;br /&gt;
:: Common windows managers can be found on page 370 of your book. &lt;br /&gt;
&lt;br /&gt;
:&#039;&#039;&#039;K Desktop Environment (KDE)&#039;&#039;&#039;&lt;br /&gt;
::Released in 1996&lt;br /&gt;
::Uses K Window Manager (kwin) and Qt toolkit&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;GNOME&#039;&#039;&#039;&lt;br /&gt;
:: Created in 1997&lt;br /&gt;
:: Uses Metacity Window Manager and GTK+ toolkit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Starting and Stopping X Windows===&lt;br /&gt;
&lt;br /&gt;
:*GNOME Display Manager writes the chosen desktop environment in the Session menu to a &#039;&#039;&#039;.dmrc&#039;&#039;&#039; (display manager runtime configuration) file.   &#039;&#039;&#039;/home/user1/.dmrc&#039;&#039;&#039; file&lt;br /&gt;
&lt;br /&gt;
:::[user1@server1 ~]# &#039;&#039;&#039;cat . dmrc&#039;&#039;&#039;  &lt;br /&gt;
:::[Desktop]&lt;br /&gt;
:::Session=kde&lt;br /&gt;
:::[user1@server1 ~]#_&lt;br /&gt;
&lt;br /&gt;
:*Root user in not allowed to log into GNOME Display Manager by default.&lt;br /&gt;
::&#039;&#039;&#039;/etc/pam.d/gdm&#039;&#039;&#039;    and   &#039;&#039;&#039;/etc/pam.d/gdm-password&#039;&#039;&#039;  &lt;br /&gt;
::# auth required pam_succeed_if.so user !=root quiet&lt;br /&gt;
:*GNOME Display Manager can be start manually using the gdm command&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Configuring X Windows==&lt;br /&gt;
&lt;br /&gt;
:X.Org configuration file is /etc/X11/xorg.conf&lt;br /&gt;
:XFree86 configuration file is /etc/X11/XF86Config &lt;br /&gt;
:Mouse-test&lt;br /&gt;
:System-config-keyboard command&lt;br /&gt;
:System-config-display&lt;br /&gt;
:Xvidtune to fine tune vertical and horizontal refresh rate.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Information complied by Robert Klaers, LaPrice Ali, &amp;amp; Sean Benecker&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=User_talk:Klae0010&amp;diff=5345</id>
		<title>User talk:Klae0010</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=User_talk:Klae0010&amp;diff=5345"/>
		<updated>2012-03-16T03:13:30Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Chapter  8 – System initialization and X-Windows&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
==	Boot Process== &lt;br /&gt;
*Power on &lt;br /&gt;
*System initializes&lt;br /&gt;
*BIOS performs POST (power-on self test)&lt;br /&gt;
*BIOS checks configuration and checks for boot devices and an OS to execute&lt;br /&gt;
**   &#039;&#039;Typically floppy disks, CDs, DVDs, and USB devices are checked as they can contain installation media for an OS.&#039;&#039; &lt;br /&gt;
** &#039;&#039;If an OS isn’t found, the BIOS will check the MBR/GPT on the first HD.&#039;&#039; &lt;br /&gt;
** &#039;&#039;MBR/GPT may point to the partition where the boot loader found. If this is the case then the partition where the boot loader is found is called the active partition.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
::: &#039;&#039;&#039;&#039;&#039;See page 347 of the book for the flowchart of the boot process&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
:: &#039;&#039;Boot loader – main purpose is to load the OS kernel into memory.&#039;&#039; &lt;br /&gt;
::: &#039;&#039;&#039;NOTE:&#039;&#039;&#039;  &#039;&#039;There can only be one active partition per HD.&#039;&#039; &lt;br /&gt;
*Regardless of whether the boot loader is loaded from the MBR/GPT or the active partition the rest of the boot process continues as normal.  Which is.. The kernel is executed and loaded into memory. &lt;br /&gt;
*After loading the kernel, the boot loader becomes inactive. &lt;br /&gt;
*Kernel continues by loading daemons into memory&lt;br /&gt;
*Daemons are a system process which performs tasks such as printing scheduling, and OS maintenance. &lt;br /&gt;
**The first daemon process is called the initialize (init) daemon. It’s responsible for loading all the other daemons on the system required to bring the system to a usable state where users can interact with it.&lt;br /&gt;
&lt;br /&gt;
==	Boot Loaders==&lt;br /&gt;
&lt;br /&gt;
:As mentioned, the primary task of boot loaders is to load the OS kernel into memory. They do secondary tasks as well. This includes passing info the kernel during system startup and booting other OS’s which may be on the HD.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
::Using a boot loader to boot one of several OS’s is known as &#039;&#039;&#039;dual booting&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	GRUB===&lt;br /&gt;
:	The most common and only boot loader supported by Fedora 13.&lt;br /&gt;
:3 Stages&lt;br /&gt;
::Stage 1 : Generally resides in MBR/GPT and points to Stage 1.5&lt;br /&gt;
::Stages 1.5 :  Resides in the /boot/grub directory and loads the file support and loads Stage 2&lt;br /&gt;
::Stage 2 : Also, reside in the /boot/grub directory. This part actually performs the boot loader operations and displayed the graphic boot loader screen. &lt;br /&gt;
&lt;br /&gt;
:::	This can be configured by editing the config file found at &#039;&#039;&#039;(/boot/grub/grub.conf)&#039;&#039;&#039;.&lt;br /&gt;
:::		This is read by Stage 2, which is located on the partition called GRUB root partition.&lt;br /&gt;
:::	To be able to read the info in &#039;&#039;&#039;boot/grub/grub.conf&#039;&#039;&#039; you must first understand how GRUB refers to partitions on HDs.  &lt;br /&gt;
:	The format used is :  (&#039;&#039;&#039;hd&amp;lt;drive#&amp;gt;,&amp;lt;partition#&amp;gt;&#039;&#039;&#039;)&lt;br /&gt;
:Examples.		&lt;br /&gt;
::&#039;&#039; (hd0,0)&#039;&#039; = 1st HD , 1st Partition&lt;br /&gt;
::&#039;&#039;(hd0,1)&#039;&#039; = 1st HD , 2nd Partition&lt;br /&gt;
::&#039;&#039;(hd1,2)&#039;&#039; = 2st HD , 3st Partition&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command :&lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda&lt;br /&gt;
&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
&lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command line: &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda &lt;br /&gt;
:You can also use :  &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda1&lt;br /&gt;
: This is used to install GRUB Stage 1 to the front of the 1st primary part of the HD.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	LILO===&lt;br /&gt;
&lt;br /&gt;
:This is the traditional boot loader for Linux.&lt;br /&gt;
::	No longer supported. &lt;br /&gt;
::	Often found on distros which require a smaller boot loader, as well as legacy distros. &lt;br /&gt;
:Can reside on the first sector of an active Linux partition, as with GRUB can be found in the MBR/GPT of the HD. When this is the case, when the computer completes the POST and locates LILO, a LILO boot : prompt appears.  &lt;br /&gt;
:Hitting &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; will display a list of OSs to boot. &lt;br /&gt;
&lt;br /&gt;
::: A list of common &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; keywords used to edit that file can be found on on page 353 of your book.&lt;br /&gt;
&lt;br /&gt;
:As robust as LILO is from time to time you may encounter a problem during loading. When this happens you’ll get an error code representing the problem. &lt;br /&gt;
&lt;br /&gt;
:::A list of commmon LILO error messages can be found on page 354 of your book. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Dual Booting Linux===&lt;br /&gt;
&lt;br /&gt;
:Dual booting is the ability to boot to one of several different Oss which may be available on your computer. Basically the ability to boot a Linux system on the same computer you might also want to use to boot Win 7..or XP. &lt;br /&gt;
&lt;br /&gt;
::You can dual boot using either GRUB or LILO.&lt;br /&gt;
&lt;br /&gt;
::The recommended procedure to install the other OS(s) prior to installing Linux.&lt;br /&gt;
&lt;br /&gt;
::The reason behind this is that Linux will detect the other OS(s) and place the appropriate entry into the boot loader config file.&lt;br /&gt;
&lt;br /&gt;
:LILO cannot boot load the Window kernel directly. &lt;br /&gt;
::It needs the &#039;&#039;other=&#039;&#039; &#039;&#039;&#039;&#039;keyword&#039;&#039;&#039;&#039; in the &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; file to tell it where to find the boot loader for Windows. &lt;br /&gt;
&lt;br /&gt;
:By adding &#039;&#039;optional&#039;&#039;  this prevents the GRUB boot loader from looking for a Linux kernel. This is also followed by the label keyword which just IDs the OS being loaded should you his the &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; key at the LILO prompt.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Alternate way to Dual Boot&#039;&#039;&#039;&lt;br /&gt;
:You can use a Windows Boot Loader (WBL) the same way you can use a Linux Boot Loader. &lt;br /&gt;
&lt;br /&gt;
:As it’s not designed to boot the Linux kernel, you need to go into the WBL and modify some some components &lt;br /&gt;
&lt;br /&gt;
:This can be a bit involved so easier to just install Linux after any other OSs you may also want to Dual Boot. &lt;br /&gt;
:Page 358 details what you would need to do if this is how you want to dual boot. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Linux Initialization==&lt;br /&gt;
&lt;br /&gt;
:After the boot loader loads the Linux OS kernel into memory, the kernel resumes control and executes the first daemon, called &#039;&#039;init&#039;&#039;, on the system.&lt;br /&gt;
&lt;br /&gt;
:: Remember:  &#039;&#039;A daemon is a Linux system process that provides a certain service.&#039;&#039;  &lt;br /&gt;
&lt;br /&gt;
:The init daemon uses configuration file, &#039;&#039;/etc/initab&#039;&#039;  (short for “init table”) to determine the number of daemons that needs to be loaded on the system.&lt;br /&gt;
&lt;br /&gt;
:The init daemon is responsible for uploading daemons that are loaded into memory when the system  is halted or rebooted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runlevels===&lt;br /&gt;
&lt;br /&gt;
:The init  daemon often has to manage several daemons at once.&lt;br /&gt;
&lt;br /&gt;
:Each category is categorized into Runlevels.&lt;br /&gt;
&lt;br /&gt;
:What is a runlevel? A runlevel defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system.&lt;br /&gt;
&lt;br /&gt;
:They are seven standard runlevels:&lt;br /&gt;
::	&#039;&#039;&#039;0&#039;&#039;&#039; ... &#039;&#039;Transitional, Shuts down the system.&#039;&#039; &lt;br /&gt;
:::&#039;&#039;Should completely power down the system.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;1&#039;&#039;&#039;, &#039;&#039;&#039;s&#039;&#039;&#039;, or &#039;&#039;&#039;S&#039;&#039;&#039; ...  &#039;&#039;Single user mode.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for low-level system maintenance impaired by normal system operation.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;2&#039;&#039;&#039; ... &#039;&#039;Full muti-user mode with a graphical login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Debian&#039;&#039;  &lt;br /&gt;
::	&#039;&#039;&#039;3&#039;&#039;&#039; ... &#039;&#039;Full multi-user mode with a console login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Fedora, Mandriva,  Red Hat, and most other distributions.&#039;&#039; &lt;br /&gt;
::	&#039;&#039;&#039;4&#039;&#039;&#039; ... &#039;&#039;Undefined by default&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for customization&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;5&#039;&#039;&#039; ...&#039;&#039; Same as runlevel 3 with the addition of having X run with XDM (graphical) login.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;6&#039;&#039;&#039; ...&#039;&#039;Used to reboot the system.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Also a transitional runlevel.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;To check out the current and/or  previous runlevel.&#039;&#039;&#039;&lt;br /&gt;
:: Type the runlevel command.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::N=nonexistent&lt;br /&gt;
:::5=  current runlevel.&lt;br /&gt;
&lt;br /&gt;
::To change the runlevel from 5 to 1 type command&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # init 1&lt;br /&gt;
&lt;br /&gt;
::If you’re in single mode and you want to change the runlevel from 1 back to 5. Type the following command.:&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  init 5&lt;br /&gt;
&lt;br /&gt;
::The results are&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::[root@server1 ~1] # runlevel&lt;br /&gt;
:::S 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Notice that the runlevel command displays the most current and most recent runlevel.&lt;br /&gt;
:Unless you specify, the init daemon will run the default runlevel indicated in the &#039;&#039;&#039;/etc/inittab file&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runtime config scripts===&lt;br /&gt;
&lt;br /&gt;
:Scripts that run during the boot process.  The purpose is to start daemons and bring the system to a useable state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Configuring Daemon Setup===&lt;br /&gt;
&lt;br /&gt;
:Points  to the appropriate scripts within the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. &lt;br /&gt;
&lt;br /&gt;
:Most Daemon scripts accept the arguments &#039;&#039;&#039;start, stop,&#039;&#039;&#039; and &#039;&#039;&#039;restart&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
:After system startup you can execute them directly from the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;/etc/rc.d/init.d/crond restart&#039;&#039;&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:Or you can use the &#039;&#039;&#039;service command&#039;&#039;&#039; to start, stop or restart any daemons listed in the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. To restart the crond daemon type this.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # service cond restart&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To view and modify daemons that are started in each runlevel, you can use the &#039;&#039;&#039;chkconfig&#039;&#039;&#039; command.&lt;br /&gt;
&lt;br /&gt;
:The chkconfig command views and manipulates the appropriate runtime configuration files in the &#039;&#039;&#039;/etc/rc.d/rc*.d&#039;&#039;&#039; directories.&lt;br /&gt;
&lt;br /&gt;
:For example the following command indicates the ntpd daemon is not started in any runlevel,&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd           0:off 1:off 2:off 3:off 4:off 5:off 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To configure the ntpd daemon to start in runlevels 3 and 5, and to verify the results, you could run the following commands.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – level 35 ntpd on&#039;&#039;&#039;&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd             0:off 1:off 2:off 3:on 4:off 5:on 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	X Windows System==&lt;br /&gt;
:Components of the Linux GUI&lt;br /&gt;
:Graphical Programs (X Clients)&lt;br /&gt;
:Desktop environment&lt;br /&gt;
:Window Manager&lt;br /&gt;
:X Windows&lt;br /&gt;
:Video Hardware&lt;br /&gt;
&lt;br /&gt;
===	X Windows===&lt;br /&gt;
:Developed by Digital Equipment Corporation (DEC) and Massachusetts Institute of Technology (MIT) in 1984&lt;br /&gt;
:Maintained as Open Source Software by the X.Org Foundation&lt;br /&gt;
:The freely available version used in may Linux distributions is called XFree86&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Windows Manager and Desktop Environs===&lt;br /&gt;
&lt;br /&gt;
::Window managers are used to modify the look and feel of X Windows. &lt;br /&gt;
:: Common windows managers can be found on page 370 of your book. &lt;br /&gt;
&lt;br /&gt;
:&#039;&#039;&#039;K Desktop Environment (KDE)&#039;&#039;&#039;&lt;br /&gt;
::Released in 1996&lt;br /&gt;
::Uses K Window Manager (kwin) and Qt toolkit&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;GNOME&#039;&#039;&#039;&lt;br /&gt;
:: Created in 1997&lt;br /&gt;
:: Uses Metacity Window Manager and GTK+ toolkit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Starting and Stopping X Windows===&lt;br /&gt;
&lt;br /&gt;
:*GNOME Display Manager writes the chosen desktop environment in the Session menu to a &#039;&#039;&#039;.dmrc&#039;&#039;&#039; (display manager runtime configuration) file.   &#039;&#039;&#039;/home/user1/.dmrc&#039;&#039;&#039; file&lt;br /&gt;
&lt;br /&gt;
:::[user1@server1 ~]# &#039;&#039;&#039;cat . dmrc&#039;&#039;&#039;  &lt;br /&gt;
:::[Desktop]&lt;br /&gt;
:::Session=kde&lt;br /&gt;
:::[user1@server1 ~]#_&lt;br /&gt;
&lt;br /&gt;
:*Root user in not allowed to log into GNOME Display Manager by default.&lt;br /&gt;
::&#039;&#039;&#039;/etc/pam.d/gdm&#039;&#039;&#039;    and   &#039;&#039;&#039;/etc/pam.d/gdm-password&#039;&#039;&#039;  &lt;br /&gt;
::# auth required pam_succeed_if.so user !=root quiet&lt;br /&gt;
:*GNOME Display Manager can be start manually using the gdm command&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Configuring X Windows==&lt;br /&gt;
&lt;br /&gt;
:X.Org configuration file is /etc/X11/xorg.conf&lt;br /&gt;
:XFree86 configuration file is /etc/X11/XF86Config &lt;br /&gt;
:Mouse-test&lt;br /&gt;
:System-config-keyboard command&lt;br /&gt;
:System-config-display&lt;br /&gt;
:Xvidtune to fine tune vertical and horizontal refresh rate.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Information complied by Robert Klaers, LaPrice Ali, &amp;amp; Sean Benecker&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=User_talk:Klae0010&amp;diff=5344</id>
		<title>User talk:Klae0010</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=User_talk:Klae0010&amp;diff=5344"/>
		<updated>2012-03-16T03:13:11Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: /* Boot Process */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Chapter  8 – System initialization and X-Windows&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Subjects covered:&lt;br /&gt;
==	Boot Process== &lt;br /&gt;
*Power on &lt;br /&gt;
*System initializes&lt;br /&gt;
*BIOS performs POST (power-on self test)&lt;br /&gt;
*BIOS checks configuration and checks for boot devices and an OS to execute&lt;br /&gt;
**   &#039;&#039;Typically floppy disks, CDs, DVDs, and USB devices are checked as they can contain installation media for an OS.&#039;&#039; &lt;br /&gt;
** &#039;&#039;If an OS isn’t found, the BIOS will check the MBR/GPT on the first HD.&#039;&#039; &lt;br /&gt;
** &#039;&#039;MBR/GPT may point to the partition where the boot loader found. If this is the case then the partition where the boot loader is found is called the active partition.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
::: &#039;&#039;&#039;&#039;&#039;See page 347 of the book for the flowchart of the boot process&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
:: &#039;&#039;Boot loader – main purpose is to load the OS kernel into memory.&#039;&#039; &lt;br /&gt;
::: &#039;&#039;&#039;NOTE:&#039;&#039;&#039;  &#039;&#039;There can only be one active partition per HD.&#039;&#039; &lt;br /&gt;
*Regardless of whether the boot loader is loaded from the MBR/GPT or the active partition the rest of the boot process continues as normal.  Which is.. The kernel is executed and loaded into memory. &lt;br /&gt;
*After loading the kernel, the boot loader becomes inactive. &lt;br /&gt;
*Kernel continues by loading daemons into memory&lt;br /&gt;
*Daemons are a system process which performs tasks such as printing scheduling, and OS maintenance. &lt;br /&gt;
**The first daemon process is called the initialize (init) daemon. It’s responsible for loading all the other daemons on the system required to bring the system to a usable state where users can interact with it.&lt;br /&gt;
&lt;br /&gt;
==	Boot Loaders==&lt;br /&gt;
&lt;br /&gt;
:As mentioned, the primary task of boot loaders is to load the OS kernel into memory. They do secondary tasks as well. This includes passing info the kernel during system startup and booting other OS’s which may be on the HD.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
::Using a boot loader to boot one of several OS’s is known as &#039;&#039;&#039;dual booting&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	GRUB===&lt;br /&gt;
:	The most common and only boot loader supported by Fedora 13.&lt;br /&gt;
:3 Stages&lt;br /&gt;
::Stage 1 : Generally resides in MBR/GPT and points to Stage 1.5&lt;br /&gt;
::Stages 1.5 :  Resides in the /boot/grub directory and loads the file support and loads Stage 2&lt;br /&gt;
::Stage 2 : Also, reside in the /boot/grub directory. This part actually performs the boot loader operations and displayed the graphic boot loader screen. &lt;br /&gt;
&lt;br /&gt;
:::	This can be configured by editing the config file found at &#039;&#039;&#039;(/boot/grub/grub.conf)&#039;&#039;&#039;.&lt;br /&gt;
:::		This is read by Stage 2, which is located on the partition called GRUB root partition.&lt;br /&gt;
:::	To be able to read the info in &#039;&#039;&#039;boot/grub/grub.conf&#039;&#039;&#039; you must first understand how GRUB refers to partitions on HDs.  &lt;br /&gt;
:	The format used is :  (&#039;&#039;&#039;hd&amp;lt;drive#&amp;gt;,&amp;lt;partition#&amp;gt;&#039;&#039;&#039;)&lt;br /&gt;
:Examples.		&lt;br /&gt;
::&#039;&#039; (hd0,0)&#039;&#039; = 1st HD , 1st Partition&lt;br /&gt;
::&#039;&#039;(hd0,1)&#039;&#039; = 1st HD , 2nd Partition&lt;br /&gt;
::&#039;&#039;(hd1,2)&#039;&#039; = 2st HD , 3st Partition&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command :&lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda&lt;br /&gt;
&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
&lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command line: &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda &lt;br /&gt;
:You can also use :  &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda1&lt;br /&gt;
: This is used to install GRUB Stage 1 to the front of the 1st primary part of the HD.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	LILO===&lt;br /&gt;
&lt;br /&gt;
:This is the traditional boot loader for Linux.&lt;br /&gt;
::	No longer supported. &lt;br /&gt;
::	Often found on distros which require a smaller boot loader, as well as legacy distros. &lt;br /&gt;
:Can reside on the first sector of an active Linux partition, as with GRUB can be found in the MBR/GPT of the HD. When this is the case, when the computer completes the POST and locates LILO, a LILO boot : prompt appears.  &lt;br /&gt;
:Hitting &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; will display a list of OSs to boot. &lt;br /&gt;
&lt;br /&gt;
::: A list of common &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; keywords used to edit that file can be found on on page 353 of your book.&lt;br /&gt;
&lt;br /&gt;
:As robust as LILO is from time to time you may encounter a problem during loading. When this happens you’ll get an error code representing the problem. &lt;br /&gt;
&lt;br /&gt;
:::A list of commmon LILO error messages can be found on page 354 of your book. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Dual Booting Linux===&lt;br /&gt;
&lt;br /&gt;
:Dual booting is the ability to boot to one of several different Oss which may be available on your computer. Basically the ability to boot a Linux system on the same computer you might also want to use to boot Win 7..or XP. &lt;br /&gt;
&lt;br /&gt;
::You can dual boot using either GRUB or LILO.&lt;br /&gt;
&lt;br /&gt;
::The recommended procedure to install the other OS(s) prior to installing Linux.&lt;br /&gt;
&lt;br /&gt;
::The reason behind this is that Linux will detect the other OS(s) and place the appropriate entry into the boot loader config file.&lt;br /&gt;
&lt;br /&gt;
:LILO cannot boot load the Window kernel directly. &lt;br /&gt;
::It needs the &#039;&#039;other=&#039;&#039; &#039;&#039;&#039;&#039;keyword&#039;&#039;&#039;&#039; in the &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; file to tell it where to find the boot loader for Windows. &lt;br /&gt;
&lt;br /&gt;
:By adding &#039;&#039;optional&#039;&#039;  this prevents the GRUB boot loader from looking for a Linux kernel. This is also followed by the label keyword which just IDs the OS being loaded should you his the &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; key at the LILO prompt.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Alternate way to Dual Boot&#039;&#039;&#039;&lt;br /&gt;
:You can use a Windows Boot Loader (WBL) the same way you can use a Linux Boot Loader. &lt;br /&gt;
&lt;br /&gt;
:As it’s not designed to boot the Linux kernel, you need to go into the WBL and modify some some components &lt;br /&gt;
&lt;br /&gt;
:This can be a bit involved so easier to just install Linux after any other OSs you may also want to Dual Boot. &lt;br /&gt;
:Page 358 details what you would need to do if this is how you want to dual boot. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Linux Initialization==&lt;br /&gt;
&lt;br /&gt;
:After the boot loader loads the Linux OS kernel into memory, the kernel resumes control and executes the first daemon, called &#039;&#039;init&#039;&#039;, on the system.&lt;br /&gt;
&lt;br /&gt;
:: Remember:  &#039;&#039;A daemon is a Linux system process that provides a certain service.&#039;&#039;  &lt;br /&gt;
&lt;br /&gt;
:The init daemon uses configuration file, &#039;&#039;/etc/initab&#039;&#039;  (short for “init table”) to determine the number of daemons that needs to be loaded on the system.&lt;br /&gt;
&lt;br /&gt;
:The init daemon is responsible for uploading daemons that are loaded into memory when the system  is halted or rebooted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runlevels===&lt;br /&gt;
&lt;br /&gt;
:The init  daemon often has to manage several daemons at once.&lt;br /&gt;
&lt;br /&gt;
:Each category is categorized into Runlevels.&lt;br /&gt;
&lt;br /&gt;
:What is a runlevel? A runlevel defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system.&lt;br /&gt;
&lt;br /&gt;
:They are seven standard runlevels:&lt;br /&gt;
::	&#039;&#039;&#039;0&#039;&#039;&#039; ... &#039;&#039;Transitional, Shuts down the system.&#039;&#039; &lt;br /&gt;
:::&#039;&#039;Should completely power down the system.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;1&#039;&#039;&#039;, &#039;&#039;&#039;s&#039;&#039;&#039;, or &#039;&#039;&#039;S&#039;&#039;&#039; ...  &#039;&#039;Single user mode.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for low-level system maintenance impaired by normal system operation.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;2&#039;&#039;&#039; ... &#039;&#039;Full muti-user mode with a graphical login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Debian&#039;&#039;  &lt;br /&gt;
::	&#039;&#039;&#039;3&#039;&#039;&#039; ... &#039;&#039;Full multi-user mode with a console login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Fedora, Mandriva,  Red Hat, and most other distributions.&#039;&#039; &lt;br /&gt;
::	&#039;&#039;&#039;4&#039;&#039;&#039; ... &#039;&#039;Undefined by default&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for customization&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;5&#039;&#039;&#039; ...&#039;&#039; Same as runlevel 3 with the addition of having X run with XDM (graphical) login.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;6&#039;&#039;&#039; ...&#039;&#039;Used to reboot the system.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Also a transitional runlevel.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;To check out the current and/or  previous runlevel.&#039;&#039;&#039;&lt;br /&gt;
:: Type the runlevel command.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::N=nonexistent&lt;br /&gt;
:::5=  current runlevel.&lt;br /&gt;
&lt;br /&gt;
::To change the runlevel from 5 to 1 type command&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # init 1&lt;br /&gt;
&lt;br /&gt;
::If you’re in single mode and you want to change the runlevel from 1 back to 5. Type the following command.:&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  init 5&lt;br /&gt;
&lt;br /&gt;
::The results are&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::[root@server1 ~1] # runlevel&lt;br /&gt;
:::S 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Notice that the runlevel command displays the most current and most recent runlevel.&lt;br /&gt;
:Unless you specify, the init daemon will run the default runlevel indicated in the &#039;&#039;&#039;/etc/inittab file&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runtime config scripts===&lt;br /&gt;
&lt;br /&gt;
:Scripts that run during the boot process.  The purpose is to start daemons and bring the system to a useable state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Configuring Daemon Setup===&lt;br /&gt;
&lt;br /&gt;
:Points  to the appropriate scripts within the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. &lt;br /&gt;
&lt;br /&gt;
:Most Daemon scripts accept the arguments &#039;&#039;&#039;start, stop,&#039;&#039;&#039; and &#039;&#039;&#039;restart&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
:After system startup you can execute them directly from the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;/etc/rc.d/init.d/crond restart&#039;&#039;&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:Or you can use the &#039;&#039;&#039;service command&#039;&#039;&#039; to start, stop or restart any daemons listed in the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. To restart the crond daemon type this.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # service cond restart&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To view and modify daemons that are started in each runlevel, you can use the &#039;&#039;&#039;chkconfig&#039;&#039;&#039; command.&lt;br /&gt;
&lt;br /&gt;
:The chkconfig command views and manipulates the appropriate runtime configuration files in the &#039;&#039;&#039;/etc/rc.d/rc*.d&#039;&#039;&#039; directories.&lt;br /&gt;
&lt;br /&gt;
:For example the following command indicates the ntpd daemon is not started in any runlevel,&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd           0:off 1:off 2:off 3:off 4:off 5:off 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To configure the ntpd daemon to start in runlevels 3 and 5, and to verify the results, you could run the following commands.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – level 35 ntpd on&#039;&#039;&#039;&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd             0:off 1:off 2:off 3:on 4:off 5:on 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	X Windows System==&lt;br /&gt;
:Components of the Linux GUI&lt;br /&gt;
:Graphical Programs (X Clients)&lt;br /&gt;
:Desktop environment&lt;br /&gt;
:Window Manager&lt;br /&gt;
:X Windows&lt;br /&gt;
:Video Hardware&lt;br /&gt;
&lt;br /&gt;
===	X Windows===&lt;br /&gt;
:Developed by Digital Equipment Corporation (DEC) and Massachusetts Institute of Technology (MIT) in 1984&lt;br /&gt;
:Maintained as Open Source Software by the X.Org Foundation&lt;br /&gt;
:The freely available version used in may Linux distributions is called XFree86&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Windows Manager and Desktop Environs===&lt;br /&gt;
&lt;br /&gt;
::Window managers are used to modify the look and feel of X Windows. &lt;br /&gt;
:: Common windows managers can be found on page 370 of your book. &lt;br /&gt;
&lt;br /&gt;
:&#039;&#039;&#039;K Desktop Environment (KDE)&#039;&#039;&#039;&lt;br /&gt;
::Released in 1996&lt;br /&gt;
::Uses K Window Manager (kwin) and Qt toolkit&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;GNOME&#039;&#039;&#039;&lt;br /&gt;
:: Created in 1997&lt;br /&gt;
:: Uses Metacity Window Manager and GTK+ toolkit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Starting and Stopping X Windows===&lt;br /&gt;
&lt;br /&gt;
:*GNOME Display Manager writes the chosen desktop environment in the Session menu to a &#039;&#039;&#039;.dmrc&#039;&#039;&#039; (display manager runtime configuration) file.   &#039;&#039;&#039;/home/user1/.dmrc&#039;&#039;&#039; file&lt;br /&gt;
&lt;br /&gt;
:::[user1@server1 ~]# &#039;&#039;&#039;cat . dmrc&#039;&#039;&#039;  &lt;br /&gt;
:::[Desktop]&lt;br /&gt;
:::Session=kde&lt;br /&gt;
:::[user1@server1 ~]#_&lt;br /&gt;
&lt;br /&gt;
:*Root user in not allowed to log into GNOME Display Manager by default.&lt;br /&gt;
::&#039;&#039;&#039;/etc/pam.d/gdm&#039;&#039;&#039;    and   &#039;&#039;&#039;/etc/pam.d/gdm-password&#039;&#039;&#039;  &lt;br /&gt;
::# auth required pam_succeed_if.so user !=root quiet&lt;br /&gt;
:*GNOME Display Manager can be start manually using the gdm command&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Configuring X Windows==&lt;br /&gt;
&lt;br /&gt;
:X.Org configuration file is /etc/X11/xorg.conf&lt;br /&gt;
:XFree86 configuration file is /etc/X11/XF86Config &lt;br /&gt;
:Mouse-test&lt;br /&gt;
:System-config-keyboard command&lt;br /&gt;
:System-config-display&lt;br /&gt;
:Xvidtune to fine tune vertical and horizontal refresh rate.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Information complied by Robert Klaers, LaPrice Ali, &amp;amp; Sean Benecker&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=User_talk:Klae0010&amp;diff=5343</id>
		<title>User talk:Klae0010</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=User_talk:Klae0010&amp;diff=5343"/>
		<updated>2012-03-16T03:12:41Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: /* Configuring X Windows */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Chapter  8 – System initialization and X-Windows&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Subjects covered:&lt;br /&gt;
==	Boot Process== &lt;br /&gt;
*Power on &lt;br /&gt;
*System initializes&lt;br /&gt;
*BIOS performs POST (power-on self test)&lt;br /&gt;
*BIOS checks configuration and checks for boot devices and an OS to execute&lt;br /&gt;
**   &#039;&#039;Typically floppy disks, CDs, DVDs, and USB devices are checked as they can contain installation media for an OS.&#039;&#039; &lt;br /&gt;
** &#039;&#039;If an OS isn’t found, the BIOS will check the MBR/GPT on the first HD.&#039;&#039; &lt;br /&gt;
** &#039;&#039;MBR/GPT may point to the partition where the boot loader found. If this is the case then the partition where the boot loader is found is called the active partition.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
::: &#039;&#039;&#039;&#039;&#039;See page 347 of the book for the flowchart of the boot process&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
:: &#039;&#039;Boot loader – main purpose is to load the OS kernel into memory.&#039;&#039; &lt;br /&gt;
::: &#039;&#039;&#039;NOTE:&#039;&#039;&#039;  &#039;&#039;There can only be one active partition per HD.&#039;&#039; &lt;br /&gt;
*Regardless of whether the boot loader is loaded from the MBR/GPT or the active partition the rest of the boot process continues as normal.  Which is.. The kernel is executed and loaded into memory. &lt;br /&gt;
*After loading the kernel, the boot loader becomes inactive. &lt;br /&gt;
*Kernel continues by loading daemons into memory&lt;br /&gt;
*Daemons are a system process which performs tasks such as printing scheduling, and OS maintenance. &lt;br /&gt;
**The first daemon process is called the initialize (init) daemon. It’s responsible for loading all the other daemons on the system required to bring the system to a usable state where users can interact with it. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Boot Loaders==&lt;br /&gt;
&lt;br /&gt;
:As mentioned, the primary task of boot loaders is to load the OS kernel into memory. They do secondary tasks as well. This includes passing info the kernel during system startup and booting other OS’s which may be on the HD.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
::Using a boot loader to boot one of several OS’s is known as &#039;&#039;&#039;dual booting&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	GRUB===&lt;br /&gt;
:	The most common and only boot loader supported by Fedora 13.&lt;br /&gt;
:3 Stages&lt;br /&gt;
::Stage 1 : Generally resides in MBR/GPT and points to Stage 1.5&lt;br /&gt;
::Stages 1.5 :  Resides in the /boot/grub directory and loads the file support and loads Stage 2&lt;br /&gt;
::Stage 2 : Also, reside in the /boot/grub directory. This part actually performs the boot loader operations and displayed the graphic boot loader screen. &lt;br /&gt;
&lt;br /&gt;
:::	This can be configured by editing the config file found at &#039;&#039;&#039;(/boot/grub/grub.conf)&#039;&#039;&#039;.&lt;br /&gt;
:::		This is read by Stage 2, which is located on the partition called GRUB root partition.&lt;br /&gt;
:::	To be able to read the info in &#039;&#039;&#039;boot/grub/grub.conf&#039;&#039;&#039; you must first understand how GRUB refers to partitions on HDs.  &lt;br /&gt;
:	The format used is :  (&#039;&#039;&#039;hd&amp;lt;drive#&amp;gt;,&amp;lt;partition#&amp;gt;&#039;&#039;&#039;)&lt;br /&gt;
:Examples.		&lt;br /&gt;
::&#039;&#039; (hd0,0)&#039;&#039; = 1st HD , 1st Partition&lt;br /&gt;
::&#039;&#039;(hd0,1)&#039;&#039; = 1st HD , 2nd Partition&lt;br /&gt;
::&#039;&#039;(hd1,2)&#039;&#039; = 2st HD , 3st Partition&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command :&lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda&lt;br /&gt;
&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
&lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command line: &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda &lt;br /&gt;
:You can also use :  &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda1&lt;br /&gt;
: This is used to install GRUB Stage 1 to the front of the 1st primary part of the HD.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	LILO===&lt;br /&gt;
&lt;br /&gt;
:This is the traditional boot loader for Linux.&lt;br /&gt;
::	No longer supported. &lt;br /&gt;
::	Often found on distros which require a smaller boot loader, as well as legacy distros. &lt;br /&gt;
:Can reside on the first sector of an active Linux partition, as with GRUB can be found in the MBR/GPT of the HD. When this is the case, when the computer completes the POST and locates LILO, a LILO boot : prompt appears.  &lt;br /&gt;
:Hitting &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; will display a list of OSs to boot. &lt;br /&gt;
&lt;br /&gt;
::: A list of common &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; keywords used to edit that file can be found on on page 353 of your book.&lt;br /&gt;
&lt;br /&gt;
:As robust as LILO is from time to time you may encounter a problem during loading. When this happens you’ll get an error code representing the problem. &lt;br /&gt;
&lt;br /&gt;
:::A list of commmon LILO error messages can be found on page 354 of your book. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Dual Booting Linux===&lt;br /&gt;
&lt;br /&gt;
:Dual booting is the ability to boot to one of several different Oss which may be available on your computer. Basically the ability to boot a Linux system on the same computer you might also want to use to boot Win 7..or XP. &lt;br /&gt;
&lt;br /&gt;
::You can dual boot using either GRUB or LILO.&lt;br /&gt;
&lt;br /&gt;
::The recommended procedure to install the other OS(s) prior to installing Linux.&lt;br /&gt;
&lt;br /&gt;
::The reason behind this is that Linux will detect the other OS(s) and place the appropriate entry into the boot loader config file.&lt;br /&gt;
&lt;br /&gt;
:LILO cannot boot load the Window kernel directly. &lt;br /&gt;
::It needs the &#039;&#039;other=&#039;&#039; &#039;&#039;&#039;&#039;keyword&#039;&#039;&#039;&#039; in the &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; file to tell it where to find the boot loader for Windows. &lt;br /&gt;
&lt;br /&gt;
:By adding &#039;&#039;optional&#039;&#039;  this prevents the GRUB boot loader from looking for a Linux kernel. This is also followed by the label keyword which just IDs the OS being loaded should you his the &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; key at the LILO prompt.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Alternate way to Dual Boot&#039;&#039;&#039;&lt;br /&gt;
:You can use a Windows Boot Loader (WBL) the same way you can use a Linux Boot Loader. &lt;br /&gt;
&lt;br /&gt;
:As it’s not designed to boot the Linux kernel, you need to go into the WBL and modify some some components &lt;br /&gt;
&lt;br /&gt;
:This can be a bit involved so easier to just install Linux after any other OSs you may also want to Dual Boot. &lt;br /&gt;
:Page 358 details what you would need to do if this is how you want to dual boot. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Linux Initialization==&lt;br /&gt;
&lt;br /&gt;
:After the boot loader loads the Linux OS kernel into memory, the kernel resumes control and executes the first daemon, called &#039;&#039;init&#039;&#039;, on the system.&lt;br /&gt;
&lt;br /&gt;
:: Remember:  &#039;&#039;A daemon is a Linux system process that provides a certain service.&#039;&#039;  &lt;br /&gt;
&lt;br /&gt;
:The init daemon uses configuration file, &#039;&#039;/etc/initab&#039;&#039;  (short for “init table”) to determine the number of daemons that needs to be loaded on the system.&lt;br /&gt;
&lt;br /&gt;
:The init daemon is responsible for uploading daemons that are loaded into memory when the system  is halted or rebooted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runlevels===&lt;br /&gt;
&lt;br /&gt;
:The init  daemon often has to manage several daemons at once.&lt;br /&gt;
&lt;br /&gt;
:Each category is categorized into Runlevels.&lt;br /&gt;
&lt;br /&gt;
:What is a runlevel? A runlevel defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system.&lt;br /&gt;
&lt;br /&gt;
:They are seven standard runlevels:&lt;br /&gt;
::	&#039;&#039;&#039;0&#039;&#039;&#039; ... &#039;&#039;Transitional, Shuts down the system.&#039;&#039; &lt;br /&gt;
:::&#039;&#039;Should completely power down the system.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;1&#039;&#039;&#039;, &#039;&#039;&#039;s&#039;&#039;&#039;, or &#039;&#039;&#039;S&#039;&#039;&#039; ...  &#039;&#039;Single user mode.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for low-level system maintenance impaired by normal system operation.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;2&#039;&#039;&#039; ... &#039;&#039;Full muti-user mode with a graphical login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Debian&#039;&#039;  &lt;br /&gt;
::	&#039;&#039;&#039;3&#039;&#039;&#039; ... &#039;&#039;Full multi-user mode with a console login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Fedora, Mandriva,  Red Hat, and most other distributions.&#039;&#039; &lt;br /&gt;
::	&#039;&#039;&#039;4&#039;&#039;&#039; ... &#039;&#039;Undefined by default&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for customization&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;5&#039;&#039;&#039; ...&#039;&#039; Same as runlevel 3 with the addition of having X run with XDM (graphical) login.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;6&#039;&#039;&#039; ...&#039;&#039;Used to reboot the system.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Also a transitional runlevel.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;To check out the current and/or  previous runlevel.&#039;&#039;&#039;&lt;br /&gt;
:: Type the runlevel command.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::N=nonexistent&lt;br /&gt;
:::5=  current runlevel.&lt;br /&gt;
&lt;br /&gt;
::To change the runlevel from 5 to 1 type command&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # init 1&lt;br /&gt;
&lt;br /&gt;
::If you’re in single mode and you want to change the runlevel from 1 back to 5. Type the following command.:&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  init 5&lt;br /&gt;
&lt;br /&gt;
::The results are&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::[root@server1 ~1] # runlevel&lt;br /&gt;
:::S 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Notice that the runlevel command displays the most current and most recent runlevel.&lt;br /&gt;
:Unless you specify, the init daemon will run the default runlevel indicated in the &#039;&#039;&#039;/etc/inittab file&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runtime config scripts===&lt;br /&gt;
&lt;br /&gt;
:Scripts that run during the boot process.  The purpose is to start daemons and bring the system to a useable state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Configuring Daemon Setup===&lt;br /&gt;
&lt;br /&gt;
:Points  to the appropriate scripts within the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. &lt;br /&gt;
&lt;br /&gt;
:Most Daemon scripts accept the arguments &#039;&#039;&#039;start, stop,&#039;&#039;&#039; and &#039;&#039;&#039;restart&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
:After system startup you can execute them directly from the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;/etc/rc.d/init.d/crond restart&#039;&#039;&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:Or you can use the &#039;&#039;&#039;service command&#039;&#039;&#039; to start, stop or restart any daemons listed in the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. To restart the crond daemon type this.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # service cond restart&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To view and modify daemons that are started in each runlevel, you can use the &#039;&#039;&#039;chkconfig&#039;&#039;&#039; command.&lt;br /&gt;
&lt;br /&gt;
:The chkconfig command views and manipulates the appropriate runtime configuration files in the &#039;&#039;&#039;/etc/rc.d/rc*.d&#039;&#039;&#039; directories.&lt;br /&gt;
&lt;br /&gt;
:For example the following command indicates the ntpd daemon is not started in any runlevel,&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd           0:off 1:off 2:off 3:off 4:off 5:off 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To configure the ntpd daemon to start in runlevels 3 and 5, and to verify the results, you could run the following commands.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – level 35 ntpd on&#039;&#039;&#039;&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd             0:off 1:off 2:off 3:on 4:off 5:on 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	X Windows System==&lt;br /&gt;
:Components of the Linux GUI&lt;br /&gt;
:Graphical Programs (X Clients)&lt;br /&gt;
:Desktop environment&lt;br /&gt;
:Window Manager&lt;br /&gt;
:X Windows&lt;br /&gt;
:Video Hardware&lt;br /&gt;
&lt;br /&gt;
===	X Windows===&lt;br /&gt;
:Developed by Digital Equipment Corporation (DEC) and Massachusetts Institute of Technology (MIT) in 1984&lt;br /&gt;
:Maintained as Open Source Software by the X.Org Foundation&lt;br /&gt;
:The freely available version used in may Linux distributions is called XFree86&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Windows Manager and Desktop Environs===&lt;br /&gt;
&lt;br /&gt;
::Window managers are used to modify the look and feel of X Windows. &lt;br /&gt;
:: Common windows managers can be found on page 370 of your book. &lt;br /&gt;
&lt;br /&gt;
:&#039;&#039;&#039;K Desktop Environment (KDE)&#039;&#039;&#039;&lt;br /&gt;
::Released in 1996&lt;br /&gt;
::Uses K Window Manager (kwin) and Qt toolkit&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;GNOME&#039;&#039;&#039;&lt;br /&gt;
:: Created in 1997&lt;br /&gt;
:: Uses Metacity Window Manager and GTK+ toolkit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Starting and Stopping X Windows===&lt;br /&gt;
&lt;br /&gt;
:*GNOME Display Manager writes the chosen desktop environment in the Session menu to a &#039;&#039;&#039;.dmrc&#039;&#039;&#039; (display manager runtime configuration) file.   &#039;&#039;&#039;/home/user1/.dmrc&#039;&#039;&#039; file&lt;br /&gt;
&lt;br /&gt;
:::[user1@server1 ~]# &#039;&#039;&#039;cat . dmrc&#039;&#039;&#039;  &lt;br /&gt;
:::[Desktop]&lt;br /&gt;
:::Session=kde&lt;br /&gt;
:::[user1@server1 ~]#_&lt;br /&gt;
&lt;br /&gt;
:*Root user in not allowed to log into GNOME Display Manager by default.&lt;br /&gt;
::&#039;&#039;&#039;/etc/pam.d/gdm&#039;&#039;&#039;    and   &#039;&#039;&#039;/etc/pam.d/gdm-password&#039;&#039;&#039;  &lt;br /&gt;
::# auth required pam_succeed_if.so user !=root quiet&lt;br /&gt;
:*GNOME Display Manager can be start manually using the gdm command&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Configuring X Windows==&lt;br /&gt;
&lt;br /&gt;
:X.Org configuration file is /etc/X11/xorg.conf&lt;br /&gt;
:XFree86 configuration file is /etc/X11/XF86Config &lt;br /&gt;
:Mouse-test&lt;br /&gt;
:System-config-keyboard command&lt;br /&gt;
:System-config-display&lt;br /&gt;
:Xvidtune to fine tune vertical and horizontal refresh rate.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Information complied by Robert Klaers, LaPrice Ali, &amp;amp; Sean Benecker&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=User_talk:Klae0010&amp;diff=5342</id>
		<title>User talk:Klae0010</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=User_talk:Klae0010&amp;diff=5342"/>
		<updated>2012-03-16T03:12:04Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: /* Configuring X Windows */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Chapter  8 – System initialization and X-Windows&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Subjects covered:&lt;br /&gt;
==	Boot Process== &lt;br /&gt;
*Power on &lt;br /&gt;
*System initializes&lt;br /&gt;
*BIOS performs POST (power-on self test)&lt;br /&gt;
*BIOS checks configuration and checks for boot devices and an OS to execute&lt;br /&gt;
**   &#039;&#039;Typically floppy disks, CDs, DVDs, and USB devices are checked as they can contain installation media for an OS.&#039;&#039; &lt;br /&gt;
** &#039;&#039;If an OS isn’t found, the BIOS will check the MBR/GPT on the first HD.&#039;&#039; &lt;br /&gt;
** &#039;&#039;MBR/GPT may point to the partition where the boot loader found. If this is the case then the partition where the boot loader is found is called the active partition.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
::: &#039;&#039;&#039;&#039;&#039;See page 347 of the book for the flowchart of the boot process&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
:: &#039;&#039;Boot loader – main purpose is to load the OS kernel into memory.&#039;&#039; &lt;br /&gt;
::: &#039;&#039;&#039;NOTE:&#039;&#039;&#039;  &#039;&#039;There can only be one active partition per HD.&#039;&#039; &lt;br /&gt;
*Regardless of whether the boot loader is loaded from the MBR/GPT or the active partition the rest of the boot process continues as normal.  Which is.. The kernel is executed and loaded into memory. &lt;br /&gt;
*After loading the kernel, the boot loader becomes inactive. &lt;br /&gt;
*Kernel continues by loading daemons into memory&lt;br /&gt;
*Daemons are a system process which performs tasks such as printing scheduling, and OS maintenance. &lt;br /&gt;
**The first daemon process is called the initialize (init) daemon. It’s responsible for loading all the other daemons on the system required to bring the system to a usable state where users can interact with it. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Boot Loaders==&lt;br /&gt;
&lt;br /&gt;
:As mentioned, the primary task of boot loaders is to load the OS kernel into memory. They do secondary tasks as well. This includes passing info the kernel during system startup and booting other OS’s which may be on the HD.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
::Using a boot loader to boot one of several OS’s is known as &#039;&#039;&#039;dual booting&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	GRUB===&lt;br /&gt;
:	The most common and only boot loader supported by Fedora 13.&lt;br /&gt;
:3 Stages&lt;br /&gt;
::Stage 1 : Generally resides in MBR/GPT and points to Stage 1.5&lt;br /&gt;
::Stages 1.5 :  Resides in the /boot/grub directory and loads the file support and loads Stage 2&lt;br /&gt;
::Stage 2 : Also, reside in the /boot/grub directory. This part actually performs the boot loader operations and displayed the graphic boot loader screen. &lt;br /&gt;
&lt;br /&gt;
:::	This can be configured by editing the config file found at &#039;&#039;&#039;(/boot/grub/grub.conf)&#039;&#039;&#039;.&lt;br /&gt;
:::		This is read by Stage 2, which is located on the partition called GRUB root partition.&lt;br /&gt;
:::	To be able to read the info in &#039;&#039;&#039;boot/grub/grub.conf&#039;&#039;&#039; you must first understand how GRUB refers to partitions on HDs.  &lt;br /&gt;
:	The format used is :  (&#039;&#039;&#039;hd&amp;lt;drive#&amp;gt;,&amp;lt;partition#&amp;gt;&#039;&#039;&#039;)&lt;br /&gt;
:Examples.		&lt;br /&gt;
::&#039;&#039; (hd0,0)&#039;&#039; = 1st HD , 1st Partition&lt;br /&gt;
::&#039;&#039;(hd0,1)&#039;&#039; = 1st HD , 2nd Partition&lt;br /&gt;
::&#039;&#039;(hd1,2)&#039;&#039; = 2st HD , 3st Partition&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command :&lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda&lt;br /&gt;
&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
&lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command line: &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda &lt;br /&gt;
:You can also use :  &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda1&lt;br /&gt;
: This is used to install GRUB Stage 1 to the front of the 1st primary part of the HD.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	LILO===&lt;br /&gt;
&lt;br /&gt;
:This is the traditional boot loader for Linux.&lt;br /&gt;
::	No longer supported. &lt;br /&gt;
::	Often found on distros which require a smaller boot loader, as well as legacy distros. &lt;br /&gt;
:Can reside on the first sector of an active Linux partition, as with GRUB can be found in the MBR/GPT of the HD. When this is the case, when the computer completes the POST and locates LILO, a LILO boot : prompt appears.  &lt;br /&gt;
:Hitting &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; will display a list of OSs to boot. &lt;br /&gt;
&lt;br /&gt;
::: A list of common &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; keywords used to edit that file can be found on on page 353 of your book.&lt;br /&gt;
&lt;br /&gt;
:As robust as LILO is from time to time you may encounter a problem during loading. When this happens you’ll get an error code representing the problem. &lt;br /&gt;
&lt;br /&gt;
:::A list of commmon LILO error messages can be found on page 354 of your book. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Dual Booting Linux===&lt;br /&gt;
&lt;br /&gt;
:Dual booting is the ability to boot to one of several different Oss which may be available on your computer. Basically the ability to boot a Linux system on the same computer you might also want to use to boot Win 7..or XP. &lt;br /&gt;
&lt;br /&gt;
::You can dual boot using either GRUB or LILO.&lt;br /&gt;
&lt;br /&gt;
::The recommended procedure to install the other OS(s) prior to installing Linux.&lt;br /&gt;
&lt;br /&gt;
::The reason behind this is that Linux will detect the other OS(s) and place the appropriate entry into the boot loader config file.&lt;br /&gt;
&lt;br /&gt;
:LILO cannot boot load the Window kernel directly. &lt;br /&gt;
::It needs the &#039;&#039;other=&#039;&#039; &#039;&#039;&#039;&#039;keyword&#039;&#039;&#039;&#039; in the &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; file to tell it where to find the boot loader for Windows. &lt;br /&gt;
&lt;br /&gt;
:By adding &#039;&#039;optional&#039;&#039;  this prevents the GRUB boot loader from looking for a Linux kernel. This is also followed by the label keyword which just IDs the OS being loaded should you his the &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; key at the LILO prompt.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Alternate way to Dual Boot&#039;&#039;&#039;&lt;br /&gt;
:You can use a Windows Boot Loader (WBL) the same way you can use a Linux Boot Loader. &lt;br /&gt;
&lt;br /&gt;
:As it’s not designed to boot the Linux kernel, you need to go into the WBL and modify some some components &lt;br /&gt;
&lt;br /&gt;
:This can be a bit involved so easier to just install Linux after any other OSs you may also want to Dual Boot. &lt;br /&gt;
:Page 358 details what you would need to do if this is how you want to dual boot. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Linux Initialization==&lt;br /&gt;
&lt;br /&gt;
:After the boot loader loads the Linux OS kernel into memory, the kernel resumes control and executes the first daemon, called &#039;&#039;init&#039;&#039;, on the system.&lt;br /&gt;
&lt;br /&gt;
:: Remember:  &#039;&#039;A daemon is a Linux system process that provides a certain service.&#039;&#039;  &lt;br /&gt;
&lt;br /&gt;
:The init daemon uses configuration file, &#039;&#039;/etc/initab&#039;&#039;  (short for “init table”) to determine the number of daemons that needs to be loaded on the system.&lt;br /&gt;
&lt;br /&gt;
:The init daemon is responsible for uploading daemons that are loaded into memory when the system  is halted or rebooted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runlevels===&lt;br /&gt;
&lt;br /&gt;
:The init  daemon often has to manage several daemons at once.&lt;br /&gt;
&lt;br /&gt;
:Each category is categorized into Runlevels.&lt;br /&gt;
&lt;br /&gt;
:What is a runlevel? A runlevel defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system.&lt;br /&gt;
&lt;br /&gt;
:They are seven standard runlevels:&lt;br /&gt;
::	&#039;&#039;&#039;0&#039;&#039;&#039; ... &#039;&#039;Transitional, Shuts down the system.&#039;&#039; &lt;br /&gt;
:::&#039;&#039;Should completely power down the system.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;1&#039;&#039;&#039;, &#039;&#039;&#039;s&#039;&#039;&#039;, or &#039;&#039;&#039;S&#039;&#039;&#039; ...  &#039;&#039;Single user mode.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for low-level system maintenance impaired by normal system operation.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;2&#039;&#039;&#039; ... &#039;&#039;Full muti-user mode with a graphical login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Debian&#039;&#039;  &lt;br /&gt;
::	&#039;&#039;&#039;3&#039;&#039;&#039; ... &#039;&#039;Full multi-user mode with a console login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Fedora, Mandriva,  Red Hat, and most other distributions.&#039;&#039; &lt;br /&gt;
::	&#039;&#039;&#039;4&#039;&#039;&#039; ... &#039;&#039;Undefined by default&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for customization&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;5&#039;&#039;&#039; ...&#039;&#039; Same as runlevel 3 with the addition of having X run with XDM (graphical) login.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;6&#039;&#039;&#039; ...&#039;&#039;Used to reboot the system.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Also a transitional runlevel.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;To check out the current and/or  previous runlevel.&#039;&#039;&#039;&lt;br /&gt;
:: Type the runlevel command.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::N=nonexistent&lt;br /&gt;
:::5=  current runlevel.&lt;br /&gt;
&lt;br /&gt;
::To change the runlevel from 5 to 1 type command&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # init 1&lt;br /&gt;
&lt;br /&gt;
::If you’re in single mode and you want to change the runlevel from 1 back to 5. Type the following command.:&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  init 5&lt;br /&gt;
&lt;br /&gt;
::The results are&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::[root@server1 ~1] # runlevel&lt;br /&gt;
:::S 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Notice that the runlevel command displays the most current and most recent runlevel.&lt;br /&gt;
:Unless you specify, the init daemon will run the default runlevel indicated in the &#039;&#039;&#039;/etc/inittab file&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runtime config scripts===&lt;br /&gt;
&lt;br /&gt;
:Scripts that run during the boot process.  The purpose is to start daemons and bring the system to a useable state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Configuring Daemon Setup===&lt;br /&gt;
&lt;br /&gt;
:Points  to the appropriate scripts within the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. &lt;br /&gt;
&lt;br /&gt;
:Most Daemon scripts accept the arguments &#039;&#039;&#039;start, stop,&#039;&#039;&#039; and &#039;&#039;&#039;restart&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
:After system startup you can execute them directly from the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;/etc/rc.d/init.d/crond restart&#039;&#039;&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:Or you can use the &#039;&#039;&#039;service command&#039;&#039;&#039; to start, stop or restart any daemons listed in the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. To restart the crond daemon type this.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # service cond restart&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To view and modify daemons that are started in each runlevel, you can use the &#039;&#039;&#039;chkconfig&#039;&#039;&#039; command.&lt;br /&gt;
&lt;br /&gt;
:The chkconfig command views and manipulates the appropriate runtime configuration files in the &#039;&#039;&#039;/etc/rc.d/rc*.d&#039;&#039;&#039; directories.&lt;br /&gt;
&lt;br /&gt;
:For example the following command indicates the ntpd daemon is not started in any runlevel,&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd           0:off 1:off 2:off 3:off 4:off 5:off 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To configure the ntpd daemon to start in runlevels 3 and 5, and to verify the results, you could run the following commands.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – level 35 ntpd on&#039;&#039;&#039;&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd             0:off 1:off 2:off 3:on 4:off 5:on 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	X Windows System==&lt;br /&gt;
:Components of the Linux GUI&lt;br /&gt;
:Graphical Programs (X Clients)&lt;br /&gt;
:Desktop environment&lt;br /&gt;
:Window Manager&lt;br /&gt;
:X Windows&lt;br /&gt;
:Video Hardware&lt;br /&gt;
&lt;br /&gt;
===	X Windows===&lt;br /&gt;
:Developed by Digital Equipment Corporation (DEC) and Massachusetts Institute of Technology (MIT) in 1984&lt;br /&gt;
:Maintained as Open Source Software by the X.Org Foundation&lt;br /&gt;
:The freely available version used in may Linux distributions is called XFree86&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Windows Manager and Desktop Environs===&lt;br /&gt;
&lt;br /&gt;
::Window managers are used to modify the look and feel of X Windows. &lt;br /&gt;
:: Common windows managers can be found on page 370 of your book. &lt;br /&gt;
&lt;br /&gt;
:&#039;&#039;&#039;K Desktop Environment (KDE)&#039;&#039;&#039;&lt;br /&gt;
::Released in 1996&lt;br /&gt;
::Uses K Window Manager (kwin) and Qt toolkit&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;GNOME&#039;&#039;&#039;&lt;br /&gt;
:: Created in 1997&lt;br /&gt;
:: Uses Metacity Window Manager and GTK+ toolkit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Starting and Stopping X Windows===&lt;br /&gt;
&lt;br /&gt;
:*GNOME Display Manager writes the chosen desktop environment in the Session menu to a &#039;&#039;&#039;.dmrc&#039;&#039;&#039; (display manager runtime configuration) file.   &#039;&#039;&#039;/home/user1/.dmrc&#039;&#039;&#039; file&lt;br /&gt;
&lt;br /&gt;
:::[user1@server1 ~]# &#039;&#039;&#039;cat . dmrc&#039;&#039;&#039;  &lt;br /&gt;
:::[Desktop]&lt;br /&gt;
:::Session=kde&lt;br /&gt;
:::[user1@server1 ~]#_&lt;br /&gt;
&lt;br /&gt;
:*Root user in not allowed to log into GNOME Display Manager by default.&lt;br /&gt;
::&#039;&#039;&#039;/etc/pam.d/gdm&#039;&#039;&#039;    and   &#039;&#039;&#039;/etc/pam.d/gdm-password&#039;&#039;&#039;  &lt;br /&gt;
::# auth required pam_succeed_if.so user !=root quiet&lt;br /&gt;
:*GNOME Display Manager can be start manually using the gdm command&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Configuring X Windows==&lt;br /&gt;
&lt;br /&gt;
:X.Org configuration file is /etc/X11/xorg.conf&lt;br /&gt;
:XFree86 configuration file is /etc/X11/XF86Config &lt;br /&gt;
:Mouse-test&lt;br /&gt;
:System-config-keyboard command&lt;br /&gt;
:System-config-display&lt;br /&gt;
:Xvidtune to fine tune vertical and horizontal refresh rate.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Information complied by Robert Klaers, Sean Benecker ,LaPrice Ali&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=User_talk:Klae0010&amp;diff=5341</id>
		<title>User talk:Klae0010</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=User_talk:Klae0010&amp;diff=5341"/>
		<updated>2012-03-16T03:10:29Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: /* Configuring X Windows */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Chapter  8 – System initialization and X-Windows&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Subjects covered:&lt;br /&gt;
==	Boot Process== &lt;br /&gt;
*Power on &lt;br /&gt;
*System initializes&lt;br /&gt;
*BIOS performs POST (power-on self test)&lt;br /&gt;
*BIOS checks configuration and checks for boot devices and an OS to execute&lt;br /&gt;
**   &#039;&#039;Typically floppy disks, CDs, DVDs, and USB devices are checked as they can contain installation media for an OS.&#039;&#039; &lt;br /&gt;
** &#039;&#039;If an OS isn’t found, the BIOS will check the MBR/GPT on the first HD.&#039;&#039; &lt;br /&gt;
** &#039;&#039;MBR/GPT may point to the partition where the boot loader found. If this is the case then the partition where the boot loader is found is called the active partition.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
::: &#039;&#039;&#039;&#039;&#039;See page 347 of the book for the flowchart of the boot process&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
:: &#039;&#039;Boot loader – main purpose is to load the OS kernel into memory.&#039;&#039; &lt;br /&gt;
::: &#039;&#039;&#039;NOTE:&#039;&#039;&#039;  &#039;&#039;There can only be one active partition per HD.&#039;&#039; &lt;br /&gt;
*Regardless of whether the boot loader is loaded from the MBR/GPT or the active partition the rest of the boot process continues as normal.  Which is.. The kernel is executed and loaded into memory. &lt;br /&gt;
*After loading the kernel, the boot loader becomes inactive. &lt;br /&gt;
*Kernel continues by loading daemons into memory&lt;br /&gt;
*Daemons are a system process which performs tasks such as printing scheduling, and OS maintenance. &lt;br /&gt;
**The first daemon process is called the initialize (init) daemon. It’s responsible for loading all the other daemons on the system required to bring the system to a usable state where users can interact with it. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Boot Loaders==&lt;br /&gt;
&lt;br /&gt;
:As mentioned, the primary task of boot loaders is to load the OS kernel into memory. They do secondary tasks as well. This includes passing info the kernel during system startup and booting other OS’s which may be on the HD.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
::Using a boot loader to boot one of several OS’s is known as &#039;&#039;&#039;dual booting&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	GRUB===&lt;br /&gt;
:	The most common and only boot loader supported by Fedora 13.&lt;br /&gt;
:3 Stages&lt;br /&gt;
::Stage 1 : Generally resides in MBR/GPT and points to Stage 1.5&lt;br /&gt;
::Stages 1.5 :  Resides in the /boot/grub directory and loads the file support and loads Stage 2&lt;br /&gt;
::Stage 2 : Also, reside in the /boot/grub directory. This part actually performs the boot loader operations and displayed the graphic boot loader screen. &lt;br /&gt;
&lt;br /&gt;
:::	This can be configured by editing the config file found at &#039;&#039;&#039;(/boot/grub/grub.conf)&#039;&#039;&#039;.&lt;br /&gt;
:::		This is read by Stage 2, which is located on the partition called GRUB root partition.&lt;br /&gt;
:::	To be able to read the info in &#039;&#039;&#039;boot/grub/grub.conf&#039;&#039;&#039; you must first understand how GRUB refers to partitions on HDs.  &lt;br /&gt;
:	The format used is :  (&#039;&#039;&#039;hd&amp;lt;drive#&amp;gt;,&amp;lt;partition#&amp;gt;&#039;&#039;&#039;)&lt;br /&gt;
:Examples.		&lt;br /&gt;
::&#039;&#039; (hd0,0)&#039;&#039; = 1st HD , 1st Partition&lt;br /&gt;
::&#039;&#039;(hd0,1)&#039;&#039; = 1st HD , 2nd Partition&lt;br /&gt;
::&#039;&#039;(hd1,2)&#039;&#039; = 2st HD , 3st Partition&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command :&lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda&lt;br /&gt;
&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
&lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command line: &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda &lt;br /&gt;
:You can also use :  &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda1&lt;br /&gt;
: This is used to install GRUB Stage 1 to the front of the 1st primary part of the HD.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	LILO===&lt;br /&gt;
&lt;br /&gt;
:This is the traditional boot loader for Linux.&lt;br /&gt;
::	No longer supported. &lt;br /&gt;
::	Often found on distros which require a smaller boot loader, as well as legacy distros. &lt;br /&gt;
:Can reside on the first sector of an active Linux partition, as with GRUB can be found in the MBR/GPT of the HD. When this is the case, when the computer completes the POST and locates LILO, a LILO boot : prompt appears.  &lt;br /&gt;
:Hitting &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; will display a list of OSs to boot. &lt;br /&gt;
&lt;br /&gt;
::: A list of common &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; keywords used to edit that file can be found on on page 353 of your book.&lt;br /&gt;
&lt;br /&gt;
:As robust as LILO is from time to time you may encounter a problem during loading. When this happens you’ll get an error code representing the problem. &lt;br /&gt;
&lt;br /&gt;
:::A list of commmon LILO error messages can be found on page 354 of your book. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Dual Booting Linux===&lt;br /&gt;
&lt;br /&gt;
:Dual booting is the ability to boot to one of several different Oss which may be available on your computer. Basically the ability to boot a Linux system on the same computer you might also want to use to boot Win 7..or XP. &lt;br /&gt;
&lt;br /&gt;
::You can dual boot using either GRUB or LILO.&lt;br /&gt;
&lt;br /&gt;
::The recommended procedure to install the other OS(s) prior to installing Linux.&lt;br /&gt;
&lt;br /&gt;
::The reason behind this is that Linux will detect the other OS(s) and place the appropriate entry into the boot loader config file.&lt;br /&gt;
&lt;br /&gt;
:LILO cannot boot load the Window kernel directly. &lt;br /&gt;
::It needs the &#039;&#039;other=&#039;&#039; &#039;&#039;&#039;&#039;keyword&#039;&#039;&#039;&#039; in the &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; file to tell it where to find the boot loader for Windows. &lt;br /&gt;
&lt;br /&gt;
:By adding &#039;&#039;optional&#039;&#039;  this prevents the GRUB boot loader from looking for a Linux kernel. This is also followed by the label keyword which just IDs the OS being loaded should you his the &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; key at the LILO prompt.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Alternate way to Dual Boot&#039;&#039;&#039;&lt;br /&gt;
:You can use a Windows Boot Loader (WBL) the same way you can use a Linux Boot Loader. &lt;br /&gt;
&lt;br /&gt;
:As it’s not designed to boot the Linux kernel, you need to go into the WBL and modify some some components &lt;br /&gt;
&lt;br /&gt;
:This can be a bit involved so easier to just install Linux after any other OSs you may also want to Dual Boot. &lt;br /&gt;
:Page 358 details what you would need to do if this is how you want to dual boot. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Linux Initialization==&lt;br /&gt;
&lt;br /&gt;
:After the boot loader loads the Linux OS kernel into memory, the kernel resumes control and executes the first daemon, called &#039;&#039;init&#039;&#039;, on the system.&lt;br /&gt;
&lt;br /&gt;
:: Remember:  &#039;&#039;A daemon is a Linux system process that provides a certain service.&#039;&#039;  &lt;br /&gt;
&lt;br /&gt;
:The init daemon uses configuration file, &#039;&#039;/etc/initab&#039;&#039;  (short for “init table”) to determine the number of daemons that needs to be loaded on the system.&lt;br /&gt;
&lt;br /&gt;
:The init daemon is responsible for uploading daemons that are loaded into memory when the system  is halted or rebooted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runlevels===&lt;br /&gt;
&lt;br /&gt;
:The init  daemon often has to manage several daemons at once.&lt;br /&gt;
&lt;br /&gt;
:Each category is categorized into Runlevels.&lt;br /&gt;
&lt;br /&gt;
:What is a runlevel? A runlevel defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system.&lt;br /&gt;
&lt;br /&gt;
:They are seven standard runlevels:&lt;br /&gt;
::	&#039;&#039;&#039;0&#039;&#039;&#039; ... &#039;&#039;Transitional, Shuts down the system.&#039;&#039; &lt;br /&gt;
:::&#039;&#039;Should completely power down the system.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;1&#039;&#039;&#039;, &#039;&#039;&#039;s&#039;&#039;&#039;, or &#039;&#039;&#039;S&#039;&#039;&#039; ...  &#039;&#039;Single user mode.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for low-level system maintenance impaired by normal system operation.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;2&#039;&#039;&#039; ... &#039;&#039;Full muti-user mode with a graphical login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Debian&#039;&#039;  &lt;br /&gt;
::	&#039;&#039;&#039;3&#039;&#039;&#039; ... &#039;&#039;Full multi-user mode with a console login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Fedora, Mandriva,  Red Hat, and most other distributions.&#039;&#039; &lt;br /&gt;
::	&#039;&#039;&#039;4&#039;&#039;&#039; ... &#039;&#039;Undefined by default&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for customization&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;5&#039;&#039;&#039; ...&#039;&#039; Same as runlevel 3 with the addition of having X run with XDM (graphical) login.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;6&#039;&#039;&#039; ...&#039;&#039;Used to reboot the system.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Also a transitional runlevel.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;To check out the current and/or  previous runlevel.&#039;&#039;&#039;&lt;br /&gt;
:: Type the runlevel command.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::N=nonexistent&lt;br /&gt;
:::5=  current runlevel.&lt;br /&gt;
&lt;br /&gt;
::To change the runlevel from 5 to 1 type command&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # init 1&lt;br /&gt;
&lt;br /&gt;
::If you’re in single mode and you want to change the runlevel from 1 back to 5. Type the following command.:&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  init 5&lt;br /&gt;
&lt;br /&gt;
::The results are&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::[root@server1 ~1] # runlevel&lt;br /&gt;
:::S 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Notice that the runlevel command displays the most current and most recent runlevel.&lt;br /&gt;
:Unless you specify, the init daemon will run the default runlevel indicated in the &#039;&#039;&#039;/etc/inittab file&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runtime config scripts===&lt;br /&gt;
&lt;br /&gt;
:Scripts that run during the boot process.  The purpose is to start daemons and bring the system to a useable state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Configuring Daemon Setup===&lt;br /&gt;
&lt;br /&gt;
:Points  to the appropriate scripts within the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. &lt;br /&gt;
&lt;br /&gt;
:Most Daemon scripts accept the arguments &#039;&#039;&#039;start, stop,&#039;&#039;&#039; and &#039;&#039;&#039;restart&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
:After system startup you can execute them directly from the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;/etc/rc.d/init.d/crond restart&#039;&#039;&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:Or you can use the &#039;&#039;&#039;service command&#039;&#039;&#039; to start, stop or restart any daemons listed in the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. To restart the crond daemon type this.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # service cond restart&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To view and modify daemons that are started in each runlevel, you can use the &#039;&#039;&#039;chkconfig&#039;&#039;&#039; command.&lt;br /&gt;
&lt;br /&gt;
:The chkconfig command views and manipulates the appropriate runtime configuration files in the &#039;&#039;&#039;/etc/rc.d/rc*.d&#039;&#039;&#039; directories.&lt;br /&gt;
&lt;br /&gt;
:For example the following command indicates the ntpd daemon is not started in any runlevel,&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd           0:off 1:off 2:off 3:off 4:off 5:off 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To configure the ntpd daemon to start in runlevels 3 and 5, and to verify the results, you could run the following commands.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – level 35 ntpd on&#039;&#039;&#039;&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd             0:off 1:off 2:off 3:on 4:off 5:on 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	X Windows System==&lt;br /&gt;
:Components of the Linux GUI&lt;br /&gt;
:Graphical Programs (X Clients)&lt;br /&gt;
:Desktop environment&lt;br /&gt;
:Window Manager&lt;br /&gt;
:X Windows&lt;br /&gt;
:Video Hardware&lt;br /&gt;
&lt;br /&gt;
===	X Windows===&lt;br /&gt;
:Developed by Digital Equipment Corporation (DEC) and Massachusetts Institute of Technology (MIT) in 1984&lt;br /&gt;
:Maintained as Open Source Software by the X.Org Foundation&lt;br /&gt;
:The freely available version used in may Linux distributions is called XFree86&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Windows Manager and Desktop Environs===&lt;br /&gt;
&lt;br /&gt;
::Window managers are used to modify the look and feel of X Windows. &lt;br /&gt;
:: Common windows managers can be found on page 370 of your book. &lt;br /&gt;
&lt;br /&gt;
:&#039;&#039;&#039;K Desktop Environment (KDE)&#039;&#039;&#039;&lt;br /&gt;
::Released in 1996&lt;br /&gt;
::Uses K Window Manager (kwin) and Qt toolkit&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;GNOME&#039;&#039;&#039;&lt;br /&gt;
:: Created in 1997&lt;br /&gt;
:: Uses Metacity Window Manager and GTK+ toolkit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Starting and Stopping X Windows===&lt;br /&gt;
&lt;br /&gt;
:*GNOME Display Manager writes the chosen desktop environment in the Session menu to a &#039;&#039;&#039;.dmrc&#039;&#039;&#039; (display manager runtime configuration) file.   &#039;&#039;&#039;/home/user1/.dmrc&#039;&#039;&#039; file&lt;br /&gt;
&lt;br /&gt;
:::[user1@server1 ~]# &#039;&#039;&#039;cat . dmrc&#039;&#039;&#039;  &lt;br /&gt;
:::[Desktop]&lt;br /&gt;
:::Session=kde&lt;br /&gt;
:::[user1@server1 ~]#_&lt;br /&gt;
&lt;br /&gt;
:*Root user in not allowed to log into GNOME Display Manager by default.&lt;br /&gt;
::&#039;&#039;&#039;/etc/pam.d/gdm&#039;&#039;&#039;    and   &#039;&#039;&#039;/etc/pam.d/gdm-password&#039;&#039;&#039;  &lt;br /&gt;
::# auth required pam_succeed_if.so user !=root quiet&lt;br /&gt;
:*GNOME Display Manager can be start manually using the gdm command&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Configuring X Windows==&lt;br /&gt;
&lt;br /&gt;
:X.Org configuration file is /etc/X11/xorg.conf&lt;br /&gt;
:XFree86 configuration file is /etc/X11/XF86Config &lt;br /&gt;
:Mouse-test&lt;br /&gt;
:System-config-keyboard command&lt;br /&gt;
:System-config-display&lt;br /&gt;
:Xvidtune to fine tune vertical and horizontal refresh rate.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Information complied by Robert Klaers, Sean  ,Ali&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=User_talk:Klae0010&amp;diff=5340</id>
		<title>User talk:Klae0010</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=User_talk:Klae0010&amp;diff=5340"/>
		<updated>2012-03-16T03:05:27Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: /* Configuring X Windows */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Chapter  8 – System initialization and X-Windows&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Subjects covered:&lt;br /&gt;
==	Boot Process== &lt;br /&gt;
*Power on &lt;br /&gt;
*System initializes&lt;br /&gt;
*BIOS performs POST (power-on self test)&lt;br /&gt;
*BIOS checks configuration and checks for boot devices and an OS to execute&lt;br /&gt;
**   &#039;&#039;Typically floppy disks, CDs, DVDs, and USB devices are checked as they can contain installation media for an OS.&#039;&#039; &lt;br /&gt;
** &#039;&#039;If an OS isn’t found, the BIOS will check the MBR/GPT on the first HD.&#039;&#039; &lt;br /&gt;
** &#039;&#039;MBR/GPT may point to the partition where the boot loader found. If this is the case then the partition where the boot loader is found is called the active partition.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
::: &#039;&#039;&#039;&#039;&#039;See page 347 of the book for the flowchart of the boot process&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
:: &#039;&#039;Boot loader – main purpose is to load the OS kernel into memory.&#039;&#039; &lt;br /&gt;
::: &#039;&#039;&#039;NOTE:&#039;&#039;&#039;  &#039;&#039;There can only be one active partition per HD.&#039;&#039; &lt;br /&gt;
*Regardless of whether the boot loader is loaded from the MBR/GPT or the active partition the rest of the boot process continues as normal.  Which is.. The kernel is executed and loaded into memory. &lt;br /&gt;
*After loading the kernel, the boot loader becomes inactive. &lt;br /&gt;
*Kernel continues by loading daemons into memory&lt;br /&gt;
*Daemons are a system process which performs tasks such as printing scheduling, and OS maintenance. &lt;br /&gt;
**The first daemon process is called the initialize (init) daemon. It’s responsible for loading all the other daemons on the system required to bring the system to a usable state where users can interact with it. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Boot Loaders==&lt;br /&gt;
&lt;br /&gt;
:As mentioned, the primary task of boot loaders is to load the OS kernel into memory. They do secondary tasks as well. This includes passing info the kernel during system startup and booting other OS’s which may be on the HD.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
::Using a boot loader to boot one of several OS’s is known as &#039;&#039;&#039;dual booting&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	GRUB===&lt;br /&gt;
:	The most common and only boot loader supported by Fedora 13.&lt;br /&gt;
:3 Stages&lt;br /&gt;
::Stage 1 : Generally resides in MBR/GPT and points to Stage 1.5&lt;br /&gt;
::Stages 1.5 :  Resides in the /boot/grub directory and loads the file support and loads Stage 2&lt;br /&gt;
::Stage 2 : Also, reside in the /boot/grub directory. This part actually performs the boot loader operations and displayed the graphic boot loader screen. &lt;br /&gt;
&lt;br /&gt;
:::	This can be configured by editing the config file found at &#039;&#039;&#039;(/boot/grub/grub.conf)&#039;&#039;&#039;.&lt;br /&gt;
:::		This is read by Stage 2, which is located on the partition called GRUB root partition.&lt;br /&gt;
:::	To be able to read the info in &#039;&#039;&#039;boot/grub/grub.conf&#039;&#039;&#039; you must first understand how GRUB refers to partitions on HDs.  &lt;br /&gt;
:	The format used is :  (&#039;&#039;&#039;hd&amp;lt;drive#&amp;gt;,&amp;lt;partition#&amp;gt;&#039;&#039;&#039;)&lt;br /&gt;
:Examples.		&lt;br /&gt;
::&#039;&#039; (hd0,0)&#039;&#039; = 1st HD , 1st Partition&lt;br /&gt;
::&#039;&#039;(hd0,1)&#039;&#039; = 1st HD , 2nd Partition&lt;br /&gt;
::&#039;&#039;(hd1,2)&#039;&#039; = 2st HD , 3st Partition&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command :&lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda&lt;br /&gt;
&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
&lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command line: &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda &lt;br /&gt;
:You can also use :  &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda1&lt;br /&gt;
: This is used to install GRUB Stage 1 to the front of the 1st primary part of the HD.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	LILO===&lt;br /&gt;
&lt;br /&gt;
:This is the traditional boot loader for Linux.&lt;br /&gt;
::	No longer supported. &lt;br /&gt;
::	Often found on distros which require a smaller boot loader, as well as legacy distros. &lt;br /&gt;
:Can reside on the first sector of an active Linux partition, as with GRUB can be found in the MBR/GPT of the HD. When this is the case, when the computer completes the POST and locates LILO, a LILO boot : prompt appears.  &lt;br /&gt;
:Hitting &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; will display a list of OSs to boot. &lt;br /&gt;
&lt;br /&gt;
::: A list of common &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; keywords used to edit that file can be found on on page 353 of your book.&lt;br /&gt;
&lt;br /&gt;
:As robust as LILO is from time to time you may encounter a problem during loading. When this happens you’ll get an error code representing the problem. &lt;br /&gt;
&lt;br /&gt;
:::A list of commmon LILO error messages can be found on page 354 of your book. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Dual Booting Linux===&lt;br /&gt;
&lt;br /&gt;
:Dual booting is the ability to boot to one of several different Oss which may be available on your computer. Basically the ability to boot a Linux system on the same computer you might also want to use to boot Win 7..or XP. &lt;br /&gt;
&lt;br /&gt;
::You can dual boot using either GRUB or LILO.&lt;br /&gt;
&lt;br /&gt;
::The recommended procedure to install the other OS(s) prior to installing Linux.&lt;br /&gt;
&lt;br /&gt;
::The reason behind this is that Linux will detect the other OS(s) and place the appropriate entry into the boot loader config file.&lt;br /&gt;
&lt;br /&gt;
:LILO cannot boot load the Window kernel directly. &lt;br /&gt;
::It needs the &#039;&#039;other=&#039;&#039; &#039;&#039;&#039;&#039;keyword&#039;&#039;&#039;&#039; in the &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; file to tell it where to find the boot loader for Windows. &lt;br /&gt;
&lt;br /&gt;
:By adding &#039;&#039;optional&#039;&#039;  this prevents the GRUB boot loader from looking for a Linux kernel. This is also followed by the label keyword which just IDs the OS being loaded should you his the &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; key at the LILO prompt.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Alternate way to Dual Boot&#039;&#039;&#039;&lt;br /&gt;
:You can use a Windows Boot Loader (WBL) the same way you can use a Linux Boot Loader. &lt;br /&gt;
&lt;br /&gt;
:As it’s not designed to boot the Linux kernel, you need to go into the WBL and modify some some components &lt;br /&gt;
&lt;br /&gt;
:This can be a bit involved so easier to just install Linux after any other OSs you may also want to Dual Boot. &lt;br /&gt;
:Page 358 details what you would need to do if this is how you want to dual boot. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Linux Initialization==&lt;br /&gt;
&lt;br /&gt;
:After the boot loader loads the Linux OS kernel into memory, the kernel resumes control and executes the first daemon, called &#039;&#039;init&#039;&#039;, on the system.&lt;br /&gt;
&lt;br /&gt;
:: Remember:  &#039;&#039;A daemon is a Linux system process that provides a certain service.&#039;&#039;  &lt;br /&gt;
&lt;br /&gt;
:The init daemon uses configuration file, &#039;&#039;/etc/initab&#039;&#039;  (short for “init table”) to determine the number of daemons that needs to be loaded on the system.&lt;br /&gt;
&lt;br /&gt;
:The init daemon is responsible for uploading daemons that are loaded into memory when the system  is halted or rebooted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runlevels===&lt;br /&gt;
&lt;br /&gt;
:The init  daemon often has to manage several daemons at once.&lt;br /&gt;
&lt;br /&gt;
:Each category is categorized into Runlevels.&lt;br /&gt;
&lt;br /&gt;
:What is a runlevel? A runlevel defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system.&lt;br /&gt;
&lt;br /&gt;
:They are seven standard runlevels:&lt;br /&gt;
::	&#039;&#039;&#039;0&#039;&#039;&#039; ... &#039;&#039;Transitional, Shuts down the system.&#039;&#039; &lt;br /&gt;
:::&#039;&#039;Should completely power down the system.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;1&#039;&#039;&#039;, &#039;&#039;&#039;s&#039;&#039;&#039;, or &#039;&#039;&#039;S&#039;&#039;&#039; ...  &#039;&#039;Single user mode.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for low-level system maintenance impaired by normal system operation.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;2&#039;&#039;&#039; ... &#039;&#039;Full muti-user mode with a graphical login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Debian&#039;&#039;  &lt;br /&gt;
::	&#039;&#039;&#039;3&#039;&#039;&#039; ... &#039;&#039;Full multi-user mode with a console login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Fedora, Mandriva,  Red Hat, and most other distributions.&#039;&#039; &lt;br /&gt;
::	&#039;&#039;&#039;4&#039;&#039;&#039; ... &#039;&#039;Undefined by default&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for customization&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;5&#039;&#039;&#039; ...&#039;&#039; Same as runlevel 3 with the addition of having X run with XDM (graphical) login.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;6&#039;&#039;&#039; ...&#039;&#039;Used to reboot the system.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Also a transitional runlevel.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;To check out the current and/or  previous runlevel.&#039;&#039;&#039;&lt;br /&gt;
:: Type the runlevel command.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::N=nonexistent&lt;br /&gt;
:::5=  current runlevel.&lt;br /&gt;
&lt;br /&gt;
::To change the runlevel from 5 to 1 type command&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # init 1&lt;br /&gt;
&lt;br /&gt;
::If you’re in single mode and you want to change the runlevel from 1 back to 5. Type the following command.:&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  init 5&lt;br /&gt;
&lt;br /&gt;
::The results are&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::[root@server1 ~1] # runlevel&lt;br /&gt;
:::S 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Notice that the runlevel command displays the most current and most recent runlevel.&lt;br /&gt;
:Unless you specify, the init daemon will run the default runlevel indicated in the &#039;&#039;&#039;/etc/inittab file&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runtime config scripts===&lt;br /&gt;
&lt;br /&gt;
:Scripts that run during the boot process.  The purpose is to start daemons and bring the system to a useable state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Configuring Daemon Setup===&lt;br /&gt;
&lt;br /&gt;
:Points  to the appropriate scripts within the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. &lt;br /&gt;
&lt;br /&gt;
:Most Daemon scripts accept the arguments &#039;&#039;&#039;start, stop,&#039;&#039;&#039; and &#039;&#039;&#039;restart&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
:After system startup you can execute them directly from the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;/etc/rc.d/init.d/crond restart&#039;&#039;&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:Or you can use the &#039;&#039;&#039;service command&#039;&#039;&#039; to start, stop or restart any daemons listed in the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. To restart the crond daemon type this.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # service cond restart&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To view and modify daemons that are started in each runlevel, you can use the &#039;&#039;&#039;chkconfig&#039;&#039;&#039; command.&lt;br /&gt;
&lt;br /&gt;
:The chkconfig command views and manipulates the appropriate runtime configuration files in the &#039;&#039;&#039;/etc/rc.d/rc*.d&#039;&#039;&#039; directories.&lt;br /&gt;
&lt;br /&gt;
:For example the following command indicates the ntpd daemon is not started in any runlevel,&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd           0:off 1:off 2:off 3:off 4:off 5:off 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To configure the ntpd daemon to start in runlevels 3 and 5, and to verify the results, you could run the following commands.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – level 35 ntpd on&#039;&#039;&#039;&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd             0:off 1:off 2:off 3:on 4:off 5:on 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	X Windows System==&lt;br /&gt;
:Components of the Linux GUI&lt;br /&gt;
:Graphical Programs (X Clients)&lt;br /&gt;
:Desktop environment&lt;br /&gt;
:Window Manager&lt;br /&gt;
:X Windows&lt;br /&gt;
:Video Hardware&lt;br /&gt;
&lt;br /&gt;
===	X Windows===&lt;br /&gt;
:Developed by Digital Equipment Corporation (DEC) and Massachusetts Institute of Technology (MIT) in 1984&lt;br /&gt;
:Maintained as Open Source Software by the X.Org Foundation&lt;br /&gt;
:The freely available version used in may Linux distributions is called XFree86&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Windows Manager and Desktop Environs===&lt;br /&gt;
&lt;br /&gt;
::Window managers are used to modify the look and feel of X Windows. &lt;br /&gt;
:: Common windows managers can be found on page 370 of your book. &lt;br /&gt;
&lt;br /&gt;
:&#039;&#039;&#039;K Desktop Environment (KDE)&#039;&#039;&#039;&lt;br /&gt;
::Released in 1996&lt;br /&gt;
::Uses K Window Manager (kwin) and Qt toolkit&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;GNOME&#039;&#039;&#039;&lt;br /&gt;
:: Created in 1997&lt;br /&gt;
:: Uses Metacity Window Manager and GTK+ toolkit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Starting and Stopping X Windows===&lt;br /&gt;
&lt;br /&gt;
:*GNOME Display Manager writes the chosen desktop environment in the Session menu to a &#039;&#039;&#039;.dmrc&#039;&#039;&#039; (display manager runtime configuration) file.   &#039;&#039;&#039;/home/user1/.dmrc&#039;&#039;&#039; file&lt;br /&gt;
&lt;br /&gt;
:::[user1@server1 ~]# &#039;&#039;&#039;cat . dmrc&#039;&#039;&#039;  &lt;br /&gt;
:::[Desktop]&lt;br /&gt;
:::Session=kde&lt;br /&gt;
:::[user1@server1 ~]#_&lt;br /&gt;
&lt;br /&gt;
:*Root user in not allowed to log into GNOME Display Manager by default.&lt;br /&gt;
::&#039;&#039;&#039;/etc/pam.d/gdm&#039;&#039;&#039;    and   &#039;&#039;&#039;/etc/pam.d/gdm-password&#039;&#039;&#039;  &lt;br /&gt;
::# auth required pam_succeed_if.so user !=root quiet&lt;br /&gt;
:*GNOME Display Manager can be start manually using the gdm command&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Configuring X Windows==&lt;br /&gt;
&lt;br /&gt;
:X.Org configuration file is /etc/X11/xorg.conf&lt;br /&gt;
:XFree86 configuration file is /etc/X11/XF86Config &lt;br /&gt;
:Mouse-test&lt;br /&gt;
:System-config-keyboard command&lt;br /&gt;
:System-config-display&lt;br /&gt;
:Xvidtune to fine tune vertical and horizontal refresh rate.&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=User_talk:Klae0010&amp;diff=5339</id>
		<title>User talk:Klae0010</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=User_talk:Klae0010&amp;diff=5339"/>
		<updated>2012-03-16T03:04:55Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: /* Configuring X Windows */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Chapter  8 – System initialization and X-Windows&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Subjects covered:&lt;br /&gt;
==	Boot Process== &lt;br /&gt;
*Power on &lt;br /&gt;
*System initializes&lt;br /&gt;
*BIOS performs POST (power-on self test)&lt;br /&gt;
*BIOS checks configuration and checks for boot devices and an OS to execute&lt;br /&gt;
**   &#039;&#039;Typically floppy disks, CDs, DVDs, and USB devices are checked as they can contain installation media for an OS.&#039;&#039; &lt;br /&gt;
** &#039;&#039;If an OS isn’t found, the BIOS will check the MBR/GPT on the first HD.&#039;&#039; &lt;br /&gt;
** &#039;&#039;MBR/GPT may point to the partition where the boot loader found. If this is the case then the partition where the boot loader is found is called the active partition.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
::: &#039;&#039;&#039;&#039;&#039;See page 347 of the book for the flowchart of the boot process&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
:: &#039;&#039;Boot loader – main purpose is to load the OS kernel into memory.&#039;&#039; &lt;br /&gt;
::: &#039;&#039;&#039;NOTE:&#039;&#039;&#039;  &#039;&#039;There can only be one active partition per HD.&#039;&#039; &lt;br /&gt;
*Regardless of whether the boot loader is loaded from the MBR/GPT or the active partition the rest of the boot process continues as normal.  Which is.. The kernel is executed and loaded into memory. &lt;br /&gt;
*After loading the kernel, the boot loader becomes inactive. &lt;br /&gt;
*Kernel continues by loading daemons into memory&lt;br /&gt;
*Daemons are a system process which performs tasks such as printing scheduling, and OS maintenance. &lt;br /&gt;
**The first daemon process is called the initialize (init) daemon. It’s responsible for loading all the other daemons on the system required to bring the system to a usable state where users can interact with it. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Boot Loaders==&lt;br /&gt;
&lt;br /&gt;
:As mentioned, the primary task of boot loaders is to load the OS kernel into memory. They do secondary tasks as well. This includes passing info the kernel during system startup and booting other OS’s which may be on the HD.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
::Using a boot loader to boot one of several OS’s is known as &#039;&#039;&#039;dual booting&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	GRUB===&lt;br /&gt;
:	The most common and only boot loader supported by Fedora 13.&lt;br /&gt;
:3 Stages&lt;br /&gt;
::Stage 1 : Generally resides in MBR/GPT and points to Stage 1.5&lt;br /&gt;
::Stages 1.5 :  Resides in the /boot/grub directory and loads the file support and loads Stage 2&lt;br /&gt;
::Stage 2 : Also, reside in the /boot/grub directory. This part actually performs the boot loader operations and displayed the graphic boot loader screen. &lt;br /&gt;
&lt;br /&gt;
:::	This can be configured by editing the config file found at &#039;&#039;&#039;(/boot/grub/grub.conf)&#039;&#039;&#039;.&lt;br /&gt;
:::		This is read by Stage 2, which is located on the partition called GRUB root partition.&lt;br /&gt;
:::	To be able to read the info in &#039;&#039;&#039;boot/grub/grub.conf&#039;&#039;&#039; you must first understand how GRUB refers to partitions on HDs.  &lt;br /&gt;
:	The format used is :  (&#039;&#039;&#039;hd&amp;lt;drive#&amp;gt;,&amp;lt;partition#&amp;gt;&#039;&#039;&#039;)&lt;br /&gt;
:Examples.		&lt;br /&gt;
::&#039;&#039; (hd0,0)&#039;&#039; = 1st HD , 1st Partition&lt;br /&gt;
::&#039;&#039;(hd0,1)&#039;&#039; = 1st HD , 2nd Partition&lt;br /&gt;
::&#039;&#039;(hd1,2)&#039;&#039; = 2st HD , 3st Partition&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command :&lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda&lt;br /&gt;
&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
&lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command line: &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda &lt;br /&gt;
:You can also use :  &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda1&lt;br /&gt;
: This is used to install GRUB Stage 1 to the front of the 1st primary part of the HD.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	LILO===&lt;br /&gt;
&lt;br /&gt;
:This is the traditional boot loader for Linux.&lt;br /&gt;
::	No longer supported. &lt;br /&gt;
::	Often found on distros which require a smaller boot loader, as well as legacy distros. &lt;br /&gt;
:Can reside on the first sector of an active Linux partition, as with GRUB can be found in the MBR/GPT of the HD. When this is the case, when the computer completes the POST and locates LILO, a LILO boot : prompt appears.  &lt;br /&gt;
:Hitting &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; will display a list of OSs to boot. &lt;br /&gt;
&lt;br /&gt;
::: A list of common &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; keywords used to edit that file can be found on on page 353 of your book.&lt;br /&gt;
&lt;br /&gt;
:As robust as LILO is from time to time you may encounter a problem during loading. When this happens you’ll get an error code representing the problem. &lt;br /&gt;
&lt;br /&gt;
:::A list of commmon LILO error messages can be found on page 354 of your book. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Dual Booting Linux===&lt;br /&gt;
&lt;br /&gt;
:Dual booting is the ability to boot to one of several different Oss which may be available on your computer. Basically the ability to boot a Linux system on the same computer you might also want to use to boot Win 7..or XP. &lt;br /&gt;
&lt;br /&gt;
::You can dual boot using either GRUB or LILO.&lt;br /&gt;
&lt;br /&gt;
::The recommended procedure to install the other OS(s) prior to installing Linux.&lt;br /&gt;
&lt;br /&gt;
::The reason behind this is that Linux will detect the other OS(s) and place the appropriate entry into the boot loader config file.&lt;br /&gt;
&lt;br /&gt;
:LILO cannot boot load the Window kernel directly. &lt;br /&gt;
::It needs the &#039;&#039;other=&#039;&#039; &#039;&#039;&#039;&#039;keyword&#039;&#039;&#039;&#039; in the &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; file to tell it where to find the boot loader for Windows. &lt;br /&gt;
&lt;br /&gt;
:By adding &#039;&#039;optional&#039;&#039;  this prevents the GRUB boot loader from looking for a Linux kernel. This is also followed by the label keyword which just IDs the OS being loaded should you his the &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; key at the LILO prompt.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Alternate way to Dual Boot&#039;&#039;&#039;&lt;br /&gt;
:You can use a Windows Boot Loader (WBL) the same way you can use a Linux Boot Loader. &lt;br /&gt;
&lt;br /&gt;
:As it’s not designed to boot the Linux kernel, you need to go into the WBL and modify some some components &lt;br /&gt;
&lt;br /&gt;
:This can be a bit involved so easier to just install Linux after any other OSs you may also want to Dual Boot. &lt;br /&gt;
:Page 358 details what you would need to do if this is how you want to dual boot. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Linux Initialization==&lt;br /&gt;
&lt;br /&gt;
:After the boot loader loads the Linux OS kernel into memory, the kernel resumes control and executes the first daemon, called &#039;&#039;init&#039;&#039;, on the system.&lt;br /&gt;
&lt;br /&gt;
:: Remember:  &#039;&#039;A daemon is a Linux system process that provides a certain service.&#039;&#039;  &lt;br /&gt;
&lt;br /&gt;
:The init daemon uses configuration file, &#039;&#039;/etc/initab&#039;&#039;  (short for “init table”) to determine the number of daemons that needs to be loaded on the system.&lt;br /&gt;
&lt;br /&gt;
:The init daemon is responsible for uploading daemons that are loaded into memory when the system  is halted or rebooted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runlevels===&lt;br /&gt;
&lt;br /&gt;
:The init  daemon often has to manage several daemons at once.&lt;br /&gt;
&lt;br /&gt;
:Each category is categorized into Runlevels.&lt;br /&gt;
&lt;br /&gt;
:What is a runlevel? A runlevel defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system.&lt;br /&gt;
&lt;br /&gt;
:They are seven standard runlevels:&lt;br /&gt;
::	&#039;&#039;&#039;0&#039;&#039;&#039; ... &#039;&#039;Transitional, Shuts down the system.&#039;&#039; &lt;br /&gt;
:::&#039;&#039;Should completely power down the system.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;1&#039;&#039;&#039;, &#039;&#039;&#039;s&#039;&#039;&#039;, or &#039;&#039;&#039;S&#039;&#039;&#039; ...  &#039;&#039;Single user mode.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for low-level system maintenance impaired by normal system operation.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;2&#039;&#039;&#039; ... &#039;&#039;Full muti-user mode with a graphical login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Debian&#039;&#039;  &lt;br /&gt;
::	&#039;&#039;&#039;3&#039;&#039;&#039; ... &#039;&#039;Full multi-user mode with a console login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Fedora, Mandriva,  Red Hat, and most other distributions.&#039;&#039; &lt;br /&gt;
::	&#039;&#039;&#039;4&#039;&#039;&#039; ... &#039;&#039;Undefined by default&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for customization&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;5&#039;&#039;&#039; ...&#039;&#039; Same as runlevel 3 with the addition of having X run with XDM (graphical) login.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;6&#039;&#039;&#039; ...&#039;&#039;Used to reboot the system.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Also a transitional runlevel.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;To check out the current and/or  previous runlevel.&#039;&#039;&#039;&lt;br /&gt;
:: Type the runlevel command.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::N=nonexistent&lt;br /&gt;
:::5=  current runlevel.&lt;br /&gt;
&lt;br /&gt;
::To change the runlevel from 5 to 1 type command&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # init 1&lt;br /&gt;
&lt;br /&gt;
::If you’re in single mode and you want to change the runlevel from 1 back to 5. Type the following command.:&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  init 5&lt;br /&gt;
&lt;br /&gt;
::The results are&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::[root@server1 ~1] # runlevel&lt;br /&gt;
:::S 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Notice that the runlevel command displays the most current and most recent runlevel.&lt;br /&gt;
:Unless you specify, the init daemon will run the default runlevel indicated in the &#039;&#039;&#039;/etc/inittab file&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runtime config scripts===&lt;br /&gt;
&lt;br /&gt;
:Scripts that run during the boot process.  The purpose is to start daemons and bring the system to a useable state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Configuring Daemon Setup===&lt;br /&gt;
&lt;br /&gt;
:Points  to the appropriate scripts within the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. &lt;br /&gt;
&lt;br /&gt;
:Most Daemon scripts accept the arguments &#039;&#039;&#039;start, stop,&#039;&#039;&#039; and &#039;&#039;&#039;restart&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
:After system startup you can execute them directly from the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;/etc/rc.d/init.d/crond restart&#039;&#039;&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:Or you can use the &#039;&#039;&#039;service command&#039;&#039;&#039; to start, stop or restart any daemons listed in the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. To restart the crond daemon type this.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # service cond restart&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To view and modify daemons that are started in each runlevel, you can use the &#039;&#039;&#039;chkconfig&#039;&#039;&#039; command.&lt;br /&gt;
&lt;br /&gt;
:The chkconfig command views and manipulates the appropriate runtime configuration files in the &#039;&#039;&#039;/etc/rc.d/rc*.d&#039;&#039;&#039; directories.&lt;br /&gt;
&lt;br /&gt;
:For example the following command indicates the ntpd daemon is not started in any runlevel,&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd           0:off 1:off 2:off 3:off 4:off 5:off 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To configure the ntpd daemon to start in runlevels 3 and 5, and to verify the results, you could run the following commands.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – level 35 ntpd on&#039;&#039;&#039;&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd             0:off 1:off 2:off 3:on 4:off 5:on 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	X Windows System==&lt;br /&gt;
:Components of the Linux GUI&lt;br /&gt;
:Graphical Programs (X Clients)&lt;br /&gt;
:Desktop environment&lt;br /&gt;
:Window Manager&lt;br /&gt;
:X Windows&lt;br /&gt;
:Video Hardware&lt;br /&gt;
&lt;br /&gt;
===	X Windows===&lt;br /&gt;
:Developed by Digital Equipment Corporation (DEC) and Massachusetts Institute of Technology (MIT) in 1984&lt;br /&gt;
:Maintained as Open Source Software by the X.Org Foundation&lt;br /&gt;
:The freely available version used in may Linux distributions is called XFree86&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Windows Manager and Desktop Environs===&lt;br /&gt;
&lt;br /&gt;
::Window managers are used to modify the look and feel of X Windows. &lt;br /&gt;
:: Common windows managers can be found on page 370 of your book. &lt;br /&gt;
&lt;br /&gt;
:&#039;&#039;&#039;K Desktop Environment (KDE)&#039;&#039;&#039;&lt;br /&gt;
::Released in 1996&lt;br /&gt;
::Uses K Window Manager (kwin) and Qt toolkit&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;GNOME&#039;&#039;&#039;&lt;br /&gt;
:: Created in 1997&lt;br /&gt;
:: Uses Metacity Window Manager and GTK+ toolkit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Starting and Stopping X Windows===&lt;br /&gt;
&lt;br /&gt;
:*GNOME Display Manager writes the chosen desktop environment in the Session menu to a &#039;&#039;&#039;.dmrc&#039;&#039;&#039; (display manager runtime configuration) file.   &#039;&#039;&#039;/home/user1/.dmrc&#039;&#039;&#039; file&lt;br /&gt;
&lt;br /&gt;
:::[user1@server1 ~]# &#039;&#039;&#039;cat . dmrc&#039;&#039;&#039;  &lt;br /&gt;
:::[Desktop]&lt;br /&gt;
:::Session=kde&lt;br /&gt;
:::[user1@server1 ~]#_&lt;br /&gt;
&lt;br /&gt;
:*Root user in not allowed to log into GNOME Display Manager by default.&lt;br /&gt;
::&#039;&#039;&#039;/etc/pam.d/gdm&#039;&#039;&#039;    and   &#039;&#039;&#039;/etc/pam.d/gdm-password&#039;&#039;&#039;  &lt;br /&gt;
::# auth required pam_succeed_if.so user !=root quiet&lt;br /&gt;
:*GNOME Display Manager can be start manually using the gdm command&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Configuring X Windows==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
:X.Org configuration file is /etc/X11/xorg.conf&lt;br /&gt;
:XFree86 configuration file is /etc/X11/XF86Config &lt;br /&gt;
:Mouse-test&lt;br /&gt;
:System-config-keyboard command&lt;br /&gt;
:System-config-display&lt;br /&gt;
:Xvidtune to fine tune vertical and horizontal refresh rate.&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=User_talk:Klae0010&amp;diff=5338</id>
		<title>User talk:Klae0010</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=User_talk:Klae0010&amp;diff=5338"/>
		<updated>2012-03-16T03:03:52Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: Chapter 8 – System initialization and X-Windows&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Chapter  8 – System initialization and X-Windows&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Subjects covered:&lt;br /&gt;
==	Boot Process== &lt;br /&gt;
*Power on &lt;br /&gt;
*System initializes&lt;br /&gt;
*BIOS performs POST (power-on self test)&lt;br /&gt;
*BIOS checks configuration and checks for boot devices and an OS to execute&lt;br /&gt;
**   &#039;&#039;Typically floppy disks, CDs, DVDs, and USB devices are checked as they can contain installation media for an OS.&#039;&#039; &lt;br /&gt;
** &#039;&#039;If an OS isn’t found, the BIOS will check the MBR/GPT on the first HD.&#039;&#039; &lt;br /&gt;
** &#039;&#039;MBR/GPT may point to the partition where the boot loader found. If this is the case then the partition where the boot loader is found is called the active partition.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
::: &#039;&#039;&#039;&#039;&#039;See page 347 of the book for the flowchart of the boot process&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
:: &#039;&#039;Boot loader – main purpose is to load the OS kernel into memory.&#039;&#039; &lt;br /&gt;
::: &#039;&#039;&#039;NOTE:&#039;&#039;&#039;  &#039;&#039;There can only be one active partition per HD.&#039;&#039; &lt;br /&gt;
*Regardless of whether the boot loader is loaded from the MBR/GPT or the active partition the rest of the boot process continues as normal.  Which is.. The kernel is executed and loaded into memory. &lt;br /&gt;
*After loading the kernel, the boot loader becomes inactive. &lt;br /&gt;
*Kernel continues by loading daemons into memory&lt;br /&gt;
*Daemons are a system process which performs tasks such as printing scheduling, and OS maintenance. &lt;br /&gt;
**The first daemon process is called the initialize (init) daemon. It’s responsible for loading all the other daemons on the system required to bring the system to a usable state where users can interact with it. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Boot Loaders==&lt;br /&gt;
&lt;br /&gt;
:As mentioned, the primary task of boot loaders is to load the OS kernel into memory. They do secondary tasks as well. This includes passing info the kernel during system startup and booting other OS’s which may be on the HD.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
::Using a boot loader to boot one of several OS’s is known as &#039;&#039;&#039;dual booting&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	GRUB===&lt;br /&gt;
:	The most common and only boot loader supported by Fedora 13.&lt;br /&gt;
:3 Stages&lt;br /&gt;
::Stage 1 : Generally resides in MBR/GPT and points to Stage 1.5&lt;br /&gt;
::Stages 1.5 :  Resides in the /boot/grub directory and loads the file support and loads Stage 2&lt;br /&gt;
::Stage 2 : Also, reside in the /boot/grub directory. This part actually performs the boot loader operations and displayed the graphic boot loader screen. &lt;br /&gt;
&lt;br /&gt;
:::	This can be configured by editing the config file found at &#039;&#039;&#039;(/boot/grub/grub.conf)&#039;&#039;&#039;.&lt;br /&gt;
:::		This is read by Stage 2, which is located on the partition called GRUB root partition.&lt;br /&gt;
:::	To be able to read the info in &#039;&#039;&#039;boot/grub/grub.conf&#039;&#039;&#039; you must first understand how GRUB refers to partitions on HDs.  &lt;br /&gt;
:	The format used is :  (&#039;&#039;&#039;hd&amp;lt;drive#&amp;gt;,&amp;lt;partition#&amp;gt;&#039;&#039;&#039;)&lt;br /&gt;
:Examples.		&lt;br /&gt;
::&#039;&#039; (hd0,0)&#039;&#039; = 1st HD , 1st Partition&lt;br /&gt;
::&#039;&#039;(hd0,1)&#039;&#039; = 1st HD , 2nd Partition&lt;br /&gt;
::&#039;&#039;(hd1,2)&#039;&#039; = 2st HD , 3st Partition&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command :&lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda&lt;br /&gt;
&lt;br /&gt;
:Should GRUB ever become corrupted, you can reinstall is using the grub-install command on the system or within System Rescue. &lt;br /&gt;
&lt;br /&gt;
:For example, to install GRUB Stage1 on the 1st SATA HD you’d enter the command line: &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda &lt;br /&gt;
:You can also use :  &lt;br /&gt;
::[root@server ~]# &#039;&#039;&#039;grub-install /dev/sda1&lt;br /&gt;
: This is used to install GRUB Stage 1 to the front of the 1st primary part of the HD.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	LILO===&lt;br /&gt;
&lt;br /&gt;
:This is the traditional boot loader for Linux.&lt;br /&gt;
::	No longer supported. &lt;br /&gt;
::	Often found on distros which require a smaller boot loader, as well as legacy distros. &lt;br /&gt;
:Can reside on the first sector of an active Linux partition, as with GRUB can be found in the MBR/GPT of the HD. When this is the case, when the computer completes the POST and locates LILO, a LILO boot : prompt appears.  &lt;br /&gt;
:Hitting &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; will display a list of OSs to boot. &lt;br /&gt;
&lt;br /&gt;
::: A list of common &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; keywords used to edit that file can be found on on page 353 of your book.&lt;br /&gt;
&lt;br /&gt;
:As robust as LILO is from time to time you may encounter a problem during loading. When this happens you’ll get an error code representing the problem. &lt;br /&gt;
&lt;br /&gt;
:::A list of commmon LILO error messages can be found on page 354 of your book. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Dual Booting Linux===&lt;br /&gt;
&lt;br /&gt;
:Dual booting is the ability to boot to one of several different Oss which may be available on your computer. Basically the ability to boot a Linux system on the same computer you might also want to use to boot Win 7..or XP. &lt;br /&gt;
&lt;br /&gt;
::You can dual boot using either GRUB or LILO.&lt;br /&gt;
&lt;br /&gt;
::The recommended procedure to install the other OS(s) prior to installing Linux.&lt;br /&gt;
&lt;br /&gt;
::The reason behind this is that Linux will detect the other OS(s) and place the appropriate entry into the boot loader config file.&lt;br /&gt;
&lt;br /&gt;
:LILO cannot boot load the Window kernel directly. &lt;br /&gt;
::It needs the &#039;&#039;other=&#039;&#039; &#039;&#039;&#039;&#039;keyword&#039;&#039;&#039;&#039; in the &#039;&#039;&#039;/etc/lilo.conf&#039;&#039;&#039; file to tell it where to find the boot loader for Windows. &lt;br /&gt;
&lt;br /&gt;
:By adding &#039;&#039;optional&#039;&#039;  this prevents the GRUB boot loader from looking for a Linux kernel. This is also followed by the label keyword which just IDs the OS being loaded should you his the &#039;&#039;&#039;&amp;lt;TAB&amp;gt;&#039;&#039;&#039; key at the LILO prompt.  &lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Alternate way to Dual Boot&#039;&#039;&#039;&lt;br /&gt;
:You can use a Windows Boot Loader (WBL) the same way you can use a Linux Boot Loader. &lt;br /&gt;
&lt;br /&gt;
:As it’s not designed to boot the Linux kernel, you need to go into the WBL and modify some some components &lt;br /&gt;
&lt;br /&gt;
:This can be a bit involved so easier to just install Linux after any other OSs you may also want to Dual Boot. &lt;br /&gt;
:Page 358 details what you would need to do if this is how you want to dual boot. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Linux Initialization==&lt;br /&gt;
&lt;br /&gt;
:After the boot loader loads the Linux OS kernel into memory, the kernel resumes control and executes the first daemon, called &#039;&#039;init&#039;&#039;, on the system.&lt;br /&gt;
&lt;br /&gt;
:: Remember:  &#039;&#039;A daemon is a Linux system process that provides a certain service.&#039;&#039;  &lt;br /&gt;
&lt;br /&gt;
:The init daemon uses configuration file, &#039;&#039;/etc/initab&#039;&#039;  (short for “init table”) to determine the number of daemons that needs to be loaded on the system.&lt;br /&gt;
&lt;br /&gt;
:The init daemon is responsible for uploading daemons that are loaded into memory when the system  is halted or rebooted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runlevels===&lt;br /&gt;
&lt;br /&gt;
:The init  daemon often has to manage several daemons at once.&lt;br /&gt;
&lt;br /&gt;
:Each category is categorized into Runlevels.&lt;br /&gt;
&lt;br /&gt;
:What is a runlevel? A runlevel defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system.&lt;br /&gt;
&lt;br /&gt;
:They are seven standard runlevels:&lt;br /&gt;
::	&#039;&#039;&#039;0&#039;&#039;&#039; ... &#039;&#039;Transitional, Shuts down the system.&#039;&#039; &lt;br /&gt;
:::&#039;&#039;Should completely power down the system.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;1&#039;&#039;&#039;, &#039;&#039;&#039;s&#039;&#039;&#039;, or &#039;&#039;&#039;S&#039;&#039;&#039; ...  &#039;&#039;Single user mode.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for low-level system maintenance impaired by normal system operation.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;2&#039;&#039;&#039; ... &#039;&#039;Full muti-user mode with a graphical login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Debian&#039;&#039;  &lt;br /&gt;
::	&#039;&#039;&#039;3&#039;&#039;&#039; ... &#039;&#039;Full multi-user mode with a console login.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used on Fedora, Mandriva,  Red Hat, and most other distributions.&#039;&#039; &lt;br /&gt;
::	&#039;&#039;&#039;4&#039;&#039;&#039; ... &#039;&#039;Undefined by default&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Used for customization&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;5&#039;&#039;&#039; ...&#039;&#039; Same as runlevel 3 with the addition of having X run with XDM (graphical) login.&#039;&#039;&lt;br /&gt;
::	&#039;&#039;&#039;6&#039;&#039;&#039; ...&#039;&#039;Used to reboot the system.&#039;&#039;&lt;br /&gt;
:::&#039;&#039;Also a transitional runlevel.&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;To check out the current and/or  previous runlevel.&#039;&#039;&#039;&lt;br /&gt;
:: Type the runlevel command.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::N=nonexistent&lt;br /&gt;
:::5=  current runlevel.&lt;br /&gt;
&lt;br /&gt;
::To change the runlevel from 5 to 1 type command&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  runlevel&lt;br /&gt;
:::N 5&lt;br /&gt;
:::[root@server1 ~1] # init 1&lt;br /&gt;
&lt;br /&gt;
::If you’re in single mode and you want to change the runlevel from 1 back to 5. Type the following command.:&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] #  init 5&lt;br /&gt;
&lt;br /&gt;
::The results are&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
:::[root@server1 ~1] # runlevel&lt;br /&gt;
:::S 5&lt;br /&gt;
:::[root@server1 ~1] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
::Notice that the runlevel command displays the most current and most recent runlevel.&lt;br /&gt;
:Unless you specify, the init daemon will run the default runlevel indicated in the &#039;&#039;&#039;/etc/inittab file&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Runtime config scripts===&lt;br /&gt;
&lt;br /&gt;
:Scripts that run during the boot process.  The purpose is to start daemons and bring the system to a useable state.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Configuring Daemon Setup===&lt;br /&gt;
&lt;br /&gt;
:Points  to the appropriate scripts within the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. &lt;br /&gt;
&lt;br /&gt;
:Most Daemon scripts accept the arguments &#039;&#039;&#039;start, stop,&#039;&#039;&#039; and &#039;&#039;&#039;restart&#039;&#039;&#039;.&lt;br /&gt;
&lt;br /&gt;
:After system startup you can execute them directly from the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;/etc/rc.d/init.d/crond restart&#039;&#039;&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:Or you can use the &#039;&#039;&#039;service command&#039;&#039;&#039; to start, stop or restart any daemons listed in the &#039;&#039;&#039;/etc/rc.d/init.d&#039;&#039;&#039; directory. To restart the crond daemon type this.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # service cond restart&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::Stopping crond :&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To view and modify daemons that are started in each runlevel, you can use the &#039;&#039;&#039;chkconfig&#039;&#039;&#039; command.&lt;br /&gt;
&lt;br /&gt;
:The chkconfig command views and manipulates the appropriate runtime configuration files in the &#039;&#039;&#039;/etc/rc.d/rc*.d&#039;&#039;&#039; directories.&lt;br /&gt;
&lt;br /&gt;
:For example the following command indicates the ntpd daemon is not started in any runlevel,&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd           0:off 1:off 2:off 3:off 4:off 5:off 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
:To configure the ntpd daemon to start in runlevels 3 and 5, and to verify the results, you could run the following commands.&lt;br /&gt;
&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – level 35 ntpd on&#039;&#039;&#039;&lt;br /&gt;
:::[root@server1 ~] # &#039;&#039;&#039;chkconfig – list ntpd&#039;&#039;&#039;&lt;br /&gt;
:::ntpd             0:off 1:off 2:off 3:on 4:off 5:on 6:off&lt;br /&gt;
:::[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	X Windows System==&lt;br /&gt;
:Components of the Linux GUI&lt;br /&gt;
:Graphical Programs (X Clients)&lt;br /&gt;
:Desktop environment&lt;br /&gt;
:Window Manager&lt;br /&gt;
:X Windows&lt;br /&gt;
:Video Hardware&lt;br /&gt;
&lt;br /&gt;
===	X Windows===&lt;br /&gt;
:Developed by Digital Equipment Corporation (DEC) and Massachusetts Institute of Technology (MIT) in 1984&lt;br /&gt;
:Maintained as Open Source Software by the X.Org Foundation&lt;br /&gt;
:The freely available version used in may Linux distributions is called XFree86&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Windows Manager and Desktop Environs===&lt;br /&gt;
&lt;br /&gt;
::Window managers are used to modify the look and feel of X Windows. &lt;br /&gt;
:: Common windows managers can be found on page 370 of your book. &lt;br /&gt;
&lt;br /&gt;
:&#039;&#039;&#039;K Desktop Environment (KDE)&#039;&#039;&#039;&lt;br /&gt;
::Released in 1996&lt;br /&gt;
::Uses K Window Manager (kwin) and Qt toolkit&lt;br /&gt;
&lt;br /&gt;
: &#039;&#039;&#039;GNOME&#039;&#039;&#039;&lt;br /&gt;
:: Created in 1997&lt;br /&gt;
:: Uses Metacity Window Manager and GTK+ toolkit&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===	Starting and Stopping X Windows===&lt;br /&gt;
&lt;br /&gt;
:*GNOME Display Manager writes the chosen desktop environment in the Session menu to a &#039;&#039;&#039;.dmrc&#039;&#039;&#039; (display manager runtime configuration) file.   &#039;&#039;&#039;/home/user1/.dmrc&#039;&#039;&#039; file&lt;br /&gt;
&lt;br /&gt;
:::[user1@server1 ~]# &#039;&#039;&#039;cat . dmrc&#039;&#039;&#039;  &lt;br /&gt;
:::[Desktop]&lt;br /&gt;
:::Session=kde&lt;br /&gt;
:::[user1@server1 ~]#_&lt;br /&gt;
&lt;br /&gt;
:*Root user in not allowed to log into GNOME Display Manager by default.&lt;br /&gt;
::&#039;&#039;&#039;/etc/pam.d/gdm&#039;&#039;&#039;    and   &#039;&#039;&#039;/etc/pam.d/gdm-password&#039;&#039;&#039;  &lt;br /&gt;
::# auth required pam_succeed_if.so user !=root quiet&lt;br /&gt;
:*GNOME Display Manager can be start manually using the gdm command&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Configuring X Windows==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=User_talk:Klae0010&amp;diff=5337</id>
		<title>User talk:Klae0010</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=User_talk:Klae0010&amp;diff=5337"/>
		<updated>2012-03-16T01:03:16Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Chapter  8 – System initialization and X-Windows&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Subjects covered:&lt;br /&gt;
==	Boot Process== &lt;br /&gt;
*Power on &lt;br /&gt;
*System initializes&lt;br /&gt;
*BIOS performs POST (power-on self test)&lt;br /&gt;
*BIOS checks configuration and checks for boot devices and an OS to execute&lt;br /&gt;
**   &#039;&#039;Typically floppy disks, CDs, DVDs, and USB devices are checked as they can contain installation media for an OS.&#039;&#039; &lt;br /&gt;
** &#039;&#039;If an OS isn’t found, the BIOS will check the MBR/GPT on the first HD.&#039;&#039; &lt;br /&gt;
** &#039;&#039;MBR/GPT may point to the partition where the boot loader found. If this is the case then the partition where the boot loader is found is called the active partition.&#039;&#039; &lt;br /&gt;
&lt;br /&gt;
::: &#039;&#039;&#039;&#039;&#039;See page 347 of the book for the flowchart of the boot process&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
:: &#039;&#039;Boot loader – main purpose is to load the OS kernel into memory.&#039;&#039; &lt;br /&gt;
::: &#039;&#039;&#039;NOTE:&#039;&#039;&#039;  &#039;&#039;There can only be one active partition per HD.&#039;&#039; &lt;br /&gt;
*Regardless of whether the boot loader is loaded from the MBR/GPT or the active partition the rest of the boot process continues as normal.  Which is.. The kernel is executed and loaded into memory. &lt;br /&gt;
*After loading the kernel, the boot loader becomes inactive. &lt;br /&gt;
*Kernel continues by loading daemons into memory&lt;br /&gt;
*Daemons are a system process which performs tasks such as printing scheduling, and OS maintenance. &lt;br /&gt;
**The first daemon process is called the initialize (init) daemon. It’s responsible for loading all the other daemons on the system required to bring the system to a usable state where users can interact with it. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==	Boot Loaders==&lt;br /&gt;
===	GRUB===&lt;br /&gt;
===	LILO===&lt;br /&gt;
===	Dual Booting Linux===&lt;br /&gt;
==	Linux Initialization==&lt;br /&gt;
===	Runlevels===&lt;br /&gt;
===	/etc/inittab file===&lt;br /&gt;
===	Runtime config scripts===&lt;br /&gt;
===	Configuring Daemon Setup===&lt;br /&gt;
==	X Windows System==&lt;br /&gt;
===	X Windows===&lt;br /&gt;
===	Windows Manager and Desktop Environs===&lt;br /&gt;
===	Starting and Stopping X Windows===&lt;br /&gt;
==	Configuring X Windows==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=User_talk:Klae0010&amp;diff=5336</id>
		<title>User talk:Klae0010</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=User_talk:Klae0010&amp;diff=5336"/>
		<updated>2012-03-15T23:42:52Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Chapter  8 – System initialization and X-Windows&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
Subjects covered:&lt;br /&gt;
==	Boot Process== &lt;br /&gt;
==	Boot Loaders==&lt;br /&gt;
===	GRUB===&lt;br /&gt;
===	LILO===&lt;br /&gt;
===	Dual Booting Linux===&lt;br /&gt;
==	Linux Initialization==&lt;br /&gt;
===	Runlevels===&lt;br /&gt;
===	/etc/inittab file===&lt;br /&gt;
===	Runtime config scripts===&lt;br /&gt;
===	Configuring Daemon Setup===&lt;br /&gt;
==	X Windows System==&lt;br /&gt;
===	X Windows===&lt;br /&gt;
===	Windows Manager and Desktop Environs===&lt;br /&gt;
===	Starting and Stopping X Windows===&lt;br /&gt;
==	Configuring X Windows==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Boot Process&lt;br /&gt;
-	Power on &lt;br /&gt;
-	System initializes&lt;br /&gt;
-	BIOS performs POST (power-on self test)&lt;br /&gt;
-	BIOS checks configuration and checks for boot devices and an OS to execute&lt;br /&gt;
o	Typically floppy disks, CDs, DVDs, and USB devices are checked as they can contain installation media for an OS. &lt;br /&gt;
o	If an OS isn’t found, the BIOS will check the MBR/GPT on the first HD. &lt;br /&gt;
o	MBR/GPT may point to the partition where the boot loader found. If this is the case then the partition where the boot loader is found is called the active partition.* &lt;br /&gt;
&lt;br /&gt;
	Boot loader – main purpose is to load the OS kernel into memory. &lt;br /&gt;
&lt;br /&gt;
*NOTE: There can only be one active partition per HD. &lt;br /&gt;
&lt;br /&gt;
o	Regardless of whether the boot loader is loaded from the MBR/GPT or the active partition the rest of the boot process continues as normal.  Which is.. The kernel is executed and loaded into memory. &lt;br /&gt;
o	After loading the kernel, the boot loader becomes inactive. &lt;br /&gt;
o	Kernel continues by loading daemons into memory&lt;br /&gt;
o	Daemons are a system process which performs tasks such as printing scheduling, and OS maintenance. &lt;br /&gt;
o	The first daemon process is called the initialize (init) daemon. It’s responsible for loading all the other daemons on the system required to bring the system to a usable state where users can interact with it. &lt;br /&gt;
Boot Loaders &lt;br /&gt;
•	As mentioned, the primary task of boot loaders is to load the OS kernel into memory. They do secondary tasks as well. This includes passing info the kernel during system startup and booting other OS’s which may be on the HD. &lt;br /&gt;
o	Using a boot loader to boot one of several OS’s is known as dual booting. &lt;br /&gt;
Two common boot loaders are : &lt;br /&gt;
GRUB (Grand Unified Bootloader)  - most common&lt;br /&gt;
LILO – (Linux Loader) – Traditional boot loader&lt;br /&gt;
&lt;br /&gt;
GRUB &lt;br /&gt;
	Only boot loader supported by Fedora 13.&lt;br /&gt;
•	3 Stages&lt;br /&gt;
o	Stage 1 : Generally resides in MBR/GPT and points to Stage 1.5&lt;br /&gt;
o	Stages 1.5 :  Resides in the /boot/grub directory and loads the file support and loads Stage 2&lt;br /&gt;
o	Stage 2 : Also, reside in the /boot/grub directory. This part actually performs the boot loader operations and displayed the graphic boot loader screen. &lt;br /&gt;
&lt;br /&gt;
	This can be configured by editing the config file found at (/boot/grub/grub.conf).&lt;br /&gt;
		This is read by Stage 2, which is located on the partition called GRUB root partition.&lt;br /&gt;
	To be able to read the info in boot/grub/grub.conf you must first understand how GRUB refers to partitions on HDs. &lt;br /&gt;
	The format used is :  (hd&amp;lt;drive#&amp;gt;,&amp;lt;partition#&amp;gt;)&lt;br /&gt;
Examples.		&lt;br /&gt;
 (hd0,0) = 1st HD , 1st Partition&lt;br /&gt;
(hd0,1) = 1st HD , 2nd Partition&lt;br /&gt;
(hd1,2) = 2st HD , 3st Partition&lt;br /&gt;
&lt;br /&gt;
Can reside on the first sector of an active Linux partition, as with GRUB can be found in the MBR/GPT of the HD. When this is the case, the computer completes the POST and locates LILO, a LILO boot : prompt appears.  &lt;br /&gt;
&lt;br /&gt;
Hitting &amp;lt;TAB&amp;gt; will display a list of OSs to boot. &lt;br /&gt;
&lt;br /&gt;
Following this – enter the name of the OS you want or hit &amp;lt;Enter&amp;gt; for the default Linux OS.  &lt;br /&gt;
&lt;br /&gt;
See page for lilo/lilo.conf keywords.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
As robust as LILO is from time to time you may encounter a problem during loading. When this happens you’ll get an error code representing the problem. &lt;br /&gt;
&lt;br /&gt;
Dual Booting &lt;br /&gt;
&lt;br /&gt;
Dual booting is the ability to boot to one of several different Oss which may be available on your computer. Basically the ability to boot a Linux system on the same computer you might also want to use to boot Win 7..or XP. &lt;br /&gt;
&lt;br /&gt;
You can dual boot using either GRUB or LILO.&lt;br /&gt;
&lt;br /&gt;
The recommended procedure to install the other OS(s) prior to installing Linux.&lt;br /&gt;
&lt;br /&gt;
The reason behind this is that Linux will detect the other OS(s) and place the appropriate entry into the boot loader config file.&lt;br /&gt;
&lt;br /&gt;
LILO cannot boot load the Window kernel directly. &lt;br /&gt;
 &lt;br /&gt;
It needs the other= keyword in the /etc/lilo.conf file to tell it where to find the boot loader for Windows. &lt;br /&gt;
&lt;br /&gt;
By adding optional  this prevents the GRUB boot loader from looking for a Linux kernel. This is also followed by the label keyword which just IDs the OS being loaded should you his the &amp;lt;TAB&amp;gt; key at the LILO prompt.  &lt;br /&gt;
&lt;br /&gt;
Alternative Way to Dual-Boot&lt;br /&gt;
&lt;br /&gt;
You can use a Windows Boot Loader the same way you can use a Linux Boot Loader. &lt;br /&gt;
&lt;br /&gt;
Need to modify the Windows boot loader, as it’s not designed to boot the Linux kernel. &lt;br /&gt;
&lt;br /&gt;
This can be a bit involved so easier to just install Linux after any other OSs you may also want to Dual Boot. &lt;br /&gt;
&lt;br /&gt;
Linux Initialization &lt;br /&gt;
&lt;br /&gt;
After the boot loader loads the Linux OS kernel into memory, the kernel resumes control and executes the first daemon, called init, on the system.&lt;br /&gt;
&lt;br /&gt;
Remember:  A daemon is a Linux system process that provides a certain service.  &lt;br /&gt;
&lt;br /&gt;
The init daemon uses configuration file, /etc/initab  (short for “init table”) to determine the number of daemons that needs to be loaded on the system.&lt;br /&gt;
&lt;br /&gt;
The init daemon is responsible for uploading daemons that are loaded into memory when the system  is halted or rebooted.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The init  daemon often has to manage several daemons at once.&lt;br /&gt;
&lt;br /&gt;
Each category is categorized into Runlevels.&lt;br /&gt;
&lt;br /&gt;
Runlevels&lt;br /&gt;
&lt;br /&gt;
What is a runlevel? A runlevel defines the number and type of daemons that are loaded into memory and executed by the kernel on a particular system.&lt;br /&gt;
&lt;br /&gt;
They are seven standard runlevels which can be views on page ??? of your book. &lt;br /&gt;
&lt;br /&gt;
To check out the current and/or  previous runlevel. Type the runlevel command.&lt;br /&gt;
&lt;br /&gt;
[root@server1 ~1] #  runlevel&lt;br /&gt;
N 5&lt;br /&gt;
[root@server1 ~1] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
N=nonexistent&lt;br /&gt;
5=  current runlevel.&lt;br /&gt;
&lt;br /&gt;
To change the runlevel from 5 to 1 type command&lt;br /&gt;
&lt;br /&gt;
[root@server1 ~1] #  runlevel&lt;br /&gt;
N 5&lt;br /&gt;
[root@server1 ~1] # init 1&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you’re in single mode and you want to change the runlevel from 1 back to 5. Type the following command.:&lt;br /&gt;
&lt;br /&gt;
[root@server1 ~1] #  init 5&lt;br /&gt;
&lt;br /&gt;
The results are&lt;br /&gt;
&lt;br /&gt;
[root@server1 ~1] # _&lt;br /&gt;
[root@server1 ~1] # runlevel&lt;br /&gt;
S 5&lt;br /&gt;
[root@server1 ~1] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Notice that the runlevel command displays the most current and most recent runlevel.&lt;br /&gt;
Unless you specify, the init daemon will run the default runlevel indicated in the /etc/inittab file.&lt;br /&gt;
&lt;br /&gt;
Runtime Configuration Scripts&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Scripts that run during the boot process.  The purpose is to start daemons and bring the system to a useable state&lt;br /&gt;
&lt;br /&gt;
Configuring Daemon Startup&lt;br /&gt;
&lt;br /&gt;
Points  to the appropriate scripts within the /etc/rc.d/init.d directory. &lt;br /&gt;
&lt;br /&gt;
Most Daemon scripts accept the arguments start, stop, and restart.&lt;br /&gt;
&lt;br /&gt;
After system startup you can execute them directly from the /etc/rc.d/init.d directory.&lt;br /&gt;
&lt;br /&gt;
[root@server1 ~] # /etc/rc.d/init.d/crond restart&lt;br /&gt;
Stopping crond :&lt;br /&gt;
Stopping crond :&lt;br /&gt;
[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Or you can use the service command to start, stop or restart any daemons listed in the /etc/rc.d/init.d directory. To restart the crond daemon type this.&lt;br /&gt;
&lt;br /&gt;
[root@server1 ~] # service cond restart&lt;br /&gt;
Stopping crond :&lt;br /&gt;
Stopping crond :&lt;br /&gt;
[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
To view and modify daemons that are started in each runlevel, you can use the chkconfig command.&lt;br /&gt;
&lt;br /&gt;
The chkconfig command views and manipulates the appropriate runtime configuration files in the /etc/rc.d/rc*.d directories.&lt;br /&gt;
&lt;br /&gt;
For example the following command indicates the ntpd daemon is not started in any runlevel,&lt;br /&gt;
&lt;br /&gt;
[root@server1 ~] # chkconfig – list ntpd&lt;br /&gt;
ntpd           0:off 1:off 2:off 3:off 4:off 5:off 6:off&lt;br /&gt;
[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
To configure the ntpd daemon to start in runlevels 3 and 5, and to verify the results, you could run the following commands.&lt;br /&gt;
&lt;br /&gt;
[root@server1 ~] # chkconfig – level 35 ntpd on&lt;br /&gt;
[root@server1 ~] # chkconfig – list ntpd&lt;br /&gt;
ntpd             0:off 1:off 2:off 3:on 4:off 5:on 6:off&lt;br /&gt;
[root@server1 ~] # _&lt;br /&gt;
&lt;br /&gt;
X windows&lt;br /&gt;
&lt;br /&gt;
Developed by Digital Equipment Corporation (DEC) and Massachusetts Institute of Technology (MIT) in 1984&lt;br /&gt;
Is maintained as Open Source Software by the X.Org Foundation&lt;br /&gt;
The freely available version used in may Linux distributions is called XFree86&lt;br /&gt;
&lt;br /&gt;
Window Managers and Desktop Environments  &lt;br /&gt;
&lt;br /&gt;
Window managers are used to look and feel of X Windows. &lt;br /&gt;
&lt;br /&gt;
Starting and Stopping X-Windows&lt;br /&gt;
&lt;br /&gt;
GNOME Display Manager writes the chosen desktop environment in the Session menu to a .dmrc (display manager runtime configuration) file.   /home/user1/.dmrc file&lt;br /&gt;
&lt;br /&gt;
[user1@server1 ~]# cat . dmrc  &lt;br /&gt;
[Desktop]&lt;br /&gt;
Session=kde&lt;br /&gt;
[user1@server1 ~]#_&lt;br /&gt;
&lt;br /&gt;
Root user in not allowed to log into GNOME Display Manager by default.&lt;br /&gt;
/etc/pam.d/gdm    and   /etc/pam.d/gdm-password  &lt;br /&gt;
# auth required pam_succeed_if.so user !=root quiet&lt;br /&gt;
GNOME Display Manager can be start manually using the gdm command&lt;br /&gt;
&lt;br /&gt;
Configuring X-Windows&lt;br /&gt;
&lt;br /&gt;
X.Org configuration file is /etc/X11/xorg.conf&lt;br /&gt;
XFree86 configuration file is /etc/X11/XF86Config &lt;br /&gt;
Mouse-test&lt;br /&gt;
System-config-keyboard command&lt;br /&gt;
System-config-display&lt;br /&gt;
Xvidtune to fine tune vertical and horizontal refresh rate.&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2311_SP12_Chapter_Groups&amp;diff=5209</id>
		<title>Franske CNT-2311 SP12 Chapter Groups</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=Franske_CNT-2311_SP12_Chapter_Groups&amp;diff=5209"/>
		<updated>2012-02-10T00:10:32Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: /* Chapter 8 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Chapter 1=&lt;br /&gt;
* N/A - Read on Your Own&lt;br /&gt;
=Chapter 2=&lt;br /&gt;
*Clay Wilson&lt;br /&gt;
*Mike Garin&lt;br /&gt;
*Rob Klaers&lt;br /&gt;
*Todd Baily&lt;br /&gt;
=Chapter 3=&lt;br /&gt;
*Randy Oye&lt;br /&gt;
*Tracy Ryder&lt;br /&gt;
*Dave Litke&lt;br /&gt;
*Dan Madigan&lt;br /&gt;
=Chapter 4=&lt;br /&gt;
*Andrew Powell&lt;br /&gt;
*Jesse Bruhn&lt;br /&gt;
*Sean Bencker&lt;br /&gt;
*Scott Pomerleau&lt;br /&gt;
*Laprice Ali&lt;br /&gt;
=Chapter 5=&lt;br /&gt;
*Thu Nguyen&lt;br /&gt;
*Tyler Gray&lt;br /&gt;
*Jason Backley&lt;br /&gt;
*Matt Obermuelle&lt;br /&gt;
=Chapter 6=&lt;br /&gt;
*Kevin&lt;br /&gt;
*George&lt;br /&gt;
*Bill&lt;br /&gt;
*Ryan&lt;br /&gt;
=Chapter 7=&lt;br /&gt;
This group can only have three members!&lt;br /&gt;
*Jason Backley&lt;br /&gt;
*Tyler Gray&lt;br /&gt;
*Matt Obermueller&lt;br /&gt;
*Thu Nguyen&lt;br /&gt;
BAM!!!!!&lt;br /&gt;
&lt;br /&gt;
=Chapter 8=&lt;br /&gt;
* Sean Bencker&lt;br /&gt;
*laprice ali&lt;br /&gt;
* Rob Klaers&lt;br /&gt;
&lt;br /&gt;
=Chapter 9=&lt;br /&gt;
*Randy Oye&lt;br /&gt;
*Dave Litke&lt;br /&gt;
*Tracy Stoltz&lt;br /&gt;
&lt;br /&gt;
=Chapter 10=&lt;br /&gt;
*&lt;br /&gt;
*&lt;br /&gt;
*&lt;br /&gt;
=Chapter 11=&lt;br /&gt;
*&lt;br /&gt;
*&lt;br /&gt;
*&lt;br /&gt;
=Chapter 12=&lt;br /&gt;
* Ben Franske&lt;br /&gt;
=Chapter 13=&lt;br /&gt;
*&lt;br /&gt;
*&lt;br /&gt;
*&lt;br /&gt;
=Chapter 14=&lt;br /&gt;
* Andrew Powell&lt;br /&gt;
* Jesse&lt;br /&gt;
* Scott&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5081</id>
		<title>ITCwiki:Current events</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5081"/>
		<updated>2012-01-27T01:04:58Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: /* Chapter 2 Linux Installation and Usage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Chapter 2 Linux Installation and Usage&#039;&#039;&#039; ==&lt;br /&gt;
::^	Preparation and installation of Fedora Linux using good practices.&lt;br /&gt;
::^	Outline the structure of Linux interface.&lt;br /&gt;
::^	Enter basic shell commands and find command documentation.&lt;br /&gt;
::^	Properly shutdown the Linux OS&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Preparing for Installation&#039;&#039;&#039; ===&lt;br /&gt;
::*	Hardware Compatibility List (HCL)&lt;br /&gt;
::*	The minimum requirement s for Fedora 13 Linux can be found :&lt;br /&gt;
::::	&#039;&#039;http://docs.fedoraproject.org&#039;&#039;&lt;br /&gt;
::*	Preinstallation checklist&lt;br /&gt;
::*	A system checklist that can compared against the HCL during installation. &lt;br /&gt;
::*	Information will include :&lt;br /&gt;
:::•	CPU (Type /MHz)&lt;br /&gt;
:::•	RAM (Mb)&lt;br /&gt;
:::•	Keyboard model and layout&lt;br /&gt;
:::•	Hard Disk size (MB)&lt;br /&gt;
:::•	Host Name&lt;br /&gt;
:::•	Network card IP configuration&lt;br /&gt;
:::•	IP address, Netmask Gatway, DNS servers, and DHCP&lt;br /&gt;
:::•	Linux Packages to install &lt;br /&gt;
:::•	Video Card Make and Model&lt;br /&gt;
:::•	Video Card RAM (Mb)&lt;br /&gt;
:::•	Monitor make and model&lt;br /&gt;
:::•	Monitor Vsync and HSync ranges&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Installation Methods&#039;&#039;&#039;===&lt;br /&gt;
::*	FTP server across network&lt;br /&gt;
::*	HTTP web server across network&lt;br /&gt;
::*	NFS server across network&lt;br /&gt;
::*	SMB (SAMBA) server across network&lt;br /&gt;
::*	Packages located on HD&lt;br /&gt;
::*	CD-ROM or bootable DVD media&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Performing the Installation stages&#039;&#039;&#039; ===&lt;br /&gt;
::*	Start installation&lt;br /&gt;
::*	Choosing language, keyboard and storage type&lt;br /&gt;
::*	Selecting hostname, time zone &amp;amp; root password&lt;br /&gt;
::*	Configuring storage devices&lt;br /&gt;
::*	Configuring the boot loader&lt;br /&gt;
::*	Selecting and installing packages&lt;br /&gt;
::*	Completing first boot wizard&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Starting the Installation&#039;&#039;&#039; ===&lt;br /&gt;
::*	&#039;&#039;&#039;System Rescue&#039;&#039;&#039; – A installation feature used to repair a system from the installation DVD&lt;br /&gt;
:::	Can be used to repair a Linux system which cannot be started. &lt;br /&gt;
::*	&#039;&#039;&#039;Memory Test&#039;&#039;&#039; – Can be used to test memory and prevent errors. Uses memtest86 utility to test RAM for errors&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Checking media for errors&#039;&#039;&#039; ===&lt;br /&gt;
::*	Feature of the default installation&lt;br /&gt;
::*	Optional - Good practice with new, unused media&lt;br /&gt;
::*	Checks bootable DVD or CD-ROM for errors&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Choosing language, keyboard and storage type&#039;&#039;&#039; ===&lt;br /&gt;
::*	This is just a matter of choosing the language you’ll be using, &lt;br /&gt;
:::your default keyboard layout and whether or not you’ll installing Linux locally or on a DASD (direct access storage device)&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Configuring Storage Devices&#039;&#039;&#039; === &lt;br /&gt;
:Can only be one of four basic configurations: &lt;br /&gt;
::*	Primary master PATA  - &#039;&#039;&#039;had&#039;&#039;&#039;&lt;br /&gt;
::*	Primary slave PATA – &#039;&#039;&#039;hdb&#039;&#039;&#039;&lt;br /&gt;
::*	Secondary master PATA – &#039;&#039;&#039;hdc&#039;&#039;&#039;&lt;br /&gt;
::*	Secondary slave PATA – &#039;&#039;&#039;hdd&#039;&#039;&#039;&lt;br /&gt;
:Used by newer server systems typically use :&lt;br /&gt;
::*	SATA/SCSI –1st disk= &#039;&#039;&#039;sda&#039;&#039;&#039;, 2nd disk = &#039;&#039;&#039;sdb&#039;&#039;&#039;, 3rd disk= &#039;&#039;&#039;sdc&#039;&#039;&#039;, ect.&lt;br /&gt;
::*	Unlike PATA can have more than four hard disks&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Hard Disk Partitioning&#039;&#039;&#039; === &lt;br /&gt;
::*	Maximum of four primary partitions&lt;br /&gt;
::*	Extended Partition can contain unlimited number of smaller partitions or logical drives&lt;br /&gt;
::*	Root Directory (&#039;&#039;&#039;\&#039;&#039;&#039;)&lt;br /&gt;
::*	Swap memory – Virtual memory utilized when physical memory (RAM) is being exhausted&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Primary Master Partitioning&#039;&#039;&#039; === &lt;br /&gt;
:Linux only requires two partitions minimum :&lt;br /&gt;
::*	&#039;&#039;&#039;Root&#039;&#039;&#039; directory  (main directory) designated by a “\”&lt;br /&gt;
::*	&#039;&#039;&#039;Swap&#039;&#039;&#039; (aka Virtual memory)&lt;br /&gt;
:::	&#039;&#039;&#039;&#039;&#039;NOTE&#039;&#039;&#039;&#039;&#039; : &#039;&#039;Doesn’t contain a file system and is never mounted to a directory because Linux is responsible for swapping info.&#039;&#039; &lt;br /&gt;
::*	Extra partitions help keep the entire system free from errors.&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Basic Linux&#039;&#039;&#039; === &lt;br /&gt;
::*	&#039;&#039;&#039;Kernel&#039;&#039;&#039; – Loads all components and controls computing activities, the heart of the operating system&lt;br /&gt;
:::	Once the BIOS starts after boot-up, it then starts a boot loader (such as &#039;&#039;GRUB&#039;&#039;) which then loads the Linux Kernel into memory. &lt;br /&gt;
:::	If there is a windows system already on the HD the boot loader can give you the option of which OS you’d like to load. This is known as dual booting.   &lt;br /&gt;
::*	&#039;&#039;&#039;Terminal&#039;&#039;&#039; – Channel that allows users to log in&lt;br /&gt;
::*	&#039;&#039;&#039;Shell&#039;&#039;&#039; – Passes user input to the kernel for processing. BASH shell (Bourne Again Shell) – command-line shell similar to cmd on Windows&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Basic Shell Commands&#039;&#039;&#039;=== &lt;br /&gt;
::*	&#039;&#039;Commands&#039;&#039; – Case sensitive, indicate program to execute&lt;br /&gt;
::*	&#039;&#039;Options&#039;&#039; – specific letters preceded by a hyphen (-) following a command&lt;br /&gt;
::*	&#039;&#039;Arguments&#039;&#039; – specify parameters that tailor the command to the users particular needs&lt;br /&gt;
:::*	Command line order is this.. &#039;&#039;(Command) (Options)(Argument)&#039;&#039;&lt;br /&gt;
::::*	&#039;&#039;&#039;&#039;&#039;Ls – a /etc/ntp&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
:::::	&#039;&#039;Command&#039;&#039; = &#039;&#039;&#039;Ls&#039;&#039;&#039; (list) &lt;br /&gt;
:::::	&#039;&#039;Option&#039;&#039;  =  &#039;&#039;&#039;-a&#039;&#039;&#039; (lists all files)&lt;br /&gt;
:::::	&#039;&#039;Argument&#039;&#039; = &#039;&#039;&#039;/etc/ntp&#039;&#039;&#039; (refers to the &#039;&#039;/etc/ntp&#039;&#039; directory)&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Common Commands&#039;&#039;&#039;=== &lt;br /&gt;
::*You can find some common commands on page 66 of the text. &lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Metacharacters&#039;&#039;&#039;=== &lt;br /&gt;
::*	Keyboard characters that have a special meaning &lt;br /&gt;
::*	(&#039;&#039;&#039;$&#039;&#039;&#039;) – Tells the shell that the following text refers to variable&lt;br /&gt;
::*	A piece of information that is stored in memory, typically uppercase words, automatically set by the Linux system at login&lt;br /&gt;
::*	There’s a list of metacharacters used in BASH on page 67 of the text&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Help&#039;&#039;&#039;=== &lt;br /&gt;
::*	Manual pages (man pages)&lt;br /&gt;
:::*	&#039;&#039;&#039;man &amp;lt;command name&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
::*	Include description, syntax, options, related files, and commands&lt;br /&gt;
::*	Search manual pages with a keyword use –k&lt;br /&gt;
:::*	&#039;&#039;&#039;man –k &amp;lt;keyword&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
::*	Info pages – include easy-to-read description and hyperlinks &lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Shutdown Commands&#039;&#039;&#039;=== &lt;br /&gt;
::*There’s a list of various shutdown commands on page 73 of the text&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Wiki page credit==&lt;br /&gt;
=== All info compiled, edited and coded by : Rob Klaers, Clay Wilson, Michael Garin, &amp;amp; Todd Bailly ===&lt;br /&gt;
 &#039;&#039;&#039;NOTE&#039;&#039;&#039; : &#039;&#039;all page numbers reference the Linux+ Guide to Linux Certification 3rd Ed. by Jason W. Eckert ISBN 978-1-4188-3721-1&#039;&#039;&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5080</id>
		<title>ITCwiki:Current events</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5080"/>
		<updated>2012-01-27T00:56:56Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Chapter 2 Linux Installation and Usage&#039;&#039;&#039; ==&lt;br /&gt;
::^	Preparation and installation of Fedora Linux using good practices.&lt;br /&gt;
::^	Outline the structure of Linux interface.&lt;br /&gt;
::^	Enter basic shell commands and find command documentation.&lt;br /&gt;
::^	Properly shutdown the Linux OS&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Preparing for Installation&#039;&#039;&#039; ===&lt;br /&gt;
::*	Hardware Compatibility List (HCL)&lt;br /&gt;
::*	The minimum requirement s for Fedora 13 Linux can be found :&lt;br /&gt;
::::	&#039;&#039;http://docs.fedoraproject.org&#039;&#039;&lt;br /&gt;
::*	Preinstallation checklist&lt;br /&gt;
::*	A system checklist that can compared against the HCL during installation. &lt;br /&gt;
::*	Information will include :&lt;br /&gt;
:::•	CPU (Type /MHz)&lt;br /&gt;
:::•	RAM (Mb)&lt;br /&gt;
:::•	Keyboard model and layout&lt;br /&gt;
:::•	Hard Disk size (MB)&lt;br /&gt;
:::•	Host Name&lt;br /&gt;
:::•	Network card IP configuration&lt;br /&gt;
:::•	IP address, Netmask Gatway, DNS servers, and DHCP&lt;br /&gt;
:::•	Linux Packages to install &lt;br /&gt;
:::•	Video Card Make and Model&lt;br /&gt;
:::•	Video Card RAM (Mb)&lt;br /&gt;
:::•	Monitor make and model&lt;br /&gt;
:::•	Monitor Vsync and HSync ranges&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Installation Methods&#039;&#039;&#039;===&lt;br /&gt;
::*	FTP server across network&lt;br /&gt;
::*	HTTP web server across network&lt;br /&gt;
::*	NFS server across network&lt;br /&gt;
::*	SMB (SAMBA) server across network&lt;br /&gt;
::*	Packages located on HD&lt;br /&gt;
::*	CD-ROM or bootable DVD media&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Performing the Installation stages&#039;&#039;&#039; ===&lt;br /&gt;
::*	Start installation&lt;br /&gt;
::*	Choosing language, keyboard and storage type&lt;br /&gt;
::*	Selecting hostname, time zone &amp;amp; root password&lt;br /&gt;
::*	Configuring storage devices&lt;br /&gt;
::*	Configuring the boot loader&lt;br /&gt;
::*	Selecting and installing packages&lt;br /&gt;
::*	Completing first boot wizard&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Starting the Installation&#039;&#039;&#039; ===&lt;br /&gt;
::*	&#039;&#039;&#039;System Rescue&#039;&#039;&#039; – A installation feature used to repair a system from the installation DVD&lt;br /&gt;
:::	Can be used to repair a Linux system which cannot be started. &lt;br /&gt;
::*	&#039;&#039;&#039;Memory Test&#039;&#039;&#039; – Can be used to test memory and prevent errors. Uses memtest86 utility to test RAM for errors&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Checking media for errors&#039;&#039;&#039; ===&lt;br /&gt;
::*	Feature of the default installation&lt;br /&gt;
::*	Optional - Good practice with new, unused media&lt;br /&gt;
::*	Checks bootable DVD or CD-ROM for errors&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Choosing language, keyboard and storage type&#039;&#039;&#039; ===&lt;br /&gt;
::*	This is just a matter of choosing the language you’ll be using, &lt;br /&gt;
:::your default keyboard layout and whether or not you’ll installing Linux locally or on a DASD (direct access storage device)&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Configuring Storage Devices&#039;&#039;&#039; === &lt;br /&gt;
:Can only be one of four basic configurations: &lt;br /&gt;
::*	Primary master PATA  - &#039;&#039;&#039;had&#039;&#039;&#039;&lt;br /&gt;
::*	Primary slave PATA – &#039;&#039;&#039;hdb&#039;&#039;&#039;&lt;br /&gt;
::*	Secondary master PATA – &#039;&#039;&#039;hdc&#039;&#039;&#039;&lt;br /&gt;
::*	Secondary slave PATA – &#039;&#039;&#039;hdd&#039;&#039;&#039;&lt;br /&gt;
:Used by newer server systems typically use :&lt;br /&gt;
::*	SATA/SCSI –1st disk= &#039;&#039;&#039;sda&#039;&#039;&#039;, 2nd disk = &#039;&#039;&#039;sdb&#039;&#039;&#039;, 3rd disk= &#039;&#039;&#039;sdc&#039;&#039;&#039;, ect.&lt;br /&gt;
::*	Unlike PATA can have more than four hard disks&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Hard Disk Partitioning&#039;&#039;&#039; === &lt;br /&gt;
::*	Maximum of four primary partitions&lt;br /&gt;
::*	Extended Partition can contain unlimited number of smaller partitions or logical drives&lt;br /&gt;
::*	Root Directory (&#039;&#039;&#039;\&#039;&#039;&#039;)&lt;br /&gt;
::*	Swap memory – Virtual memory utilized when physical memory (RAM) is being exhausted&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Primary Master Partitioning&#039;&#039;&#039; === &lt;br /&gt;
:Linux only requires two partitions minimum :&lt;br /&gt;
::*	&#039;&#039;&#039;Root&#039;&#039;&#039; directory  (main directory) designated by a “\”&lt;br /&gt;
::*	&#039;&#039;&#039;Swap&#039;&#039;&#039; (aka Virtual memory)&lt;br /&gt;
:::	&#039;&#039;&#039;&#039;&#039;NOTE&#039;&#039;&#039;&#039;&#039; : &#039;&#039;Doesn’t contain a file system and is never mounted to a directory because Linux is responsible for swapping info.&#039;&#039; &lt;br /&gt;
::*	Extra partitions help keep the entire system free from errors.&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Basic Linux&#039;&#039;&#039; === &lt;br /&gt;
::*	&#039;&#039;&#039;Kernel&#039;&#039;&#039; – Loads all components and controls computing activities, the heart of the operating system&lt;br /&gt;
:::	Once the BIOS starts after boot-up, it then starts a boot loader (such as &#039;&#039;GRUB&#039;&#039;) which then loads the Linux Kernel into memory. &lt;br /&gt;
:::	If there is a windows system already on the HD the boot loader can give you the option of which OS you’d like to load. This is known as dual booting.   &lt;br /&gt;
::*	&#039;&#039;&#039;Terminal&#039;&#039;&#039; – Channel that allows users to log in&lt;br /&gt;
::*	&#039;&#039;&#039;Shell&#039;&#039;&#039; – Passes user input to the kernel for processing. BASH shell (Bourne Again Shell) – command-line shell similar to cmd on Windows&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Basic Shell Commands&#039;&#039;&#039;=== &lt;br /&gt;
::*	&#039;&#039;Commands&#039;&#039; – Case sensitive, indicate program to execute&lt;br /&gt;
::*	&#039;&#039;Options&#039;&#039; – specific letters preceded by a hyphen (-) following a command&lt;br /&gt;
::*	&#039;&#039;Arguments&#039;&#039; – specify parameters that tailor the command to the users particular needs&lt;br /&gt;
:::*	Command line order is this.. &#039;&#039;(Command) (Options)(Argument)&#039;&#039;&lt;br /&gt;
::::*	&#039;&#039;&#039;&#039;&#039;Ls – a /etc/ntp&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
:::::	&#039;&#039;Command&#039;&#039; = &#039;&#039;&#039;Ls&#039;&#039;&#039; (list) &lt;br /&gt;
:::::	&#039;&#039;Option&#039;&#039;  =  &#039;&#039;&#039;-a&#039;&#039;&#039; (lists all files)&lt;br /&gt;
:::::	&#039;&#039;Argument&#039;&#039; = &#039;&#039;&#039;/etc/ntp&#039;&#039;&#039; (refers to the &#039;&#039;/etc/ntp&#039;&#039; directory)&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Common Commands&#039;&#039;&#039;=== &lt;br /&gt;
::*You can find some common commands on page 66 of the text. &lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Metacharacters&#039;&#039;&#039;=== &lt;br /&gt;
::*	Keyboard characters that have a special meaning &lt;br /&gt;
::*	(&#039;&#039;&#039;$&#039;&#039;&#039;) – Tells the shell that the following text refers to variable&lt;br /&gt;
::*	A piece of information that is stored in memory, typically uppercase words, automatically set by the Linux system at login&lt;br /&gt;
::*	There’s a list of metacharacters used in BASH on page 67 of the text&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Help&#039;&#039;&#039;=== &lt;br /&gt;
::*	Manual pages (man pages)&lt;br /&gt;
:::*	&#039;&#039;&#039;man &amp;lt;command name&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
::*	Include description, syntax, options, related files, and commands&lt;br /&gt;
::*	Search manual pages with a keyword use –k&lt;br /&gt;
:::*	&#039;&#039;&#039;man –k &amp;lt;keyword&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
::*	Info pages – include easy-to-read description and hyperlinks &lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Shutdown Commands&#039;&#039;&#039;=== &lt;br /&gt;
::*There’s a list of various shutdown commands on page 73 of the text&lt;br /&gt;
&lt;br /&gt;
==== All info compiled, edited and coded by : Rob Klaers, Clay Wilson, Michael Garin, &amp;amp; Todd Bailly ====&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5079</id>
		<title>ITCwiki:Current events</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5079"/>
		<updated>2012-01-27T00:54:25Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: /* Chapter 2 Linux Installation and Usage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Chapter 2 Linux Installation and Usage&#039;&#039;&#039; ==&lt;br /&gt;
::^	Preparation and installation of Fedora Linux using good practices.&lt;br /&gt;
::^	Outline the structure of Linux interface.&lt;br /&gt;
::^	Enter basic shell commands and find command documentation.&lt;br /&gt;
::^	Properly shutdown the Linux OS&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Preparing for Installation&#039;&#039;&#039; ===&lt;br /&gt;
::*	Hardware Compatibility List (HCL)&lt;br /&gt;
::*	The minimum requirement s for Fedora 13 Linux can be found :&lt;br /&gt;
::::	&#039;&#039;http://docs.fedoraproject.org&#039;&#039;&lt;br /&gt;
::*	Preinstallation checklist&lt;br /&gt;
::*	A system checklist that can compared against the HCL during installation. &lt;br /&gt;
::*	Information will include :&lt;br /&gt;
:::•	CPU (Type /MHz)&lt;br /&gt;
:::•	RAM (Mb)&lt;br /&gt;
:::•	Keyboard model and layout&lt;br /&gt;
:::•	Hard Disk size (MB)&lt;br /&gt;
:::•	Host Name&lt;br /&gt;
:::•	Network card IP configuration&lt;br /&gt;
:::•	IP address, Netmask Gatway, DNS servers, and DHCP&lt;br /&gt;
:::•	Linux Packages to install &lt;br /&gt;
:::•	Video Card Make and Model&lt;br /&gt;
:::•	Video Card RAM (Mb)&lt;br /&gt;
:::•	Monitor make and model&lt;br /&gt;
:::•	Monitor Vsync and HSync ranges&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Installation Methods&#039;&#039;&#039;===&lt;br /&gt;
::*	FTP server across network&lt;br /&gt;
::*	HTTP web server across network&lt;br /&gt;
::*	NFS server across network&lt;br /&gt;
::*	SMB (SAMBA) server across network&lt;br /&gt;
::*	Packages located on HD&lt;br /&gt;
::*	CD-ROM or bootable DVD media&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Performing the Installation stages&#039;&#039;&#039; ===&lt;br /&gt;
::*	Start installation&lt;br /&gt;
::*	Choosing language, keyboard and storage type&lt;br /&gt;
::*	Selecting hostname, time zone &amp;amp; root password&lt;br /&gt;
::*	Configuring storage devices&lt;br /&gt;
::*	Configuring the boot loader&lt;br /&gt;
::*	Selecting and installing packages&lt;br /&gt;
::*	Completing first boot wizard&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Starting the Installation&#039;&#039;&#039; ===&lt;br /&gt;
::*	&#039;&#039;&#039;System Rescue&#039;&#039;&#039; – A installation feature used to repair a system from the installation DVD&lt;br /&gt;
:::	Can be used to repair a Linux system which cannot be started. &lt;br /&gt;
::*	&#039;&#039;&#039;Memory Test&#039;&#039;&#039; – Can be used to test memory and prevent errors. Uses memtest86 utility to test RAM for errors&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Checking media for errors&#039;&#039;&#039; ===&lt;br /&gt;
::*	Feature of the default installation&lt;br /&gt;
::*	Optional - Good practice with new, unused media&lt;br /&gt;
::*	Checks bootable DVD or CD-ROM for errors&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Choosing language, keyboard and storage type&#039;&#039;&#039; ===&lt;br /&gt;
::*	This is just a matter of choosing the language you’ll be using, &lt;br /&gt;
:::your default keyboard layout and whether or not you’ll installing Linux locally or on a DASD (direct access storage device)&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Configuring Storage Devices&#039;&#039;&#039; === &lt;br /&gt;
:Can only be one of four basic configurations: &lt;br /&gt;
::*	Primary master PATA  - &#039;&#039;&#039;had&#039;&#039;&#039;&lt;br /&gt;
::*	Primary slave PATA – &#039;&#039;&#039;hdb&#039;&#039;&#039;&lt;br /&gt;
::*	Secondary master PATA – &#039;&#039;&#039;hdc&#039;&#039;&#039;&lt;br /&gt;
::*	Secondary slave PATA – &#039;&#039;&#039;hdd&#039;&#039;&#039;&lt;br /&gt;
:Used by newer server systems typically use :&lt;br /&gt;
::*	SATA/SCSI –1st disk= &#039;&#039;&#039;sda&#039;&#039;&#039;, 2nd disk = &#039;&#039;&#039;sdb&#039;&#039;&#039;, 3rd disk= &#039;&#039;&#039;sdc&#039;&#039;&#039;, ect.&lt;br /&gt;
::*	Unlike PATA can have more than four hard disks&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Hard Disk Partitioning&#039;&#039;&#039; === &lt;br /&gt;
::*	Maximum of four primary partitions&lt;br /&gt;
::*	Extended Partition can contain unlimited number of smaller partitions or logical drives&lt;br /&gt;
::*	Root Directory (&#039;&#039;&#039;\&#039;&#039;&#039;)&lt;br /&gt;
::*	Swap memory – Virtual memory utilized when physical memory (RAM) is being exhausted&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Primary Master Partitioning&#039;&#039;&#039; === &lt;br /&gt;
:Linux only requires two partitions minimum :&lt;br /&gt;
::*	&#039;&#039;&#039;Root&#039;&#039;&#039; directory  (main directory) designated by a “\”&lt;br /&gt;
::*	&#039;&#039;&#039;Swap&#039;&#039;&#039; (aka Virtual memory)&lt;br /&gt;
:::	&#039;&#039;&#039;&#039;&#039;NOTE&#039;&#039;&#039;&#039;&#039; : &#039;&#039;Doesn’t contain a file system and is never mounted to a directory because Linux is responsible for swapping info.&#039;&#039; &lt;br /&gt;
::*	Extra partitions help keep the entire system free from errors.&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Basic Linux&#039;&#039;&#039; === &lt;br /&gt;
::*	&#039;&#039;&#039;Kernel&#039;&#039;&#039; – Loads all components and controls computing activities, the heart of the operating system&lt;br /&gt;
:::	Once the BIOS starts after boot-up, it then starts a boot loader (such as &#039;&#039;GRUB&#039;&#039;) which then loads the Linux Kernel into memory. &lt;br /&gt;
:::	If there is a windows system already on the HD the boot loader can give you the option of which OS you’d like to load. This is known as dual booting.   &lt;br /&gt;
::*	&#039;&#039;&#039;Terminal&#039;&#039;&#039; – Channel that allows users to log in&lt;br /&gt;
::*	&#039;&#039;&#039;Shell&#039;&#039;&#039; – Passes user input to the kernel for processing. BASH shell (Bourne Again Shell) – command-line shell similar to cmd on Windows&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Basic Shell Commands&#039;&#039;&#039;=== &lt;br /&gt;
::*	&#039;&#039;Commands&#039;&#039; – Case sensitive, indicate program to execute&lt;br /&gt;
::*	&#039;&#039;Options&#039;&#039; – specific letters preceded by a hyphen (-) following a command&lt;br /&gt;
::*	&#039;&#039;Arguments&#039;&#039; – specify parameters that tailor the command to the users particular needs&lt;br /&gt;
:::*	Command line order is this.. &#039;&#039;(Command) (Options)(Argument)&#039;&#039;&lt;br /&gt;
::::*	&#039;&#039;&#039;&#039;&#039;Ls – a /etc/ntp&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
:::::	&#039;&#039;Command&#039;&#039; = &#039;&#039;&#039;Ls&#039;&#039;&#039; (list) &lt;br /&gt;
:::::	&#039;&#039;Option&#039;&#039;  =  &#039;&#039;&#039;-a&#039;&#039;&#039; (lists all files)&lt;br /&gt;
:::::	&#039;&#039;Argument&#039;&#039; = &#039;&#039;&#039;/etc/ntp&#039;&#039;&#039; (refers to the &#039;&#039;/etc/ntp&#039;&#039; directory)&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Common Commands&#039;&#039;&#039;=== &lt;br /&gt;
::*You can find some common commands on page 66 of the text. &lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Metacharacters&#039;&#039;&#039;=== &lt;br /&gt;
::*	Keyboard characters that have a special meaning &lt;br /&gt;
::*	(&#039;&#039;&#039;$&#039;&#039;&#039;) – Tells the shell that the following text refers to variable&lt;br /&gt;
::*	A piece of information that is stored in memory, typically uppercase words, automatically set by the Linux system at login&lt;br /&gt;
::*	There’s a list of metacharacters used in BASH on page 67 of the text&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Help&#039;&#039;&#039;=== &lt;br /&gt;
::*	Manual pages (man pages)&lt;br /&gt;
:::*	&#039;&#039;&#039;man &amp;lt;command name&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
::*	Include description, syntax, options, related files, and commands&lt;br /&gt;
::*	Search manual pages with a keyword use –k&lt;br /&gt;
:::*	&#039;&#039;&#039;man –k &amp;lt;keyword&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
::*	Info pages – include easy-to-read description and hyperlinks &lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Shutdown Commands&#039;&#039;&#039;=== &lt;br /&gt;
::*There’s a list of various shutdown commands on page 73 of the text&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5078</id>
		<title>ITCwiki:Current events</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5078"/>
		<updated>2012-01-27T00:54:06Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: /* Chapter 2 Linux Installation and Usage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Chapter 2 Linux Installation and Usage&#039;&#039;&#039; ==&lt;br /&gt;
::$	Preparation and installation of Fedora Linux using good practices.&lt;br /&gt;
::*	Outline the structure of Linux interface.&lt;br /&gt;
::*	Enter basic shell commands and find command documentation.&lt;br /&gt;
::*	Properly shutdown the Linux OS&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Preparing for Installation&#039;&#039;&#039; ===&lt;br /&gt;
::*	Hardware Compatibility List (HCL)&lt;br /&gt;
::*	The minimum requirement s for Fedora 13 Linux can be found :&lt;br /&gt;
::::	&#039;&#039;http://docs.fedoraproject.org&#039;&#039;&lt;br /&gt;
::*	Preinstallation checklist&lt;br /&gt;
::*	A system checklist that can compared against the HCL during installation. &lt;br /&gt;
::*	Information will include :&lt;br /&gt;
:::•	CPU (Type /MHz)&lt;br /&gt;
:::•	RAM (Mb)&lt;br /&gt;
:::•	Keyboard model and layout&lt;br /&gt;
:::•	Hard Disk size (MB)&lt;br /&gt;
:::•	Host Name&lt;br /&gt;
:::•	Network card IP configuration&lt;br /&gt;
:::•	IP address, Netmask Gatway, DNS servers, and DHCP&lt;br /&gt;
:::•	Linux Packages to install &lt;br /&gt;
:::•	Video Card Make and Model&lt;br /&gt;
:::•	Video Card RAM (Mb)&lt;br /&gt;
:::•	Monitor make and model&lt;br /&gt;
:::•	Monitor Vsync and HSync ranges&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Installation Methods&#039;&#039;&#039;===&lt;br /&gt;
::*	FTP server across network&lt;br /&gt;
::*	HTTP web server across network&lt;br /&gt;
::*	NFS server across network&lt;br /&gt;
::*	SMB (SAMBA) server across network&lt;br /&gt;
::*	Packages located on HD&lt;br /&gt;
::*	CD-ROM or bootable DVD media&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Performing the Installation stages&#039;&#039;&#039; ===&lt;br /&gt;
::*	Start installation&lt;br /&gt;
::*	Choosing language, keyboard and storage type&lt;br /&gt;
::*	Selecting hostname, time zone &amp;amp; root password&lt;br /&gt;
::*	Configuring storage devices&lt;br /&gt;
::*	Configuring the boot loader&lt;br /&gt;
::*	Selecting and installing packages&lt;br /&gt;
::*	Completing first boot wizard&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Starting the Installation&#039;&#039;&#039; ===&lt;br /&gt;
::*	&#039;&#039;&#039;System Rescue&#039;&#039;&#039; – A installation feature used to repair a system from the installation DVD&lt;br /&gt;
:::	Can be used to repair a Linux system which cannot be started. &lt;br /&gt;
::*	&#039;&#039;&#039;Memory Test&#039;&#039;&#039; – Can be used to test memory and prevent errors. Uses memtest86 utility to test RAM for errors&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Checking media for errors&#039;&#039;&#039; ===&lt;br /&gt;
::*	Feature of the default installation&lt;br /&gt;
::*	Optional - Good practice with new, unused media&lt;br /&gt;
::*	Checks bootable DVD or CD-ROM for errors&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Choosing language, keyboard and storage type&#039;&#039;&#039; ===&lt;br /&gt;
::*	This is just a matter of choosing the language you’ll be using, &lt;br /&gt;
:::your default keyboard layout and whether or not you’ll installing Linux locally or on a DASD (direct access storage device)&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Configuring Storage Devices&#039;&#039;&#039; === &lt;br /&gt;
:Can only be one of four basic configurations: &lt;br /&gt;
::*	Primary master PATA  - &#039;&#039;&#039;had&#039;&#039;&#039;&lt;br /&gt;
::*	Primary slave PATA – &#039;&#039;&#039;hdb&#039;&#039;&#039;&lt;br /&gt;
::*	Secondary master PATA – &#039;&#039;&#039;hdc&#039;&#039;&#039;&lt;br /&gt;
::*	Secondary slave PATA – &#039;&#039;&#039;hdd&#039;&#039;&#039;&lt;br /&gt;
:Used by newer server systems typically use :&lt;br /&gt;
::*	SATA/SCSI –1st disk= &#039;&#039;&#039;sda&#039;&#039;&#039;, 2nd disk = &#039;&#039;&#039;sdb&#039;&#039;&#039;, 3rd disk= &#039;&#039;&#039;sdc&#039;&#039;&#039;, ect.&lt;br /&gt;
::*	Unlike PATA can have more than four hard disks&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Hard Disk Partitioning&#039;&#039;&#039; === &lt;br /&gt;
::*	Maximum of four primary partitions&lt;br /&gt;
::*	Extended Partition can contain unlimited number of smaller partitions or logical drives&lt;br /&gt;
::*	Root Directory (&#039;&#039;&#039;\&#039;&#039;&#039;)&lt;br /&gt;
::*	Swap memory – Virtual memory utilized when physical memory (RAM) is being exhausted&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Primary Master Partitioning&#039;&#039;&#039; === &lt;br /&gt;
:Linux only requires two partitions minimum :&lt;br /&gt;
::*	&#039;&#039;&#039;Root&#039;&#039;&#039; directory  (main directory) designated by a “\”&lt;br /&gt;
::*	&#039;&#039;&#039;Swap&#039;&#039;&#039; (aka Virtual memory)&lt;br /&gt;
:::	&#039;&#039;&#039;&#039;&#039;NOTE&#039;&#039;&#039;&#039;&#039; : &#039;&#039;Doesn’t contain a file system and is never mounted to a directory because Linux is responsible for swapping info.&#039;&#039; &lt;br /&gt;
::*	Extra partitions help keep the entire system free from errors.&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Basic Linux&#039;&#039;&#039; === &lt;br /&gt;
::*	&#039;&#039;&#039;Kernel&#039;&#039;&#039; – Loads all components and controls computing activities, the heart of the operating system&lt;br /&gt;
:::	Once the BIOS starts after boot-up, it then starts a boot loader (such as &#039;&#039;GRUB&#039;&#039;) which then loads the Linux Kernel into memory. &lt;br /&gt;
:::	If there is a windows system already on the HD the boot loader can give you the option of which OS you’d like to load. This is known as dual booting.   &lt;br /&gt;
::*	&#039;&#039;&#039;Terminal&#039;&#039;&#039; – Channel that allows users to log in&lt;br /&gt;
::*	&#039;&#039;&#039;Shell&#039;&#039;&#039; – Passes user input to the kernel for processing. BASH shell (Bourne Again Shell) – command-line shell similar to cmd on Windows&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Basic Shell Commands&#039;&#039;&#039;=== &lt;br /&gt;
::*	&#039;&#039;Commands&#039;&#039; – Case sensitive, indicate program to execute&lt;br /&gt;
::*	&#039;&#039;Options&#039;&#039; – specific letters preceded by a hyphen (-) following a command&lt;br /&gt;
::*	&#039;&#039;Arguments&#039;&#039; – specify parameters that tailor the command to the users particular needs&lt;br /&gt;
:::*	Command line order is this.. &#039;&#039;(Command) (Options)(Argument)&#039;&#039;&lt;br /&gt;
::::*	&#039;&#039;&#039;&#039;&#039;Ls – a /etc/ntp&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
:::::	&#039;&#039;Command&#039;&#039; = &#039;&#039;&#039;Ls&#039;&#039;&#039; (list) &lt;br /&gt;
:::::	&#039;&#039;Option&#039;&#039;  =  &#039;&#039;&#039;-a&#039;&#039;&#039; (lists all files)&lt;br /&gt;
:::::	&#039;&#039;Argument&#039;&#039; = &#039;&#039;&#039;/etc/ntp&#039;&#039;&#039; (refers to the &#039;&#039;/etc/ntp&#039;&#039; directory)&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Common Commands&#039;&#039;&#039;=== &lt;br /&gt;
::*You can find some common commands on page 66 of the text. &lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Metacharacters&#039;&#039;&#039;=== &lt;br /&gt;
::*	Keyboard characters that have a special meaning &lt;br /&gt;
::*	(&#039;&#039;&#039;$&#039;&#039;&#039;) – Tells the shell that the following text refers to variable&lt;br /&gt;
::*	A piece of information that is stored in memory, typically uppercase words, automatically set by the Linux system at login&lt;br /&gt;
::*	There’s a list of metacharacters used in BASH on page 67 of the text&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Help&#039;&#039;&#039;=== &lt;br /&gt;
::*	Manual pages (man pages)&lt;br /&gt;
:::*	&#039;&#039;&#039;man &amp;lt;command name&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
::*	Include description, syntax, options, related files, and commands&lt;br /&gt;
::*	Search manual pages with a keyword use –k&lt;br /&gt;
:::*	&#039;&#039;&#039;man –k &amp;lt;keyword&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
::*	Info pages – include easy-to-read description and hyperlinks &lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Shutdown Commands&#039;&#039;&#039;=== &lt;br /&gt;
::*There’s a list of various shutdown commands on page 73 of the text&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5077</id>
		<title>ITCwiki:Current events</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5077"/>
		<updated>2012-01-27T00:53:52Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: /* Chapter 2 Linux Installation and Usage */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Chapter 2 Linux Installation and Usage&#039;&#039;&#039; ==&lt;br /&gt;
::@	Preparation and installation of Fedora Linux using good practices.&lt;br /&gt;
::*	Outline the structure of Linux interface.&lt;br /&gt;
::*	Enter basic shell commands and find command documentation.&lt;br /&gt;
::*	Properly shutdown the Linux OS&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Preparing for Installation&#039;&#039;&#039; ===&lt;br /&gt;
::*	Hardware Compatibility List (HCL)&lt;br /&gt;
::*	The minimum requirement s for Fedora 13 Linux can be found :&lt;br /&gt;
::::	&#039;&#039;http://docs.fedoraproject.org&#039;&#039;&lt;br /&gt;
::*	Preinstallation checklist&lt;br /&gt;
::*	A system checklist that can compared against the HCL during installation. &lt;br /&gt;
::*	Information will include :&lt;br /&gt;
:::•	CPU (Type /MHz)&lt;br /&gt;
:::•	RAM (Mb)&lt;br /&gt;
:::•	Keyboard model and layout&lt;br /&gt;
:::•	Hard Disk size (MB)&lt;br /&gt;
:::•	Host Name&lt;br /&gt;
:::•	Network card IP configuration&lt;br /&gt;
:::•	IP address, Netmask Gatway, DNS servers, and DHCP&lt;br /&gt;
:::•	Linux Packages to install &lt;br /&gt;
:::•	Video Card Make and Model&lt;br /&gt;
:::•	Video Card RAM (Mb)&lt;br /&gt;
:::•	Monitor make and model&lt;br /&gt;
:::•	Monitor Vsync and HSync ranges&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Installation Methods&#039;&#039;&#039;===&lt;br /&gt;
::*	FTP server across network&lt;br /&gt;
::*	HTTP web server across network&lt;br /&gt;
::*	NFS server across network&lt;br /&gt;
::*	SMB (SAMBA) server across network&lt;br /&gt;
::*	Packages located on HD&lt;br /&gt;
::*	CD-ROM or bootable DVD media&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Performing the Installation stages&#039;&#039;&#039; ===&lt;br /&gt;
::*	Start installation&lt;br /&gt;
::*	Choosing language, keyboard and storage type&lt;br /&gt;
::*	Selecting hostname, time zone &amp;amp; root password&lt;br /&gt;
::*	Configuring storage devices&lt;br /&gt;
::*	Configuring the boot loader&lt;br /&gt;
::*	Selecting and installing packages&lt;br /&gt;
::*	Completing first boot wizard&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Starting the Installation&#039;&#039;&#039; ===&lt;br /&gt;
::*	&#039;&#039;&#039;System Rescue&#039;&#039;&#039; – A installation feature used to repair a system from the installation DVD&lt;br /&gt;
:::	Can be used to repair a Linux system which cannot be started. &lt;br /&gt;
::*	&#039;&#039;&#039;Memory Test&#039;&#039;&#039; – Can be used to test memory and prevent errors. Uses memtest86 utility to test RAM for errors&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Checking media for errors&#039;&#039;&#039; ===&lt;br /&gt;
::*	Feature of the default installation&lt;br /&gt;
::*	Optional - Good practice with new, unused media&lt;br /&gt;
::*	Checks bootable DVD or CD-ROM for errors&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Choosing language, keyboard and storage type&#039;&#039;&#039; ===&lt;br /&gt;
::*	This is just a matter of choosing the language you’ll be using, &lt;br /&gt;
:::your default keyboard layout and whether or not you’ll installing Linux locally or on a DASD (direct access storage device)&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Configuring Storage Devices&#039;&#039;&#039; === &lt;br /&gt;
:Can only be one of four basic configurations: &lt;br /&gt;
::*	Primary master PATA  - &#039;&#039;&#039;had&#039;&#039;&#039;&lt;br /&gt;
::*	Primary slave PATA – &#039;&#039;&#039;hdb&#039;&#039;&#039;&lt;br /&gt;
::*	Secondary master PATA – &#039;&#039;&#039;hdc&#039;&#039;&#039;&lt;br /&gt;
::*	Secondary slave PATA – &#039;&#039;&#039;hdd&#039;&#039;&#039;&lt;br /&gt;
:Used by newer server systems typically use :&lt;br /&gt;
::*	SATA/SCSI –1st disk= &#039;&#039;&#039;sda&#039;&#039;&#039;, 2nd disk = &#039;&#039;&#039;sdb&#039;&#039;&#039;, 3rd disk= &#039;&#039;&#039;sdc&#039;&#039;&#039;, ect.&lt;br /&gt;
::*	Unlike PATA can have more than four hard disks&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Hard Disk Partitioning&#039;&#039;&#039; === &lt;br /&gt;
::*	Maximum of four primary partitions&lt;br /&gt;
::*	Extended Partition can contain unlimited number of smaller partitions or logical drives&lt;br /&gt;
::*	Root Directory (&#039;&#039;&#039;\&#039;&#039;&#039;)&lt;br /&gt;
::*	Swap memory – Virtual memory utilized when physical memory (RAM) is being exhausted&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Primary Master Partitioning&#039;&#039;&#039; === &lt;br /&gt;
:Linux only requires two partitions minimum :&lt;br /&gt;
::*	&#039;&#039;&#039;Root&#039;&#039;&#039; directory  (main directory) designated by a “\”&lt;br /&gt;
::*	&#039;&#039;&#039;Swap&#039;&#039;&#039; (aka Virtual memory)&lt;br /&gt;
:::	&#039;&#039;&#039;&#039;&#039;NOTE&#039;&#039;&#039;&#039;&#039; : &#039;&#039;Doesn’t contain a file system and is never mounted to a directory because Linux is responsible for swapping info.&#039;&#039; &lt;br /&gt;
::*	Extra partitions help keep the entire system free from errors.&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Basic Linux&#039;&#039;&#039; === &lt;br /&gt;
::*	&#039;&#039;&#039;Kernel&#039;&#039;&#039; – Loads all components and controls computing activities, the heart of the operating system&lt;br /&gt;
:::	Once the BIOS starts after boot-up, it then starts a boot loader (such as &#039;&#039;GRUB&#039;&#039;) which then loads the Linux Kernel into memory. &lt;br /&gt;
:::	If there is a windows system already on the HD the boot loader can give you the option of which OS you’d like to load. This is known as dual booting.   &lt;br /&gt;
::*	&#039;&#039;&#039;Terminal&#039;&#039;&#039; – Channel that allows users to log in&lt;br /&gt;
::*	&#039;&#039;&#039;Shell&#039;&#039;&#039; – Passes user input to the kernel for processing. BASH shell (Bourne Again Shell) – command-line shell similar to cmd on Windows&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Basic Shell Commands&#039;&#039;&#039;=== &lt;br /&gt;
::*	&#039;&#039;Commands&#039;&#039; – Case sensitive, indicate program to execute&lt;br /&gt;
::*	&#039;&#039;Options&#039;&#039; – specific letters preceded by a hyphen (-) following a command&lt;br /&gt;
::*	&#039;&#039;Arguments&#039;&#039; – specify parameters that tailor the command to the users particular needs&lt;br /&gt;
:::*	Command line order is this.. &#039;&#039;(Command) (Options)(Argument)&#039;&#039;&lt;br /&gt;
::::*	&#039;&#039;&#039;&#039;&#039;Ls – a /etc/ntp&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
:::::	&#039;&#039;Command&#039;&#039; = &#039;&#039;&#039;Ls&#039;&#039;&#039; (list) &lt;br /&gt;
:::::	&#039;&#039;Option&#039;&#039;  =  &#039;&#039;&#039;-a&#039;&#039;&#039; (lists all files)&lt;br /&gt;
:::::	&#039;&#039;Argument&#039;&#039; = &#039;&#039;&#039;/etc/ntp&#039;&#039;&#039; (refers to the &#039;&#039;/etc/ntp&#039;&#039; directory)&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Common Commands&#039;&#039;&#039;=== &lt;br /&gt;
::*You can find some common commands on page 66 of the text. &lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Metacharacters&#039;&#039;&#039;=== &lt;br /&gt;
::*	Keyboard characters that have a special meaning &lt;br /&gt;
::*	(&#039;&#039;&#039;$&#039;&#039;&#039;) – Tells the shell that the following text refers to variable&lt;br /&gt;
::*	A piece of information that is stored in memory, typically uppercase words, automatically set by the Linux system at login&lt;br /&gt;
::*	There’s a list of metacharacters used in BASH on page 67 of the text&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Help&#039;&#039;&#039;=== &lt;br /&gt;
::*	Manual pages (man pages)&lt;br /&gt;
:::*	&#039;&#039;&#039;man &amp;lt;command name&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
::*	Include description, syntax, options, related files, and commands&lt;br /&gt;
::*	Search manual pages with a keyword use –k&lt;br /&gt;
:::*	&#039;&#039;&#039;man –k &amp;lt;keyword&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
::*	Info pages – include easy-to-read description and hyperlinks &lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Shutdown Commands&#039;&#039;&#039;=== &lt;br /&gt;
::*There’s a list of various shutdown commands on page 73 of the text&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
	<entry>
		<id>https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5076</id>
		<title>ITCwiki:Current events</title>
		<link rel="alternate" type="text/html" href="https://wiki.ihitc.net/mediawiki/index.php?title=ITCwiki:Current_events&amp;diff=5076"/>
		<updated>2012-01-27T00:52:52Z</updated>

		<summary type="html">&lt;p&gt;Klae0010: /* Hard Disk Partitioning */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== &#039;&#039;&#039;Chapter 2 Linux Installation and Usage&#039;&#039;&#039; ==&lt;br /&gt;
::*	Preparation and installation of Fedora Linux using good practices.&lt;br /&gt;
::*	Outline the structure of Linux interface.&lt;br /&gt;
::*	Enter basic shell commands and find command documentation.&lt;br /&gt;
::*	Properly shutdown the Linux OS&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Preparing for Installation&#039;&#039;&#039; ===&lt;br /&gt;
::*	Hardware Compatibility List (HCL)&lt;br /&gt;
::*	The minimum requirement s for Fedora 13 Linux can be found :&lt;br /&gt;
::::	&#039;&#039;http://docs.fedoraproject.org&#039;&#039;&lt;br /&gt;
::*	Preinstallation checklist&lt;br /&gt;
::*	A system checklist that can compared against the HCL during installation. &lt;br /&gt;
::*	Information will include :&lt;br /&gt;
:::•	CPU (Type /MHz)&lt;br /&gt;
:::•	RAM (Mb)&lt;br /&gt;
:::•	Keyboard model and layout&lt;br /&gt;
:::•	Hard Disk size (MB)&lt;br /&gt;
:::•	Host Name&lt;br /&gt;
:::•	Network card IP configuration&lt;br /&gt;
:::•	IP address, Netmask Gatway, DNS servers, and DHCP&lt;br /&gt;
:::•	Linux Packages to install &lt;br /&gt;
:::•	Video Card Make and Model&lt;br /&gt;
:::•	Video Card RAM (Mb)&lt;br /&gt;
:::•	Monitor make and model&lt;br /&gt;
:::•	Monitor Vsync and HSync ranges&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Installation Methods&#039;&#039;&#039;===&lt;br /&gt;
::*	FTP server across network&lt;br /&gt;
::*	HTTP web server across network&lt;br /&gt;
::*	NFS server across network&lt;br /&gt;
::*	SMB (SAMBA) server across network&lt;br /&gt;
::*	Packages located on HD&lt;br /&gt;
::*	CD-ROM or bootable DVD media&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Performing the Installation stages&#039;&#039;&#039; ===&lt;br /&gt;
::*	Start installation&lt;br /&gt;
::*	Choosing language, keyboard and storage type&lt;br /&gt;
::*	Selecting hostname, time zone &amp;amp; root password&lt;br /&gt;
::*	Configuring storage devices&lt;br /&gt;
::*	Configuring the boot loader&lt;br /&gt;
::*	Selecting and installing packages&lt;br /&gt;
::*	Completing first boot wizard&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Starting the Installation&#039;&#039;&#039; ===&lt;br /&gt;
::*	&#039;&#039;&#039;System Rescue&#039;&#039;&#039; – A installation feature used to repair a system from the installation DVD&lt;br /&gt;
:::	Can be used to repair a Linux system which cannot be started. &lt;br /&gt;
::*	&#039;&#039;&#039;Memory Test&#039;&#039;&#039; – Can be used to test memory and prevent errors. Uses memtest86 utility to test RAM for errors&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Checking media for errors&#039;&#039;&#039; ===&lt;br /&gt;
::*	Feature of the default installation&lt;br /&gt;
::*	Optional - Good practice with new, unused media&lt;br /&gt;
::*	Checks bootable DVD or CD-ROM for errors&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Choosing language, keyboard and storage type&#039;&#039;&#039; ===&lt;br /&gt;
::*	This is just a matter of choosing the language you’ll be using, &lt;br /&gt;
:::your default keyboard layout and whether or not you’ll installing Linux locally or on a DASD (direct access storage device)&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Configuring Storage Devices&#039;&#039;&#039; === &lt;br /&gt;
:Can only be one of four basic configurations: &lt;br /&gt;
::*	Primary master PATA  - &#039;&#039;&#039;had&#039;&#039;&#039;&lt;br /&gt;
::*	Primary slave PATA – &#039;&#039;&#039;hdb&#039;&#039;&#039;&lt;br /&gt;
::*	Secondary master PATA – &#039;&#039;&#039;hdc&#039;&#039;&#039;&lt;br /&gt;
::*	Secondary slave PATA – &#039;&#039;&#039;hdd&#039;&#039;&#039;&lt;br /&gt;
:Used by newer server systems typically use :&lt;br /&gt;
::*	SATA/SCSI –1st disk= &#039;&#039;&#039;sda&#039;&#039;&#039;, 2nd disk = &#039;&#039;&#039;sdb&#039;&#039;&#039;, 3rd disk= &#039;&#039;&#039;sdc&#039;&#039;&#039;, ect.&lt;br /&gt;
::*	Unlike PATA can have more than four hard disks&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Hard Disk Partitioning&#039;&#039;&#039; === &lt;br /&gt;
::*	Maximum of four primary partitions&lt;br /&gt;
::*	Extended Partition can contain unlimited number of smaller partitions or logical drives&lt;br /&gt;
::*	Root Directory (&#039;&#039;&#039;\&#039;&#039;&#039;)&lt;br /&gt;
::*	Swap memory – Virtual memory utilized when physical memory (RAM) is being exhausted&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Primary Master Partitioning&#039;&#039;&#039; === &lt;br /&gt;
:Linux only requires two partitions minimum :&lt;br /&gt;
::*	&#039;&#039;&#039;Root&#039;&#039;&#039; directory  (main directory) designated by a “\”&lt;br /&gt;
::*	&#039;&#039;&#039;Swap&#039;&#039;&#039; (aka Virtual memory)&lt;br /&gt;
:::	&#039;&#039;&#039;&#039;&#039;NOTE&#039;&#039;&#039;&#039;&#039; : &#039;&#039;Doesn’t contain a file system and is never mounted to a directory because Linux is responsible for swapping info.&#039;&#039; &lt;br /&gt;
::*	Extra partitions help keep the entire system free from errors.&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Basic Linux&#039;&#039;&#039; === &lt;br /&gt;
::*	&#039;&#039;&#039;Kernel&#039;&#039;&#039; – Loads all components and controls computing activities, the heart of the operating system&lt;br /&gt;
:::	Once the BIOS starts after boot-up, it then starts a boot loader (such as &#039;&#039;GRUB&#039;&#039;) which then loads the Linux Kernel into memory. &lt;br /&gt;
:::	If there is a windows system already on the HD the boot loader can give you the option of which OS you’d like to load. This is known as dual booting.   &lt;br /&gt;
::*	&#039;&#039;&#039;Terminal&#039;&#039;&#039; – Channel that allows users to log in&lt;br /&gt;
::*	&#039;&#039;&#039;Shell&#039;&#039;&#039; – Passes user input to the kernel for processing. BASH shell (Bourne Again Shell) – command-line shell similar to cmd on Windows&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Basic Shell Commands&#039;&#039;&#039;=== &lt;br /&gt;
::*	&#039;&#039;Commands&#039;&#039; – Case sensitive, indicate program to execute&lt;br /&gt;
::*	&#039;&#039;Options&#039;&#039; – specific letters preceded by a hyphen (-) following a command&lt;br /&gt;
::*	&#039;&#039;Arguments&#039;&#039; – specify parameters that tailor the command to the users particular needs&lt;br /&gt;
:::*	Command line order is this.. &#039;&#039;(Command) (Options)(Argument)&#039;&#039;&lt;br /&gt;
::::*	&#039;&#039;&#039;&#039;&#039;Ls – a /etc/ntp&#039;&#039;&#039;&#039;&#039;&lt;br /&gt;
:::::	&#039;&#039;Command&#039;&#039; = &#039;&#039;&#039;Ls&#039;&#039;&#039; (list) &lt;br /&gt;
:::::	&#039;&#039;Option&#039;&#039;  =  &#039;&#039;&#039;-a&#039;&#039;&#039; (lists all files)&lt;br /&gt;
:::::	&#039;&#039;Argument&#039;&#039; = &#039;&#039;&#039;/etc/ntp&#039;&#039;&#039; (refers to the &#039;&#039;/etc/ntp&#039;&#039; directory)&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Common Commands&#039;&#039;&#039;=== &lt;br /&gt;
::*You can find some common commands on page 66 of the text. &lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Metacharacters&#039;&#039;&#039;=== &lt;br /&gt;
::*	Keyboard characters that have a special meaning &lt;br /&gt;
::*	(&#039;&#039;&#039;$&#039;&#039;&#039;) – Tells the shell that the following text refers to variable&lt;br /&gt;
::*	A piece of information that is stored in memory, typically uppercase words, automatically set by the Linux system at login&lt;br /&gt;
::*	There’s a list of metacharacters used in BASH on page 67 of the text&lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Help&#039;&#039;&#039;=== &lt;br /&gt;
::*	Manual pages (man pages)&lt;br /&gt;
:::*	&#039;&#039;&#039;man &amp;lt;command name&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
::*	Include description, syntax, options, related files, and commands&lt;br /&gt;
::*	Search manual pages with a keyword use –k&lt;br /&gt;
:::*	&#039;&#039;&#039;man –k &amp;lt;keyword&amp;gt;&#039;&#039;&#039;&lt;br /&gt;
::*	Info pages – include easy-to-read description and hyperlinks &lt;br /&gt;
&lt;br /&gt;
=== &#039;&#039;&#039;Shutdown Commands&#039;&#039;&#039;=== &lt;br /&gt;
::*There’s a list of various shutdown commands on page 73 of the text&lt;/div&gt;</summary>
		<author><name>Klae0010</name></author>
	</entry>
</feed>