Advertisment

K desktop environment

author-image
PCQ Bureau
New Update

This month’s CD includes the final release of KDE–K desktop environment

version 1.1. This version comes with a new installation program called install-kde-1.1,

which makes KDE easy to install or upgrade.

Advertisment

We assume you’ve installed Red Hat 5.2 Linux from the March PCQ CD. Those who are

using Red Hat 5.0 will need to upgrade to 5.2 before installing this package. Further, the

X-Window system should be up and running.

To install, first log in as root (the super user) and shutdown the X-Window system. If

you’re in run-level 5, come down to run-level 3. To do this, type telinit 3 at

the shell prompt.

Run-level 3 puts Linux into multi-user console mode.

Advertisment

Next create a temporary directory wherever you wish, to open the KDE rpm packages. A

good choice would be in root’s home directory.

The "mkdir /root/tmp ; cd /root/tmp " command should do it. You should

now be in the /root/tmp directory. Insert the April PCQ CD and mount it in /mnt/cdrom by

typing the following command:

mount /mnt/cdrom

Advertisment

Now untar the KDE packages by typing:

Tar fx

/mnt/cdrom/cdrom/linux/kde/kde-1.1-rh5x-i386-rpms-complete-set.tar

A huge bunch of rpms should open up in the /root/tmp directory. Do take a look at them

using the ls command.

Advertisment

Install the kde-installer package by typing rpm -Uvh

/root/tmp/kde-installer-1.1-1.i386.rpm

Fire up the KDE installation program, type install-kde-1.1

KDE installer will ask you a lot of questions. An important one is "Give the

location of the KDE-1.1 RPM packages: ". Give the full path of the

directory into which you untarred the KDE packages. In this case, give /root/tmp.

Advertisment

Toward the end of the installation, kde-installer should prompt you for users

who’ll want to use the KDE desktop. Enter the login names of all such users.

If more users want to switch to this desktop later, log in as the user and run the

usekde shell script.

If you want X-Window system to start up every time Linux boots, open up the

/etc/inittab file and look for the following line:

Advertisment

id:3:initdefault:

Replace this with:

id:5:initdefault:

Advertisment

Next time you start Linux, the X-Window system should come up immediately. That’s

it! KDE for Linux should be up and running on your system.

bgcolor="#00FFFF">

Growth

susceptibility of system information

cellpadding="5" height="96" bgcolor="#CCFFFF"> Filename Related

program   
Susceptibility

to growth
cron crond Medium dmesg   syslogd Low maillog      sendmail  High messages     syslogd  High secure      telnetd / ftpd  Medium wtmp      login  High

"dmesg" is a file that

contains boot-up messages and is perhaps the smallest of the log files.

"maillog", as is obvious, contains a log of all incoming and outgoing e-mail.

These are created by the message transfer agent (MTA) on the system. Sendmail is the

default MTA on Linux, and logs generated by it are logged in maillog. The amount of log

information in this file depends on the log level setting in the sendmail configuration

file sendmail.cf.

"messages" is a good storehouse

of information. The kernel and many other applications that you use are programmed to log

their information to this file. The log information in this file is coordinated by a

mechanism called syslog (short for system log), with the syslog daemon (syslogd) providing

the mechanism on the system. "named" logs its messages in this file, and so does

"pppd" when you use it in debug mode. I have a small script, "nuke"

that I wrote to kill processes on my system, and this uses syslog to log information in

the messages file about the processes it killed. The "secure" file logs connect

and login attempts into your ftp server, as well as failed remote login attempts into your

machine. The "wtmp" file provides a record of user logins and their session

times, and "last" is a utility that uses this file to provide the data in a

readable format. last is typically used to examine the chronological sequence of logins to

the system.

Now that you’ve some idea of how

system information uses up disk storage, it’s important to prune these files and

release disk space. logrotate can be used very effectively to do this. But, it isn’t

enough to rotate and throw away the system information. It’s essential to scan the

system information at least on a daily basis, to ensure that the system and all

applications are working fine. From the system security perspective, it’s an

invaluable practice to scan this information. Hence, there is a need to backup these

important log files. (Refer to the article Backups and Disaster Recovery in PC

Quest
, March 1999, page 83)

I’ve touched upon a very small but

essential part of system administration here. The amount of system log information

generated is proportional to usage, the number of users as well as the applications

running. For example, if it’s a personal machine and you use e-mail heavily,

you’ll probably have to pay attention to the size of /var/log/maillog.

If as a systems administrator, I were to be

granted a wish, I’d wish that future releases of Linux include in them an automated

report generator that would give me a report periodically—a summary of the valuable

information in all these log files. In my next article, we’ll take a closer look at

logrotate.

Advertisment