Linux Secrets

The first thing that you will notice about Linux Red Hat (using the Gnome Interface) is that it looks a lot like Windows 95/98/NT. But that's where the similarity ends. Linux requires a whole new set of commands as well as a new way of thinking about things.

For instance, in Windows 95/98 you can adjust monitor or screen properties by just a few key strokes. With Linux, however, in order to adjust the monitor settings, you have to run a program called Xconfigurator. And there is no information anywhere as to how to do this. It is one of these secret things that Linux users don't worry about because "everyone knows how to do it". Those of us changing from Windows to Linux have a need to know these things.

Let me tell you the secret: You have to be logged in as "Root" then you exit to the terminal. Now this looks like a DOS shell, so Windows users don't get too confused. Then at the # prompt type in Xconfigurator. Then you are taken to a configuration program that requires you know a lot about your monitor and your video card. Most of that information is found in the users manual for the hardware, or from the manufacturer. You will need to know the name, model number and manufacturer of the video card and the monitor and you will need to know the refresh rate and vertical and horizontal frequency of the monitor. Be sure that you have this information before you start. After that, you just fill out the form and follow the instructions, it's that simple from there on.

Another well kept secret is that you need to exit to the terminal in order to run any program that does not have an icon on the desktop. That's anything that doesn't specifically come with Red Hat. Some programs will set themselves up with an icon if they are installed in the right desktop interface. Linux has several different desktop interfaces, which is really cool. Gnome is a very Windows like one. The only draw back to Gnome is that some programs like StarOffice won't put an icon on the Gnome interface. So the user gets to do it.

The first thing you need to do is find the executable file for StarOffice, this would be a file called "soffice". The best way to find it is to use the File Manager to locate it. Then make a note of the path and go to Panel and then New Launcher.

Type in the name of the program, e.g. Star Office in the Name field. Then in Comment field put in the text that will appear when the mouse hovers on the icon. Next in Command field type the full path to the program, e.g. /home/jerry/Office51/bin/soffice. Last, choose an icon by clicking on the "No Icon Button", or leave it with no icon. Click on OK and the icon appears on your panel (which resembles the taskbar in Windows).

Linux is not as hard as it would appear at first. Although, they try to tell you that it's really easy, that's not entirely true either. If you know Unix, it's easy. If you know Windows, it's a little hard at first, but then it makes sense. If you are new to computers then Linux is a good program to learn first, because it is so configurable and versatile. There is no end to the possibilities with Linux.

Arlene Mason is a technical writer living in Dallas, Texas. She had been writing on various subjects for many years and says that writing keeps her sane. Most people agree. Please visit http://www.angelfire.com/tx/electronicalchemy for information about her current projects and other news.

bmw rental chicago Bath .. Lockport Chicago limo O’Hare
In The News:

Spambots, data thieves, and other bad actors run rampant online — more so now than ever before. Here's what to do if one gets ahold of you.
Tech expert Kurt “CyberGuy" Knutsson says the Super Bowl's huge audience makes it a prime target for many types of cybersecurity scams.
It's not just about freeing up space on your computer, Kurt “CyberGuy" Knutsson says. It's about protecting your digital memories and important documents.
From proofreading and research to brainstorming and data analysis, you can use generative AI as a sidekick for just about any task you can dream of.
Tech expert Kurt “CyberGuy" Knutsson says Super Bowl 2025 ads promise star power and laughs, featuring Beckham's twin reveal.
First driverless semi delivers 100 loads in Texas, transforming logistics with AI. Tech expert Kurt “CyberGuy" Knutsson gives his takeaways.
A new scam using Elon Musk's name is making the rounds, promoting "energy-saving" devices and falsely linking the Tesla and SpaceX leader to the products.
China recently unveiled a new bullet train prototype with a test speed of 280 mph that is poised to break records and set new standards.
Hackers sometimes find ways to exploit iPhones, and Apple recently discovered a vulnerability in iOS that may have been exploited for over a year.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Lynx the robot dog from China is pushing boundaries of what autonomous mobile robots can achieve with a groundbreaking design and unique mobility.
A startup claims to have developed the world's first entirely artificial intelligence-designed and 3D-printed shoe, the brainchild of a 25-year-old.
Creating an email alias can help clean up your inbox by organizing emails based on purpose, like creating different aliases for shopping, newsletters and work.
A multipurpose robotic system promises to transform how items are stacked onto pallets, aiming to maximize space utilization and reduce shipping costs.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
The number of people affected by a UnitedHealth data breach in February 2024 was actually higher than previously reported and was the largest medical data breach in U.S. history.
A phishing campaign uses Google Calendar to schedule fake meeting invitations that appear legitimate, redirecting targets to phishing sites.
Toll road text scam: Fake messages claim unpaid fees, seek payment via fraudulent links. Kurt “CyberGuy" Knutsson says this scam is becoming increasingly sophisticated and widespread.
Kurt “CyberGuy" Knutsson says these steps ensure that your friends and family get to the exact moment you want them to see. Try it out and streamline your sharing experience.
Tech expert Kurt “CyberGuy" Knutsson offers tips on how to protect your identity: Be vigilant, monitor accounts, use smart security, know theft response.
Tech expert Kurt “CyberGuy" Knutsson says cybercriminals are exploiting iMessage phishing protection, tricking users to reactivate links.
It's hard to imagine life without in-flight Wi-Fi these days – but sky-high web surfing comes with its own set of privacy concerns. Here's how to protect yourself.
Over 400,000 cases of credit card fraud were reported in 2024 to the Federal Trade Commission. The CyberGuy explains how to protect against becoming another victim.
A nondescript metal box transforms into a fully functional electric motorcycle that blurs the line between vehicle and urban infrastructure.
Many apps unrelated to location still ask users for tracking permission, and Texas Attorney General Ken Paxton has filed a lawsuit seeking to end this alleged practice by Allstate.

Review of TikiWiki Content Management System

TikiWiki is open source software - it is written in... Read More

Free Microsoft Word Online Training Tutorial Resources

Microsoft Word is one of the most popular office applications... Read More

Upgrading Great Plains Dexterity Customization ? switching to new technologies: SQL, Crystal, eConne

1. Replace Dexterity cursor with SQL Stored Procedure Dexterity... Read More

OS 101: Suggestions for Choosing an Operating System

An operating system (abbreviated OS) is essentially the path through... Read More

Great Plains Customization ? Programming Auto-apply in Accounts Receivable

Microsoft Great Plains is one of three Microsoft Business Solutions... Read More

Corporate Accounting System: Microsoft Great Plains ? Overview

Corporate ERP/MRP selection might be tough one, especially considering very... Read More

Mozilla Vs. Firefox

For those who are unclear on the differences between the... Read More

What Stands Behind The Software Description?

With thousands of web pages added to the Net every... Read More

25 Things Mapping Software Can Do For You

1. With mapping software you can create a report that... Read More

Did You Ever Want to Completely Erase Everything on Your Computer?

Did you ever want to erase everything on your computer?... Read More

MultiNational Corporation ERP Implementation ? Microsoft Business Solutions Great Plains

If you look back to the history, you will see... Read More

Understanding XML Server

XML Server can be a Web Server that stores the... Read More

Microsoft Great Plains Data Conversion ? Overview For Developer

Looks like Microsoft Great Plains becomes more and more popular,... Read More

Configure Windows Indexing Service for Performance

The Windows Indexing Service provides you with the ability to... Read More

What is Software Piracy?

There are several kinds of software piracy. The bottom line... Read More

C++ Tutorial 2, Input and Variables

This is the tutorial where we really get into programming.... Read More

Microsoft Business Solutions Partner ? How to Launch New IT Consulting Practice

In the new era of internet marketing the problem of... Read More

Basic Tips and tricks for Windows XP

Running Applications in Compatibility Mode With Windows XP, you can... Read More

Microsoft Great Plains - Microsoft RMS Integration ? overview

Microsoft Great Plains and Microsoft Retail Management System (Microsoft RMS)... Read More

How to Make Attractive and Effective PowerPoint Presentations

Microsoft PowerPoint has dramatically changed the way in which academic... Read More

Software Engineering: An Introduction

Software Engineering is the Systematic Approach for analysis design implementation... Read More

Microsoft Great Plains: Getting New Users Licenses ? Annual Service Plan FAQ

Microsoft Business Solutions Great Plains, Solomon, Navision, Axapta, Microsoft CRM... Read More

.NET :Solving the Multiple Inheritance Issue Under .NET Platform

.NET platform does not support multiple inheritance. Do not confuse... Read More

Spyware, Adware, etc. -- Terms and Common Sense

When reading an article where some term is used often,... Read More

Make 2005 the Year You Save Time!

Today's business world is fast-paced. No matter what it is... Read More

limousine service Ava ..