Computer user freedom Essay
Computer user freedom
1) Users have the freedom to run, copy, distribute, study, change and improve the software. The freedoms to run the program as you wish, for any purpose. The freedoms to study how the program works and change it so it does your computing as you wish. Access to the source code is a precondition for this. The freedom to redistribute copies so you can help your neighbor. https://www.gnu.org/philosophy/free-sw.html
4) A nonprofit with a worldwide mission to promote computer user freedom and to defend the rights of all free software users. Linux is an open-source operating system modeled on UNIX. GNU developed many of the tools, including the C compilers that are part of the Linux operating system. Linux is the name of the operating system kernel developed by Linus Torvalds, which has since been expanded and improved by thousands of people on the Internet. http://www.sobell.com/CMDREF1/answers/01.answers.even.cmdref.i.pdf Chap.2 pg.50
1) Installing Fedora/RHEL is the process of copying operating system files from a CD, DVD, or USB flash drive to hard disk(s) on a system and setting up configuration files so Linux runs properly on the hardware. Several types of installations are possible, including fresh installations, upgrades from older releases of Fedora/RHEL, and dual-boot installations. Chap.3 Pg.86
1) A live system gives you a chance to preview Fedora without installing it. It does not write to hard disks. 4) Put /boot at the beginning of the drive (partition 1) so that there is no issue of Linux having to boot from a partition too far into the drive. 8) When the system enters runlevel 5.
http://www.sobell.com/RH4/answers/03.install.main.ans.even.RH4.pdf Chap.11 Pg.498
1) When a system is in single-user mode, you can log in only at the console. Not all of the file systems are mounted, and many daemons are not running. With the system in multiuser mode you can log in at any terminal or workstation that is set up for login, most or all of the file systems are mounted, and all of the daemons that your system is set up to run are running. 3) The letters stand for substitute user. You can give yourself privileges of any user whose password you know (or any user when you are running as root). You can also execute a command (other than a shell) as the specified user. To log in as Alex, you would first log in as root, and then give the command su alex, or su – alex to establish the same environment that Alex has when he logs in.
7) Use Uppercase and lowercase characters, along with numbers and special characters, and your password should be at least 8 characters long.