Language Selection

English French German Italian Portuguese Spanish

Red Hat FedoraCore4 Up2date Guide

Filed under
HowTos

With almost a month since the release of FedoraCore4 (Stentz) there have been quite a few official updates from Red Hat to upgrade such packages as Open Office, Xorg, and the Linux 2.6.12 kernel. When FedoraCore3 came about, we presented a how-to article for creating your own Red Hat Up2date LAN repository. This repository allowed locally connected computers to retrieve updates significantly faster while offering greater package management. With FedoraCore4, however, came a revised version of Up2date. Although this updated copy is substantially improved upon previous versions, it still has its share of bugs. In this article, we're sharing the revised steps for creating new update channels along with other basic configuration tips.

After doing a fresh install of FedoraCore4, the Up2date GNOME applet was already blinking bright with available updates. However, when clicking this it no longer just brings up the Red Hat Network Alert Notification Tool but also a subscription alert box. This new box simply lets the user know the subscription has yet to be activated. The options are presented to activate the subscription, activate it later, or to simply not activate it at all. This feature is for RHEL (Red Hat Enterprise Linux) and we had no troubles simply closing the window and then continuing our Up2date adventure. However, it then appeared that there's a small bug preventing the number of updates from being properly reported in the GNOME Up2date applet.

Also presented when you run Up2date for the first time is the Red Hat Network Configuration. Alternatively, you can access this configuration panel at a later time by Desktop > System Settings > Red Hat Network Configuration or simply entering up2date-config into the Terminal. From this Up2date configuration panel, in the Retrieval / Installation tab we simply checked the box for "After installation, keep binary packages on disk". If the default package storage directory of /var/spool /up2date isn't your preferred storage location, you can also change that at this time. Keeping the binary RPM packages on the disk after downloading them will allow you to easily distribute the RPMs over a LAN connection with other computers on the network, rather than having to download these packages individually every time from an Internet RPM repository. Alternatively, you can simply backup these packages to an external storage medium when reformatting your computer so you can quickly and easily update the machine.

Full Article with lots of lovely screenshots.

re: Gnome is not fun

Well, I shouldn't say and risk the wrath, but gnome has never been much fun for me <period>. I haven't followed it's development and challenges too closely as a result. I just thought that was an otherwise informative article.

----
You talk the talk, but do you waddle the waddle?

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

OpenSUSE fonts – The sleeping beauty guide

Pandora’s box of fonts is one of the many ailments of the distro world. As long as we do not have standards, and some rather strict ones at that, we will continue to suffer from bad fonts, bad contrast, bad ergonomics, and in general, settings that are not designed for sustained, prolonged use. It’s a shame, because humans actually use computers to interface with information, to READ text and interpret knowledge using the power of language. It’s the most critical element of the whole thing. OpenSUSE under-delivers on two fonts – anti-aliasing and hinting options that are less than ideal, and then it lacks the necessary font libraries to make a relevant, modern and pleasing desktop for general use. All of this can be easily solved if there’s more attention, love and passion for the end product. After all, don’t you want people to be spending a lot of time interacting, using and enjoying the distro? Hopefully, one day, all this will be ancient history. We will be able to choose any which system and never worry or wonder how our experience is going to be impacted by the choice of drivers, monitors, software frameworks, or even where we live. For the time being, if you intend on using openSUSE, this little guide should help you achieve a better, smoother, higher-quality rendering of fonts on the screen, allowing you to enjoy the truly neat Plasma desktop to the fullest. Oh, in the openSUSE review, I promised we would handle this, and handle it we did! Take care. Read more

Today in Techrights

Direct Rendering Manager and VR HMDs Under Linux

  • Intel Prepping Support For Huge GTT Pages
    Intel OTC developers are working on support for huge GTT pages for their Direct Rendering Manager driver.
  • Keith Packard's Work On Better Supporting VR HMDs Under Linux With X.Org/DRM
    Earlier this year Keith Packard started a contract gig for Valve working to improve Linux's support for virtual reality head-mounted displays (VR HMDs). In particular, working on Direct Rendering Manager (DRM) and X.Org changes needed so VR HMDs will work well under Linux with the non-NVIDIA drivers. A big part of this work is the concept of DRM leases, a new Vulkan extension, and other changes to the stack.

Software: Security Tools, cmus, Atom-IDE, Skimmer Scanner

  • Security Tools to Check for Viruses and Malware on Linux
    First and foremost, no operating system is 100 percent immune to attack. Whether a machine is online or offline, it can fall victim to malicious code. Although Linux is less prone to such attacks than, say, Windows, there is no absolute when it comes to security. I have witnessed, first hand, Linux servers hit by rootkits that were so nasty, the only solution was to reinstall and hope the data backup was current. I’ve been a victim of a (very brief) hacker getting onto my desktop, because I accidentally left desktop sharing running (that was certainly an eye opener). The lesson? Even Linux can be vulnerable. So why does Linux need tools to prevent viruses, malware, and rootkits? It should be obvious why every server needs protection from rootkits — because once you are hit with a rootkit, all bets are off as to whether you can recover without reinstalling the platform. It’s antivirus and anti-malware where admins start getting a bit confused. Let me put it simply — if your server (or desktop for that matter) makes use of Samba or sshfs (or any other sharing means), those files will be opened by users running operating systems that are vulnerable. Do you really want to take the chance that your Samba share directory could be dishing out files that contain malicious code? If that should happen, your job becomes exponentially more difficult. Similarly, if that Linux machine performs as a mail server, you would be remiss to not include AV scanning (lest your users be forwarding malicious mail).
  • cmus – A Small, Fast And Powerful Console Music Player For Linux
    You may ask a question yourself when you see this article. Is it possible to listen music in Linux terminal? Yes because nothing is impossible in Linux. We have covered many popular GUI-based media players in our previous articles but we didn’t cover any CLI based media players as of now, so today we are going to cover about cmus, is one of the famous console-based media players among others (For CLI, very few applications is available in Linux).
  • You Can Now Transform the Atom Hackable Text Editor into an IDE with Atom-IDE
    GitHub and Facebook recently launched a set of tools that promise to allow you to transform your Atom hackable text editor into a veritable IDE (Integrated Development Environment). They call the project Atom-IDE. With the release of Atom 1.21 Beta last week, GitHub introduced Language Server Protocol support to integrate its brand-new Atom-IDE project, which comes with built-in support for five popular language servers, including JavaScript, TypeScript, PHP, Java, C#, and Flow. But many others will come with future Atom updates.
  • This open-source Android app is designed to detect nearby credit card skimmers
    Protecting our data is a constant battle, especially as technology continues to advance. A recent trend that has popped up is the installation of credit card skimmers, especially at locations such as gas pumps. With a simple piece of hardware and 30 seconds to install it, a hacker can easily steal credit card numbers from a gas pump without anyone knowing. Now, an open-source app for Android is attempting to help users avoid these skimmers.