Linux Secrets

The first thing that you will notice about Linux Red Hat (using the Gnome Interface) is that it looks a lot like Windows 95/98/NT. But that's where the similarity ends. Linux requires a whole new set of commands as well as a new way of thinking about things.

For instance, in Windows 95/98 you can adjust monitor or screen properties by just a few key strokes. With Linux, however, in order to adjust the monitor settings, you have to run a program called Xconfigurator. And there is no information anywhere as to how to do this. It is one of these secret things that Linux users don't worry about because "everyone knows how to do it". Those of us changing from Windows to Linux have a need to know these things.

Let me tell you the secret: You have to be logged in as "Root" then you exit to the terminal. Now this looks like a DOS shell, so Windows users don't get too confused. Then at the # prompt type in Xconfigurator. Then you are taken to a configuration program that requires you know a lot about your monitor and your video card. Most of that information is found in the users manual for the hardware, or from the manufacturer. You will need to know the name, model number and manufacturer of the video card and the monitor and you will need to know the refresh rate and vertical and horizontal frequency of the monitor. Be sure that you have this information before you start. After that, you just fill out the form and follow the instructions, it's that simple from there on.

Another well kept secret is that you need to exit to the terminal in order to run any program that does not have an icon on the desktop. That's anything that doesn't specifically come with Red Hat. Some programs will set themselves up with an icon if they are installed in the right desktop interface. Linux has several different desktop interfaces, which is really cool. Gnome is a very Windows like one. The only draw back to Gnome is that some programs like StarOffice won't put an icon on the Gnome interface. So the user gets to do it.

The first thing you need to do is find the executable file for StarOffice, this would be a file called "soffice". The best way to find it is to use the File Manager to locate it. Then make a note of the path and go to Panel and then New Launcher.

Type in the name of the program, e.g. Star Office in the Name field. Then in Comment field put in the text that will appear when the mouse hovers on the icon. Next in Command field type the full path to the program, e.g. /home/jerry/Office51/bin/soffice. Last, choose an icon by clicking on the "No Icon Button", or leave it with no icon. Click on OK and the icon appears on your panel (which resembles the taskbar in Windows).

Linux is not as hard as it would appear at first. Although, they try to tell you that it's really easy, that's not entirely true either. If you know Unix, it's easy. If you know Windows, it's a little hard at first, but then it makes sense. If you are new to computers then Linux is a good program to learn first, because it is so configurable and versatile. There is no end to the possibilities with Linux.

Arlene Mason is a technical writer living in Dallas, Texas. She had been writing on various subjects for many years and says that writing keeps her sane. Most people agree. Please visit http://www.angelfire.com/tx/electronicalchemy for information about her current projects and other news.

scheduled maid service Northbrook ..
In The News:

A third-party dental marketing agency's unsecured database exposed millions of patient profiles with personal information that could be exploited for identity theft and insurance fraud.
New York-based Aircela unveils refrigerator-size device that converts air and water into fossil-free gasoline, with initial deployments planned for 2025.
Your home address is easily accessible on people finder sites, putting you at risk for stalking and identity theft, but data removal services can help protect your personal information.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents
Robot combat evolves at Unitree's Iron Fist King event as G1 robots face off in China, featuring knockouts, precise strikes and agile machines that can perform side flips.
Take control of your digital privacy with actionable tips like Facebook privacy checkup, location tracking management and data removal services to protect your personal information.
Smart TVs and streaming devices manufactured in China are being compromised by BadBox 2.0 malware before users even power them on; infections have been detected in 222 countries.
The lightweight, 15-pound Tenniix tennis robot mimics pro playing styles like Nadal and Federer, using AI trained on 8,000 hours of professional tennis data.
Oak Ridge's uranium enrichment facility supports America's AI ambitions amid concerns that China's aggressive nuclear reactor construction could give it an edge in powering data centers.
Facebook scam ads now leverage AI and deepfakes to create convincing celebrity endorsements, targeting specific demographics with sophisticated schemes.
Apple unveils iOS 26, macOS 26 Tahoe and iPadOS 26 with translucent Liquid Glass design at WWDC 2025, featuring ChatGPT integration as competitors advance rapidly.
The Atom Touch prosthetic arm combines an AI neural interface with EMG sensors, allowing amputees to control individual fingers with precision at an affordable $25,000.
Aspen officials aim to have crews on the scene within five minutes — something they say would be nearly impossible without precise location data the AI technology gives.
Tech expert Kurt “CyberGuy" Knutsson says iPads are usually secure, but hackers can access them. Spot warning signs early to protect your data.
Tech expert Kurt Knutsson reveals how to easily move photos and videos off your iPhone or Android to securely protect your favorite moments.
The Social Security Administration is launching digital SSN access this summer. Tech expert Kurt “CyberGuy" Knutsson helps you learn how to use it and protect your identity.
Glide underwater with CudaJet and make the ocean your playground. Kurt “CyberGuy" Knutsson discusses the redesigned tech that might be your next big thrilling adventure.
Protect yourself from login alert scams with five security steps, including avoiding suspicious links, checking account activity and enabling two-factor authentication
Skip the usual Father's Day gifts with personalized ideas for tech enthusiasts, home brewers, pool owners, seniors, outdoor lovers and privacy-conscious dads.
DMV text scam alert: Fraudsters impersonating motor vehicle departments nationwide are sending threatening messages about unpaid tickets and tolls to steal your information.
Fox News' AI Newsletter brings you the latest on this rapidly evolving technology.
E-BAR, MIT's mobile robot, provides physical support for seniors with handlebars that follow from behind, helping prevent falls while maintaining dignity for aging adults.
AI is changing everything – now, we can even use it to generate video. I tried OpenAI's Sora and Google's Veo – here's how they measure up against each other.
Five simple phone setting tweaks that make your device work harder for you, from automatic text message deletion to scheduled focus modes.
Android users can save time with 10 simple automations, including automatic battery saver mode, location-based Wi-Fi settings and scheduled "Do Not Disturb" mode.

Design a Web Album Using Adobe Photoshop- Part 2

So let's begin crunching down these 300 images using Adobe... Read More

An Easy Way to Develop JAVA Enterprise Applications

Research bears that less than 70 percent of development projects... Read More

Microsoft Great Plains Integrations ? Retail Management Sample

Microsoft Business Solutions is emerging as very attractive vendor for... Read More

FreeDOS

Before September 1995, Microsoft Windows was an MS-DOS program. DOS... Read More

Do You Know These Facts About Spyware ?

Imagine something that follows you home and sets itself up... Read More

Story Development Software: Good or Evil?

In the early days of the personal computer, we're talking... Read More

Exactly What Does FTP Stand for and What Can it do for Me?

FTP stands for "file transfer protocol". FTP is basically a... Read More

Microsoft Great Plains IV: Inventory Management

Great Plains Inventory Management (IV) module gives your business a... Read More

5 Mac Security Tips You Can?t Live Without

So, you've bought a new Macintosh, and now you may... Read More

Change Your Word Docs in Record Time!

Anyone who has ever used Microsoft Word knows that it... Read More

Linux Secrets

The first thing that you will notice about Linux Red... Read More

Where to Find Free Fleet Maintenance Software

Costs of fleet maintenance software can vary widely. It is... Read More

What Stands Behind The Software Description?

With thousands of web pages added to the Net every... Read More

Understanding Document Management

The term "document management" and "paperless office" is the subject... Read More

Microsoft C# vs. VB.Net

Hi, Guys,I believe a lot of programmers are trying to... Read More

eCommerce development for Microsoft Great Plains: tools and highlights for programmer

Microsoft Business Solutions Great Plains, former Great Plains Software Dynamics... Read More

SQL: Querying Microsoft Great Plains ? Overview for Database Administrator/Developer

Looks like Microsoft Great Plains becomes more... Read More

The Bluebird Project

The objective for Zandi Digital is to make available clever... Read More

CRM and Customer Life Cycle

Customer Relationship Management or CRM is a combination of enterprise... Read More

Free Microsoft Word Online Training Tutorial Resources

Microsoft Word is one of the most popular office applications... Read More

Instant Messenger Clients

If you have been using the Internet for any amount... Read More

Falling in Love With More Than One Screensaver: The Fun Part

Having from five to ten and more favorite screensavers is... Read More

The XP Firewall Isnt Enough

You might think you don't need a firewall... Read More

Microsoft Great Plains Payroll Module Customization Scenarios

It is now common thing when large corporation selects mid-market... Read More

Is Your Computer Sick?

Viruses and spyware usually show up on your computer one... Read More

reliable maid service Highland Park ..