This tool[47] allows you to automatically login the same user, in her/his
+ desktop environment, without asking for any password. It's called autologin.
+ This is generally a good idea when there is only one user like to be using
+ the machine.
It is found under the Boot tab in the
+ Mageia Control Center labelled "Set up autologin to automatically log
+ in".
The interface buttons are pretty obvious:
Check Launch the graphical environment when your system
+ starts, if you want X Window System to be executed after the
+ boot. If not, the system will start in text mode. Nevertheless, it will be
+ possible to launch the graphic interface manually. This can be done by
+ launching the command 'startx' or 'systemctl start dm'.
If the first box is checked, two other options are available, check
+ either No, I don't want autologin, if you want the
+ system to continue to ask for which user to connect (and password) or check
+ Yes, I want autologin with this (user, desktop), if
+ needed. In this case, you also need to supply the Default
+ username and the Default desktop.
Set up boot system
drakboot
If you are using a UEFI system instead of BIOS, the user interface is
+ slightly different as the boot device is obviously the EFI system Partition
+ (ESP).
This tool[48] allows you to configure the boot options (choice of the
+ bootloader, set a password, the default boot, etc.)
It is found under the Boot tab in the Mageia Control Center labeled
+ "Set up boot system".
Warning
Don't use this tool if you don't know exactly what you are doing.
+ Changing some settings may prevent your machine from booting again
+ !
In the first part, called Bootloader, it is
+ possible if using BIOS, to choose which Bootloader to
+ use, Grub, Grub2 or Lilo, and with a graphical or a text menu.
+ It is just a question of taste, there are no other consequences. You can
+ also set the Boot device, don't change anything here
+ unless you are an expert. The boot device is where the bootloader is
+ installed and any modification can prevent your machine from booting.
In a UEFI system, the bootloader is Grub2-efi and
+ is installed in /boot/EFI partition. This FAT32 formatted partition is
+ common to all operating systems installed.
In the second part, called Main options, you can
+ set the Delay before booting default image, in
+ seconds. During this delay, Grub or Lilo will display the list of available
+ operating systems, prompting you to make your choice. If no selection is
+ made, the bootloader will boot the default one once the delay
+ elapses.
In the third and last part, called Security, it
+ is possible to set a password for the bootloader. This means a username and
+ password will be asked at the boot time to select a booting entry or change
+ settings. The username is "root" and the password is the one chosen
+ here.
The Advanced button gives some extra
+ options.
Enable ACPI:
ACPI (Advanced Configuration and Power Interface) is a standard for
+ the power management. It can save energy by stopping unused devices, this
+ was the method used before APM. Check this box if your hardware is ACPI
+ compatible.
Enable SMP:
SMP stands for Symmetric Multi Processors, it's an architecture for
+ multicore processors.
Note
If you have a processor with HyperThreading, Mageia will see it as a
+ dual processor and enable SMP.
Enable APIC and Enable Local
+ APIC:
APIC stands for Advanced Programmable Interrupt Controller. There are
+ two components in the Intel APIC system, the local APIC (LAPIC) and the I/O
+ APIC. The latter one routes the interrupts it receives from peripheral buses
+ to one or more local APICs that are in the processor. It is really useful
+ for multi-processor systems. Some computers have problems with the APIC
+ system which can cause freezes or incorrect device detection (error message
+ "spurious 8259A interrupt: IRQ7"). In this case, disable APIC and/or Local
+ APIC.
The Next screen differs depending on which boot
+ loader you chose.
You have Grub Legacy or Lilo:
In this case, you can see the list of all the available entries at
+ boot time. The default one is asterisked. To change the order of the
+ menu entries, click on the up or down arrows to move the selected item.
+ If you click on the Add or
+ Modify buttons, a new window appears to add a new
+ entry in the bootloader menu or to modify an existing one. You need to
+ be familiar with Lilo or Grub to be able to use these tools.
The Label field is freeform, write here what
+ you want to be displayed in the menu. It matches the Grub command
+ "title". For example: Mageia3.
The Image field contains the kernel name. It
+ matches the Grub command "kernel". For example /boot/vmlinuz.
The Root field contains the device name where
+ the kernel is stored. It matches the Grub command "root". For example
+ (hd0,1).
The Append field contains the options to be
+ given to the kernel at boot time.
If the box Default is checked, Grub will boot
+ this entry by default.
You have Grub2 or Grub2-efi (boot loaders used by default
+ respectively in Legacy mode and UEFI mode):
In this case, the drop-down list labelled
+ Default displays all the available entries; click
+ on the one wanted as the default one.
The Append field contains the options to be
+ given to the kernel at boot time.
If you have other operating systems installed, Mageia attempts to
+ add them to your Mageia boot menu. If you don't want this behaviour,
+ uncheck the box Probe Foreign OS
In the extra screen called Advanced, it is
+ possible to choose the Video mode. If you don't
+ want a bootable Mageia, but to chain load it from another OS, check the
+ box Do not touch ESP or MBR and accept the
+ warning.
Warning
Not installing on ESP or MBR means that the installation is not
+ bootable unless chain loaded from another OS.
To set many other parameters, you can use the tool named
+ Grub Customizer, available in the Mageia
+ repositories (see below).
Set up display manager
drakedm
Here[49] you can choose which display manager to use to log into your
+ desktop environment. Only the ones available on your system will be
+ shown.
Most users will only notice that the
+ provided login screens look different. However, there are differences in
+ supported features, too. LXDM is a lightweight display manager, SDDM and GDM
+ have more extras.
[47] You can start this tool from the command line, by typing drakautologin as root.
[48] You can start this tool from the command line, by typing drakboot as root.
[49] You can start this tool from the
+ command line, by typing drakedm as
+ root.
This tool[11] gives a general view of the hardware of your computer. When the
+ tool is launched, it executes a job to look for every element of the
+ hardware. For that, it uses the command ldetect which refers to
+ a list of hardware in ldetect-lst package.
The window
The window is divided in two columns.
The left column contains a list of the detected hardware. The
+ devices are grouped by categories. Click on the > to expand the content
+ of a category. Each device can be selected in this column.
The right column displays information about the selected device.
+ The Help -> Fields description gives some information
+ about the content of the fields.
According to which type of device is selected, either one or two
+ buttons are available at the bottom of the right column:
Set current driver options: this can be
+ used to parameterize the module which is used in relation to the
+ device. This must used by experts only.
Run config tool: access to the tool which
+ can configure the device. The tool can often be accessed directly from
+ the MCC.
The menu
Options
The options menu gives the opportunity to check
+ boxes to enable automatic detection:
modem
Jaz devices
Zip parallel devices
By default these detections are not enabled, because
+ they are slow. Check the appropriate box(es) if you have this hardware
+ connected. Detection will be operational the next time this tool
+ is started.
Sound Configuration
draksound
This tool[12] is present in the Mageia Control Center under the tab
+ Hardware.
Draksound deals with the sound configuration, PulseAudio options and
+ troubleshooting. It will help you if you experience sound problems or if you
+ change the sound card.
PulseAudio is a sound server. It receives all the
+ sound inputs, mixes them according to the user preferences and sends the
+ resulting sound to the output. See Menu ->Sound and video ->
+ PulseAudio volume control to set these preferences.
PulseAudio is the default sound server and it is recommended to leave
+ it enabled.
Glitch-Free improves PulseAudio with some
+ programs. It is also recommended to leave it enabled.
The Troubleshooting button gives assistance
+ with fixing any problems you may have. You will find it helpful to try this
+ before asking the community for help.
The Advanced button displays a new window with an obvious button.
3D Desktop Effects
drak3d
Introduction
This tool[13] lets you manage the 3D desktop effects on your operating
+ system. 3D effects are turned off by default.
Getting Started
To use this tool, you need to have the glxinfo package installed. If
+ the package is not installed, you will be prompted to do so before drak3d
+ can start.
After starting drak3d, you will be presented with a menu window.
+ Here you can choose either No 3D Desktop Effects or
+ Compiz Fusion. Compiz Fusion is part of a
+ composite/window manager, which includes hardware-accelerated special
+ effects for your desktop. Choose Compiz Fusion to
+ turn it on.
If this is your first time using this program after a clean
+ installation of Mageia, you will get a warning message telling you which
+ packages need to be installed in order to use Compiz Fusion. Click on the
+ Ok button to continue.
Once the appropriate packages are installed, you will notice that
+ Compiz Fusion is selected in the drak3d menu, but you must log out and log
+ back in for the changes to take effect.
After logging back in, Compiz Fusion will be activated. To configure
+ Compiz Fusion, see the page for the ccsm (CompizConfig Settings Manager)
+ tool.
Troubleshooting
Can't See Desktop after Logging in
If after turning on Compiz Fusion you attempt to log back into
+ your desktop but can't see anything, restart your computer to get back
+ to the log in screen. Once there, click on the Desktop icon and select
+ drak3d.
When you log in, if your account is listed as an administrator,
+ you will be prompted for your password again. Otherwise, use the
+ administrator login with his/her account. Then you can undo any changes
+ that may have caused the log in problem.
Set up the graphical server
XFdrake
This tool is present in the Mageia Control Center under the tab
+ Hardware. Select Set up
+ the graphical server. [14]
The buttons allow you to change the graphical configuration.
Graphic card:
The graphic card currently detected is displayed and the matching
+ server configured. Click on this button to change to another server, for
+ example one with a proprietary driver.
The available servers are sorted under Vendor by
+ manufacturer in alphabetical order and then by model also in alphabetical
+ order. The free drivers are sorted by alphabetical order under
+ Xorg.
Note
In case of problems, Xorg - Vesa will work
+ with most graphic cards and give you time to find and install the right
+ driver while in your Desktop Environment.
If even Vesa doesn't work, choose
+ Xorg -
+ fbdev, which is used while installing
+ Mageia, but doesn't allow you to change resolution or refresh
+ rates.
If you made your choice for a free driver, you may be asked if you
+ want to use a proprietary driver instead with more features (3D effects for
+ example).
Monitor:
In the same way as above, the monitor currently detected is displayed
+ and you can click on the button to change to another one. If the desired
+ monitor isn't in the Vendor list, choose in the
+ Generic list a monitor with the same features.
Resolution:
This button allows the choice of the resolution (number of pixels) and
+ the colour depth (number of colours). It displays this screen:
When you change the color depth, a multi-colored bar will
+ appear next to the second button and show a preview of what the selected
+ color depth looks like.
The first button shows the currently resolution, click to change for
+ another one. The list gives all the possible choices according to the
+ graphic card and the monitor, it is possible to click on
+ Other to set other resolutions, but bear in mind that
+ you can damage your monitor or select an uncomfortable setting.
The second button shows the currently colour depth, click to change
+ this for another one.
Note
Depending on the chosen resolution, it may be necessary to logout
+ and restart the graphical environment for the settings to take
+ effect.
Test:
Once the configuration done, it is recommended to do a test before
+ clicking on OK because it is easier to modify the settings now than later if
+ the graphical environment doesn't work.
Note
In case of a non working graphical environment, type Alt+Ctrl+F2
+ to open a text environment, connect as root and type XFdrake (with the
+ caps) to to use XFdrake's text version.
If the test fails, just wait until the end, if it works but you
+ don't want to change after all, click on No, if
+ everything is right, click on OK.
Options:
Global options: If Disable
+ Ctrl-Alt-Backspace is checked, it will no longer be possible
+ to restart X server using Ctrl+Alt+Backspace keys.
Graphic card options: Allows you to enable or
+ disable three specific features depending on the graphic card.
Graphical interface at startup: Most of the
+ time, Automatically start the graphical interface (Xorg) upon
+ booting is checked to make the boot switch to graphical mode,
+ it may be unchecked for a server.
After a click on the Quit button, the system
+ will ask you to confirm. There is still time to cancel everything and keep
+ the previous configuration, or to accept. In this case, you have to
+ disconnect and reconnect to activate the new configuration.
Set up the Keyboard Layout
keyboarddrake
Introduction
The keyboarddrake tool[15] helps you configure the basic layout for the keyboard that
+ you wish to use on Mageia. It affects the keyboard layout for all users on
+ the system. It can be found in the Hardware section of the Mageia Control
+ Center (MCC) labelled "Configure mouse and keyboard".
Keyboard Layout
Here you can select which keyboard layout you wish to use. The names
+ (listed in alphabetical order) describe the language, country, and/or
+ ethnicity each layout should be used for.
Keyboard Type
This menu lets you select the type of keyboard you are using. If you
+ are unsure of which to choose, it is best to leave it as the default
+ type.
Set up the pointer device (mouse,
+ touchpad)
mousedrake
This tool[16]
+ is present in the Mageia Control Center under the tab
+ Hardware.
As you must have a mouse to install Mageia, that one is already
+ installed by Drakinstall. This tool allows installation of another mouse.
The mice are sorted by connection type and then by model. Select your
+ mouse and click on OK. Most of the time "Universal /
+ Any PS/2 & USB mice" is suitable for a recent mouse. The new mouse is
+ immediately taken into account.
Install and configure a
+ printer
system-config-printer
Introduction
Printing is managed on Mageia by a server named CUPS. It has its own
+ configuration
+ interface which is accessible via an Internet browser, but Mageia
+ offers its own tool for installing printers called system-config-printer
+ which is shared with other distributions such as Fedora, Mandriva, Ubuntu
+ and openSUSE.
You should enable the non-free repository before proceeding with the
+ installation, because some drivers may only be available in this
+ way.
Printer installation is carried out in the
+ Hardware section of the Mageia Control Centre. Select
+ the Configure printing and scanning tool[17].
MCC will ask for the installation two packages:
task-printing-server
task-printing-hp
It is necessary to accept this installation to continue. Up to 230MB
+ of dependencies are needed.
To add a printer, choose the "Add" printer button. The system will
+ try to detect any printers and the ports available. The screenshot
+ displays a printer connected to a parallel port. If a printer is detected,
+ such as a printer on a USB port, it will be displayed on the first line.
+ The window will also attempt to configure a network printer.
Automatically detected printer
This usually refers to USB printers. The utility automatically finds
+ the name of the printer and displays it. Select the printer and then click
+ "Next". If there is a known driver associated for the printer, it will be
+ automatically installed. If there is more than one driver or no known
+ drivers, a window will ask you to select or furnish one, as explained in
+ the next paragraph. Continue with the section called “Complete the installation process”
No automatically detected printer
When you select a port, the system loads a driver list and displays
+ a window to select a driver. The choice can be made through one of the
+ following options.
Select printer from database
provide PPD file
search for a driver to download
By selecting from the database, the window suggests a printer
+ manufacturer first, and then a device and a driver associated with it. If
+ more than one driver is suggested, select one which is recommended, unless
+ you have encountered some problems with that one before, in this case
+ select the one which know to work.
Complete the installation process
After the driver selection, a window requests some information which
+ will allow the system to designate and discover the printer. The first
+ line is the name under which the device will appear in applications in the
+ list of available printers. The installer then suggests printing a test
+ page. After this step, the printer is added and appears in the list of
+ available printers.
Network printer
Network printers are printers that are attached directly to a wired
+ or wireless network, that are attached to a printserver or that are
+ attached to another workstation that serves as printserver.
Note
Often, it is better to configure the DHCP server to always
+ associate a fixed IP address with the printer's MAC-address. Of course
+ that should be the same as the IP address the printer of printserver is
+ set to, if it has a fixed one.
The printer's Mac-address is a serial number given to the printer or
+ printserver or computer it is attached to, that can be obtained from a
+ configuration page printed by the printer or which may be written on a
+ label on the printer or printserver. If your shared printer is attached to
+ a Mageia system, you can run ifconfig on
+ it as root to find the MAC-address. It is the sequence of numbers and
+ letters after "HWaddr".
You can add your network printer by choosing the protocol it uses to
+ talk to your computer over the network. If you don't know which protocol
+ to choose, you can try the Network Printer -
+ Find Network Printer option in the
+ Devices menu and give the IP address of the printer
+ in the box on the right, where it says "host".
If the tool recognises your printer or printserver, it will propose
+ a protocol and a queue, but you can choose a more appropriate one from the
+ list below it or give the correct queue name if it isn't in the
+ list.
Look in the documentation that came with your printer or printserver
+ to find which protocol(s) it supports and for possible specific queue
+ names.
Network printing protocols
One current technique is one developed by Hewlett-Packard and known
+ as JetDirect. It allows access to a printer directly connected to the
+ network via an Ethernet port. You must know the IP-address at which the
+ printer is known on the network. This technique is also used inside some
+ ADSL-routers which contain an USB port to connect the printer. In this
+ case, the IP-address is that of the router. Note that the tool "Hp Device
+ manager" can manage dynamically configured IP-adress, setting an URI like
+ hp:/net/<name-of-the-printer> . In this case,
+ fixed IP-adress is not required.
Choose the option AppSocket/HP JetDirect as the
+ protocol and set the address in Host:, do not change
+ the Port Number, unless you know that it needs to be
+ changed. After the selection of the protocol, the selection of the driver
+ is the same as above.
The other protocols are:
Internet Printing Protocol (ipp): a printer
+ which can be accessed on a TCP/IP network via the IPP protocol, for
+ example a printer connected to a station using CUPS. This protocol may
+ also be used also by some ADSL-routers.
Internet Printing Protocol (https): the
+ same as ipp, but using http transport and with TLS secured protocol.
+ The port has to be defined. By default, the port 631 is used.
Internet Printing Protocol (ipps): the same
+ as ipp, but with TLS secured protocol.
LPD/LPR host or Printer: a printer which
+ can be accessed on a TCP/IP network via the LPD protocol, for example
+ a printer connected to a station using LPD.
Windows printer via SAMBA: a printer
+ connected to a station running Windows or a SMB server and
+ shared.
The URI can also be added directly. Here are some examples on how to
+ form the URI:
You can access the properties of the device. The menu allows access
+ to parameters for the CUPS server. By default a CUPS server is launched on
+ your system, but you can specify a different one with the
+ Server | Connect... menu,
+ another window which gives access to the tuning of other specific
+ parameters of the server, following Server |
+ Settings.
Troubleshoot
You can find some information on occurring errors during printing by
+ inspecting /var/log/cups/error_log
You can also access to a tool to diagnose problems using the
+ Help | Troubleshoot menu.
Specifics
It is possible that some drivers for specific printers are not
+ available in Mageia or are not functional. In this case, have a look at
+ the openprinting
+ site to check if a driver for your device is available. If yes, check if
+ the package is already present in Mageia and in this case install it
+ manually. Then, redo the installation process to configure the printer. In
+ all cases, report the problem in bugzilla or on the forum if you are
+ comfortable with this tool and furnish the model and driver information
+ and whether the printer works or not after installation. Here are some
+ sources to find other up-to-date drivers or for more recent
+ devices.
Brother printers
This
+ page give a list of drivers provided by Brother. Search the driver
+ for your device, download the rpm(s) and install.
You should install Brother drivers before running the configuration
+ utility.
Hewlett-Packard printers and All in one
+ devices
These devices use the hplip tool. It is installed automatically
+ after the detection or the selection of the printer. You can find other
+ information here.
+ The tool "HP Device Manager" is available in the
+ System menu. Also view configuration
+ for the management of the printer.
A HP All in one device must be installed as a printer and the
+ scanner features will be added. Note that sometimes, the Xsane interface
+ doesn't allow to scan films or slides (the lighting slid can't operate).
+ In this case, it is possible to scan, using the standalone mode, and save
+ the picture on a memory card or USB stick inserted in the device.
+ Afterwards, open your favourite imaging software and load your picture
+ from the memory card which is appeared in the /media folder.
Drivers for Epson printers are available from this
+ search page. For the scanner part, you must install the
+ "iscan-data" package first, then "iscan" (in this order). A iscan-plugin
+ package can also be available and is to install. Choose the
+ rpm packages according to your architecture.
It is possible that the iscan package will generate a warning about
+ a conflict with sane. Users have reported that this warning can be
+ ignored.
Canon printers
For Canon printers, it may be advisable to install a tool named
+ turboprint available here
+ .
Set up scanner
scannerdrake
Installation
This tool [18] allows you to configure a single scanner device or a
+ multifunction device which includes scanning. It also allows you to
+ share local devices connected to this computer with a remote computer
+ or to access remote scanners.
When you start this tool for the first time, you may get the
+ following message:
"SANE packages need to be installed to use
+ scanners
Do you want to install the SANE
+ packages?"
Choose Yes to continue. It will install
+ scanner-gui and task-scanning if they are not
+ yet installed.
If your scanner is identified correctly, so if in the above screen
+ you see the name of your scanner, the scanner is ready for use with, for
+ instance, XSane or Simple
+ Scan.
In that case, you might now want to want to configure the Scanner
+ sharing option. You can read about it in the the section called “Scannersharing”.
However, if your scanner hasn't been correctly identified, and
+ checking its cable(s) and power switch and then pressing Search
+ for new scanners doesn't help, you'll need to press
+ Add a scanner manually.
Choose the brand of your scanner in the list you see, then its type
+ from the list for that brand and click Ok
Note
If you can't find your scanner in the list, then click
+ Cancel
You can leave this setting to Auto-detect available
+ ports unless your scanner's interface is a parallel port. In
+ that case, select /dev/parport0 if you have only
+ one.
After clicking Ok, in most cases you will see a
+ screen similar to the one below.
Here you can choose whether the scanners connected to this machine
+ should be accessible by remote machines and by which remote machines. You
+ can also decide here whether scanners on remote machines should be made
+ available on this machine.
Scanner sharing to hosts : name or IP address of hosts can be added
+ or deleted from the list of hosts allowed to access the local device(s),
+ on this computer.
Usage of remote scanners : name or IP address of hosts can added or
+ deleted from the list of hosts which give access to a remote
+ scanner.
Scanner sharing to hosts: you can add host.
Scanner sharing to hosts: specify which host(s) to add, or allow all
+ remote machines.
"All remote machines" are allowed to access the local
+ scanner.
If the package saned is not yet installed, the
+ tool offers to do it.
At the end, the tool will alter these files:
/etc/sane.d/saned.conf
/etc/sane.d/net.conf
/etc/sane.d/dll.conf to add or comment the
+ directive "net"
It will also configure saned and
+ xinetd to be started on boot.
Specifics
Hewlett-Packard
Most HP scanners are managed from HP Device
+ Manager (hplip) which also manages printers. In this case,
+ this tool does not allow you to configure it and invites you to use
+ HP Device Manager.
Epson
Drivers are available from this
+ page. When indicated, you must install the
+ iscan-data package first, then
+ iscan (in this order). It is possible that the
+ iscan package will generate a warning about a
+ conflict with sane. Users have reported that this
+ warning can be ignored.
Extra installation steps
It is possible that after selecting a port for your scanner in the Figure 1, “Choose port” screen, you need to take one or more extra steps to correctly configure your scanner.
In some cases, you're told the scanner needs its firmware to be uploaded each time it is started. This tool
+ allows you to load it into the device, after you installed it on your system. In this screen you can install the firmware from a CD or a Windows installation, or install the one you downloaded from an Internet site of the vendor.
+ When your device's firmware needs to be loaded, it can take a long time at each first
+ usage, possibly more than one minute. So be patient.
Also, you may get a screen telling you to adjust the /etc/sane.d/"name_of_your_SANE_backend".conf file.
Read those or other instructions you get carefully and if you don't know what to do,
+ feel free to ask for help in the forums.
Set up a UPS for power monitoring
drakups
This page hasn't been written yet for lack of resources. If you think
+ you can write this help, please contact the Doc team. Thanking you in advance.
You can start this tool from the
+ command line, by typing drakups as
+ root.
[11] You can start this tool from the command line, by typing harddrake2 as root.
[12] You can start this tool from the command line, by typing draksound as root.
[13] You can start this tool from the command line, by typing
+ drak3d as root.
[14] You can start this tool from the command line, by typing
+ XFdrake as normal user or
+ drakx11 as root. Mind the capital letters.
[15] You can start this tool from the command line, by typing
+ keyboarddrake as root.
[16] You can start this tool from the command line, by
+ typing mousedrake as root.
[17] You can start this tool from the command line, by typing
+ system-config-printer. The root password will be
+ asked for.
[18] You can start this tool from the command line, by typing
+ scannerdrake as root.
diff --git a/mcc/8/en/content/mcc-intro.html b/mcc/8/en/content/mcc-intro.html
new file mode 100644
index 00000000..fbcc0825
--- /dev/null
+++ b/mcc/8/en/content/mcc-intro.html
@@ -0,0 +1,54 @@
+
+
+
+
+ About the Manual for the Mageia Control Center
The Mageia Control Center (MCC) has eight different options or tabs to choose from in the left column, and even ten if the drakwizard package was installed. Each of these tabs gives a different set of tools that can be selected in the big right panel.
The ten following chapters are about those ten options and the related tools.
The last chapter is about some other Mageia tools, that cannot be chosen in any of the MCC tabs.
The titles of the pages will often be the same as the titles of the tool screens.
There is also a search bar available, which you can access by clicking on the "Search" tab in the left column.
This tool[40] is very powerful, a tiny error or a cat jumping on your
+ keyboard can lead to losing all data on a partition or even to erasing the
+ entire hard disk. For that reason, you'll see the screen above on top of
+ the tool screen. Click on Exit if you're not sure you
+ want to continue.
If you have more than one hard disk, you can switch to the hard disk
+ you want to work on by selecting the correct tab (sda, sdb, sdc etc).
You can choose from many actions to adjust your hard disk to your
+ preferences. Wiping an entire hard disk, splitting or merging partitions,
+ resizing them or changing the filesystem, formatting or viewing what is in a
+ partition: it is all possible. The Clear
+ all button at the bottom is to erase the complete
+ disk, the other buttons become visible on the right after you click on a
+ partition.
Note
If you have an UEFI system, you can see a small partition called
+ "EFI System Partition" and mounted on /boot/EFI. Never delete it, because
+ it contains all your different operating systems bootloaders.
If the selected partition is mounted, like in the example below, you
+ cannot choose to resize, format or delete it. To be able to do that the
+ partition must be unmounted first.
It is only possible to resize a partition on its right side
To change a partition type (change ext3 to ext4 for example) you have
+ to delete the partition and then re-create it with the new type. The button
+ Create appears when a disk empty part is
+ selected
You can choose a mount point that doesn't exist, it will be
+ created.
Selecting Toggle to expert
+ mode gives some extra available actions, like
+ labeling the partition, as can be seen in the screenshot below.
CD/DVD burner
diskdrake --removable
This tool [41]is found under the tab Local disks in the Mageia Control Center
+ labelled accordingly with your removable hardware (CD/DVD players and
+ burners and floppy drives only).
Its goal is to define the way your removable disk is mounted.
At the top of the window there is a short description of your hardware
+ and the chosen options to mount it. Use the menu on the bottom to change
+ them. Check the item to be changed and then on the OK
+ button.
Mount point
Check this box to change the mount point. The default one is
+ /media/cdrom.
Options
Many mount options can be chosen here either directly in the list or
+ via the Advanced submenu. The main are:
user/nouser
user allows an ordinary user (not root) to mount the removable
+ disk, this option involves noexec, nosuid and nodev. The user who
+ mounted the disk is the only one who can umount it.
Share your hard disk
+ partitions
diskdrake --fileshare
This simple tool[42] allows you, the administrator, to allow users to share parts
+ of their own /home subdirectories with other users of a same local network
+ which may have computers running either Linux or Windows operating
+ system.
It is found in the Mageia Control Center, under the Local Disk tab,
+ labelled "Share your hard disk partitions".
First, answer the question : "Would you like to allow users
+ to share some of their directories ?", click on No
+ sharing if the answer is no for all users, click on
+ Allow all users for all users and click on
+ Custom if the answer is no for some users and yes for
+ the others. In this last case, the users that are authorised to share their
+ directories must belong to the fileshare group, which is automatically
+ created by the system. You will be asked about this later.
Click on OK, a second screen appears which asks
+ you choose between NFS or SMB.
+ Check NFS if Linux is the only operating system on
+ the network, check SMB if the network includes both
+ Linux and Windows machines and then click on OK. Any
+ required packages will be installed if necessary.
The configuration is now complete unless the Custom option was chosen.
+ In this case, an extra screen prompts you to open Userdrake. This tool
+ allows you to add users authorised to share their directories to the
+ fileshare group. In the User tab, click on the user to add to the fileshare
+ group, then on Edit, In the Groups tab. Check the
+ fileshare group and click on OK. For more information
+ about Userdrake, see: the section called “Users and Groups”
Note
When adding a new user to the fileshare group, you have to
+ disconnect and reconnect the network for the modifications to be taken
+ into account.
From now on each user belonging to the fileshare group can select in
+ his/her file manager the directories to be shared, although not all file
+ managers have this facility.
[40] You can start this tool from the command line, by typing
+ drakdisk or diskdrake as root.
[41] You can start this tool from the command line, by typing diskdrake --removable as root.
[42] You can start this tool from the command line, by typing diskdrake --fileshare as root.
This tool[19] is found under the Network & Internet tab in the Mageia
+ Control Center labelled "Network Center"
Introduction
When this tool is launched, a window opens listing all the networks
+ configured on the computer, whatever their type (wired, wireless,
+ satellite, etc.). When clicking on one of them, three or four buttons
+ appear, depending on the network type, to allow you to look after the
+ network, change its settings or connect/disconnect. This tool isn't
+ intended to create a network, for this see Set up a new network
+ interface (LAN, ISDN, ADSL, ...) in the same MCC tab.
In the screenshot below, given as example, we can see two networks,
+ the first one is wired and connected, recognizable by this icon
+ (this one is not connected ) and the second section shows wireless networks,
+ not connected recognizable by this icon and this one if connected. For the other network types, the
+ colour code is always the same, green if connected and red if not
+ connected.
In the wireless part of the screen, you can also see all the
+ detected networks, with the SSID, the
+ Signal strengh, if they are encrypted (in red) or not
+ (in green), and the Operating mode. Click on the
+ chosen one and then either on Monitor,
+ Configure or Connect. It is
+ possible here to go from a network to another one. If a private network is
+ selected, the Network Settings window (see below) will open and ask you
+ for extra settings ( an encryption key in particular).
Click on Refresh to update the screen.
The Monitor button
This button allows you to watch the network activity, downloads
+ (toward the PC, in red) and uploads (toward the Internet, in green). The
+ same screen is available by right clicking on the Internet icon
+ in the system tray -> Monitor Network.
There is a tab for each network (here eth0 is the wired network, lo
+ the local loopback and wlan0 the wireless network) and a tab connection
+ which gives details about connection status.
Note
At the bottom of the window is a title Traffic
+ accounting, we will look at that in the next section.
The Configure button
A - For a wired network
It is possible to change all the settings given during network
+ creation. Most of the time, checking Automatic IP
+ (BOOTP/DHCP) will do, but in case of problems,
+ manual configuration may give better results.
For a residential network, the IP address
+ always looks like 192.168.0.x, Netmask is
+ 255.255.255.0, and the Gateway and DNS
+ servers are available from your providers website.
Enable traffic accounting if checked this
+ will count the traffic on a hourly, daily or monthly basis. The results
+ are visible in the Network monitor detailed in the previous section. Once
+ enabled, you may have to reconnect to the network.
Allow interface to be controlled by Network
+ Manager:
This section hasn't been written yet for lack of resources. If you
+ think you can write this help, please contact the Doc
+ team. Thanking you in advance.
The button Advanced:
This section hasn't been written yet for lack of resources. If you
+ think you can write this help, please contact the Doc
+ team. Thanking you in advance.
B - For a wireless network
Only the items not already seen above are explained.
Operating mode:
Select Managed if the connection is via an
+ access point, there is an ESSID detected.
+ Select Ad-hoc if it is a peer to peer network. Select
+ Master if your network card is used as
+ the access point, your network card needs to support this mode.
Encryption mode and Encryption
+ key:
If it is a private network, you need to know these settings.
WEP uses a password and is weaker than WPA
+ which uses a passphrase. WPA Pre-Shared Key is also
+ called WPA personal or WPA home. WPA Enterprise is
+ not often used in private networks.
Allow access point roaming:
Roaming is a technology which enables allows computer to change its
+ access point while remaining connected to the network.
The button Advanced:
This page hasn't been written yet for lack of resources. If you
+ think you can write this help, please contact the Doc
+ team. Thanking you in advance.
The Advanced Settings button
This section hasn't been written yet for lack of resources. If you
+ think you can write this help, please contact the Doc
+ team. Thanking you in advance.
Set up a new network interface (LAN, ISDN,
+ ADSL, ...)
drakconnect
Introduction
This tool[20] allows to configure much of local network or Internet
+ access. You have to know some information from your access provider or
+ your network administrator.
Select the type of connection you want to set, according to which
+ hardware and provider you have.
A new Wired connection (Ethernet)
The first window lists the interfaces which are available.
+ Select the one to configure.
At this point, the choice is given between an automatic or a
+ manual IP address.
Automatic IP
Ethernet/IP settings: you have to
+ select if DNS servers are declared by the DHCP server or are
+ manually specified, as explained below. In the last case, the IP
+ address of DNS servers has to be set. The HOSTNAME of the computer
+ can be specified here. If no HOSTNAME is specified, the name
+ localhost.localdomain is attributed by default.
+ The Hostname can also be provided by the DHCP server with the
+ option Assign host name from DHCP server. Not
+ all DHCP servers have such a function and if you're setting up
+ your PC to get an IP address from a domestic ADSL router, it is
+ unlikely.
The advanced button give the opportunity to specify:
Search domain (not accessible, as provided by the DHCP
+ server)
the DHCP client
DHCP timeout
Get YP server from DHCP (checked by default): specify
+ the NIS server
Get NTPD server from DHCP (synchronisation of
+ clocks)
the HOSTNAME required by DHCP. Only use this option if
+ the DHCP server requires the client to specify a hostname
+ before receiving an IP address. This option is not dealt by
+ some DHCP servers.
Ethernet/IP settings: you need to
+ declare what DNS servers to use. The HOSTNAME of the computer can
+ be specified here. If no HOSTNAME is specified, the name
+ localhost.localdomain is attributed by
+ default.
For a residential network, the IP address usually looks like
+ 192.168.x.x, Netmask is
+ 255.255.255.0, and the Gateway and DNS
+ servers are available from your service provider's website.
In advanced settings, you can specified a Search
+ domain. It would usually be your home domain, i.e. if
+ your computer is called "splash", and it's full domain name is
+ "splash.boatanchor.net", the Search Domain would be
+ "boatanchor.net". Unless you specifically need it, it's ok not to
+ define this setting. Again, domestic ADSL would not need this
+ setting.
This section hasn't been written yet for lack of resources. If you
+ think you can write this help, please contact the Doc
+ team. Thanking you in advance.
A new Cable modem connection
The first window lists the interfaces which are available.
+ Select the one to configure.
At this point, the choice is given between an automatic or a
+ manual IP address.
You have to specify a authentication method:
None
BPALogin (necessary for Telstra). In this case you have to
+ provide User name and password.
Automatic IP
Cable/IP settings: you have to select
+ if DNS servers are declared by the DHCP server or are manually
+ specified, as explained below. In the last case, the IP address of
+ DNS servers has to be set. The HOSTNAME of the computer can be
+ specified here. If no HOSTNAME is specified, the name
+ localhost.localdomain is attributed by default.
+ The Hostname can also be provided by the DHCP server with the
+ option Assign host name from DHCP server. Not
+ all DHCP servers have such a function and if you're setting up
+ your PC to get an IP address from a domestic ADSL router, it is
+ unlikely.
The advanced button give the opportunity to specify:
Search domain (not accessible, as provided by the DHCP
+ server)
the DHCP client
DHCP timeout
Get YP server from DHCP (checked by default): specify
+ the NIS server
Get NTPD server from DHCP (synchronisation of
+ clocks)
the HOSTNAME required by DHCP. Only use this option if
+ the DHCP server requires the client to specify a hostname
+ before receiving an IP address. This option is not dealt by
+ some DHCP servers.
Cable/IP settings: you need to declare
+ what DNS servers to use. The HOSTNAME of the computer can be
+ specified here. If no HOSTNAME is specified, the name
+ localhost.localdomain is attributed by
+ default.
For a residential network, the IP address usually looks like
+ 192.168.x.x, Netmask is
+ 255.255.255.0, and the Gateway and DNS
+ servers are available from your service provider's website.
In advanced settings, you can specified a Search
+ domain. It would usually be your home domain, i.e. if
+ your computer is called "splash", and it's full domain name is
+ "splash.boatanchor.net", the Search Domain would be
+ "boatanchor.net". Unless you specifically need it, it's ok not to
+ define this setting. Again, domestic connection would not need
+ this setting.
If the tool detects network interfaces, it offers to select
+ one and to configure it.
A list of providers is proposed, classified by countries.
+ Select your provider. If it is not listed, select the option
+ Unlisted and then enter the options your
+ provider gave.
A list of hardware is proposed, classified by category and
+ manufacturer. Select your card.
Select one of the protocols available:
Protocol for the rest of the world, except Europe
+ (DHCP)
Protocol for Europe (EDSS1)
A list of providers is then offered, classified by countries.
+ Select your provider. If it is not listed, select the option
+ Unlisted and then enter the options your
+ provider gave you. Then it is asked for parameters:
Connection name
Phone number
Login ID
Account password
Authentication method
After that, you have to select if you get the IP address by
+ automatic or manual method. In the last case, specify IP address and
+ Subnet mask.
The next step is to choose how DNS servers address are
+ obtained, by automatic or manual method. In the case of manual
+ configuration, you have to put:
Domain name
First and second DNS Server
Select if the hostname is set from IP. This option is to
+ select only if you are sure that your provider is configured to
+ accept it.
The next step is to choose how the gateway address is
+ obtained, by automatic or manual method. In the case of manual
+ configuration, you have to enter the IP address.
A first window lists the interfaces which are available and an
+ entry for Windows driver (ndiswrapper). Select the one to configure.
+ Use ndiswrapper only if the other configuration methods did not
+ work.
At this step, the choice is given between the different access
+ points that the card has detected.
Specific parameter for the wireless card are to provide:
Operating mode:
Managed
To access to an existing access point (the most
+ frequent).
Ad-Hoc
To configure direct connection between
+ computers.
Network Name (ESSID)
Encryption mode: it depends of how the access point is
+ configured.
WPA/WPA2
This encryption mode is to prefer if your hardware
+ allows it.
WEP
Some old hardware deals only this encryption
+ method.
Encryption key
It is generally provided with the hardware which give the
+ access point.
At this step, the choice is given between an automatic IP
+ address or a manual IP address.
Automatic IP
IP settings: you have to select if DNS
+ servers are declared by the DHCP server or are manually specified,
+ as explained below. In the last case, IP address of DNS servers
+ has to be set. The HOSTNAME of the computer can be specified here.
+ If no HOSTNAME is specified, the name localhost.localdomain is
+ attributed by default. The Hostname can also be provided by the
+ DHCP server with the option Assign host name from DHCP
+ server
The advanced button give the opportunity to specify:
Search domain (not accessible, as provided by the DHCP
+ server)
the DHCP client
DHCP timeout
Get YP server from DHCP (checked by default): specify
+ the NIS servers
Get NTPD server from DHCP (synchronisation of
+ clocks)
the HOSTNAME required by DHCP. Only use this option if
+ the DHCP server requires the client to specify a hostname
+ before receiving an IP address. This option is not dealt by
+ some DHCP servers.
IP settings: you have to declare DNS
+ servers. The HOSTNAME of the computer can be specified here. If no
+ HOSTNAME is specified, the name
+ localhost.localdomain is attributed by
+ default.
For a residential network, the IP address always looks like
+ 192.168.x.x, Netmask is
+ 255.255.255.0, and the Gateway and DNS
+ servers are available from your providers website.
In advanced settings, you can specified a Search
+ domain. It must seem to your hostname without the first
+ name, before the period.
If the tool detects wireless interfaces, it offers to select
+ one and to configure it.
The PIN is asked. Leave empty if the PIN is not
+ required.
The wizard asks for network. If it is not detected, select the
+ option Unlisted.
A list of providers is proposed, classified by countries.
+ Select your provider. If it is not listed, select the option
+ Unlisted and then enter the options your
+ provider gave.
This section hasn't been written yet for lack of resources. If you
+ think you can write this help, please contact the Doc
+ team. Thanking you in advance.
A new Analog telephone modem connection (POTS)
The wizard asks which device to configure:
Manual choice
Detected hardware, if any.
A list of ports is proposed. Select your port.
If not yet installed, it will be suggested that you install the
+ package kppp-provider.
A list of providers is proposed, classified by countries. Select
+ your provider. If it is not listed, select the option
+ Unlisted and then enter the options your provider
+ gave. Then it is asked for Dialup options:
Allow interface to be controlled by Network
+ Manager
In the case of a wireless connection, a supplemental box is
+ Allow access point roaming which give the
+ possibility to switch automatically between access point according to
+ the signal strength.
With the advanced button, you can specify:
Metric (10 by default)
MTU
Network Hotplugging
Enable IPv6 to IPv4 tunnel
The last step allows you to specify if the connection is to start
+ immediately or not.
Click on the drop down menu, choose the one you want to remove and then click next.
You'll see a message that the network interface has been deleted successfully.
Proxy
drakproxy
If you have to use a proxy server to access to the internet, you can
+ use this tool[22] to configure it. Your net administrator will give you the
+ information you need. You can also specify some services which can be
+ accessed without the proxy by exception.
From Wikipedia, on 2012-09-24, article Proxy server: In computer
+ networks, a proxy server is a server (a computer system or an application)
+ that acts as an intermediary for requests from clients seeking resources
+ from other servers. A client connects to the proxy server, requesting some
+ service, such as a file, connection, web page, or other resource available
+ from a different server. The proxy server evaluates the request as a way to
+ simplify and control their complexity.
Share the Internet connection with other local
+ machines
drakgw
Principles
This is useful when you have a computer (3) which has
+ Internet (2) access and is connected also to a local network (1). You can
+ use computer (3) as a gateway to give that access to other workstations
+ (5) and (6) in the local network (1). For this, the gateway must have
+ two interfaces; the first one such as an ethernet card must be
+ connected to the local network, and the second one (4) connected to the
+ Internet (2).
The wizard[23] offers successive steps which are shown below:
If the wizard does not detect at least two interfaces, it
+ warns about this and asks to stop the network and configure the
+ hardware.
specify the interface used for the Internet connection. The
+ wizard automatically suggests one of the interfaces, but you should
+ verify that what is proposed is correct.
specify which interface is used for the Lan access. The wizard
+ also proposes one, check that this is correct.
The wizard proposes parameters for the Lan network, such as IP
+ address, mask and domain name. Check that these parameters are
+ compatible with the actual configuration. It is recommended that you
+ accept these values.
specify if the computer has to be used as a DNS server. If yes,
+ the wizard will check that bind is installed.
+ Otherwise, you have to specify the address of a DNS server.
specify if the computer is to be used as a DHCP server. If yes,
+ the wizard will check that dhcp-server is installed and
+ offer to configure it, with start and end addresses in the DHCP
+ range.
specify if the computer is to be used as a proxy server. If
+ yes, the wizard will check that squid is installed and
+ offer to configure it, with the address of the administrator
+ (admin@mydomain.com), name of the proxy (myfirewall@mydomaincom),
+ the port (3128) and the cache size (100 Mb).
The last step allows you to check if the gateway machine is
+ connected to printers and to share them.
You will be warned about the need to check the firewall if it is
+ active.
Configure the client
If you have configured the gateway machine with DHCP, you only need
+ to specify in the network configuration tool that you get an address
+ automatically (using DHCP). The parameters will be obtained when
+ connecting to the network. This method is valid whatever operating
+ system the client is using.
If you must manually specify the network parameters, you must in
+ particular specify the gateway by entering the IP-address of the machine
+ acting as the gateway.
Stop connection sharing
If you want to stop sharing the connection on the Mageia computer,
+ launch the tool. It will offer to reconfigure the connection or to stop
+ the sharing.
Manage different network
+ profiles
Draknetprofile
Introduction
Each network interface of a Mageia system is initially
+ configured with a fix set of parameters. This corresponds
+ to what is expected by a user of a desktop computer, but
+ may not be adequate when the system is moved between various
+ network environments: having the system run in different
+ network environments will require that multiple configurations
+ co-exist for a given network device - otherwise the interface
+ might need to be re-configured each time the network environment
+ changes.
Profiles
Linux provides support for multiple configurations
+ of network devices as a standard feature. The notion
+ of a "network profile"
+ refers to a set of configurations of network devices,
+ defined for a specific network environment. Each network
+ profile has a name -
+ the initial configuration that comes out of system generation
+ has the name "default"; when a new
+ profile is created, a name must be specified which is
+ different from all already existing profile names.
Draknetprofile
Draknetprofile is a - very simple - component of
+ the Mageia Control Center (MCC), it provides a Graphical
+ User Interface (GUI) for managing profiles. This GUI
+ allows to
+
+
switch between profiles - i.e. activate a target
+ profile to become the "current profile",
create a new, additional profile,
delete a profile from the list of defined profiles.
+
Running Draknetprofile
Defining profiles, profile switching
Defining/modifying profiles concerns the entire Linux
+ system and all its users. Running draknetprofile therefore
+ requires root privileges. Normally, launching is achieved
+ from within MCC (which already runs as root):
Figure 1: Mageia Control
+ Center: Network & Internet tab
launch the MCC by hitting the MCC icon in one
+ of the panels of your desktop,
select the "Network & Internet" tab,
hit "Manage different network profiles" in the
+ "Personalize and Secure your network" Section (solid
+ red contour in Figure 1).
Draknetprofile can also be launched by a command-line
+ instruction from a terminal emulator with root privileges
+ (this may be helpful when standard-output or error-output
+ from draknetprofile needs to be consulted - for instance
+ for debugging). Simply type:
draknetprofile
After the launch, the main page of Draknetprofile
+ will be displayed:
Figure 2: Management actions
+ of Draknetprofile
The upper zone of the window contains the list of
+ the names of all presently defined profiles. The bottom
+ zone presents a series of buttons:
"Activate" ... establish the selected profile
+ (top zone of the window) as the current profile (and
+ save the properties of the old profile);
"New" ... create a new profile;
"Delete" ... delete the selected profile from
+ the list of defined profiles;
"Quit" ... exit from Draknetprofile.
Before hitting the "Activate" or the "Delete" button,
+ you have to select a profile from the list: select it
+ by a left-button click on the name of the target profile.
Hitting the "New" button will launch an auxiliary
+ window where you can type the name of the profile you
+ want to create; this name must be different from any
+ already existing profile. This profile will be created
+ as a precise copy of the currently active profile and
+ immediately activated as the current profile. You will
+ probably then need to specify its properties (modify
+ the automatically created configuration) in a second,
+ independent action:
exit from Draknetprofile (hit the "Quit" button),
back in the "Network & Internet" tab, you
+ select the tab "Set up a new network interface (...)"
+ (marked with dashed red contour in Figure 1),
you then go through the steps for configuring
+ the interface; they are similar to those you
+ did for configuring the original interface during
+ system generation - as documented in the Drakconnect
+ manual.
The middle zone of the window is normally hidden,
+ hit the "Advanced" button to make it visible. It should
+ display the list of names of Draknetprofile "modules" (such as "network",
+ "firewall", "urpmi"), each with a check-button next to
+ the name; these check-buttons determine whether the properties
+ controlled by that module are included into the profile
+ or not.
Using a system that has more than one profile
In a system where several profiles are defined, an
+ additional user interaction is required when the system
+ boots: at the very end of the bootstrapping activities
+ - just before the Desktop Environment starts - you will
+ get a message like
Type 1 or 2 to select the "default", respectively
+ the "roaming" profile, or carriage-return to select the
+ profile that is marked with an asterisk (the profile that
+ was active when the system had been shut down).
Presently (Mageia-5) there appears to be an intermittent
+ problem: it happens that the system becomes unresponsive
+ after soliciting the user to select a profile. The only
+ way out of this situation is to launch another boot.
+ This problem is under investigation.
Appendix: Files relevant to Draknetprofile
The configuration data of network interfaces are stored
+ in the directory /etc/sysconfig/network-scripts/,
+ in files with names like ifcfg-xxx.
The name of the currently active profile is maintained
+ in the file /etc/netprofile/current .
+
Configure VPN Connection to secure network
+ access
drakvpn
Introduction
This tool[24] allows to configure secure access to a remote network
+ establishing a tunnel between the local workstation and the remote
+ network. We discuss here only of the configuration on the workstation
+ side. We assume that the remote network is already in operation, and that
+ you have the connection information from the network administrator, like a
+ .pcf configuration file .
Configuration
First, select either Cisco VPN Concentrator or OpenVPN, depending on
+ which protocol is used for your virtual private network.
Then give your connection a name.
At the next screen, provide the details for your VPN
+ connection.
For Cisco VPN
For openvpn. The openvpn package and its dependencies will be
+ installed the first time the tool is used.
Select the files that you received from the network
+ administrator.
Advanced parameters:
The next screen asks for IP-address of the gateway.
When the parameters are set, you have the option of starting the VPN
+ connection.
This VPN connection can be set to start automatically with a network
+ connection. To do this, reconfigure the network connection to always
+ connect to this VPN.
Hosts definitions
drakhosts
If some systems on your network grant you services, and have fixed
+ IP-addresses, this tool[25] allows to specify a name to access them more easily. Then you
+ can use that name instead of the IP-address.
Add
With this button, you add the name for a new system. You will get a
+ window to specify the IP-address, the host name for the system, and
+ optionally an alias which can be used in the same way that the name
+ is.
Modify
You can access the parameters of an entry previously defined. You get
+ the same window.
[19] You can start this tool from the command line, by typing draknetcenter as root.
[20] You can start this tool from the command line, by typing
+ drakconnect as root.
[21] You can also start this tool from the
+command line, by typing drakconnect --del as root.
[22] You can start this tool from the command line, by typing drakproxy as root.
[23] You can start this tool from the command line, by typing
+ drakgw as root.
[24] You can start this tool from the command line, by typing
+ drakvpn as root.
[25] You can start this tool from the command line, by typing drakhosts as root.
This screen and the one for Sharing are only visible if the drakwizard package is installed. You can choose between several tools to set up different servers. Click on a link below or on the section called “Sharing”to learn more.
This tool is broken in Mageia 4 because of new naming scheme for
+ the Net interfaces
This tool[7] can help you to set up a DHCP server. It is
+ a component of drakwizard which should be installed before you can access to
+ it.
What is DHCP?
The Dynamic Host Configuration Protocol (DHCP) is
+ a standardized networking protocol used on IP networks that dynamically
+ configures IP addresses and other information that is needed for Internet
+ communication. (From Wikipedia)
Setting up a DHCP server with drakwizard dhcp
Welcome to the DHCP server wizard.
Introduction
The first page is just an introduction, click
+ Next.
Selecting Adaptor
Choose the network interface, which is connected to the subnet,
+ and for which DHCP will assign IP addresses, and then click
+ Next.
Select IP range
Select the beginning and ending IP addresses of the range of IPs
+ you want the server to offer, along with the IP of the gateway machine
+ connecting to some place outside the local network, hopefully close to
+ the Internet, then click Next.
Summary
Take a second to check these options, then click
+ Next.
Hold on...
This can be fixed. Click Previous a few
+ times and change things around.
Hours later...
What is done
Installing the package dhcp-server if needed;
Saving /etc/dhcpd.conf in
+ /etc/dhcpd.conf.orig;
Creating a new dhcpd.conf starting from
+ /usr/share/wizards/dhcp_wizard/scripts/dhcpd.conf.default
+ and adding the new parameters:
hname
dns
net
ip
mask
rng1
rng2
dname
gateway
tftpserverip
dhcpd_interface
Also modifying Webmin configuration file
+ /etc/webmin/dhcpd/config
Restarting dhcpd.
Configure DNS
drakwizard bind
This page hasn't been written yet for lack of resources. If you think
+ you can write this help, please contact the Doc team. Thanking you in advance.
You can start this tool from the
+ command line, by typing drakwizard bind as
+ root.
Configure proxy
drakwizard squid
This tool[8] can help you to set up a proxy server. It is a component of
+ drakwizard which should be installed before you can access to it.
What is a proxy server?
A proxy server is a server (a computer system or an application)
+ that acts as an intermediary for requests from clients seeking resources
+ from other servers. A client connects to the proxy server, requesting some
+ service, such as a file, connection, web page, or other resource available
+ from a different server and the proxy server evaluates the request as a
+ way to simplify and control its complexity. (From Wikipedia)
Setting up a proxy server with drakwizard squid
Welcome to the proxy server wizard.
Introduction
The first page is just an introduction, click
+ Next.
Selecting the proxy port
Select the proxy port browsers will connect through, then click
+ Next.
Set Memory and Disk Usage
Set memory and disk cache limits, then click
+ Next.
Select Network Access Control
Set visibility to local network or world, then click
+ Next.
Grant Network Access
Grant access to local networks, then click
+ Next.
Use Upper Level Proxy Server?
Cascade through another proxy server? If no, skip next
+ step.
Upper Level Proxy URL and Port
Provide upper level proxy hostname and port, then click
+ Next.
Summary
Take a second to check these options, then click
+ Next.
Start during boot?
Choose if the proxy server should be started during the boot
+ time, then click Next.
Finish
You're done! Click Finish.
What is done
Installing the package squid if needed;
Saving /etc/squid/squid.conf in
+ /etc/squid/squid.conf.orig;
Creating a new squid.conf starting from
+ squid.conf.default and adding the new
+ parameters:
cache_dir
localnet
cache_mem
http_port
level 1, 2 or 3 and http_access
+ according to level
cache_peer
visible_hostname
Restarting squid.
Configure time
drakwizard ntp
This tool[9] purpose is to set the time of your server synchronised with an
+ external server. It isn't installed by default and you have to also install
+ the drakwizard and drakwizard-base packages.
Setup a NTP server with drakwizard ntp
After a welcome screen (see above), the second one ask you to
+ choose three time servers in the drop down lists and suggests to use
+ pool.ntp.org twice because this server always points to available time
+ servers.
The following screens allows to choose the region and the city
+ and then, you arrive on a summary. If something is wrong, you can
+ obviously change it using the Previousbutton.
+ If everything is right, click on the Next
+ button to proceed to the test. It may take a while and you finally get
+ this screen below:
Click on the Finish button to close the
+ tool
What is done
This tool executes the following steps:
Installing the package ntp if needed
Saving the files /etc/sysconfig/clock to
+ /etc/sysconfig/clock.orig and
+ /etc/ntp/step-tickers to
+ /etc/ntp/step-tickers.orig;
Writing a new file /etc/ntp/step-tickers with the
+ list of servers;
Modifying the file /etc/ntp.conf by inserting the
+ first server name;
Stopping and starting crond, atd and
+ ntpd services;
Setting the hardware clock to the current system time with UTC
+ reference.
OpenSSH daemon configuration
drakwizard sshd
This tool[10] can help you to set up an SSH daemon.
+
What is SSH?
+ Secure Shell (SSH) is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers that connects, via a secure channel over an insecure network, a server and a client (running SSH server and SSH client programs, respectively). (From Wikipedia)
+
Setting up an SSH daemon with drakwizard sshd
+ Welcome to the Open SSH wizard.
+
Select Type of Configure Options
+ Choose Expert for all options or Newbie to skip steps 3-7, click Next.
+
General Options
+ Sets visibility and root access options. Port 22 is the standard SSH port.
+
Authentication Methods
+ Allow a variety of authentication methods users can use while connecting, then click Next.
+
Logging
+ Choose logging facility and level of output, then click Next.
+
Login Options
+ Configure per-login settings, then click Next.
+
User Login Options
+ Configure the user access settings, then click Next.
+
Compression and Forwarding
+ Configure X11 forwarding and compression during transfer, then click Next.
+
Summary
+ Take a second to check these options, then click Next.
+
Finish
+ You're done! Click Finish.
+
[7] You can start this tool from the command line, by typing drakwizard dhcp as root.
[8] You can start this tool from the command line, by typing drakwizard squid as root.
[9] You can start this tool from the command line, by typing drakwizard ntp as root.
[10] You can start this tool from the command line, by typing drakwizard sshd as root.
Access Windows (SMB) shared drives and
+ directories
diskdrake --smb
Introduction
This tool[35] allows you to declare which shared directories to be
+ accessible to all users on the machine. The protocol used for this is SMB
+ which has been popularized on Windows(R) systems. The shared directory
+ will be available directly at boot. Shared directories can be also
+ accessed directly in a single session by a user with tools such as file
+ browsers.
Select search servers to obtain a list of
+ servers who share directories.
Click on the server name and on > before the server name to
+ display the list of the shared directories and select the directory you
+ want to access.
The Mount point button will become available,
+ you have to specify where to mount the directory.
After choosing the mount point, it can be mounted with the
+ Mount button. You can also verify and change some
+ options with the Options button.
In options, you can specify the user name and the password of those
+ able to connect to the SMB server. After mounting the directory, you can
+ unmount it with the same button.
After accepting the configuration with the Done button, a message
+ will ask "Do you want to save the /etc/fstab modifications". Saving, will
+ allow directory to made available at each boot, if the network is
+ accessible. The new directory is then available in your file browser, for
+ example in dolphin.
Share directories and drives with
+ Samba
draksambashare
Introduction
Samba is a protocol used in different Operating Systems to share
+ some resources like directories or printers. This tool allows you to
+ configure the machine as a Samba server using the protocol SMB/CIFS. This
+ protocol is also used by Windows(R) and workstations with this OS can
+ access the resources of the Samba server.
Preparation
To be accessed from other workstations, the server has to have a
+ fixed IP address. This can be specified directly on the server, for
+ example with the section called “Network Center”, or at the DHCP server
+ which identifies the station with its
+ MAC-address and give it always the same address. The firewall has also to
+ allow the incoming requests to the Samba server.
Wizard - Standalone server
At the first run, the tools [36] checks if needed packages are installed and proposes to
+ install them if they are not yet present. Then the wizard to configure
+ the Samba server is launched.
In the next window the Standalone server configuration option is already selected.
Then specify the name of the workgroup. This name should be the same
+ for the access to the shared resources.
The netbios name is the name which will be used to designate the
+ server on the network.
Choose the security mode:
user: the client must be authorized to
+ access the resource
share: the client authenticates itself
+ separately for each share
You can specify which hosts are allowed to access the resources,
+ with IP address or host name.
Specify the server banner. The banner is the way this server will be
+ described in the Windows workstations.
The place where Samba can log information can be specified at the
+ next step.
The wizard displays a list of the chosen parameters before you accept
+ the configuration. When accepted, the configuration will be written in
+ /etc/samba/smb.conf.
Wizard - Primary domain controller
If the "Primary domain controller" option is selected, the
+ wizard asks for indication if Wins is to support or not and to provide
+ admin users names. The following steps are then the same as for standalone
+ server, except you can choose also the security mode:
domain: provides a mechanism for storing
+ all user and group accounts in a central, shared, account repository.
+ The centralized account repository is shared between (security)
+ controllers.
Declare a directory to share
With the Add button, we get:
A new entry is thus added. It can be modified with the
+ Modify button. Options can be edited, such as
+ whether the directory is visible to the public, writable or browseable.
+ The share name can not be modified.
Menu entries
When the list has at least one entry, menu entries can be
+ used.
File|Write conf. Save the current configuration in
+ /etc/samba/smb.conf.
Samba server|Configure. The wizard can be run again with this command.
Samba server|Restart. The server is stopped and restarted with the current configuration
+ files.
Samba Server|Reload. The configuration displayed is reloaded from the current
+ configuration files.
Printers share
Samba also allows you to share printers.
Samba users
In this tab, you can add users who are allowed to access the shared
+ resources when authentication is required. You can add users from the section called “Users and Groups”
Access NFS shared drives and
+ directories
diskdrake --nfs
.
Introduction
This tool[37] allows you to declare some shared directories to be
+ accessible to all users on the machine. The protocol used for this is NFS
+ which is available on most Linux or Unix systems. The shared directory
+ will be thus available directly at boot. Shared directories can be also
+ accessible directly in a single session for a user with tools such as file
+ browsers.
Procedure
Select search servers to obtain a list of
+ servers which share directories.
Click on the > symbol before the server name to display the list
+ of the shared directories and select the directory you want to
+ access.
The button Mount point will be available and
+ you have to specify where to mount the directory.
After choosing the mount point, You can mount it. You can also
+ verify and change some options with the Options
+ button. After mounting the directory, you can unmount it with the same
+ button.
On accepting the configuration with the Done button, a message will
+ displayed, asking "Do you want to save the /etc/fstab modifications". This
+ will make the directory available at each boot, if the network is
+ accessible. The new directory is then available in your file browser, for
+ example in Dolphin.
Share drives and directories using NFS
draknfs
Prerequisites
When the wizard[38] is launched for the first time, it may display the following
+ message:
The package nfs-utils needs to be installed. Do you want to
+ install it?
After completing the installation, a window with an empty list is
+ displayed.
Main window
A list of directories which are shared is displayed. At this step,
+ the list is empty. The Add button gives access to a
+ configuration tool.
Modify entry
The configuration tool is labeled "Modify entry". It may be also
+ launched with the Modify button. The following
+ parameters are available.
NFS Directory
Here you can specify which directory is to be shared. The
+ Directory button gives access to a browser to
+ choose it.
Host access
Here you can specify the hosts that are authorized to access the
+ shared directory.
NFS clients may be specified in a number of ways:
single host: a host either by an abbreviated
+ name recognized be the resolver, fully qualified domain name, or an IP
+ address
netgroups: NIS netgroups may be given as
+ @group.
wildcards: machine names may contain the
+ wildcard characters * and ?. For instance: *.cs.foo.edu matches all
+ hosts in the domain cs.foo.edu.
IP networks: you can also export directories
+ to all hosts on an IP (sub-)network simultaneously. For example, either
+ `/255.255.252.0' or `/22' appended to the network base address.
User ID Mapping
map root user as anonymous: maps requests
+ from uid/gid 0 to the anonymous uid/gid (root_squash). The root user
+ from the client cannot read or write to the files on the server which
+ are created by root on the server itself.
allow real remote root access: turn off root
+ squashing. This option is mainly useful for diskless clients
+ (no_root_squash).
map all users to anonymous user: maps all
+ uids and gids to the anonymous user (all_squash). Useful for
+ NFS-exported public FTP directories, news spool directories, etc. The
+ opposite option is no user UID mapping (no_all_squash), which is the
+ default setting.
anonuid and anongid: explicitly set the uid
+ and gid of the anonymous account.
Advanced options
Secured Connection: this option requires that
+ requests originate on an internet port less than IPPORT_RESERVED (1024).
+ This option is on by default.
Read-Only share: allow either only read or
+ both read and write requests on this NFS volume. The default is to
+ disallow any request which changes the filesystem. This can also be made
+ explicit by using this option.
Synchronous access: prevents the NFS server
+ from violating the NFS protocol and to reply to requests before any
+ changes made by these requests have been committed to stable storage
+ (e.g. disc drive).
Subtree checking: enable subtree checking
+ which can help improve security in some cases, but can decrease
+ reliability. See exports(5) man page for more details.
Menu entries
So far the list has at least one entry.
File|Write conf
Save the current configuration.
NFS Server|Restart
The server is stopped and restarted with the current configuration
+ files.
NFS Server|Reload
The configuration displayed is reloaded from the current
+ configuration files.
Access WebDAV shared drives and
+ directories
diskdrake --dav
This tool[39] is found in the Mageia Control Center, under the Network Sharing
+ tab, labeled Configure WebDAV shares.
Introduction
WebDAV is a protocol
+ that allows to mount a web server's directory
+ locally, so that it appears as a local directory. It is necessary that the
+ remote machine run a WebDAV server. This is not the aim of this tool to
+ configure the WebDAV server.
Creating a new entry
The first screen of the tool displays the already configured entries, if any, and a
+ New button. Use it to create a new entry. Insert
+ the server URL in the field of the new screen.
Then you get a screen with radio buttons to select some actions.
+ Continue with the action Mount point by clicking
+ OK after selecting the radio button, as the
+ Server is already configured. You can however
+ correct it, if needed.
The content of the remote directory will be accessible through this
+ mount point.
In the next step, give your user name and password. If you need some
+ other options, you can give them in the advanced
+ screen.
The option Mount allows you to mount
+ immediately the access.
After you accepted the configuration with the radio button
+ Done, the first screen is displayed again and your
+ new mount point is listed. After you choose Quit,
+ you are asked whether or not to save the modifications in
+ /etc/fstab. Choose this option if you want that the
+ remote directory is available at each boot. If your configuration is for
+ one-time usage, do not save it.
[35] You can start this tool from the command line, by typing
+ diskdrake --smb as root.
[36] You can start this tool from the command line, by
+ typing draksambashare as root.
[37] You can start this tool from the command line, by typing
+ diskdrake --nfs as root.
[38] You can start this tool from the command line, by typing
+ draknfs as root.
[39] You can start this tool from the command line, by
+ typing diskdrake --dav as root.
msecgui[43] is a graphic user interface for msec that allows to configure
+ your system security according to two approaches:
It sets the system behaviour, msec imposes modifications to the
+ system to make it more secure.
It carries on periodic checks automatically on the system in
+ order to warn you if something seems dangerous.
msec uses the concept of "security levels" which are intended to
+ configure a set of system permissions, which can be audited for changes or
+ enforcement. Several of them are proposed by Mageia, but you can define
+ your own customised security levels.
Overview tab
See the screenshot above
The first tab takes up the list of the different security tools with
+ a button on the right side to configure them:
Firewall, also found in the MCC / Security / Set up your
+ personal firewall
Updates, also found in MCC / Software Management / Update your
+ system
msec itself with some information:
enabled or not
the configured Base security level
the date of the last Periodic checks and a button to see a
+ detailed report and another button to execute the checks just
+ now.
Security settings tab
A click on the second tab or on the Security
+ Configure button leads to the same screen shown
+ below.
Basic security tab
+ Security levels:
+
After having checked the box Enable MSEC
+ tool, this tab allows you by a double click to choose the
+ security level that appears then in bold. If the box is not checked, the
+ level « none » is applied. The following levels are available:
Level none. This level is
+ intended if you do not want to use msec to control system security,
+ and prefer tuning it on your own. It disables all security checks
+ and puts no restrictions or constraints on system configuration and
+ settings. Please use this level only if you are knowing what you are
+ doing, as it would leave your system vulnerable to attack.
Level standard. This is the
+ default configuration when installed and is intended for casual users.
+ It constrains several system settings and executes daily security
+ checks which detect changes in system files, system accounts, and
+ vulnerable directory permissions. (This level is similar to levels 2
+ and 3 from past msec versions).
Level secure. This level is
+ intended when you want to ensure your system is secure, yet usable.
+ It further restricts system permissions and executes more periodic
+ checks. Moreover, access to the system is more restricted. (This
+ level is similar to levels 4 (High) and 5 (Paranoid) from old msec
+ versions).
Besides those levels, different task-oriented security are
+ also provided, such as the fileserver
+ , webserver and
+ netbook levels. Such levels
+ attempt to pre-configure system security according to the most common
+ use cases.
The last two levels called audit_daily
+ and audit_weekly are
+ not really security levels but rather tools for periodic checks
+ only.
These levels are saved in
+ /etc/security/msec/level.<levelname>. You can
+ define your own customised security levels, saving them into specific
+ files called level.<levelname>, placed into
+ the folder /etc/security/msec/. This function is
+ intended for power users which require a customised or more secure
+ system configuration.
Caution
Keep in mind that user-modified parameters take precedence over
+ default level settings.
+ Security alerts:
+
If you check the box Send security alerts by email
+ to:, the security alerts generated by msec are going to be
+ sent by local e-mail to the security administrator named in the nearby
+ field. You can fill either a local user or a complete e-mail address
+ (the local e-mail and the e-mail manager must be set accordingly). At
+ last, you can receive the security alerts directly on your desktop.
+ Check the relevant box to enable it.
Important
It is strongly advisable to enable the security alerts option
+ in order to immediately inform the security administrator of possible
+ security problems. If not, the administrator will have to regularly
+ check the logs files available in
+ /var/log/security.
Security options:
Creating a customised level is not the only way to customise the
+ computer security, it is also possible to use the tabs presented here
+ after to change any option you want. Current configuration for msec is
+ stored in /etc/security/msec/security.conf. This
+ file contains the current security level name and the list of all the
+ modifications done to the options.
System security tab
This tab displays all the security options on the left side
+ column, a description in the centre column, and their current values on
+ the right side column.
To modify an option, double click on it and a new window appears
+ (see screenshot below). It displays the option name, a short
+ description, the actual and default values, and a drop down list where
+ the new value can be selected. Click on the OK
+ button to validate the choice.
Caution
Do not forget when leaving msecgui to save definitively your
+ configuration using the menu File -> Save the
+ configuration. If you have changed the settings, msecgui
+ allows you to preview the changes before saving them.
Network security
This tab displays all the network options and works like the
+ previous tab
Periodic checks tab
Periodic checks aim to inform the security administrator by means
+ of security alerts of all situations msec thinks potentially
+ dangerous.
This tab displays all the periodic checks done by msec and their
+ frequency if the box Enable periodic security
+ checks is checked. Changes are done like in the previous
+ tabs.
Exceptions tab
Sometimes alert messages are due to well known and wanted
+ situations. In these cases they are useless and wasted time for the
+ administrator. This tab allows you to create as many exceptions as you
+ want to avoid unwanted alert messages. It is obviously empty at the
+ first msec start. The screenshot below shows four exceptions.
To create an exception, click on the Add a
+ rule button
Select the wanted periodic check in the drop down list called
+ Check and then, enter the
+ Exception in the text area. Adding an exception is
+ obviously not definitive, you can either delete it using the
+ Delete button of the
+ Exceptions tab or modify it with a double
+ clicK.
Permissions
This tab is intended for file and directory permissions checking and
+ enforcement.
Like for the security, msec owns different permissions levels
+ (standard, secure, ..), they are enabled accordingly with the chosen
+ security level. You can create your own customised permissions levels,
+ saving them into specific files called perm.<levelname>
+ placed into the folder /etc/security/msec/
+ . This function is intended for power users which require a customised
+ configuration. It is also possible to use the tab presented here after to
+ change any permission you want. Current configuration is stored in
+ /etc/security/msec/perms.conf. This file contains the
+ list of all the modifications done to the permissions.
Default permissions are visible as a list of rules
+ (a rule per line). You can see on the left side, the file or folder
+ concerned by the rule, then the owner, then the group and then the
+ permissions given by the rule. If, for a given rule:
the box Enforce is not checked, msec only
+ checks if the defined permissions for this rule are respected and
+ sends an alert message if not, but does not change anything.
the box Enforce is checked, then msec
+ will rule the permissions respect at the first periodic check and
+ overwrite the permissions.
Important
For this to work, the option CHECK_PERMS in
+ the Periodic check tab must be configured
+ accordingly.
To create a new rule, click on the
+ Add a rule button and fill the fields as shown in
+ the example below. The joker * is allowed in the File
+ field. “current” means no modification.
Click on the OK button to
+ validate the choice and do not forget when leaving to save definitively
+ your configuration using the menu File -> Save the
+ configuration. If you have changed the settings, msecgui allows
+ you to preview the changes before saving them.
Note
It is also possible to create or modify the rules by editing
+ the configuration file /etc/security/msec/perms.conf.
+
Caution
Changes in the Permission
+ tab (or directly in the configuration file) are taken into
+ account at the first periodic check (see the option CHECK_PERMS in the
+ Periodic checks tab). If you want them to
+ be taken immediately into account, use the msecperms command in a console
+ with root rights. You can use before, the msecperms -p command to know the
+ permissions that will be changed by msecperms.
Caution
Do not forget that if you modify the permissions in a
+ console or in a file manager, for a file where the box Enforce
+ is checked in the Permissions tab
+ , msecgui will write the old permissions back after a while,
+ accordingly to the configuration of the options CHECK_PERMS and
+ CHECK_PERMS_ENFORCE in the Periodic Checks tab
+ .
Set up your personal firewall
drakfirewall
This tool[44] is found under the Security tab in the Mageia Control Center
+ labelled "Set up your personal firewall". It is the same tool in the first
+ tab of "Configure system security, permissions and audit".
A basic firewall is installed by default with Mageia. All the incoming
+ connections from the outside are blocked if they aren't authorised. In the
+ first screen above, you can select the services for which outside connection
+ attempts are accepted. For your security, uncheck the first box -
+ Everything (no firewall) - unless you want to disable
+ the firewall, and only check the needed services.
It is possible to manually enter the port numbers to open. Click on
+ Advanced and a new window is opened. In the field
+ Other ports, enter the needed ports following these
+ examples :
80/tcp : open the port 80 tcp protocol
24000:24010/udp : open all the ports from 24000 to 24010 udp
+ protocol
The listed ports should be separated by a space.
If the box Log firewall messages in system logs
+ is checked, the firewall messages will be saved in system logs
Note
If you don't host specific services (web or mail server, file
+ sharing, ...) it is completely possible to have nothing checked at all, it
+ is even recommended, it won't prevent you from connecting to the
+ internet.
The next screen deals with the Interactive Firewall options. These
+ feature allow you to be warned of connection attempts if at least the first
+ box Use Interactive Firewall is checked. Check the
+ second box to be warned if the ports are scanned (in order to find a failure
+ somewhere and enter your machine). Each box from the third one onwards
+ corresponds to a port you opened in the two first screens; in the screenshot
+ below, there are two such boxes: SSH server and 80:150/tcp. Check them to be
+ warned each time a connection is attempted on those ports.
These warning are given by alert popups through the network
+ applet.
In the last screen, choose which network interfaces are connected to
+ the Internet and must be protected. Once the OK button is clicked, the
+ necessary packages are downloaded.
Tip
If you don't know what to choose, have a look in MCC tab Network
+ & Internet, icon Set up a new network interface.
Configure authentication for Mageia
+ tools
draksec
This tool[45]is present in the Mageia Control Center under the tab Security
It allows to give the regular users the needed rights to accomplish
+ tasks usually done by the administrator.
Click on the little arrow before the item you want to drop down:
+
Most of the tools available in the Mageia Control Center are displayed
+ in the left side of the window (see the screenshot above) and for each tool,
+ a drop down list on the right side gives the choice between:
Default: The launch mode depends on the chosen security level. See in the
+ same MCC tab, the tool "Configure system security, permissions and
+ audit".
User password: The user password is asked before the tool
+ launching.
Administrator password: The root password is asked before the tool
+ launching
No password: The tool is launched without asking any
+ password.
Advanced setup for network interfaces and firewall
drakinvictus
This page hasn't been written yet for lack of resources. If you think
+ you can write this help, please contact the Doc team. Thanking you in advance.
You can start this tool from the
+ command line, by typing drakinvictus as
+ root.
Parental Controls
drakguard
This tool[46] is found in the Mageia Control Center, under the Security tab,
+ labelled Parental Control. If you don't see this label,
+ you have to install the drakguard package (not installed by default).
Presentation
Drakguard is an easy way to set up parental controls on your
+ computer to restrict who can do what, and at which times of day. Drakguard
+ has three useful capabilities:
It restricts web access to named users to set times of day. It
+ does this by controlling the shorewall firewall built into
+ Mageia.
It blocks execution of particular commands by named users so
+ these users can only execute what you accept them to execute.
It restricts access to websites, both manually defined through
+ blacklists/whitelists, but also dynamically based on the content of
+ the website. To achieve this Drakguard uses the leading opensource
+ parental control blocker DansGuardian.
Configuring Parental controls
Warning
If your computer contains hard drive partitions that are
+ formatted in Ext2, Ext3, or ReiserFS format you will see a pop up
+ offering to configure ACL on your partitions. ACL stands for Access
+ Control Lists, and is a Linux kernel feature that allows access to
+ individual files to be restricted to named users. ACL is built into
+ Ext4 and Btrfs file systems, but must be enabled by an option in Ext2,
+ Ext3, or Reiserfs partitions. If you select 'Yes' to this prompt
+ drakguard will configure all your partitions to support ACL, and will
+ then suggest you reboot.
Enable parental control: If checked,
+ the parental control is enabled and the access to Block
+ programs tab is opened.
Block all network traffic: If checked, all
+ the websites are blocked, except the ones in the whitelist tab. Otherwise,
+ all the websites are allowed, except the ones in the blacklist tab.
User access: Users on the left hand side will
+ have their access restricted according to the rules you define. Users on
+ the right hand side have unrestricted access so adult users of the
+ computer are not inconvenienced. Select a user in the left hand side and
+ click on Add to add him/her as an allowed user.
+ Select an user in the right hand side and click on Remove
+ to remove him/her from the allowed users.
Time control: If checked, internet access is
+ allowed with restrictions between the Start time and
+ End time. It is totally blocked outside these time
+ window.
Blacklist/Whitelist tab
Enter the website URL in the first field at the top and click on
+ the Add button.
Block Programs Tab
Block Defined Applications: Enables the use
+ of ACL to restrict access to specific applications. Insert the path to
+ the applications you wish to block.
Unblock Users list: Users listed on the
+ right hand side will not be subject to acl blocking.
[43] You can start this tool from the command
+ line, by typing msecgui as root.
[44] You can start this tool from the command line, by typing drakfirewall as root.
[45] You can start this tool from the command line, by typing draksec as root.
[46] You can start this tool from the command line, by typing drakguard as root.
This screen and the one for Network Services are only visible if the drakwizard package is installed. You can choose between several tools to set up different servers. Click on a link below or on the section called “Network Services”to learn more.
This tool[5] can help you to set up an FTP server.
+
What is FTP?
+ File Transfer Protocol (FTP) is a standard network protocol used to transfer files from one host to another host over a TCP-based network, such as the Internet. (From Wikipedia)
+
Setting up an FTP server with drakwizard proftpd
+ Welcome to the FTP wizard. Buckle up.
+
Introduction
+ The first page is just an introduction, click Next.
+
Selecting Server Exposer: Local Net and/or World
+ Exposing the FTP server to the Internet has it's risks. Be ready for bad things.
+
Server Information
+ Enter name the sever will use to introduce itself, someone to email complaints too and whether to allow root login access.
+
This tool[26] enables you to modify the manner in which you can be
+ recognized as user of the machine or on the net.
By default, information for your authentication is stored in a file
+ on your computer. Modify it only if your network administrator invites you
+ to do so and give information about that.
Manage system services by enabling or disabling them
drakxservices
This page hasn't been written yet for lack of resources. If you think
+ you can write this help, please contact the Doc team. Thanking you in advance.
You can start this tool from the
+ command line, by typing drakxservices as
+ root.
Manage, add and remove fonts. Import
+ Windows(TM) fonts
drakfont
This tool[27] is present in the Mageia Control Center under the System tab. It allows you to manage the fonts
+ available on the computer. The main screen above shows:
the installed font names, styles and sizes.
a preview of the selected font.
some buttons explained here later.
Get Windows Fonts:
This button automatically adds the fonts found on the Windows
+ partition. You must have Microsoft Windows installed.
Options:
It allows you to specify the applications or devices (printers mostly)
+ able to use the fonts.
Uninstall:
This button is to remove installed fonts and possibly save some place.
+ Be careful when removing fonts because it may have serious consequences on
+ the documents that use them.
Import:
Allows you to add fonts from a third party (CD, internet, ...). The
+ supported formats are ttf, pfa, pfb, pcf, pfm and gsf. Click on the
+ Import button and then on Add, a file manager pops up where you can select the
+ fonts to install, click on Install when
+ done. They are installed in the folder /usr/share/fonts.
If the newly installed (or removed) fonts doesn't appear in the
+ Drakfont main screen, close and re open it to see the modifications.
Manage date and time
drakclock
This tool[28] is found under the tab System in the Mageia Control Center
+ labelled "Manage date and time". In some desktop
+ environments it is also available by a right click / Adjust date and Time
+ ... on the clock in the system tray.
It's a very simple tool.
On the upper left part, is the calendar. On the screenshot above, the date is
+ September (on the upper left), 2012 (on the upper right), the 2nd (in blue)
+ and it is a Sunday. Select the month (or year) by clicking on the little
+ arrows on each side of September (or 2012). Select the day by clicking on
+ its number.
On the bottom left is the Network Time
+ Protocol synchronising, it is possible to have a clock always on
+ time by synchronising it with a server. Check Enable Network Time
+ Protocol and choose the closest server.
On the right part is the clock. It's
+ useless to set the clock if NTP is enabled. Three boxes display hours,
+ minutes and seconds (15, 28 and 22 on the screenshot). Use the little arrows
+ to set the clock to the correct time. The format can't be changed here, see
+ your desktop environment settings for that.
At least, on the bottom right, select your time zone by clicking on
+ the Change Time Zone button and choosing in the list
+ the nearest town.
Note
Even if it isn't possible to choose a date or time format in this
+ tool, they will be displayed on your desktop in accordance with the
+ localisation settings.
Manage localization for your
+ system
localedrake
This tool[29] can be found in the System section of the Mageia Control
+ Center (MCC) labelled "Manage localization for your system". It opens
+ with a window in which you can choose your language. The choice is adapted
+ to languages selected during installation.
The Advanced button give access to activate compatibility with old
+ encoding (non UTF8).
The second window shows a list of countries according to the selected
+ language. The button Other Countries gives access to
+ countries not listed.
You have to restart your session after any modifications.
Input method
In the Other Countries screen you can also select
+ an input method (from the drop-down menu at the bottom of the list). Input
+ methods allow users to input multilingual characters (Chinese, Japanese,
+ Korean, etc).
For Asian and African locales, IBus will be set as default input
+ method so users should not need to configure it manually.
This tool[30] is found in the Mageia Control Center System tab, labelled
+ "View and search system logs".
To do a search in the logs
First, enter the key string you want to look for in the Matching field and/or the key string you want to
+ do not wish to see amongst the answers in the field
+ but not matching. Then select the file(s)
+ to search in the Choose file field. Optionally, it is
+ possible to limit the search to only one day. Select it in the Calendar, using the little arrows on each side of
+ the month and year, and check "Show only for the selected
+ day". At last, click on the search
+ button to see the results in the window called Content of the
+ file. It is possible to save the results in the .txt format by
+ clicking on the Save button.
Note
The Mageia Tools Logs houses the logs from
+ the Mageia configuration tools such as the Mageia Control Center tools.
+ These logs are updated each time a configuration is modified.
To configure a mail alert
Mail alert automatically checks the system
+ load and the services every hour and if necessary sends an e-mail to the
+ configured address.
To configure this tool, click on the Mail
+ Alert button and then, in the next screen, on the
+ Configure the mail alert system drop down button. Here, all
+ the running services are displayed and you can choose which ones you want
+ to look watch. (See screenshot above).
The following services can be watched :
Webmin Service
Postfix Mail Server
FTP Server
Apache World Wide Web Server
SSH Server
Samba Server
Xinetd Service
BIND Domain Name Resolve
In the next screen, select the Load value you
+ consider unacceptable. The load represents the demand to a process, a high
+ load slows the system down and a very high load may indicate that a
+ process has gone out of control. The default value is 3. We recommend
+ setting the load value to 3 times the number of processors.
In the last screen, enter the Email address of
+ the person to be warned and the Email server to use
+ (local or on the Internet).
Open a console as administrator
drakconsole
This tool[31] gives you access to a console which is directly opened as
+ root. We do not think that you need more information about that.
Users and Groups
userdrake
This tool[32] is found under the System tab
+ in the Mageia Control Center labelled "Manage users on system"
The tool allows an administrator to manage the users and the groups,
+ this means to add or delete a user or group and to modify user and group
+ settings (ID, shell, ...)
When userdrake is opened, all the users existing on the system are
+ listed in the Users tab, and all the groups in the
+ Groups tab. Both tabs operate the same way.
1 Add User
This button opens a new window with all fields shown empty:
The field Full Name is intended for
+ the entry of a family name and first name, but it is possible to write
+ anything or nothing as well!
Login is the only required
+ field.
Setting a Password is highly
+ recommended. There is a little shield on the right, if it is red, the
+ password is weak, too short or is too similar to the login name. You should
+ use figures, lower and upper case characters, punctuation marks, etc. The
+ shield will turn orange and then green as the password strength
+ improves.
Confirm Password field is there to
+ ensure you entered what you intended to.
Login Shell is a drop down list that
+ allows you to change the shell used by the user you are adding, the options
+ are Bash, Dash and Sh.
Create a private group for the user,
+ if checked will automatically create a group with the same name and the new
+ user as the only member (this may be edited).
The other options should be obvious. The new user is created
+ immediately after you click on OK.
2 Add Group
You only need to enter the new group name, and if required, the
+ specific group ID.
3 Edit (a selected user)
User Data: Allows you to modify all the data
+ given for the user at creation (the ID can't be changed).
Account Info:
The first option is for setting an expiration date for the account.
+ Connection is impossible after this date. This is useful for temporary
+ accounts.
The second option is to lock the account, connection is impossible as
+ long as the account is locked.
It is also possible to change the icon.
Password Info: Allows you to set an
+ expiration date for the password, this forces the user to change his
+ password periodically.
Group: Here you can select the groups
+ that the user is a member of.
Note
If you are modifying a connected user account, modifications will
+ not be effective until his/her next login.
4 Edit (with a group selected)
Group Data: Allows you to modify the
+ group name.
Group Users: Here you can select the
+ users who are members of the group
5 Delete
Select a user or a group and click on Delete to remove it. For a user, a window appears to
+ ask if home directory and mailbox must also be deleted. If a private group
+ has been created for the user, it will be deleted as well.
Warning
It is possible to delete a group which is not empty.
6 Refresh
The User database can be changed outside of Userdrake. Click on this
+ icon to refresh the display.
7 Guest Account
guest is a special account. It is
+ intended to give somebody temporary access to the system with total
+ security. Login is xguest, there is no password, and it is impossible to
+ make modifications to the system from this account. The personal directories
+ are deleted at the end of the session. This account is enabled by default,
+ to disable it, click in the menu on Actions -> Uninstall guest
+ account.
Import Windows(TM) documents and
+ settings
transfugdrake
This tool[33] is found under the System tab
+ in the Mageia Control Center labeled Import Windows(TM) documents
+ and settings
The tool allows an administrator to import the user documents and
+ settings from a Windows® 2000,
+ Windows® XP or Windows® Vista™
+ installation on the same computer as the Mageia installation.
Warning
Please note that all the changes will be applied by transfugdrake
+ immediately after pressing Next.
After starting transfugdrake you will see the first wizard page with
+ some explanation about the tool and import options.
As soon as you read and understand the instructions, press the
+ Next button. This should run a detection of
+ Windows® installation.
When the detection step is complete you will see a page which allows
+ you to choose accounts in Windows®
+ and Mageia for the import procedure. It is possible to choose other user
+ account than yours own.
Note
Please take into account that due to migrate-assistant (the backend
+ of transfugdrake) limitations Windows® user account names with special
+ symbols can be displayed incorrectly.
Note
Migration may take some time depending on the size of the document
+ folders.
Warning
Some Windows® applications
+ (especially drivers) may create user accounts for different purposes. For
+ example, NVidia drivers in Windows®are updated using
+ UpdatusUser. Please do not use such accounts for the
+ import purposes.
When you finished with the accounts selection press
+ Next button. The next page is used to select a method
+ to import documents:
Transfugdrake is designed to import Windows® data from My
+ Documents, My Music and My
+ Pictures folders. It is possible to skip import by selecting the
+ appropriate item in this window.
When you finished with the document import method choosing press
+ Next button. The next page is used to select a method
+ to import bookmarks:
Transfugdrake can import Internet Explorer and
+ Mozilla Firefox bookmarks into the bookmarks of Mageia
+ Mozilla Firefox instance.
Choose the preferred import option and press the
+ Next button.
The next page allows you to import desktop background:
Choose the preferred option and press the Next
+ button.
The last page of wizard shows some congratulation message. Just press
+ the Finish button.
Snapshots
draksnapshot-config
This tool[34] is available in MCC's System
+ tab, in the Administration tools section.
When you start this tool in MCC for the first time, you will see a
+ message about installing draksnapshot. Click on Install to
+ proceed. Draksnapshot and some other packages it needs will be
+ installed.
Click again on Snapshots, you will see the Settings screen. Tick
+ Enable Backups and, if you want to backup the whole system, Backup
+ the whole system.
If you only want to backup part of your directories, then choose
+ Advanced. You will see a little pop-up screen. Use the Add and
+ Remove buttons next to the Backup list to include or exclude
+ directories and files from the backup. Use the same buttons next to
+ the Exclude list to remove subdirectories and/or files from the
+ chosen directories, that should not
+ be included in the backup. Click on Close when you are done.
Now give the path to Where to backup, or choose the Browse button
+ to select the correct path. Any mounted USB-key or external HD can be
+ found in /run/media/your_user_name/.
+
Click on Apply to make the snapshot.
[26] You can start this tool from the command line, by typing drakauth as root.
[27] You can start this tool from the command line, by typing drakfont as root.
[28] You can start this tool from the command line, by typing drakclock as root.
[29] You can also start this tool from the command
+ line, by typing localedrake as root.
+
[30] You can start this tool from the command line, by typing logdrake as root.
[31] You can start this tool from the command line, by typing drakconsole as root.
[32] You can start this tool from the command line, by typing userdrake as root.
[33] You can start this tool from the command line, by typing transfugdrake as root.
[34] You can start this tool from the command line,
+ by typing draksnapshot-config
+ as root.
diff --git a/mcc/8/en/content/nwSearchFnt.js b/mcc/8/en/content/nwSearchFnt.js
new file mode 100644
index 00000000..13327867
--- /dev/null
+++ b/mcc/8/en/content/nwSearchFnt.js
@@ -0,0 +1,524 @@
+/*----------------------------------------------------------------------------
+ * JavaScript for webhelp search
+ *----------------------------------------------------------------------------
+ This file is part of the webhelpsearch plugin for DocBook WebHelp
+ Copyright (c) 2007-2008 NexWave Solutions All Rights Reserved.
+ www.nexwave.biz Nadege Quaine
+ http://kasunbg.blogspot.com/ Kasun Gajasinghe
+ */
+
+//string initialization
+var htmlfileList = "htmlFileList.js";
+var htmlfileinfoList = "htmlFileInfoList.js";
+var useCJKTokenizing = false;
+
+/* Cette fonction verifie la validite de la recherche entrre par l utilisateur */
+function Verifie(ditaSearch_Form) {
+
+ // Check browser compatibitily
+ if (navigator.userAgent.indexOf("Konquerer") > -1) {
+
+ alert(txt_browser_not_supported);
+ return;
+ }
+
+
+ var expressionInput = document.ditaSearch_Form.textToSearch.value;
+ //Set a cookie to store the searched keywords
+ $.cookie('textToSearch', expressionInput);
+
+
+ if (expressionInput.length < 1) {
+
+ // expression is invalid
+ alert(txt_enter_at_least_1_char);
+ // reactive la fenetre de search (utile car cadres)
+ document.ditaSearch_Form.textToSearch.focus();
+ }
+ else {
+
+ // Effectuer la recherche
+ Effectuer_recherche(expressionInput);
+
+ // reactive la fenetre de search (utile car cadres)
+ document.ditaSearch_Form.textToSearch.focus();
+ }
+}
+
+var stemQueryMap = new Array(); // A hashtable which maps stems to query words
+
+/* This function parses the search expression, loads the indices and displays the results*/
+function Effectuer_recherche(expressionInput) {
+
+ /* Display a waiting message */
+ //DisplayWaitingMessage();
+
+ /*data initialisation*/
+ var searchFor = ""; // expression en lowercase et sans les caracte res speciaux
+ //w = new Object(); // hashtable, key=word, value = list of the index of the html files
+ scriptLetterTab = new Scriptfirstchar(); // Array containing the first letter of each word to look for
+ var wordsList = new Array(); // Array with the words to look for
+ var finalWordsList = new Array(); // Array with the words to look for after removing spaces
+ var linkTab = new Array();
+ var fileAndWordList = new Array();
+ var txt_wordsnotfound = "";
+
+
+ /*nqu: expressionInput, la recherche est lower cased, plus remplacement des char speciaux*/
+ searchFor = expressionInput.toLowerCase().replace(/<\//g, "_st_").replace(/\$_/g, "_di_").replace(/\.|%2C|%3B|%21|%3A|@|\/|\*/g, " ").replace(/(%20)+/g, " ").replace(/_st_/g, "").replace(/_di_/g, "%24_");
+
+ searchFor = searchFor.replace(/ +/g, " ");
+ searchFor = searchFor.replace(/ $/, "").replace(/^ /, "");
+
+ wordsList = searchFor.split(" ");
+ wordsList.sort();
+
+ //set the tokenizing method
+ if(typeof indexerLanguage != "undefined" && (indexerLanguage=="zh" || indexerLanguage=="ja" ||indexerLanguage=="ko")){
+ useCJKTokenizing=true;
+ } else {
+ useCJKTokenizing=false;
+ }
+ //If Lucene CJKTokenizer was used as the indexer, then useCJKTokenizing will be true. Else, do normal tokenizing.
+ // 2-gram tokenizinghappens in CJKTokenizing,
+ if(useCJKTokenizing){
+ finalWordsList = cjkTokenize(wordsList);
+ } else {
+ finalWordsList = tokenize(wordsList);
+ }
+
+ //load the scripts with the indices: the following lines do not work on the server. To be corrected
+ /*if (IEBrowser) {
+ scriptsarray = loadTheIndexScripts (scriptLetterTab);
+ } */
+
+ /**
+ * Compare with the indexed words (in the w[] array), and push words that are in it to tempTab.
+ */
+ var tempTab = new Array();
+ for (var t in finalWordsList) {
+ if (w[finalWordsList[t].toString()] == undefined) {
+ txt_wordsnotfound += finalWordsList[t] + " ";
+ } else {
+ tempTab.push(finalWordsList[t]);
+ }
+ }
+ finalWordsList = tempTab;
+
+ if (!finalWordsList.length) {
+ finalWordsList = wordsList;
+ }
+
+ fileAndWordList = SortResults(finalWordsList);
+
+ if (fileAndWordList && fileAndWordList.length) {
+
+ //search 'and' and 'or' one time
+ //fileAndWordList = SortResults(finalWordsList);
+
+ var cpt = fileAndWordList.length;
+ for (var i = cpt - 1; i >= 0; i--) {
+ if (fileAndWordList[i] != undefined) {
+ linkTab.push("
There are more Mageia tools than those that can be started in the Mageia Control Center. Click on a link below to learn more, or continue reading the next pages.
Usually, this tool[50] starts automatically when a Mageia tool crashes. However, it is also possible that, after filing a bug report, you are asked to start this tool to check some of the information it gives, and then provide that in that existing bug report.
If a new bug report needs to be filed and you are not used to doing that, then please read How to report a bug report properly before clicking on the "Report" button.
In case the bug has already been filed by someone else (the error message that drakbug gave will be the same, then), it is useful to add a comment to that existing report that you saw the bug, too.
Collect Logs and System Information
+ for Bug Reports
drakbug_report
This tool[51] can only be started and used on the command
+ line.
It is advised to write the output of this command to a file, for
+ instance by doing drakbug_report >
+ drakbugreport.txt, but make sure you have enough disk space
+ first: the file can easily be several GBs large.
Note
The output is far too large to attach to a bug report without
+first removing the unneeded parts.
This command collects the following information on your system:
lspci
pci_devices
dmidecode
fdisk
scsi
/sys/bus/scsi/devices
lsmod
cmdline
pcmcia: stab
usb
partitions
cpuinfo
syslog
Xorg.log
monitor_full_edid
stage1.log
ddebug.log
install.log
fstab
modprobe.conf
lilo.conf
grub: menu.lst
grub: install.sh
grub: device.map
xorg.conf
urpmi.cfg
modprobe.preload
sysconfig/i18n
/proc/iomem
/proc/ioport
mageia version
rpm -qa
df
Note
At the time this help page was written, the "syslog" part of
+ this command's output was empty, because this tool had not yet been
+ adjusted to our switch to systemd. If it is still empty, you can
+ retrieve the "syslog" by doing (as root)
+ journalctl -a > journalctl.txt. If you don't have a lot of
+ diskspace, you can, for instance, take the last 5000 lines of the log
+ instead with: journalctl -a | tail -n5000 >
+ journalctl5000.txt.
Display Available NFS And SMB Shares
lsnetdrake
This tool
+ [52] can only be started and used on the command line.
This page hasn't been written yet for lack of resources. If you think
+ you can write this help, please contact
+ the
+ Documentation team. Thanking you in advance.
Display Your PCI, USB and PCMCIA
+ Information
lspcidrake
This tool [53] can only be started and used on the command line. It will give
+ some more information if used under root.
lspcidrake gives the list of all the connected devices to the computer
+ (USB, PCI and PCMCIA) and the used drivers. It needs the ldetect and
+ ldetect-lst packages to work.
With the -v option, lspcidrake adds the vendor and device
+ identifications.
lspcidrake often generates very long lists, so, to find an
+ information, it is often used in a pipeline with the grep command, like in
+ these examples:
Information about the graphic card;
lspcidrake | grep VGA
Information about the network
lspcidrake | grep -i network
-i to ignore case distinctions.
In this screenshot below, you can see the action of the -v option for
+ lspcidrake and the -i option for grep.
There is another tool that gives information about the hardware, it is
+ called dmidecode (under root)
[50] You can start this tool from the command line, by typing drakbug.
[51] You can start this tool from the command
+ line, by typing drakbug_report as
+ root.
[52] You can start this tool from the command line, by typing lsnetdrake.
+
[53] You can start this tool from the command line, by typing lspcidrake.
" + "Your search returned no results for " + "" + txt_wordsnotfound + "" + "
";
+ }
+ //alert(results);
+ document.getElementById('searchResults').innerHTML = results;
+}
+
+function tokenize(wordsList){
+ var stemmedWordsList = new Array(); // Array with the words to look for after removing spaces
+ var cleanwordsList = new Array(); // Array with the words to look for
+ for(var j in wordsList){
+ var word = wordsList[j];
+ if(typeof stemmer != "undefined" ){
+ stemQueryMap[stemmer(word)] = word;
+ } else {
+ stemQueryMap[word] = word;
+ }
+ }
+ //stemmedWordsList is the stemmed list of words separated by spaces.
+ for (var t in wordsList) {
+ wordsList[t] = wordsList[t].replace(/(%22)|^-/g, "");
+ if (wordsList[t] != "%20") {
+ scriptLetterTab.add(wordsList[t].charAt(0));
+ cleanwordsList.push(wordsList[t]);
+ }
+ }
+
+ if(typeof stemmer != "undefined" ){
+ //Do the stemming using Porter's stemming algorithm
+ for (var i = 0; i < cleanwordsList.length; i++) {
+ var stemWord = stemmer(cleanwordsList[i]);
+ stemmedWordsList.push(stemWord);
+ }
+ } else {
+ stemmedWordsList = cleanwordsList;
+ }
+ return stemmedWordsList;
+}
+
+//Invoker of CJKTokenizer class methods.
+function cjkTokenize(wordsList){
+ var allTokens= new Array();
+ var notCJKTokens= new Array();
+ var j=0;
+ for(j=0;j";
+ return this.input.substring(this.offset,this.offset+2);
+ }
+
+ function getAllTokens(){
+ while(this.incrementToken()){
+ var tmp = this.tokenize();
+ this.tokens.push(tmp);
+ }
+ return this.unique(this.tokens);
+// document.getElementById("content").innerHTML += tokens+" ";
+// document.getElementById("content").innerHTML += " dada"+sortedTokens+" ";
+// console.log(tokens.length+"dsdsds");
+ /*for(i=0;idada"+un[i]+"- "+stems[i]+" "+ ss;
+ document.getElementById("content").innerHTML += " "+sortedTokens[i];
+ }*/
+ }
+
+ function unique(a)
+ {
+ var r = new Array();
+ o:for(var i = 0, n = a.length; i < n; i++)
+ {
+ for(var x = 0, y = r.length; x < y; x++)
+ {
+ if(r[x]==a[i]) continue o;
+ }
+ r[r.length] = a[i];
+ }
+ return r;
+ }
+}
+
+
+/* Scriptfirstchar: to gather the first letter of index js files to upload */
+function Scriptfirstchar() {
+ this.strLetters = "";
+ this.add = addLettre;
+}
+
+function addLettre(caract) {
+
+ if (this.strLetters == 'undefined') {
+ this.strLetters = caract;
+ } else if (this.strLetters.indexOf(caract) < 0) {
+ this.strLetters += caract;
+ }
+
+ return 0;
+}
+/* end of scriptfirstchar */
+
+/*main loader function*/
+/*tab contains the first letters of each word looked for*/
+function loadTheIndexScripts(tab) {
+
+ //alert (tab.strLetters);
+ var scriptsarray = new Array();
+
+ for (var i = 0; i < tab.strLetters.length; i++) {
+
+ scriptsarray[i] = "..\/search" + "\/" + tab.strLetters.charAt(i) + ".js";
+ }
+ // add the list of html files
+ i++;
+ scriptsarray[i] = "..\/search" + "\/" + htmlfileList;
+
+ //debug
+ for (var t in scriptsarray) {
+ //alert (scriptsarray[t]);
+ }
+
+ tab = new ScriptLoader();
+ for (t in scriptsarray) {
+ tab.add(scriptsarray[t]);
+ }
+ tab.load();
+ //alert ("scripts loaded");
+ return (scriptsarray);
+}
+
+/* ScriptLoader: to load the scripts and wait that it's finished */
+function ScriptLoader() {
+ this.cpt = 0;
+ this.scriptTab = new Array();
+ this.add = addAScriptInTheList;
+ this.load = loadTheScripts;
+ this.onScriptLoaded = onScriptLoadedFunc;
+}
+
+function addAScriptInTheList(scriptPath) {
+ this.scriptTab.push(scriptPath);
+}
+
+function loadTheScripts() {
+ var script;
+ var head;
+
+ head = document.getElementsByTagName('head').item(0);
+
+ //script = document.createElement('script');
+
+ for (var el in this.scriptTab) {
+ //alert (el+this.scriptTab[el]);
+ script = document.createElement('script');
+ script.src = this.scriptTab[el];
+ script.type = 'text/javascript';
+ script.defer = false;
+
+ head.appendChild(script);
+ }
+
+}
+
+function onScriptLoadedFunc(e) {
+ e = e || window.event;
+ var target = e.target || e.srcElement;
+ var isComplete = true;
+ if (typeof target.readyState != undefined) {
+
+ isComplete = (target.readyState == "complete" || target.readyState == "loaded");
+ }
+ if (isComplete) {
+ ScriptLoader.cpt++;
+ if (ScriptLoader.cpt == ScriptLoader.scripts.length) {
+ ScriptLoader.onLoadComplete();
+ }
+ }
+}
+
+/*
+function onLoadComplete() {
+ alert("loaded !!");
+} */
+
+/* End of scriptloader functions */
+
+// Array.unique( strict ) - Remove duplicate values
+function unique(tab) {
+ var a = new Array();
+ var i;
+ var l = tab.length;
+
+ if (tab[0] != undefined) {
+ a[0] = tab[0];
+ }
+ else {
+ return -1
+ }
+
+ for (i = 1; i < l; i++) {
+ if (indexof(a, tab[i], 0) < 0) {
+ a.push(tab[i]);
+ }
+ }
+ return a;
+}
+function indexof(tab, element, begin) {
+ for (var i = begin; i < tab.length; i++) {
+ if (tab[i] == element) {
+ return i;
+ }
+ }
+ return -1;
+
+}
+/* end of Array functions */
+
+
+/*
+ Param: mots= list of words to look for.
+ This function creates an hashtable:
+ - The key is the index of a html file which contains a word to look for.
+ - The value is the list of all words contained in the html file.
+
+ Return value: the hashtable fileAndWordList
+ */
+function SortResults(mots) {
+
+ var fileAndWordList = new Object();
+ if (mots.length == 0) {
+ return null;
+ }
+
+ for (var t in mots) {
+ // get the list of the indices of the files.
+ var listNumerosDesFicStr = w[mots[t].toString()];
+ //alert ("listNumerosDesFicStr "+listNumerosDesFicStr);
+ var tab = listNumerosDesFicStr.split(",");
+
+ //for each file (file's index):
+ for (var t2 in tab) {
+ var temp = tab[t2].toString();
+ if (fileAndWordList[temp] == undefined) {
+
+ fileAndWordList[temp] = "" + mots[t];
+ } else {
+
+ fileAndWordList[temp] += "," + mots[t];
+ }
+ }
+ }
+
+ var fileAndWordListValuesOnly = new Array();
+
+ // sort results according to values
+ var temptab = new Array();
+ for (t in fileAndWordList) {
+ tab = fileAndWordList[t].split(',');
+
+ var tempDisplay = new Array();
+ for (var x in tab) {
+ if(stemQueryMap[tab[x]] != undefined){
+ tempDisplay.push(stemQueryMap[tab[x]]); //get the original word from the stem word.
+ } else {
+ tempDisplay.push(tab[x]); //no stem is available. (probably a CJK language)
+ }
+ }
+ var tempDispString = tempDisplay.join(", ");
+
+ temptab.push(new resultPerFile(t, fileAndWordList[t], tab.length, tempDispString));
+ fileAndWordListValuesOnly.push(fileAndWordList[t]);
+ }
+
+
+ //alert("t"+fileAndWordListValuesOnly.toString());
+
+ fileAndWordListValuesOnly = unique(fileAndWordListValuesOnly);
+ fileAndWordListValuesOnly = fileAndWordListValuesOnly.sort(compare_nbMots);
+ //alert("t: "+fileAndWordListValuesOnly.join(';'));
+
+ var listToOutput = new Array();
+
+ for (var j in fileAndWordListValuesOnly) {
+ for (t in temptab) {
+ if (temptab[t].motsliste == fileAndWordListValuesOnly[j]) {
+ if (listToOutput[j] == undefined) {
+ listToOutput[j] = new Array(temptab[t]);
+ } else {
+ listToOutput[j].push(temptab[t]);
+ }
+ }
+ }
+ }
+ return listToOutput;
+}
+
+function resultPerFile(filenb, motsliste, motsnb, motslisteDisplay) {
+ this.filenb = filenb;
+ this.motsliste = motsliste;
+ this.motsnb = motsnb;
+ this.motslisteDisplay= motslisteDisplay;
+}
+
+function compare_nbMots(s1, s2) {
+ var t1 = s1.split(',');
+ var t2 = s2.split(',');
+ //alert ("s1:"+t1.length + " " +t2.length)
+ if (t1.length == t2.length) {
+ return 0;
+ } else if (t1.length > t2.length) {
+ return 1;
+ } else {
+ return -1;
+ }
+ //return t1.length - t2.length);
+}
\ No newline at end of file
diff --git a/mcc/8/en/content/search/punctuation.props b/mcc/8/en/content/search/punctuation.props
new file mode 100644
index 00000000..d3e3fcd2
--- /dev/null
+++ b/mcc/8/en/content/search/punctuation.props
@@ -0,0 +1,31 @@
+Punct01=\\u3002
+Punct02=\\u3003
+Punct03=\\u300C
+Punct04=\\u300D
+Punct05=\\u300E
+Punct06=\\u300F
+Punct07=\\u301D
+Punct08=\\u301E
+Punct09=\\u301F
+Punct10=\\u309B
+Punct11=\\u2018
+Punct12=\\u2019
+Punct13=\\u201A
+Punct14=\\u201C
+Punct15=\\u201D
+Punct16=\\u201E
+Punct17=\\u2032
+Punct18=\\u2033
+Punct19=\\u2035
+Punct20=\\u2039
+Punct21=\\u203A
+Punct22=\\u201E
+Punct23=\\u00BB
+Punct24=\\u00AB
+Punct25=
+Punct26=
+Punct27=\\u00A0
+Punct28=\\u2014
+
+
+
diff --git a/mcc/8/en/content/search/stemmers/de_stemmer.js b/mcc/8/en/content/search/stemmers/de_stemmer.js
new file mode 100644
index 00000000..7ff3822a
--- /dev/null
+++ b/mcc/8/en/content/search/stemmers/de_stemmer.js
@@ -0,0 +1,247 @@
+/*
+ * Author: Joder Illi
+ *
+ * Copyright (c) 2010, FormBlitz AG
+ * All rights reserved.
+ * Implementation of the stemming algorithm from http://snowball.tartarus.org/algorithms/german/stemmer.html
+ * Copyright of the algorithm is: Copyright (c) 2001, Dr Martin Porter and can be found at http://snowball.tartarus.org/license.php
+ *
+ * Redistribution and use in source and binary forms, with or without modification, is covered by the standard BSD license.
+ *
+ */
+
+//var stemmer = function Stemmer() {
+ /*
+ German includes the following accented forms,
+ ä ö ü
+ and a special letter, ß, equivalent to double s.
+ The following letters are vowels:
+ a e i o u y ä ö ü
+ */
+
+ var stemmer = function(word) {
+ /*
+ Put u and y between vowels into upper case
+ */
+ word = word.replace(/([aeiouyäöü])u([aeiouyäöü])/g, '$1U$2');
+ word = word.replace(/([aeiouyäöü])y([aeiouyäöü])/g, '$1Y$2');
+
+ /*
+ and then do the following mappings,
+ (a) replace ß with ss,
+ (a) replace ae with ä, Not doing these, have trouble with diphtongs
+ (a) replace oe with ö, Not doing these, have trouble with diphtongs
+ (a) replace ue with ü unless preceded by q. Not doing these, have trouble with diphtongs
+ So in quelle, ue is not mapped to ü because it follows q, and in feuer it is not mapped because the first part of the rule changes it to feUer, so the u is not found.
+ */
+ word = word.replace(/ß/g, 'ss');
+ //word = word.replace(/ae/g, 'ä');
+ //word = word.replace(/oe/g, 'ö');
+ //word = word.replace(/([^q])ue/g, '$1ü');
+
+ /*
+ R1 and R2 are first set up in the standard way (see the note on R1 and R2), but then R1 is adjusted so that the region before it contains at least 3 letters.
+ R1 is the region after the first non-vowel following a vowel, or is the null region at the end of the word if there is no such non-vowel.
+ R2 is the region after the first non-vowel following a vowel in R1, or is the null region at the end of the word if there is no such non-vowel.
+ */
+
+ var r1Index = word.search(/[aeiouyäöü][^aeiouyäöü]/);
+ var r1 = '';
+ if (r1Index != -1) {
+ r1Index += 2;
+ r1 = word.substring(r1Index);
+ }
+
+ var r2Index = -1;
+ var r2 = '';
+
+ if (r1Index != -1) {
+ var r2Index = r1.search(/[aeiouyäöü][^aeiouyäöü]/);
+ if (r2Index != -1) {
+ r2Index += 2;
+ r2 = r1.substring(r2Index);
+ r2Index += r1Index;
+ } else {
+ r2 = '';
+ }
+ }
+
+ if (r1Index != -1 && r1Index < 3) {
+ r1Index = 3;
+ r1 = word.substring(r1Index);
+ }
+
+ /*
+ Define a valid s-ending as one of b, d, f, g, h, k, l, m, n, r or t.
+ Define a valid st-ending as the same list, excluding letter r.
+ */
+
+ /*
+ Do each of steps 1, 2 and 3.
+ */
+
+ /*
+ Step 1:
+ Search for the longest among the following suffixes,
+ (a) em ern er
+ (b) e en es
+ (c) s (preceded by a valid s-ending)
+ */
+ var a1Index = word.search(/(em|ern|er)$/g);
+ var b1Index = word.search(/(e|en|es)$/g);
+ var c1Index = word.search(/([bdfghklmnrt]s)$/g);
+ if (c1Index != -1) {
+ c1Index++;
+ }
+ var index1 = 10000;
+ var optionUsed1 = '';
+ if (a1Index != -1 && a1Index < index1) {
+ optionUsed1 = 'a';
+ index1 = a1Index;
+ }
+ if (b1Index != -1 && b1Index < index1) {
+ optionUsed1 = 'b';
+ index1 = b1Index;
+ }
+ if (c1Index != -1 && c1Index < index1) {
+ optionUsed1 = 'c';
+ index1 = c1Index;
+ }
+
+ /*
+ and delete if in R1. (Of course the letter of the valid s-ending is not necessarily in R1.) If an ending of group (b) is deleted, and the ending is preceded by niss, delete the final s.
+ (For example, äckern -> äck, ackers -> acker, armes -> arm, bedürfnissen -> bedürfnis)
+ */
+
+ if (index1 != 10000 && r1Index != -1) {
+ if (index1 >= r1Index) {
+ word = word.substring(0, index1);
+ if (optionUsed1 == 'b') {
+ if (word.search(/niss$/) != -1) {
+ word = word.substring(0, word.length -1);
+ }
+ }
+ }
+ }
+ /*
+ Step 2:
+ Search for the longest among the following suffixes,
+ (a) en er est
+ (b) st (preceded by a valid st-ending, itself preceded by at least 3 letters)
+ */
+
+ var a2Index = word.search(/(en|er|est)$/g);
+ var b2Index = word.search(/(.{3}[bdfghklmnt]st)$/g);
+ if (b2Index != -1) {
+ b2Index += 4;
+ }
+
+ var index2 = 10000;
+ var optionUsed2 = '';
+ if (a2Index != -1 && a2Index < index2) {
+ optionUsed2 = 'a';
+ index2 = a2Index;
+ }
+ if (b2Index != -1 && b2Index < index2) {
+ optionUsed2 = 'b';
+ index2 = b2Index;
+ }
+
+ /*
+ and delete if in R1.
+ (For example, derbsten -> derbst by step 1, and derbst -> derb by step 2, since b is a valid st-ending, and is preceded by just 3 letters)
+ */
+
+ if (index2 != 10000 && r1Index != -1) {
+ if (index2 >= r1Index) {
+ word = word.substring(0, index2);
+ }
+ }
+
+ /*
+ Step 3: d-suffixes (*)
+ Search for the longest among the following suffixes, and perform the action indicated.
+ end ung
+ delete if in R2
+ if preceded by ig, delete if in R2 and not preceded by e
+ ig ik isch
+ delete if in R2 and not preceded by e
+ lich heit
+ delete if in R2
+ if preceded by er or en, delete if in R1
+ keit
+ delete if in R2
+ if preceded by lich or ig, delete if in R2
+ */
+
+ var a3Index = word.search(/(end|ung)$/g);
+ var b3Index = word.search(/[^e](ig|ik|isch)$/g);
+ var c3Index = word.search(/(lich|heit)$/g);
+ var d3Index = word.search(/(keit)$/g);
+ if (b3Index != -1) {
+ b3Index ++;
+ }
+
+ var index3 = 10000;
+ var optionUsed3 = '';
+ if (a3Index != -1 && a3Index < index3) {
+ optionUsed3 = 'a';
+ index3 = a3Index;
+ }
+ if (b3Index != -1 && b3Index < index3) {
+ optionUsed3 = 'b';
+ index3 = b3Index;
+ }
+ if (c3Index != -1 && c3Index < index3) {
+ optionUsed3 = 'c';
+ index3 = c3Index;
+ }
+ if (d3Index != -1 && d3Index < index3) {
+ optionUsed3 = 'd';
+ index3 = d3Index;
+ }
+
+ if (index3 != 10000 && r2Index != -1) {
+ if (index3 >= r2Index) {
+ word = word.substring(0, index3);
+ var optionIndex = -1;
+ var optionSubsrt = '';
+ if (optionUsed3 == 'a') {
+ optionIndex = word.search(/[^e](ig)$/);
+ if (optionIndex != -1) {
+ optionIndex++;
+ if (optionIndex >= r2Index) {
+ word = word.substring(0, optionIndex);
+ }
+ }
+ } else if (optionUsed3 == 'c') {
+ optionIndex = word.search(/(er|en)$/);
+ if (optionIndex != -1) {
+ if (optionIndex >= r1Index) {
+ word = word.substring(0, optionIndex);
+ }
+ }
+ } else if (optionUsed3 == 'd') {
+ optionIndex = word.search(/(lich|ig)$/);
+ if (optionIndex != -1) {
+ if (optionIndex >= r2Index) {
+ word = word.substring(0, optionIndex);
+ }
+ }
+ }
+ }
+ }
+
+ /*
+ Finally,
+ turn U and Y back into lower case, and remove the umlaut accent from a, o and u.
+ */
+ word = word.replace(/U/g, 'u');
+ word = word.replace(/Y/g, 'y');
+ word = word.replace(/ä/g, 'a');
+ word = word.replace(/ö/g, 'o');
+ word = word.replace(/ü/g, 'u');
+
+ return word;
+ };
+//}
\ No newline at end of file
diff --git a/mcc/8/en/content/search/stemmers/en_stemmer.js b/mcc/8/en/content/search/stemmers/en_stemmer.js
new file mode 100644
index 00000000..f58012f2
--- /dev/null
+++ b/mcc/8/en/content/search/stemmers/en_stemmer.js
@@ -0,0 +1,187 @@
+// Porter stemmer in Javascript. Few comments, but it's easy to follow against the rules in the original
+// paper, in
+//
+// Porter, 1980, An algorithm for suffix stripping, Program, Vol. 14,
+// no. 3, pp 130-137,
+//
+// see also http://www.tartarus.org/~martin/PorterStemmer
+
+// Release 1 be 'andargor', Jul 2004
+// Release 2 (substantially revised) by Christopher McKenzie, Aug 2009
+
+
+var stemmer = (function(){
+ var step2list = {
+ "ational" : "ate",
+ "tional" : "tion",
+ "enci" : "ence",
+ "anci" : "ance",
+ "izer" : "ize",
+ "bli" : "ble",
+ "alli" : "al",
+ "entli" : "ent",
+ "eli" : "e",
+ "ousli" : "ous",
+ "ization" : "ize",
+ "ation" : "ate",
+ "ator" : "ate",
+ "alism" : "al",
+ "iveness" : "ive",
+ "fulness" : "ful",
+ "ousness" : "ous",
+ "aliti" : "al",
+ "iviti" : "ive",
+ "biliti" : "ble",
+ "logi" : "log"
+ },
+
+ step3list = {
+ "icate" : "ic",
+ "ative" : "",
+ "alize" : "al",
+ "iciti" : "ic",
+ "ical" : "ic",
+ "ful" : "",
+ "ness" : ""
+ },
+
+ c = "[^aeiou]", // consonant
+ v = "[aeiouy]", // vowel
+ C = c + "[^aeiouy]*", // consonant sequence
+ V = v + "[aeiou]*", // vowel sequence
+
+ mgr0 = "^(" + C + ")?" + V + C, // [C]VC... is m>0
+ meq1 = "^(" + C + ")?" + V + C + "(" + V + ")?$", // [C]VC[V] is m=1
+ mgr1 = "^(" + C + ")?" + V + C + V + C, // [C]VCVC... is m>1
+ s_v = "^(" + C + ")?" + v; // vowel in stem
+
+ return function (w) {
+ var stem,
+ suffix,
+ firstch,
+ re,
+ re2,
+ re3,
+ re4,
+ origword = w;
+
+ if (w.length < 3) { return w; }
+
+ firstch = w.substr(0,1);
+ if (firstch == "y") {
+ w = firstch.toUpperCase() + w.substr(1);
+ }
+
+ // Step 1a
+ re = /^(.+?)(ss|i)es$/;
+ re2 = /^(.+?)([^s])s$/;
+
+ if (re.test(w)) { w = w.replace(re,"$1$2"); }
+ else if (re2.test(w)) { w = w.replace(re2,"$1$2"); }
+
+ // Step 1b
+ re = /^(.+?)eed$/;
+ re2 = /^(.+?)(ed|ing)$/;
+ if (re.test(w)) {
+ var fp = re.exec(w);
+ re = new RegExp(mgr0);
+ if (re.test(fp[1])) {
+ re = /.$/;
+ w = w.replace(re,"");
+ }
+ } else if (re2.test(w)) {
+ var fp = re2.exec(w);
+ stem = fp[1];
+ re2 = new RegExp(s_v);
+ if (re2.test(stem)) {
+ w = stem;
+ re2 = /(at|bl|iz)$/;
+ re3 = new RegExp("([^aeiouylsz])\\1$");
+ re4 = new RegExp("^" + C + v + "[^aeiouwxy]$");
+ if (re2.test(w)) { w = w + "e"; }
+ else if (re3.test(w)) { re = /.$/; w = w.replace(re,""); }
+ else if (re4.test(w)) { w = w + "e"; }
+ }
+ }
+
+ // Step 1c
+ re = /^(.+?)y$/;
+ if (re.test(w)) {
+ var fp = re.exec(w);
+ stem = fp[1];
+ re = new RegExp(s_v);
+ if (re.test(stem)) { w = stem + "i"; }
+ }
+
+ // Step 2
+ re = /^(.+?)(ational|tional|enci|anci|izer|bli|alli|entli|eli|ousli|ization|ation|ator|alism|iveness|fulness|ousness|aliti|iviti|biliti|logi)$/;
+ if (re.test(w)) {
+ var fp = re.exec(w);
+ stem = fp[1];
+ suffix = fp[2];
+ re = new RegExp(mgr0);
+ if (re.test(stem)) {
+ w = stem + step2list[suffix];
+ }
+ }
+
+ // Step 3
+ re = /^(.+?)(icate|ative|alize|iciti|ical|ful|ness)$/;
+ if (re.test(w)) {
+ var fp = re.exec(w);
+ stem = fp[1];
+ suffix = fp[2];
+ re = new RegExp(mgr0);
+ if (re.test(stem)) {
+ w = stem + step3list[suffix];
+ }
+ }
+
+ // Step 4
+ re = /^(.+?)(al|ance|ence|er|ic|able|ible|ant|ement|ment|ent|ou|ism|ate|iti|ous|ive|ize)$/;
+ re2 = /^(.+?)(s|t)(ion)$/;
+ if (re.test(w)) {
+ var fp = re.exec(w);
+ stem = fp[1];
+ re = new RegExp(mgr1);
+ if (re.test(stem)) {
+ w = stem;
+ }
+ } else if (re2.test(w)) {
+ var fp = re2.exec(w);
+ stem = fp[1] + fp[2];
+ re2 = new RegExp(mgr1);
+ if (re2.test(stem)) {
+ w = stem;
+ }
+ }
+
+ // Step 5
+ re = /^(.+?)e$/;
+ if (re.test(w)) {
+ var fp = re.exec(w);
+ stem = fp[1];
+ re = new RegExp(mgr1);
+ re2 = new RegExp(meq1);
+ re3 = new RegExp("^" + C + v + "[^aeiouwxy]$");
+ if (re.test(stem) || (re2.test(stem) && !(re3.test(stem)))) {
+ w = stem;
+ }
+ }
+
+ re = /ll$/;
+ re2 = new RegExp(mgr1);
+ if (re.test(w) && re2.test(w)) {
+ re = /.$/;
+ w = w.replace(re,"");
+ }
+
+ // and turn initial Y back to y
+
+ if (firstch == "y") {
+ w = firstch.toLowerCase() + w.substr(1);
+ }
+
+ return w;
+ }
+})();
\ No newline at end of file
diff --git a/mcc/8/en/content/search/stemmers/fr_stemmer.js b/mcc/8/en/content/search/stemmers/fr_stemmer.js
new file mode 100644
index 00000000..34f97431
--- /dev/null
+++ b/mcc/8/en/content/search/stemmers/fr_stemmer.js
@@ -0,0 +1,299 @@
+/*
+ * Author: Kasun Gajasinghe
+ * E-Mail: kasunbg AT gmail DOT com
+ * Date: 09.08.2010
+ *
+ * usage: stemmer(word);
+ * ex: var stem = stemmer(foobar);
+ * Implementation of the stemming algorithm from http://snowball.tartarus.org/algorithms/french/stemmer.html
+ *
+ * LICENSE:
+ *
+ * Copyright (c) 2010, Kasun Gajasinghe. All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without modification,
+ * are permitted provided that the following conditions are met:
+ *
+ * 1. Redistributions of source code must retain the above copyright notice,
+ * this list of conditions and the following disclaimer.
+ *
+ * 2. Redistributions in binary form must reproduce the above copyright notice,
+ * this list of conditions and the following disclaimer in the documentation
+ * and/or other materials provided with the distribution.
+ *
+ *
+ * THIS SOFTWARE IS PROVIDED BY KASUN GAJASINGHE ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
+ * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
+ * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL KASUN GAJASINGHE BE LIABLE FOR ANY DIRECT,
+ * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+ * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+ * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
+ * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
+ * USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ *
+ */
+
+var stemmer = function(word){
+// Letters in French include the following accented forms,
+// â à ç ë é ê è ï î ô û ù
+// The following letters are vowels:
+// a e i o u y â à ë é ê è ï î ô û ù
+
+ word = word.toLowerCase();
+ var oriWord = word;
+ word = word.replace(/qu/g, 'qU'); //have to perform first, as after the operation, capital U is not treated as a vowel
+ word = word.replace(/([aeiouyâàëéêèïîôûù])u([aeiouyâàëéêèïîôûù])/g, '$1U$2');
+ word = word.replace(/([aeiouyâàëéêèïîôûù])i([aeiouyâàëéêèïîôûù])/g, '$1I$2');
+ word = word.replace(/([aeiouyâàëéêèïîôûù])y/g, '$1Y');
+ word = word.replace(/y([aeiouyâàëéêèïîôûù])/g, 'Y$1');
+
+ var rv='';
+ var rvIndex = -1;
+ if(word.search(/^(par|col|tap)/) != -1 || word.search(/^[aeiouyâàëéêèïîôûù]{2}/) != -1){
+ rv = word.substring(3);
+ rvIndex = 3;
+ } else {
+ rvIndex = word.substring(1).search(/[aeiouyâàëéêèïîôûù]/);
+ if(rvIndex != -1){
+ rvIndex +=2; //+2 is to supplement the substring(1) used to find rvIndex
+ rv = word.substring(rvIndex);
+ } else {
+ rvIndex = word.length;
+ }
+ }
+
+// R1 is the region after the first non-vowel following a vowel, or the end of the word if there is no such non-vowel.
+// R2 is the region after the first non-vowel following a vowel in R1, or the end of the word if there is no such non-vowel
+ var r1Index = word.search(/[aeiouyâàëéêèïîôûù][^aeiouyâàëéêèïîôûù]/);
+ var r1 = '';
+ if (r1Index != -1) {
+ r1Index += 2;
+ r1 = word.substring(r1Index);
+ } else {
+ r1Index = word.length;
+ }
+
+ var r2Index = -1;
+ var r2 = '';
+ if (r1Index != -1) {
+ r2Index = r1.search(/[aeiouyâàëéêèïîôûù][^aeiouyâàëéêèïîôûù]/);
+ if (r2Index != -1) {
+ r2Index += 2;
+ r2 = r1.substring(r2Index);
+ r2Index += r1Index;
+ } else {
+ r2 = '';
+ r2Index = word.length;
+ }
+ }
+ if (r1Index != -1 && r1Index < 3) {
+ r1Index = 3;
+ r1 = word.substring(r1Index);
+ }
+
+ /*
+ Step 1: Standard suffix removal
+ */
+ var a1Index = word.search(/(ance|iqUe|isme|able|iste|eux|ances|iqUes|ismes|ables|istes)$/);
+ var a2Index = word.search(/(atrice|ateur|ation|atrices|ateurs|ations)$/);
+ var a3Index = word.search(/(logie|logies)$/);
+ var a4Index = word.search(/(usion|ution|usions|utions)$/);
+ var a5Index = word.search(/(ence|ences)$/);
+ var a6Index = word.search(/(ement|ements)$/);
+ var a7Index = word.search(/(ité|ités)$/);
+ var a8Index = word.search(/(if|ive|ifs|ives)$/);
+ var a9Index = word.search(/(eaux)$/);
+ var a10Index = word.search(/(aux)$/);
+ var a11Index = word.search(/(euse|euses)$/);
+ var a12Index = word.search(/[^aeiouyâàëéêèïîôûù](issement|issements)$/);
+ var a13Index = word.search(/(amment)$/);
+ var a14Index = word.search(/(emment)$/);
+ var a15Index = word.search(/[aeiouyâàëéêèïîôûù](ment|ments)$/);
+
+ if(a1Index != -1 && a1Index >= r2Index){
+ word = word.substring(0,a1Index);
+ } else if(a2Index != -1 && a2Index >= r2Index){
+ word = word.substring(0,a2Index);
+ var a2Index2 = word.search(/(ic)$/);
+ if(a2Index2 != -1 && a2Index2 >= r2Index){
+ word = word.substring(0, a2Index2); //if preceded by ic, delete if in R2,
+ } else { //else replace by iqU
+ word = word.replace(/(ic)$/,'iqU');
+ }
+ } else if(a3Index != -1 && a3Index >= r2Index){
+ word = word.replace(/(logie|logies)$/,'log'); //replace with log if in R2
+ } else if(a4Index != -1 && a4Index >= r2Index){
+ word = word.replace(/(usion|ution|usions|utions)$/,'u'); //replace with u if in R2
+ } else if(a5Index != -1 && a5Index >= r2Index){
+ word = word.replace(/(ence|ences)$/,'ent'); //replace with ent if in R2
+ } else if(a6Index != -1 && a6Index >= rvIndex){
+ word = word.substring(0,a6Index);
+ if(word.search(/(iv)$/) >= r2Index){
+ word = word.replace(/(iv)$/, '');
+ if(word.search(/(at)$/) >= r2Index){
+ word = word.replace(/(at)$/, '');
+ }
+ } else if(word.search(/(eus)$/) != -1){
+ var a6Index2 = word.search(/(eus)$/);
+ if(a6Index2 >=r2Index){
+ word = word.substring(0, a6Index2);
+ } else if(a6Index2 >= r1Index){
+ word = word.substring(0,a6Index2)+"eux";
+ }
+ } else if(word.search(/(abl|iqU)$/) >= r2Index){
+ word = word.replace(/(abl|iqU)$/,''); //if preceded by abl or iqU, delete if in R2,
+ } else if(word.search(/(ièr|Ièr)$/) >= rvIndex){
+ word = word.replace(/(ièr|Ièr)$/,'i'); //if preceded by abl or iqU, delete if in R2,
+ }
+ } else if(a7Index != -1 && a7Index >= r2Index){
+ word = word.substring(0,a7Index); //delete if in R2
+ if(word.search(/(abil)$/) != -1){ //if preceded by abil, delete if in R2, else replace by abl, otherwise,
+ var a7Index2 = word.search(/(abil)$/);
+ if(a7Index2 >=r2Index){
+ word = word.substring(0, a7Index2);
+ } else {
+ word = word.substring(0,a7Index2)+"abl";
+ }
+ } else if(word.search(/(ic)$/) != -1){
+ var a7Index3 = word.search(/(ic)$/);
+ if(a7Index3 != -1 && a7Index3 >= r2Index){
+ word = word.substring(0, a7Index3); //if preceded by ic, delete if in R2,
+ } else { //else replace by iqU
+ word = word.replace(/(ic)$/,'iqU');
+ }
+ } else if(word.search(/(iv)$/) != r2Index){
+ word = word.replace(/(iv)$/,'');
+ }
+ } else if(a8Index != -1 && a8Index >= r2Index){
+ word = word.substring(0,a8Index);
+ if(word.search(/(at)$/) >= r2Index){
+ word = word.replace(/(at)$/, '');
+ if(word.search(/(ic)$/) >= r2Index){
+ word = word.replace(/(ic)$/, '');
+ } else { word = word.replace(/(ic)$/, 'iqU'); }
+ }
+ } else if(a9Index != -1){ word = word.replace(/(eaux)/,'eau')
+ } else if(a10Index >= r1Index){ word = word.replace(/(aux)/,'al')
+ } else if(a11Index != -1 ){
+ var a11Index2 = word.search(/(euse|euses)$/);
+ if(a11Index2 >=r2Index){
+ word = word.substring(0, a11Index2);
+ } else if(a11Index2 >= r1Index){
+ word = word.substring(0, a11Index2)+"eux";
+ }
+ } else if(a12Index!=-1 && a12Index>=r1Index){
+ word = word.substring(0,a12Index+1); //+1- amendment to non-vowel
+ } else if(a13Index!=-1 && a13Index>=rvIndex){
+ word = word.replace(/(amment)$/,'ant');
+ } else if(a14Index!=-1 && a14Index>=rvIndex){
+ word = word.replace(/(emment)$/,'ent');
+ } else if(a15Index!=-1 && a15Index>=rvIndex){
+ word = word.substring(0,a15Index+1);
+ }
+
+ /* Step 2a: Verb suffixes beginning i*/
+ var wordStep1 = word;
+ var step2aDone = false;
+ if(oriWord == word.toLowerCase() || oriWord.search(/(amment|emment|ment|ments)$/) != -1){
+ step2aDone = true;
+ var b1Regex = /([^aeiouyâàëéêèïîôûù])(îmes|ît|îtes|i|ie|ies|ir|ira|irai|iraIent|irais|irait|iras|irent|irez|iriez|irions|irons|iront|is|issaIent|issais|issait|issant|issante|issantes|issants|isse|issent|isses|issez|issiez|issions|issons|it)$/i;
+ if(word.search(b1Regex) >= rvIndex){
+ word = word.replace(b1Regex,'$1');
+ }
+ }
+
+ /* Step 2b: Other verb suffixes*/
+ if (step2aDone && wordStep1 == word) {
+ if (word.search(/(ions)$/) >= r2Index) {
+ word = word.replace(/(ions)$/, '');
+ } else {
+ var b2Regex = /(é|ée|ées|és|èrent|er|era|erai|eraIent|erais|erait|eras|erez|eriez|erions|erons|eront|ez|iez)$/i;
+ if (word.search(b2Regex) >= rvIndex) {
+ word = word.replace(b2Regex, '');
+ } else {
+ var b3Regex = /e(âmes|ât|âtes|a|ai|aIent|ais|ait|ant|ante|antes|ants|as|asse|assent|asses|assiez|assions)$/i;
+ if (word.search(b3Regex) >= rvIndex) {
+ word = word.replace(b3Regex, '');
+ } else {
+ var b3Regex2 = /(âmes|ât|âtes|a|ai|aIent|ais|ait|ant|ante|antes|ants|as|asse|assent|asses|assiez|assions)$/i;
+ if (word.search(b3Regex2) >= rvIndex) {
+ word = word.replace(b3Regex2, '');
+ }
+ }
+ }
+ }
+ }
+
+ if(oriWord != word.toLowerCase()){
+ /* Step 3 */
+ var rep = '';
+ if(word.search(/Y$/) != -1) {
+ word = word.replace(/Y$/, 'i');
+ } else if(word.search(/ç$/) != -1){
+ word = word.replace(/ç$/, 'c');
+ }
+ } else {
+ /* Step 4 */
+ //If the word ends s, not preceded by a, i, o, u, è or s, delete it.
+ if (word.search(/([^aiouès])s$/) >= rvIndex) {
+ word = word.replace(/([^aiouès])s$/, '$1');
+ }
+ var e1Index = word.search(/ion$/);
+ if (e1Index >= r2Index && word.search(/[st]ion$/) >= rvIndex) {
+ word = word.substring(0, e1Index);
+ } else {
+ var e2Index = word.search(/(ier|ière|Ier|Ière)$/);
+ if (e2Index != -1 && e2Index >= rvIndex) {
+ word = word.substring(0, e2Index) + "i";
+ } else {
+ if (word.search(/e$/) >= rvIndex) {
+ word = word.replace(/e$/, ''); //delete last e
+ } else if (word.search(/guë$/) >= rvIndex) {
+ word = word.replace(/guë$/, 'gu');
+ }
+ }
+ }
+ }
+
+ /* Step 5: Undouble */
+ //word = word.replace(/(en|on|et|el|eil)(n|t|l)$/,'$1');
+ word = word.replace(/(en|on)(n)$/,'$1');
+ word = word.replace(/(ett)$/,'et');
+ word = word.replace(/(el|eil)(l)$/,'$1');
+
+ /* Step 6: Un-accent */
+ word = word.replace(/[éè]([^aeiouyâàëéêèïîôûù]+)$/,'e$1');
+ word = word.toLowerCase();
+ return word;
+};
+
+var eqOut = new Array();
+var noteqOut = new Array();
+var eqCount = 0;
+/*
+To test the stemming, create two arrays named "voc" and "COut" which are for vocabualary and the stemmed output.
+Then add the vocabulary strings and output strings. This method will generate the stemmed output for "voc" and will
+compare the output with COut.
+ (I used porter's voc and out files and did a regex to convert them to js objects. regex: /");\nvoc.push("/g . This
+ will add strings to voc array such that output would look like: voc.push("foobar"); ) drop me an email for any help.
+ */
+function testFr(){
+ var start = new Date().getTime(); //execution time
+ eqCount = 0;
+ eqOut = new Array();
+ noteqOut = new Array();
+ for(var k=0;k
+
+
+
+ Software Management
Software Management (Install and Remove
+ Software)
rpmdrake
Introduction to rpmdrake
This tool[1], also known as drakrpm, is a program for installing,
+ uninstalling and updating packages. It is the graphical user interface of
+ URPMI. At each start up, it will check online package lists (called
+ 'media') downloaded straight from Mageia's official servers, and will show
+ you each time the latest applications and packages available for your
+ computer. A filter system allows you to display only certain types of
+ packages: you may display only installed applications (by default), or
+ only available updates. You can also view only not installed packages. You
+ can also search by the name of a package, or in the summaries of
+ descriptions or in the full descriptions of packages or in the file names
+ included in the packages.
During the installation, the configured repository is the medium
+ used for the installation, generally the DVD or CD. If you keep this
+ medium, rpmdrake will ask it each time you want to install a package,
+ with this pop-up window :
If the above message annoys you and you have a good
+ internet connection without too strict download limit, it is wise to
+ remove that medium and replace it by online repositories thanks to the section called “Configure Media” .
Moreover, the online repositories are always up to date, contains
+ much more packages, and allow to update your installed packages.
The main parts of the screen
Package type filter:
This filter allows you to display only certain types of
+ packages. The first time you start the manager, it only displays
+ applications with a graphical interface. You can display either all
+ the packages and all their dependencies and libraries or only package
+ groups such as applications only, updates only or backported packages
+ from newer versions of Mageia.
Warning
The default filter setting is for new entrants to Linux or
+ Mageia, who probably do not want command line or specialist tools.
+ Since you're reading this documentation, you're obviously interested
+ in improving your knowledge of Mageia, so it is best to set this
+ filter to "All".
Package state
+ filter:
This filter allows you to view only the installed packages, only
+ the packages that are not installed or all of the packages, both
+ installed and not installed.
Search mode:
Click on this icon to search through the package names, through
+ their summaries, through their complete description or through the
+ files included in the packages.
"Find" box:
Enter here one or more key words. If you want to use more than
+ one keyword for searching use '|' between keywords, e.g. To search for
+ "mplayer" and "xine" at the same time type 'mplayer | xine'.
Erase all:
This icon can erase in one click all the key words entered in
+ the "Find" box .
Categories list:
This side bar groups all applications and packages into clear
+ categories and sub categories.
Description panel:
This panel displays the package's name, its summary and complete
+ description. It displays many useful elements about the selected
+ package. It can also show precise details about the package, the files
+ included in the package as well as a list of the last changes made by
+ the maintainer.
The status column
Once you correctly set the filters, you can find your software
+ either by category (in area 6 above) or by name/summary/description using
+ area 4. A list of packages fulfilling your query and, don't forget, the
+ chosen medium is shown with different status markers according to whether
+ each package is installed/not installed/an update... To change this
+ status, just check or uncheck the box before the package name and click on
+ Apply.
Table 1.
Icon
Legend
This package is already installed
This package will be installed
This package cannot be modified
This package is an update
This package will be uninstalled
Examples in the screenshot above:
If I uncheck digikam (the green arrow tell us it is installed),
+ the status icon will go red with an up arrow and it will be
+ uninstalled when clicking on Apply.
If I check qdigidoc (which is not installed, see the status),
+ the orange with a down arrow status icon will appear and it will
+ be installed when clicking on Apply.
The dependencies
Some packages need other packages called dependencies in order to
+ work. They are for example libraries or tools. In this case, Rpmdrake
+ displays an information window allowing you to choose whether to accept
+ the selected dependencies, cancel the operation or get more information
+ (see above). It may also happen that various packages are able to provide
+ the needed library, in which case rpmdrake displays the list of
+ alternatives with a button to get more information and another button to
+ choose which package to install.
Software Packages Update
MageiaUpdate or drakrpm-update
This tool[2] is present in the Mageia Control Center under the tab
+ Software management.
Note
To work, MageiaUpdate needs the repositories to be configured with
+ drakrpm-editmedia with some media checked as updates. If they are not,
+ you are prompted to do so.
As soon as this tool is launched, it scans the installed packages and
+ lists those with an update available in the repositories. They are all
+ selected by default to be automatically downloaded and installed. Click on
+ the Update button to start the process.
By clicking on a package, more information is displayed in the lower
+ half of the window. The print > before a
+ title means you can click to drop down a text.
Note
When updates are available, an applet in the system tray warns you
+ by displaying this red icon . Just click and enter the user password to
+ update the system alike.
Configure updates frequency
mgaapplet-config
This tool[3] is present in the Mageia Control Center under the tab
+ Software management. It is also available
+ by a right click / Updates configuration on the red icon
+ in the system tray.
The first slider allows you to change how frequently Mageia will check
+ for updates and the second the delay after booting before the first check.
+ The check box gives you the option to be warned when a new Mageia release is
+ out.
Configure Media
drakrpm-edit-media
Important
First thing to do after an install is to add software sources
+ (also known as repositories, media, mirrors). That means you must select
+ the media sources to be used to install and update packages and
+ applications. (see Add button below).
Note
If you install (or upgrade) Mageia using an optical media (DVD or
+ CD) or a USB device, there will be a software source configured to the
+ optical media used. To avoid being asked to insert the media when you
+ install new packages, you should disable (or delete) this media. (It
+ will have the media type CD-Rom).
Note
Your system is running under an architecture which may be 32-bit
+ (called i586), or 64-bit (called x86_64). Some packages are independent
+ of whether your system is 32-bit or 64-bit; these are called noarch
+ packages. They don't have their own noarch directories on the mirrors,
+ but are all in both the i586 and the x86_64 media.
This tool is present in the Mageia Control Center under the tab
+ Software management.[4]
The columns
Column Enable:
The checked media will be used to install new packages. Be cautious
+ with some media such as Testing and Debug, they could make your system
+ unusable.
Column Update:
The checked media will be used to update packages, it must be
+ enabled. Only media with "Update" in its name should be selected. For
+ security reasons, this column isn't modifiable in this tool, you must open
+ a console as root and type drakrpm-edit-media
+ --expert.
Column medium:
Display the medium name. Mageia official repositories for final
+ release versions contain at least:
Core which contains most
+ programs available supported by Mageia.
Nonfree which contains some
+ programs which are not free
Tainted free software for which
+ there might be patent claims in some countries.
Each medium has 4 sub-sections:
Release the packages as of the
+ day the this version of Mageia was released.
Updates the packages updated
+ since release due to security or bug concerns. Everyone should have
+ this medium enabled, even with a very slow internet connection.
Backports some packages of new
+ versions backported from Cauldron (the next version under
+ development).
Testing which is used for
+ temporary tests of new updates, to allow the bug reporters and the QA
+ team to validate the corrections.
The buttons on the
+ right
Remove:
To remove a medium, click on it and then on this button. It is wise
+ to remove the medium used for the installation (CD or DVD for example)
+ since all the packages it contains are in the official Core release
+ medium.
Edit:
Allows you to modify the selected medium settings, (URL, downloader
+ and proxy).
Add:
Add the official repositories available on the Internet. These
+ repositories contain only safe and well tested software. Clicking on the
+ "Add" button adds the mirrorlist to your configuration, it is designed to
+ make sure that you install and update from a mirror close to you. If you
+ prefer to choose a specific mirror, then add it by choosing "Add a
+ specific media mirror" from the drop-down "File" menu.
Up and down arrows:
Change the list order. When Drakrpm looks for a package, it reads
+ the list in the displayed order and will install the first package found
+ for the same release number - in the event of a version mismatch, the
+ latest release will be installed. So if possible, put the fastest
+ repositories at the top.
The menu
File -> Update:
A window pops up with the media list. Select the ones you want to
+ update and click on the Update button.
File -> Add a specific media mirror:
Suppose you aren't happy with the actual mirror, because for example
+ it's too slow or often unavailable, you can choose another mirror. Select
+ all the actual media and click on Remove to take
+ them out. Click on File -> Add a specific media
+ mirror, choose between update only or the full set (if you do
+ not know, choose the Full set of sources) and
+ accept the contact by clicking on Yes. This window
+ opens:
You can see, on the left, a list of countries, choose yours or one
+ very close by clicking on the > symbol, this will display all the
+ available mirrors in that country. Select one and click on
+ OK.
File -> Add a custom medium:
It is possible to install a new media (from a third party for
+ example) that isn't supported by Mageia. A new window appears:
Select the medium type, find a smart name that well define
+ the medium and give the URL (or the path, according to the medium
+ type)
Options -> Global options:
This item allows you to choose when to "Verify RPMs to be installed"
+ (always or never), the download program (curl, wget or aria2) and to
+ define the download policy for information about the packages (on demand
+ -by default-, update only, always or never).
Options -> Manage keys:
To guarantee a high level of security, digital keys are used to
+ authenticate the media. It is possible for each medium to allow or
+ disallow a key. In the window that appear, select a medium and then click
+ on Add to allow a new key or to select a key and
+ click on Remove to disallow that key.
Warning
Do this with care, as with all security-related questions
Options -> Proxy:
If you need to use a proxy server for internet access, you can
+ configure it here. You only need to give the Proxy
+ hostname and if necessary a Username and
+ Password.