Linux - NewbieThis Linux forum is for members that are new to Linux.
Just starting out and have a question?
If it is not in the man pages or the how-to's this is the place!
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
I'd suggest going to an internet connected PC (at school/college (if you're there) or your local library or to an internet cafe or to a friend's house) and download them to a USB key or CD and then install them to your own PC with
But I did look at its man page. I was looking for an option where, instead of trying to download packages, it would simply tell you where they would be pulled from (similar to the --print-uris option for apt-get). While I found no such option, I did see an option (-d) for setting the debug level. So ... This is pure guessing, but I wonder what would happen if, specifying a debug level of 10 (-d 10), you told yum to install madwifi-0.9.4-41.fc8.i386.rpm. Of course, w/o an Internet connection this will fail. What I am hoping is that the debug messages you get will tell you where you can download the package (edit: what I meant was where yum was going to try to pull the packages from.) and all of the dependencies. No guarantees, but I would think it would be worth a shot.
(I don't know where the debug messages would end up. My first guesses are either at the console you type the yum command or in /var/log/messages.)
Last edited by blackhole54; 04-19-2008 at 04:27 AM.
Looking at the man page I don't think you want to type in the full file name. The section of the man page called Specifying package names (toward the bottom) shows acceptable formats. I suggest starting with what XavierP showed in post #18.
With an Internet connection, hopefully you will get all the packages and no errors!
ok, turns out i already have a driver for this, so the problem is connecting to a network that is encrypted via WPA 128 bit, i type in the correct password, then it asks for it again, or it asks for the keyring code, i think this is a glitch, because it wont let me connect to it, but it connects to a un-protected internet connection just fine, so im not sure of the problem
For completeness and clarity I'll point out that my experience with this is on Ubuntu 6.10 using Gnome 2.16.1. But it probably works the same on your system.
There are two separate issues here: 1) Connecting to a protected access point, and 2) the Gnome keyring.
You should be able to connect to the access point w/o worrying about the keyring. In fact, TMK, you won't even be asked for the Gnome keyring's password until you have successfully connected to the access point. If you were asked, it makes me think you had in fact connected. (When I connect, I see a tooltip pop up saying I have connected and the nm-applet icon changes from a picture of a terminal to a series of different height bars, showing signal quality.) If you're sure you haven't connected and that you have entered the correct key (and are using the right access point!), then I suggest you look in your system logs (probably /var/log/messages) for clues about what went wrong.
When you have successfully connected to a protected access point, the network manager will want to add the access point's key to your Gnome keyring and you will be prompted for a password. If you have not yet created a keyring (with password), you can select any password you want. I suggest you use the same password you use to login. If you do that, then later you can add PAM_KEYRING to your system (either from a repository, or compiling, if necessary) which will automatically unlock your keyring when you do a graphical login. Otherwise, after loging in, the network manager will prompt you for your Gnome keyring password (if you have added the key to the keyring) so it can connect to the AP. W/o the key added to the keyring, network manager will prompt you for the WPA (I hope your mother is not using WEP!) passphrase each time you try to connect.
Last edited by blackhole54; 04-25-2008 at 02:51 AM.
Reason: protectected! ;)
You should still be able to connect with WEP (although I haven'ttried it). But you might want to suggest to your mother that she change to WPA (if her hardware supports it). To find out why, read on ...
WEP's "security" is fundamentallyflawed. With a little bit of reading on the Internet and the right hardware (nothing exotic!) somebody with your level of knowledge would be able to "crack" the key and access the network w/o the owner's permission. (Be aware that it is highly illegal!) So anybody that cares about security will avoid WEP.
WPA and WPA2 are (as far as I've read) fundamentally secure. Be aware that they are still subject to dictionary attacks. This article will help you understand the implications of this and how to go about selecting a good passphrase. (Unless your mother is technically oriented, she probably isn't interested in reading the article. But you could read it and help her select a good passphrase.) Basically you want a passphrase that is long and complicated with little twists and turns thrown in. A long series of random characters is even better.
Let me reiterate that unless you have the permission of the owner, it is illegal to crack other people's passphrases. I advise against it. But understanding the issues is important for securing a system or network.
And, while important for security, none of this should prevent you from connecting to WEP.
EDIT: Let me add that I applaud your mother for not leaving the wireless router in its default state. Many people do, which is very bad.
Last edited by blackhole54; 04-26-2008 at 02:18 AM.
well. when i type in the passphrase to get online via WEP, it tries to establish a connection, then it asks me for the code again, but this time there are already things typed in the passphrase box, and they aren't the codes for the passphrase, it just has random hex typed in it.