./Configure "Permision Denied" error when atempting to use ./configure command in RH8
Linux - SoftwareThis forum is for Software issues.
Having a problem installing a new program? Want to know which application is best for the job? Post your question in this forum.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
./Configure "Permision Denied" error when atempting to use ./configure command in RH8
Hi All,
I am trying to install various software on Red Hat 8.0. When I try to use the ./configure commmand I get "Permission Denied" error. What would cause that and how can I fix it? Thanks
Which directory are you trying this in. You might not have execution rights in that partition. You should only need to perform the "make install" phase as root. So the best place to do this is in your HOME directory some place. Create a directory in HOME dedicated to downloading, extracting and compiling the tarballs you want to install.
But I am Root on Red Hat 8.0 It should matter doesn't root have ALL Power? I am trying to install a Python module, PHP5, and a web front end for my mail server.
I am trying to install various software on Red Hat 8.0.
Red Hat 8.0 is very, very, very old. What is your hardware? After that Red Hat 9.0, then Fedora Core 1, 2, 3, 4 and now 5 has been released. Please upgrade. Its good to keep your system uptodate.
Recent distros have good package management system for software installation/upgradation.
Your are right, unless something is being called inside the ./configure that is setup to require the su permissions and path (which I have ran into before).
Now I get the error: no acceptable cc found in $PATH
I use Putty to access my servers via SSH. So no su - is require "I think". Anyways the above mentioned error is what I get now how in the world do you add somehting to the path in linux? I know how to do this in DOS, and Windows but now Linux. Thanks
I use Putty to access my servers via SSH. So no su - is require "I think". Anyways the above mentioned error is what I get now how in the world do you add somehting to the path in linux? I know how to do this in DOS, and Windows but now Linux. Thanks
Thats why. When you do things remotely(sp?) you have to have a bunch of things set just right( at least going from xintd and vnc). You might get better results with a new thread like' su over putt/SSH'.
Red Hat 8.0 is very, very, very old. What is your hardware? After that Red Hat 9.0, then Fedora Core 1, 2, 3, 4 and now 5 has been released. Please upgrade. Its good to keep your system uptodate.
You can't judge that (although for normal home use you're right). There might be very good reasons to stick to RH8.
I'm still running RH6.2 somewhere without any patches or whatsoever. It's working and it will take me months of testing on a newer distro to make sure that the dedicated HW/SW works correctly.
Quote:
Originally Posted by canegames
I use Putty to access my servers via SSH.
Login as a normal user and su to root from there.
Question: using SSH implies security, so why can root login remotely? Unless you use key authentication, it's still prone to brute force attacks (imho).
Last edited by Wim Sturkenboom; 06-29-2006 at 01:27 AM.
Reason: added question
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.