CTS 2106
LINUX INSTALLATION AND USE
by Randy Gibson
Underlined items below link to other web pages when selected. To return to this page, tap your Backspace key. All links will open a new browser
window. Switch between this one and it using the Alt+Tab keys. Close the new window when done viewing it by clicking on the
upper right-hand corner.
button in the
The Linux operating system can be installed on many different types of computer system with many different
configurations. Some of these machines are typical Intel-based PC's with: abundant memory, CD or DVD
players/recorders, large hard disks, USB ports, and standard size and resolution monitors. However others can be
very small specialized devices without the standard peripherals normally associated with desktop PC's. The
developers who produce Linux distributions have developed a variety of ingenious methods for installing their
software on this wide variety of hardware configurations, ranging from standard disc-based installations to USB or
network-based ones. In response to user concerns about giving up or risking their existing operating software, these
developers have also devised solutions that allow Linux to be run on a computer without being permanently
installed on a hard disk partition (as are most operating systems). These approaches allow users to try Linux on
their computers with minimal risk to their existing operating systems, applications and data.
This document describes some of the many methods available to use Linux, starting with the most traditional one.
After describing these, it will explain the basic issues involved in accessing Linux for the first time and then
provide some specific instructions related to a few of the access options listed below.
COMMON ISSUES RELATED TO INSTALLATION OR USE OF LINUX
A. Do you want to just try-out or use Linux? Or do you want to install it on your computer's hard disk?
Traditional personal computer systems have their operating system (OS) stored on fixed storage media such
as a hard disk and a copy of that OS (or part of it) is loaded into the main memory each time the computer
is switched on. Some computers (known as "thin clients") have no hard disk. Their operating systems are
loaded from remotely located file servers across a network by a small firmware program that runs at
startup. Some computers have more than one OS installed, allowing the user to select which one should be
loaded at startup. This "dual boot" functionality is provided by a specialized boot loader program that runs
at power-up or reboot. On fast computers with extensive main memory, it is possible for your current OS to
"host" a different ("guest") OS inside of a window as it does any other application. This allows users to test
run an OS without installing it permanently on a fixed disk partition. Two popular free programs for doing
this are VirtualBox and VMWare Player. In recent years, computers have been manufactured to allow the
OS to be loaded from removable storage devices such as CD's, DVD's, or USB memory sticks. An OS
which has been prepared to do this on a disc or USB device is called a "live version" of the OS. This allows
people to use an OS on a computer that is not installed on the hard disk. This ability is particularly helpful
in diagnosing problems with an existing OS, or simply in allowing users to try-out an alternative OS. The
ability to run a live version is limited by a computer's BIOS (Basic Input/Output System), which is the
software run each time a computer is switched on. Users can access and configure this software directly by
pressing the proper keystroke as the computer powers up. Depending on which BIOS a computer has, the
keystroke is typically either: F1, F2, Esc, Ctrl, Del, or some combination of them. See your computer's
documentation to determine this. For more information on BIOS, read How BIOS Works from
HowStuffWorks.com. Check to see if your computer can boot (load its OS) from a device other than its
fixed disk.
B. What type of computer (processor) do you have? The physical characteristics of your hardware will limit
the type of software you acquire and the method of installation. Different versions of Linux are written to
run on a variety of different processors. So users must acquire the proper version for their hardware. For
Page 1 of 9
Rev. 2015-9-7
CTS 2106
LINUX INSTALLATION AND USE
by Randy Gibson
example, you should not get a 64-bit version of Linux if you have a smaller 32-bit processor. Check the
Minimum Hardware Requirements list on the website of the chosen distributor to be sure that it will run on
your processor. (See page 6 below for some programs that report system specifications and configuration).
C. Where do you get the software? Most (although not all) Linux distributions are free. The most common
means of acquisition today is via file transfer on the Internet, either by web-based download or using a free
File Transfer Protocol (FTP) client such as FileZilla. Alternatively, the software might be bundled
(included) as part of a textbook or manual that you purchase.
D. What form is the software in? You can often acquire the software on a disc or USB memory stick.
Normally the software that you acquire is not the operating system itself, but rather a special style of
compressed archive that contains all of the files (executables, configuration data, and documentation)
involved in the desired software and a program for unpackaging those files and installing them on a
computer. Such files are, in essence, a recording of an entire installation CD or DVD in a single file. For
the benefit of global compatibility, these files are recorded in a standard format defined by the International
Standards Organization (ISO) and are referred to as ISO files, recognizable by the ".iso" extension at the
end of their filenames. These files are typically too large to be attached to email messages, but can be
transferred between computers via web-based downloads or other Internet file transfer methods. If you
download the software, you must be sure that it transferred reliably (without corruption). After the ISO file
has been transferred to your computer, is should be scanned for viruses and verified. Most PC's have antivirus scanning software that can be used to detect any malware that might be inside the ISO file. Each
computer is different in this respect. Users should learn to use their anti-virus software as a general skill.
The verification process is one which determines that the file was properly transferred and suffered no
corruption in transit. The most common verification method involves a process performed on the file at
both ends of the transit to ensure that it arrives as an exact copy of the original. When an ISO file is stored
on a distribution server, a file verification program is used to read the original file and calculate a number
(known as a checksum), which is basically the total of the numeric codes used by the computer to store the
program. That number is published on the site near the original file. After the file is transferred, the user
runs a similar verification program to determine if the copied file produces the same number. If it does, the
downloaded copy is assumed to be identical. The only trick here is for the user to acquire the checksum that
was produced by the original file in order to compare it to the checksum produced for the downloaded file.
These numbers are normally so large that they are written in hexadecimal (base-16), meaning that they can
contain the letters A-F as well as the numerals 0-9. An example of a checksum is:
43ca0be4501b9d1a46fea25ec2cd556e. A variety of different formulas (known as encryption algorithms) can be
used to produce checksums. So the user must be sure to use the same algorithm when verifying the
downloaded file. The most common encryption algorithms in use today have names such as: SHA-1, SHA256, and MD5 (the one used for Linux Mint files). Users must be careful to determine which encryption
algorithm was used to calculate the checksum of the file on the server to be sure that they use the same one
to validate the downloaded copy of it. The name of the encryption algorithm is typically mentioned close to
the published checksum. Normally, the filename of the ISO file will identify its contents. For example, the
proper DVD ISO file to download for Linux Mint 12 with the GNOME desktop for a 64-bit processor is
named "linuxmint-12-gnome-dvd-64bit.iso".
E. How do you plan to get the new software onto your computer? If you plan to download it, then you will
need high-speed Internet access. If you hope to boot a live version of Linux from a removable storage
device, then your computer's BIOS must allow that, and you will have to prepare that device with bootable
software. If your computer has a CD player (700 MB max. capacity storage device) rather than a DVD
player (typically 4.7 GB device), then it would be pointless to download an ISO file to produce an
installation DVD. If you plan to install the software onto a fixed hard disk, then you will have to prepare a
Page 2 of 9
Rev. 2015-9-7
CTS 2106
LINUX INSTALLATION AND USE
by Randy Gibson
bootable storage device (CD, DVD, USB, etc.) with a copy of the installation program. This requires more
than simply burning the installation program onto a disc. The burning software must also have the ability to
read an ISO file and reproduce the image of the original disc that it represents on your installation disc. For
an example of doing this, read How To Make a Bootable CD On Windows.
F. Which distribution and version of Linux do you want? Part of this decision is based on personal preference.
Many of the criteria for selecting a distribution are discussed in the readings listed in Chapter C of our
course's virtual textbook. A Linux installation involves more than just the Linux kernel. It also includes a
large collection of utility programs available during installation, including the desktop environment
software (such as GNOME, KDE, MATE, etc.) which defines the look and feel of the Graphic User
Interface (GUI). Installation media is prepared with different combinations of Linux kernel and associated
utilities to provide a productive working system at the time of installation. Additional utilities can be
downloaded and installed on the system after the installation is complete, but the installation disc
determines which ones will be available during the installation.
PRELIMINARY STEPS BEFORE YOU START AN INSTALL (OR USE) OF LINUX
Linux installation is far easier today than in prior years. The widespread use of plug-and-play components by the
computer industry and the easy availability of software and documentation via the Internet has vastly simplified the
installation process. Modern installation programs are able to probe and detect most devices and the multitude of
global software developers have kept pace well with the rapid advances in hardware and produced driver software
to resolve most hardware control challenges. That said, it must be understood that Linux offers its users far more
control over their system than most other operating systems. However, that ability comes with a price of
knowledge. Users are expected to know more about the hardware of their system and what they expect of it. In the
early years of Linux, this was essential. Users needed to have extensive knowledge of the components within their
computer system. That need has relaxed considerably today, but users are still expected to know the basics about
their hardware prior to performing an installation (or even prior to use of a live version of Linux). And the more
you know about your hardware and your expectations of it, the more optimally you can configure your installation
of Linux. The Linux kernel can be configured to run in a remarkably small amount of memory – as long as the user
is willing to forego luxuries such as a GUI and unnecessary utilities. Although most modern Linux users enjoy the
convenience of downloading pre-compiled binary versions of their favorite software, they also realize that the open
source nature of Linux allows them to download the source code for almost any Linux program and then compile
that program to run optimally on their specific hardware, making it faster and more reliable.
There are few fundamental concepts that a user should understand before doing an install, including:
1. Processor type. There are many different styles of processor, each with their own machine language (a set
of binary codes that the processor interprets as instructions). Programs are written to run on a specific brand
and style of processor. Programs written for one style will seldom run on another. So multiple versions of
most programs are written depending on the target processor. For more information about processors, read
How Microprocessors Work.
2. Video resolution and color depth. There are two major factors that define the quality of the images that are
displayed on computer monitors. One is the physical abilities of its monitor. The other is the physical
limitations of the video adapter card (inside the computer system) that control the monitor. User need to be
familiar with the specifications for both. Of these specifications, the most important issues are:
a. Signal type. There are two distinctly different types of electrical signals sent from video controller
cards to monitor screens: analog or digital. User must be sure that they have the right type of
display screen to match the signal produced by the video adapter in their computer.
Page 3 of 9
Rev. 2015-9-7
CTS 2106
LINUX INSTALLATION AND USE
by Randy Gibson
b. Resolution: the measurement of how many pixels (picture elements) per inch. This measurement is
sometimes given in DPI (dots per inch), but more often given as the total number of dots that a
device can display (width first, then height), such as 800x600 or 1024x768 (for typical monitors
which use a 4:3 aspect ratio) and 1280x800 (for wide-aspect screens). The higher the number, the
more costly video memory will be needed on the video card and the slower the responsiveness of
the screen.
c. Color depth. Early computers were very limited in the quantity of different colors that they could
display. Monochrome screens could display only one color (usually green or amber). Other typical
limitations were either 16, 256, 32K, or 64K colors. Modern computers can display millions of
colors and produce photographic quality images. The "color depth" of a display device is typically
measured as the number of bits used to represent each pixel, typically: 8, 16, 24, or 32. The higher
the number, the more video memory required. 8 bit color provides a palette of 28=256 colors.
Each of these issues must be considered for both your video adapter card and your monitor screen.
For more information about video monitors, read How Computer Monitors Work.
3. Disk partitioning. Although Windows users are used to thinking of each disk as a single labeled device,
such as "A:" or "C:", it is possible to partition (verb meaning sub-divide) a single physical disk so that it
appears to your operating system as multiple devices, each with their own unique "volume label". The
separate sections of a partitioned disk are referred to as "partitions" (using the word partition as a noun).
Although the Windows OS can work with partitioned disks, it is not a frequent occurrence. However, the
Linux OS usually does expect us to partition our disks for better management (and isolation) of storage.
Many distributions isolate the programs need for booting the OS onto its own small partition. Most expect a
"swap" partition to be present to allow virtual memory management. Some distributions expect the user to
do the partitioning before the install; others perform the partitioning automatically during the install. Most
give the user the choice of defining a partitioning scheme during the installation. If you are not familiar
with disk partitioning, read Wikipedia's article on Disk Partitioning.
4. Network configuration. Linux was born on the Internet and was developed with the expectation that it
would be used within a network environment. As such, users should be familiar with the basic concepts
involved in configuring a network adapter (typically Ethernet or WiFi). Each computer on a network must
have a unique identity. The most common method used today for this uses a layered system of protocols:
a. Media Access Control (MAC) address. Each network adapter is supposed to have a unique number.
Manufacturers are assigned unique blocks of these numbers to prevent duplication. Some
disreputable manufacturers clone cards with identical numbers. Beware. The current MAC system
on the Internet uses 10 digit hexadecimal numbers such as: 01:23:45:67:89:AB to identify each
network device. If you have both an Ethernet connection and a WiFi card, each one will have its
own unique MAC address. Learn more at Wikipedia.
b. IP (Internetworking Prototcol) addresses. The current (outgoing) IP4 standard assigns each network
node (individually addressable point) a unique number such as 192.168.1.100 in a format called a
"dotted-quad" (four decimal numbers, separated by dots) representing a 32 bit binary number. Each
of the octets (numbers between the dots) can range between 0 and 255. The incoming IP6 standard
uses larger 12 part hexadecimal (base-16) numbers such as
2001:0db8:85a3:0000:0000:8a2e:0370:7334 allowing for a much-needed larger range of possible
Internet addresses. Some networks assign "static IP numbers" to each computer which must be
recorded as part of each one's configuration. Other networks use Dynamic Host Configuration
Protocol (DHCP) servers which lend an IP number to each computer when it reboots. Dormant
computers on the network have no numbers. Computers using this dynamic system ask for a
number each time they boot, so no static assignment need be configured in advance.
Page 4 of 9
Rev. 2015-9-7
CTS 2106
LINUX INSTALLATION AND USE
by Randy Gibson
A portion of each computer's IP number indicates which network it is part of; the other portion
indicates which specific "host" (computer) it is on the network. In the current IP4 standard, a
number called the "network mask" is used to indicate which portion is which. A network mask uses
binary 1's to indicate which portion of an IP address is represents the network portion. A typical
network mask looks like 11111111:11111111:11111111:00000000 indicating that the first 3 octets
identify the network and the last octet numbers the host on that network. For the ease of the user,
network masks are typically written in decimal as dotted quads, as in 255.255.255.0 or simply
added as the quantity of 1's following an IP number, as in: 192.168.1.100/24. Aside from knowing
a computer's IP number and network mask, each system must know the IP number of its Internet
gateway, which is the computer which will route data traffic to the Internet. More at Wikipedia.
c. Domain Name System (DNS). As a courtesy to humans (who are typically averse to remembering
lots of long numbers), an alternative system of identification has been developed to help organize
and identify networks and their individual computers. This DNS system assigns each network a
unique name know as its "network domain name" (such as "irsc.edu" or "google.com") and assigns
each computer a name known as its "hostname" (typically names such as "www", "mail", "info", or
any other useful alpha-numeric string). A system of special DNS servers allows network users to
identify networks and computers using only these domain names, without knowing the IP numbers
for them. DNS servers provide these necessary numbers to our computers behind the scenes. Each
computer on a network must be configured to know the IP number of at least one DNS server to
use this convenient functionality. More at Wikipedia.
d. User Identity. Aside from identifying each network and computer, each user of a host computer
must have a unique identity to authenticate them as a valid user of the machine and to allow
messages to be directed to them. For this reason, each user must be assigned at least one userid
(a.k.a. username or login name). A variety of protocols are used to define such id's. At our college,
userid's are automatically generated based on the name of the user. Professor Randy Gibson's
userid is rgibson. To prevent that id from being confused with a user on a different network who
coincidentally has the same userid, it is common to combine the userid with the domain name of a
computer or network to clarify the account holder. Professor Gibson's account on the college
network is identified as: [email protected].
Users will be expected to have considered the issues above prior to performing a Linux installation.
PRELIMINARY HARDWARE CONSIDERATIONS
The specific facts that a user should know about their system before installing (or loading) Linux are:
1.
2.
3.
4.
5.
6.
7.
8.
9.
Style (brand, size and speed) of processor and motherboard chipset.
BUS type (ISA, EISA, VESA, PCI, etc.)
Main memory capacity.
Video adapter specifications (chipset, operating modes, etc.)
Monitor display modes (resolutions and color depth).
Secondary storage device style (IDE vs. SCSI), capacity, and an existing partition mapping.
Network adapter specifications – both Ethernet and WiFi.
I/O port specification: serial, parallel, USB, Firewire.
Pointing device: mouse, trackball, etc.
Page 5 of 9
Rev. 2015-9-7
CTS 2106
LINUX INSTALLATION AND USE
by Randy Gibson
Windows administrators can investigate their current hardware and system configuration using the following
utilities. You can read about Administrative Tools in the Windows Help and Support pages of your PC. Beware that
some of these utilities can alter your system settings too.
1. System Information utility (msinfo32.exe). Start, All Programs, Accessories, Systems Tools, System information.
The reports generated can be saved, exported, or printed for future reference.
2. Device Manager (mmc devmgmt.msc). Start, Control Panel, Hardware and Sound, Device Manager (sub-menu
choice under the Devices and Printers group).
3. Microsoft Management Console (mmc compmgmt.msc). Start, in the Search programs and files text box, type
mmc compmgmt.msc and press the Enter key.
4. Disk Management utility. Start, Control Panel, System and Security, Create and format hard disk partitions (submenu choice under the Administrative tools group)
5. Network and Sharing Center. Start, Control Panel, Network and Sharing Center.
6. Linux users can view the system information discovered by the OS during its last startup with the shell
command:
dmesg | less
The command above is piped to the less pager utility to allow the use of PgDn and PgUp keys to easily scroll
through the file. To exit the pager, press the letter q. To save the output rather than just displaying it on the
screen, redirect the output to a text file as in: dmesg > dmesg.prn
ADDITIONAL PRELIMINARY STEPS BEFORE A LINUX INSTALLATION
Additional steps should be taken before an installation (or even just a live use session), such as:
1. Backup any important software currently on the target computer and be sure that you know the procedure
for restoring it in case your hard disk is erased.
2. Have a written copy of your hardware spec's available in case you need them.
3. Gather any storage media (writable CD's, DVD, USB sticks, etc.) that might be needed.
4. If possible, have another computer available with Internet access for research purposes.
5. Decide in advance how you plan to identify the computer (hostname) and your account (userid and
password). Assume that you will be setting up at least two accounts: the root (administrator) account and a
plain user account for routine use. (Use the root user account only when absolutely necessary.)
6. Set aside a minimum of one hour, more for older slower computers or dial-up Internet access.
FOLLOW-UP STEPS AFTER A LINUX INSTALLATION
Some follow-up steps should be taken soon after the installation, not the least of which should be a full backup of
the new system. Class projects will explain the most common post-install activities, such as:
1. Verify that you can login to both the root and user accounts and access the virtual terminals.
2. Test the network connectivity using the ping command or by testing your web browser.
3. Backup all important configuration files before using any GUI-based configuration utilities, as they often
overwrite the well commented configuration templates that are installed with new packages.
4. Install any important packages that were not provided on the installation media. Most distributions do not
include many of the proprietary (non open source) readers and plug-ins commonly used with web browsers,
such as Flash and Adobe Reader. Such distributions might substitute alternative open source packages
instead, but you might want the more traditional programs too.
Page 6 of 9
Rev. 2015-9-7
CTS 2106
LINUX INSTALLATION AND USE
by Randy Gibson
5. Update the command/help database using the mandb and updated commands.
6. Backup your system, either to removable storage media or to remote network devices.
TYPICAL LINUX ACCESS METHODS
A. Traditional: The most traditional method of installation for Linux involves the use of "installation software"
stored on disc-based media (CD's, DVD's, etc.) to install Linux as the sole OS on the computer. This
method is distinct from using "live" versions of Linux in that typical "installation discs" are intended only
for installing Linux on your hard drive rather than loading a copy of Linux into main memory to allow
direct usage of your computer without installing the software. Most live versions of Linux can now be used
for both purposes. But "pure installation media" is used solely for installation. If you do not already have a
disc containing the installation program, you can download it from the distributor's website. Be sure to
download the correct ISO file based on: (1) your hardware, (2) your chosen distribution and utilities, and
(3) the type of storage media used to perform the installation. Remember that the name of the ISO file will
help to identify its contents. BEWARE: This installation method presents the greatest risk to any existing
OS and data created and stored under it, as it typically involves repartitioning and overwriting the hard
disk. Great care should be taken to backing up any existing software and data already on your computer
before attempting this type of installation!
B. Dual boot: Dual boot installations are similar to traditional ones except that the Linux OS is not the only
OS installed on the computer. Both OS's are installed to different hard disk partitions along with a program
called a "boot loader" which offers the user the ability to select (usually via a briefly displayed menu)
which OS should be loaded. This approach is possible on Windows systems, although rare. However it is
often used on machines with Linux to allow users the benefits of permanent access to more than one OS.
The system allows many OS's to be installed (up to the limitations of available partitions). Users often add
an extra hard disk (fixed or removable) to keep their operating systems separate. You can mix Windows
and Linux OS's on the same computer, but it is typically easiest to install Windows first; then add Linux.
This approach allows users to choose between different installations on separate partitions at startup, but
treats each one as independent. Switching between them involves a reboot. CAUTION: This installation
method also presents great risk to any existing OS and data created and stored under it, as it also involves
repartitioning and overwriting the hard disk. Great care should be taken to backing up existing software and
data before attempting this type of installation! For information on dual booting Linux Mint 13 and
Windows 7, read How to Dual-boot Linux Mint 13 (Cinnamon & Mate) and Windows 7.
C. Windows-based Install: In order to allow users of Windows who do not want to permanently install another
OS on their hard disk, many Linux distributors offer a special "Windows-based installation" program that
installs Linux within Windows (on its existing partition) and then modifies the Windows Boot Loader
program to know about the extra OS and offer to load it separately at startup. This approach is similar to the
Dual boot approach above, but does not require any separate partitioning. Switching between OS's involves
a reboot. The big danger is that damage to the Windows installation can also damage its contained Linux
system because they are on the same partition. The advantage is that it is easy to uninstall using the
Windows Add/Remove Programs feature, recovering all space used by the added OS.
D. Live OS: One of the best advances made in recent years with Linux is the development of "Live CD",
"Live DVD", or "Live USB" versions. Advances in auto detection of secondary storage devices and
improvements to the BIOS programs used to initialize systems have made it possible to install Linux on
discs or USB devices and boot directly from them. In such cases, the hard disk does not have to be involved
– although it can be. This method of installation is widely used by both students and professionals to "test
drive" various distributions of Linux. It also is often used by computer technicians to diagnose and repair
Page 7 of 9
Rev. 2015-9-7
CTS 2106
LINUX INSTALLATION AND USE
by Randy Gibson
existing installations of many different operating systems (Windows and Mac included). Because Linux
recognizes and accepts many different styles of OS, it is able to read and write the disk storage formats
used by them, allowing Linux access to data that originated in other OS's. You can setup Linux to
automatically or manually mount a disk formatted under a different OS. One of the weaknesses of the
"live" installation method relates to its ability to preserve changes. If you are running Linux off of a ROM
(Read Only Memory) storage device, it will be unable to preserve any changes made to that live
installation. A variety of techniques are being employed to solve this "persistence" problem, ranging from
using some space of an existing hard disk to store the changes or recording the CD-ROM holding the live
version as a multi-session CD (allowing changes to be added to the disc). The persistence problem has been
vastly reduced with the introduction of USB storage devices, but they present their own challenge. Older
computers do not have the ability to boot directly from a USB device. So people who use live versions of
the OS typically create all three: Live CD's for older computers that lack a DVD drive, Live DVD's for
newer machines DVD drives, and Live USB's for newer machines that can boot from a USB device. This is
a safer approach to installation than most previously mentioned methods (although it can permit access to
existing partitions) and it offers great flexibility as long as you recognize its limitations. For more
information about this option, read the course web page entitled Mint "Live" Installation Resources.
E. Virtualization Machines: The recent expansion of PC's to include multiple processors and large main
memory capacities has permitted the use of a very flexible method of OS installation and use, known as
"virtualization". This approach starts with a traditional installation. We then install software that allows us
to emulate (mimic) the physical environment of our computer completely in memory and on disk. With it,
we can create "virtual machines" and save them on our disks and load them into memory as needed. We
can then install any OS we like onto one of these virtual machines. Each "guest OS" runs as a separate application under the "host machine" (the real, physical computer). Multiple OS's can be run simultaneously,
limited only by memory and storage capacity. Presently, this approach requires a minimum of two processors and 2GB of main memory. The two freeware packages used by most of the industry for this purpose
(VirtualBox and VMWare Player) can run on either Linux, Mac OS X, or Windows; so any OS could act as
the host. But it would be best to use the superior OS to host others, rather than the other way around. This
installation approach offers little risk to the host OS, but does require users to learn and understand the
virtualization software and has high demands on hardware.
F. Remote Login: If you have access to none of the other methods for using Linux, you can still make use of
the Internet SSH (Secure Shell) remote access protocol to log into an existing Linux installation somewhere
on the Internet. All you would need is an account and a free SSH client such as PuTTY. Clients such as this
allow you to use any Internet PC to act as a terminal to a Linux host, as most allow remote access (behind a
well-designed firewall) for their users. All you need is an account on the computer you plan to access and
its domain name. IRSC students in CTS 2106 have such accounts setup for then shortly after the start of
each semester. For information on remote login with PuTTY, read Using PuTTY to Access the IRSC
Student Linux Server.
SUMMARY
Every distributor of Linux provides detailed instructions on their websites related to installation and use of their
distributions, including its list of Minimum Hardware Requirements. If documentation seems weak, just wait a few
weeks – as it never stops evolving. Many private individuals also post guides and tutorials for the benefit of the
Linux community. Video sites such as YouTube often contain a wide assortment of such offerings as well. A search
on the phrase "Linux installation tutorial" will find many of these. For a specific distribution, also include its name.
For example, in this course, we will be using Linux Mint 17 with the MATE desktop environment as one of our
Page 8 of 9
Rev. 2015-9-7
CTS 2106
LINUX INSTALLATION AND USE
by Randy Gibson
primary distributions, at least to get started. So try a search on the phrase "Linux Mint 17 MATE installation
tutorial". You will probably notice recent dates on the results. Some will be useful; others not. Remember that
anyone can post to the Internet. So be thoughtful about what you read and who wrote it.
The approach that you select for accessing Linux will depend on how mobile your needs are. The wide availability
of portable "Live" versions of Linux relieves the college from the need to permanently install Linux in our
classrooms and labs. So students who attend a face-to-face section of this course will probably find that a Live USB
version of Linux offers them the most speed, flexibility and ease of use. Online students might have a permanent
installation, or they might prefer a more transient one that allows them to work from many different locations.
Ultimately, you should try all of the methods discussed above, simply to become familiar with your options. But
initially, you might prefer to pick one and use it for a while until you are more comfortable with the basic concepts
related to installation and use. For a detailed summary of the different options for accessing Linux in this course,
read the web page entitled "Linux Software - Options for Access and Use".
Page 9 of 9
Rev. 2015-9-7
© Copyright 2026 Paperzz