The Linux Boot Sequence

Size: px
Start display at page:

Download "The Linux Boot Sequence"

Transcription

1 The A good understanding of the Linux boot sequence will be useful as the course progresses. First, the actions which start network communication occur during the boot sequence. You ll want to know how this happens so that you can control it. The same shell scripts which start networking during the system boot sequence can be used manually to stop and start network communication. This is useful when you re experimenting with the network configuration. Second, many of the activities that you ll be doing over the course of the semester require you to modify system files. It s entirely likely that at some point you ll find yourself sitting in front of a workstation that no longer works properly but will still respond to commands from the terminal. A good understanding of the Linux boot sequence may allow you to avoid rebooting the workstation. Instead, you can invoke the necessary startup actions manually. This may not seem important in the Network Lab, but it can be critically important when rebooting a production system is just not an option. The concepts used in the Linux boot sequence are common to other operating systems, but the details will certainly differ. The material in this lecture is drawn from the Linux System Administrator s Guide and various other pieces of documentation, from the boot scripts themselves, and from the source code of some of the programs involved. A lot of useful documentation for Linux is available online from the Linux Documentation Project ( Regrettably, some of it is getting to be a bit old and out-of-date. The System Administrator s Guide contains useful introductory material on Linux and pointers to other introductory material. If you re new to Linux, this is mandatory reading. The locate and find commands are helpful when you re looking for a particular file but don t remember the exact name or location. The man and info commands will give you access to much of the online documentation. Try man man and info info. Many Linux software packages include documentation as part of their distribution package. Most often this will end up in /usr/share/program or /usr/share/doc. 1 January, 2014

2 Back to the boot process. Let s begin at the beginning. When a PC (or clone) powers up, the hardware transfers control to a program called the BIOS, which resides in ROM. The BIOS is not too bright, but it knows enough to do two important tasks. The first is what s called power on self test (POST), a combined sanity check and initialisation of the computer s hardware. The BIOS scans the components in the system, executing any initialisation actions that are required. In today s systems, complex components will provide their own initialisation routines, and the BIOS will arrange to execute them. The second is to scan the set of potential boot devices looking for one that contains a program called a boot loader. The boot loader is a slightly more intelligent program whose job is to load the operating system into memory and start it running. Typically the set of potential boot devices will include a selection of removable media devices (e.g., a CD and/or DVD drive, or a device connected to a USB port) and one or more internal disk drives. The device must look like a disk drive with a bootable file system i.e., it must contain a Master Boot Record (MBR) in the first sector of the storage media. The first valid device is used. This description captures the spirit of system startup, but falls a fair bit short of the reality of what a modern BIOS can do. It completely ignores UEFI (Unified Extensible Firmware Interface), the up-and-coming replacement for the BIOS. For Linux, the most common bootloader is GRUB2 (Grand Unified Bootloader). Your best source of information about GRUB2 is the documentation that accompanies the software distribution. GRUB2 is too big to fit in a single sector of a disk. A small piece is placed in the boot sector. Its purpose is to find and load the remaining, larger pieces, which complete the boot by finding and loading the operating system. If your computer is set up to boot multiple operating systems (Linux and Windows, for example), GRUB2 will prompt you to choose the operating system you want to start. Once loaded into memory and started by the bootloader, the Linux kernel begins its startup sequence: It scans the hardware configuration, initialises device drivers, and takes the CPU into protected mode with virtual memory. 2 January, 2014

3 It mounts the root file system (read only). Once these preparations are completed, the kernel starts a user process which is responsible for starting everything else. For most of the history of unix systems, this user process was called init. The init program has process id 1, the root of the process tree. All processes running on the computer are descended from init. init remains in existence until the computer is halted and has overall responsibility for the state of the system. For many years, there was one framework for startup, now referred to as SysV (Unix System V), developed in the early 1980 s. A set of run levels was used to organise shell scripts that were executed to control system services. Recently, alternative frameworks have appeared that address perceived limitations of the SysV framework. Ubuntu distributions use an event-based framework called Upstart. Fedora distributions use a dependency-based framework called Systemd. Both provide legacy support for the SysV framework. This is a good point to explain the concept of a run level. As originally used in the SysV framework, a run level is an integer between 0 and 6 which specifies the overall system state (usually called a mode). Here s the conventional set of run levels for a Linux system: 0: Halt the system; setting the run level to 0 will cause Linux to do an orderly shutdown and halt the computer. 1: Single-user mode; in this state only the kernel and a bare minimum of essential system services are running. 2 5: Multi-user mode; in this state the system is capable of supporting multiple users. 6: Reboot; the system is halted and then automatically starts to boot. Commonly, run levels 2 4 provide a command line interface and run level 5 provides a GUI for login and a window-oriented work environment. Single-user mode (also called rescue mode) is important for system administrators. This state is used for system maintenance, upgrade, and repair which cannot be performed in multi-user mode. Often this is because the system state would not be consistent, and thus would be unsafe, while the work is in progress. Another advantage is that excluding other users avoids unnecessary system activity. 3 January, 2014

4 Run levels are just conventions; while all unix systems follow the same general startup sequence, the specific mapping of run levels to system modes can vary from one to the next. SysV Framework It s useful to know about the SysV framework for two reasons: first, because you may encounter older systems that use it; and second, to understand the compatibility features of the Upstart and Systemd frameworks. In the SysV framework, init looks for the file /etc/inittab for instructions on how to proceed. Lines in inittab have the form id : runlevel(s) : action : command The id is just a convenient identifier, with no particular meaning to init. The command is a command to be executed, either a program or a shell script. runlevel and action control when and how command is executed. The first thing that init looks for in inittab is a line with the keyword sysinit in the action field. This is the command that should be executed to continue system startup. An incomplete list of functions performed at this point includes: set system configuration variables for use as the boot sequence progresses; continue device initialisations: usb, clock, keyboard, network, and disk handling optimisations; enable paging to disk; check the root file system and remount it read/write; check and mount other local file systems; enable logical volume management; clean up system status files; Limited network connectivity may be enabled at this stage to allow some system initialisation over a network. When the command specified for sysinit finishes, control returns to init, which then looks for another line in inittab with the keyword initdefault in 4 January, 2014

5 the action field. This entry has no associated command; its purpose is to specify the default run level which should be entered to complete the boot process. This run level is used to construct the name of a directory, typically of the form rcn.d, where N is replaced by the run level. In the directories rcn.d are symbolic links with names of the form [S K]ddcommand. If you use ls -l to list one of the rcn.d directories, you ll see that the links point to scripts in another directory, typically init.d. Each script controls some system service or activity. The initial S or K specifies whether the script is used to start (S) or kill (K) the service or activity. When entering a run level, the kill scripts are executed first, followed by the start scripts. The two digits dd specify a number between 00 and 99. This number determines the order of execution within the start and kill groups. The command portion of the file name is most often simply the name of the script. Typically, each script can be called with one of four parameters: start, stop, status, and restart; some have additional parameters. For the purposes of Cmpt 471, notice that bringing up network interfaces is one of the key actions in the boot sequence. Typically there is a script in the init.d directory, often called network, which can be invoked from the command line to stop and start network activity. Once init knows the default run level, it looks for all lines in inittab which specify that run level in the runlevel field and executes the command specified in the action field for each line. What other functions are controlled by the scripts in /etc/init.d? An incomplete list includes Internet services (DNS, SNMP, SSH, plus the meta-dæmon xinetd), and a firewall. Remote file sharing using Samba or NFS. Display management (responsible for putting up the GUI login screen). The cron dæmon, which can run a job at a specified time (handy for scheduling backups, accounting, etc.). Printing and logging services. 5 January, 2014

6 The Network Information Service (NIS), formerly known as the yellow pages (YP). This is a set of databases maintained by a central server which can be queried over the network. Remote procedure call and remote execution dæmons. Upstart Framework The SysV framework is giving way to newer boot frameworks that address some of the perceived deficiencies in the SysV framework: lack of parallelism; duplication of effort when creating the shell scripts that control startup and shutdown of services; and an inability to react to dynamic changes in the system configuration (e.g., failures, plug-and-play devices). The older of the new frameworks is Upstart 1. Upstart is used in the Ubuntu systems which make up the Virtual Network Lab (VNL), and in the physical workstations in the CSIL. The operation of upstart is based on the concept of events. Actions are triggered by the occurrence of events. Any program can communicate an event to the upstart dæmon, which will then relay the event to interested jobs. At startup, upstart processes a set of jobs defined by configuration files held in /etc/init (previously, /etc/event.d). A job can request that the upstart dæmon notify it when a particular event or combination of events occurs. To get things rolling, when the upstart dæmon is started as as process 1, it produces a startup event and sends it to all interested jobs. Each configuration file specifies a single executable file or a sequence of shell commands to be executed when triggered by an event. The content of the configuration files is organised in units called stanzas. Commands can be either services or tasks. Services are expected to execute indefinitely and are respawned (restarted) if they exit. Tasks are expected to execute once and exit. 1 For compatibility (and confusion) with the SysV framework, the upstart dæmon binary is also named init. 6 January, 2014

7 The start on stanza defines the events that will cause the associated command to be executed. The stop on stanza defines the events that will cause the associated service to be stopped. Application programs can communicate events to the upstart dæmon using the D-Bus message bus. The initctl application can be used to generate events from the command line and shell scripts. For a complete description of the Upstart framework, see the Upstart Intro, Cookbook, and Best Practices at upstart.ubuntu.com/cookbook. Systemd Framework The Systemd framework is a dependency-based framework. It is based on the philosophy that the vast majority of dependencies between the programs invoked during system startup can be captured in data dependency relationships: communication via well-known sockets and D-Bus names; file system mounts; and other device dependencies (e.g., availability of a network interface or presence of a USB device). Superficially, this sounds a lot like the Upstart framework, but by exploiting buffering capabilities built into the Linux kernel, much greater parallelism can be acheived. To give a concrete example, suppose that service A sends information to service B via a well-known socket. In the SysV or Upstart frameworks, this would require that service B finish its initialisation and be ready to accept data via the socket before service A could begin to start. The Systemd framework provides the ability to create the well-known socket for service B separate from starting the dæmon for service B. Creating a socket typically takes much less time than actually starting a service. Systemd 2 will create the well-known socket for service B, then start service A and service B in parallel. If service A tries to send information to service B before service B is ready to accept it, the data is buffered using the normal data buffers supplied by the kernel for any socket and service A can continue with its own startup actions. When systemd starts service B, it passes the file descriptor for the well-known socket to service B. Once service B is ready to accept data, it begins to read from the socket and the buffered data is processed. No information is lost, and service A was not delayed unnecessarily. Where the Upstart framework uses jobs, the Systemd framework uses units. Unit configuration files are organised in sections using a syntax which has its 2 The developers of the Systemd framework were more sensible than the developers of the Upstart framework and named the dæmon systemd. On a system using the Systemd framework, process 1 will be systemd. 7 January, 2014

8 roots in Microsoft.ini files. As with the Upstart framework, a unit can specify a service or a task. In addition, the Systemd framework defines units that represent sockets, devices, filesystem mount points, and individual files. Another type of unit, a target, is used to represent a named synchronisation point in the startup sequence. To take maximum advantage of parallelism and implicit data dependencies, a service will have a unit configuration file that specifies how to start the service, and a companion unit configuration file specifying the well-known socket or D-Bus name that will be used to communicate with the service. When systemd starts, it looks in /usr/lib/systemd and /etc/systemd for unit configuration files. A unit configuration file can specify explicit dependencies and precedences. Note that dependency and precedence are distinct notions in the Systemd framework. Using the example above, Service A has a dependency ( requires ) service B, but (as outlined above) systemd may still start both services in parallel. If it s necessary that service B be completely functional before any attempt is made to start service A, this must also be specified explicitly (a before precedence). To get things rolling, systemd will attempt to start the unit specified as the default target (either /usr/lib/systemd/system/default.target or a unit specified on the command line when systemd is started). The default target will have dependencies, and those dependencies will themselves have dependencies. Systemd will recursively analyse the dependency tree and construct a transaction that will start the specified services and tasks with as much parallelism as is permitted by the explicit precedence Notifications of state changes for units come from the Linux kernel and from systemd s own monitoring of processes that it starts. The systemctl program is used to control systemd from the command line. For an excellent description of the underlying principles of the Systemd framework, see 0pointer.de/blog/projects/systemd.html. The online documentation is the right place to look for details about Systemd unit configuration files and capabilities. As of 2014, it appears that the Upstart framework is giving way to the Systemd framework. There are other variations on the system startup process. Oracle Solaris, for example, uses a framework called the Service Management Facility (SMF) which 8 January, 2014

9 offers similar capabilities to the Systemd framework (albeit with completely different terminology). Beyond Init Modern Linux systems typically provide a graphical login screen that s displayed on the physical console and a number of virtual consoles that provide independent command-line logins. The exact method of creating the graphical login and virtual consoles differs in each of the startup frameworks described above; here, the notes will concentrate on function. Why is it useful to have virtual consoles that provide a command-line login, distinct from the graphical login displayed on the physical console? Most often, these consoles are used to gain access to the system when the graphical login misbehaves, and to modify configuration files that are written at the end of a login session that uses the graphical login (and therefore cannot be modified successfully from a graphical login session). Some distributions are configured to echo the details of system startup to one of the virtual consoles in addition to recording the information in the system log /var/log/messages. Each console provides an entirely independent login session, just as if the computer provided seven separate displays. In particular, logging off on one console does not automatically log you off from other consoles. To change from one console to another, use the key combination alt-fn, replacing n with 1 7. It may be a little harder to escape from the graphical login console; try ctl-alt-fn if alt-fn doesn t work. A command-line login provides you with a single command shell. Once you ve authenticated yourself to the system, a command shell is started for you. There are many different command shells available; the one that is started for you is specified in your entry in the /etc/passwd file. This first shell is called the login shell. Table 1 lists some of the most common unix command shells. Sh and its descendants ksh and bash share a common syntactic structure. The primitive operations provided by these shells to break up text strings tend to be character oriented. They offer excellent control of i/o redirection. Bash is the most common command shell in use today and is the default shell in the VNL and CSIL. Sh is the lowest common denominator. When writing shell scripts where portability to many varieties of unix is an important goal, restricting yourself to sh capabilities is an effective strategy. 9 January, 2014

10 Shell Login File Init File Comments sh.profile n/a The original shell, and the lowest common denominator. Still important because many system-level shell scripts are written using sh capabilities. ksh.profile.kshrc (Korn shell) Enhanced version of sh. bash.profile.bashrc Bourne again shell. Greatly enhanced version of sh. csh.login.cshrc C shell. Comparable in power to sh, but with a more friendly syntax. tcsh.login.tcshrc Tenex C shell. Greatly enhanced version of csh. Table 1: Common Unix Command Shells Csh and its descendant tcsh also share a common syntactic structure, different from sh and descendants. The name of the C shell comes from a faint resemblance to the syntax of the C programming language. The primitive operations provided by these shells to break up text strings tend to be word oriented. Control of i/o redirection is somewhat clumsy. Once a shell is started, it will search for an initialisation file ( Init File in the table). The name 3 varies from shell to shell. Typically, a system-wide initialisation file, found in /etc or a subdirectory, will be executed first. The shell will then look for an initialisation file in your home directory. The shell initialisation file is executed every time you start a new command shell (which you ll do often in unix). The login shell executes another initialisation file, listed in the Login File column of the table. Again, it will look for a file in /etc and in your home directory. The exact execution order for the Login File and Init File differs from one shell to the next; consult the online documentation. When the login shell finishes executing its initialisation files, it will present you with a prompt and you can get down to work. The console that provides the graphical login screen runs a different greeter program than that run by the command-line virtual consoles. The graphical login is presented courtesy of an X Window System display manager program. As you might suspect, the unix world provides several to choose from. The login screen will look generally familiar from one system to the next there are places to 3 Notice the leading. in these file names; they are hidden files, to cut down on the clutter in your home directory. Unix has lots of these. 10 January, 2014

11 type your id and password, and (usually) some option menus. To explain any further about what s going on here, we need to take a step back and talk about the X Window System. 11 January, 2014

Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)

Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002) Cisco Networking Academy Program Curriculum Scope & Sequence Fundamentals of UNIX version 2.0 (July, 2002) Course Description: Fundamentals of UNIX teaches you how to use the UNIX operating system and

More information

LSN 10 Linux Overview

LSN 10 Linux Overview LSN 10 Linux Overview ECT362 Operating Systems Department of Engineering Technology LSN 10 Linux Overview Linux Contemporary open source implementation of UNIX available for free on the Internet Introduced

More information

New Lab Intro to KDE Terminal Konsole

New Lab Intro to KDE Terminal Konsole New Lab Intro to KDE Terminal Konsole After completing this lab activity the student will be able to; Access the KDE Terminal Konsole and enter basic commands. Enter commands using a typical command line

More information

RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux..

RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux.. RH131 Red Hat Linux System Administration Course Summary For users of Linux (or UNIX) who want to start building skills in systems administration on Red Hat Linux, to a level where they can attach and

More information

Acronis Backup & Recovery 10 Server for Windows. Installation Guide

Acronis Backup & Recovery 10 Server for Windows. Installation Guide Acronis Backup & Recovery 10 Server for Windows Installation Guide Table of Contents 1. Installation of Acronis Backup & Recovery 10... 3 1.1. Acronis Backup & Recovery 10 components... 3 1.1.1. Agent

More information

RedHat (RHEL) System Administration Course Summary

RedHat (RHEL) System Administration Course Summary Contact Us: (616) 875-4060 RedHat (RHEL) System Administration Course Summary Length: 5 Days Prerequisite: RedHat fundamentals course Recommendation Statement: Students should have some experience with

More information

Setup Cisco Call Manager on VMware

Setup Cisco Call Manager on VMware created by: Rainer Bemsel Version 1.0 Dated: July/09/2011 The purpose of this document is to provide the necessary steps to setup a Cisco Call Manager to run on VMware. I ve been researching for a while

More information

DataTraveler Vault - Privacy User Manual

DataTraveler Vault - Privacy User Manual DataTraveler Vault - Privacy User Manual Document No. 48000012-001.A02 DataTraveler Vault - Privacy Page 1 of 29 Table of Contents About This Manual... 3 System Requirements... 3 Recommendations... 4 Setup

More information

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX Course Description: This is an introductory course designed for users of UNIX. It is taught

More information

Using Secure4Audit in an IRIX 6.5 Environment

Using Secure4Audit in an IRIX 6.5 Environment Using Secure4Audit in an IRIX 6.5 Environment Overview... 3 Icons... 3 Installation Reminders... 4 A Very Brief Overview of IRIX System auditing... 5 Installing System Auditing... 5 The System Audit Directories...

More information

Linux System Administration on Red Hat

Linux System Administration on Red Hat Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with Linux or Unix systems as a user (i.e., they know file manipulation,

More information

Objectives. Chapter 2: Operating-System Structures. Operating System Services (Cont.) Operating System Services. Operating System Services (Cont.

Objectives. Chapter 2: Operating-System Structures. Operating System Services (Cont.) Operating System Services. Operating System Services (Cont. Objectives To describe the services an operating system provides to users, processes, and other systems To discuss the various ways of structuring an operating system Chapter 2: Operating-System Structures

More information

IBM WebSphere Application Server Version 7.0

IBM WebSphere Application Server Version 7.0 IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the

More information

Shellshock Security Patch for X86

Shellshock Security Patch for X86 Shellshock Security Patch for X86 Guide for Using the FFPS Update Manager October 2014 Version 1.0. Page 1 Page 2 This page is intentionally blank Table of Contents 1.0 OVERVIEW - SHELLSHOCK/BASH SHELL

More information

LOCKSS on LINUX. Installation Manual and the OpenBSD Transition 02/17/2011

LOCKSS on LINUX. Installation Manual and the OpenBSD Transition 02/17/2011 LOCKSS on LINUX Installation Manual and the OpenBSD Transition 02/17/2011 1 Table of Contents Overview... 3 LOCKSS Hardware... 5 Installation Checklist... 7 BIOS Settings... 10 Installation... 11 Firewall

More information

Lab - Dual Boot - Vista & Windows XP

Lab - Dual Boot - Vista & Windows XP Lab - Dual Boot - Vista & Windows XP Brought to you by RMRoberts.com After completing this lab activity, you will be able to: Install and configure a dual boot Windows XP and Vista operating systems. Explain

More information

Red Hat Linux 7.2 Installation Guide

Red Hat Linux 7.2 Installation Guide Red Hat Linux 7.2 Installation Guide Ryan Spangler spanglerrp22@uww.edu http://ceut.uww.edu April 2002 Department of Business Education/ Computer and Network Administration Copyright Ryan Spangler 2002

More information

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 2 Introducing Operating Systems

A+ Guide to Managing and Maintaining Your PC, 7e. Chapter 2 Introducing Operating Systems A+ Guide to Managing and Maintaining Your PC, 7e Chapter 2 Introducing Operating Systems Objectives Learn about the various operating systems and the differences between them Learn about the components

More information

Chapter 3: Operating-System Structures. System Components Operating System Services System Calls System Programs System Structure Virtual Machines

Chapter 3: Operating-System Structures. System Components Operating System Services System Calls System Programs System Structure Virtual Machines Chapter 3: Operating-System Structures System Components Operating System Services System Calls System Programs System Structure Virtual Machines Operating System Concepts 3.1 Common System Components

More information

STUDY GUIDE CHAPTER 4

STUDY GUIDE CHAPTER 4 STUDY GUIDE CHAPTER 4 True/False Indicate whether the statement is true or false. 1. A(n) desktop operating system is designed for a desktop or notebook personal computer. 2. A(n) mirrored user interface

More information

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows : Managing, Maintaining, and Troubleshooting, 5e Chapter 3 Installing Windows Objectives How to plan a Windows installation How to install Windows Vista How to install Windows XP How to install Windows

More information

Command Line Interface User Guide for Intel Server Management Software

Command Line Interface User Guide for Intel Server Management Software Command Line Interface User Guide for Intel Server Management Software Legal Information Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel

More information

Acronis Backup & Recovery 10 Server for Windows. Installation Guide

Acronis Backup & Recovery 10 Server for Windows. Installation Guide Acronis Backup & Recovery 10 Server for Windows Installation Guide Table of Contents 1. Installation of Acronis Backup & Recovery 10... 3 1.1. Acronis Backup & Recovery 10 components... 3 1.1.1. Agent

More information

Understanding the Boot Process and Command Line Chapter #3

Understanding the Boot Process and Command Line Chapter #3 Understanding the Boot Process and Command Line Chapter #3 Amy Hissom Key Terms 1. Active Partition the primary partition on the hard drive that boots the OS. Windows NT/2000/XP calls the active partition

More information

HP-UX Essentials and Shell Programming Course Summary

HP-UX Essentials and Shell Programming Course Summary Contact Us: (616) 875-4060 HP-UX Essentials and Shell Programming Course Summary Length: 5 Days Prerequisite: Basic computer skills Recommendation Statement: Student should be able to use a computer monitor,

More information

CS10110 Introduction to personal computer equipment

CS10110 Introduction to personal computer equipment CS10110 Introduction to personal computer equipment PRACTICAL 4 : Process, Task and Application Management In this practical you will: Use Unix shell commands to find out about the processes the operating

More information

LOCKSS on LINUX. CentOS6 Installation Manual 08/22/2013

LOCKSS on LINUX. CentOS6 Installation Manual 08/22/2013 LOCKSS on LINUX CentOS6 Installation Manual 08/22/2013 1 Table of Contents Overview... 3 LOCKSS Hardware... 5 Installation Checklist... 6 BIOS Settings... 9 Installation... 10 Firewall Configuration...

More information

Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive

Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive Reboot the ExtraHop System and Test Hardware with the Rescue USB Flash Drive This guide explains how to create and use a Rescue USB flash drive to reinstall and recover the ExtraHop system. When booting

More information

Chapter 5: Fundamental Operating Systems

Chapter 5: Fundamental Operating Systems Chapter 5: Fundamental Operating Systems IT Essentials: PC Hardware and Software v4.1 Chapter5 2007-2010 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Chapter 5 Objectives 5.1 Explain the purpose

More information

HOMEROOM SERVER INSTALLATION & NETWORK CONFIGURATION GUIDE

HOMEROOM SERVER INSTALLATION & NETWORK CONFIGURATION GUIDE HOMEROOM SERVER INSTALLATION & NETWORK CONFIGURATION GUIDE Level 1, 61 Davey St Hobart, TAS 7000 T (03) 6165 1555 www.getbusi.com Table of Contents ABOUT THIS MANUAL! 1 SYSTEM REQUIREMENTS! 2 Hardware

More information

Week Overview. Running Live Linux Sending email from command line scp and sftp utilities

Week Overview. Running Live Linux Sending email from command line scp and sftp utilities ULI101 Week 06a Week Overview Running Live Linux Sending email from command line scp and sftp utilities Live Linux Most major Linux distributions offer a Live version, which allows users to run the OS

More information

Fiery Clone Tool For Embedded Servers User Guide

Fiery Clone Tool For Embedded Servers User Guide Fiery Clone Tool For Embedded Servers User Guide Fiery Clone Tool allows you to clone image files to a folder on a USB flash drive connected to the Fiery server. You can restore the image file to the Fiery

More information

Red Hat Certifications: Red Hat Certified System Administrator (RHCSA)

Red Hat Certifications: Red Hat Certified System Administrator (RHCSA) Red Hat Certifications: Red Hat Certified System Administrator (RHCSA) Overview Red Hat is pleased to announce a new addition to its line of performance-based certifications Red Hat Certified System Administrator

More information

How to Encrypt your Windows 7 SDS Machine with Bitlocker

How to Encrypt your Windows 7 SDS Machine with Bitlocker How to Encrypt your Windows 7 SDS Machine with Bitlocker ************************************ IMPORTANT ******************************************* Before encrypting your SDS Windows 7 Machine it is highly

More information

CS 103 Lab Linux and Virtual Machines

CS 103 Lab Linux and Virtual Machines 1 Introduction In this lab you will login to your Linux VM and write your first C/C++ program, compile it, and then execute it. 2 What you will learn In this lab you will learn the basic commands and navigation

More information

Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux.

Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux. Red Hat Enterprise Linux 7- RH124 Red Hat System Administration I Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux. This course will actively engage students

More information

RHCSA 7RHCE Red Haf Linux Certification Practice

RHCSA 7RHCE Red Haf Linux Certification Practice RHCSA 7RHCE Red Haf Linux Certification Practice Exams with Virtual Machines (Exams EX200 & EX300) "IcGraw-Hill is an independent entity from Red Hat, Inc., and is not affiliated with Red Hat, Inc. in

More information

How to test and debug an ASP.NET application

How to test and debug an ASP.NET application Chapter 4 How to test and debug an ASP.NET application 113 4 How to test and debug an ASP.NET application If you ve done much programming, you know that testing and debugging are often the most difficult

More information

LECTURE-7. Introduction to DOS. Introduction to UNIX/LINUX OS. Introduction to Windows. Topics:

LECTURE-7. Introduction to DOS. Introduction to UNIX/LINUX OS. Introduction to Windows. Topics: Topics: LECTURE-7 Introduction to DOS. Introduction to UNIX/LINUX OS. Introduction to Windows. BASIC INTRODUCTION TO DOS OPERATING SYSTEM DISK OPERATING SYSTEM (DOS) In the 1980s or early 1990s, the operating

More information

Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting

Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting Course ID RHL200 Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting Course Description Students will experience added understanding of configuration issues of disks,

More information

Introduction to the UNIX Operating System and Open Windows Desktop Environment

Introduction to the UNIX Operating System and Open Windows Desktop Environment Introduction to the UNIX Operating System and Open Windows Desktop Environment Welcome to the Unix world! And welcome to the Unity300. As you may have already noticed, there are three Sun Microsystems

More information

Acronis Backup & Recovery 10 Server for Windows. Installation Guide

Acronis Backup & Recovery 10 Server for Windows. Installation Guide Acronis Backup & Recovery 10 Server for Windows Installation Guide Table of contents 1 Before installation...3 1.1 Acronis Backup & Recovery 10 components... 3 1.1.1 Agent for Windows... 3 1.1.2 Management

More information

Getting Started with Paragon Recovery CD. Quick Guide

Getting Started with Paragon Recovery CD. Quick Guide Getting Started with Paragon Recovery CD Quick Guide Paragon Recovery CD 2 Quick Guide CONTENTS 1 Introduction... 3 2 Distribution...3 2.1 Distributive CD...3 2.2 Online Distribution...3 3 Booting from

More information

Inteset Secure Lockdown ver. 2.0

Inteset Secure Lockdown ver. 2.0 Inteset Secure Lockdown ver. 2.0 for Windows XP, 7, 8, 10 Administrator Guide Table of Contents Administrative Tools and Procedures... 3 Automatic Password Generation... 3 Application Installation Guard

More information

COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H.

COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H. COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H. IMPLEMENTING A WEB SERVER Apache Architecture Installing PHP Apache Configuration Files httpd.conf Server Settings httpd.conf Main

More information

IBM Sterling Control Center

IBM Sterling Control Center IBM Sterling Control Center System Administration Guide Version 5.3 This edition applies to the 5.3 Version of IBM Sterling Control Center and to all subsequent releases and modifications until otherwise

More information

GL-250: Red Hat Linux Systems Administration. Course Outline. Course Length: 5 days

GL-250: Red Hat Linux Systems Administration. Course Outline. Course Length: 5 days GL-250: Red Hat Linux Systems Administration Course Length: 5 days Course Description: The GL250 is an in-depth course that explores installation, configuration and maintenance of Linux systems. The course

More information

DocuShare Installation Guide

DocuShare Installation Guide DocuShare Installation Guide Publication date: May 2009 This document supports DocuShare Release 6.5/DocuShare CPX Release 6.5 Prepared by: Xerox Corporation DocuShare Business Unit 3400 Hillview Avenue

More information

Deploying a Virtual Machine (Instance) using a Template via CloudStack UI in v4.5.x (procedure valid until Oct 2015)

Deploying a Virtual Machine (Instance) using a Template via CloudStack UI in v4.5.x (procedure valid until Oct 2015) Deploying a Virtual Machine (Instance) using a Template via CloudStack UI in v4.5.x (procedure valid until Oct 2015) Access CloudStack web interface via: Internal access links: http://cloudstack.doc.ic.ac.uk

More information

ENTERPRISE LINUX SYSTEM ADMINISTRATION

ENTERPRISE LINUX SYSTEM ADMINISTRATION ENTERPRISE LINUX SYSTEM ADMINISTRATION The GL250 is an in-depth course that explores installation, configuration and maintenance of Linux systems. The course focuses on issues universal to every workstation

More information

Type Message Description Probable Cause Suggested Action. Fan in the system is not functioning or room temperature

Type Message Description Probable Cause Suggested Action. Fan in the system is not functioning or room temperature Table of Content Error Messages List... 2 Troubleshooting the Storage System... 3 I can t access the Manager... 3 I forgot the password for logging in to the Manager... 3 The users can t access the shared

More information

GLS250 "Enterprise Linux Systems Administration"

GLS250 Enterprise Linux Systems Administration GLS250 "Enterprise Linux Systems Administration" Intended for students already comfortable with working in the Unix environment, this in-depth course helps students acquire the variety of skills needed

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

University of Rochester Sophos SafeGuard Encryption for Windows Support Guide

University of Rochester Sophos SafeGuard Encryption for Windows Support Guide Sophos SafeGuard Encryption for Windows Support Guide University Information Technology Security & Policy September 15, 2015 Version Date Modification 1.0 September 15, 2015 Initial guide 1.1 1.2 1.3 1.4

More information

Advanced SUSE Linux Enterprise Server Administration (Course 3038) Chapter 5 Manage Backup and Recovery

Advanced SUSE Linux Enterprise Server Administration (Course 3038) Chapter 5 Manage Backup and Recovery Advanced SUSE Linux Enterprise Server Administration (Course 3038) Chapter 5 Manage Backup and Recovery Objectives Develop a Backup Strategy Create Backup Files with tar Work with Magnetic Tapes Copy Data

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

Deposit Direct. Getting Started Guide

Deposit Direct. Getting Started Guide Deposit Direct Getting Started Guide Table of Contents Before You Start... 3 Installing the Deposit Direct application for use with Microsoft Windows Vista... 4 Running Programs in Microsoft Windows Vista...

More information

Unix the Bare Minimum

Unix the Bare Minimum Unix the Bare Minimum Norman Matloff September 27, 2005 c 2001-2005, N.S. Matloff Contents 1 Purpose 2 2 Shells 2 3 Files and Directories 4 3.1 Creating Directories.......................................

More information

PARALLELS SERVER BARE METAL 5.0 README

PARALLELS SERVER BARE METAL 5.0 README PARALLELS SERVER BARE METAL 5.0 README 1999-2011 Parallels Holdings, Ltd. and its affiliates. All rights reserved. This document provides the first-priority information on the Parallels Server Bare Metal

More information

Acronis Backup & Recovery 10 Workstation. Installation Guide

Acronis Backup & Recovery 10 Workstation. Installation Guide Acronis Backup & Recovery 10 Workstation Installation Guide Table of Contents 1. Installation of Acronis Backup & Recovery 10... 3 1.1. Acronis Backup & Recovery 10 components... 3 1.1.1. Agent for Windows...

More information

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Kaseya 2. Quick Start Guide. for Network Monitor 4.1 Kaseya 2 Syslog Monitor Quick Start Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector

More information

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS

STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation

More information

for Networks Installation Guide for the application on a server September 2015 (GUIDE 2) Memory Booster version 1.3-N and later

for Networks Installation Guide for the application on a server September 2015 (GUIDE 2) Memory Booster version 1.3-N and later for Networks Installation Guide for the application on a server September 2015 (GUIDE 2) Memory Booster version 1.3-N and later Copyright 2015, Lucid Innovations Limited. All Rights Reserved Lucid Research

More information

CS 3530 Operating Systems. L02 OS Intro Part 1 Dr. Ken Hoganson

CS 3530 Operating Systems. L02 OS Intro Part 1 Dr. Ken Hoganson CS 3530 Operating Systems L02 OS Intro Part 1 Dr. Ken Hoganson Chapter 1 Basic Concepts of Operating Systems Computer Systems A computer system consists of two basic types of components: Hardware components,

More information

Installing a Second Operating System

Installing a Second Operating System Installing a Second Operating System Click a link below to view one of the following sections: Overview Key Terms and Information Operating Systems and File Systems Managing Multiple Operating Systems

More information

QACenter Installation and Configuration Guide. Release 4.4.2

QACenter Installation and Configuration Guide. Release 4.4.2 QACenter Installation and Configuration Guide Release 4.4.2 ii Please direct questions about QACenter or comments on this document to: QACenter Technical Support Compuware Corporation 31440 Northwestern

More information

PuTTY/Cygwin Tutorial. By Ben Meister Written for CS 23, Winter 2007

PuTTY/Cygwin Tutorial. By Ben Meister Written for CS 23, Winter 2007 PuTTY/Cygwin Tutorial By Ben Meister Written for CS 23, Winter 2007 This tutorial will show you how to set up and use PuTTY to connect to CS Department computers using SSH, and how to install and use the

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

Over-the-top Upgrade Guide for Snare Server v7

Over-the-top Upgrade Guide for Snare Server v7 Over-the-top Upgrade Guide for Snare Server v7 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be liable for errors contained herein or for

More information

CSE 120 Principles of Operating Systems. Modules, Interfaces, Structure

CSE 120 Principles of Operating Systems. Modules, Interfaces, Structure CSE 120 Principles of Operating Systems Fall 2000 Lecture 3: Operating System Modules, Interfaces, and Structure Geoffrey M. Voelker Modules, Interfaces, Structure We roughly defined an OS as the layer

More information

Tutorial How to upgrade firmware on Phison S8 controller MyDigitalSSD using a Windows PE environment

Tutorial How to upgrade firmware on Phison S8 controller MyDigitalSSD using a Windows PE environment Tutorial How to upgrade firmware on Phison S8 controller MyDigitalSSD using a Windows PE environment Version 2.0 This tutorial will walk you through how to create a bootable USB drive to enter into a WINPE

More information

Shutting down / Rebooting Small Business Server 2003 Version 1.00

Shutting down / Rebooting Small Business Server 2003 Version 1.00 Shutting down / Rebooting Small Business Server 2003 Version 1.00 Need to Know TM It may be necessary at some stage of the life of Small Business Server 2003 that it be shutdown or rebooted. In many cases

More information

Acronis Backup & Recovery 10 Server for Windows. Installation Guide

Acronis Backup & Recovery 10 Server for Windows. Installation Guide Acronis Backup & Recovery 10 Server for Windows Installation Guide Table of Contents 1. Before installation... 3 1.1. Acronis Backup & Recovery 10 components... 3 1.1.1. Agent for Windows... 3 1.1.2. Bootable

More information

The PC Boot Process - Windows XP.

The PC Boot Process - Windows XP. The PC Boot Process - Windows XP. Power supply switched on. The power supply performs a selftest. When all voltages and current levels are acceptable, the supply indicates that the power is stable and

More information

Unix Shell Scripts. Contents. 1 Introduction. Norman Matloff. July 30, 2008. 1 Introduction 1. 2 Invoking Shell Scripts 2

Unix Shell Scripts. Contents. 1 Introduction. Norman Matloff. July 30, 2008. 1 Introduction 1. 2 Invoking Shell Scripts 2 Unix Shell Scripts Norman Matloff July 30, 2008 Contents 1 Introduction 1 2 Invoking Shell Scripts 2 2.1 Direct Interpretation....................................... 2 2.2 Indirect Interpretation......................................

More information

Wolfr am Lightweight Grid M TM anager USER GUIDE

Wolfr am Lightweight Grid M TM anager USER GUIDE Wolfram Lightweight Grid TM Manager USER GUIDE For use with Wolfram Mathematica 7.0 and later. For the latest updates and corrections to this manual: visit reference.wolfram.com For information on additional

More information

Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)

Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check

More information

How To Run Linux On Windows 7 (For A Non-Privileged User) On A Windows 7 Computer (For Non-Patty) On Your Computer (Windows) On An Unix Computer (Unix) On Windows) On The Same

How To Run Linux On Windows 7 (For A Non-Privileged User) On A Windows 7 Computer (For Non-Patty) On Your Computer (Windows) On An Unix Computer (Unix) On Windows) On The Same Working from Home Tools and Technologies for Improving Your Programming Environment Daniel J. Hood danielhood@umbc.edu Overview Tools for MS Windows (and others OSs) SSH SCP X Windows Tunneling X Connections

More information

GE Healthcare Life Sciences UNICORN 5.31. Administration and Technical Manual

GE Healthcare Life Sciences UNICORN 5.31. Administration and Technical Manual GE Healthcare Life Sciences UNICORN 5.31 Administration and Technical Manual Table of Contents Table of Contents 1 Network setup... 1.1 Network terms and concepts... 1.2 Network environment... 1.3 UNICORN

More information

Using iscsi with BackupAssist. User Guide

Using iscsi with BackupAssist. User Guide User Guide Contents 1. Introduction... 2 Documentation... 2 Terminology... 2 Advantages of iscsi... 2 Supported environments... 2 2. Overview... 3 About iscsi... 3 iscsi best practices with BackupAssist...

More information

Ocster Backup - Rescue System

Ocster Backup - Rescue System Overview Ocster Backup - Rescue System The software allows you to create a rescue CD, DVD or USB-Stick. This rescue system is intended for two kinds of situations: 1. To restore a backup to your main hard

More information

Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press. Printing from Windows

Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press. Printing from Windows Xerox EX Print Server, Powered by Fiery, for the Xerox 700 Digital Color Press Printing from Windows 2008 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices

More information

2. RAID Management. 2-5. RAID migration N5200 allows below RAID migration cases.

2. RAID Management. 2-5. RAID migration N5200 allows below RAID migration cases. Thecus N5200 FAQ Thecus N5200 FAQ...1 1. NAS Management...2 1-1. Map a network drive in Windows XP...2 1-2. Could not map a network drive in Windows XP...2 1-3. Map a network drive in Mac OS X...2 1-4.

More information

What is included in the ATRC server support

What is included in the ATRC server support Linux Server Support Services What is included in the ATRC server support Installation Installation of any ATRC Supported distribution Compatibility with client hardware. Hardware Configuration Recommendations

More information

Chapter 8: Installing Linux The Complete Guide To Linux System Administration Modified by M. L. Malone, 11/05

Chapter 8: Installing Linux The Complete Guide To Linux System Administration Modified by M. L. Malone, 11/05 Chapter 8: Installing Linux The Complete Guide To Linux System Administration Modified by M. L. Malone, 11/05 At the end of this chapter the successful student will be able to Describe the main hardware

More information

Quick Start SAP Sybase IQ 16.0

Quick Start SAP Sybase IQ 16.0 Quick Start SAP Sybase IQ 16.0 UNIX/Linux DOCUMENT ID: DC01687-01-1600-01 LAST REVISED: February 2013 Copyright 2013 by Sybase, Inc. All rights reserved. This publication pertains to Sybase software and

More information

How to Install Microsoft Windows Server 2008 R2 in VMware ESXi

How to Install Microsoft Windows Server 2008 R2 in VMware ESXi How to Install Microsoft Windows Server 2008 R2 in VMware ESXi I am not responsible for your actions or their outcomes, in any way, while reading and/or implementing this tutorial. I will not provide support

More information

Version 1.0. File System. Network Settings

Version 1.0. File System. Network Settings Factory Default Settings LAN 1 IP Address: 192.168.2.127 Login: root or guest ( telnet guest only) Password: root or guest ( telnet guest only) Serial Console Port: Baud rate: 115200 Data format: 8 Bits,

More information

Cisco ISE Command-Line Interface

Cisco ISE Command-Line Interface This chapter provides information on the Cisco Identity Services Engine (Cisco ISE) command-line interface (CLI) that you can use to configure and maintain Cisco ISE. Cisco ISE Administration and Configuration

More information

Example of Standard API

Example of Standard API 16 Example of Standard API System Call Implementation Typically, a number associated with each system call System call interface maintains a table indexed according to these numbers The system call interface

More information

Fiery E100 Color Server. Welcome

Fiery E100 Color Server. Welcome Fiery E100 Color Server Welcome 2011 Electronics For Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45098226 27 June 2011 WELCOME 3 WELCOME This Welcome

More information

Linux command line. An introduction to the Linux command line for genomics. Susan Fairley

Linux command line. An introduction to the Linux command line for genomics. Susan Fairley Linux command line An introduction to the Linux command line for genomics Susan Fairley Aims Introduce the command line Provide an awareness of basic functionality Illustrate with some examples Provide

More information

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Version: 1.4 Table of Contents Using Your Gigabyte Management Console... 3 Gigabyte Management Console Key Features and Functions...

More information

Acronis Backup & Recovery 11

Acronis Backup & Recovery 11 Acronis Backup & Recovery 11 Update 0 Installation Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for

More information

Navigating the Rescue Mode for Linux

Navigating the Rescue Mode for Linux Navigating the Rescue Mode for Linux SUPPORT GUIDE DEDICATED SERVERS ABOUT THIS GUIDE This document will take you through the process of booting your Linux server into rescue mode to identify and fix the

More information

Installing HSPICE on UNIX, Linux or Windows Platforms

Installing HSPICE on UNIX, Linux or Windows Platforms This document describes how to install the HSPICE product. Note: The installation instructions in this document are the most up-to-date available at the time of production. However, changes might have

More information

Acronis Backup & Recovery 10 Server for Linux. Command Line Reference

Acronis Backup & Recovery 10 Server for Linux. Command Line Reference Acronis Backup & Recovery 10 Server for Linux Command Line Reference Table of contents 1 Console mode in Linux...3 1.1 Backup, restore and other operations (trueimagecmd)... 3 1.1.1 Supported commands...

More information

User Manual. Copyright Rogev LTD

User Manual. Copyright Rogev LTD User Manual Copyright Rogev LTD Introduction Thank you for choosing FIXER1. This User's Guide is provided to you to familiar yourself with the program. You can find a complete list of all the program's

More information

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Kaseya 2. Quick Start Guide. for Network Monitor 4.1 Kaseya 2 VMware Performance Monitor Quick Start Guide for Network Monitor 4.1 June 7, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private

More information

MBR and EFI Disk Partition Systems

MBR and EFI Disk Partition Systems MBR and EFI Disk Partition Systems Brought to you by www.rmroberts.com Computer technology is constantly evolving. The hard disk drive partition system has become quite complicated in recent years because

More information