RHEL's user skills are constantly summarized. The following describes in detail two RHEL user skills. KDE and GNOME are the two most used desktop environments in Red Hat. GNOME is installed by default.
If you didn't install the KDE package when installing the system, let's take a look at how to install it after installing the system.
RHEL user skills-desktop Switching
After RHEL is installed and the computer is started, the GNOME desktop environment is started. After logging on, click "start"> "system settings"> "Software Package". Then, in the "software package management" window, we can see the KDE item. If the KDE item is installed, it is displayed as "58/58". If it is not installed, the option is "0/58 ".
Click this number to select all options in the displayed selection window and then click "application". The system will tell you to put the RHEL installation disk and then start the installation. After the installation is complete, each time you enter the system, click "session" below to view multiple graphic environments in the displayed window. You can select these graphic environments. Select KDE and click "OK" to enter the KDE graphic environment. To return to the GNOME graphic environment, click "session" after logout, select "GNOME", and click "OK.
RHEL user skills-user management
No matter which graphic environment you log on to, you must have a user account, which is the same when you log on to these desktop environments. Next, let's take a look at how to create a user account and change the root password after installing RHEL. Click Start> system Settings> users and groups ".
The "user and group" Management window appears. Click the Add User button. In the subsequent "create new user" window, enter the username, full name, and password of the account user. This completes. Of course, do not forget to add it to the corresponding group. To change the root password, click Start> system Settings> root password ". In the displayed settings window, enter a new password and click "OK.
The RHEL user skills involved in this article are just a guiding role for convenience of users who are not familiar with RHEL. Hope that friends who are familiar with this step will be enlightened.
- In-depth analysis of RHEL5 Security
- The perfect combination of RHEL 5 Xen is now available
- Detailed analysis of RHEL 5 firewall settings
- Step 5 of RHEL5 Squid Configuration
- Easy understanding of RHEL 4 kernel Compilation