Solved

how to install dowloaded packages in Red Hat

Posted on 1997-12-13
2
236 Views
Last Modified: 2013-12-15
i downloaded telnet package from redhat web site but can't find instructions about how to install it, i don't know if it possible to use RPM though the downloaded file is with .rpm suffix(telnet-0.10-2.src.rpm) and where is the best directory to install it?
0
Comment
Question by:smiley020999
2 Comments
 
LVL 2

Accepted Solution

by:
Resonance earned 50 total points
ID: 1631021
What you downloaded *appears* to be the RPM package for the *source code* to telnet (.src.rpm).  Unless you know how to compile things, installing it could be tricky.  If you want to do it the simple way, go to the FTP site (ftp.redhat.com) or one of its mirrors, check in /pub/redhat/redhat-5.0/i386/RedHat/RPMS and get the telnet-0.10-2.i386.rpm, which should be the matching precompiled binary.  In either case, you install with

rpm -i <package.rpm>.  It will choose its own default install path when you do this.  If you want to compile from source, do the rpm -i on the .src.rpm, change to the appropriate directory (you can see where the file will go with rpm -qlp <package.src.rpm>) and follow the instructions in the local readme or makefile to compile and install.

0
 

Author Comment

by:smiley020999
ID: 1631022
i tried the 'rpm -i ...' and get the message 'only packages major number <=2 is supported by this version of RPM, does this mean that i need to download new version RPM first? though the telnet rpm file is telnet-0.10-2-i386.rpm, which number is major number here? and if i download new RPM can i use old rpm command to install it?
0

Featured Post

Complete VMware vSphere® ESX(i) & Hyper-V Backup

Capture your entire system, including the host, with patented disk imaging integrated with VMware VADP / Microsoft VSS and RCT. RTOs is as low as 15 seconds with Acronis Active Restore™. You can enjoy unlimited P2V/V2V migrations from any source (even from a different hypervisor)

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Network Interface Card (NIC) bonding, also known as link aggregation, NIC teaming and trunking, is an important concept to understand and implement in any environment where high availability is of concern. Using this feature, a server administrator …
It’s 2016. Password authentication should be dead — or at least close to dying. But, unfortunately, it has not traversed Quagga stage yet. Using password authentication is like laundering hotel guest linens with a washboard — it’s Passé.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now