Solved

install sara

Posted on 2002-05-02
5
275 Views
Last Modified: 2012-06-27
Hi, I'm a beginner in Linux.
Currently, I have a Linux RedHat 7.2. I have difficulty
installing a tool. Hope someone can provide me with very detail step-by-step commands on how to install it and have it running.
The tool is called sara (version3.5.6)and can be downloaded at
http://www-arc.com/sara/
it is in a .tgz extension.
Please show me the commands to unzip and taz and install.
thanks.
0
Comment
Question by:kloh
  • 3
  • 2
5 Comments
 
LVL 4

Accepted Solution

by:
MFCRich earned 100 total points
ID: 6985912
The commands

> mkdir sara
> cd sara
> tar xzvf <path-of-tgz-file>

will "unpack" the tarball in the current directory. If you the do an 'ls' you should see the contents of the tarball which most likely is a single directory. "cd" to that directory and look for file called "README" and/or "INSTALL". Make sure you read them all the way through. Typically you will have to do something similar to the following:

> ./configure
> make
 then as root
> make install

 
0
 

Author Comment

by:kloh
ID: 6989440
MFCRich, can you list the steps on how to install it?
I tried, but can't work.
what does "./configure" do?
what does "make" do?
0
 

Author Comment

by:kloh
ID: 6989441
best if you can show me all the steps til the tool can be properly run.
0
 

Author Comment

by:kloh
ID: 6994019
it works. my mistake.
thanks a lot.
but do tell me what does "./configure" do?
as well as "make" and "make install"
0
 
LVL 4

Expert Comment

by:MFCRich
ID: 6999722
Sorry for taking so long, I've beeen away.

The "./configure" is a shell script that tests your system to discover things like what OS and/or libraries you have. From this information it generates the makefiles used by 'make' to build the application for your system. In this way one tarball can be used to do builds on linux or FreeBSD or ???. This is provided with the automake and autoconf packages on Redhat.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The purpose of this article is to show how we can create Linux Mint virtual machine using Oracle Virtual Box. To install Linux Mint we have to download the ISO file from its website i.e. http://www.linuxmint.com. Once you open the link you will see …
I. Introduction There's an interesting discussion going on now in an Experts Exchange Group — Attachments with no extension (http://www.experts-exchange.com/discussions/210281/Attachments-with-no-extension.html). This reminded me of questions tha…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now