Solved

GRUB to LILO

Posted on 2004-03-27
5
418 Views
Last Modified: 2010-04-20
HAI...
 
 I AM USING REDHAT LINUX 9 AND I HAVE CONFIGURED GRUB. NOW, I WOULD LIKE TO CHANGE BACK TO LILO. CAN ANYONE OF YOU MENTION THE STEPS PLEASE.....

 THANKS AND REGARDS..
0
Comment
Question by:mshajan
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
5 Comments
 
LVL 44

Expert Comment

by:Karl Heinz Kremer
ID: 10694396
First: Turn off your caps lock. It's not polite to shout or scream...

All you have to do is create a file /etc/lilo.conf with the necessary information and run /sbin/lilo as root user.
0
 
LVL 44

Expert Comment

by:Karl Heinz Kremer
ID: 10694417
Why do you want to switch to Lilo? If you have a working boot loader configuration, there is no need to change it. You will not have any additional features by using Lilo.
0
 
LVL 17

Accepted Solution

by:
owensleftfoot earned 20 total points
ID: 10696387
khkremer, he wont have to create any file. Redhat automatically creates a conf file for lilo even if you select grub as the default boot loader. All he has to do is execute the command "lilo". However I am in complete agreement with you re wanting to use lilo over grub. Not only will he have no additional features by using lilo, he will actually have less than he has at the moment. Majority advice - stick with grub.
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

SSH (Secure Shell) - Tips and Tricks As you all know SSH(Secure Shell) is a network protocol, which we use to access/transfer files securely between two networked devices. SSH was actually designed as a replacement for insecure protocols that sen…
The purpose of this article is to demonstrate how we can use conditional statements using Python.
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question