Solved

SME Server:7.5.1 - just configured it.  How to login? #

Posted on 2011-03-03
7
860 Views
Last Modified: 2012-05-11
What goes after the

root@server1~] #

Any user manuals any where?

Thanks.
0
Comment
Question by:fcek
  • 3
  • 3
7 Comments
 

Author Comment

by:fcek
ID: 35033123

Oh Im a n00b
0
 
LVL 16

Expert Comment

by:santoshmotwani
ID: 35033141
enter your username

say root
0
 

Author Comment

by:fcek
ID: 35033156

Hi

I did.

Im at thsi prompt:

[root@server1~] #

What next ?  

0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 23

Expert Comment

by:savone
ID: 35033203
I just found out what SME server is, its centos based.  So basically you can do anything you want that is possible on a linux system.



Here is a list of all the commands you can run, there is a lot more but these are a good start.

http://www.yolinux.com/TUTORIALS/unix_for_dos_users.html

0
 

Author Comment

by:fcek
ID: 35035160
savone:
OK so its all command line.  I know a bit of DOS, just as well.
No GUI ?
 
0
 
LVL 23

Expert Comment

by:savone
ID: 35036274
I am not familiar with SME, but centos does have a gui.


Try this and we will see... At the root prompt type this:

init 5

If there is a gui installed it should start, if not try this:

yum groupinstall “X Window System” “GNOME Desktop Environment”

Its been a long time since I had to install an X system. :)
0
 
LVL 23

Accepted Solution

by:
savone earned 500 total points
ID: 35036292
Actually I just found this that will probably help you through....

http://emnaz.blogspot.com/2009/06/install-gnome-on-sme-server-74.html

Seems a little different from redhat/centos.
good luck!
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

In my business, I use the LTS (Long Term Support) versions of Linux. My workstations do real work, and so I rarely have the patience to deal with silly problems caused by an upgraded kernel that had experimental software on it to begin with from a r…
You ever wonder how to backup Linux system files just like Windows System Restore?  Well you can use Timeshift in Linux to perform those similar action.  This tutorial will show you how to backup your system files and keep regular intervals. Note…
Learn how to navigate the file tree with the shell. Use pwd to print the current working directory: Use ls to list a directory's contents: Use cd to change to a new directory: Use wildcards instead of typing out long directory names: Use ../ to move…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

9 Experts available now in Live!

Get 1:1 Help Now