Solved

Install Kannel in RedHat Enterprise Linux 6

Posted on 2013-01-10
9
1,306 Views
Last Modified: 2013-01-10
Hi, i need install kannel in red hat 6.
I'm newbie
thanks
0
Comment
Question by:axlsmit
  • 6
  • 3
9 Comments
 
LVL 31

Expert Comment

by:farzanj
ID: 38763473
Did you try:

AS root:

yum install kannel

OR as any user as

sudo yum install kannel
0
 
LVL 31

Expert Comment

by:farzanj
ID: 38763495
0
 
LVL 31

Accepted Solution

by:
farzanj earned 500 total points
ID: 38763502
For downloading first you can visit site

http://rpm.pbone.net/index.php3

And search for RPM and then install

rpm -ivh NAME.rpm
0
 

Author Closing Comment

by:axlsmit
ID: 38764096
thanks. if you more information about kannel post in a comment
thanks
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 
LVL 31

Expert Comment

by:farzanj
ID: 38764135
Welcome.  Basically this is the order you should follow.

1.  Try using yum that does everything for you the best way.
2.  Sometimes you don't have a particular RPM available through yum so you have to get it through some website.  Download from the most authentic website.  If you can download it from the actual kannel website in your case, that would be great.
0
 

Author Comment

by:axlsmit
ID: 38765284
I have a modem gsm Wavecom Q2303A module, but i don't now how to configure on red hat enterprise linux server 6.

please help me
thanks
0
 
LVL 31

Expert Comment

by:farzanj
ID: 38765317
I wish I could.  Open a new question in as many appropriate zones as possible because you will have hard time finding someone who knows it.
0
 

Author Comment

by:axlsmit
ID: 38765333
thank you so much
0
 
LVL 31

Expert Comment

by:farzanj
ID: 38765339
You are welcome :)
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

I am a long time windows user and for me it is normal to have spaces in directory and file names. Changing to Linux I found myself frustrated when I moved my windows data over to my new Linux computer. The problem occurs when at the command line.…
Little introduction about CP: CP is a command on linux that use to copy files and folder from one location to another location. Example usage of CP as follow: cp /myfoder /pathto/destination/folder/ cp abc.tar.gz /pathto/destination/folder/ab…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now