February 19, 2009

How do I … install KDE applications on Windows?

  • Date: December 9th, 2008
  • Author: Jack Wallen

With the help of Wine you can install Windows applications on Linux. But what if there are Linux applications you want to run on Microsoft Windows? Say, for example, you want to use Dolphin for your file manager instead of Windows Explorer. Thanks to a group of KDE developers, it’s possible.

Now don’t get overworked thinking you’re going to have the entire KDE workspace. You’re not. What you can get, however, is a lot of the KDE-specific applications up and running on Windows (2000, XP, and Vista). And many of these applications are integrated within themselves (so when you click an image in Dolphin, Gwenview automatically opens to display the image).

What is nice about KDE on Windows is that the aim of the project, since inception, is to create these applications as native ports. So there is nothing like Cygwin acting as a middle-layer to help run the KDE applications. This helps tremendously in keeping memory and CPU usage down to a minimum.

At this point I should warn you, some of the applications do not work perfectly. Take for instance Konqueror. Konqueror works perfectly as a file manger, but as a Web browser it is somewhat slow and prone to bugs. But it does work in both functions. Another application, Amarok, is unstable to the point of not being usable yet. That is not a problem; you can simply deselect the unstable applications during installation.

With that said, let’s get on with the installation.

This blog post is also available in PDF format in a TechRepublic download and as a TechRepublic Photo Gallery.

Getting and installing

The installation of KDE on Windows isn’t difficult, but it is time consuming. Fortunately much of this time is not interactive (so you can step away from the machine and get some work done). The first thing you need to do is download the KDE installer. Once the installer has finished downloading, double-click the .exe file and the installation will begin.

The first step in the installation is to select the Installation directory (Figure A).

Figure A

The default installation path is probably the best choice.

The next step is to choose the Install Mode (Figure B). The purpose of this is to dictate to the installer application if the installation is for an end user or a developer. If you are not planning to do any developing for KDE on Windows, your best bet is to select the End User option.

Figure B

If you select Development Mode you will also have to select a Compiler mode.

It’s very important that you select the proper Compiler Mode (if you plan on doing a Developer installation). Once you make your selection and install, you cannot change the compiler type without uninstalling and reinstalling. You can, of course, do another install and just install KDE into a different path on your hard drive. This will allow you to run different types of compilers on different installs.

Since most of you will not be doing a developer installation, we are going to continue on with an End User installation.

The next step is to configure a local storage location (Figure C). This local storage directory will be where all downloaded files are retained for the installation process.

Figure C

There shouldn’t be any reason you would need to change this directory.

Now it’s time to configure Internet settings (Figure D). This is necessary because the installer has to download everything it needs, so it must know how to get to it.

Figure D

If you are behind a proxy server, the installer will fail if the proxy is not configured here.

Along with the Internet connections configuration, you have to select a download server (Figure E). Naturally you will want to select the closest in proximity to your machine.

Figure E

Of course, even if the server is near you, that doesn’t always mean you will have the best speeds.

The next step is to choose the release you want to install (Figure F). As of this writing there are only four choices: 4.1.0, 4.1.1, 4.1.2, and 4.1.3. Installing 4.1.3 will bring you closest to the latest features of KDE 4.

Figure F

You can always go back and install other releases by installing them in different folders.

The next step is the final configuration in the installation. You now have to select the packages you want to install. As you can see in Figure G, I have opted to not install the unstable packages as well as the various language packages.

Figure G

Unless you have a need for the various language packages, not installing them will save a good deal of time during the installation.

The next window (Figure H) serves only to inform you what additional packages will be installed, based on your package selection. These are all dependencies (libraries, etc).

Figure H

You cannot deselect any of these packages.

Finally the installer will begin to download all packages necessary for the installation. In my case there are 50 packages to install (Figure I).

Figure I

Go work on that Apache server because you’re going to have the time.

Once everything has been downloaded, the installer will automatically compile and build the applications. When all is complete you will be greeted with a window (Figure J) informing you the installation is complete.

Figure J

Click Finish and you’re ready to rock the KDE way.

With the installation complete, there is no need to reboot. You are ready to take a peek at the KDE applications you now have installed on your Windows machine.

inexpensive cialis class=”entry” align=”justify”>A quick glance

One of the most welcome applications is the Dolphin file manager. I have never been a huge fan of Explorer, so having a Linux file manager is a welcome addition. To get to Dolphin you only need navigate to the KDE submenu in the Start menu. If you installed KDE 4.1.3 the menu entry will be titled “KDE 4.1.3 Release.” Within that submenu you will find a number of child menus (Figure K).

Figure K

You will notice as you navigate through the KDE menus that anything regarding the desktop is missing.

In the System submenu you will find the entry for Dolphin. Load Dolphin to see just how well the KDE applications have been ported to Windows. Figure L shows Dolphin in action.

Figure L

As you can see Dolphin contains many of the standard KDE features.

Like much of the KDE-ported applications, Dolphin works exactly as expected. The only feature I have yet to be able to take advantage of is connecting to a network connection. I have attempted to connect Dolphin through SSH (with the help of Putty) but have yet to have any luck. Outside of that small issue, Dolphin makes for an outstanding replacement for Explorer.

Final thoughts

There are many reasons why you would want to install KDE on Windows. And I am confident that eventually the developers will manage to port the entire desktop experience onto Windows. At this point, I can’t see any reason to run the standard Windows desktop.

Give KDE on Windows a try. Even if you find only one application that you use regularly, it will be worth the effort.

Permalink • Print • Comment

10 things to look for in a domain registrar

  • Date: December 9th, 2008
  • Author: Erik Eckel

When you start looking for a domain registrar, you may discover some surprising differences in what they offer — or neglect to offer. Erik Eckel learned the hard way that it pays to shop around. Here’s his list of the tools, services, and features that will make your job easier.


Having helped create, maintain, and administer Web site and e-mail domains for numerous clients, I’ve come to find that several elements are necessities when working with a domain registrar. Whether complex DNS issues, dreaded SMTP errors, or confusing IP address troubles arise — and no matter how well you prepare, issues inevitably surface — technology professionals need a good, dependable registrar that offers the tools, services, and features required to properly research and resolve these issues.

Toward that end, here are 10 elements to insist upon when selecting a domain registrar.

Note: This information is also available as a PDF download.

#1: Validity

Regardless of how much money some domain registrars might save you — and postal mail and Internet pages frequently tout marketing offers from questionable firms set up overseas — Web and e-mail domain registration isn’t a feature where corners should be cut, even in a down economy. Insist upon working only with reputable and legitimate domain registrars.

If a potential partner isn’t an ICANN-accredited registrar, don’t give them your business. Confirming that a potential registrar is ICANN-accredited helps ensure that your organization receives professional, stable, reliable service from a reputable provider.

#2: Knowledgeable technical support

When all else fails — and trouble will arise when transferring domains, delegating administrative permissions, or just renewing existing services — you need to know the registrar’s customer service department is capable and responsive. Almost all operate toll-free telephone numbers. That’s to be expected.

But when it comes to speaking with a mildly technically proficient support representative, that’s not always a given. Review a domain registrar’s support policies. Some offer live technical chat as well as live telephone support. My field experience has taught me that such additional technical accessibility options save time and angst.

#3: Intelligent DNS configuration utilities

The frustration that comes with trying to make sense of unintuitive and/or confusing DNS configuration tools can quickly prove overwhelming, particularly when e-mail service or Web site access is down. Even if you have to test a domain registrar’s DNS tools using a practice domain you create only for testing purposes, getting familiar with a registrar’s DNS configuration tools and their usage before administering a live site or production e-mail can prove invaluable. Avoid selecting a registrar whose DNS tools prove difficult to access or understand or that are error-ridden.

#4: Delegation tools

Often, organizations prefer to implement a separation of powers when managing domains. For example, senior staff might be the only ones able to transfer a domain, whereas network administrators might need permissions to occasionally update DNS records.

In such cases, delegation authority is required, in which specific permissions can be delegated to respective authorized users. If your organization is likely to find itself in such need, be sure to confirm the domain registrar selected supports such division of responsibilities.

#5: SSL Certificates

Take it from a consultant who’s received four separate bills for a single client’s domain needs; dividing domain registration, e-mail hosting, Web hosting, and SSL certificate services among four vendors quickly becomes confusing. And it’s inefficient and often cost ineffective.

Look for a domain registrar that can collect all these services within a single pricing package. Doing so simplifies recordkeeping and administration and lowers costs.

#6: Web hosting

Increasingly, many organizations are choosing not to invite port 80 public Internet traffic inside their corporate servers. File servers dedicated to user authentication and file and print sharing, while usually capable of hosting Web sites, are often configured specifically not to allow public Web traffic. Foregoing Web site hosting on an organization’s own local server helps secure the box and protect it from countless exploits.

However, most organizations require a Web presence. Just as with e-mail hosting, companies should look for a domain registrar that also offers competitive Web hosting services. For reasonable fees, organizations can keep such Web-related traffic off their main production servers by taking advantage of registrar Web-hosting packages instead.

#7: E-mail hosting

Not all small businesses want to maintain and administer their own servers. Many organizations that do go that route and implement small business servers often don’t want the hassles of maintaining their own Exchange or Sendmail boxes. In such cases, it’s much easier to allow the domain registrar to maintain e-mail services. Thus, organizations that don’t want to assume the challenge or expense of e-mail server administration should look for a domain registrar that can wrap those services within a single, integrated package.

#8: Site-building tools

The site-building tools provided by most leading domain registrars may not be able to create complex Web sites that set new and innovative design trends, but that’s not usually the goal of businesses, SMBs in particular, that need these tools.

Many organizations merely want to launch professional, informational Web sites that improve communications with clients and suppliers. In such cases, expensive Web design firms may not be required. Existing marketing materials may well be leveraged using these registrar-provided tools to quickly launch a simple but professional-looking Web site.

#9: Easily navigable Web site

Look for a domain registrar whose Web site is well organized. It’s not worth saving a few dollars a year if you have to invest an inordinate amount of time trying to chase down the menu for updating MX record entries or similar tools or to change account or billing information.

Look for registrars that have carefully designed their Web sites to group relevant tools by topic. Browse a potential registrar’s site to confirm it is easily navigable. Just because a domain registrar has purchased full-page advertisements in an electronics or tech magazine doesn’t mean its services or domain management tools are intuitive or readily accessible.

#10: Competitive pricing

Competition among domain registrars has been brutal. Consumers benefit, as domain names (complete with forwarding services and even an e-mail address) can be had from reputable registrars for less than $15 or $20 a year.

Be sure to review a domain provider’s pricing policies before committing. Pay special attention to potentially hidden fees, such as for domain forwarding or e-mail services. While price shouldn’t be the chief priority, it’s become a buyer’s how to get cialis market, certainly.

Permalink • Print • Comment

10 security tips for Microsoft Windows XP

  • Date: November 4th, 2008
  • Author: Chad Perrin

When installing and using MS Windows XP, there are some security practices you should keep in mind.


There are general security tips that apply to all operating systems, of course, but each operating system platform provides its own security challenges. The following tips are tailored to Microsoft Windows XP.

  1. Disable dangerous features. Microsoft Windows systems come with a number of features enabled by default that do little or nothing for convenience, but introduce significant security risks. Among these are Autorun, the Guest account, and even Automatic Updates — because letting someone in Redmond, WA decide when changes should be made to your system, when he has no idea what software you’re running and you haven’t tested the updates yet, is a bad idea. Microsoft Windows provides many features that are activated by default and either poorly conceived from a security perspective or, at best, unnecessary for the vast majority of users. Each of these features introduces its own risks, and any that you do not need should be deactivated.
  2. Disable unneeded services. In addition to local operating system features, you should disable unneeded services. Almost exactly one year ago, my article 10 services to turn off in MS Windows XP provided a brief checklist of services to turn off — or to ensure you know why you’re leaving them on, at least. The list is not comprehensive, of course, but it is a good start.
  3. Employ good email security practices. Make use of some basic email security tips to ensure you do not invite the bad guys to read your email, flood you with spam, and take advantage of you through phishing techniques.
  4. Install and maintain malware protection software. Regardless of the reason for it, the fact remains that malware is a significant threat to Microsoft Windows systems, and running one without malware protection is irresponsible. Research your options for antivirus and antispyware how to get cialis without prescription protection carefully, and choose well. Don’t let your malware protection software’s signature databases get out of date because the software only protects against the threats it can recognize, and don’t rely on your choice of antivirus software from six years ago because there’s no such thing as a trusted brand.
  5. Update more than just MS Windows. In the world of Microsoft Windows, the majority of the software most people run on their computers often comes from third-party vendors without any connection to Microsoft’s own software distribution channels. This means that when you install something like Adobe Photoshop or Mozilla Firefox you have to track security updates for these applications separately from the operating system. Just getting your Microsoft updates every month doesn’t always cover it — sometimes some third party application needs to be updated, too. You need to keep track of what’s installed and whether or not it has received any updates if you want to maintain security for your system, because security goes beyond the core operating system.
  6. Research and test your updates. It’s important to keep your system updated so that security vulnerabilities that receive patches from Microsoft and other software vendors will not remain open to exploit. It’s also important, however, to ensure that you research and test your software updates before applying them to a production system. All too often, users and sysadmins discover that untested updates are a cure worse than the disease, as they break functionality, open additional vulnerabilities in the system, and even occasionally undo the benefits of previously applied updates. Others may have tested the updates, or have simply applied them and run into problems, so researching others’ experiences can help you plan for such issues as they arise; testing them yourself by installing them on a test system before doing so on your production system is a next necessary step to ensure that your system in particular will not develop problems as the result of a bad update.
  7. Investigate alternatives to your default application choices. Should you be using a Web browser other than Internet Explorer, such as Google Chrome, Mozilla Firefox, or Opera? Is the multiprotocol IM client Pidgin with the OTR encryption plugin a better option for your instant messaging needs — including security — than the native clients for AIM, MSN, Y!M, ICQ, and gTalk? The only way to be sure is to determine your own needs and make an informed decision. Don’t settle for default applications without knowing the consequences of that choice.
  8. Use a quality desktop firewall. Desktop firewalls are in many respects applications like any other, but they deserve special mention for MS Windows security. Furthermore, even Windows servers are in effect desktop systems, so don’t let the fact that a given computer is a “server” deter you from installing a good “desktop” firewall application on the system if you can spare the CPU cycles and RAM. On an actual end user desktop system, desktop firewall software is even more important. Relying on the defaults you get when you buy the computer is a good way to get your system compromised without even knowing it. The Windows Firewall provided with MS Windows after Service Pack 2 is certainly better than nothing, but one can almost always do better. Look into alternatives to the Windows Firewall, and select the option that best suits your needs.
  9. Research your options before assuming MS Windows XP is what you need. The same principles that apply to applications may also apply to operating systems. Different OSes can provide different security and functionality benefits. Are you really certain that MS Windows XP is the operating system you need? Have you investigated other alternatives? What about MS Windows 2000 or Vista? Have you checked into the possibility of MacOS X, FreeBSD, or Ubuntu Linux for a workstation? What about OpenBSD, OpenSolaris, or OpenVMS for a server?
  10. Protect yourself the same way you would with any other operating system. In last year’s article, 10 security tips for all general-purpose OSes, I laid out a list of security tips that apply for good security practice in the use of any general purpose operating system — including MS Windows.

Installing MS Windows XP is only the first step to using it. If you stop there, you’re likely to run afoul of the various security threats roaming the wilds of the Internet. Make sure you take care to configure your system to best protect you against the dangers that lurk around every corner.

Permalink • Print • Comment

Use a form to display a list of reports and queries in an Access database

  • Date: December 9th, 2008
  • Author: Mary Ann Richardson

When you need to know what objects are being created for a database, you can run generic soft tabs cialis a query against an Access system table to generate a list of all current reports and queries.


Ever wonder exactly what reports and queries are being created for a database? As an administrator, you may need a quick way of determining what reports and queries are being run against a database. Fortunately, Access stores the names of all the top-level database objects in a system table called MSysObjects. You can run queries against MSysObjects just as you would any other table in the database.  Follow these steps:

  1. Open the database and create a form with two unbound list boxes, as shown in Figure A.

Figure A

two unbound boxes

  1. In Design view, right-click the first list box and select Properties.
  2. Under the Data tab, right-click the RowSource property box and select Zoom.
  3. Enter the code as shown in Figure B and click Close.

Figure B

rowsource property

  1. Right-click the second list box and select Properties.
  2. Under the Data tab, right-click the RowSource property box and select Zoom.
  3. Enter the code as shown in Figure C.

Figure C

queries

When you run the form, Access outputs all current reports and queries for that database to the respective list boxes (Figure D).

Figure D

object query

To access other object types, use their type value. For example, to list all the tables in the database, enter 6. To list forms, enter -32768. To list macros, enter -32766.

Permalink • Print • Comment

Let Access add your name to a report

  • Date: December 9th, 2008
  • Author: Mary Ann Richardson

It’s useful to include some basic information in Access report footers, such as the name of the person who prepared the report. Here’s a simple way to prompt for the user’s name and insert it in the page footer.


Since a report is just a snapshot of a database at a certain date and time, generic cialis review it is helpful to include that information in the report printout. In addition to a time and date stamp, it’s also nice to have the preparer add his or her name to the end each report page. Follow these steps:

  1. Open the report in Design view.
  1. Click the Text Box control tool and then click and drag in the Page footer section of the report.
  1. Select the text in the Label control, type Prepared by:, and format it as desired.
  1. Click in the text box and enter the formula below, as shown in Figure A:

=[What is your name?]

Figure A

text box formula

When you run the report, you’ll see the dialog box shown in Figure B.

Figure B

name prompt

After the preparer enters his/her name, the report will output with a page footer like the one shown in Figure C.

Figure C

report footer

Permalink • Print • Comment
« Previous PageNext Page »
Made with WordPress and a search engine optimized WordPress theme • Sky Gold skin by Denis de Bernardy