website diff en/doc/handbook/hacking-livecd.html @ rev 117
en: Typos, spelling, wording, etc.
author | Mike D. Smith <MikeDSmith25@gmail.com> |
---|---|
date | Sat Jul 19 16:23:18 2008 +0000 (2008-07-19) |
parents | f0c0c73578c0 |
children | ac2165edb8fc |
line diff
1.1 --- a/en/doc/handbook/hacking-livecd.html Sat Jun 14 14:48:17 2008 +0000 1.2 +++ b/en/doc/handbook/hacking-livecd.html Sat Jul 19 16:23:18 2008 +0000 1.3 @@ -7,7 +7,7 @@ 1.4 <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" /> 1.5 <meta name="description" content="slitaz English handbook" /> 1.6 <meta name="expires" content="never" /> 1.7 - <meta name="modified" content="2008-02-26 18:30:00" /> 1.8 + <meta name="modified" content="2008-07-17 00:15:00" /> 1.9 <meta name="publisher" content="www.slitaz.org" /> 1.10 <meta name="author" content="Christophe Lincoln" /> 1.11 <link rel="shortcut icon" href="favicon.ico" /> 1.12 @@ -33,7 +33,7 @@ 1.13 1.14 <ul> 1.15 <li><a href="#intro">Introduction.</a></li> 1.16 - <li><a href="#pre">Organisation and preparation.</a></li> 1.17 + <li><a href="#pre">Organization and preparation.</a></li> 1.18 <li><a href="#add-files">Add files to the ISO.</a></li> 1.19 <li><a href="#isolinux">Modify the isolinux configuration.</a></li> 1.20 <li><a href="#memtest">Install and use Memtest86.</a></li> 1.21 @@ -47,7 +47,7 @@ 1.22 <em>Hacking SliTaz LiveCD</em> or how to have fun with the LiveCD ISO image. Note that you can also 1.23 <a href="gen-livecd.html">create a custom flavor with Tazlito</a>. 1.24 Creating your own bootable ISO image is easily achievable and the steps are carefully described here. The manipulation of a personal ISO image can add new files or modify existing 1.25 -ones found on the Slitaz Live CD. The Slitaz ISO image is less than 30 MB and a CD-R or CD-RW provides around 700 MB, 1.26 +ones found on the SliTaz Live CD. The SliTaz ISO image is less than 30 MB and a CD-R or CD-RW provides around 700 MB, 1.27 so there's plenty of scope for expansion. For example, you could store your images and even provide a <em>live</em> slideshow 1.28 using GQview. The <em>hacking</em> of the ISO image allows you to modify boot loader configuration files 1.29 (<em>boot loader</em>), <em>splash</em> images and GRUB itself. You could also add the 1.30 @@ -55,7 +55,7 @@ 1.31 modify the filesystem - this does however require some extra manipulation and a bit more time.</p> 1.32 1.33 <a name="pre"></a> 1.34 -<h3>Organisation and preparation</h3> 1.35 +<h3>Organization and preparation</h3> 1.36 <p> 1.37 To begin, first we must define where we are going to work by creating a directory and several sub directories 1.38 to accomodate all the different files. The <em>hacking</em> of the ISO can be done from within a SliTaz system or any 1.39 @@ -77,9 +77,9 @@ 1.40 </pre> 1.41 <h4>Getting the contents of the ISO</h4> 1.42 <p> 1.43 -Now that you are in the working directory, we must create the root of the amended CD-ROM and retrieve the files contained on the original Slitaz ISO - namely, the Linux Kernel (<code>bzImage</code>), the compressed 1.44 +Now that you are in the working directory, we must create the root of the amended CD-ROM and retrieve the files contained on the original SliTaz ISO - namely, the Linux Kernel (<code>bzImage</code>), the compressed 1.45 filesystem (<code>rootfs.gz</code>) and the isolinux bootloader files. To recover these files you have two 1.46 -options, either take them from a burnt CD or from an ISO image stored locally. To create the root of your CD 1.47 +options, either take them from a burned CD or from an ISO image stored locally. To create the root of your CD 1.48 (<code>rootcd</code>) and copy files from the cdrom device <code>/dev/cdrom</code> mounted on 1.49 <code>/media/cdrom</code>: 1.50 </p> 1.51 @@ -110,16 +110,16 @@ 1.52 <p> 1.53 The addition of various files and directories to the ISO image simply consists of copying data to 1.54 the root of the cdrom (<code>rootcd/</code>) and generating a new image. The data may be classified 1.55 -in one or two directories created in the root of the CD. Once the ISO image is burnt to a CD-R/CD-RW 1.56 +in one or two directories created in the root of the CD. Once the ISO image is burned to a CD-R/CD-RW 1.57 you can use SliTaz as before, mounted on <code>/media/cdrom</code> and navigate through your data using 1.58 -emelFM2, Clex or the command line. You data will also be legible from all GNU/Linux systems, BSD or even 1.59 +emelFM2, Clex or the command line. Your data will also be legible from all GNU/Linux systems, BSD or even 1.60 ... Windows. 1.61 </p> 1.62 <h4>Create directories and copy data</h4> 1.63 <p> 1.64 To create and copy files, you can start by using the command line and then continue on graphically as a simple 1.65 -user. We will create a <code>images/</code> directory as <em>root</em> and change the permissions so that all 1.66 -users can have write access: 1.67 +user. We will create an <code>images/</code> directory as <em>root</em> and change the permissions so that all 1.68 +users have write access: 1.69 </p> 1.70 <pre> # mkdir rootcd/images 1.71 # chmod 777 rootcd/images 1.72 @@ -183,8 +183,8 @@ 1.73 <a name="memtest"></a> 1.74 <h3>Install and use Memtest86</h3> 1.75 <p> 1.76 -The application memtest86 (92 kB) is a tool for testing your system memory (RAM). 1.77 -Memtest86 performs in depth tests, that if failed, point heavily towards a hardware fault. 1.78 +The application memtest86 (92 kB) is a tool for testing your system memory (RAM). 1.79 +Memtest86 performs indepth tests, that if failed, point heavily towards a hardware fault. 1.80 The tool resides in the <code>boot/</code> directory and can be launched directly by typing 1.81 <code>memtest</code> at the isolinux boot prompt. Navigate to <code>/home/slitaz/src</code> 1.82 (if the directory dosen't exist: <code>mkdir -p /home/slitaz/src</code>), download the source 1.83 @@ -196,7 +196,7 @@ 1.84 <p> 1.85 On unpacking the source of the memtest86 package you'll find a 1.86 <code>README</code> providing information about the tool. Now you can install 1.87 -into the <em>root CD</em> of your ISO hacked. Based on the premise that you'll be 1.88 +into the <em>root CD</em> of your hacked ISO. Based on the premise that you'll be 1.89 working with a <code>/home/slitaz/hacked</code> directory, we will copy the binary 1.90 you precompiled into the <code>boot/</code> directory of the root of the CD: 1.91 </p> 1.92 @@ -238,7 +238,7 @@ 1.93 Now that you have the compressed copy of the system, just unpack with <code>cpio</code>. 1.94 Technically <code>rootfs.gz</code> is a cpio file compressed with lzma or gzip. It's recognized like an 1.95 <code>initramfs</code> image by the Linux Kernel. At the start up of the machine, the Kernel is loaded into 1.96 -memory, which then decompresses the system image and carries out the initialization scripts. </p> 1.97 +memory and then decompresses the system image and carries out the initialization scripts. </p> 1.98 <p>To extract the file system 1.99 into <code>rootfs/</code> and delete the unarchived copy (remember you can copy & paste): 1.100 </p>