website diff en/doc/handbook/hacking-livecd.html @ rev 117

en: Typos, spelling, wording, etc.
author Mike D. Smith <MikeDSmith25@gmail.com>
date Sat Jul 19 16:23:18 2008 +0000 (2008-07-19)
parents f0c0c73578c0
children ac2165edb8fc
line diff
     1.1 --- a/en/doc/handbook/hacking-livecd.html	Sat Jun 14 14:48:17 2008 +0000
     1.2 +++ b/en/doc/handbook/hacking-livecd.html	Sat Jul 19 16:23:18 2008 +0000
     1.3 @@ -7,7 +7,7 @@
     1.4      <meta http-equiv="content-type" content="text/html; charset=ISO-8859-1" />
     1.5      <meta name="description" content="slitaz English handbook" />
     1.6      <meta name="expires" content="never" />
     1.7 -    <meta name="modified" content="2008-02-26 18:30:00" />
     1.8 +    <meta name="modified" content="2008-07-17 00:15:00" />
     1.9      <meta name="publisher" content="www.slitaz.org" />
    1.10      <meta name="author" content="Christophe Lincoln" />
    1.11      <link rel="shortcut icon" href="favicon.ico" />
    1.12 @@ -33,7 +33,7 @@
    1.13  
    1.14  <ul>
    1.15      <li><a href="#intro">Introduction.</a></li>
    1.16 -    <li><a href="#pre">Organisation and preparation.</a></li>
    1.17 +    <li><a href="#pre">Organization and preparation.</a></li>
    1.18      <li><a href="#add-files">Add files to the ISO.</a></li>
    1.19      <li><a href="#isolinux">Modify the isolinux configuration.</a></li>
    1.20      <li><a href="#memtest">Install and use Memtest86.</a></li>
    1.21 @@ -47,7 +47,7 @@
    1.22  <em>Hacking SliTaz LiveCD</em> or how to have fun with the LiveCD ISO image. Note that you can also
    1.23  <a href="gen-livecd.html">create a custom flavor with Tazlito</a>.
    1.24  Creating your own bootable ISO image is easily achievable and the steps are carefully described here. The manipulation of a personal ISO image can add new files or modify existing
    1.25 -ones found on the Slitaz Live CD. The Slitaz ISO image  is less than 30 MB and a CD-R or CD-RW provides around 700 MB,
    1.26 +ones found on the SliTaz Live CD. The SliTaz ISO image is less than 30 MB and a CD-R or CD-RW provides around 700 MB,
    1.27  so there's plenty of scope for expansion. For example, you could store your images and even provide a <em>live</em> slideshow 
    1.28  using GQview. The <em>hacking</em> of the ISO image allows you to modify boot loader configuration files 
    1.29  (<em>boot loader</em>), <em>splash</em> images and GRUB itself. You could also add the
    1.30 @@ -55,7 +55,7 @@
    1.31  modify the filesystem - this does however require some extra manipulation and a bit more time.</p>
    1.32  
    1.33  <a name="pre"></a>
    1.34 -<h3>Organisation and preparation</h3>
    1.35 +<h3>Organization and preparation</h3>
    1.36  <p>
    1.37  To begin, first we must define where we are going to work by creating a directory and several sub directories
    1.38  to accomodate all the different files. The <em>hacking</em> of the ISO can be done from within a SliTaz system or any
    1.39 @@ -77,9 +77,9 @@
    1.40  </pre>
    1.41  <h4>Getting the contents of the ISO</h4>
    1.42  <p>
    1.43 -Now that you are in the working directory, we must create the root of the amended CD-ROM and retrieve the files contained on the original Slitaz ISO - namely, the Linux Kernel (<code>bzImage</code>), the compressed
    1.44 +Now that you are in the working directory, we must create the root of the amended CD-ROM and retrieve the files contained on the original SliTaz ISO - namely, the Linux Kernel (<code>bzImage</code>), the compressed
    1.45  filesystem (<code>rootfs.gz</code>) and the isolinux bootloader files. To recover these files you have two
    1.46 -options, either take them from a burnt CD or from an ISO image stored locally. To create the root of your CD
    1.47 +options, either take them from a burned CD or from an ISO image stored locally. To create the root of your CD
    1.48  (<code>rootcd</code>) and copy files from the cdrom device <code>/dev/cdrom</code> mounted on 
    1.49  <code>/media/cdrom</code>:
    1.50  </p>
    1.51 @@ -110,16 +110,16 @@
    1.52  <p>
    1.53  The addition of various files and directories to the ISO image simply consists of copying data to
    1.54  the root of the cdrom (<code>rootcd/</code>) and generating a new image. The data may be classified
    1.55 -in one or two directories created in the root of the CD. Once the ISO image is burnt to a CD-R/CD-RW
    1.56 +in one or two directories created in the root of the CD. Once the ISO image is burned to a CD-R/CD-RW
    1.57  you can use SliTaz as before, mounted on <code>/media/cdrom</code> and navigate through your data using
    1.58 -emelFM2, Clex or the command line. You data will also be legible from all GNU/Linux systems, BSD or even
    1.59 +emelFM2, Clex or the command line. Your data will also be legible from all GNU/Linux systems, BSD or even
    1.60  ... Windows.
    1.61  </p>
    1.62  <h4>Create directories and copy data</h4>
    1.63  <p>
    1.64  To create and copy files, you can start by using the command line and then continue on graphically as a simple
    1.65 -user. We will create a <code>images/</code> directory as <em>root</em> and change the permissions so that all
    1.66 -users can have write access:
    1.67 +user. We will create an <code>images/</code> directory as <em>root</em> and change the permissions so that all
    1.68 +users have write access:
    1.69  </p>
    1.70  <pre> # mkdir rootcd/images
    1.71   # chmod 777 rootcd/images
    1.72 @@ -183,8 +183,8 @@
    1.73  <a name="memtest"></a>
    1.74  <h3>Install and use Memtest86</h3>
    1.75  <p>
    1.76 -The application memtest86 (92 kB) is a tool for  testing your system memory (RAM).
    1.77 -Memtest86 performs in depth tests, that if failed, point heavily towards a hardware fault.
    1.78 +The application memtest86 (92 kB) is a tool for testing your system memory (RAM).
    1.79 +Memtest86 performs indepth tests, that if failed, point heavily towards a hardware fault.
    1.80  The tool resides in the <code>boot/</code> directory and can be launched directly by typing
    1.81  <code>memtest</code> at the isolinux boot prompt. Navigate to <code>/home/slitaz/src</code>
    1.82  (if the directory dosen't exist: <code>mkdir -p /home/slitaz/src</code>), download the source
    1.83 @@ -196,7 +196,7 @@
    1.84  <p>
    1.85  On unpacking the source of the memtest86 package you'll find a 
    1.86  <code>README</code> providing information about the tool. Now you can install
    1.87 -into the <em>root CD</em> of your ISO hacked. Based on the premise that you'll be
    1.88 +into the <em>root CD</em> of your hacked ISO. Based on the premise that you'll be
    1.89  working with a <code>/home/slitaz/hacked</code> directory, we will copy the binary 
    1.90  you precompiled into the <code>boot/</code> directory of the root of the CD:
    1.91  </p>
    1.92 @@ -238,7 +238,7 @@
    1.93  Now that you have the compressed copy of the system, just unpack with <code>cpio</code>.
    1.94  Technically <code>rootfs.gz</code> is a cpio file compressed with lzma or gzip. It's recognized like an
    1.95  <code>initramfs</code> image by the Linux Kernel. At the start up of the machine, the Kernel is loaded into
    1.96 -memory, which then decompresses the system image and carries out the initialization scripts. </p>
    1.97 +memory and then decompresses the system image and carries out the initialization scripts. </p>
    1.98  <p>To extract the file system
    1.99    into <code>rootfs/</code> and delete the unarchived copy (remember you can copy &amp; paste):
   1.100  </p>