CD-ROM and Linux
If you encounter problems setting up CD-ROM support under Linux, here is a list of things to check for. (See the CD-ROM HOWTO for more information.)
Are the appropriate CD-ROM driver(s) compiled in the kernel? Try the command cat/proc/devices to see which drivers are installed.
Are you running the newly configured kernel? Use uname -a and check the time-stamp to see.
Is the drive recognized at boot time? The dmesg command should redisplay the boot messages if they scroll by too quickly to read.
Did you create the proper device files and set protections? The /dev/MAKEDEV script is one way to do this.
Is the ISO-9660 file system compiled in the kernel? Try cat /proc/filesystems and look for iso9660.
Is there a known good CD-ROM (not audio CD) in the drive?
Did you use the correct options to mount? You need to specify -t iso9660, -r (read-only), the CD-ROM device file, and an empty directory. You should run this as user “root”.
Can you read data from the drive? Try using the dd command and checking for disk activity (e.g., dd if=/dev/cdrom of=/dev/null bs=2048).
For some drives, if they are located at a non-standard I/O address, you may need to edit the appropriate kernel driver header file.
Here are a number of additional useful sources of information related to CD-ROM under Linux.
The Linux CD-ROM, SCSI, and Distribution HOWTO documents are freely available from major Linux archive sites, including sunsite.unc.edu in the directory /pub/Linux/docs/HOWTO. For those without network access, printed copies of the Linux HOWTOs are also published by a number of vendors, or you may be able to find them on a local computer bulletin board system.
The latest and most complete information on the Panasonic/SoundBlaster CD-ROM kernel driver can be found in the file README.sbpcd, usually found in the directory /usr/src/linux/drivers/block.
Additional information on commands such as mount and umount can be found in the corresponding Linux man pages.
For those with access to Usenet, the following news groups discuss information related to CD-ROM:
A Frequently Asked Questions (FAQ) document for the alt.cd-rom newsgroup is also available; it is archived on many Internet sites including rtfm.mit.edu.
The Internet site ftp.cdrom.com has a large archive of CD-ROM information and software; look in the directory /pub/cdrom.
The Linux Documentation Project has produced several books on Linux; the most useful for new users is Linux Installation and Getting Started. These are freely available by anonymous FTP from major Linux archive sites or can be purchased in hard-copy format.
The Linux Software Map (LSM) is an invaluable reference for locating Linux software, including the programs mentioned in this article. The LSM can be found on various anonymous FTP sites, including sunsite.unc.edu:/pub/Linux/docs/LSM.gz.
(Jeff.Tranter@Software.Mitel.com) is a software designer for a telecommunications company in Ottawa, Canada. He has been using Linux for almost two years and is the author of the Linux Sound and CD-ROM HOWTO documents.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Firefox 46.0 Released
- Ubuntu Online Summit
- Devuan Beta Release
- The Qt Company's Qt Start-Up
- May 2016 Issue of Linux Journal
- The US Government and Open-Source Software
- The Death of RoboVM
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- New Container Image Standard Promises More Portable Apps
- Open-Source Project Secretly Funded by CIA
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide