Browse Source

Simplification

Bob Mottram 9 years ago
parent
commit
f56842f7c3
3 changed files with 17 additions and 23 deletions
  1. 7
    10
      doc/EN/installation.org
  2. BIN
      man/freedombone.1.gz
  3. 10
    13
      website/EN/installation.html

+ 7
- 10
doc/EN/installation.org View File

@@ -72,10 +72,10 @@ freedombone menuconfig
72 72
 ** On a single board computer (SBC)
73 73
 Currently the following boards are supported:
74 74
 
75
-    [[http://beagleboard.org/BLACK][Beaglebone Black]]
76
-    [[http://linux-sunxi.org/Cubietech_Cubieboard2][Cubieboard 2]]
77
-    [[https://linux-sunxi.org/Cubietruck][Cubietruck (Cubieboard 3)]]
78
-    [[https://www.olimex.com/Products/OLinuXino/A20/A20-OLinuXIno-LIME2/open-source-hardware][olinuxino Lime2]]
75
+ * [[http://beagleboard.org/BLACK][Beaglebone Black]]
76
+ * [[http://linux-sunxi.org/Cubietech_Cubieboard2][Cubieboard 2]]
77
+ * [[https://linux-sunxi.org/Cubietruck][Cubietruck (Cubieboard 3)]]
78
+ * [[https://www.olimex.com/Products/OLinuXino/A20/A20-OLinuXIno-LIME2/open-source-hardware][olinuxino Lime2]]
79 79
 
80 80
 If there is no existing image available then you can build one from scratch. See the section above on how to do that. If an existing image is available then you can download it and check the signature with:
81 81
 
@@ -172,8 +172,7 @@ This is the traditional security model in which you carry your full keyring on a
172 172
 
173 173
 #+BEGIN_SRC bash
174 174
 ssh myusername@mydomainname -p 2222
175
-su
176
-control
175
+sudo control
177 176
 #+END_SRC
178 177
 
179 178
 Select /Backup and Restore/ then /Backup GPG key to USB (master keydrive)/.
@@ -182,8 +181,7 @@ This breaks your GPG key into a number of fragments and randomly selects one to
182 181
 
183 182
 #+BEGIN_SRC bash
184 183
 ssh myusername@mydomainname -p 2222
185
-su
186
-control
184
+sudo control
187 185
 #+END_SRC
188 186
 
189 187
 Select /Backup and Restore/ then /Backup GPG key to USB (fragment keydrive)/.
@@ -206,8 +204,7 @@ To administer the system after installation log in via ssh, become the root user
206 204
 
207 205
 #+BEGIN_SRC bash
208 206
 ssh myusername@freedombone.local -p 2222
209
-sudo su
210
-control
207
+sudo control
211 208
 #+END_SRC
212 209
 
213 210
 From there you will be able to perform various tasks, such as backups, adding and removing users and so on. You can also do this via commands, which are typically installed as /usr/local/bin/freedombone* and the corresponding manpages.

BIN
man/freedombone.1.gz View File


+ 10
- 13
website/EN/installation.html View File

@@ -3,7 +3,7 @@
3 3
 "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd">
4 4
 <html xmlns="http://www.w3.org/1999/xhtml" lang="en" xml:lang="en">
5 5
 <head>
6
-<!-- 2015-12-03 Thu 12:19 -->
6
+<!-- 2015-12-03 Thu 12:26 -->
7 7
 <meta  http-equiv="Content-Type" content="text/html;charset=utf-8" />
8 8
 <meta  name="viewport" content="width=device-width, initial-scale=1" />
9 9
 <title></title>
@@ -319,12 +319,12 @@ freedombone menuconfig
319 319
 Currently the following boards are supported:
320 320
 </p>
321 321
 
322
-<p>
323
-<a href="http://beagleboard.org/BLACK">Beaglebone Black</a>
324
-<a href="http://linux-sunxi.org/Cubietech_Cubieboard2">Cubieboard 2</a>
325
-<a href="https://linux-sunxi.org/Cubietruck">Cubietruck (Cubieboard 3)</a>
326
-<a href="https://www.olimex.com/Products/OLinuXino/A20/A20-OLinuXIno-LIME2/open-source-hardware">olinuxino Lime2</a>
327
-</p>
322
+<ul class="org-ul">
323
+<li><a href="http://beagleboard.org/BLACK">Beaglebone Black</a></li>
324
+<li><a href="http://linux-sunxi.org/Cubietech_Cubieboard2">Cubieboard 2</a></li>
325
+<li><a href="https://linux-sunxi.org/Cubietruck">Cubietruck (Cubieboard 3)</a></li>
326
+<li><a href="https://www.olimex.com/Products/OLinuXino/A20/A20-OLinuXIno-LIME2/open-source-hardware">olinuxino Lime2</a></li>
327
+</ul>
328 328
 
329 329
 <p>
330 330
 If there is no existing image available then you can build one from scratch. See the section above on how to do that. If an existing image is available then you can download it and check the signature with:
@@ -595,8 +595,7 @@ This is the traditional security model in which you carry your full keyring on a
595 595
 <div class="org-src-container">
596 596
 
597 597
 <pre class="src src-bash">ssh myusername@mydomainname -p 2222
598
-su
599
-control
598
+sudo control
600 599
 </pre>
601 600
 </div>
602 601
 
@@ -615,8 +614,7 @@ This breaks your GPG key into a number of fragments and randomly selects one to
615 614
 <div class="org-src-container">
616 615
 
617 616
 <pre class="src src-bash">ssh myusername@mydomainname -p 2222
618
-su
619
-control
617
+sudo control
620 618
 </pre>
621 619
 </div>
622 620
 
@@ -660,8 +658,7 @@ To administer the system after installation log in via ssh, become the root user
660 658
 <div class="org-src-container">
661 659
 
662 660
 <pre class="src src-bash">ssh myusername@freedombone.local -p 2222
663
-sudo su
664
-control
661
+sudo control
665 662
 </pre>
666 663
 </div>
667 664