Monthly Archives: August 2012

How To Install Cinnamon Desktop On Fedora 17

This tutorial shows how you can install Linux Mint’s Cinnamon desktop on Fedora 17. Since it has now been included in the repositories this can now be done quite quickly. Fedora’s default desktop at the moment is GNOME 3.

This document comes without warranty of any kind! I do not issue any guarantee that this will work for you!

 

1 Update Sources

Before you can install Cinnamon you need to check if your system is up to date and install the latest updates. To do that, you need to open a terminal. Open the menu and type terminal:

Once inside the terminal, log in as root:

su

Afterwards, check for updates and install them:

yum update

 

2 Install Cinnamon

Still in the terminal, you can now install Cinnamon. Enter following:

yum install cinnamon

Afterwards, log out of your current desktop session. You can now switch desktops in the login screen after you selected the account you want to log in with. Click on Session and select Cinnamon:

After logging in again your desktop should have changed:

Concept about 1-click away software installation from PPAs? Is this possible?

At the moment, installing an app from a PPA is to be done by typing (or usually copy&pasting) 3 command into the terminal

sudo add-apt-repository ppa:mycustomstuff/ppa
sudo apt-get update
sudo apt-get install mycustomstuff

While the above commands are clear and one can easily paste them into a terminal, they are definitely intimidating for newcomers, “frightened” by the “deep” text-only terminal, approach seen across the internets, daily people are saying “How can Ubuntu grow with such type of typing-based installations?”, “Why can’t this be more simple?”, etc.

The desired solution is this:

Ubuntu Software Center support installing apps by clicking a link, such as apt://, meaning, clicking on a link like apt://gedit opens the USC with Gedit in its main view, from where the user can simply click Install to install the Gedit app.

The same thing can probably be achieved with PPAs.

Navigating to a PPA, one can see its structure:

  • PPA description (the developer describes the PPA’s packages)
  • its name (such as ppa:ian-berke/ppa-drawers)
  • its packages (the actual contained applications)

How can this be transformed into a 1-click installation in a matter of developer-time days?
Launchpad is to generate a link next to the application, meaning, the new addition is to be exposed as an icon (and/or text) in a separate area, clicking on it opens USC with the app in its main view, clicking USC’s Install, installs the actual application.

The launchpad generated link must be different from the regular apt:// link in order to “force” USC to first add the PPA and to update the sources.
Probably the link should look like apt-launchpad://
Probably, an apt-launchpad:// should contain/trigger the PPA’s accurate name (needed to be added to software sources) probably via a separate script, because the actual clicking is to be performed only an preferred apps, (newcomers) completely ignoring other elements.

The tricky part: in order to expose the PPA’s apps into the USC, the actual PPA (of origin) must be added with specific commands (such as sudo add-apt-repository sudo apt-get update), commands to be performed under-the-hood, without the user to actually see them.
So, the desired process is clicking on the PPA’s 1-click install icon and Ubuntu (under-the-hood) performs adding the PPA and updating the sources, then USC is opened with the application ready-to-be-installed.

More advanced usage: a PPA containing numerous packages but only 1 app, should receive an apt-launchpad:// link only next to the actual app, so, a PPA containing firefox, liblibrary1, liblibrary2, liblibrary3, receives a 1-click install link next to firefox only, ignoring the mentioned libraries.

Generating apt-launchpad:// links is to be performed automatically for every app created on launchpad and on every app version update, while in the same time keeping the traditional method and available details displayed for more advanced terminal-based users.

The apt-launchpad approach is to support not only launchpad webpages, but also equally-important regular webpages, consequently, a blogger/user/open-source advocate can post an apt-launchpad link when another user is asking “Hey, how/from-where can I install the x app?, followed by the help-person providing a link like apt-launchpad://xcustomapp, clicking on it follows the above USC-based installation behavior.

A possible like-a-regular-web-link specific approach, could be clicking on an apt-launchpad link, thus sending a “message” to USC, then USC sends a message to launchpad receiving the PPA’s “metadata” (especially the accurate PPA name), then USC adds the PPA, then USC opens it in the installation regular view; the process if represented as such:

then again

What do you think about this method?
Please, answer with
1)That’s brilliant
2)Could be a good idea if …
3)Hmmm, not a much of a deal
4)Bad idea

 

Source

 

Important Websites for web developers

For Free Websites Creation:

http://www.hpage.com

www.webs.com

http://www.wordpress.com        

www.indiainternetready.com

www.wix.com

www.indiagetonline.com             

www.bigrock.in

www.yola.com

www.jimdo.com

www.freewebsites.com                         

www.terapad.com          

www.hpage.comwww.xat.com

Free Themes websites   

www.apycom.com

http://www.elegantthemes.com/demo/?theme=Aggregate

http://tools.dynamicdrive.com

Image Optimizer Website

www.imageoptimizer.net/Home.aspx

Language Translates Website

  http://www.google.com/transliterate/tamil     

Snow Fall website

http://rainbow.arch.scriptmania.com/scripts/bg/snow_fall.html

Php, Html ,Css,Javascript, Mysql, School WebSite

www.w3schools.com

www.quackit.com

www.2createawebsite.com

www.code-generator.net

www.panoramio.com

Free Logo , Banner and Business card Creation Web site links

Free Logo

Free Bannar

123Bannar

Bannar generator

Bannarfans

Bannarmaker

NewBannar

www.mybannermaker.com

www.degraeve.com/business-cards

textspace.net

www.firstphera.com

www.juicybc.com

www.freeprintablebusinesscards.net

www.nchsoftware.com

businesscardstar.com

cooltext.com

www.apachefriends.org

tamilwares.blogspot

www.globaltemplates.com

SEO Search Engine Optimization

About SEO

 

Kirthee Services

What is Search Engine optimization?

Search Engine Optimization is the process of getting your site a higher rank in the search engine listing. This optimization is done so as to increase the site traffic and increase the number of visitors to your website. A customized Search Engine Optimization Services can increases the website’s exposure across all major search engines.

Creating Strong Passwords

“Treat your password like your toothbrush. Don’t let anybody else use it, and get a new one every six months” – Clifford Stoll

When you create an account on a website, you may have the “password dilemma” for a second. The dilemma is whether you should provide a weak password that is easy to remember or a strong password that is hard to remember. Following are the rules and guidelines that may help you in overcoming the password dilemma and help you in creating a strong password that are secure. These are the things that I’ve used over years based on my own interest in the area of keeping the password safe and secure.

I. Two essential password rules:

Following two rules are bare minimal that you should follow while creating a password.

Rule 1 – Password Length: Stick with passwords that are at least 8 characters in length. The more character in the passwords is better, as the time taken to crack the password by an attacker will be longer. 10 characters or longer are better.

Rule 2 – Password Complexity: Should contain at least one character from each of the following group. At least 4 characters in your passwords should be each one of the following.

  1. Lower case alphabets
  2. Upper case alphabets
  3. Numbers
  4. Special Characters

I call the above two rules combined as “8 4 Rule” (Eight Four Rule):

  • 8 = 8 characters minimum length
  • 4 = 1 lower case + 1 upper case + 1 number + 1 special character.

Just following the “8 4 Rule” will be a huge improvement and instantly make your password much stronger than before for most of you who don’t follow any guidelines or rules while creating a passwords. If your banking and any financially sensitive website passwords doesn’t follow the “8 4 Rule”, I strongly suggest that you stop everything now and change those passwords immediately to follow the “8 4 Rule”.

II. Guidelines for creating strong passwords:

  1. Follow “8 4 Rule”. Like I mentioned above this is the foundation of creating a strong password.
  2. Unique Characters. Should contain at least 5 unique characters. You already have 4 different character if you’ve followed “8 4 Rule”.
  3. Use Password Manager. Strong passwords are hard to remember. So, as part of creating a strong password you need a reliable and trustworthy way of remembering the strong password. Using password management tool to store passwords should really become a habit. Anytime you create a password, note it down on a password manager tool, that will encrypt the password and store it safe for you. I recommend Password Dragon (Shameless plug. I’m the developer of this software), a free, easy and secure password manager that works on Windows, Linux and Mac. This can also be launched from the USB drive. There are lot of free password manager tools available, choose the one that best suites your taste and use it.
  4. Use Passphrase. If you don’t want to use password management tool, Use Passphrase to easily remember the passwords. You can use initials of a song or a phrase that are very familiar to you. for e.g. “Passwords are like underwears, change yours often!” phrase can be converted to a strong password “Prlu,Curs0!”

III. Guidelines for avoiding weak passwords.

Avoid the following in your passwords. Even part of your passwords should not be anything in the following items.

  1. Password same as username or part of the username
  2. Name of family members, friends or pets.
  3. Personal information about yourself or family members. This includes the generic information that can be obtained about you very easily, such as birth date, phone number, vehicle license plate number, street name, apartment/house number etc.
  4. Sequences. i.e consecutive alphabets, numbers or keys on the keyboard. for e.g. abcde, 12345, qwert.
  5. Dictionary words. Dictionary words with number or character in front or back
  6. Real word from any language
  7. Word found in dictionary with number substitution for word look alike. for e.g. Replacing the letter O with number 0. i.e passw0rd.
  8. Any of the above in reverse sequence
  9. Any of the above with a number in front or back.
  10. Empty password

IV. Common sense about passwords:

All the following points are nothing new and very much common sense. But most of the time, we tend to ignore these items.

  1. Create unique password every time. When you are changing a password for an existing account, it should not be the same as the previous password. Also, do not use incremental passwords while changing it. i.e password1, password2 etc.
  2. Change your passwords for all your accounts once every 6 months. Since passwords have a fixed length, a brute-force attack to guess the password will always succeed if enough time and processing power was available to the attacker. So, it is always recommended to change the passwords often. Schedule an recurring appointment on your calendar to change your passwords once every 6 months.
  3. Never write down your passwords. Creating a very strong password and writing it down on a paper is as bad as creating an easy to remember weak password and not writing it down anywhere. There are several interesting surveys done on this subject, where it was found that several people write down the password and keep it somewhere next to the computer. Some of them think keeping the post-it note below the mouse pad is secure enough. You should never write down the password on a paper. If you want to carry your password along with you all the times, use a password manager tool that runs from USB stick and take that with you all the times.
  4. Don’t share with anyone. Anyone includes your friends and family. Probably you might have heard the phrase “Passwords are like underwear, don’t share with anybody”. We teach our kids several things in life. Teaching them about online safety and not sharing the password with anybody should be one of them.
  5. Never keep the same password for two different sites. It is very tempting to create one set of passwords for all your emails, another password for all the banking sites, another password for all the social networking sites etc. Avoid this temptation and keep unique passwords for all your accounts.
  6. Don’t type your password when someone is looking over your shoulder. This is especially very important if you type slowly and search for the letters in the keyboard and type with one finger, as it is very easy for someone looking over your shoulder to figure out the password.
  7. Never send your password to anybody in an email. If you follow #3 mentioned above, this should not be an option. But the reason I’m specifically saying about this is because several hackers send emails as a support person and asking for your user name and password through email. Legitimate website or organization will never ask you for your user name and password either via email or over telephone.
  8. Change password immediately when they are compromised. Even if you have the slightest doubt that someone might have stolen your password, change it immediately. Don’t even waste a minute.
  9. Don’t use the “Remember password” option on the browser without setting the Master Password. Don’t use this feature of the browser to store your username and passwords without enabling the “Master Password” option. If you don’t set master password on the firefox browser, anybody who uses your firefox browser can see all the passwords that are stored in the firefox browser in plain text. Also, be very careful with this option and say ‘Not Now’ in the remember password pop-up, when you are using a system that doesn’t belong to you.
  10. Don’t type your password on a computer that does not belong to you. If possible, don’t use someone else computer that you don’t trust to login to any website, especially to very sensitive website such as banking. It is a very common practice for hackers to use key loggers that will log all the key strokes on a system, which will capture everything you type including the passwords.

Please leave your comments about this post. If you follow different methods or rules for creating a strong password, please share them with everybody in the comments.

Stages of Linux Boot process

Have you ever wondered what happens behind the scenes from the time you press the power button until the Linux login prompt appears?

The following are the 6 high level stages of a typical Linux boot process.

1. BIOS

  • BIOS stands for Basic Input/Output System
  • Performs some system integrity checks
  • Searches, loads, and executes the boot loader program.
  • It looks for boot loader in floppy, cd-rom, or hard drive. You can press a key (typically F12 of F2, but it depends on your system) during the BIOS startup to change the boot sequence.
  • Once the boot loader program is detected and loaded into the memory, BIOS gives the control to it.
  • So, in simple terms BIOS loads and executes the MBR boot loader.

2. MBR

  • MBR stands for Master Boot Record.
  • It is located in the 1st sector of the bootable disk. Typically /dev/hda, or /dev/sda
  • MBR is less than 512 bytes in size. This has three components 1) primary boot loader info in 1st 446 bytes 2) partition table info in next 64 bytes 3) mbr validation check in last 2 bytes.
  • It contains information about GRUB (or LILO in old systems).
  • So, in simple terms MBR loads and executes the GRUB boot loader.

3. GRUB

    • GRUB stands for Grand Unified Bootloader.
    • If you have multiple kernel images installed on your system, you can choose which one to be executed.
    • GRUB displays a splash screen, waits for few seconds, if you don’t enter anything, it loads the default kernel image as specified in the grub configuration file.
    • GRUB has the knowledge of the filesystem (the older Linux loader LILO didn’t understand filesystem).
    • Grub configuration file is /boot/grub/grub.conf (/etc/grub.conf is a link to this). The following is sample grub.conf of CentOS.
#boot=/dev/sda
default=0
timeout=5
splashimage=(hd0,0)/boot/grub/splash.xpm.gz
hiddenmenu
title CentOS (2.6.18-194.el5PAE)
          root (hd0,0)
          kernel /boot/vmlinuz-2.6.18-194.el5PAE ro root=LABEL=/
          initrd /boot/initrd-2.6.18-194.el5PAE.img
  • As you notice from the above info, it contains kernel and initrd image.
  • So, in simple terms GRUB just loads and executes Kernel and initrd images.

4. Kernel

  • Mounts the root file system as specified in the “root=” in grub.conf
  • Kernel executes the /sbin/init program
  • Since init was the 1st program to be executed by Linux Kernel, it has the process id (PID) of 1. Do a ‘ps -ef | grep init’ and check the pid.
  • initrd stands for Initial RAM Disk.
  • initrd is used by kernel as temporary root file system until kernel is booted and the real root file system is mounted. It also contains necessary drivers compiled inside, which helps it to access the hard drive partitions, and other hardware.

5. Init

  • Looks at the /etc/inittab file to decide the Linux run level.
  • Following are the available run levels
    • 0 – halt
    • 1 – Single user mode
    • 2 – Multiuser, without NFS
    • 3 – Full multiuser mode
    • 4 – unused
    • 5 – X11
    • 6 – reboot
  • Init identifies the default initlevel from /etc/inittab and uses that to load all appropriate program.
  • Execute ‘grep initdefault /etc/inittab’ on your system to identify the default run level
  • If you want to get into trouble, you can set the default run level to 0 or 6. Since you know what 0 and 6 means, probably you might not do that.
  • Typically you would set the default run level to either 3 or 5.

6. Runlevel programs

  • When the Linux system is booting up, you might see various services getting started. For example, it might say “starting sendmail …. OK”. Those are the runlevel programs, executed from the run level directory as defined by your run level.
  • Depending on your default init level setting, the system will execute the programs from one of the following directories.
    • Run level 0 – /etc/rc.d/rc0.d/
    • Run level 1 – /etc/rc.d/rc1.d/
    • Run level 2 – /etc/rc.d/rc2.d/
    • Run level 3 – /etc/rc.d/rc3.d/
    • Run level 4 – /etc/rc.d/rc4.d/
    • Run level 5 – /etc/rc.d/rc5.d/
    • Run level 6 – /etc/rc.d/rc6.d/
  • Please note that there are also symbolic links available for these directory under /etc directly. So, /etc/rc0.d is linked to /etc/rc.d/rc0.d.
  • Under the /etc/rc.d/rc*.d/ directories, you would see programs that start with S and K.
  • Programs starts with S are used during startup. S for startup.
  • Programs starts with K are used during shutdown. K for kill.
  • There are numbers right next to S and K in the program names. Those are the sequence number in which the programs should be started or killed.
  • For example, S12syslog is to start the syslog deamon, which has the sequence number of 12. S80sendmail is to start the sendmail daemon, which has the sequence number of 80. So, syslog program will be started before sendmail.

There you have it. That is what happens during the Linux boot process.

Source

What happens to Microsoft?

 

What is Microsoft thinking? First, the company decided that it was going to compete with its own partners of decades in the growing tablet market with its Surface tablet. Then, it decided that it’s going to force feed Windows 8 users its “Metro” interface. Can they really be surprised when their partners and customers start to turn their back on them?

Microsoft has always been a “my way or the highway” kind of company and it worked… when they have a lock on the desktop. That was in the 90s and 00s, it’s the twenty-teens now and the desktop is no longer the center of the computing universe. Now, we use tablets and smartphones as well and we do much, sometimes most, of our “desktop” work on Web sites and with cloud-based applications.

I know it, you know it, and now Acer is reminding Microsoft that they know it as well. Acer CEO JT Wang said that Microsoft competing with its partners  “will create a huge negative impact for the [computer hardware] ecosystem  and other brands may take a negative reaction. It is not something you are good at so please think twice.” Acer’s global PC operation chief Campbell Kan added Acer was debating whether to “find other alternatives” to Windows.

Microsoft won’t think twice. The company knows, and plans, on competing with its one time partners. You can think Acer saying it may walk away from Microsoft is laughable, but there’s nothing funny about it.

Think about it. If your supplier told you and the world that they were going to compete with you in the hottest part of the market, tablets, could you afford to keep working with them? In a business where the main product, PCs, have razor-thin margins? I don’t think so.

For PC vendors like Acer there’s only one viable alternative: Linux. Dell has shown that both Red Hat Enterprise Linux and Ubuntu can sell.

The vendors, however, aren’t just limited to a traditional Linux desktop. Cloud-based Linux systems, such as Peppermint and Google’s Chrome OS are also viable alternatives. In addition, Google is showing signs of releasing a version of Android that would work well as a desktop operating system.

For users, there’s also always Apple’s Macs.  Even with their high price tags, Macs keep getting more popular and its latest operating system, Mountain Lion, unlike Windows 8 is being greeted with joy by most of its users.

The same can’t be said for Windows 8. In a TechRepublic survey only 349 out of 1,888 IT pros said that their companies planned to upgrade to Windows 8. 884 said their business had no such plans while 655 were undecided.

Among other things they didn’t like about Windows 8 were: the lack of a start menu; the need for massive training to get people used to the new “Metro” interface; and the fact that the corporate desktop seems to be an afterthought. And, that was before we found out that Microsoft is, by design, going to make it harder to provide a start menu or avoid the desktop-unfriendly Metro!

It’s clear now that Windows 8 is not an operating system that Microsoft’s partners or its long-time users can love. Isn’t it time to give an alternative a try?

Is GNOME going down

Benjamin Otte, a leading GNOME developer thinks GNOME, once a popular Linux/Unix desktop but now more often used as a foundation for other desktop interfaces, is “staring into the abyss.

I can’t argue with him. I think GNOME lost its way when it decided to move from its excellent 2.x release series to a barely usable GNOME 3.x line in 2009. Like many Linux users, I loved GNOME 2.x and hated GNOME 3.x. I’m far from the only one who disliked GNOME 3.x that strongly. Linus Torvalds, Linux’s father, would like to see GNOME forked and the current GNOME 3.x buried.

It’s not like this was hard to predict. When GNOME first announced that it was going to take a very different direction with GNOME 3, many GNOME supporters doubted this path’s wisdom. By October 2010, Mark Shuttleworth, founder of Canonical, Ubuntu‘s  parent company decided to create another Linux desktop, Unity, instead of using the GNOME 3.x shell. While Ubuntu Unity has it critics, GNOME 3.x has lost many, indeed probably most, of its users.

By July 2012, of all the major Linux distributors only Fedora remains a steadfast GNOME 3.x supporter. There’s a reason for that: Otte states that GNOME is a Red Hat project.

GNOME 3.4 with Fedora 17 Picture Gallery

“If you look at the Ohloh statistics again and ignore the 3 people working almost exclusively on Gstreamer [an open-source multimedia framework] and the 2 working on translations, you get 10 Red Hat employees and 5 others. (The 2nd page looks like 6 Red Hat employees versus 8 others with 6 translators/documenters.) This gives the GNOME project essentially a bus factor of 1.”

Bus factor? It’s engineering/developer slang for how many people would need to be hit by a bus before a project would be dead. The lower the number, the more likely it is that the project is too fragile and could easily die. In other words, if Red Hat ever decided that GNOME wasn’t worth investing in, the project would be dead in the water. You can see why Otte thinks this when he also observed that core developers are leaving and that GNOME is understaffed.

What’s more important though is that “GNOME has no goals. I first noticed this in 2005 when Jeff Waugh gave his 10×10 talk. Back then, the GNOME project had essentially achieved what it set out to do: a working Free desktop environment. Since then, nobody has managed to set new goals for the project. In fact, these days GNOME describes itself as a “community that makes great software”, which is as nondescript as you can get for software development.” He’s right. That’s not exactly inspiring.

Otte is also painfully aware that:

  • Distros are dropping GNOME for other environments instead of working with GNOME.
  • Previous supporters of GNOME are scaling back their involvement or have already dropped GNOME completely.
  • Most important desktop applications have not made the switch to GNOME 3. From talking to them, it’s not a priority for most of them.
  • The claimed target users for GNOME are leaving desktop computers behind for types of devices GNOME doesn’t work on.

And, that even people inside the GNOME community feel like they’re not even being given a chance to say anything about GNOME changes, never mind being heard.

Still, as depressing as Otte’s take is, others point out that “GNOME is also about much more than the desktop environment software that constitutes the project’s hallmark product. The team creates an array of related applications, like the Evolution email client and Banshee media player, for which demand will likely remain constant even if more users move away from the GNOME shell interface. Don’t expect the project to sink into obsolescence anytime soon.”

In addition, several of the desktop interfaces that have been replacing pure GNOME, such as Ubuntu and Mint’s Cinnamon are based on GNOME. Meanwhile, at the annual GNOME developer meeting, GNOME developers Xan López and Juan José Sánchez still have big dreams for GNOME. They propose releasing GNOME 4.0 in March 2014 and have set a target of 20% market share for the desktop by 2020. That was meant as a joke, but I find it a painful one. GNOME may never have gotten to 10% of the desktop market, but at the rate it’s going pure GNOME may end up with less than 10% of the Linux desktop market.

While I wouldn’t call the GNOME programmer get-together, as Otte does, a “self-congratulating echo chamber,” I also can’t see GNOME in and of itself becoming important to the Linux desktop again. GNOME is going to stay important, but it’s no longer going to be leading the way on the Linux desktop. GNOME’s day as a leader is done.

source

Ubuntu Accomplishments! – Ubuntu goes console?

Ubuntu Accomplishments! – Ubuntu goes console?.

Create a Wallpaper Slideshow in Ubuntu

Just like Windows 7 and OS X, Ubuntu has the ability to create a slideshow wallpaper thanks to GNOME 2.28. Here is how you can take control of your wallpaper slideshows with a simple to use GUI tool or a down and dirty text editor.

The easy way

Let’s start by showing you the easy way to create a slideshow wallpaper using a GUI tool called CreBS (Create Background Slideshow). CreBS is an easy install in Ubuntu. To install the software open up a terminal and type

sudo add-apt-repository ppa:crebs/ppa
sudo apt-get update
sudo apt-get install crebs

This will install the CreBS repository, update your available packages, and then install CreBS. Once CreBS is installed, head over to your menu and launch CreBS.

To create your wallpaper slideshow just use the add button and select images to add to the wallpaper. You can also drag and drop your wallpapers to change their order.

Once you have all the images you want, change the settings below for the amount of time between slideshow changes and how long you want transitions.
After all the settings are set up the way you want, type in a name at the very bottom and then click the green check to apply and save the desktop wallpaper.

If you ever want to apply the theme again later you can right click on the desktop and select change desktop background. If you want to share the wallpaper slideshow with friends you will have to edit the xml manually so I would suggest just sending them the pictures and allowing them to recreate the theme on their system.

The manual way

If GUI’s just aren’t your thing, you can also create a wallpaper slideshow using a text editor. All you need to do is create an XML file with the following sections:

<background>
  <starttime>
    <year></year>
    <month></month>
    <day></day>
    <hour></hour>
    <minute></minute>
    <second></second>
  </starttime>
  <static>
    <duration></duration>
    <file></file>
  </static>
  <transition>
    <duration></duration>
    <from></from>
    <to></to>
  </transition>
</background>

The <starttime> section is just to say when the slideshow is to start. You can either have it start in the future or just set it to a past date and it will start instantly.

You can add as many <static> and <transition> sections as you’d like.  The <static> sections point to the actual wallpaper files and how long to show each image. The <transition> sections specify how much time to use to fade from one static image to the next. Unfortunately, you can’t set the images to be displayed randomly. Save your xml file in /usr/share/backgrounds/ to make it available for all users on the system.

Conclusion

It isn’t hard to create your own wallpaper slideshow in any Linux distribution running the GNOME desktop environment with this simple XML layout and a folder full of images. Enjoy this handy trick to customize your install.