Manual code building, installation of tar.gz

Manual code building, installation of tar.gz
Manual code building, installation of tar.gz
Anonim

Quite often, it is not possible to find ready-made installation deb packages on the Internet, and the required version of the program may not be available in the standard repositories of Linux OS distributions. Therefore, you yourself have to resort to assembling the application from source codes. The latter are distributed in special archives of the tar.gz or tar.bz2 format.

Go to the folder containing the required archive

This installation of tar.gz is done using the "checkinstall" command. First, you need to build an installation deb package from the code. So, if the main command is not installed, then you need to write in the terminal: "sudo apt-get install checkinstall". After that, you need to go to the folder where the desired archive is located, using the command “cd directory_program_source_code”.

installing tar gz
installing tar gz

In this case, the installation is from tar.gz, so it needs to be unzipped with "tar -zxf programname.tar.gz" or "tar -jxf programname.bz2", respectively.

To achieve the desired result, you can also extract files with the archive manager. It is worth noting that for more convenient work on the command line, a wonderful TAB button was invented, which allows you to automatically complete complexnames of folders, files or archives. To do this, it is enough to enter only the first letters of the name.

Configuration of program source codes for your distribution

In simple terms, installing tar.gz necessarily involves configuration, which means setting up files with the desired text for a specific operating system. After such an action, a file is created that describes the system configuration. For such purposes, the “./configure” command was invented. The OS itself does not change in any way after this, so the command is completely safe and will not damage the stability of the system.

Installing from tar gz
Installing from tar gz

Also, the author of the application may wish to complete the installation keys, so to view the necessary instructions from the creator, you can type "./configure –help" or open the readme or install file, installing tar.gz archives all this includes. This stage is the most difficult, because in order to properly complete the process, you need to install all additional dependent packages. Therefore, if the installation of the configuration stopped in the middle of the process, then you need to add the necessary packages to the system. At the same time, all the names of the necessary libraries and packages are indicated in the terminal. So, having a good understanding, you can easily navigate in such settings.

Building deb packages

The previously mentioned "checkinstall" program is just for creating and installing the necessary packages for various distributions, for example, deb packages that are widely used in an OS such as ubuntu.

Ubuntu installation tar gz
Ubuntu installation tar gz

Installing tar.gz ultimately boils down to just that. The "–D" key is added to specify the exact assembly type. That is, the whole command looks like this: "sudo checkinstall -D". All further installation and location of the program will take place in the same folder. To remove the program, you can use standard tools such as Aptitude remove, Aptitude purge, Synaptic. The described installation of tar.gz is not the only way, but may be the preferred way for many users. Nevertheless, you need to be very careful and attentive, as everywhere there are pitfalls.

Popular topic

Editor's choice

  • Windows 7 password bypass: possible methods and recommendations from experts
    Windows 7 password bypass: possible methods and recommendations from experts

    The fact that users (most often computer administrators) protect Windows operating systems from unauthorized use, for example, in their absence at the computer, does not surprise anyone. However, often the administrator may not give the registered user enough rights to perform any actions or set personal settings, and therefore it may be necessary to log in with an administrator registration

  • How to remove a virus from a flash drive without losing data?
    How to remove a virus from a flash drive without losing data?

    Removable USB storage devices in the form of the most common flash drives are susceptible to viruses no less than hard drives with operating systems installed on them. And it is often quite problematic to identify the presence of such a threat or neutralize it. How to remove a virus from a flash drive and restore files (hidden or infected) will be discussed further

  • File viruses are computer code to achieve goals bypassing security systems
    File viruses are computer code to achieve goals bypassing security systems

    File viruses are computer code to achieve goals bypassing security systems. This is what inspired people to create antiviruses, what allows hackers to learn and steal millions of dollars every day

  • PC prevention for stable operation - expert advice. Computer help
    PC prevention for stable operation - expert advice. Computer help

    The fact that almost all modern computer systems require constant care, apparently, all users know. But not everyone has a clear enough idea of what this should manifest itself in. To keep the computer, operating system and installed applications in the most efficient condition, it is necessary to carry out preventive maintenance of the PC software and monitor the hardware components (installed equipment)

  • Detector software: what is it in the field of anti-virus protection?
    Detector software: what is it in the field of anti-virus protection?

    Apparently, many users of modern computer systems have heard or know that there are so-called detector programs. What they are is easy to understand if you just turn to the translation or interpretation of the English word detect, which literally means “to detect”