cTI
|
Download the cTI System
From this page you will be able to access
the cTI's sources in a variety of different ways: choose the method
that better suits your needs.
For those concerned with security, we provide ways to verify the authenticity of the packages. You can also access the sources using CVS: we provide both read-only anonymous access and authenticated read-write access for recognized developers. In addition, we host a Web interface to the CVS repository that is easy to use and comes in handy if you want to browse the sources and see how they evolve. Finally, you can obtain a mirror of the cTI CVS repository and various other cTI-related data through our anonymous rsync access. RequirementsIn order to use cTI you should have the following tools and libraries installed on your system:
If you want to port cTI to other Prolog systems we will be glad
to work with you in order to fix the problems that may arise.
You may import the key into your keyring by saving it in a file,
and then issuing the command
Verifying FilesIn our distribution areas, a file calledfilename.sign
contains the digital signature for filename .
In order to verify the signature you can issue the command
For those only wishing to verify that files have not been corrupted or
tampered with, we also provide files called MD5SUMS
containing MD5 fingerprints.
The contents of these files is something like
You may check the fingerprint of, say,150b6e9bc68b25923d32247031447e0d filename1 5a46c39de027a658c15ed03a7c308e81 filename2 e82a866bb00edf31b2282747354f459c filename3 filename2
by issuing the command
and making sure the output is
Alternatively, you may check the fingerprints of several files at once with the command5a46c39de027a658c15ed03a7c308e81 filename2
possibly ignoring the errors concerning the files you did not download.
For example, if you downloaded
filename1 and filename2
but not filename3 ,
everything is fine if your output is something like
Contrast this with the situation wherefilename1: OK filename2: OK md5sum: filename3: No such file or directory filename3: FAILED open or read md5sum: WARNING: 1 of 3 listed files could not be read filename3 exists
but is corrupted.
Expect your output to look like
filename1: OK filename2: OK filename3: FAILED md5sum: WARNING: 1 of 3 computed checksums did NOT match Handling .bz2 FilesThe.bz2 extension belongs
to the bzip2
compression utility (the successor of good old gzip ).
You may unpack file.tar.bz2
directly using the commands
(new versions of tar ), or
(older versions of tar ), or
(all versions of tar ).
[Page last updated on January 18, 2013, 10:08:09.] |
||
|
Home | Download |