Buscar

Este contenido no está disponible en el idioma seleccionado.

15.3. Mounting, Unmounting and Ejecting

download PDF
In virtual file systems, particular resources are set to be mounted automatically, but a most common way is to trigger mounts manually.

Procedure 15.1. Manual Mounting

  1. Open a file in Nautilus (that is, the Files application).
  2. In the location bar at the top of your screen, enter a well-formed URI string. If the location bar does not display, press Ctrl+L.
    Alternatively, Nautilus provides Connect to server dialog, which you find by going into Files Connect to server.
  3. When asked for login credentials, type your name and password into the relevant entry boxes.
  4. Once the mounting process is finished, your are allowed to work with files.
When you need to unmount the resource, follow the simple procedure below.

Procedure 15.2. Unmounting

  1. Click the eject icon on the chosen mount.
  2. Wait until the mount disappears or notification about safe removal is displayed.

Important

Data may be cached or being slowly written in the background for performance reasons. To deliver the data safely on the device or remote resource, never unplug or disconnect the device or remote resource.
Mounts are shared between applications and are tracked globally within the running desktop session, which means that even if you quit an application that triggered the mount, it continues to be available for any other application. The same way multiple applications may access the mount at the same time, unless it was limited by a back end (some protocols permit only single channel due to their design).

Important

GVFS mounts, (and physical volumes as well, are restricted to their owner only, no other user is permitted to exploit your privacy.
Red Hat logoGithubRedditYoutubeTwitter

Aprender

Pruebe, compre y venda

Comunidades

Acerca de la documentación de Red Hat

Ayudamos a los usuarios de Red Hat a innovar y alcanzar sus objetivos con nuestros productos y servicios con contenido en el que pueden confiar.

Hacer que el código abierto sea más inclusivo

Red Hat se compromete a reemplazar el lenguaje problemático en nuestro código, documentación y propiedades web. Para más detalles, consulte el Blog de Red Hat.

Acerca de Red Hat

Ofrecemos soluciones reforzadas que facilitan a las empresas trabajar en plataformas y entornos, desde el centro de datos central hasta el perímetro de la red.

© 2024 Red Hat, Inc.