Novell LINUX ENTERPRISE DESKTOP 10 SP2 - DEPLOYMENT GUIDE 08-05-2008 manuals
LINUX ENTERPRISE DESKTOP 10 SP2 - DEPLOYMENT GUIDE 08-05-2008
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- about this guide
- additional documentation
- documentation conventions
- Part I Deployment
- Planning for SUSE Linux Enterprise Desktop
- hardware requirements
- Deployment Strategies
- Deploying up to 100 Workstations
- Installation with YaST
- boot options
- The Installation Workflow
- The Boot Screen
- Language
- License Agreement
- Clock and Time Zone
- Performing the Installation
- Configuration of the Installed System
- network configuration
- novell customer center
- online update
- release notes
- Graphical Login
- Remote Installation
- configuration file
- wake on lan
- Monitoring the Installation Process
- Automated Installation
- Rule-Based Autoinstallation
- For More Information
- Deploying Customized Preinstallations
- Preparing the Master Machine
- Cloning the Master Installation
- Personalizing the Installation
- Advanced Disk Setup
- Soft RAID Configuration
- raid levels
- troubleshooting
- System Configuration with YaST
- YaST Language
- Software
- removing packages
- installation summary
- yast online update
- definition of terms
- automatic online update
- updating the system
- Hardware
- hardware information
- keyboard layout
- System
- boot loader configuration
- expert options
- pci device drivers
- power management
- time and date configuration
- Network Devices
- Network Services
- AppArmor
- user management
- group management
- Virtualization
- Miscellaneous
- system log
- YaST in Text Mode
- navigation in modules
- restriction of key combinations
- command line
- managing users
- Update from the Command Line with rug
- installing and removing software
- SaX2
- graphics card
- mouse properties
- keyboard properties
- Troubleshooting
- Updating SUSE Linux Enterprise
- Installing Service Packs
- Part II Administration
- GNOME Configuration for Administrators
- Using GConf for Defaults
- Customizing Menus
- Installing Themes
- Configuring Fonts
- MIME Types
- Setting Screensavers
- Session Management
- Improving Performance
- Hidden Directories
- disabling lock screen and log out
- Starting Applications Automatically
- media devices
- creating a profile
- Adding Document Templates
- KDE Configuration for Administrators
- creating a new profile
- Managing Profiles Manually
- Active Directory Support
- Background Information for Linux AD Support
- Configuring a Linux Client for Active Directory
- Logging In to an AD Domain
- Changing Passwords
- Access Control Lists in Linux
- Advantages of ACLs
- Handling ACLs
- ACL Support in Applications
- System Monitoring Utilities
- Debugging
- Files and File Systems
- Hardware Information
- Networking
- The /proc File System
- Processes
- System Information
- User Information
- Working with the Shell
- Getting Started with the Bash Shell
- getting help
- wild cards
- Users and Access Permissions
- Important Linux Commands
- The vi Editor
- operating modes
- Part III System
- Bit and 64-Bit Applications in a 64-Bit System Environment
- Software Development
- Software Compilation on Biarch Platforms
- Kernel Specifications
- Booting and Configuring a Linux System
- The init Process
- System Configuration via /etc/sysconfig
- Selecting a Boot Loader
- setting a boot password
- Configuring the Boot Loader with YaST
- security settings
- Creating Boot CDs
- The Graphical SUSE Screen
- Special System Features
- Virtual Consoles
- Language and Country-Specific Settings
- Printer Operation
- The Workflow of the Printing System
- Installing the Software
- Setting Up a Printer
- Network Printers
- Graphical Printing Interfaces
- Special Features in SUSE Linux Enterprise
- parallel ports
- Dynamic Kernel Device Management with udev
- Kernel uevents and udev
- Booting and Initial Device Setup
- Influencing Kernel Device Event Handling with udev Rules
- Persistent Device Naming
- The Replaced hotplug Package
- File Systems in Linux
- Major File Systems in Linux
- Some Other Supported File Systems
- Large File Support in Linux
- Manually Configuring the X Window System
- screen section
- device section
- Installing and Configuring Fonts
- Authentication with PAM
- The PAM Configuration of sshd
- Configuration of PAM Modules
- Mobile Computing with Linux
- software options
- synchronizing data
- wireless communication
- Mobile Hardware
- Cellular Phones and PDAs
- System Configuration Profile Management
- Terminology
- Setting Up SCPM
- graphical user interface
- editing a profile
- Power Management
- ACPI
- Rest for the Hard Disk
- The powersave Package
- The YaST Power Management Module
- Wireless Communication
- operating mode
- Bluetooth
- Infrared Data Transmission
- Managing UMTS/3G Network Connections
- Part IV Services
- Basic Networking
- IP Addresses and Routing
- Name Resolution
- Managing Network Connections with NetworkManager
- Configuring a Network Connection Manually
- configuration files
- smpppd as Dial-up Assistant
- SLP Services in the Network
- Providing Services with SLP
- Time Synchronization with NTP
- Configuring an NTP Client with YaST
- Configuring xntp in the Network
- Configuring NIS Clients
- Configuring eDirectory Authentication
- Setting Up Workstations to Use eDirectory Authentication
- Using iManager to Enable Users for eDirectory Authentication
- Turning Off LUM and eDirectory Authentication
- LDAP versus NIS
- Structure of an LDAP Directory Tree
- Configuring an LDAP Client with YaST
- basic configuration
- Configuring LDAP Users and Groups in YaST
- Browsing the LDAP Directory Tree
- Starting and Stopping Samba
- starting the server
- Configuring Clients
- Samba as Login Server
- Sharing File Systems with NFS
- Importing File Systems with YaST
- Importing File Systems Manually
- Exporting File Systems with YaST
- Exporting File Systems Manually
- starting and stopping services
- NFS with Kerberos
- File Synchronization
- Determining Factors for Selecting a Program
- Introduction to CVS
- Introduction to rsync
- Part V Security
- Masquerading and Firewalls
- Masquerading Basics
- Firewalling Basics
- SSH: Secure Network Operations
- The ssh Program
- SSH Authentication Mechanisms
- X, Authentication, and Forwarding Mechanisms
- Kerberos Terminology
- How Kerberos Works
- Users' View of Kerberos
- Encrypting Partitions and Files
- Using vi to Encrypt Single ASCII Text Files
- during installation
- Using Encrypted Home Directories
- Confining Privileges with AppArmor
- Installing Novell AppArmor
- choosing the applications to profile
- building and modifying profiles
- updating your profiles
- Security and Confidentiality
- Some General Security Tips and Tricks
- Using the Central Security Reporting Address
- Part VI Troubleshooting
- Help and Documentation
- Man Pages
- Info Pages
- Wikipedia: The Free Online Encyclopedia
- Package Documentation
- Usenet
- Common Problems and Their Solutions
- Installation Problems
- Boot Problems
- Login Problems
- Network Problems
- Data Problems
- using the rescue system
- Index
- Table Of Contents
Related products
LINUX ENTERPRISE DESKTOP 10 SP2 - KDE 08-05-2008LINUX ENTERPRISE DESKTOP 10 SP2 - GNOME 08-05-2008LINUX ENTERPRISE DESKTOP 10 SP2LINUX ENTERPRISE DESKTOP 10 SP1 - KDE 14-05-2007LINUX ENTERPRISE SERVER 10 SP2 - STARTUP GUIDE 05-08-2008LINUX ENTERPRISE DESKTOP 10 SP1 - START UP GUIDE 03-15-2007LINUX ENTERPRISE DESKTOP 10 SP1 - GNOME 23-05-2007LINUX ENTERPRISE DESKTOP 10 - KDE 21-06-2006LINUX ENTERPRISE DESKTOP 10LINUX ENTERPRISE DESKTOP 10 - GNOME 19-06-2006Novell categories
More Novell categoriesmanualsdatabase
Your AI-powered manual search engine