Novell LINUX ENTERPRISE DESKTOP 11 manuals
LINUX ENTERPRISE DESKTOP 11
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- about this guide
- Part I Support and Common Tasks
- YaST Online Update
- Installing Patches Manually Using the gtk Interface
- Automatic Online Update
- Gathering System Information for Support
- Using Supportconfig
- Submitting Information to Novell
- For More Information
- yast in text mode
- Navigation in Modules
- Restriction of Key Combinations
- YaST Command Line Options
- Managing Software with Command Line Tools
- verifying package authenticity
- rpm and patches
- delta rpm packages
- rpm queries
- compiling rpm packages with build
- Bash and Bash Scripts
- Writing Shell Scripts
- Redirecting Command Events
- Using Aliases
- Working with Common Flow Constructs
- Part II System
- Bit and 64-Bit Applications in a 64-Bit System Environment
- Runtime Support
- Software Development
- Kernel Specifications
- Booting and Configuring a Linux System
- The init Process
- The Boot Loader GRUB
- Booting with GRUB
- Configuring the Boot Loader with YaST
- Uninstalling the Linux Boot Loader
- The Graphical SUSE Screen
- Special System Features
- Virtual Consoles
- Keyboard Mapping
- Printer Operation
- The Workflow of the Printing System
- Installing the Software
- Network Printers
- Graphical Printing Interfaces
- Printing from the Command Line
- Troubleshooting
- Dynamic Kernel Device Management with udev
- Kernel uevents and udev
- Booting and Initial Device Setup
- Influencing Kernel Device Event Handling with udev Rules
- Persistent Device Naming
- Manually Configuring the X Window System
- Installing and Configuring Fonts
- Accessing File Systems with FUSE
- Mounting an ISO File System
- Part III Mobile Computers
- Mobile Computing with Linux
- Using KDE NetworkManager Widget
- system monitoring
- wireless communication
- data security
- Mobile Hardware
- Cellular Phones and PDAs
- Power Management
- ACPI
- Rest for the Hard Disk
- Using Tablet PCs
- Installing Tablet PC Packages
- Configuring Your Tablet Device
- Using the Virtual Keyboard
- Rotating Your Display
- Taking Notes and Sketching with the Pen
- Part IV Services
- Basic Networking
- IP Addresses and Routing
- Name Resolution
- Configuring a Network Connection Manually
- NetworkManager
- configuration files
- testing the configuration
- smpppd as Dial-up Assistant
- Wireless Communication
- configuration with yast
- SLP Services in the Network
- Activating SLP
- Installation over SLP
- Time Synchronization with NTP
- Manually Configuring ntp in the Network
- Clock Synchronization to an External Time Reference (ETR)
- The Domain Name System
- Installation
- Starting the Name Server BIND
- The Configuration File /etc/named.conf
- Zone Files
- Dynamic Update of Zone Data
- DNS Security
- DHCP Software Packages
- The DHCP Server dhcpd
- Using NetworkManager
- Configuring a Network Connection with YaST
- Configuring Network Connections
- Using GNOME NetworkManager Applet
- NetworkManager and VPN
- NetworkManager and Security
- Frequently Asked Questions
- Terminology
- Starting and Stopping Samba
- starting the server
- using ldap
- configuring the server manually
- security levels
- Configuring Clients
- Samba as Login Server
- Sharing File Systems with NFS
- Importing File Systems with YaST
- Importing File Systems Manually
- Exporting File Systems with YaST
- Exporting File Systems Manually
- NFS with Kerberos
- File Synchronization
- Determining Factors for Selecting a Program
- Introduction to CVS
- Introduction to rsync
- configuration and operation
- The Apache HTTP Server
- Configuring Apache
- virtual hosts
- http server configuration
- server modules
- Starting and Stopping Apache
- Installing, Activating, and Configuring Modules
- Getting CGI Scripts to Work
- Setting Up a Secure Web Server with SSL
- Avoiding Security Problems
- user directories
- Setting up an FTP server with YaST
- Starting the FTP server
- FTP General Settings
- FTP Performance Settings
- Expert Settings
- The Proxy Server Squid
- Some Facts about Proxy Caches
- System Requirements
- hard disks
- Starting Squid
- The Configuration File /etc/squid/squid.conf
- Configuring a Transparent Proxy
- cachemgr.cgi
- Cache Report Generation with Calamaris
LINUX ENTERPRISE DESKTOP 11
Table of contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- Table Of Contents
- about this guide
- Security and Confidentiality
- file permissions
- network security
- denial of service
- Some General Security Tips and Tricks
- Using the Central Security Reporting Address
- Part I Authentication
- Authentication with PAM
- The PAM Configuration of sshd
- Configuration of PAM Modules
- For More Information
- Configuring NIS Servers
- Configuring NIS Clients
- LDAP versus NIS
- Structure of an LDAP Directory Tree
- Configuring an LDAP Server with YaST
- YaST Modules for CA Management
- Configuring an LDAP Client with YaST
- Configuring LDAP Users and Groups in YaST
- Browsing the LDAP Directory Tree
- Manually Administering LDAP Data
- Active Directory Support
- Background Information for Linux AD Support
- Configuring a Linux Client for Active Directory
- active directory
- Logging In to an AD Domain
- Changing Passwords
- Network Authentication with Kerberos
- Kerberos Terminology
- How Kerberos Works
- Users' View of Kerberos
- Installing and Administering Kerberos
- choosing the kerberos realms
- setting up the kdc hardware
- configuring the kdc
- configuring a kerberos client with yast
- manually configuring kerberos clients
- enabling pam support for kerberos
- using ldap and kerberos
- Using the Fingerprint Reader
- Managing Fingerprints with YaST
- Part II Local Security
- Configuring Security Settings with YaST
- Predefined Security Configurations
- Password Settings
- Boot Settings
- User Addition
- PolicyKit
- Authorization Types
- Modifying and Setting Privileges
- Access Control Lists in Linux
- Advantages of ACLs
- Handling ACLs
- ACL Support in Applications
- Encrypting Partitions and Files
- Using Encrypted Home Directories
- Certificate Store
- Importing Certificates
- Intrusion Detection with AIDE
- Local AIDE Checks
- System Independent Checking
- Part III Network Security
- SSH: Secure Network Operations
- The ssh Program
- SSH Authentication Mechanisms
- Configuring An SSH Daemon with YaST
- Masquerading and Firewalls
- Masquerading Basics
- Firewalling Basics
- SuSEfirewall2
- configuring manually
- Configuring VPN Server
- Creating the Simplest VPN Example
- Setting Up Your VPN Server Using Certificate Authority
- configuring the server
- configuring the clients
- KDE- and GNOME Applets For Clients
- Managing X.509 Certification
- changing password
- Part IV Confining Privileges with Novell AppArmor
- Introducing AppArmor
- Getting Started
- installing novell apparmor
- Choosing the Applications to Profile
- Building and Modifying Profiles
- Updating Your Profiles
- Immunizing Programs
- Background Information on AppArmor Profiling
- Immunizing cron Jobs
- Profile Components and Syntax
- Profile Types
- include Statements
- Capability Entries (POSIX.1e)
- Paths and Globbing
- File Permission Access Modes
- Execute Modes
- Resource Limit Control
- Auditing Rules
- Setting Capabilities per Profile
- AppArmor Profile Repositories
- Using the External Repository
- Building and Managing Profiles with YaST
- Adding a Profile Using the Wizard
- Manually Adding a Profile
- Deleting a Profile
- Managing Novell AppArmor and Security Event Status
- Building Profiles from the Command Line
- Building AppArmor Profiles
- Editing an AppArmor Profile
- Two Methods of Profiling
- Profiling Your Web Applications Using ChangeHat
- Apache ChangeHat
- Confining Users with pam_apparmor
- Managing Profiled Applications
- Configuring Reports
- editing reports
- Configuring and Using the AppArmor Desktop Monitor Applet
- Updating Novell AppArmor Online
- Troubleshooting
- Reporting Bugs for AppArmor
- AppArmor Glossary
- Part V The Linux Audit Framework
- Understanding Linux Audit
- Introducing the Components of Linux Audit
- Configuring the Audit Daemon
- Controlling the Audit System Using auditctl
- Passing Parameters to the Audit System
- Understanding the Audit Logs and Generating Reports
- Querying the Audit Daemon Logs with ausearch
- Analyzing Processes with autrace
- Visualizing Audit Data
- Setting Up the Linux Audit Framework
- Enabling Audit for System Calls
- Setting Up Audit Rules
- Configuring Audit Reports
- Configuring Log Visualization
- Introducing an Audit Rule Set
- Adding Watches on Audit Log Files and Configuration Files
- Monitoring File System Objects
- Monitoring Security Configuration Files and Databases
- Monitoring Miscellaneous System Calls
Related products
LINUX ENTERPRISE DESKTOP 11 - KDELINUX ENTERPRISE DESKTOP 10LINUX ENTERPRISE DESKTOP 11 - GNOMELINUX ENTERPRISE DESKTOP 10 SP2LINUX ENTERPRISE DESKTOP 10 - GNOMELINUX ENTERPRISE DESKTOP 11 - OPENOFFICELINUX ENTERPRISE DESKTOP 11 - KDE 17-03-2009LINUX ENTERPRISE DESKTOP 11 - GNOME 17-03-2009LINUX ENTERPRISE DESKTOP 10 - IPRINT CLIENTSUSE LINUX ENTERPRISE DESKTOP 10 SP1 KDENovell categories
More Novell categoriesmanualsdatabase
Your AI-powered manual search engine