Manuals database logo
manualsdatabase
Your AI-powered manual search engine

Novell SUSE LINUX ENTERPRISE SERVER 10 STORAGE manuals

SUSE LINUX ENTERPRISE SERVER 10 STORAGE first page preview

SUSE LINUX ENTERPRISE SERVER 10 STORAGE

Brand: Novell | Category: Software
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Product Overview
  6. System Requirements
  7. Server Types
  8. Images
  9. SUSE Linux Enterprise Point of Service Installation
  10. Basic Configuration
  11. Setting Up the Branch Server
  12. Adding a Point of Service Terminal
  13. Setting Up the Administration Server
  14. Initializing the LDAP Directory
  15. Copying the Boot Image Files
  16. Copying the System Image Files
  17. What's Next
  18. Setting Up a Dedicated Image Building Server
  19. POSCopyTool Command Line Options
  20. Setting Up a Branch Server
  21. Online Branch Server Configuration
  22. Offline Branch Server Configuration
  23. Creating Branch Server Objects in LDAP
  24. Starting the Core Script
  25. Deploying Point of Service Terminals
  26. Distributing Images to Point of Service Terminals
  27. Hardware
  28. Point of Service Configuration Files
  29. Securing Your Setup
  30. Physical Server Security
  31. Data Security
  32. Application Security
  33. Testing Your SUSE Linux Enterprise Point of Service Environment
  34. The SUSE Linux Enterprise Point of Service LDAP Directory
  35. LDAP Objects Reference
  36. Managing Image Source Files
  37. Managing the Image Source Files
  38. Building Images with the Image Creator Tool
  39. Creating an Image Based on Template
  40. Building Network Boot Images
  41. Building Bootable CD Images with a System Image
  42. Adding Installable Documentation in RPM Format
  43. Image Configuration Settings
  44. Building Images with KIWI
  45. Creating the KIWI Image
  46. Building Customized SUSE Linux Enterprise Point of Service Images
  47. Building USB Stick Images with a System Image
  48. admind
  49. adminc
  50. posGetIP
  51. Installing admind on a Point of Service Terminal
  52. Installing the admind Client on Administration and Branch Servers
  53. Backup and Restore
  54. Offline Logical Backup
  55. Restoring Data
  56. Troubleshooting
  57. Operation
  58. A.1 Changing the Language Selection
  59. B Point of Service Scripts
  60. B.2 Core Script Process
  61. B.3 Script Quick Reference
  62. C.1 Administration Server Directory Structure
  63. C.2 Branch Server Directory Structure
  64. C.3 KIWI Files and Directory Structure
SUSE LINUX ENTERPRISE SERVER 10 STORAGE first page preview

SUSE LINUX ENTERPRISE SERVER 10 STORAGE

Brand: Novell | Category: Software
Table of contents
  1. legal notices
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. additional documentation
  8. documentation conventions
  9. Starting SLED
  10. Switching Desktops
  11. Desktop Basics
  12. Desktop Menu
  13. Adding Applets and Applications to the Panel
  14. Main Menu
  15. Accessing Floppy Disks, CDs, or DVDs
  16. Finding Files on Your Computer
  17. search tips
  18. Accessing Files on the Network
  19. Opening or Creating Documents with OpenOffice.org
  20. Other Useful Programs
  21. customizing your settings
  22. Hardware
  23. Configuring the Mouse
  24. Installing and Configuring Printers
  25. Configuring Removable Drives and Media
  26. Specifying Screen Resolution Settings
  27. Changing the Desktop Background
  28. Configuring Fonts
  29. Configuring the Screen Saver
  30. Choosing a Theme
  31. Customizing Window Behavior
  32. Personal
  33. Configuring Assistive Technology Support
  34. Changing Your Password
  35. Customizing Keyboard Shortcuts
  36. Configuring Search with Beagle Settings
  37. Configuring Power Management
  38. Setting Preferred Applications
  39. Setting Session Sharing Preferences
  40. Managing Sessions
  41. setting session properties
  42. Setting Sound Preferences
  43. Managing Users and Groups
  44. Understanding OpenOffice.org
  45. Using the Standard Edition of OpenOffice.org
  46. Starting OpenOffice.org
  47. changing the global settings
  48. Finding Templates
  49. Creating a New Document
  50. Formatting with Styles
  51. Using Templates to Format Documents
  52. Using Writer as an HTML Editor
  53. Using Formatting and Styles in Calc
  54. Using Presentations with Impress
  55. Using Databases with Base
  56. Creating Graphics with Draw
  57. Creating Mathematical Formulas with Math
  58. Starting Evolution for the First Time
  59. Using Evolution: An Overview
  60. The Menu Bar
  61. E-Mail
  62. The Calendar
  63. Getting Acquainted with the Main GroupWise Window
  64. Toolbar
  65. Folder List
  66. shared folders
  67. Item List
  68. Understanding Your Mailbox
  69. Using the Toolbar
  70. Learning More
  71. Supported Protocols
  72. Managing Your Buddy List
  73. Configuring Linphone
  74. Configuring the Network Parameters
  75. Configuring the Sound Device
  76. Configuring the Audio Codecs
  77. Answering a Call
  78. Troubleshooting
  79. Glossary
  80. Installing a Printer
  81. Modifying Printer Settings
  82. Navigating Web Sites
  83. Tabbed Browsing
  84. Managing Bookmarks
  85. Importing Bookmarks from Other Browsers
  86. Extensions
  87. Adding Smart Keywords to Your Online Searches
  88. Printing from Firefox
  89. Graphics Formats
  90. Getting Started in GIMP
  91. Opening an Existing Image
  92. Saving Images
  93. Printing Images
  94. using digital cameras with linux
  95. Downloading Pictures from Your Camera
  96. Managing Tags
  97. Basic Image Processing with f-spot
  98. Managing Your Library
  99. Using Helix Banshee with Your iPod
  100. Creating Audio and MP3 CDs
  101. Burning CDs and DVDs
  102. A.1 Office
  103. A Getting to Know Linux Software
  104. A.2 Network
  105. A.3 Multimedia
  106. A.4 Graphics
  107. A.5 System and File Management
  108. A.6 Software Development
SUSE LINUX ENTERPRISE SERVER 10 STORAGE first page preview

SUSE LINUX ENTERPRISE SERVER 10 STORAGE

Brand: Novell | Category: Software
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. about this guide
  7. additional documentation
  8. Part I KDE Desktop
  9. Getting Started with the KDE Desktop
  10. switching desktops
  11. Logging Out
  12. Desktop Components
  13. Managing Folders and Files with Konqueror
  14. creating a new folder
  15. Accessing Network Resources
  16. Opening or Creating Documents with OpenOffice.org
  17. Finding Data on your Computer or in the File System
  18. Exploring the Internet
  19. E-Mail and Scheduling
  20. Important Utilities
  21. starting kwallet
  22. copying your wallet to another computer
  23. taking screen shots
  24. viewing pdf files with kpdf
  25. controlling sound with kmix
  26. Managing Software
  27. installing software
  28. removing software
  29. For More Information
  30. Customizing Your Settings
  31. Configuring Your Desktop with the Control Center
  32. system administration
  33. Part II Office and Collaboration
  34. The OpenOffice.org Office Suite
  35. Understanding OpenOffice.org
  36. customizing menus
  37. changing the global settings
  38. finding templates
  39. Word Processing with Writer
  40. formatting with styles
  41. menu options
  42. using templates to format documents
  43. working with large documents
  44. using writer as an html editor
  45. Using Spreadsheets with Calc
  46. using formatting and styles in calc
  47. using templates in calc
  48. Using Presentations with Impress
  49. Using Databases with Base
  50. Creating Graphics with Draw
  51. Kontact: E-Mailing and Calendaring
  52. Mail
  53. Contacts
  54. adding contacts
  55. Calendar
  56. Syncing Data with a Handheld
  57. Kontact for GroupWise Users
  58. GroupWise Linux Client: E-Mailing and Calendaring
  59. folder and item list header
  60. shared folders
  61. Using Different GroupWise Modes
  62. Understanding Your Mailbox
  63. Using the Toolbar
  64. Using Shortcut Keys
  65. Learning More
  66. online help
  67. Synchronizing a Handheld Computer with KPilot
  68. Conduits Used by KPilot
  69. Configuring the Handheld Connection
  70. Managing To-Do Items and Events
  71. Working with KPilot
  72. Instant Messaging with Kopete
  73. Adding Contacts
  74. Using Kopete
  75. Using Voice over IP
  76. determining the connection type
  77. configuring the network parameters
  78. configuring the sound device
  79. Testing Linphone
  80. Making a Call
  81. Answering a Call
  82. Troubleshooting
  83. Glossary
  84. Sharing Folders in Mixed Environments
  85. Configuring Shortcuts to Network Folders
  86. Accessing Network Shares
  87. Managing Windows Files
  88. web server
  89. Encryption with KGpg
  90. Exporting the Public Key
  91. Importing Keys
  92. The Key Server Dialog
  93. Text and File Encryption
  94. Searching with Kerry
  95. Configuring Kerry
  96. Managing Printers
  97. Modifying Printer Settings
  98. Deleting a Printer
  99. Monitoring Print Jobs in KDE
  100. Part III Internet
  101. Browsing with Konqueror
  102. Tabbed Browsing
  103. Profiles
  104. Bookmarks
  105. Enabling Advertisment Blockers
  106. Browsing with Firefox
  107. Finding Information
  108. Managing Bookmarks
  109. Using the Download Manager
  110. Customizing Firefox
  111. changing themes
  112. Printing from Firefox
  113. Transferring Data from the Internet
  114. Timer-Controller Transfers
  115. Reading News Feeds with Akregator
  116. Part IV Multimedia
  117. Manipulating Graphics with The GIMP
  118. Starting GIMP
  119. Getting Started in GIMP
  120. opening an existing image
  121. Saving Images
  122. Printing Images
  123. Using Digital Cameras with Linux
  124. Accessing the Camera
  125. configuring your camera
  126. getting information
  127. managing albums
  128. managing tags
  129. useful tools
  130. Playing Music and Movies
  131. Playing Music Files
  132. quick start
  133. Handling Audio CDs
  134. Playing Movie Files
  135. Burning CDs and DVDs
  136. Creating an Audio CD
  137. Copying a CD or DVD
  138. Writing ISO Images
  139. Creating a Multisession CD or DVD
  140. A Finding the Information You Need
  141. A.2 Additional Resources and More Information
  142. B Moving from Windows to Linux
  143. B.1 Starting Applications from the Main Menu
  144. B.2 Managing Files
  145. B.4 Customizing Your Desktop
  146. B.5 Setting Up Printers
  147. B.6 Switching between Applications
  148. B.7 Accessing Network Resources
  149. C.1 Office
  150. C.2 Network
  151. C.3 Multimedia
  152. C.4 Graphics
  153. C.5 System and File Management
SUSE LINUX ENTERPRISE SERVER 10 STORAGE first page preview

SUSE LINUX ENTERPRISE SERVER 10 STORAGE

Brand: Novell | Category: Software
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. about this guide
  9. Part I Support and Common Tasks
  10. YaST Online Update
  11. Installing Patches Manually Using the gtk Interface
  12. Automatic Online Update
  13. Gathering System Information for Support
  14. Using Supportconfig
  15. Submitting Information to Novell
  16. For More Information
  17. yast in text mode
  18. Navigation in Modules
  19. Restriction of Key Combinations
  20. YaST Command Line Options
  21. Managing Software with Command Line Tools
  22. verifying package authenticity
  23. rpm and patches
  24. delta rpm packages
  25. rpm queries
  26. compiling rpm packages with build
  27. Bash and Bash Scripts
  28. Writing Shell Scripts
  29. Redirecting Command Events
  30. Using Aliases
  31. Working with Common Flow Constructs
  32. Part II System
  33. Bit and 64-Bit Applications in a 64-Bit System Environment
  34. Runtime Support
  35. Software Development
  36. Kernel Specifications
  37. Booting and Configuring a Linux System
  38. The init Process
  39. The Boot Loader GRUB
  40. Booting with GRUB
  41. Configuring the Boot Loader with YaST
  42. Uninstalling the Linux Boot Loader
  43. The Graphical SUSE Screen
  44. Special System Features
  45. Virtual Consoles
  46. Keyboard Mapping
  47. Printer Operation
  48. The Workflow of the Printing System
  49. Installing the Software
  50. Network Printers
  51. Graphical Printing Interfaces
  52. Printing from the Command Line
  53. Troubleshooting
  54. Dynamic Kernel Device Management with udev
  55. Kernel uevents and udev
  56. Booting and Initial Device Setup
  57. Influencing Kernel Device Event Handling with udev Rules
  58. Persistent Device Naming
  59. Manually Configuring the X Window System
  60. Installing and Configuring Fonts
  61. Accessing File Systems with FUSE
  62. Mounting an ISO File System
  63. Part III Mobile Computers
  64. Mobile Computing with Linux
  65. Using KDE NetworkManager Widget
  66. system monitoring
  67. wireless communication
  68. data security
  69. Mobile Hardware
  70. Cellular Phones and PDAs
  71. Power Management
  72. ACPI
  73. Rest for the Hard Disk
  74. Using Tablet PCs
  75. Installing Tablet PC Packages
  76. Configuring Your Tablet Device
  77. Using the Virtual Keyboard
  78. Rotating Your Display
  79. Taking Notes and Sketching with the Pen
  80. Part IV Services
  81. Basic Networking
  82. IP Addresses and Routing
  83. Name Resolution
  84. Configuring a Network Connection Manually
  85. NetworkManager
  86. configuration files
  87. testing the configuration
  88. smpppd as Dial-up Assistant
  89. Wireless Communication
  90. configuration with yast
  91. SLP Services in the Network
  92. Activating SLP
  93. Installation over SLP
  94. Time Synchronization with NTP
  95. Manually Configuring ntp in the Network
  96. Clock Synchronization to an External Time Reference (ETR)
  97. The Domain Name System
  98. Installation
  99. Starting the Name Server BIND
  100. The Configuration File /etc/named.conf
  101. Zone Files
  102. Dynamic Update of Zone Data
  103. DNS Security
  104. DHCP Software Packages
  105. The DHCP Server dhcpd
  106. Using NetworkManager
  107. Configuring a Network Connection with YaST
  108. Configuring Network Connections
  109. Using GNOME NetworkManager Applet
  110. NetworkManager and VPN
  111. NetworkManager and Security
  112. Frequently Asked Questions
  113. Terminology
  114. Starting and Stopping Samba
  115. starting the server
  116. using ldap
  117. configuring the server manually
  118. security levels
  119. Configuring Clients
  120. Samba as Login Server
  121. Sharing File Systems with NFS
  122. Importing File Systems with YaST
  123. Importing File Systems Manually
  124. Exporting File Systems with YaST
  125. Exporting File Systems Manually
  126. NFS with Kerberos
  127. File Synchronization
  128. Determining Factors for Selecting a Program
  129. Introduction to CVS
  130. Introduction to rsync
  131. configuration and operation
  132. The Apache HTTP Server
  133. Configuring Apache
  134. virtual hosts
  135. http server configuration
  136. server modules
  137. Starting and Stopping Apache
  138. Installing, Activating, and Configuring Modules
  139. Getting CGI Scripts to Work
  140. Setting Up a Secure Web Server with SSL
  141. Avoiding Security Problems
  142. user directories
  143. Setting up an FTP server with YaST
  144. Starting the FTP server
  145. FTP General Settings
  146. FTP Performance Settings
  147. Expert Settings
  148. The Proxy Server Squid
  149. Some Facts about Proxy Caches
  150. System Requirements
  151. hard disks
  152. Starting Squid
  153. The Configuration File /etc/squid/squid.conf
  154. Configuring a Transparent Proxy
  155. cachemgr.cgi
  156. Cache Report Generation with Calamaris
SUSE LINUX ENTERPRISE SERVER 10 STORAGE first page preview

SUSE LINUX ENTERPRISE SERVER 10 STORAGE

Brand: Novell | Category: Software
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. about this guide
  8. Security and Confidentiality
  9. file permissions
  10. network security
  11. denial of service
  12. Some General Security Tips and Tricks
  13. Using the Central Security Reporting Address
  14. Part I Authentication
  15. Authentication with PAM
  16. The PAM Configuration of sshd
  17. Configuration of PAM Modules
  18. For More Information
  19. Configuring NIS Servers
  20. Configuring NIS Clients
  21. LDAP versus NIS
  22. Structure of an LDAP Directory Tree
  23. Configuring an LDAP Server with YaST
  24. YaST Modules for CA Management
  25. Configuring an LDAP Client with YaST
  26. Configuring LDAP Users and Groups in YaST
  27. Browsing the LDAP Directory Tree
  28. Manually Administering LDAP Data
  29. Active Directory Support
  30. Background Information for Linux AD Support
  31. Configuring a Linux Client for Active Directory
  32. active directory
  33. Logging In to an AD Domain
  34. Changing Passwords
  35. Network Authentication with Kerberos
  36. Kerberos Terminology
  37. How Kerberos Works
  38. Users' View of Kerberos
  39. Installing and Administering Kerberos
  40. choosing the kerberos realms
  41. setting up the kdc hardware
  42. configuring the kdc
  43. configuring a kerberos client with yast
  44. manually configuring kerberos clients
  45. enabling pam support for kerberos
  46. using ldap and kerberos
  47. Using the Fingerprint Reader
  48. Managing Fingerprints with YaST
  49. Part II Local Security
  50. Configuring Security Settings with YaST
  51. Predefined Security Configurations
  52. Password Settings
  53. Boot Settings
  54. User Addition
  55. PolicyKit
  56. Authorization Types
  57. Modifying and Setting Privileges
  58. Access Control Lists in Linux
  59. Advantages of ACLs
  60. Handling ACLs
  61. ACL Support in Applications
  62. Encrypting Partitions and Files
  63. Using Encrypted Home Directories
  64. Certificate Store
  65. Importing Certificates
  66. Intrusion Detection with AIDE
  67. Local AIDE Checks
  68. System Independent Checking
  69. Part III Network Security
  70. SSH: Secure Network Operations
  71. The ssh Program
  72. SSH Authentication Mechanisms
  73. Configuring An SSH Daemon with YaST
  74. Masquerading and Firewalls
  75. Masquerading Basics
  76. Firewalling Basics
  77. SuSEfirewall2
  78. configuring manually
  79. Configuring VPN Server
  80. Creating the Simplest VPN Example
  81. Setting Up Your VPN Server Using Certificate Authority
  82. configuring the server
  83. configuring the clients
  84. KDE- and GNOME Applets For Clients
  85. Managing X.509 Certification
  86. changing password
  87. Part IV Confining Privileges with Novell AppArmor
  88. Introducing AppArmor
  89. Getting Started
  90. installing novell apparmor
  91. Choosing the Applications to Profile
  92. Building and Modifying Profiles
  93. Updating Your Profiles
  94. Immunizing Programs
  95. Background Information on AppArmor Profiling
  96. Immunizing cron Jobs
  97. Profile Components and Syntax
  98. Profile Types
  99. include Statements
  100. Capability Entries (POSIX.1e)
  101. Paths and Globbing
  102. File Permission Access Modes
  103. Execute Modes
  104. Resource Limit Control
  105. Auditing Rules
  106. Setting Capabilities per Profile
  107. AppArmor Profile Repositories
  108. Using the External Repository
  109. Building and Managing Profiles with YaST
  110. Adding a Profile Using the Wizard
  111. Manually Adding a Profile
  112. Deleting a Profile
  113. Managing Novell AppArmor and Security Event Status
  114. Building Profiles from the Command Line
  115. Building AppArmor Profiles
  116. Editing an AppArmor Profile
  117. Two Methods of Profiling
  118. Profiling Your Web Applications Using ChangeHat
  119. Apache ChangeHat
  120. Confining Users with pam_apparmor
  121. Managing Profiled Applications
  122. Configuring Reports
  123. editing reports
  124. Configuring and Using the AppArmor Desktop Monitor Applet
  125. Updating Novell AppArmor Online
  126. Troubleshooting
  127. Reporting Bugs for AppArmor
  128. AppArmor Glossary
  129. Part V The Linux Audit Framework
  130. Understanding Linux Audit
  131. Introducing the Components of Linux Audit
  132. Configuring the Audit Daemon
  133. Controlling the Audit System Using auditctl
  134. Passing Parameters to the Audit System
  135. Understanding the Audit Logs and Generating Reports
  136. Querying the Audit Daemon Logs with ausearch
  137. Analyzing Processes with autrace
  138. Visualizing Audit Data
  139. Setting Up the Linux Audit Framework
  140. Enabling Audit for System Calls
  141. Setting Up Audit Rules
  142. Configuring Audit Reports
  143. Configuring Log Visualization
  144. Introducing an Audit Rule Set
  145. Adding Watches on Audit Log Files and Configuration Files
  146. Monitoring File System Objects
  147. Monitoring Security Configuration Files and Databases
  148. Monitoring Miscellaneous System Calls
SUSE LINUX ENTERPRISE SERVER 10 STORAGE first page preview

SUSE LINUX ENTERPRISE SERVER 10 STORAGE

Brand: Novell | Category: Software
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. about this guide
  8. documentation conventions
  9. Part I Support and Common Tasks
  10. YaST Online Update
  11. Installing Patches Manually Using the gtk Interface
  12. Automatic Online Update
  13. Gathering System Information for Support
  14. Using Supportconfig
  15. Submitting Information to Novell
  16. For More Information
  17. yast in text mode
  18. Navigation in Modules
  19. Restriction of Key Combinations
  20. YaST Command Line Options
  21. GNOME Configuration for Administrators
  22. Automounting and Managing Media Devices
  23. creating a profile
  24. Adding Document Templates
  25. Managing Software with Command Line Tools
  26. Accessing Remote Desktops with Nomad
  27. Nomad Prerequisites
  28. Installation and Set-Up
  29. Using Nomad
  30. Bash and Bash Scripts
  31. Writing Shell Scripts
  32. Redirecting Command Events
  33. Using Aliases
  34. Working with Common Flow Constructs
  35. Part II System
  36. Bit and 64-Bit Applications in a 64-Bit System Environment
  37. Software Development
  38. Software Compilation on Biarch Platforms
  39. Kernel Specifications
  40. Booting and Configuring a Linux System
  41. The init Process
  42. The Boot Loader GRUB
  43. Booting with GRUB
  44. setting a boot password
  45. Configuring the Boot Loader with YaST
  46. configuring advanced options
  47. Uninstalling the Linux Boot Loader
  48. The Graphical SUSE Screen
  49. Troubleshooting
  50. Special System Features
  51. Virtual Consoles
  52. Keyboard Mapping
  53. Printer Operation
  54. The Workflow of the Printing System
  55. Installing the Software
  56. Network Printers
  57. Graphical Printing Interfaces
  58. Printing from the Command Line
  59. parallel ports
  60. Dynamic Kernel Device Management with udev
  61. Kernel uevents and udev
  62. Booting and Initial Device Setup
  63. Influencing Kernel Device Event Handling with udev Rules
  64. Persistent Device Naming
  65. Manually Configuring the X Window System
  66. screen section
  67. device section
  68. Installing and Configuring Fonts
  69. Accessing File Systems with FUSE
  70. Mounting an ISO File System
  71. Part III Mobile Computers
  72. Mobile Computing with Linux
  73. Using KDE NetworkManager Widget
  74. software options
  75. wireless communication
  76. data security
  77. Mobile Hardware
  78. Cellular Phones and PDAs
  79. Power Management
  80. ACPI
  81. Rest for the Hard Disk
  82. Using Tablet PCs
  83. Installing Tablet PC Packages
  84. Configuring Your Tablet Device
  85. Using the Virtual Keyboard
  86. Rotating Your Display
  87. Taking Notes and Sketching with the Pen
  88. Part IV Services
  89. Basic Networking
  90. IP Addresses and Routing
  91. Name Resolution
  92. NetworkManager
  93. Configuring a Network Connection Manually
  94. configuration files
  95. smpppd as Dial-up Assistant
  96. Wireless Communication
  97. SLP Services in the Network
  98. Activating SLP
  99. Providing Services via SLP
  100. Time Synchronization with NTP
  101. Manually Configuring ntp in the Network
  102. Using NetworkManager
  103. Configuring a Network Connection with YaST
  104. Configuring Network Connections
  105. Using GNOME NetworkManager Applet
  106. NetworkManager and VPN
  107. NetworkManager and Security
  108. Frequently Asked Questions
  109. Terminology
  110. Configuring a Samba Server
  111. Sharing File Systems with NFS
  112. Importing File Systems Manually
  113. NFS with Kerberos
  114. File Synchronization
  115. Determining Factors for Selecting a Program
  116. Introduction to CVS
  117. Introduction to rsync
  118. configuration and operation
SUSE LINUX ENTERPRISE SERVER 10 STORAGE first page preview

SUSE LINUX ENTERPRISE SERVER 10 STORAGE

Brand: Novell | Category: Software
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. about this guide
  6. documentation conventions
  7. Planning for SUSE Linux Enterprise Desktop
  8. Hardware Requirements
  9. Part I Manual Deployment
  10. Deployment Strategies
  11. Deploying up to 100 Workstations
  12. Installation with YaST
  13. The Installation Workflow
  14. The Boot Screen
  15. Welcome
  16. Installation Mode
  17. network setup
  18. Clock and Time Zone
  19. Create New User
  20. Installation Settings
  21. performing the installation
  22. network configuration
  23. online update
  24. release notes
  25. Graphical Login
  26. Updating SUSE Linux Enterprise
  27. Installing Service Packs
  28. Setting Up Hardware Components with YaST
  29. Setting Up Keyboard and Mouse
  30. Setting Up Sound Cards
  31. Setting Up a Printer
  32. Setting Up a Scanner
  33. Installing or Removing Software
  34. Using the Qt Interface
  35. Using the GTK+ Interface
  36. Managing Software Repositories and Services
  37. Keeping the System Up-to-date
  38. Installing Add-On Products
  39. Accessing the Internet
  40. Internet Connection Via Network
  41. Managing Users with YaST
  42. Managing User Accounts
  43. Additional Options for User Accounts
  44. using fingerprint authentication
  45. Changing Default Settings for Local Users
  46. Assigning Users to Groups
  47. Changing Language and Country Settings with YaST
  48. Changing the Country and Time Settings
  49. Remote Installation
  50. wake on lan
  51. Monitoring the Installation Process
  52. Advanced Disk Setup
  53. LVM Configuration
  54. Soft RAID Configuration
  55. troubleshooting
  56. for more information
  57. Subscription Management
  58. Configuring Clients Using AutoYaST Profile
  59. Configuring Clients Using the clientSetup4SMT.sh Script
  60. Part II Imaging and Creating Products
  61. Prerequisites for KIWI
  62. Knowing KIWI's Build Process
  63. Creating Appliances with KIWI
  64. creating an image
  65. For More Information
  66. Creating Add-On Products With Add-on Creator
  67. Add-On Structure
  68. Creating Images with YaST Product Creator
  69. Deploying Customized Preinstallations
  70. Preparing the Master Machine
  71. Cloning the Master Installation
  72. Part III Automated Installations
  73. Automated Installation
  74. Rule-Based Autoinstallation
  75. Automated Deployment of Preload Images
  76. Automated Deployment with PXE Boot
SUSE LINUX ENTERPRISE SERVER 10 STORAGE first page preview

SUSE LINUX ENTERPRISE SERVER 10 STORAGE

Brand: Novell | Category: Software
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. about this guide
  9. documentation conventions
  10. Part I OpenOffice.org Novell Edition
  11. The OpenOffice.org Office Suite
  12. Compatibility with Other Office Applications
  13. Starting OpenOffice.org
  14. Signing Documents
  15. Changing the Global Settings
  16. Using Templates
  17. For More Information
  18. OpenOffice.org Writer
  19. Creating a New Document
  20. Sharing Documents with Other Word Processors
  21. Formatting with Styles
  22. Working with Large Documents
  23. Using Writer as an HTML Editor
  24. OpenOffice.org Calc
  25. What's New in Calc
  26. Using Formatting and Styles in Calc
  27. Further OpenOffice.org Modules
  28. using master pages
  29. Using Databases with Base
  30. Creating Graphics with Draw
  31. Creating Mathematical Formulas with Math
  32. Part II Information Management
  33. Kontact: E-Mailing and Calendaring
  34. Mail
  35. composing messages
  36. Contacts
  37. Calendar
  38. scheduling an event
  39. Kontact for GroupWise Users
  40. Evolution: E-Mail and Calendaring
  41. using the setup assistant
  42. smtp configuration
  43. time zone
  44. Using Evolution: An Overview
  45. menu bar
  46. message list
  47. the shortcut bar
  48. folder management
  49. the calendar
  50. the contacts tool
  51. GroupWise Linux Client: E-Mailing and Calendaring
  52. online help
  53. Synchronizing a Handheld Computer with KPilot
  54. Conduits Used by KPilot
  55. Synchronizing with KOrganizer
  56. managing todo items and events
  57. Working with KPilot
  58. Synchronizing Your Handheld Devices with GNOME Pilot
  59. The Pilot Applet
  60. Encryption with KGpg
  61. Generating a New Key Pair
  62. Exporting the Public Key
  63. The Key Server Dialog
  64. Encrypting Your Data
  65. Encryption with Passwords and Encryption Keys
  66. Signing and Encryption
  67. Modifying Key Properties
  68. Importing Keys
  69. Signing a Key
  70. Encryption Preferences
  71. Taking Notes with BasKet
  72. Working with Baskets
  73. finding data
  74. Taking Notes with Tomboy
  75. Creating Notes
  76. Searching All Notes
  77. Linking Notes
  78. Accessing Your Notes
  79. Exporting Notes to HTML
  80. Printing Notes
  81. Part III Communication and Collaboration
  82. Instant Messaging with Kopete
  83. Chatting with Friends
  84. Customizing Kopete
  85. Instant Messaging with Pidgin
  86. Managing Your Contacts
  87. Using Voice over IP with Ekiga
  88. The Ekiga User Interface
  89. Making a Call
  90. Using the Address Book
  91. Part IV Internet
  92. Browsing with Konqueror
  93. Tabbed Browsing
  94. Profiles
  95. Bookmarks
  96. Java and JavaScript
  97. Enabling Advertisement Blockers
  98. Browsing with Firefox
  99. Finding Information
  100. adding smart keywords to your online searches
  101. Managing Bookmarks
  102. live bookmarks
  103. Using the Download Manager
  104. password management
  105. Customizing Firefox
  106. session management
  107. Printing from Firefox
  108. Opening MHTML Archives
  109. Transferring Data From the Internet
  110. ASCII vs. Binary Transfers
  111. Setting Up an HTTP Proxy Server
  112. Part V Graphics
  113. Manipulating Graphics with The GIMP
  114. Starting The GIMP
  115. Getting Started
  116. opening an existing image
  117. Saving Images
  118. Editing Images
  119. selecting parts of images
  120. applying and removing color
  121. adjusting color levels
  122. undoing mistakes
  123. Printing Images
  124. Managing Your Digital Image Collection with DigiKam
  125. Configuring Your Camera
  126. Downloading Pictures from the Camera
  127. Managing Albums
  128. Creating Powerful Search Filters
  129. Exporting Image Collections
  130. Viewing and Editing Images
  131. Useful Tools
  132. Batch Processing
  133. Troubleshooting
  134. Managing Your Digital Image Collection with F-Spot
  135. Importing Photos
  136. Downloading Pictures from Your Camera
  137. Getting Photo Information
  138. Searching and Finding Photos
  139. exporting photos to cd
  140. exporting photos to a folder
  141. Basic Photo Editing
  142. Sharing Photos
  143. printing photos
  144. Part VI Multimedia
  145. Playing Music and Movies: amaroK, Kaffeine and More
  146. Playing Music Files
  147. quick start
  148. Handling Audio CDs
  149. Playing Movie Files
  150. Playing and Managing Your Music with Banshee
  151. Listening to Music
  152. playing your music
  153. ripping your music
  154. listening to internet radio
  155. listening to podcasts
  156. Managing Your Music Library
  157. creating smart playlists
  158. Creating Audio and MP3 CDs
  159. Sharing Your Music
  160. Configuring Banshee Preferences
  161. Playing Videos with Totem
  162. general preferences
  163. display preferences
  164. Burning CDs and DVDs With K3b
  165. Creating an Audio CD
  166. Copying a CD or DVD
  167. Burning CDs and DVDs With Brasero
  168. Writing ISO Images
  169. Part VII Appendix
  170. Help and Documentation
  171. Using the KDE Help Center
  172. Using GNOME Yelp
  173. Browsing Man and Info Pages From Your Desktop
  174. Getting to Know Linux Software
  175. Office Applications
  176. word processing
  177. Network
  178. Multimedia
  179. Graphics
  180. System and File Management
  181. Software Development
SUSE LINUX ENTERPRISE SERVER 10 STORAGE first page preview

SUSE LINUX ENTERPRISE SERVER 10 STORAGE

Brand: Novell | Category: Software
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. about this guide
  8. documentation conventions
  9. Security and Confidentiality
  10. Some General Security Tips and Tricks
  11. Using the Central Security Reporting Address
  12. Part I Authentication
  13. Authentication with PAM
  14. The PAM Configuration of sshd
  15. Configuration of PAM Modules
  16. For More Information
  17. Configuring NIS Clients
  18. LDAP versus NIS
  19. Structure of an LDAP Directory Tree
  20. Configuring an LDAP Client with YaST
  21. Browsing the LDAP Directory Tree
  22. Active Directory Support
  23. Background Information for Linux AD Support
  24. Configuring a Linux Client for Active Directory
  25. active directory
  26. Logging In to an AD Domain
  27. Changing Passwords
  28. Network Authentication with Kerberos
  29. Kerberos Terminology
  30. How Kerberos Works
  31. Users' View of Kerberos
  32. Using the Fingerprint Reader
  33. Managing Fingerprints with YaST
  34. Part II Local Security
  35. Configuring Security Settings with YaST
  36. Predefined Security Configurations
  37. Password Settings
  38. Boot Settings
  39. User Addition
  40. PolicyKit
  41. Authorization Types
  42. Modifying and Setting Privileges
  43. Access Control Lists in Linux
  44. Advantages of ACLs
  45. Handling ACLs
  46. ACL Support in Applications
  47. Encrypting Partitions and Files
  48. during installation
  49. Using Encrypted Home Directories
  50. Certificate Store
  51. Importing Certificates
  52. Intrusion Detection with AIDE
  53. Local AIDE Checks
  54. System Independent Checking
  55. Part III Network Security
  56. SSH: Secure Network Operations
  57. The ssh Program
  58. SSH Authentication Mechanisms
  59. Configuring An SSH Daemon with YaST
  60. Masquerading and Firewalls
  61. Masquerading Basics
  62. Firewalling Basics
  63. SuSEfirewall2
  64. Configuring VPN Server
  65. Creating the Simplest VPN Example
  66. Setting Up Your VPN Server Using Certificate Authority
  67. configuring the server
  68. KDE- and GNOME Applets For Clients
  69. Managing X.509 Certification
  70. YaST Modules for CA Management
  71. Part IV Confining Privileges with Novell AppArmor
  72. Introducing AppArmor
  73. Getting Started
  74. installing novell apparmor
  75. Choosing the Applications to Profile
  76. Building and Modifying Profiles
  77. Updating Your Profiles
  78. Immunizing Programs
  79. Background Information on AppArmor Profiling
  80. Immunizing cron Jobs
  81. Profile Components and Syntax
  82. Profile Types
  83. include Statements
  84. Capability Entries (POSIX.1e)
  85. Paths and Globbing
  86. File Permission Access Modes
  87. Execute Modes
  88. Resource Limit Control
  89. Auditing Rules
  90. Setting Capabilities per Profile
  91. AppArmor Profile Repositories
  92. Using the External Repository
  93. Building and Managing Profiles with YaST
  94. Adding a Profile Using the Wizard
  95. Manually Adding a Profile
  96. Deleting a Profile
  97. Managing Novell AppArmor and Security Event Status
  98. Building Profiles from the Command Line
  99. Building AppArmor Profiles
  100. Deleting an AppArmor Profile
  101. Two Methods of Profiling
  102. Profiling Your Web Applications Using ChangeHat
  103. Apache ChangeHat
  104. Confining Users with pam_apparmor
  105. Managing Profiled Applications
  106. Configuring Reports
  107. Configuring and Using the AppArmor Desktop Monitor Applet
  108. Updating Novell AppArmor Online
  109. Troubleshooting
  110. Reporting Bugs for AppArmor
  111. AppArmor Glossary
  112. Part V The Linux Audit Framework
  113. Understanding Linux Audit
  114. Introducing the Components of Linux Audit
  115. Configuring the Audit Daemon
  116. Controlling the Audit System Using auditctl
  117. Passing Parameters to the Audit System
  118. Understanding the Audit Logs and Generating Reports
  119. Querying the Audit Daemon Logs with ausearch
  120. Analyzing Processes with autrace
  121. Visualizing Audit Data
  122. Setting Up the Linux Audit Framework
  123. Enabling Audit for System Calls
  124. Setting Up Audit Rules
  125. Configuring Audit Reports
  126. Configuring Log Visualization
  127. Introducing an Audit Rule Set
  128. Adding Watches on Audit Log Files and Configuration Files
  129. Monitoring File System Objects
  130. Monitoring Security Configuration Files and Databases
  131. Monitoring Miscellaneous System Calls
  132. Managing Audit Event Records Using Keys
  133. Useful Resources
SUSE LINUX ENTERPRISE SERVER 10 STORAGE first page preview

SUSE LINUX ENTERPRISE SERVER 10 STORAGE

Brand: Novell | Category: Software
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. about this guide
  4. documentation conventions
  5. Part I Introduction
  6. Getting Started with the GNOME Desktop
  7. session management
  8. switching desktops
  9. Logging Out
  10. Desktop Basics
  11. default desktop icons
  12. bottom panel
  13. Working with Your Desktop
  14. search bar
  15. Managing Folders and Files with Nautilus
  16. file manager navigation shortcuts
  17. archiving folders
  18. using bookmarks
  19. searching for files
  20. Moving Text Between Applications
  21. Exploring the Internet
  22. Opening or Creating Documents with OpenOffice.org
  23. Controlling Your Desktop's Power Management
  24. general preferences
  25. Creating, Displaying, and Decompressing Archives
  26. Taking Screen Shots
  27. Viewing PDF Files
  28. Controlling Sound
  29. Using the Fingerprint Reader
  30. Customizing Your Settings
  31. The Control Center
  32. Hardware
  33. configuring the mouse
  34. installing and configuring printers
  35. Look and Feel
  36. configuring fonts
  37. configuring menus and toolbars
  38. configuring the screen saver
  39. choosing a theme
  40. customizing window behavior
  41. configuring desktop effects
  42. Personal
  43. changing your password
  44. System
  45. configuring network proxies
  46. configuring power management
  47. setting preferred applications
  48. setting session sharing preferences
  49. Preventing Files and Directories from Being Indexed
  50. setting sound preferences
  51. Assistive Technologies
  52. Mobility Impairments
  53. Orca
  54. Part II Internet Connectivity, Files and Resources
  55. Accessing Network Resources
  56. Connecting to Your Network
  57. Accessing Network Shares
  58. Sharing Folders
  59. enabling sharing for a folder
  60. Managing Windows Files
  61. Configuring and Accessing a Windows Network Printer
  62. Searching with Beagle
  63. Search Tips
  64. Performing a Property Search
  65. Setting Search Preferences
  66. Indexing Other Directories
  67. Selecting Data Sources to Index
  68. Managing Printers
  69. installing a local printer
  70. Modifying Printer Settings
  71. creating backups
  72. restoring data
SUSE LINUX ENTERPRISE SERVER 10 STORAGE first page preview

SUSE LINUX ENTERPRISE SERVER 10 STORAGE

Brand: Novell | Category: Software
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Table Of Contents
  10. Table Of Contents
  11. Table Of Contents
  12. about this guide
  13. documentation updates
  14. Part I Deployment
  15. Planning for SUSE Linux Enterprise
  16. Considerations for Deployment of a SUSE Linux Enterprise Server
  17. Running SUSE Linux Enterprise Server
  18. Deployment Strategies
  19. Deploying up to 100 Workstations
  20. Deploying More than 100 Workstations
  21. Installation with YaST
  22. System Start-Up for Installation
  23. The Boot Screen
  24. Language Selection
  25. License Agreement
  26. System Analysis
  27. required disk space
  28. keyboard layout
  29. performing the installation
  30. installed system
  31. Configuration
  32. root password
  33. online update
  34. user authentication
  35. release notes
  36. Graphical Login
  37. Remote Installation
  38. installation sources
  39. setting up a dhcp server
  40. setting up a tftp server
  41. wake on lan
  42. Booting the Target System for Installation
  43. Monitoring the Installation Process
  44. Automated Installation
  45. Rule-Based Autoinstallation
  46. For More Information
  47. Advanced Disk Setup
  48. creating volume groups
  49. Soft RAID Configuration
  50. raid levels
  51. troubleshooting
  52. System Configuration with YaST
  53. YaST Language
  54. Software
  55. installing packages
  56. disk usage
  57. automatic online update
  58. Hardware
  59. hardware information
  60. System
  61. creating a partition
  62. pci device drivers
  63. power management
  64. Network Devices
  65. Network Services
  66. mail server
  67. AppArmor
  68. Security and Users
  69. group management
  70. certificate management
  71. Miscellaneous
  72. system log
  73. YaST in Text Mode
  74. navigation in modules
  75. restriction of key combinations
  76. Update from the Command Line
  77. scheduling updates
  78. SaX2
  79. testing the configuration
  80. Troubleshooting
  81. Updating SUSE Linux Enterprise
  82. possible problems
  83. Installing Service Packs
  84. Setting Up the Server Holding the Installation Sources
  85. network installation
  86. Part II Administration
  87. OpenWBEM
  88. Setting Up OpenWBEM
  89. Multipath IO
  90. Supported Hardware
  91. System Configuration
  92. Using the Devices
  93. using mdadm
  94. Setting Up an iSCSI Target
  95. Configuring iSCSI Initiator
  96. High Availability under Linux
  97. A Sample Minimum Scenario
  98. The Software Side of High Availability
  99. Clustering
  100. Installing a Heartbeat 2 Cluster Using YaST
  101. Software Requirements
  102. Additional Information
  103. Oracle Cluster File System 2
  104. o2cb cluster service
  105. disk heartbeat
  106. management utilities and commands
  107. ocfs2 packages
  108. Creating an OCFS2 Volume
  109. Mounting an OCFS2 Volume
  110. Access Control Lists in Linux
  111. Advantages of ACLs
  112. Handling ACLs
  113. ACL Support in Applications
  114. Verifying Package Authenticity
  115. RPM and Patches
  116. Delta RPM Packages
  117. RPM Queries
  118. Installing and Compiling Source Packages
  119. Compiling RPM Packages with build
  120. Tools for RPM Archives and the RPM Database
  121. System Monitoring Utilities
  122. Debugging
  123. Files and File Systems
  124. Hardware Information
  125. Networking
  126. The /proc File System
  127. Processes
  128. memory usage
  129. System Information
  130. User Information
  131. Time and Date
  132. Working with the Shell
  133. Getting Started with the Bash Shell
  134. getting help
  135. Users and Access Permissions
  136. Important Linux Commands
  137. file systems
  138. system commands
  139. The vi Editor
  140. operating modes
  141. Part III System
  142. Bit and 64-Bit Applications in a 64-Bit System Environment
  143. Runtime Support
  144. Software Compilation on Biarch Platforms
  145. Kernel Specifications
  146. Booting and Configuring a Linux System
  147. The init Process
  148. configuring system services
  149. Selecting a Boot Loader
  150. Configuring the Boot Loader with YaST
  151. security settings
  152. Creating Boot CDs
  153. The Graphical SUSE Screen
  154. Special Features of SUSE Linux Enterprise
  155. Virtual Consoles
  156. Language and Country-Specific Settings
  157. Virtual Machine Server
  158. System Requirements
  159. Benefits of Virtual Machines
  160. Terminology
  161. Virtual Machine Modes
  162. Creating Virtual Machines
  163. Managing Virtual Machines
  164. Printer Operation
  165. Workflow of the Printing System
  166. Methods and Protocols for Connecting Printers
  167. Installing the Software
  168. automatic configuration
  169. network printers
  170. Configuration for Applications
  171. language support
  172. Dynamic Kernel Device Management with udev
  173. Kernel uevents and udev
  174. Booting and Initial Device Setup
  175. Influencing Kernel Device Event Handling with udev Rules
  176. Persistent Device Naming
  177. The Replaced hotplug Package
  178. File Systems in Linux
  179. Major File Systems in Linux
  180. Large File Support in Linux
  181. Optimizing the X Configuration
  182. Installing and Configuring Fonts
  183. hardware support
  184. Authentication with PAM
  185. configuration file
  186. The PAM Configuration of sshd
  187. Configuration of PAM Modules
  188. Power Management
  189. Power Saving Functions
  190. ACPI
  191. Rest for the Hard Disk
  192. The powersave Package
  193. The YaST Power Management Module
  194. Wireless Communication
  195. configuration with yast
  196. Part IV Services
  197. Basic Networking
  198. IP Addresses and Routing
  199. Name Resolution
  200. Managing Network Connections with NetworkManager
  201. Configuring a Network Connection Manually
  202. configuration files
  203. smpppd as Dial-up Assistant
  204. SLP Services in the Network
  205. Registering Your Own Services
  206. SLP Front-Ends in SUSE Linux Enterprise
  207. Activating SLP
  208. Time Synchronization with NTP
  209. Configuring xntp in the Network
  210. Setting Up a Local Reference Clock
  211. The Domain Name System
  212. Configuration with YaST
  213. Starting the Name Server BIND
  214. The Configuration File /etc/named.conf
  215. Zone Files
  216. Dynamic Update of Zone Data
  217. DNS Security
  218. DHCP Software Packages
  219. The DHCP Server dhcpd
  220. Configuring NIS Servers
  221. Configuring NIS Clients
  222. LDAP versus NIS
  223. Structure of an LDAP Directory Tree
  224. Data Handling in the LDAP Directory
  225. Configuring an LDAP Server with YaST
  226. Configuring an LDAP Client with YaST
  227. basic configuration
  228. Starting and Stopping Samba
  229. starting the server
  230. using ldap
  231. Configuring Clients
  232. Samba as Login Server
  233. Samba Server in the Network with Active Directory
  234. Migrating a Windows NT Server to Samba
  235. Sharing File Systems with NFS
  236. Importing File Systems Manually
  237. File Synchronization
  238. Determining Factors for Selecting a Program
  239. Introduction to Unison
  240. Introduction to CVS
  241. Introduction to Subversion
  242. Introduction to rsync
  243. Introduction to mailsync
  244. The Apache HTTP Server
  245. Configuring Apache
  246. virtual hosts
  247. http server configuration
  248. server modules
  249. Starting and Stopping Apache
  250. Installing, Activating, and Configuring Modules
  251. module installation
  252. Getting CGI Scripts to Work
  253. Setting Up a Secure Web Server with SSL
  254. Avoiding Security Problems
  255. The Proxy Server Squid
  256. Some Facts about Proxy Caches
  257. hard disks
  258. Starting Squid
  259. The Configuration File /etc/squid/squid.conf
  260. Configuring a Transparent Proxy
  261. cachemgr.cgi
  262. squidGuard
  263. Cache Report Generation with Calamaris
  264. Part V Security
  265. Managing X.509 Certification
  266. Masquerading and Firewalls
  267. Masquerading Basics
  268. Firewalling Basics
  269. SuSEfirewall2
  270. configuring manually
  271. SSH: Secure Network Operations
  272. The ssh Program
  273. SSH Authentication Mechanisms
  274. X, Authentication, and Forwarding Mechanisms
  275. Kerberos Terminology
  276. How Kerberos Works
  277. Users' View of Kerberos
  278. Installing and Administering Kerberos
  279. Setting Up the KDC Hardware
  280. Clock Synchronization
  281. Manually Configuring Kerberos Clients
  282. Configuring a Kerberos Client with YaST
  283. Remote Kerberos Administration
  284. Creating Kerberos Host Principals
  285. Configuring SSH for Kerberos Authentication
  286. Using LDAP and Kerberos
  287. access control
  288. Encrypting Partitions and Files
  289. Using vi to Encrypt Single Files
  290. Confining Privileges with AppArmor
  291. Installing Novell AppArmor
  292. choosing the applications to profile
  293. building and modifying profiles
  294. updating your profiles
  295. Security and Confidentiality
  296. file permissions
  297. network security
  298. denial of service
  299. Some General Security Tips and Tricks
  300. Using the Central Security Reporting Address
  301. Part VI Troubleshooting
  302. Help and Documentation
  303. the search function
  304. Man Pages
  305. Info Pages
  306. Wikipedia: The Free Online Encyclopedia
  307. Package Documentation
  308. Usenet
  309. Common Problems and Their Solutions
  310. Installation Problems
  311. Boot Problems
  312. Login Problems
  313. Network Problems
  314. Data Problems
  315. IBM System z: Using initrd as a Rescue System
  316. Index
  317. Table Of Contents
SUSE LINUX ENTERPRISE SERVER 10 STORAGE first page preview

SUSE LINUX ENTERPRISE SERVER 10 STORAGE

Brand: Novell | Category: Software
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Table Of Contents
  10. Table Of Contents
  11. Table Of Contents
  12. about this guide
  13. documentation updates
  14. Part I Deployment
  15. Planning for SUSE Linux Enterprise
  16. Considerations for Deployment of a SUSE Linux Enterprise
  17. Running SUSE Linux Enterprise
  18. Deployment Strategies
  19. Deploying up to 100 Workstations
  20. Deploying More than 100 Workstations
  21. Installation with YaST
  22. System Start-Up for Installation
  23. The Boot Screen
  24. Language
  25. IBM System z: Hard Disk Configuration
  26. License Agreement
  27. Time Zone
  28. Installation Summary
  29. Performing the Installation
  30. installed system
  31. Configuration of the Installed System
  32. online update
  33. release notes
  34. completing the installation
  35. Graphical Login
  36. Remote Installation
  37. setting up a dhcp server
  38. setting up a tftp server
  39. wake on lan
  40. Monitoring the Installation Process
  41. Automated Installation
  42. Rule-Based Autoinstallation
  43. For More Information
  44. Deploying Customized Preinstallations
  45. Preparing the Master Machine
  46. Cloning the Master Installation
  47. Personalizing the Installation
  48. Advanced Disk Setup
  49. creating volume groups
  50. Soft RAID Configuration
  51. raid levels
  52. troubleshooting
  53. System Configuration with YaST
  54. YaST Language
  55. Software
  56. installing packages
  57. disk usage
  58. yast online update
  59. Managing Packages from the Command Line with rug
  60. update options
  61. Hardware
  62. hardware information
  63. keyboard layout
  64. System
  65. using the yast partitioner
  66. creating a partition
  67. power management
  68. language selection
  69. Network Devices
  70. Network Services
  71. mail server
  72. AppArmor
  73. adding users
  74. auto login
  75. group management
  76. certificate management
  77. Virtualization
  78. system log
  79. YaST in Text Mode
  80. navigation in modules
  81. restriction of key combinations
  82. Managing YaST from the Command Line
  83. managing users
  84. SaX2
  85. testing the configuration
  86. Troubleshooting
  87. Managing Software with ZENworks
  88. scheduling updates
  89. Managing Packages with the ZEN Tools
  90. installing software
  91. Updating SUSE Linux Enterprise
  92. possible problems
  93. Installing Service Packs
  94. network installation
  95. Part II Administration
  96. OpenWBEM
  97. Setting Up OpenWBEM
  98. cimom configuration
  99. Setting Up an iSCSI Target
  100. Configuring iSCSI Initiator
  101. Oracle Cluster File System 2
  102. o2cb cluster service
  103. disk heartbeat
  104. management utilities and commands
  105. ocfs2 packages
  106. Creating an OCFS2 Volume
  107. Mounting an OCFS2 Volume
  108. Additional Information
  109. Access Control Lists in Linux
  110. Advantages of ACLs
  111. Handling ACLs
  112. ACL Support in Applications
  113. Verifying Package Authenticity
  114. RPM and Patches
  115. Delta RPM Packages
  116. RPM Queries
  117. Installing and Compiling Source Packages
  118. Compiling RPM Packages with build
  119. Tools for RPM Archives and the RPM Database
  120. System Monitoring Utilities
  121. Debugging
  122. Files and File Systems
  123. Hardware Information
  124. Networking
  125. The /proc File System
  126. Processes
  127. memory usage
  128. System Information
  129. User Information
  130. Time and Date
  131. Working with the Shell
  132. Getting Started with the Bash Shell
  133. getting help
  134. Users and Access Permissions
  135. Important Linux Commands
  136. file systems
  137. system commands
  138. The vi Editor
  139. Part III System
  140. Bit and 64-Bit Applications in a 64-Bit System Environment
  141. Runtime Support
  142. Software Development
  143. Kernel Specifications
  144. Booting and Configuring a Linux System
  145. The init Process
  146. configuring system services
  147. Selecting a Boot Loader
  148. Configuring the Boot Loader with YaST
  149. security settings
  150. The Graphical SUSE Screen
  151. Special System Features
  152. Virtual Consoles
  153. Language and Country-Specific Settings
  154. Windows Server 2003 Virtual Machines
  155. System and Software Requirements
  156. Virtualization Infrastructure
  157. Installing Virtualization Software
  158. Starting the Virtualization Host Server
  159. Managing Virtual Machines
  160. Creating Virtual Machines
  161. Printer Operation
  162. The Workflow of the Printing System
  163. Installing the Software
  164. Setting Up a Printer
  165. Network Printers
  166. Graphical Printing Interfaces
  167. Printing from the Command Line
  168. Dynamic Kernel Device Management with udev
  169. Kernel uevents and udev
  170. Booting and Initial Device Setup
  171. Influencing Kernel Device Event Handling with udev Rules
  172. Persistent Device Naming
  173. The Replaced hotplug Package
  174. File Systems in Linux
  175. Major File Systems in Linux
  176. Large File Support in Linux
  177. Manually Configuring the X Window System
  178. Installing and Configuring Fonts
  179. Authentication with PAM
  180. configuration file
  181. The PAM Configuration of sshd
  182. Configuration of PAM Modules
  183. Power Management
  184. Power Saving Functions
  185. ACPI
  186. Rest for the Hard Disk
  187. The powersave Package
  188. The YaST Power Management Module
  189. Wireless Communication
  190. configuration with yast
  191. Part IV Services
  192. Basic Networking
  193. IP Addresses and Routing
  194. Name Resolution
  195. Configuring a Network Connection Manually
  196. configuration files
  197. smpppd as Dial-up Assistant
  198. SLP Services in the Network
  199. Installation over SLP
  200. Providing Services with SLP
  201. Time Synchronization with NTP
  202. Configuring xntp in the Network
  203. The Domain Name System
  204. Configuration with YaST
  205. Starting the Name Server BIND
  206. The Configuration File /etc/named.conf
  207. Zone Files
  208. Dynamic Update of Zone Data
  209. DNS Security
  210. DHCP Software Packages
  211. The DHCP Server dhcpd
  212. Configuring NIS Servers
  213. Configuring NIS Clients
  214. LDAP versus NIS
  215. Structure of an LDAP Directory Tree
  216. Data Handling in the LDAP Directory
  217. Configuring an LDAP Server with YaST
  218. Configuring an LDAP Client with YaST
  219. basic configuration
  220. Browsing the LDAP Directory Tree
  221. Terminology
  222. Starting and Stopping Samba
  223. starting the server
  224. using ldap
  225. Configuring Clients
  226. Samba as Login Server
  227. Samba Server in the Network with Active Directory
  228. Migrating a Windows NT Server to Samba
  229. Sharing File Systems with NFS
  230. Importing File Systems with YaST
  231. Importing File Systems Manually
  232. Exporting File Systems with YaST
  233. Exporting File Systems Manually
  234. NFS with Kerberos
  235. File Synchronization
  236. Determining Factors for Selecting a Program
  237. Introduction to CVS
  238. Introduction to rsync
  239. The Apache HTTP Server
  240. Configuring Apache
  241. Installing, Activating, and Configuring Modules
  242. virtual hosts
  243. http server configuration
  244. server modules
  245. Starting and Stopping Apache
  246. module installation
  247. Setting Up a Secure Web Server with SSL
  248. Getting CGI Scripts to Work
  249. Avoiding Security Problems
  250. The Proxy Server Squid
  251. Some Facts about Proxy Caches
  252. System Requirements
  253. hard disks
  254. Starting Squid
  255. The Configuration File /etc/squid/squid.conf
  256. Configuring a Transparent Proxy
  257. cachemgr.cgi
  258. squidGuard
  259. Cache Report Generation with Calamaris
  260. Part V Security
  261. Managing X.509 Certification
  262. Masquerading and Firewalls
  263. Masquerading Basics
  264. Firewalling Basics
  265. SuSEfirewall2
  266. configuring manually
  267. SSH: Secure Network Operations
  268. The ssh Program
  269. SSH Authentication Mechanisms
  270. X, Authentication, and Forwarding Mechanisms
  271. Kerberos Terminology
  272. How Kerberos Works
  273. Users' View of Kerberos
  274. Installing and Administering Kerberos
  275. Setting Up the KDC Hardware
  276. Clock Synchronization
  277. installing and administering kerberos
  278. Manually Configuring Kerberos Clients
  279. Configuring a Kerberos Client with YaST
  280. Remote Kerberos Administration
  281. Creating Kerberos Host Principals
  282. Enabling PAM Support for Kerberos
  283. Using LDAP and Kerberos
  284. access control
  285. Encrypting Partitions and Files
  286. Using Encrypted Home Directories
  287. Using vi to Encrypt Single Files
  288. Confining Privileges with AppArmor
  289. Installing Novell AppArmor
  290. choosing the applications to profile
  291. building and modifying profiles
  292. updating your profiles
  293. Security and Confidentiality
  294. file permissions
  295. network security
  296. denial of service
  297. Some General Security Tips and Tricks
  298. Using the Central Security Reporting Address
  299. Part VI Troubleshooting
  300. Help and Documentation
  301. the search function
  302. Man Pages
  303. Info Pages
  304. Wikipedia: The Free Online Encyclopedia
  305. Package Documentation
  306. Usenet
  307. Common Problems and Their Solutions
  308. Installation Problems
  309. Boot Problems
  310. Login Problems
  311. Network Problems
  312. Data Problems
  313. Index
SUSE LINUX ENTERPRISE SERVER 10 STORAGE first page preview

SUSE LINUX ENTERPRISE SERVER 10 STORAGE

Brand: Novell | Category: Software
Table of contents
  1. legal notices
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. About This Guide
  7. Overview of EVMS
  8. Supported File Systems
  9. Location of Device Nodes for EVMS Storage Objects
  10. Using EVMS to Manage Devices
  11. During the Server Install
  12. After the Server Install
  13. Configuring an Existing System Device to Use EVMS
  14. Disable the boot.lvm and boot.md Services
  15. Edit the Boot Loader File
  16. Force the RAM Disk to Recognize the Root Partition
  17. Configuring LVM Devices to Use EVMS
  18. Using the ELILO Loader Files (IA-64)
  19. Using UUIDs to Mount Devices
  20. Finding the UUID for a File System Device
  21. Using UUIDs in the Boot Loader and /etc/fstab File (IA64)
  22. Additional Information
  23. Managing EVMS Devices
  24. Disk Segments
  25. Guidelines
  26. Removing the Segment Manager from a Device
  27. Configuring Mount Options for Devices
  28. What's Next
  29. Managing Multipath I/O for Devices
  30. Benefits of Multipathing
  31. Device Mapper Multipath I/O Module
  32. Using mdadm for Multipathed Devices
  33. Configuring the System for Multipathing
  34. Partitioning Multipathed Devices
  35. Adding multipathd to the Boot Sequence
  36. Adding Support for the Storage Subsystem to /etc/multipath.conf
  37. Tuning the Failover for Specific Host Bus Adapters
  38. Configuring Multipath I/O for an Existing Software RAID
  39. Using Multipathed Devices
  40. Using mdadm
  41. Scanning for New Devices without Rebooting
  42. Managing I/O in Error Situations
  43. Resolving Stalled I/O
  44. Managing Software RAIDs with EVMS
  45. Overview of RAID Levels
  46. Comparison of RAID Performance
  47. Configuration Options for RAIDs
  48. RAID 5 Algorithms for Distributing Stripes and Parity
  49. Multi-Disk Plug-In for EVMS
  50. Expanding a RAID
  51. Adding Segments to a RAID 4 or 5
  52. Adding a Spare Disk When You Create the RAID
  53. Identifying the Failed Drive
  54. Replacing a Failed Device with a Spare
  55. Removing the Failed Disk
  56. Monitoring Status with mdadm
  57. Monitoring a Remirror or Reconstruction
  58. Deleting a Software RAID and Its Data
  59. Managing Software RAIDs 6 and 10 with mdadm
  60. Creating a RAID 6
  61. Creating Nested RAID 10 (1+0) with mdadm
  62. Creating Nested RAID 10 (0+1) with mdadm
  63. Creating a Complex RAID 10 with mdadm
  64. Understanding the mdadm RAID10
  65. Creating a RAID10 with mdadm
  66. Creating a Degraded RAID Array
  67. Resizing Software RAID Arrays with mdadm
  68. Overview of Tasks
  69. Increasing the Size of the RAID Array
  70. Increasing the Size of the File System
  71. Decreasing the Size of a Software RAID
  72. Decreasing the Size of Component Partitions
  73. Decreasing the Size of the RAID Array
  74. Installing and Managing DRBD Services
  75. Configuring the DRBD Service
  76. Testing the DRBD Service
  77. Troubleshooting DRBD
  78. TCP Port 7788
  79. Troubleshooting Storage Issues
  80. Volumes on EVMS Devices Do Not Appear When Using iSCSI
SUSE LINUX ENTERPRISE SERVER 10 STORAGE first page preview

SUSE LINUX ENTERPRISE SERVER 10 STORAGE

Brand: Novell | Category: Software
Table of contents
  1. legal notices
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. About This Guide
  6. Overview of EVMS
  7. File Systems Support
  8. Location of Device Nodes for EVMS Storage Objects
  9. Using EVMS to Manage Devices
  10. During the Server Install
  11. After the Server Install
  12. Configuring an Existing System Device to Use EVMS
  13. Disable the boot.lvm and boot.md Services
  14. Edit the /etc/fstab File
  15. Edit the Boot Loader File
  16. Force the RAM Disk to Recognize the Root Partition
  17. Reboot the Server
  18. Using EVMS with iSCSI Volumes
  19. Starting EVMS
  20. Mounting EVMS File System Devices by UUIDs
  21. Using UUIDs to Assemble or Activate File System Devices
  22. Using UUIDs in the Boot Loader and /etc/fstab File (IA64)
  23. Managing Devices
  24. Disk Segments
  25. Guidelines
  26. Removing the Segment Manager from a Device
  27. Configuring Mount Options for Devices
  28. What's Next
  29. Managing Multipath I/O for Devices
  30. Benefits of Multipathing
  31. Device Mapper Multipath I/O Module
  32. Multipath Tools
  33. Partitioning Devices that Have Multiple Paths
  34. Adding multipathd to the Boot Sequence
  35. Configuring Multipath I/O for the Root Device
  36. Configuring Multipathing for an Existing Software RAID
  37. Configuring User-Friendly Names in the /etc/multipath.conf File
  38. Managing I/O in Error Situations
  39. Additional Information
  40. Managing Software RAIDs with EVMS
  41. Overview of RAID Levels
  42. Comparison of RAID Performance
  43. Configuration Options for RAIDs
  44. RAID 5 Algorithms for Distributing Stripes and Parity
  45. Multi-Disk Plug-In for EVMS
  46. Expanding a RAID
  47. Adding Segments to a RAID 4 or 5
  48. Adding a Spare Disk When You Create the RAID
  49. Identifying the Failed Drive
  50. Replacing a Failed Device with a Spare
  51. Removing the Failed Disk
  52. Monitoring Status with mdadm
  53. Monitoring a Remirror or Reconstruction
  54. Deleting a Software RAID and Its Data
  55. Managing Software RAIDs 6 and 10 with mdadm
  56. Creating a RAID 6
  57. Creating Nested RAID 10 (1+0) with mdadm
  58. Creating Nested RAID 10 (0+1) with mdadm
  59. Creating a Complex RAID 10 with mdadm
  60. Understanding the mdadm RAID10
  61. Creating a RAID10 with mdadm
  62. Creating a Degraded RAID Array
  63. Installing and Managing DRBD Services
  64. Configuring the DRBD Service
  65. Troubleshooting EVMS Devices, RAIDs, and Volumes
  66. A.1 February 1, 2007 (Updates)
  67. A.2 December 1, 2006 (Updates)
  68. A.2.4 Managing Software RAIDs
SUSE LINUX ENTERPRISE SERVER 10 STORAGE first page preview

SUSE LINUX ENTERPRISE SERVER 10 STORAGE

Brand: Novell | Category: Software
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. Table Of Contents
  8. Table Of Contents
  9. Table Of Contents
  10. Table Of Contents
  11. Table Of Contents
  12. about this guide
  13. documentation updates
  14. Part I Deployment
  15. Planning for SUSE Linux Enterprise
  16. Considerations for Deployment of a SUSE Linux Enterprise
  17. Running SUSE Linux Enterprise
  18. Deployment Strategies
  19. Deploying up to 100 Workstations
  20. Deploying More than 100 Workstations
  21. Installation with YaST
  22. System Start-Up for Installation
  23. The Installation Workflow
  24. Media Check
  25. Installation Mode
  26. Clock and Time Zone
  27. keyboard layout
  28. Performing the Installation
  29. installed system
  30. Configuration of the Installed System
  31. network configuration
  32. novell customer center
  33. online update
  34. network services
  35. release notes
  36. Graphical Login
  37. Remote Installation
  38. installation sources
  39. setting up a dhcp server
  40. setting up a tftp server
  41. wake on lan
  42. Monitoring the Installation Process
  43. Automated Installation
  44. Rule-Based Autoinstallation
  45. For More Information
  46. Deploying Customized Preinstallations
  47. Preparing the Master Machine
  48. Cloning the Master Installation
  49. Personalizing the Installation
  50. Advanced Disk Setup
  51. creating volume groups
  52. Soft RAID Configuration
  53. raid levels
  54. troubleshooting
  55. System Configuration with YaST
  56. YaST Language
  57. Software
  58. installing packages
  59. installation summary
  60. disk usage
  61. yast online update
  62. definition of terms
  63. automatic online update
  64. updating the system
  65. Hardware
  66. hardware information
  67. System
  68. using the yast partitioner
  69. creating a partition
  70. pci device drivers
  71. power management
  72. language selection
  73. Network Devices
  74. Network Services
  75. mail server
  76. AppArmor
  77. adding users
  78. auto login
  79. group management
  80. certificate management
  81. Virtualization
  82. Miscellaneous
  83. system log
  84. YaST in Text Mode
  85. navigation in modules
  86. restriction of key combinations
  87. command line
  88. managing users
  89. SaX2
  90. testing the configuration
  91. Troubleshooting
  92. Managing Software with ZENworks
  93. update from the command line
  94. scheduling updates
  95. Managing Packages with the ZEN Tools
  96. installing software
  97. Updating SUSE Linux Enterprise
  98. possible problems
  99. Installing Service Packs
  100. network installation
  101. Part II Administration
  102. OpenWBEM
  103. Setting Up OpenWBEM
  104. cimom configuration
  105. Setting Up an iSCSI Target
  106. Configuring iSCSI Initiator
  107. iSNS for Linux Overview
  108. iSNS for Linux Installation and Setup
  109. Oracle Cluster File System 2
  110. O2CB Cluster Service
  111. In-Memory File Systems
  112. Management Utilities and Commands
  113. OCFS2 Packages
  114. Mounting an OCFS2 Volume
  115. Additional Information
  116. Access Control Lists in Linux
  117. Advantages of ACLs
  118. Handling ACLs
  119. ACL Support in Applications
  120. Verifying Package Authenticity
  121. RPM and Patches
  122. Delta RPM Packages
  123. RPM Queries
  124. Installing and Compiling Source Packages
  125. Compiling RPM Packages with build
  126. Tools for RPM Archives and the RPM Database
  127. System Monitoring Utilities
  128. Debugging
  129. Files and File Systems
  130. Hardware Information
  131. Networking
  132. The /proc File System
  133. Processes
  134. memory usage
  135. System Information
  136. User Information
  137. Working with the Shell
  138. Getting Started with the Bash Shell
  139. getting help
  140. Users and Access Permissions
  141. Important Linux Commands
  142. file systems
  143. system commands
  144. The vi Editor
  145. Part III System
  146. Bit and 64-Bit Applications in a 64-Bit System Environment
  147. Runtime Support
  148. Software Development
  149. Kernel Specifications
  150. Booting and Configuring a Linux System
  151. The init Process
  152. configuring system services
  153. Selecting a Boot Loader
  154. Configuring the Boot Loader with YaST
  155. security settings
  156. Creating Boot CDs
  157. The Graphical SUSE Screen
  158. Special System Features
  159. Virtual Consoles
  160. Language and Country-Specific Settings
  161. Printer Operation
  162. The Workflow of the Printing System
  163. Installing the Software
  164. Setting Up a Printer
  165. Network Printers
  166. Graphical Printing Interfaces
  167. Special Features in SUSE Linux Enterprise
  168. Dynamic Kernel Device Management with udev
  169. Kernel uevents and udev
  170. Booting and Initial Device Setup
  171. Influencing Kernel Device Event Handling with udev Rules
  172. Persistent Device Naming
  173. The Replaced hotplug Package
  174. File Systems in Linux
  175. Major File Systems in Linux
  176. Large File Support in Linux
  177. Manually Configuring the X Window System
  178. Installing and Configuring Fonts
  179. Authentication with PAM
  180. configuration file
  181. The PAM Configuration of sshd
  182. Configuration of PAM Modules
  183. Power Management
  184. Power Saving Functions
  185. ACPI
  186. Rest for the Hard Disk
  187. The powersave Package
  188. The YaST Power Management Module
  189. Wireless Communication
  190. configuration with yast
  191. Part IV Services
  192. Basic Networking
  193. IP Addresses and Routing
  194. Name Resolution
  195. Managing Network Connections with NetworkManager
  196. Configuring a Network Connection Manually
  197. configuration files
  198. smpppd as Dial-up Assistant
  199. SLP Services in the Network
  200. Installation over SLP
  201. Providing Services with SLP
  202. Time Synchronization with NTP
  203. Configuring xntp in the Network
  204. The Domain Name System
  205. Configuration with YaST
  206. Starting the Name Server BIND
  207. The Configuration File /etc/named.conf
  208. Zone Files
  209. Dynamic Update of Zone Data
  210. DNS Security
  211. DHCP Software Packages
  212. The DHCP Server dhcpd
  213. Configuring NIS Servers
  214. Configuring NIS Clients
  215. LDAP versus NIS
  216. Structure of an LDAP Directory Tree
  217. Server Configuration with slapd.conf
  218. Data Handling in the LDAP Directory
  219. Configuring an LDAP Server with YaST
  220. Configuring an LDAP Client with YaST
  221. basic configuration
  222. Configuring LDAP Users and Groups in YaST
  223. Browsing the LDAP Directory Tree
  224. Terminology
  225. Starting and Stopping Samba
  226. starting the server
  227. using ldap
  228. Configuring Clients
  229. Samba as Login Server
  230. Samba Server in the Network with Active Directory
  231. Migrating a Windows NT Server to Samba
  232. Sharing File Systems with NFS
  233. Importing File Systems with YaST
  234. Importing File Systems Manually
  235. Exporting File Systems with YaST
  236. Exporting File Systems Manually
  237. NFS with Kerberos
  238. File Synchronization
  239. Determining Factors for Selecting a Program
  240. Introduction to CVS
  241. Introduction to rsync
  242. The Apache HTTP Server
  243. Configuring Apache
  244. virtual hosts
  245. http server configuration
  246. server modules
  247. Starting and Stopping Apache
  248. Installing, Activating, and Configuring Modules
  249. module installation
  250. Getting CGI Scripts to Work
  251. Setting Up a Secure Web Server with SSL
  252. Avoiding Security Problems
  253. The Proxy Server Squid
  254. Some Facts about Proxy Caches
  255. System Requirements
  256. hard disks
  257. Starting Squid
  258. The Configuration File /etc/squid/squid.conf
  259. Configuring a Transparent Proxy
  260. cachemgr.cgi
  261. squidGuard
  262. Cache Report Generation with Calamaris
  263. Part V Security
  264. Managing X.509 Certification
  265. Masquerading and Firewalls
  266. Masquerading Basics
  267. Firewalling Basics
  268. configuring manually
  269. SSH: Secure Network Operations
  270. The ssh Program
  271. SSH Authentication Mechanisms
  272. X, Authentication, and Forwarding Mechanisms
  273. Kerberos Terminology
  274. How Kerberos Works
  275. Users' View of Kerberos
  276. Installing and Administering Kerberos
  277. Setting Up the KDC Hardware
  278. Clock Synchronization
  279. installing and administering kerberos
  280. Manually Configuring Kerberos Clients
  281. Configuring a Kerberos Client with YaST
  282. Remote Kerberos Administration
  283. Creating Kerberos Host Principals
  284. Enabling PAM Support for Kerberos
  285. Using LDAP and Kerberos
  286. access control
  287. Encrypting Partitions and Files
  288. Using vi to Encrypt Single ASCII Text Files
  289. Using Encrypted Home Directories
  290. Confining Privileges with AppArmor
  291. Installing Novell AppArmor
  292. choosing the applications to profile
  293. building and modifying profiles
  294. updating your profiles
  295. Security and Confidentiality
  296. file permissions
  297. network security
  298. denial of service
  299. Some General Security Tips and Tricks
  300. Using the Central Security Reporting Address
  301. Part VI Troubleshooting
  302. Help and Documentation
  303. the search function
  304. Man Pages
  305. Info Pages
  306. Wikipedia: The Free Online Encyclopedia
  307. Package Documentation
  308. Usenet
  309. Common Problems and Their Solutions
  310. Installation Problems
  311. Boot Problems
  312. Login Problems
  313. Network Problems
  314. Data Problems
  315. rescue system
  316. Index
  317. Table Of Contents
SUSE LINUX ENTERPRISE SERVER 10 STORAGE first page preview

SUSE LINUX ENTERPRISE SERVER 10 STORAGE

Brand: Novell | Category: Software
Table of contents
  1. Table Of Contents
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. about this guide
  6. Planning for SUSE Linux Enterprise Server
  7. suse linux enterprise server
  8. Deployment of SUSE Linux Enterprise Server
  9. Running SUSE Linux Enterprise Server
  10. Part I Architecture Specific Installation Considerations
  11. Installation on x86, AMD64, Intel 64, and Itanium
  12. hardware for itanium
  13. Installation Considerations
  14. boot methods
  15. installation target
  16. Boot and Installation Media
  17. Installation Procedure
  18. Controlling the Installation
  19. installation using a serial console
  20. installation over vnc
  21. problems installing
  22. Installation on IBM POWER
  23. software requirements
  24. Preparation
  25. starting the installation
  26. additional steps
  27. Installation on IBM System z
  28. memory requirements
  29. network connection
  30. installation types
  31. ipl options
  32. the iocds
  33. Preparing for Installation
  34. lpar installation
  35. network configuration
  36. Network Connection Types
  37. system configuration
  38. general parameters
  39. configuring the network interface
  40. Using the vt220 Terminal Emulator
  41. Part II Manual Deployment
  42. Deployment Strategies
  43. Deploying up to 100 Workstations
  44. Deploying More than 100 Workstations
  45. Installation with YaST
  46. The Installation Workflow
  47. network installation
  48. System Start-Up for Installation
  49. Welcome
  50. IBM System z: Hard Disk Configuration
  51. Installation Mode
  52. Clock and Time Zone
  53. Server Base Scenario
  54. Performing the Installation
  55. installed system
  56. Configuration of the Installed System
  57. online update
  58. release notes
  59. Graphical Login
  60. Updating SUSE Linux Enterprise
  61. possible problems
  62. Installing Service Packs
  63. Setting Up Hardware Components with YaST
  64. Setting Up Keyboard and Mouse
  65. Setting Up Sound Cards
  66. Setting Up a Printer
  67. Installing or Removing Software
  68. Using the Qt Interface
  69. Managing Software Repositories and Services
  70. Keeping the System Up-to-date
  71. installing patches
  72. Installing Add-On Products
  73. Accessing the Internet
  74. Internet Connection Via Network
  75. Managing Users with YaST
  76. Managing User Accounts
  77. Additional Options for User Accounts
  78. managing quotas
  79. Changing Default Settings for Local Users
  80. Assigning Users to Groups
  81. authentication method
  82. Changing Language and Country Settings with YaST
  83. Changing the Country and Time Settings
  84. Remote Installation
  85. setting up a dhcp server
  86. setting up a tftp server
  87. wake on lan
  88. Monitoring the Installation Process
  89. Advanced Disk Setup
  90. creating a partition
  91. LVM Configuration
  92. creating volume groups
  93. Soft RAID Configuration
  94. troubleshooting
  95. for more information
  96. Subscription Management
  97. Configuring Clients Using AutoYaST Profile
  98. Configuring Clients Using the clientSetup4SMT.sh Script
  99. Part III Imaging and Creating Products
  100. Prerequisites for KIWI
  101. Knowing KIWI's Build Process
  102. Creating Appliances with KIWI
  103. For More Information
  104. Creating Add-On Products With Add-on Creator
  105. Add-On Structure
  106. Creating Images with YaST Product Creator
  107. Deploying Customized Preinstallations
  108. Preparing the Master Machine
  109. Cloning the Master Installation
  110. Part IV Automated Installations
  111. Automated Installation
  112. Rule-Based Autoinstallation
SUSE LINUX ENTERPRISE SERVER 10 STORAGE first page preview

SUSE LINUX ENTERPRISE SERVER 10 STORAGE

Brand: Novell | Category: Software
Table of contents
  1. legal notices
  2. Table Of Contents
  3. Table Of Contents
  4. Table Of Contents
  5. Table Of Contents
  6. Table Of Contents
  7. About This Guide
  8. Overview of File Systems in Linux
  9. Ext2
  10. Ext3
  11. Oracle Cluster File System 2
  12. Other Supported File Systems
  13. Large File Support in Linux
  14. What's New
  15. OCFS2 File System Is in the High Availability Release
  16. User-Friendly Names for Multipathed Devices
  17. Planning a Storage Solution
  18. Open Source Backup
  19. LVM Configuration
  20. Creating LVM Partitions
  21. Configuring Physical Volumes
  22. Configuring Logical Volumes
  23. Direct LVM Management
  24. Resizing File Systems
  25. Decreasing the Size of a File System
  26. Increasing the Size of a Reiser File System
  27. Decreasing the Size of a Reiser File System
  28. Using UUIDs to Mount Devices
  29. Using UUIDs to Assemble or Activate File System Devices
  30. Using UUIDs in the Boot Loader and /etc/fstab File (IA64)
  31. Additional Information
  32. Managing Multipath I/O for Devices
  33. Planning for Multipathing
  34. Using Multipathed Devices
  35. Using LVM2 on Multipath Devices
  36. Partitioning Multipath Devices
  37. Multipath Management Tools
  38. Multipath I/O Management Tools
  39. Using mdadm for Multipathed Devices
  40. The Linux multipath(8) Command
  41. Configuring the System for Multipathing
  42. Partitioning Multipathed Devices
  43. Adding multipathd to the Boot Sequence
  44. Enabling and Starting Multipath I/O Services
  45. Configuring Path Failover Policies and Priorities
  46. Using a Script to Set Path Priorities
  47. Reporting Target Path Groups
  48. Configuring Multipath I/O for an Existing Software RAID
  49. Scanning for New Devices without Rebooting
  50. Scanning for New Partitioned Devices without Rebooting
  51. Viewing Multipath I/O Status
  52. Managing I/O in Error Situations
  53. Resolving Stalled I/O
  54. What's Next
  55. Software RAID Configuration
  56. RAID 1
  57. Troubleshooting
  58. Configuring Software RAID for the Root Partition
  59. Enabling Multipath I/O Support at Install Time
  60. Managing Software RAIDs 6 and 10 with mdadm
  61. Creating a RAID 6
  62. Creating Nested RAID 10 (1+0) with mdadm
  63. Creating Nested RAID 10 (0+1) with mdadm
  64. Creating a Complex RAID 10 with mdadm
  65. Creating a RAID 10 with mdadm
  66. Resizing Software RAID Arrays with mdadm
  67. Overview of Tasks
  68. Increasing the Size of the RAID Array
  69. Increasing the Size of the File System
  70. Decreasing the Size of a Software RAID
  71. Decreasing the Size of Component Partitions
  72. Decreasing the Size of the RAID Array
  73. iSNS for Linux
  74. Installing iSNS Server for Linux
  75. Configuring iSNS Discovery Domains
  76. Creating iSNS Discovery Domain Sets
  77. Adding iSCSI Nodes to a Discovery Domain
  78. Adding Discovery Domains to a Discovery Domain Set
  79. Starting iSNS
  80. Mass Storage over IP Networks: iSCSI
  81. Installing iSCSI
  82. Setting Up an iSCSI Target
  83. Creating iSCSI Targets with YaST
  84. Configuring an iSCSI Target Manually
  85. Configuring Online Targets with ietadm
  86. Configuring iSCSI Initiator
  87. Using YaST for the iSCSI Initiator Configuration
  88. Setting Up the iSCSI Initiator Manually
  89. For More Information
  90. Volume Snapshots
  91. Creating Linux Snapshots with LVM
  92. Troubleshooting Storage Issues
  93. A.1 February 23, 2010
  94. A.2 January 20, 2010
  95. A.3.2 Resizing File Systems
  96. A.4.3 What's New
  97. A.6.2 Managing Software RAIDs 6 and 10 with mdadm
  98. A.7.1 Managing Multipath I/O
Novell categories
More Novell categories
Manuals database logo
manualsdatabase
Your AI-powered manual search engine