openSUSE Documentation
openSUSE Documentation
openSUSE Documentation
Contents
Start-Up
About This Guide
1. Feedback
2. Additional Documentation
3. Documentation Conventions
4. About the Making of This Manual
5. Source Code
6. Acknowledgments
I. Installation and Setup
1. Installation with YaST
1.1. Choosing the Installation Media
1.2. Choosing the Installation Method
1.3. The Installation Workflow
1.4. System Start-Up for Installation
1.5. The Boot Screen
1.6. Welcome
1.7. Installation Mode
1.8. Clock and Time Zone
1.9. System Type
1.10. Suggested Partitioning
1.11. Create New User
1.12. Installation Settings
1.13. Performing the Installation
1.14. Configuration of the Installed System
1.15. Graphical Login
2. Setting Up Hardware Components with YaST
2.1. Probing Your Hardware
2.2. Setting Up Graphics Card and Monitor
2.3. Setting Up Keyboard and Mouse
2.4. Setting Up Sound Cards
2.5. Setting Up a Printer
2.6. Setting Up a Scanner
3. Installing or Removing Software
3.1. Installing Software
3.2. Checking Software Dependencies
3.3. Packages and Software Repositories
3.4. Removing Software
3.5. Adding Software Repositories
3.6. Installing Add-On Products
3.7. Keeping the System Up-to-date
4. Accessing the Internet
4.1. Direct Internet Connection
4.2. Internet Connection Via Network
5. Managing Users with YaST
5.1. Managing User Accounts
5.2. Special Options
5.3. Managing Groups
5.4. Changing the User Authentication Method
6. Changing Language and Country Settings with YaST
6.1. Changing the System Language
6.2. Changing the Country and Time Settings
II. Basics
7. Basic Concepts
7.1. User Concept
7.2. The Linux File System
7.3. File Access Permissions
8. Shell Basics
8.1. Starting a Shell
8.2. Entering Commands
8.3. Working with Files and Directories
8.4. Becoming Root
8.5. Modifying File Permissions
8.6. Useful Features of the Shell
8.7. Editing Texts
8.8. Searching for Files or Contents
8.9. Viewing Text Files
8.10. Redirection and Pipes
8.11. Handling Processes
8.12. Important Linux Commands
III. Mobility
9. Mobile Computing with Linux
9.1. Laptops
9.2. Mobile Hardware
9.3. Cellular Phones and PDAs
9.4. For More Information
10. Managing Network Connections with NetworkManager
10.1. Use Cases for NetworkManager
10.2. Enabling NetworkManager
10.3. NetworkManager and VPN
10.4. Using KNetworkManager
10.5. Using GNOME NetworkManager Applet
10.6. NetworkManager and Security
10.7. Troubleshooting
10.8. For More Information
11. Copying and Sharing Files
11.1. Scenarios
11.2. Access Methods
11.3. Accessing Files on Different OS on the Same Computer
11.4. Copying Files between Linux Computers
11.5. Copying Files between Linux and Windows Computers with SSH
11.6. Sharing Files between Linux Computers
11.7. Sharing Files between Linux and Windows with Samba
11.8. For More Information
IV. Help and Documentation
12. Help and Documentation
12.1. Included Help Resources
12.2. Additional Help Resources
12.3. For More Information
12.4. Support for openSUSE
A. GNU Licenses
A.1. GNU General Public License
A.2. GNU Free Documentation License
Index
KDE Quick Start
openSUSE 11.0
KDE Quick Start
1. Getting Started
2. Starting Programs
3. Customizing Your Desktop
4. Using Virtual Desktops
5. Using the File Manager
6. Browsing the Internet
7. Managing Passwords
8. E-Mailing and Calendaring
9. Instant Messaging with Kopete
10. Starting OpenOffice.org
11. Viewing PDF Files and Other Documents
12. Creating a CD or DVD
13. Managing Your Digital Image Collection
14. Managing Your Music Collection
15. Configuring Your System with YaST
16. Logging Out
17. For More Information
18. Legal Notice
19. GNU Free Documentation License
GNOME Quick Start
GNOME Quick Start
1. Getting Started
2. Starting Programs
3. Customizing Your Desktop
4. Managing Files and Folders
5. Browsing the Internet with Firefox
6. E-Mailing and Calendaring
7. Instant Messaging with Pidgin
8. Starting OpenOffice.org
9. Viewing PDF Files
10. Finding Files on Your Computer
11. Creating a CD/DVD
12. Managing Your Digital Image Collection
13. Managing Your Music
14. Configuring Your System with YaST
15. Managing Printers
16. Logging Out
17. For More Information
18. Legal Notice
19. GNU Free Documentation License
Reference
About This Guide
1. Feedback
2. Additional Documentation
3. Documentation Conventions
4. About the Making of This Manual
5. Source Code
6. Acknowledgments
I. Advanced Deployment Scenarios
1. Remote Installation
1.1. Installation Scenarios for Remote Installation
1.2. Setting Up the Server Holding the Installation Sources
1.3. Preparing the Boot of the Target System
1.4. Booting the Target System for Installation
1.5. Monitoring the Installation Process
2. Advanced Disk Setup
2.1. Using the YaST Partitioner
2.2. LVM Configuration
2.3. Soft RAID Configuration
II. Administration
3. Online Update
3.1. Definition of Terms
3.2. YaST Online Update
3.3. Update from the Command Line with zypper
4. YaST in Text Mode
4.1. Navigation in Modules
4.2. Restriction of Key Combinations
4.3. YaST Command Line Options
5. Updating the System and System Changes
5.1. Updating the System
5.2. Software Changes from Version to Version
6. System Monitoring Utilities
6.1. Debugging
6.2. Files and File Systems
6.3. Hardware Information
6.4. Networking
6.5. The
/proc
File System
6.6. Processes
6.7. System Information
6.8. User Information
6.9. Time and Date
III. System
7. 32-Bit and 64-Bit Applications in a 64-Bit System Environment
7.1. Runtime Support
7.2. Software Development
7.3. Software Compilation on Biarch Platforms
7.4. Kernel Specifications
8. Booting and Configuring a Linux System
8.1. The Linux Boot Process
8.2. The init Process
8.3. System Configuration via /etc/sysconfig
9. The Boot Loader
9.1. Selecting a Boot Loader
9.2. Booting with GRUB
9.3. Configuring the Boot Loader with YaST
9.4. Uninstalling the Linux Boot Loader
9.5. Creating Boot CDs
9.6. The Graphical SUSE Screen
9.7. Troubleshooting
9.8. For More Information
10. Special System Features
10.1. Information about Special Software Packages
10.2. Virtual Consoles
10.3. Keyboard Mapping
10.4. Language and Country-Specific Settings
11. Dynamic Kernel Device Management with udev
11.1. The
/dev
Directory
11.2. Kernel uevents and udev
11.3. Drivers, Kernel Modules, and Devices
11.4. Booting and Initial Device Setup
11.5. Monitoring the Running udev Daemon
11.6. Influencing Kernel Device Event Handling with udev Rules
11.7. Persistent Device Naming
11.8. Files used by udev
11.9. For More Information
12. Access Control Lists in Linux
12.1. Traditional File Permissions
12.2. Advantages of ACLs
12.3. Definitions
12.4. Handling ACLs
12.5. ACL Support in Applications
12.6. For More Information
13. Authentication with PAM
13.1. Structure of a PAM Configuration File
13.2. The PAM Configuration of sshd
13.3. Configuring PAM Using pam-config
13.4. For More Information
IV. Services
14. Basic Networking
14.1. IP Addresses and Routing
14.2. IPv6—The Next Generation Internet
14.3. Name Resolution
14.4. Configuring a Network Connection with YaST
14.5. NetworkManager
14.6. Configuring a Network Connection Manually
14.7. smpppd as Dial-up Assistant
15. SLP Services in the Network
15.1. Installation
15.2. Activating SLP
15.3. SLP Front-Ends in openSUSE
15.4. Installation over SLP
15.5. Providing Services via SLP
15.6. For More Information
16. The Domain Name System
16.1. DNS Terminology
16.2. Installation
16.3. Configuration with YaST
16.4. Starting the Name Server BIND
16.5. The Configuration File /etc/named.conf
16.6. Zone Files
16.7. Dynamic Update of Zone Data
16.8. Secure Transactions
16.9. DNS Security
16.10. For More Information
17. DHCP
17.1. Configuring a DHCP Server with YaST
17.2. DHCP Software Packages
17.3. The DHCP Server dhcpd
17.4. For More Information
18. Time Synchronization with NTP
18.1. Configuring an NTP Client with YaST
18.2. Configuring xntp in the Network
18.3. Setting Up a Local Reference Clock
19. Using NIS
19.1. Configuring NIS Servers
19.2. Configuring NIS Clients
20. LDAP—A Directory Service
20.1. LDAP versus NIS
20.2. Structure of an LDAP Directory Tree
20.3. Configuring an LDAP Server with YaST
20.4. Configuring an LDAP Client with YaST
20.5. Configuring LDAP Users and Groups in YaST
20.6. Browsing the LDAP Directory Tree
20.7. Manually Configuring an LDAP Server
20.8. Manually Administering LDAP Data
20.9. For More Information
21. Sharing File Systems with NFS
21.1. Installing the Required Software
21.2. Importing File Systems with YaST
21.3. Importing File Systems Manually
21.4. Exporting File Systems with YaST
21.5. Exporting File Systems Manually
21.6. NFS with Kerberos
21.7. For More Information
22. The Apache HTTP Server
22.1. Quick Start
22.2. Configuring Apache
22.3. Starting and Stopping Apache
22.4. Installing, Activating, and Configuring Modules
22.5. Getting CGI Scripts to Work
22.6. Setting Up a Secure Web Server with SSL
22.7. Avoiding Security Problems
22.8. Troubleshooting
22.9. For More Information
23. Setting up a FTP server with YaST
23.1. Starting the FTP server
23.2. FTP General Settings
23.3. FTP Performance Settings
23.4. Authentication
23.5. Expert Settings
23.6. For more information
V. Mobility
24. Power Management
24.1. Power Saving Functions
24.2. ACPI
24.3. Rest for the Hard Disk
24.4. The powersave Package
25. Wireless Communication
25.1. Wireless LAN
26. Using Tablet PCs
26.1. Installing Tablet PC Packages
26.2. Configuring Your Tablet Device
26.3. Using the Virtual Keyboard
26.4. Rotating Your Display
26.5. Using Gesture Recognition
26.6. Taking Notes and Sketching with the Pen
26.7. Troubleshooting
26.8. For More Information
27. Using the Fingerprint Reader
27.1. Supported Applications and Actions
27.2. Managing Fingerprints with YaST
27.3. Managing Fingerprints with
tf-tool
27.4. For More Information
VI. Security
28. Masquerading and Firewalls
28.1. Packet Filtering with iptables
28.2. Masquerading Basics
28.3. Firewalling Basics
28.4. SuSEfirewall2
28.5. For More Information
29. SSH: Secure Network Operations
29.1. The OpenSSH Package
29.2. The ssh Program
29.3. scp—Secure Copy
29.4. sftp—Secure File Transfer
29.5. The SSH Daemon (sshd)—Server-Side
29.6. SSH Authentication Mechanisms
29.7. X, Authentication, and Forwarding Mechanisms
30. Managing X.509 Certification
30.1. The Principles of Digital Certification
30.2. YaST Modules for CA Management
31. Encrypting Partitions and Files
31.1. Setting Up an Encrypted File System with YaST
31.2. Using Encrypted Home Directories
31.3. Using vi to Encrypt Single ASCII Text Files
32. Confining Privileges with AppArmor
32.1. Installing Novell AppArmor
32.2. Enabling and Disabling Novell AppArmor
32.3. Getting Started with Profiling Applications
33. Security and Confidentiality
33.1. Local Security and Network Security
33.2. Some General Security Tips and Tricks
33.3. Using the Central Security Reporting Address
A. An Example Network
B. GNU Licenses
B.1. GNU General Public License
B.2. GNU Free Documentation License
Novell AppArmor Administration Guide
About This Guide
1. Feedback
2. Documentation Conventions
3. Source Code
1. Immunizing Programs
1.1. Introducing the AppArmor Framework
1.2. Determining Programs to Immunize
1.3. Immunizing cron Jobs
1.4. Immunizing Network Applications
2. Profile Components and Syntax
2.1. Breaking a Novell AppArmor Profile into Its Parts
2.2. Profile Types
2.3.
#include
Statements
2.4. Capability Entries (POSIX.1e)
2.5. Network Access Control
2.6. Paths and Globbing
2.7. File Permission Access Modes
2.8. Execute Modes
2.9. Resource Limit Control
2.10. Auditing Rules
3. AppArmor Profile Repositories
3.1. Using the Local Repository
3.2. Using the External Repository
4. Building and Managing Profiles with YaST
4.1. Adding a Profile Using the Wizard
4.2. Manually Adding a Profile
4.3. Editing Profiles
4.4. Deleting a Profile
4.5. Updating Profiles from Log Entries
4.6. Managing Novell AppArmor and Security Event Status
5. Building Profiles from the Command Line
5.1. Checking the AppArmor Module Status
5.2. Building AppArmor Profiles
5.3. Adding or Creating an AppArmor Profile
5.4. Editing an AppArmor Profile
5.5. Deleting an AppArmor Profile
5.6. Two Methods of Profiling
5.7. Important Filenames and Directories
6. Profiling Your Web Applications Using ChangeHat
6.1. Apache ChangeHat
6.2. Configuring Apache for mod_apparmor
7. Managing Profiled Applications
7.1. Monitoring Your Secured Applications
7.2. Configuring Security Event Notification
7.3. Configuring Reports
7.4. Configuring and Using the AppArmor Desktop Monitor Applet
7.5. Reacting to Security Event Rejections
7.6. Maintaining Your Security Profiles
8. Support
8.1. Updating Novell AppArmor Online
8.2. Using the Man Pages
8.3. For More Information
8.4. Troubleshooting
8.5. Reporting Bugs for AppArmor
A. Background Information on AppArmor Profiling
B. GNU Licenses
B.1. GNU General Public License
B.2. GNU Free Documentation License
Glossary