Changeset 1ea79a1
- Timestamp:
- 05/30/2004 05:30:47 AM (19 years ago)
- Branches:
- 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 12.0, 6.0, 6.1, 6.2, 6.2.0, 6.2.0-rc1, 6.2.0-rc2, 6.3, 6.3-rc1, 6.3-rc2, 6.3-rc3, 7.10, 7.4, 7.5, 7.6, 7.6-blfs, 7.6-systemd, 7.7, 7.8, 7.9, 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, basic, bdubbs/svn, elogind, gnome, kde5-13430, kde5-14269, kde5-14686, kea, ken/inkscape-core-mods, krejzi/svn, lazarus, lxqt, nosym, perl-modules, plabs/python-mods, qt5new, systemd-11177, systemd-13485, trunk, upgradedb, v5_1, xry111/intltool, xry111/soup3, xry111/test-20220226, xry111/xf86-video-removal
- Children:
- 1dad4a4
- Parents:
- 4ea49a3
- Files:
-
- 33 edited
Legend:
- Unmodified
- Added
- Removed
-
general/genlib/expat/expat.ent
r4ea49a3 r1ea79a1 5 5 <!ENTITY expat-version "1.95.7"> 6 6 <!ENTITY expat-download-http "http://umn.dl.sourceforge.net/sourceforge/expat/expat-&expat-version;.tar.gz"> 7 <!-- <!ENTITY expat-download-ftp "ftp://ftp.at.linuxfromscratch.org/opsys/linux/sf/e/expat/expat-&expat-version;.tar.gz"> --> 7 8 <!ENTITY expat-download-ftp " "> 8 9 <!ENTITY expat-size "290 KB"> -
general/genlib/fam/fam-desc.xml
r4ea49a3 r1ea79a1 2 2 <title>Contents</title> 3 3 4 <para>The <application><acronym>FAM</acronym></application> package contains 5 <command>famd</command> executable and 6 <filename>libfam</filename>libraries.</para>4 <para>The <application><acronym>FAM</acronym></application> package contains 5 the <command>famd</command> executable and <filename>libfam</filename> 6 libraries.</para> 7 7 8 8 </sect2> -
general/genlib/genlib.xml
r4ea49a3 r1ea79a1 11 11 the <application>C</application> library functions which programs use.</para> 12 12 13 <para>There are two types of librar y,static and shared. Shared libraries13 <para>There are two types of libraries: static and shared. Shared libraries 14 14 (usually <filename>libXXX.so</filename>) are loaded into memory from the shared 15 15 copy at runtime (hence the name). Static libraries (<filename>libXXX.a … … 19 19 20 20 <para>Generally, you only need to install libraries when you are 21 installing software which requires functionality whichthey supply. In22 the <acronym>BLFS</acronym> book, each package is listed with a list of (known)21 installing software that needs the functionality they supply. In 22 the <acronym>BLFS</acronym> book, each package is presented with a list of (known) 23 23 dependencies. Thus, you can figure out which libraries you need to have 24 24 before installing that program. If you are installing something without 25 using <acronym>BLFS</acronym> instructions, usually the <filename>README 26 </filename>or <filename>INSTALL</filename> file will contain details of the27 program s requirements.</para>25 using <acronym>BLFS</acronym> instructions, usually the <filename>README</filename> 26 or <filename>INSTALL</filename> file will contain details of the 27 program's requirements.</para> 28 28 29 29 <para>There are certain libraries which nearly <emphasis>everyone</emphasis> -
general/genlib/gmp/gmp-intro.xml
r4ea49a3 r1ea79a1 3 3 4 4 <para>The <application><acronym>GMP</acronym></application> package 5 contains a nmath library. This has useful functions for arbitrary precision5 contains a math library. This has useful functions for arbitrary precision 6 6 arithmetic.</para> 7 7 -
general/genlib/pcre/pcre-inst.xml
r4ea49a3 r1ea79a1 10 10 <para>If you reinstall <application>grep</application> after installing <application>pcre</application>, 11 11 <application>grep</application> will get linked against <application>pcre</application> and 12 may cause problems if <filename>/usr</filename> is a sep erate mount point. To avoid this,12 may cause problems if <filename>/usr</filename> is a separate mount point. To avoid this, 13 13 either pass the option <emphasis>--disable-perl-regexp</emphasis> when executing <command>./configure</command> 14 14 for <application>grep</application> or move <filename>libpcre</filename> to <filename>/lib</filename> -
general/genlib/readline/readline-exp.xml
r4ea49a3 r1ea79a1 2 2 <title>Command explanations</title> 3 3 4 <para><command>make SHLIB_LIBS=-lcurses</command>: Th ese command makes5 theproper symbols available for applications that assume6 <application>readline</application> is compiled linked to7 <application>ncurses</application> .</para>4 <para><command>make SHLIB_LIBS=-lcurses</command>: This command makes the 5 proper symbols available for applications that assume 6 <application>readline</application> is compiled with 7 <application>ncurses</application> links.</para> 8 8 9 9 </sect2> -
general/prog/jdk/j2sdk-inst.xml
r4ea49a3 r1ea79a1 5 5 either or both.</para> 6 6 7 <para>Installation of the precompiled <acronym>JDK</acronym> is easy, change 8 the executable bit for the downloaded file, change to the directory where you 9 want it installed and execute the downloaded file. The following (slightly 10 cryptic version) allows automatic installation.</para> 7 <para>Installation of the precompiled <acronym>JDK</acronym> is easy: 8 create a directory to install from, copy the .bin there, and run the 9 following commands:</para> 11 10 12 11 <screen><userinput><command>VERSION=&j2sdk-bin-version; && … … 22 21 mv * /opt/j2sdk/j2sdk-precompiled-${MV}</command></userinput></screen> 23 22 24 <para>The binary version is now installed. </para>23 <para>The binary version is now installed. </para> 25 24 26 25 <para>If you don't want to compile the source or are not in a postition to download the source -
gnome/add/gnome-games/gnome-games-inst.xml
r4ea49a3 r1ea79a1 3 3 4 4 <para><application><acronym>GNOME</acronym> Games</application> needs to 5 be setgid to track high scores. Create a sep erate user and group for games.5 be setgid to track high scores. Create a separate user and group for games. 6 6 See the <filename>README</filename> file in the source directory for more 7 7 information:</para> -
postlfs/config/bootdisk.xml
r4ea49a3 r1ea79a1 72 72 compiler for this kernel. If you do so, don't overlook any loadable 73 73 modules (which are not addressed here) you might need - they need to be 74 compiled with same compiler used to make the kernel.</para>74 compiled with the same compiler used to make the kernel.</para> 75 75 76 76 <para>The rescue image must include support for the file system of your … … 407 407 <screen><userinput><command>mv GNUmakefile Makefile && 408 408 make && 409 make PREFIX=/mnt/loop1 install &&</command></userinput></screen>409 make PREFIX=/mnt/loop1 install</command></userinput></screen> 410 410 411 411 <para><emphasis>Install part of <application>e2fsprogs</application></emphasis></para> … … 496 496 497 497 <screen><userinput><command>strip -p --strip-unneeded --remove-section=.comment \ 498 -o /mnt/loop1/lib/libc.so.6 /lib/libc-2.3. 2.so &&498 -o /mnt/loop1/lib/libc.so.6 /lib/libc-2.3.3.so && 499 499 strip -p --strip-unneeded --remove-section=.comment \ 500 -o /mnt/loop1/lib/ld-linux.so.2 /lib/ld-2.3. 2.so &&500 -o /mnt/loop1/lib/ld-linux.so.2 /lib/ld-2.3.3.so && 501 501 strip -p --strip-unneeded --remove-section=.comment \ 502 -o /mnt/loop1/lib/libdl.so.2 /lib/libdl-2.3. 2.so &&502 -o /mnt/loop1/lib/libdl.so.2 /lib/libdl-2.3.3.so && 503 503 chmod 555 /mnt/loop1/lib/{libc.so.6,ld-linux.so.2,libdl.so.2}</command></userinput></screen> 504 504 -
postlfs/config/compressdoc.xml
r4ea49a3 r1ea79a1 6 6 bzip2'ed pages, a feature you can use to free some disk space while keeping 7 7 your documentation available. However, things are not that simple: man 8 directories tend to contain links - hard and symbolic -which defeat simple8 directories tend to contain links—hard and symbolic—which defeat simple 9 9 ideas like recursively calling <command>gzip</command> on them. A better way 10 10 to go is to use the script below. … … 460 460 <command>compressdoc --bz2</command> to compress all your system man 461 461 pages. You can also run <command>compressdoc --help</command> to get 462 acomprehensive help about what the script is able to do.</para>462 comprehensive help about what the script is able to do.</para> 463 463 464 464 <para> Don't forget that a few programs, like the <application>X</application> 465 Window system , <application>XEmacs</application>,also install their465 Window system and <application>XEmacs</application> also install their 466 466 documentation in non standard places (such as <filename class="directory"> 467 /usr/X11R6/man</filename>, etc...). Don't forget to add those locations inthe467 /usr/X11R6/man</filename>, etc...). Be sure to add these locations to the 468 468 file <filename>/etc/man.conf</filename>, as a 469 469 <envar>MANPATH</envar>=<replaceable>/path</replaceable> section.</para> -
postlfs/config/inputrc.xml
r4ea49a3 r1ea79a1 5 5 <para><filename>Inputrc</filename> deals with the mapping of the keyboard for 6 6 certain situations. This file is the start-up file used by 7 <application>readline</application> -the input related library used by8 <application> Bash</application> and most other shells.</para>7 <application>readline</application>—the input related library used by 8 <application>bash</application> and most other shells.</para> 9 9 10 10 <para>For more information see <command>info bash</command> -- <emphasis -
postlfs/config/netfs.xml
r4ea49a3 r1ea79a1 4 4 5 5 <para>While <acronym>LFS</acronym> is capable of mounting network file 6 systems such as <acronym>NFS</acronym> these are not mounted by 7 <filename>mountfs</filename> init script since the tools needed to mount8 these systems may not be available on the root partition and also since9 network file systems need to be mounted after the networking is on and10 need to be unmounted before the network goes down.</para>6 systems such as <acronym>NFS</acronym> these are not mounted by the 7 <filename>mountfs</filename> init script. The tools needed to mount 8 these systems may not be available on the root partition and the 9 network file systems need to be mounted after the networking is activated. 10 These file systems also need to be unmounted before the network goes down.</para> 11 11 12 12 <para>Install the <filename>/etc/rc.d/init.d/netfs</filename> -
postlfs/config/skel.xml
r4ea49a3 r1ea79a1 53 53 <para><emphasis>/etc/skel</emphasis></para> 54 54 55 <para>To get started create an <filename class="directory">/etc/skel</filename> directory55 <para>To get started, create an <filename class="directory">/etc/skel</filename> directory 56 56 and make sure it is writable only by the system administrator, usually 57 57 root. Creating the directory as root is the best way to go.</para> … … 95 95 <para><emphasis>When Adding a User</emphasis></para> 96 96 97 <para>When adding a new user with <command>useradd</command> use97 <para>When adding a new user with <command>useradd</command>, use 98 98 the <option>-m</option> parameter, which tells 99 99 <command>useradd</command> to create the user's home directory and -
postlfs/config/vimrc.xml
r4ea49a3 r1ea79a1 3 3 <title>/etc/vimrc, ~/.vimrc</title> 4 4 5 <para>The <acronym>LFS</acronym> book installs 6 <application>vim</application> as its editor. At this point we should 7 state that there are a <emphasis>lot</emphasis> of different editors out 8 there including <application>emacs</application>, 9 <application>nano</application>, <application>joe</application> and many 10 more. Anyone who has been around the Internet (especially usenet) for a 11 short time will certainly have observed at least one flame war, usually 12 involving <application>vim</application> and 5 <para>The <acronym>LFS</acronym> book installs <application>vim</application> 6 as its text editor. At this point we should state that there are a 7 <emphasis>lot</emphasis> of different editing applications out there including 8 <application>emacs</application>, <application>nano</application>, 9 <application>joe</application> and many more. Anyone who has been around the 10 Internet (especially usenet) for a short time will certainly have observed at 11 least one flame war, usually involving <application>vim</application> and 13 12 <application>emacs</application> users!</para> 14 13 … … 29 28 the file from <filename>/etc/skel/.vimrc</filename> to 30 29 <filename>/etc/vimrc</filename> and the home directory of users already 31 on the system, like root. Be sure to set permissions, owner and group if30 on the system, like root. Be sure to set permissions, owner, and group if 32 31 you do copy anything directly from <filename>/etc/skel</filename>.</para> 33 32 -
postlfs/editors/emacs/emacs-desc.xml
r4ea49a3 r1ea79a1 29 29 30 30 <sect3><title>ebrowse</title> 31 <para><command>ebrowse</command> permits browsing of C++ class 32 hierarchies from within emacs.</para></sect3> 31 32 <para><command>ebrowse</command> permits browsing of C++ class hierarchies from 33 within emacs.</para></sect3> 33 34 34 35 <sect3><title>emacsclient</title> -
postlfs/filesystems/reiser/reiser-desc.xml
r4ea49a3 r1ea79a1 12 12 13 13 <sect3><title>debugreiserfs</title> 14 <para><command>debugreiserfs</command> can sometimes help to solve problems 15 with <application>ReiserFS</application> file systems. If it is called without 16 options, it prints the super 17 block of any reiserfs file system found on the device.</para></sect3> 14 15 <para><command>debugreiserfs</command> can sometimes help to solve problems 16 with <application>ReiserFS</application> file systems. If it is called without 17 options, it prints the super block of any reiserfs file system found on the 18 device.</para></sect3> 18 19 19 20 <sect3><title>mkreiserfs</title> -
postlfs/security/cracklib/cracklib-intro.xml
r4ea49a3 r1ea79a1 2 2 <title>Introduction to <application>cracklib</application></title> 3 3 4 <para>The cracklib package contains a library used to enforce strong 5 passwords by comparing user selected passwords to words in a 6 chosen wordlist.</para> 4 <para>The cracklib package contains a library used to enforce strong passwords 5 by comparing user selected passwords to words in a chosen wordlist.</para> 7 6 8 7 <sect3><title>Package information</title> … … 27 26 </itemizedlist> 28 27 29 <para>You will also need to download a wordlist for use with cracklib. 30 There are two wordlists to choose from at the following location. 31 Use the <filename>cracklib</filename> word list for good security, 32 or opt for the <filename>allwords</filename> word list for 33 lightweight machines short on <acronym>RAM</acronym>. You can of course choose any other 34 word list that youhave at your disposal.</para>28 <para>You will also need to download a wordlist for use with cracklib. There 29 are two wordlists to choose from at the following location. Use the 30 <filename>cracklib</filename> word list for good security, or opt for the 31 <filename>allwords</filename> word list for lightweight machines short on 32 <acronym>RAM</acronym>. You can of course choose any other word list that you 33 have at your disposal.</para> 35 34 36 35 <para>cracklib (&crackdict-size;): <ulink url="http://www.cotse.com/wordlists/cracklib"/></para> -
postlfs/security/firewalling/busybox.xml
r4ea49a3 r1ea79a1 11 11 12 12 <para>Be cautious. Every service you offer and have enabled makes your 13 setup more complex and your box less secure :You induce the risks of14 misconfigured services or running a service with an exploitable bug , both risks15 that a firewall principally should be immune of.See the introduction to13 setup more complex and your box less secure. You induce the risks of 14 misconfigured services or running a service with an exploitable bug. A firewall 15 should generally not run any extra services. See the introduction to 16 16 <xref linkend="postlfs-security-fw-masqRouter"/> for some more details.</para> 17 17 … … 31 31 iptables -A OUTPUT -j ACCEPT</screen> 32 32 33 <para>However, it is generally not advisable to leave OUTPUT unrestricted : you lose34 any control o ntrojans who'd like to "call home", and a bit of redundancy in case33 <para>However, it is generally not advisable to leave OUTPUT unrestricted. You lose 34 any control over trojans who'd like to "call home", and a bit of redundancy in case 35 35 you've (mis-)configured a service so that it does broadcast its existence to the 36 36 world.</para> … … 59 59 60 60 <listitem><para><anchor id='postlfs-security-fw-BB-4' xreflabel="example no. 4"/>If you are 61 frequently accessing ftp-servers or enjoy chatting you might notice certain61 frequently accessing ftp-servers or enjoy chatting, you might notice certain 62 62 delays because some implementations of these daemons have the feature of 63 querying an identd on your box for your username for logging.63 querying an identd on your box for logging usernames. 64 64 Although there's really no harm in this, having an identd running is not 65 65 recommended because some implementations are known to be vulnerable.</para> … … 71 71 iptables -A OUTPUT -p tcp --sport 113 -m state --state RELATED -j ACCEPT</screen></listitem> 72 72 73 <listitem><para>To log and drop invalid packets , mostlyharmless packets74 that came in after netfilter's timeout , sometimes scans:</para>73 <listitem><para>To log and drop invalid packets (harmless packets 74 that came in after netfilter's timeout or some types of network scans):</para> 75 75 76 76 <screen>iptables -I INPUT 1 -p tcp -m state --state INVALID -j LOG --log-prefix \ -
postlfs/security/firewalling/disclaimer.xml
r4ea49a3 r1ea79a1 6 6 DOCUMENT.</emphasis></para> --> 7 7 8 <para>This document is meant as an introduction to how to setup a 9 firewall - it is not a complete guide to securing systems. Firewalling 10 is a complex issue that requires careful configuration. 11 The scripts quoted here are simply intended to give examples as to how 12 a firewall works, they are not intended to fit into any imaginable 13 configuration and may not prevent any imaginableattack.</para>8 <para>This document is meant as an introduction to how to setup a firewall. It 9 is not a complete guide to securing systems. Firewalling is a complex issue 10 that requires careful configuration. The scripts quoted here are simply 11 intended to give examples as to how a firewall works, they are not intended to 12 fit into any imaginable configuration and may not prevent any imaginable 13 attack.</para> 14 14 15 15 <para>The purpose of this text is simply to give you a hint on how to get -
postlfs/security/firewalling/intro.xml
r4ea49a3 r1ea79a1 5 5 against malicious access by using a single machine as a firewall. 6 6 This does imply that the firewall is to be considered a single point 7 of failure, but it can make the administrator s life a lot easier.</para>7 of failure, but it can make the administrator's life a lot easier.</para> 8 8 9 9 <para>In a perfect world where you knew that every daemon or service … … 11 11 buffer-overflows and any other imaginable problem regarding its 12 12 security, and where you trusted every user accessing your services 13 to aim no harm, you wouldn't need to dohave a firewall!13 to aim no harm, you wouldn't need to have a firewall! 14 14 In the real world however, daemons may be misconfigured, 15 15 exploits against essential services are freely available, you … … 21 21 22 22 <para>Don't assume however, that having a firewall makes careful 23 configuration redundant, nor that it makes any negligent24 misconfiguration harmless , nor that it preventsanyone from exploiting a23 configuration redundant, or that it makes any negligent 24 misconfiguration harmless. It also doesn't prevent anyone from exploiting a 25 25 service you intentionally offer but haven't recently updated or patched 26 26 after an exploit went public. Despite having a firewall, you need to … … 40 40 companies such as Symantec, of which they claim or pretend that it 41 41 secures a home or desktop-pc with Internet access. This topic is 42 highly relevant for users who do not know the ways their computers43 might be accessed via the Internet and how to disable these,44 especially if they are always online and if they areconnected via42 highly relevant for users who do not know the methods their computers 43 might be accessed via the Internet or how to disable them, 44 especially if they are always online and connected via 45 45 broadband links.</para></sect3> 46 46 … … 59 59 performing masquerading or routing functions, but offering a bunch of 60 60 services, e.g., web-cache, mail, etc. This may be very commonly used 61 for home networks, but can definitely not tobe considered as secure61 for home networks, but can definitely not be considered as secure 62 62 anymore because the combining of server and router on one machine raises 63 63 the complexity of the setup.</para></sect3> -
postlfs/security/firewalling/kernel.xml
r4ea49a3 r1ea79a1 3 3 4 4 <para>If you want your Linux-Box to have a firewall, you must first ensure 5 that your kernel has been compiled with the relevant options turned on 5 that your kernel has been compiled with the relevant options turned on. 6 6 <!-- <footnote><para>If you needed assistance how to configure, compile and install 7 7 a new kernel, refer back to chapter VIII of the LinuxFromScratch book, … … 10 10 <ulink url="http://www.linuxfromscratch.org/view/3.1/chapter08/lilo.html">Making the LFS system bootable</ulink> 11 11 ; note, that you'll need to reboot 12 to actually run your new kernel.</para></footnote>-->.</para> 12 to actually run your new kernel.</para></footnote>--> 13 </para> 13 14 14 15 <para>How to configure your kernel, with enabling the options to be -
postlfs/security/firewalling/masqrouter.xml
r4ea49a3 r1ea79a1 82 82 <command>EOF</command></userinput></screen> 83 83 84 <para>With this script your intranet should be sufficiently 85 secure against external attacks: no one should be able to setup a 86 new connection to any internal service and, if it's masqueraded, 87 it s even invisible; furthermore, your firewall should be nearly immune 88 because there are no services runningthat a cracker could attack.</para>84 <para>With this script your intranet should be sufficiently secure against 85 external attacks. No one should be able to setup a new connection to any 86 internal service and, if it's masqueraded, it's even invisible. Furthermore, 87 your firewall should be nearly immune because there are no services running 88 that a cracker could attack.</para> 89 89 90 90 <para>Note: if the interface you're connecting to the Internet … … 97 97 98 98 <para>If you need stronger security (e.g., against DOS, connection 99 highjacking, spoofing, etc.) have a look at the list of99 highjacking, spoofing, etc.), have a look at the list of 100 100 <xref linkend="postlfs-security-fw-library"/> at the end of this section.</para> 101 101 -
postlfs/security/firewalling/persfw.xml
r4ea49a3 r1ea79a1 2 2 <title>Personal Firewall</title> 3 3 4 <para>A Personal Firewall is supposed to let you access the allservices4 <para>A Personal Firewall is supposed to let you access all the services 5 5 offered on the Internet, but keep your box secure and your data private.</para> 6 6 7 <para>Below is a slightly modified version of Rusty Russell's 8 recommendation from the <ulink url="http://www.netfilter.org/documentation/HOWTO/packet-filtering-HOWTO.html">Linux 7 <para>Below is a slightly modified version of Rusty Russell's recommendation 8 from the <ulink 9 url="http://www.netfilter.org/documentation/HOWTO/packet-filtering-HOWTO.html">Linux 9 10 2.4 Packet Filtering HOWTO</ulink>:</para> 10 11 … … 56 57 <xref linkend="postlfs-security-fw-BB-4"/>.</para> 57 58 58 <para>Even if you have daemons /services running on your box, these59 <para>Even if you have daemons or services running on your box, these 59 60 should be inaccessible everywhere but from your box itself. 60 61 If you want to allow access to services on your machine, such as ssh or pinging, -
postlfs/security/pam/linux_pam-config.xml
r4ea49a3 r1ea79a1 9 9 <sect3><title>Configuration Information</title> 10 10 11 <para>Configuration information is placed in <filename>/etc/pam.d</filename> or 12 <filename>/etc/pam.conf</filename> depending on the application that is using 13 <application><acronym>PAM</acronym></application>. Below are example files of 14 each type:</para> 11 <para>Configuration information is placed in <filename>/etc/pam.d</filename> or 12 <filename>/etc/pam.conf</filename> depending on user preference. Below are 13 example files of each type:</para> 15 14 16 15 <screen># Begin /etc/pam.d/other -
postlfs/security/pam/linux_pam-exp.xml
r4ea49a3 r1ea79a1 12 12 the mailspool directory <acronym>FHS</acronym> compliant.</para> 13 13 14 <para><option>--enable-read-both-confs</option>: This switch lets the local administrator choose which configuration file setup to use.</para> 14 <para><option>--enable-read-both-confs</option>: This switch lets the local 15 administrator choose which configuration file setup to use.</para> 15 16 16 17 <para><command>mv /lib/libpam.a /lib/libpam_misc.a /lib/libpamc.a -
postlfs/security/security.xml
r4ea49a3 r1ea79a1 16 16 <para>Prevention of breaches, like a trojan, are assisted by applications like 17 17 <application>GnuPG</application>, specifically the ability to confirm signed 18 packages, which prevents modificationof the <acronym>TAR</acronym> ball after18 packages, which recognizes modifications of the <acronym>TAR</acronym> ball after 19 19 the packager creates it.</para> 20 20 -
postlfs/security/shadow/shadow-config.xml
r4ea49a3 r1ea79a1 7 7 <filename>/etc/pam.d/passwd</filename>, 8 8 <filename>/etc/pam.d/su</filename>, 9 <filename>/etc/pam.d/shadow</filename>, 9 <filename>/etc/pam.d/shadow</filename>, and 10 10 <filename>/etc/pam.d/useradd</filename></para> 11 11 </sect3> -
postlfs/security/tripwire/tripwire-config.xml
r4ea49a3 r1ea79a1 38 38 tripwire -m i</command></userinput></screen> 39 39 40 <para>During configuration <application>Tripwire</application> will create two (2) keys: a site key and41 a local key which will be stored in <filename class="directory">/etc/tripwire/ 42 </filename>.</para>40 <para>During installation <application>Tripwire</application> will create two 41 (2) keys: a site key and a local key which will be stored in <filename 42 class="directory">/etc/tripwire/</filename>.</para> 43 43 44 44 </sect3> … … 59 59 on your system so that <application>Tripwire</application> will not continually notify you that 60 60 files you intentionally changed are a security violation. To do this you 61 must first <command>ls /var/lib/tripwire/report/</command> and note61 must first <command>ls -l /var/lib/tripwire/report/</command> and note 62 62 the name of the newest file which starts with <filename>linux-</filename> and 63 63 ends in <filename>.twr</filename>. This encrypted file was created during the -
postlfs/shells/ash/ash-intro.xml
r4ea49a3 r1ea79a1 3 3 4 4 <para><command>ash</command> is a shell that is the most compliant with the 5 Bourne Shell (not to be confused with Bourne Again SHell i.e. <application>Bash</application>5 Bourne Shell (not to be confused with Bourne Again SHell i.e., <application>Bash</application> 6 6 installed in <acronym>LFS</acronym>) without any additional features. 7 7 Bourne Shell is available on most commercial -
postlfs/shells/tcsh/tcsh.ent
r4ea49a3 r1ea79a1 5 5 <!ENTITY tcsh-config SYSTEM "tcsh-config.xml"> 6 6 <!ENTITY tcsh-desc SYSTEM "tcsh-desc.xml"> 7 <!ENTITY tcsh-version "6.1 2.00">7 <!ENTITY tcsh-version "6.13.00"> 8 8 <!ENTITY tcsh-download-http "http://gd.tuwien.ac.at/utils/shells/tcsh/tcsh-&tcsh-version;.tar.gz"> 9 9 <!ENTITY tcsh-download-ftp " "> -
postlfs/shells/zsh/zsh-config.xml
r4ea49a3 r1ea79a1 6 6 <application>ZSH</application> including 7 7 <filename>/etc/zshenv</filename>, <filename>/etc/zprofile</filename>, 8 <filename>/etc/zshrc</filename>, <filename>/etc/zlogin</filename> and8 <filename>/etc/zshrc</filename>, <filename>/etc/zlogin</filename>, and 9 9 <filename>/etc/zlogout</filename>. You can find more information on 10 10 these in the <filename>zsh(1)</filename> and related -
server/other/rsync/rsync-config.xml
r4ea49a3 r1ea79a1 9 9 10 10 <para>This is a simple download-only configuration. See the rsyncd man-page for 11 additional options (i.e. user authentication).</para>11 additional options (i.e., user authentication).</para> 12 12 13 13 <screen><userinput><command>cat > /etc/rsyncd.conf << "EOF"</command> -
xsoft/graphweb/mozilla/mozilla-intro.xml
r4ea49a3 r1ea79a1 7 7 8 8 <para>The Mozilla project also hosts two subprojects that aim to cater to the needs 9 of users who don't need the complete browser suite or like to have sep erate applications9 of users who don't need the complete browser suite or like to have separate applications 10 10 for browsing and e-mail. These subprojects are 11 11 <ulink url="http://www.mozilla.org/products/firefox/">Mozilla Firefox</ulink>, … … 13 13 <ulink url="http://www.mozilla.org/projects/thunderbird/">Mozilla Thunderbird</ulink>, 14 14 (a stand-alone mail client based on the Mozilla source code). The build instructions 15 for these two applications are discussed in sep erate sections:</para>15 for these two applications are discussed in separate sections:</para> 16 16 17 17 <itemizedlist>
Note:
See TracChangeset
for help on using the changeset viewer.