Changeset 5e18c49c
- Timestamp:
- 10/04/2003 02:23:39 PM (20 years ago)
- Branches:
- 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 12.0, 6.0, 6.1, 6.2, 6.2.0, 6.2.0-rc1, 6.2.0-rc2, 6.3, 6.3-rc1, 6.3-rc2, 6.3-rc3, 7.10, 7.4, 7.5, 7.6, 7.6-blfs, 7.6-systemd, 7.7, 7.8, 7.9, 8.0, 8.1, 8.2, 8.3, 8.4, 9.0, 9.1, basic, bdubbs/svn, elogind, gnome, kde5-13430, kde5-14269, kde5-14686, kea, ken/inkscape-core-mods, krejzi/svn, lazarus, lxqt, nosym, perl-modules, plabs/python-mods, qt5new, systemd-11177, systemd-13485, trunk, upgradedb, v5_0, v5_0-pre1, v5_1, v5_1-pre1, xry111/intltool, xry111/soup3, xry111/test-20220226, xry111/xf86-video-removal
- Children:
- c2ee009c
- Parents:
- 5fd03d2
- Files:
-
- 46 edited
Legend:
- Unmodified
- Added
- Removed
-
appendices/glossary.xml
r5fd03d2 r5e18c49c 152 152 <glossdef><para><acronym>GTK</acronym>+ Drawing Kit</para></glossdef></glossentry> 153 153 154 <glossentry id="gGID"><glossterm><acronym>GID</acronym></glossterm> 155 <glossdef><para>Group IDentity</para></glossdef></glossentry> 156 154 157 <glossentry id="gGIF"><glossterm><acronym>GIF</acronym></glossterm> 155 158 <glossdef><para>Graphics Interchange Format</para></glossdef></glossentry> … … 422 425 <glossdef><para>Secure Sockets Layer</para></glossdef></glossentry> 423 426 427 <glossentry id="gSUID"><glossterm><acronym>SUID</acronym></glossterm> 428 <glossdef><para>Set User IDentity</para></glossdef></glossentry> 429 424 430 <glossentry id="gSVG"><glossterm><acronym>SVG</acronym></glossterm> 425 431 <glossdef><para>Scalable Vector Graphics</para></glossdef></glossentry> … … 443 449 <glossdef><para>Universal Disk Format</para></glossdef></glossentry> 444 450 451 <glossentry id="gUID"><glossterm><acronym>UID</acronym></glossterm> 452 <glossdef><para>User IDentity</para></glossdef></glossentry> 453 445 454 <glossentry id="gUDP"><glossterm><acronym>UDP</acronym></glossterm> 446 455 <glossdef><para>User Datagram Protocol</para></glossdef></glossentry> -
appendices/symlinks/rc0.xml
r5fd03d2 r5e18c49c 144 144 <entry>xinetd</entry> 145 145 <entry><filename>../init.d/xinetd</filename></entry> 146 <entry>Stop internet services daemon: <xref linkend="xinetd"/></entry>146 <entry>Stop Internet services daemon: <xref linkend="xinetd"/></entry> 147 147 </row> 148 148 -
appendices/symlinks/rc1.xml
r5fd03d2 r5e18c49c 116 116 <entry>xinetd</entry> 117 117 <entry><filename>../init.d/xinetd</filename></entry> 118 <entry>Stop internet services daemon: <xref linkend="xinetd"/></entry>118 <entry>Stop Internet services daemon: <xref linkend="xinetd"/></entry> 119 119 </row> 120 120 -
appendices/symlinks/rc2.xml
r5fd03d2 r5e18c49c 102 102 <entry>xinetd</entry> 103 103 <entry><filename>../init.d/xinetd</filename></entry> 104 <entry>Stop internet services daemon: <xref linkend="xinetd"/></entry>104 <entry>Stop Internet services daemon: <xref linkend="xinetd"/></entry> 105 105 </row> 106 106 -
appendices/symlinks/rc3.xml
r5fd03d2 r5e18c49c 67 67 <entry>xinetd</entry> 68 68 <entry><filename>../init.d/xinetd</filename></entry> 69 <entry>Load internet services daemon: <xref linkend="xinetd"/></entry>69 <entry>Load Internet services daemon: <xref linkend="xinetd"/></entry> 70 70 </row> 71 71 -
appendices/symlinks/rc4.xml
r5fd03d2 r5e18c49c 67 67 <entry>xinetd</entry> 68 68 <entry><filename>../init.d/xinetd</filename></entry> 69 <entry>Load internet services daemon: <xref linkend="xinetd"/></entry>69 <entry>Load Internet services daemon: <xref linkend="xinetd"/></entry> 70 70 </row> 71 71 -
appendices/symlinks/rc5.xml
r5fd03d2 r5e18c49c 60 60 <entry>xinetd</entry> 61 61 <entry><filename>../init.d/xinetd</filename></entry> 62 <entry>Load internet services daemon: <xref linkend="xinetd"/></entry>62 <entry>Load Internet services daemon: <xref linkend="xinetd"/></entry> 63 63 </row> 64 64 -
appendices/symlinks/rc6.xml
r5fd03d2 r5e18c49c 137 137 <entry>xinetd</entry> 138 138 <entry><filename>../init.d/xinetd</filename></entry> 139 <entry>Stop internet services daemon: <xref linkend="xinetd"/></entry>139 <entry>Stop Internet services daemon: <xref linkend="xinetd"/></entry> 140 140 </row> 141 141 -
basicnet/djb/daemontools/daemontools-desc.xml
r5fd03d2 r5e18c49c 73 73 <sect3><title>setuidgid</title> 74 74 <para><command>setuidgid</command> runs a specified program under a given 75 account's uid and gid.</para></sect3>75 account's <acronym>UID</acronym> and <acronym>GID</acronym>.</para></sect3> 76 76 77 77 <sect3><title>envuidgid</title> 78 78 <para><command>envuidgid</command> performs the same function as setuidgid, 79 79 but sets environment variables <envar>UID</envar> and <envar>GID</envar> equal 80 to the uid and gidof the account specified.</para></sect3>80 to the <acronym>UID</acronym> and <acronym>GID</acronym> of the account specified.</para></sect3> 81 81 82 82 <sect3><title>envdir</title> -
basicnet/netlibs/curl/curl-intro.xml
r5fd03d2 r5e18c49c 7 7 For example, <command>curl http://curl.haxx.se/download/curl-&curl-version;.tar.gz > 8 8 curl-&curl-version;.tar.gz</command> would download this program's 9 tarball to the current directory. This ability to both download and9 <acronym>TAR</acronym> ball to the current directory. This ability to both download and 10 10 redirect files can be incorporated into other programs to support 11 11 functions like streaming media.</para> -
basicnet/netprogs/cvs/cvs-desc.xml
r5fd03d2 r5e18c49c 20 20 21 21 <sect3><title>rcs2log</title> 22 <para><acronym>RCS</acronym> to Change Log generator.</para></sect3>22 <para><acronym>RCS</acronym> to Change Log generator.</para></sect3> 23 23 24 24 </sect2> -
basicnet/netprogs/inetutils/inetutils-desc.xml
r5fd03d2 r5e18c49c 47 47 48 48 <sect3><title>inetd</title> 49 <para><command>inetd</command> is a internet super-server.</para></sect3>49 <para><command>inetd</command> is a Internet super-server.</para></sect3> 50 50 51 51 <sect3><title>rexecd</title> -
basicnet/netprogs/tcpwrappers/tcpwrappers-desc.xml
r5fd03d2 r5e18c49c 11 11 <sect3><title>tcpd</title> 12 12 <para><command>tcpd</command> is the main access control daemon for all 13 internet services, which <command>inetd</command> or13 Internet services, which <command>inetd</command> or 14 14 <command>xinetd</command> will run instead of running the 15 15 requested service daemon.</para></sect3> -
basicnet/netutils/traceroute/traceroute-exp.xml
r5fd03d2 r5e18c49c 8 8 9 9 <para><command>make install</command>: Installs <command>traceroute</command> 10 setuidroot in the <filename>/usr/sbin</filename> directory. This makes it10 with <acronym>UID</acronym> set to root in the <filename>/usr/sbin</filename> directory. This makes it 11 11 possible for all users to execute <command>traceroute</command>. For absolute 12 security, turn off the setuidbit in <command>traceroute</command>'s file12 security, turn off the <acronym>SUID</acronym> bit in <command>traceroute</command>'s file 13 13 permissions with the command: 14 14 <screen><command>chmod 0755 /usr/sbin/traceroute</command></screen></para> … … 16 16 <para>The risk is that if a security problem such as a buffer overflow were 17 17 ever found in the <application>Traceroute</application> code, a regular user 18 on your system could gain root access if the program is setuid root. Removing 19 the setuid permission of course also makes it impossible for users other than 18 on your system could gain root access if the program is 19 <acronym>SUID</acronym> root. Removing 20 the <acronym>SUID</acronym> permission of course also makes it impossible for users other than 20 21 root to utilize <command>traceroute</command>, so decide what's right for your 21 22 individual situation.</para> 22 23 23 24 <para>Now, to be completely <acronym>FHS</acronym> compliant, as is our aim, if 24 you do leave the <command>traceroute</command> binary setuid root, then you 25 you do leave the <command>traceroute</command> binary 26 <acronym>SUID</acronym> root, then you 25 27 should move <filename>traceroute</filename> to <filename>/usr/bin</filename> 26 28 with the following command: -
connect/connect.xml
r5fd03d2 r5e18c49c 6 6 by connecting to a <acronym>LAN</acronym> with a static 7 7 <acronym>IP</acronym>. There are other methods used to connect to 8 <acronym>LAN</acronym>'s and other networks (such as the internet). We cover8 <acronym>LAN</acronym>'s and other networks (such as the Internet). We cover 9 9 the most popular methods in this chapter.</para></partintro> 10 10 -
content/web/apache/apache-desc.xml
r5fd03d2 r5e18c49c 30 30 31 31 <sect3><title>apachectl</title> 32 <para><command>apachectl</command> is a front end to the32 <para><command>apachectl</command> is a front end to the 33 33 <application>Apache</application> <acronym>HTTP</acronym> 34 34 server which is designed to help the administrator control the -
general/graphlib/svgalib/svgalib-inst.xml
r5fd03d2 r5e18c49c 4 4 <note><para>You must compile and install as root. If you don't nothing bad 5 5 will happen during compilation, but certain tools won't be able to 6 become setuidroot which is required for proper operation. However,6 become <acronym>SUID</acronym> root which is required for proper operation. However, 7 7 this raises a risk of exposing your system to any holes in those 8 8 tools that might be used to gain root access so use with caution.</para></note> -
general/prog/gcc/gcc-exp.xml
r5fd03d2 r5e18c49c 16 16 <application>Ada</application> build. This step 17 17 may be skipped if you don't want to compile the 18 <application>Ada</application> front end.</para>18 <application>Ada</application> front end.</para> 19 19 20 20 <para><parameter>CC=/usr/bin/gcc</parameter>: This command works around the -
introduction/important/unpacking.xml
r5fd03d2 r5e18c49c 13 13 installation instructions.</para> 14 14 15 <para>While you can keep the source tarballs anywhere you like, we15 <para>While you can keep the source <acronym>TAR</acronym> balls anywhere you like, we 16 16 assume that you have unpacked them and unzipped any required patches 17 17 into <filename>/usr/src</filename>.</para> -
introduction/welcome/changelog.xml
r5fd03d2 r5e18c49c 1 1 <sect1 id="intro-welcome-changelog" role="dsssl"> 2 2 <?dbhtml filename="changelog.html" dir="introduction"?> 3 <title>Change log</title>4 5 <para>Please note that the change log only lists which editor was3 <title>Change Log</title> 4 5 <para>Please note that the change log only lists which editor was 6 6 responsible for putting the changes into <acronym>CVS</acronym>; please read 7 7 the <xref linkend="intro-welcome-credits"/> page in Chapter 1 for details on -
multimedia/videoutils/mplayer/mplayer-desc.xml
r5fd03d2 r5e18c49c 19 19 <screen><command>mplayer -fs blfs.avi 20 20 mplayer -vo fbdev -fb /dev/fb0 -dvd 1 -aid 128 -sub en -framedrop 21 mplayer -fs -vcd 1;# works both for VCDs and SVCDs21 mplayer -fs vcd://1 # works both for VCDs and SVCDs 22 22 mplayer http://www.students.uni-marburg.de/~Klossa/hapkidofight_lo.mpg</command></screen> 23 23 -
postlfs/config/bootdisk.xml
r5fd03d2 r5e18c49c 14 14 15 15 <para>Heeding the warning, the rescue disk created here has no 16 dependency on the host system's resources, other than basic boot -ability16 dependency on the host system's resources, other than basic bootability 17 17 and hardware soundness. At a minimum, the most common sorts of failures 18 18 requiring a rescue boot disk should be addressed by the contents of the … … 74 74 compiled with same compiler used to make the kernel.</para> 75 75 76 <para>The rescue -image must include support for the file system of your76 <para>The rescue image must include support for the file system of your 77 77 choice (we presume ext2/3 here), ramdisk and initial ramdisk (initrd). 78 78 Disable everything that you can in the kernel configuration. You should -
postlfs/config/config.xml
r5fd03d2 r5e18c49c 13 13 these files can be found in the <filename>/etc</filename> hierarchy. 14 14 There are often graphical configuration programs available for different 15 subsystems but most are simply pretty front ends to the process15 subsystems but most are simply pretty front ends to the process 16 16 of editing the file. The advantage of text-only configuration is that 17 17 you can edit parameters using your favorite text editor, whether that -
postlfs/editors/emacs/emacs-desc.xml
r5fd03d2 r5e18c49c 41 41 42 42 <sect3><title>grep-changelog</title> 43 <para><command>grep-changelog</command> prints entries in Change Logs matching various44 criteria.</para></sect3>43 <para><command>grep-changelog</command> prints entries in Change Logs matching 44 various criteria.</para></sect3> 45 45 46 46 <sect3><title>rcs-checkin</title> -
postlfs/security/firewalling/busybox.xml
r5fd03d2 r5e18c49c 6 6 Examples of this can be when you want to admin your box from another host 7 7 on your intranet or use it as a proxy or a name server. Note: Outlining a true 8 concept howto protect a server that offers services on the internet8 concept of how to protect a server that offers services on the Internet 9 9 goes far beyond the scope of this document, 10 10 see <xref linkend="postlfs-security-fw-disclaimer"/>.</para> … … 16 16 <xref linkend="postlfs-security-fw-masqRouter"/> for some more details.</para> 17 17 18 <para>If the services you'd like to offer do not need to access the internet18 <para>If the services you'd like to offer do not need to access the Internet 19 19 themselves, like internal-only samba- or name-servers, it's quite 20 20 simple and should still be acceptable from a security standpoint. -
postlfs/security/firewalling/intro.xml
r5fd03d2 r5e18c49c 1 1 <sect2 id="postlfs-security-fw-intro" xreflabel="Firewalling Introduction"> 2 <title>Introduction to Firewall ing</title>2 <title>Introduction to Firewall Creation</title> 3 3 4 4 <para>The general purpose of a firewall is to protect a network … … 16 16 may wish to choose which services are accessible by certain machines, 17 17 you may wish to limit which machines or applications are allowed 18 to have internet access, or you may simply not trust some of your18 to have Internet access, or you may simply not trust some of your 19 19 apps or users. 20 20 In these situations you might benefit by using a firewall.</para> … … 39 39 <para>This is a setup or program, for Windows commercially sold by 40 40 companies such as Symantec, of which they claim or pretend that it 41 secures a home or desktop-pc with internet access. This topic is41 secures a home or desktop-pc with Internet access. This topic is 42 42 highly relevant for users who do not know the ways their computers 43 might be accessed via the internet and how to disable these,43 might be accessed via the Internet and how to disable these, 44 44 especially if they are always online and if they are connected via 45 45 broadband links.</para></sect3> 46 46 47 47 <sect3><title><xref linkend="postlfs-security-fw-masqRouter"/></title> 48 <para>This is a box placed between the internet and an intranet.48 <para>This is a box placed between the Internet and an intranet. 49 49 To minimize the risk of compromising the firewall itself it 50 50 should generally have only one role, that of protecting the intranet. … … 52 52 and eventually IP masquerading (rewriting IP-headers 53 53 of the packets it routes from clients with private IP-addresses onto 54 the internet so that they seem to come from the firewall54 the Internet so that they seem to come from the firewall 55 55 itself) are commonly considered harmless.</para></sect3> 56 56 -
postlfs/security/firewalling/masqrouter.xml
r5fd03d2 r5e18c49c 4 4 <para>A true Firewall has two interfaces, one connected to an intranet, 5 5 in this example, <emphasis role="strong">eth0</emphasis>, and one 6 connected to the internet, here, <emphasis role="strong">ppp0</emphasis>.6 connected to the Internet, here, <emphasis role="strong">ppp0</emphasis>. 7 7 To provide the maximum security against the box itself being broken into, 8 8 make sure that there are no servers running on it, especially not … … 92 92 <replaceable>ppp+</replaceable> to the name of the interface which you are 93 93 using. If you are using the same interface type to connect to both your 94 intranet and the internet, you need to use the actual name of the94 intranet and the Internet, you need to use the actual name of the 95 95 interface such as <emphasis role="strong">eth0</emphasis>, 96 96 on both interfaces.</para> -
postlfs/security/firewalling/persfw.xml
r5fd03d2 r5e18c49c 3 3 4 4 <para>A Personal Firewall is supposed to let you access the all services 5 offered on the internet, but keep your box secure and your data private.</para>5 offered on the Internet, but keep your box secure and your data private.</para> 6 6 7 7 <para>Below is a slightly modified version of Rusty Russell's … … 51 51 <para>His script is quite simple, it drops all traffic coming in into your 52 52 computer that wasn't initiated from your box, but as long as you are simply 53 surfing the internet you are unlikely to exceed its limits.</para>53 surfing the Internet you are unlikely to exceed its limits.</para> 54 54 55 55 <para>If you frequently encounter certain delays at accessing ftp-servers, -
postlfs/security/security.xml
r5fd03d2 r5e18c49c 16 16 <para>Prevention of breaches, like a trojan, are assisted by applications like 17 17 <application>GnuPG</application>, specifically the ability to confirm signed 18 packages, which prevents modification of the tarball after the packager creates19 it.</para>18 packages, which prevents modification of the <acronym>TAR</acronym> ball after 19 the packager creates it.</para> 20 20 21 21 <para> Finally, we touch on detection with a package that stores "signatures" -
pst/ps/a2ps/a2ps-desc.xml
r5fd03d2 r5e18c49c 2 2 <title>Contents</title> 3 3 4 <para> a2ps is a filter program.The <application>a2ps</application> package5 con sists of the program<command>a2ps</command> and filter data.</para>4 <para>The <application>a2ps</application> package 5 contains <command>a2ps</command> and filter data.</para> 6 6 </sect2> 7 7 … … 11 11 <sect3><title>a2ps</title> 12 12 13 <para><command>a2ps</command> is a filter program that converts nearly 14 everything to PostScript.</para> 13 <para><command>a2ps</command> is a filter, utilized primarily by 14 printing scripts, that converts standard input or supported files 15 to PostScript.</para> 15 16 16 17 </sect3> -
pst/ps/a2ps/a2ps-exp.xml
r5fd03d2 r5e18c49c 7 7 cd .. &&</command></screen> 8 8 These commands eliminate the compiling and installing of the 9 <application> emacs</application> script files. If you have substituted10 <application> emacs</application> for <application>vi</application> as your9 <application>Emacs</application> script files. If you have substituted 10 <application>Emacs</application> for <application>Vi</application> as your 11 11 primary editor, you would want to skip these instructions.</para> 12 12 … … 14 14 sed -e 's|/usr/local/share/ghostscript|/usr/share/ghostscript|g' \ 15 15 configure.orig > configure</command></screen> 16 This command modifies the configure script to search for Ghostscript fonts 16 This command modifies the configure script to search for 17 <application>Ghostscript</application> fonts 17 18 at the location where they were installed by the <acronym>BLFS</acronym> 18 19 instructions.</para> 19 20 20 21 <para><parameter>--sysconfdir=/etc/a2ps</parameter>: Configuration data 21 goes to <filename >/etc/a2ps</filename> instead of22 <filename >/usr/etc</filename>.</para>22 goes to <filename class="directory">/etc/a2ps</filename> instead of 23 <filename class="directory">/usr/etc</filename>.</para> 23 24 24 25 <para><parameter>--with-medium=letter</parameter>: This switch changes 25 the default paper format of A4 to letter. Locations that utilize A426 the default paper format of A4 to letter. Installations that utilize A4 26 27 would eliminate this switch.</para> 27 28 -
pst/ps/a2ps/a2ps-intro.xml
r5fd03d2 r5e18c49c 2 2 <title>Introduction to <application>a2ps</application></title> 3 3 4 <para><application>a2ps</application> is a utility used mostly in the 5 background to convert almost every input format into PostScript output, hence 6 the name "a2ps" which stands for "all to PostScript".</para> 4 <para><application>a2ps</application> is a filter utilitized mainly in the 5 background and primarily by printing scripts to convert almost 6 every input format into PostScript output. The application's name expands 7 appropriately to "all to PostScript".</para> 7 8 8 9 <sect3><title>Package information</title> -
pst/ps/enscript/enscript-desc.xml
r5fd03d2 r5e18c49c 2 2 <title>Contents</title> 3 3 4 <para>The <application>enscript</application> package con sists of the program4 <para>The <application>enscript</application> package contains 5 5 <command>enscript</command> and filter data. 6 6 </para> … … 10 10 <sect3><title>enscript</title> 11 11 12 <para><command>enscript</command> is a filter program that converts 12 <para><command>enscript</command> is a filter, used primarily by 13 printing scripts, that converts 13 14 <acronym>ASCII</acronym> files to PostScript.</para> 14 15 -
pst/scanning/gocr/gocr-desc.xml
r5fd03d2 r5e18c49c 14 14 15 15 <sect3><title>gtk-ocr</title> 16 <para><command>gtk-ocr</command> is the <acronym>GTK</acronym> front end for16 <para><command>gtk-ocr</command> is the <acronym>GTK</acronym> front end for 17 17 <command>gocr</command>.</para></sect3> 18 18 -
pst/scanning/gocr/gocr-inst.xml
r5fd03d2 r5e18c49c 8 8 make install</command></userinput></screen> 9 9 10 <para>To install the <acronym>GTK</acronym> front end, use the following commands:</para>10 <para>To install the <acronym>GTK</acronym> front end, use the following commands:</para> 11 11 12 12 <screen><userinput><command>cd frontend/gnome && -
pst/scanning/gocr/gocr-intro.xml
r5fd03d2 r5e18c49c 8 8 9 9 <para><application>GOCR</application> can used as a console utility, but 10 there is an <acronym>GTK</acronym> front end in the source package, also.</para>10 there is an <acronym>GTK</acronym> front end in the source package, also.</para> 11 11 12 12 <sect3><title>Package information</title> … … 25 25 <sect3><title><application>GOCR</application> dependencies</title> 26 26 <sect4><title>Optional</title> 27 <para><xref linkend="pst-typesetting-tex"/> or fig2dev (for examples), <xref linkend="xfree86"/> and <xref linkend="GTK"/> (for front end only)</para></sect4>27 <para><xref linkend="pst-typesetting-tex"/> or fig2dev (for examples), <xref linkend="xfree86"/> and <xref linkend="GTK"/> (for front end only)</para></sect4> 28 28 </sect3> 29 29 -
pst/scanning/sane/sane-desc.xml
r5fd03d2 r5e18c49c 2 2 <title>Contents</title> 3 3 4 <sect3><title>Back ends:</title>4 <sect3><title>Back ends:</title> 5 5 <para>See <ulink url="http://www.mostang.com/sane/sane-supported-devices.html"/> 6 6 for a list of available backends.</para> 7 7 </sect3> 8 8 9 <sect3><title>Front ends:</title>9 <sect3><title>Front ends:</title> 10 10 <para><command>scanimage</command>: Command line interface for 11 11 scanning.</para> -
pst/scanning/sane/sane-inst.xml
r5fd03d2 r5e18c49c 23 23 </sect3> 24 24 25 <sect3><title>Installation of <application><acronym>SANE</acronym></application> front ends</title>25 <sect3><title>Installation of <application><acronym>SANE</acronym></application> front ends</title> 26 26 27 <para>To install <application><acronym>SANE</acronym></application> front ends, use the following27 <para>To install <application><acronym>SANE</acronym></application> front ends, use the following 28 28 commands:</para> 29 29 -
pst/scanning/sane/sane-intro.xml
r5fd03d2 r5e18c49c 9 9 with its own protocol, so the vendor drivers can't be used.</para> 10 10 11 <para><acronym>SANE</acronym> is split into back ends and frontends. The12 back ends are drivers for the supported scanners. The frontends are user11 <para><acronym>SANE</acronym> is split into back ends and front ends. The 12 back ends are drivers for the supported scanners. The front ends are user 13 13 interfaces to access the backends.</para> 14 14 … … 21 21 <listitem><para>Download (FTP): <ulink 22 22 url="&sane-fe-download-ftp;"/></para></listitem> 23 <listitem><para>Download size: &sane-be-size; (Back ends), &sane-fe-size;24 (Front ends)</para></listitem>23 <listitem><para>Download size: &sane-be-size; (Back ends), &sane-fe-size; 24 (Front ends)</para></listitem> 25 25 <listitem><para>Estimated Disk space required: 26 &sane-be-buildsize; (Back ends), &sane-fe-buildsize; (Frontends)</para></listitem>26 &sane-be-buildsize; (Back ends), &sane-fe-buildsize; (Front ends)</para></listitem> 27 27 <listitem><para>Estimated build time: 28 28 &sane-time;</para></listitem></itemizedlist> -
pst/scanning/xsane/xsane-intro.xml
r5fd03d2 r5e18c49c 2 2 <title>Introduction to <application>XSane</application></title> 3 3 4 <para><application>XSane</application> is another front end for4 <para><application>XSane</application> is another front end for 5 5 <xref linkend="sane"/>. It has additional features to improve the image 6 6 quality compared to xscanimage.</para> -
pst/typesetting/tex/tex-inst.xml
r5fd03d2 r5e18c49c 16 16 | (umask 0; cd /usr/share/texmf; tar xvf -)</command></userinput></screen> 17 17 18 <para>If the optional texmf source code tarball was downloaded, untar18 <para>If the optional texmf source code <acronym>TAR</acronym> ball was downloaded, untar 19 19 it now:</para> 20 20 <screen><userinput><command>gzip -dc ../tetex-texmfsrc-&tex-version;.tar.gz \ -
pst/typesetting/tex/tex-intro.xml
r5fd03d2 r5e18c49c 3 3 4 4 <para><application>TeX</application> is a typesetting package, able to create 5 documents in a variety of formats. The optional texmfsrc tarball contains 6 source code for packages that are contained in the texmf tarball, including 5 documents in a variety of formats. The optional texmfsrc 6 <acronym>TAR</acronym> ball contains source code for packages that are 7 contained in the texmf <acronym>TAR</acronym> ball, including 7 8 the docstrip sources.</para> 8 9 -
server/other/xinetd/xinetd-desc.xml
r5fd03d2 r5e18c49c 10 10 11 11 <sect3><title>xinetd</title> 12 <para><command>xinetd</command> is the internet services daemon.</para></sect3>12 <para><command>xinetd</command> is the Internet services daemon.</para></sect3> 13 13 14 14 <sect3><title>itox</title> -
x/wm/xfce/xfce-inst.xml
r5fd03d2 r5e18c49c 2 2 <title>Installation of <application>XFce</application></title> 3 3 4 <para><application>XFce</application> now distributes as a tarball of 4 <para><application>XFce</application> now distributes as a 5 <acronym>TAR</acronym> ball of 5 6 base packages and module packages. These instructions will only cover 6 7 the bare minimum to run the application. The remaining modules would -
xsoft/other/other.xml
r5fd03d2 r5e18c49c 3 3 <title>Other X-based Internet Programs</title> 4 4 5 <para>The internet isn't just about browsing. Here are more graphical6 applications that utilize other areas of the internet.</para>5 <para>The Internet isn't just about browsing. Here are more graphical 6 applications that utilize other areas of the Internet.</para> 7 7 8 8 &pan; -
xsoft/suites/openoffice/openoffice-intro.xml
r5fd03d2 r5e18c49c 41 41 <listitem><para>Required patch if <xref linkend="Linux_PAM"/> is not installed: <ulink 42 42 url="&patch-root;/openoffice-&openoffice-version;-no-pam.patch"/></para></listitem> 43 <listitem><para>The source tarball only contains English language help. A localized help43 <listitem><para>The source <acronym>TAR</acronym> ball only contains English language help. A localized help 44 44 content file may be available at <ulink 45 45 url="http://ftp.services.openoffice.org/pub/OpenOffice.org/contrib/helpcontent/"/>.</para></listitem></itemizedlist>
Note:
See TracChangeset
for help on using the changeset viewer.