Podobne
- Strona startowa
- PHP and MySQL MySQL Bible
- Linux. .Mandrake.10.Podręcznik.Użytkownika.[eBook.PL] (3)
- Linux administracja sieciami zaawansowane ( 554 strony )
- Sams' Teach Yourself Linux In 24 Hours
- McGraw.Hill,.Digital.Animation.Bible.Creating.Professional.Animation.with.3ds.Max.Lightwave.and.Maya.(2004).LiB
- Linux Installation and Getting Started
- Linux Network Administrators' Guide
- Alistair MacLean Goodbye
- Lewis Susan Skradzione marzenia
- Dukaj Jacek Czarne oceany (SCAN dal 758)
- zanotowane.pl
- doc.pisz.pl
- pdf.pisz.pl
- bezpauliny.htw.pl
Cytat
Do celu tam się wysiada. Lec Stanisław Jerzy (pierw. de Tusch-Letz, 1909-1966)
A bogowie grają w kości i nie pytają wcale czy chcesz przyłączyć się do gry (. . . ) Bogowie kpią sobie z twojego poukładanego życia (. . . ) nie przejmują się zbytnio ani naszymi planami na przyszłość ani oczekiwaniami. Gdzieś we wszechświecie rzucają kości i przypadkiem wypada twoja kolej. I odtąd zwyciężyć lub przegrać - to tylko kwestia szczęścia. Borys Pasternak
Idąc po kurzych jajach nie podskakuj. Przysłowie szkockie
I Herkules nie poradzi przeciwko wielu.
Dialog półinteligentów równa się monologowi ćwierćinteligenta. Stanisław Jerzy Lec (pierw. de Tusch - Letz, 1909-1966)
[ Pobierz całość w formacie PDF ]
.You mayalso have Secondary and Ternary name servers in case the first one can't be reached.(MostISPs will give you two DNS server addresses.)Cross-Reference To configure your LAN after installation, see Chapter 15.13.Choose a firewall configuration.The use of a firewall has significant impact on the security of your computer.If you are connected tothe Internet or to another public network, a firewall can limit the ways an intruder may break intoyour Linux system.Here are your choices for configuring a firewall during installation:f&High Select this security level if you are connecting your Linux system to the Internet forWeb browsing but don't plan to offer your system as a server to the Internet.Only explicitlydefined connections are accepted.To allow Web browsing and basic network setup, DNSreplies and DHCP (to serve addresses) are allowed.f&Medium Select this security level if you want to block access to ports used to offer mostbasic TCP/IP services (standard, reserved ports lower than 1023).This selection denies accessto ports used for NFS servers, remote X clients, and the X font server.f&No firewall Select this security level if you are not connected to a public network and donot want to deny requests for services from any computer on your local network.Of course,you can still restrict access to services by starting up only the services you want to offer andby using configuration files to restrict access to individual services.If you know you want to allow access to particular services, you can click Customize and allowincoming requests for the following: DHCP, SSH, Telnet, WWW, Mail, and/or FTP services.You canalso add a comma-separated list of port numbers to the Other Ports box to open access to those ports.(The /etc/services file lists which services are associated with which port numbers.)If you have a LAN that consists of trusted computers, you can click the box representing yourinterface to that LAN (probably eth0).Clicking the box allows access to any services you care toshare with the computers on your LAN.TipAdding firewall rules here results in rules being added to the /etc/sysconfig/ipchains file.The rulesare run from the /etc/init.d/ipchains start-up script when you boot your computer.I recommendthat you edit the rules file to change your firewall rules.This makes sure that your rules areconfigured automatically each time the system starts.Cross-Reference For more information on configuring firewalls, see Chapter 14.14.Choose language support.Your installation language should be selected automatically on this screen.You can select to installsupport for additional languages by clicking the check boxes next to the languages you want.15.Choose a time zone.Select the time zone from the list of time zones shown.Either click a spot on the map or choose fromthe scrolling list.To see a more specific view of your location, click World and choose yourcontinent.From the UTC Offset tab, you can choose a time zone according to the number of hoursaway from Greenwich Mean Time (GMT), known as the UTC offset.16.Configure user accounts.You need to choose a password for your root user at this point and add one or more regular useraccounts.The root password provides complete control of your Red Hat Linux system.Without it,and before you add other users, you will have no access to your own system.Enter the RootPassword, and then type it again in the Confirm box to confirm it.(Remember the root user'spassword and keep it confidential!)TipUse the passwd command to change your password later.See Chapter 14 for suggestions on howto choose a good password.See Chapter 11 for information on setting up user accounts.Add an account name for a regular user on your computer.Type the password, confirm it, type a fullname for the user, and click Add to add the account.Click Next to continue.17.Enable authentication.In most situations, you will enable shadow passwords and MD5 passwords (as selected by default).The shadow password file prevents access to encrypted passwords.Note MD5 is an algorithm used to encrypt passwords in Linux and other UNIX systems.It replacesan algorithm called crypt, which was used with early UNIX systems.When you enable MD5passwords, your users can have longer passwords that are harder to break than those encryptedwith crypt.If you are on a network that supports one of several different forms of network-wide authentication,you may choose one of the following features:f&Enable NIS.Select this button and type the NIS Domain name and NIS server location ifyour network is configured to use the Network Information System (NIS).Instead of selectingan NIS Server, you can click the button to broadcast to find the server on your network.Cross-Reference For more information on NIS, see Chapter 23.f&Enable LDAP.If your organization gathers information about users, you can click this buttonto search for authentication information in an LDAP server.You can enter the LDAP Servername and optionally an LDAP distinguished name to look up the user information yoursystem needs.f&Enable Kerberos 5.Click this button to enable network authentication services availablethrough Kerberos
[ Pobierz całość w formacie PDF ]