SUSE Linux Enterprise Desktop Documentation
Deployment Guide
/ Part V. Security
38.4. Introduction to rsync
Chapter 39. Masquerading and Firewalls
Part V. Security
Contents
39. Masquerading and Firewalls
39.1. Packet Filtering with iptables
39.2. Masquerading Basics
39.3. Firewalling Basics
39.4. SuSEfirewall2
39.5. For More Information
40. SSH: Secure Network Operations
40.1. The OpenSSH Package
40.2. The ssh Program
40.3. scp—Secure Copy
40.4. sftp—Secure File Transfer
40.5. The SSH Daemon (sshd)—Server-Side
40.6. SSH Authentication Mechanisms
40.7. X, Authentication, and Forwarding Mechanisms
41. Network Authentication—Kerberos
41.1. Kerberos Terminology
41.2. How Kerberos Works
41.3. Users' View of Kerberos
41.4. For More Information
42. Encrypting Partitions and Files
42.1. Setting Up an Encrypted File System with YaST
42.2. Using Encrypted Home Directories
42.3. Using vi to Encrypt Single ASCII Text Files
43. Confining Privileges with AppArmor
43.1. Installing Novell AppArmor
43.2. Enabling and Disabling Novell AppArmor
43.3. Getting Started with Profiling Applications
44. Security and Confidentiality
44.1. Local Security and Network Security
44.2. Some General Security Tips and Tricks
44.3. Using the Central Security Reporting Address