Index

Symbols

64-bit Linux, 32-Bit and 64-Bit Applications in a 64-Bit System Environment
kernel specifications, Kernel Specifications
runtime support, Runtime Support
software development, Software Development

A

access permissions (see permissions)
ACLs, Access Control Lists in Linux, For More Information
access, Definitions, A Directory with an Access ACL
check algorithm, The ACL Check Algorithm
default, Definitions, A Directory with a Default ACL
definitions, Definitions
effects, Effects of a Default ACL
handling, Handling ACLs
masks, A Directory with an Access ACL
permission bits, ACL Entries and File Mode Permission Bits
structure, Handling ACLs
support, ACL Support in Applications
ACPI
disabling, The Boot Screen
add-on products, Installing Add-On Products
Apache, Other Available Services, The Apache HTTP Server, Miscellaneous Sources
CGI scripts, Getting CGI Scripts to Work
configuring, Configuring Apache
files, Configuration Files
manually, Configuring Apache Manually, Basic Virtual Host Configuration
virtual host, Virtual Host Configuration
YaST, Configuring Apache with YaST, Main Host or Hosts
installing, Installation
modules, Installing, Activating, and Configuring Modules, Compilation
available, Base and Extension Modules
building, Compilation
external, External Modules
installing, Module Installation
multiprocessing, Multiprocessing Modules
quick start, Quick Start
security, Avoiding Security Problems
Squid, Setup
SSL, Setting Up a Secure Web Server with SSL, Configuring Apache with SSL
configure Apache with SSL, Configuring Apache with SSL
creating an SSL certificate, Creating an SSL Certificate
starting, Starting and Stopping Apache
stopping, Starting and Stopping Apache
troubleshooting, Troubleshooting
authentication
Kerberos, Kerberos for Network Authentication
PAM, Authentication with PAM, For More Information
AutoYaST, Autoinstallation
cloning system, Completing the Installation

C

cards
graphics, Device Section
network, Configuring a Network Connection with YaST, Configuring the Network Card with YaST
sound, Sound
cat, Commands to Access File Contents
cd, File Administration
CDs
booting from, Booting from Installation Media Fails
checking, Checking Media, Checking Media
chgrp, Modifying File Permissions, File Administration
chmod, Modifying File Permissions, File Administration
chown, Modifying File Permissions, File Administration
CJK, Keyboard Mapping
clear, Miscellaneous
commands, Important Linux Commands, Miscellaneous
bzip2, Archives and Data Compression
cat, Commands to Access File Contents
cd, File Administration
chgrp, Modifying File Permissions, File Administration
chmod, Modifying File Permissions, File Administration
chown, Modifying File Permissions, File Administration
clear, Miscellaneous
cp, File Administration
date, System Information
df, System Information
diff, Commands to Access File Contents
du, System Information
file, Commands to Access File Contents
find, File Administration
fonts-config, Installing and Configuring Fonts
free, System Information, The free Command
getfacl, A Directory with an Access ACL
grep, Commands to Access File Contents
grub, Booting with GRUB
gzip, Archives and Data Compression, File Administration
halt, Miscellaneous
help, Getting Help
ifconfig, Configuring the Network with ifconfig
ip, Configuring a Network Interface with ip
kadmin, Setting Up the Database
kill, Processes
killall, Processes
kinit, Using kadmin for Remote Administration
ktadd, Creating Kerberos Host Principals
ldapadd, Inserting Data into an LDAP Directory
ldapdelete, Deleting Data from an LDAP Directory
ldapmodify, Modifying Data in the LDAP Directory
ldapsearch, Searching or Reading Data from an LDAP Directory, Using Kerberos Authentication with LDAP
less, Commands to Access File Contents
ln, File Administration
locate, File Administration
lp, Printing from the Command Line
ls, File Administration
man, Important Linux Commands
mkdir, File Administration
mount, File Systems
mv, File Administration
nslookup, Network
passwd, Miscellaneous
ping, Network, Testing a Connection with ping
ps, Processes
reboot, Miscellaneous
rm, File Administration
rmdir, File Administration
route, Configuring Routing with route
rpm, RPM—the Package Manager
rpmbuild, RPM—the Package Manager
scp, scp—Secure Copy
setfacl, A Directory with an Access ACL
sftp, sftp—Secure File Transfer
slptool, SLP Front-Ends in SUSE Linux Enterprise
smbpasswd, Samba as Login Server
ssh, The ssh Program
ssh-agent, SSH Authentication Mechanisms
ssh-keygen, SSH Authentication Mechanisms
su, Miscellaneous
tar, Archives and Data Compression, File Administration
telnet, Network
top, Processes
umount, File Systems
updatedb, File Administration
configuration files, Configuration Files
.bashrc, The bash Package and /etc/profile, The ulimit Command
.emacs, Settings for GNU Emacs
.profile, The bash Package and /etc/profile
.xsession, SSH Authentication Mechanisms
acpi, ACPI in Action
asound.conf, Sound
crontab, The cron Package
csh.cshrc, Some Examples
dhclient.conf, DHCP Software Packages
dhcp, /etc/sysconfig/network/{config,dhcp,wireless}
dhcpd.conf, The DHCP Server dhcpd
fstab, More Partitioning Tips, File Systems
group, Checking passwd and group in /etc
grub.conf, The File /etc/grub.conf
host.conf, /etc/host.conf
HOSTNAME, /etc/HOSTNAME
hosts, Other Available Services, Name Resolution, /etc/hosts
ifcfg-*, /etc/sysconfig/network/ifcfg-*
inittab, The init Process, Runlevels, Virtual Consoles
inputrc, Keyboard Mapping
kernel, initramfs
krb5.conf, Manually Configuring Kerberos Clients, Static Configuration, Adjusting the Clock Skew, Enabling PAM Support for Kerberos
krb5.keytab, Creating Kerberos Host Principals
language, Language and Country-Specific Settings, Some Examples
logrotate.conf, Log Files: Package logrotate
menu.lst, The GRUB Boot Menu
modprobe.d/sound, Sound
named.conf, Starting the Name Server BIND, The Configuration File /etc/named.conf, Zone Files, Local DNS Server
network, /etc/sysconfig/network/{config,dhcp,wireless}
networks, /etc/networks
nscd.conf, /etc/nscd.conf
nsswitch.conf, /etc/nsswitch.conf, Standard Procedure
openldap, Using LDAP and Kerberos
pam_unix2.conf, Standard Procedure, Enabling PAM Support for Kerberos
passwd, Checking passwd and group in /etc
permissions, Some General Security Tips and Tricks
powersave, ACPI in Action
powersave.conf, Changes in the powersave Package
profile, The bash Package and /etc/profile, The ulimit Command, Some Examples
resolv.conf, The /etc/resolv.conf File, /etc/resolv.conf, Starting the Name Server BIND, Starting Squid
routes, /etc/sysconfig/network/{routes,ifroute-*}
samba, Web Administration with SWAT
services, Web Administration with SWAT, Firewall Configuration with SuSEfirewall2
slapd.conf, Server Configuration with slapd.conf, Kerberos Authentication and LDAP Access Control
smb.conf, Configuring the Server Manually, For More Information
smppd.conf, Configuring smpppd
smpppd-c.conf, Configuring KInternet, cinternet, and qinternet for Remote Use
squid.conf, Commands for Starting and Stopping Squid, The Configuration File /etc/squid/squid.conf, Options for Access Controls, Configuration Options in /etc/squid/squid.conf, Cache Manager ACLs in /etc/squid/squid.conf, squidGuard
squidguard.conf, squidGuard
sshd_config, X, Authentication, and Forwarding Mechanisms, Configuring SSH for Kerberos Authentication
ssh_config, Configuring SSH for Kerberos Authentication
suseconfig, Changing the System Configuration Manually
sysconfig, /etc/sysconfig Editor, System Configuration via /etc/sysconfig, Changing the System Configuration Manually
termcap, Keyboard Mapping
wireless, /etc/sysconfig/network/{config,dhcp,wireless}
XF86Config, X.Org Configuration File
xorg.conf, X.Org Configuration File, Manually Configuring the X Window System
Device, Device Section
Monitor, Monitor and Modes Section
Screen, Screen Section
configuring, System Configuration via /etc/sysconfig
cable modem, Cable Modem
DASD, IBM System z: DASD Devices
DNS, Other Available Services, The Domain Name System
DSL, DSL, ISDN, Modem, or Network Card, DSL
e-mail, Mail Transfer Agent
firewalls, Firewall
graphics cards, SaX2
groups, Group Management
GRUB, Booting with GRUB, The File /etc/grub.conf
hard disk controllers, Hard Disk Controller
hard disks
DMA, IDE DMA Mode
hardware, Hardware
IPv6, Configuring IPv6
ISDN, DSL, ISDN, Modem, or Network Card, ISDN
languages, Language Selection
mail servers, Mail Server
modems, DSL, ISDN, Modem, or Network Card, Modem
monitor, SaX2
network cards, DSL, ISDN, Modem, or Network Card
networks, Network Devices, Other Available Services, Configuring the Network Card with YaST
manually, Configuring a Network Connection Manually, Start-Up Scripts
NFS, Other Available Services
NTP, Other Available Services
PAM, PAM Configuration
power management, Power Management
powertweak, Powertweak Configuration
printing, Setting Up a Printer, Configuring Network Printers with YaST
local printers, Configuring Local Printers
network printers, Configuring Network Printers with YaST
routing, Other Available Services, /etc/sysconfig/network/{routes,ifroute-*}
Samba, Configuring a Samba Server, Security Levels, Configuring the Server Manually
clients, Other Available Services, Configuring a Samba Client with YaST
servers, Other Available Services
security, AppArmor, Security and Users, Firewall
software, Software, Update Options
sound cards, Sound
Squid, The Configuration File /etc/squid/squid.conf
SSH, SSH: Secure Network Operations
system, System Configuration with YaST, Vendor Driver CD
system services, Other Available Services
T-DSL, DSL
time zone, Time and Date Configuration
users, User Management
wireless cards, DSL, ISDN, Modem, or Network Card
ZFCP, IBM System z: ZFCP
consoles
assigning, Virtual Consoles
graphical, The Graphical SUSE Screen
switching, Virtual Consoles
core files, The ulimit Command
cp, File Administration
cpuspeed, The powersave Package
cron, The cron Package
CVS, CVS, Introduction to CVS, For More Information

F

file, Commands to Access File Contents
file servers, Other Available Services
file systems, File Systems in Linux, For More Information
ACLs, Access Control Lists in Linux, For More Information
changing, Editing a Partition
cryptofs, Encrypting Partitions and Files
encrypting, Encrypting Partitions and Files
Ext2, Ext2, Ext2
Ext3, Ext3, Converting an Ext2 File System into Ext3
LFS, Large File Support in Linux
limitations, Large File Support in Linux
OCFS2, Oracle Cluster File System 2, Additional Information, Oracle Cluster File System 2, Oracle Cluster File System 2
ReiserFS, ReiserFS, ReiserFS
repairing, Repairing and Checking File Systems
selecting, Major File Systems in Linux
supported, Some Other Supported File Systems, Some Other Supported File Systems
terms, Terminology
XFS, XFS, XFS
files
archiving, Archives and Data Compression, File Administration
comparing, Commands to Access File Contents
compressing, Archives and Data Compression, File Administration
copying, File Administration
deleting, File Administration
encrypting, Creating an Encrypted File as a Container
finding, The locate Command
moving, File Administration
paths, Working with Directories and Files
searching contents, Commands to Access File Contents
searching for, File Administration
synchronizing, File Synchronization, For More Information
CVS, CVS, Introduction to CVS, For More Information
rsync, rsync
uncompressing, Archives and Data Compression
viewing, Viewing Files with Less and More, Commands to Access File Contents
find, File Administration
Firefox
URL open command, Firefox 1.5: The URL Open Command
firewalls, Firewall, Masquerading and Firewalls
packet filters, Masquerading and Firewalls, Firewalling Basics
Squid and, Firewall Configuration with SuSEfirewall2
SuSEfirewall2, Masquerading and Firewalls, SuSEfirewall2
fonts, Installing and Configuring Fonts
TrueType, Installing and Configuring Fonts
X11 core, X11 Core Fonts
Xft, Xft
free, System Information

J

joystick
configuring, Joystick

K

KDE
shell, Getting Started with the Bash Shell
Kerberos, Network Authentication—Kerberos, For More Information
administering, Installing and Administering Kerberos, Kerberos Authentication and LDAP Access Control
authenticators, Kerberos Terminology
clients
configuring, Manually Configuring Kerberos Clients, DNS-Based Configuration
clock skew, Adjusting the Clock Skew
clock synchronization, Clock Synchronization
configuring
clients, Manually Configuring Kerberos Clients, DNS-Based Configuration
credentials, Kerberos Terminology
installing, Installing and Administering Kerberos, Kerberos Authentication and LDAP Access Control
KDC, Setting Up the KDC Hardware, Setting Up the KDC Hardware, Configuring the KDC, Starting the KDC
administering, Remote Kerberos Administration
nsswitch.conf, Setting Up the KDC Hardware
starting, Starting the KDC
keytab, Creating Kerberos Host Principals
LDAP and, Using LDAP and Kerberos, Kerberos Authentication and LDAP Access Control
master key, Setting Up the Database
PAM support, Enabling PAM Support for Kerberos, Enabling PAM Support for Kerberos
principals, Kerberos Terminology
creating, Creating a Principal
host, Creating Kerberos Host Principals
realms, Choosing the Kerberos Realms
creating, Setting Up the Database
session key, Kerberos Terminology
SSH configuration, Configuring SSH for Kerberos Authentication
stash file, Setting Up the Database
ticket-granting service, Ticket Granting—Contacting All Servers
tickets, Kerberos Terminology, Ticket Granting—Contacting All Servers
kernels
caches, The free Command
limits, Large File Support in Linux
keyboard
Asian characters, Keyboard Mapping
configuring, Keyboard Layout
layout, Keyboard Mapping
mapping, Keyboard Mapping
compose, Keyboard Mapping
multikey, Keyboard Mapping
X Keyboard Extension, Keyboard Mapping
XKB, Keyboard Mapping
kill, Processes
killall, Processes

L

L10N, Language and Country-Specific Settings
languages, Language, Language Selection
laptops
power management, Power Management, Rest for the Hard Disk
LDAP, LDAP—A Directory Service, For More Information
access control, Global Directives in slapd.conf
ACLs, Global Directives in slapd.conf
adding data, Inserting Data into an LDAP Directory
administering groups, Configuring LDAP Users and Groups in YaST
administering users, Configuring LDAP Users and Groups in YaST
configuring
YaST, Configuring an LDAP Server with YaST
deleting data, Deleting Data from an LDAP Directory
directory tree, Structure of an LDAP Directory Tree
Kerberos and, Using LDAP and Kerberos, Kerberos Authentication and LDAP Access Control
ldapadd, Inserting Data into an LDAP Directory
ldapdelete, Deleting Data from an LDAP Directory
ldapmodify, Modifying Data in the LDAP Directory
ldapsearch, Searching or Reading Data from an LDAP Directory
modifying data, Modifying Data in the LDAP Directory
searching data, Searching or Reading Data from an LDAP Directory
server configuration
manual, Server Configuration with slapd.conf
YaST, Configuring an LDAP Server with YaST
YaST
client, Configuring an LDAP Client with YaST
modules, Configuring the LDAP Client
templates, Configuring the LDAP Client
less, Viewing Files with Less and More, Commands to Access File Contents
LFS, Large File Support in Linux
license agreement, License Agreement
Lightweight Directory Access Protocol (see LDAP)
Linux
networks and, Basic Networking
sharing files with another OS, Samba
uninstalling, Uninstalling the Linux Boot Loader
linuxrc
manual installation, Starting Manual Installation at the Kernel Prompt
ln, File Administration
local APIC
disabling, The Boot Screen
localization, Language and Country-Specific Settings
locate, File Administration, The locate Command
log files, Local Security, Log Files: Package logrotate
boot.msg, Start-Up Log, ACPI
messages, System Log, Starting the Name Server BIND, Configuring Manually
Squid, Commands for Starting and Stopping Squid, General Configuration Options (Selection), Firewall Configuration with SuSEfirewall2
logging
login attempts, Local Security
Logical Volume Manager (see LVM)
logrotate, Log Files: Package logrotate
LPAR installation
IPL, IBM System z: IPLing the Installed System
ls, Using Commands without Options, File Administration
LSB
installing packages, RPM—the Package Manager
LVM
YaST, LVM Configuration

M

mail servers
configuring, Mail Server
man pages, Important Linux Commands, Man Pages and Info Pages
masquerading, Masquerading Basics
configuring with SuSEfirewall2, SuSEfirewall2
Master Boot Record (see MBR)
MBR, The Boot Loader
memory
RAM, The free Command
mkdir, File Administration
modems
cable, Cable Modem
YaST, Modem
more, Viewing Files with Less and More
mount, File Systems
mouse
configuring, Mouse Model
mv, File Administration

N

name servers (see DNS)
NAT (see masquerading)
NetBIOS, Terminology
Network File System (see NFS)
Network Information Service (see NIS)
NetworkManager, Managing Network Connections with NetworkManager
networks, Basic Networking
authentication
Kerberos, Network Authentication—Kerberos, For More Information
base network address, Netmasks and Routing
broadcast address, Netmasks and Routing
configuration files, Configuration Files, /etc/HOSTNAME
configuring, Network Devices, Other Available Services, Configuring a Network Connection with YaST, DSL, Configuring a Network Connection Manually, Start-Up Scripts
IPv6, Configuring IPv6
DHCP, Other Available Services, DHCP
DNS, Name Resolution
localhost, Netmasks and Routing
netmasks, Netmasks and Routing
routing, Other Available Services, IP Addresses and Routing, Netmasks and Routing
SLP, SLP Services in the Network
TCP/IP, Basic Networking
YaST, Configuring the Network Card with YaST
alias, Configuring Aliases
gateway, Configuring Routing
hostname, Configuring Hostname and DNS
IP address, Configuring IP Addresses
starting, Starting the Device
NFS, Sharing File Systems with NFS
clients, Other Available Services, Importing File Systems with YaST
exporting, Exporting File Systems Manually
importing, Importing File Systems Manually
mounting, Importing File Systems Manually
servers, Other Available Services, Exporting File Systems with YaST
NIS, Using NIS, Configuring NIS Clients
clients, Other Available Services, Configuring NIS Clients
masters, Configuring NIS Servers, Configuring a NIS Slave Server
servers, Other Available Services
slaves, Configuring NIS Servers, Configuring a NIS Slave Server
nslookup, Network
NSS, /etc/nsswitch.conf
databases, /etc/nsswitch.conf
NTP
client, Other Available Services

O

OpenLDAP (see LDAP)
OpenSSH (see SSH)
OpenWBEM, OpenWBEM, For More Information
OS/2
sharing files, Samba

P

package management
zmd, Managing Software with ZENworks
packages
compiling, Installing and Compiling Source Packages
compiling with build, Compiling RPM Packages with build
installing, Managing Packages: Install, Update, and Uninstall
LSB, RPM—the Package Manager
package manager, RPM—the Package Manager
RPMs, RPM—the Package Manager
uninstalling, Managing Packages: Install, Update, and Uninstall
verifying, Verifying Package Authenticity
packet filters (see firewalls)
PAM, Authentication with PAM, For More Information
configuring, PAM Configuration
partitions
creating, Partitioning, Using the YaST Partitioner, Creating a Partition
encrypting, Creating an Encrypted Partition during Installation
EVMS, Editing a Partition
fstab, More Partitioning Tips
LVM, Editing a Partition
parameters, Editing a Partition
partition table, The Boot Loader
RAID, Editing a Partition
reformatting, Editing a Partition
types, Partition Types
passwd, Miscellaneous
passwords
changing, Miscellaneous
paths, Working with Directories and Files
absolute, Working with Directories and Files
relative, Working with Directories and Files
PCI device
drivers, PCI Device Drivers
permissions, Users and Access Permissions
ACLs, Access Control Lists in Linux, For More Information
changing, Modifying File Permissions, File Administration
directories, File System Permissions
file permissions, Log Files: Package logrotate
file systems, File System Permissions
files, File System Permissions
viewing, File System Permissions
ping, Network, Testing a Connection with ping
Pluggable Authentication Modules (see PAM)
ports
53, Important Configuration Options
scanning, Firewall Configuration with SuSEfirewall2
PostgreSQL
updating, PostgreSQL
power management, Power Management, Rest for the Hard Disk, The powersave Package, For More Information
ACPI, Power Management, ACPI, For More Information, Configuring APM and ACPI
APM, APM, APM, Configuring APM and ACPI
battery monitor, Power Saving Functions
charge level, Custom Battery States
cpufrequency, The powersave Package
cpuspeed, The powersave Package
hibernation, Power Saving Functions
powersave, The powersave Package
standby, Power Saving Functions
suspend, Power Saving Functions
YaST, The YaST Power Management Module
powersave, The powersave Package
configuring, Configuring the powersave Package
printing, Printer Operation
command line, Printing from the Command Line
configuration with YaST, Setting Up a Printer, Configuring Network Printers with YaST
local printers, Configuring Local Printers
network printers, Configuring Network Printers with YaST
CUPS, Graphical Printing Interfaces
GDI printers, Printers without Standard Printer Language Support
kprinter, Graphical Printing Interfaces
network, Network Printer Connections
Samba, Terminology
troubleshooting
network, Network Printer Connections
xpp, Graphical Printing Interfaces
private branch exchange, ISDN
processes, Processes
killing, Processes
overview, Processes
protocols
CIFS, Terminology
IPv6, IPv6—The Next Generation Internet
LDAP, LDAP—A Directory Service
SLP, SLP Services in the Network
SMB, Terminology
proxies, Other Available Services (see Squid)
advantages, The Proxy Server Squid
caches, The Proxy Server Squid
transparent, Configuring a Transparent Proxy
ps, Processes

R

RAID
YaST, Soft RAID Configuration
reboot, Miscellaneous
registering
YaST, Registering SUSE Linux Enterprise
release notes, Release Notes, Release Notes
repairing systems, Using YaST System Repair
rescue system, Using the Rescue System, IBM System z: Using initrd as a Rescue System
starting from CD, Using the Rescue System
starting from network source, Using the Rescue System
RFCs, Basic Networking
rm, File Administration
rmdir, File Administration
routing, Other Available Services, IP Addresses and Routing, /etc/sysconfig/network/{routes,ifroute-*}, /etc/sysconfig/network/{routes,ifroute-*}
masquerading, Masquerading Basics
netmasks, Netmasks and Routing
routes, /etc/sysconfig/network/{routes,ifroute-*}
static, /etc/sysconfig/network/{routes,ifroute-*}
RPM, RPM—the Package Manager, Tools for RPM Archives and the RPM Database
database
rebuilding, Managing Packages: Install, Update, and Uninstall, RPM Queries
deltarpm, Delta RPM Packages
dependencies, Managing Packages: Install, Update, and Uninstall
patches, RPM and Patches
queries, RPM Queries
rpmnew, Managing Packages: Install, Update, and Uninstall
rpmorig, Managing Packages: Install, Update, and Uninstall
rpmsave, Managing Packages: Install, Update, and Uninstall
security, Some General Security Tips and Tricks
SRPMS, Installing and Compiling Source Packages
tools, Tools for RPM Archives and the RPM Database
uninstalling, Managing Packages: Install, Update, and Uninstall
updating, Managing Packages: Install, Update, and Uninstall
verify, RPM Queries
verifying, Verifying Package Authenticity
rpmbuild, RPM—the Package Manager
rsync, rsync, Introduction to rsync
rug, Update from the Command Line with rug, For More Information
runlevels, System Services (Runlevel), System Services (Runlevel), Runlevels, Runlevels
changing, Runlevels, Runlevels
editing in YaST, Configuring System Services (Runlevel) with YaST

S

Samba, Samba, For More Information
CIFS, Terminology
clients, Other Available Services, Terminology, Terminology, Configuring Clients, Windows 9x and ME, Configuring a Samba Client with YaST
configuring, Configuring a Samba Server, Security Levels, Configuring the Server Manually
installing, Configuring a Samba Server
login, Samba as Login Server
names, Terminology
permissions, Security Levels
printers, Terminology
printing, Windows 9x and ME
security, Security Levels, Security Levels
server, Terminology
servers, Other Available Services, Configuring a Samba Server, Security Levels
shares, Terminology, Shares
SMB, Terminology
starting, Starting and Stopping Samba
stopping, Starting and Stopping Samba
swat, Web Administration with SWAT
TCP/IP and, Terminology
SaX2
display device, Monitor
display settings, Card and Monitor Properties
dual head, Dual Head
graphics card, Graphics Card
graphics tablet, Tablet Properties
keyboard settings, Keyboard Properties
mouse settings, Mouse Properties
multihead, Multihead
resolution and color depth, Resolution and Color Depth
touchscreen, Touchscreen Properties
SCPM, Profile Manager
screen
resolution, Screen Section
scripts
init.d, The init Process, Init Scripts, Init Scripts, Start-Up Scripts
boot, Init Scripts
boot.local, Init Scripts
boot.setup, Init Scripts
halt, Init Scripts
network, Start-Up Scripts
nfsserver, Start-Up Scripts
portmap, Start-Up Scripts
postfix, Start-Up Scripts
rc, Runlevels, Init Scripts
squid, Commands for Starting and Stopping Squid
xinetd, Start-Up Scripts
ypbind, Start-Up Scripts
ypserv, Start-Up Scripts
mkinitrd, initramfs
modify_resolvconf, The /etc/resolv.conf File, /etc/resolv.conf
SuSEconfig, System Configuration via /etc/sysconfig, Changing the System Configuration Manually
disabling, Changing the System Configuration Manually
security, Security and Confidentiality, Using the Central Security Reporting Address
attacks, Denial of Service, Worms
booting, Local Security and Network Security, The Boot Procedure, The Boot Procedure
bugs and, Buffer Overflows and Format String Bugs, Buffer Overflows and Format String Bugs
configuring, Security and Users, Firewall
DNS, DNS Poisoning
engineering, Local Security and Network Security
firewalls, Firewall, Masquerading and Firewalls
intrusion detection, AIDE as a Tripwire Replacement
local, Local Security, Viruses
network, Network Security, Worms
passwords, Passwords, Passwords
permissions, File Permissions, File Permissions
reporting problems, Using the Central Security Reporting Address
RPM signatures, Some General Security Tips and Tricks
Samba, Security Levels
serial terminals, Local Security and Network Security
Squid, Squid and Security
SSH, SSH: Secure Network Operations, X, Authentication, and Forwarding Mechanisms
tcpd, Some General Security Tips and Tricks
telnet, SSH: Secure Network Operations
tips and tricks, Some General Security Tips and Tricks
viruses, Viruses
worms, Worms
X and, X Window System and X Authentication
Service Location Protocol (see SLP)
shells, Working with the Shell, For More Information
Bash, Getting Started with the Bash Shell
commands, Important Linux Commands, Miscellaneous
pipes, Redirection and Pipes
wild cards, Wild Cards
SLP, SLP Services in the Network
browser, SLP Front-Ends in SUSE Linux Enterprise
Konqueror, SLP Front-Ends in SUSE Linux Enterprise
providing services, Providing Services with SLP
registering services, Providing Services with SLP
slptool, SLP Front-Ends in SUSE Linux Enterprise
SMB (see Samba)
smbd, Terminology
soft RAID (see RAID)
software
compiling, Installing and Compiling Source Packages
installing, Installing and Removing Software, Installing -devel Packages
removing, Installing and Removing Software, Installing -devel Packages
sound
configuring in YaST, Sound
mixers, Sound Mixer kmix
source
compiling, Installing and Compiling Source Packages
spm, Installing and Compiling Source Packages
Squid, The Proxy Server Squid
access controls, Cache Manager ACLs in /etc/squid/squid.conf
ACLs, Options for Access Controls
Apache, Setup
cachemgr.cgi, cachemgr.cgi, Viewing the Statistics
caches, The Proxy Server Squid, Multiple Caches
damaged, Commands for Starting and Stopping Squid
size, Size of the Disk Cache
Calamaris, Cache Report Generation with Calamaris
configuring, The Configuration File /etc/squid/squid.conf
CPU and, CPU
directories, Commands for Starting and Stopping Squid
DNS, Local DNS Server
features, The Proxy Server Squid
firewalls and, Firewall Configuration with SuSEfirewall2
log files, Commands for Starting and Stopping Squid, General Configuration Options (Selection), Firewall Configuration with SuSEfirewall2
object status, Caching Internet Objects
permissions, Commands for Starting and Stopping Squid, Options for Access Controls
RAM and, RAM
reports, Cache Report Generation with Calamaris
security, Squid and Security
squidGuard, squidGuard
starting, Starting Squid
statistics, cachemgr.cgi, Viewing the Statistics
stopping, Commands for Starting and Stopping Squid
system requirements, System Requirements
transparent proxies, Configuring a Transparent Proxy, Firewall Configuration with SuSEfirewall2
troubleshooting, Commands for Starting and Stopping Squid
uninstalling, Commands for Starting and Stopping Squid
SSH, SSH: Secure Network Operations, X, Authentication, and Forwarding Mechanisms
authentication mechanisms, SSH Authentication Mechanisms
daemon, The SSH Daemon (sshd)—Server-Side
key pairs, The SSH Daemon (sshd)—Server-Side, SSH Authentication Mechanisms
scp, scp—Secure Copy
sftp, sftp—Secure File Transfer
ssh, The ssh Program
ssh-agent, SSH Authentication Mechanisms, X, Authentication, and Forwarding Mechanisms
ssh-keygen, SSH Authentication Mechanisms
sshd, The SSH Daemon (sshd)—Server-Side
X and, X, Authentication, and Forwarding Mechanisms
su, Miscellaneous
support query, Finding and Gathering Information
SUSE books, SUSE Books
system
configuring, System Configuration with YaST, Vendor Driver CD
languages, Language Selection
limiting resource use, The ulimit Command
localizing, Language and Country-Specific Settings
rebooting, Miscellaneous
rescuing, Using the Rescue System
security, Local Security
services, Other Available Services
shutdown, Miscellaneous
updating, Updating the System

V

variables
environment, Language and Country-Specific Settings
VNC
administration, Other Available Services

W

whois, Name Resolution
wild cards, File Administration
Windows
sharing files, Samba

X

X
character sets, Installing and Configuring Fonts
configuring, Manually Configuring the X Window System, Monitor and Modes Section
display device, Monitor
display settings, Card and Monitor Properties
drivers, Device Section
dual head, Dual Head
font systems, Installing and Configuring Fonts
fonts, Installing and Configuring Fonts
graphics card, Graphics Card
graphics tablet, Tablet Properties
help, Monitor and Modes Section
keyboard settings, Keyboard Properties
mouse settings, Mouse Properties
multihead, Multihead
resolution and color depth, Resolution and Color Depth
SaX2, Manually Configuring the X Window System
security, X Window System and X Authentication
SSH and, X, Authentication, and Forwarding Mechanisms
touchscreen, Touchscreen Properties
TrueType fonts, Installing and Configuring Fonts
virtual screen, Screen Section
X11 core fonts, X11 Core Fonts
xft, Installing and Configuring Fonts
Xft, Xft
xorg.conf, Manually Configuring the X Window System
X Keyboard Extension (see keyboard, XKB)
X Window System (see X)
X.509 certification
certificates, X.509 Certificates
principles, The Principles of Digital Certification
repository, Repository for Certificates and CRLs, Proprietary PKI
revocation list, Blocking X.509 Certificates
YaST, Managing X.509 Certification
X.Org, Manually Configuring the X Window System
Xft, Xft
xinetd, Other Available Services
XKB (see keyboard, XKB)
xorg.conf
color depth, Screen Section
Depth, Screen Section
Device, Screen Section
Display, Screen Section
Files, Manually Configuring the X Window System
InputDevice, Manually Configuring the X Window System
Modeline, Screen Section
modelines, Manually Configuring the X Window System
Modes, Manually Configuring the X Window System, Screen Section
modules, Manually Configuring the X Window System
Monitor, Manually Configuring the X Window System, Screen Section
ServerFlags, Manually Configuring the X Window System

Y

YaST
add-on products, Installation Mode, Installing Add-On Products
auto login, Auto Login
autoinstallation, Autoinstallation
profiles, Autoinstallation
AutoYaST, Autoinstallation
backups, Backup, Backup
boot configuration, Configuring the Boot Loader with YaST
default system, Default System
security, Security Settings
time-out, Boot Loader Time-Out
boot loader
location, Boot Loader Location
password, Security Settings
type, Boot Loader Type
CA management, Certificate Management, YaST Modules for CA Management
cable modem, Cable Modem
CD creator, Custom Installation CD Creation
clustering, Clustering
command line, Managing YaST from the Command Line
configuring, System Configuration with YaST, Vendor Driver CD
Control Center, The YaST Control Center
DASD, IBM System z: DASD Devices
DHCP, Configuring a DHCP Server with YaST
DMA, IDE DMA Mode
DNS, Other Available Services
driver CDs, Vendor Driver CD
DSL, DSL
e-mail, Mail Transfer Agent
EVMS, EVMS
firewall, Firewall
graphics cards, SaX2
group management, Group Management
GRUB, Boot Loader Type
hard disk controllers, Hard Disk Controller
hardware, Hardware
information, Hardware Information, Hardware Information
Heartbeat, Clustering
high availability, Clustering
hostname, Hostname and Domain Name, Other Available Services
installation into directory, Installing into a Directory
installation mode, Installation Mode
installation server, Installation Server Configuration
installation settings, Installation Settings
installation sources, Selecting the Installation Source
installation summary, Installation Settings
installing with, Installation with YaST, Graphical Login
ISDN, ISDN
joystick, Joystick
Kerberos client, Other Available Services
keyboard, Keyboard Layout
languages, Language, YaST Language, Language, Language Selection
LDAP, Other Available Services
clients, Configuring an LDAP Client with YaST
servers, Configuring an LDAP Server with YaST
LILO, Boot Loader Type
LVM, LVM Configuration, LVM
mail server, Mail Server
media check, Media Check, Checking Media, Checking Media
memory test, The Boot Screen
modems, Modem
monitor, SaX2
ncurses, YaST in Text Mode
network card, Configuring the Network Card with YaST
network configuration, Network Configuration, Network Devices, Other Available Services
NFS clients, Other Available Services
NFS server, Other Available Services
NIS clients, Configuring NIS Clients
Novell AppArmor, AppArmor
Novell Customer Center, Registering SUSE Linux Enterprise
NTP client, Other Available Services
online update, YaST Online Update, Installing Patches Manually
partitioning, Partitioning, Using the YaST Partitioner
PCI device drivers, PCI Device Drivers
power management, Power Management, The YaST Power Management Module
powertweak, Powertweak Configuration
printer configuration, Setting Up a Printer, Configuring Network Printers with YaST
local printers, Configuring Local Printers
network printers, Configuring Network Printers with YaST
profile manager, Profile Manager
RAID, Soft RAID Configuration
registering, Registering SUSE Linux Enterprise
release notes, Release Notes
repairing systems, Using YaST System Repair
rescue system, The Boot Screen
root password, Password for the System Administrator “root”
routing, Other Available Services
runlevels, Configuring System Services (Runlevel) with YaST
safe settings, The Boot Screen
Samba
clients, Other Available Services, Configuring a Samba Client with YaST
servers, Other Available Services
SCPM, Profile Manager
security, Security and Users, Firewall
sendmail, Mail Transfer Agent
server certificate, Certificate Management
SLP, Other Available Services
SLP browser, SLP Front-Ends in SUSE Linux Enterprise
software, Software, Update Options
software updates, Online Update
sound cards, Sound
starting, System Start-Up for Installation, System Configuration with YaST
support query, Support Query, Finding and Gathering Information
sysconfig editor, /etc/sysconfig Editor, Changing the System Configuration Using the YaST sysconfig Editor
system security, Local Security
system start-up, System Start-Up for Installation
T-DSL, DSL
text mode, YaST in Text Mode, Restriction of Key Combinations
time zone, Clock and Time Zone, Time and Date Configuration
updating, Updating from a Patch CD, Updating the System, Updating with YaST
user management, User Management
virtualization, Virtualization
hypervisor, Virtualization
installing, Virtualization
X.509 certification, Managing X.509 Certification
certificates, Creating or Revoking User Certificates
changing default values, Changing Default Values
creating CRLs, Creating CRLs
exporting CA objects as a file, Exporting CA Objects as a File
exporting CA objects to LDAP, Exporting CA Objects to LDAP
importing general server certificates, Importing Common Server Certificates
root CA, Creating a Root CA
sub-CA, Creating or Revoking a Sub-CA
ZFCP, IBM System z: ZFCP
YP (see NIS)