SUSE Linux Enterprise Server 11 SP4 Security Guide Security Guide SUSE Linux Enterprise Server 11 SP4

Total Page:16

File Type:pdf, Size:1020Kb

SUSE Linux Enterprise Server 11 SP4 Security Guide Security Guide SUSE Linux Enterprise Server 11 SP4 SUSE Linux Enterprise Server 11 SP4 Security Guide Security Guide SUSE Linux Enterprise Server 11 SP4 Publication Date: September 24, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see http://www.suse.com/company/legal/ . All other third party trademarks are the property of their respective owners. A trademark symbol (®, ™ etc.) denotes a SUSE or Novell trademark; an asterisk (*) denotes a third party trademark. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About This Guide xv 1 Available Documentation xv 2 Feedback xvii 3 Documentation Conventions xviii 1 Security and Confidentiality 1 1.1 Local Security and Network Security 1 Local Security 3 • Network Security 6 1.2 Some General Security Tips and Tricks 10 1.3 Using the Central Security Reporting Address 12 I AUTHENTICATION 13 2 Authentication with PAM 14 2.1 What is PAM? 14 2.2 Structure of a PAM Configuration File 15 2.3 The PAM Configuration of sshd 17 2.4 Configuration of PAM Modules 20 pam_env.conf 20 • pam_mount.conf 21 • limits.conf 21 2.5 Configuring PAM Using pam-config 21 2.6 Manually Configuring PAM 22 2.7 For More Information 23 3 Using NIS 24 3.1 Configuring NIS Servers 24 Configuring a NIS Master Server 24 • Configuring a NIS Slave Server 29 iii Security Guide 3.2 Configuring NIS Clients 30 4 LDAP—A Directory Service 32 4.1 LDAP versus NIS 33 4.2 Structure of an LDAP Directory Tree 33 4.3 Configuring an LDAP Server with YaST 36 4.4 Configuring an LDAP Client with YaST 45 Configuring Basic Settings 46 • Configuring the YaST Group and User Administration Modules 49 4.5 Configuring LDAP Users and Groups in YaST 53 4.6 Browsing the LDAP Directory Tree 54 4.7 Manually Configuring an LDAP Server 56 Starting and Stopping the Servers 56 4.8 Manually Administering LDAP Data 57 Inserting Data into an LDAP Directory 57 • Modifying Data in the LDAP Directory 59 • Searching or Reading Data from an LDAP Directory 60 • Deleting Data from an LDAP Directory 60 4.9 For More Information 60 5 Active Directory Support 62 5.1 Integrating Linux and AD Environments 62 5.2 Background Information for Linux AD Support 63 Domain Join 65 • Domain Login and User Homes 65 • Offline Service and Policy Support 67 5.3 Configuring a Linux Client for Active Directory 67 5.4 Logging In to an AD Domain 70 GDM and KDM 71 • Console Login 71 5.5 Changing Passwords 72 iv Security Guide 6 Network Authentication with Kerberos 74 6.1 Kerberos Terminology 74 6.2 How Kerberos Works 76 First Contact 76 • Requesting a Service 77 • Mutual Authentication 77 • Ticket Granting—Contacting All Servers 77 • Compatibility to Windows 2000 78 6.3 Users' View of Kerberos 79 6.4 Installing and Administering Kerberos 80 Kerberos Network Topology 81 • Choosing the Kerberos Realms 82 • Setting Up the KDC Hardware 82 • Configuring Time Synchronization 83 • Configuring the KDC 84 • Configuring Kerberos Clients 87 • Configuring Remote Kerberos Administration 92 • Creating Kerberos Service Principals 94 • Enabling PAM Support for Kerberos 95 • Configuring SSH for Kerberos Authentication 96 • Using LDAP and Kerberos 97 6.5 For More Information 99 7 Using the Fingerprint Reader 101 7.1 Supported Applications and Actions 101 7.2 Managing Fingerprints with YaST 102 II LOCAL SECURITY 104 8 Configuring Security Settings with YaST 105 8.1 Security Overview 105 8.2 Predefined Security Configurations 106 8.3 Password Settings 107 8.4 Boot Settings 108 8.5 Login Settings 108 8.6 User Addition 108 v Security Guide 8.7 Miscellaneous Settings 109 9 PolicyKit 110 9.1 Conceptual Overview 110 Available Policies and Supported Applications 110 • Authorization Types 111 • Default Privileges 112 9.2 Modifying and Setting Privileges 113 Using the Graphical Authorizations Tool 113 • Using the Command Line Tools 115 • Modifying Configuration Files 116 • Restoring the Default Privileges 119 10 Access Control Lists in Linux 120 10.1 Traditional File Permissions 120 The setuid Bit 120 • The setgid Bit 121 • The Sticky Bit 121 10.2 Advantages of ACLs 121 10.3 Definitions 122 10.4 Handling ACLs 123 ACL Entries and File Mode Permission Bits 124 • A Directory with an ACL 125 • A Directory with a Default ACL 127 • The ACL Check Algorithm 130 10.5 ACL Support in Applications 131 10.6 For More Information 131 11 Encrypting Partitions and Files 132 11.1 Setting Up an Encrypted File System with YaST 133 Creating an Encrypted Partition during Installation 133 • Creating an Encrypted Partition on a Running System 135 • Creating an Encrypted File as a Container 135 • Encrypting the Content of Removable Media 135 11.2 Using Encrypted Home Directories 136 11.3 Using vi to Encrypt Single ASCII Text Files 137 vi Security Guide 12 Certificate Store 138 12.1 Activating Certificate Store 138 12.2 Importing Certificates 138 13 Intrusion Detection with AIDE 140 13.1 Why Using AIDE? 140 13.2 Setting Up an AIDE Database 140 13.3 Local AIDE Checks 143 13.4 System Independent Checking 144 13.5 For More Information 145 III NETWORK SECURITY 146 14 SSH: Secure Network Operations 147 14.1 ssh—Secure Shell 147 Starting X Applications on a Remote Host 148 • Agent Forwarding 148 14.2 scp—Secure Copy 148 14.3 sftp—Secure File Transfer 149 14.4 The SSH Daemon (sshd) 150 14.5 SSH Authentication Mechanisms 151 Generating an SSH Key 152 • Copying an SSH Key 153 • Using the ssh- agent 153 14.6 Port Forwarding 154 14.7 Configuring An SSH Daemon with YaST 155 14.8 For More Information 156 15 Masquerading and Firewalls 157 15.1 Packet Filtering with iptables 157 15.2 Masquerading Basics 160 vii Security Guide 15.3 Firewalling Basics 161 15.4 SuSEfirewall2 162 Configuring the Firewall with YaST 163 • Configuring Manually 165 15.5 For More Information 167 16 Configuring VPN Server 168 16.1 Conceptual Overview 168 Terminology 168 • VPN Scenarios 169 16.2 Creating the Simplest VPN Example 172 Configuring the VPN Server 173 • Configuring the VPN Client 173 • Testing the VPN Example 174 16.3 Setting Up Your VPN Server Using Certificate Authority 174 Creating Certificates 175 • Configuring the Server 177 • Configuring the Clients 178 16.4 Changing Nameservers in VPN 180 16.5 KDE- and GNOME Applets For Clients 180 KDE 181 • GNOME 182 16.6 For More Information 183 17 Managing X.509 Certification 184 17.1 The Principles of Digital Certification 184 Key Authenticity 185 • X.509 Certificates 185 • Blocking X.509 Certificates 186 • Repository for Certificates and CRLs 187 • Proprietary PKI 188 17.2 YaST Modules for CA Management 188 Creating a Root CA 188 • Changing Password 190 • Creating or Revoking a Sub-CA 191 • Creating or Revoking User Certificates 193 • Changing Default Values 194 • Creating Certificate Revocation Lists (CRLs) 195 • Exporting CA Objects to LDAP 196 • Exporting CA Objects as a File 197 • Importing Common Server Certificates 198 viii Security Guide IV CONFINING PRIVILEGES WITH APPARMOR 199 18 Introducing AppArmor 200 18.1 Background Information on AppArmor Profiling 200 19 Getting Started 202 19.1 Installing AppArmor 202 19.2 Enabling and Disabling AppArmor 203 19.3 Choosing the Applications to Profile 204 19.4 Building and Modifying Profiles 204 19.5 Configuring AppArmor Event Notification and Reports 206 19.6 Updating Your Profiles 207 20 Immunizing Programs 209 20.1 Introducing the AppArmor Framework 210 20.2 Determining Programs to Immunize 212 20.3 Immunizing cron Jobs 212 20.4 Immunizing Network Applications 213 Immunizing Web Applications 215 • Immunizing Network Agents 217 21 Profile Components and Syntax 218 21.1 Breaking a AppArmor Profile into Its Parts 219 21.2 Profile Types 221 Standard Profiles 222 • Unattached Profiles 222 • Local Profiles 223 • Hats 223 • Change rules 223 21.3 #include Statements 224 Abstractions 224 • Program Chunks 225 • Tunables 225 21.4 Capability Entries (POSIX.1e) 225 21.5 Network Access Control 225 ix Security Guide 21.6 Paths and Globbing 226 Using Variables in Profiles 228 • Alias rules 228 21.7 File Permission Access Modes 229 Read Mode (r) 229 • Write Mode (w) 229 • Append Mode (a) 230 • File Locking Mode (k) 230 • Link Mode (l) 230 • Link Pair 230 • Owner Conditional Rules 231 • Deny Rules 231 21.8 Execute Modes 232 Discrete Profile Execute Mode (px) 232 • Discrete Local Profile Execute Mode (cx) 233 • Unconstrained Execute Mode (ux) 233 • Clean Exec modes 234 • Inherit Execute Mode (ix) 234 • Allow Executable Mapping (m) 234 • Named Profile Transitions 234 • Inheritance Fallback for Profile Transitions 235 • Variable Settings in Execution Modes 236 21.9 Resource Limit Control 237 21.10 Auditing Rules 238 21.11 Setting Capabilities per Profile 239 22 AppArmor Profile Repositories 240 22.1 Using the Local Repository 240 22.2 Using the External Repository 240 Setting up Profile Repository Support 241 • Downloading a Profile 242 • Uploading Your own Profile 242 23 Building and Managing Profiles with YaST 243 23.1 Adding a Profile Using the
Recommended publications
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • Awoken Icon Theme - Installation & Customizing Instructions 1
    Awoken Icon Theme - Installation & Customizing Instructions 1 AWOKEN ICON THEME Installation & Customizing Instructions Alessandro Roncone mail: [email protected] homepage: http://alecive.deviantart.com/ Awoken homepage (GNOME Version): link kAwoken homepage (KDE Version): link Contents 1 Iconset Credits 3 2 Copyright 3 3 Installation 3 3.1 GNOME........................................................3 3.2 KDE..........................................................4 4 Customizing Instructions 4 4.1 GNOME........................................................4 4.2 KDE..........................................................5 5 Overview of the customization script6 5.1 How to customize a single iconset..........................................7 6 Customization options 8 6.1 Folder types......................................................8 6.2 Color-NoColor.................................................... 11 6.3 Distributor Logos................................................... 11 6.4 Trash types...................................................... 11 6.5 Other Options.................................................... 11 6.5.1 Gedit icon................................................... 11 6.5.2 Computer icon................................................ 11 6.5.3 Home icon................................................... 11 6.6 Deprecated...................................................... 12 7 How to colorize the iconset 13 8 Icons that don't want to change (but I've drawed) 14 9 Conclusions 15 9.1 Changelog......................................................
    [Show full text]
  • Red Hat Enterprise Linux 7 7.9 Release Notes
    Red Hat Enterprise Linux 7 7.9 Release Notes Release Notes for Red Hat Enterprise Linux 7.9 Last Updated: 2021-08-17 Red Hat Enterprise Linux 7 7.9 Release Notes Release Notes for Red Hat Enterprise Linux 7.9 Legal Notice Copyright © 2021 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent. Red Hat is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
    [Show full text]
  • Upgrade Issues
    Upgrade issues Graph of new conflicts libsiloh5-0 libhdf5-lam-1.8.4 (x 3) xul-ext-dispmua (x 2) liboss4-salsa-asound2 (x 2) why sysklogd console-cyrillic (x 9) libxqilla-dev libxerces-c2-dev iceape xul-ext-adblock-plus gnat-4.4 pcscada-dbg Explanations of conflicts pcscada-dbg libpcscada2-dev gnat-4.6 gnat-4.4 Similar to gnat-4.4: libpolyorb1-dev libapq-postgresql1-dev adacontrol libxmlada3.2-dev libapq1-dev libaws-bin libtexttools2-dev libpolyorb-dbg libnarval1-dev libgnat-4.4-dbg libapq-dbg libncursesada1-dev libtemplates-parser11.5-dev asis-programs libgnadeodbc1-dev libalog-base-dbg liblog4ada1-dev libgnomeada2.14.2-dbg libgnomeada2.14.2-dev adabrowse libgnadecommon1-dev libgnatvsn4.4-dbg libgnatvsn4.4-dev libflorist2009-dev libopentoken2-dev libgnadesqlite3-1-dev libnarval-dbg libalog1-full-dev adacgi0 libalog0.3-base libasis2008-dbg libxmlezout1-dev libasis2008-dev libgnatvsn-dev libalog0.3-full libaws2.7-dev libgmpada2-dev libgtkada2.14.2-dbg libgtkada2.14.2-dev libasis2008 ghdl libgnatprj-dev gnat libgnatprj4.4-dbg libgnatprj4.4-dev libaunit1-dev libadasockets3-dev libalog1-base-dev libapq-postgresql-dbg libalog-full-dbg Weight: 5 Problematic packages: pcscada-dbg hostapd initscripts sysklogd Weight: 993 Problematic packages: hostapd | initscripts initscripts sysklogd Similar to initscripts: conglomerate libnet-akamai-perl erlang-base screenlets xlbiff plasma-widget-yawp-dbg fso-config- general gforge-mta-courier libnet-jifty-perl bind9 libplack-middleware-session-perl libmail-listdetector-perl masqmail libcomedi0 taxbird ukopp
    [Show full text]
  • Qconfig to a Modern Config System on Qt Engage and Transform
    QConfig To a Modern Config System on Qt Engage and Transform Copyright 2013 - Sábia Experience. Todos os direitos reservados. Who am i Senior software engineer graduated in computer science in 92, musician and gamer. Worked in two major Linux distributions, Conectiva and Mandriva in their golden days, and joined KDE ranks since 2000. Nowadays set a new venture at Sábia Experience, a company with a goal and a intention to transform and engage the world in a symbiosis of soul and technology ... Copyright 2013 - Sábia Experience. Todos os direitos reservados. History so far from QSettings... From a simple point of view From a not so simple point of view • Simple and direct • Is too simple for modern days and too direct for some complex modern interactions • Served their purpose • Served their purpose • Never questioned until recently • People realize that are limitations • Native formats ( so far ) • Native formats • Formats by majority of developers • Literally nobody knows which formats are there anymore Copyright 2013 - Sábia Experience. Todos os direitos reservados. History so far from Config Systems... And formats again What are our options for a common goal • Windows has registry. Several other app • Text or Binary developers tried to introduce their own extensions • Centralized or per app • Apple pList is not widespread and the Unix architecture opened a huge hole for *nix tools, and people used this • XML or Json • Linux unfortunately had their many implementations, • Native or unique in several approaches, all due the natural open source characteristics • Qt never could play with the native game Copyright 2013 - Sábia Experience. Todos os direitos reservados.
    [Show full text]
  • Redes Y Conectividad Descripción Del Programa, Tareas Windows GNU/Linux Ejecutadas • Firefox (Iceweasel) • Opera • Konqueror
    Redes y Conectividad Descripción del programa, tareas Windows GNU/Linux ejecutadas • Firefox (Iceweasel) • Opera • Konqueror • Internet Explorer • IEs 4 GNU/Linux • Netscape / Mozilla • Mozilla • Opera • rekonq (KDE) • Firefox • Netscape • Google Chrome • Galeón Navegadores Web • Avant Browser • Google Chrome • Safari • Chromium • Flock • Epiphany • SeaMonkey • Links (llamado como "links -g") • Dillo • Flock • SeaMonkey • Links • • Lynx Navegadores web en modo Lynx • texto w3m • Emacs + w3. • [Evolution] • Netscape / Mozilla • Sylpheed , Sylpheed- claws. • Kmail • Microsoft Outlook • Gnus • Outlook Express • Balsa • Mozilla Clientes de Correo • Bynari Insight • Eudora Electrónico GroupWare Suite [NL] • Thunderbird • Arrow • Becky • Gnumail • Althea • Liamail • Aethera • Thunderbird Cliente de Correo • Mutt para Windows • Pine Electrónico en Cónsola • Mutt • Gnus • de , Pine para Windows • Elm. • Xemacs • Liferea • Knode. • Pan • Xnews , Outlook, • NewsReader Lector de noticias Netscape / Mozilla • Netscape / Mozilla. • Sylpheed / Sylpheed- claws • MultiGet • Orbit Downloader • Downloader para X. • MetaProducts Download • Caitoo (former Kget). Express • Prozilla . • Flashget • wxDownloadFast . • Go!zilla • Kget (KDE). Gestor de Descargas • Reget • Wget (console, standard). • Getright GUI: Kmago, QTget, • Wget para Windows Xget, ... • Download Accelerator Plus • Aria. • Axel. • Httrack. • WWW Offline Explorer. • Wget (consola, estándar). GUI: Kmago, QTget, Extractor de Sitios Web Teleport Pro, Webripper. Xget, ... • Downloader para X. •
    [Show full text]
  • Practical Linux Forensics by Bruce Nikkel! As a Prepublication Title, This Book May Be Incom- Plete and Some Chapters May Not Have Been Proofread
    P R A C T I C A L LINUX FORENSICS A GUIDE FOR DIGITAL INVESTIGATORS BRUCE NIKKEL EARLY ACCESS NO STARCH PRESS EARLY ACCESS PROGRAM: FEEDBACK WELCOME! Welcome to the Early Access edition of the as yet unpublished Practical Linux Forensics by Bruce Nikkel! As a prepublication title, this book may be incom- plete and some chapters may not have been proofread. Our goal is always to make the best books possible, and we look forward to hearing your thoughts. If you have any comments or questions, email us at [email protected]. If you have specific feedback for us, please include the page number, book title, and edition date in your note, and we’ll be sure to review it. We appreciate your help and support! We’ll email you as new chapters become available. In the meantime, enjoy! PR CA T IC A L L INU X FOR E N SI C S BRUCE N IK KE L Early Access edition, 6/18/21 Copyright © 2021 by Bruce Nikkel. ISBN-13: 978-1-7185-0196-6 (print) ISBN-13: 978-1-7185-0197-3 (ebook) Publisher: William Pollock Production Manager: Rachel Monaghan Production Editor: Miles Bond Developmental Editor: Jill Franklin Cover Illustrator: James L. Barry Technical Reviewer: Don Frick Copyeditor: George Hale No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. Other product and company names mentioned herein may be the trademarks of their respective owners. Rather than use a trademark symbol with every occurrence of a trade- marked name, we are using the names only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark.
    [Show full text]
  • Manuale Di Kgpg
    Manuale di KGpg Jean-Baptiste Mardelle Rolf Eike Beer Traduzione della documentazione in italiano: Nicola Ruggero Traduzione della documentazione in italiano: Valter Violino Manuale di KGpg 2 Indice 1 Introduzione 5 2 Primi passi 6 3 Usare KGpg 8 3.1 Generazione di una chiave . .8 3.2 Revoca di una chiave . .9 3.3 Cifratura dei tuoi dati . 10 3.3.1 Cifratura di un file da Konqueror o Dolphin . 10 3.3.2 Cifrare un file oppure un testo con l’applet di KGpg . 10 3.3.3 Cifrare testo dall’editor di KGpg . 10 3.4 Decifrare i tuoi dati . 11 3.4.1 Decifrare un file da Konqueror o Dolphin . 11 3.4.2 Decifrare testo con l’applet di KGpg . 11 3.4.3 Decifrare un testo nell’editor . 11 3.5 Gestione delle Chiavi . 11 3.5.1 Gestore delle chiavi . 12 3.5.2 Proprietà della chiave . 12 3.5.3 Firma delle chiavi . 13 3.6 Lavorare con i server delle chiavi . 15 3.6.1 Comunicazione con il server delle chiavi . 15 3.6.2 Risultati ricerca nel server delle chiavi . 16 3.7 Configurare KGpg . 16 3.7.1 Cifratura . 17 3.7.2 Decifratura . 18 3.7.3 Aspetto . 18 3.7.4 Impostazioni di GnuPG . 18 3.7.5 Server delle chiavi . 18 3.7.6 Varie . 18 4 Riconoscimenti e licenza 19 Sommario KGpg è una semplice interfaccia grafica per GnuPG (https://gnupg.org). Manuale di KGpg Capitolo 1 Introduzione KGpg è una semplice interfaccia grafica per GnuPG, un potente strumento di cifratura.
    [Show full text]
  • Cipher'in' Letters Protect Your Online Communications and Other Aspect of Your Life on the Internet
    Cipher'in' Letters Protect your online communications and other aspect of your life on the internet GnuPG and OpenPGP for everybody Stéphane 22Decembre Guedon version base 1 of the 3th july 2015 Chapter 1 Preamble This document uses my texts from my GPG-Howto or tutorial. It is the short version, with the functions that I think are the most important in GnuPG and OpenPG. This How-to can be read on my website1. I wish you read, share and reshare this work, online (html) or o-line (this pdf). Of course, the texts have been slightly modied to correspond to their current form: a mini-book. But I kept the exercises from the blog articles. The aim of this document is to push internet users, so actually some big part of the occidental population, to protect their communications in the form of mails and instant messaging. As I am writing this book, some laws, extremely dangerous for privacy and public liberties, are being voted or adopted by several european countries. I think obviously of France, but also UK or Switzerland ! This pdf le has been signed by my gpg key and the tutorial's one. Those two keys have been included in the pdf itself. Here are their ngerprints: 30CF 1DA5 7E87 6BAA 730D E561 42E0 A02E F1C9 35A4 F6B2 DCE3 B6F6 A972 FF3A 1C9B 2041 3A8E 7F36 CE55 The text of this document (my actual work) is under Creative Commons BY licence. I used some illustrations from external sources: • The GnuPG logo, under CC-BY-SA licence2 • The comic from XKCD about password strength, under CC BY-NC 2.5 licence3 • The shadow of Justice, under CC BY-NC-ND 2.0 licence.4 The sources of this document, in LATEXare available in this github repo : https://github.com/ tutogpgIn22D/book-en.
    [Show full text]
  • The Table of Equivalents / Replacements / Analogs of Windows Software in Linux
    The table of equivalents / replacements / analogs of Windows software in Linux. Last update: 16.07.2003, 31.01.2005, 27.05.2005, 04.12.2006 You can always find the last version of this table on the official site: http://www.linuxrsp.ru/win-lin-soft/. This page on other languages: Russian, Italian, Spanish, French, German, Hungarian, Chinese. One of the biggest difficulties in migrating from Windows to Linux is the lack of knowledge about comparable software. Newbies usually search for Linux analogs of Windows software, and advanced Linux-users cannot answer their questions since they often don't know too much about Windows :). This list of Linux equivalents / replacements / analogs of Windows software is based on our own experience and on the information obtained from the visitors of this page (thanks!). This table is not static since new application names can be added to both left and the right sides. Also, the right column for a particular class of applications may not be filled immediately. In future, we plan to migrate this table to the PHP/MySQL engine, so visitors could add the program themselves, vote for analogs, add comments, etc. If you want to add a program to the table, send mail to winlintable[a]linuxrsp.ru with the name of the program, the OS, the description (the purpose of the program, etc), and a link to the official site of the program (if you know it). All comments, remarks, corrections, offers and bugreports are welcome - send them to winlintable[a]linuxrsp.ru. Notes: 1) By default all Linux programs in this table are free as in freedom.
    [Show full text]
  • The Krusader Handbook the Krusader Handbook
    The Krusader Handbook The Krusader Handbook 2 Contents 1 Introduction 13 1.1 Package description . 13 1.2 Welcome to Krusader! . 13 2 Features 16 3 User Interface 20 3.1 OFM User Interface . 20 3.2 Krusader Main Window . 20 3.3 Toolbars . 20 3.3.1 Main Toolbar . 20 3.3.2 Job Toolbar . 22 3.3.3 Actions Toolbar . 22 3.3.4 Location Toolbar . 22 3.3.5 Panel Toolbar . 22 3.4 Panels . 23 3.4.1 List Panel . 23 3.4.2 Sidebar . 24 3.4.3 Folder History . 25 3.5 Command Line / Terminal Emulator . 25 3.5.1 Command Line . 25 3.5.2 Terminal Emulator . 26 3.6 Function (FN) Keys Bar . 26 3.7 Folder Tabs . 27 3.8 Buttons . 27 4 Basic Functions 28 4.1 Controls . 28 4.1.1 General . 28 4.1.2 Moving Around . 28 4.1.3 Selecting . 29 4.1.4 Executing Commands . 29 4.1.5 Quick search . 30 4.1.6 Quick filter . 30 The Krusader Handbook 4.1.7 Quick select . 30 4.1.8 Context Menu . 30 4.2 Basic File Management . 31 4.2.1 Executing Files . 31 4.2.2 Copying and Moving . 31 4.2.3 Queue manager . 32 4.2.4 Deleting - move to Plasma Trash . 32 4.2.5 Shred Files . 32 4.2.6 Renaming Files, Creating Directories and Link Handling . 32 4.2.7 Viewing and Editing files . 32 4.3 Archive Handling . 33 4.3.1 Browsing Archives . 33 4.3.2 Unpack Files .
    [Show full text]
  • Suse Linux / User Guide
    SuSE Linux USER GUIDE 3. edition 2003 Copyright © This publication is intellectual property of SuSE Linux AG. Its contents can be duplicated, either in part or in whole, provided that a copyright label is visibly located on each copy. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SuSE Linux AG, the au- thors, nor the translators shall be held liable for possible errors or the consequences thereof. Many of the software and hardware descriptions cited in this book are registered trade- marks. All trade names are subject to copyright restrictions and may be registered trade marks. SuSE Linux AG essentially adheres to the manufacturer’s spelling. Names of products and trademarks appearing in this book (with or without specific notation) are likewise subject to trademark and trade protection laws and may thus fall under copy- right restrictions. Please direct suggestions and comments to [email protected] Authors: Jörg Bartsch, Gernot Hillier, Marcel Hilzinger, Johannes Meixner, Matthias Nagorny, Siegfried Olschner, Marcus Schäfer, Arvin Schnell, Adrian Schröter Translators: Tino Tanner, Rebecca Walter Editors: Jörg Arndt, Antje Faber, Berthold Gunreben, Roland Haidl, Jana Jaeger, Edith Parzefall, Peter Reinhart, Inés Pozo, Thomas Rölz, Thomas Schraitle Layout: Manuela Piotrowski, Thomas Schraitle Setting: LATEX, DocBook-XML This book has been printed on 100 % chlorine-free bleached paper. Contents 0.1 Changes in the User Guide ...................... 1 0.2 Acknowledgements .......................... 3 I Installation 5 1 Quick Installation 7 1.1 Step One: The Start Screen ....................... 8 1.2 Step Two: Accept Suggestions ..................... 8 1.3 Step Three: Installation ........................
    [Show full text]