Documentation Ubuntu/Debian – Openldap, PAM-LDAP Et NFS

Total Page:16

File Type:pdf, Size:1020Kb

Documentation Ubuntu/Debian – Openldap, PAM-LDAP Et NFS Documentation Ubuntu/Debian – OpenLDAP, PAM-LDAP et NFS Procédure validée sur Debian 7 et Ubuntu 12.04 1 Présentation du projet Nous souhaitons créer un serveur central d’authentification et de fichiers sous Debian permettant à des clients Xubuntu de s’y connecter. 2 Installation et configuration du serveur OpenLDAP OpenLDAP est un annuaire informatique qui fonctionne sur le modèle client/serveur. Il contient des informations de n’importe quelle nature qui sont rangées de manière hiérarchique. Pour bien comprendre le concept, il est souvent comparé aux Pages Jaunes (Yellowpages), où le lecteur recherche un numéro de téléphone particulier: il va d’abord sélectionner la profession, puis la ville, puis le nom de l’entrée pour trouver au final le numéro de téléphone. En pratique, il est utilisé pour enregistrer une grande quantité d’utilisateurs ou de services (parfois des centaines de milliers) dans un réseau informatique. Il permet d’organiser hiérarchiquement les utilisateurs par département, par lieu géographique ou par n’importe quel autre critère. Source : Wikipedia 2.1 Installation des paquets Sur le serveur, installer les paquets slapd et ldap-utils : apt−get install slapd ldap−u t i l s Nous pouvons y ajouter une interface de gestion de l’annuaire, phpldapadmin : apt−get install phpldapadmin 2.2 Configuration de l’annuaire Afin de configurer l’annuaire, tapez : dpkg−reconfigure slapd Répondez aux questions comme suit : Voulez-vous omettre la configuration d’OpenLDAP Non Nom de domaine Votre nom de domaine (exemple : mondomaine.local) Nom d’entité ("organization") Votre nom de domaine (exemple : mondomaine.local) 1 Mot de passe de l’administrateur Un mot de passe assez fort. Module de base de données à utiliser HDB Faut-il supprimer la base de données à la purge du paquet Comme vous voulez. Faut-il déplacer l’ancienne base de données Oui Faut-il autoriser le protocole LDAPv2 Déconseillé 1Voir les recommandations de l’ANSSI à propos des mots de passe. 1 2.3 Configuration de PHP LDAP Admin Éditez le fichier /etc/phpldapadmin/config.php de la manière suivante : • Remplacez $ s e r v e r s −>setValue( ’server ’ , ’name’ , ’My␣LDAP␣Server ’); par $ s e r v e r s −>setValue( ’server ’ , ’name’ , ’Mon␣nom␣de␣serveur␣LDAP’); • Remplacez $ s e r v e r s −>setValue(’server ’,’base’, array ( ’dc=example ,dc=com’ )); par $ s e r v e r s −>setValue(’server ’,’base’, array ( ’dc=mondomaine,dc=local ’ )); • Remplacez $ s e r v e r s −>setValue( ’login ’ , ’bind_id ’ , ’cn=admin,dc=example ,dc=com’); par $ s e r v e r s −>setValue( ’login ’ , ’bind_id ’ , ’cn=admin,dc=mondomaine,dc=local ’); • Remplacez // $ c o n f i g −>custom−>appearance[’hide_template_warning ’] = false ; par $ c o n f i g −>custom−>appearance[ ’hide_template_warning ’] = true ; • Sauvegardez et quittez 2.4 Peuplement de l’annuaire Trois choix s’offrent à nous : • Peupler manuellement l’annuaire avec PHP LDAP Admin • Peupler à l’aide d’un script Bash • Peupler à l’aide d’un script Python Nous allons étudier le peuplement par script Python. Nous allons ajouter une librairie au serveur : apt−get install python−ld ap Voici le code permettant de se connecter à l’annuaire (remplacer par vos valeurs) : import ldap ,os,hashlib from base64 import encodestring as encode from base64 import decodestring as decode import ldap.modlist as modlist l = l da p . open ("127.0.0.1") l .simple_bind_s("cn=admin ,dc=mondomaine,dc=local ,"test") Le code permettant d’ajouter un OU (organizational unit) : 2 dn="ou=MonOU, dc=mondomaine , dc=local " a t t r s = {} attrs[’objectclass ’] = [’organizationalUnit’] attrs[’ou’] = name ldif = modlist.addModlist(attrs) l.add_s(dn, ldif) Voici le code pour hacher le mot de passe : def makeSecret(password ): salt = os.urandom(4) h = hashlib.sha1(password) h.update(salt) return "{SSHA}" + encode(h.digest() + salt)[: − 1 ] Le code permettant d’ajouter un utilisateur : dn="cn=toto ,ou=MonOU, dc=mondomaine , dc=local " a t t r s = {} attrs[’objectclass ’] = [’top’,’inetOrgPerson’,’posixAccount’] attrs [ ’cn’] = "Thomas␣Dupont" attrs [ ’userPassword ’] = makeSecret("MonMotDePasseSuperSecurise") attrs[’sn’] = ’toto’ attrs[’gidNumber’] = ’500’ attrs[ ’homeDirectory’] = ’/home/toto ’ attrs[’uid’] = ’toto’ attrs[ ’uidNumber’] = ’1001’ ldif = modlist.addModlist(attrs) l.add_s(dn, ldif) 2.5 Rendre le serveur client de l’annuaire Si vous voulez que le serveur soit client de l’annuaire, installez ces paquets : apt−get install libnss −ldapd libpam−ld ap nscd ca−certificates libpam−f o r e g r o u n d Répondez aux questions comme suit : L’URI du serveur LDAP ldap://127.0.0.1 Base de recherche du serveur LDAP dc=mondomaine,dc=local Service de nom à configurer group,shadow et passwd. L’URI du serveur LDAP ldap://127.0.0.1 (de nouveau) Le DN de la base de recherche dc=mondomaine,dc=local (de nouveau) Version de LDAP à utiliser 3 Faut-il que le root local soit l’administrateur de la base de données ? Oui Est-ce que le LDAP nécessite une connexion Non Compte LDAP du root cn=admin,dc=mondomaine,dc=local Mot de passe du compte LDAP du root Le mot de passe renseigné lors de l’installation du LDAP. 3 Mise en place du client LDAP Sur votre/vos client(s), installez les paquets suivants : apt−get install ldap−auth−client nscd libnss −ldapd libpam−ld ap 3 Durant l’installation, il vous sera demandé de renseigner les informations suivantes : L’URI du serveur LDAP ldap://192.168.1.100 Le DN de la base de recherche dc=mondomaine,dc=local Service de nom à configurer group,shadow et passwd. L’URI du serveur LDAP ldap://192.168.1.100 (de nouveau) Le DN de la base de recherche dc=mondomaine,dc=local (de nouveau) Version de LDAP à utiliser 3 Faut-il que le root local soit l’administrateur de la base de données ? Oui Est-ce que le LDAP nécessite une connexion Non Compte LDAP du root cn=admin,dc=mondomaine,dc=local Mot de passe du compte LDAP du root Le mot de passe renseigné lors de l’installation du LDAP. Configurez nsswitch afin qu’il interroge l’annuaire LDAP en entrant : auth−c l i e n t −c o n f i g −t nss −p l a c _ l d a p Testez la configuration de nsswitch.conf avec getent : getent passwd getent group Vous remarquerez l’apparition des utilisateurs LDAP dans cette liste. Finalisez la configuration en entrant : pam−auth−update /etc/init.d/nscd restart On vous demandera quels modules activer, cochez toutes les cases et validez. Configurez lightdm en ajoutant ce qui suit au fichier de configuration /etc/lightdm/lighhtdm.conf : g r e e t e r −hide −u s e r s=true allow −g u e s t=f a l s e 4 Installation et configuration du serveur NFS Network File System (ou ’NFS’, système de fichiers en réseau) est à l’origine un protocole développé par Sun Microsystems en 1984 qui permet à un ordinateur d’accéder à des fichiers via un réseau. Il fait partie de la couche application du modèle OSI et utilise le protocole RPC. Ce système de fichiers en réseau permet de partager des données principalement entre systèmes UNIX. Des versions existent pour Macintosh ou Microsoft Windows. NFS est compatible avec IPv6 sur la plupart des systèmes. Source : Wikipedia 4 4.1 Installation des paquets Sur le serveur, installer le paquet nfs-kernel-server : apt−get install nfs −k e r n e l −s e r v e r 4.2 Configurer le serveur NFS Éditez le fichier /etc/exports : /home/ 192.168.1.0/24(rw,sync) La version 4 de NFS pose certains problèmes. Nous allons rétrograder à la version 3. Éditez le fichier /etc/default/nfs-kernel-server et replacez : RPCNFSDCOUNT=’ 8 ’ par RPCNFSDCOUNT=’ 8␣−−no−nfs −v e r s i o n ␣4 ’ Redémarrez le service NFS pour prendre en compte de vos modifications : s e r v i c e nfs −k e r n e l −server reload 4.3 Configurer le client NFS Nous allons installer le module NFS sur le client : apt−get install nfs −common Puis effectuons le point de montage. Pour cela, éditez le fichier /etc/fstab et ajoutez-y la ligne suivante : 192.168.1.100:/home/ /home nfs defaults,_netdev,nfsvers=3 0 0 Auteur : Antoine Pernot 5.
Recommended publications
  • Today's Howtos Today's Howtos
    Published on Tux Machines (http://www.tuxmachines.org) Home > content > today's howtos today's howtos By Roy Schestowitz Created 09/12/2020 - 5:46am Submitted by Roy Schestowitz on Wednesday 9th of December 2020 05:46:15 AM Filed under HowTos [1] How to Install Nginx with Google PageSpeed on Ubuntu 20.04 [2] Nginx is a free and open-source web server that powers many sites on the internet. It can be used as a reverse proxy and load balancer. It is known for its high-performance and stability. ngx_pagespeed is an open-source Nginx module that can be used to optimize your website performance. It is developed by Google and reduces the page load time and speed up the website response time. Install and Configure ZFS on FreeBSD ? Linux Hint [3] This article will demonstrate how to set up FreeBSD 12.0, the latest version, on Zettabyte File System, or ZFS. The method we?ll employ is going to use BSDinstall and consequently allocate all of the disks to host the FreeBSD system. How to Share Files Between Windows and Linux [4] File sharing is the action of sending a file or more from one computer to another. In theory, it?s a simple thing. The process is quite simple and straightforward if both of the computers are running the same operating system. When it?s different, things get a bit complicated. How To Install Firefox on CentOS 8 - idroot [5] In this tutorial, we will show you how to install Firefox on CentOS 8. For those of you who didn?t know, Firefox is the default web browser in a number of Linux distributions and CentOS is one of them.
    [Show full text]
  • Mcafee Foundstone Fsl Update
    2017-JUL-27 FSL version 7.5.946 MCAFEE FOUNDSTONE FSL UPDATE To better protect your environment McAfee has created this FSL check update for the Foundstone Product Suite. The following is a detailed summary of the new and updated checks included with this release. NEW CHECKS 22152 - (JSA10802) Juniper Junos Insufficient Authentication Security Bypass Vulnerability Category: SSH Module -> NonIntrusive -> SSH Miscellaneous Risk Level: High CVE: CVE-2017-10601 Description A security-bypass vulnerability is present in some versions of Juniper Junos OS. Observation Juniper Junos OS is an operating system used in Juniper devices. A security-bypass vulnerability is present in some versions of Juniper Junos OS. The flaw lies in the Juniper Junos OS. Successful exploitation could allow a remote attacker to bypass authentication and gain access on the target system. 22161 - (JSA10791) Juniper Junos SRX Hardcoded Credentials Vulnerability Category: SSH Module -> NonIntrusive -> SSH Miscellaneous Risk Level: High CVE: CVE-2017-2343 Description An information disclosure vulnerability is present in some versions of Juniper Junos OS. Observation Juniper Junos OS is an operating system used in Juniper devices. An information disclosure vulnerability is present in some versions of Juniper Junos OS. The flaw lies in the UserFW services authentication API. Successful exploitation could allow an unauthenticated, remote attacker to gain access to sensitive information. 141631 - Red Hat Enterprise Linux RHSA-2017-1798 Update Is Not Installed Category: SSH Module -> NonIntrusive -> Red Hat Enterprise Linux Patches and Hotfixes Risk Level: High CVE: CVE-2017-7895 Description The scan detected that the host is missing the following update: RHSA-2017-1798 Observation Updates often remediate critical security problems that should be quickly addressed.
    [Show full text]
  • KC Administrator Manual Release 8.0.0
    KC Administrator Manual Release 8.0.0 Kopano BV Jul 01, 2021 Contents 1 Abstract 2 2 Introduction 3 2.1 Intended Audience..........................................3 2.2 Architecture.............................................3 2.3 Components.............................................4 2.4 Protocols and Connections......................................5 3 Installing 6 3.1 System Requirements........................................6 3.2 Installation..............................................9 3.3 Troubleshooting Installation Issues................................. 11 3.4 SSL.................................................. 12 4 Upgrading 14 4.1 Preparing............................................... 14 4.2 Creating backups........................................... 15 4.3 KC 8 dependencies.......................................... 16 4.4 Performing the Upgrade on RPM based distributions........................ 16 4.5 Performing the Upgrade on Debian based distributions....................... 16 4.6 Finalizing the upgrade........................................ 18 5 Configure KC Components 20 5.1 Configure the Kopano Server.................................... 20 5.2 Configure Kopano Konnect..................................... 27 5.3 Configure Kopano Kraph....................................... 30 5.4 Configure the Kopano Spooler.................................... 31 5.5 Configure Kopano Caldav...................................... 32 5.6 Configure Kopano Gateway (IMAP and POP3)........................... 33 5.7 Configure Kopano Quota Manager.................................
    [Show full text]
  • Samba-3 by Example
    Samba-3 by Example Practical Exercises in Successful Samba Deployment John H. Terpstra May 27, 2009 ABOUT THE COVER ARTWORK The cover artwork of this book continues the freedom theme of the first edition of \Samba-3 by Example". The history of civilization demonstrates the fragile nature of freedom. It can be lost in a moment, and once lost, the cost of recovering liberty can be incredible. The last edition cover featured Alfred the Great who liberated England from the constant assault of Vikings and Norsemen. Events in England that finally liberated the common people came about in small steps, but the result should not be under-estimated. Today, as always, freedom and liberty are seldom appreciated until they are lost. If we can not quantify what is the value of freedom, we shall be little motivated to protect it. Samba-3 by Example Cover Artwork: The British houses of parliament are a symbol of the Westminster system of government. This form of government permits the people to govern themselves at the lowest level, yet it provides for courts of appeal that are designed to protect freedom and to hold back all forces of tyranny. The clock is a pertinent symbol of the importance of time and place. The information technology industry is being challenged by the imposition of new laws, hostile litigation, and the imposition of significant constraint of practice that threatens to remove the freedom to develop and deploy open source software solutions. Samba is a software solution that epitomizes freedom of choice in network interoperability for Microsoft Windows clients.
    [Show full text]
  • Getting Ready for Samba4
    Getting Ready for Samba4 Samba Team member Andrew Bartlett explores the world of Samba4, its development status, what you can (and can’t) do with Samba4, and — most importantly– when you can expect to start using Samba4 in a production environment. Andrew Bartlett Thursday, April 3rd, 2008 Ever wanted to run an Active Directory Domain Controller on your Linux server? Did you run a Samba 3.0 DC, but had to move to Active Directory, or worried you might need to? Interested in the leading edge of Samba development, and wondering what the preceding questions mean? Without Samba, Linux, Windows and Macintosh computers could not share files and printers with each other, and networks of windows computers could only use Microsoft’s products to implement consistent user names and passwords across an organisation, something known as domain control. Since Samba was last covered by Linux Magazine in 2002, it seems the whole world has changed. Yet for members of the Samba Team the task remains to provide the Free Software community with a solid implementation of the Common Internet File System (CIFS) protocol, and with that a bridge into the Windows world. It is in that pursuit of interoperability that the Samba Team has continued, soon (at the time of writing) releasing version 3.2.0 of Samba, and alpha releases of Samba4. But Samba4 is more than just a new version of Samba, and more akin to a new development effort. Largely rewritten to handle the problems of interacting with modern versions of Microsoft’s Windows suite, Samba4 has been a storehouse of testing and innovation.
    [Show full text]
  • Univerzita Pardubice Fakulta Elektrotechniky a Informatiky
    Univerzita Pardubice Fakulta elektrotechniky a informatiky Multiplatformní správa uživatelských účtů Bubák Miroslav Bakalářská práce 2008 ZDE BUDE ZADÁNÍ ZDE BUDE ZADÁNÍ Souhrn Tato bakalářská práce se zabývá centralizovanou správou uživatelských účtů. Má za cíl navrhnout nekomerční řešení pro malé/střední firmy. Popsáno je několik nejrozšířenějších metod pro uložení informací o uživateli na straně serveru. Klíčová slova multipatformní, uživatelský účet, LDAP, Samba, správa Title Multiplatform user accounts management Abstract This bachelor work deals with central user accounts management. It aims to project noncommercial solution which could be used in small/middle company. This paper describes the most common methods used to store user informations on the server side. Keywords multipatform, user accounts, LDAP, Samba, management Obsah Úvod..............................................................................................................................9 1. Teoretický rozbor....................................................................................................10 1.1. Co ukládat – informace o uživateli.................................................................10 1.1.1. Unix.........................................................................................................10 1.1.2. Windows..................................................................................................10 1.1.3. Společné informace.................................................................................11 1.2. Možnosti
    [Show full text]
  • Linux Networking Cookbook.Pdf
    Linux Networking Cookbook ™ Carla Schroder Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo Linux Networking Cookbook™ by Carla Schroder Copyright © 2008 O’Reilly Media, Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or [email protected]. Editor: Mike Loukides Indexer: John Bickelhaupt Production Editor: Sumita Mukherji Cover Designer: Karen Montgomery Copyeditor: Derek Di Matteo Interior Designer: David Futato Proofreader: Sumita Mukherji Illustrator: Jessamyn Read Printing History: November 2007: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. The Cookbook series designations, Linux Networking Cookbook, the image of a female blacksmith, and related trade dress are trademarks of O’Reilly Media, Inc. Java™ is a trademark of Sun Microsystems, Inc. .NET is a registered trademark of Microsoft Corporation. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein.
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • Ramniranjan Jhunjhunwala College of Arts, Science and Commerce, Ghatkopar(W), Mumbai
    RAMNIRANJAN JHUNJHUNWALA COLLEGE OF ARTS, SCIENCE AND COMMERCE, GHATKOPAR(W), MUMBAI (AFFILIATED TO MUMBAI UNIVERSITY) SYLLABUS FOR: T. Y. BSc PROGRAM: B.Sc. COURSE: COMPUTER SCIENCE WITH EFFECT FROM ACADEMIC YEAR 2019-20 Date: _____________ Signature of BOS Members 1) Chairman :Anita Gaikwad 2) Subject Experts from outside the Parent University: i) Prof Suchita Bhovar, SNDT College, Ghatkopar i) Prof Pratibha Deshmukh, Bharathi Vidyapeeth, Navi Mumbai 3) ExPert to be nominated by Vice Chancellor: Prof Sampada Margaj, Kirti College Dadar 4) Representative from industry: Mr Uday Pawar, Director Tech, People Interactive Pvt ltd 5) Post graduate alumni: Prof Sunita Rai, Khalasa College, Matunga 6) Experts from outside the college: i) Prof Geeta Brijwani, K C College, Churchgate ii) Prof Maya Nair, SIES College, Sion iii) Prof Poonam Pandey, Somaiya College, Vidyavihar Preamble This is the third year curriculum in the subject of Computer Science. The revised structure is designed to transform students into technically competent, socially responsible and ethical Computer Science professionals. In these Semesters we have made the advancements in the subject based on the previous Semesters Knowledge. In the first year basic foundation of important skills required for software development is laid. Second year of this course is about studying core computer science subjects. The third year is the further advancement which covers developing capabilities to design formulations of computing models and its applications in diverse areas. The proposed curriculum contains two semesters, each Semester contains two Electives: Elective-I and II. Every Elective contains three papers based on specific areas of Computer Science. It also includes one Skill Enhancement paper per semester, helps the student to evaluate his/her computer science domain specific skills and also to meet industry expectations.
    [Show full text]
  • Ubuntu:Precise Ubuntu 12.04 LTS (Precise Pangolin)
    Ubuntu:Precise - http://ubuntuguide.org/index.php?title=Ubuntu:Precise&prin... Ubuntu:Precise From Ubuntu 12.04 LTS (Precise Pangolin) Introduction On April 26, 2012, Ubuntu (http://www.ubuntu.com/) 12.04 LTS was released. It is codenamed Precise Pangolin and is the successor to Oneiric Ocelot 11.10 (http://ubuntuguide.org/wiki/Ubuntu_Oneiric) (Oneiric+1). Precise Pangolin is an LTS (Long Term Support) release. It will be supported with security updates for both the desktop and server versions until April 2017. Contents 1 Ubuntu 12.04 LTS (Precise Pangolin) 1.1 Introduction 1.2 General Notes 1.2.1 General Notes 1.3 Other versions 1.3.1 How to find out which version of Ubuntu you're using 1.3.2 How to find out which kernel you are using 1.3.3 Newer Versions of Ubuntu 1.3.4 Older Versions of Ubuntu 1.4 Other Resources 1.4.1 Ubuntu Resources 1.4.1.1 Unity Desktop 1.4.1.2 Gnome Project 1.4.1.3 Ubuntu Screenshots and Screencasts 1.4.1.4 New Applications Resources 1.4.2 Other *buntu guides and help manuals 2 Installing Ubuntu 2.1 Hardware requirements 2.2 Fresh Installation 2.3 Install a classic Gnome-appearing User Interface 2.4 Dual-Booting Windows and Ubuntu 1 of 212 05/24/2012 07:12 AM Ubuntu:Precise - http://ubuntuguide.org/index.php?title=Ubuntu:Precise&prin... 2.5 Installing multiple OS on a single computer 2.6 Use Startup Manager to change Grub settings 2.7 Dual-Booting Mac OS X and Ubuntu 2.7.1 Installing Mac OS X after Ubuntu 2.7.2 Installing Ubuntu after Mac OS X 2.7.3 Upgrading from older versions 2.7.4 Reinstalling applications after
    [Show full text]
  • Evolving an Efficient and Effective Off-The-Shelf Computing Infrastructure for Schools in Rural Areas of South Africa
    Evolving an efficient and effective off-the-shelf computing infrastructure for schools in rural areas of South Africa A thesis submitted in fulfilment of the requirements for the degree of Doctor of Philosophy of Rhodes University by Ingrid Giselle Sieborger February 2017 Abstract Upliftment of rural areas and poverty alleviation are priorities for development in South Africa. Information and knowledge are key strategic resources for social and economic development and ICTs act as tools to support them, enabling innovative and more cost effective approaches. In order for ICT interventions to be possible, infrastructure has to be deployed. For the deployment to be effective and sustainable, the local community needs to be involved in shaping and supporting it. This study describes the technical work done in the Siyakhula Living Lab (SLL), a long-term ICT4D experiment in the Mbashe Municipality, with a focus on the deployment of ICT infrastructure in schools, for teaching and learning but also for use by the communities surrounding the schools. As a result of this work, computing infrastructure was deployed, in various phases, in 17 schools in the area and a “broadband island” connecting them was created. The dissertation reports on the initial deployment phases, discussing theoretical underpinnings and policies for using technology in education as well various computing and networking technologies and associated policies available and appropriate for use in rural South African schools. This information forms the backdrop of a survey conducted with teachers from six schools in the SLL, together with experimental work towards the provision of an evolved, efficient and effective off-the-shelf computing infrastructure in selected schools, in order to attempt to address the shortcomings of the computing infrastructure deployed initially in the SLL.
    [Show full text]
  • LIGO Universal Computing Authentication and Authorization For
    LASER INTERFEROMETER GRAVITATIONAL WAVE OBSERVATORY LIGO Laboratory / LIGO Scientific Collaboration LIGO-T080058-00-U LIGO DRAFT March 7, 2008 Universal Computing Authentication and Authorization for the LIGO-Virgo Community Authentication and Authorization Subcommittee of the LSC Computing Committee S.Anderson, W.Anderson, D.Barker, K.Cannon, S.Finn, S.Koranda, J.Minelli, T.Nash (Chair), S.Roddy, H.Williams Distribution of this document: LIGO-Virgo Science Collaboration This is an internal working note of the LIGO Project. California Institute of Technology Massachusetts Institute of Technology LIGO Project – MS 18-34 LIGO Project – NW17-161 1200 E. California Blvd. 175 Albany St Pasadena, CA 91125 Cambridge, MA 02139 Phone (626) 395-2129 Phone (617) 253-4824 Fax (626) 304-9834 Fax (617) 253-7014 E-mail: [email protected] E-mail: [email protected] LIGO Hanford Observatory LIGO Livingston Observatory P.O. Box 1970 P.O. Box 940 Mail Stop S9-02 Livingston, LA 70754 Richland WA 99352 Phone 225-686-3100 Phone 509-372-8106 Fax 225-686-7189 Fax 509-372-8137 http://www.ligo.caltech.edu/ LIGO LIGO-T080058-00-U 1 Introduction When a person is granted access to a controlled computing resource two things must happen. The computer must have information to authenticate that whoever is knocking at its door is a known person (or at least a person associated with a known group) – just as we humans look through a peephole to see if we recognize who is ringing the doorbell (or at least if they are wearing a UPS uniform). If the person has been authorized to access the specific resource, the system permits this – like opening the door.
    [Show full text]