Global Appeal 2007

Total Page:16

File Type:pdf, Size:1020Kb

Global Appeal 2007 Global Appeal 2007 Strategies and programmes Editorial team The editorial team wishes to acknowledge the outstanding contributions of colleagues at Headquarters and in the Field in the preparation of this document. The team wishes to thank especially Jill Mackechnie and Ian Myles for their help in reviewing all the texts and to Josiane Croset and her team for going out of their way to ensure the timely delivery of accurate financial data. Managing Editor: Maria Clara Martin Editors: Rohini Deshmukh, Kyle Matthews Data Coordinator and Editor: Robert Salin Contributing Editors: Shoko Shimozawa, Miroslav Medic, Joyce Munyao, Anja Papenfuss, Vibha Thapalyal Editorial Assistant: Sylvie Genhart-Maillot Intern: Katherine Meyer Editorial Consultant: Suresh Unny Photographs: Susan Hopper and Anne Kellner at the UNHCR Photolibrary, and UNHCR staff in the Field and in Headquarters. Cartography: Yvon Orand and Jordan Anastassov (Source: UNHCR Geographic Information Systems [GIS], Global Insight Digital Mapping © 1998 Europa Technologies Ltd.) Statistics: Henrik Pilgaard and Tarek Abou Chabake, Field Information and Coordination Support Section. Production Design, production and printing: Multimedia Design and Production, International Training Centre of the ILO, Turin - Italy Disclaimer The maps in this document do not imply the expression of any opinion on the part of UNHCR concerning the legal status of any country, territory, city or area, of its authorities, or the delimitation of frontiers or boundaries. All statistics are provisional and subject to change. UNHCR PO BOX 2500 1211 Geneva 2 Switzerland Tel: +41 22 739 8186 Fax +41 22 739 7358 Email: [email protected] www.unhcr.org Cover photo: Timor-Leste: Moving into a new lightweight emergency tent at the Don Bosco College IDP camp outside Dili. UNHCR / N. Ng Mission statement UNHCR - THE UNITED NATIONS REFUGEE AGENCY NHCR is mandated by the United Nations to lead and coordinate international action for the worldwide protection Uof refugees and the resolution of refugee problems. UNHCR’s primary purpose is to safeguard the rights and well-being of refugees. In its efforts to achieve this objective, UNHCR strives to ensure that everyone can exercise the right to seek asylum and find safe refuge in another State, and to return home voluntarily. By assisting refugees to return to their own country or to settle permanently in another country, UNHCR also seeks lasting solutions to their plight. UNHCR’s efforts are mandated by the organization’s Statute, and guided by the 1951 United Nations Convention relat- ing to the Status of Refugees and its 1967 Protocol. International refugee law provides an essential framework of prin- ciples for UNHCR’s humanitarian activities. In support of its core activities on behalf of refugees, UNHCR’s Executive Committee and the UN General Assembly have authorized the organization’s involvement with other groups. These include former refugees who have returned to their homeland; internally displaced people; and people who are stateless or whose nationality is disputed. UNHCR seeks to reduce situations of forced displacement by encouraging States and other institutions to create condi- tions which are conducive to the protection of human rights and the peaceful resolution of disputes. In pursuit of the same objective, UNHCR actively seeks to consolidate the reintegration of returning refugees in their country of origin, thereby averting the recurrence of refugee-producing situations. UNHCR is an impartial organization, offering protection and assistance to refugees and others on the basis of their needs and irrespective of their race, religion, political opinion or gender. In all of its activities, UNHCR pays particular attention to the needs of children and seeks to promote the equal rights of women and girls. In its efforts to protect refugees and to promote solutions to their problems, UNHCR works in partnership with govern- ments, regional organizations, international and non-governmental organizations. UNHCR is committed to the princi- ple of participation, believing that refugees and others who benefit from the organization’s activities should be consulted over decisions which affect their lives. By virtue of its activities on behalf of refugees and displaced people, UNHCR also endeavours to promote the purposes and principles of the United Nations Charter: maintaining international peace and security; developing friendly rela- tions among nations; and encouraging respect for human rights and fundamental freedoms. UNHCR Global Appeal 2007 3 Table of contents Mission statement.................................................................................................. 3 Foreword by the High Commissioner ........................................................................ 7 The Global Appeal 2006......................................................................................... 9 Part I - UNHCR: An overview Populations of concern ......................................................................................... 12 UNHCR’s field presence........................................................................................ 13 Key challenges..................................................................................................... 14 UNHCR’s Global strategic objectives....................................................................... 17 Providing international protection ........................................................................... 22 Finding durable solutions ...................................................................................... 30 Strengthening emergency response......................................................................... 36 Working with the internally displaced ..................................................................... 40 Policy priorities.................................................................................................... 45 Working in partnership with others......................................................................... 50 Identifying needs and funding programmes.............................................................. 54 Part II - UNHCR’S operations Africa ................................................................................................................. 62 Central Asia, South-West Asia, North Africa and the Middle East (CASWANAME) ............................................................................ 67 Asia and the Pacific ............................................................................................. 72 Europe................................................................................................................ 77 Americas ............................................................................................................ 82 Global programmes .............................................................................................. 86 Headquarters....................................................................................................... 88 Available on CD-ROM AFRICA CENTRAL AFRICA AND THE GREAT LAKES Regional overview ................................................................................................ 92 Burundi .............................................................................................................. 96 Democratic Republic of the Congo........................................................................ 100 United Republic of Tanzania................................................................................ 105 CHAD / SUDAN SITUATION Regional overview .............................................................................................. 110 Republic of Chad ............................................................................................... 113 Sudan .............................................................................................................. 118 EAST AND HORN OF AFRICA Regional overview .............................................................................................. 124 Ethiopia............................................................................................................ 128 Kenya............................................................................................................... 132 Somalia ............................................................................................................ 136 Uganda ............................................................................................................ 141 WEST AFRICA Regional overview .............................................................................................. 146 Côte d’Ivoire ...................................................................................................... 151 Ghana .............................................................................................................. 156 Guinea.............................................................................................................. 160 Liberia.............................................................................................................. 164 Sierra Leone ...................................................................................................... 168 4 UNHCR Global Appeal 2007 SOUTHERN AFRICA Regional overview .............................................................................................. 172 Angola.............................................................................................................
Recommended publications
  • Tomenet-Guide.Pdf
    .==========================================================================+−−. | TomeNET Guide | +==========================================================================+− | Latest update: 17. September 2021 − written by C. Blue ([email protected]) | | for TomeNET version v4.7.4b − official websites are: : | https://www.tomenet.eu/ (official main site, formerly www.tomenet.net) | https://muuttuja.org/tomenet/ (Mikael’s TomeNET site) | Runes & Runemastery sections by Kurzel ([email protected]) | | You should always keep this guide up to date: Either go to www.tomenet.eu | to obtain the latest copy or simply run the TomeNET−Updater.exe in your | TomeNET installation folder (desktop shortcut should also be available) | to update it. | | If your text editor cannot display the guide properly (needs fixed−width | font like for example Courier), simply open it in any web browser instead. +−−− | Welcome to this guide! | Although I’m trying, I give no guarantee that this guide | a) contains really every detail/issue about TomeNET and | b) is all the time 100% accurate on every occasion. | Don’t blame me if something differs or is missing; it shouldn’t though. | | If you have any suggestions about the guide or the game, please use the | /rfe command in the game or write to the official forum on www.tomenet.eu. : \ Contents −−−−−−−− (0) Quickstart (If you don’t like to read much :) (0.1) Start & play, character validation, character timeout (0.1a) Colours and colour blindness (0.1b) Photosensitivity / Epilepsy issues (0.2) Command reference
    [Show full text]
  • Combating Spyware in the Enterprise.Pdf
    www.dbebooks.com - Free Books & magazines Visit us at www.syngress.com Syngress is committed to publishing high-quality books for IT Professionals and delivering those books in media and formats that fit the demands of our cus- tomers. We are also committed to extending the utility of the book you purchase via additional materials available from our Web site. SOLUTIONS WEB SITE To register your book, visit www.syngress.com/solutions. Once registered, you can access our [email protected] Web pages. There you will find an assortment of value-added features such as free e-booklets related to the topic of this book, URLs of related Web site, FAQs from the book, corrections, and any updates from the author(s). ULTIMATE CDs Our Ultimate CD product line offers our readers budget-conscious compilations of some of our best-selling backlist titles in Adobe PDF form. These CDs are the perfect way to extend your reference library on key topics pertaining to your area of exper- tise, including Cisco Engineering, Microsoft Windows System Administration, CyberCrime Investigation, Open Source Security, and Firewall Configuration, to name a few. DOWNLOADABLE EBOOKS For readers who can’t wait for hard copy, we offer most of our titles in download- able Adobe PDF form. These eBooks are often available weeks before hard copies, and are priced affordably. SYNGRESS OUTLET Our outlet store at syngress.com features overstocked, out-of-print, or slightly hurt books at significant savings. SITE LICENSING Syngress has a well-established program for site licensing our ebooks onto servers in corporations, educational institutions, and large organizations.
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • Ubuntu: Powerful Hacks and Customizations
    Hacks, tips, and tricks to Krawetz put your OS into overdrive ubuntu Whether it’s speed, glitz, sounds, or security, you want to get the most out of your Ubuntu Linux system. This book shows you how to do just that. You’ll fi nd out how to customize the user interface, implement networking tools, optimize video, and more. You’ll then be able to build on these hacks to further tune, tweak, and customize Ubuntu to meet all your needs. The basic Ubuntu system is good, but with a few modifi cations, it can be made great. This book is packed with techniques that will help you: • Choose the right options when installing Ubuntu onto a Netbook, server, or other system • Install fi les for interoperability and collaborate with non-Linux systems • Tune the operating system for optimal performance ® • Enhance your graphics to take them to the next level Powerful Hacks and Customizations Powerful • Navigate the desktop, manage windows, and multitask between applications • Check for vulnerabilities and prevent undesirable access • Learn tricks to safely opening up the system with external network services Neal Krawetz, PhD, is a computer security professional with experience in computer forensics, ® profi ling, cryptography and cryptanalysis, artifi cial intelligence, and software solutions. Dr. Krawetz’s company, Hacker Factor, specializes in uncommon forensic techniques and anti-anonymity technologies. He has confi gured Ubuntu on everything from personal workstations to mission-critical servers. ubuntu Visit our Web site at www.wiley.com/compbooks $39.99 US/$47.99 CAN Powerful Hacks and Customizations ISBN 978-0-470-58988-5 Neal Krawetz Operating Systems / Linux Ubuntu® Powerful Hacks and Customizations Dr.
    [Show full text]
  • XMPP: the Definitive Guide Download at Boykma.Com XMPP: the Definitive Guide Building Real-Time Applications with Jabber Technologies
    XMPP: The Definitive Guide Download at Boykma.Com XMPP: The Definitive Guide Building Real-Time Applications with Jabber Technologies Peter Saint-Andre, Kevin Smith, and Remko Tronçon Beijing • Cambridge • Farnham • Köln • Sebastopol • Taipei • Tokyo Download at Boykma.Com XMPP: The Definitive Guide by Peter Saint-Andre, Kevin Smith, and Remko Tronçon Copyright © 2009 Peter Saint-Andre, Kevin Smith, Remko Tronçon. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://safari.oreilly.com). For more information, contact our corporate/ institutional sales department: (800) 998-9938 or [email protected]. Editor: Mary E. Treseler Indexer: Joe Wizda Production Editor: Loranah Dimant Cover Designer: Karen Montgomery Copyeditor: Genevieve d’Entremont Interior Designer: David Futato Proofreader: Loranah Dimant Illustrator: Robert Romano Printing History: April 2009: First Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. XMPP: The Definitive Guide, the image of a kanchil mouse deer on the cover, and related trade dress are trademarks of O’Reilly Media, Inc. JABBER® is a registered trademark licensed through the XMPP Standards Foundation. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and authors assume no responsibility for errors or omissions, or for damages resulting from the use of the information con- tained herein.
    [Show full text]
  • OSSEC Documentation Release 2.7.2B1
    OSSEC Documentation Release 2.7.2b1 Jeremy Rossi January 29, 2014 Contents 1 Manual & FAQ 3 1.1 Manual..................................................3 1.2 Frequently asked questions........................................ 64 2 Reference 77 2.1 Syntax and Options............................................ 77 2.2 Man pages................................................ 115 2.3 Rules/Decoders Documentation..................................... 141 2.4 Rootcheck / Syscheck Reference..................................... 141 2.5 Log Samples............................................... 146 2.6 Glossary................................................. 243 3 Indices and tables 245 i ii OSSEC Documentation, Release 2.7.2b1 OSPatrol is an Open Source Host-based Intrusion Detection System. It performs log analysis, integrity checking, Windows registry monitoring, rootkit detection, real-time alerting and active response. It runs on most operating systems, including Linux, OpenBSD, FreeBSD, Mac OS X, Solaris and Windows. A list with all supported platforms is available at: Supported Systems Contents 1 OSSEC Documentation, Release 2.7.2b1 2 Contents CHAPTER 1 Manual & FAQ 1.1 Manual 1.1.1 Getting started with OSPatrol OSPatrol is a full platform to monitor and control your systems. It mixes together all the aspects of HIDS (host-based intrusion detection), log monitoring and SIM/SIEM together in a simple, powerful and open source solution. It is also backed and fully supported by Trend Micro. Key Benefits Compliance Requirements OSPatrol helps customers meet specific compliance requirements such as PCI, HIPAA etc. It lets customers detect and alert on unauthorized file system modifications and malicious behavior embedded in the log files of COTS products as well as custom applications. For PCI, it covers the sections of file integrity monitoring (PCI 11.5, 10.5), log inspection and monitoring (section 10) and policy enforcement/checking.
    [Show full text]
  • Information Security
    A SA Research Information Security J. Carlton Collins ASA Research - Atlanta, Georgia 770.734.0950 [email protected] Information Security Table of Contents Chapter Chapter Title & Page Count Page Number 1 Locks ‐ (2 Pages) 6 2 Government Compliance ‐ (3 Pages) 8 3 Securing Hard Drives and Laptop Computers ‐ (16 Pages) 11 4 Encryption ‐ (12 Pages) 27 5 Strong Passwords ‐ (7 Pages) 39 6 Windows ‐ Files and Folders ‐ (8 Pages) 46 7 System Restore ‐ (3 Pages) 54 8 Firewalls ‐ (7 Pages) 57 9 Wireless Security ‐ (8 Pages) 64 10 Checking the Security of your PC ‐ (4 Pages) 72 11 Online Security Tests ‐ (3 Pages) 76 12 Windows ‐ User Accounts & Groups ‐ (6 Pages) 79 13 Windows ‐ Screen Savers ‐ (4 Pages) 85 14 Pornography ‐ (4 Pages) 89 15 Sample Contracts ‐ (9 Pages) 93 16 Computer Bread Crumbs ‐ (6 Pages) 102 17 Computer Disposal ‐ (5 Pages) 108 18 Backup Strategy ‐ (14 Pages) 113 19 Viruses ‐ (6 Pages) 127 20 Phishing ‐ (7 Pages) 133 21 Spy Stuff ‐ (14 Pages) 140 22 Privacy Test ‐ (6 Pages) 154 23 Fake IDs ‐ (7 Pages) 160 24 National ID Cards ‐ (4 Pages) 167 25 Fake Social Security Cards ‐ (5 Pages) 171 26 Identity Theft ‐ (14 Pages) 176 27 Employee Theft ‐ (6 Pages) 190 28 Background Checks ‐ (5 Pages) 196 29 Bonding Employees ‐ (3 Pages) 201 30 Asterisk Key ‐ (2 Pages) 204 31 Encryption Analyzer & Passware ‐ (3 Pages) 206 32 Securing Desktop Computers ‐ (3 Pages) 209 33 Windows ‐ Windows Services ‐ (6 Pages) 212 34 Risk of Fire ‐ (3 Pages) 218 35 Credit Card Fraud ‐ (11 Pages) 221 36 Counterfeit Money ‐ (9 Pages) 232 37 Cracking and
    [Show full text]
  • While IRC Is Easy to Get Into and Many People Are Happy to Use It Without
    < Day Day Up > • Table of Contents • Index • Reviews • Reader Reviews • Errata • Academic • Top Ten Tricks and Tips for New IRC Users IRC Hacks By Paul Mutton Publisher: O'Reilly Pub Date: July 2004 ISBN: 0-596-00687-X Pages: 432 While IRC is easy to get into and many people are happy to use it without being aware of what's happening under the hood, there are those who hunger for more knowledge, and this book is for them. IRC Hacks is a collection of tips and tools that cover just about everything needed to become a true IRC master, featuring contributions from some of the most renowned IRC hackers, many of whom collaborated on IRC, grouping together to form the channel #irchacks on the freenode IRC network (irc.freenode.net). < Day Day Up > < Day Day Up > • Table of Contents • Index • Reviews • Reader Reviews • Errata • Academic • Top Ten Tricks and Tips for New IRC Users IRC Hacks By Paul Mutton Publisher: O'Reilly Pub Date: July 2004 ISBN: 0-596-00687-X Pages: 432 Copyright Foreword Credits About the Author Contributors Acknowledgments Preface Why IRC Hacks? How to Use This Book How This Book Is Organized Conventions Used in this Book Using Code Examples How to Contact Us Got a Hack? Chapter 1. Connecting to IRC Introduction: Hacks #1-4 Hack 1. IRC from Windows Hack 2. IRC from Linux Hack 3. IRC from Mac OS X Hack 4. IRC with ChatZilla Chapter 2. Using IRC Introduction: Hacks #5-11 Hack 5. The IRC Model Hack 6. Common Terms, Abbreviations, and Phrases Hack 7.
    [Show full text]
  • Botnets. the Killer Web
    363_Web_App_FM.qxd 12/19/06 10:46 AM Page ii 427_Botnet_FM.qxd 1/9/07 12:05 PM Page i Visit us at www.syngress.com Syngress is committed to publishing high-quality books for IT Professionals and delivering those books in media and formats that fit the demands of our cus- tomers. We are also committed to extending the utility of the book you pur- chase via additional materials available from our Web site. SOLUTIONS WEB SITE To register your book, visit www.syngress.com/solutions. Once registered, you can access our [email protected] Web pages. There you may find an assort- ment of value-added features such as free e-books related to the topic of this book, URLs of related Web sites, FAQs from the book, corrections, and any updates from the author(s). ULTIMATE CDs Our Ultimate CD product line offers our readers budget-conscious compilations of some of our best-selling backlist titles in Adobe PDF form. These CDs are the perfect way to extend your reference library on key topics pertaining to your area of expertise, including Cisco Engineering, Microsoft Windows System Administration, CyberCrime Investigation, Open Source Security, and Firewall Configuration, to name a few. DOWNLOADABLE E-BOOKS For readers who can’t wait for hard copy, we offer most of our titles in down- loadable Adobe PDF form. These e-books are often available weeks before hard copies, and are priced affordably. SYNGRESS OUTLET Our outlet store at syngress.com features overstocked, out-of-print, or slightly hurt books at significant savings.
    [Show full text]
  • C O M P U T I N G N E
    U n i v e r s i t y o f O r e g o n C O M P U T I N G N E W S FALL 2003 Get your free copy of Duckware 2003 for Mac or PC! The discs are distributed at numerous campus locations. New this year is a special supplementary Windows Security CD for Windows users. See stories on pp. 2, 17. IN THIS ISSUE… Security Welcome to Campus! What You Need to Know about the New Windows Security CD...................................................................... 17 Free Duckware 2003 and Windows Security CDs.............2 Simple Passwords Expose Your PC to ‘Backdoor’ Attack.. 13 How to Start Using Your UO Computing Account............3 Update to Avoid Axis Network Camera Vulnerabilities .. 13 Get Acquainted with UO Computing Resources: A Guide to Protecting System Integrity ............................ 14 Consulting Help, Campus Computing Labs ....................4 Security Alerts ................................................................... 18 Computing Center Electronics Shop Services...................6 Technology Updates Computing Center Documents Room Resources...............7 Information Technology Workshops..................................7 UO Prepares for Increasing Wireless Use on Campus...... 11 Large Timesharing Systems................................................8 UO Libraries’ Tech Services Continue to Grow................ 12 Blackboard Upgrade Introduced this Fall......................... 12 UO Web Email.....................................................................9 Mathematica 5.0 is Here .................................................................23
    [Show full text]
  • ERC Manual a Full-Featured IRC Client for GNU Emacs and Xemacs This Manual Is for ERC Version 5.3
    ERC manual a full-featured IRC client for GNU Emacs and XEmacs This manual is for ERC version 5.3. Copyright c 2005, 2006, 2007, 2008 Free Software Foundation, Inc. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, with the Front-Cover texts being \A GNU Manual," and with the Back-Cover Texts as in (a) below. A copy of the license is included in the section entitled \GNU Free Documentation License". (a) The FSF's Back-Cover Text is: \You have the freedom to copy and modify this GNU manual. Buying copies from the FSF supports it in developing GNU and promoting software freedom." All Emacs Lisp code contained in this document may be used, distributed, and modified without restriction. i Table of Contents 1 Introduction::::::::::::::::::::::::::::::::::::: 1 2 Obtaining ERC ::::::::::::::::::::::::::::::::: 2 2.1 Releases ::::::::::::::::::::::::::::::::::::::::::::::::::::::: 2 2.2 Development ::::::::::::::::::::::::::::::::::::::::::::::::::: 2 3 Installation :::::::::::::::::::::::::::::::::::::: 4 4 Getting Started ::::::::::::::::::::::::::::::::: 5 4.1 Sample Session ::::::::::::::::::::::::::::::::::::::::::::::::: 5 4.2 Special Features:::::::::::::::::::::::::::::::::::::::::::::::: 6 5 Keys Used in ERC:::::::::::::::::::::::::::::: 7 6 Modules ::::::::::::::::::::::::::::::::::::::::: 9 7 Advanced Usage ::::::::::::::::::::::::::::::: 11 7.1 Connecting
    [Show full text]
  • Balu Wiki Documentation Release 0.42
    BaLu Wiki Documentation Release 0.42 Balle & Lilu Mar 05, 2021 Contents 1 Arch Linux 1 2 Cgroups 3 3 Debian 7 4 Debugging 9 5 Fedora 11 6 Filesystem 13 7 Gnome3 15 8 Grub2 19 9 Inotify 23 10 IPMI 25 11 Kernel 29 12 LVM 33 13 Memory Management 35 14 OpenPandora 37 15 Redhat 41 16 Systemd 47 17 Xorg 55 18 OpenBSD 57 19 MacOS 71 20 Tools 77 i 21 Network 113 22 Security 141 23 Hacking 163 24 Cluster 173 25 Databases 241 26 Virtualization 263 27 Programming 279 28 Misc 349 29 Indices and tables 357 ii CHAPTER 1 Arch Linux 1.1 Install yaourt • Edit /etc/pacman.conf [archlinuxfr] Server= http://repo.archlinux.fr/$arch • Install yaourt pacman -Sy yaourt • Now you can install packages from aur.archlinux.org with yaourt -S <pkg> 1 BaLu Wiki Documentation, Release 0.42 2 Chapter 1. Arch Linux CHAPTER 2 Cgroups 2.1 Overview • Cgroups group processes so that you can define ressource limits and get stats for it • Processes are called tasks • Every process can only be in one cgroup • A cgroup can inherit the properties of another cgroup mkdir /cgroup/ mount -t cgroup -o memory nodev /cgroup/ 2.2 Installation yum install libcgroup 2.3 Create a new cgroup • Temporarily mkdir /cgroup/<groupname> • Or cgcreate -a <user> -g memory,cpu:<groupname> • Permanent by editing /etc/cgconfig.conf 3 BaLu Wiki Documentation, Release 0.42 group <name>{ [<permissions>] <controller>{ <param name>= <param value>; } } • e.g. mount{ cpuset= /cgroup/cpuset; cpu= /cgroup/cpu; cpuacct= /cgroup/cpuacct; memory= /cgroup/memory; devices= /cgroup/devices; freezer= /cgroup/freezer;
    [Show full text]