Reference Opensuse Leap 42.3 Reference Opensuse Leap 42.3

Total Page:16

File Type:pdf, Size:1020Kb

Reference Opensuse Leap 42.3 Reference Opensuse Leap 42.3 Reference openSUSE Leap 42.3 Reference openSUSE Leap 42.3 Publication Date: November 05, 2018 SUSE LLC 10 Canal Park Drive Suite 200 Cambridge MA 02141 USA https://www.suse.com/documentation Copyright © 2006– 2018 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Docu- mentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see http://www.suse.com/company/legal/ . All other third-party trademarks are the prop- erty of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its affiliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its affiliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About This Guide xvi I ADVANCED ADMINISTRATION 1 1 YaST in Text Mode 2 1.1 Navigation in Modules 3 1.2 Advanced Key Combinations 5 1.3 Restriction of Key Combinations 5 1.4 YaST Command Line Options 6 Starting the Individual Modules 6 • Installing Packages from the Command Line 6 • Command Line Parameters of the YaST Modules 7 2 Managing Software with Command Line Tools 8 2.1 Using Zypper 8 General Usage 8 • Installing and Removing Software with Zypper 10 • Updating Software with Zypper 14 • Identifying Processes and Services Using Deleted Files 18 • Managing Repositories with Zypper 19 • Querying Repositories and Packages with Zypper 21 • Configuring Zypper 23 • Troubleshooting 23 • Zypper Rollback Feature on Btrfs File System 24 • For More Information 24 2.2 RPM—the Package Manager 24 Verifying Package Authenticity 25 • Managing Packages: Install, Update, and Uninstall 25 • Delta RPM Packages 27 • RPM Queries 27 • Installing and Compiling Source Packages 30 • Compiling RPM Packages with build 32 • Tools for RPM Archives and the RPM Database 33 iii Reference 3 System Recovery and Snapshot Management with Snapper 34 3.1 Default Setup 34 Types of Snapshots 36 • Directories That Are Excluded from Snapshots 36 • Customizing the Setup 38 3.2 Using Snapper to Undo Changes 41 Undoing YaST and Zypper Changes 42 • Using Snapper to Restore Files 47 3.3 System Rollback by Booting from Snapshots 49 Snapshots after Rollback 51 • Accessing and Identifying Snapshot Boot Entries 52 • Limitations 54 3.4 Creating and Modifying Snapper Configurations 55 Managing Existing Configurations 57 3.5 Manually Creating and Managing Snapshots 60 Snapshot Metadata 60 • Creating Snapshots 62 • Modifying Snapshot Metadata 63 • Deleting Snapshots 64 3.6 Automatic Snapshot Clean-Up 65 Cleaning Up Numbered Snapshots 66 • Cleaning Up Timeline Snapshots 67 • Cleaning Up Snapshot Pairs That Do Not Differ 69 • Cleaning Up Manually Created Snapshots 69 • Adding Disk Quota Support 70 3.7 Frequently Asked Questions 71 4 Remote Access with VNC 73 4.1 The vncviewer Client 73 Connecting Using the vncviewer CLI 73 • Connecting Using the vncviewer GUI 74 • Notification of Unencrypted Connections 74 4.2 Remmina: the Remote Desktop Client 75 Installation 75 • Main Window 75 • Adding Remote Sessions 75 • Starting Remote Sessions 77 • Editing, Copying, and Deleting Saved Sessions 78 • Running Remote Sessions from the Command Line 78 iv Reference 4.3 One-time VNC Sessions 79 Available Configurations 80 • Initiating a One-time VNC Session 81 • Configuring One-time VNC Sessions 81 4.4 Persistent VNC Sessions 82 VNC Session Initiated using vncserver 82 • VNC Session Initiated using vncmanager 84 4.5 Encrypted VNC Communication 87 5 Advanced Disk Setup 90 5.1 Using the YaST Partitioner 90 Partition Types 92 • Creating a Partition 92 • Editing a Partition 96 • Expert Options 98 • Advanced Options 99 • More Partitioning Tips 99 • Partitioning and LVM 102 5.2 LVM Configuration 102 LVM Configuration with YaST 103 5.3 Soft RAID Configuration with YaST 106 Soft RAID Configuration with YaST 106 • Troubleshooting 108 • For More Information 108 6 Installing Multiple Kernel Versions 109 6.1 Enabling and Configuring Multiversion Support 109 Automatically Deleting Unused Kernels 110 • Use Case: Deleting an Old Kernel after Reboot Only 111 • Use Case: Keeping Older Kernels as Fallback 111 • Use Case: Keeping a Specific Kernel Version 112 6.2 Installing/Removing Multiple Kernel Versions with YaST 112 6.3 Installing/Removing Multiple Kernel Versions with Zypper 113 6.4 Installing the Latest Kernel Version from the Repository Kernel:HEAD 114 7 GNOME Configuration for Administrators 115 7.1 Starting Applications Automatically 115 7.2 Automounting and Managing Media Devices 115 v Reference 7.3 Changing Preferred Applications 115 7.4 Adding Document Templates 116 7.5 For More Information 116 II SYSTEM 117 8 32-Bit and 64-Bit Applications in a 64-Bit System Environment 118 8.1 Runtime Support 118 8.2 Software Development 119 8.3 Software Compilation on Biarch Platforms 120 8.4 Kernel Specifications 121 9 Introduction to the Booting Process 122 9.1 The Linux Boot Process 122 9.2 initramfs 124 9.3 Init on initramfs 125 10 The systemd Daemon 128 10.1 The systemd Concept 128 What Is systemd 128 • Unit File 129 10.2 Basic Usage 130 Managing Services in a Running System 130 • Permanently Enabling/ Disabling Services 132 10.3 System Start and Target Management 134 Targets Compared to Runlevels 134 • Debugging System Start- Up 137 • System V Compatibility 140 10.4 Managing Services with YaST 141 vi Reference 10.5 Customization of systemd 142 Customizing Service Files 143 • Creating “Drop-in” Files 143 • Creating Custom Targets 143 10.6 Advanced Usage 144 Cleaning Temporary Directories 144 • System Log 145 • Snapshots 145 • Loading Kernel Modules 146 • Performing Actions before Loading a Service 146 • Kernel Control Groups (cgroups) 147 • Terminating Services (Sending Signals) 148 • Debugging Services 149 10.7 More Information 150 11 journalctl: Query the systemd Journal 151 11.1 Making the Journal Persistent 151 11.2 journalctl Useful Switches 152 11.3 Filtering the Journal Output 153 Filtering Based on a Boot Number 153 • Filtering Based on Time Interval 153 • Filtering Based on Fields 154 11.4 Investigating systemd Errors 155 11.5 Journald Configuration 156 Changing the Journal Size Limit 156 • Forwarding the Journal to /dev/ ttyX 156 • Forwarding the Journal to Syslog Facility 157 11.6 Using YaST to Filter the systemd Journal 157 12 The Boot Loader GRUB 2 159 12.1 Main Differences between GRUB Legacy and GRUB 2 159 12.2 Configuration File Structure 159 The File /boot/grub2/grub.cfg 161 • The File /etc/default/ grub 161 • Scripts in /etc/grub.d 164 • Mapping between BIOS Drives and Linux Devices 165 • Editing Menu Entries during the Boot Procedure 166 • Setting a Boot Password 167 vii Reference 12.3 Configuring the Boot Loader with YaST 168 Boot Loader Location and Boot Code Options 169 • Adjusting the Disk Order 171 • Configuring Advanced Options 171 12.4 Differences in Terminal Usage on z Systems 174 Limitations 174 • Key Combinations 174 12.5 Helpful GRUB 2 Commands 176 12.6 More Information 178 13 Basic Networking 179 13.1 IP Addresses and Routing 182 IP Addresses 182 • Netmasks and Routing 182 13.2 IPv6—The Next Generation Internet 184 Advantages 185 • Address Types and Structure 186 • Coexistence of IPv4 and IPv6 190 • Configuring IPv6 191 • For More Information 192 13.3 Name Resolution 193 13.4 Configuring a Network Connection with YaST 194 Configuring the Network Card with YaST 194 13.5 NetworkManager 205 NetworkManager and wicked 205 • NetworkManager Functionality and Configuration Files 206 • Controlling and Locking Down NetworkManager Features 207 13.6 Configuring a Network Connection Manually 207 The wicked Network Configuration 207 • Configuration Files 214 • Testing the Configuration 225 • Unit Files and Start-Up Scripts 228 13.7 Basic Router Setup 230 13.8 Setting Up Bonding Devices 231 Hotplugging of Bonding Slaves 233 13.9 Setting Up Team Devices for Network Teaming 234 Use Case: Loadbalancing with Network Teaming 238 • Use Case: Failover with Network Teaming 239 • Use Case: VLAN over Team Device 240 viii Reference 13.10 Software-Defined Networking with Open vSwitch 242 Advantages of Open vSwitch 242 • Installing Open vSwitch 243 • Overview of Open vSwitch Daemons and Utilities 243 • Creating a Bridge with Open vSwitch 244 • Using Open vSwitch Directly with KVM 245 • Using Open vSwitch with libvirt 247 • For More Information 248 14 UEFI (Unified Extensible Firmware Interface) 249 14.1 Secure Boot 249 Implementation on openSUSE Leap 250 • MOK (Machine Owner Key) 254 • Booting a Custom Kernel 254 • Using Non-Inbox Drivers 256 • Features and Limitations 257 14.2 For More Information 258 15 Special System Features 259 15.1 Information about Special Software Packages 259 The bash Package and /etc/profile 259 • The cron Package 260 • Stopping Cron Status Messages 261 • Log Files: Package logrotate 261 • The locate Command 261 • The ulimit Command 262 • The free Command 263 • Man Pages and Info Pages 263 • Selecting Man Pages Using the man Command 263 • Settings for GNU Emacs 264 15.2 Virtual Consoles 265 15.3 Keyboard Mapping 265 15.4 Language and Country-Specific Settings 266 Some Examples 267 • Locale Settings in ~/.i18n 268 • Settings for Language Support
Recommended publications
  • Best Practices and Getting Started Guide for Oracle on IBM Linuxone
    Front cover Best practices and Getting Started Guide for Oracle on IBM LinuxONE Susan Adamovich Sam Amsavelu Srujan Jagarlamudi Raghu Malige Michael Morgan Paul Novak David J Simpson Redpaper International Technical Support Organization Best practices and Getting Started Guide for Oracle on IBM LinuxONE June 2020 REDP-5499-00 Note: Before using this information and the product it supports, read the information in “Notices” on page vii. First Edition (June 2020) This edition applies to Oracle 12c, Release 2. This document was created or updated on June 2, 2020. © Copyright International Business Machines Corporation 2020. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . vii Trademarks . viii Preface . 1 Authors. 1 Now you can become a published author, too! . 2 Comments welcome. 3 Stay connected to IBM Redbooks . 3 Chapter 1. Running Linux virtual servers under IBM z/VM . 5 1.1 z/VM fundamentals . 6 1.2 Pre-requisites and assumptions . 6 1.2.1 Pre-requisites . 6 1.2.2 Assumptions . 6 1.3 Configuring a workstation for mainframe access . 7 1.3.1 3270 emulators . 7 1.3.2 Virtual Network Computing client . 7 1.3.3 Connecting from a Linux workstation . 8 1.3.4 Connecting from a MacOS workstation. 8 1.3.5 Connecting from a Windows workstation . 9 1.4 Service validation and notice subscription . 10 1.4.1 RSU validation . 10 1.4.2 Subscribing to service notifications. 10 1.5 Tailoring z/VM for Linux workloads .
    [Show full text]
  • 1. D-Bus a D-Bus FAQ Szerint D-Bus Egy Interprocessz-Kommunikációs Protokoll, És Annak Referenciamegvalósítása
    Az Udev / D-Bus rendszer - a modern asztali Linuxok alapja A D-Bus rendszer minden modern Linux disztribúcióban jelen van, sőt mára már a Linux, és más UNIX jellegű, sőt nem UNIX rendszerek (különösen a desktopon futó változatok) egyik legalapvetőbb technológiája, és az ismerete a rendszergazdák számára lehetővé tesz néhány rendkívül hasznos trükköt, az alkalmazásfejlesztőknek pedig egyszerűen KÖTELEZŐ ismerniük. Miért ilyen fontos a D-Bus? Mit csinál? D-Bus alapú technológiát teszik lehetővé többek között azt, hogy közönséges felhasználóként a kedvenc asztali környezetünkbe bejelentkezve olyan feladatokat hajtsunk végre, amiket a kernel csak a root felasználónak engedne meg. Felmountolunk egy USB meghajtót? NetworkManagerrel konfiguráljuk a WiFi-t, a 3G internetet vagy bármilyen más hálózati csatolót, és kapcsolódunk egy hálózathoz? Figyelmeztetést kapunk a rendszertől, hogy új szoftverfrissítések érkeztek, majd telepítjük ezeket? Hibernáljuk, felfüggesztjük a gépet? A legtöbb esetben ma már D-Bus alapú technológiát használunk ilyen esetben. A D-Bus lehetővé teszi, hogy egymástól függetlenül, jellemzően más UID alatt indított szoftverösszetevők szabványos és biztonságos módon igénybe vegyék egymás szolgáltatásait. Ha valaha lesz a Linuxhoz professzionális desktop tűzfal vagy vírusirtó megoldás, a dolgok jelenlegi állasa szerint annak is D- Bus technológiát kell használnia. A D-Bus technológia legfontosabb ihletője a KDE DCOP rendszere volt, és mára a D-Bus leváltotta a DCOP-ot, csakúgy, mint a Gnome Bonobo technológiáját. 1. D-Bus A D-Bus FAQ szerint D-Bus egy interprocessz-kommunikációs protokoll, és annak referenciamegvalósítása. Ezen referenciamegvalósítás egyik összetevője, a libdbus könyvtár a D- Bus szabványnak megfelelő kommunikáció megvalósítását segíti. Egy másik összetevő, a dbus- daemon a D-Bus üzenetek routolásáért, szórásáért felelős.
    [Show full text]
  • 9 Caching Proxy Server
    webXaccelerator: Owner's Guide by Luis Soltero, Ph.D., MCS Revision 1.06 February 10, 2010 (v1.2.3.10-RELEASE) Copyright © 2010 Global Marine Networks, LLC Table of Contents 1 Quick Start..............................................................................................................................................5 2 Introduction.............................................................................................................................................8 3 Initial Installation and Configuration......................................................................................................9 3.1 Connections.....................................................................................................................................9 3.2 Power-up..........................................................................................................................................9 3.3 Power-down...................................................................................................................................10 3.4 Web Administrator........................................................................................................................10 3.5 LAN Setup.....................................................................................................................................10 3.6 WAN Setup....................................................................................................................................11 3.7 WAN2 (Backup WAN) Setup........................................................................................................13
    [Show full text]
  • Happy Birthday Linux
    25 Jahre Linux! Am Anfang war der Quellcode Entstehungsgeschichte und Werdegang von Linux Entwicklung und Diversifizierung der Distributionen Der Wert von Linux oder: „Wat nix kost, dat is och nix.“ Andreas Klein ORR 2016 1 Am Anfang war der Quellcode (70er) ● 1969, Ken Thompson u. Dennis Ritchie erstellen die erste Version von Unix in Assembler. ● Von 1969-1971 entwickeln sie gemeinsam die Programmiersprache B. ● Ab 1971 erweiterte in erster Linie Dennis Ritchie B, um weitere Elemente und nannte sie Anfangs NB (new B). ● 1973 waren die Erweiterungen soweit gediehen, das er die stark verbesserte Sprache C nannte (Brian W. Kernighan hat ebenfalls maßgeblich dazu beigetragen). //Unix=25 PCs ● Bis 1974 war das gesamte Betriebssystem UNIX vollständig in C implementiert und wurde mit einem C-Compiler kostenfrei an verschiedene Universitäten verteilt. ● 1978 wurden bereits über 600 Computer mit dem UNIX-Betriebssystemen betrieben. ● Das aufblühende Zeitalter der Computerisierung der 70er Jahre war geprägt vom regen und freien Austausch von Programmen und dessen zugrunde liegenden Ideen. Sinnvoller Weise tauschte man diese als Quellcode untereinander aus. ● 1979 wurde von AT&T die letzte UNIX-Version 7, mit freiem Quellcode veröffentlicht. Andreas Klein ORR 2016 2 Am Anfang war der Quellcode (80er) ● 1980 – 1983 AT&T sowie zahlreiche andere Unternehmen beginnen mit der Kommerzialisierung von UNIX, durch Koppelung an stark beschränkenden Lizenzen und Geheimhaltung des zugrunde liegenden Quelltextes. ● Richard Stallman kündigt am 27. September 1983 in den Newsgroups net.unix-wizards und net.usoft das GNU-Projekt an. ● Am 5. Januar 1984 begann Stallman offiziell mit der Arbeit am GNU-Projekt, nachdem er seine Stelle am MIT gekündigt hatte.
    [Show full text]
  • Linux – Das Umfassende Handbuch 1.430 Seiten, Gebunden, Mit CD, 14
    Know-howWissen, wie’s für geht. Kreative. Leseprobe In dieser Leseprobe erhalten Sie einen Einstieg in die Linux-Welt und erfahren, wie Sie Audio und Video unter Linux nutzen. Dar- über hinaus lernen Sie die Kommandozentrale kennen: die Shell. Außerdem können Sie einen Blick in das vollständige Inhalts- und Stichwortverzeichnis des Buches werfen. »Was ist Linux?« »Installationsgrundlagen« »Audio und Video« »Die Shell« »Software- und Paketverwaltung« Inhaltsverzeichnis Index Der Autor Leseprobe weiterempfehlen Michael Kofler Linux – Das umfassende Handbuch 1.430 Seiten, gebunden, mit CD, 14. Auflage 2015 49,90 Euro, ISBN 978-3-8362-3775-8 www.rheinwerk-verlag.de/3855 “buch” — 2015/11/5 — 21:54 — page 25 — #19 1 Kapitel 1 Was ist Linux? Um die einleitende Frage zu beantworten, erkläre ich in diesem Kapitel zuerst einige wichtige Begriffe, die im gesamten Buch immer wieder verwendet werden: Betriebs- system, Unix, Distribution, Kernel etc. Ein knapper Überblick über die Merkmale von Linux und die verfügbaren Programme macht deutlich, wie weit die Anwendungs- möglichkeiten von Linux reichen. Es folgt ein kurzer Ausflug in die Geschichte von Linux: Sie erfahren, wie Linux entstanden ist und auf welchen Komponenten es basiert. Von zentraler Bedeutung ist dabei natürlich die General Public License (kurz GPL), die angibt, unter welchen Bedingungen Linux weitergegeben werden darf. Erst die GPL macht Linux zu einem freien System, wobei »frei« mehr heißt als einfach »kostenlos«. 1.1 Einführung Linux ist ein Unix-ähnliches Betriebssystem. Der wichtigste Unterschied gegenüber historischen Unix-Systemen besteht darin, dass Linux zusammen mit dem vollstän- digen Quellcode frei kopiert werden darf. Ein Betriebssystem ist ein Bündel von Programmen, mit denen die grundlegend- Betriebssystem sten Funktionen eines Rechners realisiert werden: die Schnittstelle zwischen Mensch und Maschine (also konkret: die Verwaltung von Tastatur, Bildschirm etc.) und die Verwaltung der Systemressourcen (CPU-Zeit, Speicher etc.).
    [Show full text]
  • Configuracion De Un Servidor Proxy Para Filtrado De Contenidos Web En Ubuntu Linux
    Configuracion de un Servidor Proxy para Filtrado de Contenidos Web en Ubuntu Linux ¿Qué es un Proxy? «Proxy» tiene un significado muy general y al mismo tiempo ambiguo, sinónimo del concepto de «Intermediario». Se suele traducir como delegado o apoderado. Un Servidor Intermediario (Proxy) se define como una computadora o dispositivo que ofrece un servicio de red que consiste en permitir a los clientes realizar conexiones de red indirectas hacia otros servicios de red. Durante el proceso ocurre lo siguiente: -Cliente se conecta hacia un Servidor Intermediario (Proxy). -Cliente solicita una conexión, fichero u otro recurso disponible en un servidor distinto. -Servidor Intermediario (Proxy) proporciona el recurso ya sea conectándose hacia el servidor especificado o sirviendo éste desde un caché. -En algunos casos el Servidor Intermediario (Proxy) puede alterar la solicitud del cliente o bien la respuesta del servidor para diversos propósitos. Los Servidores Intermediarios (Proxies) generalmente se hacen trabajar simultáneamente como muro cortafuegos operando en el Nivel de Red, actuando como filtro de paquetes, como en el caso de IPTABLES, o bien operando en el Nivel de Aplicación, controlando diversos servicios, como es el caso de TCP Wrapper. Dependiendo del contexto, el muro cortafuegos también se conoce como BPD o Border Protection Device o simplemente filtro de paquetes. Tipos de Proxy ● Proxy de web / Proxy cache de web ● Proxies transparentes ● Reverse Proxy ● Proxy NAT (Network Address Translation) / Enmascaramiento ● Proxy Abierto ¿Que es Squid? Squid es un programa de software libre que implementa un servidor proxy y un demonio para caché de páginas web. Está especialmente diseñado para ejecutarse bajo entornos tipo Unix.
    [Show full text]
  • SUSE Linux Enterprise Desktop 15 SP2 Administration Guide Administration Guide SUSE Linux Enterprise Desktop 15 SP2
    SUSE Linux Enterprise Desktop 15 SP2 Administration Guide Administration Guide SUSE Linux Enterprise Desktop 15 SP2 Covers system administration tasks like maintaining, monitoring and customizing an initially installed system. Publication Date: September 24, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see https://www.suse.com/company/legal/ . All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its aliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About This Guide xviii 1 Available Documentation xix 2 Giving Feedback xx 3 Documentation Conventions xxi 4 Product Life Cycle and Support xxii Support Statement for SUSE Linux Enterprise Desktop xxiii • Technology Previews xxiv I COMMON TASKS 1 1 Bash and Bash
    [Show full text]
  • Securing Debian Manual
    Securing Debian Manual Javier Fernández-Sanguino Peña <[email protected]> ‘Authors’ on this page Version: 3.13, Sun, 30 Jan 2011 19:58:16 +0000 Abstract This document describes security in the Debian project and in the Debian operating system. Starting with the process of securing and hardening the default Debian GNU/Linux distribu- tion installation, it also covers some of the common tasks to set up a secure network environ- ment using Debian GNU/Linux, gives additional information on the security tools available and talks about how security is enforced in Debian by the security and audit team. Copyright Notice Copyright © 2002-2007 Javier Fernández-Sanguino Peña Copyright © 2001 Alexander Reelsen, Javier Fernández-Sanguino Peña Copyright © 2000 Alexander Reelsen Some sections are copyright © their respective authors, for details please refer to ‘Credits and thanks!’ on page 28. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU General Public License, Version 2 (http://www.gnu.org/licenses/ old-licenses/gpl-2.0.html) or any later version (http://www.gnu.org/copyleft/ gpl.html) published by the Free Software Foundation. It is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY. Permission is granted to make and distribute verbatim copies of this document provided the copyright notice and this permission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this document under the conditions for verbatim copying, provided that the entire resulting derived work is distributed under the terms of a permission notice identical to this one.
    [Show full text]
  • Common Package and Patch Management for SUSE Linux
    ZYPP common package and patch management for SUSE Linux Duncan Mac-Vicar P. Software Engineer, YaST Agenda ZYPP • Package management • How was it done before • ZYPP • ZYPP features • What is new? • The future © March 9, 2007 Novell Inc. 2 Package management • Automatic resolving of dependencies • Automatic fetching of packages • Handling of different installation medias • Update system with latest software available. YaST pkg-manager, apt, smart... © March 9, 2007 Novell Inc. 3 Problems with old pkg-manager - Only knew about packages - Selections were handled by the YaST UI - Patches were handled by YOU Enterprise path: • ZenWorks used libredcarpet © March 9, 2007 Novell Inc. 4 ZYPP: Overview ZYPP • Abstract resolvables: • packages, patches, messages, scripts, selections, patterns, languages, system, etc. • Better solver • Modern extensible design • new targets, source types, resolvable types, capabilities © March 9, 2007 Novell Inc. 6 ZYPP solver Source (yum) Target (rpm) Source (DVD) Pool Target (modalias) Pool Target (storage) zypp YaST ZenWorks 7 Introducing Capabilities • Grouped in: • requires, conflicts, suggests, freshens, supplements, prerequires, obsoletes, etc • Are created from a resolvable kind, and a parseable string. • Most common case, a package, and a edition: • REQUIRES, package, “kdelibs > 3.2.1” • Crazy case: REQUIRES, system, “uptime:2 years” © March 9, 2007 Novell Inc. 8 Hardware capabilities Provides capabilities based on the running system, like hardware. system PROVIDES: modalias(pci:v0000104Cd0000840[01]sv*sd*bc*sc*i*) (at runtime!) wlan-kmp-default-1_2.6.16.11_4-13.i586.rpm SUPPLEMENTS: modalias(kernel-default:pci:v0000104Cd0000840[01]sv*sd*bc*sc*i*) modalias(kernel-default:pci:v0000104Cd00009066sv*sd*bc*sc*i*) modalias(kernel-default:pci:v000010B7d00006000sv*sd*bc*sc*i*) © March 9, 2007 Novell Inc.
    [Show full text]
  • Opensuse Leap 15.3 Start-Up Start-Up Opensuse Leap 15.3
    openSUSE Leap 15.3 Start-Up Start-Up openSUSE Leap 15.3 Publication Date: June 22, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see https://www.suse.com/company/legal/ . All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its aliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About this guide xi 1 Available documentation xi 2 Improving the documentation xii 3 Documentation conventions xiii 4 Source code xiv 5 Acknowledgments xiv I INSTALLATION 1 1 Installation Quick Start 2 1.1 Welcome to openSUSE Leap 2 Minimum system requirements 2 • Installing openSUSE Leap 2 2 Boot parameters 17 2.1 Using the default boot parameters 17 2.2 PC (AMD64/Intel 64/Arm AArch64) 17 The boot screen on machines equipped with traditional
    [Show full text]
  • Post-Hearing Comments on Exemption to Prohibition On
    1 UNITED STATES COPYRIGHT OFFICE Rulemaking on Exemptions from Prohibition on Circumvention of Technological Measures that Control Access to Copyrighted Works Docket No. RM 2002-4 RESPONSE TO WRITTEN QUESTIONS OF JUNE 5, 2003 of N2H2, INC., 8e6 Technologies, Bsafe Online Submitted by: David Burt June 30, 2003 N2H2, Inc. 900 4th Avenue, Suite 3600 Seattle, WA 98164 Tel: (206) 982-1130; Fax: (509) 271-4226 Email: [email protected] 2 The Question Posed by the Copyright Office 3 Problems with Narrowing the Exemption to Exclude "Security Suites" 5 First Amendment Concerns Expressed by Proponents are Misplaced 8 Concerns that CIPA Requires Schools and Libraries to Use "Closed Lists" are Misplaced 9 Opponents Do Not Believe the Record Justifies an Exemption 11 The Threats Posed by the Exemption are Real 18 Conclusion 19 Footnotes 20 3 The Question Posed by the Copyright Office On June 5th, 2003, the Copyright Office asked the opponents of the proposed exemption for "Compilations consisting of lists of websites blocked by filtering software applications" for our response to the following: Please clarify, as specifically as possible, the types of applications you believe should or should not be subject to an exception for the circumvention of access controls on filtering software lists, if such an exception is recommended. Please provide any documentation and/or citations that will support any of the factual assertions you make in answering these questions. The opponents of the exemption do not believe any exemption is justified because there is no supporting record to justify it. The opponents further believe that a narrowed exemption designed to exclude "security suite" applications that include lists of blocked websites would unfairly render the databases of some vendors of lists of blocked websites with protection and others without on an arbitrary basis.
    [Show full text]
  • Ipcop Linux Release 1.4.X Zum Kennenlernen
    IPcop Linux release 1.4.x zum Kennenlernen Bruno Hopp Jan. 2006 Linuxuser der Universität zu Köln: www.uni-koeln.de/themen/linux Warum ausgerechnet IPcop ?? Vorteile: recycling eines ausgedienten PC möglich. Bislang IPcop auf i386-i686 etabliert, IPcop für Alpha gibt es schon, für Sparc|Ultrasparc nicht geplant. Standardhardware (NIC) wird unterstützt: alle NIC-driver sind als Module ausgelegt. Interfaces: Modem: JA ISDN: JA Ethernet: JA GB-Ethernet: ist in Arbeit, z.Zt. nur einige wenige Adapter unterstützt. Dedizierter HW-router kann besser spezialisierte Auf- gaben (package filtering) erledigen als eine workstation, auf der "nebenher" noch nameserver (bind9), Samba und ein grafisches Interface laufen. Software ● bis release 1.3 auf RedHat Linux basierend, Installation ncurses-basiert ● Grundlegende Überarbeitung ab release 1.4.x LSB conform, Linux from Scratch, angepasste Smoothwall-Skripte ● aktuelle IPcop releases 1.4.9/1.4.10 mit Kernel 2.4.31, kernel 2.6.x in Planung ● iptables 1.4.1; OpenSSH 3.9p1; OpenSSL 0.9.7e-fips; Apache 1.3.33 (build oct.2005) Perl 5.8.5; GRUB 0.9.5; vim 6.3 IPcop basics ● unterliegt der GNU/GPL ● Routing: forwarding & NAT ● Was kann/soll ein Router neben dem reinen ¹Routingª noch tun? ● Package filtering: iptables ● Web traffic: Proxy Squid ± SquidGuard ± DansGuardian ± URL-filter ● Pop3/Imap: Copfilter u.a. ● Logging lokal oder via Log-server Voraussetzungen zur Installation Download des ca. 42 MB groûen iso-images von CD booten oder Startdiskette+ image von Webserver hda wird kpl neu formatiert mit ext3 (egal ob 500 MB oder 10 GB - Partitionierung nicht beeinflussbar) 486/DX2 mit 16 MB mindestens, 586 (Pentium1)+ 64 MB erlaubt normales Arbeiten - abhängig von Zahl der Requests, der Clients, der Addons etc.
    [Show full text]