Red Hat Enterprise Linux 4 Reference Guide

Total Page:16

File Type:pdf, Size:1020Kb

Red Hat Enterprise Linux 4 Reference Guide Red Hat Enterprise Linux 4 Reference Guide Red Hat Enterprise Linux 4: Reference Guide Copyright © 2005 Red Hat, Inc. Red Hat, Inc. 1801 Varsity Drive Raleigh NC 27606-2072 USA Phone: +1 919 754 3700 Phone: 888 733 4281 Fax: +1 919 754 3701 PO Box 13588 Research Triangle Park NC 27709 USA rhel-rg(EN)-4-Print-RHI (2004-09-30T17:13) Copyright © 2005 by Red Hat, Inc. This material may be distributed only subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version is presently available at http://www.opencontent.org/openpub/). Distribution of substantively modified versions of this document is prohibited without the explicit permission of the copyright holder. Distribution of the work or derivative of the work in any standard (paper) book form for commercial purposes is prohibited unless prior permission is obtained from the copyright holder. Red Hat and the Red Hat "Shadow Man" logo are registered trademarks of Red Hat, Inc. in the United States and other countries. All other trademarks referenced herein are the property of their respective owners. The GPG fingerprint of the [email protected] key is: CA 20 86 86 2B D6 9D FC 65 F6 EC C4 21 91 80 CD DB 42 A6 0E Table of Contents Introduction.......................................................................................................................................... i 1. Changes To This Manual ....................................................................................................... i 2. Architecture-specific Information ......................................................................................... ii 3. Finding Appropriate Documentation .................................................................................... ii 3.1. Documentation For First-Time Linux Users.......................................................... ii 3.2. For the More Experienced .................................................................................... iv 3.3. Documentation for Linux Gurus........................................................................... iv 4. Document Conventions ........................................................................................................ iv 5. Activate Your Subscription ................................................................................................. vii 5.1. Provide a Red Hat Login...................................................................................... vii 5.2. Provide Your Subscription Number ....................................................................viii 5.3. Connect Your System.......................................................................................... viii 6. Using the Mouse ................................................................................................................ viii 7. Copying and Pasting Text With X...................................................................................... viii 8. More to Come .................................................................................................................... viii 8.1. We Need Feedback! .............................................................................................. ix I. System Reference.............................................................................................................................. i 1. Boot Process, Init, and Shutdown ......................................................................................... 1 1.1. The Boot Process ................................................................................................... 1 1.2. A Detailed Look at the Boot Process..................................................................... 1 1.3. Running Additional Programs at Boot Time ......................................................... 6 1.4. SysV Init Runlevels ............................................................................................... 6 1.5. Shutting Down ....................................................................................................... 8 2. The GRUB Boot Loader ....................................................................................................... 9 2.1. Boot Loaders and System Architecture ................................................................. 9 2.2. GRUB..................................................................................................................... 9 2.3. Installing GRUB .................................................................................................. 10 2.4. GRUB Terminology ............................................................................................. 11 2.5. GRUB Interfaces .................................................................................................. 13 2.6. GRUB Commands ............................................................................................... 14 2.7. GRUB Menu Configuration File.......................................................................... 15 2.8. Changing Runlevels at Boot Time ....................................................................... 17 2.9. Additional Resources ........................................................................................... 17 3. File System Structure.......................................................................................................... 19 3.1. Why Share a Common Structure?........................................................................ 19 3.2. Overview of File System Hierarchy Standard (FHS) .......................................... 19 3.3. Special File Locations Under Red Hat Enterprise Linux..................................... 24 4. The sysconfig Directory.................................................................................................. 27 4.1. Files in the /etc/sysconfig/ Directory .......................................................... 27 4.2. Directories in the /etc/sysconfig/ Directory ................................................ 40 4.3. Additional Resources ........................................................................................... 40 5. The proc File System......................................................................................................... 41 5.1. A Virtual File System........................................................................................... 41 5.2. Top-level Files within the proc File System ....................................................... 42 5.3. Directories within /proc/................................................................................... 58 5.4. Using the sysctl Command .............................................................................. 75 5.5. Additional Resources ........................................................................................... 76 6. Users and Groups................................................................................................................ 77 6.1. User and Group Management Tools .................................................................... 77 6.2. Standard Users ..................................................................................................... 77 6.3. Standard Groups................................................................................................... 79 6.4. User Private Groups ............................................................................................. 81 6.5. Shadow Passwords............................................................................................... 82 6.6. Additional Resources ........................................................................................... 83 7. The X Window System ....................................................................................................... 85 7.1. The X11R6.8 Release .......................................................................................... 85 7.2. Desktop Environments and Window Managers ................................................... 86 7.3. X Server Configuration Files ............................................................................... 87 7.4. Fonts..................................................................................................................... 93 7.5. Runlevels and X ................................................................................................... 96 7.6. Additional Resources ........................................................................................... 97 II. Network Services Reference........................................................................................................ 99 8. Network Interfaces ............................................................................................................ 101 8.1. Network Configuration Files.............................................................................. 101 8.2. Interface Configuration Files ............................................................................. 102 8.3. Interface Control Scripts .................................................................................... 108 8.4. Network Function Files...................................................................................... 110 8.5. Additional Resources ......................................................................................... 110 9. Network File System (NFS).............................................................................................
Recommended publications
  • 10(+&'06+#. '37+4'& Vt8363a
    www.DataSheet4U.com 查询VT8363A供应商 捷多邦,专业PCB打样工厂,24小时加急出货 9,$ 7HFKQRORJLHV 'HOLYHULQJ 9DOXH 97$ .7$$WKORQ1RUWK%ULGJH 6LQJOH&KLS1RUWK%ULGJH IRU6RFNHW$%DVHG$WKORQ&38V ZLWK0+])URQW6LGH%XV IRU'HVNWRS3&6\VWHPV ZLWK$*3[DQG3&, SOXV$GYDQFHG0HPRU\&RQWUROOHU10(+&'06+#. VXSSRUWLQJ3&3&6'5$0 9&0'37+4'& 3UHOLPLQDU\5HYLVLRQ 2FWREHU 9,$7(&+12/2*,(6,1& &RS\ULJKW1RWLFH &RS\ULJKW 9,$ 7HFKQRORJLHV ,QFRUSRUDWHG 3ULQWHG LQ WKH 8QLWHG 6WDWHV $ // 5,*+76 5(6(59(' 1R SDUW RI WKLV GRFXPHQW PD\ EH UHSURGXFHG WUDQVPLWWHG WUDQVFULEHG VWRUHG LQ D UHWULHYDO V\VWHP RU WUDQVODWHG LQWR DQ\ ODQJXDJH LQ DQ\ IRUP RU E\ DQ\ PHDQV HOHFWURQLF PHFKDQLFDO PDJQHWLF RSWLFDO FKHPLFDO PDQXDO RU RWKHUZLVH ZLWKRXW WKH SULRU ZULWWHQ SHUPLVVLRQ RI 9,$ 7HFKQRORJLHV ,QFRUSRUDWHG 97& 97&% 97& 97& 97& 97&$ 97&% 97& 97& 97&093 97 97& 97& 97&$ 97& 97& 97& 97& 97&$ 97& 97&$ 97&; 97 97 97 97 97 97 0RELOH 6RXWK 6XSHU 6RXWK $SROOR 93 $SROOR 93; $SROOR 93 $SROOR 93 $SROOR 093 $SROOR 093 $SROOR 3 $SROOR 3UR $SROOR 3UR3OXV $SROOR 3UR $SROOR 3UR$ $SROOR 3UR0HGLD $SROOR 3UR6DYDJH .; .0 DQG .7 PD\ RQO\ EH XVHG WR LGHQWLI\ SURGXFWV RI 9,$ 7HFKQRORJLHV &\UL[; LV D UHJLVWHUHG WUDGHPDUN RI 9,$ 7HFKQRORJLHV 70 $0'. $0'. $0'. DQG $WKORQ DUH UHJLVWHUHG WUDGHPDUNV RI $GYDQFHG 0LFUR 'HYLFHV &HOHURQ 3HQWLXP 3HQWLXP,, 3HQWLXP,,, 00; DQG ,QWHO DUH UHJLVWHUHG WUDGHPDUNV RI ,QWHO &RUS 36 LV D UHJLVWHUHG WUDGHPDUN RI ,QWHUQDWLRQDO %XVLQHVV 0DFKLQHV &RUS :LQGRZV :LQGRZV DQG 3OXJ DQG 3OD\ DUH UHJLVWHUHG WUDGHPDUNV RI 0LFURVRIW &RUS 3&, LV D UHJLVWHUHG WUDGHPDUN RI WKH 3&, 6SHFLDO ,QWHUHVW *URXS 9(6$ LV
    [Show full text]
  • Version 7.8-Systemd
    Linux From Scratch Version 7.8-systemd Created by Gerard Beekmans Edited by Douglas R. Reno Linux From Scratch: Version 7.8-systemd by Created by Gerard Beekmans and Edited by Douglas R. Reno Copyright © 1999-2015 Gerard Beekmans Copyright © 1999-2015, Gerard Beekmans All rights reserved. This book is licensed under a Creative Commons License. Computer instructions may be extracted from the book under the MIT License. Linux® is a registered trademark of Linus Torvalds. Linux From Scratch - Version 7.8-systemd Table of Contents Preface .......................................................................................................................................................................... vii i. Foreword ............................................................................................................................................................. vii ii. Audience ............................................................................................................................................................ vii iii. LFS Target Architectures ................................................................................................................................ viii iv. LFS and Standards ............................................................................................................................................ ix v. Rationale for Packages in the Book .................................................................................................................... x vi. Prerequisites
    [Show full text]
  • Pluggable Authentication Modules
    Who this book is written for This book is for experienced system administrators and developers working with multiple Linux/UNIX servers or with both UNIX and Pluggable Authentication Windows servers. It assumes a good level of admin knowledge, and that developers are competent in C development on UNIX-based systems. Pluggable Authentication Modules PAM (Pluggable Authentication Modules) is a modular and flexible authentication management layer that sits between Linux applications and the native underlying authentication system. The PAM framework is widely used by most Linux distributions for authentication purposes. Modules Originating from Solaris 2.6 ten years ago, PAM is used today by most proprietary and free UNIX operating systems including GNU/Linux, FreeBSD, and Solaris, following both the design concept and the practical details. PAM is thus a unifying technology for authentication mechanisms in UNIX. This book provides a practical approach to UNIX/Linux authentication. The design principles are thoroughly explained, then illustrated through the examination of popular modules. It is intended as a one-stop introduction and reference to PAM. What you will learn from this book From Technologies to Solutions • Install, compile, and configure Linux-PAM on your system • Download and compile third-party modules • Understand the PAM framework and how it works • Learn to work with PAM’s management groups and control fl ags • Test and debug your PAM confi guration Pluggable Authentication Modules • Install and configure the pamtester utility
    [Show full text]
  • Download Soltek-Mb-SL-54T5
    Notice to End Users This UserÕs Guide & Technical Reference is for assisting system manufacturers and end users in setting up and installing the mainboard. Every effort has been made to ensure that the information in this manual is accurate. Soltek Computer Inc. is not responsible for printing or clerical errors. Information in this document is subject to change without notice and does not represent a commitment on the part of Soltek Computer Inc. No part of this manual may be reproduced, transmitted, translated into any language in any form or by any means, electronic or mechanical, including photocopying and recording, for any purpose without the express written permission of Soltek Computer Inc. Companies and products mentioned in this manual are for identification purposes only. Product names appearing in this manual may or may not be registered trademarks or copyrights of their respective companies. SOLTEK COMPUTER INC. PROVIDES THIS MANUAL ÒAS ISÓ WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OR CONDITIONS OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT SHALL SOLTEK COMPUTER INC. BE LIABLE FOR ANY LOSS OR PROFITS, LOSS OF BUSINESS, LOSS OF USE OR DATA, INTERRUPTION OF BUSINESS, OR FOR INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES OF ANY KIND, EVEN IF SOLTEK COMPUTER INC. HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES ARISING FROM ANY DEFECT OR ERROR IN THIS MANUAL OR PRODUCT. © Copyright 1998 Soltek Computer Inc. All right reserved Web
    [Show full text]
  • Security Guide
    Fedora 19 Security Guide A Guide to Securing Fedora Linux Johnray Fuller John Ha David O'Brien Scott Radvan Eric Christensen Adam Ligas Murray McAllister Scott Radvan Daniel Walsh Security Guide Dominick Grift Eric Paris James Morris Fedora 19 Security Guide A Guide to Securing Fedora Linux Edition 19.1 Author Johnray Fuller [email protected] Author John Ha [email protected] Author David O'Brien [email protected] Author Scott Radvan [email protected] Author Eric Christensen [email protected] Author Adam Ligas [email protected] Author Murray McAllister [email protected] Author Scott Radvan [email protected] Author Daniel Walsh [email protected] Author Dominick Grift [email protected] Author Eric Paris [email protected] Author James Morris [email protected] Copyright © 2007-2013 Fedora Project Contributors. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
    [Show full text]
  • SUSE Linux Enterprise Server 15 SP2 Security and Hardening Guide Security and Hardening Guide SUSE Linux Enterprise Server 15 SP2
    SUSE Linux Enterprise Server 15 SP2 Security and Hardening Guide Security and Hardening Guide SUSE Linux Enterprise Server 15 SP2 Introduces basic concepts of system security, covering both local and network security aspects. Shows how to use the product inherent security software like AppArmor, SELinux, or the auditing system that reliably collects information about any security-relevant events. Supports the administrator with security-related choices and decisions in installing and setting up a secure SUSE Linux Enterprise Server and additional processes to further secure and harden that installation. Publication Date: September 24, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see https://www.suse.com/company/legal/ . All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its aliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its
    [Show full text]
  • Design Guide VT82C694X Apollo Pro133a with VT82C686A South Bridge
    Design Guide VT82C694X Apollo Pro133A with VT82C686A South Bridge Preliminary Revision 0.5 November 19, 1999 VIA TECHNOLOGIES, INC. Copyright Notice: Copyright © 1999 VIA Technologies Incorporated. Printed in the United States. ALL RIGHTS RESERVED. No part of this document may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language, in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual or otherwise without the prior written permission of VIA Technologies Incorporated. VT82C585, VT82C586B, VT82C587, VT82C590, VT82C595, VT82C596B, VT82C597, VT82C598, VT82C680, VT82C685, VT82C686B, VT82687, VT82C691, VT82C693, VT82C693A, VT82C694, VT82C694X, VT8501, VT8601, Super South, Apollo VP, Apollo VPX, Apollo VP2, Apollo VP3, Apollo MVP3, Apollo MVP4, Apollo P6, Apollo Pro, Apollo Pro133, Apollo Pro 133A, and Apollo ProMedia may only be used to identify products of VIA Technologies. PS/2TM is a registered trademark of International Business Machines Corp. PentiumTM , P54CTM, P55CTM, and MMXTM are registered trademarks of Intel Corp. TM Cyrix6X86 is a registered trademark of Cyrix Corp. TM TM TM TM AMD Athlon , AMD6K86 , AMD-K6 , and AMD-K6-2 are registered trademarks of Advanced Micro Devices Corp. Windows 95TM and Plug and PlayTM are registered trademarks of Microsoft Corp. PCITM is a registered trademark of the PCI Special Interest Group. All trademarks are the properties of their respective owners. Disclaimer Notice: No license is granted, implied or otherwise, under any patent or patent rights of VIA Technologies. VIA Technologies makes no warranties, implied or otherwise, in regard to this document and to the products described in this document. The information provided by this document is believed to be accurate and reliable to the publication date of this document.
    [Show full text]
  • Guide to the Secure Configuration of Red Hat Enterprise Linux 5
    Guide to the Secure Configuration of Red Hat Enterprise Linux 5 Revision 4.2 August 26, 2011 Operating Systems Division Unix Team of the Systems and Network Analysis Center National Security Agency 9800 Savage Rd. Suite 6704 Ft. Meade, MD 20755-6704 2 Warnings Do not attempt to implement any of the recommendations in this guide without first testing in a non- production environment. This document is only a guide containing recommended security settings. It is not meant to replace well- structured policy or sound judgment. Furthermore this guide does not address site-specific configuration concerns. Care must be taken when implementing this guide to address local operational and policy concerns. The security changes described in this document apply only to Red Hat Enterprise Linux 5. They may not translate gracefully to other operating systems. Internet addresses referenced were valid as of 1 Dec 2009. Trademark Information Red Hat is a registered trademark of Red Hat, Inc. Any other trademarks referenced herein are the property of their respective owners. Change Log Revision 4.2 is an update of Revision 4.1 dated February 28, 2011. Added section 2.5.3.1.3, Disable Functionality of IPv6 Kernel Module Through Option. Added discussion to section 2.5.3.1.1, Disable Automatic Loading of IPv6 Kernel Module, indicating that this is no longer the preferred method for disabling IPv6. Added section 2.3.1.9, Set Accounts to Disable After Password Expiration. Revision 4.1 is an update of Revision 4 dated September 14, 2010. Added section 2.2.2.6, Disable All GNOME Thumbnailers if Possible.
    [Show full text]
  • Security Guide Security Guide SUSE Linux Enterprise Server 12 SP4
    SUSE Linux Enterprise Server 12 SP4 Security Guide Security Guide SUSE Linux Enterprise Server 12 SP4 Introduces basic concepts of system security, covering both local and network security aspects. Shows how to use the product inherent security software like AppArmor or the auditing system that reliably collects information about any security-relevant events. Publication Date: September 24, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see https://www.suse.com/company/legal/ . All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its aliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About This Guide xvi 1 Available Documentation xvi 2 Giving Feedback xviii 3 Documentation Conventions xviii 4 Product Life Cycle
    [Show full text]
  • Integrationofscientificandenginee
    Integraton of scientfc and engineering applicatons into CERN’s computng resources Markus Jylhänkangas Bachelor’s thesis May 2019 Informaton and communicaton technology Degree Programme in Sofware Engineering Description Author(s) Type of publication Date Jylhänkangas, Markus Bachelor’s thesis May 2019 Language of publication: English Number of pages Permission for web publi- 47 cation: x Title of publication Integration of scientific and engineering applications into CERN’s computing resources Degree programme Software Engineering Supervisor(s) Kokkonen, Tero Rantonen, Mika Assigned by CERN Abstract Following CERN’s strategy to consolidate all computing resources under Linux, it was planned to move the Windows HPC service to Linux-based infrastructure. The scientific and engineering applications that were running under Windows HPC were therefore assigned to be migrated to Linux HPC and HTC environments. The main objective is the migration of engineering applications to Linux-based computing resources. The first objective for the migration was to design a strategy to carry out the mi- gration by identifying potential risks and select target service HPC or HTC, to make efficient use of resources. Second objective was to implement templates, plugins and necessary changes to the HTC and HPC infrastructure. Migration was also going to be tested and vali- dates with users. The migration was implemented by first installing the applications on the Linux resources. Template script were written to submit applications to HPC or HTC. Modification to HPC were made with Puppet to make it possible to run the applications As a result, the applications were migrated to either HPC or HTC resources and the Win- dows HPC was deprecated.
    [Show full text]
  • Sis Accelerated Graphic Port Driver
    Sis accelerated graphic port driver Click on the following links for the driver package readme info: /AGP/ This package supports the following driver models:SiS Accelerated Graphics. This package supports the following driver models:SiS Accelerated Graphics Port. Download the latest drivers for your SiS Accelerated Graphics Port to keep your Computer up-to-date. Update your computer's drivers using DriverMax, the free driver update tool - Chipset - Silicon Integrated Systems - SiS Accelerated Graphics Port Computer. SiS Accelerated Graphics Port Free Driver Download for Windows XP - World's most popular driver download site. SiS Accelerated Graphics Port Free Driver Download for Windows , XP, , NT4, ME, 98SE, 98, 95 - uvga3_zip. World's most popular driver. SiS Accelerated Graphics Port Free Driver Download for Windows , XP, , NT4, ME, 98SE, 98, 95 - World's most popular driver download. This page contains the driver installation download for SiS Accelerated Graphics Port in supported models (Positivo Mobile) that are running a supported. Windows device driver information for SiS Accelerated Graphics Port. The SiS Accelerated Graphics Port, otherwise called the Advanced Graphics Port, is a. Sis Accelerated Graphics Port Driver for Windows 7 32 bit, Windows 7 64 bit, Windows 10, 8, XP. Uploaded on 4/15/, downloaded times, receiving a. SiS Accelerated Graphics Port driver was found and is available for download at Download driver for SiS Mirage Graphics, SiS Accelerated Graphics Port, SIS Processor AGP Controller, XPx File Information Released By: ANOTE. SiS Accelerated Graphics Port - Driver Download. Updating your drivers with Driver Alert can help your computer in a number of ways. From adding new.
    [Show full text]
  • Security and Hardening Guide Security and Hardening Guide SUSE Linux Enterprise Server 15 SP1
    SUSE Linux Enterprise Server 15 SP1 Security and Hardening Guide Security and Hardening Guide SUSE Linux Enterprise Server 15 SP1 Introduces basic concepts of system security, covering both local and network security aspects. Shows how to use the product inherent security software like AppArmor, SELinux, or the auditing system that reliably collects information about any security-relevant events. Supports the administrator with security-related choices and decisions in installing and setting up a secure SUSE Linux Enterprise Server and additional processes to further secure and harden that installation. Publication Date: September 24, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see https://www.suse.com/company/legal/ . All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its aliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its
    [Show full text]