Tips and tricks for Linux
Select your language:
Where would you like to go?
Table of contents
Home
Linux for beginners
Introduction
Installation
The beginning...
Partitioning the harddisk
The passwords
Choosing the packages
First steps
Booting the first time
Exploring KDE
The KDE Control Center: This is how you configure KDE
Dolphin
The command line
Access to the WWW
E-mail & co.
The command center: YaST
The system administrator
The superuser: Omnipotence means responsibility!
Better be safe than sorry!
Things that no superuser should ever do
Superuser on the fly: sudo
Installation of hardware
New hardware – now what?
The graphics adapter
Harddisks and other storage media
DVD-ROM and Blu-ray
Network cards
WLAN adapters
Printers
Scanners
Bluetooth
ISDN cards and modems
TV and radio cards
PCMCIA / CardBus
Webcams
Installing and uninstalling programs
Something's missing?
To get an overview
The powerful: RPM
The easy way: YaST
On the fly: zypper
Finding programs
Installing programs
Add alternate installation sources
Uninstalling programs
Linux in a network
Network basics
Single-position system on the Internet
Computer in a local network
SuSEfirewall2
Protective barrier for your computer
Basics
Lock down the bulkheads!
The shielded network
Security zones
Access controls
Tightened security measures
Special cases
Special protective measures for particular services
All variables explained
Special: Publicly accessible servers
Special: Integrating black lists
Domain Name Service
The internal name table
Setting up a name server
Manage your own domains
Additional name servers
Multiple levels of name servers
Special: Publicly accessible name servers
Routing
The direction sign of the Internet
The static routing table
Dynamic routing
Firewall and routing
IPv6
StrongSwan
The Internet – Data on show
Countermeasures
Preparations
Setting up the cerificate management
Configuring StrongSwan
An overview on ipsec.conf
Authentication with certificates
Authentication with pre-shared keys
Authentication based on user name and password
Authentication against a RADIUS server
IPsec between two hosts with certificates
Safe passage across dangerous ground
Securely cross-linked
Problematic cases
SELinux
I thought that Linux already had security measures...?
The sense of all this
Preparations
Activating SElinux
Tools and helpers
Help, SElinux is going nuts!
Getting to the problem's core
Establishing one's own policies
Xen
A computer within a computer? Why this?
Application scenarios
Preparations
Watch out with external servers!
Fully virtualized or paravirtualized?
Setting up a virtual machine
Setting up a virtual network
Passing through hardware
Problems and incompatibilities
Linux domU
Types of installation
Accessing the virtual hardware
The paravirtual interfaces
The virtual graphics card
Virtual graphics card or XDMCP?
Windows domU
Unfortunaltely only full virtualization...
Installation of the system
What about the paravirtual interfaces?
The virtual graphics card
The virtual console
Bag of tricks
Securing SSH done right!
Discreet access with knockd
Setting up a wireless Access Point
Working on remote desktops – with XDMCP
Properly dealing with inaccurate time
Properly setting up an NFS
Partitions in a partition
Help, Linux is going nuts!
Group 1: Linux doesn't want to boot
Group 1-a: Installation pitfalls
Group 1-b: Resolve boot complicacies
Group 1-c: Decluttering the system
Group 2: The graphical interface is on strike
Group 3: Networking pitfalls
Group 3-a: ifup/ifdown tuned up
Group 3-b: Make NetworkManager get a move
Group 3-c: Dealing with wicked
Group 4: When programs go nuts
Group 4-a: RPM is causing trouble
Group 4-b: polkitd refuses its cooperation
Group 5: Cryptic messages explained
Glossary
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
© 2013 - 2019 by Olaf Martens
Imprint
Privacy Policy
Nonliability statement
Block my IP address
News
Contact
Guest book
Forum
Services
RSA keys for SSH
Request for SSL certificate
Resolve domain name
Define a virtual machine
Fingerprints of certificates
Sanitize defective HTML
FAQ
Sitemap
Support