Additional Documentation
    Documentation Conventions
    About the Making of This Manual
    Source Code
    Advanced Deployment Scenarios
      Remote Installation
        Installation Scenarios for Remote Installation
        Setting Up the Server Holding the Installation Sources
        Preparing the Boot of the Target System
        Booting the Target System for Installation
        Monitoring the Installation Process
      Advanced Disk Setup
        Using the YaST Partitioner
        LVM Configuration
        Soft RAID Configuration
      Online Update
        YaST Online Update
        Update from the Command Line with zypper
      YaST in Text Mode
        Navigation in Modules
        Restriction of Key Combinations
        YaST Command Line Options
      Updating the System and System Changes
        Updating the System
        Software Changes from Version to Version
      RPM—the Package Manager
        Verifying Package Authenticity
        Managing Packages: Install, Update, and Uninstall
        RPM and Patches
        Delta RPM Packages
        RPM Queries
        Installing and Compiling Source Packages
        Compiling RPM Packages with build
        Tools for RPM Archives and the RPM Database
      Printer Operation
        The Workflow of the Printing System
        Methods and Protocols for Connecting Printers
        Installing the Software
        Network Printers
        Graphical Printing Interfaces
        Printing from the Command Line
        Special Features in openSUSE
      The X Window System
        Manually Configuring the X Window System
        Installing and Configuring Fonts
        For More Information
      Xen Virtualization
        Basic Components
        Setting Up a Virtual Machine Host
        Setting Up Virtual Machines
        Managing a Virtualization Environment
      System Monitoring Utilities
        Files and File Systems
        Hardware Information
        The /proc File System
        System Information
        User Information
        Time and Date
      32-Bit and 64-Bit Applications in a 64-Bit System Environment
        Runtime Support
        Software Development
        Software Compilation on Biarch Platforms
        Kernel Specifications
      Booting and Configuring a Linux System
        The Linux Boot Process
        The init Process
        System Configuration via /etc/sysconfig
      The Boot Loader
        Selecting a Boot Loader
        Booting with GRUB
        Configuring the Boot Loader with YaST
        Uninstalling the Linux Boot Loader
        Creating Boot CDs
        The Graphical SUSE Screen
        For More Information
      Special System Features
        Information about Special Software Packages
        Virtual Consoles
        Keyboard Mapping
        Language and Country-Specific Settings
      Dynamic Kernel Device Management with udev
        The /dev Directory
        Kernel uevents and udev
        Drivers, Kernel Modules, and Devices
        Booting and Initial Device Setup
        Monitoring the Running udev Daemon
        Influencing Kernel Device Event Handling with udev Rules
        Persistent Device Naming
        Files used by udev
        For More Information
      File Systems in Linux
        Major File Systems in Linux
        Some Other Supported File Systems
        Large File Support in Linux
        For More Information
      Access Control Lists in Linux
        Traditional File Permissions
        Advantages of ACLs
        Handling ACLs
        ACL Support in Applications
        For More Information
      Authentication with PAM
        Structure of a PAM Configuration File
        The PAM Configuration of sshd
        Configuring PAM Using pam-config
        For More Information
      Working with the Shell
        Using the Bash Shell
        Users and Access Permissions
        Important Linux Commands
        The vi Editor
      Basic Networking
        IP Addresses and Routing
        IPv6—The Next Generation Internet
        Name Resolution
        Configuring a Network Connection with YaST
        Configuring a Network Connection Manually
        smpppd as Dial-up Assistant
      SLP Services in the Network
        Activating SLP
        SLP Front-Ends in openSUSE
        Installation over SLP
        Providing Services via SLP
        For More Information
      The Domain Name System
        DNS Terminology
        Configuration with YaST
        Starting the Name Server BIND
        The Configuration File /etc/named.conf
        Zone Files
        Dynamic Update of Zone Data
        Secure Transactions
        DNS Security
        For More Information
        Configuring a DHCP Server with YaST
        DHCP Software Packages
        The DHCP Server dhcpd
        For More Information
      Time Synchronization with NTP
        Configuring an NTP Client with YaST
        Configuring xntp in the Network
        Setting Up a Local Reference Clock
      Using NIS
        Configuring NIS Servers
        Configuring NIS Clients
      LDAP—A Directory Service
        LDAP versus NIS
        Structure of an LDAP Directory Tree
        Configuring an LDAP Server with YaST
        Configuring an LDAP Client with YaST
        Configuring LDAP Users and Groups in YaST
        Browsing the LDAP Directory Tree
        Manually Configuring an LDAP Server
        Manually Administering LDAP Data
        For More Information
      Active Directory Support
        Integrating Linux and AD Environments
        Background Information for Linux AD Support
        Configuring a Linux Client for Active Directory
        Logging In to an AD Domain
        Changing Passwords
      Sharing File Systems with NFS
        NFS Client Configuration
        Exporting File Systems over NFS
        Exporting File Systems Manually
        NFS with Kerberos
        For More Information
        Installing a Samba Server
        Starting and Stopping Samba
        Configuring a Samba Server
        Configuring Clients
        Samba as Login Server
        For More Information
      The Apache HTTP Server
        Quick Start
        Configuring Apache
        Starting and Stopping Apache
        Installing, Activating, and Configuring Modules
        Getting CGI Scripts to Work
        Setting Up a Secure Web Server with SSL
        Avoiding Security Problems
        For More Information
      Setting up a FTP server with YaST
        Starting the FTP server
        FTP General Settings
        FTP Performance Settings
        Expert Settings
        For more information
      Power Management
        Power Saving Functions
        Rest for the Hard Disk
        The powersave Package
      Wireless Communication
        Wireless LAN
        Infrared Data Transmission
      Using Tablet PCs
        Installing Tablet PC Packages
        Configuring Your Tablet Device
        Using the Virtual Keyboard
        Rotating Your Display
        Using Gesture Recognition
        Taking Notes and Sketching with the Pen
        For More Information
      Masquerading and Firewalls
        Packet Filtering with iptables
        Masquerading Basics
        Firewalling Basics
        For More Information
      SSH—Secure Network Operations
        The OpenSSH Package
        The ssh Program
        scp—Secure Copy
        sftp—Secure File Transfer
        The SSH Daemon (sshd)—Server-Side
        SSH Authentication Mechanisms
        X, Authentication, and Forwarding Mechanisms
        Configuring An SSH Daemon with YaST
      Managing X.509 Certification
        The Principles of Digital Certification
        YaST Modules for CA Management
      Network Authentication—Kerberos
        Kerberos Terminology
        How Kerberos Works
        Users' View of Kerberos
        For More Information
      Installing and Administering Kerberos
        Kerberos Network Topology
        Choosing the Kerberos Realms
        Setting Up the KDC Hardware
        Configuring Time Synchronization
        Configuring the KDC
        Configuring Kerberos Clients
        Configuring Remote Kerberos Administration
        Creating Kerberos Service Principals
        Enabling PAM Support for Kerberos
        Configuring SSH for Kerberos Authentication
        Using LDAP and Kerberos
      Encrypting Partitions and Files
        Setting Up an Encrypted File System with YaST
        Using Encrypted Home Directories
        Using vi to Encrypt Single Files
      Confining Privileges with AppArmor
        Installing Novell AppArmor
        Enabling and Disabling Novell AppArmor
        Getting Started with Profiling Applications
      Security and Confidentiality
        Local Security and Network Security
        Some General Security Tips and Tricks
        Using the Central Security Reporting Address
    An Example Network
    GNU Licenses
      GNU General Public License
      GNU Free Documentation License