ACC SHELL

Path : /usr/share/doc/manual/opensuse-manuals_en/manual/
File Upload :
Current File : //usr/share/doc/manual/opensuse-manuals_en/manual/part.local_security.html

<html><head><meta http-equiv="Content-Type" content="text/html; charset=ISO-8859-1"><title>Part II. Local Security</title><link rel="stylesheet" href="susebooks.css" type="text/css"><meta name="generator" content="DocBook XSL Stylesheets V1.75.2"><link rel="home" href="index.html" title="Documentation"><link rel="up" href="book.security.html" title="Security Guide"><link rel="prev" href="cha.security.fp.html" title="Chapter 7. Using the Fingerprint Reader"><link rel="next" href="cha.security.yast_security.html" title="Chapter 8. Configuring Security Settings with YaST"></head><body bgcolor="white" text="black" link="#0000FF" vlink="#840084" alink="#0000FF"><div class="navheader"><table width="100%" summary="Navigation header" border="0" class="bctable"><tr><td width="80%"><div class="breadcrumbs"><p><a href="index.html"> Documentation</a><span class="breadcrumbs-sep"> &gt; </span><a href="book.security.html">Security Guide</a><span class="breadcrumbs-sep"> &gt; </span><strong><a accesskey="p" title="Chapter 7. Using the Fingerprint Reader" href="cha.security.fp.html"><span>&#9664;</span></a>  <a accesskey="n" title="Chapter 8. Configuring Security Settings with YaST" href="cha.security.yast_security.html"><span>&#9654;</span></a></strong></p></div></td></tr></table></div><div class="part" title="Part II. Local Security"><div class="titlepage"><div><div><h1 class="title"><a name="part.local_security"></a>Part II. Local Security</h1></div></div></div><div class="toc"><p><b>Contents</b></p><dl><dt><span class="chapter"><a href="cha.security.yast_security.html">8. Configuring Security Settings with YaST</a></span></dt><dd><dl><dt><span class="sect1"><a href="cha.security.yast_security.html#sec.security.yast_security.overview">8.1. <span class="guimenu">Security Overview</span></a></span></dt><dt><span class="sect1"><a href="cha.security.yast_security.html#sec.security.yast_security.predefined_configs">8.2. <span class="guimenu">Predefined Security Configurations</span></a></span></dt><dt><span class="sect1"><a href="cha.security.yast_security.html#sec.security.yast_security.password">8.3. <span class="guimenu">Password Settings</span></a></span></dt><dt><span class="sect1"><a href="cha.security.yast_security.html#sec.security.yast_security.boot">8.4. Boot Settings</a></span></dt><dt><span class="sect1"><a href="cha.security.yast_security.html#sec.security.yast_security.login">8.5. Login Settings</a></span></dt><dt><span class="sect1"><a href="cha.security.yast_security.html#sec.security.yast_security.user">8.6. User Addition</a></span></dt><dt><span class="sect1"><a href="cha.security.yast_security.html#sec.security.yast_security.misc">8.7. Miscellaneous Settings</a></span></dt></dl></dd><dt><span class="chapter"><a href="cha.security.policykit.html">9. PolicyKit</a></span></dt><dd><dl><dt><span class="sect1"><a href="cha.security.policykit.html#sec.security.policykit.authorizations">9.1. Available Policies and Supported Applications</a></span></dt><dt><span class="sect1"><a href="cha.security.policykit.html#sec.security.policykit.types">9.2. Authorization Types</a></span></dt><dt><span class="sect1"><a href="cha.security.policykit.html#sec.security.policykit.change">9.3. Modifying and Setting Privileges</a></span></dt><dt><span class="sect1"><a href="cha.security.policykit.html#id583618">9.4. For more information</a></span></dt></dl></dd><dt><span class="chapter"><a href="cha.security.acls.html">10. Access Control Lists in Linux</a></span></dt><dd><dl><dt><span class="sect1"><a href="cha.security.acls.html#sec.security.acls.traditional">10.1. Traditional File Permissions</a></span></dt><dt><span class="sect1"><a href="cha.security.acls.html#sec.security.acls.intro">10.2. Advantages of ACLs</a></span></dt><dt><span class="sect1"><a href="cha.security.acls.html#sec.security.acls.defs">10.3. Definitions</a></span></dt><dt><span class="sect1"><a href="cha.security.acls.html#sec.security.acls.handle">10.4. Handling ACLs</a></span></dt><dt><span class="sect1"><a href="cha.security.acls.html#sec.security.acls.future">10.5. ACL Support in Applications</a></span></dt><dt><span class="sect1"><a href="cha.security.acls.html#sec.security.acls.info">10.6. For More Information</a></span></dt></dl></dd><dt><span class="chapter"><a href="cha.security.cryptofs.html">11. Encrypting Partitions and Files</a></span></dt><dd><dl><dt><span class="sect1"><a href="cha.security.cryptofs.html#sec.security.cryptofs.y2">11.1. Setting Up an Encrypted File System with YaST</a></span></dt><dt><span class="sect1"><a href="cha.security.cryptofs.html#sec.security.cryptofs.y2.homes">11.2. Using Encrypted Home Directories</a></span></dt><dt><span class="sect1"><a href="cha.security.cryptofs.html#sec.security.cryptofs.vi">11.3. Using vi to Encrypt Single ASCII Text Files</a></span></dt></dl></dd><dt><span class="chapter"><a href="cha.aide.html">12. Intrusion Detection with AIDE</a></span></dt><dd><dl><dt><span class="sect1"><a href="cha.aide.html#sec.aide.why">12.1. Why Using AIDE?</a></span></dt><dt><span class="sect1"><a href="cha.aide.html#sec.aide.setup">12.2. Setting Up an AIDE Database</a></span></dt><dt><span class="sect1"><a href="cha.aide.html#sec.aide.check">12.3. Local AIDE Checks</a></span></dt><dt><span class="sect1"><a href="cha.aide.html#sec.aide.independent">12.4. System Independent Checking</a></span></dt><dt><span class="sect1"><a href="cha.aide.html#sec.aide.more">12.5. For More Information</a></span></dt></dl></dd></dl></div></div><div class="navfooter"><table width="100%" summary="Navigation footer" border="0" class="bctable"><tr><td width="80%"><div class="breadcrumbs"><p><a href="index.html"> Documentation</a><span class="breadcrumbs-sep"> &gt; </span><a href="book.security.html">Security Guide</a><span class="breadcrumbs-sep"> &gt; </span><strong><a accesskey="p" title="Chapter 7. Using the Fingerprint Reader" href="cha.security.fp.html"><span>&#9664;</span></a>  <a accesskey="n" title="Chapter 8. Configuring Security Settings with YaST" href="cha.security.yast_security.html"><span>&#9654;</span></a></strong></p></div></td></tr></table></div></body></html>

ACC SHELL 2018