getent passwd username1 [username2 ...]Lookup database entry for an existing group:
getent group groupname1 [groupname2 ...]
getent passwd username1 [username2 ...]Lookup database entry for an existing group:
getent group groupname1 [groupname2 ...]
lsb_release -i -dor
lsb_release -a
xephyr -query localhost -screen 1280x1024 :1Got a blank screen for my efforts. Grrrr... I ran:
netstat -aunp | grep ":177"only to figure that kdm was listening at port 177 over IPv6! Recalling an old KDE bug, I edited /etc/X11/xdm/Xaccess to read:
LISTEN 0.0.0.0and restarted kdm. That did the trick - phew!
ifconfig eth0 mtu 1492or alternately
ip link set eth0 mtu 1492fixed the problem. Phew! [Hey you newbie network admin types: Set your f/w to allow ICMP unreachable -- fragmentation needed messages. These are type 3, code 4 messages. Don't just blindly block ICMP because you read somewhere that it's unsafe. i.e. in Linux:
iptables -A FORWARD -p icmp --icmp-type fragmentation-needed -j ACCEPT iptables -A INPUT -p icmp --icmp-type fragmentation-needed -j ACCEPT ... iptables -A FORWARD -p icmp -j DROP iptables -A INPUT -p icmp -j DROP]
#!
#
# chkconfig: runlevel startpriority stoppriority
# description: brief, possibly multi-line description \
# follows
#!/bin/bash
#
# Init file for OpenSSH server daemon
#
# chkconfig: 2345 55 25
# description: OpenSSH server daemon
resize2fs
program (part of e2fsprogs). While resize2fs
could be used to shrink and grow ext3 partitions, the one bundled with e2fsprogs-1.36
+ can apparently resize even mounted partitions! Woo hoo!
cdrecord -scanbus
cdrecord -v dev=0,0,0 driveropts=burnfree -multi -eject speed=2 archive.iso
-multi
if it's a single session CD.
cdrecord -v dev=0,0,0 driveropts=burnfree -multi -eject session1.iso
For subsequent burn:cdrecord dev=0,1,0 -msinfo
0,27139
mkisofs -o session2.iso -Jr -V Session2 -C 0,27139 -M 0,0,0 /path/to/files/
mkisofs -o session2.iso -Jr -V Session2 -C $(cdrecord dev=0,1,0 -msinfo) -M 0,0,0 /path/2/files/
Now burn (dropping the -multi for the last burn):cdrecord -v dev=0,0,0 driveropts=burnfree -multi -eject session2.iso
/etc/default/cdrecord
:#/etc/default/cdrecord
CDR_DEVICE=0,0,0
CDR_SPEED=2
cdrecord archive.iso
cdrecord -v dev=0,0,0 blank=all
wherecdrecord -scanbus
)
mkisofs -a -J -r -v -V vol_label -L -o img1.iso ~/cds/cd0/
where:
-a Include all files on the ISO9660 file system. Files that contain '~' or '#' will be included.
-r Use rockridge naming conventions
-J Generate Joliet directory records in addition to iso9660.
-L Allow file names to begin with a period.
-o outputfilename output file name.
newrole
to change the role. For example, to switch to the sysadm_r
role:
newrole -r sysadm_r
UserDir disable
UserDir public_html
.
service httpd reload
chcon -R -t httpd_user_content_t ~/public_html/
system-config-securitylevel
setsebool httpd_enable_homedirs true
system-config-securitylevel
to change SELinux based settings.
ls
command's -Z
option will display the security context of a file
id
command's -Z
option will display the security context of a user
ps
command's -Z
option will display the security context of a process.
system-config-securitylevel
, change the policy and reboot.
SELINUXTYPE=policyname
.
SELINUX=permissive
.
touch /.autorelabel
.
sestatus -v
. With the new system running in permissive mode, check /var/log/messages for avc: denied messages. Fix any problems.
SELINUX=enforcing
. You can either reboot or run setenforce 1
to turn enforcing on in real time.
star
to backup files on an SElinux protected system. In particular, use the -xattr
and -H=exustar
options. Eg:
star -xattr -H=exustar -c -f ../test.star ./*
selinux=0
, use SELINUX=disabled in /etc/selinux/config.
setenforce 0
. To return to enforcing mode, setenforce 1
.
selinux=0
to your kernel command line. Note that if you boot with selinux=0
, any files you create while SELinux is disabled will NOT have SELinux context information. If booting with selinux=1 fails, relabel the files with a touch /.autorelabel
and reboot into single user mode.
/usr/sbin/sestatus -v
displays status info about SELinux
restorecon -v -R /path.
- If you have file systems shared by both SELinux enabled and non-SELinux machines - eg a dual-boot Suse and FC4 sharing the same /home, it sort of spells trouble when booting into SElinux as it may require relabelling.
- Mounting a non-SELinux file system via NFS results in SELinux treating all the files in the share as having a context of nfs_t. To override the default context to say, system_u:object_r:tmp_t to SELinux:
mount -t nfs -o context=system_u:object_r:tmp_t server:/shared/foo /mnt/foo
- To change and load the security policy:
cd /etc/selinux/targeted/src/policy
make clean
make load
setenforce 0
. bzip2-libs
, and krb5-*
failing.)
rpm -Fvh *.rpm
setenforce 1
. /sbin/fixfiles relabel
/sbin/restorecon -R pathname
<style>
.whatever {
background-color: transparent;
background-image: url(imgfilename);
background-attachment: scroll;
background-repeat: no-repeat;
/* Change following to 'right' instead of 'left' if you need it right aligned.
*/
background-position: left;
/* Change following to 'right' instead of 'left' if you need it right aligned.
*/
padding-left: 18px;
}
</style>
<body>
... Testing <a class="whatever" href="...">links</a>
</body>
dd if=stage1 of=/dev/fd0 bs=512 count=1
dd if=stage2 of=/dev/fd0 bs=512 seek=1
grub-install --root-directory=/mnt/floppy fd0
root (fd0)
setup (fd0)
You ought to have a grub-bootable on your hands now. I think the grub-install part ought to work with USB drives as well tho' I haven't really tried it.skipping: yeas3/yeas3.TRC need PK compat. v4.5 (can do v2.1)
make
make install
Then run:7za x file.zip [filename ...]
about:config
font
pref("font.directory.truetype.1", "/usr/local/share/fonts/TrueType");
pref("font.directory.truetype.2", "/usr/share/fonts/TrueType");