From d01ba00a282c24d46144e62eb6b9b7de34bc7a8d Mon Sep 17 00:00:00 2001 From: tille <> Date: Fri, 27 Oct 2006 08:47:40 +0000 Subject: [PATCH] XML errors corrected --- LDP/guide/docbook/Intro-Linux/chap10.xml | 14 +++++++------- LDP/guide/docbook/Intro-Linux/chap3.xml | 2 +- LDP/guide/docbook/Intro-Linux/chap8.xml | 1 + LDP/guide/docbook/Intro-Linux/chap9.xml | 3 ++- 4 files changed, 11 insertions(+), 9 deletions(-) diff --git a/LDP/guide/docbook/Intro-Linux/chap10.xml b/LDP/guide/docbook/Intro-Linux/chap10.xml index 70e92e00..c354d041 100644 --- a/LDP/guide/docbook/Intro-Linux/chap10.xml +++ b/LDP/guide/docbook/Intro-Linux/chap10.xml @@ -33,7 +33,7 @@ Application layerHTTP, DNS, SMTP, POP, ... Transport layerTCP, UDP Network layerIP, IPv6 -Network access layerPPP, PPPoE, Ethernet +Network access layerPPP, PPPoE, Ethernet @@ -155,7 +155,7 @@ hosts: files dns Network configuration commands The ip command -The distribution-specific scripts and graphical tools are front-ends to ipip (or ifconfigifconfig and routeroute on older systems) to display and configure the kernel's networking configuration. +The distribution-specific scripts and graphical tools are front-ends to ipip (or ifconfigifconfig and routeroute on older systems) to display and configure the kernel's networking configuration. The ip command is used for assigning IP addresses to interfaces, for setting up routes to the Internet and to other networks, for displaying TCP/IP configurations etcetera. The following commands show IP addressnetworkingdisplay IP address and routingnetworkingdisplay routes information: @@ -252,7 +252,7 @@ Destination Gateway Genmask Flags MSS Window irtt Iface This is a typical client machine in an IP network. It only has one network device, eth0. The lo interface is the local loop. The modern way The novel way to get this info from your system is by using the ip command: -ip route show +ip route show When this machine tries to contact a host that is on another network than its own, indicated by the line starting with 0.0.0.0, it will send the connection requests to the machine (router) with IP address 192.168.42.1, and it will use its primary interface, eth0, to do this. Hosts that are on the same network, the line starting with 192.168.42.0, will also be contacted through the primary network interface, but no router is necessary, the data are just put on the network. @@ -450,7 +450,7 @@ localhost.localdomain: anonymous/bob@his.server.com: IDLE Most Linux distributions include fetchmailfetchmail, a mail-retrieval and forwarding utility. It fetches mail from remote mail servers (POP, IMAP and some others) and forwards it to your local delivery system. You can then handle the retrieved mail using normal mail clients. It can be run in daemon mode to repeatedly poll one or more systems at a specified interval. Information and usage examples can be found in the Info pages; the directory /usr/share/doc/fetchmail[-<version>] contains a full list of features and a FAQ for beginners. -The procmailprocmail filter can be used for filtering incoming mail, to create mailing lists, to pre-process mail, to selectively forward mail and more. The accompanying formailformail program, among others, enables generation of auto-replies and splitting up mailboxes. Procmail has been around for years on UNIX and Linux machines and is a very robust system, designed to work even in the worst circumstances. More information may be found in the /usr/share/doc/procmail[-<version>]; directory and in the man pages. +The procmailprocmail filter can be used for filtering incoming mail, to create mailing lists, to pre-process mail, to selectively forward mail and more. The accompanying formailformail program, among others, enables generation of auto-replies and splitting up mailboxes. Procmail has been around for years on UNIX and Linux machines and is a very robust system, designed to work even in the worst circumstances. More information may be found in the /usr/share/doc/procmail[-<version>] directory and in the man pages. @@ -475,7 +475,7 @@ localhost.localdomain: anonymous/bob@his.server.com: IDLE For instance: export http_proxy=http://willy:Appelsi3ntj3@proxy:80 If you do not need to give a username and password, simply leave out everything before the @ sign, this sign included. - + File Transfer Protocol @@ -874,7 +874,7 @@ tcp 0 0 ::1:x11-ssh-offset *:* LISTEN Packet filters The first line of defense is a packet filtersecuritypacket filters, which can look inside IP packets and make decisions based on the content. Most common is the Netfilter package, providing the iptables command, a next generation packet filter for Linux. One of the most noteworthy enhancements in the newer kernels is the stateful inspection feature, which not only tells what is inside a packet, but also detects if a packet belongs or is related to a new or existing connection. -The Shoreline Firewall or Shorewall for short is a front-end for the +The Shoreline Firewall or Shorewall for short is a front-end for the standard firewall functionality in Linux. More information can be found at the Netfilter/iptables project page. TCP wrappers @@ -903,7 +903,7 @@ tcp 0 0 ::1:x11-ssh-offset *:* LISTEN Some general thingssecuritytips you should keep in mind: Do not allow root logins. UNIX developers came up with the su over two decades ago for extra security. -Direct root access is always dangerous and susceptible to human errors, be it by allowing root login or by using the su command. Rather than using su, it is even better to use sudo to only execute the command that you need extra permissions for, and to return afterwards to your own environment. +Direct root access is always dangerous and susceptible to human errors, be it by allowing root login or by using the su command. Rather than using su, it is even better to use sudo to only execute the command that you need extra permissions for, and to return afterwards to your own environment. Take passwords seriously. Use shadow passwords. Change your passwords regularly. Try to always use SSH or SSL. Avoid telnet, FTP and E-mail clients and other client programs which send unencrypted passwords over the network. Security is not only about securing your computer, it is also about securing your passwords. Limit resources using quota and/or ulimit. diff --git a/LDP/guide/docbook/Intro-Linux/chap3.xml b/LDP/guide/docbook/Intro-Linux/chap3.xml index 63c695a9..72ac4189 100644 --- a/LDP/guide/docbook/Intro-Linux/chap3.xml +++ b/LDP/guide/docbook/Intro-Linux/chap3.xml @@ -1090,7 +1090,7 @@ sent-mail: On Mon, 24 Dec 2001, Arno.Hintjens@celeb.com wrote: More ways to view file content General Apart from cat, which really doesn't do much more than sending files to the standard output, there are other tools to view file content. -The easiest way of course would be to use graphical tools instead of command line tools. In the introduction we already saw a glimpse of an office application, OpenOffice.org. Other examples are the GIMP (start up with gimpgimp from the command line), the GNU Image Manipulation Program; xpdfxpdf to view Portable Document Format files (PDF); GhostView (gvgv) for viewing PostScript files; Mozilla/FireFox, links (a text mode browser), Konqueror, Opera and many others for web content; XMMS, CDplay and others for multimedia file content; AbiWord, Gnumeric, KOffice etc. for all kinds of office applications and so on. There are thousands of Linux applications; to list them all would take days. +The easiest way of course would be to use graphical tools instead of command line tools. In the introduction we already saw a glimpse of an office application, OpenOffice.org. Other examples are the GIMP (start up with gimpgimp from the command line), the GNU Image Manipulation Program; xpdfxpdf to view Portable Document Format files (PDF); GhostView (gvgv) for viewing PostScript files; Mozilla/FireFox, links (a text mode browser), Konqueror, Opera and many others for web content; XMMS, CDplay and others for multimedia file content; AbiWord, Gnumeric, KOffice etc. for all kinds of office applications and so on. There are thousands of Linux applications; to list them all would take days. Instead we keep concentrating on shell- or text-mode applications, which form the basics for all other applications. These commands work best in a text environment on files containing text. When in doubt, check first using the filefile command. So let's see what text tools we have that are useful to look inside files. Font problems diff --git a/LDP/guide/docbook/Intro-Linux/chap8.xml b/LDP/guide/docbook/Intro-Linux/chap8.xml index c579fd85..ebcab1fa 100644 --- a/LDP/guide/docbook/Intro-Linux/chap8.xml +++ b/LDP/guide/docbook/Intro-Linux/chap8.xml @@ -108,6 +108,7 @@ printer blob now printing blob-253. enabled since Jan 01 18:01 The manman pagesprinting pages contain pre-formatted trofftroff data which has to be formatted before it can roll out of your printer. Printingprintingman pages is done using the option to the man command: man command > man-command.ps Then print the PostScript file. If a default print destination is configured for your system/account, you can just issue the command man command to send the formatted page to the printer directly. + Previewing formatted files Anything that you can send to the printer can normally be sent to the screen as well. Depending on the file format, you can use one of these commandsprintingpreview: diff --git a/LDP/guide/docbook/Intro-Linux/chap9.xml b/LDP/guide/docbook/Intro-Linux/chap9.xml index 174d4ff6..8995d59d 100644 --- a/LDP/guide/docbook/Intro-Linux/chap9.xml +++ b/LDP/guide/docbook/Intro-Linux/chap9.xml @@ -344,9 +344,10 @@ Track 01: Total bytes read/written: 341540864/341540864 Apart from that, encryption can be applied to E-mails as well: normally, mail is not encrypted and it is often sent in the open over the netwerk or the Internet. If your message contains sensitive information, better encrypt it. GNU Privacy Guard -On Linux systems you will find GnuPG, the GNU Privacy GuardencryptionGnuPG, which is a suite of programs that are compatible with the PGP (Pretty Good Privacy) tools that are commercially available. +On Linux systems you will find GnuPG, the GNU Privacy GuardencryptionGnuPG, which is a suite of programs that are compatible with the PGP (Pretty Good Privacy) tools that are commercially available. In this guide we will only discuss the very simple usage of the encryption tools and show what you will need in order to generate an encryption key and use it to encrypt data for yourself, which you can then safely store in a public place. More advanced usage directions can be found in the man pages of the various commands. + Generate a key Before you can start encrypting your data, you need to createencryptiongenerate keys a pair of keys. The pair consists of a private and a public key. You can send the public key to correspondents, who can use it to encrypt data for you, which you decrypt with your private key. You always keep the private key, never share it with somebody else, or they will be able to decrypt data that is only destined for you. Just to make sure that no accidents happen, the private key is protected with a password. The key pair is created using this commandgpg: