Partie II. Local Security

Table des matières

8. Configuring Security Settings with YaST
8.1. Security Overview
8.2. Predefined Security Configurations
8.3. Password Settings
8.4. Boot Settings
8.5. Login Settings
8.6. User Addition
8.7. Miscellaneous Settings
9. Access Control Lists in Linux
9.1. Traditional File Permissions
9.2. Advantages of ACLs
9.3. Definitions
9.4. Handling ACLs
9.5. ACL Support in Applications
9.6. For More Information
10. Encrypting Partitions and Files
10.1. Setting Up an Encrypted File System with YaST
10.2. Using Encrypted Home Directories
10.3. Using vi to Encrypt Single ASCII Text Files
11. Intrusion Detection with AIDE
11.1. Why Using AIDE?
11.2. Setting Up an AIDE Database
11.3. Local AIDE Checks
11.4. System Independent Checking
11.5. For More Information

openSUSE Security Guide 12.3