26.10.2012 Views

SUSE LINUX Documentation - Index of

SUSE LINUX Documentation - Index of

SUSE LINUX Documentation - Index of

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

server is publicly accessible and you are afraid someone could carry out this action<br />

without authorization. If you select Stop, this key combination causes the system<br />

to shut down. With Ignore, this key combination is ignored.<br />

If you use the KDE login manager (KDM), set permissions for shutting down the<br />

system in Shutdown Behavior <strong>of</strong> KDM. Give permission to Only root (the system<br />

administrator), All Users, Nobody, or Local Users. If Nobody is selected, the system<br />

can only be shut down from the text console.<br />

Login Settings<br />

Typically, following a failed login attempt, there is a waiting period lasting a few<br />

seconds before another login is possible. This makes it more difficult for password<br />

sniffers to log in. Optionally activate Record Successful Login Attempts and Allow<br />

Remote Graphical Login. If you suspect someone is trying to discover your password,<br />

check the entries in the system log files in /var/log. To grant other users<br />

access to your graphical login screen over the network, enable Allow Remote<br />

Graphical Login. Because this access possibility represents a potential security<br />

risk, it is inactive by default.<br />

User Addition<br />

Every user has a numerical and an alphabetical user ID. The correlation between<br />

these is established using the file /etc/passwd and should be as unique as possible.<br />

Using the data in this screen, define the range <strong>of</strong> numbers assigned to the<br />

numerical part <strong>of</strong> the user ID when a new user is added. A minimum <strong>of</strong> 500 is<br />

suitable for users. Automatically generated system users start with 1000. Proceed<br />

in the same way with the group ID settings.<br />

Miscellaneous Settings<br />

To use predefined file permission settings, select Easy, Secure, or Paranoid. Easy<br />

should be sufficient for most users. The setting Paranoid is extremely restrictive<br />

and can serve as the basic level <strong>of</strong> operation for custom settings. If you select<br />

Paranoid, remember that some programs might not work correctly or even at all,<br />

because users no longer have permission to access certain files.<br />

Also set which user should launch the updatedb program, if installed. This program,<br />

which automatically runs on a daily basis or after booting, generates a<br />

database (locatedb) in which the location <strong>of</strong> each file on your computer is stored.<br />

If you select Nobody, any user can find only the paths in the database that can be<br />

seen by any other (unprivileged) user. If root is selected, all local files are indexed,<br />

because the user root, as superuser, may access all directories. Make sure that<br />

System Configuration with YaST 69

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!