If you select Nobody, any user can find only the paths in the database that can be
seen by any other (unprivileged) user. If root is selected, all local files are indexed,
because the user root, as superuser, may access all directories. Make sure that
the options Current Directory in root's Path and Current Directory in Path of
Regular Users are deactivated. Only advanced users should consider using these
options because these settings may pose a significant security risk if used incorrectly.
To have some control over the system even if it crashes, click Enable Magic SysRq
Keys.
Click Finish to complete your security configuration.
8.9.4 Firewall
SuSEfirewall2 can protect your machine against attacks from the Internet. Configure
it with Security and Users > Firewall. Find detailed information about SuSEfirewall2
in
Chapter 39, Masquerading and Firewalls
TIP: Automatic Activation of the Firewall
YaST automatically starts a firewall with suitable settings on every configured
network interface. Start this module only if you want to reconfigure the firewall
with custom settings or deactivate it.
8.10 Virtualization
Virtualization makes it possible to run several operating systems on one physical ma-
chine. The hardware for the different systems is provided virtually. Virtualization YaST
modules provide configuration for the Xen virtualization system..
The following modules are available in the Virtualization section:
Installing Hypervisor and Tools
Before you start using Xen, install a kernel with Xen support and related tools. To
install them, use Virtualization > Install Hypervisor and Tools. After installation
reboot your system to use the Xen kernel.
(page 731).
System Configuration with YaST
169
Need help?
Do you have a question about the LINUX ENTERPRISE DESKTOP 10 SP2 - DEPLOYMENT GUIDE 08-05-2008 and is the answer not in the manual?
Questions and answers