% su # export proxy="http://proxy.nagaokaut.ac.jp:8080/" # yum update (the similar line was added to /etc/yum.conf however, it didn't work. maybe after rebooting it would work)
# yum install clamav # yum install clamav-update # vi /etc/freshclam.conf (modified as #Example HTTPProxyServer proxy.nagaokaut.ac.jp ) # freshclam # clamscan (現在のディレクトリを検査) # clamscan -r / (/ディレクトリ内を検査)
# yum install nfs-utils
# mount suiba:/home /mnt/home/suiba # cd /home # cp -a /mnt/home/suiba/ali . # cp -a /mnt/home/suiba/nagana . etc...
# yum install telnet-server # yum install system-config-services # system-config-services (telnet was turned to be enabled, xinetd was terned to be enabled and started)
# yum install samba
# system-config-services
(smb was turned to be enable)
edit /etc/samba/smb.conf as follows:
workgroup = YOMOGI
hosts allow = 192.168.11. 127.
encrypt passwords = yes
smb passwd file = /etc/samba/smbpasswd
[public]
comment = Public Stuff
path = /home/samba
public = yes
writable = yes
printable = no
write list = +kobayasi
# cat /etc/passwd | mksmbpasswd.sh > /etc/samba/smbpasswd
# smbpasswd -a kobayasi
# /etc/init.d/smb start
# /etc/init.d/nmb start
# yum install samba-swatSELinux should be turned off in order for allow windows clients to manipulate filesystems of Samba server:
# vi /etc/selinux/config (SELINUX=disabled) # setenforce 0
# yum install ypserv # domainname yomogi # vi /etc/sysconfig/network NISDOMAIN=yomogi # vi /etc/ypserv # Not everybody should see the shadow passwords, not secure, since # under MSDOG everbody is root and can access ports < 1024 !!! 192.168.11. : * : shadow.byname : port 192.168.11. : * : passwd.adjunct.byname : port
TODO: