% su # export proxy="http://proxy.nagaokaut.ac.jp:8080/" # yum update (the similar line was added to /etc/yum.conf however, it didn't work. maybe after rebooting it would work)
# yum install clamav # yum install clamav-update # vi /etc/freshclam.conf (modified as #Example HTTPProxyServer proxy.nagaokaut.ac.jp ) # freshclam # clamscan (現在のディレクトリを検査) # clamscan -r / (/ディレクトリ内を検査)
# yum install nfs-utils
# mount suiba:/home /mnt/home/suiba # cd /home # cp -a /mnt/home/suiba/ali . # cp -a /mnt/home/suiba/nagana . etc...
# yum install telnet-server # yum install system-config-services # system-config-services (telnet was turned to be enabled, xinetd was terned to be enabled and started)
# yum install samba # system-config-services (smb was turned to be enable) edit /etc/samba/smb.conf as follows: workgroup = YOMOGI hosts allow = 192.168.11. 127. encrypt passwords = yes smb passwd file = /etc/samba/smbpasswd [public] comment = Public Stuff path = /home/samba public = yes writable = yes printable = no write list = +kobayasi # cat /etc/passwd | mksmbpasswd.sh > /etc/samba/smbpasswd # smbpasswd -a kobayasi # /etc/init.d/smb start # /etc/init.d/nmb start # yum install samba-swat
SELinux should be turned off in order for allow windows clients to manipulate filesystems of Samba server:
# vi /etc/selinux/config (SELINUX=disabled) # setenforce 0
# yum install ypserv # domainname yomogi # vi /etc/sysconfig/network NISDOMAIN=yomogi # vi /etc/ypserv # Not everybody should see the shadow passwords, not secure, since # under MSDOG everbody is root and can access ports < 1024 !!! 192.168.11. : * : shadow.byname : port 192.168.11. : * : passwd.adjunct.byname : port
TODO: