Please sign in to see the alerts.
Project website https://debian-handbook.info/
Mailing list for translators debian-handbook-translators@lists.alioth.debian.org
Instructions for translators

https://debian-handbook.info/contribute/

Translation process
  • Translations can be made directly.
  • Translation suggestions can be made.
  • Any authenticated user can contribute.
  • The translation uses bilingual files.
Translation license GNU General Public License v2.0 or later
Repository https://salsa.debian.org/hertzog/debian-handbook.git
Repository branch buster/master
Last remote commit Fix markup in the "Apache > Allow from" index entry c730f2d8
User avatar rhertzog authored 14 hours ago
Repository containing Weblate translations https://hosted.weblate.org/git/debian-handbook/12_advanced-administration/
Filemask*/14_security.po
Number of strings 11,300
Number of words 378,050
Number of characters 2,914,150
Number of languages 25
Number of source strings 452
Number of source words 15,122
Number of source characters 116,566

Yes, all of this block should be translated.

9 hours ago
<emphasis>GOING FURTHER</emphasis> The <command>m4</command> macro language
<emphasis>FOR VIDEREKOMMENDE</emphasis> Makrospråket <command>m4</command>-makrospråket
9 hours ago
<primary>Network</primary><secondary>IDS</secondary>
<primary>Nnettverk</primary><secondary>IDS</secondary>
10 hours ago
User avatar None

Committed changes

Debian Handbook / 14_securityNorwegian Bokmål

Committed changes 21 hours ago
Some of these operations can be made easier with specialized software. In particular, the <emphasis role="pkg">sleuthkit</emphasis> package provides many tools to analyze a filesystem. Their use is made easier by the <emphasis>Autopsy Forensic Browser</emphasis> graphical interface (in the <emphasis role="pkg">autopsy</emphasis> package). Some Linux distributions have a "live install" image and contain many programs for forensic analysis, such as Kali Linux (see <xref linkend="sect.kali" />), with its <emphasis>forensic mode</emphasis>, BlackArchLinux<footnote><para> <ulink url="https://blackarch.org" /></para></footnote> and the commercial Grml-Forensic, based on Grml (see <xref linkend="sect.grml" />).
Noen av disse operasjonene kan gjøres enklere med spesialisert programvare. Spesielt <emphasis role="pkg">sleuthkit</emphasis>-pakken inneholder mange verktøy for å analysere et filsystem. Bruken er gjort enklere med det grafiske grensesnittet <emphasis>Autopsy Forensic Browser</emphasis> (i <emphasis role="pkg">autopsy</emphasis>-pakken). Noen Linux-distribusjoner har et "live install"-avtrykk og inneholder mange programmer for dataetterforskning, for eksempel Kali Linux (se <xref linkend="sect.kali" />), med sin <emphasis>forensic mode</emphasis>, BlackArchLinux<footnote><para> <ulink url="https://blackarch.org" /></para></footnote> og den kommersielle Grml-Forensic, basert på Grml (se <xref linkend="sect.grml" />).
yesterday
Committed changes yesterday
Some of these operations can be made easier with specialized software. In particular, the <emphasis role="pkg">sleuthkit</emphasis> package provides many tools to analyze a filesystem. Their use is made easier by the <emphasis>Autopsy Forensic Browser</emphasis> graphical interface (in the <emphasis role="pkg">autopsy</emphasis> package). Some Linux distributions have a "live install" image and contain many programs for forensic analysis, such as Kali Linux (see <xref linkend="sect.kali" />), with its <emphasis>forensic mode</emphasis>, BlackArchLinux<footnote><para> <ulink url="https://blackarch.org" /></para></footnote> and the commercial Grml-Forensic, based on Grml (see <xref linkend="sect.grml" />).
Noen av disse operasjonene kan gjøres enklere med spesialisert programvare. Spesielt <emphasis role="pkg">sleuthkit</emphasis>-pakken inneholder mange verktøy for å analysere et filsystem. Bruken er gjort enklere med det grafiske grensesnittet <emphasis>Autopsy Forensic Browser</emphasis> (i <emphasis role="pkg">autopsy</emphasis>-pakken). Noen Linux-distribusjoner har et "live install"-avtrykk og inneholder mange programmer for dataetterforskning, for eksempel Kali Linux (se <xref linkend="sect.kali" />), med sin <emphasis>forensic mode</emphasis>, BlackArchLinux<footnote><para> <ulink url="https://blackarch.org" /></para></footnote> og den kommersielle Grml-Forensic, basert på Grml (se <xref linkend="sect.grml" />).
yesterday
Committed changes yesterday
<emphasis>GOING FURTHER</emphasis> The <command>m4</command> macro language
<emphasis>GOING FURTHERFOR VIDEREKOMMENDE</emphasis> The <command>m4</command> -mackro languagespråket
yesterday
In the following example, we will thus try to create a profile for <command>/sbin/dhclient</command>. For this we will use <command>aa-genprof dhclient</command>. In Debian <emphasis role="distribution">Buster</emphasis> there is a known bug<footnote><para><ulink url="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928160" /></para></footnote> that makes the previous command fail with the following error: <computeroutput>ERROR: Include file /etc/apparmor.d/local/usr.lib.dovecot.deliver not found</computeroutput>. To fix it create the missing files with <command>touch <replaceable>file</replaceable></command>. It will invite you to use the application in another window and when done to come back to <command>aa-genprof</command> to scan for AppArmor events in the system logs and convert those logs into access rules. For each logged event, it will make one or more rule suggestions that you can either approve or further edit in multiple ways:
I følgende eksempel vil vi dermed prøve å opprette en profil for <command>/sbin/dhclient</command>. Til dette bruker vi <command>aa-genprof dhclient</command>. I Debian <emphasis role="distribution">Buster</emphasis> er det en kjent feil <footnote><para><ulink url="https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=928160" /></para></footnote> som gjør at den forrige kommandoen feiler med følgende feilmelding: <computeroutput>ERROR: Include file /etc/apparmor.d/local/usr.lib.dovecot.deliver not found</computeroutput>. For å fikse det, lag de manglende filene med <command>touch <replaceable>fil</replaceable></command>. ProgrammetDen vil la deg bruke programmet i et annenytt vindu, og når du er ferdig, komme tilbake til <command>aa-genprof</command> for å søke etter AppArmor-hendelser i systemloggene, og konvertere disse loggene til adgangsregler. For hver logget hendelse vil den lage ett eller flere regelforslag som du enten kan godkjenne eller redigere videre på flere måter:
yesterday
Browse all component changes

Daily activity

Daily activity

Weekly activity

Weekly activity