summaryrefslogtreecommitdiffstats
path: root/isolinux-graphic-simple.bmp.parameters
Commit message (Expand)AuthorAgeFilesLines
* updated boot imagesFlorent Villard2005-03-231-5/+5
* update (it only sorts entries, will help future diff)Pascal Rigaux2004-09-161-5/+5
* files used by lilo-bmp2mdkPascal Rigaux2004-07-301-0/+10
a id='n46' href='#n46'>46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139
package security::help;
# This help was forked from msec internal function descriptions
# They were then reworked in order to be targeted for end users, not msec developpers


use strict;
use common;

our %help = (

'accept_bogus_error_responses' => N("Accept/Refuse bogus IPv4 error messages."),

'accept_broadcasted_icmp_echo' => N("Accept/Refuse broadcasted icmp echo."),

'accept_icmp_echo' => N("Accept/Refuse icmp echo."),

'allow_autologin' => N("Allow/Forbid autologin."),

'allow_issues' =>
             #-PO: here "ALL" is a value in a pull-down menu; translate it the same as "ALL" is
             N("If set to \"ALL\", /etc/issue and /etc/issue.net are allowed to exist.

If set to NONE, no issues are allowed.

Else only /etc/issue is allowed."),

'allow_reboot' => N("Allow/Forbid reboot by the console user."),

'allow_remote_root_login' => N("Allow/Forbid remote root login."),

'allow_root_login' => N("Allow/Forbid direct root login."),

'allow_user_list' => N("Allow/Forbid the list of users on the system on display managers (kdm and gdm)."),

'allow_xauth_from_root' => N("Allow/forbid to export display when
passing from the root account to the other users.

See pam_xauth(8) for more details.'"),

'allow_x_connections' => N("Allow/Forbid X connections:

- ALL (all connections are allowed),

- LOCAL (only connection from local machine),

- NONE (no connection)."),

'allow_xserver_to_listen' => N("The argument specifies if clients are authorized to connect
to the X server from the network on the tcp port 6000 or not."),

'authorize_services' =>
             #-PO: here "ALL", "LOCAL" and "NONE" are values in a pull-down menu; translate them the same as they're
             N("Authorize:

- all services controlled by tcp_wrappers (see hosts.deny(5) man page) if set to \"ALL\",

- only local ones if set to \"LOCAL\"

- none if set to \"NONE\".

To authorize the services you need, use /etc/hosts.allow (see hosts.allow(5))."),

'create_server_link' => N("If SERVER_LEVEL (or SECURE_LEVEL if absent)
is greater than 3 in /etc/security/msec/security.conf, creates the
symlink /etc/security/msec/server to point to
/etc/security/msec/server.<SERVER_LEVEL>.

The /etc/security/msec/server is used by chkconfig --add to decide to
add a service if it is present in the file during the installation of
packages."),

'enable_at_crontab' => N("Enable/Disable crontab and at for users.

Put allowed users in /etc/cron.allow and /etc/at.allow (see man at(1)
and crontab(1))."),

'enable_console_log' => N("Enable/Disable syslog reports to console 12"),

'enable_dns_spoofing_protection' => N("Enable/Disable name resolution spoofing protection.  If
\"%s\" is true, also reports to syslog.", N("Security Alerts:")),

'enable_ip_spoofing_protection' => N("Enable/Disable IP spoofing protection."),

'enable_libsafe' => N("Enable/Disable libsafe if libsafe is found on the system."),

'enable_log_strange_packets' => N("Enable/Disable the logging of IPv4 strange packets."),

'enable_msec_cron' => N("Enable/Disable msec hourly security check."),

'enable_pam_wheel_for_su' => N("Enable su only from members of the wheel group. If set to no, allows su from any user."),

'enable_password' => N("Use password to authenticate users."),

'enable_promisc_check' => N("Activate/Disable ethernet cards promiscuity check."),

'enable_security_check' => N("Activate/Disable daily security check."),

'enable_sulogin' => N("Enable/Disable sulogin(8) in single user level."),

'no_password_aging_for' => N("Add the name as an exception to the handling of password aging by msec."),

'password_aging' => N("Set password aging to \"max\" days and delay to change to \"inactive\"."),

'password_history' => N("Set the password history length to prevent password reuse."),

'password_length' => N("Set the password minimum length and minimum number of digit and minimum number of capitalized letters."),

'set_root_umask' => N("Set the root umask."),
CHECK_OPEN_PORT => N("if set to yes, check open ports."),
CHECK_PASSWD => N("if set to yes, check for:

- empty passwords,

- no password in /etc/shadow

- for users with the 0 id other than root."),
CHECK_PERMS => N("if set to yes, check permissions of files in the users' home."),
CHECK_PROMISC => N("if set to yes, check if the network devices are in promiscuous mode."),
CHECK_SECURITY => N("if set to yes, run the daily security checks."),
CHECK_SGID => N("if set to yes, check additions/removals of sgid files."),
CHECK_SHADOW => N("if set to yes, check empty password in /etc/shadow."),
CHECK_SUID_MD5 => N("if set to yes, verify checksum of the suid/sgid files."),
CHECK_SUID_ROOT => N("if set to yes, check additions/removals of suid root files."),
CHECK_UNOWNED => N("if set to yes, report unowned files."),
CHECK_WRITABLE => N("if set to yes, check files/directories writable by everybody."),
CHKROOTKIT_CHECK => N("if set to yes, run chkrootkit checks."),
MAIL_USER => N("if set, send the mail report to this email address else send it to root."),
MAIL_WARN => N("if set to yes, report check result by mail."),
MAIL_EMPTY_CONTENT => N("Do not send mails if there's nothing to warn about"),
RPM_CHECK => N("if set to yes, run some checks against the rpm database."),
SYSLOG_WARN => N("if set to yes, report check result to syslog."),
TTY_WARN => N("if set to yes, reports check result to tty."),

'set_shell_history_size' => N("Set shell commands history size. A value of -1 means unlimited."),

'set_shell_timeout' => N("Set the shell timeout. A value of zero means no timeout.") . "\n\n" . N("Timeout unit is second"),

'set_user_umask' => N("Set the user umask."),
);