This tool[2] is present in the Mageia
+Control Center under the tab Software
+management.
Nota
To work, MageiaUpdate needs the repositories to be configured with
+rpmdrake-edit-media with some media checked as updates. If they are not, you
+are prompted to do so.
As soon as this tool is launched, it scans the installed packages and lists
+those with an update available in the repositories. They are all selected by
+default to be automatically downloaded and installed. Click on the
+Update button to start the process.
By clicking on a package, more information is displayed in the lower half of
+the window. The print > before a title
+means you can click to drop down a text.
Nota
When updates are available, an applet in the system tray warns you by
+displaying this red icon
+. Just click and enter the user password to update the system alike.
[2] You can start this tool from the command line, by typing MageiaUpdate or drakrpm-update as root.
This tool is present in the Mageia Control Center under the tab Hardware. Select Set up the
+graphical server. [14]
The buttons allow you to change the graphical configuration.
Graphic card:
The graphic card currently detected is displayed and the matching server
+configured. Click on this button to change to another server, for example
+one with a proprietary driver.
The available servers are sorted under Vendor by
+manufacturer in alphabetical order and then by model also in alphabetical
+order. The free drivers are sorted by alphabetical order under
+Xorg.
Nota
In case of problems, Xorg - Vesa will work with most
+graphic cards and give you time to find and install the right driver while
+in your Desktop Environment.
If even Vesa doesn't work, choose Xorg -
+fbdev, which is used while installing
+Mageia, but doesn't allow you to change resolution or refresh rates.
If you made your choice for a free driver, you may be asked if you want to
+use a proprietary driver instead with more features (3D effects for
+example).
Monitor:
In the same way as above, the monitor currently detected is displayed and
+you can click on the button to change to another one. If the desired monitor
+isn't in the Vendor list, choose in the
+Generic list a monitor with the same features.
Risoluzione:
This button allows the choice of the resolution (number of pixels) and the
+colour depth (number of colours). It displays this screen:
When you change the color depth, a
+multi-colored bar will appear next to the second button and show a preview
+of what the selected color depth looks like.
The first button shows the currently resolution, click to change for another
+one. The list gives all the possible choices according to the graphic card
+and the monitor, it is possible to click on Other to
+set other resolutions, but bear in mind that you can damage your monitor or
+select an uncomfortable setting.
The second button shows the currently colour depth, click to change this for
+another one.
Nota
Depending on the chosen resolution, it may be necessary to logout and
+restart the graphical environment for the settings to take effect.
Test:
Once the configuration done, it is recommended to do a test before clicking
+on OK because it is easier to modify the settings now than later if the
+graphical environment doesn't work.
Nota
In case of a non working graphical environment, type Alt+Ctrl+F2 to open a
+text environment, connect as root and type XFdrake (with the caps) to to use
+XFdrake's text version.
If the test fails, just wait until the end, if it works but you don't want
+to change after all, click on No, if everything is
+right, click on OK.
Opzioni:
Global options: If Disable
+Ctrl-Alt-Backspace is checked, it will no longer be possible to
+restart X server using Ctrl+Alt+Backspace keys.
Graphic card options: Allows you to enable or disable
+three specific features depending on the graphic card.
Graphical interface at startup: Most of the time,
+Automatically start the graphical interface (Xorg) upon
+booting is checked to make the boot switch to graphical mode, it
+may be unchecked for a server.
After a click on the Quit button, the system will ask
+you to confirm. There is still time to cancel everything and keep the
+previous configuration, or to accept. In this case, you have to disconnect
+and reconnect to activate the new configuration.
[14] You can start this tool from the command line, by typing
+XFdrake as normal user or drakx11
+as root. Mind the capital letters.
Accedi ai dispositivi e alle directory condivisi tramite WebDAV Condivisioni di rete
Accedi ai dispositivi e alle directory condivisi tramite WebDAV
diskdrake --dav
Questo strumento[39] lo trovi nel Centro di
+Controllo di Mageia, nel tab Condivisioni di rete, etichettato
+Configura condivisioni WebDAV.
Introduzione
WebDAV è un
+protocollo che consente di montare un directory di un server web localmente,
+così che questo appaia come una directory locale. E' necessario che la
+macchina remota abbia in esecuzione un server WebDAV. Lo scopo di questo
+strumento non è quello di configurare il server WebDAV.
Crea una nuova voce
La prima schermata dello strumento mostra le voci già configurate, se
+presenti, e un pulsante Nuova. Usalo per creare una
+nuova voce. Inserisci l'URL del server nel campo della nuova schermata.
Raggiungerai quindi una schermata con alcuni pulsanti radio per selezionare
+alcune azioni. Continua con l'azione Punto di mount
+cliccando OK dopo aver selezionato il pulsante radio,
+in quanto il Server è già configurato. Potrai
+comunque correggerlo, se necessario.
Il contenuto della directory remota risulterà accessibile tramite questo
+punto di montaggio.
Nella fase successiva, inserisci il tuo nome utente e la password. Se
+necessiti altre opzioni, puoi darle nella schermata
+avanzate.
L'opzione Monta ti permette di montare immediatamente
+l'accesso.
Dopo aver accettato la configurazione con il pulsante radio
+Fatto, la prima schermata viene mostrata nuovamente
+ed il tuo nuovo punto di montaggio viene elencato. Dopo aver premuto
+Chiudi, ti viene chiesto se salvare o non salvare le
+modifiche in /etc/fstab. Scegli questa opzione se vuoi
+che la directory remota sia disponibile ad ogni avvio. Se la tua
+configurazione vale per un solo utilizzo, non salvarla.
[39] Puoi avviare questo strumento dalla riga di comando, digitando diskdrake --dav come root.
Condividi le tue partizioni del disco fisso Dischi locali
Condividi le tue partizioni del disco fisso
diskdrake --fileshare
Questo semplice strumento[42] consente a
+te, amministratore, di autorizzare gli utenti a condividere parti delle
+proprie sottodirectory in /home con altri utenti della stessa rete locale
+che potrebbero avere computers su cui gira il sistema operativo Linux o
+Windows.
Si trova nel Centro di Controllo di Mageia, nella scheda Dischi Locali,
+etichettata "Condividi le partizioni del disco fisso".
Primo, rispondi alla domanda: "Vuoi consentire agli utenti di
+condividere alcune delle loro directory ?", clicca su
+Nessuna condivisione se la risposta è no per tutti
+gli utenti, clicca su Permetti a tutti gli utenti per
+tutti gli utenti e clicca su Personalizzato se la
+risposta è no per alcuni utenti e sì per altri. In questo ultimo caso, gli
+utenti che sono autorizzati a condividere le proprie directory devono
+appartenere al gruppo fileshare, che è automaticamente creato dal
+sistema. Verrai interrogato successivamente in merito a questo aspetto.
Clicca su OK, una seconda schermata apparirà
+proponendoti di scegliere tra NFS o
+SMB. Spunta NFS se Linux è
+l'unico sistema operativo sulla rete, spunta SMB se
+la rete include sia macchine Linux che macchine Windows e quindi clicca su
+OK. I pacchetti richiesti verranno installati se
+necessario.
La configurazione è ora completa a meno che non sia stata scelta l'opzione
+Personalizzato. In questo caso una schermata extra ti domanderà di avviare
+Userdrake. Questo strumento ti consente di aggiungere gli utenti autorizzati
+a condividere le loro directory al gruppo fileshare. Nella scheda Utente,
+clicca sull'utente per aggiungerlo al gruppo fileshare, quindi su
+Modifica, nella scheda Gruppi. Spunta il gruppo
+fileshare e clicca su OK. Per ulteriori informazioni
+su Userdrake, guarda questa pagina
Nota
Quando si aggiunge un nuovo utente al gruppo fileshare, devi disconnettere e
+riconnettere la rete affinché le modifiche vengano prese in considerazione.
D'ora in poi ogni utente appartenente al gruppo fileshare potrà selezionare
+nel suo gestore di file le directory da condividere, sebbene non tutti i
+gestori di file forniscono questa funzionalità.
[42] Puoi avviare questo strumento dalla riga di comando digitando diskdrake --fileshare come root.
Accedi a dischi e cartelle in condivisione NFS Condivisioni di rete
Accedi a dischi e cartelle in condivisione NFS
diskdrake --nfs
.
Introduzione
Questo strumento[37] ti consente di
+dichiarare alcune cartelle condivise come accessibili a tutti gli utenti
+sulla macchina. Il protocollo utilizzato é NFS, disponibile sulla maggior
+parte dei sistemi Linux e Unix. La cartella condivisa sarà quindi
+disponibile direttamente all'avvio. Le cartelle condivise possono essere
+anche accessibili direttamente in una singola sessione per un utente con
+strumenti quali i file browser.
Procedura
Seleziona cerca server per ottenere una lista dei
+server che condividono directory.
Clicca sul simbolo > prima del nome del server per visualizzare la lista
+delle directory condivise e seleziona la directory cui vuoi accedere.
Il pulsante Punto di mount diventerà disponibile e
+dovrai specificare dove montare la directory.
Dopo aver scelto il punto di mount, puoi montarlo. Puoi anche verificare e
+cambiare qualche opzione con il pulsante
+Opzioni. Dopo aver montato la directory puoi
+smontarla usando lo stesso pulsante.
Accettando la configurazione con il pulsante Fatto,
+un messaggio verrà mostrato, domandando "Vuoi salvare le modifiche a
+/etc/fstab". Questo passaggio renderà la cartella disponibile ad ogni avvio,
+se la rete sarà accessibile. La nuova cartella sarà inoltre visibile nel tuo
+file browser, per esempio Dolphin.
[37] Puoi avviare questo strumento dalla riga di comando digitando diskdrake --nfs come root.
This tool [41]is found under the tab Local
+disks in the Mageia Control Center labelled accordingly with your removable
+hardware (CD/DVD players and burners and floppy drives only).
Its goal is to define the way your removable disk is mounted.
At the top of the window there is a short description of your hardware and
+the chosen options to mount it. Use the menu on the bottom to change
+them. Check the item to be changed and then on the OK
+button.
Punto di mount
Check this box to change the mount point. The default one is /media/cdrom.
Opzioni
Many mount options can be chosen here either directly in the list or via the
+Advanced submenu. The main are:
user/nouser
user allows an ordinary user (not root) to mount the removable disk, this
+option involves noexec, nosuid and nodev. The user who mounted the disk is
+the only one who can umount it.
[41] You can start this tool from the command line, by typing diskdrake --removable as root.
Accedi a dischi e cartelle condivise con Windows (SMB) Condivisioni di rete
Accedi a dischi e cartelle condivise con Windows (SMB)
diskdrake --smb
Introduzione
This tool[35] allows you to declare which
+shared directories to be accessible to all users on the machine. The
+protocol used for this is SMB which has been popularized on Windows(R)
+systems. The shared directory will be available directly at boot. Shared
+directories can be also accessed directly in a single session by a user with
+tools such as file browsers.
Select search servers to obtain a list of servers who
+share directories.
Click on the server name and on > before the server name to display the
+list of the shared directories and select the directory you want to access.
The Mount point button will become available, you
+have to specify where to mount the directory.
After choosing the mount point, it can be mounted with the Mount
+button. You can also verify and change some options with the
+Options button.
In options, you can specify the user name and the password of those able to
+connect to the SMB server. After mounting the directory, you can unmount it
+with the same button.
After accepting the configuration with the Done button, a message will ask
+"Do you want to save the /etc/fstab modifications". Saving, will allow
+directory to made available at each boot, if the network is accessible. The
+new directory is then available in your file browser, for example in
+dolphin.
[35] You can start this tool from the command line, by typing diskdrake --smb as root.
This tool[13] lets you manage the 3D
+desktop effects on your operating system. 3D effects are turned off by
+default.
Iniziamo
To use this tool, you need to have the glxinfo package installed. If the
+package is not installed, you will be prompted to do so before drak3d can
+start.
After starting drak3d, you will be presented with a menu window. Here you
+can choose either No 3D Desktop Effects or
+Compiz Fusion. Compiz Fusion is part of a
+composite/window manager, which includes hardware-accelerated special
+effects for your desktop. Choose Compiz Fusion to turn
+it on.
If this is your first time using this program after a clean installation of
+Mageia, you will get a warning message telling you which packages need to be
+installed in order to use Compiz Fusion. Click on the
+Ok button to continue.
Once the appropriate packages are installed, you will notice that Compiz
+Fusion is selected in the drak3d menu, but you must log out and log back in
+for the changes to take effect.
After logging back in, Compiz Fusion will be activated. To configure Compiz
+Fusion, see the page for the ccsm (CompizConfig Settings Manager) tool.
Risoluzione problemi
Non vedo lo schermo dopo il log in
If after turning on Compiz Fusion you attempt to log back into your desktop
+but can't see anything, restart your computer to get back to the log in
+screen. Once there, click on the Desktop icon and select drak3d.
When you log in, if your account is listed as an administrator, you will be
+prompted for your password again. Otherwise, use the administrator login
+with his/her account. Then you can undo any changes that may have caused the
+log in problem.
[13] You can start this tool from the command line, by typing drak3d as root.
This tool[26] enables you to modify the
+manner in which you can be recognized as user of the machine or on the net.
By default, information for your authentication is stored in a file on your
+computer. Modify it only if your network administrator invites you to do so
+and give information about that.
[26] You can start this tool from the command line, by typing drakauth as root.
If you are using an UEFI system, the user interface is slightly different as
+you cannot choose the boot loader (first drop down list) since only one is
+available.
this tool[48] allows you to configure the
+boot options (choice of the bootloader, set a password, the default boot,
+etc.)
It is found under the Boot tab in the Mageia Control Center labelled "Set up
+boot system".
Avvertimento
Don't use this tool if you don't know exactly what you are doing. Changing
+some settings may prevent your machine from booting again !
In the first part, called Bootloader, it is possible to
+choose which Bootloader to use, Grub or Lilo, and
+with a graphical or a text menu. It is just a question of taste, there are
+no other consequences. You can also set the Boot
+device, don't change anything here unless you are an expert. The
+boot device is where the bootloader is installed and any modification can
+prevent you machine from booting.
In the second part, called Main options, you can set
+the Delay before booting default image, in
+seconds. During this delay, grub or Lilo will display the list of available
+operating systems, prompting you to make your choice, if no selection is
+made, the bootloader will boot the default one once the delay elapses.
In the third and last part, called Security, it is
+possible to set a password.
The Advanced button gives some extra options.
Enable ACPI:
ACPI (Advanced Configuration and Power Interface) is a standard for the
+power management. It can save energy by stopping unused devices, this was
+the method used before APM. Check this box if your hardware is ACPI
+compatible.
Abilita SMP:
SMP stands for Symmetric Multi Processors, it's an architecture for
+multicore processors.
Nota
If you have a processor with HyperThreading, Mageia will see it as a dual
+processor and enable SMP.
Enable APIC and Enable Local
+APIC:
APIC stands for Advanced Programmable Interrupt Controller. There are two
+components in the Intel APIC system, the local APIC (LAPIC) and the I/O
+APIC. This one routes the interrupts it receives them from peripheral buses
+to one or more local APICs that are in the processor. It is really useful
+for multi-processor systems. Some computers have problems with the APIC
+system which can cause freezes or incorrect device detection (error message
+"spurious 8259A interrupt: IRQ7"). In this case, disable APIC and/or Local
+APIC.
In the Next screen, you can see the list of all the
+available entries at boot time. The default one is asterisked. To change the
+order of the menu entries, click on the up or down arrows to move the
+selected item. If you click on the Add or
+Modify buttons, a new window appears to add a new
+entry in the Grub menu or to modify an existing one. You need to be familiar
+with Lilo or Grub to be able to use these tools.
The Label field is freeform, write here what you want
+to be displayed in the menu. It matches the Grub command "title". For
+example: Mageia3.
The Image field contains the kernel name. It matches
+the Grub command "kernel". For example /boot/vmlinuz.
The Root field contains the device name where the
+kernel is stored. It matches the Grub command "root". For example (hd0,1).
The Append field contains the options to be given to
+the kernel at boot time.
If the box Default is checked, Grub will boot this
+entry by default.
This tool[47] allows you to automatically
+login the same user, in her/his desktop environment, without asking for any
+password. It's called autologin. This is generally a good idea when there
+is only one user like to be using the machine.
It is found under the Boot tab in the
+Mageia Control Center labelled "Set up autologin to automatically log in".
I bottoni di interfaccia sono piuttosto semplici:
Check Launch the graphical environment when your system
+starts, if you want X Window System to be executed after the
+boot. If not, the system will start in text mode. Nevertheless, it will be
+possible to launch the graphic interface manually. This can be done by
+launching the command 'startx' or 'systemctl start dm'.
If the first box is checked, two other options are available, check either
+No, I don't want autologin, if you want the system to
+continue to ask for which user to connect (and password) or check
+Yes, I want autologin with this (user, desktop), if
+needed. In this case, you also need to supply the Default
+username and the Default desktop.
[47] You can start this tool from the command line, by typing drakboot as root.
Strumento per la segnalazione di bug di Mageia Altri strumenti di Mageia
Strumento per la segnalazione di bug di Mageia
drakbug
Usually, this tool[50] starts automatically
+when a Mageia tool crashes. However, it is also possible that, after filing
+a bug report, you are asked to start this tool to check some of the
+information it gives, and then provide that in that existing bug report.
If a new bug report needs to be filed and you are not used to doing that,
+then please read How to
+report a bug report properly before clicking on the "Report" button.
In case the bug has already been filed by someone else (the error message
+that drakbug gave will be the same, then), it is useful to add a comment to
+that existing report that you saw the bug, too.
[50] You can start this tool from the command line, by typing drakbug.
Collect Logs and System Information for Bug Reports Altri strumenti di Mageia
Collect Logs and System Information for Bug Reports
drakbug_report
This tool[51] can only be started and used
+on the command line.
It is advised to write the output of this command to a file, for instance by
+doing drakbug_report > drakbugreport.txt,
+but make sure you have enough disk space first: the file can easily be
+several GBs large.
Nota
The output is far too large to attach to a bug report without first removing
+the unneeded parts.
This command collects the following information on your system:
lspci
pci_devices
dmidecode
fdisk
scsi
/sys/bus/scsi/devices
lsmod
cmdline
pcmcia: stab
usb
partizioni
cpuinfo
syslog
Xorg.log
monitor_full_edid
stage1.log
ddebug.log
install.log
fstab
modprobe.conf
lilo.conf
grub: menu.lst
grub: install.sh
grub: device.map
xorg.conf
urpmi.cfg
modprobe.preload
sysconfig/i18n
/proc/iomem
/proc/ioport
Versione di Mageia
rpm -qa
df
Nota
At the time this help page was written, the "syslog" part of this command's
+output was empty, because this tool had not yet been adjusted to our switch
+to systemd. If it is still empty, you can retrieve the "syslog" by doing (as
+root) journalctl -a > journalctl.txt. If
+you don't have a lot of diskspace, you can, for instance, take the last 5000
+lines of the log instead with: journalctl -a | tail
+-n5000 > journalctl5000.txt.
[51] You can start this tool from the command line, by typing drakbug_report as root.
This tool[28] is found under the tab System
+in the Mageia Control Center labelled "Manage date and
+time". In some desktop environments it is also available by a
+right click / Adjust date and Time ... on the clock in the system tray.
E' uno strumento molto semplice da usare.
On the upper left part, is the calendar. On
+the screenshot above, the date is September (on the upper left), 2012 (on
+the upper right), the 2nd (in blue) and it is a Sunday. Select the month
+(or year) by clicking on the little arrows on each side of September (or
+2012). Select the day by clicking on its number.
On the bottom left is the Network Time
+Protocol synchronising, it is possible to have a clock always on
+time by synchronising it with a server. Check Enable Network Time
+Protocol and choose the closest server.
On the right part is the clock. It's
+useless to set the clock if NTP is enabled. Three boxes display hours,
+minutes and seconds (15, 28 and 22 on the screenshot). Use the little arrows
+to set the clock to the correct time. The format can't be changed here, see
+your desktop environment settings for that.
At least, on the bottom right, select your time zone by clicking on the
+Change Time Zone button and choosing in the list the
+nearest town.
Nota
Even if it isn't possible to choose a date or time format in this tool, they
+will be displayed on your desktop in accordance with the localisation
+settings.
[28] You can start this tool from the command line, by typing drakclock as root.
Configura una nuova interfaccia di rete (lan, adsl, wifi...) Rete e internet
Configura una nuova interfaccia di rete (lan, adsl, wifi...)
drakconnect
Introduzione
This tool[20] allows to configure much of
+local network or Internet access. You have to know some information from
+your access provider or your network administrator.
Select the type of connection you want to set, according to which hardware
+and provider you have.
A new Wired connection (Ethernet)
The first window lists the interfaces which are available. Select the one
+to configure.
At this point, the choice is given between an automatic or a manual IP
+address.
IP automatico
Ethernet/IP settings: you have to select if DNS servers
+are declared by the DHCP server or are manually specified, as explained
+below. In the last case, the IP address of DNS servers has to be set. The
+HOSTNAME of the computer can be specified here. If no HOSTNAME is specified,
+the name localhost.localdomain is attributed by default.
+The Hostname can also be provided by the DHCP server with the option
+Assign host name from DHCP server. Not all DHCP servers
+have such a function and if you're setting up your PC to get an IP address
+from a domestic ADSL router, it is unlikely.
The advanced button give the opportunity to specify:
Search domain (not accessible, as provided by the DHCP server)
il client DHCP
DHCP timeout
Get YP server from DHCP (checked by default): specify the NIS server
Get NTPD server from DHCP (synchronisation of clocks)
the HOSTNAME required by DHCP. Only use this option if the DHCP server
+requires the client to specify a hostname before receiving an IP
+address. This option is not dealt by some DHCP servers.
Ethernet/IP settings: you need to declare what DNS
+servers to use. The HOSTNAME of the computer can be specified here. If no
+HOSTNAME is specified, the name localhost.localdomain is
+attributed by default.
For a residential network, the IP address usually looks like
+192.168.x.x, Netmask is
+255.255.255.0, and the Gateway and DNS servers are
+available from your service provider's website.
In advanced settings, you can specified a Search
+domain. It would usually be your home domain, i.e. if your
+computer is called "splash", and it's full domain name is
+"splash.boatanchor.net", the Search Domain would be "boatanchor.net". Unless
+you specifically need it, it's ok not to define this setting. Again,
+domestic ADSL would not need this setting.
This section hasn't been written yet for lack of resources. If you think you
+can write this help, please contact the Doc
+team. Thanking you in advance.
A new Cable modem connection
The first window lists the interfaces which are available. Select the one
+to configure.
At this point, the choice is given between an automatic or a manual IP
+address.
You have to specify a authentication method:
Nessuno
BPALogin (necessary for Telstra). In this case you have to provide User name
+and password.
IP automatico
Cable/IP settings: you have to select if DNS servers
+are declared by the DHCP server or are manually specified, as explained
+below. In the last case, the IP address of DNS servers has to be set. The
+HOSTNAME of the computer can be specified here. If no HOSTNAME is specified,
+the name localhost.localdomain is attributed by default.
+The Hostname can also be provided by the DHCP server with the option
+Assign host name from DHCP server. Not all DHCP servers
+have such a function and if you're setting up your PC to get an IP address
+from a domestic ADSL router, it is unlikely.
The advanced button give the opportunity to specify:
Search domain (not accessible, as provided by the DHCP server)
il client DHCP
DHCP timeout
Get YP server from DHCP (checked by default): specify the NIS server
Get NTPD server from DHCP (synchronisation of clocks)
the HOSTNAME required by DHCP. Only use this option if the DHCP server
+requires the client to specify a hostname before receiving an IP
+address. This option is not dealt by some DHCP servers.
Cable/IP settings: you need to declare what DNS servers
+to use. The HOSTNAME of the computer can be specified here. If no HOSTNAME
+is specified, the name localhost.localdomain is
+attributed by default.
For a residential network, the IP address usually looks like
+192.168.x.x, Netmask is
+255.255.255.0, and the Gateway and DNS servers are
+available from your service provider's website.
In advanced settings, you can specified a Search
+domain. It would usually be your home domain, i.e. if your
+computer is called "splash", and it's full domain name is
+"splash.boatanchor.net", the Search Domain would be "boatanchor.net". Unless
+you specifically need it, it's ok not to define this setting. Again,
+domestic connection would not need this setting.
If the tool detects network interfaces, it offers to select one and to
+configure it.
A list of providers is proposed, classified by countries. Select your
+provider. If it is not listed, select the option
+Unlisted and then enter the options your provider gave.
A list of hardware is proposed, classified by category and
+manufacturer. Select your card.
Seleziona uno dei protocolli disponibili:
Protocol for the rest of the world, except Europe (DHCP)
Protocol for Europe (EDSS1)
A list of providers is then offered, classified by countries. Select your
+provider. If it is not listed, select the option
+Unlisted and then enter the options your provider gave
+you. Then it is asked for parameters:
Nome connessione
Numero telefonico
ID di accesso
Password dell'account
Metodo autenticazione
After that, you have to select if you get the IP address by automatic or
+manual method. In the last case, specify IP address and Subnet mask.
The next step is to choose how DNS servers address are obtained, by
+automatic or manual method. In the case of manual configuration, you have to
+put:
Nome dominio
Primo e secondo DNS Server
Select if the hostname is set from IP. This option is to select only if you
+are sure that your provider is configured to accept it.
The next step is to choose how the gateway address is obtained, by automatic
+or manual method. In the case of manual configuration, you have to enter the
+IP address.
A first window lists the interfaces which are available and an entry for
+Windows driver (ndiswrapper). Select the one to configure. Use ndiswrapper
+only if the other configuration methods did not work.
At this step, the choice is given between the different access points that
+the card has detected.
Specific parameter for the wireless card are to provide:
Operating mode:
Con access point (Managed)
Per accedere ad un punto di accesso esistente (il più frequente).
Ad-Hoc
Per configurare una connessione diretta fra computers.
Nome del network (ESSID)
Encryption mode: it depends of how the access point is configured.
WPA/WPA2
Questa modalità di crittografia è da preferire se il tuo hardware te lo
+consente.
WEP
Alcuni vecchi hardware funzionano solo con questo metodo di crittografia.
Chiave di cifratura
E' solitamente fornito con l'hardware che da il punto di accesso.
A questo punto la scelta è tra un indirzzo IP automatico oppure un indirizzo
+IP manuale.
IP automatico
IP settings: you have to select if DNS servers are
+declared by the DHCP server or are manually specified, as explained
+below. In the last case, IP address of DNS servers has to be set. The
+HOSTNAME of the computer can be specified here. If no HOSTNAME is
+specified, the name localhost.localdomain is attributed by default. The
+Hostname can also be provided by the DHCP server with the option
+Assign host name from DHCP server
The advanced button give the opportunity to specify:
Search domain (not accessible, as provided by the DHCP server)
il client DHCP
DHCP timeout
Get YP server from DHCP (checked by default): specify the NIS servers
Get NTPD server from DHCP (synchronisation of clocks)
the HOSTNAME required by DHCP. Only use this option if the DHCP server
+requires the client to specify a hostname before receiving an IP
+address. This option is not dealt by some DHCP servers.
IP settings: you have to declare DNS servers. The
+HOSTNAME of the computer can be specified here. If no HOSTNAME is specified,
+the name localhost.localdomain is attributed by default.
For a residential network, the IP address always looks like
+192.168.x.x, Netmask is
+255.255.255.0, and the Gateway and DNS servers are
+available from your providers website.
In advanced settings, you can specified a Search
+domain. It must seem to your hostname without the first name,
+before the period.
Se lo strumento trova un'interfaccia wireless, da l'oppurtinità di
+selezionarne una e di configurarla.
The PIN is asked. Leave empty if the PIN is not required.
The wizard asks for network. If it is not detected, select the option
+Unlisted.
A list of providers is proposed, classified by countries. Select your
+provider. If it is not listed, select the option
+Unlisted and then enter the options your provider gave.
Una nuova connessione Bluetooth Dial-UP Networking
This section hasn't been written yet for lack of resources. If you think you
+can write this help, please contact the Doc
+team. Thanking you in advance.
A new Analog telephone modem connection (POTS)
The wizard asks which device to configure:
Scelta manuale
Hardware identificato, se esistente.
Una lista di porte è proposta. Seleziona la tua.
If not yet installed, it will be suggested that you install the package
+kppp-provider.
A list of providers is proposed, classified by countries. Select your
+provider. If it is not listed, select the option
+Unlisted and then enter the options your provider
+gave. Then it is asked for Dialup options:
Allow interface to be controlled by Network Manager
In the case of a wireless connection, a supplemental box is Allow
+access point roaming which give the possibility to switch
+automatically between access point according to the signal strength.
With the advanced button, you can specify:
Metric (10 by default)
MTU
Collegamento a caldo della rete
Attiva istradamento IPV6 su IPV4
The last step allows you to specify if the connection is to start
+immediately or not.
[20] You can start this tool from the command line, by typing drakconnect as root.
This tool[40] is very powerful, a tiny
+error or a cat jumping on your keyboard can lead to losing all data on a
+partition or even to erasing the entire hard disk. For that reason, you'll
+see the screen above on top of the tool screen. Click on
+Exit if you're not sure you want to continue.
If you have more than one hard disk, you can switch to the hard disk you
+want to work on by selecting the correct tab (sda, sdb, sdc etc).
You can choose from many actions to adjust your hard disk to your
+preferences. Wiping an entire hard disk, splitting or merging partitions,
+resizing them or changing the filesystem, formatting or viewing what is in a
+partition: it is all possible. The Clear
+all button at the bottom is to erase the complete
+disk, the other buttons become visible on the right after you click on a
+partition.
If the selected partition is mounted, like in the example below, you cannot
+choose to resize, format or delete it. To be able to do that the partition
+must be unmounted first.
It is only possible to resize a partition on its right side
To change a partition type (change ext3 to ext4 for example) you have to
+delete the partition and then re-create it with the new type. The button
+Create appears when a disk empty part is
+selected
You can choose a mount point that doesn't exist, it will be created.
Selecting Toggle to expert mode
+gives some extra available actions, like labelling the partition, as can be
+seen in the screenshot below.
[40] You can start this tool from the command line, by typing drakdisk or diskdrake as root.
Here[49] you can choose which display
+manager to use to log into your desktop environment. Only the ones available
+on your system will be shown.
Most users will only notice that the provided login screens look
+different. However, there are differences in supported features, too. LXDM
+is a lightweight display manager, KDM and GDM have more extras.
[49] You can start this tool from the command line, by typing drakedm as root.
This tool[44] is found under the Security
+tab in the Mageia Control Center labelled "Set up your personal
+firewall". It is the same tool in the first tab of "Configure system
+security, permissions and audit".
A basic firewall is installed by default with Mageia. All the incoming
+connections from the outside are blocked if they aren't authorised. In the
+first screen above, you can select the services for which outside connection
+attempts are accepted. For your security, uncheck the first box -
+Everything (no firewall) - unless you want to disable
+the firewall, and only check the needed services.
It is possible to manually enter the port numbers to open. Click on
+Advanced and a new window is opened. In the field
+Other ports, enter the needed ports following these
+examples :
80/tcp : open the port 80 tcp protocol
24000:24010/udp : open all the ports from 24000 to 24010 udp protocol
The listed ports should be separated by a space.
If the box Log firewall messages in system logs is
+checked, the firewall messages will be saved in system logs
Nota
If you don't host specific services (web or mail server, file sharing, ...)
+it is completely possible to have nothing checked at all, it is even
+recommended, it won't prevent you from connecting to the internet.
The next screen deals with the Interactive Firewall options. These feature
+allow you to be warned of connection attempts if at least the first box
+Use Interactive Firewall is checked. Check the second
+box to be warned if the ports are scanned (in order to find a failure
+somewhere and enter your machine). Each box from the third one onwards
+corresponds to a port you opened in the two first screens; in the screenshot
+below, there are two such boxes: SSH server and 80:150/tcp. Check them to be
+warned each time a connection is attempted on those ports.
These warning are given by alert popups through the network applet.
In the last screen, choose which network interfaces are connected to the
+Internet and must be protected. Once the OK button is clicked, the necessary
+packages are downloaded.
Suggerimento
If you don't know what to choose, have a look in MCC tab Network &
+Internet, icon Set up a new network interface.
[44] You can start this tool from the command line, by typing drakfirewall as root.
diff --git a/mcc/5/it/content/drakfont.html b/mcc/5/it/content/drakfont.html
new file mode 100644
index 00000000..ecc4693a
--- /dev/null
+++ b/mcc/5/it/content/drakfont.html
@@ -0,0 +1,48 @@
+
+
+
+
+ Gestisci tipi di caratteri. Importa tipi di caratteri da Windows (TM)
Gestisci tipi di caratteri. Importa tipi di caratteri da Windows (TM) Sistema
Gestisci tipi di caratteri. Importa tipi di caratteri da Windows (TM)
drakfont
This tool[27] is present in the Mageia
+Control Center under the System tab. It
+allows you to manage the fonts available on the computer. The main screen
+above shows:
the installed font names, styles and sizes.
un'anteprima del font selezionato.
some buttons explained here later.
Get Windows Fonts:
This button automatically adds the fonts found on the Windows partition. You
+must have Microsoft Windows installed.
Opzioni:
It allows you to specify the applications or devices (printers mostly) able
+to use the fonts.
Disinstalla:
This button is to remove installed fonts and possibly save some place. Be
+careful when removing fonts because it may have serious consequences on the
+documents that use them.
Importa:
Allows you to add fonts from a third party (CD, internet, ...). The
+supported formats are ttf, pfa, pfb, pcf, pfm and gsf. Click on the
+Import button and then on Add, a file manager pops up where you can select the
+fonts to install, click on Install when
+done. They are installed in the folder /usr/share/fonts.
If the newly installed (or removed) fonts doesn't appear in the Drakfont
+main screen, close and re open it to see the modifications.
[27] You can start this tool from the command line, by typing drakfont as root.
This tool[46] is found in the Mageia
+Control Center, under the Security tab, labelled Parental
+Control. If you don't see this label, you have to install the
+drakguard package (not installed by default).
Presentazione
Drakguard is an easy way to set up parental controls on your computer to
+restrict who can do what, and at which times of day. Drakguard has three
+useful capabilities:
It restricts web access to named users to set times of day. It does this by
+controlling the shorewall firewall built into Mageia.
It blocks execution of particular commands by named users so these users can
+only execute what you accept them to execute.
It restricts access to websites, both manually defined through
+blacklists/whitelists, but also dynamically based on the content of the
+website. To achieve this Drakguard uses the leading opensource parental
+control blocker DansGuardian.
Configuring Parental controls
Avvertimento
If your computer contains hard drive partitions that are formatted in Ext2,
+Ext3, or ReiserFS format you will see a pop up offering to configure ACL on
+your partitions. ACL stands for Access Control Lists, and is a Linux kernel
+feature that allows access to individual files to be restricted to named
+users. ACL is built into Ext4 and Btrfs file systems, but must be enabled by
+an option in Ext2, Ext3, or Reiserfs partitions. If you select 'Yes' to this
+prompt drakguard will configure all your partitions to support ACL, and will
+then suggest you reboot.
Enable parental control: If checked, the parental
+control is enabled and the access to Block programs tab
+is opened.
Block all network traffic: If checked, all the
+websites are blocked, except the ones in the whitelist tab. Otherwise, all
+the websites are allowed, except the ones in the blacklist tab.
User access: Users on the left hand side will have
+their access restricted according to the rules you define. Users on the
+right hand side have unrestricted access so adult users of the computer are
+not inconvenienced. Select a user in the left hand side and click on
+Add to add him/her as an allowed user. Select an
+user in the right hand side and click on Remove to
+remove him/her from the allowed users.
Time control: If checked, internet access is allowed
+with restrictions between the Start time and
+End time. It is totally blocked outside these time
+window.
Blacklist/Whitelist tab
Enter the website URL in the first field at the top and click on the
+Add button.
Block Programs Tab
Block Defined Applications: Enables the use of ACL to
+restrict access to specific applications. Insert the path to the
+applications you wish to block.
Unblock Users list: Users listed on the right hand
+side will not be subject to acl blocking.
[46] You can start this tool from the command line, by typing drakguard as root.
Condividi la connessione Internet con altre macchine locali Rete e internet
Condividi la connessione Internet con altre macchine locali
drakgw
Principi
This is useful when you have a
+computer (3) which has Internet (2) access and is connected also to a local
+network (1). You can use computer (3) as a gateway to give that access to
+other workstations (5) and (6) in the local network (1). For this, the
+gateway must have two interfaces; the first one such as an ethernet card
+must be connected to the local network, and the second one (4) connected to
+the Internet (2).
The wizard[23] offers successive steps
+which are shown below:
If the wizard does not detect at least two interfaces, it warns about this
+and asks to stop the network and configure the hardware.
specify the interface used for the Internet connection. The wizard
+automatically suggests one of the interfaces, but you should verify that
+what is proposed is correct.
specify which interface is used for the Lan access. The wizard also proposes
+one, check that this is correct.
The wizard proposes parameters for the Lan network, such as IP address, mask
+and domain name. Check that these parameters are compatible with the actual
+configuration. It is recommended that you accept these values.
specify if the computer has to be used as a DNS server. If yes, the wizard
+will check that bind is installed. Otherwise, you have to
+specify the address of a DNS server.
specify if the computer is to be used as a DHCP server. If yes, the wizard
+will check that dhcp-server is installed and offer to configure
+it, with start and end addresses in the DHCP range.
specify if the computer is to be used as a proxy server. If yes, the wizard
+will check that squid is installed and offer to configure it,
+with the address of the administrator (admin@mydomain.com), name of the
+proxy (myfirewall@mydomaincom), the port (3128) and the cache size (100 Mb).
The last step allows you to check if the gateway machine is connected to
+printers and to share them.
You will be warned about the need to check the firewall if it is active.
Configura il client
If you have configured the gateway machine with DHCP, you only need to
+specify in the network configuration tool that you get an address
+automatically (using DHCP). The parameters will be obtained when connecting
+to the network. This method is valid whatever operating system the client is
+using.
If you must manually specify the network parameters, you must in particular
+specify the gateway by entering the IP-address of the machine acting as the
+gateway.
Stop connection sharing
If you want to stop sharing the connection on the Mageia computer, launch
+the tool. It will offer to reconfigure the connection or to stop the
+sharing.
[23] You can start this tool from the command line, by typing drakgw as root.
If some systems on your network grant you services, and have fixed
+IP-addresses, this tool[25] allows to
+specify a name to access them more easily. Then you can use that name
+instead of the IP-address.
Aggiungi
With this button, you add the name for a new system. You will get a window
+to specify the IP-address, the host name for the system, and optionally an
+alias which can be used in the same way that the name is.
Modifica
You can access the parameters of an entry previously defined. You get the
+same window.
[25] You can start this tool from the command line, by typing drakhosts as root.
diff --git a/mcc/5/it/content/drakinvictus.html b/mcc/5/it/content/drakinvictus.html
new file mode 100644
index 00000000..edb92049
--- /dev/null
+++ b/mcc/5/it/content/drakinvictus.html
@@ -0,0 +1,38 @@
+
+
+
+
+ Impostazioni avanzate per le interfacce di rete ed il firewall
This tool[19] is found under the Network
+& Internet tab in the Mageia Control Center labelled "Network Center"
Introduzione
When this tool is launched, a window opens listing all the networks
+configured on the computer, whatever their type (wired, wireless, satellite,
+etc.). When clicking on one of them, three or four buttons appear, depending
+on the network type, to allow you to look after the network, change its
+settings or connect/disconnect. This tool isn't intended to create a
+network, for this see Set up a new network interface (LAN, ISDN,
+ADSL, ...) in the same MCC tab.
In the screenshot below, given as example, we can see two networks, the
+first one is wired and connected, recognizable by this icon (this one is not connected ) and the second section shows wireless
+networks, not connected recognizable by this icon and this one if connected. For the other network types,
+the colour code is always the same, green if connected and red if not
+connected.
In the wireless part of the screen, you can also see all the detected
+networks, with the SSID, the Signal
+strengh, if they are encrypted (in red) or not (in green), and
+the Operating mode. Click on the chosen one and then
+either on Monitor, Configure
+or Connect. It is possible here to go from a network
+to another one. If a private network is selected, the Network Settings
+window (see below) will open and ask you for extra settings ( an encryption
+key in particular).
Click on Refresh to update the screen.
The Monitor button
This button allows you to watch the network activity, downloads (toward the
+PC, in red) and uploads (toward the Internet, in green). The same screen is
+available by right clicking on the Internet icon in the system tray
+-> Monitor Network.
There is a tab for each network (here eth0 is the wired network, lo the
+local loopback and wlan0 the wireless network) and a tab connection which
+gives details about connection status.
Nota
At the bottom of the window is a title Traffic
+accounting, we will look at that in the next section.
Il pulsante Configura
A - Per una rete cablata
It is possible to change all the settings given during network
+creation. Most of the time, checking Automatic IP
+(BOOTP/DHCP) will do, but in case of problems, manual
+configuration may give better results.
For a residential network, the IP address always looks
+like 192.168.0.x, Netmask is 255.255.255.0, and the
+Gateway and DNS servers are
+available from your providers website.
Enable traffic accounting if checked this will count
+the traffic on a hourly, daily or monthly basis. The results are visible in
+the Network monitor detailed in the previous section. Once enabled, you may
+have to reconnect to the network.
Allow interface to be controlled by Network
+Manager:
This section hasn't been written yet for lack of resources. If you think you
+can write this help, please contact the Doc
+team. Thanking you in advance.
The button Advanced:
This section hasn't been written yet for lack of resources. If you think you
+can write this help, please contact the Doc
+team. Thanking you in advance.
B - For a wireless network
Only the items not already seen above are explained.
Operating mode:
Select Managed if the connection is via an access
+point, there is an ESSID detected. Select
+Ad-hoc if it is a peer to peer network. Select
+Master if your network card is used as the
+access point, your network card needs to support this mode.
Encryption mode and Encryption key:
If it is a private network, you need to know these settings.
WEP uses a password and is weaker than WPA which uses a
+passphrase. WPA Pre-Shared Key is also called WPA
+personal or WPA home. WPA Enterprise is not often used
+in private networks.
Allow access point roaming:
Roaming is a technology which enables allows computer to change its access
+point while remaining connected to the network.
The button Advanced:
This page hasn't been written yet for lack of resources. If you think you
+can write this help, please contact the Doc
+team. Thanking you in advance.
The Advanced Settings button
This section hasn't been written yet for lack of resources. If you think you
+can write this help, please contact the Doc
+team. Thanking you in advance.
[19] You can start this tool from the command line, by typing draknetcenter as root.
Condividi dischi e cartelle tramite NFS Condivisioni di rete
Condividi dischi e cartelle tramite NFS
draknfs
Prerequisiti
When the wizard[38] is launched for the
+first time, it may display the following message:
The package nfs-utils needs to be installed. Do you want to install it?
After completing the installation, a window with an empty list is displayed.
Finestra principale
A list of directories which are shared is displayed. At this step, the list
+is empty. The Add button gives access to a
+configuration tool.
Modifica voce
The configuration tool is labeled "Modify entry". It may be also launched
+with the Modify button. The following parameters are
+available.
Directory NFS
Here you can specify which directory is to be shared. The
+Directory button gives access to a browser to choose
+it.
Accesso host
Here you can specify the hosts that are authorized to access the shared
+directory.
NFS clients may be specified in a number of ways:
single host: a host either by an abbreviated name
+recognized be the resolver, fully qualified domain name, or an IP address
netgroups: NIS netgroups may be given as @group.
wildcards: machine names may contain the wildcard
+characters * and ?. For instance: *.cs.foo.edu matches all hosts in the
+domain cs.foo.edu.
IP networks: you can also export directories to all
+hosts on an IP (sub-)network simultaneously. For example, either
+`/255.255.252.0' or `/22' appended to the network base address.
Mappatura ID utente
map root user as anonymous: maps requests from uid/gid
+0 to the anonymous uid/gid (root_squash). The root user from the client
+cannot read or write to the files on the server which are created by root on
+the server itself.
allow real remote root access: turn off root
+squashing. This option is mainly useful for diskless clients
+(no_root_squash).
map all users to anonymous user: maps all uids and gids
+to the anonymous user (all_squash). Useful for NFS-exported public FTP
+directories, news spool directories, etc. The opposite option is no user UID
+mapping (no_all_squash), which is the default setting.
anonuid and anongid: explicitly set the uid and gid of
+the anonymous account.
Opzioni avanzate
Secured Connection: this option requires that requests
+originate on an internet port less than IPPORT_RESERVED (1024). This option
+is on by default.
Read-Only share: allow either only read or both read
+and write requests on this NFS volume. The default is to disallow any
+request which changes the filesystem. This can also be made explicit by
+using this option.
Synchronous access: prevents the NFS server from
+violating the NFS protocol and to reply to requests before any changes made
+by these requests have been committed to stable storage (e.g. disc drive).
Subtree checking: enable subtree checking which can
+help improve security in some cases, but can decrease reliability. See
+exports(5) man page for more details.
Voci del menù
So far the list has at least one entry.
File|Write conf
Save the current configuration.
NFS Server|Restart
The server is stopped and restarted with the current configuration files.
NFS Server|Reload
The configuration displayed is reloaded from the current configuration
+files.
[38] You can start this tool from the command line, by typing draknfs as root.
If you have to use a proxy server to access to the internet, you can use
+this tool[22] to configure it. Your net
+administrator will give you the information you need. You can also specify
+some services which can be accessed without the proxy by exception.
From Wikipedia, on 2012-09-24, article Proxy server: In computer networks, a
+proxy server is a server (a computer system or an application) that acts as
+an intermediary for requests from clients seeking resources from other
+servers. A client connects to the proxy server, requesting some service,
+such as a file, connection, web page, or other resource available from a
+different server. The proxy server evaluates the request as a way to
+simplify and control their complexity.
[22] You can start this tool from the command line, by typing drakproxy as root.
First thing to do after an install is to add software sources (also known as
+repositories, media, mirrors). That means you must select the media sources
+to be used to install and update packages and applications. (see Add button
+below).
Nota
If you install (or upgrade) Mageia using an optical media (DVD or CD) or a
+USB device, there will be a software source configured to the optical media
+used. To avoid being asked to insert the media when you install new
+packages, you should disable (or delete) this media. (It will have the
+media type CD-Rom).
Nota
Your system is running under an architecture which may be 32-bit (called
+i586), or 64-bit (called x86_64). Some packages are independent of whether
+your system is 32-bit or 64-bit; these are called noarch packages. They
+don't have their own noarch directories on the mirrors, but are all in both
+the i586 and the x86_64 media.
This tool is present in the Mageia Control Center under the tab Software management.[4]
Le colonne
Column Enable:
The checked media will be used to install new packages. Be cautious with
+some media such as Testing and Debug, they could make your system unusable.
Column Update:
The checked media will be used to update packages, it must be enabled. Only
+media with "Update" in its name should be selected. For security reasons,
+this column isn't modifiable in this tool, you must open a console as root
+and type drakrpm-edit-media --expert.
Column medium:
Display the medium name. Mageia official repositories for final release
+versions contain at least:
Core which contains most programs available
+supported by Mageia.
Nonfree which contains some programs which
+are not free
Tainted free software for which there might
+be patent claims in some countries.
Each medium has 4 sub-sections:
Release the packages as of the day the this
+version of Mageia was released.
Updates the packages updated since release
+due to security or bug concerns. Everyone should have this medium enabled,
+even with a very slow internet connection.
Backports some packages of new versions
+backported from Cauldron (the next version under development).
Testing which is used for temporary tests
+of new updates, to allow the bug reporters and the QA team to validate the
+corrections.
Il bottone sulla destra
Rimuovi:
To remove a medium, click on it and then on this button. It is wise to
+remove the medium used for the installation (CD or DVD for example) since
+all the packages it contains are in the official Core release medium.
Modifica:
Allows you to modify the selected medium settings, (URL, downloader and
+proxy).
Aggiungi:
Add the official repositories available on the Internet. These repositories
+contain only safe and well tested software. Clicking on the "Add" button
+adds the mirrorlist to your configuration, it is designed to make sure that
+you install and update from a mirror close to you. If you prefer to choose a
+specific mirror, then add it by choosing "Add a specific media mirror" from
+the drop-down "File" menu.
Up and down arrows:
Change the list order. When Drakrpm looks for a package, it reads the list
+in the displayed order and will install the first package found for the same
+release number - in the event of a version mismatch, the latest release will
+be installed. So if possible, put the fastest repositories at the top.
Il menu
File -> Aggiorna:
A window pops up with the media list. Select the ones you want to update and
+click on the Update button.
File -> Add a specific media mirror:
Suppose you aren't happy with the actual mirror, because for example it's
+too slow or often unavailable, you can choose another mirror. Select all the
+actual media and click on Remove to take them
+out. Click on File -> Add a specific media mirror, choose
+between update only or the full set (if you do not know, choose the
+Full set of sources) and accept the contact by
+clicking on Yes. This window opens:
You can see, on the left, a list of countries, choose yours or one very
+close by clicking on the > symbol, this will display all the available
+mirrors in that country. Select one and click on OK.
File -> Add a custom medium:
E' possibile installare un nuovo media (da una terza fonte per esempio) che
+non è supportato da Mageia. Una nuova finestra apparirà:
Select the medium type, find a smart
+name that well define the medium and give the URL (or the path, according to
+the medium type)
Options -> Global options:
This item allows you to choose when to "Verify RPMs to be installed" (always
+or never), the download program (curl, wget or aria2) and to define the
+download policy for information about the packages (on demand -by default-,
+update only, always or never).
Options -> Manage keys:
To guarantee a high level of security, digital keys are used to authenticate
+the media. It is possible for each medium to allow or disallow a key. In the
+window that appear, select a medium and then click on
+Add to allow a new key or to select a key and click
+on Remove to disallow that key.
Avvertimento
Fai questo con cura, come faresti con tutte le domande relative alla
+sicurezza.
Opzioni -> Proxy:
If you need to use a proxy server for internet access, you can configure it
+here. You only need to give the Proxy hostname and if
+necessary a Username and Password.
Share directories and drives with Samba Condivisioni di rete
Share directories and drives with Samba
draksambashare
Introduzione
Samba è un protoccolo utilizzato in diversi sistemi operativi per
+condividere alcune risorse come directories o stampanti. Questo strumento ti
+permette di configurare la macchina come un server Samba usando il
+protocollo SMB/CIFS. Questo protocollo è anche usato da Windows(R) e le
+stazioni di lavoro con questo sistema operativo possono accedere alla
+risorse del derver Samba.
Preparazione
To be accessed from other workstations, the server has to have a fixed IP
+address. This can be specified directly on the server, for example with
+, or at the DHCP server which identifies
+the station with its MAC-address and give it always the same address. The
+firewall has also to allow the incoming requests to the Samba server.
Procedura guidata - server autonomo
At the first run, the tools [36] checks if
+needed packages are installed and proposes to install them if they are not
+yet present. Then the wizard to configure the Samba server is launched.
Nella finestra successiva lìopzione di configuarazione del server autonomo è
+già selezionata.
Then specify the name of the workgroup. This name should be the same for the
+access to the shared resources.
The netbios name is the name which will be used to designate the server on
+the network.
Scegliere la modalità di sicurezza:
user: the client must be authorized to access the
+resource
share: the client authenticates itself separately for
+each share
You can specify which hosts are allowed to access the resources, with IP
+address or host name.
Specify the server banner. The banner is the way this server will be
+described in the Windows workstations.
The place where Samba can log information can be specified at the next step.
The wizard displays a list of the chosen parameters before you accept the
+configuration. When accepted, the configuration will be written in
+/etc/samba/smb.conf.
Wizard - Primary domain controller
If the "Primary domain controller"
+option is selected, the wizard asks for indication if Wins is to support or
+not and to provide admin users names. The following steps are then the same
+as for standalone server, except you can choose also the security mode:
domain: provides a mechanism for storing all user and
+group accounts in a central, shared, account repository. The centralized
+account repository is shared between (security) controllers.
Dichiarare una directory da salvare
With the Add button, we get:
A new entry is thus added. It can be modified with the
+Modify button. Options can be edited, such as whether
+the directory is visible to the public, writable or browseable. The share
+name can not be modified.
Voci del menù
When the list has at least one entry, menu entries can be used.
File|Write conf. Save the current configuration in /etc/samba/smb.conf.
Samba server|Configure. The wizard can be run again with this command.
Server Samba|Restart. The server is stopped and restarted with the current configuration files.
Servar Samba|Ricarica. The configuration displayed is reloaded from the current configuration
+files.
Stampanti condivise
Samba ti permette anche di condividere stampanti.
Utilizzatori di Samba
In this tab, you can add users who are allowed to access the shared
+resources when authentication is required. You can add users from
[36] You can start this tool from the command line, by typing draksambashare as root.
Configura autenticazione per strumenti Mageia Sicurezza
Configura autenticazione per strumenti Mageia
draksec
This tool[45]is present in the Mageia
+Control Center under the tab Security
It allows to give the regular users the needed rights to accomplish tasks
+usually done by the administrator.
Click on the little arrow before the item you want to drop down:
+
Most of the tools available in the Mageia Control Center are displayed in
+the left side of the window (see the screenshot above) and for each tool, a
+drop down list on the right side gives the choice between:
Default: The launch mode depends on the chosen security level. See in the
+same MCC tab, the tool "Configure system security, permissions and audit".
User password: The user password is asked before the tool launching.
Administrator password: The root password is asked before the tool launching
Nessuna password: lo strumento parte senza richiedere alcuna password.
[45] You can start this tool from the command line, by typing draksec as root.
This tool[34] is available in MCC's
+System tab, in the Administration
+tools section.
When you start this tool in MCC for the first time, you will see a message
+about installing draksnapshot. Click on Install to
+proceed. Draksnapshot and some other packages it needs will be installed.
Click again on Snapshots, you will see the
+Settings screen. Tick Enable
+Backups and, if you want to backup the whole system,
+Backup the whole system.
If you only want to backup part of your directories, then choose
+Advanced. You will see a little pop-up screen. Use the
+Add and Remove buttons next to
+the Backup list to include or exclude directories and
+files from the backup. Use the same buttons next to the
+Exclude list to remove subdirectories and/or files from
+the chosen directories, that should not be
+included in the backup. Click on Close when you are
+done.
Now give the path to Where to backup, or choose the
+Browse button to select the correct path. Any mounted
+USB-key or external HD can be found in /run/media/your_user_name/.
+
Click on Apply to make the snapshot.
[34] You can start this tool from the command line, by typing draksnapshot-config as root.
This tool[12] is present in the Mageia
+Control Center under the tab Hardware.¶
Draksound deals with the sound configuration, including the driver choice,
+PulseAudio options and trouble shooting. It will help you if you experience
+sound problems or if you change the sound card.
The drop down list called Driver allows you to select a
+driver from all the ones available on the computer that match the sound
+card.
Nota
Most of the time, it is possible to choose a driver using the OSS or ALSA
+API. OSS is the oldest and very basic, we recommend to choose ALSA when
+possible for its enhanced features.
PulseAudio is a sound server. It receives all the sound
+inputs, mixes them according to the user preferences and sends the resulting
+sound to the output. See Menu ->Sound and video -> PulseAudio
+volume control to set these preferences.
PulseAudio is the default sound server and it is recommended to leave it
+enabled.
Glitch-Free improves PulseAudio with some programs. It
+is also recommended to leave it enabled.
The button Advanced display a new window with two or
+three buttons:
The first button gives total freedom of choice. You have to know what you
+are doing. This button is not available when the system has found a driver
+for your device.
The second one is obvious and the last one gives assistance with fixing any
+problems you may have. You will find it helpful to try this before asking
+the community for help.
[12] You can start this tool from the command line, by typing draksound as root.
diff --git a/mcc/5/it/content/drakups.html b/mcc/5/it/content/drakups.html
new file mode 100644
index 00000000..98446ef1
--- /dev/null
+++ b/mcc/5/it/content/drakups.html
@@ -0,0 +1,38 @@
+
+
+
+
+ Configura un UPS per il controllo dell'alimentazione
Configura la connessione VPN per rendere sicuro l'accesso al network Rete e internet
Configura la connessione VPN per rendere sicuro l'accesso al network
drakvpn
Introduzione
This tool[24] allows to configure secure
+access to a remote network establishing a tunnel between the local
+workstation and the remote network. We discuss here only of the
+configuration on the workstation side. We assume that the remote network is
+already in operation, and that you have the connection information from the
+network administrator, like a .pcf configuration file .
Configurazione
First, select either Cisco VPN Concentrator or OpenVPN, depending on which
+protocol is used for your virtual private network.
In seguito dai un nome alla connessione.
At the next screen, provide the details for your VPN connection.
For Cisco VPN
For openvpn. The openvpn package and its dependencies will be installed the
+first time the tool is used.
Select the files that you received
+from the network administrator.
Parametri avanzati:
The next screen asks for IP-address of the gateway.
When the parameters are set, you have the option of starting the VPN
+connection.
This VPN connection can be set to start automatically with a network
+connection. To do this, reconfigure the network connection to always connect
+to this VPN.
[24] You can start this tool from the command line, by typing drakvpn as root.
This tool is broken in Mageia 4 because of new naming scheme for the Net
+interfaces
This tool[7] can help you to set up a
+DHCP server. It is a component of drakwizard which should
+be installed before you can access to it.
Cos'è DHCP?
The Dynamic Host Configuration Protocol (DHCP) is a
+standardized networking protocol used on IP networks that dynamically
+configures IP addresses and other information that is needed for Internet
+communication. (From Wikipedia)
Setting up a DHCP server with drakwizard dhcp
Welcome to the DHCP server wizard.
Introduzione
The first page is just an introduction, click Next.
Selecting Adaptor
Choose the network interface, which is connected to the subnet, and for
+which DHCP will assign IP addresses, and then click
+Next.
Select IP range
Select the beginning and ending IP addresses of the range of IPs you want
+the server to offer, along with the IP of the gateway machine connecting to
+some place outside the local network, hopefully close to the Internet, then
+click Next.
Sommario
Take a second to check these options, then click
+Next.
Hold on...
This can be fixed. Click Previous a few times and
+change things around.
Ore più tardi...
Cos'è stato fatto
Installing the package dhcp-server if needed;
Saving /etc/dhcpd.conf in /etc/dhcpd.conf.orig;
Creating a new dhcpd.conf starting from
+/usr/share/wizards/dhcp_wizard/scripts/dhcpd.conf.default and
+adding the new parameters:
hname
dns
net
ip
maschera
rng1
rng2
dname
gateway
tftpserverip
dhcpd_interface
Also modifying Webmin configuration file
+/etc/webmin/dhcpd/config
Restarting dhcpd.
[7] You can start this tool from the command line, by typing drakwizard dhcp as root.
This tool[9] purpose is to set the time of
+your server synchronised with an external server. It isn't installed by
+default and you have to also install the drakwizard and drakwizard-base
+packages.
Setup a NTP server with drakwizard ntp
After a welcome screen (see above), the second one ask you to choose three
+time servers in the drop down lists and suggests to use pool.ntp.org twice
+because this server always points to available time servers.
The following screens allows to choose the region and the city and then, you
+arrive on a summary. If something is wrong, you can obviously change it
+using the Previousbutton. If everything is right,
+click on the Next button to proceed to the test. It
+may take a while and you finally get this screen below:
Click on the Finish button to close the tool
Cos'è stato fatto
This tool executes the following steps:
Installing the package ntp if needed
Saving the files /etc/sysconfig/clock to
+/etc/sysconfig/clock.orig and
+/etc/ntp/step-tickers to
+/etc/ntp/step-tickers.orig;
Scrivendo un nuovo file /etc/ntp/step-tickers con la lista dei
+server;
Modifying the file /etc/ntp.conf by inserting the first server
+name;
Stopping and starting crond, atd and
+ntpd services;
Impostando l'orologio hardware con l'attuale orologio di sistema riferito a
+UTC.
[9] You can start this tool from the command line, by typing drakwizard ntp as root.
This tool[5] can help you to set up an
+FTP server.
+
What is FTP?
+ File Transfer Protocol (FTP) is a standard network
+protocol used to transfer files from one host to another host over a
+TCP-based network, such as the Internet. (From Wikipedia)
+
Setting up an FTP server with drakwizard proftpd
+ Welcome to the FTP wizard. Buckle up.
+
Introduzione
+ The first page is just an introduction, click Next.
+
Selecting Server Exposer: Local Net and/or World
+ Exposing the FTP server to the Internet has it's risks. Be ready for bad
+things.
+
Server Information
+ Enter name the sever will use to introduce itself, someone to email
+complaints too and whether to allow root login access.
+
This tool[8] can help you to set up a
+proxy server. It is a component of drakwizard which should be installed
+before you can access to it.
What is a proxy server?
A proxy server is a server (a computer system or an application) that acts
+as an intermediary for requests from clients seeking resources from other
+servers. A client connects to the proxy server, requesting some service,
+such as a file, connection, web page, or other resource available from a
+different server and the proxy server evaluates the request as a way to
+simplify and control its complexity. (From Wikipedia)
Setting up a proxy server with drakwizard squid
Welcome to the proxy server wizard.
Introduzione
The first page is just an introduction, click Next.
Selecting the proxy port
Select the proxy port browsers will connect through, then click
+Next.
Set Memory and Disk Usage
Set memory and disk cache limits, then click Next.
Select Network Access Control
Set visibility to local network or world, then click
+Next.
Grant Network Access
Grant access to local networks, then click Next.
Use Upper Level Proxy Server?
Cascade through another proxy server? If no, skip next step.
Upper Level Proxy URL and Port
Provide upper level proxy hostname and port, then click
+Next.
Sommario
Take a second to check these options, then click
+Next.
Start during boot?
Choose if the proxy server should be started during the boot time, then
+click Next.
Finisci
You're done! Click Finish.
Cos'è stato fatto
Installing the package squid if needed;
Saving /etc/squid/squid.conf in
+/etc/squid/squid.conf.orig;
Creating a new squid.conf starting from
+squid.conf.default and adding the new parameters:
cache_dir
localnet
cache_mem
http_port
level 1, 2 or 3 and http_access according to level
cache_peer
visible_hostname
Restarting squid.
[8] You can start this tool from the command line, by typing drakwizard squid as root.
This tool[10] can help you to set up an
+SSH daemon.
+
What is SSH?
+ Secure Shell (SSH) is a cryptographic network protocol for secure data
+communication, remote command-line login, remote command execution, and
+other secure network services between two networked computers that connects,
+via a secure channel over an insecure network, a server and a client
+(running SSH server and SSH client programs,
+respectively). (From Wikipedia)
+
Setting up an SSH daemon with drakwizard sshd
+ Welcome to the Open SSH wizard.
+
Select Type of Configure Options
+ Choose Expert for all options or
+Newbie to skip steps 3-7, click
+Next.
+
Opzioni generali
+ Sets visibility and root access options. Port 22 is the standard
+SSH port.
+
Metodi di autenticazione
+ Allow a variety of authentication methods users can use while connecting,
+then click Next.
+
Logging
+ Choose logging facility and level of output, then click
+Next.
+
Opzioni di accesso
+ Configure per-login settings, then click Next.
+
Opzioni di accesso dell'utente
+ Configure the user access settings, then click Next.
+
Compression and Forwarding
+ Configure X11 forwarding and compression during transfer, then click
+Next.
+
Sommario
+ Take a second to check these options, then click
+Next.
+
Finisci
+ You're done! Click Finish.
+
[10] You can start this tool from the command line, by typing drakwizard sshd as root.
diff --git a/mcc/5/it/content/drakxservices.html b/mcc/5/it/content/drakxservices.html
new file mode 100644
index 00000000..0251e2f1
--- /dev/null
+++ b/mcc/5/it/content/drakxservices.html
@@ -0,0 +1,38 @@
+
+
+
+
+ Attiva o disattiva i servizi del sistema
This tool[11] gives a general view of the
+hardware of your computer. When the tool is launched, it executes a job to
+look for every element of the hardware. For that, it uses the command
+ldetect which refers to a list of hardware in
+ldetect-lst package.
La finestra
La finestra è divisa in due colonne.
The left column contains a list of the detected hardware. The devices are
+grouped by categories. Click on the > to expand the content of a
+category. Each device can be selected in this column.
The right column displays information about the selected device. The
+Help -> Fields description gives some information
+about the content of the fields.
According to which type of device is selected, either one or two buttons are
+available at the bottom of the right column:
Set current driver options: this can be used to
+parameterize the module which is used in relation to the device. This must
+used by experts only.
Run config tool: access to the tool which can
+configure the device. The tool can often be accessed directly from the MCC.
Il menu
Opzioni
The options menu gives the opportunity to check boxes to
+enable automatic detection:
modem
Jaz devices
Zip parallel devices
By default these detections are not enabled, because they are slow. Check
+the appropriate box(es) if you have this hardware connected. Detection will
+be operational the next time this tool is started.
[11] You can start this tool from the command line, by typing harddrake2 as root.
The keyboarddrake tool[15] helps you
+configure the basic layout for the keyboard that you wish to use on
+Mageia. It affects the keyboard layout for all users on the system. It can
+be found in the Hardware section of the Mageia Control Center (MCC) labelled
+"Configure mouse and keyboard".
Layout della tastiera
Here you can select which keyboard layout you wish to use. The names (listed
+in alphabetical order) describe the language, country, and/or ethnicity each
+layout should be used for.
Tipo di tastiera
This menu lets you select the type of keyboard you are using. If you are
+unsure of which to choose, it is best to leave it as the default type.
[15] You can start this tool from the command line, by typing keyboarddrake as root.
This tool[29] can be found in the System
+section of the Mageia Control Center (MCC) labelled "Manage localization for
+your system". It opens with a window in which you can choose your
+language. The choice is adapted to languages selected during installation.
The Advanced button give access to activate
+compatibility with old encoding (non UTF8).
The second window shows a list of countries according to the selected
+language. The button Other Countries gives access to
+countries not listed.
Devi ricominciare la sessione dopo ogni modifica.
Metodo di input
In the Other Countries screen you can also select an
+input method (from the drop-down menu at the bottom of the list). Input
+methods allow users to input multilingual characters (Chinese, Japanese,
+Korean, etc).
For Asian and African locales, IBus will be set as default input method so
+users should not need to configure it manually.
diff --git a/mcc/5/it/content/logdrake.html b/mcc/5/it/content/logdrake.html
new file mode 100644
index 00000000..acf554df
--- /dev/null
+++ b/mcc/5/it/content/logdrake.html
@@ -0,0 +1,61 @@
+
+
+
+
+ Visualizza i log di sistema ed effettua delle ricerche
Visualizza i log di sistema ed effettua delle ricerche Sistema
Visualizza i log di sistema ed effettua delle ricerche
logdrake
This tool[30] is found in the Mageia
+Control Center System tab, labelled "View and search system
+logs".
Effettuare una ricerca nei registri
First, enter the key string you want to look for in the Matching field and/or the key string you want to
+do not wish to see amongst the answers in the field
+but not matching. Then select the file(s)
+to search in the Choose file field. Optionally, it is
+possible to limit the search to only one day. Select it in the Calendar, using the little arrows on each side of the
+month and year, and check "Show only for the selected
+day". At last, click on the search button
+to see the results in the window called Content of the
+file. It is possible to save the results in the .txt format by
+clicking on the Save button.
Nota
The Mageia Tools Logs houses the logs from the Mageia
+configuration tools such as the Mageia Control Center tools. These logs are
+updated each time a configuration is modified.
To configure a mail alert
Mail alert automatically checks the system load and
+the services every hour and if necessary sends an e-mail to the configured
+address.
To configure this tool, click on the Mail
+Alert button and then, in the next screen, on the
+Configure the mail alert system drop down button. Here, all the
+running services are displayed and you can choose which ones you want to
+look watch. (See screenshot above).
I seguenti servizi posso essere esplorati:
Servizio webmin
Server di posta Postfix
Server FTP
Server web Apache
Server SSH
Server Samba
Servizio xinetd
BIND Domain Name Resolve
In the next screen, select the Load value you consider
+unacceptable. The load represents the demand to a process, a high load slows
+the system down and a very high load may indicate that a process has gone
+out of control. The default value is 3. We recommend setting the load value
+to 3 times the number of processors.
In the last screen, enter the Email address of the
+person to be warned and the Email server to use (local
+or on the Internet).
[30] You can start this tool from the command line, by typing logdrake as root.
Display Available NFS And SMB Shares Altri strumenti di Mageia
Display Available NFS And SMB Shares
lsnetdrake
This tool [52] can only be started and used
+on the command line.
This page hasn't been written yet for lack of resources. If you think you
+can write this help, please contact the Documentation
+team. Thanking you in advance.
[52] You can start this tool from the command line, by typing lsnetdrake.
+
diff --git a/mcc/5/it/content/lspcidrake.html b/mcc/5/it/content/lspcidrake.html
new file mode 100644
index 00000000..95ab58dc
--- /dev/null
+++ b/mcc/5/it/content/lspcidrake.html
@@ -0,0 +1,40 @@
+
+
+
+
+ Display Your PCI, USB and PCMCIA Information
Display Your PCI, USB and PCMCIA Information Altri strumenti di Mageia
Display Your PCI, USB and PCMCIA Information
lspcidrake
This tool [53] can only be started and used
+on the command line. It will give some more information if used under root.
lspcidrake gives the list of all the connected devices to the computer (USB,
+PCI and PCMCIA) and the used drivers. It needs the ldetect and ldetect-lst
+packages to work.
With the -v option, lspcidrake adds the vendor and device identifications.
lspcidrake often generates very long lists, so, to find an information, it
+is often used in a pipeline with the grep command, like in these examples:
Informazioni sulla scheda grafica;
lspcidrake | grep VGA
Informazioni sul network
lspcidrake | grep -i network
-i to ignore case distinctions.
In this screenshot below, you can see the action of the -v option for
+lspcidrake and the -i option for grep.
There is another tool that gives information about the hardware, it is
+called dmidecode (under root)
[53] You can start this tool from the command line, by typing lspcidrake.
diff --git a/mcc/5/it/content/mcc-intro.html b/mcc/5/it/content/mcc-intro.html
new file mode 100644
index 00000000..ed4b30b6
--- /dev/null
+++ b/mcc/5/it/content/mcc-intro.html
@@ -0,0 +1,41 @@
+
+
+
+
+ About the Manual for the Mageia Control Center
The Mageia Control Center (MCC) has eight different options or tabs to
+choose from in the left column, and even ten if the drakwizard package was
+installed. Each of these tabs gives a different set of tools that can be
+selected in the big right panel.
I dieci capitoli successivi sono relativi a quelle dieci opzioni e ai
+relativi strumenti.
The last chapter is about some other Mageia tools, that cannot be chosen in
+any of the MCC tabs.
The titles of the pages will often be the same as the titles of the tool
+screens.
There is also a search bar available, which you can access by clicking on
+the "Search" tab in the left column.
In questa schermata puoi scegliere tra diversi strumenti per gestire o
+condividere i tuoi dischi locali. Clicca sul link seguente per saperne di
+più.
This screen and the one for Sharing are only visible if
+the drakwizard package is installed. You can choose
+between several tools to set up different servers. Click on a link below or
+on la sezione chiamata «Condivisione»to learn more.
This screen and the one for Network Services are only
+visible if the drakwizard package is installed. You can
+choose between several tools to set up different servers. Click on a link
+below or on la sezione chiamata «Servizi di rete»to learn more.
Configura la frequenza degli aggiornamenti Gestione software
Configura la frequenza degli aggiornamenti
mgaapplet-config
This tool[3] is present in the Mageia
+Control Center under the tab Software
+management. It is also available by a right click /
+Updates configuration on the red icon in the system tray.
The first slider allows you to change how frequently Mageia will check for
+updates and the second the delay after booting before the first check. The
+check box gives you the option to be warned when a new Mageia release is
+out.
[3] You can start this tool from the command line, by typing mgaapplet-config as root.
Configura il dispositivo di puntamento (mouse, touchpad) Hardware
Configura il dispositivo di puntamento (mouse, touchpad)
mousedrake
This tool[16] is present in the Mageia
+Control Center under the tab Hardware.
As you must have a mouse to install Mageia, that one is already installed by
+Drakinstall. This tool allows installation of another mouse.
The mice are sorted by connection type and then by model. Select your mouse
+and click on OK. Most of the time "Universal / Any
+PS/2 & USB mice" is suitable for a recent mouse. The new mouse is
+immediately taken into account.
[16] You can start this tool from the command line, by typing mousedrake as root.
diff --git a/mcc/5/it/content/msecgui.html b/mcc/5/it/content/msecgui.html
new file mode 100644
index 00000000..fa02052a
--- /dev/null
+++ b/mcc/5/it/content/msecgui.html
@@ -0,0 +1,148 @@
+
+
+
+
+ MSEC: Sicurezza ed controllo del sistema
MSEC: Sicurezza ed controllo del sistema Sicurezza
MSEC: Sicurezza ed controllo del sistema
msecgui
Presentazione
msecgui[43] is a graphic user interface for
+msec that allows to configure your system security according to two
+approaches:
It sets the system behaviour, msec imposes modifications to the system to
+make it more secure.
It carries on periodic checks automatically on the system in order to warn
+you if something seems dangerous.
msec uses the concept of "security levels" which are intended to configure a
+set of system permissions, which can be audited for changes or
+enforcement. Several of them are proposed by Mageia, but you can define your
+own customised security levels.
Overview tab
See the screenshot above
The first tab takes up the list of the different security tools with a
+button on the right side to configure them:
Firewall, also found in the MCC / Security / Set up your personal firewall
Updates, also found in MCC / Software Management / Update your system
msec itself with some information:
enabled or not
the configured Base security level
the date of the last Periodic checks and a button to see a detailed report
+and another button to execute the checks just now.
Security settings tab
A click on the second tab or on the Security
+Configure button leads to the same screen shown
+below.
Basic security tab
+ Livelli di sicurezza:
+
After having checked the box Enable MSEC tool, this tab
+allows you by a double click to choose the security level that appears then
+in bold. If the box is not checked, the level « none » is applied. The
+following levels are available:
Level none. This level is intended if you
+do not want to use msec to control system security, and prefer tuning it on
+your own. It disables all security checks and puts no restrictions or
+constraints on system configuration and settings. Please use this level only
+if you are knowing what you are doing, as it would leave your system
+vulnerable to attack.
Level standard. This is the default
+configuration when installed and is intended for casual users. It
+constrains several system settings and executes daily security checks which
+detect changes in system files, system accounts, and vulnerable directory
+permissions. (This level is similar to levels 2 and 3 from past msec
+versions).
Level secure. This level is intended when
+you want to ensure your system is secure, yet usable. It further restricts
+system permissions and executes more periodic checks. Moreover, access to
+the system is more restricted. (This level is similar to levels 4 (High) and
+5 (Paranoid) from old msec versions).
Besides those levels, different task-oriented security are also provided,
+such as the fileserver , webserver and netbook levels. Such levels attempt to pre-configure
+system security according to the most common use cases.
The last two levels called audit_daily and
+audit_weekly are not really security levels
+but rather tools for periodic checks only.
These levels are saved in
+etc/security/msec/level.<levelname>. You can define
+your own customised security levels, saving them into specific files called
+level.<levelname>, placed into the folder
+etc/security/msec/. This function is intended for power
+users which require a customised or more secure system configuration.
Attenzione
Keep in mind that user-modified parameters take precedence over default
+level settings.
+ Avvisi di sicurezza:
+
If you check the box Send security alerts by email
+to:, the security alerts generated by msec are going to be sent
+by local e-mail to the security administrator named in the nearby field. You
+can fill either a local user or a complete e-mail address (the local e-mail
+and the e-mail manager must be set accordingly). At last, you can receive
+the security alerts directly on your desktop. Check the relevant box to
+enable it.
Importante
It is strongly advisable to enable the security alerts option in order to
+immediately inform the security administrator of possible security
+problems. If not, the administrator will have to regularly check the logs
+files available in /var/log/security.
Opzioni di sicurezza:
Creating a customised level is not the only way to customise the computer
+security, it is also possible to use the tabs presented here after to change
+any option you want. Current configuration for msec is stored in
+/etc/security/msec/security.conf. This file contains
+the current security level name and the list of all the modifications done
+to the options.
System security tab
This tab displays all the security options on the left side column, a
+description in the centre column, and their current values on the right side
+column.
To modify an option, double click on it and a new window appears (see
+screenshot below). It displays the option name, a short description, the
+actual and default values, and a drop down list where the new value can be
+selected. Click on the OK button to validate the
+choice.
Attenzione
Do not forget when leaving msecgui to save definitively your configuration
+using the menu File -> Save the configuration. If you
+have changed the settings, msecgui allows you to preview the changes before
+saving them.
Sicurezza della rete
This tab displays all the network options and works like the previous tab
Periodic checks tab
Periodic checks aim to inform the security administrator by means of
+security alerts of all situations msec thinks potentially dangerous.
This tab displays all the periodic checks done by msec and their frequency
+if the box Enable periodic security checks is
+checked. Changes are done like in the previous tabs.
Scheda delle eccezioni
Sometimes alert messages are due to well known and wanted situations. In
+these cases they are useless and wasted time for the administrator. This tab
+allows you to create as many exceptions as you want to avoid unwanted alert
+messages. It is obviously empty at the first msec start. The screenshot
+below shows four exceptions.
To create an exception, click on the Add a rule
+button
Select the wanted periodic check in the drop down list called
+Check and then, enter the
+Exception in the text area. Adding an exception is
+obviously not definitive, you can either delete it using the
+Delete button of the Exceptions
+tab or modify it with a double clicK.
Permessi
This tab is intended for file and directory permissions checking and
+enforcement.
Like for the security, msec owns different permissions levels (standard,
+secure, ..), they are enabled accordingly with the chosen security
+level. You can create your own customised permissions levels, saving them
+into specific files called perm.<levelname> placed
+into the folder etc/security/msec/ . This function is
+intended for power users which require a customised configuration. It is
+also possible to use the tab presented here after to change any permission
+you want. Current configuration is stored in
+/etc/security/msec/perms.conf. This file contains the
+list of all the modifications done to the permissions.
Default permissions are visible as a list of rules (a rule per line). You
+can see on the left side, the file or folder concerned by the rule, then the
+owner, then the group and then the permissions given by the rule. If, for a
+given rule:
the box Enforce is not checked, msec only checks if the
+defined permissions for this rule are respected and sends an alert message
+if not, but does not change anything.
the box Enforce is checked, then msec will rule the
+permissions respect at the first periodic check and overwrite the
+permissions.
Importante
For this to work, the option CHECK_PERMS in the Periodic check tab must be configured accordingly.
To create a new rule, click on the Add a rule button
+and fill the fields as shown in the example below. The joker * is allowed in
+the File field. “current” means no modification.
Click on the OK button to validate the choice and do
+not forget when leaving to save definitively your configuration using the
+menu File -> Save the configuration. If you have changed
+the settings, msecgui allows you to preview the changes before saving them.
Nota
It is also possible to create or modify the rules by editing the
+configuration file /etc/security/msec/perms.conf.
+
Attenzione
Changes in the Permission tab (or directly
+in the configuration file) are taken into account at the first periodic
+check (see the option CHECK_PERMS in the Periodic
+checks tab). If you want them to be taken immediately into
+account, use the msecperms command in a console with root rights. You can
+use before, the msecperms -p command to know the permissions that will be
+changed by msecperms.
Attenzione
Do not forget that if you modify the permissions in a console or in a file
+manager, for a file where the box Enforce is checked
+in the Permissions tab , msecgui will write
+the old permissions back after a while, accordingly to the configuration of
+the options CHECK_PERMS and CHECK_PERMS_ENFORCE in the Periodic Checks tab .
[43] You can start this tool from the command line, by typing msecgui as root.
diff --git a/mcc/5/it/content/nwSearchFnt.js b/mcc/5/it/content/nwSearchFnt.js
new file mode 100644
index 00000000..fc12d113
--- /dev/null
+++ b/mcc/5/it/content/nwSearchFnt.js
@@ -0,0 +1,513 @@
+/*----------------------------------------------------------------------------
+ * JavaScript for webhelp search
+ *----------------------------------------------------------------------------
+ This file is part of the webhelpsearch plugin for DocBook WebHelp
+ Copyright (c) 2007-2008 NexWave Solutions All Rights Reserved.
+ www.nexwave.biz Nadege Quaine
+ http://kasunbg.blogspot.com/ Kasun Gajasinghe
+ */
+
+//string initialization
+var htmlfileList = "htmlFileList.js";
+var htmlfileinfoList = "htmlFileInfoList.js";
+var useCJKTokenizing = false;
+
+/* Cette fonction verifie la validite de la recherche entrre par l utilisateur */
+function Verifie(ditaSearch_Form) {
+
+ // Check browser compatibitily
+ if (navigator.userAgent.indexOf("Konquerer") > -1) {
+
+ alert(txt_browser_not_supported);
+ return;
+ }
+
+
+ var expressionInput = document.ditaSearch_Form.textToSearch.value;
+ //Set a cookie to store the searched keywords
+ $.cookie('textToSearch', expressionInput);
+
+
+ if (expressionInput.length < 1) {
+
+ // expression is invalid
+ alert(txt_enter_at_least_1_char);
+ // reactive la fenetre de search (utile car cadres)
+ document.ditaSearch_Form.textToSearch.focus();
+ }
+ else {
+
+ // Effectuer la recherche
+ Effectuer_recherche(expressionInput);
+
+ // reactive la fenetre de search (utile car cadres)
+ document.ditaSearch_Form.textToSearch.focus();
+ }
+}
+
+var stemQueryMap = new Array(); // A hashtable which maps stems to query words
+
+/* This function parses the search expression, loads the indices and displays the results*/
+function Effectuer_recherche(expressionInput) {
+
+ /* Display a waiting message */
+ //DisplayWaitingMessage();
+
+ /*data initialisation*/
+ var searchFor = ""; // expression en lowercase et sans les caracte res speciaux
+ //w = new Object(); // hashtable, key=word, value = list of the index of the html files
+ scriptLetterTab = new Scriptfirstchar(); // Array containing the first letter of each word to look for
+ var wordsList = new Array(); // Array with the words to look for
+ var finalWordsList = new Array(); // Array with the words to look for after removing spaces
+ var linkTab = new Array();
+ var fileAndWordList = new Array();
+ var txt_wordsnotfound = "";
+
+
+ /*nqu: expressionInput, la recherche est lower cased, plus remplacement des char speciaux*/
+ searchFor = expressionInput.toLowerCase().replace(/<\//g, "_st_").replace(/\$_/g, "_di_").replace(/\.|%2C|%3B|%21|%3A|@|\/|\*/g, " ").replace(/(%20)+/g, " ").replace(/_st_/g, "").replace(/_di_/g, "%24_");
+
+ searchFor = searchFor.replace(/ +/g, " ");
+ searchFor = searchFor.replace(/ $/, "").replace(/^ /, "");
+
+ wordsList = searchFor.split(" ");
+ wordsList.sort();
+
+ //set the tokenizing method
+ if(typeof indexerLanguage != "undefined" && (indexerLanguage=="zh" || indexerLanguage=="ja" ||indexerLanguage=="ko")){
+ useCJKTokenizing=true;
+ } else {
+ useCJKTokenizing=false;
+ }
+ //If Lucene CJKTokenizer was used as the indexer, then useCJKTokenizing will be true. Else, do normal tokenizing.
+ // 2-gram tokenizinghappens in CJKTokenizing,
+ if(useCJKTokenizing){
+ finalWordsList = cjkTokenize(wordsList);
+ } else {
+ finalWordsList = tokenize(wordsList);
+ }
+
+ //load the scripts with the indices: the following lines do not work on the server. To be corrected
+ /*if (IEBrowser) {
+ scriptsarray = loadTheIndexScripts (scriptLetterTab);
+ } */
+
+ /**
+ * Compare with the indexed words (in the w[] array), and push words that are in it to tempTab.
+ */
+ var tempTab = new Array();
+ for (var t in finalWordsList) {
+ if (w[finalWordsList[t].toString()] == undefined) {
+ txt_wordsnotfound += finalWordsList[t] + " ";
+ } else {
+ tempTab.push(finalWordsList[t]);
+ }
+ }
+ finalWordsList = tempTab;
+
+ if (finalWordsList.length) {
+
+ //search 'and' and 'or' one time
+ fileAndWordList = SortResults(finalWordsList);
+
+ var cpt = fileAndWordList.length;
+ for (var i = cpt - 1; i >= 0; i--) {
+ if (fileAndWordList[i] != undefined) {
+ linkTab.push("
There are more Mageia tools than those that can be started in the Mageia
+Control Center. Click on a link below to learn more, or continue reading the
+next pages.
Software Management (Install and Remove Software) Gestione software
Software Management (Install and Remove Software)
rpmdrake
Introduzione ad rpmdrake
This tool[1], also known as drakrpm, is a
+program for installing, uninstalling and updating packages. It is the
+graphical user interface of URPMI. At each start up, it will check online
+package lists (called 'media') downloaded straight from Mageia's official
+servers, and will show you each time the latest applications and packages
+available for your computer. A filter system allows you to display only
+certain types of packages: you may display only installed applications (by
+default), or only available updates. You can also view only not installed
+packages. You can also search by the name of a package, or in the summaries
+of descriptions or in the full descriptions of packages or in the file names
+included in the packages.
During the installation, the configured repository is the medium used for
+the installation, generally the DVD or CD. If you keep this medium, rpmdrake
+will ask it each time you want to install a package, with this pop-up window
+:
If the above message annoys you
+and you have a good internet connection without too strict download limit,
+it is wise to remove that medium and replace it by online repositories
+thanks to la sezione chiamata «Configure Media» .
Moreover, the online repositories are always up to date, contains much more
+packages, and allow to update your installed packages.
La parte principale dello schermo
Filtro per tipo pacchetto:
Questo filtro ti consente di visualizzare solo alcuni tipi di pacchetto. La
+prima volta che avvi il gestore questo mostrerà solamente le applicazioni
+con una interfaccia grafica. Puoi visualizzare sia tutti i pacchetti che
+tutte le loro dipendenze e librerie o solo gruppi di pacchetti come le sole
+applicazioni, i soli aggiornamenti o pacchetti backported da versioni più
+recenti di Mageia.
Avvertimento
The default filter setting is for new entrants to Linux or Mageia, who
+probably do not want command line or specialist tools. Since you're reading
+this documentation, you're obviously interested in improving your knowledge
+of Mageia, so it is best to set this filter to "All".
Package state filter:
+
This filter allows you to view only the installed packages, only the
+packages that are not installed or all of the packages, both installed and
+not installed.
Modalità di ricerca:
Fare clic su questa icona per cercare attraverso i nomi dei pacchetti,
+attraverso le loro sintesi, attraverso la loro descrizione completa o
+attraverso i file inclusi nei pacchetti.
"Find" box:
Enter here one or more key words. If you want to use more than one keyword
+for searching use '|' between keywords, e.g. To search for "mplayer" and
+"xine" at the same time type 'mplayer | xine'.
Erase all:
Questa icona può cancellare in un solo click tutte le parole chiave inserite
+nel campo "Cerca".
Categories list:
This side bar groups all applications and packages into clear categories and
+sub categories.
Pannello di descrizione:
This panel displays the package's name, its summary and complete
+description. It displays many useful elements about the selected package. It
+can also show precise details about the package, the files included in the
+package as well as a list of the last changes made by the maintainer.
La colonna di stato
Once you correctly set the filters, you can find your software either by
+category (in area 6 above) or by name/summary/description using area 4. A
+list of packages fulfilling your query and, don't forget, the chosen medium
+is shown with different status markers according to whether each package is
+installed/not installed/an update... To change this status, just check or
+uncheck the box before the package name and click on
+Apply.
Tabella 1.
Icona
Legenda
Il pacchetto è già installato
Il pacchetto sarà installato
Il pacchetto non può essere modificato
Il pacchetto è un aggiornamento
Il pacchetto sarà disinstallato
Esempi nello screeshot qui sopra:
If I uncheck digikam (the green arrow tell us it is installed), the status
+icon will go red with an up arrow and it will be uninstalled when clicking
+on Apply.
If I check qdigidoc (which is not installed, see the status), the orange
+with a down arrow status icon will appear and and it will be installed when
+clicking on Apply.
Le dipendenze
Some packages need other packages called dependencies in order to work. They
+are for example libraries or tools. In this case, Rpmdrake displays an
+information window allowing you to choose whether to accept the selected
+dependencies, cancel the operation or get more information (see above). It
+may also happen that various packages are able to provide the needed
+library, in which case rpmdrake displays the list of alternatives with a
+button to get more information and another button to choose which package to
+install.
[1] Puoi avviare questo strumento dalla riga di comando digitando rpmdrake come root.
This tool [18] allows you to configure a
+single scanner device or a multifunction device which includes scanning. It
+also allows you to share local devices connected to this computer with a
+remote computer or to access remote scanners.
Quando utilizzi questo strumento per la prima volta potrebbe apparirti il
+seguente messaggio:
"SANE packages need to be installed to use scanners
Do you want to install the SANE packages?"
Choose Yes to continue. It will install
+scanner-gui and task-scanning if they are not yet
+installed.
If your scanner is identified correctly, so if in the above screen you see
+the name of your scanner, the scanner is ready for use with, for instance,
+XSane or Simple Scan.
In that case, you might now want to want to configure the Scanner
+sharing option. You can read about it in the la sezione chiamata «Scannersharing».
However, if your scanner hasn't been correctly identified, and checking its
+cable(s) and power switch and then pressing Search for new
+scanners doesn't help, you'll need to press Add a
+scanner manually.
Choose the brand of your scanner in the list you see, then its type from the
+list for that brand and click Ok
Nota
If you can't find your scanner in the list, then click
+Cancel
You can leave this setting to Auto-detect available
+ports unless your scanner's interface is a parallel port. In that
+case, select /dev/parport0 if you have only one.
After clicking Ok, in most cases you will see a screen
+similar to the one below.
Here you can choose whether the scanners connected to this machine should be
+accessible by remote machines and by which remote machines. You can also
+decide here whether scanners on remote machines should be made available on
+this machine.
Scanner sharing to hosts : name or IP address of hosts can be added or
+deleted from the list of hosts allowed to access the local device(s), on
+this computer.
Usage of remote scanners : name or IP address of hosts can added or deleted
+from the list of hosts which give access to a remote scanner.
Scanner sharing to hosts: you can add host.
Scanner sharing to hosts: specify which host(s) to add, or allow all remote
+machines.
"All remote machines" are allowed to access the local scanner.
If the package saned is not yet installed, the tool
+offers to do it.
Alla fine lo strumento altererà questi files:
/etc/sane.d/saned.conf
/etc/sane.d/net.conf
/etc/sane.d/dll.conf to add or comment the directive
+"net"
It will also configure saned and
+xinetd to be started on boot.
Specifiche
Hewlett-Packard
Most HP scanners are managed from HP Device Manager
+(hplip) which also manages printers. In this case, this tool does not allow
+you to configure it and invites you to use HP Device
+Manager.
Epson
Drivers are available from this
+page. When indicated, you must install the
+iscan-data package first, then
+iscan (in this order). It is possible that the
+iscan package will generate a warning about a conflict
+with sane. Users have reported that this warning can be
+ignored.
Extra installation steps
It is possible that after selecting a port for your scanner in the Figura 1, «Scegli la porta» screen, you need to take one or more extra
+steps to correctly configure your scanner.
In some cases, you're told the scanner needs its firmware to be uploaded
+each time it is started. This tool allows you to load it into the device,
+after you installed it on your system. In this screen you can install the
+firmware from a CD or a Windows installation, or install the one you
+downloaded from an Internet site of the vendor.
+ When your device's firmware needs to be loaded, it can take a long time at
+each first usage, possibly more than one minute. So be patient.
Also, you may get a screen telling you to adjust the
+/etc/sane.d/"name_of_your_SANE_backend".conf file.
Read those or other instructions you get carefully and if you don't know
+what to do, feel free to ask for help in the forums.
[18] You can start this tool from the command line, by typing
+scannerdrake as root.
" + "Your search returned no results for " + "" + txt_wordsnotfound + "" + "
";
+ }
+ //alert(results);
+ document.getElementById('searchResults').innerHTML = results;
+}
+
+function tokenize(wordsList){
+ var stemmedWordsList = new Array(); // Array with the words to look for after removing spaces
+ var cleanwordsList = new Array(); // Array with the words to look for
+ for(var j in wordsList){
+ var word = wordsList[j];
+ if(typeof stemmer != "undefined" ){
+ stemQueryMap[stemmer(word)] = word;
+ } else {
+ stemQueryMap[word] = word;
+ }
+ }
+ //stemmedWordsList is the stemmed list of words separated by spaces.
+ for (var t in wordsList) {
+ wordsList[t] = wordsList[t].replace(/(%22)|^-/g, "");
+ if (wordsList[t] != "%20") {
+ scriptLetterTab.add(wordsList[t].charAt(0));
+ cleanwordsList.push(wordsList[t]);
+ }
+ }
+
+ if(typeof stemmer != "undefined" ){
+ //Do the stemming using Porter's stemming algorithm
+ for (var i = 0; i < cleanwordsList.length; i++) {
+ var stemWord = stemmer(cleanwordsList[i]);
+ stemmedWordsList.push(stemWord);
+ }
+ } else {
+ stemmedWordsList = cleanwordsList;
+ }
+ return stemmedWordsList;
+}
+
+//Invoker of CJKTokenizer class methods.
+function cjkTokenize(wordsList){
+ var allTokens= new Array();
+ var notCJKTokens= new Array();
+ var j=0;
+ for(j=0;j";
+ return this.input.substring(this.offset,this.offset+2);
+ }
+
+ function getAllTokens(){
+ while(this.incrementToken()){
+ var tmp = this.tokenize();
+ this.tokens.push(tmp);
+ }
+ return this.unique(this.tokens);
+// document.getElementById("content").innerHTML += tokens+" ";
+// document.getElementById("content").innerHTML += " dada"+sortedTokens+" ";
+// console.log(tokens.length+"dsdsds");
+ /*for(i=0;idada"+un[i]+"- "+stems[i]+" "+ ss;
+ document.getElementById("content").innerHTML += " "+sortedTokens[i];
+ }*/
+ }
+
+ function unique(a)
+ {
+ var r = new Array();
+ o:for(var i = 0, n = a.length; i < n; i++)
+ {
+ for(var x = 0, y = r.length; x < y; x++)
+ {
+ if(r[x]==a[i]) continue o;
+ }
+ r[r.length] = a[i];
+ }
+ return r;
+ }
+}
+
+
+/* Scriptfirstchar: to gather the first letter of index js files to upload */
+function Scriptfirstchar() {
+ this.strLetters = "";
+ this.add = addLettre;
+}
+
+function addLettre(caract) {
+
+ if (this.strLetters == 'undefined') {
+ this.strLetters = caract;
+ } else if (this.strLetters.indexOf(caract) < 0) {
+ this.strLetters += caract;
+ }
+
+ return 0;
+}
+/* end of scriptfirstchar */
+
+/*main loader function*/
+/*tab contains the first letters of each word looked for*/
+function loadTheIndexScripts(tab) {
+
+ //alert (tab.strLetters);
+ var scriptsarray = new Array();
+
+ for (var i = 0; i < tab.strLetters.length; i++) {
+
+ scriptsarray[i] = "..\/search" + "\/" + tab.strLetters.charAt(i) + ".js";
+ }
+ // add the list of html files
+ i++;
+ scriptsarray[i] = "..\/search" + "\/" + htmlfileList;
+
+ //debug
+ for (var t in scriptsarray) {
+ //alert (scriptsarray[t]);
+ }
+
+ tab = new ScriptLoader();
+ for (t in scriptsarray) {
+ tab.add(scriptsarray[t]);
+ }
+ tab.load();
+ //alert ("scripts loaded");
+ return (scriptsarray);
+}
+
+/* ScriptLoader: to load the scripts and wait that it's finished */
+function ScriptLoader() {
+ this.cpt = 0;
+ this.scriptTab = new Array();
+ this.add = addAScriptInTheList;
+ this.load = loadTheScripts;
+ this.onScriptLoaded = onScriptLoadedFunc;
+}
+
+function addAScriptInTheList(scriptPath) {
+ this.scriptTab.push(scriptPath);
+}
+
+function loadTheScripts() {
+ var script;
+ var head;
+
+ head = document.getElementsByTagName('head').item(0);
+
+ //script = document.createElement('script');
+
+ for (var el in this.scriptTab) {
+ //alert (el+this.scriptTab[el]);
+ script = document.createElement('script');
+ script.src = this.scriptTab[el];
+ script.type = 'text/javascript';
+ script.defer = false;
+
+ head.appendChild(script);
+ }
+
+}
+
+function onScriptLoadedFunc(e) {
+ e = e || window.event;
+ var target = e.target || e.srcElement;
+ var isComplete = true;
+ if (typeof target.readyState != undefined) {
+
+ isComplete = (target.readyState == "complete" || target.readyState == "loaded");
+ }
+ if (isComplete) {
+ ScriptLoader.cpt++;
+ if (ScriptLoader.cpt == ScriptLoader.scripts.length) {
+ ScriptLoader.onLoadComplete();
+ }
+ }
+}
+
+/*
+function onLoadComplete() {
+ alert("loaded !!");
+} */
+
+/* End of scriptloader functions */
+
+// Array.unique( strict ) - Remove duplicate values
+function unique(tab) {
+ var a = new Array();
+ var i;
+ var l = tab.length;
+
+ if (tab[0] != undefined) {
+ a[0] = tab[0];
+ }
+ else {
+ return -1
+ }
+
+ for (i = 1; i < l; i++) {
+ if (indexof(a, tab[i], 0) < 0) {
+ a.push(tab[i]);
+ }
+ }
+ return a;
+}
+function indexof(tab, element, begin) {
+ for (var i = begin; i < tab.length; i++) {
+ if (tab[i] == element) {
+ return i;
+ }
+ }
+ return -1;
+
+}
+/* end of Array functions */
+
+
+/*
+ Param: mots= list of words to look for.
+ This function creates an hashtable:
+ - The key is the index of a html file which contains a word to look for.
+ - The value is the list of all words contained in the html file.
+
+ Return value: the hashtable fileAndWordList
+ */
+function SortResults(mots) {
+
+ var fileAndWordList = new Object();
+ if (mots.length == 0) {
+ return null;
+ }
+
+ for (var t in mots) {
+ // get the list of the indices of the files.
+ var listNumerosDesFicStr = w[mots[t].toString()];
+ //alert ("listNumerosDesFicStr "+listNumerosDesFicStr);
+ var tab = listNumerosDesFicStr.split(",");
+
+ //for each file (file's index):
+ for (var t2 in tab) {
+ var temp = tab[t2].toString();
+ if (fileAndWordList[temp] == undefined) {
+
+ fileAndWordList[temp] = "" + mots[t];
+ } else {
+
+ fileAndWordList[temp] += "," + mots[t];
+ }
+ }
+ }
+
+ var fileAndWordListValuesOnly = new Array();
+
+ // sort results according to values
+ var temptab = new Array();
+ for (t in fileAndWordList) {
+ tab = fileAndWordList[t].split(',');
+
+ var tempDisplay = new Array();
+ for (var x in tab) {
+ if(stemQueryMap[tab[x]] != undefined){
+ tempDisplay.push(stemQueryMap[tab[x]]); //get the original word from the stem word.
+ } else {
+ tempDisplay.push(tab[x]); //no stem is available. (probably a CJK language)
+ }
+ }
+ var tempDispString = tempDisplay.join(", ");
+
+ temptab.push(new resultPerFile(t, fileAndWordList[t], tab.length, tempDispString));
+ fileAndWordListValuesOnly.push(fileAndWordList[t]);
+ }
+
+
+ //alert("t"+fileAndWordListValuesOnly.toString());
+
+ fileAndWordListValuesOnly = unique(fileAndWordListValuesOnly);
+ fileAndWordListValuesOnly = fileAndWordListValuesOnly.sort(compare_nbMots);
+ //alert("t: "+fileAndWordListValuesOnly.join(';'));
+
+ var listToOutput = new Array();
+
+ for (var j in fileAndWordListValuesOnly) {
+ for (t in temptab) {
+ if (temptab[t].motsliste == fileAndWordListValuesOnly[j]) {
+ if (listToOutput[j] == undefined) {
+ listToOutput[j] = new Array(temptab[t]);
+ } else {
+ listToOutput[j].push(temptab[t]);
+ }
+ }
+ }
+ }
+ return listToOutput;
+}
+
+function resultPerFile(filenb, motsliste, motsnb, motslisteDisplay) {
+ this.filenb = filenb;
+ this.motsliste = motsliste;
+ this.motsnb = motsnb;
+ this.motslisteDisplay= motslisteDisplay;
+}
+
+function compare_nbMots(s1, s2) {
+ var t1 = s1.split(',');
+ var t2 = s2.split(',');
+ //alert ("s1:"+t1.length + " " +t2.length)
+ if (t1.length == t2.length) {
+ return 0;
+ } else if (t1.length > t2.length) {
+ return 1;
+ } else {
+ return -1;
+ }
+ //return t1.length - t2.length);
+}
\ No newline at end of file
diff --git a/mcc/5/it/content/search/punctuation.props b/mcc/5/it/content/search/punctuation.props
new file mode 100644
index 00000000..d3e3fcd2
--- /dev/null
+++ b/mcc/5/it/content/search/punctuation.props
@@ -0,0 +1,31 @@
+Punct01=\\u3002
+Punct02=\\u3003
+Punct03=\\u300C
+Punct04=\\u300D
+Punct05=\\u300E
+Punct06=\\u300F
+Punct07=\\u301D
+Punct08=\\u301E
+Punct09=\\u301F
+Punct10=\\u309B
+Punct11=\\u2018
+Punct12=\\u2019
+Punct13=\\u201A
+Punct14=\\u201C
+Punct15=\\u201D
+Punct16=\\u201E
+Punct17=\\u2032
+Punct18=\\u2033
+Punct19=\\u2035
+Punct20=\\u2039
+Punct21=\\u203A
+Punct22=\\u201E
+Punct23=\\u00BB
+Punct24=\\u00AB
+Punct25=
+Punct26=
+Punct27=\\u00A0
+Punct28=\\u2014
+
+
+
diff --git a/mcc/5/it/content/search/stemmers/de_stemmer.js b/mcc/5/it/content/search/stemmers/de_stemmer.js
new file mode 100644
index 00000000..7ff3822a
--- /dev/null
+++ b/mcc/5/it/content/search/stemmers/de_stemmer.js
@@ -0,0 +1,247 @@
+/*
+ * Author: Joder Illi
+ *
+ * Copyright (c) 2010, FormBlitz AG
+ * All rights reserved.
+ * Implementation of the stemming algorithm from http://snowball.tartarus.org/algorithms/german/stemmer.html
+ * Copyright of the algorithm is: Copyright (c) 2001, Dr Martin Porter and can be found at http://snowball.tartarus.org/license.php
+ *
+ * Redistribution and use in source and binary forms, with or without modification, is covered by the standard BSD license.
+ *
+ */
+
+//var stemmer = function Stemmer() {
+ /*
+ German includes the following accented forms,
+ ä ö ü
+ and a special letter, ß, equivalent to double s.
+ The following letters are vowels:
+ a e i o u y ä ö ü
+ */
+
+ var stemmer = function(word) {
+ /*
+ Put u and y between vowels into upper case
+ */
+ word = word.replace(/([aeiouyäöü])u([aeiouyäöü])/g, '$1U$2');
+ word = word.replace(/([aeiouyäöü])y([aeiouyäöü])/g, '$1Y$2');
+
+ /*
+ and then do the following mappings,
+ (a) replace ß with ss,
+ (a) replace ae with ä, Not doing these, have trouble with diphtongs
+ (a) replace oe with ö, Not doing these, have trouble with diphtongs
+ (a) replace ue with ü unless preceded by q. Not doing these, have trouble with diphtongs
+ So in quelle, ue is not mapped to ü because it follows q, and in feuer it is not mapped because the first part of the rule changes it to feUer, so the u is not found.
+ */
+ word = word.replace(/ß/g, 'ss');
+ //word = word.replace(/ae/g, 'ä');
+ //word = word.replace(/oe/g, 'ö');
+ //word = word.replace(/([^q])ue/g, '$1ü');
+
+ /*
+ R1 and R2 are first set up in the standard way (see the note on R1 and R2), but then R1 is adjusted so that the region before it contains at least 3 letters.
+ R1 is the region after the first non-vowel following a vowel, or is the null region at the end of the word if there is no such non-vowel.
+ R2 is the region after the first non-vowel following a vowel in R1, or is the null region at the end of the word if there is no such non-vowel.
+ */
+
+ var r1Index = word.search(/[aeiouyäöü][^aeiouyäöü]/);
+ var r1 = '';
+ if (r1Index != -1) {
+ r1Index += 2;
+ r1 = word.substring(r1Index);
+ }
+
+ var r2Index = -1;
+ var r2 = '';
+
+ if (r1Index != -1) {
+ var r2Index = r1.search(/[aeiouyäöü][^aeiouyäöü]/);
+ if (r2Index != -1) {
+ r2Index += 2;
+ r2 = r1.substring(r2Index);
+ r2Index += r1Index;
+ } else {
+ r2 = '';
+ }
+ }
+
+ if (r1Index != -1 && r1Index < 3) {
+ r1Index = 3;
+ r1 = word.substring(r1Index);
+ }
+
+ /*
+ Define a valid s-ending as one of b, d, f, g, h, k, l, m, n, r or t.
+ Define a valid st-ending as the same list, excluding letter r.
+ */
+
+ /*
+ Do each of steps 1, 2 and 3.
+ */
+
+ /*
+ Step 1:
+ Search for the longest among the following suffixes,
+ (a) em ern er
+ (b) e en es
+ (c) s (preceded by a valid s-ending)
+ */
+ var a1Index = word.search(/(em|ern|er)$/g);
+ var b1Index = word.search(/(e|en|es)$/g);
+ var c1Index = word.search(/([bdfghklmnrt]s)$/g);
+ if (c1Index != -1) {
+ c1Index++;
+ }
+ var index1 = 10000;
+ var optionUsed1 = '';
+ if (a1Index != -1 && a1Index < index1) {
+ optionUsed1 = 'a';
+ index1 = a1Index;
+ }
+ if (b1Index != -1 && b1Index < index1) {
+ optionUsed1 = 'b';
+ index1 = b1Index;
+ }
+ if (c1Index != -1 && c1Index < index1) {
+ optionUsed1 = 'c';
+ index1 = c1Index;
+ }
+
+ /*
+ and delete if in R1. (Of course the letter of the valid s-ending is not necessarily in R1.) If an ending of group (b) is deleted, and the ending is preceded by niss, delete the final s.
+ (For example, äckern -> äck, ackers -> acker, armes -> arm, bedürfnissen -> bedürfnis)
+ */
+
+ if (index1 != 10000 && r1Index != -1) {
+ if (index1 >= r1Index) {
+ word = word.substring(0, index1);
+ if (optionUsed1 == 'b') {
+ if (word.search(/niss$/) != -1) {
+ word = word.substring(0, word.length -1);
+ }
+ }
+ }
+ }
+ /*
+ Step 2:
+ Search for the longest among the following suffixes,
+ (a) en er est
+ (b) st (preceded by a valid st-ending, itself preceded by at least 3 letters)
+ */
+
+ var a2Index = word.search(/(en|er|est)$/g);
+ var b2Index = word.search(/(.{3}[bdfghklmnt]st)$/g);
+ if (b2Index != -1) {
+ b2Index += 4;
+ }
+
+ var index2 = 10000;
+ var optionUsed2 = '';
+ if (a2Index != -1 && a2Index < index2) {
+ optionUsed2 = 'a';
+ index2 = a2Index;
+ }
+ if (b2Index != -1 && b2Index < index2) {
+ optionUsed2 = 'b';
+ index2 = b2Index;
+ }
+
+ /*
+ and delete if in R1.
+ (For example, derbsten -> derbst by step 1, and derbst -> derb by step 2, since b is a valid st-ending, and is preceded by just 3 letters)
+ */
+
+ if (index2 != 10000 && r1Index != -1) {
+ if (index2 >= r1Index) {
+ word = word.substring(0, index2);
+ }
+ }
+
+ /*
+ Step 3: d-suffixes (*)
+ Search for the longest among the following suffixes, and perform the action indicated.
+ end ung
+ delete if in R2
+ if preceded by ig, delete if in R2 and not preceded by e
+ ig ik isch
+ delete if in R2 and not preceded by e
+ lich heit
+ delete if in R2
+ if preceded by er or en, delete if in R1
+ keit
+ delete if in R2
+ if preceded by lich or ig, delete if in R2
+ */
+
+ var a3Index = word.search(/(end|ung)$/g);
+ var b3Index = word.search(/[^e](ig|ik|isch)$/g);
+ var c3Index = word.search(/(lich|heit)$/g);
+ var d3Index = word.search(/(keit)$/g);
+ if (b3Index != -1) {
+ b3Index ++;
+ }
+
+ var index3 = 10000;
+ var optionUsed3 = '';
+ if (a3Index != -1 && a3Index < index3) {
+ optionUsed3 = 'a';
+ index3 = a3Index;
+ }
+ if (b3Index != -1 && b3Index < index3) {
+ optionUsed3 = 'b';
+ index3 = b3Index;
+ }
+ if (c3Index != -1 && c3Index < index3) {
+ optionUsed3 = 'c';
+ index3 = c3Index;
+ }
+ if (d3Index != -1 && d3Index < index3) {
+ optionUsed3 = 'd';
+ index3 = d3Index;
+ }
+
+ if (index3 != 10000 && r2Index != -1) {
+ if (index3 >= r2Index) {
+ word = word.substring(0, index3);
+ var optionIndex = -1;
+ var optionSubsrt = '';
+ if (optionUsed3 == 'a') {
+ optionIndex = word.search(/[^e](ig)$/);
+ if (optionIndex != -1) {
+ optionIndex++;
+ if (optionIndex >= r2Index) {
+ word = word.substring(0, optionIndex);
+ }
+ }
+ } else if (optionUsed3 == 'c') {
+ optionIndex = word.search(/(er|en)$/);
+ if (optionIndex != -1) {
+ if (optionIndex >= r1Index) {
+ word = word.substring(0, optionIndex);
+ }
+ }
+ } else if (optionUsed3 == 'd') {
+ optionIndex = word.search(/(lich|ig)$/);
+ if (optionIndex != -1) {
+ if (optionIndex >= r2Index) {
+ word = word.substring(0, optionIndex);
+ }
+ }
+ }
+ }
+ }
+
+ /*
+ Finally,
+ turn U and Y back into lower case, and remove the umlaut accent from a, o and u.
+ */
+ word = word.replace(/U/g, 'u');
+ word = word.replace(/Y/g, 'y');
+ word = word.replace(/ä/g, 'a');
+ word = word.replace(/ö/g, 'o');
+ word = word.replace(/ü/g, 'u');
+
+ return word;
+ };
+//}
\ No newline at end of file
diff --git a/mcc/5/it/content/search/stemmers/en_stemmer.js b/mcc/5/it/content/search/stemmers/en_stemmer.js
new file mode 100644
index 00000000..f58012f2
--- /dev/null
+++ b/mcc/5/it/content/search/stemmers/en_stemmer.js
@@ -0,0 +1,187 @@
+// Porter stemmer in Javascript. Few comments, but it's easy to follow against the rules in the original
+// paper, in
+//
+// Porter, 1980, An algorithm for suffix stripping, Program, Vol. 14,
+// no. 3, pp 130-137,
+//
+// see also http://www.tartarus.org/~martin/PorterStemmer
+
+// Release 1 be 'andargor', Jul 2004
+// Release 2 (substantially revised) by Christopher McKenzie, Aug 2009
+
+
+var stemmer = (function(){
+ var step2list = {
+ "ational" : "ate",
+ "tional" : "tion",
+ "enci" : "ence",
+ "anci" : "ance",
+ "izer" : "ize",
+ "bli" : "ble",
+ "alli" : "al",
+ "entli" : "ent",
+ "eli" : "e",
+ "ousli" : "ous",
+ "ization" : "ize",
+ "ation" : "ate",
+ "ator" : "ate",
+ "alism" : "al",
+ "iveness" : "ive",
+ "fulness" : "ful",
+ "ousness" : "ous",
+ "aliti" : "al",
+ "iviti" : "ive",
+ "biliti" : "ble",
+ "logi" : "log"
+ },
+
+ step3list = {
+ "icate" : "ic",
+ "ative" : "",
+ "alize" : "al",
+ "iciti" : "ic",
+ "ical" : "ic",
+ "ful" : "",
+ "ness" : ""
+ },
+
+ c = "[^aeiou]", // consonant
+ v = "[aeiouy]", // vowel
+ C = c + "[^aeiouy]*", // consonant sequence
+ V = v + "[aeiou]*", // vowel sequence
+
+ mgr0 = "^(" + C + ")?" + V + C, // [C]VC... is m>0
+ meq1 = "^(" + C + ")?" + V + C + "(" + V + ")?$", // [C]VC[V] is m=1
+ mgr1 = "^(" + C + ")?" + V + C + V + C, // [C]VCVC... is m>1
+ s_v = "^(" + C + ")?" + v; // vowel in stem
+
+ return function (w) {
+ var stem,
+ suffix,
+ firstch,
+ re,
+ re2,
+ re3,
+ re4,
+ origword = w;
+
+ if (w.length < 3) { return w; }
+
+ firstch = w.substr(0,1);
+ if (firstch == "y") {
+ w = firstch.toUpperCase() + w.substr(1);
+ }
+
+ // Step 1a
+ re = /^(.+?)(ss|i)es$/;
+ re2 = /^(.+?)([^s])s$/;
+
+ if (re.test(w)) { w = w.replace(re,"$1$2"); }
+ else if (re2.test(w)) { w = w.replace(re2,"$1$2"); }
+
+ // Step 1b
+ re = /^(.+?)eed$/;
+ re2 = /^(.+?)(ed|ing)$/;
+ if (re.test(w)) {
+ var fp = re.exec(w);
+ re = new RegExp(mgr0);
+ if (re.test(fp[1])) {
+ re = /.$/;
+ w = w.replace(re,"");
+ }
+ } else if (re2.test(w)) {
+ var fp = re2.exec(w);
+ stem = fp[1];
+ re2 = new RegExp(s_v);
+ if (re2.test(stem)) {
+ w = stem;
+ re2 = /(at|bl|iz)$/;
+ re3 = new RegExp("([^aeiouylsz])\\1$");
+ re4 = new RegExp("^" + C + v + "[^aeiouwxy]$");
+ if (re2.test(w)) { w = w + "e"; }
+ else if (re3.test(w)) { re = /.$/; w = w.replace(re,""); }
+ else if (re4.test(w)) { w = w + "e"; }
+ }
+ }
+
+ // Step 1c
+ re = /^(.+?)y$/;
+ if (re.test(w)) {
+ var fp = re.exec(w);
+ stem = fp[1];
+ re = new RegExp(s_v);
+ if (re.test(stem)) { w = stem + "i"; }
+ }
+
+ // Step 2
+ re = /^(.+?)(ational|tional|enci|anci|izer|bli|alli|entli|eli|ousli|ization|ation|ator|alism|iveness|fulness|ousness|aliti|iviti|biliti|logi)$/;
+ if (re.test(w)) {
+ var fp = re.exec(w);
+ stem = fp[1];
+ suffix = fp[2];
+ re = new RegExp(mgr0);
+ if (re.test(stem)) {
+ w = stem + step2list[suffix];
+ }
+ }
+
+ // Step 3
+ re = /^(.+?)(icate|ative|alize|iciti|ical|ful|ness)$/;
+ if (re.test(w)) {
+ var fp = re.exec(w);
+ stem = fp[1];
+ suffix = fp[2];
+ re = new RegExp(mgr0);
+ if (re.test(stem)) {
+ w = stem + step3list[suffix];
+ }
+ }
+
+ // Step 4
+ re = /^(.+?)(al|ance|ence|er|ic|able|ible|ant|ement|ment|ent|ou|ism|ate|iti|ous|ive|ize)$/;
+ re2 = /^(.+?)(s|t)(ion)$/;
+ if (re.test(w)) {
+ var fp = re.exec(w);
+ stem = fp[1];
+ re = new RegExp(mgr1);
+ if (re.test(stem)) {
+ w = stem;
+ }
+ } else if (re2.test(w)) {
+ var fp = re2.exec(w);
+ stem = fp[1] + fp[2];
+ re2 = new RegExp(mgr1);
+ if (re2.test(stem)) {
+ w = stem;
+ }
+ }
+
+ // Step 5
+ re = /^(.+?)e$/;
+ if (re.test(w)) {
+ var fp = re.exec(w);
+ stem = fp[1];
+ re = new RegExp(mgr1);
+ re2 = new RegExp(meq1);
+ re3 = new RegExp("^" + C + v + "[^aeiouwxy]$");
+ if (re.test(stem) || (re2.test(stem) && !(re3.test(stem)))) {
+ w = stem;
+ }
+ }
+
+ re = /ll$/;
+ re2 = new RegExp(mgr1);
+ if (re.test(w) && re2.test(w)) {
+ re = /.$/;
+ w = w.replace(re,"");
+ }
+
+ // and turn initial Y back to y
+
+ if (firstch == "y") {
+ w = firstch.toLowerCase() + w.substr(1);
+ }
+
+ return w;
+ }
+})();
\ No newline at end of file
diff --git a/mcc/5/it/content/search/stemmers/fr_stemmer.js b/mcc/5/it/content/search/stemmers/fr_stemmer.js
new file mode 100644
index 00000000..34f97431
--- /dev/null
+++ b/mcc/5/it/content/search/stemmers/fr_stemmer.js
@@ -0,0 +1,299 @@
+/*
+ * Author: Kasun Gajasinghe
+ * E-Mail: kasunbg AT gmail DOT com
+ * Date: 09.08.2010
+ *
+ * usage: stemmer(word);
+ * ex: var stem = stemmer(foobar);
+ * Implementation of the stemming algorithm from http://snowball.tartarus.org/algorithms/french/stemmer.html
+ *
+ * LICENSE:
+ *
+ * Copyright (c) 2010, Kasun Gajasinghe. All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without modification,
+ * are permitted provided that the following conditions are met:
+ *
+ * 1. Redistributions of source code must retain the above copyright notice,
+ * this list of conditions and the following disclaimer.
+ *
+ * 2. Redistributions in binary form must reproduce the above copyright notice,
+ * this list of conditions and the following disclaimer in the documentation
+ * and/or other materials provided with the distribution.
+ *
+ *
+ * THIS SOFTWARE IS PROVIDED BY KASUN GAJASINGHE ''AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES,
+ * INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A
+ * PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL KASUN GAJASINGHE BE LIABLE FOR ANY DIRECT,
+ * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+ * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+ * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
+ * STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
+ * USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ *
+ */
+
+var stemmer = function(word){
+// Letters in French include the following accented forms,
+// â à ç ë é ê è ï î ô û ù
+// The following letters are vowels:
+// a e i o u y â à ë é ê è ï î ô û ù
+
+ word = word.toLowerCase();
+ var oriWord = word;
+ word = word.replace(/qu/g, 'qU'); //have to perform first, as after the operation, capital U is not treated as a vowel
+ word = word.replace(/([aeiouyâàëéêèïîôûù])u([aeiouyâàëéêèïîôûù])/g, '$1U$2');
+ word = word.replace(/([aeiouyâàëéêèïîôûù])i([aeiouyâàëéêèïîôûù])/g, '$1I$2');
+ word = word.replace(/([aeiouyâàëéêèïîôûù])y/g, '$1Y');
+ word = word.replace(/y([aeiouyâàëéêèïîôûù])/g, 'Y$1');
+
+ var rv='';
+ var rvIndex = -1;
+ if(word.search(/^(par|col|tap)/) != -1 || word.search(/^[aeiouyâàëéêèïîôûù]{2}/) != -1){
+ rv = word.substring(3);
+ rvIndex = 3;
+ } else {
+ rvIndex = word.substring(1).search(/[aeiouyâàëéêèïîôûù]/);
+ if(rvIndex != -1){
+ rvIndex +=2; //+2 is to supplement the substring(1) used to find rvIndex
+ rv = word.substring(rvIndex);
+ } else {
+ rvIndex = word.length;
+ }
+ }
+
+// R1 is the region after the first non-vowel following a vowel, or the end of the word if there is no such non-vowel.
+// R2 is the region after the first non-vowel following a vowel in R1, or the end of the word if there is no such non-vowel
+ var r1Index = word.search(/[aeiouyâàëéêèïîôûù][^aeiouyâàëéêèïîôûù]/);
+ var r1 = '';
+ if (r1Index != -1) {
+ r1Index += 2;
+ r1 = word.substring(r1Index);
+ } else {
+ r1Index = word.length;
+ }
+
+ var r2Index = -1;
+ var r2 = '';
+ if (r1Index != -1) {
+ r2Index = r1.search(/[aeiouyâàëéêèïîôûù][^aeiouyâàëéêèïîôûù]/);
+ if (r2Index != -1) {
+ r2Index += 2;
+ r2 = r1.substring(r2Index);
+ r2Index += r1Index;
+ } else {
+ r2 = '';
+ r2Index = word.length;
+ }
+ }
+ if (r1Index != -1 && r1Index < 3) {
+ r1Index = 3;
+ r1 = word.substring(r1Index);
+ }
+
+ /*
+ Step 1: Standard suffix removal
+ */
+ var a1Index = word.search(/(ance|iqUe|isme|able|iste|eux|ances|iqUes|ismes|ables|istes)$/);
+ var a2Index = word.search(/(atrice|ateur|ation|atrices|ateurs|ations)$/);
+ var a3Index = word.search(/(logie|logies)$/);
+ var a4Index = word.search(/(usion|ution|usions|utions)$/);
+ var a5Index = word.search(/(ence|ences)$/);
+ var a6Index = word.search(/(ement|ements)$/);
+ var a7Index = word.search(/(ité|ités)$/);
+ var a8Index = word.search(/(if|ive|ifs|ives)$/);
+ var a9Index = word.search(/(eaux)$/);
+ var a10Index = word.search(/(aux)$/);
+ var a11Index = word.search(/(euse|euses)$/);
+ var a12Index = word.search(/[^aeiouyâàëéêèïîôûù](issement|issements)$/);
+ var a13Index = word.search(/(amment)$/);
+ var a14Index = word.search(/(emment)$/);
+ var a15Index = word.search(/[aeiouyâàëéêèïîôûù](ment|ments)$/);
+
+ if(a1Index != -1 && a1Index >= r2Index){
+ word = word.substring(0,a1Index);
+ } else if(a2Index != -1 && a2Index >= r2Index){
+ word = word.substring(0,a2Index);
+ var a2Index2 = word.search(/(ic)$/);
+ if(a2Index2 != -1 && a2Index2 >= r2Index){
+ word = word.substring(0, a2Index2); //if preceded by ic, delete if in R2,
+ } else { //else replace by iqU
+ word = word.replace(/(ic)$/,'iqU');
+ }
+ } else if(a3Index != -1 && a3Index >= r2Index){
+ word = word.replace(/(logie|logies)$/,'log'); //replace with log if in R2
+ } else if(a4Index != -1 && a4Index >= r2Index){
+ word = word.replace(/(usion|ution|usions|utions)$/,'u'); //replace with u if in R2
+ } else if(a5Index != -1 && a5Index >= r2Index){
+ word = word.replace(/(ence|ences)$/,'ent'); //replace with ent if in R2
+ } else if(a6Index != -1 && a6Index >= rvIndex){
+ word = word.substring(0,a6Index);
+ if(word.search(/(iv)$/) >= r2Index){
+ word = word.replace(/(iv)$/, '');
+ if(word.search(/(at)$/) >= r2Index){
+ word = word.replace(/(at)$/, '');
+ }
+ } else if(word.search(/(eus)$/) != -1){
+ var a6Index2 = word.search(/(eus)$/);
+ if(a6Index2 >=r2Index){
+ word = word.substring(0, a6Index2);
+ } else if(a6Index2 >= r1Index){
+ word = word.substring(0,a6Index2)+"eux";
+ }
+ } else if(word.search(/(abl|iqU)$/) >= r2Index){
+ word = word.replace(/(abl|iqU)$/,''); //if preceded by abl or iqU, delete if in R2,
+ } else if(word.search(/(ièr|Ièr)$/) >= rvIndex){
+ word = word.replace(/(ièr|Ièr)$/,'i'); //if preceded by abl or iqU, delete if in R2,
+ }
+ } else if(a7Index != -1 && a7Index >= r2Index){
+ word = word.substring(0,a7Index); //delete if in R2
+ if(word.search(/(abil)$/) != -1){ //if preceded by abil, delete if in R2, else replace by abl, otherwise,
+ var a7Index2 = word.search(/(abil)$/);
+ if(a7Index2 >=r2Index){
+ word = word.substring(0, a7Index2);
+ } else {
+ word = word.substring(0,a7Index2)+"abl";
+ }
+ } else if(word.search(/(ic)$/) != -1){
+ var a7Index3 = word.search(/(ic)$/);
+ if(a7Index3 != -1 && a7Index3 >= r2Index){
+ word = word.substring(0, a7Index3); //if preceded by ic, delete if in R2,
+ } else { //else replace by iqU
+ word = word.replace(/(ic)$/,'iqU');
+ }
+ } else if(word.search(/(iv)$/) != r2Index){
+ word = word.replace(/(iv)$/,'');
+ }
+ } else if(a8Index != -1 && a8Index >= r2Index){
+ word = word.substring(0,a8Index);
+ if(word.search(/(at)$/) >= r2Index){
+ word = word.replace(/(at)$/, '');
+ if(word.search(/(ic)$/) >= r2Index){
+ word = word.replace(/(ic)$/, '');
+ } else { word = word.replace(/(ic)$/, 'iqU'); }
+ }
+ } else if(a9Index != -1){ word = word.replace(/(eaux)/,'eau')
+ } else if(a10Index >= r1Index){ word = word.replace(/(aux)/,'al')
+ } else if(a11Index != -1 ){
+ var a11Index2 = word.search(/(euse|euses)$/);
+ if(a11Index2 >=r2Index){
+ word = word.substring(0, a11Index2);
+ } else if(a11Index2 >= r1Index){
+ word = word.substring(0, a11Index2)+"eux";
+ }
+ } else if(a12Index!=-1 && a12Index>=r1Index){
+ word = word.substring(0,a12Index+1); //+1- amendment to non-vowel
+ } else if(a13Index!=-1 && a13Index>=rvIndex){
+ word = word.replace(/(amment)$/,'ant');
+ } else if(a14Index!=-1 && a14Index>=rvIndex){
+ word = word.replace(/(emment)$/,'ent');
+ } else if(a15Index!=-1 && a15Index>=rvIndex){
+ word = word.substring(0,a15Index+1);
+ }
+
+ /* Step 2a: Verb suffixes beginning i*/
+ var wordStep1 = word;
+ var step2aDone = false;
+ if(oriWord == word.toLowerCase() || oriWord.search(/(amment|emment|ment|ments)$/) != -1){
+ step2aDone = true;
+ var b1Regex = /([^aeiouyâàëéêèïîôûù])(îmes|ît|îtes|i|ie|ies|ir|ira|irai|iraIent|irais|irait|iras|irent|irez|iriez|irions|irons|iront|is|issaIent|issais|issait|issant|issante|issantes|issants|isse|issent|isses|issez|issiez|issions|issons|it)$/i;
+ if(word.search(b1Regex) >= rvIndex){
+ word = word.replace(b1Regex,'$1');
+ }
+ }
+
+ /* Step 2b: Other verb suffixes*/
+ if (step2aDone && wordStep1 == word) {
+ if (word.search(/(ions)$/) >= r2Index) {
+ word = word.replace(/(ions)$/, '');
+ } else {
+ var b2Regex = /(é|ée|ées|és|èrent|er|era|erai|eraIent|erais|erait|eras|erez|eriez|erions|erons|eront|ez|iez)$/i;
+ if (word.search(b2Regex) >= rvIndex) {
+ word = word.replace(b2Regex, '');
+ } else {
+ var b3Regex = /e(âmes|ât|âtes|a|ai|aIent|ais|ait|ant|ante|antes|ants|as|asse|assent|asses|assiez|assions)$/i;
+ if (word.search(b3Regex) >= rvIndex) {
+ word = word.replace(b3Regex, '');
+ } else {
+ var b3Regex2 = /(âmes|ât|âtes|a|ai|aIent|ais|ait|ant|ante|antes|ants|as|asse|assent|asses|assiez|assions)$/i;
+ if (word.search(b3Regex2) >= rvIndex) {
+ word = word.replace(b3Regex2, '');
+ }
+ }
+ }
+ }
+ }
+
+ if(oriWord != word.toLowerCase()){
+ /* Step 3 */
+ var rep = '';
+ if(word.search(/Y$/) != -1) {
+ word = word.replace(/Y$/, 'i');
+ } else if(word.search(/ç$/) != -1){
+ word = word.replace(/ç$/, 'c');
+ }
+ } else {
+ /* Step 4 */
+ //If the word ends s, not preceded by a, i, o, u, è or s, delete it.
+ if (word.search(/([^aiouès])s$/) >= rvIndex) {
+ word = word.replace(/([^aiouès])s$/, '$1');
+ }
+ var e1Index = word.search(/ion$/);
+ if (e1Index >= r2Index && word.search(/[st]ion$/) >= rvIndex) {
+ word = word.substring(0, e1Index);
+ } else {
+ var e2Index = word.search(/(ier|ière|Ier|Ière)$/);
+ if (e2Index != -1 && e2Index >= rvIndex) {
+ word = word.substring(0, e2Index) + "i";
+ } else {
+ if (word.search(/e$/) >= rvIndex) {
+ word = word.replace(/e$/, ''); //delete last e
+ } else if (word.search(/guë$/) >= rvIndex) {
+ word = word.replace(/guë$/, 'gu');
+ }
+ }
+ }
+ }
+
+ /* Step 5: Undouble */
+ //word = word.replace(/(en|on|et|el|eil)(n|t|l)$/,'$1');
+ word = word.replace(/(en|on)(n)$/,'$1');
+ word = word.replace(/(ett)$/,'et');
+ word = word.replace(/(el|eil)(l)$/,'$1');
+
+ /* Step 6: Un-accent */
+ word = word.replace(/[éè]([^aeiouyâàëéêèïîôûù]+)$/,'e$1');
+ word = word.toLowerCase();
+ return word;
+};
+
+var eqOut = new Array();
+var noteqOut = new Array();
+var eqCount = 0;
+/*
+To test the stemming, create two arrays named "voc" and "COut" which are for vocabualary and the stemmed output.
+Then add the vocabulary strings and output strings. This method will generate the stemmed output for "voc" and will
+compare the output with COut.
+ (I used porter's voc and out files and did a regex to convert them to js objects. regex: /");\nvoc.push("/g . This
+ will add strings to voc array such that output would look like: voc.push("foobar"); ) drop me an email for any help.
+ */
+function testFr(){
+ var start = new Date().getTime(); //execution time
+ eqCount = 0;
+ eqOut = new Array();
+ noteqOut = new Array();
+ for(var k=0;k
+
+
+
+ Gestione software
Printing is managed on Mageia by a server named CUPS. It has its own configuration
+interface which is accessible via an Internet browser, but Mageia
+offers its own tool for installing printers called system-config-printer
+which is shared with other distributions such as Fedora, Mandriva, Ubuntu
+and openSUSE.
You should enable the non-free repository before proceeding with the
+installation, because some drivers may only be available in this way.
Printer installation is carried out in the Hardware
+section of the Mageia Control Centre. Select the Configure
+printing and scanning tool[17].
MCC will ask for the installation two packages:
task-printing-server
task-printing-hp
It is necessary to accept this installation to continue. Up to 230MB of
+dependencies are needed.
To add a printer, choose the "Add" printer button. The system will try to
+detect any printers and the ports available. The screenshot displays a
+printer connected to a parallel port. If a printer is detected, such as a
+printer on a USB port, it will be displayed on the first line. The window
+will also attempt to configure a network printer.
Stampante automaticamente identificata
This usually refers to USB printers. The utility automatically finds the
+name of the printer and displays it. Select the printer and then click
+"Next". If there is a known driver associated for the printer, it will be
+automatically installed. If there is more than one driver or no known
+drivers, a window will ask you to select or furnish one, as explained in the
+next paragraph. Continue with la sezione chiamata «Completa il processo di installazione»
Stampante non automaticamente identificata
When you select a port, the system loads a driver list and displays a window
+to select a driver. The choice can be made through one of the following
+options.
Seleziona una stampante dal database
fornisci il file PPD
cerca un driver da scaricare
By selecting from the database, the window suggests a printer manufacturer
+first, and then a device and a driver associated with it. If more than one
+driver is suggested, select one which is recommended, unless you have
+encountered some problems with that one before, in this case select the one
+which know to work.
Completa il processo di installazione
After the driver selection, a window requests some information which will
+allow the system to designate and discover the printer. The first line is
+the name under which the device will appear in applications in the list of
+available printers. The installer then suggests printing a test page. After
+this step, the printer is added and appears in the list of available
+printers.
Stampante di rete
Network printers are printers that are attached directly to a wired or
+wireless network, that are attached to a printserver or that are attached to
+another workstation that serves as printserver.
Nota
Often, it is better to configure the DHCP server to always associate a fixed
+IP address with the printer's MAC-address. Of course that should be the same
+as the IP address the printer of printserver is set to, if it has a fixed
+one.
The printer's Mac-address is a serial number given to the printer or
+printserver or computer it is attached to, that can be obtained from a
+configuration page printed by the printer or which may be written on a label
+on the printer or printserver. If your shared printer is attached to a
+Mageia system, you can run ifconfig on it
+as root to find the MAC-address. It is the sequence of numbers and letters
+after "HWaddr".
You can add your network printer by choosing the protocol it uses to talk to
+your computer over the network. If you don't know which protocol to choose,
+you can try the Network Printer - Find
+Network Printer option in the Devices menu
+and give the IP address of the printer in the box on the right, where it
+says "host".
If the tool recognises your printer or printserver, it will propose a
+protocol and a queue, but you can choose a more appropriate one from the
+list below it or give the correct queue name if it isn't in the list.
Look in the documentation that came with your printer or printserver to find
+which protocol(s) it supports and for possible specific queue names.
Network printing protocols
One current technique is one developed by Hewlett-Packard and known as
+JetDirect. It allows access to a printer directly connected to the network
+via an Ethernet port. You must know the IP-address at which the printer is
+known on the network. This technique is also used inside some ADSL-routers
+which contain an USB port to connect the printer. In this case, the
+IP-address is that of the router. Note that the tool "Hp Device manager" can
+manage dynamically configured IP-adress, setting an URI like
+hp:/net/<name-of-the-printer> . In this case, fixed
+IP-adress is not required.
Choose the option AppSocket/HP JetDirect as the
+protocol and set the address in Host:, do not change
+the Port Number, unless you know that it needs to be
+changed. After the selection of the protocol, the selection of the driver is
+the same as above.
Gli altri protocolli sono:
Internet Printing Protocol (ipp): a printer which can
+be accessed on a TCP/IP network via the IPP protocol, for example a printer
+connected to a station using CUPS. This protocol may also be used also by
+some ADSL-routers.
Internet Printing Protocol (https): the same as ipp,
+but using http transport and with TLS secured protocol. The port has to be
+defined. By default, the port 631 is used.
Internet Printing Protocol (ipps): the same as ipp, but
+with TLS secured protocol.
LPD/LPR host or Printer: a printer which can be
+accessed on a TCP/IP network via the LPD protocol, for example a printer
+connected to a station using LPD.
Windows printer via SAMBA: a printer connected to a
+station running Windows or a SMB server and shared.
The URI can also be added directly. Here are some examples on how to form
+the URI:
You can access the properties of the device. The menu allows access to
+parameters for the CUPS server. By default a CUPS server is launched on your
+system, but you can specify a different one with the
+Server | Connect... menu,
+another window which gives access to the tuning of other specific parameters
+of the server, following Server |
+Settings.
Troubleshoot
You can find some information on occurring errors during printing by
+inspecting /var/log/cups/error_log
You can also access to a tool to diagnose problems using the
+Help | Troubleshoot menu.
Specifiche
It is possible that some drivers for specific printers are not available in
+Mageia or are not functional. In this case, have a look at the openprinting site to
+check if a driver for your device is available. If yes, check if the package
+is already present in Mageia and in this case install it manually. Then,
+redo the installation process to configure the printer. In all cases, report
+the problem in bugzilla or on the forum if you are comfortable with this
+tool and furnish the model and driver information and whether the printer
+works or not after installation. Here are some sources to find other
+up-to-date drivers or for more recent devices.
Brother printers
This
+page give a list of drivers provided by Brother. Search the driver
+for your device, download the rpm(s) and install.
You should install Brother drivers before running the configuration utility.
Hewlett-Packard printers and All in one
+devices
These devices use the hplip tool. It is installed automatically after the
+detection or the selection of the printer. You can find other information
+here. The
+tool "HP Device Manager" is available in the System
+menu. Also view configuration
+for the management of the printer.
A HP All in one device must be installed as a printer and the scanner
+features will be added. Note that sometimes, the Xsane interface doesn't
+allow to scan films or slides (the lighting slid can't operate). In this
+case, it is possible to scan, using the standalone mode, and save the
+picture on a memory card or USB stick inserted in the device. Afterwards,
+open your favourite imaging software and load your picture from the memory
+card which is appeared in the /media folder.
Drivers for Epson printers are available from this
+search page. For the scanner part, you must install the "iscan-data"
+package first, then "iscan" (in this order). A iscan-plugin package can also
+be available and is to install. Choose the rpm packages
+according to your architecture.
It is possible that the iscan package will generate a warning about a
+conflict with sane. Users have reported that this warning can be ignored.
Stampanti Canon
For Canon printers, it may be advisable to install a tool named turboprint
+available here .
[17] You can start this tool from the command line, by typing
+system-config-printer. The root password will be asked
+for.
Importa i documenti e le impostazioni di Windows(TM) Sistema
Importa i documenti e le impostazioni di Windows(TM)
transfugdrake
This tool[33] is found under the System tab in the Mageia Control Center labelled
+Import Windows(TM) documents and settings
The tool allows an administrator to import the user documents and settings
+from a Windows® 2000, Windows® XP or Windows® Vista™
+installation on the same computer as the Mageia installation.
Avvertimento
Please note that all the changes will be applied by transfugdrake
+immediately after pressing Next.
After starting transfugdrake you will see the first wizard page with some
+explanation about the tool and import options.
As soon as you read and understand the instructions, press the
+Next button. This should run a detection of
+Windows® installation.
When the detection step is complete you will see a page which allows you to
+choose accounts in Windows® and
+Mageia for the import procedure. It is possible to choose other user account
+than yours own.
Nota
Please take into account that due to migrate-assistant (the backend of
+transfugdrake) limitations Windows®
+user account names with special symbols can be displayed incorrectly.
Nota
Migration may take some time depending on the size of the document folders.
Avvertimento
Some Windows® applications
+(especially drivers) may create user accounts for different purposes. For
+example, NVidia drivers in Windows®are updated using
+UpdatusUser. Please do not use such accounts for the
+import purposes.
When you finished with the accounts selection press
+Next button. The next page is used to select a method
+to import documents:
Transfugdrake is designed to import Windows® data from My
+Documents, My Music and My
+Pictures folders. It is possible to skip import by selecting the
+appropriate item in this window.
When you finished with the document import method choosing press
+Next button. The next page is used to select a method
+to import bookmarks:
Transfugdrake can import Internet Explorer and
+Mozilla Firefox bookmarks into the bookmarks of Mageia
+Mozilla Firefox instance.
Choose the preferred import option and press the Next
+button.
The next page allows you to import desktop background:
Choose the preferred option and press the Next
+button.
The last page of wizard shows some congratulation message. Just press the
+Finish button.
[33] You can start this tool from the command line, by typing transfugdrake as root.
This tool[32] is found under the System tab in the Mageia Control Center labelled
+"Manage users on system"
The tool allows an administrator to manage the users and the groups, this
+means to add or delete a user or group and to modify user and group settings
+(ID, shell, ...)
When userdrake is opened, all the users existing on the system are listed in
+the Users tab, and all the groups in the
+Groups tab. Both tabs operate the same way.
1 Aggiungi un utente
This button opens a new window with all fields shown empty:
The field Full Name is intended for the
+entry of a family name and first name, but it is possible to write anything
+or nothing as well!
Login is the only required field.
Setting a Password is highly
+recommended. There is a little shield on the right, if it is red, the
+password is weak, too short or is too similar to the login name. You should
+use figures, lower and upper case characters, punctuation marks, etc. The
+shield will turn orange and then green as the password strength improves.
Confirm Password field is there to ensure
+you entered what you intended to.
Login Shell is a drop down list that allows
+you to change the shell used by the user you are adding, the options are
+Bash, Dash and Sh.
Create a private group for the user, if
+checked will automatically create a group with the same name and the new
+user as the only member (this may be edited).
The other options should be obvious. The new user is created immediately
+after you click on OK.
2 Aggiungi un gruppo
You only need to enter the new group name, and if required, the specific
+group ID.
3 Modifica (un utente selezionato)
User Data: Allows you to modify all the data given
+for the user at creation (the ID can't be changed).
Informazioni sull'account:
The first option is for setting an expiration date for the account.
+Connection is impossible after this date. This is useful for temporary
+accounts.
The second option is to lock the account, connection is impossible as long
+as the account is locked.
E' possibile cambiare l'icona.
Password Info: Allows you to set an
+expiration date for the password, this forces the user to change his
+password periodically.
Group: Here you can select the groups that
+the user is a member of.
Nota
Se stai modificando l'account di un utente connesso, allora le modifiche non
+saranno effettive fino al suo prossimo login.
4 Edit (with a group selected)
Group Data: Allows you to modify the group
+name.
Group Users: Here you can select the users
+who are members of the group
5 Delete
Select a user or a group and click on Delete to remove it. For a user, a window appears to
+ask if home directory and mailbox must also be deleted. If a private group
+has been created for the user, it will be deleted as well.
Avvertimento
It is possible to delete a group which is not empty.
6 Ricarica
The User database can be changed outside of Userdrake. Click on this icon to
+refresh the display.
7 Account ospite
guest is a special account. It is intended
+to give somebody temporary access to the system with total security. Login
+is xguest, there is no password, and it is impossible to make modifications
+to the system from this account. The personal directories are deleted at the
+end of the session. This account is enabled by default, to disable it, click
+in the menu on Actions -> Uninstall guest account.
[32] You can start this tool from the command line, by typing userdrake as root.