Contents
- Start-Up
- About This Guide
- 1. Feedback
- 2. Additional Documentation
- 3. Documentation Conventions
- 4. About the Making of This Manual
- 5. Source Code
- 6. Acknowledgments
- I. Installation and Setup
- 1. Installation with YaST
- 1.1. Choosing the Installation Media
- 1.2. Choosing the Installation Method
- 1.3. The Installation Workflow
- 1.4. System Start-Up for Installation
- 1.5. The Boot Screen
- 1.6. Language
- 1.7. Media Check
- 1.8. License Agreement
- 1.9. Installation Mode
- 1.10. Clock and Time Zone
- 1.11. Desktop Selection
- 1.12. Installation Settings
- 1.13. Performing the Installation
- 1.14. Configuration of the Installed System
- 1.15. Graphical Login
- 2. Setting Up Hardware Components with YaST
- 2.1. Probing Your Hardware
- 2.2. Setting Up Graphics Card and Monitor
- 2.3. Setting Up Keyboard and Mouse
- 2.4. Setting Up Sound Cards
- 2.5. Setting Up a Printer
- 2.6. Setting Up a Scanner
- 3. Installing or Removing Software
- 3.1. Installing Software
- 3.2. Checking Software Dependencies
- 3.3. Packages and Software Repositories
- 3.4. Removing Software
- 3.5. Adding Software Repositories
- 3.6. Installing Add-On Products
- 3.7. Keeping the System Up-to-date
- 4. Accessing the Internet
- 4.1. Direct Internet Connection
- 4.2. Internet Connection Via Network
- 5. Managing Users with YaST
- 5.1. Managing User Accounts
- 5.2. Special Options
- 5.3. Managing Groups
- 5.4. Changing the User Authentication Method
- 6. Changing Language and Country Settings with YaST
- 6.1. Changing the System Language
- 6.2. Changing the Country and Time Settings
- II. Basics
- 7. Basic Concepts
- 7.1. User Concept
- 7.2. The Linux File System
- 7.3. File Access Permissions
- 8. Shell Basics
- 8.1. Starting a Shell
- 8.2. Entering Commands
- 8.3. Working with Files and Directories
- 8.4. Becoming Root
- 8.5. Modifying File Permissions
- 8.6. Useful Features of the Shell
- 8.7. Editing Texts
- 8.8. Searching for Files or Contents
- 8.9. Viewing Text Files
- 8.10. Redirection and Pipes
- 8.11. Handling Processes
- III. Mobility
- 9. Mobile Computing with Linux
- 9.1. Laptops
- 9.2. Mobile Hardware
- 9.3. Cellular Phones and PDAs
- 9.4. For More Information
- 10. Managing Network Connections with NetworkManager
- 10.1. Use Cases for NetworkManager
- 10.2. Activating Use of NetworkManager
- 10.3. Using KNetworkManager
- 10.4. The GNOME NetworkManager Applet
- 10.5. Troubleshooting
- 10.6. For More Information
- 11. Copying and Sharing Files
- 11.1. Scenarios
- 11.2. Access Methods
- 11.3. Accessing Files on Different OS on the Same Computer
- 11.4. Copying Files between Linux Computers
- 11.5. Copying Files between Linux and Windows Computers with SSH
- 11.6. Sharing Files between Linux Computers
- 11.7. Sharing Files between Linux and Windows with Samba
- 11.8. For More Information
- IV. Help and Troubleshooting
- 12. Help and Documentation
- 12.1. Included Help Resources
- 12.2. Additional Help Resources
- 12.3. For More Information
- 13. Common Problems and Their Solutions
- 13.1. Finding and Gathering Information
- 13.2. Installation Problems
- 13.3. Boot Problems
- 13.4. Login Problems
- 13.5. Network Problems
- 13.6. Data Problems
- 13.7. Support for openSUSE
- A. GNU Licenses
- A.1. GNU General Public License
- A.2. GNU Free Documentation License
- Index
- KDE Quick Start
- openSUSE 10.3 KDE Quick Start
- 1. Getting Started
- 2. Starting Programs
- 3. Customizing Your Desktop
- 4. Using Virtual Desktops
- 5. Using 3D Desktops Effects
- 6. Using Konqueror
- 7. Browsing the Internet with Firefox
- 8. Managing Passwords with KWallet
- 9. E-Mailing and Calendaring
- 10. Instant Messaging with Kopete
- 11. Starting OpenOffice.org
- 12. Viewing PDF Files
- 13. Searching for Data
- 14. Creating a CD or DVD
- 15. Managing Your Digital Image Collection
- 16. Managing Your Music Collection
- 17. Configuring Your System with YaST
- 18. Managing Printers
- 19. Logging Out
- 20. For More Information
- 21. Legal Notice
- 22. GNU Free Documentation License
- KDE User Guide
- About This Guide
- 1. Feedback
- 2. Additional Documentation
- 3. Documentation Conventions
- 4. About the Making of This Manual
- 5. Acknowledgments
- I. KDE Desktop
- 1. Getting Started with the KDE Desktop
- 1.1. Logging In and Selecting a Desktop
- 1.2. Logging Out
- 1.3. Desktop Components
- 1.4. Managing Folders and Files with Konqueror
- 1.5. Accessing Network Resources
- 1.6. Finding Data on your Computer or in the File System
- 1.7. Moving Text between Applications
- 1.8. Printing
- 1.9. Managing Internet Connections
- 1.10. Exploring the Internet
- 1.11. E-Mail and Scheduling
- 1.12. Opening or Creating Documents with OpenOffice.org
- 1.13. Managing Passwords with KWallet Manager
- 1.14. Controlling Your Desktop's Power Management with KPowersave
- 1.15. Displaying, Decompressing, and Creating Archives
- 1.16. Taking Screen Shots
- 1.17. Viewing PDF Files with KPDF
- 1.18. Controlling Sound with KMix
- 1.19. Obtaining Software Updates
- 1.20. For More Information
- 2. Customizing Your Settings
- 2.1. The KDE Control Center
- 2.2. Configuring Desktop Objects
- 2.3. Configuring the Main Menu
- 2.4. Configuring the Panel
- 2.5. Configuring KDE Behavior
- 2.6. Configuring 3D Desktop Effects
- 2.7. Configuring System and Security Aspects
- II. Office and Collaboration
- 3. The OpenOffice.org Office Suite
- 3.1. Understanding OpenOffice.org
- 3.2. Word Processing with Writer
- 3.3. Using Spreadsheets with Calc
- 3.4. Using Presentations with Impress
- 3.5. Using Databases with Base
- 3.6. Creating Graphics with Draw
- 3.7. Creating Mathematical Formulas with Math
- 3.8. Finding Help and Information About OpenOffice.org
- 4. Kontact: E-Mailing and Calendaring
- 4.1. Kontact Overview
- 4.2. Mail
- 4.3. Contacts
- 4.4. Calendar
- 4.5. Kontact for GroupWise Users
- 4.6. For More Information
- 5. Synchronizing Handheld Devices with Kitchensync
- 6. Instant Messaging with Kopete
- 6.1. Configuring Kopete
- 6.2. Chatting with Friends
- 6.3. Customizing Kopete
- 6.4. For More Information
- 7. Using Voice over IP with Ekiga
- 7.1. Configuring Ekiga
- 7.2. The Ekiga User Interface
- 7.3. Making a Call
- 7.4. Answering a Call
- 7.5. Using the Address Book
- 7.6. For More Information
- 8. Accessing Network Resources
- 8.1. General Notes on File Sharing and Network Browsing
- 8.2. Accessing Network Shares
- 8.3. Sharing Folders in Mixed Environments
- 8.4. Managing Windows Files
- 8.5. Configuring and Accessing a Windows Network Printer
- 8.6. Configuring Shortcuts to Network Folders
- 8.7. Configuring and Using a Small Web Server
- 9. Encryption with KGpg
- 9.1. Why Signing and Encrypting?
- 9.2. Generating a New Key Pair
- 9.3. Exporting the Public Key
- 9.4. Importing Keys
- 9.5. The Key Server Dialog
- 9.6. Text and File Encryption
- 9.7. For More Information
- 10. Searching with Kerry
- 10.1. Searching Using Kerry
- 10.2. Configuring Kerry
- 11. Getting Started with BasKet
- 11.1. Creating Baskets
- 11.2. Working with Baskets
- 11.3. For More Information
- III. Internet
- 12. Browsing with Konqueror
- 12.1. Tabbed Browsing
- 12.2. Automatic Scrolling
- 12.3. Profiles
- 12.4. Saving Web Pages and Graphics
- 12.5. Searching with Konqueror
- 12.6. Bookmarks
- 12.7. Java and JavaScript
- 12.8. Enabling Advertisement Blockers
- 12.9. For More Information
- 13. Browsing with Firefox
- 13.1. Navigating Web Sites
- 13.2. Finding Information
- 13.3. Managing Bookmarks
- 13.4. Using the Download Manager
- 13.5. Customizing Firefox
- 13.6. Printing from Firefox
- 13.7. For More Information
- 14. Transferring Data from the Internet
- 14.1. Adding Transfers to the List
- 14.2. Adding Transfers from a File
- 14.3. Timer-Controlled Transfers
- 15. Reading News Feeds with Akregator
- IV. Multimedia
- 16. Manipulating Graphics with The GIMP
- 16.1. Graphics Formats
- 16.2. Starting The GIMP
- 16.3. Getting Started
- 16.4. Saving Images
- 16.5. Editing Images
- 16.6. Printing Images
- 16.7. For More Information
- 17. Managing Your Digital Image Collection
- 17.1. Configuring Your Camera
- 17.2. Downloading Pictures from the Camera
- 17.3. Managing Albums
- 17.4. Managing Tags
- 17.5. Creating Powerful Search Filters
- 17.6. Exporting Image Collections
- 17.7. Viewing and Editing Images
- 17.8. Useful Tools
- 17.9. Troubleshooting
- 17.10. For More Information
- 18. Playing Music and Movies
- 18.1. Mixers
- 18.2. Playing Music Files
- 18.3. Handling Audio CDs
- 18.4. Playing Movie Files
- 19. Burning CDs and DVDs
- 19.1. Creating a Data CD or DVD
- 19.2. Creating an Audio CD
- 19.3. Copying a CD or DVD
- 19.4. Writing ISO Images
- 19.5. Creating a Multisession CD or DVD
- 19.6. For More Information
- A. Moving from Windows to Linux
- A.1. Starting Applications from the Main Menu
- A.2. Managing Files
- A.3. Using the Command Line
- A.4. Customizing Your Desktop
- A.5. Switching between Applications
- A.6. Accessing Network Resources
- B. GNU Licenses
- B.1. GNU General Public License
- B.2. GNU Free Documentation License
- Index
- GNOME Quick Start
- openSUSE 10.3 GNOME Quick
Start
- 1. Getting Started
- 2. Starting Programs
- 3. Customizing Your Desktop
- 4. Configuring 3D Desktop Effects
- 5. Managing Files and Folders with Nautilus
- 6. Browsing the Internet with Firefox
- 7. E-Mailing and Calendaring
- 8. Instant Messaging with Pidgin
- 9. Starting OpenOffice.org
- 10. Viewing PDF Files
- 11. Finding Files on Your Computer
- 12. Creating a CD or DVD
- 13. Managing Your Digital Image Collection
- 14. Managing Your Music Collection
- 15. Configuring Your System with YaST
- 16. Managing Printers
- 17. Logging Out
- 18. For More Information
- 19. Legal Notice
- 20. GNU Free Documentation License
- Reference
- About This Guide
- 1. Feedback
- 2. Additional Documentation
- 3. Documentation Conventions
- 4. About the Making of This Manual
- 5. Source Code
- 6. Acknowledgments
- I. Advanced Deployment Scenarios
- 1. Remote Installation
- 1.1. Installation Scenarios for Remote Installation
- 1.2. Setting Up the Server Holding the Installation Sources
- 1.3. Preparing the Boot of the Target System
- 1.4. Booting the Target System for Installation
- 1.5. Monitoring the Installation Process
- 2. Advanced Disk Setup
- 2.1. Using the YaST Partitioner
- 2.2. LVM Configuration
- 2.3. Soft RAID Configuration
- II. Administration
- 3. Online Update
- 3.1. YaST Online Update
- 3.2. Update from the Command Line with zypper
- 4. YaST in Text Mode
- 4.1. Navigation in Modules
- 4.2. Restriction of Key Combinations
- 4.3. YaST Command Line Options
- 5. Updating the System and System Changes
- 5.1. Updating the System
- 5.2. Software Changes from Version to Version
- 6. RPM—the Package Manager
- 6.1. Verifying Package Authenticity
- 6.2. Managing Packages: Install, Update, and Uninstall
- 6.3. RPM and Patches
- 6.4. Delta RPM Packages
- 6.5. RPM Queries
- 6.6. Installing and Compiling Source Packages
- 6.7. Compiling RPM Packages with build
- 6.8. Tools for RPM Archives and the RPM Database
- 7. Printer Operation
- 7.1. The Workflow of the Printing System
- 7.2. Methods and Protocols for Connecting Printers
- 7.3. Installing the Software
- 7.4. Network Printers
- 7.5. Graphical Printing Interfaces
- 7.6. Printing from the Command Line
- 7.7. Special Features in openSUSE
- 7.8. Troubleshooting
- 8. The X Window System
- 8.1. Manually Configuring the X Window System
- 8.2. Installing and Configuring Fonts
- 8.3. For More Information
- 9. Xen Virtualization
- 9.1. Basic Components
- 9.2. Setting Up a Virtual Machine Host
- 9.3. Setting Up Virtual Machines
- 9.4. Managing a Virtualization Environment
- 10. System Monitoring Utilities
- 10.1. Debugging
- 10.2. Files and File Systems
- 10.3. Hardware Information
- 10.4. Networking
- 10.5. The
/proc File System - 10.6. Processes
- 10.7. System Information
- 10.8. User Information
- 10.9. Time and Date
- III. System
- 11. 32-Bit and 64-Bit Applications in a 64-Bit System Environment
- 11.1. Runtime Support
- 11.2. Software Development
- 11.3. Software Compilation on Biarch Platforms
- 11.4. Kernel Specifications
- 12. Booting and Configuring a Linux System
- 12.1. The Linux Boot Process
- 12.2. The init Process
- 12.3. System Configuration via /etc/sysconfig
- 13. The Boot Loader
- 13.1. Selecting a Boot Loader
- 13.2. Booting with GRUB
- 13.3. Configuring the Boot Loader with YaST
- 13.4. Uninstalling the Linux Boot Loader
- 13.5. Creating Boot CDs
- 13.6. The Graphical SUSE Screen
- 13.7. Troubleshooting
- 13.8. For More Information
- 14. Special System Features
- 14.1. Information about Special Software Packages
- 14.2. Virtual Consoles
- 14.3. Keyboard Mapping
- 14.4. Language and Country-Specific Settings
- 15. Dynamic Kernel Device Management with udev
- 15.1. The
/dev Directory - 15.2. Kernel uevents and udev
- 15.3. Drivers, Kernel Modules, and Devices
- 15.4. Booting and Initial Device Setup
- 15.5. Monitoring the Running udev Daemon
- 15.6. Influencing Kernel Device Event Handling with udev Rules
- 15.7. Persistent Device Naming
- 15.8. Files used by udev
- 15.9. For More Information
- 16. File Systems in Linux
- 16.1. Terminology
- 16.2. Major File Systems in Linux
- 16.3. Some Other Supported File Systems
- 16.4. Large File Support in Linux
- 16.5. For More Information
- 17. Access Control Lists in Linux
- 17.1. Traditional File Permissions
- 17.2. Advantages of ACLs
- 17.3. Definitions
- 17.4. Handling ACLs
- 17.5. ACL Support in Applications
- 17.6. For More Information
- 18. Authentication with PAM
- 18.1. Structure of a PAM Configuration File
- 18.2. The PAM Configuration of sshd
- 18.3. Configuring PAM Using pam-config
- 18.4. For More Information
- 19. Working with the Shell
- 19.1. Using the Bash Shell
- 19.2. Users and Access Permissions
- 19.3. Important Linux Commands
- 19.4. The vi Editor
- IV. Services
- 20. Basic Networking
- 20.1. IP Addresses and Routing
- 20.2. IPv6—The Next Generation Internet
- 20.3. Name Resolution
- 20.4. Configuring a Network Connection with YaST
- 20.5. Configuring a Network Connection Manually
- 20.6. smpppd as Dial-up Assistant
- 21. SLP Services in the Network
- 21.1. Installation
- 21.2. Activating SLP
- 21.3. SLP Front-Ends in openSUSE
- 21.4. Installation over SLP
- 21.5. Providing Services via SLP
- 21.6. For More Information
- 22. The Domain Name System
- 22.1. DNS Terminology
- 22.2. Installation
- 22.3. Configuration with YaST
- 22.4. Starting the Name Server BIND
- 22.5. The Configuration File /etc/named.conf
- 22.6. Zone Files
- 22.7. Dynamic Update of Zone Data
- 22.8. Secure Transactions
- 22.9. DNS Security
- 22.10. For More Information
- 23. DHCP
- 23.1. Configuring a DHCP Server with YaST
- 23.2. DHCP Software Packages
- 23.3. The DHCP Server dhcpd
- 23.4. For More Information
- 24. Time Synchronization with NTP
- 24.1. Configuring an NTP Client with YaST
- 24.2. Configuring xntp in the Network
- 24.3. Setting Up a Local Reference Clock
- 25. Using NIS
- 25.1. Configuring NIS Servers
- 25.2. Configuring NIS Clients
- 26. LDAP—A Directory Service
- 26.1. LDAP versus NIS
- 26.2. Structure of an LDAP Directory Tree
- 26.3. Configuring an LDAP Server with YaST
- 26.4. Configuring an LDAP Client with YaST
- 26.5. Configuring LDAP Users and Groups in YaST
- 26.6. Browsing the LDAP Directory Tree
- 26.7. Manually Configuring an LDAP Server
- 26.8. Manually Administering LDAP Data
- 26.9. For More Information
- 27. Active Directory Support
- 27.1. Integrating Linux and AD Environments
- 27.2. Background Information for Linux AD Support
- 27.3. Configuring a Linux Client for Active Directory
- 27.4. Logging In to an AD Domain
- 27.5. Changing Passwords
- 28. Sharing File Systems with NFS
- 28.1. NFS Client Configuration
- 28.2. Exporting File Systems over NFS
- 28.3. Exporting File Systems Manually
- 28.4. NFS with Kerberos
- 28.5. For More Information
- 29. Samba
- 29.1. Terminology
- 29.2. Installing a Samba Server
- 29.3. Starting and Stopping Samba
- 29.4. Configuring a Samba Server
- 29.5. Configuring Clients
- 29.6. Samba as Login Server
- 29.7. For More Information
- 30. The Apache HTTP Server
- 30.1. Quick Start
- 30.2. Configuring Apache
- 30.3. Starting and Stopping Apache
- 30.4. Installing, Activating, and Configuring Modules
- 30.5. Getting CGI Scripts to Work
- 30.6. Setting Up a Secure Web Server with SSL
- 30.7. Avoiding Security Problems
- 30.8. Troubleshooting
- 30.9. For More Information
- 31. Setting up a FTP server with YaST
- 31.1. Starting the FTP server
- 31.2. FTP General Settings
- 31.3. FTP Performance Settings
- 31.4. Authentication
- 31.5. Expert Settings
- 31.6. For more information
- V. Mobility
- 32. Power Management
- 32.1. Power Saving Functions
- 32.2. ACPI
- 32.3. Rest for the Hard Disk
- 32.4. The powersave Package
- 33. Wireless Communication
- 33.1. Wireless LAN
- 33.2. Bluetooth
- 33.3. Infrared Data Transmission
- 34. Using Tablet PCs
- 34.1. Installing Tablet PC Packages
- 34.2. Configuring Your Tablet Device
- 34.3. Using the Virtual Keyboard
- 34.4. Rotating Your Display
- 34.5. Using Gesture Recognition
- 34.6. Taking Notes and Sketching with the Pen
- 34.7. Troubleshooting
- 34.8. For More Information
- VI. Security
- 35. Masquerading and Firewalls
- 35.1. Packet Filtering with iptables
- 35.2. Masquerading Basics
- 35.3. Firewalling Basics
- 35.4. SuSEfirewall2
- 35.5. For More Information
- 36. SSH—Secure Network Operations
- 36.1. The OpenSSH Package
- 36.2. The ssh Program
- 36.3. scp—Secure Copy
- 36.4. sftp—Secure File Transfer
- 36.5. The SSH Daemon (sshd)—Server-Side
- 36.6. SSH Authentication Mechanisms
- 36.7. X, Authentication, and Forwarding Mechanisms
- 36.8. Configuring An SSH Daemon with YaST
- 37. Managing X.509 Certification
- 37.1. The Principles of Digital Certification
- 37.2. YaST Modules for CA Management
- 38. Network Authentication—Kerberos
- 38.1. Kerberos Terminology
- 38.2. How Kerberos Works
- 38.3. Users' View of Kerberos
- 38.4. For More Information
- 39. Installing and Administering Kerberos
- 39.1. Kerberos Network Topology
- 39.2. Choosing the Kerberos Realms
- 39.3. Setting Up the KDC Hardware
- 39.4. Configuring Time Synchronization
- 39.5. Configuring the KDC
- 39.6. Configuring Kerberos Clients
- 39.7. Configuring Remote Kerberos Administration
- 39.8. Creating Kerberos Service Principals
- 39.9. Enabling PAM Support for Kerberos
- 39.10. Configuring SSH for Kerberos Authentication
- 39.11. Using LDAP and Kerberos
- 40. Encrypting Partitions and Files
- 40.1. Setting Up an Encrypted File System with YaST
- 40.2. Using Encrypted Home Directories
- 40.3. Using vi to Encrypt Single Files
- 41. Confining Privileges with AppArmor
- 41.1. Installing Novell AppArmor
- 41.2. Enabling and Disabling Novell AppArmor
- 41.3. Getting Started with Profiling Applications
- 42. Security and Confidentiality
- 42.1. Local Security and Network Security
- 42.2. Some General Security Tips and Tricks
- 42.3. Using the Central Security Reporting Address
- A. An Example Network
- B. GNU Licenses
- B.1. GNU General Public License
- B.2. GNU Free Documentation License
- Index
- AppArmor Quick Start
- Novell AppArmor (2.1) Quick Start
- 1. AppArmor Modes
- 2. Starting and Stopping AppArmor
- 3. AppArmor Command Line Tools
- 4. Methods of Profiling
- 5. Learning Mode
- 6. Example Profile
- 7. Structure of a Profile
- 8. Helpful Additions
- 9. Logging and Auditing
- 10. Directories and Files
- 11. For More Information
- 12. Legal Notice
- 13. GNU Free Documentation License
- Novell AppArmor Administration Guide
- About This Guide
- 1. Feedback
- 2. Documentation Conventions
- 3. Source Code
- 1. Immunizing Programs
- 1.1. Introducing the AppArmor Framework
- 1.2. Determining Programs to Immunize
- 1.3. Immunizing cron Jobs
- 1.4. Immunizing Network Applications
- 2. Profile Components and Syntax
- 2.1. Breaking a Novell AppArmor Profile into Its Parts
- 2.2.
#include Statements - 2.3. Capability Entries (POSIX.1e)
- 2.4. Using the Local AppArmor Profile Repository
- 2.5. Using the External AppArmor Profile Repository
- 2.6. Important Filenames and Directories
- 3. Building and Managing Profiles with YaST
- 3.1. Adding a Profile Using the Wizard
- 3.2. Manually Adding a Profile
- 3.3. Editing Profiles
- 3.4. Deleting a Profile
- 3.5. Updating Profiles from Log Entries
- 3.6. Managing Novell AppArmor and Security Event Status
- 4. Building Profiles from the Command Line
- 4.1. Checking the AppArmor Module Status
- 4.2. Building AppArmor Profiles
- 4.3. Adding or Creating an AppArmor Profile
- 4.4. Editing an AppArmor Profile
- 4.5. Deleting an AppArmor Profile
- 4.6. Two Methods of Profiling
- 5. Profiling Your Web Applications Using ChangeHat
- 5.1. Apache ChangeHat
- 5.2. Configuring Apache for mod_apparmor
- 6. Managing Profiled Applications
- 6.1. Monitoring Your Secured Applications
- 6.2. Configuring Security Event Notification
- 6.3. Configuring Reports
- 6.4. Configuring and Using the AppArmor Desktop Monitor Applet
- 6.5. Reacting to Security Event Rejections
- 6.6. Maintaining Your Security Profiles
- 7. Support
- 7.1. Updating Novell AppArmor Online
- 7.2. Using the Man Pages
- 7.3. For More Information
- 7.4. Troubleshooting
- 7.5. Reporting Bugs for AppArmor
- A. Background Information on AppArmor Profiling
- B. GNU Licenses
- B.1. GNU General Public License
- B.2. GNU Free Documentation License
- Glossary