The document provides step-by-step instructions for installing Linux SUSE (Sless11) using VMware Workstation. It describes: 1) Creating a new virtual machine and selecting Linux as the guest operating system; 2) Configuring storage, RAM, and other settings; 3) Mounting the Linux SUSE ISO image and booting the installation; 4) Completing the installation process by partitioning disks, setting up users and passwords, and configuring networking. Upon finishing, the virtual machine will be booted with the newly installed Linux SUSE operating system.
DNS windows server(2008R2) & linux(SLES 11)Tola LENG
In this practice you will be able:
-Configure Primary DNS and Secondary DNS
-Configure DNS zone transter
-DNS Delegation
-DNS Security zone transfer
-Configure also Linux(Sles 11) and Windows Server 2008R2
Configure proxy firewall on SuSE Linux Enterprise Server 11Tola LENG
In this practice you will be able:
-How to install and configure the iptables and proxy firewall when we want to block the packet.
-How to allow or deny the services or packet when the client access to the Internet.
Configure Webserver & SSL secure & redirect in SuSE Linux EnterpriseTola LENG
In this chapter you will be able:
-How to install webserver in suse linux server
-How to configure webserver
-How to hosting website and web application
-How to configure secure connection (SSL, Redirect)
DNS windows server(2008R2) & linux(SLES 11)Tola LENG
In this practice you will be able:
-Configure Primary DNS and Secondary DNS
-Configure DNS zone transter
-DNS Delegation
-DNS Security zone transfer
-Configure also Linux(Sles 11) and Windows Server 2008R2
Configure proxy firewall on SuSE Linux Enterprise Server 11Tola LENG
In this practice you will be able:
-How to install and configure the iptables and proxy firewall when we want to block the packet.
-How to allow or deny the services or packet when the client access to the Internet.
Configure Webserver & SSL secure & redirect in SuSE Linux EnterpriseTola LENG
In this chapter you will be able:
-How to install webserver in suse linux server
-How to configure webserver
-How to hosting website and web application
-How to configure secure connection (SSL, Redirect)
JSF 2 Notes with coding examples topics include introduction , managed bean, jsf tags, navigation, jsf life cycle and phase listners,jsf validation and converters, i18n
Basic Security
@ Updates
-Update manager
-Enable automatic security updates(Update Setting)
=> Super windows => type the key word (System Setting) =>
@ Firewall
-In Ubuntu all ports are block by default
-Default firewall-ufw (turned off by default)
+sudo ufw status
+sudo ufw enable/disable
-Firestarter for graphical interface (recommanded)
+sudo apt-get install firestarter
+Preferences
@ User Accounts
-User & Groups
+Disable user guest
-Do not use root user (Disable by default)
+sudo passwd
+sudo passwd -l root (disable/changed expiry password)
-Use sudo instead of root (/etc/sudoers)
+sudo visudo OR sudo gedit /etc/sudoers(To set the privilege user authorized)
+sudo adduser tolaleng sudo
-Deleting Users
+sudo deluser canamall
-Removing world readable permission to home directory
+sudo chmod 0750 /home/username
-Locking/Unlocking user
+sudo passwd -l username (enable user expiry)
+sudo passwd -u username (disable user expiry)
-passwords
+sudo chage canamall (Set the password expiration)
+sudo chage-l canamall (show the password expiration)
@ Antivirus
-Clam TK (Under Accessories), other anti-virus
@ Unistall Applications
-Ubuntu Software Center-> Installed software section-> Select application and click remove
@ Processes
-To see processes
+ps aux or top
+system monitor(cacti, nagios,)
-
@ Logs
-Some of logs
+ /var/log/messages : general log messages
+ /var/log/boot : system boot log
+ /var/log/debug/ : debugging log messages
+ /var/log/auth.log : user login and authentication logs
+ /var/log/daemon.log : running services such as squid,ntpd and other log message to this file
+ /var/log/kern.log : kernel log file
-Viewing logs
+ tail, more, cat, less, grep
+ GNOME system log viewer
@Firewall
ufw
=> Security Host
* Create Standard User and enable user passwd (complexity password, strong passwd, passwd expired, invalid day of passwd, Lock and Unlock user, disable user Guest, )
* Secure remote network and host
-Telnet(Secure with the host and address connection)
-SSH (Secure with the authentication encryption key)
=> Security Backup (Data Hosting)
*Make a Full Backup of Your Machine
-Aptik (backup application)
-rsync (Remote synce)
-Gsync (Remote)
-Amanda
-Rsnapshot
File Share Server, FTP server on Linux SuSE and WindowsTola LENG
-Install and configure Services
-Configure Suse Linux for FTP File Share Server
-Configure Permission
- Configure Point IP address to specific users.
- FTP Acccess
-Configure DHCP (Create LAN Server and LAN Client) on Windows Server 2008R2
-Configure Relay on SuSE Linux Enterprise Server 11
-Allow Client Use DHCP IP for each LAN
Tola.leng mail server (sq_mail & rcmail)_q5_Tola LENG
1. Design a new network infrastructure. 3
2. Install & Configure Domain Name System: 3
a. Install DNS 3
Test mail in Webserver machine 7
3. Postfix Service: 9
a. Install Postfix 10
b. Send email test (postfix) 10
4. Configure Postfix: 12
a. Enable some option for mail server 13
b. Test Send/Receive mail 14
5. Configure Dovecot: 15
a. Download Dovecot package *.rpm 15
b. Extract *.rpm package 15
c. Configure Dovecot file 16
d. Use Mail client 17
_other User 19
6. Configure Web mail: 22
• To Configure webmail in webserver machine NOT use in mail server machine 22
a. Squirrelmail 24
Configure in Server Setting 28
Configure Vhost 34
Test Result 36
b. Roundcube 38
Create and Configure Vhost 41
Let user access 43
7. Set option change password: 46
a. Squirrelmail 47
b. Roundcube 51
8. SMTPS and POP3S to secure encryption message` 51
a. Create certificate 51
b. Configure 52
9. Configure sasl sender and receiver/smpts authentication. 63
a. Configure SMTP Authentication /SASL Sender 63
10. Create address list/group (aliases address) 67
11. User SSL to encryption connection on browser 70
12. User authentication from AD or OpenLDAP 79
Configure LDAP Server on Mail Server 80
Configure LDAP Client on mail Server 82
Restart services 87
Create user in ldap 88
Let Webserver Join Domain with Mail server LDAP 92
Enable LDAP on Squirrelmail 99
Let’s User test Authentication 104
Let ‘ user change password 107
1. Setup router
//to create a name for network card
//to assign ip address to network card
//to create NAT rule
//to assign gateway
//to assign dns
//to create dhcp
2.Create login page(Hotspot)
How to link from Mikrotik to Radius server
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
JSF 2 Notes with coding examples topics include introduction , managed bean, jsf tags, navigation, jsf life cycle and phase listners,jsf validation and converters, i18n
Basic Security
@ Updates
-Update manager
-Enable automatic security updates(Update Setting)
=> Super windows => type the key word (System Setting) =>
@ Firewall
-In Ubuntu all ports are block by default
-Default firewall-ufw (turned off by default)
+sudo ufw status
+sudo ufw enable/disable
-Firestarter for graphical interface (recommanded)
+sudo apt-get install firestarter
+Preferences
@ User Accounts
-User & Groups
+Disable user guest
-Do not use root user (Disable by default)
+sudo passwd
+sudo passwd -l root (disable/changed expiry password)
-Use sudo instead of root (/etc/sudoers)
+sudo visudo OR sudo gedit /etc/sudoers(To set the privilege user authorized)
+sudo adduser tolaleng sudo
-Deleting Users
+sudo deluser canamall
-Removing world readable permission to home directory
+sudo chmod 0750 /home/username
-Locking/Unlocking user
+sudo passwd -l username (enable user expiry)
+sudo passwd -u username (disable user expiry)
-passwords
+sudo chage canamall (Set the password expiration)
+sudo chage-l canamall (show the password expiration)
@ Antivirus
-Clam TK (Under Accessories), other anti-virus
@ Unistall Applications
-Ubuntu Software Center-> Installed software section-> Select application and click remove
@ Processes
-To see processes
+ps aux or top
+system monitor(cacti, nagios,)
-
@ Logs
-Some of logs
+ /var/log/messages : general log messages
+ /var/log/boot : system boot log
+ /var/log/debug/ : debugging log messages
+ /var/log/auth.log : user login and authentication logs
+ /var/log/daemon.log : running services such as squid,ntpd and other log message to this file
+ /var/log/kern.log : kernel log file
-Viewing logs
+ tail, more, cat, less, grep
+ GNOME system log viewer
@Firewall
ufw
=> Security Host
* Create Standard User and enable user passwd (complexity password, strong passwd, passwd expired, invalid day of passwd, Lock and Unlock user, disable user Guest, )
* Secure remote network and host
-Telnet(Secure with the host and address connection)
-SSH (Secure with the authentication encryption key)
=> Security Backup (Data Hosting)
*Make a Full Backup of Your Machine
-Aptik (backup application)
-rsync (Remote synce)
-Gsync (Remote)
-Amanda
-Rsnapshot
File Share Server, FTP server on Linux SuSE and WindowsTola LENG
-Install and configure Services
-Configure Suse Linux for FTP File Share Server
-Configure Permission
- Configure Point IP address to specific users.
- FTP Acccess
-Configure DHCP (Create LAN Server and LAN Client) on Windows Server 2008R2
-Configure Relay on SuSE Linux Enterprise Server 11
-Allow Client Use DHCP IP for each LAN
Tola.leng mail server (sq_mail & rcmail)_q5_Tola LENG
1. Design a new network infrastructure. 3
2. Install & Configure Domain Name System: 3
a. Install DNS 3
Test mail in Webserver machine 7
3. Postfix Service: 9
a. Install Postfix 10
b. Send email test (postfix) 10
4. Configure Postfix: 12
a. Enable some option for mail server 13
b. Test Send/Receive mail 14
5. Configure Dovecot: 15
a. Download Dovecot package *.rpm 15
b. Extract *.rpm package 15
c. Configure Dovecot file 16
d. Use Mail client 17
_other User 19
6. Configure Web mail: 22
• To Configure webmail in webserver machine NOT use in mail server machine 22
a. Squirrelmail 24
Configure in Server Setting 28
Configure Vhost 34
Test Result 36
b. Roundcube 38
Create and Configure Vhost 41
Let user access 43
7. Set option change password: 46
a. Squirrelmail 47
b. Roundcube 51
8. SMTPS and POP3S to secure encryption message` 51
a. Create certificate 51
b. Configure 52
9. Configure sasl sender and receiver/smpts authentication. 63
a. Configure SMTP Authentication /SASL Sender 63
10. Create address list/group (aliases address) 67
11. User SSL to encryption connection on browser 70
12. User authentication from AD or OpenLDAP 79
Configure LDAP Server on Mail Server 80
Configure LDAP Client on mail Server 82
Restart services 87
Create user in ldap 88
Let Webserver Join Domain with Mail server LDAP 92
Enable LDAP on Squirrelmail 99
Let’s User test Authentication 104
Let ‘ user change password 107
1. Setup router
//to create a name for network card
//to assign ip address to network card
//to create NAT rule
//to assign gateway
//to assign dns
//to create dhcp
2.Create login page(Hotspot)
How to link from Mikrotik to Radius server
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
GridMate - End to end testing is a critical piece to ensure quality and avoid...
Install linux suse(sless11)
1. Passerelles numeriques Cambodia-BP 511
St.371, Phum Tropeang Chhuck (Borey Sorla)
Sangkat Tek Thla, Khan Russey Keo, Phnom Penh
Infor@passerellesneumeriques.org
LENG TOLA: SNA 2015-B 1
Microsoft Windows
Subject: Installing Linux SUSE (Sless11)
(VMware Workstation)
Step1
-Fist, Click a new virtual machine
-Second, Click on File and then click New Virtual Machine
-
2. Passerelles numeriques Cambodia-BP 511
St.371, Phum Tropeang Chhuck (Borey Sorla)
Sangkat Tek Thla, Khan Russey Keo, Phnom Penh
Infor@passerellesneumeriques.org
LENG TOLA: SNA 2015-B 2
I. Step2
-Click Next of choose typical (recommended)
II. Step3
-Choose I will install the operating System later (The virtual machine will be created with
a blank hard disk).
-And then click next.
-
3. Passerelles numeriques Cambodia-BP 511
St.371, Phum Tropeang Chhuck (Borey Sorla)
Sangkat Tek Thla, Khan Russey Keo, Phnom Penh
Infor@passerellesneumeriques.org
LENG TOLA: SNA 2015-B 3
- Select a guest Operating System (Which OS will be installed on this virtual machine?)
-Choose Linux
- And then just to choose the version of Linux
-Click SUSE Linux Enterprise 11
-And then click next
4. Passerelles numeriques Cambodia-BP 511
St.371, Phum Tropeang Chhuck (Borey Sorla)
Sangkat Tek Thla, Khan Russey Keo, Phnom Penh
Infor@passerellesneumeriques.org
LENG TOLA: SNA 2015-B 4
-Type your virtual machine name (SUSE Linux Enterprise 11)
-If you want to find or take your location please click bowser, but don’t click it is default
location.
-And then click next
-You can identify your disk size, but recommended size for Linux SUSE Enterprise 11:
20GB
-And then click next
5. Passerelles numeriques Cambodia-BP 511
St.371, Phum Tropeang Chhuck (Borey Sorla)
Sangkat Tek Thla, Khan Russey Keo, Phnom Penh
Infor@passerellesneumeriques.org
LENG TOLA: SNA 2015-B 5
-Continue to click finish
-
-Identify your RAM, CPU,HDD and another software device.
6. Passerelles numeriques Cambodia-BP 511
St.371, Phum Tropeang Chhuck (Borey Sorla)
Sangkat Tek Thla, Khan Russey Keo, Phnom Penh
Infor@passerellesneumeriques.org
LENG TOLA: SNA 2015-B 6
III. Step4
-Click on CD/DVD (SATA)
-Continue to choose use ISO image file
-And then click on browser to find ISO image file
-Browser and find your ISO image file for Linux SUSE Enterprise(SLESS) 11 that you
store on hard disk or from server.
-Click on ISO image file and then click open
7. Passerelles numeriques Cambodia-BP 511
St.371, Phum Tropeang Chhuck (Borey Sorla)
Sangkat Tek Thla, Khan Russey Keo, Phnom Penh
Infor@passerellesneumeriques.org
LENG TOLA: SNA 2015-B 7
IV. Step5
-Click on triangular sign or click on power on this virtual machine to be install Linux
SUSE Enterprise (SLESS) 11.
-You need to press Fn + F2 or F2, Go to BIOS to edit and identify boot
8. Passerelles numeriques Cambodia-BP 511
St.371, Phum Tropeang Chhuck (Borey Sorla)
Sangkat Tek Thla, Khan Russey Keo, Phnom Penh
Infor@passerellesneumeriques.org
LENG TOLA: SNA 2015-B 8
-Press arrow key on Boot
-Press shift with -/+
- Select item CD ROM Drive to top and select hard drive after CD ROM.
-And then press shift+F10 to setup confirmation and continue to enter yes to accept setup.
9. Passerelles numeriques Cambodia-BP 511
St.371, Phum Tropeang Chhuck (Borey Sorla)
Sangkat Tek Thla, Khan Russey Keo, Phnom Penh
Infor@passerellesneumeriques.org
LENG TOLA: SNA 2015-B 9
V. Step6
-You have boot from CD/DVD already, So enter on installation
10. Passerelles numeriques Cambodia-BP 511
St.371, Phum Tropeang Chhuck (Borey Sorla)
Sangkat Tek Thla, Khan Russey Keo, Phnom Penh
Infor@passerellesneumeriques.org
LENG TOLA: SNA 2015-B 10
-First, choose your language (English US)
-Second, choose your keyboard layout (English US)
-Third, Click in the box to agree to the license terms
-Four, Click next
-continue to click next
11. Passerelles numeriques Cambodia-BP 511
St.371, Phum Tropeang Chhuck (Borey Sorla)
Sangkat Tek Thla, Khan Russey Keo, Phnom Penh
Infor@passerellesneumeriques.org
LENG TOLA: SNA 2015-B 11
-Click new installation
-And then click next
Clock and Time zone
-choose Asia
-s
12. Passerelles numeriques Cambodia-BP 511
St.371, Phum Tropeang Chhuck (Borey Sorla)
Sangkat Tek Thla, Khan Russey Keo, Phnom Penh
Infor@passerellesneumeriques.org
LENG TOLA: SNA 2015-B 12
-And then choose the time Zone (Phnom Penh)
-And you change the Time and Date
-And then click next
-Click on Physical Machine
-And then click next
13. Passerelles numeriques Cambodia-BP 511
St.371, Phum Tropeang Chhuck (Borey Sorla)
Sangkat Tek Thla, Khan Russey Keo, Phnom Penh
Infor@passerellesneumeriques.org
LENG TOLA: SNA 2015-B 13
-If you want to divide your partition, please click on partitioning.
-Click software if you want to add and change.
-Click on install
-
Click agree to confirm package license
15. Passerelles numeriques Cambodia-BP 511
St.371, Phum Tropeang Chhuck (Borey Sorla)
Sangkat Tek Thla, Khan Russey Keo, Phnom Penh
Infor@passerellesneumeriques.org
LENG TOLA: SNA 2015-B 15
-Password for the System Administrator “”root”
-Test keyboard layout
-Click next
-Host name and Domain Name
Ex: Host name“ Tolaleng”, Domain name ”animals.site.lan”
-And then click next
16. Passerelles numeriques Cambodia-BP 511
St.371, Phum Tropeang Chhuck (Borey Sorla)
Sangkat Tek Thla, Khan Russey Keo, Phnom Penh
Infor@passerellesneumeriques.org
LENG TOLA: SNA 2015-B 16
-Network Configuration
-And then click next
17. Passerelles numeriques Cambodia-BP 511
St.371, Phum Tropeang Chhuck (Borey Sorla)
Sangkat Tek Thla, Khan Russey Keo, Phnom Penh
Infor@passerellesneumeriques.org
LENG TOLA: SNA 2015-B 17
-Test internet Connection
-Click Yes, Test Connection to the Internet Via
-And then click next
-Internet test is success
-Click next to continue
18. Passerelles numeriques Cambodia-BP 511
St.371, Phum Tropeang Chhuck (Borey Sorla)
Sangkat Tek Thla, Khan Russey Keo, Phnom Penh
Infor@passerellesneumeriques.org
LENG TOLA: SNA 2015-B 18
-Click configure later
-And then click next
-Click use following configuration
-Click next to continue
19. Passerelles numeriques Cambodia-BP 511
St.371, Phum Tropeang Chhuck (Borey Sorla)
Sangkat Tek Thla, Khan Russey Keo, Phnom Penh
Infor@passerellesneumeriques.org
LENG TOLA: SNA 2015-B 19
-Click next
-Type of User’s full name and user name
-Set up password of user, and click Automatic login
20. Passerelles numeriques Cambodia-BP 511
St.371, Phum Tropeang Chhuck (Borey Sorla)
Sangkat Tek Thla, Khan Russey Keo, Phnom Penh
Infor@passerellesneumeriques.org
LENG TOLA: SNA 2015-B 20
-Click next
-The hardware configure, Click use following configuration
-And then click next
21. Passerelles numeriques Cambodia-BP 511
St.371, Phum Tropeang Chhuck (Borey Sorla)
Sangkat Tek Thla, Khan Russey Keo, Phnom Penh
Infor@passerellesneumeriques.org
LENG TOLA: SNA 2015-B 21
-The Installation is completed
-Click finish to complete
-You need to login password
22. Passerelles numeriques Cambodia-BP 511
St.371, Phum Tropeang Chhuck (Borey Sorla)
Sangkat Tek Thla, Khan Russey Keo, Phnom Penh
Infor@passerellesneumeriques.org
LENG TOLA: SNA 2015-B 22
-This is the Linux SUSE(SLESS) Enterprise 11