Referensi Debian

Osamu Aoki

Abstrak

Buku ini bebas; Anda dapat mendistribusikan ulang dan/atau mengubahnya di bawah persyaratan sebarang versi GNU General Public License yang memnuhi Debian Free Software Guidelines (DFSG).


Daftar Isi

Kata Pengantar
1. Sangkalan
2. Apa itu Debian
3. Tentang dokumen ini
3.1. Aturan pemandu
3.2. Prasyarat
3.3. Konvensi
3.4. popcon
3.5. Ukuran paket
3.6. Laporan bug pada dokumen ini
4. Pengingat untuk para pengguna baru
5. Beberapa kutipan untuk pengguna baru
1. Tutorial GNU/Linux
1.1. Dasar-dasar konsol
1.1.1. Prompt shell
1.1.2. The shell prompt under GUI
1.1.3. Akun root
1.1.4. Prompt shell root
1.1.5. Alat administrasi sistem GUI
1.1.6. Konsol virtual
1.1.7. Cara meninggalkan command prompt
1.1.8. Bagaimana mematikan sistem
1.1.9. Memulihkan suatu konsol yang waras
1.1.10. Saran paket tambahan untuk newbie
1.1.11. Akun pengguna tambahan
1.1.12. konfigurasi sudo
1.1.13. Waktu bermain
1.2. Sistem berkas mirip Unix
1.2.1. Dasar-dasar berkas Unix
1.2.2. Internal sistem berkas
1.2.3. Hak akses sistem berkas
1.2.4. Kontrol izin untuk berkas yang baru dibuat: umask
1.2.5. Izin untuk grup pengguna (grup)
1.2.6. Stempel waktu
1.2.7. Taut
1.2.8. Pipa bernama (FIFO)
1.2.9. Soket
1.2.10. Berkas perangkat
1.2.11. Berkas perangkat khusus
1.2.12. procfs dan sysfs
1.2.13. tmpfs
1.3. Midnight Commander (MC)
1.3.1. Penyesuaian MC
1.3.2. Memulai MC
1.3.3. Manajer berkas di MC
1.3.4. Trik baris perintah di MC
1.3.5. Penyunting internal di MC
1.3.6. Penampil internal di MC
1.3.7. Fitur mulai sendiri dari MC
1.3.8. Sistem berkas virtual FTP dari MC
1.4. Lingkungan kerja dasar mirip Unix
1.4.1. Shell log masuk
1.4.2. Menyesuaikan bash
1.4.3. Ketukan tombol khusus
1.4.4. Operasi tetikus
1.4.5. The pager
1.4.6. The text editor
1.4.7. Setting a default text editor
1.4.8. Menggunakan vim
1.4.9. Merekam aktivitas shell
1.4.10. Perintah Unix Dasar
1.5. Perintah shell sederhana
1.5.1. Eksekusi perintah dan variabel lingkungan
1.5.2. The "$LANG" variable
1.5.3. Variabel "$PATH"
1.5.4. Variabel "$HOME"
1.5.5. Opsi baris perintah
1.5.6. Shell glob
1.5.7. Nilai kembalian perintah
1.5.8. Typical command sequences and shell redirection
1.5.9. Alias perintah
1.6. Pemrosesan teks mirip Unix
1.6.1. Alat teks Unix
1.6.2. Regular expressions
1.6.3. Replacement expressions
1.6.4. Global substitution with regular expressions
1.6.5. Mengekstrak data dari tabel berkas teks
1.6.6. Script snippets for piping commands
2. Debian package management
2.1. Debian package management prerequisites
2.1.1. Package configuration
2.1.2. Basic precautions
2.1.3. Life with eternal upgrades
2.1.4. Dasar-dasar arsip Debian
2.1.5. Debian is 100% free software
2.1.6. Package dependencies
2.1.7. The event flow of the package management
2.1.8. First response to package management troubles
2.2. Basic package management operations
2.2.1. apt vs. apt-get / apt-cache vs. aptitude
2.2.2. Basic package management operations with the commandline
2.2.3. Interactive use of aptitude
2.2.4. Key bindings of aptitude
2.2.5. Package views under aptitude
2.2.6. Search method options with aptitude
2.2.7. The aptitude regex formula
2.2.8. Dependency resolution of aptitude
2.2.9. Log aktivitas paket
2.3. Examples of aptitude operations
2.3.1. Listing packages with regex matching on package names
2.3.2. Browsing with the regex matching
2.3.3. Purging removed packages for good
2.3.4. Tidying auto/manual install status
2.3.5. Peningkatan seluruh sistem
2.4. Advanced package management operations
2.4.1. Advanced package management operations with commandline
2.4.2. Verifikasi berkas-berkas paket yang terpasang
2.4.3. Safeguarding for package problems
2.4.4. Searching on the package meta data
2.5. Debian package management internals
2.5.1. Archive meta data
2.5.2. Berkas "Release" tingkat puncak dan keaslian
2.5.3. Archive level "Release" files
2.5.4. Fetching of the meta data for the package
2.5.5. The package state for APT
2.5.6. The package state for aptitude
2.5.7. Local copies of the fetched packages
2.5.8. Debian package file names
2.5.9. Perintah dpkg
2.5.10. Perintah update-alternatives
2.5.11. The dpkg-statoverride command
2.5.12. The dpkg-divert command
2.6. Recovery from a broken system
2.6.1. Incompatibility with old user configuration
2.6.2. Different packages with overlapped files
2.6.3. Fixing broken package script
2.6.4. Rescue with the dpkg command
2.6.5. Recovering package selection data
2.7. Tips for the package management
2.7.1. How to pick Debian packages
2.7.2. Packages from mixed source of archives
2.7.3. Tweaking candidate version
2.7.4. Updates and Backports
2.7.5. Blocking packages installed by "Recommends"
2.7.6. Tracking testing with some packages from unstable
2.7.7. Tracking unstable with some packages from experimental
2.7.8. Automatic download and upgrade of packages
2.7.9. Limiting download bandwidth for APT
2.7.10. Emergency downgrading
2.7.11. Who uploaded the package?
2.7.12. The equivs package
2.7.13. Porting a package to the stable system
2.7.14. Proxy server for APT
2.7.15. More readings for the package management
3. Inisialisasi sistem
3.1. An overview of the boot strap process
3.1.1. Stage 1: the UEFI
3.1.2. Stage 2: the boot loader
3.1.3. Stage 3: the mini-Debian system
3.1.4. Stage 4: the normal Debian system
3.2. Systemd init
3.2.1. The hostname
3.2.2. The filesystem
3.2.3. Network interface initialization
3.3. The kernel message
3.4. Pesan sistem
3.5. System management
3.6. Other system monitors
3.7. Customizing systemd
3.7.1. Aktivasi soket
3.8. The udev system
3.8.1. The kernel module initialization
4. Authentication and access controls
4.1. Normal Unix authentication
4.2. Managing account and password information
4.3. Good password
4.4. Creating encrypted password
4.5. PAM and NSS
4.5.1. Configuration files accessed by PAM and NSS
4.5.2. The modern centralized system management
4.5.3. "Why GNU su does not support the wheel group"
4.5.4. Stricter password rule
4.6. Keamanan autentikasi
4.6.1. Secure password on the Internet
4.6.2. Secure Shell
4.6.3. Extra security measures for the Internet
4.6.4. Mengamankan kata sandi root
4.7. Other access controls
4.7.1. sudo
4.7.2. PolicyKit
4.7.3. Restricting access to some server services
4.7.4. Linux security features
5. Network setup
5.1. The basic network infrastructure
5.1.1. The hostname resolution
5.1.2. The network interface name
5.1.3. The network address range for the LAN
5.1.4. The network device support
5.2. The modern network configuration for desktop
5.2.1. GUI network configuration tools
5.3. The modern network configuration without GUI
5.4. The low level network configuration
5.4.1. Perintah Iproute2
5.4.2. Safe low level network operations
5.5. Network optimization
5.5.1. Finding optimal MTU
5.5.2. WAN TCP optimization
5.6. Netfilter infrastructure
6. Network applications
6.1. Peramban Web
6.1.1. Browser configuration
6.2. The mail system
6.2.1. Email basics
6.2.2. Modern mail service limitation
6.2.3. Historic mail service expectation
6.2.4. Mail transport agent (MTA)
6.2.4.1. The configuration of exim4
6.2.4.2. The configuration of postfix with SASL
6.2.4.3. The mail address configuration
6.2.4.4. Basic MTA operations
6.3. The remote access server and utilities (SSH)
6.3.1. Basics of SSH
6.3.2. User name on the remote host
6.3.3. Connecting without remote passwords
6.3.4. Dealing with alien SSH clients
6.3.5. Setting up ssh-agent
6.3.6. Sending a mail from a remote host
6.3.7. Port forwarding for SMTP/POP3 tunneling
6.3.8. How to shutdown the remote system on SSH
6.3.9. Troubleshooting SSH
6.4. The print server and utilities
6.5. Other network application servers
6.6. Other network application clients
6.7. The diagnosis of the system daemons
7. GUI System
7.1. GUI desktop environment
7.2. GUI communication protocol
7.3. Infrastruktur GUI
7.4. Aplikasi GUI
7.5. Fonta
7.5.1. Basic fonts
7.5.2. Font rastarization
7.6. Sandbox
7.7. Remote desktop
7.8. X server connection
7.8.1. X server local connection
7.8.2. X server remote connection
7.8.3. X server chroot connection
7.9. Papanklip
8. I18N dan L10N
8.1. The locale
8.1.1. Rationale for UTF-8 locale
8.1.2. The reconfiguration of the locale
8.1.3. Filename encoding
8.1.4. Localized messages and translated documentation
8.1.5. Effects of the locale
8.2. Masukan papan ketik
8.2.1. The keyboard input for Linux console and X Window
8.2.2. Masukan papan ketik untuk Wayland
8.2.3. The input method support with IBus
8.2.4. An example for Japanese
8.3. The display output
8.4. East Asian Ambiguous Character Width Characters
9. Tips sistem
9.1. Tips konsol
9.1.1. Recording the shell activities cleanly
9.1.2. Program screen
9.1.3. Navigating around directories
9.1.4. Readline wrapper
9.2. Customizing vim
9.2.1. Customizing vim with internal features
9.2.2. Customizing vim with external packages
9.3. Data recording and presentation
9.3.1. Daemon log
9.3.2. Penganalisis log
9.3.3. Customized display of text data
9.3.4. Customized display of time and date
9.3.5. Colorized shell echo
9.3.6. Colorized commands
9.3.7. Recording the editor activities for complex repeats
9.3.8. Recording the graphic image of an X application
9.3.9. Recording changes in configuration files
9.4. Monitoring, controlling, and starting program activities
9.4.1. Timing a process
9.4.2. The scheduling priority
9.4.3. The ps command
9.4.4. Perintah top
9.4.5. Listing files opened by a process
9.4.6. Tracing program activities
9.4.7. Identification of processes using files or sockets
9.4.8. Repeating a command with a constant interval
9.4.9. Repeating a command looping over files
9.4.10. Starting a program from GUI
9.4.11. Customizing program to be started
9.4.12. Killing a process
9.4.13. Scheduling tasks once
9.4.14. Scheduling tasks regularly
9.4.15. Alt-SysRq key
9.5. System maintenance tips
9.5.1. Who is on the system?
9.5.2. Memperingatkan semua orang
9.5.3. Identifikasi perangkat keras
9.5.4. Konfigurasi perangkat keras
9.5.5. Waktu sistem dan perangkat keras
9.5.6. Konfigurasi terminal
9.5.7. Infrastruktur suara
9.5.8. Disabling the screen saver
9.5.9. Disabling beep sounds
9.5.10. Penggunaan memori
9.5.11. System security and integrity check
9.6. Tips penyimpanan data
9.6.1. Penggunaan ruang disk
9.6.2. Disk partition configuration
9.6.3. Accessing partition using UUID
9.6.4. LVM2
9.6.5. Konfigurasi sistem berkas
9.6.6. Filesystem creation and integrity check
9.6.7. Optimization of filesystem by mount options
9.6.8. Optimization of filesystem via superblock
9.6.9. Optimization of hard disk
9.6.10. Optimization of solid state drive
9.6.11. Using SMART to predict hard disk failure
9.6.12. Specify temporary storage directory via $TMPDIR
9.6.13. Expansion of usable storage space via LVM
9.6.14. Expansion of usable storage space by mounting another partition
9.6.15. Expansion of usable storage space by bind-mounting another directory
9.6.16. Expansion of usable storage space by overlay-mounting another directory
9.6.17. Expansion of usable storage space using symlink
9.7. The disk image
9.7.1. Making the disk image file
9.7.2. Writing directly to the disk
9.7.3. Mounting the disk image file
9.7.4. Cleaning a disk image file
9.7.5. Making the empty disk image file
9.7.6. Making the ISO9660 image file
9.7.7. Writing directly to the CD/DVD-R/RW
9.7.8. Mounting the ISO9660 image file
9.8. Data biner
9.8.1. Viewing and editing binary data
9.8.2. Manipulating files without mounting disk
9.8.3. Redundansi data
9.8.4. Data file recovery and forensic analysis
9.8.5. Splitting a large file into small files
9.8.6. Clearing file contents
9.8.7. Dummy files
9.8.8. Erasing an entire hard disk
9.8.9. Erasing unused area of an hard disk
9.8.10. Undeleting deleted but still open files
9.8.11. Searching all hardlinks
9.8.12. Invisible disk space consumption
9.9. Data encryption tips
9.9.1. Removable disk encryption with dm-crypt/LUKS
9.9.2. Mounting encrypted disk with dm-crypt/LUKS
9.10. Kernel
9.10.1. Parameter kernel
9.10.2. Header kernel
9.10.3. Compiling the kernel and related modules
9.10.4. Compiling the kernel source: Debian Kernel Team recommendation
9.10.5. Hardware drivers and firmware
9.11. Sistem tervirtualisasi
9.11.1. Virtualization and emulation tools
9.11.2. Virtualization work flow
9.11.3. Mounting the virtual disk image file
9.11.4. Sistem chroot
9.11.5. Multiple desktop systems
10. Manajemen data
10.1. Sharing, copying, and archiving
10.1.1. Archive and compression tools
10.1.2. Copy and synchronization tools
10.1.3. Idioms for the archive
10.1.4. Idioms for the copy
10.1.5. Idioms for the selection of files
10.1.6. Media arsip
10.1.7. Removable storage device
10.1.8. Filesystem choice for sharing data
10.1.9. Sharing data via network
10.2. Backup and recovery
10.2.1. Backup and recovery policy
10.2.2. Backup utility suites
10.2.3. Personal backup
10.3. Data security infrastructure
10.3.1. Key management for GnuPG
10.3.2. Using GnuPG on files
10.3.3. Using GnuPG with Mutt
10.3.4. Using GnuPG with Vim
10.3.5. The MD5 sum
10.3.6. Password keyring
10.4. Source code merge tools
10.4.1. Extracting differences for source files
10.4.2. Merging updates for source files
10.4.3. Interactive merge
10.5. Git
10.5.1. Configuration of Git client
10.5.2. Basic Git commands
10.5.3. Tips Git
10.5.4. Referensi Git
10.5.5. Other version control systems
11. Data conversion
11.1. Text data conversion tools
11.1.1. Converting a text file with iconv
11.1.2. Checking file to be UTF-8 with iconv
11.1.3. Converting file names with iconv
11.1.4. EOL conversion
11.1.5. TAB conversion
11.1.6. Editors with auto-conversion
11.1.7. Plain text extraction
11.1.8. Highlighting and formatting plain text data
11.2. XML data
11.2.1. Basic hints for XML
11.2.2. XML processing
11.2.3. The XML data extraction
11.2.4. The XML data lint
11.3. Type setting
11.3.1. roff typesetting
11.3.2. TeX/LaTeX
11.3.3. Pretty print a manual page
11.3.4. Creating a manual page
11.4. Printable data
11.4.1. Ghostscript
11.4.2. Merge two PS or PDF files
11.4.3. Printable data utilities
11.4.4. Printing with CUPS
11.5. The mail data conversion
11.5.1. Mail data basics
11.6. Graphic data tools
11.7. Miscellaneous data conversion
12. Pemrograman
12.1. The shell script
12.1.1. POSIX shell compatibility
12.1.2. Shell parameters
12.1.3. Shell conditionals
12.1.4. Shell loops
12.1.5. Shell environment variables
12.1.6. The shell command-line processing sequence
12.1.7. Utility programs for shell script
12.2. Scripting in interpreted languages
12.2.1. Debugging interpreted language codes
12.2.2. GUI program with the shell script
12.2.3. Perl short script madness
12.3. Coding in compiled languages
12.3.1. C
12.3.2. Simple C program (gcc)
12.3.3. Flex — a better Lex
12.3.4. Bison — a better Yacc
12.4. Static code analysis tools
12.5. Debug
12.5.1. Basic gdb execution
12.5.2. Debugging the Debian package
12.5.3. Obtaining backtrace
12.5.4. Advanced gdb commands
12.5.5. Check dependency on libraries
12.5.6. Dynamic call tracing tools
12.5.7. Debugging X Errors
12.5.8. Memory leak detection tools
12.5.9. Disassemble binary
12.6. Build tools
12.6.1. Make
12.6.2. Autotools
12.6.2.1. Compile and install a program
12.6.2.2. Uninstall program
12.6.3. Meson
12.7. Web
12.8. The source code translation
12.9. Making Debian package
A. Lampiran
A.1. The Debian maze
A.2. Riwayat hak cipta
A.3. Format dokumen

Daftar Tabel

1.1. Daftar paket program mode teks yang menarik
1.2. Daftar paket dokumentasi informatif
1.3. Daftar penggunaan direktori kunci
1.4. Daftar karakter pertama dari keluaran "ls -l"
1.5. Mode numerik untuk izin berkas dalam perintah chmod(1)
1.6. Contoh-contoh nilai umask
1.7. Daftar grup yang disediakan sistem terkenal untuk akses berkas
1.8. Daftar grup penting yang disediakan untuk eksekusi perintah tertentu
1.9. Daftar jenis stempel waktu
1.10. Daftar berkas perangkat khusus
1.11. Pengikatan tombol MC
1.12. Reaksi terhadap tombol enter di MC
1.13. Daftar program shell
1.14. Daftar pengikatan kunci untuk bash
1.15. List of mouse operations and related key actions on Debian
1.16. Daftar ketukan tombol Vim dasar
1.17. Daftar perintah dasar Unix
1.18. The 3 parts of locale value
1.19. List of locale recommendations
1.20. Daftar nilai "$HOME"
1.21. Pola glob shell
1.22. Kode keluar perintah
1.23. Idiom perintah Shell
1.24. Predefined file descriptors
1.25. Metacharacters for BRE and ERE
1.26. Ekspresi penggantian
1.27. List of script snippets for piping commands
2.1. List of Debian package management tools
2.2. Daftar situs arsip Debian
2.3. List of Debian archive area
2.4. The relationship between suite and codename
2.5. List of key web site to resolving problems with a specific package
2.6. Basic package management operations with the commandline using apt(8), aptitude(8) and apt-get(8) /apt-cache(8)
2.7. Notable command options for aptitude(8)
2.8. List of key bindings for aptitude
2.9. List of views for aptitude
2.10. Kategorisasi tampilan paket standar
2.11. List of the aptitude regex formula
2.12. Berkas-berkas log untuk aktivitas paket
2.13. List of advanced package management operations
2.14. The content of the Debian archive meta data
2.15. The name structure of Debian packages
2.16. The usable characters for each component in the Debian package names
2.17. The notable files created by dpkg
2.18. List of notable Pin-Priority values for apt-pinning technique.
2.19. List of the proxy tools specially for Debian archive
3.1. List of boot loaders
3.2. The meaning of the menu entry of the above part of /boot/grub/grub.cfg
3.3. List of boot utilities for the Debian system
3.4. List of kernel error levels
3.5. List of typical journalctl command snippets
3.6. List of typical systemctl command snippets
3.7. List of other monitoring command snippets under systemd
4.1. 3 important configuration files for pam_unix(8)
4.2. The second entry content of "/etc/passwd"
4.3. List of commands to manage account information
4.4. List of tools to generate password
4.5. List of notable PAM and NSS systems
4.6. List of configuration files accessed by PAM and NSS
4.7. List of insecure and secure services and ports
4.8. List of tools to provide extra security measures
5.1. List of network configuration tools
5.2. List of network address ranges
5.3. Translation table from obsolete net-tools commands to new iproute2 commands
5.4. List of low level network commands
5.5. List of network optimization tools
5.6. Basic guide lines of the optimal MTU value
5.7. List of firewall tools
6.1. List of web browsers
6.2. List of browser plugin packages
6.3. List of mail user agent (MUA)
6.4. List of basic mail transport agent related packages
6.5. List of important postfix manual pages
6.6. List of mail address related configuration files
6.7. List of basic MTA operation
6.8. List of remote access server and utilities
6.9. List of SSH configuration files
6.10. List of SSH client startup examples
6.11. List of free SSH clients for other platforms
6.12. List of print servers and utilities
6.13. List of other network application servers
6.14. List of network application clients
6.15. List of popular RFCs
7.1. List of desktop environment
7.2. Daftar paket infrastruktur GUI yang terkenal
7.3. Daftar aplikasi GUI yang terkenal
7.4. List of notable TrueType and OpenType fonts
7.5. List of notable font environment and related packages
7.6. List of notable sandbox environment and related packages
7.7. List of notable remote access server
7.8. List of connection methods to the X server
7.9. List of programs related to manipulating character clipboard
8.1. List of IBus and its engine packages
9.1. List of programs to support console activities
9.2. Daftar pengikatan tombol untuk screen
9.3. Information on the initialization of vim
9.4. Daftar penganalisis log sistem
9.5. Display examples of time and date for the "ls -l" command with the time style value
9.6. List of graphic image manipulation tools
9.7. List of packages which can record configuration history
9.8. List of tools for monitoring and controlling program activities
9.9. List of nice values for the scheduling priority
9.10. List of ps command styles
9.11. List of frequently used signals for kill command
9.12. List of notable SAK command keys
9.13. List of hardware identification tools
9.14. List of hardware configuration tools
9.15. Daftar paket suara
9.16. List of commands for disabling the screen saver
9.17. List of memory sizes reported
9.18. List of tools for system security and integrity check
9.19. List of disk partition management packages
9.20. List of filesystem management packages
9.21. List of packages which view and edit binary data
9.22. List of packages to manipulate files without mounting disk
9.23. List of tools to add data redundancy to files
9.24. List of packages for data file recovery and forensic analysis
9.25. List of data encryption utilities
9.26. List of key packages to be installed for the kernel recompilation on the Debian system
9.27. Daftar alat virtualisasi
10.1. List of archive and compression tools
10.2. List of copy and synchronization tools
10.3. List of filesystem choices for removable storage devices with typical usage scenarios
10.4. List of the network service to chose with the typical usage scenario
10.5. List of backup suite utilities
10.6. List of data security infrastructure tools
10.7. List of GNU Privacy Guard commands for the key management
10.8. List of the meaning of the trust code
10.9. List of GNU Privacy Guard commands on files
10.10. List of source code merge tools
10.11. List of git related packages and commands
10.12. Main Git commands
10.13. Tips Git
10.14. List of other version control system tools
11.1. List of text data conversion tools
11.2. List of encoding values and their usage
11.3. List of EOL styles for different platforms
11.4. List of TAB conversion commands from bsdmainutils and coreutils packages
11.5. List of tools to extract plain text data
11.6. List of tools to highlight plain text data
11.7. List of predefined entities for XML
11.8. List of XML tools
11.9. List of DSSSL tools
11.10. List of XML data extraction tools
11.11. List of XML pretty print tools
11.12. List of type setting tools
11.13. List of packages to help creating the manpage
11.14. List of Ghostscript PostScript interpreters
11.15. List of printable data utilities
11.16. List of packages to help mail data conversion
11.17. List of graphic data tools
11.18. List of miscellaneous data conversion tools
12.1. List of typical bashisms
12.2. List of shell parameters
12.3. List of shell parameter expansions
12.4. List of key shell parameter substitutions
12.5. List of file comparison operators in the conditional expression
12.6. List of string comparison operators in the conditional expression
12.7. List of packages containing small utility programs for shell scripts
12.8. List of interpreter related packages
12.9. List of dialog programs
12.10. List of compiler related packages
12.11. List of Yacc-compatible LALR parser generators
12.12. List of tools for static code analysis
12.13. List of debug packages
12.14. List of advanced gdb commands
12.15. List of memory leak detection tools
12.16. List of build tool packages
12.17. List of make automatic variables
12.18. List of make variable expansions
12.19. List of source code translation tools