Part 2. Configuring and Tweaking Your Box
Prev
Next
Part 2. Configuring and Tweaking Your Box
Table of Contents
5. Package Management
1. Adding and Removing Software
2. Updating Packages
3. The Software Media Manager
6. Hardware Setup
1. Configuring Your Hardware
1.1. Hardware Detection and Configuration
1.2. Problems and Troubleshooting
2. Controlling the Graphical Configuration
2.1. Changing the Monitor
2.2. Changing the Resolution
2.3. Controlling All Video Parameters
3. Configuring a 3D Desktop
3.1. Metisse
3.2. 3D desktop Cube Workspace
3.3. No 3D desktop effects
4. Changing Your Keyboard Layout
5. Changing Your Mouse
6. Configuring Printers with PrinterDrake
6.1. Automatic Installation
6.2. Manual Configuration
6.3. The Printer Management Interface
6.4. Print Server General Configuration
6.5. The Printer Configuration Wizard
6.6. Reconfiguring an Existing Printer
6.7. Controlling Automatic Installations
6.8. Expert Mode
7. Installing and Sharing Scanners
7.1. Main Interface and Scanner Installation
7.2. Share your Scanner
8. Setting up your UPS
7. Setting up your Network and Accessing the Web
1. Network and Internet Connection Management
1.1. Setting Up a New Network Interface
1.2. Internet Settings
1.3. Reconfiguring Interfaces
1.4. Monitoring Connections
1.5. Removing a Connection
1.6. Proxy Settings
2. Activating and Managing Network Profiles
2.1. Profile Handling
3. Managing Wireless Connections (Roaming)
3.1. Switching Networks
3.2. Configuring a Wireless Connection
8. Personalizing your System
1. Configuring Start-Up Services
2. Managing Fonts on your System with DrakFont
3. Setting your Machine's Date and Time
4. Monitoring System Activity
4.1. Browsing System Logs
5. Managing Users and Groups
5.1. The Interface
5.2. Adding a New User
6. Backing Up and Restoring your Files
6.1. A Practical Example Using the Wizard
6.2. Restoring Backups
6.3. Automating Periodic Backups
6.4. Advanced Backup Wizard Configuration
9. Securing your Linux Box
1. Securing your Internet Access via DrakFirewall
1.1. Choosing Services to be Available from Outside
1.2. Activating Interactive Firewall Feature
1.3. Which Interface to Protect