抱歉上午发的没有采用utf-8格式。 现在的用iconv命令转换过,应该没问题了。 请查收。
后续空闲的时间有限,如果没有特别强的时间限制,我可以把 boot-new/modules/timezone.xml boot-new/modules/apt.xml boot-new/modules/ppp.xml 在下周日前翻译完毕。 -- 吴鲁加<[EMAIL PROTECTED]>
<!-- retain these comments for translator revision tracking --> <!-- original version: 11648 --> <sect2 id="base-config-users"> <title>设置用户和密码</title> <sect3 id="base-config-shadow"> <title>使用Shadow</title> <para> <!-- Depending on a given priority, the system may ask whether you want to enable shadow passwords. This is a system in which your GNU/Linux system is made to be a bit more secure. In a system without shadow passwords, passwords are stored (encrypted) in a world-readable file, <filename>/etc/passwd</filename>. This file has to be readable to anyone who can log in because it contains vital user information, for instance, how to map between numeric user identifiers and login names. Therefore, someone could conceivably grab your <filename>/etc/passwd</filename> file and run a brute force attack (i.e. run an automated test of all possible password combinations) against it to try to determine passwords. --> 根据提供的优先级别, 系统会询问是否要使用shadow密码。 这是在GNU/Linux上一种使系统更加安全的方法。 在未使用shadow的系统中, 加密后的密码会被存放在一个全局可读的<filename>/etc/passwd</filename>中, 任何登陆系统者都能够获得你的用户信息, 举例来说,他能得到你的登陆名称和真实名字间的关系, 所以有恶意者可以通过获取<filename>/etc/passwd</filename>文件, 然后通过暴力猜解(比如:运行自动的密码破解工具来猜测你的密码组合)来获得你的密码。 </para><para> <!-- If you have shadow passwords enabled, passwords are instead stored in <filename>/etc/shadow</filename>, which is readable and writable only by root, and readable by group shadow. Therefore, we recommend that you enable shadow passwords. --> 如果使用了shadow密码,则密码会被放在<filename>/etc/shadow</filename>, 只能由root进行读写、组成员可读。 因此,我们推荐你使用shadow密码。 </para><para> <!-- Reconfiguration of the shadow password system can be done at any time with the <command>shadowconfig</command> program. After installation, see <filename>/usr/share/doc/passwd/README.debian.gz</filename> for more information. --> 你也可以在今后的任何时间通过运行<command>shadowconfig</command>命令重新配置shadow密码。 安装完毕后,可以通过<filename>/usr/share/doc/passwd/README.debian.gz</filename>查看它的详细信息。 </para> </sect3> <sect3 id="base-config-root"> <title>设置root密码</title> <para> <!-- The <emphasis>root</emphasis> account is also called the <emphasis>super-user</emphasis>; it is a login that bypasses all security protection on your system. The root account should only be used to perform system administration, and only used for as short a time as possible. --> 我们也称<emphasis>root</emphasis>账号为<emphasis>super-user</emphasis>, 即超级用户。 系统中的所有的安全防护措施对以超级用户身份登陆者都是无效的。 该账号通常用来进行系统管理工作, 平时应该尽量少使用超级用户工作。 </para><para> <!-- Any password you create should contain at least 6 characters, and should contain both upper- and lower-case characters, as well as punctuation characters. Take extra care when setting your root password, since it is such a powerful account. Avoid dictionary words or use of any personal information which could be guessed. --> 你所创建的任何密码都应该包含至少6位的字符, 包含大小写字母, 并且最好带有标点符号等特殊字符。 因为超级用户具有最高权限, 因此在你设置该账号的密码时尤其需要注意, 不要直接采用能够查到的单词或者很容易猜测的个人信息(如生日、电话号码等)。 </para><para> <!-- If anyone ever tells you they need your root password, be extremely wary. You should normally never give your root account out, unless you are administering a machine with more than one system administrator. --> 如果他人向你索取你的root密码, 你需要特别谨慎。 除非那是个有多位管理员的系统,否则通常情况下你不应该将超级用户密码交给任何人。 </para> </sect3> <sect3 id="make-normal-user"> <title>创建一个普通用户</title> <para> <!-- The system will ask you whether you wish to create an ordinary user account at this point. This account should be your main personal log-in. You should <emphasis>not</emphasis> use the root account for daily use or as your personal login. --> 系统会询问你是否希望现在创建一个普通账号, 你将使用该账号进行日常登陆使用。 切记平时<emphasis>不要</emphasis>使用root账号登陆或者作为个人使用。 </para><para> <!-- Why not? Well, one reason to avoid using root's privileges is that it is very easy to do irreparable damage as root. Another reason is that you might be tricked into running a <emphasis>Trojan-horse</emphasis> program ????that is a program that takes advantage of your super-user powers to compromise the security of your system behind your back. Any good book on Unix system administration will cover this topic in more detail ????consider reading one if it is new to you. --> 为什么呢? 一个原因是能够避免平时使用超级用户权限对系统造成无法挽回的伤害。 另一个原因是,不用超级用户,能够避免以管理员身份运行“特洛伊木马”程序-- 一种可能利用你的超级用户权限在你未知的情况下损害你的系统安全性的程序。 许多很好的Unix系统管理书籍中都会有许多涉及这一主题的技术细节, 如果你不是很了解本部分的内容, 建议你找一本进行学习。 </para><para> <!-- Name the user account anything you like. If your name is John Smith, you might use <userinput>smith</userinput>, <userinput>john</userinput>, <userinput>jsmith</userinput> or <userinput>js</userinput>. You will also be prompted for the full name of the user, and, like before, a password. --> 该用户的名称可以是任何你喜欢的字眼。 如果你的名字是John Smith, 那你可以用<userinput>smith</userinput>, <userinput>john</userinput>, <userinput>jsmith</userinput> 或者 <userinput>js</userinput>, 总之,只要你喜欢。 之后,会提示你输入用户的全名及密码。 </para><para> <!-- If at any point after installation you would like to create another account, use the <command>adduser</command> command. --> 如果在安装完毕后你希望建立其它新账号,可以使用命令<command>adduser</command>。 </para><para arch="s390"> <!-- You need to create a user account on &arch-title; if you want to login over the network using telnet. The telnet server does not allow root logins in Debian's default configuration. However, you can use ssh (Secure SHell) to remotely login as root but this is not recommended. --> 如果你希望使用telnet程序通过网络登陆, 你需要在网络服务器上建立一个普通帐户。 因为Debian默认配置下的telnet服务器不允许超级用户直接远程登陆。 你也可以采用ssh(Secure SHell)以root身份远程登陆,但通常不推荐这样做。 </para> </sect3> </sect2>

