The alias directive can be used to give alias names to modules. KernelModuleBlacklisting - Prevent a module from being automatically loaded. ModuleAssistant - Build extra modules with module-assistant. Manual pages: dkms module-assistant modprobe lsmod modinfo insmod depmod rmmod depmod. First of all, you need to have Perl installed on your Debian 10 system.
For that, you will launch the terminal in Debian 10 by looking for it in the Activities menu. The Debian 10 terminal can be seen in the following image:.
Now you have to run the following command in your terminal to install Perl on your Debian 10 system:. Once the installation of Perl completes successfully, the output shown in the image below will be displayed on your Debian 10 terminal:.
Once all the required packages and dependencies have been updated, you will be able to witness the following output on your Debian 10 terminal:. For doing so, we first need to install this repository on our Debian 10 system, which can be done with the below-mentioned command:.
Getting Debian Debian is distributed freely over Internet. Download an installation image Depending on your Internet connection, you may download either of the following: A small installation image : can be downloaded quickly and should be recorded onto a removable disk.
To use this, you will need a machine with an Internet connection. Use a Debian cloud image An official cloud image , built by the cloud team, can be used on: your OpenStack provider, in qcow2 or raw formats. Debian 11 "Bullseye" Debian 10 "Buster". You can install on machines without an Internet connection. You can install Debian on as many machines as you like without downloading all packages yourself.
You then need to answer a series of questions about this new device. The second question asks about the number of active devices — two in our case, which is the number of partitions that need to be included in this MD device.
The third question is about the number of spare devices — 0; we have not planned any additional disk to take over for a possible defective disk. This disk is presented with a single partition which can not be deleted, but whose use we can choose just like for any other partition. The benefits are twofold: the size of the partitions are no longer limited by individual disks but by their cumulative volume, and you can resize existing partitions at any time, possibly after adding an additional disk when needed.
This technique works in a very simple way: each volume, whether physical or logical, is split into blocks of the same size, which are made to correspond by LVM. The addition of a new disk will cause the creation of a new physical volume, and these new blocks can be associated to any volume group. All of the partitions in the volume group that is thus expanded will have additional space into which they can extend.
The partitioning tool configures LVM in several steps. Finally, you can create logical volumes within this volume group. Note that the automatic partitioning system can perform all these steps automatically. In the partitioning menu, each physical volume will appear as a disk with a single partition which can not be deleted, but that you can use as desired.
The usage of LVM is described in further detail in Section Setting Up Encrypted Partitions. To guarantee the confidentiality of your data, for instance in the event of the loss or theft of your computer or a hard drive, it is possible to encrypt the data on some partitions.
This feature can be added underneath any filesystem, since, as for LVM, Linux and more particularly the dm-crypt driver uses the Device Mapper to create a virtual partition whose content is protected based on an underlying partition that will store the data in an encrypted form thanks to LUKS, Linux Unified Key Setup, a standard format that enables the storage of encrypted data as well as meta-information that indicates the encryption algorithms used. When an encrypted partition is used, the encryption key is stored in memory RAM.
Since retrieving this key allows the decryption of the data, it is of utmost importance to avoid leaving a copy of this key that would be accessible to the possible thief of the computer or hard drive, or to a maintenance technician.
This is, however, something that can easily occur with a laptop, since when hibernating the contents of RAM is stored on the swap partition. If this partition isn't encrypted, the thief may access the key and use it to decrypt the data from the encrypted partitions.
This is why, when you use encrypted partitions, it is imperative to also encrypt the swap partition! The Debian installer will warn the user if they try to make an encrypted partition while the swap partition isn't encrypted. To create an encrypted partition, you must first assign an available partition for this purpose. Installing the Base System. This includes the dpkg and apt tools, which manage Debian packages, as well as the utilities necessary to boot the system and start using it.
Configuring the Package Manager apt. In order to be able to install additional software, APT needs to be configured and told where to find Debian packages. This step is as automated as possible. It starts with a question asking if it must use a network source for packages, or if it should only look for packages on the CD-ROM.
If getting packages from the network is requested, the next two questions allow to choose a server from which to download these packages, by choosing first a country, then a mirror available in that country a mirror is a public server hosting copies of all the files of the Debian master archive.
Finally, the program proposes to use an HTTP proxy. If there is no proxy, Internet access will be direct. You can find these settings by checking the configurations of a web browser on another machine connected to the same network.
The files Packages. In some cases, it is the only means of accessing an external web server; in such cases it is essential to answer the corresponding question during installation for the program to be able to download the Debian packages through it. Squid is the name of the server software used by Falcot Corp to offer this service. Debian Package Popularity Contest. The Debian system contains a package called popularity-contest , whose purpose is to compile package usage statistics.
Each week, this program collects information on the packages installed and those used recently, and anonymously sends this information to the Debian project servers. The project can then use this information to determine the relative importance of each package, which influences the priority that will be granted to them. This package is only activated on demand, out of respect for the confidentiality of users' usage. Selecting Packages for Installation. The following step allows you to choose the purpose of the machine in very broad terms; the ten suggested tasks correspond to lists of packages to be installed.
The list of the packages that will actually be installed will be fine-tuned and completed later on, but this provides a good starting point in a simple manner.
Some packages are also automatically installed according to the hardware detected thanks to the program discover-pkginstall from the discover package. The bootloader is the first program started by the BIOS. This program loads the Linux kernel into memory and then executes it. This phase in the Debian installation process detects the operating systems that are already installed on the computer, and automatically adds corresponding entries in the boot menu, but not all installation programs do this.
0コメント