Apple Mac OS Bedienungsanleitung

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42

Zur Seite of

Richtige Gebrauchsanleitung

Die Vorschriften verpflichten den Verkäufer zur Übertragung der Gebrauchsanleitung Apple Mac OS an den Erwerber, zusammen mit der Ware. Eine fehlende Anleitung oder falsche Informationen, die dem Verbraucher übertragen werden, bilden eine Grundlage für eine Reklamation aufgrund Unstimmigkeit des Geräts mit dem Vertrag. Rechtsmäßig lässt man das Anfügen einer Gebrauchsanleitung in anderer Form als Papierform zu, was letztens sehr oft genutzt wird, indem man eine grafische oder elektronische Anleitung von Apple Mac OS, sowie Anleitungsvideos für Nutzer beifügt. Die Bedingung ist, dass ihre Form leserlich und verständlich ist.

Was ist eine Gebrauchsanleitung?

Das Wort kommt vom lateinischen „instructio”, d.h. ordnen. Demnach kann man in der Anleitung Apple Mac OS die Beschreibung der Etappen der Vorgehensweisen finden. Das Ziel der Anleitung ist die Belehrung, Vereinfachung des Starts, der Nutzung des Geräts oder auch der Ausführung bestimmter Tätigkeiten. Die Anleitung ist eine Sammlung von Informationen über ein Gegenstand/eine Dienstleistung, ein Hinweis.

Leider widmen nicht viele Nutzer ihre Zeit der Gebrauchsanleitung Apple Mac OS. Eine gute Gebrauchsanleitung erlaubt nicht nur eine Reihe zusätzlicher Funktionen des gekauften Geräts kennenzulernen, sondern hilft dabei viele Fehler zu vermeiden.

Was sollte also eine ideale Gebrauchsanleitung beinhalten?

Die Gebrauchsanleitung Apple Mac OS sollte vor allem folgendes enthalten:
- Informationen über technische Daten des Geräts Apple Mac OS
- Den Namen des Produzenten und das Produktionsjahr des Geräts Apple Mac OS
- Grundsätze der Bedienung, Regulierung und Wartung des Geräts Apple Mac OS
- Sicherheitszeichen und Zertifikate, die die Übereinstimmung mit entsprechenden Normen bestätigen

Warum lesen wir keine Gebrauchsanleitungen?

Der Grund dafür ist die fehlende Zeit und die Sicherheit, was die bestimmten Funktionen der gekauften Geräte angeht. Leider ist das Anschließen und Starten von Apple Mac OS zu wenig. Eine Anleitung beinhaltet eine Reihe von Hinweisen bezüglich bestimmter Funktionen, Sicherheitsgrundsätze, Wartungsarten (sogar das, welche Mittel man benutzen sollte), eventueller Fehler von Apple Mac OS und Lösungsarten für Probleme, die während der Nutzung auftreten könnten. Immerhin kann man in der Gebrauchsanleitung die Kontaktnummer zum Service Apple finden, wenn die vorgeschlagenen Lösungen nicht wirksam sind. Aktuell erfreuen sich Anleitungen in Form von interessanten Animationen oder Videoanleitungen an Popularität, die den Nutzer besser ansprechen als eine Broschüre. Diese Art von Anleitung gibt garantiert, dass der Nutzer sich das ganze Video anschaut, ohne die spezifizierten und komplizierten technischen Beschreibungen von Apple Mac OS zu überspringen, wie es bei der Papierform passiert.

Warum sollte man Gebrauchsanleitungen lesen?

In der Gebrauchsanleitung finden wir vor allem die Antwort über den Bau sowie die Möglichkeiten des Geräts Apple Mac OS, über die Nutzung bestimmter Accessoires und eine Reihe von Informationen, die erlauben, jegliche Funktionen und Bequemlichkeiten zu nutzen.

Nach dem gelungenen Kauf des Geräts, sollte man einige Zeit für das Kennenlernen jedes Teils der Anleitung von Apple Mac OS widmen. Aktuell sind sie genau vorbereitet oder übersetzt, damit sie nicht nur verständlich für die Nutzer sind, aber auch ihre grundliegende Hilfs-Informations-Funktion erfüllen.

Inhaltsverzeichnis der Gebrauchsanleitungen

  • Seite 1

    M a c OS X Se r v er iChat Service Administration F or V ersi on 1 0.5 L eopard[...]

  • Seite 2

    K Apple Inc. © 2007 Apple Inc. All rights reserved. The owner or authoriz ed user of a valid copy of Mac OS X Ser v er software might reproduce this publication for the purpose of learning to use such software. No part of this publication might be reproduced or transmitted f or commercial purposes , such as selling copies of this publication or f [...]

  • Seite 3

    3 1 C ont en ts Prefac e 5 About This Guide 5 What’ s New in V ersion 1 0.5 6 What’ s in this Guide 6 Using Onscreen Help 7 Adv anced Ser ver A dministration Guides 8 Viewing PDF Guides on Screen 8 Printing PDF Guide s 9 Getting Documentation Updates 9 Getting Additional Information Chapter 1 1 1 Understanding iChat Service 11 How iChat Works 1[...]

  • Seite 4

    4 Contents 22 Setting Access C ontrol for iChat 22 Setting SACL P ermissions for Users and Groups 23 Setting SACL P ermissions for Administrators 23 Using SSL for iChat 24 Locating iChat C onfiguration Files 25 Viewing iChat Logs 25 T urning Auto-Buddy Suppor t On 25 Stopping iChat Chapter 3 27 Setting Up Adv anced iChat Service Configurations 27 L[...]

  • Seite 5

    5 Prefac e About This Guide This guide pro vides instructions for setting up , configuring, and administering iChat service on Mac OS X Ser ver . Instant messaging in volves liv e interactions between computer users ex changing text, pictures, audio , and video . Instant messaging is also known as chatting, because of its spontaneous , con versatio[...]

  • Seite 6

    6 Preface About This Guide What’ s in this Guide This guide includes the f ollowing chapters: Â Chapter 1, “Understanding iChat Service,” highlights key concepts and provide s basic information about iChat messaging in action, iChat messaging in organizations, and overviews of the iChat ser vice . Â Chapter 2, “Setting Up and Managing iCh[...]

  • Seite 7

    Preface About This Guide 7 Adv anced Ser v er Administr ation Guides Getting Star ted covers installation and setup f or standard and workgroup c onfigurations of Mac OS X Ser ver. F or advanced configurations , Ser v er Administration covers planning , installation, setup , and general ser ver administration. A suite of additional guides, listed b[...]

  • Seite 8

    8 Preface About This Guide Viewing PDF Guides on Screen While reading the PDF version of a guide onscreen: Â Show bookmarks to see the guide’ s outline, and click a bookmark to jump to the corres ponding section. Â Search for a wor d or phrase to see a list of places where it appears in the documen t. Click a listed place to see the page where [...]

  • Seite 9

    Preface About This Guide 9 Getting Documentation Updates P eriodically , Apple posts revised help page s and new editions of guides. Some revised help pages update the latest editions of the guide s. Â T o view new onscreen help topics for a server application, mak e sur e your server or administrator computer is connected to the In ternet and cli[...]

  • Seite 10

    10 Preface About This Guide[...]

  • Seite 11

    1 11 1 Understanding iChat Ser vice Mac OS X iChat ser vic e provide s secure instant me ssaging for users suppor ted b y Mac OS X Ser v er . iChat is a ser vic e that permits users to collaborate by chatting and sharing inf ormation using instant messaging and data transf er . This real-time int eraction between computer users promotes collaborati[...]

  • Seite 12

    12 Chapter 1 Understanding iChat Service Apple uses the jabberd software , which implements the Jabber protocol. Jabber is a trademarked term given to this XMPP prot ocol by the Jabber Software F oundation. iChat provides peer-file transf er between users that can ’t establish direct connections to a network beca use of intervening firewalls that[...]

  • Seite 13

    Chapter 1 Understanding iChat Service 13 Step 1: Initiating a chat T o star t a chat with another user , you must first know the user ’ s short name and the domain name that iChat is configured to use . Step 2: V erifying identity iChat verifies the identity of users by using Open Directory authentication. Users are authenticated only if they’ [...]

  • Seite 14

    14 Chapter 1 Understanding iChat Service Y ou can also use Ser v er Admin to create cust omized iChat configurations depending on your organizations requir emenets. For more details , see Chapter 3, “Setting Up Adv anced iChat Ser vice C onfigurations.” This includes setting up a server-to-server federation. When the ser ver-to-server federatio[...]

  • Seite 15

    Chapter 1 Understanding iChat Service 15 W orkgroup Manager W orkgroup Manager provides c omprehensive management of Mac OS X Server clients and users. F or basic information about using Workgroup Manager , see User Management . This includes information such as:  Opening and authenticating in Workgr oup Manager  Administering accoun ts  Cust[...]

  • Seite 16

    16 Chapter 1 Understanding iChat Service[...]

  • Seite 17

    2 17 2 Setting Up and Managing iChat Ser vice This chapter de scribes how t o set up and manage iChat in Mac OS X Ser ver . This chapter helps you perform the initial iChat service setup and provides information about using, managing, and administering iChat. Understanding iChat Screen Name s iChat screen names are Jabber IDs and use the general f [...]

  • Seite 18

    18 Chapter 2 Setting Up and Managing iChat Service Setup O v er view Here is an overview of the steps for setting up iChat service: Step 1: Configure and start Open Director y iChat uses Open Directory to authenticate users and must be configured bef ore setting up iChat. S ee “ Configuring and Starting Open Director y ” on page 1 8. Step 2: (O[...]

  • Seite 19

    Chapter 2 Setting Up and Managing iChat Service 19 Opening F irewall P or ts f or iChat Ser vice iChat requires s pecific por ts to be open on y our ser v er . If y ou have a firewall configur ed or you are using the Mac OS X Server firewall, you must enable these ports before you can use iChat. Depending on the iChat functions you require, make su[...]

  • Seite 20

    20 Chapter 2 Setting Up and Managing iChat Service  General. Use to set host domains, SSL cer tificate , authentication method , and XMPP ser v er-to-server federation for iChat.  Logging . Use t o configure message log settings f or iChat. The follo wing sections describe how to configure these settings , and a final sec tion tells you how t o[...]

  • Seite 21

    Chapter 2 Setting Up and Managing iChat Service 21 9 If you are using a certificate with iChat, selec t “Require secure server-to-ser v er federation.” This option require s an SSL cer tificat e to be installed , which is used to secure the ser v er-to-server federation. For more inf ormation, see “Securing S2S Connections” on page 28. 10 T[...]

  • Seite 22

    22 Chapter 2 Setting Up and Managing iChat Service T o start iChat ser vice: 1 Open Ser v er Admin and connect to the server . 2 Click the triangle to the left of the ser v er . The list of services appears. 3 In the expanded Ser vers list , click iChat. 4 Click Star t iChat (belo w the Ser vers list). Managing iChat In this section you learn about[...]

  • Seite 23

    Chapter 2 Setting Up and Managing iChat Service 23 5 Select the level of restriction you want for the services: T o restrict access to all services, select “F or all ser vices.” T o set access permissions for individual services, select “F or selected ser vices below” and select the ser vices fr om the Ser vice list. 6 Select the level of r[...]

  • Seite 24

    24 Chapter 2 Setting Up and Managing iChat Service The digital certificate can be a self-signed cer tificat e or a cer tificat e impor t ed from a certificate authority . For information about defining , obtaining , and installing certificates on your ser v er , see Ser v er Administration . iChat uses SSL to encrypt your chat messages that are sen[...]

  • Seite 25

    Chapter 2 Setting Up and Managing iChat Service 25 Viewing iChat Logs Y ou can view iChat logs using Ser v er Admin. iChat logs are located in the following locations: Â The iChat service log is located in /var/log/system.log . Â The iChat file pro xy log is located in /private/var/jabberd/log/pr oxy65.log . Â The iChat multiuser confer ence log[...]

  • Seite 26

    26 Chapter 2 Setting Up and Managing iChat Service[...]

  • Seite 27

    3 27 3 Setting Up Adv anced iChat Ser vice C onfigura tions This chapter t ells you how t o customize iChat t o create advanc ed configurations . iChat provides the f ollowing advanced c onfiguration options: Â “Linking Multiple Chat Ser vers (S2S)” on page 27 Â “Securing S2S Connections” on page 28 Â “Integrating with Directory Ser vi[...]

  • Seite 28

    28 Chapter 3 Setting Up Advanced iChat Service Configurations Using Ser v er Admin, you can take advantage of additional options for securing S2S communications. These options include filtering domains where servers are matched against a given list. T o enable or disable S2S communication: 1 Open Ser v er Admin and connect to the server . 2 Click t[...]

  • Seite 29

    Chapter 3 Setting Up Advanced iChat Service Configurations 29 By default, iChat selects a por t using a preinstalled , self-signed SSL cer tificate. Y ou can select your own certificate. T he selected cer tificate is used f or client-to-server communications on ports 522 2 and 522 3 and for ser ver-t o-ser v er communications. Jabber provides the f[...]

  • Seite 30

    30 Chapter 3 Setting Up Advanced iChat Service Configurations 5 Select “ Allow federation with the f ollowing domains ” to restrict S2S communication to those ser v ers listed. Y ou can add or remov e domains using the Add (+) or Delete (–) buttons below the list. The entries can be c omplete host names or domains (this can be a mix of server[...]

  • Seite 31

    Chapter 3 Setting Up Advanced iChat Service Configurations 31 Setting Up iChat on V irtually Hosted Domains iChat requires that y our host have a host name to be used as the Jabber r ealm by the iChat ser v er that is resolvable using DNS. This host name is used as the Jabber realm by the iChat ser v er , and clients use this realm to c onnect to t[...]

  • Seite 32

    32 Chapter 3 Setting Up Advanced iChat Service Configurations[...]

  • Seite 33

    33 Glossary Glossar y AFP Apple F iling Prot ocol. A client/ser ver pr otocol used by Apple file service to share files and network services. AFP uses T CP/IP and other protocols to support communication between comput ers on a network. address A number or other identifier that uniquely iden tifies a computer on a network, a block of data stored on[...]

  • Seite 34

    34 Glossary daemon A program that runs in the background and pro vides important system ser vic es, such as processing incoming email or handling reque sts from the network. DHCP Dynamic Host Configuration Protocol. A protocol used t o dynamically distribute IP addresses to clien t computers. Each time a client computer starts up, the protocol look[...]

  • Seite 35

    Glossary 35 file server A computer that serves files to clients. A file ser v er may be a general- purpose computer that’ s capable of hosting additional applications or a computer capable only of ser ving file s. file system A scheme for st oring data on storage devices that allows applications t o read and write files without ha ving to deal wi[...]

  • Seite 36

    36 Glossary IP subnet A portion of an IP network, which ma y be a physically independent netw ork segment, that shares a network addre ss with other por tions of the netw ork and is identified by a subnet number . Kerberos A secure netw ork authentication system. Kerberos uses tickets, which are issued for a specific user , ser vice , and period of[...]

  • Seite 37

    Glossary 37 nfsd daemon An NFS server process that runs continuously behind the sc enes and processes NFS pr otocol and mount prot ocol requests from clien ts. nfsd can have multiple threads. The more NFS server threads, the better concurrency . Open Directory The Apple director y services architecture , which can access authoritative inf ormation [...]

  • Seite 38

    38 Glossary protocol A set of rule s that determines how data is sent back and f orth between two applications. Q TSS Quick Time Streaming Server . A technology that lets you deliver media ov er the Internet in real time . queue An orderly waiting area where items wait f or some type of attention from the system. See also print queue . QuickTime A [...]

  • Seite 39

    Glossary 39 ticket, Kerberos A temporary credential that proves a Kerber os client’ s identity to a ser vic e. T ransmission Contr ol Protoc ol See TC P . UDP User Datagram Pr otocol. A communications method that uses the Internet Prot ocol (IP) to send a data unit (called a datagram) from one comput er to another on a network. Network applicatio[...]

  • Seite 40

    40 Glossary[...]

  • Seite 41

    41 Index Index A access, service 30 accounts, adding 17 administrator 30 administrator, privileges of 23 administrator computer 14 AFP (Apple Filing Protocol) service management of 22 After 17 approved list, domain 29, 30 authentication 12, 30 auto-buddy support 25 B buddies 17, 25 business size and iChat 13, 14 C certificates 12, 24, 29 chat servi[...]

  • Seite 42

    42 Index administrator 23 ports, encryption 29 privileges, administrator 23 public key certificates. See certificates R realms. See Kerberos S S2S connections 12 SACLs (service access control lists) 22 screen names, iChat 17 Secure Sockets Layer. See SSL 17 security access control 30 approved list 29, 30 authentication 12, 30 firewalls 12 s2s sessi[...]