List of Tables

List of Tables

Chapter 3: Getting Started with the Desktop

Table 3-1: Metacity Keyboard Shortcuts
Table 3-2: Mouse Actions

Chapter 4: Using Linux Commands

Table 4-1: Keystrokes for Navigating Command Lines
Table 4-2: Keystrokes for Editing Command Lines
Table 4-3: Keystrokes for Cutting and Pasting Text in Command Lines

Chapter 5: Accessing and Running Applications

Table 5-1: Windows-Equivalent Linux Applications
Table 5-2: Linux Archive File Formats
Table 5-3: Linux Document Formats
Table 5-4: Mtools Available with Linux
Table 5-5: Windows Drive Letters in WINE

Chapter 6: Publishing with Red Hat Linux

Table 6-1: Man Macros

Chapter 7: Playing Games with Red Hat Linux

Table 7-1: GNOME Games
Table 7-2: Games for the KDE Desktop

Chapter 8: Multimedia in Red Hat Linux

Table 8-1: Sound Formats Supported by Sox Utility
Table 8-2: Shortcuts for TV Watching (xawtv)

Chapter 9: Tools for Using the Internet and the Web

Table 9-1: Protocols in Web URLs

Chapter 11: Setting Up and Supporting Users

Table 11-1: useradd Command Options
Table 11-2: useradd Options for Changing User Defaults
Table 11-3: usermod Options for Changing Existing Accounts
Table 11-4: Using find to Locate and Change User Files

Chapter 12: Automating System Tasks

Table 12-1: Examples of bash parameter expansion
Table 12-2: Operators for Test Expressions
Table 12-3: Valid init Actions
Table 12-4: Possible Run Levels
Table 12-5: Run-Level Scripts Contained in /etc/init.d
Table 12-6: Samples for Specifying Times in an at Job
Table 12-7: Valid /etc/crontab Field Values

Chapter 13: Backing Up and Restoring Files

Table 13-1: Comparison of Common Backup Media
Table 13-2: Programs in the dump Package
Table 13-3: Options to dump
Table 13-4: Recommended dump Schedule
Table 13-5: Restore Command Options
Table 13-6: Interactive restore Commands
Table 13-7: Backup Commands Used with Amanda
Table 13-8: Examples of pax Use
Table 13-9: Options to pax

Chapter 14: Computer Security Issues

Table 14-1: netstat Parameters
Table 14-2: Socket States
Table 14-3: Ipchains Action Parameters
Table 14-4: Ipchains Optional Parameters
Table 14-5: ipchains Targets
Table 14-6: Log Files in the /var/log Directory
Table 14-7: Message Levels
Table 14-8: Ideas for Good Passwords

Chapter 15: Setting Up a Local Area Network

Table 15-1: Supported Wireless Network Adapters and Modules
Table 15-2: Options to the iwconfig Command
Table 15-3: Private IP Addresses

Chapter 19: Setting Up a Mail Server

Table 19-1: File Prefixes in /var/spool/mqueue
Table 19-2: Other Related Sendmail Programs
Table 19-3: Timeout Events
Table 19-4: Precedence Names
Table 19-5: Programs Included with majordomo

Chapter 21: Setting Up a Web Server

Table 21-1: Dynamic Shared Object (DSO) Modules
Table 21-2: Special Server Features for the Options Directive
Table 21-3: Special Access Features for the AllowOverride Directive
Table 21-4: UserDir Path Name and URL Examples
Table 21-5: Available Tokens within LogFormat
Table 21-6: Server Response Codes
Table 21-7: Command-Line Arguments to httpd

Chapter 23: Setting Up Boot Servers: DHCP and NIS

Table 23-1: Data Types
Table 23-2: DHCP Options

Chapter 24: Setting Up a MySQL Database Server

Table 24-1: Option Groups Associated with MySQL Commands
Table 24-2: Numeric Data Types for Columns
Table 24-3: Time/Date Data Types for Columns
Table 24-4: String Data Types for Columns

Chapter 25: Making Servers Public with DNS

Table 25-1: Zones and Related Zone Files in DNS Example

Appendix C: Running Network Services

Table C-1: Quick Reference to Network Services

Part IV: Red Hat Linux Network and Server Setup