Toggle navigation
See also
Home
Linux systems
red hat linux bible. fedora and enterprise edition
List of Figures
List of Figures
Chapter 2: Installing Red Hat Linux
Figure 2-1: Change software packages after Red Hat installation using the Add and Remove Software window.
Figure 2-2: Partition your disk during installation from the Disk Setup window.
Chapter 3: Getting Started with the Desktop
Figure 3-1: A graphical login can access the Red Hat Linux GUI.
Figure 3-2: After login, Red Hat Linux starts you off with a GNOME desktop by default. Steps 1, 2, and 3 are explained in the following section.
Figure 3-3: Set a colors or pictures for your desktop background.
Figure 3-4: Change from the default Bluecurve theme.
Figure 3-5: Launch popular desktop applications with one click.
Figure 3-6: A drawer is a great way to contain personal utilities and launchers.
Figure 3-7: In the GNOME desktop environment, you can manage applications from the panel.
Figure 3-8: Left-click any open spot on the GNOME Panel to see the Panel menu.
Figure 3-9: Applets let you monitor activities, play CDs, watch your mail, or look up dictionary words.
Figure 3-10: Add launchers or applets to a drawer on your GNOME panel.
Figure 3-11: Move around the file system, open directories, launch applications, and open Samba folders.
Figure 3-12: Display shared Windows file and printer servers (SMB) in Nautilus.
Figure 3-13: Change the look-and-feel of your desktop from the Preferences window.
Figure 3-14: Select specific or random screen savers from Screensaver Preferences.
Figure 3-15: Manage files and applications graphically with the KDE desktop.
Figure 3-16: Konqueror provides a network-ready tool for managing files.
Figure 3-17: Search for files and folders from the kfind window.
Figure 3-18: Create an image gallery in Konqueror.
Figure 3-19: Configure your desktop from the KDE Control Center.
Figure 3-20: Use the Display Settings window to configure basic desktop, video card, and monitor settings.
Chapter 4: Using Linux Commands
Figure 4-1: The Red Hat Linux file system is organized as a hierarchy of directories.
Chapter 5: Accessing and Running Applications
Figure 5-1: Starting X applications from the Red Hat Menu.
Figure 5-2: Select a program to run from the list in the Run Program window.
Figure 5-3: Running Paint in Red Hat Linux using WINE.
Chapter 6: Publishing with Red Hat Linux
Figure 6-1: Work with Microsoft Word documents in OpenOffice Writer.
Figure 6-2: The KOffice Workspace lets you work with multiple KDE office applications at once.
Figure 6-3: Simple markup is required to create man pages.
Figure 6-4: Man page formatting adds headers and lays out the page of text.
Figure 6-5: Create a simple letter using mm macros.
Figure 6-6: Add headings and approval lines automatically to memos.
Figure 6-7: Produce equations in documents with the use of the eqn command's .EQ and .EN macros.
Figure 6-8: Set how text is justified and put in columns with the use of the tbl command's .TS and .TE macros.
Figure 6-9: Create simple flow diagrams with the pic command's .PS and .PE macros.
Figure 6-10: Create LaTeX documents graphically with the LyX editor.
Figure 6-11: The DocBook file is output in HTML with the db2html command.
Figure 6-12: Display PDF files in the Adobe Acrobat Reader.
Figure 6-13: GIMP is a powerful tool for graphic manipulation.
Figure 6-14: Grab a picture of your desktop or selected window with Screen Capture.
Figure 6-15: Edit bitmap images with KPaint.
Chapter 7: Playing Games with Red Hat Linux
Figure 7-1: In the xboard window, you can set xgame to either play against the computer or to replay saved games.
Figure 7-2: Play Freeciv to build civilizations and compete against others.
Figure 7-3: Choose a nation to begin Freeciv.
Figure 7-4: Quake III Arena is a popular first-person shooter game that runs in Linux.
Figure 7-5: Battle against super-human gladiators with Unreal Tournament 2003.
Figure 7-6: Return to Castle Wolfenstein combines strange creatures and WWII battles.
Figure 7-7: Use the Point2Play window to check computer hardware for WineX gaming.
Figure 7-8: Civilization Call to Power features excellent graphics and network play.
Figure 7-9: Use warriors, archers, and dwarves to battle in Myth II.
Chapter 8: Multimedia in Red Hat Linux
Figure 8-1: The Audio Devices (redhat-config-soundcard) window detects your sound card.
Figure 8-2: Play CDs and store artist, title, and track information with gnome-cd.
Figure 8-3: Play Ogg Vorbis and other audio files from the XMMS playlist.
Figure 8-4: The KMidi window shows each MIDI track as it plays.
Figure 8-5: Watch TV from a TV capture card using Xawtv.
Figure 8-6: Connect to ILS servers to video-conference with GnomeMeeting.
Figure 8-7: Play video CDs, MP3s, Quicktime, and other video formats with xine.
Figure 8-8: Download images from digital cameras from the gtkam window.
Figure 8-9: Rip and play songs from the Grip window.
Figure 8-10: Generate CD jewel case labels with cdlabelgen and print them with gv.
Chapter 9: Tools for Using the Internet and the Web
Figure 9-1: Many Web pages contain text, images, headings, and links.
Figure 9-2: Mozilla is the open-source Web browser created from Netscape source code.
Figure 9-3: Change settings for navigating the Web from Mozilla's Preferences window
Figure 9-4: Display information about a Web page by selecting Page Info.
Figure 9-5: Change colors, fonts, and browser types on the fly with Mozdev.org Preferences Toolbar.
Figure 9-6: Evolution can be used to manage your mail, appointments, and tasks.
Figure 9-7: Manage your e-mail from the Mozilla Mail window.
Figure 9-8: Choose from thousands of newsgroups in the newsgroup subscription window in Mozilla.
Figure 9-9: Access your AOL Instant Messaging using Gaim.
Figure 9-10: View local and remote files simultaneously from the gFTP window.
Chapter 10: Understanding System Administration
Figure 10-1: Enter the root password to open system administration windows from a regular user's GUI.
Figure 10-2: Choose an NTP server or set date and time on the Date/Time Properties window.
Figure 10-3: Show log files of activities from system boot, FTP, mail, news, and other services.
Figure 10-4: Join multiple RAID partitions to form a single RAID device.
Figure 10-5: System Monitor graphically displays your system's CPU and memory usage.
Figure 10-6: Running processes appear in CPU usage order by default in the top window.
Figure 10-7: View battery status and change preferences with the Battery Charge Monitor.
Figure 10-8: The Red Hat Network alert notification tool appears as a round icon on your desktop panel.
Chapter 11: Setting Up and Supporting Users
Figure 11-1: Manage users from the Red Hat User Manager window.
Figure 11-2: Create New User window.
Figure 11-3: Choose Properties to modify an existing user account.
Chapter 12: Automating System Tasks
Figure 12-1: Reorganize, add, and remove run-level scripts from the Service Configuration window.
Chapter 14: Computer Security Issues
Figure 14-1: Build your firewall by answering a series of questions.
Figure 14-2: Using iptables as a firewall between the Internet and a LAN.
Figure 14-3: Display system log files in the System Logs window.
Figure 14-4: A pop-up window alerts you when a site is not authenticated.
Chapter 15: Setting Up a Local Area Network
Figure 15-1: In a star topology, machines on the network connect to a central hub.
Figure 15-2: A bus topology chains computers together without using a hub.
Figure 15-3: Wireless LANs can communicate as peers by broadcasting data.
Figure 15-4: Wireless communication can go through an access point.
Figure 15-5: A star topology's twisted-pair cables have RJ-45 connectors (similar to telephone-cable connectors).
Figure 15-6: Configure your LAN interface using the Network Configuration window.
Figure 15-7: Add hosts to /etc/hosts using the Network Configuration window.
Figure 15-8: Configure TCP/IP on Windows XP for your Ethernet LAN.
Figure 15-9: The distance of obstructive objects from the wireless signal is called the
clearance
.
Figure 15-10: The Orinoco Silver wireless LAN card can be used with a PCI adapter (shown here).
Figure 15-11: Add a wireless interface using the Network Configuration window.
Figure 15-12: Configure your Ethernet card for TCP/IP during installation.
Chapter 16: Connecting to the Internet
Figure 16-1: The Internet Configuration Wizard helps you set up a PPP Internet connection.
Figure 16-2: A CIPE VPN is configured between two Linux systems over the Internet.
Figure 16-3: The Preferences window identifies proxy servers and port numbers in Mozilla.
Figure 16-4: The Local Area Network Settings window lets you add proxies to Internet Options in Internet Explorer.
Chapter 17: Setting Up a Print Server
Figure 17-1: Add printers connected locally or remotely with the Printer configuration window.
Figure 17-2: CUPS enables Web-based administration via port 631.
Figure 17-3: Temporarily stop printing or print test pages from the Printers page.
Figure 17-4: Display queues for your active printers.
Figure 17-5: Find and display your Samba printer from Find Computer.
Chapter 18: Setting Up a File Server
Figure 18-1: NFS can make selected file systems available to other computers.
Figure 18-2: Identify a directory to share and access permissions with the NFS Server Configuration window.
Figure 18-3: Define the workgroup and description for your Samba server.
Figure 18-4: Fill in Basic and Security information for your Samba server.
Figure 18-5: Use SWAT from your browser to manage your Samba configuration.
Figure 18-6: View your Red Hat Linux Samba server from the Network Neighborhood window.
Chapter 21: Setting Up a Web Server
Figure 21-1: Appearance of the Test Page indicates that the Apache installation succeeded.
Figure 21-2: Change how directories are displayed from Apache using IndexOptions.
Figure 21-3: The server-info page displays server and module information.
Figure 21-4: The Apache server-status page displays general Apache information and reports on individual server process activities.
Figure 21-5: Webalizer displays Web data in chart and column formats.
Chapter 25: Making Servers Public with DNS
Figure 25-1: The sample
yourdomain.com
DNS server has a combination of public servers and private client computers.
Chapter 26: Using Linux Servers from a Mac
Figure 26-1: Configure your Mac OS X network interface to connect to Linux servers.
Figure 26-2: In Mac OS X, see Samba and AppleTalk shares from the Connect to Server window.
Figure 26-3: Select authentication options when you connect to your AppleTalk (netatalk) server.
Figure 26-4: After requesting a Samba share, you must authenticate to the server.
Figure 26-5: Connect to an NFS server from the Connect to Server window.
Appendix C: Running Network Services
Figure C-1: Change your default mail-transport agent with redhat-switchmail.
BackCover
Red Hat Linux Bible - Fedora and Enterprise Edition
Preface
This Book's Learn-through-Tasks Approach
What You Need
Red Hat Linux Bible Improvements
Conventions Used in This Book
How This Book Is Organized
About the Companion CD-ROMs
About the Companion Web Site
Reach Out
Acknowledgments
Part I: Getting Started in Red Hat Linux
Chapter 1: An Overview of Red Hat Linux
Introducing Red Hat Linux
What Is Linux?
Linux's Roots in UNIX
Common Linux Features
Primary Advantages of Linux
What Is Red Hat Linux?
Why Choose Red Hat Linux?
Features in Red Hat Linux
The Culture of Free Software
Summary
Chapter 2: Installing Red Hat Linux
Quick Installation
Detailed Installation Instructions
Installing More Red Hat Linux Packages
Special Installation Procedures
Special Installation Topics
Troubleshooting Your Installation
Summary
Part II: Using Red Hat Linux
Chapter 3: Getting Started with the Desktop
Logging in to Red Hat Linux
Getting Familiar with the Desktop
Using the GNOME Desktop
Using the KDE Desktop
Troubleshooting Your Desktop
Summary
Chapter 4: Using Linux Commands
The Shell Interface
Understanding the Red Hat Linux Shell
Using the Shell in Red Hat Linux
Working with the Red Hat Linux File System
Using the vi Text Editor
Summary
Chapter 5: Accessing and Running Applications
Using Red Hat Linux as an Application Platform
Finding Windows-Equivalent Applications in Linux
Obtaining Red Hat Linux Applications
Installing Red Hat Linux Applications
Running X Window Applications
Running Window, DOS, and Macintosh Applications
Summary
Chapter 6: Publishing with Red Hat Linux
Using OpenOffice
Other Word Processors
Using Traditional Linux Publishing Tools
Creating Documents in Groff or LaTeX
Printing Documents with Red Hat Linux
Displaying Documents with Ghostscript and Acrobat
Working with Graphics
Using Scanners Driven by SANE
Summary
Chapter 7: Playing Games with Red Hat Linux
Basic Linux Gaming Information
X Window Games
Commercial Linux Games
Summary
Chapter 8: Multimedia in Red Hat Linux
Listening to Audio
Viewing TV and Webcams
Playing Video
Using a Digital Camera with gtkam and gphoto2
Recording Music CDs
Summary
Chapter 9: Tools for Using the Internet and the Web
Browsing the Web
Communicating with E-mail
Participating in Newsgroups
Participating in AOL Instant Messaging with Gaim
Using Remote Login, Copy, and Execution
Summary
Part III: Administering Red Hat Linux
Chapter 10: Understanding System Administration
Using the root Login
Becoming Super User (The su Command)
Learning about Administrative GUI Tools, Commands, Configuration Files, and Log Files
Administering Your Red Hat Linux System
Configuring Hardware
Managing File Systems and Disk Space
Monitoring System Performance
Choosing Software Alternatives
Getting Linux Software " up2date "
Summary
Chapter 11: Setting Up and Supporting Users
Creating User Accounts
Setting User Defaults
Creating Portable Desktops
Providing Support to Users
Modifying Accounts
Deleting User Accounts
Checking Disk Quotas
Sending Mail to All Users
Summary
Chapter 12: Automating System Tasks
Understanding Shell Scripts
System Initialization
System Start-Up and Shutdown
Scheduling System Tasks
Summary
Chapter 13: Backing Up and Restoring Files
Selecting a Backup Strategy
Selecting a Backup Medium
Backing Up to a Hard Drive
Backing Up Files with dump
Automating Backups with cron
Restoring Backed Up Files
Using the pax Archiving Tool
Summary
Chapter 14: Computer Security Issues
Hacker versus Cracker
Understanding Attack Techniques
Protecting Against Denial-of-Service Attacks
Protecting Against Distributed DOS Attacks
Protecting Against Intrusion Attacks
Protecting Your Network with Firewalls
Detecting Intrusions from Log Files
Monitoring Log Files with LogSentry
Using Password Protection
Using Encryption Techniques
Guarding Your Computer with PortSentry
Summary
Part IV: Red Hat Linux Network and Server Setup
Chapter 15: Setting Up a Local Area Network
Understanding Local Area Networks
Setting Up a Wireless LAN
Understanding IP Addresses
Troubleshooting Your LAN
Summary
Chapter 16: Connecting to the Internet
Understanding How the Internet Is Structured
Using Dial-up Connections to the Internet
Connecting your LAN to the Internet
Setting up Red Hat Linux as a Router
Configuring a Virtual Private Network Connection
Setting up Red Hat Linux as a Proxy Server
Setting up Proxy Clients
Summary
Chapter 17: Setting Up a Print Server
Choosing CUPS or LPRng Print Services
Setting Up Printers
Working with CUPS Printing
Managing Printing
Using Printing Commands
Configuring Print Servers
Summary
Chapter 18: Setting Up a File Server
Goals of Setting Up a File Server
Setting Up an NFS File Server in Red Hat Linux
Setting Up a Samba File Server in Red Hat Linux
Setting Up a NetWare File Server in Red Hat Linux
Summary
Chapter 19: Setting Up a Mail Server
Introduction to SMTP and sendmail
Installing and Running sendmail
Configuring sendmail
Introducing Postfix
Stopping Spam with SpamAssassin
Getting Mail from the Server (POP)
Administering a Mailing List
Summary
Chapter 20: Setting Up an FTP Server
Understanding FTP Servers
Using the Very Secure FTP Server (vsFTPd)
Using the Washington University FTP Server (WU-FTPD)
Getting More Information about FTP Servers
Summary
Chapter 21: Setting Up a Web Server
Introduction to Web Servers
Quick Starting the Apache Web Server
Configuring the Apache Server
Starting and Stopping the Server
Monitoring Server Activities
Summary
Chapter 22: Setting Up a News Server
Understanding News Transports
Planning Your News Server
Configuring an INN News Server
Setting Up News Feeds
Choosing How Articles Are Stored
Setting Up Expiration Times
Allowing Users to Access Your Server
Starting the News Service
Checking News Log Files
Summary
Chapter 23: Setting Up Boot Servers: DHCP and NIS
Using Dynamic Host Configuration Protocol
Setting Up a DHCP Server
Setting Up a DHCP Client
Understanding Network Information Service
Setting Up Red Hat Linux as an NIS Client
Setting Up Red Hat Linux as an NIS Master Server
Setting Up Red Hat Linux as an NIS Slave Server
Summary
Chapter 24: Setting Up a MySQL Database Server
Finding MySQL Packages
Configuring the MySQL Server
Starting the MySQL Server
Checking That MySQL Server Is Working
Working with MySQL Databases
Understanding MySQL Tables
Displaying MySQL Databases
Making Changes to Tables and Records
Adding and Removing User Access
Checking and Fixing Databases
Summary
Chapter 25: Making Servers Public with DNS
Determining Goals for Your Server
Connecting a Public Server
Configuring Your Public Server
Setting Up a Domain Name System Server
Getting More Information about BIND
Summary
Chapter 26: Using Linux Servers from a Mac
Looking inside Mac OS X
Using Network Services from Mac OS X
Configuring an AppleTalk Server in Linux
Accessing NFS servers from the Mac
Summary
Appendix A: What's on the CD-ROMs
Using Linux Kernel Source Code
Appendix B: Red Hat Linux RPMs
Comparing Fedora and Enterprise Packages
Removed Packages
Red Hat Linux Packages on the CDs
Appendix C: Running Network Services
Checklist for Running Networking Services
Networking Service Daemons
Choosing Alternatives
Referencing Network Services
List of Figures
List of Tables
List of Sidebars
Remember the name: eTutorials.org
Copyright eTutorials.org 2008-2024. All rights reserved.