Toggle navigation
See also
Home
Linux systems
red hat linux bible. fedora and enterprise edition
List of Tables
List of Tables
Chapter 3: Getting Started with the Desktop
Table 3-1: Metacity Keyboard Shortcuts
Table 3-2: Mouse Actions
Chapter 4: Using Linux Commands
Table 4-1: Keystrokes for Navigating Command Lines
Table 4-2: Keystrokes for Editing Command Lines
Table 4-3: Keystrokes for Cutting and Pasting Text in Command Lines
Chapter 5: Accessing and Running Applications
Table 5-1: Windows-Equivalent Linux Applications
Table 5-2: Linux Archive File Formats
Table 5-3: Linux Document Formats
Table 5-4: Mtools Available with Linux
Table 5-5: Windows Drive Letters in WINE
Chapter 6: Publishing with Red Hat Linux
Table 6-1: Man Macros
Chapter 7: Playing Games with Red Hat Linux
Table 7-1: GNOME Games
Table 7-2: Games for the KDE Desktop
Chapter 8: Multimedia in Red Hat Linux
Table 8-1: Sound Formats Supported by Sox Utility
Table 8-2: Shortcuts for TV Watching (xawtv)
Chapter 9: Tools for Using the Internet and the Web
Table 9-1: Protocols in Web URLs
Chapter 11: Setting Up and Supporting Users
Table 11-1: useradd Command Options
Table 11-2: useradd Options for Changing User Defaults
Table 11-3: usermod Options for Changing Existing Accounts
Table 11-4: Using find to Locate and Change User Files
Chapter 12: Automating System Tasks
Table 12-1: Examples of bash parameter expansion
Table 12-2: Operators for Test Expressions
Table 12-3: Valid init Actions
Table 12-4: Possible Run Levels
Table 12-5: Run-Level Scripts Contained in /etc/init.d
Table 12-6: Samples for Specifying Times in an at Job
Table 12-7: Valid /etc/crontab Field Values
Chapter 13: Backing Up and Restoring Files
Table 13-1: Comparison of Common Backup Media
Table 13-2: Programs in the dump Package
Table 13-3: Options to dump
Table 13-4: Recommended dump Schedule
Table 13-5: Restore Command Options
Table 13-6: Interactive restore Commands
Table 13-7: Backup Commands Used with Amanda
Table 13-8: Examples of pax Use
Table 13-9: Options to pax
Chapter 14: Computer Security Issues
Table 14-1: netstat Parameters
Table 14-2: Socket States
Table 14-3: Ipchains Action Parameters
Table 14-4: Ipchains Optional Parameters
Table 14-5: ipchains Targets
Table 14-6: Log Files in the /var/log Directory
Table 14-7: Message Levels
Table 14-8: Ideas for Good Passwords
Chapter 15: Setting Up a Local Area Network
Table 15-1: Supported Wireless Network Adapters and Modules
Table 15-2: Options to the iwconfig Command
Table 15-3: Private IP Addresses
Chapter 19: Setting Up a Mail Server
Table 19-1: File Prefixes in /var/spool/mqueue
Table 19-2: Other Related Sendmail Programs
Table 19-3: Timeout Events
Table 19-4: Precedence Names
Table 19-5: Programs Included with majordomo
Chapter 21: Setting Up a Web Server
Table 21-1: Dynamic Shared Object (DSO) Modules
Table 21-2: Special Server Features for the Options Directive
Table 21-3: Special Access Features for the AllowOverride Directive
Table 21-4: UserDir Path Name and URL Examples
Table 21-5: Available Tokens within LogFormat
Table 21-6: Server Response Codes
Table 21-7: Command-Line Arguments to httpd
Chapter 23: Setting Up Boot Servers: DHCP and NIS
Table 23-1: Data Types
Table 23-2: DHCP Options
Chapter 24: Setting Up a MySQL Database Server
Table 24-1: Option Groups Associated with MySQL Commands
Table 24-2: Numeric Data Types for Columns
Table 24-3: Time/Date Data Types for Columns
Table 24-4: String Data Types for Columns
Chapter 25: Making Servers Public with DNS
Table 25-1: Zones and Related Zone Files in DNS Example
Appendix C: Running Network Services
Table C-1: Quick Reference to Network Services
BackCover
Red Hat Linux Bible - Fedora and Enterprise Edition
Preface
This Book's Learn-through-Tasks Approach
What You Need
Red Hat Linux Bible Improvements
Conventions Used in This Book
How This Book Is Organized
About the Companion CD-ROMs
About the Companion Web Site
Reach Out
Acknowledgments
Part I: Getting Started in Red Hat Linux
Chapter 1: An Overview of Red Hat Linux
Introducing Red Hat Linux
What Is Linux?
Linux's Roots in UNIX
Common Linux Features
Primary Advantages of Linux
What Is Red Hat Linux?
Why Choose Red Hat Linux?
Features in Red Hat Linux
The Culture of Free Software
Summary
Chapter 2: Installing Red Hat Linux
Quick Installation
Detailed Installation Instructions
Installing More Red Hat Linux Packages
Special Installation Procedures
Special Installation Topics
Troubleshooting Your Installation
Summary
Part II: Using Red Hat Linux
Chapter 3: Getting Started with the Desktop
Logging in to Red Hat Linux
Getting Familiar with the Desktop
Using the GNOME Desktop
Using the KDE Desktop
Troubleshooting Your Desktop
Summary
Chapter 4: Using Linux Commands
The Shell Interface
Understanding the Red Hat Linux Shell
Using the Shell in Red Hat Linux
Working with the Red Hat Linux File System
Using the vi Text Editor
Summary
Chapter 5: Accessing and Running Applications
Using Red Hat Linux as an Application Platform
Finding Windows-Equivalent Applications in Linux
Obtaining Red Hat Linux Applications
Installing Red Hat Linux Applications
Running X Window Applications
Running Window, DOS, and Macintosh Applications
Summary
Chapter 6: Publishing with Red Hat Linux
Using OpenOffice
Other Word Processors
Using Traditional Linux Publishing Tools
Creating Documents in Groff or LaTeX
Printing Documents with Red Hat Linux
Displaying Documents with Ghostscript and Acrobat
Working with Graphics
Using Scanners Driven by SANE
Summary
Chapter 7: Playing Games with Red Hat Linux
Basic Linux Gaming Information
X Window Games
Commercial Linux Games
Summary
Chapter 8: Multimedia in Red Hat Linux
Listening to Audio
Viewing TV and Webcams
Playing Video
Using a Digital Camera with gtkam and gphoto2
Recording Music CDs
Summary
Chapter 9: Tools for Using the Internet and the Web
Browsing the Web
Communicating with E-mail
Participating in Newsgroups
Participating in AOL Instant Messaging with Gaim
Using Remote Login, Copy, and Execution
Summary
Part III: Administering Red Hat Linux
Chapter 10: Understanding System Administration
Using the root Login
Becoming Super User (The su Command)
Learning about Administrative GUI Tools, Commands, Configuration Files, and Log Files
Administering Your Red Hat Linux System
Configuring Hardware
Managing File Systems and Disk Space
Monitoring System Performance
Choosing Software Alternatives
Getting Linux Software " up2date "
Summary
Chapter 11: Setting Up and Supporting Users
Creating User Accounts
Setting User Defaults
Creating Portable Desktops
Providing Support to Users
Modifying Accounts
Deleting User Accounts
Checking Disk Quotas
Sending Mail to All Users
Summary
Chapter 12: Automating System Tasks
Understanding Shell Scripts
System Initialization
System Start-Up and Shutdown
Scheduling System Tasks
Summary
Chapter 13: Backing Up and Restoring Files
Selecting a Backup Strategy
Selecting a Backup Medium
Backing Up to a Hard Drive
Backing Up Files with dump
Automating Backups with cron
Restoring Backed Up Files
Using the pax Archiving Tool
Summary
Chapter 14: Computer Security Issues
Hacker versus Cracker
Understanding Attack Techniques
Protecting Against Denial-of-Service Attacks
Protecting Against Distributed DOS Attacks
Protecting Against Intrusion Attacks
Protecting Your Network with Firewalls
Detecting Intrusions from Log Files
Monitoring Log Files with LogSentry
Using Password Protection
Using Encryption Techniques
Guarding Your Computer with PortSentry
Summary
Part IV: Red Hat Linux Network and Server Setup
Chapter 15: Setting Up a Local Area Network
Understanding Local Area Networks
Setting Up a Wireless LAN
Understanding IP Addresses
Troubleshooting Your LAN
Summary
Chapter 16: Connecting to the Internet
Understanding How the Internet Is Structured
Using Dial-up Connections to the Internet
Connecting your LAN to the Internet
Setting up Red Hat Linux as a Router
Configuring a Virtual Private Network Connection
Setting up Red Hat Linux as a Proxy Server
Setting up Proxy Clients
Summary
Chapter 17: Setting Up a Print Server
Choosing CUPS or LPRng Print Services
Setting Up Printers
Working with CUPS Printing
Managing Printing
Using Printing Commands
Configuring Print Servers
Summary
Chapter 18: Setting Up a File Server
Goals of Setting Up a File Server
Setting Up an NFS File Server in Red Hat Linux
Setting Up a Samba File Server in Red Hat Linux
Setting Up a NetWare File Server in Red Hat Linux
Summary
Chapter 19: Setting Up a Mail Server
Introduction to SMTP and sendmail
Installing and Running sendmail
Configuring sendmail
Introducing Postfix
Stopping Spam with SpamAssassin
Getting Mail from the Server (POP)
Administering a Mailing List
Summary
Chapter 20: Setting Up an FTP Server
Understanding FTP Servers
Using the Very Secure FTP Server (vsFTPd)
Using the Washington University FTP Server (WU-FTPD)
Getting More Information about FTP Servers
Summary
Chapter 21: Setting Up a Web Server
Introduction to Web Servers
Quick Starting the Apache Web Server
Configuring the Apache Server
Starting and Stopping the Server
Monitoring Server Activities
Summary
Chapter 22: Setting Up a News Server
Understanding News Transports
Planning Your News Server
Configuring an INN News Server
Setting Up News Feeds
Choosing How Articles Are Stored
Setting Up Expiration Times
Allowing Users to Access Your Server
Starting the News Service
Checking News Log Files
Summary
Chapter 23: Setting Up Boot Servers: DHCP and NIS
Using Dynamic Host Configuration Protocol
Setting Up a DHCP Server
Setting Up a DHCP Client
Understanding Network Information Service
Setting Up Red Hat Linux as an NIS Client
Setting Up Red Hat Linux as an NIS Master Server
Setting Up Red Hat Linux as an NIS Slave Server
Summary
Chapter 24: Setting Up a MySQL Database Server
Finding MySQL Packages
Configuring the MySQL Server
Starting the MySQL Server
Checking That MySQL Server Is Working
Working with MySQL Databases
Understanding MySQL Tables
Displaying MySQL Databases
Making Changes to Tables and Records
Adding and Removing User Access
Checking and Fixing Databases
Summary
Chapter 25: Making Servers Public with DNS
Determining Goals for Your Server
Connecting a Public Server
Configuring Your Public Server
Setting Up a Domain Name System Server
Getting More Information about BIND
Summary
Chapter 26: Using Linux Servers from a Mac
Looking inside Mac OS X
Using Network Services from Mac OS X
Configuring an AppleTalk Server in Linux
Accessing NFS servers from the Mac
Summary
Appendix A: What's on the CD-ROMs
Using Linux Kernel Source Code
Appendix B: Red Hat Linux RPMs
Comparing Fedora and Enterprise Packages
Removed Packages
Red Hat Linux Packages on the CDs
Appendix C: Running Network Services
Checklist for Running Networking Services
Networking Service Daemons
Choosing Alternatives
Referencing Network Services
List of Figures
List of Tables
List of Sidebars
Remember the name: eTutorials.org
Copyright eTutorials.org 2008-2024. All rights reserved.