did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9780764599491

Red Hat Linux Networking and System Administration

by ;
  • ISBN13:

    9780764599491

  • ISBN10:

    0764599496

  • Edition: 3rd
  • Format: Paperback
  • Copyright: 2005-10-21
  • Publisher: Wiley
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $80.00 Save up to $2.40
  • Buy New
    $77.60
    Add to Cart Free Shipping Icon Free Shipping

    PRINT ON DEMAND: 2-4 WEEKS. THIS ITEM CANNOT BE CANCELLED OR RETURNED.

Supplemental Materials

What is included with this book?

Summary

Starts with the basics of Red Hat, the leading Linux distribution in the U.S., such as network planning and Red Hat installation and configuration Offers a close look at the new Red Hat Enterprise Linux 4 and Fedora Core 4 releases New chapters cover configuring a database server, creating a VNC server, monitoring performance, providing Web services, exploring SELinux security basics, and exploring desktops Demonstrates how to maximize the use of Red Hat Network, upgrade and customize the kernel, install and upgrade software packages, and back up and restore the file system The four CDs contain the full Fedora Core 4 distribution

Author Biography

Terry Collings is the owner of TAC Technology, located in eastern Pennsylvania. He provides Linux consulting and training services to a variety of clients. Terry has been an adjunct faculty member at several colleges in his area where he has taught A+ and Network + certification courses. He also has taught courses on Unix, Linux, TCP/IP, and Novell Netware.
Terry is the author of Red Hat Enterprise Linux 4 For Dummies and has co-authored and contributed to several other Linux books. He has been a technical editor for the following books: KDE Bible, The Samba Book, Unix Weekend Crash Course, Red Hat Linux 9 For Dummies, Solaris 9 For Dummies, Fedora Linux 2 For Dummies, and Linux Timesaving Techniques For Dummies.

Kurt Wall first touched a computer in 1980 when he learned FORTRAN on an IBM mainframe of forgotten vintage; things have improved since then. A professional technical writer by trade, a historian by training, and an all-around Linux guy by avocation, Kurt’s work history is diverse. These days, Kurt works in the Customer Engineering group at TimeSys Corporation in Pittsburgh, Pennsylvania. His primary responsibilities include building and maintaining TimeSys’s Developer Exchange and working with portal customers and users. He also fixes broken servers, writes documentation, and builds TimeSys software.
Kurt, who dislikes writing about himself in the third person, receives entirely too much e-mail at kwall@kurtwerks.com.

Table of Contents

Preface ix
Acknowledgments xv
Part One System and Network Administration Defined
1(202)
Duties of the System Administrator
3(10)
The Linux System Administrator
3(2)
Installing and Configuring Servers
5(1)
Installing and Configuring Application Software
6(1)
Creating and Maintaining User Accounts
7(1)
Backing Up and Restoring Files
7(2)
Monitoring and Tuning Performance
9(1)
Configuring a Secure System
10(2)
Using Tools to Monitor Security
12(1)
Summary
12(1)
Planning the Network
13(16)
Deciding How Your Network Will Be Used
13(8)
Understanding Topologies
15(1)
Star Topology
15(1)
Bus Topology
16(1)
Ring Topology
16(1)
Tree Topology
17(1)
Client-Server or Peer-to-Peer?
18(1)
What's in the Mix?
19(1)
Determining System Requirements
20(1)
Planning and Implementing Security
21(2)
Addressing External and Internal Threats
21(1)
Formulating a Security Policy
22(1)
An Effective Password Policy
22(1)
General Security Rules
22(1)
Security Updates
23(1)
An Appropriate Firewall System
23(1)
Planning for Recovery from Disasters
23(3)
Clustering Solutions
24(1)
Disaster Recovery
25(1)
Writing It Down: Good Records Can Save Your Job
26(2)
Summary
28(1)
Standard Installation
29(42)
Exploring Your PC's Components
30(4)
Processor
30(1)
Bus
30(1)
Memory
31(1)
Video Card and Monitor
31(1)
Hard Drive
32(1)
Floppy Disk Drive
32(1)
Keyboard and Mouse
33(1)
SCSI Controller
33(1)
CD/DVD-R/RW Drive
33(1)
Sound Card
33(1)
Network Card
34(1)
Checking for Supported Hardware
34(1)
Creating the Red Hat Boot Disk
35(1)
Starting the Installation
36(6)
Partitioning the Hard Disk
42(3)
Using Disk Druid to Partition Your Disks
45(6)
Naming Disks and Devices
45(1)
Mounting a File System
46(1)
Understanding the Swap Partition
47(1)
Preparing Disk Partitions
47(2)
Setting Up the Partitions
49(2)
Configuring the Installation
51(11)
Installing the Boot Loader
51(3)
Configuring the Network
54(2)
Configuring the Firewall
56(2)
Choosing Additional Languages
58(1)
Setting the Time Zone
59(2)
Setting the Root Password
61(1)
Selecting the Package Groups to Install
62(3)
Running Firstboot
65(5)
Summary
70(1)
Kickstart Installation
71(26)
Using the Kickstart Configurator
71(1)
Installing the Kickstart Configurator
72(21)
Boot Loader Options Screen
77(1)
Partition Information Screen
78(5)
Network Configuration
83(1)
Authentication
84(2)
Firewall Configuration
86(1)
Display Configuration
87(3)
Package Selection
90(1)
Pre-Installation Script
91(1)
Post-Installation Script
92(1)
Starting the Kickstart Installation
93(3)
Creating a Bootable Floppy
93(1)
Creating a Bootable CD-ROM
94(1)
Starting a Kickstart Installation
95(1)
Summary
96(1)
Exploring the Desktops
97(30)
Examining the Graphical Login Screen
97(2)
Logging In and Using the GNOME Desktop
99(11)
Playing with the Panel
101(1)
Managing Applets on the Panel
102(1)
Choosing Items from the Applications Menu in Fedora Core
103(2)
Choosing Items from the Places Menu in Fedora Core
105(1)
Choosing Items from the Desktop Menu in Fedora Core
106(1)
Choosing Items from the Applications Menu on Enterprise Linux
107(2)
Choosing Actions from the Actions Menu in Enterprise Linux
109(1)
Using the Nautilus File Manager
110(8)
Displaying Your Home Folder
112(1)
Displaying the Contents of a Folder
112(1)
Opening Files
112(1)
Accessing FTP Sites
113(1)
Using Bookmarks
113(1)
Adding a Bookmark
113(1)
Editing Bookmarks
113(1)
Deleting Bookmarks
114(1)
Managing Your Files and Folders
114(1)
Customizing the Nautilus File Manager
115(1)
Editing File Manager Preferences
115(2)
Changing the File Manager Background and Icon Emblems
117(1)
Showing and Hiding Views
118(1)
Configuring GNOME
118(1)
Logging Out
119(1)
Taking a Look at KDE
119(5)
Managing Applets
121(1)
Choosing Applications from the Applications Menu
122(2)
Using the Konqueror File Manager
124(2)
Logging Out of KDE
126(1)
Summary
126(1)
System Startup and Shutdown
127(14)
Examining the Boot Process
128(8)
The Boot Loader
128(2)
Using GRUB during Boot
130(2)
The Kernel
132(1)
The/sbin/init Program
133(3)
Exploring Runlevels
136(1)
Changing the System Runlevel
136(1)
Starting Programs at System Boot
137(1)
Shutting Down the System
138(1)
GRUB Configuration File
139(1)
Summary
140(1)
The File System Explained
141(22)
Understanding the File System Structure
141(3)
The/Directory
143(1)
Working with Linux-Supported File Systems
144(5)
ext3
145(1)
ext2
146(1)
reiserfs
146(1)
SystemV
147(1)
ufs
147(1)
FAT
147(1)
NTFS
147(1)
IBM JFS
147(1)
SGI XFS
148(1)
Nonstandard Linux File Systems
148(1)
FREEVxFS
148(1)
GFS
148(1)
Memory and Virtual File Systems
149(6)
cramfs
149(1)
tmpfs
149(1)
ramfs
150(1)
romfs
150(1)
proc
150(1)
Proc Software Information
150(2)
Proc Hardware Information
152(2)
/dev/pts
154(1)
devfs
154(1)
sysfs
155(1)
Linux Disk Management
155(6)
Disk Partitioning on an x86 Machine
155(1)
Mounting Other OS Partitions/Slices
155(1)
Metadevices
156(1)
Logical Volumes
156(4)
RAID
160(1)
Summary
161(2)
Examining the System Configuration Files
163(40)
Examining the System Configuration Files
164(11)
Systemwide Shell Configuration Scripts
164(1)
Shell Config Scripts: bashrc, csh.cshrc, zshrc
165(2)
bash, tcsh, zsh, and Their Config File Read Orders
167(1)
System Environmental Settings
168(1)
/etc/motd
168(1)
issue
168(1)
issue.net
168(1)
aliases
169(1)
fstab
169(1)
grub.conf
170(1)
cron files
171(1)
syslog.conf
172(2)
ld.so.conf
174(1)
logrotate.conf
174(1)
Examining the /etc/sysconfig/Directory
175(13)
/etc/sysconfig/apmd
176(1)
/etc/sysconfig/authconfig
177(1)
/etc/sysconfig/clock
177(1)
/etc/sysconfig/crond
178(1)
/etc/sysconfig/desktop
178(1)
/etc/sysconfig/firstboot
178(1)
/etc/sysconfig/grub
178(1)
/etc/sysconfig/harddisks
178(1)
/etc/sysconfig/hwconf
179(1)
/etc/sysconfig/i18n
179(1)
/etc/sysconfig/init
179(1)
/etc/sysconfig/iptables
180(1)
/etc/sysconfig/irda
181(1)
/etc/sysconfig/kernel
181(1)
/etc/sysconfig/keyboard
181(1)
/etc/sysconfig/kudzu
182(1)
/etc/sysconfig/mouse
182(1)
/etc/sysconfig/named
183(1)
/etc/sysconfig/netdump
183(1)
/etc/sysconfig/network
184(1)
/etc/sysconfig/ntpd
184(1)
/etc/sysconfig/pcmcia
184(1)
/etc/sysconfig/selinux
185(1)
/etc/sysconfig/system-config-users
185(1)
/etc/sysconfig/system-logviewer
185(1)
/etc/sysconfig/samba
186(1)
/etc/sysconfig/sendmail
186(1)
/etc/sysconfig/vncservers
186(1)
/etc/sysconfig/xinetd
187(1)
Directories in the /etc/sysconfig/ Directory
187(1)
apm-scripts
187(1)
daemons
187(1)
networking
187(1)
network-scripts
188(1)
rhn
188(1)
Examining the Network Configuration Files
188(8)
Files to Change When Setting Up a System or Moving the System
188(1)
Setting Up the IP Address
189(1)
Setting Up the Hostname
190(1)
Setting Up the DNS Name Resolution
190(1)
Making a Local File of Hostname to IP Address Mappings
191(1)
Setting Up Name Service Resolution Order
192(1)
Starting Up Network Services from xinetd
193(1)
Starting Up Network Services from the rc Scripts
194(1)
Other Important Network Configuration Files in the /etc/sysconfig Directory
195(1)
static-routes
195(1)
Iptables
195(1)
Network Configuration Files in /etc/sysconfig/network-scripts
196(1)
ifcfg-networkinterfacename
196(1)
ifup and ifdown
196(1)
Managing the init Scripts
196(6)
Managing rc Scripts by Hand
198(2)
Managing rc Scripts Using chkconfig
200(2)
Summary
202(1)
Part Two Network Services
203(224)
Managing the X Window System
205(12)
Configuring the X Server with the X Configuration Tool
205(5)
Changing the Display Resolution
206(1)
Changing the Display Color Depth
207(1)
Changing Monitor Type Settings
207(1)
Changing Your Video Card Type
208(1)
Configuring Dual Monitors
209(1)
Manually Configuring Your X Server
210(5)
The X Server Configuration File
210(5)
Summary
215(2)
Configuring Printers
217(12)
Configuring Printers with the Printer Configuration Tool
217(8)
Configuring the Print Queue
219(5)
Selecting the Print Driver
224(1)
Editing the Printer Configuration
225(2)
Deleting a Printer
227(1)
Setting the Default Printer
227(1)
Managing Print Jobs
227(1)
Summary
228(1)
TCP/IP Networking
229(36)
TCP/IP Explained
229(2)
Understanding Network Classes
231(2)
Setting Up a Network Interface Card (NIC)
233(5)
Configuring the Network Card
234(1)
Configuring an Internal Network
235(3)
Understanding Subnetting
238(8)
Interpreting IP Numbers
240(1)
Before You Subnet Your Network
241(3)
Classless InterDomain Routing
244(2)
Working with Gateways and Routers
246(1)
Configuring Dynamic Host Configuration Protocol
247(3)
Setting Up the Server
248(2)
Configuring the DHCP Client
250(1)
Configuring the Network Using the Network Configuration Tool
250(9)
Adding an Ethernet Device
251(3)
Adding a Wireless NIC
254(2)
Adding a Modem Connection
256(3)
Editing Your Network Configuration
259(4)
Removing a NIC
259(1)
Changing the NIC Configuration
260(1)
Managing DNS Settings
261(1)
Managing Hosts
261(1)
Working with Profiles
262(1)
Configuring IP Masquerading
263(1)
Summary
263(2)
The Network File System
265(44)
NFS Overview
265(6)
Understanding NFS
266(2)
What's New with NFSv4?
268(1)
NFS Advantages and Disadvantages
269(2)
Planning an NFS Installation
271(2)
Configuring an NFS Server
273(23)
NFS Server Configuration and Status Files
274(9)
NFS Server Daemons
283(2)
NFS Server Scripts and Commands
285(5)
Using Secure NFS
290(1)
Example NFS Server
290(2)
Using the NFS Server Configuration Tool
292(4)
Configuring an NFS Client
296(5)
Configuring an NFSv4 Client
299(1)
Example NFS Client
300(1)
Using Automount Services
301(4)
Examining NFS Security
305(3)
General NFS Security Issues
305(1)
Server Security Considerations
306(1)
Client Security Considerations
307(1)
Summary
308(1)
The Network Information System
309(30)
Understanding NIS
309(2)
Planning an NIS Installation
311(4)
Configuring an NIS Server
315(11)
Key Files and Commands
315(6)
Starting the NIS Password Daemon
321(1)
Starting the Server Transfer Daemon
321(1)
Starting the NIS Servers at Boot Time
322(2)
Configuring an Example NIS Server
324(2)
Configuring an NIS Client
326(8)
Setting the NIS Domain Name
326(1)
Configuring and Starting the Client Daemon
326(5)
Configuring the Client Startup Files
331(1)
NIS Client Commands
331(2)
Configuring an Example NIS Client
333(1)
Using NIS and NFS Together
334(3)
Summary
337(2)
Connecting to Microsoft and Novell Networks
339(12)
Installing Samba
340(1)
Configuring the Samba Server
341(3)
[global]
342(1)
[homes]
343(1)
[printers]
344(1)
Creating Samba Users
344(1)
Starting the Samba Server
345(1)
Connecting to a Samba Client
345(2)
Connecting from a Windows PC to the Samba Server
347(1)
Connecting to Novell Networks
348(2)
Summary
350(1)
Configuring a Database Server
351(30)
Linux Database Servers
351(2)
Using MySQL
353(9)
Securing the MySQL Installation
355(4)
Using the MySQL Client Programs
359(3)
Using PostgreSQL
362(17)
Verifying the PostgreSQL Installation
365(1)
Finalizing the PostgreSQL Installation
366(1)
Initializing the Installation
366(2)
Modifying Access Privileges
368(4)
Creating a Test Database
372(2)
Testing Connectivity to the Test Database
374(1)
Using the PostgreSQL Client Programs
375(4)
Summary
379(2)
Creating a VNC Server
381(12)
What Is VNC?
381(2)
Setting Up a VNC Server
383(5)
Configuring Your Firewall for VNC
384(2)
Customizing the VNC Server
386(2)
Testing the VNC
388(4)
Summary
392(1)
Providing Additional Network Services
393(22)
Configuring a Time Server
394(12)
Selecting a Time Server Solution
395(1)
Configuring the Time Server
396(1)
Selecting Reference Clocks
397(4)
Configuring an NTP Client
401(4)
Playing Nicely and Wisely with NTP
405(1)
Providing a Caching Proxy Server
406(8)
Verifying the Kernel Configuration
408(1)
Configuring Squid
409(2)
Modifying Netfilter
411(1)
Starting Squid
412(1)
Testing the Configuration
412(2)
Summary
414(1)
Optimizing Network Services
415(12)
Optimizing the X Window System
416(2)
Optimizing NFS
418(5)
Optimizing NIS
423(1)
Optimizing Samba Networking
423(1)
Getting More from a Database Server
424(1)
Summary
425(2)
Part Three Internet Services
427(168)
What Are Internet Services?
429(14)
Learning about Secure Services
430(4)
SSH
430(1)
scp
431(2)
sftp
433(1)
Less Secure Services
434(2)
Telnet
434(1)
FTP
434(1)
rsync
435(1)
rsh
435(1)
rlogin
435(1)
finger
435(1)
talk and ntalk
435(1)
Using Your Linux Machine as a Server
436(1)
HTTP
436(1)
sshd
436(1)
ftpd
436(1)
DNS
437(1)
Configuring the xinetd Server
437(2)
Comparing xinetd and Standalone
439(2)
xinetd-Started Services
439(1)
Standalone Services
440(1)
Configuring Linux Firewall Packages
441(1)
Summary
441(2)
Configuring BIND: The Domain Name System
443(24)
Understanding DNS
443(3)
Installing the Software
446(1)
Understanding Types of Domain Servers
447(2)
Examining Server Configuration Files
449(12)
The named.conf file
450(1)
Options
451(3)
Include
454(1)
Acl
455(1)
Logging
455(2)
server
457(1)
zones
457(1)
Zone Files
458(1)
SOA --- Start of Authority
459(1)
The Reverse Zone File
460(1)
Configuring a Caching DNS Server
461(1)
Configuring a Secondary Master DNS Server
462(1)
Configuring a Primary Master Server
462(2)
Checking Your Configuration
464(2)
The Host Program
464(1)
The dig Program
465(1)
Summary
466(1)
Configuring Mail Services
467(24)
Email Explained
467(3)
Tracing the Email Delivery Process
468(1)
Mail User Agent (MUA)
468(1)
Mail Transfer Agent (MTA)
469(1)
Mail Delivery Agent (MDA)
469(1)
Introducing SMTP
470(2)
Understanding POP3
471(1)
Understanding IMAP4
471(1)
Configuring Sendmail
472(7)
Configuring Sendmail
474(1)
The m4 Macro Processor
475(1)
Understanding and Managing the Mail Queue
476(1)
Setting Up Aliases to Make Life Easier
476(2)
Using Other Sendmail Files and Commands
478(1)
Using the Postfix Mail Server
479(5)
Switching to Postfix
479(1)
Configuring Postfix
480(2)
Running Postfix behind a Firewall or Gateway
482(1)
Running Postfix on a Mail Host
483(1)
Serving Email with POP3 and IMAP
484(2)
Setting up an IMAP Server
485(1)
Configuring Dovecot
485(1)
Testing Cyrus
486(1)
Maintaining Email Security
486(3)
Protecting against Eavesdropping
487(1)
Using Encryption
487(1)
Using a Firewall
487(1)
Don't Get Bombed, Spammed, or Spoofed
488(1)
Be Careful with SMTP
488(1)
Summary
489(2)
Configuring FTP Services
491(20)
Introducing vsftpd
492(1)
Configuring vsftpd
493(9)
Configuring User Level FTP Access
496(1)
Configuring vsftpd Features
497(4)
Disabling Anonymous FTP
501(1)
Advanced FTP Server Configuration
502(7)
Running vsftpd from xinetd
502(1)
Enabling Anonymous Uploads
503(1)
Enabling Guest User FTP Accounts
504(3)
Running vsftpd over SSL
507(2)
Using SFTP
509(1)
Summary
510(1)
Configuring a Web Server
511(44)
Introducing Apache
511(8)
Apache Features
512(4)
Changes in Apache 2
516(1)
How Web Servers Work
517(2)
Configuring Apache
519(21)
Apache's Startup Process
520(1)
Configuring Global Behavior
521(3)
Configuring the Default Server
524(13)
Configuring Virtual Servers
537(2)
Starting and Stopping Apache
539(1)
Implementing SSI
540(3)
Enabling CGI
543(2)
Enabling PHP
545(1)
Creating a Secure Server with SSL
546(8)
Understanding SSL and Server Certificates
547(2)
Creating a Self-Signed Certificate
549(5)
Obtaining a Certificate from a Certification Authority
554(1)
Summary
554(1)
Providing Web Services
555(26)
Creating Mailing Lists
555(8)
Completing the Initial Mailman Configuration
556(3)
Creating a Mailing List
559(1)
Modifying a Mailing List's Configuration
560(1)
Performing Common Mailman Administrative Tasks
561(1)
Adding Multiple List Members
562(1)
Hiding a Mailing List
562(1)
Restricting Archives Access
563(1)
Setting Up Web-Based Email
563(4)
Connecting to SquirrelMail
563(2)
Reconfiguring SquirrelMail
565(2)
Configuring an RSS Feed
567(7)
Selecting Content for an RSS Feed
570(1)
Creating the Feed File
570(2)
Turning on an RSS Feed
572(2)
Adding Search Functionality
574(5)
Getting Started with ht://Dig
574(5)
Summary
579(2)
Optimizing Internet Services
581(14)
Optimizing LDAP Services
582(1)
Optimizing DNS Services
583(4)
Improving the Performance of DNS Clients
583(2)
Tweaking DNS Servers
585(1)
Logging
586(1)
Optimizing Mail Services
587(3)
Getting More from Sendmail
587(1)
Getting More from Postfix
588(2)
Optimizing FTP Services
590(1)
Optimizing Web Services
590(3)
Summary
593(2)
Part Four System Administration
595(238)
Keeping Your System Updated with up2date and the Red Hat Network
597(18)
Using the Red Hat up2date Agent
598(7)
Configuring the up2date Agent
599(3)
Updating Your System
602(3)
Registering Your System
605(3)
Accessing the Red Hat Network with a Web Browser
608(6)
Summary
614(1)
Upgrading and Customizing the Kernel
615(58)
Determining Whether to Upgrade to a New Kernel
616(2)
Upgrading versus Customizing
618(1)
Preparing to Upgrade
618(1)
Installing a Kernel RPM
619(1)
Getting the Kernel Source
620(9)
Using the Kernel Source RPM
621(2)
Using Pristine Kernel Source
623(3)
Verifying and Unpacking the Archive
626(1)
Patching the Kernel
627(2)
Configuring the Kernel
629(8)
Selecting a Kernel Configuration File
630(3)
Configuring the Kernel with xconfig
633(1)
Configuring the Kernel with menuconfig
634(3)
Reviewing the Configuration Options
637(23)
Code Maturity Level Options
637(1)
General Setup
637(3)
Loadable Module Support
640(1)
Processor Type and Features
640(3)
Power Management Options
643(1)
Bus Options
643(1)
Executable File Formats
644(1)
Device Drivers
645(1)
Generic Driver Options
645(1)
Memory Technology Devices
645(1)
Parallel Port Support
645(1)
Plug and Play Support
646(1)
Block Devices
646(1)
ATA/ATAPI/MFM/RLL Support
647(1)
SCSI Device Support
648(1)
Old CD-ROM Drivers
648(1)
Multidevice Support
649(1)
Fusion MPT Device Support
649(1)
IEEE 1394/FireWire Support
649(1)
I2O Device Support
649(1)
Networking Support
649(4)
ISDN and Telephony
653(1)
Input Device Support
653(1)
Character Devices
654(1)
I2C Support
654(1)
Multimedia Devices
655(1)
Graphics Support
655(1)
Sound
656(1)
USB Support
656(4)
MMC/SD Card Support
660(1)
InfiniBand Support
660(1)
File Systems
660(6)
CD-ROM/DVD File Systems
661(1)
DOS/FAT/NT File Systems
661(1)
Pseudo-File-Systems
662(1)
Miscellaneous File Systems
662(1)
Network File Systems
662(1)
Partition Types
662(1)
Native Language Support
663(1)
Profiling Support
663(1)
Kernel Hacking
664(1)
Security Options
664(1)
Cryptography Options
664(1)
Library Routines
665(1)
Saving the Kernel Configuration
665(1)
Compiling the Kernel
666(3)
Installing the Kernel
669(1)
Updating GRUB
670(1)
Summary
671(2)
Configuring the System at the Command Line
673(34)
Administrating Your System from the Command Line
673(2)
Managing Processes
675(8)
Obtaining Process Information
676(4)
Signaling Processes
680(2)
Modifying Process Priorities
682(1)
Maintaining the File System
683(13)
Working with File Systems
683(1)
Creating and Manipulating Partitions
683(2)
Creating and Manipulating File Systems
685(6)
Working with Files and Directories
691(4)
Managing Disk Space Usage
695(1)
Timekeeping
696(6)
Single-Use Commands
697(5)
Using the Network Time Protocol
702(1)
Automating Scripts
702(3)
Running One-Shot Jobs with at
702(2)
Running Regularly Scheduled Jobs with cron
704(1)
Summary
705(2)
Administering Users and Groups
707(38)
Administering User Accounts
707(23)
Working with User Accounts
708(1)
The User Database Files
708(7)
Modifying Multiple Accounts Simultaneously
715(2)
Viewing Login and Process Information
717(1)
Working with Group Accounts
718(1)
Creating Groups
719(1)
Modifying and Deleting Groups
720(2)
Using a Shadowed Group File
722(1)
Using User Private Groups
723(2)
Administering Users and Groups with User Manager
725(1)
Creating User Accounts
726(1)
Modifying and Deleting User Accounts
727(1)
Creating Group Accounts
728(1)
Modifying and Deleting Group Accounts
729(1)
Understanding the Root Account
730(1)
Implementing Sudo
731(6)
Deciphering Sudo's Configuration File
733(4)
Sudo Configuration and Usage Tips
737(1)
Using File System Quotas
737(7)
Enabling Quotas
738(1)
Creating the Quota Files
739(1)
Turning on Quotas
740(1)
Setting and Modifying Quotas
740(2)
Viewing Quota Utilization
742(2)
Summary
744(1)
Installing and Upgrading Software Packages
745(34)
Using the Red Hat Package Manager
745(16)
General Options
746(2)
Query Mode
748(2)
Querying Package Dependencies
750(1)
What's in That RPM?
751(3)
Formatting Query Output
754(1)
Package Installation and Removal
755(1)
Installing RPMs
756(1)
Upgrading RPMs
757(1)
Removing RPMs
758(1)
Verifying RPMs
758(3)
Building Packages Using Source RPMs
761(3)
Checking Software Versions
764(3)
Obtaining Newer Software
767(4)
Using Third-Party Sites to Find RPMs
768(2)
Using Ibiblio.org
770(1)
Installing Software from Source
771(7)
Configuring the Build Environment
772(1)
Unpacking the Source Code
772(1)
Configuring the Source Code
773(2)
Building the Software Package
775(1)
Testing the Build
776(1)
Installing the Software
777(1)
Summary
778(1)
Backing Up and Restoring the File System
779(26)
Creating a Backup Plan
779(2)
Choosing Media for Backups
781(1)
Understanding Backup Methods
781(2)
Tape Rotation
783(1)
Using Backup Tools
784(20)
Command Line Tools
784(1)
Using mt-st
784(3)
Using the cdrecord Package
787(2)
Using dump
789(1)
Using restore
790(3)
Using tar
793(2)
Advanced Tools
795(1)
Using AMANDA
795(9)
Summary
804(1)
Performance Monitoring
805(28)
System-Performance-Monitoring Tools
805(1)
Measuring Memory Usage
806(6)
Memory Usage as Seen by Users and Processes
806(4)
Examining Kernel Memory Usage
810(2)
Viewing Running Tasks
812(10)
Getting Started with ps
813(4)
Using top
817(5)
Monitoring I/O Activity
822(4)
Using sar
826(5)
Monitoring Memory with sar
827(2)
Monitoring CPU Usage with sar
829(2)
Summary
831(2)
Part Five System Security and Problem Solving
833(72)
Exploring SELinux Security
835(12)
Understanding SELinux
835(3)
Mandatory and Role-Based Access Control
836(2)
SELinux Policies
838(1)
Using SELinux
838(7)
Enabling SELinux Manually
842(1)
Modifying the Targeted Policy
843(2)
Finding More Information about SELinux
845(1)
Summary
846(1)
Implementing Network Security
847(28)
Creating a Firewall
847(4)
Installing, Configuring, and Using LDAP
851(13)
Overview of LDAP Directory Organization
852(3)
OpenLDAP Packages for Linux
855(1)
Core OpenLDAP Server Files, Daemons, and Utilities
856(1)
Configuring and Starting an OpenLDAP Server
857(3)
Using OpenLDAP for System Authentication
860(1)
Adding User, Password, and Group Entries to an LDAP Server
860(1)
Updating Client Systems to Use LDAP Authentication
861(3)
Installing, Configuring, and Using Kerberos
864(10)
Kerberos Terminology, Machine Roles, and Reliability
865(1)
Kerberos Packages for Linux
865(1)
Core Kerberos Utilities
866(1)
Installing and Configuring a Kerberos Server
867(3)
Enabling Kerberos Clients and Applications
870(1)
Using Kerberos for Login Authentication
871(3)
Summary
874(1)
Troubleshooting and Problem Solving
875(30)
Troubleshooting Techniques
876(2)
Step 1: Identify the Problem
876(1)
Step 2: Reproduce the Problem
876(1)
Step 3: Look for Changes
877(1)
Step 4: Determine the Most Likely Cause
877(1)
Step 5: Implement a Solution
878(1)
Step 6: Keep Documentation
878(1)
Troubleshooting Resources
878(5)
The Internet
878(1)
System Log Files
879(3)
README Files
882(1)
Solving Common Problems
883(5)
Unable to Log In
883(1)
Resetting a User's Password
883(1)
Creating a User Account
883(1)
Lost or Forgotten Root Password
884(1)
CD-ROM Drive Not Detected during Installation
884(1)
CD-ROM Drive Does Not Mount after Installation
885(1)
Sound Does Not Work after Installation
885(2)
Unable to Unmount a Drive
887(1)
Shell Commands Don't Work
888(1)
Solving File System Problems
888(3)
Cannot Delete a File
889(1)
Commands with Multiword Arguments
889(1)
Accessing Windows File Systems
890(1)
Working with Floppy Disks
890(1)
Cannot Mount a Partition
891(1)
Avoiding File System Checks at Each System Reboot
891(1)
Solving Networking Problems
891(5)
Getting Online with a Modern
893(2)
The Boot Process Hangs
895(1)
Using Two Ethernet Cards
896(1)
Solving NFS Problems
896(2)
Exploring Miscellaneous Problems
898(6)
Solving Boot Problems
899(1)
ht:/ /Dig Won't Run
900(1)
Starting cyrus-imapd
900(1)
Solving Laptop Video Problems
901(1)
The Signal 7 and Signal 11 Problems
902(1)
Using Screensavers and Power Management
903(1)
Starting the X Window System
903(1)
Making an Emergency Boot Disk
904(1)
Summary
904(1)
Appendix A Bash Shell Scripting
905(38)
Using Wildcards and Special Characters
906(3)
Using Variables
909(4)
Using Bash Operators
913(6)
Comparison Operators
913(3)
Arithmetic Operators
916(1)
File Test Operators
917(2)
Understanding Flow Control
919(9)
Conditional Execution Using if Statements
920(2)
Determinate Loops Using the for Statement
922(1)
Indeterminate Loops Using while and until Statements
923(1)
Selection Structures Using case and select Statements
924(1)
The case Statement
925(1)
The select Statement
926(2)
Using Shell Functions
928(1)
Processing Input and Output
929(5)
Redirecting I/O
929(3)
String I/O
932(2)
Working with Command Line Arguments
934(2)
Using Processes and Job Control
936(5)
Summary
941(2)
Index 943

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program