Flylib.com
Real World Mac Maintenance and Backups
Real World Mac Maintenance and Backups
ISBN: 131855158
EAN: 2147483647
Year: 2004
Pages: 129
Authors:
Joe Kissell
BUY ON AMAZON
Linux Troubleshooting for System Administrators and Power Users
Table of Contents
Copyright
Hewlett-Packard Professional Books
Preface
Chapter 1. System Boot, Startup, and Shutdown Issues
Bootloaders
The init Process andetcinittab File
rc Scripts
Fixing Problems with the Root Filesystem
Summary
Endnotes
Chapter 2. System Hangs and Panics
OS Hangs
OS Panics
Hardware Machine Checks
Summary
Chapter 3. Performance Tools
top
sar
vmstat
iostat
free
Summary
Endnotes
Chapter 4. Performance
Start Troubleshooting at the Lowest Layer Possible
Filesystems
Summary
Chapter 5. Adding New Storage via SAN with Reference to PCMCIA and USB
Configuration
Kernel Module
Adding LUNs via PCI
Adding Storage via PCMCIAUSB
Summary
Chapter 6. Disk Partitions and Filesystems
Background
Partition TableMaster Boot Record: Location
Partition TableMaster Boot Record: CHS Addressing
Partition TableMaster Boot Record: LogicalExtended
Partition TableMaster Boot Record: Logical Block Addressing (LBA)
Partition TableMaster Boot Record: Bootloader
Partition TableMaster Boot Record: Backup
Further Scenarios
Summary
Chapter 7. Device Failure and Replacement
Supported Devices
Where to Look for Errors
Identifying Failed Devices
Replacement of a Failed Device
Summary
Chapter 8. Linux Processes: Structure, Hangs, and Core Dumps
Process Structure and Life Cycle
Linux Threads
Identifying Process Hangs
Process Cores
Summary
Chapter 9. BackupRecovery
Media
Backup Scope
Basic Backup and Recovery Commands
Bare Metal Recovery
I Have a Tape, and I Don t Know What It Is . . .
How Can I Tell Whether My Tape Problem Is Hardware or Software?
Summary
Chapter 10. cron and at
cron
anacron
at
Troubleshooting cron
Summary
Chapter 11. Printing and Printers
What Is a Spooler?
Printer Types
Connectivity Types
Page Description Languages
General Printing Troubleshooting
Summary
Chapter 12. System Security
What Is System Security?
Prevention
Summary
Chapter 13. Network Problems
An Introduction to the OSI and TCPIP Layers
Troubleshooting the Network Layers
Summary
Chapter 14. Login Problems
etcpasswd, etcshadow, and Password Aging
Login Failures Due to Linux Configuration
PAM
Shell Problems
Password Problems
Summary
Endnote
Chapter 15. X Windows Problems
X Background
X Components
X Display Manager
X Desktop Manager (Environment)
X Troubleshooting Scenarios
Summary
Endnotes
Index
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Real World Mac Maintenance and Backups
ISBN: 131855158
EAN: 2147483647
Year: 2004
Pages: 129
Authors:
Joe Kissell
BUY ON AMAZON
The .NET Developers Guide to Directory Services Programming
Advanced LDAP Searches
Chasing Referrals
Using Attribute Scope Query
Binary Data Conversion
Dealing with Attributes with Many Values
SQL Tips & Techniques (Miscellaneous)
Performing Multiple-table Queries and Creating SQL Data Views
Understanding Triggers
Working with Ms-sql Server Information Schema View
Exploiting MS-SQL Server Built-in Stored Procedures
Working with SQL Database Data Across the Internet
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Understanding Intrusion Detection
Unauthorized Activity II
Snort
Data Correlation
Incident Response
Professional Struts Applications: Building Web Sites with Struts ObjectRelational Bridge, Lucene, and Velocity (Experts Voice)
The Challenges of Web Application Development
Form Presentation and Validation with Struts
Managing Business Logic with Struts
Templates and Velocity
Building the JavaEdge Application with Ant and Anthill
802.11 Wireless Networks: The Definitive Guide, Second Edition
11 Nomenclature and Design
11g: The Extended-Rate PHY (ERP)
The AirPort Extreme Card
Power over Ethernet (PoE)
Improving Performance
MPLS Configuration on Cisco IOS Software
Outbound Route Filters
Command Reference
Implementing Layer 3 VPNs over L2TPv3 Tunnels
Modular QoS CLI: Configuration of QoS on Cisco Routers
Case Study 4: Implementing Layer 3 VPNs over Layer 2 VPN Topologies and Providing L2 VPN Redundancy
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies