Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 2: Linux Installation and Initial Configuration
Figure 2.1: The main window of the PartitionMagic program
Figure 2.2: The
Keyboard Configuration
dialog window
Figure 2.3: The file
Properties
window
Figure 2.4: The
Disk Setup
dialog window
Figure 2.5: The
Add Partition
dialog window
Figure 2.6: Configuring Linux boot loader
Figure 2.7: The
Set Root Password
dialog window
Figure 2.8: The
Package Group Selection
dialog window
Figure 2.9: The
About to Install
dialog window
Figure 2.10: The
Monitor Configuration
window
Figure 2.11: The first-boot
Welcome
dialog window
Figure 2.12: The
User Account
dialog window
Figure 2.13: The boot loader dialog window
Figure 2.14: The Linux booting process
Figure 2.15: The login window
Figure 2.16: The main window of the setup utility
Figure 2.17: The KDE desktop
Figure 2.18: The GNOME desktop
Chapter 3: Welcome to Linux!
Figure 3.1: The Midnight Commander program launched in the terminal window
Figure 3.2: Launching the Services utility from the Main Menu
Figure 3.3: The main window of the Services utility
Figure 3.4: A sample of the results produced by the top program
Figure 3.5: The main window of the KPPP program
Figure 3.6: The menuconfig utility
Figure 3.7: The gconf utility
Chapter 4: Access Control
Figure 4.1: A block diagram of a chroot file system
Figure 4.2: A network firewall
Figure 4.3: The Options tab
Figure 4.4: The Rules tab
Figure 4.5: The dialog window for adding new rules
Figure 4.6: Location of the public and closed service servers
Figure 4.7: Doubled network protection
Figure 4.8: Protecting two networks with one firewall
Figure 4.9: Replacing the IP address
Chapter 5: Administration
Figure 5.1: The netconfig window
Figure 5.2: The common-bus network topology
Figure 5.3: The star network topology
Figure 5.4: Channel encryption
Figure 5.5: A secure connection indication in Internet Explorer
Figure 5.6: An Internet page's properties
Figure 5.7: Connecting to the Internet via a Web server
Chapter 7: Web Server
Figure 7.1: The main window of the Apache graphical configuration utility
Figure 7.2: The user authentication window
Figure 7.3: Intercepting traffic
Chapter 8: Electronic Mail
Figure 8.1: The main window of the KMail program
Figure 8.2: The network configuration window
Figure 8.3: The SMTP server configuration window
Figure 8.4: The Local mailbox configuration window
Chapter 9: Gateway to Internet
Figure 9.1: Accessing the Internet via a proxy server
Figure 9.2: Configuring a proxy server in Mozilla
Figure 9.3: Configuring Mozilla cache
Chapter 10: File Transfer
Figure 10.1: The main window of CyD FTP Client XP
Figure 10.2: A text file transmitted in the binary mode
Figure 10.3: A text file transmitted in the ASCII mode
Figure 10.4: The main window of the kwuftpd utility
Chapter 11: Network Addressing
Figure 11.1: The domain namespace hierarchy
Figure 11.2: DNS control windows
Chapter 12: System Monitoring
Figure 12.1: A screenshot of the /var/log/messages file contents
Chapter 13: Backing Up and Restoring Data
Figure 13.1: The iDisk site
Chapter 14: Advice from a Hacker
Figure 14.1: The OSI model
Figure 14.2: A network with two routers
Figure 14.3: An example of an attack notification email
Figure 14.4: Honey-pot network construction
Previous page
Table of content
Next page
Hacker Linux Uncovered
ISBN: 1931769508
EAN: 2147483647
Year: 2004
Pages: 141
Authors:
Michael Flenov
BUY ON AMAZON
Agile Project Management: Creating Innovative Products (2nd Edition)
Thriving in a Chaordic World
Champion Technical Excellence
Individual Performance
Self-Organization Extensions
The Commitment-Accountability Protocol
Image Processing with LabVIEW and IMAQ Vision
NI Vision Builder for Automated Inspection
Digital Imaging and Communication in Medicine (DICOM)
Spatial Image Filtering
Quantitative Analysis
Image Focus Quality
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
Text Controls
Menus, Toolbars, Cool, Bars, and Actions
JFace Windows and Dialogs
Eclipse Forms
Programming OLE in Windows
Systematic Software Testing (Artech House Computer Library)
An Overview of the Testing Process
Analysis and Design
The Test Manager
Some Final Thoughts…
Appendix E Simplified Unit Test Plan
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Additional information
Case #1 background: RailCo Ltd.
Orchestration
Anatomy of a service-oriented architecture
Considerations for choosing service layers
802.11 Wireless Networks: The Definitive Guide, Second Edition
The Temporal Key Integrity Protocol (TKIP)
Contention-Free Service with the PCF
11a and 802.11j: 5-GHz OFDM PHY
OFDM as Applied by 802.11a
11 on the Macintosh
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies