List of Figures

Chapter 2: Linux Installation and Initial Configuration

Figure 2.1: The main window of the PartitionMagic program
Figure 2.2: The Keyboard Configuration dialog window
Figure 2.3: The file Properties window
Figure 2.4: The Disk Setup dialog window
Figure 2.5: The Add Partition dialog window
Figure 2.6: Configuring Linux boot loader
Figure 2.7: The Set Root Password dialog window
Figure 2.8: The Package Group Selection dialog window
Figure 2.9: The About to Install dialog window
Figure 2.10: The Monitor Configuration window
Figure 2.11: The first-boot Welcome dialog window
Figure 2.12: The User Account dialog window
Figure 2.13: The boot loader dialog window
Figure 2.14: The Linux booting process
Figure 2.15: The login window
Figure 2.16: The main window of the setup utility
Figure 2.17: The KDE desktop
Figure 2.18: The GNOME desktop

Chapter 3: Welcome to Linux!

Figure 3.1: The Midnight Commander program launched in the terminal window
Figure 3.2: Launching the Services utility from the Main Menu
Figure 3.3: The main window of the Services utility
Figure 3.4: A sample of the results produced by the top program
Figure 3.5: The main window of the KPPP program
Figure 3.6: The menuconfig utility
Figure 3.7: The gconf utility

Chapter 4: Access Control

Figure 4.1: A block diagram of a chroot file system
Figure 4.2: A network firewall
Figure 4.3: The Options tab
Figure 4.4: The Rules tab
Figure 4.5: The dialog window for adding new rules
Figure 4.6: Location of the public and closed service servers
Figure 4.7: Doubled network protection
Figure 4.8: Protecting two networks with one firewall
Figure 4.9: Replacing the IP address

Chapter 5: Administration

Figure 5.1: The netconfig window
Figure 5.2: The common-bus network topology
Figure 5.3: The star network topology
Figure 5.4: Channel encryption
Figure 5.5: A secure connection indication in Internet Explorer
Figure 5.6: An Internet page's properties
Figure 5.7: Connecting to the Internet via a Web server

Chapter 7: Web Server

Figure 7.1: The main window of the Apache graphical configuration utility
Figure 7.2: The user authentication window
Figure 7.3: Intercepting traffic

Chapter 8: Electronic Mail

Figure 8.1: The main window of the KMail program
Figure 8.2: The network configuration window
Figure 8.3: The SMTP server configuration window
Figure 8.4: The Local mailbox configuration window

Chapter 9: Gateway to Internet

Figure 9.1: Accessing the Internet via a proxy server
Figure 9.2: Configuring a proxy server in Mozilla
Figure 9.3: Configuring Mozilla cache

Chapter 10: File Transfer

Figure 10.1: The main window of CyD FTP Client XP
Figure 10.2: A text file transmitted in the binary mode
Figure 10.3: A text file transmitted in the ASCII mode
Figure 10.4: The main window of the kwuftpd utility

Chapter 11: Network Addressing

Figure 11.1: The domain namespace hierarchy
Figure 11.2: DNS control windows

Chapter 12: System Monitoring

Figure 12.1: A screenshot of the /var/log/messages file contents

Chapter 13: Backing Up and Restoring Data

Figure 13.1: The iDisk site

Chapter 14: Advice from a Hacker

Figure 14.1: The OSI model
Figure 14.2: A network with two routers
Figure 14.3: An example of an attack notification email
Figure 14.4: Honey-pot network construction


Hacker Linux Uncovered
Hacker Linux Uncovered
ISBN: 1931769508
EAN: 2147483647
Year: 2004
Pages: 141

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net