Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 2: Linux Installation and Initial Configuration
Figure 2.1: The main window of the PartitionMagic program
Figure 2.2: The
Keyboard Configuration
dialog window
Figure 2.3: The file
Properties
window
Figure 2.4: The
Disk Setup
dialog window
Figure 2.5: The
Add Partition
dialog window
Figure 2.6: Configuring Linux boot loader
Figure 2.7: The
Set Root Password
dialog window
Figure 2.8: The
Package Group Selection
dialog window
Figure 2.9: The
About to Install
dialog window
Figure 2.10: The
Monitor Configuration
window
Figure 2.11: The first-boot
Welcome
dialog window
Figure 2.12: The
User Account
dialog window
Figure 2.13: The boot loader dialog window
Figure 2.14: The Linux booting process
Figure 2.15: The login window
Figure 2.16: The main window of the setup utility
Figure 2.17: The KDE desktop
Figure 2.18: The GNOME desktop
Chapter 3: Welcome to Linux!
Figure 3.1: The Midnight Commander program launched in the terminal window
Figure 3.2: Launching the Services utility from the Main Menu
Figure 3.3: The main window of the Services utility
Figure 3.4: A sample of the results produced by the top program
Figure 3.5: The main window of the KPPP program
Figure 3.6: The menuconfig utility
Figure 3.7: The gconf utility
Chapter 4: Access Control
Figure 4.1: A block diagram of a chroot file system
Figure 4.2: A network firewall
Figure 4.3: The Options tab
Figure 4.4: The Rules tab
Figure 4.5: The dialog window for adding new rules
Figure 4.6: Location of the public and closed service servers
Figure 4.7: Doubled network protection
Figure 4.8: Protecting two networks with one firewall
Figure 4.9: Replacing the IP address
Chapter 5: Administration
Figure 5.1: The netconfig window
Figure 5.2: The common-bus network topology
Figure 5.3: The star network topology
Figure 5.4: Channel encryption
Figure 5.5: A secure connection indication in Internet Explorer
Figure 5.6: An Internet page's properties
Figure 5.7: Connecting to the Internet via a Web server
Chapter 7: Web Server
Figure 7.1: The main window of the Apache graphical configuration utility
Figure 7.2: The user authentication window
Figure 7.3: Intercepting traffic
Chapter 8: Electronic Mail
Figure 8.1: The main window of the KMail program
Figure 8.2: The network configuration window
Figure 8.3: The SMTP server configuration window
Figure 8.4: The Local mailbox configuration window
Chapter 9: Gateway to Internet
Figure 9.1: Accessing the Internet via a proxy server
Figure 9.2: Configuring a proxy server in Mozilla
Figure 9.3: Configuring Mozilla cache
Chapter 10: File Transfer
Figure 10.1: The main window of CyD FTP Client XP
Figure 10.2: A text file transmitted in the binary mode
Figure 10.3: A text file transmitted in the ASCII mode
Figure 10.4: The main window of the kwuftpd utility
Chapter 11: Network Addressing
Figure 11.1: The domain namespace hierarchy
Figure 11.2: DNS control windows
Chapter 12: System Monitoring
Figure 12.1: A screenshot of the /var/log/messages file contents
Chapter 13: Backing Up and Restoring Data
Figure 13.1: The iDisk site
Chapter 14: Advice from a Hacker
Figure 14.1: The OSI model
Figure 14.2: A network with two routers
Figure 14.3: An example of an attack notification email
Figure 14.4: Honey-pot network construction
Previous page
Table of content
Next page
Hacker Linux Uncovered
ISBN: 1931769508
EAN: 2147483647
Year: 2004
Pages: 141
Authors:
Michael Flenov
BUY ON AMAZON
SQL Hacks
Hack 46. Store Images in a Database
Organizing Data
Hack 53. Clean Inconsistent Records
Hack 70. Combine Your Queries
Hack 88. Test Two Values from a Subquery
Java How to Program (6th Edition) (How to Program (Deitel))
Controlling Access to Members
Raw Types
Self-Review Exercises
Case Study: Guest Book
Summary
Visual C# 2005 How to Program (2nd Edition)
C#
Structured Programming Summary
Creating and Executing Threads
Self-Review Exercises
Exercises
Cisco CallManager Fundamentals (2nd Edition)
Call Routing
Architecture and Functionality of the Media Control Layer
Summary
Client Solutions
Appendix C. Protocol Details
Ruby Cookbook (Cookbooks (OReilly))
Changing the Permissions on a File
Writing an Inherited Class
Avoiding Boilerplate Code with Metaprogramming
Checking XML Well-Formedness
Navigating a Document with XPath
Programming .Net Windows Applications
Getting Started
Text
Creating a User Control
Managed Providers
Deployment
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies