Flylib.com
Linux in a Windows World
Linux in a Windows World
ISBN: 0596007582
EAN: 2147483647
Year: 2005
Pages: 152
Authors:
Roderick W Smith Ph.D.
BUY ON AMAZON
Linux in a Windows World
Table of Contents
Copyright
Dedication
Preface
Audience
Contents of This Book
Conventions Used in This Book
Using Code Examples
Comments and Questions
Safari Enabled
Acknowledgments
Part I: Linux s Place in a Windows Network
Chapter 1. Linux s Features
Section 1.1. Where Linux Fits in a Network
Section 1.2. Linux as a Server
Section 1.3. Linux on the Desktop
Section 1.4. Comparing Linux and Windows Features
Section 1.5. Summary
Chapter 2. Linux Deployment Strategies
Section 2.1. Linux Server Options
Section 2.2. Linux Desktop Migration
Section 2.3. Linux and Thin Clients
Section 2.4. Summary
Part II: Sharing Files and Printers
Chapter 3. Basic Samba Configuration
Section 3.1. Installing Samba
Section 3.2. The Samba Configuration File Format
Section 3.3. Identifying the Server
Section 3.4. Setting Master Browser Options
Section 3.5. Setting Password Options
Section 3.6. Summary
Chapter 4. File and Printer Shares
Section 4.1. Common File Share Options
Section 4.2. Printing with CUPS
Section 4.3. Creating a Printer Share
Section 4.4. Delivering Printer Drivers to Windows Clients
Section 4.5. Example Shares
Section 4.6. Summary
Chapter 5. Managing a NetBIOS Network with Samba
Section 5.1. Enabling Domain Controller Functions
Section 5.2. Enabling NBNS Functions
Section 5.3. Assuming Master Browser Duties
Section 5.4. Summary
Chapter 6. Linux as an SMBCIFS Client
Section 6.1. Using NetBIOS Name Resolution
Section 6.2. Accessing File Shares
Section 6.3. Printing to Printer Shares
Section 6.4. Configuring GUI Workgroup Browsers
Section 6.5. Summary
Part III: Centralized Authentication Tools
Chapter 7. Using NT Domains for Linux Authentication
Section 7.1. The Principles Behind Winbind
Section 7.2. Samba Winbind Configuration
Section 7.3. PAM and NSS Winbind Options
Section 7.4. Winbind in Action
Section 7.5. Summary
Chapter 8. Using LDAP
Section 8.1. The Principles Behind LDAP
Section 8.2. Configuring an OpenLDAP Server
Section 8.3. Creating a User Directory
Section 8.4. Configuring Linux to Use LDAP for Login Authentication
Section 8.5. Configuring Windows to Use LDAPfor Login Authentication
Section 8.6. Summary
Chapter 9. Kerberos Configuration and Use
Section 9.1. Kerberos Fundamentals
Section 9.2. Linux Kerberos Server Configuration
Section 9.3. Kerberos Application Server Configuration
Section 9.4. Linux Kerberos Client Configuration
Section 9.5. Windows Kerberos Tools
Section 9.6. Summary
Part IV: Remote Login Tools
Chapter 10. Remote Text-Mode Administration and Use
Section 10.1. What Can Text-Mode Logins Do?
Section 10.2. SSH Server Configuration
Section 10.3. Telnet Server Configuration
Section 10.4. Windows Remote-Login Tools
Section 10.5. Summary
Chapter 11. Running GUI Programs Remotely
Section 11.1. What Can GUI Logins Do?
Section 11.2. Using Remote X Access
Section 11.3. Encrypting X by SSH Tunneling
Section 11.4. VNC Configuration and Use
Section 11.5. Running Windows Programs from Linux
Section 11.6. Summary
Chapter 12. Linux Thin Client Configurations
Section 12.1. The Role of Thin Client Computing
Section 12.2. Hardware Requirements
Section 12.3. Linux as a Server for Thin Clients
Section 12.4. Linux as a Thin Client
Section 12.5. Summary
Part V: Additional Server Programs
Chapter 13. Configuring Mail Servers
Section 13.1. Linux Mail Server Options
Section 13.2. Configuring Sendmail
Section 13.3. Configuring Postfix
Section 13.4. Configuring POP and IMAP Servers
Section 13.5. Scanning for Spam, Worms, and Viruses
Section 13.6. Supplementing a Microsoft Exchange Server
Section 13.7. Using Fetchmail
Section 13.8. Summary
Chapter 14. Network Backups
Section 14.1. Backup Strategies
Section 14.2. Backing Up the Linux System
Section 14.3. Backing Up with Samba
Section 14.4. Backing Up with AMANDA
Section 14.5. Summary
Chapter 15. Managing a Network with Linux
Section 15.1. Delivering IP Addresses with DHCP
Section 15.2. Delivering Names with DNS
Section 15.3. Keeping Clocks Synchronized with NTP
Section 15.4. Summary
Part VI: Appendixes
Appendix A. Configuring PAM
Section A.1. PAM Principles
Section A.2. The PAM Configuration File Format
Section A.3. PAM Modules
Section A.4. Sample PAM Configurations
Section A.5. Summary
Appendix B. Linux on the Desktop
Section B.1. Linux Desktop Applications for All Occasions
Section B.2. Configuring Applications and Environments
Section B.3. Running Windows Programs in Linux
Section B.4. File and Filesystem Compatibility
Section B.5. Font Handling
Section B.6. Summary
Colophon
Index
A
B
C
D
E
F
G
H
I
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Linux in a Windows World
ISBN: 0596007582
EAN: 2147483647
Year: 2005
Pages: 152
Authors:
Roderick W Smith Ph.D.
BUY ON AMAZON
Image Processing with LabVIEW and IMAQ Vision
Color Images
Image Distribution
Digital Imaging and Communication in Medicine (DICOM)
Frequency Filtering
Morphology Functions
101 Microsoft Visual Basic .NET Applications
Building Web Applications
Working with the .NET Framework
Advanced .NET Framework
COM Interop/PInvoke
Securing Applications
File System Forensic Analysis
Content Category
The Big Picture
UFS1 and UFS2 Concepts and Analysis
UFS2 Group Descriptor
Block and Fragment Bitmaps
Sap Bw: a Step By Step Guide for Bw 2.0
Summary
Entering the Master Data, Text, and Hierarchy Manually
Multi-Cubes
Summary
Summary
Extending and Embedding PHP
Memory
PHP5 Objects
Evolutionary Leaps
Cycles
Summary
Comparing, Designing, and Deploying VPNs
Deploying MPLS Layer 3 VPNs
Supporting IPv6 Traffic Transport in MPLS Layer 3 VPNs Using 6VPE
IPsec: A Security Architecture for IP
Summary
Comparing IPsec Remote Access VPNs with Other Types of Remote Access VPNs
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies