Throughout the book, commands and code are shown in a
This is how code looks.
In the event that an example includes both input and output, the monospaced font is still used, but input is presented in bold type to distinguish the two. Here’s an example:
$ ftp ftp.handsonhistory.com
Name(home:jake): jake Password: ******
The following boxes are used to call your attention to points that are particularly important.
A Note box provides extra information to which you need to pay special attention.
A Tip box shows a special way of performing a particular task.
A Caution box alerts you to take special care when executing a procedure, or damage to your computer hardware or software could result.
A Cross-Reference box points you to further information on a subject that you can find outside the current chapter.
The book is organized into five
Part I consists of Chapters 1 through 4. Chapters 1 and 2 contain brief descriptions of the Linux technology and tell you what you need in order to get the operating system installed. Chapter 1 serves as an introduction to the Linux OS and to Fedora in particular. I also pay special attention to the division Red Hat, Inc., makes between the Fedora Project and Red Hat Enterprise Linux. Chapter 2 discusses what you need in order to install Fedora and how to make the decisions you’ll be faced with during installation. It includes procedures for installing from DVD, CD-ROM, hard disk, or network connection (NFS, FTP, or HTTP servers).
In Chapter 3, you learn about the GNOME desktop environment, the KDE desktop environment, and the X Window system. These GUIs provide graphical means of using Fedora. Chapter 4 describes ways of exploring and understanding Fedora, primarily from the Linux shell command interpreter. You learn how to use the bash shell, the vi text editor, and the commands for moving around the Linux file system.
Part II consists of Chapters 5 through 9, which include information for the average
Chapter 5 contains information on obtaining, installing, and running Linux applications. It also helps you run applications from other operating systems in Linux. Chapter 6 describes both old-time publishing tools and new, graphical word processors that are available with Fedora. Old tools include the troff and TeX text processing tools, whereas
Graphical and character-based games that run in Fedora are described in Chapter 7. This chapter also describes how to run commercial Windows games using Cedega, and commercial Linux
Part III consists of Chapters 10 through 14, which cover general setup and system maintenance tasks, including how to set up user accounts, automate system
In Chapter 12 you learn to create shell scripts and to use the cron facility to automate a variety of tasks on your Fedora system. Techniques for backing up your system and restoring files from backup are described in Chapter 13. Chapter 14 describes issues related to securing your computing assets in Fedora.
Part IV consists of Chapters 15 through 26, which describe step-by-step procedures for setting up a variety of server types. Simple configurations for what might
Chapter 17 describes how to set up different types of print server interfaces, including Samba (to share with Windows systems) and native Linux printing. Chapter 18 describes file servers, such as Network File System (NFS) servers and Samba file servers. Chapter 19 describes how to configure sendmail or postfix e-mail servers.
Chapter 20 describes how to configure and secure an FTP server, as well as how to access the server using FTP client programs. Chapter 21 teaches you how to set up Fedora as a Web server, focusing on the popular Apache server software. Chapter 22 explains how to use LDAP to create a shared address book. Chapter 23 describes how to set up both DHCP and NIS services to distribute information to client workstations on the network.
Chapter 24 describes how to set up and use a MySQL database server in Linux. Chapter 25 takes you through the process of making the servers you configured in the other chapters available on the public Internet. Setting up a Domain
Part V contains Chapter 27, which describes the Linux 2.6 kernel, and Chapter 28, which describes Security Enhanced Linux.
This book contains three appendixes. Appendix A describes the contents of the companion DVD, Appendix B lists the hundreds of RPMs (software packages) that come with the Fedora Core 3 distribution, and Appendix C provides an overview of setting up and running network services.