Flylib.com
List of Exercises
Previous page
Table of content
Next page
Chapter 3: Performing System Boot and Shutdown
Exercise 3-1: Rebooting the Hung System
Chapter 4: Managing File Systems
Exercise 4-1: Creating a UFS File System
Exercise 4-2: Checking a File System Manually
Chapter 5: Managing Disks
Exercise 5-1: Displaying Information on Devices Attached to the Solaris System
Exercise 5-2: Mounting a CD-ROM, Browsing Its Content, and Unmounting It
Chapter 6: Performing User Administration
Exercise 6-1: Creating a User Account with the SMC GUI Tool
Chapter 7: Performing Security Administration
Exercise 7-1: Capturing Failed Login Attempts
Exericse 7-2: Becoming a Superuser
Exercise 7-3: Setting Special Permissions on a File
Chapter 8: Managing Network Printers and System Processes
Exercise 8-1: Using the
ps
Command to View Processes
Exercise 8-2: Scheduling a cron Job by Creating and Editing a
crontab
File
Chapter 9: Performing System Backups and Restores
Exercise 9-1: Restoring the
root (/)
and
/usr
File Systems
Chapter 10: Working with the Solaris Network Environment
Exercise 10-1: How to Monitor Packets by Using the
snoop
Command
Chapter 11: Managing Naming Services
Exercise 11-1: How to Prepare Source Files for Conversion to NIS Maps
Exercise 11-2: Setting Up a Master Server by Using the
ypinit
Command
Exercise 11-3: Setting Up an NIS Slave Server
Chapter 12: Managing Virtual File Systems and Core Dumps
Exercise 12-1: How to Add More Swap Space without Repartitioning the Disk
Exercise 12-2: Troubleshooting an NFS Client Machine
Chapter 13: Managing Storage Volumes
Exercise 13-1: Accessing the SVM GUI
Chapter 14: Managing Access Control and System Messaging
Exercise 14-1: How to Create a Profile and a Role and Assign a Role to an Existing User
Chapter 15: Performing Advanced Installation
Exercise 15-1: Configuring a Zone
Exercise 15.2: Deleting a Non-Global Zone
Previous page
Table of content
Next page
Sun Certified System Administrator for Solaris 10 Study Guide Exams 310-XXX & 310-XXX
ISBN: N/A
EAN: N/A
Year: 2005
Pages: 168
BUY ON AMAZON
Strategies for Information Technology Governance
Structures, Processes and Relational Mechanisms for IT Governance
Integration Strategies and Tactics for Information Technology Governance
Measuring ROI in E-Commerce Applications: Analysis to Action
Managing IT Functions
Governance in IT Outsourcing Partnerships
C++ GUI Programming with Qt 3
Using Dialogs
Multiple Documents
Event Processing
Pointer-Based Containers
Session Management
Excel Scientific and Engineering Cookbook (Cookbooks (OReilly))
Entering Formulas
Referring to More Than a Single Cell
Importing Data from Web Pages
Applying Discrete Fourier Transforms
Assessing Goodness of Fit
C++ How to Program (5th Edition)
Overview of the Chapter Examples
Terminology
Wrap-Up
Terminology
G.11. Class Withdrawal
Twisted Network Programming Essentials
Sending and Receiving Data
Accepting Connections from Clients
Accessing a Password-Protected Page
Enabling Web Services Using XML-RPC
Calling SOAP Web Services
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 4. Connect Linux with a Bluetooth Phone
Hack 31. Analyze Traffic with Ethereal
Hack 43. Control Wireless Access by MAC
Hack 74. Capture Wireless Users with NoCatAuth
Appendix B. Wireless Hardware Guide
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies