Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] -a logical comparison operator a2p command a2ps command AbiWord abiword command ac command 2nd accept command 2nd 3rd access access control directives (ftpaccess file) ACLs (access control lists) 2nd 3rd Apache web server file systems, controlling 2nd file permissions, changing wireless access points accounts [See user accounts.] ACID (Atomicity Consistency Isolation Durability) ACLs (access control lists) 2nd 3rd actions (PHP loops) active file (INN) ad blocking Add a New Print Queue configuration dialog add-on postfixes add-on prefixes address-based virtual hosts addresses broadcasting IP addresses dotted quad IP addresses IP masquerading limitations netmasks 2nd network classes Squid proxy server multicasting unicast adduser command Administrator Mode button (kdm) administrator privileges, granting to users restricted shells root privileges, granting on occasion UIDs (user IDs), temporarily changing administrators [See root users.] Adobe Photoshop Advanced Linux Sound Architecture (ALSA) 2nd Advanced Power Management (APM) afio backup software alias command aliases myenv shell script Sendmail allow directive (Apache) AllowOverrides directive (Apache) ALSA (Advanced Linux Sound Architecture) 2nd alsamixer command 2nd 3rd Amanda amd (automount daemon) amdump command America Online (AOL) America's Army American Registry for Internet Numbers ampersand (&) 2nd AMTP email protocol Anaconda 2nd AND statement (SQL) anonymous access control (vsftpd) anonymous FTP servers compared to authenticated servers configuring AOL (America Online) Apache server development of documentation websites downloading dynamic content CGI flow control PHP SSI file system access control 2nd file system authentication graphic interface configuration peak performance configuration server configuration virtual host properties installing file locations from RPM Internet security logging common log format CustomLog directive modules mod_access mod_alias mod_asis mod_auth mod_auth_anon mod_auth_dbm mod_auth_digest mod_autoindex mod_cgi mod_dir mod_env mod_expires mod_headers mod_include mod_info mod_log_config mod_mime mod_mime_magic mod_negotiation mod_proxy mod_rewrite mod_setenvif mod_sll mod_speling mod_status mod_unique_id mod_userdir mod_usertrack mod_vhost_alias optimizing quick start guide runtime configuration .htaccess file httpd.conf configuration file MPM security report websites source code website source code, building starting/stopping /etc/rc.d/init.d/httpd script chkconfig command manually service command system-config-services client upgrading usage statistics version information virtual hosting address-based hosts intranet websites name-based hosts websites Apache Software Foundation apachectl command APM (Advanced Power Management) apm command 2nd apmd file apmsleep command application development (Fedora deployment plans) apropos command 2nd apt-get command-line software package tool ar command arch directory ark backup tool 2nd ARPAnet array_keys() function array_unique() function array_values() function arrays 2nd array data type array functions arsort() function articles (newsgroups) ascii command ash shell ash.static shell asort() function assigning FTP user permissions permissions values to shell script variables values to strings asterisk (*) 2nd in /etc/passwd files shell pattern-matching searches wildcards at command ATAPI (AT Attachment Packet Interface) atime (files), disabling atomicity atq command atrm command audio [See sound.] Audio Format FAQ authenticated FTP servers authentication Apache BIND (Berkeley Internet Name Domain) PAM (Pluggable Authentication Modules) AuthGroupFile directive AuthName directive authoritative nameservers AuthType directive AuthUserFile directive autoconf command 2nd autofs autohacking automating tasks scheduling tasks at command batch command cron daemon shell scripts #! (shebang lines) built-in variables 2nd commands as environment variables executing positional parameters reasons for using special characters storing for systemwide access testing trojan scripts user variables writing shells / (backslashes) ` (backticks) changing Fedora Core shells list job-control commands maintaining shell strings with unexpanded variables man pages resolving variables with embedded spaces shell command line system services booting to default runlevel booting to nondefault runlevel booting to runlevel controlling at boot init scripts initiating boot loading process loading Linux kernel manually starting/stopping runlevels running through xinetd daemon websites autoresponders (email) .avi file format Axis Linux-based cameras |