S



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

-s file comparison operators
Samba
     complexity of
     configuring with /etc/samba/smb.conf file
     configuring with SWAT
     installing
     mounting/unmounting shares
     service command
     smbd daemon, starting
     testing with testparm command
Samsung Contact
SANE (Scanner Access Now Easy)
sash shell
/sbin directory
     /sbin/ifconfig
     /sbin/netstat
     /sbin/route
scalars
scanlogs file
Scanner Access Now Easy (SANE)
scanners
schedulers
scheduling tasks
     at command
     batch command
     cron daemon
     FTP server downtime
Schwartzian transforms
scp command
     copying files
     SSH servers
screen command 2nd
screen grabs
screen images, capturing
Screen section (xorg.conf file)
screen shell command
screenrc file
screenshot
script kiddies
ScriptAlias directive
scripts directory
scrolling screen contents
SCSI disk drivers
searching
    files
         find shell command
         index searches via locate shell command
     input strings
     man pages
     pattern-matching
     shells
     websites
secondary nameservers
security
     Apache 2nd
     autohacking
     backups
     bootloaders
     bridges
     data integrity
     data locking
     disaster recovery plans
     DNS (Domain Name System)
         access control lists (ACLs)
         controlling queries
         controlling zone transfers
         DNSSEC (DNS Security Extensions)
         poisoning
         potential problem host alerts
         split DNS
         spoofing
         UNIX security considerations
     DSL (digital subscriber line) access
     external computer attacks
     Fedora deployment plans
     file permissions
     firewalls
     group permissions
     informational websites
     internal computer attacks
     key-based logins
     Linux kernel, sysctl command
     NIC Promiscuous mode
     packet-filtering
     passwords
         /etc/passwd file
         batch password changes
         bootloaders
         brute-forcing
         FTP user passwords
         MySQL root users
         PostgreSQL database user creation
         root passwords
         selecting
         shadow passwords
         system password policies
     physical security
     remote servers
     SYN flooding
    system administrator privileges, granting to users
         restricted shells
         root privileges, granting on occasion
         UIDs (user IDs), temporarily changing
     tcpdump command
     Tripwire security tool
     Trojan horses
     updates 2nd
     virus protection
     vulnerability assessments
     wireless networks
sed (text editor)
SELECT statement 2nd
SELinux
sending email
     mail utility
     Perl
Sendmail 2nd 3rd 4th
     aliases
     delivery intervals
     email access rules
     mail forwarding
     mail relaying
     masquerading
     rejecting email from specified websites
     Sendmail (book)
    sendmail.cf files
         building
         syntax of
     smart hosts
sensors command 2nd
sensors-detect command
sequences
serial modems
serial-based mice
server installation option (Fedora) 2nd
server parameter (innd.conf)
ServerAdmin directive (httpd.conf file)
ServerLayout section (xorg.conf configuration file)
ServerName directive (httpd.conf file)
ServerRoot directive (httpd.conf file)
servers
    Apache [See Apache server, development of.]
     blade servers
     DHCP servers
     dial-in PPP servers
     Exchange Server
    FTP server
         administration via Wu-FTP servers
         allowing/denying connections via ftphosts file commands
         anonymous servers 2nd
         authenticated servers
         Bsdftpd-ssl servers
         configuration file backups
         editing server files
         file-conversion actions
         NcFTPd servers
         quick installation
         vsftpd servers 2nd
         Wu-FTPd servers 2nd
     gpm (general purpose mouse) server
     LDAP
    nameservers
         authoritative nameservers
         caching nameservers
     NFS server configuration
    proxy servers
         defining
         references
         Squid
         uses of
     remote
    SSH servers
         compared to Telnet servers
         configuring
         disabling SSH1
         ftp command
         rcp command
         scp command
         sftp command
         ssh-keygen command
     Telnet servers
    web
         Stronghold
         Stronghold, website
         Sun Java System
         Zeus
         Zope
service command 2nd
Service Configuration tool
Services dialog box
services file
sessions
     logging out of
     management
     message block printing
     session writing
set directive (SSI)
set group ID (sgid) permissions
set user ID (suid) permissions
setleds command
setserial command 2nd
setup command 2nd 3rd
SFTP
sftp
sftp command
sgid (set group ID) permissions
sh shell
shadow passwords 2nd
shaped windows
shar command
shares (Samba)
sharing files [See NFS (Network File System); ; Samba.]
shebang lines (#!) 2nd
SHELL environment variable
SHELL line (/etc/crontab file)
shell scripts
     #! (shebang lines)
     built-in variables 2nd
     commands as
     defining
     environment variables
     executing
     functions
     mail utility
     positional parameters
     reasons for using
     special characters, list of
     startx command
     task automation
     testing
     trojan scripts
     user variables
    variables
         accessing values
         assigning values to
     writing
shells [See also shell scripts.]
     ash
     ash.static
     bash 2nd
         test command
         comparison of expressions
     bsh
     changing 2nd
     csh
     features of
     Fedora Core shells list
     function of
     ksh 2nd
     navigating
     pdksh 2nd
         comparison of expressions
         select statements
         test command
     Perl access
     rsh
     sash
     sh
     tcsh
         repeat statements
         test command
     zsh
shells file
shift statements
showkey command
shred command
shuffle() array function
shutdown command 2nd 3rd
shutdown files
shutdown process 2nd
simple backup strategies
Simple Mail Transport Protocol (SMTP) 2nd 3rd 4th
single quotes (')
skel files
Skolnick, Cliff
slappasswd tool
slaptest command
Slashdot.org
slave nameservers
slave/master jumpers
slices (sequences) 2nd
slrn news client 2nd
sm file
small enterprise backup strategies
small office backup strategies
Small Office/Home Office (SOHO) users
smart gateways
smart hosts (Sendmail)
SMB (Server Message Block) network file system
smb.conf file
     [global] section
     [homes] section
     [printers] section
smbclient command 2nd 3rd
smbd daemon
smbfs modules
smbmount command
smbprint command
smbspool command
smbstatus command
SMTP (Simple Mail Transport Protocol) 2nd 3rd 4th
sndconfig command 2nd
sniffing
SOA (Start of Authority) records
soft links
software [See also specific software.]
     choosing
     groupware
    HOWTO documents
         compressed files, reading
         quitting
         reading in HTML format
     installing
         installation options
         installed packages, listing
         installing all on CD-ROM
    management
         CheckInstall program
         compiling from source code
         installing
         references
        rpm [See rpm (Red Hat Package Manager).]
         tarballs
     removing with yum
     software packages documentation
solid-state drives
sound
     formats
     music players
     recording
     sound cards
     sound devices
     Sound Juicer 2nd
     streaming audio
source tree (kernel)
sox command 2nd
spam filtering
Spamassassin 2nd
.spec files
SPF (Sender Policy Framework)
splint command 2nd
split DNS
split() method
spoofing
spreadsheet programs
     Calc 2nd
         spreadsheet formatting
         summarizing data with
     Gnumeric
     KSpread
SQL (Structured Query Language)
     != (is not equal) symbol
     CREATE statements
     databases, retrieving data from
     INSERT statements
     optimizing
     OR statements
     reserved keywords
     SELECT statements
     AND statements
     subqueries
    tables
         creating
         inserting data
     WHERE statements
Squid proxy server
     ACL
     client configuration
     client IP addresses, specifying
     configuration examples
     installing
     kill-SIGHUP command
Squirrelmail
ssh (Secure Shell) clients
ssh command 2nd
SSH servers
     compared to Telnet servers
     configuring
     database access
     ftp command
     rcp command
     scp command
     sftp command
     ssh-keygen command
     SSH1, disabling
ssh-keygen command
SSI (Server Side Includes)
    directives
         config
         echo
         exec
         flastmod
         fsize
         include
         printenv
         set
         variables
     dynamic content
stable kernels
standard FTP servers
standard users
Start of Authority (SOA) records
starting/stopping
    Apache web server
         /etc/rc.d/init.d/httpd script
         chkconfig command (Red Hat)
         manually starting
         service command (Red Hat)
         system-config-services client (Red Hat)
     NFS (Network File System)
     postmaster program (PostgreSQL)
     smbd daemon
    system services
         manually starting/stopping
         System V method
     via startx command
     vsftpd servers
    X Window System
         via display managers
         via startx command
startx command 2nd 3rd
stat command
static links
statserial command
status parameter (innd.conf)
stopping [See starting/stopping.]
storage.conf file
stored devices, viewing
str_replace() function
streaming audio
streaming mode (webcams)
Strict RFC1179 Compliance option (remote UNIX printers)
strings
     assigning values to
     built-in methods
     comparisons 2nd 3rd
     concatenating
     constants
     defining
     as immutable sequences
     indexing
     repeating
     searches
    string functions
         str_replace()
         strlen()
         strpos()
         substr()
         trim()
     variable substitution
strip postfixes
strip prefixes
strlen() function
Stronghold
strpos() function
su command 2nd 3rd
sublevel number section (kernel)
submount command
subnet masks (netmasks) 2nd
subnets
subqueries (SQL)
subscriptions file
substr() function
sudo command 2nd
suid (set user ID) permissions
summarizing data with Calc
Sun Java System
super-users [See root users.]
superblocks
SuperRescue CD
surveillance cameras
SuSE OpenExchange
.svg file format
swapoff command
swapon command
SWAT (Samba Web Administration Tool)
switch/case blocks
switchdesk client
switches
Sylpheed-claws email client
symbolic debuggers
symbolic links 2nd 3rd
SYN flooding
SYN Stealth scans (Nmap)
sync command 2nd
sysconfig directory
sysctl command 2nd 3rd
sysrq.txt files
system administrator privileges, granting to users
     restricted shells
     root privileges, granting on occasion
     UIDs (user IDs), temporarily changing
system administrators [See root users.]
system and peripheral inventory checklist (Fedora installation)
system boots [See boot process.]
system jobs
     /etc/crontab files
     editing
System Monitor
system monitoring tools
     console-based monitoring
     disk quotas
     ethereal tool
     free command
     gnome-nettool tool
     gnome-system-monitor tool
     graphical process/system management tools
     KDE
     kill command
     nice command
     renice command
     time command
     top command
     uptime command
     vmstat command
     vncviewer tool
     watch command
     websites
     xcpustate client
     xosview client
system rescue
     BusyBox
     chroot command
     Fedora Core rescue disc
     MBR backups
     partition tables, manually restoring
     SuperRescue CD
system services
     boot, controlling at
     bootup, operation at
         booting to default runlevel
         booting to nondefault runlevel
         booting to runlevel
         init scripts
         initiating boot loading process
         loading Linux kernel
    runlevels
         changing
         troubleshooting
    starting/stopping
         manually starting/stopping
         System V method
     xinetd daemon, running through
system state
System V system services
system-config-bind command 2nd
system-config-date command 2nd
system-config-display command 2nd 3rd
     Display Settings main screen
     Dual head tab
     Hardware tab
     Video Card dialog
     X Window System configuration
system-config-httpd command
system-config-keyboard command 2nd
system-config-mouse command 2nd 3rd 4th
system-config-network tool 2nd 3rd 4th
system-config-nfs command 2nd
system-config-packages command 2nd 3rd
system-config-printer tool 2nd 3rd
     Add a New Print Queue configuration dialog
     Finish and Create New Print Queue dialog
     launching
     local printer settings
     print queue creation
     Printer Model dialog
     Queue Name dialog
     Queue Type dialog
system-config-printer-gui program
system-config-printer-tui tool 2nd 3rd 4th
system-config-securitylevel command 2nd 3rd 4th
system-config-services 2nd
system-config-services command 2nd
system-config-soundcard tool 2nd 3rd 4th
system-config-users command 2nd
system-switch-mail command



Red Hat Fedora 5 Unleashed
Red Hat Fedora 5 Unleashed
ISBN: 067232847X
EAN: 2147483647
Year: 2004
Pages: 362

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net