The Linux and Unix implementation of the Server Message Block protocol and the Common Internet File System (CIFS). Allows computers that run Linux and Unix to communicate with computers that run Microsoft Windows operating systems. I expect Samba 4.0, when released, to provide nearly full functionality as a Microsoft Active Directory Domain Controller.
You can configure multiple secure virtual hosts on a single Apache server using the secure configuration file, /etc/httpd/conf.d/ssl.conf.
An implementation of mandatory access control integrated into the Linux kernel; in essence, a different way of layering security within Linux.
A standard e-mail server application used by most Internet e-mail.
The new standard on hard drives that makes it easier to chain hard drives in a series inside a physical system. SATA drives have device file labels similar to SCSI; for example, the first SATA drive is known as /dev/sda.
A computer that controls centralized resources such as files and printers. Servers can share these resources with client computers on a network.
The setfacl command lets you control Access Control Lists (ACLs) on files and directories.
The SGID bit sets common group ID permissions on a file or directory.
The Shadow Password Suite creates an additional layer of protection for Linux users and groups in the /etc/shadow and /etc/gshadow files.
The showmount command lists the shared directories from an NFS server.
When you start RHEL in single-user mode, you're automatically logged in as the root user, without networking or most services. If your Linux system has boot problems, single-user mode may allow enough access to fix the problem.
The smbpasswd command helps you create usernames and passwords for a Samba (Microsoft Windows) network.
SMTP is a TCP/IP protocol for sending mail; used by sendmail.
In a DNS database, the SOA record is the preamble to all zone files. It describes the zone, the DNS server computer (such as ns.your-domain.com), the responsible administrator (such as email@example.com), the serial number associated with this file, and other information related to caching and secondary DNS servers.
Associated with user quotas. Specifies the maximum amount of space a user can have on a partition. Soft limits can be configured with grace periods.
Spec files are associated with source RPMs (SRPMS). You can modify an SRPM spec file to change the way an RPM package is built.
Squid is a high-performance HTTP and FTP caching proxy server.
SRPMs include the source code required to build a binary RPM package. SRPMs are installed with the rpm -i command, which installs SRPM files within the /usr/src/redhat directory. You can then use the rpmbuild command to create a binary RPM.
The basis for several database systems that can be run on Linux, including MySQL and PostgreSQL.
The SUID bit sets common user ID permissions on a file or directory.
The superuser represents a regular user who has taken root user privileges. Closely associated with the su and sudo commands.
Linux uses swap space for less frequently used data that would otherwise be stored in RAM. It is normally configured in Linux in a swap partition.
Red Hat has created a series of GUI configuration tools to help configure a number of different systems and services. You can start them with a number of different commands that start with system-config-*. While it's usually faster to configure a configuration file directly, not every experienced administrator knows every detail of every major configuration file.