Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: RHCE Prerequisites
Figure 1-1: The vi editor with/etc/inittab
Figure 1-2: Adding a new user in /etc/passwd
Figure 1-3: Linux fdisk commands; p returns the partition table
Figure 1-4: /etc/passwd
Figure 1-5: Using
elinks
Figure 1-6: Using lftp
Chapter 2: Hardware and Installation
Figure 2-1: Configuring TCP/IP on your network card during installation
Figure 2-2: Manual TCP/IP network card configuration
Figure 2-3: Red Hat Installer boot options
Figure 2-4: Starting the installation process
Figure 2-5: Connecting to an NFS server
Figure 2-6: Connecting to an HTTP server
Figure 2-7: Connecting to an FTP server
Figure 2-8: Basic partitioning
Figure 2-9: Configuring a boot loader
Figure 2-10: Configuring networking
Figure 2-11: Basic package customization
Figure 2-12: Red Hat Enterprise Linux package groups
Figure 2-13: Red Hat Enterprise Linux Mail Server package group details
Figure 2-14: Network Servers package group
Figure 2-15: First Boot configuration
Figure 2-16: Text-mode First Boot configuration
Figure 2-17: Configuring a firewall
Figure 2-18: Configuring SELinux
Chapter 3: The Boot Process
Figure 3-1: The BIOS initialization process
Figure 3-2: The GRand Unified Bootloader (GRUB)
Figure 3-3: Details of GRUB
Figure 3-4: Sample kill and start scripts in runlevel 5
Figure 3-5: The GRUB boot loader
Figure 3-6: Controlling services with
ntsysv
Figure 3-7: The Service Configuration tool
Figure 3-8: The Date/Time Properties window
Chapter 4: Linux Filesystem Administration
Figure 4-1: parted Command Options
Chapter 5: Package Management
Figure 5-1: Pup, the Package Updater
Figure 5-2: The Package Manager
Figure 5-3: The Kickstart Configurator doesn't quite work.
Figure 5-4: The Kickstart Configurator
Figure 5-5: Using the Kickstart Configurator to set up partitions
Chapter 6: User Administration
Figure 6-1: Managing user account life
Figure 6-2: Configuring password information
Figure 6-3: Assigning groups
Figure 6-4: Quota information
Figure 6-5: Quotas with hard and soft limits
Figure 6-6: Quota grace period
Figure 6-7: Group quota
Figure 6-8: A quota report
Figure 6-9: The PAM /etc/pam.d/login module
Figure 6-10: The /etc/pam.d/system-auth configuration file
Figure 6-11: Authentication Configuration
Chapter 7: System Administration Tools
Figure 7-1: Network Configuration utility
Figure 7-2: Red Hat's Printer Configuration utility
Figure 7-3: Connecting to a remote CUPS server
Figure 7-4: Starting the printer configuration process
Figure 7-5: Selecting a connection
Figure 7-6: Selecting a manufacturer
Figure 7-7: Selecting a printer and driver
Figure 7-8: Sharing a CUPS printer
Figure 7-9: Status of configured printers
Figure 7-10: GNOME Default Printer manager
Figure 7-11: CUPS Web-based interface
Figure 7-12: CUPS Administration management page
Figure 7-13: Configuring a printer class
Figure 7-14: The new printer class
Figure 7-15: The syslog.conf log configuration file
Figure 7-16: A typical set of log files in /var/log
Chapter 8: Kernel Services and Configuration
Figure 8-1: A Red Hat Enterprise Linux/proc directory
Figure 8-2: Detected memory information
Figure 8-3: Detected CPU information
Figure 8-4: GRUB menu with original and recompiled kernels
Figure 8-5: Questions from the
make config
utility
Figure 8-6: The
make menuconfig
configuration menu
Figure 8-7: The
make xconfig
configuration menu
Figure 8-8: The
make gconfig
configuration menu
Figure 8-9: Configuration of a volume group (VG)
Figure 8-10: The GUI LVM tool
Figure 8-11: Creating a new volume group
Figure 8-12: Creating a new logical volume
Figure 8-13: Removing a logical volume
Figure 8-14: Adding a physical volume
Chapter 9: Apache and Squid
Figure 9-1: The default Apache Web page
Figure 9-2: Apache configuration files
Figure 9-3: A password-protected Web site
Figure 9-4: Customized Apache logs
Figure 9-5: The Apache configuration tool, Main tab
Chapter 10: Network File-Sharing Services
Figure 10-1: NFS Server Configuration
Figure 10-2: The Add NFS Share window
Figure 10-3: Samba Server Configuration utility
Figure 10-4: List of shared directories and printers from a remote PDC
Figure 10-5: Browsing remote shared directories
Figure 10-6: Using Startup Programs to connect to a shared Samba directory
Figure 10-7: Samba Server basic settings
Figure 10-8: Samba Server security settings
Figure 10-9: Basic components of Create Samba Share
Figure 10-10: Current Samba users
Figure 10-11: Creating a New Samba User
Figure 10-12: Testing smb.conf syntax
Chapter 11: Domain Name Service
Figure 11-1: /etc/named .caching-nameserver.conf
Figure 11-2: The root DNS servers are stored in named.ca.
Figure 11-3: The localhost.zone DNS datafile
Figure 11-4: The named.local reverse DNS file
Figure 11-5: An example.org .zone file
Figure 11-6: A reverse DNS zone file
Figure 11-7: Listing a working DNS zone
Figure 11-8: DNS query using dig
Chapter 12: Electronic Mail
Figure 12-1: system-switch-mail
Chapter 13: Other Networking Services
Figure 13-1: A public key
Figure 13-2: Generating encryption keys
Figure 13-3: It's easy to decipher a clear text password.
Figure 13-4: Active network interfaces
MULTICAST
Figure 13-5: Sample DHCP configuration file
Figure 13-6: Configuring your network card
Figure 13-7: Configuring the Network Time Protocol
Chapter 14: The X Window System
Figure 14-1: Running X Window clients from remote or local computers
Figure 14-2: Set your preferred display manager in /etc/X11/prefdm.
Figure 14-3: The GNOME Display Manager,
gdm
Figure 14-4: The KDE Display Manager,
kdm
Figure 14-5: The
startx
script
Figure 14-6: A GUI as custom configured through ~/.xinitrc
Figure 14-7: The Display Settings tool, started from the text console
Figure 14-8: Display settings
Figure 14-9: Selecting a graphics card
Figure 14-10: Selecting a monitor
Figure 14-11: The GNOME desktop
Figure 14-12: The KDE desktop
Chapter 15: Securing Services
Figure 15-1: The Security Level Configuration tool
Figure 15-2: Customizing using the Red Hat Security Level Configuration tool
Figure 15-3:
ls -Z
output
Figure 15-4: SELinux Management Tool
Figure 15-5: SELinux Boolean options
Figure 15-6: SELinux Management File Labeling
Figure 15-7: SELinux Setroubleshoot Browser
Chapter 16: Troubleshooting
Figure 16-1: One possible error message
Figure 16-2: A second possible error message
Figure 16-3: Booting into
linux rescue
mode
Figure 16-4: Networking interface options in
linux rescue
mode
Figure 16-5: Networking interface configuration in
linux rescue
mode
Figure 16-6:
The linux
rescue environment options
Figure 16-7: The
linux rescue
environment has found your root directory (/).
Figure 16-8: Labels, filesystems, and partitions
Figure 16-9: The
dumpe2fs
command provides a lot of information.
Previous page
Table of content
Next page
Linux Patch Management: Keeping Linux Systems Up To Date
ISBN: 0132366754
EAN: 2147483647
Year: 2004
Pages: 227
Authors:
Michael Jang
BUY ON AMAZON
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Basic Commands, Variables, and Data Types
Looping Commands
Game Graphics Learning to Use Bitmaps
Fundamentals of 3D Graphics Programming
Multiplayer Programming The Crazy Carnage Game
CompTIA Project+ Study Guide: Exam PK0-003
Assessment Test
Schedule Planning
Comprehensive Project Plan
Project Control
Appendix B Standard IT Project Documents
Qshell for iSeries
The EDTF Text Editor
Parameters and Variables, Defined
The Integrated File System
Path-Name Expansion
Scripts - Debugging, Signals, and Traps
VBScript Programmers Reference
Data Types
Error Handling and Debugging
Windows Script Host
Windows Script Components
Appendix J VBA Features not in VBScript
Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century: Prevention and Detection for the Twenty-First Century
Unauthorized Activity II
IDS and IPS Internals
NFR Security
Incident Response
Laws, Standards, and Organizations
Web Systems Design and Online Consumer Behavior
Chapter I e-Search: A Conceptual Framework of Online Consumer Behavior
Chapter XI User Satisfaction with Web Portals: An Empirical Study
Chapter XIV Product Catalog and Shopping Cart Effective Design
Chapter XVI Turning Web Surfers into Loyal Customers: Cognitive Lock-In Through Interface Design and Web Site Usability
Chapter XVIII Web Systems Design, Litigation, and Online Consumer Behavior
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies