Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 2: Linux Installation and Initial Configuration
Figure 2.1: The main window of the PartitionMagic program
Figure 2.2: The
Keyboard Configuration
dialog window
Figure 2.3: The file
Properties
window
Figure 2.4: The
Disk Setup
dialog window
Figure 2.5: The
Add Partition
dialog window
Figure 2.6: Configuring Linux boot loader
Figure 2.7: The
Set Root Password
dialog window
Figure 2.8: The
Package Group Selection
dialog window
Figure 2.9: The
About to Install
dialog window
Figure 2.10: The
Monitor Configuration
window
Figure 2.11: The first-boot
Welcome
dialog window
Figure 2.12: The
User Account
dialog window
Figure 2.13: The boot loader dialog window
Figure 2.14: The Linux booting process
Figure 2.15: The login window
Figure 2.16: The main window of the setup utility
Figure 2.17: The KDE desktop
Figure 2.18: The GNOME desktop
Chapter 3: Welcome to Linux!
Figure 3.1: The Midnight Commander program launched in the terminal window
Figure 3.2: Launching the Services utility from the Main Menu
Figure 3.3: The main window of the Services utility
Figure 3.4: A sample of the results produced by the top program
Figure 3.5: The main window of the KPPP program
Figure 3.6: The menuconfig utility
Figure 3.7: The gconf utility
Chapter 4: Access Control
Figure 4.1: A block diagram of a chroot file system
Figure 4.2: A network firewall
Figure 4.3: The Options tab
Figure 4.4: The Rules tab
Figure 4.5: The dialog window for adding new rules
Figure 4.6: Location of the public and closed service servers
Figure 4.7: Doubled network protection
Figure 4.8: Protecting two networks with one firewall
Figure 4.9: Replacing the IP address
Chapter 5: Administration
Figure 5.1: The netconfig window
Figure 5.2: The common-bus network topology
Figure 5.3: The star network topology
Figure 5.4: Channel encryption
Figure 5.5: A secure connection indication in Internet Explorer
Figure 5.6: An Internet page's properties
Figure 5.7: Connecting to the Internet via a Web server
Chapter 7: Web Server
Figure 7.1: The main window of the Apache graphical configuration utility
Figure 7.2: The user authentication window
Figure 7.3: Intercepting traffic
Chapter 8: Electronic Mail
Figure 8.1: The main window of the KMail program
Figure 8.2: The network configuration window
Figure 8.3: The SMTP server configuration window
Figure 8.4: The Local mailbox configuration window
Chapter 9: Gateway to Internet
Figure 9.1: Accessing the Internet via a proxy server
Figure 9.2: Configuring a proxy server in Mozilla
Figure 9.3: Configuring Mozilla cache
Chapter 10: File Transfer
Figure 10.1: The main window of CyD FTP Client XP
Figure 10.2: A text file transmitted in the binary mode
Figure 10.3: A text file transmitted in the ASCII mode
Figure 10.4: The main window of the kwuftpd utility
Chapter 11: Network Addressing
Figure 11.1: The domain namespace hierarchy
Figure 11.2: DNS control windows
Chapter 12: System Monitoring
Figure 12.1: A screenshot of the /var/log/messages file contents
Chapter 13: Backing Up and Restoring Data
Figure 13.1: The iDisk site
Chapter 14: Advice from a Hacker
Figure 14.1: The OSI model
Figure 14.2: A network with two routers
Figure 14.3: An example of an attack notification email
Figure 14.4: Honey-pot network construction
Previous page
Table of content
Next page
Hacker Linux Uncovered
ISBN: 1931769508
EAN: 2147483647
Year: 2004
Pages: 141
Authors:
Michael Flenov
BUY ON AMAZON
Project Management JumpStart
Initiating the Project
Breaking Down the Project Activities
Controlling the Project Outcome
Appendix B Sample Project Management Forms
Appendix C Sample Project Management Checklists
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Why Project Risk Management?
Quantifying and Analyzing Activity Risks
Managing Activity Risks
Managing Project Risk
Monitoring and Controlling Risky Projects
Building Web Applications with UML (2nd Edition)
Web Services
Technical Risk
Architectural Viewpoints
Mapping to the UX Model
Logical View
Data Structures and Algorithms in Java
Projects
Sorting Linked Lists
Summary
Problems
C. Summation Formulae
Pocket Guide to the National Electrical Code(R), 2005 Edition (8th Edition)
Article 210 Branch Circuits
Article 314 Outlet, Device, Pull, and Junction Boxes; Conduit Bodies; Fittings; and Handhole Enclosures
Article 338 Service-Entrance Cable Types SE and USE
Article 700 Emergency Systems
Example No. D3 Store Building
Professional Struts Applications: Building Web Sites with Struts ObjectRelational Bridge, Lucene, and Velocity (Experts Voice)
Creating a Struts-based MVC Application
Form Presentation and Validation with Struts
Managing Business Logic with Struts
Building a Data Access Tier with ObjectRelationalBridge
Templates and Velocity
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies