Flylib.com
List of Listings
Previous page
Table of content
Chapter 3: Welcome to Linux!
Listing 3.1: An example of the lilo.conf configuration file
Listing 3.2: The inittab configuration file
Listing 3.3: The contents of the /etc/ securetty file
Listing 3.4: Information about the network configuration and state
Chapter 4: Access Control
Listing 4.1: The contents of the /etc/login.defs file
Listing 4.2: The contents of the /etc/ sudoers configuration file
Listing 4.3: The sudo program information
Chapter 5: Administration
Listing 5.1: The sshd configuration file
Listing 5.2: The contents of the /etc/ssh/ssh_config configuration file
Listing 5.3: The /etc/xinetd.conf configuration file
Listing 5.4: The Telnet service configuration file
Chapter 6: Samba Style
Listing 6.1: A fragment of the smb.conf configuration file
Chapter 8: Electronic Mail
Listing 8.1: A fragment of the /etc/mail/sendmail.mc file
Listing 8.2: The /etc/mail/access file
Chapter 9: Gateway to Internet
Listing 9.1: Default ACL rules in the /etc/squid/squid.conf configuration file
Listing 9.2: Perl redirector program
Listing 9.3: JavaScript for killing popup windows
Listing 9.4: Limiting speed for loading media during work hours
Chapter 10: File Transfer
Listing 10.1: An example of an FTP command exchange
Listing 10.2: The contents of the ftpaccess configuration file
Listing 10.3: The contents of the /etc/ftpusers file
Chapter 11: Network Addressing
Listing 11.1: An example of the contents of the /etc/named.conf file
Chapter 12: System Monitoring
Listing 12.1: Listing produced by the lastlog command
Listing 12.2: The contents of the syslog.conf file
Listing 12.3: The contents of the /etc/rc.d/init.d/syslog file
Listing 12.4: The configuration file of the Logrotate utility (/etc/logrotate.conf)
Chapter 13: Backing Up and Restoring Data
Listing 13.1: An example of listing archive contents
Chapter 14: Advice from a Hacker
Listing 14.1: The contents of the /etc/sysctl.conf configuration file
Listing 14.2: The contents of the /etc/auto.misc file
Previous page
Table of content
Hacker Linux Uncovered
ISBN: 1931769508
EAN: 2147483647
Year: 2004
Pages: 141
Authors:
Michael Flenov
BUY ON AMAZON
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Size the Kanban
Auditing the Kanban
Appendix C Two-Bin Kanban Systems
Appendix E EOQ vs. Kanban
Appendix H Case Study 1: Motor Plant Casting Kanban
Snort Cookbook
Fast Logging
Dynamic Rules
Detecting Stateless Attacks and Stream Reassembly
Decoding Application Traffic
Installing and Configuring Barnyard
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
Overview of Captology
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Media Simulation
Computers as Persuasive Social Actors
Credibility and Computers
Quantitative Methods in Project Management
Organizing and Estimating the Work
Making Quantitative Decisions
Risk-Adjusted Financial Management
Expense Accounting and Earned Value
Quantitative Time Management
Programming .Net Windows Applications
Publish and Subscribe
Apply Button
RichTextBox
Tabbed Pages
ScrollBar
Microsoft Visual Basic .NET Programmers Cookbook (Pro-Developer)
Numbers, Dates, and Other Data Types
XML
Network Programming
Windows Programming
ASP.NET Web Applications
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies