Flylib.com
Linux in a Windows World
Linux in a Windows World
ISBN: 0596007582
EAN: 2147483647
Year: 2005
Pages: 152
Authors:
Roderick W Smith Ph.D.
BUY ON AMAZON
Linux in a Windows World
Table of Contents
Copyright
Dedication
Preface
Audience
Contents of This Book
Conventions Used in This Book
Using Code Examples
Comments and Questions
Safari Enabled
Acknowledgments
Part I: Linux s Place in a Windows Network
Chapter 1. Linux s Features
Section 1.1. Where Linux Fits in a Network
Section 1.2. Linux as a Server
Section 1.3. Linux on the Desktop
Section 1.4. Comparing Linux and Windows Features
Section 1.5. Summary
Chapter 2. Linux Deployment Strategies
Section 2.1. Linux Server Options
Section 2.2. Linux Desktop Migration
Section 2.3. Linux and Thin Clients
Section 2.4. Summary
Part II: Sharing Files and Printers
Chapter 3. Basic Samba Configuration
Section 3.1. Installing Samba
Section 3.2. The Samba Configuration File Format
Section 3.3. Identifying the Server
Section 3.4. Setting Master Browser Options
Section 3.5. Setting Password Options
Section 3.6. Summary
Chapter 4. File and Printer Shares
Section 4.1. Common File Share Options
Section 4.2. Printing with CUPS
Section 4.3. Creating a Printer Share
Section 4.4. Delivering Printer Drivers to Windows Clients
Section 4.5. Example Shares
Section 4.6. Summary
Chapter 5. Managing a NetBIOS Network with Samba
Section 5.1. Enabling Domain Controller Functions
Section 5.2. Enabling NBNS Functions
Section 5.3. Assuming Master Browser Duties
Section 5.4. Summary
Chapter 6. Linux as an SMBCIFS Client
Section 6.1. Using NetBIOS Name Resolution
Section 6.2. Accessing File Shares
Section 6.3. Printing to Printer Shares
Section 6.4. Configuring GUI Workgroup Browsers
Section 6.5. Summary
Part III: Centralized Authentication Tools
Chapter 7. Using NT Domains for Linux Authentication
Section 7.1. The Principles Behind Winbind
Section 7.2. Samba Winbind Configuration
Section 7.3. PAM and NSS Winbind Options
Section 7.4. Winbind in Action
Section 7.5. Summary
Chapter 8. Using LDAP
Section 8.1. The Principles Behind LDAP
Section 8.2. Configuring an OpenLDAP Server
Section 8.3. Creating a User Directory
Section 8.4. Configuring Linux to Use LDAP for Login Authentication
Section 8.5. Configuring Windows to Use LDAPfor Login Authentication
Section 8.6. Summary
Chapter 9. Kerberos Configuration and Use
Section 9.1. Kerberos Fundamentals
Section 9.2. Linux Kerberos Server Configuration
Section 9.3. Kerberos Application Server Configuration
Section 9.4. Linux Kerberos Client Configuration
Section 9.5. Windows Kerberos Tools
Section 9.6. Summary
Part IV: Remote Login Tools
Chapter 10. Remote Text-Mode Administration and Use
Section 10.1. What Can Text-Mode Logins Do?
Section 10.2. SSH Server Configuration
Section 10.3. Telnet Server Configuration
Section 10.4. Windows Remote-Login Tools
Section 10.5. Summary
Chapter 11. Running GUI Programs Remotely
Section 11.1. What Can GUI Logins Do?
Section 11.2. Using Remote X Access
Section 11.3. Encrypting X by SSH Tunneling
Section 11.4. VNC Configuration and Use
Section 11.5. Running Windows Programs from Linux
Section 11.6. Summary
Chapter 12. Linux Thin Client Configurations
Section 12.1. The Role of Thin Client Computing
Section 12.2. Hardware Requirements
Section 12.3. Linux as a Server for Thin Clients
Section 12.4. Linux as a Thin Client
Section 12.5. Summary
Part V: Additional Server Programs
Chapter 13. Configuring Mail Servers
Section 13.1. Linux Mail Server Options
Section 13.2. Configuring Sendmail
Section 13.3. Configuring Postfix
Section 13.4. Configuring POP and IMAP Servers
Section 13.5. Scanning for Spam, Worms, and Viruses
Section 13.6. Supplementing a Microsoft Exchange Server
Section 13.7. Using Fetchmail
Section 13.8. Summary
Chapter 14. Network Backups
Section 14.1. Backup Strategies
Section 14.2. Backing Up the Linux System
Section 14.3. Backing Up with Samba
Section 14.4. Backing Up with AMANDA
Section 14.5. Summary
Chapter 15. Managing a Network with Linux
Section 15.1. Delivering IP Addresses with DHCP
Section 15.2. Delivering Names with DNS
Section 15.3. Keeping Clocks Synchronized with NTP
Section 15.4. Summary
Part VI: Appendixes
Appendix A. Configuring PAM
Section A.1. PAM Principles
Section A.2. The PAM Configuration File Format
Section A.3. PAM Modules
Section A.4. Sample PAM Configurations
Section A.5. Summary
Appendix B. Linux on the Desktop
Section B.1. Linux Desktop Applications for All Occasions
Section B.2. Configuring Applications and Environments
Section B.3. Running Windows Programs in Linux
Section B.4. File and Filesystem Compatibility
Section B.5. Font Handling
Section B.6. Summary
Colophon
Index
A
B
C
D
E
F
G
H
I
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Linux in a Windows World
ISBN: 0596007582
EAN: 2147483647
Year: 2005
Pages: 152
Authors:
Roderick W Smith Ph.D.
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.1 Install OpenSSH to Replace the Remote Access Protocols with Encrypted Versions
Step 1.2 Install SSH Windows Clients to Access Remote Machines Securely
Step 4.1 Authentication with Public Keys
Step 4.2 Passphrase Considerations
Step 6.2 Using Port Forwarding Within PuTTY to Read Your E-mail Securely
Identifying and Managing Project Risk: Essential Tools for Failure-Proofing Your Project
Why Project Risk Management?
Managing Project Constraints and Documenting Risks
Managing Activity Risks
Quantifying and Analyzing Project Risk
Conclusion
Kanban Made Simple: Demystifying and Applying Toyotas Legendary Manufacturing Process
Developing a Kanban Design
Training
Conclusion
Appendix B Kanban Supermarkets
Appendix H Case Study 1: Motor Plant Casting Kanban
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Who this book is for
Common characteristics of contemporary SOA
Policies
SOA delivery lifecycle phases
Service-Oriented Design (Part IV: Business Process Design)
Google Maps Hacks: Tips & Tools for Geographic Searching and Remixing
Hack 1. Get Around http://maps.google.com
Hack 9. Use del.icio.us to Keep Up with Google Maps
Hack 18. Examine Patterns of Criminal Activity
Hack 34. Publish Your Own Hiking Trail Maps
Hack 59. Show Lots of StuffQuickly
Cultural Imperative: Global Trends in the 21st Century
Cross-Century Worldviews
Cognitive Processes
Culture and Globalization
Empires Past, Present, and Future
Appendix A Cultural Categorization Characteristics
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies