R
rcp, replacing with scp, 221-222
recovery
cost effectiveness of, 4
creating backup archives, 124-127
Red Hat Enterprise Linux AS 3.0
firewall configuration, 66-67
installing software with Red Hat-specific tools, 93-94
and pam_chroot, 207-209
services baseline, 20-21
Red Hat Kickstart, 109
creating the CD-ROM, 109-114
ks.cfg, 110-111, 113
SLES8 network installation shared directory tree, 115-118
using a network-based installation, 114-115
Red Hat Package Manager, 9-11, 81
installing software with, 100-101
Red Hat Update Agent, 306, 307
reinstallation
cost effectiveness of, 4
preparing automated reinstallation, 107-127
required services, determining, 20-27
restricted functionality, 186-187
Return on Investment (ROI), 365
contracting a consultant, 370-371
government and industry requirements, 366-368
impact of loss of trust, 368-369
industry standards, 371
industry statistics, 369-370
involving management, 372
revenue and revenue loss, 366
showing, 369
Reverse Address Resolution Protocol, 56
RHN Satellite Server, 318
risk assessment, 357
Annualized Loss Expectancy (ALE), 363
Annualized Rate of Occurrence (ARO), 363
determining impact and probability, 359-361
determining scope, 358
Exposure Factor (EF), 362
gathering issues, 359-361
prioritizing risks, 361-362
qualitative vs. quantitative, 357
quantitative overview, 362-363
reporting to management, 363-364
selecting the team, 358
Single Loss Expectancy (SLE), 362-363
worksheets, 360-361
rlogin, replacing with SSH, 220-222
RPM, 9-11, 83
file integrity checking, 335-336
installing a binary RPM to an alternate location, 204-205
installing from a source RPM, 199-204
installing software with, 100-101
rsh, replacing with SSH, 220-222
rules
firewall, 48-55, 57-60
SUSE SLES 8.0 firewall rules for dual interface configuration, 69-78
runlevels, 19
YaST2 Runlevel Editor, 34-35