Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 2: Installing Fedora
Figure 2-1: Change software packages after Fedora installation using the Package Management window.
Figure 2-2: Partition your disk during installation from the Disk Setup window.
Chapter 3: Getting Started with the Desktop
Figure 3-1: A graphical login screen greets Fedora desktop users.
Figure 3-2: After login, Fedora starts you off with a GNOME desktop by default.
Figure 3-3: Select a color or picture for your desktop background.
Figure 3-4: Change the default Bluecurve theme.
Figure 3-5: Launch popular desktop applications with one click.
Figure 3-6: A drawer is a great way to contain personal utilities and launchers.
Figure 3-7: In the GNOME desktop environment, you can manage applications from the panels.
Figure 3-8: Left-click any open spot on the GNOME Panel to see the Panel menu.
Figure 3-9: Applets let you monitor activities, play CDs, watch your mail, or check the weather.
Figure 3-10: Add launchers or applets to a drawer on your GNOME panel.
Figure 3-11: Move around the file system, open directories, launch applications, and open Samba folders.
Figure 3-12: Display shared Windows file and printer servers (SMB) in Nautilus.
Figure 3-13: Change the look-and-feel of your desktop from the Preferences window.
Figure 3-14: Choose which removable drives and media are mounted and played.
Figure 3-15: Manage files and applications graphically with the KDE desktop.
Figure 3-16: Konqueror provides a network-ready tool for managing files.
Figure 3-17: Search for files and folders from the kfind window.
Figure 3-18: Create an image gallery in Konqueror
Figure 3-19: Configure your desktop from the KDE Control Center.
Figure 3-20: Use the Display Settings window to configure basic desktop, video card, and monitor settings.
Chapter 4: Using Linux Commands
Figure 4-1: The Linux file system is organized as a hierarchy of directories.
Chapter 5: Accessing and Running Applications
Figure 5-1: Starting X applications from the Red Hat Menu.
Figure 5-2: Select a program to run from the list in the Run Application window.
Figure 5-3: Running Paint in Red Hat Linux using WINE.
Chapter 6: Publishing with Fedora
Figure 6-1: Work with Microsoft Word documents in OpenOffice.org Writer.
Figure 6-2: The KOffice Workspace lets you work with multiple KDE office applications at once.
Figure 6-3: Simple markup is required to create man pages.
Figure 6-4: Man page formatting adds headers and lays out the page of text.
Figure 6-5: Create a simple letter using mm macros.
Figure 6-6: Add headings and approval lines automatically to memos.
Figure 6-7: Produce equations in documents with the use of the eqn command’s .EQ and .EN macros.
Figure 6-8: Set how text is justified and put in columns with the use of the tbl command’s .TS and .TE macros.
Figure 6-9: Create simple flow diagrams with the pic command’s .PS and .PE macros.
Figure 6-10: Create LaTeX documents graphically with the LyX editor.
Figure 6-11: The DocBook file is output in HTML with the db2html command.
Figure 6-12: Display PDF files in the Adobe Acrobat Reader.
Figure 6-13: GIMP is a powerful tool for graphic manipulation.
Figure 6-14: Grab a picture of your desktop or selected window with Screen Capture.
Figure 6-15: Edit bitmap images with KPaint.
Chapter 7: Playing Games with Fedora
Figure 7-1: In the xboard window, you can set xgame to either play against the computer or to replay saved games.
Figure 7-2: Play Freeciv to build civilizations and compete against others.
Figure 7-3: Choose a nation to begin Freeciv.
Figure 7-4: Quake III Arena is a popular first-person shooter game that runs in Linux.
Figure 7-5: Return to Castle Wolfenstein combines strange creatures and WWII battles.
Figure 7-6: Use the Point2Play window to check computer hardware for Cedega gaming.
Figure 7-7: Civilization: Call to Power features excellent graphics and network play.
Figure 7-8: Use warriors, archers, and dwarves to battle in Myth II.
Chapter 8: Multimedia in Fedora
Figure 8-1: The Audio Devices (system-config-soundcard) window detects your sound card.
Figure 8-2: Play CDs and store artist, title, and track information with gnome-cd.
Figure 8-3: Defining where you store your music.
Figure 8-4: Viewing a music library with Rhythmbox.
Figure 8-5: Rhythmbox playing Internet radio.
Figure 8-6: Play Ogg Vorbis and other audio files from the XMMS playlist.
Figure 8-7: Connect to ILS servers to video-conference with GnomeMeeting.
Figure 8-8: Play video CDs, MP3s, QuickTime, and other video formats with xine.
Figure 8-9: Download images from digital cameras with the gThumb image viewer.
Figure 8-10: Master and burn CDs and DVDs using the K3b window.
Figure 8-11: Rip and play songs from the Grip window.
Figure 8-12: Generate CD jewel case labels with cdlabelgen and print them with ggv.
Chapter 9: Tools for Using the Internet and the Web
Figure 9-1: Many Web pages contain text, images, headings, and links.
Figure 9-2: Mozilla is the open-source Web browser based on Netscape source code.
Figure 9-3: Change settings for navigating the Web from Mozilla’s Preferences window.
Figure 9-4: Display information about a Web page by selecting Page Info.
Figure 9-5: Firefox makes it easy to search, do tabbed browsing, and get plugins in a secure way
Figure 9-6: Evolution can be used to manage your mail, appointments, and tasks.
Figure 9-7: Manage your e-mail from the Mozilla Mail window.
Figure 9-8: Thunderbird is an efficient e-mail client that includes advanced junkmail and message filtering.
Figure 9-9: Access your AOL Instant Messaging using Gaim.
Figure 9-10: View local and remote files simultaneously from the gFTP window.
Chapter 10: Understanding System Administration
Figure 10-1: Enter the root password to open system administration windows from a regular user’s GUI.
Figure 10-2: Choose an NTP server or set date and time in the Date/Time Properties window.
Figure 10-3: Show log files of activities from system boot, FTP, mail, news, and other services.
Figure 10-4: Join multiple RAID partitions to form a single RAID device.
Figure 10-5: System Monitor graphically displays your system’s CPU and memory usage.
Figure 10-6: Running processes appear in CPU usage order by default in the top window.
Figure 10-7: View battery status and change preferences with the Battery Charge Monitor.
Figure 10-8: The Red Hat Network alert notification tool appears as a round icon on your desktop panel.
Chapter 11: Setting Up and Supporting Users
Figure 11-1: Manage users from the User Manager window.
Figure 11-2: The Create New User window
Figure 11-3: Choose Properties to modify an existing user account.
Chapter 12: Automating System Tasks
Figure 12-1: Reorganize, add, and remove run-level scripts from the Service Configuration window.
Chapter 14: Computer Security Issues
Figure 14-1: Using iptables as a firewall between the Internet and a LAN.
Figure 14-2: Display system log files in the System Logs window.
Figure 14-3: A pop-up window alerts you when a site is not authenticated.
Chapter 15: Setting Up a Local Area Network
Figure 15-1: In a star topology, machines on the network connect to a central hub.
Figure 15-2: A bus topology chains computers together without using a hub.
Figure 15-3: Wireless LANs can communicate as peers by broadcasting data.
Figure 15-4: Wireless communication can go through an access point.
Figure 15-5: A star topology's twisted-pair cables have RJ-45 connectors (similar to telephone- cable connectors).
Figure 15-6: Configure your LAN interface using the Network Configuration window.
Figure 15-7: Add hosts to /etc/hosts using the Network Configuration window.
Figure 15-8: Configure TCP/IP on Windows XP for your Ethernet LAN.
Figure 15-9: The distance of obstructive objects from the wireless signal is called the
clearance
.
Figure 15-10: Add a wireless interface using the Network Configuration window.
Figure 15-11: Configure your Ethernet card for TCP/IP during installation.
Chapter 16: Connecting to the Internet
Figure 16-1: The Internet Configuration Wizard helps you set up a PPP Internet connection.
Figure 16-2: The Preferences window identifies proxy servers and port numbers in Mozilla.
Figure 16-3: The Local Area Network Settings window lets you add proxies to Internet Options in Internet Explorer.
Chapter 17: Setting Up a Print Server
Figure 17-1: Add printers connected locally or remotely with the Printer configuration window.
Figure 17-2: CUPS enables Web-based administration via port 631.
Figure 17-3: Temporarily stop printing or print test pages from the Printers page.
Figure 17-4: Find and display your Samba printer from Find: Computer.
Chapter 18: Setting Up a File Server
Figure 18-1: NFS can make selected file systems available to other computers.
Figure 18-2: Identify a directory to share and access permissions with the NFS Server Configuration window.
Figure 18-3: Define the workgroup and description for your Samba server.
Figure 18-4: Fill in Security information for your Samba server.
Figure 18-5: Use SWAT from your browser to manage your Samba configuration.
Figure 18-6: View your Linux Samba server from the Network Neighborhood window.
Chapter 19: Setting Up a Mail Server
Figure 19-1: Add a logo to SquirrelMail and let users login from the Web to get mail.
Figure 19-2: Manage your mail from multiple folders in SquirrelMail.
Figure 19-3: Create multiple mailing lists in mailman.
Chapter 21: Setting Up a Web Server
Figure 21-1: Appearance of the Test Page indicates that the Apache installation succeeded.
Figure 21-2: Change how directories are displayed from Apache using IndexOptions.
Figure 21-3: The server-info page displays server and module information.
Figure 21-4: The Apache server-status page displays general Apache information and reports on individual server process activities.
Figure 21-5: Webalizer displays Web data in chart and column formats.
Chapter 22: Setting Up an LDAP Address Book Server
Figure 22-1: Enter information about your LDAP directory server to search for addresses from Mozilla Mail.
Figure 22-2: Search an LDAP address book directory by name, e-mail address, or other information.
Chapter 25: Making Servers Public with DNS
Figure 25-1: The sample
yourdomain.com
DNS server has a combination of public servers and private client computers.
Chapter 26: Using Linux Servers from a Mac
Figure 26-1: Configure your Mac OS X network interface to connect to Linux servers.
Figure 26-2: In Mac OS X, see Samba and AppleTalk shares from the Connect to Server window.
Figure 26-3: Select authentication options when you connect to your AppleTalk (netatalk) server.
Figure 26-4: After requesting a Samba share, you must authenticate to the server.
Figure 26-5: Connect to an NFS server from the Connect to Server window.
Chapter 28: Implementing Security Enhanced Linux
Figure 28-1: Change SELinux policy settings using the Security Level Configuration window.
Figure 28-2: View messages related to SELinux activity in the seAudit window.
Figure 28-3: Change and rebuild SELinux policies from the SePCuT window.
Appendix C: Running Network Services
Figure C-1: Change your default mail-transport agent with system-switch-mail.
Previous page
Table of content
Next page
Red Hat Fedora Linux 3 Bible
ISBN: 0764578723
EAN: 2147483647
Year: 2005
Pages: 286
Authors:
Christopher Negus
BUY ON AMAZON
Crystal Reports 9 on Oracle (Database Professionals)
Connectivity, Authentication, and Privileges
Oracle Structures
Optimizing: The Oracle Side
Optimizing: Reducing Parses
Other Tips
CISSP Exam Cram 2
How to Prepare for the Exam
Physical Security
Honeypots
Answers to Exam Prep Questions
Answer Key
Inside Network Security Assessment: Guarding Your IT Infrastructure
Why Risk Assessment
Best Practices for Quantitative and Qualitative Risk Assessment
Determining the Next Step
Vulnerability Management
Executive Summary
MySQL Clustering
Startup Phases
Common Errors While Importing Tables
Performance Metrics
Load Balancing and Failover
A MySQL Cluster Binaries
The New Solution Selling: The Revolutionary Sales Process That Is Changing the Way People Sell [NEW SOLUTION SELLING 2/E]
Chapter One Solutions
Chapter Two Principles
Chapter Five Stimulating Interest
Chapter Twelve Controlling the Buying Process
Appendix A Value Justification Example
File System Forensic Analysis
Bibliography
Bibliography
NTFS Data Structures
Inodes
Bibliography
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies