Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 3: Getting Started with the Desktop
Table 3-1: Metacity Keyboard Shortcuts
Table 3-2: Mouse Actions
Chapter 4: Using Linux Commands
Table 4-1: Keystrokes for Navigating Command Lines
Table 4-2: Keystrokes for Editing Command Lines
Table 4-3: Keystrokes for Cutting and Pasting Text in Command Lines
Chapter 5: Accessing and Running Applications
Table 5-1: Windows-Equivalent Linux Applications
Table 5-2: Linux Archive File Formats
Table 5-3: Linux Document Formats
Table 5-4: mtools Available with Linux
Table 5-5: Microsoft Windows Drive Letters in WINE
Chapter 6: Publishing with Fedora
Table 6-1: man Macros
Chapter 7: Playing Games with Fedora
Table 7-1: GNOME Games
Table 7-2: Games for the KDE Desktop
Chapter 8: Multimedia in Fedora
Table 8-1: Sound Formats Supported by the sox Utility
Chapter 9: Tools for Using the Internet and the Web
Table 9-1: Protocols in Web URLs
Chapter 11: Setting Up and Supporting Users
Table 11-1: useradd Command Options
Table 11-2: useradd Options for Changing User Defaults
Table 11-3: usermod Options for Changing Existing Accounts
Table 11-4: Using find to Locate and Change User Files
Chapter 12: Automating System Tasks
Table 12-1: Examples of bash Parameter Expansion
Table 12-2: Operators for Test Expressions
Table 12-3: Valid init Actions
Table 12-4: Possible Run Levels
Table 12-5: Run-Level Scripts Contained in /etc/init.d
Table 12-6: Samples for Specifying Times in an at Job
Table 12-7: Valid /etc/crontab Field Values
Chapter 13: Backing Up and Restoring Files
Table 13-1: Comparison of Common Backup Media
Table 13-2: Programs in the dump Package
Table 13-3: Options to dump
Table 13-4: Recommended dump Schedule
Table 13-5: Restore Command Options
Table 13-6: Interactive restore Commands
Table 13-7: Backup Commands Used with Amanda
Table 13-8: Examples of pax Use
Table 13-9: Options to pax
Chapter 14: Computer Security Issues
Table 14-1: netstat Parameters
Table 14-2: Socket States
Table 14-3: Log Files in the /var/log Directory
Table 14-4: Message Levels
Table 14-5: Ideas for Good Passwords
Chapter 15: Setting Up a Local Area Network
Table 15-1: Supported Wireless Network Adapters and Modules
Table 15-2: Options for the iwconfig Command
Table 15-3: Private IP Addresses
Chapter 19: Setting Up a Mail Server
Table 19-1: File Prefixes in /var/spool/mqueue
Table 19-2: Other Related Sendmail Programs
Chapter 21: Setting Up a Web Server
Table 21-1: Dynamic Shared Object (DSO) Modules
Table 21-2: Special Server Features for the Options Directive
Table 21-3: Special Access Features for the AllowOverride Directive
Table 21-4: UserDir Path Name and URL Examples
Table 21-5: Available Tokens within LogFormat
Table 21-6: HTTP Response Codes
Table 21-7: Command-Line Arguments to httpd
Chapter 23: Setting Up Boot Servers: DHCP and NIS
Table 23-1: Data Types
Table 23-2: DHCP Options
Chapter 24: Setting Up a MySQL Database Server
Table 24-1: Option Groups Associated with MySQL Commands
Table 24-2: Numeric Data Types for Columns
Table 24-3: Time/Date Data Types for Columns
Table 24-4: String Data Types for Columns
Chapter 25: Making Servers Public with DNS
Table 25-1: Zones and Related Zone Files in DNS Example
Previous page
Table of content
Next page
Red Hat Fedora Linux 3 Bible
ISBN: 0764578723
EAN: 2147483647
Year: 2005
Pages: 286
Authors:
Christopher Negus
BUY ON AMAZON
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 1.1 Install OpenSSH to Replace the Remote Access Protocols with Encrypted Versions
Step 2.1 Use the OpenSSH Tool Suite to Replace Clear-Text Programs
Step 3.2 Use PuTTY / plink as a Command Line Replacement for telnet / rlogin
Step 3.3 Use WinSCP as a Graphical Replacement for FTP and RCP
Step 4.2 Passphrase Considerations
High-Speed Signal Propagation[c] Advanced Black Magic
Necessary Mathematics: Input Impedance and Transfer Function
Effect of Inadequate Sampling Rate
Embellishments
Checking the Output of Your FFT Routine
Power Supply Filtering for Clock Sources, Repeaters, and PLL Circuits
Network Security Architectures
Network Security Is a System
Applied Knowledge Questions
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
Setting the Routers Time
Asynchronous Ports (TTYs)
RIP
Traffic Policing
Basic Switch Configuration
PMP Practice Questions Exam Cram 2
Exam Prep Questions
Project Execution
Answers and Explanations
Exam Prep Questions
Answers and Explanations
Java All-In-One Desk Reference For Dummies
Welcome to Java
Book III - Object-Oriented Programming
Network Programming
Using JavaBeans
Database for $100, Please
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies