Flylib.com
Red Hat Fedora Linux 3 Bible
Red Hat Fedora Linux 3 Bible
ISBN: 0764578723
EAN: 2147483647
Year: 2005
Pages: 286
Authors:
Christopher Negus
BUY ON AMAZON
Table of Contents
Back Cover
Red Hat Fedora Linux 3 Bible
Preface
This Books Learn-Through-Tasks Approach
What You Need
Red Hat Fedora Linux 3 Bible Improvements
Conventions Used in This Book
How This Book Is Organized
About the Companion DVD
About the Companion Web Site
Reach Out
Acknowledgments
Part I: Getting Started in Fedora
Chapter 1: An Overview of Fedora
Introducing Fedora and Red Hat Enterprise Linux
What Is Linux?
Linuxs Roots in UNIX
Common Linux Features
Primary Advantages of Linux
What Are Red Hat Enterprise Linux and Fedora?
Why Choose Fedora or Red Hat Enterprise Linux?
Features in Fedora Core 3
The Culture of Free Software
Summary
Chapter 2: Installing Fedora
Quick Installation
Detailed Installation Instructions
Installing More Fedora Packages
Special Installation Procedures
Special Installation Topics
Troubleshooting Your Installation
Summary
Chapter 3: Getting Started with the Desktop
Logging in to Fedora
Getting Familiar with the Desktop
Using the GNOME Desktop
Switching Desktop Environments
Using the KDE Desktop
Troubleshooting Your Desktop
Summary
Chapter 4: Using Linux Commands
The Shell Interface
Understanding the Linux Shell
Using the Shell in Linux
Working with the Linux File System
Using the vi Text Editor
Summary
Part II: Using Fedora
Chapter 5: Accessing and Running Applications
Using Fedora as an Application Platform
Finding Common Desktop Applications in Linux
Obtaining Fedora Applications
Installing Fedora Applications
Running X Window Applications
Running Microsoft Windows, DOS, and Macintosh Applications
Summary
Chapter 6: Publishing with Fedora
Using OpenOffice.org
Other Word Processors
Using Traditional Linux Publishing Tools
Creating Documents in Groff or LaTeX
Printing Documents with Fedora
Displaying Documents with Ghostscript and Acrobat
Working with Graphics
Using Scanners Driven by SANE
Summary
Chapter 7: Playing Games with Fedora
Basic Linux Gaming Information
Running X Window Games
Finding Commercial Linux Games
Summary
Chapter 8: Multimedia in Fedora
Listening to Audio
Viewing TV and Webcams
Playing Video
Using a Digital Camera
Recording Music CDs
Summary
Chapter 9: Tools for Using the Internet and the Web
Browsing the Web
Communicating with E-mail
Participating in Newsgroups
Instant Messaging with Gaim
Using Remote Login, Copy, and Execution
Summary
Part III: Administering Fedora
Chapter 10: Understanding System Administration
Using the root Login
Becoming Super User (The su Command)
Learning about Administrative GUI Tools, Commands, Configuration Files, and Log Files
Administering Your Fedora System
Configuring Hardware
Managing File Systems and Disk Space
Monitoring System Performance
Choosing Software Alternatives
Getting Linux Software up2date
Summary
Chapter 11: Setting Up and Supporting Users
Creating User Accounts
Setting User Defaults
Creating Portable Desktops
Providing Support to Users
Modifying Accounts
Deleting User Accounts
Checking Disk Quotas
Sending Mail to All Users
Summary
Chapter 12: Automating System Tasks
Understanding Shell Scripts
System Initialization
System Startup and Shutdown
Scheduling System Tasks
Summary
Chapter 13: Backing Up and Restoring Files
Doing a Simple Backup with rsync
Selecting a Backup Strategy
Selecting a Backup Medium
Backing Up to a Hard Drive
Backing Up Files with dump
Automating Backups with cron
Restoring Backed Up Files
Configuring Amanda for Network Backups
Using the pax Archiving Tool
Summary
Chapter 14: Computer Security Issues
Understanding Attack Techniques
Protecting Against Denial-of-Service Attacks
Protecting Against Distributed DOS Attacks
Protecting Against Intrusion Attacks
Protecting Your Network with Firewalls
Detecting Intrusions from Log Files
Monitoring Log Files with LogSentry
Using Password Protection
Using Encryption Techniques
Guarding Your Computer with PortSentry
Summary
Part IV: Fedora Network and Server Setup
Chapter 15: Setting Up a Local Area Network
Understanding Local Area Networks
Setting Up a Wireless LAN
Understanding Internet Protocol Addresses
Troubleshooting Your LAN
Summary
Chapter 16: Connecting to the Internet
Understanding How the Internet Is Structured
Using Dial-up Connections to the Internet
Connecting Your LAN to the Internet
Setting up Fedora as a Router
Configuring a Virtual Private Network Connection
Setting up Fedora as a Proxy Server
Setting up Proxy Clients
Summary
Chapter 17: Setting Up a Print Server
Common UNIX Printing Service
Setting Up Printers
Working with CUPS Printing
Using Printing Commands
Configuring Print Servers
Summary
Chapter 18: Setting Up a File Server
Goals of Setting Up a File Server
Setting Up an NFS File Server
Setting Up a Samba File Server
Summary
Chapter 19: Setting Up a Mail Server
Introducing SMTP and sendmail
Installing and Running sendmail
Configuring sendmail
Introducing Postfix
Stopping Spam with SpamAssassin
Getting Mail from the Server (POP3 or IMAP)
Getting mail from your browser with Squirrelmail
Administering a Mailing List with mailman
Summary
Chapter 20: Setting Up an FTP Server
Understanding FTP Servers
Using the Very Secure FTP Server
Getting More Information about FTP Servers
Summary
Chapter 21: Setting Up a Web Server
Introduction to Web Servers
Quick Starting the Apache Web Server
Configuring the Apache Server
Starting and Stopping the Server
Monitoring Server Activities
Summary
Chapter 22: Setting Up an LDAP Address Book Server
Understanding LDAP
Setting Up the OpenLDAP Server
Setting up the Address Book
More ways to configure LDAP
Accessing Your Address Book from Mozilla Mail
Summary
Chapter 23: Setting Up Boot Servers: DHCP and NIS
Using Dynamic Host Configuration Protocol
Setting Up a DHCP Server
Setting Up a DHCP Client
Understanding Network Information Service
Setting Up Fedora as an NIS Client
Setting Up Fedora as an NIS Master Server
Setting Up Fedora as an NIS Slave Server
NIS and Active Directory
Summary
Chapter 24: Setting Up a MySQL Database Server
Finding MySQL Packages
Configuring the MySQL Server
Starting the MySQL Server
Checking That MySQL Server Is Working
Working with MySQL Databases
Understanding MySQL Tables
Displaying MySQL Databases
Making Changes to Tables and Records
Adding and Removing User Access
Backing up Databases
Checking and Fixing Databases
Summary
Chapter 25: Making Servers Public with DNS
Determining Goals for Your Server
Connecting a Public Server
Configuring Your Public Server
Setting Up a Domain Name System Server
Getting More Information about BIND
Summary
Chapter 26: Using Linux Servers from a Mac
Looking Inside Mac OS X
Using Network Services from Mac OS X
Configuring an AppleTalk Server in Linux
Accessing NFS Servers from the Mac
Summary
Part V: New Technology
Chapter 27: Adopting the Linux 2.6 Kernel
Familiarizing Yourself with the Kernel
Improvements to Desktop Performance
Improvements to Laptop Support
Improvements to Server Performance
Improvements in Hardware Support
Using the 2.6 Kernel Beyond Fedora Core
Summary
Chapter 28: Implementing Security Enhanced Linux
Understanding Security Enhanced Linux
Using SELinux in Fedora Core 3
Learning More about SELinux
Summary
Appendix A: About the DVD-ROM
Fedora Source Code
Fedora Rescue CD
Appendix B: Fedora Core 3 RPMs
Comparing Fedora and Enterprise Packages
Removed Packages
Red Hat Linux Packages on the DVD
Appendix C: Running Network Services
Checklist for Running Networking Services
Networking Service Daemons
Choosing Alternatives
Referencing Network Services
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y-Z
List of Figures
List of Tables
List of Sidebars
Red Hat Fedora Linux 3 Bible
ISBN: 0764578723
EAN: 2147483647
Year: 2005
Pages: 286
Authors:
Christopher Negus
BUY ON AMAZON
Beginning Cryptography with Java
Message Digests, MACs, and HMACs
Key and Certificate Management Using Keystores
CMS and S/MIME
Appendix A Solutions to Exercises
Appendix C Using the Bouncy Castle API for Elliptic Curve
OpenSSH: A Survival Guide for Secure Shell Handling (Version 1.0)
Step 4.2 Passphrase Considerations
Step 4.3 How to Generate a Key Pair Using OpenSSH
Step 4.6 How to use PuTTY Passphrase Agents
Step 5.2 Troubleshooting Common OpenSSH Errors/Problems
Conclusion
Adobe After Effects 7.0 Studio Techniques
Looping Animations
Dynamic Range
Particulate Matter
Fire
All Hail Reference
Documenting Software Architectures: Views and Beyond
Elements, Relations, and Properties of the Allocation Viewtype
Discussion Questions
Summary Checklist
Overview
For Further Reading
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 7. Send SMS from a PowerBook
Hack 12. Send SMS from Linux
Hack 36. Estimate Network Performance
Hack 43. Control Wireless Access by MAC
Hack 96. Establish Line of Sight
PMP Practice Questions Exam Cram 2
Answers and Explanations
Answers and Explanations
Project PlanningFacilitating Processes
Project Execution
Answers and Explanations
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies