Flylib.com
Solaris Operating Environment Boot Camp
Solaris Operating Environment Boot Camp
ISBN: 0130342874
EAN: 2147483647
Year: 2002
Pages: 301
Authors:
David Rhodes
,
Dominic Butler
BUY ON AMAZON
Main Page
Table of Contents
Copyright
Introduction
Objectives
Chapter Format
Conventions Used
Code Examples
Public Domain Tools
Acknowledgments
Chapter 1. The System Administrator s Role
The Importance of a System Administrator
Who Is the System Administrator?
Chapter 2. Booting and Halting the System
Objectives
Switching On
The Boot Process
Solaris Processes
Switching Off
The OpenBoot PROM
Chapter 3. User Administration
Objectives
What Are Users?
What Are Groups?
UIDs and GIDs
Password File
Shadow File
Group File
Primary and Secondary Groups
The Implementation
Using RBAC
Creating a Custom Script
Checking the Files
Conclusion
Chapter 4. Permissions and All That
Objectives
Why Do We Need Permissions?
How Permissions Are Represented
Setting Permissions
Access Control Lists
The Implementation
Octal Permissions Lookup Table
Chapter 5. Shells
Objectives
What Is a Shell?
What Shells? C Shells?
Shell Variables
Assigning Shells to Users
Running Commands
Wildcards
Hiding Things from the Shell
Command Substitution
Shortcuts
What Else Does the Shell Do?
Shell Start-Up Files
The Implementation
Example Shell Scripts
Chapter 6. The Filesystem and Its Contents
Objectives
What Is a Filesystem?
Why Do We Use Filesystems?
Preparing the Disk to Receive Filesystems
What Type of Filesystem Should We Use?
Creating and Removing Filesystems
Files and Directories
Log Files
The Implementation
Chapter 7. Swap Space
Objectives
Swapping and Paging
The Scheduler
How Big Should It Be?
Swap Locations
Monitoring Swap Space
Chapter 8. Administering Packages
Objectives
What Is a Package?
Using Packages
What Packages Have I Got Loaded?
Adding, Removing, and Checking Packages
Dissecting a Package
Advanced Concepts
Creating Your Own Packages
Chapter 9. Patching the System
Objectives
What Are Patches?
Files and Their Locations
Determining What s Installed
Adding Patches
Obsolete Patches
Removing Patches
Checking the System
Chapter 10. Administering Quotas
Objectives
What Are Quotas?
Enabling Quotas
Configuring the User s Quotas
Checking the Limits
Setting Default User Quotas
Disabling User Quotas
Automatically Checking the Limits
Should We Use Them?
Chapter 11. Connecting to the Local Area Network
Objectives
Description
IP Addressing Schemes
Choosing an IP Address
Our Values
Naming Systems
Host Names
Loopback Interface
Initial Network Testing
Configuring the Interface
Routing
Connecting the Second Subnet
Adding the Gateway
Routing A Second Look
Address Resolution
IPV6 The Next Generation
Traceroute
Conclusion
Chapter 12. Naming Services and NIS
Objectives
Naming Services
Name Service Switch File
How NIS Works
NIS Domain Names
NIS Maps
Machine Types and Daemons
Our Machines
Build the Master Server
Build the Clients
Build the Slave Servers
The Server Map
Map Propagation
Customizing NIS
NIS Passwords
Disabling NIS
Chapter 13. Connecting to the Internet
Objectives
The Design
Allocating an IP Address
Configuring the Interface
Adding a Default Route
Enabling Host Name Resolving
Checking the Connection
Configuring the Remaining Systems
Multiple Default Routes
Chapter 14. Connecting Serial Devices
Objectives
Serial Communication
Synchronous versus Asynchronous
Speed
Serial Devices
Serial Ports
Service Access Facility
Remove Existing Port Monitors
Adding a Terminal
Ttyadm
Line Settings
Consoles and Serial Ports
Adding a Modem
Conclusion
Chapter 15. Dialing in with PPP
Objectives
Point-to-Point Protocol
Why Use PPP?
The Components
The System
Building the Connection
The Serial Port
UUCP
PPP
Host Name Resolving
Name Service Caching
Routing
The Completed Network
Custom Scripts
Conclusion
Chapter 16. Configuring DNS
Objectives
What Is the Domain Name System?
Why Do We Need It?
DNS Hierarchy
Servers and Resolving
Zones
Is It DNS, BIND, or Named?
Our Configuration
Zone Files
Master Server
resolv.conf File
Starting Named
Slave Server
Testing the Servers
Enabling Resolving
Configuring the Clients
Conclusion
Chapter 17. Adding SCSI Devices
Objectives
Introduction
What Is SCSI?
Solaris Devices
Adding the Disk
Configuring LUNs
Adding the Tape Drive
SCSI Options
Chapter 18. NFS, DFS, and Autofs
Objectives
Network Filesystem
Distributed Filesystem
Autofs
The Build Order
Remote Procedure Call
Configuring the Server
Setting Up the Clients
Server Share Options
Access Lists
Client Mount Options
Authentication
The Autofs
Our Configuration
Metacharacters
Client Failover
Testing
Naming Services and Autofs
Conclusion
Chapter 19. Time, Date, and NTP
Objectives
Introduction
System Time
Host Names
Rdate
Network Time Protocol
How NTP Works
Our Configuration
Which Is Best?
Chapter 20. Setting Up The Mail System
Objectives
What Is Mail?
Mail Protocols
DNS and Mail
Sendmail
M4
Sendmail and M4
Our Configuration
Aliases
Conclusion
Chapter 21. Kernels and All About Them
Objectives
What Is the Kernel?
How Does It All Fit Together?
Troubleshooting
Kernel Modules
The Etcsystem File
Kernel Messages
Chapter 22. Backing Up and Restoring the System
Objectives
Why Do We Need a Backup Strategy?
What Is a Backup Strategy?
How Do We Back Up the System?
Remote Backups
Backup Consistency
The Implementation
Appendix A. Settings Used Throughout the Book
Overview
Appendix B. Security Checklist
Objectives
Description
User Security
File Security
Network Security
General Security
INDEX
SYMBOL
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Solaris Operating Environment Boot Camp
ISBN: 0130342874
EAN: 2147483647
Year: 2002
Pages: 301
Authors:
David Rhodes
,
Dominic Butler
BUY ON AMAZON
CISSP Exam Cram 2
TELECOMMUNICATIONS AND NETWORK SECURITY
APPLICATION AND SYSTEMS-DEVELOPMENT SECURITY
Taking a Certification Exam
Access-Control Systems and Methodology
Practice Exam Questions
Building Web Applications with UML (2nd Edition)
Role of Modeling
Requirements
The User Experience
Analysis Model Structure
Background
Managing Enterprise Systems with the Windows Script Host
Shell Operations
Input/Output Streams
Network Administration/WMI
Internet Information Server
Exchange Server
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Additional information
Case #2 background: Transit Line Systems Inc.
Message exchange patterns
Anatomy of a service-oriented architecture
SOA support in .NET
What is Lean Six Sigma
Key #1: Delight Your Customers with Speed and Quality
Key #2: Improve Your Processes
Key #4: Base Decisions on Data and Facts
Making Improvements That Last: An Illustrated Guide to DMAIC and the Lean Six Sigma Toolkit
The Experience of Making Improvements: What Its Like to Work on Lean Six Sigma Projects
Visual Studio Tools for Office(c) Using C# with Excel, Word, Outlook, and InfoPath
Events in the Word Object Model
Data Source Events
Introduction
Caching Data in the Data Island
Advanced XML Features in Excel
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies