Chapter 10: Understanding System Administration


Overview

In This Chapter

  • Using the root login

  • Administrative commands, configuration files, and log files

  • Graphical administration tools

  • Working with the file system

  • Working with hardware devices

  • Monitoring system performance

  • Managing battery power on laptops

  • Using Security Enhanced Linux

Fedora and Red Hat Enterprise Linux, like other UNIX systems, were intended for use by more than one person at a time. Multiuser features allow many people to have accounts in Linux, with their data kept secure from others. Multitasking allows many people to use the computer at the same time. Sophisticated networking protocols and applications make it possible for a Linux system to extend its capabilities to network users and computers around the world. The person assigned to manage all of this stuff is referred to as the system administrator.

Even if you are the only person using a Linux system, system administration is still set up to be separate from other computer use. To do most administrative tasks , you need to be logged in as the root user (also referred to as the super user ) or gain temporary root privilege. Other users cannot change, or in some cases, even see some of the configuration information for a Linux system. In particular, security features such as passwords are protected from general view.

This chapter describes the general principles of Fedora and RHEL system administration. In particular, this chapter covers some of the basic tools you need to administer your Linux system. It also helps you learn how to work with file systems and monitor the setup and performance of your Linux system.

Security Enhanced Linux (SELinux) adds another dimension to administering a Fedora or RHEL system. Instead giving the root user full control of the entire Linux system, access to data, programs, devices, and processes can be assigned to different roles. Because Fedora is delivered with only a limited set of SELinux features turned on ( targeted policy), the root user maintains most of its traditional role (whether SELinux is off or on). SELinux is described at the end of this chapter.




Fedora 6 and Red Hat Enterprise Linux Bible
Fedora 6 and Red Hat Enterprise Linux Bible
ISBN: 047008278X
EAN: 2147483647
Year: 2007
Pages: 279

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net