Fedora® 10 and Red Hat® Enterprise Linux® Bible

Book description

As a market-leading, free, open-source Linux operating system (OS), Fedora 10 is implemented in Red Hat Enterprise Linux and serves as an excellent OS for those who want more frequent updates. Bestselling author Christopher Negus offers an ideal companion resource for both new and advanced Linux users. He presents clear, thorough instructions so you can learn how to make Linux installation simple and painless, take advantage of the desktop interface, and use the Linux shell, file system, and text editor. He also describes key system administration skills, including setting up users, automating system tasks, backing up and restoring files, and understanding the latest security issues and threats. Included is both a DVD distribution of Fedora Linux 10 and a bootable Fedora LiveCD.

Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Table of contents

  1. Copyright
  2. About the Authors
  3. Credits
  4. Acknowledgments
  5. Preface
    1. Who Are You?
    2. This Book's Learn-Through-Tasks Approach
    3. What You Need
    4. Fedora 10 and Red Hat Enterprise Linux Bible Improvements
    5. Conventions Used in This Book
    6. How This Book Is Organized
      1. Part I: Getting Started in Fedora and RHEL
      2. Part II: Using Fedora and RHEL
      3. Part III: Administering Fedora and RHEL
      4. Part IV: Fedora and RHEL Network and Server Setup
      5. Appendixes
    7. About the Companion Media
    8. About the Companion Web Site
    9. Reach Out
  6. I. Getting Started in Fedora and RHEL
    1. 1. An Overview of Fedora and Red Hat Enterprise Linux
      1. 1.1. Introducing Fedora 10 and Red Hat Enterprise Linux
      2. 1.2. What Is Linux?
      3. 1.3. Linux's Roots in UNIX
        1. 1.3.1. What Is an Operating System?
      4. 1.4. Common Linux Features
      5. 1.5. Primary Advantages of Linux
      6. 1.6. What Are Red Hat Enterprise Linux and Fedora?
        1. 1.6.1. Red Hat forms the Fedora Project
        2. 1.6.2. Red Hat shifts to Red Hat Enterprise Linux
        3. 1.6.3. Choosing between Fedora and Enterprise
      7. 1.7. Why Choose Fedora or Red Hat Enterprise Linux?
      8. 1.8. New Features in Fedora 10
        1. 1.8.1. Better Printing
        2. 1.8.2. FirstAidKit
        3. 1.8.3. OpenOffice.org 3
        4. 1.8.4. Faster Boot Times
        5. 1.8.5. K Desktop Environment (KDE) 4
        6. 1.8.6. PackageKit Software Management
        7. 1.8.7. Firefox 3 Web browser
        8. 1.8.8. Preupgrade
        9. 1.8.9. Ext4 file systems
        10. 1.8.10. Encrypted file systems
        11. 1.8.11. Identity management with freeIPA
        12. 1.8.12. NetworkManager
        13. 1.8.13. Getting custom Fedora spins
        14. 1.8.14. Creating your own spins
        15. 1.8.15. Firewall Configuration
      9. 1.9. The Culture of Free Software
      10. 1.10. Summary
    2. 2. Installing Fedora
      1. 2.1. Understanding Fedora Installation Media
      2. 2.2. Using the Fedora 10 Live CD
      3. 2.3. Quick Installation
      4. 2.4. Detailed Installation Instructions
        1. 2.4.1. Installing Fedora 10
        2. 2.4.2. Choosing an installation method
          1. 2.4.2.1. Install or upgrade?
          2. 2.4.2.2. From DVD, network, or hard disk?
        3. 2.4.3. Choosing computer hardware
        4. 2.4.4. Installing Fedora on a Laptop
        5. 2.4.5. Preparing for installation using the live CD
          1. 2.4.5.1. Display hardware information
          2. 2.4.5.2. Test your hardware
        6. 2.4.6. Beginning the installation
        7. 2.4.7. Choosing Different Install Modes
        8. 2.4.8. Running Fedora Firstboot
        9. 2.4.9. Enabling Authentication
        10. 2.4.10. Going forward after installation
      5. 2.5. Special Installation Procedures
        1. 2.5.1. Alternatives for starting installation
          1. 2.5.1.1. Booting installation from hard disk
          2. 2.5.1.2. Booting installation from a USB device
          3. 2.5.1.3. Booting installation using PXE
        2. 2.5.2. Installing from other media
          1. 2.5.2.1. Beginning installation
          2. 2.5.2.2. Setting up an HTTP, FTP, or NFS install server
            1. 2.5.2.2.1. Configuring an install server using files
            2. 2.5.2.2.2. Configuring an install server using disk images
            3. 2.5.2.2.3. NFS server
            4. 2.5.2.2.4. Web server
            5. 2.5.2.2.5. FTP server
            6. 2.5.2.2.6. Hard disk install
        3. 2.5.3. Starting a VNC install
        4. 2.5.4. Performing a kickstart installation
          1. 2.5.4.1. Creating the kickstart file
          2. 2.5.4.2. Installing the kickstart file
          3. 2.5.4.3. Booting a kickstart installation
      6. 2.6. Special Installation Topics
        1. 2.6.1. Setting up to dual-boot Linux and Windows
          1. 2.6.1.1. Resizing your Windows partitions
          2. 2.6.1.2. Using Windows partitions from Linux
        2. 2.6.2. Partitioning your disks
          1. 2.6.2.1. Partitioning with Disk Setup during installation
            1. 2.6.2.1.1. Reasons for partitioning
            2. 2.6.2.1.2. Deleting, adding, and editing partitions
          2. 2.6.2.2. Partitioning with fdisk
          3. 2.6.2.3. Tips for creating partitions
        3. 2.6.3. Using the GRUB boot loader
          1. 2.6.3.1. Temporarily changing boot options
          2. 2.6.3.2. Permanently changing boot options
          3. 2.6.3.3. Adding a new GRUB boot image
      7. 2.7. Troubleshooting Installation
      8. 2.8. Spinning Your Own Fedora Install or Live Media
      9. 2.9. Summary
    3. 3. Getting Started with the Desktop
      1. 3.1. Logging in to Fedora or RHEL
        1. 3.1.1. Why Do I Need a User Login?
      2. 3.2. Getting Familiar with the Desktop
        1. 3.2.1.
          1. 3.2.1.1. Touring your desktop
            1. 3.2.1.1.1. Step 1: Checking out your home folder
            2. 3.2.1.1.2. Step 2: Change some preferences
            3. 3.2.1.1.3. Step 3: Configure your panels
          2. 3.2.1.2. Tips for configuring your desktop
      3. 3.3. Using the GNOME Desktop
        1. 3.3.1. Using the Metacity window manager
        2. 3.3.2. Using the GNOME panels
          1. 3.3.2.1. Use the Applications and System menus
          2. 3.3.2.2. Adding an applet
          3. 3.3.2.3. Adding another panel
          4. 3.3.2.4. Adding an application launcher
          5. 3.3.2.5. Adding a drawer
          6. 3.3.2.6. Changing panel properties
        3. 3.3.3. Using the Nautilus file manager
        4. 3.3.4. Changing GNOME preferences
        5. 3.3.5. Managing removable media
        6. 3.3.6. Trying other GNOME applications
          1. 3.3.6.1. Taking notes with Tomboy
          2. 3.3.6.2. Checking Your Network from GNOME
        7. 3.3.7. Switching to another user
        8. 3.3.8. Exiting GNOME
      4. 3.4. Setting Up an Online Desktop
      5. 3.5. Switching Desktop Environments
      6. 3.6. Using the KDE Desktop
        1. 3.6.1. New Features in KDE 4.1
        2. 3.6.2. Starting with KDE
        3. 3.6.3. KDE desktop basics
          1. 3.6.3.1. Getting around the desktop
            1. 3.6.3.1.1. Using the mouse
            2. 3.6.3.1.2. Using keystrokes
        4. 3.6.4. Managing files with Dolphin and Konqueror File Managers
          1. 3.6.4.1. Working with files
          2. 3.6.4.2. Searching for files with Dolphin and kfind
          3. 3.6.4.3. Creating new files and folders
        5. 3.6.5. Using the Konqueror browser features
        6. 3.6.6. Configuring Konqueror and Dolphin options
        7. 3.6.7. Managing windows
          1. 3.6.7.1. Using the taskbar
          2. 3.6.7.2. Moving windows
          3. 3.6.7.3. Resizing windows
          4. 3.6.7.4. Pinning windows on top or bottom
          5. 3.6.7.5. Using virtual desktops
        8. 3.6.8. Configuring the desktop
        9. 3.6.9. Adding widgets
          1. 3.6.9.1. Adding widgets to the panel
          2. 3.6.9.2. Adding widgets to the desktop
      7. 3.7. Running 3D Accelerated Desktop Effects
      8. 3.8. Using the Xfce Desktop Environment
      9. 3.9. Troubleshooting Your Desktop
        1. 3.9.1. GUI doesn't work at start-up
        2. 3.9.2. What Happens During Desktop Startup?
        3. 3.9.3. Tuning your video card and monitor
          1. 3.9.3.1. Running the Display Settings window
          2. 3.9.3.2. Understanding the xorg.conf file
        4. 3.9.4. Configuring video cards for gaming
        5. 3.9.5. Getting more information
      10. 3.10. Summary
    4. 4. Using Linux Commands
      1. 4.1. The Shell Interface
        1. 4.1.1. Checking your login session
        2. 4.1.2. Checking directories and permissions
        3. 4.1.3. Checking system activity
        4. 4.1.4. Exiting the shell
      2. 4.2. Understanding the Shell
      3. 4.3. Using the Shell in Linux
        1. 4.3.1. Locating commands
        2. 4.3.2. Rerunning commands
          1. 4.3.2.1. Command-line editing
          2. 4.3.2.2. Command-line completion
          3. 4.3.2.3. Command-line recall
        3. 4.3.3. Connecting and expanding commands
          1. 4.3.3.1. Piping commands
          2. 4.3.3.2. Sequential commands
          3. 4.3.3.3. Background commands
          4. 4.3.3.4. Expanding commands
          5. 4.3.3.5. Expanding arithmetic expressions
          6. 4.3.3.6. Expanding variables
        4. 4.3.4. Using shell environment variables
          1. 4.3.4.1. Common shell environment variables
          2. 4.3.4.2. Setting your own environment variables
        5. 4.3.5. Managing background and foreground processes
          1. 4.3.5.1. Starting background processes
          2. 4.3.5.2. Moving commands to the foreground and background
        6. 4.3.6. Configuring your shell
          1. 4.3.6.1. Setting your prompt
          2. 4.3.6.2. Adding environment variables
          3. 4.3.6.3. Adding aliases
      4. 4.4. Working with the Linux File System
        1. 4.4.1. Linux File Systems Versus Windows-Based File Systems
        2. 4.4.2. Creating files and directories
          1. 4.4.2.1. Using metacharacters and operators
          2. 4.4.2.2. Using file-matching metacharacters
          3. 4.4.2.3. Using file-redirection metacharacters
          4. 4.4.2.4. Understanding file permissions
        3. 4.4.3. Moving, copying, and deleting files
      5. 4.5. Using the vi Text Editor
        1. 4.5.1. Starting with vi
        2. 4.5.2. Exploring Other Text Editors
        3. 4.5.3. Moving around the file
        4. 4.5.4. Searching for text
        5. 4.5.5. Using numbers with commands
      6. 4.6. Summary
  7. II. Using Fedora and RHEL
    1. 5. Accessing and Running Applications
      1. 5.1. Getting and Installing Software Packages
        1. 5.1.1. Downloading and installing applications with yum
          1. 5.1.1.1. Configuring yum (/etc/yum.conf)
          2. 5.1.1.2. Adding yum repositories (/etc/yum.repos.d/)
          3. 5.1.1.3. Running yum to download and install RPMs
          4. 5.1.1.4. Using yum to install packages locally
          5. 5.1.1.5. Using yum for listing packages
          6. 5.1.1.6. Using yum-utils package
        2. 5.1.2. Getting Fedora and RHEL software updates
          1. 5.1.2.1. Getting alerted to available updates
          2. 5.1.2.2. Getting manual updates with yum
      2. 5.2. Managing RPM Packages
        1. 5.2.1. Using the PackageKit Add/Remove window
        2. 5.2.2. Using the rpm command
          1. 5.2.2.1. Verifying rpm package integrity
          2. 5.2.2.2. Installing with rpm
          3. 5.2.2.3. Upgrading packages with rpm
          4. 5.2.2.4. Freshening packages with rpm
          5. 5.2.2.5. Removing packages with rpm
          6. 5.2.2.6. Querying packages with rpm
          7. 5.2.2.7. Verifying installed packages with rpm
      3. 5.3. Using Software in Different Formats
        1. 5.3.1. Understanding software package names and formats
        2. 5.3.2. Using Binary RPMs versus Building from Source
        3. 5.3.3. Using different archive and document formats
        4. 5.3.4. Building and installing from source code
          1. 5.3.4.1. Installing software in SRPM format
          2. 5.3.4.2. Installing software in tar.gz or tar.bz2 formats
      4. 5.4. Using Fedora or RHEL to Run Applications
        1. 5.4.1. Finding common desktop applications in Linux
        2. 5.4.2. Investigating your desktop
        3. 5.4.3. Starting applications from a menu
        4. 5.4.4. Starting applications from a Run Application window
        5. 5.4.5. Starting applications from a Terminal window
        6. 5.4.6. Running remote X applications
          1. 5.4.6.1. Traditional method to run remote X applications
          2. 5.4.6.2. Launching a remote X application
          3. 5.4.6.3. Using SSH to run remote X applications
      5. 5.5. Running Microsoft Windows, DOS, and Macintosh Applications
        1. 5.5.1. Running DOS applications
          1. 5.5.1.1. Using mtools
          2. 5.5.1.2. Using DOSBox
        2. 5.5.2. Running Microsoft Windows applications in Linux
          1. 5.5.2.1. Running Windows Applications in WINE
          2. 5.5.2.2. Assigning drive letters
          3. 5.5.2.3. Installing applications in WINE
          4. 5.5.2.4. Launching applications
          5. 5.5.2.5. Tuning and configuring WINE
          6. 5.5.2.6. Finding more Windows applications for WINE
      6. 5.6. Running Applications in Virtual Environments
        1. 5.6.1. Running applications virtually with Xen
          1. 5.6.1.1. Before installing Xen
          2. 5.6.1.2. Installing Xen
          3. 5.6.1.3. Installing a guest operating system
        2. 5.6.2. Running applications virtually with KVM and QEMU
      7. 5.7. Summary
    2. 6. Publishing with Fedora and RHEL
      1. 6.1. Desktop Publishing in Linux
        1. 6.1.1. Using Text Editors and Notepads
        2. 6.1.2. Using Word Processors
          1. 6.1.2.1. Using OpenOffice.org
          2. 6.1.2.2. Other Word Processors
            1. 6.1.2.2.1. StarOffice
            2. 6.1.2.2.2. AbiWord
            3. 6.1.2.2.3. Using KOffice
            4. 6.1.2.2.4. TextMaker
      2. 6.2. Using Traditional Linux Publishing Tools
        1. 6.2.1. Creating Documents in Groff or LaTeX
        2. 6.2.2. Text processing with Groff
          1. 6.2.2.1. Formatting and printing documents with Groff
          2. 6.2.2.2. Creating a man page with Groff
        3. 6.2.3. Text processing with TeX/LaTeX
          1. 6.2.3.1. Creating and formatting a LaTeX document
        4. 6.2.4. Converting documents
        5. 6.2.5. Creating DocBook documents
        6. 6.2.6. Understanding SGML and XML
          1. 6.2.6.1. Understanding DocBook
          2. 6.2.6.2. Creating DocBook documents
          3. 6.2.6.3. Converting DocBook documents
      3. 6.3. Displaying PDF Files with Adobe Acrobat Reader
      4. 6.4. Doing Page Layout with Scribus
      5. 6.5. Working with Graphics
        1. 6.5.1. Manipulating images with GIMP
        2. 6.5.2. Taking screen captures
        3. 6.5.3. Creating vector graphic images with Inkscape
      6. 6.6. Using Scanners Driven by SANE
      7. 6.7. Web Publishing
      8. 6.8. Summary
    3. 7. Gaming in Fedora and RHEL
      1. 7.1. Jumping into Linux Gaming
      2. 7.2. Basic Linux Gaming Information
        1. 7.2.1. Where to get information on Linux gaming
        2. 7.2.2. Choosing a video card for gaming
      3. 7.3. Running Open Source Linux Games
        1. 7.3.1. GNOME games
        2. 7.3.2. KDE games
        3. 7.3.3. Adding more games from Fedora repository
          1. 7.3.3.1. Chess games
          2. 7.3.3.2. Freeciv
            1. 7.3.3.2.1. Starting Freeciv
            2. 7.3.3.2.2. Beginning with Freeciv
            3. 7.3.3.2.3. Building your civilization
            4. 7.3.3.2.4. Exploring your world
            5. 7.3.3.2.5. Using more controls and actions
          3. 7.3.3.3. Extreme Tuxracer
      4. 7.4. Commercial Linux Games
        1. 7.4.1. Getting Started with commercial games in Linux
        2. 7.4.2. Playing commercial Linux games
        3. 7.4.3. id Software Games
          1. 7.4.3.1. Quake III Arena
          2. 7.4.3.2. Return to Castle Wolfenstein
        4. 7.4.4. Gaming with Cedega
        5. 7.4.5. Loki Software game demos
          1. 7.4.5.1. Civilization: Call to Power
          2. 7.4.5.2. Myth II: Soulblighter
          3. 7.4.5.3. Heretic II
        6. 7.4.6. Neverwinter Nights
      5. 7.5. Summary
    4. 8. Music, Video, and Images in Linux
      1. 8.1. Understanding Multimedia and Legal Issues in Linux
      2. 8.2. Extending Freedom to Codecs
      3. 8.3. Listening to Music in Linux
        1. 8.3.1. Configuring a sound card
          1. 8.3.1.1. Sound card features
          2. 8.3.1.2. Detecting your sound card driver
          3. 8.3.1.3. Adjusting sound levels
          4. 8.3.1.4. Setting your sound card to record
        2. 8.3.2. Choosing audio players
        3. 8.3.3. Automatically playing CDs
        4. 8.3.4. Troubleshooting Your CD-ROM
        5. 8.3.5. Playing and managing music with Rhythmbox
        6. 8.3.6. Playing music with XMMS Audio Player
          1. 8.3.6.1. Using the Equalizer
          2. 8.3.6.2. Using the Playlist Editor
        7. 8.3.7. Using ogg123, mpg321, and play command-line players
        8. 8.3.8. Using MIDI audio players
        9. 8.3.9. Converting audio files with SoX
        10. 8.3.10. Extracting and encoding music
          1. 8.3.10.1. Extracting music CDs with Sound Juicer
          2. 8.3.10.2. Extracting and encoding music CDs from commands
        11. 8.3.11. Creating your own music CDs
          1. 8.3.11.1. Creating audio CDs with cdrecord
          2. 8.3.11.2. Creating audio and data CDs with K3b
            1. 8.3.11.2.1. Creating a new audio CD
            2. 8.3.11.2.2. Copying a CD
            3. 8.3.11.2.3. Burning an ISO image to CD
        12. 8.3.12. Creating CD labels with cdlabelgen
      4. 8.4. Viewing TV and Webcams
        1. 8.4.1. Watching TV with TVtime
          1. 8.4.1.1. Getting a supported TV card
          2. 8.4.1.2. Starting Tvtime
          3. 8.4.1.3. Selecting channels in TVtime
        2. 8.4.2. Video conferencing and VOIP with Ekiga
          1. 8.4.2.1. Getting a supported Webcam
          2. 8.4.2.2. Running Ekiga
        3. 8.4.3. Taking Webcam videos and snapshots with Cheese
      5. 8.5. Playing Video
        1. 8.5.1. Examining laws affecting video and Linux
        2. 8.5.2. Understanding video content types
        3. 8.5.3. Converting Video to Theora
        4. 8.5.4. Watching video with Xine
          1. 8.5.4.1. Using Xine
          2. 8.5.4.2. Creating playlists with Xine
          3. 8.5.4.3. Xine tips
        5. 8.5.5. Using Totem movie player
      6. 8.6. Using a Digital Camera
        1. 8.6.1. Displaying images in gThumb
        2. 8.6.2. Using your camera as a storage device
      7. 8.7. Summary
    5. 9. Using the Internet and the Web
      1. 9.1. Overview of Internet Applications and Commands
      2. 9.2. Browsing the Web
        1. 9.2.1. Understanding Web browsing
          1. 9.2.1.1. Uniform Resource Locators
          2. 9.2.1.2. Web pages
        2. 9.2.2. Browsing the Web with Firefox
        3. 9.2.3. Setting up Firefox
          1. 9.2.3.1. Setting Navigator preferences
          2. 9.2.3.2. Extending Firefox
            1. 9.2.3.2.1. Using plug-ins
            2. 9.2.3.2.2. Getting Add-ons
          3. 9.2.3.3. Changing Firefox themes
          4. 9.2.3.4. Securing Firefox
          5. 9.2.3.5. Tips for using Firefox
        4. 9.2.4. Using text-based Web browsers
      3. 9.3. Communicating with E-mail
        1. 9.3.1. E-mail basics
        2. 9.3.2. Using Evolution e-mail
          1. 9.3.2.1. Setting Evolution preferences
          2. 9.3.2.2. Receiving, composing, and sending e-mail
        3. 9.3.3. Thunderbird mail client
        4. 9.3.4. Text-based mail programs
        5. 9.3.5. Mail readers and managers
          1. 9.3.5.1. Mutt mail reader
          2. 9.3.5.2. Pine mail reader
          3. 9.3.5.3. Mail reader
      4. 9.4. Participating in Newsgroups
      5. 9.5. Instant Messaging with Pidgin
      6. 9.6. Sharing Files with BitTorrent
      7. 9.7. Using Remote Login, Copy, and Execution
        1. 9.7.1. Using telnet for remote login
        2. 9.7.2. Copying files with FTP
          1. 9.7.2.1. Using the ftp command
            1. 9.7.2.1.1. FTP directory commands
            2. 9.7.2.1.2. FTP file copying commands
            3. 9.7.2.1.3. FTP exiting commands
          2. 9.7.2.2. Using the ncftp command
            1. 9.7.2.2.1. Using ncftp
            2. 9.7.2.2.2. Using ncftp for background transfers
          3. 9.7.2.3. Using the gFTP window
        3. 9.7.3. Getting files with wget
          1. 9.7.3.1. Downloading a single file
          2. 9.7.3.2. Downloading a file with user name and password
          3. 9.7.3.3. Downloading a whole Web site
          4. 9.7.3.4. Continuing a download
        4. 9.7.4. Using ssh for remote login/remote execution
        5. 9.7.5. Using scp for remote file copy
        6. 9.7.6. Using the "r" commands: rlogin, rcp, and rsh
      8. 9.8. Summary
  8. III. Administering Fedora and RHEL
    1. 10. Understanding System Administration
      1. 10.1. Using the root user account
      2. 10.2. Becoming Super User (The su Command)
      3. 10.3. Learning about Administrative GUI Tools, Commands, Configuration Files, and Log Files
        1. 10.3.1. Using graphical administration tools
        2. 10.3.2. Becoming Super User in X
        3. 10.3.3. Administrative commands
        4. 10.3.4. Administrative configuration files
        5. 10.3.5. Administrative log files
        6. 10.3.6. Using other administrative logins
          1. 10.3.6.1. Understanding administrative logins
          2. 10.3.6.2. Using sudo for assigning administrative privilege
      4. 10.4. Administering Your Linux System
      5. 10.5. Configuring Hardware
        1. 10.5.1. Checking your hardware
        2. 10.5.2. Managing Hardware with HAL
        3. 10.5.3. Reconfiguring hardware with kudzu
        4. 10.5.4. Configuring modules
          1. 10.5.4.1. Listing loaded modules
          2. 10.5.4.2. Loading modules
          3. 10.5.4.3. Removing modules
      6. 10.6. Managing File Systems and Disk Space
        1. 10.6.1. Mounting file systems
          1. 10.6.1.1. Supported file systems
          2. 10.6.1.2. Using the fstab file to define mountable file systems
          3. 10.6.1.3. Using the mount command to mount file systems
            1. 10.6.1.3.1. Mounting removable media
            2. 10.6.1.3.2. Mounting CD or DVD images
          4. 10.6.1.4. Using the umount command to unmount a file system
        2. 10.6.2. Using the mkfs command to create a file system
        3. 10.6.3. Adding a hard disk
        4. 10.6.4. Using RAID disks
        5. 10.6.5. Checking system space
          1. 10.6.5.1. Checking Disk Space with Disk Usage Analyzer
          2. 10.6.5.2. Displaying system space with df
          3. 10.6.5.3. Checking disk usage with du
          4. 10.6.5.4. Finding disk consumption with find
      7. 10.7. Monitoring System Performance
        1. 10.7.1. Watch computer usage with System Monitor
        2. 10.7.2. Monitoring CPU usage with top
        3. 10.7.3. Monitoring power usage on laptop computers
          1. 10.7.3.1. Using the Power Manager applet
          2. 10.7.3.2. Using apm to enter suspend mode
          3. 10.7.3.3. Using acpi_listen to monitor ACPI events
      8. 10.8. Fixing Your System with the FirstAidKit
      9. 10.9. Choosing Software Alternatives
        1. 10.9.1. Selecting Java alternatives
        2. 10.9.2. Selecting mail and printing alternatives
        3. 10.9.3. Using mail alternatives
      10. 10.10. Using Security Enhanced Linux
      11. 10.11. Understanding Security Enhanced Linux
        1. 10.11.1. Types and roles in SELinux
        2. 10.11.2. Users in SELinux
        3. 10.11.3. Policies in SELinux
        4. 10.11.4. Tools in SELinux
      12. 10.12. Using SELinux in Fedora and RHEL
        1. 10.12.1. Getting SELinux
        2. 10.12.2. Checking whether SELinux is on
        3. 10.12.3. Checking SELinux status
      13. 10.13. Learning More about SELinux
      14. 10.14. Summary
    2. 11. Setting Up and Supporting Users
      1. 11.1. Creating User Accounts
        1. 11.1.1. Adding users with useradd
        2. 11.1.2. Adding users with User Manager
      2. 11.2. Setting User Defaults
        1. 11.2.1. Supplying initial login scripts
        2. 11.2.2. Supplying initial .bashrc and .bash_profile files
        3. 11.2.3. Supplying an initial .tcshrc file
        4. 11.2.4. Configuring system-wide shell options
          1. 11.2.4.1. Configuring system-wide bash options
          2. 11.2.4.2. Configuring system-wide tcsh options
        5. 11.2.5. Setting system profiles
        6. 11.2.6. Adding user accounts to servers
      3. 11.3. Creating Portable Desktops
      4. 11.4. Providing Support to Users
        1. 11.4.1. Creating a technical support mailbox
        2. 11.4.2. Resetting a user's password
      5. 11.5. Modifying Accounts
        1. 11.5.1. Modifying user accounts with usermod
        2. 11.5.2. Modifying user accounts with User Manager
      6. 11.6. Deleting User Accounts
        1. 11.6.1. Deleting user accounts with userdel
        2. 11.6.2. Deleting user accounts with User Manager
      7. 11.7. Checking Disk Quotas
        1. 11.7.1. Using quota to check disk usage
          1. 11.7.1.1. Editing the /etc/fstab file
          2. 11.7.1.2. Creating quota files
          3. 11.7.1.3. Creating a quota startup script
          4. 11.7.1.4. Turn on the quota startup script
          5. 11.7.1.5. Creating quota rules
          6. 11.7.1.6. Updating quota settings
          7. 11.7.1.7. Checking quotas
        2. 11.7.2. Using du to check disk use
        3. 11.7.3. Removing temp files automatically
      8. 11.8. Sending Mail to All Users
      9. 11.9. Summary
    3. 12. Automating System Tasks
      1. 12.1. Understanding Shell Scripts
        1. 12.1.1. Executing and debugging shell scripts
        2. 12.1.2. Understanding shell variables
          1. 12.1.2.1. Special shell variables
          2. 12.1.2.2. Parameter expansion in bash
        3. 12.1.3. Performing arithmetic in shell scripts
        4. 12.1.4. Using programming constructs in shell scripts
          1. 12.1.4.1. The "if...then"statements
          2. 12.1.4.2. The case command
          3. 12.1.4.3. The "for...do" loop
          4. 12.1.4.4. The "while...do"and "until...do" loops
        5. 12.1.5. Some useful external programs
          1. 12.1.5.1. The general regular expression parser (grep)
          2. 12.1.5.2. Remove sections of lines of text (cut)
          3. 12.1.5.3. Translate or delete characters (tr)
          4. 12.1.5.4. The Stream Editor (sed)
        6. 12.1.6. Trying some simple shell scripts
          1. 12.1.6.1. A simple telephone list
          2. 12.1.6.2. A simple backup script
      2. 12.2. System Initialization
        1. 12.2.1. Starting init
        2. 12.2.2. The inittab file
      3. 12.3. System Startup and Shutdown
        1. 12.3.1. Starting run-level scripts
        2. 12.3.2. Understanding run-level scripts
        3. 12.3.3. Understanding what startup scripts do
        4. 12.3.4. Changing run-level script behavior
        5. 12.3.5. Reorganizing or removing run-level scripts
        6. 12.3.6. Adding run-level scripts
        7. 12.3.7. Managing xinetd services
        8. 12.3.8. Manipulating run levels
          1. 12.3.8.1. Determining the current run level
          2. 12.3.8.2. Changing to a shutdown run level
      4. 12.4. Scheduling System Tasks
        1. 12.4.1. Using at.allow and at.deny
        2. 12.4.2. Specifying when jobs are run
        3. 12.4.3. Submitting scheduled jobs
        4. 12.4.4. Viewing scheduled jobs
        5. 12.4.5. Deleting scheduled jobs
        6. 12.4.6. Using the batch command
        7. 12.4.7. Using the cron facility
          1. 12.4.7.1. Modifying scheduled tasks with crontab
          2. 12.4.7.2. Understanding cron files
      5. 12.5. Summary
    4. 13. Backing Up and Restoring Files
      1. 13.1. Making a Simple Backup Archive
      2. 13.2. Doing a Simple Backup with rsync
        1. 13.2.1. Backing up files locally
        2. 13.2.2. Backing up files remotely
      3. 13.3. Choosing Backup Tools
      4. 13.4. Selecting a Backup Strategy
        1. 13.4.1. Full backup
        2. 13.4.2. Incremental backup
        3. 13.4.3. Disk mirroring
        4. 13.4.4. Network backup
      5. 13.5. Selecting a Backup Medium
        1. 13.5.1. Magnetic tape
          1. 13.5.1.1. Using ftape tools for magnetic tape
          2. 13.5.1.2. Testing the magnetic tape drive
        2. 13.5.2. Writable CD drives
          1. 13.5.2.1. Getting cdrecord for writable CDs
          2. 13.5.2.2. Writing to CDs
        3. 13.5.3. Writable DVD drives
        4. 13.5.4. Writing CD or DVDs with growisofs
      6. 13.6. Backing Up to a Hard Drive
      7. 13.7. Backing Up Files with dump
        1. 13.7.1. Creating a backup with dump
        2. 13.7.2. Understanding dump levels
      8. 13.8. Automating Backups with cron
      9. 13.9. Restoring Backed-Up Files
        1. 13.9.1. Restoring an entire file system
        2. 13.9.2. Recovering individual files
      10. 13.10. Configuring Amanda for Network Backups
        1. 13.10.1. Creating Amanda directories
        2. 13.10.2. Creating the amanda.conf file
        3. 13.10.3. Creating a disklist file
        4. 13.10.4. Adding Amanda network services
          1. 13.10.4.1. On the amanda server
          2. 13.10.4.2. On each amanda client
        5. 13.10.5. Performing an Amanda backup
      11. 13.11. Using the pax Archiving Tool
      12. 13.12. Summary
    5. 14. Computer Security Issues
      1. 14.1. Linux Security Checklist
      2. 14.2. Using Password Protection
        1. 14.2.1. Choosing good passwords
        2. 14.2.2. Using a shadow password file
          1. 14.2.2.1. Breaking encrypted passwords
          2. 14.2.2.2. Checking for the shadow password file
      3. 14.3. Securing Linux with iptables Firewalls
        1. 14.3.1. Using the Firewall Configuration window
        2. 14.3.2. Configuring an iptables firewall
          1. 14.3.2.1. Turning on iptables
          2. 14.3.2.2. Creating iptables firewall rules
            1. 14.3.2.2.1. Example 1: Firewall for shared Internet connection (plus servers)
            2. 14.3.2.2.2. Example 2: Firewall for shared Internet connection (no servers)
            3. 14.3.2.2.3. Example 3: Firewall for single Linux system with Internet connection
          3. 14.3.2.3. Understanding iptables
            1. 14.3.2.3.1. Allowing FTP and IRC services through an iptables firewall
            2. 14.3.2.3.2. Using iptables to do SNAT or IP Masquerading
            3. 14.3.2.3.3. Using iptables as a transparent proxy
            4. 14.3.2.3.4. Using iptables to do port forwarding
            5. 14.3.2.3.5. Using logging with iptables
          4. 14.3.2.4. Enhancing your iptables firewall
      4. 14.4. Controlling Access to Services with TCP Wrappers
      5. 14.5. Checking Log Files
        1. 14.5.1. Understanding the rsyslogd service
          1. 14.5.1.1. Redirecting logs to a loghost with rsyslogd
          2. 14.5.1.2. Understanding the messages logfile
        2. 14.5.2. Tracking log messages with logwatch
      6. 14.6. Using the Secure Shell Package
        1. 14.6.1. Starting the SSH service
        2. 14.6.2. Using the ssh, sftp, and scp commands
        3. 14.6.3. Using ssh, scp, and sftp without passwords
      7. 14.7. Securing Linux Servers
        1. 14.7.1. Understanding attack techniques
        2. 14.7.2. Protecting against denial-of-service attacks
          1. 14.7.2.1. Mailbombing
            1. 14.7.2.1.1. Blocking mail with Procmail
            2. 14.7.2.1.2. Blocking mail with sendmail
          2. 14.7.2.2. Spam relaying
          3. 14.7.2.3. Smurf amplification attack
        3. 14.7.3. Protecting against distributed DOS attacks
        4. 14.7.4. Protecting against intrusion attacks
          1. 14.7.4.1. Evaluating access to network services
          2. 14.7.4.2. Disabling network services
        5. 14.7.5. Securing servers with SELinux
        6. 14.7.6. Protecting Web servers with certificates and encryption
          1. 14.7.6.1. Symmetric cryptography
          2. 14.7.6.2. Public-key cryptography
          3. 14.7.6.3. Secure Sockets Layer
            1. 14.7.6.3.1. Creating SSL certificates
            2. 14.7.6.3.2. Using third-party certificate signers
            3. 14.7.6.3.3. Creating a Certificate Service Request
            4. 14.7.6.3.4. Getting the CSR signed
            5. 14.7.6.3.5. Creating self-signed certificates
            6. 14.7.6.3.6. Restarting your Web server
        7. 14.7.7. Exporting Encryption Technology
          1. 14.7.7.1.
            1. 14.7.7.1.1. Troubleshooting your certificates
      8. 14.8. Managing Identities with freeIPA
        1. 14.8.1. Setting up the freeIPA Server
        2. 14.8.2. Setting up freeIPA Clients
      9. 14.9. Summary
  9. IV. Fedora and RHEL Network and Server Setup
    1. 15. Setting Up Network Connections and LANs
      1. 15.1. Connecting to the Network with NetworkManager
        1. 15.1.1. Connecting to a wireless network
        2. 15.1.2. Connecting to a wired network
        3. 15.1.3. Setting up a virtual private network connection
      2. 15.2. Understanding Local Area Networks
        1. 15.2.1. Planning, getting, and setting up LAN hardware
          1. 15.2.1.1. LAN topologies
          2. 15.2.1.2. LAN equipment
          3. 15.2.1.3. LAN equipment setup
        2. 15.2.2. Configuring TCP/IP for your LAN
          1. 15.2.2.1. Identifying other computers (hosts and DNS)
          2. 15.2.2.2. Adding Windows computers to your LAN
      3. 15.3. Setting Up a Wireless LAN
        1. 15.3.1. Understanding wireless networks
        2. 15.3.2. Choosing wireless hardware
          1. 15.3.2.1. Selecting wireless LAN cards
          2. 15.3.2.2. Selecting antennas
            1. 15.3.2.2.1. Using indoor antennas
            2. 15.3.2.2.2. Using outdoor antennas
        3. 15.3.3. Getting wireless drivers
        4. 15.3.4. Installing wireless Linux software
        5. 15.3.5. Configuring the wireless LAN
          1. 15.3.5.1. Configuring the wireless interface
        6. 15.3.6. Wireless Security
          1. 15.3.6.1. Activating the wireless interfaces
          2. 15.3.6.2. Checking your wireless connection
        7. 15.3.7. Testing distances
        8. 15.3.8. Setting wireless extensions
      4. 15.4. Understanding Internet Protocol Addresses
        1. 15.4.1. IP address classes
        2. 15.4.2. Understanding netmasks
        3. 15.4.3. Classless Inter-Domain Routing
        4. 15.4.4. Getting IP addresses
      5. 15.5. Troubleshooting Your LAN
        1. 15.5.1. Did Linux find your Ethernet driver at boot time?
        2. 15.5.2. Can you reach another computer on the LAN?
        3. 15.5.3. Is your Ethernet connection up?
        4. 15.5.4. Troubleshooting a wireless LAN
          1. 15.5.4.1. Checking wireless settings
          2. 15.5.4.2. Checking TCP/IP
          3. 15.5.4.3. Adapting to poor reception
          4. 15.5.4.4. Use debugging tools
        5. 15.5.5. Watching LAN traffic with Wireshark
          1. 15.5.5.1. Starting Wireshark
          2. 15.5.5.2. Capturing Ethernet data
          3. 15.5.5.3. Interpreting captured Ethernet data
        6. 15.5.6. Using Wireshark Filters
      6. 15.6. Summary
    2. 16. Connecting to the Internet
      1. 16.1. Understanding How the Internet Is Structured
        1. 16.1.1. Internet domains
        2. 16.1.2. Hostnames and IP addresses
        3. 16.1.3. Routing
        4. 16.1.4. Proxies
      2. 16.2. Using Dial-Up Connections to the Internet
        1. 16.2.1. Getting information
        2. 16.2.2. Setting up dial-up PPP
        3. 16.2.3. Creating a dial-up connection with the Network Configuration window
        4. 16.2.4. Launching your PPP connection
        5. 16.2.5. Launching your PPP connection on demand
        6. 16.2.6. Checking your PPP connection
          1. 16.2.6.1. Checking that your modem was detected
          2. 16.2.6.2. Checking that your PPP interface is working
          3. 16.2.6.3. Checking the default route
          4. 16.2.6.4. Checking that the name servers are set
          5. 16.2.6.5. Checking the chap-secrets or pap-secrets file
          6. 16.2.6.6. Looking at the ifcfg file
          7. 16.2.6.7. Running debugging
      3. 16.3. Connecting Your LAN to the Internet
      4. 16.4. Setting Up Linux as a Router
        1. 16.4.1. Configuring the Linux router
          1. 16.4.1.1. Selecting IP addresses
          2. 16.4.1.2. Enable forwarding and masquerading
        2. 16.4.2. Configuring network clients
      5. 16.5. Configuring a Virtual Private Network Connection
        1. 16.5.1. Understanding IPsec
        2. 16.5.2. Using IPsec protocols
        3. 16.5.3. Using IPsec in Fedora or RHEL
        4. 16.5.4. Configuring an OpenVPN Server
          1. 16.5.4.1. Decisions before configuring OpenVPN
          2. 16.5.4.2. Create a public key infrastructure
          3. 16.5.4.3. Create OpenVPN server configuration
          4. 16.5.4.4. Create OpenVPN client configuration
      6. 16.6. Setting Up Linux as a Proxy Server
        1. 16.6.1. Starting the squid daemon
        2. 16.6.2. Using a simple squid.conf file
        3. 16.6.3. Modifying the Squid configuration file
          1. 16.6.3.1. Configuring access control in squid.conf
          2. 16.6.3.2. Configuring caching in squid.conf
          3. 16.6.3.3. Configuring port numbers in squid.conf
        4. 16.6.4. Debugging Squid
          1. 16.6.4.1. Checking the squid.conf file
          2. 16.6.4.2. Checking Squid log files
          3. 16.6.4.3. Using the top command
      7. 16.7. Setting Up Proxy Clients
        1. 16.7.1. Configuring Firefox to use a proxy
        2. 16.7.2. Configuring other browsers to use a proxy
      8. 16.8. Summary
    3. 17. Setting Up Printers and Printing
      1. 17.1. Common UNIX Printing Service
      2. 17.2. Setting Up Printers
        1. 17.2.1. Choosing a Printer
        2. 17.2.2. Using the Printer configuration window
          1. 17.2.2.1. Configuring local printers
            1. 17.2.2.1.1. Adding a local printer
            2. 17.2.2.1.2. Editing a local printer
          2. 17.2.2.2. Configuring remote printers
            1. 17.2.2.2.1. Adding a remote CUPS printer
            2. 17.2.2.2.2. Adding a remote UNIX printer
            3. 17.2.2.2.3. Adding a Windows (SMB) printer
            4. 17.2.2.2.4. Adding a JetDirect printer
        3. 17.2.3. Using Web-based CUPS administration
        4. 17.2.4. Configuring the CUPS server (cupsd.conf)
        5. 17.2.5. Configuring CUPS printer options
      3. 17.3. Using Printing Commands
        1. 17.3.1. Using lpr to print
        2. 17.3.2. Listing status with lpc
        3. 17.3.3. Removing print jobs with lprm
      4. 17.4. Configuring Print Servers
        1. 17.4.1. Configuring a shared CUPS printer
        2. 17.4.2. Configuring a shared Samba printer
          1. 17.4.2.1. Understanding smb.conf for printing
      5. 17.5. Summary
    4. 18. Setting Up a File Server
      1. 18.1. Goals of Setting Up a File Server
      2. 18.2. Setting Up an NFS File Server
        1. 18.2.1. Sharing NFS file systems
          1. 18.2.1.1. Using the NFS Server Configuration window
          2. 18.2.1.2. Configuring the /etc/exports file
            1. 18.2.1.2.1. Hostnames in /etc/exports
            2. 18.2.1.2.2. Access options in /etc/exports
            3. 18.2.1.2.3. User mapping options in /etc/exports
          3. 18.2.1.3. Exporting the shared file systems
          4. 18.2.1.4. Starting the nfsd daemons
        2. 18.2.2. Using NFS file systems
          1. 18.2.2.1. Manually mounting an NFS file system
          2. 18.2.2.2. Automatically mounting an NFS file system
            1. 18.2.2.2.1. Mounting noauto file systems
            2. 18.2.2.2.2. Using mount options
          3. 18.2.2.3. Using autofs to mount NFS file systems on demand
        3. 18.2.3. Unmounting NFS file systems
        4. 18.2.4. Other cool things to do with NFS
      3. 18.3. Setting Up a Samba File Server
        1. 18.3.1. Getting and installing Samba
        2. 18.3.2. Configuring a simple Samba server
        3. 18.3.3. Configuring Samba with SWAT
          1. 18.3.3.1. Turning on SWAT
          2. 18.3.3.2. Starting with SWAT
          3. 18.3.3.3. Creating global Samba settings in SWAT
            1. 18.3.3.3.1. Base options
            2. 18.3.3.3.2. Security options
        4. 18.3.4. Assigning Guest Accounts
          1. 18.3.4.1.
            1. 18.3.4.1.1. Logging options
            2. 18.3.4.1.2. Printing options
            3. 18.3.4.1.3. Browse options
            4. 18.3.4.1.4. WINS options
          2. 18.3.4.2. Configuring shared directories with SWAT
          3. 18.3.4.3. Checking your Samba setup with SWAT
        5. 18.3.5. Working with Samba files and commands
          1. 18.3.5.1. Editing the smb.conf file
          2. 18.3.5.2. Adding Samba users
          3. 18.3.5.3. Starting the Samba service
          4. 18.3.5.4. Testing your Samba permissions
          5. 18.3.5.5. Checking the status of shared directories
        6. 18.3.6. Setting up Samba clients
          1. 18.3.6.1. Using Samba shared directories from Linux
            1. 18.3.6.1.1. Using Samba from Nautilus
            2. 18.3.6.1.2. Mounting Samba directories in Linux
          2. 18.3.6.2. Using Samba shared directories from Windows
        7. 18.3.7. Troubleshooting your Samba server
          1. 18.3.7.1. Basic networking in place?
          2. 18.3.7.2. Samba service running?
          3. 18.3.7.3. Firewall open?
          4. 18.3.7.4. User passwords working?
      4. 18.4. Summary
    5. 19. Setting Up a Mail Server
      1. 19.1. Introducing SMTP and sendmail
      2. 19.2. Installing and Running sendmail
        1. 19.2.1. Other Mail Servers for Fedora or Red Hat Linux
        2. 19.2.2. Starting sendmail
        3. 19.2.3. Other programs
        4. 19.2.4. Logging performed by sendmail
      3. 19.3. Configuring sendmail
        1. 19.3.1. Getting a domain name
        2. 19.3.2. Configuring basic sendmail settings (sendmail.mc)
        3. 19.3.3. Defining outgoing mail access
        4. 19.3.4. Configuring virtual servers
        5. 19.3.5. Configuring virtual users
        6. 19.3.6. Adding user accounts
        7. 19.3.7. Starting sendmail and generating database files
        8. 19.3.8. Redirecting mail
          1. 19.3.8.1. The .forward file
          2. 19.3.8.2. The aliases file
      4. 19.4. Introducing Postfix
      5. 19.5. Stopping Spam with SpamAssassin
        1. 19.5.1. Using SpamAssassin
        2. 19.5.2. Setting up SpamAssassin on your mail server
        3. 19.5.3. Setting e-mail readers to filter spam
      6. 19.6. Getting Mail from the Server (POP3 or IMAPv4)
        1. 19.6.1. Accessing mailboxes in Linux
        2. 19.6.2. Configuring IMAPv4 and POP3 with dovecot
      7. 19.7. Getting Mail from Your Browser with SquirrelMail
      8. 19.8. Administering a Mailing List with mailman
      9. 19.9. Summary
    6. 20. Setting Up an FTP Server
      1. 20.1. Understanding FTP Servers
        1. 20.1.1. Attributes of FTP servers
        2. 20.1.2. FTP user types
      2. 20.2. Using the Very Secure FTP Server
        1. 20.2.1. Quick-starting vsFTPd
        2. 20.2.2. Configuring vsFTPd
          1. 20.2.2.1. User accounts
          2. 20.2.2.2. Setting FTP access
            1. 20.2.2.2.1. Downloading files
            2. 20.2.2.2.2. Uploading (writing) files from local users
            3. 20.2.2.2.3. Uploading (writing) files from anonymous users
          3. 20.2.2.3. Adding message files
          4. 20.2.2.4. Logging vsFTPd activities
          5. 20.2.2.5. Setting timeouts
          6. 20.2.2.6. Navigating a vsFTPd site
          7. 20.2.2.7. Setting up vsFTPd behind a firewall
      3. 20.3. Getting More Information about FTP Servers
      4. 20.4. Summary
    7. 21. Setting Up a Web Server
      1. 21.1. Introduction to Web Servers
        1. 21.1.1. The Apache Web server
        2. 21.1.2. Other Web servers available for Fedora and RHEL
      2. 21.2. Quickstarting the Apache Web Server
      3. 21.3. Configuring the Apache Server
        1. 21.3.1. Configuring the Web server (httpd.conf)
          1. 21.3.1.1. Setting the global environment
            1. 21.3.1.1.1. Revealing subcomponents
            2. 21.3.1.1.2. Setting the server root directory
            3. 21.3.1.1.3. Storing the server's PID file
            4. 21.3.1.1.4. Configuring timeout values
          2. 21.3.1.2. Setting the number of server processes
          3. 21.3.1.3. Binding to specific addresses
          4. 21.3.1.4. Selecting modules in httpd.conf
          5. 21.3.1.5. Including module-specific configuration files
          6. 21.3.1.6. Choosing the server's user and group
          7. 21.3.1.7. Setting the main server's configuration
            1. 21.3.1.7.1. Setting an e-mail address
            2. 21.3.1.7.2. Setting the server name
            3. 21.3.1.7.3. Setting canonical names
            4. 21.3.1.7.4. Identifying HTTP content directories
            5. 21.3.1.7.5. Setting access options and overrides
          8. 21.3.1.8. Identifying user directories
          9. 21.3.1.9. Setting default index files for directories
            1. 21.3.1.9.1. Setting directory-access control
            2. 21.3.1.9.2. Setting MIME-type defaults
            3. 21.3.1.9.3. Setting hostname lookups
            4. 21.3.1.9.4. Configuring HTTP logging
            5. 21.3.1.9.5. Adding a signature
            6. 21.3.1.9.6. Aliasing relocated content
            7. 21.3.1.9.7. Redirecting requests for old content
          10. 21.3.1.10. Defining indexing
          11. 21.3.1.11. Defining encoding and language
          12. 21.3.1.12. Choosing character sets
          13. 21.3.1.13. Adding MIME types and handlers
          14. 21.3.1.14. Defining actions and headers
          15. 21.3.1.15. Customizing error responses
          16. 21.3.1.16. Setting responses to browsers
          17. 21.3.1.17. Enabling proxy and caching services
          18. 21.3.1.18. Configuring virtual hosting
        2. 21.3.2. Configuring modules and related services (/etc/httpd/conf.d/*.conf)
      4. 21.4. Starting and Stopping the Server
      5. 21.5. Monitoring Server Activities
        1. 21.5.1. Displaying server information
        2. 21.5.2. Displaying server status
        3. 21.5.3. Further security of server-info and server-status
        4. 21.5.4. Logging errors
        5. 21.5.5. Logging hits
        6. 21.5.6. Analyzing Web-server traffic
        7. 21.5.7. Statistics Packages Available for Fedora and RHEL
      6. 21.6. Summary
    8. 22. Setting Up an LDAP Address Book Server
      1. 22.1. Understanding LDAP
        1. 22.1.1. Defining information in schemas
        2. 22.1.2. Understanding OIDs
        3. 22.1.3. Structuring your LDAP directories
      2. 22.2. Setting Up the OpenLDAP Server
        1. 22.2.1. Installing OpenLDAP packages
        2. 22.2.2. Configuring the OpenLDAP server (slapd.conf)
        3. 22.2.3. Creating an Encrypted Password
        4. 22.2.4. Starting the OpenLDAP service
      3. 22.3. Setting Up the Address Book
      4. 22.4. More Ways to Configure LDAP
      5. 22.5. Accessing an LDAP Address Book from Thunderbird
      6. 22.6. Summary
    9. 23. Setting Up a DHCP Boot Server
      1. 23.1. Using Dynamic Host Configuration Protocol
      2. 23.2. Setting Up a DHCP Server
        1. 23.2.1. Opening your firewall and SELinux for DHCP
        2. 23.2.2. Configuring the /etc/dhcpd.conf file
        3. 23.2.3. Expanding the dhcpd.conf file
        4. 23.2.4. Adding options
        5. 23.2.5. Starting the DHCP server
      3. 23.3. Setting Up a DHCP Client
      4. 23.4. Summary
    10. 24. Setting Up a MySQL Database Server
      1. 24.1. Finding MySQL Packages
      2. 24.2. Getting More MySQL Packages
      3. 24.3. Configuring the MySQL Server
        1. 24.3.1. Using mysql user/group accounts
        2. 24.3.2. Adding administrative users
        3. 24.3.3. Setting MySQL options
          1. 24.3.3.1. Creating the my.cnf configuration file
          2. 24.3.3.2. Choosing options
          3. 24.3.3.3. Checking options
        4. 24.3.4. Using sample my.cnf files
      4. 24.4. Starting the MySQL Server
      5. 24.5. Checking That MySQL Server Is Working
      6. 24.6. Working with MySQL Databases
        1. 24.6.1. Starting the mysql command
        2. 24.6.2. Creating a database with mysql
        3. 24.6.3. Adding data to a MySQL database table
          1. 24.6.3.1. Manually entering data
          2. 24.6.3.2. Loading data from a file
      7. 24.7. Understanding MySQL Tables
      8. 24.8. Displaying MySQL Databases
        1. 24.8.1. Displaying all or selected records
        2. 24.8.2. Displaying selected columns
        3. 24.8.3. Sorting data
      9. 24.9. Making Changes to Tables and Records
        1. 24.9.1. Altering the structure of MySQL tables
        2. 24.9.2. Updating and deleting MySQL records
      10. 24.10. Adding and Removing User Access
        1. 24.10.1. Adding users and granting access
        2. 24.10.2. Revoking access
      11. 24.11. Backing Up Databases
      12. 24.12. Checking and Fixing Databases
      13. 24.13. Summary
    11. 25. Making Servers Public with DNS
      1. 25.1. Determining Goals for Your Server
        1. 25.1.1. Using a hosting service
      2. 25.2. Connecting a Public Server
        1. 25.2.1. Choosing an ISP
          1. 25.2.1.1. Checking Terms of Service
        2. 25.2.2. Getting static IP addresses
        3. 25.2.3. Choosing a connection speed
      3. 25.3. Getting a domain name
        1. 25.3.1. Checking domain name availability
        2. 25.3.2. Reserving a domain name
      4. 25.4. Configuring Your Public Server
        1. 25.4.1. Configuring networking
        2. 25.4.2. Configuring servers
        3. 25.4.3. Managing security
          1. 25.4.3.1. Opening your firewall
          2. 25.4.3.2. Enabling SELinux
          3. 25.4.3.3. Checking logs and system files
          4. 25.4.3.4. Keeping up with updates
      5. 25.5. Setting Up a Domain Name System Server
        1. 25.5.1. Understanding DNS
          1. 25.5.1.1. Understanding authoritative zones
          2. 25.5.1.2. Understanding DNS risks
          3. 25.5.1.3. Understanding BIND
        2. 25.5.2. DNS name server example
        3. 25.5.3. Quick-starting a DNS server
          1. 25.5.3.1. Identifying your DNS servers
          2. 25.5.3.2. Creating DNS configuration files (named.conf and var/named)
            1. 25.5.3.2.1. Editing named.conf
            2. 25.5.3.2.2. Setting up the zone files (inside)
            3. 25.5.3.2.3. Setting up the zone files (outside)
            4. 25.5.3.2.4. Setting up the zone files (reverse lookup)
          3. 25.5.3.3. Starting the named (DNS) daemon
        4. 25.5.4. Checking that DNS is working
      6. 25.6. Getting More Information about BIND
      7. 25.7. Summary
    12. 26. Integrating Fedora with Apple Macs
      1. 26.1. Looking Inside Mac OS X
      2. 26.2. Using Network Services from Mac OS X
        1. 26.2.1. Using AppleTalk (netatalk) from Mac OS X
        2. 26.2.2. Using AppleTalk from Mac OS 8 or OS 9
        3. 26.2.3. Using Mac, Windows, and Linux servers (Samba)
        4. 26.2.4. Sharing X applications
      3. 26.3. Configuring an AppleTalk Server in Linux
        1. 26.3.1. Before you start using netatalk
        2. 26.3.2. Setting up the netatalk server
          1. 26.3.2.1. Starting netatalk
          2. 26.3.2.2. Open firewall ports
          3. 26.3.2.3. Defining general AppleTalk server settings
          4. 26.3.2.4. Defining specific AppleTalk servers settings
          5. 26.3.2.5. Setting up users
          6. 26.3.2.6. Sharing netatalk volumes
        3. 26.3.3. Securing netatalk volumes
          1. 26.3.3.1. User-level security
          2. 26.3.3.2. Host-level security
          3. 26.3.3.3. File- and directory-level security
            1. 26.3.3.3.1. Understanding hidden Mac files and directories
            2. 26.3.3.3.2. Setting file and directory permissions
            3. 26.3.3.3.3. Setting Appletalk file and folder type and creator
            4. 26.3.3.3.4. Moving, copying, and deleting netatalk files
            5. 26.3.3.3.5. Sharing files with netatalk and Samba
          4. 26.3.3.4. Printer Sharing
        4. 26.3.4. Troubleshooting netatalk
      4. 26.4. Accessing NFS Servers from the Mac
        1. 26.4.1. Connecting to NFS from the Connect to Server window
        2. 26.4.2. Connecting to NFS from the command line
      5. 26.5. Installing Fedora on an Intel-based Mac
        1. 26.5.1. Before installing Fedora on your Mac
        2. 26.5.2. Installing Fedora
      6. 26.6. Summary
    13. A. About the Media
      1. A.1. Fedora Source Code
    14. B. Running Network Services
      1. B.1. Checklist for Running Networking Services
      2. B.2. Networking Service Daemons
        1. B.2.1. The xinetd super-server
        2. B.2.2. The init.d start-up scripts
      3. B.3. Choosing Alternatives
      4. B.4. Referencing Network Services
        1. B.4.1. Web server
        2. B.4.2. File servers
          1. B.4.2.1. FTP servers
          2. B.4.2.2. Samba server
          3. B.4.2.3. Netatalk server
        3. B.4.3. Login servers
        4. B.4.4. E-mail servers
        5. B.4.5. News server
        6. B.4.6. Print servers
        7. B.4.7. Network administration servers
          1. B.4.7.1. Network Time Protocol server
          2. B.4.7.2. Portmap server
          3. B.4.7.3. SWAT
          4. B.4.7.4. Arpwatch server
          5. B.4.7.5. Simple Network Management Protocol server
        8. B.4.8. Information servers
          1. B.4.8.1. Network Information System servers
          2. B.4.8.2. Dynamic Host Configuration Protocol server
          3. B.4.8.3. Lightweight Directory Access Protocol server
          4. B.4.8.4. Domain Name System server
          5. B.4.8.5. Reverse Address Resolution Protocol server
        9. B.4.9. Database services
        10. B.4.10. User services
          1. B.4.10.1. Remote execution servers
          2. B.4.10.2. Talk server
          3. B.4.10.3. Finger server
          4. B.4.10.4. Remote user identification
          5. B.4.10.5. Write-to-All server
        11. B.4.11. Security services
          1. B.4.11.1. System logging
          2. B.4.11.2. Virtual private network servers
          3. B.4.11.3. Proxy/caching server
    15. C. Red Hat Enterprise Linux 5 Features
      1. C.1. What's in RHEL 5?
      2. C.2. What's New in RHEL 5.2?
      3. C.3. Choosing an RHEL System
      4. C.4. Getting RHEL Evaluation Subscriptions
      5. C.5. Hardware Compatibility and Commercial Software
      6. C.6. Training and Certification
      7. C.7. Documentation and Support
      8. C.8. Managing RHEL Systems
        1. C.8.1. Using Red Hat Network
        2. C.8.2. Using RHEL for high-performance computing clusters
        3. C.8.3. Using RHEL Global File System
      9. C.9. More Information on RHEL

Product information

  • Title: Fedora® 10 and Red Hat® Enterprise Linux® Bible
  • Author(s):
  • Release date: January 2009
  • Publisher(s): Wiley
  • ISBN: 9780470413395