Chapter 10. Understanding System Administration

In This Chapter

  • Using the root login

  • Administrative commands, configuration files, and log files

  • Graphical administration tools

  • Working with the file system

  • Working with hardware devices

  • Monitoring system performance

  • Managing battery power on laptops

  • Using Security Enhanced Linux

Fedora and Red Hat Enterprise Linux, like other UNIX systems, were intended for use by more than one person at a time. Multiuser features allow many people to have accounts in Linux, with their data kept secure from others. Multitasking allows many people to use the computer at the same time. Sophisticated networking protocols and applications make it possible for a Linux system to extend its capabilities to network users and computers around the world. The person assigned to manage all of this stuff is referred to as the system administrator.

Even if you are the only person using a Linux system, system administration is still set up to be separate from other computer use. To do most administrative tasks, you need to be logged in as the root user (also referred to as the super user) or gain temporary root privilege. Other users cannot change, or in some cases, even see some of the configuration information for a Linux system. In particular, security features such as passwords are protected from general view.

This chapter describes the general principles of Fedora and RHEL system administration. In particular, this chapter covers some of the basic tools you need to administer ...

Get Fedora™ 7 and Red Hat® Enterprise Linux® Bible now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.