Résumé
Contents
Preface
Part I: Getting Started
Chapter 1: Why Red Hat Linux?
The History of Linux
Other Major Linux Distributions
Caldera OpenLinux
Slackware Linux
Debian GNU/Linux
SuSE
Other Linux
distributions
Why Red Hat Is the Best
Red Hat Linux as a Server OS
How to Get Red Hat Linux
Chapter 2: Installation and Basic
Configuration
Checking Your Hardware Requirements
Preparing to Install Red Hat Linux
Creating a boot disk under MS
Windows 9x/2000
Creating a boot disk under
Linux
Installing Red Hat Linux
Understanding how the install
program works
Selecting a language, a
keyboard, and an installation method
Choosing an installation
type
Partitioning your disks
Selecting LILO installation
options
Naming your server
Selecting mouse type
Configuring the clock
Setting a root password
Creating an optional user
account
Configuring user
authentication method
Selecting software to
install
Skipping X Windows System
specifc configuration
Creating a custom boot
disk
Starting up Red Hat Linux for
the first time
Part II: Working as a Superuser
Chapter 3: The Bootup and Shutdown
Processes
Configuring init
The /etc/rc.d/rc.sysinit
script
The /etc/rc.d/init.d
directory
The /etc/rc.d/rc script
The /etc/rc.d/rc[06].d
directories
The /etc/rc.d/rc.local
script
The /etc/rc.d/rc.serial
script
Booting Up Your System
Shutting Down Your System
Canceling a shutdown
Rebooting your server
Rebooting using
Ctrl+Alt+Delete
Automatic shutdown on power
failure
Managing init Files
Using chkconfig to manage run
levels
Using ntsysv to manage run
levels
Using linuxconf to manage run
levels
Creating a new service for a
run level
Chapter 4: Understanding UNIX Files and
Devices
Understanding File/Directory Permissions
Changing ownership of
files/directories using chown
Changing group of
files/directories using chgrp
Understanding access
permissions using octal numbers
Understanding access
permissions using access strings
Changing access privileges of
files/directories using chmod
Special notes on directory
permissions
Managing Permissions for Links
Changing permissions or
ownership of a hard link
Changing permissions or
ownership of a soft link
Creating a Permission Policy for a Multiuser Server
Setting users' configuration
file permissions
Setting default file
permissions for users
Setting executable file
permissions
Setting default file
permissions for FTP
Working with Files and Directories
Viewing files and
directories
Navigating your way into
directories
Determining file type
Viewing the access statistics
of a file or directory
Copying files and
directories
Moving files and
directories
Deleting Files and
Directories
Finding files
Overriding the default file
permission mask
Using ext2 FileSystemSpecific Permissions
Chapter 5: Everyday Commands
Understanding the UNIX Command Line
Basics of wildcards
Basics of regular
expressions
How to Use Online man Pages
General File and Directory Commands
cat
chmod
chown
clear
cmp
cp
cut
diff
du
emacs
fgrep
file
find
grep
head
ln
locate
ls
mkdir
mv
pico
pwd
rm
sort
stat
strings
tail
touch
umask
uniq
vi
wc
whatis
whereis
which
File Compression and Archive-Specific Commands
compress
gunzip
gzip
rpm
tar
uncompress
unzip
uudecode
uuencode
zip
File Systems -- Specific Commands
dd
df
edquota
fdformat
fdisk
mkfs
mkswap
mount
quota
quotaon
swapoff
swapon
umount
DOS-Compatible Commands
mcopy
mdel
mdir
mformat
mlabel
System Status -- Specific Commands
dmesg
free
shutdown
uname
uptime
User Administration Commands
chfn
chsh
groupadd
groupmod
groups
last
passwd
su
useradd
userdel
usermod
who
whoami
User Commands for Accessing Network Services
finger
ftp
lynx
mail
pine
rlogin
talk
telnet
wall
Network Administrator's Commands
host
hostname
ifconfig
netcfg
netstat
nslookup
ping
route
tcpdump
traceroute
Process Management Commands
bg
fg
jobs
kill
killall
ps
top
Task Automation Commands
at
atq
atrm
crontab
Productivity Commands
bc
cal
ispell
mesg
write
Shell Commands
alias
history
set
source
unalias
Printing-Specific Commands
lpq
lpr
lprm
Part III: Managing Users, Processes, and Networks
Chapter 6: Using Linuxconf
What Is Linuxconf?
Installing Linuxconf
Configuring Linuxconf
Setting up Web-based remote
access for Linuxconf
Configuring Linuxconf
modules
Defining user
privileges
Using multiple system
configuration profiles
Chapter 7: User Administration
Becoming the Superuser
Assigning Privileges to Ordinary Users
Managing Users with Command Line Tools
Creating a new user
account
Creating a new group
Modifying an existing user
account
Modifying an existing
group
Deleting or disabling a user
account
Creating default user
settings
Managing Users with linuxconf
Adding a new user
account
Modifying an existing user
account
Deleting or disabling an
existing user account
Adding, modifying, and
deleting groups
Using Disk Quotas for Users
Installing disk quota
software
Configuring your system to
support disk quotas
Assigning disk quotas to
users
Monitoring disk usage
Chapter 8: Process Administration
How Processes Get Started
Controlling and Monitoring Processes
Using ps to get process
status
Signaling a running
process
Controlling process
priority
Monitoring Processes and System Load
Using top
Using vmstat
Using uptime
Logging Processes
Configuring syslog
Monitoring logs using
tail
Scheduling Processes
Using at
Using cron
Chapter 9: Network Administration
Basics of TCP/IP Networking
Classifying IP Networks
Class A networks
Class B networks
Class C networks
Configuring a Network Interface
Using traditional methods to
configure network interface cards
Using netcfg to configure a
network interface card
Why Use a Default Gateway?
Dividing a Network into Subnetworks
Gateway computer
configuration
Host computer
configuration
Part IV: Setting Up Intranet/Internet Services
Chapter 10: DNS Service
How Does DNS Work?
Configuring a DNS Client (Resolver)
Setting Up a DNS Server
Understanding the basics of
DNS configuration
Master/primary DNS
server
Slave/secondary DNS
server
Reverse DNS server
Cache-only/slave DNS
server
Controlling the DNS
server
Testing Your DNS Server
Managing DNS for Virtual Domains
Balancing Load Using the DNS Server
Chapter 11: E-mail Service
How SMTP Mail Works
Setting Up DNS Mail Service
Setting Up SMTP Mail Service
Installing sendmail
Starting and stopping
sendmail
Understanding and configuring
/etc/sendmail.cf
Configuring /etc/mail/*
files
Testing Your sendmail Configuration
Testing sendmail address
rewrite rules
Testing /etc/mail/* database
files
Using sendmail to see the
SMTP transaction verbosely
Using the sendmail debug
flag
Using a test configuration
file
Securing sendmail
Securing your configuration
files
Ensuring a stricter mode of
operating and privacy
Taking Antispam Measures
Dealing with third-party mail
relay vulnerability
Sending spammers to the black
hole
Setting Up POP Mail Service
How does it work?
Installing a POP3
server
Configuring POP3
service
Configuring SMTP/POP Mail Clients
Commercial Alternatives
Sendmail Pro
qmail
Chapter 12: Web Service
System Requirements for Apache
The ANSI C compiler
Sufficient disk space
Sufficient RAM
Other requirements
Getting Apache from the Net
Creating a Custom Apache Server
Configuring Apache source
using APACI
Compiling and installing
Apache
Compiling and installing
Apache support tools
Customizing Apache with
optional or third-party modules
Getting Apache Up and Running
Configuring httpd.conf
Configuring srm.conf
Configuring access.conf
Controlling the Apache
server
Testing the Apache
server
Managing Your Apache Server
Configuring Apache for CGI
scripts
Configuring Apache for
server-side includes
Hosting virtual Web
sites
Using Apache as a proxy
server
Authenticating Web
users
Monitoring server
status
Logging hits and errors
Enhancing Web server
security
Using SSL for secured
transactions
Chapter 13: FTP Service
Using wu-ftpd: the Default FTP Server
Installing wu-ftpd
server
Configuring FTP service
Creating an anonymous FTP
site
Creating a guest FTP
account
Creating virtual FTP
sites
Using a Commercial FTP Server
Using a Trivial File Transfer Protocol Server
Chapter 14: Internet Relay Chat and News
Servers
Setting Up Internet Relay Chat (IRC) Service
Installing an IRC
server
Configuring an IRC
server
Running an IRC server
Installing and using an IRC
client
Setting Up a Usenet News Service
Configuring an INN
server
Accessing your INN server
Part V: Setting Up Office Services
Chapter 15: Sharing Files and Printers with
Samba
Installing Samba
Configuring Samba
The [global]
configuration
The [homes]
configuration
The [printers]
configuration
Using GUI Configuration Tools
Testing the
/etc/samba/smb.conf configuration
Starting, stopping, and
restarting the Samba service
Practical Uses of Samba
Using a Linux file server on
Windows
Using a Windows file server
on your Linux system
Sharing printers between
Linux and Windows
Using an interactive Samba
client
Securing Your Samba Server
Chapter 16: Using NFS File Servers
Installing NFS Server and Client Software
Configuring an NFS Server
Granting read-only access to
the exported directory
Granting read and write
access to the exported directory
Disabling access to a
specific directory
Mapping users between the NFS
server and the clients
Configuring an NFS Client
Securing Your NFS Server
Distributing Files Using rdist
Chapter 17: SQL Database Services
What Is SQL?
Installing and Configuring a SQL Server: MySQL
Where to get MySQL
Installing the MySQL RPM
packages
Accessing the SQL Server
Starting MySQL client for the
first time
Creating a database
Interacting with the SQL Server Using Scripts
SQL interactions from the
UNIX command prompt
Using a CGI script to access
a SQL database via a Web browser
Part VI: Securing and Monitoring
Chapter 18: Security 101
Securing User Access
Restricting physical
access
Restricting normal user
access
Restricting superuser
access
Restricting all access in an
emergency or attack
Securing User Authentication Process
Using shadow passwords
Understanding PAM
Securing Services
Removing unnecessary services
during OS installation
Securing xinetd-run
services
Protecting Your Files and File System
Mounting file systems as
read-only
Taking advantage of ext2 file
system
Using Tripwire for ensuring
file integrity
Playing Devil's Advocate
Cracking your own
passwords
Having COPS around
Back Up and Backtrack Everything
Get the Latest Security News
CERT
BUGTRAQ
Chapter 19: Network Security
Understanding the Security Problem
Ethernet sniffing
IP spoofing
Designing a Secure Network
Using nonroutable IP
addresses
Masquerading IP
addresses
What Is a Firewall?
Packet filters
Using a basic
packet-filtering firewall: ipchains
Using an application-level
firewall
Using the Squid Proxy Server
Getting and installing
Squid
Making Squid work for the
first time
Tweaking Squid to fit your
needs
Getting Help from SATAN
Installing SATAN
Working with SATAN
Part VII: Tuning for Performance
Chapter 20: Hacking the Kernel
Why Do You Need a Newer Kernel?
What Linux Kernel Do You Have?
Preparing for a Kernel Upgrade
Installing the New Kernel
Creating the initial
ramdisk
Configuring LILO
Booting with the new
kernel
Customizing the Kernel
Installing Linux kernel
source
Configuring the kernel the
old-fashioned way
Configuring the kernel using
make menuconfig
Configuring the kernel using
make xconfig
Compiling, installing, and
booting the new kernel
Patching a Kernel
Using kernelcfg
Chapter 21: Building a Multiserver Web
Network
Requirements for the Web Network
Designing the Web Network
Considering a round-robin DNS
solution
Considering a hardware
load-balancing solution
Choosing the right
load-balancing solution
Allocating IP Addresses
Configuring the Network
Setting up the network for a
name server computer
Setting up the network
interfaces for each Web server
Setting up network interfaces
of the WSD Pro director
Testing the network
configuration
Setting Up the DNS Server
Setting Up the NFS Server
Setting Up the Mail (SMTP/POP3) Server
Setting Up the FTP Server
Setting Up rdist on the Name Server
Setting Up Each Web Server
Setting up the NFS client
configuration
Setting up sendmail to relay
to the smart host
Setting up rdist for file
distribution from ns.aminews-lan.com
Setting Up Web Director
Creating the Web services
farm
Creating the related network
services farm
Managing the Network
Taking a server out of
service
Prioritizing server
selection
Monitoring server load and
statistics
Adding a new Web server in
the Web server farm
Adding Client Web Sites
Chapter 22: Configuring the X Windows
System
What Is XFree86?
Preparing for XFree86
RAM requirements
Video card requirements
Monitor requirements
Disk space requirements
Installing XFree86
Configuring XFree86
Using Xconfigurator to create
an XF86Config file
Understanding XF86Config
file
Using X Windows
Configuring .xinitrc
Customizing the look and feel
of client applications
Using xdm, the X Display
Manager
Using XFree86 with Windows 9x/2000
Getting Micro X-Win32
Chapter 23: Using the X Window
System
Using the GNOME Desktop Environment
Choosing a Window
Manager
Configuring Window
Manager
Setting session options for
expert mode
Using X Windows for Administration
Using Gnome RPM
Using Update Agent
Using the GNOME System
Monitor
Using Time Machine
Using netcfg
Using printtool
Using the system
configuration tool
Using the kernel
configuration tool
Using the help search
tool
Part VIII: Appendixes
Appendix A: Linux Resources
Appendix B: What's on the CD-ROM
Index
L'auteur - Mohammed J. Kabir
MOHAMMED J. KABIR is the founder of EVOKNOW, a software development company, and an expert in multiserver Web networks. He is the author of many books, including Red Hat Security and Optimization, Apache 2 Server Bible, Red Hat Linux Administrator's Handbook, and Red Hat Survival Guide, as well as two previous editions of Red Hat Linux Server.
Caractéristiques techniques
PAPIER | |
Éditeur(s) | IDG |
Auteur(s) | Mohammed J. Kabir |
Parution | 01/12/2000 |
Édition | 2eme édition |
Nb. de pages | 729 |
Format | 18,7 x 23,1 |
Couverture | Broché |
Poids | 1347g |
Intérieur | Quadri |
EAN13 | 9780764547867 |
Avantages Eyrolles.com
Consultez aussi
- Les meilleures ventes en Graphisme & Photo
- Les meilleures ventes en Informatique
- Les meilleures ventes en Construction
- Les meilleures ventes en Entreprise & Droit
- Les meilleures ventes en Sciences
- Les meilleures ventes en Littérature
- Les meilleures ventes en Arts & Loisirs
- Les meilleures ventes en Vie pratique
- Les meilleures ventes en Voyage et Tourisme
- Les meilleures ventes en BD et Jeunesse