Main Menu
PHP Tools
PHP Help Request
PHP Editors Newsletter
Editor Search
Reviewed PHP Editors
Latest News
Submit News
PHP Tutorials
PHP Book Reviews
Online Book Chapters
PHP Games
Forums
PHP Desktop Editors
Other PHP Tools
PHP Contests
PHP Programming Help
Linux Help
Apache Help
MySQL Help
PHP Games
PHP Jobs
PHP Forums Home
Programming Contest
PHP Contests
PHP Contests Archive
Documentation
PHP Manual
PEAR Manual
PHP-GTK Manual
Smarty Manual
PostgreSQL Manual
CSS 2 Reference
Redhat Linux 9
HTML 4.01
Apache 2 Manual
Partner Sites
Ajax Tutorials
Webmaster Resources
Web Templates
PHP Scripts
PHP Code Examples
Learn PHP playing Trivia
PHP & MySQL Forums
Web Development Index
web site templates
Sponsors
NuSphere
All Red Hat Linux documents are
copyrighted
to
Red Hat Inc
.
Red Hat Linux 9
Red Hat Linux Reference Guide
Copyright
© 2003 by Red Hat, Inc.
ISBN: N/A
Table of Contents
Introduction
1.
Changes To This Manual
2.
Finding Appropriate Documentation
2.1.
Documentation For First-Time Linux Users
2.2.
For the More Experienced
2.3.
Documentation for Linux Gurus
3.
Document Conventions
4.
Using the Mouse
5.
Copying and Pasting Text With X
6.
More to Come
6.1.
We Need Feedback!
7.
Sign Up for Support
I.
System Reference
1.
Boot Process, Init, and Shutdown
1.1.
The Boot Process
1.2.
A Detailed Look at the Boot Process
1.3.
Running Additional Programs at Boot Time
1.4.
SysV Init Runlevels
1.5.
Shutting Down
2.
Boot Loaders
2.1.
Boot Loaders and System Architecture
2.2.
GRUB
2.3.
Installing GRUB
2.4.
GRUB Terminology
2.5.
GRUB Interfaces
2.6.
GRUB Commands
2.7.
GRUB Menu Configuration File
2.8.
LILO
2.9.
Options in
/etc/lilo.conf
2.10.
Changing Runlevels at Boot Time
2.11.
Additional Resources
3.
File System Structure
3.1.
Why Share a Common Structure?
3.2.
Overview of File System Hierarchy Standard (FHS)
3.3.
Special File Locations
4.
The
sysconfig
Directory
4.1.
Files in the
/etc/sysconfig/
Directory
4.2.
Directories in the
/etc/sysconfig/
Directory
4.3.
Additional Resources
5.
The
proc
File System
5.1.
A Virtual File System
5.2.
Top-level Files in the
proc
File System
5.3.
Directories in
/proc/
5.4.
Using the
sysctl
Command
5.5.
Additional Resources
6.
Users and Groups
6.1.
User and Group Management Tools
6.2.
Standard Users
6.3.
Standard Groups
6.4.
User Private Groups
6.5.
Shadow Passwords
7.
The X Window System
7.1.
XFree86
7.2.
Desktop Environments and Window Managers
7.3.
XFree86 Server Configuration Files
7.4.
Fonts
7.5.
Runlevels and XFree86
7.6.
Additional Resources
II.
Network Services Reference
8.
Network Interfaces
8.1.
Network Configuration Files
8.2.
Interface Configuration Files
8.3.
Interface Control Scripts
8.4.
Network Function Files
8.5.
Additional Resources
9.
Network File System (NFS)
9.1.
Methodology
9.2.
NFS Server Configuration Files
9.3.
NFS Client Configuration Files
9.4.
Securing NFS
9.5.
Additional Resources
10.
Apache HTTP Server
10.1.
Apache HTTP Server 2.0
10.2.
Migrating Apache HTTP Server 1.3 Configuration Files
10.3.
After Installation
10.4.
Starting and Stopping
httpd
10.5.
Configuration Directives in
httpd.conf
10.6.
Default Modules
10.7.
Adding Modules
10.8.
Virtual Hosts
10.9.
Additional Resources
11.
Email
11.1.
Email Protocols
11.2.
Email Program Classifications
11.3.
Mail Transport Agents
11.4.
Mail Delivery Agents
11.5.
Mail User Agents
11.6.
Additional Resources
12.
Berkeley Internet Name Domain (BIND)
12.1.
Introduction to DNS
12.2.
/etc/named.conf
12.3.
Zone Files
12.4.
Using
rndc
12.5.
Advanced Features of BIND
12.6.
Common Mistakes to Avoid
12.7.
Additional Resources
13.
Lightweight Directory Access Protocol (LDAP)
13.1.
Why Use LDAP?
13.2.
LDAP Terminology
13.3.
OpenLDAP Daemons and Utilities
13.4.
OpenLDAP Configuration Files
13.5.
The
/etc/openldap/schema/
Directory
13.6.
OpenLDAP Setup Overview
13.7.
Configuring Your System to Authenticate Using OpenLDAP
13.8.
Upgrading to OpenLDAP Version 2.0
13.9.
Additional Resources
III.
Security Reference
14.
Pluggable Authentication Modules (PAM)
14.1.
Advantages of PAM
14.2.
PAM Configuration Files
14.3.
PAM Configuration File Format
14.4.
Sample PAM Configuration Files
14.5.
Creating PAM Modules
14.6.
PAM and Device Ownership
14.7.
Additional Resources
15.
TCP Wrappers and
xinetd
15.1.
TCP Wrappers
15.2.
TCP Wrappers Configuration Files
15.3.
xinetd
15.4.
xinetd
Configuration Files
15.5.
Additional Resources
16.
iptables
16.1.
Packet Filtering
16.2.
Differences between
iptables
and
ipchains
16.3.
Options Used in
iptables
Commands
16.4.
Storing
iptables
Information
16.5.
Additional Resources
17.
Kerberos
17.1.
Advantages of Kerberos
17.2.
Kerberos Terminology
17.3.
How Kerberos Works
17.4.
Kerberos and PAM
17.5.
Configuring a Kerberos 5 Server
17.6.
Configuring a Kerberos 5 Client
17.7.
Additional Resources
18.
SSH Protocol
18.1.
Features of SSH
18.2.
SSH Protocol Versions
18.3.
Event Sequence of an SSH Connection
18.4.
OpenSSH Configuration Files
18.5.
More Than a Secure Shell
18.6.
Requiring SSH for Remote Connections
19.
Tripwire
19.1.
How to Use Tripwire
19.2.
Installing the Tripwire RPM
19.3.
Customizing Tripwire
19.4.
Initialize the Tripwire Database
19.5.
Running an Integrity Check
19.6.
Examining Tripwire Reports
19.7.
Updating the Tripwire Database
19.8.
Updating the Tripwire Policy File
19.9.
Updating the Tripwire Configuration File
19.10.
Tripwire File Location Reference
19.11.
Additional Resources
IV.
Appendixes
A.
General Parameters and Modules
A.1.
Specifying Module Parameters
A.2.
CD-ROM Module Parameters
A.3.
SCSI parameters
A.4.
Ethernet Parameters
Index
Colophon
Next
Introduction
© Copyright 2003-2023 www.php-editors.com. The ultimate
PHP Editor
and
PHP IDE
site.