Perfect for systems and network administrators migrating from Windows NT to Linux, or experimenting with bringing Linux into their network topology. Even novice users will find plenty of helpful information on administering the open source operating system—including installation, initial configuration, using the bash command shell, managing files, managing software, and granting rights to users.
Author(s): Michael Turner, Steve Shah
Series: Beginner's Guide
Edition: 1
Publisher: McGraw-Hill Osborne Media
Year: 2003
Language: English
Pages: 650
Copyright......Page 5
Contents......Page 9
Acknowledgments......Page 23
Introduction......Page 25
Part I Installing Linux as a Server......Page 27
Module 1 Technical Summary of Linux Distributions and Windows......Page 29
CRITICAL SKILL 1.1 Describing Linux and Linux Distributions......Page 30
CRITICAL SKILL 1.2 Defining Free Software and the GNU License......Page 31
CRITICAL SKILL 1.3 Determining Technical Differences Between Windows and Linux......Page 35
CRITICAL SKILL 1.4 Exploring Other Linux Resources......Page 40
Module 1 Mastery Check......Page 41
Module 2 Installing Linux in a Server Configuration......Page 43
CRITICAL SKILL 2.1 Performing Preinstallation Evaluation......Page 44
CRITICAL SKILL 2.2 Installing Red Hat Linux......Page 50
Module Summary......Page 81
Module 2 Mastery Check......Page 82
Module 3 GNOME and KDE......Page 85
CRITICAL SKILL 3.1 Understanding the X Window System’s Origins......Page 86
CRITICAL SKILL 3.2 Using and Customizing GNOME......Page 89
CRITICAL SKILL 3.3 Using and Customizing KDE......Page 99
Module Summary......Page 111
Module 3 Mastery Check......Page 112
Module 4 Installing Software......Page 113
CRITICAL SKILL 4.1 Using the Red Hat Package Manager......Page 114
CRITICAL SKILL 4.2 Compiling Software Yourself Installing Software......Page 123
Module 4 Mastery Check......Page 132
Part II Single-Host Administration......Page 135
Module 5 Managing Users......Page 137
CRITICAL SKILL 5.1 Understanding Linux Users......Page 138
CRITICAL SKILL 5.2 Managing User Databases......Page 142
CRITICAL SKILL 5.3 Employing User Management Tools......Page 147
CRITICAL SKILL 5.4 Running Programs as Other Users......Page 157
CRITICAL SKILL 5.6 Using Pluggable Authentication Modules (PAM)......Page 159
Module Summary......Page 165
Module 5 Mastery Check......Page 166
Module 6 The Command Line......Page 169
CRITICAL SKILL 6.1 Switching Users: su......Page 170
CRITICAL SKILL 6.2 Using the BASH Shell......Page 171
CRITICAL SKILL 6.3 Reviewing Command-Line Documentation......Page 178
CRITICAL SKILL 6.4 Understanding File Listings, Ownerships, and Permissions......Page 180
CRITICAL SKILL 6.5 Managing and Manipulating Files......Page 186
CRITICAL SKILL 6.6 Tracking and Terminating Processes......Page 198
CRITICAL SKILL 6.7 Using Miscellaneous Command-Line Tools......Page 205
CRITICAL SKILL 6.8 Editing Text Files......Page 210
CRITICAL SKILL 6.9 Reviewing Linux File System Standards......Page 211
Module Summary......Page 212
Module 6 Mastery Check......Page 213
Module 7 File Systems......Page 215
CRITICAL SKILL 7.1 Understanding File Systems......Page 216
CRITICAL SKILL 7.2 Managing File Systems......Page 219
CRITICAL SKILL 7.3 Adding and Partitioning a Disk......Page 227
CRITICAL SKILL 7.4 Using Network File Systems......Page 237
CRITICAL SKILL 7.5 Managing Quotas......Page 241
Module 7 Mastery Check......Page 247
Module 8 Core System Services......Page 249
CRITICAL SKILL 8.1 Configuring the Boot Manager......Page 250
CRITICAL SKILL 8.2 Knowing the Boot Process......Page 256
CRITICAL SKILL 8.3 Learning about the init Service......Page 258
CRITICAL SKILL 8.4 Configuring and Using the xinetd Process......Page 260
CRITICAL SKILL 8.5 Managing the syslogd Daemon......Page 266
CRITICAL SKILL 8.6 Using the cron Program......Page 272
CRITICAL SKILL 8.7 Enabling and Disabling Services......Page 276
Module 8 Mastery Check......Page 284
Module 9 Securing an Individual Server......Page 287
CRITICAL SKILL 9.1 Keeping Your System up2date......Page 288
CRITICAL SKILL 9.2 Understanding TCP/IP and Network Security......Page 297
CRITICAL SKILL 9.3 Using Tracking Services......Page 299
CRITICAL SKILL 9.4 Monitoring Your System......Page 304
CRITICAL SKILL 9.5 Employing a Checklist......Page 310
CRITICAL SKILL 9.6 Finding Helpful Resources Online......Page 311
CRITICAL SKILL 9.7 Being Aware of Security Miscellany......Page 312
Module 9 Mastery Check......Page 313
Part III Internet Services......Page 315
Module 10 The Domain Name Service (DNS)......Page 317
CRITICAL SKILL 10.1 Understanding the History Behind DNS: The /etc/hosts File......Page 319
CRITICAL SKILL 10.2 Exploring the Guts of DNS......Page 321
CRITICAL SKILL 10.3 Installing a DNS Server......Page 327
CRITICAL SKILL 10.4 Configuring Clients......Page 330
CRITICAL SKILL 10.5 Getting Ready for DNS Servers: The named.conf File......Page 334
CRITICAL SKILL 10.6 Configuring Servers......Page 344
CRITICAL SKILL 10.7 Putting It All Together......Page 353
CRITICAL SKILL 10.8 Using the DNS Toolbox......Page 359
Module Summary......Page 363
Module 10 Mastery Check......Page 364
Module 11 Transferring Files with FTP......Page 365
CRITICAL SKILL 11.1 Defining the Mechanics of FTP......Page 366
CRITICAL SKILL 11.2 Setting Up vsftp......Page 369
CRITICAL SKILL 11.3 Configuring vsftpd......Page 372
CRITICAL SKILL 11.4 Configuring a Virtual FTP Server......Page 378
Module Summary......Page 381
Module 11 Mastery Check......Page 382
Module 12 Setting Up Your Web Server Using Apache......Page 383
CRITICAL SKILL 12.1 Explaining the Mechanics of HTTP......Page 384
CRITICAL SKILL 12.2 Setting Up the Apache HTTP Server......Page 388
CRITICAL SKILL 12.3 Configuring Apache......Page 391
CRITICAL SKILL 12.4 Performing Basic Troubleshooting with Apache......Page 399
Module Summary......Page 400
Module 12 Mastery Check......Page 401
Module 13 Sending Mail with SMTP......Page 403
CRITICAL SKILL 13.1 Discovering the Mechanics of SMTP......Page 404
CRITICAL SKILL 13.2 Exploring Sendmail......Page 408
CRITICAL SKILL 13.3 Choosing Postfix......Page 429
CRITICAL SKILL 13.4 Solving Real-Life MTA Issues......Page 441
Module Summary......Page 445
Module 13 Mastery Check......Page 446
Module 14 Using POP and IMAP for E-Mail Retrieval......Page 447
CRITICAL SKILL 14.1 Comparing the POP and IMAP Protocols......Page 448
CRITICAL SKILL 14.2 Installing POP and IMAP on Red Hat......Page 451
CRITICAL SKILL 14.3 Reading Mail with Telnet......Page 453
CRITICAL SKILL 14.4 Noticing IMAP Quirks......Page 459
CRITICAL SKILL 14.5 Performing Special Authentication......Page 460
Module Summary......Page 461
Module 14 Mastery Check......Page 462
Module 15 The Secure Shell (SSH)......Page 463
CRITICAL SKILL 15.1 Discussing Public Key Cryptography......Page 465
CRITICAL SKILL 15.2 Exploring SSH Versions and Distributions......Page 468
CRITICAL SKILL 15.3 Performing Server Setup......Page 471
CRITICAL SKILL 15.4 Using Secure Shell (SSH)......Page 477
Module Summary......Page 480
Module 15 Mastery Check......Page 481
Part IV Intranet Services......Page 483
Module 16 Network File System (NFS)......Page 485
CRITICAL SKILL 16.1 Examining the Mechanics of NFS......Page 486
CRITICAL SKILL 16.2 Enabling NFS......Page 488
CRITICAL SKILL 16.3 Configuring NFS Servers......Page 490
CRITICAL SKILL 16.4 Configuring NFS Clients......Page 496
CRITICAL SKILL 16.5 Learning Common Uses for NFS Partitions......Page 499
CRITICAL SKILL 16.6 Troubleshooting NFS......Page 500
Module 16 Mastery Check......Page 501
Module 17 Network Information Service (NIS)......Page 503
CRITICAL SKILL 17.1 Looking Inside NIS......Page 504
CRITICAL SKILL 17.2 Installing and Configuring the NIS Servers......Page 506
CRITICAL SKILL 17.3 Configuring an NIS Client......Page 513
CRITICAL SKILL 17.4 Configuring a Secondary NIS Server......Page 517
CRITICAL SKILL 17.5 Discovering the NIS Tools......Page 519
CRITICAL SKILL 17.6 Implementing NIS in a Real Network......Page 522
Module 17 Mastery Check......Page 524
Module 18 Talking to Windows with Samba......Page 527
CRITICAL SKILL 18.1 Understanding the Mechanics of SMB......Page 528
CRITICAL SKILL 18.2 Installing Samba......Page 530
CRITICAL SKILL 18.3 Performing Samba Administration......Page 531
CRITICAL SKILL 18.4 Administering Samba with SWAT......Page 532
CRITICAL SKILL 18.5 Sharing with redhat-config-samba......Page 537
CRITICAL SKILL 18.6 Using smbclient......Page 538
CRITICAL SKILL 18.8 Supporting Encrypted Passwords......Page 541
CRITICAL SKILL 18.9 Troubleshooting Samba......Page 542
Module 18 Mastery Check......Page 543
Module 19 Printing......Page 545
CRITICAL SKILL 19.2 Installing LPRng......Page 547
CRITICAL SKILL 19.3 Configuring /etc/printcap......Page 548
CRITICAL SKILL 19.4 Understanding the /etc/lpd.perms File......Page 553
CRITICAL SKILL 19.5 Examining the Client Programs of lpd......Page 555
CRITICAL SKILL 19.6 Exploring CUPS......Page 557
CRITICAL SKILL 19.7 Installing CUPS......Page 558
CRITICAL SKILL 19.8 Configuring Clients for CUPS......Page 564
Module 19 Mastery Check......Page 566
Module 20 Host Configuration with DHCP......Page 569
CRITICAL SKILL 20.1 Discovering BOOTP and the Roots of DHCP......Page 570
CRITICAL SKILL 20.2 Viewing the Mechanics of DHCP......Page 571
CRITICAL SKILL 20.3 Investigating the DHCP Server......Page 572
CRITICAL SKILL 20.4 Knowing the DHClient......Page 580
Module 20 Mastery Check......Page 583
Module 21 Backups......Page 585
CRITICAL SKILL 21.1 Evaluating Your Backup Needs......Page 586
CRITICAL SKILL 21.2 Managing the Backup Device and Files Backups......Page 589
CRITICAL SKILL 21.3 Exploring Command-Line Tools......Page 592
CRITICAL SKILL 21.4 Using Amanda......Page 597
Module 21 Mastery Check......Page 603
Appendix Answers to Mastery Checks......Page 605
Index......Page 623