Preface |
|
xxxiii | |
|
Part I Getting Started in Fedora |
|
|
1 | (148) |
|
Chapter 1 An Overview of Fedora |
|
|
3 | (18) |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
7 | (2) |
|
Primary Advantages of Linux |
|
|
9 | (1) |
|
|
10 | (3) |
|
Red Hat forms the Fedora Project |
|
|
10 | (2) |
|
Red Hat shifts to Red Hat Enterprise Linux |
|
|
12 | (1) |
|
Choosing between Fedora and Enterprise |
|
|
12 | (1) |
|
|
13 | (2) |
|
New Features in Fedora 13 and 14 |
|
|
15 | (1) |
|
Automatic print driver installation |
|
|
16 | (1) |
|
NetworkManager improvements |
|
|
16 | (1) |
|
Better support for small devices |
|
|
16 | (1) |
|
Getting Fedora Software and Spins |
|
|
16 | (2) |
|
RPMfusion.org third-party software repository |
|
|
16 | (1) |
|
Getting custom Fedora spins |
|
|
17 | (1) |
|
|
17 | (1) |
|
The Culture of Free Software |
|
|
18 | (1) |
|
|
19 | (2) |
|
Chapter 2 Installing Fedora |
|
|
21 | (54) |
|
Understanding Fedora Installation Media |
|
|
22 | (1) |
|
Using the Fedora 14 Live CD |
|
|
22 | (2) |
|
|
24 | (2) |
|
Detailed Installation Instructions |
|
|
26 | (16) |
|
Choosing an installation method |
|
|
27 | (1) |
|
|
27 | (1) |
|
From DVD, network, or hard disk? |
|
|
28 | (2) |
|
Preparing for installation using the live CD |
|
|
30 | (1) |
|
Displaying hardware information |
|
|
31 | (1) |
|
|
32 | (1) |
|
Beginning the installation |
|
|
33 | (6) |
|
|
39 | (2) |
|
Going forward after installation |
|
|
41 | (1) |
|
Special Installation Procedures |
|
|
42 | (12) |
|
Alternatives for starting installation |
|
|
42 | (1) |
|
Booting installation from hard disk |
|
|
42 | (1) |
|
Booting installation from a USB device |
|
|
43 | (1) |
|
Booting installation using PXE |
|
|
44 | (1) |
|
Booting installation using boot.fedoraproject.org |
|
|
45 | (1) |
|
Installing from other media |
|
|
45 | (1) |
|
|
45 | (1) |
|
Setting up an HTTP, FTP, or NFS install server |
|
|
46 | (2) |
|
|
48 | (1) |
|
Performing a kickstart installation |
|
|
48 | (1) |
|
Creating the kickstart file |
|
|
49 | (4) |
|
Installing the kickstart file |
|
|
53 | (1) |
|
Booting a kickstart installation |
|
|
53 | (1) |
|
Special Installation Topics |
|
|
54 | (17) |
|
Setting up to dual-boot Linux and Windows |
|
|
54 | (1) |
|
Resizing your Windows partitions |
|
|
54 | (2) |
|
Using Windows partitions from Linux |
|
|
56 | (2) |
|
|
58 | (1) |
|
Partitioning with Disk Setup during installation |
|
|
58 | (4) |
|
|
62 | (1) |
|
Tips for creating partitions |
|
|
63 | (2) |
|
Installing Fedora on an Intel-based Mac |
|
|
65 | (1) |
|
Before installing Fedora on your Mac |
|
|
65 | (1) |
|
|
66 | (1) |
|
Using the GRUB boot loader |
|
|
67 | (1) |
|
Temporarily changing boot options |
|
|
68 | (1) |
|
Permanently changing boot options |
|
|
69 | (1) |
|
Adding a new GRUB boot image |
|
|
70 | (1) |
|
Troubleshooting Installation |
|
|
71 | (2) |
|
Spinning Your Own Fedora Install or Live Media |
|
|
73 | (1) |
|
|
74 | (1) |
|
Chapter 3 Getting Productive with the Desktop |
|
|
75 | (28) |
|
|
76 | (2) |
|
Getting Familiar with the Desktop |
|
|
78 | (2) |
|
|
79 | (1) |
|
Getting more desktop space with virtual workspaces |
|
|
79 | (1) |
|
|
80 | (9) |
|
Launching applications from the top bar |
|
|
80 | (1) |
|
Switching windows from the bottom bar |
|
|
81 | (1) |
|
|
81 | (2) |
|
|
83 | (1) |
|
Modifying the GNOME panels |
|
|
84 | (1) |
|
Adding an application launcher |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
86 | (1) |
|
Changing panel properties |
|
|
87 | (1) |
|
Using the Metacity window manager |
|
|
87 | (1) |
|
Switching to another user |
|
|
88 | (1) |
|
|
88 | (1) |
|
Switching Desktop Environments |
|
|
89 | (1) |
|
|
89 | (7) |
|
|
91 | (1) |
|
Switching windows from the bottom bar |
|
|
92 | (1) |
|
|
92 | (1) |
|
Managing files with Dolphin and Konqueror |
|
|
92 | (1) |
|
|
93 | (1) |
|
Searching for files with Dolphin and kfind |
|
|
94 | (1) |
|
|
95 | (1) |
|
Customizing the KDE desktop |
|
|
95 | (1) |
|
|
95 | (1) |
|
Adding widgets to the panel |
|
|
96 | (1) |
|
Adding widgets to the desktop |
|
|
96 | (1) |
|
Using the Xfce Desktop Environment |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
97 | (1) |
|
Running 3D Accelerated Desktop Effects |
|
|
98 | (1) |
|
Troubleshooting Your Desktop |
|
|
99 | (2) |
|
GUI doesn't work at startup |
|
|
99 | (2) |
|
Tuning your video card and monitor |
|
|
101 | (1) |
|
|
101 | (1) |
|
|
101 | (2) |
|
Chapter 4 Using Linux Commands |
|
|
103 | (46) |
|
|
104 | (1) |
|
|
104 | (5) |
|
Checking your login session |
|
|
105 | (1) |
|
Checking directories and permissions |
|
|
106 | (2) |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
109 | (21) |
|
|
110 | (3) |
|
|
113 | (1) |
|
|
113 | (3) |
|
|
116 | (1) |
|
|
117 | (2) |
|
Connecting and expanding commands |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
120 | (1) |
|
|
120 | (1) |
|
Expanding arithmetic expressions |
|
|
121 | (1) |
|
Using shell environment variables |
|
|
121 | (1) |
|
Common shell environment variables |
|
|
121 | (2) |
|
Setting your own environment variables |
|
|
123 | (1) |
|
Managing background and foreground processes |
|
|
124 | (1) |
|
Starting background processes |
|
|
125 | (1) |
|
Moving commands to the foreground and background |
|
|
126 | (1) |
|
|
127 | (1) |
|
|
128 | (1) |
|
Adding environment variables |
|
|
129 | (1) |
|
|
130 | (1) |
|
Working with the Linux File System |
|
|
130 | (9) |
|
Creating files and directories |
|
|
132 | (2) |
|
Using metacharacters and operators |
|
|
134 | (1) |
|
Using file-matching metacharacters |
|
|
134 | (2) |
|
Using file-redirection metacharacters |
|
|
136 | (1) |
|
Understanding file permissions |
|
|
136 | (2) |
|
Moving, copying, and deleting files |
|
|
138 | (1) |
|
|
139 | (6) |
|
|
140 | (1) |
|
|
140 | (3) |
|
|
143 | (1) |
|
|
143 | (1) |
|
Using numbers with commands |
|
|
144 | (1) |
|
Using graphical text editors and notepads |
|
|
144 | (1) |
|
Working with Virtual Terminals |
|
|
145 | (2) |
|
Switching terminals with the screen program |
|
|
146 | (1) |
|
|
147 | (2) |
|
|
149 | (156) |
|
Chapter 5 Accessing and Running Applications |
|
|
151 | (52) |
|
Getting and Installing Software Packages |
|
|
152 | (10) |
|
Downloading and installing applications with yum |
|
|
153 | (1) |
|
Configuring yum (/etc/yum.conf) |
|
|
154 | (2) |
|
Adding yum repositories (/etc/yum.repos.d/) |
|
|
156 | (1) |
|
Running yum to download and install RPMs |
|
|
157 | (1) |
|
Using yum to install packages locally |
|
|
158 | (1) |
|
Using yum for listing packages |
|
|
159 | (1) |
|
Removing packages with yum |
|
|
159 | (1) |
|
Using the yum-utils package |
|
|
160 | (1) |
|
Getting Fedora software updates |
|
|
160 | (1) |
|
Being alerted to available updates |
|
|
160 | (1) |
|
Getting manual updates with yum |
|
|
161 | (1) |
|
|
162 | (12) |
|
Using the PackageKit Add/Remove window |
|
|
162 | (2) |
|
|
164 | (1) |
|
Verifying rpm package integrity |
|
|
165 | (1) |
|
|
166 | (2) |
|
Upgrading packages with rpm |
|
|
168 | (1) |
|
Freshening packages with rpm |
|
|
169 | (1) |
|
Removing packages with rpm |
|
|
169 | (1) |
|
Querying packages with rpm |
|
|
170 | (3) |
|
Verifying installed packages with rpm |
|
|
173 | (1) |
|
|
174 | (1) |
|
Using Software in Different Formats |
|
|
174 | (7) |
|
Understanding software package names and formats |
|
|
175 | (2) |
|
Using different archive and document formats |
|
|
177 | (2) |
|
Building and installing from source code |
|
|
179 | (1) |
|
Installing software in SRPM format |
|
|
179 | (1) |
|
Installing software in tar.gz or tar.bz2 formats |
|
|
180 | (1) |
|
Using Fedora to Run Applications |
|
|
181 | (13) |
|
Finding common desktop applications in Linux |
|
|
183 | (2) |
|
Investigating your desktop |
|
|
185 | (1) |
|
Starting applications from a menu |
|
|
185 | (1) |
|
Starting applications from a Run Application window |
|
|
185 | (1) |
|
Starting applications from GNOME Do |
|
|
186 | (1) |
|
Starting applications from a Terminal window |
|
|
187 | (1) |
|
Running remote X applications |
|
|
188 | (1) |
|
Traditional method to run remote X applications |
|
|
189 | (1) |
|
Launching a remote X application |
|
|
190 | (2) |
|
Using user-based security |
|
|
192 | (1) |
|
Using SSH to run remote X applications |
|
|
193 | (1) |
|
Running Microsoft Windows and DOS Applications |
|
|
194 | (8) |
|
|
195 | (1) |
|
|
195 | (1) |
|
|
196 | (1) |
|
Running Microsoft Windows applications in Linux |
|
|
197 | (1) |
|
Running Windows Applications with WINE |
|
|
198 | (1) |
|
|
199 | (1) |
|
Installing applications in WINE |
|
|
200 | (1) |
|
|
200 | (1) |
|
Tuning and configuring WINE |
|
|
201 | (1) |
|
Finding more Windows applications for WINE |
|
|
202 | (1) |
|
|
202 | (1) |
|
Chapter 6 Working in a Linux Office |
|
|
203 | (14) |
|
Running the OpenOffice.org Suite |
|
|
203 | (4) |
|
|
207 | (1) |
|
Other Office Applications |
|
|
207 | (1) |
|
|
207 | (1) |
|
|
208 | (1) |
|
|
208 | (1) |
|
|
208 | (1) |
|
|
208 | (1) |
|
Using Traditional Linux Publishing Tools |
|
|
209 | (4) |
|
Creating Documents in Groff or LaTeX |
|
|
210 | (1) |
|
Text processing with Groff |
|
|
210 | (1) |
|
Formatting and printing documents with Groff |
|
|
211 | (1) |
|
Text processing with TeX/LaTeX |
|
|
212 | (1) |
|
Creating and formatting a LaTeX document |
|
|
212 | (1) |
|
Creating DocBook documents |
|
|
212 | (1) |
|
Doing Page Layout with Scribus |
|
|
213 | (1) |
|
|
214 | (2) |
|
Manipulating images with GIMP |
|
|
214 | (1) |
|
|
214 | (1) |
|
Creating vector graphic images with lnkscape |
|
|
215 | (1) |
|
Using Scanners Driven by SANE |
|
|
216 | (1) |
|
|
216 | (1) |
|
Chapter 7 Music, Video, and Images in Linux |
|
|
217 | (48) |
|
Understanding Multimedia and Legal Issues in Linux |
|
|
217 | (1) |
|
Extending Freedom to Codecs |
|
|
218 | (1) |
|
Listening to Music in Linux |
|
|
219 | (24) |
|
|
221 | (1) |
|
|
221 | (2) |
|
Detecting your sound card driver |
|
|
223 | (1) |
|
|
224 | (1) |
|
Setting your sound card to record |
|
|
225 | (1) |
|
|
225 | (1) |
|
Automatically playing CDs |
|
|
226 | (1) |
|
Playing and managing music with Rhythmbox |
|
|
227 | (3) |
|
Playing music with XMMS Audio Player |
|
|
230 | (2) |
|
|
232 | (1) |
|
Using the Playlist Editor |
|
|
232 | (1) |
|
Using ogg123, mpg321, and play command-line players |
|
|
233 | (1) |
|
|
234 | (1) |
|
Convening audio files with SoX |
|
|
235 | (1) |
|
Extracting and encoding music |
|
|
236 | (1) |
|
Extracting music CDs with Sound Juicer |
|
|
236 | (2) |
|
Extracting and encoding music CDs from commands |
|
|
238 | (1) |
|
Creating your own music CDs |
|
|
239 | (1) |
|
Creating audio CDs with cdrecord |
|
|
239 | (1) |
|
Creating audio and data CDs with K3b |
|
|
240 | (2) |
|
Creating audio and data CDs with Brasero |
|
|
242 | (1) |
|
Viewing TV, Video Conferencing, and Using Webcams |
|
|
243 | (6) |
|
|
243 | (1) |
|
Getting a supported TV card |
|
|
244 | (1) |
|
|
245 | (1) |
|
Selecting channels in tvtime |
|
|
246 | (1) |
|
Video conferencing and VOIP with Ekiga |
|
|
246 | (1) |
|
Getting a supported webcam |
|
|
246 | (1) |
|
|
247 | (1) |
|
Taking webcam videos and snapshots with Cheese |
|
|
248 | (1) |
|
|
249 | (8) |
|
Examining laws affecting video and Linux |
|
|
250 | (1) |
|
Understanding video content types |
|
|
251 | (1) |
|
|
252 | (2) |
|
|
254 | (1) |
|
Creating playlists with Xine |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
256 | (1) |
|
|
257 | (3) |
|
Displaying images in Fedora |
|
|
258 | (1) |
|
Using your camera as a storage device |
|
|
259 | (1) |
|
|
260 | (3) |
|
Jumping into Linux gaming |
|
|
261 | (2) |
|
Basic Linux gaming information |
|
|
263 | (1) |
|
|
263 | (2) |
|
Chapter 8 Using the Internet and the Web |
|
|
265 | (40) |
|
Overview of Internet Applications and Commands |
|
|
265 | (2) |
|
|
267 | (14) |
|
Browsing the Web with Firefox |
|
|
268 | (4) |
|
|
272 | (1) |
|
|
272 | (2) |
|
|
274 | (2) |
|
|
276 | (1) |
|
|
276 | (1) |
|
|
277 | (1) |
|
Browsing the Web with Chrome |
|
|
278 | (1) |
|
|
279 | (1) |
|
|
279 | (1) |
|
Using text-based Web browsers |
|
|
280 | (1) |
|
Communicating with E-mail |
|
|
281 | (8) |
|
|
282 | (2) |
|
Setting Evolution preferences |
|
|
284 | (1) |
|
Receiving, composing, and sending e-mail |
|
|
284 | (1) |
|
Using Evolution to manage your schedule and contacts |
|
|
285 | (1) |
|
Connecting to Microsoft Exchange servers |
|
|
285 | (1) |
|
|
286 | (1) |
|
|
287 | (1) |
|
Mail readers and managers |
|
|
288 | (1) |
|
|
288 | (1) |
|
|
288 | (1) |
|
Participating in Newsgroups |
|
|
289 | (1) |
|
|
289 | (2) |
|
Instant messaging with Pidgin |
|
|
289 | (2) |
|
Using other instant message clients |
|
|
291 | (1) |
|
Sharing Files with BitTorrent |
|
|
291 | (1) |
|
Using Remote Login, Copy, and Execution |
|
|
292 | (11) |
|
|
292 | (1) |
|
|
293 | (2) |
|
|
295 | (2) |
|
|
297 | (2) |
|
|
299 | (1) |
|
Downloading a single file |
|
|
299 | (1) |
|
Downloading a file with user name and password |
|
|
300 | (1) |
|
Downloading a whole website |
|
|
300 | (1) |
|
|
301 | (1) |
|
Using ssh for remote login/remote execution |
|
|
301 | (1) |
|
Using scp for remote file copy |
|
|
302 | (1) |
|
Using the "r" commands: rlogin, rcp, and rsh |
|
|
302 | (1) |
|
|
303 | (2) |
|
Part III Administering Fedora |
|
|
305 | (218) |
|
Chapter 9 Understanding System Administration |
|
|
307 | (56) |
|
Using the root user Account |
|
|
308 | (1) |
|
Becoming the Super User: The su Command |
|
|
308 | (2) |
|
Learning About Administrative GUI Tools, Commands, Configuration Files, and Log Files |
|
|
310 | (12) |
|
Using graphical administration tools |
|
|
310 | (4) |
|
|
314 | (1) |
|
Administrative configuration files |
|
|
314 | (4) |
|
|
318 | (1) |
|
Using other administrative logins |
|
|
318 | (1) |
|
Understanding administrative logins |
|
|
319 | (1) |
|
Using sudo to assign administrative privilege |
|
|
319 | (2) |
|
Using PolicyKit for assigning administrative privilege |
|
|
321 | (1) |
|
Administering Your Linux System |
|
|
322 | (1) |
|
|
322 | (4) |
|
|
323 | (1) |
|
Managing hardware with the DeviceKit |
|
|
323 | (1) |
|
|
324 | (1) |
|
|
324 | (1) |
|
|
325 | (1) |
|
|
326 | (1) |
|
Managing File Systems and Disk Space |
|
|
326 | (20) |
|
|
329 | (1) |
|
|
330 | (2) |
|
Using the fstab file to define mountable file systems |
|
|
332 | (2) |
|
Using the mount command to mount file systems |
|
|
334 | (3) |
|
Using the umount command to unmount a file system |
|
|
337 | (1) |
|
Using the mkfs command to create a file system |
|
|
338 | (1) |
|
|
339 | (2) |
|
|
341 | (2) |
|
|
343 | (1) |
|
Checking disk space with Disk Usage Analyzer |
|
|
343 | (1) |
|
Displaying system space with df |
|
|
343 | (2) |
|
Checking disk usage with du |
|
|
345 | (1) |
|
Finding disk consumption with find |
|
|
345 | (1) |
|
Monitoring System Performance |
|
|
346 | (5) |
|
Watching computer usage with System Monitor |
|
|
346 | (1) |
|
Monitoring CPU usage with top |
|
|
347 | (1) |
|
Monitoring power usage on laptop computers |
|
|
348 | (1) |
|
Using the GNOME Power Manager applet |
|
|
349 | (1) |
|
Using apm to enter suspend mode |
|
|
350 | (1) |
|
Using acpi_listen to monitor ACPI events |
|
|
350 | (1) |
|
Fixing Your System with the FirstAidKit |
|
|
351 | (1) |
|
Choosing Software Alternatives |
|
|
352 | (1) |
|
Selecting Java alternatives |
|
|
352 | (1) |
|
Selecting mail alternatives |
|
|
352 | (1) |
|
|
353 | (1) |
|
Using Security Enhanced Linux |
|
|
353 | (8) |
|
Types and roles in SELinux |
|
|
354 | (1) |
|
|
355 | (1) |
|
|
355 | (1) |
|
|
356 | (1) |
|
|
356 | (1) |
|
|
357 | (1) |
|
Checking whether SELinux is on |
|
|
357 | (1) |
|
|
358 | (2) |
|
Working with SELinux on a server |
|
|
360 | (1) |
|
Learning more about SELinux |
|
|
361 | (1) |
|
|
361 | (2) |
|
Chapter 10 Setting Up and Supporting Users |
|
|
363 | (34) |
|
|
363 | (10) |
|
Adding users with useradd |
|
|
364 | (5) |
|
Adding users with the Account Information dialog |
|
|
369 | (1) |
|
Adding users with User Manager |
|
|
370 | (3) |
|
|
373 | (7) |
|
Supplying initial login scripts |
|
|
376 | (1) |
|
Supplying initial .bashrc and .bash_profile files |
|
|
376 | (1) |
|
Supplying an initial .tcshrc file |
|
|
377 | (1) |
|
Configuring system-wide shell options |
|
|
378 | (1) |
|
Configuring system-wide bash options |
|
|
378 | (1) |
|
Configuring system-wide tcsh options |
|
|
378 | (1) |
|
|
378 | (1) |
|
Adding user accounts to servers |
|
|
379 | (1) |
|
Creating Portable Desktops |
|
|
380 | (1) |
|
Providing Support to Users |
|
|
381 | (2) |
|
Creating a technical support mailbox |
|
|
382 | (1) |
|
Resetting a user's password |
|
|
382 | (1) |
|
|
383 | (4) |
|
Modifying user accounts with usermod |
|
|
383 | (3) |
|
Modifying user accounts with User Manager |
|
|
386 | (1) |
|
|
387 | (1) |
|
Deleting user accounts with userdel |
|
|
387 | (1) |
|
Deleting user accounts with User Manager |
|
|
388 | (1) |
|
|
388 | (6) |
|
Using quota to check disk usage |
|
|
389 | (1) |
|
Editing the /etc/fstab file |
|
|
389 | (1) |
|
|
390 | (1) |
|
Creating a quota startup script |
|
|
390 | (1) |
|
Turning on the quota startup script |
|
|
391 | (1) |
|
|
392 | (1) |
|
|
393 | (1) |
|
|
393 | (1) |
|
Using du to check disk use |
|
|
393 | (1) |
|
Removing temp files automatically |
|
|
394 | (1) |
|
Sending Mail to All Users |
|
|
394 | (2) |
|
|
396 | (1) |
|
Chapter 11 Automating System Tasks |
|
|
397 | (38) |
|
Understanding Shell Scripts |
|
|
397 | (16) |
|
Executing and debugging shell scripts |
|
|
398 | (1) |
|
Understanding shell variables |
|
|
399 | (1) |
|
|
400 | (1) |
|
Parameter expansion in bash |
|
|
401 | (1) |
|
Performing arithmetic in shell scripts |
|
|
402 | (1) |
|
Using programming constructs in shell scripts |
|
|
403 | (1) |
|
The "if...then" statements |
|
|
403 | (3) |
|
|
406 | (1) |
|
|
407 | (1) |
|
The "while...do" and "until...do" loops |
|
|
408 | (1) |
|
Some useful external programs |
|
|
409 | (1) |
|
The general regular expression parser (grep) |
|
|
409 | (1) |
|
Remove sections of lines of text (cut) |
|
|
409 | (1) |
|
Translate or delete characters (tr) |
|
|
410 | (1) |
|
|
410 | (1) |
|
Trying some simple shell scripts |
|
|
411 | (1) |
|
|
411 | (1) |
|
|
412 | (1) |
|
|
413 | (3) |
|
|
413 | (3) |
|
Starting Up and Shutting Down the System |
|
|
416 | (11) |
|
Starting run-level scripts |
|
|
416 | (1) |
|
Understanding run-level scripts |
|
|
416 | (3) |
|
Understanding what startup scripts do |
|
|
419 | (1) |
|
Changing run-level script behavior |
|
|
420 | (2) |
|
Reorganizing or removing run-level scripts |
|
|
422 | (1) |
|
|
423 | (2) |
|
|
425 | (1) |
|
|
426 | (1) |
|
Determining the current run level |
|
|
426 | (1) |
|
Changing to a shutdown run level |
|
|
426 | (1) |
|
|
427 | (7) |
|
Using at.allow and at.deny |
|
|
427 | (1) |
|
Specifying when jobs are run |
|
|
427 | (1) |
|
Submitting scheduled jobs |
|
|
428 | (1) |
|
|
429 | (1) |
|
|
429 | (1) |
|
|
430 | (1) |
|
|
430 | (2) |
|
Modifying scheduled tasks with crontab |
|
|
432 | (1) |
|
|
433 | (1) |
|
|
434 | (1) |
|
Chapter 12 Backing Up and Restoring Files |
|
|
435 | (32) |
|
Making a Simple Backup Archive |
|
|
435 | (6) |
|
Doing a simple backup with deja-dup |
|
|
436 | (2) |
|
Doing a simple backup with rsync |
|
|
438 | (1) |
|
|
439 | (1) |
|
Backing up files remotely |
|
|
440 | (1) |
|
|
441 | (1) |
|
Selecting a Backup Strategy |
|
|
442 | (2) |
|
|
442 | (1) |
|
|
443 | (1) |
|
|
443 | (1) |
|
|
443 | (1) |
|
Selecting a Backup Medium |
|
|
444 | (7) |
|
|
445 | (1) |
|
Using ftape tools for magnetic tape |
|
|
445 | (1) |
|
Testing the magnetic tape drive |
|
|
446 | (1) |
|
Writable DVD and CD drives |
|
|
446 | (1) |
|
Getting cdrecord for writable DVDs |
|
|
446 | (1) |
|
|
447 | (3) |
|
Writing CD or DVDs with growisofs |
|
|
450 | (1) |
|
Backing Up to a Hard Drive |
|
|
451 | (1) |
|
Backing Up Files with dump |
|
|
452 | (2) |
|
Automating Backups with cron |
|
|
454 | (2) |
|
Restoring Backed-Up Files |
|
|
456 | (2) |
|
Restoring an entire file system |
|
|
457 | (1) |
|
Configuring Amanda for Network Backups |
|
|
458 | (6) |
|
Creating Amanda directories |
|
|
459 | (1) |
|
Creating the amanda.conf file |
|
|
459 | (2) |
|
|
461 | (1) |
|
Adding Amanda network services |
|
|
462 | (1) |
|
|
462 | (1) |
|
|
463 | (1) |
|
Performing an Amanda backup |
|
|
463 | (1) |
|
Using the pax Archiving Tool |
|
|
464 | (1) |
|
|
465 | (2) |
|
Chapter 13 Computer Security Issues |
|
|
467 | (56) |
|
|
467 | (3) |
|
Using Password Protection |
|
|
470 | (4) |
|
|
470 | (1) |
|
Using a shadow password file |
|
|
471 | (1) |
|
Breaking encrypted passwords |
|
|
472 | (1) |
|
Checking for the shadow password file |
|
|
472 | (2) |
|
Securing Linux with the iptables Firewall |
|
|
474 | (14) |
|
Using the Firewall Configuration window |
|
|
474 | (2) |
|
Configuring an iptables firewall |
|
|
476 | (1) |
|
|
477 | (1) |
|
Creating iptables firewall rules |
|
|
478 | (7) |
|
|
485 | (2) |
|
Enhancing your iptables firewall |
|
|
487 | (1) |
|
Controlling Access to Services with TCP Wrappers |
|
|
488 | (2) |
|
|
490 | (5) |
|
Understanding the rsyslogd service |
|
|
491 | (1) |
|
Redirecting logs to a loghost with rsyslogd |
|
|
491 | (2) |
|
Understanding the messages log file |
|
|
493 | (1) |
|
Tracking log messages with logwatch |
|
|
494 | (1) |
|
Using the Secure Shell Package |
|
|
495 | (4) |
|
|
495 | (1) |
|
Using the ssh, sftp, and scp commands |
|
|
496 | (2) |
|
Using ssh, scp, and sftp without passwords |
|
|
498 | (1) |
|
|
499 | (20) |
|
Understanding attack techniques |
|
|
500 | (1) |
|
Protecting against denial-of-service attacks |
|
|
501 | (1) |
|
|
501 | (1) |
|
|
502 | (1) |
|
Smurf amplification attack |
|
|
503 | (1) |
|
Protecting against distributed DOS attacks |
|
|
504 | (4) |
|
Protecting against intrusion attacks |
|
|
508 | (1) |
|
Evaluating access to network services |
|
|
508 | (1) |
|
Disabling network services |
|
|
509 | (1) |
|
Securing servers with SELinux |
|
|
510 | (1) |
|
Scanning for security problems with OpenSCAP |
|
|
511 | (1) |
|
Protecting Web servers with certificates and encryption |
|
|
511 | (1) |
|
|
511 | (1) |
|
|
512 | (1) |
|
|
512 | (7) |
|
Managing Identities with FreelPA |
|
|
519 | (2) |
|
Setting up the FreelPA server |
|
|
520 | (1) |
|
Setting up FreelPA clients |
|
|
521 | (1) |
|
|
521 | (2) |
|
Part IV Fedora Network and Server Setup |
|
|
523 | (286) |
|
Chapter 14 Setting Up Network Connections |
|
|
525 | (52) |
|
Connecting to the Network with NetworkManager |
|
|
526 | (6) |
|
Connecting to a wireless network |
|
|
527 | (2) |
|
Connecting to a wired network |
|
|
529 | (1) |
|
Using the NetworkManager command line |
|
|
529 | (2) |
|
Setting up a virtual private network connection |
|
|
531 | (1) |
|
Understanding Local Area Networks |
|
|
532 | (10) |
|
Planning, getting, and setting up LAN hardware |
|
|
533 | (1) |
|
|
534 | (1) |
|
|
535 | (1) |
|
Configuring TCP/IP for your LAN |
|
|
535 | (4) |
|
Identifying other computers (hosts and DNS) |
|
|
539 | (1) |
|
Adding Windows computers to your LAN |
|
|
540 | (2) |
|
Setting Up a Wireless LAN |
|
|
542 | (16) |
|
Understanding wireless networks |
|
|
542 | (2) |
|
Choosing wireless hardware |
|
|
544 | (1) |
|
Selecting wireless LAN cards |
|
|
545 | (1) |
|
|
545 | (1) |
|
|
546 | (2) |
|
|
548 | (2) |
|
Installing wireless Linux software |
|
|
550 | (1) |
|
Configuring the wireless LAN |
|
|
551 | (1) |
|
Configuring the wireless interface |
|
|
552 | (3) |
|
Checking your wireless connection |
|
|
555 | (2) |
|
Setting wireless extensions |
|
|
557 | (1) |
|
Understanding Internet Protocol Addresses |
|
|
558 | (5) |
|
|
559 | (1) |
|
|
560 | (1) |
|
Classless Inter-Domain Routing |
|
|
560 | (2) |
|
|
562 | (1) |
|
|
563 | (12) |
|
Did Linux find your Ethernet driver at boot time? |
|
|
563 | (1) |
|
Can you reach another computer on the LAN? |
|
|
563 | (1) |
|
Is your Ethernet connection up? |
|
|
564 | (2) |
|
Troubleshooting a wireless LAN |
|
|
566 | (1) |
|
Checking wireless settings |
|
|
566 | (2) |
|
|
568 | (1) |
|
Adapting to poor reception |
|
|
569 | (1) |
|
|
569 | (1) |
|
Watching LAN traffic with Wireshark |
|
|
570 | (1) |
|
|
570 | (1) |
|
|
571 | (3) |
|
Interpreting captured Ethernet data |
|
|
574 | (1) |
|
|
575 | (2) |
|
Chapter 15 Connecting to the Internet |
|
|
577 | (30) |
|
Connecting Your LAN to the Internet |
|
|
577 | (1) |
|
Setting Up Linux as a Router |
|
|
578 | (5) |
|
Configuring the Linux router |
|
|
579 | (1) |
|
|
579 | (1) |
|
Enabling forwarding and masquerading |
|
|
579 | (2) |
|
Configuring network clients |
|
|
581 | (2) |
|
Configuring a Virtual Private Network Connection |
|
|
583 | (9) |
|
|
584 | (1) |
|
|
584 | (1) |
|
|
585 | (1) |
|
Configuring an OpenVPN Server |
|
|
586 | (1) |
|
Before configuring OpenVPN |
|
|
587 | (1) |
|
Creating a public key infrastructure |
|
|
587 | (3) |
|
Creating the OpenVPN server configuration |
|
|
590 | (1) |
|
Creating the OpenVPN client configuration |
|
|
591 | (1) |
|
Enhancing OpenVPN security with eurephia |
|
|
592 | (1) |
|
Setting Up Linux as a Proxy Server |
|
|
592 | (10) |
|
Starting the squid daemon |
|
|
593 | (2) |
|
Using a simple squid.conf file |
|
|
595 | (1) |
|
Modifying the Squid configuration file |
|
|
596 | (1) |
|
Configuring access control in squid.conf |
|
|
597 | (2) |
|
Configuring caching in squid.conf |
|
|
599 | (1) |
|
Configuring port numbers in squid.conf |
|
|
600 | (1) |
|
|
601 | (1) |
|
Checking the squid.conf file |
|
|
601 | (1) |
|
|
601 | (1) |
|
|
602 | (1) |
|
|
602 | (2) |
|
Configuring Firefox to use a proxy |
|
|
603 | (1) |
|
Configuring other browsers to use a proxy |
|
|
604 | (1) |
|
|
604 | (3) |
|
Chapter 16 Setting Up Printers and Printing |
|
|
607 | (12) |
|
Common Unix Printing Service |
|
|
608 | (1) |
|
|
608 | (6) |
|
Using the Printer Configuration window |
|
|
609 | (1) |
|
Configuring local printers |
|
|
610 | (2) |
|
Configuring remote printers |
|
|
612 | (2) |
|
|
614 | (2) |
|
|
615 | (1) |
|
|
615 | (1) |
|
Removing print jobs with lprm |
|
|
616 | (1) |
|
Configuring Print Servers |
|
|
616 | (2) |
|
Configuring a shared CUPS printer |
|
|
616 | (1) |
|
Configuring a shared Samba printer |
|
|
617 | (1) |
|
Understanding smb.conf for printing |
|
|
618 | (1) |
|
|
618 | (1) |
|
Chapter 17 Setting Up a File Server |
|
|
619 | (36) |
|
Goals of Setting Up a File Server |
|
|
619 | (1) |
|
Setting Up an NFS File Server |
|
|
620 | (15) |
|
|
621 | (1) |
|
Using the NFS Server Configuration window |
|
|
621 | (3) |
|
Configuring the /etc/exports file |
|
|
624 | (3) |
|
Exporting the shared file systems |
|
|
627 | (1) |
|
Starting the nfsd daemons |
|
|
628 | (1) |
|
|
628 | (1) |
|
Manually mounting an NFS file system |
|
|
629 | (1) |
|
Automatically mounting an NFS file system |
|
|
630 | (3) |
|
Using autofs to mount NFS file systems on demand |
|
|
633 | (1) |
|
Unmounting NFS file systems |
|
|
634 | (1) |
|
Setting Up a Samba File Server |
|
|
635 | (19) |
|
Getting and installing Samba |
|
|
636 | (1) |
|
Configuring a simple Samba server |
|
|
636 | (3) |
|
Configuring Samba with SWAT |
|
|
639 | (1) |
|
|
640 | (1) |
|
|
640 | (1) |
|
Creating global Samba settings in SWAT |
|
|
640 | (5) |
|
Configuring shared directories with SWAT |
|
|
645 | (2) |
|
Checking your Samba setup with SWAT |
|
|
647 | (1) |
|
Working with Samba files and commands |
|
|
647 | (1) |
|
Editing the smb.conf file |
|
|
647 | (1) |
|
|
648 | (1) |
|
Starting the Samba service |
|
|
649 | (1) |
|
Testing your Samba permissions |
|
|
650 | (1) |
|
Checking the status of shared directories |
|
|
650 | (1) |
|
|
650 | (1) |
|
Using Samba shared directories from Linux |
|
|
650 | (2) |
|
Troubleshooting your Samba server |
|
|
652 | (1) |
|
Basic networking in place? |
|
|
652 | (1) |
|
|
652 | (1) |
|
Firewall or SELinux restricting access? |
|
|
653 | (1) |
|
|
654 | (1) |
|
|
654 | (1) |
|
Chapter 18 Setting Up a Mail Server |
|
|
655 | (28) |
|
Introducing SMTP and sendmail |
|
|
655 | (1) |
|
Installing and Running sendmail |
|
|
656 | (4) |
|
|
657 | (1) |
|
|
658 | (1) |
|
Logging performed by sendmail |
|
|
659 | (1) |
|
|
660 | (12) |
|
|
661 | (1) |
|
Configuring basic sendmail settings (sendmail.mc) |
|
|
661 | (4) |
|
Defining outgoing mail access |
|
|
665 | (2) |
|
Configuring virtual servers |
|
|
667 | (1) |
|
Configuring virtual users |
|
|
667 | (1) |
|
|
668 | (1) |
|
Starting sendmail and generating database files |
|
|
669 | (1) |
|
|
670 | (1) |
|
|
670 | (1) |
|
|
671 | (1) |
|
|
672 | (2) |
|
Stopping Spam with SpamAssassin |
|
|
674 | (3) |
|
|
674 | (1) |
|
Setting up SpamAssassin on your mail server |
|
|
675 | (2) |
|
Setting e-mail readers to filter spam |
|
|
677 | (1) |
|
Getting Mail from the Server (POP3 or IMAPv4) |
|
|
677 | (4) |
|
Accessing mailboxes in Linux |
|
|
678 | (1) |
|
Configuring IMAPv4 and POP3 with dovecot |
|
|
678 | (3) |
|
Managing e-mail, tasks, and calendars with Zarafa |
|
|
681 | (1) |
|
|
681 | (2) |
|
Chapter 19 Setting Up an FTP Server |
|
|
683 | (12) |
|
Understanding FTP Servers |
|
|
684 | (1) |
|
Attributes of FTP servers |
|
|
684 | (1) |
|
|
685 | (1) |
|
Using the Very Secure FTP Server |
|
|
685 | (8) |
|
|
686 | (1) |
|
|
687 | (1) |
|
|
687 | (1) |
|
|
688 | (1) |
|
|
689 | (2) |
|
|
691 | (1) |
|
Logging vsFTPd activities |
|
|
692 | (1) |
|
|
692 | (1) |
|
|
693 | (1) |
|
Setting up vsFTPd behind a firewall |
|
|
693 | (1) |
|
Getting More Information About FTP Servers |
|
|
693 | (1) |
|
|
694 | (1) |
|
Chapter 20 Setting Up a Web Server |
|
|
695 | (50) |
|
|
696 | (1) |
|
|
696 | (1) |
|
Other Web servers available for Fedora |
|
|
697 | (1) |
|
Quick-Starting the Apache Web Server |
|
|
697 | (3) |
|
Configuring the Apache Server |
|
|
700 | (34) |
|
Configuring the Web server (httpd.conf) |
|
|
701 | (1) |
|
Setting the global environment |
|
|
701 | (2) |
|
Setting the number of server processes |
|
|
703 | (3) |
|
Binding to specific addresses |
|
|
706 | (1) |
|
Selecting modules in httpd.conf |
|
|
706 | (5) |
|
Including module-specific configuration files |
|
|
711 | (1) |
|
Choosing the server's user and group |
|
|
711 | (1) |
|
Setting the main server's configuration |
|
|
711 | (4) |
|
Identifying user directories |
|
|
715 | (1) |
|
Setting default index files for directories |
|
|
716 | (7) |
|
|
723 | (2) |
|
Defining encoding and language |
|
|
725 | (1) |
|
|
726 | (1) |
|
Adding MIME types and handlers |
|
|
726 | (1) |
|
Defining actions and headers |
|
|
727 | (1) |
|
Customizing error responses |
|
|
727 | (2) |
|
Setting responses to browsers |
|
|
729 | (1) |
|
Enabling proxy and caching services |
|
|
730 | (1) |
|
Configuring virtual hosting |
|
|
731 | (2) |
|
Configuring modules and related services (/etc/httpd/conf.d/.conf) |
|
|
733 | (1) |
|
Starting and Stopping the Server |
|
|
734 | (2) |
|
Monitoring Server Activities |
|
|
736 | (7) |
|
Displaying server information |
|
|
737 | (1) |
|
|
737 | (2) |
|
Further security of server-info and server-status |
|
|
739 | (1) |
|
|
739 | (1) |
|
|
740 | (1) |
|
Analyzing Web-server traffic |
|
|
741 | (2) |
|
|
743 | (2) |
|
Chapter 21 Setting Up a DHCP Server |
|
|
745 | (14) |
|
Using Dynamic Host Configuration Protocol |
|
|
746 | (1) |
|
|
746 | (9) |
|
Opening your firewall and SELinux for DHCP |
|
|
747 | (1) |
|
Configuring the /etc/dhcp/dhcpd.conf file |
|
|
748 | (1) |
|
Expanding the dhcpd.conf file |
|
|
749 | (1) |
|
|
750 | (4) |
|
|
754 | (1) |
|
|
755 | (2) |
|
|
755 | (1) |
|
|
756 | (1) |
|
Windows (95, 98, 2000, or XP) |
|
|
757 | (1) |
|
|
757 | (1) |
|
|
757 | (2) |
|
Chapter 22 Setting Up a MySQL Database Server |
|
|
759 | (34) |
|
|
760 | (1) |
|
Starting the MySQL Server |
|
|
761 | (1) |
|
Confirming That MySQL Server Is Working |
|
|
761 | (1) |
|
|
762 | (2) |
|
Configuring the MySQL Server |
|
|
764 | (7) |
|
Using mysql user/group accounts |
|
|
764 | (1) |
|
Adding administrative users |
|
|
764 | (1) |
|
|
765 | (1) |
|
Creating the my.cnf configuration file |
|
|
766 | (1) |
|
|
767 | (2) |
|
|
769 | (1) |
|
Using sample my.cnf files |
|
|
770 | (1) |
|
Working with MySQL Databases |
|
|
771 | (8) |
|
Starting the mysql command |
|
|
772 | (1) |
|
Creating a database with mysql |
|
|
773 | (2) |
|
Adding data to a MySQL database table |
|
|
775 | (1) |
|
|
775 | (2) |
|
|
777 | (2) |
|
Understanding MySQL Tables |
|
|
779 | (4) |
|
Displaying MySQL Databases |
|
|
783 | (3) |
|
Displaying all or selected records |
|
|
784 | (1) |
|
Displaying selected columns |
|
|
785 | (1) |
|
|
785 | (1) |
|
Making Changes to Tables and Records |
|
|
786 | (2) |
|
Altering the structure of MySQL tables |
|
|
786 | (1) |
|
Updating and deleting MySQL records |
|
|
787 | (1) |
|
Adding and Removing User Access |
|
|
788 | (2) |
|
Adding users and granting access |
|
|
788 | (1) |
|
|
789 | (1) |
|
|
790 | (1) |
|
Checking and Fixing Databases |
|
|
790 | (2) |
|
|
792 | (1) |
|
Chapter 23 Setting Up Virtual Servers |
|
|
793 | (16) |
|
Preparing for Virtualization |
|
|
794 | (2) |
|
Checking computer resources for virtualization |
|
|
794 | (1) |
|
|
795 | (1) |
|
Starting the Virtualization Service (libvirtd) |
|
|
795 | (1) |
|
Getting installation media |
|
|
795 | (1) |
|
Creating Virtual Guest Systems |
|
|
796 | (3) |
|
Managing Virtual Guest Systems |
|
|
799 | (4) |
|
|
800 | (2) |
|
|
802 | (1) |
|
Using Command-Line Tools to Manage Virtual Guests |
|
|
803 | (4) |
|
Creating and converting storage volumes |
|
|
803 | (1) |
|
Getting information about a storage volume |
|
|
803 | (1) |
|
Creating a storage volume |
|
|
804 | (1) |
|
Converting a storage volume |
|
|
804 | (1) |
|
Creating virtual guests with virt-install |
|
|
804 | (2) |
|
Managing virtual guests with virsh |
|
|
806 | (1) |
|
Managing virtual machines with Spice |
|
|
806 | (1) |
|
Converting Xen virtual machines with virt-v2v |
|
|
807 | (1) |
|
|
807 | (2) |
|
Appendix: About the Media |
|
|
809 | (2) |
|
|
810 | (1) |
Index |
|
811 | |