Foreword to the First Edition |
|
xxxiii | |
Preface |
|
xxxiv | |
Acknowledgments |
|
xxxvii | |
|
SECTION ONE: BASIC ADMINISTRATION |
|
|
|
|
3 | (18) |
|
|
4 | (1) |
|
Linux's relationship to UNIX |
|
|
4 | (1) |
|
Linux in historical context |
|
|
5 | (1) |
|
|
6 | (3) |
|
So what's the best distribution? |
|
|
8 | (1) |
|
Distribution-specific administration tools |
|
|
9 | (1) |
|
Notation and typographical conventions |
|
|
9 | (2) |
|
System-specific information |
|
|
10 | (1) |
|
Where to go for information |
|
|
11 | (3) |
|
Organization of the man pages |
|
|
12 | (1) |
|
|
13 | (1) |
|
Other sources of Linux information |
|
|
13 | (1) |
|
How to find and install software |
|
|
14 | (2) |
|
Essential tasks of the system administrator |
|
|
16 | (2) |
|
Adding, removing, and managing user accounts |
|
|
16 | (1) |
|
Adding and removing hardware |
|
|
16 | (1) |
|
|
17 | (1) |
|
Installing and upgrading software |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
Maintaining local documentation |
|
|
17 | (1) |
|
Vigilantly monitoring security |
|
|
17 | (1) |
|
|
18 | (1) |
|
System administration under duress |
|
|
18 | (1) |
|
System Administration Personality Syndrome |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
20 | (1) |
|
Booting and Shutting Down |
|
|
21 | (23) |
|
|
21 | (4) |
|
Automatic and manual booting |
|
|
22 | (1) |
|
Steps in the boot process |
|
|
22 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
|
23 | (1) |
|
Operator intervention (manual boot only) |
|
|
24 | (1) |
|
Execution of startup scripts |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
25 | (1) |
|
Using boot loaders: LILO and GRUB |
|
|
26 | (5) |
|
GRUB: The GRand Unified Boot loader |
|
|
26 | (2) |
|
LILO: The traditional Linux boot loader |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
GRUB multiboot configuration |
|
|
30 | (1) |
|
LILO multiboot configuration |
|
|
31 | (1) |
|
|
31 | (1) |
|
Single-user mode with GRUB |
|
|
32 | (1) |
|
Single-user mode with LILO |
|
|
32 | (1) |
|
Working with startup scripts |
|
|
32 | (8) |
|
|
33 | (3) |
|
Red Hat and Fedora startup scripts |
|
|
36 | (2) |
|
|
38 | (2) |
|
Debian and Ubuntu startup scripts |
|
|
40 | (1) |
|
Rebooting and shutting down |
|
|
40 | (3) |
|
|
41 | (1) |
|
shutdown: the genteel way to halt the system |
|
|
41 | (1) |
|
halt: a simpler way to shut down |
|
|
42 | (1) |
|
reboot: quick and dirty restart |
|
|
42 | (1) |
|
telinit: change init's run level |
|
|
42 | (1) |
|
poweroff: ask Linux to turn off the power |
|
|
42 | (1) |
|
|
43 | (1) |
|
|
44 | (9) |
|
Ownership of files and processes |
|
|
44 | (2) |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
48 | (3) |
|
su: substitute user identity |
|
|
48 | (1) |
|
|
48 | (3) |
|
|
51 | (1) |
|
bin: legacy owner of system commands |
|
|
51 | (1) |
|
daemon: owner of unprivileged system software |
|
|
51 | (1) |
|
nobody: the generic NFS user |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
53 | (17) |
|
|
53 | (3) |
|
|
54 | (1) |
|
|
54 | (1) |
|
UID and EUID: real and effective user ID |
|
|
54 | (1) |
|
GID and EGID: real and effective group ID |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
56 | (1) |
|
The life cycle of a process |
|
|
56 | (1) |
|
|
57 | (3) |
|
kill and killall: send signals |
|
|
60 | (1) |
|
|
60 | (1) |
|
nice and renice: influence scheduling priority |
|
|
61 | (1) |
|
|
62 | (3) |
|
top: monitor processes even better |
|
|
65 | (1) |
|
|
65 | (1) |
|
strace: trace signals and system calls |
|
|
66 | (1) |
|
|
67 | (2) |
|
|
69 | (1) |
|
|
69 | (1) |
|
|
70 | (23) |
|
|
72 | (1) |
|
Filesystem mounting and unmounting |
|
|
73 | (2) |
|
The organization of the file tree |
|
|
75 | (1) |
|
|
76 | (5) |
|
|
78 | (1) |
|
|
78 | (1) |
|
Character and block device files |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
80 | (1) |
|
|
81 | (7) |
|
|
81 | (1) |
|
The setuid and setgid bits |
|
|
82 | (1) |
|
|
82 | (1) |
|
|
82 | (2) |
|
chmod: change permissions |
|
|
84 | (2) |
|
chown: change ownership and group |
|
|
86 | (1) |
|
umask: assign default permissions |
|
|
86 | (1) |
|
|
87 | (1) |
|
|
88 | (4) |
|
|
88 | (3) |
|
|
91 | (1) |
|
|
92 | (1) |
|
|
93 | (18) |
|
|
93 | (6) |
|
|
94 | (2) |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
97 | (1) |
|
|
98 | (1) |
|
|
98 | (1) |
|
|
98 | (1) |
|
|
99 | (2) |
|
|
101 | (1) |
|
|
102 | (5) |
|
Editing the passwd and shadow files |
|
|
103 | (1) |
|
Editing the /etc/group file |
|
|
104 | (1) |
|
Setting an initial password |
|
|
104 | (1) |
|
Creating the user's home directory |
|
|
105 | (1) |
|
Copying in the default startup files |
|
|
105 | (1) |
|
Setting the user's mail home |
|
|
106 | (1) |
|
|
106 | (1) |
|
Recording the user's status and contact information |
|
|
107 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
108 | (2) |
|
|
110 | (1) |
|
|
111 | (39) |
|
|
111 | (8) |
|
|
112 | (2) |
|
|
114 | (1) |
|
|
114 | (4) |
|
Which is better, SCSI or IDE? |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
120 | (2) |
|
|
120 | (1) |
|
|
121 | (1) |
|
|
122 | (1) |
|
An overview of the disk installation procedure |
|
|
122 | (7) |
|
|
122 | (1) |
|
|
123 | (1) |
|
Labeling and partitioning the disk |
|
|
124 | (1) |
|
Creating filesystems within disk partitions |
|
|
125 | (1) |
|
|
126 | (1) |
|
Setting up automatic mounting |
|
|
127 | (2) |
|
|
129 | (1) |
|
hdparm: set IDE interface parameters |
|
|
129 | (2) |
|
fsck: check and repair filesystems |
|
|
131 | (2) |
|
Adding a disk: a step-by-step guide |
|
|
133 | (5) |
|
Advanced disk management: RAID and LVM |
|
|
138 | (9) |
|
|
139 | (1) |
|
Logical volume management |
|
|
139 | (1) |
|
An example configuration with LVM and RAID |
|
|
140 | (4) |
|
Dealing with a failed disk |
|
|
144 | (2) |
|
Reallocating storage space |
|
|
146 | (1) |
|
|
147 | (1) |
|
|
148 | (2) |
|
|
150 | (8) |
|
|
150 | (1) |
|
The format of crontab files |
|
|
151 | (2) |
|
|
153 | (1) |
|
Some common uses for cron |
|
|
154 | (2) |
|
|
154 | (1) |
|
Network distribution of configuration files |
|
|
155 | (1) |
|
|
156 | (1) |
|
Other schedulers: anacron and fcron |
|
|
156 | (1) |
|
|
157 | (1) |
|
|
158 | (43) |
|
|
159 | (4) |
|
Perform all dumps from one machine |
|
|
159 | (1) |
|
|
159 | (1) |
|
Pick a reasonable backup interval |
|
|
159 | (1) |
|
Choose filesystems carefully |
|
|
160 | (1) |
|
Make daily dumps fit on one piece of media |
|
|
160 | (1) |
|
Make filesystems smaller than your dump device |
|
|
161 | (1) |
|
|
161 | (1) |
|
|
161 | (1) |
|
Limit activity during dumps |
|
|
162 | (1) |
|
|
162 | (1) |
|
Develop a media life cycle |
|
|
163 | (1) |
|
Design your data for backups |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
163 | (6) |
|
Optical media: CD-R/RW, DVDR/RW, and DVD-RAM |
|
|
164 | (1) |
|
Removable hard disks (USB and FireWire) |
|
|
165 | (1) |
|
Small tape drives: 8mm and DDS/DAT |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
|
167 | (1) |
|
|
167 | (1) |
|
Jukeboxes, stackers, and tape libraries |
|
|
167 | (1) |
|
|
168 | (1) |
|
|
168 | (1) |
|
|
168 | (1) |
|
Setting up an incremental backup regime with dump |
|
|
169 | (4) |
|
|
169 | (2) |
|
|
171 | (2) |
|
Restoring from dumps with restore |
|
|
173 | (3) |
|
Restoring individual files |
|
|
173 | (2) |
|
Restoring entire filesystems |
|
|
175 | (1) |
|
Dumping and restoring for upgrades |
|
|
176 | (1) |
|
Using other archiving programs |
|
|
177 | (1) |
|
|
177 | (1) |
|
cpio: archiving utility from ancient times |
|
|
178 | (1) |
|
|
178 | (1) |
|
Using multiple files on a single tape |
|
|
178 | (1) |
|
|
179 | (18) |
|
|
180 | (1) |
|
|
181 | (1) |
|
Installing the database and Bacula daemons |
|
|
181 | (1) |
|
Configuring the Bacula daemons |
|
|
182 | (1) |
|
bacula-dir.conf: director configuration |
|
|
183 | (4) |
|
bacula-sd.conf: storage daemon configuration |
|
|
187 | (1) |
|
bconsole.conf: console configuration |
|
|
188 | (1) |
|
Installing and configuring the client file daemon |
|
|
188 | (1) |
|
Starting the Bacula daemons |
|
|
189 | (1) |
|
|
190 | (1) |
|
|
190 | (2) |
|
|
192 | (3) |
|
Monitoring and debugging Bacula configurations |
|
|
195 | (2) |
|
|
197 | (1) |
|
Commercial backup products |
|
|
197 | (1) |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
198 | (1) |
|
|
198 | (1) |
|
|
198 | (3) |
|
|
201 | (22) |
|
|
201 | (3) |
|
|
201 | (1) |
|
|
202 | (2) |
|
|
204 | (1) |
|
|
204 | (4) |
|
|
206 | (1) |
|
Kernel and boot-time logging |
|
|
206 | (2) |
|
logrotate: manage log files |
|
|
208 | (1) |
|
Syslog: the system event logger |
|
|
209 | (11) |
|
|
209 | (1) |
|
|
210 | (1) |
|
|
210 | (4) |
|
Designing a logging scheme for your site |
|
|
214 | (1) |
|
|
214 | (2) |
|
|
216 | (1) |
|
Software that uses syslog |
|
|
217 | (1) |
|
|
217 | (1) |
|
Using syslog from programs |
|
|
218 | (2) |
|
Condensing log files to useful information |
|
|
220 | (2) |
|
|
222 | (1) |
|
Software and Configuration Management |
|
|
223 | (48) |
|
|
223 | (9) |
|
|
224 | (1) |
|
|
225 | (1) |
|
|
226 | (1) |
|
Kickstart: the automated installer for Enterprise Linux and Fedora |
|
|
226 | (4) |
|
AutoYaST: SUSE's automated installation tool |
|
|
230 | (1) |
|
The Debian and Ubuntu installer |
|
|
231 | (1) |
|
Installing from a master system |
|
|
232 | (1) |
|
|
232 | (2) |
|
|
234 | (3) |
|
Available package management systems |
|
|
235 | (1) |
|
|
235 | (2) |
|
dpkg: manage Debian-style packages |
|
|
237 | (1) |
|
High-level package management systems |
|
|
237 | (10) |
|
|
239 | (1) |
|
|
240 | (1) |
|
APT: the Advanced Package Tool |
|
|
241 | (1) |
|
|
242 | (1) |
|
An example /etc/apt/sources.list file |
|
|
243 | (1) |
|
Using proxies to make apt-get scale |
|
|
244 | (1) |
|
Setting up an internal APT server |
|
|
244 | (1) |
|
|
245 | (1) |
|
yum: release management for RPM |
|
|
246 | (1) |
|
|
247 | (8) |
|
|
247 | (1) |
|
Formal revision control systems |
|
|
248 | (1) |
|
RCS: the Revision Control System |
|
|
249 | (2) |
|
CVS: the Concurrent Versions System |
|
|
251 | (2) |
|
Subversion: CVS done right |
|
|
253 | (2) |
|
Localization and configuration |
|
|
255 | (5) |
|
Organizing your localization |
|
|
256 | (1) |
|
|
257 | (1) |
|
|
258 | (1) |
|
Distributing localizations |
|
|
259 | (1) |
|
Resolving scheduling issues |
|
|
260 | (1) |
|
Configuration management tools |
|
|
260 | (3) |
|
cfengine: computer immune system |
|
|
260 | (1) |
|
LCFG: a large-scale configuration system |
|
|
261 | (1) |
|
|
261 | (1) |
|
Template Tree 2: cfengine helper |
|
|
262 | (1) |
|
DMTF/CIM: the Common Information Model |
|
|
262 | (1) |
|
Sharing software over NFS |
|
|
263 | (3) |
|
|
264 | (1) |
|
|
265 | (1) |
|
|
265 | (1) |
|
|
266 | (1) |
|
|
266 | (2) |
|
|
268 | (1) |
|
|
268 | (3) |
|
|
|
|
271 | (63) |
|
|
272 | (3) |
|
|
272 | (1) |
|
How the Internet is managed today |
|
|
273 | (1) |
|
Network standards and documentation |
|
|
274 | (1) |
|
|
275 | (1) |
|
Packets and encapsulation |
|
|
276 | (6) |
|
|
277 | (2) |
|
|
279 | (2) |
|
|
281 | (1) |
|
|
281 | (1) |
|
IP addresses: the gory details |
|
|
282 | (11) |
|
|
282 | (1) |
|
|
282 | (3) |
|
|
285 | (2) |
|
CIDR: Classless Inter-Domain Routing |
|
|
287 | (1) |
|
|
288 | (1) |
|
Private addresses and NAT |
|
|
289 | (2) |
|
|
291 | (2) |
|
|
293 | (3) |
|
|
294 | (1) |
|
|
295 | (1) |
|
ARP: the address resolution protocol |
|
|
296 | (1) |
|
Addition of a machine to a network |
|
|
297 | (10) |
|
Hostname and IP address assignment |
|
|
298 | (1) |
|
ifconfig: configure network interfaces |
|
|
299 | (3) |
|
mii-tool: configure autonegotiation and other media-specific options |
|
|
302 | (1) |
|
route: configure static routes |
|
|
303 | (2) |
|
|
305 | (1) |
|
|
306 | (1) |
|
The Linux networking stack |
|
|
307 | (1) |
|
Distribution-specific network configuration |
|
|
307 | (4) |
|
Network configuration for Red Hat and Fedora |
|
|
308 | (1) |
|
Network configuration for SUSE |
|
|
309 | (1) |
|
Network configuration for Debian and Ubuntu |
|
|
310 | (1) |
|
DHCP: the Dynamic Host Configuration Protocol |
|
|
311 | (3) |
|
|
312 | (1) |
|
|
312 | (1) |
|
|
313 | (1) |
|
Dynamic reconfiguration and tuning |
|
|
314 | (2) |
|
|
316 | (3) |
|
|
316 | (1) |
|
|
317 | (1) |
|
|
317 | (1) |
|
Broadcast pings and other forms of directed broadcast |
|
|
317 | (1) |
|
|
317 | (1) |
|
|
318 | (1) |
|
|
318 | (1) |
|
Security-related kernel variables |
|
|
319 | (1) |
|
|
319 | (1) |
|
PPP: the Point-to-Point Protocol |
|
|
320 | (10) |
|
Addressing PPP performance issues |
|
|
321 | (1) |
|
Connecting to a network with PPP |
|
|
321 | (1) |
|
Making your host speak PPP |
|
|
321 | (1) |
|
|
321 | (1) |
|
|
322 | (1) |
|
|
322 | (1) |
|
|
323 | (1) |
|
|
323 | (1) |
|
|
323 | (7) |
|
|
330 | (1) |
|
|
331 | (1) |
|
|
332 | (2) |
|
|
334 | (16) |
|
Packet forwarding: a closer look |
|
|
335 | (2) |
|
Routing daemons and routing protocols |
|
|
337 | (4) |
|
Distance-vector protocols |
|
|
338 | (1) |
|
|
339 | (1) |
|
|
340 | (1) |
|
Interior and exterior protocols |
|
|
340 | (1) |
|
|
341 | (2) |
|
RIP: Routing Information Protocol |
|
|
341 | (1) |
|
RIP-2: Routing Information Protocol, version 2 |
|
|
341 | (1) |
|
OSPF: Open Shortest Path First |
|
|
342 | (1) |
|
IGRP and EIGRP: Interior Gateway Routing Protocol |
|
|
342 | (1) |
|
IS-IS: the ISO ``standard'' |
|
|
343 | (1) |
|
MOSPF, DVMRP, and PIM: multicast routing protocols |
|
|
343 | (1) |
|
Router Discovery Protocol |
|
|
343 | (1) |
|
routed: RIP yourself a new hole |
|
|
343 | (1) |
|
gated: gone to the dark side |
|
|
344 | (1) |
|
Routing strategy selection criteria |
|
|
344 | (2) |
|
|
346 | (2) |
|
|
348 | (1) |
|
|
349 | (1) |
|
|
350 | (23) |
|
|
351 | (1) |
|
|
351 | (8) |
|
|
351 | (1) |
|
|
352 | (1) |
|
|
353 | (2) |
|
Connecting and expanding Ethernets |
|
|
355 | (4) |
|
|
359 | (2) |
|
|
360 | (1) |
|
|
360 | (1) |
|
FDDI: the disappointing, expensive, and outdated LAN |
|
|
361 | (1) |
|
ATM: the promised (but sorely defeated) LAN |
|
|
362 | (1) |
|
Frame relay: the sacrificial WAN |
|
|
363 | (1) |
|
|
364 | (1) |
|
DSL and cable modems: the people's WAN |
|
|
364 | (1) |
|
Where is the network going? |
|
|
365 | (1) |
|
Network testing and debugging |
|
|
366 | (1) |
|
|
366 | (2) |
|
|
366 | (1) |
|
|
367 | (1) |
|
|
367 | (1) |
|
|
368 | (2) |
|
Network architecture vs. building architecture |
|
|
368 | (1) |
|
|
369 | (1) |
|
|
369 | (1) |
|
|
369 | (1) |
|
Maintenance and documentation |
|
|
370 | (1) |
|
|
370 | (1) |
|
|
371 | (1) |
|
|
371 | (1) |
|
|
371 | (1) |
|
|
372 | (1) |
|
|
372 | (1) |
|
|
372 | (1) |
|
DNS: The Domain Name System |
|
|
373 | (111) |
|
DNS for the impatient: adding a new machine |
|
|
374 | (1) |
|
|
375 | (2) |
|
|
376 | (1) |
|
Other implementations of DNS |
|
|
376 | (1) |
|
|
377 | (1) |
|
|
378 | (5) |
|
|
381 | (1) |
|
|
382 | (1) |
|
|
382 | (1) |
|
Registering a second-level domain name |
|
|
383 | (1) |
|
Creating your own subdomains |
|
|
383 | (1) |
|
|
383 | (3) |
|
|
383 | (1) |
|
|
384 | (2) |
|
The extended DNS protocol |
|
|
386 | (1) |
|
|
386 | (3) |
|
|
389 | (20) |
|
|
389 | (3) |
|
|
392 | (3) |
|
|
395 | (1) |
|
|
396 | (1) |
|
|
396 | (1) |
|
|
397 | (2) |
|
|
399 | (1) |
|
|
400 | (1) |
|
|
401 | (1) |
|
|
402 | (1) |
|
|
403 | (1) |
|
|
404 | (1) |
|
|
404 | (1) |
|
|
405 | (1) |
|
|
405 | (1) |
|
|
405 | (2) |
|
Glue records: links between zones |
|
|
407 | (2) |
|
|
409 | (6) |
|
|
410 | (1) |
|
Finding out what version you have |
|
|
410 | (1) |
|
|
411 | (1) |
|
named: the BIND name server |
|
|
412 | (1) |
|
Authoritative and caching-only servers |
|
|
412 | (1) |
|
Recursive and nonrecursive servers |
|
|
413 | (1) |
|
|
414 | (1) |
|
|
415 | (1) |
|
Designing your DNS environment |
|
|
415 | (3) |
|
|
415 | (1) |
|
|
416 | (1) |
|
|
417 | (1) |
|
|
417 | (1) |
|
|
418 | (1) |
|
A taxonomy of DNS/BIND chores |
|
|
418 | (1) |
|
|
418 | (2) |
|
|
418 | (2) |
|
|
420 | (1) |
|
Impact on the rest of the system |
|
|
420 | (1) |
|
BIND server configuration |
|
|
420 | (19) |
|
|
421 | (1) |
|
|
421 | (2) |
|
|
423 | (1) |
|
|
423 | (6) |
|
|
429 | (1) |
|
|
430 | (1) |
|
The trusted-keys statement |
|
|
430 | (1) |
|
|
431 | (1) |
|
|
432 | (1) |
|
|
432 | (1) |
|
|
432 | (4) |
|
|
436 | (2) |
|
Split DNS and the view statement |
|
|
438 | (1) |
|
BIND configuration examples |
|
|
439 | (7) |
|
|
439 | (2) |
|
|
441 | (3) |
|
The Internet Systems Consortium, isc.org |
|
|
444 | (2) |
|
|
446 | (1) |
|
|
447 | (4) |
|
|
447 | (1) |
|
|
448 | (3) |
|
|
451 | (15) |
|
Access control lists revisited |
|
|
451 | (2) |
|
|
453 | (1) |
|
Secure server-to-server communication with TSIG and TKEY |
|
|
453 | (3) |
|
|
456 | (7) |
|
|
463 | (1) |
|
|
464 | (2) |
|
|
466 | (12) |
|
|
466 | (4) |
|
Sample logging configuration |
|
|
470 | (1) |
|
|
471 | (1) |
|
|
471 | (2) |
|
|
473 | (1) |
|
|
473 | (2) |
|
|
475 | (1) |
|
doc: domain obscenity control |
|
|
476 | (2) |
|
Other DNS sanity checking tools |
|
|
478 | (1) |
|
|
478 | (1) |
|
|
478 | (3) |
|
|
481 | (1) |
|
Mailing lists and newsgroups |
|
|
481 | (1) |
|
Books and other documentation |
|
|
481 | (1) |
|
|
482 | (1) |
|
|
482 | (1) |
|
|
482 | (2) |
|
|
484 | (18) |
|
General information about NFS |
|
|
484 | (5) |
|
|
484 | (1) |
|
|
485 | (1) |
|
|
486 | (1) |
|
|
486 | (1) |
|
Cookies and stateless mounting |
|
|
486 | (1) |
|
Naming conventions for shared filesystems |
|
|
487 | (1) |
|
|
487 | (1) |
|
Root access and the nobody account |
|
|
488 | (1) |
|
|
489 | (3) |
|
|
490 | (2) |
|
|
492 | (1) |
|
|
492 | (3) |
|
Mounting remote filesystems at boot time |
|
|
495 | (1) |
|
Restricting exports to insecure ports |
|
|
495 | (1) |
|
nfsstat: dump NFS statistics |
|
|
495 | (1) |
|
Dedicated NFS file servers |
|
|
496 | (1) |
|
|
497 | (3) |
|
automount: mount filesystems on demand |
|
|
497 | (1) |
|
|
498 | (1) |
|
|
499 | (1) |
|
|
499 | (1) |
|
|
500 | (1) |
|
|
501 | (1) |
|
|
502 | (26) |
|
|
503 | (1) |
|
nscd: cache the results of lookups |
|
|
504 | (1) |
|
|
505 | (6) |
|
|
505 | (3) |
|
rsync: transfer files more securely |
|
|
508 | (2) |
|
|
510 | (1) |
|
NIS: the Network Information Service |
|
|
511 | (9) |
|
Understanding how NIS works |
|
|
512 | (2) |
|
Weighing advantages and disadvantages of NIS |
|
|
514 | (1) |
|
Prioritizing sources of administrative information |
|
|
515 | (2) |
|
|
517 | (1) |
|
|
517 | (2) |
|
Setting access control options in /etc/ypserv.conf |
|
|
519 | (1) |
|
|
519 | (1) |
|
NIS details by distribution |
|
|
520 | (1) |
|
LDAP: the Lightweight Directory Access Protocol |
|
|
520 | (6) |
|
The structure of LDAP data |
|
|
521 | (1) |
|
|
522 | (1) |
|
LDAP documentation and specifications |
|
|
523 | (1) |
|
|
523 | (2) |
|
|
525 | (1) |
|
|
526 | (1) |
|
|
526 | (1) |
|
|
527 | (1) |
|
|
528 | (115) |
|
|
530 | (4) |
|
|
531 | (1) |
|
|
532 | (1) |
|
|
532 | (1) |
|
|
533 | (1) |
|
|
533 | (1) |
|
|
533 | (1) |
|
The anatomy of a mail message |
|
|
534 | (5) |
|
|
535 | (1) |
|
Mail header interpretation |
|
|
535 | (4) |
|
|
539 | (5) |
|
|
540 | (2) |
|
|
542 | (1) |
|
|
542 | (2) |
|
|
544 | (7) |
|
Getting mailing lists from files |
|
|
546 | (1) |
|
|
547 | (1) |
|
|
547 | (1) |
|
|
548 | (1) |
|
|
549 | (2) |
|
The hashed alias database |
|
|
551 | (1) |
|
Mailing lists and list wrangling software |
|
|
551 | (6) |
|
Software packages for maintaining mailing lists |
|
|
551 | (4) |
|
LDAP: the Lightweight Directory Access Protocol |
|
|
555 | (2) |
|
sendmail: ringmaster of the electronic mail circus |
|
|
557 | (8) |
|
|
557 | (2) |
|
sendmail installation from sendmail.org |
|
|
559 | (2) |
|
sendmail installation on Debian and Ubuntu systems |
|
|
561 | (1) |
|
|
562 | (1) |
|
|
562 | (1) |
|
|
563 | (2) |
|
|
565 | (5) |
|
Using the m4 preprocessor |
|
|
566 | (1) |
|
The sendmail configuration pieces |
|
|
567 | (1) |
|
Building a configuration file from a sample .mc file |
|
|
568 | (1) |
|
Changing the sendmail configuration |
|
|
569 | (1) |
|
Basic sendmail configuration primitives |
|
|
570 | (4) |
|
|
570 | (1) |
|
|
570 | (2) |
|
|
572 | (1) |
|
|
573 | (1) |
|
Fancier sendmail configuration primitives |
|
|
574 | (14) |
|
|
574 | (1) |
|
|
574 | (1) |
|
|
575 | (1) |
|
The always_add_domain feature |
|
|
575 | (1) |
|
|
576 | (1) |
|
|
576 | (2) |
|
|
578 | (1) |
|
The genericstable feature |
|
|
579 | (1) |
|
The virtusertable feature |
|
|
579 | (1) |
|
|
580 | (1) |
|
Masquerading and the Masquerade_As macro |
|
|
581 | (2) |
|
The Mail_Hub and Smart_Host macros |
|
|
583 | (1) |
|
|
583 | (1) |
|
|
584 | (1) |
|
The local_lmtp and smrsh features |
|
|
585 | (1) |
|
The local_procmail feature |
|
|
585 | (1) |
|
|
586 | (1) |
|
|
586 | (2) |
|
Spam-related features in sendmail |
|
|
588 | (11) |
|
|
589 | (2) |
|
|
591 | (3) |
|
User or site blacklisting |
|
|
594 | (1) |
|
|
595 | (1) |
|
Rate and connection limits |
|
|
596 | (1) |
|
|
597 | (1) |
|
Miltering: mail filtering |
|
|
597 | (1) |
|
|
598 | (1) |
|
|
598 | (1) |
|
|
599 | (1) |
|
Configuration file case study |
|
|
599 | (4) |
|
Client machines at sendmail.com |
|
|
599 | (1) |
|
Master machine at sendmail.com |
|
|
600 | (3) |
|
|
603 | (8) |
|
|
603 | (1) |
|
|
604 | (1) |
|
Safer mail to files and programs |
|
|
605 | (1) |
|
|
606 | (1) |
|
Running a chrooted sendmail (for the truly paranoid) |
|
|
607 | (1) |
|
Denial of service attacks |
|
|
608 | (1) |
|
|
608 | (2) |
|
|
610 | (1) |
|
SASL: the Simple Authentication and Security Layer |
|
|
610 | (1) |
|
|
611 | (4) |
|
|
611 | (1) |
|
Queue groups and envelope splitting |
|
|
611 | (2) |
|
|
613 | (1) |
|
|
613 | (1) |
|
Undeliverable messages in the queue |
|
|
613 | (1) |
|
|
614 | (1) |
|
sendmail statistics, testing, and debugging |
|
|
615 | (6) |
|
|
616 | (1) |
|
|
617 | (1) |
|
|
618 | (1) |
|
|
619 | (1) |
|
|
619 | (2) |
|
|
621 | (2) |
|
|
621 | (1) |
|
|
621 | (1) |
|
|
622 | (1) |
|
Exim/sendmail similarities |
|
|
622 | (1) |
|
|
623 | (16) |
|
|
623 | (1) |
|
|
624 | (1) |
|
|
624 | (1) |
|
|
625 | (1) |
|
|
625 | (1) |
|
Postfix commands and documentation |
|
|
625 | (1) |
|
|
626 | (1) |
|
|
626 | (1) |
|
|
626 | (1) |
|
|
627 | (1) |
|
|
627 | (2) |
|
|
629 | (1) |
|
|
630 | (1) |
|
|
630 | (1) |
|
|
631 | (1) |
|
|
632 | (1) |
|
|
633 | (1) |
|
Authentication of clients |
|
|
634 | (1) |
|
Fighting spam and viruses |
|
|
634 | (1) |
|
|
635 | (1) |
|
SpamAssassin and procmail |
|
|
636 | (1) |
|
|
636 | (1) |
|
|
636 | (1) |
|
|
637 | (1) |
|
|
638 | (1) |
|
|
638 | (1) |
|
|
638 | (1) |
|
|
639 | (1) |
|
|
640 | (3) |
|
Network Management and Debugging |
|
|
643 | (26) |
|
|
644 | (1) |
|
ping: check to see if a host is alive |
|
|
645 | (2) |
|
traceroute: trace IP packets |
|
|
647 | (2) |
|
netstat: get network statistics |
|
|
649 | (5) |
|
Inspecting interface configuration information |
|
|
649 | (2) |
|
Monitoring the status of network connections |
|
|
651 | (1) |
|
Identifying listening network services |
|
|
652 | (1) |
|
Examining the routing table |
|
|
652 | (1) |
|
Viewing operational statistics for network protocols |
|
|
653 | (1) |
|
sar: inspect live interface activity |
|
|
654 | (1) |
|
|
655 | (2) |
|
tcpdump: king of sniffers |
|
|
656 | (1) |
|
Wireshark: visual sniffer |
|
|
657 | (1) |
|
Network management protocols |
|
|
657 | (2) |
|
SNMP: the Simple Network Management Protocol |
|
|
659 | (2) |
|
|
659 | (1) |
|
|
660 | (1) |
|
RMON: remote monitoring MIB |
|
|
661 | (1) |
|
|
661 | (1) |
|
Network management applications |
|
|
662 | (5) |
|
|
663 | (1) |
|
SNMP data collection and graphing |
|
|
664 | (1) |
|
Nagios: event-based SNMP and service monitoring |
|
|
665 | (1) |
|
Commercial management platforms |
|
|
666 | (1) |
|
|
667 | (1) |
|
|
668 | (1) |
|
|
669 | (50) |
|
|
670 | (1) |
|
How security is compromised |
|
|
671 | (2) |
|
|
671 | (1) |
|
|
672 | (1) |
|
|
673 | (1) |
|
Certifications and standards |
|
|
673 | (3) |
|
|
674 | (1) |
|
|
675 | (1) |
|
Security tips and philosophy |
|
|
676 | (2) |
|
|
677 | (1) |
|
|
677 | (1) |
|
|
677 | (1) |
|
|
677 | (1) |
|
|
677 | (1) |
|
|
677 | (1) |
|
|
678 | (1) |
|
Security problems in /etc/passwd and /etc/shadow |
|
|
678 | (5) |
|
Password checking and selection |
|
|
679 | (1) |
|
|
680 | (1) |
|
Group logins and shared logins |
|
|
680 | (1) |
|
|
680 | (1) |
|
|
681 | (1) |
|
PAM: cooking spray or authentication wonder? |
|
|
681 | (2) |
|
|
683 | (1) |
|
|
683 | (1) |
|
Important file permissions |
|
|
684 | (1) |
|
Miscellaneous security issues |
|
|
685 | (3) |
|
|
685 | (1) |
|
|
685 | (1) |
|
/etc/hosts.equiv and ~/.rhosts |
|
|
685 | (1) |
|
|
685 | (1) |
|
|
686 | (1) |
|
|
686 | (1) |
|
|
686 | (1) |
|
|
686 | (1) |
|
|
687 | (1) |
|
|
688 | (1) |
|
|
688 | (6) |
|
|
688 | (2) |
|
Nessus: next generation network scanner |
|
|
690 | (1) |
|
John the Ripper: find insecure passwords |
|
|
690 | (1) |
|
hosts_access: host access control |
|
|
691 | (1) |
|
Samhain: host-based intrusion detection |
|
|
692 | (1) |
|
Security-Enhanced Linux (SELinux) |
|
|
693 | (1) |
|
Cryptographic security tools |
|
|
694 | (7) |
|
Kerberos: a unified approach to network security |
|
|
695 | (1) |
|
|
696 | (1) |
|
|
697 | (1) |
|
|
698 | (1) |
|
|
699 | (2) |
|
|
701 | (3) |
|
Packet-filtering firewalls |
|
|
701 | (1) |
|
How services are filtered |
|
|
702 | (1) |
|
|
703 | (1) |
|
Stateful inspection firewalls |
|
|
703 | (1) |
|
Firewalls: how safe are they? |
|
|
704 | (1) |
|
Linux firewall features: IP tables |
|
|
704 | (4) |
|
Virtual private networks (VPNs) |
|
|
708 | (2) |
|
|
709 | (1) |
|
All I need is a VPN, right? |
|
|
710 | (1) |
|
Hardened Linux distributions |
|
|
710 | (1) |
|
What to do when your site has been attacked |
|
|
710 | (2) |
|
Sources of security information |
|
|
712 | (3) |
|
CERT: a registered service mark of Carnegie Mellon University |
|
|
712 | (1) |
|
SecurityFocus.com and the BugTraq mailing list |
|
|
713 | (1) |
|
|
713 | (1) |
|
SANS: the System Administration, Networking, and Security Institute |
|
|
713 | (1) |
|
Distribution-specific security resources |
|
|
713 | (1) |
|
Other mailing lists and web sites |
|
|
714 | (1) |
|
|
715 | (1) |
|
|
716 | (3) |
|
Web Hosting and Internet Servers |
|
|
719 | (22) |
|
|
720 | (4) |
|
Uniform resource locators |
|
|
720 | (1) |
|
|
720 | (2) |
|
Content generation on the fly |
|
|
722 | (1) |
|
|
722 | (2) |
|
|
724 | (3) |
|
|
724 | (1) |
|
|
724 | (2) |
|
|
726 | (1) |
|
|
726 | (1) |
|
|
727 | (1) |
|
Optimizing for high-performance hosting of static content |
|
|
727 | (1) |
|
|
727 | (3) |
|
Using name-based virtual hosts |
|
|
728 | (1) |
|
Configuring virtual interfaces |
|
|
728 | (1) |
|
Telling Apache about virtual interfaces |
|
|
729 | (1) |
|
The Secure Sockets Layer (SSL) |
|
|
730 | (3) |
|
Generating a certificate signing request |
|
|
731 | (1) |
|
Configuring Apache to use SSL |
|
|
732 | (1) |
|
Caching and proxy servers |
|
|
733 | (1) |
|
The Squid cache and proxy server |
|
|
733 | (1) |
|
|
734 | (1) |
|
Anonymous FTP server setup |
|
|
734 | (2) |
|
|
736 | (5) |
|
SECTION THREE: BUNCH O'STUFF |
|
|
|
|
741 | (20) |
|
|
743 | (1) |
|
|
744 | (4) |
|
The Display environment variable |
|
|
744 | (1) |
|
|
745 | (2) |
|
X connection forwarding with SSH |
|
|
747 | (1) |
|
|
748 | (6) |
|
|
750 | (1) |
|
|
750 | (1) |
|
|
751 | (1) |
|
|
752 | (1) |
|
|
753 | (1) |
|
Troubleshooting and debugging |
|
|
754 | (3) |
|
Special keyboard combinations for X |
|
|
754 | (1) |
|
When good X servers go bad |
|
|
755 | (2) |
|
A brief note on desktop environments |
|
|
757 | (2) |
|
|
758 | (1) |
|
|
758 | (1) |
|
Which is better, GNOME or KDE? |
|
|
759 | (1) |
|
|
759 | (1) |
|
|
759 | (2) |
|
|
761 | (30) |
|
|
762 | (1) |
|
|
763 | (4) |
|
|
763 | (1) |
|
|
763 | (1) |
|
|
764 | (1) |
|
|
764 | (1) |
|
|
765 | (1) |
|
Printer drivers and their handling of PDLs |
|
|
765 | (2) |
|
|
767 | (5) |
|
|
767 | (1) |
|
Print queue viewing and manipulation |
|
|
767 | (1) |
|
|
768 | (1) |
|
|
768 | (1) |
|
|
768 | (1) |
|
The CUPS underlying protocol: HTTP |
|
|
769 | (1) |
|
|
770 | (1) |
|
|
771 | (1) |
|
CUPS server administration |
|
|
772 | (8) |
|
Network print server setup |
|
|
773 | (1) |
|
Printer autoconfiguration |
|
|
774 | (1) |
|
Network printer configuration |
|
|
774 | (1) |
|
Printer configuration examples |
|
|
775 | (1) |
|
|
775 | (1) |
|
|
776 | (1) |
|
Other configuration tasks |
|
|
777 | (1) |
|
|
777 | (1) |
|
|
778 | (1) |
|
|
779 | (1) |
|
|
780 | (1) |
|
|
780 | (2) |
|
|
781 | (1) |
|
Problems with direct printing |
|
|
781 | (1) |
|
Network printing problems |
|
|
781 | (1) |
|
Distribution-specific problems |
|
|
782 | (1) |
|
|
782 | (2) |
|
|
782 | (1) |
|
|
783 | (1) |
|
|
783 | (1) |
|
Other printer accessories |
|
|
783 | (1) |
|
Serial and parallel printers |
|
|
784 | (1) |
|
|
784 | (1) |
|
|
784 | (4) |
|
Use banner pages only if you have to |
|
|
784 | (1) |
|
|
785 | (1) |
|
|
785 | (1) |
|
|
785 | (1) |
|
Keep extra toner cartridges on hand |
|
|
786 | (1) |
|
Pay attention to the cost per page |
|
|
786 | (1) |
|
Consider printer accounting |
|
|
787 | (1) |
|
|
787 | (1) |
|
|
788 | (2) |
|
kprinter: printing documents |
|
|
789 | (1) |
|
|
789 | (1) |
|
|
790 | (1) |
|
|
790 | (1) |
|
Maintenance and Environment |
|
|
791 | (12) |
|
Hardware maintenance basics |
|
|
791 | (1) |
|
|
792 | (1) |
|
|
792 | (1) |
|
|
792 | (1) |
|
|
793 | (1) |
|
Electronics-handling lore |
|
|
793 | (1) |
|
|
793 | (1) |
|
|
794 | (1) |
|
|
794 | (1) |
|
|
794 | (1) |
|
|
795 | (1) |
|
|
796 | (2) |
|
|
796 | (1) |
|
|
796 | (1) |
|
|
796 | (1) |
|
|
797 | (1) |
|
|
798 | (1) |
|
|
798 | (1) |
|
|
799 | (1) |
|
|
800 | (1) |
|
|
800 | (1) |
|
|
800 | (2) |
|
|
802 | (1) |
|
|
803 | (18) |
|
What you can do to improve performance |
|
|
804 | (2) |
|
Factors that affect performance |
|
|
806 | (1) |
|
System performance checkup |
|
|
807 | (10) |
|
|
807 | (2) |
|
|
809 | (2) |
|
|
811 | (2) |
|
|
813 | (2) |
|
Choosing an I/O scheduler |
|
|
815 | (1) |
|
sar: Collect and report statistics over time |
|
|
816 | (1) |
|
oprofile: Comprehensive profiler |
|
|
817 | (1) |
|
Help! My system just got really slow! |
|
|
817 | (2) |
|
|
819 | (1) |
|
|
819 | (2) |
|
|
821 | (22) |
|
Logging in to a Linux system from Windows |
|
|
821 | (1) |
|
Accessing remote desktops |
|
|
822 | (3) |
|
Running an X server on a Windows computer |
|
|
823 | (1) |
|
VNC: Virtual Network Computing |
|
|
824 | (1) |
|
Windows RDP: Remote Desktop Protocol |
|
|
824 | (1) |
|
Running Windows and Windows-like applications |
|
|
825 | (1) |
|
Dual booting, or why you shouldn't |
|
|
826 | (1) |
|
The OpenOffice.org alternative |
|
|
826 | (1) |
|
Using command-line tools with Windows |
|
|
826 | (1) |
|
Windows compliance with email and web standards |
|
|
827 | (1) |
|
Sharing files with Samba and CIFS |
|
|
828 | (8) |
|
Samba: CIFS server for UNIX |
|
|
828 | (1) |
|
|
829 | (1) |
|
|
830 | (1) |
|
Network Neighborhood browsing |
|
|
831 | (1) |
|
|
832 | (1) |
|
|
833 | (1) |
|
|
833 | (1) |
|
Transparent redirection with MS DFS |
|
|
834 | (1) |
|
smbclient: a simple CIFS client |
|
|
835 | (1) |
|
|
835 | (1) |
|
Sharing printers with Samba |
|
|
836 | (4) |
|
Installing a printer driver from Windows |
|
|
838 | (1) |
|
Installing a printer driver from the command line |
|
|
839 | (1) |
|
|
840 | (1) |
|
|
841 | (1) |
|
|
842 | (1) |
|
|
843 | (25) |
|
|
844 | (3) |
|
|
847 | (5) |
|
|
847 | (1) |
|
|
848 | (1) |
|
|
849 | (1) |
|
The Yost standard for RJ-45 wiring |
|
|
850 | (2) |
|
|
852 | (1) |
|
|
852 | (1) |
|
|
853 | (1) |
|
|
853 | (1) |
|
setserial: set serial port parameters |
|
|
854 | (1) |
|
Software configuration for serial devices |
|
|
855 | (1) |
|
Configuration of hardwired terminals |
|
|
855 | (4) |
|
|
855 | (1) |
|
|
856 | (2) |
|
Terminal support: the termcap and terminfo databases |
|
|
858 | (1) |
|
Special characters and the terminal driver |
|
|
859 | (1) |
|
stty: set terminal options |
|
|
860 | (1) |
|
tset: set options automatically |
|
|
861 | (1) |
|
|
862 | (1) |
|
|
862 | (2) |
|
Modulation, error correction, and data compression protocols |
|
|
863 | (1) |
|
|
864 | (1) |
|
|
864 | (1) |
|
|
864 | (1) |
|
|
865 | (1) |
|
USB: the Universal Serial Bus |
|
|
865 | (1) |
|
|
866 | (2) |
|
|
868 | (17) |
|
|
869 | (1) |
|
|
870 | (3) |
|
Device files and device numbers |
|
|
870 | (1) |
|
|
871 | (1) |
|
sysfs: a window into the souls of devices |
|
|
872 | (1) |
|
Naming conventions for devices |
|
|
872 | (1) |
|
Why and how to configure the kernel |
|
|
873 | (1) |
|
Tuning Linux kernel parameters |
|
|
874 | (2) |
|
|
876 | (2) |
|
If it ain't broke, don't fix it |
|
|
876 | (1) |
|
Configuring kernel options |
|
|
876 | (2) |
|
Building the kernel binary |
|
|
878 | (1) |
|
Adding a Linux device driver |
|
|
878 | (2) |
|
|
880 | (1) |
|
|
880 | (2) |
|
|
882 | (1) |
|
Setting bootstrap options |
|
|
883 | (1) |
|
|
884 | (1) |
|
|
884 | (1) |
|
|
885 | (19) |
|
init: the primordial process |
|
|
886 | (1) |
|
cron and atd: schedule commands |
|
|
887 | (1) |
|
xinetd and inetd: manage daemons |
|
|
887 | (6) |
|
|
888 | (2) |
|
|
890 | (2) |
|
|
892 | (1) |
|
portmap: map RPC services to TCP and UDP ports |
|
|
893 | (1) |
|
|
893 | (1) |
|
klogd: read kernel messages |
|
|
894 | (1) |
|
|
894 | (1) |
|
cupsd: scheduler for the Common UNIX Printing System |
|
|
894 | (1) |
|
|
894 | (1) |
|
|
895 | (1) |
|
|
895 | (1) |
|
rpc.mountd: respond to mount requests |
|
|
895 | (1) |
|
amd and automount: mount filesystems on demand |
|
|
895 | (1) |
|
rpc.lockd and rpc.statd: manage NFS locks |
|
|
895 | (1) |
|
|
896 | (1) |
|
rpc.rquotad: serve remote quotas |
|
|
896 | (1) |
|
smbd: provide file and printing service to Windows clients |
|
|
896 | (1) |
|
nmbd: NetBIOS name server |
|
|
896 | (1) |
|
Administrative database daemons |
|
|
896 | (1) |
|
ypbind: locate NIS servers |
|
|
896 | (1) |
|
|
896 | (1) |
|
rpc.ypxfrd: transfer NIS databases |
|
|
896 | (1) |
|
lwresd: lightweight resolver library server |
|
|
897 | (1) |
|
nscd: name service cache daemon |
|
|
897 | (1) |
|
|
897 | (1) |
|
sendmail: transport electronic mail |
|
|
897 | (1) |
|
smtpd: Simple Mail Transport Protocol daemon |
|
|
897 | (1) |
|
popd: basic mailbox server |
|
|
897 | (1) |
|
impad: deluxe mailbox server |
|
|
897 | (1) |
|
Remote login and command execution daemons |
|
|
898 | (1) |
|
sshd: secure remote login server |
|
|
898 | (1) |
|
in.rlogind: obsolete remote login server |
|
|
898 | (1) |
|
in.telnetd: yet another remote login server |
|
|
898 | (1) |
|
in.rshd: remote command execution server |
|
|
898 | (1) |
|
Booting and configuration daemons |
|
|
898 | (2) |
|
dhcpd: dynamic address assignment |
|
|
899 | (1) |
|
in.tftpd: trivial file transfer server |
|
|
899 | (1) |
|
rpc.bootparamd: advanced diskless life support |
|
|
899 | (1) |
|
hald: hardware abstraction layer (HAL) daemon |
|
|
899 | (1) |
|
udevd: serialize device connection notices |
|
|
899 | (1) |
|
|
900 | (2) |
|
talkd: network chat service |
|
|
900 | (1) |
|
snmpd: provide remote network management service |
|
|
900 | (1) |
|
ftpd: file transfer server |
|
|
900 | (1) |
|
rsyncd: synchronize files among multiple hosts |
|
|
900 | (1) |
|
routed: maintain routing tables |
|
|
900 | (1) |
|
gated: maintain complicated routing tables |
|
|
901 | (1) |
|
|
901 | (1) |
|
syslogd: process log messages |
|
|
901 | (1) |
|
in.fingerd: look up users |
|
|
901 | (1) |
|
httpd: World Wide Web server |
|
|
901 | (1) |
|
ntpd: time synchronization daemon |
|
|
902 | (1) |
|
|
903 | (1) |
|
Management, Policy, and Politics |
|
|
904 | (69) |
|
|
904 | (2) |
|
Components of a functional IT organization |
|
|
906 | (1) |
|
|
907 | (8) |
|
|
907 | (1) |
|
Hiring, firing, and personnel management |
|
|
908 | (3) |
|
Assigning and tracking tasks |
|
|
911 | (2) |
|
Managing upper management |
|
|
913 | (1) |
|
|
913 | (2) |
|
The role of administration |
|
|
915 | (4) |
|
|
915 | (1) |
|
|
916 | (1) |
|
|
917 | (1) |
|
|
917 | (1) |
|
|
918 | (1) |
|
Miscellaneous administrative chores |
|
|
919 | (1) |
|
|
919 | (5) |
|
|
920 | (2) |
|
Anatomy of a management system |
|
|
922 | (1) |
|
The system administrator's tool box |
|
|
922 | (1) |
|
Software engineering principles |
|
|
923 | (1) |
|
|
924 | (3) |
|
|
925 | (1) |
|
|
925 | (1) |
|
Repurpose or eliminate older hardware |
|
|
926 | (1) |
|
|
927 | (3) |
|
|
927 | (1) |
|
|
927 | (2) |
|
|
929 | (1) |
|
|
930 | (1) |
|
|
930 | (4) |
|
Standardized documentation |
|
|
931 | (2) |
|
|
933 | (1) |
|
|
934 | (1) |
|
Request-tracking and trouble-reporting systems |
|
|
934 | (4) |
|
Common functions of trouble ticket systems |
|
|
935 | (1) |
|
User acceptance of ticketing systems |
|
|
935 | (1) |
|
|
936 | (1) |
|
|
937 | (1) |
|
|
938 | (5) |
|
Backups and off-line information |
|
|
939 | (1) |
|
|
939 | (1) |
|
|
940 | (1) |
|
|
941 | (1) |
|
|
941 | (1) |
|
Second-hand stories from the World Trade Center |
|
|
942 | (1) |
|
|
943 | (6) |
|
|
945 | (1) |
|
|
946 | (2) |
|
Sysadmin policy agreements |
|
|
948 | (1) |
|
|
949 | (8) |
|
|
949 | (1) |
|
|
950 | (1) |
|
|
951 | (2) |
|
|
953 | (1) |
|
|
953 | (1) |
|
|
954 | (1) |
|
|
955 | (1) |
|
|
956 | (1) |
|
|
957 | (1) |
|
|
958 | (3) |
|
LSB: the Linux Standard Base |
|
|
959 | (1) |
|
|
959 | (1) |
|
ITIL: the Information Technology Interface Library |
|
|
960 | (1) |
|
COBIT: Control Objectives for Information and related Technology |
|
|
960 | (1) |
|
|
961 | (1) |
|
|
962 | (2) |
|
Organizations, conferences, and other resources |
|
|
964 | (4) |
|
Conferences and trade shows |
|
|
965 | (2) |
|
LPI: the Linux Professional Institute |
|
|
967 | (1) |
|
Mailing lists and web resources |
|
|
967 | (1) |
|
|
968 | (1) |
|
|
968 | (2) |
|
|
968 | (1) |
|
|
969 | (1) |
|
|
969 | (1) |
|
Legal issues, patents, and privacy |
|
|
969 | (1) |
|
|
970 | (1) |
|
|
970 | (3) |
Index |
|
973 | (26) |
About the Contributors |
|
999 | (2) |
About the Authors |
|
1001 | |