Introduction |
|
xxvii | |
|
Part I Getting Off the Ground with Linux |
|
|
1 | (32) |
|
Chapter 1 Starting with Linux |
|
|
3 | (12) |
|
|
4 | (6) |
|
What Comes in Linux Systems? |
|
|
4 | (1) |
|
What Do You Need to Get Started? |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
6 | (2) |
|
|
8 | (2) |
|
Trying Other Linux Distributions |
|
|
10 | (1) |
|
|
10 | (2) |
|
What's So Great About Linux? |
|
|
12 | (2) |
|
|
14 | (1) |
|
Chapter 2 Creating the Perfect Desktop |
|
|
15 | (18) |
|
Starting with Your Linux Desktop |
|
|
16 | (1) |
|
Step 1 Getting a Computer |
|
|
17 | (1) |
|
Selecting Computer Hardware |
|
|
17 | (1) |
|
Choosing Networking Hardware |
|
|
18 | (1) |
|
Step 2 Installing Your Linux Desktop |
|
|
18 | (5) |
|
Starting with a Fedora Desktop |
|
|
19 | (1) |
|
Preparing to Install Extra Software |
|
|
19 | (1) |
|
Checking Available Software |
|
|
20 | (3) |
|
Step 3 Configuring Your Desktop |
|
|
23 | (1) |
|
Step 4 Adding Applications |
|
|
24 | (5) |
|
Choosing Office Applications |
|
|
25 | (1) |
|
|
26 | (1) |
|
Choosing Multimedia Applications |
|
|
27 | (1) |
|
Choosing Internet Applications |
|
|
27 | (1) |
|
Choosing Other Applications |
|
|
28 | (1) |
|
Step 5 Transitioning from Windows |
|
|
29 | (2) |
|
Getting Your Files from Windows to Linux |
|
|
29 | (1) |
|
Getting Windows Content from the Local Disk |
|
|
29 | (1) |
|
Getting Windows Content over the Network |
|
|
30 | (1) |
|
Putting Content on Removable Media |
|
|
30 | (1) |
|
Running Windows Applications in Linux |
|
|
30 | (1) |
|
|
31 | (2) |
|
Part II Running a Linux Desktop |
|
|
33 | (112) |
|
Chapter 3 Getting into the Desktop |
|
|
35 | (44) |
|
Understanding Your Desktop |
|
|
35 | (1) |
|
|
36 | (4) |
|
|
36 | (1) |
|
|
37 | (2) |
|
|
39 | (1) |
|
|
40 | (16) |
|
|
41 | (3) |
|
Managing Files with Dolphin and Konqueror |
|
|
44 | (1) |
|
Using the Dolphin File Manager |
|
|
45 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
Creating New Files and Folders |
|
|
48 | (1) |
|
Using the Konqueror Web Browser/File Manager |
|
|
49 | (1) |
|
Using Bookmarking Features in Konqueror |
|
|
50 | (1) |
|
Configuring Konqueror Options |
|
|
50 | (2) |
|
|
52 | (1) |
|
Managing Windows in the Taskbar |
|
|
52 | (1) |
|
|
52 | (1) |
|
|
53 | (1) |
|
Pinning Windows on Top or Bottom |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
54 | (2) |
|
|
56 | (14) |
|
Using the Metacity Window Manager |
|
|
58 | (1) |
|
|
59 | (1) |
|
Using the Applications and System Menus |
|
|
60 | (1) |
|
|
60 | (1) |
|
|
61 | (1) |
|
Adding an Application Launcher |
|
|
61 | (1) |
|
|
62 | (1) |
|
Changing Panel Properties |
|
|
63 | (1) |
|
Using the Nautilus File Manager |
|
|
63 | (3) |
|
|
66 | (2) |
|
Changing GNOME Preferences |
|
|
68 | (1) |
|
|
69 | (1) |
|
Configuring Your Own Desktop |
|
|
70 | (8) |
|
|
71 | (1) |
|
Creating a Working X Configuration File |
|
|
71 | (1) |
|
|
72 | (1) |
|
Tuning Up Your X Configuration File |
|
|
73 | (2) |
|
Choosing a Window Manager |
|
|
75 | (2) |
|
Choosing Your Personal Window Manager |
|
|
77 | (1) |
|
|
78 | (1) |
|
|
78 | (1) |
|
Chapter 4 E-mailing and Web Browsing |
|
|
79 | (34) |
|
|
79 | (17) |
|
Choosing an E-mail Client |
|
|
79 | (2) |
|
Getting Here from Windows |
|
|
81 | (1) |
|
Getting Started with E-mail |
|
|
82 | (2) |
|
|
84 | (1) |
|
Reading E-mail with Thunderbird |
|
|
84 | (1) |
|
Setting Up an E-mail Account |
|
|
85 | (2) |
|
Connecting to the Mail Server |
|
|
87 | (1) |
|
|
87 | (1) |
|
Composing and Sending Mail |
|
|
88 | (1) |
|
Filtering Mail and Catching Spam |
|
|
89 | (1) |
|
Managing E-mail in Evolution |
|
|
90 | (1) |
|
Receiving, Composing, and Sending E-mail |
|
|
91 | (2) |
|
Managing E-mail with Search Folders |
|
|
93 | (1) |
|
Filtering E-mail Messages |
|
|
94 | (1) |
|
Reading E-mail with SeaMonkey Mail |
|
|
94 | (1) |
|
Working with Text-based E-mail Readers |
|
|
95 | (1) |
|
|
96 | (1) |
|
|
96 | (1) |
|
|
96 | (1) |
|
Exploring the SeaMonkey Suite |
|
|
97 | (2) |
|
|
99 | (11) |
|
|
100 | (1) |
|
Setting Firefox Preferences |
|
|
100 | (2) |
|
Adding Add-ons and Plug-ins |
|
|
102 | (3) |
|
|
105 | (1) |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
107 | (1) |
|
Improving Firefox Browsing by Adding a Preferences Toolbar |
|
|
108 | (1) |
|
Doing Cool Things with Firefox |
|
|
109 | (1) |
|
|
109 | (1) |
|
|
109 | (1) |
|
|
109 | (1) |
|
Using Text-Based Web Browsers |
|
|
110 | (1) |
|
|
111 | (2) |
|
Chapter 5 Playing Music, Video, Photos, and Games |
|
|
113 | (32) |
|
Running Multimedia Servers |
|
|
114 | (1) |
|
Using Totem for Audio and Video |
|
|
115 | (2) |
|
Adding Audio/Video Support to Totem |
|
|
115 | (1) |
|
Using Totem as a Movie Player |
|
|
116 | (1) |
|
|
117 | (11) |
|
Playing Music with Rhythmbox |
|
|
118 | (2) |
|
Playing Music with the XMMS Multimedia Player |
|
|
120 | (2) |
|
|
122 | (1) |
|
Using the Playlist Editor |
|
|
122 | (1) |
|
Managing Music on your iPod with gtkpod |
|
|
123 | (1) |
|
Installing and Starting gtkpod iPod Manager |
|
|
123 | (1) |
|
Using gtkipod iPod Manager |
|
|
124 | (1) |
|
Recording and Ripping Music |
|
|
125 | (1) |
|
Creating an Audio CD with cdrecord |
|
|
125 | (1) |
|
|
126 | (2) |
|
|
128 | (5) |
|
|
128 | (2) |
|
|
130 | (1) |
|
|
131 | (1) |
|
Creating Playlists with xine |
|
|
131 | (1) |
|
|
132 | (1) |
|
|
133 | (5) |
|
Managing Images in Shotwell Photo Manager |
|
|
133 | (2) |
|
Manipulating Images with GIMP |
|
|
135 | (2) |
|
Acquiring Screen Captures |
|
|
137 | (1) |
|
|
138 | (6) |
|
Jumping into Linux Gaming |
|
|
138 | (1) |
|
|
139 | (1) |
|
Basic Linux Gaming Information |
|
|
140 | (2) |
|
Getting Started with Commercial Games in Linux |
|
|
142 | (1) |
|
Playing TransGaming and Cedega Games |
|
|
142 | (2) |
|
|
144 | (1) |
|
Part III Learning System Administration Skills |
|
|
145 | (238) |
|
Chapter 6 Starting with System Administration |
|
|
147 | (18) |
|
Graphical Administration Tools |
|
|
147 | (6) |
|
Using Web-Based Administration |
|
|
148 | (1) |
|
Open Source Projects Offering Web Administration |
|
|
148 | (1) |
|
The Webmin Administration Tool |
|
|
149 | (1) |
|
Graphical Administration with Different Distributions |
|
|
150 | (1) |
|
Fedora/RHEL system-config Tools |
|
|
150 | (2) |
|
|
152 | (1) |
|
|
153 | (4) |
|
Becoming root from the Shell (su Command) |
|
|
154 | (1) |
|
Allowing Limited Administrative Access |
|
|
155 | (1) |
|
Gaining Administrative Access with sudo |
|
|
155 | (2) |
|
Exploring Administrative Commands, Configuration Files, and Log Files |
|
|
157 | (6) |
|
|
157 | (1) |
|
Administrative Configuration Files |
|
|
158 | (4) |
|
|
162 | (1) |
|
Using Other Administrative Logins |
|
|
163 | (1) |
|
|
164 | (1) |
|
Chapter 7 Installing Linux |
|
|
165 | (32) |
|
Choosing a Linux Distribution |
|
|
166 | (1) |
|
Getting Your Own Linux Distribution |
|
|
167 | (4) |
|
Finding Another Linux Distribution |
|
|
167 | (1) |
|
Understanding What You Need |
|
|
168 | (1) |
|
Downloading the Distribution |
|
|
169 | (1) |
|
Burning the Distribution to CD |
|
|
170 | (1) |
|
Exploring Common Installation Topics |
|
|
171 | (24) |
|
Knowing Your Computer Hardware |
|
|
171 | (1) |
|
Upgrading or Installing from Scratch |
|
|
172 | (1) |
|
|
173 | (1) |
|
Installing Linux to Run Virtually |
|
|
174 | (1) |
|
Using Installation Boot Options |
|
|
174 | (1) |
|
|
175 | (1) |
|
Understanding Different Partition Types |
|
|
176 | (1) |
|
Partitioning During Fedora Installation |
|
|
176 | (3) |
|
|
179 | (1) |
|
|
180 | (2) |
|
Tips for Creating Partitions |
|
|
182 | (2) |
|
Using LILO or GRUB Boot Loaders |
|
|
184 | (1) |
|
Booting Your Computer with GRUB |
|
|
184 | (1) |
|
|
185 | (1) |
|
Temporarily Changing Boot Options |
|
|
185 | (1) |
|
Permanently Changing Boot Options |
|
|
186 | (2) |
|
Adding a New GRUB Boot Image |
|
|
188 | (1) |
|
Booting Your Computer with LILO |
|
|
188 | (4) |
|
Changing Your Boot Loader |
|
|
192 | (1) |
|
|
193 | (1) |
|
Configuring Other Administrative Features |
|
|
194 | (1) |
|
|
195 | (2) |
|
Chapter 8 Running Commands from the Shell |
|
|
197 | (46) |
|
|
198 | (2) |
|
|
198 | (1) |
|
|
199 | (1) |
|
|
200 | (1) |
|
|
200 | (2) |
|
Using bash (and Earlier sh) Shells |
|
|
201 | (1) |
|
Using tcsh (and Earlier csh) Shells |
|
|
202 | (1) |
|
|
202 | (1) |
|
|
202 | (1) |
|
|
202 | (1) |
|
|
202 | (5) |
|
Checking Your Login Session |
|
|
203 | (1) |
|
Checking Directories and Permissions |
|
|
204 | (2) |
|
|
206 | (1) |
|
|
207 | (1) |
|
|
207 | (12) |
|
|
208 | (3) |
|
|
211 | (1) |
|
|
211 | (3) |
|
|
214 | (1) |
|
|
214 | (2) |
|
Connecting and Expanding Commands |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
|
217 | (1) |
|
|
218 | (1) |
|
Expanding Arithmetic Expressions |
|
|
218 | (1) |
|
Expanding Environment Variables |
|
|
219 | (1) |
|
Creating Your Shell Environment |
|
|
219 | (8) |
|
|
219 | (1) |
|
|
220 | (2) |
|
Adding Environment Variables |
|
|
222 | (1) |
|
Understanding Common Shell Variables |
|
|
222 | (2) |
|
|
224 | (1) |
|
Managing Background and Foreground Processes |
|
|
225 | (1) |
|
Starting Background Processes |
|
|
225 | (1) |
|
Using Foreground and Background Commands |
|
|
226 | (1) |
|
Working with the Linux File System |
|
|
227 | (10) |
|
Creating Files and Directories |
|
|
229 | (3) |
|
Using Metacharacters and Operators |
|
|
232 | (1) |
|
Using File-matching Metacharacters |
|
|
232 | (1) |
|
Using File-Redirection Metacharacters |
|
|
233 | (1) |
|
Understanding File Permissions |
|
|
234 | (3) |
|
Moving, Copying, and Deleting Files |
|
|
237 | (1) |
|
|
237 | (5) |
|
|
238 | (3) |
|
|
241 | (1) |
|
|
241 | (1) |
|
Using Numbers with Commands |
|
|
242 | (1) |
|
|
242 | (1) |
|
|
242 | (1) |
|
Chapter 9 Learning Basic Administration |
|
|
243 | (18) |
|
|
244 | (7) |
|
Adding Users with useradd |
|
|
244 | (3) |
|
|
247 | (2) |
|
Modifying Users with usermod |
|
|
249 | (1) |
|
Deleting Users with userdel |
|
|
250 | (1) |
|
|
251 | (6) |
|
Managing Removable Hardware |
|
|
251 | (1) |
|
Removable Media on a GNOME Desktop |
|
|
252 | (2) |
|
Removable Media on a SUSE KDE Desktop |
|
|
254 | (1) |
|
Working with Loadable Modules |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
256 | (1) |
|
|
257 | (1) |
|
Monitoring System Performance |
|
|
257 | (2) |
|
Doing Remote System Administration |
|
|
259 | (1) |
|
|
260 | (1) |
|
Chapter 10 Managing Disks and File Systems |
|
|
261 | (16) |
|
|
262 | (2) |
|
|
264 | (6) |
|
|
265 | (2) |
|
Using the fstab File to Define Mountable File Systems |
|
|
267 | (1) |
|
Using the mount Command to Mount File Systems |
|
|
268 | (1) |
|
|
269 | (1) |
|
Mounting a Disk Image in loopback |
|
|
269 | (1) |
|
|
270 | (1) |
|
Using the mkfs Command to Create a File System |
|
|
270 | (1) |
|
|
271 | (3) |
|
|
274 | (2) |
|
Displaying System Space with df |
|
|
274 | (1) |
|
Checking Disk Usage with du |
|
|
275 | (1) |
|
Finding Disk Consumption with find |
|
|
276 | (1) |
|
|
276 | (1) |
|
Chapter 11 Setting Up Networking |
|
|
277 | (24) |
|
Connecting to the Network |
|
|
278 | (6) |
|
Connecting via Dial-Up Service |
|
|
278 | (1) |
|
Connecting a Single Wired Ethernet Card |
|
|
279 | (1) |
|
Sharing a Network Connection with Other Computers |
|
|
280 | (2) |
|
|
282 | (1) |
|
Connecting Other Equipment |
|
|
283 | (1) |
|
Using Ethernet Connections to Connect to the Internet |
|
|
284 | (8) |
|
Configuring Ethernet During Installation |
|
|
285 | (1) |
|
Configuring Ethernet from the Desktop |
|
|
285 | (1) |
|
Using Network Configuration GUI in Fedora |
|
|
286 | (2) |
|
Identifying Other Computers (Hosts and DNS) |
|
|
288 | (2) |
|
Understanding Your Internet Connection |
|
|
290 | (2) |
|
Using Dial-Up to Connect to the Internet |
|
|
292 | (6) |
|
|
292 | (1) |
|
|
293 | (1) |
|
Creating a Dial-Up Connection with the Internet Configuration Wizard |
|
|
294 | (2) |
|
Launching Your PPP Connection |
|
|
296 | (1) |
|
Launching Your PPP Connection on Demand |
|
|
296 | (1) |
|
Checking Your PPP Connection |
|
|
297 | (1) |
|
Checking That Your Modem Was Detected |
|
|
297 | (1) |
|
Connecting to the Internet with Wireless |
|
|
298 | (2) |
|
|
300 | (1) |
|
Chapter 12 Using Network Tools |
|
|
301 | (18) |
|
Running Commands to Browse the Web |
|
|
301 | (2) |
|
|
303 | (6) |
|
Downloading Files with wget |
|
|
303 | (1) |
|
Transferring Files with curl |
|
|
304 | (1) |
|
Transferring Files with FTP Commands |
|
|
305 | (2) |
|
Using SSH Tools to Transfer Files |
|
|
307 | (1) |
|
Copying Remote Files with scp |
|
|
308 | (1) |
|
Copying Remote Files in sftp and lftp Sessions |
|
|
308 | (1) |
|
Using Windows File Transfer Tools |
|
|
309 | (1) |
|
Sharing Remote Directories |
|
|
309 | (5) |
|
Sharing Remote Directories with NFS |
|
|
309 | (1) |
|
|
309 | (1) |
|
|
310 | (1) |
|
Sharing Remote Directories with Samba |
|
|
310 | (1) |
|
Viewing and Accessing Samba Shares |
|
|
311 | (1) |
|
Mounting Samba (CIFS) Shares |
|
|
312 | (1) |
|
|
313 | (1) |
|
Checking Samba Server Configuration |
|
|
313 | (1) |
|
Sharing Remote Directories with SSHFS |
|
|
314 | (1) |
|
Chatting with Friends in IRC |
|
|
314 | (1) |
|
Using Text-based E-mail Clients |
|
|
315 | (3) |
|
Managing E-mail with mail |
|
|
316 | (1) |
|
Managing E-mail with mutt |
|
|
317 | (1) |
|
|
318 | (1) |
|
Chapter 13 Securing Linux |
|
|
319 | (48) |
|
|
320 | (4) |
|
Finding Distribution-Specific Security Resources |
|
|
323 | (1) |
|
Finding General Security Resources |
|
|
324 | (1) |
|
|
324 | (5) |
|
Using Password Protection |
|
|
325 | (1) |
|
|
325 | (2) |
|
Using a Shadow Password File |
|
|
327 | (1) |
|
Breaking Encrypted Passwords |
|
|
327 | (1) |
|
Checking for the Shadow Password File |
|
|
328 | (1) |
|
|
329 | (5) |
|
|
332 | (1) |
|
Redirecting Logs to a Loghost with syslogd |
|
|
332 | (2) |
|
Understanding the Messages Log File |
|
|
334 | (1) |
|
|
334 | (4) |
|
|
335 | (1) |
|
Using the ssh, sftp, and scp Commands |
|
|
335 | (2) |
|
Using ssh, scp, and sftp Without Passwords |
|
|
337 | (1) |
|
|
338 | (25) |
|
Controlling Access to Services with TCP Wrappers |
|
|
338 | (3) |
|
Understanding Attack Techniques |
|
|
341 | (1) |
|
Protecting Against Denial-of-Service Attacks |
|
|
342 | (1) |
|
|
342 | (2) |
|
|
344 | (1) |
|
Smurf Amplification Attack |
|
|
345 | (1) |
|
Protecting Against Distributed Denial-of-Service Attacks |
|
|
345 | (5) |
|
Protecting Against Intrusion Attacks |
|
|
350 | (1) |
|
Evaluating Access to Network Services |
|
|
350 | (1) |
|
Disabling Network Services |
|
|
351 | (2) |
|
Securing Servers with SELinux |
|
|
353 | (1) |
|
Protecting Web Servers with Certificates and Encryption |
|
|
353 | (1) |
|
|
354 | (1) |
|
|
355 | (1) |
|
|
355 | (8) |
|
Using Security Tools from Linux Live CDs |
|
|
363 | (2) |
|
Advantages of Security Live CDs |
|
|
363 | (1) |
|
Using INSERT to Check for Rootkits |
|
|
364 | (1) |
|
|
365 | (2) |
|
Chapter 14 Creating Useful Shell Scripts |
|
|
367 | (16) |
|
Understanding Shell Scripts |
|
|
367 | (15) |
|
Executing and Debugging Shell Scripts |
|
|
368 | (1) |
|
Understanding Shell Variables |
|
|
369 | (1) |
|
|
370 | (1) |
|
Parameter Expansion in bash |
|
|
370 | (1) |
|
Performing Arithmetic in Shell Scripts |
|
|
371 | (1) |
|
Using Programming Constructs in Shell Scripts |
|
|
372 | (1) |
|
The "if...then" Statements |
|
|
372 | (3) |
|
|
375 | (1) |
|
|
376 | (1) |
|
The "while...do" and "until...do" Loops |
|
|
377 | (1) |
|
Some Useful External Programs |
|
|
378 | (1) |
|
The General Regular Expression Parser |
|
|
378 | (1) |
|
Remove Sections of Lines of Text (cut) |
|
|
378 | (1) |
|
Translate or Delete Characters (tr) |
|
|
379 | (1) |
|
|
379 | (1) |
|
Trying Some Simple Shell Scripts |
|
|
380 | (1) |
|
|
380 | (1) |
|
|
381 | (1) |
|
|
382 | (1) |
|
Part IV Setting Up Linux Servers |
|
|
383 | (102) |
|
Chapter 15 Running a Linux Web Server |
|
|
385 | (22) |
|
Components of a Web Server (Apache, MySQL and PHP) |
|
|
385 | (3) |
|
|
386 | (1) |
|
|
386 | (1) |
|
|
387 | (1) |
|
Setting Up Your Web Server |
|
|
388 | (2) |
|
|
388 | (1) |
|
|
388 | (2) |
|
|
390 | (1) |
|
Operating Your Web Server |
|
|
390 | (8) |
|
Editing Your Apache Configuration Files |
|
|
391 | (2) |
|
Adding a Virtual Host to Apache |
|
|
393 | (2) |
|
User Content and the UserDir Setting |
|
|
395 | (1) |
|
Installing a Web Application: Coppermine Photo Gallery |
|
|
395 | (3) |
|
Troubleshooting Your Web Server |
|
|
398 | (3) |
|
|
398 | (2) |
|
Access Forbidden and Server Internal Errors |
|
|
400 | (1) |
|
Securing Your Web Traffic with SSL/TLS |
|
|
401 | (4) |
|
|
403 | (1) |
|
Configuring Apache to Support SSL/TLS |
|
|
404 | (1) |
|
|
405 | (2) |
|
Chapter 16 Running a Mail Server |
|
|
407 | (18) |
|
Internet E-Mail's Inner Workings |
|
|
407 | (2) |
|
About the System and the Software Used |
|
|
409 | (1) |
|
|
409 | (2) |
|
Configuring DNS for Direct Delivery |
|
|
410 | (1) |
|
Configuring for Retrieval from a Mail Host |
|
|
411 | (1) |
|
Installing and Configuring the Mail Server Software |
|
|
411 | (5) |
|
Installing Exim and Courier |
|
|
412 | (2) |
|
Installing ClamAV and SpamAssassin |
|
|
414 | (2) |
|
Testing and Troubleshooting |
|
|
416 | (4) |
|
|
416 | (1) |
|
Common Errors (and How to Fix Them) |
|
|
417 | (1) |
|
Messages Rejected by Exim |
|
|
417 | (1) |
|
Messages Not Delivered by Exim |
|
|
418 | (1) |
|
Login Failures when Connecting to Courier |
|
|
419 | (1) |
|
|
420 | (1) |
|
|
420 | (1) |
|
Configuring Web-Based Mail |
|
|
421 | (1) |
|
Securing Communications with SSL/TLS |
|
|
421 | (2) |
|
|
423 | (2) |
|
Chapter 17 Running a Print Server |
|
|
425 | (24) |
|
Common UNIX Printing System |
|
|
426 | (1) |
|
|
427 | (11) |
|
Using Web-Based CUPS Administration |
|
|
427 | (4) |
|
Using the Printer Configuration Window |
|
|
431 | (1) |
|
Configuring Local Printers with the Printer Configuration Window |
|
|
431 | (4) |
|
Configuring Remote Printers |
|
|
435 | (1) |
|
Adding a Remote CUPS Printer |
|
|
436 | (1) |
|
Adding a Remote UNIX Printer |
|
|
436 | (1) |
|
Adding a Windows (SMB) Printer |
|
|
436 | (2) |
|
Working with CUPS Printing |
|
|
438 | (3) |
|
Configuring the CUPS Server (cupsd.conf) |
|
|
438 | (1) |
|
|
439 | (1) |
|
Configuring CUPS Printer Options Manually |
|
|
440 | (1) |
|
|
441 | (2) |
|
|
442 | (1) |
|
|
442 | (1) |
|
Removing Print Jobs with lprm |
|
|
443 | (1) |
|
Configuring Print Servers |
|
|
443 | (4) |
|
Configuring a Shared CUPS Printer |
|
|
444 | (1) |
|
Configuring a Shared Samba Printer |
|
|
445 | (1) |
|
Understanding smb.conf for Printing |
|
|
445 | (1) |
|
|
446 | (1) |
|
|
447 | (2) |
|
Chapter 18 Running a File Server |
|
|
449 | (36) |
|
Setting Up an NFS File Server |
|
|
450 | (14) |
|
|
451 | (1) |
|
|
452 | (1) |
|
Configuring the /etc/exports File |
|
|
452 | (4) |
|
Exporting the Shared File Systems |
|
|
456 | (1) |
|
|
456 | (1) |
|
|
457 | (1) |
|
Manually Mounting an NFS File System |
|
|
457 | (1) |
|
Automatically Mounting an NFS File System |
|
|
458 | (3) |
|
Using autofs to Mount NFS File Systems on Demand |
|
|
461 | (1) |
|
Unmounting NFS File Systems |
|
|
462 | (1) |
|
Other cool things to do with NFS |
|
|
463 | (1) |
|
Understanding NFS security issues |
|
|
464 | (1) |
|
Setting Up a Samba File Server |
|
|
464 | (19) |
|
Getting and Installing Samba |
|
|
466 | (1) |
|
Configuring Samba with SWAT |
|
|
466 | (1) |
|
Turning on the SWAT Service |
|
|
466 | (1) |
|
|
467 | (1) |
|
Creating Global Samba Settings in SWAT |
|
|
468 | (6) |
|
Configuring Shared Directories with SWAT |
|
|
474 | (2) |
|
Checking Your Samba Setup with SWAT |
|
|
476 | (1) |
|
Working with Samba Files and Commands |
|
|
476 | (1) |
|
Editing the smb.conf File |
|
|
476 | (2) |
|
|
478 | (1) |
|
Starting the Samba Service |
|
|
478 | (1) |
|
Testing your Samba Permissions |
|
|
479 | (1) |
|
Checking the Status of Shared Directories |
|
|
479 | (1) |
|
Using Samba Shared Directories |
|
|
479 | (1) |
|
Using Samba from Nautilus |
|
|
479 | (1) |
|
Mounting Samba Directories in Linux |
|
|
480 | (1) |
|
Troubleshooting Your Samba Server |
|
|
480 | (1) |
|
Basic networking in Place? |
|
|
480 | (1) |
|
|
481 | (1) |
|
|
482 | (1) |
|
|
482 | (1) |
|
|
483 | (2) |
|
Part V Choosing and Installing Different Linux Distributions |
|
|
485 | (100) |
|
Chapter 19 Running Ubuntu Linux |
|
|
487 | (16) |
|
|
488 | (6) |
|
|
488 | (1) |
|
|
489 | (1) |
|
|
490 | (1) |
|
|
491 | (1) |
|
|
492 | (1) |
|
|
493 | (1) |
|
|
494 | (3) |
|
Getting Started with Ubuntu |
|
|
497 | (5) |
|
|
498 | (2) |
|
|
500 | (2) |
|
Getting More Information About Ubuntu |
|
|
502 | (1) |
|
|
502 | (1) |
|
Chapter 20 Running Fedora and Red Hat Enterprise Linux |
|
|
503 | (14) |
|
|
505 | (4) |
|
Red Hat Installer (Anaconda) |
|
|
505 | (1) |
|
Custom Spins, Install Sets, and Live CDs |
|
|
506 | (1) |
|
|
506 | (1) |
|
Latest Desktop Technology |
|
|
507 | (1) |
|
System Configuration Tools |
|
|
508 | (1) |
|
Going Forward with Red Hat Enterprise Linux |
|
|
509 | (1) |
|
Red Hat Network and Satellite Servers |
|
|
509 | (1) |
|
Red Hat Enterprise Virtualization |
|
|
510 | (1) |
|
|
510 | (1) |
|
Going Forward with Fedora |
|
|
510 | (2) |
|
Growing Community Support for Fedora |
|
|
511 | (1) |
|
Joining Fedora Special Interest Groups |
|
|
511 | (1) |
|
|
512 | (1) |
|
|
512 | (3) |
|
Beginning the Installation |
|
|
512 | (3) |
|
Running the Fedora Firstboot |
|
|
515 | (1) |
|
|
515 | (2) |
|
Chapter 21 Running Debian GNU/Linux |
|
|
517 | (24) |
|
|
518 | (3) |
|
|
518 | (1) |
|
Debian Package Management Tools |
|
|
519 | (2) |
|
|
521 | (1) |
|
|
521 | (1) |
|
Installing Debian GNU/Linux |
|
|
522 | (5) |
|
Hardware Requirements and Installation Planning |
|
|
522 | (1) |
|
|
523 | (1) |
|
|
523 | (1) |
|
|
523 | (4) |
|
Managing Your Debian System |
|
|
527 | (12) |
|
Configuring Network Connections |
|
|
527 | (1) |
|
IP Networks: Ethernet and Wireless |
|
|
528 | (1) |
|
|
529 | (1) |
|
|
530 | (1) |
|
Package Management Using APT |
|
|
530 | (1) |
|
Managing the List of Package Repositories |
|
|
531 | (1) |
|
Updating the APT Package Database |
|
|
532 | (1) |
|
Finding and Installing Packages |
|
|
532 | (1) |
|
|
533 | (1) |
|
|
534 | (1) |
|
Package Management Using dpkg |
|
|
534 | (1) |
|
Installing and Removing Packages |
|
|
535 | (1) |
|
Querying the Package Database |
|
|
535 | (1) |
|
|
536 | (1) |
|
Installing Package Sets (tasks) with tasksel |
|
|
536 | (1) |
|
Alternatives, Diversions, and Stat Overrides |
|
|
537 | (2) |
|
Managing Package Configuration with debconf |
|
|
539 | (1) |
|
|
539 | (2) |
|
Chapter 22 Running SUSE and openSUSE Linux |
|
|
541 | (10) |
|
Understanding SUSE Linux Enterprise and openSUSE |
|
|
542 | (1) |
|
What's in SUSE Distributions? |
|
|
543 | (5) |
|
Installation and Configuration with YaST |
|
|
543 | (3) |
|
|
546 | (1) |
|
Automated Software Updates |
|
|
547 | (1) |
|
|
548 | (1) |
|
|
549 | (1) |
|
|
550 | (1) |
|
Chapter 23 Running PCLinuxOS |
|
|
551 | (8) |
|
|
552 | (3) |
|
Discovering What's in PCLinuxOS |
|
|
552 | (1) |
|
|
553 | (2) |
|
|
555 | (2) |
|
|
555 | (1) |
|
Configuring After Installation |
|
|
556 | (1) |
|
|
557 | (1) |
|
|
557 | (2) |
|
Chapter 24 Running Bootable Linux Distributions |
|
|
559 | (26) |
|
Overview of Bootable Linux Distributions |
|
|
560 | (1) |
|
|
561 | (19) |
|
|
562 | (1) |
|
|
562 | (1) |
|
|
563 | (1) |
|
|
564 | (3) |
|
|
567 | (1) |
|
Special Features and Workarounds |
|
|
568 | (1) |
|
Showcasing Linux from a Live CD |
|
|
569 | (1) |
|
Security and Rescue Bootables |
|
|
569 | (2) |
|
BackTrack Network Security Suite |
|
|
571 | (1) |
|
|
571 | (2) |
|
KNOPPIX Security Tools Distribution |
|
|
573 | (1) |
|
The Inside Security Rescue Toolkit |
|
|
573 | (1) |
|
|
574 | (1) |
|
|
575 | (1) |
|
|
575 | (1) |
|
|
576 | (1) |
|
|
577 | (1) |
|
|
577 | (1) |
|
|
578 | (1) |
|
|
579 | (1) |
|
Special-Purpose Bootables |
|
|
580 | (1) |
|
Customizing a Bootable Linux |
|
|
581 | (2) |
|
Building a Live CD with Fedora |
|
|
583 | (1) |
|
|
584 | (1) |
|
Part VI Programming in Linux |
|
|
585 | (62) |
|
Chapter 25 Programming Environments and Interfaces |
|
|
587 | (30) |
|
Understanding Programming Environments |
|
|
588 | (1) |
|
Using Linux Programming Environments |
|
|
588 | (15) |
|
The Linux Development Environment |
|
|
589 | (1) |
|
|
590 | (1) |
|
CPU and Memory Protection |
|
|
591 | (1) |
|
|
592 | (1) |
|
|
593 | (1) |
|
|
594 | (1) |
|
Interprocess Communication |
|
|
595 | (1) |
|
The Building Blocks Philosophy |
|
|
595 | (2) |
|
Graphical Programming Environments |
|
|
597 | (1) |
|
Eclipse: The Universal Tool Platform |
|
|
597 | (2) |
|
|
599 | (1) |
|
Anjuta: An IDE for GTK/GNOME |
|
|
600 | (1) |
|
|
601 | (1) |
|
The Command-line Programming Environment |
|
|
602 | (1) |
|
Linux Programming Interfaces |
|
|
603 | (13) |
|
Creating Command-line Interfaces |
|
|
604 | (1) |
|
Creating Text Applications with Ncurses |
|
|
605 | (3) |
|
Creating Text Applications with S-Lang |
|
|
608 | (2) |
|
Creating Graphical Interfaces |
|
|
610 | (2) |
|
Application Programming Interfaces |
|
|
612 | (4) |
|
|
616 | (1) |
|
Chapter 26 Programming Tools and Utilities |
|
|
617 | (30) |
|
|
617 | (1) |
|
|
618 | (6) |
|
Compiling Multiple Source Code Files |
|
|
620 | (2) |
|
|
622 | (2) |
|
Automating Builds with make |
|
|
624 | (2) |
|
|
626 | (5) |
|
|
627 | (1) |
|
|
628 | (1) |
|
|
629 | (1) |
|
|
630 | (1) |
|
Environment Variables and Configuration Files |
|
|
630 | (1) |
|
|
631 | (7) |
|
Source Code Control Using RCS |
|
|
631 | (1) |
|
Checking Files in and Out |
|
|
632 | (1) |
|
Making Changes to Repository Files |
|
|
633 | (1) |
|
Additional Command-line Options |
|
|
634 | (1) |
|
Source Code Control with CVS |
|
|
634 | (4) |
|
Debugging with GNU Debugger |
|
|
638 | (8) |
|
|
639 | (3) |
|
Inspecting Code in the Debugger |
|
|
642 | (1) |
|
|
643 | (1) |
|
|
644 | (2) |
|
|
646 | (1) |
|
|
646 | (1) |
|
Part VII Appendix and License |
|
|
647 | (12) |
|
|
649 | (10) |
|
Finding Linux Distributions on the DVD |
|
|
650 | (1) |
|
|
650 | (1) |
|
|
650 | (1) |
|
|
650 | (1) |
|
|
651 | (1) |
|
|
651 | (1) |
|
BackTrack 3 Linux Security Suite |
|
|
651 | (1) |
|
|
651 | (1) |
|
|
652 | (1) |
|
|
652 | (1) |
|
Inside Security Rescue Toolkit |
|
|
652 | (1) |
|
|
652 | (1) |
|
|
653 | (1) |
|
|
653 | (1) |
|
|
653 | (1) |
|
|
653 | (1) |
|
|
654 | (1) |
|
|
654 | (1) |
|
|
654 | (1) |
|
Creating Linux CDs or DVDs |
|
|
654 | (2) |
|
|
656 | (3) |
GNU General Public License |
|
659 | (6) |
Index |
|
665 | |