Introduction |
|
1 | (1) |
|
|
2 | (1) |
|
Converntions Used in This Book |
|
|
3 | (1) |
|
What You Don't Have to Read |
|
|
3 | (1) |
|
|
3 | (1) |
|
How This Book Is Organized |
|
|
4 | (1) |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
6 | (1) |
|
|
7 | (64) |
|
|
9 | (22) |
|
|
9 | (7) |
|
|
11 | (3) |
|
Making sense of version numbers |
|
|
14 | (1) |
|
Linux Standard Base (LSB) |
|
|
15 | (1) |
|
What a Linux Distribution Includes |
|
|
16 | (9) |
|
|
16 | (4) |
|
|
20 | (1) |
|
|
21 | (1) |
|
|
22 | (1) |
|
|
22 | (2) |
|
|
24 | (1) |
|
What Linux Helps You Manage |
|
|
25 | (3) |
|
Disks, CD-ROMs, and DVD-ROMs |
|
|
25 | (1) |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
28 | (3) |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
29 | (2) |
|
|
31 | (10) |
|
Following the Installation Steps |
|
|
32 | (2) |
|
Checking Your PC's Hardware |
|
|
34 | (1) |
|
Trying the Ubuntu Live CD |
|
|
35 | (1) |
|
Burning CDs or DVDs from ISO Images |
|
|
36 | (1) |
|
Setting Aside Space for Linux |
|
|
37 | (2) |
|
Resizing a Windows partition with partition Magic |
|
|
37 | (1) |
|
Resizing a partition with GParted |
|
|
38 | (1) |
|
|
39 | (2) |
|
Troubleshooting and Configuring Linux |
|
|
41 | (20) |
|
Using Text mode Installation |
|
|
42 | (1) |
|
|
42 | (2) |
|
Resolving Other Installation Problems |
|
|
44 | (6) |
|
Using knoppix boot commands |
|
|
44 | (3) |
|
The fatal signal II error |
|
|
47 | (1) |
|
Getting around the PC reboot problem |
|
|
47 | (1) |
|
Using Linux kernel boot options |
|
|
47 | (3) |
|
|
50 | (4) |
|
Managing DVDs and CD-ROMs |
|
|
54 | (1) |
|
Installing Other Software |
|
|
54 | (7) |
|
Installing software in Debian, MEPIS, and Ubuntu |
|
|
55 | (1) |
|
Installing software in Fedora |
|
|
56 | (2) |
|
Installing software in SUSE |
|
|
58 | (1) |
|
Installing software in Xandros |
|
|
58 | (3) |
|
|
61 | (10) |
|
|
61 | (3) |
|
|
64 | (4) |
|
|
65 | (1) |
|
Understanding shell commands |
|
|
66 | (1) |
|
Trying a few Linux commands |
|
|
66 | (2) |
|
|
68 | (3) |
|
|
71 | (98) |
|
|
73 | (10) |
|
Getting to Know the Features of GNOME |
|
|
74 | (7) |
|
|
75 | (1) |
|
|
76 | (1) |
|
|
77 | (1) |
|
|
77 | (2) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
81 | (1) |
|
Introducing the GNOME Bottom panel |
|
|
81 | (2) |
|
|
83 | (10) |
|
Getting to know the features of KDE |
|
|
83 | (7) |
|
|
84 | (1) |
|
|
85 | (1) |
|
|
86 | (1) |
|
|
87 | (3) |
|
Configuring the KDE Bottom Panel |
|
|
90 | (1) |
|
Configuring the KDE Desktop |
|
|
91 | (2) |
|
|
93 | (22) |
|
Opening Terminal Windows and Virtual Consoles |
|
|
93 | (1) |
|
|
94 | (8) |
|
Understanding the syntax of shell commands |
|
|
94 | (2) |
|
|
96 | (1) |
|
Controlling command input and output |
|
|
96 | (3) |
|
Typing less with automatic command completion |
|
|
99 | (1) |
|
Going wild with asterisks and question marks |
|
|
99 | (2) |
|
Repeating previously typed commands |
|
|
101 | (1) |
|
Discovering and Using Linux Commands |
|
|
102 | (10) |
|
Becoming root (superuser) |
|
|
106 | (1) |
|
|
107 | (1) |
|
Working with date and time |
|
|
108 | (1) |
|
|
109 | (3) |
|
|
112 | (3) |
|
Navigating the Linux File System |
|
|
115 | (24) |
|
Understanding the Linux File system |
|
|
115 | (5) |
|
|
120 | (8) |
|
|
120 | (3) |
|
|
123 | (5) |
|
Navigating the File system with Linux Commands |
|
|
128 | (11) |
|
Commands for directory navigation |
|
|
128 | (1) |
|
Commands for directory listings and permissions |
|
|
129 | (3) |
|
Commands for changing permissions and ownerships |
|
|
132 | (1) |
|
Commands for working with files |
|
|
133 | (1) |
|
Commands for working with directories |
|
|
134 | (1) |
|
Commands for finding files |
|
|
135 | (1) |
|
Commands for mounting and unmounting |
|
|
136 | (1) |
|
Commands for checking disk-spce usage |
|
|
137 | (2) |
|
Introducing Linux Applications |
|
|
139 | (18) |
|
Taking stock of Linux Applications |
|
|
139 | (5) |
|
Office Applications and Tools |
|
|
144 | (6) |
|
Open office.org office suite |
|
|
145 | (4) |
|
|
149 | (1) |
|
|
150 | (1) |
|
|
150 | (4) |
|
|
151 | (1) |
|
|
152 | (1) |
|
|
152 | (1) |
|
|
153 | (1) |
|
|
154 | (3) |
|
|
154 | (2) |
|
|
156 | (1) |
|
|
157 | (12) |
|
|
157 | (2) |
|
Text Editing with ed and vi |
|
|
159 | (10) |
|
|
159 | (4) |
|
|
163 | (6) |
|
|
169 | (58) |
|
Connecting to the Internet |
|
|
171 | (20) |
|
Understanding the Internet |
|
|
171 | (1) |
|
Deciding how to Connect to the Internet |
|
|
172 | (2) |
|
|
174 | (6) |
|
|
175 | (1) |
|
DSL alphabet soup: ADSL, IDSL, SDSL |
|
|
176 | (1) |
|
|
177 | (3) |
|
Connecting with a cable Modem |
|
|
180 | (5) |
|
|
180 | (2) |
|
Typical cable modem setup |
|
|
182 | (3) |
|
Setting Up Dialup Networking |
|
|
185 | (6) |
|
|
187 | (1) |
|
Setting up and activating a PPP connection |
|
|
188 | (1) |
|
Configuring CHAP and PAP authentication |
|
|
189 | (2) |
|
Setting Up a Local Area Network |
|
|
191 | (12) |
|
|
191 | (5) |
|
|
193 | (1) |
|
Internet services and port numbers |
|
|
194 | (2) |
|
Setting Up an Ethernet LAN |
|
|
196 | (3) |
|
|
196 | (1) |
|
|
197 | (2) |
|
Configuring TCP/IP Networking |
|
|
199 | (1) |
|
Connecting Your LAN to the Internet |
|
|
200 | (3) |
|
|
203 | (10) |
|
Understanding Wireless Ethernet Networks |
|
|
203 | (4) |
|
Understanding infrastructure and ad hoc modes |
|
|
205 | (1) |
|
Understanding Wired Equivalent Privacy (WEP) |
|
|
205 | (2) |
|
Setting Up the Wireless Hardware |
|
|
207 | (1) |
|
Configuring the Wireless Access Point |
|
|
208 | (1) |
|
Configuring Wireless Networking |
|
|
209 | (4) |
|
|
213 | (14) |
|
Discovering the TCP/IP Configuration Files |
|
|
213 | (4) |
|
|
214 | (1) |
|
|
214 | (1) |
|
|
215 | (1) |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
Checking Out TCP/IP Networks |
|
|
217 | (5) |
|
Checking the network interfaces |
|
|
217 | (1) |
|
Checking the IP routing table |
|
|
218 | (1) |
|
Checking connectivity to a host |
|
|
219 | (1) |
|
|
220 | (1) |
|
|
221 | (1) |
|
|
222 | (1) |
|
Configuring Networks at Boot Time |
|
|
222 | (5) |
|
|
227 | (56) |
|
E-Mailing and IMing in Linux |
|
|
229 | (16) |
|
Understanding Electronic mail |
|
|
230 | (2) |
|
|
230 | (1) |
|
Mail message enhancements |
|
|
231 | (1) |
|
Taking Stock of Mail Readers and IM Clients in Linux |
|
|
232 | (1) |
|
|
233 | (9) |
|
|
233 | (3) |
|
|
236 | (5) |
|
|
241 | (1) |
|
Instant Messaging in Linux |
|
|
242 | (3) |
|
|
242 | (1) |
|
|
243 | (2) |
|
|
245 | (12) |
|
Discovering the World Wide Web |
|
|
245 | (5) |
|
Like a giant Spider's web |
|
|
246 | (1) |
|
|
247 | (2) |
|
Web servers and Web browsers |
|
|
249 | (1) |
|
|
250 | (7) |
|
Checking out Web browsers for Linux |
|
|
251 | (1) |
|
Introducing Firfox's interface |
|
|
251 | (3) |
|
|
254 | (1) |
|
Surfing the Net with firefox |
|
|
255 | (2) |
|
Reading Newsgroups and RSS Feeds |
|
|
257 | (16) |
|
|
257 | (5) |
|
|
258 | (1) |
|
Top-level newsgroup categories |
|
|
259 | (1) |
|
|
260 | (2) |
|
Reading Newsgroups from Your ISP |
|
|
262 | (6) |
|
Taking stock of newsreaders |
|
|
262 | (1) |
|
Reading newsgroups with Thunderbird |
|
|
263 | (2) |
|
|
265 | (1) |
|
|
266 | (1) |
|
|
267 | (1) |
|
Reading and Searching Newsgroups at Web Sites |
|
|
268 | (1) |
|
|
269 | (4) |
|
|
270 | (1) |
|
|
271 | (2) |
|
|
273 | (10) |
|
Using Graphical FTP clients |
|
|
273 | (6) |
|
|
274 | (2) |
|
|
276 | (1) |
|
Using a Web browser as an FTP client |
|
|
277 | (2) |
|
Using the Command-Line FTP Client |
|
|
279 | (4) |
|
|
283 | (98) |
|
Introducing Basic System Administration |
|
|
285 | (40) |
|
Taking Stock of System Administration Tasks |
|
|
285 | (2) |
|
Introducing Some GUI Sysadmin Tools |
|
|
287 | (5) |
|
GUI sysadmin tools in Debian |
|
|
287 | (1) |
|
GUI sysadmin tools in Fedora |
|
|
287 | (1) |
|
GUI sysadmin tools in Knoppix |
|
|
288 | (1) |
|
GUI sysadmin tools in MEPIS |
|
|
289 | (1) |
|
GUI sysadmin tools in SUSE |
|
|
290 | (1) |
|
GUI sysadmin tools in Ubuntu |
|
|
291 | (1) |
|
GUI sysadmin tools in Xandros |
|
|
292 | (1) |
|
|
292 | (4) |
|
|
294 | (1) |
|
Becoming root for the GUI utilities |
|
|
294 | (1) |
|
Recovering from a forgotten root password |
|
|
295 | (1) |
|
Understanding How Linux Boots |
|
|
296 | (6) |
|
Understanding the init process |
|
|
296 | (2) |
|
Examining the /etc/inittab file |
|
|
298 | (1) |
|
Trying a new run level with the init command |
|
|
299 | (1) |
|
Understanding the Linux startup scripts |
|
|
300 | (1) |
|
Manually starting and stopping servers |
|
|
301 | (1) |
|
Automatically starting servers at system startup |
|
|
301 | (1) |
|
Taking Stock of Linux System Configuration Files |
|
|
302 | (3) |
|
Monitoring System Performance |
|
|
305 | (5) |
|
|
305 | (2) |
|
|
307 | (1) |
|
|
307 | (2) |
|
Checking disk performance and disk usage |
|
|
309 | (1) |
|
Viewing System Information via the /proc File System |
|
|
310 | (3) |
|
Understanding Linux Devices |
|
|
313 | (3) |
|
|
314 | (1) |
|
Persistent device naming with udev |
|
|
315 | (1) |
|
Managing Loadable Driver Modules |
|
|
316 | (3) |
|
Loading and unloading modules |
|
|
316 | (1) |
|
Using the /etc/modprobe.conf file |
|
|
317 | (2) |
|
|
319 | (6) |
|
|
319 | (2) |
|
|
321 | (4) |
|
Managing Users and Groups |
|
|
325 | (10) |
|
|
325 | (4) |
|
Using a GUI user manager to add user accounts |
|
|
326 | (2) |
|
Using commands to manage user accounts |
|
|
328 | (1) |
|
Understanding the /etc/passwd file |
|
|
329 | (1) |
|
|
330 | (1) |
|
Exploring the User Environment |
|
|
331 | (2) |
|
Changing User and Group Ownership of Files |
|
|
333 | (2) |
|
|
335 | (24) |
|
Exploring the Linux File System |
|
|
335 | (7) |
|
Understanding the file-system hierarchy |
|
|
336 | (3) |
|
Mounting a device on the file system |
|
|
339 | (1) |
|
Examining the /etc/fstab file |
|
|
340 | (2) |
|
|
342 | (2) |
|
Exporting a file system with NFS |
|
|
343 | (1) |
|
Mounting an NFS file system |
|
|
343 | (1) |
|
Backing Up and Restoring Files |
|
|
344 | (7) |
|
Selecting a backup strategy and media |
|
|
344 | (1) |
|
Commercial backup utilities for Linux |
|
|
345 | (1) |
|
Using the tape archiver---tar |
|
|
346 | (5) |
|
Accessing a DOS/Windows file System |
|
|
351 | (3) |
|
Mounting a DOS/Windows disk partition |
|
|
351 | (1) |
|
Mounting DOS floppy disks |
|
|
352 | (2) |
|
Mounting an NTFS partition |
|
|
354 | (1) |
|
|
354 | (5) |
|
|
355 | (1) |
|
Understanding the /etc/mtools.conf file |
|
|
355 | (1) |
|
Understanding the mtools commands |
|
|
356 | (3) |
|
Installing and Updating Applications |
|
|
359 | (22) |
|
|
359 | (7) |
|
|
360 | (1) |
|
Understanding RPM filenames |
|
|
361 | (1) |
|
|
361 | (2) |
|
|
363 | (1) |
|
|
364 | (1) |
|
|
364 | (1) |
|
|
365 | (1) |
|
|
366 | (4) |
|
Understanding DEB filenames |
|
|
366 | (1) |
|
|
367 | (2) |
|
|
369 | (1) |
|
Using APT to manage DEB packages |
|
|
369 | (1) |
|
Building Software Packages from Source Files |
|
|
370 | (5) |
|
Downloding and unpacking the software |
|
|
370 | (2) |
|
Building the software from source files |
|
|
372 | (2) |
|
|
374 | (1) |
|
Updating Linux Applications Online |
|
|
375 | (6) |
|
Keeping Debian, MEPIS, and ubuntu updated with APT |
|
|
375 | (1) |
|
Updating Fedora Applications |
|
|
376 | (3) |
|
|
379 | (1) |
|
|
379 | (2) |
|
|
381 | (64) |
|
Introducing Linux Security |
|
|
383 | (16) |
|
Why Worry about security? |
|
|
383 | (1) |
|
Establishing a Security Framework |
|
|
384 | (5) |
|
Determining business requirements for security |
|
|
385 | (1) |
|
|
386 | (2) |
|
Establishing a security policy |
|
|
388 | (1) |
|
Implementing security solutions (mitigation) |
|
|
388 | (1) |
|
|
389 | (1) |
|
|
389 | (3) |
|
Understanding the host security issues |
|
|
390 | (1) |
|
Understanding network security issues |
|
|
391 | (1) |
|
Delving into computer security Terminology |
|
|
392 | (4) |
|
Keeping Up with Security News and Updates |
|
|
396 | (3) |
|
|
399 | (30) |
|
|
399 | (3) |
|
|
400 | (1) |
|
Pluggable authentication modules (PAMs) |
|
|
401 | (1) |
|
Protecting Files and Directories |
|
|
402 | (4) |
|
Viewing ownerships and permissions |
|
|
402 | (1) |
|
|
402 | (1) |
|
Changing file permissions |
|
|
403 | (1) |
|
Setting default permission |
|
|
404 | (1) |
|
Checking for set user ID permission |
|
|
405 | (1) |
|
Encrypting and Signing Files with GnulPG |
|
|
406 | (7) |
|
Understanding public key encryption |
|
|
406 | (1) |
|
Understanding digital signatures |
|
|
407 | (2) |
|
|
409 | (4) |
|
Monitoring System Security |
|
|
413 | (1) |
|
Securing Internet Services |
|
|
413 | (3) |
|
Turning off standalone services |
|
|
414 | (1) |
|
Configuring the Internet super server |
|
|
415 | (1) |
|
Configuring TCP wrapper security |
|
|
415 | (1) |
|
Using Secure Shell (SSH) for Remote Logins |
|
|
416 | (3) |
|
Setting Up Simple Firewalls |
|
|
419 | (10) |
|
|
422 | (1) |
|
Enabling packet filtering on your Linux system |
|
|
423 | (6) |
|
Performing Computer Security |
|
|
429 | (16) |
|
Understanding Security Audits |
|
|
429 | (2) |
|
Non-technical aspects of security audits |
|
|
430 | (1) |
|
Technical aspects of security audits |
|
|
431 | (1) |
|
Implementing a Security Test Mithodology |
|
|
431 | (9) |
|
Some common computer vulnerabilities |
|
|
432 | (2) |
|
|
434 | (3) |
|
|
437 | (3) |
|
Exploring Security Testing Tools |
|
|
440 | (5) |
|
|
440 | (1) |
|
|
441 | (4) |
|
|
445 | (72) |
|
Managing Internet services |
|
|
447 | (18) |
|
Understanding Internet Services |
|
|
447 | (6) |
|
|
448 | (3) |
|
Internet services and port numbers |
|
|
451 | (2) |
|
Using the Internet Super Server |
|
|
453 | (4) |
|
|
453 | (2) |
|
|
455 | (2) |
|
Running Standalone Servers |
|
|
457 | (8) |
|
Starting and stopping servers manually |
|
|
457 | (1) |
|
Starting servers automatically at boot time |
|
|
458 | (7) |
|
Managing Mail and News Servers |
|
|
465 | (22) |
|
Installing the Mail Server |
|
|
465 | (12) |
|
|
466 | (1) |
|
|
466 | (1) |
|
The mail-delivery mechanism |
|
|
467 | (1) |
|
The sendmail configuration file |
|
|
467 | (6) |
|
|
473 | (1) |
|
|
474 | (2) |
|
|
476 | (1) |
|
|
477 | (1) |
|
Installing the INN Server |
|
|
477 | (1) |
|
Configuring and Starting the INN Server |
|
|
478 | (6) |
|
|
479 | (4) |
|
|
483 | (1) |
|
|
483 | (1) |
|
|
484 | (1) |
|
Setting Up Local Newsgroups |
|
|
484 | (3) |
|
Defining a newsgroup hierarchy |
|
|
485 | (1) |
|
Updating configuration files |
|
|
485 | (1) |
|
|
486 | (1) |
|
|
486 | (1) |
|
|
487 | (20) |
|
Understanding Domain Name System (DNS) |
|
|
487 | (7) |
|
|
487 | (2) |
|
Discovering hierachical domain names |
|
|
489 | (1) |
|
Exploring Berkeley Internet Name Domain(BIND) |
|
|
490 | (4) |
|
|
494 | (13) |
|
|
494 | (1) |
|
Configuring a caching name server |
|
|
495 | (10) |
|
Configuring a primary name server |
|
|
505 | (2) |
|
Working with Samba and NFS |
|
|
507 | (10) |
|
|
507 | (4) |
|
Exporting a file system with NFS |
|
|
508 | (2) |
|
Mounting an NFS file system |
|
|
510 | (1) |
|
Setting Up a Windows Server Using Samba |
|
|
511 | (6) |
|
|
512 | (1) |
|
|
513 | (1) |
|
|
514 | (1) |
|
Finding out more about Samba |
|
|
515 | (2) |
|
|
517 | |
|
|
519 | |
|
An Overview of programming |
|
|
519 | |
|
A simplified view of a computer |
|
|
520 | |
|
Role of the operating system |
|
|
521 | |
|
Basics of computer programming |
|
|
522 | |
|
Exploring the Software-Development Tools in Linux |
|
|
523 | |
|
|
524 | |
|
|
529 | |
|
|
535 | |
|
Understanding the Implications of GNU License |
|
|
541 | |
|
The GNU General Public License |
|
|
542 | |
|
The GNU Lesser General Public License |
|
|
543 | |
|
Introductory Shell Scripting |
|
|
545 | |
|
Trying Out simple Shell Scripts |
|
|
545 | |
|
Exploring the Basics of Shell Scripting |
|
|
547 | |
|
|
547 | |
|
|
548 | |
|
|
549 | |
|
Exploring bash's built-in commands |
|
|
552 | |
|
|
557 | |
|
|
557 | |
|
|
559 | |
|
|
561 | |
|
Calculating the 13th digit |
|
|
562 | (1) |
|
Adding the 13th digit to the other 12 |
|
|
562 | (1) |
|
|
563 | (1) |
|
Final Notes on shell Scripting |
|
|
564 | (1) |
|
|
565 | (18) |
|
|
565 | (1) |
|
DVD Installation Instructions |
|
|
566 | (5) |
|
|
567 | (3) |
|
|
570 | (1) |
|
What You'll Find on the DVD |
|
|
571 | (2) |
|
|
573 | (10) |
Index |
|
583 | |