You are previewing Fedora® 11 and Red Hat® Enterprise Linux® Bible.
O'Reilly logo
Fedora® 11 and Red Hat® Enterprise Linux® Bible

Book Description

The leading Fedora book-over a quarter of a million copies sold of previous editions!

What better way to learn Fedora 11 than with the leading Fedora book from the best-selling Linux author, Christopher Negus with Eric Foster Johnson? Whether you're new to Linux or an advanced user, this power-packed guide is loaded with what you need. Install, run, and manage the latest version of Fedora and Red Hat Enterprise Linux-then polish your system administration skills and get up to speed on the very latest in networking, desktop, and server enhancements.

Master the Linux shell, file system, and text editor; how to set up users and automate system tasks; and much more in over a thousand pages of step-by-step instruction. Boot the full DVD of Fedora 11, including almost all binary code packages, or do a Live Install of the CD for rescuing, troubleshooting, or installing Fedora.

  • Fedora is a free, open source Linux operating system sponsored by Red Hat as an open source community project; the technological innovations from the Fedora Project are then implemented in Red Hat's commercial offering, Red Hat Enterprise Linux

  • Covers step-by-step instructions for making Linux installation simple and painless; how to take advantage of the desktop interface (including coverage of AIGLX); and how to use the Linux shell, file system, and text editor

  • Also covers setting up users; automating system tasks; backing up and restoring files; dealing with the latest security issues and threats; using and customizing the desktop menus, icons, window manager, and xterm; and how to create and publish formatted documents with Linux applications

  • The DVD and CD that come with the book include Fedora Linux 11 and an official Fedora 11 LiveCD (bootable and installable)

This is the book you need to succeed with Fedora 11 and Red Hat Enterprise Linux.

Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Table of Contents

  1. Copyright
  2. About the Authors
  3. Credits
  4. Acknowledgments
  5. Preface
    1. Who Are You?
    2. This Book's Learn-Through-Tasks Approach
    3. What You Need
    4. Fedora 11 and Red Hat Enterprise Linux Bible Improvements
    5. Conventions Used in This Book
    6. How This Book Is Organized
      1. Part I: Getting Started in Fedora and RHEL
      2. Part II: Using Fedora and RHEL
      3. Part III: Administering Fedora and RHEL
      4. Part IV: Fedora and RHEL Network and Server Setup
      5. Appendixes
    7. About the Companion Media
    8. Reach Out
  6. I. Getting Started in Fedora and RHEL
    1. 1. An Overview of Fedora and Red Hat Enterprise Linux
      1. 1.1. Introducing Fedora 11 and Red Hat Enterprise Linux
      2. 1.2. What Is Linux?
      3. 1.3. Linux's Roots in UNIX
      4. 1.4. Common Linux Features
      5. 1.5. Primary Advantages of Linux
      6. 1.6. What Are Red Hat Enterprise Linux and Fedora?
        1. 1.6.1. Red Hat forms the Fedora Project
        2. 1.6.2. Red Hat shifts to Red Hat Enterprise Linux
        3. 1.6.3. Choosing between Fedora and Enterprise
      7. 1.7. Why Choose Fedora or Red Hat Enterprise Linux?
      8. 1.8. Moving Toward Red Hat Enterprise Linux 6
      9. 1.9. New Features in Fedora 11
        1. 1.9.1. Faster Boot Times
        2. 1.9.2. PackageKit Software Management
        3. 1.9.3. Many desktop improvements
        4. 1.9.4. Firefox 3.5 Web browser
        5. 1.9.5. Ext4 file systems
        6. 1.9.6. Improved IPv6 support
        7. 1.9.7. Encrypted file systems
        8. 1.9.8. RPMfusion.org third-party software repository
        9. 1.9.9. Identity management with freeIPA
        10. 1.9.10. NetworkManager
        11. 1.9.11. Many security improvements
        12. 1.9.12. Getting custom Fedora spins
        13. 1.9.13. Creating your own spins
        14. 1.9.14. Firewall Configuration
      10. 1.10. The Culture of Free Software
      11. 1.11. Summary
    2. 2. Installing Fedora
      1. 2.1. Understanding Fedora Installation Media
      2. 2.2. Using the Fedora 11 Live CD
      3. 2.3. Quick Installation
      4. 2.4. Detailed Installation Instructions
        1. 2.4.1. Installing Fedora 11
        2. 2.4.2. Choosing an installation method
          1. 2.4.2.1. Install or upgrade?
          2. 2.4.2.2. From DVD, network, or hard disk?
        3. 2.4.3. Choosing computer hardware
        4. 2.4.4. Preparing for installation using the live CD
          1. 2.4.4.1. Display hardware information
          2. 2.4.4.2. Test your hardware
        5. 2.4.5. Beginning the installation
        6. 2.4.6. Running Fedora Firstboot
        7. 2.4.7. Going forward after installation
      5. 2.5. Special Installation Procedures
        1. 2.5.1. Alternatives for starting installation
          1. 2.5.1.1. Booting installation from hard disk
          2. 2.5.1.2. Booting installation from a USB device
          3. 2.5.1.3. Booting installation using PXE
        2. 2.5.2. Installing from other media
          1. 2.5.2.1. Beginning installation
          2. 2.5.2.2. Setting up an HTTP, FTP, or NFS install server
          3. 2.5.2.3. Configuring an install server using files
          4. 2.5.2.4. Configuring an install server using disk images
          5. 2.5.2.5. NFS server
          6. 2.5.2.6. Web server
          7. 2.5.2.7. FTP server
          8. 2.5.2.8. Hard disk install
        3. 2.5.3. Starting a VNC install
        4. 2.5.4. Performing a kickstart installation
          1. 2.5.4.1. Creating the kickstart file
          2. 2.5.4.2. Installing the kickstart file
          3. 2.5.4.3. Booting a kickstart installation
      6. 2.6. Special Installation Topics
        1. 2.6.1. Setting up to dual-boot Linux and Windows
          1. 2.6.1.1. Resizing your Windows partitions
          2. 2.6.1.2. Using Windows partitions from Linux
        2. 2.6.2. Partitioning your disks
          1. 2.6.2.1. Partitioning with Disk Setup during installation
          2. 2.6.2.2. Reasons for partitioning
          3. 2.6.2.3. Deleting, adding, and editing partitions
          4. 2.6.2.4. Partitioning with fdisk
          5. 2.6.2.5. Tips for creating partitions
        3. 2.6.3. Using the GRUB boot loader
          1. 2.6.3.1. Temporarily changing boot options
          2. 2.6.3.2. Permanently changing boot options
          3. 2.6.3.3. Adding a new GRUB boot image
      7. 2.7. Troubleshooting Installation
      8. 2.8. Spinning Your Own Fedora Install or Live Media
      9. 2.9. Summary
    3. 3. Getting Started with the Desktop
      1. 3.1. Logging in to Fedora or RHEL
      2. 3.2. Getting Familiar with the Desktop
        1. 3.2.1.
          1. 3.2.1.1. Touring your desktop
          2. 3.2.1.2. Step 1: Checking out your home folder
          3. 3.2.1.3. Step 2: Change some preferences
          4. 3.2.1.4. Step 3: Configure your panels
          5. 3.2.1.5. Tips for configuring your desktop
      3. 3.3. Using the GNOME Desktop
        1. 3.3.1. Using the Metacity window manager
        2. 3.3.2. Using the GNOME panels
          1. 3.3.2.1. Use the Applications and System menus
          2. 3.3.2.2. Adding an applet
          3. 3.3.2.3. Adding another panel
          4. 3.3.2.4. Adding an application launcher
          5. 3.3.2.5. Adding a drawer
          6. 3.3.2.6. Changing panel properties
        3. 3.3.3. Using the Nautilus file manager
        4. 3.3.4. Changing GNOME preferences
        5. 3.3.5. Managing removable media
        6. 3.3.6. Trying other GNOME applications
          1. 3.3.6.1. Taking notes with Tomboy
          2. 3.3.6.2. Checking Your Network from GNOME
        7. 3.3.7. Switching to another user
        8. 3.3.8. Exiting GNOME
      4. 3.4. Switching Desktop Environments
      5. 3.5. Using the KDE Desktop
        1. 3.5.1. New Features in KDE 4.2
        2. 3.5.2. Starting with KDE
        3. 3.5.3. KDE desktop basics
          1. 3.5.3.1. Getting around the desktop
          2. 3.5.3.2. Using the mouse
          3. 3.5.3.3. Using keystrokes
        4. 3.5.4. Managing files with Dolphin and Konqueror File Managers
          1. 3.5.4.1. Working with files
          2. 3.5.4.2. Searching for files with Dolphin and kfind
          3. 3.5.4.3. Creating new files and folders
        5. 3.5.5. Using the Konqueror browser features
        6. 3.5.6. Configuring Konqueror and Dolphin options
        7. 3.5.7. Managing windows
          1. 3.5.7.1. Using the taskbar
          2. 3.5.7.2. Moving windows
          3. 3.5.7.3. Resizing windows
          4. 3.5.7.4. Pinning windows on top or bottom
          5. 3.5.7.5. Using virtual desktops
        8. 3.5.8. Configuring the desktop
        9. 3.5.9. Adding widgets
          1. 3.5.9.1. Adding widgets to the panel
          2. 3.5.9.2. Adding widgets to the desktop
      6. 3.6. Running 3D Accelerated Desktop Effects
      7. 3.7. Using the Xfce Desktop Environment
      8. 3.8. Troubleshooting Your Desktop
        1. 3.8.1. GUI doesn't work at start-up
        2. 3.8.2. Tuning your video card and monitor
          1. 3.8.2.1. Running the Display Settings window
          2. 3.8.2.2. Understanding the xorg.conf file
        3. 3.8.3. Configuring video cards for gaming
        4. 3.8.4. Getting more information
      9. 3.9. Summary
    4. 4. Using Linux Commands
      1. 4.1. The Shell Interface
        1. 4.1.1. Checking your login session
        2. 4.1.2. Checking directories and permissions
        3. 4.1.3. Checking system activity
        4. 4.1.4. Exiting the shell
      2. 4.2. Understanding the Shell
      3. 4.3. Using the Shell in Linux
        1. 4.3.1. Locating commands
        2. 4.3.2. Rerunning commands
          1. 4.3.2.1. Command-line editing
          2. 4.3.2.2. Command-line completion
          3. 4.3.2.3. Command-line recall
        3. 4.3.3. Connecting and expanding commands
          1. 4.3.3.1. Piping commands
          2. 4.3.3.2. Sequential commands
          3. 4.3.3.3. Background commands
          4. 4.3.3.4. Expanding commands
          5. 4.3.3.5. Expanding arithmetic expressions
          6. 4.3.3.6. Expanding variables
        4. 4.3.4. Using shell environment variables
          1. 4.3.4.1. Common shell environment variables
          2. 4.3.4.2. Setting your own environment variables
        5. 4.3.5. Managing background and foreground processes
          1. 4.3.5.1. Starting background processes
          2. 4.3.5.2. Moving commands to the foreground and background
        6. 4.3.6. Configuring your shell
          1. 4.3.6.1. Setting your prompt
          2. 4.3.6.2. Adding environment variables
          3. 4.3.6.3. Adding aliases
      4. 4.4. Working with the Linux File System
        1. 4.4.1. Creating files and directories
          1. 4.4.1.1. Using metacharacters and operators
          2. 4.4.1.2. Using file-matching metacharacters
          3. 4.4.1.3. Using file-redirection metacharacters
          4. 4.4.1.4. Understanding file permissions
        2. 4.4.2. Moving, copying, and deleting files
      5. 4.5. Using the vi Text Editor
        1. 4.5.1. Starting with vi
        2. 4.5.2. Moving around the file
        3. 4.5.3. Searching for text
        4. 4.5.4. Using numbers with commands
      6. 4.6. Summary
  7. II. Using Fedora and RHEL
    1. 5. Accessing and Running Applications
      1. 5.1. Getting and Installing Software Packages
        1. 5.1.1. Downloading and installing applications with yum
          1. 5.1.1.1. Configuring yum (/etc/yum.conf)
          2. 5.1.1.2. Adding yum repositories (/etc/yum.repos.d/)
          3. 5.1.1.3. Running yum to download and install RPMs
          4. 5.1.1.4. Using yum to install packages locally
          5. 5.1.1.5. Using yum for listing packages
          6. 5.1.1.6. Using yum-utils package
        2. 5.1.2. Getting Fedora and RHEL software updates
          1. 5.1.2.1. Getting alerted to available updates
          2. 5.1.2.2. Getting manual updates with yum
      2. 5.2. Managing RPM Packages
        1. 5.2.1. Using the PackageKit Add/Remove window
        2. 5.2.2. Using the rpm command
          1. 5.2.2.1. Verifying rpm package integrity
          2. 5.2.2.2. Installing with rpm
          3. 5.2.2.3. Upgrading packages with rpm
          4. 5.2.2.4. Freshening packages with rpm
          5. 5.2.2.5. Removing packages with rpm
          6. 5.2.2.6. Querying packages with rpm
          7. 5.2.2.7. Verifying installed packages with rpm
      3. 5.3. Using Software in Different Formats
        1. 5.3.1. Understanding software package names and formats
        2. 5.3.2. Using different archive and document formats
        3. 5.3.3. Building and installing from source code
          1. 5.3.3.1. Installed Software in SRPM format
          2. 5.3.3.2. Installing software in tar.gz or tar.bz2 formats
      4. 5.4. Using Fedora or RHEL to Run Applications
        1. 5.4.1. Finding common desktop applications in Linux
        2. 5.4.2. Investigating your desktop
        3. 5.4.3. Starting applications from a menu
        4. 5.4.4. Starting applications from a Run Application window
        5. 5.4.5. Starting applications from a Terminal window
        6. 5.4.6. Running remote X applications
          1. 5.4.6.1. Traditional method to run remote X applications
          2. 5.4.6.2. Launching a remote X application
          3. 5.4.6.3. Using SSH to run remote X applications
      5. 5.5. Running Microsoft Windows, DOS, and Macintosh Applications
        1. 5.5.1. Running DOS applications
          1. 5.5.1.1. Using mtools
          2. 5.5.1.2. Using DOSBox
        2. 5.5.2. Running Microsoft Windows applications in Linux
          1. 5.5.2.1. Running Windows Applications with WINE
          2. 5.5.2.2. Assigning drive letters
          3. 5.5.2.3. Installing applications in WINE
          4. 5.5.2.4. Launching applications
          5. 5.5.2.5. Tuning and configuring WINE
          6. 5.5.2.6. Finding more Windows applications for WINE
      6. 5.6. Running Applications in Virtual Environments
        1. 5.6.1. Running applications virtually with Xen
          1. 5.6.1.1. Before installing Xen
          2. 5.6.1.2. Installing Xen
          3. 5.6.1.3. Installing a guest operating system
        2. 5.6.2. Running applications virtually with KVM and QEMU
      7. 5.7. Summary
    2. 6. Publishing with Fedora and RHEL
      1. 6.1. Desktop Publishing in Linux
        1. 6.1.1. Using Text Editors and Notepads
        2. 6.1.2. Using Word Processors
          1. 6.1.2.1. Using OpenOffice.org
          2. 6.1.2.2. Other Word Processors
          3. 6.1.2.3. StarOffice
          4. 6.1.2.4. AbiWord
          5. 6.1.2.5. Using KOffice
          6. 6.1.2.6. TextMaker
      2. 6.2. Using Traditional Linux Publishing Tools
        1. 6.2.1. Creating Documents in Groff or LaTeX
        2. 6.2.2. Text processing with Groff
          1. 6.2.2.1. Formatting and printing documents with Groff
          2. 6.2.2.2. Creating a man page with Groff
        3. 6.2.3. Text processing with TeX/LaTeX
          1. 6.2.3.1. Creating and formatting a LaTeX document
        4. 6.2.4. Converting documents
        5. 6.2.5. Creating DocBook documents
        6. 6.2.6. Understanding SGML and XML
          1. 6.2.6.1. Understanding DocBook
          2. 6.2.6.2. Creating DocBook documents
          3. 6.2.6.3. Converting DocBook documents
      3. 6.3. Displaying PDF Files with Adobe Acrobat Reader
      4. 6.4. Doing Page Layout with Scribus
      5. 6.5. Working with Graphics
        1. 6.5.1. Manipulating images with GIMP
        2. 6.5.2. Taking screen capturesGIMP
        3. 6.5.3. Creating vector graphic images with Inkscape
      6. 6.6. Using Scanners Driven by SANE
      7. 6.7. Web Publishing
      8. 6.8. Summary
    3. 7. Gaming in Fedora and RHEL
      1. 7.1. Jumping into Linux Gaming
      2. 7.2. Basic Linux Gaming Information
        1. 7.2.1. Where to get information on Linux gaming
        2. 7.2.2. Choosing a video card for gaming
      3. 7.3. Running Open Source Linux Games
        1. 7.3.1. GNOME games
        2. 7.3.2. KDE games
        3. 7.3.3. Adding more games from Fedora repository
          1. 7.3.3.1. Chess games
          2. 7.3.3.2. Freeciv
          3. 7.3.3.3. Starting Freeciv
          4. 7.3.3.4. Beginning with Freeciv
          5. 7.3.3.5. Building your civilization
          6. 7.3.3.6. Exploring your world
          7. 7.3.3.7. Using more controls and actions
          8. 7.3.3.8. Extreme Tuxracer
      4. 7.4. Commercial Linux Games
        1. 7.4.1. Getting Started with commercial games in Linux
        2. 7.4.2. Playing commercial Linux games
        3. 7.4.3. id Software Games
          1. 7.4.3.1. Quake III Arena
          2. 7.4.3.2. Return to Castle Wolfenstein
        4. 7.4.4. Gaming with Cedega
        5. 7.4.5. Loki Software game demos
          1. 7.4.5.1. Civilization: Call to Power
          2. 7.4.5.2. Myth II: Soulblighter
          3. 7.4.5.3. Heretic II
        6. 7.4.6. Neverwinter Nights
      5. 7.5. Summary
    4. 8. Music, Video, and Images in Linux
      1. 8.1. Understanding Multimedia and Legal Issues in Linux
      2. 8.2. Extending Freedom to Codecs
      3. 8.3. Listening to Music in Linux
        1. 8.3.1. Configuring a sound card
          1. 8.3.1.1. Sound card features
          2. 8.3.1.2. Detecting your sound card driver
          3. 8.3.1.3. Adjusting sound levels
          4. 8.3.1.4. Setting your sound card to record
        2. 8.3.2. Choosing audio players
        3. 8.3.3. Automatically playing CDs
        4. 8.3.4. Playing and managing music with Rhythmbox
        5. 8.3.5. Playing music with XMMS Audio Player
          1. 8.3.5.1. Using the Equalizer
          2. 8.3.5.2. Using the Playlist Editor
        6. 8.3.6. Using ogg123, mpg321, and play command-line players
        7. 8.3.7. Using MIDI audio players
        8. 8.3.8. Converting audio files with SoX
        9. 8.3.9. Extracting and encoding music
          1. 8.3.9.1. Extracting music CDs with Sound Juicer
          2. 8.3.9.2. Extracting and encoding music CDs from commands
        10. 8.3.10. Creating your own music CDs
          1. 8.3.10.1. Creating audio CDs with cdrecord
          2. 8.3.10.2. Creating audio and data CDs with K3b
          3. 8.3.10.3. Creating a new audio CD
          4. 8.3.10.4. Copying a CD
          5. 8.3.10.5. Burning an ISO image to CD
          6. 8.3.10.6. Creating audio and data CDs with Brasero
        11. 8.3.11. Creating CD labels with cdlabelgen
      4. 8.4. Viewing TV and Webcams
        1. 8.4.1. Watching TV with TVtime
          1. 8.4.1.1. Getting a supported TV card
          2. 8.4.1.2. Starting Tvtime
          3. 8.4.1.3. Selecting channels in TVtime
        2. 8.4.2. Video conferencing and VOIP with Ekiga
          1. 8.4.2.1. Getting a supported Webcam
          2. 8.4.2.2. Running Ekiga
        3. 8.4.3. Taking Webcam videos and snapshots with Cheese
      5. 8.5. Playing Video
        1. 8.5.1. Examining laws affecting video and Linux
        2. 8.5.2. Understanding video content types
        3. 8.5.3. Watching video with Xine
          1. 8.5.3.1. Using Xine
          2. 8.5.3.2. Creating playlists with Xine
          3. 8.5.3.3. Xine tips
        4. 8.5.4. Using Totem movie player
        5. 8.5.5. Using a Digital Camera
        6. 8.5.6. Displaying images in gThumb
        7. 8.5.7. Using your camera as a storage device
      6. 8.6. Summary
    5. 9. Using the Internet and the Web
      1. 9.1. Overview of Internet Applications and Commands
      2. 9.2. Browsing the Web
        1. 9.2.1. Understanding Web browsing
          1. 9.2.1.1. Uniform Resource Locators
          2. 9.2.1.2. Web pages
        2. 9.2.2. Browsing the Web with Firefox
        3. 9.2.3. Setting up Firefox
          1. 9.2.3.1. Setting Navigator preferences
          2. 9.2.3.2. Extending Firefox
          3. 9.2.3.3. Using plug-ins
          4. 9.2.3.4. Getting Add-ons
          5. 9.2.3.5. Changing Firefox themes
          6. 9.2.3.6. Securing Firefox
          7. 9.2.3.7. Tips for using Firefox
        4. 9.2.4. Using text-based Web browsers
      3. 9.3. Communicating with E-mail
        1. 9.3.1. E-mail basics
        2. 9.3.2. Using Evolution e-mail
          1. 9.3.2.1. Setting Evolution preferences
          2. 9.3.2.2. Receiving, composing, and sending e-mail
        3. 9.3.3. Thunderbird mail client
        4. 9.3.4. Text-based mail programs
        5. 9.3.5. Mail readers and managers
          1. 9.3.5.1. Mutt mail reader
          2. 9.3.5.2. Mail reader
      4. 9.4. Participating in Newsgroups
      5. 9.5. Instant Messaging with Pidgin
      6. 9.6. Sharing Files with BitTorrent
      7. 9.7. Using Remote Login, Copy, and Execution
        1. 9.7.1. Getting files with FTP
          1. 9.7.1.1. Using the lftp command
          2. 9.7.1.2. FTP directory commands
          3. 9.7.1.3. FTP file copying commands
          4. 9.7.1.4. FTP exiting commands
          5. 9.7.1.5. Using the ncftp command
          6. 9.7.1.6. Using ncftp
          7. 9.7.1.7. Using ncftp for background transfers
          8. 9.7.1.8. Using the gFTP window
        2. 9.7.2. Getting files with wget
          1. 9.7.2.1. Downloading a single file
          2. 9.7.2.2. Downloading a file with user name and password
          3. 9.7.2.3. Downloading a whole Web site
          4. 9.7.2.4. Continuing a download
        3. 9.7.3. Using ssh for remote login/remote execution
        4. 9.7.4. Using scp for remote file copy
        5. 9.7.5. Using the "r" commands: rlogin, rcp, and rsh
      8. 9.8. Summary
  8. III. Administering Fedora and RHEL
    1. 10. Understanding System Administration
      1. 10.1. Using the root user account
      2. 10.2. Becoming Super User (The su Command)
      3. 10.3. Learning about Administrative GUI Tools, Commands, Configuration Files, and Log Files
        1. 10.3.1. Using graphical administration tools
        2. 10.3.2. Administrative commands
        3. 10.3.3. Administrative configuration files
        4. 10.3.4. Administrative log files
        5. 10.3.5. Using other administrative logins
          1. 10.3.5.1. Understanding administrative logins
          2. 10.3.5.2. Using sudo for assigning administrative privilege
      4. 10.4. Administering Your Linux System
      5. 10.5. Configuring Hardware
        1. 10.5.1. Checking your hardware
        2. 10.5.2. Managing Hardware with HAL
        3. 10.5.3. Reconfiguring hardware with kudzu
        4. 10.5.4. Configuring modules
          1. 10.5.4.1. Listing loaded modules
          2. 10.5.4.2. Loading modules
          3. 10.5.4.3. Removing modules
      6. 10.6. Managing File Systems and Disk Space
        1. 10.6.1. Mounting file systems
          1. 10.6.1.1. Supported file systems
          2. 10.6.1.2. Using the fstab file to define mountable file systems
          3. 10.6.1.3. Using the mount command to mount file systems
          4. 10.6.1.4. Mounting removable media
          5. 10.6.1.5. Mounting CD or DVD images
          6. 10.6.1.6. Using the umount command to unmount a file system
        2. 10.6.2. Using the mkfs command to create a file system
        3. 10.6.3. Adding a hard disk
        4. 10.6.4. Using RAID disks
        5. 10.6.5. Checking system space
          1. 10.6.5.1. Checking Disk Space with Disk Usage Analyzer
          2. 10.6.5.2. Displaying system space with df
          3. 10.6.5.3. Checking disk usage with du
          4. 10.6.5.4. Finding disk consumption with find
      7. 10.7. Monitoring System Performance
        1. 10.7.1. Watch computer usage with System Monitor
        2. 10.7.2. Monitoring CPU usage with top
        3. 10.7.3. Monitoring power usage on laptop computers
          1. 10.7.3.1. Using the Power Manager applet
          2. 10.7.3.2. Using apm to enter suspend mode
          3. 10.7.3.3. Using acpi_listen to monitor ACPI events
      8. 10.8. Fixing Your System with the FirstAidKit
      9. 10.9. Choosing Software Alternatives
        1. 10.9.1. Selecting Java alternatives
        2. 10.9.2. Selecting mail and printing alternatives
        3. 10.9.3. Using mail alternatives
      10. 10.10. Using Security Enhanced Linux
      11. 10.11. Understanding Security Enhanced Linux
        1. 10.11.1. Types and roles in SELinux
        2. 10.11.2. Users in SELinux
        3. 10.11.3. Policies in SELinux
        4. 10.11.4. Tools in SELinux
      12. 10.12. Using SELinux in Fedora and RHEL
        1. 10.12.1. Getting SELinux
        2. 10.12.2. Checking whether SELinux is on
        3. 10.12.3. Checking SELinux status
      13. 10.13. Learning More about SELinux
      14. 10.14. Summary
    2. 11. Setting Up and Supporting Users
      1. 11.1. Creating User Accounts
        1. 11.1.1. Adding users with useradd
        2. 11.1.2. Adding users with User Manager
      2. 11.2. Setting User Defaults
        1. 11.2.1. Supplying initial login scripts
        2. 11.2.2. Supplying initial .bashrc and .bash_profile files
        3. 11.2.3. Supplying an initial .tcshrc file
        4. 11.2.4. Configuring system-wide shell options
          1. 11.2.4.1. Configuring system-wide bash options
          2. 11.2.4.2. Configuring system-wide tcsh options
        5. 11.2.5. Setting system profiles
        6. 11.2.6. Adding user accounts to servers
      3. 11.3. Creating Portable Desktops
      4. 11.4. Providing Support to Users
        1. 11.4.1. Creating a technical support mailbox
        2. 11.4.2. Resetting a user's password
      5. 11.5. Modifying Accounts
        1. 11.5.1. Modifying user accounts with usermod
        2. 11.5.2. Modifying user accounts with User Manager
      6. 11.6. Deleting User Accounts
        1. 11.6.1. Deleting user accounts with userdel
        2. 11.6.2. Deleting user accounts with User Manager
      7. 11.7. Checking Disk Quotas
        1. 11.7.1. Using quota to check disk usage
          1. 11.7.1.1. Editing the /etc/fstab file
          2. 11.7.1.2. Creating quota files
          3. 11.7.1.3. Creating a quota startup script
          4. 11.7.1.4. Turn on the quota startup script
          5. 11.7.1.5. Creating quota rules
          6. 11.7.1.6. Updating quota settings
          7. 11.7.1.7. Checking quotas
        2. 11.7.2. Using du to check disk use
        3. 11.7.3. Removing temp files automatically
      8. 11.8. Sending Mail to All Users
      9. 11.9. Summary
    3. 12. Automating System Tasks
      1. 12.1. Understanding Shell Scripts
        1. 12.1.1. Executing and debugging shell scripts
        2. 12.1.2. Understanding shell variables
          1. 12.1.2.1. Special shell variables
          2. 12.1.2.2. Parameter expansion in bash
        3. 12.1.3. Performing arithmetic in shell scripts
        4. 12.1.4. Using programming constructs in shell scripts
          1. 12.1.4.1. The "if...then" statements
          2. 12.1.4.2. The case command
          3. 12.1.4.3. The "for...do" loop
          4. 12.1.4.4. The "while...do" and "until...do" loops
        5. 12.1.5. Some useful external programs
          1. 12.1.5.1. The general regular expression parser (grep)
          2. 12.1.5.2. Remove sections of lines of text (cut)
          3. 12.1.5.3. Translate or delete characters (tr)
          4. 12.1.5.4. The Stream Editor (sed)
        6. 12.1.6. Trying some simple shell scripts
          1. 12.1.6.1. A simple telephone list
          2. 12.1.6.2. A simple backup script
      2. 12.2. System Initialization
        1. 12.2.1. Starting init
        2. 12.2.2. The inittab file
      3. 12.3. System Startup and Shutdown
        1. 12.3.1. Starting run-level scripts
        2. 12.3.2. Understanding run-level scripts
        3. 12.3.3. Understanding what startup scripts do
        4. 12.3.4. Changing run-level script behavior
        5. 12.3.5. Reorganizing or removing run-level scripts
        6. 12.3.6. Adding run-level scripts
        7. 12.3.7. Managing xinetd services
        8. 12.3.8. Manipulating run levels
          1. 12.3.8.1. Determining the current run level
          2. 12.3.8.2. Changing to a shutdown run level
      4. 12.4. Scheduling System Tasks
        1. 12.4.1. Using at.allow and at.deny
        2. 12.4.2. Specifying when jobs are run
        3. 12.4.3. Submitting scheduled jobs
        4. 12.4.4. Viewing scheduled jobs
        5. 12.4.5. Deleting scheduled jobs
        6. 12.4.6. Using the batch command
        7. 12.4.7. Using the cron facility
          1. 12.4.7.1. Modifying scheduled tasks with crontab
          2. 12.4.7.2. Understanding cron files
      5. 12.5. Summary
    4. 13. Backing Up and Restoring Files
      1. 13.1. Making a Simple Backup Archive
      2. 13.2. Doing a Simple Backup with rsync
        1. 13.2.1. Backing up files locally
        2. 13.2.2. Backing up files remotely
      3. 13.3. Choosing Backup Tools
      4. 13.4. Selecting a Backup Strategy
        1. 13.4.1. Full backup
        2. 13.4.2. Incremental backup
        3. 13.4.3. Disk mirroring
        4. 13.4.4. Network backup
      5. 13.5. Selecting a Backup Medium
        1. 13.5.1. Magnetic tape
          1. 13.5.1.1. Using ftape tools for magnetic tape
          2. 13.5.1.2. Testing the magnetic tape drive
        2. 13.5.2. Writable CD drives
          1. 13.5.2.1. Getting cdrecord for writable CDs
          2. 13.5.2.2. Writing to CDs
        3. 13.5.3. Writable DVD drives
        4. 13.5.4. Writing CD or DVDs with growisofs
      6. 13.6. Backing Up to a Hard Drive
      7. 13.7. Backing Up Files with dump
        1. 13.7.1. Creating a backup with dump
        2. 13.7.2. Understanding dump levels
      8. 13.8. Automating Backups with cron
      9. 13.9. Restoring Backed-Up Files
        1. 13.9.1. Restoring an entire file system
        2. 13.9.2. Recovering individual files
      10. 13.10. Configuring Amanda for Network Backups
        1. 13.10.1. Creating Amanda directories
        2. 13.10.2. Creating the amanda.conf file
        3. 13.10.3. Creating a disklist file
        4. 13.10.4. Adding Amanda network services
          1. 13.10.4.1. On the amanda server
          2. 13.10.4.2. On each amanda client
        5. 13.10.5. Performing an Amanda backup
      11. 13.11. Using the pax Archiving Tool
      12. 13.12. Summary
    5. 14. Computer Security Issues
      1. 14.1. Linux Security Checklist
      2. 14.2. Using Password Protection
        1. 14.2.1. Choosing good passwords
        2. 14.2.2. Using a shadow password file
          1. 14.2.2.1. Breaking encrypted passwords
          2. 14.2.2.2. Checking for the shadow password file
      3. 14.3. Securing Linux with the iptables Firewall
        1. 14.3.1. Using the Firewall Configuration window
        2. 14.3.2. Configuring an iptables firewall
          1. 14.3.2.1. Turning on iptables
          2. 14.3.2.2. Creating iptables firewall rules
          3. 14.3.2.3. Example 1: Firewall for shared Internet connection (plus servers)
          4. 14.3.2.4. Example 2: Firewall for shared Internet connection (no servers)
          5. 14.3.2.5. Example 3: Firewall for single Linux system with Internet connection
          6. 14.3.2.6. Understanding iptables
          7. 14.3.2.7. Allowing FTP and IRC services through an iptables firewall
          8. 14.3.2.8. Using iptables to do SNAT or IP Masquerading
          9. 14.3.2.9. Using iptables as a transparent proxy
          10. 14.3.2.10. Using iptables to do port forwarding
          11. 14.3.2.11. Using logging with iptables
          12. 14.3.2.12. Enhancing your iptables firewall
      4. 14.4. Controlling Access to Services with TCP Wrappers
      5. 14.5. Checking Log Files
        1. 14.5.1. Understanding the rsyslogd service
          1. 14.5.1.1. Redirecting logs to a loghost with rsyslogd
          2. 14.5.1.2. Understanding the messages logfile
        2. 14.5.2. Tracking log messages with logwatch
      6. 14.6. Using the Secure Shell Package
        1. 14.6.1. Starting the SSH service
        2. 14.6.2. Using the ssh, sftp, and scp commands
        3. 14.6.3. Using ssh, scp, and sftp without passwords
      7. 14.7. Securing Linux Servers
        1. 14.7.1. Understanding attack techniques
        2. 14.7.2. Protecting against denial-of-service attacks
          1. 14.7.2.1. Mailbombing
          2. 14.7.2.2. Blocking mail with Procmail
          3. 14.7.2.3. Blocking mail with sendmail
          4. 14.7.2.4. Spam relaying
          5. 14.7.2.5. Smurf amplification attack
        3. 14.7.3. Protecting against distributed DOS attacks
        4. 14.7.4. Protecting against intrusion attacks
          1. 14.7.4.1. Evaluating access to network services
          2. 14.7.4.2. Disabling network services
        5. 14.7.5. Securing servers with SELinux
        6. 14.7.6. Protecting Web servers with certificates and encryption
          1. 14.7.6.1. Symmetric cryptography
          2. 14.7.6.2. Public-key cryptography
          3. 14.7.6.3. Secure Sockets Layer
          4. 14.7.6.4. Creating SSL certificates
          5. 14.7.6.5. Using third-party certificate signers
          6. 14.7.6.6. Creating a Certificate Service Request
          7. 14.7.6.7. Getting the CSR signed
          8. 14.7.6.8. Creating self-signed certificates
          9. 14.7.6.9. Restarting your Web server
          10. 14.7.6.10. Troubleshooting your certificates
      8. 14.8. Managing Identities with FreeIPA
        1. 14.8.1. Setting up the FreeIPA Server
        2. 14.8.2. Setting up FreeIPA Clients
      9. 14.9. Summary
  9. IV. Fedora and RHEL Network and Server Setup
    1. 15. Setting Up Network Connections and LANs
      1. 15.1. Connecting to the Network with NetworkManager
        1. 15.1.1. Connecting to a wireless network
        2. 15.1.2. Connecting to a wired network
        3. 15.1.3. Setting up a virtual private network connection
      2. 15.2. Understanding Local Area Networks
        1. 15.2.1. Planning, getting, and setting up LAN hardware
          1. 15.2.1.1. LAN topologies
          2. 15.2.1.2. LAN equipment
          3. 15.2.1.3. LAN equipment setup
        2. 15.2.2. Configuring TCP/IP for your LAN
          1. 15.2.2.1. Identifying other computers (hosts and DNS)
          2. 15.2.2.2. Adding Windows computers to your LAN
      3. 15.3. Setting Up a Wireless LAN
        1. 15.3.1. Understanding wireless networks
        2. 15.3.2. Choosing wireless hardware
          1. 15.3.2.1. Selecting wireless LAN cards
          2. 15.3.2.2. Selecting antennas
          3. 15.3.2.3. Using indoor antennas
          4. 15.3.2.4. Using outdoor antennas
        3. 15.3.3. Getting wireless drivers
        4. 15.3.4. Installing wireless Linux software
        5. 15.3.5. Configuring the wireless LAN
          1. 15.3.5.1. Configuring the wireless interface
          2. 15.3.5.2. Activating the wireless interfaces
          3. 15.3.5.3. Checking your wireless connection
        6. 15.3.6. Testing distances
        7. 15.3.7. Setting wireless extensions
      4. 15.4. Understanding Internet Protocol Addresses
        1. 15.4.1. IP address classes
        2. 15.4.2. Understanding netmasks
        3. 15.4.3. Classless Inter-Domain Routing
        4. 15.4.4. Getting IP addresses
      5. 15.5. Troubleshooting Your LAN
        1. 15.5.1. Did Linux find your Ethernet driver at boot time?
        2. 15.5.2. Can you reach another computer on the LAN?
        3. 15.5.3. Is your Ethernet connection up?
        4. 15.5.4. Troubleshooting a wireless LAN
          1. 15.5.4.1. Checking wireless settings
          2. 15.5.4.2. Checking TCP/IP
          3. 15.5.4.3. Adapting to poor reception
          4. 15.5.4.4. Use debugging tools
        5. 15.5.5. Watching LAN traffic with Wireshark
          1. 15.5.5.1. Starting Wireshark
          2. 15.5.5.2. Capturing Ethernet data
          3. 15.5.5.3. Interpreting captured Ethernet data
      6. 15.6. Summary
    2. 16. Connecting to the Internet
      1. 16.1. Understanding How the Internet Is Structured
        1. 16.1.1. Internet domains
        2. 16.1.2. Hostnames and IP addresses
        3. 16.1.3. Routing
        4. 16.1.4. Proxies
      2. 16.2. Using Dial-Up Connections to the Internet
        1. 16.2.1. Getting information
        2. 16.2.2. Setting up dial-up PPP
        3. 16.2.3. Creating a dial-up connection with the Network Configuration window
        4. 16.2.4. Launching your PPP connection
        5. 16.2.5. Launching your PPP connection on demand
        6. 16.2.6. Checking your PPP connection
          1. 16.2.6.1. Checking that your modem was detected
          2. 16.2.6.2. Checking that your PPP interface is working
          3. 16.2.6.3. Checking the default route
          4. 16.2.6.4. Checking that the name servers are set
          5. 16.2.6.5. Checking the chap-secrets or pap-secrets file
          6. 16.2.6.6. Looking at the ifcfg file
          7. 16.2.6.7. Running debugging
      3. 16.3. Connecting Your LAN to the Internet
      4. 16.4. Setting Up Linux as a Router
        1. 16.4.1. Configuring the Linux router
          1. 16.4.1.1. Selecting IP addresses
          2. 16.4.1.2. Enable forwarding and masquerading
        2. 16.4.2. Configuring network clients
      5. 16.5. Configuring a Virtual Private Network Connection
        1. 16.5.1. Understanding IPsec
        2. 16.5.2. Using IPsec protocols
        3. 16.5.3. Using IPsec in Fedora or RHEL
        4. 16.5.4. Configuring an OpenVPN Server
          1. 16.5.4.1. Decisions before configuring OpenVPN
          2. 16.5.4.2. Create a public key infrastructure
          3. 16.5.4.3. Create OpenVPN server configuration
          4. 16.5.4.4. Create OpenVPN client configuration
      6. 16.6. Setting Up Linux as a Proxy Server
        1. 16.6.1. Starting the squid daemon
        2. 16.6.2. Using a simple squid.conf file
        3. 16.6.3. Modifying the Squid configuration file
          1. 16.6.3.1. Configuring access control in squid.conf
          2. 16.6.3.2. Configuring caching in squid.conf
          3. 16.6.3.3. Configuring port numbers in squid.conf
        4. 16.6.4. Debugging Squid
          1. 16.6.4.1. Checking the squid.conf file
          2. 16.6.4.2. Checking Squid log files
          3. 16.6.4.3. Using the top command
      7. 16.7. Setting Up Proxy Clients
        1. 16.7.1. Configuring Firefox to use a proxy
        2. 16.7.2. Configuring other browsers to use a proxy
      8. 16.8. Summary
    3. 17. Setting Up a Print Server
      1. 17.1. Common UNIX Printing Service
      2. 17.2. Setting Up Printers
        1. 17.2.1. Using the Printer Configuration window
          1. 17.2.1.1. Configuring local printers
          2. 17.2.1.2. Adding a local printer
          3. 17.2.1.3. Editing a local printer
          4. 17.2.1.4. Configuring remote printers
          5. 17.2.1.5. Adding a remote CUPS printer
          6. 17.2.1.6. Adding a remote UNIX printer
          7. 17.2.1.7. Adding a Windows (SMB) printer
          8. 17.2.1.8. Adding a JetDirect printer
        2. 17.2.2. Using Web-based CUPS administration
        3. 17.2.3. Configuring the CUPS server (cupsd.conf)
        4. 17.2.4. Configuring CUPS printer options
      3. 17.3. Using Printing Commands
        1. 17.3.1. Using lpr to print
        2. 17.3.2. Listing status with lpc
        3. 17.3.3. Removing print jobs with lprm
      4. 17.4. Configuring Print Servers
        1. 17.4.1. Configuring a shared CUPS printer
        2. 17.4.2. Configuring a shared Samba printer
          1. 17.4.2.1. Understanding smb.conf for printing
      5. 17.5. Summary
    4. 18. Setting Up a File Server
      1. 18.1. Goals of Setting Up a File Server
      2. 18.2. Setting Up an NFS File Server
        1. 18.2.1. Sharing NFS file systems
          1. 18.2.1.1. Using the NFS Server Configuration window
          2. 18.2.1.2. Configuring the /etc/exports file
          3. 18.2.1.3. Hostnames in /etc/exports
          4. 18.2.1.4. Access options in /etc/exports
          5. 18.2.1.5. User mapping options in /etc/exports
          6. 18.2.1.6. Exporting the shared file systems
          7. 18.2.1.7. Starting the nfsd daemons
        2. 18.2.2. Using NFS file systems
          1. 18.2.2.1. Manually mounting an NFS file system
          2. 18.2.2.2. Automatically mounting an NFS file system
          3. 18.2.2.3. Mounting noauto file systems
          4. 18.2.2.4. Using mount options
          5. 18.2.2.5. Using autofs to mount NFS file systems on demand
        3. 18.2.3. Unmounting NFS file systems
        4. 18.2.4. Other cool things to do with NFS
      3. 18.3. Setting Up a Samba File Server
        1. 18.3.1. Getting and installing Samba
        2. 18.3.2. Configuring a simple Samba server
        3. 18.3.3. Configuring Samba with SWAT
          1. 18.3.3.1. Turning on SWAT
          2. 18.3.3.2. Starting with SWAT
          3. 18.3.3.3. Creating global Samba settings in SWAT
          4. 18.3.3.4. Base options
          5. 18.3.3.5. Security options
          6. 18.3.3.6. Logging options
          7. 18.3.3.7. Printing options
          8. 18.3.3.8. Browse options
          9. 18.3.3.9. WINS options
          10. 18.3.3.10. Configuring shared directories with SWAT
          11. 18.3.3.11. Checking your Samba setup with SWAT
        4. 18.3.4. Working with Samba files and commands
          1. 18.3.4.1. Editing the smb.conf file
          2. 18.3.4.2. Adding Samba users
          3. 18.3.4.3. Starting the Samba service
          4. 18.3.4.4. Testing your Samba permissions
          5. 18.3.4.5. Checking the status of shared directories
        5. 18.3.5. Setting up Samba clients
          1. 18.3.5.1. Using Samba shared directories from Linux
          2. 18.3.5.2. Using Samba from Nautilus
          3. 18.3.5.3. Mounting Samba directories in Linux
          4. 18.3.5.4. Using Samba shared directories from Windows
        6. 18.3.6. Troubleshooting your Samba server
          1. 18.3.6.1. Basic networking in place?
          2. 18.3.6.2. Samba service running?
          3. 18.3.6.3. Firewall or SELinux restricting access?
          4. 18.3.6.4. User passwords working?
      4. 18.4. Summary
    5. 19. Setting Up a Mail Server
      1. 19.1. Introducing SMTP and sendmail
      2. 19.2. Installing and Running sendmail
        1. 19.2.1. Starting sendmail
        2. 19.2.2. Other programs
        3. 19.2.3. Logging performed by sendmail
      3. 19.3. Configuring sendmail
        1. 19.3.1. Getting a domain name
        2. 19.3.2. Configuring basic sendmail settings (sendmail.mc)
        3. 19.3.3. Defining outgoing mail access
        4. 19.3.4. Configuring virtual servers
        5. 19.3.5. Configuring virtual users
        6. 19.3.6. Adding user accounts
        7. 19.3.7. Starting sendmail and generating database files
        8. 19.3.8. Redirecting mail
          1. 19.3.8.1. The .forward file
          2. 19.3.8.2. The aliases file
      4. 19.4. Introducing Postfix
      5. 19.5. Stopping Spam with SpamAssassin
        1. 19.5.1. Using SpamAssassin
        2. 19.5.2. Setting up SpamAssassin on your mail server
        3. 19.5.3. Setting e-mail readers to filter spam
      6. 19.6. Getting Mail from the Server (POP3 or IMAPv4)
        1. 19.6.1. Accessing mailboxes in Linux
        2. 19.6.2. Configuring IMAPv4 and POP3 with dovecot
      7. 19.7. Getting Mail from Your Browser with SquirrelMail
      8. 19.8. Administering a Mailing List with mailman
      9. 19.9. Summary
    6. 20. Setting Up an FTP Server
      1. 20.1. Understanding FTP Servers
        1. 20.1.1. Attributes of Ftp servers
        2. 20.1.2. FTP user types
      2. 20.2. Using the Very Secure FTP Server
        1. 20.2.1. Quick-starting vsFTPd
        2. 20.2.2. Securing vsFTPd
        3. 20.2.3. Configuring vsFTPd
          1. 20.2.3.1. User accounts
          2. 20.2.3.2. Setting FTP access
          3. 20.2.3.3. Downloading files
          4. 20.2.3.4. Uploading (writing) files from local users
          5. 20.2.3.5. Uploading (writing) files from anonymous users
          6. 20.2.3.6. Adding message files
          7. 20.2.3.7. Logging vsFTPd activities
          8. 20.2.3.8. Setting timeouts
          9. 20.2.3.9. Navigating a vsFTPd site
          10. 20.2.3.10. Setting up vsFTPd behind a firewall
      3. 20.3. Getting More Information about FTP Servers
      4. 20.4. Summary
    7. 21. Setting Up a Web Server
      1. 21.1. Introduction to Web Servers
        1. 21.1.1. The Apache Web server
        2. 21.1.2. Other Web servers available for Fedora and RHEL
      2. 21.2. Quickstarting the Apache Web Server
      3. 21.3. Configuring the Apache Server
        1. 21.3.1. Configuring the Web server (httpd.conf)
          1. 21.3.1.1. Setting the global environment
          2. 21.3.1.2. Revealing subcomponents
          3. 21.3.1.3. Setting the server root directory
          4. 21.3.1.4. Storing the server's PID file
          5. 21.3.1.5. Configuring timeout values
          6. 21.3.1.6. Setting the number of server processes
          7. 21.3.1.7. Binding to specific addresses
          8. 21.3.1.8. Selecting modules in httpd.conf
          9. 21.3.1.9. Including module-specific configuration files
          10. 21.3.1.10. Choosing the server's user and group
          11. 21.3.1.11. Setting the main server's configuration
          12. 21.3.1.12. Setting an e-mail address
          13. 21.3.1.13. Setting the server name
          14. 21.3.1.14. Setting canonical names
          15. 21.3.1.15. Identifying HTTP content directories
          16. 21.3.1.16. Setting access options and overrides
          17. 21.3.1.17. Identifying user directories
          18. 21.3.1.18. Setting default index files for directories
          19. 21.3.1.19. Setting directory-access control
          20. 21.3.1.20. Setting MIME-type defaults
          21. 21.3.1.21. Setting hostname lookups
          22. 21.3.1.22. Configuring HTTP logging
          23. 21.3.1.23. Adding a signature
          24. 21.3.1.24. Aliasing relocated content
          25. 21.3.1.25. Redirecting requests for old content
          26. 21.3.1.26. Defining indexing
          27. 21.3.1.27. Defining encoding and language
          28. 21.3.1.28. Choosing character sets
          29. 21.3.1.29. Adding MIME types and handlers
          30. 21.3.1.30. Defining actions and headers
          31. 21.3.1.31. Customizing error responses
          32. 21.3.1.32. Setting responses to browsers
          33. 21.3.1.33. Enabling proxy and caching services
          34. 21.3.1.34. Configuring virtual hosting
        2. 21.3.2. Configuring modules and related services (/etc/httpd/conf.d/*.conf)
      4. 21.4. Starting and Stopping the Server
      5. 21.5. Monitoring Server Activities
        1. 21.5.1. Displaying server information
        2. 21.5.2. Displaying server status
        3. 21.5.3. Further security of server-info and server-status
        4. 21.5.4. Logging errors
        5. 21.5.5. Logging hits
        6. 21.5.6. Analyzing Web-server traffic
      6. 21.6. Summary
    8. 22. Setting Up an LDAP Address Book Server
      1. 22.1. Understanding LDAP
        1. 22.1.1. Defining information in schemas
        2. 22.1.2. Structuring your LDAP directories
      2. 22.2. Setting Up the OpenLDAP Server
        1. 22.2.1. Installing OpenLDAP packages
        2. 22.2.2. Configuring the OpenLDAP server (slapd.conf)
        3. 22.2.3. Starting the OpenLDAP service
      3. 22.3. Setting Up the Address Book
      4. 22.4. More Ways to Configure LDAP
      5. 22.5. Accessing an LDAP Address Book from Thunderbird
      6. 22.6. Summary
    9. 23. Setting Up a DHCP Server
      1. 23.1. Using Dynamic Host Configuration Protocol
      2. 23.2. Setting Up a DHCP Server
        1. 23.2.1. Opening your firewall and SELinux for DHCP
        2. 23.2.2. Configuring the /etc/dhcp/dhcpd.conf file
          1. 23.2.2.1. Expanding the dhcpd.conf file
          2. 23.2.2.2. Adding options
        3. 23.2.3. Starting the DHCP server
      3. 23.3. Setting Up a DHCP Client
      4. 23.4. Summary
    10. 24. Setting Up a MySQL Database Server
      1. 24.1. Finding MySQL Packages
      2. 24.2. Getting More MySQL Packages
      3. 24.3. Configuring the MySQL Server
        1. 24.3.1. Using mysql user/group accounts
        2. 24.3.2. Adding administrative users
        3. 24.3.3. Setting MySQL options
          1. 24.3.3.1. Creating the my.cnf configuration file
          2. 24.3.3.2. Choosing options
          3. 24.3.3.3. Checking options
        4. 24.3.4. Using sample my.cnf files
      4. 24.4. Starting the MySQL Server
      5. 24.5. Checking That MySQL Server Is Working
      6. 24.6. Working with MySQL Databases
        1. 24.6.1. Starting the mysql command
        2. 24.6.2. Creating a database with mysql
        3. 24.6.3. Adding data to a MySQL database table
          1. 24.6.3.1. Manually entering data
          2. 24.6.3.2. Loading data from a file
      7. 24.7. Understanding MySQL Tables
      8. 24.8. Displaying MySQL Databases
        1. 24.8.1. Displaying all or selected records
        2. 24.8.2. Displaying selected columns
        3. 24.8.3. Sorting data
      9. 24.9. Making Changes to Tables and Records
        1. 24.9.1. Altering the structure of MySQL tables
        2. 24.9.2. Updating and deleting MySQL records
      10. 24.10. Adding and Removing User Access
        1. 24.10.1. Adding users and granting access
        2. 24.10.2. Revoking access
      11. 24.11. Backing Up Databases
      12. 24.12. Checking and Fixing Databases
      13. 24.13. Summary
    11. 25. Making Servers Public with DNS
      1. 25.1. Determining Goals for Your Server
        1. 25.1.1. Using a hosting service
      2. 25.2. Connecting a Public Server
        1. 25.2.1. Choosing an ISP
          1. 25.2.1.1. Checking Terms of Service
          2. 25.2.1.2. Getting static IP addresses
          3. 25.2.1.3. Choosing a connection speed
        2. 25.2.2. Getting a domain name
          1. 25.2.2.1. Checking domain name availability
          2. 25.2.2.2. Reserving a domain name
      3. 25.3. Configuring Your Public Server
        1. 25.3.1. Configuring networking
        2. 25.3.2. Configuring servers
        3. 25.3.3. Managing security
          1. 25.3.3.1. Opening your firewall
          2. 25.3.3.2. Enabling SELinux
          3. 25.3.3.3. Checking logs and system files
          4. 25.3.3.4. Keeping up with updates
      4. 25.4. Setting Up a Domain Name System Server
        1. 25.4.1. Understanding DNS
          1. 25.4.1.1. Understanding authoritative zones
          2. 25.4.1.2. Understanding DNS risks
          3. 25.4.1.3. Understanding BIND
        2. 25.4.2. DNS name server example
        3. 25.4.3. Quick-starting a DNS server
          1. 25.4.3.1. Identifying your DNS servers
          2. 25.4.3.2. Creating DNS configuration files (named.conf and var/named)
          3. 25.4.3.3. Editing named.conf
          4. 25.4.3.4. Setting up the zone files (inside)
          5. 25.4.3.5. Setting up the zone files (outside)
          6. 25.4.3.6. Setting up the zone files (reverse lookup)
          7. 25.4.3.7. Starting the named (DNS) daemon
        4. 25.4.4. Checking that DNS is working
      5. 25.5. Getting More Information about BIND
      6. 25.6. Summary
    12. 26. Integrating Fedora with Apple Macs
      1. 26.1. Looking Inside Mac OS X
      2. 26.2. Using Network Services from Mac OS X
        1. 26.2.1. Using AppleTalk (netatalk) from Mac OS X
        2. 26.2.2. Using AppleTalk from Mac OS 8 or OS 9
        3. 26.2.3. Using Mac, Windows, and Linux servers (Samba)
        4. 26.2.4. Sharing X applications
      3. 26.3. Configuring an AppleTalk Server in Linux
        1. 26.3.1. Before you start using netatalk
        2. 26.3.2. Setting up the netatalk server
          1. 26.3.2.1. Starting netatalk
          2. 26.3.2.2. Open firewall ports
          3. 26.3.2.3. Defining general AppleTalk server settings
          4. 26.3.2.4. Defining specific AppleTalk servers settings
          5. 26.3.2.5. Setting up users
          6. 26.3.2.6. Sharing netatalk volumes
        3. 26.3.3. Securing netatalk volumes
          1. 26.3.3.1. User-level security
          2. 26.3.3.2. Host-level security
          3. 26.3.3.3. File- and directory-level security
          4. 26.3.3.4. Understanding hidden Mac files and directories
          5. 26.3.3.5. Setting file and directory permissions
          6. 26.3.3.6. Setting Appletalk file and folder type and creator
          7. 26.3.3.7. Moving, copying, and deleting netatalk files
          8. 26.3.3.8. Sharing files with netatalk and Samba
          9. 26.3.3.9. Printer Sharing
        4. 26.3.4. Troubleshooting netatalk
      4. 26.4. Accessing NFS Servers from the Mac
        1. 26.4.1. Connecting to NFS from the Connect to Server window
        2. 26.4.2. Connecting to NFS from the command line
      5. 26.5. Installing Fedora on an Intel-based Mac
        1. 26.5.1. Before installing Fedora on your Mac
        2. 26.5.2. Installing Fedora
      6. 26.6. Summary
    13. A. About the Media
      1. A.1. Fedora Source Code
    14. B. Running Network Services
      1. B.1. Checklist for Running Networking Services
      2. B.2. Networking Service Daemons
        1. B.2.1. The xinetd super-server
        2. B.2.2. The init.d start-up scripts
      3. B.3. Choosing Alternatives
      4. B.4. Referencing Network Services
        1. B.4.1. Web server
        2. B.4.2. File servers
          1. B.4.2.1. FTP servers
          2. B.4.2.2. Samba server
          3. B.4.2.3. Netatalk server
        3. B.4.3. Login servers
        4. B.4.4. E-mail servers
        5. B.4.5. News server
        6. B.4.6. Print servers
        7. B.4.7. Network administration servers
          1. B.4.7.1. Network Time Protocol server
          2. B.4.7.2. Portmap server
          3. B.4.7.3. SWAT
          4. B.4.7.4. Arpwatch server
          5. B.4.7.5. Simple Network Management Protocol server
        8. B.4.8. Information servers
          1. B.4.8.1. Network Information System servers
          2. B.4.8.2. Dynamic Host Configuration Protocol server
          3. B.4.8.3. Lightweight Directory Access Protocol server
          4. B.4.8.4. Domain Name System server
          5. B.4.8.5. Reverse Address Resolution Protocol server
        9. B.4.9. Database services
        10. B.4.10. User services
          1. B.4.10.1. Remote execution servers
          2. B.4.10.2. Talk server
          3. B.4.10.3. Finger server
          4. B.4.10.4. Remote user identification
          5. B.4.10.5. Write-to-All server
          6. B.4.10.6. Security services
          7. B.4.10.7. System logging
          8. B.4.10.8. Virtual private network servers
          9. B.4.10.9. Proxy/caching server
      5. B.5. Network Services Reference
    15. C. Red Hat Enterprise Linux 5 Features
      1. C.1. What's in RHEL 5?
      2. C.2. What's New in RHEL 5.3?
      3. C.3. Choosing an RHEL System
      4. C.4. Getting RHEL Evaluation Subscriptions
      5. C.5. Hardware Compatibility and Commercial Software
      6. C.6. Training and Certification
      7. C.7. Documentation and Support
      8. C.8. Managing RHEL Systems
        1. C.8.1. Using Red Hat Network
        2. C.8.2. Using RHEL for high-performance computing clusters
        3. C.8.3. Using RHEL Global File System
      9. C.9. More Information on RHEL