You are previewing Fedora® 8 and Red Hat® Enterprise Linux® Bible.
O'Reilly logo
Fedora® 8 and Red Hat® Enterprise Linux® Bible

Book Description

More than a quarter of a million copies sold in previous editions!

Freedom is a feature

With Fedora's new Online Desktop, you are free to shape your desktop environment to include the services, applications, and online friends you desire. As always, Fedora's total dedication to freedom lets you draw on thousands of free software packages to create the exact desktop or server computer you need.

Fedora puts together the software (provided here on CD and DVD). This book acts as a guide to everything from playing music and writing documents to configuring many powerful Web, file, print, DHCP, and database servers.

Customize Fedora or Red Hat Enterprise Linux to:

  • Explore your computer or the Internet from GNOME®, KDE®, or Online Desktops

  • Manage and use documents, spreadsheets, presentations, music, and images

  • Try the new advanced PulseAudio sound server

  • Draw from online software repositories with Package Manager and Package Updater

  • Build an Internet server with e-mail, Web, DNS, FTP, and database services

  • Secure your computer with firewalls, password protection, and SELinux

  • Try out cutting-edge Fedora 8 features:

  • Use Codeina to get legal software to play MP3, Windows media, and other audio/video formats

  • Organize photos, music, friends, docs, and Web favorites in the new experimental Online Desktop

  • Explore the latest in KVM and QEMU virtualization and AIGLX 3D-desktop

What's on the DVD and CD-ROM?

  • Install Fedora 8 (8GB) from DVD

  • Boot Fedora 8 GNOME Live CD, and then install its contents to your hard drive

System Requirements: Please see the Preface and Appendix A for details and complete system requirements.

Open for more!

  • Check out the new Online Desktop

  • Find ten cool things to do with Fedora

  • Run a Fedora 8 quick install

Add pop and power with Online Desktop and 3D acceleration

Organizing the people, places, and things you need on your desktop is now easier with the new GNOME Online Desktop. Get organized, then pile on some bling with 3D-accelerated desktop effects.

Put friends, photos, and fun on your new Online Desktop

Your favorite people and your online favorites are totally accessible from the new GNOME Online Desktop.

Play with 3D desktop animations Continued improvements in 3D software let you rotate workspaces on a 3D cube, choose 3D minimize effects, and set 3D wobble effects.

Table of Contents

  1. Copyright
  2. About the Author
  3. Credits
  4. Preface
    1. Who Are You?
    2. This Book's Learn-Through-Tasks Approach
    3. What You Need
    4. Fedora 8 and Red Hat Enterprise Linux Bible Improvements
    5. Conventions Used in This Book
    6. How This Book Is Organized
      1. Part I: Getting Started in Fedora and RHEL
      2. Part II: Using Fedora and RHEL
      3. Part III: Administering Fedora and RHEL
      4. Part IV: Fedora and RHEL Network and Server Setup
      5. Appendixes
    7. About the Companion Media
    8. About the Companion Web Site
    9. Reach Out
  5. Acknowledgments
  6. I. Getting Started in Fedora and RHEL
    1. 1. An Overview of Fedora and Red Hat Enterprise Linux
      1. 1.1. Introducing Fedora 8 and Red Hat Enterprise Linux
      2. 1.2. What Is Linux?
      3. 1.3. Linux's Roots in UNIX
      4. 1.4. Common Linux Features
      5. 1.5. Primary Advantages of Linux
      6. 1.6. What Are Red Hat Enterprise Linux and Fedora?
        1. 1.6.1. Red Hat forms the Fedora Project
        2. 1.6.2. Red Hat shifts to Red Hat Enterprise Linux
        3. 1.6.3. Choosing between Fedora and Enterprise
      7. 1.7. Why Choose Fedora or Red Hat Enterprise Linux?
      8. 1.8. New Features in Fedora 8
        1. 1.8.1. Getting custom Fedora spins
        2. 1.8.2. Creating your own spins
        3. 1.8.3. The GNOME Online Desktop
        4. 1.8.4. Infinity look-and-feel and Nodoka theme
        5. 1.8.5. PulseAudio sound system
        6. 1.8.6. Codeina utility for getting codecs
        7. 1.8.7. Package Manager
        8. 1.8.8. IcedTea Java environment
        9. 1.8.9. Firewall Configuration
      9. 1.9. The Culture of Free Software
      10. 1.10. Summary
    2. 2. Installing Fedora
      1. 2.1. Understanding Fedora Installation Media
      2. 2.2. Using the Fedora 8 Live CD
      3. 2.3. Quick Installation
      4. 2.4. Detailed Installation Instructions
        1. 2.4.1. Installing Fedora 8
        2. 2.4.2. Choosing an installation method
          1. 2.4.2.1. Install or upgrade?
          2. 2.4.2.2. From DVD, network, or hard disk?
        3. 2.4.3. Choosing computer hardware
        4. 2.4.4. Preparing for installation using the live CD
          1. 2.4.4.1. Display hardware information
          2. 2.4.4.2. Test your hardware
        5. 2.4.5. Beginning the installation
        6. 2.4.6. Running Fedora Setup Agent
        7. 2.4.7. Going forward after installation
      5. 2.5. Special Installation Procedures
        1. 2.5.1. Alternatives for starting installation
          1. 2.5.1.1. Booting installation from hard disk
          2. 2.5.1.2. Booting installation from a USB device
          3. 2.5.1.3. Booting installation using PXE
        2. 2.5.2. Installing from other media
          1. 2.5.2.1. Beginning installation
          2. 2.5.2.2. Setting up an HTTP, FTP, or NFS install server
            1. 2.5.2.2.1. Configuring an install server using files
            2. 2.5.2.2.2. Configuring an install server using disk images
            3. 2.5.2.2.3. NFS server
            4. 2.5.2.2.4. Web server
            5. 2.5.2.2.5. FTP server
            6. 2.5.2.2.6. Hard disk install
        3. 2.5.3. Starting a VNC install
        4. 2.5.4. Performing a kickstart installation
          1. 2.5.4.1. Creating the kickstart file
          2. 2.5.4.2. Installing the kickstart file
          3. 2.5.4.3. Booting a kickstart installation
      6. 2.6. Special Installation Topics
        1. 2.6.1. Setting up to dual-boot Linux and Windows
          1. 2.6.1.1. Resizing your Windows partitions
          2. 2.6.1.2. Using Windows partitions from Linux
        2. 2.6.2. Partitioning your disks
          1. 2.6.2.1. Partitioning with Disk Setup during installation
            1. 2.6.2.1.1. Reasons for partitioning
            2. 2.6.2.1.2. Deleting, adding, and editing partitions
          2. 2.6.2.2. Partitioning with fdisk
          3. 2.6.2.3. Tips for creating partitions
        3. 2.6.3. Using the GRUB boot loader
          1. 2.6.3.1. Temporarily changing boot options
          2. 2.6.3.2. Permanently changing boot options
          3. 2.6.3.3. Adding a new GRUB boot image
      7. 2.7. Troubleshooting Installation
      8. 2.8. Spinning Your Own Fedora Install or Live Media
      9. 2.9. Summary
    3. 3. Getting Started with the Desktop
      1. 3.1. Logging in to Fedora or RHEL
      2. 3.2. Getting Familiar with the Desktop
        1. 3.2.1. Touring your desktop
          1. 3.2.1.1. Step 1: Checking out your home folder
            1. 3.2.1.1.1. Step 2: Change some preferences
            2. 3.2.1.1.2. Step 3: Configure your panels
          2. 3.2.1.2. Tips for configuring your desktop
      3. 3.3. Using the GNOME Desktop
        1. 3.3.1. Using the Metacity window manager
        2. 3.3.2. Using the GNOME panels
          1. 3.3.2.1. Use the Applications and System menus
          2. 3.3.2.2. Adding an applet
          3. 3.3.2.3. Adding another panel
          4. 3.3.2.4. Adding an application launcher
          5. 3.3.2.5. Adding a drawer
          6. 3.3.2.6. Changing panel properties
        3. 3.3.3. Using the Nautilus file manager
        4. 3.3.4. Changing GNOME preferences
        5. 3.3.5. Managing removable media (CDs, DVD, and cameras)
        6. 3.3.6. Trying other GNOME applications
          1. 3.3.6.1. Taking notes with Tomboy
          2. 3.3.6.2. Checking Your Network from GNOME
        7. 3.3.7. Switching to another user
        8. 3.3.8. Exiting GNOME
      4. 3.4. Setting Up an Online Desktop
      5. 3.5. Switching Desktop Environments
      6. 3.6. Using the KDE Desktop
        1. 3.6.1. Starting with KDE
        2. 3.6.2. KDE desktop described
          1. 3.6.2.1. Getting around the desktop
            1. 3.6.2.1.1. Using the mouse
            2. 3.6.2.1.2. Using keystrokes
        3. 3.6.3. Managing files with the Konqueror File Manager
          1. 3.6.3.1. Working with files
          2. 3.6.3.2. Searching for files
          3. 3.6.3.3. Creating new files and folders
          4. 3.6.3.4. Using other browser features
        4. 3.6.4. Configuring Konqueror options
        5. 3.6.5. Managing windows
          1. 3.6.5.1. Using the taskbar
          2. 3.6.5.2. Uncluttering the desktop
          3. 3.6.5.3. Moving windows
          4. 3.6.5.4. Resizing windows
          5. 3.6.5.5. Pinning windows on top or bottom
          6. 3.6.5.6. Using virtual desktops
        6. 3.6.6. Configuring the desktop
          1. 3.6.6.1. Changing the display
          2. 3.6.6.2. Changing panel attributes
        7. 3.6.7. Adding application launchers and MIME types
          1. 3.6.7.1. Adding applications to the panel
          2. 3.6.7.2. Adding applications to the desktop
      7. 3.7. Running 3D Accelerated Desktop Effects
      8. 3.8. Troubleshooting Your Desktop
        1. 3.8.1. GUI doesn't work at start-up
        2. 3.8.2. Tuning your video card and monitor
          1. 3.8.2.1. Running the Display Settings window
          2. 3.8.2.2. Understanding the xorg.conf file
        3. 3.8.3. Configuring video cards for gaming
        4. 3.8.4. Getting more information
      9. 3.9. Summary
    4. 4. Using Linux Commands
      1. 4.1. The Shell Interface
        1. 4.1.1. Checking your login session
        2. 4.1.2. Checking directories and permissions
        3. 4.1.3. Checking system activity
        4. 4.1.4. Exiting the shell
      2. 4.2. Understanding the Shell
      3. 4.3. Using the Shell in Linux
        1. 4.3.1. Locating commands
        2. 4.3.2. Rerunning commands
          1. 4.3.2.1. Command-line editing
          2. 4.3.2.2. Command-line completion
          3. 4.3.2.3. Command-line recall
        3. 4.3.3. Connecting and expanding commands
          1. 4.3.3.1. Piping commands
          2. 4.3.3.2. Sequential commands
          3. 4.3.3.3. Background commands
          4. 4.3.3.4. Expanding commands
          5. 4.3.3.5. Expanding arithmetic expressions
          6. 4.3.3.6. Expanding variables
        4. 4.3.4. Using shell environment variables
          1. 4.3.4.1. Common shell environment variables
          2. 4.3.4.2. Setting your own environment variables
        5. 4.3.5. Managing background and foreground processes
          1. 4.3.5.1. Starting background processes
          2. 4.3.5.2. Moving commands to the foreground and background
        6. 4.3.6. Configuring your shell
          1. 4.3.6.1. Setting your prompt
          2. 4.3.6.2. Adding environment variables
          3. 4.3.6.3. Adding aliases
      4. 4.4. Working with the Linux File System
        1. 4.4.1. Creating files and directories
          1. 4.4.1.1. Using metacharacters and operators
          2. 4.4.1.2. Using file-matching metacharacters
          3. 4.4.1.3. Using file-redirection metacharacters
          4. 4.4.1.4. Understanding file permissions
        2. 4.4.2. Moving, copying, and deleting files
      5. 4.5. Using the vi Text Editor
        1. 4.5.1. Starting with vi
        2. 4.5.2. Moving around the file
        3. 4.5.3. Searching for text
        4. 4.5.4. Using numbers with commands
      6. 4.6. Summary
  7. II. Using Fedora and RHEL
    1. 5. Accessing and Running Applications
      1. 5.1. Getting and Installing Software Packages
        1. 5.1.1. Downloading and installing applications with yum
          1. 5.1.1.1. Configuring yum (/etc/yum.conf)
          2. 5.1.1.2. Adding yum repositories (/etc/yum.repos.d/)
          3. 5.1.1.3. Running yum to download and install RPMs
          4. 5.1.1.4. Using yum to install packages locally
          5. 5.1.1.5. Using yum for listing packages
          6. 5.1.1.6. Using yum-utils package
        2. 5.1.2. Getting Fedora and RHEL software updates
          1. 5.1.2.1. Getting alerted to available updates
          2. 5.1.2.2. Getting manual updates with yum
        3. 5.1.3. Getting updates with Package Updater
      2. 5.2. Managing RPM Packages
        1. 5.2.1. Using the Package Manager window
        2. 5.2.2. Using the rpm command
          1. 5.2.2.1. Verifying rpm package integrity
          2. 5.2.2.2. Installing with rpm
          3. 5.2.2.3. Upgrading packages with rpm
          4. 5.2.2.4. Freshening packages with rpm
          5. 5.2.2.5. Removing packages with rpm
          6. 5.2.2.6. Querying packages with rpm
          7. 5.2.2.7. Verifying installed packages with rpm
      3. 5.3. Using Software in Different Formats
        1. 5.3.1. Understanding software package names and formats
        2. 5.3.2. Using different archive and document formats
        3. 5.3.3. Building and installing from source code
          1. 5.3.3.1. Installing software in SRPM format
          2. 5.3.3.2. Installing software in tar.gz or tar.bz2 formats
      4. 5.4. Using Fedora or RHEL to Run Applications
        1. 5.4.1. Finding common desktop applications in Linux
        2. 5.4.2. Investigating your desktop
        3. 5.4.3. Starting applications from a menu
        4. 5.4.4. Starting applications from a Run Application window
        5. 5.4.5. Starting applications from a Terminal window
        6. 5.4.6. Running remote X applications
          1. 5.4.6.1. Traditional method to run remote X applications
          2. 5.4.6.2. Launching a remote X application
          3. 5.4.6.3. Using SSH to run remote X applications
      5. 5.5. Running Microsoft Windows, DOS, and Macintosh Applications
        1. 5.5.1. Running DOS applications
          1. 5.5.1.1. Using mtools
          2. 5.5.1.2. Using DOSBox
        2. 5.5.2. Running Microsoft Windows applications in Linux
          1. 5.5.2.1. Running Windows Applications in WINE
          2. 5.5.2.2. Assigning drive letters
          3. 5.5.2.3. Installing applications in WINE
          4. 5.5.2.4. Launching applications
          5. 5.5.2.5. Tuning and configuring WINE
          6. 5.5.2.6. Finding more Windows applications for WINE
        3. 5.5.3. Running Macintosh applications with ARDI Executor
      6. 5.6. Running Applications in Virtual Environments
        1. 5.6.1. Running applications virtually with Xen
          1. 5.6.1.1. Before installing Xen
          2. 5.6.1.2. Installing Xen
          3. 5.6.1.3. Rebooting to Xen
          4. 5.6.1.4. Installing a guest operating system
        2. 5.6.2. Running applications virtually with KVM and QEMU
      7. 5.7. Summary
    2. 6. Publishing with Fedora and RHEL
      1. 6.1. Using OpenOffice.org
      2. 6.2. Other Word Processors
        1. 6.2.1. Using StarOffice
        2. 6.2.2. AbiWord
        3. 6.2.3. Using KOffice
      3. 6.3. Using Traditional Linux Publishing Tools
      4. 6.4. Creating Documents in Groff or LaTeX
        1. 6.4.1. Text processing with Groff
          1. 6.4.1.1. Formatting and printing documents with Groff
          2. 6.4.1.2. Creating a man page with Groff
          3. 6.4.1.3. Creating a letter, memo, or white paper with Groff
          4. 6.4.1.4. Adding equations, tables, and pictures
        2. 6.4.2. Text processing with TeX/LaTeX
          1. 6.4.2.1. Creating and formatting a LaTeX document
          2. 6.4.2.2. Using the LyX LaTeX Editor
          3. 6.4.2.3. Printing LaTeX files
        3. 6.4.3. Converting documents
        4. 6.4.4. Creating DocBook documents
        5. 6.4.5. Understanding SGML and XML
          1. 6.4.5.1. Understanding DocBook
          2. 6.4.5.2. Creating DocBook documents
          3. 6.4.5.3. Converting DocBook documents
      5. 6.5. Printing Documents with Fedora and RHEL
        1. 6.5.1. Printing to the default printer
        2. 6.5.2. Printing from the shell
        3. 6.5.3. Checking the print queues
        4. 6.5.4. Removing print jobs
        5. 6.5.5. Checking printer status
      6. 6.6. Displaying PDF Files with Adobe Acrobat Reader
      7. 6.7. Working with Graphics
        1. 6.7.1. Manipulating images with GIMP
        2. 6.7.2. Taking screen captures
      8. 6.8. Using Scanners Driven by SANE
      9. 6.9. Summary
    3. 7. Gaming in Fedora and RHEL
      1. 7.1. Basic Linux Gaming Information
        1. 7.1.1. Where to get information on Linux gaming
        2. 7.1.2. Choosing a video card for gaming
      2. 7.2. Running Open Source Linux Games
        1. 7.2.1. GNOME games
        2. 7.2.2. KDE games
        3. 7.2.3. Adding more games from Fedora repository
          1. 7.2.3.1. Chess games
          2. 7.2.3.2. Freeciv
          3. 7.2.3.3. Starting Freeciv
            1. 7.2.3.3.1. Beginning with Freeciv
            2. 7.2.3.3.2. Building your civilization
            3. 7.2.3.3.3. Exploring your world
            4. 7.2.3.3.4. Using more controls and actions
          4. 7.2.3.4. PlanetPenguin Racer (TuxRacer)
      3. 7.3. Commercial Linux Games
        1. 7.3.1. Getting Started with commercial games in Linux
        2. 7.3.2. Playing commercial Linux games
        3. 7.3.3. id Software Games
          1. 7.3.3.1. Quake III Arena
          2. 7.3.3.2. Return to Castle Wolfenstein
        4. 7.3.4. Gaming with Cedega
        5. 7.3.5. Loki Software game demos
          1. 7.3.5.1. Civilization: Call to Power
          2. 7.3.5.2. Myth II: Soulblighter
          3. 7.3.5.3. Heretic II
        6. 7.3.6. Neverwinter Nights
      4. 7.4. Summary
    4. 8. Music, Video, and Images in Linux
      1. 8.1. Understanding Multimedia and Legal Issues in Linux
      2. 8.2. Extending Freedom to Codecs
      3. 8.3. Listening to Music in Linux
        1. 8.3.1. Configuring a sound card
          1. 8.3.1.1. Sound card features
          2. 8.3.1.2. Detecting your sound card driver
          3. 8.3.1.3. Adjusting sound card levels
          4. 8.3.1.4. Setting your sound card to record
        2. 8.3.2. Choosing audio players
        3. 8.3.3. Automatically playing CDs
        4. 8.3.4. Playing CDs with gnome-cd
        5. 8.3.5. Playing and managing music with Rhythmbox
        6. 8.3.6. Playing music with XMMS Audio Player
          1. 8.3.6.1. Using the Equalizer
          2. 8.3.6.2. Using the Playlist Editor
        7. 8.3.7. Using ogg123, mpg321, and play command-line players
        8. 8.3.8. Using MIDI audio players
        9. 8.3.9. Converting audio files with SoX
        10. 8.3.10. Extracting and encoding music
          1. 8.3.10.1. Extracting music CDs with Sound Juicer
          2. 8.3.10.2. Extracting and encoding music CDs from commands
        11. 8.3.11. Creating your own music CDs
          1. 8.3.11.1. Creating audio CDs with cdrecord
          2. 8.3.11.2. Creating audio and data CDs with K3b
            1. 8.3.11.2.1. Creating a new audio CD
            2. 8.3.11.2.2. Copying a CD
            3. 8.3.11.2.3. Burning an ISO image to CD
        12. 8.3.12. Creating CD labels with cdlabelgen
      4. 8.4. Viewing TV and Webcams
        1. 8.4.1. Watching TV with TVtime
          1. 8.4.1.1. Getting a supported TV card
          2. 8.4.1.2. Starting TVtime
          3. 8.4.1.3. Selecting channels in TVtime
        2. 8.4.2. Video conferencing and VOIP with Ekiga
          1. 8.4.2.1. Getting a supported Webcam
          2. 8.4.2.2. Running Ekiga
      5. 8.5. Playing Video
        1. 8.5.1. Examining laws affecting video and Linux
        2. 8.5.2. Understanding video content types
        3. 8.5.3. Watching video with Xine
          1. 8.5.3.1. Using Xine
          2. 8.5.3.2. Creating playlists with Xine
          3. 8.5.3.3. Xine tips
        4. 8.5.4. Using Totem movie player
      6. 8.6. Using a Digital Camera
        1. 8.6.1. Displaying images in gThumb
        2. 8.6.2. Using your camera as a storage device
      7. 8.7. Summary
    5. 9. Using the Internet and the Web
      1. 9.1. Overview of Internet Applications and Commands
      2. 9.2. Browsing the Web
        1. 9.2.1. Understanding Web browsing
          1. 9.2.1.1. Uniform Resource Locators
          2. 9.2.1.2. Web pages
        2. 9.2.2. Browsing the Web with Firefox
        3. 9.2.3. Setting up Firefox
          1. 9.2.3.1. Setting Navigator preferences
          2. 9.2.3.2. Extending Firefox
            1. 9.2.3.2.1. Using plug-ins
            2. 9.2.3.2.2. Adding extensions
          3. 9.2.3.3. Changing Firefox themes
          4. 9.2.3.4. Securing Firefox
          5. 9.2.3.5. Tips for using Firefox
        4. 9.2.4. Using text-based Web browsers
      3. 9.3. Communicating with E-mail
        1. 9.3.1. E-mail basics
        2. 9.3.2. Using Evolution e-mail
          1. 9.3.2.1. Setting Evolution preferences
          2. 9.3.2.2. Receiving, composing, and sending e-mail
        3. 9.3.3. Thunderbird mail client
        4. 9.3.4. Text-based mail programs
        5. 9.3.5. Mail readers and managers
          1. 9.3.5.1. Mutt mail reader
          2. 9.3.5.2. Pine mail reader
          3. 9.3.5.3. Mail reader
      4. 9.4. Participating in Newsgroups
      5. 9.5. Instant Messaging with Pidgin
      6. 9.6. Sharing Files with BitTorrent
      7. 9.7. Using Remote Login, Copy, and Execution
        1. 9.7.1. Using telnet for remote login
        2. 9.7.2. Copying files with FTP
          1. 9.7.2.1. Using the ftp command
            1. 9.7.2.1.1. FTP directory commands
            2. 9.7.2.1.2. FTP file copying commands
            3. 9.7.2.1.3. FTP exiting commands
          2. 9.7.2.2. Using the ncftp command
            1. 9.7.2.2.1. Using ncftp
            2. 9.7.2.2.2. Using ncftp for background transfers
          3. 9.7.2.3. Using the gFTP window
        3. 9.7.3. Getting files with wget
          1. 9.7.3.1. Downloading a single file
          2. 9.7.3.2. Downloading a file with user name and password
          3. 9.7.3.3. Downloading a whole Web site
          4. 9.7.3.4. Continuing a download
        4. 9.7.4. Using ssh for remote login/remote execution
        5. 9.7.5. Using scp for remote file copy
        6. 9.7.6. Using the "r" commands: rlogin, rcp, and rsh
      8. 9.8. Summary
  8. III. Administering Fedora and RHEL
    1. 10. Understanding System Administration
      1. 10.1. Using the root user account
      2. 10.2. Becoming Super User (The su Command)
      3. 10.3. Learning about Administrative GUI Tools, Commands, Configuration Files, and Log Files
        1. 10.3.1. Using graphical administration tools
        2. 10.3.2. Administrative commands
        3. 10.3.3. Administrative configuration files
        4. 10.3.4. Administrative log files
        5. 10.3.5. Using other administrative logins
          1. 10.3.5.1. Understanding administrative logins
          2. 10.3.5.2. Using sudo for assigning administrative privilege
      4. 10.4. Administering Your Linux System
      5. 10.5. Configuring Hardware
        1. 10.5.1. Checking your hardware
        2. 10.5.2. Reconfiguring hardware with kudzu
        3. 10.5.3. Configuring modules
          1. 10.5.3.1. Listing loaded modules
          2. 10.5.3.2. Loading modules
          3. 10.5.3.3. Removing modules
      6. 10.6. Managing File Systems and Disk Space
        1. 10.6.1. Mounting file systems
          1. 10.6.1.1. Supported file systems
          2. 10.6.1.2. Using the fstab file to define mountable file systems
          3. 10.6.1.3. Using the mount command to mount file systems
            1. 10.6.1.3.1. Mounting removable media
            2. 10.6.1.3.2. Mounting CD or DVD images
          4. 10.6.1.4. Using the umount command to unmount a file system
        2. 10.6.2. Using the mkfs command to create a file system
        3. 10.6.3. Adding a hard disk
        4. 10.6.4. Using RAID disks
        5. 10.6.5. Checking system space
          1. 10.6.5.1. Checking Disk Space with Disk Usage Analyzer
          2. 10.6.5.2. Displaying system space with df
          3. 10.6.5.3. Checking disk usage with du
          4. 10.6.5.4. Finding disk consumption with find
      7. 10.7. Monitoring System Performance
        1. 10.7.1. Watch computer usage with System Monitor
        2. 10.7.2. Monitoring CPU usage with top
        3. 10.7.3. Monitoring power usage on laptop computers
          1. 10.7.3.1. Using the Power Manager applet
          2. 10.7.3.2. Using apm to enter suspend mode
          3. 10.7.3.3. Using acpi_listen to monitor ACPI events
      8. 10.8. Choosing Software Alternatives
        1. 10.8.1. Selecting mail and printing alternatives
        2. 10.8.2. Using mail alternatives
      9. 10.9. Using Security Enhanced Linux
      10. 10.10. Understanding Security Enhanced Linux
        1. 10.10.1. Types and roles in SELinux
        2. 10.10.2. Users in SELinux
        3. 10.10.3. Policies in SELinux
        4. 10.10.4. Tools in SELinux
      11. 10.11. Using SELinux in Fedora and RHEL
        1. 10.11.1. Getting SELinux
        2. 10.11.2. Checking whether SELinux is on
        3. 10.11.3. Checking SELinux status
      12. 10.12. Learning More about SELinux
      13. 10.13. Summary
    2. 11. Setting Up and Supporting Users
      1. 11.1. Creating User Accounts
        1. 11.1.1. Adding users with useradd
        2. 11.1.2. Adding users with User Manager
      2. 11.2. Setting User Defaults
        1. 11.2.1. Supplying initial login scripts
        2. 11.2.2. Supplying initial .bashrc and .bash_profile files
        3. 11.2.3. Supplying an initial .tcshrc file
        4. 11.2.4. Configuring system-wide shell options
        5. 11.2.5. Setting system profiles
        6. 11.2.6. Adding user accounts to servers
      3. 11.3. Creating Portable Desktops
      4. 11.4. Providing Support to Users
        1. 11.4.1. Creating a technical support mailbox
        2. 11.4.2. Resetting a user's password
      5. 11.5. Modifying Accounts
        1. 11.5.1. Modifying user accounts with usermod
        2. 11.5.2. Modifying user accounts with User Manager
      6. 11.6. Deleting User Accounts
        1. 11.6.1. Deleting user accounts with userdel
        2. 11.6.2. Deleting user accounts with User Manager
      7. 11.7. Checking Disk Quotas
        1. 11.7.1. Using quota to check disk usage
          1. 11.7.1.1. Editing the /etc/fstab file
          2. 11.7.1.2. Creating quota files
          3. 11.7.1.3. Creating a quota startup script
          4. 11.7.1.4. Turn on the quota startup script
          5. 11.7.1.5. Creating quota rules
          6. 11.7.1.6. Updating quota settings
          7. 11.7.1.7. Checking quotas
        2. 11.7.2. Using du to check disk use
        3. 11.7.3. Removing temp files automatically
      8. 11.8. Sending Mail to All Users
      9. 11.9. Summary
    3. 12. Automating System Tasks
      1. 12.1. Understanding Shell Scripts
        1. 12.1.1. Executing and debugging shell scripts
        2. 12.1.2. Understanding shell variables
          1. 12.1.2.1. Special shell variables
          2. 12.1.2.2. Parameter expansion in bash
        3. 12.1.3. Performing arithmetic in shell scripts
        4. 12.1.4. Using programming constructs in shell scripts
          1. 12.1.4.1. The "if...then" statements
          2. 12.1.4.2. The case command
          3. 12.1.4.3. The "for...do" loop
          4. 12.1.4.4. The "while...do" and "until...do" loops
        5. 12.1.5. Some useful external programs
          1. 12.1.5.1. The general regular expression parser (grep)
          2. 12.1.5.2. Remove sections of lines of text (cut)
          3. 12.1.5.3. Translate or delete characters (tr)
          4. 12.1.5.4. The Stream Editor (sed)
        6. 12.1.6. Trying some simple shell scripts
          1. 12.1.6.1. A simple telephone list
          2. 12.1.6.2. A simple backup script
      2. 12.2. System Initialization
        1. 12.2.1. Starting init
        2. 12.2.2. The inittab file
      3. 12.3. System Startup and Shutdown
        1. 12.3.1. Starting run-level scripts
        2. 12.3.2. Understanding run-level scripts
        3. 12.3.3. Understanding what startup scripts do
        4. 12.3.4. Changing run-level script behavior
        5. 12.3.5. Reorganizing or removing run-level scripts
        6. 12.3.6. Adding run-level scripts
        7. 12.3.7. Managing xinetd services
        8. 12.3.8. Manipulating run levels
          1. 12.3.8.1. Determining the current run level
          2. 12.3.8.2. Changing to a shutdown run level
      4. 12.4. Scheduling System Tasks
        1. 12.4.1. Using at.allow and at.deny
        2. 12.4.2. Specifying when jobs are run
        3. 12.4.3. Submitting scheduled jobs
        4. 12.4.4. Viewing scheduled jobs
        5. 12.4.5. Deleting scheduled jobs
        6. 12.4.6. Using the batch command
        7. 12.4.7. Using the cron facility
          1. 12.4.7.1. Modifying scheduled tasks with crontab
          2. 12.4.7.2. Understanding cron files
      5. 12.5. Summary
    4. 13. Backing Up and Restoring Files
      1. 13.1. Making a Simple Backup Archive
      2. 13.2. Doing a Simple Backup with rsync
        1. 13.2.1. Backing up files locally
        2. 13.2.2. Backing up files remotely
      3. 13.3. Choosing Backup Tools
      4. 13.4. Selecting a Backup Strategy
        1. 13.4.1. Full backup
        2. 13.4.2. Incremental backup
        3. 13.4.3. Disk mirroring
        4. 13.4.4. Network backup
      5. 13.5. Selecting a Backup Medium
        1. 13.5.1. Magnetic tape
          1. 13.5.1.1. Using ftape tools for magnetic tape
          2. 13.5.1.2. Testing the magnetic tape drive
        2. 13.5.2. Writable CD drives
          1. 13.5.2.1. Getting cdrecord for writable CDs
          2. 13.5.2.2. Writing to CDs
        3. 13.5.3. Writable DVD drives
        4. 13.5.4. Writing CD or DVDs with growisofs
      6. 13.6. Backing Up to a Hard Drive
      7. 13.7. Backing Up Files with dump
      8. 13.8. Creating a backup with dump
        1. 13.8.1. Understanding dump levels
      9. 13.9. Automating Backups with cron
      10. 13.10. Restoring Backed-Up Files
        1. 13.10.1. Restoring an entire file system
        2. 13.10.2. Recovering individual files
      11. 13.11. Configuring Amanda for Network Backups
        1. 13.11.1. Creating Amanda directories
        2. 13.11.2. Creating the amanda.conf file
        3. 13.11.3. Creating a disklist file
        4. 13.11.4. Adding Amanda network services
          1. 13.11.4.1. On the amanda server
          2. 13.11.4.2. On each amanda client
        5. 13.11.5. Performing an Amanda backup
      12. 13.12. Using the pax Archiving Tool
      13. 13.13. Summary
    5. 14. Computer Security Issues
      1. 14.1. Linux Security Checklist
      2. 14.2. Using Password Protection
        1. 14.2.1. Choosing good passwords
        2. 14.2.2. Using a shadow password file
          1. 14.2.2.1. Breaking encrypted passwords
          2. 14.2.2.2. Checking for the shadow password file
      3. 14.3. Securing Linux with iptables Firewalls
        1. 14.3.1. Using the Firewall Configuration window
        2. 14.3.2. Configuring an iptables firewall
          1. 14.3.2.1. Turning on iptables
          2. 14.3.2.2. Creating iptables firewall rules
            1. 14.3.2.2.1. Example 1: Firewall for shared Internet connection (plus servers)
            2. 14.3.2.2.2. Example 2: Firewall for shared Internet connection (no servers)
            3. 14.3.2.2.3. Example 3: Firewall for single Linux system with Internet connection
          3. 14.3.2.3. Understanding iptables
            1. 14.3.2.3.1. Allowing FTP and IRC services through an iptables firewall
            2. 14.3.2.3.2. Using iptables to do SNAT or IP Masquerading
            3. 14.3.2.3.3. Using iptables as a transparent proxy
            4. 14.3.2.3.4. Using iptables to do port forwarding
            5. 14.3.2.3.5. Using logging with iptables
          4. 14.3.2.4. Enhancing your iptables firewall
      4. 14.4. Controlling Access to Services with TCP Wrappers
      5. 14.5. Checking Log Files
        1. 14.5.1. Understanding the syslogd service
          1. 14.5.1.1. Redirecting logs to a loghost with syslogd
          2. 14.5.1.2. Understanding the messages logfile
        2. 14.5.2. Tracking log messages with logwatch
      6. 14.6. Using the Secure Shell Package
        1. 14.6.1. Starting the SSH service
        2. 14.6.2. Using the ssh, sftp, and scp commands
        3. 14.6.3. Using ssh, scp, and sftp without passwords
      7. 14.7. Securing Linux Servers
        1. 14.7.1. Understanding attack techniques
        2. 14.7.2. Protecting against denial-of-service attacks
          1. 14.7.2.1. Mailbombing
            1. 14.7.2.1.1. Blocking mail with Procmail
            2. 14.7.2.1.2. Blocking mail with sendmail
          2. 14.7.2.2. Spam relaying
          3. 14.7.2.3. Smurf amplification attack
        3. 14.7.3. Protecting against distributed DOS attacks
        4. 14.7.4. Protecting against intrusion attacks
          1. 14.7.4.1. Evaluating access to network services
          2. 14.7.4.2. Disabling network services
        5. 14.7.5. Securing servers with SELinux
        6. 14.7.6. Protecting Web servers with certificates and encryption
          1. 14.7.6.1. Symmetric cryptography
          2. 14.7.6.2. Public-key cryptography
          3. 14.7.6.3. Secure Sockets Layer
            1. 14.7.6.3.1. Creating SSL certificates
            2. 14.7.6.3.2. Using third-party certificate signers
            3. 14.7.6.3.3. Creating a Certificate Service Request
            4. 14.7.6.3.4. Getting the CSR signed
            5. 14.7.6.3.5. Creating self-signed certificates
            6. 14.7.6.3.6. Restarting your Web server
            7. 14.7.6.3.7. Troubleshooting your certificates
      8. 14.8. Summary
  9. IV. Fedora and RHEL Network and Server Setup
    1. 15. Setting Up a Local Area Network
      1. 15.1. Understanding Local Area Networks
        1. 15.1.1. Planning, getting, and setting up LAN hardware
          1. 15.1.1.1. LAN topologies
          2. 15.1.1.2. LAN equipment
          3. 15.1.1.3. LAN equipment setup
        2. 15.1.2. Configuring TCP/IP for your LAN
          1. 15.1.2.1. Identifying other computers (hosts and DNS)
          2. 15.1.2.2. Adding Windows computers to your LAN
      2. 15.2. Setting Up a Wireless LAN
        1. 15.2.1. Understanding wireless networks
        2. 15.2.2. Choosing wireless hardware
          1. 15.2.2.1. Selecting wireless LAN cards
          2. 15.2.2.2. Selecting antennas
            1. 15.2.2.2.1. Using indoor antennas
            2. 15.2.2.2.2. Using outdoor antennas
        3. 15.2.3. Getting wireless drivers
        4. 15.2.4. Installing wireless Linux software
        5. 15.2.5. Configuring the wireless LAN
          1. 15.2.5.1. Configuring the wireless interface
          2. 15.2.5.2. Activating the wireless interfaces
          3. 15.2.5.3. Checking your wireless connection
        6. 15.2.6. Testing distances
        7. 15.2.7. Setting wireless extensions
      3. 15.3. Understanding Internet Protocol Addresses
        1. 15.3.1. IP address classes
        2. 15.3.2. Understanding netmasks
        3. 15.3.3. Classless Inter-Domain Routing
        4. 15.3.4. Getting IP addresses
      4. 15.4. Troubleshooting Your LAN
        1. 15.4.1. Did Linux find your Ethernet driver at boot time?
        2. 15.4.2. Can you reach another computer on the LAN?
        3. 15.4.3. Is your Ethernet connection up?
        4. 15.4.4. Troubleshooting a wireless LAN
          1. 15.4.4.1. Checking wireless settings
          2. 15.4.4.2. Checking TCP/IP
          3. 15.4.4.3. Adapting to poor reception
          4. 15.4.4.4. Use debugging tools
        5. 15.4.5. Watching LAN traffic with Wireshark
          1. 15.4.5.1. Starting Wireshark
          2. 15.4.5.2. Capturing Ethernet data
          3. 15.4.5.3. Interpreting captured Ethernet data
      5. 15.5. Summary
    2. 16. Connecting to the Internet
      1. 16.1. Understanding How the Internet Is Structured
        1. 16.1.1. Internet domains
        2. 16.1.2. Hostnames and IP addresses
        3. 16.1.3. Routing
        4. 16.1.4. Proxies
      2. 16.2. Using Dial-Up Connections to the Internet
        1. 16.2.1. Getting information
        2. 16.2.2. Setting up dial-up PPP
        3. 16.2.3. Creating a dial-up connection with the Network Configuration window
        4. 16.2.4. Launching your PPP connection
        5. 16.2.5. Launching your PPP connection on demand
        6. 16.2.6. Checking your PPP connection
          1. 16.2.6.1. Checking that your modem was detected
          2. 16.2.6.2. Checking that your PPP interface is working
          3. 16.2.6.3. Checking the default route
          4. 16.2.6.4. Checking that the name servers are set
          5. 16.2.6.5. Checking the chap-secrets or pap-secrets file
          6. 16.2.6.6. Looking at the ifcfg file
          7. 16.2.6.7. Running debugging
      3. 16.3. Connecting Your LAN to the Internet
      4. 16.4. Setting Up Linux as a Router
        1. 16.4.1. Configuring the Linux router
          1. 16.4.1.1. Selecting IP addresses
          2. 16.4.1.2. Enable forwarding and masquerading
        2. 16.4.2. Configuring network clients
        3. 16.4.3. Configuring Windows network clients
      5. 16.5. Configuring a Virtual Private Network Connection
        1. 16.5.1. Understanding IPsec
        2. 16.5.2. Using IPsec protocols
        3. 16.5.3. Using IPsec in Fedora or RHEL
      6. 16.6. Setting Up Linux as a Proxy Server
        1. 16.6.1. Starting the squid daemon
        2. 16.6.2. Using a simple squid.conf file
        3. 16.6.3. Modifying the Squid configuration file
          1. 16.6.3.1. Configuring access control in squid.conf
          2. 16.6.3.2. Configuring caching in squid.conf
          3. 16.6.3.3. Configuring port numbers in squid.conf
        4. 16.6.4. Debugging Squid
          1. 16.6.4.1. Checking the squid.conf file
          2. 16.6.4.2. Checking Squid log files
          3. 16.6.4.3. Using the top command
      7. 16.7. Setting Up Proxy Clients
        1. 16.7.1. Configuring Firefox to use a proxy
        2. 16.7.2. Configuring Internet Explorer to use a proxy
        3. 16.7.3. Configuring other browsers to use a proxy
      8. 16.8. Summary
    3. 17. Setting Up a Print Server
      1. 17.1. Common UNIX Printing Service
      2. 17.2. Setting Up Printers
        1. 17.2.1. Using the Printer configuration window
          1. 17.2.1.1. Configuring local printers
            1. 17.2.1.1.1. Adding a local printer
            2. 17.2.1.1.2. Editing a local printer
          2. 17.2.1.2. Configuring remote printers
            1. 17.2.1.2.1. Adding a remote CUPS printer
            2. 17.2.1.2.2. Adding a remote UNIX printer
            3. 17.2.1.2.3. Adding a Windows (SMB) printer
            4. 17.2.1.2.4. Adding a JetDirect printer
        2. 17.2.2. Using Web-based CUPS administration
        3. 17.2.3. Configuring the CUPS server (cupsd.conf)
        4. 17.2.4. Configuring CUPS printer options
      3. 17.3. Using Printing Commands
        1. 17.3.1. Using lpr to print
        2. 17.3.2. Listing status with lpc
        3. 17.3.3. Removing print jobs with lprm
      4. 17.4. Configuring Print Servers
        1. 17.4.1. Configuring a shared CUPS printer
        2. 17.4.2. Configuring a shared Samba printer
          1. 17.4.2.1. Understanding smb.conf for printing
      5. 17.5. Summary
    4. 18. Setting Up a File Server
      1. 18.1. Goals of Setting Up a File Server
      2. 18.2. Setting Up an NFS File Server
        1. 18.2.1. Sharing NFS file systems
          1. 18.2.1.1. Using the NFS Server Configuration window
          2. 18.2.1.2. Configuring the /etc/exports file
            1. 18.2.1.2.1. Hostnames in /etc/exports
            2. 18.2.1.2.2. Access options in /etc/exports
            3. 18.2.1.2.3. User mapping options in /etc/exports
          3. 18.2.1.3. Exporting the shared file systems
          4. 18.2.1.4. Starting the nfsd daemons
        2. 18.2.2. Using NFS file systems
          1. 18.2.2.1. Manually mounting an NFS file system
          2. 18.2.2.2. Automatically mounting an NFS file system
            1. 18.2.2.2.1. Mounting noauto file systems
            2. 18.2.2.2.2. Using mount options
          3. 18.2.2.3. Using autofs to mount NFS file systems on demand
        3. 18.2.3. Unmounting NFS file systems
        4. 18.2.4. Other cool things to do with NFS
      3. 18.3. Setting Up a Samba File Server
        1. 18.3.1. Getting and installing Samba
        2. 18.3.2. Configuring a simple Samba server
        3. 18.3.3. Configuring Samba with SWAT
          1. 18.3.3.1. Turning on SWAT
          2. 18.3.3.2. Starting with SWAT
          3. 18.3.3.3. Creating global Samba settings in SWAT
            1. 18.3.3.3.1. Base options
            2. 18.3.3.3.2. Security options
            3. 18.3.3.3.3. Logging options
            4. 18.3.3.3.4. Printing options
            5. 18.3.3.3.5. Browse options
            6. 18.3.3.3.6. WINS options
          4. 18.3.3.4. Configuring shared directories with SWAT
          5. 18.3.3.5. Checking your Samba setup with SWAT
        4. 18.3.4. Working with Samba files and commands
          1. 18.3.4.1. Editing the smb.conf file
          2. 18.3.4.2. Adding Samba users
          3. 18.3.4.3. Starting the Samba service
          4. 18.3.4.4. Testing your Samba permissions
          5. 18.3.4.5. Checking the status of shared directories
        5. 18.3.5. Setting up Samba clients
          1. 18.3.5.1. Using Samba shared directories from Linux
            1. 18.3.5.1.1. Using Samba from Nautilus
            2. 18.3.5.1.2. Mounting Samba directories in Linux
          2. 18.3.5.2. Using Samba shared directories from Windows
        6. 18.3.6. Troubleshooting your Samba server
          1. 18.3.6.1. Basic networking in place?
          2. 18.3.6.2. Samba service running?
          3. 18.3.6.3. Firewall open?
          4. 18.3.6.4. User passwords working?
      4. 18.4. Summary
    5. 19. Setting Up a Mail Server
      1. 19.1. Introducing SMTP and sendmail
      2. 19.2. Installing and Running sendmail
        1. 19.2.1. Starting sendmail
        2. 19.2.2. Other programs
        3. 19.2.3. Logging performed by sendmail
      3. 19.3. Configuring sendmail
        1. 19.3.1. Getting a domain name
        2. 19.3.2. Configuring basic sendmail settings (sendmail.mc)
        3. 19.3.3. Defining outgoing mail access
        4. 19.3.4. Configuring virtual servers
        5. 19.3.5. Configuring virtual users
        6. 19.3.6. Adding user accounts
        7. 19.3.7. Starting sendmail and generating database files
        8. 19.3.8. Redirecting mail
          1. 19.3.8.1. The .forward file
          2. 19.3.8.2. The aliases file
      4. 19.4. Introducing Postfix
      5. 19.5. Stopping Spam with SpamAssassin
        1. 19.5.1. Using SpamAssassin
        2. 19.5.2. Setting up SpamAssassin on your mail server
        3. 19.5.3. Setting e-mail readers to filter spam
      6. 19.6. Getting Mail from the Server (POP3 or IMAP)
        1. 19.6.1. Accessing mailboxes in Linux
        2. 19.6.2. Configuring IMAP and POP3 with dovecot
      7. 19.7. Getting Mail from Your Browser with SquirrelMail
      8. 19.8. Administering a Mailing List with mailman
      9. 19.9. Summary
    6. 20. Setting Up an FTP Server
      1. 20.1. Understanding FTP Servers
        1. 20.1.1. Attributes of FTP servers
        2. 20.1.2. FTP user types
      2. 20.2. Using the Very Secure FTP Server
        1. 20.2.1. Quick-starting vsFTPd
        2. 20.2.2. Configuring vsFTPd
          1. 20.2.2.1. User accounts
          2. 20.2.2.2. Setting FTP access
            1. 20.2.2.2.1. Downloading files
            2. 20.2.2.2.2. Uploading (writing) files from local users
            3. 20.2.2.2.3. Uploading (writing) files from anonymous users
          3. 20.2.2.3. Adding message files
          4. 20.2.2.4. Logging vsFTPd activities
          5. 20.2.2.5. Setting timeouts
          6. 20.2.2.6. Navigating a vsFTPd site
          7. 20.2.2.7. Setting up vsFTPd behind a firewall
      3. 20.3. Getting More Information about FTP Servers
      4. 20.4. Summary
    7. 21. Setting Up a Web Server
      1. 21.1. Introduction to Web Servers
        1. 21.1.1. The Apache Web server
        2. 21.1.2. Other Web servers available for Fedora and RHEL
      2. 21.2. Quick Starting the Apache Web Server
      3. 21.3. Configuring the Apache Server
        1. 21.3.1. Configuring the Web server (httpd.conf)
          1. 21.3.1.1. Setting the global environment
            1. 21.3.1.1.1. Revealing subcomponents
            2. 21.3.1.1.2. Setting the server root directory
            3. 21.3.1.1.3. Storing the server's PID file
            4. 21.3.1.1.4. Configuring timeout values
          2. 21.3.1.2. Setting the number of server processes
          3. 21.3.1.3. Binding to specific addresses
            1. 21.3.1.3.1. Selecting modules in httpd.conf
          4. 21.3.1.4. Including module-specific configuration files
          5. 21.3.1.5. Choosing the server's user and group
          6. 21.3.1.6. Setting the main server's configuration
            1. 21.3.1.6.1. Setting an e-mail address
            2. 21.3.1.6.2. Setting the server name
            3. 21.3.1.6.3. Setting canonical names
            4. 21.3.1.6.4. Identifying HTTP content directories
            5. 21.3.1.6.5. Setting access options and overrides
          7. 21.3.1.7. Identifying user dirctories
          8. 21.3.1.8. Setting default index files for directories
            1. 21.3.1.8.1. Setting directory-access control
            2. 21.3.1.8.2. Setting MIME-type defaults
            3. 21.3.1.8.3. Setting hostname lookups
            4. 21.3.1.8.4. Configuring HTTP logging
            5. 21.3.1.8.5. Adding a signature
            6. 21.3.1.8.6. Aliasing relocated content
            7. 21.3.1.8.7. Redirecting requests for old content
          9. 21.3.1.9. Defining indexing
          10. 21.3.1.10. Defining encoding and language
          11. 21.3.1.11. Choosing character sets
          12. 21.3.1.12. Adding MIME types and handlers
          13. 21.3.1.13. Defining actions and headers
          14. 21.3.1.14. Customizing error responses
          15. 21.3.1.15. Setting responses to browsers
          16. 21.3.1.16. Enabling proxy and caching services
          17. 21.3.1.17. Configuring virtual hosting
        2. 21.3.2. Configuring modules and related services (<litearl>/etc/httpd/conf.d/*.conf</litearl>)
      4. 21.4. Starting and Stopping the Server
      5. 21.5. Monitoring Server Activities
        1. 21.5.1. Displaying server information
        2. 21.5.2. Displaying server status
        3. 21.5.3. Further security of server-info and server-status
        4. 21.5.4. Logging errors
        5. 21.5.5. Logging hits
        6. 21.5.6. Analyzing Web-server traffic
      6. 21.6. Summary
    8. 22. Setting Up an LDAP Address Book Server
      1. 22.1. Understanding LDAP
        1. 22.1.1. Defining information in schemas
        2. 22.1.2. Structuring your LDAP directories
      2. 22.2. Setting Up the OpenLDAP Server
        1. 22.2.1. Installing OpenLDAP packages
        2. 22.2.2. Configuring the OpenLDAP server (slapd.conf)
        3. 22.2.3. Starting the OpenLDAP service
      3. 22.3. Setting Up the Address Book
      4. 22.4. More Ways to Configure LDAP
      5. 22.5. Accessing an LDAP Address Book from Thunderbird
      6. 22.6. Summary
    9. 23. Setting Up a DHCP Boot Server
      1. 23.1. Using Dynamic Host Configuration Protocol
      2. 23.2. Setting Up a DHCP Server
        1. 23.2.1. Opening your firewall for DHCP
        2. 23.2.2. Configuring the /etc/dhcpd.conf file
          1. 23.2.2.1. Expanding the dhcpd.conf file
          2. 23.2.2.2. Adding options
        3. 23.2.3. Starting the DHCP server
      3. 23.3. Setting Up a DHCP Client
      4. 23.4. Summary
    10. 24. Setting Up a MySQL Database Server
      1. 24.1. Finding MySQL Packages
      2. 24.2. Getting More MySQL Packages
      3. 24.3. Configuring the MySQL Server
        1. 24.3.1. Using mysql user/group accounts
        2. 24.3.2. Adding administrative users
        3. 24.3.3. Setting MySQL options
          1. 24.3.3.1. Creating the my.cnf configuration file
          2. 24.3.3.2. Choosing options
          3. 24.3.3.3. Checking options
        4. 24.3.4. Using sample my.cnf files
      4. 24.4. Starting the MySQL Server
      5. 24.5. Checking That MySQL Server Is Working
      6. 24.6. Working with MySQL Databases
        1. 24.6.1. Starting the mysql command
        2. 24.6.2. Creating a database with mysql
        3. 24.6.3. Adding data to a MySQL database table
          1. 24.6.3.1. Manually entering data
          2. 24.6.3.2. Loading data from a file
      7. 24.7. Understanding MySQL Tables
      8. 24.8. Displaying MySQL Databases
        1. 24.8.1. Displaying all or selected records
        2. 24.8.2. Displaying selected columns
        3. 24.8.3. Sorting data
      9. 24.9. Making Changes to Tables and Records
        1. 24.9.1. Altering the structure of MySQL tables
        2. 24.9.2. Updating and deleting MySQL records
      10. 24.10. Adding and Removing User Access
        1. 24.10.1. Adding users and granting access
        2. 24.10.2. Revoking access
      11. 24.11. Backing Up Databases
      12. 24.12. Checking and Fixing Databases
      13. 24.13. Summary
    11. 25. Making Servers Public with DNS
      1. 25.1. Determining Goals for Your Server
        1. 25.1.1. Using a hosting service
      2. 25.2. Connecting a Public Server
        1. 25.2.1. Choosing an ISP
          1. 25.2.1.1. Checking Terms of Service
          2. 25.2.1.2. Getting static IP addresses
          3. 25.2.1.3. Choosing a connection speed
        2. 25.2.2. Getting a domain name
          1. 25.2.2.1. Checking domain name availability
          2. 25.2.2.2. Reserving a domain name
      3. 25.3. Configuring Your Public Server
        1. 25.3.1. Configuring networking
        2. 25.3.2. Configuring servers
        3. 25.3.3. Managing security
          1. 25.3.3.1. Opening your firewall
          2. 25.3.3.2. Enabling SELinux
          3. 25.3.3.3. Checking logs and system files
          4. 25.3.3.4. Keeping up with updates
      4. 25.4. Setting Up a Domain Name System Server
        1. 25.4.1. Understanding DNS
          1. 25.4.1.1. Understanding authoritative zones
          2. 25.4.1.2. Understanding DNS risks
          3. 25.4.1.3. Understanding BIND
        2. 25.4.2. DNS name server example
        3. 25.4.3. Quick-starting a DNS server
          1. 25.4.3.1. Identifying your DNS servers
          2. 25.4.3.2. Creating DNS configuration files (named.conf and var/named)
            1. 25.4.3.2.1. Editing named.conf
            2. 25.4.3.2.2. Setting up the zone files (inside)
            3. 25.4.3.2.3. Setting up the zone files (outside)
            4. 25.4.3.2.4. Setting up the zone files (reverse lookup)
          3. 25.4.3.3. Starting the named (DNS) daemon
        4. 25.4.4. Checking that DNS is working
      5. 25.5. Getting More Information about BIND
      6. 25.6. Summary
    12. 26. Integrating Fedora with Apple Macs
      1. 26.1. Looking Inside Mac OS X
      2. 26.2. Using Network Services from Mac OS X
        1. 26.2.1. Using AppleTalk (netatalk) from Mac OS X
        2. 26.2.2. Using AppleTalk from Mac OS 8 or OS 9
        3. 26.2.3. Using Mac, Windows, and Linux servers (Samba)
        4. 26.2.4. Sharing X applications
      3. 26.3. Configuring an AppleTalk Server in Linux
        1. 26.3.1. Before you start using netatalk
        2. 26.3.2. Setting up the netatalk server
          1. 26.3.2.1. Starting netatalk
          2. 26.3.2.2. Open firewall ports
          3. 26.3.2.3. Defining general AppleTalk server settings
          4. 26.3.2.4. Defining specific AppleTalk servers settings
          5. 26.3.2.5. Setting up users
          6. 26.3.2.6. Sharing netatalk volumes
        3. 26.3.3. Securing netatalk volumes
          1. 26.3.3.1. User-level security
          2. 26.3.3.2. Host-level security
          3. 26.3.3.3. File- and directory-level security
            1. 26.3.3.3.1. Understanding hidden Mac files and directories
            2. 26.3.3.3.2. Setting file and directory permissions
            3. 26.3.3.3.3. Setting Appletalk file and folder type and creator
            4. 26.3.3.3.4. Moving, copying, and deleting netatalk files
            5. 26.3.3.3.5. Sharing files with netatalk and Samba
          4. 26.3.3.4. Printer Sharing
        4. 26.3.4. Troubleshooting netatalk
      4. 26.4. Accessing NFS Servers from the Mac
        1. 26.4.1. Connecting to NFS from the Connect to Server window
        2. 26.4.2. Connecting to NFS from the command line
      5. 26.5. Installing Fedora on an Intel-based Mac
        1. 26.5.1. Before installing Fedora on your Mac
        2. 26.5.2. Installing Fedora
      6. 26.6. Summary
  10. A. About the Media
    1. A.1. Fedora Source Code
    2. A.2. Fedora Rescue CD
  11. B. Running Network Services
    1. B.1. Checklist for Running Networking Services
    2. B.2. Networking Service Daemons
      1. B.2.1. The xinetd super-server
      2. B.2.2. The init.d start-up scripts
    3. B.3. Choosing Alternatives
    4. B.4. Referencing Network Services
      1. B.4.1. Web server
      2. B.4.2. File servers
        1. B.4.2.1. FTP servers
        2. B.4.2.2. Samba server
        3. B.4.2.3. Netatalk server
        4. B.4.2.4. NetWare-compatible server
      3. B.4.3. Login servers
      4. B.4.4. E-mail servers
      5. B.4.5. News server
      6. B.4.6. Print servers
      7. B.4.7. Network administration servers
        1. B.4.7.1. Network Time Protocol server
        2. B.4.7.2. Portmap server
        3. B.4.7.3. SWAT
        4. B.4.7.4. Arpwatch server
        5. B.4.7.5. Simple Network Management Protocol server
      8. B.4.8. Information servers
        1. B.4.8.1. Network Information System servers
        2. B.4.8.2. Dynamic Host Configuration Protocol server
        3. B.4.8.3. Lightweight Directory Access Protocol server
        4. B.4.8.4. Domain Name System server
        5. B.4.8.5. Reverse Address Resolution Protocol server
      9. B.4.9. Database services
      10. B.4.10. User services
        1. B.4.10.1. Remote execution servers
        2. B.4.10.2. Talk server
        3. B.4.10.3. Finger server
        4. B.4.10.4. Remote user identification
        5. B.4.10.5. Write-to-All server
      11. B.4.11. Security services
        1. B.4.11.1. System logging
        2. B.4.11.2. Virtual private network servers
        3. B.4.11.3. Proxy/caching server
  12. C. Red Hat Enterprise Linux 5 Features
    1. C.1. What's in RHEL 5?
    2. C.2. Choosing an RHEL System
    3. C.3. Getting RHEL Evaluation Subscriptions
    4. C.4. Hardware Compatibility and Commercial Software
    5. C.5. Training and Certification
    6. C.6. Documentation and Support
    7. C.7. Managing RHEL Systems
      1. C.7.1. Using Red Hat Network
      2. C.7.2. Using RHEL for high-performance computing clusters
      3. C.7.3. Using RHEL Global File System
    8. C.8. More Information on RHEL