You are previewing LPIC-1: Linux Professional Institute Certification Study Guide, Second Edition.
O'Reilly logo
LPIC-1: Linux Professional Institute Certification Study Guide, Second Edition

Book Description

Offering you thorough coverage of the new version of the leading Linux certification from Linux Professional Institute (LPI), this book covers both objectives and materials tested in the two required LPIC-1 exams: LPI 101 and LPI 102. You’ll certainly appreciate the clear, concise information on key exam topics, including using Linux command line tools, managing software, configuring hardware, managing files and filesystems, working with the X Window system, administering the system, basic networking, and more.

Table of Contents

  1. Copyright
  2. Dear Reader,
  3. Acknowledgments
  4. About the Author
  5. Introduction
    1. What Is Linux?
    2. Why Become LPI Certified?
    3. How to Become LPI Certified
    4. Who Should Buy This Book
    5. How This Book Is Organized
    6. Bonus CD-ROM Contents
    7. Conventions Used in This Book
    8. The Exam Objectives
      1. Exam 101
        1. Topic 101: System Architecture
        2. Topic 102: Linux Installation and Package Management
        3. Topic 103: GNU and Unix Commands
        4. Topic 104: Devices, Linux Filesystems, Filesystem Hierarchy Standard
      2. Exam 102
        1. Topic 105: Shells, Scripting and Data Management
        2. Topic 106: User Interfaces and Desktops
        3. Topic 107: Administrative Tasks
        4. Topic 108: Essential System Services
        5. Topic 109: Networking Fundamentals
        6. Topic 110: Security
    9. Assessment Test
    10. Answers to Assessment Test
  6. I. The LPI 101 Exam (60 Weights)
    1. 1. Exploring Linux Command-Line Tools
      1. 1.1. Understanding Command-Line Basics
        1. 1.1.1. Exploring Your Linux Shell Options
        2. 1.1.2. Using a Shell
          1. 1.1.2.1. Starting a Shell
          2. 1.1.2.2. Using Internal and External Commands
          3. 1.1.2.3. Performing Some Shell Command Tricks
        3. 1.1.3. Exploring Shell Configuration
        4. 1.1.4. Using Environment Variables
        5. 1.1.5. Getting Help
      2. 1.2. Using Streams, Redirection, and Pipes
        1. 1.2.1. Exploring Types of Streams
        2. 1.2.2. Redirecting Input and Output
        3. 1.2.3. Piping Data Between Programs
        4. 1.2.4. Generating Command Lines
      3. 1.3. Processing Text Using Filters
        1. 1.3.1. File-Combining Commands
          1. 1.3.1.1. Combining Files with cat
          2. 1.3.1.2. Joining Files by Field with join
          3. 1.3.1.3. Merging Lines with paste
        2. 1.3.2. File-Transforming Commands
          1. 1.3.2.1. Converting Tabs to Spaces with expand
          2. 1.3.2.2. Displaying Files in Octal with od
          3. 1.3.2.3. Sorting Files with sort
          4. 1.3.2.4. Breaking a File into Pieces with split
          5. 1.3.2.5. Translating Characters with tr
          6. 1.3.2.6. Converting Spaces to Tabs with unexpand
          7. 1.3.2.7. Deleting Duplicate Lines with uniq
        3. 1.3.3. File-Formatting Commands
          1. 1.3.3.1. Reformatting Paragraphs with fmt
          2. 1.3.3.2. Numbering Lines with nl
          3. 1.3.3.3. Preparing a File for Printing with pr
        4. 1.3.4. File-Viewing Commands
          1. 1.3.4.1. Viewing the Starts of Files with head
          2. 1.3.4.2. Viewing the Ends of Files with tail
          3. 1.3.4.3. Paging Through Files with less
        5. 1.3.5. File-Summarizing Commands
          1. 1.3.5.1. Extracting Text with cut
          2. 1.3.5.2. Obtaining a Word Count with wc
      4. 1.4. Using Regular Expressions
        1. 1.4.1. Understanding Regular Expressions
        2. 1.4.2. Using grep
        3. 1.4.3. Using sed
      5. 1.5. Summary
      6. 1.6. Exam Essentials
      7. 1.7. Review Questions
      8. 1.8. Answers to Review Questions
    2. 2. Managing Software
      1. 2.1. Package Concepts
      2. 2.2. Using RPM
        1. 2.2.1. RPM Distributions and Conventions
        2. 2.2.2. The rpm Command Set
        3. 2.2.3. Extracting Data from RPMs
        4. 2.2.4. Using Yum
        5. 2.2.5. RPM and Yum Configuration Files
        6. 2.2.6. RPM Compared to Other Package Formats
      3. 2.3. Using Debian Packages
        1. 2.3.1. Debian Distributions and Conventions
        2. 2.3.2. The dpkg Command Set
        3. 2.3.3. Using apt-cache
        4. 2.3.4. Using apt-get
        5. 2.3.5. Using dselect, aptitude, and Synaptic
        6. 2.3.6. Reconfiguring Packages
        7. 2.3.7. Debian Packages Compared to Other Package Formats
        8. 2.3.8. Configuring Debian Package Tools
      4. 2.4. Converting Between Package Formats
      5. 2.5. Package Dependencies and Conflicts
        1. 2.5.1. Real and Imagined Package Dependency Problems
        2. 2.5.2. Workarounds to Package Dependency Problems
          1. 2.5.2.1. Forcing the Installation
          2. 2.5.2.2. Upgrading or Replacing the Depended-On Package
          3. 2.5.2.3. Rebuilding the Problem Package
          4. 2.5.2.4. Locating Another Version of the Problem Package
        3. 2.5.3. Startup Script Problems
      6. 2.6. Managing Shared Libraries
        1. 2.6.1. Library Principles
        2. 2.6.2. Locating Library Files
          1. 2.6.2.1. Setting the Path Systemwide
          2. 2.6.2.2. Temporarily Changing the Path
          3. 2.6.2.3. Correcting Problems
        3. 2.6.3. Library Management Commands
          1. 2.6.3.1. Displaying Shared Library Dependencies
          2. 2.6.3.2. Reloading the Library Cache
      7. 2.7. Managing Processes
        1. 2.7.1. Understanding the Kernel: The First Process
        2. 2.7.2. Examining Process Lists
          1. 2.7.2.1. Using Useful ps Options
          2. 2.7.2.2. Interpreting ps Output
          3. 2.7.2.3. top: A Dynamic ps Variant
          4. 2.7.2.4. jobs: Processes Associated with Your Session
        3. 2.7.3. Understanding Foreground and Background Processes
        4. 2.7.4. Managing Process Priorities
        5. 2.7.5. Killing Processes
      8. 2.8. Summary
      9. 2.9. Exam Essentials
      10. 2.10. Review Questions
      11. 2.11. Answers to Review Questions
    3. 3. Configuring Hardware
      1. 3.1. Configuring the BIOS and Core Hardware
        1. 3.1.1. Understanding the Role of the BIOS
        2. 3.1.2. IRQs
        3. 3.1.3. I/O Addresses
        4. 3.1.4. DMA Addresses
        5. 3.1.5. Boot Disks and Geometry Settings
        6. 3.1.6. Coldplug and Hotplug Devices
      2. 3.2. Configuring Expansion Cards
        1. 3.2.1. Configuring PCI Cards
        2. 3.2.2. Learning about Kernel Modules
        3. 3.2.3. Loading Kernel Modules
        4. 3.2.4. Removing Kernel Modules
      3. 3.3. Configuring USB Devices
        1. 3.3.1. USB Basics
        2. 3.3.2. Linux USB Drivers
        3. 3.3.3. USB Manager Applications
      4. 3.4. Configuring Hard Disks
        1. 3.4.1. Configuring PATA Disks
        2. 3.4.2. Configuring SATA Disks
        3. 3.4.3. Configuring SCSI Disks
        4. 3.4.4. Configuring External Disks
      5. 3.5. Designing a Hard Disk Layout
        1. 3.5.1. Why Partition?
        2. 3.5.2. Types of Disk Partitions
        3. 3.5.3. An Alternative to Partitions: LVM
        4. 3.5.4. Mount Points
        5. 3.5.5. Common Partitions and Filesystem Layouts
      6. 3.6. Creating Partitions and Filesystems
        1. 3.6.1. Partitioning a Disk
          1. 3.6.1.1. Using fdisk
          2. 3.6.1.2. Using GNU Parted
        2. 3.6.2. Preparing a Partition for Use
          1. 3.6.2.1. Common Filesystem Types
          2. 3.6.2.2. Creating a Filesystem
          3. 3.6.2.3. Creating Swap Space
      7. 3.7. Maintaining Filesystem Health
        1. 3.7.1. Tuning Filesystems
          1. 3.7.1.1. Obtaining Filesystem Information
          2. 3.7.1.2. Adjusting Tunable Filesystem Parameters
          3. 3.7.1.3. Interactively Debugging a Filesystem
        2. 3.7.2. Maintaining a Journal
        3. 3.7.3. Checking Filesystems
        4. 3.7.4. Monitoring Disk Use
          1. 3.7.4.1. Monitoring Disk Use by Partition
          2. 3.7.4.2. Monitoring Disk Use by Directory
      8. 3.8. Mounting and Unmounting Filesystems
        1. 3.8.1. Temporarily Mounting or Unmounting Filesystems
          1. 3.8.1.1. Syntax and Parameters for mount
          2. 3.8.1.2. Options for mount
          3. 3.8.1.3. Using umount
        2. 3.8.2. Permanently Mounting Filesystems
      9. 3.9. Summary
      10. 3.10. Exam Essentials
      11. 3.11. Review Questions
      12. 3.12. Answers to Review Questions
    4. 4. Managing Files
      1. 4.1. Managing Files
        1. 4.1.1. File Naming and Wildcard Expansion Rules
        2. 4.1.2. File Commands
          1. 4.1.2.1. The ls Command
          2. 4.1.2.2. The cp Command
          3. 4.1.2.3. The mv Command
          4. 4.1.2.4. The rm Command
          5. 4.1.2.5. The touch Command
        3. 4.1.3. File Archiving Commands
          1. 4.1.3.1. The tar Utility
          2. 4.1.3.2. The cpio Utility
          3. 4.1.3.3. The dd Utility
        4. 4.1.4. Managing Links
        5. 4.1.5. Directory Commands
          1. 4.1.5.1. The mkdir Command
          2. 4.1.5.2. The rmdir Command
      2. 4.2. Managing File Ownership
        1. 4.2.1. Assessing File Ownership
        2. 4.2.2. Changing a File's Owner
        3. 4.2.3. Changing a File's Group
      3. 4.3. Controlling Access to Files
        1. 4.3.1. Understanding Permissions
          1. 4.3.1.1. The Meanings of Permission Bits
          2. 4.3.1.2. Special Permission Bits
        2. 4.3.2. Changing a File's Mode
        3. 4.3.3. Setting the Default Mode and Group
        4. 4.3.4. Changing File Attributes
      4. 4.4. Managing Disk Quotas
        1. 4.4.1. Enabling Quota Support
        2. 4.4.2. Setting Quotas for Users
      5. 4.5. Locating Files
        1. 4.5.1. The FHS
          1. 4.5.1.1. The FSSTND and FHS
          2. 4.5.1.2. Important Directories and Their Contents
        2. 4.5.2. Tools for Locating Files
          1. 4.5.2.1. The find Command
          2. 4.5.2.2. The locate Command
          3. 4.5.2.3. The whereis Command
          4. 4.5.2.4. The which Command
          5. 4.5.2.5. The type Command
      6. 4.6. Summary
      7. 4.7. Exam Essentials
      8. 4.8. Review Questions
      9. 4.9. Answers to Review Questions
    5. 5. Booting Linux and Editing Files
      1. 5.1. Installing Boot Loaders
        1. 5.1.1. Boot Loader Principles
        2. 5.1.2. Using LILO as the Boot Loader
          1. 5.1.2.1. Configuring LILO
            1. 5.1.2.1.1. Essential LILO Global Options
            2. 5.1.2.1.2. Essential LILO Per-image Options
          2. 5.1.2.2. Adding a Kernel to LILO
          3. 5.1.2.3. Interacting with LILO
        3. 5.1.3. Using GRUB as the Boot Loader
          1. 5.1.3.1. Configuring GRUB
            1. 5.1.3.1.1. GRUB Nomenclature and Quirks
            2. 5.1.3.1.2. Essential Global GRUB Options
            3. 5.1.3.1.3. Essential GRUB Per-Image Options
          2. 5.1.3.2. Installing the GRUB Boot Loader
          3. 5.1.3.3. Interacting with GRUB
      2. 5.2. Understanding the Boot Process
        1. 5.2.1. Extracting Information about the Boot Process
        2. 5.2.2. Locating and Interpreting Boot Messages
        3. 5.2.3. The Boot Process
      3. 5.3. Dealing with Runlevels and the Initialization Process
        1. 5.3.1. Runlevel Functions
        2. 5.3.2. Identifying the Services in a Runlevel
          1. 5.3.2.1. Basics of the /etc/inittab File
          2. 5.3.2.2. The SysV Startup Scripts
        3. 5.3.3. Managing Runlevel Services
          1. 5.3.3.1. Managing Runlevel Services with chkconfig
          2. 5.3.3.2. Managing Runlevel Services with ntsysv
        4. 5.3.4. Checking Your Runlevel
          1. 5.3.4.1. Checking and Changing Your Default Runlevel
          2. 5.3.4.2. Determining Your Current Runlevel
        5. 5.3.5. Changing Runlevels on a Running System
          1. 5.3.5.1. Changing Runlevels with init or telinit
          2. 5.3.5.2. Changing Runlevels with shutdown
          3. 5.3.5.3. Changing Runlevels with the halt, reboot, and poweroff Commands
      4. 5.4. Editing Files with Vi
        1. 5.4.1. Understanding Vi Modes
        2. 5.4.2. Exploring Basic Text-Editing Procedures
        3. 5.4.3. Saving Changes
      5. 5.5. Summary
      6. 5.6. Exam Essentials
      7. 5.7. Review Questions
      8. 5.8. Answers to Review Questions
  7. II. The LPI 102 Exam (60 Weights)
    1. 6. Configuring the X Window System, Localization, and Printing
      1. 6.1. Configuring Basic X Features
        1. 6.1.1. X Server Options for Linux
        2. 6.1.2. Methods of Configuring X
          1. 6.1.2.1. X Configuration Utilities
            1. 6.1.2.1.1. Configuration Tools for XFree86 4.x and X.org-X11
            2. 6.1.2.1.2. Configuration Tools for XFree86 3.3.6 and Earlier
          2. 6.1.2.2. The X Configuration File Format
          3. 6.1.2.3. The X Configure-and-Test Cycle
        3. 6.1.3. X Configuration Options
          1. 6.1.3.1. Loading Modules
          2. 6.1.3.2. Setting the Keyboard
          3. 6.1.3.3. Setting the Mouse
          4. 6.1.3.4. Setting the Monitor
          5. 6.1.3.5. Setting the Video Card
            1. 6.1.3.5.1. Choosing the Server or Driver
            2. 6.1.3.5.2. Setting Card-Specific Options
          6. 6.1.3.6. Setting the Resolution and Color Depth
          7. 6.1.3.7. Putting It All Together
        4. 6.1.4. Obtaining X Display Information
      2. 6.2. Configuring X Fonts
        1. 6.2.1. Font Technologies and Formats
        2. 6.2.2. Configuring X Core Fonts
          1. 6.2.2.1. Preparing a Font Directory
          2. 6.2.2.2. Adding Fonts to X's Font Path
        3. 6.2.3. Configuring a Font Server
        4. 6.2.4. Configuring Xft Fonts
      3. 6.3. Managing GUI Logins
        1. 6.3.1. The X GUI Login System
        2. 6.3.2. Running an XDMCP Server
        3. 6.3.3. Configuring an XDMCP Server
          1. 6.3.3.1. Configuring XDM
          2. 6.3.3.2. Configuring KDM
          3. 6.3.3.3. Configuring GDM
      4. 6.4. Using X for Remote Access
        1. 6.4.1. X Client/Server Principles
        2. 6.4.2. Using Remote X Clients
      5. 6.5. X Accessibility
        1. 6.5.1. Keyboard and Mouse Accessibility Issues
          1. 6.5.1.1. Standard Keyboard and Mouse Options
          2. 6.5.1.2. Using Onscreen Keyboards
        2. 6.5.2. Screen Display Settings
          1. 6.5.2.1. Adjusting Default Fonts
          2. 6.5.2.2. Adjusting Contrast
          3. 6.5.2.3. Using Magnifier Tools
        3. 6.5.3. Using Additional Assistive Technologies
          1. 6.5.3.1. Configuring Linux to Speak
          2. 6.5.3.2. Using Braille Displays
      6. 6.6. Configuring Localization and Internationalization
        1. 6.6.1. Setting Your Time Zone
        2. 6.6.2. Querying and Setting Your Locale
          1. 6.6.2.1. What Is a Locale?
          2. 6.6.2.2. What Is Your Locale?
          3. 6.6.2.3. Changing Your Locale
          4. 6.6.2.4. Modifying Text-File Locales
      7. 6.7. Configuring Printing
        1. 6.7.1. Conceptualizing the Linux Printing Architecture
        2. 6.7.2. Understanding PostScript and Ghostscript
          1. 6.7.2.1. PostScript: The De Facto Linux Printer Language
          2. 6.7.2.2. Ghostscript: A PostScript Translator
          3. 6.7.2.3. Squeezing Ghostscript into the Queue
        3. 6.7.3. Running a Printing System
        4. 6.7.4. Configuring CUPS
          1. 6.7.4.1. Editing the CUPS Configuration Files
          2. 6.7.4.2. Obtaining CUPS Printer Definitions
          3. 6.7.4.3. Using the Web-Based CUPS Utilities
          4. 6.7.4.4. Printing to Network Printers
        5. 6.7.5. Monitoring and Controlling the Print Queue
          1. 6.7.5.1. Printing Files with lpr
          2. 6.7.5.2. Displaying Print Queue Information with lpq
          3. 6.7.5.3. Removing Print Jobs with lprm
          4. 6.7.5.4. Controlling the Print Queue
      8. 6.8. Summary
      9. 6.9. Exam Essentials
      10. 6.10. Review Questions
      11. 6.11. Answers to Review Questions
    2. 7. Administering the System
      1. 7.1. Managing Users and Groups
        1. 7.1.1. Understanding Users and Groups
          1. 7.1.1.1. Understanding Linux Usernames
          2. 7.1.1.2. Linking Users Together for Productivity via Groups
          3. 7.1.1.3. Mapping UIDs and GIDs to Users and Groups
        2. 7.1.2. Configuring User Accounts
          1. 7.1.2.1. Adding Users
          2. 7.1.2.2. Modifying User Accounts
            1. 7.1.2.2.1. Setting a Password
            2. 7.1.2.2.2. Using usermod
            3. 7.1.2.2.3. Using chage
            4. 7.1.2.2.4. Directly Modifying Account Configuration Files
          3. 7.1.2.3. Deleting Accounts
        3. 7.1.3. Configuring Groups
          1. 7.1.3.1. Adding Groups
          2. 7.1.3.2. Modifying Group Information
            1. 7.1.3.2.1. Using groupmod and usermod
            2. 7.1.3.2.2. Using gpasswd
            3. 7.1.3.2.3. Directly Modifying Group Configuration Files
          3. 7.1.3.3. Deleting Groups
      2. 7.2. Tuning User and System Environments
      3. 7.3. Using System Log Files
        1. 7.3.1. Understanding syslogd
        2. 7.3.2. Setting Logging Options
        3. 7.3.3. Manually Logging Data
        4. 7.3.4. Rotating Log Files
        5. 7.3.5. Reviewing Log File Contents
      4. 7.4. Maintaining the System Time
        1. 7.4.1. Linux Time Concepts
        2. 7.4.2. Manually Setting the Time
        3. 7.4.3. Using NTP
          1. 7.4.3.1. Understanding NTP Basics
          2. 7.4.3.2. Locating a Time Source
          3. 7.4.3.3. Configuring NTP Servers
          4. 7.4.3.4. Configuring NTP Clients
      5. 7.5. Running Jobs in the Future
        1. 7.5.1. Understanding the Role of cron
        2. 7.5.2. Creating System cron Jobs
        3. 7.5.3. Creating User cron Jobs
        4. 7.5.4. Using anacron
        5. 7.5.5. Using at
      6. 7.6. Summary
      7. 7.7. Exam Essentials
      8. 7.8. Review Questions
      9. 7.9. Answers to Review Questions
    3. 8. Configuring Basic Networking
      1. 8.1. Understanding TCP/IP Networking
        1. 8.1.1. Knowing the Basic Functions of Network Hardware
        2. 8.1.2. Investigating Types of Network Hardware
        3. 8.1.3. Understanding Network Packets
        4. 8.1.4. Understanding Network Protocol Stacks
        5. 8.1.5. Knowing TCP/IP Protocol Types
      2. 8.2. Understanding Network Addressing
        1. 8.2.1. Using Network Addresses
          1. 8.2.1.1. Addressing Hardware
          2. 8.2.1.2. Managing IP Addresses
          3. 8.2.1.3. Broadcasting Data
          4. 8.2.1.4. Understanding Hostnames
        2. 8.2.2. Resolving Hostnames
        3. 8.2.3. Network Ports
      3. 8.3. Configuring Linux for a Local Network
        1. 8.3.1. Network Hardware Configuration
        2. 8.3.2. Configuring with DHCP
        3. 8.3.3. Configuring with a Static IP Address
        4. 8.3.4. Configuring Routing
        5. 8.3.5. Using GUI Configuration Tools
        6. 8.3.6. Using the ifup and ifdown Commands
        7. 8.3.7. Configuring Hostnames
      4. 8.4. Diagnosing Network Connections
        1. 8.4.1. Testing Basic Connectivity
        2. 8.4.2. Tracing a Route
        3. 8.4.3. Checking Network Status
        4. 8.4.4. Examining Raw Network Traffic
        5. 8.4.5. Using Additional Tools
      5. 8.5. Summary
      6. 8.6. Exam Essentials
      7. 8.7. Review Questions
      8. 8.8. Answers to Review Questions
    4. 9. Writing Scripts, Configuring E-mail, and Using Databases
      1. 9.1. Managing the Shell Environment
        1. 9.1.1. Reviewing Environment Variables
        2. 9.1.2. Understanding Common Environment Variables
        3. 9.1.3. Using Aliases
        4. 9.1.4. Modifying Shell Configuration Files
      2. 9.2. Writing Scripts
        1. 9.2.1. Beginning a Shell Script
        2. 9.2.2. Using Commands
        3. 9.2.3. Using Variables
        4. 9.2.4. Using Conditional Expressions
        5. 9.2.5. Using Loops
        6. 9.2.6. Using Functions
      3. 9.3. Managing E-mail
        1. 9.3.1. Understanding E-mail
        2. 9.3.2. Choosing E-mail Software
        3. 9.3.3. Managing E-mail
          1. 9.3.3.1. Sending and Receiving E-mail
          2. 9.3.3.2. Checking the E-mail Queue
          3. 9.3.3.3. Redirecting E-mail
        4. 9.3.4. Securing Your E-mail Server
      4. 9.4. Managing Data with SQL
        1. 9.4.1. Picking a SQL Package
        2. 9.4.2. Understanding SQL Basics
        3. 9.4.3. Using MySQL
          1. 9.4.3.1. Starting to Use MySQL
          2. 9.4.3.2. Creating Databases and Tables
          3. 9.4.3.3. Storing Data
          4. 9.4.3.4. Retrieving Data
          5. 9.4.3.5. Combining Data from Multiple Tables
          6. 9.4.3.6. Deleting Data
          7. 9.4.3.7. Learning More About SQL
      5. 9.5. Summary
      6. 9.6. Exam Essentials
      7. 9.7. Review Questions
      8. 9.8. Answers to Review Questions
    5. 10. Securing Your System
      1. 10.1. Administering Network Security
        1. 10.1.1. Using Super Server Restrictions
          1. 10.1.1.1. Configuring inetd
            1. 10.1.1.1.1. Setting Up inetd
            2. 10.1.1.1.2. Controlling Access via TCP Wrappers
          2. 10.1.1.2. Configuring xinetd
            1. 10.1.1.2.1. Setting Up xinetd
            2. 10.1.1.2.2. Controlling Access via xinetd
        2. 10.1.2. Disabling Unused Servers
          1. 10.1.2.1. Using netstat
          2. 10.1.2.2. Using lsof
          3. 10.1.2.3. Using Remote Network Scanners
          4. 10.1.2.4. Examining Configuration Files
          5. 10.1.2.5. Uninstalling or Reconfiguring Servers
      2. 10.2. Administering Local Security
        1. 10.2.1. Securing Passwords
          1. 10.2.1.1. Password Risks
          2. 10.2.1.2. Choosing a Good Password
          3. 10.2.1.3. Tools for Managing Passwords
        2. 10.2.2. Limiting root Access
        3. 10.2.3. Setting Login, Process, and Memory Limits
        4. 10.2.4. Locating SUID/SGID Files
      3. 10.3. Configuring SSH
        1. 10.3.1. SSH Basics
        2. 10.3.2. Setting SSH Options for Your System
          1. 10.3.2.1. Configuring Basic SSH Features
          2. 10.3.2.2. SSH Keys
          3. 10.3.2.3. Controlling SSH Access
          4. 10.3.2.4. Copying Files via SSH
          5. 10.3.2.5. Configuring Logins without Passwords
          6. 10.3.2.6. Using ssh-agent
          7. 10.3.2.7. Using SSH Login Scripts
          8. 10.3.2.8. Setting Up SSH Port Tunnels
        3. 10.3.3. SSH Security Considerations
      4. 10.4. Using GPG
        1. 10.4.1. Generating and Importing Keys
        2. 10.4.2. Encrypting and Decrypting Data
        3. 10.4.3. Signing Messages and Verifying Signatures
      5. 10.5. Summary
      6. 10.6. Exam Essentials
      7. 10.7. Review Questions
      8. 10.8. Answers to Review Questions
  8. A. About the Companion CD
    1. A.1. What You'll Find on the CD
      1. A.1.1. Sybex Test Engine
      2. A.1.2. PDF of the Book
      3. A.1.3. Adobe Reader
      4. A.1.4. Electronic Flashcards
    2. A.2. System Requirements
    3. A.3. Using the CD
    4. A.4. Troubleshooting
      1. A.4.1. Customer Care
  9. Glossary