C++ CSS HTML Java JavaScript MySQL Oracle PERL PHP SQL Unix VBScript XHTML XML Сети

Red Hat Linux 9

 

Red Hat Linux 9

Red Hat Linux Customization Guide


Table of Contents
Introduction
1. Changes to This Manual
2. Document Conventions
3. More to Come
3.1. Send in Your Feedback
4. Sign Up for Support
I. File Systems
1. The ext3 File System
1.1. Features of ext3
1.2. Creating an ext3 File System
1.3. Converting to an ext3 File System
1.4. Reverting to an ext2 File System
2. Swap Space
2.1. What is Swap Space?
2.2. Adding Swap Space
2.3. Removing Swap Space
2.4. Moving Swap Space
3. Redundant Array of Independent Disks (RAID)
3.1. What is RAID?
3.2. Who Should Use RAID?
3.3. Hardware RAID versus Software RAID
3.4. RAID Levels and Linear Support
4. Logical Volume Manager (LVM)
5. Managing Disk Storage
5.1. Viewing the Partition Table
5.2. Creating a Partition
5.3. Removing a Partition
5.4. Resizing a Partition
6. Implementing Disk Quotas
6.1. Configuring Disk Quotas
6.2. Managing Disk Quotas
6.3. Additional Resources
II. Installation-Related Information
7. Kickstart Installations
7.1. What are Kickstart Installations?
7.2. How Do You Perform a Kickstart Installation?
7.3. Creating the Kickstart File
7.4. Kickstart Options
7.5. Package Selection
7.6. Pre-installation Script
7.7. Post-installation Script
7.8. Making the Kickstart File Available
7.9. Making the Installation Tree Available
7.10. Starting a Kickstart Installation
8. Kickstart Configurator
8.1. Basic Configuration
8.2. Installation Method
8.3. Boot Loader Options
8.4. Partition Information
8.5. Network Configuration
8.6. Authentication
8.7. Firewall Configuration
8.8. X Configuration
8.9. Package Selection
8.10. Pre-Installation Script
8.11. Post-Installation Script
8.12. Saving the File
9. Basic System Recovery
9.1. Common Problems
9.2. Booting into Rescue Mode
9.3. Booting into Single-User Mode
9.4. Booting into Emergency Mode
10. Software RAID Configuration
11. LVM Configuration
III. Network-Related Configuration
12. Network Configuration
12.1. Overview
12.2. Establishing an Ethernet Connection
12.3. Establishing an ISDN Connection
12.4. Establishing a Modem Connection
12.5. Establishing an xDSL Connection
12.6. Establishing a Token Ring Connection
12.7. Establishing a CIPE Connection
12.8. Establishing a Wireless Connection
12.9. Managing DNS Settings
12.10. Managing Hosts
12.11. Activating Devices
12.12. Working with Profiles
12.13. Device Aliases
13. Basic Firewall Configuration
13.1. Security Level Configuration Tool
13.2. GNOME Lokkit
13.3. Activating the iptables Service
14. Controlling Access to Services
14.1. Runlevels
14.2. TCP Wrappers
14.3. Services Configuration Tool
14.4. ntsysv
14.5. chkconfig
14.6. Additional Resources
15. OpenSSH
15.1. Why Use OpenSSH?
15.2. Configuring an OpenSSH Server
15.3. Configuring an OpenSSH Client
15.4. Additional Resources
16. Network File System (NFS)
16.1. Why Use NFS?
16.2. Mounting NFS File Systems
16.3. Exporting NFS File Systems
16.4. Additional Resources
17. Samba
17.1. Why Use Samba?
17.2. Configuring a Samba Server
17.3. Connecting to a Samba Share
17.4. Additional Resources
18. Dynamic Host Configuration Protocol (DHCP)
18.1. Why Use DHCP?
18.2. Configuring a DHCP Server
18.3. Configuring a DHCP Client
18.4. Additional Resources
19. Apache HTTP Server Configuration
19.1. Basic Settings
19.2. Default Settings
19.3. Virtual Hosts Settings
19.4. Server Settings
19.5. Performance Tuning
19.6. Saving Your Settings
19.7. Additional Resources
20. Apache HTTP Secure Server Configuration
20.1. Introduction
20.2. An Overview of Security-Related Packages
20.3. An Overview of Certificates and Security
20.4. Using Pre-Existing Keys and Certificates
20.5. Types of Certificates
20.6. Generating a Key
20.7. Generating a Certificate Request to Send to a CA
20.8. Creating a Self-Signed Certificate
20.9. Testing The Certificate
20.10. Accessing The Server
20.11. Additional Resources
21. BIND Configuration
21.1. Adding a Forward Master Zone
21.2. Adding a Reverse Master Zone
21.3. Adding a Slave Zone
22. Authentication Configuration
22.1. User Information
22.2. Authentication
22.3. Command Line Version
23. Mail Transport Agent (MTA) Configuration
IV. System Configuration
24. Console Access
24.1. Disabling Shutdown Via Ctrl-Alt-Del
24.2. Disabling Console Program Access
24.3. Disabling All Console Access
24.4. Defining the Console
24.5. Making Files Accessible From the Console
24.6. Enabling Console Access for Other Applications
24.7. The floppy Group
25. User and Group Configuration
25.1. Adding a New User
25.2. Modifying User Properties
25.3. Adding a New Group
25.4. Modifying Group Properties
25.5. Command Line Configuration
25.6. Explaining the Process
26. Gathering System Information
26.1. System Processes
26.2. Memory Usage
26.3. File Systems
26.4. Hardware
26.5. Additional Resources
27. Printer Configuration
27.1. Adding a Local Printer
27.2. Adding an IPP Printer
27.3. Adding a Remote UNIX (LPD) Printer
27.4. Adding a Samba (SMB) Printer
27.5. Adding a Novell NetWare (NCP) Printer
27.6. Adding a JetDirect Printer
27.7. Selecting the Printer Model and Finishing
27.8. Printing a Test Page
27.9. Modifying Existing Printers
27.10. Saving the Configuration File
27.11. Command Line Configuration
27.12. Managing Print Jobs
27.13. Sharing a Printer
27.14. Switching Print Systems
27.15. Additional Resources
28. Automated Tasks
28.1. Cron
28.2. Anacron
28.3. At and Batch
28.4. Additional Resources
29. Log Files
29.1. Locating Log Files
29.2. Viewing Log Files
29.3. Examining Log Files
30. Upgrading the Kernel
30.1. The 2.4 Kernel
30.2. Preparing to Upgrade
30.3. Downloading the Upgraded Kernel
30.4. Performing the Upgrade
30.5. Verifying the Initial RAM Disk Image
30.6. Verifying the Boot Loader
31. Kernel Modules
31.1. Kernel Module Utilities
31.2. Additional Resources
V. Package Management
32. Package Management with RPM
32.1. RPM Design Goals
32.2. Using RPM
32.3. Checking a Package's Signature
32.4. Impressing Your Friends with RPM
32.5. Additional Resources
33. Package Management Tool
33.1. Installing Packages
33.2. Removing Packages
34. Red Hat Network
VI. Appendixes
A. Building a Custom Kernel
A.1. Preparing to Build
A.2. Building the Kernel
A.3. Building a Monolithic Kernel
A.4. Additional Resources
B. Getting Started with Gnu Privacy Guard
B.1. Configuration File
B.2. Warning Messages
B.3. Generating a Keypair
B.4. Generating a Revocation Certificate
B.5. Exporting your Public Key
B.6. Importing a Public Key
B.7. What Are Digital Signatures?
B.8. Additional Resources
Index
Colophon
© 2000- NIV