List of Figures
Chapter 3: Interface Basics
Figure 3-1: The Bluecurve GNOME desktop
Chapter 4: Red Hat System Configuration
Figure 4-1: Red Hat administrative tools
Figure 4-2: The Red Hat User Manager, redhat-config-users
Figure 4-3: rehat-config-printer
Figure 4-4: The redhat-config-xfree86 Display Settings window
Figure 4-5: redhat-config-packages
Figure 4-6: Authentication with authconfig-gtk
Chapter 5: Red Hat Network Configuration
Figure 5-1: The redhat-config-network Network Configuration window
Figure 5-2: The redhat-config-network DNS panel
Figure 5-3: Device configuration in redhat-config-network
Figure 5-4: Internet Connection Wizard
Figure 5-5: redhat-config-securitylevel
Figure 5-6: DNS server operation
Figure 5-7: DNS server and network
Figure 5-8: redhat-config-bind example
Figure 5-9: redhat-config-bind master zone
Figure 5-10: Adding a host
Chapter 6: GNOME
Figure 6-1: GNOME
Figure 6-2: Nautilus file manager
Figure 6-3: File properties on Nautilus
Figure 6-4: The GNOME panel
Chapter 7: The K Desktop Environment: KDE
Figure 7-1: The KDE desktop
Figure 7-2: The desktop dialog box
Figure 7-3: KDE panel
Figure 7-4: The KDE file manager
Figure 7-5: KDE Control Center
Chapter 10: Managing Linux Files, Directories, and Archives
Figure 10-1: File information displayed using the
-l option for the
ls command
Figure 10-2: The Linux file structure beginning at the root directory
Figure 10-3: Directory pathnames
Figure 10-4: File Roller archiving and compression tool
Chapter 11: Office and Database Applications
Figure 11-1: OpenOffice''s OpenWriter word processor
Chapter 14: Web, FTP, and Java Clients
Figure 14-1: Mozilla Web browser
Chapter 16: Encryption, Integrity Checks, and Signatures—GNU Privacy Guard
Figure 16-1: Public-key encryption and digital signatures
Chapter 17: Internet Protocol Security: IPsec
Figure 17-1: IPsec on redhatconfig- network
Chapter 18: Secure Shell and Kerberos
Figure 18-1: SSH setup and access
Figure 18-2: Kerberos authentication
Chapter 19: Network Firewalls: Netfilter
Figure 19-1: A network with a firewall
Figure 19-2: Firewall rules applied to a local network example
Chapter 20: Server Management
Figure 20-1: redhat-configservices
Chapter 22: Web Servers: Apache
Figure 22-1: Apache Configuration Tool
Chapter 25: Print Servers
Figure 25-1: CUPS Add Printer page
Chapter 27: Basic System Administration
Figure 27-1: redhat-config-date, Date & Time tool
Figure 27-2: Red Hat Log Viewer
Figure 27-3: Procman System Manager
Chapter 31: RAID and LVM
Figure 31-1: RAID devices
Figure 31-2: Logical Volume Management
Chapter 33: Kernel Administration
Figure 33-1: The xconfig Linux Kernel Configuration tool, kernel 2.4
Figure 33-2: The gconfig Linux Kernel Configuration tool, kernel 2.6
Chapter 34: Domain Name System
Figure 34-1: DNS server operation
Figure 34-2: DNS server and network
Chapter 36: NFS and NIS
Figure 36-1: Red Hat NFS Configuration Tool
Chapter 37: Samba
Figure 37-1: redhat-config-samba
Figure 37-2: SWAT home page
Figure 37-3: SWAT Share page showing Homes section
Figure 37-4: SWAT Global Variables page
Figure 37-5: SWAT Samba share
Chapter 38: Administering TCP/IP Networks
Figure 38-1: Class-based netmask operations
Figure 38-2: CIDR addressing
Figure 38-3: Class-based and CIDR broadcast addressing