Index
I
ICMP (Internet Control Message Protocol)blocking, Changing ipchains firewall rules
smurfing attacks, Smurf amplification attack
ICMP messagesfirewalls and, Understanding iptables
ICS (Internet Chess Servers), Chess games
id command, Checking your login session
id Softwarecommercial games, id Software Games, Unreal Tournament, Return to Castle Wolfenstein
id Software Web site, Where to get information on Linux gaming
IEproxy serversconfiguration, Configuring Internet Explorer to use a proxy
if statementsnested, shell scripts, The case command
if...then loopshell scripts, Table 12-2: Operators for Test Expressions
if...then statementshell scripts, The "if… then" statements
ifcfg-ppp0 file, Looking at the ifcfg-ppp0 file
ifconfig command, Is your Ethernet connection up?
IgnoreDots option, sendmail, sendmail options
iMACAppleTalk and, Configuring an AppleTalk Server in Linux
Ethernet jacks, Using Network Services from Mac OS X
OS/X and, Chapter 26: Using Linux Servers from a Mac
image gallery, Konqueror, Creating an Image Gallery with Konqueror
images.See also graphics; pictures, Adding equations, tables, and pictures
IMAP (Internet Message Protocol), E-mail servers
IMAP (Internet Message Protocol) server, Connecting to the mail server
IMAP protocolsecurity, Using TCP wrappers
imap service, Managing xinetd services
Impress (OpenOffice), Other Word Processors
incoming connection, public servers, Choosing an ISP
incremental backup, Incremental backup
indexed filesApache server, Defining indexing, Figure 21-2: Change how directories are displayed from Apache using IndexOptions., Setting responses to browsers
indexesApache server root directory, Disabling indexes in root directory
indoor antennas, wireless LANs, Using indoor antennas
information serversnetwork services reference, Information servers
RARP, Reverse Address Resolution Protocol server
DNS, Domain Name System server
LDAP, Lightweight Directory Access Protocol server
DHCP, Dynamic Host Configuration Protocol server
init programstarting, Starting init
valid actions, Format of the inittab file, Table 12-3: Valid init Actions
init.d start-up scripts, network services, The init.d start-up scripts
initdefaultdefault run level, Starting run-level scripts
initializationsystem initialization, System Initialization
initialization, system initialization, The inittab file, Format of the inittab file, Table 12-3: Valid init Actions, Breakdown of the inittab file, Table 12-4: Possible Run Levels, Breakdown of the inittab file
inittab file, Administrative configuration files, The inittab file, Format of the inittab file, Table 12-3: Valid init Actions, Breakdown of the inittab file, Table 12-4: Possible Run Levels, Breakdown of the inittab file
run levels, Breakdown of the inittab file, Table 12-4: Possible Run Levels
inmod command, Loading modules
INNnews users, Starting with INN
INN (Internet Network News) server, News server
INN (InterNetworkNews) news server, Chapter 22: Setting Up a News Server
INN news serverconfiguration, Configuring an INN News Server, Starting with INN
inn.conf file, Configuring the INN server, General parameters, News feed parameters, Article storage parameters, Reading parameters, Posting parameters, Posting exponential backoff parameters, Monitoring parameters, Logging parameters, News directory parameters, Configuring hosts to feed you
directory files, Starting with INN
cron.daily file, Starting with INN
logins, Allowing Users to Access Your Server
read access, Starting with INN
sendmail, Starting with INN
spool directories, Starting with INN
starting, Starting the News Service
inn.conf file, Configuring the INN server
article storage parameters, Article storage parameters
backoff parameters, Posting exponential backoff parameters
general parameters, General parameters, News feed parameters
logging parameters, Logging parameters
monitoring parameters, Monitoring parameters
news directory parameters, News directory parameters, Configuring hosts to feed you
news feed parameters, News feed parameters
parameters, News feed parameters, Posting parameters, Logging parameters
posting parameters, Posting parameters
reading parameters, Reading parameters, Posting parameters
system tuning parameters, System tuning parameters
innd daemon, Understanding News Transports
innfeed program, Configuring hosts that you feed
innflags parameter, inn.conf file, General parameters
inodes, Creating quota rules
quotas and, Using quota to check disk usage
INPUT chain rules, Example 1: Firewall for shared Internet connection (plus servers)
input devicesXF86Config file, Understanding the XF86Config file
insecure portsMAC OS X and NFS, Connecting to NFS from the Connect to Server window
insmod command, Administering Your Red Hat Linux System
install server setup, Setting up an HTTP, FTP, or NFS install server, Configuring an install server using files, Web server, Hard disk install
installation, Beginning the installation
applicationsauthentication, Enabling Authentication, Running Red Hat Setup Agent
authentication andboot disk, Quick Installation
boot procedure, Beginning the installation
ease of, Why Choose Red Hat Linux?
firewallsfloppy disk install disks, Creating install floppy disks, Creating a floppy disk in Linux, Creating a disk in DOS
FTP server and, From CD, network, or hard disk?
gateway and, Beginning the installation
GRUB boot manager, Quick Installation
hard disk and, From CD, network, or hard disk?
hardwareconfiguration, Beginning the installation
Disk Druid, Partitioning with Disk Druid during installation, Deleting, adding, and editing partitions, Partitioning with fdisk, Tips for creating partitions
local, from desktop, Setting Up Printers, Configuring local printers
MD5 passwords, Enabling Authentication
RPM files, Installing and managing RPM files, Installing with rpm, Upgrading packages with rpm, Removing packages with rpm, Querying packages with rpm, Verifying packages with rpm
source code, Building and installing from source code, Installing software in SRPMS format, Installing software in gzip/tar format
strategies, Beginning the installation
system requirements, Choosing computer hardware
hostname and, Beginning the installation
HTTP, From CD, network, or hard disk?
Install type, Quick Installation
Kerberos 5 and, Enabling Authentication
Kernel Parameters, Beginning the installation
kernel source code, Installing kernel source code
keyboard and, Beginning the installation
kickstart installation, Choosing computer hardware, Performing a kickstart installation, Creating the kickstart file, Installing the kickstart file, Booting a kickstart installation
language, Beginning the installation
language support, Quick Installation, Beginning the installation
laptops, Installing Red Hat Linux on a Laptop
LDAP enabling, Enabling Authentication
LogSentry, Downloading and installing LogSentry
LVM volume, Partitioning with Disk Druid during installation, Deleting, adding, and editing partitions
majordomo, Installing majordomo
MBR, Beginning the installation
media types, Installing from other media, Configuring an install server using files, FTP server
methods for, Choosing an installation method, From CD, network, or hard disk?
Microsoft Office, Investigating your desktop
modes, Choosing Different Install Modes
mouse and, Beginning the installation
networksconfiguration, Quick Installation
NFS server and, From CD, network, or hard disk?
NIS server and, Enabling Authentication
packages, Quick Installation, Beginning the installation, Installing More Red Hat Linux Packages
partitioning and, Partitioning your disks, Partitioning with Disk Druid during installation, Deleting, adding, and editing partitions, Partitioning with fdisk, Tips for creating partitions
partitions, Quick Installation
partitions andpersonal desktop, Quick Installation, Beginning the installation
PortSentry, Downloading and installing PortSentry
Primary DNS, Beginning the installation
printersquick installation, Quick Installation
RAID and, Partitioning with Disk Druid during installation
RAID disks, Using RAID disks
RPMsyum and, Running yum to download and install RPMs
Samba, Getting and installing Samba
sendmail, Installing and Running sendmail, Starting sendmail, Table 19-2: Other Related Sendmail Programs, Logging performed by sendmail
Server, Beginning the installation
SMB authentication, Running Red Hat Setup Agent
sndconfig package, Configuring your sound card
special procedures, Special Installation Procedures, Beginning installation, Configuring an install server using files, FTP server, Creating the kickstart file, Installing the kickstart file, Booting a kickstart installation
time zone, Quick Installation, Beginning the installation
troubleshooting, Troubleshooting Your Installation
upgrade comparison, Install or upgrade?
upgrades, Quick Installation
user accounts, Beginning the installation
VFAT file system, Partitioning with Disk Druid during installation, Reasons for partitioning
Welcome screen, Beginning the installation
wireless Linux software, Installing wireless Linux software
workstation, Beginning the installation
installationsCustom System, Beginning the installation
Instant Messenger, AOLGaim, Participating in AOL Instant Messaging with Gaim
Intel video cards, Choosing a video card for gaming
interfacefirewalls and, Example 1: Firewall for shared Internet connection (plus servers)
restarting, wireless configuration, Checking your wireless connection
wireless configuration, Configuring the wireless interface
interfaces, What Is an Operating System?
. See also GUI, Common Linux Features
gamingactivation, Activating the wireless interfaces
launching, Using Red Hat graphical administration tools
public servers, Configuring networking
X Window System, GNOME games, Table 7-1: GNOME Games, KDE games, Table 7-2: Games for the KDE Desktop, KDE games, Chess games, Freeciv, Starting Freeciv, Beginning with Freeciv, Building your civilization, Exploring your world, Using more controls and actions
checking processes, Checking system activity
checking user identity, Checking your login session
command line, Using the Shell in Red Hat Linux
command line editing, Command-line editing
current directory, Checking directories and permissions
exiting, Exiting the shell
help, Getting Help with Using the Shell
history command, Rerunning commands
locating commands, Locating commands
OpenGL support, Configuring video cards for gaming
graphical administrative, Using Red Hat graphical administration tools
networkSamba server, Security options
shelloverview, Understanding the Red Hat Linux Shell
prompts, The Shell Interface
wireless LANs
Internetapplication downloadclients, setup, Setting up Proxy Clients, Configuring Mozilla to use a proxy, Configuring Internet Explorer to use a proxy, Configuring Mosaic and Lynx browsers to use a proxy
commonly used, Common top-level domain names
configuration, Configuring the Red Hat Linux router, Enable forwarding and masquerading
LANs, Connecting your LAN to the Internet, Setting up Red Hat Linux as a Router
Mozilla, Downloading with Mozilla
ncFTP, Downloading with ncFTP
Netscape, Downloading with Mozilla
network clients, Configuring network clients
network clients, Windows, Configuring Windows network clients
packages, Understanding package names and formats, Using different archive and document formats, Table 5-2: Linux Archive File Formats, Using different archive and document formats
PPP, Getting information, Setting up dial-up PPP, Creating a dial-up connection with the Internet Configuration Wizard, Launching your PPP connection, Launching your PPP connection on demand, Checking your PPP connection, Checking that your modem was detected, Checking that your PPP interface is working, Checking the default route, Checking that the name servers are set, Checking the chap-secrets or pap-secrets file, Looking at the ifcfg-ppp0 file, Running debugging
SLIP, Getting information
squid daemon, Starting the squid daemon, Using a simple squid.conf file, Modifying the Squid configuration file, Configuring access control in squid.conf, Configuring caching in squid.conf
squid daemon, debugging, Debugging Squid, Checking Squid log files
Web sites, Finding applications on the Internet
connectiondial-up connections, Using Dial-up Connections to the Internet
DNS, Internet domains
domain names, Understanding How the Internet Is Structured, Domain-name formation, Host names and IP addresses
domains, Internet domains, Common top-level domain names, Domain-name formation
firewalls, Understanding How the Internet Is Structured
host names, Understanding How the Internet Is Structured
overview, Understanding How the Internet Is Structured, Internet domains, Common top-level domain names, Domain-name formation, Host names and IP addresses, Proxies
port numbers, Understanding How the Internet Is Structured
proxies, Internet domains
proxy server, Proxies
Red Hat as proxy server, Setting up Red Hat Linux as a Proxy Server
Red Hat as router, Setting up Red Hat Linux as a Router
routers, Understanding How the Internet Is Structured, Routing
TLDs, Internet domains
Internet Configuration Wizard, Setting up dial-up PPP, Creating a dial-up connection with the Internet Configuration Wizard
Internet Search, Mozilla, Setting Navigator preferences
Internet Software Consortium, Getting a list of active newsgroups
intrusion attacks, Spam relaying
intrustion attacksprotection from, Protecting Against Intrusion Attacks
IPmasquerading, Using iptables to do NAT or IP Masquerading
IP addresses, Understanding IP Addresses, Understanding How the Internet Is Structured
assigning, Getting IP addresses
CIDR, Understanding IP Addresses
classes, IP address classes
classes inter-domain routing, Classless Inter-Domain Routing
connection speed, Choosing a connection speed
DNS server, Identifying your DNS servers
dynamic, Understanding IP Addresses
host names and, Host names and IP addresses
host names, adding, Identifying other computers (hosts and DNS)
hosts file, Configuring TCP/IP for your LAN
installation and, Beginning the installation
netmasks, Understanding netmasks
static, Understanding IP Addresses, Getting static IP addresses
IP macros (publishing tools), Creating a man page with Groff
IP masquerading, Understanding How the Internet Is Structured
IP network, exports file, Host names in /etc/exports
ipchainsfirewalls, Protecting Your Network with Firewalls
ipchains firewallconfiguring, Configuring an ipchains firewall, Understanding ipchains firewall rules, Table 14-4: Ipchains Optional Parameters, Understanding ipchains firewall rules, Changing ipchains firewall rules, Saving ipchains firewall rules
IPP (Internet Printing Protocol)CUPS and, Common UNIX Printing Service
IPSEC (Internet Protocol Security)VPN and, Configuring a Virtual Private Network Connection
iptablesallowing TCP and IRC, Allowing FTP and IRC services through an iptables firewall
enhancing, Enhancing your iptables firewall, Understanding the messages logfile
firewallsconfiguration, Configuring an iptables firewall, Turning on iptables, Creating iptables firewall rules, Example 1: Firewall for shared Internet connection (plus servers), Example 2: Firewall for shared Internet connection (no servers), Example 3: Firewall for single Linux system with Internet connection
viewing current, Configuring a simple firewall
IP and NAT masquerading, Using iptables to do NAT or IP Masquerading
logging, Using logging with iptables
logging and, Using logging with iptables
overview, Understanding iptables
port forwarding, Using iptables to do port forwarding
transparent proxies, Using iptables as a transparent proxy
iptables run-level script, Table 12-5: Run-Level Scripts Contained in /etc/init.d
iptables, firewalls, Protecting Your Network with Firewalls
iptables-save command, Creating iptables firewall rules
IRCconnectionsfirewalls and, Turning on iptables
IRC (Internet Relay Chat)Mozilla and, Web browsing with Mozilla
ISDN (Integrated Services Digital Network), Choosing a connection speed
ISO (International Organization for Standardization), Internet domains
iso9660 file system, Supported file systems
ISPs (Internet service providers), Understanding How the Internet Is Structured
ISPs, selecting for public servers, Choosing an ISP, Choosing a connection speed
connection speed, Choosing a connection speed
domain name, Getting a domain name, Checking domain name availability
reserving, Reserving a domain name
static IP addresses, Getting static IP addresses
terms of service, Checking Terms of Service
issue file, Administrative configuration files
issue.net file, Administrative configuration files
iwconfig command, Setting wireless extensions, Table 15-2: Options to the iwconfig Command, Checking wireless settings
iwlist command, Checking wireless settings