Index - Red Hat Linux Bible: Fedora and Enterprise Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Red Hat Linux Bible: Fedora and Enterprise Edition [Electronic resources] - نسخه متنی

Christopher Negus

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
توضیحات
افزودن یادداشت جدید






Index


I


ICMP (Internet Control Message Protocol)

blocking, Changing ipchains firewall rules

smurfing attacks, Smurf amplification attack

ICMP messages

firewalls and, Understanding iptables

ICS (Internet Chess Servers), Chess games

id command, Checking your login session

id Software

commercial games, id Software Games, Unreal Tournament, Return to Castle Wolfenstein

id Software Web site, Where to get information on Linux gaming

IE

proxy servers

configuration, Configuring Internet Explorer to use a proxy

if statements

nested, shell scripts, The case command

if...then loop

shell scripts, Table 12-2: Operators for Test Expressions

if...then statement

shell scripts, The "if… then" statements

ifcfg-ppp0 file, Looking at the ifcfg-ppp0 file

ifconfig command, Is your Ethernet connection up?

IgnoreDots option, sendmail, sendmail options

iMAC

AppleTalk and, Configuring an AppleTalk Server in Linux

Ethernet jacks, Using Network Services from Mac OS X

OS/X and, Chapter 26: Using Linux Servers from a Mac

image gallery, Konqueror, Creating an Image Gallery with Konqueror


images

.See also graphics; pictures, Adding equations, tables, and pictures

IMAP (Internet Message Protocol), E-mail servers

IMAP (Internet Message Protocol) server, Connecting to the mail server

IMAP protocol

security, Using TCP wrappers

imap service, Managing xinetd services

Impress (OpenOffice), Other Word Processors

incoming connection, public servers, Choosing an ISP

incremental backup, Incremental backup

indexed files

Apache server, Defining indexing, Figure 21-2: Change how directories are displayed from Apache using IndexOptions., Setting responses to browsers

indexes

Apache server root directory, Disabling indexes in root directory

indoor antennas, wireless LANs, Using indoor antennas

information servers

network services reference, Information servers

RARP, Reverse Address Resolution Protocol server

DNS, Domain Name System server

LDAP, Lightweight Directory Access Protocol server

DHCP, Dynamic Host Configuration Protocol server

init program

starting, Starting init

valid actions, Format of the inittab file, Table 12-3: Valid init Actions

init.d start-up scripts, network services, The init.d start-up scripts

initdefault

default run level, Starting run-level scripts

initialization

system initialization, System Initialization

initialization, system initialization, The inittab file, Format of the inittab file, Table 12-3: Valid init Actions, Breakdown of the inittab file, Table 12-4: Possible Run Levels, Breakdown of the inittab file

inittab file, Administrative configuration files, The inittab file, Format of the inittab file, Table 12-3: Valid init Actions, Breakdown of the inittab file, Table 12-4: Possible Run Levels, Breakdown of the inittab file

run levels, Breakdown of the inittab file, Table 12-4: Possible Run Levels

inmod command, Loading modules

INN

news users, Starting with INN

INN (Internet Network News) server, News server

INN (InterNetworkNews) news server, Chapter 22: Setting Up a News Server


INN news server

configuration, Configuring an INN News Server, Starting with INN

inn.conf file, Configuring the INN server, General parameters, News feed parameters, Article storage parameters, Reading parameters, Posting parameters, Posting exponential backoff parameters, Monitoring parameters, Logging parameters, News directory parameters, Configuring hosts to feed you

directory files, Starting with INN

cron.daily file, Starting with INN

logins, Allowing Users to Access Your Server

read access, Starting with INN

sendmail, Starting with INN

spool directories, Starting with INN

starting, Starting the News Service

inn.conf file, Configuring the INN server

article storage parameters, Article storage parameters

backoff parameters, Posting exponential backoff parameters

general parameters, General parameters, News feed parameters

logging parameters, Logging parameters

monitoring parameters, Monitoring parameters

news directory parameters, News directory parameters, Configuring hosts to feed you

news feed parameters, News feed parameters

parameters, News feed parameters, Posting parameters, Logging parameters

posting parameters, Posting parameters

reading parameters, Reading parameters, Posting parameters

system tuning parameters, System tuning parameters

innd daemon, Understanding News Transports

innfeed program, Configuring hosts that you feed

innflags parameter, inn.conf file, General parameters

inodes, Creating quota rules

quotas and, Using quota to check disk usage

INPUT chain rules, Example 1: Firewall for shared Internet connection (plus servers)

input devices

XF86Config file, Understanding the XF86Config file

insecure ports

MAC OS X and NFS, Connecting to NFS from the Connect to Server window

insmod command, Administering Your Red Hat Linux System

install server setup, Setting up an HTTP, FTP, or NFS install server, Configuring an install server using files, Web server, Hard disk install

installation, Beginning the installation

applications

authentication, Enabling Authentication, Running Red Hat Setup Agent

authentication and

boot disk, Quick Installation

boot procedure, Beginning the installation

ease of, Why Choose Red Hat Linux?

firewalls

floppy disk install disks, Creating install floppy disks, Creating a floppy disk in Linux, Creating a disk in DOS

FTP server and, From CD, network, or hard disk?

gateway and, Beginning the installation

GRUB boot manager, Quick Installation

hard disk and, From CD, network, or hard disk?

hardware

configuration, Beginning the installation

Disk Druid, Partitioning with Disk Druid during installation, Deleting, adding, and editing partitions, Partitioning with fdisk, Tips for creating partitions

local, from desktop, Setting Up Printers, Configuring local printers

MD5 passwords, Enabling Authentication

RPM files, Installing and managing RPM files, Installing with rpm, Upgrading packages with rpm, Removing packages with rpm, Querying packages with rpm, Verifying packages with rpm

source code, Building and installing from source code, Installing software in SRPMS format, Installing software in gzip/tar format

strategies, Beginning the installation

system requirements, Choosing computer hardware

hostname and, Beginning the installation

HTTP, From CD, network, or hard disk?

Install type, Quick Installation

Kerberos 5 and, Enabling Authentication

Kernel Parameters, Beginning the installation

kernel source code, Installing kernel source code

keyboard and, Beginning the installation

kickstart installation, Choosing computer hardware, Performing a kickstart installation, Creating the kickstart file, Installing the kickstart file, Booting a kickstart installation

language, Beginning the installation

language support, Quick Installation, Beginning the installation

laptops, Installing Red Hat Linux on a Laptop

LDAP enabling, Enabling Authentication

LogSentry, Downloading and installing LogSentry

LVM volume, Partitioning with Disk Druid during installation, Deleting, adding, and editing partitions

majordomo, Installing majordomo

MBR, Beginning the installation

media types, Installing from other media, Configuring an install server using files, FTP server

methods for, Choosing an installation method, From CD, network, or hard disk?

Microsoft Office, Investigating your desktop

modes, Choosing Different Install Modes

mouse and, Beginning the installation

networks

configuration, Quick Installation

NFS server and, From CD, network, or hard disk?

NIS server and, Enabling Authentication

packages, Quick Installation, Beginning the installation, Installing More Red Hat Linux Packages

partitioning and, Partitioning your disks, Partitioning with Disk Druid during installation, Deleting, adding, and editing partitions, Partitioning with fdisk, Tips for creating partitions

partitions, Quick Installation

partitions and

personal desktop, Quick Installation, Beginning the installation

PortSentry, Downloading and installing PortSentry

Primary DNS, Beginning the installation

printers

quick installation, Quick Installation

RAID and, Partitioning with Disk Druid during installation

RAID disks, Using RAID disks

RPMs

yum and, Running yum to download and install RPMs

Samba, Getting and installing Samba

sendmail, Installing and Running sendmail, Starting sendmail, Table 19-2: Other Related Sendmail Programs, Logging performed by sendmail

Server, Beginning the installation

SMB authentication, Running Red Hat Setup Agent

sndconfig package, Configuring your sound card

special procedures, Special Installation Procedures, Beginning installation, Configuring an install server using files, FTP server, Creating the kickstart file, Installing the kickstart file, Booting a kickstart installation

time zone, Quick Installation, Beginning the installation

troubleshooting, Troubleshooting Your Installation

upgrade comparison, Install or upgrade?

upgrades, Quick Installation

user accounts, Beginning the installation

VFAT file system, Partitioning with Disk Druid during installation, Reasons for partitioning

Welcome screen, Beginning the installation

wireless Linux software, Installing wireless Linux software

workstation, Beginning the installation

installations

Custom System, Beginning the installation

Instant Messenger, AOL

Gaim, Participating in AOL Instant Messaging with Gaim

Intel video cards, Choosing a video card for gaming

interface

firewalls and, Example 1: Firewall for shared Internet connection (plus servers)

restarting, wireless configuration, Checking your wireless connection

wireless configuration, Configuring the wireless interface


interfaces, What Is an Operating System?

. See also GUI, Common Linux Features

gaming

activation, Activating the wireless interfaces

launching, Using Red Hat graphical administration tools

public servers, Configuring networking

X Window System, GNOME games, Table 7-1: GNOME Games, KDE games, Table 7-2: Games for the KDE Desktop, KDE games, Chess games, Freeciv, Starting Freeciv, Beginning with Freeciv, Building your civilization, Exploring your world, Using more controls and actions

checking processes, Checking system activity

checking user identity, Checking your login session

command line, Using the Shell in Red Hat Linux

command line editing, Command-line editing

current directory, Checking directories and permissions

exiting, Exiting the shell

help, Getting Help with Using the Shell

history command, Rerunning commands

locating commands, Locating commands

OpenGL support, Configuring video cards for gaming

graphical administrative, Using Red Hat graphical administration tools

network

Samba server, Security options

shell

overview, Understanding the Red Hat Linux Shell

prompts, The Shell Interface

wireless LANs


Internet

application download

clients, setup, Setting up Proxy Clients, Configuring Mozilla to use a proxy, Configuring Internet Explorer to use a proxy, Configuring Mosaic and Lynx browsers to use a proxy

commonly used, Common top-level domain names

configuration, Configuring the Red Hat Linux router, Enable forwarding and masquerading

LANs, Connecting your LAN to the Internet, Setting up Red Hat Linux as a Router

Mozilla, Downloading with Mozilla

ncFTP, Downloading with ncFTP

Netscape, Downloading with Mozilla

network clients, Configuring network clients

network clients, Windows, Configuring Windows network clients

packages, Understanding package names and formats, Using different archive and document formats, Table 5-2: Linux Archive File Formats, Using different archive and document formats

PPP, Getting information, Setting up dial-up PPP, Creating a dial-up connection with the Internet Configuration Wizard, Launching your PPP connection, Launching your PPP connection on demand, Checking your PPP connection, Checking that your modem was detected, Checking that your PPP interface is working, Checking the default route, Checking that the name servers are set, Checking the chap-secrets or pap-secrets file, Looking at the ifcfg-ppp0 file, Running debugging

SLIP, Getting information

squid daemon, Starting the squid daemon, Using a simple squid.conf file, Modifying the Squid configuration file, Configuring access control in squid.conf, Configuring caching in squid.conf

squid daemon, debugging, Debugging Squid, Checking Squid log files

Web sites, Finding applications on the Internet

connection

dial-up connections, Using Dial-up Connections to the Internet

DNS, Internet domains

domain names, Understanding How the Internet Is Structured, Domain-name formation, Host names and IP addresses

domains, Internet domains, Common top-level domain names, Domain-name formation

firewalls, Understanding How the Internet Is Structured

host names, Understanding How the Internet Is Structured

overview, Understanding How the Internet Is Structured, Internet domains, Common top-level domain names, Domain-name formation, Host names and IP addresses, Proxies

port numbers, Understanding How the Internet Is Structured

proxies, Internet domains

proxy server, Proxies

Red Hat as proxy server, Setting up Red Hat Linux as a Proxy Server

Red Hat as router, Setting up Red Hat Linux as a Router

routers, Understanding How the Internet Is Structured, Routing

TLDs, Internet domains

Internet Configuration Wizard, Setting up dial-up PPP, Creating a dial-up connection with the Internet Configuration Wizard

Internet Search, Mozilla, Setting Navigator preferences

Internet Software Consortium, Getting a list of active newsgroups

intrusion attacks, Spam relaying

intrustion attacks

protection from, Protecting Against Intrusion Attacks

IP

masquerading, Using iptables to do NAT or IP Masquerading

IP addresses, Understanding IP Addresses, Understanding How the Internet Is Structured

assigning, Getting IP addresses

CIDR, Understanding IP Addresses

classes, IP address classes

classes inter-domain routing, Classless Inter-Domain Routing

connection speed, Choosing a connection speed

DNS server, Identifying your DNS servers

dynamic, Understanding IP Addresses

host names and, Host names and IP addresses

host names, adding, Identifying other computers (hosts and DNS)

hosts file, Configuring TCP/IP for your LAN

installation and, Beginning the installation

netmasks, Understanding netmasks

static, Understanding IP Addresses, Getting static IP addresses

IP macros (publishing tools), Creating a man page with Groff

IP masquerading, Understanding How the Internet Is Structured

IP network, exports file, Host names in /etc/exports

ipchains

firewalls, Protecting Your Network with Firewalls

ipchains firewall

configuring, Configuring an ipchains firewall, Understanding ipchains firewall rules, Table 14-4: Ipchains Optional Parameters, Understanding ipchains firewall rules, Changing ipchains firewall rules, Saving ipchains firewall rules

IPP (Internet Printing Protocol)

CUPS and, Common UNIX Printing Service

IPSEC (Internet Protocol Security)

VPN and, Configuring a Virtual Private Network Connection

iptables

allowing TCP and IRC, Allowing FTP and IRC services through an iptables firewall

enhancing, Enhancing your iptables firewall, Understanding the messages logfile

firewalls

configuration, Configuring an iptables firewall, Turning on iptables, Creating iptables firewall rules, Example 1: Firewall for shared Internet connection (plus servers), Example 2: Firewall for shared Internet connection (no servers), Example 3: Firewall for single Linux system with Internet connection

viewing current, Configuring a simple firewall

IP and NAT masquerading, Using iptables to do NAT or IP Masquerading

logging, Using logging with iptables

logging and, Using logging with iptables

overview, Understanding iptables

port forwarding, Using iptables to do port forwarding

transparent proxies, Using iptables as a transparent proxy

iptables run-level script, Table 12-5: Run-Level Scripts Contained in /etc/init.d

iptables, firewalls, Protecting Your Network with Firewalls

iptables-save command, Creating iptables firewall rules

IRC

connections

firewalls and, Turning on iptables

IRC (Internet Relay Chat)

Mozilla and, Web browsing with Mozilla

ISDN (Integrated Services Digital Network), Choosing a connection speed

ISO (International Organization for Standardization), Internet domains

iso9660 file system, Supported file systems

ISPs (Internet service providers), Understanding How the Internet Is Structured

ISPs, selecting for public servers, Choosing an ISP, Choosing a connection speed

connection speed, Choosing a connection speed

domain name, Getting a domain name, Checking domain name availability

reserving, Reserving a domain name

static IP addresses, Getting static IP addresses

terms of service, Checking Terms of Service

issue file, Administrative configuration files

issue.net file, Administrative configuration files

iwconfig command, Setting wireless extensions, Table 15-2: Options to the iwconfig Command, Checking wireless settings

iwlist command, Checking wireless settings

/ 274