Index - Red Hat Linux Bible: Fedora and Enterprise Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Red Hat Linux Bible: Fedora and Enterprise Edition [Electronic resources] - نسخه متنی

Christopher Negus

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
توضیحات
افزودن یادداشت جدید






Index


L


L-Soft LISTSERV mail manager, Other Mailing List Managers

labels

CDs, creating, Creating CD labels with cdlabelgen

language

Apach server, Defining encoding and language, Choosing character sets

login and, Logging in to Red Hat Linux

support, installation and, Beginning the installation

languages

support, installation and, Quick Installation

Languages, Mozilla, Setting Navigator preferences

languge, installation and, Beginning the installation

LANs

Ethereal, Watching LAN Traffic with Ethereal, Starting Ethereal, Capturing Ethernet data, Interpreting captured Ethernet data

Ethernet

hardware

cabling, LAN equipment

configuration, Configuring TCP/IP for your LAN, Identifying other computers (hosts and DNS), Adding Windows computers to your LAN, Configuring the wireless LAN, Choosing equipment, Inserting wireless cards, PCMCIA only, PCMCIA with adapter card, Checking that the cards are working, Configuring the wireless interface

distances, Testing out distances

extensions, Setting wireless extensions

hubs, LAN equipment

NICs, LAN equipment

ring, LAN topologies

star, LAN topologies

switches, LAN equipment setup

topologies, LAN topologies

Internet connection, Connecting your LAN to the Internet, Setting up Red Hat Linux as a Router

Managed Wireless LAN, LAN topologies

overview, Understanding Local Area Networks, LAN topologies

ping command, Can you reach another computer on the LAN?

See also networks, LAN topologies

TCP/IP

topologies, LAN topologies

troubleshooting, Checking wireless settings, Checking TCP/IP, Starting Ethereal

wired, Choosing an Ethernet Card, Configuring TCP/IP for your LAN, Identifying other computers (hosts and DNS), Adding Windows computers to your LAN, Configuring the wireless interface, IP address classes, Understanding netmasks, Classless Inter-Domain Routing, Getting IP addresses, Did Linux find your Ethernet driver at boot time?, Can you reach another computer on the LAN?, Is your Ethernet connection up?

wireless, Setting Up a Wireless LAN, Understanding wireless networks, Selecting wireless cards, Using indoor antennas, Using outdoor antennas, Choosing equipment, Inserting wireless cards, PCMCIA only, PCMCIA with adapter card, Checking that the cards are working, Configuring the wireless interface, Checking your wireless connection, Setting wireless extensions, Checking wireless settings, Checking TCP/IP, Starting Ethereal

wireless access point, LAN topologies

wireless networks, Choosing wireless hardware, Selecting wireless cards, Selecting adapter cards, Selecting antennas, Using outdoor antennas

wireless peer-to-peer, LAN topologies

Windows computers, adding, Adding Windows computers to your LAN

wireless


LANs (local area networks), Chapter 15: Setting Up a Local Area Network

laptops

apm command, Using apm to enter suspend mode

battery status applet, Using the battery status applet

installation on, Installing Red Hat Linux on a Laptop

power

monitoring consumption, Monitoring power usage on laptop computers

LaTeX

documents

creating, Creating and formatting a LaTeX document

overview, Creating Documents in Groff or LaTeX

format conversion, Converting documents, Understanding DocBook

LvX editor, Using the LyX LaTeX Editor, Printing LaTeX files

overview, Text processing with TeX/LaTeX

popularity of, Using Traditional Linux Publishing Tools

printing, Printing LaTeX files, Converting documents

usefulness of, Creating Documents in Groff or LaTeX

latin1 command

text preprocessing, Creating a man page with Groff

launchers

application

adding, KDE, Adding applications to the panel

application launcher

adding, GNOME, Adding an application launcher

launching

applications, Getting Familiar with the Desktop

CDs, Changing GNOME preferences

files, Getting Familiar with the Desktop

graphical administrative interfaces, Using Red Hat graphical administration tools

KDE desktop, Starting with KDE

SSH, Starting the SSH service

vi text editor, Starting with vi

launching applications

OpenOffice, Using OpenOffice

launcing

Terminal window, Getting Familiar with the Desktop

LDAP

installation and, Enabling Authentication

LDAP (Lightweight Directory Access Protocol) server software, Lightweight Directory Access Protocol server

legal issues

cryptography, Exporting encryption technology

letters

Groff document publishing, Creating a letter, memo, or white paper with Groff, Figure 6-6: Add headings and approval lines automatically to memos.

Lexmark printers, pbm217k driver, Choosing a Printer

LILO (LInux LOader) boot loader, Booting your computer with LILO, Using LILO, Setting up the /etc/lilo.conf file, Changing your boot loader, Troubleshooting Your Installation

LILO boot loader, Features in Red Hat Linux

lilo.conf file, Administrative configuration files

limit-time parameter, FTP server, Connection time limits

links

exports file, Access options in /etc/exports

links browser, Using text-based Web browsers

Linux

advantages, Primary Advantages of Linux

AppleTalk configuration, Setting up users

AppleTalk server configuration, Configuring an AppleTalk Server in Linux, Before you start using netatalk, Setting up the netatalk server, Starting netatalk, Defining general AppleTalk server settings, Defining specific AppleTalk servers settings, Sharing netatalk volumes, User-level security, File/directory-level security, Understanding hidden Mac files and directories, Setting file/directory permissions, Moving, copying, and deleting netatalk files, Sharing files with netatalk and Samba, Printer Sharing, Troubleshooting netatalk

characteristics of, What Is Linux?

distributions, What Is Red Hat Linux?

CD-ROM, Appendix A: What's on the CD-ROMs

Red Hat features, Why Choose Red Hat Linux?, Features in Red Hat Linux

features, Common Linux Features

newsgroups, Red Hat forms the Fedora Project

Red Hat

overview, Introducing Red Hat Linux

relationship to UNIX, Linux's Roots in UNIX

See Red Hat Linux, Introducing Red Hat Linux

source code

Windows-equivalent applications, Finding Windows-Equivalent Applications in Linux, Table 5-1: Windows-Equivalent Linux Applications, Finding Windows-Equivalent Applications in Linux

Linux Game Tome Web site, Where to get information on Linux gaming

Linux Gamers' FAQ Web site, Getting started with Linux gaming

linux mediacheck, installation, Choosing Different Install Modes

linux noprobe mode, installation, Choosing Different Install Modes

linux rescue, installation, Choosing Different Install Modes

Linux servers

MAC OS/X (Samba), Using Windows/Linux servers (Samba)

listing RPM packages, yum, Using yum for listing and updating packages

lj4 command

text preprocessing, Text processing with Groff

LOAD DATA command (mysql), Loading data from a file

loadable modules, Configuring modules

LoadModule directive, Selecting modules in httpd.conf

local info, sendmail.cf file, sendmail local info entries

local printers

configuration, Configuring local printers, Choosing a Printer, Configuring local printers

installation from desktop, Setting Up Printers, Configuring local printers

lock files, httpd.conf file (Apache server), Storing the server's ScoreBoard file, Storing the server's PID file

locking

screensaver

virtual terminals and, Getting Familiar with the Desktop, Changing the display

log files

administrative, Administrative log files

iptables, Using logging with iptables

LogSentry, Monitoring Log Files with LogSentry

Samba, Logging options

security, Detecting Intrusions from Log Files

changing filters, Changing LogSentry filter files

configuring, Setting up LogSentry, Configuring LogSentry to suit your needs, Editing the logcheck script

installing, Downloading and installing LogSentry

logcheck.hacking file, logcheck.hacking

logcheck.ignore file, logcheck.ignore

logcheck.violations file, logcheck.violations

logcheck.violations.ignore file, logcheck.violations.ignore

messages log, Understanding the messages logfile

modifying syslog, Modifying syslog

redirecting logs, Redirecting logs to a loghost with syslogd

running, Running LogSentry, Using LogSentry

syslogd, The role of syslogd

LogFormat definitions, Apache server, Configuring HTTP logging, Table 21-5: Available Tokens within LogFormat, Configuring HTTP logging

logging

/var/log directory, Detecting Intrusions from Log Files

Apache server

transfers, Logging transfers

firewalls

dedicated, The role of syslogd

error logging, Logging errors

HTTP, configuration, Configuring HTTP logging, Table 21-5: Available Tokens within LogFormat, Configuring HTTP logging

iptables and, Using logging with iptables

inn.conf file parameters, Logging parameters, Configuring hosts to feed you

loghost

public servers, Checking logs and system files

sendmail, Logging performed by sendmail

system logging, System logging

System Logging Daemon, The role of syslogd

System Logs window, Detecting Intrusions from Log Files

logging in, Logging in to Red Hat Linux

Failsafe, Logging in to Red Hat Linux

graphical login screen, Logging in to Red Hat Linux

language, Logging in to Red Hat Linux

rebooting, Logging in to Red Hat Linux

root user and, Why Do I Need a User Login?

shutdown, Logging in to Red Hat Linux

text-based, Logging in to Red Hat Linux

loghost

dedicated, The role of syslogd

redirecting logs and, Redirecting logs to a loghost with syslogd

login

anonoymous FTP users, The anonymous FTP user

FTP

remote

remote login

greetings, Changing FTP login greetings, Changing the FTP server host name, Adding a message before login

ssh command, Using ssh for remote login/remote execution

Telnet and, Using telnet for remote login

root user, Using the root Login

login screen

Gnome desktop, Logging in to Red Hat Linux

graphical login screen, Logging in to Red Hat Linux

GUI, Logging in to Red Hat Linux

language, Logging in to Red Hat Linux

prefdm script, What Happens During Desktop Startup?

Session button, Logging in to Red Hat Linux

login servers

network services reference, Login servers

login sessions

checking identity, Checking your login session

logins

administrative

other, Using other administrative logins, Using sudo for assigning administrative privilege

bin user, Understanding administrative logins

lp user, Understanding administrative logins

mail user, Understanding administrative logins

news user, Using sudo for assigning administrative privilege

uucp user, Understanding administrative logins

Logitech QuickCam Pro 3000 webcam, Running GnomeMeeting

LogLevel directive, Apache server, Configuring HTTP logging

LogLevel option, sendmail, sendmail options

logs

Samba server, Logging options

vsFTPd, Logging vsFTPd activities

vsFTPd site, Navigating the vsFTPd site

wu-ftpd

file transfers, Logging file transfers

connections, Logging connections

LogSentry, Monitoring Log Files with LogSentry

configuring, Setting up LogSentry, Configuring LogSentry to suit your needs

changing, Changing LogSentry filter files

editing LogSentry script, Editing the logcheck script

filters

installing, Downloading and installing LogSentry

logcheck.hacking file, logcheck.hacking

logcheck.ignore file, logcheck.ignore

logcheck.violations file, logcheck.violations

logcheck.violations.ignore file, logcheck.violations.ignore

modifying syslog, Modifying syslog

running, Running LogSentry, Using LogSentry

Loki Entertainment Software Web site, Where to get information on Linux gaming

Loki Software games demos, Loki Software game demos

Lokkit

firewalls and, Configuring a simple firewall

loops

for...do

shell scripts, The "if… then" statements, Table 12-2: Operators for Test Expressions, The "for . . . do" loop, The "while . . . do" and "until . . . do" loops

if...then

until...do

while...do

lowres mode, installation, Choosing Different Install Modes

lp user login, Understanding administrative logins

lpd run-level script, Table 12-5: Run-Level Scripts Contained in /etc/init.d

lpr command, Using Printing Commands, Using lpr to print

lprm command, Removing print jobs with lprm

LPRng, Features in Red Hat Linux

LPRng (LPR Next Generation) print spooling system, Chapter 17: Setting Up a Print Server

LPRng print service

CUPS comparison, Switching printing service

LPRng print services, Line Printer New Generation

LPRng software, Print servers

ls command, Checking directories and permissions, Creating files and directories

file permissions, Understanding file permissions

lsmod command, Getting a supported Webcam, Administering Your Red Hat Linux System, Listing loaded modules, Turning on iptables, PCMCIA only

lspci command, Getting a supported TV card

LVM volume, Partitioning with Disk Druid during installation

installation and, Deleting, adding, and editing partitions

LvX editor, Creating and formatting a LaTeX document

Lynx

proxy servers

configuration, Configuring Mosaic and Lynx browsers to use a proxy

lynx browser, Using text-based Web browsers

/ 274