Index - Red Hat Linux Bible: Fedora and Enterprise Edition [Electronic resources] نسخه متنی

اینجــــا یک کتابخانه دیجیتالی است

با بیش از 100000 منبع الکترونیکی رایگان به زبان فارسی ، عربی و انگلیسی

Red Hat Linux Bible: Fedora and Enterprise Edition [Electronic resources] - نسخه متنی

Christopher Negus

| نمايش فراداده ، افزودن یک نقد و بررسی
افزودن به کتابخانه شخصی
ارسال به دوستان
جستجو در متن کتاب
بیشتر
تنظیمات قلم

فونت

اندازه قلم

+ - پیش فرض

حالت نمایش

روز نیمروز شب
جستجو در لغت نامه
بیشتر
توضیحات
افزودن یادداشت جدید






Index


S


SafeFileEnvironment option, sendmail, sendmail options

Samba

browse list, Browse options, WINS options

clients

netatalk and, Sharing files with netatalk and Samba, Printer Sharing

opening, Firewall open?

setup, Using Samba shared directories from Windows

Windows systems, setup, Using Samba shared directories from Windows

configuration

adding, Adding Samba users

checking, Testing your Samba permissions

mounting, Mounting Samba directories in Linux

options, Printing options

setup, Starting with SWAT, Security options, Logging options, Browse options, WINS options, Configuring shared directories with SWAT, Checking your Samba setup with SWAT, Editing the smb.conf file, Adding Samba users, Starting the Samba service

status checking, Checking the status of shared directories

SWAT program, Configuring Samba with SWAT, Turning on the SWAT service, Starting with SWAT, Security options, Logging options, Tuning options, Browse options, WINS options, Configuring shared directories with SWAT, Checking your Samba setup with SWAT

directories

encryption, Security options

file server

encryption, Configuring a simple Samba server

setup, Setting Up a Samba File Server in Red Hat Linux, Getting and installing Samba

file sharing

firewalls

guest accounts, Assigning Guest Accounts

installation, Getting and installing Samba

log files, Logging options

logging options, Logging options

MAC OS/X, Looking inside Mac OS X, Using Windows/Linux servers (Samba)

master browser, Browse options

Nautilus and, Using Samba from Nautilus

OS level, Browse options

passwords

permissions

Preferred Master option, Browse options

printing

quick-start, Editing the smb.conf file, Adding Samba users

security, Security options, Logging options

setup, checking, Checking your Samba setup with SWAT

share security, Assigning Guest Accounts

shared printers

configuration, Configuring a shared Samba printer, Understanding smb.conf for printing, Setting up SMB clients

shares, Configuring shared directories with SWAT

sharing

sharing configuration, Configuring shared directories with SWAT

smb.conf file, Editing the smb.conf file

smbd daemon, Checking the status of shared directories

starting, Starting the Samba service

troubleshooting, Troubleshooting your Samba server, Samba service running?, Firewall open?, User passwords working?

tuning options, Tuning options

user security, Security options

users, Configuring a simple Samba server

vetoing files, Sharing files with netatalk and Samba

WINS options, WINS options

samba package, Getting and installing Samba

Samba server

network services reference, Samba server

Samba Server Configuration window, Setting Up a Samba File Server in Red Hat Linux, Configuring a simple Samba server

sampling

digital sampling device, Listening to Audio

SANE (Scanner Access Now Easy), Using Scanners Driven by SANE

SaveFromLine option, sendmail, sendmail options

saving

files

specifying location, Checking directories and permissions

vi text editor, Starting with vi

sbin directory, Working with the Red Hat Linux File System

administrative commands, Administrative commands

scanimage, Using Scanners Driven by SANE

scanners, Using Scanners Driven by SANE

scantv command, Running xawtv

scheduled items

system tasks, Scheduling System Tasks

batch command, Using the batch command

cron facility, Using the cron facility, Modifying scheduled tasks with crontab, Understanding cron files

deleting scheduled jobs, Deleting scheduled jobs

viewing scheduled jobs, Viewing scheduled jobs

submitting scheduled jobs, Submitting scheduled jobs

job run time, Specifying when jobs are run, Table 12-6: Samples for Specifying Times in an at Job

at.deny file, Using at.allow and at.deny

at.allow file, Using at.allow and at.deny

ScoreBoard files, httpd.conf file (Apache server), Storing the server's ScoreBoard file, Storing the server's PID file

scp command, Using the ssh, sftp, and scp commands

scp command, remote file copy, Using scp for remote file copy

screen captures, Taking screen captures

screen saver

preferences (GNOME), Changing GNOME preferences

screensaver

configuring

KDE desktop, Changing the display

screensavers

adding, Getting Familiar with the Desktop

locking

virtual terminals and, Getting Familiar with the Desktop, Changing the display

scriptkiddies, Hacker versus Cracker

scripts

firewalls

network services checklist, Checklist for Running Networking Services

shell scripts

loading, Example 1: Firewall for shared Internet connection (plus servers)

telephone list, A simple telephone list, Starting init

arithmetic in, Performing arithmetic in shell scripts

Scripts & Plugins, Mozilla, Setting Navigator preferences

searching

Konqueror File Manager, Searching for files

secondary name server, Understanding DNS

SECONDS environment variable, Common shell environment variables


security

Apache server, Setting access options and overrides, Table 21-3: Special Access Features for the AllowOverride Directive

attacks on

allowing TCP and IRC, Allowing FTP and IRC services through an iptables firewall

certificate service requests, Creating a Certificate Service Request

certificate signers, Using third-party certificate signers, Getting the CSR Signed

certificate validation, Getting the CSR Signed

changing filters, Changing LogSentry filter files

commands, Using the ssh, sftp, and scp commands

configuration files, Identifying configuration files

configuring, Setting up LogSentry, Configuring LogSentry to suit your needs, Editing the logcheck script, Configuring PortSentry

configuring sendmail, Blocking mail with sendmail

default availability of, Disabling network services

disabling, Disabling network services

encrypted, Using a shadow password file

enhancing, Enhancing your iptables firewall, Understanding the messages logfile

evaluating accessibility, Evaluating access to network services

file/directory-level, File/directory-level security, Understanding hidden Mac files and directories, Moving, copying, and deleting netatalk files, Sharing files with netatalk and Samba, Printer Sharing

filtering, Protecting Your Network with Firewalls

firewalls, Opening your firewall, Keeping up with fixes

host-level, Host-level security

installing, Downloading and installing LogSentry, Downloading and installing PortSentry

IP and NAT masquerading, Using iptables to do NAT or IP Masquerading

ipchans, Configuring an ipchains firewall, Understanding ipchains firewall rules, Table 14-4: Ipchains Optional Parameters, Understanding ipchains firewall rules, Changing ipchains firewall rules, Saving ipchains firewall rules

iptables configuration, Configuring an iptables firewall, Turning on iptables, Creating iptables firewall rules, Example 1: Firewall for shared Internet connection (plus servers), Example 2: Firewall for shared Internet connection (no servers), Example 3: Firewall for single Linux system with Internet connection

launching, Starting the SSH service

legal issues, Exporting encryption technology

logcheck.hacking file, logcheck.hacking

logcheck.ignore file, logcheck.ignore

logcheck.violations file, logcheck.violations

logcheck.violations.ignore file, logcheck.violations.ignore

logging, Using logging with iptables

mailbombing, Mailbombing

messages log, Understanding the messages logfile

modifying syslog, Modifying syslog

overview, Protecting Your Network with Firewalls, Understanding iptables, Using Password Protection, Public-key cryptography, Guarding Your Computer with PortSentry

port forwarding, Using iptables to do port forwarding

portsentry.conf file, Changing the portsentry.conf file

portsentry.modes file, Changing the portsentry.modes file

Procmail, Blocking mail with Procmail

protection from, Protecting Against Distributed DOS Attacks, Protecting Against Intrusion Attacks

public key cryptography, Public-key cryptography, Secure Socket Layer

redirecting logs, Redirecting logs to a loghost with syslogd

removing encryption from private keys, Restarting your Web server

restoring access, Restoring access

running, Running LogSentry, Using LogSentry, Using PortSentry as is

selecting, Choosing good passwords

selecting ports, Selecting ports

selecting responses, Choosing responses

selectively disabling, Using TCP wrappers

self-signed certificates, Creating Self-Signed Certificates

server information/status, Further security of server-info and server-status

shadow password file, Breaking encrypted passwords

shadow password file location, Checking for the shadow password file

share security, Assigning Guest Accounts

smurfing, Smurf amplification attack

spam relaying, Spam relaying

SSL and, Secure Socket Layer

SSL certificates, Creating SSL Certificates, Using third-party certificate signers

symmetric cryptography, Symmetric cryptography

syslog, Tracking PortSentry intrusions

syslogd, The role of syslogd

testing, Testing PortSentry

transparent proxies, Using iptables as a transparent proxy

troubleshooting certificates, Troubleshooting your certificates

types of, Understanding Attack Techniques

DDOS attacks

DOS attacks

encryption, Using Encryption Techniques

firewalls

hackers compared to crackers, Hacker versus Cracker

intrusion attacks

iptables

log files, Detecting Intrusions from Log Files

LogSentry, Monitoring Log Files with LogSentry

netatalk

user-level, User-level security

volumes, Securing netatalk volumes, User-level security, File/directory-level security, Understanding hidden Mac files and directories, Setting file/directory permissions, Moving, copying, and deleting netatalk files, Sharing files with netatalk and Samba, Printer Sharing

network services

network sniffers, Using Encryption Techniques

passwords

PortSentry

public servers, Managing security

remote applications, X Window, Securing remote X applications, Using SSH to run remote X applications

Require Password feature (KDE desktop), Changing the display

Samba

Samba server, Security options, Logging options

SSH, Using the Secure Shell package

TCP wrappers, Using TCP wrappers

Telnet, Using TCP wrappers

WECA, Wireless Security

WEP, Wireless Security

security services, network services reference, Security services

proxy/caching server, Proxy/caching server

system logging, System logging

VPNs, Virtual private network servers

sed (Stream Editor) command, The Stream Editor (sed)

semicolon (;) metacharacter, Sequential commands

sending e-mail messages

Mozilla Mail client, Composing and sending mail

sending messages, Evolution, Receiving, composing, and sending e-mail

sendmail, Introduction to SMTP and sendmail

aliases file, The aliases file

configuration, sendmail component files, sendmail local info entries, sendmail options, Table 19-3: Timeout Events, sendmail options, Trusted users, Format of headers, Mailer definitions, The aliases file

configuring

denial of service attacks, Blocking mail with sendmail

forward file, The .forward file

header formats, Format of headers

INN news server and, Starting with INN

installation, Installing and Running sendmail, Starting sendmail, Table 19-2: Other Related Sendmail Programs, Logging performed by sendmail

logging, Logging performed by sendmail

MAC OS/X, Looking inside Mac OS X

MDAs, Mailer definitions

message precedences, Message precedences

Postfix comparison, Introducing Postfix

Rewriting Rules section, Rewriting rules

starting, Starting sendmail, Table 19-1: File Prefixes in /var/spool/mqueue

timeouts, sendmail options

users

trusted users, Trusted users

sendmail commercial version, Other Mail Servers Available for Red Hat Linux

sendmail daemon, Mailbombing

sendmail run-level script, Table 12-5: Run-Level Scripts Contained in /etc/init.d

sendmail. See also e-mail, Message precedences

sendmail.cf file, Logging performed by sendmail, Configuring sendmail

component files, sendmail component files

generating, Generating the sendmail.cf file

local info entries, sendmail local info entries

mailing lists and, sendmail options

Options section, sendmail options, Table 19-3: Timeout Events, sendmail options


sendmail.mc file, Configuring sendmail

configuration, Configuring the sendmail.mc file

SendMimeErrors option, sendmail, sendmail options

Server Information page, Apache, Displaying server information

Server install type, Beginning the installation

server parameter, inn.conf file, News feed parameters

server status, Apache Server, Displaying server status

server string, Samba server, Base options

servers

configuration

delegation, Understanding DNS

DHCP

DNS, Determining Goals for Your Server

file servers

FTP

FTP servers

install server setup, Setting up an HTTP, FTP, or NFS install server, Configuring an install server using files, Web server, Hard disk install

mail server

Apache, The Apache Web server

configuration, Configuring Print Servers

CUPS server, Configuring the CUPS server (cupsd.conf)

daemon configuration, Configuring NIS server daemons

host name, changing, Changing the FTP server host name

NetWare, setup, Setting Up a NetWare File Server in Red Hat Linux, Configuring /etc/nwserv.conf, Starting the NetWare server daemon, Using NetWare client commands

outgoing, Managing incoming mail

incoming, Connecting to the mail server

connection, Mozilla, Connecting to the mail server

mail servers, Chapter 19: Setting Up a Mail Server, Introduction to SMTP and sendmail

MySQL. See MySQL server, Starting the MySQL Server

name servers, Understanding DNS

news server connection, Connecting to the news server

news servers, Chapter 22: Setting Up a News Server

NIS

print servers

overview, Understanding FTP Servers, FTP user types, Quick-starting vsFTPd

public servers, Configuring servers

Red Hat Linux as master server, Setting Up Red Hat Linux as an NIS Master Server, Choosing mapping options, Configuring access to maps, Generating the NIS map database, Configuring NIS server daemons

Red Hat Linux as slave server, Setting Up Red Hat Linux as an NIS Slave Server

sendmail, Installing and Running sendmail, Starting sendmail, Table 19-2: Other Related Sendmail Programs, Logging performed by sendmail

setup, Chapter 17: Setting Up a Print Server, Goals of Setting Up a File Server, Setting Up an NFS File Server in Red Hat Linux, Expanding the dhcpd.conf file, Adding options, Table 23-2: DHCP Options

proxy servers, Proxies

super-server. See xinetd daemon, The xinetd super-server

TUX HTTP, Web server

Web servers, Introduction to Web Servers, The Apache Web server, Other Web servers available for Red Hat Linux

slave servers, Adding NIS slave servers

starting, Starting the DHCP server

TUX, The TUX Web server

ServerSignature directive, Apache server, Adding a signature

Servertec iServer 1.1 Web server, Quick Starting the Apache Web Server

ServerTokens directive, Revealing subcomponents

Service Configuration, Using Red Hat graphical administration tools

Service Configuration window, Reorganizing or removing run-level scripts

launching, The init.d start-up scripts

shell scripts, Reorganizing or removing run-level scripts

serviceconf command, Reorganizing or removing run-level scripts

services, Common Linux Features

message levels, Modifying syslog

startup/shutdown, Why Choose Red Hat Linux?

services file, Administrative configuration files

services file, network services, Selecting ports

Session button (login screen), Logging in to Red Hat Linux

set-GID bit, Setting file/directory permissions

set-UID bit, Setting file/directory permissions

Setup Agent, Running Red Hat Setup Agent

date and time, Running Red Hat Setup Agent

SevenBitInput option, sendmail, sendmail options

sftp command, Using the ssh, sftp, and scp commands, Quick-starting vsFTPd

SGML (Standard Generalized Markup Language), Understanding SGML and XML

shadow file, Administrative configuration files

shadow password file, Breaking encrypted passwords

location, Checking for the shadow password file

share security, Samba, Assigning Guest Accounts

share value, security (Samba), Security options

shared Internet connections

iptables rules, Example 1: Firewall for shared Internet connection (plus servers), Example 2: Firewall for shared Internet connection (no servers)

shared printers

configuration

Samba, Configuring a shared Samba printer, Understanding smb.conf for printing, Setting up SMB clients

CUPS, Configuring a shared NetWare printer

NetWare, Configuring a shared NetWare printer

CUPS, Configuring a shared CUPS printer

shares

Samba, Configuring shared directories with SWAT

sharing

directories

NFS and, Other cool things to do with NFS

Samba configuration, Configuring shared directories with SWAT, Checking your Samba setup with SWAT

Samba settings, Checking the status of shared directories

sharing files

NIS, Understanding Network Information Service

sharing printers

AppleTalk, Printer Sharing

netatalk, Printer Sharing

shell

arithmetic expressions

background processes

adding aliases, Adding aliases

adding environment variables, Adding environment variables

bringing to foreground, Using foreground and background commands

commands, Using the ssh, sftp, and scp commands

launching, Starting the SSH service

overview, Configuring your shell

prompt, Setting your prompt

starting, Starting background processes

bash shell, Understanding the Red Hat Linux Shell

built-in commands, Locating commands

C Shell (csh), Understanding the Red Hat Linux Shell

command line, Using the Shell in Red Hat Linux

commands

configuration

file system commands, Locating commands

functions and, Locating commands

help, Getting Help with Using the Shell

interface

checking processes, Checking system activity

checking user identity, Checking your login session

current directory, Checking directories and permissions

editing, Command-line editing

exiting, Exiting the shell

history, Rerunning commands

locating, Locating commands

overview, Managing background and foreground processes

passing to, Expanding arithmetic expressions

prompts, The Shell Interface

Korn Shell, Understanding the Red Hat Linux Shell

overview, Understanding the Red Hat Linux Shell

printing documents from, Printing from the shell

SSH, Using the Secure Shell package

variables, Special Shell Variables

shell commands and, Locating commands

shell scripts, Chapter 12: Automating System Tasks

arithmetic, Performing arithmetic in shell scripts

execution, Executing and debugging shell scripts

programming constructs, Using programming constructs in shell scripts, The "if… then" statements, Table 12-2: Operators for Test Expressions, The "if… then" statements, The case command, The "for . . . do" loop, The "while . . . do" and "until . . . do" loops

run level manipulation, Manipulating run levels, Changing to a shutdown run level

run-level

run-level, starting, Starting run-level scripts, Understanding run-level scripts, Table 12-5: Run-Level Scripts Contained in /etc/init.d, Understanding run-level scripts

startup scripts, Understanding what startup scripts do

telephone list, A simple telephone list, Starting init

variables

adding, Adding run-level scripts

behavior changes, Changing run-level script behavior

removing, Reorganizing or removing run-level scripts

reorganizing, Reorganizing or removing run-level scripts

user-defined, Understanding shell variables

xinetd services, Managing xinetd services

shells file, Administrative configuration files

SHLVL environment variable, Common shell environment variables

shosts/equiv file, Using the ssh, sftp, and scp commands

shutdown

log in screen, Logging in to Red Hat Linux

sidebar (Nautilus), Using the Nautilus file manager

signature line, Apache server, Adding a signature

single run-level script, Table 12-5: Run-Level Scripts Contained in /etc/init.d

SingleLineFromHeader option, sendmail, sendmail options

SingleThreadDeliver option, sendmail, sendmail options

Slave Server Names, NIS, Defining an NIS domain name

slave server, NIS

Red Hat Linux as, Setting Up Red Hat Linux as an NIS Slave Server

slave servers, NIS, Adding NIS slave servers

slist command, Configuring a shared NetWare printer, Using NetWare client commands

Smail mail server, Configuring sendmail

Smart Browsing, Mozilla, Setting Navigator preferences

SMB

Nautilus and, Using the Nautilus file manager

SMB (Session Message Block) protocol, Setting Up a Samba File Server in Red Hat Linux

SMB authentication

installation and, Running Red Hat Setup Agent

SMB printers (Windows), Adding a Windows (SMB) printer

smb run-level script, Table 12-5: Run-Level Scripts Contained in /etc/init.d

smb.conf file, Setting Up a Samba File Server in Red Hat Linux, Creating global Samba settings in SWAT

smb.conf file, Samba, Editing the smb.conf file

smbclient command, Samba service running?, User passwords working?

smbd daemon, Checking the status of shared directories

SMTP (Simple Mail Transfer Protocol), Introduction to SMTP and sendmail

SmtpGreetingMessage option, sendmail, sendmail options

smurfing attacks, Smurf amplification attack

snapshot backups, Backing Up to a Hard Drive

SNAT, Using iptables to do NAT or IP Masquerading

SNAT (Source Network Address Translation), Example 1: Firewall for shared Internet connection (plus servers)

Sndconfig, Features in Red Hat Linux

sndconfig package

installation, Configuring your sound card

sniffers, Using Encryption Techniques

SNMP (Simple Network Management Protocol) server, Simple Network Management Protocol server

snmpd run-level script, Table 12-5: Run-Level Scripts Contained in /etc/init.d

Socket Options, Samba, Tuning options

soft mount

NFS, Using mount options

soft option, mounting NFS, Using mount options

software

freeware, The Culture of Free Software

installation

LogSentry, Monitoring Log Files with LogSentry

changing filters, Changing LogSentry filter files

configuration files, Identifying configuration files

configuring, Configuring LogSentry to suit your needs, Editing the logcheck script, Configuring PortSentry

installing, Downloading and installing PortSentry

logcheck.hacking file, logcheck.hacking

logcheck.ignore file, logcheck.ignore

logcheck.violations file, logcheck.violations

logcheck.violations.ignore file, logcheck.violations.ignore

modifying syslog, Modifying syslog

network services checklist, Checklist for Running Networking Services

overview, Guarding Your Computer with PortSentry

portsentry.conf file, Changing the portsentry.conf file

portsentry.modes file, Changing the portsentry.modes file

restoring access, Restoring access

running, Running LogSentry, Using LogSentry, Using PortSentry as is

configuring, Setting up LogSentry

installing, Downloading and installing LogSentry

new packages, Additional software packages

PortSentry

syslog, Tracking PortSentry intrusions

testing, Testing PortSentry

selecting responses, Choosing responses

selecting ports, Selecting ports

RPM and, Why Choose Red Hat Linux?

RPM format, Primary Advantages of Linux

updating, Getting Linux Software "up2date"

checking for updates, Registering with Red Hat Network, Getting Updates

wireless Linux, installation, Installing wireless Linux software

software alternatives, Choosing Software Alternatives

mail and printing, Selecting mail and printing alternatives, Using mail and printing alternatives

Software Installation, Mozilla, Setting Navigator preferences

software repositories, yum and, Downloading and installing applications with yum, Configuring yum (/etc/yum.conf), Running yum to download and install RPMs, Using yum for listing and updating packages

sorting

MySQL databases, Sorting data

sound cards

advantages, Listening to Audio

configuration, Configuring your sound card

driver support, Listening to Audio

sound mixing devices, Listening to Audio

soundcards

configuration, Configuring your sound card

source code

application installation and, Building and installing from source code, Installing software in SRPMS format, Installing software in gzip/tar format

gzip/tar format, Installing software in gzip/tar format

installation, Installing kernel source code

SRPMS format, Installing software in SRPMS format, Installing software in gzip/tar format

kernel

SRPMS, Building and installing from source code

SourceForge.net, Finding applications on the Internet

Sox, Performing audio file conversion and compression

Sox utility (audio file format converter, Converting audio files with Sox, Table 8-1: Sound Formats Supported by Sox Utility, Converting audio files with Sox

spam e-mail

Junk Mail (Mozilla), Connecting to the mail server

spam relaying attacks, Spam relaying

spamassassin, Protecting Against Distributed DOS Attacks, Stopping Spam with SpamAssassin, Setting up SpamAssassin on your mail server, Setting e-mail readers to filter spam

SpamCop, Setting e-mail readers to filter spam

spool directories

INN news server, Starting with INN

SQL (structured query language), Chapter 24: Setting Up a MySQL Database Server

SQL. See also MySQL, Chapter 24: Setting Up a MySQL Database Server

squid daemon, Red Hat as proxy server, Starting the squid daemon, Using a simple squid.conf file, Modifying the Squid configuration file, Configuring access control in squid.conf, Configuring caching in squid.conf

debugging, Debugging Squid, Checking Squid log files

squid run-level script, Table 12-5: Run-Level Scripts Contained in /etc/init.d

srm.conf file

Apache server configuration, Configuring the Apache Server

SRPMS, source code and, Building and installing from source code

software installation, Installing software in SRPMS format, Installing software in gzip/tar format

SSH

AppleTalk and, Using AppleTalk (netatalk) from Mac OS X

SSH (secure shell), Using the Secure Shell package

commands, Using the ssh, sftp, and scp commands

launching, Starting the SSH service

ssh command, Using the ssh, sftp, and scp commands

remote logins, Using ssh for remote login/remote execution

SSL (Secure Socket Layer)

public key cryptography implementation, Secure Socket Layer

certificate signers, Getting the CSR Signed

self-signed certificates, Creating Self-Signed Certificates

troubleshooting certificates, Troubleshooting your certificates

validation, Getting the CSR Signed

service requests, Creating a Certificate Service Request

certificate signers, Using third-party certificate signers

creating certificates, Creating SSL Certificates, Using third-party certificate signers

SSL (Secure Sockets Layer), The Apache Web server

standards

compliance, Linux's Roots in UNIX

star topology, LAN topologies

StarOffice, Other Word Processors, Using StarOffice

Microsoft Office and, Using Red Hat Linux as an Application Platform

open source version, Using Red Hat Linux as an Application Platform

OpenOffice and, Using OpenOffice

starting desktop, Getting Familiar with the Desktop, What Happens During Desktop Startup?

startup scripts, Understanding what startup scripts do

statements

echo statement, Executing and debugging shell scripts

static IP addresses, Understanding IP Addresses, Getting static IP addresses

statistics packages, Analyzing Web-server traffic

StatusFile option, sendmail, sendmail options

stealth scan, Using LogSentry, Selecting ports, Testing PortSentry

string data types

MySQL tables, Understanding MySQL Tables, Table 24-4: String Data Types for Columns

Stronghold3 Web server, Other Web servers available for Red Hat Linux

Stylesheets button (Konqueror), Configuring Konqueror options

su command, Becoming Super User (The su Command)

subcomponents, httpd.conf file (Apache Server), Revealing subcomponents

subfolders, Getting Familiar with the Desktop

subscribing to newsgroups, Subscribing to newsgroups, The Pan newsreader

substitution

commands, Expanding commands

sudo command, Using sudo for assigning administrative privilege, Adding users with useradd

sudoers file, Administrative configuration files

super user

changing to, Becoming Super User (The su Command)

X Window System, Becoming Super User in X

super-server. See xinetd daemon, The xinetd super-server

support

password reset, Resetting a user's password

technical support for Fedora Core, Red Hat forms the Fedora Project

technical support mailbox, Creating a technical support mailbox

suspend mode (laptops), Using apm to enter suspend mode

SVID (System V Interface Definition), Linux's Roots in UNIX

swap file system, Supported file systems

SWAT (Samba Web Administrator Tool), SWAT

SWAT, Samba configuration, Configuring Samba with SWAT, Turning on the SWAT service, Starting with SWAT, Security options, Logging options, Tuning options, Browse options, WINS options, Configuring shared directories with SWAT, Checking your Samba setup with SWAT

global settings, Creating global Samba settings in SWAT, Security options, Logging options, Printing options, Browse options, WINS options, Configuring shared directories with SWAT

permissions, Testing your Samba permissions

setup check, Checking your Samba setup with SWAT

sharing, Checking the status of shared directories

sharing settings, Configuring shared directories with SWAT

switches, networks, LAN equipment setup

symmetric cryptography, Symmetric cryptography

SYSADMIN value (LogSentry), Editing the logcheck script

syslog

modifying

LogSentry, Modifying syslog

PortSentry software, Tracking PortSentry intrusions

syslog run-level script, Table 12-5: Run-Level Scripts Contained in /etc/init.d

syslog.conf file, Administrative configuration files

syslogd, The role of syslogd

configuration, The role of syslogd

redirecting logs, Redirecting logs to a loghost with syslogd

systctl.conf file, Turning on iptables

system administration

commands

configuration files

file size

file systems

adding, Adding a hard disk

checking for updates, Registering with Red Hat Network, Getting Updates

checking used by directory, Checking disk usage with du

CPU usage, Monitoring CPU usage with top

creating, Using the mkfs command to create a file system

enabling suspend mode (laptops), Using apm to enter suspend mode

laptop battery status applet, Using the battery status applet

laptop power consumption, Monitoring power usage on laptop computers

mail and printing, Selecting mail and printing alternatives, Using mail and printing alternatives

overview, Monitoring System Performance

reporting, Displaying system space with df, Finding disk consumption with find

System Monitor, Watch computer usage with System Monitor

umount command, Using the umount command to unmount a file system

fstab file, Using the fstab file to define mountable file systems

mount command, Using the mount command to mount file systems

supported types, Supported file systems, Using the fstab file to define mountable file systems

mounting, Mounting file systems

overview, Managing File Systems and Disk Space

graphical administrative interfaces, Using Red Hat graphical administration tools

hard disks

log files

logins

administrative, Using other administrative logins

granting priviledges, Using sudo for assigning administrative privilege

listing loaded, Listing loaded modules

loading, Loading modules

locating, Finding available modules

other, Using other administrative logins, Using sudo for assigning administrative privilege

modules

performance monitoring

root user

administrative, Administrative commands, Administrative configuration files, Administrative log files

changing to, Becoming Super User (The su Command)

launching, Using Red Hat graphical administration tools

login, Using the root Login

software alternatives, Choosing Software Alternatives

super user

system space

updating software, Getting Linux Software "up2date"

system administrator, Chapter 10: Understanding System Administration

system administrators

MACs, Looking inside Mac OS X

system crontab file, Using the cron facility

system initialization, System Initialization

inittab.file, The inittab file, Format of the inittab file, Table 12-3: Valid init Actions, Breakdown of the inittab file, Table 12-4: Possible Run Levels, Breakdown of the inittab file

system logging, System logging

System Logging Daemon, The role of syslogd

System Logs window, Detecting Intrusions from Log Files

System Monitor, Watch computer usage with System Monitor

system performance

monitoring, Administering Your Red Hat Linux System

system profiles

setting, Setting system profiles

system services, Common Linux Features

system space

checking used by directory, Checking disk usage with du

reporting, Displaying system space with df, Finding disk consumption with find

system startup/shutdown, scripts and, Starting run-level scripts, Understanding run-level scripts, Table 12-5: Run-Level Scripts Contained in /etc/init.d, Understanding run-level scripts, Understanding what startup scripts do, Changing run-level script behavior, Reorganizing or removing run-level scripts, Adding run-level scripts, Managing xinetd services, Manipulating run levels, Changing to a shutdown run level

system tasks

scheduling, Scheduling System Tasks

batch command, Using the batch command

cron facility, Using the cron facility, Modifying scheduled tasks with crontab, Understanding cron files

deleting scheduled jobs, Deleting scheduled jobs

viewing scheduled jobs, Viewing scheduled jobs

submitting scheduled jobs, Submitting scheduled jobs

job run time, Specifying when jobs are run, Table 12-6: Samples for Specifying Times in an at Job

at.deny file, Using at.allow and at.deny

at.allow file, Using at.allow and at.deny

system tuning parameters, inn.conf file, System tuning parameters

/ 274