Index
S
SafeFileEnvironment option, sendmail, sendmail options
Sambabrowse list, Browse options, WINS options
clientsnetatalk and, Sharing files with netatalk and Samba, Printer Sharing
opening, Firewall open?
setup, Using Samba shared directories from Windows
Windows systems, setup, Using Samba shared directories from Windows
configurationadding, Adding Samba users
checking, Testing your Samba permissions
mounting, Mounting Samba directories in Linux
options, Printing options
setup, Starting with SWAT, Security options, Logging options, Browse options, WINS options, Configuring shared directories with SWAT, Checking your Samba setup with SWAT, Editing the smb.conf file, Adding Samba users, Starting the Samba service
status checking, Checking the status of shared directories
SWAT program, Configuring Samba with SWAT, Turning on the SWAT service, Starting with SWAT, Security options, Logging options, Tuning options, Browse options, WINS options, Configuring shared directories with SWAT, Checking your Samba setup with SWAT
directoriesencryption, Security options
file serverencryption, Configuring a simple Samba server
setup, Setting Up a Samba File Server in Red Hat Linux, Getting and installing Samba
file sharingfirewallsguest accounts, Assigning Guest Accounts
installation, Getting and installing Samba
log files, Logging options
logging options, Logging options
MAC OS/X, Looking inside Mac OS X, Using Windows/Linux servers (Samba)
master browser, Browse options
Nautilus and, Using Samba from Nautilus
OS level, Browse options
passwordspermissionsPreferred Master option, Browse options
printingquick-start, Editing the smb.conf file, Adding Samba users
security, Security options, Logging options
setup, checking, Checking your Samba setup with SWAT
share security, Assigning Guest Accounts
shared printersconfiguration, Configuring a shared Samba printer, Understanding smb.conf for printing, Setting up SMB clients
shares, Configuring shared directories with SWAT
sharingsharing configuration, Configuring shared directories with SWAT
smb.conf file, Editing the smb.conf file
smbd daemon, Checking the status of shared directories
starting, Starting the Samba service
troubleshooting, Troubleshooting your Samba server, Samba service running?, Firewall open?, User passwords working?
tuning options, Tuning options
user security, Security options
users, Configuring a simple Samba server
vetoing files, Sharing files with netatalk and Samba
WINS options, WINS options
samba package, Getting and installing Samba
Samba servernetwork services reference, Samba server
Samba Server Configuration window, Setting Up a Samba File Server in Red Hat Linux, Configuring a simple Samba server
samplingdigital sampling device, Listening to Audio
SANE (Scanner Access Now Easy), Using Scanners Driven by SANE
SaveFromLine option, sendmail, sendmail options
savingfilesspecifying location, Checking directories and permissions
vi text editor, Starting with vi
sbin directory, Working with the Red Hat Linux File System
administrative commands, Administrative commands
scanimage, Using Scanners Driven by SANE
scanners, Using Scanners Driven by SANE
scantv command, Running xawtv
scheduled itemssystem tasks, Scheduling System Tasks
batch command, Using the batch command
cron facility, Using the cron facility, Modifying scheduled tasks with crontab, Understanding cron files
deleting scheduled jobs, Deleting scheduled jobs
viewing scheduled jobs, Viewing scheduled jobs
submitting scheduled jobs, Submitting scheduled jobs
job run time, Specifying when jobs are run, Table 12-6: Samples for Specifying Times in an at Job
at.deny file, Using at.allow and at.deny
at.allow file, Using at.allow and at.deny
ScoreBoard files, httpd.conf file (Apache server), Storing the server's ScoreBoard file, Storing the server's PID file
scp command, Using the ssh, sftp, and scp commands
scp command, remote file copy, Using scp for remote file copy
screen captures, Taking screen captures
screen saverpreferences (GNOME), Changing GNOME preferences
screensaverconfiguringKDE desktop, Changing the display
screensaversadding, Getting Familiar with the Desktop
lockingvirtual terminals and, Getting Familiar with the Desktop, Changing the display
scriptkiddies, Hacker versus Cracker
scriptsfirewallsnetwork services checklist, Checklist for Running Networking Services
shell scriptsloading, Example 1: Firewall for shared Internet connection (plus servers)
telephone list, A simple telephone list, Starting init
arithmetic in, Performing arithmetic in shell scripts
Scripts & Plugins, Mozilla, Setting Navigator preferences
searchingKonqueror File Manager, Searching for files
secondary name server, Understanding DNS
SECONDS environment variable, Common shell environment variables
securityApache server, Setting access options and overrides, Table 21-3: Special Access Features for the AllowOverride Directive
attacks onallowing TCP and IRC, Allowing FTP and IRC services through an iptables firewall
certificate service requests, Creating a Certificate Service Request
certificate signers, Using third-party certificate signers, Getting the CSR Signed
certificate validation, Getting the CSR Signed
changing filters, Changing LogSentry filter files
commands, Using the ssh, sftp, and scp commands
configuration files, Identifying configuration files
configuring, Setting up LogSentry, Configuring LogSentry to suit your needs, Editing the logcheck script, Configuring PortSentry
configuring sendmail, Blocking mail with sendmail
default availability of, Disabling network services
disabling, Disabling network services
encrypted, Using a shadow password file
enhancing, Enhancing your iptables firewall, Understanding the messages logfile
evaluating accessibility, Evaluating access to network services
file/directory-level, File/directory-level security, Understanding hidden Mac files and directories, Moving, copying, and deleting netatalk files, Sharing files with netatalk and Samba, Printer Sharing
filtering, Protecting Your Network with Firewalls
firewalls, Opening your firewall, Keeping up with fixes
host-level, Host-level security
installing, Downloading and installing LogSentry, Downloading and installing PortSentry
IP and NAT masquerading, Using iptables to do NAT or IP Masquerading
ipchans, Configuring an ipchains firewall, Understanding ipchains firewall rules, Table 14-4: Ipchains Optional Parameters, Understanding ipchains firewall rules, Changing ipchains firewall rules, Saving ipchains firewall rules
iptables configuration, Configuring an iptables firewall, Turning on iptables, Creating iptables firewall rules, Example 1: Firewall for shared Internet connection (plus servers), Example 2: Firewall for shared Internet connection (no servers), Example 3: Firewall for single Linux system with Internet connection
launching, Starting the SSH service
legal issues, Exporting encryption technology
logcheck.hacking file, logcheck.hacking
logcheck.ignore file, logcheck.ignore
logcheck.violations file, logcheck.violations
logcheck.violations.ignore file, logcheck.violations.ignore
logging, Using logging with iptables
mailbombing, Mailbombing
messages log, Understanding the messages logfile
modifying syslog, Modifying syslog
overview, Protecting Your Network with Firewalls, Understanding iptables, Using Password Protection, Public-key cryptography, Guarding Your Computer with PortSentry
port forwarding, Using iptables to do port forwarding
portsentry.conf file, Changing the portsentry.conf file
portsentry.modes file, Changing the portsentry.modes file
Procmail, Blocking mail with Procmail
protection from, Protecting Against Distributed DOS Attacks, Protecting Against Intrusion Attacks
public key cryptography, Public-key cryptography, Secure Socket Layer
redirecting logs, Redirecting logs to a loghost with syslogd
removing encryption from private keys, Restarting your Web server
restoring access, Restoring access
running, Running LogSentry, Using LogSentry, Using PortSentry as is
selecting, Choosing good passwords
selecting ports, Selecting ports
selecting responses, Choosing responses
selectively disabling, Using TCP wrappers
self-signed certificates, Creating Self-Signed Certificates
server information/status, Further security of server-info and server-status
shadow password file, Breaking encrypted passwords
shadow password file location, Checking for the shadow password file
share security, Assigning Guest Accounts
smurfing, Smurf amplification attack
spam relaying, Spam relaying
SSL and, Secure Socket Layer
SSL certificates, Creating SSL Certificates, Using third-party certificate signers
symmetric cryptography, Symmetric cryptography
syslog, Tracking PortSentry intrusions
syslogd, The role of syslogd
testing, Testing PortSentry
transparent proxies, Using iptables as a transparent proxy
troubleshooting certificates, Troubleshooting your certificates
types of, Understanding Attack Techniques
DDOS attacksDOS attacksencryption, Using Encryption Techniques
firewallshackers compared to crackers, Hacker versus Cracker
intrusion attacksiptableslog files, Detecting Intrusions from Log Files
LogSentry, Monitoring Log Files with LogSentry
netatalkuser-level, User-level security
volumes, Securing netatalk volumes, User-level security, File/directory-level security, Understanding hidden Mac files and directories, Setting file/directory permissions, Moving, copying, and deleting netatalk files, Sharing files with netatalk and Samba, Printer Sharing
network servicesnetwork sniffers, Using Encryption Techniques
passwordsPortSentrypublic servers, Managing security
remote applications, X Window, Securing remote X applications, Using SSH to run remote X applications
Require Password feature (KDE desktop), Changing the display
SambaSamba server, Security options, Logging options
SSH, Using the Secure Shell package
TCP wrappers, Using TCP wrappers
Telnet, Using TCP wrappers
WECA, Wireless Security
WEP, Wireless Security
security services, network services reference, Security services
proxy/caching server, Proxy/caching server
system logging, System logging
VPNs, Virtual private network servers
sed (Stream Editor) command, The Stream Editor (sed)
semicolon (;) metacharacter, Sequential commands
sending e-mail messagesMozilla Mail client, Composing and sending mail
sending messages, Evolution, Receiving, composing, and sending e-mail
sendmail, Introduction to SMTP and sendmail
aliases file, The aliases file
configuration, sendmail component files, sendmail local info entries, sendmail options, Table 19-3: Timeout Events, sendmail options, Trusted users, Format of headers, Mailer definitions, The aliases file
configuringdenial of service attacks, Blocking mail with sendmail
forward file, The .forward file
header formats, Format of headers
INN news server and, Starting with INN
installation, Installing and Running sendmail, Starting sendmail, Table 19-2: Other Related Sendmail Programs, Logging performed by sendmail
logging, Logging performed by sendmail
MAC OS/X, Looking inside Mac OS X
MDAs, Mailer definitions
message precedences, Message precedences
Postfix comparison, Introducing Postfix
Rewriting Rules section, Rewriting rules
starting, Starting sendmail, Table 19-1: File Prefixes in /var/spool/mqueue
timeouts, sendmail options
userstrusted users, Trusted users
sendmail commercial version, Other Mail Servers Available for Red Hat Linux
sendmail daemon, Mailbombing
sendmail run-level script, Table 12-5: Run-Level Scripts Contained in /etc/init.d
sendmail. See also e-mail, Message precedences
sendmail.cf file, Logging performed by sendmail, Configuring sendmail
component files, sendmail component files
generating, Generating the sendmail.cf file
local info entries, sendmail local info entries
mailing lists and, sendmail options
Options section, sendmail options, Table 19-3: Timeout Events, sendmail options
sendmail.mc file, Configuring sendmail
configuration, Configuring the sendmail.mc file
SendMimeErrors option, sendmail, sendmail options
Server Information page, Apache, Displaying server information
Server install type, Beginning the installation
server parameter, inn.conf file, News feed parameters
server status, Apache Server, Displaying server status
server string, Samba server, Base options
serversconfigurationdelegation, Understanding DNS
DHCPDNS, Determining Goals for Your Server
file serversFTPFTP serversinstall server setup, Setting up an HTTP, FTP, or NFS install server, Configuring an install server using files, Web server, Hard disk install
mail serverApache, The Apache Web server
configuration, Configuring Print Servers
CUPS server, Configuring the CUPS server (cupsd.conf)
daemon configuration, Configuring NIS server daemons
host name, changing, Changing the FTP server host name
NetWare, setup, Setting Up a NetWare File Server in Red Hat Linux, Configuring /etc/nwserv.conf, Starting the NetWare server daemon, Using NetWare client commands
outgoing, Managing incoming mail
incoming, Connecting to the mail server
connection, Mozilla, Connecting to the mail server
mail servers, Chapter 19: Setting Up a Mail Server, Introduction to SMTP and sendmail
MySQL. See MySQL server, Starting the MySQL Server
name servers, Understanding DNS
news server connection, Connecting to the news server
news servers, Chapter 22: Setting Up a News Server
NISprint serversoverview, Understanding FTP Servers, FTP user types, Quick-starting vsFTPd
public servers, Configuring servers
Red Hat Linux as master server, Setting Up Red Hat Linux as an NIS Master Server, Choosing mapping options, Configuring access to maps, Generating the NIS map database, Configuring NIS server daemons
Red Hat Linux as slave server, Setting Up Red Hat Linux as an NIS Slave Server
sendmail, Installing and Running sendmail, Starting sendmail, Table 19-2: Other Related Sendmail Programs, Logging performed by sendmail
setup, Chapter 17: Setting Up a Print Server, Goals of Setting Up a File Server, Setting Up an NFS File Server in Red Hat Linux, Expanding the dhcpd.conf file, Adding options, Table 23-2: DHCP Options
proxy servers, Proxies
super-server. See xinetd daemon, The xinetd super-server
TUX HTTP, Web server
Web servers, Introduction to Web Servers, The Apache Web server, Other Web servers available for Red Hat Linux
slave servers, Adding NIS slave servers
starting, Starting the DHCP server
TUX, The TUX Web server
ServerSignature directive, Apache server, Adding a signature
Servertec iServer 1.1 Web server, Quick Starting the Apache Web Server
ServerTokens directive, Revealing subcomponents
Service Configuration, Using Red Hat graphical administration tools
Service Configuration window, Reorganizing or removing run-level scripts
launching, The init.d start-up scripts
shell scripts, Reorganizing or removing run-level scripts
serviceconf command, Reorganizing or removing run-level scripts
services, Common Linux Features
message levels, Modifying syslog
startup/shutdown, Why Choose Red Hat Linux?
services file, Administrative configuration files
services file, network services, Selecting ports
Session button (login screen), Logging in to Red Hat Linux
set-GID bit, Setting file/directory permissions
set-UID bit, Setting file/directory permissions
Setup Agent, Running Red Hat Setup Agent
date and time, Running Red Hat Setup Agent
SevenBitInput option, sendmail, sendmail options
sftp command, Using the ssh, sftp, and scp commands, Quick-starting vsFTPd
SGML (Standard Generalized Markup Language), Understanding SGML and XML
shadow file, Administrative configuration files
shadow password file, Breaking encrypted passwords
location, Checking for the shadow password file
share security, Samba, Assigning Guest Accounts
share value, security (Samba), Security options
shared Internet connectionsiptables rules, Example 1: Firewall for shared Internet connection (plus servers), Example 2: Firewall for shared Internet connection (no servers)
shared printersconfigurationSamba, Configuring a shared Samba printer, Understanding smb.conf for printing, Setting up SMB clients
CUPS, Configuring a shared NetWare printer
NetWare, Configuring a shared NetWare printer
CUPS, Configuring a shared CUPS printer
sharesSamba, Configuring shared directories with SWAT
sharingdirectoriesNFS and, Other cool things to do with NFS
Samba configuration, Configuring shared directories with SWAT, Checking your Samba setup with SWAT
Samba settings, Checking the status of shared directories
sharing filesNIS, Understanding Network Information Service
sharing printersAppleTalk, Printer Sharing
netatalk, Printer Sharing
shellarithmetic expressionsbackground processesadding aliases, Adding aliases
adding environment variables, Adding environment variables
bringing to foreground, Using foreground and background commands
commands, Using the ssh, sftp, and scp commands
launching, Starting the SSH service
overview, Configuring your shell
prompt, Setting your prompt
starting, Starting background processes
bash shell, Understanding the Red Hat Linux Shell
built-in commands, Locating commands
C Shell (csh), Understanding the Red Hat Linux Shell
command line, Using the Shell in Red Hat Linux
commandsconfigurationfile system commands, Locating commands
functions and, Locating commands
help, Getting Help with Using the Shell
interfacechecking processes, Checking system activity
checking user identity, Checking your login session
current directory, Checking directories and permissions
editing, Command-line editing
exiting, Exiting the shell
history, Rerunning commands
locating, Locating commands
overview, Managing background and foreground processes
passing to, Expanding arithmetic expressions
prompts, The Shell Interface
Korn Shell, Understanding the Red Hat Linux Shell
overview, Understanding the Red Hat Linux Shell
printing documents from, Printing from the shell
SSH, Using the Secure Shell package
variables, Special Shell Variables
shell commands and, Locating commands
shell scripts, Chapter 12: Automating System Tasks
arithmetic, Performing arithmetic in shell scripts
execution, Executing and debugging shell scripts
programming constructs, Using programming constructs in shell scripts, The "if… then" statements, Table 12-2: Operators for Test Expressions, The "if… then" statements, The case command, The "for . . . do" loop, The "while . . . do" and "until . . . do" loops
run level manipulation, Manipulating run levels, Changing to a shutdown run level
run-levelrun-level, starting, Starting run-level scripts, Understanding run-level scripts, Table 12-5: Run-Level Scripts Contained in /etc/init.d, Understanding run-level scripts
startup scripts, Understanding what startup scripts do
telephone list, A simple telephone list, Starting init
variablesadding, Adding run-level scripts
behavior changes, Changing run-level script behavior
removing, Reorganizing or removing run-level scripts
reorganizing, Reorganizing or removing run-level scripts
user-defined, Understanding shell variables
xinetd services, Managing xinetd services
shells file, Administrative configuration files
SHLVL environment variable, Common shell environment variables
shosts/equiv file, Using the ssh, sftp, and scp commands
shutdownlog in screen, Logging in to Red Hat Linux
sidebar (Nautilus), Using the Nautilus file manager
signature line, Apache server, Adding a signature
single run-level script, Table 12-5: Run-Level Scripts Contained in /etc/init.d
SingleLineFromHeader option, sendmail, sendmail options
SingleThreadDeliver option, sendmail, sendmail options
Slave Server Names, NIS, Defining an NIS domain name
slave server, NISRed Hat Linux as, Setting Up Red Hat Linux as an NIS Slave Server
slave servers, NIS, Adding NIS slave servers
slist command, Configuring a shared NetWare printer, Using NetWare client commands
Smail mail server, Configuring sendmail
Smart Browsing, Mozilla, Setting Navigator preferences
SMBNautilus and, Using the Nautilus file manager
SMB (Session Message Block) protocol, Setting Up a Samba File Server in Red Hat Linux
SMB authenticationinstallation and, Running Red Hat Setup Agent
SMB printers (Windows), Adding a Windows (SMB) printer
smb run-level script, Table 12-5: Run-Level Scripts Contained in /etc/init.d
smb.conf file, Setting Up a Samba File Server in Red Hat Linux, Creating global Samba settings in SWAT
smb.conf file, Samba, Editing the smb.conf file
smbclient command, Samba service running?, User passwords working?
smbd daemon, Checking the status of shared directories
SMTP (Simple Mail Transfer Protocol), Introduction to SMTP and sendmail
SmtpGreetingMessage option, sendmail, sendmail options
smurfing attacks, Smurf amplification attack
snapshot backups, Backing Up to a Hard Drive
SNAT, Using iptables to do NAT or IP Masquerading
SNAT (Source Network Address Translation), Example 1: Firewall for shared Internet connection (plus servers)
Sndconfig, Features in Red Hat Linux
sndconfig packageinstallation, Configuring your sound card
sniffers, Using Encryption Techniques
SNMP (Simple Network Management Protocol) server, Simple Network Management Protocol server
snmpd run-level script, Table 12-5: Run-Level Scripts Contained in /etc/init.d
Socket Options, Samba, Tuning options
soft mountNFS, Using mount options
soft option, mounting NFS, Using mount options
softwarefreeware, The Culture of Free Software
installationLogSentry, Monitoring Log Files with LogSentry
changing filters, Changing LogSentry filter files
configuration files, Identifying configuration files
configuring, Configuring LogSentry to suit your needs, Editing the logcheck script, Configuring PortSentry
installing, Downloading and installing PortSentry
logcheck.hacking file, logcheck.hacking
logcheck.ignore file, logcheck.ignore
logcheck.violations file, logcheck.violations
logcheck.violations.ignore file, logcheck.violations.ignore
modifying syslog, Modifying syslog
network services checklist, Checklist for Running Networking Services
overview, Guarding Your Computer with PortSentry
portsentry.conf file, Changing the portsentry.conf file
portsentry.modes file, Changing the portsentry.modes file
restoring access, Restoring access
running, Running LogSentry, Using LogSentry, Using PortSentry as is
configuring, Setting up LogSentry
installing, Downloading and installing LogSentry
new packages, Additional software packages
PortSentrysyslog, Tracking PortSentry intrusions
testing, Testing PortSentry
selecting responses, Choosing responses
selecting ports, Selecting ports
RPM and, Why Choose Red Hat Linux?
RPM format, Primary Advantages of Linux
updating, Getting Linux Software "up2date"
checking for updates, Registering with Red Hat Network, Getting Updates
wireless Linux, installation, Installing wireless Linux software
software alternatives, Choosing Software Alternatives
mail and printing, Selecting mail and printing alternatives, Using mail and printing alternatives
Software Installation, Mozilla, Setting Navigator preferences
software repositories, yum and, Downloading and installing applications with yum, Configuring yum (/etc/yum.conf), Running yum to download and install RPMs, Using yum for listing and updating packages
sortingMySQL databases, Sorting data
sound cardsadvantages, Listening to Audio
configuration, Configuring your sound card
driver support, Listening to Audio
sound mixing devices, Listening to Audio
soundcardsconfiguration, Configuring your sound card
source codeapplication installation and, Building and installing from source code, Installing software in SRPMS format, Installing software in gzip/tar format
gzip/tar format, Installing software in gzip/tar format
installation, Installing kernel source code
SRPMS format, Installing software in SRPMS format, Installing software in gzip/tar format
kernelSRPMS, Building and installing from source code
SourceForge.net, Finding applications on the Internet
Sox, Performing audio file conversion and compression
Sox utility (audio file format converter, Converting audio files with Sox, Table 8-1: Sound Formats Supported by Sox Utility, Converting audio files with Sox
spam e-mailJunk Mail (Mozilla), Connecting to the mail server
spam relaying attacks, Spam relaying
spamassassin, Protecting Against Distributed DOS Attacks, Stopping Spam with SpamAssassin, Setting up SpamAssassin on your mail server, Setting e-mail readers to filter spam
SpamCop, Setting e-mail readers to filter spam
spool directoriesINN news server, Starting with INN
SQL (structured query language), Chapter 24: Setting Up a MySQL Database Server
SQL. See also MySQL, Chapter 24: Setting Up a MySQL Database Server
squid daemon, Red Hat as proxy server, Starting the squid daemon, Using a simple squid.conf file, Modifying the Squid configuration file, Configuring access control in squid.conf, Configuring caching in squid.conf
debugging, Debugging Squid, Checking Squid log files
squid run-level script, Table 12-5: Run-Level Scripts Contained in /etc/init.d
srm.conf fileApache server configuration, Configuring the Apache Server
SRPMS, source code and, Building and installing from source code
software installation, Installing software in SRPMS format, Installing software in gzip/tar format
SSHAppleTalk and, Using AppleTalk (netatalk) from Mac OS X
SSH (secure shell), Using the Secure Shell package
commands, Using the ssh, sftp, and scp commands
launching, Starting the SSH service
ssh command, Using the ssh, sftp, and scp commands
remote logins, Using ssh for remote login/remote execution
SSL (Secure Socket Layer)public key cryptography implementation, Secure Socket Layer
certificate signers, Getting the CSR Signed
self-signed certificates, Creating Self-Signed Certificates
troubleshooting certificates, Troubleshooting your certificates
validation, Getting the CSR Signed
service requests, Creating a Certificate Service Request
certificate signers, Using third-party certificate signers
creating certificates, Creating SSL Certificates, Using third-party certificate signers
SSL (Secure Sockets Layer), The Apache Web server
standardscompliance, Linux's Roots in UNIX
star topology, LAN topologies
StarOffice, Other Word Processors, Using StarOffice
Microsoft Office and, Using Red Hat Linux as an Application Platform
open source version, Using Red Hat Linux as an Application Platform
OpenOffice and, Using OpenOffice
starting desktop, Getting Familiar with the Desktop, What Happens During Desktop Startup?
startup scripts, Understanding what startup scripts do
statementsecho statement, Executing and debugging shell scripts
static IP addresses, Understanding IP Addresses, Getting static IP addresses
statistics packages, Analyzing Web-server traffic
StatusFile option, sendmail, sendmail options
stealth scan, Using LogSentry, Selecting ports, Testing PortSentry
string data typesMySQL tables, Understanding MySQL Tables, Table 24-4: String Data Types for Columns
Stronghold3 Web server, Other Web servers available for Red Hat Linux
Stylesheets button (Konqueror), Configuring Konqueror options
su command, Becoming Super User (The su Command)
subcomponents, httpd.conf file (Apache Server), Revealing subcomponents
subfolders, Getting Familiar with the Desktop
subscribing to newsgroups, Subscribing to newsgroups, The Pan newsreader
substitutioncommands, Expanding commands
sudo command, Using sudo for assigning administrative privilege, Adding users with useradd
sudoers file, Administrative configuration files
super userchanging to, Becoming Super User (The su Command)
X Window System, Becoming Super User in X
super-server. See xinetd daemon, The xinetd super-server
supportpassword reset, Resetting a user's password
technical support for Fedora Core, Red Hat forms the Fedora Project
technical support mailbox, Creating a technical support mailbox
suspend mode (laptops), Using apm to enter suspend mode
SVID (System V Interface Definition), Linux's Roots in UNIX
swap file system, Supported file systems
SWAT (Samba Web Administrator Tool), SWAT
SWAT, Samba configuration, Configuring Samba with SWAT, Turning on the SWAT service, Starting with SWAT, Security options, Logging options, Tuning options, Browse options, WINS options, Configuring shared directories with SWAT, Checking your Samba setup with SWAT
global settings, Creating global Samba settings in SWAT, Security options, Logging options, Printing options, Browse options, WINS options, Configuring shared directories with SWAT
permissions, Testing your Samba permissions
setup check, Checking your Samba setup with SWAT
sharing, Checking the status of shared directories
sharing settings, Configuring shared directories with SWAT
switches, networks, LAN equipment setup
symmetric cryptography, Symmetric cryptography
SYSADMIN value (LogSentry), Editing the logcheck script
syslogmodifyingLogSentry, Modifying syslog
PortSentry software, Tracking PortSentry intrusions
syslog run-level script, Table 12-5: Run-Level Scripts Contained in /etc/init.d
syslog.conf file, Administrative configuration files
syslogd, The role of syslogd
configuration, The role of syslogd
redirecting logs, Redirecting logs to a loghost with syslogd
systctl.conf file, Turning on iptables
system administrationcommandsconfiguration filesfile sizefile systemsadding, Adding a hard disk
checking for updates, Registering with Red Hat Network, Getting Updates
checking used by directory, Checking disk usage with du
CPU usage, Monitoring CPU usage with top
creating, Using the mkfs command to create a file system
enabling suspend mode (laptops), Using apm to enter suspend mode
laptop battery status applet, Using the battery status applet
laptop power consumption, Monitoring power usage on laptop computers
mail and printing, Selecting mail and printing alternatives, Using mail and printing alternatives
overview, Monitoring System Performance
reporting, Displaying system space with df, Finding disk consumption with find
System Monitor, Watch computer usage with System Monitor
umount command, Using the umount command to unmount a file system
fstab file, Using the fstab file to define mountable file systems
mount command, Using the mount command to mount file systems
supported types, Supported file systems, Using the fstab file to define mountable file systems
mounting, Mounting file systems
overview, Managing File Systems and Disk Space
graphical administrative interfaces, Using Red Hat graphical administration tools
hard diskslog filesloginsadministrative, Using other administrative logins
granting priviledges, Using sudo for assigning administrative privilege
listing loaded, Listing loaded modules
loading, Loading modules
locating, Finding available modules
other, Using other administrative logins, Using sudo for assigning administrative privilege
modulesperformance monitoringroot useradministrative, Administrative commands, Administrative configuration files, Administrative log files
changing to, Becoming Super User (The su Command)
launching, Using Red Hat graphical administration tools
login, Using the root Login
software alternatives, Choosing Software Alternatives
super usersystem spaceupdating software, Getting Linux Software "up2date"
system administrator, Chapter 10: Understanding System Administration
system administratorsMACs, Looking inside Mac OS X
system crontab file, Using the cron facility
system initialization, System Initialization
inittab.file, The inittab file, Format of the inittab file, Table 12-3: Valid init Actions, Breakdown of the inittab file, Table 12-4: Possible Run Levels, Breakdown of the inittab file
system logging, System logging
System Logging Daemon, The role of syslogd
System Logs window, Detecting Intrusions from Log Files
System Monitor, Watch computer usage with System Monitor
system performancemonitoring, Administering Your Red Hat Linux System
system profilessetting, Setting system profiles
system services, Common Linux Features
system spacechecking used by directory, Checking disk usage with du
reporting, Displaying system space with df, Finding disk consumption with find
system startup/shutdown, scripts and, Starting run-level scripts, Understanding run-level scripts, Table 12-5: Run-Level Scripts Contained in /etc/init.d, Understanding run-level scripts, Understanding what startup scripts do, Changing run-level script behavior, Reorganizing or removing run-level scripts, Adding run-level scripts, Managing xinetd services, Manipulating run levels, Changing to a shutdown run level
system tasksscheduling, Scheduling System Tasks
batch command, Using the batch command
cron facility, Using the cron facility, Modifying scheduled tasks with crontab, Understanding cron files
deleting scheduled jobs, Deleting scheduled jobs
viewing scheduled jobs, Viewing scheduled jobs
submitting scheduled jobs, Submitting scheduled jobs
job run time, Specifying when jobs are run, Table 12-6: Samples for Specifying Times in an at Job
at.deny file, Using at.allow and at.deny
at.allow file, Using at.allow and at.deny
system tuning parameters, inn.conf file, System tuning parameters