Red Hat [Electronic resources] : The Complete Reference Enterprise Linux Fedora Edition؛ The Complete Reference

Richard L. Petersen

نسخه متنی -صفحه : 328/ 326
نمايش فراداده

List of Figures

Chapter 3: Interface Basics

Figure 3-1: The Bluecurve GNOME desktop

Chapter 4: Red Hat System Configuration

Figure 4-1: Red Hat administrative tools

Figure 4-2: The Red Hat User Manager, redhat-config-users

Figure 4-3: rehat-config-printer

Figure 4-4: The redhat-config-xfree86 Display Settings window

Figure 4-5: redhat-config-packages

Figure 4-6: Authentication with authconfig-gtk

Chapter 5: Red Hat Network Configuration

Figure 5-1: The redhat-config-network Network Configuration window

Figure 5-2: The redhat-config-network DNS panel

Figure 5-3: Device configuration in redhat-config-network

Figure 5-4: Internet Connection Wizard

Figure 5-5: redhat-config-securitylevel

Figure 5-6: DNS server operation

Figure 5-7: DNS server and network

Figure 5-8: redhat-config-bind example

Figure 5-9: redhat-config-bind master zone

Figure 5-10: Adding a host

Chapter 6: GNOME

Figure 6-1: GNOME

Figure 6-2: Nautilus file manager

Figure 6-3: File properties on Nautilus

Figure 6-4: The GNOME panel

Chapter 7: The K Desktop Environment: KDE

Figure 7-1: The KDE desktop

Figure 7-2: The desktop dialog box

Figure 7-3: KDE panel

Figure 7-4: The KDE file manager

Figure 7-5: KDE Control Center

Chapter 10: Managing Linux Files, Directories, and Archives

Figure 10-1: File information displayed using the -l option for the ls command

Figure 10-2: The Linux file structure beginning at the root directory

Figure 10-3: Directory pathnames

Figure 10-4: File Roller archiving and compression tool

Chapter 11: Office and Database Applications

Figure 11-1: OpenOffice''s OpenWriter word processor

Chapter 14: Web, FTP, and Java Clients

Figure 14-1: Mozilla Web browser

Chapter 16: Encryption, Integrity Checks, and Signatures—GNU Privacy Guard

Figure 16-1: Public-key encryption and digital signatures

Chapter 17: Internet Protocol Security: IPsec

Figure 17-1: IPsec on redhatconfig- network

Chapter 18: Secure Shell and Kerberos

Figure 18-1: SSH setup and access

Figure 18-2: Kerberos authentication

Chapter 19: Network Firewalls: Netfilter

Figure 19-1: A network with a firewall

Figure 19-2: Firewall rules applied to a local network example

Chapter 20: Server Management

Figure 20-1: redhat-configservices

Chapter 22: Web Servers: Apache

Figure 22-1: Apache Configuration Tool

Chapter 25: Print Servers

Figure 25-1: CUPS Add Printer page

Chapter 27: Basic System Administration

Figure 27-1: redhat-config-date, Date & Time tool

Figure 27-2: Red Hat Log Viewer

Figure 27-3: Procman System Manager

Chapter 31: RAID and LVM

Figure 31-1: RAID devices

Figure 31-2: Logical Volume Management

Chapter 33: Kernel Administration

Figure 33-1: The xconfig Linux Kernel Configuration tool, kernel 2.4

Figure 33-2: The gconfig Linux Kernel Configuration tool, kernel 2.6

Chapter 34: Domain Name System

Figure 34-1: DNS server operation

Figure 34-2: DNS server and network

Chapter 36: NFS and NIS

Figure 36-1: Red Hat NFS Configuration Tool

Chapter 37: Samba

Figure 37-1: redhat-config-samba

Figure 37-2: SWAT home page

Figure 37-3: SWAT Share page showing Homes section

Figure 37-4: SWAT Global Variables page

Figure 37-5: SWAT Samba share

Chapter 38: Administering TCP/IP Networks

Figure 38-1: Class-based netmask operations

Figure 38-2: CIDR addressing

Figure 38-3: Class-based and CIDR broadcast addressing