paartitions
Windows
resizing, Before you begin
package dependencies errors, rpm, Installing with rpm
Package Management window, Installing More Red Hat Linux Packages
packages
application downloads, Understanding package names and formats, Using different archive and document formats, Table 5-2: Linux Archive File Formats, Using different archive and document formats
archives
formats, Using different archive and document formats, Table 5-3: Linux Document Formats, Using different archive and document formats
CD-ROM, Removed Packages, Red Hat Linux Packages on the CDs
deleting
queries, Querying packages with rpm
rpm, Removing packages with rpm, Querying packages with rpm
documents
gzip files, Building and installing from source code
installation, Beginning the installation, Installing More Red Hat Linux Packages
installation and, Quick Installation
removed from version 8, Removed Packages
rpm
verification, Verifying packages with rpm
tar files, Building and installing from source code
packets
firewalls and, Example 1: Firewall for shared Internet connection (plus servers)
Pan newsreader, The Pan newsreader
panel
Autohide option, Changing panel properties
desktop, Getting Familiar with the Desktop
drawers
adding, Getting Familiar with the Desktop
Hide Mode, Changing panel attributes
hiding, Changing panel properties
moving items, Using the GNOME panel
properties, Changing panel properties
resizing items, Using the GNOME panel
Window List, Adding an applet
panel (GNOME), Using the GNOME panel
adding, Adding another panel
applets, adding, Adding an applet
application launcher
adding, Adding an application launcher, Adding a drawer
drawers
Panel (KDE), KDE desktop described
PAP (Password Authentication Protocol), Checking the chap-secrets or pap-secrets file
PAP (Printer Access Protocol), Printer Sharing
papd daemon, Printer Sharing
papd.conf file, Starting netatalk
parameters
bash shell, Parameter expansion in bash
ipchains, Understanding ipchains firewall rules
optional, Understanding ipchains firewall rules, Table 14-4: Ipchains Optional Parameters
positional parameters, Special Shell Variables
parted command, Before you begin
Partition Magic, Before you begin
partitioning
corrupt file systems and, Tips for creating partitions
devices, Partitioning with Disk Druid during installation
fdisk, Partitioning with fdisk
fdisk and, Partitioning with fdisk
file systems, Partitioning with Disk Druid during installation
FIPS utility, Using the FIPS utility
installation and, Partitioning your disks, Partitioning with Disk Druid during installation, Deleting, adding, and editing partitions, Partitioning with fdisk, Tips for creating partitions
Disk Druid, Partitioning with Disk Druid during installation, Deleting, adding, and editing partitions, Partitioning with fdisk, Tips for creating partitions
mount poing, Partitioning with Disk Druid during installation
operating systems, multiple, Partitioning your disks
reasons for, Reasons for partitioning
repartitioning, Backing up and repartitioning
partitions
adding, Deleting, adding, and editing partitions
backups and, Backing up and repartitioning
configuring for multiple operating systems, Tips for creating partitions
deleting, Deleting, adding, and editing partitions
Disk Druid and, Quick Installation, Beginning the installation
DoS attacks and, Tips for creating partitions
editing, Deleting, adding, and editing partitions
file system considerations, Managing File Systems and Disk Space
installation and, Quick Installation
mounting, Partitioning with fdisk
strategies, Beginning the installation
preserving data prior to Linux installation, Beginning the installation
repartitioning, Backing up and repartitioning
resizing, Reclaiming disk space from existing partitions, Before you begin
Windows
passive FTP, firewalls, Turning on iptables
passwd command, Choosing good passwords
passwd file, Administrative configuration files
root user information, Using the root Login
Password field, printconf-gui window, Adding a Windows (SMB) printer
passwords
authconfig command, Checking for the shadow password file
chage command, Resetting a user's password
conversion, Checking for the shadow password file
encrypted, Using a shadow password file, Breaking encrypted passwords
encryption
MAC OS/X, Using Windows/Linux servers (Samba)
Samba, Configuring a simple Samba server
group, Checking for the shadow password file
netatalk, Setting up the netatalk server
overview, Using Password Protection, Public-key cryptography
Require Password feature (KDE desktop), Changing the display
resetting, Resetting a user's password
root user, Using the root Login
Samba server, Security options
scriptkiddies, Hacker versus Cracker
selecting, Using Password Protection, Choosing good passwords
shadow password file, Breaking encrypted passwords
location, Checking for the shadow password file
path
dot (.), Adding environment variables, Identifying Directories
viewing current, Locating commands
PATH environment variable, Common shell environment variables
pathhost parameter, inn.conf file, General parameters
paths
absolute path, Checking directories and permissions
relative path, Checking directories and permissions
pattern matching
metacharacters
files, Using file-matching metacharacters
pax utility, Using the pax Archiving Tool
pbm217k driver, Lexmark printers, Choosing a Printer
PCMCIA
wireless LANs, PCMCIA with adapter card
PCMCIA Devices image file, install disks and, Creating a floppy disk in Linux
pcmcia run-level script, Table 12-5: Run-Level Scripts Contained in /etc/init.d
PCMCIA slots, laptops
installation and, Installing Red Hat Linux on a Laptop
PDF documents
Acrobat Reader, Using Adobe Acrobat Reader
displaying, Using the ghostscript and gv commands
performance
monitoring
CPU usage, Monitoring CPU usage with top
enabling suspend mode (laptops), Using apm to enter suspend mode
laptop battery status applet, Using the battery status applet
laptop power consumption, Monitoring power usage on laptop computers
System Monitor, Watch computer usage with System Monitor
overview, Monitoring System Performance
upgrading and, Beginning the installation
permissions
Apache server, Setting access options and overrides, Table 21-3: Special Access Features for the AllowOverride Directive
changing, Quick-starting vsFTPd
directories, Setting FTP access, Downloading files
file
AppleTalk, Setting file/directory permissions, Moving, copying, and deleting netatalk files
setting, Creating files and directories
files, Understanding file permissions, Setting FTP access, Downloading files
FTP servers, Allowing permission capabilities
INN news server, Allowing Users to Access Your Server
Samba, Testing your Samba permissions
wu-ftpd, Using the Washington University FTP Server (WU-FTPD)
personal desktop
installation, Beginning the installation
personal desktop installation, Quick Installation
Philips USB Webcam, Running GnomeMeeting
php-mysql, Configuring the MySQL Server
PIC cards
listing, Getting a supported TV card
pic command
text preprocessing, Text processing with Groff
pictures
. See also graphics; images, Adding equations, tables, and pictures
Groff documents, Adding equations, tables, and pictures
PID, httpd.conf file (Apache server), Storing the server's ScoreBoard file, Storing the server's PID file
pine email reader, Features in Red Hat Linux
Pine mail reader, Pine mail reader
ping command, Can you reach another computer on the LAN?
blocking, Changing ipchains firewall rules
DDOS attacks
detecting, Protecting Against Distributed DOS Attacks
pipe (|) metacharacter, Piping commands
play lists, CDDB, Playing CDs with gnome-cd
playlists
xine, Creating playlists with xine
plug-ins
Adobe Acrobat, Adding plug-ins
DjVu, Adding plug-ins
Macromedia Flash Player, Adding plug-ins
Mozilla Navigator, Adding plug-ins
Real Audio, Adding plug-ins
Xswallow, Adding plug-ins
plug-insCult3D, Adding plug-ins
Plugger Plug-in, Adding plug-ins
pnm2ppa driver, DeskJet printers, Choosing a Printer
policies
firewalls, Example 1: Firewall for shared Internet connection (plus servers)
POP
configuration, Configuring POP
POP (Post Office Protocol), Introduction to SMTP and sendmail, E-mail servers
mail retrieval, Getting Mail from the Server (POP), Accessing mailboxes in Linux, Configuring POP
POP (Post Office Protocol) server, Connecting to the mail server
port forwarding, Using iptables to do port forwarding
port numbers
HTTP
Apache server, Choosing the HTTP port number
port numbers, Internet connection, Understanding How the Internet Is Structured
port numbers, network services, Selecting ports
portable desktops, users, Creating Portable Desktops
portmap run-level script, Table 12-5: Run-Level Scripts Contained in /etc/init.d
portmap servers
network services reference, Portmap server
Arpwatch service, Arpwatch server
SNMP, Simple Network Management Protocol server
SWAT, SWAT
ports
insecure
MAC OS X and NFS, Connecting to NFS from the Connect to Server window
security, Evaluating access to network services
PortSentry
configuration files, Identifying configuration files
configuring, Configuring PortSentry
selecting ports, Selecting ports
portsentry.conf file, Changing the portsentry.conf file
installing, Downloading and installing PortSentry
overview, Guarding Your Computer with PortSentry
portsentry.modes file, Changing the portsentry.modes file
restoring access, Restoring access
running, Using PortSentry as is
selecting responses, Choosing responses
syslog, Tracking PortSentry intrusions
testing, Testing PortSentry
positional parameters, Special Shell Variables
POSIX compliance, Linux's Roots in UNIX
Postfix mail-transfer agent, Introducing Postfix
Postfix MTA mail server, Other Mail Servers Available for Red Hat Linux
posting backoff parameters, inn.conf file, Posting exponential backoff parameters
PostMasterCopy option, sendmail, sendmail options
POSTROUTING chain rules, Example 1: Firewall for shared Internet connection (plus servers)
PostScript
documents
displaying, Using the ghostscript and gv commands
publishing tools and, Using Traditional Linux Publishing Tools
PostScript printers, Choosing a Printer
pound sign (#) before comments, Executing and debugging shell scripts
PPA (Printing Performance Architecture) format, Choosing a Printer
PPID environment variable, Common shell environment variables
PPP
checking connection, Checking that the name servers are set, Running debugging
pap-secrets file, Checking the chap-secrets or pap-secrets file
setup, Setting up dial-up PPP
GNOME, Creating a dial-up connection with the Internet Configuration Wizard
VPN and, Configuring a Virtual Private Network Connection
PPP (Point-to-Point Protocol), Understanding How the Internet Is Structured
precedences, e-mail messages, Message precedences
prefdm script
login screen, What Happens During Desktop Startup?
preferences
desktop, Getting Familiar with the Desktop
Evolution, Setting Evolution preferences, Changing Mail Accounts settings, Receiving, composing, and sending e-mail
GNOME
advanced, Setting Navigator preferences
changing, Changing GNOME preferences
Mozilla
Mozilla Navigator, Setting Navigator preferences
screen saver
GNOME, Changing GNOME preferences
windows, Managing windows
Preferences windows, Using the GNOME Desktop
Preferred Master option, Samba, Browse options
Primary DNS
installation and, Beginning the installation
primary name server, Understanding DNS
Print Manager, Managing Printing
print servers
configuration, Configuring Print Servers
network services reference, Print servers
setup, Chapter 17: Setting Up a Print Server
switching, Referencing Network Services
print services, mars_nwe package, Setting Up a NetWare File Server in Red Hat Linux
print spooling
LPRng system, Chapter 17: Setting Up a Print Server
printcap file, Administrative configuration files
printconf-gui command, Using Printing Commands
printconf-gui tool, Setting Up Printers, Configuring local printers, Configuring remote printers, Adding a remote UNIX printer, Adding a Windows (SMB) printer, Adding a NetWare printer
Printer Configuration, Using Red Hat graphical administration tools
printer sharing
Nautilus, Using the Nautilus file manager
printers
classes
configuration
AppleTalk, Printer Sharing
configuration, Configuring a shared CUPS printer, Configuring a shared NetWare printer, Configuring a shared Samba printer, Understanding smb.conf for printing, Setting up SMB clients
creating, Using Web-based CUPS administration
CUPS, adding, Adding a remote CUPS printer
netatalk, Printer Sharing
NetWare, Adding a NetWare printer
options configuration, Configuring CUPS printer options
remote, Configuring remote printers, Adding a remote CUPS printer, Adding a remote UNIX printer, Adding a Windows (SMB) printer, Adding a NetWare printer
CUPS
drivers
configuration, Configuring local printers, Choosing a Printer, Configuring local printers
CUPS, Common UNIX Printing Service
local, from desktop, Setting Up Printers, Configuring local printers
PostScript, Using Traditional Linux Publishing Tools
Ghostscript, Choosing a Printer
installation
local
NetWare, Adding a NetWare printer
PostScript, Choosing a Printer
remote
Windows, adding, Adding a Windows (SMB) printer
UNIX, adding, Adding a remote UNIX printer
selecting, Choosing a Printer
shared
sharing
status listing, Listing status with lpc
viewing, Configuring CUPS printer options
Winprinters, Choosing a Printer
printing, Chapter 17: Setting Up a Print Server
alternative software, Selecting mail and printing alternatives, Using mail and printing alternatives
commands
removing jobs, Removing print jobs with lprm
UNIX, CUPS and, Switching printing service
default printer, Printing to the default printer
document management, Using Printing Commands
Groff document publishing, Formatting and printing documents with Groff
LaTeX documents, Printing LaTeX files, Converting documents
listing jobs, Using Web-based CUPS administration
lpr command, Using lpr to print
LPRng software, Print servers
PAP, Printer Sharing
printer status, checking, Checking printer status
queues, checking, Checking the print queues
raw mode, Configuring CUPS printer options
removing print jobs, Removing print jobs
Samba, options, Printing options
shell, from, Printing from the shell
PrivacyOptions option, sendmail, sendmail options
private DNS server zone, Editing /etc/named.conf
priviledges
root user
granting, Using sudo for assigning administrative privilege
privledges
root user
granting, Using sudo for assigning administrative privilege
proc file system, Supported file systems
processes
checking, Checking system activity
processes, servers
number, setting, Setting the number of server processes
processor
system requirements, Choosing computer hardware
Procmail
enabling, Blocking mail with Procmail
recipes, Setting up SpamAssassin on your mail server
procmail command, Setting up SpamAssassin on your mail server
profile file, Administrative configuration files
programming constructs
shell scripts, Using programming constructs in shell scripts, The "if… then" statements, Table 12-2: Operators for Test Expressions, The "if… then" statements, The case command, The "for . . . do" loop, The "while . . . do" and "until . . . do" loops
PROMPT COMMAND environment variable, Common shell environment variables
prompts, The Shell Interface
properties
KDE desktop
panel attributes, Changing panel attributes
panel, Changing panel properties
protocols
NetBEUI, Using Samba shared directories from Windows
URLs, Uniform Resource Locators
protocols file, Administrative configuration files
proxies
Internet, Internet domains
Proxies button (Konqueror), Creating an Image Gallery with Konqueror
Proxies, Mozilla, Setting Navigator preferences
proxy server, Proxies
proxy servers
IE configuration, Configuring Internet Explorer to use a proxy
Lynx configuration, Configuring Mosaic and Lynx browsers to use a proxy
Mosaic configuration, Configuring Mosaic and Lynx browsers to use a proxy
Netscape configuration, Configuring Mozilla to use a proxy
Red Hat as, Setting up Red Hat Linux as a Proxy Server
clients, setup, Setting up Proxy Clients, Configuring Mozilla to use a proxy, Configuring Internet Explorer to use a proxy, Configuring Mosaic and Lynx browsers to use a proxy
squid daemon, debugging, Debugging Squid, Checking Squid log files
squid daemon, Starting the squid daemon, Using a simple squid.conf file, Modifying the Squid configuration file, Configuring access control in squid.conf, Configuring caching in squid.conf
proxy services
Apache server, Enabling proxy and caching services
proxy/caching servers, Proxy/caching server
ps command, Checking system activity
text preprocessing, Text processing with Groff
PS1 environment variable, Common shell environment variables
public DNS server zone, Creating DNS configuration files (named.conf and /var/names/*)
public key cryptography, Public-key cryptography, Secure Socket Layer
removing encryption from private keys, Restarting your Web server
self-signed certificates, Creating Self-Signed Certificates
SSL and, Secure Socket Layer
SSL certificate service requests, Creating a Certificate Service Request
SSL certificate signers, Using third-party certificate signers, Getting the CSR Signed
SSL certificate validation, Getting the CSR Signed
SSL certificates, Creating SSL Certificates, Using third-party certificate signers
troubleshooting certificates, Troubleshooting your certificates
public servers, Connecting a Public Server
configuration
domain name, Getting a domain name, Checking domain name availability
FTP server, Opening your firewall
ISPs, Choosing an ISP, Choosing a connection speed
connection speed, Choosing a connection speed
firewalls , Opening your firewall, Keeping up with fixes
networking, Configuring networking
reserving, Reserving a domain name
security, Managing security, Opening your firewall, Keeping up with fixes
servers, Configuring servers
static IP addresses, Getting static IP addresses
terms of service, Checking Terms of Service
logging, Checking logs and system files
mail server, Opening your firewall
network interface, Configuring networking
security, Managing security
Web server, Opening your firewall
publishing
OpenOffice and, Using OpenOffice
publishing tools
AbiWord, Other Word Processors, AbiWord
DocBook, Understanding DocBook
documents
Groff
Acrobat Reader, Using Adobe Acrobat Reader
creating documents, Creating a letter, memo, or white paper with Groff, Figure 6-6: Add headings and approval lines automatically to memos., Creating and formatting a LaTeX document, Creating DocBook documents
default printer, Printing to the default printer
equations, tables, pictures, adding, Adding equations, tables, and pictures
file format conversion, Converting DocBook documents
format conversion, Converting documents, Understanding DocBook
formatting and printing, Formatting and printing documents with Groff
from shell, Printing from the shell
ghostscript command, Using the ghostscript and gv commands
gv command, Using the ghostscript and gv commands
LvX editor, Using the LyX LaTeX Editor, Printing LaTeX files
macro packages, Text processing with Groff
man page production, Creating a man page with Groff
overview, Creating Documents in Groff or LaTeX, Text processing with Groff, Text processing with TeX/LaTeX
KOffice, Using StarOffice, Using KOffice
LaTeX
printer status, checking, Checking printer status
printing, Printing LaTeX files, Converting documents
nroff and troff, Text processing with Groff
OpenOffice and, Using OpenOffice
overview, Using Traditional Linux Publishing Tools
printing
removing print jobs, Removing print jobs
queues, checking, Checking the print queues
StarOffice, Other Word Processors, Using StarOffice
traditional, Using Traditional Linux Publishing Tools
punch holes, firewalls, Turning on iptables
pwconv command
shadow password file, Checking for the shadow password file
pwd command, Checking directories and permissions, Creating files and directories
PWD environment variable, Common shell environment variables
pwunconv command, Checking for the shadow password file