Red Hat Linux Bible: Fedora and Enterprise Edition [Electronic resources]

Christopher Negus

نسخه متنی -صفحه : 274/ 264
نمايش فراداده

Index

R

r commands, Using the "r" commands: rlogin, rcp, and rsh

RAID

installation and, Partitioning with Disk Druid during installation

RAID disks

advantages, Using RAID disks

installing, Using RAID disks

RAM

system requirements, Choosing computer hardware

RANDOM environment variable, Common shell environment variables

random run-level script, Table 12-5: Run-Level Scripts Contained in /etc/init.d

RARP (Reverse Address Resolution Protocol) server, Reverse Address Resolution Protocol server

raw mode, printing, Configuring CUPS printer options

RBL (RealTime Blackhole Lists), Setting e-mail readers to filter spam

rcp command, Using the "r" commands: rlogin, rcp, and rsh, Using the ssh, sftp, and scp commands

README files, wu-ftpd, Creating README files

Real Audio plug-in, Adding plug-ins

real users

wu-ftpd, Real users

real users, FTP

access, denying, Denying access to real users

real users, FTP servers, FTP user types

RealPlayer video player, Using RealPlayer

RealTime Blackhole Lists (RBL), Setting e-mail readers to filter spam

rebooting

login option, Logging in to Red Hat Linux

receiving messages, Evolution, Receiving, composing, and sending e-mail

recipes

procmail, Setting up SpamAssassin on your mail server

RecipientFactor option, sendmail, sendmail options

reconfiguration

kernel, Reconfiguring the kernel, Deciding to reconfigure the kernel, Installing kernel source code, Protecting your system, Preparing the source tree, Compiling the new kernel, Installing the new kernel

recording

music CDs, Recording Music CDs

creating labels, Creating CD labels with cdlabelgen

Grip, Ripping CDs with Grip

cdrecord, Creating an audio CD with cdrecord

configuring CD-ROMs, Configuring an IDE CD-ROM for recording, Creating an audio CD with cdrecord

records

MySQL databases

deleting, Updating and deleting MySQL records

updating, Updating and deleting MySQL records

displaying, Displaying all or selected records

Red Hat

advantages, Why Choose Red Hat Linux?, Features in Red Hat Linux

as proxy server, Setting up Red Hat Linux as a Proxy Server

clients, setup, Setting up Proxy Clients, Configuring Mozilla to use a proxy, Configuring Internet Explorer to use a proxy, Configuring Mosaic and Lynx browsers to use a proxy

squid daemon, debugging, Debugging Squid, Checking Squid log files

squid daemon, Starting the squid daemon, Using a simple squid.conf file, Modifying the Squid configuration file, Configuring access control in squid.conf, Configuring caching in squid.conf

as router, Setting up Red Hat Linux as a Router

distribution description, What Is Red Hat Linux?

Linux

characteristics of, What Is Linux?

configuration, Configuring the Red Hat Linux router, Enable forwarding and masquerading

network clients, Configuring network clients

network clients, Windows, Configuring Windows network clients

overview, Introducing Red Hat Linux

Red Hat book improvements, Red Hat Linux Bible Improvements

Red Hat FTP mirrors, Downloading and installing applications with yum

Red Hat Linux

See also Fedora, Introducing Red Hat Linux

as NIS client, Setting Up Red Hat Linux as an NIS Client, Defining an NIS domain name, Setting up the /etc/yp.conf file, Configuring NIS client daemons, Checking that NIS is working, Using NIS maps

as NIS master server, Setting Up Red Hat Linux as an NIS Master Server, Choosing mapping options, Configuring access to maps, Generating the NIS map database, Configuring NIS server daemons

as NIS slave server, Setting Up Red Hat Linux as an NIS Slave Server

DHCP client setup, Setting Up a DHCP Client

Red Hat menu

GNOME, Use the Red Hat menu

Red Hat Network, Using Red Hat graphical administration tools

Red Hat Network Web site

registering with, Registering with Red Hat Network

software updates, Getting updates from the Red Hat Network

Red Hat User Manager

adding users, Adding users with Red Hat User Manager, Setting system profiles

deleting accounts, Deleting user accounts with Red Hat User Manager

modifying accouts, Modifying user accounts with Red Hat User Manager, Deleting user accounts with Red Hat User Manager

user defaults, Setting User Defaults, Table 11-2: useradd Options for Changing User Defaults, Setting User Defaults

shell options, Configuring system-wide shell options

system profiles, Setting system profiles

tcshrc file, Supplying an initial .tcshrc file

bashrc file, Supplying an initial .bashrc file

login scripts, Supplying initial login scripts

redhat-logview command, Detecting Intrusions from Log Files

redhat-release file, Administrative configuration files

redirection metacharacters

files, Using file-redirection metacharacters

references

network services, Referencing Network Services

database servers, Database services

e-mail servers, E-mail servers

file server, File servers, Samba server, NetWare server

information servers, Information servers, Dynamic Host Configuration Protocol server, Lightweight Directory Access Protocol server, Domain Name System server, Reverse Address Resolution Protocol server

login servers, Login servers

NetWare server, NetWare server

network administration servers, Network administration servers

news servers, News server

NTP servers, Network Time Protocol server

portmap servers, Portmap server, SWAT, Arpwatch server, Simple Network Management Protocol server

print servers, Print servers

Samba server, Samba server

security services, Security services, System logging, Virtual private network servers, Proxy/caching server

user services, User services, Remote execution servers, Talk server, Finger server, Remote user identification, Write-to-All server

Web server, Web server

registration

desktop, Getting Familiar with the Desktop

relative path, Checking directories and permissions

reliability, Why Choose Red Hat Linux?

remote applications

X Window, Running remote X applications

security, Securing remote X applications, Using SSH to run remote X applications

launching, Launching a remote X application

displays, Traditional method to run remote X applications

remote execution servers, Remote execution servers

remote login

ssh command, Using ssh for remote login/remote execution

Telnet and, Using telnet for remote login

remote login service, Using TCP wrappers

remote operations

r commands, Using the "r" commands: rlogin, rcp, and rsh

remote printers

configuration, Configuring remote printers, Adding a remote CUPS printer, Adding a remote UNIX printer, Adding a Windows (SMB) printer, Adding a NetWare printer

CUPS

adding, Adding a remote CUPS printer, Adding a remote UNIX printer, Adding a Windows (SMB) printer

NetWare, Adding a NetWare printer

UNIX

Windows

remote user identification, Remote user identification

rename parameter, FTP server, Enabling rename

renaming

files, Getting Familiar with the Desktop

Require Password feature (KDE desktop), Changing the display

reserved words

shell commands, Locating commands

resident drivers, Configuring modules

resizing

panel items, Using the GNOME panel

resolv.conf file, Administrative configuration files, Identifying other computers (hosts and DNS)

response codes, Apache server errors, Customizing error responses, Table 21-6: Server Response Codes

restore command, Restoring Backed Up Files

file systems, Restoring an entire file system

individual files, Recovering individual files

restoring backups, Restoring Backed Up Files

file systems, Restoring an entire file system

individual files, Recovering individual files

Ret Hat Network Web site

utilizing, Using the Red Hat Network

retrans option, mounting NFS, Using mount options

retry option, mounting NFS, Using mount options

Return to Castle Wolfenstein (id Software), Return to Castle Wolfenstein

REVOKE command (MySQL), Revoking access

Rewriting Rules section, sendmail, Rewriting rules

RFCs

wu-ftpd, Getting More Information about FTP Servers

ring topology, LAN topologies

RIP/SAP daemon, mars_nwe package, Setting Up a NetWare File Server in Red Hat Linux

ripping CDs, Choosing an audio CD player, Creating an audio CD with cdrecord

See Ripping CDs with Grip

rlogin command, Using the "r" commands: rlogin, rcp, and rsh

rlogin service, Managing xinetd services, Login servers

rm command, Moving, copying, and deleting files

rmmod command, Administering Your Red Hat Linux System

root directory, Working with the Red Hat Linux File System

Apache server

indexes, disabling, Disabling indexes in root directory

chroot, Using the Washington University FTP Server (WU-FTPD)

httpd.conf file, Apache server, Setting the server root directory

root login

MAC OS/X, Using Network Services from Mac OS X

root user

exports file, User mapping options in /etc/exports

file manipulation commands, Exploring Other Text Editors

log in, Why Do I Need a User Login?

login, Using the root Login

priviledges

granting, Using sudo for assigning administrative privilege

prompts, The Shell Interface

root user account

accessing

launching, The init.d start-up scripts

MAC OS X, Connecting to NFS from the command line

Service Configuration window

routed run-level script, Table 12-5: Run-Level Scripts Contained in /etc/init.d

routers

Internet, Understanding How the Internet Is Structured, Routing

Red Hat as, Setting up Red Hat Linux as a Router

network clients, Windows, Configuring Windows network clients

network clients, Configuring network clients

configuration, Configuring the Red Hat Linux router, Enable forwarding and masquerading

rpc file, Administrative configuration files

RPM

application installation, Using Binary RPMs versus Building from Source

packages

verification, Verifying packages with rpm

queries, Querying packages with rpm

RPM (Red Hat Package Management), Primary Advantages of Linux, Why Choose Red Hat Linux?

rpm command, Installing and managing RPM files

package installation, Installing and managing RPM files

RPM files

application installation and, Installing and managing RPM files, Installing with rpm, Upgrading packages with rpm, Removing packages with rpm, Querying packages with rpm, Verifying packages with rpm

RPM packages

downloading, Finding applications on the Internet

yum and, Using yum for listing and updating packages

rpmfind.net, Finding applications on the Internet

RPMs

downloading

yum and, Running yum to download and install RPMs

installation

rsh command, Using the "r" commands: rlogin, rcp, and rsh

rsh service, Manipulating run levels

rsize option, mounting NFS, Using mount options

RtrImpliesDsn option, sendmail, sendmail options

rules

ipchains, firewalls, Changing ipchains firewall rules, Saving ipchains firewall rules

iptables firewalls, Creating iptables firewall rules, Example 1: Firewall for shared Internet connection (plus servers), Example 2: Firewall for shared Internet connection (no servers), Example 3: Firewall for single Linux system with Internet connection

rules, quota package, Creating quota rules

run level

selecting at boot time, Temporarily changing boot options

run level manipulation, Manipulating run levels, Changing to a shutdown run level

run-level scripts, Understanding run-level scripts, Table 12-5: Run-Level Scripts Contained in /etc/init.d, Understanding run-level scripts

adding, Adding run-level scripts

behavior changes, Changing run-level script behavior

removing, Reorganizing or removing run-level scripts

reorganizing, Reorganizing or removing run-level scripts

run-level scripts, starting, Starting run-level scripts, Understanding run-level scripts, Table 12-5: Run-Level Scripts Contained in /etc/init.d, Understanding run-level scripts

RunAsUser option sendmail, sendmail options

runlevel command, Determining the current run level

RWall (Write-to-All) server, Write-to-All server

rwhod run-level script, Table 12-5: Run-Level Scripts Contained in /etc/init.d