r commands, Using the "r" commands: rlogin, rcp, and rsh
RAID
installation and, Partitioning with Disk Druid during installation
RAID disks
advantages, Using RAID disks
installing, Using RAID disks
RAM
system requirements, Choosing computer hardware
RANDOM environment variable, Common shell environment variables
random run-level script, Table 12-5: Run-Level Scripts Contained in /etc/init.d
RARP (Reverse Address Resolution Protocol) server, Reverse Address Resolution Protocol server
raw mode, printing, Configuring CUPS printer options
RBL (RealTime Blackhole Lists), Setting e-mail readers to filter spam
rcp command, Using the "r" commands: rlogin, rcp, and rsh, Using the ssh, sftp, and scp commands
README files, wu-ftpd, Creating README files
Real Audio plug-in, Adding plug-ins
real users
wu-ftpd, Real users
real users, FTP
access, denying, Denying access to real users
real users, FTP servers, FTP user types
RealPlayer video player, Using RealPlayer
RealTime Blackhole Lists (RBL), Setting e-mail readers to filter spam
rebooting
login option, Logging in to Red Hat Linux
receiving messages, Evolution, Receiving, composing, and sending e-mail
recipes
procmail, Setting up SpamAssassin on your mail server
RecipientFactor option, sendmail, sendmail options
reconfiguration
kernel, Reconfiguring the kernel, Deciding to reconfigure the kernel, Installing kernel source code, Protecting your system, Preparing the source tree, Compiling the new kernel, Installing the new kernel
recording
music CDs, Recording Music CDs
creating labels, Creating CD labels with cdlabelgen
Grip, Ripping CDs with Grip
cdrecord, Creating an audio CD with cdrecord
configuring CD-ROMs, Configuring an IDE CD-ROM for recording, Creating an audio CD with cdrecord
records
MySQL databases
deleting, Updating and deleting MySQL records
updating, Updating and deleting MySQL records
displaying, Displaying all or selected records
Red Hat
advantages, Why Choose Red Hat Linux?, Features in Red Hat Linux
as proxy server, Setting up Red Hat Linux as a Proxy Server
clients, setup, Setting up Proxy Clients, Configuring Mozilla to use a proxy, Configuring Internet Explorer to use a proxy, Configuring Mosaic and Lynx browsers to use a proxy
squid daemon, debugging, Debugging Squid, Checking Squid log files
squid daemon, Starting the squid daemon, Using a simple squid.conf file, Modifying the Squid configuration file, Configuring access control in squid.conf, Configuring caching in squid.conf
as router, Setting up Red Hat Linux as a Router
distribution description, What Is Red Hat Linux?
Linux
characteristics of, What Is Linux?
configuration, Configuring the Red Hat Linux router, Enable forwarding and masquerading
network clients, Configuring network clients
network clients, Windows, Configuring Windows network clients
overview, Introducing Red Hat Linux
Red Hat book improvements, Red Hat Linux Bible Improvements
Red Hat FTP mirrors, Downloading and installing applications with yum
Red Hat Linux
See also Fedora, Introducing Red Hat Linux
as NIS client, Setting Up Red Hat Linux as an NIS Client, Defining an NIS domain name, Setting up the /etc/yp.conf file, Configuring NIS client daemons, Checking that NIS is working, Using NIS maps
as NIS master server, Setting Up Red Hat Linux as an NIS Master Server, Choosing mapping options, Configuring access to maps, Generating the NIS map database, Configuring NIS server daemons
as NIS slave server, Setting Up Red Hat Linux as an NIS Slave Server
DHCP client setup, Setting Up a DHCP Client
Red Hat menu
GNOME, Use the Red Hat menu
Red Hat Network, Using Red Hat graphical administration tools
Red Hat Network Web site
registering with, Registering with Red Hat Network
software updates, Getting updates from the Red Hat Network
Red Hat User Manager
adding users, Adding users with Red Hat User Manager, Setting system profiles
deleting accounts, Deleting user accounts with Red Hat User Manager
modifying accouts, Modifying user accounts with Red Hat User Manager, Deleting user accounts with Red Hat User Manager
user defaults, Setting User Defaults, Table 11-2: useradd Options for Changing User Defaults, Setting User Defaults
shell options, Configuring system-wide shell options
system profiles, Setting system profiles
tcshrc file, Supplying an initial .tcshrc file
bashrc file, Supplying an initial .bashrc file
login scripts, Supplying initial login scripts
redhat-logview command, Detecting Intrusions from Log Files
redhat-release file, Administrative configuration files
redirection metacharacters
files, Using file-redirection metacharacters
references
network services, Referencing Network Services
database servers, Database services
e-mail servers, E-mail servers
file server, File servers, Samba server, NetWare server
information servers, Information servers, Dynamic Host Configuration Protocol server, Lightweight Directory Access Protocol server, Domain Name System server, Reverse Address Resolution Protocol server
login servers, Login servers
NetWare server, NetWare server
network administration servers, Network administration servers
news servers, News server
NTP servers, Network Time Protocol server
portmap servers, Portmap server, SWAT, Arpwatch server, Simple Network Management Protocol server
print servers, Print servers
Samba server, Samba server
security services, Security services, System logging, Virtual private network servers, Proxy/caching server
user services, User services, Remote execution servers, Talk server, Finger server, Remote user identification, Write-to-All server
Web server, Web server
registration
desktop, Getting Familiar with the Desktop
relative path, Checking directories and permissions
reliability, Why Choose Red Hat Linux?
remote applications
X Window, Running remote X applications
security, Securing remote X applications, Using SSH to run remote X applications
launching, Launching a remote X application
displays, Traditional method to run remote X applications
remote execution servers, Remote execution servers
remote login
ssh command, Using ssh for remote login/remote execution
Telnet and, Using telnet for remote login
remote login service, Using TCP wrappers
remote operations
r commands, Using the "r" commands: rlogin, rcp, and rsh
remote printers
configuration, Configuring remote printers, Adding a remote CUPS printer, Adding a remote UNIX printer, Adding a Windows (SMB) printer, Adding a NetWare printer
CUPS
adding, Adding a remote CUPS printer, Adding a remote UNIX printer, Adding a Windows (SMB) printer
NetWare, Adding a NetWare printer
UNIX
Windows
remote user identification, Remote user identification
rename parameter, FTP server, Enabling rename
renaming
files, Getting Familiar with the Desktop
Require Password feature (KDE desktop), Changing the display
reserved words
shell commands, Locating commands
resident drivers, Configuring modules
resizing
panel items, Using the GNOME panel
resolv.conf file, Administrative configuration files, Identifying other computers (hosts and DNS)
response codes, Apache server errors, Customizing error responses, Table 21-6: Server Response Codes
restore command, Restoring Backed Up Files
file systems, Restoring an entire file system
individual files, Recovering individual files
restoring backups, Restoring Backed Up Files
file systems, Restoring an entire file system
individual files, Recovering individual files
Ret Hat Network Web site
utilizing, Using the Red Hat Network
retrans option, mounting NFS, Using mount options
retry option, mounting NFS, Using mount options
Return to Castle Wolfenstein (id Software), Return to Castle Wolfenstein
REVOKE command (MySQL), Revoking access
Rewriting Rules section, sendmail, Rewriting rules
RFCs
wu-ftpd, Getting More Information about FTP Servers
ring topology, LAN topologies
RIP/SAP daemon, mars_nwe package, Setting Up a NetWare File Server in Red Hat Linux
ripping CDs, Choosing an audio CD player, Creating an audio CD with cdrecord
rlogin command, Using the "r" commands: rlogin, rcp, and rsh
rlogin service, Managing xinetd services, Login servers
rm command, Moving, copying, and deleting files
rmmod command, Administering Your Red Hat Linux System
root directory, Working with the Red Hat Linux File System
Apache server
indexes, disabling, Disabling indexes in root directory
chroot, Using the Washington University FTP Server (WU-FTPD)
httpd.conf file, Apache server, Setting the server root directory
root login
MAC OS/X, Using Network Services from Mac OS X
root user
exports file, User mapping options in /etc/exports
file manipulation commands, Exploring Other Text Editors
log in, Why Do I Need a User Login?
login, Using the root Login
priviledges
granting, Using sudo for assigning administrative privilege
prompts, The Shell Interface
root user account
accessing
launching, The init.d start-up scripts
MAC OS X, Connecting to NFS from the command line
Service Configuration window
routed run-level script, Table 12-5: Run-Level Scripts Contained in /etc/init.d
routers
Internet, Understanding How the Internet Is Structured, Routing
Red Hat as, Setting up Red Hat Linux as a Router
network clients, Windows, Configuring Windows network clients
network clients, Configuring network clients
configuration, Configuring the Red Hat Linux router, Enable forwarding and masquerading
rpc file, Administrative configuration files
RPM
application installation, Using Binary RPMs versus Building from Source
packages
verification, Verifying packages with rpm
queries, Querying packages with rpm
RPM (Red Hat Package Management), Primary Advantages of Linux, Why Choose Red Hat Linux?
rpm command, Installing and managing RPM files
package installation, Installing and managing RPM files
RPM files
application installation and, Installing and managing RPM files, Installing with rpm, Upgrading packages with rpm, Removing packages with rpm, Querying packages with rpm, Verifying packages with rpm
RPM packages
downloading, Finding applications on the Internet
yum and, Using yum for listing and updating packages
rpmfind.net, Finding applications on the Internet
RPMs
downloading
yum and, Running yum to download and install RPMs
installation
rsh command, Using the "r" commands: rlogin, rcp, and rsh
rsh service, Manipulating run levels
rsize option, mounting NFS, Using mount options
RtrImpliesDsn option, sendmail, sendmail options
rules
ipchains, firewalls, Changing ipchains firewall rules, Saving ipchains firewall rules
iptables firewalls, Creating iptables firewall rules, Example 1: Firewall for shared Internet connection (plus servers), Example 2: Firewall for shared Internet connection (no servers), Example 3: Firewall for single Linux system with Internet connection
rules, quota package, Creating quota rules
run level
selecting at boot time, Temporarily changing boot options
run level manipulation, Manipulating run levels, Changing to a shutdown run level
run-level scripts, Understanding run-level scripts, Table 12-5: Run-Level Scripts Contained in /etc/init.d, Understanding run-level scripts
adding, Adding run-level scripts
behavior changes, Changing run-level script behavior
removing, Reorganizing or removing run-level scripts
reorganizing, Reorganizing or removing run-level scripts
run-level scripts, starting, Starting run-level scripts, Understanding run-level scripts, Table 12-5: Run-Level Scripts Contained in /etc/init.d, Understanding run-level scripts
RunAsUser option sendmail, sendmail options
runlevel command, Determining the current run level
RWall (Write-to-All) server, Write-to-All server
rwhod run-level script, Table 12-5: Run-Level Scripts Contained in /etc/init.d