صفحه اصلی
اصطلاحنامه
مجموعه ها
مرورالفبایی
کتابخانه شخصی
ارسال منبع
Red Hat Linux Bible: Fedora and Enterprise Edition [Electronic resources]
Christopher Negus
نسخه متنی
-
صفحه :
274
/
274
نمايش فراداده
List of Tables
Chapter 3:
Getting Started with the Desktop
Table 3-1:
Metacity Keyboard Shortcuts
Table 3-2:
Mouse Actions
Chapter 4:
Using Linux Commands
Table 4-1:
Keystrokes for Navigating Command Lines
Table 4-2:
Keystrokes for Editing Command Lines
Table 4-3:
Keystrokes for Cutting and Pasting Text in Command Lines
Chapter 5:
Accessing and Running Applications
Table 5-1:
Windows-Equivalent Linux Applications
Table 5-2:
Linux Archive File Formats
Table 5-3:
Linux Document Formats
Table 5-4:
Mtools Available with Linux
Table 5-5:
Windows Drive Letters in WINE
Chapter 6:
Publishing with Red Hat Linux
Table 6-1:
Man Macros
Chapter 7:
Playing Games with Red Hat Linux
Table 7-1:
GNOME Games
Table 7-2:
Games for the KDE Desktop
Chapter 8:
Multimedia in Red Hat Linux
Table 8-1:
Sound Formats Supported by Sox Utility
Table 8-2:
Shortcuts for TV Watching (xawtv)
Chapter 9:
Tools for Using the Internet and the Web
Table 9-1:
Protocols in Web URLs
Chapter 11:
Setting Up and Supporting Users
Table 11-1:
useradd Command Options
Table 11-2:
useradd Options for Changing User Defaults
Table 11-3:
usermod Options for Changing Existing Accounts
Table 11-4:
Using find to Locate and Change User Files
Chapter 12:
Automating System Tasks
Table 12-1:
Examples of bash parameter expansion
Table 12-2:
Operators for Test Expressions
Table 12-3:
Valid init Actions
Table 12-4:
Possible Run Levels
Table 12-5:
Run-Level Scripts Contained in /etc/init.d
Table 12-6:
Samples for Specifying Times in an at Job
Table 12-7:
Valid /etc/crontab Field Values
Chapter 13:
Backing Up and Restoring Files
Table 13-1:
Comparison of Common Backup Media
Table 13-2:
Programs in the dump Package
Table 13-3:
Options to dump
Table 13-4:
Recommended dump Schedule
Table 13-5:
Restore Command Options
Table 13-6:
Interactive restore Commands
Table 13-7:
Backup Commands Used with Amanda
Table 13-8:
Examples of pax Use
Table 13-9:
Options to pax
Chapter 14:
Computer Security Issues
Table 14-1:
netstat Parameters
Table 14-2:
Socket States
Table 14-3:
Ipchains Action Parameters
Table 14-4:
Ipchains Optional Parameters
Table 14-5:
ipchains Targets
Table 14-6:
Log Files in the /var/log Directory
Table 14-7:
Message Levels
Table 14-8:
Ideas for Good Passwords
Chapter 15:
Setting Up a Local Area Network
Table 15-1:
Supported Wireless Network Adapters and Modules
Table 15-2:
Options to the iwconfig Command
Table 15-3:
Private IP Addresses
Chapter 19:
Setting Up a Mail Server
Table 19-1:
File Prefixes in /var/spool/mqueue
Table 19-2:
Other Related Sendmail Programs
Table 19-3:
Timeout Events
Table 19-4:
Precedence Names
Table 19-5:
Programs Included with majordomo
Chapter 21:
Setting Up a Web Server
Table 21-1:
Dynamic Shared Object (DSO) Modules
Table 21-2:
Special Server Features for the Options Directive
Table 21-3:
Special Access Features for the AllowOverride Directive
Table 21-4:
UserDir Path Name and URL Examples
Table 21-5:
Available Tokens within LogFormat
Table 21-6:
Server Response Codes
Table 21-7:
Command-Line Arguments to httpd
Chapter 23:
Setting Up Boot Servers: DHCP and NIS
Table 23-1:
Data Types
Table 23-2:
DHCP Options
Chapter 24:
Setting Up a MySQL Database Server
Table 24-1:
Option Groups Associated with MySQL Commands
Table 24-2:
Numeric Data Types for Columns
Table 24-3:
Time/Date Data Types for Columns
Table 24-4:
String Data Types for Columns
Chapter 25:
Making Servers Public with DNS
Table 25-1:
Zones and Related Zone Files in DNS Example
Appendix C:
Running Network Services
Table C-1:
Quick Reference to Network Services