Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

The ext3 File System
1.1. Features of ext3
1.3. Converting to an ext3 File System
1.4. Reverting to an ext2 File System
Swap Space
2.1. What is Swap Space?
2.2. Adding Swap Space
2.3. Removing Swap Space
2.4. Moving Swap Space
Redundant Array of Independent Disks (RAID)
3.1. What is RAID?
3.2. Who Should Use RAID?
3.3. Hardware RAID versus Software RAID
3.4. RAID Levels and Linear Support
Logical Volume Manager (LVM)
5.4. Resizing a Partition
Implementing Disk Quotas
6.1. Configuring Disk Quotas
6.2. Managing Disk Quotas
6.3. Additional Resources
II. Installation-Related Information
Kickstart Installations
7.1. What are Kickstart Installations?
7.2. How Do You Perform a Kickstart Installation?
7.3. Creating the Kickstart File
7.4. Kickstart Options
7.5. Package Selection
7.6. Pre-installation Script
7.7. Post-installation Script
7.8. Making the Kickstart File Available
7.9. Making the Installation Tree Available
7.10. Starting a Kickstart Installation
Kickstart Configurator
8.1. Basic Configuration
8.2. Installation Method
8.8. X Configuration
8.9. Package Selection
8.12. Saving the File
Basic System Recovery
9.1. Common Problems
9.3. Booting into Single-User Mode
9.4. Booting into Emergency Mode
Software RAID Configuration
LVM Configuration
III. Network-Related Configuration
Network Configuration
12.1. Overview
12.2. Establishing an Ethernet Connection
12.4. Establishing a Modem Connection
12.5. Establishing an xDSL Connection
12.6. Establishing a Token Ring Connection
12.8. Establishing a Wireless Connection
12.9. Managing DNS Settings
12.10. Managing Hosts
Figure 13-1. Security Level Configuration Tool
13.2. GNOME Lokkit
13.3. Activating the iptables Service
Controlling Access to Services
14.1. Runlevels
14.2. TCP Wrappers
14.3. Services Configuration Tool
14.4. ntsysv
14.6. Additional Resources
15.1. Why Use OpenSSH?
15.2. Configuring an OpenSSH Server
16.2. Mounting NFS File Systems
16.4. Additional Resources
17.1. Why Use Samba?
17.2. Configuring a Samba Server
17.4. Additional Resources
Dynamic Host Configuration Protocol (DHCP)
18.1. Why Use DHCP?
18.2. Configuring a DHCP Server
18.4. Additional Resources
Apache HTTP Server Configuration
19.2. Default Settings
19.3. Virtual Hosts Settings
19.4. Server Settings
19.5. Performance Tuning
19.6. Saving Your Settings
19.7. Additional Resources
Apache HTTP Secure Server Configuration
20.1. Introduction
20.2. An Overview of Security-Related Packages
20.3. An Overview of Certificates and Security
20.5. Types of Certificates
20.6. Generating a Key
20.7. Generating a Certificate Request to Send to a CA
20.8. Creating a Self-Signed Certificate
20.9. Testing The Certificate
20.11. Additional Resources
BIND Configuration
21.2. Adding a Reverse Master Zone
21.3. Adding a Slave Zone
Authentication Configuration
22.1. User Information
22.2. Authentication
22.3. Command Line Version
Mail Transport Agent (MTA) Configuration
IV. System Configuration
24.1. Disabling Shutdown Via Ctrl-Alt-Del
24.3. Disabling All Console Access
24.4. Defining the Console
24.5. Making Files Accessible From the Console
24.6. Enabling Console Access for Other Applications
24.7. The floppy Group
User and Group Configuration
25.1. Adding a New User
25.2. Modifying User Properties
25.3. Adding a New Group
25.5. Command Line Configuration
25.6. Explaining the Process
Gathering System Information
26.1. System Processes
26.2. Memory Usage
26.3. File Systems
26.5. Additional Resources
Printer Configuration
27.1. Adding a Local Printer
27.2. Adding an IPP Printer
27.3. Adding a Remote UNIX (LPD) Printer
27.4. Adding a Samba (SMB) Printer
27.6. Adding a JetDirect Printer
27.7. Selecting the Printer Model and Finishing
27.9. Modifying Existing Printers
27.10. Saving the Configuration File
27.11. Command Line Configuration
27.13. Sharing a Printer
27.14. Switching Print Systems
28.1. Cron
28.2. Anacron
28.3. At and Batch
28.4. Additional Resources
29.1. Locating Log Files
29.2. Viewing Log Files
29.3. Examining Log Files
Upgrading the Kernel
30.1. The 2.4 Kernel
30.2. Preparing to Upgrade
30.3. Downloading the Upgraded Kernel
30.4. Performing the Upgrade
30.5. Verifying the Initial RAM Disk Image
30.6. Verifying the Boot Loader
31.1. Kernel Module Utilities
31.2. Additional Resources
V. Package Management
Package Management with RPM
32.1. RPM Design Goals
32.2. Using RPM
32.3. Checking a Package’s Signature
32.4. Impressing Your Friends with RPM
32.5. Additional Resources
Package Management Tool
33.2. Removing Packages
VI. Appendixes
Building a Custom Kernel
A.1. Preparing to Build
A.2. Building the Kernel
A.3. Building a Monolithic Kernel
A.4. Additional Resources
Getting Started with Gnu Privacy Guard
B.1. Configuration File
B.2. Warning Messages
B.3. Generating a Keypair
B.4. Generating a Revocation Certificate
B.5. Exporting your Public Key
B.6. Importing a Public Key
B.7. What Are Digital Signatures?
B.8. Additional Resources
0 of .
Results for:
No results containing your search query
P. 1
Red Hat Linux Customization Guide-En-9

Red Hat Linux Customization Guide-En-9

Ratings: (0)|Views: 2|Likes:
Published by Sankhadeep Rakshit

More info:

Published by: Sankhadeep Rakshit on Nov 17, 2010
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 7 to 30 are not shown in this preview.
You're Reading a Free Preview
Pages 37 to 111 are not shown in this preview.
You're Reading a Free Preview
Pages 118 to 135 are not shown in this preview.
You're Reading a Free Preview
Pages 142 to 144 are not shown in this preview.
You're Reading a Free Preview
Pages 151 to 302 are not shown in this preview.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->