Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

Chapter 1. Linux Kernel (2.201)
Kernel Components (2.201.1)
Different types of kernel images
Identifying stable and development kernels and patches
Using kernel modules
Compiling a Kernel (2.201.2)
Getting the kernel sources
Creating a .config file
Compiling the kernel
Installing the new kernel
Patching a Kernel (2.201.3)
Patching a kernel
Removing a kernel patch from a production kernel
Customizing a Kernel (2.201.4)
kmod versus kerneld
Chapter 2. System Startup (2.202)
Customizing system startup and boot processes (2.202.1)
The Linux Boot process
The Rescue Boot process
Chapter 3. Filesystem (2.203)
Operating The Linux Filesystem (2.203.1)
The File Hierarchy
Creating Filesystems
Mounting and Unmounting
Maintaining a Linux Filesystem (2.203.2)
fsck (fsck.e2fs)
Creating And Configuring Filesystem Options (2.203.3)
Autofs and automounter
CD-ROM filesystem
Chapter 4. Hardware (2.204)
Configuring RAID (2.204.1)
What is RAID?
RAID levels
Hardware RAID
Software RAID
Configuring RAID (using mkraid and raidstart)
Persistent superblocks
Configuring RAID using mdadm
Adding New Hardware (2.204.2)
Bus structures
USB devices
Serial devices
Configuring disks
Configuring output devices
Software And Kernel Configuration (2.204.3)
Configuring Filesystems
Configuring kernel options
Configuring Logical Volume Management
Configuring IDE CD burners
Configuring harddisks using hdparm
Configuring PCMCIA Devices (2.204.4)
Overview of PCMCIA
The cardmgr
Card Services for Linux
Newer kernels and PCMCIA
The cardctl and cardinfo commands
Chapter 5. Networking (2.205)
Basic Networking Configuration (2.205.1)
Configuring the network interface
Advanced Network Configuration and Troubleshooting (2.205.2)
Virtual Private Network
Chapter 6. Mail & News (2.206)
Configuring mailing lists (2.206.1)
Installing Majordomo
Creating a Mailing list
Maintaining a Mailinglist
Using Sendmail (2.206.2)
Sendmail configuration
mail aliases
Managing Mail Traffic (2.206.3)
Serving news (2.206.4)
Internet News
Chapter 7. DNS (2.207)
Basic BIND 8 configuration (2.207.1)
Name-server parts in BIND
The named.conf file
Zones and reverse zones
Master and slave servers
Creating subdomains
DNS Utilities
Securing a DNS Server (2.207.3)
DNS Security Strategies
Making information harder to get
Controlling requests
Limiting effects of an intrusion
Securing name server connections
Internal DNS
Chapter 8. Web Services (2.208)
Implementing a Web Server (2.208.1)
Installing the Apache web-server
Run-time loading of modules (DSO)
Encrypted webservers: SSL
Monitoring Apache load and performance
Apache access_log file
Restricting client user access
Configuring authentication modules
User files
Group files
Configuring mod_perl
Configuring mod_php support
Configuring Apache server options
Maintaining a Web Server (2.208.2)
Apache Virtual Hosting
Customizing file access
How to create a SSL server Certificate
Implementing a Proxy Server (2.208.3)
Security Issue
Access policies
Authenticator allow rules act as deny rules!
squid always adds a default ACL!
Utilizing memory usage
Chapter 9. File and Service Sharing (2.209)
Configuring a Samba Server (2.209.1)
What is Samba?
Installing the Samba components
An example of the functionality we wish to achieve
Accessing Samba shares from Windows 2000
Accessing Windows or Samba shares from a Linux Samba client
Sending a message with smbclient
Using a Linux Samba printer from Windows 2000
Using a Windows printer from Linux
Setting up an nmbd WINS server
Creating logon scripts for clients
Configuring an NFS Server (2.209.2)
NFS - The Network File System
Setting up NFS
Testing NFS
Securing NFS
Overview of NFS components
NFS protocol versions
Chapter 10. Network Client Management (2.210)
DHCP Configuration (2.210.1)
What is DHCP?
How is the server configured?
An example
Controlling the DHCP-server's behavior
NIS configuration (2.210.2)
What is it?
Configuring a system as a NIS client
Setting up NIS master and slave servers
Creating NIS maps
NIS related commands and files
LDAP configuration (2.210.3)
Packaging Software (2.211.2)
DEB Packages
RPM Packages
Backup Operations (2.211.3)
Chapter 12. System Security (2.212)
Configuring a router (2.212.2)
Private Network Addresses
Network Address Translation (NAT)
IP Masquerading with IPCHAINS
IP forwarding with IPCHAINS
Port Redirection with IPCHAINS
IPCHAINS, an overview
The Firm's network with IPCHAINS
IPTABLES, an overview
Saving And Restoring Firewall Rules
Denial of Service (DOS) attacks
PortSentry: Preventing port scans
Securing FTP servers (2.212.3)
FTP server Version 6.4/OpenBSD/Linux-ftpd-0.17
The Washington University FTP Server Version wu-2.6.1
Additional precautions
Secure shell (OpenSSH) (2.212.4)
What are ssh and sshd?
Installing ssh and sshd
Configuring sshd
Keys and their purpose
Configuring the ssh-agent
Tunneling an application protocol over ssh with portmapping
The .rhosts and .shosts files
TCP_wrappers (2.212.5)
What do tcp wrappers do?
What don't tcp wrappers do?
Configuring tcp wrappers
Security tasks (2.212.6)
The nmap command
Keeping track of security alerts
Testing for open mail relays
Chapter 13. System Customization and Automation (2.213)
Regular Expressions
Introducing Regular Expressions
Primitives and Multipliers
Anchors, Grouping and Alternation
Special characters
Regular Expressions in sed
Regular Expressions in awk
Perl Regular Expressions
Using Perl
Writing simple Perl scripts
Perl basics
Scope of variables
A surprising feature
Determining the size of an array
Elements are scalar data!
Automatic type conversion
Strings are not numerics
Perl taint mode
Perl modules
Perl on the command line
Writing Bourne shell scripts
Branching and looping
Here documents
Advanced topics
Debugging scripts
Some words on coding style
Using sed
Calling sed
The sed expression
The most frequently used sedcommands
Grouping in sed
White space
Advanced sed
Using awk
Generic flow
Variables and arrays
Input files, records and fields
Branching, looping and other control statements
Using regular expressions
Built-in variables
The rsync algorithm
Configuring the rsync daemon
Using the rsync client
format of the crontab file
The at command
Monitoring your system
parsing a log-file
combine log-files
generate alerts by mail and pager
user login alert
Chapter 14. Troubleshooting (2.214)
Creating recovery disks (2.214.2)
Why we need bootdisks
Create a bootdisk
Big files have little files upon their back
Create a recovery disk
Identifying boot stages (2.214.3)
The bootstrap process
Kernel loading
Daemon initialization
Recognizing the four stages during boot
Troubleshooting LILO (2.214.4)
Booting from CD-ROM and networks
Booting from disk or partition
More about partitions tables
Extended partitions
The LILO install locations
LILO backup files
LILO errors
General troubleshooting (2.214.5)
A word of caution
Cost effectiveness
Getting help
Generic issues with hardware problems
Resolving initial boot problems
Resolving kernel boot problems
Resolving IRQ/DMA conflicts
Troubleshooting tools
Troubleshooting system resources (2.214.6)
Core system variables
Login shells
Shell startup environment
Setting kernel parameters
Shared libraries
Troubleshooting network issues (2.214.7)
Something on network troubleshooting in general
An example situation
Troubleshooting environment configurations (2.214.8)
Troubleshooting /etc/inittab and /sbin/init
Troubleshooting authorisation problems
Troubleshooting /etc/profile
Troubleshooting /etc/rc.local or /etc/rc.boot
Troubleshooting cron processes
Troubleshooting /etc/`shell_name`.conf
Troubleshooting /etc/login.defs
Troubleshooting /etc/syslog.conf
Appendix A. LPIC Level 2 Objectives
0 of .
Results for:
No results containing your search query
P. 1
LPIC-2 Advanced Level Administration

LPIC-2 Advanced Level Administration

Ratings: (0)|Views: 399|Likes:
Published by Đặng Thanh

More info:

Published by: Đặng Thanh on Jul 12, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 12 to 45 are not shown in this preview.
You're Reading a Free Preview
Pages 57 to 150 are not shown in this preview.
You're Reading a Free Preview
Pages 162 to 287 are not shown in this preview.
You're Reading a Free Preview
Pages 310 to 569 are not shown in this preview.

Activity (3)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
wings1111 liked this

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->