Red Hat Fedora 5 Unleashed

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

-s file comparison operators

Samba

     complexity of

     configuring with /etc/samba/smb.conf file

     configuring with SWAT

     installing

     mounting/unmounting shares

     service command

     smbd daemon, starting

     testing with testparm command

Samsung Contact

SANE (Scanner Access Now Easy)

sash shell

/sbin directory

     /sbin/ifconfig

     /sbin/netstat

     /sbin/route

scalars

scanlogs file

Scanner Access Now Easy (SANE)

scanners

schedulers

scheduling tasks

     at command

     batch command

     cron daemon

     FTP server downtime

Schwartzian transforms

scp command

     copying files

     SSH servers

screen command 2nd

screen grabs

screen images, capturing

Screen section (xorg.conf file)

screen shell command

screenrc file

screenshot

script kiddies

ScriptAlias directive

scripts directory

scrolling screen contents

SCSI disk drivers

searching

    files

         find shell command

         index searches via locate shell command

     input strings

     man pages

     pattern-matching

     shells

     websites

secondary nameservers

security

     Apache 2nd

     autohacking

     backups

     bootloaders

     bridges

     data integrity

     data locking

     disaster recovery plans

     DNS (Domain Name System)

         access control lists (ACLs)

         controlling queries

         controlling zone transfers

         DNSSEC (DNS Security Extensions)

         poisoning

         potential problem host alerts

         split DNS

         spoofing

         UNIX security considerations

     DSL (digital subscriber line) access

     external computer attacks

     Fedora deployment plans

     file permissions

     firewalls

     group permissions

     informational websites

     internal computer attacks

     key-based logins

     Linux kernel, sysctl command

     NIC Promiscuous mode

     packet-filtering

     passwords

         /etc/passwd file

         batch password changes

         bootloaders

         brute-forcing

         FTP user passwords

         MySQL root users

         PostgreSQL database user creation

         root passwords

         selecting

         shadow passwords

         system password policies

     physical security

     remote servers

     SYN flooding

    system administrator privileges, granting to users

         restricted shells

         root privileges, granting on occasion

         UIDs (user IDs), temporarily changing

     tcpdump command

     Tripwire security tool

     Trojan horses

     updates 2nd

     virus protection

     vulnerability assessments

     wireless networks

sed (text editor)

SELECT statement 2nd

SELinux

sending email

     mail utility

     Perl

Sendmail 2nd 3rd 4th

     aliases

     delivery intervals

     email access rules

     mail forwarding

     mail relaying

     masquerading

     rejecting email from specified websites

     Sendmail (book)

    sendmail.cf files

         building

         syntax of

     smart hosts

sensors command 2nd

sensors-detect command

sequences

serial modems

serial-based mice

server installation option (Fedora) 2nd

server parameter (innd.conf)

ServerAdmin directive (httpd.conf file)

ServerLayout section (xorg.conf configuration file)

ServerName directive (httpd.conf file)

ServerRoot directive (httpd.conf file)

servers

    Apache [See Apache server, development of.]

     blade servers

     DHCP servers

     dial-in PPP servers

     Exchange Server

    FTP server

         administration via Wu-FTP servers

         allowing/denying connections via ftphosts file commands

         anonymous servers 2nd

         authenticated servers

         Bsdftpd-ssl servers

         configuration file backups

         editing server files

         file-conversion actions

         NcFTPd servers

         quick installation

         vsftpd servers 2nd

         Wu-FTPd servers 2nd

     gpm (general purpose mouse) server

     LDAP

    nameservers

         authoritative nameservers

         caching nameservers

     NFS server configuration

    proxy servers

         defining

         references

         Squid

         uses of

     remote

    SSH servers

         compared to Telnet servers

         configuring

         disabling SSH1

         ftp command

         rcp command

         scp command

         sftp command

         ssh-keygen command

     Telnet servers

    web

         Stronghold

         Stronghold, website

         Sun Java System

         Zeus

         Zope

service command 2nd

Service Configuration tool

Services dialog box

services file

sessions

     logging out of

     management

     message block printing

     session writing

set directive (SSI)

set group ID (sgid) permissions

set user ID (suid) permissions

setleds command

setserial command 2nd

setup command 2nd 3rd

SFTP

sftp

sftp command

sgid (set group ID) permissions

sh shell

shadow passwords 2nd

shaped windows

shar command

shares (Samba)

sharing files [See NFS (Network File System); ; Samba.]

shebang lines (#!) 2nd

SHELL environment variable

SHELL line (/etc/crontab file)

shell scripts

     #! (shebang lines)

     built-in variables 2nd

     commands as

     defining

     environment variables

     executing

     functions

     mail utility

     positional parameters

     reasons for using

     special characters, list of

     startx command

     task automation

     testing

     trojan scripts

     user variables

    variables

         accessing values

         assigning values to

     writing

shells [See also shell scripts.]

     ash

     ash.static

     bash 2nd

         test command

         comparison of expressions

     bsh

     changing 2nd

     csh

     features of

     Fedora Core shells list

     function of

     ksh 2nd

     navigating

     pdksh 2nd

         comparison of expressions

         select statements

         test command

     Perl access

     rsh

     sash

     sh

     tcsh

         repeat statements

         test command

     zsh

shells file

shift statements

showkey command

shred command

shuffle() array function

shutdown command 2nd 3rd

shutdown files

shutdown process 2nd

simple backup strategies

Simple Mail Transport Protocol (SMTP) 2nd 3rd 4th

single quotes (')

skel files

Skolnick, Cliff

slappasswd tool

slaptest command

Slashdot.org

slave nameservers

slave/master jumpers

slices (sequences) 2nd

slrn news client 2nd

sm file

small enterprise backup strategies

small office backup strategies

Small Office/Home Office (SOHO) users

smart gateways

smart hosts (Sendmail)

SMB (Server Message Block) network file system

smb.conf file

     [global] section

     [homes] section

     [printers] section

smbclient command 2nd 3rd

smbd daemon

smbfs modules

smbmount command

smbprint command

smbspool command

smbstatus command

SMTP (Simple Mail Transport Protocol) 2nd 3rd 4th

sndconfig command 2nd

sniffing

SOA (Start of Authority) records

soft links

software [See also specific software.]

     choosing

     groupware

    HOWTO documents

         compressed files, reading

         quitting

         reading in HTML format

     installing

         installation options

         installed packages, listing

         installing all on CD-ROM

    management

         CheckInstall program

         compiling from source code

         installing

         references

        rpm [See rpm (Red Hat Package Manager).]

         tarballs

     removing with yum

     software packages documentation

solid-state drives

sound

     formats

     music players

     recording

     sound cards

     sound devices

     Sound Juicer 2nd

     streaming audio

source tree (kernel)

sox command 2nd

spam filtering

Spamassassin 2nd

.spec files

SPF (Sender Policy Framework)

splint command 2nd

split DNS

split() method

spoofing

spreadsheet programs

     Calc 2nd

         spreadsheet formatting

         summarizing data with

     Gnumeric

     KSpread

SQL (Structured Query Language)

     != (is not equal) symbol

     CREATE statements

     databases, retrieving data from

     INSERT statements

     optimizing

     OR statements

     reserved keywords

     SELECT statements

     AND statements

     subqueries

    tables

         creating

         inserting data

     WHERE statements

Squid proxy server

     ACL

     client configuration

     client IP addresses, specifying

     configuration examples

     installing

     kill-SIGHUP command

Squirrelmail

ssh (Secure Shell) clients

ssh command 2nd

SSH servers

     compared to Telnet servers

     configuring

     database access

     ftp command

     rcp command

     scp command

     sftp command

     ssh-keygen command

     SSH1, disabling

ssh-keygen command

SSI (Server Side Includes)

    directives

         config

         echo

         exec

         flastmod

         fsize

         include

         printenv

         set

         variables

     dynamic content

stable kernels

standard FTP servers

standard users

Start of Authority (SOA) records

starting/stopping

    Apache web server

         /etc/rc.d/init.d/httpd script

         chkconfig command (Red Hat)

         manually starting

         service command (Red Hat)

         system-config-services client (Red Hat)

     NFS (Network File System)

     postmaster program (PostgreSQL)

     smbd daemon

    system services

         manually starting/stopping

         System V method

     via startx command

     vsftpd servers

    X Window System

         via display managers

         via startx command

startx command 2nd 3rd

stat command

static links

statserial command

status parameter (innd.conf)

stopping [See starting/stopping.]

storage.conf file

stored devices, viewing

str_replace() function

streaming audio

streaming mode (webcams)

Strict RFC1179 Compliance option (remote UNIX printers)

strings

     assigning values to

     built-in methods

     comparisons 2nd 3rd

     concatenating

     constants

     defining

     as immutable sequences

     indexing

     repeating

     searches

    string functions

         str_replace()

         strlen()

         strpos()

         substr()

         trim()

     variable substitution

strip postfixes

strip prefixes

strlen() function

Stronghold

strpos() function

su command 2nd 3rd

sublevel number section (kernel)

submount command

subnet masks (netmasks) 2nd

subnets

subqueries (SQL)

subscriptions file

substr() function

sudo command 2nd

suid (set user ID) permissions

summarizing data with Calc

Sun Java System

super-users [See root users.]

superblocks

SuperRescue CD

surveillance cameras

SuSE OpenExchange

.svg file format

swapoff command

swapon command

SWAT (Samba Web Administration Tool)

switch/case blocks

switchdesk client

switches

Sylpheed-claws email client

symbolic debuggers

symbolic links 2nd 3rd

SYN flooding

SYN Stealth scans (Nmap)

sync command 2nd

sysconfig directory

sysctl command 2nd 3rd

sysrq.txt files

system administrator privileges, granting to users

     restricted shells

     root privileges, granting on occasion

     UIDs (user IDs), temporarily changing

system administrators [See root users.]

system and peripheral inventory checklist (Fedora installation)

system boots [See boot process.]

system jobs

     /etc/crontab files

     editing

System Monitor

system monitoring tools

     console-based monitoring

     disk quotas

     ethereal tool

     free command

     gnome-nettool tool

     gnome-system-monitor tool

     graphical process/system management tools

     KDE

     kill command

     nice command

     renice command

     time command

     top command

     uptime command

     vmstat command

     vncviewer tool

     watch command

     websites

     xcpustate client

     xosview client

system rescue

     BusyBox

     chroot command

     Fedora Core rescue disc

     MBR backups

     partition tables, manually restoring

     SuperRescue CD

system services

     boot, controlling at

     bootup, operation at

         booting to default runlevel

         booting to nondefault runlevel

         booting to runlevel

         init scripts

         initiating boot loading process

         loading Linux kernel

    runlevels

         changing

         troubleshooting

    starting/stopping

         manually starting/stopping

         System V method

     xinetd daemon, running through

system state

System V system services

system-config-bind command 2nd

system-config-date command 2nd

system-config-display command 2nd 3rd

     Display Settings main screen

     Dual head tab

     Hardware tab

     Video Card dialog

     X Window System configuration

system-config-httpd command

system-config-keyboard command 2nd

system-config-mouse command 2nd 3rd 4th

system-config-network tool 2nd 3rd 4th

system-config-nfs command 2nd

system-config-packages command 2nd 3rd

system-config-printer tool 2nd 3rd

     Add a New Print Queue configuration dialog

     Finish and Create New Print Queue dialog

     launching

     local printer settings

     print queue creation

     Printer Model dialog

     Queue Name dialog

     Queue Type dialog

system-config-printer-gui program

system-config-printer-tui tool 2nd 3rd 4th

system-config-securitylevel command 2nd 3rd 4th

system-config-services 2nd

system-config-services command 2nd

system-config-soundcard tool 2nd 3rd 4th

system-config-users command 2nd

system-switch-mail command

Категории