SUSE LINUX Enterprise Server 9 Administrators Handbook

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y]

laptops

     policies

Large File Support [See LFS]

LDAP

     (Lightweight Directory Access Protocol)

     client configuration

     configuration 2nd

     network service authentication 2nd

Ldap group

     defaults GID

Ldap user

     default UID

LDP protocol

Learning the vi Editor

Lefebvre, Jean-Pierre

Legato NetWorker

legislature

     Sabanes-Oxley Act

LFS

     (Large File Support) 2nd

LIDS (Intrusion Detection Systems) Web site

Lightweight Directory Access Protocol [See LDAP]

LILO

     (Linux Loader) 2nd 3rd 4th

     configuration 2nd

lilo boot loaders

     corrupted

limits module

     PAM (Pluggable Authentication Module 2nd 3rd 4th 5th

Line Printer Daemon [See LPD]

Linux

     distributions

Linux Journal Web site

Linux Kernel Web site

Linux Loader [See LILO]

Linuxrc

lisitngs

     Login Time Restriction Example for time.conf

listings

     ./bash_profile Content

     /etc/bash.bashrc Generated Aliases

     Backup Shell Script Using rsync utility

     Comment Entered at Console

     Content of /etc/pam.d/login

     Default /etc/ntp.conf File

     Default /etc/xinetd.conf File

     DHCP Server Pollux /etc/passwd file

     Disk Quota Warning Configuration File

     Environment Variable Verification

     Execute Permission Bit on Directory 2nd

     fdisk Tool Session 2nd

     GRUB menu.lst 2nd

     LILO configuration 2nd

     Minimal Sample smb.conf File

     PAM limits.conf File 2nd

     pam_time.so Module Configuration File

     Runlevel 5 xdm files

     Sample /etc/sudoers File

     Sample dump Log Messages

     Snort Alert

     Typical Output from top Command

ln command

local grous

     adding

local printers

     adding to server 2nd 3rd 4th

     configuration 2nd 3rd

local users

     adding

log files

     host intrustion detection 2nd

     system management 2nd 3rd 4th 5th 6th

logger command-line tool

Logical Volume Manager [See LVM]

     snapshots

login shells

     scripts 2nd 3rd 4th 5th 6th 7th

logins

     restricting root logins 2nd 3rd 4th

    user

         system monitoring 2nd 3rd 4th 5th 6th 7th 8th 9th

logs

     syslog servers 2nd 3rd 4th 5th 6th

         hardening central host 2nd 3rd 4th 5th 6th 7th

         stealth logging host 2nd 3rd

Logsurfer

Lp group

     defaults GID

lp user

     default UID

lpadmin parameters 2nd 3rd

LPD

     (Line Printer Daemon)

ls -l command

     file permission settings

ls command

lsof command 2nd

Lucas, Edouard

     Tower of Hanoi game

LVM

     (Logical Volume Manager)

Категории