LPI Linux Certification in a Nutshell (In a Nutshell (OReilly))

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

C compiler

C-shells

cables, troubleshooting for hardware connections

cache (DNS), poisoning

caching-only name servers

canonical name (CNAME) records

cardctl command 2nd 3rd

cardinfo command

cardmgr command 2nd 3rd

CAs (Certificate Authorities)

     reasons to use

case command

cat command 2nd

CD burners, IDE

cdrecord command

cdrom (kernel) subdirectories

CDs, burning

CERT (Computer Emergency Response Team) 2nd

     CERT/CC (CERT Coordination Center)

certificate-based cryptography

     self-signed certificate, creating

CGI (Common Gateway Interface) scripts 2nd

     execution, control by Apache

     running Perl scripts on Apache as CGI scripts

chage command 2nd

chains

     ipchains

     iptables

%changelog macro

CHAP (Challenge Handshake Authentication Protocol) 2nd

character classes (GNU sed)

character sets (regular expressions) 2nd

chat program

chat scripts

checksumming programs

chgrp command 2nd

child processes

chkconfig command

chmod command 2nd

     -R (recursive) option

     symbolic access modes

chown command 2nd

chroot command

     exploring damaged system

chroot jail, running BIND in

CIAC (Computer Incident Advisory Capability)

ckpasswd application (INN)

cksum command

class drivers (USB)

classes

     /pcmcia/config file

     network, subnet masks 2nd

%clean macro

clear command (.bash_logout file)

clear-to-send (CTS) signals

client-to-server communications, port numbers

client/server model, X Window System 2nd

     remote X clients 2nd

     X Server

clock

     maintaining

cmp command

CNAME (canonical name) records

command history 2nd

     editing

     substitution

command line

     defined

command separator

command sequences, entering

command substitution 2nd 3rd 4th

commands

     aliases

     bash shell (built-in), for scripts

     editing files with vi 2nd 3rd

     file management, basic 2nd 3rd

     filesystem management

     finding command pathnames

     launching with shells

     locating files

     process execution priorities 2nd

     processes, managing 2nd 3rd

     processing text streams using filters 2nd 3rd

     Procmail

     recursive

     regular expressions, searching text files with 2nd 3rd

     review exercises

     review questions

     Unix streams, pipes, and redirects 2nd 3rd

     user and group management

     working on command line 2nd 3rd

         command history and editing 2nd

         entering commands

         interactive shell

comments

     modules.conf file

     printcap file

     shell programs

communication devices, configuring 2nd 3rd

compat (NIS) 2nd

compiled software, installing

compiling kernels

     custom kernel

         required tools and software

complete backup

compression, file

     gzip and bzip2 utilities

     tarballs

Computer Emergency Response Team (CERT)

     Coordination Center (CERT/CC)

conditional statements, defining

.config file 2nd

     new kernel configuration based on

     remote Samba printer

configuration directives (httpd.conf)

configuration files

     Apache

     applications

     bash shell

     dial-up connections

     httpd.conf

     network

     network devices

     network interfaces

     PCMCIA cards

     Procmail

     Sendmail

     Tripwire

%configure macro

configure scripts 2nd

     Apache

configure-stamp file

configurehelp command

connectionless protocols

connections (physical), causing hardware problems

consoles, virtual

continue command

control file (Debian packages)

controllers

     SCSI 2nd

     USB 2nd

copying files

copying links

cp command 2nd

     -d option, no dereference

     -i option enforced by aliases

CPAN (Comprehensive Perl Archive Network)

     mon module

     searching and browing for modules

     shell

create command, for Majordomo lists

cron facility 2nd

     at versus

     backup scripts called by

     controlling access to

     controlling user access to

     log file rotation

     programs

     scheduling program execution

     system administration tasks, scheduling

     troubleshooting problems with

crond 2nd

crontab files

     formats

     problems with

     quotacheck, scheduling

crontab utility 2nd

     crontab command

     system crontab files

     user crontab files

     viewing or editing crontab files

crossover cable

cryptography

     certificate-based

         self-signed certificate, creating

     encrypting web traffic with SSL

     keys for package maintainer

     public-key

         generating and using SSH keys

     Tripwire files, encryption

CSR (certificate signing request)

ctlinnd command

Ctrl-C

Ctrl-D, using to end at job input

Ctrl-Z 2nd

CTS (clear-to-send) signals

CUPS (Common UNIX Printing System) 2nd

current working directory

     specifying

curses, PPP dialer based on

cut command 2nd 3rd

Категории