Fedora 6 and Red Hat Enterprise Linux Bible
Chapter 3: Getting Started with the Desktop
- Table 3-1: Metacity Keyboard Shortcuts
- Table 3-2: Mouse Actions
Chapter 4: Using Linux Commands
- Table 4-1: Keystrokes for Navigating Command Lines
- Table 4-2: Keystrokes for Editing Command Lines
- Table 4-3: Keystrokes for Cutting and Pasting Text in Command Lines
Chapter 5: Accessing and Running Applications
- Table 5-1: Linux Archive File Formats
- Table 5-2: Linux Document Formats
- Table 5-3: Windows-Equivalent Linux Applications
- Table 5-4: mtools Available with Linux
Chapter 6: Publishing with Fedora and RHEL
- Table 6-1: man Macros
Chapter 7: Gaming in Fedora and RHEL
- Table 7-1: GNOME Games
- Table 7-2: Games for the KDE Desktop
- Table 7-3: Games in Fedora Extras
Chapter 8: Music, Video, and Images in Linux
- Table 8-1: Sound Formats Supported by the sox Utility
Chapter 9: Using the Internet and the Web
- Table 9-1: Protocols in Web URLs
Chapter 11: Setting Up and Supporting Users
- Table 11-1: useradd Command Options
- Table 11-2: useradd Options for Changing User Defaults
- Table 11-3: usermod Options for Changing Existing Accounts
- Table 11-4: Using find to Locate and Change User Files
Chapter 12: Automating System Tasks
- Table 12-1: Examples of bash Parameter Expansion
- Table 12-2: Operators for Test Expressions
- Table 12-3: Valid init Actions
- Table 12-4: Possible Run Levels
- Table 12-5: Run-Level Scripts Contained in /etc/init.d
- Table 12-6: Samples for Specifying Times in an at Job
- Table 12-7: Valid /etc/crontab Field Values
Chapter 13: Backing Up and Restoring Files
- Table 13-1: Comparison of Common Backup Media
- Table 13-2: Programs in the dump Package
- Table 13-3: Options to dump
- Table 13-4: Recommended dump Schedule
- Table 13-5: Restore Command Options
- Table 13-6: Interactive restore Commands
- Table 13-7: Backup Commands Used with Amanda
- Table 13-8: Examples of pax Use
- Table 13-9: Options to pax
Chapter 14: Computer Security Issues
- Table 14-1: Ideas for Good Passwords
- Table 14-2: Log Files in the /var/log Directory
- Table 14-3: netstat Parameters
- Table 14-4: Socket States
Chapter 15: Setting Up a Local Area Network
- Table 15-1: Supported Wireless Network Adapters and Modules
- Table 15-2: Options for the iwconfig Command
- Table 15-3: Private IP Addresses
Chapter 19: Setting Up a Mail Server
- Table 19-1: File Prefixes in /var/spool/mqueue
- Table 19-2: Other Related Sendmail Programs
Chapter 21: Setting Up a Web Server
- Table 21-1: Dynamic Shared Object (DSO) Modules
- Table 21-2: Special Server Features for the Options Directive
- Table 21-3: Special Access Features for the AllowOverride Directive
- Table 21-4: UserDir Path Name and URL Examples
- Table 21-5: Available Tokens within LogFormat
- Table 21-6: HTTP Response Codes
- Table 21-7: Command-Line Arguments to httpd
Chapter 23: Setting Up Boot Servers: DHCP and NIS
- Table 23-1: Data Types
- Table 23-2: DHCP Options
Chapter 24: Setting Up a MySQL Database Server
- Table 24-1: Option Groups Associated with MySQL Commands
- Table 24-2: Numeric Data Types for Columns
- Table 24-3: Time/Date Data Types for Columns
- Table 24-4: String Data Types for Columns
Chapter 25: Making Servers Public with DNS
- Table 25-1: Zones and Related Zone Files in DNS Example
Appendix B: Running Network Services
- Table B-1: Quick Reference for Network Services
Категории