984 Index SMTP (continued) Postfix optimization for, 588–589, 590 security, 488–489 software RAID, 161. See also RAID (Redundant Array of Independent Disks) sound cards configuration information, 886 kernel configuration options, 656 support for, 33 troubleshooting, 885–887 source RPMs. See SRPMs spamming, 488 special characters (Bash), 906–909 speeds. See also performance bus topology, 16 PCI and PCI-X bus, 30–31 RAM versus swap space, 31, 47 star topology, 15 spoofing, email, 488 square brackets ([ ]) as Bash set operators, 906–907 Squid Web proxy configuration file, 409–411 initialization script, 409 installing, 407 IP forwarding for, 408–409 key configuration parameters, 409–410 Netfilter (iptables) configuration for, 411–412 overview, 407 starting, 412 steps for configuring, 408 testing the configuration, 412–413 verifying kernel configuration, 408–409 SquirrelMail Apache required for, 563 checking if installed, 563 connecting to, 563–565 further information, 567 IMAP4 for, 563, 564–565, 566 reconfiguring, 565–567 themes, 566 srm.conf file, 520 SRPMs (source RPMs) building packages using, 761–764 building the software package, 775–776 configuring build environment, 772 configuring source code, 773–775 defined, 746 installing the software package, 777–778 for kernel, 621–623 testing the build, 776 unpacking the source code, 772–773 srv directory, 144 SSH (Secure Shell) firewall configuration for, 57 overview, 434–436 scp with, 431–433 sftp over, 433, 509–510 Telnet versus, 430, 434 tunneling protocols through, 431 sshd (secure shell daemon), 436 SSI (server-side includes), 540–542 SSL (Secure Sockets Layer) CAs, 547, 548, 549, 554 creating a self-signed certificate, 549–551 CSR, 550 encryption, 547 further information, 546 information in certificates, 547–548 obtaining certificates from CAs, 554 overview, 546–549 root certificates, 548 running vsftpd over, 507–509 self-signed versus CA-signed certificates, 549 trust, 547 using a self-signed certificate, 551–554 standard installation. See also kickstart installation additional CDs or documentation disks, 69–70 additional language support, 58–59 boot disk creation, 35–36 configuration steps, 51 disk-checking process, 37 firewall configuration, 56–58 Firstboot, running, 65–70 GRUB installation, 51–54 hardware detection during, 37 hardware inventory, 30–34 46_599496 bindex.qxd 8/30/05 7:34 PM Page 984 Index 985 hardware support, checking, 34 help messages, 38 installation type, 41–42 keyboard configuration, 39 language for Red Hat installation, 38 manual online, 29 network configuration, 54–56 new system versus upgrade, 40 package group selection, 62–64 partitioning the hard disk, 42–51 RHEL versus Fedora Core, 29 root password setting, 61 starting the installation, 36–42 time zone setting, 59–60 star topology, 15, 16–17 starting or opening. See also booting; rebooting; restarting Apache startup process, 520–521 Apache Web server, 539 applications in GNOME, 109 autofs service, 303 Kerberos-related services, 870 Kickstart Configurator, 73 kickstart installation, 95–96 log viewer, 881 mailman service, 558 msqld server daemon, 355 Nautilus File Manager, 99, 110 Network Configuration tool, 251 network services, 193–195, 196 NFS server manually, 286 NIS client daemon, 330, 331 NIS portmapper, 319 NIS yppasswdd daemon, 321 NIS ypxfrd daemon, 321–322 OpenLDAP server, 859 Postfix mail server, 481 PostgreSQL server, 368 Printer Configuration tool, 217–218 programs at boot time, 137 RAID devices, 162 Red Hat Network Configuration dialog box, 599 Samba server, 345 Sendmail program, 474 Squid Web proxy, 412 standard installation, 36–42 start order for NFS daemons, 284 up2date agent, 602 up2date Agent Configuration tool, 599 User Manager application, 725 VNC server, 383–384, 388 stat command, 691, 693 static files, 142 static IP addresses, 238, 260 stopping. See also shutting down Apache Web server, 539 network services, 196 RAID devices, 162 Samba client connection, 346 Sendmail, 479 string comparison operators (Bash), 913–916 string I/O (Bash), 932–934 strong quote (‘) in Bash, 908–909 subnet mask or subnetwork mask, 235, 240–241, 246–247 subnetting assigning numbers for, 242–244 class A subnets and subnet masks, 243–244 class B subnets and subnet masks, 243 class C subnets and subnet masks, 242 gateway configuration, 246–247 IP numbers for network classes, 239–240 network mask and, 240–244 preparation for, 241–242 unusable IP addresses created by, 241 Sudo (superuser do) aliases for, 734–735 basic philosophy, 732 /etc/sudoers configuration file, 733–737 features, 732 global configuration defaults, 733 log file, 733 need for, 731–732 privilege specifications, 733 tips, 737 typical session, 732–733 visudo configuration file editor, 733, 734–737 supernetting, 244–245 46_599496 bindex.qxd 8/30/05 7:34 PM Page 985 986 Index superuser. See root user or superuser superuser do. See Sudo surge protection, 25–26 swap partition or swap space creating with Disk Druid, 47 creating with mkswap, 683, 686–687 defined, 31 disabling, 683, 691 enabling, 683, 690–691 monitoring activity with sar, 827 overview, 47 paging, 47 swapoff command, 683, 691 swapon command, 683, 690–691 switches versus hubs, 420 symbolic links, 135, 683, 688 symlinks command, 683, 688 symmetric multiprocessing (SMP), 30 sys directory, 144 sysfs virtual file system, 155 syslog daemon, 172–174, 482 syslog.conf file, 172–174 syslogd system logger, 733 sysstat package, 822, 826 system activity report tool. See sar tool system administrator. See also system administrator duties learning and skills needed by, 4 responsibilities of, 4 as root user, 4–5 size of installation and, 4 uniqueness of Linux for, 3–4 system administrator duties backing up and restoring files, 7–9 configuring security, 10–12 creating and maintaining user accounts, 7 database decisions and, 352 freedom and flexibility implied by, 5 installing and configuring application software, 6–7 installing and configuring servers, 5–6 monitoring and tuning performance, 9–10 monitoring security, 12 overview, 12 system clock. See date and time, system system environmental settings for cron daemon, 171–172 for email aliases, 169 for file system information, 169–170 for GRUB, 139–140, 170–171 for log file rotation, 174–175 for prelogin banner, 168 for shared libraries, 174 for syslog daemon, 172–174 for Telnet prelogin banner, 168–169 for user messages at login, 168 system failure, 8, 9 system log log viewer for, 185–186, 881–882 messages indicating SELinux problems, 840–841 NTP-related entries, 405 Sudo logging to, 733 as troubleshooting resource, 879 system logger (syslogd), 733 system requirements, 20–21 system status icon (GNOME), 101 system user, 69 SystemV file system, 147 T talk real-time chat protocol, 435–436 tape drives. See also backing up mt-st package for backups, 784–787 other backup methods versus, 781 support for, 654 tape rotation, 783–784 tar command for backups, 783, 793–795 tar command for backups, 783, 793–795 creating an archive, 794 extracting an archive, 794–795 options, 793 for unpacking source code, 772–773 TCP/IP (Transmission Control Protocol/Internet Protocol). See also IP addresses; TCP/IP networking development of, 229 Internet protocols referred to as, 429 MAC addresses, 230 Network Layer addresses, 230, 232 46_599496 bindex.qxd 8/30/05 7:34 PM Page 986 Index 987 packets, 230–231 protocols in family, 230 as stream-oriented protocol, 233 typical services, 233 TCP/IP networking. See also specific protocols boot process hangs, 895 changing the NIC configuration, 259–260 configuring LANs during standard installation, 54–56 configuring with Network Configuration tool, 251–259 DHCP configuration, 247–250 DNS settings, 261 editing the configuration, 259–263 Ethernet device configuration, 252–254 gateways and routers, 246–247 information on physical requirements, 235 internal network configuration, 235–237 IP masquerading configuration, 263 kernel configuration options, 649–653 Kickstart Configurator settings for LANs, 83 managing hosts, 261–262 modem connection, 257–259, 893–895 network classes overview, 231–233 network configuration files, 188–196, 892 NIC setup, 233–237 profiles, 262 removing a NIC, 259 subnetting, 238–247 TCP/IP overview, 229–231 troubleshooting, 891–896 using two Ethernet cards, 896 wireless NIC configuration, 254–256 tcsh shell, 165, 167 Telnet checking if Sendmail is running, 474 krb-telnet Kerberos application, 870–871 overview, 434 prelog banner, 168–169 SSH as replacement for, 430, 434 testing Dovecot IMAP server, 486 text mode installation installation CD not in drive and, 36 Kickstart Configurator setting, 75 threadpool MPM (Apache 2), 517 time, system. See date and time, system time server. See also date and time, system; NTP (Network Time Protocol) checking if NTP package is installed, 397 configuring, 396–397 defined, 394 grep for NTP-related system log entries, 405 guidelines for wise use of NTP, 405–406 hardware clock for, 395, 405–406 internal, 405 as nonessential service, 393 NTP autokey encryption for, 399–401, 403–404 NTP client configuration, 401–405 NTP information online, 396 ntpd command for syncing with, 697, 702 ntpd time server daemon configuration, 397–401 querying with ntpstat, 404 rdate command for setting system clock from, 697 selecting a solution for, 395–396 selecting reference clocks, 397–401, 406 system size and, 405–406 uses for, 394–395 time zone clock configuration file and, 177 Kickstart Configurator settings, 74 setting during installation, 59–60 timetest command, 776 tload command, 676, 680 tmp directory, 144 tmpfs virtual file system, 149 Token Ring system (IBM), 16 top command default display columns, 819 described, 676, 806, 817–818 interactive keystrokes with, 820–821 46_599496 bindex.qxd 8/30/05 7:34 PM Page 987 988 Index top command (continued) invoking with no options, 818 killing a task using, 821 options, 818 signals recognized by, 821 syntax, 818 using, 679–680 windows displayed by, 819 topologies, 14–18 Transmission Control Protocol/Internet Protocol. See TCP/IP trash can (GNOME), 101 tree topology, 17–18 troubleshooting. See also error messages boot problems, 899–900 CD-ROM drive does not mount, 885 CD-ROM drive not detected during installation, 884–885 cyrus-imapd startup error, 900–901 debugging DNS servers, 465 displaying debugging information with RPM, 747 email problems, 472 emergency boot disk for, 904 entering runlevel 1 for, 137 file system problems, 888–891 ht://Dig won’t run, 900 Internet resources for, 879 IRQs, viewing, 152–153 laptop video problems, 901–902 log files as resources for, 879–882 login problems, 883–884 networking problems, 891–896 NFS problems, 896–898 package installation, 747 README files for, 882–883 screensavers and power management problems, 903 shell commands not working, 888 signal 7 and signal 11 problems, 902–903 situations leading to problems, 875–876 sound not working, 885–887 step 1: identify the problem, 876 step 2: reproduce the problem, 876–877 step 3: look for changes, 877 step 4: determine the most likely cause, 877–878 step 5: implement a solution, 878 step 6: keep documentation, 878 unable to unmount a drive, 887 X Window system startup problems, 903 true clustering, 24 tuning the system. See performance twisted pair cabling, 15 U ufs file system, 147 UIDs (user identification numbers), 707–708 umount command, 683, 690, 694–695, 887 uninterruptible power supply (UPS), 25 United States Naval Observatory (USNO), 395 unlocking passwords for user accounts, 713 until statement (Bash), 920, 923–924 upgrading RPMs, 757–758 upgrading the kernel. See also kernel configuration options customizing versus, 618 deciding to upgrade or not, 616–617 defined, 618 getting information, 620 installing kernel RPM, 619–620 obtaining the kernel source, 620–628 preparing to upgrade, 618–619 pristine RPM for, 623–628 Red Hat Network subscription and, 616, 619 SRPM (source RPM) for, 621–623 up2date agent and, 616, 619, 620 UPGs (user private groups), 723–725 UPS (uninterruptible power supply), 25 up2date agent. See also Red Hat Network advantages of, 597 Alert icon, 598 Channels dialog box, 603 46_599496 bindex.qxd 8/30/05 7:34 PM Page 988 Index 989 configuration file for, 181 configuring, 599–602 GPG for, 599, 600–601, 606 installed by default, 597 kernel upgrade and, 616, 619, 620 Package List dialog box, 604 Package Retrieval dialog box, 604–605 Red Hat Network Configuration dialog box, 599–602 Skipped Packages dialog box, 603–604 starting, 602 updating your system, 602–605 up2date Agent Configuration tool, 599 USB hard drives for backups, 781 USB support audio devices, 657 gadget drivers, 659 host controller drivers (HCD), 657 host-side USB, 656–657 human interface devices (HID), 658 imaging devices, 658 mass storage devices, 657–658 miscellaneous drivers, 659 multimedia devices, 658 network adapters, 659 Serial Converter support, 659 user accounts. See also /etc/passwd file; /etc/shadow file; group accounts changing login shell, 714 changing passwords from scripts, 714 command-line tools for, 708 creating multiple accounts, 715–716 creating single accounts, 711–712, 883–884 creating with User Manager, 726–727 deleting, 713, 728 disabling, 713 expiration policy for passwords, 714–715 group accounts versus, 718 importance of, 707, 708 killing all processes owned by a user, 936–938 locking or unlocking passwords, 713 modifying default values, 712–713 modifying existing accounts, 713 modifying multiple accounts at once, 715–717 modifying with User Manager, 727–728 passwords, 7 real versus logical, 707–708 removing passwords, 713 resetting a password, 883 system administrator duties for, 7 UIDs for, 707–708 updating only expired passwords, 713 user database files, 708–711 viewing login and process information, 717–718 viewing status message for users, 713 user database files. See /etc/passwd file; /etc/shadow file user identification numbers (UIDs), 707–708 User Manager application configuration file for, 185 creating group accounts, 728–729 creating user accounts, 726–727 deleting user accounts, 728 modifying group accounts, 729–730 modifying user accounts, 727–728 overview, 725–726 starting, 725 user private groups (UPGs), 723–725 useradd command, 708, 711–713 user-defined variables (Bash), 910–911 userdel command, 708, 713 usermod command, 708, 713 USNO (United States Naval Observatory), 395 usr directory, 144 /usr/sbin directory, 675 /usr/share/squirrelmail/config /config/conf.pl file, 565–566 UTC (Coordinated Universal Time), 59–60, 74, 698, 701 V var directory, 144 /var/ftp/pub directory, 495 variable files, 142 46_599496 bindex.qxd 8/30/05 7:34 PM Page 989 990 Index variables Bash, 909–912 configuration (Postfix), 484 environment (PostgreSQL), 366–367, 376 /var/kerberos/krb5kdc/kadm5 .acl file, 869 /var/kerberos/krb5kdc/kdc.conf file, 868–869 /var/lib/nfs/etab status information file, 273, 281 /var/lib/nfs/rmtab status information file, 273, 280–281 /var/lib/pgsql/data/pg_hba .conf file, 368–372 /var/log directory, 879, 882 /var/log/messages file messages indicating SELinux problems, 840–841 NTP-related entries, 405 Sudo logging to, 733 as troubleshooting resource, 879 /var/log/named.log file, 586 /var/log/sa directory, 826 /var/named/named.ca file, 449 /var/named/named.local file, 449 /var/spool/cron directory, 172 /var/yp/securenets file, 315, 316–317 verifying. See also rpmquery command kernel archive, 626–627 kernel configuration for Squid, 408–409 MySQL is running, 355–356 NIC is configured, 234 NIS portmapper is running, 319 Postfix startup at boot time, 481 RPMs, 758–761 Sendmail startup at boot time, 473 software versions, 764–767 Veritas FREEVxFS file system, 148 Very Secure FTP Daemon. See vsftpd VESA local bus (VL-bus), 31 VFS (Virtual File Systems) layer, 145 video cards. See also color depth; screen resolution changing type with X Configuration tool, 208–209 kernel configuration options, 655–656 Kickstart Configurator settings, 87–88 support for, 31, 32 troubleshooting laptop video problems, 901–902 video chipset, 32 XFree86 and, 31, 32 Video For Linux, 655 viewing. See displaying or viewing virtual block devices. See metadevices virtual file systems, 149–154 Virtual File Systems (VFS) layer, 145 virtual hosts or virtual servers, 514, 523, 537–539 virtual memory, 31, 47. See also swap partition or swap space virtual network computing. See VNC virtual private networks (VPNs), 381, 382 visudo editor, 733, 734–737 VL-bus (VESA local bus), 31 vmstat command changing the display unit, 808 column headings in output, 809–810 described, 806 displaying average memory usage, 808 displaying current memory usage, 808–810 free command versus, 808 redirecting output to a file, 940–941 syntax, 808 vmstat.sh Bash script, 940–941 VNC (virtual network computing) advantages of, 381–382 authentication, 388–389 checking if installed, 383 client or viewer, 388–390 configuration file for, 186–187 defined, 381 further information, 382–383 for help desk applications, 382 overview, 381–383 packages, 383 running KDE on Windows via, 391–392 security, 384–386 46_599496 bindex.qxd 8/30/05 7:34 PM Page 990 Index 991 server setup, 383–388 starting the server, 383–384, 388 testing, 388–392 uses for, 381, 382 VPNs versus, 382 VNC Authentication dialog box, 388–389 VNC client or viewer, 388–390 vnc package, 383 VNC server customizing, 386–388 firewall configuration for, 384–386 killing the running process, 392 starting, 383–384, 388 vncserver Perl script, 383–384, 388, 392 vncviewer command, 388 X Window system and, 387–388 xstartup file, 384, 386–388 vnc-server package, 383 vncserver Perl script, 383–384, 388, 392 vncviewer command, 388 volume groups, displaying, 159–160 VPNs (virtual private networks), 381, 382 vsftpd (Very Secure FTP Daemon) banner message display, 500 checking if installed, 493 checking stock installation, 494–495 chroot mode, 500–501 configuration files, 495 configuring features, 497–501 configuring user-level access, 496–497 default configuration, 497–498 denying access based on email addresses, 500 disabling anonymous FTP, 496, 498, 501–502 disabling local user access, 498 download directory, 495 ease of use, 491, 492 enabling anonymous uploads, 498–499, 503–504, 505 enabling guest accounts, 504–507 optimizing services, 590 overview, 492–493 project Web site, 492 running from xinetd, 502–503 running over SSL, 507–509 showing messages for directories, 499 starting at boot time, 501 transfer log, 499 vsftpd.xinetd file, 503, 506 VxTools package, 148 W w command, 717–718 wallpaper, X performance and, 417 warnquota command, 738, 743 weak quote (“) in Bash, 909 Web hosting, outsourcing, 20–21 Web proxy. See caching proxy server; Squid Web proxy Web servers. See also Apache Web server content negotiation, 515 firewall configuration for, 57 kickstart installation from, 76 overview, 517–519 Web services. See also specific services mailing lists, 555–563 optimizing, 590–593 RSS feed, 567–573 search functionality, 574–578 Web-based email, 563–567 Web sites. See Internet resources Web-based email. See SquirrelMail wheel user, 731. See also Sudo (superuser do) while statement (Bash), 920, 923–924 who command, 717 Wieers, Dag (Red Hat/Fedora Repository webmaster), 768 wildcards (Bash), 906–909 Windows. See Microsoft Windows Winer, Dave (RSS designer), 569 WinModems, 894–895 wireless NIC configuration, 254–256 worker MPM (Apache 2), 517 46_599496 bindex.qxd 8/30/05 7:34 PM Page 991 992 Index Workspace Switcher GNOME, 102 KDE, 121 X X Configuration tool changing display color depth, 207 changing display resolution, 206 changing monitor type, 207–208 changing video card type, 208–209 dual monitor configuration, 209–210 overview, 205 root password needed for, 206 X server configuring manually, 210–215 configuring with X Configuration tool, 205–210 restarting after configuration changes, 206 updating drivers for, 417 X Window system. See also GNOME (GNU Network Object Model Environment); KDE (K Desktop Environment); X server checking application versions, 767 improvements forthcoming, 416 Kickstart Configurator setting, 87 monitors and, 31–32 performance tuning, 416–418 RAM requirements, 31 restarting to fix memory issues, 417 running across a network, performance and, 391 specifying desktop manager for, 178 startup problems, 903 unloading unused modules, 417 video cards and, 31, 32 VNC xstartup file and, 387–388 “X Window System Network Performance” (Packard and Gettys), 416 x86 machines, disk partitioning on, 156 X.500 standard, 852 XFree86, 5, 31, 32, 903. See also X server; X Window system XFS (Extended File System) of SGI, 148 xinetd daemon access control using, 437 configuration files for, 187, 193–194 log capabilities, 437 server configuration, 437–439 starting network services from, 193–194 vsftpd configuration, 502–503 xinetd.conf file, 193–194, 438–439 xinetd-started services, 439–440 xorg.conf file changing color depth, 214 changing screen resolution, 214–215 man pages, 215 section names and their uses, 213–214 typical server configuration, 210–213 X Configuration tool as front end for, 205 xstartup file (VNC), 384, 386–388 XTRAP extension (X Windows), 417 Y YP (Yellow Pages). See NIS (Network Information Service) ypbind NIS client daemon, 326–331 ypbind package, 311 ypcat command, 331 ypinit command, 315, 319–321 ypmatch command, 331, 332–333 yppasswd command, 331, 333 yppasswdd NIS password daemon, 315, 321 ypserv NIS server daemon, 316–318 ypserv package, 311 ypserv.conf file, 315, 316, 317–318 yp-tools package, 311 ypwhich command, 219–220, 331, 332 ypxfrd NIS server transfer daemon, 316, 321–322 Z Zip drives, 645–646, 781 zone files, 449, 458–460 zsh shell, 165–167 zshrc configuration script, 165 46_599496 bindex.qxd 8/30/05 7:34 PM Page 992 GNU General Public License Version 2, June 1991 Copyright © 1989, 1991 Free Software Foundation, Inc. 675 Mass Ave, Cambridge, MA 02139, USA Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed. Preamble The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software—to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation’s software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too. When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free soft- ware (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things. To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it. For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights. We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software. Also, for each author’s protection and ours, we want to make certain that everyone under- stands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors’ reputations. Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone’s free use or not licensed at all. The precise terms and conditions for copying, distribution and modification follow. 47_599496 gnu.qxd 8/30/05 7:33 PM Page 993 [...]... code, even though third parties are not compelled to copy the source along with the object code 4 You may not copy, modify, sublicense, or distribute the Program except as expressly provided under this License Any attempt otherwise to copy, modify, sublicense or distribute the Program is void, and will automatically terminate your rights under this License However, parties who have received copies, or... WITH YOU SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION 12 IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MAY MODIFY AND/OR REDISTRIBUTE THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING... derived from the Program, and can be reasonably considered independent and separate works in themselves, then this License, and its terms, do not apply to those sections when you distribute them as separate works But when you distribute the same sections as part of a whole which is a work based on the Program, the distribution of the whole must be on the terms of this License, whose permissions for... offer, in accord with Subsection b above.) The source code for a work means the preferred form of the work for making modifications to it For an executable work, complete source code means all the source code for all modules it contains, plus any associated interface definition files, plus the scripts used to control compilation and installation of the executable However, as a special exception, the... distributed need not include anything that is normally distributed (in either source or binary form) with the major components (compiler, kernel, and so on) of the operating system on which the executable runs, unless that component itself accompanies the executable If distribution of executable or object code is made by offering access to copy from a designated place, then offering equivalent access to... thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions: a) You must cause the modified files to carry prominent notice stating that you changed the files and the date of any change b) You must cause any work that you distribute or publish, that in whole or in part contains or is... generous contributions to the wide range of software distributed through that system in reliance on consistent application of that system; it is up to the author/donor to decide if he or she is willing to distribute software through any other system and a licensee cannot impose that choice This section is intended to make thoroughly clear what is believed to be a consequence of the rest of this License 8 If... thereof, to be licensed as a whole at no charge to all third parties under the terms of this License c) If the modified program normally reads commands interactively when run, you must cause it, when started running for such interactive use in the most ordinary way, to print or display an announcement including an appropriate copyright notice and a notice that there is no warranty (or else, saying that... COPYING, DISTRIBUTION AND MODIFICATION 0 This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License The “Program , below, refers to any such program or work, and a “work based on the Program” means either the Program or any derivative work under copyright law: that is to say, a work... Program (or any work based on the Program ), you indicate your acceptance of this License to do so, and all its terms and conditions for copying, distributing or modifying the Program or works based on it 6 Each time you redistribute the Program (or any work based on the Program ), the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject . Disk Druid, 47 creating with mkswap, 68 3, 686–687 defined, 31 disabling, 68 3, 691 enabling, 68 3, 690–691 monitoring activity with sar, 827 overview, 47 paging, 47 swapoff command, 68 3, 691 swapon. script, 383–38 4, 38 8, 392 vncviewer command, 388 X Window system and, 387–388 xstartup file, 38 4, 386–388 vnc-server package, 383 vncserver Perl script, 383–38 4, 38 8, 392 vncviewer command, 388 volume. 168 system failure, 8, 9 system log log viewer for, 185–18 6, 881–882 messages indicating SELinux problems, 840–841 NTP-related entries, 405 Sudo logging to, 733 as troubleshooting resource, 879 system