... (Fedora/RHEL) 44 2System Operation 44 8Runlevels 44 8Booting the System 44 9Single-User Mode 44 9Going to Graphical Multiuser Mode 45 1Logging In 45 1Logging Out 45 3Bringing the System Down 45 3Crash 45 5 www.it-ebooks.info ... Summary 142 Exercises 143 Advanced Exercises 144 Chapter 5: The Linux Utilities 1 45 Special Characters 146 Basic Utilities 147 ls: Lists the Names of Files 148 cat: Displays a Text File 148 rm: ... Summary 58 1Exercises 58 2Advanced Exercises 58 2Chapter 15: Building a Linux Kernel 58 3Downloading, Installing, and Prepping the Kernel Source Code 58 5Prerequisites 58 5More Information 58 5Downloading...
... 54 0 Modifying Dedicated Resources 54 3 Performing Additional Actions 54 4 Managing VMs with the xm Utility 54 5 C Preventing Security Breaches with ExecShield 54 7 How ExecShield Works 54 7 Determining ... back to it time and time again.For potential RedHatEnterpriseLinux customers, this book demonstrates why Red Hat EnterpriseLinux is an enterprise operating system. For existing RedHatEnterprise ... ExecShield 54 8 Disabling ExecShield 54 9 D Troubleshooting 55 1Installation and Configuration Troubleshooting 55 1OS Core Concepts Troubleshooting 55 3System Administration Troubleshooting 5 54 Network...
... installation of Red HatEnterpriseLinux5. ã RedHatEnterpriseLinux Deployment Guide Provides information regarding thedeployment, configuration and administration of RedHatEnterpriseLinux5. For ... Piranha Configuration Toolã Appendix A, Using LVS with RedHat ClusterFor more information about RedHatEnterpriseLinux 5, refer to the following resources:ã RedHatEnterpriseLinux Installation ... information about RedHat Cluster Suite for RedHatEnterpriseLinux 5, refer to thefollowing resources:ã RedHat Cluster Suite Overview — Provides a high level overview of the RedHat ClusterSuite.ã...
... 10.10.10.0/ 24 dports 54 0 4, 54 0 5 -j ACCEPTExample 2.1. Port 54 0 4, 54 0 5: cman-A INPUT -i 10.10.10.200 -m state state NEW -m multiport -p tcp -s10.10.10.0/ 24 -d 10.10.10.0/ 24 dports 80 84 -j ACCEPTExample ... managing a Red Hat cluster.ã Command line tools — This is a set of command line tools for configuring and managing a Red Hat cluster.Configuring RedHat Cluster Software3 Figure 1 .5. luci storage ... -s10.10.10.0/ 24 -d 10.10.10.0/ 24 dports 1 45 67 -j ACCEPTExample 2 .4. Port 1 45 67: gnbd-A INPUT -i 10.10.10.200 -m state state NEW -m multiport -p tcp -s10.10.10.0/ 24 -d 10.10.10.0/ 24 dports 16 851 -j...
... Users in SELinux 45 5 Policies in SELinux 45 6 Tools in SELinux 45 6 Using SELinux in Fedora and RHEL 45 7 Getting SELinux 45 7 Checking whether SELinux is on 45 8 Checking SELinux status 45 9 Learning ... Strategy 54 1 Full backup 54 1 Incremental backup 54 1 Disk mirroring 54 1 Network backup 54 2 Selecting a Backup Medium 54 2 Magnetic tape 54 3 Writable CD drives 54 5 Writable DVD drives 54 9 Writing ... of Linux 10 What Are RedHatEnterpriseLinux and Fedora? 11 Red Hat forms the Fedora Project 11 Red Hat shifts toRedHatEnterpriseLinux 14 Choosing between Fedora and Enterprise 14 Why...
... Linux 45 5 Understanding Security Enhanced Linux 45 6 Types and roles in SELinux 45 6 Users in SELinux 45 7 Policies in SELinux 45 7 Tools in SELinux 45 8 Using SELinux in Fedora and RHEL 45 8 ... of Linux 10 What Are RedHatEnterpriseLinux and Fedora? 11 Red Hat forms the Fedora Project 11 Red Hat shifts toRedHatEnterpriseLinux 14 Choosing between Fedora and Enterprise 14 Why ... of Fedora and RedHatEnterpriseLinux 3 Introducing Fedora 10 and RedHatEnterpriseLinux4 What Is Linux? 5 Linux s Roots in UNIX 6 What Is an Operating System? 7 Common Linux Features...
... -p httpd-2.0. 54 / modules/securitylocalhost$ cp modsecurity-1.8.7/apache2/mod_security.c httpd-2.0. 54 / modules/securitylocalhost$ cp httpd-2.0. 54 / modules/echo/Makefile.in httpd-2.0. 54 / modules/securityOkay, ... để cài Linux, bao gồm cả KDE và Gnome, các tiện ích đồ họa, multimedia, và lập trình. Tối thiểu bạn cần 40 0MB v ci ton b l 4, 5GB.Đ Mt partition l Linux swap, là phân vùng tráo đổi của Linux ... gặp:- 40 1 - Authorization Required (cần password để truy nhập)- 40 0 - Bad request (Lỗi do yêu cầu)- 40 3 - Forbidden (không được vào)- 50 0 - Internal Server Error (lỗi server)- 40 4 - Wrong...
... and More 44 7Comparing Technologies 44 7Expect 44 7Perl 44 9Other Tools 44 9Internal Scripts 45 2Concluding Challenge for an Automater—Explaining Value 45 2Summary 45 323 C and ... 49 0while 49 1 until 49 1Regular Expressions 49 1Access to the Shell 49 2Command-Line Mode 49 2Automation Using Perl 49 3Moving Files 49 3Purging Logs 49 5 Posting to Usenet 49 6For ... States 40 Red Hat Linux, Second EditionUNLEASHEDvitksysv and Managing Your Services 43 Shutting Down the Linux System 44 shutdown 44 halt and reboot 45 When the System Crashes 46 Glossary...
... System AdministratorCHAPTER 2Planning the NetworkCHAPTER 3Installing RedHat Linux CHAPTER 4 Red HatLinux File SystemCHAPTER 5 Red Hat System Configuration FilesPartIb3632-X PtO1.F 2/21/02 ... run whatever came on the com-puter, assuming that things came from the factory properly configured. The user or enterprise that decides on Linux has decided, too, to assume the control that Linux offers, ... access to the areawhere the machine(s) is located. You might decide that users must change their pass-words periodically, and you can configure RedHatLinuxto prompt users to do so.And what to...