PythonQ 248-8XX Instalační příručka Strana 1

Procházejte online nebo si stáhněte Instalační příručka pro Svařovací systém PythonQ 248-8XX. PythonQ 248-8XX Installation guide Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 294
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - Reference Guide

Red Hat Linux 8.0The Official Red Hat LinuxReference Guide

Strany 2

x Introduction2.1.3. Beginning Linux Books• Red Hat Linux for Dummies, 2nd Edition by Jon "maddog" Hall; IDG• Special Edition Using Red Hat

Strany 3 - Table of Contents

100 Chapter 6. The X Window SystemInputDeviceConfigures an input device such as a mouse or keyboard used to submit information into the sys-tem using t

Strany 4

Chapter 6. The X Window System 101• VertRefresh — Lists the vertical refresh range frequencies supported by the monitor, inkHz. These values are used

Strany 5

102 Chapter 6. The X Window SystemFor more information, refer to the XF86Config man page.To review the current configuration of your XFree86 server, ty

Strany 6

Chapter 6. The X Window System 103to work in that environment to commonly integrate and be used in new ways, such as permittingdrag-and-drop behavior

Strany 7 - Introduction

104 Chapter 6. The X Window Systemxmodmap utility to configure the keyboard. The Xresources files are read to assign specific prefer-ence values to parti

Strany 8

Chapter 6. The X Window System 105When the user finishes an X session on the default display (:0) and logs out, the/etc/X11/xdm/TakeConsole script runs

Strany 9

106 Chapter 6. The X Window System• clone-self — Decides if the font server will clone a new version of itself when the client-limit is hit. By defaul

Strany 10 - 3. Document Conventions

Chapter 6. The X Window System 1076.6. Additional ResourcesMuch more can be said about the XFree86 server, the clients that connect to it, and the ass

Strany 11

108 Chapter 6. The X Window System• KDE 2.0 Development by David Sweet and Matthias Ettrich; Sams Publishing — Instructs be-ginning and advanced devel

Strany 13 - 6. More to Come

Introduction xidisplayed in a different style on their own (such as filenames). In these cases, they are consideredto be part of the command, so the en

Strany 15 - System Reference

Chapter 7.Pluggable Authentication Modules (PAM)Programs which give privileges to users must properly authenticate each user. For instance, when youlo

Strany 16

112 Chapter 7. Pluggable Authentication Modules (PAM)The next four sections will describe the basic format of PAM configuration files and how they usePA

Strany 17 - File System Structure

Chapter 7. Pluggable Authentication Modules (PAM) 1137.3.2. Creating ModulesNew PAM modules can be added at any time, and PAM-aware applications can t

Strany 18 - 1.2.1. FHS Organization

114 Chapter 7. Pluggable Authentication Modules (PAM)A newer control flag syntax allowing for even more control is now available for PAM. Please see th

Strany 19 - /usr/local/sbin."

Chapter 7. Pluggable Authentication Modules (PAM) 115This line causes the user to be asked for a password and then checks the password using the infor

Strany 20 - /usr."

116 Chapter 7. Pluggable Authentication Modules (PAM)#%PAM-1.0auth required /lib/security/pam_nologin.soauth required /lib/security/pam_securetty.soau

Strany 21 - 1.3. Special File Locations

Chapter 7. Pluggable Authentication Modules (PAM) 1177.8.1. Device OwnershipWhen a user logs into a machine under Red Hat Linux, the pam_console.so mo

Strany 22

118 Chapter 7. Pluggable Authentication Modules (PAM)

Strany 23 - The proc File System

Chapter 8.TCP Wrappers and xinetdControlling access to network services can be a challenge. Firewalls are useful for controlling accessin and out of a

Strany 24 - 2.2.1. /proc/apm

xii Introductionbutton on a GUI screen or windowThis style indicates that the text will be found on a clickable button on a GUI screen. For example:Cl

Strany 25 - 2.2.3. /proc/cpuinfo

120 Chapter 8. TCP Wrappers and xinetdspecifically given access to the service in hosts.allow are allowed to access the service. In addition,all rules

Strany 26 - 2.2.4. /proc/devices

Chapter 8. TCP Wrappers and xinetd 121CautionThe KNOWN, UNKNOWN, and PARANOID wildcards should be used very carefully, as a disruption in nameresoluti

Strany 27 - 2.2.8. /proc/filesystems

122 Chapter 8. TCP Wrappers and xinetdspecial file or email an administrator. Below is an example of a booby trap in the hosts.deny filewhich will write

Strany 28 - 2.2.9. /proc/interrupts

Chapter 8. TCP Wrappers and xinetd 123instances of this service is under a particular threshold, and any other rules specified for that serviceor all x

Strany 29 - 2.2.11. /proc/ioports

124 Chapter 8. TCP Wrappers and xinetd• EXIT — Logs the exit status or termination signal of the service. (log_on_success)• HOST — Logs the remote hos

Strany 30 - 2.2.13. /proc/kcore

Chapter 8. TCP Wrappers and xinetd 1258.3.1.3. Access Control within xinetdUsers of xinetd services can choose to use the TCP wrapper host access cont

Strany 31 - 2.2.17. /proc/locks

126 Chapter 8. TCP Wrappers and xinetd8.3.1.4. Binding and Port RedirectionThe service configuration files for xinetd also support binding the service t

Strany 32 - 2.2.19. /proc/meminfo

Chapter 8. TCP Wrappers and xinetd 1278.4. Additional ResourcesAdditional information concerning TCP wrappers and xinetd is available on system docume

Strany 33 - 2.2.21. /proc/modules

128 Chapter 8. TCP Wrappers and xinetd

Strany 34 - 2.2.24. /proc/partitions

Chapter 9.SSH ProtocolSSH™ allows users to log into host systems remotely. Unlike rlogin or telnet SSH encrypts thelogin session, making it impossible

Strany 35 - 2.2.25. /proc/pci

Introduction xiiiImportantIf you modify the DHCP configuration file, the changes will not take effect until you restart the DHCPdaemon.CautionDo not per

Strany 36 - 2.2.27. /proc/stat

130 Chapter 9. SSH Protocol9.1.1. Why Use SSH?Nefarious computer users have a variety of tools at their disposal to disrupt, intercept, and re-routene

Strany 37 - 2.3. Directories in /proc/

Chapter 9. SSH Protocol 131Both SSH protocol versions 1 and 2 add layers of security with each of these layers providing its owntype of protection.9.3

Strany 38

132 Chapter 9. SSH ProtocolServers can be configured to allow different types of authentication, which gives each side the opti-mal amount of control.

Strany 39 - 2.3.2. /proc/bus/

Chapter 9. SSH Protocol 133• ssh_host_key.pub — The RSA public key used by the sshd daemon for version 1 of the SSHprotocol.• ssh_host_rsa_key — The R

Strany 40 - 2.3.4. /proc/fs

134 Chapter 9. SSH Protocol9.5.2. Port ForwardingWith SSH you can secure otherwise insecure TCP/IP protocols via port forwarding. When using thistechn

Strany 41 - 2.3.5. /proc/ide/

Chapter 9. SSH Protocol 1359.6. Require SSH for Remote ConnectionsFor SSH to be truly effective in protecting your network connections, you must stop

Strany 42 - 2.3.7. /proc/net/

136 Chapter 9. SSH Protocol

Strany 43 - 2.3.8. /proc/scsi/

Chapter 10.KerberosKerberos is a network authentication protocol created by MIT which uses secret-key cryptography —obviating the need to send passwor

Strany 44

138 Chapter 10. Kerberos10.3. Kerberos TerminologyLike any other system, Kerberos has its own terminology to define various aspects of the service.Befo

Strany 45 - 2.3.9. /proc/sys/

Chapter 10. Kerberos 139ticketA temporary set of electronic credentials that verify the identity of a client for a particular service.Ticket Granting

Strany 46 - Section 2.4

xiv Introduction6.1. We Need Feedback!If you find an error in the Official Red Hat Linux Reference Guide, or if you have thought of away to make this ma

Strany 47 - 57411 52939 45 0 0 0

140 Chapter 10. KerberosNoteKerberos depends on certain network services to work correctly. First, Kerberos requires approximateclock synchronization

Strany 48

Chapter 10. Kerberos 141KDC from kerberos.example.com to the name of your Kerberos server. By convention,all realm names are uppercase and all DNS hos

Strany 49

142 Chapter 10. KerberosOnce you have completed the steps listed above, the Kerberos server should be up and running. Next,we will set up a Kerberos c

Strany 50

Chapter 10. Kerberos 14310.8.1. Installed Documentation• /usr/share/doc/krb5-server- version-number — The Kerberos V5 Installation Guideand the Kerber

Strany 51 - 2.3.11. /proc/tty/

144 Chapter 10. Kerberos

Strany 52 - 2.4. Using sysctl

Chapter 11.TripwireTripwire data integrity assurance software monitors the reliability of critical system files and directo-ries by identifying changes

Strany 53 - 2.5. Additional Resources

146 Chapter 11. Tripwire1. Install Tripwire and customize the policy file.Install the tripwire RPM (Section 11.2). Then, customize the sample configurat

Strany 54

Chapter 11. Tripwire 1472. If the CD-ROM does not automatically mount, type the following command:mount /mnt/cdrom3. Verify that the tripwire RPM is o

Strany 55 - Chapter 3

148 Chapter 11. Tripwire• EDITOR — Specifies the text editor called by Tripwire. The default value is /bin/vi.• LATEPROMPTING — If set to true this var

Strany 56 - 3.2.2. The Boot Loader

Chapter 11. Tripwire 149WarningFor security purposes, you should either delete or store in a secure location any copies of the plaintext /etc/tripwire

Strany 58

150 Chapter 11. Tripwirean initial integrity check. This check should be done prior to connecting the computer to the network,and putting it into prod

Strany 59 - Web server

Chapter 11. Tripwire 151Database file used: /var/lib/tripwire/some.host.com.twdCommand line used: /usr/sbin/tripwire --check==========================

Strany 60 - 3.5. SysV Init

152 Chapter 11. Tripwire/bin/arch-rwxr-xr-x root (0) 2844 Tue Dec 12 05:51:35 2000/bin/ash-rwxr-xr-x root (0) 64860 Thu Dec 7 22:35:05 2000/bin/ash.st

Strany 61 - 3.6. Init Runlevels

Chapter 11. Tripwire 153ImportantIt is important that you change only authorized integrity violations in the database.All proposed updates to the Trip

Strany 62 - 3.6.1. Initscript Utilities

154 Chapter 11. TripwireThen type the following command to create a new database using the updated policy file:/usr/sbin/tripwire --initTo make sure th

Strany 63 - /etc/sysconfig/ Directory

Chapter 11. Tripwire 155Since the configuration file does not not alter any Tripwire policies or files tracked by the application,it is not necessary to

Strany 64 - • USEMD5=

156 Chapter 11. Tripwire/etc/tripwire/tw.polThe active Tripwire policy file is an encrypted file containing comments, rules, directives, andvariables. T

Strany 65 - DESKTOP="GNOME"

Network Services Reference

Strany 67

Chapter 12.Network ScriptsUsing Red Hat Linux, all network communications occur between configured interfaces and physicalnetworking devices connected

Strany 69

160 Chapter 12. Network Scriptsconfigure them. These files are usually named ifcfg- name , where name refers to the nameof the device that the configurat

Strany 70

Chapter 12. Network Scripts 161• yes — This device should be activated at boot-time.• no — This device should not be activated at boot-time.• PEERDNS=

Strany 71 - /dev/raw/raw2 8 5

162 Chapter 12. Network Scripts• yes — This interface will allow pppd to initiate a connection when someone attempts to use it.• no — A connection mus

Strany 72 - • CARDTYPE=

Chapter 12. Network Scripts 163WarningNever edit the loopback interface script, /etc/sysconfig/network-scripts/ifcfg-lo, by hand.Doing so can prevent

Strany 73 - • DEVICE=

164 Chapter 12. Network ScriptsThe two interface control scripts are ifdown and ifup and are symbolic links to scripts in the /sbin/directory. When ei

Strany 74

Chapter 12. Network Scripts 165The most common network functions file is network-functions, located in the/etc/sysconfig/network-scripts/ directory. Th

Strany 75 - 3.8. Shutting Down

166 Chapter 12. Network Scripts

Strany 76

Chapter 13.Firewalls and iptablesLinux comes with advanced tools for packet filtering — the process of controlling network packetsas they enter, move t

Strany 77 - Boot Loaders

168 Chapter 13. Firewalls and iptables• OUTPUT — This chain applies to packets sent out via the same network interface which receivedthe packets.• FOR

Strany 78 - 4.3. Installing GRUB

Chapter 13. Firewalls and iptables 169packets. For this reason, you must be sure to place the rule designed to catch a particular packet inthe rule th

Strany 79 - 4.4. GRUB Terminology

Chapter 1.File System Structure1.1. Why Share a Common Structure?An operating system’s file system structure is its most basic level of organization. A

Strany 80 - 4.5. GRUB Interfaces

170 Chapter 13. Firewalls and iptables13.3.2. StructureMany iptables commands have the following structure:iptables [-t table-name ] command chain-nam

Strany 81 - 4.6. GRUB Commands

Chapter 13. Firewalls and iptables 171CautionBe aware of which option (-A or -I) you are using when adding a rule. The order of the rules canbe very i

Strany 82

172 Chapter 13. Firewalls and iptablesiptables man page for more information on these and other targets, including rules regardingtheir use.You may al

Strany 83

Chapter 13. Firewalls and iptables 173Like many other options, using the exclamation point character (!) after --tcp-flags reverses theeffect of the m

Strany 84 - 4.8. LILO

174 Chapter 13. Firewalls and iptables• INVALID — The matching packet cannot be tied to a known connection.• NEW — The matching packet is either creat

Strany 85 - 4.8.2. LILO vs. GRUB

Chapter 13. Firewalls and iptables 175• --log-prefix — Places a string before the log line when it is written. Accepts up to 29characters after the --

Strany 86

176 Chapter 13. Firewalls and iptablessystem’s version of this file. This allows you to quickly distribute sets of iptables rules to manydifferent mach

Strany 87 - 4.11. Additional Resources

Chapter 14.Apache HTTP ServerThe Apache HTTP Server is a robust, commercial-grade open source Web server developed by theApache Software Foundation (h

Strany 88 - 88 Chapter 4. Boot Loaders

178 Chapter 14. Apache HTTP ServerA more complete list complete list of changes can be found online at http://httpd.apache.org/docs-2.0/.14.1.2. Packa

Strany 89 - Users and Groups

Chapter 14. Apache HTTP Server 179it to suit; however, some parts of the file have changed more than others and a mixed approach isgenerally the best.

Strany 90

18 Chapter 1. File System Structure1.2.1. FHS OrganizationThe directories and files noted here are a small subset of those specified by the FHS document

Strany 91 - 5.3. Standard Groups

180 Chapter 14. Apache HTTP Server14.2.1.2. Server-pool Size RegulationIn Apache HTTP Server 2.0, the responsibility for accepting requests and dispat

Strany 92 - 5.4. User Private Groups

Chapter 14. Apache HTTP Server 181• LoadModule lines for modules packaged in their own RPMs (mod_ssl, php, mod_perl, and thelike) are no longer necess

Strany 93 - /usr/sbin/groupadd emacs

182 Chapter 14. Apache HTTP Server14.2.2.2. LoggingThe following logging directives have been removed:• AgentLog• RefererLog• RefererIgnoreHowever, ag

Strany 94 - 5.5. Shadow Utilities

Chapter 14. Apache HTTP Server 183For more on this topic, refer to the following documentation on the Apache Software Foundation’swebsite:• http://htt

Strany 95

184 Chapter 14. Apache HTTP Server14.2.4.1. The mod_ssl ModuleThe configuration for mod_ssl has been moved from httpd.conf into the file/etc/httpd/conf.

Strany 96

Chapter 14. Apache HTTP Server 18514.2.4.3. The mod_include ModuleThe mod_include module is now implemented as a filter (see Section 14.2.4 for more on

Strany 97 - The X Window System

186 Chapter 14. Apache HTTP ServerAction dbmmanage command(Apache 1.3)Equivalent htdbmcommand (Apache 2.0)Add user to database (usinggiven password)db

Strany 98 - 6.2. XFree86

Chapter 14. Apache HTTP Server 18714.2.4.6. The mod_python ModuleThe configuration for mod_python; has been moved from httpd.conf into the file/etc/http

Strany 99

188 Chapter 14. Apache HTTP ServerNoteRed Hat, Inc. does not ship FrontPage extensions as the Microsoft™ license prohibits the inclusionof these exten

Strany 100

Chapter 14. Apache HTTP Server 189NoteIf you are running the Apache HTTP Server as a secure server, you will be prompted for the secureserver’s passwo

Strany 101

Chapter 1. File System Structure 191.2.1.6. The /proc DirectoryThe /proc directory contains special "files" that either extract information f

Strany 102 - 6.3.2. Desktop Environments

190 Chapter 14. Apache HTTP Server14.5.3. PidFilePidFile names the file where the server records its process ID (pid). Your Web server is set to record

Strany 103 - 6.4. Runlevels

Chapter 14. Apache HTTP Server 191Your server’s default MinSpareServers is 5; your server’s default MaxSpareServers is 20. Thesedefault settings shoul

Strany 104 - 6.4.2. Runlevel 5: prefdm

192 Chapter 14. Apache HTTP Server14.5.15. LoadModuleLoadModule is used to load in Dynamic Shared Object (DSO) modules. More information on the theApa

Strany 105 - 6.5. Fonts

Chapter 14. Apache HTTP Server 19314.5.19. GroupThe Group directive is similar to the User. The Group sets the group under which the server willanswer

Strany 106 - 6.5.2. Adding Fonts

194 Chapter 14. Apache HTTP ServerUsing Directory tags, the DocumentRoot is defined to have less rigid parameters, so that HTTPrequests can be served f

Strany 107 - 6.6. Additional Resources

Chapter 14. Apache HTTP Server 19514.5.27. AllowAllow specifies which requester can access a given directory. The requester can be all, a domainname, a

Strany 108

196 Chapter 14. Apache HTTP Server14.5.32. CacheNegotiatedDocsBy default, your Web server asks proxy servers not to cache any documents which were neg

Strany 109 - Security Reference

Chapter 14. Apache HTTP Server 197other words, after a reverse lookup is performed, a forward lookup is performed on the result. At leastone of the IP

Strany 110

198 Chapter 14. Apache HTTP ServerauthuserIf authentication was required, this is the username with which the user identified herself. Usu-ally, this i

Strany 111 - Chapter 7

Chapter 14. Apache HTTP Server 199See Section 14.5.59 and Section 14.5.23 for instructions on how to execute CGI scripts in directoriesother than the

Strany 112 - 7.3. PAM Modules

Red Hat Linux 8.0: The Official Red Hat Linux Reference GuideCopyright © 2002 by Red Hat, Inc.Red Hat, Inc.1801 Varsity DriveRaleigh NC 27606-2072 USAP

Strany 113 - 7.4. PAM Module Control Flags

20 Chapter 1. File System Structurethat are not designed to be directly utilized by users or shell scripts. The libexec directory containssmall helper

Strany 114 - 7.6. PAM Module Arguments

200 Chapter 14. Apache HTTP Server14.5.49. AddIconAddIcon tells the server which icon to show in server generated directory listings for certain file t

Strany 115

Chapter 14. Apache HTTP Server 20114.5.56. AddLanguageAddLanguage associates filename extensions with specific content languages. This directive is most

Strany 116 - 7.8. PAM and Device Ownership

202 Chapter 14. Apache HTTP Server14.5.61. MetaDirMetaDir specifies the name of a directory where your Web server should look for files containingmeta i

Strany 117 - 7.9. Additional Resources

Chapter 14. Apache HTTP Server 203# Deny from all# Allow from .your_domain.com#/LocationAgain, you must fill in .your_domain.com.14.5.66. ProxyRequests

Strany 118

204 Chapter 14. Apache HTTP ServerNoteAny name-based virtual hosts you set up will only work with non-secure HTTP connections as youcannot use name-ba

Strany 119 - TCP Wrappers and xinetd

Chapter 14. Apache HTTP Server 20514.6. Default ModulesThe Apache HTTP Server is distributed with a number of modules. By default the following module

Strany 120 - 8.2.1. Formatting Rules

206 Chapter 14. Apache HTTP ServerA sample LoadModule line looks like this:LoadModule access_module modules/mod_access.soIf you add or delete modules

Strany 121 - EXCEPT operators

Chapter 14. Apache HTTP Server 207The configuration directives for your secure server are contained within virtual host tags in the/etc/httpd/conf.d/ss

Strany 122

208 Chapter 14. Apache HTTP Server14.9. Additional ResourcesTo learn more about the Apache HTTP Server, refer to the following resources.14.9.1. Usefu

Strany 123 - /etc/xinetd.conf

Chapter 15.EmailEmail is one of the most widely used services on the Internet. Red Hat Linux offers many ways toserve and access email, whether you ar

Strany 124

Chapter 1. File System Structure 21|- named|- nis|- opt|- preserve|- run+- spool|- anacron|- at|- cron|- fax|- lpd|- mail|- mqueue|- news|- rwho|- sam

Strany 125

210 Chapter 15. Emailthe message on the email server after it has been successfully transferred to the client’s system, thoughthis can usually be chan

Strany 126

Chapter 15. Email 211particular mail server using the VRFY command or expand a mailing list using the EXPN command.Email can also be relayed between t

Strany 127 - 8.4. Additional Resources

212 Chapter 15. EmailMany of the larger and more complex MUAs can also be used to send email. However, this actionshould not be confused with the acti

Strany 128

Chapter 15. Email 213which grew out of an earlier email delivery system called Delivermail, quickly became the standardas the email began to expand an

Strany 129 - SSH Protocol

214 Chapter 15. EmailFor example, if you want all email addressed to any domain.com account to be delivered to<[email protected]>, you need to

Strany 130 - 9.3. Layers of SSH Security

Chapter 15. Email 215In this situation, the sendmail server needs to masquerade the machine names on the company networkso that their return address i

Strany 131 - 9.3.2. Authentication

216 Chapter 15. Email15.3.6. Using Sendmail with LDAPUsing the Lightweight Directory Access Protocol (LDAP) is a very quick and powerful way to findspe

Strany 132 - 9.3.3. Connection

Chapter 15. Email 21715.4.1. Fetchmail Configuration OptionsAlthough it is possible to pass all options on the command line necessary to check for emai

Strany 133 - 9.5. More Than a Secure Shell

218 Chapter 15. EmailWhile you can set up your .fetchmailrc file manually, it is much easier to let the included fetch-mailconf program do it for you.

Strany 134 - 9.5.2. Port Forwarding

Chapter 15. Email 219• limit max-number-bytes — Allows you to specify that only messages below a particularsize may be retrieved. This option is usefu

Strany 135

22 Chapter 1. File System StructureThe /var/spool/up2date/ directory contains files used by Red Hat Update Agent, includingRPM header information for t

Strany 136 - 136 Chapter 9. SSH Protocol

220 Chapter 15. Email• --quit — Quits the Fetchmail daemon process.More commands and .fetchmailrc options can be found on the fetchmail man page.15.5.

Strany 137 - Kerberos

Chapter 15. Email 221Many environment variables are not used by most Procmail users, and many of the more importantenvironment variables are already d

Strany 138 - 10.3. Kerberos Terminology

222 Chapter 15. EmailA thorough explanation of regular expressions is beyond the scope of this chapter. The structure ofProcmail recipes is more impor

Strany 139 - 10.4. How Kerberos Works

Chapter 15. Email 223To ensure that the action on this last previous matching recipe was successfully completed beforeallowing a match on the current

Strany 140 - 10.5. Kerberos and PAM

224 Chapter 15. Email• $ — Refers to a variable set earlier in the rc file. This is usually used to set a common mailbox thatwill be referred to by var

Strany 141

Chapter 15. Email 225:0:* ^(From|CC|To).*tux-lugtuxlugAny messages sent from the [email protected] mailing list will be placed in the tuxlug mail-box

Strany 142 - 10.8. Additional Resources

226 Chapter 15. Email15.6.2. Secure Email ServersOffering SSL encryption to IMAP and POP users on the email server is almost as easy. Red Hat Linuxals

Strany 143 - 10.8.2. Useful Websites

Chapter 15. Email 227• /usr/share/doc/fetchmail- version-number — Contains a full list of Fetchmail fea-tures in the FEATURES file and an introductory

Strany 144 - 144 Chapter 10. Kerberos

228 Chapter 15. Email• Removing the Spam: Email Processing and Filtering by Geoff Mulligan; Addison-Wesley Publish-ing Company — A volume that looks a

Strany 145 - Tripwire

Chapter 16.Berkeley Internet Name Domain (BIND)Today, the Internet and almost all local networks depend upon a working and reliable Domain NameService

Strany 146

Chapter 2.The proc File SystemThe Linux kernel has two primary functions: to control access to physical devices on the computerand to schedule when an

Strany 147 - 11.3. Customizing Tripwire

230 Chapter 16. Berkeley Internet Name Domain (BIND)When looking at how a FQDN is resolved to find the IP address that relates to a particular system,y

Strany 148 - /etc/tripwire/twpol.txt

Chapter 16. Berkeley Internet Name Domain (BIND) 231The /etc/named.conf file must be free of errors in order for named to start. While some erroneousop

Strany 149 - /usr/sbin/tripwire --init

232 Chapter 16. Berkeley Internet Name Domain (BIND)When used with other /etc/named.conf statements and their options, acl statements can bevery usefu

Strany 150

Chapter 16. Berkeley Internet Name Domain (BIND) 233• allow-recursion — Similar to allow-query, except it applies to recursive queries. By de-fault, a

Strany 151

234 Chapter 16. Berkeley Internet Name Domain (BIND)statements are listed is important, as the first view statement that matches a particular client’s

Strany 152 - EDITOR line of the

Chapter 16. Berkeley Internet Name Domain (BIND) 235nameservers use only few of them. The following zone statements are very basic examples that canbe

Strany 153 - Important

236 Chapter 16. Berkeley Internet Name Domain (BIND)For example, a zone file may contains the following line:$ORIGIN domain.comAt this point, any names

Strany 154 - 11.8.1. Tripwire and Email

Chapter 16. Berkeley Internet Name Domain (BIND) 237over others. The MX resource record with the lowest preference-value is preferred overthe others,

Strany 155 - 11.10.1. Tripwire Components

238 Chapter 16. Berkeley Internet Name Domain (BIND)Seconds Other Time Units60 1M1800 30M3600 1H10800 3H21600 6H43200 12H86400 1D259200 3D604800 1WTab

Strany 156 - 11.11. Additional Resources

Chapter 16. Berkeley Internet Name Domain (BIND) 239In this example, standard directives and SOA values are used. The authoritative nameservers are se

Strany 157 - Network Services Reference

24 Chapter 2. The proc File SystemWhen viewing different virtual files in the /proc/ file system, you will notice some of the informationis easily under

Strany 158

240 Chapter 16. Berkeley Internet Name Domain (BIND)address to be reversed and ".in-addr.arpa" to be included after them. This allows the si

Strany 159 - Network Scripts

Chapter 16. Berkeley Internet Name Domain (BIND) 24116.3.1.2. /etc/rndc.confYou need to add the following lines to /etc/rndc.conf if rndc is to automa

Strany 160 - 12.2.1. Ethernet Interfaces

242 Chapter 16. Berkeley Internet Name Domain (BIND)• stats — Dumps the current named stats to the /var/named/named.stats file.• stop — Stops the serve

Strany 161 - 12.2.2. Dialup Interfaces

Chapter 16. Berkeley Internet Name Domain (BIND) 24316.4.2. Multiple ViewsThrough the use of the view statement in /etc/named.conf, BIND allows you to

Strany 162 - 12.2.3. Other Interfaces

244 Chapter 16. Berkeley Internet Name Domain (BIND)• Remember to place dots (.) in zone files after all FQDNs and omit them on hostnames.The dot denot

Strany 163 - 12.2.4. Alias and Clone Files

Chapter 16. Berkeley Internet Name Domain (BIND) 245• http://www.redhat.com/mirrors/LDP/HOWTO/DNS-HOWTO.html — Covers the use of BIND asa resolving, c

Strany 164 - 12.4. Network Functions

246 Chapter 16. Berkeley Internet Name Domain (BIND)

Strany 165 - 12.5. Additional Resources

Chapter 17.Network File System (NFS)NFS (Network File System) exists to allow hosts to mount partitions on a remote system and use themas though they

Strany 166

248 Chapter 17. Network File System (NFS)permitted or prevented access to the NFS server. For more information on configuring accesscontrols with TCP w

Strany 167 - Firewalls and iptables

Chapter 17. Network File System (NFS) 249100005 3 tcp 1106 mountd100003 2 udp 2049 nfs100003 3 udp 2049 nfs100021 1 udp 1028 nlockmgr100021 3 udp 1028

Strany 168

Chapter 2. The proc File System 25Running the apm -v command on such a system results in output similar to this:APM BIOS 1.2 (kernel driver 1.16)AC on

Strany 169 - 13.3.1. Tables

250 Chapter 17. Network File System (NFS)17.2.1. /etc/exportsThe /etc/exports file is the standard for controlling which file systems are exported to wh

Strany 170 - 13.3.3. Commands

Chapter 17. Network File System (NFS) 251However, be careful when using wildcards with fully qualified domain names, as they tend to bemore exact than

Strany 171 - 13.3.4. Parameters

252 Chapter 17. Network File System (NFS)The options area specifies how the file system is to be mounted. For example, if the options areastates rw,suid

Strany 172 - 13.3.5. Match Options

Chapter 17. Network File System (NFS) 253This line states that any directory a user tries to access under the local /home directory (due to theasteris

Strany 173

254 Chapter 17. Network File System (NFS)17.4.1. Host AccessNFS controls who can mount an exported file system based on the host making the mount reque

Strany 174 - 13.3.6. Target Options

Chapter 17. Network File System (NFS) 255• fstab — Gives details for the format of the /etc/fstab file used to mount file systems atsystem boot.• nfs —

Strany 175 - 13.3.7. Listing Options

256 Chapter 17. Network File System (NFS)

Strany 176 - 13.5. Additional Resources

Chapter 18.Lightweight Directory Access Protocol (LDAP)Lightweight Directory Access Protocol (LDAP) is a set of open protocols used to access centrall

Strany 177 - Apache HTTP Server

258 Chapter 18. Lightweight Directory Access Protocol (LDAP)• Updated C API — Improves the way programmers can connect to and use the application.• LD

Strany 178

Chapter 18. Lightweight Directory Access Protocol (LDAP) 259• ldapsearch — Searches for entries in the LDAP directory using a shell prompt.• ldapdelet

Strany 179

26 Chapter 2. The proc File System• processor — Provides each processor with an identifying number. If you only have one processor,you will only see a

Strany 180

260 Chapter 18. Lightweight Directory Access Protocol (LDAP)18.3. LDAP TerminologyAn entry is one unit in an LDAP directory. Each entry is identified b

Strany 181 - UserDir public_html

Chapter 18. Lightweight Directory Access Protocol (LDAP) 261• /etc/openldap/slapd.conf — This is the configuration file for the slapd daemon. See Sec-ti

Strany 182

262 Chapter 18. Lightweight Directory Access Protocol (LDAP)TipIf you are using the slapadd command-line tool locally to populate the LDAP directory,

Strany 183

Chapter 18. Lightweight Directory Access Protocol (LDAP) 263The basic steps for creating an LDAP server are as follows:1. Install the openldap, openld

Strany 184

264 Chapter 18. Lightweight Directory Access Protocol (LDAP)18.7.2.2. On the Clients, Edit /etc/ldap.conf and /etc/openldap/ldap.confOn all client mac

Strany 185

Chapter 18. Lightweight Directory Access Protocol (LDAP) 265Existing name service Is LDAPrunning?Script to Use/etc flat files yes migrate_all_online.sh/

Strany 186

266 Chapter 18. Lightweight Directory Access Protocol (LDAP)18.8.3. Related Books• Implementing LDAP by Mark Wilcox; Wrox Press, Inc.• Understanding a

Strany 189 - 14.5.2. LockFile

Appendix A.General Parameters and ModulesThis appendix is provided to illustrate some of the possible parameters available for some commonhardware dev

Strany 190

Chapter 2. The proc File System 27The other difference is that block devices can send and receive information in blocks of a size config-ured per devic

Strany 191 - 14.5.14. Include

270 Appendix A. General Parameters and ModulesNoteOnly use one method, and not both, when loading a module with particular parameters.CautionWhen a pa

Strany 192 - 14.5.16. IfDefine

Appendix A. General Parameters and Modules 271Hardware Module ParametersISP16, MAD16, or Mozartsound card CD-ROM interface(OPTi 82C928 and OPTi82C929)

Strany 193 - 14.5.23. Directory

272 Appendix A. General Parameters and ModulesNoteMost newer Sound Blaster cards come with IDE interfaces. For these cards, you do not need to usesbpc

Strany 194 - 14.5.26. Order

Appendix A. General Parameters and Modules 273Hardware Module ParametersACARD ATP870U PCI SCSIControlleratp870u.oCompaq Smart Array 5300Controllerccis

Strany 195 - 14.5.31. AccessFileName

274 Appendix A. General Parameters and ModulesHardware Module ParametersNCR SCSI controllers with810/810A/815/825/825A/860/875/876/895chipsetsncr53c8x

Strany 196

Appendix A. General Parameters and Modules 275Configuration ExampleFuture Domain TMC-800 at CA000, IRQ 10 controller_type=2 base_address=0xca000irq=10T

Strany 197 - 14.5.41. CustomLog

276 Appendix A. General Parameters and ModulesHardware Module ParametersCrystalSemiconductorCS89[02]0cs89x0.oEtherWORKS DE425TP/COAX EISA, DE434TP PCI

Strany 198 - 14.5.44. ScriptAlias

Appendix A. General Parameters and Modules 277Hardware Module ParametersIntel EtherExpress 16(i82586)eexpress.o eexpress=io_port,IRQ OR eexpressio=io_

Strany 199 - 14.5.48. AddIconByType

278 Appendix A. General Parameters and ModulesHardware Module ParametersMiCom-Interlan NI5010 ni5010.oNI5210 card (i82586Ethernet chip)ni52.o ni52=io_

Strany 200

Appendix A. General Parameters and Modules 279Hardware Module ParametersWD8003 andWD8013-compatibleEthernet cardswd.o wd=io_port,IRQ,mem, mem_end OR w

Strany 201 - 14.5.60. Action

28 Chapter 2. The proc File SystemThe first column signifies whether the file system is mounted on a block device. Those beginning withnodev are not moun

Strany 202 - 14.5.65. Location

280 Appendix A. General Parameters and Modules

Strany 203 - 14.5.69. NameVirtualHost

IndexSymbols.fetchmailrc, 217global options, 218server options, 218user options, 218.procmailrc, 220/dev directory, 18/etc directory, 18/etc/exports,

Strany 204 - 14.5.71. SetEnvIf

282BBasic Input/Output System(See BIOS)Berkeley Internet Name Domain(See BIND)BINDadditional resources, 244installed documentation, 244related books,

Strany 205 - 14.6. Default Modules

283DefaultIcon, 200DefaultType, 196Deny, 195Directory, 193DirectoryIndex, 195DocumentRoot, 193ErrorDocument, 202ErrorLog, 197ExtendedStatus, 192for ca

Strany 206 - 14.8. Using Virtual Hosts

284changing, 206changing shared, 207DoS(See Denial of Service)DoS attack(See Denial odf Service attack)drag and drop, xiiidrivers(See kernel modules)D

Strany 207 - NameVirtualHost *

285useful websites, 87boot process, 77changing runlevels with, 81, 86commands, 81configuration file/boot/grub/grub.conf, 83structure, 83definition of, 77

Strany 208 - 14.9. Additional Resources

286KKDE, 102(See Also XFree86)KeepAliveApache configuration directive, 190KeepAliveTimeoutApache configuration directive, 190Kerberosadditional resource

Strany 209 - Chapter 15

287(See Also LILO)ListenApache configuration directive, 191LoadModuleApache configuration directive, 192LocationApache configuration directive, 202LockFi

Strany 210 - 15.1.3. SMTP

288(See kernel modules)non-secure Web serverdisabling, 207ntsysv, 62(See Also services)Oobjects, dynamically shared(See DSOs)OpenLDAP(See LDAP)OpenSSH

Strany 211 - 15.2.2. Mail Transfer Agent

289/proc/uptime, 37/proc/version, 37additional resources, 53installed documentation, 53useful websites, 53changing files within, 24, 45, 52files within,

Strany 212 - 15.3. Sendmail

Chapter 2. The proc File System 292.2.10. /proc/iomemThis file shows you the current map of the system’s memory for each physical device:00000000-0009f

Strany 213

290(See Also LDAP)slappasswd command, 258(See Also LDAP)slave nameserver(See BIND)slurpd command, 258(See Also LDAP)SSH protocol, 129authentication, 1

Strany 214 - /etc/mail/sendmail.cf

291additional resources, 156installed documentation, 156useful websites, 156applications, 155tripwire, 155tripwire-check, 150twadmin, 153, 154, 155twi

Strany 215

XX(See XFree86)X Window System(See XFree86)X.500(See LDAP)X.500 Lite(See LDAP)XFree86additional resources, 107installed documentation, 107related book

Strany 216 - 15.4. Fetchmail

ColophonThe Official Red Hat Linux manuals are written in DocBook SGML v4.1 format. The HTML andPDF formats are produced using custom DSSSL stylesheets

Strany 218

Table of ContentsIntroduction...

Strany 219

30 Chapter 2. The proc File System2.2.12. /proc/isapnpThis file lists Plug and Play (PnP) cards in ISA slots on the system. This is most often seen wit

Strany 220 - 15.5. Procmail

Chapter 2. The proc File System 312.2.14. /proc/kmsgThis file is used to hold messages generated by the kernel. These messages are then picked up by ot

Strany 221 - 15.5.2. Procmail Recipes

32 Chapter 2. The proc File System2.2.18. /proc/mdstatThis file contains the current information for multiple-disk, RAID configurations. If your system

Strany 222

Chapter 2. The proc File System 33• MemFree — The amount of physical RAM, in kilobytes, left unused by the system.• MemShared — Unused with 2.4 and hi

Strany 223

34 Chapter 2. The proc File System(0). The final column states if the module can unload itself automatically after a period without use(autoclean) or i

Strany 224 - /dev/null

Chapter 2. The proc File System 352.2.25. /proc/pciThis file contains a full listing of every PCI device on your system. Depending on the number of PCI

Strany 225 - 15.6. Security

36 Chapter 2. The proc File System2.2.26. /proc/slabinfoThis file gives information about memory usage on the slab level. Linux kernels greater than 2.

Strany 226 - 15.7. Additional Resources

Chapter 2. The proc File System 372.2.28. /proc/swapsThis file measures swap space and its utilization. For a system with only one swap partition, the

Strany 227 - 15.7.3. Related Books

38 Chapter 2. The proc File SystemThese directories are called process directories, as they are named after a program’s process ID andcontain informat

Strany 228

Chapter 2. The proc File System 394. Number of pages are code5. Number of pages of data/stack6. Number of pages of library7. Number of dirty pages• st

Strany 229 - Chapter 16

6.4. Runlevels... 1036.5. Fonts...

Strany 230 - 16.2. BIND Configuration Files

40 Chapter 2. The proc File SystemSo, for example, a system with a USB bus but no USB devices connected to it has a /proc/bus/usb/directory containing

Strany 231 - 16.2.1. /etc/named.conf

Chapter 2. The proc File System 412.3.5. /proc/ide/This directory holds information about IDE devices on the system. Each IDE channel is representedas

Strany 232 - • include "

42 Chapter 2. The proc File System• model — The model name or number of the device.• settings — A collection of current parameters of the device. This

Strany 233 - • view "

Chapter 2. The proc File System 43• dev_mcast — Displays the various Layer2 multicast groups each device is listening to.• igmp — Lists the IP multica

Strany 234 - • zone "

44 Chapter 2. The proc File Systemmegaraid directories are present, as those two drivers are being utilized. The files in each of thedirectories typica

Strany 235 - 16.2.2. Zone Files

Chapter 2. The proc File System 45controller is communicating with the CD-ROM at 20 megabytes per second, while the tape drive isonly connected at 10

Strany 236

46 Chapter 2. The proc File SystemNoteAny configuration changes you make using the echo command will disappear when the system isrestarted. To make you

Strany 237

Chapter 2. The proc File System 47• dentry-state — Provides the status of the directory cache. The file looks similar to this:57411 52939 45 0 0 0The fi

Strany 238

48 Chapter 2. The proc File Systemprocesses are stored in non-swappable kernel memory. Any increase in msgmax would increaseRAM requirements for the s

Strany 239

Chapter 2. The proc File System 49• threads-max — Sets the maximum number of threads to be used by the kernel, with a defaultvalue of 2048.• version —

Strany 240 - 16.3. Using rndc

III. Network Services Reference ... 15712. Network Sc

Strany 241

50 Chapter 2. The proc File System• icmp_echo_ignore_all and icmp_echo_ignore_broadcasts — Allows the kernel to ignoreICMP ECHO packets from every hos

Strany 242

Chapter 2. The proc File System 51• kswapd — Sets various values concerned with the kernel swap-out daemon, kswapd. This file hasthree values:512 32 8T

Strany 243 - 16.4.4. IP version 6

52 Chapter 2. The proc File Systempty_master /dev/ptm 128 0-255 pty:masterpty_slave /dev/ttyp 3 0-255 pty:slavepty_master /dev/pty 2 0-255 pty:master/

Strany 244 - 16.6. Additional Resources

Chapter 2. The proc File System 532.5. Additional ResourcesBelow are additional sources of information about /proc/.2.5.1. Installed DocumentationMost

Strany 245 - 16.6.3. Related Books

54 Chapter 2. The proc File System

Strany 246

Chapter 3.Boot Process, Init, and ShutdownAn important and powerful aspect of Red Hat Linux is the open method it uses for starting and stop-ping the

Strany 247 - Network File System (NFS)

56 Chapter 3. Boot Process, Init, and ShutdownOnce loaded, the BIOS tests the system, looks for and checks peripherals and then locates a validdevice

Strany 248 - 17.1.1. NFS and portmap

Chapter 3. Boot Process, Init, and Shutdown 57If you need to alter the command line arguments to the kernel, see Chapter 4. For information onchanging

Strany 249

58 Chapter 3. Boot Process, Init, and ShutdownNext, the init command sets the source function library, /etc/rc.d/init.d/functions, for thesystem. This

Strany 250 - 17.2.1. /etc/exports

Chapter 3. Boot Process, Init, and Shutdown 59S40atd -> ../init.d/atdS45pcmcia -> ../init.d/pcmciaS55sshd -> ../init.d/sshdS56rawdevices ->

Strany 251 - 17.3.1. /etc/fstab

IV. Appendixes ... 267A.

Strany 252 - 17.3.2. autofs

60 Chapter 3. Boot Process, Init, and ShutdownAfter the init command has progressed through the appropriate rc directory for the runlevel, the/etc/ini

Strany 253 - 17.4. Securing NFS

Chapter 3. Boot Process, Init, and Shutdown 61The init.d directory contains the scripts used by the init command when controlling services.Each of the

Strany 254 - 17.5. Additional Resources

62 Chapter 3. Boot Process, Init, and Shutdownthem to quickly move in and out of their custom configuration without disturbing the normal set offeature

Strany 255 - 17.5.2. Related Books

Chapter 3. Boot Process, Init, and Shutdown 633.7.1. Files in the /etc/sysconfig/ DirectoryThe following files are normally found in the /etc/sysconfig

Strany 256

64 Chapter 3. Boot Process, Init, and Shutdown• vncservers• xinetdIt is possible that your system may be missing a few of them if the corresponding pr

Strany 257 - Chapter 18

Chapter 3. Boot Process, Init, and Shutdown 653.7.1.5. /etc/sysconfig/clockThe /etc/sysconfig/clock file controls the interpretation of values read fro

Strany 258

66 Chapter 3. Boot Process, Init, and Shutdown3.7.1.9. /etc/sysconfig/gpmThe /etc/sysconfig/gpm file is used to pass arguments to the gpm daemon at boo

Strany 259 - 18.2.1. NSS, PAM, and LDAP

Chapter 3. Boot Process, Init, and Shutdown 673.7.1.14. /etc/sysconfig/initThe /etc/sysconfig/init file controls how the system will appear and functio

Strany 260 - 18.3. LDAP Terminology

68 Chapter 3. Boot Process, Init, and Shutdown3.7.1.16. /etc/sysconfig/iptablesLike /etc/sysconfig/ipchains, the /etc/sysconfig/iptables file stores in

Strany 261 - 18.4.1. slapd.conf

Chapter 3. Boot Process, Init, and Shutdown 69For example: KEYTABLE="us". The files that can be used as keytables start in/usr/lib/kbd/keymap

Strany 262 - 18.5. OpenLDAP Setup Overview

IntroductionWelcome to the Official Red Hat Linux Reference Guide.The Official Red Hat Linux Reference Guide contains useful information about your Red

Strany 263 - /sbin/service/ldap start

70 Chapter 3. Boot Process, Init, and Shutdown3.7.1.21. /etc/sysconfig/namedThe /etc/sysconfig/named file is used to pass arguments to the named daemon

Strany 264

Chapter 3. Boot Process, Init, and Shutdown 713.7.1.24. /etc/sysconfig/ntpdThe /etc/sysconfig/ntpd file is used to pass arguments to the ntpd daemon at

Strany 265 - 18.8. Additional Resources

72 Chapter 3. Boot Process, Init, and Shutdown3.7.1.28. /etc/sysconfig/redhat-config-usersThe /etc/sysconfig/redhat-config-users file is the configurati

Strany 266 - 18.8.3. Related Books

Chapter 3. Boot Process, Init, and Shutdown 733.7.1.33. /etc/sysconfig/squidThe /etc/sysconfig/squid file is used to pass arguments to the squid daemon

Strany 267 - Appendixes

74 Chapter 3. Boot Process, Init, and ShutdownIt may contain the following:• VNCSERVERS= value , where value is set to something like "1:fred&quo

Strany 268

Chapter 3. Boot Process, Init, and Shutdown 753.8. Shutting DownTo shut down Red Hat Linux, issue the shutdown command. You can read the shutdown man

Strany 269 - Appendix A

76 Chapter 3. Boot Process, Init, and Shutdown

Strany 270 - A.2. CD-ROM Module Parameters

Chapter 4.Boot LoadersBefore Red Hat Linux can run on a system, it must be started by special program called a boot loader.The boot loader program usu

Strany 271

78 Chapter 4. Boot LoadersThe boot process used by other operating systems may differ. For example, Microsoft’s DOS andWindows operating systems, as w

Strany 272 - A.3. SCSI parameters

Chapter 4. Boot Loaders 79The following command installs GRUB to the MBR of the master IDE device on the primary IDEbus, alos known as the C drive:/sb

Strany 273

viii IntroductionNoteAlthough this manual reflects the most current information possible, you should read the Red HatLinux Release Notes for informatio

Strany 274

80 Chapter 4. Boot Loaders4.4.2. File NamesWhen typing commands to GRUB involving a file, such as a menu list to use when allowing thebooting of multip

Strany 275 - A.4. Ethernet Parameters

Chapter 4. Boot Loaders 814.5.1. Menu InterfaceIf GRUB was automatically configured by the Red Hat Linux installation program, this is the inter-face s

Strany 276

82 Chapter 4. Boot LoadersThe following is a list useful commands:• boot — Boots the operating system or chain loader that has been previously specifie

Strany 277

Chapter 4. Boot Loaders 834.7.1. Special Configuration File CommandsThe following commands can only be used in the GRUB menu configuration file:• colorno

Strany 278

84 Chapter 4. Boot LoadersThis file would tell GRUB to build a menu with Red Hat Linux as the default operating system, setto autoboot it after 10 seco

Strany 279

Chapter 4. Boot Loaders 854.8.2. LILO vs. GRUBIn general, LILO works similarly to GRUB except for three major differences:• It has no interactive comm

Strany 280

86 Chapter 4. Boot Loaderslabel=linuxinitrd=/boot/initrd-2.4.0-0.43.6.imgread-onlyroot=/dev/hda5other=/dev/hda1label=dosThis example shows a system co

Strany 281

Chapter 4. Boot Loaders 87In this command, replace number with either the number of the runlevel you wish to boot into (1through 5), or the word singl

Strany 282

88 Chapter 4. Boot Loaders

Strany 283

Chapter 5.Users and GroupsControl of users and groups is a core element of Red Hat Linux system administration.Users can be either people, meaning acc

Strany 284

Introduction ix• An explanation of how Linux works — While delving into the most arcane aspects of the Linuxkernel is not necessary, it is a good idea

Strany 285

90 Chapter 5. Users and GroupsUser UID GID Home Directory Shellmail 8 12 /var/spool/mail /sbin/nologinnews 9 13 /var/spool/newsuucp 10 14 /var/spool/u

Strany 286

Chapter 5. Users and Groups 91User UID GID Home Directory Shellpostfix 89 89 /var/spool/postfix /bin/trueprivoxy 100 101 /etc/privoxypvm 24 24 /usr/sha

Strany 287

92 Chapter 5. Users and GroupsGroup GID Membersrpm 37 rpmutmp 22wnn 49ntp 38nscd 28apache 48mysql 27mailnull 47smmsp 51rpc 32xfs 43gdm 42rpcuser 29nfs

Strany 288

Chapter 5. Users and Groups 93User Private GroupEvery user has a primary group; the user is the only member of that group.umask = 002Traditionally, on

Strany 289

94 Chapter 5. Users and Groupschown -R root.emacs /usr/lib/emacs/site-lispNow, it is possible to add the proper users to the group with gpasswd:/usr/b

Strany 290

Chapter 5. Users and Groups 95• The utilities will work properly whether shadowing is enabled or not.• The utilities have been slightly modified to sup

Strany 291

96 Chapter 5. Users and Groups

Strany 292

Chapter 6.The X Window SystemWhile the heart of Red Hat Linux is the kernel, for many users, the face of the operating system is thegraphical environm

Strany 293 - Colophon

98 Chapter 6. The X Window System6.2. XFree86Red Hat Linux 8.0 uses XFree86 version 4.2 as the base X Window System, which includes thevarious necessa

Strany 294

Chapter 6. The X Window System 99DeviceSpecifies information about the video card used by the system. You must have at least one De-vice section in you

Komentáře k této Příručce

Žádné komentáře