Linux server hacks Volume 2 Volume 2 /

Today's system administrators deal with a vast number of situations, operating systems, software packages, and problems. Those who are in the know have kept their copy of Linux Server Hacks close at hand to ease their burden. And while this helps, it's not enough: any sys admin knows ther...

Descripción completa

Detalles Bibliográficos
Autor principal: Von Hagen, William (-)
Otros Autores: Jones, Brian K., 1938-
Formato: Libro electrónico
Idioma:Inglés
Publicado: Beijing ; Sabastopol, California : O'Reilly 2005.
Edición:First edition
Colección:Hacks series
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009627215406719
Tabla de Contenidos:
  • Linux Server Hacks, Volume Two; Contributors; Acknowledgments; Preface; How to Use This Book; How This Book Is Organized; Conventions Used in This Book; Using Code Examples; How to Contact Us; Safari® Enabled; Got a Hack?; 1. Linux Authentication; 1. Disable User Accounts Instantly; 1.2.2. Disabling Accounts on Systems That Use Distributed Authentication; 2. Edit Your Password File for Greater Access Control; 3. Deny All Access in One Second or Less; 4. Customize Authentication with PAMs; 1.5.2. Per-Application/Service PAM Configuration Files; 1.5.3. PAMs Used by the login Process
  • 1.5.4. Configuration and More Configuration1.5.5. What if PAM Configuration Files Are Missing?; 1.5.6. See Also; 5. Authenticate Linux Users with a Windows Domain Controller; 1.6.2. Critical Samba Configuration for Using Windows Authentication; 1.6.3. Updating /etc/nsswitch.conf; 1.6.4. Integrating the pam_winbind.so PAM into System Authentication; 1.6.5. Starting the winbindd Daemon; 1.6.6. Joining the Domain; 1.6.7. Testing Windows Authentication; 1.6.8. Debugging Windows Authentication Problems; 1.6.9. See Also; 6. Centralize Logins with LDAP; 1.7.2. Configuring an OpenLDAP Server
  • 1.7.3. Migrating User, Password, and Group Entries to an LDAP Server1.7.4. Updating Client Systems to Use LDAP Authentication; 1.7.5. See Also; 7. Secure Your System with Kerberos; 1.8.2. Installing and Configuring a Kerberos Server; 1.8.3. Installing and Configuring Kerberos Clients and Applications; 1.8.4. Using Kerberos for Login Authentication; 1.8.5. See Also; 8. Authenticate NFS-Lovers with NIS; 1.9.2. Setting Up an NIS Server; 1.9.3. Setting Up an NIS Client; 1.9.4. See Also; 9. Sync LDAP Data with NIS; 1.10.2. Running the Code; 1.10.3. See Also; 2. Remote GUI Connectivity
  • 10. Access Systems Remotely with VNC2.2.2. Starting Your VNC Server; 2.2.3. Connecting to a VNC Server; 2.2.4. Customizing Your VNC Server&s X Window System Environment; 2.2.5. Stopping Your VNC Server; 2.2.6. Optimizing VNC Performance; 2.2.7. See Also; 11. Access VNC Servers over the Web; 2.3.2. See Also; 12. Secure VNC via SSH; 2.4.2. Public or Private VNC Forwarding; 2.4.3. Forwarding Ports Without Remote Login; 2.4.4. Improving Performance with Compression; 2.4.5. Optimizing Graphical Updates Between Server and Viewer; 2.4.6. See Also; 13. Autostart VNC Servers on Demand
  • 2.5.2. Activating XDMCP2.5.3. Starting the Viewer; 2.5.4. Troubleshooting Xvnc Startup; 2.5.5. See Also; 14. Put Your Desktops on a Thin Client Diet; 2.6.2. Downloading and Installing the LTSP Software; 2.6.3. Configuring and Starting the LTSP Server; 2.6.4. Preparing LTSP Client Boot Media; 2.6.5. Booting an LTSP Client; 2.6.6. See Also; 15. Run Windows over the Network; 2.7.2. Mapping Local Devices to Your Remote Session; 2.7.3. See Also; 16. Secure, Lightweight X Connections with FreeNX; 2.8.2. Installing the NX Client; 2.8.3. Configuring and Starting Your NX Client; 2.8.4. See Also
  • 17. Secure VNC Connections with FreeNX