Linux administration : a beginners guide
Essential Linux Management Skills Made Easy Effectively deploy and maintain Linux and other Free and Open Source Software (FOSS) on your servers or entire network using this practical resource. Linux Administration: A Beginner's Guide, Sixth Edition provides up-to-date details on the latest Lin...
Otros Autores: | , |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
[Place of publication not identified]
McGraw Hill Osborne Media
2012
|
Edición: | 6th edition |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009629403306719 |
Tabla de Contenidos:
- Cover
- Linux Administration A Beginner's Guide
- About the Author
- About the Technical Editor
- At a Glance
- Contents
- Acknowledgments
- Introduction
- Who Should Read This Book
- What's in This Book?
- Part I: Introduction, Installation, and Software Management
- Part II: Single-Host Administration
- Part III: Networking and Security
- Part IV: Internet Services
- Part V: Intranet Services
- Part VI: Appendixes
- Updates and Feedback
- Part I: Introduction, Installation, and Software Management
- Chapter 1: Technical Summary of Linux Distributions
- Linux: The Operating System
- What Is Open Source Software and GNU All About?
- What Is the GNU Public License?
- Upstream and Downstream
- The Advantages of Open Source Software
- Understanding the Differences Between Windows and Linux
- Single Users vs. Multiple Users vs. Network Users
- The Monolithic Kernel and the Micro-Kernel
- Separation of the GUI and the Kernel
- The Network Neighborhood
- The Registry vs. Text Files
- Domains and Active Directory
- Summary
- Chapter 2: Installing Linux in a Server Configuration
- Hardware and Environmental Considerations
- Server Design
- Uptime
- Methods of Installation
- Installing Fedora
- Project Prerequisites
- The Installation
- Initialize the Disk
- Configure the Network
- Time Zone Configuration
- Set the Root Password
- Storage Configuration
- Configure the Boot Loader
- Select the Package Group
- Initial System Configuration
- Create a User
- Date and Time Configuration
- Hardware Profile
- Log In
- Installing Ubuntu Server
- Start the Installation
- Configure the Network
- Set up Users, Passwords
- Configure the Time Zone
- Set up the Disk Partition
- Other Miscellaneous Tasks
- Summary
- Chapter 3: Managing Software
- The Red Hat Package Manager
- Managing Software Using RPM.
- Querying for Information the RPM Way (Getting to Know One Another)
- Installing Software with RPM (Moving in Together)
- Uninstalling Software with RPM (Ending the Relationship)
- Other Things RPM Can Do
- GUI RPM Package Managers
- Fedora
- openSUSE and SLE
- The Debian Package Management System
- APT
- Software Management in Ubuntu
- Querying for Information
- Installing Software in Ubuntu
- Removing Software in Ubuntu
- GUI Package Managers for Debian-Based Systems (Ubuntu)
- Compile and Install GNU Software
- Getting and Unpacking the Package
- Looking for Documentation
- Configuring the Package
- Compiling the Package
- Installing the Package
- Testing the Software
- Cleanup
- Common Problems When Building from Source Code
- Problems with Libraries
- Missing Configure Script
- Broken Source Code
- Summary
- Part II: Single-Host Administration
- Chapter 4: Managing Users and Groups
- What Exactly Constitutes a User?
- Where User Information Is Kept
- The /etc/passwd File
- Username Field
- Password Field
- User ID Field (UID)
- Group ID Field (GID)
- GECOS
- Directory
- Shell
- The /etc/shadow File
- The /etc/group File
- User Management Tools
- Command-Line User Management
- useradd
- usermod
- userdel
- groupadd
- groupdel
- groupmod
- GUI User Managers
- Users and Access Permissions
- Understanding SetUID and SetGID Programs
- Pluggable Authentication Modules
- How PAM Works
- PAM's Files and Their Locations
- Configuring PAM
- An Example PAM Configuration File
- The "Other" File
- D'oh! I Can't Log In!
- Debugging PAM
- A Grand Tour
- Creating Users with useradd
- Creating Groups with groupadd
- Modifying User Attributes with usermod
- Modifying Group Attributes with groupmod
- Deleting Users and Groups with userdel and groupdel
- Summary
- Chapter 5: The Command Line.
- An Introduction to BASH
- Job Control
- Environment Variables
- Printing Environment Variables
- Setting Environment Variables
- Unsetting Environment Variables
- Pipes
- Redirection
- Command-Line Shortcuts
- Filename Expansion
- Environment Variables as Parameters
- Multiple Commands
- Backticks
- Documentation Tools
- The man Command
- The texinfo System
- Files, File Types, File Ownership, and File Permissions
- Normal Files
- Directories
- Hard Links
- Symbolic Links
- Block Devices
- Character Devices
- Named Pipes
- Listing Files: ls
- Change Ownership: chown
- Change Group: chgrp
- Change Mode: chmod
- File Management and Manipulation
- Copy Files: cp
- Move Files: mv
- Link Files: ln
- Find a File: find
- File Compression: gzip
- bzip2
- Create a Directory: mkdir
- Remove a Directory: rmdir
- Show Present Working Directory: pwd
- Tape Archive: tar
- Concatenate Files: cat
- Display a File One Screen at a Time: more
- Disk Utilization: du
- Show the Directory Location of a File: which
- Locate a Command: whereis
- Disk Free: df
- Synchronize Disks: sync
- Moving a User and Its Home Directory
- List Processes: ps
- Show an Interactive List of Processes: top
- Send a Signal to a Process: kill
- Signals
- Security Issues
- Examples Using the kill Command
- Miscellaneous Tools
- Show System Name: uname
- Who Is Logged In: who
- A Variation on who: w
- Switch User: su
- Editors
- vi
- emacs
- joe
- pico
- Summary
- Chapter 6: Booting and Shutting Down
- Boot Loaders
- GRUB Legacy
- Stage 1
- Stage 2
- Conventions Used in GRUB
- Installing GRUB
- Backing Up the MBR
- Installing GRUB Legacy from the GRUB Shell
- USB GRUB Legacy Boot Disk
- Installing GRUB Legacy on the MBR Using a USB GRUB Legacy Disk
- Configuring GRUB Legacy
- Adding a New Kernel to Boot with GRUB Legacy.
- GRUB 2
- LILO
- Bootstrapping
- Kernel Loading
- Kernel Execution
- The init Process
- rc Scripts
- Writing Your Own rc Script
- Creating the carpald.sh Script
- Creating the Startup Script
- Enabling and Disabling Services
- Disabling a Service
- Odds and Ends of Booting and Shutting Down
- fsck!
- Booting into Single-User ("Recovery") Mode
- Summary
- Chapter 7: File Systems
- The Makeup of File Systems
- i-Nodes
- Block
- Superblocks
- ext3
- ext4
- Extents
- Online Defragmentation
- Larger File System and File Size
- Btrfs
- Which File System Should You Use?
- Managing File Systems
- Mounting and Unmounting Local Disks
- Using the mount Command
- Unmounting File Systems
- When the File System Is in Use
- The /etc/fstab File
- Using fsck
- What If I Still Get Errors?
- The lost+found Directory
- Adding a New Disk
- Overview of Partitions
- Traditional Disk and Partition Naming Conventions
- Volume Management
- Creating Partitions and Logical Volumes
- Creating a Partition
- Creating a Physical Volume
- Assigning a Physical Volume to a Volume Group
- Creating a Logical Volume (LV)
- Creating File Systems
- Summary
- Chapter 8: Core System Services
- The init Daemon
- upstart: Die init. Die Now!
- The /etc/inittab File
- The telinit Command
- systemd
- systemd's Role
- The systemd Edge
- How systemd Works
- xinetd and inetd
- The /etc/xinetd.conf File
- Variables and Their Meanings
- Examples: A Simple Service Entry and Enabling/Disabling a Service
- Enabling/Disabling the Echo Service
- The Logging Daemon
- Invoking rsyslogd
- Configuring the Logging Daemon
- Log Message Classifications
- Format of /etc/rsyslog.conf
- rsyslogd Templates
- rsyslogd Rules
- Sample /etc/rsyslog.conf File
- The cron Program
- The crontab File
- Editing the crontab File
- Summary.
- Chapter 9: The Linux Kernel
- What Exactly Is a Kernel?
- Finding the Kernel Source Code
- Getting the Correct Kernel Version
- Unpacking the Kernel Source Code
- Building the Kernel
- Preparing to Configure the Kernel
- Kernel Configuration
- Compiling the Kernel
- Installing the Kernel
- Booting the Kernel
- The Author Lied-It Didn't Work!
- Patching the Kernel
- Downloading and Applying Patches
- If the Patch Worked
- If the Patch Didn't Work
- Summary
- Chapter 10: Knobs and Dials: Virtual File Systems
- What's Inside the /proc Directory?
- Tweaking Files Inside of /proc
- Some Useful /proc Entries
- Enumerated /proc Entries
- Common proc Settings and Reports
- SYN Flood Protection
- Issues on High-Volume Servers
- Debugging Hardware Conflicts
- SysFS
- cgroupfs
- Summary
- Part III: Networking and Security
- Chapter 11: TCP/IP for System Administrators
- The Layers
- Packets
- TCP/IP Model and the OSI Model
- Layer 1 (The Wire)
- Layer 2 (Ethernet)
- Layer 3 (IP)
- Layer 4 (TCP, UDP)
- Layers 5-7 (HTTP, SSL, XML)
- Headers
- Ethernet
- Viewing Ethernet Headers
- IP (IPv4)
- tcpdump and IP
- TCP
- UDP
- A Complete TCP Connection
- Opening a Connection
- Transferring Data
- Closing the Connection
- How ARP Works
- The ARP Header: ARP Works with Other Protocols, Too!
- Bringing IP Networks Together
- Hosts and Networks
- Subnetting
- Netmasks
- Static Routing
- Routing Tables
- Limitations of Static Routing
- Dynamic Routing with RIP
- RIP's Algorithm (and Why You Should Use OSPF Instead)
- Digging into tcpdump
- A Few General Notes
- Wireshark (The Tool Formerly Known as Ethereal)
- Reading and Writing Dumpfiles
- Capturing More or Less per Packet
- Performance Impact
- Don't Capture Your Own Network Traffic
- Why Is DNS Slow?
- Graphing Odds and Ends.
- Graphing Initial Sequence Numbers.