Red Hat Linux Networking and System Administration by Terry Collings, Kurt Wall

By Terry Collings, Kurt Wall

This publication is the publication you must run your small business with purple Hat. It presents complete assurance on the right way to deal with and community the purple Hat Linux OS and step by step directions had to preserve and/or upload to the purple Hat Linux system.This booklet gains a whole half on protection and challenge fixing that covers detecting intrusions/hacking, imposing neighborhood protection, firewalls, and web protection. different subject matters comprise: RAID; TCP/IP networking; connecting to Microsoft networks; connecting to Apple networks; the purple Hat community; upgrading and customizing the kernel; utilizing scripts; backing up and restoring the dossier procedure.

Show description

Read Online or Download Red Hat Linux Networking and System Administration PDF

Similar system administration books

Java Performance and Scalability: Server-Side Programming Techniques

This booklet was once written with one aim in brain: to supply Java programmers with the services had to construct effective, scalable Java code. the writer stocks his event in server-side functionality tuning via measured functionality tests, referred to as optimizations. every one optimization discusses ideas to enhance the functionality and scalability of your code.

Deploying Microsoft Forefront Protection 2010 for Exchange Server (It Professional Series)

Get centred, real-world information for making plans and enforcing leading edge security for alternate Server--and support defend company email from viruses, junk mail, phishing, and coverage violations. Guided via key individuals of the Microsoft vanguard crew, you are going to delve into procedure parts, beneficial properties, and services, and step via crucial making plans and layout concerns.

Extra resources for Red Hat Linux Networking and System Administration

Example text

779 Solving Boot Problems . . . . . . . . . . . . . . 780 Solving Miscellaneous Problems . . . . . . . . . . 783 Getting sound to work . . . . . . . . . . . . . . 783 Using screensavers and power management . . . . . . . 784 Starting the X Window System . . . . . . . . . . . 785 Summary . . . . . . . . . . . . . . . . . . . 785 Appendix: What’s on the CD-ROM? . . . . . 787 Index . . . .

774 Working with floppy disks . . . . . . . . . . . . . 774 Cannot mount a partition . . . . . . . . . . . . . 774 Avoiding file system checks at each system reboot . . . . . 775 Getting a Zip drive to work . . . . . . . . . . . . . 775 Solving Networking Problems . . . . . . . . . . . 776 Getting online with a modem . . . . . . . . . . . . 777 What to do when the boot process hangs . . . . . . . . 779 Using two Ethernet cards .

A very big company has made huge amounts of money by putting user convenience over security, and many companies have paid a high price for adopting it. Your Red Hat Linux system costs a very small amount of user inconvenience in exchange for greatly enhanced system security. It’s useful to be able to prove that the threat is real. A security log is also the place to keep copies of any security-related e-mail messages from within the company, from log listings of employees who have decided to “go exploring” (which is sometimes but not always a sign of bad intent) to exchanges with management over the implementation of new security features.

Download PDF sample

Rated 4.47 of 5 – based on 49 votes