íà ãëàâíóþ | âîéòè | ðåãèñòðàöèÿ | DMCA | êîíòàêòû | ñïðàâêà | donate |      

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
À Á Â Ã Ä Å Æ Ç È É Ê Ë Ì Í Î Ï Ð Ñ Ò Ó Ô Õ Ö × Ø Ù Ý Þ ß


ìîÿ ïîëêà | æàíðû | ðåêîìåíäóåì | ðåéòèíã êíèã | ðåéòèíã àâòîðîâ | âïå÷àòëåíèÿ | íîâîå | ôîðóì | ñáîðíèêè | ÷èòàëêè | àâòîðàì | äîáàâèòü

Fedora Linux

Fedora Linux
Íàçâàíèå: Fedora Linux
Àâòîð:
Îöåíêà: 2.7 èç 5, ïðîãîëîñîâàëî ÷èòàòåëåé - 241
Æàíð: êîìïüþòåðíàÿ ëèòåðàòóðà
Îïèñàíèå:'Neither a 'Starting Linux' book nor a dry reference manual, this book has a lot to offer to those coming to Fedora from other operating systems or distros.' -- Behdad Esfahbod, Fedora developer

This book will get you up to speed quickly on Fedora Linux, a securely-designed Linux distribution that includes a massive selection of free software packages. Fedora is hardened out-of-the-box, it's easy to install, and extensively customizable - and this book shows you how to make Fedora work for you.

Fedora Linux: A Complete Guide to Red Hat's Community Distribution will take you deep into essential Fedora tasks and activities by presenting them in easy-to-learn modules. From installation and configuration through advanced topics such as administration, security, and virtualization, this book captures the important details of how Fedora Core works--without the fluff that bogs down other books and help/how-to web sites. Instead, you can learn from a concise task-based approach to using Fedora as both a desktop and server operating system.

In this book, you'll learn how to:

Ï· Install Fedora and perform basic administrative tasks

Ï· Configure the KDE and GNOME desktops

Ï· Get power management working on your notebook computer and hop on a wired or wireless network

Ï· Find, install, and update any of the thousands of packages available for Fedora

Ï· Perform backups, increase reliability with RAID, and manage your disks with logical volumes

Ï· Set up a server with file sharing, DNS, DHCP, email, a Web server, and more

Ï· Work with Fedora's security features including SELinux, PAM, and Access Control Lists (ACLs)

Whether you are running the stable version of Fedora Core or bleeding-edge Rawhide releases, this book has something for every level of user. The modular, lab-based approach not only shows you how things work - but also explains why--and provides you with the answers you need to get up and running with Fedora Linux.
Ñîäåðæàíèå:

ñêðûòü ñîäåðæàíèå

  1. Fedora Linux
  2. Preface
  3. How This Book Is Organized
  4. What You Need to Use This Book
  5. Conventions Used in This Book
  6. Using Code Examples
  7. Safari ® Enabled  
  8. How to Contact Us
  9. Acknowledgments
  10. Chapter 1. Quick Start: Installing Fedora
  11. 1.1. Choosing Fedora: Is It Right for You?
  12. 1.1.1. How Do I Do That?
  13. 1.1.1.1. What compatibility do you need?
  14. 1.1.1.2. What level of stability do you need?
  15. 1.1.1.3. What kind of support do you need?
  16. 1.1.1.4. Does your equipment meet Fedoras system requirements?
  17. 1.1.2. How Does It Work?
  18. 1.1.3. What About...
  19. 1.1.3.1. ...trying Fedora but also keeping Windows?
  20. 1.1.3.2. ...other Linux distributions?
  21. 1.1.3.3. ...seeing a list of the software packages included in Fedora Core?
  22. 1.1.4. Where Can I Learn More?
  23. 1.2. Obtaining Fedora Core Software
  24. 1.2.1. How Do I Do That?
  25. 1.2.1.1. Determining your architecture
  26. 1.2.1.2. Choosing boot and installation media
  27. 1.2.1.3. Creating Fedora Core CDs or DVDs
  28. 1.2.1.4. Buying Fedora Core CDs or DVDs
  29. 1.2.1.5. Preparing files for a hard disk installation
  30. 1.2.1.6. Preparing a USB flash disk, network installation server, or PXE boot server
  31. 1.2.2. How Does It Work?
  32. 1.2.3. What About...
  33. 1.2.3.1. ...installing from a floppy disk?
  34. 1.2.4. Where Can I Learn More?
  35. 1.3. Installing Fedora Core
  36. 1.3.1. How Do I Do That?
  37. 1.3.1.1. Preparing for dual-boot
  38. 1.3.1.2. Starting the installation
  39. 1.3.1.3. Testing the installation media
  40. 1.3.1.4. Selecting the installation method
  41. 1.3.1.5. Installation stage 2
  42. 1.3.1.6. Upgrading a Fedora installation
  43. 1.3.1.7. Performing a new Fedora installation
  44. 1.3.1.8. Partitioning layout
  45. 1.3.1.9. General questions
  46. 1.3.1.10. Software selection
  47. 1.3.1.11. First boot
  48. 1.3.2. How Does It Work?
  49. 1.3.3. What About...
  50. 1.3.3.1. ...rerunning the firstboot process to reset the system configuration?
  51. 1.3.3.2. ...getting help if I encounter problems during (or after) installation?
  52. 1.3.4. Where Can I Learn More?
  53. Chapter 2. Using Fedora on Your Desktop
  54. 2.1. Getting Started Using the Fedora Graphical User Interfaces
  55. 2.1.1. How Do I Do That?
  56. 2.1.1.1. KDE or GNOME?
  57. 2.1.1.2. Using the desktop
  58. 2.1.1.3. Managing windows
  59. 2.1.1.4. Fast pasting
  60. 2.1.1.5. Logging out
  61. 2.1.2. How Does It Work?
  62. 2.1.3. What About...
  63. 2.1.3.1. ...other desktops/GUIs?
  64. 2.1.4. Where Can I Learn More?
  65. 2.2. Customizing GNOME
  66. 2.2.1. How Do I Do That?
  67. 2.2.1.1. Customizing the desktop appearance using themes
  68. 2.2.1.2. Customizing the panels
  69. 2.2.1.3. Customizing the desktop background
  70. 2.2.1.4. Customizing the window managers behavior
  71. 2.2.1.5. Customizing Nautilus
  72. 2.2.1.6. Customizing keyboard shortcuts
  73. 2.2.2. How Does It Work?
  74. 2.2.3. What About...
  75. 2.2.3.1. ...making a theme available to all users?
  76. 2.2.4. Where Can I Learn More?
  77. 2.3. Customizing KDE
  78. 2.3.1. How Do I Do That?
  79. 2.3.1.1. Customizing the desktop appearance using themes
  80. 2.3.1.2. Customizing the panels
  81. 2.3.1.3. Customizing the desktop background
  82. 2.3.1.4. Customizing the window managers behavior
  83. 2.3.1.5. Customizing Konqueror
  84. 2.3.1.6. Customizing keyboard shortcuts
  85. 2.3.2. How Does It Work?
  86. 2.3.3. What About...
  87. 2.3.3.1. ...setting the defaults for new users?
  88. 2.3.4. Where Can I Learn More?
  89. 2.4. Fine-Tuning Your Display Configuration
  90. 2.4.1. How Do I Do That?
  91. 2.4.2. How Does It Work?
  92. 2.4.3. What About...
  93. 2.4.3.1. ...per-user display resolution settings?
  94. 2.4.3.2. ...creating the xorg.conf file without using system-config-display?
  95. 2.4.3.3. ...using multiple mice and keyboards with one display?
  96. 2.4.3.4. ...a nonstandard monitor, such as a widescreen laptop display?
  97. 2.4.4. Where Can I Learn More?
  98. 2.5. Configuring Printing
  99. 2.5.1. How Do I Do That?
  100. 2.5.1.1. Add a new print queue
  101. 2.5.1.2. Edit an existing print queue
  102. 2.5.1.3. Set the default print queue
  103. 2.5.1.4. Printing
  104. 2.5.2. How Does It Work?
  105. 2.5.3. What About...
  106. 2.5.3.1. ...creating a group of similar printers that are accessed on a first-available-printer basis?
  107. 2.5.3.2. ...setting up more than one queue for a printer?
  108. 2.5.3.3. ...making a PDF instead of printing?
  109. 2.5.3.4. ...using an HP multifunction printer?
  110. 2.5.4. Where Can I Learn More?
  111. 2.6. Configuring Sound
  112. 2.6.1. How Do I Do That?
  113. 2.6.2. How Does It Work?
  114. 2.6.3. What About...
  115. 2.6.3.1. ...allowing multiple users to use a sound device at the same time?
  116. 2.6.3.2. ...controlling the volume levels from the command line or a script?
  117. 2.6.3.3. ...playing or recording an audio file from the command line?
  118. 2.6.4. Where Can I Learn More?
  119. 2.7. Adding and Configuring Fonts
  120. 2.7.1. How Do I Do That?
  121. 2.7.1.1. Adding and removing fonts using GNOME Nautilus
  122. 2.7.1.2. Adding and removing fonts using KDE Konqueror
  123. 2.7.1.3. Adding and removing fonts from the command line
  124. 2.7.1.4. Installing the Microsoft fonts
  125. 2.7.1.5. Using newly installed fonts
  126. 2.7.1.6. Configuring font rendering options
  127. 2.7.2. How Does It Work?
  128. 2.7.3. What About...
  129. 2.7.3.1. ...getting a list of available fonts?
  130. 2.7.3.2. ...specifying a font name?
  131. 2.7.4. Where Can I Learn More?
  132. 2.8. Using USB Storage
  133. 2.8.1. How Do I Do That?
  134. 2.8.1.1. Safely removing a USB drive
  135. 2.8.1.2. Configuring default actions in GNOME
  136. 2.8.1.3. Configuring default actions in KDE
  137. 2.8.2. How Does It Work?
  138. 2.8.3. What About...
  139. 2.8.3.1. ...partitioning a flash drive?
  140. 2.8.3.2. ...using a Linux filesystem such as ext2 on a USB storage device?
  141. 2.8.3.3. ...accessing USB storage from a nongraphical application?
  142. 2.8.3.4. ...manually mounting a USB storage device?
  143. 2.8.4. Where Can I Learn More?
  144. Chapter 3. Using Fedora on Your Notebook
  145. 3.1. Power Management
  146. 3.1.1. How Do I Do That?
  147. 3.1.1.1. Using gnome-power-manager to conserve power
  148. 3.1.1.2. Viewing power information
  149. 3.1.1.3. Changing the CPU speed
  150. 3.1.1.4. Managing power from the command line
  151. 3.1.1.5. Other ways to extend battery life
  152. 3.1.2. How Does It Work?
  153. 3.1.3. What About...
  154. 3.1.3.1. ...stopping the hard drive motors when the drives are not in use?
  155. 3.1.3.2. ...turning the computer on and off (or hibernating and resuming) at certain times automatically?
  156. 3.1.4. Where Can I Learn More?
  157. 3.2. Configuring Networking
  158. 3.2.1. How Do I Do That?
  159. 3.2.1.1. Configuring networking graphically
  160. 3.2.1.1.1. Changing a device configuration
  161. 3.2.1.1.2. Configuring DNS and the Hosts table
  162. 3.2.1.1.3. Saving and using the network configuration
  163. 3.2.1.1.4. Using network profiles
  164. 3.2.1.1.5. Configuring other network connection types
  165. 3.2.1.2. Using GNOME NetworkManager
  166. 3.2.1.3. Configuring networking from the command line
  167. 3.2.1.3.1. Configuring wireless networks from the command line
  168. 3.2.1.3.2. Netmasks and routing
  169. 3.2.1.3.3. DNS and hostnames
  170. 3.2.1.3.4. Configuring networking from the command line using DHCP
  171. 3.2.1.4. Using wireless adapters that require firmware
  172. 3.2.1.5. Using private networks
  173. 3.2.2. How Does It Work?
  174. 3.2.3. What About...
  175. 3.2.3.1. ...using a Fedora system as a router?
  176. 3.2.3.2. ...renaming a network interface, or configuring a "wlan" interface using the GUI configuration tool?
  177. 3.2.4. Where Can I Learn More?
  178. 3.3. Configuring a Touchpad
  179. 3.3.1. How Do I Do That?
  180. 3.3.2. How Does It Work?
  181. 3.3.3. What About...
  182. 3.3.3.1. ...using a touchpad and a mouse at the same time?
  183. 3.3.3.2. ...disabling the touchpad automatically when Im typing?
  184. 3.3.4. Where Can I Learn More?
  185. 3.4. Using Dual Video Output
  186. 3.4.1. How Do I Do That?
  187. 3.4.1.1. Configuring dual video on an NVIDIA card
  188. 3.4.1.2. Configuring dual video on an ATI graphics card using the open source driver
  189. 3.4.1.3. Configuring dual video on an ATI video card using the ATI closed source driver
  190. 3.4.2. How Does It Work?
  191. 3.4.3. What About...
  192. 3.4.3.1. ...using dual video output with another video driver?
  193. 3.4.4. Where Can I Learn More?
  194. Chapter 4. Basic System Management
  195. 4.1. Using the Command Line
  196. 4.1.1. How Do I Do That?
  197. 4.1.1.1. Understanding the shell prompt
  198. 4.1.1.2. Entering commands
  199. 4.1.1.3. Accessing previous commands
  200. 4.1.1.4. Obtaining a root prompt to enter commands as the superuser
  201. 4.1.1.5. Linux error messages
  202. 4.1.1.6. Logging out of a shell prompt
  203. 4.1.2. How Does It Work?
  204. 4.1.3. What About...
  205. 4.1.3.1. ...accessing a character-mode display when the graphical user interface is running?
  206. 4.1.3.2. ...finding out where a program is located?
  207. 4.1.3.3. ...starting graphical programs?
  208. 4.1.3.4. ...quickly entering a single command?
  209. 4.1.3.5. ...the difference between commands, utilities, applications, and programs?
  210. 4.1.3.6. ...using a different shell?
  211. 4.1.4. Where Can I Learn More?
  212. 4.2. Accessing Online Documentation
  213. 4.2.1. How Do I Do That?
  214. 4.2.1.1. Using manpages
  215. 4.2.1.2. Finding a manpage
  216. 4.2.1.3. Reading info documents
  217. 4.2.1.4. Viewing GNOME guides and KDE manuals
  218. 4.2.1.5. Accessing HOWTOs and guides
  219. 4.2.1.6. Viewing text files distributed with applications
  220. 4.2.2. What About...
  221. 4.2.2.1. ...printing a manpage?
  222. 4.2.2.2. ...making a PDF or HTML version of a manpage?
  223. 4.2.3. Where Can I Learn More?
  224. 4.3. Managing Files
  225. 4.3.1. How Do I Do That?
  226. 4.3.1.1. Understanding Linux directory names
  227. 4.3.1.2. Key directories
  228. 4.3.1.3. Ambiguous filenames
  229. 4.3.1.4. Choosing easy-to-use filenames
  230. 4.3.1.5. Listing the contents of directories
  231. 4.3.1.6. Displaying and changing the current working directory
  232. 4.3.1.7. Creating and removing directories from the command line
  233. 4.3.1.8. Copying files
  234. 4.3.1.9. Renaming and moving files
  235. 4.3.1.10. Removing files
  236. 4.3.1.11. Creating multiple names by linking files
  237. 4.3.1.12. Determining the contents of files
  238. 4.3.1.13. Viewing the contents of text files
  239. 4.3.1.14. Managing files graphically using GNOME
  240. 4.3.1.15. Managing files graphically with KDE
  241. 4.3.2. How Does It Work?
  242. 4.3.2.1. Matching filenames
  243. 4.3.2.2. The merged file hierarchy
  244. 4.3.3. What About...
  245. 4.3.3.1. ...finding out which files are going to match an ambiguous filename before executing a command?
  246. 4.3.3.2. ...entering a filename quickly at the shell prompt?
  247. 4.3.3.3. ...using a filename in one command, and then reusing that filename in the next command?
  248. 4.3.4. Where Can I Learn More?
  249. 4.4. Basic Text Editing Using vi
  250. 4.4.1. How Do I Do That?
  251. 4.4.1.1. vi modes
  252. 4.4.1.2. Moving around
  253. 4.4.1.3. Inserting text
  254. 4.4.1.4. Deleting, yanking, and putting: vis version of cutting, copying, and pasting
  255. 4.4.1.5. Searching
  256. 4.4.1.6. Undoing, redoing, and repeating
  257. 4.4.1.7. Saving and exiting
  258. 4.4.2. How Does It Work?
  259. 4.4.3. What About...
  260. 4.4.3.1. ...using vi with a GUI?
  261. 4.4.3.2. ...using other text editors?
  262. 4.4.4. Where Can I Learn More?
  263. 4.5. Using Runlevels
  264. 4.5.1. How Do I Do That?
  265. 4.5.1.1. Choosing the runlevel at boot time
  266. 4.5.1.2. Changing the runlevel after booting
  267. 4.5.1.3. Changing the default runlevel
  268. 4.5.1.4. Creating entries for different runlevels on the boot menu
  269. 4.5.2. How Does It Work?
  270. 4.5.3. What About...
  271. 4.5.3.1. ...booting without an /etc/inittab file?
  272. 4.5.3.2. ...using the GUI in runlevel 3?
  273. 4.5.4. Where Can I Learn More?
  274. 4.6. Managing and Configuring Services
  275. 4.6.1. How Do I Do That?
  276. 4.6.1.1. Configuring services using a character user interface
  277. 4.6.1.2. Configuring services from the command line
  278. 4.6.1.3. Managing services from the command line
  279. 4.6.2. How Does It Work?
  280. 4.6.3. What About...
  281. 4.6.3.1. ...creating my own runlevel?
  282. 4.6.3.2. ...creating my own service?
  283. 4.6.4. Where Can I Learn More?
  284. 4.7. Managing Users and Groups
  285. 4.7.1. How Do I Do That?
  286. 4.7.1.1. Managing users graphically
  287. 4.7.1.2. Managing groups graphically
  288. 4.7.1.3. Adding and managing users from the command line
  289. 4.7.1.4. Managing user passwords from the command line
  290. 4.7.1.5. Managing groups and delegating group maintenance from the command line
  291. 4.7.2. How Does It Work?
  292. 4.7.3. What About...
  293. 4.7.3.1. ...the kuser program on the menu?
  294. 4.7.3.2. ...editing the password and group files directly?
  295. 4.7.3.3. ...checking that the password and group files are properly written?
  296. 4.7.4. Where Can I Learn More?
  297. 4.8. Control Access to Files
  298. 4.8.1. How Do I Do That?
  299. 4.8.1.1. Viewing the current user, group, and mode from the command line
  300. 4.8.1.2. Viewing the current user, group, and mode graphically
  301. 4.8.1.3. Changing permissions graphically
  302. 4.8.1.4. Changing permissions from the command line
  303. 4.8.1.5. Using group permissions
  304. 4.8.1.6. Default permissions
  305. 4.8.1.7. Changing file ownership
  306. 4.8.2. How Does It Work?
  307. 4.8.3. What About...
  308. 4.8.3.1. ...viewing file permissions and ownership in the icon view of Nautilus?
  309. 4.8.3.2. ...changing the group of a file graphically?
  310. 4.8.3.3. ...deleting someone elses file in /tmp?
  311. 4.8.3.4. ...changing a files owner and group at the same time?
  312. 4.8.4. Where Can I Find More Information?
  313. 4.9. Managing Processes
  314. 4.9.1. How Do I Do That?
  315. 4.9.1.1. Monitoring process information graphically in GNOME
  316. 4.9.1.2. Monitoring process information graphically in KDE
  317. 4.9.1.3. Monitoring process information on a character display
  318. 4.9.1.4. Displaying process information from the shell prompt
  319. 4.9.1.5. Terminating processes from the shell prompt
  320. 4.9.2. How Does It Work?
  321. 4.9.3. What About...
  322. 4.9.3.1. ...monitoring CPU load continuously?
  323. 4.9.3.2. ...starting a process with a lower (or higher) priority than normal?
  324. 4.9.3.3. ...changing the priority of an existing process?
  325. 4.9.3.4. ...starting and managing background processes?
  326. 4.9.4. Where Can I Learn More?
  327. 4.10. Remote Management Using SSH
  328. 4.10.1. How Do I Do That?
  329. 4.10.1.1. Reducing the use of passwords
  330. 4.10.1.2. Using graphical applications remotely
  331. 4.10.2. How Does It Work?
  332. 4.10.3. What About...
  333. 4.10.3.1. ...compressing data?
  334. 4.10.3.2. ...connecting to a Fedora system from a Windows system using SSH?
  335. 4.10.3.3. ...connecting to a Fedora system from a Mac OS X system?
  336. 4.10.3.4. ...connecting to my home system from another location?
  337. 4.10.3.5. ...using public/private keys without a passphrase?
  338. 4.10.4. Where Can I Learn More?
  339. 4.11. Using Shell Redirection and Piping
  340. 4.11.1. How Do I Do That?
  341. 4.11.1.1. Redirection
  342. 4.11.1.2. Piping
  343. 4.11.2. How Does It Work?
  344. 4.11.3. What About...
  345. 4.11.3.1. ...redirecting standard output and standard error to the same destination?
  346. 4.11.3.2. ...redirecting to a device?
  347. 4.11.3.3. ...splitting a pipe to send data to two destinations?
  348. 4.11.3.4. ...piping and redirecting data that is not text?
  349. 4.11.4. Where Can I Learn More?
  350. 4.12. Writing Simple Scripts
  351. 4.12.1. How Do I Do That?
  352. 4.12.1.1. Shell and environment variables
  353. 4.12.1.2. Special variables
  354. 4.12.1.3. Control structures
  355. 4.12.1.4. Integer arithmetic
  356. 4.12.1.5. Making your scripts available to users of other shells
  357. 4.12.1.6. An example
  358. 4.12.1.7. Login and initialization scripts
  359. 4.12.2. How Does It Work?
  360. 4.12.3. What About...
  361. 4.12.3.1. ...interacting with the user through the graphical user interface?
  362. 4.12.4. Where Can I Learn More?
  363. Chapter 5. Package Management
  364. 5.1. Querying the Package Management Database
  365. 5.1.1. How Do I Do That?
  366. 5.1.2. How Does It Work?
  367. 5.1.3. What About...
  368. 5.1.3.1. ...converting an RPM to a plain archive?
  369. 5.1.3.2. ...a damaged RPM database?
  370. 5.1.4. Where Can I Learn More?
  371. 5.2. Installing and Removing Software Using RPM
  372. 5.2.1. How Do I Do That?
  373. 5.2.2. How Does It Work?
  374. 5.2.3. What About...
  375. 5.2.3.1. ...installing multiple versions of a package?
  376. 5.2.4. Where Can I Learn More?
  377. 5.3. Using Repositories
  378. 5.3.1. How Do I Do That?
  379. 5.3.1.1. Using yum from the command line
  380. 5.3.1.2. Using yum with a GUI
  381. 5.3.1.3. Adding repositories
  382. 5.3.2. How Does It Work?
  383. 5.3.3. What About...
  384. 5.3.3.1. ...installing proprietary video drivers?
  385. 5.3.3.2. ...installing software to handle proprietary multimedia formats?
  386. 5.3.3.3. ...excluding packages from management by yum?
  387. 5.3.4. Where Can I Learn More?
  388. 5.4. Rolling Back a Package Installation, Upgrade, or  Removal
  389. 5.4.1. How Do I Do That?
  390. 5.4.2. How Does It Work?
  391. 5.4.3. What About...
  392. 5.4.3.1. ...rolling back a package installation?
  393. 5.4.3.2. ...rolling back a rollback?
  394. 5.4.3.3. ...seeing what will happen during a rollback, before I decide to do it?
  395. 5.4.3.4. ...the disk space used by the rollback files?
  396. 5.4.4. Where Can I Learn More?
  397. 5.5. Automating Updates
  398. 5.5.1. How Do I Do That?
  399. 5.5.2. How Does It Work?
  400. 5.5.3. What About...
  401. 5.5.3.1. ...downloading but not installing updates?
  402. 5.5.3.2. ...updating a machine when its booted?
  403. 5.5.4. Where Can I Learn More?
  404. 5.6. Installing From Source
  405. 5.6.1. How Do I Do That?
  406. 5.6.2. How Does It Work?
  407. 5.6.3. What About...
  408. 5.6.3.1. ...packages that are not written in a compiled language?
  409. 5.6.3.2. ...packages that don have a configure script?
  410. 5.6.4. Where Can I Learn More?
  411. 5.7. Making Your Own RPM Packages
  412. 5.7.1. How Do I Do That?
  413. 5.7.1.1. Preparing to build RPMs
  414. 5.7.1.2. Creating a spec file
  415. 5.7.2. How Does It Work?
  416. 5.7.3. What About...
  417. 5.7.3.1. ...creating a desktop menu entry for a packaged program?
  418. 5.7.3.2. ...running a script when a package is installed or removed?
  419. 5.7.3.3. ...including an icon to identify the package?
  420. 5.7.3.4. ...viewing the source code and the spec file for an existing package?
  421. 5.7.4. Where Can I Learn More?
  422. 5.8. Rebuilding an RPM Package for a Different Architecture
  423. 5.8.1. How Do I Do That?
  424. 5.8.2. How Does It Work?
  425. 5.8.3. What About...
  426. 5.8.3.1. ...editing the spec file before rebuilding?
  427. 5.8.4. Where Can I Learn More?
  428. Chapter 6. Storage Administration
  429. 6.1. Using Logical Volume Management
  430. 6.1.1. How Do I Do That?
  431. 6.1.1.1. Managing LVM graphically
  432. 6.1.1.1.1. Growing a logical volume
  433. 6.1.1.2. Shrinking a logical volume
  434. 6.1.1.2.1. Creating a new logical volume
  435. 6.1.1.2.2. Creating a snapshot
  436. 6.1.1.2.3. Removing a logical volume or a snapshot
  437. 6.1.1.2.4. Adding a partition
  438. 6.1.1.2.5. Removing a partition
  439. 6.1.1.3. Managing LVMs from the command line
  440. 6.1.1.3.1. LVM device names
  441. 6.1.1.3.2. Getting information about LVM elements
  442. 6.1.1.3.3. Growing a logical volume
  443. 6.1.1.3.4. Shrinking a logical volume
  444. 6.1.1.3.5. Creating a new logical volume
  445. 6.1.1.3.6. Creating a snapshot logical volume
  446. 6.1.1.3.7. Removing a logical volume
  447. 6.1.1.3.8. Adding a partition
  448. 6.1.1.3.9. Removing a partition
  449. 6.1.1.4. Managing LVM in single-user mode
  450. 6.1.1.5. Managing LVM in rescue mode
  451. 6.1.2. How Does It Work?
  452. 6.1.3. What About...
  453. 6.1.3.1. ...taking multiple snapshots of a filesystem?
  454. 6.1.3.2. ...improving performance?
  455. 6.1.3.3. ...LVM mirroring?
  456. 6.1.3.4. ...using LVM with RAID?
  457. 6.1.3.5. ...using a raw, unpartitioned disk as a PV?
  458. 6.1.3.6. ...a failing disk drive?
  459. 6.1.3.7. ...creating a flexible disk layout?
  460. 6.1.4. Where Can I Learn More?
  461. 6.2. Managing RAID
  462. 6.2.1. How Do I Do That?
  463. 6.2.1.1. Displaying Information About the Current RAID Configuration
  464. 6.2.1.2. Creating a RAID array
  465. 6.2.1.3. Handling a drive failure
  466. 6.2.1.4. Stopping and restarting a RAID array
  467. 6.2.1.5. Monitoring RAID arrays
  468. 6.2.1.6. Setting up a hot spare
  469. 6.2.1.7. Monitoring drive health
  470. 6.2.2. How Does It Work?
  471. 6.2.3. What About...
  472. 6.2.3.1. ...booting from a RAID array?
  473. 6.2.3.2. ...mixing and matching USB flash drives, USB hard disks, SATA, SCSI, and IDE/ATA drives?
  474. 6.2.3.3. ...mirroring to a remote drive as part of a disaster-recovery plan?
  475. 6.2.3.4. ...using more than one RAID array, but configuring one hot spare to be shared between them?
  476. 6.2.3.5. ...configuring the rebuild rate for arrays?
  477. 6.2.3.6. ...simultaneous drive failure?
  478. 6.2.4. Where Can I Learn More?
  479. 6.3. Making Backups
  480. 6.3.1. How Do I Do That?
  481. 6.3.1.1. Determining what data to back up
  482. 6.3.1.2. Determining how often to back up your data
  483. 6.3.1.3. Determine how quickly you will need to restore your data
  484. 6.3.1.4. Determine how far back in time you need to restore
  485. 6.3.1.5. Decision 1: Incremental versus full backups, and backup rotation
  486. 6.3.1.6. Decision 2: Decide on the backup media
  487. 6.3.1.7. Decision 3: Decide on media rotation and storage
  488. 6.3.1.8. Simple backup labeling
  489. 6.3.1.9. Backing up to DVD
  490. 6.3.1.10. Backing up to tape
  491. 6.3.1.11. Restoring files from backups
  492. 6.3.1.12. Viewing the table of contents and verifying a backup
  493. 6.3.2. How Does It Work?
  494. 6.3.3. What About...
  495. 6.3.3.1. ...using LVM snapshots in a backup script?
  496. 6.3.3.2. ...putting more than one backup on a tape?
  497. 6.3.3.3. ...backing up multiple systems onto a central tape archive?
  498. 6.3.4. Where Can I Learn More?
  499. 6.4. Scheduling Tasks
  500. 6.4.1. How Do I Do That?
  501. 6.4.2. How Does It Work?
  502. 6.4.3. What About...
  503. 6.4.3.1. ...daylight savings time?
  504. 6.4.3.2. ...using an editor other than vi to edit the crontab?
  505. 6.4.3.3. ...loading the crontab from a file?
  506. 6.4.4. Where Can I Learn More?
  507. Chapter 7. Network Services
  508. 7.1. Configuring Samba to Share Files with Windows Systems
  509. 7.1.1. How Do I Do That?
  510. 7.1.1.1. Adding additional Samba shares
  511. 7.1.1.2. Accessing Fedora printers from a Windows system
  512. 7.1.1.3. Configuring Samba from the command line
  513. 7.1.2. How Does It Work?
  514. 7.1.3. What About...
  515. 7.1.3.1. ...disabling access to printers through Samba?
  516. 7.1.3.2. ...accessing a Samba share on another Linux machine?
  517. 7.1.4. Where Can I Learn More?
  518. 7.2. Configuring a DHCP Server
  519. 7.2.1. How Do I Do That?
  520. 7.2.2. How Does It Work?
  521. 7.2.3. What About...
  522. 7.2.3.1. ...older clients that use the bootp protocol?
  523. 7.2.4. Where Can I Learn More?
  524. 7.3. Configuring a Domain Name Server
  525. 7.3.1. How Do I Do That?
  526. 7.3.1.1. Configuring named graphically
  527. 7.3.1.2. Configuring named through configuration files and datafiles
  528. 7.3.1.3. Testing DNS entries
  529. 7.3.1.4. Configuring a slave nameserver
  530. 7.3.1.5. Using your nameservers locally
  531. 7.3.1.6. Serving domain information to the Internet
  532. 7.3.1.7. Reverse mapping
  533. 7.3.2. How Does It Work?
  534. 7.3.3. What About...
  535. 7.3.3.1. ...changing from one nameserver to another?
  536. 7.3.4. Where Can I Learn More?
  537. 7.4. Configuring a CUPS Print Server
  538. 7.4.1. How Do I Do That?
  539. 7.4.1.1. Accessing a CUPS printer from Windows XP
  540. 7.4.2. How Does It Work?
  541. 7.4.3. What About...
  542. 7.4.3.1. ...a client that uses the older LPD protocol?
  543. 7.4.3.2. ...configuring sharing from the command line?
  544. 7.4.4. Where Can I Learn More?
  545. 7.5. Using the Apache Web Server
  546. 7.5.1. How Do I Do That?
  547. 7.5.1.1. Starting Apache
  548. 7.5.1.2. Testing Apache
  549. 7.5.1.3. Installing your own web content
  550. 7.5.1.4. Changing the default configuration
  551. 7.5.1.5. Configuring Apache graphically
  552. 7.5.1.6. Directly editing Apaches configuration file
  553. 7.5.1.6.1. Configuring the server root and document root
  554. 7.5.1.6.2. Configuring the server administrator, IP address and port, and server name
  555. 7.5.1.6.3. Configuring access
  556. 7.5.1.6.4. Enabling personal web pages
  557. 7.5.1.6.5. Using virtual hosts
  558. 7.5.1.7. Enabling CGI scripts in every directory
  559. 7.5.1.8. Password-protecting content
  560. 7.5.2. How Does It Work?
  561. 7.5.3. What About...
  562. 7.5.3.1. ...interpreting the Apache logfiles?
  563. 7.5.3.2. ...using a more secure authentication scheme than Basic?
  564. 7.5.4. Where Can I Learn More?
  565. 7.6. Configuring the sendmail Server
  566. 7.6.1. How Do I Do That?
  567. 7.6.1.1. Preparing to configure sendmail and activating changes
  568. 7.6.1.2. Configuring sendmail to use a mail relay
  569. 7.6.1.3. Configuring sendmail to accept inbound email
  570. 7.6.1.4. Using aliases
  571. 7.6.1.5. Configuring virtual users
  572. 7.6.1.6. Configuring Masquerading
  573. 7.6.2. How Does It Work?
  574. 7.6.3. What About...
  575. 7.6.3.1. ...using an alternate MTA?
  576. 7.6.3.2. ...fetching mail from a remote mailbox?
  577. 7.6.4. Where Can I Learn More?
  578. 7.7. Configuring IMAP and POP3 Email
  579. 7.7.1. How Do I Do That?
  580. 7.7.1.1. Creating your own certificate
  581. 7.7.1.2. Disabling Encryption
  582. 7.7.1.3. Starting Dovecot
  583. 7.7.2. How Does It Work?
  584. 7.7.3. What About...
  585. 7.7.3.1. ...IMAP folders other than the INBOX?
  586. 7.7.4. Where Can I Learn More?
  587. 7.8. Configuring Webmail
  588. 7.8.1. How Do I Do That?
  589. 7.8.2. How Does It Work?
  590. 7.8.3. What About...
  591. 7.8.3.1. ...changing the SquirrelMail configuration?
  592. 7.8.3.2. ...browsers that don support JavaScript or ECMAScript?
  593. 7.8.4. Where Can I Learn More?
  594. 7.9. Creating Databases and Accounts on a MySQL Server
  595. 7.9.1. How Do I Do That?
  596. 7.9.2. How Does It Work?
  597. 7.9.3. What About...
  598. 7.9.3.1. ...creating my own scripts and programs that access MySQL data?
  599. 7.9.4. Where Can I Learn More?
  600. 7.10. Installing and Configuring a Wiki
  601. 7.10.1. How Do I Do That?
  602. 7.10.2. How Does It Work?
  603. 7.10.3. What About...
  604. 7.10.3.1. ...changing the appearance of the Wiki?
  605. 7.10.3.2. ...using a logo that isn rectangular?
  606. 7.10.3.3. ...moving or deleting a page, or protecting a page against edits?
  607. 7.10.4. Where Can I Learn More?
  608. 7.11. Configuring an FTP Server
  609. 7.11.1. How Do I Do That?
  610. 7.11.2. How Does It Work?
  611. 7.11.3. What About...
  612. 7.11.3.1. ...secure FTP?
  613. 7.11.4. Where Can I Learn More?
  614. 7.12. Analyzing Web and FTP Logs
  615. 7.12.1. How Do I Do That?
  616. 7.12.1.1. Analyzing virtual host logfiles
  617. 7.12.1.2. Analyzing the FTP logfile
  618. 7.12.1.3. Accessing the usage statistics from another location
  619. 7.12.2. How Does It Work?
  620. 7.12.3. Where Can I Learn More?
  621. Chapter 8. Securing Your System
  622. 8.1. Prevent Unwanted Connections
  623. 8.1.1. How Do I Do That?
  624. 8.1.1.1. Configuring the firewall in text mode
  625. 8.1.1.2. Temporarily disabling the firewall from the command line
  626. 8.1.2. How Does It Work?
  627. 8.1.3. What About...
  628. 8.1.3.1. ...more complex firewall rules?
  629. 8.1.4. Where Can I Learn More?
  630. 8.2. Using SELinux
  631. 8.2.1. How Do I Do That?
  632. 8.2.1.1. Configuring SELinux from the command line
  633. 8.2.1.2. Determining which booleans to modify
  634. 8.2.1.3. Using file labels
  635. 8.2.1.4. Relabeling the system
  636. 8.2.1.5. Viewing and interpreting SELinux messages
  637. 8.2.2. How Does It Work?
  638. 8.2.3. What About...
  639. 8.2.3.1. ...using the strict or MLS policies?
  640. 8.2.3.2. ...booting with SELinux disabled?
  641. 8.2.4. Where Can I Learn More?
  642. 8.3. Using Access Control Lists
  643. 8.3.1. How Do I Do That?
  644. 8.3.1.1. Setting the default ACL for new files
  645. 8.3.1.2. Copying and moving files with their ACLs
  646. 8.3.1.3. Copying an ACL from one file to another
  647. 8.3.1.4. Improving the appearance of ACL listings
  648. 8.3.2. How Does It Work?
  649. 8.3.3. What About...
  650. 8.3.3.1. ...adjusting ACLs graphically?
  651. 8.3.3.2. ...saving and restoring the ACLs of a file subtree?
  652. 8.3.3.3. ...a version of tar that supports ACLs?
  653. 8.3.4. Where Can I Learn More?
  654. 8.4. Making Files Immutable
  655. 8.4.1. How Do I Do That?
  656. 8.4.2. How Does It Work?
  657. 8.4.3. What About...
  658. 8.4.3.1. ...making an entire subtree immutable?
  659. 8.4.3.2. ...other file attributes that might be useful?
  660. 8.4.4. Where Can I Learn More?
  661. 8.5. Using sudo to Delegate Privilege
  662. 8.5.1. How Do I Do That?
  663. 8.5.2. How Does It Work?
  664. 8.5.3. What About...
  665. 8.5.3.1. ...changing the password timeout?
  666. 8.5.3.2. ...voluntarily giving up the password timestamp?
  667. 8.5.3.3. ...disabling the root password entirely (like a Debian or Ubuntu system)?
  668. 8.5.4. Where Can I Learn More?
  669. 8.6. Configuring PAM and consolehelper
  670. 8.6.1. How Do I Do That?
  671. 8.6.1.1. Using an authentication server
  672. 8.6.1.2. Adding a PAM module: restricting access by time and user
  673. 8.6.1.3. Automatic blacklisting of sites trying a brute-force password attack
  674. 8.6.1.4. PAM and consolehelper
  675. 8.6.2. How Does It Work?
  676. 8.6.3. What About...
  677. 8.6.3.1. ...other PAM modules?
  678. 8.6.3.2. ...permitting the console user to use su without a password?
  679. 8.6.4. Where Can I Learn More?
  680. 8.7. Logging
  681. 8.7.1. How Do I Do That?
  682. 8.7.1.1. Interpreting /var/log/messages
  683. 8.7.1.2. Creating your own logfile entries
  684. 8.7.1.3. Keeping an eye on logs
  685. 8.7.1.4. Configuring remote logging
  686. 8.7.1.5. Automated log watching
  687. 8.7.1.6. Log rotation
  688. 8.7.2. How Does It Work?
  689. 8.7.3. What About...
  690. 8.7.3.1. ...sending log messages to a program?
  691. 8.7.3.2. ...outputting to a named pipe?
  692. 8.7.3.3. ...logging messages from printers, routers, and other network devices?
  693. 8.7.3.4. ...using patterns within the message text to determine message routing?
  694. 8.7.4. Where Can I Learn More?
  695. 8.8. Detecting File Changes with AIDE
  696. 8.8.1. How Do I Do That?
  697. 8.8.2. How Does It Work?
  698. 8.8.3. What About...
  699. 8.8.3.1. ...an intruder altering the fingerprint database?
  700. 8.8.3.2. ...automating AIDE scans?
  701. 8.8.4. Where Can I Learn More?
  702. Chapter 9. The Fedora Community
  703. 9.1. Participating in the Fedora Mailing Lists
  704. 9.1.1. How Do I Do That?
  705. 9.1.1.1. Posting on the mailing list
  706. 9.1.2. How Does It Work?
  707. 9.1.3. What About...
  708. 9.1.3.1. ...posting to a mailing list when a disposable email address is used to subscribe to the list?
  709. 9.1.3.2. ...subscribing to a Fedora list in nondigest mode without having the list messages cluttering up my email inbox?
  710. 9.1.4. Where Can I Learn More?
  711. 9.2. Using IRC
  712. 9.2.1. How Do I Do That?
  713. 9.2.2. How Does It Work?
  714. 9.2.3. What About...
  715. 9.2.3.1. ...saving an IRC discussion?
  716. 9.2.3.2. ...other ways of accessing IRC?
  717. 9.2.4. Where Can I Learn More?
  718. 9.3. Using Bugzilla
  719. 9.3.1. How Do I Do That?
  720. 9.3.1.1. Creating a Bugzilla account
  721. 9.3.1.2. Reporting a new bug
  722. 9.3.2. How Does It Work?
  723. 9.3.3. What About...
  724. 9.3.3.1. ...receiving less (or more) email from Bugzilla?
  725. 9.3.3.2. ...a bug thats not really a bug?
  726. 9.3.3.3. ...a bug due to problems in the upstream code?
  727. 9.3.3.4. ...referring to a Bugzilla bug on the mailing lists or in IRC?
  728. 9.3.4. Where Can I Learn More?
  729. 9.4. Running Rawhide
  730. 9.4.1. How Do I Do That?
  731. 9.4.1.1. Updating Fedora Core to Rawhide
  732. 9.4.1.2. Installing Rawhide directly
  733. 9.4.1.3. Creating a local Rawhide mirror
  734. 9.4.1.4. Using a local Rawhide mirror
  735. 9.4.1.5. Rawhide-related mailing lists
  736. 9.4.2. How Does It Work?
  737. 9.4.3. What About...
  738. 9.4.3.1. ...testing upcoming Fedora Core versions without performing a network installation or update?
  739. 9.4.3.2. ...using other repositories with the Rawhide development repository?
  740. 9.4.4. Where Can I Learn More?
  741. 9.5. Participating in Fedora Projects
  742. 9.5.1. How Do I Do That?
  743. 9.5.1.1. Fedora Documentation
  744. 9.5.1.2. Fedora Translation
  745. 9.5.1.3. Fedora Extras
  746. 9.5.2. What About...
  747. 9.5.2.1. ...Fedora-related projects that have sprung up outside of the official Fedora community?
  748. 9.5.3. Where Can I Learn More?
  749. Chapter 10. Advanced Installation
  750. 10.1. Resizing a Windows Partition
  751. 10.1.1. How Do I Do That?
  752. 10.1.2. How Does It Work?
  753. 10.1.3. What About...
  754. 10.1.3.1. ...one or two small partitions that appear at the end of my disk drive?
  755. 10.1.4. Where Can I Learn More?
  756. 10.2. Configuring RAID and LVM During Installation
  757. 10.2.1. How Do I Do That?
  758. 10.2.1.1. Creating a boot filesystem
  759. 10.2.1.2. Creating RAID devices
  760. 10.2.1.3. Creating an LVM layout
  761. 10.2.2. How Does It Work?
  762. 10.2.3. What About...
  763. 10.2.3.1. ...disk partitions on non-PC systems?
  764. 10.2.4. Where Can I Learn More?
  765. 10.3. Preparing Alternate Installation Media
  766. 10.3.1. How Do I Do That?
  767. 10.3.1.1. Preparing a USB drive
  768. 10.3.1.2. Preparing a network installation server
  769. 10.3.1.3. Preparing a PXE Boot Server
  770. 10.3.2. How Does It Work?
  771. 10.3.3. What About...
  772. 10.3.3.1. ...installing from a public HTTP or FTP server?
  773. 10.3.3.2. ...booting the installer from a mini-CD?
  774. 10.3.3.3. ...booting the installer from floppy disk?
  775. 10.3.3.4. ...configuring a PXE installation from the command line?
  776. 10.3.4. Where Can I Learn More?
  777. 10.4. Installing with Kickstart
  778. 10.4.1. How Do I Do That?
  779. 10.4.1.1. Using a Kickstart file
  780. 10.4.2. How Does It Work?
  781. 10.4.3. What About...
  782. 10.4.3.1. ...creating a Kickstart file using a graphical tool?
  783. 10.4.3.2. ...creating a Kickstart file that dynamically adjusts according to properties of the installation target?
  784. 10.4.3.3. ...performing customization after installation?
  785. 10.4.3.4. ...installing a system with the same configuration as another, previously installed system?
  786. 10.4.4. Where Can I Learn More?
  787. 10.5. Configuring the GRUB Bootloader
  788. 10.5.1. How Do I Do That?
  789. 10.5.1.1. Customizing the GRUB menu
  790. 10.5.1.2. Using your own splash image
  791. 10.5.1.3. Creating additional boot entries
  792. 10.5.1.4. Installing GRUBs boot record from Fedora
  793. 10.5.1.5. Installing GRUBs boot record from a GRUB DVD or floppy disk
  794. 10.5.1.6. Editing boot options
  795. 10.5.1.7. Installing or changing a GRUB password
  796. 10.5.2. How Does It Work?
  797. 10.5.3. What About...
  798. 10.5.3.1. ...an archive of GRUB splash images?
  799. 10.5.3.2. ...dual-booting between different Linux distributions?
  800. 10.5.4. Where Can I Learn More?
  801. 10.6. Using Rescue Mode on an Installation Disc
  802. 10.6.1. How Do I Do That?
  803. 10.6.2. How Does It Work?
  804. 10.6.3. What About...
  805. 10.6.3.1. ...copying files to or from another machine while in rescue mode?
  806. 10.6.3.2. ...using a GUI while in rescue mode?
  807. 10.6.3.3. ...accessing software from the hard disk without using chroot?
  808. 10.6.4. Where Can I Learn More?
  809. 10.7. Installing Xen Virtual Machines
  810. 10.7.1. How Do I Do That?
  811. 10.7.2. How Does It Work?
  812. 10.7.3. What About...
  813. 10.7.3.1. ...starting Xen guest domains automatically at boot time?
  814. 10.7.3.2. ...hardware support for virtualization?
  815. 10.7.3.3. ...using other network or storage configurations?
  816. 10.7.3.4. ...booting other operating systems?
  817. 10.7.3.5. ...monitoring the resource usage and activity of Xen domains?
  818. 10.7.4. Where Can I Learn More?
  819. Colophon


Âàøå âïå÷àòëåíèå îò ýòîé êíèãè  


Ïîëíûé òåêñò êíèãè (÷èòàòü îíëàéí): Fedora Linux

Ñêà÷àòü ýòó êíèãó (2345k) â ôîðìàòå: fb2, epub, mobi, txt, html

close [X]

close [X]


Êîììåíòàðèè

Many thanks, this site is extremely helpful.

Îöåíêà 2 èç 5 çâ¸çä îò Guest 06.11.2018 08:14  

Âñåãî îáçîðîâ: 1
Ñðåäíèé ðåéòèíã 2.7 èç 5

Âàøå èìÿ:     Âàøå âïå÷àòëåíèå îò ýòîé êíèãè

Êîììåíòàðèé:


ïîëó÷àòü êîììåíòàðèè î êíèãå Fedora Linux íà e-mail

Êîä àâòîðèçàöèè Anti spam Capcha