LPI Linux Certification in a Nutshell (79 page)

Read LPI Linux Certification in a Nutshell Online

Authors: Adam Haeder; Stephen Addison Schneiter; Bruno Gomes Pessanha; James Stanger

Tags: #Reference:Computers

BOOK: LPI Linux Certification in a Nutshell
13.55Mb size Format: txt, pdf, ePub
R
ramfs,
Device Management Definitions
rc.local,
Overview of the /etc Directory Tree and the init Process
read command,
Description
read permissions,
Linux Access Control
readline,
.inputrc
reboot system,
Objective 3: Change Runlevels and Shut Down or Reboot
System
recursive copying,
Frequently used options
recursive execution,
Applying commands recursively through a directory tree
,
Recursive execution
recursive remove,
Frequently used option
Red Hat Certified Engineer,
Preface
Red Hat-based systems,
Overview of the /etc Directory Tree and the init Process
,
Distribution-specific tools
redirection,
Redirection
,
Pipes and redirection
,
Protocols
redirection operators,
Redirection
regular expressions (regex),
Regular Expression Syntax
,
Regular Expression Syntax
,
Example 1
,
Concepts
relays,
Subnets and relays
remote hosts,
Protocols
remove command,
Removing packages
renice command,
Description
RepeatKeys,
Objective 3: Accessibility
repquota command,
Description
return command,
Description
return values,
Return values
review questions,
Exam 101 Review
Questions and Exercises
,
Exercises
,
Exam 102 Review
Questions and Exercises
,
Exercises
RHCE program,
Preface
rhosts authentication,
Example /etc/ssh/sshd_config file
rm command,
Applying commands recursively through a directory tree
,
Description
,
Setting Up a Workgroup Directory
,
File and directory management commands
rmdir command,
Description
,
File and directory management commands
rmmod command,
Description
root directory,
Directories and files
,
The root filesystem and mount points
,
The root Filesystem
root filesystem,
The root filesystem and mount points
,
The root Filesystem
,
Where’s that binary?
round robin DNS,
Example
route,
Objective 109.2: Basic Network Configuration
route command,
Description
,
Example 3
route status flags,
Frequently used options and keywords
RPM (Red Hat) and YUM package manager,
Linux
Installation and Package Management (Topic 102)
,
Objective 5: Use Red Hat Package Manager (RPM)
,
Removing packages
,
Concepts
rpm command,
Overview of the /etc Directory Tree and the init Process
,
Running rpm
,
Removing packages
RSA algorithm,
Using the RSA algorithm
runlevel command,
Determining Your System’s Runlevel
runlevels,
Objective 3: Change Runlevels and Shut Down or Reboot
System
,
Examples
Running Linux (Dalheimer & Welsh),
Linux
Installation and Package Management (Topic 102)
S
/sbin directory,
The root Filesystem
scheduler,
An Overview of Printing
scheduling jobs,
Objective 2: Automate System Administration Tasks by Scheduling
Jobs
,
Controlling User Access to cron and at
screen readers,
Objective 3: Accessibility
Screen section,
Distribution-specific tools
script files,
Shells,
Scripting, and Data Management (Topic
105)
,
Script Files
,
SUID and SGID rights
,
Objective 105.1: Customize and Use the Shell Environment
scripting and data management,
Review Questions
scripting language,
Objective 2: Customize or Write Simple Scripts
SCSI device files,
Disk Drives Under Linux
search text files using regular expressions,
GNU and Unix Commands
(Topic 103)
,
Objective 7: Search Text Files Using Regular Expressions
,
Example 7
,
Concepts
secondary IDE interface,
Disk Drives Under Linux
,
Hard disk devices
sections, man,
Manual sections
Secure Shell (SSH),
Using Secure Shell (SSH)
,
Configuring OpenSSH
,
TCP/IP utilities
securing data with encryption,
Securing
Data with Encryption (Topic 110.3)
,
Troubleshooting Files in the ~/.gnupg/ Directory
,
Objective 110.3: Securing Data with Encryption
security administration tasks,
Objective 1: Perform Security Administration Tasks
,
Example 2
,
The (In)Security of SUID
,
Example 3
,
User IDs and Passwords
,
Frequently used options
,
Shadow Passwords
,
Examples
,
Setting Limits on Users
,
Example
,
Querying System Services
,
Example 2
,
Objective 110.1: Perform Security Administration Tasks
querying system services,
Querying System Services
,
Example 2
setting limits on users,
Setting Limits on Users
,
Example
shadow passwords,
Shadow Passwords
,
Examples
SUID,
The (In)Security of SUID
,
Example 3
user IDs and passwords,
User IDs and Passwords
,
Frequently used options
security, host,
Objective 2: Set Up Host Security
,
TCP wrappers
sed (stream editor),
Objective 7: Search Text Files Using Regular Expressions
,
Using sed
,
Examples
,
sendmail,
Objective 3: Mail Transfer Agent (MTA) Basics
,
Configuration of Postfix
sendmail (Costales),
Objective 3: Mail Transfer Agent (MTA) Basics
seq command,
Description
sequence number,
Overview of the /etc Directory Tree and the init Process
server key pair,
The Server Public and Private Key
server motherboard BIOS,
Disks and boot devices
ServerFlags,
Distribution-specific tools
ServerLayout,
Distribution-specific tools
services,
Services
set and view disk quotas,
Objective 4: Set and View Disk Quotas
,
Example
set command,
Shell variable basics
set up a display manager,
Objective 106.2: Set Up a Display Manager
set up host security,
Objective 2: Set Up Host Security
,
Configuration
,
TCP wrappers
SGID,
Linux Access Control
,
SUID and SGID rights
shadow password and groups,
The Shadow Password and Shadow Group Systems
,
Shadow Passwords
,
Examples
,
Shadow passwords
sharable data,
Datatypes
shared libraries,
Linux
Installation and Package Management (Topic 102)
,
Objective 3: Manage Shared Libraries
,
Example 3
,
Concepts
shared library dependencies,
Shared Library Dependencies
shebang,
Shebang!
shell,
The Interactive Shell
,
Shell variable basics
,
Entering command sequences
,
Shell Job Control
,
Command history, editing, and substitution
,
Command history, editing, and substitution
,
Objective 1: Customize and Use the Shell Environment
,
.inputrc
,
Shells and environment variables
,
Executable files
,
Objective 105.1: Customize and Use the Shell Environment
(see also bash (Bourne-Again Shell))
defined,
The Interactive Shell
environment,
Objective 1: Customize and Use the Shell Environment
,
.inputrc
,
Objective 105.1: Customize and Use the Shell Environment
job control,
Shell Job Control
scripts,
Executable files
sessions,
Command history, editing, and substitution
variables,
Shell variable basics
,
Entering command sequences
,
Shells and environment variables
shells, scripting and data management,
Review Questions
shift command,
Description
shutdown command,
Single-User Mode
,
System shutdown with shutdown
,
Examples
SIGHUP signal,
Overview of the /etc Directory Tree and the init Process
signal handling code,
Examples
signaling active processes,
Signaling Active Processes
,
Example 1
,
Signaling processes
signing keys,
Signing Keys
single-user mode,
Single-User Mode
slave devices,
Disk Drives Under Linux
slices,
Description
,
Disk partitions
SlowKeys,
Objective 3: Accessibility
SNNname,
Overview of the /etc Directory Tree and the init Process
soft limits,
Quota Limits
,
Example
sort command,
Entering commands at the command prompt
,
Description
,
Example 5
source command,
Description
space character,
Frequently used options
,
Description
space, swap,
Swap Space
,
Creating swap partitions
Speakup,
Objective 3: Accessibility
special permissions,
The mode bits
,
The mode bits
split command,
Description
spooling,
An Overview of Printing
,
CUPS printing overview
SQL data management,
Objective 3: SQL Data Management
,
Multitable Queries
,
Objective 105.3: SQL Data Management
SSH (Secure Shell),
Using Secure Shell (SSH)
,
Configuring OpenSSH
,
TCP/IP utilities
ssh port forwarding,
SSH Port Forwarding
ssh-agent,
ssh-agent
,
ssh-agent
ssh-keygen,
Description
sshd command,
Configuration
,
Using Secure Shell (SSH)
,
Other SSH Tricks
stacks,
Protocols
standard I/O,
Standard I/O and Default File Descriptors
start processes,
Objective 2: Install a Boot Manager
“stat” system
call,
Description
static data,
Datatypes
static linking,
Concepts
sticky bit,
Linux Access Control
StickyKeys,
Objective 3: Accessibility
stratum 1/2 servers,
NTP Concepts
stream editor (sed),
Using sed
,
Examples
streams, pipes, and redirects,
GNU and Unix Commands
(Topic 103)
,
Objective 4: Use Streams, Pipes, and Redirects
,
Example
streams, text,
Objective 2: Process Text Streams Using Filters
,
Example 2
subdirectory trees,
Frequently used option
subnet mask,
Masks
,
Masks
subnets and relays,
Networking
Fundamentals (Topic 109.1)
,
Subnets and relays
,
Frequently used options
,
Addressing and masks
subprocesses,
Processes
sudo command,
Description
,
Example 3
,
Objective 110.1: Perform Security Administration Tasks
SUID,
Linux Access Control
,
SUID and SGID rights
,
The (In)Security of SUID
,
Example 3
super-servers,
The Super-Server
,
xinetd
superblock,
Superblock
,
Checking and Repairing Filesystems
superuser,
The root Filesystem
,
SUID and SGID rights
,
Objective 1: Manage User and Group Accounts and Related System
Files
,
Example
SVGATextmode,
Objective 3: Accessibility
swap partitions,
The root filesystem and mount points
,
Creating swap partitions
swap space,
Swap Space
,
Creating swap partitions
switchdesk tool,
Switching display managers
switching display managers,
Switching display managers
symbolic links,
Devices, Linux
Filesystems, and the Filesystem Hierarchy
Standard (Topic 104)
,
Objective 6: Create and Change Hard and Symbolic Links
,
,
Concepts
sysfs,
Device Management Definitions
syslog system,
Reviewing system logs
syslogd,
Configuring syslogd
,
Configuring syslogd
system architecture,
Objective 1: Determine and Configure Hardware Settings
,
Device Management Definitions
,
Review Questions
,
PC BIOS
system initialization,
Overview of the /etc Directory Tree and the init Process
System V interfaces,
BSD and System V Interfaces
systems,
Reviewing system logs
,
System role
,
General Guidelines
,
Objective 2: System Logging
,
Examining Logfiles
,
Syslog
logging,
Reviewing system logs
,
Objective 2: System Logging
,
Examining Logfiles
,
Syslog
partitioning,
General Guidelines
role of,
System role

Other books

Origin by Smith, Samantha
Ha'penny by Walton, Jo
The Codex Lacrimae by A.J. Carlisle
The Woken Gods by Gwenda Bond
No Safeguards by H. Nigel Thomas
The Border Empire by Ralph Compton