Red Hat Linux 8.0
The Official Red Hat Linux Customization Guide
Copyright
© 2002 by Red Hat, Inc.
ISBN: N/A
Table of Contents
Introduction
Changes to This Manual
Document Conventions
More to Come
Send in Your Feedback
Sign Up for Support
I.
File Systems
1.
The ext3 File System
Features of ext3
Creating an ext3 File System
Converting to an ext3 File System
Reverting to an ext2 File System
2.
Swap Space
What is Swap Space?
Adding Swap Space
Removing Swap Space
Moving Swap Space
3.
Redundant Array of Independent Disks (RAID)
What is RAID?
Who Should Use RAID?
Hardware RAID versus Software RAID
RAID Levels and Linear Support
4.
Logical Volume Manager (LVM)
5.
Managing Disk Storage
Viewing the Partition Table
Creating a Partition
Removing a Partition
Resizing a Partition
II.
Installation-Related Information
6.
Kickstart Installations
What are Kickstart Installations?
How Do You Perform a Kickstart Installation?
Creating the Kickstart File
Kickstart Options
Package Selection
Pre-installation Script
Post-installation Script
Making the Kickstart File Available
Making the Installation Tree Available
Starting a Kickstart Installation
7.
Kickstart Configurator
Basic Configuration
Installation Method
Boot Loader Options
Partition Information
Network Configuration
Authentication
Firewall Configuration
X Configuration
Package Selection
Pre-Installation Script
Post-Installation Script
Saving the File
8.
Rescue Mode
What is Rescue Mode?
Booting Rescue Mode
Booting Single-User Mode
9.
Software RAID Configuration
10.
LVM Configuration
III.
Network-Related Configuration
11.
Network Configuration
Overview
Establishing an Ethernet Connection
Establishing an ISDN Connection
Establishing a Modem Connection
Establishing an xDSL Connection
Establishing a Token Ring Connection
Establishing a CIPE Connection
Establishing a Wireless Connection
Managing Hosts
Managing DNS Settings
Activating Devices
Working with Profiles
Device Aliases
12.
Basic Firewall Configuration
Security Level Configuration Tool
GNOME Lokkit
Activating the
iptables
Service
13.
Controlling Access to Services
Runlevels
TCP Wrappers
Services Configuration Tool
ntsysv
chkconfig
Additional Resources
14.
OpenSSH
Why Use OpenSSH?
Configuring an OpenSSH Server
Configuring an OpenSSH Client
Additional Resources
15.
Network File System (NFS)
Why Use NFS?
Mounting NFS File Systems
Exporting NFS File Systems
Additional Resources
16.
Samba
Why Use Samba?
Configuring Samba
Connecting to a Samba Share
Additional Resources
17.
Dynamic Host Configuration Protocol (DHCP)
Why Use DHCP?
Configuring a DHCP Server
Configuring a DHCP Client
Additional Resources
18.
Apache HTTP Server Configuration
Basic Settings
Default Settings
Virtual Hosts Settings
Server Settings
Performance Tuning
Saving Your Settings
Additional Resources
19.
Apache HTTP Secure Server Configuration
Introduction
An Overview of Security-Related Packages
An Overview of Certificates and Security
Using Pre-Existing Keys and Certificates
Types of Certificates
Generating a Key
Generating a Certificate Request to Send to a CA
Creating a Self-Signed Certificate
Testing Your Certificate
Accessing Your Secure Server
Additional Resources
20.
BIND Configuration
Adding a Forward Master Zone
Adding a Reverse Master Zone
Adding a Slave Zone
21.
Mail Transport Agent (MTA) Configuration
IV.
System Configuration
22.
Console Access
Disabling Shutdown Via Ctrl-Alt-Del
Disabling Console Program Access
Disabling All Console Access
Defining the Console
Making Files Accessible From the Console
Enabling Console Access for Other Applications
The
floppy
Group
23.
Time and Date Configuration
Time and Date Properties
Time Zone Configuration
24.
User and Group Configuration
Adding a New User
Modifying User Properties
Adding a New Group
Modifying Group Properties
25.
Gathering System Information
System Processes
Memory Usage
File Systems
Hardware
Additional Resources
26.
Printer Configuration
Adding a Local Printer
Adding a Remote UNIX Printer
Adding a Samba (SMB) Printer
Adding a Novell NetWare (NCP) Printer
Adding a JetDirect Printer
Selecting the Print Driver and Finishing
Printing a Test Page
Modifying Existing Printers
Saving the Configuration File
Command Line Configuration
Managing Your Print Jobs
Configuring the CUPS Printing System
Additional Resources
27.
Automated Tasks
Cron
Anacron
At and Batch
Additional Resources
28.
Log Files
Locating Log Files
Viewing Log Files
Examining Log Files
29.
Upgrading the Kernel
The 2.4 Kernel
Preparing to Upgrade
Downloading the Upgraded Kernel
Performing the Upgrade
Configuring the Boot Loader
30.
Kernel Modules
Kernel Module Utilities
Additional Resources
V.
Package Management
31.
Package Management with RPM
RPM Design Goals
Using RPM
Checking a Package's Signature
Impressing Your Friends with RPM
Additional Resources
32.
Package Management Tool
Installing Packages
Removing Packages
33.
Red Hat Network
VI.
Appendixes
A.
Building a Custom Kernel
Building a Modularized Kernel
Making an initrd Image
Configuring the Boot Loader
Building a Monolithic Kernel
Additional Resources
B.
Getting Started with Gnu Privacy Guard
An Introduction to GnuPG
Warning Messages
Generating a Keypair
Generating a Revocation Certificate
Exporting your Public Key
Importing a Public Key
What Are Digital Signatures?
Additional Resources
Index
Colophon
Next
Introduction