PythonQ 248-8XX Guide d'installation Page 1

Naviguer en ligne ou télécharger Guide d'installation pour Système de soudage PythonQ 248-8XX. PythonQ 248-8XX Installation guide Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 294
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs

Résumé du contenu

Page 1 - Reference Guide

Red Hat Linux 8.0The Official Red Hat LinuxReference Guide

Page 2

x Introduction2.1.3. Beginning Linux Books• Red Hat Linux for Dummies, 2nd Edition by Jon "maddog" Hall; IDG• Special Edition Using Red Hat

Page 3 - Table of Contents

100 Chapter 6. The X Window SystemInputDeviceConfigures an input device such as a mouse or keyboard used to submit information into the sys-tem using t

Page 4

Chapter 6. The X Window System 101• VertRefresh — Lists the vertical refresh range frequencies supported by the monitor, inkHz. These values are used

Page 5

102 Chapter 6. The X Window SystemFor more information, refer to the XF86Config man page.To review the current configuration of your XFree86 server, ty

Page 6

Chapter 6. The X Window System 103to work in that environment to commonly integrate and be used in new ways, such as permittingdrag-and-drop behavior

Page 7 - Introduction

104 Chapter 6. The X Window Systemxmodmap utility to configure the keyboard. The Xresources files are read to assign specific prefer-ence values to parti

Page 8

Chapter 6. The X Window System 105When the user finishes an X session on the default display (:0) and logs out, the/etc/X11/xdm/TakeConsole script runs

Page 9

106 Chapter 6. The X Window System• clone-self — Decides if the font server will clone a new version of itself when the client-limit is hit. By defaul

Page 10 - 3. Document Conventions

Chapter 6. The X Window System 1076.6. Additional ResourcesMuch more can be said about the XFree86 server, the clients that connect to it, and the ass

Page 11

108 Chapter 6. The X Window System• KDE 2.0 Development by David Sweet and Matthias Ettrich; Sams Publishing — Instructs be-ginning and advanced devel

Page 13 - 6. More to Come

Introduction xidisplayed in a different style on their own (such as filenames). In these cases, they are consideredto be part of the command, so the en

Page 15 - System Reference

Chapter 7.Pluggable Authentication Modules (PAM)Programs which give privileges to users must properly authenticate each user. For instance, when youlo

Page 16

112 Chapter 7. Pluggable Authentication Modules (PAM)The next four sections will describe the basic format of PAM configuration files and how they usePA

Page 17 - File System Structure

Chapter 7. Pluggable Authentication Modules (PAM) 1137.3.2. Creating ModulesNew PAM modules can be added at any time, and PAM-aware applications can t

Page 18 - 1.2.1. FHS Organization

114 Chapter 7. Pluggable Authentication Modules (PAM)A newer control flag syntax allowing for even more control is now available for PAM. Please see th

Page 19 - /usr/local/sbin."

Chapter 7. Pluggable Authentication Modules (PAM) 115This line causes the user to be asked for a password and then checks the password using the infor

Page 20 - /usr."

116 Chapter 7. Pluggable Authentication Modules (PAM)#%PAM-1.0auth required /lib/security/pam_nologin.soauth required /lib/security/pam_securetty.soau

Page 21 - 1.3. Special File Locations

Chapter 7. Pluggable Authentication Modules (PAM) 1177.8.1. Device OwnershipWhen a user logs into a machine under Red Hat Linux, the pam_console.so mo

Page 22

118 Chapter 7. Pluggable Authentication Modules (PAM)

Page 23 - The proc File System

Chapter 8.TCP Wrappers and xinetdControlling access to network services can be a challenge. Firewalls are useful for controlling accessin and out of a

Page 24 - 2.2.1. /proc/apm

xii Introductionbutton on a GUI screen or windowThis style indicates that the text will be found on a clickable button on a GUI screen. For example:Cl

Page 25 - 2.2.3. /proc/cpuinfo

120 Chapter 8. TCP Wrappers and xinetdspecifically given access to the service in hosts.allow are allowed to access the service. In addition,all rules

Page 26 - 2.2.4. /proc/devices

Chapter 8. TCP Wrappers and xinetd 121CautionThe KNOWN, UNKNOWN, and PARANOID wildcards should be used very carefully, as a disruption in nameresoluti

Page 27 - 2.2.8. /proc/filesystems

122 Chapter 8. TCP Wrappers and xinetdspecial file or email an administrator. Below is an example of a booby trap in the hosts.deny filewhich will write

Page 28 - 2.2.9. /proc/interrupts

Chapter 8. TCP Wrappers and xinetd 123instances of this service is under a particular threshold, and any other rules specified for that serviceor all x

Page 29 - 2.2.11. /proc/ioports

124 Chapter 8. TCP Wrappers and xinetd• EXIT — Logs the exit status or termination signal of the service. (log_on_success)• HOST — Logs the remote hos

Page 30 - 2.2.13. /proc/kcore

Chapter 8. TCP Wrappers and xinetd 1258.3.1.3. Access Control within xinetdUsers of xinetd services can choose to use the TCP wrapper host access cont

Page 31 - 2.2.17. /proc/locks

126 Chapter 8. TCP Wrappers and xinetd8.3.1.4. Binding and Port RedirectionThe service configuration files for xinetd also support binding the service t

Page 32 - 2.2.19. /proc/meminfo

Chapter 8. TCP Wrappers and xinetd 1278.4. Additional ResourcesAdditional information concerning TCP wrappers and xinetd is available on system docume

Page 33 - 2.2.21. /proc/modules

128 Chapter 8. TCP Wrappers and xinetd

Page 34 - 2.2.24. /proc/partitions

Chapter 9.SSH ProtocolSSH™ allows users to log into host systems remotely. Unlike rlogin or telnet SSH encrypts thelogin session, making it impossible

Page 35 - 2.2.25. /proc/pci

Introduction xiiiImportantIf you modify the DHCP configuration file, the changes will not take effect until you restart the DHCPdaemon.CautionDo not per

Page 36 - 2.2.27. /proc/stat

130 Chapter 9. SSH Protocol9.1.1. Why Use SSH?Nefarious computer users have a variety of tools at their disposal to disrupt, intercept, and re-routene

Page 37 - 2.3. Directories in /proc/

Chapter 9. SSH Protocol 131Both SSH protocol versions 1 and 2 add layers of security with each of these layers providing its owntype of protection.9.3

Page 38

132 Chapter 9. SSH ProtocolServers can be configured to allow different types of authentication, which gives each side the opti-mal amount of control.

Page 39 - 2.3.2. /proc/bus/

Chapter 9. SSH Protocol 133• ssh_host_key.pub — The RSA public key used by the sshd daemon for version 1 of the SSHprotocol.• ssh_host_rsa_key — The R

Page 40 - 2.3.4. /proc/fs

134 Chapter 9. SSH Protocol9.5.2. Port ForwardingWith SSH you can secure otherwise insecure TCP/IP protocols via port forwarding. When using thistechn

Page 41 - 2.3.5. /proc/ide/

Chapter 9. SSH Protocol 1359.6. Require SSH for Remote ConnectionsFor SSH to be truly effective in protecting your network connections, you must stop

Page 42 - 2.3.7. /proc/net/

136 Chapter 9. SSH Protocol

Page 43 - 2.3.8. /proc/scsi/

Chapter 10.KerberosKerberos is a network authentication protocol created by MIT which uses secret-key cryptography —obviating the need to send passwor

Page 44

138 Chapter 10. Kerberos10.3. Kerberos TerminologyLike any other system, Kerberos has its own terminology to define various aspects of the service.Befo

Page 45 - 2.3.9. /proc/sys/

Chapter 10. Kerberos 139ticketA temporary set of electronic credentials that verify the identity of a client for a particular service.Ticket Granting

Page 46 - Section 2.4

xiv Introduction6.1. We Need Feedback!If you find an error in the Official Red Hat Linux Reference Guide, or if you have thought of away to make this ma

Page 47 - 57411 52939 45 0 0 0

140 Chapter 10. KerberosNoteKerberos depends on certain network services to work correctly. First, Kerberos requires approximateclock synchronization

Page 48

Chapter 10. Kerberos 141KDC from kerberos.example.com to the name of your Kerberos server. By convention,all realm names are uppercase and all DNS hos

Page 49

142 Chapter 10. KerberosOnce you have completed the steps listed above, the Kerberos server should be up and running. Next,we will set up a Kerberos c

Page 50

Chapter 10. Kerberos 14310.8.1. Installed Documentation• /usr/share/doc/krb5-server- version-number — The Kerberos V5 Installation Guideand the Kerber

Page 51 - 2.3.11. /proc/tty/

144 Chapter 10. Kerberos

Page 52 - 2.4. Using sysctl

Chapter 11.TripwireTripwire data integrity assurance software monitors the reliability of critical system files and directo-ries by identifying changes

Page 53 - 2.5. Additional Resources

146 Chapter 11. Tripwire1. Install Tripwire and customize the policy file.Install the tripwire RPM (Section 11.2). Then, customize the sample configurat

Page 54

Chapter 11. Tripwire 1472. If the CD-ROM does not automatically mount, type the following command:mount /mnt/cdrom3. Verify that the tripwire RPM is o

Page 55 - Chapter 3

148 Chapter 11. Tripwire• EDITOR — Specifies the text editor called by Tripwire. The default value is /bin/vi.• LATEPROMPTING — If set to true this var

Page 56 - 3.2.2. The Boot Loader

Chapter 11. Tripwire 149WarningFor security purposes, you should either delete or store in a secure location any copies of the plaintext /etc/tripwire

Page 58

150 Chapter 11. Tripwirean initial integrity check. This check should be done prior to connecting the computer to the network,and putting it into prod

Page 59 - Web server

Chapter 11. Tripwire 151Database file used: /var/lib/tripwire/some.host.com.twdCommand line used: /usr/sbin/tripwire --check==========================

Page 60 - 3.5. SysV Init

152 Chapter 11. Tripwire/bin/arch-rwxr-xr-x root (0) 2844 Tue Dec 12 05:51:35 2000/bin/ash-rwxr-xr-x root (0) 64860 Thu Dec 7 22:35:05 2000/bin/ash.st

Page 61 - 3.6. Init Runlevels

Chapter 11. Tripwire 153ImportantIt is important that you change only authorized integrity violations in the database.All proposed updates to the Trip

Page 62 - 3.6.1. Initscript Utilities

154 Chapter 11. TripwireThen type the following command to create a new database using the updated policy file:/usr/sbin/tripwire --initTo make sure th

Page 63 - /etc/sysconfig/ Directory

Chapter 11. Tripwire 155Since the configuration file does not not alter any Tripwire policies or files tracked by the application,it is not necessary to

Page 64 - • USEMD5=

156 Chapter 11. Tripwire/etc/tripwire/tw.polThe active Tripwire policy file is an encrypted file containing comments, rules, directives, andvariables. T

Page 65 - DESKTOP="GNOME"

Network Services Reference

Page 67

Chapter 12.Network ScriptsUsing Red Hat Linux, all network communications occur between configured interfaces and physicalnetworking devices connected

Page 69

160 Chapter 12. Network Scriptsconfigure them. These files are usually named ifcfg- name , where name refers to the nameof the device that the configurat

Page 70

Chapter 12. Network Scripts 161• yes — This device should be activated at boot-time.• no — This device should not be activated at boot-time.• PEERDNS=

Page 71 - /dev/raw/raw2 8 5

162 Chapter 12. Network Scripts• yes — This interface will allow pppd to initiate a connection when someone attempts to use it.• no — A connection mus

Page 72 - • CARDTYPE=

Chapter 12. Network Scripts 163WarningNever edit the loopback interface script, /etc/sysconfig/network-scripts/ifcfg-lo, by hand.Doing so can prevent

Page 73 - • DEVICE=

164 Chapter 12. Network ScriptsThe two interface control scripts are ifdown and ifup and are symbolic links to scripts in the /sbin/directory. When ei

Page 74

Chapter 12. Network Scripts 165The most common network functions file is network-functions, located in the/etc/sysconfig/network-scripts/ directory. Th

Page 75 - 3.8. Shutting Down

166 Chapter 12. Network Scripts

Page 76

Chapter 13.Firewalls and iptablesLinux comes with advanced tools for packet filtering — the process of controlling network packetsas they enter, move t

Page 77 - Boot Loaders

168 Chapter 13. Firewalls and iptables• OUTPUT — This chain applies to packets sent out via the same network interface which receivedthe packets.• FOR

Page 78 - 4.3. Installing GRUB

Chapter 13. Firewalls and iptables 169packets. For this reason, you must be sure to place the rule designed to catch a particular packet inthe rule th

Page 79 - 4.4. GRUB Terminology

Chapter 1.File System Structure1.1. Why Share a Common Structure?An operating system’s file system structure is its most basic level of organization. A

Page 80 - 4.5. GRUB Interfaces

170 Chapter 13. Firewalls and iptables13.3.2. StructureMany iptables commands have the following structure:iptables [-t table-name ] command chain-nam

Page 81 - 4.6. GRUB Commands

Chapter 13. Firewalls and iptables 171CautionBe aware of which option (-A or -I) you are using when adding a rule. The order of the rules canbe very i

Page 82

172 Chapter 13. Firewalls and iptablesiptables man page for more information on these and other targets, including rules regardingtheir use.You may al

Page 83

Chapter 13. Firewalls and iptables 173Like many other options, using the exclamation point character (!) after --tcp-flags reverses theeffect of the m

Page 84 - 4.8. LILO

174 Chapter 13. Firewalls and iptables• INVALID — The matching packet cannot be tied to a known connection.• NEW — The matching packet is either creat

Page 85 - 4.8.2. LILO vs. GRUB

Chapter 13. Firewalls and iptables 175• --log-prefix — Places a string before the log line when it is written. Accepts up to 29characters after the --

Page 86

176 Chapter 13. Firewalls and iptablessystem’s version of this file. This allows you to quickly distribute sets of iptables rules to manydifferent mach

Page 87 - 4.11. Additional Resources

Chapter 14.Apache HTTP ServerThe Apache HTTP Server is a robust, commercial-grade open source Web server developed by theApache Software Foundation (h

Page 88 - 88 Chapter 4. Boot Loaders

178 Chapter 14. Apache HTTP ServerA more complete list complete list of changes can be found online at http://httpd.apache.org/docs-2.0/.14.1.2. Packa

Page 89 - Users and Groups

Chapter 14. Apache HTTP Server 179it to suit; however, some parts of the file have changed more than others and a mixed approach isgenerally the best.

Page 90

18 Chapter 1. File System Structure1.2.1. FHS OrganizationThe directories and files noted here are a small subset of those specified by the FHS document

Page 91 - 5.3. Standard Groups

180 Chapter 14. Apache HTTP Server14.2.1.2. Server-pool Size RegulationIn Apache HTTP Server 2.0, the responsibility for accepting requests and dispat

Page 92 - 5.4. User Private Groups

Chapter 14. Apache HTTP Server 181• LoadModule lines for modules packaged in their own RPMs (mod_ssl, php, mod_perl, and thelike) are no longer necess

Page 93 - /usr/sbin/groupadd emacs

182 Chapter 14. Apache HTTP Server14.2.2.2. LoggingThe following logging directives have been removed:• AgentLog• RefererLog• RefererIgnoreHowever, ag

Page 94 - 5.5. Shadow Utilities

Chapter 14. Apache HTTP Server 183For more on this topic, refer to the following documentation on the Apache Software Foundation’swebsite:• http://htt

Page 95

184 Chapter 14. Apache HTTP Server14.2.4.1. The mod_ssl ModuleThe configuration for mod_ssl has been moved from httpd.conf into the file/etc/httpd/conf.

Page 96

Chapter 14. Apache HTTP Server 18514.2.4.3. The mod_include ModuleThe mod_include module is now implemented as a filter (see Section 14.2.4 for more on

Page 97 - The X Window System

186 Chapter 14. Apache HTTP ServerAction dbmmanage command(Apache 1.3)Equivalent htdbmcommand (Apache 2.0)Add user to database (usinggiven password)db

Page 98 - 6.2. XFree86

Chapter 14. Apache HTTP Server 18714.2.4.6. The mod_python ModuleThe configuration for mod_python; has been moved from httpd.conf into the file/etc/http

Page 99

188 Chapter 14. Apache HTTP ServerNoteRed Hat, Inc. does not ship FrontPage extensions as the Microsoft™ license prohibits the inclusionof these exten

Page 100

Chapter 14. Apache HTTP Server 189NoteIf you are running the Apache HTTP Server as a secure server, you will be prompted for the secureserver’s passwo

Page 101

Chapter 1. File System Structure 191.2.1.6. The /proc DirectoryThe /proc directory contains special "files" that either extract information f

Page 102 - 6.3.2. Desktop Environments

190 Chapter 14. Apache HTTP Server14.5.3. PidFilePidFile names the file where the server records its process ID (pid). Your Web server is set to record

Page 103 - 6.4. Runlevels

Chapter 14. Apache HTTP Server 191Your server’s default MinSpareServers is 5; your server’s default MaxSpareServers is 20. Thesedefault settings shoul

Page 104 - 6.4.2. Runlevel 5: prefdm

192 Chapter 14. Apache HTTP Server14.5.15. LoadModuleLoadModule is used to load in Dynamic Shared Object (DSO) modules. More information on the theApa

Page 105 - 6.5. Fonts

Chapter 14. Apache HTTP Server 19314.5.19. GroupThe Group directive is similar to the User. The Group sets the group under which the server willanswer

Page 106 - 6.5.2. Adding Fonts

194 Chapter 14. Apache HTTP ServerUsing Directory tags, the DocumentRoot is defined to have less rigid parameters, so that HTTPrequests can be served f

Page 107 - 6.6. Additional Resources

Chapter 14. Apache HTTP Server 19514.5.27. AllowAllow specifies which requester can access a given directory. The requester can be all, a domainname, a

Page 108

196 Chapter 14. Apache HTTP Server14.5.32. CacheNegotiatedDocsBy default, your Web server asks proxy servers not to cache any documents which were neg

Page 109 - Security Reference

Chapter 14. Apache HTTP Server 197other words, after a reverse lookup is performed, a forward lookup is performed on the result. At leastone of the IP

Page 110

198 Chapter 14. Apache HTTP ServerauthuserIf authentication was required, this is the username with which the user identified herself. Usu-ally, this i

Page 111 - Chapter 7

Chapter 14. Apache HTTP Server 199See Section 14.5.59 and Section 14.5.23 for instructions on how to execute CGI scripts in directoriesother than the

Page 112 - 7.3. PAM Modules

Red Hat Linux 8.0: The Official Red Hat Linux Reference GuideCopyright © 2002 by Red Hat, Inc.Red Hat, Inc.1801 Varsity DriveRaleigh NC 27606-2072 USAP

Page 113 - 7.4. PAM Module Control Flags

20 Chapter 1. File System Structurethat are not designed to be directly utilized by users or shell scripts. The libexec directory containssmall helper

Page 114 - 7.6. PAM Module Arguments

200 Chapter 14. Apache HTTP Server14.5.49. AddIconAddIcon tells the server which icon to show in server generated directory listings for certain file t

Page 115

Chapter 14. Apache HTTP Server 20114.5.56. AddLanguageAddLanguage associates filename extensions with specific content languages. This directive is most

Page 116 - 7.8. PAM and Device Ownership

202 Chapter 14. Apache HTTP Server14.5.61. MetaDirMetaDir specifies the name of a directory where your Web server should look for files containingmeta i

Page 117 - 7.9. Additional Resources

Chapter 14. Apache HTTP Server 203# Deny from all# Allow from .your_domain.com#/LocationAgain, you must fill in .your_domain.com.14.5.66. ProxyRequests

Page 118

204 Chapter 14. Apache HTTP ServerNoteAny name-based virtual hosts you set up will only work with non-secure HTTP connections as youcannot use name-ba

Page 119 - TCP Wrappers and xinetd

Chapter 14. Apache HTTP Server 20514.6. Default ModulesThe Apache HTTP Server is distributed with a number of modules. By default the following module

Page 120 - 8.2.1. Formatting Rules

206 Chapter 14. Apache HTTP ServerA sample LoadModule line looks like this:LoadModule access_module modules/mod_access.soIf you add or delete modules

Page 121 - EXCEPT operators

Chapter 14. Apache HTTP Server 207The configuration directives for your secure server are contained within virtual host tags in the/etc/httpd/conf.d/ss

Page 122

208 Chapter 14. Apache HTTP Server14.9. Additional ResourcesTo learn more about the Apache HTTP Server, refer to the following resources.14.9.1. Usefu

Page 123 - /etc/xinetd.conf

Chapter 15.EmailEmail is one of the most widely used services on the Internet. Red Hat Linux offers many ways toserve and access email, whether you ar

Page 124

Chapter 1. File System Structure 21|- named|- nis|- opt|- preserve|- run+- spool|- anacron|- at|- cron|- fax|- lpd|- mail|- mqueue|- news|- rwho|- sam

Page 125

210 Chapter 15. Emailthe message on the email server after it has been successfully transferred to the client’s system, thoughthis can usually be chan

Page 126

Chapter 15. Email 211particular mail server using the VRFY command or expand a mailing list using the EXPN command.Email can also be relayed between t

Page 127 - 8.4. Additional Resources

212 Chapter 15. EmailMany of the larger and more complex MUAs can also be used to send email. However, this actionshould not be confused with the acti

Page 128

Chapter 15. Email 213which grew out of an earlier email delivery system called Delivermail, quickly became the standardas the email began to expand an

Page 129 - SSH Protocol

214 Chapter 15. EmailFor example, if you want all email addressed to any domain.com account to be delivered to<[email protected]>, you need to

Page 130 - 9.3. Layers of SSH Security

Chapter 15. Email 215In this situation, the sendmail server needs to masquerade the machine names on the company networkso that their return address i

Page 131 - 9.3.2. Authentication

216 Chapter 15. Email15.3.6. Using Sendmail with LDAPUsing the Lightweight Directory Access Protocol (LDAP) is a very quick and powerful way to findspe

Page 132 - 9.3.3. Connection

Chapter 15. Email 21715.4.1. Fetchmail Configuration OptionsAlthough it is possible to pass all options on the command line necessary to check for emai

Page 133 - 9.5. More Than a Secure Shell

218 Chapter 15. EmailWhile you can set up your .fetchmailrc file manually, it is much easier to let the included fetch-mailconf program do it for you.

Page 134 - 9.5.2. Port Forwarding

Chapter 15. Email 219• limit max-number-bytes — Allows you to specify that only messages below a particularsize may be retrieved. This option is usefu

Page 135

22 Chapter 1. File System StructureThe /var/spool/up2date/ directory contains files used by Red Hat Update Agent, includingRPM header information for t

Page 136 - 136 Chapter 9. SSH Protocol

220 Chapter 15. Email• --quit — Quits the Fetchmail daemon process.More commands and .fetchmailrc options can be found on the fetchmail man page.15.5.

Page 137 - Kerberos

Chapter 15. Email 221Many environment variables are not used by most Procmail users, and many of the more importantenvironment variables are already d

Page 138 - 10.3. Kerberos Terminology

222 Chapter 15. EmailA thorough explanation of regular expressions is beyond the scope of this chapter. The structure ofProcmail recipes is more impor

Page 139 - 10.4. How Kerberos Works

Chapter 15. Email 223To ensure that the action on this last previous matching recipe was successfully completed beforeallowing a match on the current

Page 140 - 10.5. Kerberos and PAM

224 Chapter 15. Email• $ — Refers to a variable set earlier in the rc file. This is usually used to set a common mailbox thatwill be referred to by var

Page 141

Chapter 15. Email 225:0:* ^(From|CC|To).*tux-lugtuxlugAny messages sent from the [email protected] mailing list will be placed in the tuxlug mail-box

Page 142 - 10.8. Additional Resources

226 Chapter 15. Email15.6.2. Secure Email ServersOffering SSL encryption to IMAP and POP users on the email server is almost as easy. Red Hat Linuxals

Page 143 - 10.8.2. Useful Websites

Chapter 15. Email 227• /usr/share/doc/fetchmail- version-number — Contains a full list of Fetchmail fea-tures in the FEATURES file and an introductory

Page 144 - 144 Chapter 10. Kerberos

228 Chapter 15. Email• Removing the Spam: Email Processing and Filtering by Geoff Mulligan; Addison-Wesley Publish-ing Company — A volume that looks a

Page 145 - Tripwire

Chapter 16.Berkeley Internet Name Domain (BIND)Today, the Internet and almost all local networks depend upon a working and reliable Domain NameService

Page 146

Chapter 2.The proc File SystemThe Linux kernel has two primary functions: to control access to physical devices on the computerand to schedule when an

Page 147 - 11.3. Customizing Tripwire

230 Chapter 16. Berkeley Internet Name Domain (BIND)When looking at how a FQDN is resolved to find the IP address that relates to a particular system,y

Page 148 - /etc/tripwire/twpol.txt

Chapter 16. Berkeley Internet Name Domain (BIND) 231The /etc/named.conf file must be free of errors in order for named to start. While some erroneousop

Page 149 - /usr/sbin/tripwire --init

232 Chapter 16. Berkeley Internet Name Domain (BIND)When used with other /etc/named.conf statements and their options, acl statements can bevery usefu

Page 150

Chapter 16. Berkeley Internet Name Domain (BIND) 233• allow-recursion — Similar to allow-query, except it applies to recursive queries. By de-fault, a

Page 151

234 Chapter 16. Berkeley Internet Name Domain (BIND)statements are listed is important, as the first view statement that matches a particular client’s

Page 152 - EDITOR line of the

Chapter 16. Berkeley Internet Name Domain (BIND) 235nameservers use only few of them. The following zone statements are very basic examples that canbe

Page 153 - Important

236 Chapter 16. Berkeley Internet Name Domain (BIND)For example, a zone file may contains the following line:$ORIGIN domain.comAt this point, any names

Page 154 - 11.8.1. Tripwire and Email

Chapter 16. Berkeley Internet Name Domain (BIND) 237over others. The MX resource record with the lowest preference-value is preferred overthe others,

Page 155 - 11.10.1. Tripwire Components

238 Chapter 16. Berkeley Internet Name Domain (BIND)Seconds Other Time Units60 1M1800 30M3600 1H10800 3H21600 6H43200 12H86400 1D259200 3D604800 1WTab

Page 156 - 11.11. Additional Resources

Chapter 16. Berkeley Internet Name Domain (BIND) 239In this example, standard directives and SOA values are used. The authoritative nameservers are se

Page 157 - Network Services Reference

24 Chapter 2. The proc File SystemWhen viewing different virtual files in the /proc/ file system, you will notice some of the informationis easily under

Page 158

240 Chapter 16. Berkeley Internet Name Domain (BIND)address to be reversed and ".in-addr.arpa" to be included after them. This allows the si

Page 159 - Network Scripts

Chapter 16. Berkeley Internet Name Domain (BIND) 24116.3.1.2. /etc/rndc.confYou need to add the following lines to /etc/rndc.conf if rndc is to automa

Page 160 - 12.2.1. Ethernet Interfaces

242 Chapter 16. Berkeley Internet Name Domain (BIND)• stats — Dumps the current named stats to the /var/named/named.stats file.• stop — Stops the serve

Page 161 - 12.2.2. Dialup Interfaces

Chapter 16. Berkeley Internet Name Domain (BIND) 24316.4.2. Multiple ViewsThrough the use of the view statement in /etc/named.conf, BIND allows you to

Page 162 - 12.2.3. Other Interfaces

244 Chapter 16. Berkeley Internet Name Domain (BIND)• Remember to place dots (.) in zone files after all FQDNs and omit them on hostnames.The dot denot

Page 163 - 12.2.4. Alias and Clone Files

Chapter 16. Berkeley Internet Name Domain (BIND) 245• http://www.redhat.com/mirrors/LDP/HOWTO/DNS-HOWTO.html — Covers the use of BIND asa resolving, c

Page 164 - 12.4. Network Functions

246 Chapter 16. Berkeley Internet Name Domain (BIND)

Page 165 - 12.5. Additional Resources

Chapter 17.Network File System (NFS)NFS (Network File System) exists to allow hosts to mount partitions on a remote system and use themas though they

Page 166

248 Chapter 17. Network File System (NFS)permitted or prevented access to the NFS server. For more information on configuring accesscontrols with TCP w

Page 167 - Firewalls and iptables

Chapter 17. Network File System (NFS) 249100005 3 tcp 1106 mountd100003 2 udp 2049 nfs100003 3 udp 2049 nfs100021 1 udp 1028 nlockmgr100021 3 udp 1028

Page 168

Chapter 2. The proc File System 25Running the apm -v command on such a system results in output similar to this:APM BIOS 1.2 (kernel driver 1.16)AC on

Page 169 - 13.3.1. Tables

250 Chapter 17. Network File System (NFS)17.2.1. /etc/exportsThe /etc/exports file is the standard for controlling which file systems are exported to wh

Page 170 - 13.3.3. Commands

Chapter 17. Network File System (NFS) 251However, be careful when using wildcards with fully qualified domain names, as they tend to bemore exact than

Page 171 - 13.3.4. Parameters

252 Chapter 17. Network File System (NFS)The options area specifies how the file system is to be mounted. For example, if the options areastates rw,suid

Page 172 - 13.3.5. Match Options

Chapter 17. Network File System (NFS) 253This line states that any directory a user tries to access under the local /home directory (due to theasteris

Page 173

254 Chapter 17. Network File System (NFS)17.4.1. Host AccessNFS controls who can mount an exported file system based on the host making the mount reque

Page 174 - 13.3.6. Target Options

Chapter 17. Network File System (NFS) 255• fstab — Gives details for the format of the /etc/fstab file used to mount file systems atsystem boot.• nfs —

Page 175 - 13.3.7. Listing Options

256 Chapter 17. Network File System (NFS)

Page 176 - 13.5. Additional Resources

Chapter 18.Lightweight Directory Access Protocol (LDAP)Lightweight Directory Access Protocol (LDAP) is a set of open protocols used to access centrall

Page 177 - Apache HTTP Server

258 Chapter 18. Lightweight Directory Access Protocol (LDAP)• Updated C API — Improves the way programmers can connect to and use the application.• LD

Page 178

Chapter 18. Lightweight Directory Access Protocol (LDAP) 259• ldapsearch — Searches for entries in the LDAP directory using a shell prompt.• ldapdelet

Page 179

26 Chapter 2. The proc File System• processor — Provides each processor with an identifying number. If you only have one processor,you will only see a

Page 180

260 Chapter 18. Lightweight Directory Access Protocol (LDAP)18.3. LDAP TerminologyAn entry is one unit in an LDAP directory. Each entry is identified b

Page 181 - UserDir public_html

Chapter 18. Lightweight Directory Access Protocol (LDAP) 261• /etc/openldap/slapd.conf — This is the configuration file for the slapd daemon. See Sec-ti

Page 182

262 Chapter 18. Lightweight Directory Access Protocol (LDAP)TipIf you are using the slapadd command-line tool locally to populate the LDAP directory,

Page 183

Chapter 18. Lightweight Directory Access Protocol (LDAP) 263The basic steps for creating an LDAP server are as follows:1. Install the openldap, openld

Page 184

264 Chapter 18. Lightweight Directory Access Protocol (LDAP)18.7.2.2. On the Clients, Edit /etc/ldap.conf and /etc/openldap/ldap.confOn all client mac

Page 185

Chapter 18. Lightweight Directory Access Protocol (LDAP) 265Existing name service Is LDAPrunning?Script to Use/etc flat files yes migrate_all_online.sh/

Page 186

266 Chapter 18. Lightweight Directory Access Protocol (LDAP)18.8.3. Related Books• Implementing LDAP by Mark Wilcox; Wrox Press, Inc.• Understanding a

Page 189 - 14.5.2. LockFile

Appendix A.General Parameters and ModulesThis appendix is provided to illustrate some of the possible parameters available for some commonhardware dev

Page 190

Chapter 2. The proc File System 27The other difference is that block devices can send and receive information in blocks of a size config-ured per devic

Page 191 - 14.5.14. Include

270 Appendix A. General Parameters and ModulesNoteOnly use one method, and not both, when loading a module with particular parameters.CautionWhen a pa

Page 192 - 14.5.16. IfDefine

Appendix A. General Parameters and Modules 271Hardware Module ParametersISP16, MAD16, or Mozartsound card CD-ROM interface(OPTi 82C928 and OPTi82C929)

Page 193 - 14.5.23. Directory

272 Appendix A. General Parameters and ModulesNoteMost newer Sound Blaster cards come with IDE interfaces. For these cards, you do not need to usesbpc

Page 194 - 14.5.26. Order

Appendix A. General Parameters and Modules 273Hardware Module ParametersACARD ATP870U PCI SCSIControlleratp870u.oCompaq Smart Array 5300Controllerccis

Page 195 - 14.5.31. AccessFileName

274 Appendix A. General Parameters and ModulesHardware Module ParametersNCR SCSI controllers with810/810A/815/825/825A/860/875/876/895chipsetsncr53c8x

Page 196

Appendix A. General Parameters and Modules 275Configuration ExampleFuture Domain TMC-800 at CA000, IRQ 10 controller_type=2 base_address=0xca000irq=10T

Page 197 - 14.5.41. CustomLog

276 Appendix A. General Parameters and ModulesHardware Module ParametersCrystalSemiconductorCS89[02]0cs89x0.oEtherWORKS DE425TP/COAX EISA, DE434TP PCI

Page 198 - 14.5.44. ScriptAlias

Appendix A. General Parameters and Modules 277Hardware Module ParametersIntel EtherExpress 16(i82586)eexpress.o eexpress=io_port,IRQ OR eexpressio=io_

Page 199 - 14.5.48. AddIconByType

278 Appendix A. General Parameters and ModulesHardware Module ParametersMiCom-Interlan NI5010 ni5010.oNI5210 card (i82586Ethernet chip)ni52.o ni52=io_

Page 200

Appendix A. General Parameters and Modules 279Hardware Module ParametersWD8003 andWD8013-compatibleEthernet cardswd.o wd=io_port,IRQ,mem, mem_end OR w

Page 201 - 14.5.60. Action

28 Chapter 2. The proc File SystemThe first column signifies whether the file system is mounted on a block device. Those beginning withnodev are not moun

Page 202 - 14.5.65. Location

280 Appendix A. General Parameters and Modules

Page 203 - 14.5.69. NameVirtualHost

IndexSymbols.fetchmailrc, 217global options, 218server options, 218user options, 218.procmailrc, 220/dev directory, 18/etc directory, 18/etc/exports,

Page 204 - 14.5.71. SetEnvIf

282BBasic Input/Output System(See BIOS)Berkeley Internet Name Domain(See BIND)BINDadditional resources, 244installed documentation, 244related books,

Page 205 - 14.6. Default Modules

283DefaultIcon, 200DefaultType, 196Deny, 195Directory, 193DirectoryIndex, 195DocumentRoot, 193ErrorDocument, 202ErrorLog, 197ExtendedStatus, 192for ca

Page 206 - 14.8. Using Virtual Hosts

284changing, 206changing shared, 207DoS(See Denial of Service)DoS attack(See Denial odf Service attack)drag and drop, xiiidrivers(See kernel modules)D

Page 207 - NameVirtualHost *

285useful websites, 87boot process, 77changing runlevels with, 81, 86commands, 81configuration file/boot/grub/grub.conf, 83structure, 83definition of, 77

Page 208 - 14.9. Additional Resources

286KKDE, 102(See Also XFree86)KeepAliveApache configuration directive, 190KeepAliveTimeoutApache configuration directive, 190Kerberosadditional resource

Page 209 - Chapter 15

287(See Also LILO)ListenApache configuration directive, 191LoadModuleApache configuration directive, 192LocationApache configuration directive, 202LockFi

Page 210 - 15.1.3. SMTP

288(See kernel modules)non-secure Web serverdisabling, 207ntsysv, 62(See Also services)Oobjects, dynamically shared(See DSOs)OpenLDAP(See LDAP)OpenSSH

Page 211 - 15.2.2. Mail Transfer Agent

289/proc/uptime, 37/proc/version, 37additional resources, 53installed documentation, 53useful websites, 53changing files within, 24, 45, 52files within,

Page 212 - 15.3. Sendmail

Chapter 2. The proc File System 292.2.10. /proc/iomemThis file shows you the current map of the system’s memory for each physical device:00000000-0009f

Page 213

290(See Also LDAP)slappasswd command, 258(See Also LDAP)slave nameserver(See BIND)slurpd command, 258(See Also LDAP)SSH protocol, 129authentication, 1

Page 214 - /etc/mail/sendmail.cf

291additional resources, 156installed documentation, 156useful websites, 156applications, 155tripwire, 155tripwire-check, 150twadmin, 153, 154, 155twi

Page 215

XX(See XFree86)X Window System(See XFree86)X.500(See LDAP)X.500 Lite(See LDAP)XFree86additional resources, 107installed documentation, 107related book

Page 216 - 15.4. Fetchmail

ColophonThe Official Red Hat Linux manuals are written in DocBook SGML v4.1 format. The HTML andPDF formats are produced using custom DSSSL stylesheets

Page 218

Table of ContentsIntroduction...

Page 219

30 Chapter 2. The proc File System2.2.12. /proc/isapnpThis file lists Plug and Play (PnP) cards in ISA slots on the system. This is most often seen wit

Page 220 - 15.5. Procmail

Chapter 2. The proc File System 312.2.14. /proc/kmsgThis file is used to hold messages generated by the kernel. These messages are then picked up by ot

Page 221 - 15.5.2. Procmail Recipes

32 Chapter 2. The proc File System2.2.18. /proc/mdstatThis file contains the current information for multiple-disk, RAID configurations. If your system

Page 222

Chapter 2. The proc File System 33• MemFree — The amount of physical RAM, in kilobytes, left unused by the system.• MemShared — Unused with 2.4 and hi

Page 223

34 Chapter 2. The proc File System(0). The final column states if the module can unload itself automatically after a period without use(autoclean) or i

Page 224 - /dev/null

Chapter 2. The proc File System 352.2.25. /proc/pciThis file contains a full listing of every PCI device on your system. Depending on the number of PCI

Page 225 - 15.6. Security

36 Chapter 2. The proc File System2.2.26. /proc/slabinfoThis file gives information about memory usage on the slab level. Linux kernels greater than 2.

Page 226 - 15.7. Additional Resources

Chapter 2. The proc File System 372.2.28. /proc/swapsThis file measures swap space and its utilization. For a system with only one swap partition, the

Page 227 - 15.7.3. Related Books

38 Chapter 2. The proc File SystemThese directories are called process directories, as they are named after a program’s process ID andcontain informat

Page 228

Chapter 2. The proc File System 394. Number of pages are code5. Number of pages of data/stack6. Number of pages of library7. Number of dirty pages• st

Page 229 - Chapter 16

6.4. Runlevels... 1036.5. Fonts...

Page 230 - 16.2. BIND Configuration Files

40 Chapter 2. The proc File SystemSo, for example, a system with a USB bus but no USB devices connected to it has a /proc/bus/usb/directory containing

Page 231 - 16.2.1. /etc/named.conf

Chapter 2. The proc File System 412.3.5. /proc/ide/This directory holds information about IDE devices on the system. Each IDE channel is representedas

Page 232 - • include "

42 Chapter 2. The proc File System• model — The model name or number of the device.• settings — A collection of current parameters of the device. This

Page 233 - • view "

Chapter 2. The proc File System 43• dev_mcast — Displays the various Layer2 multicast groups each device is listening to.• igmp — Lists the IP multica

Page 234 - • zone "

44 Chapter 2. The proc File Systemmegaraid directories are present, as those two drivers are being utilized. The files in each of thedirectories typica

Page 235 - 16.2.2. Zone Files

Chapter 2. The proc File System 45controller is communicating with the CD-ROM at 20 megabytes per second, while the tape drive isonly connected at 10

Page 236

46 Chapter 2. The proc File SystemNoteAny configuration changes you make using the echo command will disappear when the system isrestarted. To make you

Page 237

Chapter 2. The proc File System 47• dentry-state — Provides the status of the directory cache. The file looks similar to this:57411 52939 45 0 0 0The fi

Page 238

48 Chapter 2. The proc File Systemprocesses are stored in non-swappable kernel memory. Any increase in msgmax would increaseRAM requirements for the s

Page 239

Chapter 2. The proc File System 49• threads-max — Sets the maximum number of threads to be used by the kernel, with a defaultvalue of 2048.• version —

Page 240 - 16.3. Using rndc

III. Network Services Reference ... 15712. Network Sc

Page 241

50 Chapter 2. The proc File System• icmp_echo_ignore_all and icmp_echo_ignore_broadcasts — Allows the kernel to ignoreICMP ECHO packets from every hos

Page 242

Chapter 2. The proc File System 51• kswapd — Sets various values concerned with the kernel swap-out daemon, kswapd. This file hasthree values:512 32 8T

Page 243 - 16.4.4. IP version 6

52 Chapter 2. The proc File Systempty_master /dev/ptm 128 0-255 pty:masterpty_slave /dev/ttyp 3 0-255 pty:slavepty_master /dev/pty 2 0-255 pty:master/

Page 244 - 16.6. Additional Resources

Chapter 2. The proc File System 532.5. Additional ResourcesBelow are additional sources of information about /proc/.2.5.1. Installed DocumentationMost

Page 245 - 16.6.3. Related Books

54 Chapter 2. The proc File System

Page 246

Chapter 3.Boot Process, Init, and ShutdownAn important and powerful aspect of Red Hat Linux is the open method it uses for starting and stop-ping the

Page 247 - Network File System (NFS)

56 Chapter 3. Boot Process, Init, and ShutdownOnce loaded, the BIOS tests the system, looks for and checks peripherals and then locates a validdevice

Page 248 - 17.1.1. NFS and portmap

Chapter 3. Boot Process, Init, and Shutdown 57If you need to alter the command line arguments to the kernel, see Chapter 4. For information onchanging

Page 249

58 Chapter 3. Boot Process, Init, and ShutdownNext, the init command sets the source function library, /etc/rc.d/init.d/functions, for thesystem. This

Page 250 - 17.2.1. /etc/exports

Chapter 3. Boot Process, Init, and Shutdown 59S40atd -> ../init.d/atdS45pcmcia -> ../init.d/pcmciaS55sshd -> ../init.d/sshdS56rawdevices ->

Page 251 - 17.3.1. /etc/fstab

IV. Appendixes ... 267A.

Page 252 - 17.3.2. autofs

60 Chapter 3. Boot Process, Init, and ShutdownAfter the init command has progressed through the appropriate rc directory for the runlevel, the/etc/ini

Page 253 - 17.4. Securing NFS

Chapter 3. Boot Process, Init, and Shutdown 61The init.d directory contains the scripts used by the init command when controlling services.Each of the

Page 254 - 17.5. Additional Resources

62 Chapter 3. Boot Process, Init, and Shutdownthem to quickly move in and out of their custom configuration without disturbing the normal set offeature

Page 255 - 17.5.2. Related Books

Chapter 3. Boot Process, Init, and Shutdown 633.7.1. Files in the /etc/sysconfig/ DirectoryThe following files are normally found in the /etc/sysconfig

Page 256

64 Chapter 3. Boot Process, Init, and Shutdown• vncservers• xinetdIt is possible that your system may be missing a few of them if the corresponding pr

Page 257 - Chapter 18

Chapter 3. Boot Process, Init, and Shutdown 653.7.1.5. /etc/sysconfig/clockThe /etc/sysconfig/clock file controls the interpretation of values read fro

Page 258

66 Chapter 3. Boot Process, Init, and Shutdown3.7.1.9. /etc/sysconfig/gpmThe /etc/sysconfig/gpm file is used to pass arguments to the gpm daemon at boo

Page 259 - 18.2.1. NSS, PAM, and LDAP

Chapter 3. Boot Process, Init, and Shutdown 673.7.1.14. /etc/sysconfig/initThe /etc/sysconfig/init file controls how the system will appear and functio

Page 260 - 18.3. LDAP Terminology

68 Chapter 3. Boot Process, Init, and Shutdown3.7.1.16. /etc/sysconfig/iptablesLike /etc/sysconfig/ipchains, the /etc/sysconfig/iptables file stores in

Page 261 - 18.4.1. slapd.conf

Chapter 3. Boot Process, Init, and Shutdown 69For example: KEYTABLE="us". The files that can be used as keytables start in/usr/lib/kbd/keymap

Page 262 - 18.5. OpenLDAP Setup Overview

IntroductionWelcome to the Official Red Hat Linux Reference Guide.The Official Red Hat Linux Reference Guide contains useful information about your Red

Page 263 - /sbin/service/ldap start

70 Chapter 3. Boot Process, Init, and Shutdown3.7.1.21. /etc/sysconfig/namedThe /etc/sysconfig/named file is used to pass arguments to the named daemon

Page 264

Chapter 3. Boot Process, Init, and Shutdown 713.7.1.24. /etc/sysconfig/ntpdThe /etc/sysconfig/ntpd file is used to pass arguments to the ntpd daemon at

Page 265 - 18.8. Additional Resources

72 Chapter 3. Boot Process, Init, and Shutdown3.7.1.28. /etc/sysconfig/redhat-config-usersThe /etc/sysconfig/redhat-config-users file is the configurati

Page 266 - 18.8.3. Related Books

Chapter 3. Boot Process, Init, and Shutdown 733.7.1.33. /etc/sysconfig/squidThe /etc/sysconfig/squid file is used to pass arguments to the squid daemon

Page 267 - Appendixes

74 Chapter 3. Boot Process, Init, and ShutdownIt may contain the following:• VNCSERVERS= value , where value is set to something like "1:fred&quo

Page 268

Chapter 3. Boot Process, Init, and Shutdown 753.8. Shutting DownTo shut down Red Hat Linux, issue the shutdown command. You can read the shutdown man

Page 269 - Appendix A

76 Chapter 3. Boot Process, Init, and Shutdown

Page 270 - A.2. CD-ROM Module Parameters

Chapter 4.Boot LoadersBefore Red Hat Linux can run on a system, it must be started by special program called a boot loader.The boot loader program usu

Page 271

78 Chapter 4. Boot LoadersThe boot process used by other operating systems may differ. For example, Microsoft’s DOS andWindows operating systems, as w

Page 272 - A.3. SCSI parameters

Chapter 4. Boot Loaders 79The following command installs GRUB to the MBR of the master IDE device on the primary IDEbus, alos known as the C drive:/sb

Page 273

viii IntroductionNoteAlthough this manual reflects the most current information possible, you should read the Red HatLinux Release Notes for informatio

Page 274

80 Chapter 4. Boot Loaders4.4.2. File NamesWhen typing commands to GRUB involving a file, such as a menu list to use when allowing thebooting of multip

Page 275 - A.4. Ethernet Parameters

Chapter 4. Boot Loaders 814.5.1. Menu InterfaceIf GRUB was automatically configured by the Red Hat Linux installation program, this is the inter-face s

Page 276

82 Chapter 4. Boot LoadersThe following is a list useful commands:• boot — Boots the operating system or chain loader that has been previously specifie

Page 277

Chapter 4. Boot Loaders 834.7.1. Special Configuration File CommandsThe following commands can only be used in the GRUB menu configuration file:• colorno

Page 278

84 Chapter 4. Boot LoadersThis file would tell GRUB to build a menu with Red Hat Linux as the default operating system, setto autoboot it after 10 seco

Page 279

Chapter 4. Boot Loaders 854.8.2. LILO vs. GRUBIn general, LILO works similarly to GRUB except for three major differences:• It has no interactive comm

Page 280

86 Chapter 4. Boot Loaderslabel=linuxinitrd=/boot/initrd-2.4.0-0.43.6.imgread-onlyroot=/dev/hda5other=/dev/hda1label=dosThis example shows a system co

Page 281

Chapter 4. Boot Loaders 87In this command, replace number with either the number of the runlevel you wish to boot into (1through 5), or the word singl

Page 282

88 Chapter 4. Boot Loaders

Page 283

Chapter 5.Users and GroupsControl of users and groups is a core element of Red Hat Linux system administration.Users can be either people, meaning acc

Page 284

Introduction ix• An explanation of how Linux works — While delving into the most arcane aspects of the Linuxkernel is not necessary, it is a good idea

Page 285

90 Chapter 5. Users and GroupsUser UID GID Home Directory Shellmail 8 12 /var/spool/mail /sbin/nologinnews 9 13 /var/spool/newsuucp 10 14 /var/spool/u

Page 286

Chapter 5. Users and Groups 91User UID GID Home Directory Shellpostfix 89 89 /var/spool/postfix /bin/trueprivoxy 100 101 /etc/privoxypvm 24 24 /usr/sha

Page 287

92 Chapter 5. Users and GroupsGroup GID Membersrpm 37 rpmutmp 22wnn 49ntp 38nscd 28apache 48mysql 27mailnull 47smmsp 51rpc 32xfs 43gdm 42rpcuser 29nfs

Page 288

Chapter 5. Users and Groups 93User Private GroupEvery user has a primary group; the user is the only member of that group.umask = 002Traditionally, on

Page 289

94 Chapter 5. Users and Groupschown -R root.emacs /usr/lib/emacs/site-lispNow, it is possible to add the proper users to the group with gpasswd:/usr/b

Page 290

Chapter 5. Users and Groups 95• The utilities will work properly whether shadowing is enabled or not.• The utilities have been slightly modified to sup

Page 291

96 Chapter 5. Users and Groups

Page 292

Chapter 6.The X Window SystemWhile the heart of Red Hat Linux is the kernel, for many users, the face of the operating system is thegraphical environm

Page 293 - Colophon

98 Chapter 6. The X Window System6.2. XFree86Red Hat Linux 8.0 uses XFree86 version 4.2 as the base X Window System, which includes thevarious necessa

Page 294

Chapter 6. The X Window System 99DeviceSpecifies information about the video card used by the system. You must have at least one De-vice section in you

Commentaires sur ces manuels

Pas de commentaire