Unix and Linux System Administration Handbook by Nemeth, Evi, Snyder, Garth, Hein, Trent R., Whaley, Ben (2010) Paperback

Unix and Linux System Administration Handbook by Nemeth, Evi, Snyder, Garth, Hein, Trent R., Whaley, Ben (2010) Paperback

Language: English

Pages: 0

ISBN: B00OVOFJUC

Format: PDF / Kindle (mobi) / ePub


 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

computing, although that doesn’t seem to stop people from trying. At many sites—perhaps even the majority—web and email access are the primary uses of computers. As of 2010, internetworldstats.com estimates the Internet to have nearly 1.5 billion users, or more than 21% of the world’s population. In North America, Internet penetration approaches 75%. TCP/IP is the networking system that underlies the Internet. TCP/IP does not depend on any particular hardware or operating system, so devices

SRV Records An SRV record specifies the location of services within a domain. For example, the SRV record lets you query a remote domain for the name of its FTP server. Before SRV, you had to hope the remote sysadmins had followed the prevailing custom and added a CNAME for “ftp” to their server’s DNS records. SRV records are specified in RFC2782 (2000). SRV records make more sense than CNAMEs for this application and are certainly a better way for sysadmins to move services around and

/usr/man/man[123] or /usr/lib/*). The notation ~user is also acceptable, but it is evaluated separately on the source and destination machines. By default, rdist copies the files and directories listed in pathnames to the equivalent paths on each destination machine. You can modify this behavior by supplying a sequence of commands and terminating each with a semicolon. The following commands are understood: The install command sets options that affect the way rdist copies files. Options

sendmail 93 Solaris 97–100 SUSE 93–94 Ubuntu 94–95 startwpar command 1002 startx command 1013 statd daemon 694 State University of New York (SUNY) Buffalo 1269 stateful inspection firewalls 934 static routes 466, 481–483, 521 static_routes file 483 static-routes file 488–489 statistics BIND 676 CPU 1122 network 868–873 NFS 710 sendmail 805 STD documents 450 sticky bit 154–155 STOP signal 125–126, 128 storage area networks 274–281 AIX 280–281 benefits of 1103 HP-UX 280

group files. 7.8 Disabling Logins On occasion, a user’s login must be temporarily disabled. A straightforward way to do this is to put a star or some other character in front of the user’s encrypted password in the /etc/security/passwd (AIX) or /etc/shadow file. This measure prevents most types of password-regulated access because the password no longer decrypts to anything sensible. Commands such as ssh that do not necessarily check the system password may continue to function, however. On

Download sample

Download