SuSE Linux Server
The SuSE Linux Server demonstrates how to: master the ins and outs of Linux installation and configuration; Manage privileged and ordinary users, groups, and disk quotas; Control, monitor, prioritize, and automate programs using various tools; Set up DNS, SMTP, POP3, HTTP, FTP, IRC and SQL servers; Secure your server using firewalls and tools like Satan, Cops, etc.; Design a load--balanced, multi--server Apache--based Web network; Set up Samba and NFS fileserver for your office network.
Out of ideas for the holidays?
Visit our Gift Guides and find our recommendations on what to get friends and family during the holiday season. Shop now .
- Mixed media product | 620 pages
- 195.1 x 233.7 x 41.1mm | 1,189.37g
- 01 Dec 2000
- John Wiley & Sons Inc
- Hungry Minds Inc,U.S.
- Foster City, United States
Black Friday Deals Week
Check out this week's discounts for Black Friday Deals Week. Shop now .
Table of contents
Foreword. Preface. Acknowledgments. PART I: Installing and Getting Started with SuSE Linux. Chapter 1. Installation and Basic Configuration. The Big Bang! Introducing SuSE Linux. Checking Your Hardware Requirements. Preparing to Install SuSE Linux. Creating a boot disk under MS Windows 9x/2000. Creating a boot disk under Linux. Installation Overview. Installing SuSE Linux. Configuring SuSE Linux Networking. Chapter 2. The Boot and Shutdown Processes. Starting the Linux Kernel. Configuring init. The/sbin/init.d directory. The/etc/rc.d/rc script. The/etc/rc.d/rc 0 6 .d directories. Booting Up Your System. Shutting Down Your System. Canceling a shutdown. Rebooting your server. Rebooting using Ctrl+Alt+Del. Automatic shutdown on power failure. Managing init Files. Using YaST to manage run levels. Removing a service. Examining the network script. The System Configuration Files. Chapter 3. Understanding Linux/UNIX Files and Devices. Understanding File/Directory Permissions. Changing ownership of files/directories using chown. Changing the group of files/directories using chgrp. Understanding access permissions using octal numbers. Understanding access permissions using access strings. Changing access privileges of files/directories using chmod. Special notes on directory permissions. Managing Links. Changing permissions or ownership of a hard link. Changing permissions or ownership of a soft link. Creating a Permission Policy for a Multiuser Server. Setting users' configuration file permissions. Setting default file permissions for users. Setting executable file permissions. Working with Files and Directories. Viewing files and directories. Navigating your way into directories. Determining file type. Viewing the access statistics of a file or directory. Copying files and directories. Moving files and directories. Deleting files and directories. Finding files. Overriding the default file permission mask. Using ext2 File System--Specific Permissions. Chapter 4. Everyday Commands. Understanding the UNIX Command Line. Basics of metacharacters. Basics of regular expressions. How to Use Online man Pages. General File and Directory Commands. cat. chmod. chown. clear. cmp. cp. cut. diff. du. fgrep. file. find. grep. head. In. locate. ls. mkdir. mv. pwd. rm. sort. tail. touch. umask. uniq. vi. wc. whatis. whereis. which. File Compression and Archive--Specific Commands. compress. gunzip. gzip. rpm. tar. uncompress. File System--Specific Commands. dd. df. fdformat. mkfs. mkswap. mount. swapoff. swapon. umount. System Status--Specific Commands. dmesg. free. shutdown. uname. uptime. User Administration Commands. chfn. chsh. groupadd. groupmod. groups. last. passwd. su. useradd. userdel. usermod. who. whoami. User Commands for Accessing Network Services. finger. ftp. mail. rlogin. talk. Telnet. wall. Network Administrator's Commands. hostname. ifconfig. netstat. ping. route. traceroute. Process Management Commands. bg. fg. jobs. kill. killall. ps. top. crontab. Productivity Commands. bc. cal. mesg. write. Shell Commands. alias. history. set. source. unalias. PART II: Managing Users, Processes, and the Networks. Chapter 5. Using YaST. Introducing YaST. What Does YaST Do? Modifying your server's installation features. Choose or install SuSE software packages. Updating the system. Administering your system. Miscellaneous features. Chapter 6. User Administration. Becoming Superuser. Assigning Privileges to Ordinary Users. Managing Users with Command--Line Tools. Creating a new user account. Creating a new group. Modifying an existing user account. Modifying an existing group. Deleting or disabling a user account. Creating default user settings. Managing Users with YaST. Adding a new user account. Modifying an existing user account. Adding, modifying, and deleting groups. Chapter 7. Process Administration. Starting Processes. Controlling and Monitoring Processes. Using ps to get process status. Signaling a running process. Controlling process priority. Monitoring Processes and System Load. Using top. Using vmstat. Using uptime. Logging Processes. Configuring syslog. Monitoring logs using tail. Scheduling Processes. Using at. Using cron. Chapter 8. Network Administration. Basics of TCP/IP Networking. Introducing the TCP/IP protocol. Introducing TCP/IP networks. Dividing a Network into Subnetworks. Introducing IP Routing. Configuring a Network Interface. Manually configuring network interface cards. Modifying the network startup scripts. Configure a network interface card with YaST. Routing Between Two Subnets. Gateway computer configuration. Host computer configuration. PART III: Setting Up Intranet/Internet Services. Chapter 9. Configuring your Domain Name Service. Understanding DNS. Configuring a DNS Client. Configuring a DNS Server. Understanding the/etc/named.conf file. Configuring zone files. Master/primary DNS server. Slave/secondary DNS server. Reverse DNS server. Cache--only/slave DNS server. Controlling the DNS server. Testing Your DNS Server. Managing DNS for Virtual Domains. Balancing Load Using the DNS Server. Chapter 10. E--mail Service. Choosing sendmail. Using the default SuSE sendmail configuration. Configuring sendmail. Modifying the/etc/sendmail.cf and/etc/mail/sendmail.cw files. Configuring DNS to work with sendmail. Starting and stopping sendmail. Describing the/etc/sendmail.cf in detail. Configuring the/etc/mail/ files. Testing Your sendmail Configuration. Testing sendmail address rewrite rules. Testing/etc/mail/ database files. Using sendmail to see the SMTP transaction verbosely. Using the sendmail debug flag. Using a test configuration file. Securing sendmail. Securing your configuration files. Ensuring a stricter mode of operating and privacy. Antispam Measures. Dealing with third--party mail relay vulnerability. Sending spammers to the black hole. Setting Up POP and IMAP Servers. How does it work? Configuring POP service. Using IMAP. Configuring SMTP/POP/IMAP Mail Clients. Commercial Alternatives to sendmail. Sendmail Pro. qmail. Chapter 11. Web Service. System Requirements for Apache. Sufficient disk space. Sufficient RAM. Other requirements. Starting Apache. Configuring Apache. Configuring httpd.conf. srm.conf and access.conf files. Testing the Apache server. Managing Your Apache Server. Configuring Apache for CGI scripts. Configuring Apache for server--side includes. Hosting virtual Web sites. Authenticating Web users. Monitoring server status. Logging hits and errors. Enhancing Web server security. Using SSL for secured transactions. Chapter 12. Configuring an FTP Server. Using Washington State FTP. Configuring FTP service. Creating an anonymous FTP site. Creating a guest FTP account. Creating virtual FTP sites. Using a Commercial FTP Server. Using a Trivial File Transfer Protocol Server. Chapter 13. Other Popular Services. Setting Up Internet Relay Chat Service. Installing an IRC server. Configuring an IRC server. Running an IRC server. Installing and using an IRC client. Setting Up a Usenet News Service. Configuring an INN server. Accessing your INN server. PART IV: Setting Up File Sharing and Database Services. Chapter 14. Sharing Files and Printers with Samba. Installing Samba. Configuring Samba. The global configuration. The homes configuration. The printers configuration. Using GUI Configuration Tools. Testing the/etc/smb.conf configuration. Starting, stopping, and restarting the Samba service. Practical Uses of Samba. Using a Linux file server on Windows. Using a Windows file server on your Linux system. Sharing a Linux printer with Windows. Using an interactive Samba client. Securing Your Samba Server. Using a Windows NT server as a password server. Using encrypted passwords on your Samba server. Chapter 15. Using the Network File System. Introducing the NFS Server. Configuring an NFS Server. Granting read--only access to the exported directory. Granting read/write access to the exported directory. Disabling access to a certain directory. Mapping users between the NFS server and the clients. Using NFS Utilities. Securing Your NFS Server. Distributing Files Using rdist. Chapter 16. Structured Query Language Database Services. What Is SQL? Installing and Configuring a SQL Server: MySQL. Starting the SQL Server. Accessing the SQL Server. Starting MySQL client for the first time. Creating a database. Interacting with the SQL Server Using Scripts. SQL interactions from the UNIX command prompt. Using a CGI script to access a SQL database via a Web browser. PART V: Securing and Monitoring. Chapter 17. Security 101. Securing User Access. Restricting physical access. Restricting normal user access. Restricting superuser access. Restricting all access in an emergency or attack. Securing the User Authentication Process. Using shadow passwords. Understanding Pluggable Authentication Modules. Securing Services. Removing unnecessary services during OS installation. Securing inetd--run services. Protecting Your Files and File Systems. Mounting file systems as read--only. Taking advantage of the EXT2 file system. Using Tripwire for ensuring file integrity. Back Up and Backtrack Everything. Get the Latest Security News. CERT. BUGTRAQ@NETSPACE.ORG. Chapter 18. Network Security. Understanding the Security Problem. Ethernet sniffing. IP spoofing. Designing a Secure Network. Using nonroutable IP addresses. Masquerading IP addresses. What Is a Firewall? IP packet filters. Using a basic packet--filtering firewall: ipchains. An application--level firewall. Using the Squid Proxy Server. Getting and installing Squid. Using Squid for the first time. Modifying Squid to fit your needs. Probing Your Network with nmap. Port scan your Linux server. Port scan another Linux box. Port scan a Windows computer. Fingerprinting your network. Blocking scans with a firewall. PART VI: Tuning for Performance. Chapter 19. Hacking the Kernel. Why Do You Need a Newer Kernel? Customizing the Kernel. Verifying you have the necessary compilers. Installing the Linux kernel source. Configuring the kernel manually. Configuring the kernel using make menuconfig. Compiling, Installing, and Booting the New Kernel. Patching a Kernel. Creating the Initial ramdisk. Configuring LILO. Booting With the New Kernel. Chapter 20. Building a Multiserver Web Network. Requirements for the Web Network. Designing the Web Network. Considering a round--robin DNS solution. Considering a hardware load--balancing solution. Choosing the correct load--balancing solution. Allocating IP Addresses. Configuring the Network. Setting up the network for a name server computer. Setting up the network interfaces for each Web server. Setting up network interfaces of the WSD Pro director. Testing the network configuration. Setting Up the DNS Server. Setting Up the NFS Server. Setting Up the Mail (SMTP/POP3/IMAP) Server. Setting Up the FTP Server. Setting Up rdist on the Name Server. Setting Up Each Web Server. Setting up the NFS client configuration. Setting up sendmail to relay to the smart host. Setting up rdist for file distribution from ns.aminews--lan.com. Setting Up the Web Director. Creating the Web services farm. Creating the related network services farm. Managing the Network. Taking a server out of service. Prioritizing server selection. Monitoring server load and statistics. Adding a new Web server in the Web server farm. Adding Client Web Sites. Appendix A: What's on the CD--ROM. Appendix B: Linux Resources. Appendix C: Linux Printing. Appendix D: The/etc/rc.config File. Index. End--User License Agreement. GNU General Public License. CD--ROM Installation Instructions.
About Paul G. Sery
Paul G. Sery works for Sandia National Laboratories in Albuquerque, New Mexico, where he manages and troubleshoots UNIX and Linux systems. He has written other Linux books on networking and small business use. Mohammed J. Kabir is cofounder of Intevo, an e--application service provider, and the author of several other Linux books.