Running Linux, 5th Edition - Matthias Kalle Dalheimer [3]
21.4.3. Using strace
21.4.4. Using Valgrind
21.4.5. Interface Building Tools
21.4.6. Revision Control Tools: RCS
21.4.7. Revision Control Tools: CVS
21.4.8. Patching Files
21.4.9. Indenting Code
21.5. Using Perl
21.5.1. A Sample Program
21.5.2. More Features
21.5.3. Pros and Cons
21.6. Java
21.6.1. The Promise of Java, or Why You Might Want to Use Java
21.6.2. Getting Java for Linux
21.7. Python
21.7.1. Parsing Output from the Last Command Using Python
21.7.2. Developing a Calculator Using Python
21.8. Other Languages
21.9. Introduction to OpenGL Programming
21.9.1. GLUT
21.9.2. Qt
21.10. Integrated Development Environments
22. Running a Web Server
22.1. Configuring Your Own Web Server
22.1.1. httpd.conf
22.1.2. srm.conf and access.conf
22.1.3. Starting httpd
23. Transporting and Handling Email Messages
23.1. The Postfix MTA
23.1.1. A Word About DNS
23.1.2. Installing Postfix
23.1.3. Postfix Configuration
23.1.4. Starting Postfix
23.1.5. Postfix Logging
23.1.6. Running Postfix on System Startup
23.1.7. Postfix Relay Control
23.1.8. Additional Configurations
23.2. Procmail
23.2.1. Procmail Concepts
23.2.2. Preparing Procmail for Use
23.2.3. Recipe Syntax
23.2.4. Examples
23.3. Filtering Spam
24. Running an FTP Server
24.1. Introduction
24.2. Compiling and Installing
24.2.1. RPM Install
24.2.2. Compiling from Source
24.3. Running ProFTPD
24.4. Configuration
24.4.1. Getting Started
24.4.2. Basic Configuration
24.4.3. Advanced Configuration
24.4.4. Virtual Hosts
IV. Network Services
25. Running Web Applications with MySQL and PHP
25.1. MySQL
25.1.1. MySQL Installation and Initial Configuration
25.1.2. Initial Tasks: Setting Up Users and SQL
25.1.3. Creating and Populating a Database
25.2. PHP
25.2.1. Some Sample PHP
25.2.2. PHP4 as an Apache Module
25.3. The LAMP Server in Action
26. Running a Secure System
26.1. A Perspective on System Security
26.2. Initial Steps in Setting Up a Secure System
26.2.1. Shutting Down Unwanted Network Daemons
26.2.2. Top 10 Things You Should Never Do
26.3. TCP Wrapper Configuration
26.3.1. Using TCP Wrappers with inetd
26.3.2. Using TCP Wrappers with xinetd
26.3.3. /etc/hosts.allow and /etc/hosts.deny
26.4. Firewalls: Filtering IP Packets
26.4.1. netfilter Basics
26.4.2. Developing IP Filtering Rulesets
26.4.3. IP Filter Management and Script Files
26.4.4. Sample netfilter Configurations
26.5. SELinux
27. Backup and Recovery
27.1. Making Backups
27.1.1. Simple Backups
27.1.2. Incremental Backups
27.2. What to Do in an Emergency
27.2.1. Repairing Filesystems
27.2.2. Accessing Damaged Files
27.2.3. Restoring Files from Backup
28. Heterogeneous Networking and Running Windows Programs
28.1. Sharing Partitions
28.1.1. Filesystems and Mounting
28.1.2. File Translation Utilities
28.2. Emulation and Virtual Operating Systems
28.2.1. Wine
28.2.2. VMware Workstation
28.2.3. Other Programs for Running MS-DOS and Windows Applications on Linux
28.3. Remote Desktop Access to Windows Programs
28.3.1. rdesktop and TSCLient
28.3.2. Virtual Network Connection
28.4. FreeNX: Linux as a Remote Desktop Server
A. Sources of Linux Information
A.1. Linux Documentation Project
A.2. FTP Sites
A.3. World Wide Web Sites
A.3.1. General Documentation
A.3.2. Open Source Projects
A.3.3. Programming Languages and Tools
A.3.4. News and Information Sites
A.3.5. Linux Software Directories and Download Sites
A.3.6. Linux Distributions
A.3.7. Commercial Linux Software Companies
A.3.8. Internet RFCs and Other Standards
A.3.9. Miscellaneous
Running Linux, 5th Edition
Matthias Kalle Dalheimer
Matt Welsh
Editor
Andy Oram
Copyright © 2009 O'Reilly Media, Inc.
O'Reilly Media
* * *
Preface
Technical knowledge is not enough. One must transcend techniques so that the art becomes an artless art, growing out of the unconscious.
--Daisetsu Suzuki (1870-1966)
This is a book about Linux, a free, open source operating system that's