UNIX System Administration Handbook - Evi Nemeth [501]
dumps see backups
Dunlap, Kevin 394
DVMRP protocol 351
E
EDNS0 (extended DNS) 410
edquota 89
eeprom 102
EIGRP protocol 347, 350
electrical power 751–753
Electronic Frontier Foundation 789, 814
electronic mail 535–624
see also MX records
see also Postfix
see also sendmail
access agents 537, 540
addressing 542
aliases see aliases (email)
blacklists 601–602
configuring user agent 88
delivery agents 537, 540
denial of service 611–612
electronic mail continued
design hints 546
distributing aliases 162
editing mailboxes 801
forgery 612–613
forwarding 551, 553, 555–556, 608, 621
headers 541–546, 604–606
home machine 88, 549
IMAP 537, 540, 546, 549–550, 775, 831
loops 552, 556
mail queue 567–570
mailing lists 557–560
message stores 540
message structure 541–546
ownership 778
privacy 802
proxies 547
relaying 597–599
security 607–614, 662
server architecture 547–548
social aspects 535
spam 535–536, 548, 590, 595–607, 792–793
spool directory 549
submission agents 537, 540–541
transport agents 537, 539
user agents 537–539
viruses 602
Windows software 775
elm 538
emacs 2, 88, 538, 809
emergencies 784–787
encryption see cryptography
Energy Star certification 752
enscript 740–741, 809
envelope addresses 541
environment variables 88
equipment racks 752–753
error correction protocols 113–114
ESMTP protocol 617
/etc directory 64
ethereal 809
Ethernet
addresses 269–270
ARP protocol 285–287
broadcast domain 375
cabling 268
collisions 374
congestion 389
connecting 377–380
design issues 387–389
dropped packets 628
Ethernet continued
framing standards 267–268
hardware 375–380
hubs and concentrators 377
over UTP 375–377, 386
overview 373–375
packet encapsulation 266–267
promiscuous mode 636
switches 375, 377–379, 636
table of hardware 374
troubleshooting 385
ethers file 287, 514, 835
Eudora 538
EUROPEN 814
Exabyte tapes 171–172, 175
exec 48
execute bit 69–75
exmh 538, 809
expect 2, 370, 519
exportfs 493
exports file 414, 493–499
F
Farmer, Dan 665, 667, 669
FC-AL 119
fd2log file 208
FDDI networks 380–381
fdisk 149–151, 153–154
FEATURE macro 577
Federated Naming Service 721
fiber optic cables 380–381, 388
Fibre Channel 119
file servers 503–504
file sets 186–187
files
network distribution 515
ownership 37–38
permissions 69–75
types 66–69
filesystems
busy 62
checking 16
cleaning up 161–162
copying 185
creating 132–133
damaged 136–138
design hints 166
disabling setuid execution 658
FreeBSD 155–156
HP-UX 145–148
inodes 133
ISO-9660 243
filesystems continued
journaling 137, 142, 147
load balancing 756, 764
lost+found directory 134, 138
mount options 135
mounting 62–64, 133–136
mounting via NFS 501–502
organization 64–65
overview 132–133
patching 138
quotas 89, 490
Red Hat 151–153
replicated 508
root filesystem 64, 131, 240
size 167
Solaris 141–143
superblocks 133
unmounting 62, 135
Filter file 321
finger 80, 833
fingerd 661
fire walls (physical) 388
FireBERD 385
firewalls 296, 675–678
effect on traceroute 631
FreeBSD 333–337
packet-filtering 675
Red Hat 327–329
service proxies 676
stateful inspection 677
two-stage 676
FireWire 120
floppy disks 170, 175
flow control 102
Fluke LanMeter 385
fork 47–48
format 130, 140
.forward files 551, 553, 555–556, 608, 621
fragmentation 269
frame relay 382–383
framing 267–268
FreeBSD 4
fsck 133–138, 142, 152
at boot time 16
parallel operation 135
use of lost+found 134
with alternate superblock 133
fsflush 828
fstab file 62, 133–137, 152–153, 156, 501
and fsck 137
NFS filesystems 501
vs. automounting 504
FTP
compared with HTTP 696
conflicts with NAT 281
for config files 520–521
quarantine host 676
security 659
server setup 696–697
through firewalls 676–677
ftp login 696
ftp.log file 208
ftpd 831
fully