Online Book Reader

Home Category

UNIX System Administration Handbook - Evi Nemeth [501]

By Root 2837 0
177, 189

dumps see backups

Dunlap, Kevin 394

DVMRP protocol 351

E


EDNS0 (extended DNS) 410

edquota 89

eeprom 102

EIGRP protocol 347, 350

electrical power 751–753

Electronic Frontier Foundation 789, 814

electronic mail 535–624

see also MX records

see also Postfix

see also sendmail

access agents 537, 540

addressing 542

aliases see aliases (email)

blacklists 601–602

configuring user agent 88

delivery agents 537, 540

denial of service 611–612

electronic mail continued

design hints 546

distributing aliases 162

editing mailboxes 801

forgery 612–613

forwarding 551, 553, 555–556, 608, 621

headers 541–546, 604–606

home machine 88, 549

IMAP 537, 540, 546, 549–550, 775, 831

loops 552, 556

mail queue 567–570

mailing lists 557–560

message stores 540

message structure 541–546

ownership 778

privacy 802

proxies 547

relaying 597–599

security 607–614, 662

server architecture 547–548

social aspects 535

spam 535–536, 548, 590, 595–607, 792–793

spool directory 549

submission agents 537, 540–541

transport agents 537, 539

user agents 537–539

viruses 602

Windows software 775

elm 538

emacs 2, 88, 538, 809

emergencies 784–787

encryption see cryptography

Energy Star certification 752

enscript 740–741, 809

envelope addresses 541

environment variables 88

equipment racks 752–753

error correction protocols 113–114

ESMTP protocol 617

/etc directory 64

ethereal 809

Ethernet

addresses 269–270

ARP protocol 285–287

broadcast domain 375

cabling 268

collisions 374

congestion 389

connecting 377–380

design issues 387–389

dropped packets 628

Ethernet continued

framing standards 267–268

hardware 375–380

hubs and concentrators 377

over UTP 375–377, 386

overview 373–375

packet encapsulation 266–267

promiscuous mode 636

switches 375, 377–379, 636

table of hardware 374

troubleshooting 385

ethers file 287, 514, 835

Eudora 538

EUROPEN 814

Exabyte tapes 171–172, 175

exec 48

execute bit 69–75

exmh 538, 809

expect 2, 370, 519

exportfs 493

exports file 414, 493–499

F


Farmer, Dan 665, 667, 669

FC-AL 119

fd2log file 208

FDDI networks 380–381

fdisk 149–151, 153–154

FEATURE macro 577

Federated Naming Service 721

fiber optic cables 380–381, 388

Fibre Channel 119

file servers 503–504

file sets 186–187

files

network distribution 515

ownership 37–38

permissions 69–75

types 66–69

filesystems

busy 62

checking 16

cleaning up 161–162

copying 185

creating 132–133

damaged 136–138

design hints 166

disabling setuid execution 658

FreeBSD 155–156

HP-UX 145–148

inodes 133

ISO-9660 243

filesystems continued

journaling 137, 142, 147

load balancing 756, 764

lost+found directory 134, 138

mount options 135

mounting 62–64, 133–136

mounting via NFS 501–502

organization 64–65

overview 132–133

patching 138

quotas 89, 490

Red Hat 151–153

replicated 508

root filesystem 64, 131, 240

size 167

Solaris 141–143

superblocks 133

unmounting 62, 135

Filter file 321

finger 80, 833

fingerd 661

fire walls (physical) 388

FireBERD 385

firewalls 296, 675–678

effect on traceroute 631

FreeBSD 333–337

packet-filtering 675

Red Hat 327–329

service proxies 676

stateful inspection 677

two-stage 676

FireWire 120

floppy disks 170, 175

flow control 102

Fluke LanMeter 385

fork 47–48

format 130, 140

.forward files 551, 553, 555–556, 608, 621

fragmentation 269

frame relay 382–383

framing 267–268

FreeBSD 4

fsck 133–138, 142, 152

at boot time 16

parallel operation 135

use of lost+found 134

with alternate superblock 133

fsflush 828

fstab file 62, 133–137, 152–153, 156, 501

and fsck 137

NFS filesystems 501

vs. automounting 504

FTP

compared with HTTP 696

conflicts with NAT 281

for config files 520–521

quarantine host 676

security 659

server setup 696–697

through firewalls 676–677

ftp login 696

ftp.log file 208

ftpd 831

fully

Return Main Page Previous Page Next Page

®Online Book Reader