| |
| |
| |
Introduction | |
| |
| |
What Is System Administration? | |
| |
| |
Evolution of the UNIX System | |
| |
| |
The System Administrator | |
| |
| |
The Importance of Being Root | |
| |
| |
Using a Logbook | |
| |
| |
Configuration Files and Scripts | |
| |
| |
Daemon Processes | |
| |
| |
Tour of the File System | |
| |
| |
Using UNIX Documentation | |
| |
| |
A Handful of Tools | |
| |
| |
Some Basic Terminology | |
| |
| |
| |
Account Management | |
| |
| |
Introduction | |
| |
| |
Accounts | |
| |
| |
The Password File | |
| |
| |
Account Groups | |
| |
| |
The Group File | |
| |
| |
The newgrp Command | |
| |
| |
The Working Environment | |
| |
| |
Adding a New Account | |
| |
| |
Removing an Account | |
| |
| |
Helpful Utilities for Account Management | |
| |
| |
| |
File System Backup | |
| |
| |
Introduction to Backup Strategies | |
| |
| |
Backing Up with dd | |
| |
| |
Backing Up and Restoring with tar | |
| |
| |
Backing Up and Restoring with cpio | |
| |
| |
Backing Up and Restoring with volcopy | |
| |
| |
| |
The UNIX File System | |
| |
| |
Introduction | |
| |
| |
Parts of a File System | |
| |
| |
Making File Systems | |
| |
| |
Reorganizing File Systems | |
| |
| |
Checking and Repairing File Systems | |
| |
| |
The Race for (Disk) Space | |
| |
| |
| |
System Startup and Shutdown | |
| |
| |
You Can't Just Turn It Off | |
| |
| |
System Startup Procedures | |
| |
| |
Log-ins and the getty Program | |
| |
| |
init, The Starter Program | |
| |
| |
System Shutdown, or Going Single-User | |
| |
| |
| |
The UNIX LP System | |
| |
| |
Introduction | |
| |
| |
The Hardware Connection | |
| |
| |
Adding A Printer to the LP System | |
| |
| |
Interface Scripts | |
| |
| |
Maintaining the LP System | |
| |
| |
| |
UNIX System Accounting | |
| |
| |
Introduction | |
| |
| |
Moment-to-Moment Records | |
| |
| |
Configuring for System Accounting | |
| |
| |
Fixing Accounting Problems | |
| |
| |
Running the runacct Script | |
| |
| |
Analyzing Accounting Reports | |
| |
| |
Billing Users | |
| |
| |
| |
UUCP Communications | |
| |
| |
Introducing the UUCP System | |
| |
| |
Using the UUCP System | |
| |
| |
Setting Up UUCP Communications | |
| |
| |
Securing the UUCP System | |
| |
| |
| |
System Security | |
| |
| |
Introduction | |
| |
| |
Locking the Door | |
| |
| |
Checklist for Securing Access | |
| |
| |
File and Directory Permissions | |
| |
| |
Understanding the System Breaker's Tactics | |
| |
| |
Creating Your Security Watchdogs | |
| |
| |
Summary of Security | |
| |
| |
| |
System Problems | |
| |
| |
Introduction | |
| |
| |
Terminal Problems | |
| |
| |
Runaway Programs | |
| |
| |
Interpreting Error Messages | |
| |
| |
Using Alternate Root File Systems | |
| |
| |
Appendices | |
| |
| |
| |
Environment Variables | |
| |
| |
| |
Predetermined C Shell Variables | |
| |
| |
| |
Utilities for Account Management | |
| |
| |
| |
Determining the Number of Floppies | |
| |
| |
| |
tar, cpio Options, and the tarskip Program | |
| |
| |
| |
Using fsdb | |
| |
| |
| |
Two Versions of the strings Program | |
| |
| |
| |
A Restricted Environment for Guests | |
| |
| |
| |
A Terminal lock Program | |
| |
| |
Index | |