Follow Techotopia on Twitter

On-line Guides
All Guides
eBook Store
iOS / Android
Linux for Beginners
Office Productivity
Linux Installation
Linux Security
Linux Utilities
Linux Virtualization
Linux Kernel
System/Network Admin
Programming
Scripting Languages
Development Tools
Web Development
GUI Toolkits/Desktop
Databases
Mail Systems
openSolaris
Eclipse Documentation
Techotopia.com
Virtuatopia.com
Answertopia.com

How To Guides
Virtualization
General System Admin
Linux Security
Linux Filesystems
Web Servers
Graphics & Desktop
PC Hardware
Windows
Problem Solutions
Privacy Policy

  




 

 

NOTE: CentOS Enterprise Linux is built from the Red Hat Enterprise Linux source code. Other than logo and name changes CentOS Enterprise Linux is compatible with the equivalent Red Hat version. This document applies equally to both Red Hat and CentOS Enterprise Linux.

Index

Symbols

/etc/cups/, Red Hat Enterprise Linux-Specific Information
/etc/fstab file
mounting file systems with, Mounting File Systems Automatically with /etc/fstab
updating, Updating /etc/fstab
/etc/group file
group, role in, /etc/group
user account, role in, /etc/group
/etc/gshadow file
group, role in, /etc/gshadow
user account, role in, /etc/gshadow
/etc/mtab file, Viewing /etc/mtab
/etc/passwd file
group, role in, /etc/passwd
user account, role in, /etc/passwd
/etc/printcap, Red Hat Enterprise Linux-Specific Information
/etc/shadow file
group, role in, /etc/shadow
user account, role in, /etc/shadow
/proc/mdstat file, Checking Array Status With /proc/mdstat
/proc/mounts file, Viewing /proc/mounts

A

abuse, resource, What Barriers Are in Place To Prevent Abuse of Resources
account
see user account
activating your subscription, Activate Your Subscription
ATA disk drive
adding, Adding ATA Disk Drives
automation, Automation
overview of, Automate Everything

B

backups
AMANDA backup software, The Advanced Maryland Automatic Network Disk Archiver (AMANDA)
building software, Backup Software: Buy Versus Build
buying software, Backup Software: Buy Versus Build
data-related issues surrounding, Different Data: Different Backup Needs
introduction to, Backups
media types, Backup Media
disk, Disk
network, Network
tape, Tape
restoration issues, Restoration Issues
bare metal restorations, Restoring From Bare Metal
testing restoration, Testing Backups
schedule, modifying, Modifying the Backup Schedule
storage of, Storage of Backups
technologies used, Backup Technologies
cpio, cpio
dump, dump/restore: Not Recommended for Mounted File Systems!
tar, tar
types of, Types of Backups
differential backups, Differential Backups
full backups, Full Backups
incremental backups, Incremental Backups
bandwidth-related resources
see resources, system, bandwidth
bash shell, automation and, Automation
business, knowledge of, Know Your Business

C

cache memory, Cache Memory
capacity planning, Monitoring System Capacity
CD-ROM
file system
see ISO 9660 file system
centralized home directory, Home Directories
chage command, User Account and Group Applications
change control, Change Control
chfn command, User Account and Group Applications
chgrp command, File Permission Applications
chmod command, File Permission Applications
chown command, File Permission Applications
chpasswd command, User Account and Group Applications
color laser printers, Color Laser Printers
communication
necessity of, Communicate as Much as Possible
Red Hat Enterprise Linux-specific information, Documentation and Communication
conventions
document, Document Conventions
CPU power
see resources, system, processing power
CUPS, Red Hat Enterprise Linux-Specific Information

D

daisy-wheel printers
see impact printers
data
shared access to, Who Can Access Shared Data, Where Users Access Shared Data
global ownership issues, Global Ownership Issues
device
alternative to device names, Alternatives to Device File Names
device names, alternatives to, Alternatives to Device File Names
devlabel, naming with, Using devlabel
file names, Device Files
file system labels, File System Labels
labels, file system, File System Labels
naming convention, Device Naming Conventions
naming with devlabel, Using devlabel
partition, Partition
type, Device Type
unit, Unit
whole-device access, Whole-Device Access
devlabel, Using devlabel
df command, Issuing the df Command
disaster planning, Planning for Disaster
power, backup, Backup Power
generator, Providing Power For the Next Few Hours (and Beyond)
motor-generator set, Providing Power For the Next Few Seconds
outages, extended, Planning for Extended Outages
UPS, Providing Power For the Next Few Minutes
types of disasters, Types of Disasters
air conditioning, Heating, Ventilation, and Air Conditioning
application failures, Application Failures
building integrity, Building Integrity
electrical, Electricity
electricity, quality of, Power Quality
electricity, security of, The Security of Your Power
environmental failures, Environmental Failures
hardware failures, Hardware Failures
heating, Heating, Ventilation, and Air Conditioning
human errors, Human Errors
HVAC, Heating, Ventilation, and Air Conditioning
improper repairs, Improperly-Repaired Hardware
improperly-used applications, Improper Use of Applications
maintenance-related errors, Mistakes Made During Maintenance
misconfiguration errors, Misconfiguration Errors
mistakes during procedures, Mistakes Made During Procedures
operating system crashes, Crashes
operating system failures, Operating System Failures
operating system hangs, Hangs
operator errors, Operations Personnel Errors
procedural errors, Failure to Follow Procedures
service technician errors, Service Technician Errors
software failures, Software Failures
system administrator errors, System Administrator Errors
user errors, End-User Errors
ventilation, Heating, Ventilation, and Air Conditioning
weather-related, Weather and the Outside World
disaster recovery
backup site, Backup Sites: Cold, Warm, and Hot
network connectivity to, Network Connectivity to the Backup Site
staffing of, Backup Site Staffing
backups, availability of, Availability of Backups
end of, Moving Back Toward Normalcy
hardware availability, Hardware and Software Availability
introduction to, Disaster Recovery
plan, creating, testing, implementing, Creating, Testing, and Implementing a Disaster Recovery Plan
software availability, Hardware and Software Availability
disk drives, Hard Drives
disk quotas
enabling, Enabling Disk Quotas
introduction to, Implementing Disk Quotas
management of, Managing Disk Quotas
overview of, Some Background on Disk Quotas
block usage tracking, Tracks Disk Block Usage
file-system specific, Per-File-System Implementation
grace period, Grace Periods
group specific, Per-Group Space Accounting
hard limits, Hard Limits
inode usage tracking, Tracks Disk Inode Usage
soft limits, Soft Limits
user specific, Per-User Space Accounting
disk space
see storage
documentation
Red Hat Enterprise Linux-specific information, Documentation and Communication
documentation, necessity of, Document Everything
dot-matrix printers
see impact printers

E

engineering, social, The Risks of Social Engineering
execute permission, User Accounts, Groups, and Permissions
EXT2 file system, EXT2
EXT3 file system, EXT3

F

file names
device, Device Files
file system
labels, File System Labels
free command, free, Red Hat Enterprise Linux-Specific Information

G

GID, Usernames and UIDs, Groups and GIDs
gnome-system-monitor command, The GNOME System Monitor — A Graphical top
gpasswd command, User Account and Group Applications
group
files controlling, Files Controlling User Accounts and Groups
/etc/group, /etc/group
/etc/gshadow, /etc/gshadow
/etc/passwd, /etc/passwd
/etc/shadow, /etc/shadow
GID, Usernames and UIDs, Groups and GIDs
management of, Managing User Accounts and Resource Access
permissions related to, User Accounts, Groups, and Permissions
execute, User Accounts, Groups, and Permissions
read, User Accounts, Groups, and Permissions
setgid, User Accounts, Groups, and Permissions
setuid, User Accounts, Groups, and Permissions
sticky bit, User Accounts, Groups, and Permissions
write, User Accounts, Groups, and Permissions
shared data access using, Shared Groups and Data
structure, determining, Determining Group Structure
system GIDs, Usernames and UIDs, Groups and GIDs
system UIDs, Usernames and UIDs, Groups and GIDs
tools for managing, User Account and Group Applications
gpasswd command, User Account and Group Applications
groupadd command, User Account and Group Applications
groupdel command, User Account and Group Applications
groupmod command, User Account and Group Applications
grpck command, User Account and Group Applications
UID, Usernames and UIDs, Groups and GIDs
group ID
see GID
groupadd command, User Account and Group Applications
groupdel command, User Account and Group Applications
groupmod command, User Account and Group Applications
grpck command, User Account and Group Applications

H

hard drives, Hard Drives
hardware
failures of, Hardware Failures
service contracts, Service Contracts
availability of parts, Parts Availability
budget for, Available Budget
coverage hours, Hours of Coverage
depot service, Depot Service
drop-off service, Depot Service
hardware covered, Hardware to be Covered
on-site technician, Zero Response Time — Having an On-Site Technician
response time, Response Time
walk-in service, Depot Service
skills necessary to repair, Having the Skills
spares
keeping, Keeping Spare Hardware
stock, quantities, How Much to Stock?
stock, selection of, What to Stock?
swapping hardware, Spares That Are Not Spares
home directory
centralized, Home Directories

I

IDE interface
overview of, IDE/ATA
impact printers, Impact Printers
consumables, Impact Printer Consumables
daisy-wheel, Impact Printers
dot-matrix, Impact Printers
line, Impact Printers
inkjet printers, Inkjet Printers
consumables, Inkjet Consumables
intrusion detection systems, Security
iostat command, The Sysstat Suite of Resource Monitoring Tools, Monitoring Bandwidth on Red Hat Enterprise Linux
ISO 9660 file system, ISO 9660

L

laser printers, Laser Printers
color, Color Laser Printers
consumables, Laser Printer Consumables
line printers
see impact printers
logical volume management
see LVM
lpd, Red Hat Enterprise Linux-Specific Information
LVM
contrasted with RAID, With LVM, Why Use RAID?
data migration, Data Migration
logical volume resizing, Logical Volume Resizing
migration, data, Data Migration
overview of, Logical Volume Management
resizing, logical volume, Logical Volume Resizing
storage grouping, Physical Storage Grouping

M

managing
printers, Printers and Printing
memory
monitoring of, Monitoring Memory
resource utilization of, Physical and Virtual Memory
virtual memory, Basic Virtual Memory Concepts
backing store, Backing Store — the Central Tenet of Virtual Memory
overview of, Virtual Memory in Simple Terms
page faults, Page Faults
performance of, Virtual Memory Performance Implications
performance, best case, Best Case Performance Scenario
performance, worst case, Worst Case Performance Scenario
swapping, Swapping
virtual address space, Virtual Memory: The Details
working set, The Working Set
monitoring
resources, Resource Monitoring
system performance, System Performance Monitoring
monitoring statistics
bandwidth-related, Monitoring Bandwidth
CPU-related, Monitoring CPU Power
memory-related, Monitoring Memory
selection of, What to Monitor?
storage-related, Monitoring Storage
mount points
see storage, file system, mount point
mounting file systems
see storage, file system, mounting
mpstat command, The Sysstat Suite of Resource Monitoring Tools
MSDOS file system, MSDOS

N

NFS, NFS

P

page description languages (PDL), Printer Languages and Technologies
Interpress, Printer Languages and Technologies
PCL, Printer Languages and Technologies
PostScript, Printer Languages and Technologies
page faults, Page Faults
PAM, Security
partition, Partition
attributes of, Partition Attributes
geometry, Geometry
type, Partition Type
type field, Partition Type Field
creation of, Partitioning, Partitioning
extended, Extended Partitions
logical, Logical Partitions
overview of, Partitions/Slices
primary, Primary Partitions
passwd command, User Account and Group Applications
password, Passwords
aging, Password Aging
big character set used in, Expanded Character Set
longer, Longer Passwords
memorable, Memorable
personal info used in, Personal Information
repeatedly used, The Same Password for Multiple Systems
shortness of, Short Passwords
small character set used in, Limited Character Set
strong, Strong Passwords
weak, Weak Passwords
word tricks used in, Simple Word Tricks
words used in, Recognizable Words
written, Passwords on Paper
perl, automation and, Automation
permissions, User Accounts, Groups, and Permissions
tools for managing
chgrp command, File Permission Applications
chmod command, File Permission Applications
chown command, File Permission Applications
philosophy of system administration, The Philosophy of System Administration
physical memory
see memory
planning, importance of, Plan Ahead
Pluggable Authentication Modules
see PAM
printconf
see printer configuration
printer configuration, Red Hat Enterprise Linux-Specific Information
CUPS, Red Hat Enterprise Linux-Specific Information
text-based application, Red Hat Enterprise Linux-Specific Information
Printer Configuration Tool
see printer configuration
printers
additional resources, Additional Resources
color, Inkjet Printers
CMYK, Inkjet Printers
inkjet, Inkjet Printers
laser, Color Laser Printers
considerations, Printing Considerations
duplex, Function
languages
see page description languages (PDL)
local, Networked Versus Local Printers
managing, Printers and Printing
networked, Networked Versus Local Printers
types, Types of Printers
color laser, Color Laser Printers
daisy-wheel, Impact Printers
dot-matrix, Impact Printers
dye-sublimation, Other Printer Types
impact, Impact Printers
inkjet, Inkjet Printers
laser, Laser Printers
line, Impact Printers
solid ink, Other Printer Types
thermal wax, Other Printer Types
printtool
see printer configuration
processing power, resources related to
see resources, system, processing power

Q

quota, disk
see disk quotas

R

RAID
arrays
management of, Day to Day Management of RAID Arrays
raidhotadd command, use of, Rebuilding a RAID array with raidhotadd
rebuilding, Rebuilding a RAID array with raidhotadd
status, checking, Checking Array Status With /proc/mdstat
arrays, creating, Creating RAID Arrays
after installation time, After Red Hat Enterprise Linux Has Been Installed
at installation time, While Installing Red Hat Enterprise Linux
contrasted with LVM, With LVM, Why Use RAID?
creating arrays
see RAID, arrays, creating
implementations of, RAID Implementations
hardware RAID, Hardware RAID
software RAID, Software RAID
introduction to, RAID-Based Storage
levels of, RAID Levels
nested RAID, Nested RAID Levels
RAID 0, RAID 0
RAID 0, advantages of, RAID 0
RAID 0, disadvantages of, RAID 0
RAID 1, RAID 1
RAID 1, advantages of, RAID 1
RAID 1, disadvantages of, RAID 1
RAID 5, RAID 5
RAID 5, advantages of, RAID 5
RAID 5, disadvantages of, RAID 5
nested RAID, Nested RAID Levels
overview of, Basic Concepts
raidhotadd command, use of, Rebuilding a RAID array with raidhotadd
RAM, Main Memory — RAM
read permission, User Accounts, Groups, and Permissions
recursion
see recursion
Red Hat Enterprise Linux-specific information
automation, Automation
backup technologies
AMANDA, The Advanced Maryland Automatic Network Disk Archiver (AMANDA)
cpio, cpio
dump, dump/restore: Not Recommended for Mounted File Systems!
tar, tar
backups technologies
overview of, Backup Technologies
bash shell, Automation
communication, Documentation and Communication
disaster recovery, Red Hat Enterprise Linux-Specific Information
documentation, Documentation and Communication
intrusion detection systems, Security
PAM, Security
perl, Automation
resource monitoring
bandwidth, Red Hat Enterprise Linux-Specific Information
CPU power, Red Hat Enterprise Linux-Specific Information
memory, Red Hat Enterprise Linux-Specific Information
resource monitoring tools, Red Hat Enterprise Linux-Specific Information
free, Red Hat Enterprise Linux-Specific Information, Red Hat Enterprise Linux-Specific Information
iostat, Monitoring Bandwidth on Red Hat Enterprise Linux
OProfile, Red Hat Enterprise Linux-Specific Information
sar, Monitoring Bandwidth on Red Hat Enterprise Linux, Monitoring CPU Utilization on Red Hat Enterprise Linux, Red Hat Enterprise Linux-Specific Information
Sysstat, Red Hat Enterprise Linux-Specific Information
top, Red Hat Enterprise Linux-Specific Information, Monitoring CPU Utilization on Red Hat Enterprise Linux
vmstat, Red Hat Enterprise Linux-Specific Information, Monitoring Bandwidth on Red Hat Enterprise Linux, Monitoring CPU Utilization on Red Hat Enterprise Linux, Red Hat Enterprise Linux-Specific Information
RPM, Security
security, Security
shell scripts, Automation
software support, Software Support
support, software, Software Support
registering your subscription, Activate Your Subscription
resource abuse, What Barriers Are in Place To Prevent Abuse of Resources
resource monitoring, Resource Monitoring
bandwidth, Monitoring Bandwidth
capacity planning, Monitoring System Capacity
concepts behind, Basic Concepts
CPU power, Monitoring CPU Power
memory, Monitoring Memory
storage, Monitoring Storage
system capacity, Monitoring System Capacity
system performance, System Performance Monitoring
tools
free, free
GNOME System Monitor, The GNOME System Monitor — A Graphical top
iostat, The Sysstat Suite of Resource Monitoring Tools
mpstat, The Sysstat Suite of Resource Monitoring Tools
OProfile, OProfile
sa1, The Sysstat Suite of Resource Monitoring Tools
sa2, The Sysstat Suite of Resource Monitoring Tools
sadc, The Sysstat Suite of Resource Monitoring Tools
sar, The Sysstat Suite of Resource Monitoring Tools, The sar command
Sysstat, The Sysstat Suite of Resource Monitoring Tools
top, top
vmstat, vmstat
tools used, Red Hat Enterprise Linux-Specific Information
what to monitor, What to Monitor?
resources, importance of, Know Your Resources
resources, system
bandwidth, Bandwidth and Processing Power
buses role in, Buses
buses, examples of, Examples of Buses
capacity, increasing, Increase the Capacity
datapaths, examples of, Examples of Datapaths
datapaths, role in, Datapaths
load, reducing, Reduce the Load
load, spreading, Spread the Load
monitoring of, Monitoring Bandwidth
overview of, Bandwidth
problems related to, Potential Bandwidth-Related Problems
solutions to problems with, Potential Bandwidth-Related Solutions
memory
see memory
processing power, Bandwidth and Processing Power
application overhead, reducing, Reducing Application Overhead
application use of, Applications
applications, eliminating, Eliminating Applications Entirely
capacity, increasing, Increasing the Capacity
consumers of, Consumers of Processing Power
CPU, upgrading, Upgrading the CPU
facts related to, Facts About Processing Power
load, reducing, Reducing the Load
monitoring of, Monitoring CPU Power
O/S overhead, reducing, Reducing Operating System Overhead
operating system use of, The Operating System
overview of, Processing Power
shortage of, improving, Improving a CPU Shortage
SMP, Is Symmetric Multiprocessing Right for You?
symmetric multiprocessing, Is Symmetric Multiprocessing Right for You?
upgrading, Upgrading the CPU
storage
see storage
RPM, Security
RPM Package Manager
see RPM

S

sa1 command, The Sysstat Suite of Resource Monitoring Tools
sa2 command, The Sysstat Suite of Resource Monitoring Tools
sadc command, The Sysstat Suite of Resource Monitoring Tools
sar command, The Sysstat Suite of Resource Monitoring Tools, The sar command, Monitoring Bandwidth on Red Hat Enterprise Linux, Monitoring CPU Utilization on Red Hat Enterprise Linux, Red Hat Enterprise Linux-Specific Information
reports, reading, Reading sar Reports
SCSI disk drive
adding, Adding SCSI Disk Drives
SCSI interface
overview of, SCSI
security
importance of, Security Cannot be an Afterthought
Red Hat Enterprise Linux-specific information, Security
setgid permission, Security, User Accounts, Groups, and Permissions
setuid permission, Security, User Accounts, Groups, and Permissions
shell scripts, Automation
SMB, SMB
SMP, Is Symmetric Multiprocessing Right for You?
social engineering, risks of, The Risks of Social Engineering
software
support for
documentation, Documentation
email support, Web or Email Support
on-site support, On-Site Support
overview, Getting Help — Software Support
self support, Self Support
telephone support, Telephone Support
Web support, Web or Email Support
sticky bit permission, User Accounts, Groups, and Permissions
storage
adding, Adding Storage, Adding Storage
/etc/fstab, updating, Updating /etc/fstab
ATA disk drive, Adding ATA Disk Drives
backup schedule, modifying, Modifying the Backup Schedule
configuration, updating, Updating System Configuration
formatting, Formatting the Partition(s), Formatting the Partition(s)
hardware, installing, Installing the Hardware
partitioning, Partitioning, Partitioning
SCSI disk drive, Adding SCSI Disk Drives
deploying, Making the Storage Usable
disk quotas, Disk Quota Issues
see disk quotas
file system, File Systems, File System Basics
/etc/mtab file, Viewing /etc/mtab
/proc/mounts file, Viewing /proc/mounts
access control, Access Control
access times, Tracking of File Creation, Access, Modification Times
accounting, space, Accounting of Space Utilized
creation times, Tracking of File Creation, Access, Modification Times
df command, using, Issuing the df Command
directories, Hierarchical Directory Structure
display of mounted, Seeing What is Mounted
enabling access to, Enabling Storage Access
EXT2, EXT2
EXT3, EXT3
file-based, File-Based Storage
hierarchical directory, Hierarchical Directory Structure
ISO 9660, ISO 9660
modification times, Tracking of File Creation, Access, Modification Times
mount point, Mount Points
mounting, Mounting File Systems
mounting with /etc/fstab file, Mounting File Systems Automatically with /etc/fstab
MSDOS, MSDOS
space accounting, Accounting of Space Utilized
structure, directory, Directory Structure
VFAT, VFAT
file-related issues, File-Related Issues
file access, File Access
file sharing, File Sharing
management of, Managing Storage, Storage Management Day-to-Day
application usage, Excessive Usage by an Application
excessive use of, Excessive Usage by a User
free space monitoring, Monitoring Free Space
growth, normal, Normal Growth in Usage
user issues, Handling a User's Excessive Usage
mass-storage devices
access arm movement, Access Arm Movement
access arms, Access Arms
addressing concepts, Storage Addressing Concepts
addressing, block-based, Block-Based Addressing
addressing, geometry-based, Geometry-Based Addressing
block-based addressing, Block-Based Addressing
command processing, Command Processing Time
cylinder, Cylinder
disk platters, Disk Platters
electrical limitations of, Mechanical/Electrical Limitations
geometry, problems with, Problems with Geometry-Based Addressing
geometry-based addressing, Geometry-Based Addressing
head, Head
heads, Data reading/writing device
heads reading, Heads Reading/Writing Data
heads writing, Heads Reading/Writing Data
I/O loads, performance, I/O Loads and Performance
I/O loads, reads, Reads Versus Writes
I/O loads, writes, Reads Versus Writes
I/O locality, Locality of Reads/Writes
IDE interface, IDE/ATA
industry-standard interfaces, Present-Day Industry-Standard Interfaces
interfaces for, Mass Storage Device Interfaces
interfaces, historical, Historical Background
interfaces, industry-standard, Present-Day Industry-Standard Interfaces
latency, rotational, Rotational Latency
mechanical limitations of, Mechanical/Electrical Limitations
movement, access arm, Access Arm Movement
overview of, An Overview of Storage Hardware
performance of, Hard Drive Performance Characteristics
platters, disk, Disk Platters
processing, command, Command Processing Time
readers versus writers, Multiple Readers/Writers
rotational latency, Rotational Latency
SCSI interface, SCSI
sector, Sector
monitoring of, Monitoring Storage
network-accessible, Network-Accessible Storage, Network-Accessible Storage Under Red Hat Enterprise Linux
NFS, NFS
SMB, SMB
partition
attributes of, Partition Attributes
extended, Extended Partitions
geometry of, Geometry
logical, Logical Partitions
overview of, Partitions/Slices
primary, Primary Partitions
type field, Partition Type Field
type of, Partition Type
patterns of access, Storage Access Patterns
RAID-based
see RAID
removing, Removing Storage, Removing Storage
/etc/fstab, removing from, Remove the Disk Drive's Partitions From /etc/fstab
data, removing, Moving Data Off the Disk Drive
erasing contents, Erase the Contents of the Disk Drive, Erase the Contents of the Disk Drive
umount command, use of, Terminating Access With umount
technologies, The Storage Spectrum
backup storage, Off-Line Backup Storage
cache memory, Cache Memory
CPU registers, CPU Registers
disk drive, Hard Drives
hard drive, Hard Drives
L1 cache, Cache Levels
L2 cache, Cache Levels
main memory, Main Memory — RAM
off-line storage, Off-Line Backup Storage
RAM, Main Memory — RAM
technologies, advanced, Advanced Storage Technologies
subscription registration, Activate Your Subscription
swapping, Swapping
symmetric multiprocessing, Is Symmetric Multiprocessing Right for You?
Sysstat, Red Hat Enterprise Linux-Specific Information, The Sysstat Suite of Resource Monitoring Tools
system administration
philosophy of, The Philosophy of System Administration
automation, Automate Everything
business, Know Your Business
communication, Communicate as Much as Possible
documentation, Document Everything
planning, Plan Ahead
resources, Know Your Resources
security, Security Cannot be an Afterthought
social engineering, risks of, The Risks of Social Engineering
unexpected occurrences, Expect the Unexpected
users, Know Your Users
system performance monitoring, System Performance Monitoring
system resources
see resources, system
system-config-printer
see printer configuration

U

UID, Usernames and UIDs, Groups and GIDs
unexpected, preparation for, Expect the Unexpected
user account
access control, Access Control Information
files controlling, Files Controlling User Accounts and Groups
/etc/group, /etc/group
/etc/gshadow, /etc/gshadow
/etc/passwd, /etc/passwd
/etc/shadow, /etc/shadow
GID, Usernames and UIDs, Groups and GIDs
home directory
centralized, Home Directories
management of, Managing User Accounts and Resource Access, Managing User Accounts, Managing Accounts and Resource Access Day-to-Day
job changes, Job Changes
new hires, New Hires
terminations, Terminations
password, Passwords
aging, Password Aging
big character set used in, Expanded Character Set
longer, Longer Passwords
memorable, Memorable
personal information used in, Personal Information
repeatedly used, The Same Password for Multiple Systems
shortness of, Short Passwords
small character set used in, Limited Character Set
strong, Strong Passwords
weak, Weak Passwords
word tricks used in, Simple Word Tricks
words used in, Recognizable Words
written, Passwords on Paper
permissions related to, User Accounts, Groups, and Permissions
execute, User Accounts, Groups, and Permissions
read, User Accounts, Groups, and Permissions
setgid, User Accounts, Groups, and Permissions
setuid, User Accounts, Groups, and Permissions
sticky bit, User Accounts, Groups, and Permissions
write, User Accounts, Groups, and Permissions
resources, management of, Managing User Resources
shared data access, Who Can Access Shared Data
system GIDs, Usernames and UIDs, Groups and GIDs
system UIDs, Usernames and UIDs, Groups and GIDs
tools for managing, User Account and Group Applications
chage command, User Account and Group Applications
chfn command, User Account and Group Applications
chpasswd command, User Account and Group Applications
passwd command, User Account and Group Applications
useradd command, User Account and Group Applications
userdel command, User Account and Group Applications
usermod command, User Account and Group Applications
UID, Usernames and UIDs, Groups and GIDs
username, The Username
changes to, Dealing with Name Changes
collisions in naming, Dealing with Collisions
naming convention, Naming Conventions
user ID
see UID
useradd command, User Account and Group Applications
userdel command, User Account and Group Applications
usermod command, User Account and Group Applications
username, The Username
changing, Dealing with Name Changes
collisions between, Dealing with Collisions
naming convention, Naming Conventions
users
importance of, Know Your Users

W

watch command, free
working set, The Working Set
write permission, User Accounts, Groups, and Permissions

 
 
  Published under the terms of the GNU General Public License Design by Interspire