Thứ Hai, 10 tháng 2, 2014

Tài liệu Complete Idiots Guide to Linux pptx

Logging in Through a Console
What Shell Are You Running?
Command Line Program Syntax
Navigating the File System
Where Are You?: pwd
Listing Files
Listing Directories Remotely
ls in Technicolor
Making Shell Options the Default
Changing Directories: cd
Relative and Absolute Paths
Filename Expansion: Tab
Exiting the Console
Shutting Down a Linux Box
Rebooting a Linux Box
Chapter 12—Working with Files on the Shell
Working with Files and Folders
Creating a New Empty File: touch
Removing Files: rm
Creating a Directory: mkdir
Removing an Empty Directory: rmdir
Copying Files: cp
Moving Files and Directories: mv
Creating Links: ln
Reading Files
Concatenating: cat
Viewing a Page at a Time: less
Peeking at the First Few Lines: head
Peeking at the Last Few Lines: tail
Chapter 13—Text Editing under a Shell
An Improved Visual Editor: Vim
Interactive Vim Tutorial
Vim Basics
Accessing the Shell from Vim
Other Stuff
Complete Idiot's Guide to Linux - Table of Contents
http://www.itknowledge.com/reference/standard/078971826x/ewtoc.html (5 of 11) [1/27/2000 5:48:30 PM]
XEmacs
Starting XEmacs and the XEmacs Tutorial
Checking Your Spelling: Ispell
Chapter 14—Putting the Shell to Work
Using More Than One Command at a Time
Command Groups and Subshells
Redirection
STDOUT
STDERR
Command Groups and Redirection
Pipes: One Program’s Output Is Another’s Input
Getting the Needed Input: Input Redirection
Regular Expressions
Match Anything: *
Match Any Letter: ?
Match in a Range: []
Negating a Range: !
Command History
Jobs: Working on Multiple Things Using a Shell
Suspending a Job
Killing a Job
Chapter 15—Help Please
UNIX Manual Pages
Searching for a Tool: apropos
Getting a Brief Command Description: whatis
Searching Standard Locations: whereis
Built-in Command Information
Online Help via /usr/doc
More about HOWTO documents
Mini HOWTOs
LDP—Linux Documentation Project
Reading Compressed Documentation: zless
Info Pages
Usenet: Internet Newsgroups
Useful Books
Complete Idiot's Guide to Linux - Table of Contents
http://www.itknowledge.com/reference/standard/078971826x/ewtoc.html (6 of 11) [1/27/2000 5:48:30 PM]
Chapter 16—Permissions: Protecting and
Sharing Your Work
How Does Permissions Work?
The Effective User Id
Substitute User: su
Beware of the Powers of Root!
Changing Groups: newgrp
Special Users
Home Directories
Changing File Permissions
Permissions by the Numbers: 4, 2, 1, and 0
Permissions Using Symbols: u, g, o, r, w, and x
Using chmod to Change Permissions
Setuid, Setgid, and Sticky Bits
The Default File Mode: umask
Group Ownership and User Private Groups
Chapter 17—Command Toolbox: Useful Shell
Commands and Shortcuts
User Utilities
Changing Your Password: passwd
Changing Your Shell: chsh
Changing Personal Information: chfn
Who’s on the System: who and w
Viewing and Setting the Date and Time: date
Getting a Calendar: cal
Finding Files
Finding Files by Name: find
Locating Files: locate
Finding Files that Contain a Word or Pattern:
grep
Text and File Utilities
Counting Lines, Words, and Characters: wc
Sorting Lines of Text: sort
Formatting Text: fmt
Splitting Files into Smaller Files: split
Accessing a Computer Through the Network: telnet
Complete Idiot's Guide to Linux - Table of Contents
http://www.itknowledge.com/reference/standard/078971826x/ewtoc.html (7 of 11) [1/27/2000 5:48:30 PM]
Working on the Console: setfont
UNIX Printing Primer
UNIX Text Processing
Part 3—Essential System Tasks Under Linux
Chapter 18—Users, Groups, and Passwords
Adding Users
adduser
Useradd
Modifying Users: usermod
Moving a Home Directory
Changing a Login Name
Changing Secondary Group Memberships
Deleting Users: userdel
Adding, Modifying, and Removing Groups
Groupadd
Managing Group Memberships: gpasswd
Users and Passwords
Password Don’ts
Password Do’s
Linux and Shadow Passwords
Chapter 19—Backups: Safeguarding Your
Work
Media Are Just Devices
Backup Media
What to Back Up
Simple Backups
Tape Archive: tar
Making a tar File
Extracting Files from a tar Archive
Extracting a File into a Device
A Backup Strategy
The dump Command
dump Examples
Complete Idiot's Guide to Linux - Table of Contents
http://www.itknowledge.com/reference/standard/078971826x/ewtoc.html (8 of 11) [1/27/2000 5:48:30 PM]
restore Examples
Graphical Backup Programs
BRU2000
Chapter 20—Installing Programs and
Applications
RPM: The Red Hat Package Manager
Installing, Upgrading, Downgrading, and Removing
Software
Installing
Upgrading
Downgrading
Uninstalling
A Database of Installed Software
Finding Information About the Package
Finding the Package that Owns a File
Finding Files that are Owned by a Package
Finding Documentation Related to a Package
Verifying Your System
Graphical Front Ends to RPM
Non-RPM Packages
Tar
UNIX Compressed Archives: Gzip and Compress
Windows Compressed Archives: Zip
Chapter 21—LISA: Linux Installation and
System Administration Utility
Basic Functions of LISA
Verbose System Analysis
Software Package Administration
System Configuration
Hardware Configuration Area
System Configuration Area
Network Configuration Area
Host Table Configuration
Network Access Configuration
General Network Services Configuration
Complete Idiot's Guide to Linux - Table of Contents
http://www.itknowledge.com/reference/standard/078971826x/ewtoc.html (9 of 11) [1/27/2000 5:48:30 PM]
Boot Manager Configuration
Chapter 22—System Monitoring: Keeping an
Eye on Your System
Monitoring Memory
How Much Memory: free
Procinfo
Monitoring Processes
Listing the Current Top Processes: top
Process Status: ps
”Nicing” a process: nice and renice
Monitoring Your Disk
Finding out How Much Disk Files Consume: du
Finding the Amount of Free Disk Space: df
Log Files
Monitoring Logins: last
Monitoring Bad Logins: lastb
Chapter 23—Sharing Files over the Network
NFS
Exporting an NFS Volume
Mounting an NFS Volume
FTP
Connecting to an FTP Site
Hosting an FTP Service
HTTP
Configuring an Apache Server
Controlling Access
SMB: Sharing Disks and Printers to PCs
Accessing a PC Network Drive from Linux:
smbclient
Chapter 24—Customizing Your Linux Kernel
Customizing Your Linux Kernel with LISA
Customizing Your Linux Kernel by Recompiling
Getting Started
Configuring the New Kernel
Compiling the Kernel and Necessary Modules
Complete Idiot's Guide to Linux - Table of Contents
http://www.itknowledge.com/reference/standard/078971826x/ewtoc.html (10 of 11) [1/27/2000 5:48:30 PM]
Installing the New Kernel
Installing the New Modules
Configuring LILO
Configuring the New Modules and Rebooting
Appendix A
Appendix B
Index
Products | Contact Us | About Us | Privacy | Ad Info | Home
Use of this site is subject to certain Terms & Conditions, Copyright © 1996-2000 EarthWeb Inc.
All rights reserved. Reproduction whole or in part in any form or medium without express written permission of EarthWeb is
prohibited.
Complete Idiot's Guide to Linux - Table of Contents
http://www.itknowledge.com/reference/standard/078971826x/ewtoc.html (11 of 11) [1/27/2000 5:48:30 PM]


Brief Full
Advanced
Search
Search Tips
To access the contents, click the chapter and section titles.
Complete Idiot's Guide to Linux
(Publisher: Macmillan Computer Publishing)
Author(s): Manuel Ricart
ISBN: 078971826x
Publication Date: 12/22/98
Search this book:

Table of Contents
1, 2, 3 Go!
Welcome to Linux! It’s the software that is grabbing the world’s attention as a
reliable and powerful operating system (OS). At the time of this writing, Linux
and Windows NT are the only OSs gaining market share. Most other OSs are
either stagnant or are losing their share to Linux or Windows NT.
How to Use This Book
This book is a gentle introduction to Linux, and as such, it is not intended as a
comprehensive guide. On the contrary, great effort has gone into this book to
keep it from becoming yet another comprehensive reference guide. I’ve been
selective about covering the topics you are most likely to use early in your
Linux hacking career.
One of the interesting things about Linux, and UNIX in general, is that
learning new ways and tools is almost an endless task. There are many
tools—too many to cover even in several “comprehensive” volumes. Much of
the comprehensive and exhaustive reference for Linux is readily available in
various forms, some of which will be installed into your computer as part of
the installation process.
In contrast, this book focuses on how to make you self-sufficient. It teaches
you two ways of working with Linux: using the X graphical environment (with
KDE) and using the shell, the command line interpreter so closely associated
with UNIX. And, if you are managing your own Linux computer, there are
some administrative tasks that you need to learn how to do.
Complete Idiot's Guide to Linux:1, 2, 3 Go!
http://www.itknowledge.com/reference/standard/078971826x/about.html (1 of 5) [1/27/2000 5:48:32 PM]
Go!
Keyword

Go!
So how is this book organized? Installation and first-time configuration
instructions are located in Appendix A, “Linux Installation.” Appendix B,
“OpenLinux Compatibility Guide,” provides you with an up-to-date list of the
ever-growing and ever-changing list of hardware that is known to be
compatible with Linux. While mapping your installation plan, you should
verify that your hardware is listed and known to be compatible with
OpenLinux.
After your initial Linux installation and configuration, start with Part 1,
“Working with Linux in a Graphical Environment—The KDE Desktop,” and
read the chapters in order. (We’ve structured the chapters counting on you
doing so.) Part 2, “Working on the Command Line,” introduces similar
concepts as Part I, this time using a shell instead of a graphical user interface.
Last, Part 3, “Essential System Tasks Under Linux,” focuses on various
administration tasks that you’ll need to do occasionally. Keep in mind that
while you are learning Linux, you are also learning UNIX. What you learn
here will transfer with little modification into other UNIX environments.
Have fun getting to know your new operating system!
Why Linux?
So why all the attention? UNIX has been around for a number of years, and
although believed by some to be the only choice among real OSs, it has
remained in the vertical market arena until very recently. But what does this
mean? UNIX (or Linux, which is based on UNIX) provides a very robust
environment in which to run and deploy applications. By design, it offers the
following features:
• Multiuser support
• Security
• Full multitasking
• Networking support for client and server applications
• Source code
These are features that some of the PC OSs available today don’t offer, or they
have been added as an afterthought. These are all very important features,
especially in the context of today’s networked environments where computers
share information.
Unlike Windows-based systems, UNIX is able to support multiple users
concurrently. A single UNIX/Linux computer can have multiple users working
on it (running programs, accessing files, and other services) at the same time,
either seamlessly across a network or through a directly attached console (a
screen and keyboard).
As a result, UNIX and Linux offer an environment where many (hundreds) of
users can simultaneously access a system, if the system has enough resources.
With so many potential users, how do you protect important files from
unauthorized access? Linux’s UNIX roots handle security transparently, not as
an afterthought, but as part of the Linux way of life. In order for you to work
on the computer, you have to sign in.
Complete Idiot's Guide to Linux:1, 2, 3 Go!
http://www.itknowledge.com/reference/standard/078971826x/about.html (2 of 5) [1/27/2000 5:48:32 PM]
Security isn’t Linux’s only kudo. It’s also an expert juggler! How else could
you simultaneously support multiple users? Linux is a multitasking OS. It
juggles multiple programs and users at the same time, creating the illusion that
each user is working on his or her own computer. Obviously, only a little tiny
bit of work can be done in a slice of time, but the illusion is well maintained.
Other OSs that claim to be multitasking usually don’t scale well. When a few
users are accessing the services, performance rapidly decreases. The juggling
illusion becomes reality for platforms that support multiple processors. The
computer can, in fact, juggle multiple things at the same time. The Linux OS
takes advantage of these hardware configurations and makes use of the
additional processing power to increase performance to new levels—usually
with better results than the original OS the hardware was designed for.
Many of today’s computers rely on a networked environment. “The network is
the computer”
SM
is the famous slogan for Sun Microsystems, a large UNIX
vendor. The network is indeed the computer. Information exchange via email,
the Web, and other mechanisms is an everyday fact. Linux can not only
participate as a client for such services, but it can also offer them to other PCs
and workstations. Linux, in fact, powers many Internet service providers
(ISPs) and the users who access the ISP’s services. It is well tested and
reliable.
Not many commercial environments provide the source code to how they
work, and then do so freely. That’s where Linux steps out from the crowd!
Having the source code allows information service (IS) departments, or
hackers as well, to customize the particular behavior of the OS or a program
distributed with it to fit a particular need. Companies concerned about security
issues can examine how the software really works and make their own
evaluations and adjustments. In the event of a problem, someone with the right
background can generate a fix, usually within hours of a problem or security
issue being discovered. Compare that to waiting for days, weeks, or months for
bug fixes—the norm that most of us have come to expect with other OSs. For
the student, having access to the source code provides insight into how
systems are made and built.
On the downside, UNIX and UNIX-like OSs have lacked ergonomics on the
surface, providing confusing interfaces that vary from program to program and
vendor to vendor, and generally aren’t intuitive for nonexpert-type users.
Mainstream application developers not seeing profitability with these
environments have chosen to keep their wares on other, more profitable OS
platforms. But that attitude is rapidly changing in the Linux market.
With its newfound popularity, Linux has encouraged big software developers
such as Oracle, Sybase, Corel, and many others to develop versions of their
applications for Linux systems. The world is beginning to take Linux
seriously—and a little sponsoring goes a long way! This in itself has generated
additional media interest, and Linux coverage has changed from a curiosity in
obscure publications to a viable business option and alternative to heavyweight
products from other companies. This is great news, because the more
developers entering the Linux arena, the more popular and accessible this OS
environment becomes!
Complete Idiot's Guide to Linux:1, 2, 3 Go!
http://www.itknowledge.com/reference/standard/078971826x/about.html (3 of 5) [1/27/2000 5:48:32 PM]

Không có nhận xét nào:

Đăng nhận xét