没有合适的资源?快使用搜索试试~ 我知道了~
首页Linux操作系统入门宝典:2010版详览
Linux操作系统入门宝典:2010版详览
4星 · 超过85%的资源 需积分: 13 20 下载量 151 浏览量
更新于2024-07-26
2
收藏 10.73MB PDF 举报
"Linux宝典 2010版是一本由Christopher Negus编写的全面介绍Linux操作系统的书籍,适用于Linux新手和专业人士。该书详细解释了Linux的基础知识,包括shell命令、图形用户界面,以及如何过渡到Linux系统。书中涵盖了18个以上的Linux发行版,如Ubuntu、Fedora、Debian、OpenSUSE等,并指导读者设置服务器、安装不同Linux发行版以及在Linux环境中编程。"
在《Linux宝典 2010版》中,作者首先引导读者了解Linux的基本概念和操作,通过实例和实践项目帮助读者熟悉Linux环境。在“运行Linux桌面”这一部分,读者可以学习如何使用桌面环境,播放多媒体内容,处理文档和图像,以及进行电子邮件和网络浏览。此外,还介绍了在Linux中玩游戏的方法。
接下来,书中的“系统管理技能”章节教导读者如何安装Linux,使用Shell运行命令,进行基础系统管理,连接互联网,以及增强系统安全性。这部分内容对于想要深入了解Linux操作系统的读者非常有用。
“设置Linux服务器”章节则深入讲解了如何建立LAMP(Linux、Apache、MySQL、PHP)服务器、邮件服务器、打印服务器和文件服务器,为那些希望在Linux环境下构建服务器基础设施的读者提供了详尽的指导。
此外,本书还专门讨论了选择和安装各种Linux发行版,如Ubuntu、Fedora、Red Hat Enterprise Linux、Debian、openSUSE等,以及一些较为独特的发行版如Yellow Dog Linux、Gentoo Linux和PCLinuxOS等。这部分内容对于那些想要尝试不同Linux版本的用户极具价值。
最后,“编程在Linux中”章节介绍了编程环境、接口、工具和实用程序,对于想在Linux平台下进行开发的读者提供了丰富的资源和指导。
附录部分包含了媒体资源、Linux历史背景以及GNU General Public License(版本2),这些补充信息有助于读者更全面地理解Linux及其开源文化。
《Linux宝典 2010版》是一本全面而深入的Linux指南,无论你是初学者还是经验丰富的专业人士,都能从中获益。它涵盖了从基础操作到高级应用的广泛内容,是学习和掌握Linux的宝贵资料。
xiv
Contents
Gaming with LinuxChapter 7: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
Jumping into Linux Gaming .............................................................................................185
Overview of Linux Gaming ..............................................................................................187
Basic Linux Gaming Information .....................................................................................188
Choosing Gaming Hardware for Linux ............................................................................190
Running Open Source Linux Games ................................................................................ 191
GNOME games .......................................................................................................192
KDE games .............................................................................................................193
Games in Fedora .....................................................................................................194
Commercial Linux Games ................................................................................................ 201
Getting started with commercial games in Linux ...................................................202
Playing commercial Linux games ..........................................................................203
id Software games ...................................................................................................203
Playing TransGaming and Cedega games ...............................................................205
Loki Software game demos .....................................................................................207
Summar y ..........................................................................................................................210
Part III: Learning System Administration Skills 211
Installing LinuxChapter 8: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
Choosing a Linux Distribution ......................................................................................... 214
Linux at work ......................................................................................................... 214
Other distributions .................................................................................................215
Getting Your Own Linux Distribution ..............................................................................215
Finding another Linux distribution ........................................................................ 216
Understanding what you need ................................................................................ 216
Downloading the distribution ................................................................................ 217
Burning the distribution to CD ............................................................................... 218
Exploring Common Installation Topics ............................................................................219
Knowing your computer hardware ......................................................................... 219
Upgrading or installing from scratch ......................................................................221
Dual booting and virtualization .............................................................................221
Using installation boot options ...............................................................................223
Partitioning hard drives ..........................................................................................224
Using LILO or GRUB boot loaders ..........................................................................232
Confi guring networking ......................................................................................... 242
Confi guring other administrative features .............................................................. 243
Installing from the Linux Bible CD or DVD ....................................................................... 243
Summar y ..........................................................................................................................244
Running Commands from the ShellChapter 9: . . . . . . . . . . . . . . . . . . . 245
Starting a Shell .................................................................................................................246
Using the shell prompt ...........................................................................................246
Using a terminal window ....................................................................................... 247
85057ftoc.indd xiv85057ftoc.indd xiv 10/15/09 2:18:54 PM10/15/09 2:18:54 PM
xv
Contents
Using virtual terminals ...........................................................................................248
Choosing Your Shell .........................................................................................................248
Using bash (and earlier sh) shells ............................................................................249
Using tcsh (and earlier csh) shells ...........................................................................250
Using ash ................................................................................................................250
Using ksh ................................................................................................................250
Using zsh ................................................................................................................250
Exploring the Shell ...........................................................................................................251
Checking your login session ...................................................................................251
Checking directories and permissions ....................................................................252
Checking system activity ........................................................................................254
Exiting the shell ......................................................................................................255
Using the Shell in Linux ...................................................................................................255
Locating commands ...............................................................................................256
Rerunning commands ............................................................................................259
Connecting and expanding commands ..................................................................265
Creating Your Shell Environment .....................................................................................268
Confi guring your shell ............................................................................................268
Using shell environment variables ..........................................................................272
Managing background and foreground processes ...................................................275
Working with the Linux File System ................................................................................277
Creating fi les and directories ..................................................................................280
Moving, copying, and deleting fi les ........................................................................287
Using the vi Text Editor ....................................................................................................287
Starting with vi .......................................................................................................288
Moving around the fi le ........................................................................................... 291
Searching for text .................................................................................................... 291
Using numbers with commands .............................................................................292
Summar y ..........................................................................................................................293
Learning Basic AdministrationChapter 10: . . . . . . . . . . . . . . . . . . . . . . 295
Graphical Administration Tools .......................................................................................296
Using Web-based administration ...........................................................................296
Graphical administration with different distributions ............................................298
Using the root Login .........................................................................................................302
Becoming root from the shell (su command) ..........................................................303
Allowing limited administrative access ..................................................................304
Exploring Administrative Commands, Confi guration Files, and Log Files ......................304
Administrative commands ......................................................................................305
Administrative confi guration fi les ..........................................................................306
Administrative log fi les ........................................................................................... 310
Using sudo and Other Administrative Logins ................................................................. 310
Administering Your Linux System .................................................................................... 313
Creating User Accounts .................................................................................................... 314
Adding users with useradd ..................................................................................... 314
Setting user defaults ............................................................................................... 317
85057ftoc.indd xv85057ftoc.indd xv 10/15/09 2:18:54 PM10/15/09 2:18:54 PM
xvi
Contents
Modifying users with usermod ............................................................................... 319
Deleting users with userdel ....................................................................................320
Confi guring Hardware .....................................................................................................321
Managing removable hardware ...............................................................................322
Working with loadable modules .............................................................................325
Managing File Systems and Disk Space ............................................................................ 327
Mounting fi le systems .............................................................................................330
Using the mkfs command to create a fi le system ....................................................338
Adding a hard disk .................................................................................................339
Checking system space ...........................................................................................342
Monitoring System Performance .......................................................................................344
Doing Remote System Administration ..............................................................................345
Summar y ..........................................................................................................................347
Getting on the InternetChapter 11: . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
Connecting to the Network ..............................................................................................350
Connecting via dial-up service ...............................................................................350
Connecting a single wired Ethernet card ................................................................ 351
Sharing a network connection with other computers .............................................352
Connecting servers .................................................................................................354
Connecting other equipment .................................................................................. 355
Using Ethernet Connections to the Internet .....................................................................356
Confi guring Ethernet during installation ...............................................................357
Confi guring Ethernet from the desktop ..................................................................357
Using Network Confi guration GUI in Fedora .........................................................358
Identifying other computers (hosts and DNS) ........................................................360
Understanding your Internet connection ................................................................362
Using Dial-Up Connections to the Internet ......................................................................364
Getting information ................................................................................................364
Setting up dial-up PPP ............................................................................................365
Creating a dial-up connection with the Internet Confi guration Wizard .................366
Launching your PPP connection .............................................................................368
Launching your PPP connection on demand ..........................................................369
Checking your PPP connection ............................................................................... 370
Checking that your modem was detected ............................................................... 370
Connecting to the Internet with Wireless .........................................................................371
Summar y ..........................................................................................................................372
Securing LinuxChapter 12: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
Linux Security Checklist .................................................................................................. 374
Finding distribution-specifi c security resources .....................................................377
Finding general security resources .........................................................................378
Using Linux Securely .......................................................................................................379
Using password protection .....................................................................................379
Choosing good passwords ......................................................................................379
Using a shadow password fi le .................................................................................381
85057ftoc.indd xvi85057ftoc.indd xvi 10/15/09 2:18:54 PM10/15/09 2:18:54 PM
xvii
Contents
Using Log Files .................................................................................................................383
The role of syslogd ..................................................................................................386
Redirecting logs to a loghost with syslogd ..............................................................386
Understanding the messages log fi le .......................................................................388
Using Secure Shell Tools ...................................................................................................389
Starting the ssh service ...........................................................................................389
Using the ssh, sftp, and scp commands ..................................................................390
Using ssh, scp, and sftp without passwords ............................................................391
Securing Linux Servers.....................................................................................................392
Controlling access to services with TCP wrappers .................................................392
Understanding attack techniques ...........................................................................395
Protecting against denial-of-service attacks ............................................................396
Protecting against distributed DoS attacks .............................................................399
Protecting against intrusion attacks ........................................................................404
Securing servers with SELinux ...............................................................................407
Protecting Web servers with certifi cates and encryption .......................................407
Using Security Tools from Linux Live CDs ....................................................................... 417
Advantages of security live CDs .............................................................................. 418
Using INSERT to check for rootkits ........................................................................ 418
Summar y .......................................................................................................................... 419
Part IV: Setting Up Linux Servers 421
Chapter 13: Running a Linux, Apache, MySQL,
and PHP (LAMP) Server . . . . . . . . . . . . . . . . . . . . . . . . . . . 423
Components of a LAMP Server ......................................................................................... 424
Apache .................................................................................................................... 424
MyS QL .................................................................................................................... 424
PHP.........................................................................................................................425
Setting Up Your LAMP Server ..........................................................................................426
Installing Apache ....................................................................................................426
Installing PHP.........................................................................................................426
Installing MySQL ....................................................................................................428
Operating Your LAMP Server ...........................................................................................428
Editing your apache confi guration fi les ..................................................................429
Adding a virtual host to Apache ............................................................................. 431
User content and the UserDir setting ...................................................................... 433
Installing a Web application: Coppermine Photo Gallery .......................................433
Troubleshooting ...............................................................................................................437
Confi guration errors ............................................................................................... 437
Access forbidden and server internal errors ............................................................439
Securing Your Web Traffi c with SSL/TLS .........................................................................440
Generating your keys ..............................................................................................442
Confi guring Apache to support SSL/TLS ................................................................443
Summar y ..........................................................................................................................444
85057ftoc.indd xvii85057ftoc.indd xvii 10/15/09 2:18:54 PM10/15/09 2:18:54 PM
xviii
Contents
Running a Mail ServerChapter 14: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445
Internet E-Mail’s Inner Workings .....................................................................................445
About the System and the Software Used .........................................................................447
Preparing Your System .....................................................................................................447
Confi guring DNS for direct delivery .......................................................................448
Confi guring for retrieval from a mail host ..............................................................449
Installing and Confi guring the Mail Server Software .......................................................450
Installing Exim and Courier ...................................................................................450
Installing ClamAV and SpamAssassin ....................................................................452
Testing and Troubleshooting ............................................................................................454
Checking logs .........................................................................................................454
Common errors (and how to fi x them) ................................................................... 455
Confi guring Mail Clients ..................................................................................................458
Confi guring Fetchmail ...........................................................................................459
Confi guring web-based mail ..................................................................................460
Securing Communications with SSL/TLS ........................................................................460
Summar y ..........................................................................................................................462
Running a Print ServerChapter 15: . . . . . . . . . . . . . . . . . . . . . . . . . . . . 463
Common UNIX Printing Service .....................................................................................464
Setting Up Printers ...........................................................................................................465
Using Web-based CUPS administration .................................................................466
Using the Printer Confi guration window ................................................................468
Working with CUPS Printing ........................................................................................... 476
Confi guring the CUPS server (cupsd.conf)............................................................. 476
Starting the CUPS server ........................................................................................477
Confi guring CUPS printer options manually .......................................................... 478
Using Printing Commands ............................................................................................... 479
Printing with lpr .....................................................................................................480
Listing status with lpc ............................................................................................480
Removing print jobs with lprm...............................................................................481
Confi guring Print Servers.................................................................................................481
Confi guring a shared CUPS printer ........................................................................482
Confi guring a shared Samba printer .......................................................................483
Summar y ..........................................................................................................................485
Running a File ServerChapter 16: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487
Setting Up an NFS File Server ..........................................................................................488
Getting NFS ............................................................................................................490
Sharing NFS fi le systems ........................................................................................490
Using NFS fi le systems ...........................................................................................495
Unmounting NFS fi le systems ................................................................................501
Other cool things to do with NFS ...........................................................................502
Setting Up a Samba File Server .........................................................................................502
Getting and installing Samba..................................................................................504
Confi guring Samba with SWAT ..............................................................................505
85057ftoc.indd xviii85057ftoc.indd xviii 10/15/09 2:18:54 PM10/15/09 2:18:54 PM
剩余914页未读,继续阅读
2010-05-05 上传
2023-02-17 上传
2010-04-08 上传
2021-03-08 上传
2007-04-14 上传
huzhouhzy
- 粉丝: 83
- 资源: 1654
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
最新资源
- 创建个性化的Discord聊天机器人教程
- RequireJS实现单页应用延迟加载模块示例教程
- 基于Java+Applet的聊天系统毕业设计项目
- 从HTML到JSX的转换实战教程
- 轻量级滚动到顶部按钮插件-无广告体验
- 探索皇帝多云的天空:MMP 100网站深度解析
- 掌握JavaScript构造函数与原型链的实战应用
- 用香草JS和测试优先方法开发的剪刀石头布游戏
- SensorTagTool: 实现TI SensorTags数据获取的OS X命令行工具
- Vue模块构建与安装教程
- JavaWeb图片浏览小程序毕业设计教程
- 解决 Browserify require与browserify-shim冲突的方法
- Ventuno外卖下载器扩展程序使用体验
- IIT孟买医院模拟申请webapp功能介绍
- 掌握Create React App: 开发Tic-Tac-Toe游戏
- 实现顺序编程与异步操作的wait.for在HarmonyOS2及JavaScript中
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功