Table of Contents of the Debian GNU/Linux Administrator Handbook



Similar documents
COURCE TITLE DURATION LPI-202 Advanced Linux Professional Institute 40 H.

HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD Course Outline CIS INTRODUCTION TO UNIX

Getting Started in Red Hat Linux An Overview of Red Hat Linux p. 3 Introducing Red Hat Linux p. 4 What Is Linux? p. 5 Linux's Roots in UNIX p.

Deploying Ubuntu Server Edition. Training Course Overview. (Ubuntu LTS)

Ubuntu Sever Administration

Red Hat System Administration 1(RH124) is Designed for IT Professionals who are new to Linux.

Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting

Advanced Linux System Administration Knowledge GNU/LINUX Requirements

Table of Contents. Introduction. Audience. At Course Completion. Prerequisites

Linux for UNIX Administrators

RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux..

ENTERPRISE LINUX SYSTEM ADMINISTRATION

Linux System Administration on Red Hat

What is included in the ATRC server support

GLS250 "Enterprise Linux Systems Administration"

GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III

GL-250: Red Hat Linux Systems Administration. Course Outline. Course Length: 5 days

Information Security Measures and Monitoring System at BARC. - R.S.Mundada Computer Division B.A.R.C., Mumbai-85

A candidate following a programme of learning leading to this unit will be able to:

Advanced Linux System Administration on Red Hat

RedHat (RHEL) System Administration Course Summary

Red Hat Certifications: Red Hat Certified System Administrator (RHCSA)

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

RHCSA 7RHCE Red Haf Linux Certification Practice

Linux VPS with cpanel. Getting Started Guide

Linux Troubleshooting. 5 Days

OVERVIEW OF TYPICAL WINDOWS SERVER ROLES

NETWORK SECURITY HACKS *

ICANWK401A Install and manage a server

Red Hat Linux 7.2 Installation Guide

Training on Linux System Administration, LPI Certification Level 1

Comodo MyDLP Software Version 2.0. Installation Guide Guide Version Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013

IT6203 Systems & Network Administration. (Optional)

DeployStudio Server Quick Install

NETWORK SECURITY HACKS

IT6204 Systems & Network Administration. (Optional)

LOCKSS on LINUX. CentOS6 Installation Manual 08/22/2013

Advanced Diploma In Hardware, Networking & Server Configuration

Installing and Configuring Websense Content Gateway

Linux Operating System Security

Penetration Testing LAB Setup Guide

ENTERPRISE LINUX NETWORKING SERVICES

Novell Identity Manager Resource Kit

Linux Embedded devices with PicoDebian Martin Noha

OS Installation Guide Red Hat Linux 9.0

IT Essentials II: Network Operating Systems v3.0 Scope and Sequence

Active Directory - User, group, and computer account management in active directory on a domain controller. - User and group access and permissions.

GL-275: Red Hat Linux Network Services. Course Outline. Course Length: 5 days

Security Best Practice

Small Systems Solutions is the. Premier Red Hat and Professional. VMware Certified Partner and Reseller. in Saudi Arabia, as well a competent

Fedora 14 & Red Hat. Descripción del curso:

Linux Server (Web, FTP, File) on Vmware

Prerequisites: Fundamentals of Networking, Knowledge of Operating Systems

SETTING UP A LAMP SERVER REMOTELY

GL275 - ENTERPRISE LINUX NETWORKING SERVICES

Windows 7, Enterprise Desktop Support Technician

F-Secure Messaging Security Gateway. Deployment Guide

The BackTrack Successor

Red Hat Enterprise Linux (RHEL 6) Courses

Kerio MailServer 6. Administrator s Guide. Kerio Technologies

Firewall, Mail and File server solution

LBNC and IBM Corporation Document: LBNC-Install.doc Date: Path: D:\Doc\EPFL\LNBC\LBNC-Install.doc Version: V1.0

ReadyNAS Setup Manual

Medical Networks and Operating Systems

ENTERPRISE LINUX SECURITY ADMINISTRATION

Oracle Linux 7: System Administration Ed 1 NEW

PARALLELS SERVER BARE METAL 5.0 README

1 Introduction to the Axxess Server

LOCKSS on LINUX. Installation Manual and the OpenBSD Transition 02/17/2011

Professional Xen Visualization

Preface 1. Introduction to Linux Networking 1.0 Introduction 2. Building a Linux Gateway on a Single-Board Computer 2.0 Introduction 2.

Small Business Server Part 2

GL-550: Red Hat Linux Security Administration. Course Outline. Course Length: 5 days

Kaspersky Endpoint Security 8 for Linux INSTALLATION GUIDE

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

Kerio Control. Administrator s Guide. Kerio Technologies

Funkwerk UTM Release Notes (english)

System administration basics

GL550 - Enterprise Linux Security Administration

F-SECURE MESSAGING SECURITY GATEWAY

Create a virtual machine at your assigned virtual server. Use the following specs

II. Installing Debian Linux:

ENTERPRISE LINUX SECURITY ADMINISTRATION

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

Specialized Programme on Internetworking Design and LAN WAN Administration

UNISOL SysAdmin. SysAdmin helps systems administrators manage their UNIX systems and networks more effectively.

Using iscsi with BackupAssist. User Guide

Dell KACE K1000 Management Appliance. Administrator Guide. Release 5.3. Revision Date: May 16, 2011

Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)

Novell Open Workgroup Suite

information security and its Describe what drives the need for information security.

SUSE LINUX School Server

Red Hat Enterprise Linux 6 Essentials. Red Hat Enterprise Linux 6 Essentials

Installation Guide to the Snare Server Installation Guide to the Snare Server

Distributed File System

Transcription:

Table of Contents of the Debian GNU/Linux Administrator Handbook The Debian Project What Is Debian? A Multi-Platform Operating System The Quality of Free Software The Legal Framework: A Non-Profit Organization The Foundation Documents The Commitment towards Users The Debian Free Software Guidelines The Inner Workings of the Debian Project The Debian Developers The Active Role of Users Teams and Sub-Projects Existing Debian Sub-Projects Administrative Teams Development Teams, Transversal Teams The Role of Distributions The Installer: debian-installer The Software Library Lifecycle of a Release The Experimental Status The Unstable Status Migration to Testing The Release: Testing Becomes Stable Presenting the Case Study Fast Growing IT Needs Long-Term Plans Why a GNU/Linux Distribution? Why the Debian Distribution? Community- and Commercially-Driven Distributions Why Debian Lenny? Analysing the Existing Setup and Migrating 1

Coexistence in Heterogeneous Environments Integration with Windows Machines Integration with Mac OS Machines Integration with Other Linux/Unix Machines How To Migrate Identifying Services Network and Processes Backing up the Configuration Taking Over an Existing Debian Server Installing Debian Installing and Configuring the Selected Services Installation Installation Methods Installing from a CD-ROM/DVD-ROM Booting from a USB Key Installing through Network Booting Other Installation Methods Installing, Step by Step Booting and Starting the Installer Selecting the Language Selecting the Country Selecting the Keyboard Layout Detecting Hardware Loading Components Detecting Network Hardware Configuring the Network Configuring the Clock Detecting Disks and Other Devices Starting the Partitioning Tool Guided Partitioning Manual Partitioning Configuring Multidisk Devices (Software RAID) Configuring the Logical Volume Manager (LVM) Setting Up Encrypted Partitions Administrator Password Creating the First User Installing the Base System Configuring the Package Manager (apt) Debian Package Popularity Contest Selecting Packages for Installation Installing the GRUB Bootloader 2

Finishing the Installation and Rebooting After the First Boot Installing Additional Software Upgrading the System Packaging System: Tools and Fundamental Principles Structure of a Binary Package Package Meta-Information Description: the control File Dependencies: the Depends Field Conflicts: the Conflicts field Incompatibilities: the Breaks Field Provided Items: the Provides Field Providing a Service Interchangeability with Another Package Current Limitations Replacing Files: the Replaces Field Configuration Scripts Installation and upgrade Package Removal Checksums, List of Configuration Files Structure of a Source Package Format Usage within Debian Manipulating Packages with dpkg Installing Packages Removing packages Other dpkg Features dpkg's Log File Coexistence with Other Packaging Systems Maintenance and Updates: The APT Tools Filling in the sources.list File Non-Official Resources: apt-get.org, mentors.debian.net and backports.org aptitude and apt-get Commands Initialization Installing and Removing 3

System Upgrade Configuration Options Managing Package Priorities Working with Several Distributions The apt-cache Command Frontends: aptitude, synaptic aptitude Tracking Automatically Installed Packages Managing Recommendations, Suggestions and Tasks Better Solver Algorithms synaptic Checking Package Authenticity Upgrading from One Stable Distribution to the Next Recommended Procedure Handling Problems after an Upgrade Keeping a System Up to Date Automatic Upgrades Configuring dpkg Configuring APT Configuring debconf Handling Command Line Interactions The Miracle Combination Searching for Packages Solving Problems and Finding Relevant Information Documentation Sources Manual Pages info Documents Specific Documentation Websites Tutorials (HOWTO) Common Procedures Configuring a Program Monitoring What Daemons Are Doing Asking for Help on a Mailing List Reporting a Bug When the Problem Is Too Difficult Basic Configuration: Network, Accounts, Printing... 4

Configuring the System for Another Language Setting the Default Language Configuring the Keyboard for the Console Migrating to UTF-8 Configuring the Keyboard for the Graphical Interface Configuring the Network Ethernet Interface Connecting with PPP through a PSTN Modem Connecting through an ADSL Modem Modems Supporting PPPOE Modems Supporting PPTP Modems Supporting DHCP Automatic Network Configuration for Roaming Users Setting the Hostname and Configuring the Name Service Name Resolution Configuring DNS Servers The /etc/hosts File User and Group Databases User List: /etc/passwd The Hidden and Encrypted Password File: /etc/shadow Modifying an Existing Account or Password Disabling an Account Group List: /etc/group Creating Accounts Environment of Shells Configuring Printing Configuring the Bootloader Identifying the Disks Configuring LILO Configuring GRUB For Macintosh Computers (PowerPC): Configuring Yaboot More to configure: time synchronization, logs, shares... Timezone Time Synchronization For Workstations For Servers Rotating Log Files Sharing Administrator Rights Liste of Mount Points locate and updatedb Compiling a Kernel Introduction and prerequisites Getting the Sources 5

Configuring the Kernel Compiling and building the package Compiling External Modules Applying a Kernel Patch Installing a Kernel Features of a Debian Kernel Package Installing with dpkg Unix Services System Boot Remote Login Remote Login: telnet Secure Remote Login: SSH Key-Based Authentication Using Remote X11 Applications Creating Encrypted Tunnels with Port Forwarding Using Remote Graphical Desktops Managing Rights Administration Interfaces Administrating On a Web Interface: webmin Configuring Packages: debconf syslog System Events Principle and Mechanism The Configuration File Syntax of the Selector Syntax of Actions The inetd Super-Server Task Scheduling: cron and atd Format of a crontab File Using the at Command Asynchronous Scheduling: anacron Quotas Backing Up Backing Up with rsync Restoring Machines without Backups Hot Plugging: hotplug Introduction The Naming Problem How udev works Example Power Management 6

Advanced Power Management (APM) Advanced Configuration and Power Interface (ACPI) Laptop Extension Cards: PCMCIA Network Infrastructure Gateway Virtual Private Network OpenVPN Public Key Infrastructure: easy-rsa Configuring the OpenVPN Server Configuring the OpenVPN Client Virtual Private Network with SSH IPsec PPTP Configuring the Client Configuring the Server Quality of Service Principle and Mechanism Configuring and Implementing Reducing Latencies: wondershaper Standard Configuration Dynamic Routing IPv6 Domain Name Servers (DNS) Principles Configuring DHCP Presentation Configuring DHCP and DNS Network Diagnosis Tools Local Diagnosis: netstat Remote Diagnosis: nmap Sniffers: tcpdump and wireshark Network Services: Postfix, Apache, NFS, Samba, Squid, LDAP Mail Server Installing Postfix Configuring Virtual Domains 7

Virtual Alias Domains Virtual Mailbox Domains Restrictions for receiving and sending IP-Based Access Restrictions Checking the Validity of the EHLO or HELO Commands Accepting or Refusing Based on the Announced Sender Accepting or Refusing Based on the Recipient Restrictions Associated with the DATA Command Applying Restrictions Filtering Based on the Message Contents Setting Up greylisting Customizing Filters Based On the Recipient Integrating an Antivirus Installing and Configuring the Antivirus Configuring Postfix with the Antivirus Authenticated SMTP Web Server (HTTP) Installing Apache Configuring Virtual Hosts Common Directives Requesting an Authentication Restricting Access Log Analyzers FTP File Server NFS File Server Securing NFS NFS Server NFS Client Setting Up Windows Shares with Samba Samba Server Configuring with debconf Configuring Manually Changes to smb.conf Adding Users Switching to Domain Controller Samba Client The smbclient Program Mounting a Windows Share Printing on a Shared Printer HTTP/FTP Proxy Installing Configuring a Cache Configuring a Filter 8

LDAP Directory Installing Filling in the Directory Managing Accounts with LDAP Configuring NSS Configuring PAM Securing LDAP Data Exchanges Configuring the Server Configuring the Client Advanced Administration RAID and LVM Software RAID Different RAID Levels Setting Up RAID Backing up the Configuration LVM LVM Concepts Setting Up LVM LVM Over Time RAID or LVM? Virtualization with Xen Automated Installation SystemImager Fully Automatic Installer (FAI) Preseeding Debian-Installer Using a Preseed File Creating a Preseed File Creating a Customized Boot Media Booting From the Network Preparing a Bootable USB Key Creating a CD-Rom Image Simple-CDD: The All-In-One Solution Creating Profiles Configuring and Using build-simple-cdd Generating an ISO Image Supervision Setting Up Munin Configuring Hosts To Monitor Configuring the Grapher Setting Up Nagios Installing 9

Workstation Configuring Configuring the X11 Server Automatic Detection Configuration Script Customizing the Graphical Interface Choosing a Display Manager Choosing a Window Manager Menu Management Graphical Desktops GNOME KDE Xfce and Others Tools Email Evolution KMail Thunderbird and Icedove Web Browsers Development Tools for GTK+ on GNOME Tools for Qt on KDE Collaborative Work Working in Groups: groupware Instant Messaging Systems Configuring the Server Jabber Clients Collaborative Work With GForge Office Suites Emulating Windows: Wine Security Defining a Security Policy Firewall or Packet Filtering Behavior of Netfilter Syntax of iptables Commands Rules Creating Rules Installing the Rules at Each Boot 10

Supervision: prevention, detection, dissuasion Monitoring Logs with logcheck Monitoring Activity In Real Time History Detecting Changes Auditing Packages: debsums and its Limits Monitoring Files: AIDE Detecting Intrusion (IDS/NIDS) Introduction to SELinux Principles Setting Up SELinux Managing an SELinux System Managing SELinux Modules Managing Identities Managing File Contexts, Ports and Booleans Adapting the Rules Writing a.fc File Writing a.if File Writing a.te File Compiling the Files Other Security Related Considerations Inherent Risks of Web Applications Knowing What To Expect Choosing the Software Wisely Managing a Machine as a Whole Users Are Actors Physical Security Legal Liability Dealing with a Compromised Machine Detecting and Seeing the Cracker's Intrusion Putting the Server Off-Line Keeping Everything that Could Be Used as Evidence Re-installing Forensic Analysis Reconstituting the Attack Scenario Creating a Debian Package Rebuilding a Package from its Sources Getting the Sources Making Changes Starting the Rebuild 11

Building your First Package Meta-Packages or Fake Packages Simple File Archive Creating a Package Repository for APT Becoming a Package Maintainer Learning to Make Packages Rules Procedures Tools The lintian Program devscripts debhelper and dh-make dupload and dput Acceptance Process Prerequisites Registration Accepting the Principles Checking Skills Final Approval Conclusion: Debian's Future Upcoming Developments Debian's Future Future of this Book Derivative Distributions Ubuntu Linux Knoppix SimplyMEPIS Xandros Linspire and Freespire Sidux Damn Small Linux And Much More Short Remedial Course Shell and Basic Commands Browsing the Directory Tree and Managing Files Displaying and Modifying Text Files 12

Searching for Files and within Files Managing Processes System Information: Memory, Disk Space, Identity Organization of the Filesystem Hierarchy The Root Directory The User's Home Directory Inner Workings of a Computer: The Different Layers Involved The Deepest Layer: the Hardware The Starter: the BIOS The Kernel The User Space Some Tasks Handled by the Kernel Driving the Hardware Filesystems Shared Functions Process Management Rights Management The User Space Process Daemons Inter-Process Communications Libraries 13