By Linda McKinnon
A no-nonsense consultant for IT professionals
While Linux proprietors promise pace, potency, and reliability, it
Read or Download Customizing and Upgrading Linux PDF
Similar unix books
This can be the definitive connection with the GCC open-source compiler. Get up to date details at the newest features--including compiling Java code, development functions utilizing a number of languages, utilizing the debugger, linking, libraries, and lots more and plenty extra.
A close and sensible consultant to DNS implementation, configuration, and management Technically targeted with sensible suggestions entire advisor to configuration and management of DNS servers Covers DNS Extensions, delegation, and registration intimately The area identify procedure is without doubt one of the foundations of the net.
First this e-book explains how Pluggable Authentication Modules (PAM) simplify and standardize authentication in Linux. It exhibits intimately how PAM works and the way it truly is configured. Then eleven universal modules used throughout UNIX/Linux distributions are tested and defined, together with all their parameters. deploy of third-party modules is mentioned, and the improvement of recent modules and PAM-aware purposes is printed.
Simply Say No to Microsoft - starts by means of tracing Microsoft's upward thrust from tiny software program startup to monopolistic juggernaut and explains how the company's practices through the years have discouraged innovation, stunted pageant, and helped foster an atmosphere ripe for viruses, insects, and hackers. Readers learn the way they could sell off Microsoft items - even the home windows working procedure - and remain efficient.
- Mastering Red Hat Linux 9
- Solaris 10 system administration essentials
- Building a Server with FreeBSD 7
- bash Pocket Reference
- Hack Attacks Revealed: A Complete Reference for UNIX, Windows, and Linux with Custom Security Toolkit (2nd Edition)
Additional info for Customizing and Upgrading Linux
If you were mirroring, we would suggest the former. If your CD-ROM were used constantly, then you would probably want to use the later suggestion. Whatever you do, make sure that the devices are configured correctly as master or slave. All of this discussion assumes that all the drives and CD-ROMs involved are all compatible technology. There are different kinds of IDE technology, and as discussed in Chapter 1, “Preparing for Installation: Chronicling Your Equipment,” some should not be mixed. For example, do not penalize a hard drive by having it share a controller with a very slow CD-ROM device.
This situation is usually the case if you have taken the opportunity to add or move drives around in the system. Check the master/slave jumpers on all the drives and devices. If the drives are all chained off of the same IDE controller, then one device should be configured as the master and the other device should be the slave. You will have to locate the documentation for the IDE device to find out how the jumpers are to be arranged, because these instructions vary for different devices. Another more interesting problem is dealing with a CD-ROM that will not load automatically after the installation.
Better yet, dedicate an entire drive to the swap space alone. Hard Disk Partitioning The hard disk is, of course, the primary medium for storing information. Hard disks grow in size every year, and as they get larger, using them in an efficient way becomes more difficult. The file system is the general term used to describe the logical structures and software routines used to control the access to the storage on a hard disk system. Different operating systems use different ways of organizing and controlling access to data on the hard disk, and this choice is independent of the specific hardware used.