Home Page Icon
Home Page
Table of Contents for
Cover
Close
Cover
by Brian K. Jones, William von Hagen
Linux Server Hacks, Volume Two
Credits
About the Authors
Contributors
Acknowledgments
Preface
Why Linux Server Hacks, Volume Two?
How to Use This Book
How This Book Is Organized
Conventions Used in This Book
Using Code Examples
How to Contact Us
Safari® Enabled
Got a Hack?
1. Linux Authentication
1.1. Hacks 1–9: Introduction
1. Disable User Accounts Instantly
1.2.1. Disabling Accounts on Systems That Use Local Authentication
1.2.2. Disabling Accounts on Systems That Use Distributed Authentication
2. Edit Your Password File for Greater Access Control
3. Deny All Access in One Second or Less
1.4.1. See Also
4. Customize Authentication with PAMs
1.5.1. PAM Overview
1.5.2. Per-Application/Service PAM Configuration Files
1.5.3. PAMs Used by the login Process
1.5.4. Configuration and More Configuration
1.5.5. What if PAM Configuration Files Are Missing?
1.5.6. See Also
5. Authenticate Linux Users with a Windows Domain Controller
1.6.1. Software Requirements
1.6.2. Critical Samba Configuration for Using Windows Authentication
1.6.3. Updating /etc/nsswitch.conf
1.6.4. Integrating the pam_winbind.so PAM into System Authentication
1.6.5. Starting the winbindd Daemon
1.6.6. Joining the Domain
1.6.7. Testing Windows Authentication
1.6.8. Debugging Windows Authentication Problems
1.6.9. See Also
6. Centralize Logins with LDAP
1.7.1. Installing LDAP Clients and Servers
1.7.2. Configuring an OpenLDAP Server
1.7.3. Migrating User, Password, and Group Entries to an LDAP Server
1.7.4. Updating Client Systems to Use LDAP Authentication
1.7.5. See Also
7. Secure Your System with Kerberos
1.8.1. Installing Kerberos
1.8.2. Installing and Configuring a Kerberos Server
1.8.3. Installing and Configuring Kerberos Clients and Applications
1.8.4. Using Kerberos for Login Authentication
1.8.5. See Also
8. Authenticate NFS-Lovers with NIS
1.9.1. Installing NIS Clients and Servers
1.9.2. Setting Up an NIS Server
1.9.3. Setting Up an NIS Client
1.9.4. See Also
9. Sync LDAP Data with NIS
1.10.1. The Code
1.10.2. Running the Code
1.10.3. See Also
2. Remote GUI Connectivity
2.1. Hacks 10–19: Introduction
10. Access Systems Remotely with VNC
2.2.1. Understanding the VNC Server Startup Process
2.2.2. Starting Your VNC Server
2.2.3. Connecting to a VNC Server
2.2.4. Customizing Your VNC Server’s X Window System Environment
2.2.5. Stopping Your VNC Server
2.2.6. Optimizing VNC Performance
2.2.7. See Also
11. Access VNC Servers over the Web
2.3.1. Installing Java Classes and Associated Files for the VNC Server
2.3.2. See Also
12. Secure VNC via SSH
2.4.1. Forwarding Remote VNC Ports to Your Current Host
2.4.2. Public or Private VNC Forwarding
2.4.3. Forwarding Ports Without Remote Login
2.4.4. Improving Performance with Compression
2.4.5. Optimizing Graphical Updates Between Server and Viewer
2.4.6. See Also
13. Autostart VNC Servers on Demand
2.5.1. Integrating Xvnc with inetd or xinetd
2.5.2. Activating XDMCP
2.5.3. Starting the Viewer
2.5.4. Troubleshooting Xvnc Startup
2.5.5. See Also
14. Put Your Desktops on a Thin Client Diet
2.6.1. Understanding the LTSP Client Boot Process
2.6.2. Downloading and Installing the LTSP Software
2.6.3. Configuring and Starting the LTSP Server
2.6.4. Preparing LTSP Client Boot Media
2.6.5. Booting an LTSP Client
2.6.6. See Also
15. Run Windows over the Network
2.7.1. Opening Your Connection
2.7.2. Mapping Local Devices to Your Remote Session
2.7.3. See Also
16. Secure, Lightweight X Connections with FreeNX
2.8.1. Installing the FreeNX Server
2.8.2. Installing the NX Client
2.8.3. Configuring and Starting Your NX Client
2.8.4. See Also
17. Secure VNC Connections with FreeNX
2.9.1. Creating an NX Client Configuration for VNC
2.9.2. See Also
18. Secure Windows Terminal Connections with FreeNX
2.10.1. Creating an NX Client Configuration for a Windows Terminal Server
2.10.2. See Also
19. Remote Administration with Webmin
2.11.1. Installation
2.11.2. Configure Away!
2.11.3. See Also
3. System Services
3.1. Hacks 20–28: Introduction
20. Quick and Easy DHCP Setup
3.2.1. Installing a DHCP Server
3.2.2. Configuring Simple DHCP Services
3.2.3. Fire It Up!
3.2.4. See Also
21. Integrate DHCP and DNS with Dynamic DNS Updates
3.3.1. Configuring the BIND 9 Name Server
3.3.2. Configuring the ISC DHCP Server
3.3.3. Starting the Services and Troubleshooting
3.3.4. See Also
22. Synchronize Your Watches!
3.4.1. Hey! My Servers Are Gone!
3.4.2. See Also
23. Centralize X Window System Font Resources
3.5.1. Billions and Billions of Fonts…
3.5.2. Setting Up an X Font Server
3.5.3. Copying Fonts to a Font Server
3.5.4. Starting or Restarting the X Font Server
3.5.5. Updating Desktop Systems to Use an X Font Server
3.5.6. Troubleshooting
3.5.7. Summary
3.5.8. See Also
24. Create a CUPS Print Server
3.6.1. Defining a New Printer in CUPS
3.6.2. Testing CUPS Printing
3.6.3. Fine-Tuning Printer Configuration in CUPS
3.6.4. Enabling Remote Printing on the CUPS Server
3.6.5. Troubleshooting CUPS Printing
3.6.6. Summary
3.6.7. See Also
25. Configure Linux Connections to Remote CUPS Printers
3.7.1. Defining a Remote Printer in CUPS
3.7.2. Summary
3.7.3. See Also
26. Integrate Windows Printing with CUPS
3.8.1. Configuring Printing from Windows 2000/XP Systems
3.8.2. Server-Side Configuration for HTTP Printing
3.8.3. Troubleshooting Windows Printing to CUPS Servers
3.8.4. See Also
27. Centralize Macintosh Printing with CUPS
3.9.1. Configuring Access to a Remote CUPS Server
3.9.2. Server-Side Configuration for HTTP Printing
3.9.3. Testing Printing from Mac OS X to Your CUPS Server
3.9.4. Troubleshooting Mac OS X Printing to CUPS Servers
3.9.5. See Also
28. Define a Secure CUPS Printer
3.10.1. Enabling Remote Printing on a CUPS Server
3.10.2. Restricting Printer Access to Specific IP Addresses
3.10.3. Restricting Printer Access to Specific Users
3.10.4. Summary
3.10.5. See Also
4. Cool Sysadmin Tools and Tips
4.1. Hacks 29–45: Introduction
29. Execute Commands Simultaneously on Multiple Servers
4.2.1. See Also
30. Collaborate Safely with a Secured Wiki
4.3.1. Installing MediaWiki
4.3.2. Configuring MediaWiki
4.3.3. Getting Started: Data Structure
31. Edit Your GRUB Configuration with grubby
32. Give Your Tab Key a Workout
4.5.1. See Also
33. Keep Processes Running After a Shell Exits
4.6.1. Using nohup to Execute Commands
4.6.2. Using disown with Background Jobs
4.6.3. See Also
34. Disconnect Your Console Without Ending Your Session
4.7.1. screen Scripting
4.7.2. See Also
35. Use script to Save Yourself Time and Train Others
4.8.1. See Also
36. Install Linux Simply by Booting
4.9.1. Preparatory Steps
4.9.1.1. Configuring DHCP.
4.9.1.2. Configuring a TFTP server.
4.9.2. Getting It Working
4.9.3. Quick Troubleshooting
37. Turn Your Laptop into a Makeshift Console
4.10.1. Introducing minicom
4.10.2. Testing It
4.10.3. Troubleshooting
38. Usable Documentation for the Inherently Lazy
39. Exploit the Power of Vim
4.12.1. Recording a Vim Macro
4.12.2. Creating Vim Shortcut Keys
40. Move Your PHP Web Scripting Skills to the Command Line
4.13.1. The Code
4.13.2. Running the Code
41. Enable Quick telnet/SSH Connections from the Desktop
4.14.1. See Also
42. Speed Up Compiles
4.15.1. Using distcc
4.15.2. Distribute Compiles to Windows Machines
43. Avoid Common Junior Mistakes
4.16.1. Don’t Take the root Name in Vain
4.16.2. Don’t Get Too Comfortable
4.16.3. Don’t Perform Production Commands “Off the Cuff”
4.16.4. Ask Questions
44. Get Linux Past the Gatekeeper
4.17.1. Don’t Talk Money
4.17.2. Don’t Talk About Linux in a Vacuum
4.17.3. Don’t Pitch Linux for Something It’s Not Well Suited For
4.17.4. Don’t Be Impatient
45. Prioritize Your Work
4.18.1. Prioritizing Tasks
4.18.1.1. Doing tasks in list order.
4.18.1.2. Prioritizing based on customer expectations.
4.18.2. Prioritizing Projects
4.18.2.1. Prioritization for impact.
4.18.2.2. Prioritizing requests from your boss.
4.18.3. Summary
5. Storage Management and Backups
5.1. Hacks 46–55: Introduction
46. Create Flexible Storage with LVM
5.2.1. Logical Volume Buzzwords
5.2.2. Allocating Physical Volumes
5.2.3. Assigning Physical Volumes to Volume Groups
5.2.4. Creating a Logical Volume from a Volume Group
5.2.5. Suggestions
5.2.6. See Also
47. Combine LVM and Software RAID
5.3.1. Mirroring and Redundancy
5.3.2. Overview of RAID Levels
5.3.3. Combining Software RAID and LVM
5.3.4. Creating RAID Devices
5.3.5. Combining RAID and LVM
5.3.6. See Also
48. Create a Copy-on-Write Snapshot of an LVM Volume
5.4.1. Kernel Support for Snapshots
5.4.2. Creating a Snapshot
5.4.3. Mounting a Snapshot
5.4.4. See Also
49. Clone Systems Quickly and Easily
5.5.1. Building partimage
5.5.2. Cloning Partitions Using partimage
5.5.3. Restoring Partitions Using partimage
5.5.4. Summary
5.5.5. See Also
50. Make Disk-to-Disk Backups for Large Drives
5.6.1. Convenient Removable Media Technologies for Backups
5.6.2. Choosing the Right Backup Command
5.6.3. The Code
5.6.4. Running the Code
5.6.5. Choosing What to Back Up
5.6.6. Summary and Tips
51. Free Up Disk Space Now
52. Share Files Using Linux Groups
5.8.1. Linux Protections 101
5.8.2. Setting the umask to Create Sharable Files
5.8.3. Using Directory Permissions to Set Group Membership
5.8.4. See Also
53. Refine Permissions with ACLs
5.9.1. Installing and Activating ACL Support
5.9.1.1. Kernel ACL support.
5.9.1.2. fstab ACL support.
5.9.1.3. User-space ACL support.
5.9.2. Overview of Linux ACLs and Utilities
5.9.3. Displaying Current ACLs
5.9.4. Setting ACLs
5.9.5. See Also
54. Make Files Easier to Find with Extended Attributes
5.10.1. Getting and Installing Extended Attribute Support
5.10.1.1. Configuring your kernel for extended attributes.
5.10.1.2. Configuring fstab for extended attributes.
5.10.1.3. Installing user-space applications for extended attributes.
5.10.2. Displaying Extended Attributes and Their Values
5.10.3. Setting Extended Attributes
5.10.4. Removing Extended Attributes
5.10.5. Searching Using Extended Attributes
55. Prevent Disk Hogs with Quotas
5.11.1. Setting Up Disk Quotas
5.11.2. Installing the Quota Software
5.11.3. Entering Single-User Mode
5.11.4. Editing /etc/fstab
5.11.5. Initializing the Quota Configuration Files
5.11.6. Configuring Your Quotas
5.11.7. See Also
6. Standardizing, Sharing, and Synchronizing Resources
6.1. Hacks 56–62: Introduction
56. Centralize Resources Using NFS
6.2.1. Configuring the NFS Server
6.2.2. Configuring the NFS Clients
6.2.3. Configuring the Service
6.2.4. A Final Consideration
57. Automount NFS Home Directories with autofs
58. Keep Filesystems Handy, but Out of Your Way
6.4.1. amd Configuration in a Nutshell
59. Synchronize root Environments with rsync
6.5.1. See Also
60. Share Files Across Platforms Using Samba
6.6.1. Setting Up Simple Samba Shares
61. Quick and Dirty NAS
6.7.1. Selecting the Hardware
6.7.2. Installing and Configuring Linux
6.7.3. Configuring User Storage
6.7.4. Configuring System Services
6.7.5. Deploying NAS Storage
6.7.6. Summary
6.7.7. See Also
62. Share Files and Directories over the Web
6.8.1. Installing and Configuring Apache’s WebDAV Support
6.8.2. Creating WebDAV Users and Directories
6.8.3. See Also
7. Security
7.1. Hacks 63–68: Introduction
63. Increase Security by Disabling Unnecessary Services
7.2.1. Examining /etc/inittab
7.2.2. Optimizing Per-Runlevel Startup Scripts
7.2.3. Streamlining Services Run by the Internet Daemon
7.2.4. Summary
64. Allow or Deny Access by IP Address
7.3.1. Protecting Your Machine with hosts.allow and hosts.deny
7.3.2. Configuring hosts.allow and hosts.deny for Use
7.3.3. Hacking the Hack
7.3.4. See Also
65. Detect Network Intruders with snort
7.4.1. Installing snort
7.4.2. Configuring snort
7.4.3. Starting snort
7.4.4. Advanced snort
7.4.5. Summary
7.4.6. See Also
66. Tame Tripwire
7.5.1. Installing Tripwire
7.5.2. Tripwire’s Execution Configuration File
7.5.3. Tripwire’s Policy Configuration File
7.5.4. Preparing Tripwire for Use
7.5.5. Running Your First Filesystem Integrity Check
7.5.6. TripWire Tips
67. Verify Fileystem Integrity with Afick
7.6.1. Installing Afick
7.6.2. Configuring Afick to Match Your System
7.6.3. Running Afick
7.6.4. Securing Afick
7.6.5. Updating Your Database
7.6.6. Conclusion
7.6.7. See Also
68. Check for Rootkits and Other Attacks
7.7.1. Types of Rootkits
7.7.2. Obtaining, Building, and Installing chkrootkit
7.7.3. Running chkrootkit
7.7.4. Automating chkrootkit
7.7.5. Summary
7.7.6. See Also
8. Troubleshooting and Performance
8.1. Hacks 69–77: Introduction
69. Find Resource Hogs with Standard Commands
8.2.1. What About Disk Hogs?
8.2.2. Bandwidth Hogging
70. Reduce Restart Times with Journaling Filesystems
8.3.1. Journaling Filesystems 101
8.3.2. Journaling Filesystems Under Linux
8.3.3. Converting Existing Filesystems to Journaling Filesystems
8.3.4. Summary
8.3.5. See Also
71. Grok and Optimize Your System with sysctl
72. Get the Big Picture with Multiple Displays
8.5.1. See Also
73. Maximize Resources with a Minimalist Window Manager
8.6.1. Getting and Installing Fluxbox
8.6.2. Start Me Up, Scotty!
8.6.3. Configure Fluxbox
8.6.4. The Slit
8.6.5. Make It Pretty!
8.6.6. Minimal Hassle
8.6.7. See Also
74. Profile Your Systems Using /proc
8.7.1. The Code
75. Kill Processes the Right Way
8.8.1. Killing Processes in the Right Order
8.8.2. Stopping and Restarting a Process
8.8.3. The Last Resort
8.8.4. See Also
76. Use a Serial Console for Centralized Access to Your Systems
8.9.1. The Options
8.9.2. Start at the Beginning: The Bootloader
8.9.3. Putting It All Together
8.9.4. Where to Go from Here
8.9.5. See Also
77. Clean Up NIS After Users Depart
8.10.1. The Code
8.10.2. Running the Code
9. Logfiles and Monitoring
9.1. Hacks 78–88: Introduction
78. Avoid Catastrophic Disk Failure
79. Monitor Network Traffic with MRTG
9.3.1. Requirements
9.3.2. Installation
9.3.3. Automating MRTG
9.3.4. See Also
80. Keep a Constant Watch on Hosts
81. Remotely Monitor and Configure a Variety of Networked Equipment
9.5.1. The Code
9.5.2. Running the Code
82. Force Standalone Apps to Use syslog
83. Monitor Your Logfiles
9.7.1. Using log-guardian
9.7.2. Using logcheck
84. Send Log Messages to Your Jabber Client
9.8.1. The Code
9.8.2. Running the Code
85. Monitor Service Availability with Zabbix
9.9.1. Dependencies
9.9.2. Installing Zabbix
9.9.3. Monitoring Hosts
9.9.4. Mapping the Network
9.9.5. The Details
86. Fine-Tune the syslog Daemon
9.10.1. Making Sense of syslog.conf
9.10.2. Real-Time Alerts from the System Log
9.10.3. Centralizing Logs for Convenient Access
9.10.4. See Also
87. Centralize System Logs Securely
9.11.1. Getting Started
9.11.2. Creating Your Encryption Certificates
9.11.3. Configuring stunnel
9.11.4. Configuring syslog-ng
9.11.5. Testing
9.11.6. Where Next?
9.11.7. See Also
88. Keep Tabs on Systems and Services
9.12.1. Enter Nagios
9.12.2. Hosts, Services, and Contacts, Oh My!
9.12.3. See Also
10. System Rescue, Recovery, and Repair
10.1. Hacks 89–100: Introduction
89. Resolve Common Boot and Startup Problems
10.2.1. Check BIOS Settings
10.2.2. Fixing Runlevel or X Window System Problems
10.2.3. Regenerating a Default X Window System Configuration File
10.2.4. Booting to Single-User Mode
10.2.5. Resolving Filesystem Consistency Problems
10.2.6. See Also
90. Rescue Me!
10.3.1. Downloading and Burning the Rescue Disk
10.3.2. Using the Rescue CD
10.3.3. See Also
91. Bypass the Standard Init Sequence for Quick Repairs
92. Find Out Why You Can’t Unmount a Partition
10.5.1. Background
10.5.2. Finding Processes That Are Using a Filesystem
10.5.3. Listing Open Files
10.5.4. Summary
10.5.5. See Also
93. Recover Lost Partitions
10.6.1. Looking for Partitions
10.6.2. Writing the Partition Table
10.6.3. See Also
94. Recover Data from Crashed Disks
10.7.1. Popular Disk Failure Modes
10.7.2. Attempt to Read Block from Filesystem Resulted in Short Read…
10.7.3. Standard Filesystem Diagnostics and Repair
10.7.4. Removing an ext3 Filesystem’s Journal
10.7.5. Cloning a Bad Disk Using ddrescue
10.7.6. Checking the Restored Disk
10.7.7. See Also
95. Repair and Recover ReiserFS Filesystems
10.8.1. Correcting a Damaged ReiserFS Filesystem
10.8.2. Identifying Files and Directories in the ReiserFS lost+found
10.8.3. See Also
96. Piece Together Data from the lost+found
10.9.1. Exploring the lost+found
10.9.2. Recovering Directories from the lost+found
10.9.3. Recovering Recognizable Groups of Files
10.9.4. Examining Individual Files
10.9.5. Summary
10.9.6. See Also
97. Recover Deleted Files
10.10.1. Preventing Additional Changes to the Partition
10.10.2. Looking for the Missing Data
10.10.3. See Also
98. Permanently Delete Files
10.11.1. Using the shred Utility
10.11.2. See Also
99. Permanently Erase Hard Disks
10.12.1. Using shred to Wipe Hard Drives
10.12.2. Using Darik’s Boot and Nuke
10.12.3. Summary
10.12.4. See Also
100. Recover Lost Files and Perform Forensic Analysis
10.13.1. Building and Installing The Sleuth Kit
10.13.2. Building and Installing Autopsy and Related Software
10.13.3. Using The Sleuth Kit to Recover Deleted Files
10.13.4. Summary
10.13.5. See Also
About the Authors
Colophon
Copyright
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Next
Next Chapter
Linux Server Hacks, Volume Two
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset