Andrew Hudson - Fedora™ Unleashed, 2008 edition

Здесь есть возможность читать онлайн «Andrew Hudson - Fedora™ Unleashed, 2008 edition» весь текст электронной книги совершенно бесплатно (целиком полную версию без сокращений). В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Город: Indianapolis, Год выпуска: 2008, ISBN: 2008, Издательство: Sams Publishing, Жанр: ОС и Сети, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Fedora™ Unleashed, 2008 edition: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Fedora™ Unleashed, 2008 edition»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

Quick Glance Guide
Finding information you need is not always easy. This short index provides a list of common tasks discussed inside this book. Browse the table of contents or index for detailed listings and consult the specified chapter for in-depth discussions about each subject.
left How Do I…?
See…
How Do I…?
See…
left Back up my system?
Chapter 13
Partition a hard drive?
Appendix B, Chapters 1, 35
left Build a new Linux kernel?
Chapter 36
Play MP3s and other music?
Chapter 7
left Burn a CD?
Chapter 7
Print a file?
Chapter 8
left Change a password?
Chapter 4
Read a text file?
Chapter 4
left Change the date and time?
Chapter 32
Read or send email?
Chapter 21
left Compress a file?
Chapter 13
Read or post to newsgroups?
Chapter 5
left Configure a modem?
Chapter 2
Reboot Fedora?
Chapter 1
left Configure a printer?
Chapter 8
Rescue my system?
Chapter 13
left Configure a scanner?
Chapter 7
Set up a DNS server?
Chapter 23
left Configure a sound card?
Chapter 7
Set up a firewall?
Chapter 14
left Configure my desktop settings?
Chapter 3
Set up a web server?
Chapter 15
left Connect to the Internet?
Chapter 5
Set up an FTP server?
Chapter 20
left Control a network interface?
Chapter 14
Set up Samba with SWAT?
Chapter 19
left Copy files or directories?
Chapters 13, 32
Set up wireless networking?
Chapter 14
left Create a boot disk to boot Fedora?
Chapter 1
Shut down Fedora?
Chapter 1
left Create a database?
Chapter 16
Use a spreadsheet?
Chapter 6
left Create a user?
Chapter 4
Use Instant Messaging?
Chapter 5
left Delete a file or directory?
Chapter 32
Watch television on my computer?
Chapter 7
left Get images from a digital camera?
Chapter 7
Edit a text file?
Chapter 4
left Install Fedora?
Chapter 1
Make Fedora more secure?
Chapter 14
left Log in to Fedora?
Chapter 1
Mount a CD-ROM or hard drive?
Chapter 35

Fedora™ Unleashed, 2008 edition — читать онлайн бесплатно полную книгу (весь текст) целиком

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Fedora™ Unleashed, 2008 edition», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Oct 6 12:21:59 shuttle2 ftpd[5229]: QUIT

Oct 6 12:21:59 shuttle2 ftpd[5229]: FTP session closed

The sample log shows the username and password entries for an anonymous login. The CWD entry shows that a cdcommand is used to navigate to the pubdirectory. Note that the commands shown do not necessarily reflect the syntax the user typed, but instead list corresponding system calls the FTP server received. For example, the LIST entry is actually the lscommand.

Log Security Violations and File Transfers

Two other logging commands are useful in the /etc/ftpaccessconfiguration file. This line enables the logging of security violations:

log security []

Violations are logged for anonymous, guest, and real users, as specified in the typelist— the same as other logcommands. If you do not specify a typelist, security violations for all users are logged.

This line writes a log of all files transferred to and from the server:

log transfers [ []]

typelistis the same as in log commands and log security lines. directionsis a comma- separated list of the keywords inboundfor uploaded files and outboundfor downloaded files. If no directionslist is given, both uploaded and downloaded files are logged. Inbound and outbound logging is turned on by default.

Configure Permission Control

Controlling user activity is an important component of securing your system's server. The ftpaccessfile includes a number of commands that enable you to determine what users can and cannot execute during an FTP session. You can use these permission controls to allow users to change file permissions, delete and overwrite files, rename files, and create new files with default permissions. You learn how to use all these ftpaccessfile command lines in the following sections.

NOTE

By default, all the ftpaccessfile command lines prohibit anonymous users from executing actions and enable authorized users to do so.

Allow Users to Change File Permissions

The chmodline determines whether a user can change a file's permissions. Here is the command line:

chmod

This command acts the same as the standard chmodcommand.

The yes|noparameter designates whether the command can be executed. typelistis a comma-delimited string of the keywords anonymous, guest, and real. If you do not specify a typeliststring, the command is applied to all users. An exhaustive description of its purpose and parameters can be found in the man page.

Assign Users File-Delete Permission

The deleteline determines whether the user can delete files with the rm command. Here's the command line:

delete

The yes|noparameter is used to turn this permission on or off, and typelistis the same as the chmodcommand.

Assign Users File-Overwrite Permission

This command line of the ftpaccessfile allows or denies users the ability to overwrite an existing file. Here's the command line:

overwrite

The FTP client determines whether users can overwrite files on their own local machines; this line specifically controls overwrite permissions for uploads to the server. The yes|noparameter toggles the permission on or off, and typelistis the same as in the chmodline.

Allow Users to Rename Files

You can enable or prevent a user from renaming files by using this command line:

rename

The yes|noparameter toggles the permission on or off, and typelistis the same comma-delimited string as in chmod.

Allow Users to Compress Files

This line determines whether the user is able to use the compresscommand on files:

compress []

The yes|noparameter toggles the permission on or off, and classglobis a regular expression string that specifies one or more defined classes of users. The conversions that result from the use of this command are specified in the ftpconversionsfile, which contains directions on what compression or extraction command is to be used on a file with a specific extension, such as .Zfor the compresscommand, .gzfor the gunzipcommand, and so on. See the section "Configuring FTP Server File-Conversion Actions" later in this chapter.

Assign or Deny Permission to Use tar

This line determines whether the user is able to use the tar(tape archive) command on files:

tar [ ...]

The yes|noparameter toggles the permission on or off, and classglobis a regular expression string that specifies one or more defined classes of users. Again, the conversions that result from the use of this command are specified in the ftpconversionsfile.

Determine What Permissions Can Apply to User-Created Upload Files

This line is a bit different from the other commands in the permission control section. The umaskcommand determines with what permissions a user can create new files; here it is.

umask

The yes|noparameter toggles based on whether a user is allowed to create a file with his default permissions when uploading a file. Like the overwritecommand you read about earlier in this section, this command line is specific to uploaded files because the client machine determines how new files are created from a download.

Configure Commands Directed Toward the cdpath

This aliascommand allows the administrator to provide another name for a directory other than its standard name:

alias

    The aliasline applies to only the cdcommand. This line is particularly useful if a popular directory is buried deep within the anonymous FTP user's directory tree. The following is a sample entry:

    alias linux-386 /pub/redhat/7.3/en/i386/

    This line would allow the user to type cd linux-386and be automatically taken to the /pub/redhat/7.3/en/i386directory.

    The cdpath

      line specifies the order in which the cd command looks for a given user-entered string. The search is performed in the order in which the cdpathlines are entered in the ftpacessfile.

      For example, if the following cdpathentries are in the ftpaccessfile,

      cdpath /pub/redhat/

      cdpath /pub/linux/

      and the user types cd i386, the server searches for an entry in any defined aliases, first in the /pub/redhatdirectory and then in the /pub/linuxdirectory. If a large number of aliases are defined, it is recommended that symbolic links to the directories be created instead of aliases. Doing so reduces the amount of work on the FTP server and decreases the wait time for the user.

      Structure of the shutdownFile

      The shutdown command tells the server where to look for the shutdownmessage generated by the ftpshutcommand or by the user. The shutdowncommand is used with a pathname to a shutdown file, such as:

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Fedora™ Unleashed, 2008 edition»

Представляем Вашему вниманию похожие книги на «Fedora™ Unleashed, 2008 edition» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Fedora™ Unleashed, 2008 edition»

Обсуждение, отзывы о книге «Fedora™ Unleashed, 2008 edition» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x