|
Red Hat Linux Administration II installation, Configuration, Software and Troubleshooting
|
bet | 4/8 | Sana | 21.03.2017 | Hajmi | 75,92 Kb. | | #564 |
RPM and YUM Package Management
-
Concepts of 'Packages' and Package Managers
-
Using RPM
-
Displaying current packages installed
-
Adding, removing packages
-
Tar Balls of software
-
Installing tar balls of software
-
Configuring and using the YUM frontend to RPM
-
Viewing installed software
-
Installing software at the prompt and in X
-
Query packages, add a package, remove it using RPM and YUM
Managing Users and groups
-
Concepts of login control, users and groups
-
Shadow file – login restrictions
-
Securing the root account
-
Creation of basic user accounts
-
Choice of command shell to use: sh, ksh, bash
-
User tools: chsh, chgrp, passwd, chfn
-
Admin Tools : chown, sudo
-
Basic security settings
-
Concepts of Security on files and directories
-
Overview of modes, umask and chmod
-
Creating a directory shared by a group of users
-
Pluggable Authentication Modules, PAM, configuration and use
-
Centralized user accounts from NIS and LDAP, client setup
-
Creating, managing and monitoring file system quotas
-
Add, modify and remove user accounts
-
Managing file security settings
-
Change file ownership
-
Switch to different user accounts
-
Manipulate file security settings
-
Create a shared group directory
-
Create a public and a group restricted directory
-
Configure limited access using PAM
-
Configure access to NIS and LDAP services for additional users
-
Configure quotas for users and groups
|
| |