TAILIEUCHUNG - Operational Administration Recovery and Security

Also discussed is one of the most fundamental and important topics of concern to any systems administrator: what to do when a system will not boot. When the inevitable happens, knowing the right things to look for and having some tricks up your sleeve may possibly help you avoid a potential nightmare and a major loss of service for your users. Understanding these tools is fundamental to getting through the RHCE Debug exam. | RHCE RED HAT CERTIFIED ENGINEER 11 Operational Administration Recovery and Security CERTIFICATION OBJECTIVES Q A Services and Special Users Red Hat User Private Group Scheme tmpwatch The Linux Rescue Process The Secure Shell Package Two-Minute Drill Self Test 626 Chapter II Operational Administration Recovery and Security _ . . . he themes of this chapter are security and recovery. These are two critical concepts for the RHCE exam. This continues the discussion of system security started in the last chapter with a look at secure ways to run certain network services and a Red Hat Linux-specific way of specifying file security. This chapter includes a description of setting up security with groups. You can set up special groups in Red Hat Linux. The users in these groups have access to a common directory. Next you ll learn about the part of the administrative process related to maintaining your temporary directories with the tmpwatch utility. Also discussed is one of the most fundamental and important topics of concern to any systems administrator what to do when a system will not boot. When the inevitable happens knowing the right things to look for and having some tricks up your sleeve may possibly help you avoid a potential nightmare and a major loss of service for your users. Understanding these tools is fundamental to getting through the RHCE Debug exam. CERTIFICATION OBJECTIVE Services and Special Users The programs that run on Linux are all processes. When Red Hat Linux starts on your computer it first starts a special process known as init. The init process then starts other basic processes required for a working Linux system including the shell the basic user consoles startup daemons and more. Because it needs the authority init runs as root. Interestingly enough most other services especially network daemons do not run under the root user ID. This is one important way Linux protects your network security. Suppose .

TỪ KHÓA LIÊN QUAN
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.