<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN"> <HTML ><HEAD ><TITLE >System Administration and Configuration</TITLE ><META NAME="GENERATOR" CONTENT="Modular DocBook HTML Stylesheet Version 1.7"><LINK REL="HOME" TITLE="LDP HOWTO-INDEX" HREF="index.html"><LINK REL="UP" TITLE="Categorized List of HOWTOs" HREF="categories.html"><LINK REL="PREVIOUS" TITLE="The Linux OS" HREF="os.html"><LINK REL="NEXT" TITLE="Hardware" HREF="hardware.html"></HEAD ><BODY CLASS="SECT1" BGCOLOR="#FFFFFF" TEXT="#000000" LINK="#0000FF" VLINK="#840084" ALINK="#0000FF" ><DIV CLASS="NAVHEADER" ><TABLE SUMMARY="Header navigation table" WIDTH="100%" BORDER="0" CELLPADDING="0" CELLSPACING="0" ><TR ><TH COLSPAN="3" ALIGN="center" ><A HREF="http://www.tldp.org/" TARGET="_top" >LDP</A > HOWTO-INDEX</TH ></TR ><TR ><TD WIDTH="10%" ALIGN="left" VALIGN="bottom" ><A HREF="os.html" ACCESSKEY="P" >Prev</A ></TD ><TD WIDTH="80%" ALIGN="center" VALIGN="bottom" >Chapter 4. Categorized List of HOWTOs</TD ><TD WIDTH="10%" ALIGN="right" VALIGN="bottom" ><A HREF="hardware.html" ACCESSKEY="N" >Next</A ></TD ></TR ></TABLE ><HR ALIGN="LEFT" WIDTH="100%"></DIV ><DIV CLASS="SECT1" ><H1 CLASS="SECT1" ><A NAME="ADMIN" ></A >4.2. System Administration and Configuration</H1 ><P >Topics covered in this section include: <P ></P ><TABLE BORDER="0" ><TBODY ><TR ><TD ><A HREF="admin.html#ADMCONFIG" >Section 4.2.1</A > Configuration / Installation</TD ></TR ><TR ><TD ><A HREF="admin.html#ADMBENCHMARK" >Section 4.2.2</A > Benchmarking</TD ></TR ><TR ><TD ><A HREF="admin.html#ADMCLUSTER" >Section 4.2.3</A > Clustering</TD ></TR ><TR ><TD ><A HREF="admin.html#ADMBACKUP" >Section 4.2.4</A > Backup</TD ></TR ><TR ><TD ><A HREF="admin.html#ADMRECOVERY" >Section 4.2.5</A > Recovery</TD ></TR ><TR ><TD ><A HREF="admin.html#ADMSECURITY" >Section 4.2.6</A > Security</TD ></TR ></TBODY ></TABLE ><P ></P > </P ><DIV CLASS="SECT2" ><H2 CLASS="SECT2" ><A NAME="ADMCONFIG" ></A >4.2.1. Configuration / Installation</H2 ><P > <P ></P ><UL ><LI ><P ><A HREF="../Autodir-HOWTO/index.html" TARGET="_top" >Autodir-HOWTO</A >, <I CLASS="CITETITLE" >Autodir HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: May 2007</I >. Autodir installation, configuration and other issues related to Autodir. </P ></LI ><LI ><P ><A HREF="../Battery-Powered/index.html" TARGET="_top" >Battery-Powered</A >, <I CLASS="CITETITLE" >Battery Powered Linux Mini-HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Jul 2003</I >. How to optimize and configure power management on a ready-configured Linux system for use on battery-powered laptops. </P ></LI ><LI ><P ><A HREF="../Bootdisk-HOWTO/index.html" TARGET="_top" >Bootdisk-HOWTO</A >, <I CLASS="CITETITLE" >The Linux Bootdisk HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Jan 2002</I >. How to design and build your own boot/root diskettes for Linux.</P ></LI ><LI ><P ><A HREF="../BootPrompt-HOWTO.html" TARGET="_top" >BootPrompt-HOWTO</A >, <I CLASS="CITETITLE" >The Linux BootPrompt HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Mar 2003</I >. A compilation of all the possible boot time arguments that can be passed to the Linux kernel at boot time. Includes all kernel and device parameters.</P ></LI ><LI ><P ><A HREF="../Config-HOWTO.html" TARGET="_top" >Config-HOWTO</A >, <I CLASS="CITETITLE" >Configuration HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: May 2006</I >. Document from which every others can refer to configure most common hardware and services. </P ></LI ><LI ><P ><A HREF="../Debian-Binary-Package-Building-HOWTO/index.html" TARGET="_top" >Debian-Binary-Package-Building-HOWTO</A >, <I CLASS="CITETITLE" >Debian Binary Package Building HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Aug 2005</I >. Shows how to build a minimal Debian .deb package. </P ></LI ><LI ><P ><A HREF="../Debian-and-Windows-Shared-Printing/index.html" TARGET="_top" >Debian-and-Windows-Shared-Printing</A >, <I CLASS="CITETITLE" >Debian and Windows Shared Printing mini-HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Jul 2005</I >. Demonstrates how to use command-line tools to configure your Debian system for printing. It explains how to send documents from Linux to Windows printers and how to share Linux printers with Windows PCs. </P ></LI ><LI ><P ><A HREF="../Debian-Jigdo/index.html" TARGET="_top" >Debian-Jigdo</A >, <I CLASS="CITETITLE" >Debian Jigdo mini-HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Dec 2005</I >. Describes why you should use jigdo (a tool for obtaining Debian ISOs), a little bit about how it works and how you use it to get and update Debian ISOs. </P ></LI ><LI ><P ><A HREF="../Filesystems-HOWTO.html" TARGET="_top" >Filesystems-HOWTO</A >, <I CLASS="CITETITLE" >Filesystems HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Jan 2007</I >. About filesystems and accessing filesystems.</P ></LI ><LI ><P ><A HREF="../Glibc-Install-HOWTO/index.html" TARGET="_top" >Glibc-Install-HOWTO</A >, <I CLASS="CITETITLE" >Glibc Installation HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Mar 2004</I >. Explains how you install a new version of glibc on your system. </P ></LI ><LI ><P ><A HREF="../HP-HOWTO/index.html" TARGET="_top" >HP-HOWTO</A >, <I CLASS="CITETITLE" >HP HOWTO - Utilisation and Configuration Guide of HP Products under Linux</I ></P ><P ><I CLASS="CITETITLE" >Updated: December 2001</I >. Describes the use of products available in the Hewlett-Packard (HP) catalog with Linux and some free software.</P ></LI ><LI ><P ><A HREF="../Installation-HOWTO/index.html" TARGET="_top" >Installation-HOWTO</A >, <I CLASS="CITETITLE" >The Linux Installation HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Jul 2002</I >. How to obtain and install Linux software. It is the first document which a new Linux user should read to get started.</P ></LI ><LI ><P ><A HREF="../Installfest-HOWTO/index.html" TARGET="_top" >Installfest-HOWTO</A >, <I CLASS="CITETITLE" >Linux Installfest HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Apr 2006</I >. Provides some guidelines that should help you run a successful installfest. </P ></LI ><LI ><P ><A HREF="../Jabber-Server-Farming-HOWTO/index.html" TARGET="_top" >Jabber-Server-Farming-HOWTO</A >, <I CLASS="CITETITLE" >Jabber Server Farming How-To</I ></P ><P ><I CLASS="CITETITLE" >Updated: Jun 2002</I >. Provide Jabber admins a look into the present and future of Jabber Server Farming. </P ></LI ><LI ><P ><A HREF="../Kernel-HOWTO/index.html" TARGET="_top" >Kernel-HOWTO</A >, <I CLASS="CITETITLE" >The Linux Kernel HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Removed: November 2003</I >. This HOWTO has been removed for review. </P ></LI ><LI ><P ><A HREF="../KernelAnalysis-HOWTO.html" TARGET="_top" >KernelAnalysis-HOWTO</A >, <I CLASS="CITETITLE" >KernelAnalysis-HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Mar 2003</I >. Explains some things about the Linux Kernel, such as the most important components, how they work, and so on. </P ></LI ><LI ><P ><A HREF="../Linux-Crash-HOWTO/index.html" TARGET="_top" >Linux-Crash-HOWTO</A >, <I CLASS="CITETITLE" >Linux Crash HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Jan 2002</I >. Describes the installation and usage of the LKCD (Linux Kernel Crash Dump) package. </P ></LI ><LI ><P ><A HREF="../LVM-HOWTO/index.html" TARGET="_top" >LVM-HOWTO</A >, <I CLASS="CITETITLE" >Logical Volume Manager HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Nov 2006</I >. Describes how to build, install, and configure LVM for Linux. </P ></LI ><LI ><P ><A HREF="../MultiOS-HOWTO.html" TARGET="_top" >MultiOS-HOWTO</A >, <I CLASS="CITETITLE" >Managing Multiple Operating Systems HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Feb 2000</I >. Covers the procedures for using removable hard disks to install and manage multiple alternative operating systems while leaving a single fixed disk to permanently house and protect the primary operating system. </P ></LI ><LI ><P ><A HREF="../Path.html" TARGET="_top" >Path</A >, <I CLASS="CITETITLE" >PATH HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Nov 1997</I >. Describes common tricks and problems with Unix / Linux environment variables, especially with PATH variable. </P ></LI ><LI ><P ><A HREF="../Public-Web-Browser.html" TARGET="_top" >Public-Web-Browser</A >, <I CLASS="CITETITLE" >Linux web browser station</I ></P ><P ><I CLASS="CITETITLE" >Updated: Oct 2000</I >. Describes the setup of Internet kiosk-type system based on Linux to be deployed to provide public Internet/webmail access. </P ></LI ><LI ><P ><A HREF="../Quota.html" TARGET="_top" >Quota</A >, <I CLASS="CITETITLE" >Quota mini-HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Aug 2003</I >. How to enable file system quota on a Linux host, assigning quota for users and groups, as well as the usage of miscellaneous quota commands. </P ></LI ><LI ><P ><A HREF="../Spam-Filtering-for-MX/index.html" TARGET="_top" >Spam-Filtering-for-MX</A >, <I CLASS="CITETITLE" >Spam Filtering for Mail Exchangers</I ></P ><P ><I CLASS="CITETITLE" >Updated: Sep 2004</I >. How to reject junk mail in incoming SMTP transactions. </P ></LI ><LI ><P ><A HREF="../SquashFS-HOWTO/index.html" TARGET="_top" >SquashFS-HOWTO</A >, <I CLASS="CITETITLE" >SquashFS HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Jan 2008</I >. Describes the usage of SquashFS - a highly-compressed file system for Linux, which is intended for use in tiny/embedded Linux systems, as well as for read-only archiving and general in-file system compression. </P ></LI ><LI ><P ><A HREF="../TimePrecision-HOWTO/index.html" TARGET="_top" >TimePrecision-HOWTO</A >, <I CLASS="CITETITLE" >Managing Accurate Date and Time HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Nov 2005</I >. Explains the time mechanisms on Linux, what are time zones, and precision with NTP. </P ></LI ><LI ><P ><A HREF="../TimeSys-Linux-Install-HOWTO/index.html" TARGET="_top" >TimeSys-Linux-Install-HOWTO</A >, <I CLASS="CITETITLE" >TimeSys Linux Install HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: May 2005</I >. A quick-start guide for installing TimeSys Linux on a typical desktop workstation. </P ></LI ><LI ><P ><A HREF="../Visual-Bell.html" TARGET="_top" >Visual-Bell</A >, <I CLASS="CITETITLE" >Visible bell mini-Howto</I ></P ><P ><I CLASS="CITETITLE" >Updated: Dec 2001</I >. How to use termcap to configure a visual bell on one's system and describes how to disable audible bells on demand. </P ></LI ></UL ></P ></DIV ><DIV CLASS="SECT2" ><H2 CLASS="SECT2" ><A NAME="ADMBENCHMARK" ></A >4.2.2. Benchmarking</H2 ><P > <P ></P ><UL ><LI ><P ><A HREF="../Benchmarking-HOWTO.html" TARGET="_top" >Benchmarking-HOWTO</A >, <I CLASS="CITETITLE" >Linux Benchmarking HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Aug 1997</I >. Discusses some issues associated with the benchmarking of Linux systems and presents a basic benchmarking toolkit. </P ></LI ></UL ></P ></DIV ><DIV CLASS="SECT2" ><H2 CLASS="SECT2" ><A NAME="ADMCLUSTER" ></A >4.2.3. Clustering</H2 ><P > <P ></P ><UL ><LI ><P ><A HREF="../Beowulf-HOWTO/index.html" TARGET="_top" >Beowulf-HOWTO</A >, <I CLASS="CITETITLE" >Beowulf HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Jan 2005</I >. Describes step by step instructions on building a Beowulf cluster. This is a Red Hat and LAM specific version of this document.</P ></LI ><LI ><P ><A HREF="../Mock-Mainframe/index.html" TARGET="_top" >Mock-Mainframe</A >, <I CLASS="CITETITLE" >The Mock Mainframe Mini-HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Oct 2005</I >. A brief description of a standard way to set up and work with a computer network for a small group of people that is inexpensive to build, easy to administer, and relatively safe. </P ></LI ></UL ></P ></DIV ><DIV CLASS="SECT2" ><H2 CLASS="SECT2" ><A NAME="ADMBACKUP" ></A >4.2.4. Backup</H2 ><P > <P ></P ><UL ><LI ><P ><A HREF="../ADSM-Backup.html" TARGET="_top" >ADSM-Backup</A >, <I CLASS="CITETITLE" >Linux ADSM mini-HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Jan 1997</I >. How to install and use a client for the commercial ADSM backup system for Linux/i386. </P ></LI ><LI ><P ><A HREF="../Backup-With-MSDOS.html" TARGET="_top" >Backup-With-MSDOS</A >, <I CLASS="CITETITLE" >Backup-With-MSDOS mini-HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Aug 1997</I >. How to use a Linux-compatible tape drive installed on an MS-DOS machine to back up the filesystem of a Linux machine. </P ></LI ><LI ><P ><A HREF="../Clone-HOWTO/index.html" TARGET="_top" >Clone-HOWTO</A >, <I CLASS="CITETITLE" >HOWTO Clone Disk Images on Linux Booted from a Network</I ></P ><P ><I CLASS="CITETITLE" >Updated: Sep 2002</I >. Describes a setup that allows a machine to boot Linux from BOOTP/TFTP, using the Grub boot loader, and save and restore disk and partition images to and from a TFTP server. </P ></LI ><LI ><P ><A HREF="../Linux-Complete-Backup-and-Recovery-HOWTO/index.html" TARGET="_top" >Linux-Complete-Backup-and-Recovery-HOWTO</A >, <I CLASS="CITETITLE" >Linux Complete Backup and Recovery HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Mar 2006</I >. A step-by-step tutorial on how to back up a Linux computer so as to be able to make a bare metal recovery, and how to make that bare metal recovery. Includes some related scripts. <EM >"Bare metal recovery"</EM > is the process of rebuilding a computer after a catastrophic failure. </P ></LI ></UL ></P ></DIV ><DIV CLASS="SECT2" ><H2 CLASS="SECT2" ><A NAME="ADMRECOVERY" ></A >4.2.5. Recovery</H2 ><P > <P ></P ><UL ><LI ><P ><A HREF="../Ext2fs-Undeletion.html" TARGET="_top" >Ext2fs-Undeletion</A >, <I CLASS="CITETITLE" >Linux Ext2fs Undeletion mini-HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Feb 1999</I >. Presents a discussion of how to retrieve deleted files from a Second Extended File System. </P ></LI ><LI ><P ><A HREF="../LILO-crash-rescue-HOWTO/index.html" TARGET="_top" >LILO-crash-rescue-HOWTO</A >, <I CLASS="CITETITLE" >LILO, Linux Crash Rescue HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Removed: November 2003</I >. This HOWTO has been removed for review. </P ></LI ><LI ><P ><A HREF="../Linux-Complete-Backup-and-Recovery-HOWTO/index.html" TARGET="_top" >Linux-Complete-Backup-and-Recovery-HOWTO</A >, <I CLASS="CITETITLE" >Linux Complete Backup and Recovery HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Mar 2006</I >. A step-by-step tutorial on how to back up a Linux computer so as to be able to make a bare metal recovery, and how to make that bare metal recovery. Includes some related scripts. <EM >"Bare metal recovery"</EM > is the process of rebuilding a computer after a catastrophic failure. </P ></LI ></UL ></P ></DIV ><DIV CLASS="SECT2" ><H2 CLASS="SECT2" ><A NAME="ADMSECURITY" ></A >4.2.6. Security</H2 ><P > <P ></P ><UL ><LI ><P ><A HREF="../Bridge+Firewall.html" TARGET="_top" >Bridge+Firewall</A >, <I CLASS="CITETITLE" >Linux Bridge+Firewall Mini-HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Dec 1997</I >. A bridge is an intelligent connection wire between two network cards. A firewall is an intelligent insulator. </P ></LI ><LI ><P ><A HREF="../Cryptoloop-HOWTO/index.html" TARGET="_top" >Cryptoloop-HOWTO</A >, <I CLASS="CITETITLE" >Cryptoloop HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Mar 2004</I >. Eplains how to create encrypted file systems using the Cryptoloop functionality. Cryptoloop is part of the CryptoAPI in the 2.6 Linux kernel series. </P ></LI ><LI ><P ><A HREF="../Disk-Encryption-HOWTO/index.html" TARGET="_top" >Disk-Encryption-HOWTO</A >, <I CLASS="CITETITLE" >Disk Encryption HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Nov 2004</I >. A method is described for encrypting a hard disk, either in whole or in part, with the encryption key stored on an external medium for increased security. </P ></LI ><LI ><P ><A HREF="../Domain.html" TARGET="_top" >Domain</A >, <I CLASS="CITETITLE" >Setting Up Your New Domain Mini HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Oct 2000</I >. Outlines the things you will probably have to do when you want to setup a network of computers under your own domain. Covers configuration of network parameters, network services, and security settings. </P ></LI ><LI ><P ><A HREF="../Encrypted-Root-Filesystem-HOWTO/index.html" TARGET="_top" >Encrypted-Root-Filesystem-HOWTO</A >, <I CLASS="CITETITLE" >Encrypted Root Filesystem HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Mar 2005</I >. Explains how to make your personal data secure by encrypting your Linux root filesystem using strong cryptography. </P ></LI ><LI ><P ><A HREF="../Firewall-HOWTO.html" TARGET="_top" >Firewall-HOWTO</A >, <I CLASS="CITETITLE" >Firewall and Proxy Server HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Feb 2000</I >. Designed to describe the basics of firewall systems and give you some detail on setting up both a filtering and proxy firewall on a Linux based system. </P ></LI ><LI ><P ><A HREF="../Firewall-Piercing/index.html" TARGET="_top" >Firewall-Piercing</A >, <I CLASS="CITETITLE" >Firewall Piercing mini-HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Nov 2001</I >. Directions for using ppp over telnet to do network activities transparently through an Internet firewall. </P ></LI ><LI ><P ><A HREF="../IPCHAINS-HOWTO.html" TARGET="_top" >IPCHAINS-HOWTO</A >, <I CLASS="CITETITLE" >Linux IPCHAINS HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Jul 2000</I >. How to obtain, install and configure the enhanced IP firewalling chains software for Linux, and some ideas on how you might use them. </P ></LI ><LI ><P ><A HREF="../Kerberos-Infrastructure-HOWTO/index.html" TARGET="_top" >Kerberos-Infrastructure-HOWTO</A >, <I CLASS="CITETITLE" >Kerberos Infrastructure HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: May 2004</I >. Describes the design and configuration of a Kerberos infrastructure for handling authentication with GNU/Linux. It details steps for a best practices method of setting up servers, Kerberos software,conversion of legacy systems, and answers frequently asked questions. </P ></LI ><LI ><P ><A HREF="../Secure-BootCD-VPN-HOWTO.html" TARGET="_top" >Secure-BootCD-VPN-HOWTO</A >, <I CLASS="CITETITLE" >Secure Boot CDs for VPN HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: May 2007</I >. Describes the creation of live boot CDs used to make secure VPN connections from anywhere (over the Internet) to internal networks that have firewall exposure to the Internet.</P ></LI ><LI ><P ><A HREF="../Secure-POP+SSH.html" TARGET="_top" >Secure-POP+SSH</A >, <I CLASS="CITETITLE" >Secure POP via SSH mini-HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Sep 1998</I >. How to set up secure POP connections using ssh. </P ></LI ><LI ><P ><A HREF="../Security-HOWTO/index.html" TARGET="_top" >Security-HOWTO</A >, <I CLASS="CITETITLE" >Linux Security HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Jan 2004</I >. A general overview of security issues that face the administrator of Linux systems. </P ></LI ><LI ><P ><A HREF="../Security-Quickstart-HOWTO/index.html" TARGET="_top" >Security-Quickstart-HOWTO</A >, <I CLASS="CITETITLE" >Security Quick-Start HOWTO for Linux</I ></P ><P ><I CLASS="CITETITLE" >Updated: Jul 2002</I >. An overview of the basic steps required to secure a Linux installation from intrusion. </P ></LI ><LI ><P ><A HREF="../Security-Quickstart-Redhat-HOWTO/index.html" TARGET="_top" >Security-Quickstart-Redhat-HOWTO</A >, <I CLASS="CITETITLE" >Security Quick-Start HOWTO for Redhat Linux</I ></P ><P ><I CLASS="CITETITLE" >Updated: Jul 2002</I >. An overview of the basic steps required to secure a Linux installation from intrusion (<EM >Redhat specific version</EM >). </P ></LI ><LI ><P ><A HREF="../Sentry-Firewall-CD-HOWTO.html" TARGET="_top" >Sentry-Firewall-CD-HOWTO</A >, <I CLASS="CITETITLE" >Sentry Firewall CD HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Aug 2003</I >. An introduction on how the Sentry Firewall CDROM works and how to get started using the system. </P ></LI ><LI ><P ><A HREF="../Shadow-Password-HOWTO.html" TARGET="_top" >Shadow-Password-HOWTO</A >, <I CLASS="CITETITLE" >Linux Shadow Password HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Apr 1996</I >. How to obtain, install, and configure the Linux password Shadow Suite. </P ></LI ><LI ><P ><A HREF="../User-Authentication-HOWTO/index.html" TARGET="_top" >User-Authentication-HOWTO</A >, <I CLASS="CITETITLE" >User Authentication HOWTO</I ></P ><P ><I CLASS="CITETITLE" >Updated: Feb 2003</I >. Explains how user and group information is stored and how users are authenticated on a Linux system (PAM), and how to secure you system's user authentication. </P ></LI ></UL ></P ></DIV ></DIV ><DIV CLASS="NAVFOOTER" ><HR ALIGN="LEFT" WIDTH="100%"><TABLE SUMMARY="Footer navigation table" WIDTH="100%" BORDER="0" CELLPADDING="0" CELLSPACING="0" ><TR ><TD WIDTH="33%" ALIGN="left" VALIGN="top" ><A HREF="os.html" ACCESSKEY="P" >Prev</A ></TD ><TD WIDTH="34%" ALIGN="center" VALIGN="top" ><A HREF="index.html" ACCESSKEY="H" >Home</A ></TD ><TD WIDTH="33%" ALIGN="right" VALIGN="top" ><A HREF="hardware.html" ACCESSKEY="N" >Next</A ></TD ></TR ><TR ><TD WIDTH="33%" ALIGN="left" VALIGN="top" >The Linux OS</TD ><TD WIDTH="34%" ALIGN="center" VALIGN="top" ><A HREF="categories.html" ACCESSKEY="U" >Up</A ></TD ><TD WIDTH="33%" ALIGN="right" VALIGN="top" >Hardware</TD ></TR ></TABLE ></DIV ></BODY ></HTML >