UNIX System Administration Handbook 2nd Ed.

Evi Nemeth, Garth Snyder, Scott Seebass, Trent R. Hein

Publisher: Prentice Hall, 1995, 779 pages

ISBN: 0-13-151051-7

Keywords: System Administration

Last modified: June 13, 2021, 2:37 p.m.

This sweeping revision of the world's most comprehensive guide to UNIX system administration is an ideal tutorial for those new to system administration and an invaluable reference for experienced UNIX professionals. Using a practical, hands-on approach, UNIX System Administration Handbook, Second Edition, covers every aspect of system administration — from basic topics to UNIX esoterica — and provides explicit guidelines for dealing with the six most popular versions of the UNIX operating system.

This edition is accompanied by a CD-ROM containing a wealth of valuable system administration tools, freely-available software, standards documents, and configuration examples that will prove indispensable to any UNIX administrator.

This book is a worthwhile addition to any UNIX professional's library. It offers:

  • A Practical Approach. This book provides numerous war stories and a wealth of pragmatic advice.
  • UNIX Networking. Networking is perhaps the most difficult aspect of UNIX system administration. This book covers all the gory details.
  • Different Kinds of UNIX. This book provides detailed information about the six most popular variants of UNIX: Solaris, HP-UX, IRIX, SunOS, OSF/1, and BSDI. It illustrates a broad range of approaches to system administration.
  • True-Life Situations. The examples in this book are drawn directly from real-world systems and situations, with all their unsightly complications.
  • Basic Administration
    1. Where to Start
      • The Sordid History of UNIX
      • Contemporary UNIX Products
      • How to Use This Book
        • System Administrations 101
        • Notation and Typographical Conventions
        • System-Specific Information
      • How to Use your Manuals
        • Organization of the Man Pages
        • man: Read Manual Pages
      • Essential Tasks of the system administrator
        • Adding and Removing Users
        • Adding and Removing Hardware
        • Performing Backups
        • Installing New Software
        • Monitoring the System
        • Troubleshooting
        • Maintaining Local Documentation
        • Auditing Security
        • Helping Users
      • System Administration under Duress
      • Recommended Supplemental Reading
    2. Booting and Shutting Down
      • Introduction
      • Bootstrapping
        • Automatic and Manual Booting
        • Steps in the boot process
        • Kernel Initialization
        • Hardware Configuration
        • System Processes
        • Operator Intervention (Manual Boot Only)
        • Startup Scripts
        • Multi-User Operation
      • A Stroll through the BSD Startup Scripts
        • A Sample /etc/rc.boot
        • A Sample /etc/rc.single
        • A Sample /etc/rc
        • A Sample /etc/rc.local
      • A Stroll through the ATT Startup Scripts
        • Run Levels and the inittab File
        • A sample /etc/bcheckrc
        • A sample /etc/brc
        • Task Specific Scripts
      • What if the System Won't Boot?
        • Hardware Problems
        • Defective Boot Blocks
        • Damaged Filesystems
        • Improperly Configured Kernels
        • Errors in Startup Scripts
      • Rebooting and Shutting Down
        • Turning Off the Power
        • shutdown: The General Way to Halt the SYstem
        • halt: A Simpler Way to Shut Down
        • reboot: Quick and Dirty Restart
        • Sending init a TERM signal
        • telinit: Change init's Run Level
        • Killing init
    3. Rootly Powers
      • Introduction
      • The UNIX Model of Ownership
        • Ownership of files
        • Ownership of processes
      • The Superuser
      • Choosing a Root password
      • Becoming root
        • sudo — a limited su
      • Other important users
        • daemon: an owner of unprivileged software
        • bin: an owner of system commands
        • sys: owner of the kernel and memory images
        • nobody: Owner of Nothing
    4. The Filesystem
      • Introduction
      • Deconstructing the Filesystem
      • Organization of the Filesystem
      • Types of Files
        • Regular Files
        • Directories
        • Character and Block Device Files
        • UNIX Domain Sockets (BSD)
        • Named Pipes (ATT)
        • Hard Links
        • Symbolic Links (BSD)
      • File Permissions
        • The Setuid and Setgid Bits
        • The Sticky Bit
        • The Permission Bits
        • Changing PPermissions
        • Assigning Default Permissions
      • Inodes
    5. Controlling Processes
      • Introduction
      • Components of a Process
        • PID
        • PPID
        • UID and EUID
        • GID and EGID
        • Priority and Nice Value
        • Control Terminal
      • Signals
      • Process States
      • kill: Send Signals
      • nice: and renice: Influence Scheduling Priority
      • ps: Monitor Processes
      • top: Monitor Processes
      • nohup: Protect Background Processes
      • Errant processes
    6. Adding New Users
      • Introduction
      • Adding Users
        • Editing the /etc/passwd File
        • Set an initial password
        • Creating a Home Directory
        • Copying in the Startup Files
        • Setting the Mail Home
        • Editing the /etc/group File
        • Recording Accounting Information
        • Updating the User Database and Phone Book
        • Setting Quotas
        • Verify the New Login
      • Removing Users
      • Disabling logins
      • Password Aging
      • Pseudo-Logins
    7. Devices and Drivers
      • Introduction
      • Device Numbers and Jump Tables
      • Naming conventions for devices
        • Adding a BSD Device Driver
        • Adding an HP-UX Device Driver
        • Adding an IRIX Device Driver
      • Device Files
      • Naming Conventions for Devices
      • Loadable Kernel Modules
    8. Serial Devices
      • Introduction
      • Standards for Signals and Connectors
      • Alternative Connectors
        • The DIN-8 Variant
        • The DB-9 Variant
        • The RJ-45 Variant
        • The Yost Standard for Rj-45 Wiring
      • Hard and Soft Carrier
      • Hardware Flow Control
      • Cable Length
      • Software Configuration for Serial Devices
      • Configuration of Hard-Wired Terminals
        • The Login Process
        • The /etc/ttytab and /etc/ttys Files
        • The /etc/ttytype File
        • The /etc/gettytab File
        • The /etc/inittab File
        • The /etc/gettydefs File
        • Solaris and sacadm
        • Terminal Support: The termcap and the Terminal Driver
      • stty: Set Terminal Options
      • tset: Set Options Automatically
      • How to Unwedge a Terminal
      • Modems
        • Modulation Protocols
        • Error Correction Protocols
        • Data Compression Protocols
        • Dial-Out Configuration: /etc/phones and etc/remote
        • Bidirectional Modems
      • Debugging a Serial Line
        • Using a Breakout Box
    9. Adding a Disk
      • Introduction
      • The SCSI Standard
      • Disk Geometry
        • Creating Device Entries
        • Formatting a Disk Drive
        • Partitions and Labels
        • Filesystems
        • Mounts and the fstab File
        • Enabling Swapping
      • fsck: Check and Repair Filesystems
      • Specifics for Various Operating Systems
        • Solaris
        • HP-UX
        • IRIX
        • SunOS
        • OSF/1
        • BSDI
    10. Periodic Processes
      • Introduction
      • cron: Schedule Commands
      • Format of Crontab Files
      • Chnaging Crontabs
      • Some Common Uses for cron
        • Processing Appointment Calendars
        • Cleaning the Filesystem
        • UUCP Polling
        • Accounting
        • Network Distribution of Configuration Files
      • Specifics for Various Operating Systems
    11. Backups
      • Introduction
      • Backup devices and media
        • Floppy Disks
        • Flopticals
        • Cartridge tapes
        • Nine-Track Magnetic Tapes
        • Write-Once CD-ROM
        • 8mm Cartridge Tapes
        • 4mm DAT Tapes
        • Jukeboxes and Stackers
        • Summary of Media Types
      • Setting Up an Incremental Backup Regime
        • Dumping Filesystems
        • Dump Sequences
        • Selecting a Dump Sequence
      • Motherhood and Apple Pie
        • Perform All Dumps from One Machine
        • Label Your Tapes
        • Pick a Reasonable Backup Interval
        • Choose Filesystems Carefully
        • Make Daily Dumps Fit on One Tape
        • Make Filesystems Smaller than your Dump Device
        • Keep Tapes Off-Site
        • Limit Activity During Dumps
        • Check your Tapes
        • Prepare for the Worst
      • Restoring from Dumps
        • Restoring Individual Files
        • Interactive Restore
        • Restoring Entire Filesystems
      • Dumping and Restoring for Upgrades
      • Other Archiving Programs
        • tar: Package Files
        • cpio: ATT-ish Archiving
        • dd: Twiddle Bits
        • volcopy: Duplicate Filesystems
      • Using Multiple Files on a Single Tape
    12. Syslog and Log Files
      • Introduction
        • Throwing Away Log Files
        • Rotating Log Files
        • Archiving Log Files
      • Finding Log FIle
      • Files NOT to Manage
      • Specifics for Various Operating Systems
      • syslog: The System Event Logger
        • Configuring syslogd
        • Config File Example
        • Sample syslog Output
        • Designing a Logging Scheme for your Site
        • Brides of syslog
        • Debugging syslog
        • Using syslog in Programs
    13. Configuring the Kernel
      • Introduction
      • Differences Between ATT and BSD
      • When to Configure the Kernel
        • Installing a New System
        • Adding Device Drivers
        • Tuning Table Sizes
      • Building a BSD Kernel
        • Auditing the SYstem's Hardware
        • Creating a Configuration File in SYS/conf
        • Creating the Kernel's Compilation Directory
        • Running config
        • Running make depend
        • Building the Kernel
        • Installing the Kernel
        • Testing and Debugging the Kernel
        • Documenting the Kernel
      • Creating a BSD Configuration File
        • The machine keyword
        • The cpu keyword
        • The ident keyword
        • The maxusers keyword
        • The options keyword
        • The config keyword
        • The controller, tape, disk, and device keywords
        • The pseudo-device keyword
        • A Sample Configuration File
      • Configuring a Solaris (ATT) Kernel
        • The Solaris Kernel-Building Area
        • Configuring the Kernel via /etc/system
        • An Example /etc/system
        • Debugging a Solaris Configuration
      • Configuring an IRIX Kernel
  • Networking
    1. TCP/IP and Routing
      • Introduction
      • Networking Road Map
      • Packets and Segementation
      • Packet Addressing
      • Internet Addresses
      • ARP 'n' RARP Address Translation
      • Routing
        • Routing Approach
        • ICMP Redirects
        • Subnetting
        • CIDR: Classless Inter-Domain Routing
        • Selecting a Routing Strategy
      • Setting Up a Network
        • Obtaining and Assigning Internet Addresses
        • ifconfig: Configure Network Interfaces
        • route: Configure Static Routes
        • routed: The Standard Routing Daemon
        • gated: A Better Routing Daemon
        • Boot-Time Network Configuration
      • Network Debugging
        • ping: Check if a Host is Alive
        • netstat: Gobs o' Status
        • traceroute: Trace IP Packets
        • tcpdump, etherfind, and snoop: Monitor Traffic
        • arp: Inspect and Manage Address Mappings
      • Other Protocols
      • AppleTalk
        • EtherTalk
        • LocalTalk
        • AppleTalk Addressing
        • AppleTalk Naming
      • IPX
        • NLMs
      • DECnet
        • DECnet Addressing
        • DECnet Routing
      • Recommended Supplemental Reading
    2. Network Hardware
      • Introduction
      • Ethernet: The Common LAN
        • Ethernet Hardware
        • Thicknet: 10BASE5
        • Thinnet: 10BASE2
        • 10BASE5 and 10BASE2 Termination
        • Unshielded Twister Pair: 10BASET
        • Fiber: FOIRL and 10BASEF
        • Transceivers
        • Drop Cables
        • Connecting and Expanding Ethernets
      • FDDI: The Disappointing LAN
      • 100 Mb/s Twister Pair: The Frontier LAN
      • ATM: The Promised LAN
      • Frame Relay: The Sacrifical WAN
      • ISDN: The Invisible WAN
      • Network Testing and Debugging
      • Building Wiring
        • UTP Cabling Options
        • Connections to Offices
        • Wiring Standards
      • Network Design Issues
        • Network Architecture vs. Building Architecture
        • Existing Networks
        • Expansion
        • Congestion
        • Maintenance and Documentation
      • Management Issues
      • Recommended Vendors
        • Cables and Connectors
        • Test Equipment
        • Repeaters and Hub Equipment
        • Routers
      • Recommended Supplemental Reading
    3. Domain Name System
      • Introduction
      • The History of DNS
      • Who Needs DNS?
      • The DNA Namespace
        • Selecting a Domain Name
        • Registering a Second-Level Domain Name
        • Creating your Own Subdomain
      • Components of BIND
        • named: The BIND Name Server
        • The Resolver Library
        • Shell Interface
      • How DNS Works
      • Caching and Efficiency
      • BIND Client Issues
        • Configuring the Resolver
        • Testing the Resolver
        • Impact on the Rest of the System
      • Setting Up a Name Server
        • /etc/named.boot: The Boot File
      • The DNS Database
        • The SOA Record
        • NS Records
        • A Records
        • PTR Records
        • MX Records
        • CNAME Records
        • HINFO Records
        • WKS Records
        • Bonus Mail Handling Records
        • TXT Records
        • New Resource Records
      • BIND Configuration Examples
        • A Caching-Only Server
        • The Cache File
        • A Primary Server for a Small Company
        • A Primary Server for a Large Site
        • Loose Ends
        • Glue records
      • Updating Zone Files
      • Zone Transfers
      • Security Issues
      • Testing and Debugging
        • Log Messages
        • Debug Levels
        • Signals Understood by named
        • Debugging with nslookup and dig
        • Lame Delegations
      • Host Management Tools
      • DNS for Systems not on the Internet
      • Versions of BIND
      • Specifics for Various Operating Systems
      • Recommended Supplemental Reading
    4. The Network File System
      • Introduction
      • Server-Side NFS
        • mountd: Respond to Mount Requests
        • nfsd: Serve Files
      • Client-Side NFS
        • biod: Provide Client-Side Caching
        • Mounting Remote Filesystems
      • Administrative Conventions for NFS
      • Interaction Between NFS and Networks
      • Dedicated NFS File Servers
      • Automatic Mounting
      • automount: Sun's Automounter
        • Indirect Maps
        • Direct Maps
        • Master Maps
        • Replicated Filesystems using automount
        • Stooping automount
      • amd: A Better Automounter
        • amd Maps
        • Starting amd
        • Replicated Filesystems using amd
        • Stopping amd
      • Security and NFS
      • Monitoring and Tuning NFS
      • Other File Sharing Systems
        • RFS
        • The Andrew Filesystem
      • Recommended Supplemental Reading
    5. Sharing System Files
      • Introduction
      • What to Share
      • Copying Files Around
        • rdist: Push Files
        • expect: Pull Files
      • NIS: The Network Information Service
        • Magic NIS Cookies
        • Netgroups
        • Advantages and Disadvantages of NIS
        • Technical Overview of NIS
        • Setting Up a NIS Domain
      • NIS+: Son of NIS
      • Other Database Systems
      • Prioritizing Sources of Administrative Information
      • Specifics of Various Operating Systems
    6. SLIP and PPP
      • Introduction
      • How SLIP and PPP are Different from UUCP
      • Performance Issues
      • SLIP and PPP Compared
        • SLIP
        • PPP
      • Basic Connection Model
        • Making Your Host Speak SLIP or PPP
        • Controlling SLIP and PPP Links
        • Finding a Host to Talk to
      • Network Concerns
        • Address Assignment
        • Routing
        • Security
        • NFS
        • X Windows
      • Flavors of SLIP
      • Flavors of PPP
      • Walkthrough: Installing SLIP on SunOS
      • Configuring PPP on SOlaris 2.4
      • Installing SLIP and PPP on Other Architectures
      • Dial-In Hubs
    7. The Internet
      • Introduction
      • The Internet Populace
      • Internet Structure and Politics
        • The Internet Hierarchy
        • Acceptable Use
        • Internet History
        • Internet Administration
      • Using the Internet
        • Anonymous ftp
        • Setting Up an Anonymous ftp Server
        • Archive Servers
        • Archie
        • The Wide Area Information Service
        • Gopher
        • The World Wide Web
        • The Big Picture
      • Connecting to the Internet
      • Recommended Supplemental Reading
    8. Electronic Mail
      • Introduction
      • Mail Systems
        • User Agents
        • Transport Agents
        • Delivery Agents
        • Mail Addressing
        • Rereading Mail Headers
        • The Spool Directiry
        • Mail Philosophy
        • Mail Aliases
        • Special Kinds of Aliases
        • Mail Forwarding
        • The Hashed Alias Database
        • Mailing Lists
      • sendmail: Ringmaster of the Electronic Mail Circus
        • The history of sendmail
        • Vendor-Supplied Versions of sendmail
        • Modes of Operation
        • The Mail Queue
      • Configuring sendmail
        • The Raw Configuration File
        • General Syntax
        • The D Command: Define symbol
        • The C Command: Define a Class
        • The F Command: Define a Class from a File
        • The O Command: Set Options
        • The P Command: Define Message Precedence
        • The T Command: Set Trusted Users (not in V8)
        • The H Command: Set Header Format
        • The V Command: Set Configuration File Syntax (V8 Only)
        • The K Command: Define Keyed Database (V8 Only)
        • Rewriting Rules
        • The S Command: Start a New Ruleset
        • The R Command: Define a Rewriting Rule
        • Examples of Rewriting Rules
        • Common Ruleset Blunders
        • The M Command: Define Mailers
      • Configuration Using the m4 Preprocessor
      • V8 Configuration
        • The define Macro
        • The VERSIONID Macro
        • The OSTYPE Macro
        • The MASQUERADE_AS Macro
        • The FEATURE Macro
        • The MAIL_HUB and SMART_HOST Macros
        • The LOCAL_* Macros
        • The MAILER Macro
        • The SITE and SITECONFIG Macros
        • The DOMAIN Macro
        • Building a V8 Configuration File
      • IDA Configuration
        • IDA Database Files
        • The MAILERTABLE Database
        • The DOMAINTABLE Database
        • The GENERICFROM Database
        • The ALIASES File
        • The ALWAYSADDDOMAIN Macro
        • The PSEUDODOMAINS Macro
        • The PSEUDONYMS Macro
        • The UUCPNODES Macro
        • The HIDDENNET and HIDDENNETHOST Macros
        • The LOADAVEQUEUE and LOADAVEREJ Macros
        • The TIMEOUT Macro
        • The RELAY_HOST and RELAY_MAILER Macros
        • The SPOOLDIR Macro
        • Building an IDA Conf
      • A Comprison of V8 and IDA
      • Mailer Statistics
      • Testing and Debugging
        • Testing Rewriting Rules
        • Verbose Delivery
        • Talking in SMTP
        • Logging
      • Security and Privacy
      • Recommended Supplemental Reading
    9. Network Management
      • Introduction
      • Detecting network Faults
        • Checking Connectivity with ping
        • Following Up on a Failed Ping
        • Checking for Errors with netstat
        • Automated Network Testing
      • Fault Reporting
      • Planning for Reliability
      • Network Management Protocols
        • Yeah, So What?
      • SNMP: The Simple Network Management Protocol
        • The SNMP Namespace
        • Management Information Bases
        • SNMP Protocol Operations
        • The SNMP Documentation Swamp
        • Specifics for Various Operating Systems
        • The CMU Tools
      • Recommended Supplemental Reading
    10. Security
      • Introduction
      • The Seven Common Sense Rules of Security
      • Security Problems in the /etc/passwd File
        • Password Checking and Selection
        • Group Logins and Shared Logins
        • User Shells
        • Shadow Passwords
        • Password Aging
        • Rootly Entries
      • Setuid Programs
        • Writing Setuid Programs
        • Finding Setuid Programs
      • Important File Permissions
      • Miscellaneous Security Issues
        • Remote Evening Logging
        • Secure Terminals
        • /etc/hosts.equiv and ~/.rhosts
        • Security and NIS
        • Security and NFS
        • Security and sendmail
      • Security Power Tools
        • COPS: Audit System Security
        • crack: Find Insecure Passwords
        • tcpd: Protect Internet Services
        • tripwire: Monitor Changes to System Files
      • Kerberos: A Unified Approach to Network Security
      • Packet Filtering
      • Security and Backups
      • Trojan Horses
      • Smart Terminal Problems
      • Data Encryption with crypt
      • CERT and SCC
      • Security Mailing Lists
      • Recommended Supplemental Reading
  • Bunch O'Stuff
    1. News
      • Introduction
      • The Distribution of News
      • Newsgroups
      • alt: The Forbidden Hierarchy
      • Usernet: Asset or Liability?
      • FAQs and Archives
      • Clarinet
      • Usenet Software
        • C-News and NNTP
        • INN
        • Setting Up News at your Site
      • Installing INN
        • Obtaining INN
        • Printing the INN installation Documentation
        • Configuring INN
        • Compiling INN
        • The INN Cast of Characters
        • Starting Up INN
        • Monitoring Article Flows
        • Daily Chores
      • NNTP-Based News Readers
        • rn: Read News
        • trn: A Threaded Version of rn
        • nn: No News is Good News
        • tin: Yet Another News Reader
        • xrn: An X Windows News Reader
      • Maintenance Strategies
      • News-Reading chores for System Administrators
        • news.announce.important (moderated)
        • news.admin
        • comp.unix.questions
        • comp.unix.wizards
        • comp.sources.unix (moderated)
        • comp.sources.misc (moderated)
        • comp.sources.bugs
        • comp.sources.wanted
        • comp.sys.machine and comp.sys.machine.digest (moderated)
        • comp.unix.admin
      • Fun Newsgroups You Might Find Interesting
      • Recommended Supplemental Reading
    2. Printing and Imaging
      • Introduction
      • Mini-Glossary of Printing Terms
      • Printing under BSD
        • An Overview of the Printing Process
        • The /etc/printcap File
        • Printcap Variables
        • A Sample /etc/printcap Entry
        • Controlling the Printing Environment
        • lpq: View the Printing Queue
        • lprm: Remove Jobs
        • lpc:> Make Administrative Changes
        • File System Limits
      • ATT Printing
        • Introduction
        • Destinations and Classes
        • A Brief Description of lp
        • lpsched and lpshut: Start and Stop Printing
        • lpadmin: Configure Printing Environment
        • cancel: Remove Print Jobs
        • accept and reject: Control Spooling
        • enable and disable: Control Printing
        • lpmove: Transfer Jobs
        • lpstat: Get Status Information
        • Interface Programs
        • What to Do When the lp System is Completely Hosed
      • Cross-Platform Spooling
        • Spooling to an lpd System from an lpd System
        • Spooling from HP-UX to an lpd Printer
        • Spooling from an lpd System to lpsched on HP-UX
        • Spooling to and from Solaris
      • The Lesser Evil?
      • Common Printing Software
        • TranScript
        • NeWSPrint
        • Impressario
        • JetDirect
        • groff
        • ghostscript
        • CAP and K-Spool
        • mpage
      • Network Printers
      • PostScript Printers
      • Printer Philosophy
        • Use Printer Accounting
        • Use Banner Pages Only When Necessary
        • Provide Recycling Bins
        • Provide Previewers
        • Buy Cheap Printers
        • Keep Extra Toner Cartridges on Hand
    3. Disk Space Management
      • Introduction
      • Dealing with Disk Hogs
      • Hog Detection
      • Data Compression
      • Skulker Scripts
      • tunefs: Set Filesystem Parameters
      • Disk Quotas
        • How Quotas Work
        • Enabling Quotas
        • Setting Up Quotas on a Particular Filesystem
        • edquota: Set Quotas
        • quota and repquota. View Quotas
        • Quotas and NFS
      • Disk overflows
      • Specifics for Various Operating Systems
    4. Hardware Maintenance
      • Introduction
      • Board-Handling Lore
        • Static Electricity
        • Reseating Boards
      • Monitor Maintenance
      • Memory SIMMs
      • Preventive Maintenance
      • Maintenance Contracts
        • On-Site Maintenance
        • Board-Swap Maintenance
        • Warranties
      • Environmental Factors
        • Power Supply
        • Temperature
        • Humidity
    5. Accounting
      • Introduction
      • Why Bother with Accounting?
      • What to Measure and Archive
      • Accounting in a Networked Environment
      • Accounting under BSD
        • CPU Accounting
        • Connect-Time Accounting
        • Printer Usage
        • Dial-Out Usage
        • Summaries
      • Accounting under ATT
        • Setting Up Accounting
        • What Accounting Does
        • Printer Accounting
      • Specifics for Various Operating Systems
    6. Performance Analysis
      • Introduction
      • What You Can Do to Improve Performance
      • Factors that Affect Performance
      • Giving your System a Performance Checkup
        • Analyzing CPU Usage
        • The Cost of Virtual Memory
        • Analyzing Memory Usage
        • Analyzing Disk I/O
        • Tuning Filesystems
        • pstat: Print Random Statistics (BSD)
      • Help! My System Just Got Really Slow!
      • Recommended Supplemental Reading
    7. UUCP
      • UUCP vs. SLIP and PPP
      • An Overview of UUCP
      • UUCP Addresses
      • User-level UUCP
        • uucp: Copy File
        • uux: Execute Commands on Other Systems
      • UUCP Data Transport
      • Setting Up UUCP
        • Identifying your UUCP Software
        • Verifying Your Software Configuration
        • Connecting Modems
        • Describing your Modems to UUCP
        • Entering Telephone Prefix Codes
        • Preparing an Access Control Specification
        • BSD Security: USERFILE and L.cmds
        • Format of the USERFILE
        • Format of the L.cmds File
        • HoneyDanBer Security: Permissions
        • Finding a UUCP Neighbor
        • Making a Login for a New Neighbor
        • Making an L.sys or Systems Entry for a Neighbor
        • Debugging the Connection
        • Configuring your Mail System to Use UUCP
        • Setting Up Automatic Calling using cron
      • The UUCP Log Files
        • LOGFILE and .Log
        • SYSLOG and .Admin/xferstats
        • ERRLOG and .Admin/errors
      • Miscellaneous UUCP Support Programs and Files
        • uuclean: Sanitize the Spool Directory
        • uuq and uustat: Monitor the UUCp Queue
        • uusnap: Show Status of Connections
        • uuname: Show UUCP Neighbors
        • uupoll: Force a Call to a UUCP Neighbor
        • uulog: The Command of a Thousand faces
      • Specifics for Various Operating Systems
      • Recommended Supplemental Reading
    8. Daemons
      • Introduction
      • Essential Daemons
        • init: The Primordial Process
        • cron: Schedule Commands
        • inetd: Manage Daemons
        • Configuring inted
        • The services File
        • Restarting inetd
        • portmap: Map RPC Services to TCP and UDP Ports
      • The BSD Daemons
        • pagedaemon: The Paging Daemon
        • swapper: The Swapping Daemon
        • update: Synchronizing Filesystems
        • lpd: Manage BSD Printing
        • sendmail: Transport Electronic Mail
      • ATT daemons
        • lpsched: Manage ATT Printing
      • Random Daemons
        • snmpd: Network Management Server
        • rlpdaemon: Print from BSD to HP-UX
        • glbd and llbd: Location Brokers
      • NFS Daemons
        • nfsd: Serve Files
        • rpc.mountd: respond to Mount Requests
        • rpc.lockd and rpc.statd: manage NFS Locks
        • biod: Cache Blocks
      • NIS Daemons
        • ypbind: Locate NIS Servers
        • ypserv: NIS Server
        • ypxfrd: Transfer NIS Databases
        • rpc.nisd: NIS+ Server
      • Internet Daemons
        • comsat: Notify Users of New Mail
        • talkd: talk Server
        • rwhod: Maintain Remote User List
        • ftpd: File Transfer Server
        • popper: Mailbox Server
        • rlogind: Remote Login Server
        • telnetd: Yet Another Remote Login Server
        • rshd: Remote Command Execution Server
        • rexecd: Yet Another Command Execution Server
        • rpc.rexd: Yet a Third Remote Execution Server
        • timed: Synchronize Clocks
        • xntpd: Synchronize Clocks Even Better
        • routed: Maintain Routing Tables
        • gated: Maintain Complicated Routing Tables
        • named: DNS Server
        • nntpd: Transfer Usenet News
        • innd and nnrpd: Alternate NNTP Daemons
        • syslogd: Process Log Messages
        • fingerd: Look Up Users
        • httpd: World Wide Web
      • Daemons for Diskless Clients
        • bootpd: Boot Server
        • tftpd: Trivial File Transfer Server
        • rarpd: Map Ethernet Addresses to IP Addresses
        • bootparamd: Advanced Diskless Life Support
    9. Policy anbd Politics
      • Introduction
      • Policy and Procedure
        • Security Policies
        • User Policy Agreements
        • Administrator Policy Agreements
        • Policy and Procedures for Emergency Situations
      • Legal Issues
      • Some Interesting Factoids
      • Scope of Service
      • Trouble Reporting Systems
      • Financial Models
      • Managing Management
      • Hiring, Firing, and Training
        • Attitude Adjustment
        • Operator Wars
        • Iterative Refinement
      • War Stories and Ethics
        • Boss's Mistake #1
        • Boss's Mistake #2
        • Who to Fire
        • Horndog Joe
        • Electric Fence
        • Wedding Invitations
        • Pornographic GIF Images
        • Migrating Data
        • Bill Must Die!
      • Local Documentation
      • Procurement
      • Decommisioning Hardware
      • Management of Dumps and Data
      • Software Patents
      • Organizations and Conferences
        • Mailing Lists
      • Standards
      • Sample Documents

Reviews

UNIX System Administration Handbook

Reviewed by Roland Buresund

Very Good ******** (8 out of 10)

Last modified: May 21, 2007, 2:51 a.m.

This is one of the few book that exceeds its cover promise. Immensly successful in different editions today.

Comments

There are currently no comments

New Comment

required

required (not published)

optional

required

captcha

required