Index
Symbols
- /etc/fstab file
- mounting file systems with, Mounting File Systems Automatically with /etc/fstab
- updating, Updating /etc/fstab
- /etc/group file
- group, role in, /etc/group
- user account, role in, /etc/group
- /etc/gshadow file
- group, role in, /etc/gshadow
- user account, role in, /etc/gshadow
- /etc/mtab file, Viewing /etc/mtab
- /etc/passwd file
- group, role in, /etc/passwd
- user account, role in, /etc/passwd
- /etc/shadow file
- group, role in, /etc/shadow
- user account, role in, /etc/shadow
- /proc/mdstat file, Checking Array Status With /proc/mdstat
- /proc/mounts file, Viewing /proc/mounts
A
- abuse, resource, What Barriers Are in Place To Prevent Abuse of Resources
- account (see user account)
- ATA disk drive
- adding, Adding ATA Disk Drives
- automation, Automation
- overview of, Automate Everything
B
- backups
- AMANDA backup software, The Advanced Maryland Automatic Network Disk Archiver (AMANDA)
- building software, Backup Software: Buy Versus Build
- buying software, Backup Software: Buy Versus Build
- data-related issues surrounding, Different Data: Different Backup Needs
- introduction to, Backups
- media types, Backup Media
- restoration issues, Restoration Issues
- bare metal restorations, Restoring From Bare Metal
- testing restoration, Testing Backups
- schedule, modifying, Modifying the Backup Schedule
- storage of, Storage of Backups
- technologies used, Backup Technologies
- cpio, cpio
- dump, dump/restore: Not Recommended for Mounted File Systems!
- tar, tar
- types of, Types of Backups
- differential backups, Differential Backups
- full backups, Full Backups
- incremental backups, Incremental Backups
- bandwidth-related resources (see resources, system, bandwidth)
- bash shell, automation and, Automation
- business, knowledge of, Know Your Business
C
- cache memory, Cache Memory
- capacity planning, Monitoring System Capacity
- CD-ROM
- file system (see ISO 9660 file system)
- centralized home directory, Home Directories
- chage command, User Account and Group Applications
- change control, Change Control
- chfn command, User Account and Group Applications
- chgrp command, File Permission Applications
- chmod command, File Permission Applications
- chown command, File Permission Applications
- chpasswd command, User Account and Group Applications
- color laser printers, Color Laser Printers
- communication
- necessity of, Communicate as Much as Possible
- Red Hat Enterprise Linux-specific information, Documentation and Communication
- CPU power (see resources, system, processing power)
D
- daisy-wheel printers (see impact printers)
- data
- shared access to, Who Can Access Shared Data, Where Users Access Shared Data
- global ownership issues, Global Ownership Issues
- device
- alternative to device names, Alternatives to Device File Names
- device names, alternatives to, Alternatives to Device File Names
- devlabel, naming with, Using devlabel
- file names, Device Files
- file system labels, File System Labels
- labels, file system, File System Labels
- naming convention, Device Naming Conventions
- naming with devlabel, Using devlabel
- partition, Partition
- type, Device Type
- unit, Unit
- whole-device access, Whole-Device Access
- devlabel, Using devlabel
- df command, Issuing the df Command
- disaster planning, Planning for Disaster
- power, backup, Backup Power
- generator, Providing Power For the Next Few Hours (and Beyond)
- motor-generator set, Providing Power For the Next Few Seconds
- outages, extended, Planning for Extended Outages
- UPS, Providing Power For the Next Few Minutes
- types of disasters, Types of Disasters
- air conditioning, Heating, Ventilation, and Air Conditioning
- application failures, Application Failures
- building integrity, Building Integrity
- electrical, Electricity
- electricity, quality of, Power Quality
- electricity, security of, The Security of Your Power
- environmental failures, Environmental Failures
- hardware failures, Hardware Failures
- heating, Heating, Ventilation, and Air Conditioning
- human errors, Human Errors
- HVAC, Heating, Ventilation, and Air Conditioning
- improper repairs, Improperly-Repaired Hardware
- improperly-used applications, Improper Use of Applications
- maintenance-related errors, Mistakes Made During Maintenance
- misconfiguration errors, Misconfiguration Errors
- mistakes during procedures, Mistakes Made During Procedures
- operating system crashes, Crashes
- operating system failures, Operating System Failures
- operating system hangs, Hangs
- operator errors, Operations Personnel Errors
- procedural errors, Failure to Follow Procedures
- service technician errors, Service Technician Errors
- software failures, Software Failures
- system administrator errors, System Administrator Errors
- user errors, End-User Errors
- ventilation, Heating, Ventilation, and Air Conditioning
- weather-related, Weather and the Outside World
- disaster recovery
- backup site, Backup Sites: Cold, Warm, and Hot
- network connectivity to, Network Connectivity to the Backup Site
- staffing of, Backup Site Staffing
- backups, availability of, Availability of Backups
- end of, Moving Back Toward Normalcy
- hardware availability, Hardware and Software Availability
- introduction to, Disaster Recovery
- plan, creating, testing, implementing, Creating, Testing, and Implementing a Disaster Recovery Plan
- software availability, Hardware and Software Availability
- disk drives, Hard Drives
- disk quotas
- enabling, Enabling Disk Quotas
- introduction to, Implementing Disk Quotas
- management of, Managing Disk Quotas
- overview of, Some Background on Disk Quotas
- block usage tracking, Tracks Disk Block Usage
- file-system specific, Per-File-System Implementation
- grace period, Grace Periods
- group specific, Per-Group Space Accounting
- hard limits, Hard Limits
- inode usage tracking, Tracks Disk Inode Usage
- soft limits, Soft Limits
- user specific, Per-User Space Accounting
- disk space (see storage)
- documentation
- Red Hat Enterprise Linux-specific information, Documentation and Communication
- documentation, necessity of, Document Everything
- dot-matrix printers (see impact printers)
E
- engineering, social, The Risks of Social Engineering
- execute permission, User Accounts, Groups, and Permissions
- EXT2 file system, EXT2
- EXT3 file system, EXT3
F
- file names
- device, Device Files
- file system
- labels, File System Labels
- free command, free, Red Hat Enterprise Linux-Specific Information
G
- GID, Usernames and UIDs, Groups and GIDs
- gnome-system-monitor command, The GNOME System Monitor -- A Graphical top
- gpasswd command, User Account and Group Applications
- group
- files controlling, Files Controlling User Accounts and Groups
- /etc/group, /etc/group
- /etc/gshadow, /etc/gshadow
- /etc/passwd, /etc/passwd
- /etc/shadow, /etc/shadow
- GID, Usernames and UIDs, Groups and GIDs
- management of, Managing User Accounts and Resource Access
- permissions related to, User Accounts, Groups, and Permissions
- shared data access using, Shared Groups and Data
- structure, determining, Determining Group Structure
- system GIDs, Usernames and UIDs, Groups and GIDs
- system UIDs, Usernames and UIDs, Groups and GIDs
- tools for managing, User Account and Group Applications
- gpasswd command, User Account and Group Applications
- groupadd command, User Account and Group Applications
- groupdel command, User Account and Group Applications
- groupmod command, User Account and Group Applications
- grpck command, User Account and Group Applications
- UID, Usernames and UIDs, Groups and GIDs
- group ID (see GID)
- groupadd command, User Account and Group Applications
- groupdel command, User Account and Group Applications
- groupmod command, User Account and Group Applications
- grpck command, User Account and Group Applications
H
- hard drives, Hard Drives
- hardware
- failures of, Hardware Failures
- service contracts, Service Contracts
- availability of parts, Parts Availability
- budget for, Available Budget
- coverage hours, Hours of Coverage
- depot service, Depot Service
- drop-off service, Depot Service
- hardware covered, Hardware to be Covered
- on-site technician, Zero Response Time -- Having an On-Site Technician
- response time, Response Time
- walk-in service, Depot Service
- skills necessary to repair, Having the Skills
- spares
- keeping, Keeping Spare Hardware
- stock, quantities, How Much to Stock?
- stock, selection of, What to Stock?
- swapping hardware, Spares That Are Not Spares
- home directory
- centralized, Home Directories
I
- IDE interface
- overview of, IDE/ATA
- impact printers, Impact Printers
- consumables, Impact Printer Consumables
- daisy-wheel, Impact Printers
- dot-matrix, Impact Printers
- line, Impact Printers
- inkjet printers, Inkjet Printers
- consumables, Inkjet Consumables
- intrusion detection systems, Security
- iostat command, The Sysstat Suite of Resource Monitoring Tools, Monitoring Bandwidth on Red Hat Enterprise Linux
- ISO 9660 file system, ISO 9660
L
- laser printers, Laser Printers
- color, Color Laser Printers
- consumables, Laser Printer Consumables
- line printers (see impact printers)
- logical volume management (see LVM)
- LVM
- contrasted with RAID, With LVM, Why Use RAID?
- data migration, Data Migration
- logical volume resizing, Logical Volume Resizing
- migration, data, Data Migration
- overview of, Logical Volume Management
- resizing, logical volume, Logical Volume Resizing
- storage grouping, Physical Storage Grouping
M
- managing
- printers, Printers and Printing
- memory
- monitoring of, Monitoring Memory
- resource utilization of, Physical and Virtual Memory
- virtual memory, Basic Virtual Memory Concepts
- backing store, Backing Store -- the Central Tenet of Virtual Memory
- overview of, Virtual Memory in Simple Terms
- page faults, Page Faults
- performance of, Virtual Memory Performance Implications
- performance, best case, Best Case Performance Scenario
- performance, worst case, Worst Case Performance Scenario
- swapping, Swapping
- virtual address space, Virtual Memory: The Details
- working set, The Working Set
- monitoring
- resources, Resource Monitoring
- system performance, System Performance Monitoring
- monitoring statistics
- bandwidth-related, Monitoring Bandwidth
- CPU-related, Monitoring CPU Power
- memory-related, Monitoring Memory
- selection of, What to Monitor?
- storage-related, Monitoring Storage
- mount points (see storage, file system, mount point)
- mounting file systems (see storage, file system, mounting)
- mpstat command, The Sysstat Suite of Resource Monitoring Tools
- MSDOS file system, MSDOS
N
- NFS, NFS
P
- page description languages (PDL), Printer Languages and Technologies
- Interpress, Printer Languages and Technologies
- PCL, Printer Languages and Technologies
- PostScript, Printer Languages and Technologies
- page faults, Page Faults
- PAM, Security
- partition, Partition
- attributes of, Partition Attributes
- geometry, Geometry
- type, Partition Type
- type field, Partition Type Field
- creation of, Partitioning, Partitioning
- extended, Extended Partitions
- logical, Logical Partitions
- overview of, Partitions/Slices
- primary, Primary Partitions
- passwd command, User Account and Group Applications
- password, Passwords
- aging, Password Aging
- big character set used in, Expanded Character Set
- longer, Longer Passwords
- memorable, Memorable
- personal info used in, Personal Information
- repeatedly used, The Same Password for Multiple Systems
- shortness of, Short Passwords
- small character set used in, Limited Character Set
- strong, Strong Passwords
- weak, Weak Passwords
- word tricks used in, Simple Word Tricks
- words used in, Recognizable Words
- written, Passwords on Paper
- perl, automation and, Automation
- permissions, User Accounts, Groups, and Permissions
- tools for managing
- chgrp command, File Permission Applications
- chmod command, File Permission Applications
- chown command, File Permission Applications
- philosophy of system administration, The Philosophy of System Administration
- physical memory (see memory)
- planning, importance of, Plan Ahead
- Pluggable Authentication Modules (see PAM)
- printers
- additional resources, Additional Resources
- color, Inkjet Printers
- CMYK, Inkjet Printers
- inkjet, Inkjet Printers
- laser, Color Laser Printers
- considerations, Printing Considerations
- duplex, Function
- languages (see page description languages (PDL))
- local, Networked Versus Local Printers
- managing, Printers and Printing
- networked, Networked Versus Local Printers
- types, Types of Printers
- color laser, Color Laser Printers
- daisy-wheel, Impact Printers
- dot-matrix, Impact Printers
- dye-sublimation, Other Printer Types
- impact, Impact Printers
- inkjet, Inkjet Printers
- laser, Laser Printers
- line, Impact Printers
- solid ink, Other Printer Types
- thermal wax, Other Printer Types
- processing power, resources related to (see resources, system, processing power)
Q
- quota, disk (see disk quotas)
R
- RAID
- arrays
- management of, Day to Day Management of RAID Arrays
- raidhotadd command, use of, Rebuilding a RAID array
- rebuilding, Rebuilding a RAID array
- status, checking, Checking Array Status With /proc/mdstat
- arrays, creating, Creating RAID Arrays
- after installation time, After Red Hat Enterprise Linux Has Been Installed
- at installation time, While Installing Red Hat Enterprise Linux
- contrasted with LVM, With LVM, Why Use RAID?
- creating arrays (see RAID, arrays, creating)
- implementations of, RAID Implementations
- hardware RAID, Hardware RAID
- software RAID, Software RAID
- introduction to, RAID-Based Storage
- levels of, RAID Levels
- nested RAID, Nested RAID Levels
- overview of, Basic Concepts
- raidhotadd command, use of, Rebuilding a RAID array
- RAM, Main Memory -- RAM
- read permission, User Accounts, Groups, and Permissions
- recursion (see recursion)
- Red Hat Enterprise Linux-specific information
- automation, Automation
- backup technologies
- backups technologies
- overview of, Backup Technologies
- bash shell, Automation
- communication, Documentation and Communication
- disaster recovery, Red Hat Enterprise Linux-Specific Information
- documentation, Documentation and Communication
- intrusion detection systems, Security
- PAM, Security
- perl, Automation
- resource monitoring
- resource monitoring tools, Red Hat Enterprise Linux-Specific Information
- free, Red Hat Enterprise Linux-Specific Information, Red Hat Enterprise Linux-Specific Information
- iostat, Monitoring Bandwidth on Red Hat Enterprise Linux
- OProfile, Red Hat Enterprise Linux-Specific Information
- sar, Monitoring Bandwidth on Red Hat Enterprise Linux, Monitoring CPU Utilization on Red Hat Enterprise Linux, Red Hat Enterprise Linux-Specific Information
- Sysstat, Red Hat Enterprise Linux-Specific Information
- top, Red Hat Enterprise Linux-Specific Information, Monitoring CPU Utilization on Red Hat Enterprise Linux
- vmstat, Red Hat Enterprise Linux-Specific Information, Monitoring Bandwidth on Red Hat Enterprise Linux, Monitoring CPU Utilization on Red Hat Enterprise Linux, Red Hat Enterprise Linux-Specific Information
- RPM, Security
- security, Security
- shell scripts, Automation
- software support, Software Support
- support, software, Software Support
- resource abuse, What Barriers Are in Place To Prevent Abuse of Resources
- resource monitoring, Resource Monitoring
- bandwidth, Monitoring Bandwidth
- capacity planning, Monitoring System Capacity
- concepts behind, Basic Concepts
- CPU power, Monitoring CPU Power
- memory, Monitoring Memory
- storage, Monitoring Storage
- system capacity, Monitoring System Capacity
- system performance, System Performance Monitoring
- tools
- free, free
- GNOME System Monitor, The GNOME System Monitor -- A Graphical top
- iostat, The Sysstat Suite of Resource Monitoring Tools
- mpstat, The Sysstat Suite of Resource Monitoring Tools
- OProfile, OProfile
- sa1, The Sysstat Suite of Resource Monitoring Tools
- sa2, The Sysstat Suite of Resource Monitoring Tools
- sadc, The Sysstat Suite of Resource Monitoring Tools
- sar, The Sysstat Suite of Resource Monitoring Tools, The sar command
- Sysstat, The Sysstat Suite of Resource Monitoring Tools
- top, top
- vmstat, vmstat
- tools used, Red Hat Enterprise Linux-Specific Information
- what to monitor, What to Monitor?
- resources, importance of, Know Your Resources
- resources, system
- bandwidth, Bandwidth and Processing Power
- buses role in, Buses
- buses, examples of, Examples of Buses
- capacity, increasing, Increase the Capacity
- datapaths, examples of, Examples of Datapaths
- datapaths, role in, Datapaths
- load, reducing, Reduce the Load
- load, spreading, Spread the Load
- monitoring of, Monitoring Bandwidth
- overview of, Bandwidth
- problems related to, Potential Bandwidth-Related Problems
- solutions to problems with, Potential Bandwidth-Related Solutions
- memory (see memory)
- processing power, Bandwidth and Processing Power
- application overhead, reducing, Reducing Application Overhead
- application use of, Applications
- applications, eliminating, Eliminating Applications Entirely
- capacity, increasing, Increasing the Capacity
- consumers of, Consumers of Processing Power
- CPU, upgrading, Upgrading the CPU
- facts related to, Facts About Processing Power
- load, reducing, Reducing the Load
- monitoring of, Monitoring CPU Power
- O/S overhead, reducing, Reducing Operating System Overhead
- operating system use of, The Operating System
- overview of, Processing Power
- shortage of, improving, Improving a CPU Shortage
- SMP, Is Symmetric Multiprocessing Right for You?
- symmetric multiprocessing, Is Symmetric Multiprocessing Right for You?
- upgrading, Upgrading the CPU
- storage (see storage)
- RPM, Security
- RPM Package Manager (see RPM)
S
- sa1 command, The Sysstat Suite of Resource Monitoring Tools
- sa2 command, The Sysstat Suite of Resource Monitoring Tools
- sadc command, The Sysstat Suite of Resource Monitoring Tools
- sar command, The Sysstat Suite of Resource Monitoring Tools, The sar command, Monitoring Bandwidth on Red Hat Enterprise Linux, Monitoring CPU Utilization on Red Hat Enterprise Linux, Red Hat Enterprise Linux-Specific Information
- reports, reading, Reading sar Reports
- SCSI disk drive
- adding, Adding SCSI Disk Drives
- SCSI interface
- overview of, SCSI
- security
- importance of, Security Cannot be an Afterthought
- Red Hat Enterprise Linux-specific information, Security
- setgid permission, Security, User Accounts, Groups, and Permissions
- setuid permission, Security, User Accounts, Groups, and Permissions
- shell scripts, Automation
- SMB, SMB
- SMP, Is Symmetric Multiprocessing Right for You?
- social engineering, risks of, The Risks of Social Engineering
- software
- support for
- documentation, Documentation
- email support, Web or Email Support
- on-site support, On-Site Support
- overview, Getting Help -- Software Support
- self support, Self Support
- telephone support, Telephone Support
- Web support, Web or Email Support
- sticky bit permission, User Accounts, Groups, and Permissions
- storage
- adding, Adding Storage, Adding Storage
- /etc/fstab, updating, Updating /etc/fstab
- ATA disk drive, Adding ATA Disk Drives
- backup schedule, modifying, Modifying the Backup Schedule
- configuration, updating, Updating System Configuration
- formatting, Formatting the Partition(s), Formatting the Partition(s)
- hardware, installing, Installing the Hardware
- partitioning, Partitioning, Partitioning
- SCSI disk drive, Adding SCSI Disk Drives
- deploying, Making the Storage Usable
- disk quotas, Disk Quota Issues (see disk quotas)
- file system, File Systems, File System Basics
- /etc/mtab file, Viewing /etc/mtab
- /proc/mounts file, Viewing /proc/mounts
- access control, Access Control
- access times, Tracking of File Creation, Access, Modification Times
- accounting, space, Accounting of Space Utilized
- creation times, Tracking of File Creation, Access, Modification Times
- df command, using, Issuing the df Command
- directories, Hierarchical Directory Structure
- display of mounted, Seeing What is Mounted
- enabling access to, Enabling Storage Access
- EXT2, EXT2
- EXT3, EXT3
- file-based, File-Based Storage
- hierarchical directory, Hierarchical Directory Structure
- ISO 9660, ISO 9660
- modification times, Tracking of File Creation, Access, Modification Times
- mount point, Mount Points
- mounting, Mounting File Systems
- mounting with /etc/fstab file, Mounting File Systems Automatically with /etc/fstab
- MSDOS, MSDOS
- space accounting, Accounting of Space Utilized
- structure, directory, Directory Structure
- VFAT, VFAT
- file-related issues, File-Related Issues
- file access, File Access
- file sharing, File Sharing
- management of, Managing Storage, Storage Management Day-to-Day
- application usage, Excessive Usage by an Application
- excessive use of, Excessive Usage by a User
- free space monitoring, Monitoring Free Space
- growth, normal, Normal Growth in Usage
- user issues, Handling a User's Excessive Usage
- mass-storage devices
- access arm movement, Access Arm Movement
- access arms, Access Arms
- addressing concepts, Storage Addressing Concepts
- addressing, block-based, Block-Based Addressing
- addressing, geometry-based, Geometry-Based Addressing
- block-based addressing, Block-Based Addressing
- command processing, Command Processing Time
- cylinder, Cylinder
- disk platters, Disk Platters
- electrical limitations of, Mechanical/Electrical Limitations
- geometry, problems with, Problems with Geometry-Based Addressing
- geometry-based addressing, Geometry-Based Addressing
- head, Head
- heads, Data reading/writing device
- heads reading, Heads Reading/Writing Data
- heads writing, Heads Reading/Writing Data
- I/O loads, performance, I/O Loads and Performance
- I/O loads, reads, Reads Versus Writes
- I/O loads, writes, Reads Versus Writes
- I/O locality, Locality of Reads/Writes
- IDE interface, IDE/ATA
- industry-standard interfaces, Present-Day Industry-Standard Interfaces
- interfaces for, Mass Storage Device Interfaces
- interfaces, historical, Historical Background
- interfaces, industry-standard, Present-Day Industry-Standard Interfaces
- latency, rotational, Rotational Latency
- mechanical limitations of, Mechanical/Electrical Limitations
- movement, access arm, Access Arm Movement
- overview of, An Overview of Storage Hardware
- performance of, Hard Drive Performance Characteristics
- platters, disk, Disk Platters
- processing, command, Command Processing Time
- readers versus writers, Multiple Readers/Writers
- rotational latency, Rotational Latency
- SCSI interface, SCSI
- sector, Sector
- monitoring of, Monitoring Storage
- network-accessible, Network-Accessible Storage, Network-Accessible Storage Under Red Hat Enterprise Linux
- partition
- attributes of, Partition Attributes
- extended, Extended Partitions
- geometry of, Geometry
- logical, Logical Partitions
- overview of, Partitions/Slices
- primary, Primary Partitions
- type field, Partition Type Field
- type of, Partition Type
- patterns of access, Storage Access Patterns
- RAID-based (see RAID)
- removing, Removing Storage, Removing Storage
- /etc/fstab, removing from, Remove the Disk Drive's Partitions From /etc/fstab
- data, removing, Moving Data Off the Disk Drive
- erasing contents, Erase the Contents of the Disk Drive, Erase the Contents of the Disk Drive
- umount command, use of, Terminating Access With umount
- technologies, The Storage Spectrum
- backup storage, Off-Line Backup Storage
- cache memory, Cache Memory
- CPU registers, CPU Registers
- disk drive, Hard Drives
- hard drive, Hard Drives
- L1 cache, Cache Levels
- L2 cache, Cache Levels
- main memory, Main Memory -- RAM
- off-line storage, Off-Line Backup Storage
- RAM, Main Memory -- RAM
- technologies, advanced, Advanced Storage Technologies
- swapping, Swapping
- symmetric multiprocessing, Is Symmetric Multiprocessing Right for You?
- Sysstat, Red Hat Enterprise Linux-Specific Information, The Sysstat Suite of Resource Monitoring Tools
- system administration
- philosophy of, The Philosophy of System Administration
- automation, Automate Everything
- business, Know Your Business
- communication, Communicate as Much as Possible
- documentation, Document Everything
- planning, Plan Ahead
- resources, Know Your Resources
- security, Security Cannot be an Afterthought
- social engineering, risks of, The Risks of Social Engineering
- unexpected occurrences, Expect the Unexpected
- users, Know Your Users
- system performance monitoring, System Performance Monitoring
- system resources (see resources, system)
T
- tools
- groups, managing (see group, tools for managing)
- resource monitoring, Red Hat Enterprise Linux-Specific Information
- free, free
- GNOME System Monitor, The GNOME System Monitor -- A Graphical top
- iostat, The Sysstat Suite of Resource Monitoring Tools
- mpstat, The Sysstat Suite of Resource Monitoring Tools
- OProfile, OProfile
- sa1, The Sysstat Suite of Resource Monitoring Tools
- sa2, The Sysstat Suite of Resource Monitoring Tools
- sadc, The Sysstat Suite of Resource Monitoring Tools
- sar, The Sysstat Suite of Resource Monitoring Tools, The sar command
- Sysstat, The Sysstat Suite of Resource Monitoring Tools
- top, top
- vmstat, vmstat
- user accounts, managing (see user account, tools for managing)
- top command, Red Hat Enterprise Linux-Specific Information, top, Monitoring CPU Utilization on Red Hat Enterprise Linux
U
- UID, Usernames and UIDs, Groups and GIDs
- unexpected, preparation for, Expect the Unexpected
- user account
- access control, Access Control Information
- files controlling, Files Controlling User Accounts and Groups
- /etc/group, /etc/group
- /etc/gshadow, /etc/gshadow
- /etc/passwd, /etc/passwd
- /etc/shadow, /etc/shadow
- GID, Usernames and UIDs, Groups and GIDs
- home directory
- centralized, Home Directories
- management of, Managing User Accounts and Resource Access, Managing User Accounts, Managing Accounts and Resource Access Day-to-Day
- job changes, Job Changes
- new hires, New Hires
- terminations, Terminations
- password, Passwords
- aging, Password Aging
- big character set used in, Expanded Character Set
- longer, Longer Passwords
- memorable, Memorable
- personal information used in, Personal Information
- repeatedly used, The Same Password for Multiple Systems
- shortness of, Short Passwords
- small character set used in, Limited Character Set
- strong, Strong Passwords
- weak, Weak Passwords
- word tricks used in, Simple Word Tricks
- words used in, Recognizable Words
- written, Passwords on Paper
- permissions related to, User Accounts, Groups, and Permissions
- resources, management of, Managing User Resources
- shared data access, Who Can Access Shared Data
- system GIDs, Usernames and UIDs, Groups and GIDs
- system UIDs, Usernames and UIDs, Groups and GIDs
- tools for managing, User Account and Group Applications
- chage command, User Account and Group Applications
- chfn command, User Account and Group Applications
- chpasswd command, User Account and Group Applications
- passwd command, User Account and Group Applications
- useradd command, User Account and Group Applications
- userdel command, User Account and Group Applications
- usermod command, User Account and Group Applications
- UID, Usernames and UIDs, Groups and GIDs
- username, The Username
- changes to, Dealing with Name Changes
- collisions in naming, Dealing with Collisions
- naming convention, Naming Conventions
- user ID (see UID)
- useradd command, User Account and Group Applications
- userdel command, User Account and Group Applications
- usermod command, User Account and Group Applications
- username, The Username
- changing, Dealing with Name Changes
- collisions between, Dealing with Collisions
- naming convention, Naming Conventions
- users
- importance of, Know Your Users
V
- VFAT file system, VFAT
- virtual address space, Virtual Memory: The Details
- virtual memory (see memory)
- vmstat command, Red Hat Enterprise Linux-Specific Information, vmstat, Monitoring Bandwidth on Red Hat Enterprise Linux, Monitoring CPU Utilization on Red Hat Enterprise Linux, Red Hat Enterprise Linux-Specific Information
W
- watch command, free
- working set, The Working Set
- write permission, User Accounts, Groups, and Permissions