Chapter 10: Managing Services 33 ...........................................................................................................................
Section 10.1: Diagnosing a problem with a service 33 ..................................................................................................
Section 10.2: Starting and Stopping Services 33 ...........................................................................................................
Section 10.3: Getting the status of a service 34 .............................................................................................................
Chapter 11: Modifying Users 35 ..................................................................................................................................
Section 11.1: Setting your own password 35 ...................................................................................................................
Section 11.2: Setting another user's password 35 ..........................................................................................................
Section 11.3: Adding a user 35 ..........................................................................................................................................
Section 11.4: Removing a user 35 ....................................................................................................................................
Section 11.5: Removing a user and its home folder 35 .................................................................................................
Section 11.6: Listing groups the current user is in 35 .....................................................................................................
Section 11.7: Listing groups a user is in 35 ......................................................................................................................
Chapter 12: LAMP Stack 36 ...........................................................................................................................................
Section 12.1: Installing LAMP on Arch Linux 36 ...............................................................................................................
Section 12.2: Installing LAMP on Ubuntu 37 ...................................................................................................................
Section 12.3: Installing LAMP stack on CentoOS 38 .......................................................................................................
Chapter 13: tee command 40 ......................................................................................................................................
Section 13.1: Write output to stdout, and also to a file 40 .............................................................................................
Section 13.2: Write output from the middle of a pipe chain to a file and pass it back to the pipe 40 .....................
Section 13.3: write the output to multiple files 40 ..........................................................................................................
Section 13.4: Instruct tee command to append to the file 40 .......................................................................................
Chapter 14: Secure Shell (SSH) 42 ............................................................................................................................
Section 14.1: Connecting to a remote server 42 .............................................................................................................
Section 14.2: Installing OpenSSH suite 42 .......................................................................................................................
Section 14.3: Configuring an SSH server to accept connections 43 ............................................................................
Section 14.4: Passwordless connection (using a key pair) 43 ......................................................................................
Section 14.5: Generate public and private key 43 .........................................................................................................
Section 14.6: Disable ssh service 43 ................................................................................................................................
Chapter 15: SCP 45 ............................................................................................................................................................
Section 15.1: Secure Copy 45 ............................................................................................................................................
Section 15.2: Basic Usage 45 ...........................................................................................................................................
Chapter 16: GnuPG (GPG) 46 ........................................................................................................................................
Section 16.1: Exporting your public key 46 ......................................................................................................................
Section 16.2: Create and use a GnuPG key quickly 46 ..................................................................................................
Chapter 17: Network Configuration 47 ..................................................................................................................
Section 17.1: Local DNS resolution 47 ..............................................................................................................................
Section 17.2: Configure DNS servers for domain name resolution 47 ........................................................................
Section 17.3: See and manipulate routes 47 ..................................................................................................................
Section 17.4: Configure a hostname for some other system on your network 48 ....................................................
Section 17.5: Interface details 49 .....................................................................................................................................
Section 17.6: Adding IP to an interface 50 ......................................................................................................................
Chapter 18: Midnight Commander 52 .....................................................................................................................
Section 18.1: Midnight Commander function keys in browsing mode 52 ....................................................................
Section 18.2: Midnight Commander function keys in file editing mode 52 .................................................................
Chapter 19: Change root (chroot) 54 ......................................................................................................................
Section 19.1: Requirements 54 .........................................................................................................................................
Section 19.2: Manually changing root in a directory 54 ...............................................................................................
Section 19.3: Reasons to use chroot 55 ..........................................................................................................................
Chapter 20: Package Managers 56 ..........................................................................................................................