Copyrighted Material

Total Page:16

File Type:pdf, Size:1020Kb

Copyrighted Material 43_754889 bindex.qxp 12/27/05 7:22 PM Page 809 Index SYMBOLS AND NUMERICS A << (angle brackets), beginning here-document, 403–404 AbiWord application, 211 * (asterisk) accelerator module, QEMU program, 701–703 shell wildcard, 52–53 accelerators, using during installation, 10 wildcard in regular expressions, 277 ACCEPT target, netfilter program, 618 \ (backslash), line continuation in Apache access control, Apache web server, 453–456 configuration file, 448 access control lists. See ACLs {} (braces) Access files, 361 enclosing lists in pattern matching, 52–53 access_log file, 543 enclosing variables in shell scripts, 399 access.log file, 661 ^ (caret), start of line in regular expressions, 60–61, ACLs (access control lists) 276–277 for Cyrus, 491 : (colon), in vi commands, 308 for files and directories, 370–372 . (dot) for LDAP server, 653 dot files, 68–69 ACPI (Advanced Configuration and Power Interface), as source command, 397 disabling, 7, 27 wildcard in regular expressions, 276 acpi parameter, GRUB configuration file, 737 $ (dollar sign) Acrobat Reader, 356 end of line in regular expressions, 277 Acronis Disk Director, 384 end of line in vi, 303 acroread program, 297, 356 prefixing environment variables, 51 AddHandler directive, Apache, 457 = (equal sign), assignment in shell scripts, 398 address books, SLOX, 772–773 ! (exclamation point) Address record, DNS, 575, 579 executing command from history, 49 Address Resolution Protocol (ARP), 422–423 icon, 253 administrator account, LDAP, 639–640 > (greater than sign), redirecting output, 54 Adobe Acrobat Reader, 356 # (hash character), comment character, 61, 448 ADSL (asymmetric digital subscriber line) () (parentheses), enclosing expressions in shell configuring during installation, 36–37 scripts, 398 firewall for, 613 % (percent) command, vi, 309 Advanced Bash-Scripting Guide (Cooper), 145, 405 ? (question mark) Advanced Configuration and Power Interface (ACPI), vi command, 309 disabling, 7, 27 wildcard, 52–53 Advanced Linux Sound Architecture (ALSA), 43 / (slash) Advanced Research Projects Agency Network root partition, 20–21 (ARPANET), 156 vi command, 309 COPYRIGHTEDAivazian, MATERIAL Tigran (Linux Kernel 2.4 Internals), 147 [] (square brackets), enclosing ranges in pattern ALERT log level, 175 matching, 52–53 alias command, 395–396 _ (underline), environment variable, 50 .alias file, 395, 396 | (vertical bar), pipe, 54 aliases 0 (zero) command, vi, 303 Cyrus, for root’s mail, 492–493 64-bit architecture for enterprise hardware, 676–677 shell aliases, 395–396 type 82 (Linux swap) partitions, 86 SLOX users, 754–755 type 83 (Linux) partitions, 86 alias_maps parameter, Postfix, 473 Allman, Eric (sendmail), 479, 480 ALSA (Advanced Linux Sound Architecture), 43 alsaconf program, 43 43_754889 bindex.qxp 12/27/05 7:22 PM Page 810 810 Index ✦ A always-on server, Postfix, 476–477 ARP (Address Resolution Protocol), 422–423 AMD Opteron architecture, 677 ARP cache, 422–423 angle brackets (<<), beginning here-document, 403–404 arp command, 422 anonymous FTP server. See vsftpd program ARPANET (Advanced Research Projects Agency answering_machine module, YaST, 225 Network), 156 antiword command, 295, 355, 359 arrow keys, emacs, 313 Apache Software Foundation (ASF), 446, 460 Ascher, David (Learning Python), 408 Apache web server ASF (Apache Software Foundation), 446, 460 CGI and, 456–458 associations, file configuring, 447–453 emacs, 320–321 in enterprise architecture, 680 KDE, 207 group access, 455–456 asterisk (*) history of, 445–446 shell wildcard, 52–53 infrastructure using, 671 wildcard in regular expressions, 277 PHP and, 459–461 asymmetric digital subscriber line (ADSL) popularity of, 445 configuring during installation, 36–37 Prefork processing model, configuration for, 449 firewall for, 613 primary web site, configuration for, 450–452 a2ps command, 292 security for, 453–456 AUTH logging facility, 174 user access, 454–455 authentication. See also LDAP (Lightweight Directory uses of, 446–447 Access Protocol) virtual hosts, configuration for, 452–453 Apache web server, 453 web sites for, 151, 460 logging facility for, 174 Apache Week web site, 460 NIS (Network Information System) ApacheCon, 446 client, 599–601 apache2ctl configtest command, 448 compared to LDAP, 635 application layer definition of, 594 DoD model, 161 resources about, 594 OSI model, 158, 160 server, 594–599 apropos command, 137 when to use, 593–594 archives PAM (Pluggable Authentication Module) ark graphical tool for, 368–369 definition of, 649–651 cpio archives LDAP and, 642, 652 converting software packages to, 367 Samba and, 500 creating, 366 using for Squid user authentication, 659–661 unpacking, 366, 367–368 Samba client, 500 Debian packages as, 363 Samba server, 512–515, 516–517 definition of, 363 Squid web proxy server, 659–661 destination directory for, 364 authoritative DHCP server, 559 pax archives, 75–76, 367–368 authorization, Apache web server, 453 rpm packages as, 363 AUTHPRIV logging facility, 174 tar archives autoinstallation, YaST, 260–265 bzip2 compression with, 365 AutoYaST copying directory trees using, 366 documentation, 149–150, 265 creating, 364 including scripts in, 264 gzip compression with, 364 installation using, 5, 260–261 listing files in, 364 resources about, 149–150, 265 source code tar archives, 365–366 XML control file for, 261–264 unpacking, 365, 367–368 AutoYaST documentation (Nashif), 149–150, 265 types of, 363 autoyast module, YaST, 226, 261 zip archives, 367 .avi files, 358 arguments for shell scripts, 400–401 awk scripting language, 284–286 ark graphical tool, 368–369 43_754889 bindex.qxp 12/27/05 7:22 PM Page 811 Index ✦ B 811 B definition of, 63 backing up files. See archives file ownership and permissions for, 64–68 backslash (\), line continuation in Apache listing, 63 configuration file, 448 help, 55 Backspace key pattern matching, 52–53 emacs, 313 pipes, 54–55 vi, 302, 310 redirecting input and output, 54–55 backup module, YaST, 224 users Bacon, Jono (Linux Desktop Hacks), 806 adding during installation, 37–38 Base address, ifconfig output, 413 creating, 63–64 basedn, configuring, 639–640, 749 definition of, 62–63 bash command, 397 file ownership and permissions for, 64–68 Bash Guide for Beginners (Garrels), 145, 405 listing, 63 bash scripts. See shell scripts preferences for, configuring, 68–69 bash shell receiving root user mail, 38 command completion, 49 wildcards, 52–53 command history, 49 .bashrc file, 50, 51, 68, 69 connecting commands, 54–55 bashrc file, 50 directories basic input-output system (BIOS), accessing while changing, 58 booting, 5, 110 deleting, 57–58 Bcast, ifconfig output, 413 links to, 58–59 Beazley, David (Python Essential Reference), 408 listing files in, 56 Beekmans, Gerard (Linux From Scratch), 146 making, 58 Beginning Linux Programming, Third Edition (Matthew, environment variables Stones, Cox), 332 definition of, 49 Beginning Perl (Cozens, Wainwright), 409 displaying, 49–50 Behlendorf, Brian (Apache web server), 445 referring to value of, 51 Berkeley Internet Name Daemon DNS server. See BIND setting, 50–51 DNS server unsetting, 52 binary files features of, 48–55 converting to text file, 297 files displaying contents of, 271–272 concatenating, 59 splitting into equally-sized parts, 280 copying, 56–57 binary kernel packages, 725 deleting, 57–58 binary RPMs. See software packages editing, 61–62 BIND (Berkeley Internet Name Daemon) DNS server finding, 61 configuring, 572–575 links to, 58–59 definition of, 569 listing, 56 testing, 573–575 moving (renaming), 57 binutils package, 216 ownership and permissions for, 64–68 BIOS (basic input-output system), accessing while searching contents of, 60–61 booting, 5, 110 viewing one screen at a time, 59–60 Blackbox window manager, 212, 213–214 viewing start or end of, 60 blade architecture for enterprise hardware, 677–678 filesystems BLUE BOOK, 528 mounted, listing, 69, 99, 585 bluefish HTML editor, 357 mounting, 69–70, 98–104, 583–587 Bluetooth, 440–442 unmounting, 70 bluetooth module, YaST, 223 groups bochs project, 694, 698–699 creating, 63–64 Book of Webmin (Cooper), 394 43_754889 bindex.qxp 12/27/05 7:22 PM Page 812 812 Index ✦ B books. See also documentation Python Essential Reference (Beazley), 408 Advanced Bash-Scripting Guide (Cooper), 145 sed & awk (Dougherty, Robbins), 286 Bash Guide for Beginners (Garrels), 145 SUSE Linux and Novell Open Enterprise Server Beginning Linux Programming, Third Edition Administrator’s Handbook (Latimer, Harris), (Matthew, Stones, Cox), 332 796 Beginning Perl (Cozens, Wainwright), 409 Wicked Cool Shell Scripts (Taylor), 404 Book of Webmin (Cooper), 394 Windows+BSD+Linux Installation Guide (Ghosh), CUPS: Common UNIX Printing System (Sweet), 545 146 Custom Linux: A Porting Guide—Porting LinuxPPC to books package, LDP (Linux Documentation Project), a Custom SBC (Erlich), 146 147 EVMS User Guide (Lorenz, Goodreau, Smith), 146 boot floppies, creating, 228–229 Expanding Choice: Moving to Linux and Open Source Boot from Hard Disk, boot option, 7 with Novell Open Enterprise Server boot loader (Williams, Clegg, Dulaney), 796 checking, 375–376 Guide to Managing Media and Public Relations in the configuration, creating and installing, 377 Linux Community (Rose), 146 configuring, 238–241 Introduction to Linux: A Hands on Guide (Garrels), execution of, while booting, 110–111, 119–124 145 GRUB (Grand Unified Boot Loader) boot loader, LDP Author Guide (Komarinski, Godoy, Merrill, 122–124 Hogbin), 146 ISOLINUX boot loader, 110, 111 Learning Perl (Schwartz, Phoenix), 409 LILO (Linux
Recommended publications
  • Open Source As an Alternative to Commercial Software
    OPEN-SOURCE AS AN ALTERNATIVE TO COMMERCIAL SOFTWARE Final Report 583 Prepared by: Sean Coleman 2401 E Rio Salado Pkwy. #1179 Tempe, Arizona 85281 March 2009 Prepared for: Arizona Department of Transportation 206 South 17th Avenue Phoenix, Arizona 85007 in cooperation with U.S. Department of Transportation Federal Highway Administration The contents of this report reflect the views of the authors who are responsible for the facts and the accuracy of the data presented herein. The contents do not necessarily reflect the official views or policies of the Arizona Department of Transportation or the Federal Highway Administration. This report does not constitute a standard, specification, or regulation. Trade or manufacturers’ names which may appear herein are cited only because they are considered essential to the objectives of the report. The U.S. Government and the State of Arizona do not endorse products or manufacturers. TECHNICAL REPORT DOCUMENTATION PAGE 1. Report No. 2. Government Accession No. 3. Recipient’s Catalog No. FHWA-AZ-09-583 4. Title and Subtitle 5. Report Date: March, 2009 Open-Source as an Alternative to Commercial Software 6. Performing Organization Code 7. Authors: 8. Performing Organization Sean Coleman Report No. 9. Performing Organization Name and Address 10. Work Unit No. Sean Coleman 11. Contract or Grant No. 2401 E Rio Salado Pkwy, #1179 SPR-583 Tempe, AZ 85281 12. Sponsoring Agency Name and Address 13. Type of Report & Period Arizona Department of Transportation Covered 206 S. 17th Ave. Phoenix, AZ 85007 14. Sponsoring Agency Code Project Managers: Frank DiBugnara, John Semmens, and Steve Rost 15. Supplementary Notes 16.
    [Show full text]
  • X Window System Version 6.4.2 Release Notes
    X Window System Version 6.4.2 Release Notes October 2000 0890298-6.4.2 READREAD MEME BEFOREBEFORE INSTALLINGINSTALLING THISTHIS PRODUCTPRODUCT Copyright Copyright 2000 by Concurrent Computer Corporation. All rights reserved. This publication or any part thereof is intended for use with Concurrent Computer Corporation products by Concurrent Computer Corporation personnel, customers, and end–users. It may not be reproduced in any form without the written permission of the publisher. Disclaimer The information contained in this document is subject to change without notice. Concurrent Computer Corporation has taken efforts to remove errors from this document, however, Concurrent Computer Corporation’s only liability regarding errors that may still exist is to correct said errors upon their being made known to Concurrent Computer Corporation. Concurrent Computer Corporation assumes no responsibility for the use or reliability of software if used on equipment that is not supplied by Concurrent Computer Corporation. License The software described in this document is furnished under a license, and it can be used or copied only in a manner permitted by that license. Any copy of the described software must include any copyright notice, trademarks or other legends or credits of Concurrent Computer Corporation and/or its suppliers. Title to and ownership of the described software and any copies thereof shall remain in Concurrent Computer Corporation and/or its suppliers. The licensed software described herein may contain certain encryptions or other devices which may prevent or detect unauthorized use of the Licensed Software. Temporary use permitted by the terms of the License Agreement may require assistance from Concurrent Computer Corporation.
    [Show full text]
  • (GNU Mailman) Mailing Lists
    Usability and efficiency improvements of the (GNU Mailman) mailing lists Rudy Borgstede ([email protected]) System and Network Engineering University of Amsterdam July 5, 2008 Versions Version Date Changes 0.0.1 18 May 2008 First setup of the report 0.0.2 9 June 2008 Release Candidate 1 of the project proposal 0.1.1 17 June 2008 A rewrite of the document because of the change of project result. The project will deliver an advice rather then a product like a patch or add-on for GNU Mailman. This means that the report becomes an consultancy report instead of a project proposal. 1.0.0 30 June 2008 Final version 1 of the report. 1.0.1 1 July 2008 A spelling check of the report. 1.0.2 5 July 2008 Extending the conclusion en future work chapters. Participants Name Contact Information University of Amsterdam Rudy Borgstede (Student) [email protected] Cees de Laat (Supervisor) [email protected] NLnet Michiel Leenaars (Supervisor) [email protected] Abstract This report is the result of a research project of four weeks at the NLnet Foundation1 in Amster- dam. The NLnet Foundation is a foundation who financially supports the open-source community and their projects. The purpose of the project is to improve the usability and the administration of the mailing lists (of the foundation) and giving a more clear view on mailing list server software to anyone who is interested in using mailing list server software or developing new mail or mail- ing list server software. The report describes the research of the usability of several open-source mailing list server software for scalable environments with several well known mail servers.
    [Show full text]
  • No Slide Title
    Embedded Systems Class overview, Embedded systems introduction, Raspberry Pi, Linux OS, X-windows, Window manager, Desktop Environment Prof. Myung-Eui Lee (A-405) [email protected] Embedded Systems 1-1 KUT Embedded Systems Class Overview ⚫ Embedded Systems Class Operations » Past : 3 (credit) -2 (lecture) -2 (practice) » Now : 3 (credit) -1 (lecture) -1 (design) -2 (practice) » Future : 4 (credit) -2 (lecture) -2 (design) -0 (practice) ⚫ PBL : Problem or Project Based Learning » Problem : 4 problems » Project : 2 projects ⚫ 4 hours Class » 1 hour (lecture) + 1 hour (lecture or design) + 2 hours (practice) ▪ 1 hour (lecture) + 1 hour (lecture or design) : me ▪ 2 hours (practice) : Ph.D Park ⚫ Target Board : Raspberry Pi 3 » ARM + Linux Embedded Systems 1-2 KUT Embedded Systems Class Overview ⚫ Class Grade : » Mid Term Exam : 15 % [30 %] » Final Term Exam : 15 % [30 %] » Peer Evaluation : 10 % (Project #1 : 5% + Project #2 : 5%) » Project #1 Evaluation : 10 % » Project #2 Evaluation : 15 % » Experimental Lab. : 20 % [20 %] » Class Participation : 15 % [20 %] » Social Problem (Project #2) Optional : +5 % ⚫ Lecture Notes: http://microcom.koreatech.ac.kr Embedded Systems 1-3 KUT Embedded Systems ⚫ Definition of embedded system » Embedded system = H/W + S/W ▪ H/W = CPU + Memory + I/O ▪ S/W = Device driver + OS (or non OS) + Application program » Any electronic system that uses a CPU chip, but that is not a general-purpose workstation, desktop or laptop computer. » In embedded systems, the software typically resides in memory device, such as a flash memory or ROM chip. In contrast to a general-purpose computer that loads its programs into RAM each time. » Sometimes, single board and rack mounted general-purpose computers are called "embedded computers" if used to control.
    [Show full text]
  • The Virtualization Cookbook for SLES 10
    z/VM and Linux on IBM System z: The Virtualization Cookbook for z/VM 6.2 RHEL 6.2 and SLES 11 SP2 A “cookbook” for installing and customizing z/VM 6.2, RHEL 6.2 and SLES 11 SP2 on the mainframe Michael MacIsaac Brad Hinson Marian Gasparovic . Contents Preface . xi Parts of this book . xi Summary of changes in the July 2012 version . xi Summary of changes in the January 2012 version . xii Conventions . xiii Operating system releases used . xiii The team that wrote this book . xiii Special thanks . xiii Comments welcome. xiv Part 1. Introduction and z/VM . 1 Chapter 1. Introduction to z/VM and Linux . 1 1.1 What is virtualization? . 3 1.2 A philosophy adopted in this book . 4 1.3 Choices and decisions made in this book . 4 1.4 Single System Image design. 4 1.5 Infrastructure design . 5 1.6 Usability tests performed. 6 Chapter 2. Planning . 7 2.1 Planning for an SSI and LGR . 7 2.1.1 Hints and Tips . 7 2.1.2 Need for ECKD DASD . 9 2.2 Bill of materials . 9 2.2.1 Hardware resources . 9 2.2.2 Software resources . 9 2.2.3 Networking resources . 10 2.3 z/VM conventions . 10 2.3.1 Volume labeling convention . 10 2.3.2 Backup file naming convention . 11 2.3.3 The command retrieve convention . 11 2.4 Disk planning. 12 2.5 Memory planning. 13 2.6 Password planning . 13 2.7 Planning worksheets . 14 2.7.1 z/VM resources used in this book .
    [Show full text]
  • Analysis and Performance Optimization of E-Mail Server
    Analysis and Performance Optimization of E-mail Server Disserta¸c~aoapresentada ao Instituto Polit´ecnicode Bragan¸capara cumprimento dos requisitos necess´arios `aobten¸c~aodo grau de Mestre em Sistemas de Informa¸c~ao,sob a supervis~aode Prof. Dr. Rui Pedro Lopes. Eduardo Manuel Mendes Costa Outubro 2010 Preface The e-mail service is increasingly important for organizations and their employees. As such, it requires constant monitoring to solve any performance issues and to maintain an adequate level of service. To cope with the increase of traffic as well as the dimension of organizations, several architectures have been evolving, such as cluster or cloud computing, promising new paradigms of service delivery, which can possibility solve many current problems such as scalability, increased storage and processing capacity, greater rationalization of resources, cost reduction, and increase in performance. However, it is necessary to check whether they are suitable to receive e-mail servers, and as such the purpose of this dissertation will concentrate on evaluating the performance of e-mail servers, in different hosting architectures. Beyond computing platforms, was also analze different server applications. They will be tested to determine which combinations of computer platforms and applications obtained better performances for the SMTP, POP3 and IMAP services. The tests are performed by measuring the number of sessions per ammount of time, in several test scenarios. This dissertation should be of interest for all system administrators of public and private organizations that are considering implementing enterprise wide e-mail services. i Acknowledgments This work would not be complete without thanking all who helped me directly or indirectly to complete it.
    [Show full text]
  • Bonus Chapter B Programming for X
    Bonus Chapter B Programming for X In this chapter and the next, we’ll take a look at writing programs to run in the usual Linux graphical environment, the XWindow System or X, http://www.x.org/Xorg.html. Modern UNIX systems and nearly all Linux distributions are shipped with a version of X. We’ll be concentrating on the programmer’s view of X, and we’ll assume that you are already comfortable with configuring, running, and using X on your system. We’ll cover ❑ X concepts ❑ X Windows managers ❑ X programming model ❑ Tk—its widgets, bindings, and geometry managers In the next chapter, we’ll move on to the GTK+ toolkit, which will allow us to program user interfaces in C for the GNOME system. What Is X? X was created at MIT as a way of providing a uniform environment for graphical programs. Nowadays it should be fair to assume that if you’ve used computers, you’ve come across either Microsoft Windows, X, or Apple MacOS before, so you’ll be familiar with the general concepts underlying a graphical user interface, or GUI. Unfortunately, although a Windows user might be able to navigate around the Mac interface, it’s a different story for programmers. Each windowing environment on each system is programmed differently. The ways that the display is handled and the programs communicate with the user are different. Although each system provides the programmer with the ability to open and manipulate windows on the screen, the functions used will be different. Writing applications that can run on more than one system (without using additional toolkits) is a daunting task.
    [Show full text]
  • Common Desktop Environment 1.0 Programmer's Overview
    Common Desktop Environment 1.0 Programmer’s Overview This edition of the Common Desktop Environment Advanced User’s and System Administrator’s Guide applies to AIX Version 4.2, and to all subsequent releases of these products until otherwise indicated in new releases or technical newsletters. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the United States Government is subject to the restrictions set forth in DFARS 252.227-7013 (c)(1)(ii) and FAR 52.227-19. THIS PUBLICATION IS PROVIDED “AS IS” WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. The code and documentation for the DtComboBox and DtSpinBox widgets were contributed by Interleaf, Inc. Copyright 1993, Interleaf, Inc. Copyright 1993, 1994, 1995 Hewlett-Packard Company Copyright 1993, 1994, 1995 International Business Machines Corp. Copyright 1993, 1994, 1995 Sun Microsystems, Inc. Copyright 1993, 1994, 1995 Novell, Inc. All rights reserved. This product and related documentation are protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form by any means without prior written authorization. All rights reserved. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the United States Government is subject to the restrictions set forth in DFARS 252.227-7013 (c)(1)(ii) and AR 52.227-19. Part 1 —Common Desktop Environment Architectural Overview 1. Architectural Overview. 1 Conceptual Overview. 1 Data Interaction GUIs. 2 Multiuser Collaboration. 3 Desktop Management.
    [Show full text]
  • Abkürzungs-Liste ABKLEX
    Abkürzungs-Liste ABKLEX (Informatik, Telekommunikation) W. Alex 1. Juli 2021 Karlsruhe Copyright W. Alex, Karlsruhe, 1994 – 2018. Die Liste darf unentgeltlich benutzt und weitergegeben werden. The list may be used or copied free of any charge. Original Point of Distribution: http://www.abklex.de/abklex/ An authorized Czechian version is published on: http://www.sochorek.cz/archiv/slovniky/abklex.htm Author’s Email address: [email protected] 2 Kapitel 1 Abkürzungen Gehen wir von 30 Zeichen aus, aus denen Abkürzungen gebildet werden, und nehmen wir eine größte Länge von 5 Zeichen an, so lassen sich 25.137.930 verschiedene Abkür- zungen bilden (Kombinationen mit Wiederholung und Berücksichtigung der Reihenfol- ge). Es folgt eine Auswahl von rund 16000 Abkürzungen aus den Bereichen Informatik und Telekommunikation. Die Abkürzungen werden hier durchgehend groß geschrieben, Akzente, Bindestriche und dergleichen wurden weggelassen. Einige Abkürzungen sind geschützte Namen; diese sind nicht gekennzeichnet. Die Liste beschreibt nur den Ge- brauch, sie legt nicht eine Definition fest. 100GE 100 GBit/s Ethernet 16CIF 16 times Common Intermediate Format (Picture Format) 16QAM 16-state Quadrature Amplitude Modulation 1GFC 1 Gigabaud Fiber Channel (2, 4, 8, 10, 20GFC) 1GL 1st Generation Language (Maschinencode) 1TBS One True Brace Style (C) 1TR6 (ISDN-Protokoll D-Kanal, national) 247 24/7: 24 hours per day, 7 days per week 2D 2-dimensional 2FA Zwei-Faktor-Authentifizierung 2GL 2nd Generation Language (Assembler) 2L8 Too Late (Slang) 2MS Strukturierte
    [Show full text]
  • Oreilly Sendmail 4Th Edition.Pdf
    sendmail Other resources from O’Reilly Related titles sendmail 8.13 Companion DNS & Bind Cookbook™ sendmail Cookbook™ DNS and Bind TCP/IP Network Administration oreilly.com oreilly.com is more than a complete catalog of O’Reilly books. You’ll also find links to news, events, articles, weblogs, sample chapters, and code examples. oreillynet.com is the essential portal for developers interested in open and emerging technologies, including new platforms, pro- gramming languages, and operating systems. Conferences O’Reilly brings diverse innovators together to nurture the ideas that spark revolutionary industries. We specialize in document- ing the latest tools and systems, translating the innovator’s knowledge into useful skills for those in the trenches. Visit con- ferences.oreilly.com for our upcoming events. Safari Bookshelf (safari.oreilly.com) is the premier online refer- ence library for programmers and IT professionals. Conduct searches across more than 1,000 books. Subscribers can zero in on answers to time-critical questions in a matter of seconds. Read the books on your Bookshelf from cover to cover or sim- ply flip to the page you need. Try it today for free. FOURTH EDITION sendmail Bryan Costales, George Jansen, and Claus Aßmann with Gregory Neil Shapiro Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo sendmail, Fourth Edition by Bryan Costales, George Jansen, and Claus Aßmann with Gregory Neil Shapiro Copyright © 2008 Bryan Costales, George Jansen, and Claus Aßmann. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use.
    [Show full text]
  • 007-2006-100 Contributors
    Indigo Magic™ Desktop Integration Guide Document Number 007-2006-100 CONTRIBUTORS Written by Beth Fryer, Jed Hartman, Ken Jones, and Pete Sullivan Illustrated by Beth Fryer and Seth Katz Edited by Christina Cary Production by Derrald Vogt, Cindy Stief, and Linda Rae Sande Engineering contributions by Bob Blean, Susan Dahlberg, Susan Ellis, John Krystynak, Chandra Pisupati, Jack Repenning, CJ Smith, Dave Story, Steve Strasnick, Rebecca Underwood, Steve Yohanan, and Betsy Zeller St Peter’s Basilica image courtesy of ENEL SpA and InfoByte SpA. Disk Thrower image courtesy of Xavier Berenguer, Animatica. © Copyright 1994, 1995, 1996 Silicon Graphics, Inc.— All Rights Reserved The contents of this document may not be copied or duplicated in any form, in whole or in part, without the prior written permission of Silicon Graphics, Inc. RESTRICTED RIGHTS LEGEND Use, duplication, or disclosure of the technical data contained in this document by the Government is subject to restrictions as set forth in subdivision (c) (1) (ii) of the Rights in Technical Data and Computer Software clause at DFARS 52.227-7013 and/or in similar or successor clauses in the FAR, or in the DOD or NASA FAR Supplement. Unpublished rights reserved under the Copyright Laws of the United States. Contractor/manufacturer is Silicon Graphics, Inc., 2011 N. Shoreline Blvd., Mountain View, CA 94039-7311. Silicon Graphics, the Silicon Graphics logo, and IRIS are registered trademarks and IRIS, IRIS GL, IRIS IM, IRIS InSight, IRIS ViewKit, IRIX, GoldenGate, IconSmith, Indigo Magic, the Graphics Library, OpenGL, Open Inventor, and RapidApp are trademarks of Silicon Graphics, Inc. Apple is a registered trademark and Apple Quicktime is a trademark of Apple Computer, Inc.
    [Show full text]
  • An Introduction to X Window Application Development
    Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 1992-03 An introduction to X Window application development. Rust, David Michael Monterey, California. Naval Postgraduate School http://hdl.handle.net/10945/23933 FV KNOX LIBRARY •Ud SCHOOL SivAL POSTGRADUATE SoNTEHEV.CAUFORN.AG^^ CURITY CLASSIFICATION OF THIS PAGE REPORT DOCUMENTATION PAGE 1b. RESTRICTIVE MARKINGS REPORT SECURITY CLASSIFICATION UNCLASSIFIED a SECURITY CLASSIPICAT I6M AUTH6RITV 3. bisTRiBuTi6N7AVAlLABiUTY 6P REP5RT Approved for public release; b. dECLAssIFICATIoN/doWNgRADINg SCHEDULE distribution is unlimited PERFORMING ORGANIZATION REP6RT NUM&ER(S) 5. M6niT6Ring6Rgani2aTi6n rep6rT numbER(S) *. NAME 6F PERFORMING 6R6ANIZATI6N 6b OFFICE SYMBOL 7a. NAME 6E M6NIT6R1NG ORGANIZATION vdministrative Sciences Department (if applicable) Naval Postgraduate School Javal Postgraduate School AS :. ADDRESS (City, State, and ZIP Code) 7b. ADDRESS (City, State, and ZIP Code) /lonterey, CA 93943-5000 Monterey, CA 93943-5000 NAME OF FUNDING/SPONSORING 8b. OFFICE SYMBOL g PROCURE M E N T I NST RUMEN T ID E N T I FI CATION NUMBE R ORGANIZATION (if applicable) 6. ADDRESS (City, State, and ZIP Code) 10. SOURCE OF FUNDING NUMBERS PROGRAM 1 PR6JECT TTa^R" WoRkUNiT ELEMENT NO. NO. NO. ACCESSION NO. 1 . TITLE (Include Security Classification) ^N INTRODUCTION TO X WINDOW APPLICATION DEVELOPMENT (U) 2 PERSONAL AUTHOR(S) lust, David M. 3a. type of report 13b. time covered 14. DATE OF REPORT (Year, Month, Day) 16. PAGE COUNT Master's Thesis from 10/90 to 03/92 1992, March, 23 70 supplementary notation 6 The views expressed in this ^sis ^ those of the author md do not reflect the official policy or position of the Department of Defense or the United States Government.
    [Show full text]