This email was mistakenly delivered to Positive Telecom, Inc. and is being forwarded to the intended recipient as a courtesy. Administrator [EMAIL PROTECTED] ----------------------------------------------------------------- [EMAIL PROTECTED] wrote: > I noticed this while looking around "Unix guru universe" > > http://www.ugu.com/ > > "Introduction to Linux Systems Administration" > > http://www.infocom.cqu.edu.au/Units/aut99/85321/Resources/Print_Resour > ces/Textbook/ > > It's a textbook used in "85321, Systems Administration is a third > year core computing unit in the Bachelor of Information Technology > degree offered by the Faculty of Informatics and Communication at > Central Queensland University." > > Overview from webpage follows > > 1: The What, Why and How of Sys Admin > > The aim of this chapter is to provide you with some > background to Systems Administration so that you have > some idea of why you are reading this and what you may > learn via this text. > > 2: Information Sources > > This chapter provides an introduction to some of the > useful sources of information for a Systems > Administrator. > > 3: Using UNIX > > As a Systems Administrator you will need to know how to > use UNIX. This chapter introduces basic knowledge about > using including file permissions, controlling processes, > some UNIX commands and the manual pages. > > 4: The File Hierarchy > > All information on a UNIX system is stored in files > which are in turned organised into directories. This > chapter introduces you to the structure of the Linux > file hierarchy and answers such questions as what and > where you can find things within the file hierarchy. > > 5: Processes and Files > > This chapter introduces the UNIX concepts of files and > processes. > > 6: The Shell > > The primary command-line interface used by Systems > Administrators to manage a UNIX machine is provided by > the shell. The shell is a program of which there are > many different types. This chapter takes a close look at > the services and operation of the Bourne shell family. > > 7: Text Manipulation > > Creating, searching and manipulating text-based data is > a major task for many computing professionals. This > chapter introduces the concepts and tools provided by > UNIX to perform text manipulation. > > 8: Shell Programming > > Shell programs are used by Systems Administrators to > perform tasks and also as part of the startup of a UNIX > computer. This chapter shows how to write and debug > shell programs. > > 9: Users > > Being a multi-user operating system UNIX must record > information about the different users. The Systems > Administrator is expected to setup, observe and maintain > this information. This chapter examines what information > is stored, how it is used and what tasks a Systems > Administrator needs to perform with this information. > > 10: Managing File Systems > > Making sure that information stored on disk drives is > safe is a major task of a Systems Administrator. This > chapter introduces the low level knowledge required to > understand how UNIX stores information onto disks. > > 11: Backups > > Disks fail. So backups are required. This chapter > introduces the basic concepts behind backups. > > 12: Startup and Shutdown > > A complex operating system like UNIX/Linux just doesn't > start and stop automatically. There are quite complex > steps which must be completed when such a system starts > and stops. This chapter introduces these steps. > > 13: The Kernel > > This chapter examines the features provided by the Linux > kernel and the tasks a Systems Administrator must > perform with the kernel. > > 14: Observation, Automation and Logging > > Amongst the many tasks a Systems Administrator must > automate keeping an eye on their system is one of the > most important. This chapter examines the UNIX tools > provided to observe the system and to automate tasks. > > 15: Networks: The Connection > > The first step in using a computer on the network is > making the connection. This chapter provides what you > need to know in order to connect a Linux system to the > network. > > 16: Networks: Applications > > Once connected to a network there is a large array of > applications and daemons which need to be configured and > maintained. This chapter examines the configuration of > important network services on a Linux computer. > > 17: Security > > Maintaining the security of a system is an important > task. This chapter provides a basic introduction to > security on a Linux computer. > > Older Chapters > > The remaining chapters of the 85321 text have not been > updated in recent memory. They are included here but, be > warned, must of the content is likely to be wrong. > > Chapter 18, Terminals, modems and serial lines > Chapter 19, Printers > > Review Questions and Exercises > > ==================================================== > > regards > > Rowan > > Rowan Brownlee > State Library of NSW > Macquarie St. Sydney 2000 > > mailto:[EMAIL PROTECTED] > > ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ > > "The island of Java lies just north of Western Australia. There > you will find an interesting trophobiosis between mealy bugs -- > who eat shrubs and trees -- and their host ants -- who live off > the honeydew produced by the mealy bugs. When the time > comes to move on, the mealy bugs climb aboard the backs of > the wrangling ants and get herded to fresh pastures. This mutual > partnership thus continually opens up new territory." > > http://www.dinkumware.com/ > > ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
