12.07.2015 Views

Red Hat Enterprise Linux 5 Administration Unleashed

Red Hat Enterprise Linux 5 Administration Unleashed

Red Hat Enterprise Linux 5 Administration Unleashed

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

ContentsxvStarting and Stopping the Daemon..................................................515Analyzing the Records ...................................................................516Generating Reports ...............................................................516Searching the Records............................................................518Tracing a Process with Audit...........................................................521Summary ....................................................................................522Appendixes 523A Installing Proprietary Kernel Modules 525Installing Proprietary Modules ........................................................526Installing the nVidia Display Driver.................................................526Recognizing a Tainted Kernel..........................................................528B Creating Virtual Machines 529Virtualization System Requirements.................................................530Installing Virtualization .................................................................531Setting Up the VM and Installing the Guest OS .................................532With the Virtual Machine Manager..........................................533With virt-install....................................................................539Introducing the virsh Command.....................................................539Starting and Stopping the Virtual Machine .......................................540Modifying Dedicated Resources.......................................................543Performing Additional Actions........................................................544Managing VMs with the xm Utility .................................................545C Preventing Security Breaches with ExecShield 547How ExecShield Works ..................................................................547Determining Status of ExecShield ....................................................548Disabling ExecShield .....................................................................549D Troubleshooting 551Installation and Configuration Troubleshooting ................................551OS Core Concepts Troubleshooting .................................................553System <strong>Administration</strong> Troubleshooting ...........................................554Network Troubleshooting ..............................................................555Monitoring and Tuning Troubleshooting ..........................................556Security Troubleshooting ...............................................................558Index 559

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!