|
Published:
July 11, 2018

Linux All-In-One For Dummies

Overview

Linux is for everyone!

Linux All-in-One For Dummies breaks down the ever-popular operating system to its basics and trains users on the art of Linux. This handy reference covers all the latest updates and operating system features. It presents content on Linux desktops, applications, and more. With eight books in one, you’ll have access to the most comprehensive overview of Linux around. Explore the inner workings of Linux machines, so you’ll know Linux front to back. This all-inclusive handbook also walks you through solving Linux problems—complete with hands-on examples—so you’ll be a Linux whiz before you know it.

  • Get familiar with Linux as you install and customize the operating system
  • Learn how to navigate the file system, use the Linux shell, and get online
  • Become a Linux guru with server hosting, scripting, and security how-tos
  • Study for your Linux certification by using this complete guide as your reference

This book is a massive source of support for beginning and intermediate Linux users, as well as those looking to brush up on their knowledge for certification. And, thanks to the signature Dummies approach, it’s also a lot of fun.

Read More

About The Author

Richard Blum has more than 30 years’ experience in the IT industry working as a systems and network administrator. He is an online instructor for Linux and programming courses and is the author of Linux Command Line and Shell Scripting Bible, Linux Essentials, and Linux For Dummies.

Sample Chapters

linux all-in-one for dummies

CHEAT SHEET

Linux can fulfill almost any need you have for the operating system on a desktop computer, but you must be able to tell it what you want to do in a way that it understands. You need to know common commands and how to access the help pages.Common Linux commands Command Description cat [filename] Display the file’s contents to the standard output device (usually your monitor).

HAVE THIS BOOK?

Articles from
the book

After you configure Ethernet and TCP/IP (whether during Linux installation or by running a network configuration tool or command later), you can use various networking applications on a Linux system without much problem. On the off chance that you do run into trouble, Linux includes several tools to help you monitor and diagnose problems.
On your Linux laptop, the PCMCIA or PC Card manager recognizes the wireless network card and loads the appropriate driver for the card. Linux treats the wireless network card like another Ethernet device and assigns it a device name such as eth0 or eth1. If you already have an Ethernet card in the laptop, that card gets the eth0 device name, and the wireless PC Card becomes the eth1 device.
In Linux systems, you can use the tar command to archive files to a device, such as a hard drive or tape. The tar program in Linux creates an archive file that can contain other directories and files and (optionally) compress the archive for efficient storage. Then the archive is written to a specified device or another file.
Your Linux system will most likely need a way to connect to the Internet. This is where an Internet Super Server comes into play. It offers Linux users two options for Internet access.The client/server architecture of Internet services requires the server to be up and running before a client makes a request for service.
The first step in securing your Linux system is setting up a security policy — a set of guidelines that states what you enable users (as well as visitors over the Internet) to do on your Linux system. The level of security you establish depends on how you use the Linux system and on how much is at risk if someone gains unauthorized access to your system.
Linux can be a powerful operating system if you know how to use commands. For example, you can edit files in Linux using ed. Typically, you have to use ed only when you boot a minimal version of Linux (from the medium you’ve set up as a boot disk, for example) and the system doesn’t support full-screen mode. In all other situations, you can use the vi editor, which works in full-screen text mode.
If you have the opportunity to dabble with ed in Linux, you’ll find that vi is a dream come true, even though it’s still a command-line editor. In Linux. the vi editor is a full-screen text editor, so you can view several lines at the same time. Most Unix systems, including Linux, come with vi. Therefore, if you know the basic features of vi, you can edit text files on almost any Unix-based system.
When you’re the system administrator, you must keep an eye on how well your Linux system is performing. You can monitor the overall performance of your Linux system by looking at information such as Central processing unit (CPU) usage Physical memory usage Virtual memory (swap-space) usage Hard drive usage Linux comes with utilities that you can use to monitor these performance parameters.
One important aspect of securing the host is protecting important system files — and the directories on your Linux system that contain these files. In Linux, you can protect the files through file ownership and the permission settings that control who can read, write, or (in the case of executable programs) execute the file.
As a Linux system administrator, you may have to run some programs automatically at regular intervals or execute one or more commands at a specified time in the future. Your Linux system includes the facilities to schedule jobs to run at any future date or time you want. You can also set up the system to perform a task periodically or just once.
It is easy to share files between Linux computers on a local network. The Linux way of accomplishing this is to utilize NFS (Network File System). Sharing files through NFS is simple and involves two basic steps: On the Linux system that runs the NFS server, you export (share) one or more directories by listing them in the /etc/exports file and by running the exportfs command.
GPG includes the tools you need to use public key encryption and digital signatures on your Linux system. You can figure out how to use GPG gradually as you begin using encryption in Linux. The information you find here shows some of the typical tasks you can perform with GPG to protect your Linux system. How to Generate the key pair with GPG in Linux The steps for generating the key pairs are as follows: Type gpg --gen-key.
The Linux kernel has built-in packet filtering software in the form of something called netfilter. You use the iptables command to set up the rules for what happens to the packets based on the IP addresses in their header and the network connection type. To find out more about netfilter and iptables, visit the documentation section of the netfilter website.
Knowing how to use FTP from the command line is a good idea when working with Linux systems. If your GUI desktop isn’t working, for example, you may need to download some files to fix the problem; you can do so if you know how to use the command-line FTP client. The command-line FTP client is available in all Linux distributions, and using it isn’t difficult.
Linux can fulfill almost any need you have for the operating system on a desktop computer, but you must be able to tell it what you want to do in a way that it understands. You need to know common commands and how to access the help pages.Common Linux commands Command Description cat [filename] Display the file’s contents to the standard output device (usually your monitor).
Linux comes with the GNU Privacy Guard (GnuPG or GPG) encryption and authentication utility. With GnuPG, you can create your public and private key pair on your Linux system, encrypt files with your key, and digitally sign a message to authenticate that it’s from you. If you send a digitally signed message to someone who has your public key, the recipient can verify that you signed the message.
If you plan to be a Linux user, you will need all of the applications and tools to complete tasks. Word processors, spreadsheets, presentation software, calendars, and calculators are office-suite staples. Most Linux distributions come with the LibreOffice suite of office applications and tools, which you can try one by one and see which one takes your fancy.
You can set up a basic Ethernet LAN on a Linux PC. Ethernet is a standard way to move packets of data among two or more computers connected to a single hub, router, or switch. (You can create larger networks by connecting multiple Ethernet segments with gateways.) To set up an Ethernet LAN, you need an Ethernet card for each PC.
You can configure TCP/IP networking when you install Linux. If you want to manage the network on a Linux system effectively, however, you need to become familiar with the TCP/IP configuration files so that you can edit the files, if necessary. (If you want to check whether the name servers are specified correctly, for example, you have to know about the /etc/resolv.
As an operating system, Linux acts as the intermediary through which you — as the “lord of the system” — manage all the hardware. If you’re using Linux to manage your PC, there are a few things you can do to make your life much easier. The hardware includes the system box, the monitor, the keyboard, the mouse, and anything else connected to the system box.
Like any other OS, Linux needs to be protected with a firewall. A firewall is a network device or host with two or more network interfaces — one connected to the protected internal network and the other connected to unprotected networks, such as the Internet. The firewall controls access to and from the protected internal network.
https://cdn.prod.website-files.com/6630d85d73068bc09c7c436c/69195ee32d5c606051d9f433_4.%20All%20For%20You.mp3

Frequently Asked Questions

No items found.