Typos which can be located by the Find command:

hierarchal -> hierarchical
symobolic -> symbolic
utilites -> utilities
equivalencies -> equivalents
ramdisc -> ramdisk
progamming -> programming
wich -> which
kB -> KB
perfomance -> performance
deallocated -> unallocated
firewallsblock -> firewalls block
trafic -> traffic
acknowledgments -> acknowledgements
interoperatibility -> interoperability
Appletalk.It shows (spaces after period)
.../proc/tty.You'll find entries for drivers... (spaces after period)
digestable -> digestible
sytem -> system (a few places)
symbollic -> symbolic
workeable -> workable
redering -> rendering
utlitiy's -> utility's
tunnneling -> tunnelling
tby -> by
...'xinit' is a configuration method os starting up...  #Change "os" to
"of".
dissallowed -> disallowed
specfic -> specific
...see inetd(8) for further informations.   #Change "informations" to
"information".
...so it is OK to start it early in the bootprocess.  #Change
"bootprocess" to "boot process".
anymore -> any more
ctrlaltdel -> ctrl-alt-del
spearated -> separated
startupfiles -> startup files
dialing -> dialling
seperate -> separate (a couple of places)
utliise -> utilise
bookeeping -> bookkeeping
...Three commands can be used to access the contents of this file
dump-acct, sa...   #Change "dump-acct" to "dump - acct" (put spaces around
dash) or "dump: acct".
accouting -> accounting
userful -> useful
Organiztion -> Organization
prorgams -> programs
woul dhappen -> would happen
unlikt -> unlike
...or a violation of the operating systems or hardwares protection
mechanisms...   #Change "systems" to "system's" and "hardwares" to
"hardware's"
symolic -> symbolic
progams -> programs
Unlilke -> Unlike
Commentry -> Commentary
Progamming -> Programming
english -> English
vietnamese -> Vietnamese
french -> French
chinese -> Chinese
italian -> Italian
buddhist -> Buddhist
catholic -> Catholic
christian -> Christian

Geoff Farrell, gfarrell(at)netspeed(dot)com(dot)au
This commit is contained in:
binh 2004-01-20 03:20:53 +00:00
parent 55adb9e7a5
commit 567cf77fb9
15 changed files with 96 additions and 83 deletions

View File

@ -21,13 +21,13 @@
pondering whether he should complete his musical studies to obtain a
diploma so that he can teach. In high school, he was a member of the
athletics, basketball, football, cricket and swimming squads. He speaks
english predominately but is also able to communicate in vietnamese and
french. When younger he also possessed the ability to communicate in
chinese and italian.
English predominately but is also able to communicate in Vietnamese and
French. When younger he also possessed the ability to communicate in
Chinese and Italian.
</para>
<para>
Although brought up as a buddhist and studying at catholic/christian
Although brought up as a Buddhist and studying at Catholic/Christian
schools all his life as well as studying scripture during his final year of
high school he considers himself an atheist.
</para>

View File

@ -77,4 +77,11 @@
</listitem>
</itemizedlist>
<itemizedlist>
<listitem>
<para>Geoff Farrell.</para>
</listitem>
</itemizedlist>
</appendix>

View File

@ -21,13 +21,13 @@
pondering whether he should complete his musical studies to obtain a
diploma so that he can teach. In high school, he was a member of the
athletics, basketball, football, cricket and swimming squads. He speaks
english predominately but is also able to communicate in vietnamese and
french. When younger he also possessed the ability to communicate in
chinese and italian.
English predominately but is also able to communicate in Vietnamese and
French. When younger he also possessed the ability to communicate in
Chinese and Italian.
</para>
<para>
Although brought up as a buddhist and studying at catholic/christian
Although brought up as a Buddhist and studying at Catholic/Christian
schools all his life as well as studying scripture during his final year of
high school he considers himself an atheist.
</para>

View File

@ -20,4 +20,10 @@
</listitem>
</itemizedlist>
<itemizedlist>
<listitem>
<para>Geoff Farrell.</para>
</listitem>
</itemizedlist>
</appendix>

View File

@ -23,7 +23,7 @@ data structures need to be written to the disk. This process is called <emphasis
</para>
<para>
Like UNIX, Linux chooses to have a single hierarchal directory structure. Everything starts from the root directory, represented by /, and then expands into sub-directories instead of having so-called 'drives'. In
Like UNIX, Linux chooses to have a single hierarchical directory structure. Everything starts from the root directory, represented by /, and then expands into sub-directories instead of having so-called 'drives'. In
the Windows environment, one may put one's files almost anywhere: on C drive, D drive, E drive etc. Such a file system is called a hierarchical structure and is managed by the programs themselves (program directories), not by the operating system. On the other hand, Linux sorts directories descending from the root directory / according to their importance to the boot process.
</para>

View File

@ -117,7 +117,7 @@ MTA
</glossterm>
<glossdef>
<para>
Mail Transfer Agents. Alongside the web, mail is the top reason for the popularity of the Internet. E-mail is an inexpensive and fast method of time-shifted messaging which, much like the Web, is actually based around sending and receiving plain text files. The protocol used is called the Simple Mail Transfer Protocol (SMTP). The server prorgams that implement SMTP to move mail from one server to another are called MTAs. Once upon a time users would have to Telnet into an SMTP server and use a command line mail program like 'mutt' or 'pine' to check their mail. Now, GUI based e-mail clients like Mozilla, Kmail and Outlook allow users to check their email off of a local SMTP sever. Additional protocols like POP3 and IMAP4 are used between the SMTP server and desktop mail client to allow clients to manipulate files on, and download from, their local mail server. The programs that implement POP3 and IMAP4 are called Mail Delivery Agents (MDAs). They are generally seperate from MTAs.
Mail Transfer Agents. Alongside the web, mail is the top reason for the popularity of the Internet. E-mail is an inexpensive and fast method of time-shifted messaging which, much like the Web, is actually based around sending and receiving plain text files. The protocol used is called the Simple Mail Transfer Protocol (SMTP). The server programs that implement SMTP to move mail from one server to another are called MTAs. Once upon a time users would have to Telnet into an SMTP server and use a command line mail program like 'mutt' or 'pine' to check their mail. Now, GUI based e-mail clients like Mozilla, Kmail and Outlook allow users to check their email off of a local SMTP sever. Additional protocols like POP3 and IMAP4 are used between the SMTP server and desktop mail client to allow clients to manipulate files on, and download from, their local mail server. The programs that implement POP3 and IMAP4 are called Mail Delivery Agents (MDAs). They are generally separate from MTAs.
</para>
</glossdef>
</glossentry>
@ -161,7 +161,7 @@ SSH
</glossterm>
<glossdef>
<para>
The Secure Shell, or SSH, provides a way of running command line and graphical applications, and transferring files, over an encrypted connection, all that will be seen is junk. It is both a protocol and a suite of small command line applications, which can be used for various functions. SSH replaces the old Telnet application, and can be used for secure remote administration of machines across the Internet. However, it also has other features. SSH increases the ease of running applications remotely by setting up X permissions automatically. If you can log into a machine, it allows you to run a graphical application on it, unlikt Telnet, which requires users to have an understanding of the X authentication mechanisms that are manipulated through the xauth and xhost commands. SSH also has inbuilt compression, which allows your graphic applications to run much faster over the network. SCP (Secure Copy) and SFTP (Secure FTP) allow transfer of files over the remote link, either via SSH's own command line utilities or graphical tools like Gnome's GFTP. Like Telnet, SSH is cross-platform. You can find SSH server and clients for Linux, Unix and all flavours of Windows, BeOS, PalmOS, Java and embedded Oses used in routers.
The Secure Shell, or SSH, provides a way of running command line and graphical applications, and transferring files, over an encrypted connection, all that will be seen is junk. It is both a protocol and a suite of small command line applications, which can be used for various functions. SSH replaces the old Telnet application, and can be used for secure remote administration of machines across the Internet. However, it also has other features. SSH increases the ease of running applications remotely by setting up X permissions automatically. If you can log into a machine, it allows you to run a graphical application on it, unlike Telnet, which requires users to have an understanding of the X authentication mechanisms that are manipulated through the xauth and xhost commands. SSH also has inbuilt compression, which allows your graphic applications to run much faster over the network. SCP (Secure Copy) and SFTP (Secure FTP) allow transfer of files over the remote link, either via SSH's own command line utilities or graphical tools like Gnome's GFTP. Like Telnet, SSH is cross-platform. You can find SSH server and clients for Linux, Unix and all flavours of Windows, BeOS, PalmOS, Java and embedded Oses used in routers.
</para>
</glossdef>
</glossentry>
@ -216,7 +216,7 @@ core
</glossterm>
<glossdef>
<para>
A core file is created when a program terminates unexpectedly, due to a bug, or a violation of the operating systems or hardwares protection mechanisms. The operating system kills the program and creates a core file that programmers can use to figure out what went wrong. It contains a detailed description of the state that the program was in when it died. If would like to determine what program a core file came from, use the file command, like this: $ file core That will tell you the name of the program that produced the core dump. You may want to write the maintainer(s) of the program, telling them that their program dumped core. To Enable or Disable Core Dumps you must use the ulimit command in bash, the limit command in tcsh, or the rlimit command in ksh. See the appropriate manual page for details. This setting affects all programs run from the shell (directly or indirectly), not the whole system. If you wish to enable or disable core dumping for all processes by default, you can change the default setting in /usr/include/linux/sched.h. Refer to definition of INIT_TASK, and look also in /usr/include/linux/resource.h. PAM support optimizes the system's environment, including the amount of memory a user is allowed. In some distributions this parameter is configurable in the /etc/security/limits.conf file. For more information, refer to the Linux Administrator's Security Guide.
A core file is created when a program terminates unexpectedly, due to a bug, or a violation of the operating system's or hardware's protection mechanisms. The operating system kills the program and creates a core file that programmers can use to figure out what went wrong. It contains a detailed description of the state that the program was in when it died. If would like to determine what program a core file came from, use the file command, like this: $ file core That will tell you the name of the program that produced the core dump. You may want to write the maintainer(s) of the program, telling them that their program dumped core. To Enable or Disable Core Dumps you must use the ulimit command in bash, the limit command in tcsh, or the rlimit command in ksh. See the appropriate manual page for details. This setting affects all programs run from the shell (directly or indirectly), not the whole system. If you wish to enable or disable core dumping for all processes by default, you can change the default setting in /usr/include/linux/sched.h. Refer to definition of INIT_TASK, and look also in /usr/include/linux/resource.h. PAM support optimizes the system's environment, including the amount of memory a user is allowed. In some distributions this parameter is configurable in the /etc/security/limits.conf file. For more information, refer to the Linux Administrator's Security Guide.
</para>
</glossdef>
</glossentry>
@ -315,7 +315,7 @@ link
</glossterm>
<glossdef>
<para>
A symolic link (alias in MacOS and shortcut under Windows) is a file that points to another file; this is a commonly used tool. A hard-link rarely created by the user, is a filename that points to a block of data that has several other filenames as well.
A symbolic link (alias in MacOS and shortcut under Windows) is a file that points to another file; this is a commonly used tool. A hard-link rarely created by the user, is a filename that points to a block of data that has several other filenames as well.
</para>
</glossdef>
</glossentry>
@ -370,7 +370,7 @@ rpc
</glossterm>
<glossdef>
<para>
Remote Procedure Calls. It enables a system to make calls to progams such as NFS across the network transparently, enabling each system to interpret the calls as if they were local. In this case, it would make exported filesystems appear as thought they were local.
Remote Procedure Calls. It enables a system to make calls to programs such as NFS across the network transparently, enabling each system to interpret the calls as if they were local. In this case, it would make exported filesystems appear as thought they were local.
</para>
</glossdef>
</glossentry>
@ -414,7 +414,7 @@ symbolic link or soft link
</glossterm>
<glossdef>
<para>
A special filetype, which is a small pointer file, allowing multiple names for the same file. Unlilke hard links, symbolic links can be made for directories and can be made across filesystems. Commands that access the file being pointed to are said to follow the symbolic link. Commands that access the link itself do not follow the symbolic link.
A special filetype, which is a small pointer file, allowing multiple names for the same file. Unlike hard links, symbolic links can be made for directories and can be made across filesystems. Commands that access the file being pointed to are said to follow the symbolic link. Commands that access the link itself do not follow the symbolic link.
</para>
</glossdef>
</glossentry>

View File

@ -58,7 +58,7 @@
<itemizedlist>
<listitem>
<para>Lions&apos; Commentry on UNIX 6th Edition with Source Code, John Lions, Peer-to-Peer Communications Incorporated, USA, 1996.</para>
<para>Lions&apos; Commentary on UNIX 6th Edition with Source Code, John Lions, Peer-to-Peer Communications Incorporated, USA, 1996.</para>
</listitem>
</itemizedlist>
@ -70,7 +70,7 @@
<itemizedlist>
<listitem>
<para>SAMS Teach Yourself Shell Progamming in 24 Hours, Sriranga Veerararaghavan, SAMS Publishing, USA, 1999.</para>
<para>SAMS Teach Yourself Shell Programming in 24 Hours, Sriranga Veerararaghavan, SAMS Publishing, USA, 1999.</para>
</listitem>
</itemizedlist>

View File

@ -18,13 +18,13 @@
<varlistentry><term>/boot/boot.b</term><listitem><para>This
is installed as the basic boot sector. In the case of most modern
distributions it is actually a symobolic link to one of four files
distributions it is actually a symbolic link to one of four files
/boot/boot-bmp.b, /boot/boot-menu.b, /boot/boot-text.b, /boot/boot-compat.b
which allow a user to change the boot-up schema so that it utilises a splash
screen, a simple menu, a text based interface or a minimal boot loader to
ensure compatibility respectively. In each case re-installation of lilo is
necessary in order to complete the changes. To change the actual
&#39;boot-logo&#39; you can either use utilites such as fblogo or the more
&#39;boot-logo&#39; you can either use utilities such as fblogo or the more
refined bootsplash.</para></listitem></varlistentry>
<varlistentry><term>/boot/chain.b</term><listitem><para>Used

View File

@ -121,7 +121,7 @@ crw-rw-rw- 1 root root 1, 5 Sep 28 18:06 zero
</screen>
</para>
<para>Some common devices files as well as their equivalencies under Windows that you may wish to remember are:</para>
<para>Some common device files as well as their equivalent counterparts under Windows that you may wish to remember are:</para>
<para><variablelist>

View File

@ -11,7 +11,7 @@
<para><variablelist><varlistentry><term>/etc/X11/</term><listitem><para>This
directory tree contains all the configuration files for the X Window System.
Users should note that many of the files located in this directory are
actually symbollic links to the /usr/X11R6 directory tree. Thus, the
actually symbolic links to the /usr/X11R6 directory tree. Thus, the
presence of these files in these locations can not be certain.</para></listitem></varlistentry>
<varlistentry><term>/etc/X11/XF86Config,
@ -22,7 +22,7 @@
sufficient knowledge about your system. It would be considered prudent not
to attempt to type out a file from beginning to end. Rather, use common
configuration utilities such as xf86config, XF86Setup and xf86cfg to create
a workeable template. Then, using suitable documentation commence
a workable template. Then, using suitable documentation commence
optimization through intuition and/or trial and error. Options that can be
configured via this file include X modules to be loaded on startup,
keyboard, mouse, monitor and graphic chipset type. Often, commercial
@ -177,7 +177,7 @@ EndSection
locations of the various font files for X (note - X will not start if you do
not specify a valid font), next is the &#34;Modules&#34; section. It details
what modules are to be loaded upon startup. The most well known extensions
are probably GLX (required for 3D redering of graphics and games) and
are probably GLX (required for 3D rendering of graphics and games) and
Xinerama which allows users to expand their desktop over several monitors.
Next are the various &#34;Device&#34; sections which describe the type of
hardware you have. Improper configuration of these subsections can lead to
@ -196,7 +196,7 @@ EndSection
general your default keyboard mapping comes from your X server setup. If
this setup is insufficient and you are unwilling to go through the process
of reconfiguration and/or you are not the superuser you&#39;ll need to use
the xmodmap program. This is the utlitiy&#39;s global configuration file.</para></listitem></varlistentry>
the xmodmap program. This is the utility&#39;s global configuration file.</para></listitem></varlistentry>
<varlistentry><term>/etc/X11/xkb/</term><listitem><para>The
various symbols, types, geometries of keymaps that the X server supports can
@ -215,7 +215,7 @@ EndSection
load and thus increase overall network latency. A competing project called
DXPC (Differential X Protocol Compression) has been found to be more
efficient at this task. Studies have shown though that in almost all cases
ssh tunnneling of X will produce far better results than through any of
ssh tunneling of X will produce far better results than through any of
these specialised pieces of software.</para></listitem></varlistentry>
<varlistentry><term>/etc/X11/proxymngr/</term><listitem><para>X
@ -254,7 +254,7 @@ EndSection
is the primary configuration file for GDM. Through it, users can specify
whether they would like their system to automatically login as a certain
user, background startup image and also if they would like to run their
machine as somewhat of a terminal server tby using the XDMCP protocol.</para></listitem></varlistentry>
machine as somewhat of a terminal server by using the XDMCP protocol.</para></listitem></varlistentry>
<varlistentry><term>/etc/X11/fonts</term><listitem><para>Home
of xfs fonts.</para></listitem></varlistentry>
@ -310,7 +310,7 @@ cache-balance = 70
of configuration files for twm. The original Tabbed Window Manager.</para></listitem></varlistentry>
<varlistentry><term>/etc/X11/xinit/</term><listitem><para>xinit
configuration files. &#39;xinit&#39; is a configuration method os starting
configuration files. &#39;xinit&#39; is a configuration method of starting
up an X session that is designed to used as part of a script. Normally, this
is used at larger sites as part of a tailored login process.</para></listitem></varlistentry>
@ -643,7 +643,7 @@ language dictionary databases.
of ftp users that need to be chrooted.</para></listitem></varlistentry>
<varlistentry><term>/etc/ftpuser</term><listitem><para>List
of dissallowed ftp users.</para></listitem></varlistentry>
of disallowed ftp users.</para></listitem></varlistentry>
<varlistentry><term>/etc/gateways</term><listitem><para>Lists
gateways for &#39;routed&#39;.</para></listitem></varlistentry>
@ -697,7 +697,7 @@ language dictionary databases.
<varlistentry><term>/etc/hosts.allow</term><listitem><para>Part
of the tcp-wrappers system to control access to your machine&#39;s services.
It lists hosts that are allowed to access the system and specfic daemons.</para>
It lists hosts that are allowed to access the system and specific daemons.</para>
<para><screen>
# /etc/hosts.allow: list of hosts that are allowed to access the
# system.
@ -837,7 +837,7 @@ language dictionary databases.
/etc/xinet.conf for further details.</para>
<para><screen>
# /etc/inetd.conf: see inetd(8) for further informations.
# /etc/inetd.conf: see inetd(8) for further information.
#
# Internet server configuration database
#
@ -1092,7 +1092,7 @@ Order of scripts run in /etc/rc?.d
The appropriate getty is put on the line until the first call is received.
When the caller terminates the connection, the getty drops because, by
definition, on demand will not respawn. The other two letters, S and Q, are
special. S brings you sytem to maintenance mode and is the same as changing
special. S brings you system to maintenance mode and is the same as changing
state to runlevel 1. The Q is used to tell init to reread inittab. The
/etc/inittab file can be changed as often as required, but will only be read
under certain circumstances: -One of its processes dies (do you need to
@ -1169,7 +1169,7 @@ Order of scripts run in /etc/rc?.d
<varlistentry><term></term><listitem>
<para>/etc/ld.so.conf is a file
containing a list of colon, space, tab, newline, or comma spearated
containing a list of colon, space, tab, newline, or comma separated
directories in which to search for libraries. /etc/ld.so.cache containing an
ordered list of libraries found in the directories specified in
/etc/ld.so.conf. This file is not in human readable format, and is not
@ -1421,8 +1421,8 @@ Order of scripts run in /etc/rc?.d
<varlistentry><term>/etc/minicom</term><listitem><para>&#39;minicom&#39;
configuration files. &#39;minicom&#39; is a communication program which
somewhat resembles the shareware program TELIX but is free with source code
and runs under most unices. Features include dialing directory with
auto-redial, support for UUCP-style lock files on serial devices, a seperate
and runs under most unices. Features include dialling directory with
auto-redial, support for UUCP-style lock files on serial devices, a separate
script language interpreter, capture to file, multiple users with individual
configurations, and more.</para></listitem></varlistentry>
@ -1613,7 +1613,7 @@ Order of scripts run in /etc/rc?.d
of networks that the system is currently located on. For example,
192.168.0.0.</para></listitem></varlistentry>
<varlistentry><term>/etc/nsswitch.conf</term><listitem><para>Sytem
<varlistentry><term>/etc/nsswitch.conf</term><listitem><para>System
Database/Name Service Switch configuration file.</para></listitem></varlistentry>
<varlistentry><term>/etc/oss.conf</term><listitem><para>OSS
@ -1890,7 +1890,7 @@ dummy:x:1001:1001:,,,:/home/dummy:/bin/bash
hardware states via motherboard sensor chips. Useful statistics such as core
voltages, CPU temperature can be determined through third party utilities
that make user of these libraries such as &#39;gkrellm&#39;. If you do not
wish to install these packages you may also utliise the /proc filesystem
wish to install these packages you may also utilise the /proc filesystem
real-time nature.</para></listitem></varlistentry>
<varlistentry><term>/etc/sudoers</term><listitem><para>Sudoers

View File

@ -2,7 +2,7 @@
<title>/lib</title>
<para>
The /lib directory contains kernel modules and those shared library images (the C progamming code library) needed to boot the system and run the commands in the root filesystem, ie. by binaries in /bin and /sbin. Libraries are readily identifiable through their filename extension of *.so. Windows equivalent to a shared library would be a DLL (dynamically linked library) file. They are essential for basic system functionality. Kernel modules (drivers) are in the subdirectory /lib/modules/'kernel-version'. To ensure proper module compilation you should ensure that /lib/modules/'kernel-version'/kernel/build points to /usr/src/'kernel-version' or ensure that the Makefile knows where the kernel source itself are located.
The /lib directory contains kernel modules and those shared library images (the C programming code library) needed to boot the system and run the commands in the root filesystem, ie. by binaries in /bin and /sbin. Libraries are readily identifiable through their filename extension of *.so. Windows equivalent to a shared library would be a DLL (dynamically linked library) file. They are essential for basic system functionality. Kernel modules (drivers) are in the subdirectory /lib/modules/'kernel-version'. To ensure proper module compilation you should ensure that /lib/modules/'kernel-version'/kernel/build points to /usr/src/'kernel-version' or ensure that the Makefile knows where the kernel source itself are located.
</para>
<para>

View File

@ -129,7 +129,7 @@ lrwxrwxrwx 1 root root 0 Jan 19 15:02 root -&#62; /
<varlistentry><term>/proc/PID/cmdline</term><listitem><para>Command
line arguments.</para></listitem></varlistentry><varlistentry><term>/proc/PID/cpu</term><listitem><para>Current
and last cpu in wich it was executed.</para></listitem></varlistentry><varlistentry><term>/proc/PID/cwd</term><listitem><para>Link
and last cpu in which it was executed.</para></listitem></varlistentry><varlistentry><term>/proc/PID/cwd</term><listitem><para>Link
to the current working directory.</para></listitem></varlistentry><varlistentry><term>/proc/PID/environ</term><listitem><para>Values
of environment variables.</para></listitem></varlistentry><varlistentry><term>/proc/PID/exe</term><listitem><para>Link
to the executable of this process.</para></listitem></varlistentry><varlistentry><term>/proc/PID/fd</term><listitem><para>Directory,
@ -243,7 +243,7 @@ irq 8: 3 rtc irq 15: 83 ide1
<varlistentry><term>/proc/cpuinfo</term><listitem><para>
Information about the processor, such as its type, make, model, and
perfomance.</para></listitem></varlistentry>
performance.</para></listitem></varlistentry>
<varlistentry><term>/proc/devices</term><listitem><para>
List of device drivers configured into the currently running kernel (block
@ -405,7 +405,7 @@ irq 8: 3 rtc irq 15: 83 ide1
</screen>
</para></listitem></varlistentry>
<varlistentry><term></term><listitem><para>It&#39;s a bitmask, in which you can specify wich CPUs can handle
<varlistentry><term></term><listitem><para>It&#39;s a bitmask, in which you can specify which CPUs can handle
the IRQ, you can set it by doing:</para></listitem></varlistentry>
<varlistentry><term></term><listitem><para><screen># echo 1 &#62; /proc/irq/prof_cpu_mask</screen></para></listitem></varlistentry>
@ -1305,7 +1305,7 @@ irq 8: 3 rtc irq 15: 83 ide1
<varlistentry><term>tcp_ecn</term><listitem><para>
This file controls the use of the ECN bit in the IPv4 headers, this is a new
feature about Explicit Congestion Notification, but some routers and
firewallsblock trafic that has this bit set, so it could be necessary to
firewalls block traffic that has this bit set, so it could be necessary to
echo 0 to /proc/sys/net/ipv4/tcp_ecn, if you want to talk to this sites. For
more info you could read RFC2481.</para></listitem></varlistentry>
@ -1336,7 +1336,7 @@ irq 8: 3 rtc irq 15: 83 ide1
the BSD compatible interpretation of the urgent pointer pointing to the
first byte after the urgent data. The RFC793 interpretation is to have it
point to the last byte of urgent data. Enabling this option may lead to
interoperatibility problems. Disabled by default.</para></listitem></varlistentry>
interoperability problems. Disabled by default.</para></listitem></varlistentry>
<varlistentry><term>tcp_syncookies</term><listitem><para>Only valid when
the kernel was compiled with CONFIG_SYNCOOKIES. Send out syncookies when the
@ -1643,7 +1643,7 @@ irq 8: 3 rtc irq 15: 83 ide1
<varlistentry><term></term><listitem><para>Note that while the above files tend to be
easily readable text files, they can sometimes be formatted in a way that is
not easily digestable. There are many commands that do little more than read
not easily digestible. There are many commands that do little more than read
the above files and format them for easier understanding. For example, the
free program reads /proc/meminfo and converts the amounts given in bytes to
kilobytes (and adds a little more information, as well). </para></listitem></varlistentry>

View File

@ -1,7 +1,7 @@
<sect1 id="sbin">
<title>/sbin</title>
<para>Linux discriminates between 'normal' executables and those used for system maintenance or administrative tasks. The latter reside either here or - the less important ones - in /usr/sbin. Locally installed system administration programs should be placed into /usr/local/sbin. Programs executed after /usr is known to be mounted (when there are no problems) are generally placed into /usr/sbin. This directory contains all the binaries that are essential to the working of the system. These include system administration as well as maintenance and hardware configuration programs. You may find lilo, fdisk, init, ifconfig, etc here. These are the essential programs that are required by all the users. Another directory that contains system binaries is /usr/sbin. This directory contains other binaries of use to the system administrator. This is where you will find the network daemons for your system along with other binaries that only the system administrator has access to, but which are not required for system maintenance and repair. For obvious security reasons, these directories are never part of normal user's $PATHs, only of roots (PATH is an environment variable that controls the sequence of locations that the sytem will attempt to look in for commands).</para>
<para>Linux discriminates between 'normal' executables and those used for system maintenance or administrative tasks. The latter reside either here or - the less important ones - in /usr/sbin. Locally installed system administration programs should be placed into /usr/local/sbin. Programs executed after /usr is known to be mounted (when there are no problems) are generally placed into /usr/sbin. This directory contains all the binaries that are essential to the working of the system. These include system administration as well as maintenance and hardware configuration programs. You may find lilo, fdisk, init, ifconfig, etc here. These are the essential programs that are required by all the users. Another directory that contains system binaries is /usr/sbin. This directory contains other binaries of use to the system administrator. This is where you will find the network daemons for your system along with other binaries that only the system administrator has access to, but which are not required for system maintenance and repair. For obvious security reasons, these directories are never part of normal user's $PATHs, only of roots (PATH is an environment variable that controls the sequence of locations that the system will attempt to look in for commands).</para>
<para>
FSSTND compliance requires that the following commands, or symbolic links to commands,

View File

@ -81,7 +81,7 @@ This directory contains programs for administering a system, meant to be run by
This directory contains 'shareable', architecture-independent files (docs, icons, fonts etc). Note, however, that '/usr/share' is generally not intended to be shared by different operating systems or by different releases of the same operating system. Any program or package which contains or requires data that doesn't need to be modified should store that data in '/usr/share' (or '/usr/local/share', if installed locally). It is recommended that a subdirectory be used in /usr/share for this purpose."</para></listitem></varlistentry>
<varlistentry><term>/usr/share/doc</term><listitem><para>
Location of package specific documentation files. These directories often contain userful information that might not be in the man pages. They may also contain templates and configuration files for certain utilities making configuration that much easier.</para></listitem></varlistentry>
Location of package specific documentation files. These directories often contain useful information that might not be in the man pages. They may also contain templates and configuration files for certain utilities making configuration that much easier.</para></listitem></varlistentry>
<varlistentry><term>/usr/share/info</term><listitem><para>
Location of 'info' pages. This style of documentation seems to be largely ignored now. Manual pages are in far greater favour.</para></listitem></varlistentry>
@ -138,7 +138,7 @@ these programs are also occasionally useful for normal users.
The 'linux' sub-directory holds the Linux kernel sources, header-files and documentation.</para></listitem></varlistentry>
<varlistentry><term>/usr/src/RPM</term><listitem><para>
RPM provides a substructure for building RPMs from SRPMs. Organiztion of this branch is fairly logical with packages being organised according to a package's architecture.</para></listitem></varlistentry>
RPM provides a substructure for building RPMs from SRPMs. Organisation of this branch is fairly logical with packages being organised according to a package's architecture.</para></listitem></varlistentry>
<varlistentry><term>/usr/src/RPM/BUILD</term><listitem><para>
A temporary store for RPM binary files that are being built from source code.</para></listitem></varlistentry>

View File

@ -146,9 +146,9 @@
logs.</para></listitem></varlistentry>
<varlistentry><term>/var/log/pacct</term><listitem><para>Process
accounting is the bookeeping of process activity. The raw data of process
accounting is the bookkeeping of process activity. The raw data of process
activity is maintained here. Three commands can be used to access the
contents of this file dump-acct, sa (summary of process accouting) and
contents of this file dump-acct, sa (summary of process accounting) and
lastcomm (list the commands executed on the system).</para></listitem></varlistentry>
<varlistentry><term>/var/log/utmp</term><listitem><para>Active