Linux Configuration


 

Linux Configuration

 
  Linux has many ways to be configured. Below are the Linuxconf utility on the left and the Mandrake Control Centre
on the right. These are just 2 of the 30 some odd utilities that can get your job done for you. There are both console
(command line) types and Xwindows types. The ones shown are GUI Xwindow types running on KDE desktop
manager. Gnome, another popular Xwindow manager also comes with a stock GnoLinuxconf facility that works
essentially the same.
 
            



     For our purpose we will be working with Linuxconf at the left.

 
 
Networking : Consists of 3 parts (Client, Server, and Miscellaneous) You use the Client when you are talking with another
PC that services many users. You use the Server configuration when you are serving many users. In a Linux system you can
be both a client and a server since it incorporates true multitasking.
 
     
   
Users

File systems & Peripherals

Miscellaneous
 
   
  In Linux users belong to groups and
have unique passwords. You can restrict
access by certain groups, specific users
and even grant specific users special
rights. Users can also belong to many groups. The root user Must have full privileges or there will be parts of your system that may become inaccessible.
NEVER run as Root!! Use Root only when specific actions must be done that no user has the right to do.


  To Linux everything is a file including all devices. This approach makes system operation far easier.

 Linux uses run levels to determine how it
is to function. Run level 6 for example
causes a shutdown. Normally, you would
set the Run level to 3, 4 or 5 depending
on whether you want command line mode,
partial GUI or full GUI. Full GUI most closely resembles how Microsoft Windows functions.
 
   
Control
     
   
Linux can log everything done by the
system which is available to the user
responsible for system maintenance

Unlike windows which uses few logs and hides them. Linux uses many logs and because it only hides them from general users the administrator can not only review them for possible threats but also clear them. In contrast, Windows seldom clears logs so they can grow quite large, slow the system down and waste valuable space.