Welcome to Linux Knowledge Base and Tutorial
"The place where you learn linux"

 Create an AccountHome | Submit News | Your Account  

Tutorial Menu
Linux Tutorial Home
Table of Contents

· Introduction to Operating Systems
· Linux Basics
· Working with the System
· Shells and Utilities
· Editing Files
· Basic Administration
· The Operating System
· The X Windowing System
· The Computer Itself
· Networking
· System Monitoring
· Solving Problems
· Security
· Installing and Upgrading
· Linux and Windows

Man Pages
Linux Topics
Test Your Knowledge

Site Menu
Site Map
Copyright Info
Terms of Use
Privacy Info
Masthead / Impressum
Your Account

Private Messages
Recommend Us

News Archive
Submit News
User Articles
Web Links


The Web

Who's Online
There are currently, 156 guest(s) and 2 member(s) that are online.

You are an Anonymous user. You can register for free by clicking here


Linux Tutorial Topics: 

Note that any given object can relate to more than one topic, so it is likely that pages will appear more than once. For example, concepts may relate to topics that are slightly different from the topic of the page where they are discussed in detail.

Networking Basics


The X Windowing System -> Remote Access -> XDMCP
Basic Administration -> Printers and Interfaces -> remote printing
The X Windowing System -> Remote Access -> Remote Access
Networking -> Networking
Networking -> TCP-IP -> TCP-IP
Networking -> TCP-IP -> IP Addressing
Networking -> TCP-IP -> Network Standards
Networking -> TCP-IP -> Subnet Masks
Networking -> TCP-IP -> Routing and IP Gateways
Networking -> TCP-IP -> The Domain Name System -> The Domain Name System
Networking -> TCP-IP -> The Domain Name System -> Configuring the Domain Name System DNS
Networking -> DHCP -> DHCP
Networking -> NFS -> NFS
Networking -> NFS -> The Flow of Things
Networking -> NFS -> When Things Go Wrong
Networking -> NFS -> Automount
Networking -> SAMBA -> SAMBA
Networking -> Accesing the Web -> Accesing the Web
Networking -> Firewalls -> Firewalls
Networking -> Firewalls -> Securing the Server
Networking -> Firewalls -> Securing the Internal Network
Networking -> Network Technologies -> Network Technologies
Networking -> Network Technologies -> Ethernet
Networking -> Network Technologies -> Token-Ring
Networking -> Network Technologies -> ATM
Networking -> Network Technologies -> ISDN
Networking -> Network Technologies -> Network Hardware
Security -> The Network
Security -> What You Can Do About It -> Trusted Hosts
Security -> What You Can Do About It -> FTP
Security -> What You Can Do About It -> NFS
Security -> What You Can Do About It -> Modem Security
Networking -> TCP-IP -> Pseudo Terminals
Networking -> TCP-IP -> Network Services


A "connection refused" when trying to access a remote machine may indicate that the service is not configured in /etc/inetd.conf.
A "connection refused" when trying to access a remote machine may indicate that the wrong program is started from /etc/inetd.conf.
Communication carried out in a pre-defined manner between computers is referred to as a "protocol".
The unit of data transmitted across a network is usually called a "packet".
Each component of a network protocol stack is called a "layer".
The processes of adding the necessary information to the data at each level of a network stack is called "encapsulation."
It is usually the job of TCP to ensure that data has not been corrupted.
TCP is considered a reliable connection.
TCP provides "connection oriented" link between computers.
UDP provides a "connection-less" transport between computers
The Internet Protocol (IP) does not guarantee that the packets arrive in the right order or at all.
IP is considered an unreliable protocol.
Each ethernet network card has a unique identifier called a "MAC address".
The term used to refer to IP address notation is called "dotted-decimal notation".
The term used for the individual numbers in an IP address is called an "octet".
IP packets more properly called a "datagram".
The process of directing packets to the correct network is called "routing".
So-called "well-known ports" are listed in the file "/etc/services".
The term used for the intermediary computers a packet goes through is "hop".
Routes are built dynamically as connections are made between computers.
One security common mistake is that the .rhosts file is world-readable
NFS, by it's very nature is insecure.
Files can be mounted automatically via NFS through the /etc/fstab file.
The 'portmapper' converts TCP/IP port numbers to RPC program numbers.
NFS cannot be used to increase the access to the files on the mounted filesystem.
The 'rpcinfo' utility can be used if you want see all the programs using RPC on a specific machine.
Because Linux and Windows have a different understanding of security, you have to be careful when you share filesystems.
A Linux machine running SAMBA can serve as a primary domain controller.
An advantage of ISDN is that it used normal telephone lines.
ISDN transmits voices and data.
A switch analyzes packet to determine the destination and makes a virtual connection between the two ports, thus reducing the number of collisions.
A server with a 100-Mbit card connected to workstations with 10-Mbit cards can only transmit at 10-Mbit.
Some network cards (like those from 3Com) can simultaneously transmit data between the card and memory and between the card and other machines.
Twisted pair is "safer" in that if one node goes down the others keep working.
Not all IP addresses are available on the Internet.
When accessing the hard disk, processes are "put to sleep" to wait their turn.
System process that run in the brackground are typically referred to as daemon processes.


account     address     administrator     alias     application     argument     ARP     ASCII     automounter     bandwidth     boot     bridge     bus     cache memory     carrier     CD-ROM     checksum     class     client     client-server model     command line     CPU     cursor     daemon     device driver     device nodes     directory name     DNS     domain     Domain Name System     DOS     dotted-decimal notation     encapsulation     encrypt     encrypted password     environment     Ethernet     event     export     filesystem     forwarder     FQDN     ftp     full path     gateway     header     hexadecimal     home directory     hops     host     HOWTO     HTML     HTTP     ICMP     interrupt     IP     IP address     ISA     ISDN     ISP     kernel     Lan     login     MAC address     man-page     mask     Media Access Control     minor number     modem     mount     mount point     name server     netmask     network     NFS     NIS     operating system     packet     partition     PCI     permissions     PID     pipe     protocol     protocol suite     redirection     RFC     route     router     RPC     SAMBA     SCSI     security     segment     shell     signal     SMB     SMTP     SNEAKER-Net     SOA     stack     star topology     subdomain     subnet     system call     TCP     terminal     text     token     transport layer     UDP     UNIX     URL     user name     UUCP     variable     wildcard     Windows 95     WWW    

Back to Topics Page

Help us cut cost by not downloading the whole site!
Use of automated download sofware ("harvesters") such as wget, httrack, etc. causes the site to quickly exceed its bandwidth limitation and therefore is expressedly prohibited. For more details on this, take a look here



Security Code
Security Code
Type Security Code

Don't have an account yet? You can create one. As a registered user you have some advantages like theme manager, comments configuration and post comments with your name.

Help if you can!

Amazon Wish List

Did You Know?
The Linux Tutorial welcomes your suggestions and ideas.


Tell a Friend About Us

Bookmark and Share

Web site powered by PHP-Nuke

Is this information useful? At the very least you can help by spreading the word to your favorite newsgroups, mailing lists and forums.
All logos and trademarks in this site are property of their respective owner. The comments are property of their posters. Articles are the property of their respective owners. Unless otherwise stated in the body of the article, article content (C) 1994-2013 by James Mohr. All rights reserved. The stylized page/paper, as well as the terms "The Linux Tutorial", "The Linux Server Tutorial", "The Linux Knowledge Base and Tutorial" and "The place where you learn Linux" are service marks of James Mohr. All rights reserved.
The Linux Knowledge Base and Tutorial may contain links to sites on the Internet, which are owned and operated by third parties. The Linux Tutorial is not responsible for the content of any such third-party site. By viewing/utilizing this web site, you have agreed to our disclaimer, terms of use and privacy policy. Use of automated download software ("harvesters") such as wget, httrack, etc. causes the site to quickly exceed its bandwidth limitation and are therefore expressly prohibited. For more details on this, take a look here

PHP-Nuke Copyright © 2004 by Francisco Burzi. This is free software, and you may redistribute it under the GPL. PHP-Nuke comes with absolutely no warranty, for details, see the license.
Page Generation: 0.11 Seconds