Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Fedora Linux System Administration
  • Table Of Contents Toc
  • Feedback & Rating feedback
Fedora Linux System Administration

Fedora Linux System Administration

By : Alex Callejas
5 (5)
close
close
Fedora Linux System Administration

Fedora Linux System Administration

5 (5)
By: Alex Callejas

Overview of this book

Fedora Linux is a free and open-source platform designed for hardware, clouds, and containers that enables software developers and community members to create custom solutions for their customers. This book is a comprehensive guide focusing on workstation configuration for the modern system administrator. The book begins by introducing you to the philosophy underlying the open-source movement, along with the unique attributes of the Fedora Project that set it apart from other Linux distributions. The chapters outline best practices and strategies for essential system administration tasks, including operating system installation, first-boot configuration, storage, and network setup. As you make progress, you’ll get to grips with the selection and usage of top applications and tools in the tech environment. The concluding chapters help you get a clear understanding of the basics of version control systems, enhanced Linux security, automation, virtualization, and containers, which are integral to modern system administration. By the end of this book, you’ll have gained the knowledge needed to optimize day-to-day tasks related to Linux-based system administration.
Table of Contents (20 chapters)
close
close
1
Part 1:The Fedora Project
3
Part 2:Workstation Configuration
8
Part 3:Productivity Tools
13
Part 4:System Administration Tools

Learning about mandatory access control

Linux file permissions control which users or groups of users access specific files. But a user with read or write access to a specific file could use that file in any way desired, even if that use is not what the file should be used for.

Linux standard file permissions succeed when files get used by a single owner and a single designated group of people.

File permissions fail to prevent some forms of unwanted access. They were not designed to control how a file gets used, but only who to allow to read, write, or run a file.

Linux standard file permissions are ownership-based, also known as discretionary access control (DAC).

The MAC rules are policy based, not by ownership.

There are two types of MAC:

  • Multi-level security systems: The original and simplest form of MAC consists of a vertical structure of protection and security levels. Information only flows within this area. A level of protection is also assigned to users...

Unlock full access

Continue reading for free

A Packt free trial gives you instant online access to our library of over 7000 practical eBooks and videos, constantly updated with the latest in tech

Create a Note

Modal Close icon
You need to login to use this feature.
notes
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Delete Note

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete

Edit Note

Modal Close icon
Write a note (max 255 characters)
Cancel
Update Note

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY