Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Fedora Linux System Administration
  • Toc
  • feedback
Fedora Linux System Administration

Fedora Linux System Administration

By : Alex Callejas
5 (5)
close
Fedora Linux System Administration

Fedora Linux System Administration

5 (5)
By: Alex Callejas

Overview of this book

Fedora Linux is a free and open-source platform designed for hardware, clouds, and containers that enables software developers and community members to create custom solutions for their customers. This book is a comprehensive guide focusing on workstation configuration for the modern system administrator. The book begins by introducing you to the philosophy underlying the open-source movement, along with the unique attributes of the Fedora Project that set it apart from other Linux distributions. The chapters outline best practices and strategies for essential system administration tasks, including operating system installation, first-boot configuration, storage, and network setup. As you make progress, you’ll get to grips with the selection and usage of top applications and tools in the tech environment. The concluding chapters help you get a clear understanding of the basics of version control systems, enhanced Linux security, automation, virtualization, and containers, which are integral to modern system administration. By the end of this book, you’ll have gained the knowledge needed to optimize day-to-day tasks related to Linux-based system administration.
Table of Contents (20 chapters)
close
1
Part 1:The Fedora Project
3
Part 2:Workstation Configuration
8
Part 3:Productivity Tools
13
Part 4:System Administration Tools

Learning about mandatory access control

Linux file permissions control which users or groups of users access specific files. But a user with read or write access to a specific file could use that file in any way desired, even if that use is not what the file should be used for.

Linux standard file permissions succeed when files get used by a single owner and a single designated group of people.

File permissions fail to prevent some forms of unwanted access. They were not designed to control how a file gets used, but only who to allow to read, write, or run a file.

Linux standard file permissions are ownership-based, also known as discretionary access control (DAC).

The MAC rules are policy based, not by ownership.

There are two types of MAC:

  • Multi-level security systems: The original and simplest form of MAC consists of a vertical structure of protection and security levels. Information only flows within this area. A level of protection is also assigned to users...
bookmark search playlist download font-size

Change the font size

margin-width

Change margin width

day-mode

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Delete Bookmark

Modal Close icon
Are you sure you want to delete it?
Cancel
Yes, Delete