Part II. Administration


4. Security in Linux
4.1. Masquerading and Firewalls
4.2. SSH: Secure Network Operations
4.3. Encrypting Partitions and Files
4.4. Confining Privileges with AppArmor
4.5. Security and Confidentiality
5. Access Control Lists in Linux
5.1. Traditional File Permissions
5.2. Advantages of ACLs
5.3. Definitions
5.4. Handling ACLs
5.5. ACL Support in Applications
5.6. For More Information
6. System Monitoring Utilities
6.1. List of Open Files: lsof
6.2. User Accessing Files: fuser
6.3. File Properties: stat
6.4. USB Devices: lsusb
6.5. Information about a SCSI Device: scsiinfo
6.6. Processes: top
6.7. Process List: ps
6.8. Process Tree: pstree
6.9. Who Is Doing What: w
6.10. Memory Usage: free
6.11. Kernel Ring Buffer: dmesg
6.12. File Systems and Their Usage: mount, df, and du
6.13. The /proc File System
6.14. PCI Resources: lspci
6.15. System Calls of a Program Run: strace
6.16. Library Calls of a Program Run: ltrace
6.17. Specifying the Required Library: ldd
6.18. Additional Information about ELF Binaries
6.19. Interprocess Communication: ipcs
6.20. Time Measurement with time