This unix and linux site aims to provide book reviews and free ebook on unix linux, unix commands, unix shell, unix programming, unix shell scripting, unix tutorial, suse linux, rehat linux, debian linux, slackware linux, linux server, linux commands, fedora linux, linux gui, linux networking, unix time sharing concepts, programming linux games, samba-3, motif programming, unix signal programming, and linux complete reference, etc

Online Linux Ebook Library

This linux ebook library contains various ebooks on
  • Linux Documentation
  • Red Hat Linux Documentation
  • Fedora Documentation
  • Suse Linux Documentation

Linux Documentation

  1. Advanced Bash-Scripting Guide
  2. Bash Guide for Beginners
  3. Custom Linux: A Porting Guide
  4. Emacspeak User's Guide
  5. EVMS User Guide
  6. GNU/Linux Command-Line Tools Summary
  7. Guide to Managing Media & Public Relations in Linux
  8. Introduction to Linux
  9. LDP Author Guide
  10. Linux Administration Made Easy
  11. Linux Dictionary
  12. Linux Filesystem Hierarchy
  13. Linux From Scratch
  14. Linux Kernel 2.4 Internals
  15. Linux on the Road
  16. Pocket Linux Guide
  17. The Bugzilla Guide
  18. The Linux Kernel Module Progr. Guide (for Linux kernel 2.4)
  19. The Linux Kernel Module Progr. Guide (for Linux kernel 2.6)
  20. The Linux Network Administrator's Guide, 2nd Edition
  21. The Linux System Administrator's Guide
  22. Windows+BSD+Linux Installation Guide

Red Hat Linux Documentation

  1. Red Hat Enterprise Linux 3
  2. Red Hat Linux 9
  3. Red Hat Linux Reference Guide
  4. Red Hat Linux Security Guide
  5. Red Hat Linux System Administration Primer
  6. Red Hat Linux Glossary
  7. Red Hat Network
  8. Red Hat Cluster Suite/Red Hat GFS
  9. Red Hat Application Server
  10. Red Hat Content Accelerator
  11. Red Hat Database
  12. Embedded DevKit (EDK)
  13. GNUPro Toolkit
  14. eCos
  15. Red Hat Web Application Framework
  16. Red Hat Content Management System
  17. Red Hat Portal Server
  18. Red Hat Collaboration Applications
  19. Source Navigator
  20. Stronghold Enterprise
  21. Red Hat Glossary

Fedora Documentation

  1. Fedora Core Installation Guide
  2. Fedora Core 6 Installation Guide
  3. Fedora Core 5 Installation Guide
  4. Fedora Core 4 Installation Guide
  5. Fedora Core SELinux FAQ
  6. Fedora Core 5 SELinux FAQ
  7. Fedora Core 3 SELinux FAQ
  8. Fedora Core 2 SELinux FAQ
  9. Stateless Linux Tutorial
  10. Udev on Fedora
  11. Understanding and Customizing the Apache HTTP SELinux Policy (Beta Document)
  12. Managing Software with yum
  13. Developer's Guide
  14. Documentation Guide
  15. Translation Quick Start Guide

SuSE Linux Documentation

  1. SuSE Linux 10.2
  2. SuSE Linux 10.1
  3. SuSE Linux 10.0
  4. SuSE Linux 9.3
  5. SuSE Linux 9.2
  6. SuSE Linux 9.1
  7. SuSE Linux 9.0
  8. Start-Up Guide
  9. KDE Quick Start Guide
  10. GNOME Quick Start Guide
  11. KDE User Guide
  12. GNOME User Guide
  13. Reference Guide
  14. AppArmor Administration Guide

I recommend this as a very nice library of linux ebooks available on web.

Click to Read More

Red Hat Linux 7 Unleashed

By William Ball
Welcome to Red Hat Linux!
If you're new to Linux, choosing a Linux distribution to install can be confusing. Relax! You've made the right choice in choosing Red Hat Linux. Nearly 60% of Linux installations either are Red Hat or based on Red Hat Linux. You also made the right choice in choosing Red Hat Linux 7 Unleashed! This is the latest edition of the best-selling book on Red Hat Linux. A whole new team of authors has been put together for this edition with the task of giving you all the details about installing, administering, and using the latest version of the newest and best alternative computer operating system for today's PCs. You'll find CD-ROMs in the back of this book that contain the latest version of Intel-based Red Hat Linux and all the software you'll need to get started.
If you're a fan of Linux, you know that Linux is growing in popularity by leaps and bounds. Even better, major improvements and updates to existing software have been made right along with the increase in the Linux user base—Linux is now even easier to install! You'll also be quite pleased to learn about the new features and improvements included with the latest Linux kernels, such as support for a number of USB devices. If you've read a previous edition of Red Hat Linux Unleashed, take note of the vast number of improvements we've made to this edition. I think you'll agree that Red Hat Linux 7 Unleashed is an indispensable companion for the advanced Linux user.

Debian GNU/Linux Desktop Survival Guide

by Graham Williams
Welcome to the world of GNU/Linux, liberating the computing desktop from the shackles of proprietary interests.
The aim of this book is to get you up to speed with GNU/Linux and to deliver a fun and productive environment. It guides you through the many different regions of a GNU/Linux system with a focus on getting your desktop environment to do what you want it to do. It is comprehensive with basic support for the user who installs and maintains the system themselves (whether in the home, office, club, or school). It provides insights and step-by-step procedures that deal with specific tasks in setting your system up and maintaining it. The book covers many of the core features of a GNU/Linux system and you will gain the knowledge to enjoy and use one of the most comprehensive and useful developments in the history of computing.
The details in this book are presented in the context of Debian GNU/Linux--the most open of the GNU/Linux distributions and the distribution setting the standards for free (as in liberty) software and collaborative developments. In general the details translate directly to Red Hat and other standard distributions of GNU/Linux. A growing number of the applications (including OpenOffice, AbiWord, The Gimp, Dia and gPhoto, to name just a few) are cross-platform developments and run also under MS/Windows. The chapters that cover these applications in this book will also generally apply to those versions.
The structure of this on-line version of the book is basically alphabetical. Each individual chapter aims to be a standalone reference. The book includes an overview of GNU/Linux and its history, a guide to installing GNU/Linux, introductions to the suite of GNU/Linux desktop productivity tools, and recipes for tuning specific parts of a GNU/Linux system.
The book begins with an introduction to the world of GNU/Linux, Free/Libre Open Source Software (as in liberty or free speech, not price or free beer), and the Free and Open Source Software movement. Software covers computer applications that equal, and often surpass, the commercial offerings of the same or equivalent functionality. However, the freedom we are talking about here is more the freedom to choose between the offerings, not necessarily the lack of a purchase fee for the software.
In this book we present historical and philosophical perspectives. Chapter 3 briefly reviews GNU/Linux, the various distributions, the licensing issues, and the freedom that GNU/Linux delivers, and the considerable attack on our freedom represented by software patents and the incredible invested interests and wealth behind the push for software patents.
There are many ways of obtaining GNU/Linux and we only cover the most common approaches. Chapter 4 provides an overview of installing Debian with detailed examples for a number of hardware platforms. Chapter 5 is a brief introduction to some of the essential GNU/Linux utilities that you are likely to come across soon. The Debian packaging system used to manage (and take all of the hard work out of maintaining) packages is described in Chapter 3.5. Setting up the X Window System is covered in Chapter 102. By this stage you will have a system ready to take full advantage of. On a more technical level Chapter 50 shows how simple it is to compile your own kernel to suit your hardware requirements.
The remaining alphabetical chapters cover the Desktop Environment and Debian GNU/Linux administration.
All of the major classes of desktop tools are covered, including word processing, spreadsheets, personal information management, graphics, databases and, of course, games. Also included are chapters covering some of the tools for developers, including emacs and glade. The aim is to set you well on the road to using these tools at a level that is sufficient for many users. Of course, each tool itself deserves, and often has available for it, a book or extensive manuals.
The administration chapters cover very many different topics that let you tune your GNU/Linux system to suit your needs. Not everything here is relevant to everybody, but it brings together many recipes for many of the typical tasks that users sometimes need to know about, again without going into exhaustive detail (which is available elsewhere if you need it or are interested).
So sit back and cherish the liberty of free software and become part of the community that is making computers and the applications they run a benefit to society world wide, rather than a costly privilege.

Oreilly Unix Linux Ebook Sample Chapters

Applying RCS and SCCS
Chapter 3: Basic Source Control Using RCS
Chapter 4: Basic Source Control Using SCCS
BSD Hacks
Chapter 67: Automate Security Patches
Chapter 82: Build a Port Without the Ports Tree
Chapter 100: Fun with X
Chapter 98: Rotate your Signature
Chapter 57: Tighten Security with Mandatory Access Control
Building Embedded Linux Systems
Chapter 5: Kernel Considerations
Building Secure Servers with Linux
Chapter 10: System Log Management and Monitoring
Classic Shell Scripting
Chapter 5: Pipelines Can Do Amazing Things
CVS Pocket Reference
Sample Excerpt: Administrator Commands
Effective awk Programming
Chapter 10: Advanced Features of gawk
Chapter 9: Internationalization with gawk
Essential System Administration
Chapter 11: Backup and Restore
Essential System Administration Pocket Reference
Sample Excerpt: User Accounts
Exim: The Mail Transfer Agent
Chapter 3: Exim Overview
Exploring Expect
Chapter 3: Getting Started With Expect
Exploring the JDS Linux Desktop
Chapter 4: JDS Networking
Extreme Programming Pocket Guide
Sample Excerpt: Roles in Extreme Programming
Fedora Linux
Chapter 1: Quick Start: Installing Fedora
GIMP Pocket Reference
Sample Excerpt: The Toolbox
Greasemonkey Hacks
Chapter 58: Add Keyboard Shortcuts to Google Search Results
Chapter 66: Add Saved Searches to Gmail
Chapter 84: Bypass Annoying Site Registrations
Chapter 94: Compare Book Prices
Chapter 37: Keep Track of Secure Site Passwords
Chapter 76: Make Google More Accessible for Low-Vision Users
Chapter 28: Make Pop-up Titles Prettier
Chapter 89: Syndicate Encrypted Content
Chapter 46: Trace XMLHttpRequest Activity
Hackers & Painters
Chapter 2: Hackers and Painters
High Performance Linux Clusters with OSCAR, Rocks, OpenMosix, and MPI
Chapter 10: Management Software
Knoppix Hacks
Chapter 46: Check for Root Kits
Chapter 40: Create an Emergency Router
Chapter 5: Free Your CD to Make Knoppix Run Faster
Chapter 33: Install Knoppix as a Single-Boot System
Chapter 61: Migrate to a New Hard Drive
Chapter 78: Scan for Viruses
Learning GNU Emacs
Chapter 6: Writing Macros
Learning Red Hat Enterprise Linux and Fedora
Chapter 10: Connecting to the Internet
Learning the bash Shell

Chapter 4: Basic Shell Programming
Learning the Korn Shell
Chapter 4: Basic Shell Programming
Learning the Unix Operating System
Chapter 2: Using Window Systems
Learning the vi Editor
Chapter 8: vi Clones Feature Summary
Linux Cookbook
Chapter 14: Printing with CUPS
Linux Desktop Hacks
Chapter 40: Create Your Own KDE Right-Click Menu Actions
Chapter 8: Jazz Up Your Debian System Boot
Chapter 20: Scrap X11 for Fancy Login Consoles
Chapter 97: Use an iPod with Linux
Chapter 54: View Word and PDF Files from Within Mutt
Linux Desktop Pocket Guide
Chapter 1: Distributions
Linux Device Drivers
Chapter 13: USB Drivers
Linux in a Nutshell
Chapter 4: Boot Methods
Linux in a Windows World
Chapter 7: Using NT Domains for Linux Authentication
Linux Network Administrator's Guide
Chapter 18: Wireless Networking
Linux Pocket Guide
Sample Excerpt: File Properties
Sample Excerpt: Programming with Shell Scripts
Linux Security Cookbook
Chapter 9: Testing and Monitoring (Sample Recipes)
Linux Server Hacks

Chapter 45: Creating a Firewall from the Command Line of any Server
Chapter 79: Distributing Server Load with Round-Robin DNS
Chapter 48: Forwarding TCP Ports to Arbitrary Machines
Chapter 73: Global Search and Replace with Perl
Chapter 58: Monitor System Resources with top
Chapter 15: Playing Hunt the Disk Hog
Chapter 66: Quick Logins with ssh Client Keys
Chapter 90: Simplistic Ad Referral Tracking
Chapter 38: Using rsync over ssh
Linux Server Hacks, Volume Two
Chapter 13: Autostart VNC Servers on Demand
Chapter 48: Create a Copy-on-Write Snapshot of an LVM Volume
Chapter 96: Piece Together Data from the lost+found
Chapter 74: Profile Your Systems Using /proc
Chapter 84: Send Log Messages to Your Jabber Client
Linux Server Security
Chapter 12: System Log Management and Monitoring
Linux Unwired

Chapter 3: Getting On the Network
Managing NFS and NIS
Chapter 15: Debugging Network Problems
Managing Projects with GNU Make
Chapter 12: Debugging Makefiles
Managing RAID on Linux
Chapter 2: Planning and Architecture
Mastering FreeBSD and OpenBSD Securit
Chapter 1: The Big Picture
MySQL in a Nutshell
Chapter 6: Date and Time Functions
Objective-C Pocket Reference
Sample Excerpt: Object Life Cycle
Open Sources 2.0
Sample Excerpt: Introduction
OpenOffice.org Writer
Chapter 2: Writing, Editing, and Reviewing Documents
Physics for Game Developers

Chapter 6: Projectiles
Postfix: The Definitive Guide
Chapter 9: Mail Relaying
Practical PostgreSQL
Chapter 2: Installing PostgreSQL
Programming with Qt
Chapter 8: Container Classes

UNIX at Fermilab

In order to protect against unauthorized access to Fermilab computers, the Computing Division has implemented the Kerberos Network Authentication Service V5, developed at MIT, to provide what is known as strong authentication over the network.
"Authentication" refers to verifying the identities of networked users, clients and servers. "Strong" authentication is a means of verifying these identities without transmitting passwords over the network, and without requiring that the network itself be protected.
Kerberos v5 is the strong authentication program that Fermilab computers are required to run. Kerberos authenticates users by way of exchanging electronic tickets between clients and services. It cleverly encrypts and de-encrypts these tickets before and after transmitting them.
A machine on which Kerberos v5 has been installed and which enforces the Kerberos authentication is referred to as a strengthened or Kerberized machine.
The "heart" of a Kerberos system is the Key Distribution Center (KDC), which maintains a database of member computers and users, and grants authentication requests. The set of member computers make up what's called a "strengthened realm". At Fermilab, the strengthened realm for UNIX machines is called FNAL.GOV.
All UNIX machines at Fermilab are required to be configured such that they are members of the FNAL.GOV realm. Off-site machines used for Fermilab-related work may also be configured as such.
Once you have authenticated to the FNAL.GOV realm on your desktop, you can freely access over the network any computer in this realm on which you have an account, without retyping your (FNAL.GOV) Kerberos password!

Unix Filesystem Hierarchy Standard

By Filesystem Hierarchy Standard Group
Edited by Rusty Russell, Daniel Quinlan, and Christopher Yeoh
This standard consists of a set of requirements and guidelines for file and directory placement under UNIX-like operating systems. The guidelines are intended to support interoperability of applications, system administration tools, development tools, and scripts as well as greater uniformity of documentation for these systems.
The Filesystem
This standard assumes that the operating system underlying an FHS-compliant file system supports the same basic security features found in most UNIX filesystems.
It is possible to define two independent distinctions among files: shareable vs. unshareable and variable vs. static. In general, files that differ in either of these respects should be located in different directories. This makes it easy to store files with different usage characteristics on different filesystems.
"Shareable" files are those that can be stored on one host and used on others. "Unshareable" files are those that are not shareable. For example, the files in user home directories are shareable whereas device lock files are not.
"Static" files include binaries, libraries, documentation files and other files that do not change without system administrator intervention. "Variable" files are files that are not static.
Historical UNIX-like filesystem hierarchies contained both static and variable files under both /usr and /etc.

Basic Unix Tutorial

The University of Chicago
If you are just starting with Unix, you should probably begin by reading the Unix: Getting Your Feet Wet document. If you're already using Unix, or know the information in the "Unix: Getting Your Feet Wet" document, this "Basic Unix" document includes a lot of further information.
So What is Unix, Exactly
Unix is a computer operating system first developed at Bell Labs (and, to get the legal language out of the way, a trademark of AT&T Bell Laboratories). An "operating system" is a master program which coordinates other programs' activities and manages files.
One of the most popular and widespread operating systems in the world, Unix runs on more brands of computers than probably any other operating system in existence. This is partly because Unix is "portable": it is written in C, a high-level, machine-independent language. Programs written on one Unix machine can be easily adapted to other Unix machines (C is particularly well-integrated with the operating system itself).
In addition, Unix is based on a collection of small, easily understood utilities which allow you to connect them in many different ways (and in ways that the authors did not predict), building procedures and sophisticated tasks to suit your own needs. This "Unix philosophy" is often contrasted with monolithic programming environments (IBM mainframes or the Macintosh *** are sometimes mentioned) in which you can only perform tasks the system designers could predict; such systems, while becoming increasingly complex, often have bells and whistles you may not use, and lack those you want.

UNIX Unleashed, Internet Edition

By Robin Burk and David B. Horvath
Our highly popular first edition brought comprehensive, up-to-date information on UNIX to a wide audience. That original edition was already 1,600 pages. The new topics covered in this edition have obliged us to split the second edition into two volumes, namely, the System Administrator's Edition and the Internet Edition, which we'll refer to jointly as "the new" or the second edition. Though each volume can stand alone and may be read independently of the other, they form a complementary set with frequent cross-references. This new edition is written for:
  • People new to UNIX
  • Anyone using UNIX who wants to learn more about the system and its utilities
  • Programmers looking for a tutorial and reference guide to C, C++, Perl, awk, and the UNIX shells
  • System administrators concerned about security and performance on their machines
  • Webmasters and Internet server administrators
  • Programmers who want to write Web pages and implement gateways to server databases
  • Anyone who wants to bring his or her UNIX skills and knowledge base up-to-date

A lot has happened in the UNIX world since the first edition of UNIX Unleashed was released in 1994. Perhaps the most important change is the tremendous growth of the Internet and the World Wide Web. Much of the public Internet depends on UNIX-based servers. In addition, many corporations of all sizes have turned to UNIX as the environment for network and data servers. As UNIX fans have long known, the original open operating system is ideal for connecting heterogeneous computers and networks into a seamless whole.

Click to Read More

UNIX Unleashed, System Administrator's Edition

By Robin Burk and David B. Horvath
This edition of UNIX Unleashed includes a substantial amount of new information describing Internet and World Wide Web technologies in UNIX. New topics include:
  • Programming Web pages with HTML
  • Object-oriented programming in C++
  • Programming Common Gateway Interfaces (CGI) using Perl, C/C++, HTML, and the UNIX shells
  • MIME, the Multipurpose Internet Mail Extension
  • HTTP, the HyperText Transfer Protocol
  • Web servers and server performance

As UNIX becomes the platform of choice for critical network and data applications, UNIX vendors have placed increased emphasis on system maturity, ease-of-use, and security capabilities. Even with the growth of Microsoft Windows NT, UNIX still has a place in the industry. It is more mature, more stable, more scaleable, and has a wider array of applications than NT. Many people claim that NT is the open operating system of the future; that may be true (I have my own personal opinion), but for now, UNIX holds that place.

We've also updated this edition of UNIX Unleashed to bring you current information regarding:

  • Frequently Asked Questions (FAQs) about the most popular variants of UNIX
  • Security issues and the technologies you can use to protect your system and its information against intruders and malicious users
  • The most popular Graphical User Interfaces (GUIs)

As with the original edition, we set out to bring users the most comprehensive, useful, and up-to-date UNIX guide. To meet this goal, we've added nearly two dozen new chapters and have revised much of the original material in the book. The resulting book is so large that it is now divided into two volumes. The System Administrator's Edition introduces UNIX and contains much of the information required for basic users and for systems administrators. The Internet Edition includes advanced information for programmers, Internet/Web developers, and those who need detailed information regarding specific UNIX flavors.

Click to Read More

UNIX ON-LINE Man Pages - Solaris Service

By David Adams
These are the UNIX man pages for the Solaris service, converted to html on the fly by a shell script. Here are the intro pages of each section:

This Unix online manual contains commands available with unix operating system, system administrators commands, commands that are used chiefly for system maintenance and administration purposes, commands found only in the SunOS/BSD Compatibility Package, commands for communicating with other systems, commands associated with Form and Menu Language Interpreter (FMLI), commands specific to the SunOS system, system calls, functions found in various Solaris libraries, shared library and each header used by functions, macros, and external variables, formats of various files, POSIX (IEEE) Standards and the X/Open Specifications, macros, Federated Naming Service (fns, fns_initial_context, fns_policies, and fns_references), character and block devices, STREAMS modules, network protocols, file systems, ioctl requests for driver subsystems and classes.......

Click to Read More

Linux Dictionary Version 0.16

By Binh Nguyen
This document is designed to be a resource for those Linux users wishing to seek clarification on Linux/UNIX/POSIX related terms and jargon. At approximately 24000 definitions and two thousand pages it is one of the largest Linux related dictionaries currently available. Due to the rapid rate at which new terms are being created it has been decided that this will be an active project. We welcome input into the content of this document. At this moment in time half yearly updates are being envisaged.
a-Linux
a-Linux is an x86 floppy-based mini-distribution, where assembly code meets Linux kernel. It contains only programs written in assembly language. It is extemely small, yet functional, and provides HTTP and FTP services out-of-the-box. Initial version 0.17 was released August 17, 2002. A floppy-based distribution. From LWN Distribution List.......

Popular Posts