Additional Resources; Installed Documentation; Useful Websites - Red Hat ENTERPRISE LINUX 4 - INTRODUCTION TO SYSTEM ADMINISTRATION Administration Manual

Introduction to system administration
Hide thumbs Also See for ENTERPRISE LINUX 4 - INTRODUCTION TO SYSTEM ADMINISTRATION:
Table of Contents

Advertisement

132

6.4. Additional Resources

This section includes various resources that can be used to learn more about account and resource
management, and the Red Hat Enterprise Linux-specific subject matter discussed in this chapter.

6.4.1. Installed Documentation

The following resources are installed in the course of a typical Red Hat Enterprise Linux installation
and can help you learn more about the subject matter discussed in this chapter.
User Manager Help menu entry — Learn how to manage user accounts and groups.
man page — Learn more about the file format information for the
passwd(5)
man page — Learn more about the file format information for the
group(5)
man page — Learn more about the file format information for the
shadow(5)
man page — Learn how to create or update user accounts.
useradd(8)
man page — Learn how to delete user accounts.
userdel(8)
man page — Learn how to modify user accounts.
usermod(8)
man page — Learn how to update a user's password.
passwd(1)
man page — Learn how to update many users' passwords at one time.
chpasswd(8)
man page — Learn how to change user password aging information.
chage(1)
man page — Learn how to change a user's GECOS (
chfn(1)
man page — Learn how to change a user's login shell.
chsh(1)
man page — Learn how to create a new group.
groupadd(8)
man page — Learn how to delete a group.
groupdel(8)
man page — Learn how to modify a group.
groupmod(8)
man page — Learn how to administer the
gpasswd(1)
man page — Learn how to verify the integrity of the
grpck(1)
files.
man page — Learn how to change group-level ownership.
chgrp(1)
man page — Learn how to change file access permissions.
chmod(1)
man page — Learn how to change file owner and group.
chown(1)

6.4.2. Useful Websites

http://www.bergen.org/ATC/Course/InfoTech/passwords.html — A good example of a document
conveying information about password security to an organization's users.
http://www.crypticide.org/users/alecm/ — Homepage of the author of one of the most popular
password-cracking programs (Crack). You can download Crack from this page and see how many
of your users have weak passwords.
http://www.linuxpowered.com/html/editorials/file.html — a good overview of Linux file permis-
sions.
Chapter 6. Managing User Accounts and Resource Access
/etc/group
/etc/passwd
/etc/group
/etc/shadow
) information.
finger
and
/etc/gshadow
and
/etc/group
/etc/gshadow
file.
file.
file.
files.

Advertisement

Table of Contents
loading

Table of Contents