Administration

Table of Contents

34. Security in Linux
34.1. Masquerading and Firewalls
34.2. SSH: Secure Network Operations
34.3. Encrypting Partitions and Files
34.4. Security and Confidentiality
35. Access Control Lists in Linux
35.1. Advantages of ACLs
35.2. Definitions
35.3. Handling ACLs
35.4. ACL Support in Applications
35.5. For More Information
36. System Monitoring Utilities
36.1. List of Open Files: lsof
36.2. User Accessing Files: fuser
36.3. File Properties: stat
36.4. USB Devices: lsusb
36.5. Information about a SCSI Device: scsiinfo
36.6. Processes: top
36.7. Process List: ps
36.8. Process Tree: pstree
36.9. Who Is Doing What: w
36.10. Memory Usage: free
36.11. Kernel Ring Buffer: dmesg
36.12. File Systems and Their Usage: mount, df, and du
36.13. The /proc File System
36.14. vmstat, iostat, and mpstat
36.15. procinfo
36.16. PCI Resources: lspci
36.17. System Calls of a Program Run: strace
36.18. Library Calls of a Program Run: ltrace
36.19. Specifying the Required Library: ldd
36.20. Additional Information about ELF Binaries
36.21. Interprocess Communication: ipcs
36.22. Time Measurement with time

SUSE LINUX Administration Guide 9.3