GNU/Linux Desktop Survival Guide by Graham Williams |
|||||
Contains the debian version.
This file contains information to tell NFS (Network File Systems) which partitions are to be shared with other systems.
This file lists filesystems, possibly spread over multiple drives, partitions, and remote hosts, that can be mounted. At boot time, partitions identifed as auto mount will be auto mounted. Other convenient mount rules for CD-ROMS, DVDs, Floppy drives, etc., are usually also included.
This file, and its companion /etc/hosts.deny control access to your computer. The file /etc/hosts.allow lists hosts that are allowed to access the system. If empty then no restrictions apply. Similarly, /etc/hosts.deny is a list of hosts that are not allowed to access the system.
This file is the internet server configuration database and is used to identify services like ftp and ssh which should be started. As a security measure it is advisable to comment services which you do not use.
This file specifies the processes that are started at bootup and at different runlevels.
This file (message of the day) is displayed when a user logs on.
This file contains user information including login name, password, default shell, and home directory. Because this file is readable (and needs to be readable) by everyone on the system, the password field usually contains an x indicating that the encrypted password is actually located in /etc/shadow, which is only readable by the root user. See Section 70.1 for details of sharing this information across multiple hosts.
This file contains common user configurations for interactive shells, such as global environment variables.
This file contains a list of network services and identifies which port a service mentioned in /etc/inetd.conf will use.
This file lists the terminals (ttys) on which root is allowed to login.
This file contains the pathnames of all shells installed in the system. A user is allowed to select one of these shells as their default login shell.