- raid arrays
- testing, 1st
- range of numbers
- generating, 1st, 2nd,
3rd, 4th
- rc command
- backups, 1st
- boot up process
- monitoring, 1st,
2nd, 3rd
- rc file
- daemons, 1st, 2nd,
3rd
- editing, 1st, 2nd,
3rd
- rc files
- backups, 1st
- rebooting, 1st
- rc2 command
- boot up process, 1st,
2nd, 3rd
- rcp command
- remote hosts
- copying files, 1st,
2nd
- read access
- aliases, 1st
- read/write permissions, 1st,
2nd, 3rd
- reading
- commands, 1st
- reboot command, 1st
- remote access, 1st
- system shutdown, 1st,
2nd, 3rd
- workstations, 1st
- reboot time
- system outages
- notification, 1st
- rebooting
- rc files, 1st
- recruiters
- employment, 1st
- advertisements, 1st
- recursive, 1st
- scripts, 1st, 2nd,
3rd, 4th,
5th, 6th,
7th
- redirecting, see discarding, 1st
- redirection, 1st
- reducing
- log files, 1st, 2nd,
3rd, 4th,
5th, 6th,
7th, 8th
- referencing
- TERM environment variable, 1st
- refreshing
- screens, 1st, 2nd,
3rd, 4th,
5th
- relationship
- with users, 1st, 2nd,
3rd, 4th
- remote access
- aliases, 1st
- clear command, 1st
- devices
- unmounting, 1st,
2nd, 3rd
- file servers, 1st
- hosts
- ping, 1st, 2nd,
3rd, 4th
- networks
- configuration, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th, 9th,
10th
- passwords, 1st, 2nd,
3rd
- reboot command, 1st
- restricting, 1st, 2nd,
3rd, 4th,
5th, 6th,
7th, 8th,
9th, 10th,
11th, 12th,
13th, 14th,
14th, 16th,
17th, 18th,
19th
- single-user state, 1st
- Telnet sessions, 1st
- user accounts
- home directory, 1st,
2nd, 3rd,
4th, 5th,
6th
- remote hosts
- aliases, 1st
- arguments, 1st
- configuration
- default, 1st
- copying files, 1st,
2nd, 3rd,
4th, 5th
- DISPLAY environment variable, 1st
- displaying, 1st, 2nd,
3rd
- files
- copying, 1st, 2nd,
3rd, 4th,
5th, 6th,
7th, 8th,
9th, 10th,
11th, 12th,
13th, 14th,
14th, 16th,
17th, 18th,
19th, 20th,
21st
- copying files, 1st,
2nd, 3rd,
4th, 5th
- FTP, 1st, 2nd,
3rd, 4th,
5th, 6th
- NFS, 1st, 2nd,
3rd
- rcp command, 1st,
2nd
- tar command, 1st,
2nd, 3rd,
4th
- hard-coding, 1st
- hosts
- adding to access list, 1st
- permissions, 1st
- plus sign (+), 1st
- software
- testing, 1st
- troubleshooting, 1st
- X Window application
- displaying, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th, 9th,
10th, 11th,
12th, 13th
- remote workstations
- time
- verification, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th, 9th,
10th
- remove command
- permissions, 1st
- removing
- dashes (-), 1st, 2nd
- files, 1st
- dashes (-), 1st,
2nd, 3rd,
4th
- renaming
- files, 1st
- replacement hardware
- system outages
- notification, 1st
- resetting
- getty daemons, 1st,
2nd, 3rd
- restarting
- daemons, 1st, 2nd,
3rd, 4th,
5th, 6th,
7th
- inetd config file, 1st
- inetd config files, 1st
- restoring
- files, 1st, 2nd
- system, 1st
- restricting
- FTP access, 1st, 2nd,
3rd
- remote access, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th, 9th,
10th, 11th,
12th, 13th,
14th, 14th,
16th, 17th,
18th, 19th
- passwords, 1st, 2nd,
3rd
- single-user state, 1st
- telnet
- access, 1st, 2nd,
3rd
- resume verification questions
- administrators
- job interviews, 1st,
2nd, 3rd
- resumes
- achievements, 1st
- contact information, 1st,
2nd
- contracting/consulting, 1st,
2nd, 3rd,
4th
- devices, 1st
- education, 1st, 2nd
- format, 1st, 2nd,
3rd
- keywords, 1st, 2nd,
3rd
- multiple, 1st
- objectives, 1st, 2nd
- operating systems, 1st
- organization affiliations, 1st
- paper type, 1st, 2nd
- sample, 1st, 2nd,
3rd, 4th,
5th, 6th,
7th, 8th,
9th, 10th,
11th, 12th
- scanning, 1st
- size, 1st
- software, 1st
- submitting, 1st
- systems
- listing, 1st
- software, 1st
- updating, 1st
- vendors, 1st
- work experience, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th, 9th
- returning
- computer equipment, 1st,
2nd, 3rd,
4th, 5th
- rewinding
- tapes, 1st, 2nd,
3rd, 4th
- rgrep command
- files
- finding, 1st
- rlogind
- disabling, 1st
- rm -r command
- directories, 1st
- files
- dashes (-), 1st,
2nd, 3rd,
4th
- rm command
- core files, 1st
- dashes (-)
- hiding, 1st, 2nd
- files
- dashes (-), 1st,
2nd, 3rd,
4th, 5th,
6th, 7th
- root files, 1st, 2nd,
3rd, 4th
- root access, 1st
- FTP, 1st
- monitoring, 1st, 2nd,
3rd, 4th,
5th, 6th,
7th, 8th
- UID passwords, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th
- root directory, 1st
- core files, 1st
- root files
- security, 1st, 2nd,
3rd, 4th,
5th
- root filesystem, 1st
- root login, 1st
- root partition
- disk space, 1st
- root password
- clearing, 1st, 2nd,
3rd, 4th,
5th
- root privileges
- users, 1st, 2nd,
3rd, 4th,
5th, 6th
- route
- packets
- static, 1st, 2nd,
3rd
- routed
- disabling, 1st
- routed command
- daemons, 1st, 2nd
- packets, 1st, 2nd
- quiet mode, 1st,
2nd
- server mode, 1st,
2nd, 3rd,
4th
- routers
- troubleshooting, 1st
- routing
- packets
- static, 1st
- rows
- terminals, 1st, 2nd
- rsh command, 1st
- files
- locating, 1st
- rshd
- disabling, 1st
- run command, 1st
- running
- processes
- after log out, 1st,
2nd, 3rd,
4th, 5th
- background, 1st,
2nd
- running, see executing, 1st
© Copyright Macmillan USA.
All rights reserved.