start page | rating of books | rating of authors | reviews | copyrights
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: H
- handshaking
- 1.5.1. Internet Protocol
- 1.6.2. Transmission Control Protocol
- TCP : 2.7.3. Sockets
- three-way : 7.5.2. Border Gateway Protocol
- hash mark (#) for comments
- 3.2. The Host Table
- 5.4. The Internet Daemon
- 7.7.1.1. A host configuration
- 9.1.4. NFS Automounter
- 9.2.1. The printcap File
- 9.4. A BOOTP Server
- A.1.1. The dip Script File
- D.3. The dhcpd.conf Configuration File
- Hayes modems : 6.3.2. Dial-Up PPP
- compatibility problems : 6.4.4. Troubleshooting Serial Connections
- headers
- 1.3. TCP/IP Protocol Architecture
- 1.5.1.1. The datagram
- 3.4.3. Multipurpose Internet Mail Extensions
- .h files : 5.3.1.2. Pseudo-device
- compressing : 5.2. Linux Kernel Configuration
- hello
- command
- 3.4.3. Multipurpose Internet Mail Extensions
- 7.4. Interior Routing Protocols
- messages : 7.5.1. Exterior Gateway Protocol
- packets : 7.4.3. Open Shortest Path First
- statement (in gated) : B.8.3. The hello Statement
- HELO command, in POP : 3.4.2. Post Office Protocol
- HELP command
- in ESMTP : 3.4.3. Multipurpose Internet Mail Extensions
- in nslookup : 8.4. Using nslookup
- in SMTP : 3.4.1. Simple Mail Transfer Protocol
- hierarchy, system : 3.3.1. The Domain Hierarchy
- database system : 9.3.2. NIS+
- of responsibility : 12.1.2.1. Use subnets to distribute control
- High-level Data Link Control (HDLC) : 6.2.1. The Serial Protocols
- high-speed dial-up modems : (see modems)
- HINFO resource records
- 11.6.2. The data is here and the server can't find it!
- C.3.1.7. Host Information record
- hints file : 8.3.3. The Cache Initialization File
- hoaxes about viruses : 12.1.2.2. Use mailing lists to distribute information
- hop
- 1.7. Application Layer
- (see also next-hop route)
- count : 7.4.1.1. Running RIP with routed
- next : 2.5. The Routing Table
- Host Information records : (see HINFO resource records)
- Host-to-Host Transport Layer : (see Transport Layer)
- hosts
- 1.7. Application Layer
- (see also remote, hosts, checking)
- addresses : (see addresses)
- file, caution regarding : 6.1.3. Assigning a Subnet Mask
- list : 12.5.1.1. tcpd access control files
- multi-homed : 1.5.1.2. Routing datagrams
- names (hn) : 3.1. Names and Addresses
- choosing : 4.4.2. Choosing a Hostname
- easing transition from old to new : C.3.1.5. Canonical Name record
- parameter : 9.4. A BOOTP Server
- table
- 3.1. Names and Addresses
- 3.2. The Host Table
- system, problems with : 3.2. The Host Table
- hosts file
- 3.2. The Host Table
- 6.1. The ifconfig Command
- 7.3. Building a Static Routing Table
- 9.1.4. NFS Automounter
- 9.3. Network Information Service
- creating : 3.2. The Host Table
- as maps : 3.3.5. Network Information Service
- modifying : 3.3.4. BIND, resolver, and named
- hosts.allow file : 12.5.1.1. tcpd access control files
- hosts.deny file : 12.5.1.1. tcpd access control files
- hosts.equiv file
- 12.2.5. Secure the r Commands
- 12.4.2. Looking for Trouble
- hosts.lpd file
- 9.2.1.1. LPD security
- 12.4.2. Looking for Trouble
- htable
- command : 3.2. The Host Table
- networks.txt : 3.2. The Host Table
- html text subtype : 3.4.3. Multipurpose Internet Mail Extensions
- HTTP (Hypertext Transfer Protocol)
- 1.7. Application Layer
- 13.1. The World Wide Web
- message subtype : 3.4.3. Multipurpose Internet Mail Extensions
- human error : 11.1.1. Troubleshooting Hints
- hunches, verifying : 10.8.1. Testing Rewrite Rules
- Hypertext Transfer Protocol : (see HTTP)
- hyphen (-) (non-equivalent host) : 12.2.5. Secure the r Commands
Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.