Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: H
- handshaking
- 1.5.1. Internet Protocol
- 1.6.2. Transmission Control Protocol
- TCP
: 2.7.3. Sockets
- three-way
: 7.5.2. Border Gateway Protocol
- hash mark (#) for comments
- 3.2. The Host Table
- 5.4. The Internet Daemon
- 7.7.1.1. A host configuration
- 9.1.4. NFS Automounter
- 9.2.1. The printcap File
- 9.4. A BOOTP Server
- A.1.1. The dip Script File
- D.3. The dhcpd.conf Configuration File
- Hayes modems
: 6.3.2. Dial-Up PPP
- compatibility problems
: 6.4.4. Troubleshooting Serial Connections
- headers
- 1.3. TCP/IP Protocol Architecture
- 1.5.1.1. The datagram
- 3.4.3. Multipurpose Internet Mail Extensions
- .h files
: 5.3.1.2. Pseudo-device
- compressing
: 5.2. Linux Kernel Configuration
- hello
- command
- 3.4.3. Multipurpose Internet Mail Extensions
- 7.4. Interior Routing Protocols
- messages
: 7.5.1. Exterior Gateway Protocol
- packets
: 7.4.3. Open Shortest Path First
- statement (in gated)
: B.8.3. The hello Statement
- HELO command, in POP
: 3.4.2. Post Office Protocol
- HELP command
- in ESMTP
: 3.4.3. Multipurpose Internet Mail Extensions
- in nslookup
: 8.4. Using nslookup
- in SMTP
: 3.4.1. Simple Mail Transfer Protocol
- hierarchy, system
: 3.3.1. The Domain Hierarchy
- database system
: 9.3.2. NIS+
- of responsibility
: 12.1.2.1. Use subnets to distribute control
- High-level Data Link Control (HDLC)
: 6.2.1. The Serial Protocols
- high-speed dial-up modems
: (see modems)
- HINFO resource records
- 11.6.2. The data is here and the server can't find it!
- C.3.1.7. Host Information record
- hints file
: 8.3.3. The Cache Initialization File
- hoaxes about viruses
: 12.1.2.2. Use mailing lists to distribute information
- hop
- 1.7. Application Layer
- (see also next-hop route)
- count
: 7.4.1.1. Running RIP with routed
- next
: 2.5. The Routing Table
- Host Information records
: (see HINFO resource records)
- Host-to-Host Transport Layer
: (see Transport Layer)
- hosts
- 1.7. Application Layer
- (see also remote, hosts, checking)
- addresses
: (see addresses)
- file, caution regarding
: 6.1.3. Assigning a Subnet Mask
- list
: 12.5.1.1. tcpd access control files
- multi-homed
: 1.5.1.2. Routing datagrams
- names (hn)
: 3.1. Names and Addresses
- choosing
: 4.4.2. Choosing a Hostname
- easing transition from old to new
: C.3.1.5. Canonical Name record
- parameter
: 9.4. A BOOTP Server
- table
- 3.1. Names and Addresses
- 3.2. The Host Table
- system, problems with
: 3.2. The Host Table
- hosts file
- 3.2. The Host Table
- 6.1. The ifconfig Command
- 7.3. Building a Static Routing Table
- 9.1.4. NFS Automounter
- 9.3. Network Information Service
- creating
: 3.2. The Host Table
- as maps
: 3.3.5. Network Information Service
- modifying
: 3.3.4. BIND, resolver, and named
- hosts.allow file
: 12.5.1.1. tcpd access control files
- hosts.deny file
: 12.5.1.1. tcpd access control files
- hosts.equiv file
- 12.2.5. Secure the r Commands
- 12.4.2. Looking for Trouble
- hosts.lpd file
- 9.2.1.1. LPD security
- 12.4.2. Looking for Trouble
- htable
- command
: 3.2. The Host Table
- networks.txt
: 3.2. The Host Table
- html text subtype
: 3.4.3. Multipurpose Internet Mail Extensions
- HTTP (Hypertext Transfer Protocol)
- 1.7. Application Layer
- 13.1. The World Wide Web
- message subtype
: 3.4.3. Multipurpose Internet Mail Extensions
- human error
: 11.1.1. Troubleshooting Hints
- hunches, verifying
: 10.8.1. Testing Rewrite Rules
- Hypertext Transfer Protocol
: (see HTTP)
- hyphen (-) (non-equivalent host)
: 12.2.5. Secure the r Commands
Search |
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1999
O'Reilly & Associates, Inc.
All Rights Reserved.
|