home | O'Reilly's CD bookshelfs | FreeBSD | Linux | Cisco | Cisco Exam  


Book Home

Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: H

handshaking
1.5.1. Internet Protocol
1.6.2. Transmission Control Protocol
TCP : 2.7.3. Sockets
three-way : 7.5.2. Border Gateway Protocol
hash mark (#) for comments
3.2. The Host Table
5.4. The Internet Daemon
7.7.1.1. A host configuration
9.1.4. NFS Automounter
9.2.1. The printcap File
9.4. A BOOTP Server
A.1.1. The dip Script File
D.3. The dhcpd.conf Configuration File
Hayes modems : 6.3.2. Dial-Up PPP
compatibility problems : 6.4.4. Troubleshooting Serial Connections
headers
1.3. TCP/IP Protocol Architecture
1.5.1.1. The datagram
3.4.3. Multipurpose Internet Mail Extensions
.h files : 5.3.1.2. Pseudo-device
compressing : 5.2. Linux Kernel Configuration
hello
command
3.4.3. Multipurpose Internet Mail Extensions
7.4. Interior Routing Protocols
messages : 7.5.1. Exterior Gateway Protocol
packets : 7.4.3. Open Shortest Path First
statement (in gated) : B.8.3. The hello Statement
HELO command, in POP : 3.4.2. Post Office Protocol
HELP command
in ESMTP : 3.4.3. Multipurpose Internet Mail Extensions
in nslookup : 8.4. Using nslookup
in SMTP : 3.4.1. Simple Mail Transfer Protocol
hierarchy, system : 3.3.1. The Domain Hierarchy
database system : 9.3.2. NIS+
of responsibility : 12.1.2.1. Use subnets to distribute control
High-level Data Link Control (HDLC) : 6.2.1. The Serial Protocols
high-speed dial-up modems : (see modems)
HINFO resource records
11.6.2. The data is here and the server can't find it!
C.3.1.7. Host Information record
hints file : 8.3.3. The Cache Initialization File
hoaxes about viruses : 12.1.2.2. Use mailing lists to distribute information
hop
1.7. Application Layer
(see also next-hop route)
count : 7.4.1.1. Running RIP with routed
next : 2.5. The Routing Table
Host Information records : (see HINFO resource records)
Host-to-Host Transport Layer : (see Transport Layer)
hosts
1.7. Application Layer
(see also remote, hosts, checking)
addresses : (see addresses)
file, caution regarding : 6.1.3. Assigning a Subnet Mask
list : 12.5.1.1. tcpd access control files
multi-homed : 1.5.1.2. Routing datagrams
names (hn) : 3.1. Names and Addresses
choosing : 4.4.2. Choosing a Hostname
easing transition from old to new : C.3.1.5. Canonical Name record
parameter : 9.4. A BOOTP Server
table
3.1. Names and Addresses
3.2. The Host Table
system, problems with : 3.2. The Host Table
hosts file
3.2. The Host Table
6.1. The ifconfig Command
7.3. Building a Static Routing Table
9.1.4. NFS Automounter
9.3. Network Information Service
creating : 3.2. The Host Table
as maps : 3.3.5. Network Information Service
modifying : 3.3.4. BIND, resolver, and named
hosts.allow file : 12.5.1.1. tcpd access control files
hosts.deny file : 12.5.1.1. tcpd access control files
hosts.equiv file
12.2.5. Secure the r Commands
12.4.2. Looking for Trouble
hosts.lpd file
9.2.1.1. LPD security
12.4.2. Looking for Trouble
htable
command : 3.2. The Host Table
networks.txt : 3.2. The Host Table
html text subtype : 3.4.3. Multipurpose Internet Mail Extensions
HTTP (Hypertext Transfer Protocol)
1.7. Application Layer
13.1. The World Wide Web
message subtype : 3.4.3. Multipurpose Internet Mail Extensions
human error : 11.1.1. Troubleshooting Hints
hunches, verifying : 10.8.1. Testing Rewrite Rules
Hypertext Transfer Protocol : (see HTTP)
hyphen (-) (non-equivalent host) : 12.2.5. Secure the r Commands


Search | Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1999 O'Reilly & Associates, Inc. All Rights Reserved.