If (heaven forbid!) you find a mistake in the Red Hat Linux 6: Visual QuickPro Guide or on this Web site, please let us know. We'll post corrections and clarifications here.
Report errors to email@example.com.
Send your questions to firstname.lastname@example.org.
In step 9, the last sentence should read:
Tab to the Workstation check box and press Enter to continue.
The last sentence under To restore booting to a visual environment should read:
Set the initial default run level to run level 5.
Step 5 should read:
Check Use PAP Authentication, and click Done.
The first sentence of step 2 should read:
Choose Screen Shot from the Xtns menu in the Gimp toolbox.
The following Tip should appear at the bottom of the page:
Red Hat documentation tells you not to manually edit individual crontab files, so do so at your own risk.
The second bulleted item should read:
Become educated about security tools. A great deal of security software is in the public domain, available at no cost. The Center for Information Technology at the National Institutes of Health maintains a good source for software at www.alw.nih.gov/Security/security-prog.html, where you can download utilities such as tripwire, crack, and COPS. You can use these utilities to make sure that your passwords are up to snuff, and to set traps for intruders (see sidebar).
The index entry for "zulu" shouldn't be there.