Linux Guide To Linux Certification 2nd Edition Eckert Schitka PDF Download
Linux Guide To Linux Certification 2nd Edition Eckert Schitka PDF Download
https://ebookultra.com/download/linux-guide-to-linux-
certification-2nd-edition-eckert-schitka/
https://ebookultra.com/download/rhcsa-rhce-red-hat-linux-
certification-study-guide-exams-ex200-ex300-6th-edition-certification-
press-michael-jang/
https://ebookultra.com/download/guide-to-parallel-operating-systems-
with-windows-7-and-linux-2nd-edition-ron-carswell/
https://ebookultra.com/download/linux-pocket-guide-4th-edition-daniel-
barrett/
https://ebookultra.com/download/linux-cookbook-essential-skills-for-
linux-users-and-system-network-administrators-2nd-ed-2nd-edition-
carla-schroder/
A Practical Guide to Linux Commands Editors and Shell
Programming 2nd Edition Mark G. Sobell
https://ebookultra.com/download/a-practical-guide-to-linux-commands-
editors-and-shell-programming-2nd-edition-mark-g-sobell/
https://ebookultra.com/download/linux-pocket-guide-1st-edition-daniel-
j-barrett/
https://ebookultra.com/download/linux-study-guide-1st-edition-
roderick-w-smith/
https://ebookultra.com/download/linux-pocket-guide-3rd-edition-daniel-
j-barrett/
https://ebookultra.com/download/maximum-linux-security-2nd-edition-
john-ray/
Linux Guide to Linux Certification 2nd Edition Eckert
Schitka Digital Instant Download
Author(s): Eckert Schitka, Jason W. Eckert, M. John Schitka
ISBN(s): 9780619216214, 0619216212
Edition: 2
File Details: PDF, 7.44 MB
Year: 2005
Language: english
This is an electronic version of the print textbook. Due to electronic rights restrictions, some third party content may
be suppressed. Editorial review has deemed that any suppressed content does not materially affect the overall
learning experience. The publisher reserves the right to remove content from this title at any time if subsequent rights
restrictions require it. For valuable information on pricing, previous editions, changes to current editions, and
alternate formats, please visit www.cengage.com/highered to search by ISBN#, author, title, or keyword for
materials in your areas of interest.
Linux+ Guide to
Linux® Certification
Second Edition
Jason W. Eckert
M. John Schitka
COPYRIGHT © 2006 Course Technology, ALL RIGHTS RESERVED. No part of this Disclaimer
a division of Thomson Learning, Inc. work covered by the copyright hereon Course Technology reserves the right to
Thomson Learning™ is a trademark may be reproduced or used in any form revise this publication and make
used herein under license. or by any means—graphic, electronic, or changes from time to time in its content
mechanical, including photocopying, without notice.
Printed in Canada recording, taping, Web distribution, or
information storage and retrieval ISBN 0-619-21621-2
1 2 3 4 5 6 7 8 9 WC 08 07 06 05 systems—without the written permis-
sion of the publisher.
For more information, contact Course
Technology, 25 Thomson Place, Boston, For permission to use material from this
Massachusetts, 02210. text or product, submit a request online
at www.thomsonrights.com.
Or find us on the World Wide Web at:
www.course.com
BRIEF
Contents
INTRODUCTION xi
CHAPTER ONE
Introduction to Linux 1
CHAPTER TWO
Preparing for Linux Installation 45
CHAPTER THREE
Linux Installation and Usage 77
CHAPTER FOUR
Exploring Linux Filesystems 123
CHAPTER FIVE
Linux Filesystem Management 181
CHAPTER SIX
Linux Filesystem Administration 233
CHAPTER SEVEN
Advanced Installation 287
CHAPTER EIGHT
Working with the BASH Shell 329
CHAPTER NINE
System Initialization and X Windows 379
CHAPTER TEN
Managing Linux Processes 433
CHAPTER ELEVEN
Common Administrative Tasks 473
CHAPTER TWELVE
Compression, System Backup, and Software Installation 521
CHAPTER THIRTEEN
Troubleshooting and Performance 569
CHAPTER FOURTEEN
Network Configuration 607
CHAPTER FIFTEEN
Configuring Network Services and Security 653
iv Linux+ Guide to Linux® Certification Second Edition
APPENDIX A
Certification 695
APPENDIX B
GNU Public License 701
APPENDIX C
Finding Linux Resources on the Internet 707
GLOSSARY 711
INDEX 735
TABLE OF
Contents
INTRODUCTION xi
CHAPTER ONE
Introduction to Linux 1
Operating Systems 2
The Linux Operating System 4
Versions of the Linux Operating System 4
Identifying Kernel Versions 5
Licensing Linux 6
Linux Advantages 10
The History of Linux 16
UNIX 16
The Hacker Culture 17
Linux 19
Linux Distributions 20
Common Uses of Linux 24
Internet Servers 25
File and Print Servers 30
Application Servers 30
Supercomputers 32
Scientific/Engineering Workstation 32
Office Workstation 34
Chapter Summary 34
Key Terms 35
Review Questions 39
Discovery Exercises 42
CHAPTER TWO
Preparing for Linux Installation 45
Understanding Hardware 46
Central Processing Units (CPUs) 46
Physical Memory 48
Disk Drives 50
Mainboards and Peripheral Components 53
Video Adapter Cards and Monitors 56
Keyboards and Mice 57
Gathering Preinstallation Information 58
Gathering Hardware Information 60
Gathering Software Information 63
Chapter Summary 65
Key Terms 66
Review Questions 70
Hands-on Projects 73
Discovery Exercises 74
vi Linux+ Guide to Linux® Certification Second Edition
CHAPTER THREE
Linux Installation and Usage 77
Installing Linux 78
Installation Methods 78
Performing the Installation 78
Basic Linux Usage 99
Shells,Terminals, and the Kernel 99
Basic Shell Commands 102
Shell Metacharacters 104
Getting Command Help 106
Shutting Down the Linux System 109
Chapter Summary 110
Key Terms 111
Review Questions 112
Hands-on Projects 115
Discovery Exercises 122
CHAPTER FOUR
Exploring Linux Filesystems 123
The Linux Directory Structure 124
Changing Directories 125
Viewing Files and Directories 128
File Types 128
Filenames 129
Listing Files 130
Wildcard Metacharacters 135
Displaying the Contents of Text Files 136
Displaying the Contents of Binary Files 143
Searching for Text Within Files 144
Regular Expressions 145
The grep Command 146
Editing Text Files 149
The vi Editor 149
Other Common Text Editors 158
Chapter Summary 162
Key Terms 162
Review Questions 164
Hands-on Projects 167
Discovery Exercises 178
CHAPTER FIVE
Linux Filesystem Management 181
The Filesystem Hierarchy Standard 182
Managing Files and Directories 183
Finding Files 188
Linking Files 192
File and Directory Permissions 196
File and Directory Ownership 196
Managing File and Directory Permissions 199
Default Permissions 206
Special Permissions 208
Chapter Summary 212
Key Terms 213
Review Questions 215
Table of Contents vii
CHAPTER SIX
Linux Filesystem Administration 233
The /dev Directory 234
Filesystems 237
Filesystem Types 237
Mounting 238
Working with Floppy Disks 240
Working with CD-ROMs 248
Working with Hard Disks 250
Hard Disk Partitioning 250
Working with Hard Disk Partitions 254
Monitoring Filesystems 261
Disk Usage 261
Checking Filesystems for Errors 264
Hard Disk Quotas 267
Chapter Summary 271
Key Terms 271
Review Questions 273
Hands-on Projects 277
Discovery Exercises 284
CHAPTER SEVEN
Advanced Installation 287
Advanced Hardware Configuration 288
SCSI Hard Disk Drive Configuration 288
Mainboard Flow Control: IRQs , DMAs , and I/O Addresses 290
Plug-and-Play 293
APM and ACPI 294
RAID Configuration 295
Installation Methods 297
DVD Installation 298
Hard Disk Installation 298
Network-Based Installations 301
Automating Linux Installations 304
Troubleshooting Installation 307
Problems Starting the Installation 308
Problems During Installation 308
Problems After Installation 309
Chapter Summary 316
Key Terms 316
Review Questions 318
Hands-on Projects 321
Discovery Exercises 326
CHAPTER EIGHT
Working with the BASH Shell 329
Command Input and Output 330
Redirection 331
Pipes 335
Shell Variables 343
Environment Variables 343
User-Defined Variables 348
viii Linux+ Guide to Linux® Certification Second Edition
CHAPTER NINE
System Initialization and X Windows 379
The Boot Process 380
Boot Loaders 381
LILO 381
GRUB 384
Dual Booting Linux 389
Linux Initialization 395
Runlevels 395
The /etc/ inittab file 398
Configuring Daemon Startup 402
The X Windows System 404
Linux GUI Components 404
Starting and Stopping X Windows 410
Configuring X Windows 412
Chapter Summary 417
Key Terms 418
Review Questions 420
Hands-on Projects 424
Discovery Exercises 430
CHAPTER TEN
Managing Linux Processes 433
Linux Processes 434
Viewing Processes 435
Killing Processes 443
Process Execution 445
Running Processes in the Background 447
Process Priorities 449
Scheduling Commands 452
Scheduling Commands with atd 452
Scheduling Commands with crond 455
Chapter Summary 459
Key Terms 460
Review Questions 462
Hands-on Projects 465
Discovery Exercises 470
CHAPTER ELEVEN
Common Administrative Tasks 473
Printer Administration 474
The Common UNIX Printing System 474
Managing Print Jobs 476
Table of Contents ix
CHAPTER TWELVE
Compression, System Backup, and Software Installation 521
Compression 522
The compress Utility 522
The gzip utility 525
The bzip2 utility 527
System Backup 529
The tar Utility 531
The cpio Utility 535
The dump/restore Utility 537
Burning Software 542
Software Installation 542
Compiling Source Code into Programs 544
Installing Programs Using RPM 552
Chapter Summary 556
Key Terms 557
Review Questions 558
Hands-on Projects 561
Discovery Exercises 567
CHAPTER THIRTEEN
Troubleshooting and Performance 569
Troubleshooting Methodology 570
Resolving Common System Problems 572
Hardware-Related Problems 573
Software-Related Problems 575
Performance Monitoring 580
Monitoring Performance with sysstat Utilities 581
Other Performance Monitoring Utilities 587
Customizing the Kernel 589
Kernel Modules 589
Compiling a New Linux Kernel 592
Patching the Linux Kernel 595
Chapter Summary 596
Key Terms 596
Review Questions 598
Hands-on Projects 601
Discovery Exercises 606
x Linux+ Guide to Linux® Certification Second Edition
CHAPTER FOURTEEN
Network Configuration 607
Networks and TCP/IP 608
The TCP/IP Protocol 609
TCP/IP Classes and Subnetting 612
Configuring a NIC Interface 614
Configuring a PPP Interface 619
Name Resolution 626
Connecting to Network Resources 629
Downloading Files Using FTP 629
Accessing Files with NFS 632
Accessing Windows Files 633
Running Remote Applications 635
Accessing E-mail 638
Chapter Summary 640
Key Terms 641
Review Questions 642
Hands-on Projects 645
Discovery Exercises 651
CHAPTER FIFTEEN
Configuring Network Services and Security 653
Network Services 654
Identifying Network Services 654
Configuring Common Network Services 657
Routing and Firewall Services 669
Security 674
Securing the Local Computer 674
Protecting Against Network Attacks 676
Detecting Intrusion 679
Chapter Summary 681
Key Terms 681
Review Questions 683
Hands-on Projects 686
Discovery Exercises 693
APPENDIX A
Certification 695
Linux+ Certification 696
Linux+ Certification Objectives 697
APPENDIX B
GNU Public License 701
APPENDIX C
Finding Linux Resources on the Internet 707
GLOSSARY 711
INDEX 735
Introduction
“...In a future that includes competition from open source, we can expect that the eventual destiny
of any software technology will be to either die or become part of the open infrastructure itself.”
Eric S. Raymond,The Cathedral and the Bazaar
A s Eric S. Raymond reminds us, Open Source Software will continue to shape the
dynamics of the computer software industry for the next long while, just as it has
done for the last decade. Created and perpetuated by hackers, Open Source Software
refers to software in which the source code is freely available to anyone who wishes to
improve it (usually through collaboration). And, of course, at the heart of Open Source
Software lies Linux — an operating system whose rapid growth has shocked the world
by demonstrating the nature and power of the Open Source model.
However, as Linux continues to grow, so must the number of Linux-educated users,
administrators, developers, and advocates.Thus, we find ourselves in a time when Linux
education is of great importance to the Information Technology industry. Key to demon-
strating ability with Linux is the certification process. The Linux+ Guide to Linux®
Certification, Second Edition uses carefully constructed examples, questions, and practical
exercises to prepare readers with the necessary information to obtain the sought-after
Linux+ certification from the Computing Technology Industry Association, or CompTIA.
The Linux+ certification may also be used to fulfill the UNIX module of the cSAGE
certification, which is geared toward junior-level system engineers. Once candidates pass
the Linux+ exam, they are required only to pass the cSAGE core exam to earn the cSAGE
Certification designation. Whatever your ultimate goal, you can be assured that reading
this book in combination with study, creativity, and practice, will make the Open Source
world come alive for you as it has for many others.
Chapter 2, “Preparing for Linux Installation” introduces the various hardware compo-
nents inside a computer, as well as methods that can be used to collect hardware and soft-
ware information prior to installing the Linux operating system.
Chapter 3,“Linux Installation and Usage” walks through a typical Linux installation given
the hardware and software information collected in the previous chapter. As well, this
chapter describes how to interact with a Linux system via a terminal and enter basic com-
mands into a Linux shell such as those used to obtain help and properly shutdown the system.
Chapter 4,“Exploring Linux Filesystems” outlines the Linux filesystem structure, and the
types of files that can be found within it.As well, this chapter discusses commands that can
be used to view and edit the content of those files.
Chapter 5, “Linux Filesystem Management” covers those commands that can be used
to locate and manage files and directories on a Linux filesystem. Furthermore, this chap-
ter outlines the different methods used to link files as well as how to interpret and set file
and directory permissions.
Chapter 6, “Linux Filesystem Administration” discusses how to create, mount, and man-
age filesystems in Linux. This chapter also discusses the various filesystems available for
Linux systems and the device files that are used to refer to the devices which may contain
these filesystems.
Chapter 7,“Advanced Installation” introduces advanced hardware concepts and configu-
rations that may prove useful when installing Linux. As well, this chapter discusses differ-
ent methods that may be used to install Linux as well as common problems that may occur
during installation, and their resolutions.
Chapter 8,“Working with the BASH Shell” covers the major features of the BASH shell
including redirection, piping, variables, aliases, and environment files. Also, this chapter
details the syntax of basic shell scripts.
Chapter 9, “System Initialization and X Windows” covers the different bootloaders that
may be used to start the Linux kernel and dual-boot the Linux operating system with
other operating systems such as Windows. This chapter also discusses how daemons are
started during system initialization as well as how to start and stop them afterwards. Finally,
this chapter discusses the structure of Linux Graphical User Interfaces as well as their con-
figuration and management.
Chapter 10,“Managing Linux Processes” covers the different types of processes, as well as
how to view their attributes, change their priority, and kill them. Furthermore, this chap-
ter discusses how to schedule processes to occur in the future using various utilities.
Chapter 11, “Common Administrative Tasks” details three important areas of system
administration: printer administration, log file administration, and user administration.
Introduction xiii
Chapter 12, “Compression, System Backup, and Software Installation” describes utilities
that are commonly used to compress or back up files on a Linux filesystem. As well, this
chapter discusses how to install software from source code as well as using the Red Hat
Package Manager (RPM).
Chapter 13, “Troubleshooting and Performance” discusses the system maintenance cycle
as well as good troubleshooting procedures for solving hardware and software problems.
Also, this chapter outlines utilities that can be used to monitor and pinpoint the cause of
performance problems, as well as how to patch and recompile the kernel to fix software,
hardware, and performance problems.
Chapter 14, “Network Configuration” introduces networks, network utilities, and the
TCP/IP protocol, as well as how to configure the TCP/IP protocol on a NIC or PPP
interface. In addition, this chapter details the configuration of name resolution.
Chapter 15, “Configuring Network Services and Security” introduces commonly con-
figured Linux network services and their configuration, as well as firewall and routing ser-
vices. In addition, this chapter details the concepts and tools that may be used to secure a
Linux computer locally and from across a network.
Additional information is also contained in the appendices at the rear of the book.
Appendix A discusses the certification process with emphasis on the Linux+ certification
and how the objective list for the Linux+ certification matches each chapter in the text-
book. Appendix B is a copy of the GNU Public License. Appendix C explains how to
find Linux resources on the Internet and lists some common resources by category.
Features
To ensure a successful learning experience, this book includes the following pedagogical
features:
■ Chapter Objectives: Each chapter in this book begins with a detailed list of the
concepts to be mastered within that chapter.This list provides you with a quick ref-
erence to the contents of that chapter, as well as a useful study aid.
■ Screenshots, Illustrations, and Tables: Wherever applicable, screenshots and
illustrations are used to aid you in the visualization of common installation, admin-
istration and management steps, theories, and concepts. In addition, many tables pro-
vide command options that may be used in combination with the specific command
being discussed.
■ End-of-Chapter Material: The end of each chapter includes the following fea-
tures to reinforce the material covered in the chapter:
■ Chapter Summary: Gives a brief but complete summary of the chapter
■ Key Terms List: Lists all new terms and their definitions
xiv Linux+ Guide to Linux® Certification Second Edition
■ Review Questions: Test your knowledge of the most important concepts covered
in the chapter
■ Hands-on Projects: Are preceded by the Hands-on icon and a description of the
exercise that follows.These projects contain specific step-by-step instructions that
enable you to apply the knowledge gained in the chapter
■ Discovery Exercises: Include theoretical, research, or scenario-based projects
■ On the CD-ROM: On the CD-ROMs included with this text you will find a
copy of Fedora Linux.
■ CoursePrep® Test Prep Software: Test preparation software for the revised
Linux+ Certification Exam will become available approximately 90 days after the
final Linux+ exam is released. It will be available to download free of charge from
Course Technology’s website at http://www.course.com. Search for this book title, then
click on the link for “Student Downloads.” Click on the list for the CoursePrep to
download the software. The user name and password is: testprep. This password is
case-sensitive and does not contain a space between the two words. Once the
revised test preparation software is available, it will automatically be included on
CD-ROM in this book.
Tips are included from the authors’ experiences that provide additional real-
world insights into the topic being discussed.
Tip
Notes are used to present additional helpful material related to the subject being
described.
Note
Instructor’s Materials
The following supplemental materials are available when this book is used in a classroom
setting. All of the supplements available with this book are provided to the instructor on a
single CD-ROM.
■ Electronic Instructor’s Manual: The Instructor’s Manual that accompanies this
textbook includes additional instructional material to assist in class preparation, includ-
ing suggestions for classroom activities, discussion topics, and additional projects.
Introduction xv
■ Solutions: Answers to all end-of-chapter materials are provided, including the Review
Questions, and, where applicable, Hands-on Projects and Discovery Exercises.
■ ExamView®: This textbook is accompanied by ExamView, a powerful testing soft-
ware package that allows instructors to create and administer printed, computer
(LAN-based), and Internet exams. ExamView includes hundreds of questions that
correspond to the topics covered in this text, enabling students to generate detailed
study guides that include page references for further review. The computer-based
and Internet testing components allow students to take exams at their computers,
and also save the instructor time by grading each exam automatically.
■ PowerPoint presentations: This textbook comes with Microsoft PowerPoint slides
for each chapter.These are included as a teaching aid for classroom presentation, to
make available to students on the network for chapter review, or to be printed for
classroom distribution. Instructors, please feel at liberty to add your own slides for
additional topics you introduce to the class.
■ Figure Files: All of the figures in this textbook are reproduced on the Instructor’s
Resource CD in bit-mapped format. Similar to the PowerPoint presentations, these
are included as a teaching aid for classroom presentation, to make available to stu-
dents for review, or to be printed for classroom distribution.
Lab Requirements
The following hardware is required for the Hands-on Projects at the end of each chapter
and should be listed on the Hardware Compatibility List available at www.redhat.com:
■ Pentium CPU (Pentium II 400 or higher recommended)
■ 256 MB RAM (512 MB RAM recommended)
■ 8 GB hard disk
■ CD-ROM drive
■ 3.5" floppy diskette drive
■ Network Interface Card
■ Internet connection
xvi Linux+ Guide to Linux® Certification Second Edition
Similarly, the following lists the software required for the Hands-on Projects at the end of
each chapter:
■ Red Hat Fedora Linux (Core 2)
■ Bluefish 0.13 source code in tarball format (available from http://www.sourceforge.net )
■ Tripwire 2.3-47 compiled program for the Intel i386 architecture in RPM format
(available from http//www.tripwire.org )
ACKNOWLEDGMENTS
First, we wish to thank the staff at Course Technology for an overall enjoyable experience
writing a textbook on Linux that takes a fundamentally different approach than traditional
textbooks. More specifically, we wish to thank our Project Manager, Manya Chylinski, for
her coordination and insight, as well as our Developmental Editor, Dave George, and
Production Editor, Elena Montillo, for the long hours they spent pulling everything
together to transform the text into its current state. As well, we wish to thank Moirag
Haddad at Digital Content Factory for her advice and guidance, and Frank Gerencser, of
triOS College for freeing us up to write this textbook and his continuous encouragement
for writing books to augment teaching.
Jason W. Eckert: I must take this time to thank my co-author, M. John Schitka for the hard
work, long hours, and dedication he spent on this book. As well, I thank Starbucks Coffee
for keeping me on schedule, and most importantly, my daughter Mackenzie for providing
me with many of the examples used in this textbook as well as teaching me that having
fun playing basketball is more important than writing a textbook.
M. John Schitka: First I want to thank my mentor and co-author Jason W. Eckert for his
insight, patience, and wisdom during the long hours and late nights that went into the cre-
ation of this textbook. More importantly I must thank my family, my wife Jill, and chil-
dren Kyra, Luke, and Noah for their support, tolerance, and patience during the time it
took to write this textbook. Hopefully readers will find it enlightening and of benefit in
their educational journey.
Finally, we wish to acknowledge the encouragement of our colleagues Mitch Mijailovic
and Tonio Mladineo; if it were not for them, I doubt we would love the Linux operating
system as much as we do today.
Readers are encouraged to e-mail comments, questions, and suggestions regarding Linux+
Guide to Linux® Certification, Second Edition to the authors:
Jason W. Eckert: [email protected]
M. John Schitka: [email protected]
CHAPTER
1
INTRODUCTION TO LINUX
After completing this chapter, you will be able to:
♦ Understand the purpose of an operating system
♦ Outline the key features of the Linux operating system
♦ Describe the origins of the Linux operating system
♦ Identify the characteristics of various Linux distributions and where to
find them
♦ Explain the common uses of Linux in industry today
1
2 Chapter 1 Introduction to Linux
OPERATING SYSTEMS
Every computer has two fundamental types of components: hardware and software.
Hardware consists of the physical components inside a computer and are electrical in
nature; they contain a series of circuits that are used to manipulate the flow of information.
A computer can have many different pieces of hardware in it, including the following:
■ A processor, which computes information (also known as the central processing
unit or CPU)
■ Physical memory, which stores information needed by the processor (also known
as random access memory or RAM)
■ Hard disk drives, which store most of the information that you use
■ Floppy disk drives, which store information on floppy disks
■ CD-ROM drives, which read information from CD-ROMs
■ Sound cards, which provide sound to external speakers
■ Video cards, which display results to the computer monitor
■ Circuit boards, which hold and provide electrical connections between various
hardware components (also known as mainboards or motherboards)
Software, on the other hand, refers to the sets of instructions or programs that understand
how to use the hardware of the computer in a meaningful way; they allow different hardware
to interact with, as well as manipulate data (or files) commonly used with programs. When
a bank teller types information into the computer behind the counter at a bank, for example,
that bank teller is using a program that understands what to do with your bank records.
Programs and data are usually stored on hardware media, such as CD-ROMs, hard disks, or
floppy disks, although they can also be stored on other media or even embedded in
computer chips. These programs are loaded into various parts of your computer hardware
(such as your computer’s memory and processor) when you first turn on your computer, and
when you start additional software, such as word processors or Internet browsers. After a
program is executed on your computer’s hardware, that program is referred to as a process.
Thus, the difference between a program and a process is small. A program is a file stored on
your computer, whereas a process is that file in action, performing a certain task.
Two different types of programs are executed on a computer: applications, which include
those programs designed for a specific use and with which you commonly interact, such as
word processors, computer games, graphical manipulation programs, and computer system
utilities, and operating system (OS) software, which consists of a series of software
components used to control the hardware of your computer. Without an operating system,
Other documents randomly have
different content
“Out with it!” said Johnny, impatiently, “you’re afraid—what?”
“I’m afraid that’s what the priest and the Levite said,” finished
Tiny, slowly.
“What do you?—oh yes, I suppose you mean about the Good
Samaritan, and, ‘now which of these was neighbor?’ Is that what
you’re driving at?”
Tiny nodded again, even more earnestly than before.
“Now that’s very queer,” said Johnny, musingly, “but Jim said
almost exactly the same thing. He’s picked up a little lame fellow—
no relation to him at all, and no more his concern than anybody’s
else—and he’s keeping the boys off him, and behaving as if he was
the little chap’s grandmother, and I do believe it is all because of
things mamma has said to him. He doesn’t know about Ned Owen;
what he said was because I happened to catch him grandmothering
this little Taffy, as he calls him, but it was just exactly as if he had
known all about everything. It’s very well for him; he isn’t all mixed
up with the other bootblacks, the way I am with the boys at school,
and he can do as he pleases, but don’t you see, Tiny, what a mess I
should get myself into, right away, if I began to take up for that boy
against all the others?”
Tiny replied with what Johnny considered
needless emphasis,—
“I don’t see it at all, Johnny Leslie, and
what’s more, I don’t believe you do either! The
boys at school would only laugh at you, if the
worst came to the worst, and I’m pretty sure,
from things Jim has told mamma, that the kind
of boys he knows would just as lief kick him,
or knock him down, if they were big enough,
as to look at him! And if you’d stand up for
that poor little boy, I think some more of them would, too. Don’t you
remember, papa said boys were a good deal like sheep; that if one
went over the fence, the whole flock would come after him;
sometimes, I wish I could do something for that boy! I don’t see
how you can bear to let them all make fun of him, and never say a
word, when it made you so mad, that time, when those two dreadful
boys tried to hang my kitten. It seems to me it’s exactly the same
thing!”
Tiny’s face was quite red by the time she had finished this long
speech, and Johnny’s, though for a very different reason, was red
too. He had been angry with Tiny, at first, but before she stopped
speaking, his anger had turned against himself. She was a little
frightened at her own daring in “speaking up” to Johnny in this way,
but she soon saw that her fright was needless.
“Tiny,” he said, solemnly, after a rather long pause, “you can’t
expect me to wish I was a girl, you know, they do have such flat
times, but I will say I think its easier for them to be good than it is
for boys,—in some ways, anyhow,—and I think I must be the
beginning of a snob! You didn’t even look foolish the day mamma
took Jim with us to see the pictures, and we met pretty much
everybody we knew, and my face felt red all the time. I’m really very
much obliged to you for shaking me up. I shall talk it all out with
mamma, now, and see if I can’t settle myself. To think how much
better a fellow Jim is than I am, when I’ve had mamma and papa
and you, and he don’t even know whether he had any mother at
all!” And Johnny gave utterance to his feelings in something between
a howl and a groan. To his great consternation, Tiny burst into a
passion of crying, hugging him, and trying to talk as she sobbed.
When he at last made out what she was saying, it was something
like this,—
“I thought you were going to be mean and horrid—and you’re
such a dear boy—and I couldn’t bear to have you like that—and I
love you so—oh, Johnny!”
Johnny may live to be a very old man; I hope he will, for good
men are greatly needed, but no matter how long he lives, he will
never forget the feelings that surged through his heart when he
found how bitter it was to his little sister to be disappointed in him.
He hugged her with all his might, and in a very choked voice he told
her that he hoped she’d never have to be ashamed of him again—
that she shouldn’t if he could possibly help it.
And after the talk with his mother that night, he hunted up the
“silken sleeve,” which he had worn until it was threadbare, and then
put away so carefully that he had a hard time to find it. It was too
shabby to be put on his hat again, but somehow he liked it better
than a newer one, and he stuffed it into his jacket, when he dressed
the next morning, about where he supposed his heart to be. He
reached the schoolhouse a few minutes before the bell rang, and
found everybody but Ned Owen laughing and talking. He was sitting
at his desk with a book, on which his eyes were intently fixed, held
before him, but his cheeks were flushed, and his lips pressed tightly
together.
Johnny did not hear anything but a confusion of voices, but he
could easily guess what the talk had been about. He walked straight
to his desk, and, laying his hand with apparent carelessness on
Ned’s shoulder, he glanced down at the open history, saying, in his
friendliest manner, which was very friendly,—
“It’s pretty stiff to-day, isn’t it? I wish I could reel off the dates the
way you do, but every one I learn seems to drive out the one that
went in before it!”
The flush on Ned’s face deepened, and he looked up with an
expression of utter astonishment, which made Johnny tingle with
shame from the crown of his head to the soles of his feet. And
Johnny thought afterward how, if the case had been reversed, he
would have shaken off the tardy hand and given a rude answer to
the long-delayed civility.
Ned replied, very quietly,—
“It is a little hard to-day, but not half so hard as—some other
things!”
And just then the laughing and talking suddenly stopped, for Mr.
Lennox opened the door, but Johnny had already heard a subdued
whistle from one quarter and a mocking “Since when?” from
another, and, what, was worse, he was sure Ned had heard them
too.
To some boys it would have been nothing but a relief to find that,
as Tiny had suggested, Ned’s persecutors were very much like
sheep, and, with but few exceptions, followed Johnny’s lead before
long, and made themselves so friendly that only a very vindictive
person could have stood upon his dignity, and refused to respond.
Ned was not vindictive, but he was shy and reserved; he had been
hurt to the quick by the causeless cruelty of his schoolmates, and it
was many days before he was “hail fellow well met” with them,
although he tried hard not only to forgive, but to do what is much
more difficult—forget.
As for Johnny, when he saw how, after a trifling hesitation, a few
meaningless jeers and taunts, the tide turned, and Ned was taken
into favor, his heart was full of remorse. It seemed to him that he
had never before so clearly understood the meaning of the words,
“Inasmuch as ye did it not to the least of these My brethren, ye did
it not to Me.”
Some one has likened our life to a journey; we keep on, but we
can never go back, and, as “we shall pass this way but once,” shall
we not keep a bright lookout for the chances to help, to comfort, to
encourage? How many loads we might lighten, how many rough
places we might make smooth for tired feet! Not a day passes
without giving us opportunities. Think how beautiful life might be
made, and, then,—think what most of us make of it! Travellers will
wander fearlessly through dark and winding ways with a torch to
light their path, and a slender thread as a clue to lead them back to
sunlight and safety. The Light of the World waits to “lighten our
darkness, that we sleep not in death.” If we “hold fast that which is
good,” we have the clue.
CHAPTER XI.
BATTLE AND VICTORY.
“I don’t see anything so very queer about it, myself,” said Johnny,
contentedly, adding, with a little enjoyment of having the best of it,
for once, with Jim, “papa says, that if we think more than two
people are queer to us, we may be pretty sure that we are the queer
ones, and that the rest of the world is about as usual—at least,
that’s the sense of what he said; I don’t remember the words
exactly.”
“I wasn’t thinking of myself just then, for a wonder!” said Jim,
with the slightly mocking expression on his face which Johnny did
not like. “It’s a good enough world for me, but when I see a little
chap like Taffy getting all the kicks and none of the halfpence, I
don’t know exactly what to think. He’s taken a new turn, lately;
twisted up with pain, half the time, and as weak as a kitten, the
other half.”
“Where is he, anyhow?” asked Johnny.
“Well,” said Jim, turning suddenly red under his coat of tan, “I’ve
got him round at my place. The fact is, it was too unhandy for me to
go and look after him at that other place; it was noisy, too. He didn’t
like it.”
Several questions rose to Johnny’s lips, but he repressed them; he
had discovered that nothing so embarrassed Jim as being caught in
some good work. So he only asked,—
“But how did my new knife make you think of Taffy?”
“Oh, never mind!” and Jim began to walk away.
“But I do mind!” said Johnny, following him and catching his arm.
“And I do wish you wouldn’t think it is smart to be so dreadfully
mysterious. Come, out with it!”
“Very well, then,” said Jim, stopping suddenly, “if you don’t like it,
maybe you’ll know better another time. It made me think of him
because I have been meaning to buy him one of those knives as
soon as I could raise the cash, but I’ve had to spend all I could make
lately for other things. The little chap keeps grunting about a knife
he once found in the street, and lost again; and he seems to fancy
that when he’s doing something with his hands he don’t feel the pain
so much. He cuts out pictures with an old pair of scissors I
happened to have, whenever I can get him any papers, but he likes
best to whittle, and he broke the last blade of that old knife of mine
the other day; he’s been fretting about it ever since. I’m glad you’ve
got the knife, Johnny, since you’re so pleased about it, and wanted it
so, but I couldn’t help thinking—” and here Jim abruptly turned a
corner, and was gone before Johnny could stop him.
“I should just like to know what he told me all that yarn for!” said
Johnny to himself; a little crossly. “He surely doesn’t think I ought to
give my knife, my new knife, that uncle Rob gave me for a birthday
present, to that little Taffy? Why, I don’t even know him!”
And Johnny tried to banish such a ridiculous idea from his mind at
once. But somehow it would not be banished. The thought came
back to him again and again; how many things he had to make life
sweet and pleasant to him; how few the little lonely boy, shut up all
day in Jim’s dingy bed room, the window of which did not even look
on a street, but on a narrow back yard, where the sun never shone.
The more he thought of it, the more it appealed to his pity. And here
was a chance,—but no, surely people could not be expected to make
such sacrifices as that.
He managed to shake off the troublesome thought for a few
minutes, when he showed the knife to his mother and Tiny. They
both admired it to his heart’s content, and said what a bargain it
was, and what a wonder that nobody had bought it before, and
what a suitable thing for him to buy for Uncle Rob’s birthday present
to him. But, when he went up to his room, the question again forced
itself upon him, and would not be shaken off. Over and over again in
his mind, as they had done that other time, the words repeated
themselves,—
“And who is my neighbor?”
He did not see Jim again for several days, and this made him
unreasonably angry. It seemed to him that Jim had taken things for
granted altogether too easily. How did Jim know that he, Johnny,
was not waiting for a chance to send the knife to poor little Taffy?
But was he? He really hardly knew himself until one day when, by
dint of hard running, he caught Jim, and asked him,—
“See here! How’s that little chap, and what’s gone with you
lately?”
“He’s worse,” said Jim, gruffly, “and I’m busy—that’s what’s gone
with me. I can’t stop, I’m in a hurry.”
“Oh, very well!” said Johnny, in an offended tone. “I thought we
were friends, Jim Brady, but I’ll not bother you any more. Goodbye.”
“Johnny,” said Jim, putting his hand on Johnny’s shoulder as he
spoke, “can’t you make any allowance for a fellow’s being in trouble?
I can’t stop now, I really and truly can’t, but I’ll be on the corner by
the library this afternoon, and if you choose to stop, I’ll talk all you
want me to.”
“All right, I’ll come,” said Johnny, his wounded self-love forgotten
at sight of Jim’s troubled face.
He hurried home, and, with the help of an old table knife, he
managed to work ten cents out of the jug that he had “set up” for a
Christmas present fund. With this he bought the largest picture
paper he could find for the money. Then he gathered together a
handful of pictures he had been saving for his scrap book, wrapped
the knife first in them, then in the large paper, and then tied the
whole up securely in a neat brown paper parcel.
When he saw Jim that afternoon he asked him as cautiously as he
could about Taffy’s needs, and at last he said,—
“Jim, why haven’t you told mamma about him, and let her help
you?”
“It seemed like begging. I didn’t like—” and Jim stopped, looking
very much embarrassed.
“Well, I mean to tell her as soon as I go home,” said Johnny,
resolutely, “for I know she’ll go and see him, and have something
done to make him better, and—Jim, I must go now, but will you
please give this to Taffy, with my love?”
And, putting the parcel in Jim’s hand, Johnny turned, and ran
home.
But was he really the same Johnny? Had wings grown on his feet?
Had his heart been suddenly changed into a feather? He whistled,
he sang, he stopped to turn somersets on the grass in the square.
No one but his Captain had known of the battle. None, but the Giver
of it, knew of the victory.
CHAPTER XII.
FASTING.
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookultra.com