Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Lavigne D. — BSD Hacks
Lavigne D. — BSD Hacks

Читать книгу
бесплатно

Скачать книгу с нашего сайта нельзя

Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: BSD Hacks

Автор: Lavigne D.

Аннотация:

In the world of Unix operating systems, the various BSDs come with a long heritage of high-quality software and well-designed solutions, making them a favorite OS of a wide range of users. Among budget-minded users who adopted BSD early on to developers of some of today's largest Internet sites, the popularity of BSD systems continues to grow. If you use the BSD operating system, then you know that the secret of its success is not just in its price tag: practical, reliable, extraordinarily stable and flexible, BSD also offers plenty of fertile ground for creative, time-saving tweaks and tricks, and yes, even the chance to have some fun. "Fun?" you ask. Perhaps "fun" wasn't covered in the manual that taught you to install BSD and administer it effectively. But BSD Hacks, the latest in O'Reilly's popular Hacks series, offers a unique set of practical tips, tricks, tools — and even fun — for administrators and power users of BSD systems. BSD Hacks takes a creative approach to saving time and getting more done, with fewer resources. You'll take advantage of the tools and concepts that make the world's top Unix users more productive. Rather than spending hours with a dry technical document learning what switches go with a command, you'll learn concrete, practical uses for that command. The book begins with hacks to customize the user environment. You'll learn how to be more productive in the command line, timesaving tips for setting user-defaults, how to automate long commands, and save long sessions for later review. Other hacks in the book are grouped in the following areas:

* Customizing the User Environment
* Dealing with Files and Filesystems
* The Boot and Login Environments
* Backing Up
* Networking Hacks
* Securing the System
* Going Beyond the Basics
* Keeping Up-to-Date
* Grokking BSD


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2004

Количество страниц: 448

Добавлена в каталог: 14.06.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
! (bang) character, retrieving previously issued commands      
# (hash mark) for comments in code      
(') (single quote) vs. backticks (`)      
(`) (backticks) vs. single quote (')      
.cshrc file vs. .login file      
.cshrc files      
.login file      
.login.conf file      
.profile file      
.screenrc resource file      
.SH (section) groff command      
.TH (title) groff command      
.xinitrc file      
.\" (comment) groff command
/boot directory      
/dev/console file      
/dev/null, using with find command      
/etc files, safely merging changes to      
/etc/dhclient.conf file      
/etc/fstab file      2nd
/etc/ipf.rules file      
/etc/login.access file      
/etc/login.conf file      
/etc/make.conf file      
/etc/netstart command      
/etc/periodic.conf file      
/etc/pf.conf file      
/etc/profile file      
/etc/ssh/sshd_config file      
/etc/ttys file, securing      
/tmp filesystem      
/usr/local/etc/sudoers file      
/usr/src/share/skel/Makefile file, editing      
/var/log file      
/var/log/console.log file      
<Emphasis>Exploring Expect<Default Para Font>
<Emphasis>Unix Power Tools<Default Para Font>
@LongName tar format extension      
Access control lists (ACLs)      
access restriction rules      
access, limiting with IP Filter      
accessing snapshots      
accounting (system), enabling      
accton command      
ACID (Analysis Console for Intrusion Databases)      
ack numbers in packets      
adding color to terminals      
adding color to video      
adding comments to      
adding comments to source code      
adding fancy formatting to      
adding key bindings to      
adding more security to      
adding SMB support to      
adding to code using # (hash mark)      
adding to scripts      
adding to source code      
adding/subtracting      
addresses, MAC, spoofing      
adduser command      
adodb (database library for PHP), installing      
ADSL PPPoE configuration      
alerts      
alerts, ACID      
allocating bandwidth      
allocating with traffic shaping      
allowing unauthorized hosts to access      
analyzing buffer overflows with GNU debugger      
anonymous CVS      
antivirus software      
Apache servers      
APG (Automated Password Generator)      
appending changes to      
appending changes to files      
applets, Java      
applying to files      
arch flag      2nd
Archives      
ARP packets      
attaching/detaching screen sessions      
attaching/detaching sessions      
attributes of files, preserving when copying      
attributes of, preserving when copying      
authorized/unauthorized hosts      
authorizing access to, using sudo      
auto completion      
autologout      
autologout after inactivity      
automated re-upgrades, preventing      
automated software installations      
automatically      
automatically generated firewall rules      
automatically generating firewall rules      
automatically generating rules      
automating      
automating logins      
automating NetBSD builds      
automating package builds      
automating the process      
automating transfers      
automating updates      
automating, using ftp      
awk command      
backing up      
backing up with SMBFS      
backticks (`) vs. single quote (')      
Backups      
Bacula program      
Bandwidth      
batcher process      
Beastie boot menu      
becoming inaccessible      
BEEP_ONHALT option      
bell command      
Berlin, Marlon      
Bernier, Robert      
Big Brother System and Network Monitor      
binaries      
binaries, protecting with flags      
bitmap images, loading      
blank lines, removing using grep/sed      
Blowfish and      
Blowfish hashes      
boot menu (default), customizing      
boot messages, viewing      
boot process      
bootblocks configuration, changing      
browsers, command-line      
brute-force password crackers, preventing with Blowfish      
bsdlabel command      
btape utility      
buffer overflows, analyzing with GNU debugger      
building new      
building ports without      
building without ports trees      
bus information in kernel configuration files      
by regular users      
by relevance using grep      
calendar command      
capturing      
capturing packets      
cap_mkdb command      
Carosone, Daniel      
case of characters      
case of characters, translating      
case-insensitive search, performing      
catastrophic Internet loss, surviving      
cd command      
CD-ROMs      
CD-ROMs, mounting      
Cerias FTP site (cracker dictionaries)      
cgd(4) devices      
cgdconfig program      
changing default options using pam_passwdqc module      
changing default settings      
changing periodically      
checking before uninstalling applications      
checking connectivity of      
checking connectivity of mail servers      
checking dependencies      
checking dependencies before uninstalling      
checking disk space used by      
checking disk space used by ports      
chflags command      
chmod command      
choosing Java ports to install      
choosing memorable passwords      
choosing when to use      
chromatic      
chroot support for scponly      
ClamAV utility      
clamav.conf file      
clamd command      
clamdscan command      
clamscan command      
CLASSPATH environment variable      
clearing out      
Client Daemon (Bacula)      
client-only version, installing      
clipboard, managing      
ClusterIt tool      
code examples, permission for using      
col command      2nd
colors, adding to terminals      
combining with other commands      
command history      
command line      
command syntax for      
command-line Console (Bacula)      2nd
Commands      
Comments      
comments in source code      
compiling software, optimizing      
complex configurations      
Compressed      
compressed archives      
configuration file issues      
configuration file, securing      
configuration file, testing      
Configuration files      
configuration files, modifying      
Configuring      
configuring for traffic shaping      
configuring multiple wireless networks      
configuring scripts on      
configuring wireless interfaces for      
configuring with local MTA      
configuring without local MTA      
connecting to headless servers      
connectivity failure, surviving      
console messages      
consolidating logs      
consolidating logs for      
consolidating web server logs      
controlling backups with arch/nodump flags      
controlling with arch/nodump flags      
converting existing passwords to Blowfish      
copier process      
COPTFLAGS option      
copying      
copying interactively      
copyright information, changing      
core files, limiting size of      
core X distribution, utilities that come with      
cp command      
CPU information in kernel configuration files      
CPU_WT_ALLOC option      
crack (dictionary password cracker)      
crackers, password, preventing with Blowfish      
Crandall, Aaron      
Creating      
creating for backups      
creating portable POSIX archives      
creating schedules      
creating your own      
cron utility      
cross-platform backups      
crossword-puzzle solver      
cryptographic disasters, preventing      
cryptographic disk devices      
CTM, keeping ports up-to-date with      
cu command      
current time, displaying      
custom packages, creating      
Customizing      
customizing boot process and      
customizing dictionaries      
customizing for kernels      
CVS, anonymous      
cvsup process      
daemons, running without root permissions      
daily_clean_disks script      
daily_clean_preserve script      
daily_clean_tmps script      
DarwinPorts project, installing Unix applications on Mac OS X      
data dumps for PostgreSQL databases      
data dumps for PostgreSQL databases, automating      
database tables, creating      
dealing with disk hogs      
debugger, GNU, analyzing buffer overflows      
Debugging      
debugging regular expressions      
deciding which files to include      
deciphering output      
deciphering tcpdump output      
decompressing      
decompressing files      
default ACLs, setting      
default boot menu      
default configuration files      
default files for users      
default shell for      
default shell for FreeBSD      
deleted files, sending to trash directory      
deleted, sending to trash directory      
delimited      
delimited files and double quotation marks      
demos for trade shows, creating      
Dependencies      
dependencies, checking for      
Deploying images      
DESTDIR variable (pkg_comp)      
devices in kernel configuration files      
DEVICE_POLLING option      
devinfo command      
df command      2nd
dhclient command      2nd
dhclient.conf file      
DHCP clients/servers      
DHCP server configuration      2nd
Diablo Java packages      
dial filter rules      
Dictionaries      
dictionary password cracker      
diff command      
diff command and      
dig (domain information groper) utility, locating DNS information      
Director Daemon (Bacula)      
directories      
disable receiving of email      
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2017
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте