Авторизация
Поиск по указателям
Lavigne D. — BSD Hacks
Обсудите книгу на научном форуме
Нашли опечатку? Выделите ее мышкой и нажмите Ctrl+Enter
Название: BSD Hacks
Автор: Lavigne D.
Аннотация: In the world of Unix operating systems, the various BSDs come with a long heritage of high-quality software and well-designed solutions, making them a favorite OS of a wide range of users. Among budget-minded users who adopted BSD early on to developers of some of today's largest Internet sites, the popularity of BSD systems continues to grow. If you use the BSD operating system, then you know that the secret of its success is not just in its price tag: practical, reliable, extraordinarily stable and flexible, BSD also offers plenty of fertile ground for creative, time-saving tweaks and tricks, and yes, even the chance to have some fun. "Fun?" you ask. Perhaps "fun" wasn't covered in the manual that taught you to install BSD and administer it effectively. But BSD Hacks, the latest in O'Reilly's popular Hacks series, offers a unique set of practical tips, tricks, tools — and even fun — for administrators and power users of BSD systems. BSD Hacks takes a creative approach to saving time and getting more done, with fewer resources. You'll take advantage of the tools and concepts that make the world's top Unix users more productive. Rather than spending hours with a dry technical document learning what switches go with a command, you'll learn concrete, practical uses for that command. The book begins with hacks to customize the user environment. You'll learn how to be more productive in the command line, timesaving tips for setting user-defaults, how to automate long commands, and save long sessions for later review. Other hacks in the book are grouped in the following areas:
* Customizing the User Environment
* Dealing with Files and Filesystems
* The Boot and Login Environments
* Backing Up
* Networking Hacks
* Securing the System
* Going Beyond the Basics
* Keeping Up-to-Date
* Grokking BSD
Язык:
Рубрика: Технология /
Статус предметного указателя: Готов указатель с номерами страниц
ed2k: ed2k stats
Год издания: 2004
Количество страниц: 448
Добавлена в каталог: 14.06.2007
Операции: Положить на полку |
Скопировать ссылку для форума | Скопировать ID
Предметный указатель
! (bang) character, retrieving previously issued commands
# (hash mark) for comments in code
(') (single quote) vs. backticks (`)
(`) (backticks) vs. single quote (')
.cshrc file vs. .login file
.cshrc files
.login file
.login.conf file
.profile file
.screenrc resource file
.SH (section) groff command
.TH (title) groff command
.xinitrc file
.\" (comment) groff command
/boot directory
/dev/console file
/dev/null, using with find command
/etc files, safely merging changes to
/etc/dhclient.conf file
/etc/fstab file 2nd
/etc/ipf.rules file
/etc/login.access file
/etc/login.conf file
/etc/make.conf file
/etc/netstart command
/etc/periodic.conf file
/etc/pf.conf file
/etc/profile file
/etc/ssh/sshd_config file
/etc/ttys file, securing
/tmp filesystem
/usr/local/etc/sudoers file
/usr/src/share/skel/Makefile file, editing
/var/log file
/var/log/console.log file
<Emphasis>Exploring Expect<Default Para Font>
<Emphasis>Unix Power Tools<Default Para Font>
@LongName tar format extension
Access control lists (ACLs)
access restriction rules
access, limiting with IP Filter
accessing snapshots
accounting (system), enabling
accton command
ACID (Analysis Console for Intrusion Databases)
ack numbers in packets
adding color to terminals
adding color to video
adding comments to
adding comments to source code
adding fancy formatting to
adding key bindings to
adding more security to
adding SMB support to
adding to code using # (hash mark)
adding to scripts
adding to source code
adding/subtracting
addresses, MAC, spoofing
adduser command
adodb (database library for PHP), installing
ADSL PPPoE configuration
alerts
alerts, ACID
allocating bandwidth
allocating with traffic shaping
allowing unauthorized hosts to access
analyzing buffer overflows with GNU debugger
anonymous CVS
antivirus software
Apache servers
APG (Automated Password Generator)
appending changes to
appending changes to files
applets, Java
applying to files
arch flag 2nd
Archives
ARP packets
attaching/detaching screen sessions
attaching/detaching sessions
attributes of files, preserving when copying
attributes of, preserving when copying
authorized/unauthorized hosts
authorizing access to, using sudo
auto completion
autologout
autologout after inactivity
automated re-upgrades, preventing
automated software installations
automatically
automatically generated firewall rules
automatically generating firewall rules
automatically generating rules
automating
automating logins
automating NetBSD builds
automating package builds
automating the process
automating transfers
automating updates
automating, using ftp
awk command
backing up
backing up with SMBFS
backticks (`) vs. single quote (')
Backups
Bacula program
Bandwidth
batcher process
Beastie boot menu
becoming inaccessible
BEEP_ONHALT option
bell command
Berlin, Marlon
Bernier, Robert
Big Brother System and Network Monitor
binaries
binaries, protecting with flags
bitmap images, loading
blank lines, removing using grep/sed
Blowfish and
Blowfish hashes
boot menu (default), customizing
boot messages, viewing
boot process
bootblocks configuration, changing
browsers, command-line
brute-force password crackers, preventing with Blowfish
bsdlabel command
btape utility
buffer overflows, analyzing with GNU debugger
building new
building ports without
building without ports trees
bus information in kernel configuration files
by regular users
by relevance using grep
calendar command
capturing
capturing packets
cap_mkdb command
Carosone, Daniel
case of characters
case of characters, translating
case-insensitive search, performing
catastrophic Internet loss, surviving
cd command
CD-ROMs
CD-ROMs, mounting
Cerias FTP site (cracker dictionaries)
cgd(4) devices
cgdconfig program
changing default options using pam_passwdqc module
changing default settings
changing periodically
checking before uninstalling applications
checking connectivity of
checking connectivity of mail servers
checking dependencies
checking dependencies before uninstalling
checking disk space used by
checking disk space used by ports
chflags command
chmod command
choosing Java ports to install
choosing memorable passwords
choosing when to use
chromatic
chroot support for scponly
ClamAV utility
clamav.conf file
clamd command
clamdscan command
clamscan command
CLASSPATH environment variable
clearing out
Client Daemon (Bacula)
client-only version, installing
clipboard, managing
ClusterIt tool
code examples, permission for using
col command 2nd
colors, adding to terminals
combining with other commands
command history
command line
command syntax for
command-line Console (Bacula) 2nd
Commands
Comments
comments in source code
compiling software, optimizing
complex configurations
Compressed
compressed archives
configuration file issues
configuration file, securing
configuration file, testing
Configuration files
configuration files, modifying
Configuring
configuring for traffic shaping
configuring multiple wireless networks
configuring scripts on
configuring wireless interfaces for
configuring with local MTA
configuring without local MTA
connecting to headless servers
connectivity failure, surviving
console messages
consolidating logs
consolidating logs for
consolidating web server logs
controlling backups with arch/nodump flags
controlling with arch/nodump flags
converting existing passwords to Blowfish
copier process
COPTFLAGS option
copying
copying interactively
copyright information, changing
core files, limiting size of
core X distribution, utilities that come with
cp command
CPU information in kernel configuration files
CPU_WT_ALLOC option
crack (dictionary password cracker)
crackers, password, preventing with Blowfish
Crandall, Aaron
Creating
creating for backups
creating portable POSIX archives
creating schedules
creating your own
cron utility
cross-platform backups
crossword-puzzle solver
cryptographic disasters, preventing
cryptographic disk devices
CTM, keeping ports up-to-date with
cu command
current time, displaying
custom packages, creating
Customizing
customizing boot process and
customizing dictionaries
customizing for kernels
CVS, anonymous
cvsup process
daemons, running without root permissions
daily_clean_disks script
daily_clean_preserve script
daily_clean_tmps script
DarwinPorts project, installing Unix applications on Mac OS X
data dumps for PostgreSQL databases
data dumps for PostgreSQL databases, automating
database tables, creating
dealing with disk hogs
debugger, GNU, analyzing buffer overflows
Debugging
debugging regular expressions
deciding which files to include
deciphering output
deciphering tcpdump output
decompressing
decompressing files
default ACLs, setting
default boot menu
default configuration files
default files for users
default shell for
default shell for FreeBSD
deleted files, sending to trash directory
deleted, sending to trash directory
delimited
delimited files and double quotation marks
demos for trade shows, creating
Dependencies
dependencies, checking for
Deploying images
DESTDIR variable (pkg_comp)
devices in kernel configuration files
DEVICE_POLLING option
devinfo command
df command 2nd
dhclient command 2nd
dhclient.conf file
DHCP clients/servers
DHCP server configuration 2nd
Diablo Java packages
dial filter rules
Dictionaries
dictionary password cracker
diff command
diff command and
dig (domain information groper) utility, locating DNS information
Director Daemon (Bacula)
directories
disable receiving of email
Реклама