Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Lavigne D. — BSD Hacks
Lavigne D. — BSD Hacks



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: BSD Hacks

Автор: Lavigne D.

Аннотация:

In the world of Unix operating systems, the various BSDs come with a long heritage of high-quality software and well-designed solutions, making them a favorite OS of a wide range of users. Among budget-minded users who adopted BSD early on to developers of some of today's largest Internet sites, the popularity of BSD systems continues to grow. If you use the BSD operating system, then you know that the secret of its success is not just in its price tag: practical, reliable, extraordinarily stable and flexible, BSD also offers plenty of fertile ground for creative, time-saving tweaks and tricks, and yes, even the chance to have some fun. "Fun?" you ask. Perhaps "fun" wasn't covered in the manual that taught you to install BSD and administer it effectively. But BSD Hacks, the latest in O'Reilly's popular Hacks series, offers a unique set of practical tips, tricks, tools — and even fun — for administrators and power users of BSD systems. BSD Hacks takes a creative approach to saving time and getting more done, with fewer resources. You'll take advantage of the tools and concepts that make the world's top Unix users more productive. Rather than spending hours with a dry technical document learning what switches go with a command, you'll learn concrete, practical uses for that command. The book begins with hacks to customize the user environment. You'll learn how to be more productive in the command line, timesaving tips for setting user-defaults, how to automate long commands, and save long sessions for later review. Other hacks in the book are grouped in the following areas:

* Customizing the User Environment
* Dealing with Files and Filesystems
* The Boot and Login Environments
* Backing Up
* Networking Hacks
* Securing the System
* Going Beyond the Basics
* Keeping Up-to-Date
* Grokking BSD


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2004

Количество страниц: 448

Добавлена в каталог: 14.06.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
disk hogs, dealing with      
disk space used by ports, checking
disklabel command      
display filters      
display filters and tcpdump
DISTRIBDIR variable (pkg_comp)
distributed
distributed command execution using tentakel
dmesg command      2nd
DNS
DNS issues with mail queues
DNS servers      
documentation for FreeBSD      
documents, extracting text using grep
DOS floppies      [See floppies]
dot.cshrc file
dot.cshrc file and      
dot.login file      
dot.login_conf file      
dot.logout file      
dot.mailrc file      
dot.mail_aliases file
dot.profile file
dot.rhosts file
dot.shrc file
dot.xinitrc file
Dotzler, Asa
double quotation marks and delimited files
Dowdeswell, Roland C.
downgrading      
downgrading ports
downloading and untarring      
downloading and untarring archives      
du command
dummynet command      2nd
dump command      
dumpfiles
duplicate line feeds, removing
dvt (distributed virtual terminal) command      
dvt command (ClusterIt tool)      
e16keyedit utility
echoing responses to OTP challenge
editing
editing /usr/src/share/skel/Makefile file
editing superblock with
editing the command line
eesh utility (Enlightenment)      
egrep command
Eichmann, Heiner
Email      [See also sendmail]
emergency repair kit
Enabling
enabling/disabling interfaces
encrypted disk device, creating      
encrypted disk devices, creating
encrypting
encrypting hard disks
Enlightenment window manager      
error messages for
error messages for mount command
Errors
etcmerge utility
etcmerge utility and
Expect scripts, generating GPG keys with
expiration dates for passwords      
extattrctl command      
extended attributes, enabling for ACLs      
extended regular expressions      
extracting text from documents      
extracting text from documents using grep      
fastest-cvsup command
FAT12 filesystem      
fdformat command
fdisk command
fetch utility      2nd
File Daemon (Bacula)      
file integrity checking using mtree      
file renaming
file servers      
file servers, optimizing      
file utility      
Files      
files interactively
filesystems      
filters, display and tcpdump      
find command      2nd
finding      
finding all      
finding DNS server addresses      
finding names of      
finding names of SMTP servers      
finding server addresses      
finding the right port      
finding words      
finding, using grep
Fink project      2nd
Firewalls      
Firewire support in kernel configuration files      
fixit floppies      
flags field of TCP headers      
flags, protecting files with      
Flickenger, Rob      
floppies      
floppy format process      
flushing mail queues      
for Apache      
for Bacula      
for cgd devices      
for cgd devices, modifying      
for DNS servers
for login prompt
for sudo utility      
for tcsh shell, making more useful      
forcing new passwords to use Blowfish
forcing users to change passwords      
Formatting
formatting floppies      
formatting sequences for prompts
fortune program      2nd
FreeBSD
FreeBSD From Scratch hack      
freshclam command      
from headless systems
fsck_ffs command
fstab command      
ftp command      
ftp logins      
FTP servers, accessing
g4u (Ghost For Unix) utility
gdb command
generated firewall rules      
generating responses      
getfacl command      2nd
getting the most out of      
ghost disks, creating      
Ghost For Unix (g4u) utility
ghosting systems
ghosting systems and
GNOME GUI Console (Bacula)      2nd
GNU debugger, analyzing buffer overflows
GNU tar utility, incompatibility issues with      
GNU tar vs. POSIX tar      
Gould, Andrew      
GPG keys, generating with Expect scripts      
grdc command      
grep command      
groff commands for creating manpages      
grokking BSD      
groups of hosts, executing commands on, using tentakel      
gzip utility      2nd 3rd
hacking BSD      
Haitzler, Carsten      
halt command and BEEP_ONHALT option      
handling incorrect input      
hard disks      
hardware information, displaying      
Harris, Daniel      
Harrison, Geoff      
head command      
headers, packet      
headless servers, connecting to      
headless systems      
helping users choose memorable passwords      
Hess, Joey      
hierarchies of files, copying      
hierarchies, copying      
history, command      
holding email for later delivery      
holding for later delivery      
holding mail for later delivery      
host controller information in kernel configuration files      
host systems, establishing SMB connections with      
host utility      
hosts, authorized and unauthorized      
html2txt converter      
HZ option      2nd
ICMP type field/ICMP code field      
IDE devices in kernel configuration files      
idled utility      
IDSs (Intrusion Detection Systems)      
ifconfig command      
images, creating/deploying      
images, creating/deploying, using ghosting utility      
improving      
improving your      
in manpages      
in source code, reading      
inaccessibility of headless systems      
incorrect user input, handling      
input/output, recording      
installboot utility      
Installing      
installing client and server      
installing client-only version of Bacula      
installing systems automatically      
installing Unix applications on Mac OS X using DarwinPorts      
installing Unix applications using DarwinPorts      
installing/configuring      
installs      
integrity checking for files using mtree      
integrity databases      
interact command      
interacting with remote administration tasks      
Interactive      
interactive mode      
interactive shell sessions      
interface statistics, gathering      
interface support in kernel configuration files      
interfaces, enabling/disabling      
intermittent Internet connection and sendmail      
Internet loss, catastrophic, surviving      
interrupting      
intervals of backups, specifying      
Intrusion Detection Systems (IDSs)      
Intrusion Detection Systems and      
IP Filter      
IP Filter, limiting access with      
IP NAT configuration      
IPFIREWALL_DEFAULT_TO_ACCEPT option      
ipfw command      2nd
Jabber4r Ruby module      
Java applets      
Java applications, running on FreeBSD      
Java Development Kits (JDKs)      
Java Runtime Environments (JREs)      
Java Virtual Machines (JVMs)      
javavmwrapper port      
javaws application
JAVA_HOME environment variable      
JDKs (Java Development Kits)
Jetty (Java servlet)
JPGraph, installing
JREs (Java Runtime Environments)      
JVMs (Java Virtual Machines)
keeping ports up-to-date with CTM      
keeping up-to-date with CTM      
kenv command      
kernel environment, viewing
kernels
keys, GPG, generating
kldload command
kldunload command
Langille, Dan      
laptops
last command
last modification dates of      
last modification dates of files, finding
lastcomm command
lastlogin command      
leave command      
Lents, David      2nd
less pager      
letting others watch live sessions      
Libes, Don      
limitations of      
limiting      
limiting access with      
limiting files      
limiting unauthorized      
line feeds (duplicate), removing      
live filesystems, using      
live log data, viewing      
livelock and kernel optimizations      
loader.conf file      2nd
loader.rc file      
loaders      
locate command
locating primary nameservers      
lock command      
locking terminals
locking/unlocking      
log file for
log files for sudoscript      
log host scripts
log hosts      
logging headless servers remotely      
logging into      
logging out of login shell      
logging servers remotely      
logging servers, setting up      
login banner, removing      
login prompt, changing      
login, changing
Logins      
logout policy, enforcing      
logproc and      
logproc scripts      
logs for web servers, consolidating      
logs, protecting with flags      
look command      
lowercasing characters      
MAC (Mandatory Access Control) framework      
Mac OS X
macdef command
macros, FTP
MAC_IFOFF module
MAC_SEEOTHERUIDS module
magic cookies and X authorization
Mail      [See email]
mail exchange (MX) records      2nd
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2026
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте