Главная    Ex Libris    Книги    Журналы    Статьи    Серии    Каталог    Wanted    Загрузка    ХудЛит    Справка    Поиск по индексам    Поиск    Форум   
blank
Авторизация

       
blank
Поиск по указателям

blank
blank
blank
Красота
blank
Lavigne D. — BSD Hacks
Lavigne D. — BSD Hacks



Обсудите книгу на научном форуме



Нашли опечатку?
Выделите ее мышкой и нажмите Ctrl+Enter


Название: BSD Hacks

Автор: Lavigne D.

Аннотация:

In the world of Unix operating systems, the various BSDs come with a long heritage of high-quality software and well-designed solutions, making them a favorite OS of a wide range of users. Among budget-minded users who adopted BSD early on to developers of some of today's largest Internet sites, the popularity of BSD systems continues to grow. If you use the BSD operating system, then you know that the secret of its success is not just in its price tag: practical, reliable, extraordinarily stable and flexible, BSD also offers plenty of fertile ground for creative, time-saving tweaks and tricks, and yes, even the chance to have some fun. "Fun?" you ask. Perhaps "fun" wasn't covered in the manual that taught you to install BSD and administer it effectively. But BSD Hacks, the latest in O'Reilly's popular Hacks series, offers a unique set of practical tips, tricks, tools — and even fun — for administrators and power users of BSD systems. BSD Hacks takes a creative approach to saving time and getting more done, with fewer resources. You'll take advantage of the tools and concepts that make the world's top Unix users more productive. Rather than spending hours with a dry technical document learning what switches go with a command, you'll learn concrete, practical uses for that command. The book begins with hacks to customize the user environment. You'll learn how to be more productive in the command line, timesaving tips for setting user-defaults, how to automate long commands, and save long sessions for later review. Other hacks in the book are grouped in the following areas:

* Customizing the User Environment
* Dealing with Files and Filesystems
* The Boot and Login Environments
* Backing Up
* Networking Hacks
* Securing the System
* Going Beyond the Basics
* Keeping Up-to-Date
* Grokking BSD


Язык: en

Рубрика: Технология/

Статус предметного указателя: Готов указатель с номерами страниц

ed2k: ed2k stats

Год издания: 2004

Количество страниц: 448

Добавлена в каталог: 14.06.2007

Операции: Положить на полку | Скопировать ссылку для форума | Скопировать ID
blank
Предметный указатель
disk hogs, dealing with      
disk space used by ports, checking      
disklabel command      
display filters      
display filters and tcpdump      
DISTRIBDIR variable (pkg_comp)      
distributed      
distributed command execution using tentakel      
dmesg command      2nd
DNS      
DNS issues with mail queues      
DNS servers      
documentation for FreeBSD      
documents, extracting text using grep      
DOS floppies      [See floppies]
dot.cshrc file      
dot.cshrc file and      
dot.login file      
dot.login_conf file      
dot.logout file      
dot.mailrc file      
dot.mail_aliases file      
dot.profile file      
dot.rhosts file      
dot.shrc file      
dot.xinitrc file      
Dotzler, Asa      
double quotation marks and delimited files      
Dowdeswell, Roland C.      
downgrading      
downgrading ports      
downloading and untarring      
downloading and untarring archives      
du command      
dummynet command      2nd
dump command      
dumpfiles      
duplicate line feeds, removing      
dvt (distributed virtual terminal) command      
dvt command (ClusterIt tool)      
e16keyedit utility      
echoing responses to OTP challenge      
editing      
editing /usr/src/share/skel/Makefile file      
editing superblock with      
editing the command line      
eesh utility (Enlightenment)      
egrep command      
Eichmann, Heiner      
Email      [See also sendmail]
emergency repair kit      
Enabling      
enabling/disabling interfaces      
encrypted disk device, creating      
encrypted disk devices, creating      
encrypting      
encrypting hard disks      
Enlightenment window manager      
error messages for      
error messages for mount command      
Errors      
etcmerge utility      
etcmerge utility and      
Expect scripts, generating GPG keys with      
expiration dates for passwords      
extattrctl command      
extended attributes, enabling for ACLs      
extended regular expressions      
extracting text from documents      
extracting text from documents using grep      
fastest-cvsup command      
FAT12 filesystem      
fdformat command      
fdisk command      
fetch utility      2nd
File Daemon (Bacula)      
file integrity checking using mtree      
file renaming      
file servers      
file servers, optimizing      
file utility      
Files      
files interactively      
filesystems      
filters, display and tcpdump      
find command      2nd
finding      
finding all      
finding DNS server addresses      
finding names of      
finding names of SMTP servers      
finding server addresses      
finding the right port      
finding words      
finding, using grep      
Fink project      2nd
Firewalls      
Firewire support in kernel configuration files      
fixit floppies      
flags field of TCP headers      
flags, protecting files with      
Flickenger, Rob      
floppies      
floppy format process      
flushing mail queues      
for Apache      
for Bacula      
for cgd devices      
for cgd devices, modifying      
for DNS servers      
for login prompt      
for sudo utility      
for tcsh shell, making more useful      
forcing new passwords to use Blowfish      
forcing users to change passwords      
Formatting      
formatting floppies      
formatting sequences for prompts      
fortune program      2nd
FreeBSD      
FreeBSD From Scratch hack      
freshclam command      
from headless systems      
fsck_ffs command      
fstab command      
ftp command      
ftp logins      
FTP servers, accessing      
g4u (Ghost For Unix) utility      
gdb command      
generated firewall rules      
generating responses      
getfacl command      2nd
getting the most out of      
ghost disks, creating      
Ghost For Unix (g4u) utility      
ghosting systems      
ghosting systems and      
GNOME GUI Console (Bacula)      2nd
GNU debugger, analyzing buffer overflows      
GNU tar utility, incompatibility issues with      
GNU tar vs. POSIX tar      
Gould, Andrew      
GPG keys, generating with Expect scripts      
grdc command      
grep command      
groff commands for creating manpages      
grokking BSD      
groups of hosts, executing commands on, using tentakel      
gzip utility      2nd 3rd
hacking BSD      
Haitzler, Carsten      
halt command and BEEP_ONHALT option      
handling incorrect input      
hard disks      
hardware information, displaying      
Harris, Daniel      
Harrison, Geoff      
head command      
headers, packet      
headless servers, connecting to      
headless systems      
helping users choose memorable passwords      
Hess, Joey      
hierarchies of files, copying      
hierarchies, copying      
history, command      
holding email for later delivery      
holding for later delivery      
holding mail for later delivery      
host controller information in kernel configuration files      
host systems, establishing SMB connections with      
host utility      
hosts, authorized and unauthorized      
html2txt converter      
HZ option      2nd
ICMP type field/ICMP code field      
IDE devices in kernel configuration files      
idled utility      
IDSs (Intrusion Detection Systems)      
ifconfig command      
images, creating/deploying      
images, creating/deploying, using ghosting utility      
improving      
improving your      
in manpages      
in source code, reading      
inaccessibility of headless systems      
incorrect user input, handling      
input/output, recording      
installboot utility      
Installing      
installing client and server      
installing client-only version of Bacula      
installing systems automatically      
installing Unix applications on Mac OS X using DarwinPorts      
installing Unix applications using DarwinPorts      
installing/configuring      
installs      
integrity checking for files using mtree      
integrity databases      
interact command      
interacting with remote administration tasks      
Interactive      
interactive mode      
interactive shell sessions      
interface statistics, gathering      
interface support in kernel configuration files      
interfaces, enabling/disabling      
intermittent Internet connection and sendmail      
Internet loss, catastrophic, surviving      
interrupting      
intervals of backups, specifying      
Intrusion Detection Systems (IDSs)      
Intrusion Detection Systems and      
IP Filter      
IP Filter, limiting access with      
IP NAT configuration      
IPFIREWALL_DEFAULT_TO_ACCEPT option      
ipfw command      2nd
Jabber4r Ruby module      
Java applets      
Java applications, running on FreeBSD      
Java Development Kits (JDKs)      
Java Runtime Environments (JREs)      
Java Virtual Machines (JVMs)      
javavmwrapper port      
javaws application      
JAVA_HOME environment variable      
JDKs (Java Development Kits)      
Jetty (Java servlet)      
JPGraph, installing      
JREs (Java Runtime Environments)      
JVMs (Java Virtual Machines)      
keeping ports up-to-date with CTM      
keeping up-to-date with CTM      
kenv command      
kernel environment, viewing      
kernels      
keys, GPG, generating      
kldload command      
kldunload command      
Langille, Dan      
laptops      
last command      
last modification dates of      
last modification dates of files, finding      
lastcomm command      
lastlogin command      
leave command      
Lents, David      2nd
less pager      
letting others watch live sessions      
Libes, Don      
limitations of      
limiting      
limiting access with      
limiting files      
limiting unauthorized      
line feeds (duplicate), removing      
live filesystems, using      
live log data, viewing      
livelock and kernel optimizations      
loader.conf file      2nd
loader.rc file      
loaders      
locate command      
locating primary nameservers      
lock command      
locking terminals      
locking/unlocking      
log file for      
log files for sudoscript      
log host scripts      
log hosts      
logging headless servers remotely      
logging into      
logging out of login shell      
logging servers remotely      
logging servers, setting up      
login banner, removing      
login prompt, changing      
login, changing      
Logins      
logout policy, enforcing      
logproc and      
logproc scripts      
logs for web servers, consolidating      
logs, protecting with flags      
look command      
lowercasing characters      
MAC (Mandatory Access Control) framework      
Mac OS X      
macdef command      
macros, FTP      
MAC_IFOFF module      
MAC_SEEOTHERUIDS module      
magic cookies and X authorization      
Mail      [See email]
mail exchange (MX) records      2nd
1 2 3 4 5
blank
Реклама
blank
blank
HR
@Mail.ru
       © Электронная библиотека попечительского совета мехмата МГУ, 2004-2024
Электронная библиотека мехмата МГУ | Valid HTML 4.01! | Valid CSS! О проекте