Flylib.com
List of Figures
Previous page
Table of content
Next page
Introduction
Figure I-1: The knoppix-mkimage introduction screen
Figure I-2: Where do you want to store your persistent image?
Figure I-3: For maximum security, encrypt your persistent image.
Figure I-4: How big do you want your persistent image to be?
Figure I-5: Your persistent image has been created.
Figure I-6: I like to keep at least a couple of different disk images on my USB flash drive.
Chapter 1: Unraveling the Knoppix Toolkit Maze
Figure 1-1: KPackage makes it relatively easy to install and manage software.
Figure 1-2: Changing fonts in the KDE Fonts Control Center
Figure 1-3: Changing the fonts for the Konqueror file manager
Figure 1-4: Changing the fonts Konqueror uses when it displays Web pages
Figure 1-5: Changing Firefox's font options
Figure 1-6: Change the fonts that KMail uses
Figure 1-7: Isn't it obvious that you should configure fonts when you configure printers? No? We don't think so, either.
Figure 1-8: The KDE (and Knoppix) printer config utility
Figure 1-9: XMMS is simple and effective.
Figure 1-10: Audacity, when you first open it
Figure 1-11: Audacity with a WAV file, open and ready to edit
Figure 1-12: Kuickshow, open and ready to display pictures
Figure 1-13: The Kuickshow contextual menu offers many options.
Figure 1-14: The GIMP, ready to edit an image of a really cute little dog
Figure 1-15: That same really cute little dog, circa 1900
Figure 1-16: Xine, playing Thomas A. Edison's "May Irwin Kiss" (1896)
Figure 1-17: K3b's main window
Figure 1-18: Creating a Data CD Project in K3b
Figure 1-19: The Writing tab of the K3b Data Project window
Figure 1-20: Setting the kind of session you're using in K3b
Figure 1-21: Describing the disc you're burning in K3b
Figure 1-22: Tell K3b what kind of filesystem you want to place on your new CD.
Figure 1-23: You can change the basic CD-R/W filesystems in K3b.
Figure 1-24: Editing a copy of the /etc/hosts file with vim.
Figure 1-25: Kate, the text editor, ready to edit text
Figure 1-26: The OpenOffice.org function toolbar, with the Export Directly as PDF button in the center, between the Edit and Print buttons.
Figure 1-27: Scribus, the open-source desktop publishing program
Figure 1-28: Use the text selection icon to grab text out of a PDF.
Figure 1-29: Kompare compares two files, highlighting the differences.
Chapter 2: Maximizing Knoppix Internet Tools
Figure 2-1: Configuring your dial-up connection with KPPP
Figure 2-2: Enter details about your dial-up account.
Figure 2-3: BitTornado downloading a Knoppix ISO
Figure 2-4: Right-click in a site's Search box to add a search keyword.
Figure 2-5: Add the details for your new search keyword.
Figure 2-6: KMail is open, but you have to configure it before you can use it.
Figure 2-7: KMail's Configure window
Figure 2-8: Adding an SMTP server to KMail
Figure 2-9: Tell KMail which kind of email account you use.
Figure 2-10: Point KAddressBook to another address book file.
Figure 2-11: Add IM accounts to Gaim.
Figure 2-12: Only a few buddies are online in this example.
Chapter 3: Connecting to Other Machines and Resources
Figure 3-1: Connect to other machines running VNC or RDP with Remote Desktop Connection.
Figure 3-2: Controls at the top of the RDC window
Figure 3-3: Konqueror makes a great FTP client.
Figure 3-4: You have to accept a machine's key the first time you connect to it.
Figure 3-5: Konqueror finds your Samba workgroups.
Figure 3-6: Konqueror displays the machines in a selected Samba workgroup.
Figure 3-7: Konqueror displays the Samba shares in a selected machine.
Figure 3-8: Setting scan preferences in LinNeighborhood
Figure 3-9: Tell LinNeighborhood to remember your Samba username and password.
Figure 3-10: Before browsing, you have to enter the username and password again.
Figure 3-11: LinNeighborhood displays a list of machines in a workgroup.
Figure 3-12: LinNeighborhood displays a list of Samba shares on a machine.
Figure 3-13: Tell LinNeighborhood exactly how you want to mount a Samba share.
Figure 3-14: The default Apache page on your computer
Chapter 4: Fixing Linux with Knoppix
Figure 4-1: QTParted enables you to work with partitions from within Linux.
Chapter 5: Fixing Windows with Knoppix
Figure 5-1: QTParted's startup screen
Figure 5-2: QTParted's Resize Partition dialog.
Figure 5-3: Sizing a partition to 1GB
Figure 5-4: QTParted displays the changes you want to make.
Figure 5-5: QTParted's Create Partition dialog box
Figure 5-6: Creating a partition in QTParted
Figure 5-7: QTParted's commit warning
Figure 5-8: Partitioning was successful.
Figure 5-9: Open your Windows hard drive in Konqueror.
Figure 5-10: A boot.ini file open in KWrite
Figure 5-11: Using the Registry Editor in Linux
Figure 5-12: The USB jump drive is set to read-write once you uncheck the Read Only box.
Figure 5-13: Saving files to the jump drive from Windows
Figure 5-14: Burning files to a CD/DVD using K3b
Figure 5-15: Starting the backup process
Chapter 6: Assessing Security with Knoppix
Figure 6-1: Nessus is now open and ready to configure.
Figure 6-2: Nessus sets up an SSL certificate to encrypt traffic.
Figure 6-3: Choose the plug-ins you want to use when scanning with Nessus.
Figure 6-4: Choose which computer(s) you want to examine with Nessus.
Figure 6-5: Nessus presents you with a report after its scan and analysis.
Figure 6-6: Ethereal doesn't do much when it first opens
…
but just wait.
Figure 6-7: Choose what you want to capture with Ethereal.
Figure 6-8: Ethereal at work
Figure 6-9: Ethereal has captured plenty of data for analysis.
Figure 6-10: Create a display filter for Ethereal.
Figure 6-11: Clear-text email login and password (blacked out in this figure) are available to nearly everyone. Oops.
Figure 6-12: QTParted shows you a graphical representation of your drives and partitions.
Chapter 7: Clustering with Knoppix
Figure 7-1: A sample run of pi.
Figure 7-2: Beautiful results from a
pmandel
run
Figure 7-3: After booting the slave nodes
Figure 7-4: Running John on two nodes
Chapter 8: Checking Out Security Distros
Figure 8-1: Now that is good menuing!
Figure 8-2: Gkismet has found quite a number of wireless networks near me.
Figure 8-3: You can find out a lot about a Wireless Access Point using Kismet.
Figure 8-4: GRAB gives you a simple way to image a hard drive.
Figure 8-5: What kinds of files do you want Retriever to find today?
Figure 8-6: Retriever displays its finds.
Figure 8-7: Helix enables you to perform several tasks on a running Windows machine.
Figure 8-8: Eight invaluable tools for recovering computers running Windows
Figure 8-9: Helix generates a very useful security report about your Windows machine.
Figure 8-10: Four more invaluable tools
Figure 8-11: Directories and files that have been accessed on a Windows machine
Figure 8-12: Think your email username and password are secret? Guess again.
Figure 8-13: What's the password?
Figure 8-14: Not a very secure password
Figure 8-15: Update ClamAV's anti-virus database.
Figure 8-16: Tell ClamAV where you want to scan for viruses.
Figure 8-17: Mtr hard at work, pinging constantly along the route to my host.
Chapter 9: Changing Knoppix to Fit Your Needs
Figure 9-1: KPackage, showing the details of KPDF
Figure 9-2: KPDF, ready to open PDF files
Figure 9-3: The saveconfig script shows the selection of save options.
Figure 9-4: Specify where your files should be stored.
Figure 9-5: The introduction screen
Figure 9-6: Specify where your files should be stored.
Figure 9-7: Warning! Don't click Yes right away!
Figure 9-8: Make sure you have enough free space before continuing!
Chapter 11: Creating Archix, Knoppix for Kids
Figure 11-1: Earth at Night
C. Mayhew and R. Simmon (NASA/GSFC), NOAA/ NGDC, DMSP Digital Archive
Figure 11-2: The boot screen for Archix utilizes the famous St. Louis Arch.
Chapter 12: Creating Myppix, Your Personal Knoppix
Figure 12-1: The KDE default panel, just begging for improvement.
Figure 12-2: A much cleaner, more efficient panel
Figure 12-3: Which config files do you want to save?
Figure 12-4: Pick where you want to save your configuration files.
Appendix A: Booting Knoppix
Figure A-1: Start with the Knoppix boot splash screen.
Figure A-2: Knoppix in graphics mode.
Figure A-3: Knoppix stopping at the end of the stage 1 boot process
Appendix B: Installing Knoppix to Your Hard Drive
Figure B-1: Starting the knoppix-installer
Figure B-2: Partition detection
Figure B-3: Knoppix Partition Menu window
Figure B-4: QTParted
Figure B-5: Knoppix installer main menu
Figure B-6: Select a system type.
Figure B-7: Select a partition for the Knoppix installation.
Figure B-8: Select a filesystem type.
Figure B-9: Enter personal identification.
Figure B-10: Use the Knoppix-generated username or create your own.
Figure B-11: Enter a user password.
Figure B-12: Enter an administration (root) password.
Figure B-13: Create a system hostname.
Figure B-14: Select the boot loader location.
Figure B-15: Starting the installation from the main menu
Figure B-16: Review the installation parameters.
Figure B-17: Installation progress
Figure B-18: Click yes to create a boot disk.
Figure B-19: Successful installation
Previous page
Table of content
Next page
Hacking Knoppix (ExtremeTech)
ISBN: 0764597841
EAN: 2147483647
Year: 2007
Pages: 118
Authors:
Scott Granneman
BUY ON AMAZON
Project Management JumpStart
Defining the Project Goals
Breaking Down the Project Activities
Executing the Project
Appendix A Answers to Review Questions
Appendix B Sample Project Management Forms
CompTIA Project+ Study Guide: Exam PK0-003
IT Project+ Study Guide
IT Project Management Overview
Cost Planning
Project Execution
Project Control
Adobe After Effects 7.0 Studio Techniques
Precomposing and Nesting
Optimizing Plate Levels
Cineon Log Space
32 Bits per Channel
Explosions
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Tools
Credibility and the World Wide Web
The Ethics of Persuasive Technology
Captology Looking Forward
Special Edition Using FileMaker 8
Assigning Field Options
Using Conditional Functions
Troubleshooting
Troubleshooting
Using the Database Design Report
.NET-A Complete Development Cycle
Initial Project Planning
The Refined Project Vision and Business Case
Requirements for the GDI+ Extensions
Multithreading and Optimization Implementation
Wrap-Up
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies