Flylib.com
List of Figures
Previous page
Table of content
Next page
Chapter 1: Hacking the Installation
Figure 1-1: The login menu after adding KDE to Ubuntu
Figure 1-2: The Desktop CD-ROM boot selection menu
Figure 1-3: The Desktop CD-ROM and install options
Figure 1-4: The Alternate CD-ROM boot selection menu
Figure 1-5: The Server CD-ROM boot selection menu
Figure 1-6: The Write to Disc menu option for ISO images
Chapter 2: Making Ubuntu Usable
Figure 2-1: The Sound Preferences applet
Figure 2-2: The Hacker Factor Safe-Computing logo as a background with a gradient color
Figure 2-3: The desktop and Gnome terminal as seen at 96 dpi (left) and 200 dpi (right). Both are taken on the same 1280×1024 monitor.
Figure 2-4: The xev application, showing keycodes
Figure 2-5: The Keyboard Preferences applet for changing keyboard models.
Figure 2-6: Add to Panel and Custom Application Launcher.
Figure 2-7: The Theme Preferences and Theme Details applets
Figure 2-8: A regular icon, a shrunk icon, and a stretched icon that is very large. Icons for text files show the file contents.
Figure 2-9: Adding the Secure Delete menu item
Chapter 3: Configuring Devices
Figure 3-1: The Services settings applet
Figure 3-2: The sysv-rc-conf tool
Figure 3-3: The System Monitor applet showing multiple CPUs
Figure 3-4: The applet for adding a new printer
Figure 3-5: The Disk Manager applet
Figure 3-6: The text-based wacdump diagnostics program
Figure 3-7: Using xsane to test the v4l driver. Since the channels are not configured, only static is captured.
Figure 3-8: The xawtv program showing the TV in a window
Chapter 4: Managing Software
Figure 4-1: The Synaptic Package Manager
Figure 4-2: Adding to the repository list
Figure 4-3: The indicator showing that updates are available
Figure 4-4: The EasyUbuntu user interface as seen on a PC (i386) and Macintosh (PowerPC). Some options are not available on all platforms.
Chapter 5: Communicating Online
Figure 5-1: The Firefox Preferences window
Figure 5-2: Changing the Firefox cookie preferences
Figure 5-3: The advanced configuration menu
Figure 5-4: The Profile Manager window
Figure 5-5: A SSH connection showing the /etc/issue.net message
Figure 5-6: Configuring Firefox to use the proxy
Figure 5-7: Evolution mailer
Figure 5-8: The Gmail settings for enabling POP support
Figure 5-9: Configuring Evolution for receiving e-mail from Gmail
Figure 5-10: Adding an LDAP server
Figure 5-11: Adding an IM account to Gaim
Figure 5-12: The Ekiga, Skype, and WengoPhone VoIP systems
Chapter 6: Collaborating
Figure 6-1: http://www.OpenOffice.org word processor
Figure 6-2: http://www.OpenOffice.org Options for security
Figure 6-3: http://www.OpenOffice.org Impress-a presentation tool similar to Microsoft PowerPoint
Figure 6-4: The http://www.OpenOffice.org Calc spreadsheet application
Figure 6-5: The Gnumeric spreadsheet application
Figure 6-6: Using VNC to access a remote server. The remote VNC server's desktop is displayed within the VNC window.
Figure 6-7: Tight VNC server running the Gnome desktop. The real Gnome desktop has applications running that do not appear in the VNC server.
Figure 6-8: Running two Qemu sessions
Chapter 7: Tuning Processes
Figure 7-1: The System Monitor showing processes
Figure 7-2: System Monitor showing available disk space
Figure 7-3: The System Monitor displaying CPU, memory, swap, and network usage
Figure 7-4: The Gnome graphical session manager showing the list of startup applications
Figure 7-5: The Removable Drives and Media preferences, showing drive handlers
Figure 7-6: The Removable Drives and Media preferences, showing the default audio and video applications
Figure 7-7: The Removable Drives and Media preferences, showing the default camera settings
Figure 7-8: The Removable Drives and Media preferences, showing the default actions for printers and scanners
Chapter 8: Multitasking Applications
Figure 8-1: The Window List is visible on the bottom panel. The Window Selector has been added to the top panel and is open, showing three processes.
Figure 8-2: The Alt+Tab window manager. The calculator is selected but partially covered by another application.
Figure 8-3: Using Ctrl+Alt+Tab to select between the desktop and panels
Figure 8-4: The Workspace Switcher, showing four distinct desktops
Figure 8-5: The Workspace Switcher preferences window
Figure 8-6: Automatic file conversion using dnotify and the convert2text directory
Figure 8-7: The Gnotime Time Tracker
Figure 8-8: The work journal
Figure 8-9: Invoice report showing billable hours. (Wow! $1.18 in just 7 minutes!)
Chapter 9: Getting Graphical with Video Bling
Figure 9-1: The Screen Resolution applet
Figure 9-2: The xvidtune warning screen
Figure 9-3: The xvidtune configuration settings
Figure 9-4: The Menu Editor properties for the Screensaver item
Figure 9-5: The properties for the Screensaver menu item
Figure 9-6: An animated background using the lattice screen saver
Figure 9-7: The Microsoft Windows Synergy server configuration window showing the same relationships as Listing 9-5
Figure 9-8: The Microsoft Windows client configuration for Synergy
Chapter 10: Locking Down Ubuntu
Figure 10-1: Enabling PGP encryption and digital signatures
Figure 10-2: Sending an e-mail with using mutt. In this example, a public key is being forwarded as an attachment
Chapter 11: Advanced Networking
Figure 11-1: The Network Settings applet, showing the properties for eth0
Figure 11-2: The
ndisgtk
interface
Figure 11-3: The Network Proxy Preferences applet.
Figure 11-4: EtherApe capturing packets
Figure 11-5: The Ethereal packet analyzer
Chapter 12: Enabling Services
Figure 12-1: The default Apache server web page
Previous page
Table of content
Next page
Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)
ISBN: 047010872X
EAN: 2147483647
Year: 2004
Pages: 124
Authors:
Neal Krawetz
BUY ON AMAZON
Lotus Notes and Domino 6 Development (2nd Edition)
Using the Programmers Pane
Using the Form Design Document
Real-World Example 2: Dialog Boxes and window. opener on the Web
Adding Power with Domino URLs
Tips on External Data Access
The CISSP and CAP Prep Guide: Platinum Edition
Access Control
Cryptography
Legal, Regulations, Compliance, and Investigations
Physical (Environmental) Security
Initiation of the System Authorization Process
C++ How to Program (5th Edition)
Container Classes and Iterators
Self-Review Exercises
Wrap-Up
Exercises
Function Objects
.NET System Management Services
Querying WMI
Handling WMI Events
Instrumenting .NET Applications with WMI
The WMI Schema
WMI Security
VBScript in a Nutshell, 2nd Edition
VBScripts History and Uses
Accessing Other Object Models
Section A.5. Data Type Conversion
Section A.13. Object Programming
Section A.16. User Interaction
User Interfaces in C#: Windows Forms and Custom Controls
Creating Usable Interfaces
Classic Controls
Modern Controls
Custom Controls
GDI+ Controls
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies