Flylib.com
List of Tables
Previous page
Table of content
Next page
Chapter 1: Hacking the Installation
Table 1-1: CD-ROM Options for Ubuntu Dapper Drake 6.06 LTS
Chapter 2: Making Ubuntu Usable
Table 2-1: Examples of Useful Custom Menu Commands
Chapter 5: Communicating Online
Table 5-1: Comparison of Evolution and Thunderbird
Chapter 6: Collaborating
Table 6-1: Command-line options for
X11vnc
Table 6-2: Comparison of Hardware Emulators
Chapter 7: Tuning Processes
Table 7-1: Shell Startup Scripts
Chapter 8: Multitasking Applications
Table 8-1: List of common actions for Devil's Pie
Chapter 11: Advanced Networking
Table 11-1: Common Fields for /etc/network/interfaces
Table 11-2: Example
iwconfig
Key Formats
Table 11-3: Common Parameters for
iptables
Table 11-4: Available Encryption Algorithms and Required Key Sizes for setkey
Table 11-5: Available Authentication Algorithms and Required Key Sizes for Setkey
Table 11-6: Common Proxy Environment Variables
Chapter 12: Enabling Services
Table 12-1: Common nmap Command-line Parameters
Table 12-2: Commonly Modified SSH Server Parameters
Table 12-3: Anonymous FTP Options for /etc/vsftpd.conf
Table 12-4: Local User FTP Options for /etc/vsftpd.conf
Table 12-5: Additional Apache Packages
Previous page
Table of content
Next page
Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)
ISBN: 047010872X
EAN: 2147483647
Year: 2004
Pages: 124
Authors:
Neal Krawetz
BUY ON AMAZON
Crystal Reports 9 on Oracle (Database Professionals)
Oracle Structures
Optimizing: The Oracle Side
Optimizing: Reducing Parses
Other Tips
The Crystal Repository
Project Management JumpStart
Defining the Project Goals
Assessing Risk
Developing the Project Plan
Executing the Project
Closing the Books
Software Configuration Management
A Practical Approach to Documentation and Configuration Status Accounting
Appendix C Sample Data Dictionary
Appendix G Sample Inspection Plan
Appendix P Project Statement of Work
Appendix W Physical Configuration Audit (PCA) Checklist
SQL Hacks
Hack 21. Report on Any Date Criteria
Hack 30. Calculate the Maximum of Two Fields
Hack 57. Generate Unique Sequential Numbers
Hack 60. Create a List of Personalized Parameters
Hack 65. Use Pessimistic Locking
Web Systems Design and Online Consumer Behavior
Chapter II Information Search on the Internet: A Causal Model
Chapter XI User Satisfaction with Web Portals: An Empirical Study
Chapter XIII Shopping Agent Web Sites: A Comparative Shopping Environment
Chapter XV Customer Trust in Online Commerce
Chapter XVII Internet Markets and E-Loyalty
DNS & BIND Cookbook
Registering a Reverse-Mapping Domain
Using a Single Data File for Multiple Zones
Limiting the Size of the IXFR Log File
Testing a Name Servers Configuration
Introduction
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies