Flylib.com
Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)
Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)
ISBN: 047010872X
EAN: 2147483647
Year: 2004
Pages: 124
Authors:
Neal Krawetz
BUY ON AMAZON
Back Cover
Back Cover
Hacking Ubuntu
Introduction
Living Dangerously
Who This Book Is For
How This Book Is Organized
Conventions Used in This Book
What You Need To Use This Book
What s on the Companion Website
Part I: Optimizing Your System
Chapter 1: Hacking the Installation
Selecting a Distribution
Installing the Server or Workstation
Using a USB Drive
Upgrading Ubuntu
Summary
Chapter 2: Making Ubuntu Usable
Using Ubuntu on a PC
Tuning Ubuntu on a Macintosh
Tweaking GDM
Navigating Nautilus
Summary
Chapter 3: Configuring Devices
Loading Modules
Starting Software Devices
Enabling Multiple CPUs (SMP)
Adding Printers
Adding Drives
Adding Other Devices
Summary
Part II: Working with Compatibility
Chapter 4: Managing Software
Understanding Package Repositories
Running Synaptic
Living Without Synaptic
Installing Common Functions
Installing Common Packages by Hand
Compiling and Developing Software
Summary
Chapter 5: Communicating Online
Securing Web Access with SSH
Managing E-mail with Evolution
Using E-mail with Thunderbird Mail
Instant Messaging with Gaim
Talking with VoIP
Summary
Chapter 6: Collaborating
Sharing Files
Working with Open Office
Collaborating Over the Network
Running Software in Emulators
Other Collaboration Tools
Summary
Part III: Improving Performance
Chapter 7: Tuning Processes
Viewing Running Processes
Identifying Resources
Finding Process Startups
Tuning Kernel Parameters
Speeding Up Boot Time
Summary
Chapter 8: Multitasking Applications
Tweaking the Workplace Switcher
Customizing Application Windows
Buffering Buffers
Automating Tasks
Tracking Projects
Summary
Chapter 9: Getting Graphical with Video Bling
Tuning Graphics
Switching Screensavers
Configuring Dual Monitors
Summary
Part IV: Securing Your System
Chapter 10: Locking Down Ubuntu
Hacking with Sudo
Using Gnu Privacy Guard (GPG)
Encrypting File Systems
Managing Logs and Caches
Summary
Chapter 11: Advanced Networking
Configuring Network Devices
Configuring Wireless Networks
Securing the Network
Enabling Proxies
Debugging the Network
Summary
Chapter 12: Enabling Services
Recognizing Network Threats
Mitigating Risks Before Going Public
Monitoring Attacks
Running Services
Summary
Index
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
List of Figures
List of Tables
List of Listings
List of Sidebars
Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)
ISBN: 047010872X
EAN: 2147483647
Year: 2004
Pages: 124
Authors:
Neal Krawetz
BUY ON AMAZON
The CISSP and CAP Prep Guide: Platinum Edition
Operations Security
Business Continuity Planning and Disaster Recovery Planning
Initiation of the System Authorization Process
The Accreditation Phase
Appendix G Control Baselines
The Complete Cisco VPN Configuration Guide
When to Use SSL VPNs
Summary
Summary
Monitoring and Managing Management Connections
Viewing and Managing Connections
Java How to Program (6th Edition) (How to Program (Deitel))
Introduction
static Methods, static Fields and Class Math
Data Abstraction and Encapsulation
(Optional) GUI and Graphics Case Study: Drawing with Polymorphism
Appendix H. (On CD) Creating Documentation with javadoc
Postfix: The Definitive Guide
Additional Information and How to Obtain Postfix
chroot
Separate Domains with System Accounts
Postfix Anti-Spam Example
SMTP Client Authentication
Information Dashboard Design: The Effective Visual Communication of Data
Thirteen Common Mistakes in Dashboard Design
Arranging the Data Poorly
Visually Encoding Data for Rapid Perception
Sample Sales Dashboard
A Final Word
Cultural Imperative: Global Trends in the 21st Century
Culture and Religion
The Pacific Rim: The Fourth Cultural Ecology
Conclusion
Epilogue After September 11
Appendix C National Traits
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies