Mac OS X Tiger UNLEASHED

   < Day Day Up > 

book cover
Mac OS® X Tiger™ UNLEASHED
By John Ray, William Ray
...............................................
Publisher: Sams Publishing
Pub Date: June 29, 2005
ISBN: 0-672-32746-5
Pages: 1560
 

Table of Contents  | Index

overview

A best-seller that once showed you how to reign in a panther can now show you how to tame a Tiger. Mac OS X Tiger Unleashed is the most comprehensive guide to unlocking the full power of Mac OS X Tiger that you can find. Written by Unix/BSD experts and Mac users, John Ray and William C. Ray, you will go inside the Mac OS X Tiger operating system and the underlying BSD environment. In-depth background coverage and useful hands-on lessons will help you understand the changes with the new version and master the new features. Lessons include:

  • Working with files and applications

  • Running classic Mac OS applications

  • Native utilities and applications

  • Intalling third-party applications

  • Third-party BSD command-line applications

  • Configuring the system using BSD utilities

  • Remote administration

  • Serving a Windows network

  • Routine maintenance

Learn to deal with the most trouble-prone aspects of the Mac OS X Tiger user interface and how to exploit the new features to get the most out of your system with Mac OS X Tiger Unleashed.

   < Day Day Up > 
 < Day Day Up > 

book cover
Mac OS® X Tiger™ UNLEASHED
By John Ray, William Ray
...............................................
Publisher: Sams Publishing
Pub Date: June 29, 2005
ISBN: 0-672-32746-5
Pages: 1560
 

Table of Contents  | Index


   Copyright
   About the Lead Authors
      Contributing Author
   Acknowledgments
   We Want to Hear from You!
   Reader Services
   Introduction
      Welcome to Tiger
      Mac OS X Tiger Unleashed
   Part I.  Using Mac OS X
        Chapter 1.  Managing the Tiger Workspace
      Getting Started
      Using the Tiger Finder
      Using the Dock
      Accessing Common Functions Through Menu Extras
      Force Quitting Applications
      Managing Windows with Exposé
      Using the Dashboard
      Using Fast User Switching
      Help Viewer
      Summary
        Chapter 2.  Useful Tiger Applications and Utilities
      Storing Contact Information: Address Book
      Creating Calendars, Events, and To Do Lists: iCal
      Basic Image and PDF Manipulation: Preview
      Multimedia Playback: QuickTime 7
      Storing and Managing Sensitive Information: Keychain Access
      Synchronizing Information Between Devices: iSync
      Running Legacy Mac OS Applications: Classic
      Other Tools and Utilities
      Summary
        Chapter 3.  Internet Applications
      Browsing the Web: Safari
      Accessing Email: Apple Mail
      Video and Audio Conferencing: iChat AV
      Searching the Internet: Sherlock
      The Enigma That Is .Mac
      Summary
        Chapter 4.  Controlling Applications with Automator and AppleScript
      Automating Your System with Automator
      Creating Advanced Automation with AppleScript
      Understanding AppleScript Syntax
      Additional AppleScript Tools and Resources
      Summary
   Part II.  Hardware Setup and Configuration
        Chapter 5.  Configuring Tiger Hardware Support and Preferences
      Managing Displays: Displays and Display Calibrator Assistant
      Configuring Keyboards and Mice: Keyboard & Mouse
      Tablet Device Input: Ink
      Bluetooth Devices and Services: Bluetooth Preferences and Bluetooth File Exchange
      Disks and Disk Images: Disk Utility
      Scanners, Cameras, and Media Readers: Image Capture
      Audio Input and Output: Sound Preferences and Audio MIDI Setup
      Switching Between Operating Systems: Startup Disk
      Handling Optical Media: CDs and DVDs
      Saving Electricity and the Environment: Energy Saver
      Summary
        Chapter 6.  Printer, Fax, and Font Management
      Using Print Center/Printer Setup Utility
      Setting Printing System Preferences
      Using the Tiger Fax Capabilities
      The CUPS System Interface
      Managing Fonts
      Font Websites
      Summary
   Part III.  Advanced User and Network Settings
        Chapter 7.  Configuring Network Connectivity
      Understanding TCP/IP Basics
      Configuring Network Connections
      Connecting to a VPN
      Sharing a Single Internet Connection with Multiple Computers
      Using the Built-in Tiger Firewall
      Summary
        Chapter 8.  Customizing User and System Settings
      Creating Multiple User Accounts: Accounts
      Applying Account Security: Security
      Setting International Options
      Configuring Voice and Accessibility Options: Speech and Universal Access
      Setting System Time and Date
      Using Spotlight to Search System Preferences
      Summary
   Part IV.  Introduction to BSD on Tiger
        Chapter 9.  Accessing the BSD Subsystem
      Getting Started with the Command Line
      Interacting with Unix: Basic Unix Commands
      Terminal Preferences and Configuration
      Summary
        Chapter 10.  Common Unix Shell Commands: File, Directory, and Disk Operations
      Understanding Tiger, HFS+, and BSD Command Interaction
      Basic Tiger Filesystem Navigation
      Managing Files and Directories
      Examining File Contents
      Searching for Files, Directories, and More
      File Compression and Archiving
      Getting Disk and Directory Information: du, df
      Mounting/Unmounting Volumes: diskutil
      Summary
        Chapter 11.  Using File Permissions and Access Control Lists
      Introduction to File Permissions
      Applying Advanced Resource Control Using ACLs
      Being Someone Else for a While: su, sudo
      Summary
        Chapter 12.  Process Management
      Understanding Process Management
      Using Common Process Management Commands
      Communication Between Processes: Redirection, Pipes
      Managing Processes Graphically: Activity Monitor
      Summary
        Chapter 13.  Using Common Command-Line Applications and Application Suites
      Networking Applications
      Browsing the Web: lynx
      Mail Clients
      Text Editors
      Printing Tools
      Bridging the GUI to Command Line Gap: Hybrid Software
      Summary
        Chapter 14.  Command-Line Software Installation and Troubleshooting
      Installing Xcode, Apple's Developer Tools
      Installing Software at the Command Line
      Installing Some Additional Interesting Software
      Troubleshooting Software Installs, and Compiling and Debugging Manually
      Using Common Sense and Configuration Options
      Fiddling with File Locations and Fighting with Installers
      Tracing Software Problems to the Source: Using the gdb Debugger
      Summary
   Part V.  Advanced BSD Concepts
        Chapter 15.  Shell Configuration and Programming (Shell Scripting)
      Customizing Your Shell Environment and Storing Data
      Automating Tasks with Shell Scripts
      Setting Up Automatic Script Execution
      Summary
        Chapter 16.  Managing System Services and Configuration
      Locating the Mac OS X Configuration Files
      Managing User Preferences
      Managing System Services
      Strong-Arming the SystemóBrute Force Behavior Modification
      Summary
        Chapter 17.  Using X Window System Applications
      Introduction to the X Window System
      Installing the X Window System
      Using X
      Summary
        Chapter 18.  Using the Perl and Python Scripting Languages
      Perl
      Python
      Summary
   Part VI.  Server and Network Administration
        Chapter 19.  Serving and Connecting to Databases
      Installing and Configuring MySQL
      Creating and Working with a MySQL Database
      Accessing Database Information Using Perl
      Accessing Database Information Using ODBC
      Summary
        Chapter 20.  Configuring Advanced Multiuser/Multisystem Cooperation Features
      Using NetInfo Manager
      Managing Users Through NetInfo
      Command-Line NetInfo Administration Tools
      Using and Sharing Disk Resources with NFS
      Summary
        Chapter 21.  Accessing and Controlling Tiger Remotely
      Remote Access and Security-Minded Thinking
      Running Shells and Commands Remotely Using SSH
      Accessing Mac OS X Remotely Using Apple Remote Desktop
      Summary
        Chapter 22.  Creating an FTP Server
      Activating the Mac OS X FTP Server: tnftpd
      Configuring tnftpd FTP Server Options
      Setting Up Anonymous FTP
      Setting Up ProFTPD as a Replacement for the Default ftpd
      Alternatives to FTP
      Summary
        Chapter 23.  Creating a Web Server
      What Is Apache?
      Understanding Apache Administration
      Expanding Apache's Capabilities with Modules
      Interpreting Web Server Log Files
      Summary
        Chapter 24.  Developing Web Applications
      Introduction to Web Programming
      Programming CGI Applications in Perl
      Developing Web Applications Using PHP
      Alternative Development Environments
      Creating RSS Feeds
      Summary
        Chapter 25.  Darwin Streaming Server and QuickTime Broadcaster
      Introduction to Darwin Streaming Server
      Installing and Using Darwin Streaming Server
      Streaming Live Events with QuickTime Broadcaster
      Embedding QuickTime into Web Pages
      Summary
        Chapter 26.  Creating a Mail Server
      The Risks of Running a Mail Server
      Activating the Built-in Tiger Postfix Mail Server
      Fine-tuning a Postfix Configuration
      Adding Spam and Virus Protection
      Providing Remote Access to Email
      Providing Web-Based Email Access
      Summary
        Chapter 27.  Working with Windows-Based Systems
      Understanding the Windows Protocols: SMB and CIFS
      Accessing and Sharing Windows Resources
      Using Tiger with MS Exchange
      Integrating Tiger into an Active Directory
      Samba
      Summary
   Part VII.  System and Server Health
        Chapter 28.  Implementing Server Security and Advanced Network Configuration
      Managing Network Interfaces from the Command Line: ifconfig
      Performing Network Diagnostics: Network Utility
      Understanding the Importance of System Security
      Limiting Network Risks
      Detecting Attacks in Progress: Intrusion Detection
      Commonsense Preventive Measures
      Summary
        Chapter 29.  Maintaining a Healthy System
      Keeping Software Updated
      Performing System Backups
      Monitoring Tiger System Operation
      Built-in Diagnostic and Repair Tools
      Third-Party Disk and Virus Tools
      Summary
   Index
 < Day Day Up >