Flylib.com
BSD Sockets Programming from a Multi-Language Perspective (Programming Series)
BSD Sockets Programming from a Multi-Language Perspective (Programming Series)
ISBN: N/A
EAN: 2147483647
Year: 2003
Pages: 162
Authors:
M. Tim Jones
BUY ON AMAZON
Linux Server Hacks, Volume Two
Table of Contents
Copyright
Credits
About the Authors
Contributors
Acknowledgments
Preface
Why Linux Server Hacks, Volume Two?
How to Use This Book
How This Book Is Organized
Conventions Used in This Book
Using Code Examples
How to Contact Us
Safari Enabled
Got a Hack?
Chapter 1. Linux Authentication
Section 1.1. Hacks 19: Introduction
Hack1.Disable User Accounts Instantly
Hack2.Edit Your Password File for Greater Access Control
Hack3.Deny All Access in One Second or Less
Hack4.Customize Authentication with PAMs
Hack5.Authenticate Linux Users with a Windows Domain Controller
Hack6.Centralize Logins with LDAP
Hack7.Secure Your System with Kerberos
Hack8.Authenticate NFS-Lovers with NIS
Hack9.Sync LDAP Data with NIS
Chapter 2. Remote GUI Connectivity
Section 2.1. Hacks 1019: Introduction
Hack10.Access Systems Remotely with VNC
Hack11.Access VNC Servers over the Web
Hack12.Secure VNC via SSH
Hack13.Autostart VNC Servers on Demand
Hack14.Put Your Desktops on a Thin Client Diet
Hack15.Run Windows over the Network
Hack16.Secure, Lightweight X Connections with FreeNX
Hack17.Secure VNC Connections with FreeNX
Hack18.Secure Windows Terminal Connections with FreeNX
Hack19.Remote Administration with Webmin
Chapter 3. System Services
Section 3.1. Hacks 2028: Introduction
Hack20.Quick and Easy DHCP Setup
Hack21.Integrate DHCP and DNS with Dynamic DNS Updates
Hack22.Synchronize Your Watches
Hack23.Centralize X Window System Font Resources
Hack24.Create a CUPS Print Server
Hack25.Configure Linux Connections to Remote CUPS Printers
Hack26.Integrate Windows Printing with CUPS
Hack27.Centralize Macintosh Printing with CUPS
Hack28.Define a Secure CUPS Printer
Chapter 4. Cool Sysadmin Tools and Tips
Section 4.1. Hacks 2945: Introduction
Hack29.Execute Commands Simultaneously on Multiple Servers
Hack30.Collaborate Safely with a Secured Wiki
Hack31.Edit Your GRUB Configuration with grubby
Hack32.Give Your Tab Key a Workout
Hack33.Keep Processes Running After a Shell Exits
Hack34.Disconnect Your Console Without Ending Your Session
Hack35.Use script to Save Yourself Time and Train Others
Hack36.Install Linux Simply by Booting
Hack37.Turn Your Laptop into a Makeshift Console
Hack38.Usable Documentation for the Inherently Lazy
Hack39.Exploit the Power of Vim
Hack40.Move Your PHP Web Scripting Skills to the Command Line
Hack41.Enable Quick telnetSSH Connections from the Desktop
Hack42.Speed Up Compiles
Hack43.Avoid Common Junior Mistakes
Hack44.Get Linux Past the Gatekeeper
Hack45.Prioritize Your Work
Chapter 5. Storage Management and Backups
Section 5.1. Hacks 4655: Introduction
Hack46.Create Flexible Storage with LVM
Hack47.Combine LVM and Software RAID
Hack48.Create a Copy-on-Write Snapshot of an LVM Volume
Hack49.Clone Systems Quickly and Easily
Hack50.Make Disk-to-Disk Backups for Large Drives
Hack51.Free Up Disk Space Now
Hack52.Share Files Using Linux Groups
Hack53.Refine Permissions with ACLs
Hack54.Make Files Easier to Find with Extended Attributes
Hack55.Prevent Disk Hogs with Quotas
Chapter 6. Standardizing, Sharing, and Synchronizing Resources
Section 6.1. Hacks 5662: Introduction
Hack56.Centralize Resources Using NFS
Hack57.Automount NFS Home Directories with autofs
Hack58.Keep Filesystems Handy, but Out of Your Way
Hack59.Synchronize root Environments with rsync
Hack60.Share Files Across Platforms Using Samba
Hack61.Quick and Dirty NAS
Hack62.Share Files and Directories over the Web
Chapter 7. Security
Section 7.1. Hacks 6368: Introduction
Hack63.Increase Security by Disabling Unnecessary Services
Hack64.Allow or Deny Access by IP Address
Hack65.Detect Network Intruders with snort
Hack66.Tame Tripwire
Hack67.Verify Fileystem Integrity with Afick
Hack68.Check for Rootkits and Other Attacks
Chapter 8. Troubleshooting and Performance
Section 8.1. Hacks 6977: Introduction
Hack69.Find Resource Hogs with Standard Commands
Hack70.Reduce Restart Times with Journaling Filesystems
Hack71.Grok and Optimize Your System with sysctl
Hack72.Get the Big Picture with Multiple Displays
Hack73.Maximize Resources with a Minimalist Window Manager
Hack74.Profile Your Systems Using proc
Hack75.Kill Processes the Right Way
Hack76.Use a Serial Console for Centralized Access to Your Systems
Hack77.Clean Up NIS After Users Depart
Chapter 9. Logfiles and Monitoring
Section 9.1. Hacks 7888: Introduction
Hack78.Avoid Catastrophic Disk Failure
Hack79.Monitor Network Traffic with MRTG
Hack80.Keep a Constant Watch on Hosts
Hack81.Remotely Monitor and Configure a Variety of Networked Equipment
Hack82.Force Standalone Apps to Use syslog
Hack83.Monitor Your Logfiles
Hack84.Send Log Messages to Your Jabber Client
Hack85.Monitor Service Availability with Zabbix
Hack86.Fine-Tune the syslog Daemon
Hack87.Centralize System Logs Securely
Hack88.Keep Tabs on Systems and Services
Chapter 10. System Rescue, Recovery, and Repair
Section 10.1. Hacks 89100: Introduction
Hack89.Resolve Common Boot and Startup Problems
Hack90.Rescue Me
Hack91.Bypass the Standard Init Sequence for Quick Repairs
Hack92.Find Out Why You Can t Unmount a Partition
Hack93.Recover Lost Partitions
Hack94.Recover Data from Crashed Disks
Hack95.Repair and Recover ReiserFS Filesystems
Hack96.Piece Together Data from the lostfound
Hack97.Recover Deleted Files
Hack98.Permanently Delete Files
Hack99.Permanently Erase Hard Disks
Hack100.Recover Lost Files and Perform Forensic Analysis
Colophon
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
R
S
T
U
V
W
X
BSD Sockets Programming from a Multi-Language Perspective (Programming Series)
ISBN: N/A
EAN: 2147483647
Year: 2003
Pages: 162
Authors:
M. Tim Jones
BUY ON AMAZON
Project Management JumpStart
Breaking Down the Project Activities
Assessing Risk
Developing the Project Plan
Budgeting 101
Appendix A Answers to Review Questions
Network Security Architectures
Network Security Is a System
Physical Security Issues
Routing Considerations
References
Applied Knowledge Questions
Lotus Notes Developers Toolbox: Tips for Rapid and Successful Deployment
Working with Pages
An Introduction to Formula Language
Working with Iterative Loops
Security
Formula Language Enhancements
Introducing Microsoft ASP.NET AJAX (Pro - Developer)
The Microsoft Client Library for AJAX
Partial Page Rendering
The AJAX Control Toolkit
Built-in Application Services
Building AJAX Applications with ASP.NET
File System Forensic Analysis
Background
Summary
Bibliography
Cylinder Group Summary
Directory Entries
DNS & BIND Cookbook
Getting BIND
Running a Name Server in a chroot( ) Jail
Signing Queries and Dynamic Updates with TSIG Programmatically
Discarding a Category of Messages
IPv6
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies