Flylib.com
BSD Sockets Programming from a Multi-Language Perspective (Programming Series)
BSD Sockets Programming from a Multi-Language Perspective (Programming Series)
ISBN: N/A
EAN: 2147483647
Year: 2003
Pages: 162
Authors:
M. Tim Jones
BUY ON AMAZON
Linux Server Hacks, Volume Two
Table of Contents
Copyright
Credits
About the Authors
Contributors
Acknowledgments
Preface
Why Linux Server Hacks, Volume Two?
How to Use This Book
How This Book Is Organized
Conventions Used in This Book
Using Code Examples
How to Contact Us
Safari Enabled
Got a Hack?
Chapter 1. Linux Authentication
Section 1.1. Hacks 19: Introduction
Hack1.Disable User Accounts Instantly
Hack2.Edit Your Password File for Greater Access Control
Hack3.Deny All Access in One Second or Less
Hack4.Customize Authentication with PAMs
Hack5.Authenticate Linux Users with a Windows Domain Controller
Hack6.Centralize Logins with LDAP
Hack7.Secure Your System with Kerberos
Hack8.Authenticate NFS-Lovers with NIS
Hack9.Sync LDAP Data with NIS
Chapter 2. Remote GUI Connectivity
Section 2.1. Hacks 1019: Introduction
Hack10.Access Systems Remotely with VNC
Hack11.Access VNC Servers over the Web
Hack12.Secure VNC via SSH
Hack13.Autostart VNC Servers on Demand
Hack14.Put Your Desktops on a Thin Client Diet
Hack15.Run Windows over the Network
Hack16.Secure, Lightweight X Connections with FreeNX
Hack17.Secure VNC Connections with FreeNX
Hack18.Secure Windows Terminal Connections with FreeNX
Hack19.Remote Administration with Webmin
Chapter 3. System Services
Section 3.1. Hacks 2028: Introduction
Hack20.Quick and Easy DHCP Setup
Hack21.Integrate DHCP and DNS with Dynamic DNS Updates
Hack22.Synchronize Your Watches
Hack23.Centralize X Window System Font Resources
Hack24.Create a CUPS Print Server
Hack25.Configure Linux Connections to Remote CUPS Printers
Hack26.Integrate Windows Printing with CUPS
Hack27.Centralize Macintosh Printing with CUPS
Hack28.Define a Secure CUPS Printer
Chapter 4. Cool Sysadmin Tools and Tips
Section 4.1. Hacks 2945: Introduction
Hack29.Execute Commands Simultaneously on Multiple Servers
Hack30.Collaborate Safely with a Secured Wiki
Hack31.Edit Your GRUB Configuration with grubby
Hack32.Give Your Tab Key a Workout
Hack33.Keep Processes Running After a Shell Exits
Hack34.Disconnect Your Console Without Ending Your Session
Hack35.Use script to Save Yourself Time and Train Others
Hack36.Install Linux Simply by Booting
Hack37.Turn Your Laptop into a Makeshift Console
Hack38.Usable Documentation for the Inherently Lazy
Hack39.Exploit the Power of Vim
Hack40.Move Your PHP Web Scripting Skills to the Command Line
Hack41.Enable Quick telnetSSH Connections from the Desktop
Hack42.Speed Up Compiles
Hack43.Avoid Common Junior Mistakes
Hack44.Get Linux Past the Gatekeeper
Hack45.Prioritize Your Work
Chapter 5. Storage Management and Backups
Section 5.1. Hacks 4655: Introduction
Hack46.Create Flexible Storage with LVM
Hack47.Combine LVM and Software RAID
Hack48.Create a Copy-on-Write Snapshot of an LVM Volume
Hack49.Clone Systems Quickly and Easily
Hack50.Make Disk-to-Disk Backups for Large Drives
Hack51.Free Up Disk Space Now
Hack52.Share Files Using Linux Groups
Hack53.Refine Permissions with ACLs
Hack54.Make Files Easier to Find with Extended Attributes
Hack55.Prevent Disk Hogs with Quotas
Chapter 6. Standardizing, Sharing, and Synchronizing Resources
Section 6.1. Hacks 5662: Introduction
Hack56.Centralize Resources Using NFS
Hack57.Automount NFS Home Directories with autofs
Hack58.Keep Filesystems Handy, but Out of Your Way
Hack59.Synchronize root Environments with rsync
Hack60.Share Files Across Platforms Using Samba
Hack61.Quick and Dirty NAS
Hack62.Share Files and Directories over the Web
Chapter 7. Security
Section 7.1. Hacks 6368: Introduction
Hack63.Increase Security by Disabling Unnecessary Services
Hack64.Allow or Deny Access by IP Address
Hack65.Detect Network Intruders with snort
Hack66.Tame Tripwire
Hack67.Verify Fileystem Integrity with Afick
Hack68.Check for Rootkits and Other Attacks
Chapter 8. Troubleshooting and Performance
Section 8.1. Hacks 6977: Introduction
Hack69.Find Resource Hogs with Standard Commands
Hack70.Reduce Restart Times with Journaling Filesystems
Hack71.Grok and Optimize Your System with sysctl
Hack72.Get the Big Picture with Multiple Displays
Hack73.Maximize Resources with a Minimalist Window Manager
Hack74.Profile Your Systems Using proc
Hack75.Kill Processes the Right Way
Hack76.Use a Serial Console for Centralized Access to Your Systems
Hack77.Clean Up NIS After Users Depart
Chapter 9. Logfiles and Monitoring
Section 9.1. Hacks 7888: Introduction
Hack78.Avoid Catastrophic Disk Failure
Hack79.Monitor Network Traffic with MRTG
Hack80.Keep a Constant Watch on Hosts
Hack81.Remotely Monitor and Configure a Variety of Networked Equipment
Hack82.Force Standalone Apps to Use syslog
Hack83.Monitor Your Logfiles
Hack84.Send Log Messages to Your Jabber Client
Hack85.Monitor Service Availability with Zabbix
Hack86.Fine-Tune the syslog Daemon
Hack87.Centralize System Logs Securely
Hack88.Keep Tabs on Systems and Services
Chapter 10. System Rescue, Recovery, and Repair
Section 10.1. Hacks 89100: Introduction
Hack89.Resolve Common Boot and Startup Problems
Hack90.Rescue Me
Hack91.Bypass the Standard Init Sequence for Quick Repairs
Hack92.Find Out Why You Can t Unmount a Partition
Hack93.Recover Lost Partitions
Hack94.Recover Data from Crashed Disks
Hack95.Repair and Recover ReiserFS Filesystems
Hack96.Piece Together Data from the lostfound
Hack97.Recover Deleted Files
Hack98.Permanently Delete Files
Hack99.Permanently Erase Hard Disks
Hack100.Recover Lost Files and Perform Forensic Analysis
Colophon
Index
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
R
S
T
U
V
W
X
BSD Sockets Programming from a Multi-Language Perspective (Programming Series)
ISBN: N/A
EAN: 2147483647
Year: 2003
Pages: 162
Authors:
M. Tim Jones
BUY ON AMAZON
Beginners Guide to DarkBASIC Game Programming (Premier Press Game Development)
Introduction to Computer Programming
Looping Commands
Programming the Keyboard, Mouse, and Joystick
Playing Intro Movies and Cut-Scenes
Fundamentals of 3D Graphics Programming
Strategies for Information Technology Governance
Structures, Processes and Relational Mechanisms for IT Governance
Linking the IT Balanced Scorecard to the Business Objectives at a Major Canadian Financial Group
Measuring and Managing E-Business Initiatives Through the Balanced Scorecard
Governance in IT Outsourcing Partnerships
The Evolution of IT Governance at NB Power
Cisco IOS in a Nutshell (In a Nutshell (OReilly))
Asynchronous Interfaces
OSPF
Configuring a Simple DDR Connection
IOS on Switches
Debugging
InDesign Type: Professional Typography with Adobe InDesign CS2
Text Flow
When to Kern
Aligning Your Type
Space Before and Space After
Determining Column Width
HTI+ Home Technology Integrator & CEDIA Installer I All-In-One Exam Guide
Connector Types and Uses
Computer Network Basics
Distributed Audio System Basics
Designing a Home Lighting Control System
Appendix C Home Technology Industry Associations and Organizations
MPLS Configuration on Cisco IOS Software
MPLS Terminology
Frame-Mode MPLS Configuration and Verification
MPLS VPN Architecture and Terminology
EIGRP PE-CE Routing Protocol Overview, Configuration, and Verification
Case Study-Multi-Homed Inter-AS Provider Network
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies