Flylib.com
Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)
Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)
ISBN: 047010872X
EAN: 2147483647
Year: 2004
Pages: 124
Authors:
Neal Krawetz
BUY ON AMAZON
Back Cover
Back Cover
Hacking Ubuntu
Introduction
Living Dangerously
Who This Book Is For
How This Book Is Organized
Conventions Used in This Book
What You Need To Use This Book
What s on the Companion Website
Part I: Optimizing Your System
Chapter 1: Hacking the Installation
Selecting a Distribution
Installing the Server or Workstation
Using a USB Drive
Upgrading Ubuntu
Summary
Chapter 2: Making Ubuntu Usable
Using Ubuntu on a PC
Tuning Ubuntu on a Macintosh
Tweaking GDM
Navigating Nautilus
Summary
Chapter 3: Configuring Devices
Loading Modules
Starting Software Devices
Enabling Multiple CPUs (SMP)
Adding Printers
Adding Drives
Adding Other Devices
Summary
Part II: Working with Compatibility
Chapter 4: Managing Software
Understanding Package Repositories
Running Synaptic
Living Without Synaptic
Installing Common Functions
Installing Common Packages by Hand
Compiling and Developing Software
Summary
Chapter 5: Communicating Online
Securing Web Access with SSH
Managing E-mail with Evolution
Using E-mail with Thunderbird Mail
Instant Messaging with Gaim
Talking with VoIP
Summary
Chapter 6: Collaborating
Sharing Files
Working with Open Office
Collaborating Over the Network
Running Software in Emulators
Other Collaboration Tools
Summary
Part III: Improving Performance
Chapter 7: Tuning Processes
Viewing Running Processes
Identifying Resources
Finding Process Startups
Tuning Kernel Parameters
Speeding Up Boot Time
Summary
Chapter 8: Multitasking Applications
Tweaking the Workplace Switcher
Customizing Application Windows
Buffering Buffers
Automating Tasks
Tracking Projects
Summary
Chapter 9: Getting Graphical with Video Bling
Tuning Graphics
Switching Screensavers
Configuring Dual Monitors
Summary
Part IV: Securing Your System
Chapter 10: Locking Down Ubuntu
Hacking with Sudo
Using Gnu Privacy Guard (GPG)
Encrypting File Systems
Managing Logs and Caches
Summary
Chapter 11: Advanced Networking
Configuring Network Devices
Configuring Wireless Networks
Securing the Network
Enabling Proxies
Debugging the Network
Summary
Chapter 12: Enabling Services
Recognizing Network Threats
Mitigating Risks Before Going Public
Monitoring Attacks
Running Services
Summary
Index
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
List of Figures
List of Tables
List of Listings
List of Sidebars
Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)
ISBN: 047010872X
EAN: 2147483647
Year: 2004
Pages: 124
Authors:
Neal Krawetz
BUY ON AMAZON
Database Modeling with MicrosoftВ® Visio for Enterprise Architects (The Morgan Kaufmann Series in Data Management Systems)
Generating a Physical Database Schema
Editing Logical Models”Intermediate Aspects
Reverse Engineering Physical Schemas to Logical Models
Change Propagation and Round Trip Engineering
Other Features and Best Practices
Beginning Cryptography with Java
The JCA and the JCE
Object Description in Cryptography Using ASN.1
Distinguished Names and Certificates
Appendix A Solutions to Exercises
Appendix B Algorithms Provided by the Bouncy Castle Provider
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
IP Phone Startup Process
Powering the Cisco IP Phone
Cisco Trunk Concepts
Operating System Hardening
Summary
Data Structures and Algorithms in Java
Summary
Reference Types
Problems
B-Trees
A.2. Variables and Types
Microsoft VBScript Professional Projects
Arrays
Creating Administrator Accounts
Collecting Remote Summary Reports
Appendix A Windows XP Command Reference
Appendix B Whats on the Companion Web Site
InDesign Type: Professional Typography with Adobe InDesign CS2
Going with the Flow
Character Reference
Your Grid Tool Kit
Align to Grid
Stroked Type
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies