Flylib.com
Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)
Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)
ISBN: 047010872X
EAN: 2147483647
Year: 2004
Pages: 124
Authors:
Neal Krawetz
BUY ON AMAZON
Back Cover
Back Cover
Hacking Ubuntu
Introduction
Living Dangerously
Who This Book Is For
How This Book Is Organized
Conventions Used in This Book
What You Need To Use This Book
What s on the Companion Website
Part I: Optimizing Your System
Chapter 1: Hacking the Installation
Selecting a Distribution
Installing the Server or Workstation
Using a USB Drive
Upgrading Ubuntu
Summary
Chapter 2: Making Ubuntu Usable
Using Ubuntu on a PC
Tuning Ubuntu on a Macintosh
Tweaking GDM
Navigating Nautilus
Summary
Chapter 3: Configuring Devices
Loading Modules
Starting Software Devices
Enabling Multiple CPUs (SMP)
Adding Printers
Adding Drives
Adding Other Devices
Summary
Part II: Working with Compatibility
Chapter 4: Managing Software
Understanding Package Repositories
Running Synaptic
Living Without Synaptic
Installing Common Functions
Installing Common Packages by Hand
Compiling and Developing Software
Summary
Chapter 5: Communicating Online
Securing Web Access with SSH
Managing E-mail with Evolution
Using E-mail with Thunderbird Mail
Instant Messaging with Gaim
Talking with VoIP
Summary
Chapter 6: Collaborating
Sharing Files
Working with Open Office
Collaborating Over the Network
Running Software in Emulators
Other Collaboration Tools
Summary
Part III: Improving Performance
Chapter 7: Tuning Processes
Viewing Running Processes
Identifying Resources
Finding Process Startups
Tuning Kernel Parameters
Speeding Up Boot Time
Summary
Chapter 8: Multitasking Applications
Tweaking the Workplace Switcher
Customizing Application Windows
Buffering Buffers
Automating Tasks
Tracking Projects
Summary
Chapter 9: Getting Graphical with Video Bling
Tuning Graphics
Switching Screensavers
Configuring Dual Monitors
Summary
Part IV: Securing Your System
Chapter 10: Locking Down Ubuntu
Hacking with Sudo
Using Gnu Privacy Guard (GPG)
Encrypting File Systems
Managing Logs and Caches
Summary
Chapter 11: Advanced Networking
Configuring Network Devices
Configuring Wireless Networks
Securing the Network
Enabling Proxies
Debugging the Network
Summary
Chapter 12: Enabling Services
Recognizing Network Threats
Mitigating Risks Before Going Public
Monitoring Attacks
Running Services
Summary
Index
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
List of Figures
List of Tables
List of Listings
List of Sidebars
Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)
ISBN: 047010872X
EAN: 2147483647
Year: 2004
Pages: 124
Authors:
Neal Krawetz
BUY ON AMAZON
CISSP Exam Cram 2
The CISSP Certification Exam
Access-Control Types
Network Access Controls
Change Management
Exam Prep Questions
Certified Ethical Hacker Exam Prep
The Architecture of Windows Computers
Wireless Technologies, Security, and Attacks
Encryption Cracking and Tools
Study Strategies
Updates
Mapping Hacks: Tips & Tools for Electronic Cartography
Hack 7. Will the Kids Barf?
Hacks 35-46
Hack 41. Plot Points on an Interactive Map Using DHTML
Hack 62. Build a Car Computer
Hacks 78-86
Logistics and Retail Management: Emerging Issues and New Challenges in the Retail Supply Chain
Relationships in the Supply Chain
Fashion Logistics and Quick Response
The Development of E-tail Logistics
Transforming Technologies: Retail Exchanges and RFID
Enterprise Resource Planning (ERP) Systems: Issues in Implementation
Special Edition Using Crystal Reports 10
Understanding the Importance of Reuse in Reporting
Introducing the Crystal Enterprise Ad-Hoc Reporting Application
Understanding the Core Functions of Crystal Enterprise
Crystal Enterprise Architecture Overview
The Report Designer
DNS & BIND Cookbook
Disabling Caching
Migrating from One Domain Name to Another
Restricting the Queries a Name Server Answers
Upgrading from BIND 8 to BIND 9
Configuring a Resolver to Resolve Single-Label Domain Names
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies