Item type | Current library | Home library | Shelving location | Call number | Materials specified | Status | Barcode | |
---|---|---|---|---|---|---|---|---|
![]() |
American University in Dubai | American University in Dubai | Main Collection | QA 76.76 .O63 D688 2004 (Browse shelf(Opens below)) | Copy Type:01 - Books | Available | 657262 |
Includes index.
Making the Desktop Work for You -- Finding the Power in KDE Protocols -- Discovering Your Protocols -- Working with CD Audio Tracks Using audiocd -- Managing Snapshots with the camera: Protocol -- Remote File Management with fish -- Getting Help with help:, info:, and man -- Viewing Your Local Network with the smb: Protocol -- Other KDE Protocols -- Getting GNOME Virtual File Systems to Do the Work for You -- Using GNOME VFS Modules -- Stacking VFS Modules -- Working with Packages: rpm and rpms -- Putting VFS to Work at the Command Line -- Burning CDs with a VFS -- Skinning Your Desktop with VFS -- Streamlining Your Work with File Associations -- Classifying Data with MIME -- Creating KDE File Associations -- Creating New MIME Types with GNOME -- Prompting Yourself with a Custom Prompt -- Making Basic Prompt Transformations -- Adding Dynamically Updated Data to Your Prompt -- Colorizing Your Prompt -- Seeing a Red Alert When You Have Superuser Privileges -- Saving Your Work -- Getting There Quick with Dynamic Shortcuts -- Completing Names Automatically -- Using the Escape Key to Your Advantage -- Customizing Completion for Maximum Speed -- Using cd Shortcuts for Rapid Transit -- Using cd and ls to Navigate through bash -- Setting Your CDPATH Variables to Find Directories Fast -- Remembering Where You've Been with pushd and popd -- Manipulating Your Stack with dirs -- Typing Less and Doing More with Handy Automagic Variables -- Show Me the : Giving Temporary Files Unique Names -- Streamlining Archive Searches -- Turning the Output of a Command into a Variable with () -- Using UID and EUID in Shell Scripts -- Getting Quick Access to Programs with PATH -- Customizing Variables for Rapid Transit -- Logging In, Logging Out -- Finding the Right Shell Script -- Customizing Your Autostart File -- Making History (Work for You) -- Navigating the History List -- Customizing the History List -- Executing Commands Quickly with History Variables -- Keeping Your Life Simple with Aliases and Functions -- Viewing Your Aliases -- Creating Simple Timesaving Aliases -- Using Aliases for Complex Commands -- Automating Tedious Tasks with Functions -- Monitoring Your System in a Snap -- Un-tarring the Easy Way -- Getting the Most from Your File System -- Sharing Files and Printers in a Windows World -- What Is Samba? -- Getting Up and Running with Samba -- Sharing Linux Resources with Other Computers (SMB Clients) -- Hooking Everyone Up to the Printer -- Plugging In to Remote Data with Linux Programs Quickly -- Finding What You Need -- Finding Files with locate -- Finding Files with find -- Qualifying Your Search with the find Command -- Acting on What You Find -- Building Complex Commands with xargs -- Moving Made Easy with Archives -- Creating Archives with File Roller -- Inspecting and Extracting Archives with File Roller -- Adding Functionality to tar with Complex Commands -- Uprooting Entire Directory Trees with scp -- Splitting Big Files into Manageable Chunks -- Downloading and Uploading Files in a Snap -- Building Software from Downloaded tarballs -- Versatile Downloading with wget -- Downloading and Uploading with curl -- Building a Playpen with User Mode Linux -- Choosing the ADIOS Version of User Mode Linux -- Setting Up ADIOS -- Finding Your Way around UML -- Connecting to the Internet from an ADIOS VM -- Using a GUI with UML -- Installing Software into UML -- Merging Changes to Your Prototype -- Good Housekeeping with Linux -- Red-lining RPM Queries -- Querying RPM Packages for Content -- Digesting Information -- Creating a Package Index -- Querying for Prerequisites -- Don't Put That in Your Drive; You Don't Know Where That's Been! -- Installing Made Easy with RPM -- Dissecting an RPM Package -- Using RPM at the Command Line -- Removing RPMs -- Flagging Down RPM -- Getting Graphic with RPM -- Getting Comfortable with RPM -- Saving Time with--upgrade -- Verifying Your System -- Reading the Tamper-Proof Seal -- Keeping Up-to-Date with apt and Synaptic -- Setting Up Synaptic and apt in a Snap -- Keeping Up-to-Date with apt and Synaptic: The Basics -- Upgrading Your Entire Computer -- Handy Hints about Synaptic -- Importing the Keys to the Repository -- Setting Up Automatic Services -- Letting Task Scheduler Work for You -- Making Your Inner System Administrator Happy (And Productive) -- Reining In Resources with Disk Quotas -- Using System Accounting to Keep Track of Users -- Spring Cleaning Essentials -- Running Down the Runlevels -- Disabling Unused Services -- Removing Unneeded Services -- Removing Old Users and Their Files -- Tweaking the Kernel on Your Linux System -- Taking Good Care of Your Kernel -- Adding and Removing Kernel Modules -- Manipulating Boot Time Parameters -- Creating a Custom Kernel -- Reconfiguring Your Kernel--Ready, Set, Go! -- Making an Emergency Plan, or Boot Disk -- Finding the Source Code -- Configuring a New Kernel -- Customizing the Kernel -- Building the Kernel -- Coping with the SELinux Security System -- Understanding the Principles of SELinux -- Disabling or Disarming SELinux -- Playing the Right Role -- Finding Out about Your SELinux Policy -- Finding Out about Your System with/proc -- Exploring the Process-Related Entries in/proc -- Surveying Your System from/proc -- Closing Down Security Gaps with/proc -- Popping the Cork: Speeding Up WINE with/proc -- Securing Your Workspace -- Closing Those Prying Eyes -- Reading and Understanding File Permissions -- Controlling Permissions at the Command Line -- Changing File Permissions from a Desktop -- Using Encryption for Extra Security -- Encryption Made Easy with kgpg and the KDE Desktop -- Encrypting Documents with gpg at the Command Line -- Encrypting E-Mail for Added Security -- Securing a Large Network with Custom Authentication -- Using Cross-Platform Authentication with Linux and Windows -- Using PAM and Kerberos to Serve Up Authentication -- Customizing Authentication with PAM -- Understanding Modules and Configuration Files: The Basics of PAM Authentication -- Finding a Module and Customizing Its Rules -- Building Good Rules with PAM -- Dissecting a Configuration File -- Skipping a Password with PAM -- Gaining Privileges -- Feeling the Power -- Gaining Superuser Privileges -- Pretending to Be Other Users -- Limiting Privileges with sudo -- Sudo Pseudonyms -- Installing sudo -- Adding Up the Aliases -- Adding Aliases to the sudo Configuration File -- Defining the Alias -- Securing Your Connections with SSH -- Using SSH for Top-Speed Connections -- Setting Up Public-Key Authentication to Secure SSH -- Logging In with SSH and Key Authentication -- Creating Shortcuts to Your Favorite SSH Locations -- Copying Files with scp -- Secure (And Fast) Port Forwarding with SSH -- Networking Like a Professional -- Protecting Yourself with a Firewall -- Finding Your Firewall -- Editing the Rules with Webmin -- Using VNC to Connect to Remote Desktops -- Sharing Desktops with VNC -- Inviting Your Friends to Use Your Desktop -- Serving Up a New Desktop with VNC Server -- Using tsclient to View Remote Desktops from Linux -- Making Cut and Paste Commands Work on a Remote Desktop -- Creating New VNC Desktops on Demand -- Streamlining Your Network Surveillance -- Exploring Your Network with lsof -- Discovering Network Connections -- Other Timesaving lsof Tricks -- Packet Sniffing with the Ethereal Network Analyzer -- Evaluating Your Network Security with Nessus -- Getting Up and Running with Nessus -- Using Nessus to Scan Your Network -- Keeping Your Plug-ins Up-to-Date -- Person-to-Person Networking with IRC -- Finding the Answers You Seek in a Linux Chat Room -- Chatting in the Fedora Chat Room -- Looking for Answers in the SuSE Chat Room -- Finding Fellow Mandrake Users in the Mandrake Chat Room -- Customizing KSirc--Who Do You Want to Be Today? -- Monitoring Your System -- Controlling Troublesome Processes at the Command Line -- Processing Processes with procps -- Keeping Track of Process Status with ps, pstree, and pgrep -- Killing Processes with pkill -- Killing Processes with killall -- Closing Windows with xkill -- Getting Your Processes' Priorities Straight -- Taking Care of New (And Old) Users -- Managing Users and Groups with the Fedora/Mandrake User Manager -- Managing Users and Groups with the SuSE User Administrator -- Keeping an Eye on Your System -- Keeping an Eye on the System Logs -- Customizing Your Log Files -- Keeping an Eye on Resources with KDE System Guard -- Serving Up the Internet and More -- Keeping an Apache Server in Top Form -- Setting Up Apache--Quick! -- Starting the Apache Service -- Building a Quick Web Page with OpenOffice.org -- Taking Your Site Public with Dynamic DNS -- Keeping Your Apache Server Up-to-Date the Easy Way -- Keeping an Eye on Your Servers -- Watching Your Web Server Traffic with apachetop -- Monitoring MySQL Server with the MySQL Control Center -- Watching Your MySQL Traffic with mtop -- Making a MySQL Server Your SQL Server -- Building a MySQL Server -- Replicating MySQL Data -- Choosing a Method to Back Up MySQL Data -- Backing Up and Restoring with mysqldump -- Backing Up with File System Tools -- Making a mysqlhotcopy of Your Database -- Archiving a Replication Slave -- Taking Care of Business with MySQL Administrator -- Safeguarding Your Apache Server with SSL Certificates -- Understanding the Basics of How Certificates Work -- Choosing an SSL Certificate -- Creating a Certificate Signing Request -- Creating a Self-Signed Certificate -- Creating a Signing Authority with openssl -- Trusting in Trusted Certification Authorities -- Exploring Your Certificate Collection with Mozilla -- Retrieving HTTPMail Using hotway and Evolution -- Introducing hotway -- Getting Started with hotway -- Setting Up Evolution to Read HTTPMail Accounts with hotway -- Ringing the Bells and Blowing the Whistles: Your Evolution Summary Page -- Stopping Spam with SpamAssassin -- Installing SpamAssassin --
Fine-Tuning SpamAssassin to Separate the Ham from the Spam -- Adding a New Filter to Evolution -- Serving Up a Big Bowl of the RulesDuJour -- Using Webmin to Simplify Sendmail Configuration -- Registering Your Address -- Taming a Sendmail Server -- Tweaking Your Configuration Files with Webmin -- Backing Up Means Never Having to Say You're Sorry -- Getting Ready to Back Up Your Data -- Deciding What to Archive -- Choosing Archive Media -- Choosing an Archive Scheme -- Choosing an Archive Program -- Backing Up Your Data -- Estimating Your Media Needs -- Creating Data Archives with tar -- Starting a Differential Backup Cycle -- Starting an Incremental Backup Cycle -- Restoring from Backup with tar -- Backing Up to CD (Or DVD) with cdbackup -- Quick Backup to Remote Storage -- Combining the Power of tar with ssh for Quick Remote Backups -- Backing Up to a Remote Computer with rdist and ssh -- Archiving Changes with CVS -- Getting Started with CVS -- Creating a CVS Repository -- Populating Your Repository with Files -- Checking Files In and Out (Or Playing in Your Sandbox) -- Simplifying CVS with cervisia -- Programming Tricks -- Using Open-Source APIs to Save Time -- Using the libcurl Library (C Programming) -- Uploading a File with a Simple Program Using libcurl -- Installing the Ming Library -- Building a Simple Flash Movie with Ming -- Building Interactive Movies with Ming -- Timesaving PHP Tricks -- Doing the curl E-shuffle with PHP -- Sending E-Mail from PHP When Problems Occur -- Using the DDD Graphical Debugger with Perl -- Debugging Perl Code with DDD -- Making Stop Signs: Using Breakpoints to Watch Code -- Tracking Variable Values in the Data Window -- The Scary (Or Fun!) Stuff -- Burning CD-Rs without Getting Burned -- Making Fedora Distribution CDs -- Burning an ISO File to Disc at the Command Line -- Creating an ISO Image at the Command Line -- Burning CDs without Making an ISO First -- Search and Destroy setuid and setgid Programs -- Exploring How setuid and setgid Can Be Dangerous -- Identifying the Potential Troublemakers--Fast -- Deciding to Turn Off setuid or setgid -- Changing the setuid or setgid Bit -- Quarantining Suspicious Programs with UML -- Who Belongs in Jail? -- Using UML to Jail Programs -- Changing the Default Password to the Jail -- Installing New Software and Resolving Conflicts -- Troubleshooting Persnickety Programs -- Using Isof to Find Out Which Files Are Open -- Debugging Your Environment with strace -- Investigating Programs with Itrace -- Handy strace and Itrace Options -- Recording Program Errors with valgrind -- Securing the Fort with Bastille -- Hardening Your Hat with Bastille -- Keeping Abreast of Security Issues -- Creating a Second Line of Defense with LIDS -- Turning LIDS On and Off -- Testing LIDS before Applying It to Your System -- Understanding the LIDS Access Control List -- Controlling File Access with LIDS -- Hiding Processes with LIDS -- Running Down the Privilege List -- Getting Graphical with Shell Scripts -- Getting Graphical at the Command Line.
* Formerly known as Red Hat Linux, the Fedora Core distribution is an excellent, no-cost alternative to Windows, Solaris, and other expensive operating systems * Red Hat currently controls an estimated seventy percent of the Linux * market in the U.S. * This book gives experienced and first-time Fedora users sixty concise, step-by-step, timesaving techniques to help them perform tasks with Fedora more efficiently * Organized by topic, the techniques are presented in the friendly, easy-to-understand For Dummies style, with a minimum of technical jargon * The techniques run the gamut of end-user, system administration, and development tasks, ranging from desktop, file system, RPM, and database tips to Internet server, e-mail server, networking, system monitoring, security, and Linux kernel tricks * Covers the latest release of Red Hat's Fedora Core distribution
There are no comments on this title.