Image from Google Jackets
Normal view MARC view

Linux timesaving techniques for dummies. by Susan Douglas and Korry Douglas.

By: Contributor(s): Series: --For dummiesPublication details: Hoboken, NJ : Wiley Pub., c2004.Description: xvi, 496 p. : ill. ; 23 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 0764571737 (pbk.) :
Subject(s): LOC classification:
  • QA76.76.O63 D688 2004
Contents:
Making the Desktop Work for You -- Finding the Power in KDE Protocols -- Discovering Your Protocols -- Working with CD Audio Tracks Using audiocd -- Managing Snapshots with the camera: Protocol -- Remote File Management with fish -- Getting Help with help:, info:, and man -- Viewing Your Local Network with the smb: Protocol -- Other KDE Protocols -- Getting GNOME Virtual File Systems to Do the Work for You -- Using GNOME VFS Modules -- Stacking VFS Modules -- Working with Packages: rpm and rpms -- Putting VFS to Work at the Command Line -- Burning CDs with a VFS -- Skinning Your Desktop with VFS -- Streamlining Your Work with File Associations -- Classifying Data with MIME -- Creating KDE File Associations -- Creating New MIME Types with GNOME -- Prompting Yourself with a Custom Prompt -- Making Basic Prompt Transformations -- Adding Dynamically Updated Data to Your Prompt -- Colorizing Your Prompt -- Seeing a Red Alert When You Have Superuser Privileges -- Saving Your Work -- Getting There Quick with Dynamic Shortcuts -- Completing Names Automatically -- Using the Escape Key to Your Advantage -- Customizing Completion for Maximum Speed -- Using cd Shortcuts for Rapid Transit -- Using cd and ls to Navigate through bash -- Setting Your CDPATH Variables to Find Directories Fast -- Remembering Where You've Been with pushd and popd -- Manipulating Your Stack with dirs -- Typing Less and Doing More with Handy Automagic Variables -- Show Me the : Giving Temporary Files Unique Names -- Streamlining Archive Searches -- Turning the Output of a Command into a Variable with () -- Using UID and EUID in Shell Scripts -- Getting Quick Access to Programs with PATH -- Customizing Variables for Rapid Transit -- Logging In, Logging Out -- Finding the Right Shell Script -- Customizing Your Autostart File -- Making History (Work for You) -- Navigating the History List -- Customizing the History List -- Executing Commands Quickly with History Variables -- Keeping Your Life Simple with Aliases and Functions -- Viewing Your Aliases -- Creating Simple Timesaving Aliases -- Using Aliases for Complex Commands -- Automating Tedious Tasks with Functions -- Monitoring Your System in a Snap -- Un-tarring the Easy Way -- Getting the Most from Your File System -- Sharing Files and Printers in a Windows World -- What Is Samba? -- Getting Up and Running with Samba -- Sharing Linux Resources with Other Computers (SMB Clients) -- Hooking Everyone Up to the Printer -- Plugging In to Remote Data with Linux Programs Quickly -- Finding What You Need -- Finding Files with locate -- Finding Files with find -- Qualifying Your Search with the find Command -- Acting on What You Find -- Building Complex Commands with xargs -- Moving Made Easy with Archives -- Creating Archives with File Roller -- Inspecting and Extracting Archives with File Roller -- Adding Functionality to tar with Complex Commands -- Uprooting Entire Directory Trees with scp -- Splitting Big Files into Manageable Chunks -- Downloading and Uploading Files in a Snap -- Building Software from Downloaded tarballs -- Versatile Downloading with wget -- Downloading and Uploading with curl -- Building a Playpen with User Mode Linux -- Choosing the ADIOS Version of User Mode Linux -- Setting Up ADIOS -- Finding Your Way around UML -- Connecting to the Internet from an ADIOS VM -- Using a GUI with UML -- Installing Software into UML -- Merging Changes to Your Prototype -- Good Housekeeping with Linux -- Red-lining RPM Queries -- Querying RPM Packages for Content -- Digesting Information -- Creating a Package Index -- Querying for Prerequisites -- Don't Put That in Your Drive; You Don't Know Where That's Been! -- Installing Made Easy with RPM -- Dissecting an RPM Package -- Using RPM at the Command Line -- Removing RPMs -- Flagging Down RPM -- Getting Graphic with RPM -- Getting Comfortable with RPM -- Saving Time with--upgrade -- Verifying Your System -- Reading the Tamper-Proof Seal -- Keeping Up-to-Date with apt and Synaptic -- Setting Up Synaptic and apt in a Snap -- Keeping Up-to-Date with apt and Synaptic: The Basics -- Upgrading Your Entire Computer -- Handy Hints about Synaptic -- Importing the Keys to the Repository -- Setting Up Automatic Services -- Letting Task Scheduler Work for You -- Making Your Inner System Administrator Happy (And Productive) -- Reining In Resources with Disk Quotas -- Using System Accounting to Keep Track of Users -- Spring Cleaning Essentials -- Running Down the Runlevels -- Disabling Unused Services -- Removing Unneeded Services -- Removing Old Users and Their Files -- Tweaking the Kernel on Your Linux System -- Taking Good Care of Your Kernel -- Adding and Removing Kernel Modules -- Manipulating Boot Time Parameters -- Creating a Custom Kernel -- Reconfiguring Your Kernel--Ready, Set, Go! -- Making an Emergency Plan, or Boot Disk -- Finding the Source Code -- Configuring a New Kernel -- Customizing the Kernel -- Building the Kernel -- Coping with the SELinux Security System -- Understanding the Principles of SELinux -- Disabling or Disarming SELinux -- Playing the Right Role -- Finding Out about Your SELinux Policy -- Finding Out about Your System with/proc -- Exploring the Process-Related Entries in/proc -- Surveying Your System from/proc -- Closing Down Security Gaps with/proc -- Popping the Cork: Speeding Up WINE with/proc -- Securing Your Workspace -- Closing Those Prying Eyes -- Reading and Understanding File Permissions -- Controlling Permissions at the Command Line -- Changing File Permissions from a Desktop -- Using Encryption for Extra Security -- Encryption Made Easy with kgpg and the KDE Desktop -- Encrypting Documents with gpg at the Command Line -- Encrypting E-Mail for Added Security -- Securing a Large Network with Custom Authentication -- Using Cross-Platform Authentication with Linux and Windows -- Using PAM and Kerberos to Serve Up Authentication -- Customizing Authentication with PAM -- Understanding Modules and Configuration Files: The Basics of PAM Authentication -- Finding a Module and Customizing Its Rules -- Building Good Rules with PAM -- Dissecting a Configuration File -- Skipping a Password with PAM -- Gaining Privileges -- Feeling the Power -- Gaining Superuser Privileges -- Pretending to Be Other Users -- Limiting Privileges with sudo -- Sudo Pseudonyms -- Installing sudo -- Adding Up the Aliases -- Adding Aliases to the sudo Configuration File -- Defining the Alias -- Securing Your Connections with SSH -- Using SSH for Top-Speed Connections -- Setting Up Public-Key Authentication to Secure SSH -- Logging In with SSH and Key Authentication -- Creating Shortcuts to Your Favorite SSH Locations -- Copying Files with scp -- Secure (And Fast) Port Forwarding with SSH -- Networking Like a Professional -- Protecting Yourself with a Firewall -- Finding Your Firewall -- Editing the Rules with Webmin -- Using VNC to Connect to Remote Desktops -- Sharing Desktops with VNC -- Inviting Your Friends to Use Your Desktop -- Serving Up a New Desktop with VNC Server -- Using tsclient to View Remote Desktops from Linux -- Making Cut and Paste Commands Work on a Remote Desktop -- Creating New VNC Desktops on Demand -- Streamlining Your Network Surveillance -- Exploring Your Network with lsof -- Discovering Network Connections -- Other Timesaving lsof Tricks -- Packet Sniffing with the Ethereal Network Analyzer -- Evaluating Your Network Security with Nessus -- Getting Up and Running with Nessus -- Using Nessus to Scan Your Network -- Keeping Your Plug-ins Up-to-Date -- Person-to-Person Networking with IRC -- Finding the Answers You Seek in a Linux Chat Room -- Chatting in the Fedora Chat Room -- Looking for Answers in the SuSE Chat Room -- Finding Fellow Mandrake Users in the Mandrake Chat Room -- Customizing KSirc--Who Do You Want to Be Today? -- Monitoring Your System -- Controlling Troublesome Processes at the Command Line -- Processing Processes with procps -- Keeping Track of Process Status with ps, pstree, and pgrep -- Killing Processes with pkill -- Killing Processes with killall -- Closing Windows with xkill -- Getting Your Processes' Priorities Straight -- Taking Care of New (And Old) Users -- Managing Users and Groups with the Fedora/Mandrake User Manager -- Managing Users and Groups with the SuSE User Administrator -- Keeping an Eye on Your System -- Keeping an Eye on the System Logs -- Customizing Your Log Files -- Keeping an Eye on Resources with KDE System Guard -- Serving Up the Internet and More -- Keeping an Apache Server in Top Form -- Setting Up Apache--Quick! -- Starting the Apache Service -- Building a Quick Web Page with OpenOffice.org -- Taking Your Site Public with Dynamic DNS -- Keeping Your Apache Server Up-to-Date the Easy Way -- Keeping an Eye on Your Servers -- Watching Your Web Server Traffic with apachetop -- Monitoring MySQL Server with the MySQL Control Center -- Watching Your MySQL Traffic with mtop -- Making a MySQL Server Your SQL Server -- Building a MySQL Server -- Replicating MySQL Data -- Choosing a Method to Back Up MySQL Data -- Backing Up and Restoring with mysqldump -- Backing Up with File System Tools -- Making a mysqlhotcopy of Your Database -- Archiving a Replication Slave -- Taking Care of Business with MySQL Administrator -- Safeguarding Your Apache Server with SSL Certificates -- Understanding the Basics of How Certificates Work -- Choosing an SSL Certificate -- Creating a Certificate Signing Request -- Creating a Self-Signed Certificate -- Creating a Signing Authority with openssl -- Trusting in Trusted Certification Authorities -- Exploring Your Certificate Collection with Mozilla -- Retrieving HTTPMail Using hotway and Evolution -- Introducing hotway -- Getting Started with hotway -- Setting Up Evolution to Read HTTPMail Accounts with hotway -- Ringing the Bells and Blowing the Whistles: Your Evolution Summary Page -- Stopping Spam with SpamAssassin -- Installing SpamAssassin --
Fine-Tuning SpamAssassin to Separate the Ham from the Spam -- Adding a New Filter to Evolution -- Serving Up a Big Bowl of the RulesDuJour -- Using Webmin to Simplify Sendmail Configuration -- Registering Your Address -- Taming a Sendmail Server -- Tweaking Your Configuration Files with Webmin -- Backing Up Means Never Having to Say You're Sorry -- Getting Ready to Back Up Your Data -- Deciding What to Archive -- Choosing Archive Media -- Choosing an Archive Scheme -- Choosing an Archive Program -- Backing Up Your Data -- Estimating Your Media Needs -- Creating Data Archives with tar -- Starting a Differential Backup Cycle -- Starting an Incremental Backup Cycle -- Restoring from Backup with tar -- Backing Up to CD (Or DVD) with cdbackup -- Quick Backup to Remote Storage -- Combining the Power of tar with ssh for Quick Remote Backups -- Backing Up to a Remote Computer with rdist and ssh -- Archiving Changes with CVS -- Getting Started with CVS -- Creating a CVS Repository -- Populating Your Repository with Files -- Checking Files In and Out (Or Playing in Your Sandbox) -- Simplifying CVS with cervisia -- Programming Tricks -- Using Open-Source APIs to Save Time -- Using the libcurl Library (C Programming) -- Uploading a File with a Simple Program Using libcurl -- Installing the Ming Library -- Building a Simple Flash Movie with Ming -- Building Interactive Movies with Ming -- Timesaving PHP Tricks -- Doing the curl E-shuffle with PHP -- Sending E-Mail from PHP When Problems Occur -- Using the DDD Graphical Debugger with Perl -- Debugging Perl Code with DDD -- Making Stop Signs: Using Breakpoints to Watch Code -- Tracking Variable Values in the Data Window -- The Scary (Or Fun!) Stuff -- Burning CD-Rs without Getting Burned -- Making Fedora Distribution CDs -- Burning an ISO File to Disc at the Command Line -- Creating an ISO Image at the Command Line -- Burning CDs without Making an ISO First -- Search and Destroy setuid and setgid Programs -- Exploring How setuid and setgid Can Be Dangerous -- Identifying the Potential Troublemakers--Fast -- Deciding to Turn Off setuid or setgid -- Changing the setuid or setgid Bit -- Quarantining Suspicious Programs with UML -- Who Belongs in Jail? -- Using UML to Jail Programs -- Changing the Default Password to the Jail -- Installing New Software and Resolving Conflicts -- Troubleshooting Persnickety Programs -- Using Isof to Find Out Which Files Are Open -- Debugging Your Environment with strace -- Investigating Programs with Itrace -- Handy strace and Itrace Options -- Recording Program Errors with valgrind -- Securing the Fort with Bastille -- Hardening Your Hat with Bastille -- Keeping Abreast of Security Issues -- Creating a Second Line of Defense with LIDS -- Turning LIDS On and Off -- Testing LIDS before Applying It to Your System -- Understanding the LIDS Access Control List -- Controlling File Access with LIDS -- Hiding Processes with LIDS -- Running Down the Privilege List -- Getting Graphical with Shell Scripts -- Getting Graphical at the Command Line.
Summary: * Formerly known as Red Hat Linux, the Fedora Core distribution is an excellent, no-cost alternative to Windows, Solaris, and other expensive operating systems * Red Hat currently controls an estimated seventy percent of the Linux * market in the U.S. * This book gives experienced and first-time Fedora users sixty concise, step-by-step, timesaving techniques to help them perform tasks with Fedora more efficiently * Organized by topic, the techniques are presented in the friendly, easy-to-understand For Dummies style, with a minimum of technical jargon * The techniques run the gamut of end-user, system administration, and development tasks, ranging from desktop, file system, RPM, and database tips to Internet server, e-mail server, networking, system monitoring, security, and Linux kernel tricks * Covers the latest release of Red Hat's Fedora Core distribution
Holdings
Item type Current library Home library Shelving location Call number Materials specified Status Barcode
Books Books American University in Dubai American University in Dubai Main Collection QA 76.76 .O63 D688 2004 (Browse shelf(Opens below)) Copy Type:01 - Books Available 657262

Includes index.

Making the Desktop Work for You -- Finding the Power in KDE Protocols -- Discovering Your Protocols -- Working with CD Audio Tracks Using audiocd -- Managing Snapshots with the camera: Protocol -- Remote File Management with fish -- Getting Help with help:, info:, and man -- Viewing Your Local Network with the smb: Protocol -- Other KDE Protocols -- Getting GNOME Virtual File Systems to Do the Work for You -- Using GNOME VFS Modules -- Stacking VFS Modules -- Working with Packages: rpm and rpms -- Putting VFS to Work at the Command Line -- Burning CDs with a VFS -- Skinning Your Desktop with VFS -- Streamlining Your Work with File Associations -- Classifying Data with MIME -- Creating KDE File Associations -- Creating New MIME Types with GNOME -- Prompting Yourself with a Custom Prompt -- Making Basic Prompt Transformations -- Adding Dynamically Updated Data to Your Prompt -- Colorizing Your Prompt -- Seeing a Red Alert When You Have Superuser Privileges -- Saving Your Work -- Getting There Quick with Dynamic Shortcuts -- Completing Names Automatically -- Using the Escape Key to Your Advantage -- Customizing Completion for Maximum Speed -- Using cd Shortcuts for Rapid Transit -- Using cd and ls to Navigate through bash -- Setting Your CDPATH Variables to Find Directories Fast -- Remembering Where You've Been with pushd and popd -- Manipulating Your Stack with dirs -- Typing Less and Doing More with Handy Automagic Variables -- Show Me the : Giving Temporary Files Unique Names -- Streamlining Archive Searches -- Turning the Output of a Command into a Variable with () -- Using UID and EUID in Shell Scripts -- Getting Quick Access to Programs with PATH -- Customizing Variables for Rapid Transit -- Logging In, Logging Out -- Finding the Right Shell Script -- Customizing Your Autostart File -- Making History (Work for You) -- Navigating the History List -- Customizing the History List -- Executing Commands Quickly with History Variables -- Keeping Your Life Simple with Aliases and Functions -- Viewing Your Aliases -- Creating Simple Timesaving Aliases -- Using Aliases for Complex Commands -- Automating Tedious Tasks with Functions -- Monitoring Your System in a Snap -- Un-tarring the Easy Way -- Getting the Most from Your File System -- Sharing Files and Printers in a Windows World -- What Is Samba? -- Getting Up and Running with Samba -- Sharing Linux Resources with Other Computers (SMB Clients) -- Hooking Everyone Up to the Printer -- Plugging In to Remote Data with Linux Programs Quickly -- Finding What You Need -- Finding Files with locate -- Finding Files with find -- Qualifying Your Search with the find Command -- Acting on What You Find -- Building Complex Commands with xargs -- Moving Made Easy with Archives -- Creating Archives with File Roller -- Inspecting and Extracting Archives with File Roller -- Adding Functionality to tar with Complex Commands -- Uprooting Entire Directory Trees with scp -- Splitting Big Files into Manageable Chunks -- Downloading and Uploading Files in a Snap -- Building Software from Downloaded tarballs -- Versatile Downloading with wget -- Downloading and Uploading with curl -- Building a Playpen with User Mode Linux -- Choosing the ADIOS Version of User Mode Linux -- Setting Up ADIOS -- Finding Your Way around UML -- Connecting to the Internet from an ADIOS VM -- Using a GUI with UML -- Installing Software into UML -- Merging Changes to Your Prototype -- Good Housekeeping with Linux -- Red-lining RPM Queries -- Querying RPM Packages for Content -- Digesting Information -- Creating a Package Index -- Querying for Prerequisites -- Don't Put That in Your Drive; You Don't Know Where That's Been! -- Installing Made Easy with RPM -- Dissecting an RPM Package -- Using RPM at the Command Line -- Removing RPMs -- Flagging Down RPM -- Getting Graphic with RPM -- Getting Comfortable with RPM -- Saving Time with--upgrade -- Verifying Your System -- Reading the Tamper-Proof Seal -- Keeping Up-to-Date with apt and Synaptic -- Setting Up Synaptic and apt in a Snap -- Keeping Up-to-Date with apt and Synaptic: The Basics -- Upgrading Your Entire Computer -- Handy Hints about Synaptic -- Importing the Keys to the Repository -- Setting Up Automatic Services -- Letting Task Scheduler Work for You -- Making Your Inner System Administrator Happy (And Productive) -- Reining In Resources with Disk Quotas -- Using System Accounting to Keep Track of Users -- Spring Cleaning Essentials -- Running Down the Runlevels -- Disabling Unused Services -- Removing Unneeded Services -- Removing Old Users and Their Files -- Tweaking the Kernel on Your Linux System -- Taking Good Care of Your Kernel -- Adding and Removing Kernel Modules -- Manipulating Boot Time Parameters -- Creating a Custom Kernel -- Reconfiguring Your Kernel--Ready, Set, Go! -- Making an Emergency Plan, or Boot Disk -- Finding the Source Code -- Configuring a New Kernel -- Customizing the Kernel -- Building the Kernel -- Coping with the SELinux Security System -- Understanding the Principles of SELinux -- Disabling or Disarming SELinux -- Playing the Right Role -- Finding Out about Your SELinux Policy -- Finding Out about Your System with/proc -- Exploring the Process-Related Entries in/proc -- Surveying Your System from/proc -- Closing Down Security Gaps with/proc -- Popping the Cork: Speeding Up WINE with/proc -- Securing Your Workspace -- Closing Those Prying Eyes -- Reading and Understanding File Permissions -- Controlling Permissions at the Command Line -- Changing File Permissions from a Desktop -- Using Encryption for Extra Security -- Encryption Made Easy with kgpg and the KDE Desktop -- Encrypting Documents with gpg at the Command Line -- Encrypting E-Mail for Added Security -- Securing a Large Network with Custom Authentication -- Using Cross-Platform Authentication with Linux and Windows -- Using PAM and Kerberos to Serve Up Authentication -- Customizing Authentication with PAM -- Understanding Modules and Configuration Files: The Basics of PAM Authentication -- Finding a Module and Customizing Its Rules -- Building Good Rules with PAM -- Dissecting a Configuration File -- Skipping a Password with PAM -- Gaining Privileges -- Feeling the Power -- Gaining Superuser Privileges -- Pretending to Be Other Users -- Limiting Privileges with sudo -- Sudo Pseudonyms -- Installing sudo -- Adding Up the Aliases -- Adding Aliases to the sudo Configuration File -- Defining the Alias -- Securing Your Connections with SSH -- Using SSH for Top-Speed Connections -- Setting Up Public-Key Authentication to Secure SSH -- Logging In with SSH and Key Authentication -- Creating Shortcuts to Your Favorite SSH Locations -- Copying Files with scp -- Secure (And Fast) Port Forwarding with SSH -- Networking Like a Professional -- Protecting Yourself with a Firewall -- Finding Your Firewall -- Editing the Rules with Webmin -- Using VNC to Connect to Remote Desktops -- Sharing Desktops with VNC -- Inviting Your Friends to Use Your Desktop -- Serving Up a New Desktop with VNC Server -- Using tsclient to View Remote Desktops from Linux -- Making Cut and Paste Commands Work on a Remote Desktop -- Creating New VNC Desktops on Demand -- Streamlining Your Network Surveillance -- Exploring Your Network with lsof -- Discovering Network Connections -- Other Timesaving lsof Tricks -- Packet Sniffing with the Ethereal Network Analyzer -- Evaluating Your Network Security with Nessus -- Getting Up and Running with Nessus -- Using Nessus to Scan Your Network -- Keeping Your Plug-ins Up-to-Date -- Person-to-Person Networking with IRC -- Finding the Answers You Seek in a Linux Chat Room -- Chatting in the Fedora Chat Room -- Looking for Answers in the SuSE Chat Room -- Finding Fellow Mandrake Users in the Mandrake Chat Room -- Customizing KSirc--Who Do You Want to Be Today? -- Monitoring Your System -- Controlling Troublesome Processes at the Command Line -- Processing Processes with procps -- Keeping Track of Process Status with ps, pstree, and pgrep -- Killing Processes with pkill -- Killing Processes with killall -- Closing Windows with xkill -- Getting Your Processes' Priorities Straight -- Taking Care of New (And Old) Users -- Managing Users and Groups with the Fedora/Mandrake User Manager -- Managing Users and Groups with the SuSE User Administrator -- Keeping an Eye on Your System -- Keeping an Eye on the System Logs -- Customizing Your Log Files -- Keeping an Eye on Resources with KDE System Guard -- Serving Up the Internet and More -- Keeping an Apache Server in Top Form -- Setting Up Apache--Quick! -- Starting the Apache Service -- Building a Quick Web Page with OpenOffice.org -- Taking Your Site Public with Dynamic DNS -- Keeping Your Apache Server Up-to-Date the Easy Way -- Keeping an Eye on Your Servers -- Watching Your Web Server Traffic with apachetop -- Monitoring MySQL Server with the MySQL Control Center -- Watching Your MySQL Traffic with mtop -- Making a MySQL Server Your SQL Server -- Building a MySQL Server -- Replicating MySQL Data -- Choosing a Method to Back Up MySQL Data -- Backing Up and Restoring with mysqldump -- Backing Up with File System Tools -- Making a mysqlhotcopy of Your Database -- Archiving a Replication Slave -- Taking Care of Business with MySQL Administrator -- Safeguarding Your Apache Server with SSL Certificates -- Understanding the Basics of How Certificates Work -- Choosing an SSL Certificate -- Creating a Certificate Signing Request -- Creating a Self-Signed Certificate -- Creating a Signing Authority with openssl -- Trusting in Trusted Certification Authorities -- Exploring Your Certificate Collection with Mozilla -- Retrieving HTTPMail Using hotway and Evolution -- Introducing hotway -- Getting Started with hotway -- Setting Up Evolution to Read HTTPMail Accounts with hotway -- Ringing the Bells and Blowing the Whistles: Your Evolution Summary Page -- Stopping Spam with SpamAssassin -- Installing SpamAssassin --

Fine-Tuning SpamAssassin to Separate the Ham from the Spam -- Adding a New Filter to Evolution -- Serving Up a Big Bowl of the RulesDuJour -- Using Webmin to Simplify Sendmail Configuration -- Registering Your Address -- Taming a Sendmail Server -- Tweaking Your Configuration Files with Webmin -- Backing Up Means Never Having to Say You're Sorry -- Getting Ready to Back Up Your Data -- Deciding What to Archive -- Choosing Archive Media -- Choosing an Archive Scheme -- Choosing an Archive Program -- Backing Up Your Data -- Estimating Your Media Needs -- Creating Data Archives with tar -- Starting a Differential Backup Cycle -- Starting an Incremental Backup Cycle -- Restoring from Backup with tar -- Backing Up to CD (Or DVD) with cdbackup -- Quick Backup to Remote Storage -- Combining the Power of tar with ssh for Quick Remote Backups -- Backing Up to a Remote Computer with rdist and ssh -- Archiving Changes with CVS -- Getting Started with CVS -- Creating a CVS Repository -- Populating Your Repository with Files -- Checking Files In and Out (Or Playing in Your Sandbox) -- Simplifying CVS with cervisia -- Programming Tricks -- Using Open-Source APIs to Save Time -- Using the libcurl Library (C Programming) -- Uploading a File with a Simple Program Using libcurl -- Installing the Ming Library -- Building a Simple Flash Movie with Ming -- Building Interactive Movies with Ming -- Timesaving PHP Tricks -- Doing the curl E-shuffle with PHP -- Sending E-Mail from PHP When Problems Occur -- Using the DDD Graphical Debugger with Perl -- Debugging Perl Code with DDD -- Making Stop Signs: Using Breakpoints to Watch Code -- Tracking Variable Values in the Data Window -- The Scary (Or Fun!) Stuff -- Burning CD-Rs without Getting Burned -- Making Fedora Distribution CDs -- Burning an ISO File to Disc at the Command Line -- Creating an ISO Image at the Command Line -- Burning CDs without Making an ISO First -- Search and Destroy setuid and setgid Programs -- Exploring How setuid and setgid Can Be Dangerous -- Identifying the Potential Troublemakers--Fast -- Deciding to Turn Off setuid or setgid -- Changing the setuid or setgid Bit -- Quarantining Suspicious Programs with UML -- Who Belongs in Jail? -- Using UML to Jail Programs -- Changing the Default Password to the Jail -- Installing New Software and Resolving Conflicts -- Troubleshooting Persnickety Programs -- Using Isof to Find Out Which Files Are Open -- Debugging Your Environment with strace -- Investigating Programs with Itrace -- Handy strace and Itrace Options -- Recording Program Errors with valgrind -- Securing the Fort with Bastille -- Hardening Your Hat with Bastille -- Keeping Abreast of Security Issues -- Creating a Second Line of Defense with LIDS -- Turning LIDS On and Off -- Testing LIDS before Applying It to Your System -- Understanding the LIDS Access Control List -- Controlling File Access with LIDS -- Hiding Processes with LIDS -- Running Down the Privilege List -- Getting Graphical with Shell Scripts -- Getting Graphical at the Command Line.

* Formerly known as Red Hat Linux, the Fedora Core distribution is an excellent, no-cost alternative to Windows, Solaris, and other expensive operating systems * Red Hat currently controls an estimated seventy percent of the Linux * market in the U.S. * This book gives experienced and first-time Fedora users sixty concise, step-by-step, timesaving techniques to help them perform tasks with Fedora more efficiently * Organized by topic, the techniques are presented in the friendly, easy-to-understand For Dummies style, with a minimum of technical jargon * The techniques run the gamut of end-user, system administration, and development tasks, ranging from desktop, file system, RPM, and database tips to Internet server, e-mail server, networking, system monitoring, security, and Linux kernel tricks * Covers the latest release of Red Hat's Fedora Core distribution

There are no comments on this title.

to post a comment.
  • Monday - Friday
  • 8:00 AM - 5:00 PM
  • Saturday - Sunday
  • Closed
  • Phone: +971 431 83183
  • Email: Library@aud.edu
  • Address: Sheikh Zayed Road -- P.O. Box 28282, Dubai, AE
  • Map & Directions