Flylib.com
Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)
Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)
ISBN: 047010872X
EAN: 2147483647
Year: 2004
Pages: 124
Authors:
Neal Krawetz
BUY ON AMAZON
Back Cover
Back Cover
Hacking Ubuntu
Introduction
Living Dangerously
Who This Book Is For
How This Book Is Organized
Conventions Used in This Book
What You Need To Use This Book
What s on the Companion Website
Part I: Optimizing Your System
Chapter 1: Hacking the Installation
Selecting a Distribution
Installing the Server or Workstation
Using a USB Drive
Upgrading Ubuntu
Summary
Chapter 2: Making Ubuntu Usable
Using Ubuntu on a PC
Tuning Ubuntu on a Macintosh
Tweaking GDM
Navigating Nautilus
Summary
Chapter 3: Configuring Devices
Loading Modules
Starting Software Devices
Enabling Multiple CPUs (SMP)
Adding Printers
Adding Drives
Adding Other Devices
Summary
Part II: Working with Compatibility
Chapter 4: Managing Software
Understanding Package Repositories
Running Synaptic
Living Without Synaptic
Installing Common Functions
Installing Common Packages by Hand
Compiling and Developing Software
Summary
Chapter 5: Communicating Online
Securing Web Access with SSH
Managing E-mail with Evolution
Using E-mail with Thunderbird Mail
Instant Messaging with Gaim
Talking with VoIP
Summary
Chapter 6: Collaborating
Sharing Files
Working with Open Office
Collaborating Over the Network
Running Software in Emulators
Other Collaboration Tools
Summary
Part III: Improving Performance
Chapter 7: Tuning Processes
Viewing Running Processes
Identifying Resources
Finding Process Startups
Tuning Kernel Parameters
Speeding Up Boot Time
Summary
Chapter 8: Multitasking Applications
Tweaking the Workplace Switcher
Customizing Application Windows
Buffering Buffers
Automating Tasks
Tracking Projects
Summary
Chapter 9: Getting Graphical with Video Bling
Tuning Graphics
Switching Screensavers
Configuring Dual Monitors
Summary
Part IV: Securing Your System
Chapter 10: Locking Down Ubuntu
Hacking with Sudo
Using Gnu Privacy Guard (GPG)
Encrypting File Systems
Managing Logs and Caches
Summary
Chapter 11: Advanced Networking
Configuring Network Devices
Configuring Wireless Networks
Securing the Network
Enabling Proxies
Debugging the Network
Summary
Chapter 12: Enabling Services
Recognizing Network Threats
Mitigating Risks Before Going Public
Monitoring Attacks
Running Services
Summary
Index
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
List of Figures
List of Tables
List of Listings
List of Sidebars
Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)
ISBN: 047010872X
EAN: 2147483647
Year: 2004
Pages: 124
Authors:
Neal Krawetz
BUY ON AMAZON
Strategies for Information Technology Governance
Assessing Business-IT Alignment Maturity
A View on Knowledge Management: Utilizing a Balanced Scorecard Methodology for Analyzing Knowledge Metrics
Governance in IT Outsourcing Partnerships
The Evolution of IT Governance at NB Power
Governance Structures for IT in the Health Care Industry
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Local Area Network (LAN) Technologies
Address Resolution Protocol (ARP)
Transmission Control Protocol (TCP) Retransmission and Time-Out
Dynamic Host Configuration Protocol (DHCP) Server Service
RADIUS and Internet Authentication Service
C++ How to Program (5th Edition)
Personal, Distributed and Client/Server Computing
Logical Operators
Summary
Exercises
HTTP Request Types
Service-Oriented Architecture (SOA): Concepts, Technology, and Design
Classifying service model logic
Contrasting service modeling approaches (an example)
Service-Oriented Design (Part II: SOA Composition Guidelines)
WS-BPEL language basics
A.1. RailCo Ltd.
Oracle SQL*Plus: The Definitive Guide (Definitive Guides)
Transactions
Executing a Script
The DESCRIBE Command
The Product User Profile
Appendix B. SQL*Plus Format Elements
Comparing, Designing, and Deploying VPNs
Implementing QoS for MPLS Layer 3 VPNs
Scaling and Optimizing IPsec VPNs
Review Questions
Strengthening SSL Remote Access VPNs Security by Implementing Cisco Secure Desktop
Understanding VPLS
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies