دسترسی نامحدود
برای کاربرانی که ثبت نام کرده اند
برای ارتباط با ما می توانید از طریق شماره موبایل زیر از طریق تماس و پیامک با ما در ارتباط باشید
در صورت عدم پاسخ گویی از طریق پیامک با پشتیبان در ارتباط باشید
برای کاربرانی که ثبت نام کرده اند
درصورت عدم همخوانی توضیحات با کتاب
از ساعت 7 صبح تا 10 شب
ویرایش:
نویسندگان: Susan Douglas. Korry Douglas
سری: For Dummies
ISBN (شابک) : 9780764571732, 0764571737
ناشر: Wiley Publishing, Inc.
سال نشر: 2004
تعداد صفحات: 515
زبان: English
فرمت فایل : PDF (درصورت درخواست کاربر به PDF، EPUB یا AZW3 تبدیل می شود)
حجم فایل: 15 مگابایت
در صورت تبدیل فایل کتاب Linux Timesaving Techniques For Dummies به فرمت های PDF، EPUB، AZW3، MOBI و یا DJVU می توانید به پشتیبان اطلاع دهید تا فایل مورد نظر را تبدیل نمایند.
توجه داشته باشید کتاب تکنیک های صرفه جویی در زمان لینوکس نسخه زبان اصلی می باشد و کتاب ترجمه شده به فارسی نمی باشد. وبسایت اینترنشنال لایبرری ارائه دهنده کتاب های زبان اصلی می باشد و هیچ گونه کتاب ترجمه شده یا نوشته شده به فارسی را ارائه نمی دهد.
Cover Table of Contents Introduction Saving Time with This Book Foolish Assumptions What's in This Book Part I: Making the Desktop Work for You Part II: Getting the Most from Your File System Part III: Good Housekeeping with Linux Part IV: Tweaking the Kernel on Your Linux System Part V: Securing Your Workspace Part VI: Networking Like a Professional Part VII: Monitoring Your System Part VIII: Serving Up the Internet and More Part IX: Backing Up Means Never Having to Say You're Sorry Part X: Programming Tricks Part XI: The Scary (Or Fun!) Stuff Icons Used in This Book Part I: Making the Desktop Work for You Technique 1: Finding the Power in KDE Protocols Discovering Your Protocols Working with CD Audio Tracks Using audiocd: Managing Snapshots with the camera: Protocol Remote File Management with fish: Getting Help with help:, info:, and man: Viewing Your Local Network with the smb:Protocol Other KDE Protocols Technique 2: Getting GNOME Virtual File Systems to Do the Work for You Using GNOME VFS Modules Stacking VFS Modules Working with Packages: rpm and rpms Putting VFS to Work at the Command Line Burning CDs with a VFS Skinning Your Desktop with VFS Technique 3: Streamlining Your Work with FileAssociations Classifying Data with MIME Creating KDE File Associations Creating New MIME Types with GNOME Technique 4: Prompting Yourself with a CustomPrompt Making Basic Prompt Transformations Adding Dynamically Updated Data to Your Prompt Colorizing Your Prompt Seeing a Red Alert When You Have Superuser Privileges Saving Your Work Technique 5: Getting There Quick with DynamicShortcuts Completing Names Automatically Using the Escape Key to Your Advantage Customizing Completion for Maximum Speed Technique 6: Using cd Shortcuts for Rapid Transit Using cd and ls to Navigate through bash Setting Your CDPATH Variables to Find Directories Fast Remembering Where You've Been with pushd andpopd Manipulating Your Stack with dirs Technique 7: Typing Less and Doing More with Handy Automagic Variables Show Me the $$: Giving Temporary Files UniqueNames Streamlining Archive Searches Turning the Output of a Command into a Variable with $( ) Using $UID and $EUID in Shell Scripts Getting Quick Access to Programs with $PATH Customizing Variables for Rapid Transit Technique 8: Logging In, Logging Out Finding the Right Shell Script Choosing your victims Timing is everything Cleaning up made easy Changing prototype scripts Customizing Your Autostart File Technique 9: Making History (Work for You) Navigating the History List Scrolling Summoning a command by number Searching through history Customizing the History List Adjusting key default settings Filtering the history list Executing Commands Quickly with History Variables Technique 10: Keeping Your Life Simple with Aliases and Functions Viewing Your Aliases Creating Simple Timesaving Aliases Using Aliases for Complex Commands Automating Tedious Tasks with Functions Filtering file searches by file type Automatic downloading Monitoring Your System in a Snap Un-tarring the Easy Way Part II: Getting the Most from Your File System Technique 11: Sharing Files and Printers in a Windows World What Is Samba? Getting Up and Running with Samba Checking whether Samba is installed Enabling Samba Sharing Linux Resources with Other Computers (SMBClients) Adjusting the workgroup name and creating user accounts Giving a Windows machine access to your home directory Sharing Linux files and directories with other computers Hooking Everyone Up to the Printer Sharing Linux printers with SWAT Using a Windows printer from Linux Plugging In to Remote Data with Linux Programs Quickly Technique 12: Finding What You Need Finding Files with locate Finding Files with find Qualifying Your Search with the find Command Doing updated filename searches Adding time-based qualifications Filtering by file size Joining qualifications with AND and OR operators Perusing commonly used qualifications Acting on What You Find Cracking open a file's info with -ls Displaying specific info with -printf Checking disk usage by user Executing commands with find Building Complex Commands with xargs Technique 13: Moving Made Easy with Archives Creating Archives with File Roller Inspecting and Extracting Archives with File Roller Adding Functionality to tar with Complex Commands Building archives from the command line Archiving complex search results Backing up an installed package Uprooting Entire Directory Trees with scp Splitting Big Files into Manageable Chunks Technique 14: Downloading and Uploading Files in a Snap Building Software from Downloaded tarballs Compiling a tarball: The basic steps Downloading and compiling SuperKaramba Versatile Downloading with wget Mirroring sites with wget Verifying your bookmarks with wget Downloading files with wget Downloading and unpacking in one quick step wget's optional flags Downloading and Uploading with curl Technique 15: Building a Playpen with User Mode Linux Choosing the ADIOS Version of User Mode Linux Setting Up ADIOS Downloading ADIOS Burning ADIOS to CD Installing ADIOS Finding Your Way around UML Connecting to the Internet from an ADIOS VM Using a GUI with UML Installing Software into UML Merging Changes to Your Prototype Part III: Good Housekeeping with Linux Technique 16: Red-lining RPM Queries Querying RPM Packages for Content Digesting Information Creating a Package Index Querying for Prerequisites Don't Put That in Your Drive; You Don't Know Where That's Been! Technique 17: Installing Made Easy with RPM Dissecting an RPM Package Using RPM at the Command Line Removing RPMs Flagging Down RPM Getting Graphic with RPM Quick installations from distribution media with Fedora's Package Manager Using SuSE's package manager to your advantage Using Rpmdrake to install from media Installing from your Konqueror browser Technique 18: Getting Comfortable with RPM Saving Time with - -upgrade Verifying Your System Reading the Tamper-Proof Seal Technique 19: Keeping Up-to-Date with apt andSynaptic Setting Up Synaptic and apt in a Snap Keeping Up-to-Date with apt and Synaptic: The Basics Upgrading Your Entire Computer Handy Hints about Synaptic Changing repositories Viewing package details Installing new packages with Synaptic Importing the Keys to the Repository Technique 20: Setting Up Automatic Services Letting Task Scheduler Work for You Scheduling a new task Editing a task Adding environment variables Technique 21: Making Your Inner System Administrator Happy (And Productive) Reining In Resources with Disk Quotas Installing the quota RPM package Enabling file system quotas Getting your files together Setting quotas Reviewing your quotas Using System Accounting to Keep Track of Users Setting up system accounting Looking up user login hours Checking out command and program usage Technique 22: Spring Cleaning Essentials Running Down the Runlevels Runlevel basics Customizing runlevels in Fedora Customizing runlevels in SuSE Customizing runlevels in Mandrake Customizing runlevels at the command line Switching to a new runlevel Disabling Unused Services Removing Unneeded Services Removing Old Users and Their Files Part IV: Tweaking the Kernel on Your Linux System Technique 23: Taking Good Care of Your Kernel Adding and Removing Kernel Modules Learning about modules Installing a module with insmod Taking care of dependencies automatically with modprobe and depmod Loading a module for a slightly different kernel with insmod and modprobe Removing modules with rmmod Manipulating Boot Time Parameters Technique 24: Creating a Custom Kernel Reconfiguring Your Kernel - Ready, Set, Go! Step 1: Making an Emergency Plan, or Boot Disk Step 2: Finding the Source Code Step 3: Configuring a New Kernel Step 4: Customizing the Kernel Step 5: Building the Kernel Technique 25: Coping with the SELinux SecuritySystem Understanding the Principles of SELinux Everything is an object Identifying subjects in SELinux Understanding the security context Disabling or Disarming SELinux Playing the Right Role Finding Out about Your SELinux Policy Technique 26: Finding Out about Your System with /proc Exploring the Process-Related Entries in /proc Surveying Your System from /proc Closing Down Security Gaps with /proc Popping the Cork: Speeding Up WINE with /proc Part V: Securing Your Workspace Technique 27: Closing Those Prying Eyes Reading and Understanding File Permissions Controlling Permissions at the Command Line Changing File Permissions from a Desktop Technique 28: Using Encryption for ExtraSecurity Encryption Made Easy with kgpg and the KDE Desktop Creating keys with kgpg Sharing your key with the world Importing a public key from a public-key server Encrypting and decrypting documents with drag-and-drop ease Encrypting Documents with gpg at the Command Line Sharing a secret file Creating a key pair and receiving encrypted documents Encrypting documents on your home system Encrypting E-Mail for Added Security Encrypting with Ximian Evolution Setting up Mozilla e-mail for encryption Sending and receiving encrypted messages with Mozilla mail Technique 29: Securing a Large Network with Custom Authentication Using Cross-Platform Authentication with Linux and Windows Prepping for cross-platform authentication Setting up cross-platform authentication Using PAM and Kerberos to Serve Up Authentication Establishing synchronized system times Testing your domain name server (DNS) Setting up a Key Distribution Center Setting up automatic ticket management with Kerberos and PAM Adding users to the Key Distribution Center Technique 30: Customizing Authentication with PAM Understanding Modules and Configuration Files:The Basics of PAM Authentication Finding a Module and Customizing Its Rules Building Good Rules with PAM Phase Control level Module pathname Arguments Dissecting a Configuration File Skipping a Password with PAM Technique 31: Gaining Privileges Feeling the Power Gaining Superuser Privileges Pretending to Be Other Users Limiting Privileges with sudo Technique 32: sudo Pseudonyms Installing sudo Adding Up the Aliases Adding Aliases to the sudo Configuration File Defining the Alias Creating a User_Alias Creating a Runas_Alias Simplifying group managment with a Host_Alias Mounting and unmounting CDs without the superuser password Managing access to dangerous commands with command aliases Technique 33: Securing Your Connections with SSH Using SSH for Top-Speed Connections Setting Up Public-Key Authentication to Secure SSH Generating the key pair Distributing your public key Passing on your passphrase Logging In with SSH and Key Authentication Starting from the command line Getting graphic Creating Shortcuts to Your Favorite SSH Locations Copying Files with scp Secure (And Fast) Port Forwarding with SSH Part VI: Networking Like a Professional Technique 34: Protecting Yourself with aFirewall Finding Your Firewall Setting up a simple firewall in Mandrake Linux Setting up a simple firewall in Fedora Linux Setting up a simple firewall in SuSE Linux Editing the Rules with Webmin Starting a Webmin session Reading the rules with Webmin Changing the rules Editing existing rules Adding a new rule with Webmin Technique 35: Using VNC to Connect to RemoteDesktops Sharing Desktops with VNC Inviting Your Friends to Use Your Desktop Serving Up a New Desktop with VNC Server Using tsclient to View Remote Desktops from Linux Using tsclient with a VNC server Using tsclient with an RDP server Making Cut and Paste Commands Work on a Remote Desktop Creating New VNC Desktops on Demand Switching display managers in SuSE Linux Switching display managers in Mandrake Linux Connecting gdm and VNC Technique 36: Streamlining Your Network Surveillance Exploring Your Network with lsof Running lsof Interpreting the lsof output Reading file types Discovering Network Connections Other Timesaving lsof Tricks Packet Sniffing with the Ethereal Network Analyzer Starting Ethereal Capturing packets Applying filters to screen packets Peeking in packets Color-coding packets coming from your network Technique 37: Evaluating Your Network Security with Nessus Getting Up and Running with Nessus Installing programs Nessus needs to run Installing Nessus Adding a user to Nessus Generating a certificate Using Nessus to Scan Your Network Starting the daemon and the interface Reading the grim results Keeping Your Plug-ins Up-to-Date Technique 38: Person-to-Person Networking with IRC Finding the Answers You Seek in a Linux Chat Room Chatting in the Fedora Chat Room Looking for Answers in the SuSE Chat Room Finding Fellow Mandrake Users in the Mandrake ChatRoom Customizing KSirc - Who Do You Want to Be Today? Part VII: Monitoring Your System Technique 39: Controlling Troublesome Processes at the Command Line Processing Processes with procps Keeping Track of Process Status with ps,pstree, and pgrep Using ps to filter process status information Viewing ps output the way you want to see it Making parent-child relationships stand out in a ps listing Climbing the family tree with pstree Finding processes with pgrep Killing Processes with pkill Killing Processes with killall Closing Windows with xkill Getting Your Processes' Priorities Straight Technique 40: Taking Care of New (And Old)Users Managing Users and Groups with the Fedora/Mandrake User Manager Adding new users Modifying user accounts Adding groups Filtering users and groups Managing Users and Groups with the SuSE User Administrator Adding new users Modifying user accounts Adding groups Filtering users and groups Technique 41: Keeping an Eye on Your System Keeping an Eye on the System Logs Viewing and filtering log files with Fedora and Mandrake Adding and deleting log files from the viewer Setting up alerts and warnings Viewing your log files from SuSE Monitoring your log files from SuSE Customizing Your Log Files Keeping an Eye on Resources with KDE System Guard Finding and killing runaway processes Prioritizing processes to smooth a network bottleneck Watching your system load Creating a new worksheet Creating system resource logs Displaying network resources Part VIII: Serving Up the Internet and More Technique 42: Keeping an Apache Server in Top Form Setting Up Apache - Quick! Using Synaptic to download and install Apache Installing Apache from disc Starting the Apache Service Building a Quick Web Page with OpenOffice.org Taking Your Site Public with Dynamic DNS Understanding how dynamic DNS works Setting up dynamic DNS Updating your IP address Keeping Your Apache Server Up-to-Date the Easy Way Installing the Fedora HTTP Configuration tool Putting the HTTP Configuration tool to work Technique 43: Keeping an Eye on Your Servers Watching Your Web Server Traffic with apachetop Installing apachetop Running and exiting apachetop Navigating apachetop Switching among the log files (or watching several at once) Changing the display time of apachetop statistics Monitoring MySQL Server with the MySQL ControlCenter Downloading and installing the MySQL ControlCenter Accessing MySQL Control Center features Viewing, managing, and repairing a database with the Databases controls Putting the Server Administration controls to work Adding a new user Watching Your MySQL Traffic with mtop Gathering all the packages that mtop needs Installing mtop Monitoring traffic Technique 44: Making a MySQL Server Your SQL Server Building a MySQL Server Installing the necessary packages Starting the MySQL server Replicating MySQL Data Configuring replication: The three topologies Setting up replication for a single slave and master Choosing a Method to Back Up MySQL Data Backing Up and Restoring with mysqldump mysqldump backup options Backing up multiple databases Compressing the archive Restoring a mysqldump archive Backing Up with File System Tools Making a mysqlhotcopy of Your Database Archiving a Replication Slave Taking Care of Business with MySQL Administrator Installing MySQL Administrator Starting MySQL Administrator Exploring MySQL Administrator's tools Technique 45: Safeguarding Your Apache Server with SSL Certificates Understanding the Basics of How Certificates Work Choosing an SSL Certificate Creating a Certificate Signing Request Creating a Self-Signed Certificate Creating a Signing Authority with openssl Creating a certificate authority Signing a CSR Trusting in Trusted Certification Authorities Exploring Your Certificate Collection with Mozilla Technique 46: Retrieving HTTPMail Using hotway and Evolution Introducing hotway Getting Started with hotway Setting Up Evolution to Read HTTPMail Accounts with hotway Ringing the Bells and Blowing the Whistles: Your Evolution Summary Page Technique 47: Stopping Spam with SpamAssassin Installing SpamAssassin Installing from the distribution media Installing from RPM downloads Starting the service Fine-Tuning SpamAssassin to Separate the Ham from the Spam Customizing settings Saving your settings Adding a New Filter to Evolution Serving Up a Big Bowl of the RulesDuJour Technique 48: Using Webmin to Simplify Sendmail Configuration Registering Your Address Taming a Sendmail Server Tweaking Your Configuration Files with Webmin Serving up mail for multiple domains Relaying e-mail Using aliases to simplify mail handling Part IX: Backing Up Means Never Having to Say You're Sorry Technique 49: Getting Ready to Back Up Your Data Deciding What to Archive Choosing Archive Media Tape drives Removable and external disk drives Removable media Optical media (CDs and DVDs) Online storage Choosing an Archive Scheme Full backups Differential backups Incremental backups Incremental versus differential backups Choosing an Archive Program Technique 50: Backing Up Your Data Estimating Your Media Needs Creating Data Archives with tar Backing up files and directories Backing up account information and passwords Targeting bite-sized backups for speedier restores Rolling whole file systems into a tarball Starting a Differential Backup Cycle Starting an Incremental Backup Cycle Restoring from Backup with tar Backing Up to CD (Or DVD) with cdbackup Creating the backup Restoring from a CD or DVD backup Restoring from a disc containing multiple archives Technique 51: Quick Backup to Remote Storage Combining the Power of tar with ssh for Quick Remote Backups Testing the ssh connection to the remote host Creating a tar archive over the ssh connection Backing up to tape drives on remote machines Backing Up to a Remote Computer with rdist and ssh Testing the ssh connection to the remote host Creating the distfile Backing up Technique 52: Archiving Changes with CVS Getting Started with CVS Checking whether CVS is installed Discovering what to use CVS for Creating a CVS Repository Populating Your Repository with Files Checking Files In and Out (Or Playing in Your Sandbox) Simplifying CVS with cervisia Installing cervisia Putting files in your sandbox Adding more files to your repository Committing your changes Diplomacy 101 - resolving conflicts Browsing your log files Marking milestones with tags Branching off with cervisia Part X: Programming Tricks Technique 53: Using Open-Source APIs to Save Time Using the libcurl Library (C Programming) Uploading a File with a Simple Program Using libcurl Line 7: Defining functions and data types Line 14: Calling the initialization function Lines 18– 21: Defining the transfer Line 23: Starting the transfer Line 26: Finishing the upload Installing the Ming Library Building a Simple Flash Movie with Ming Examining the program Compiling the program Running the program Building Interactive Movies with Ming Examining the program Compiling the program Running the program Technique 54: Timesaving PHP Tricks Doing the curl E-shuffle with PHP Combining PHP with curl and XML: An overview Checking out the XML file Downloading and displaying the XML file with a PHP script (and curl) Sending E-Mail from PHP When Problems Occur Technique 55: Using the DDD Graphical Debugger with Perl Debugging Perl Code with DDD Installing and starting DDD Examining the main window Reviewing and stepping through source code Making Stop Signs: Using Breakpoints to Watch Code Setting a breakpoint Modifying a breakpoint Tracking Variable Values in the Data Window Opening the data window Adding a variable to the data window Changing the display to a table Using the Backtrace feature Using the Help menu Part XI: The Scary (Or Fun!) Stuff Technique 56: Burning CD-Rs without GettingBurned Making Fedora Distribution CDs Downloading the ISO images Verifying the checksums Burning an ISO File to Disc at the Command Line Finding the identity of your drive Running a test burn Burning the distribution discs Creating an ISO Image at the Command Line Burning CDs without Making an ISO First Technique 57: Search and Destroy setuid and setgid Programs Exploring How setuid and setgid Can Be Dangerous Identifying the Potential Troublemakers - Fast Finding setuid quickly and easily with kfind Finding setuid and setgid programs at the command line Deciding to Turn Off setuid or setgid Changing the setuid or setgid Bit Technique 58: Quarantining Suspicious Programs with UML Who Belongs in Jail? Using UML to Jail Programs Changing the Default Password to the Jail Installing New Software and Resolving Conflicts Technique 59: Troubleshooting Persnickety Programs Using lsof to Find Out Which Files Are Open Debugging Your Environment with strace Investigating Programs with ltrace Handy strace and ltrace Options Recording Program Errors with valgrind Technique 60: Securing the Fort with Bastille Hardening Your Hat with Bastille Downloading and installing Bastille and its dependencies Welcome to the Bastille Addressing file permission issues Clamping down on SUID privileges Moving on to account security Making the boot process more secure Securing connection broker Limiting compiler access Limiting access to hackers Logging extra information Keeping the daemons in check Securing sendmail Closing the gaps in Apache Keeping temporary files safe Building a better firewall Port scanning with Bastille You're almost done! Keeping Abreast of Security Issues Technique 61: Creating a Second Line of Defense with LIDS Turning LIDS On and Off Testing LIDS before Applying It to Your System Understanding the LIDS Access Control List Controlling File Access with LIDS Hiding Processes with LIDS Running Down the Privilege List Technique 62: Getting Graphical with ShellScripts Getting Graphical at the Command Line Getting graphical in GNOME Getting graphical with KDE Staying desktop neutral Index