Credits |
|
vii | |
Preface |
|
xiii | |
Chapter 1. Customizing the User Environment |
|
1 | (48) |
|
1. Get the Most Out of the Default Shell |
|
|
1 | (5) |
|
2. Useful tcsh Shell Configuration File Options |
|
|
6 | (3) |
|
|
9 | (3) |
|
4. Use Terminal and X Bindings |
|
|
12 | (4) |
|
5. Use the Mouse at a Terminal |
|
|
16 | (2) |
|
6. Get Your Daily Dose of Trivia |
|
|
18 | (4) |
|
|
22 | (2) |
|
8. Create a Trash Directory |
|
|
24 | (4) |
|
9. Customize User Configurations |
|
|
28 | (8) |
|
10. Maintain Your Environment on Multiple Systems |
|
|
36 | (4) |
|
11. Use an Interactive Shell |
|
|
40 | (4) |
|
12. Use Multiple Screens on One Terminal |
|
|
44 | (5) |
Chapter 2. Dealing with Files and Filesystems |
|
49 | (47) |
|
|
49 | (4) |
|
14. Get the Most Out of grep |
|
|
53 | (4) |
|
15. Manipulate Files with sed |
|
|
57 | (3) |
|
16. Format Text at the Command Line |
|
|
60 | (5) |
|
|
65 | (3) |
|
18. DOS Floppy Manipulation |
|
|
68 | (7) |
|
19. Access Windows Shares Without a Server |
|
|
75 | (3) |
|
|
78 | (5) |
|
21. Manage Temporary Files and Swap Space |
|
|
83 | (3) |
|
22. Recreate a Directory Structure Using mtree |
|
|
86 | (5) |
|
|
91 | (5) |
Chapter 3. The Boot and Login Environments |
|
96 | (44) |
|
24. Customize the Default Boot Menu |
|
|
96 | (5) |
|
25. Protect the Boot Process |
|
|
101 | (3) |
|
26. Run a Headless System |
|
|
104 | (4) |
|
27. Log a Headless Server Remotely |
|
|
108 | (3) |
|
28. Remove the Terminal Login Banner |
|
|
111 | (3) |
|
29. Protecting Passwords With Blowfish Hashes |
|
|
114 | (3) |
|
30. Monitor Password Policy Compliance |
|
|
117 | (7) |
|
31. Create an Effective, Reusable Password Policy |
|
|
124 | (4) |
|
32. Automate Memorable Password Generation |
|
|
128 | (4) |
|
33. Use One Time Passwords |
|
|
132 | (4) |
|
|
136 | (4) |
Chapter 4. Backing Up |
|
140 | (29) |
|
35. Back Up FreeBSD with SMBFS |
|
|
140 | (4) |
|
36. Create Portable POSIX Archives |
|
|
144 | (4) |
|
|
148 | (3) |
|
38. Secure Backups Over a Network |
|
|
151 | (2) |
|
39. Automate Remote Backups |
|
|
153 | (6) |
|
40. Automate Data Dumps for PostgreSQL Databases |
|
|
159 | (3) |
|
41. Perform Client-Server Cross-Platform Backups with Bacula |
|
|
162 | (7) |
Chapter 5. Networking Hacks |
|
169 | (47) |
|
42. See Console Messages Over a Remote Login |
|
|
169 | (3) |
|
|
172 | (3) |
|
44. Use Multiple Wireless NIC Configurations |
|
|
175 | (5) |
|
45. Survive Catastrophic Internet Loss |
|
|
180 | (3) |
|
46. Humanize tcpdump Output |
|
|
183 | (6) |
|
47. Understand DNS Records and Tools |
|
|
189 | (6) |
|
48. Send and Receive Email Without a Mail Client |
|
|
195 | (5) |
|
49. Why Do I Need sendmail? |
|
|
200 | (3) |
|
50. Hold Email for Later Delivery |
|
|
203 | (3) |
|
51. Get the Most Out of FTP |
|
|
206 | (3) |
|
52. Distributed Command Execution |
|
|
209 | (3) |
|
53. Interactive Remote Administration |
|
|
212 | (4) |
Chapter 6. Securing the System |
|
216 | (75) |
|
|
216 | (9) |
|
55. FreeBSD Access Control Lists |
|
|
225 | (6) |
|
56. Protect Files with Flags |
|
|
231 | (6) |
|
57. Tighten Security with Mandatory Access Control |
|
|
237 | (3) |
|
58. Use mtree as a Built-in Tripwire |
|
|
240 | (5) |
|
59. Intrusion Detection with Snort, ACID, MySQL, and FreeBSD |
|
|
245 | (11) |
|
60. Encrypt Your Hard Disk |
|
|
256 | (5) |
|
|
261 | (3) |
|
|
264 | (5) |
|
63. Restrict an SSH server |
|
|
269 | (3) |
|
64. Script IP Filter Rulesets |
|
|
272 | (3) |
|
65. Secure a Wireless Network Using PF |
|
|
275 | (4) |
|
66. Automatically Generate Firewall Rules |
|
|
279 | (4) |
|
67. Automate Security Patches |
|
|
283 | (3) |
|
68. Scan a Network of Windows Computers for Viruses |
|
|
286 | (5) |
Chapter 7. Going Beyond the Basics |
|
291 | (36) |
|
69. Tune FreeBSD for Different Applications |
|
|
291 | (5) |
|
70. Traffic Shaping on FreeBSD |
|
|
296 | (6) |
|
71. Create an Emergency Repair Kit |
|
|
302 | (3) |
|
72. Use the FreeBSD Recovery Process |
|
|
305 | (4) |
|
73. Use the GNU Debugger to Analyze a Buffer Overflow |
|
|
309 | (4) |
|
74. Consolidate Web Server Logs |
|
|
313 | (5) |
|
75. Script User Interaction |
|
|
318 | (4) |
|
76. Create a Trade Show Demo |
|
|
322 | (5) |
Chapter 8. Keeping Up-to-Date |
|
327 | (44) |
|
|
327 | (4) |
|
|
331 | (5) |
|
79. Safely Merge Changes to /etc |
|
|
336 | (4) |
|
|
340 | (4) |
|
81. Create a Package Repository |
|
|
344 | (3) |
|
82. Build a Port Without the Ports Tree |
|
|
347 | (3) |
|
83. Keep Ports Up-to-Date with CTM |
|
|
350 | (3) |
|
84. Navigate the Ports System |
|
|
353 | (4) |
|
|
357 | (3) |
|
86. Create Your Own Startup Scripts |
|
|
360 | (4) |
|
87. Automate NetBSD Package Builds |
|
|
364 | (3) |
|
88. Easily Install Unix Applications on Mac OS X |
|
|
367 | (4) |
Chapter 9. Grokking BSD |
|
371 | (40) |
|
|
371 | (3) |
|
90. Create Your Own Manpages |
|
|
374 | (4) |
|
91. Get the Most Out of Manpages |
|
|
378 | (3) |
|
92. Apply, Understand, and Create Patches |
|
|
381 | (5) |
|
93. Display Hardware Information |
|
|
386 | (4) |
|
94. Determine Who Is on the System |
|
|
390 | (3) |
|
|
393 | (4) |
|
|
397 | (2) |
|
97. Run Native Java Applications |
|
|
399 | (3) |
|
98. Rotate Your Signature |
|
|
402 | (2) |
|
|
404 | (3) |
|
|
407 | (4) |
Index |
|
411 | |