Muutke küpsiste eelistusi

Ubuntu: Powerful Hacks and Customizations [Pehme köide]

  • Formaat: Paperback / softback, 528 pages, kõrgus x laius x paksus: 234x189x29 mm, kaal: 792 g, Illustrations, Contains 1 Digital online
  • Ilmumisaeg: 16-Apr-2010
  • Kirjastus: John Wiley & Sons Ltd
  • ISBN-10: 0470589884
  • ISBN-13: 9780470589885
Teised raamatud teemal:
  • Pehme köide
  • Hind: 46,44 €*
  • * saadame teile pakkumise kasutatud raamatule, mille hind võib erineda kodulehel olevast hinnast
  • See raamat on trükist otsas, kuid me saadame teile pakkumise kasutatud raamatule.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 528 pages, kõrgus x laius x paksus: 234x189x29 mm, kaal: 792 g, Illustrations, Contains 1 Digital online
  • Ilmumisaeg: 16-Apr-2010
  • Kirjastus: John Wiley & Sons Ltd
  • ISBN-10: 0470589884
  • ISBN-13: 9780470589885
Teised raamatud teemal:
A guide to Ubuntu covers such topics as customizing the user environment, configuring devices, managing software, tuning processes, collaborating, multitasking applications, and securing the system.

Tune, tweak, and change the popular Ubuntu Linux operating system!

Ubuntu is a community developed, Linux-based operating system that is perfect for laptops, desktops, and servers, and is used by millions of people around the world. This book provides you with practical hacks and tips that are not readily available online, in FAQ files, or any other Ubuntu book on the market so that you can customize your Ubuntu system for your specific needs.

Bridging the gap between introductory information and overly technical coverage, this unique resource presents complex hacks and ways to extend them. You'll feast on numerous tips, hints, and little-known secrets for getting the most out of your Ubuntu system.

Coverage includes:

  • Hacking the Installation
  • Selecting a Distribution
  • Selecting the Ubuntu Version
  • The 10-Step Boot Configuration
  • Booting Variations and Troubleshooting
  • Tweaking the BusyBox
  • Upgrading Issues with Ubuntu
  • Configuring GRUB
  • Customizing the User Environment
  • Configuring Devices
  • Adapting Input Devices
  • Managing Software
  • Communicating Online
  • Collaborating
  • Tuning Processes
  • Multitasking Applications
  • Locking Down Ubuntu
  • Advanced Networking
  • Enabling Services

If you're a power user hungry for cutting-edge hacks to intensify your Ubuntu system, then this is the book for you!

Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Introduction xxiii
Part I Optimizing Your System
1(148)
Hacking the Installation
3(40)
What's In This
Chapter?
3(1)
Before You Begin
3(1)
Selecting a Distribution
4(1)
Understanding Ubuntu Names
5(2)
Selecting the Ubuntu Version
7(11)
Configuring Dual Boot
8(1)
Using the Desktop CD-ROM
9(2)
Using the Alternate CD-ROM
11(1)
Text Mode Installation
11(1)
OEM Installation
12(1)
Networkless Upgrades and Repairs
12(1)
Installing an LTSP Server
12(1)
Using the Server CD-ROM
13(1)
Changing Options
14(1)
Installing a Minimal System
14(2)
Installing over the Network
16(2)
Using a USB Drive
18(13)
Formatting a USB Drive
18(1)
Sharing Files with a USB Drive
19(2)
Booting from a USB Drive
21(1)
Different USB Devices
21(1)
The 10-Step Boot Configuration
22(1)
Starting the Network Install from a USB Drive
23(1)
Using the Boot Image
24(2)
Installing a Full File System from USB
26(1)
Using the Live CD from a USB Floppy Drive
26(1)
Using the Live CD from a USB Hard Drive
27(3)
Booting Variations and Troubleshooting
30(1)
Tweaking the BusyBox
31(1)
Using Ubuntu on a Netbook
32(4)
Installing on a Netbook
33(1)
Creating the Netbook Installation Media
33(2)
Installing with Only a Netbook
35(1)
Upgrading Ubuntu
36(3)
Determining the Version
37(1)
Performing the Upgrade
37(1)
Upgrading Issues with Ubuntu
37(2)
Configuring GRUB
39(2)
Altering Boot Parameters
39(1)
Updating GRUB
40(1)
Summary
41(2)
Customizing the User Environment
43(32)
What's In This
Chapter?
43(1)
Logging in for the First Time
43(14)
Changing the Startup Music
44(1)
Converting Audio Files
44(2)
Modifying Audio Files
46(1)
Changing Sounds under Karmic Koala
46(1)
Changing the Background
47(2)
Changing the Background As Needed
49(1)
Using Informative Colors
49(1)
Changing the Fonts
50(1)
Changing the DPI
51(1)
Helping with Big Fonts
52(1)
Tuning the Shell
52(2)
Completing Completion
54(1)
Awesome Aliases
55(1)
Fun Functions
56(1)
Cool Commands
57(1)
Tweaking the Desktop
57(5)
Adding a Prompt Button
57(2)
Adding Panels
59(1)
Adding Menus
60(1)
Selecting Themes and Skins
61(1)
Navigating Nautilus
62(9)
Embracing Emblems
63(1)
Technical Details
64(1)
Stretching Icons
65(1)
Technical Details
66(1)
Adjusting Fonts
67(1)
Tuning Templates
67(1)
Scripting Menus
68(3)
Replacing Nautilus
71(1)
Altering the Login Screen
71(1)
Modifying Login Scripts
72(1)
Summary
73(2)
Configuring Devices
75(42)
What's In This
Chapter?
75(1)
Working with Device Drivers
75(1)
Loading Modules
76(4)
Viewing Modules
77(1)
Installing and Removing Modules
78(2)
Optimizing Modules
80(1)
Starting Services
80(7)
Using Init.d
81(1)
Understanding Upstart
82(2)
Configuring Services with the GUI
84(1)
Configuring Boot-Up Services with bum
85(1)
Configuring Services from the Command Line
86(1)
Enabling Multiple CPUs (SMP)
87(3)
Disabling SMP
89(1)
Missing SMP?
89(1)
Adding Printers
90(6)
Changing Paper Size
90(1)
Adding a Printer
91(1)
Sharing Your Printer
92(1)
Sharing a Printer with CUPS
92(2)
Sharing a Printer with LPD
94(1)
Sharing a Printer with Windows
94(2)
Adding Drives
96(12)
Upgrading Drives
96(2)
Mounting Systems
98(2)
Using Simple Backups
100(2)
Configuring a RAID
102(2)
Detecting a RAID Failure
104(2)
Adding to a RAID
106(2)
Adjusting Default Devices
108(1)
Disabling USB Drive Auto-Mount
108(1)
Altering Network Interface Preferences
108(1)
Adding Other Devices
109(6)
Tuning TV Cards
110(3)
Using Digital Cameras, Scanners, and Web Cameras
113(2)
Summary
115(2)
Adapting Input Devices
117(32)
What's In This
Chapter?
117(1)
Empowering Keyboards
117(13)
Changing Keyboards Layouts
117(1)
Understanding Keyboards
118(1)
Enabling Unused Keys
119(1)
Mapping Console Keys
119(2)
Mapping Desktop Keys
121(1)
Altering Keycode Assignments
121(2)
Running Commands with the Push of a Button
123(2)
Examples of Keyboard Shortcuts
125(1)
Trapping Ctrl+Alt+Delete
126(1)
Disabling Ctrl+Alt+Delete
127(1)
Disabling Ctrl+Alt+Delete with Init
127(1)
Disabling Ctrl+Alt+Delete with Upstart
128(1)
Blinking Keyboard Lights
129(1)
Changing Xorg.conf
130(5)
Supporting Serial Mice
131(1)
Debugging Xorg.conf
132(1)
Enabling Extra Mouse Buttons
133(1)
Supporting a Touch Pad
134(1)
Tuning Ubuntu on a Macintosh
135(3)
Using a One-Button Mouse in a Three-Button World
135(1)
Missing Keys and Functionality
136(1)
Remapping the Command and Alt Keys
137(1)
Supporting USB Devices
138(9)
Creating Static USB Devices
139(2)
Associating Applications with USB
141(2)
Enabling Drawing Tablets
143(1)
Debugging the Wacom Tablet
144(1)
Tuning the Tablet
145(1)
Using Other Tablets
146(1)
Summary
147(2)
Part II Working with Compatibility
149(120)
Managing Software
151(32)
What's In This
Chapter?
151(1)
Understanding Package Repositories
152(3)
Differentiating Distributions
153(2)
Running Synaptic
155(6)
Searching with Synaptic
155(2)
Changing Repositories
157(1)
Installing from a CD-ROM or Directory
158(1)
Managing Updates
159(1)
Shopping at the Ubuntu Software Center
160(1)
Using the Computer Janitor
161(1)
Living without Synaptic
161(9)
Modifying Sources
162(2)
Adding CD-ROM Repositories
164(1)
Browsing the APT Cache
165(1)
Organizing Search Results
166(1)
Installing with APT
167(1)
Removing Packages with APT
167(1)
Removing Residues
168(1)
Tracking Removals
168(2)
Upgrading with APT
170(1)
Installing Common Functions
170(6)
Installing Multimedia Support
171(1)
Adding Proprietary Media Support
172(2)
Getting Flashy
174(1)
Installing Font Packages
174(2)
Compiling and Developing Software
176(6)
Installing Package Source Code
177(1)
Programming with C
178(2)
Enabling Java
180(1)
Fixing Scripts
181(1)
Summary
182(1)
Communicating Online
183(40)
What's In This
Chapter?
183(1)
Hacking the Firefox Web Brower
183(18)
Tuning Preferences
184(1)
Tuning the Main Preferences
184(1)
Tuning the Tabs Preferences
185(1)
Tuning the Content Preferences
185(1)
Adjusting Preferred Applications
186(1)
Tuning the Privacy Preferences
186(2)
Adjusting the Security Settings
188(1)
Tuning the Advanced Preferences
188(2)
Fine-Tuning the Firefox Advanced Preferences
190(2)
Managing Profiles
192(1)
Extreme Firefox Tweaks with File Configurations
192(2)
Adding Search Engines
194(2)
Playing with Plug-ins and Extensions
196(1)
Adding Plug-ins
196(1)
Removing Plug-ins
197(1)
Helping Handlers
197(1)
Opening Remote Browsers
198(1)
Using Other Web Browsers
199(1)
Why Use Different Browsers?
200(1)
Mitigating Crashes
200(1)
Securing Web Access with SSH
201(8)
Installing the SSH Server
202(1)
Opening Ports
203(1)
Starting a Proxy
204(1)
Using Socks4-Server
204(1)
Using Dante-Server
205(1)
Testing the SOCKS Server
206(1)
Establishing the Tunnel
207(1)
Changing Ciphers for Speed
208(1)
Managing E-Mail with Evolution
209(7)
Configuring an Account
209(1)
Retrieving E-mail from Gmail
210(1)
Preparing Your Gmail Account
211(1)
Adding a Gmail Account
211(2)
Fetching Mail
213(1)
Retrieving E-Mail from Yahoo!
214(1)
Addressing with LDAP
215(1)
Crashing and Recovering Evolution
215(1)
Using E-Mail with Thunderbird Mail
216(2)
Instant Messaging with Ubuntu
218(1)
Talking with VoIP
219(1)
Summary
220(3)
Collaborating
223(46)
What's In This
Chapter?
223(1)
Synchronizing the Clock
224(2)
Sharing Files
226(8)
Enabling NFS
227(1)
Acting as an NFS Client
228(1)
Acting as an NFS Server
229(1)
Exchanging Files with Samba
230(1)
Sharing a Directory with Windows
231(1)
Accessing a Windows Directory
232(2)
Working with Open Office
234(6)
Using the Word Processor
234(2)
Making Presentations
236(1)
Accessing Spreadsheets
237(1)
Selecting Alternative Office Tools
237(1)
Alternate Document Viewers
238(1)
Alternate Presentation Viewers
239(1)
Alternate Spreadsheet Viewers
239(1)
Collaborating Over the Network
240(16)
Sharing Source Code
241(1)
Configuring Subversion
242(3)
Using Subversion
245(2)
Branching and Merging with Subversion
247(1)
Sharing Documents in Real Time
247(2)
Sharing Desktops with VNC
249(1)
Using the VNC Viewer
250(1)
Sharing Your Desktop
251(1)
Sharing Your Complete Desktop
251(1)
Sharing Independent Desktops
252(3)
Securing VNC Connections
255(1)
Running Software in Emulators
256(11)
Choosing an Emulator
257(2)
Understanding Virtual Disks
259(1)
Differences between VNC and VM
259(1)
Emulating with VNC
260(1)
Using VMware (Commercial)
260(1)
Using Qemu (Open Source)
261(1)
Installing a Qemu VM
261(1)
Running a Qemu VM
262(2)
Creating Partitions
264(1)
Converting Between Qemu and VMware
265(1)
Using Xen (Open Source)
265(1)
Sharing Files with Emulators
266(1)
Other Collaboration Tools
267(1)
Summary
268(1)
Part III Improving Performance
269(100)
Tuning Processes
271(34)
What's In This
Chapter?
271(1)
Learning the Lingo
271(2)
Viewing Running Processes
273(5)
Killing Processes
275(2)
Killing All Processes
277(1)
Identifying Resources
278(7)
Accessing/proc
278(1)
Measuring CPU
279(1)
Measuring Disk Space
280(1)
Measuring Disk I/O
281(1)
Measuring Memory Usage
282(1)
Measuring Video Memory
283(1)
Measuring Network Throughput
284(1)
Finding Process Startups
285(11)
Inspecting Boot Scripts
285(1)
Inspecting Upstart
286(2)
Inspecting Device Startups
288(1)
Inspecting Network Services
288(1)
Inspecting Shell Startup Scripts
289(1)
Inspecting Desktop Scripts
290(1)
Inspecting Gnome Applications
291(3)
Inspecting Schedulers: at, cron, and anacron
294(1)
Scheduling with at
294(1)
Scheduling with cron
295(1)
Scheduling with anacron
296(1)
Tuning Kernel Parameters
296(5)
Computing Swap
297(2)
Modifying Shared Memory
299(1)
Changing Per-User Settings
300(1)
Speeding Up Boot Time
301(2)
Profiling the Boot Sequence
303(1)
Summary
304(1)
Multitasking Applications
305(26)
What's In This
Chapter?
305(1)
Switching Applications
306(3)
Using the Window List and Window Selector
306(1)
Using Alt+Tab
307(1)
Navigating the Desktop without a Mouse
308(1)
Switching Between Tabs
309(1)
Tweaking the Workplace Switcher
309(2)
Switching Worksplace with Ctrl+Alt+Arrows
310(1)
Managing Workspaces
311(1)
Customizing Application Windows
311(5)
Creating X-resources
312(2)
Using Devil's Pie
314(2)
Buffering Buffers
316(2)
Automating Tasks
318(3)
Tracking Projects
321(8)
Tracking Time on Projects
322(2)
Tracking CPU Usage
324(1)
Tracking Disk Usage and Quotas
324(1)
Understanding Your Limits
325(1)
Enabling Quotas
326(1)
Editing Quotas
327(1)
Reporting Quotas
328(1)
Summary
329(2)
Getting Graphical with Video Bling
331(38)
What's In This
Chapter?
331(1)
Troubleshooting the Display
332(1)
Hacking Around Troublesome Areas
332(1)
Patching Nautilus
332(1)
Enabling X11
333(2)
Enabling Ctrl+Alt+Backspace
333(1)
Editing xorg.conf
334(1)
Tuning Graphics
335(16)
Changing Screen Resolution (xrandr)
336(1)
Thinking Safety
337(1)
Flipping Cool!
338(1)
Practical Uses for xrandr
339(1)
Changing Video Drivers
340(1)
Enabling OpenGL
340(1)
Automated Driver Selection
341(1)
Manually Enabling OpenGL
341(1)
If You Have an ATI Video Card
342(1)
If You Have an NVIDIA Card
343(1)
Debugging X-Windows
344(1)
Putting Things Back
344(1)
Debugging the Wrong Driver
345(1)
Forcing Drivers to Install
345(1)
Adjusting Video Position
345(4)
Improving Performance
349(2)
Switching Screen Savers
351(6)
Adding New Screen Savers
354(1)
Animating the Desktop Background
355(2)
Disabling Animated Backgrounds
357(1)
Configuring Dual Monitors
357(11)
Using Two Heads
358(1)
Using the Graphical Display Configuration
358(1)
Using Two Heads with Twin View
359(2)
Using Two Heads with Xinerama
361(3)
Using Two Computers with Different Desktops
364(4)
Summary
368(1)
Part IV Securing Your System
369(116)
Locking Down Ubuntu
371(32)
What's In This
Chapter?
371(1)
Understanding Ubuntu Security Defaults
372(3)
Locking Down Passwords
374(1)
Hacking with Sudo
375(5)
Adding Users to Sudo
376(2)
Tweaking other Sudo Options
378(1)
Becoming Root
379(1)
Encrypting Data
380(1)
Using Gnu Privacy Guard (GPG)
381(10)
Creating Keys
381(3)
Searching Keys
384(1)
Transferring Keys
384(1)
Defining Trust
385(2)
Encrypting Files with GPG
387(1)
Signing Data
388(1)
Integrating with e-mail
389(1)
Using Other File Encryption Options
390(1)
Encrypting File Systems
391(5)
Installing and Configuring EncFS
391(2)
Maintaining EncFS
393(1)
Using EncFS
393(1)
Knowing EncFS Limitations
394(1)
Encrypting Home Directories
394(2)
Encrypting the Entire Disk
396(2)
Managing Logs and Caches
398(4)
Clearing Temporary Files
398(1)
Erasing Web Caches
399(1)
Cleaning APT Cache
400(1)
Rotating Logs
401(1)
Summary
402(1)
Advanced Networking
403(48)
What's In This
Chapter?
403(1)
Using the Network Manager
404(4)
Configuring Networks from the Command Line
405(3)
Configuring Wireless Networks
408(9)
Installing Wireless Devices the Easy Way
408(1)
Looking for Drivers
409(1)
Using ndiswrapper
409(1)
Installing a Driver
410(1)
Debugging Driver Problems
411(2)
Hacking with Wireless Tools
413(2)
Enabling Wireless Security with WEP
415(1)
Enabling Wireless Security with WPA
416(1)
Securing the Network
417(17)
Configuring Firewalls with Tcpwrappers
418(1)
Testing the Tcpwrappers Configuration
419(1)
Enabling Tcpwrappers
419(1)
Configuring Firewalls with IP Tables
419(3)
Saving IP Tables Settings
422(1)
Using the Uncomplicated Firewall
423(2)
Disabling Pings
425(2)
Enabling IPsec
427(1)
Creating IPsec Keys
428(3)
Configuring the Security Policy Database
431(1)
Configuring IPsec
432(2)
Enabling Proxies
434(10)
Using the General System Proxy
434(1)
Enabling Application-Specific Proxy Configurations
434(3)
Enabling SOCKS Clients
437(1)
Anonymizing with Tor
438(1)
Using the Torbutton
439(1)
Understanding Tor's Limitations
440(1)
Applying Parental Controls
441(3)
Debugging the Network
444(4)
Using EtherApe
445(1)
Using Wireshark
446(1)
Using Snort and Tcpdump
447(1)
Summary
448(3)
Enabling Services
451(34)
What's In This
Chapter?
451(1)
Understanding Ubuntu's Default Services
452(5)
Using netstat
452(1)
Identifying Servers with netstat
453(1)
Running nmap
454(3)
Recognizing Network Threats
457(1)
Mitigating Risks before Going Public
458(2)
Monitoring Attacks
460(4)
What Should You Look For?
460(1)
What Now? After a Compromise
461(1)
Logging Logins
461(1)
Recording Failed Logins
461(1)
Enhancing Failed Login Records
462(1)
Enabling Intrusion Detection Systems
463(1)
Running Services
464(20)
Hardening SSH
466(1)
Using SSH Keys
466(1)
Debugging SSH Connections
467(1)
Enabling FTP
468(1)
Installing VSFTPD
469(1)
Adjusting Anonymous FTP Access
470(1)
Adjusting Regular FTP Access
470(1)
Securing Internet FTP
471(2)
Enabling Postfix
473(1)
Post-Installation Configuration
474(2)
Testing Postfix
476(1)
Opening Postfix
476(1)
Enabling Apache
476(1)
Post-Installation Configuration
477(3)
Enabling HTTPS
480(2)
Extending Apache
482(1)
Creating Web Pages
483(1)
Summary
484(1)
Index 485
Neal Krawetz, PhD, is a computer security professional with experience in computer forensics, profiling, cryptography and cryptanalysis, artificial intelligence, and software solutions. Dr. Krawetz's company, Hacker Factor, specializes in uncommon forensic techniques and anti-anonymity technologies. He has configured Ubuntu on everything from personal workstations to mission-critical servers.