Bsd Hacks

by
Format: Paperback
Pub. Date: 2004-05-01
Publisher(s): Oreilly & Associates Inc
  • Free Shipping Icon

    This Item Qualifies for Free Shipping!*

    *Excludes marketplace orders.

List Price: $31.49

Buy New

Arriving Soon. Will ship when available.
$29.99

Rent Book

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:1825 Days access
Downloadable:Lifetime Access
$28.79
$28.79

Used Book

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

BSD Hacks offers a unique set of tips, tricks, and tools for administrators and power users of these systems. Users learn how to save time, get more done with fewer resources, and take advantage of the tools and concepts that make the world's top Unix users more productive. And because this is an O'Reilly Hacks book, it shows them how to have some fun at the same time.

Author Biography

Dru is an instructor at Marketbridge Technologies in Ottawa and the maintainer of the Open Protocol Resource. In her non-existent spare time, you can find her shooting Remic's Rapids or cycling through Gatineau Park.

Table of Contents

Credits vii
Preface xiii
Chapter 1. Customizing the User Environment 1(48)
1. Get the Most Out of the Default Shell
1(5)
2. Useful tcsh Shell Configuration File Options
6(3)
3. Create Shell Bindings
9(3)
4. Use Terminal and X Bindings
12(4)
5. Use the Mouse at a Terminal
16(2)
6. Get Your Daily Dose of Trivia
18(4)
7. Lock the Screen
22(2)
8. Create a Trash Directory
24(4)
9. Customize User Configurations
28(8)
10. Maintain Your Environment on Multiple Systems
36(4)
11. Use an Interactive Shell
40(4)
12. Use Multiple Screens on One Terminal
44(5)
Chapter 2. Dealing with Files and Filesystems 49(47)
13. Find Things
49(4)
14. Get the Most Out of grep
53(4)
15. Manipulate Files with sed
57(3)
16. Format Text at the Command Line
60(5)
17. Delimiter Dilemma
65(3)
18. DOS Floppy Manipulation
68(7)
19. Access Windows Shares Without a Server
75(3)
20. Deal with Disk Hogs
78(5)
21. Manage Temporary Files and Swap Space
83(3)
22. Recreate a Directory Structure Using mtree
86(5)
23. Ghosting Systems
91(5)
Chapter 3. The Boot and Login Environments 96(44)
24. Customize the Default Boot Menu
96(5)
25. Protect the Boot Process
101(3)
26. Run a Headless System
104(4)
27. Log a Headless Server Remotely
108(3)
28. Remove the Terminal Login Banner
111(3)
29. Protecting Passwords With Blowfish Hashes
114(3)
30. Monitor Password Policy Compliance
117(7)
31. Create an Effective, Reusable Password Policy
124(4)
32. Automate Memorable Password Generation
128(4)
33. Use One Time Passwords
132(4)
34. Restrict Logins
136(4)
Chapter 4. Backing Up 140(29)
35. Back Up FreeBSD with SMBFS
140(4)
36. Create Portable POSIX Archives
144(4)
37. Interactive Copy
148(3)
38. Secure Backups Over a Network
151(2)
39. Automate Remote Backups
153(6)
40. Automate Data Dumps for PostgreSQL Databases
159(3)
41. Perform Client-Server Cross-Platform Backups with Bacula
162(7)
Chapter 5. Networking Hacks 169(47)
42. See Console Messages Over a Remote Login
169(3)
43. Spoof a MAC Address
172(3)
44. Use Multiple Wireless NIC Configurations
175(5)
45. Survive Catastrophic Internet Loss
180(3)
46. Humanize tcpdump Output
183(6)
47. Understand DNS Records and Tools
189(6)
48. Send and Receive Email Without a Mail Client
195(5)
49. Why Do I Need sendmail?
200(3)
50. Hold Email for Later Delivery
203(3)
51. Get the Most Out of FTP
206(3)
52. Distributed Command Execution
209(3)
53. Interactive Remote Administration
212(4)
Chapter 6. Securing the System 216(75)
54. Strip the Kernel
216(9)
55. FreeBSD Access Control Lists
225(6)
56. Protect Files with Flags
231(6)
57. Tighten Security with Mandatory Access Control
237(3)
58. Use mtree as a Built-in Tripwire
240(5)
59. Intrusion Detection with Snort, ACID, MySQL, and FreeBSD
245(11)
60. Encrypt Your Hard Disk
256(5)
61. Sudo Gotchas
261(3)
62. sudoscript
264(5)
63. Restrict an SSH server
269(3)
64. Script IP Filter Rulesets
272(3)
65. Secure a Wireless Network Using PF
275(4)
66. Automatically Generate Firewall Rules
279(4)
67. Automate Security Patches
283(3)
68. Scan a Network of Windows Computers for Viruses
286(5)
Chapter 7. Going Beyond the Basics 291(36)
69. Tune FreeBSD for Different Applications
291(5)
70. Traffic Shaping on FreeBSD
296(6)
71. Create an Emergency Repair Kit
302(3)
72. Use the FreeBSD Recovery Process
305(4)
73. Use the GNU Debugger to Analyze a Buffer Overflow
309(4)
74. Consolidate Web Server Logs
313(5)
75. Script User Interaction
318(4)
76. Create a Trade Show Demo
322(5)
Chapter 8. Keeping Up-to-Date 327(44)
77. Automated Install
327(4)
78. FreeBSD From Scratch
331(5)
79. Safely Merge Changes to /etc
336(4)
80. Automate Updates
340(4)
81. Create a Package Repository
344(3)
82. Build a Port Without the Ports Tree
347(3)
83. Keep Ports Up-to-Date with CTM
350(3)
84. Navigate the Ports System
353(4)
85. Downgrade a Port
357(3)
86. Create Your Own Startup Scripts
360(4)
87. Automate NetBSD Package Builds
364(3)
88. Easily Install Unix Applications on Mac OS X
367(4)
Chapter 9. Grokking BSD 371(40)
89. How'd He Know That?
371(3)
90. Create Your Own Manpages
374(4)
91. Get the Most Out of Manpages
378(3)
92. Apply, Understand, and Create Patches
381(5)
93. Display Hardware Information
386(4)
94. Determine Who Is on the System
390(3)
95. Spelling Bee
393(4)
96. Leave on Time
397(2)
97. Run Native Java Applications
399(3)
98. Rotate Your Signature
402(2)
99. Useful One-Liners
404(3)
100. Fun with X
407(4)
Index 411

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.