bsd_hacks.pdf

(2081 KB) Pobierz
Contents
1. main
2. Table of Contents
3. Credits
4. About the Author
5. Contributors
6. Acknowledgments
7. Preface
8. Why BSD Hacks?
9. How to Use this Book
10. How This Book Is Organized
11. Conventions Used in This Book
12. Using Code Examples
13. We'd Like to Hear from You
14. Chapter 1. Customizing the User Environment
15. Hack 0 Introduction
16. Hack 1 Get the Most Out of the Default Shell
17. Hack 2 Useful tcsh Shell Configuration File Options
18. Hack 3 Create Shell Bindings
19. Hack 4 Use Terminal and X Bindings
20. Hack 5 Use the Mouse at a Terminal
21. Hack 6 Get Your Daily Dose of Trivia
22. Hack 7 Lock the Screen
23. Hack 8 Create a Trash Directory
24. Hack 9 Customize User Configurations
25. Hack 10 Maintain Your Environment on Multiple Systems
26. Hack 11 Use an Interactive Shell
27. Hack 12 Use Multiple Screens on One Terminal
28. Chapter 2. Dealing with Files and Filesystems
29. Hack 12 Introduction
30. Hack 13 Find Things
31. Hack 14 Get the Most Out of grep
32. Hack 15 Manipulate Files with sed
33. Hack 16 Format Text at the Command Line
34. Hack 17 Delimiter Dilemma
35. Hack 18 DOS Floppy Manipulation
36. Hack 19 Access Windows Shares Without a Server
37. Hack 20 Deal with Disk Hogs
38. Hack 21 Manage Temporary Files and Swap Space
39. Hack 22 Recreate a Directory Structure Using mtree
40. Hack 23 Ghosting Systems
41. Chapter 3. The Boot and Login Environments
42. Introduction
43. Hack 24 Customize the Default Boot Menu
44. Hack 25 Protect the Boot Process
45. Hack 26 Run a Headless System
46. Hack 27 Log a Headless Server Remotely
47. Hack 28 Remove the Terminal Login Banner
48. Hack 29 Protecting Passwords With Blowfish Hashes
49. Hack 30 Monitor Password Policy Compliance
50. Hack 31 Create an Effective, Reusable Password Policy
51. Hack 32 Automate Memorable Password Generation
52. Hack 33 Use One Time Passwords
53. Hack 34 Restrict Logins
54. Chapter 4. Backing Up
55. Introduction
56. Hack 35 Back Up FreeBSD with SMBFS
57. Hack 36 Create Portable POSIX Archives
58. Hack 37 Interactive Copy
59. Hack 38 Secure Backups Over a Network
60. Hack 39 Automate Remote Backups
61. Hack 40 Automate Data Dumps for PostgreSQL Databases
62. Hack 41 Perform Client-Server Cross-Platform Backups with Bacula
63. Chapter 5. Networking Hacks
64. Introduction
65. Hack 42 See Console Messages Over a Remote Login
66. Hack 43 Spoof a MAC Address
67. Hack 44 Use Multiple Wireless NIC Configurations
68. Hack 45 Survive Catastrophic Internet Loss
69. Hack 46 Humanize tcpdump Output
70. Hack 47 Understand DNS Records and Tools
71. Hack 48 Send and Receive Email Without a Mail Client
72. Hack 49 Why Do I Need sendmail?
73. Hack 50 Hold Email for Later Delivery
74. Hack 51 Get the Most Out of FTP
75. Hack 52 Distributed Command Execution
76. Hack 53 Interactive Remote Administration
77. Chapter 6. Securing the System
78. Introduction
79. Hack 54 Strip the Kernel
80. Hack 55 FreeBSD Access Control Lists
81. Hack 56 Protect Files with Flags
82. Hack 57 Tighten Security with Mandatory Access Control
83. Hack 58 Use mtree as a Built-in Tripwire
84. Hack 59 Intrusion Detection with Snort, ACID, MySQL, and FreeBSD
85. Hack 60 Encrypt Your Hard Disk
86. Hack 61 Sudo Gotchas
87. Hack 62 sudoscript
88. Hack 63 Restrict an SSH server
89. Hack 64 Script IP Filter Rulesets
90. Hack 65 Secure a Wireless Network Using PF
91. Hack 66 Automatically Generate Firewall Rules
92. Hack 67 Automate Security Patches
93. Hack 68 Scan a Network of Windows Computers for Viruses
94. Chapter 7. Going Beyond the Basics
95. Introduction
96. Hack 69 Tune FreeBSD for Different Applications
97. Hack 70 Traffic Shaping on FreeBSD
98. Hack 71 Create an Emergency Repair Kit
99. Hack 72 Use the FreeBSD Recovery Process
100. Hack 73 Use the GNU Debugger to Analyze a Buffer Overflow
101. Hack 74 Consolidate Web Server Logs
102. Hack 75 Script User Interaction
103. Hack 76 Create a Trade Show Demo
104. Chapter 8. Keeping Up-to-Date
105. Introduction
106. Hack 77 Automated Install
107. Hack 78 FreeBSD from Scratch
108. Hack 79 Safely Merge Changes to /etc
109. Hack 80 Automate Updates
110. Hack 81 Create a Package Repository
111. Hack 82 Build a Port Without the Ports Tree
112. Hack 83 Keep Ports Up-to-Date with CTM
113. Hack 84 Navigate the Ports System
114. Hack 85 Downgrade a Port
115. Hack 86 Create Your Own Startup Scripts
116. Hack 87 Automate NetBSD Package Builds
117. Hack 88 Easily Install Unix Applications on Mac OS X
118. Chapter 9. Grokking BSD
119. Introduction
120. Hack 89 How'd He Know That?
121. Hack 90 Create Your Own Manpages
122. Hack 91 Get the Most Out of Manpages
123. Hack 92 Apply, Understand, and Create Patches
124. Hack 93 Display Hardware Information
125. Hack 94 Determine Who Is on the System
126. Hack 95 Spelling Bee
127. Hack 96 Leave on Time
128. Hack 97 Run Native Java Applications
129. Hack 98 Rotate Your Signature
130. Hack 99 Useful One-Liners
131. 9.13 Fun with X
132. index
133. index_SYMBOL
134. index_A
135. index_B
136. index_C
137. index_D
138. index_E
139. index_F
140. index_G
141. index_H
142. index_I
143. index_J
144. index_K
145. index_L
146. index_M
147. index_N
148. index_O
149. index_P
150. index_Q
151. index_R
152. index_S
153. index_T
154. index_U
155. index_V
156. index_W
157. index_X
158. index_Y
159. index_Z
< Day Day Up >
Zgłoś jeśli naruszono regulamin