Skip to content

Linux Server Hacks, Volume Two Tips and Tools for Connecting, Monitoring, and Troubleshooting

Best in textbook rentals since 2012!

ISBN-10: 0596100825

ISBN-13: 9780596100827

Edition: 2nd 2005

Authors: William von Hagen, Brian K. Jones

List price: $39.99
Blue ribbon 30 day, 100% satisfaction guarantee!
what's this?
Rush Rewards U
Members Receive:
Carrot Coin icon
XP icon
You have reached 400 XP and carrot coins. That is the daily max!

This book follows the runaway success of Linux Server Hacks with 100 completely new and powerful server management tricks and techniques. Each hack can be read easily in a few minutes, saving countless hours of searching for the right answer. Most hacks in this new book are geared toward system integration and server management, particularly in a heterogeneous Windows/Unix/Linux environment. Linux Server Hacks 2 covers a wide variety of topics like replication, emulation, authentication, print management, and file sharing. Essential security and lockdown instructions are included for SELinux and firewall users. Coverage of advanced system administration hacks are included for topics such as…    
Customers also bought

Book details

List price: $39.99
Edition: 2nd
Copyright year: 2005
Publisher: O'Reilly Media, Incorporated
Publication date: 1/17/2006
Binding: Hardcover
Pages: 478
Size: 6.18" wide x 9.09" long x 1.00" tall
Weight: 1.386
Language: English

Brian K. Jones is a system administrator in the department of computer science at Princeton University.

Credits
Preface
Linux Authentication
Disable User Accounts Instantly
Edit Your Password File for Greater Access Control
Deny All Access in One Second or Less
Customize Authentication with PAMs
Authenticate Linux Users with a Windows Domain Controller
Centralize Logins with LDAP
Secure Your System with Kerberos
Authenticate NFS-Lovers with NIS
Sync LDAP Data with NIS
Remote GUI Connectivity
Access Systems Remotely with VNC
Access VNC Servers over the Web
Secure VNC via SSH
Autostart VNC Servers on Demand
Put Your Desktops on a Thin Client Diet
Run Windows over the Network
Secure, Lightweight X Connections with FreeNX
Secure VNC Connections with FreeNX
Secure Windows Terminal Connections with FreeNX
Remote Administration with Webmin
System Services
Quick and Easy DHCP Setup
Integrate DHCP and DNS with Dynamic DNS Updates
Synchronize Your Watches!
Centralize X Window System Font Resources
Create a CUPS Print Server
Configure Linux Connections to Remote CUPS Printers
Integrate Windows Printing with CUPS
Centralize Macintosh Printing with CUPS
Define a Secure CUPS Printer
Cool Sysadmin Tools and Tips
Execute Commands Simultaneously on Multiple Servers
Collaborate Safely with a Secured Wiki
Edit Your GRUB Configuration with grubby
Give Your Tab Key a Workout
Keep Processes Running After a Shell Exits
Disconnect Your Console Without Ending Your Session
Use script to Save Yourself Time and Train Others
Install Linux Simply by Booting
Turn Your Laptop into a Makeshift Console
Usable Documentation for the Inherently Lazy
Exploit the Power of Vim
Move Your PHP Web Scripting Skills to the Command Line
Enable Quick telnet/SSH Connections from the Desktop
Speed Up Compiles
Avoid Common Junior Mistakes
Get Linux Past the Gatekeeper
Prioritize Your Work
Storage Management and Backups
Create Flexible Storage with LVM
Combine LVM and Software RAID
Create a Copy-on-Write Snapshot of an LVM Volume
Clone Systems Quickly and Easily
Make Disk-to-Disk Backups for Large Drives
Free Up Disk Space Now
Share Files Using Linux Groups
Refine Permissions with ACLs
Make Files Easier to Find with Extended Attributes
Prevent Disk Hogs with Quotas
Standardizing, Sharing, and Synchronizing Resources
Centralize Resources Using NFS
Automount NFS Home Directories with autofs
Keep Filesystems Handy, but Out of Your Way
Synchronize root Environments with rsync
Share Files Across Platforms Using Samba
Quick and Dirty NAS
Share Files and Directories over the Web
Security
Increase Security by Disabling Unnecessary Services
Allow or Deny Access by IP Address
Detect Network Intruders with snort
Tame Tripwire
Verify Fileystem Integrity with Afick
Check for Rootkits and Other Attacks
Troubleshooting and Performance
Find Resource Hogs with Standard Commands
Reduce Restart Times with Journaling Filesystems
Grok and Optimize Your System with sysctl
Get the Big Picture with Multiple Displays
Maximize Resources with a Minimalist Window Manager
Profile Your Systems Using /proc
Kill Processes the Right Way
Use a Serial Console for Centralized Access to Your Systems
Clean Up NIS After Users Depart
Logfiles and Monitoring
Avoid Catastrophic Disk Failure
Monitor Network Traffic with MRTG
Keep a Constant Watch on Hosts
Remotely Monitor and Configure a Variety of Networked Equipment
Force Standalone Apps to Use syslog
Monitor Your Logfiles
Send Log Messages to Your Jabber Client
Monitor Service Availability with Zabbix
Fine-Tune the syslog Daemon
Centralize System Logs Securely
Keep Tabs on Systems and Services
System Rescue, Recovery, and Repair
Resolve Common Boot and Startup Problems
Rescue Me!
Bypass the Standard Init Sequence for Quick Repairs
Find Out Why You Can't Unmount a Partition
Recover Lost Partitions
Recover Data from Crashed Disks
Repair and Recover ReiserFS Filesystems
Piece Together Data from the lost+found
Recover Deleted Files
Permanently Delete Files
Permanently Erase Hard Disks
Recover Lost Files and Perform Forensic Analysis
Index