| |
| |
Introduction | |
| |
| |
Licensing | |
| |
| |
Who This Book Is For | |
| |
| |
What This Book Contains | |
| |
| |
Conventions Used in This Book | |
| |
| |
| |
Installing and Configuration | |
| |
| |
| |
Installing Ubuntu | |
| |
| |
Before You Begin the Installation | |
| |
| |
Researching Your Hardware Specifications | |
| |
| |
Installation Options | |
| |
| |
Planning Partition Strategies | |
| |
| |
The Boot Loader | |
| |
| |
Installing from CD or DVD | |
| |
| |
Step-by-Step Installation | |
| |
| |
Installing | |
| |
| |
First Update | |
| |
| |
Wubi���The Easy Installer for Windows | |
| |
| |
Shutting Down | |
| |
| |
Reference | |
| |
| |
| |
Post-Installation Configuration | |
| |
| |
Troubleshooting Post-Installation Configuration Problems | |
| |
| |
The sudo Command | |
| |
| |
Software Update | |
| |
| |
Configuring Software Repositories | |
| |
| |
Installing Graphics Drivers | |
| |
| |
Changing Ubuntu's Look and Feel | |
| |
| |
Changing the Desktop Background | |
| |
| |
Changing Colors | |
| |
| |
Modifying System Fonts | |
| |
| |
Visual Effects | |
| |
| |
Preferred Behaviors | |
| |
| |
Input Devices | |
| |
| |
Keyboard Shortcuts | |
| |
| |
Keyboard Layout | |
| |
| |
Mouse | |
| |
| |
Detecting and Configuring a Printer | |
| |
| |
Configuring Power Management in Ubuntu | |
| |
| |
Setting the Date and Time | |
| |
| |
Changing the Time and Date | |
| |
| |
Using the date Command | |
| |
| |
Using the hwclock Command | |
| |
| |
Configuring Wireless Networks | |
| |
| |
Reference | |
| |
| |
| |
Working with GNOME | |
| |
| |
The GNOME Desktop Environment | |
| |
| |
Eye Candy for the Masses | |
| |
| |
Basic X Concepts | |
| |
| |
Using X | |
| |
| |
Elements of the xorg.conf File | |
| |
| |
Configuring X | |
| |
| |
Starting X | |
| |
| |
Using a Display Manager | |
| |
| |
Configuring Your Login Screen | |
| |
| |
Changing Window Managers | |
| |
| |
Reference | |
| |
| |
| |
Command Line Quickstart | |
| |
| |
What Is the Command Line? | |
| |
| |
Navigating Through the File System | |
| |
| |
Managing Files with the Shell | |
| |
| |
Working with Compressed Files | |
| |
| |
Essential Commands from the /bin and /sbin Directories | |
| |
| |
Using and Editing Files in the /etc Directory | |
| |
| |
Protecting the Contents of User Directories���/home | |
| |
| |
Using the Contents of the /proc Directory to Interact with the Kernel | |
| |
| |
Working with Shared Data in the /usr Directory | |
| |
| |
Temporary File Storage in the /tmp Directory | |
| |
| |
Accessing Variable Data Files in the /var Directory | |
| |
| |
Logging In to and Working with Linux | |
| |
| |
Text-Based Console Login | |
| |
| |
Logging Out | |
| |
| |
Logging in and Out from a Remote Computer | |
| |
| |
Using Environment Variables | |
| |
| |
Using the Text Editors | |
| |
| |
Working with vi | |
| |
| |
Working with emacs | |
| |
| |
Working with Permissions | |
| |
| |
Assigning Permissions | |
| |
| |
Directory Permissions | |
| |
| |
Understanding Set User ID and Set Group | |
| |
| |
ID Permissions | |
| |
| |
Working as Root | |
| |
| |
Creating Users | |
| |
| |
Deleting Users | |
| |
| |
Shutting Down the System | |
| |
| |
Rebooting the System | |
| |
| |
Reading Documentation | |
| |
| |
Using Apropros | |
| |
| |
Using Man Pages | |
| |
| |
Reference | |
| |
| |
| |
Desktop Ubuntu | |
| |
| |
| |
On the Internet | |
| |
| |
Getting Started with Firefox | |
| |
| |
Checking Out Google Chrome and Chromium | |
| |
| |
Choosing an Email Client | |
| |
| |
Evolution | |
| |
| |
Mozilla Thunderbird | |
| |
| |
Other Mail Clients | |
| |
| |
RSS Readers | |
| |
| |
Firefox | |
| |
| |
Liferea | |
| |
| |
Instant Messaging and Video Conferencing with Empathy | |
| |
| |
Internet Relay Chat | |
| |
| |
Usenet Newsgroups | |
| |
| |
Ubuntu One Cloud Storage | |
| |
| |
Reference | |
| |
| |
| |
Productivity Applications | |
| |
| |
Introducing OpenOffice.org | |
| |
| |
Configuring OpenOffice.org | |
| |
| |
Working with OpenOffice.org Writer | |
| |
| |
Working with OpenOffice.org Calc | |
| |
| |
Office Suites for Ubuntu | |
| |
| |
Working with Gnome Office | |
| |
| |
Working with KOffice | |
| |
| |
Productivity Applications Written for Microsoft Windows | |
| |
| |
Reference | |
| |
| |
| |
Multimedia Applications | |
| |
| |
Sound and Music | |
| |
| |
Sound Cards | |
| |
| |
Adjusting Volume | |
| |
| |
Sound Formats | |
| |
| |
Listening to Music | |
| |
| |
Buying Music in the Ubuntu One Music Store | |
| |
| |
Graphics Manipulation | |
| |
| |
The GNU Image Manipulation Program | |
| |
| |
Using Scanners in Ubuntu | |
| |
| |
Working with Graphics Formats | |
| |
| |
Capturing Screen Images | |
| |
| |
Using Digital Cameras with Ubuntu | |
| |
| |
Handheld Digital Cameras | |
| |
| |
Using Shotwell Photo Manager | |
| |
| |
Burning CDs and DVDs in Ubuntu | |
| |
| |
Creating CDs and DVDs with Brasero | |
| |
| |
Creating CDs from the Command Line | |
| |
| |
Creating DVDs from the Command Line | |
| |
| |
Viewing Video | |
| |
| |
TV and Video Hardware | |
| |
| |
Video Formats | |
| |
| |
Viewing Video in Linux | |
| |
| |
Personal Video Recorders | |
| |
| |
Video Editing | |
| |
| |
Reference | |
| |
| |
| |
Other Ubuntu Desktops | |
| |
| |
Desktop Environment | |
| |
| |
KDE and Kubuntu | |
| |
| |
Xfce and Xubuntu | |
| |
| |
Ubuntu Netbook Edition | |
| |
| |
LXDE and Lubuntu | |
| |
| |
Reference | |
| |
| |
| |
Games | |
| |
| |
Ubuntu Gaming | |
| |
| |
Emulators | |
| |
| |
Installing Proprietary Video Drivers | |
| |
| |
Installing Games in Ubuntu | |
| |
| |
Warsow | |
| |
| |
Scorched 3D | |
| |
| |
Frozen Bubble | |
| |
| |
SuperTux | |
| |
| |
Battle for Wesnoth | |
| |
| |
Games for Kids | |
| |
| |
Playing Windows Games | |
| |
| |
Reference | |
| |
| |
| |
System Administration | |
| |
| |
| |
Managing Users | |
| |
| |
User Accounts | |
| |
| |
The Super-User/Root User | |
| |
| |
User IDs and Group IDs | |
| |
| |
File Permissions | |
| |
| |
Managing Groups | |
| |
| |
Group Listing | |
| |
| |
Group Management Tools | |
| |
| |
Managing Users | |
| |
| |
User Management Tools | |
| |
| |
Adding New Users | |
| |
| |
Monitoring User Activity on the System | |
| |
| |
Managing Passwords | |
| |
| |
System Password Policy | |
| |
| |
The Password File | |
| |
| |
Shadow Passwords | |
| |
| |
Managing Password Security for Users | |
| |
| |
Changing Passwords in a Batch | |
| |
| |
Granting System Administrator Privileges to Regular Users | |
| |
| |
Temporarily Changing User Identity with the su Command | |
| |
| |
Granting Root Privileges on Occasion���The sudo Command | |
| |
| |
Disk Quotas | |
| |
| |
Implementing Quotas | |
| |
| |
Manually Configuring Quotas | |
| |
| |
Reference | |
| |
| |
| |
Automating Tasks | |
| |
| |
Running Services at Bootup | |
| |
| |
Beginning the Boot Loading Process | |
| |
| |
Loading the Linux Kernel | |
| |
| |
System Services and Runlevels | |
| |
| |
Runlevel Definitions | |
| |
| |
Booting into the Default Runlevel | |
| |
| |
Understanding init Scripts and the Final Stage of Initialization | |
| |
| |
Controlling Services at Boot with Administrative Tools | |
| |
| |
Changing Runlevels | |
| |
| |
Troubleshooting Runlevel Problems | |
| |
| |
Starting and Stopping Services Manually | |
| |
| |
Using Upstart | |
| |
| |
Scheduling Tasks | |
| |
| |
Using at and batch to Schedule Tasks for Later | |
| |
| |
Using cron to Run Jobs Repeatedly | |
| |
| |
Basic Shell Control | |
| |
| |
The Shell Command Line | |
| |
| |
Shell Pattern-Matching Support | |
| |
| |
Redirecting Input and Output | |
| |
| |
Piping Data | |
| |
| |
Background Processing | |
| |
| |
Writing and Executing a Shell Script | |
| |
| |
Running the New Shell Program | |
| |
| |
Storing Shell Scripts for Systemwide Access | |
| |
| |
Interpreting Shell Scripts Through Specific Shells | |
| |
| |
Using Variables in Shell Scripts | |
| |
| |
Assigning a Value to a Variable | |
| |
| |
Accessing Variable Values | |
| |
| |
Positional Parameters | |
| |
| |
A Simple Example of a Positional Parameter | |
| |
| |
Using Positional Parameters to Access and | |
| |
| |
Retrieve Variables from the Command Line | |
| |
| |
Using a Simple Script to Automate Tasks | |
| |
| |
Built-In Variables | |
| |
| |
Special Characters | |
| |
| |
Using Double Quotes to Resolve Variables in Strings with Embedded Spaces | |
| |
| |
Using Single Quotes to Maintain Unexpanded Variables | |
| |
| |
Using the Backslash as an Escape Character | |
| |
| |
Using the Backtick to Replace a String with Output | |
| |
| |
Comparison of Expressions in pdksh and bash | |
| |
| |
Comparing Expressions with tcsh | |
| |
| |
The for Statement | |
| |
| |
The while Statement | |
| |
| |
The until Statement | |
| |
| |
The repeat Statement (tcsh) | |
| |
| |
The select Statement (pdksh) | |
| |
| |
The shift Statement | |
| |
| |
The if Statement | |
| |
| |
The case Statement | |
| |
| |
The break and exit Statements | |
| |
| |
Using Functions in Shell Scripts | |
| |
| |
Reference | |
| |
| |
| |
System-Monitoring Tools | |
| |
| |
Console-Based Monitoring | |
| |
| |
Using the kill Command to Control Processes | |
| |
| |
Using Priority Scheduling and Control | |
| |
| |
Displaying Free and Used Memory with free | |
| |
| |
Disk Space | |
| |
| |
Disk Quotas | |
| |
| |
Graphical Process and System Management Tools | |
| |
| |
System Monitor | |
| |
| |
Conky | |
| |
| |
Other | |
| |
| |
KDE Process- and System-Monitoring Tools | |
| |
| |
Enterprise Server Monitoring | |
| |
| |
Landscape | |
| |
| |
Other | |
| |
| |
Reference | |
| |
| |
| |
Backing Up | |
| |
| |
Choosing a Backup Strategy | |
| |
| |
Why Data Loss Occurs | |
| |
| |
Assessing Your Backup Needs and Resources | |
| |
| |
Evaluating Backup Strategies | |
| |
| |
Making the Choice | |
| |
| |
Choosing Backup Hardware and Media | |
| |
| |
Removable Storage Media | |
| |
| |
CD-RW and DVD+RW/-RW Drives | |
| |
| |
Network Storage | |
| |
| |
Tape Drive Backup | |
| |
| |
Cloud Storage | |
| |
| |
Using Backup Software | |
| |
| |
Tar: the Most Basic Backup Tool | |
| |
| |
The GNOME File Roller | |
| |
| |
The KDE ark Archiving Tool | |
| |
| |
Using the Amanda Backup Application | |
| |
| |
Alternative Backup Software | |
| |
| |
Copying Files | |
| |
| |
Copying Files Using tar | |
| |
| |
Compressing, Encrypting, and Sending | |
| |
| |
Tar Streams | |
| |
| |
Copying Files Using cp | |
| |
| |
Copying Files Using mc | |
| |
| |
Using rsync | |
| |
| |
System Rescue | |
| |
| |
The Ubuntu Rescue Disc | |
| |
| |
Restoring the GRUB2 Boot Loader | |
| |
| |
Saving Files from a Non-Booting Hard Drive | |
| |
| |
Reference | |
| |
| |
| |
Networking | |
| |
| |
Laying the Foundation: the localhost Interface | |
| |
| |
Checking for the Availability of | |
| |
| |
The Loopback Interface | |
| |
| |
Configuring the Loopback Interface Manually | |
| |
| |
Networking with TCP/IP | |
| |
| |
TCP/IP Addressing | |
| |
| |
Using IP Masquerading in Ubuntu | |
| |
| |
Ports | |
| |
| |
Network Organization | |
| |
| |
Subnetting | |
| |
| |
Subnet Masks | |
| |
| |
Broadcast, Unicast, and Multicast Addressing | |
| |
| |
Hardware Devices for Networking | |
| |
| |
Network Interface Cards | |
| |
| |
Network Cable | |
| |
| |
Hubs and Switches | |
| |
| |
Routers and Bridges | |
| |
| |
Initializing New Network Hardware | |
| |
| |
Using Network Configuration Tools | |
| |
| |
Command-Line Network Interface Configuration | |
| |
| |
/bin/netstat | |
| |
| |
Network Configuration Files | |
| |
| |
Using Graphical Configuration Tools | |
| |
| |
Dynamic Host Configuration Protocol | |
| |
| |
How DHCP Works | |
| |
| |
Activating DHCP at Installation and Boot Time | |
| |
| |
DHCP Software Installation and Configuration | |
| |
| |
Using DHCP to Configure Network Hosts | |
| |
| |
Other Uses for DHCP | |
| |
| |
Wireless Networking | |
| |
| |
Support for Wireless Networking in Ubuntu | |
| |
| |
Advantages of Wireless Networking | |
| |
| |
Choosing from Among Available Wireless Protocols | |
| |
| |
Beyond the Network and onto the Internet | |
| |
| |
Common Configuration Information | |
| |
| |
Configuring Digital Subscriber Line Access | |
| |
| |
Understanding Point-to-Point Protocol over Ethernet | |
| |
| |
Configuring a PPPoE Connection Manually | |
| |
| |
Configuring Dial-Up Internet Access | |
| |
| |
Troubleshooting Connection Problems | |
| |
| |
Reference | |
| |
| |
| |
Remote Access with SSH and Telnet | |
| |
| |
Setting Up a Telnet Server | |
| |
| |
Telnet Versus SSH | |
| |
| |
Setting Up an SSH Server | |
| |
| |
SSH Tools | |
| |
| |
Using scp to Copy Individual Files Between Machines | |
| |
| |
Using sftp to Copy Many Files Between Machines | |
| |
| |
Using ssh-keygen to Enable Key-Based Logins | |
| |
| |
Virtual Network Computing (VNC) | |
| |
| |
Reference | |
| |
| |
| |
Ubuntu as a Server | |
| |
| |
| |
File and Print | |
| |
| |
Using the Network File System | |
| |
| |
Installing and Starting or Stopping NFS | |
| |
| |
NFS Server Configuration | |
| |
| |
NFS Client Configuration | |
| |
| |
Putting Samba to Work | |
| |
| |
Manually Configuring Samba with /etc/samba/smb.conf | |
| |
| |
Testing Samba with the testparm Command | |
| |
| |
Starting, Stopping, and Restarting the smbd Daemon | |
| |
| |
Mounting Samba Shares | |
| |
| |
Configuring Samba Using SWAT | |
| |
| |
Network and Remote Printing with Ubuntu | |
| |
| |
Creating Network Printers | |
| |
| |
Using the Common UNIX Printing System GUI | |
| |
| |
Avoiding Printer Support Problems | |
| |
| |
Reference | |
| |
| |
| |
Apache Web Server Management | |
| |
| |
About the Apache Web Server | |
| |
| |
Installing the Apache Server | |
| |
| |
Installing from the Ubuntu repositories | |
| |
| |
Building the Source Yourself | |
| |
| |
Starting and Stopping Apache | |
| |
| |
Starting the Apache Server Manually | |
| |
| |
Using /etc/init.d/apache2 | |
| |
| |
Runtime Server Configuration Settings | |
| |
| |
Runtime Configuration Directives | |
| |
| |
Editing apache2.conf | |
| |
| |
Apache Multiprocessing Modules | |
| |
| |
Using .htaccess Configuration Files | |
| |
| |
File System Authentication and Access Control | |
| |
| |
Restricting Access with allow and deny | |
| |
| |
Authentication | |
| |
| |
Final Words on Access Control | |
| |
| |
Apache Modules | |
| |
| |
Mod_access | |
| |
| |
Mod_alias | |
| |
| |
Mod_asis | |
| |
| |
Mod_auth | |
| |
| |
Mod_auth_anon | |
| |
| |
Mod_auth_dbm | |
| |
| |
Mod_auth_digest | |
| |
| |
Mod_autoindex | |
| |
| |
Mod_cgi | |
| |
| |
Mod_dir and mod_env | |
| |
| |
Mod_expires | |
| |
| |
Mod_headers | |
| |
| |
Mod_include | |
| |
| |
Mod_info and mod_log_config | |
| |
| |
Mod_mime and mod_mime_magic | |
| |
| |
Mod_negotiation | |
| |
| |
Mod_proxy | |
| |
| |
Mod_rewrite | |
| |
| |
Mod_setenvif | |
| |
| |
Mod_speling | |
| |
| |
Mod_status | |
| |
| |
Mod_ssl | |
| |
| |
Mod_unique_id | |
| |
| |
Mod_userdir | |
| |
| |
Mod_usertrack | |
| |
| |
Mod_vhost_alias | |
| |
| |
Virtual Hosting | |
| |
| |
Address-Based Virtual Hosts | |
| |
| |
Name-Based Virtual Hosts | |
| |
| |
Logging | |
| |
| |
Other Web Servers for Use with Ubuntu | |
| |
| |
Sun ONE Web Server | |
| |
| |
Nginx | |
| |
| |
Zope | |
| |
| |
Lighttpd | |
| |
| |
Reference | |
| |
| |
| |
Remote File Serving with FTP | |
| |
| |
Choosing an FTP Server | |
| |
| |
Choosing an Authenticated or Anonymous Server | |
| |
| |
Ubuntu FTP Server Packages | |
| |
| |
Other FTP Servers | |
| |
| |
Installing FTP Software | |
| |
| |
The FTP User | |
| |
| |
Configuring the Very Secure FTP Server | |
| |
| |
Controlling Anonymous Access | |
| |
| |
Other vsftpd Server Configuration Files | |
| |
| |
Using the ftphosts File to Allow or Deny FTP Server Connection | |
| |
| |
Reference | |
| |
| |
| |
Handling Email | |
| |
| |
How Email Is Sent and Received | |
| |
| |
The Mail Transport Agent | |
| |
| |
Choosing an MTA | |
| |
| |
The Mail Delivery Agent | |
| |
| |
The Mail User Agent | |
| |
| |
Basic Postfix Configuration and Operation | |
| |
| |
Configuring Masquerading | |
| |
| |
Using Smart Hosts | |
| |
| |
Setting Message Delivery Intervals | |
| |
| |
Mail Relaying | |
| |
| |
Forwarding Email with Aliases | |
| |
| |
Using Fetchmail to Retrieve Mail | |
| |
| |
Installing Fetchmail | |
| |
| |
Configuring Fetchmail | |
| |
| |
Choosing a Mail Delivery Agent | |
| |
| |
Procmail | |
| |
| |
Spamassassin | |
| |
| |
Squirrelmail | |
| |
| |
Virus Scanners | |
| |
| |
Autoresponders | |
| |
| |
Alternatives to Microsoft Exchange Server | |
| |
| |
Microsoft Exchange Server/Outlook Client | |
| |
| |
CommuniGate Pro | |
| |
| |
Oracle Beehive | |
| |
| |
Bynari | |
| |
| |
Open-Xchange | |
| |
| |
Phpgroupware | |
| |
| |
PHProjekt | |
| |
| |
Horde | |
| |
| |
Reference | |
| |
| |
| |
Proxying and Reverse Proxying | |
| |
| |
What Is a Proxy Server? | |
| |
| |
Installing Squid | |
| |
| |
Configuring Clients | |
| |
| |
Access Control Lists | |
| |
| |
Specifying Client IP Addresses | |
| |
| |
Example Configurations | |
| |
| |
Reference | |
| |
| |
| |
Administering Database Services | |
| |
| |
A Brief Review of Database Basics | |
| |
| |
How Relational Databases Work | |
| |
| |
Understanding SQL Basics | |
| |
| |
Creating Tables | |
| |
| |
Inserting Data into Tables | |
| |
| |
Retrieving Data from a Database | |
| |
| |
Choosing a Database: MySQL Versus PostgreSQL | |
| |
| |
Speed | |
| |
| |
Data Locking | |
| |
| |
ACID Compliance in Transaction Processing to Protect Data Integrity | |
| |
| |
SQL Subqueries | |
| |
| |
Procedural Languages and Triggers | |
| |
| |
Configuring MySQL | |
| |
| |
Setting a Password for the MySQL Root User | |
| |
| |
Creating a Database in MySQL | |
| |
| |
Configuring PostgreSQL | |
| |
| |
Initializing the Data Directory in PostgreSQL | |
| |
| |
Creating a Database in PostgreSQL | |
| |
| |
Creating Database Users in PostgreSQL | |
| |
| |
Deleting Database Users in PostgreSQL | |
| |
| |
Granting and Revoking Privileges in PostgreSQL | |
| |
| |
Database Clients | |
| |
| |
SSH Access to a Database | |
| |
| |
Local GUI Client Access to a Database | |
| |
| |
Web Access to a Database | |
| |
| |
The MySQL Command-Line Client | |
| |
| |
The PostgreSQL Command-Line Client | |
| |
| |
Graphical Clients | |
| |
| |
Reference | |
| |
| |
| |
LDAP | |
| |
| |
Configuring the Server | |
| |
| |
Creating Your Schema | |
| |
| |
Populating Your Directory | |
| |
| |
Configuring Clients | |
| |
| |
Evolution | |
| |
| |
Thunderbird | |
| |
| |
Administration | |
| |
| |
Reference | |
| |
| |
| |
Linux Terminal Server Project (LTSP) | |
| |
| |
Requirements | |
| |
| |
Installation | |
| |
| |
Using LTSP | |
| |
| |
Reference | |
| |
| |
| |
Ubuntu in the Cloud | |
| |
| |
Why a Cloud? | |
| |
| |
UEC and Eucalyptus | |
| |
| |
Deploy/Install | |
| |
| |
Public | |
| |
| |
Private | |
| |
| |
A Euca2ools Primer | |
| |
| |
Reference | |
| |
| |
| |
Programming Linux | |
| |
| |
| |
Opportunistic Development | |
| |
| |
Launchpad | |
| |
| |
Quickly | |
| |
| |
Ground Control | |
| |
| |
Reference | |
| |
| |
| |
Helping with Ubuntu Testing and QA | |
| |
| |
Community Teams | |
| |
| |
Ubuntu Testing Team | |
| |
| |
QA Testing Team | |
| |
| |
Bug Squad | |
| |
| |
Test Drive | |
| |
| |
Reference | |
| |
| |
| |
Using Perl | |
| |
| |
Using Perl with Linux | |
| |
| |
Perl Versions | |
| |
| |
A Simple Perl Program | |
| |
| |
Perl Variables and Data Structures | |
| |
| |
Perl Variable Types | |
| |
| |
Special Variables | |
| |
| |
Operators | |
| |
| |
Comparison Operators | |
| |
| |
Compound Operators | |
| |
| |
Arithmetic Operators | |
| |
| |
Other Operators | |
| |
| |
Special String Constants | |
| |
| |
Conditional Statements: if/else and unless | |
| |
| |
If | |
| |
| |
Unless | |
| |
| |
Looping | |
| |
| |
For | |
| |
| |
Foreach | |
| |
| |
While | |
| |
| |
Until | |
| |
| |
Last and next | |
| |
| |
Do while and do until | |
| |
| |
Regular Expressions | |
| |
| |
Access to the Shell | |
| |
| |
Modules and CPAN | |
| |
| |
Code Examples | |
| |
| |
Sending Mail | |
| |
| |
Purging Logs | |
| |
| |
Posting to Usenet | |
| |
| |
One-Liners | |
| |
| |
Command-Line Processing | |
| |
| |
Reference | |
| |
| |
| |
Working with Python | |
| |
| |
Python on Linux | |
| |
| |
The Basics of Python | |
| |
| |
Numbers | |
| |
| |
More on Strings | |
| |
| |
Lists | |
| |
| |
Dictionaries | |
| |
| |
Conditionals and Looping | |
| |
| |
Functions | |
| |
| |
Object Orientation | |
| |
| |
Class and Object Variables | |
| |
| |
Constructors and Destructors | |
| |
| |
Class Inheritance | |
| |
| |
The Standard Library and the Python Package Index | |
| |
| |
Reference | |
| |
| |
| |
Writing PHP Scripts | |
| |
| |
Introduction to PHP | |
| |
| |
Entering and Exiting PHP Mode | |
| |
| |
Variables | |
| |
| |
Arrays | |
| |
| |
Constants | |
| |
| |
References | |
| |
| |
Comments | |
| |
| |
Escape Sequences | |
| |
| |
Variable Substitution | |
| |
| |
Operators | |
| |
| |
Conditional Statements | |
| |
| |
Special Operators | |
| |
| |
Switching | |
| |
| |
Loops | |
| |
| |
Including Other Files | |
| |
| |
Basic Functions | |
| |
| |
Strings | |
| |
| |
Arrays | |
| |
| |
Files | |
| |
| |
Miscellaneous | |
| |
| |
Handling HTML Forms | |
| |
| |
Databases | |
| |
| |
Reference | |
| |
| |
| |
C/C++ Programming Tools for Ubuntu | |
| |
| |
Programming in C with Linux | |
| |
| |
Using the C Programming Project Management Tools Provided with Ubuntu | |
| |
| |
Building Programs with make | |
| |
| |
Using Makefiles | |
| |
| |
Using the autoconf Utility to Configure Code | |
| |
| |
Managing Software Projects with Subversion | |
| |
| |
Debugging Tools | |
| |
| |
Using the GNU C Compiler | |
| |
| |
Graphical Development Tools | |
| |
| |
Using the KDevelop Client | |
| |
| |
The Glade Client for Developing in GNOME | |
| |
| |
Reference | |
| |
| |
| |
Mono | |
| |
| |
Why Use Mono? | |
| |
| |
MonoDevelop | |
| |
| |
The Structure of a C# Program | |
| |
| |
Printing Out the Parameters | |
| |
| |
Creating Your Own Variables | |
| |
| |
Adding Some Error Checking | |
| |
| |
Building on Mono's Libraries | |
| |
| |
Creating a GUI with Gtk# | |
| |
| |
Reference | |
| |
| |
| |
Ubuntu Housekeeping | |
| |
| |
| |
Managing Software | |
| |
| |
Ubuntu Software Center | |
| |
| |
Using Synaptic for Software Management | |
| |
| |
Staying Up-to-Date | |
| |
| |
Working on the Command Line | |
| |
| |
Day-to-Day Usage | |
| |
| |
Finding Software | |
| |
| |
Compiling Software from Source | |
| |
| |
Reference | |
| |
| |
| |
Securing Your Machines | |
| |
| |
Understanding Computer Attacks | |
| |
| |
Assessing Your Vulnerability | |
| |
| |
Protecting Your Machine | |
| |
| |
Securing a Wireless Network | |
| |
| |
Passwords and Physical Security | |
| |
| |
Configuring and Using Tripwire | |
| |
| |
Devices | |
| |
| |
Viruses | |
| |
| |
Configuring Uncomplicated Firewall (UFW) | |
| |
| |
AppArmor | |
| |
| |
Forming a Disaster Recovery Plan | |
| |
| |
Reference | |
| |
| |
| |
Performance Tuning | |
| |
| |
Hard Disk | |
| |
| |
Using the BIOS and Kernel to Tune the Disk Drives | |
| |
| |
The hdparm Command | |
| |
| |
File System Tuning | |
| |
| |
The tune2fs Command | |
| |
| |
The e2fsck Command | |
| |
| |
The badblocks Command | |
| |
| |
Disabling File Access Time | |
| |
| |
Kernel | |
| |
| |
Apache | |
| |
| |
MySQL | |
| |
| |
Measuring Key Buffer Usage | |
| |
| |
Using the Query Cache | |
| |
| |
Miscellaneous Tweaks | |
| |
| |
Query Optimization | |
| |
| |
Reference | |
| |
| |
| |
Command Line Masterclass | |
| |
| |
Why Use the Shell? | |
| |
| |
Basic Commands | |
| |
| |
Printing the Contents of a File with cat | |
| |
| |
Changing Directories with cd | |
| |
| |
Changing File Access Permissions with chmod | |
| |
| |
Copying Files with cp | |
| |
| |
Printing Disk Usage with du | |
| |
| |
Finding Files by Searching with find | |
| |
| |
Searches for a String in Input with grep | |
| |
| |
Paging Through Output with less | |
| |
| |
Creating Links Between Files with ln | |
| |
| |
Finding Files from an Index with locate | |
| |
| |
Listing Files in the Current Directory with ls | |
| |
| |
Reading Manual Pages with man | |
| |
| |
Making Directories with mkdir | |
| |
| |
Moving Files with mv | |
| |
| |
Listing Processes with ps | |
| |
| |
Deleting Files and Directories with rm | |
| |
| |
Printing the Last Lines of a File with tail | |
| |
| |
Printing Resource Usage with top | |
| |
| |
Printing the Location of a Command with which | |
| |
| |
Combining Commands | |
| |
| |
Multiple Terminals | |
| |
| |
Reference | |
| |
| |
| |
Kernel and Module Management | |
| |
| |
The Linux Kernel | |
| |
| |
The Linux Source Tree | |
| |
| |
Types of Kernels | |
| |
| |
Managing Modules | |
| |
| |
When to Recompile | |
| |
| |
Kernel Versions | |
| |
| |
Obtaining the Kernel Sources | |
| |
| |
Patching the Kernel | |
| |
| |
Compiling the Kernel | |
| |
| |
Using xconfig to Configure the Kernel | |
| |
| |
Creating an Initial RAM Disk Image | |
| |
| |
When Something Goes Wrong | |
| |
| |
Errors During Compile | |
| |
| |
Runtime Errors, Boot Loader Problems, and Kernel Oops | |
| |
| |
Reference | |
| |
| |
| |
Appendixes | |
| |
| |
| |
Ubuntu Under the Hood | |
| |
| |
| |
Ubuntu and Linux Internet Resources | |
| |
| |
TOC, 9780672333446, 11/18/2010 | |