Linux Server Hacks

by
Format: Paperback
Pub. Date: 2005-12-01
Publisher(s): Oreilly & Associates Inc
List Price: $42.40

Buy New

Usually Ships in 2-3 Business Days
$40.38

Rent Book

Select for Price
There was a problem. Please try again later.

Rent Digital

Rent Digital Options
Online:1825 Days access
Downloadable:Lifetime Access
$38.39
$38.39

Used Book

We're Sorry
Sold Out

How Marketplace Works:

  • This item is offered by an independent seller and not shipped from our warehouse
  • Item details like edition and cover design may differ from our description; see seller's comments before ordering.
  • Sellers much confirm and ship within two business days; otherwise, the order will be cancelled and refunded.
  • Marketplace purchases cannot be returned to eCampus.com. Contact the seller directly for inquiries; if no response within two days, contact customer service.
  • Additional shipping costs apply to Marketplace purchases. Review shipping costs at checkout.

Summary

This book follows the runaway success of 'Linux Server Hacks' with 100 completely new and powerful server management tricks and techniques. Each hack can be read easily in a few minutes, saving countless hours of searching for the right answer. Most hacks in this new book are geared toward system integration and server management, particularly in a heterogeneous Windows/Unix/Linux environment. Co-author William von Hagen is a seasoned Linux/Unix systems administrator and computer collector. He writes articles and product reviews for Linux Planet, Linux Today, Linux Format, and Linux Magazine.

Author Biography

Bill von Hagen is a seasoned Linux/Unix systems administrator and computer collector. He writes articles and product reviews for Linux Planet, Linux Today, Linux Format, and Linux Magazine. He is the author of several technology books including "Hacking the TiVo, Second Edition" (Muska and Lipman), "The Definitive Guide to GCC" (Apress), and co-author of "SUSE Linux 9 Bible" (Wiley). In a past life, he was the drummer for a hardcore punk rock band, The Cynics.

Brian K. Jones is a system administrator in the department of computer science at Princeton University.

Table of Contents

Credits ix
Preface xiii
Linux Authentication
1(44)
Disable User Accounts Instantly
2(3)
Edit Your Password File for Greater Access Control
5(2)
Deny All Access in One Second or Less
7(1)
Customize Authentication with PAMs
8(8)
Authenticate Linux Users with a Windows Domain Controller
16(5)
Centralize Logins with LDAP
21(8)
Secure Your System with Kerberos
29(7)
Authenticate NFS-Lovers with NIS
36(5)
Sync LDAP Data with NIS
41(4)
Remote GUI Connectivity
45(52)
Access Systems Remotely with VNC
46(8)
Access VNC Servers over the Web
54(2)
Secure VNC via SSH
56(4)
Autostart VNC Servers on Demand
60(9)
Put Your Desktops on a Thin Client Diet
69(9)
Run Windows over the Network
78(4)
Secure, Lightweight X Connections with FreeNX
82(7)
Secure VNC Connections with FreeNX
89(2)
Secure Windows Terminal Connections with FreeNX
91(2)
Remote Administration with Webmin
93(4)
System Services
97(46)
Quick and Easy DHCP Setup
98(4)
Integrate DHCP and DNS with Dynamic DNS Updates
102(6)
Synchronize Your Watches!
108(3)
Centralize X Window System Font Resources
111(8)
Create a CUPS Print Server
119(9)
Configure Linux Connections to Remote CUPS Printers
128(2)
Integrate Windows Printing with CUPS
130(4)
Centralize Macintosh Printing with CUPS
134(4)
Define a Secure CUPS Printer
138(5)
Cool Sysadmin Tools and Tips
143(50)
Execute Commands Simultaneously on Multiple Servers
144(1)
Collaborate Safely with a Secured Wiki
145(4)
Edit Your GRUB Configuration with grubby
149(1)
Give Your Tab Key a Workout
150(3)
Keep Processes Running After a Shell Exits
153(2)
Disconnect Your Console Without Ending Your Session
155(2)
Use script to Save Yourself Time and Train Others
157(2)
Install Linux Simply by Booting
159(5)
Turn Your Laptop into a Makeshift Console
164(3)
Usable Documentation for the Inherently Lazy
167(3)
Exploit the Power of Vim
170(3)
Move Your PHP Web Scripting Skills to the Command Line
173(3)
Enable Quick telnet/SSH Connections from the Desktop
176(2)
Speed Up Compiles
178(3)
Avoid Common Junior Mistakes
181(3)
Get Linux Past the Gatekeeper
184(3)
Prioritize Your Work
187(6)
Storage Management and Backups
193(58)
Create Flexible Storage with LVM
194(9)
Combine LVM and Software RAID
203(7)
Create a Copy-on-Write Snapshot of an LVM Volume
210(4)
Clone Systems Quickly and Easily
214(7)
Make Disk-to-Disk Backups for Large Drives
221(7)
Free Up Disk Space Now
228(1)
Share Files Using Linux Groups
229(4)
Refine Permissions with ACLs
233(7)
Make Files Easier to Find with Extended Attributes
240(6)
Prevent Disk Hogs with Quotas
246(5)
Standardizing, Sharing, and Synchronizing Resources
251(29)
Centralize Resources Using NFS
251(6)
Automount NFS Home Directories with autofs
257(3)
Keep Filesystems Handy, but Out of Your Way
260(3)
Synchronize root Environments with rsync
263(1)
Share Files Across Platforms Using Samba
264(5)
Quick and Dirty NAS
269(7)
Share Files and Directories over the Web
276(4)
Security
280(31)
Increase Security by Disabling Unnecessary Services
281(2)
Allow or Deny Access by IP Address
283(3)
Detect Network Intruders with snort
286(7)
Tame Tripwire
293(6)
Verify Fileystem Integrity with Afick
299(4)
Check for Rootkits and Other Attacks
303(8)
Troubleshooting and Performance
311(35)
Find Resource Hogs with Standard Commands
311(5)
Reduce Restart Times with Journaling Filesystems
316(5)
Grok and Optimize Your System with sysctl
321(2)
Get the Big Picture with Multiple Displays
323(4)
Maximize Resources with a Minimalist Window Manager
327(5)
Profile Your Systems Using /proc
332(5)
Kill Processes the Right Way
337(2)
Use a Serial Console for Centralized Access to Your Systems
339(4)
Clean Up NIS After Users Depart
343(3)
Logfiles and Monitoring
346(42)
Avoid Catastrophic Disk Failure
346(5)
Monitor Network Traffic with MRTG
351(3)
Keep a Constant Watch on Hosts
354(3)
Remotely Monitor and Configure a Variety of Networked Equipment
357(5)
Force Standalone Apps to Use syslog
362(2)
Monitor Your Logfiles
364(4)
Send Log Messages to Your Jabber Client
368(3)
Monitor Service Availability with Zabbix
371(4)
Fine-Tune the syslog Daemon
375(4)
Centralize System Logs Securely
379(3)
Keep Tabs on Systems and Services
382(6)
System Rescue, Recovery, and Repair
388(59)
Resolve Common Boot and Startup Problems
389(7)
Rescue Me!
396(2)
Bypass the Standard Init Sequence for Quick Repairs
398(2)
Find Out Why You Can't Unmount a Partition
400(4)
Recover Lost Partitions
404(3)
Recover Data from Crashed Disks
407(8)
Repair and Recover ReiserFS Filesystems
415(7)
Piece Together Data from the lost+found
422(8)
Recover Deleted Files
430(3)
Permanently Delete Files
433(2)
Permanently Erase Hard Disks
435(3)
Recover Lost Files and Perform Forensic Analysis
438(9)
Index 447

An electronic version of this book is available through VitalSource.

This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.

By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.

Digital License

You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.

More details can be found here.

A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.

Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.

Please view the compatibility matrix prior to purchase.