MTU Cork Library Catalogue

Syndetics cover image
Image from Syndetics

Linux server hacks. Vol. 2 / Bill Von Hagen and Brian K. Jones.

By: Von Hagen, William.
Contributor(s): Jones, Brian K, 1938-.
Material type: materialTypeLabelBookSeries: Hacks series.Publisher: Beijing ; Sabastopol, CA : O\'Reilly,. 2006Description: xx, 456 p. : ill. ; 23 cm. + pbk.ISBN: 0596100825 (pbk.).Subject(s): Linux | Client/server computing | Operating systems (Computers)DDC classification: 005.446
Contents:
Linux Authentication -- Remote GUI Connectivity -- System Services -- Cool Sysadmin Tools and Tips -- Storage Management and Backups -- Standardizing, Sharing and Synchronizing Resources -- Security -- Troubleshooting and Performance -- Logfiles and Monitoring -- System Rescue, Recovery and Repair.
Holdings
Item type Current library Call number Copy number Status Date due Barcode Item holds
General Lending MTU Bishopstown Library Lending 005.446 (Browse shelf(Opens below)) 1 Available 00113853
Total holds: 0

Enhanced descriptions from Syndetics:

Today's system administrators deal with a vast number of situations, operating systems, software packages, and problems. Those who are in the know have kept their copy of Linux Server Hacks close at hand to ease their burden. And while this helps, it's not enough: any sys admin knows there are many more hacks, cool tips, and ways of solving problems than can fit in a single volume (one that mere mortals can lift, that is).

Which is why we created Linux Server Hacks, Volume Two , a second collection of incredibly useful tips and tricks for finding and using dozens of open source tools you can apply to solve your sys admin problems. The power and flexibility of Linux and Open Source means that there is an astounding amount of great software out there waiting to be applied to your sys admin problems -- if only you knew about it and had enough information to get started. Hence, Linux Server Hacks, Volume Two .

This handy reference offers 100 completely new server management tips and techniques designed to improve your productivity and sharpen your administrative skills. Each hack represents a clever way to accomplish a specific task, saving you countless hours of searching for the right answer. No more sifting through man pages, HOWTO websites, or source code comments -- the only resource you need is right here. And you don't have to be a system administrator with hundreds of boxen to get something useful from this book as many of the hacks apply equally well to a single system or a home network.

Compiled by experts, these hacks not only give you the step-by-step instructions necessary to implement the software, but they also provide the context to truly enable you to learn the technology. Topics include:

Authentication Remote GUI connectivity Storage management File sharing and synchronizing resources Security/lockdown instruction Log files and monitoring Troubleshooting System rescue, recovery, and repair

Whether they help you recover lost data, collect information from distributed clients, or synchronize administrative environments, the solutions found in Linux Server Hacks, Volume Two will simplify your life as a system administrator.

Includes index.

Linux Authentication -- Remote GUI Connectivity -- System Services -- Cool Sysadmin Tools and Tips -- Storage Management and Backups -- Standardizing, Sharing and Synchronizing Resources -- Security -- Troubleshooting and Performance -- Logfiles and Monitoring -- System Rescue, Recovery and Repair.

Table of contents provided by Syndetics

  • Credits (p. ix)
  • Preface (p. xiii)
  • Chapter 1 Linux Authentication (p. 1)
  • 1 Disable User Accounts Instantly (p. 2)
  • 2 Edit Your Password File for Greater Access Control (p. 5)
  • 3 Deny All Access in One Second or Less (p. 7)
  • 4 Customize Authentication with PAMs (p. 8)
  • 5 Authenticate Linux Users with a Windows Domain Controller (p. 16)
  • 6 Centralize Logins with LDAP (p. 21)
  • 7 Secure Your System with Kerberos (p. 29)
  • 8 Authenticate NFS-Lovers with NIS (p. 36)
  • 9 Sync LDAP Data with NIS (p. 41)
  • Chapter 2 Remote GUI Connectivity (p. 45)
  • 10 Access Systems Remotely with VNC (p. 46)
  • 11 Access VNC Servers over the Web (p. 54)
  • 12 Secure VNC via SSH (p. 56)
  • 13 Autostart VNC Servers on Demand (p. 60)
  • 14 Put Your Desktops on a Thin Client Diet (p. 69)
  • 15 Run Windows over the Network (p. 78)
  • 16 Secure, Lightweight X Connections with FreeNX (p. 82)
  • 17 Secure VNC Connections with FreeNX (p. 89)
  • 18 Secure Windows Terminal Connections with FreeNX (p. 91)
  • 19 Remote Administration with Webmin (p. 93)
  • Chapter 3 System Services (p. 97)
  • 20 Quick and Easy DHCP Setup (p. 98)
  • 21 Integrate DHCP and DNS with Dynamic DNS Updates (p. 102)
  • 22 Synchronize Your Watches! (p. 108)
  • 23 Centralize X Window System Font Resources (p. 111)
  • 24 Create a CUPS Print Server (p. 119)
  • 25 Configure Linux Connections to Remote CUPS Printers (p. 128)
  • 26 Integrate Windows Printing with CUPS (p. 130)
  • 27 Centralize Macintosh Printing with CUPS (p. 134)
  • 28 Define a Secure CUPS Printer (p. 138)
  • Chapter 4 Cool Sysadmin Tools and Tips (p. 143)
  • 29 Execute Commands Simultaneously on Multiple Servers (p. 144)
  • 30 Collaborate Safely with a Secured Wiki (p. 145)
  • 31 Edit Your GRUB Configuration with grubby (p. 149)
  • 32 Give Your Tab Key a Workout (p. 150)
  • 33 Keep Processes Running After a Shell Exits (p. 153)
  • 34 Disconnect Your Console Without Ending Your Session (p. 155)
  • 35 Use script to Save Yourself Time and Train Others (p. 157)
  • 36 Install Linux Simply by Booting (p. 159)
  • 37 Turn Your Laptop into a Makeshift Console (p. 164)
  • 38 Usable Documentation for the Inherently Lazy (p. 167)
  • 39 Exploit the Power of Vim (p. 170)
  • 40 Move Your PHP Web Scripting Skills to the Command Line (p. 173)
  • 41 Enable Quick telnet/SSH Connections from the Desktop (p. 176)
  • 42 Speed Up Compiles (p. 178)
  • 43 Avoid Common Junior Mistakes (p. 181)
  • 44 Get Linux Past the Gatekeeper (p. 184)
  • 45 Prioritize Your Work (p. 187)
  • Chapter 5 Storage Management and Backups (p. 193)
  • 46 Create Flexible Storage with LVM (p. 194)
  • 47 Combine LVM and Software RAID (p. 203)
  • 48 Create a Copy-on-Write Snapshot of an LVM Volume (p. 210)
  • 49 Clone Systems Quickly and Easily (p. 214)
  • 50 Make Disk-to-Disk Backups for Large Drives (p. 221)
  • 51 Free Up Disk Space Now (p. 228)
  • 52 Share Files Using Linux Groups (p. 229)
  • 53 Refine Permissions with ACLs (p. 233)
  • 54 Make Files Easier to Find with Extended Attributes (p. 240)
  • 55 Prevent Disk Hogs with Quotas (p. 246)
  • Chapter 6 Standardizing, Sharing, and Synchronizing Resources (p. 251)
  • 56 Centralize Resources Using NFS (p. 251)
  • 57 Automount NFS Home Directories with autofs (p. 257)
  • 58 Keep Filesystems Handy, but Out of Your Way (p. 260)
  • 59 Synchronize root Environments with rsync (p. 263)
  • 60 Share Files Across Platforms Using Samba (p. 264)
  • 61 Quick and Dirty NAS (p. 269)
  • 62 Share Files and Directories over the Web (p. 276)
  • Chapter 7 Security (p. 280)
  • 63 Increase Security by Disabling Unnecessary Services (p. 281)
  • 64 Allow or Deny Access by IP Address (p. 283)
  • 65 Detect Network Intruders with snort (p. 286)
  • 66 Tame Tripwire (p. 293)
  • 67 Verify Fileystem Integrity with Afick (p. 299)
  • 68 Check for Rootkits and Other Attacks (p. 303)
  • Chapter 8 Troubleshooting and Performance (p. 311)
  • 69 Find Resource Hogs with Standard Commands (p. 311)
  • 70 Reduce Restart Times with Journaling Filesystems (p. 316)
  • 71 Grok and Optimize Your System with sysctl (p. 321)
  • 72 Get the Big Picture with Multiple Displays (p. 323)
  • 73 Maximize Resources with a Minimalist Window Manager (p. 327)
  • 74 Profile Your Systems Using /proc (p. 332)
  • 75 Kill Processes the Right Way (p. 337)
  • 76 Use a Serial Console for Centralized Access to Your Systems (p. 339)
  • 77 Clean Up NIS After Users Depart (p. 343)
  • Chapter 9 Logfiles and Monitoring (p. 346)
  • 78 Avoid Catastrophic Disk Failure (p. 346)
  • 79 Monitor Network Traffic with MRTG (p. 351)
  • 80 Keep a Constant Watch on Hosts (p. 354)
  • 81 Remotely Monitor and Configure a Variety of Networked Equipment (p. 357)
  • 82 Force Standalone Apps to Use syslog (p. 362)
  • 83 Monitor Your Logfiles (p. 364)
  • 84 Send Log Messages to Your Jabber Client (p. 368)
  • 85 Monitor Service Availability with Zabbix (p. 371)
  • 86 Fine-Tune the syslog Daemon (p. 375)
  • 87 Centralize System Logs Securely (p. 379)
  • 88 Keep Tabs on Systems and Services (p. 382)
  • Chapter 10 System Rescue, Recovery, and Repair (p. 388)
  • 89 Resolve Common Boot and Startup Problems (p. 389)
  • 90 Rescue Me! (p. 396)
  • 91 Bypass the Standard Init Sequence for Quick Repairs (p. 398)
  • 92 Find Out Why You Can't Unmount a Partition (p. 400)
  • 93 Recover Lost Partitions (p. 404)
  • 94 Recover Data from Crashed Disks (p. 407)
  • 95 Repair and Recover ReiserFS Filesystems (p. 415)
  • 96 Piece Together Data from the lost+found (p. 422)
  • 97 Recover Deleted Files (p. 430)
  • 98 Permanently Delete Files (p. 433)
  • 99 Permanently Erase Hard Disks (p. 435)
  • 100 Recover Lost Files and Perform Forensic Analysis (p. 438)
  • Index (p. 447)

Author notes provided by Syndetics

Bill von Hagen is a seasoned Linux/Unix systems administrator and computer collector. He writes articles and product reviews for Linux Planet, Linux Today, Linux Format, and Linux Magazine. He is the author of several technology books including "Hacking the TiVo, Second Edition" (Muska and Lipman), "The Definitive Guide to GCC" (Apress), and co-author of "SUSE Linux 9 Bible" (Wiley). In a past life, he was the drummer for a hardcore punk rock band, The Cynics.

Brian K. Jones is a system administrator in the department of computer science at Princeton University.

Powered by Koha