Cover image for Linux power tools
Title:
Linux power tools
Author:
Smith, Roderick W.
Personal Author:
Publication Information:
San Francisco, Calif. : SYBEX, [2003]

©2003
Physical Description:
xxiv, 644 pages : illustrations ; 23 cm
General Note:
Includes index.
Language:
English
Title Subject:
ISBN:
9780782142266
Format :
Book

Available:*

Library
Call Number
Material Type
Home Location
Status
Central Library HF5548.4.L5 S65 2003 Adult Non-Fiction Central Closed Stacks
Searching...

On Order

Summary

Summary

Step-by-Step Instructions Show You How to Supercharge Your Linux System
Wondering if it's possible to work more efficiently in the X Window System, or squeeze more oomph from your existing hardware? Or perhaps you're searching for a way to improve your web browser's performance, or want to know how to choose the best mail server for your needs. If you've mastered the basics and are itching to go beyond, Linux Power Tools can take you there. Spanning a broad range of topics (from ALSA to zombies), Linux Power Tools covers the top five Linux distributions (Debian, Mandrake, Red Hat, Slackware, and SuSE). Using his easy-to-follow style, Linux expert Rod Smith shares his secrets for creating the optimum Linux system, from top to bottom.
Coverage includes:
* Optimizing Hardware
* Creating the Perfect GUI Environment
* Using Digital Image Tools
* Fine-tuning the X Window System
* Doing Real Work in Text Mode
* Using Multiple Operating Systems
* Managing Packages Efficiently
* Optimizing Your Filesystem
* Improving Network Performance
* Preventing and Detecting Intrusions
* Getting the Most From Your Web Server
* Blocking That Obnoxious Spam Mail


Author Notes

Roderick W. Smith is a Linux and Unix author and consultant whose been working with Linux since 1994. His previous ten titles include Linux Samba Server Administration and Linux+ Study Guide, both from Sybex. He writes the "Guru Guidance" column in Linux Magazine. He holds a Ph.D. in cognitive psychology


Table of Contents

Introductionp. xxi
Part I Hardware Toolsp. 1
Chapter 1 Optimizing System Architecture Usagep. 3
Getting the Most from Your CPUp. 3
Getting the Best Video Performancep. 9
Taming Hardware via Driversp. 12
Delivering Clear Soundp. 20
Demystifying the /proc Filesystemp. 24
Summaryp. 27
Chapter 2 Improving Disk Performancep. 29
Understanding ATA and SCSIp. 29
Controllers and Host Adaptersp. 32
Testing and Optimizing Disk Performancep. 35
Optimizing Disk Partitionsp. 39
Moving Data via Sneakernet: Removable Mediap. 42
Burning CD-Rsp. 48
Summaryp. 53
Chapter 3 Using External Peripheralsp. 55
Configuring USB, RS-232 Serial, and Parallel Portsp. 55
Overcoming Keyboard Quirksp. 62
Using a Mouse to the Fullestp. 66
Getting a Scanner to Workp. 68
Summaryp. 75
Part II User Toolsp. 77
Chapter 4 Mastering Shells and Shell Scriptingp. 79
Selecting an Appropriate Shellp. 80
Making Efficient Use of a Shellp. 81
Saving Time with Shell Scriptsp. 87
Summaryp. 96
Chapter 5 Doing Real Work in Text Modep. 97
Running Multiple Programs in Virtual Terminalsp. 97
Mastering Important Linux Commandsp. 98
Managing the Text-Mode Environmentp. 107
Summaryp. 111
Chapter 6 Getting the Most from a Desktop Environmentp. 113
Selecting an Appropriate Desktop Environmentp. 114
Mastering KDEp. 116
Mastering GNOMEp. 124
Distribution-Specific Quirksp. 132
Creating a Desktop Environment That's Just Rightp. 133
Summaryp. 138
Chapter 7 Using Linux for Office Productivityp. 139
Selecting Appropriate Office Toolsp. 139
Managing Fours in Office Toolsp. 148
Managing Printers in Office Toolsp. 152
Summaryp. 154
Chapter 8 Miscellaneous User Toolsp. 155
Working with Sound Filesp. 155
Using Digital Camera Toolsp. 160
Using the GIMPp. 164
Optimizing Linux Web Browsersp. 170
Choosing and Using Linux E-Mail Clientsp. 177
Summaryp. 180
Part III System Administration Toolsp. 181
Chapter 9 Bypassing Automatic Configurations to Gain Controlp. 183
The Perils of Automatic Configurationsp. 184
Automatic Setup Mechanisms by Distributionp. 187
Implementing Manual Configurationsp. 197
Summaryp. 202
Chapter 10 Using Multiple OSsp. 203
Installation Tricks and Trapsp. 203
Picking an OS to Boot: Boot Loadersp. 209
Exchanging Data via Foreign Filesystemsp. 215
Exchanging Files: File Format Compatibilityp. 220
Improving Your Productivity with Emulatorsp. 223
Summaryp. 229
Chapter 11 Managing Packagesp. 231
Basic Package Management Featuresp. 231
Avoiding Tedium with RPMsp. 232
Avoiding Tedium with Debian Packagesp. 239
Converting Package Formatsp. 241
Automating Upgradesp. 244
Summaryp. 247
Chapter 12 Filesystems and Filesp. 249
Picking the Right Filesystemp. 249
Optimizing Filesystemsp. 254
Recovering from Filesystem Corruptionp. 262
Recovering Deleted Filesp. 264
Summaryp. 268
Chapter 13 Managing Printersp. 269
Choosing the Best Linux Printing Systemp. 269
Improving Ghostscript Outputp. 273
Sharing Printers on a Networkp. 278
Summaryp. 284
Chapter 14 Programs and Processesp. 285
Understanding Relationships: The Linux Process Treep. 285
All You Ever Wanted to Know about Your Processesp. 287
Improving Performance by Modifying Process Prioritiesp. 294
Killing Unwanted Processesp. 297
Summaryp. 300
Chapter 15 Creating a Custom Kernelp. 301
Obtaining a Kernelp. 301
Kernel Configuration Toolsp. 304
An Overview of Kernel Optionsp. 307
Optimizing Kernel Performancep. 312
Compiling and Installing a Kernelp. 316
Summaryp. 320
Chapter 16 Optimizing X Configurationp. 321
The Structure of XF86Configp. 322
Improving the Appearance of Fontsp. 325
Using Card-Specific Optimizationsp. 336
Creating a Custom Video Modep. 339
Summaryp. 344
Chapter 17 Protecting Your System with Backupsp. 345
Picking the Right Backup Mediump. 345
A Rundown of Backup Programsp. 349
Using tar's Featuresp. 350
Incremental Backups: Minimizing Backup Resourcesp. 352
Emergency Restore Proceduresp. 355
Summaryp. 360
Chapter 18 System Securityp. 361
Methods of Attackp. 361
Choosing Good Passwordsp. 368
Removing Unnecessary Serversp. 373
Keeping Software Up-to-Datep. 378
Summaryp. 380
Part IV Networking Toolsp. 381
Chapter 19 Basic Network Configurationp. 383
Getting the Most from a Network Cardp. 383
TCP/IP Basicsp. 386
DHCP: Promises and Perilsp. 388
Using a Static IP Addressp. 391
Testing Network Performancep. 395
Optimizing Network Performancep. 402
Summaryp. 406
Chapter 20 Controlling Network Accessp. 407
Methods of Keeping Out the Bad Guysp. 407
Blocking IP Addresses with a Firewallp. 410
Blocking IP Addresses with TCP Wrappersp. 419
Enhanced xinetd Access Restrictionsp. 422
Containing Access in a Jailp. 424
Summaryp. 428
Chapter 21 Detecting Intrudersp. 429
Noticing Suspicious Eventsp. 429
Monitoring for Intrusion with Tripwirep. 432
Looking for Root Kits with chkrootkitp. 441
What to Do in the Event of a Breachp. 441
Summaryp. 443
Part V Server Toolsp. 445
Chapter 22 Running Serversp. 447
Demystifying SysV Startup Scriptsp. 447
Running Small Servers Optimally with Super Serversp. 455
When All Else Fails: Local Startup Scriptsp. 461
Deciding Which Method to Usep. 462
Summaryp. 463
Chapter 23 Getting More from a Web Serverp. 465
Web Server Choices for Performance and Securityp. 465
Apache Configuration File Basicsp. 467
Common Apache Configuration Tweaksp. 468
Serving Dynamic Content with CGI Scriptsp. 473
Serving Secure Contentp. 477
Designing Web Pagesp. 481
Summaryp. 485
Chapter 24 Serving Filesp. 487
FTP: Delivering Files to Any Client OSp. 488
NFS: Sharing with Linux or Unixp. 492
Samba: Sharing with Windowsp. 497
File Serving Security Concernsp. 506
Summaryp. 507
Chapter 25 Delivering E-Mailp. 509
Understanding Mail Protocolsp. 510
Configuring a Domain to Accept Mailp. 510
Picking the Right Mail Serverp. 511
Running Sendmailp. 513
Running Postfixp. 518
Running Eximp. 522
Delivering Mail to Clients with POP or IMAPp. 524
Stopping the Junk Mailp. 529
Using Fetchmailp. 537
Summaryp. 543
Chapter 26 Providing Remote Login Accessp. 545
Providing Text-Mode Remote Accessp. 545
Providing GUI Remote Accessp. 552
Preventing Remote-Access Security Problemsp. 569
Summaryp. 570
Chapter 27 Miscellaneous Serversp. 571
Configuring a Network's IP Addresses with DHCPp. 571
Providing Hostnames with a DNS Serverp. 580
Keeping Clocks Synchronized with a Time Serverp. 588
Summaryp. 594
Glossaryp. 595
Indexp. 613

Google Preview