Linux Power Tools
Wondering if it's possible to work more efficiently in the X Window System, or squeeze more oomph from your existing hardware? Or perhaps you're searching for a way to improve your web browser's performance, or want to know how to choose the best mail server for your needs. If you've mastered the basics and are itching to go beyond, Linux Power Tools can take you there. Spanning a broad range of topics (from ALSA to zombies), Linux Power Tools covers the top five Linux distributions (Debian, Mandrake, Red Hat, Slackware, and SuSE). Using his easy-to-follow style, Linux expert Rod Smith shares his secrets for creating the optimum Linux system, from top to bottom.
* Optimizing Hardware
* Creating the Perfect GUI Environment
* Using Digital Image Tools
* Fine-tuning the X Window System
* Doing Real Work in Text Mode
* Using Multiple Operating Systems
* Managing Packages Efficiently
* Optimizing Your Filesystem
* Improving Network Performance
* Preventing and Detecting Intrusions
* Getting the Most From Your Web Server
* Blocking That Obnoxious Spam Mail
Table of Contents
Part I: Hardware Tools.
Chapter 1: Optimizing System Architecture Usage.
Chapter 2: Improving Disk Performance.
Chapter 3: Using External Peripherals.
Part II: User Tools.
Chapter 4: Mastering Shells and Shell Scripting.
Chapter 5: Doing Real Work in Text Mode.
Chapter 6: Getting the Most from a Desktop Environment.
Chapter 7: Using Linux for Office Productivity.
Chapter 8: Miscellaneous User Tools.
Part III: System Administration Tools.
Chapter 9: Bypassing Automatic Configurations to Gain Control.
Chapter 10: Using Multiple OSs.
Chapter 11: Managing Packages.
Chapter 12: Filesystems and Files.
Chapter 13: Managing Printers.
Chapter 14: Programs and Processes.
Chapter 15: Creating a Custom Kernel.
Chapter 16: Optimizing X Configuration.
Chapter 17: Protecting Your System with Backups.
Chapter 18: System Security.
Part IV: Networking Tools.
Chapter 19: Basic Network Configuration.
Chapter 20: Controlling Network Access.
Chapter 21: Detecting Intruders.
Part V: Server Tools.
Chapter 22: Running Servers.
Chapter 23: Getting More from a Web Server.
Chapter 24: Serving Files.
Chapter 25: Delivering E-Mail.
Chapter 26: Providing Remote Login Access.
Chapter 27: Miscellaneous Servers.
Sign up now »
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTSenior Python Web Applications DeveloperNSW
- FTQuality ManagerSA
- FTSenior Python DeveloperNSW
- FTFlash / ActionScript Developer - ContractNSW
- FTR&D EngineerSA
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTLead Software EngineerSA
- FTSenior Python DeveloperNSW
- FTOS Web Applications DeveloperNSW
Large organizations can no longer rely on preventive security systems, point security tools, manual processes, and hardened configurations to protect them from targeted attacks and advanced malware. Henceforth, security management ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- AusCERT 2013: Users, cats more likely hack culprits than cyber-espionage: Trustwave
- AusCERT 2013: Home-electronics gear’s UPnP as insecure in Australia as rest of world: Metasploit
- AusCERT 2013: Big data skills help beat the bad guys, says HP
- In pictures: AusCERT 2013 Day One
- Blue Coat Systems to acquire security analytics firm Solera Networks