Linux Server Hacks, Volume Two

Linux Server Hacks, Volume Two PDF Author: William von Hagen
Publisher: "O'Reilly Media, Inc."
ISBN: 0596553277
Category : Computers
Languages : en
Pages : 482

Get Book Here

Book Description
Today's system administrators deal with a vast number of situations, operating systems, software packages, and problems. Those who are in the know have kept their copy of Linux Server Hacks close at hand to ease their burden. And while this helps, it's not enough: any sys admin knows there are many more hacks, cool tips, and ways of solving problems than can fit in a single volume (one that mere mortals can lift, that is). Which is why we created Linux Server Hacks, Volume Two, a second collection of incredibly useful tips and tricks for finding and using dozens of open source tools you can apply to solve your sys admin problems. The power and flexibility of Linux and Open Source means that there is an astounding amount of great software out there waiting to be applied to your sys admin problems -- if only you knew about it and had enough information to get started. Hence, Linux Server Hacks, Volume Two. This handy reference offers 100 completely new server management tips and techniques designed to improve your productivity and sharpen your administrative skills. Each hack represents a clever way to accomplish a specific task, saving you countless hours of searching for the right answer. No more sifting through man pages, HOWTO websites, or source code comments -- the only resource you need is right here. And you don't have to be a system administrator with hundreds of boxen to get something useful from this book as many of the hacks apply equally well to a single system or a home network. Compiled by experts, these hacks not only give you the step-by-step instructions necessary to implement the software, but they also provide the context to truly enable you to learn the technology. Topics include: Authentication Remote GUI connectivity Storage management File sharing and synchronizing resources Security/lockdown instruction Log files and monitoring Troubleshooting System rescue, recovery, and repair Whether they help you recover lost data, collect information from distributed clients, or synchronize administrative environments, the solutions found in Linux Server Hacks, Volume Two will simplify your life as a system administrator.

Linux Server Hacks, Volume Two

Linux Server Hacks, Volume Two PDF Author: William von Hagen
Publisher: "O'Reilly Media, Inc."
ISBN: 0596553277
Category : Computers
Languages : en
Pages : 482

Get Book Here

Book Description
Today's system administrators deal with a vast number of situations, operating systems, software packages, and problems. Those who are in the know have kept their copy of Linux Server Hacks close at hand to ease their burden. And while this helps, it's not enough: any sys admin knows there are many more hacks, cool tips, and ways of solving problems than can fit in a single volume (one that mere mortals can lift, that is). Which is why we created Linux Server Hacks, Volume Two, a second collection of incredibly useful tips and tricks for finding and using dozens of open source tools you can apply to solve your sys admin problems. The power and flexibility of Linux and Open Source means that there is an astounding amount of great software out there waiting to be applied to your sys admin problems -- if only you knew about it and had enough information to get started. Hence, Linux Server Hacks, Volume Two. This handy reference offers 100 completely new server management tips and techniques designed to improve your productivity and sharpen your administrative skills. Each hack represents a clever way to accomplish a specific task, saving you countless hours of searching for the right answer. No more sifting through man pages, HOWTO websites, or source code comments -- the only resource you need is right here. And you don't have to be a system administrator with hundreds of boxen to get something useful from this book as many of the hacks apply equally well to a single system or a home network. Compiled by experts, these hacks not only give you the step-by-step instructions necessary to implement the software, but they also provide the context to truly enable you to learn the technology. Topics include: Authentication Remote GUI connectivity Storage management File sharing and synchronizing resources Security/lockdown instruction Log files and monitoring Troubleshooting System rescue, recovery, and repair Whether they help you recover lost data, collect information from distributed clients, or synchronize administrative environments, the solutions found in Linux Server Hacks, Volume Two will simplify your life as a system administrator.

Linux Server Hacks

Linux Server Hacks PDF Author: Rob Flickenger
Publisher: "O'Reilly Media, Inc."
ISBN: 0596004613
Category : Computers
Languages : en
Pages : 240

Get Book Here

Book Description
This unique and valuable collection of tips, tools, and scripts provides direct, hands-on solutions that can be used by anyone running a network of Linux servers.

Linux Server Security

Linux Server Security PDF Author: Chris Binnie
Publisher: John Wiley & Sons
ISBN: 1119277655
Category : Computers
Languages : en
Pages : 144

Get Book Here

Book Description
Learn how to attack and defend the world’s most popular web server platform Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server deployment this book provides the insight of experience along with highly practical instruction. The topics range from the theory of past, current, and future attacks, to the mitigation of a variety of online attacks, all the way to empowering you to perform numerous malicious attacks yourself (in the hope that you will learn how to defend against them). By increasing your understanding of a hacker’s tools and mindset you're less likely to be confronted by the all-too-common reality faced by many admins these days: someone else has control of your systems. Master hacking tools and launch sophisticated attacks: perform SQL injections, deploy multiple server exploits and crack complex passwords. Defend systems and networks: make your servers invisible, be confident of your security with penetration testing and repel unwelcome attackers. Increase your background knowledge of attacks on systems and networks and improve all-important practical skills required to secure any Linux server. The techniques presented apply to almost all Linux distributions including the many Debian and Red Hat derivatives and some other Unix-type systems. Further your career with this intriguing, deeply insightful, must-have technical book. Diverse, broadly-applicable and hands-on practical, Linux Server Security: Hack and Defend is an essential resource which will sit proudly on any techie's bookshelf.

Linux Multimedia Hacks

Linux Multimedia Hacks PDF Author: Kyle Rankin
Publisher: "O'Reilly Media, Inc."
ISBN: 0596100760
Category : Computers
Languages : en
Pages : 330

Get Book Here

Book Description
Presents Linux's multimedia tools with step-by-step instructions to maximize entertainment capabilities for images, audio, and video.

DevOps Troubleshooting

DevOps Troubleshooting PDF Author: Kyle Rankin
Publisher: Addison-Wesley
ISBN: 0133035506
Category : Computers
Languages : en
Pages : 387

Get Book Here

Book Description
“If you’re a developer trying to figure out why your application is not responding at 3 am, you need this book! This is now my go-to book when diagnosing production issues. It has saved me hours in troubleshooting complicated operations problems.” –Trotter Cashion, cofounder, Mashion DevOps can help developers, QAs, and admins work together to solve Linux server problems far more rapidly, significantly improving IT performance, availability, and efficiency. To gain these benefits, however, team members need common troubleshooting skills and practices. In DevOps Troubleshooting: Linux Server Best Practices, award-winning Linux expert Kyle Rankin brings together all the standardized, repeatable techniques your team needs to stop finger-pointing, collaborate effectively, and quickly solve virtually any Linux server problem. Rankin walks you through using DevOps techniques to troubleshoot everything from boot failures and corrupt disks to lost email and downed websites. You’ll master indispensable skills for diagnosing high-load systems and network problems in production environments. Rankin shows how to Master DevOps’ approach to troubleshooting and proven Linux server problem-solving principles Diagnose slow servers and applications by identifying CPU, RAM, and Disk I/O bottlenecks Understand healthy boots, so you can identify failure points and fix them Solve full or corrupt disk issues that prevent disk writes Track down the sources of network problems Troubleshoot DNS, email, and other network services Isolate and diagnose Apache and Nginx Web server failures and slowdowns Solve problems with MySQL and Postgres database servers and queries Identify hardware failures–even notoriously elusive intermittent failures

Ubuntu Hacks

Ubuntu Hacks PDF Author: Jonathan Oxer
Publisher: "O'Reilly Media, Inc."
ISBN: 0596551460
Category : Computers
Languages : en
Pages : 450

Get Book Here

Book Description
Ubuntu Linux--the most popular Linux distribution on the planet--preserves the spirit embodied in the ancient African word ubuntu, which means both "humanity to others" and "I am what I am because of who we all are." Ubuntu won the Linux Journal Reader's Choice Award for best Linux distribution and is consistently the top-ranked Linux variant on DistroWatch.com. The reason this distribution is so widely popular is that Ubuntu is designed to be useful, usable, customizable, and always available for free worldwide. Ubuntu Hacks is your one-stop source for all of the community knowledge you need to get the most out of Ubuntu: a collection of 100 tips and tools to help new and experienced Linux users install, configure, and customize Ubuntu. With this set of hacks, you can get Ubuntu Linux working exactly the way you need it to. Learn how to: Install and test-drive Ubuntu Linux. Keep your system running smoothly Turn Ubuntu into a multimedia powerhouse: rip and burn discs, watch videos, listen to music, and more Take Ubuntu on the road with Wi-Fi wireless networking, Bluetooth, etc. Hook up multiple displays and enable your video card's 3-D acceleration Run Ubuntu with virtualization technology such as Xen and VMware Tighten your system's security Set up an Ubuntu-powered server Ubuntu Hacks will not only show you how to get everything working just right, you will also have a great time doing it as you explore the powerful features lurking within Ubuntu. "Put in a nutshell, this book is a collection of around 100 tips and tricks which the authors choose to call hacks, which explain how to accomplish various tasks in Ubuntu Linux. The so called hacks range from down right ordinary to the other end of the spectrum of doing specialised things...More over, each and every tip in this book has been tested by the authors on the latest version of Ubuntu (Dapper Drake) and is guaranteed to work. In writing this book, it is clear that the authors have put in a lot of hard work in covering all facets of configuring this popular Linux distribution which makes this book a worth while buy." -- Ravi Kumar, Slashdot.org

Linux Basics for Hackers

Linux Basics for Hackers PDF Author: OccupyTheWeb
Publisher: No Starch Press
ISBN: 1593278551
Category : Computers
Languages : en
Pages : 249

Get Book Here

Book Description
This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers. If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment. First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: - Cover your tracks by changing your network information and manipulating the rsyslog logging utility - Write a tool to scan for network connections, and connect and listen to wireless networks - Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email - Write a bash script to scan open ports for potential targets - Use and abuse services like MySQL, Apache web server, and OpenSSH - Build your own hacking tools, such as a remote video spy camera and a password cracker Hacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?

Building Secure Servers with Linux

Building Secure Servers with Linux PDF Author: Michael D. Bauer
Publisher: "O'Reilly Media, Inc."
ISBN: 9780596002176
Category : Computers
Languages : en
Pages : 440

Get Book Here

Book Description
Linux consistently turns up high in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services like DNS and routing mail. But security is uppermost on the mind of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. As the cost of broadband and other high-speed Internet connectivity has gone down, and its availability has increased, more Linux users are providing or considering providing Internet services such as HTTP, Anonymous FTP, etc., to the world at large. At the same time, some important, powerful, and popular Open Source tools have emerged and rapidly matured--some of which rival expensive commercial equivalents--making Linux a particularly appropriate platform for providing secure Internet services. Building Secure Servers with Linux will help you master the principles of reliable system and network security by combining practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--as a hub offering services to an organization or the larger Internet--and shows readers how to harden their hosts against attacks. Author Mick Bauer, a security consultant, network architect, and lead author of the popular Paranoid Penguin column in Linux Journal, carefully outlines the security risks, defines precautions that can minimize those risks, and offers recipes for robust security. The book does not cover firewalls, but covers the more common situation where an organization protects its hub using other systems as firewalls, often proprietary firewalls. The book includes: Precise directions for securing common services, including the Web, mail, DNS, and file transfer. Ancillary tasks, such as hardening Linux, using SSH and certificates for tunneling, and using iptables for firewalling. Basic installation of intrusion detection tools. Writing for Linux users with little security expertise, the author explains security concepts and techniques in clear language, beginning with the fundamentals. Building Secure Servers with Linux provides a unique balance of "big picture" principles that transcend specific software packages and version numbers, and very clear procedures on securing some of those software packages. An all-inclusive resource for Linux users who wish to harden their systems, the book covers general security as well as key services such as DNS, the Apache Web server, mail, file transfer, and secure shell. With this book in hand, you'll have everything you need to ensure robust security of your Linux system.

Linux Server Hacks Volume Ii: Tips & Tools For Connecting, Monitoring, And Troubleshooting

Linux Server Hacks Volume Ii: Tips & Tools For Connecting, Monitoring, And Troubleshooting PDF Author: Bill Von Hagen
Publisher:
ISBN: 9788184040517
Category :
Languages : en
Pages : 2490

Get Book Here

Book Description
Linux Server Hacks 2 covers a wide variety of topics like replication, emulation, authentication, print management, and file sharing. Essential security and lockdown instructions are included for SELinux and firewall users. Coverage of advanced system administration hacks are included for topics such as request tracking, web mail, and shared calendars. While it's an ideal follow-up to Linux Server Hacks, this book is a valuable asset all on its own.

Raspberry Pi Hacks

Raspberry Pi Hacks PDF Author: Ruth Suehle
Publisher: "O'Reilly Media, Inc."
ISBN: 1449362338
Category : Computers
Languages : en
Pages : 392

Get Book Here

Book Description
With more than 60 practical and creative hacks, this book helps you turn Raspberry Pi into the centerpiece of some cool electronics projects. Want to create a controller for a camera or a robot? Set up Linux distributions for media centers or PBX phone systems? That’s just the beginning of what you’ll find inside Raspberry Pi Hacks. If you’re looking to build either a software or hardware project with more computing power than Arduino alone can provide, Raspberry Pi is just the ticket. And the hacks in this book will give you lots of great ideas. Use configuration hacks to get more out of your Pi Build your own web server or remote print server Take the Pi outdoors to monitor your garden or control holiday lights Connect with SETI or construct an awesome Halloween costume Hack the Pi’s Linux OS to support more complex projects Decode audio/video formats or make your own music player Achieve a low-weight payload for aerial photography Build a Pi computer cluster or a solar-powered lab