• Complain

Von Hagen William - Linux Server Hacks, 2: Tips & Tools for Connecting, Monitoring, and Troubleshooting

Here you can read online Von Hagen William - Linux Server Hacks, 2: Tips & Tools for Connecting, Monitoring, and Troubleshooting full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Sebastopol, year: 2009, publisher: OReilly Media, Inc, genre: Computer. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Linux Server Hacks, 2: Tips & Tools for Connecting, Monitoring, and Troubleshooting
  • Author:
  • Publisher:
    OReilly Media, Inc
  • Genre:
  • Year:
    2009
  • City:
    Sebastopol
  • Rating:
    3 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 60
    • 1
    • 2
    • 3
    • 4
    • 5

Linux Server Hacks, 2: Tips & Tools for Connecting, Monitoring, and Troubleshooting: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Linux Server Hacks, 2: Tips & Tools for Connecting, Monitoring, and Troubleshooting" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Linux Server Hacks, Volume Two; Contributors; Acknowledgments; Preface; How to Use This Book; How This Book Is Organized; Conventions Used in This Book; Using Code Examples; How to Contact Us; Safari Enabled; Got a Hack?; 1. Linux Authentication; 1. Disable User Accounts Instantly; 1.2.2. Disabling Accounts on Systems That Use Distributed Authentication; 2. Edit Your Password File for Greater Access Control; 3. Deny All Access in One Second or Less; 4. Customize Authentication with PAMs; 1.5.2. Per-Application/Service PAM Configuration Files; 1.5.3. PAMs Used by the login Process.;This handy reference offers 100 completely new server management tips and techniques designed to improve your productivity and sharpen your administrative skills. Each hack represents a clever way to accomplish a specific task, saving you countless hours of searching for the right answer. And you dont have to be a system administrator with hundreds of boxen to get something useful from this book as many of the hacks apply equally well to a single system or a home network. Whether they help you recover lost data, collect information from distributed clients, or synchronize administrative envir.

Von Hagen William: author's other books


Who wrote Linux Server Hacks, 2: Tips & Tools for Connecting, Monitoring, and Troubleshooting? Find out the surname, the name of the author of the book and a list of all author's works by series.

Linux Server Hacks, 2: Tips & Tools for Connecting, Monitoring, and Troubleshooting — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Linux Server Hacks, 2: Tips & Tools for Connecting, Monitoring, and Troubleshooting" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Linux Server Hacks, Volume Two
William von Hagen
Brian K. Jones
Editor
David Brickner

Copyright 2009 O'Reilly Media, Inc.

OReilly Media SPECIAL OFFER Upgrade this ebook with OReilly for more - photo 1

O'Reilly Media

SPECIAL OFFER: Upgrade this ebook with OReilly

for more information on this offer!

Please note that upgrade offers are not available from sample content.

Credits
About the Authors

Bill von Hagen has been a Unix system administrator for 20 years and a Linux fanatic since 1993. He has also worked as a systems programmer, product manager, writer, application developer, drummer, and content manager.

Bill has written or cowritten books on such topics as Linux filesystems, SUSE Linux, Red Hat Linux, GCC, SGML, Mac OS X, Linux system administration, and hacking the TiVo. He has written numerous articles on Linux, Unix, and open source topics for publications including Linux Magazine, Linux Journal, Linux Format , and Mac Format . An avid computer collector specializing in workstations, he owns more than 200 computer systems and wants more. You can reach him at .

Brian K. Jones (Jonesy) has been a Unix and Linux system and network administrator for six years. He has also held positions and consulted in the capacity of database administrator, web developer, project manager, instructional speaker, technical writer and editor, and studio musician, for clients large and small.

In the past, Brian has written extensively on topics revolving around Linux and open source software for Linux.com, Newsforge , and Linux Magazine , and he has served as author and Editor-in-Chief of php|architect magazine. In his copious free time (right), Brian enjoys playing billiards and guitar, woodworking, and writing code. He has worked as a system and network administrator for the computer science department at Princeton University since 2001, and as a part-time infrastructure computing consultant since 2000. You can reach him at .

Contributors

The following people contributed their writing, code, and inspiration to Linux Server Hacks, Volume Two :

  • Jon Fox [ ) is a Linux user and free software advocate. He's been using Linux since 1996.

  • Tom Limoncelli has over 15 years of system administration experience and has been teaching workshops on time management at conferences since 2003. Tom has authored Time Management for System Administrators (O'Reilly) and The Practice of System and Network Administration (Addison Wesley). Outside of work, Tom has won awards for his activism in gay/bi/lesbian rights and now helps progressive causes to use technology to further their goals.

  • Lance Tost has been a Linux user since the 0.98 kernel days, while he earned his B.S. in Computer Science. He has held programming, DBA, and, Unix administration positions. Lance is a Red Hat Certified Engineer as well as a Solaris Certified System Administrator. Lance contributed [ ].

  • Brian Warshawsky is an enthusiastic proponent of all things Linux and open source. His main interests include security, wireless networking, and finding new applications for the Linux operating system. By day he is a professional Unix/Linux system administrator, and by night he's a technical writer and avid mountain biker. He lives in Virginia with his soon-to-be wife Jennifer, his loyal dog Max, and his much less loyal cat Jackie. Brian contributed [ ].

  • David Brickner is not a Linux server administrator, but as a Gentoo user, he has learned a couple of things about compiling software. David believes Linux will be the dominant desktop operating system in the near future, and to encourage its adoption, he has written Test Driving Linux and Linux Desktop Pocket Guide , both from O'Reilly.

Acknowledgments

Bill : For my wife, Dorothy Fisher, without whom life wouldn't be anywhere near as good or as much fun, and for Mike Bauer, Bill Gaussa, and Larry Weidman, who gave me many professional opportunities and encouraged me to expand my horizons. I'd also like to thank David Brickner, without whom I never would have finished this book (well, at least not this year) and for the opportunity to write for O'Reilly in general. Without David's suggestions, comments, and general support, this would be a lesser book.

Finally, no book having to do with GNU/Linux would be complete without thanking Richard Stallman, Linus Torvalds, and the open source community in general. I'd also like to thank my coauthor, Brian Jones, for making this book better than it would have been without him.

Brian : For my wife, Natasha, who has supported and encouraged me in all of my ambitions and goals, and has dealt with my nonsense while in pursuit of said ambitions and goals. Also for my siblings: Heather, for forcing me to pursue computing as a career; Jessica, for being almost sickeningly positive and encouraging; Jon, for keeping me on my toes; and Russell, without whom I might've self-destructed long ago.

A hearty thanks goes to David Brickner, who offered me the opportunity to write for O'Reilly, and whose even keel, firm hand, and sheer diligence have made this a wonderful experience. I'd also like to thank all the folks at OSTG, TriLUG, and php|architect, for being friends of mine; Matt Appio, for making me take occasional fishing breaks; and my coworkers at Princeton, for teaching me far more than I could ever list here.

To Linus Torvalds and the rest of the open source community: thank you so much for all your work.

Preface

Both authors of this book have been system administrators for a while. When the opportunity to write this book came about, we initially focused on cool hacks we'd developed or used in our server and system administration careers. We also asked friends, who asked their friends, and we were therefore able to get some great contributions from others to augment the things that we'd come up with. Everybody has problems they like to solve. Bill likes distributed authentication, undeleting and recovering files, and tweaking filesystems in general. Brian likes making admin tasks more efficient, reliable, and repeatable; has a bucketload of cool scripts to do various tasks; and loves getting and using data from remote sources. And every sysadmin has favorite techniques for solving problems, so Hack is to Hacker as Cool Tip or Technique is to Server or System Administrator. Sysadmin hacks are essentially clever ways of approaching whatever problem you're trying to solve, whether it's figuring out how to recover lost data, trying to collect information from distributed clients in one place so that you can easily see the big picture or anything else that comes up.

As we worked on this book, thinking about cool server and sysadmin hacks mutated into thinking about general tips and tricks that we found useful to simplify our lives as system administrators. We also noticed that there weren't really any books available along the lines of "Things We Wish Previous System Administrators Had Told Us." Leaving aside obvious questions like "where is the key to the RAID array" and "what was the root password on ," we decided to "hack the Hacks series" a bit and incorporate some general sysadmin information, tips, and tricks as another of this book's primary themes. This means that we provide a bit more background material than you ordinarily see in Hacks books. You're not going to hurt our feelings if you skip over things you already know, but we hope that all the material will be found useful by some of our readers. We could have used it years ago, and as Mr. Rogers used to say, "It's nice to share."

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Linux Server Hacks, 2: Tips & Tools for Connecting, Monitoring, and Troubleshooting»

Look at similar books to Linux Server Hacks, 2: Tips & Tools for Connecting, Monitoring, and Troubleshooting. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Linux Server Hacks, 2: Tips & Tools for Connecting, Monitoring, and Troubleshooting»

Discussion, reviews of the book Linux Server Hacks, 2: Tips & Tools for Connecting, Monitoring, and Troubleshooting and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.