Windows Xp Hacks
A smart collection of insider tips and tricks, Windows XP Hacks, Second Edition covers the XP operating system from start to finish. Among the multitude of topics addressed, this must-have resource includes extensive coverage of hot-button issues such as: security web browsing controlling the control panel removing uninstallable XP components pop-up ads You'll also find timesaving hacks for file distribution; digital media, such as iTunes; and high-visibility web software, services, and exploits that have emerged since the book's last edition. Each hack in the book can be read easily in just a few minutes, saving countless hours of searching for the right answer. Now completely revised and updated to cover Service Pack 2 (SP2), the second edition of this bestseller carefully breaks down the new features that come with SP2, including IE pop-up blocker, Windows Firewall, and the new wireless client. Written by Preston Gralla, the compact and affordable Windows XP Hacks, Second Edition provides direct, hands-on solutions that can be applied to the challenges facing XP beginners, as well as the more experienced power user. Each year, Windows XP is pre-installed on 90 million PCs worldwide, making it the world's most popular operating system.
Windows XP Pro: The Missing Manual
With the release of Windows XP Service Pack 2 (SP2), Microsoft latest and most reliable corporate desktop operating system now provides better protection against viruses, worms, and malicious hackers. SP2 includes Windows Firewall, Pop-up Blocker for Internet Explorer, and the new Windows Security Center. But it still comes without a single page of printed instructions. This superbly written guide fills the gap. Coauthored by David Pogue, New York Times technology columnist and Missing Manuals creator, Windows XP Pro: The Missing Manual uses wit, technical insight, and scrupulous objectivity to light the way for first-time and intermediate network and standalone PC users. In fact, this jargon-free book explains XP's features so clearly revealing which work well and which don't that it should have been in the box in the first place. The book reveals which features work well and which don't, such as the Remote Desktop software that enables people to connect to the office from home, the encryption file system that protects sensitive information, and the Windows Messenger that enables real-time text, voice and video communication. Contents include: Getting started. The book's early chapters cover using menus, finding lost files, reducing window clutter, and taming the new, multi-column Start menu. Mastering the network. Special chapters help you navigate the corporate network, dial in from the road, and even set up your own small-office (peer-to-peer) network, step by step. Understanding security. User accounts, file encryption, and the NTFS file system keep your private files private, while still offering network access to coworkers you specify. Flying the Net. This book demystifies Outlook Express 6 for email, Internet Explorer 6 for Web browsing, and the new Windows Messenger for voice, chat, and video conferencing. Windows XP Pro: The Missing Manual isn't for system administrators or OS theory geeks; it's for the novice or budding power user who wants to master the machine and get down to work. Yet, anyone who uses XP Pro (including hardcore techies) will find this new system much easier-- and more fun--to digest with this new Missing Manual.
Building Clustered Linux Systems
Praise for Building Clustered Linux Systems "The author does an outstanding job of presenting a very complicated subject. I very much commend this work. The author sets the pace and provides vital resources and tips along the way. He also has a very good sense of humor that is crafted in the text in such a way that makes the reading enjoyable just when the subject may demand a break. This book should be a requirement for those that are clustering or considering clustering and especially those considering investing a great deal of financial resource toward that goal." -Joe Brazeal, Information Technician III, Southwest Power Pool "This book is for Beginner and Intermediate level system administrators, engineers, and researchers, who want to learn how to build Linux clusters. The book covers everything very well." -Ibrahim Haddad, Senior Researcher, Ericsson Corporate Unit of Research "Nothing that I know of exists yet that covers this subject in as much depth and detail. The practical 'hands-on' approach of this book on how to build a Linux cluster makes this a very valuable reference for a very popular, highly demanded technology." -George Vish, II, Linux Curriculum Program Manager and Senior Education Consultant, HP "In my opinion there is a significant lack of literature on this subject. Most of the currently available books are either dated or do not address the complete picture of the range of decisions that must go into building a Linux cluster. I feel comfortable recommending this to anyone interested in building a Linux cluster to better understand both the technical aspects of building and designing a Linux cluster, but also the business aspects of the same." -Randall Splinter Ph.D., Senior Solution Architect, HP "The author has set a precedent in the cluster design and integration process that is lacking in the industry today." --Stephen Gray, Senior Applications Engineer, Altair Engineering, Inc. The Practical, Step-by-Step Guide to Building and Running Linux Clusters Low-cost, high-performance Linux clusters are the best solution for an increasingly wide range of technical and business problems. Until now, however, building and managing Linux clusters has required more specialized knowledge than most IT organizations possess. This book dramatically lowers the learning curve, bringing together all the hands-on knowledge and step-by-step techniques you'll need to get the job done. Using practical examples, Robert Lucke simplifies every facet of cluster design and integration: networking, hardware, architecture, operating environments, data sharing, applications, and more. Lucke, who helped prototype and implement one of the world's largest Linux clusters, systematically addresses the key issues you'll encounter and the key decisions you'll have to make. Coverage includes: Basic clustering concepts, hardware components, and architectural models A step-by-step cluster creation process: design, installation, and testing Choosing and implementing the optimal hardware configuration for your environment Life in the fast LAN: high-speed cluster interconnects Software issues: distributions, bootup, disks, partitioning, file systems, middleware, and more
The Definitive Guide to Linux Network Programming
Apress's "The Definitive Guide to Linux Network Programming" is a clear, concise treatment of creating clients and servers under the Linux operating system. The book assumes that the readers knows C and has experience developing code on Linux, but provides everything else a programmer needs for real-world network programming, including design, implementation, debugging, and security. Readers will learn about the many kinds of socket types, sessioned vs. sessionless protocols, how to build a custom protocol, encryption, how to use SSL, and how to tunnel data.
Linux Programming by Example
Written by the best-selling author of 'Unix in a Nutshell', this is an example-driven introduction to the core Linux programming interfaces that every Linux developer needs to master. The examples used are taken from the actual source code to popular GNU Linux programs.
Mastering Perl for Bioinformatics
Historically, programming hasn't been considered a critical skill for biologists. But now, with access to vast amounts of biological data contained in public databases, programming skills are increasingly in strong demand in biology research and development. Perl, with its highly developed capacities in string handling, text processing, networking, and rapid prototyping, has emerged as the programming language of choice for biological data analysis. Mastering Perl for Bioinformatics covers the core Perl language and many of its module extensions, presenting them in the context of biological data and problems of pressing interest to the biological community. This book, along with Beginning Perl for Bioinformatics, forms a basic course in Perl programming. This second volume finishes the basic Perl tutorial material (references, complex data structures, object-oriented programming, use of modules--all presented in a biological context) and presents some advanced topics of considerable interest in bioinformatics. The range of topics covered in Mastering Perl for Bioinformatics prepares the reader for enduring and emerging developments in critical areas of bioinformatics programming such as: Gene finding String alignment Methods of data storage and retrieval (SML and databases) Modeling of networks (graphs and Petri nets) Graphics (Tk) Parallelization Interfacing with other programming languages Statistics (PDL) Protein structure determination Biological models of computation (DNA Computers) Biologists and computer scientists who have conquered the basics of Perl and are ready to move even further in their mastery of this versatile language will appreciate the author's well-balanced approach to applying Perl's analytical abilities to the field of bioinformatics. Full of practical examples and real-world biological problem solving, this book is a must for any reader wanting to move beyond beginner level Perl in bioinformatics.
Implementing Cifs
The focus of this book is the inner workings of CIFS filesharing. Through necessity it will also cover browsing, basic SMB authentication, and NetBIOS LAN emulation over ICP/IP.
Linux Security Cookbook
Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-follow recipes--short, focused pieces of code that administrators can use to improve security and perform common tasks securely. The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax. The book begins with recipes devised to establish a secure system, then moves on to secure day-to-day practices, and concludes with techniques to help your system stay secure. Some of the "recipes" you'll find in this book are: Controlling access to your system from firewalls down to individual services, using iptables, ipchains, xinetd, inetd, and more Monitoring your network with tcpdump, dsniff, netstat, and other tools Protecting network connections with Secure Shell (SSH) and stunnel Safeguarding email sessions with Secure Sockets Layer (SSL) Encrypting files and email messages with GnuPG Probing your own security with password crackers, nmap, and handy scripts This cookbook's proven techniques are derived from hard-won experience. Whether you're responsible for security on a home Linux system or for a large corporation, or somewhere in between, you'll find valuable, to-the-point, practical recipes for dealing with everyday security issues. This book is a system saver.
Essential System Administration
Essential System Administration,3rd Edition is the definitive guide for Unix system administration, covering all the fundamental and essential tasks required to run such divergent Unix systems as AIX, FreeBSD, HP-UX, Linux, Solaris, Tru64 and more. Essential System Administration provides a clear, concise, practical guide to the real-world issues that anyone responsible for a Unix system faces daily. The new edition of this indispensable reference has been fully updated for all the latest operating systems. Even more importantly, it has been extensively revised and expanded to consider the current system administrative topics that administrators need most. Essential System Administration,3rd Edition covers: DHCP, USB devices, the latest automation tools, SNMP and network management, LDAP, PAM, and recent security tools and techniques. Essential System Administration is comprehensive. But what has made this book the guide system administrators turn to over and over again is not just the sheer volume of valuable information it provides, but the clear, useful way the information is presented. It discusses the underlying higher-level concepts, but it also provides the details of the procedures needed to carry them out. It is not organized around the features of the Unix operating system, but around the various facets of a system administrator's job. It describes all the usual administrative tools that Unix provides, but it also shows how to use them intelligently and efficiently. Whether you use a standalone Unix system, routinely provide administrative support for a larger shared system, or just want an understanding of basic administrative functions, Essential System Administration is for you. This comprehensive and invaluable book combines the author's years of practical experience with technical expertise to help you manage Unix systems as productively and painlessly as possible.
Solaris Essential Reference
"Could someone just give me an easy way to look up the sed and awk commands for Solaris?" said one time-pressed computer design engineer. Most Solaris users use it in a professional technical environment. They're looking for the fastest way to find the command they need so they can for example get onto designing the next generation computer chip. The Solaris Essential Reference assumes that the reader is well versed in general UNIX skills and is simply in need of the some pointers on how to get the most out of Solaris. This title provides clear and concise instruction on how to perform important administration and management tasks, as well as how to use some of the more powerful commands and more advanced topics. The scope of the Solaris Essential Reference includes the best way to implement the most frequently used commands, deal with shell scripting, administer your own system, and utilize effective security. Bonus coverage includes information on third-party software packages available for Solaris that are essential to operating a good system. Such applications are pico, pine, top, TCP Wrappers, and a few others.
sed and awk Pocket Reference
For people who create and modify text files, sed and awk are power tools for editing. sed, awk, and regular expressions allow programmers and system administrators to automate editing tasks that need to be performed on one or more files, to simplify the task of performing the same edits on multiple files, and to write conversion programs. The sed & awk Pocket Reference is a companion volume to sed & awk, Second Edition, Unix in a Nutshell, Third Edition, and Effective awk Programming, Third Edition. This new edition has expanded coverage of gawk (GNU awk), and includes sections on: An overview of sed and awk's command line syntax Alphabetical summaries of commands, including nawk and gawk Profiling with pgawk Coprocesses and sockets with gawk Internationalization with gawk A listing of resources for sed and awk users This small book is a handy reference guide to the information presented in the larger volumes. It presents a concise summary of regular expressions and pattern matching, and summaries of sed and awk. Arnold Robbins, an Atlanta native now happily living in Israel, is a professional programmer and technical author and coauthor of various O'Reilly Unix titles. He has been working with Unix systems since 1980, and currently maintains gawk and its documentation.
Tcp/Ip Network Administration
This complete guide to setting up and running a TCP/IP network is essential for network administrators, and invaluable for users of home systems that access the Internet. The book starts with the fundamentals -- what protocols do and how they work, how addresses and routing are used to move data through the network, how to set up your network connection -- and then covers, in detail, everything you need to know to exchange information via the Internet. Included are discussions on advanced routing protocols (RIPv2, OSPF, and BGP) and the gated software package that implements them, a tutorial on configuring important network services -- including DNS, Apache, sendmail, Samba, PPP, and DHCP -- as well as expanded chapters on troubleshooting and security. TCP/IP Network Administration is also a command and syntax reference for important packages such as gated, pppd, named, dhcpd, and sendmail. With coverage that includes Linux, Solaris, BSD, and System V TCP/IP implementations, the third edition contains: Overview of TCP/IP Delivering the data Network services Getting startedM Basic configuration Configuring the interface Configuring routing Configuring DNS Configuring network servers Configuring sendmail Configuring Apache Network security Troubleshooting Appendices include dip, ppd, and chat reference, a gated reference, a dhcpd reference, and a sendmail reference This new edition includes ways of configuring Samba to provide file and print sharing on networks that integrate Unix and Windows, and a new chapter is dedicated to the important task of configuring the Apache web server. Coverage of network security now includes details on OpenSSH, stunnel, gpg, iptables, and the access control mechanism in xinetd. Plus, the book offers updated information about DNS, including details on BIND 8 and BIND 9, the role of classless IP addressing and network prefixes, and the changing role of registrars. Without a doubt, TCP/IP Network Administration, 3rd Edition is a must-have for all network administrators and anyone who deals with a network that transmits data over the Internet.
Learning the Korn Shell
The Korn shell is an interactive command and scripting language for accessing Unix(R) and other computer systems. As a complete and high-level programming language in itself, it's been a favorite since it was developed in the mid 1980s by David G. Korn at AT&T Bell Laboratories. Knowing how to use it is an essential skill for serious Unix users. Learning the Korn Shell shows you how to use the Korn shell as a user interface and as a programming environment. Writing applications is often easier and quicker with Korn than with other high-level languages. Because of this, the Korn shell is the most often used shell in commercial environments and among inexperienced users. There are two other widely used shells, the Bourne shell and the C shell. The Korn shell, or ksh, has the best features of both, plus many new features of its own. ksh can do much to enhance productivity and the quality of a user's work, both in interacting with the system, and in programming. The new version, ksh93, has the functionality of other scripting languages such as awk, icon, Perl, rexx, and tcl. Learning the Korn Shell is the key to gaining control of the Korn shell and becoming adept at using it as an interactive command and scripting language. Prior programming experience is not required in order to understand the chapters on basic shell programming. Readers will learn how to write many applications more easily and quickly than with other high-level languages. In addition, readers will also learn about Unix utilities and the way the Unix operating system works in general. The authors maintain that you shouldn't have to be an internals expert to use and program the shell effectively. The second edition covers all the features of the current version of the Korn shell, including many new features not in earlier versions of ksh93, making it the most up-to-date reference available on the Korn shell. It compares the current version of the Korn shell to several other Bourne-compatible shells, including several Unix emulation environments for MS-DOS and Windows. In addition, it describes how to download and build ksh93 from source code. A solid offering for many years, this newly revised title inherits a long tradition of trust among computer professionals who want to learn or refine an essential skill.
Learning the Unix Operating System
If you are new to Unix, this concise book will tell you just what you need to get started and no more. Unix was one of the first operating systems written in C, a high-level programming language, and its natural portability and low price made it a popular choice among universities. Initially, two main dialects of Unix existed: one produced by AT&T known as System V, and one developed at UC Berkeley and known as BSD. In recent years, many other dialects have been created, including the highly popular Linux operating system and the new Mac OS X (a derivative of BSD). Learning the Unix Operating System is a handy book for someone just starting with Unix or Linux, and it's an ideal primer for Mac and PC users of the Internet who need to know a little about Unix on the systems they visit. The fifth edition is the most effective introduction to Unix in print, covering Internet usage for email, file transfers, web browsing, and many major and minor updates to help the reader navigate the ever-expanding capabilities of the operating system: In response to the popularity of Linux, the book now focuses on the popular bash shell preferred by most Linux users. Since the release of the fourth edition, the Internet and its many functions has become part of most computer user's lives. A new chapter explains how to use ftp, pine for mail, and offers useful knowledge on how to surf the web. Today everyone is concerned about security. With this in mind, the author has included tips throughout the text on security basics, especially in the Internet and networking sections. The book includes a completely updated quick reference card to make it easier for the reader to access the key functions of the command line.
Sams Teach Yourself Microsoft Windows 2000 Server in 24 Hours
Designed specifically for the small network user, and updated to cover the Gold version of MS Windows 2000 Server, this book presents a set of tutorials that instruct readers how to install or upgrade Windows 2000.
Windows Telephony Programming
The author makes TAPI more accessible by revealing its underlying architecture and rationale and by relating its functions and features to specific tasks developers seek to accomplish in their applications such as making, answering, and monitoring calls, handling modem data, and building an answering machine. In addition to carefully developed, intuitive explanations, Windows Telephony Programming features numerous real-world examples of how actual TAPI programs are built, and a comprehensive C++ class library that takes much of the grunt work out of TAPI programming. The author also discusses building a telephony service provider and includes a complete working example. Completely up-to-date, this book covers TAPI versions 1.x to 2.0, and offers a glimpse into the future of telephony with a preview of the new TAPI 3.0 incorporated into Windows NT 5.0. To exploit the power of TAPI 3.0 when it becomes available, it is imperative that you understand TAPI 1.x and 2.0 first. This book provides the clear methodology to gain that understanding.
Exploring Expect
Expect is quickly becoming a part of every UNIX user's toolbox. It allows you to automate Telnet, FTP, passwd, rlogin, and hundreds of other applications that normally require human interaction. Using Expect to automate these applications will allow you to speed up tasks and, in many cases, solve new problems that you never would have even considered before. For example, you can use Expect to test interactive programs with no changes to their interfaces. Or wrap interactive programs with Motif-like front-ends to control applications by buttons, scrollbars, and other graphic elements with no recompilation of the original programs. You don't even need the source code! Expect works with remote applications, too. Use it to tie together Internet applications including Telnet, Archie, FTP, Gopher, and Mosaic. Don Libes is the creator of Expect as well as the author of this book. In Exploring Expect, he provides a comprehensive tutorial on all of Expect's features, allowing you to put it immediately to work on your problems. In a down-to-earth and humorous style, he provides numerous examples of challenging real-world applications and how they can be automated using Expect to save you time and money. Expect is the first of a new breed of programs based on Tcl, the Tool Command Language that is rocking the computer science community. This book provides an introduction to Tcl and describes how Expect applies Tcl's power to the new field of interaction automation. Whether your interest is in Expect or interaction automation or you simply want to learn about Tcl and see how it has been used in real software, you will find Exploring Expect a treasure trove of easy-to-understand and valuable information.