Books & Videos

Table of Contents

  1. Chapter 1 Customizing the User Environment

    1. Introduction

    2. Get the Most Out of the Default Shell

    3. Useful tcsh Shell Configuration File Options

    4. Create Shell Bindings

    5. Use Terminal and X Bindings

    6. Use the Mouse at a Terminal

    7. Get Your Daily Dose of Trivia

    8. Lock the Screen

    9. Create a Trash Directory

    10. Customize User Configurations

    11. Maintain Your Environment on Multiple Systems

    12. Use an Interactive Shell

    13. Use Multiple Screens on One Terminal

  2. Chapter 2 Dealing with Files and Filesystems

    1. Introduction

    2. Find Things

    3. Get the Most Out of grep

    4. Manipulate Files with sed

    5. Format Text at the Command Line

    6. Delimiter Dilemma

    7. DOS Floppy Manipulation

    8. Access Windows Shares Without a Server

    9. Deal with Disk Hogs

    10. Manage Temporary Files and Swap Space

    11. Recreate a Directory Structure Using mtree

    12. Ghosting Systems

  3. Chapter 3 The Boot and Login Environments

    1. Introduction

    2. Customize the Default Boot Menu

    3. Protect the Boot Process

    4. Run a Headless System

    5. Log a Headless Server Remotely

    6. Remove the Terminal Login Banner

    7. Protecting Passwords With Blowfish Hashes

    8. Monitor Password Policy Compliance

    9. Create an Effective, Reusable Password Policy

    10. Automate Memorable Password Generation

    11. Use One Time Passwords

    12. Restrict Logins

  4. Chapter 4 Backing Up

    1. Introduction

    2. Back Up FreeBSD with SMBFS

    3. Create Portable POSIX Archives

    4. Interactive Copy

    5. Secure Backups Over a Network

    6. Automate Remote Backups

    7. Automate Data Dumps for PostgreSQL Databases

    8. Perform Client-Server Cross-Platform Backups with Bacula

  5. Chapter 5 Networking Hacks

    1. Introduction

    2. See Console Messages Over a Remote Login

    3. Spoof a MAC Address

    4. Use Multiple Wireless NIC Configurations

    5. Survive Catastrophic Internet Loss

    6. Humanize tcpdump Output

    7. Understand DNS Records and Tools

    8. Send and Receive Email Without a Mail Client

    9. Why Do I Need sendmail?

    10. Hold Email for Later Delivery

    11. Get the Most Out of FTP

    12. Distributed Command Execution

    13. Interactive Remote Administration

  6. Chapter 6 Securing the System

    1. Introduction

    2. Strip the Kernel

    3. FreeBSD Access Control Lists

    4. Protect Files with Flags

    5. Tighten Security with Mandatory Access Control

    6. Use mtree as a Built-in Tripwire

    7. Intrusion Detection with Snort, ACID, MySQL, and FreeBSD

    8. Encrypt Your Hard Disk

    9. Sudo Gotchas

    10. sudoscript

    11. Restrict an SSH server

    12. Script IP Filter Rulesets

    13. Secure a Wireless Network Using PF

    14. Automatically Generate Firewall Rules

    15. Automate Security Patches

    16. Scan a Network of Windows Computers for Viruses

  7. Chapter 7 Going Beyond the Basics

    1. Introduction

    2. Tune FreeBSD for Different Applications

    3. Traffic Shaping on FreeBSD

    4. Create an Emergency Repair Kit

    5. Use the FreeBSD Recovery Process

    6. Use the GNU Debugger to Analyze a Buffer Overflow

    7. Consolidate Web Server Logs

    8. Script User Interaction

    9. Create a Trade Show Demo

  8. Chapter 8 Keeping Up-to-Date

    1. Introduction

    2. Automated Install

    3. FreeBSD from Scratch

    4. Safely Merge Changes to /etc

    5. Automate Updates

    6. Create a Package Repository

    7. Build a Port Without the Ports Tree

    8. Keep Ports Up-to-Date with CTM

    9. Navigate the Ports System

    10. Downgrade a Port

    11. Create Your Own Startup Scripts

    12. Automate NetBSD Package Builds

    13. Easily Install Unix Applications on Mac OS X

  9. Chapter 9 Grokking BSD

    1. Introduction

    2. How'd He Know That?

    3. Create Your Own Manpages

    4. Get the Most Out of Manpages

    5. Apply, Understand, and Create Patches

    6. Display Hardware Information

    7. Determine Who Is on the System

    8. Spelling Bee

    9. Leave on Time

    10. Run Native Java Applications

    11. Rotate Your Signature

    12. Useful One-Liners

    13. Fun with X