did-you-know? rent-now

Rent More, Save More! Use code: ECRENTAL

did-you-know? rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9780201734201

Multi-Tool Linux : Practical Uses for Open Source Software

by ; ; ;
  • ISBN13:

    9780201734201

  • ISBN10:

    0201734206

  • Edition: 1st
  • Format: Paperback
  • Copyright: 2002-05-01
  • Publisher: Addison-Wesley Professional
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $39.99

Summary

This unique, practical resource delivers specific Linux-based open source solutions to dozens of today's most common computing and business challenges. Each modular chapter covers all you need to know to solve a specific set of problems -- with extensive examples, and detailed guidance on acquiring and running the Linux-based open source software you'll need. Multitool Linux begins by reviewing the skills and mindset you need to make the most of Linux and open source software. The authors present comprehensive coverage of Linux as a solution for networking problems, covering remote control applications, routing, virtual private networks, file and print services for Windows clients, email, Web services, and more. The book covers a wide range of Linux-based security solutions, including secure logins, file transfers, email security, and encryption. The book also includes a full section on multimedia, ranging from video production to CD burning, 3D graphics to image processing. Each chapter includes pointers to URLs with the latest versions of every open source package covered in the book. For all Linux users and developers who want to use Linux to solve a wider variety of problems.

Table of Contents

Preface xxv
You've Been Hoodwinked! xxv
Why You Want This Book xxvi
How This Book Is Organized xxvii
Why You Might Not Want This Book xxvii
Introduction
1(26)
Linux as a Tool
1(2)
Defining Free
3(5)
Free Means Different Things to Different People
3(1)
Free Means Different Things in Different Licenses
4(1)
The IANAL Declaration
4(1)
The GPL
4(1)
The LGPL
5(1)
The BSD Licenses
6(1)
The Artistic License
6(1)
Public Domain
6(1)
Other Licenses
7(1)
The Great Schism
7(1)
Richard Stallman
7(1)
Eric Raymond and Bruce Perens
7(1)
What's a Pagan Boy to Do?
8(1)
Get Comfortable with Source Code
8(17)
Compiling Software
10(1)
Imakefiles
11(1)
Basic Makefiles
11(1)
Autoconf
12(1)
How to Roll Your Own Kernel
13(1)
The /etc/lilo.conf File
13(2)
Running LILO
15(1)
The /boot Directory (Maybe)
15(1)
Welcome to /usr/src/linux
16(2)
Friendly Kernel Configuration (menuconfig, xconfig)
18(2)
Building the New Kernel
20(1)
Installing the New Kernel
21(1)
Booting the New Kernel
22(1)
Yikes! Or Booting the Old Kernel
23(1)
Finding Source
24(1)
Source Is Good!
24(1)
Requirements
25(2)
Knowledge
25(1)
Hardware
25(1)
Software
26(1)
Web Sites
26(1)
Remote-Control Your Computer from Anywhere, Anytime, and Any Operating System, Even OS/2!
27(18)
When X Doesn't Cut It
27(4)
X Basics
31(1)
Enter VNC
32(13)
XVNC-The Best of Both Worlds
34(3)
Using VNC with Linux
37(8)
Run a Whole Network with One IP Address
45(14)
Preamble
46(1)
What the Heck Is IP Masquerading?
46(1)
NAT vs. IP Masquerade
47(1)
Stand-Alone Masqing Boxes
47(1)
The Modem-Connect IPMasq'd Network
47(1)
The Router-Connect IPMasq'd Network
48(1)
Kernel Configuration
49(2)
IPChains
51(3)
IPChains Rulesets
51(2)
Secure IPChains Rules
53(1)
Blocking Specific Ports
54(1)
Port Forwarding
54(2)
Actually Getting PORTFW Installed in the Kernel
55(1)
Compiling ipmasqadm
56(1)
Forwarding HTTP Traffic
56(1)
Rogue Spear Games
56(1)
Kernel 2.4 and IPMASQ
57(1)
Hardware Firewall / NAT Boxes
58(1)
Summary
58(1)
Soup Cans and String: Last-Ditch Communications Methods
59(26)
Problem 1: Parallel Line Internet Protocol (PLIP) Networking
60(14)
Parallel Port Basics
61(1)
The Four Kinds of Parallel Ports
61(2)
Two-Way Printer Port Cables
63(1)
Compiling the Linux Kernel to Support PLIP
64(1)
Changes Needed for PLIP
64(2)
Installing the New Kernel
66(3)
Setting Up the PLIP Tunnel
69(1)
Server-Side Setup
70(1)
Client-Side Interface
71(1)
Setting Up NAT (aka IP Masquerade)
71(1)
Server-Side Setup
72(2)
Client-Side Setup
74(1)
Problem 2: Non-IP Dialup (getty)
74(10)
The Whys
76(1)
The Hows
76(1)
The /etc/inittab File
77(4)
Setting Up a getty
81(1)
agetty
81(1)
mgetty
82(2)
Conclusion
84(1)
Samba: Talking to Windows Networks
85(28)
What Is SMB?
86(3)
Setting Up Samba as a Client
89(1)
Discovering the Local Network
90(1)
Looking Up Machines with nmblookup
90(1)
Listing Shares
91(1)
Accessing Shares with smbclient
92(1)
Accessing Shares with smbsh and smbfs
93(2)
Accessing Shared Printers with smbprint
95(1)
Graphical Clients
96(3)
Replacing Those Workstations
99(2)
Let's Get Practical
101(1)
The Other Side of the Coin: Samba as a Server
102(9)
Per-Share Options
104(1)
smbpasswd
105(1)
Becoming a Server in an Existing Domain
105(1)
Windows 2000 Issues
106(1)
SWAT
106(1)
Caveats
107(4)
Summary
111(1)
References
111(2)
More about NetBIOS and SMB/CIFS
111(1)
Samba
111(1)
TkSmb
111(1)
xSMBrowser
111(1)
SMB2WWW
112(1)
Ghostscript
112(1)
Undernets
113(20)
The Needs
114(1)
The Answer
114(1)
The Structure
114(1)
Individual Empowerment
115(3)
Create the Group
116(1)
Change Group Ownership of the Web Directories
117(1)
Add Group Read and Write Permission to the Files
117(1)
Add setgid on the Web Directories (Optional)
117(1)
The Maintenance
118(13)
CVS Basics
120(1)
Core Concepts
120(1)
The Repository
120(1)
CVS Commands
121(2)
Resolving Conflicts
123(5)
And Now, Back to Our Story
128(3)
The Outcome
131(1)
Summary/URLs/Bibliography
132(1)
E-Mail as a System Console
133(24)
Introduction
133(2)
My Disconnected System
134(1)
Getting Connected
134(1)
Locking It Down
135(1)
The Project
135(1)
The Disclaimer
135(1)
Understanding E-Mail
136(1)
Fetchmail
137(2)
Fetchmail Configuration
137(1)
crontab
138(1)
Procmail
139(1)
Recipes
140(7)
The Script
142(5)
Gluing It All Together
147(1)
Securing Everything
147(7)
Using GnuPG to Handle Authorizations
147(1)
Using GnuPG to Encrypt the Results
148(1)
Putting It All Together
148(6)
Summary
154(3)
Build a Secure Web-Mail Service Supporting IMAP and SSL
157(22)
System Preparation
159(1)
Building the IMAP Server
159(2)
Configuring the SSL Libraries
161(1)
Building a Secure Web Server That Supports PHP4
161(4)
Installing Aeromail
165(1)
Testing the Server
166(5)
Using Aeromail
171(5)
Other Web-Mail Packages
176(1)
SquirrelMail
176(1)
IMP
176(1)
PIMP
176(1)
TWIG
176(1)
Resources
177(2)
PHP
177(1)
Apache
177(1)
SSL
177(1)
Sendmail
178(1)
Extending Apache
179(16)
Module Basics
180(2)
So What Do Modules Do?
181(1)
The Apache API
182(3)
The Request Structure
182(1)
Resource Pools
183(1)
Commonly Used Functions
183(2)
Remote Monitoring
185(8)
Writing the Code
186(3)
Compiling it
189(2)
The Big Moment
191(2)
Summary
193(1)
References
193(2)
Apache
193(2)
Secure Your E-Mail with GPG
195(20)
Introduction
195(1)
Cryptographic Basics
196(2)
Generating Keys
198(4)
Using GPG to Sign and Encrypt Files
202(9)
Signing Files
203(3)
Encrypting and Signing Files
206(4)
Encryption without Signature: A Codicil
210(1)
Integrating GPG with Popular E-Mail Clients
211(2)
Elm
211(1)
Mutt
211(1)
Pine
212(1)
Kmail
212(1)
Mailx and Mail
213(1)
Netscape
213(1)
Summary
213(2)
Sniffing for Idiots (Pun Intended)
215(16)
You Want Me to What?
215(2)
Troubleshooting
217(1)
Offense
217(1)
Defense
217(1)
Tools
218(10)
Sniffit
218(1)
Dsniff
218(2)
Required Packages
220(1)
Dsniff Compilation
221(2)
Supersniffer
223(1)
TCPDump
224(1)
Ethereal
225(1)
Compiling Ethereal
225(1)
Floppy Linux (MuLinux), the Sniffing Station
226(2)
Countermeasures
228(1)
Antisniff
228(1)
Depth in Defense
229(1)
Summary
229(2)
All Along the Watchtower
231(18)
Introduction
232(1)
A Model of Network Attacks
232(2)
Types of Attack
232(1)
Phases of Network-Based Attacks
232(1)
Reconnaissance
232(1)
Compromise
233(1)
Obfuscation
234(1)
Entrenchment
234(1)
Prints and Fibers
234(1)
Tripwire
235(13)
What Is It?
235(1)
How Does It Work?
235(4)
A (Very) Brief History of Tripwire
239
The Painful Details
236(1)
The /etc/tripwire/tw.config file
236(3)
Database Setup
239(2)
Database Maintenance
241(1)
Running Tripwire
241(5)
Tripwire Forensics
246(2)
Summary
248(1)
All Along the Watchtower, Part Deux
249(18)
Introduction
250(1)
Packet Monitoring, Logging, and Triggering
250(1)
Writing Snort Rules
251(9)
The Rule Header
251(1)
Action
252(1)
Protocol
252(1)
SourceAddress, sourcePort, destAddress, destPort
253(1)
Direction
254(1)
Rule Options
254(6)
Attack Profiles
260(1)
The Rules of the Game-The Snort Rules Library
260(1)
The Unbearable Lightness of False Positives
261(1)
Defending Your Home
262(2)
Running Snort
263(1)
Why You Should Know How to Do It Yourself
264(1)
What We Didn't Cover
265(1)
Summary
266(1)
References
266(1)
Snort
266(1)
Secure Connectivity
267(26)
Secure Shell(SSH)
268(5)
File Transfer
270(1)
X11 Forwarding
271(2)
Telecommute through Aggressive Firewalls with SSH and Tunneling
273(1)
Beyond Login and File Transfer: SSH as Virtual Private Network
274(5)
The .ssh/config File
274(5)
Getting Out
279(4)
Step 1: Find Yourself an OpenSSH Server Outside
280(1)
Step 2: Check the Server Configuration
280(1)
Step 3: Check the Client Configuration
280(1)
Step 4: Secure Access to the Server Box
280(1)
Step 5: Secure Tunnel to an Insecure Service
281(1)
One Section That Will Pay for the Book
281(2)
Getting In
283(2)
Step 1: Find a Server Outside
283(1)
Step 2: Check the Server Configuration
283(1)
Step 3: Check the Client Configuration
283(1)
Step 4: Make the Connection from the Inside
283(1)
Step 5: Make the Connection from the Outside
284(1)
The Only Tunnel You Will Ever Need
284(1)
Maniacally Restrictive Firewalls
285(1)
Alternate Authentication Methods
285(2)
Nonrouting Networks
287(4)
What Is an HTTP Proxy?
287(1)
Obscures Internal Network Details
288(1)
Deflects Some Browser-Based Attacks
288(1)
Site Blocking
288(1)
Employee Watching
288(1)
Tunneling
288(1)
The httptunnel Package
289(1)
Introduction
289(1)
Server-Side Setup(HTS)
289(1)
Client-Side Setup (HTC)
289(2)
Tunnels within Tunnels: SSH over httptunnel
291(1)
Truly Terrifying Tunneling
291(1)
Summary
291(2)
Tools You Should Know
293(14)
Introduction
293(1)
Regular Expressions
294(1)
Pipes and Redirection
294(1)
Files and More
294(4)
Vi
295(1)
Sed
295(1)
Dd
295(1)
Diff
295(1)
Od
296(1)
Ispell
296(1)
Tar
296(1)
G[un]zip
296(1)
B[un]zip2
296(1)
CVS
296(1)
Cut
297(1)
More
297(1)
Perl
297(1)
File
297(1)
Strings
298(1)
Shells and Such
298(1)
Bash
298(1)
Sudo
298(1)
SSH
298(1)
Pidof
298(1)
Which
299(1)
Finding Stuff
299(1)
Grep
299(1)
Find
299(1)
Lsof
299(1)
Nslookup
300(1)
Nmap
300(1)
Wget
300(1)
Getting Help
300(1)
Man
300(1)
Info
301(1)
You've Got Spam
301(1)
Fetchmail
301(1)
Mailx
301(1)
Elm
301(1)
Mutt
301(1)
Tin
302(1)
Noteworthy GUI tools
302(1)
KDE and GNOME
302(1)
Blackbox
302(1)
The GIMP
303(1)
Dia
303(1)
XMMS
303(1)
xv
303(1)
MuLinux
303(1)
Web Sites You Shouldn't Live Without
304(2)
www.linux.com
304(1)
www.linuxdoc.org
304(1)
www.freshmeat.net
304(1)
www.sourceforge.net
305(1)
www.slashdot.org
305(1)
www.lwn.net
305(1)
www.google.com
305(1)
www.lokigames.com and www.linuxgames.com
305(1)
www.jabber.org
305(1)
Summary
306(1)
Use Your Palm-Connected Organizer
307(26)
Introduction
308(1)
The Handspring Visor: A Brief Digression
308(1)
Pilot-link
309(8)
Pilot-xfer
309(3)
Backup
312(1)
Sync
313(2)
Restore
315(2)
Pilot-manager
317(3)
Kpilot
320(6)
Jpilot
326(4)
Malsync
330(1)
Things That Don't Work
331(2)
Necessary Evils: Running MS Windows Programs
333(14)
Getting Wine
334(1)
Your wine.conf
335(4)
AOL's AIM Client
339(2)
Solitaire via Wine
341(1)
MS Word 97 via Wine
342(1)
Stars!
343(2)
Total Annihilation, Wine, and Other DirectX Games
345(1)
Network Applications
345(1)
Serial- and Parallel-Port Support
345(1)
Summary
346(1)
Remote CD Burning
347(18)
Getting Linux to Grok Your IDE Burner
348(4)
mkisofs, cdda2wav, cdrecord
352(1)
Making the iso Image (or How I Learned to Master My Data)
353(2)
Finding Your CD-R/CD-RW Drive
355(1)
Blanking a CD-RW
355(3)
Burning Data to a CD-R/CD-RW
358(1)
Verifying the Freshly Burned CD-R/CD-RW
359(1)
Duplicating Data CDs from the Command Line
359(1)
Using a GUI
359(2)
Duplicating Data CDs with X-CD-Roast
361(2)
Using X-CD-Roast to Verify the Freshly Burned CD-R/CD-RW
363(1)
Burning Audio CDs
363(1)
Making Bootable CDs
363(1)
80-min/700MB CDs
363(1)
Summary
363(2)
Audio Processing
365(34)
Types of Digital Audio
366(4)
RAW Format
368(1)
WAV Format
368(1)
MP3 (MPEG Layer 3) Format
368(1)
Ogg Vorbis Format
369(1)
Preparing Your System for Audio Work
370(1)
Input Gain, Output Volume, and Clipping
370(2)
Creating Audio Files from CDs
372(2)
Recording Your Own Audio
374(1)
Cut and Paste
375(2)
Sound Effects and Filtering
377(3)
Volume Adjustment
377(1)
Frequency Filtering: High-Pass, Low-Pass, Band-Pass ``Graphic Equalizer''
378(2)
Sound Effects: Chorus, Delay, Echo, Reverb, Stereo Offset
380(1)
Converting between File Formats
380(2)
Writing Your Own Audio CDs
382(2)
Saving Your Old Vinyl
384(11)
Preparation
385(1)
Cleaning
385(1)
System (Space, Tools, etc.)
386(1)
Audio System
386(1)
Recording
387(1)
Software
387(2)
Cleaning Up
389(1)
Removing Clicks, Pops, and Hiss
389(1)
Trimming
390(3)
Preserving Your Work
393(1)
Audio CD Creation
393(1)
MP3 File Creation
394(1)
Summary
395(1)
References
396(3)
cdparanoia
396(1)
SOX (SOund eXchange)
396(1)
bladeenc
396(1)
LAME (Lame Ain't an MP3 Encoder)
396(1)
Ogg Vorbis
396(1)
FreeAmp
396(1)
cdrdao
397(1)
cdrecord
397(2)
Music Production
399(22)
Introduction
400(1)
What Is MIDI?
400(1)
Computer Hardware
401(1)
MIDI Sequencing
402(1)
Making It Work
403(2)
Recording
405(1)
Musical Notation
406(1)
Software Synthesis
406(1)
Drum Machines
407(1)
Trackers
408(2)
Loop-Based Sequencers
410(2)
Multitrack Hard Disk Recorders
412(1)
Playing Your Masterpiece
413(1)
XMMS: The Cross-Platform Multimedia (MP3s, too) Player
414(3)
Increase Your Technogeek Appeal: Text-Only Commands!
417(1)
Real-World Problems
418(1)
Script That Bad Mamma Jamma
418(2)
Summary
420(1)
Speech Synthesis
421(16)
Analyzing Speech Synthesis
422(3)
Tokenization
422(1)
Phrasing and Intonation
423(1)
Phonetics
424(1)
Waveform Generation
425(1)
Speech Synthesis Packages
425(3)
Rsynth
425(1)
Festival
426(2)
My Computer's First Word Was ``Linux!''-Some Examples
428(8)
Check Your Internet Mail at Login
428(3)
The Lazy Man's File Browser
431(5)
Summary
436(1)
References
436(1)
Linux Access HOWTO
436(1)
RSynth
436(1)
Festival
436(1)
Image Processing
437(20)
Types of Image Formats
438(7)
Raster vs. Vector
438(1)
What about Compression?
439(1)
Color Palettes
439(1)
A Smorgasbord: GIF, JPEG, PNG, TIFF, XPM, Etc.
440(3)
The Future: MNG and JPEG2000
443(1)
Which Image Format Is Right?
444(1)
Image-Processing Utilities
445(1)
The GIMP
445(1)
ImageMagick
445(1)
Creating Images
446(2)
Scanners
446(1)
Digital Cameras
447(1)
Image Retouching
448(6)
Cropping
448(2)
Brightness, Contrast, and Tone
450(2)
Color Adjustment
452(1)
Halftone Images
453(1)
Summary
454(1)
References
454(3)
Burn All GIFs
454(1)
PNG and MNG Specifications
454(1)
JPEG and JPEG2000 Specifications and Documents
455(1)
The GIMP
455(1)
ImageMagick
455(1)
xscanimage and SANE
455(1)
GPhoto
455(2)
3D Graphics Production
457(24)
Introduction
457(1)
The Basics
458(5)
Raster Vector Painting
458(1)
Ray Tracing
458(1)
Front-Ends
459(1)
Modelers
460(1)
Animation
461(1)
3D Game Engines
462(1)
Introduction to PovRay
463(2)
Getting Our Feet Wet
463(2)
Special Effects
465(4)
Colors, Textures, and More
465(1)
Lighting
466(2)
Camera Positioning
468(1)
The 2D Logo
469(2)
The 3D Logo
471(2)
Getting Fancy
473(2)
More Tools
475(1)
Crystal Space
476(1)
MindsEye
476(1)
Blender
476(1)
Summary
476(1)
Testimonial
477(4)
Video Production
481(26)
Introduction
482(1)
Video4Linux
482(1)
The Formats
483(1)
The Video Hardware
483(2)
Frame Grabbers
484(1)
Video Cameras
484(1)
Webcams
484(1)
Your System
485(1)
The Video Software
485(3)
Drivers
486(1)
Capture and Playback Tools
487(1)
Nonlinear Editing Tools
488(1)
Making Your Video
488(9)
The Gopher
488(1)
The Story, Script, Screenplay, Whatever!
489(1)
The Storyboard
489(1)
Lights, Camcorder, Action!
490(1)
Your Studio Setup
491(1)
Capture Your Video
492(1)
Editing Clips
493(2)
Timeline
495(1)
Transitions
495(1)
Voice-Overs and Music
496(1)
Titles
496(1)
Final Rendering
496(1)
Commercial Music
497(1)
Video Playback
497(1)
XMMS
498(1)
qt-2.2.2
498(1)
SDL
499(1)
avifile-0.53.2
499(2)
AVI-XMMS-1.2.1
501(1)
Adding MPEG Support
501(1)
smpeg
501(1)
smpeg-XMMS
502(1)
RealPlayer
502(1)
Quicktime Movies
502(1)
Screenshots!
502(2)
Publishing
504(1)
Videotape
504(1)
Creating a Video CD for Your VCD/DVD Player
504(1)
TechTV
505(1)
Summary
505(2)
Afterword
507(4)
About the Authors 511(6)
Michael Schwarz
511(1)
Jeremy Anderson
512(2)
Peter Curtis
514(2)
Steven Murphy
516(1)
Index 517

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program