The Ubuntu Distribution Simplifies Linux by Providing a Sensible

The Ubuntu Distribution Simplifies Linux by Providing a Sensible

Ubuntu Hacks By Bill Childers, Jonathan Oxer, Kyle Rankin ............................................... Publisher: O'Reilly Pub Date: June 2006 Print ISBN-10: 0-596-52720-9 Print ISBN-13: 978-0-59-652720-4 Pages: 447 Table of Contents | Index The Ubuntu distribution simplifies Linux by providing a sensible collection of applications, an easy- to-use package manager, and lots of fine-tuning, which make it possibly the best Linux for desktops and laptops. Readers of both Linux Journal and TUX Magazine confirmed this by voting Ubuntu as the best Linux distribution in each publication's 2005 Readers Choice Awards. None of that simplification, however, makes Ubuntu any less fun if you're a hacker or a power user. Like all books in the "Hacks" series, Ubuntu Hacks includes 100 quick tips and tricks for all users of all technical levels. Beginners will appreciate the installation advice and tips on getting the most out of the free applications packaged with Ubuntu, while intermediate and advanced readers will learn the ins-and-outs of power management, wireless roaming, 3D video acceleration, server configuration, and much more. Ubuntu Hacks By Bill Childers, Jonathan Oxer, Kyle Rankin ............................................... Publisher: O'Reilly Pub Date: June 2006 Print ISBN-10: 0-596-52720-9 Print ISBN-13: 978-0-59-652720-4 Pages: 447 Table of Contents | Index Copyright credits Credits Preface Chapter 1. Getting Started Hack 1. Test-Drive Ubuntu Hack 2. Get Help Hack 3. Make Live CD Data Persistent Hack 4. Customize the Ubuntu Live CD Hack 5. Install Ubuntu Hack 6. Dual-Boot Ubuntu and Windows Hack 7. Move Your Windows Data to Ubuntu Hack 8. Install Ubuntu on a Mac Hack 9. Set Up Your Printer Hack 10. Install Ubuntu on an External Drive Hack 11. Install from a Network Boot Server Hack 12. Submit a Bug Report Hack 13. Use the Command Line Hack 14. Get Productive with Applications Chapter 2. The Linux Desktop Hack 15. Get Under the Hood of the GNOME Desktop Hack 16. Tweak the KDE Desktop Hack 17. Switch to a Lighter Window Manager Hack 18. Install Java Hack 19. Search Your Computer Hack 20. Access Remote Filesystems Hack 21. Tweak Your Desktop Like a Pro Hack 22. Sync Your Palm PDA Hack 23. Sync Your Pocket PC Hack 24. Customize the Right-Click Contextual Menu Hack 25. Download and Share Files with the Best P2P Software Hack 26. Make Your Own PDFs Hack 27. Blog with Ubuntu Chapter 3. Multimedia Hack 28. Install Multimedia Plug-ins Hack 29. Watch Videos Hack 30. Play DVDs Hack 31. Buy Songs at the iTunes Music Store Hack 32. Get a Grip on CD Ripping Hack 33. Burn CDs and DVDs Hack 34. Automate Audio CD Burning Hack 35. Rip and Encode DVDs Hack 36. Create a Video DVD Hack 37. Connect to a Digital Camera Chapter 4. Mobile Ubuntu Hack 38. Put Your Laptop to Sleep Hack 39. Hibernate Your Laptop Hack 40. Prolong Your Battery Life Hack 41. Get Proprietary Wireless Cards Working Hack 42. Roam Wirelessly Hack 43. Make Laptop Settings Roam with Your Network Hack 44. Make Bluetooth Connections Hack 45. Expand Your Laptop Hack 46. Hotswap Your Laptop's Optical Drive Chapter 5. X11 Hack 47. Configure Multibutton Mice Hack 48. Enable Your Multimedia Keyboard Hack 49. Configure a Touchpad Hack 50. Connect Multiple Displays Hack 51. Change the Ubuntu Splash Screen Hack 52. Enable 3-D Video Acceleration Hack 53. Make Your Fonts Pretty Chapter 6. Package Management Hack 54. Manage Packages from the Command Line Hack 55. Manage Packages with Synaptic Hack 56. Manage Packages with Adept Hack 57. Install and Remove Standalone .deb Files Hack 58. Search for Packages from the Command Line Hack 59. Install Software from Source Hack 60. Modify the List of Package Repositories Hack 61. Cache Packages Locally with Apt-cacher Hack 62. Create an Ubuntu Package Hack 63. Compile a Source Package Hack 64. Convert Non-Ubuntu Packages Hack 65. Create Your Own Package Repository Hack 66. Convert Debian to Ubuntu Chapter 7. Security Hack 67. Limit Permissions with sudo Hack 68. Manage Security Updates Hack 69. Protect Your Network with a Firewall Hack 70. Use an Encrypted Filesystem to Protect Your Data Hack 71. Encrypt Your Email and Important Files Hack 72. Surf the Web Anonymously Hack 73. Keep Windows Malware off Your System Chapter 8. Administration Hack 74. Edit Configuration Files Hack 75. Manage Users and Groups Hack 76. Mount Any Filesystem Hack 77. Control Startup Services Hack 78. Build Kernels the Ubuntu Way Hack 79. Back Up Your System Hack 80. Clone an Installation Hack 81. Rescue an Unbootable System Hack 82. Check the Captain's Log Hack 83. Mount Removable Devices with Persistent Names Hack 84. Mount Remote Directories Securely and Easily Hack 85. Make Videos of Your Tech-Support Questions Hack 86. Synchronize Files Across Machines Chapter 9. Virtualization and Emulation Hack 87. Run Windows Applications Hack 88. Play Windows Games Hack 89. Run Ubuntu Inside Windows Hack 90. Use Xen to Host Virtual Machines Hack 91. Create an Ubuntu/Xen Virtual Machine Hack 92. Split Your Machine's Personality Chapter 10. Small Office/Home Office Server Hack 93. Install and Configure an Ubuntu Server Hack 94. Build a File Server Hack 95. Administer Your Server Remotely Hack 96. Build a Web Server Hack 97. Build an Email Server Hack 98. Build a Caching Proxy Server Hack 99. Build a DHCP Server Hack 100. Build a Domain Name Server Colophon Index Copyright © 2006 O'Reilly Media, Inc. All rights reserved. Printed in the United States of America. Published by O'Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O'Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or [email protected]. Nutshell Handbook, the Nutshell Handbook logo, and the O'Reilly logo are registered trademarks of O'Reilly Media, Inc. The Hacks series designations, Ubuntu Hacks, the image of a tuning fork, and related trade dress are trademarks of O'Reilly Media, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O'Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. While every precaution has been taken in the preparation of this book, the publisher and authors assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. Small print: The technologies discussed in this publication, the limitations on these technologies that technology and content owners seek to impose, and the laws actually limiting the use of these technologies are constantly changing. Thus, some of the hacks described in this publication may not work, may cause unintended harm to systems on which they are used, or may not be consistent with applicable user agreements. Your use of these hacks is at your own risk, and O'Reilly Media, Inc. disclaims responsibility for any damage or expense resulting from their use. In any event, you should take care that your use of these hacks does not violate any applicable laws, including copyright laws. Credits About the Authors Jonathan Oxer (http://jon.oxer.com.au/) is president of Linux Australia, the national organization for Linux users and developers. He is the author of "How To Build A Website And Stay Sane" (http://www.stay-sane.com), writes regularly for The Age and Sydney Morning Herald newspapers, and his articles have been translated into French, Brazilian Portuguese, Italian, Norwegian, and Spanish and have appeared in dozens of publications. In 1994, he founded one of the first businesses in the world to specialize in dynamic web sites and online content management, and in 1995 he became one of the first people to ever do real-time event coverage via the Internet when a live feed was run from the floor of the Bicycle Industry Trade Show in Sydney, Australia. His company, Internet Vision Technologies (http://www.ivt.com.au), has since developed web sites, intranets, extranets, and custom web applications for clients ranging from backyard businesses to multinational corporations. Jonathan has been a Debian developer since 2002 and has convened the Debian Miniconf in a different city every year since 2003. He has presented dozens of tutorials, papers, and keynotes on various technology and business topics at both corporate and government seminars; at conferences, including LinuxTag, linux.conf.au, Open Source Developers Conference, and Debian Miniconf; and at user groups, including Melbourne PHP User Group and Linux Users Victoria. He sits on the Advisory Group of Swinburne University's Centre for Collaborative Business Innovation, which is responsible for researching and formulating IT-related, post-graduate curriculum strategies, and on the Australian Federal government's e-Research Coordinating Committee Reference Group. He lives in Melbourne, Australia with his wife, daughter, and son. Kyle Rankin is a system administrator for QuinStreet, Inc., the current president of the North Bay Linux Users Group, and the author of Knoppix Hacks, Knoppix Pocket Reference, and Linux Multimedia Hacks (all from O'Reilly). Kyle has been using Linux in one form or another since early 1998. In his free time, he either writes or does pretty much the same thing he does at work: works with Linux. Bill Childers is Director of Enterprise Systems for Quinstreet, Inc. He's been working with Linux and Unix since before it was cool, and previously worked for Sun Microsystems and Set Engineering.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    530 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us