Customer Reviews for

Linux Server Hacks, Volume Two: Tips & Tools for Connecting, Monitoring, and Troubleshooting

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously
Sort by: Showing 1 Customer Reviews
Page 1 of 1
  • Anonymous

    Posted September 12, 2006

    VERY VERY HIGHLY RECOMMENDED!!

    Are you a system administrator? If you are, then this book is for you! Authors Bill Von Hagen and Brian K Jones, have done an outstanding job of writing volume two of a book that focuses on cool hacks they developed or used in their server and system administration careers. Von Hagen and Jones, begin by exploring the authentication options that are available to you in heterogeneous networked computing environments and simplify administering user accounts and passwords. Then, the authors explore ways of connecting to remote systems. Next, the authors explain how to set up central servers that do things like synchronize the time on all the systems in your environment, deliver IP addresses to newly connected hosts, and integrate these services with existing ones. The authors then present a variety of cool sysadmin tips and techniques that they¿ve accumulated over the years, including how to keep processes running without writing a daemon or staying logged in, how to use PXE to netboot Linux, how to share information with fellow sysadmins in a centralized fashion, how to get the most out of classic but incredibly useful terminal-oriented applications, and so on. They continue to explore some cool ways of making it easier for you to manage storage, deploy new systems, do backups of today¿s huge disks, and even reduce the need for some of the restore requests that occasionally clog every sysadmin¿s inbox. Then, the authors provide some tips and tricks for managing distributed storage and making sure the administrative environments on your servers are synchronized. They then discuss a wide range of security tools and techniques that can help you sleep at night and protect your systems at the same time. Next, they provide techniques for optimizing system performance, whether by figuring out who¿s hogging the entire CPU and shooting down that user¿s network sessions or by using cool knobs in the /proc filesystem to tweak system performance or using journaling filesystems to minimize system restart time. Then, they include hacks that enable you to centralize log information in a variety of ways, be warned when problems arise, and get the most out of system status information, whether it¿s log information, internal disk controller status data, or remote hardware status information that you can collect via SNMP. Finally, the authors show you how to boot crippled systems so that you can diagnose problems, repair munged filesystems, and even recover deleted files of data that was stored on disks that have gone belly up. This most excellent book has presented hacks that are techniques that the authors have used at various times. More importantly, they view these techniques as time- and hassle-savers that are usually downright fun and cool.

    Was this review helpful? Yes  No   Report this review
Sort by: Showing 1 Customer Reviews
Page 1 of 1