- Shopping Bag ( 0 items )
In the world of Unix operating systems, the various BSDs come with a long heritage of high-quality software and well-designed solutions, making them a favorite OS of a wide range of users. Among budget-minded users who adopted BSD early on to developers of some of today's largest Internet sites, the popularity of BSD systems continues to grow. If you use the BSD operating system, then you know that the secret of its success is not just in its price tag: practical, reliable, extraordinarily stable and flexible, ...
In the world of Unix operating systems, the various BSDs come with a long heritage of high-quality software and well-designed solutions, making them a favorite OS of a wide range of users. Among budget-minded users who adopted BSD early on to developers of some of today's largest Internet sites, the popularity of BSD systems continues to grow. If you use the BSD operating system, then you know that the secret of its success is not just in its price tag: practical, reliable, extraordinarily stable and flexible, BSD also offers plenty of fertile ground for creative, time-saving tweaks and tricks, and yes, even the chance to have some fun.
"Fun?" you ask. Perhaps "fun" wasn't covered in the manual that taught you to install BSD and administer it effectively. But BSD Hacks, the latest in O'Reilly's popular Hacks series, offers a unique set of practical tips, tricks, tools—and even fun—for administrators and power users of BSD systems.
BSD Hacks takes a creative approach to saving time and getting more done, with fewer resources. You'll take advantage of the tools and concepts that make the world's top Unix users more productive. Rather than spending hours with a dry technical document learning what switches go with a command, you'll learn concrete, practical uses for that command.
The book begins with hacks to customize the user environment. You'll learn how to be more productive in the command line, timesaving tips for setting user-defaults, how to automate long commands, and save long sessions for later review. Other hacks in the book are grouped in the following areas:
Chapter 1: Customizing the User Environment
Chapter 2: Dealing with Files and Filesystems
Chapter 3: The Boot and Login Environments
Chapter 4: Backing Up
Chapter 5: Networking Hacks
Chapter 6: Securing the System
Chapter 7: Going Beyond the Basics
Chapter 8: Keeping Up-to-Date
Chapter 9: Grokking BSD
Posted June 6, 2004
Before linux gained prominence, unix hackers often preferred those unixes derived from BSD. These unixes tended to be the most open for you to contribute applications to. So over time, a lot of hackers grew familiar with BSD. This book offers you the fruits of some of that roughly two decades of tinkering. The author has grouped the hacks into a rough order. But, frankly, you may be better served by scanning the contents pages and then following your whims. Perhaps the most useful advice is on the first page, preceding any of the hacks. Namely that you can try many hacks on any other open source operating system. In practice, the only such one you are realistically likely to encounter is a unix/linux variant. But I would go further than what the author says, and make a stronger suggestion to you. Even in a closed, proprietary unix, there is a good likelihood that a hack from this book might work. Maybe not as literally presented. You might have to modify some of the steps. But the upside is that it is a good test of your facility in that operating system and of how well you can follow the text of this book. Thus, the title 'BSD Hacks' is true, but overly conservative to an experienced hacker. So how good are you?Was this review helpful? Yes NoThank you for your feedback. Report this reviewThank you, this review has been flagged.