×

Uh-oh, it looks like your Internet Explorer is out of date.

For a better shopping experience, please upgrade now.

BSD Hacks
  • Alternative view 1 of BSD Hacks
  • Alternative view 2 of BSD Hacks
     

BSD Hacks

4.5 2
by Dru Lavigne
 

See All Formats & Editions

In the world of Unix operating systems, the various BSDs come with a long heritage of high-quality software and well-designed solutions, making them a favorite OS of a wide range of users. Among budget-minded users who adopted BSD early on to developers of some of today's largest Internet sites, the popularity of BSD systems continues to grow. If you use the BSD

Overview

In the world of Unix operating systems, the various BSDs come with a long heritage of high-quality software and well-designed solutions, making them a favorite OS of a wide range of users. Among budget-minded users who adopted BSD early on to developers of some of today's largest Internet sites, the popularity of BSD systems continues to grow. If you use the BSD operating system, then you know that the secret of its success is not just in its price tag: practical, reliable, extraordinarily stable and flexible, BSD also offers plenty of fertile ground for creative, time-saving tweaks and tricks, and yes, even the chance to have some fun."Fun?" you ask. Perhaps "fun" wasn't covered in the manual that taught you to install BSD and administer it effectively. But BSD Hacks, the latest in O'Reilly's popular Hacks series, offers a unique set of practical tips, tricks, tools—and even fun—for administrators and power users of BSD systems.BSD Hacks takes a creative approach to saving time and getting more done, with fewer resources. You'll take advantage of the tools and concepts that make the world's top Unix users more productive. Rather than spending hours with a dry technical document learning what switches go with a command, you'll learn concrete, practical uses for that command.The book begins with hacks to customize the user environment. You'll learn how to be more productive in the command line, timesaving tips for setting user-defaults, how to automate long commands, and save long sessions for later review. Other hacks in the book are grouped in the following areas:

  • Customizing the User Environment
  • Dealing with Files and Filesystems
  • The Boot and Login Environments
  • Backing Up
  • Networking Hacks
  • Securing the System
  • Going Beyond the Basics
  • Keeping Up-to-Date
  • Grokking BSD
If you want more than your average BSD user—you want to explore and experiment, unearth shortcuts, create useful tools, and come up with fun things to try on your own—BSD Hacks is a must-have. This book will turn regular users into power users and system administrators into super system administrators.

Product Details

ISBN-13:
9780596006792
Publisher:
O'Reilly Media, Incorporated
Publication date:
05/17/2004
Edition description:
First Edition
Pages:
450
Sales rank:
948,110
Product dimensions:
5.92(w) x 8.92(h) x 0.99(d)

Related Subjects

Meet the Author

Dru is an instructor at Marketbridge Technologies in Ottawa and the maintainer of the Open Protocol Resource. In her non-existent spare time, you can find her shooting Remic's Rapids or cycling through Gatineau Park.

Customer Reviews

Average Review:

Post to your social network

     

Most Helpful Customer Reviews

See all customer reviews

BSD Hacks 4.5 out of 5 based on 0 ratings. 2 reviews.
Anonymous More than 1 year ago
Sits at her counter in hot pink bathingsuit
Guest More than 1 year ago
Before linux gained prominence, unix hackers often preferred those unixes derived from BSD. These unixes tended to be the most open for you to contribute applications to. So over time, a lot of hackers grew familiar with BSD. This book offers you the fruits of some of that roughly two decades of tinkering. The author has grouped the hacks into a rough order. But, frankly, you may be better served by scanning the contents pages and then following your whims. Perhaps the most useful advice is on the first page, preceding any of the hacks. Namely that you can try many hacks on any other open source operating system. In practice, the only such one you are realistically likely to encounter is a unix/linux variant. But I would go further than what the author says, and make a stronger suggestion to you. Even in a closed, proprietary unix, there is a good likelihood that a hack from this book might work. Maybe not as literally presented. You might have to modify some of the steps. But the upside is that it is a good test of your facility in that operating system and of how well you can follow the text of this book. Thus, the title 'BSD Hacks' is true, but overly conservative to an experienced hacker. So how good are you?