- Shopping Bag ( 0 items )
Ships from: Fort Worth, TX
Usually ships in 1-2 business days
Ships from: fallbrook, CA
Usually ships in 1-2 business days
Part I: Making the Desktop Work for You.
Technique 1: Finding the Power in KDE Protocols.
Technique 2: Getting GNOME Virtual File Systems to Do the Work for You.
Technique 3: Streamlining Your Work with FileAssociations.
Technique 4: Prompting Yourself with a Custom Prompt.
Technique 5: Getting There Quick with Dynamic Shortcuts.
Technique 6: Using cd Shortcuts for Rapid Transit.
Technique 7: Typing Less and Doing More with Handy Automagic Variables.
Technique 8: Logging In, Logging Out.
Technique 9: Making History (Work for You).
Technique 10: Keeping Your Life Simple with Aliases and Functions.
Part II: Getting the Most from Your File System.
Technique 11: Sharing Files and Printers in a Windows World.
Technique 12: Finding What You Need.
Technique 13: Moving Made Easy with Archives.
Technique 14: Downloading and Uploading Files in a Snap.
Technique 15: Building a Playpen with User ModeLinux.
Part III: Good Housekeeping with Linux.
Technique 16: Red-lining RPM Queries.
Technique 17: Installing Made Easy with RPM.
Technique 18: Getting Comfortable with RPM.
Technique 19: Keeping Up-to-Date with apt and Synaptic.
Technique 20: Setting Up Automatic Services.
Technique 21: Making Your Inner System Administrator Happy (And Productive).
Technique 22: Spring Cleaning Essentials.
Part IV: Tweaking the Kernel on Your Linux System.
Technique 23: Taking Good Care of Your Kernel.
Technique 24: Creating a Custom Kernel.
Technique 25: Coping with the SELinux Security System.
Technique 26: Finding Out about Your System with /proc.
Part V: Securing Your Workspace.
Technique 27: Closing Those Prying Eyes.
Technique 28: Using Encryption for Extra Security.
Technique 29: Securing a Large Network with Custom Authentication.
Technique 30: Customizing Authentication with PAM.
Technique 31: Gaining Privileges.
Technique 32: sudo Pseudonyms.
Technique 33: Securing Your Connections with SSH.
Part VI: Networking Like a Professional.
Technique 34: Protecting Yourself with a Firewall.
Technique 35: Using VNC to Connect to Remote Desktops.
Technique 36: Streamlining Your Network Surveillance.
Technique 37: Evaluating Your Network Security with Nessus.
Technique 38: Person-to-Person Networking with IRC.
Part VII: Monitoring Your System.
Technique 39: Controlling Troublesome Processes at the Command Line.
Technique 40: Taking Care of New (And Old) Users.
Technique 41: Keeping an Eye on Your System.
Part VIII: Serving Up the Internet and More.
Technique 42: Keeping an Apache Server in Top Form.
Technique 43: Keeping an Eye on Your Servers.
Technique 44: Making a MySQL Server Your SQL Server.
Technique 45: Safeguarding Your Apache Server with SSL Certificates.
Technique 46: Retrieving HTTPMail Using hotway and Evolution.
Technique 47: Stopping Spam with Spam Assassin.
Technique 48: Using Webmin to Simplify Sendmail Configuration.
Part IX: Backing Up Means Never Having to Say You’re Sorry.
Technique 49: Getting Ready to Back Up Your Data.
Technique 50: Backing Up Your Data.
Technique 51: Quick Backup to Remote Storage.
Technique 52: Archiving Changes with CVS.
Part X: Programming Tricks.
Technique 53: Using Open-Source APIs to Save Time.
Technique 54: Timesaving PHP Tricks.
Technique 55: Using the DDD Graphical Debugger with Perl.
Part XI: The Scary (Or Fun!) Stuff.
Technique 56: Burning CD-Rs without Getting Burned.
Technique 57: Search and Destroy setuid and setgid Programs.
Technique 58: Quarantining Suspicious Programs with UML.
Technique 59: Troubleshooting Persnickety Programs.
Technique 60: Securing the Fort with Bastille.
Technique 61: Creating a Second Line of Defense with LIDS.
Technique 62: Getting Graphical with Shell Scripts.
When you type a typical URL, such as google.com/ index.html, into your Web browser, you likely don't think about how you're making use of it. That is, you don't think about being a protocol, google.com being an address that the protocol handler knows how to deal with, and index.html identifying a resource at that address.
If you haven't thought about URLs and their individual parts for a while, you may be surprised to find out that KDE adds a number of new protocol handlers, called KIO slaves, that know how to serve up data from new and unusual sources, such as CDs and remote systems, through the Konqueror Web browser.
Using the right protocol saves you the time of manually copying resources all over the Web. The protocols are a varied bunch. In this technique, we show you protocols that work with audio CDs or your digital camera, handle remote file management, manage printers and e-mail, and read documentation. Check them out - you can save time in lots of ways.
Discovering Your Protocols
Finding out about KDE protocols is not an easy task. They aren't well documented, and they can be tough to find. Some are universally helpful, whereas others are more specialized (such as the LinPoch project at linpoch.sourceforge.net, which lets you interact with Nokia cell phones from KDE applications). Here's how to see what protocols are installed on the following versions of Linux:
The Available IO Slaves column displays a list of available protocols. For more information about a protocol, click the protocol name, and the documentation is displayed in the right column.
Some of the protocols are not documented. If you find one that sounds interesting, search the Web to see if someone has written about it.
Depending on which version of KDE you have and which options are installed, the protocols you find will vary.
Working with CD Audio Tracks Using audiocd:
Linux gives you all sorts of ways to rip the tracks off audio CDs, but we haven't found anything easier than KDE's audiocd: protocol. This protocol is a breeze to use:
1. Insert a music CD into your drive.
If your CD player program starts, just close it.
2. Open the Konqueror Web Browser.
3. When Konqueror opens, enter audiocd:/ in the Location bar and press Enter.
If your copy of KDE was compiled with audiocd: support, the Web browser displays options for ripping the audio files, as shown in Figure 1-1.
(See the preceding section to find out how to view a list of available protocols.) See Table 1-1 for details on what the options do and how they work.
Not all copies of KDE are created equal. The copy of KDE currently distributed with Fedora includes support for copying to .wav, .cda, and .ogg files, but it doesn't include the information to create MP3s. You can get a copy of KDE that has MP3 compiled in at kde.org.
Depending on your MP3 player, you may be able to save lots of time loading files. If your player can emulate a hard drive, you can open it with Konqueror and drag your music on and off the player.
Managing Snapshots with the camera: Protocol
The camera: protocol treats your digital camera like it's just another storage device, only this one is full of pictures. camera: gives you thumbnail previews of the photos on your camera, so you can easily identify and move your images to where you need them. Just drag the images to your desktop (or to another folder). Double-click an image file to open it with your favorite editor (see Technique 3 to find out how to choose an editor), and you're working in a snap.
You can also use an image as your desktop wallpaper. Drag the thumbnail to the desktop and choose Set as Wallpaper from the menu that appears.
To use the camera: protocol, follow these steps:
1. Plug in your digital camera and be sure it's turned on.
2. Open the Konqueror Web Browser.
3. Type camera:/ in the address line and press Enter.
That's all there is to it (see Figure 1-2).
From here, finding your way around the inside of your camera is just a matter of exploring.
When we plug in our HP PhotoSmart 320 digital camera and use the camera: protocol, we see the single directory HP PhotoSmart 320 (PTP mode). Underneath the HP PhotoSmart 320 folder, our pictures are in a subdirectory named store_00010001/DCIM/100HP320. The directory structure used by your digital camera is likely to be different. Use Konqueror to find your way around the inside of your camera. After you know where your images are stored, you should be able to open those images directly from KDE-friendly applications like KuickShow and KView.
Don't bother trying to remember a long, complex URL that corresponds to where your pictures are stored. Instead, drag the folder to your desktop and choose Link Here. Then, whenever you want to play with your camera, plug it in and click the shortcut.
One thing to note - your pictures reside only in your camera until you copy them onto your computer. Be sure to store the pictures on your computer before deleting them from your camera. After you copy the pictures you want to keep, it's easy to erase the images from your camera; just delete them or drag them to the trash like any other file.
Remote File Management with fish:
fish: is a remote file access protocol. Using fish:, you can work with files stored on a remote Linux system as if they were located right on your desktop. To use fish:, open a KDE browser (Konqueror is a good choice) and enter fish:// followed by the host name (or IP address) of the machine you're fishing for.
Under the hood, fish: uses SSH (Secure Shell) to do its work, so you must have an SSH server up and running on the remote machine before you can go fishing. fish: prompts you for a user name and password on the remote system before allowing you access to files. After you've connected, you can interact with the remote files and directories in the same way you would deal with local files: Drag them to your desktop, drag them to other folders, drag them to the trash, or just edit them in place.
Here are some quick things you can do with the fish: protocol:
The KDE protocols are a part of KDE, not Linux. That means that any KDE-friendly application (Kate, Konqueror, KMail, and so on) can use them, but non-KDE applications won't understand them. You can open a fish: URL in just about any KDE application, and the resource appears as if it were on your local system. Note that not all KDE applications are protocol-enabled, which means that they won't understand fish: URLs. You'll just have to try out each application.
Getting Help with help:, info:, and man:
KDE protocols give you fast access to help when you need it. KDE sports three documentation protocols: man:, info:, and help:. To use the protocols, open your Konqueror browser, enter the protocol name in the Location line, and press Enter. Konqueror will take you to the top-level index for the protocol you choose:
The man: protocol is a great way to read man pages because the documentation is pleasantly formatted and cross-referenced.
When you navigate down one level from the main index, the second level leaves a bit to be desired. For some reason (we assume that someone intends to fill in more information later), it says "no idea" in a column to the right of the topic list. Just ignore this and click your topic, and you'll find the information you need.
Just like Web page bookmarks that you can create when surfing the Web, documentation bookmarks are great navigational timesavers. Bookmark your favorite man pages so they're easily accessible the next time you need them! To create a new bookmark, just choose Bookmarks[right arrow]Add Bookmark.
Viewing Your Local Network with the smb: Protocol
Use the smb: protocol to quickly browse other machines on your local SMB (Samba and Windows file/printer sharing) network. Enter smb:/ in the Konqueror address line and press Return to see the SMB workgroups in your local network. Click an SMB workgroup to see all the computers in that workgroup. Click one of the computers, and you see the resources that computer is willing to share. Just drag and drop the data you need or make clickable links to resources - the time you save will amaze you.
Use smb: to create desktop shortcuts to your network locations. Just start your copy of Konqueror, enter smb:/ in the address line, and press Enter. Choose a workgroup and then a computer within that workgroup. Now drag a share name to your desktop. Next time you need data from that machine, you have it at the click of a button.
Other KDE Protocols
We haven't covered all the KDE protocols in this technique. There are quite a few others you can explore. Check out the ones listed in Table 1-2.
You can find more protocols on the Web. Search for KIO slave at your favorite search engine.
Excerpted from Linux Timesaving Techniques For Dummies by Susan Douglas Korry Douglas Excerpted by permission.
All rights reserved. No part of this excerpt may be reproduced or reprinted without permission in writing from the publisher.
Excerpts are provided by Dial-A-Book Inc. solely for the personal use of visitors to this web site.