Mac OS X Leopard Phrasebook

Overview

Mac OS® X Leopard Phrasebook

Brian Tiemann

Essential Code and Commands

Mac OS X Leopard Phrasebook gives you the complete command phrases you need to take full advantage of the Leopard’s hidden and undocumented power underneath the graphical user interface: time-saving solutions for effectively working with files, folders, the Finder, ...

See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (11) from $1.99   
  • New (2) from $45.00   
  • Used (9) from $1.99   
Close
Sort by
Page 1 of 1
Showing 1 – 1 of 2
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$45.00
Seller since 2015

Feedback rating:

(217)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing 1 – 1 of 2
Close
Sort by
Sending request ...

Overview

Mac OS® X Leopard Phrasebook

Brian Tiemann

Essential Code and Commands

Mac OS X Leopard Phrasebook gives you the complete command phrases you need to take full advantage of the Leopard’s hidden and undocumented power underneath the graphical user interface: time-saving solutions for effectively working with files, folders, the Finder, Spotlight, text files, servers, disks, CDs/DVDs, permissions, printing, applications, Exposé, networking, security, and much more.

Concise and Accessible

Easy to carry and easy to use–lets you ditch all those bulky books for one portable pocket guide

Flexible and Functional

Packed with more than 100 complete command phrases–so you can make the most of Mac OS X Leopard in just about any situation

Brian Tiemann is a freelance technology columnist and software engineer who has spent more than a decade operating websites on servers running BSD, the technology underlying Mac OS X. A graduate of Caltech, Tiemann is the author of Mac OS X Tiger in a Snap and FreeBSD Unleashed.

Operating Systems / Mac OS X 10.5

Read More Show Less

Product Details

  • ISBN-13: 9780672329548
  • Publisher: Addison-Wesley
  • Publication date: 12/4/2007
  • Series: Developer's Library Series
  • Pages: 299
  • Product dimensions: 4.50 (w) x 7.00 (h) x 0.72 (d)

Meet the Author

Brian Tiemann is a freelance technology columnist and software engineer who has operated his own business and leisure websites on servers running BSD–the technology underlying Mac OS X–since 1995. As an outspoken advocate for the Apple Macintosh platform as well as for FreeBSD, he values a synthesis between open-source and closed-source development and believes FreeBSD and Mac OS X both validate that synthesis for the benefit of all users. He resides in San Jose, is a graduate of Caltech, and is the author of Mac OS X Tiger in a Snap and FreeBSD Unleashed.

Read More Show Less

Table of Contents

Introduction

1 The Structure of Mac OS X............7

Two Operating Systems in One............8

Uses for the Command Line............10

Navigating the Filesystem............12

Your Home Folder............15

Coexisting with Other Users............17

Conclusion............20

2 Configuring Your Terminal............21

Put Terminal in Your Dock............22

Set Dimensions, Colors, and Titles............23

Add Custom Key Mappings............26

Change Your Shell............28

Execute a Command Upon Opening a

Terminal Window or Tab............31

Save and Restore a Terminal Session............32

View Your Command History............33

Run a Previous Command Again............34

Create a Command Alias............35

Conclusion............37

3 Using the Command Line............39

Everything Is a File............40

File Types and Extensions............41

Maximum Filename Lengths............44

Case Sensitivity and Case

Preservation in Filenames............45

Special Characters to Avoid in Filenames............47

Wildcards and What They Mean............50

Conclusion............52

4 Basic Unix Commands............53

List Items in a Folder............53

List Items with Sizes and Type Symbols............55

List Items with Color-Coded Types............57

List Specific Items Matching a Pattern

(Using Wildcards)............58

View Hidden Files and Folders............59

List Permissions, Ownership, and

Other Details............60

Sort Contents by Date and Time............65

Sort Contents by Size............66

Express File Sizes in Terms of

Kilo/Mega/Gigabytes............67

Find Out What Folder You’re In............68

Change to a Different Folder............69

Change to the Folder You’re Viewing

in the Finder............70

Open a Folder in the Finder............71

Change to Your Home Folder............72

Create a New Folder............73

Create a New Series of Embedded Folders............74

Duplicate a File............75

Duplicate Files Extra Safely............76

Duplicate Multiple Files Using Wildcards............78

Duplicate a Folder............79

Duplicate Folders While Preserving

Important File Information............80

Move or Rename a File............80

Delete a File............83

Delete Multiple Files Using Wildcards............84

Delete Files Extra Safely............85

Delete a Folder............86

Delete Troublesome Files............88

Issue a Privileged Command Using sudo............91

Read About a Command with man............94

Search for More Commands Based

on Function............96

Conclusion............97

5 Using the Finder............99

Files, Folders, Aliases, and Bundles............99

Customize Icon View............104

Customize List View............105

Get Detailed File Info............107

Create an Alias to a File or Folder............110

Create a Symbolic Link............111

Find Files by Name or Contents............112

Find Files by Kind, Date, or Other

Attributes............115

Save a File Search as a Smart Folder............117

Look Inside a Bundle............119

Take a Screenshot............120

Conclusion............122

6 Viewing and Editing Text Files............123

Edit a Text File in TextEdit............124

Edit a Text File in Nano............127

Display a Text File on the Command

Line (Using cat)............129

Display a Text File Using a Pager (less)............130

Search for Text Within the Pager............132

View the First Few Lines of a File............133

View the Last Few Lines of a File............134

View the Tail of a File as It Is

Continuously Updated............135

Seek for Patterns Within a Text File............136

Send Filtered Output from a Command

into Another Command or Text File............138

Synthesize a Text File into Speech............140

Create a Compressed ZIP Archive of a

File or Folder............142

Conclusion............144

7 Ownership and Permissions............145

Change the Owner of a File or Folder............146

Change the Group Owner of a File or Folder............147

Change an Item’s Permissions Symbolically............149

Change an Item’s Permissions Numerically............152

Change Ownership or Permissions

Recursively............155

Change an Item’s Ownership and

Permissions Graphically............156

Graphically Configure Access Control Lists............157

Conclusion............158

8 Printing............159

Set Up a Local (USB) Printer............159

Set Up a Network Printer............161

Print Files in Any Application............163

Print Files Using Drag-and-Drop............164

Print from the Command Line............166

List a Printer’s Pending Jobs............167

Cancel a Print Job............169

Troubleshoot a Problematic Print Job............170

Conclusion............172

9 Working with Applications............173

Install an Application............173

Deinstall an Application............176

Find Common Application Functions............177

Change a File’s Default Opener Application............179

Quit Applications to Conserve Memory............180

Force Quit Misbehaving Applications............182

Restore an Application to Its

Default Settings............185

Find Application Windows with Exposé............186

Expand Desktop Real Estate with Spaces............188

Automate a Workflow............189

Schedule a Recurring Command............191

Monitor System Performance............193

Conclusion............195

10 Working with Disks............197

Monitor Disk Usage............198

Add a New Hard Disk to the System............203

Create a Disk Image............206

Create an Encrypted Disk Image............208

Lock and Encrypt an Existing Disk Image............210

Conclusion............211

11 Burning a CD or DVD............213

Put Files on a Blank Disc............214

Burn a Disc in the Finder............215

Save a Burn Folder............216

Make an ISO Image from a CD or DVD............217

Burn a CD or DVD from a Disk Image............219

Conclusion............220

12 Connecting to a Network............221

Connect to a Wireless Network............221

Connect to an Ethernet Network

with DHCP............224

Connect to an Ethernet Network with

Manual TCP/IP Settings............226

Connect to a Dial-up Network............227

Check Network Connectivity............229

Protect Yourself with a Firewall............230

Conclusion............233

13 Using Locations............235

Create a New Location............236

Configure Network Settings for a Location............237

Place Network Services in Preference Order............238

Add and Remove Network Services............239

Switch Locations as You Move............241

Conclusion............241

14 Sharing Files and Resources............243

Allow Secure Remote Terminal Access............244

Allow File Sharing by Other Macs............246

Allow File Sharing by Windows Computers............247

Connect to a Shared Disk Resource

on a Mac............249

Connect to a Shared Disk Resource on

a Windows Computer............253

Connect to a Shared NFS Resource............255

Connect to a WebDAV Resource............256

Connect to an FTP Server............257

Disconnect from a Shared Resource............260

Conclusion............260

15 Command-Line Networking Tools............261

Check Network Connectivity with Ping............262

Trace the Route to Another Computer with

Traceroute............263

Connect to a Remote Mac or Unix

Computer Using SSH............264

Transfer Files Using FTP and SFTP............267

Transfer Files Securely Using SCP............269

Download Web Files Using curl............271

Conclusion............273

Index............275

Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)