Trucos mac os x

Overview

Mac OS X is a marvelous confluence of the user-friendly and highly customizable Macintosh of yesteryear and the power and flexibility of Unix under the hood. Those coming to Mac OS X from previous incarnations of the operating system recognize much of the friendly face of the Macintosh but they are also plunged into a whole new world. Unix converts to Mac OS X find a familiar FreeBSD-like operating system at the core and many of the command-line applications that they're ...

See more details below
Available through our Marketplace sellers.
Other sellers (Paperback)
  • All (11) from $1.99   
  • New (2) from $15.24   
  • Used (9) from $1.99   
Close
Sort by
Page 1 of 1
Showing All
Note: Marketplace items are not eligible for any BN.com coupons and promotions
$15.24
Seller since 2009

Feedback rating:

(847)

Condition:

New — never opened or used in original packaging.

Like New — packaging may have been opened. A "Like New" item is suitable to give as a gift.

Very Good — may have minor signs of wear on packaging but item works perfectly and has no damage.

Good — item is in good condition but packaging may have signs of shelf wear/aging or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Acceptable — item is in working order but may show signs of wear such as scratches or torn packaging. All specific defects should be noted in the Comments section associated with each item.

Used — An item that has been opened and may show signs of wear. All specific defects should be noted in the Comments section associated with each item.

Refurbished — A used item that has been renewed or updated and verified to be in proper working condition. Not necessarily completed by the original manufacturer.

New
8441516499 *BRAND NEW* Ships Same Day or Next!

Ships from: Springfield, VA

Usually ships in 1-2 business days

  • Canadian
  • International
  • Standard, 48 States
  • Standard (AK, HI)
  • Express, 48 States
  • Express (AK, HI)
$60.00
Seller since 2014

Feedback rating:

(136)

Condition: New
Brand new.

Ships from: acton, MA

Usually ships in 1-2 business days

  • Standard, 48 States
  • Standard (AK, HI)
Page 1 of 1
Showing All
Close
Sort by
Sending request ...

Overview

Mac OS X is a marvelous confluence of the user-friendly and highly customizable Macintosh of yesteryear and the power and flexibility of Unix under the hood. Those coming to Mac OS X from previous incarnations of the operating system recognize much of the friendly face of the Macintosh but they are also plunged into a whole new world. Unix converts to Mac OS X find a familiar FreeBSD-like operating system at the core and many of the command-line applications that they're familiar with.

This presents a unique opportunity for combining traditional Unix hacking and Mac OS know-how. Mac OS X Hacks goes beyond the peculiar mix of man pages and not-particularly-helpful Help Center, pulling the best tips, tricks, and tools from the Mac power users and Unix hackers themselves.

The collection reflects the real-world know how and experience of those well steeped in Unix history and expertise, sharing their no-nonsense, sometimes quick-and-dirty solutions to administering and taking full advantage of everything a Unix desktop has to offer: Web, Mail, and FTP serving, security services, SSH, Perl and shell scripting, compiling, configuring, scheduling, networking, and hacking. Add to that the experience of die-hard Macintosh users, customizing and modifying their hardware and software to meet their needs: System Preferences, GUI mods and tweaks, hardware tips, vital shareware and freeware, AppleScript, AppleTalk and equivalents, keyboard modifiers, and general Macintosh-style tomfoolery.

Each Hack can be read easily in a few minutes, saving countless hours of searching for the right answer. Mac OS X Hacks provides direct, hands-on solutions that can be applied to the challenges facing both those meeting the Mac for the first time and long-time users delving into Mac OS X and its Unix underpinnings.

Mac OS X Hacks is the third in O'Reilly's new Hacks Serier which aims to begin reclaiming the term "hacking" for the good guys. In recent years, the term has come to be associated with those nefarious black hats who break into computers to snoop, steal information or disrupt Internet traffic. But the term originally had a more benign meaning, and you'll still hear it used this way whenever developers get together. Our new Hacks books are written in the spirit of the true hackers — the people who drive innovation.

Read More Show Less

Product Details

  • ISBN-13: 9788441516496
  • Publisher: O'Reilly Media, Incorporated
  • Publication date: 5/21/2004
  • Edition description: Spanish-language Edition
  • Pages: 430
  • Product dimensions: 6.78 (w) x 8.84 (h) x 0.98 (d)

Meet the Author

(author, Chapters 8 and 9, previous edition) is O'Reilly Media's Chief Technology Officer. He has co-authored various O'Reilly books, including Mac OS X Hacks, Google Hacks, Essential Blogging, and Peer to Peer: Harnessing the Power of Disruptive Technologies, and he's program chair for the O'Reilly Emerging Technology Conference. Email: googlemm@raelity.org.

Kevin Hemenway, coauthor of Mac OS X Hacks, is better known as Morbus Iff, the creator of disobey.com, which bills itself as "content for the discontented." Publisher and developer of more home cooking than you could ever imagine, he'd love to give you a Fry Pan of Intellect upside the head. Politely, of course. And with love.

Read More Show Less

Table of Contents

Prologo 25
Introduccion 29
Como utilizar este libro 30
Como esta organizado este libro 30
Convenciones utilizadas en este libro 32
Capitulo 1. Los archivos 35
1. Como se crea y se truca una Cuenta de Usuario 35
2. Como se realiza una copia de seguridad 42
3. Como se realiza una copia de seguridad a distancia 46
4. La compresion en todas sus formas: .img, .sit, .tar, .gz 49
5. Un salto de linea es un salto de linea 52
6. Los codigos de produccion y las extensiones de archivo 55
7. Como se bloquea y se desbloquea un archivo 57
8. Problemas con la Papelera, las imagenes de disco y la unidad para CD 59
9. Los alias, los enlaces simbolicos y los solidos 63
10. Nombres de archivo recientes 65
11. Que hay dentro de un paquete .app 66
12. Como se abre un documento de Word sin Word 68
Capitulo 2. El arranque 73
13. El proceso de arranque al descubierto 73
14. Como se arranca un Mac con otro dispositivo 75
15. Como se convierte un Mac en un disco duro 76
16. La proteccion por contrasena con Open Firmware 77
17. Una copia de OS X para un Mac antiguo 80
Capitulo 3. Las iApps y las aplicaciones audiovisuales 83
18. Los mejores trucos para iChat 83
19. Las alternativas a AIM 91
20. La impresion grafica con PDF y mapas de bits 92
21. La conversion grafica instantanea 94
22. El decalogo de iPhoto 96
23. Como se hace un documental 103
24. De la diapositiva al video 112
25. Como se pincha la senal de audio de una aplicacion 123
26. Como se monta una emisora de radio 124
27. Aprenda a compartir sus gustos musicales 135
28. Como se controla iTunes con Perl 137
29. iTunes, aqui iCal 147
30. Como se publica y se hace una suscripcion a un calendario iCal 148
31. Como enviar y recibir llamadas y SMS por Bluetooth 150
32. iSync via Bluetooth 154
Capitulo 4. La interfaz de usuario 163
33. De vuelta al Escritorio 163
34. La alternativa a Opcion-Tab 164
35. El Menu Apple 166
36. El cajon de sastre 168
37. LaunchBar, una alternativa al Dock 171
38. DockSwap, otra alternativa al Dock 173
39. A toquetear la interfaz 175
40. Como se consigue mas espacio en la pantalla 178
41. Los mejores consejos para hacer capturas 183
42. Como se le toma el pulso a un Mac 189
43. El salvapantallas/escritorio 191
44. Con una pluma y un tintero 192
45. A viva voz 198
46. AppleScript y los menus contextuales 203
47. Como se desgalvaniza una aplicacion Cocoa 205
Capitulo 5. Unix y Terminal 211
48. Le presentamos Terminal 211
49. Mas trucos y consejos para Terminal 219
50. Convertirse momentaneamente en administrator 230
51. Los archivos especiales Unix 234
52. Las variables de entorno de shell 239
53. Como se programan tareas del sistema y otros eventos 241
54. Abrir elementos en la linea de comandos 246
55. Mac OS X Developer Tools 249
56. Lo que debe saber un fanatico de Unix sobre Mac OS X 251
57. Como se convierte una secuencia de comandos de la linea de comandos en una aplicacion 256
58. Como se instala una aplicacion Unix con Fink 259
59. Duplicar archivos y directorios con rsync 261
60. La administracion remota con CVS 264
61. Como se descarga un archivo desde la linea de comandos 271
62. Como se actualiza el software desde la linea de comandos 273
63. Unix y AppleScript 277
64. La automatizacion con AppleScript 278
65. Como se ejecuta Linux en un iBook 279
Capitulo 6. Redes 291
66. La anatomia de un acceso directo a Internet 291
67. Como se cambia una direccion IP 293
68. Como se comparte una conexion a Internet 293
69. Como se crea una red con un solo cable 297
70. La conexion con VPN y SSH 300
71. Como se accede a otro ordenador por SSH 304
72. Como se ejecuta Windows en y desde un Mac 310
73. Como se intercambian archivos entre un Mac un PC 316
74. Como se prepara un intercambio con WebDAV 321
75. Como se monta un directorio FTP a distancia 324
76. El intercambio de archivos con Bluetooth 327
77. El telefono modem Bluetooth 331
78. La configuracion de DNS 334
Capitulo 7. El correo electronico 339
79. La doma de Entourage 339
80. Mail con IMAP 343
81. La convivencia entre IMAP y POP 352
82. sendmail 355
83. Como se descarga correo POP con fetchmail 365
84. Como se crea un alias de correo 368
Capitulo 8. Internet 373
85. A la busqueda desde el Escritorio 374
86. Como se visita una Web sin conexion 381
87. La prensa 382
88. Como se sirve un sitio con el servidor Apache 387
89. Como se corrige la configuracion del servidor Apache 390
90. Como se hace un servidor Apache con mod_perl 392
91. Como se hace una CGI de AppleScript con ACGI Dispatcher 401
92. Como se pone en marcha CGI 402
93. Como se pone en marcha PHP 405
94. Como se pone en marcha SSI 407
95. Como se pone en marcha WebDAV 410
96. Como controlar el acceso al servidor por direccion o nombre de origen 414
97. Como controlar el acceso al servidor por nombre y grupo de usuarios 415
98. Como se hacen un alias y un indice para un directorio 417
Capitulo 9. Bases de datos 423
99. Como se instala MySQL 423
100. Como se instala una base de datos PostgreSQL 431
Indice alfabetico 439
Read More Show Less

Customer Reviews

Be the first to write a review
( 0 )
Rating Distribution

5 Star

(0)

4 Star

(0)

3 Star

(0)

2 Star

(0)

1 Star

(0)

Your Rating:

Your Name: Create a Pen Name or

Barnes & Noble.com Review Rules

Our reader reviews allow you to share your comments on titles you liked, or didn't, with others. By submitting an online review, you are representing to Barnes & Noble.com that all information contained in your review is original and accurate in all respects, and that the submission of such content by you and the posting of such content by Barnes & Noble.com does not and will not violate the rights of any third party. Please follow the rules below to help ensure that your review can be posted.

Reviews by Our Customers Under the Age of 13

We highly value and respect everyone's opinion concerning the titles we offer. However, we cannot allow persons under the age of 13 to have accounts at BN.com or to post customer reviews. Please see our Terms of Use for more details.

What to exclude from your review:

Please do not write about reviews, commentary, or information posted on the product page. If you see any errors in the information on the product page, please send us an email.

Reviews should not contain any of the following:

  • - HTML tags, profanity, obscenities, vulgarities, or comments that defame anyone
  • - Time-sensitive information such as tour dates, signings, lectures, etc.
  • - Single-word reviews. Other people will read your review to discover why you liked or didn't like the title. Be descriptive.
  • - Comments focusing on the author or that may ruin the ending for others
  • - Phone numbers, addresses, URLs
  • - Pricing and availability information or alternative ordering information
  • - Advertisements or commercial solicitation

Reminder:

  • - By submitting a review, you grant to Barnes & Noble.com and its sublicensees the royalty-free, perpetual, irrevocable right and license to use the review in accordance with the Barnes & Noble.com Terms of Use.
  • - Barnes & Noble.com reserves the right not to post any review -- particularly those that do not follow the terms and conditions of these Rules. Barnes & Noble.com also reserves the right to remove any review at any time without notice.
  • - See Terms of Use for other conditions and disclaimers.
Search for Products You'd Like to Recommend

Recommend other products that relate to your review. Just search for them below and share!

Create a Pen Name

Your Pen Name is your unique identity on BN.com. It will appear on the reviews you write and other website activities. Your Pen Name cannot be edited, changed or deleted once submitted.

 
Your Pen Name can be any combination of alphanumeric characters (plus - and _), and must be at least two characters long.

Continue Anonymously

    If you find inappropriate content, please report it to Barnes & Noble
    Why is this product inappropriate?
    Comments (optional)