The Unix Cook Book

Read Online or Download The Unix Cook Book PDF

Best unix books

Policy Routing Using Linux

Conventional IPv4 routing is summarized as "All routing is a vacation spot pushed process". whilst a router appears at an IPv4 packet it cares basically concerning the vacation spot handle within the header of the packet. It makes use of this vacation spot tackle to make your mind up on the place to ahead the packet. yet what in order to path packets in a different way based not just at the vacation spot addresses but in addition on different packet fields resembling resource tackle, IP protocol, delivery protocol ports or maybe packet payload?

Linux and OpenVMS Interoperability. Tricks for Old Dogs, New Dogs and Hot Dogs with Open Systems

"I've stumbled on this e-book to be a pragmatic, hands-on handbook that explains how OpenVMS process managers can combine their platforms with Linux, permitting the 2 systems to paintings cooperatively and expand the processing potential of a computing setting. John basically describes the gains and advantages of either working structures, so you might assessment which one is healthier for any given activity.

Mac OS X Tiger: Missing Manual

You could set your watch to it: once Apple comes out with one other model of Mac OS X, David Pogue hits the streets with one other meticulous lacking guide to hide it with a wealth of aspect. the recent Mac OS X 10. four, higher referred to as Tiger, is quicker than its predecessors, yet nothing's too quickly for Pogue and Mac OS X: The lacking guide.

Extra info for The Unix Cook Book

Sample text

These select machines allow only trusted users access to the nkkp account, and they also limit the hosts to which they will forward the ood)]cajp session. You can also do this on the command line instead of modifying the actual ood[ _kjbec file; simply specify the option )kBkns]n`=cajpjkxuao to the ood command. Also note that, in the ]qpdkneva`[gauo file, you can use the bnki directive to restrict which remote hosts are allowed to connect with the specified key (discussed next in the “Restricting RSA Authentication” section).

This isn’t a problem— unless, of course, somebody manually deletes that user. Ideally, you would have a list of every assumption your automation system makes about every system. , the more administrators), the harder you should try. Another concern, if you have more than one or two administrators for a system, is an audit trail. Who has been accessing each system and what have they been doing? Most systems provide process accounting—a log of every executed process, the user who executed it, and the amount of time it was running.

There will always be people who follow in your footsteps. If you ask them, the most important component of your work is good documentation. We already mentioned that in many cases automation techniques provide automatic documentation. You should take full advantage of this easy documentation whenever possible. Consider, as an example, a web server under your control. You can manually configure the web server and document the process for yourself and others in the future, or you can write a script to configure the web server for you.

Download PDF sample

Rated 4.67 of 5 – based on 40 votes