|
|
vi | |
|
|
vii | |
Foreword |
|
ix | |
Preface |
|
xi | |
|
Becoming Familiar with FreeBSD |
|
|
1 | (58) |
|
Building an X Server and a Window Manager |
|
|
1 | (1) |
|
Customizing Your Desktop Environment |
|
|
2 | (4) |
|
|
6 | (6) |
|
|
12 | (6) |
|
|
18 | (7) |
|
Configuring Java and Flash |
|
|
25 | (2) |
|
Configuring Sound Applications |
|
|
27 | (3) |
|
|
30 | (4) |
|
Playing Audio and Video Files with FreeBSD |
|
|
34 | (2) |
|
|
36 | (5) |
|
|
41 | (5) |
|
|
46 | (6) |
|
|
52 | (7) |
|
|
59 | (104) |
|
|
59 | (5) |
|
|
64 | (9) |
|
Read The Friendly Manpage! -- A Tutorial |
|
|
73 | (12) |
|
|
85 | (6) |
|
|
91 | (6) |
|
Customizing the Login Shell |
|
|
97 | (6) |
|
Understanding Shell Prompts |
|
|
103 | (5) |
|
|
108 | (6) |
|
Discovering System Processes |
|
|
114 | (10) |
|
The System Startup Daemon: init |
|
|
124 | (4) |
|
|
128 | (6) |
|
Getting Cron to Do Our Bidding |
|
|
134 | (7) |
|
Understanding the Automatons |
|
|
141 | (13) |
|
|
154 | (9) |
|
Ports, Packages, and PBIs |
|
|
163 | (46) |
|
|
163 | (7) |
|
|
170 | (6) |
|
Cleaning and Customizing Your Ports |
|
|
176 | (5) |
|
|
181 | (6) |
|
Building Binary PC-BSD Packages |
|
|
187 | (7) |
|
|
194 | (9) |
|
Browsing through the Ports Collection |
|
|
203 | (6) |
|
|
209 | (24) |
|
|
209 | (2) |
|
Running Windows Applications on FreeBSD |
|
|
211 | (6) |
|
Multi-Platform Remote Control |
|
|
217 | (3) |
|
An Introduction to Webmin |
|
|
220 | (8) |
|
|
228 | (5) |
|
|
233 | (46) |
|
An Introduction to Unix Permissions |
|
|
233 | (11) |
|
|
244 | (8) |
|
Understanding Filesystem Inodes |
|
|
252 | (4) |
|
Mounting Other Filesystems |
|
|
256 | (4) |
|
Accessing MS-DOS Filesystems |
|
|
260 | (5) |
|
|
265 | (14) |
|
|
279 | (26) |
|
Using Software RAID-1 with FreeBSD |
|
|
279 | (5) |
|
|
284 | (4) |
|
Backing up Files with Tar |
|
|
288 | (6) |
|
|
294 | (5) |
|
|
299 | (6) |
|
|
305 | (26) |
|
Connecting to the Internet Using PPP or a DSL Modem |
|
|
305 | (4) |
|
|
309 | (6) |
|
FreeBSD Networking Basics |
|
|
315 | (6) |
|
|
321 | (5) |
|
|
326 | (5) |
|
|
331 | (82) |
|
|
331 | (5) |
|
|
336 | (5) |
|
Setting up a Secure Subversion Server |
|
|
341 | (5) |
|
Accessing Secure Subversion Servers |
|
|
346 | (7) |
|
|
353 | (5) |
|
|
358 | (4) |
|
Filtering Spam with Procmail |
|
|
362 | (4) |
|
|
366 | (4) |
|
|
370 | (6) |
|
|
376 | (8) |
|
Configuring a TFTP Server |
|
|
384 | (7) |
|
|
391 | (5) |
|
Configuring a DHCP Server |
|
|
396 | (7) |
|
DHCP on a Multi-Segment Network |
|
|
403 | (6) |
|
Configuring and Using NFS |
|
|
409 | (4) |
|
|
413 | (58) |
|
|
413 | (9) |
|
Avoiding Trojans and Rootkits |
|
|
422 | (3) |
|
Checking System Integrity with tripwire |
|
|
425 | (7) |
|
File Integrity and Anti-DDoS Utilities |
|
|
432 | (7) |
|
|
439 | (4) |
|
|
443 | (5) |
|
Establishing Good Password Policies |
|
|
448 | (7) |
|
Improving User Passwords with apg |
|
|
455 | (6) |
|
Cracking Passwords to Enhance Security |
|
|
461 | (3) |
|
Hiding Secrets with Steganography |
|
|
464 | (7) |
|
|
471 | (96) |
|
TCP Protocol Layers Explained |
|
|
471 | (5) |
|
|
476 | (8) |
|
|
484 | (8) |
|
|
492 | (6) |
|
|
498 | (3) |
|
|
501 | (6) |
|
IPFW: Fine-Tuning Rulesets |
|
|
507 | (4) |
|
|
511 | (5) |
|
|
516 | (3) |
|
Building a Desktop Firewall |
|
|
519 | (9) |
|
Sharing Internet Connections |
|
|
528 | (7) |
|
Cryptographic Terminology 101 |
|
|
535 | (5) |
|
|
540 | (6) |
|
|
546 | (5) |
|
VPNs and IPsec Demystified |
|
|
551 | (4) |
|
|
555 | (7) |
|
|
562 | (5) |
Index |
|
567 | |