Mac OS X Power Tools


Book Description

Expert Dan Frakes Toiled Endlessly with OS X So You Don't Have To... OS X expert and incurable Mac addict Dan Frakes delved into the deepest, darkest regions of Apple's newest operating system to uncover the best and most efficient ways to get things done. The result of his tireless efforts, Mac OS X Power Tools, takes you step-by-step through insightful and essential tips, shortcuts, and solutions. Filled with choice coverage on installation, the Finder, networking, security, Unix, software, and much more—Mac OS X Power Tools is certain to save you countless hours (and frustration) and turn you in to the OS X expert you've always dreamed of becoming. Coverage includes: Foiling Finder Frustration Setting Up Your Mac Sensationally Mastering Mac OS and Third-Party Software Installations Developing a Dynamic Dock Clobbering Classic Networking and Surfing Superiorly Connecting Conveniently and Running Remotely Fine-Tuning Firewalls and Strengthening System Security Utilizing UNIX See the author's website at www.macosxpowertools.com




Mac OS X Panther Hacks


Book Description

Mac OS X is a wonderful combination of the power and flexibility of Unix with the ease of use that seems to come only from Apple. Between the tools baked right into the system, a veritable cornucopia of third-party applications, and a cottage industry of customizations, tweaks, and hacks, the Mac is a force to be reckoned with like never before. Mac OS X Panther Hacks celebrates the Macintosh's adventurous spirit, inviting the citizen engineer on a quest of deeper discovery -- both with the purpose of going further and simply enjoying the ride. Mac OS X Panther Hacks continues the tradition started with Mac OS X Hacks, sitting squarely at the peculiar confluence of deadly earnest optimization and creative (albeit sometimes wacky) tweaking you seem to find only on a Mac.




Windows Developer Power Tools


Book Description

A wealth of open and free software is available today for Windows developers who want to extend the development environment, reduce development effort, and increase productivity. This encyclopedic guide explores more than 100 free and open source tools available to programmers who build applications for Windows desktops and servers.




Security Power Tools


Book Description

What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms. Designed to be browsed, Security Power Tools offers you multiple approaches to network security via 23 cross-referenced chapters that review the best security tools on the planet for both black hat techniques and white hat defense tactics. It's a must-have reference for network administrators, engineers and consultants with tips, tricks, and how-to advice for an assortment of freeware and commercial tools, ranging from intermediate level command-line operations to advanced programming of self-hiding exploits. Security Power Tools details best practices for: Reconnaissance -- including tools for network scanning such as nmap; vulnerability scanning tools for Windows and Linux; LAN reconnaissance; tools to help with wireless reconnaissance; and custom packet generation Penetration -- such as the Metasploit framework for automated penetration of remote computers; tools to find wireless networks; exploitation framework applications; and tricks and tools to manipulate shellcodes Control -- including the configuration of several tools for use as backdoors; and a review of known rootkits for Windows and Linux Defense -- including host-based firewalls; host hardening for Windows and Linux networks; communication security with ssh; email security and anti-malware; and device security testing Monitoring -- such as tools to capture, and analyze packets; network monitoring with Honeyd and snort; and host monitoring of production servers for file changes Discovery -- including The Forensic Toolkit, SysInternals and other popular forensic tools; application fuzzer and fuzzing techniques; and the art of binary reverse engineering using tools like Interactive Disassembler and Ollydbg A practical and timely network security ethics chapter written by a Stanford University professor of law completes the suite of topics and makes this book a goldmine of security information. Save yourself a ton of headaches and be prepared for any network security dilemma with Security Power Tools.




Mac OS X in a Nutshell


Book Description

Following the common-sense O'Reilly style, Mac OS X in a Nutshell ruts through the hype and gives readers practical details they can use every day. Everything you need to know about Mac OS X has been systematically documented in this book. Mac OS X in a Nutshell offers a complete overview of Mac OS X 10.2 (Jaguar), from its Aqua interface right down to its BSD Unix core. This book familiarizes readers with the Finder and the Dock, System Preferences, file management, system and network administration issues, and more. Later chapters include coverage of the Terminal and how to configure a DAMP (Darwin, Apache, MySQL, Pert/PHP/Python) web-publishing system. In Mac OS X in a Nutshell, you'll find : • Detailed information on virtually every command and utility available on Mac OS X Jaguar • The most complete and thorough coverage of Mac OS X's Unix commands you'll find anywhere • Detailed advice and documentation on system configuration, with extensive coverage of the System Preferences and use of the Finder and Dock • An overview of basic system and network administration features, including coverage of NetInfo and Directory Services • Hundreds of tips, tricks, and clever ways to do familiar and not-so-familiar tasks • Instructions on installing the X Window System and how to build and run BSD Unix applications • An overview of Mac OS X's Unix text editors, including vi and Emacs • An overview of CVS, the concurrent version system • Information on shell syntax and variables for Mac OS X's default user shell, tcsh Each command and option in the book's Unix Command Reference has been painstakingly tested and checked against Jaguar-even the manpages that ship with Mac OS X can't compete in accuracy. Mac OS X in a Nutshell is the most comprehensive quick reference on the market and is a must for any serious Mac user.




Software and Mind


Book Description

Addressing general readers as well as software practitioners, "Software and Mind" discusses the fallacies of the mechanistic ideology and the degradation of minds caused by these fallacies. Mechanism holds that every aspect of the world can be represented as a simple hierarchical structure of entities. But, while useful in fields like mathematics and manufacturing, this idea is generally worthless, because most aspects of the world are too complex to be reduced to simple hierarchical structures. Our software-related affairs, in particular, cannot be represented in this fashion. And yet, all programming theories and development systems, and all software applications, attempt to reduce real-world problems to neat hierarchical structures of data, operations, and features. Using Karl Popper's famous principles of demarcation between science and pseudoscience, the book shows that the mechanistic ideology has turned most of our software-related activities into pseudoscientific pursuits. Using mechanism as warrant, the software elites are promoting invalid, even fraudulent, software notions. They force us to depend on generic, inferior systems, instead of allowing us to develop software skills and to create our own systems. Software mechanism emulates the methods of manufacturing, and thereby restricts us to high levels of abstraction and simple, isolated structures. The benefits of software, however, can be attained only if we start with low-level elements and learn to create complex, interacting structures. Software, the book argues, is a non-mechanistic phenomenon. So it is akin to language, not to physical objects. Like language, it permits us to mirror the world in our minds and to communicate with it. Moreover, we increasingly depend on software in everything we do, in the same way that we depend on language. Thus, being restricted to mechanistic software is like thinking and communicating while being restricted to some ready-made sentences supplied by an elite. Ultimately, by impoverishing software, our elites are achieving what the totalitarian elite described by George Orwell in "Nineteen Eighty-Four" achieves by impoverishing language: they are degrading our minds.




Mac OS X Security


Book Description

Part II addresses system security beginning at the client workstation level.




Running Mac OS X Tiger


Book Description

For power users who want to modify Tiger, the new release of Mac OS X, this book takes them deep inside Mac OS X's core, revealing the inner workings of the system.




Power Tools for Peak Pro


Book Description

Get insider tips for maximizing the most-current version of Peak (the most powerful stereo audio-editing program currently available for Mac OS X) with this book exploring all the relevant tools and commands users need to reach any editing goal. Basic editing, audio repair, sound designing, music and dialog editing, processing with plug-ins, loops, editing to picture, and batch processing are covered in separate chapters with tips and sidebars.




Master Your Mac


Book Description

Provides information to quickly improve and customize a Mac computer, enable undocumented Mac OS X features, automate tedious tasks, handle media, and troubleshoot disk issues.