You are previewing Mac OS® X Tiger™ Unleashed.
O'Reilly logo
Mac OS® X Tiger™ Unleashed

Book Description

A best-seller that once showed you how to reign in a panther can now show you how to tame a Tiger. Mac OS X Tiger Unleashed is the most comprehensive guide to unlocking the full power of Mac OS X Tiger that you can find. Written by Unix/BSD experts and Mac users, John Ray and William C. Ray, you will go inside the Mac OS X Tiger operating system and the underlying BSD environment. In-depth background coverage and useful hands-on lessons will help you understand the changes with the new version and master the new features. Lessons include:

  • Working with files and applications

  • Running classic Mac OS applications

  • Native utilities and applications

  • Intalling third-party applications

  • Third-party BSD command-line applications

  • Configuring the system using BSD utilities

  • Remote administration

  • Serving a Windows network

  • Routine maintenance

  • Learn to deal with the most trouble-prone aspects of the Mac OS X Tiger user interface and how to exploit the new features to get the most out of your system with Mac OS X Tiger Unleashed.

    Table of Contents

    1. Copyright
    2. About the Lead Authors
    3. Acknowledgments
    4. We Want to Hear from You!
    5. Reader Services
    6. Introduction
    7. Using Mac OS X
      1. Managing the Tiger Workspace
        1. Getting Started
        2. Using the Tiger Finder
        3. Using the Dock
        4. Accessing Common Functions Through Menu Extras
        5. Force Quitting Applications
        6. Managing Windows with Exposé
        7. Using the Dashboard
        8. Using Fast User Switching
        9. Help Viewer
        10. Summary
      2. Useful Tiger Applications and Utilities
        1. Storing Contact Information: Address Book
        2. Creating Calendars, Events, and To Do Lists: iCal
        3. Basic Image and PDF Manipulation: Preview
        4. Multimedia Playback: QuickTime 7
        5. Storing and Managing Sensitive Information: Keychain Access
        6. Synchronizing Information Between Devices: iSync
        7. Running Legacy Mac OS Applications: Classic
        8. Other Tools and Utilities
        9. Summary
      3. Internet Applications
        1. Browsing the Web: Safari
        2. Accessing Email: Apple Mail
        3. Video and Audio Conferencing: iChat AV
        4. Searching the Internet: Sherlock
        5. The Enigma That Is .Mac
        6. Summary
      4. Controlling Applications with Automator and AppleScript
        1. Automating Your System with Automator
        2. Creating Advanced Automation with AppleScript
        3. Understanding AppleScript Syntax
        4. Additional AppleScript Tools and Resources
        5. Summary
    8. Hardware Setup and Configuration
      1. Configuring Tiger Hardware Support and Preferences
        1. Managing Displays: Displays and Display Calibrator Assistant
        2. Configuring Keyboards and Mice: Keyboard & Mouse
        3. Tablet Device Input: Ink
        4. Bluetooth Devices and Services: Bluetooth Preferences and Bluetooth File Exchange
        5. Disks and Disk Images: Disk Utility
        6. Scanners, Cameras, and Media Readers: Image Capture
        7. Audio Input and Output: Sound Preferences and Audio MIDI Setup
        8. Switching Between Operating Systems: Startup Disk
        9. Handling Optical Media: CDs and DVDs
        10. Saving Electricity and the Environment: Energy Saver
        11. Summary
      2. Printer, Fax, and Font Management
        1. Using Print Center/Printer Setup Utility
        2. Setting Printing System Preferences
        3. Using the Tiger Fax Capabilities
        4. The CUPS System Interface
        5. Managing Fonts
        6. Font Websites
        7. Summary
    9. Advanced User and Network Settings
      1. Configuring Network Connectivity
        1. Understanding TCP/IP Basics
        2. Configuring Network Connections
        3. Connecting to a VPN
        4. Sharing a Single Internet Connection with Multiple Computers
        5. Using the Built-in Tiger Firewall
        6. Summary
      2. Customizing User and System Settings
        1. Creating Multiple User Accounts: Accounts
        2. Applying Account Security: Security
        3. Setting International Options
        4. Configuring Voice and Accessibility Options: Speech and Universal Access
        5. Setting System Time and Date
        6. Using Spotlight to Search System Preferences
        7. Summary
    10. Introduction to BSD on Tiger
      1. Accessing the BSD Subsystem
        1. Getting Started with the Command Line
        2. Interacting with Unix: Basic Unix Commands
        3. Terminal Preferences and Configuration
        4. Summary
      2. Common Unix Shell Commands: File, Directory, and Disk Operations
        1. Understanding Tiger, HFS+, and BSD Command Interaction
        2. Basic Tiger Filesystem Navigation
        3. Managing Files and Directories
        4. Examining File Contents
        5. Searching for Files, Directories, and More
        6. File Compression and Archiving
        7. Getting Disk and Directory Information: du, df
        8. Mounting/Unmounting Volumes: diskutil
        9. Summary
      3. Using File Permissions and Access Control Lists
        1. Introduction to File Permissions
        2. Applying Advanced Resource Control Using ACLs
        3. Being Someone Else for a While: su, sudo
        4. Summary
      4. Process Management
        1. Understanding Process Management
        2. Using Common Process Management Commands
        3. Communication Between Processes: Redirection, Pipes
        4. Managing Processes Graphically: Activity Monitor
        5. Summary
      5. Using Common Command-Line Applications and Application Suites
        1. Networking Applications
        2. Browsing the Web: lynx
        3. Mail Clients
        4. Text Editors
        5. Printing Tools
        6. Bridging the GUI to Command Line Gap: Hybrid Software
        7. Summary
      6. Command-Line Software Installation and Troubleshooting
        1. Installing Xcode, Apple's Developer Tools
        2. Installing Software at the Command Line
        3. Installing Some Additional Interesting Software
        4. Troubleshooting Software Installs, and Compiling and Debugging Manually
        5. Using Common Sense and Configuration Options
        6. Fiddling with File Locations and Fighting with Installers
        7. Tracing Software Problems to the Source: Using the gdb Debugger
        8. Summary
    11. Advanced BSD Concepts
      1. Shell Configuration and Programming (Shell Scripting)
        1. Customizing Your Shell Environment and Storing Data
        2. Automating Tasks with Shell Scripts
        3. Setting Up Automatic Script Execution
        4. Summary
      2. Managing System Services and Configuration
        1. Locating the Mac OS X Configuration Files
        2. Managing User Preferences
        3. Managing System Services
        4. Strong-Arming the System—Brute Force Behavior Modification
        5. Summary
      3. Using X Window System Applications
        1. Introduction to the X Window System
        2. Installing the X Window System
        3. Using X
        4. Summary
      4. Using the Perl and Python Scripting Languages
        1. Perl
        2. Python
        3. Summary
    12. Server and Network Administration
      1. Serving and Connecting to Databases
        1. Installing and Configuring MySQL
        2. Creating and Working with a MySQL Database
        3. Accessing Database Information Using Perl
        4. Accessing Database Information Using ODBC
        5. Summary
      2. Configuring Advanced Multiuser/Multisystem Cooperation Features
        1. Using NetInfo Manager
        2. Managing Users Through NetInfo
        3. Command-Line NetInfo Administration Tools
        4. Using and Sharing Disk Resources with NFS
        5. Summary
      3. Accessing and Controlling Tiger Remotely
        1. Remote Access and Security-Minded Thinking
        2. Running Shells and Commands Remotely Using SSH
        3. Accessing Mac OS X Remotely Using Apple Remote Desktop
        4. Summary
      4. Creating an FTP Server
        1. Activating the Mac OS X FTP Server: tnftpd
        2. Configuring tnftpd FTP Server Options
        3. Setting Up Anonymous FTP
        4. Setting Up ProFTPD as a Replacement for the Default ftpd
        5. Alternatives to FTP
        6. Summary
      5. Creating a Web Server
        1. What Is Apache?
        2. Understanding Apache Administration
        3. Expanding Apache's Capabilities with Modules
        4. Interpreting Web Server Log Files
        5. Summary
      6. Developing Web Applications
        1. Introduction to Web Programming
        2. Programming CGI Applications in Perl
        3. Developing Web Applications Using PHP
        4. Alternative Development Environments
        5. Creating RSS Feeds
        6. Summary
      7. Darwin Streaming Server and QuickTime Broadcaster
        1. Introduction to Darwin Streaming Server
        2. Installing and Using Darwin Streaming Server
        3. Streaming Live Events with QuickTime Broadcaster
        4. Embedding QuickTime into Web Pages
        5. Summary
      8. Creating a Mail Server
        1. The Risks of Running a Mail Server
        2. Activating the Built-in Tiger Postfix Mail Server
        3. Fine-tuning a Postfix Configuration
        4. Adding Spam and Virus Protection
        5. Providing Remote Access to Email
        6. Providing Web-Based Email Access
        7. Summary
      9. Working with Windows-Based Systems
        1. Understanding the Windows Protocols: SMB and CIFS
        2. Accessing and Sharing Windows Resources
        3. Using Tiger with MS Exchange
        4. Integrating Tiger into an Active Directory
        5. Samba
        6. Summary
    13. System and Server Health
      1. Implementing Server Security and Advanced Network Configuration
        1. Managing Network Interfaces from the Command Line: ifconfig
        2. Performing Network Diagnostics: Network Utility
        3. Understanding the Importance of System Security
        4. Limiting Network Risks
        5. Detecting Attacks in Progress: Intrusion Detection
        6. Commonsense Preventive Measures
        7. Summary
      2. Maintaining a Healthy System
        1. Keeping Software Updated
        2. Performing System Backups
        3. Monitoring Tiger System Operation
        4. Built-in Diagnostic and Repair Tools
        5. Third-Party Disk and Virus Tools
        6. Summary
    14. Index