Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking Mac OS X Tiger : Serious Hacks, Mods and Customizations

Buy
This serious, but fun, down-and-dirty book will let you make Tiger purr, ensuring that your Macs appearance, speed, usability, and security settings are what you want. Author Scott Knaster:

  • Shows you how to speed it up, lock it down, or pull back the curtains.
  • Dives into default system settings, unlocks hidden gems, and includes original Mac OS X programs with full source listings and explanations.
  • Shows heavyweight hackers the tricks and modes of OS X booting, tweaks for login screens, and how to customize or even kill the Dock.
  • Offers the inside scoop on Dashboard and Spotlight, including two sample widgets and one Spotlight importer, all with fully annotated source listings.
  • Demonstrates how to install and use Unix and X11 applications, take advantage of command line tools, and create system services and active Dock badges.

Order your copy today.

About the Author

Scott Knaster is a legendary Mac hacker and coauthor of Mac Toys, also published by Wiley. His book How To Write Macintosh Software was required reading for Mac programmers for more than a decade. After Macs, Scott's next great love is Mad magazine.
(HTML tags aren't allowed.)

Developing Mobile Games with Moai SDK
Developing Mobile Games with Moai SDK

Moai SDK is a fast, minimalist, open-source Lua mobile framework for pro game developers. Moai is built around Lua, a common programming language for games, and offers a single open-source platform for both the front-end elements seen by consumers and the back-end infrastructure.

Developing Mobile Games with Moai SDK will guide you...

Programming the Parallel Port: Interfacing the PC for Data Acquisition & Process Control
Programming the Parallel Port: Interfacing the PC for Data Acquisition & Process Control
Why purchase expensive add-on cards or bus interfaces when you can develop effective and economical data acquisition and process controls using C programs? Using the under-employed printer adapter (that is, the parallel port of your PC), you can turn your computer into a powerful tool for developing microprocessor applications. Learn how to build a...
Hardware Hacking Projects for Geeks
Hardware Hacking Projects for Geeks

Put a hacker in a room with a Furby for a weekend and you'll hear a conversation that's fairly one-sided in its originality. Toss in an 802.11b network card, a soldering iron, wire cutters, a logic probe, and a few other carefully selected tools and materials and you'll have potential. Add a copy of Hardware Hacking Projects for...


HOWTO Secure and Audit Oracle 10g and 11g
HOWTO Secure and Audit Oracle 10g and 11g
This guide demonstrates how to secure sensitive data and comply with internal and external audit regulations using Oracle 10g and 11g. It provides the hands-on guidance required to understand the complex options provided by Oracle and the know-how to choose the best option for a particular case. The book presents specific sequences of actions that...
The Korean Peace Process and Civil Society: Towards Strategic Peacebuilding (Rethinking Peace and Conflict Studies)
The Korean Peace Process and Civil Society: Towards Strategic Peacebuilding (Rethinking Peace and Conflict Studies)
“This is a must-read book for anyone searching for insight into the peace process of the divided Korean peninsula. As a peace researcher and activist, the author highlights the role of civil society in making peacebuilding possible and sustainable on the Korean peninsula. This volume opens a new horizon to the study of...
Business Analysis: Microsoft Excel 2010 (MrExcel Library)
Business Analysis: Microsoft Excel 2010 (MrExcel Library)

USE EXCEL 2010 TO GAIN DEEPER INSIGHTS, MAKE SMARTER DECISIONS, AND EARN MORE PROFITS

 

Using real-world examples, Carlberg helps you put Excel’s features and functions to work and get the power of quantitative analysis behind your management...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy