The errata list is a list of errors and their corrections that were found after the product was released. If the error was corrected in a later version or reprint the date of the correction will be displayed in the column titled "Date Corrected".
The following errata were submitted by our customers and approved as valid errors by the author or editor.
Color key: Serious technical mistake Minor technical mistake Language or formatting error Typo Question Note Update
Version |
Location |
Description |
Submitted By |
Date submitted |
Date corrected |
Printed |
Page xiii
3rd line |
The initials of contributor C.K. Sample HAVE BEEN REFORMATTED so that the appear correctly at
the end of this line.
|
Anonymous |
|
Aug 01, 2004 |
Printed |
Page xv
Credits in the preface |
The following contributor HAS BEEN ADDED to the list of Credits:
Chuck Toporek is a Senior Editor at O'Reilly. He is the author of the Mac OS X Panther Pocket
Guide and Inside .Mac, and he is the editor and coauthor of Mac OS X Panther in a Nutshell.
|
Anonymous |
|
Aug 01, 2004 |
Printed |
Page 45
3rd full paragraph |
SideTrack is shareware not freeware.
|
Anonymous |
|
|
Printed |
Page 74
Code on that page and the next |
Amazon has changed their Wish List HTML, so the screen scraping wasn't working properly. Below is an
updated version:
(*
Find Wish Lists in Address Book
The script loops through people in your Address Book, checking Amazon
to see if they have a Wish List. If their Wish List is found, you
have the option to view it in your default browser.
by Paul Bausch
*)
-- set some variables for the curl command
set userAgent to "Mozilla/5.0 (Macintosh; U; PPC Mac OSX; en-us)"
set curlCommand to "curl -i -b -A -L "" & userAgent & "" "
-- open Address Book and loop through people
tell application "Address Book"
repeat with thisPerson in the people
set thisName to name of thisPerson
repeat with thisAddress in email of thisPerson
set thisEmail to value of thisAddress
-- build the URL that will search for the Wish List
set baseURL to "http://www.amazon.com/gp/registry/search.html"
set thisURL to baseURL & "/?type=wishlist\&field-name=" & thisEmail
-- use curl to fetch the search page
-- display dialog thisURL
-- quit
set thisWishPage to do shell script curlCommand & thisURL
-- if the Wish List URL is found in headers, prompt user for action
if thisWishPage contains "&id=" then
set theAction to display dialog thisName & " has an Amazon wishlist."
buttons {"View", "Ignore"}
if button returned of theAction is "View" then
-- build Wish List URL based on ID, and bring up
set beginID to (offset of "&id=" in thisWishPage) + 4
set thisWishID to get text beginID thru (beginID + 16) of
thisWishPage
set beginID to 1
set endID to (offset of return in thisWishID) - 1
set thisWishID to get text beginID thru endID of thisWishID
tell me to open location "http://www.amazon.com/o/registry/" &
thisWishID
end if
end if
end repeat
end repeat
end tell
|
Anonymous |
|
|
Printed |
Page 98
in code |
Line 14 -
use Mac::Apps::Launch
NOW READS:
use Mac::Apps::Launch;
line 15 -
use Mac::Glue 1.15;
NOW READS:
use Mac::Glue-1.21;
|
Anonymous |
|
Aug 01, 2004 |
Printed |
Page 169
figure 3-12 |
Figure 3-12 is the same as 3-11. It should be this -
http://examples.oreilly.com/9780596007188/pithhelmet_add_rule.png
|
Anonymous |
|
|
Printed |
Page 220
bottom of page |
A byline for C.K. Sample HAS BEEN ADDED to the end of the ZOE hack (#38).
|
Anonymous |
|
Aug 01, 2004 |
Printed |
Page 240
bottom of page |
A byline for C.K. Sample HAS BEEN ADDED to the end of the Clutter hack (#42).
|
Anonymous |
|
Aug 01, 2004 |
Printed |
Page 433
first command and second command |
the command has the user edit files in /etc/inetd.conf/, but inetd.conf is a file,
not a directory. Also, the file for secure pop3 should be pop3s, not pops.
The commands should be:
$ sudo pico /etc/xinetd.d/imaps
and
$ sudo pico /etc/xinetd.d/pop3s
And the last command should be:
$ sudo /sbin/services pop3s start
|
Anonymous |
|
|
Printed |
Page 545
last paragraph |
...the second involves manuplating a BSD configuration...
should be:
...the second involves manipulating a BSD configuration...
|
Anonymous |
|
|