• Main Menu
  • Unix

    • Basic Unix Commands

      Basic Unix Commands

      The total number of Unix commands is immense. No normal user or system administrator would ever need to know them all. The Unix commands available to you will vary based upon several factors: The version of Unix you are using (FreeBSD, Linux, Solaris, AIX, HP-UX, OpenBSD, etc…) The Unix shell you are using (sh, csh,

    • How to Install Linux on an Xbox

      How to Install Linux on an Xbox

      For hardcore gamers, the Microsoft Xbox is one of the top consoles ever created. The hardware itself is on par with many desktop computers of just a few years ago, which gave many hackers the great idea of actually making their Xbox into a computer fully equipped with a DVD ROM drive, keyboard, mouse, and

    • Configuring a Linux DHCP Server

      Configuring a Linux DHCP Server

      DHCP is the dynamic host configuration protocol. In other words, it describes how your computer is connected to networks. Assigning an IP address dynamically is a basic task assigned to DHCP along with domain name, name server, gateway, host name and net mask. DHCP can provide other information like time server and has a capability

    • How to List Unix Users

      How to List Unix Users

      List Logged In Unix Users Unix has many commands to list users who are logged in. These commands include ‘w,’ ‘who,’ and ‘users:’ $ w 9:51PM up 99 days, 5:39, 2 users, load averages: 0.83, 0.90, 0.90 USER TTY FROM LOGIN@ IDLE WHAT will p0 c-66-164-235-73. 8:11AM – w spencer p3 c-66-164-235-73. 8:26PM 1:24 pine

    • How to Find Out CPU Utilization in UNIX

      How to Find Out CPU Utilization in UNIX

      Keeping track of your CPU’s performance is extremely important. In UNIX, you can accomplish this task by using the system utilities and commands. For those who would like to find out their CPU utilization, one command is extremely important. It is called SAR – System Activity Reporter. The SAR commands make accessing CPU performance quite

    • Unix Shell Scripting Tutorials

      Unix Shell Scripting Tutorials

      Unix Shell Scripting Tutorials This Unix shell scripting tutorial provides samples and instructional materials that are easy to understand and useful for Unix shell scripting. It also offers illustrated samples that will helps users explore different avenues of Unix shell scripting.   Bourne Shell Programming Tutorial Learn how to use the Unix shell with this

    • Unix File Permissions

      Unix File Permissions

      Unix file permissions are based upon an octal code. Unix file permissions are stored in a ten character array. The first character of the file permissions stores the file type. The standard file types are: Character Meaning – Plain file d Directory c Character device b Block device l Symbolic link s Socket = or

    • How to Audit Unix Passwords

      How to Audit Unix Passwords

      To audit Unix passwords, you must compare each encrypted password in the Unix password file with a set of potential encrypted passwords. These potential encrypted passwords are created by encrypting every password in a list of plaintext passwords. This is an example of a dictionary attack. The Unix passwd File Location The traditional location for

    • Where to Download Unix

      Where to Download Unix

      Free derivatives of Unix can be easily downloaded via the Internet. This sets Unix apart from other proprietary operating systems like Microsoft Windows. The different Unix versions and Unix-like operating systems available for download include FreeBSD, OpenBSD, Red Hat Fedora Linux, Debian Linux, Ubuntu Linux, and Sun Solaris. Those who are new to Unix or

    • Rootkit

      Rootkit

      A rootkit is a type of computer malware that is created to hide programs or other computer processes from detection from both users and antivirus software programs. Once installed, a rootkit will typically obtain administrator or higher-level permissions on the infected computer. Although rootkits originated with the UNIX operating system by providing root access to

    unix
    221 queries in 0.399 seconds.