• Main Menu
  • Unix

    • Configuring a Linux DHCP Server

      Configuring a Linux DHCP Server

      DHCP is the dynamic host configuration protocol. In other words, it describes how your computer is connected to networks. Assigning an IP address dynamically is a basic task assigned to DHCP along with domain name, name server, gateway, host name and net mask. DHCP can provide other information like time server and has a capability

    • Linux Restricted Shell

      Linux Restricted Shell

      The idea of a restricted shell first arose in the Unix operating system in order to prevent the end-user from doing as many operations as a normal shell allows. A restricted shell lets the administrator control the end-user’s computing environment by only permitting explicitly used commands to be used. The Linux restricted shell (rssh) is

    • How to Copy UNIX Files to Windows

      How to Copy UNIX Files to Windows

      For those computer users that have both Unix and Window’s operating systems, you should know that you can easily copy your Unix files from a Unix computer and transfer them to a Windows computer. Using Client for NFS, you can transfer any existing Unix files from your Unix server to a Windows based server. It

    • Bootable Linux Distributions

      Bootable Linux Distributions

      Bootable distributions of the Linux operating system are becoming very popular for use in securing networks, testing network security, and conducting forensics after suspected intrusions. Local Area Security Linux Local Area Security Linux is a ‘Live CD’ distribution with a small footprint. Containing over 200 information security and administration related tools, as well as a

    • How to Use vi

      How to Use vi

      The vi editor (visual editor) is one of the oldest and more popular text editors on computers running the Unix Operating System (OS). The vi editor can be used from any computer terminal interfacing with a computer running Unix, since the editor relies on the standard alphabet keys for specific commands. Since vi is not

    • How to Create a Cron Job

      How to Create a Cron Job

      Unix users write, edit, list, and remove cron jobs using the `crontab` command. `crontab -e` takes users into their default editor to edit their crontab entries. `crontab -l` lists their crontab. `crontab -r` removes their crontab. crontab Security If the cron.allow file exists, then the user must be listed in that file in order to

    • Configuring a Linux Mail Server

      Configuring a Linux Mail Server

      Configuring Linux Mail Server Linux Mail Server The main purpose of the mail server is concerned with to receive and send emails. S Software applications are used to manage incoming of emails from any other server and to forward it to the destination. There are many web hosting services which provide mailing facilities along with

    • How to Find Out CPU Utilization in UNIX

      How to Find Out CPU Utilization in UNIX

      Keeping track of your CPU’s performance is extremely important. In UNIX, you can accomplish this task by using the system utilities and commands. For those who would like to find out their CPU utilization, one command is extremely important. It is called SAR – System Activity Reporter. The SAR commands make accessing CPU performance quite

    • How to Change an IP Address on Solaris

      How to Change an IP Address on Solaris

      To change an IP address on a Solaris system immediately, use the `ifconfig` command. The syntax for `ifconfig` is: ifconfig <interface> <ip address> <netmask> <broadcast address> If the user does not know his/her network interface names, he/she should use the `ifconfig -a` command to list all of the available network interfaces. Permanently Change an IP

    • Rootkit


      A rootkit is a type of computer malware that is created to hide programs or other computer processes from detection from both users and antivirus software programs. Once installed, a rootkit will typically obtain administrator or higher-level permissions on the infected computer. Although rootkits originated with the UNIX operating system by providing root access to

    } 242 queries in 0.441 seconds.