• Main Menu
  • Unix

    • UMASK

      UMASK

      umask is a Unix shell built-in command that automatically sets file permissions on newly created files. The umask command can be confusing to use because it does work as a mask. In other words, the user sets the permissions that he/she does not want in the umask. To calculate permissions that will result from specific

    • How to Kill a Process in Unix

      How to Kill a Process in Unix

      A computer process is a computer program that is executing and has a unique process identification or PID. On the Unix Operating System (OS), a process may be running in the background, foreground, or be in a suspended state. On Unix, the OS shell will not return the prompt to the end-user until the current

    • How to Install Linux on an Xbox

      How to Install Linux on an Xbox

      For hardcore gamers, the Microsoft Xbox is one of the top consoles ever created. The hardware itself is on par with many desktop computers of just a few years ago, which gave many hackers the great idea of actually making their Xbox into a computer fully equipped with a DVD ROM drive, keyboard, mouse, and

    • Unix File Permissions

      Unix File Permissions

      Unix file permissions are based upon an octal code. Unix file permissions are stored in a ten character array. The first character of the file permissions stores the file type. The standard file types are: Character Meaning – Plain file d Directory c Character device b Block device l Symbolic link s Socket = or

    • Configuring a Linux DHCP Server

      Configuring a Linux DHCP Server

      DHCP is the dynamic host configuration protocol. In other words, it describes how your computer is connected to networks. Assigning an IP address dynamically is a basic task assigned to DHCP along with domain name, name server, gateway, host name and net mask. DHCP can provide other information like time server and has a capability

    • Unix Signals

      Unix Signals

      A signal is a message that can be sent to a running process. Programs, users, or administrators can initiate signals. For example, the proper method of telling the Internet Daemon (inetd) to re-read its configuration file is to send it a SIGHUP signal. For example, if the current process ID (PID) of inetd is 4140,

    • Where to Find a Unix Tutorial

      Where to Find a Unix Tutorial

      Unix has many dedicated fans who have written quite a few excellent Unix tutorials for beginning users. Here are a few of the better Unix tutorials: Unix Tutorial for Beginners Unix: The Bare Minimum Introduction to Unix commands Unix Tutorial UNIXhelp for Users Unix Tutorial and Command Reference Unix Tutorial

    • Configuring a Linux Mail Server

      Configuring a Linux Mail Server

      Configuring Linux Mail Server Linux Mail Server The main purpose of the mail server is concerned with to receive and send emails. S Software applications are used to manage incoming of emails from any other server and to forward it to the destination. There are many web hosting services which provide mailing facilities along with

    • How to Use the Unix Sort Command

      How to Use the Unix Sort Command

      The Unix sort command is a command for the Unix family of operating systems. It is designed to sort whatever information you give it. The command can be used for a variety of purposes, but it is most frequently employed when there are a number of different files which need to be ordered in some

    • How to Backup Unix

      How to Backup Unix

      Most Unix systems come with several basic backup software options, including dd, cpio, tar, and dump. If the basic backup software included with Unix does not meet your needs, you may want to look at some of the more comprehensive software packages designed to backup Unix and Windows systems. Built-in Unix Backup Software tar tar

    unix
    } 246 queries in 0.300 seconds.