• Main Menu
  • Unix

    • UMASK

      UMASK

      umask is a Unix shell built-in command that automatically sets file permissions on newly created files. The umask command can be confusing to use because it does work as a mask. In other words, the user sets the permissions that he/she does not want in the umask. To calculate permissions that will result from specific

    • Restricted Shells

      Restricted Shells

      A restricted shell is a Unix shell that has been modified to allow the Unix shell user to do fewer things than a normal shell would allow him to do. It may allow the user to run only certain programs. It may stop the user from changing directories. Many sites run their own restricted shells

    • How to Copy UNIX Files to Windows

      How to Copy UNIX Files to Windows

      For those computer users that have both Unix and Window’s operating systems, you should know that you can easily copy your Unix files from a Unix computer and transfer them to a Windows computer. Using Client for NFS, you can transfer any existing Unix files from your Unix server to a Windows based server. It

    • How to Find Out CPU Utilization in UNIX

      How to Find Out CPU Utilization in UNIX

      Keeping track of your CPU’s performance is extremely important. In UNIX, you can accomplish this task by using the system utilities and commands. For those who would like to find out their CPU utilization, one command is extremely important. It is called SAR – System Activity Reporter. The SAR commands make accessing CPU performance quite

    • How to Use the Unix Sort Command

      How to Use the Unix Sort Command

      The Unix sort command is a command for the Unix family of operating systems. It is designed to sort whatever information you give it. The command can be used for a variety of purposes, but it is most frequently employed when there are a number of different files which need to be ordered in some

    • Linux Restricted Shell

      Linux Restricted Shell

      The idea of a restricted shell first arose in the Unix operating system in order to prevent the end-user from doing as many operations as a normal shell allows. A restricted shell lets the administrator control the end-user’s computing environment by only permitting explicitly used commands to be used. The Linux restricted shell (rssh) is

    • How to Backup Unix

      How to Backup Unix

      Most Unix systems come with several basic backup software options, including dd, cpio, tar, and dump. If the basic backup software included with Unix does not meet your needs, you may want to look at some of the more comprehensive software packages designed to backup Unix and Windows systems. Built-in Unix Backup Software tar tar

    • What is Tar?

      What is Tar?

      Tar refers to a tape archiving file format and the program that creates them. Tar stands for tape archive. It combines multiple files together so that they can be used for programs, applications, and critical system files. While Tar does not directly install files to a user’s hard drive, it is responsible for compiling the

    • How to List Unix Users

      How to List Unix Users

      List Logged In Unix Users Unix has many commands to list users who are logged in. These commands include ‘w,’ ‘who,’ and ‘users:’ $ w 9:51PM up 99 days, 5:39, 2 users, load averages: 0.83, 0.90, 0.90 USER TTY FROM LOGIN@ IDLE WHAT will p0 c-66-164-235-73. 8:11AM – w spencer p3 c-66-164-235-73. 8:26PM 1:24 pine

    • LinuxCAD

      LinuxCAD

      CAD programs can be an exciting and helpful tool when designing blueprints for a house, vehicle, or electrical circuit. One of these programs is the popular LinuxCAD software that allows you to edit and create a number of blueprints and schematics under the Linux operating system. LinuxCAD comes with many features that other CAD programs

    121 queries in 0.215 seconds.