• Main Menu
  • Unix

    • Linux Restricted Shell

      Linux Restricted Shell

      The idea of a restricted shell first arose in the Unix operating system in order to prevent the end-user from doing as many operations as a normal shell allows. A restricted shell lets the administrator control the end-user’s computing environment by only permitting explicitly used commands to be used. The Linux restricted shell (rssh) is

    • How to Use the Unix Find Command

      How to Use the Unix Find Command

      The Unix find command, as the name implies, is a command that you can enter into the command line, or terminal, of a Unix operating system, allowing you to process any given set of files or directories. It is a highly useful command that you can take advantage of on Unix based operating system, making

    • Unix Shell Scripting Tutorials

      Unix Shell Scripting Tutorials

      Unix Shell Scripting Tutorials This Unix shell scripting tutorial provides samples and instructional materials that are easy to understand and useful for Unix shell scripting. It also offers illustrated samples that will helps users explore different avenues of Unix shell scripting.   Bourne Shell Programming Tutorial Learn how to use the Unix shell with this

    • Linux


      Linux is a free, open source operating system that competes with the Windows Operating Systems and Mac OS X. Linux is widely used on a number of devices such as servers, desktops, laptops, smartphones, PDAs, game consoles, tablet computers, supercomputers, and mainframes. Linux controls only about 4.9% of the market share of desktop computers while

    • Configuring a Linux DHCP Server

      Configuring a Linux DHCP Server

      DHCP is the dynamic host configuration protocol. In other words, it describes how your computer is connected to networks. Assigning an IP address dynamically is a basic task assigned to DHCP along with domain name, name server, gateway, host name and net mask. DHCP can provide other information like time server and has a capability

    • How to Capture a Unix Terminal Session

      How to Capture a Unix Terminal Session

      One of the best methods to capture a Unix terminal session is to use the `script` command. In this example we start a script session, run a couple of commands, and then use the `exit` command to stop capturing the terminal session: $ script Script started, output file is typescript $ pwd /home/will $ ps

    • How to Change a Hostname on Solaris

      How to Change a Hostname on Solaris

      Solaris makes it unreasonably difficult to change an installed server’s hostname. To change the hostname on a Solaris system, edit all of these files: /etc/hosts /etc/nodename /etc/hostname.* /etc/inet/ipnodes When file editing is complete, reboot the server to test the changes and ensure that they operate correctly. Note that changing the hostname only changes the name

    • The History of UNIX

      The History of UNIX

      UNIX is one of the most important operating systems ever developed. What made Unix stand out in the crowd of countless other operating systems is that it was a competent operating system that was extremely affordable and worked on low cost hardware. Economics definitely played a large part in UNIX’s popularity and today it is

    • Rootkit


      A rootkit is a type of computer malware that is created to hide programs or other computer processes from detection from both users and antivirus software programs. Once installed, a rootkit will typically obtain administrator or higher-level permissions on the infected computer. Although rootkits originated with the UNIX operating system by providing root access to

    • How to Kill a Process in Unix

      How to Kill a Process in Unix

      A computer process is a computer program that is executing and has a unique process identification or PID. On the Unix Operating System (OS), a process may be running in the background, foreground, or be in a suspended state. On Unix, the OS shell will not return the prompt to the end-user until the current

    128 queries in 0.382 seconds.