• Main Menu
  • Unix

    • Where to Download Unix

      Where to Download Unix

      Free derivatives of Unix can be easily downloaded via the Internet. This sets Unix apart from other proprietary operating systems like Microsoft Windows. The different Unix versions and Unix-like operating systems available for download include FreeBSD, OpenBSD, Red Hat Fedora Linux, Debian Linux, Ubuntu Linux, and Sun Solaris. Those who are new to Unix or

    • What is Tar?

      What is Tar?

      Tar refers to a tape archiving file format and the program that creates them. Tar stands for tape archive. It combines multiple files together so that they can be used for programs, applications, and critical system files. While Tar does not directly install files to a user’s hard drive, it is responsible for compiling the

    • How to Create a Cron Job

      How to Create a Cron Job

      Unix users write, edit, list, and remove cron jobs using the `crontab` command. `crontab -e` takes users into their default editor to edit their crontab entries. `crontab -l` lists their crontab. `crontab -r` removes their crontab. crontab Security If the cron.allow file exists, then the user must be listed in that file in order to

    • How to Change a Hostname on Solaris

      How to Change a Hostname on Solaris

      Solaris makes it unreasonably difficult to change an installed server’s hostname. To change the hostname on a Solaris system, edit all of these files: /etc/hosts /etc/nodename /etc/hostname.* /etc/inet/ipnodes When file editing is complete, reboot the server to test the changes and ensure that they operate correctly. Note that changing the hostname only changes the name

    • Linux


      Linux is a free, open source operating system that competes with the Windows Operating Systems and Mac OS X. Linux is widely used on a number of devices such as servers, desktops, laptops, smartphones, PDAs, game consoles, tablet computers, supercomputers, and mainframes. Linux controls only about 4.9% of the market share of desktop computers while

    • UMASK


      umask is a Unix shell built-in command that automatically sets file permissions on newly created files. The umask command can be confusing to use because it does work as a mask. In other words, the user sets the permissions that he/she does not want in the umask. To calculate permissions that will result from specific

    • How to Audit Unix Passwords

      How to Audit Unix Passwords

      To audit Unix passwords, you must compare each encrypted password in the Unix password file with a set of potential encrypted passwords. These potential encrypted passwords are created by encrypting every password in a list of plaintext passwords. This is an example of a dictionary attack. The Unix passwd File Location The traditional location for

    • Linux Restricted Shell

      Linux Restricted Shell

      The idea of a restricted shell first arose in the Unix operating system in order to prevent the end-user from doing as many operations as a normal shell allows. A restricted shell lets the administrator control the end-user’s computing environment by only permitting explicitly used commands to be used. The Linux restricted shell (rssh) is

    • The History of UNIX

      The History of UNIX

      UNIX is one of the most important operating systems ever developed. What made Unix stand out in the crowd of countless other operating systems is that it was a competent operating system that was extremely affordable and worked on low cost hardware. Economics definitely played a large part in UNIX’s popularity and today it is

    • Unix File Permissions

      Unix File Permissions

      Unix file permissions are based upon an octal code. Unix file permissions are stored in a ten character array. The first character of the file permissions stores the file type. The standard file types are: Character Meaning – Plain file d Directory c Character device b Block device l Symbolic link s Socket = or

    226 queries in 0.300 seconds.