• Main Menu
  • Unix

    • What is Tar?

      What is Tar?

      Tar refers to a tape archiving file format and the program that creates them. Tar stands for tape archive. It combines multiple files together so that they can be used for programs, applications, and critical system files. While Tar does not directly install files to a user’s hard drive, it is responsible for compiling the

    • Where to Get a Unix Emulator

      Where to Get a Unix Emulator

      It is very useful to have a Unix emulator installed on your machine to serve as a tool for learning how to use Unix and getting used to its environment. Once you are familiar, you can go ahead and install a full version of Unix. The best Unix emulator for your needs is Cygwin (pronounced

    • Restricted Shells

      Restricted Shells

      A restricted shell is a Unix shell that has been modified to allow the Unix shell user to do fewer things than a normal shell would allow him to do. It may allow the user to run only certain programs. It may stop the user from changing directories. Many sites run their own restricted shells

    • How to Change an IP Address on Solaris

      How to Change an IP Address on Solaris

      To change an IP address on a Solaris system immediately, use the `ifconfig` command. The syntax for `ifconfig` is: ifconfig <interface> <ip address> <netmask> <broadcast address> If the user does not know his/her network interface names, he/she should use the `ifconfig -a` command to list all of the available network interfaces. Permanently Change an IP

    • Basic Unix Commands

      Basic Unix Commands

      The total number of Unix commands is immense. No normal user or system administrator would ever need to know them all. The Unix commands available to you will vary based upon several factors: The version of Unix you are using (FreeBSD, Linux, Solaris, AIX, HP-UX, OpenBSD, etc…) The Unix shell you are using (sh, csh,

    • How to List Unix Users

      How to List Unix Users

      List Logged In Unix Users Unix has many commands to list users who are logged in. These commands include ‘w,’ ‘who,’ and ‘users:’ $ w 9:51PM up 99 days, 5:39, 2 users, load averages: 0.83, 0.90, 0.90 USER TTY FROM LOGIN@ IDLE WHAT will p0 c-66-164-235-73. 8:11AM – w spencer p3 c-66-164-235-73. 8:26PM 1:24 pine

    • Bootable Linux Distributions

      Bootable Linux Distributions

      Bootable distributions of the Linux operating system are becoming very popular for use in securing networks, testing network security, and conducting forensics after suspected intrusions. Local Area Security Linux Local Area Security Linux is a ‘Live CD’ distribution with a small footprint. Containing over 200 information security and administration related tools, as well as a

    • How to Kill a Process in Unix

      How to Kill a Process in Unix

      A computer process is a computer program that is executing and has a unique process identification or PID. On the Unix Operating System (OS), a process may be running in the background, foreground, or be in a suspended state. On Unix, the OS shell will not return the prompt to the end-user until the current

    • How to Copy UNIX Files to Windows

      How to Copy UNIX Files to Windows

      For those computer users that have both Unix and Window’s operating systems, you should know that you can easily copy your Unix files from a Unix computer and transfer them to a Windows computer. Using Client for NFS, you can transfer any existing Unix files from your Unix server to a Windows based server. It

    • Where to Download Unix

      Where to Download Unix

      Free derivatives of Unix can be easily downloaded via the Internet. This sets Unix apart from other proprietary operating systems like Microsoft Windows. The different Unix versions and Unix-like operating systems available for download include FreeBSD, OpenBSD, Red Hat Fedora Linux, Debian Linux, Ubuntu Linux, and Sun Solaris. Those who are new to Unix or

    unix
    409 queries in 0.497 seconds.