• Main Menu
  • Unix

    • How to List Unix Users

      How to List Unix Users

      List Logged In Unix Users Unix has many commands to list users who are logged in. These commands include ‘w,’ ‘who,’ and ‘users:’ $ w 9:51PM up 99 days, 5:39, 2 users, load averages: 0.83, 0.90, 0.90 USER TTY FROM LOGIN@ IDLE WHAT will p0 c-66-164-235-73. 8:11AM – w spencer p3 c-66-164-235-73. 8:26PM 1:24 pine

    • How to Install Linux on an Xbox

      How to Install Linux on an Xbox

      For hardcore gamers, the Microsoft Xbox is one of the top consoles ever created. The hardware itself is on par with many desktop computers of just a few years ago, which gave many hackers the great idea of actually making their Xbox into a computer fully equipped with a DVD ROM drive, keyboard, mouse, and

    • LinuxCAD


      CAD programs can be an exciting and helpful tool when designing blueprints for a house, vehicle, or electrical circuit. One of these programs is the popular LinuxCAD software that allows you to edit and create a number of blueprints and schematics under the Linux operating system. LinuxCAD comes with many features that other CAD programs

    • How to Change a Unix Password

      How to Change a Unix Password

      To change your Unix password, use the `passwd` command. ¬†Unless you are the “root” user, you will need to know your current password to set a new one. ¬†If you have forgotten your current password, you will need to contact the “root” user to have your password reset. Here is an example of the user

    • Unix Shell Scripting Tutorials

      Unix Shell Scripting Tutorials

      Unix Shell Scripting Tutorials This Unix shell scripting tutorial provides samples and instructional materials that are easy to understand and useful for Unix shell scripting. It also offers illustrated samples that will helps users explore different avenues of Unix shell scripting.   Bourne Shell Programming Tutorial Learn how to use the Unix shell with this

    • Bootable Linux Distributions

      Bootable Linux Distributions

      Bootable distributions of the Linux operating system are becoming very popular for use in securing networks, testing network security, and conducting forensics after suspected intrusions. Local Area Security Linux Local Area Security Linux is a ‘Live CD’ distribution with a small footprint. Containing over 200 information security and administration related tools, as well as a

    • How to Audit Unix Passwords

      How to Audit Unix Passwords

      To audit Unix passwords, you must compare each encrypted password in the Unix password file with a set of potential encrypted passwords. These potential encrypted passwords are created by encrypting every password in a list of plaintext passwords. This is an example of a dictionary attack. The Unix passwd File Location The traditional location for

    • How to Copy UNIX Files to Windows

      How to Copy UNIX Files to Windows

      For those computer users that have both Unix and Window’s operating systems, you should know that you can easily copy your Unix files from a Unix computer and transfer them to a Windows computer. Using Client for NFS, you can transfer any existing Unix files from your Unix server to a Windows based server. It

    • How to Create a Cron Job

      How to Create a Cron Job

      Unix users write, edit, list, and remove cron jobs using the `crontab` command. `crontab -e` takes users into their default editor to edit their crontab entries. `crontab -l` lists their crontab. `crontab -r` removes their crontab. crontab Security If the cron.allow file exists, then the user must be listed in that file in order to

    • Unix Signals

      Unix Signals

      A signal is a message that can be sent to a running process. Programs, users, or administrators can initiate signals. For example, the proper method of telling the Internet Daemon (inetd) to re-read its configuration file is to send it a SIGHUP signal. For example, if the current process ID (PID) of inetd is 4140,

    403 queries in 0.780 seconds.