• Main Menu
  • Unix

    • UMASK


      umask is a Unix shell built-in command that automatically sets file permissions on newly created files. The umask command can be confusing to use because it does work as a mask. In other words, the user sets the permissions that he/she does not want in the umask. To calculate permissions that will result from specific

    • What is Tar?

      What is Tar?

      Tar refers to a tape archiving file format and the program that creates them. Tar stands for tape archive. It combines multiple files together so that they can be used for programs, applications, and critical system files. While Tar does not directly install files to a user’s hard drive, it is responsible for compiling the

    • Basic Unix Commands

      Basic Unix Commands

      The total number of Unix commands is immense. No normal user or system administrator would ever need to know them all. The Unix commands available to you will vary based upon several factors: The version of Unix you are using (FreeBSD, Linux, Solaris, AIX, HP-UX, OpenBSD, etc…) The Unix shell you are using (sh, csh,

    • LinuxCAD


      CAD programs can be an exciting and helpful tool when designing blueprints for a house, vehicle, or electrical circuit. One of these programs is the popular LinuxCAD software that allows you to edit and create a number of blueprints and schematics under the Linux operating system. LinuxCAD comes with many features that other CAD programs

    • Linux


      Linux is a free, open source operating system that competes with the Windows Operating Systems and Mac OS X. Linux is widely used on a number of devices such as servers, desktops, laptops, smartphones, PDAs, game consoles, tablet computers, supercomputers, and mainframes. Linux controls only about 4.9% of the market share of desktop computers while

    • Unix Signals

      Unix Signals

      A signal is a message that can be sent to a running process. Programs, users, or administrators can initiate signals. For example, the proper method of telling the Internet Daemon (inetd) to re-read its configuration file is to send it a SIGHUP signal. For example, if the current process ID (PID) of inetd is 4140,

    • How to Change a Hostname on Solaris

      How to Change a Hostname on Solaris

      Solaris makes it unreasonably difficult to change an installed server’s hostname. To change the hostname on a Solaris system, edit all of these files: /etc/hosts /etc/nodename /etc/hostname.* /etc/inet/ipnodes When file editing is complete, reboot the server to test the changes and ensure that they operate correctly. Note that changing the hostname only changes the name

    • How to Audit Unix Passwords

      How to Audit Unix Passwords

      To audit Unix passwords, you must compare each encrypted password in the Unix password file with a set of potential encrypted passwords. These potential encrypted passwords are created by encrypting every password in a list of plaintext passwords. This is an example of a dictionary attack. The Unix passwd File Location The traditional location for

    • Linux Restricted Shell

      Linux Restricted Shell

      The idea of a restricted shell first arose in the Unix operating system in order to prevent the end-user from doing as many operations as a normal shell allows. A restricted shell lets the administrator control the end-user’s computing environment by only permitting explicitly used commands to be used. The Linux restricted shell (rssh) is

    • How to List Unix Users

      How to List Unix Users

      List Logged In Unix Users Unix has many commands to list users who are logged in. These commands include ‘w,’ ‘who,’ and ‘users:’ $ w 9:51PM up 99 days, 5:39, 2 users, load averages: 0.83, 0.90, 0.90 USER TTY FROM LOGIN@ IDLE WHAT will p0 c-66-164-235-73. 8:11AM – w spencer p3 c-66-164-235-73. 8:26PM 1:24 pine

    222 queries in 0.571 seconds.