• Main Menu
  • Unix

    • How to Audit Unix Passwords

      How to Audit Unix Passwords

      To audit Unix passwords, you must compare each encrypted password in the Unix password file with a set of potential encrypted passwords. These potential encrypted passwords are created by encrypting every password in a list of plaintext passwords. This is an example of a dictionary attack. The Unix passwd File Location The traditional location for

    • How to Install Linux on an Xbox

      How to Install Linux on an Xbox

      For hardcore gamers, the Microsoft Xbox is one of the top consoles ever created. The hardware itself is on par with many desktop computers of just a few years ago, which gave many hackers the great idea of actually making their Xbox into a computer fully equipped with a DVD ROM drive, keyboard, mouse, and

    • How to Find Out CPU Utilization in UNIX

      How to Find Out CPU Utilization in UNIX

      Keeping track of your CPU’s performance is extremely important. In UNIX, you can accomplish this task by using the system utilities and commands. For those who would like to find out their CPU utilization, one command is extremely important. It is called SAR – System Activity Reporter. The SAR commands make accessing CPU performance quite

    • The History of UNIX

      The History of UNIX

      UNIX is one of the most important operating systems ever developed. What made Unix stand out in the crowd of countless other operating systems is that it was a competent operating system that was extremely affordable and worked on low cost hardware. Economics definitely played a large part in UNIX’s popularity and today it is

    • Restricted Shells

      Restricted Shells

      A restricted shell is a Unix shell that has been modified to allow the Unix shell user to do fewer things than a normal shell would allow him to do. It may allow the user to run only certain programs. It may stop the user from changing directories. Many sites run their own restricted shells

    • Unix Shell Scripting Tutorials

      Unix Shell Scripting Tutorials

      Unix Shell Scripting Tutorials This Unix shell scripting tutorial provides samples and instructional materials that are easy to understand and useful for Unix shell scripting. It also offers illustrated samples that will helps users explore different avenues of Unix shell scripting.   Bourne Shell Programming Tutorial Learn how to use the Unix shell with this

    • Unix Signals

      Unix Signals

      A signal is a message that can be sent to a running process. Programs, users, or administrators can initiate signals. For example, the proper method of telling the Internet Daemon (inetd) to re-read its configuration file is to send it a SIGHUP signal. For example, if the current process ID (PID) of inetd is 4140,

    • How to Use the Grep Command

      How to Use the Grep Command

      The grep command is a search command built into a variety of Unix based operating systems. This command line utility, whose name stems from the original Unix term which means “search globally for lines matching the regular expression, and print them,” can be accessed using the command line or terminal from anywhere in the Unix

    • How to Change an IP Address on Solaris

      How to Change an IP Address on Solaris

      To change an IP address on a Solaris system immediately, use the `ifconfig` command. The syntax for `ifconfig` is: ifconfig <interface> <ip address> <netmask> <broadcast address> If the user does not know his/her network interface names, he/she should use the `ifconfig -a` command to list all of the available network interfaces. Permanently Change an IP

    • Unix File Permissions

      Unix File Permissions

      Unix file permissions are based upon an octal code. Unix file permissions are stored in a ten character array. The first character of the file permissions stores the file type. The standard file types are: Character Meaning – Plain file d Directory c Character device b Block device l Symbolic link s Socket = or

    unix
    421 queries in 0.503 seconds.