• Main Menu
  • Unix

    • How to Audit Unix Passwords

      How to Audit Unix Passwords

      To audit Unix passwords, you must compare each encrypted password in the Unix password file with a set of potential encrypted passwords. These potential encrypted passwords are created by encrypting every password in a list of plaintext passwords. This is an example of a dictionary attack. The Unix passwd File Location The traditional location for

    • How to Change a Hostname on Solaris

      How to Change a Hostname on Solaris

      Solaris makes it unreasonably difficult to change an installed server’s hostname. To change the hostname on a Solaris system, edit all of these files: /etc/hosts /etc/nodename /etc/hostname.* /etc/inet/ipnodes When file editing is complete, reboot the server to test the changes and ensure that they operate correctly. Note that changing the hostname only changes the name

    • How to Backup Unix

      How to Backup Unix

      Most Unix systems come with several basic backup software options, including dd, cpio, tar, and dump. If the basic backup software included with Unix does not meet your needs, you may want to look at some of the more comprehensive software packages designed to backup Unix and Windows systems. Built-in Unix Backup Software tar tar

    • Where to Download Unix

      Where to Download Unix

      Free derivatives of Unix can be easily downloaded via the Internet. This sets Unix apart from other proprietary operating systems like Microsoft Windows. The different Unix versions and Unix-like operating systems available for download include FreeBSD, OpenBSD, Red Hat Fedora Linux, Debian Linux, Ubuntu Linux, and Sun Solaris. Those who are new to Unix or

    • The History of UNIX

      The History of UNIX

      UNIX is one of the most important operating systems ever developed. What made Unix stand out in the crowd of countless other operating systems is that it was a competent operating system that was extremely affordable and worked on low cost hardware. Economics definitely played a large part in UNIX’s popularity and today it is

    • How to Use the Unix Top Command

      How to Use the Unix Top Command

      Top is a small, but powerful program on both Unix and Linux systems. Its purpose is to allow users to monitor processes on their system. It has two main sections. The first displays general information such as the load averages, number of running and sleeping tasks, and overall CPU and memory usage. The second main

    • How to Create a Cron Job

      How to Create a Cron Job

      Unix users write, edit, list, and remove cron jobs using the `crontab` command. `crontab -e` takes users into their default editor to edit their crontab entries. `crontab -l` lists their crontab. `crontab -r` removes their crontab. crontab Security If the cron.allow file exists, then the user must be listed in that file in order to

    • LinuxCAD

      LinuxCAD

      CAD programs can be an exciting and helpful tool when designing blueprints for a house, vehicle, or electrical circuit. One of these programs is the popular LinuxCAD software that allows you to edit and create a number of blueprints and schematics under the Linux operating system. LinuxCAD comes with many features that other CAD programs

    • Rootkit

      Rootkit

      A rootkit is a type of computer malware that is created to hide programs or other computer processes from detection from both users and antivirus software programs. Once installed, a rootkit will typically obtain administrator or higher-level permissions on the infected computer. Although rootkits originated with the UNIX operating system by providing root access to

    • Unix Signals

      Unix Signals

      A signal is a message that can be sent to a running process. Programs, users, or administrators can initiate signals. For example, the proper method of telling the Internet Daemon (inetd) to re-read its configuration file is to send it a SIGHUP signal. For example, if the current process ID (PID) of inetd is 4140,

    unix
    217 queries in 0.271 seconds.