• Main Menu
  • Unix

    • Bootable Linux Distributions

      Bootable Linux Distributions

      Bootable distributions of the Linux operating system are becoming very popular for use in securing networks, testing network security, and conducting forensics after suspected intrusions. Local Area Security Linux Local Area Security Linux is a ‘Live CD’ distribution with a small footprint. Containing over 200 information security and administration related tools, as well as a

    • Linux

      Linux

      Linux is a free, open source operating system that competes with the Windows Operating Systems and Mac OS X. Linux is widely used on a number of devices such as servers, desktops, laptops, smartphones, PDAs, game consoles, tablet computers, supercomputers, and mainframes. Linux controls only about 4.9% of the market share of desktop computers while

    • The History of UNIX

      The History of UNIX

      UNIX is one of the most important operating systems ever developed. What made Unix stand out in the crowd of countless other operating systems is that it was a competent operating system that was extremely affordable and worked on low cost hardware. Economics definitely played a large part in UNIX’s popularity and today it is

    • How to Use the Unix Find Command

      How to Use the Unix Find Command

      The Unix find command, as the name implies, is a command that you can enter into the command line, or terminal, of a Unix operating system, allowing you to process any given set of files or directories. It is a highly useful command that you can take advantage of on Unix based operating system, making

    • Restricted Shells

      Restricted Shells

      A restricted shell is a Unix shell that has been modified to allow the Unix shell user to do fewer things than a normal shell would allow him to do. It may allow the user to run only certain programs. It may stop the user from changing directories. Many sites run their own restricted shells

    • Rootkit

      Rootkit

      A rootkit is a type of computer malware that is created to hide programs or other computer processes from detection from both users and antivirus software programs. Once installed, a rootkit will typically obtain administrator or higher-level permissions on the infected computer. Although rootkits originated with the UNIX operating system by providing root access to

    • How to Audit Unix Passwords

      How to Audit Unix Passwords

      To audit Unix passwords, you must compare each encrypted password in the Unix password file with a set of potential encrypted passwords. These potential encrypted passwords are created by encrypting every password in a list of plaintext passwords. This is an example of a dictionary attack. The Unix passwd File Location The traditional location for

    • Where to Download Unix

      Where to Download Unix

      Free derivatives of Unix can be easily downloaded via the Internet. This sets Unix apart from other proprietary operating systems like Microsoft Windows. The different Unix versions and Unix-like operating systems available for download include FreeBSD, OpenBSD, Red Hat Fedora Linux, Debian Linux, Ubuntu Linux, and Sun Solaris. Those who are new to Unix or

    • How to Setup a Linux File Server

      How to Setup a Linux File Server

      One way that a small business that requires a file server can save thousands of dollars per year is to set up a Linux file server. Linux is an open source software platform that, in many ways, is just as good as or better than other types of platforms including Microsoft and Sun. Small businesses

    • Linux Restricted Shell

      Linux Restricted Shell

      The idea of a restricted shell first arose in the Unix operating system in order to prevent the end-user from doing as many operations as a normal shell allows. A restricted shell lets the administrator control the end-user’s computing environment by only permitting explicitly used commands to be used. The Linux restricted shell (rssh) is

    132 queries in 0.221 seconds.