Popular Posts
-
Linux admin interview questions How do you take a single line of input from the user in a shell script? Write a script to convert all DO...
-
Network-Attached Storage 1. Introduction 2. What is a NAS Device? 3. What is a Filer? 4. Network-Attached Storage Versus Sto...
-
Tried Gusty Gibbon Ubuntu 6.10 on Compaq f733AU works fine without any major problems. some tweaking required in udev/rules/70-persistent-ne...
-
All the commands are fired from (% - user) prompt not (# - root) so do not confuse with the #es there with root prompt. They are the command...
-
UNIX Questions and Answers Most answers refer to Solaris 2.x systems Hardware Issues How can I configure new devices without rebooting? What...
-
Password Aging While it's clearly possible to use the /etc/passwd and /etc/shadow files in Solaris and other Unix systems without mak...
-
The Basics. Network Storage - The Basics Are you new to network storage? If so then this series of articles is for you! Over the next few...
-
Sometimes, unprivileged users must be able to accomplish tasks that require privileges. An example is the passwd program, which allows you...
-
Search Files on their file permissions. World readable Normal users should not have access to configuration files or passwords. An attack...
-
First thing to know is that this stuff is in the kernel and there is a good doc in your kernel source tree under Documentation/networking/bo...