Popular Posts
-
Linux admin interview questions How do you take a single line of input from the user in a shell script? Write a script to convert all DO...
-
Network-Attached Storage 1. Introduction 2. What is a NAS Device? 3. What is a Filer? 4. Network-Attached Storage Versus Sto...
-
Search Files on their file permissions. World readable Normal users should not have access to configuration files or passwords. An attack...
-
The Basics. Network Storage - The Basics Are you new to network storage? If so then this series of articles is for you! Over the next few...
-
All the commands are fired from (% - user) prompt not (# - root) so do not confuse with the #es there with root prompt. They are the command...
-
Well. We speak so much of security and make secure system, in concerns of that here I am explaining how to put ACL's on AIX...
-
First thing to know is that this stuff is in the kernel and there is a good doc in your kernel source tree under Documentation/networking/bo...
-
Sometimes, unprivileged users must be able to accomplish tasks that require privileges. An example is the passwd program, which allows you...
-
The PAM (Pluggable Authentication Module) module pam_tally keeps track of unsuccessful login attempts then disables user accounts when a pr...
-
alias Create an alias, aliases allow a string to be substituted for a word when it is used as the first word of a simple command. SYNTAX ...