enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. List of GNU Core Utilities commands - Wikipedia

    en.wikipedia.org/wiki/List_of_GNU_Core_Utilities...

    This is a list of commands from the GNU Core Utilities for Unix environments. These commands can be found on Unix operating systems and most Unix-like operating systems. GNU Core Utilities include basic file, shell and text manipulation utilities. Coreutils includes all of the basic command-line tools that are expected in a POSIX system.

  3. cgroups - Wikipedia

    en.wikipedia.org/wiki/Cgroups

    The Linux kernel documentation contains some technical details of the setup and use of control groups version 1 [21] and version 2. [22] systemd-cgtop [23] command can be used to show top control groups by their resource usage.

  4. Network Information Service - Wikipedia

    en.wikipedia.org/wiki/Network_Information_Service

    A NIS/YP system maintains and distributes a central directory of user and group information, hostnames, e-mail aliases and other text-based tables of information in a computer network. For example, in a common UNIX environment, the list of users for identification is placed in /etc/passwd and secret authentication hashes in /etc/shadow.

  5. Group identifier - Wikipedia

    en.wikipedia.org/wiki/Group_identifier

    Many system administrators allocate for each user also a personal primary group that has the same name as the user's login name, and often also has the same numeric GID as the user's UID. Such personal groups have no other members and make collaboration with other users in shared directories easier, by allowing users to habitually work with ...

  6. who (Unix) - Wikipedia

    en.wikipedia.org/wiki/Who_(Unix)

    The Single UNIX Specification (SUS) specifies that who should list information about accessible users. The XSI extension also specifies that the data of the username, terminal, login time, process ID, and time since last activity occurred on the terminal, furthermore, an alternate system database used for user information can be specified as an optional argument to who.

  7. getent - Wikipedia

    en.wikipedia.org/wiki/Getent

    Fetch list of user accounts on a Unix system (stored in a database called 'passwd'). This will show all user accounts, regardless of the type of name service used. For example, if both local and LDAP name service are used for user accounts, the results will include all local and LDAP users:

  8. List of Apache modules - Wikipedia

    en.wikipedia.org/wiki/List_of_Apache_modules

    Allows authentication with a special user id of "anonymous" and an email address as the password. As an authentication mechanism, this was replaced by mod_authn_anon. [89] mod_auth_db: Versions 1.1-1.3: Stable Extension: Apache Software Foundation: Apache License, Version 2.0: Provides user authentication using Berkeley DB files. mod_auth_dbm

  9. chgrp - Wikipedia

    en.wikipedia.org/wiki/Chgrp

    The chgrp (from change group) command may be used by unprivileged users on various operating systems to change the group associated with a file system object (such as a computer file, directory, or link) to one of which they are a member. A file system object has 3 sets of access permissions, one set for the owner, one set for the group and one ...