enow.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. System administrator - Wikipedia

    en.wikipedia.org/wiki/System_administrator

    Sometimes, almost exclusively in smaller sites, the role of system administrator may be given to a skilled user in addition to or in replacement of their duties. Skills Some of this section is from the Occupational Outlook Handbook , 2010–11 Edition, which is in the public domain as a work of the United States government .

  3. Database administrator - Wikipedia

    en.wikipedia.org/wiki/Database_administrator

    A database administrator (DBA) manages computer databases. [1] The role may include capacity planning , installation , configuration , database design , migration , performance monitoring, security , troubleshooting , as well as backup and data recovery .

  4. Database administration - Wikipedia

    en.wikipedia.org/wiki/Database_administration

    Implement and maintain database security (create and maintain users and roles, assign privileges). Database tuning and performance monitoring. Application tuning and performance monitoring. Setup and maintain documentation and standards. Plan growth and changes (capacity planning). Work as part of a team and provide 24/7 support when required.

  5. Category:Linux administration - Wikipedia

    en.wikipedia.org/wiki/Category:Linux_administration

    Remote administration software for Linux (3 P) S. Linux security software (1 C, 73 P) U. Linux user management and support-related utilities (1 P) Utilities for Linux ...

  6. Superuser - Wikipedia

    en.wikipedia.org/wiki/Superuser

    In some cases, the actual name of the account is not the determining factor; on Unix-like systems, for example, the user with a user identifier (UID) of zero is the superuser [i.e., uid=0], regardless of the name of that account; [1] and in systems which implement a role-based security model, any user with the role of superuser (or its synonyms ...

  7. Linux PAM - Wikipedia

    en.wikipedia.org/wiki/Linux_PAM

    Linux Pluggable Authentication Modules (PAM) is a suite of libraries that allow a Linux system administrator to configure methods to authenticate users. It provides a flexible and centralized way to switch authentication methods for secured applications by using configuration files instead of changing application code. [ 1 ]

  8. Linux Network Administrator's Guide - Wikipedia

    en.wikipedia.org/wiki/Linux_Network_Administrator...

    The Linux Network Administrator's Guide is a book on setting up and running Unix and Linux networks. [1] The first and second editions are freely available in electronic form under the GFDL. It was originally produced by Olaf Kirch and others as part of the Linux Documentation Project with help from O'Reilly.

  9. sudo - Wikipedia

    en.wikipedia.org/wiki/Sudo

    The current Linux manual pages for su define it as "substitute user", [9] making the correct meaning of sudo "substitute user, do", because sudo can run a command as other users as well. [10] [11] Unlike the similar command su, users must, by default, supply their own password for authentication, rather than the password of the target user.