When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. alias (command) - Wikipedia

    en.wikipedia.org/wiki/Alias_(command)

    An alias will last for the life of the shell session. Regularly used aliases can be set from the shell's rc file (such as .bashrc) so that they will be available upon the start of the corresponding shell session. The alias commands may either be written in the config file directly or sourced from a separate file.

  3. List of POSIX commands - Wikipedia

    en.wikipedia.org/wiki/List_of_POSIX_commands

    Sort, merge, or sequence check text files Version 1 AT&T UNIX split: Misc Mandatory Split files into pieces Version 3 AT&T UNIX strings: C programming Mandatory Find printable strings in files 2BSD strip: C programming Optional (SD) Remove unnecessary information from executable files Version 1 AT&T UNIX stty: Misc Mandatory Set the options for ...

  4. IP aliasing - Wikipedia

    en.wikipedia.org/wiki/IP_aliasing

    According to the Linux Kernel documentation, [1] IP-aliases are an obsolete way to manage multiple IP-addresses/masks per interface. Newer tools such as iproute2 support multiple address/prefixes per interface, but aliases are still supported for backwards compatibility. In the Linux kernel, it was first implemented by Juan José Ciarlante in ...

  5. CNAME record - Wikipedia

    en.wikipedia.org/wiki/CNAME_record

    A Canonical Name (CNAME) record is a type of resource record in the Domain Name System (DNS) that maps one domain name (an alias) to another (the canonical name). [1]This can prove convenient when running multiple services (like an FTP server and a web server, each running on different ports) from a single IP address.

  6. tcsh - Wikipedia

    en.wikipedia.org/wiki/Tcsh

    Alias argument selectors; the ability to define an alias to take arguments supplied to it and apply them to the commands that it refers to. Tcsh is the only shell that provides this feature (in lieu of functions). \!# - argument selector for all arguments, including the alias/command itself; arguments need not be supplied.

  7. ifconfig - Wikipedia

    en.wikipedia.org/wiki/Ifconfig

    Linux also features iwspy, to read the signal, noise and quality of a wireless connection. Other related tools for configuring Ethernet adapters are: ethtool, mii-tool, and mii-diag in Linux and the command dladm show-link in Solaris. The ip suite has a similar purpose and is meant to replace the deprecated ifconfig. [6]

  8. Bash (Unix shell) - Wikipedia

    en.wikipedia.org/wiki/Bash_(Unix_shell)

    In Linux, if the script was executed by a regular user, the shell would attempt to execute the command rm -rf / as a regular user, and the command would fail. However, if the script was executed by the root user, then the command would likely succeed and the filesystem would be erased.

  9. Aliasing (computing) - Wikipedia

    en.wikipedia.org/wiki/Aliasing_(computing)

    Aliasing can occur in any language that can refer to one location in memory with more than one name (for example, with pointers).This is a common problem with functions that accept pointer arguments, and their tolerance (or the lack thereof) for aliasing must be carefully documented, particularly for functions that perform complex manipulations on memory areas passed to them.