When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. List of POSIX commands - Wikipedia

    en.wikipedia.org/wiki/List_of_POSIX_commands

    This is a list of POSIX (Portable Operating System Interface) commands as specified by IEEE Std 1003.1-2024, which is part of the Single UNIX Specification (SUS). These commands can be found on Unix operating systems and most Unix-like operating systems.

  3. ethtool - Wikipedia

    en.wikipedia.org/wiki/Ethtool

    ethtool is the primary means in Linux kernel-based operating systems (primarily Linux and Android) for displaying and modifying the parameters of network interface controllers (NICs) and their associated device driver software from application programs running in userspace.

  4. sudo - Wikipedia

    en.wikipedia.org/wiki/Sudo

    The current Linux manual pages for su define it as "substitute user", [9] making the correct meaning of sudo "substitute user, do", because sudo can run a command as other users as well. [10] [11] Unlike the similar command su, users must, by default, supply their own password for authentication, rather than the password of the target user.

  5. SIGHUP - Wikipedia

    en.wikipedia.org/wiki/SIGHUP

    On POSIX-compliant platforms, SIGHUP ("signal hang up") is a signal sent to a process when its controlling terminal is closed. It was originally designed to notify the process of a serial line drop. SIGHUP is a symbolic constant defined in the header file signal.h .

  6. Executable and Linkable Format - Wikipedia

    en.wikipedia.org/wiki/Executable_and_Linkable_Format

    An ELF file has two views: the program header shows the segments used at run time, whereas the section header lists the set of sections.. In computing, the Executable and Linkable Format [2] (ELF, formerly named Extensible Linking Format) is a common standard file format for executable files, object code, shared libraries, and core dumps.

  7. Unix security - Wikipedia

    en.wikipedia.org/wiki/Unix_security

    Sudo command on Ubuntu to temporarily assume root privileges. Most Unix and Unix-like systems have an account or group which enables a user to exact complete control over the system, often known as a root account. If access to this account is gained by an unwanted user, this results in a complete breach of the system.

  8. Single UNIX Specification - Wikipedia

    en.wikipedia.org/wiki/Single_UNIX_Specification

    The Single UNIX Specification (SUS) is a standard for computer operating systems, [1] [2] compliance with which is required to qualify for using the "UNIX" trademark.The standard specifies programming interfaces for the C language, a command-line shell, and user commands.

  9. IPFire - Wikipedia

    en.wikipedia.org/wiki/IPFire

    IPFire is a hardened [3] open source Linux distribution that primarily performs as a router and a firewall; a standalone firewall system with a web-based management console for configuration. IPFire originally started as a fork of IPCop [ 4 ] and has been rewritten on basis of Linux From Scratch since version 2. [ 5 ]