When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. Named pipe - Wikipedia

    en.wikipedia.org/wiki/Named_pipe

    Named pipe. In computing, a named pipe (also known as a FIFO for its behavior) is an extension to the traditional pipe concept on Unix and Unix-like systems, and is one of the methods of inter-process communication (IPC). The concept is also found in OS/2 and Microsoft Windows, although the semantics differ substantially.

  3. Secure Shell - Wikipedia

    en.wikipedia.org/wiki/Secure_Shell

    v. t. e. The Secure Shell Protocol (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network. [1] Its most notable applications are remote login and command-line execution. SSH was designed for Unix-like operating systems as a replacement for Telnet and unsecured remote Unix shell protocols ...

  4. Inter-process communication - Wikipedia

    en.wikipedia.org/wiki/Inter-process_communication

    A grid computing system that connects many personal computers over the Internet via inter-process network communication. In computer science, inter-process communication (IPC), also spelled interprocess communication, are the mechanisms provided by an operating system for processes to manage shared data. Typically, applications can use IPC ...

  5. POSIX - Wikipedia

    en.wikipedia.org/wiki/POSIX

    The Portable Operating System Interface (POSIX; IPA: / ˈpɒz.ɪks / [1]) is a family of standards specified by the IEEE Computer Society for maintaining compatibility between operating systems. [1] POSIX defines both the system and user-level application programming interfaces (APIs), along with command line shells and utility interfaces, for ...

  6. List of Unix systems - Wikipedia

    en.wikipedia.org/wiki/List_of_Unix_systems

    3BSD (1979) UNIX System III (1981) UNIX/V7M (1979) UNIX Time-Sharing System v8 (1985) UNIX Time-Sharing System v9 (1986) UNIX Time-Sharing System v10 (1989) IX Multilevel-Secure UNIX System (1992) The versions leading to v7 are also sometimes called Ancient UNIX. After the release of Version 10, the Unix research team at Bell Labs turned its ...

  7. Unix security - Wikipedia

    en.wikipedia.org/wiki/Unix_security

    A core security feature in these systems is the file system permissions. All files in a typical Unix filesystem have permissions set enabling different access to a file. Unix permissions permit different users access to a file with different privilege (e.g., reading, writing, execution). Like users, different user groups have different ...

  8. hosts (file) - Wikipedia

    en.wikipedia.org/wiki/Hosts_(file)

    The hosts file is one of several system facilities that assists in addressing network nodes in a computer network. It is a common part of an operating system's Internet Protocol (IP) implementation, and serves the function of translating human-friendly hostnames into numeric protocol addresses, called IP addresses, that identify and locate a host in an IP network.

  9. Kerberos (protocol) - Wikipedia

    en.wikipedia.org/wiki/Kerberos_(protocol)

    C. Operating system. Cross-platform. Type. Authentication protocol. Website. web.mit.edu /kerberos /. Kerberos (/ ˈkɜːrbərɒs /) is a computer-network authentication protocol that works on the basis of tickets to allow nodes communicating over a non-secure network to prove their identity to one another in a secure manner.