When.com Web Search

Search results

  1. Results From The WOW.Com Content Network
  2. find (Unix) - Wikipedia

    en.wikipedia.org/wiki/Find_(Unix)

    In Unix-like operating systems, find is a command-line utility that locates files based on some user-specified criteria and either prints the pathname of each matched object or, if another action is requested, performs that action on each matched object.

  3. List of GNU Core Utilities commands - Wikipedia

    en.wikipedia.org/wiki/List_of_GNU_Core_Utilities...

    This is a list of commands from the GNU Core Utilities for Unix environments. These commands can be found on Unix operating systems and most Unix-like operating systems. GNU Core Utilities include basic file, shell and text manipulation utilities. Coreutils includes all of the basic command-line tools that are expected in a POSIX system.

  4. passwd - Wikipedia

    en.wikipedia.org/wiki/Passwd

    However, on modern Unix systems the security-sensitive password information is instead often stored in a different file using shadow passwords, or other database implementations. The /etc/passwd file typically has file system permissions that allow it to be readable by all users of the system ( world-readable ), although it may only be modified ...

  5. Network Information Service - Wikipedia

    en.wikipedia.org/wiki/Network_Information_Service

    A NIS/YP system maintains and distributes a central directory of user and group information, hostnames, e-mail aliases and other text-based tables of information in a computer network. For example, in a common UNIX environment, the list of users for identification is placed in /etc/passwd and secret authentication hashes in /etc/shadow.

  6. Comparison of command shells - Wikipedia

    en.wikipedia.org/wiki/Comparison_of_command_shells

    On Unix systems, the execute permission controls access to invoking the file as a program, and applies both to executables and scripts. As the permission is enforced in the program loader , no obligation is needed from the invoking program, nor the invoked program, in enforcing the execute permission – this also goes for shells and other ...

  7. Unix security - Wikipedia

    en.wikipedia.org/wiki/Unix_security

    Selecting strong passwords and guarding them properly are important for Unix security. [citation needed] On many UNIX systems, user and password information, if stored locally, can be found in the /etc/passwd and /etc/shadow file pair.

  8. The Most Common Password Mistakes (and How to Avoid Them!) - AOL

    www.aol.com/products/blog/the-most-common...

    Failing to change a password – Some experts suggest changing passwords at least once a year. The problem is most people keep the same password forever, and that makes it easier for them to get ...

  9. Gecos field - Wikipedia

    en.wikipedia.org/wiki/Gecos_field

    The gecos field, or GECOS field, is a field in each record in the /etc/passwd file on Unix and similar operating systems.On UNIX, it is the 5th of 7 fields in a record. It is typically used to record general information about the account or its user(s) such as their real name and phone number.