file system

Want to know file system? we have a huge selection of file system information on alibabacloud.com

Understanding AIX Advanced Features: Easy role-based access control

Brief introduction In the past, the security mechanism of the system was controlled by a single user (root). The root user determines who can log in, who can access data, which processes have access to kernel mode, and so on. However, the

AIX 5L: Multi-purpose server operating system

AIX 5L is an IBM 64-bit UNIX version with strong Linux bias. Specifically for applications, database, and transaction services designed AIX 5L ("L" for Linux) is a versatile server operating system that provides the ability to work together between 3

Use Lsof to find open files

Introduction: Find out more about the system by looking at the open file. Knowing which files the application has opened or which application opens a particular file, as a system administrator, will allow you to make better decisions. For example,

Configuring IBM NAS version 1.4.0.7 for AIX using a Non-default encryption type

Introduction: This article explains in detail how to enable and use Non-default encryption types such as "Aes128-cts" in the Kerberos settings (ibm®network authentication Service). Also explains why each step is performed. This content helps the

role-based access Control in Aix, part 1th

Introduction: In this series of articles, we will introduce you and discuss with you the relevant content of role-based access control (role Based access controls). As a new security feature of AIX 6, RBAC provides users with fine-grained, more

SUN Solaris File System backup and recovery (ufsdump Ufsrestore)

1. Specify Tape characteristics When you do not specify any tape attributes, the Ufsdump command uses a collection of default values. You can specify the cartridge (-c), density (-D), size (-s), and number of tracks (-T). Note You can specify

Setting up the use of the Solaris User directory and hard disk space

Restrict User Directory usage space Modify/etc/vfstab to change the mount options for the file system that need to be restricted to RQ To the top of the file system, execute commands touch quotas and chmod quotas Quotaon-v-A Set the

Improve the use efficiency of the Solaris file system

File system is the most closely related to the user in the entire UNIX system, the user operates the most frequent part, along with the system running time continues, the file system usage efficiency also follows down, this main performance is: The

Solaris: Configuring a SCSI tape drive on the enterprise server

Not every place running Solaris operating System has the resources to backup the solution, and they don't even need those resources, such as expensive tape-changer, tape library, or Tape Silo. What is usually needed is a backup or ufsdump of the

The significance of the core parameters of SCO Unix System

The disk and buffer Ndisk are the number of disk drives connected to the system. It is set at boot time. Nbuf the number of 1K system buffers allocated at boot time. These buffers are in a data cache. This data cache is a memory array that contains

SCO Advanced Level of UNIX (iii)

22. Question: SCO unix5.06 How do I configure DNS? A: vi/etc/resolv.conf content is: nameserver xxx.xxx.xxx.xxx. XXX.XXX.XXX.XXX is the actual DNS. 23. Question: How does Netscape use it? Answer: 1. Plus Gateway Log in as Superuser and type the

Understanding of SCO Unix Machine startup

The fifth section machine starts the understanding: 1. Start of TCP/IP: ⑴. TCP/IP is controlled by the/etc/tcp script file, starts when you enter the multiuser state, and closes the/etc/tcp file operation when you enter Single-user state: He is a

Solaris Training Chapter I: System concepts

Chapter One: Systems Concept (System concepts) Objectives Upon completion of this module, your should be able to Match the three parts of a operating system (kernel, shell, and file system) to their definitions Identify the three most common

Solaris data Backup and transfer tools

(i) Data device name 1. Tape Type Device Name Capacity Machine type 8mm D8112 5G 8205 8mm D8160 7G 8505-8705 8mm D8170 20G 8900 4mm

Solaris File System Management

(i) hard disk and file resources The hard disk and CD-ROM devices use a block device interface. The hard disk device files are stored in the/dev directory. The character device file is stored in the Rdsk subdirectory, and the block device file

Recovery strategy of deleted files in Unix system

Unlike Dos/windows, UNIX files are difficult to recover after being deleted, as determined by the unique UNIX file system architecture. The Unix file directory is not the same as dos/windows, the file is still saved after the deletion of the full

Management of the UNIX system swap area

Swap area (swap) is an area that exists on a high speed storage device and is an important part of a virtual memory system. Through the swap area, we are no longer limited to the limited physical memory space, theoretically can expand the virtual

Five ways to shut down UNIX systems

The UNIX operating system is one of the most frequently used operating systems on the network, and using UNIX systems, the machine is much more complicated than the shutdown process using a DOS Single-user machine. If you do not use the correct

Hard links and symbolic links for Linux

Hard link (hard links): Creates an extra entry for a file.  when used , there is no difference with the file; when deleted , only links are deleted and files are not deleted; limitations of hard Links: 1. You cannot refer to documents other than

Introduction to the Linux directory tree

The Linux directory tree is as follows: Detailed /bin: The system has a lot of directories to place the execution file, but/bin is more special. Because/bin is placed in the single maintenance mode can also be manipulated instructions. The

Total Pages: 55 1 .... 46 47 48 49 50 .... 55 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.