Brief introduction
In the past, the security mechanism of the system was controlled by a single user (root). The root user determines who can log in, who can access data, which processes have access to kernel mode, and so on. However, the
AIX 5L is an IBM 64-bit UNIX version with strong Linux bias. Specifically for applications, database, and transaction services designed AIX 5L ("L" for Linux) is a versatile server operating system that provides the ability to work together between 3
Introduction: Find out more about the system by looking at the open file. Knowing which files the application has opened or which application opens a particular file, as a system administrator, will allow you to make better decisions. For example,
Introduction: This article explains in detail how to enable and use Non-default encryption types such as "Aes128-cts" in the Kerberos settings (ibm®network authentication Service). Also explains why each step is performed. This content helps the
Introduction: In this series of articles, we will introduce you and discuss with you the relevant content of role-based access control (role Based access controls). As a new security feature of AIX 6, RBAC provides users with fine-grained, more
1. Specify Tape characteristics
When you do not specify any tape attributes, the Ufsdump command uses a collection of default values. You can specify the cartridge (-c), density (-D), size (-s), and number of tracks (-T). Note You can specify
Restrict User Directory usage space
Modify/etc/vfstab to change the mount options for the file system that need to be restricted to RQ
To the top of the file system, execute commands touch quotas and chmod quotas
Quotaon-v-A
Set the
File system is the most closely related to the user in the entire UNIX system, the user operates the most frequent part, along with the system running time continues, the file system usage efficiency also follows down, this main performance is: The
Not every place running Solaris operating System has the resources to backup the solution, and they don't even need those resources, such as expensive tape-changer, tape library, or Tape Silo. What is usually needed is a backup or ufsdump of the
The disk and buffer Ndisk are the number of disk drives connected to the system. It is set at boot time. Nbuf the number of 1K system buffers allocated at boot time. These buffers are in a data cache.
This data cache is a memory array that contains
22. Question: SCO unix5.06 How do I configure DNS?
A: vi/etc/resolv.conf content is: nameserver xxx.xxx.xxx.xxx. XXX.XXX.XXX.XXX is the actual DNS.
23. Question: How does Netscape use it?
Answer: 1. Plus Gateway
Log in as Superuser and type the
The fifth section machine starts the understanding:
1. Start of TCP/IP:
⑴. TCP/IP is controlled by the/etc/tcp script file, starts when you enter the multiuser state, and closes the/etc/tcp file operation when you enter Single-user state: He is a
Chapter One: Systems Concept (System concepts)
Objectives
Upon completion of this module, your should be able to
Match the three parts of a operating system (kernel, shell, and file system) to their definitions
Identify the three most common
(i) hard disk and file resources
The hard disk and CD-ROM devices use a block device interface. The hard disk device files are stored in the/dev directory.
The character device file is stored in the Rdsk subdirectory, and the block device file
Unlike Dos/windows, UNIX files are difficult to recover after being deleted, as determined by the unique UNIX file system architecture. The Unix file directory is not the same as dos/windows, the file is still saved after the deletion of the full
Swap area (swap) is an area that exists on a high speed storage device and is an important part of a virtual memory system. Through the swap area, we are no longer limited to the limited physical memory space, theoretically can expand the virtual
The UNIX operating system is one of the most frequently used operating systems on the network, and using UNIX systems, the machine is much more complicated than the shutdown process using a DOS Single-user machine. If you do not use the correct
Hard link (hard links): Creates an extra entry for a file. when used , there is no difference with the file; when deleted , only links are deleted and files are not deleted;
limitations of hard Links: 1. You cannot refer to documents other than
The Linux directory tree is as follows:
Detailed
/bin: The system has a lot of directories to place the execution file, but/bin is more special. Because/bin is placed in the single maintenance mode can also be manipulated instructions. The
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.