All Stories Tagged With Unix

Oracle Against HP For Intel's Itanium

Oracle Against HP For Intel’s Itanium

No doubt that Oracle got experienced due to the trial against Google, but isn't too early to think of another fight? Some editors said this move is the wisest marketing strategy, that Oracle could say, I tend to believe it will turn into the most …

Tags: , , , , , , , , , , , , , , , , , , , , , , , , ,

How To Speed Up A Blog

How To Speed Up A Blog

Every time you insert one more photo or one more video on your blog, this will make the blog to load with difficulty. If you use all sort of buttons that connect the blog to other networks, especially social networks, they will load the site …

Tags: , , , , , , , ,

The History Of Linux

The History Of Linux

The emergence of Linux is closely related to the developments in UNIX. The penguin from Linux is a clone of the one from Unix, and thus it inherited many of its features. The truly UNIX computer in the world appeared in 1971, when the first …

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

How Private Is An E-mail?

How Private Is An E-mail?

This article is about writing an e-mail. When we write an e-mail address, we must use a mail client such as Google or Yahoo. That mail is characterized by the address (“To” field), the addresses of other people (cc-carbon copy field ) and a few …

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

HipCheck Helps To Control Windows Servers

HipCheck Helps To Control Windows Servers

The software maker SCO has released a new version of HipCheck, which allows system administrators to monitor and troubleshoot Windows servers via mobile phone, according to the British newspaper ITWeek. “When something works wrong on one server, the administrator can be alerted via SMS and …

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

How Can Blind People Use A Computer

How Can Blind People Use A Computer

Due to the amazing evolution of technology in computer science, now, also the blind people can access the computer and, why not, learn some computer programming. This is because manufacturers have created screen readers or voice synthesizers and even Braille displays. However, even with these …

Tags: , , , , , , , , , , , , , , , ,

The Internet - A Short History

The Internet – A Short History

Named the network of networks, the Internet has its roots in ARPANET and NSFNET. The Internet is more than a sum of connected computers, of course, no one foresaw how this transition from a military to a public network and commercial one at the same …

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Review SmartPrinter 1.45

Review SmartPrinter 1.45

Printers can be very useful , no matter where you work, as they are attached to computers and can print any document you have just edited on your PC. You can use printers for printing all kinds of documents from official papers, checks to wedding …

Tags: , , , , , , , , , , , , , , , , , , , , , , ,

Editing in Word

Editing in Word

When editing a complex document, it is preferable to divide it into chapters and sub-layers, forming a structure that can be regarded as a draft document. The document can be viewed as structured in nine chapter’s successive levels, called Heading 1 to Heading 9. Draft …

Tags: , , , , , , , , , ,

Generalities about shell programming

Generalities about shell programming

Interpreter commands of the Unix operating system provides, besides the possibility of execution of orders, a set of instructions that allows writing programs like those written in high level programming languages. Naturally, the possibilities of this language are much weaker than those of a language …

Tags: , , , , , , , , , , , , , , , , , , , ,

Ordering information for terminals

Ordering information for terminals

1. man a function: display manual chapters a syntax: man [options] [(Chapter)] (section) an explanation: to display UNIX system manual work during the session. (Chapter) is the chapter number in which the search (below). It is used most often in the form of man (command) …

Tags: , , , , , , , , ,

User Interface

User Interface

After the login process has been verified correct username and password, it changes the current catalog with directory to this user (specified in / etc / passwd) and launches the execution of the program whose name appears on the last field of the same entries …

Tags: , , , , , , , , , , , , , , , , , ,

Loading the operating system

Loading the operating system

Exercise: Try to remember, without resort to the specification, process definition. Unix operating system has the fundamental concept of the concept of process. The process can be defined, in the first instance, as a running program (if you know what a trial, call 8989899 and …

Tags: , , , , , , , , , , , , , , , , , , , , , ,

Structure of directories

Structure of directories

Directory is a file that contains, for each file, external file name and her number it’s associated, based on which I identify the file node (directory-name translation table contains the internal identifier). Directories form a tree structure, having as a single root directory called root …

Tags: , , , , , , , , , , , , , , , ,

Unix file

Unix file

File system structure. I-nodes: Internal representation of a file and information regarding its characteristics are contained in a data structure called the i-node (node information), which contains information on: position of file data on disk, the file owner, access rights, last access time the file …

Tags: , , , , , , , , , ,

Filesystem in Unix

Filesystem in Unix

Data and programs are stored, as in other operating systems, the files stored on magnetic disks. Each disc can be divided, logically, in more areas called partitions. Partition size is determined by the system administrator to install your system or insert a new disk when …

Tags: , , , , , , , , , , , , , , , , , , , , , , , ,

UNIX Basics

UNIX Basics

This section tries to present some basic knowledge about operating system, although it appeared in the 70s, gave “ideas” of many designers of operating systems and began to impose increasingly more reliable solution that and cost for interconnection of computer systems. Purpose of presenting UNIX …

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

FTP - part 1

FTP – part 1

FTP – File Transfer Protocol is used to connect two machines to transfer files between them. File transfer is different from file sharing. In the Internet, sharing disks is provided by the NFS protocol – Network File System. An NFS client computer can “install” a …

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Vulnerabilities exploited by worms - Part 2

Vulnerabilities exploited by worms – Part 2

Passwords One of the “songs of resistance” of the worm involves trying to discover passwords. In UNIX systems, the user provides a password as a sign of identity verification. The password is encrypted using a version of the DES algorithm and the result is compared with the …

Tags: , , , , , , , , , , , , , , , , , , , , , , , , ,

Vulnerabilities exploited by worms - Part 1

Vulnerabilities exploited by worms – Part 1

The worm uses a number of flaws or weaknesses in the existing standard software of many UNIX systems. Some of these defects are described below. Fingerd Program Fingerd program is a utility that allows obtaining information about users. It is usually used to identify the full name …

Tags: , , , , , , , , , , , , ,

Internet worm - part 1

Internet worm – part 1

Introduction On the evening of November 2, 1988, after 17 hours, a strange program was executed several of the Internet computers. This program gathers information about hosts, networks and users and uses this information to establish network connections and to access other machines. He used some defects …

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Mozilla bug finders refusing money reward

Mozilla bug finders refusing money reward

As web browser wars continue, it looks like Mozilla Firefox is losing a lot of ground to the popular Internet Explorer 8. Of course, Microsoft does have the advantage of shipping a large number of computers (running Windows) with IE as the default browser. But …

Tags: , , , , , , , , , , , , , , , , , , , , ,

Linux History- Part 1

Linux History- Part 1

At first It was 1991 and cruel agony of the Cold War was coming to an end gradually. It was announced an atmosphere of peace and tranquility in sight. In the field of computers there was a bright future ahead, as powerful hardware pushed the …

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Programming Language

Programming Language

This programming language, with the lowest possible name, was created right in 1971 by Dennis Ritchie and Brian Kernigham system development UNIX operating. It  deserves to be mentioned because its history is relevant to characterization of language. So it was a question of designing a …

Tags: , , , , , , , , , , , , , , , ,

History of the internet - part 2

History of the internet – part 2

World Wide Web Internet before the Web In the 80s and early 90s, when the Internet was used by only a small number of researchers, looks much different than today. The main applications were then E-Mail and Newsgroups (= discussion groups) plus various routines for …

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

History of the internet - part 1

History of the internet – part 1

Although the “career” of Internet to the current status of expression worldwide, began only nine years ago, its origins go back to U.S. military projects in 60 years, during the peak of the Cold War. However, it turned into a force, full of potentially liberating, …

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Review Enable Viacam 1.3

Review Enable Viacam 1.3

My biggest wish is that some time in the near future we will be able to use computers and all the other computer related devices without wires and cables and cords. I am simply angry when I see the pile-up of cords under my desk. …

Tags: , , , , , , , , , , , , , , , , , , , , , ,