FA
Today, Saturday، 4 May 2024 - 20:35
Mokhafaf

Acronym Finder

CP
What is CP ?
Copy
cp (derived from the copy) is a command on the operating systems Unix or Unix-like is to create a copy of a file or a folder in a specific route to work goes. New records can be the same name or a different name with the original file....
MV
What is MV ?
Move
mv (move) is a command on the operating systems Unix or Unix-like that for the displacer, a (PC) or a folder to the path of specific goes to work....
CHROOT
What is CHROOT ?
Change Root
chroot is a command and also a recall system in operating systems Unix-like in which the root directory of a process running and also all its descendants will change. chroot stands for change root, and means a change to the root directory. When the root directory of a process is changed. the desired process can not access files outside of that directory are supposed to have access. In other words, the ... the desired process in the root directory of your new could be imprisoned, and all the relative paths, based on the root directory of the new translation are, and the path / time equivalent to the root directory will be the new. Recall, the system chroot() the first time during the development of Version 7 Unix in 1979 was introduced. On 18 March 1982 and 17 months before the release of the 4. the 2 SS. Bill Joy, the recall system in order to test system compile and install, the operating system, adding. Of chroot can be used to create and host a copy of the independent, and the virtual system....
ENV
What is ENV ?
Environment
Env is a command shell, Unix operating system, Unix, Unix-like is to print a list of environment variable, or run another tool in an environment is no need to edit the current environment....
passwd
What is passwd ?
Password
passwd the name of a program in most operating systems, Unix and Unix-like by which users can have their passwords changed. Password that the user entered. using a key derivation function for Tangled has been released when this version of UAE are stored. According to the security reasons, the original version of the password will not be stored and only version of UAE are stored. When the user enters the system. password while log in to enter again using the same key derivation function for UAE visit it, and the result of the operation with a version that saved to a. if equal. the user login to the system is reduced.

file /etc/passwd includes information related to the users of the system. In this file, for any new user that define a line be added that each line of the seven fields, of the fields with the character ‘:’ separated.

this field from the following are:

field first: the name of the user, this is the name for the log is used.

field two: this field contains the password of the user. The password for the encryption has been written to be selective.

field three: the UID of the user. In the systems unix-base every user a number of unique.(Something like number, ID cards or student number)

the fourth field is the group identifier. Each user, at least a member of a group and that each group together a number of exclusive.

field V: for this field to another field, is divided into with ‘,’ separated.

field of the first: containing the full name and the real user is (when you send and receive email, the name is displayed.)

field two: room number of the user.

field three: work phone a user

the fourth field is the phone number of the user's home

field V:other information

the sixth field is the full path to the user's home directory.( The home directory where the user has full access to it, and files his personal as much maintenance.)

field seventh: the full path of the Shell (shell) Default User, this field can be written.

field the second that contains password encryption, the user can empty. In this case, there is no password for the authentication of the user question not be. In the event that this field is empty. some of the programs that the file /etc/passwd to read, etc. might that allow any access to the user." If the field password contains a character ‘x’ (for small). password, the real user in the file /etc/shadow is stored. In this case, the file /etc/shadow must contain a line for this user, otherwise the user name, non-valid to be considered.

if this field contains any other field. with its string, like a password encrypted would be dealt with.

field V by some applications like finger is used.

the sixth field is the represents the home directory of the user. Home directory of the user where when the user to be logged in there are. App login of this field is for the amount of this to the environment variable $HOME.

field, the seventh characteristic of the shell default user. Of course, you can address every other program take the time to write. In this case, program it to when user login will be implemented. If this field is blank, the shell by default, which is usually /bin/sh is for the user are considered.

file /etc/passwd - is a backup of this file....
SU
What is SU ?
Switch User
su (derived from the Switch User) command widely used on the operating systems Unix and Unix-like direction, going from the account of the current user account to another user.

su sometimes as for "spoof user" or "set user" are also used; because this command. account current to another user change. Also, some cases, also to confuse the "superuser" refers to. because in most cases, to switch, to account Root (root) is used.

on the desktops GNOME and KDE to run programs that access level, the user need root. a window opens that user to run the program, have it Password the root user will give....
WHOAMI
What is WHOAMI ?
Who Am I
whoami is a command-line command that most operating systems Unix-like and also operating system, Windows Vista, Windows 7, Windows 8, Windows Server 2003 there. The name of this recipe from the phrase \"Who am I?\" Means \"Who Am I\" to come. This command is the name of the user running it prints....
BC
What is BC ?
Basic Calculator
. Derived from the first letters of the words English, basic calculator (calculators basic) is a language of the machine arithmetic with arbitrary precision and is somehow similar to the programming language of SI. The BBC, usually as a language process, blogging, mathematics, or a shell, and the mathematics Interactive to be handled....