GUIs are great—we wouldn’t want to live without them. But if you’re a Mac or Linux user and you want to get the most out of your operating system (and your keystrokes), you owe it to yourself to get ...
When Apple announced the release of Mac OS X, many Mac users were stunned: here was a new operating system based on the venerable Unix, which, they feared, would call into question the Mac’s legendary ...
User profiles aren’t restricted to what shells your users use, what groups they are members of, and what privileges they have been allocated. While these factors are important, so are when they log in ...
Command-line Perl scripts can make adminstering a UNIX box easier by replacing certain commands with some routine scripts. Find out how to take advantage of this approach. Perl is everywhere. Most ...
Cron is nice and all, but don't forget about its cousin at. When I first started using Linux, it was like being tossed into the deep end of the UNIX pool. You were expected to use the command line ...
Lifehacker reader Michael writes in with a nifty tip that was lurking in our comments all along, but deserves to see the bright light of posting. If you're already using the Unix-like Cygwin, it's an ...
The Kerberos authentication method originated at the Massachusetts Institute of Technology in the 1980s, as part of a project called Athena. The project involved integrating the computers on the MIT ...
How to use awk to select data from commands and scripts Your email has been sent Image: iStock/Inimma-IS Must-read developer coverage What Powers Your Databases? Take This DZone Survey Today!
Solaris and other SVR4 versions of Unix provide file sharing through NFS and the /etc/dfs/dfstab file. The syntax of this particular file permits you to restrict file system sharing to a limited ...