Sponsored Content
Full Discussion: UNIX internal Algorithms
Homework and Emergencies Homework & Coursework Questions UNIX internal Algorithms Post 302739515 by bakunin on Tuesday 4th of December 2012 09:53:23 AM
Old 12-04-2012
Honestly, "Unix internal algorithms" is like "tell me a phone number". As long as you don't get more specific i see little chance of answering anything. I could point you to a list of (quite voluminous) books which cover this (foremost Andrew Tanenbaums "Operating systems"), but this is probably not what you had in mind.

bakunin
These 2 Users Gave Thanks to bakunin For This Post:
 

8 More Discussions You Might Find Interesting

1. Programming

implementation of all sorting algorithms using fork

im new to programming c in unix this is program written by me i want each and every child to do a seperate work such implement a different sorting algorithm but im not getting the way i wrote as below...plz help me how can i do that #include<stdio.h> main() { int i; for(i=0;i<5;i++)... (1 Reply)
Discussion started by: chaitu07
1 Replies

2. Programming

Unix Internal

What is Unix Internals on a Layman's Language.Can I consider Unix Internal expert for a Unix's Position? Thanks (3 Replies)
Discussion started by: Rengi
3 Replies

3. UNIX for Advanced & Expert Users

Unix Internal Question

Hi Guys- Does anyone know how to determine the unix user id that accessed a particular file? For instance, we have a particular file under /usr/var/sample.exe ; I'm executing "ls -ltu /usr/var/sample.exe" and finds out that it has been accessed recently. How could i find out the user id that... (2 Replies)
Discussion started by: marlonus999
2 Replies

4. UNIX for Advanced & Expert Users

Forwarding internal internet packets to internal webserver using iptables

Hi, I need to redirect internal internet requests to a auth client site siting on the gateway. Currently users that are authenticated to access the internet have there mac address listed in the FORWARD chain. All other users need to be redirected to a internal site for authentication. Can... (1 Reply)
Discussion started by: mshindo
1 Replies

5. UNIX for Advanced & Expert Users

password hashing algorithms

I'm collecting some info on the password hashing algorithms in use on various Unix systems. So far I have: no $ legacy unix crypt $1$ MD5 $2$ Blowfish on BSD $2a$ alternate Blowfish on BSD $md5$ Sun's alternate MD5 $3$ a Microsoft hash $4$ not used? $5$ RedHat proposed Sha-256... (2 Replies)
Discussion started by: Perderabo
2 Replies

6. Programming

Algorithms for Parallel Processing

Hey, I just wanted to know how many algorithms there are that cannot be accelerated by parallel processing. I know one such algorithm is Euclid's Algorithm (for GCF). does anyone know any other algorithms that cannot be accelerated by pp? if so please list the names and a general sentence of what... (2 Replies)
Discussion started by: azar.zorn
2 Replies

7. Shell Programming and Scripting

for loop with internal unix command in statement throwing error

Hi I've gotten a plugin script that won't run. I keeps throwing an error at the following line. for BARCODE_LINE in `cat ${TSP_FILEPATH_BARCODE_TXT} | grep "^barcode"` do #something done The error reads ... (3 Replies)
Discussion started by: jdilts
3 Replies

8. AIX

Disable any 96-bit HMAC Algorithms

Received a vulnerability - SSH INSECURE HMAC ALGORITHMS ENABLED. The solution was to Disable any 96-bit HMAC Algorithms. Disable any MD5-based HMAC Algorithms. Can someone please tell me how to disable in AIX 5.3? Thanks, Sudo (1 Reply)
Discussion started by: sudo su
1 Replies
CHFN(1) 						      Linux Reference Manual							   CHFN(1)

NAME
chfn - change your finger information SYNOPSIS
chfn [ -f full-name ] [ -o office ] [ -p office-phone ] [ -h home-phone ] [ -u ] [ -v ] [ username ] DESCRIPTION
chfn is used to change your finger information. This information is stored in the /etc/passwd file, and is displayed by the finger pro- gram. The Linux finger command will display four pieces of information that can be changed by chfn : your real name, your work room and phone, and your home phone. COMMAND LINE Any of the four pieces of information can be specified on the command line. If no information is given on the command line, chfn enters interactive mode. INTERACTIVE MODE In interactive mode, chfn will prompt for each field. At a prompt, you can enter the new information, or just press return to leave the field unchanged. Enter the keyword "none" to make the field blank. OPTIONS
-f, --full-name Specify your real name. -o, --office Specify your office room number. -p, --office-phone Specify your office phone number. -h, --home-phone Specify your home phone number. -u, --help Print a usage message and exit. -v, --version Print version information and exit. SEE ALSO
finger(1), passwd(5) AUTHOR
Salvatore Valente <svalente@mit.edu> chfn October 13 1994 CHFN(1)
All times are GMT -4. The time now is 06:56 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy