12-04-2012
Honestly, "Unix internal algorithms" is like "tell me a phone number". As long as you don't get more specific i see little chance of answering anything. I could point you to a list of (quite voluminous) books which cover this (foremost Andrew Tanenbaums "Operating systems"), but this is probably not what you had in mind.
bakunin
These 2 Users Gave Thanks to bakunin For This Post:
8 More Discussions You Might Find Interesting
1. Programming
im new to programming c in unix
this is program written by me i want each and every child to do a seperate work such implement a different sorting algorithm but im not getting the way i wrote as below...plz help me how can i do that
#include<stdio.h>
main()
{
int i;
for(i=0;i<5;i++)... (1 Reply)
Discussion started by: chaitu07
1 Replies
2. Programming
What is Unix Internals on a Layman's Language.Can I consider
Unix Internal expert for a Unix's Position?
Thanks (3 Replies)
Discussion started by: Rengi
3 Replies
3. UNIX for Advanced & Expert Users
Hi Guys-
Does anyone know how to determine the unix user id that accessed a particular file?
For instance, we have a particular file under /usr/var/sample.exe ; I'm executing "ls -ltu /usr/var/sample.exe" and finds out that it has been accessed recently. How could i find out the user id that... (2 Replies)
Discussion started by: marlonus999
2 Replies
4. UNIX for Advanced & Expert Users
Hi,
I need to redirect internal internet requests to a auth client site siting on the gateway. Currently users that are authenticated to access the internet have there mac address listed in the FORWARD chain. All other users need to be redirected to a internal site for authentication.
Can... (1 Reply)
Discussion started by: mshindo
1 Replies
5. UNIX for Advanced & Expert Users
I'm collecting some info on the password hashing algorithms in use on various Unix systems. So far I have:
no $ legacy unix crypt
$1$ MD5
$2$ Blowfish on BSD
$2a$ alternate Blowfish on BSD
$md5$ Sun's alternate MD5
$3$ a Microsoft hash
$4$ not used?
$5$ RedHat proposed Sha-256... (2 Replies)
Discussion started by: Perderabo
2 Replies
6. Programming
Hey, I just wanted to know how many algorithms there are that cannot be accelerated by parallel processing. I know one such algorithm is Euclid's Algorithm (for GCF). does anyone know any other algorithms that cannot be accelerated by pp? if so please list the names and a general sentence of what... (2 Replies)
Discussion started by: azar.zorn
2 Replies
7. Shell Programming and Scripting
Hi
I've gotten a plugin script that won't run. I keeps throwing an error at the following line.
for BARCODE_LINE in `cat ${TSP_FILEPATH_BARCODE_TXT} | grep "^barcode"`
do
#something
done
The error reads
... (3 Replies)
Discussion started by: jdilts
3 Replies
8. AIX
Received a vulnerability - SSH INSECURE HMAC ALGORITHMS ENABLED.
The solution was to Disable any 96-bit HMAC Algorithms. Disable any MD5-based HMAC Algorithms.
Can someone please tell me how to disable in AIX 5.3?
Thanks,
Sudo (1 Reply)
Discussion started by: sudo su
1 Replies