Sponsored Content
Full Discussion: UNIX question
Top Forums UNIX for Dummies Questions & Answers UNIX question Post 302749767 by tamer11007 on Saturday 29th of December 2012 11:43:01 AM
Old 12-29-2012
Linux UNIX question

Pleas I want answer this question or reference or link website can find answer to
this question?



1. We consider that we are running on a UNIX system which uses ACL as a mechanism for file protection. Where is the protection information of the file stored?

2. In UNIX, each device is represented by a device, give an example of a file representing the hard disk storage device. Give the full listing of this file using the "ls -l" command. What are the protection flags (rwx) for this file and WHY are they like this? What would happen if the protection flags were equal to rw-rw-rw ?

3. What is the definition of MAC Times for UNIX systems? provide an example about the difference between the M flag and C flag.

4. A system administrator suspects that there is an attack on his machine; he needs to make a backup of the files to check when they have been modified. For this purpose he uses the "cp -r" instruction to copy the root directory. What is the problem with this and what other instruction should the administrator use in order to avoid this problem?

------------------------------------------------

1. What is a "two-factor" authentication?
2. Provide a full example of two-factor authentication where one factor is a password.
3. Could we use the mobile phone as part of this two-factor authentication?
4. Is "google" authentication a two-factor authentication system? What is the main problem with this device?


-----------------------------------------------
I am find answer when search on internet but i can't find all "Full Answer "

Pleas help me............. I need this information
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

unix question

How might you look at the last mail message someone sent you , without running the mail utility? (1 Reply)
Discussion started by: swetha
1 Replies

2. IP Networking

unix to unix serial connection question

hi there i'm a new bie just got few simple questions to ask. I got expert in windows configuration but totally new to unix environment . I want to make sure a com port (com1) is working, so I connect a 9-pin cable (CB9) for both PC using Unix environment (unix to unix). The question are (1)... (1 Reply)
Discussion started by: typsam
1 Replies

3. UNIX for Dummies Questions & Answers

Unix 10.2 question

I'm a verteran to Windows but i newbie to UNIX so i hope this isn't too dumb of a question. I have an HP 9000 D Class Server that has 10.2 and uses a console. The console died and i was told i can put a standard EISA video card in it and use a regualr monitor and keyboard. My question is how do i... (5 Replies)
Discussion started by: egress1
5 Replies

4. UNIX for Dummies Questions & Answers

Unix History Question: Why are filenames/dirnames case sentsitive in Unix?

I tried looking for the answer online and came up with only a few semi-answers as to why file and directory names are case sensitive in Unix. Right off the bat, I'll say this doesn't bother me. But I run into tons of Windows and OpenVMS admins in my day job who go batty when they have to deal... (3 Replies)
Discussion started by: deckard
3 Replies

5. UNIX for Dummies Questions & Answers

Question about unix

Hey everyone i am new to unix as well, has anybody heard of the script that allows you screen to look just like the Windows screen, if yea, what is it? (3 Replies)
Discussion started by: Gueso
3 Replies

6. Solaris

Unix Question

IF A program or database routine is writing in a file laying on unix box then how can be identify the process id which is writing in the file. Please let me know how can we do using root command and without root command? Regards, Shashank (10 Replies)
Discussion started by: TAPARIA
10 Replies

7. UNIX for Dummies Questions & Answers

a question about UNIX 5.0.6 , help me please

Dear friends I'm really new comer to this place and to this subject you will make me so happy if you help me about these questions: 1- I must install UNIX 5.0.6 because one of my work software will works ONLY on this version , so , I want to know WHERE CAN I DOWNLOAD A COMPELETE PACKAGE OF... (1 Reply)
Discussion started by: mrr53
1 Replies

8. UNIX for Dummies Questions & Answers

Unix question

When you enter your login id and password, what determines what program startsup? Is it always a Unix shell? (3 Replies)
Discussion started by: Alice Klein
3 Replies

9. UNIX for Beginners Questions & Answers

Question on UNIX

Hi, Can you please advise on answers of below 4 questions as I am not sure on the answers. 1. You are porting a C program that interacts over a network with remote systems. The program was originally written on AMD64 Linux. You are migrating it to SPARC Solaris architecture. Question Based on... (1 Reply)
Discussion started by: Vivekit82
1 Replies
CHING(6)							 BSD Games Manual							  CHING(6)

NAME
ching -- the book of changes and other cookies SYNOPSIS
ching [hexagram] DESCRIPTION
The I Ching or Book of Changes is an ancient Chinese oracle that has been in use for centuries as a source of wisdom and advice. The text of the oracle (as it is sometimes known) consists of sixty-four hexagrams, each symbolized by a particular arrangement of six straight (---) and broken (- -) lines. These lines have values ranging from six through nine, with the even values indicating the broken lines. Each hexagram consists of two major sections. The Judgement relates specifically to the matter at hand (e.g., ``It furthers one to have somewhere to go.'') while the Image describes the general attributes of the hexagram and how they apply to one's own life (``Thus the superior man makes himself strong and untiring.'') When any of the lines have the values six or nine, they are moving lines; for each there is an appended judgement which becomes significant. Furthermore, the moving lines are inherently unstable and change into their opposites; a second hexagram (and thus an additional judgement) is formed. Normally, one consults the oracle by fixing the desired question firmly in mind and then casting a set of changes (lines) using yarrow-stalks or tossed coins. The resulting hexagram will be the answer to the question. Using an algorithm suggested by S. C. Johnson, the UNIX oracle simply reads a question from the standard input (up to an EOF) and hashes the individual characters in combination with the time of day, process id and any other magic numbers which happen to be lying around the system. The resulting value is used as the seed of a random number generator which drives a simulated coin-toss divination. The answer is then piped through nroff(1) for formatting and will appear on the standard output. For those who wish to remain steadfast in the old traditions, the oracle will also accept the results of a personal divination using, for example, coins. To do this, cast the change and then type the resulting line values as an argument. The impatient modern may prefer to settle for Chinese cookies; try fortune(6). DIAGNOSTICS
The great prince issues commands, Founds states, vests families with fiefs. Inferior people should not be employed. SEE ALSO
It furthers one to see the great man. BUGS
Waiting in the mud Brings about the arrival of the enemy. If one is not extremely careful, Somebody may come up from behind and strike him. Misfortune. BSD
May 31, 1993 BSD
All times are GMT -4. The time now is 09:47 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy