FA
Today, Saturday، 28 Dec 2024 - 06:17
Mokhafaf

Acronym Finder

ENV
What is ENV ?
Environment
Env is a command shell, Unix operating system, Unix, Unix-like is to print a list of environment variable, or run another tool in an environment is no need to edit the current environment....
passwd
What is passwd ?
Password
passwd the name of a program in most operating systems, Unix and Unix-like by which users can have their passwords changed. Password that the user entered. using a key derivation function for Tangled has been released when this version of UAE are stored. According to the security reasons, the original version of the password will not be stored and only version of UAE are stored. When the user enters the system. password while log in to enter again using the same key derivation function for UAE visit it, and the result of the operation with a version that saved to a. if equal. the user login to the system is reduced.

file /etc/passwd includes information related to the users of the system. In this file, for any new user that define a line be added that each line of the seven fields, of the fields with the character ‘:’ separated.

this field from the following are:

field first: the name of the user, this is the name for the log is used.

field two: this field contains the password of the user. The password for the encryption has been written to be selective.

field three: the UID of the user. In the systems unix-base every user a number of unique.(Something like number, ID cards or student number)

the fourth field is the group identifier. Each user, at least a member of a group and that each group together a number of exclusive.

field V: for this field to another field, is divided into with ‘,’ separated.

field of the first: containing the full name and the real user is (when you send and receive email, the name is displayed.)

field two: room number of the user.

field three: work phone a user

the fourth field is the phone number of the user's home

field V:other information

the sixth field is the full path to the user's home directory.( The home directory where the user has full access to it, and files his personal as much maintenance.)

field seventh: the full path of the Shell (shell) Default User, this field can be written.

field the second that contains password encryption, the user can empty. In this case, there is no password for the authentication of the user question not be. In the event that this field is empty. some of the programs that the file /etc/passwd to read, etc. might that allow any access to the user." If the field password contains a character ‘x’ (for small). password, the real user in the file /etc/shadow is stored. In this case, the file /etc/shadow must contain a line for this user, otherwise the user name, non-valid to be considered.

if this field contains any other field. with its string, like a password encrypted would be dealt with.

field V by some applications like finger is used.

the sixth field is the represents the home directory of the user. Home directory of the user where when the user to be logged in there are. App login of this field is for the amount of this to the environment variable $HOME.

field, the seventh characteristic of the shell default user. Of course, you can address every other program take the time to write. In this case, program it to when user login will be implemented. If this field is blank, the shell by default, which is usually /bin/sh is for the user are considered.

file /etc/passwd - is a backup of this file....
SU
What is SU ?
Switch User
su (derived from the Switch User) command widely used on the operating systems Unix and Unix-like direction, going from the account of the current user account to another user.

su sometimes as for "spoof user" or "set user" are also used; because this command. account current to another user change. Also, some cases, also to confuse the "superuser" refers to. because in most cases, to switch, to account Root (root) is used.

on the desktops GNOME and KDE to run programs that access level, the user need root. a window opens that user to run the program, have it Password the root user will give....
WHOAMI
What is WHOAMI ?
Who Am I
whoami is a command-line command that most operating systems Unix-like and also operating system, Windows Vista, Windows 7, Windows 8, Windows Server 2003 there. The name of this recipe from the phrase \"Who am I?\" Means \"Who Am I\" to come. This command is the name of the user running it prints....
BC
What is BC ?
Basic Calculator
. Derived from the first letters of the words English, basic calculator (calculators basic) is a language of the machine arithmetic with arbitrary precision and is somehow similar to the programming language of SI. The BBC, usually as a language process, blogging, mathematics, or a shell, and the mathematics Interactive to be handled....
GREP
What is GREP ?
Globally search a Regular Expression and Print
grep is an application, the command line is to search out the data and find the lines that an expression matches. is used. Grep was originally for the operating system of Unix was written, but nowadays, for all operating systems, Unix-like available. The name of the grep from the Command g/re/p in the text editor Ed comes in. (Stands for globally search a regular expression and print means a expression for the global search, and print) that perform the same task: a file (or standard input, or any other) for global search and lines that an expression matches are found, and in the standard output prints.

in the editor ed, which, by Ken Thomson written. grammatical there were lines that contain a particular pattern were printed. Ken Thomson program grep to be independent, to do this, the design will need to ed. In the tips page that in Version 4 of Unix. there is an official date create grep quarter April 1973 are listed.

grep the files that arguments have been specified, or the input . to find lines that contain an expression are search. (If in the arguments file was not specified). Lines found on the standard output print. For example, suppose a text file called fruitlist.txt we have that the number of fruit in which it is written. Want lines that contain the word apple, are we find:

grep apple fruitlist.txt
matching when that occurs, the sequence of characters detected. For example, lines that include pineapple and apples are, regardless of border, that between the words there printed. (Assuming the lines in the file, exist)

however, the pattern of that in the argument specified to be case-sensitive. So in the above example, if the linear contains the word Apple (with the letter A) exist, then the line cannot be detected. Unless in that line, besides the word Apple., the word apple also exist. Can be the capability of being sensitive to large and small letters by specifying the option -i in command line off.

at the command line can be multiple files for a specific search. For example, to search out all the files that name them .txt termination. can be * used:

grep apple *.txt
of phrases can be used for searching patterns of text more advanced. For example, to find all the lines that with the letter a start can be followed by any character enviable, have to be placed and then ple come. you can use the following command.

grep ^a.ple fruitlist.txt
As said before, the grep command in the editor ed, there was that to do the same, were used. Before the program, independent grep to search for file arise, etc. to search for a template, should such a thing was done:

ed fruitlist.txt
g/^a.ple/p
q
the first recipe file in editor opens. Recipe of the second pattern have been asked to search and makes the results in the printed page. Ordered the third time from the editor exits.

External links [edit] grep also can be options on the command line to receive this option, the behavior of grep to specify. For example, the option-l (letter L) makes up the grep instead of lines containing the pattern to be printed. name of the file in which the desired line is located, in print.

...
YMSGR
What is YMSGR ?
Yahoo! Messenger
Yahoo! Messenger or Instant Messenger, Yahoo! (ymsgr), the software that it user with another user, can be found in every corner of the world for online conversation. Unlike email, etc. the conversations in this software, immediately after sending the can be displayed.

usually, the company Yahoo about the changes, in writing, the new software, something does not publish. 5 August 2016, the company, Yahoo officially announced of the program announced, and there's always the app unusable....
EXT2
What is EXT2 ?
Second Extended Filesystem
ext2, who know the phrase, the second file system developed. the name of a file system for the Linux kernel, which is originally by Remy card as a replacement for a file system developed was designed. Implement conventional, the file system, etc. called ext2fs in the Linux kernel. The other implementation (that in the quality and integrity of differences) in GNU Hurd, etc. ^ " extension writing Part 3, Darwin, some of the cores, SMS, and Microsoft Windows is available. 2 in some Linux distros, such as Debian and Red Hat, as the File System Default was used before by the file system of the newer 3 was replaced. 3 almost completely with 2 is compatible and in addition to the capability of journaling, too, is equipped with that, debug and debug, it is more convenient. however, still 2 for the storage media based on Flash, such as SD card and USB flash drive is used, etc. Because the capability of journaling in such media enhances the performance, and not be on these media can only be a certain number of practice write did, and so the ability to use a journaling reduces the life of such media....