MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Computers & Electronics / Unix

Magazine articles on Unix.
Old Articles: <Older 51-60 Newer>
Salon.com
November 17, 2000
Jordan Hubbard
Open-sourcing the Apple A hacker reviews the beta release of the BSD-based Mac OS X -- and dreams of toppling Microsoft... mark for My Articles 1166 similar articles
Unix Insider
November 2000
Jim Mauro
The lightweight process pool A system must maintain enough LWPs available for runnable user threads while keeping the pool small enough so that it doesn't waste kernel resources. How can this be done? Jim Mauro examines the mechanics of the LWP resource pool reserved for unbound user threads... mark for My Articles 40 similar articles
Unix Insider
October 2000
Peter Baer Galvin
Decrease your stress Much of a systems administrator's stress comes from unexpected downtime and dissatisfied users. This month in Pete's Super Systems, Pete introduces two free tools that will help reduce the chances of both. He also shares reader email... mark for My Articles 6 similar articles
Unix Insider
October 2000
Mo Budlong
Security basics, Part 1 How to set basic file and directory permissions... mark for My Articles 15 similar articles
Linux Journal
Daniel Lazenby
SAMBA Black Book by Dominic Baines SAMBA Black Book is about providing server message blocks (SMB) networking services in a mixed operating system network. This 13-chapter book offers the reader foundational information, advanced topics and explores administrative issues... mark for My Articles 42 similar articles
Unix Insider
October 2000
Sandra Henry-Stocker
Square one Security experts recommend turning off all network services you don't need in order to guard against possible attacks. But how do you know which services you don't need -- and which ones you do? A helpful breakdown of services that are safe to disable... mark for My Articles 60 similar articles
Unix Insider
October 2000
Jim Mauro
Scheduling in the user threads library, Part 2 How to make use of the scheduling policies available in POSIX threads... mark for My Articles 33 similar articles
RootPrompt.org
October 9, 2000
Sniping at OpenBSD Last week several vulnerabilities with OpenBSD were announced on the full disclosure list Bugtraq. That a hole was found and exploited is not an amazing thing. The amazing and impressive thing is how long OpenBSD had gone without a local root exploit... mark for My Articles 11 similar articles
Unix Insider
September 2000
Peter Baer Galvin
Why aren't you logging? This month Pete discusses a new, must-use feature included in Solaris 7 and 8, and recommends two helpful articles from Sunsolve. mark for My Articles 32 similar articles
Unix Insider
September 2000
Mo Budlong
Traveling down the Unix $PATH Why do some commands need a dot-slash in order to run? In this month's Unix 101 column, Mo Budlong explores the answer to this question, and explains the difference between built-in and executable commands. mark for My Articles 100 similar articles
<Older 51-60 Newer>    Return to current articles.