WOW.com Web Search

Search results

  1. Results from the WOW.Com Content Network
  2. User identifier - Wikipedia

    en.wikipedia.org/wiki/User_identifier

    User identifier. Unix-like operating systems identify a user by a value called a user identifier, often abbreviated to user ID or UID. The UID, along with the group identifier (GID) and other access control criteria, is used to determine which system resources a user can access. The password file maps textual user names to UIDs.

  3. su (Unix) - Wikipedia

    en.wikipedia.org/wiki/Su_(Unix)

    Unix and Unix-like. Type. Command. The Unix command su, which stands for 'substitute user' [1] [2] (or historically 'superuser' [3] [4] ), is used by a computer user to execute commands with the privileges of another user account. When executed it invokes a shell without changing the current working directory or the user environment.

  4. sudo - Wikipedia

    en.wikipedia.org/wiki/Sudo

    www .sudo .ws. sudo ( / suːduː / [4]) is a program for Unix-like computer operating systems that enables users to run programs with the security privileges of another user, by default the superuser. [5] It originally stood for "superuser do", [6] as that was all it did, and it is its most common usage; [7] however, the official Sudo project ...

  5. setuid - Wikipedia

    en.wikipedia.org/wiki/Setuid

    The Unix and Linux access rights flags setuid and setgid (short for set user identity and set group identity) [1] allow users to run an executable with the file system permissions of the executable's owner or group respectively and to change behaviour in directories. They are often used to allow users on a computer system to run programs with ...

  6. List of POSIX commands - Wikipedia

    en.wikipedia.org/wiki/List_of_POSIX_commands

    List of POSIX commands. This is a list of POSIX (Portable Operating System Interface) commands as specified by IEEE Std 1003.1-2008, which is part of the Single UNIX Specification (SUS). These commands can be found on Unix operating systems and most Unix-like operating systems. This is not a comprehensive list of all utilities that existed in ...

  7. who (Unix) - Wikipedia

    en.wikipedia.org/wiki/Who_(Unix)

    A who command that displays the names of users logged in was first implemented within Multics. [1] Later, it appeared in Version 1 Unix [2] and became part of the X/Open Portability Guide since issue 2 of 1987. It was inherited into the first version of POSIX.1 and the Single Unix Specification. [3]

  8. Gecos field - Wikipedia

    en.wikipedia.org/wiki/Gecos_field

    Gecos field. The gecos field, or GECOS field is a field in each record in the /etc/passwd file on Unix and similar operating systems. On UNIX, it is the 5th of 7 fields in a record. It is typically used to record general information about the account or its user (s) such as their real name and phone number.

  9. getent - Wikipedia

    en.wikipedia.org/wiki/Getent

    getent. getent is a Unix command that helps a user get entries in a number of important text files called databases. This includes the passwd and group databases which store user information – hence getent is a common way to look up user details on Unix. Since getent uses the same name service as the system, getent will show all information ...