2014年(7)
发布时间:2014-03-21 11:44:51
1. 有哪些问题防火墙策略会有哪些问题,首先得说什么样的策略才是安全上认可的策略,不外乎以下几点:1. 策略配置合理。合理就是源地址、目的地址、开放服务都是最小化的,如果做不到,至少也要目的地址、开放服务是最小化的。2.&n.........【阅读全文】
发布时间:2014-02-20 16:16:03
In Unix, what startup and termination files do the various shells use?Although not a comprehensive list, the following should provide youwith a basic understanding of what startup and shutdown files thevarious Unix shells use.Note: This information comes from the UnixFAQ, which.........【阅读全文】
发布时间:2014-02-20 16:13:36
Bash Reference Manual6.3.1 What is an Interactive Shell?An interactive shellis one started without non-option arguments, unless -s isspecified, without specifying the -c option, andwhose input and error output are bothconnected to terminals (as determined by isatty(3)),or one started .........【阅读全文】
发布时间:2014-02-20 16:07:20
——(O'Reilly) UNIX Power Tools (3rd Edition)3.4 Login Shells, Interactive ShellsEach Unix shell (sh, csh, etc.) can be in interactive mode or noninteractive mode. A shell also can act as a login shell or a nonlogin shell. A shell is a shell is a shell — e.g., a login bash shell is the sam.........【阅读全文】
发布时间:2014-02-20 15:58:47
——(O'Reilly) UNIX Power Tools (3rd Edition)To understand setup files, you need to understand that a shell can act like a login shell or a nonlogin shell (Section 3.4). There are different setup files for nonlogin and login shells.When you log in to a Unix system — but not under a win.........【阅读全文】