Solaris

Solaris System Device Access Permissions

Solaris is shipped with appropriate permissions assigned to device files such as disk drives, tape drives, and memory. These permissions are discussed here. A word should be said for Sun’s method of indirect references to commonly used devices. For instance, typical disk devices are referenced by SCSI controller and device number, such as /dev/dsk/c0t3d0s0 This …

Solaris System Device Access Permissions Read More »

RAID Theory

RAID: That it is; What it does …………………………………………………………. RAID: The Details ………………………………………………………………………. RAID Type: Concatenation ……………………………………………………… RAID Type: Striping (RAID-0) ………………………………………………… RAID Type: Mirroring (RAID-1) ………………………………………………. RAID Type: Stripping plus Mirroring (RAID-0+1) ………………………….. RAID Type: RAID-5 (Striping with Parity) …………………………………… RAID Comparison: RAID0+1 vs RAID5 ……………………………………… RAID History: The Lost Brothers ……………………………………………………… RAID: That it …

RAID Theory Read More »

The /etc/skel Directory

When a new user account is created with SAM or useradd, default configuration files are copied from the /etc/skel directory to the new user’s home. Several files are included in /etc/skel by default: /etc/skel/.profile                            # ksh/posix local login script /etc/skel/.login                              # csh …

The /etc/skel Directory Read More »

What Happens When a User Logs In?

Well environment variables used to customize a user’s login environment can be defined from the command line, they are more commonly defined by several scripts that execute during the login process. Typically, three scripts execute during the login process to initialize the user’s environment. The first is a system-wide script maintained by the system administrator …

What Happens When a User Logs In? Read More »

Scroll to Top