LinuxLinks.com
Newbies What Next ? News Forums Calendar

Search





News Sections
Home
General News (3973/0)
Reviews (628/0)
Press Releases (464/0)
Distributions (187/0)
Software (875/0)
Hardware (522/0)
Security (192/0)
Tutorials (345/0)
Off Topic (181/0)


User Functions
Username:

Password:

Don't have an account yet? Sign up as a New User


Events
There are no upcoming events




Linux Guide - I

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
  • install
    copies files while setting their permission modes and, if possible, their owner and group.
     
  • IANA
    Internet Assigned Names (Numbers?) Authority; part of Internet governance
     
  • icon
    A little graphic used in conjunction with a GUI. A well-designed icon is supposed to be an obvious, unmistakable symbol of whatever it stands for and occupy much less space than do the equivalent words
     
  • ICQ
    a program which allows Internet users to exchange messages in near-real-time with other users in a fairly unsecure manner
     
  • IESG
    Internet Engineering Steering Group
     
  • IMAP
    Internet Message Access Protocol: It is a method of accessing electronic mail or bulletin board messages that are kept on a (possibly shared) mail server.
     
  • inetd
    Berkeley daemon program that listens for connection requests or messages for certain ports and starts server programs to perform the services associated with those ports
     
  • Init
    The first process to run after the system boots and always has a process id of 1. It is responsible for starting the system in single user mode or spawning a shell to read the startup files. It opens ports that are designated as login ports and spawns getty processes for each on
     
  • inode
    A data structure holding information about files in a Unix file system. There is an inode for each file and a file is uniquely identified by the file system on which it resides and its inode number on that system. Each inode contains the following information: the device where the inode resides, locking information, mode and type of file, the number of links to the file, the owner's user and group ids, the number of bytes in the file, access and modification times, the time the inode itself was last modified and the addresses of the file's blocks on disk
     
  • inode number
    a unique number associated with each filename. This number is used to look up an entry in the inode table which gives information on the type, size, and location of the file and the userid of the owner of the file
     
  • input
    Data entered into a computer system to be processed by a program
     
  • insert mode
    In vi, the mode that allows you to type new text in front of existing text in a file; terminate this mode by pressing ESC
     
  • install
    To connect a piece of hardware to a computer system; to place the program files of a piece of software in a directory, where they can be executed
     
  • interactive processing
    Performance of tasks on a computer system that involves continual exchange of information between the computer and a user; the opposite of batch processing
     
  • Interpreted language
    An interpreted language depends on an interpreter program that reads the source code and translates it on the fly into computations and system calls. The source has to be re-interpreted (and the interpreter present) each time the code is executed. Interpreted languages tend to be slower than compiled languages, and often have limited access to the underlying operating system and hardware. On the other hand, they tend to be easier to program. See Compiled language and P-code language
     
  • Interrupts
    Interrupts are signals sent by devices which are received by the operating system and then processed. A device driver is responsible for handling the information that is received.
     
  • Intranet
    descriptive term being used for the implementation of Internet technologies within a corporate organisation, rather than for external connection to the global Internet
     
  • Intrusion detection
    The ability to detect people trying to compromise your system. Intrusion detection is divided into two main categories, host based, and network based.
     
  • IP aliasing
    provides the possibility of setting multiple network addresses on the same low-level network device driver (e.g two IP addresses in one Ethernet card)
     
  • IP Filtering Firewalls
    works at the packet level. It is designed to control the flow of packets based the source, destination, port and packet type information contained in each packet
     
  • IP Masquerade
    A networking function in Linux similar to one-to-many NAT (Network Address Translation) found in many commercial firewalls and network routers. IP Masquerade allows other "internal" computers connected to this Linux box (via PPP, Ethernet, etc.) to also reach the Internet as well. Linux IP Masquerading allows for this functionality even though these internal machines don't have an officially assigned IP addresses
     
  • IP spoofing
    IP Spoofing is a complex technical attack that is made up of several components. It is a security exploit that works by tricking computers in a trust-relationship that you are someone that you really aren't. There is an extensive paper written by daemon9, route, and infinity in the Volume Seven, Issue fourty-Eight issue of Phrack Magazine.
     
  • IP-Accounting
    keeps track of IP network traffic, packet logging and produces some statistics
     
  • IP-Masquerading
    a developing networking function in Linux. If a Linux host is connected to the Internet with IP Masquerade enabled, then computers connecting to it (either on the same LAN or connected with modems) can reach the Internet as well, even though they have no official assigned IP addresses
     
  • ipchains
    inserts and deletes rules from the kernel's packet filtering section
     
  • IPng
    IP Next Generation: a new version of IP which is designed to be an evolutionary step from IPv4. It is a natural increment to IPv4. IPng is a new version of IP which is designed to be an evolutionary step from IPv4. It is a natural increment to IPv4. It can be installed as a normal software upgrade in internet devices and is interoperable with the current IPv4. Its deployment strategy was designed to not have any "flag" days. IPng is designed to run well on high performance networks (e.g., ATM) and at the same time is still efficient for low bandwidth networks (e.g., wireless). In addition, it provides a platform for new internet functionality that will be required in the near future.
     
  • IPP
    Internet Printing Protocol. A new HTTP-like protocol for sending files to a network printer
     
  • IPX/SPX
    Internet Packet Exchange/Sequenced Packet Exchange - a proprietary protocol stack developed by Novell and based on Xerox Network Systems (XNS) protocol
     
  • IrNET
    A protocol allowing to carry TCP/IP traffic between two IrDA peers in an efficient fashion. It is a thin layer, passing PPP packets to IrTTP and vice versa. It uses PPP in synchronous mode, because IrTTP offer a reliable sequenced packet service (as opposed to a byte stream). In fact, you could see IrNET as carrying TCP/IP in a IrDA socket, using PPP to provide the glue.

Key:  Commands - People - General


Last Updated Saturday, December 04 2004 @ 10:58 AM EST


We have written a range of guides highlighting excellent free books for popular programming languages. Check out the following guides: C, C++, C#, Java, JavaScript, CoffeeScript, HTML, Python, Ruby, Perl, Haskell, PHP, Lisp, R, Prolog, Scala, Scheme, Forth, SQL, Node.js (new), Fortran (new), Erlang (new), Pascal (new), and Ada (new).


Group Tests
All Group Tests

Top Free Software
5 Office Suites
7 Document Processors
6 Lean Desktops
6 Desktop Search
9 Project Management
9 Groupware Apps
14 File Managers
10 Databases
21 Backup Tools
21 DVD Tools
21 Window Managers
21 Productivity Tools
9 Terminal Emulators
21 Financial Tools
21 Text Editors
21 Video Emulators
21 Home Emulators
42 Graphics Apps
6 CAD Apps
42 Scientific Apps
10 Web Browsers
42 Email Apps
12 Instant Messaging
10 IRC Clients
7 Twitter Clients
12 News Aggregators
11 VoIP Apps
11 Remote Display Apps
42 Best Games
42 More Games
21 More Games
21 Notable Games (1)
21 Notable Games (2)
21 Notable Games (3)
8 ASCII Games
9 Educational Games
42 Audio Apps
42 Video Apps
6 Screencasting Apps
80 Security Apps
9 System Monitoring
6 Family History Apps
11 PDF Tools
6 Music Servers
6 Collection Managers
7 Calculator Apps
8 Geometry Apps
Free Console Apps
14 Multimedia
Programming
8 Compilers
9 IDEs
9 Debuggers
7 Revision Control Apps
6 Doc Generators
'Free' Proprietary
21 Closed-Source Apps
Top Commercial Apps
42 Games
Free Web Software
21 Web CMS
14 Wiki Engines
8 Blog Apps
6 eCommerce Apps
5 Human Resource Apps
10 ERP
10 CRM
6 Data Warehouse Apps
8 Business Intelligence
6 Point-of-Sale

All Group Tests

Other Articles
Migrating from Windows
Back up your data
Distribution Guide
Distro Portal Pages
20 Free Linux Books
Running Linux Under Windows


Older Stories
Sunday 07/06
  • Mobile Phone Management Made Easy (0)

  • Saturday 06/28
  • Easy File Comparisons With These Great Free Diff Tools (0)
  • 9 ASCII Games You'll Want to Play Again and Again (0)

  • Friday 06/13
  • 12 Remarkable Free Shell Scripting Books (0)

  • Saturday 06/07
  • Open Source LDAP Solutions (0)

  • Monday 06/02
  • Delightful ASCII Art Tools (0)

  • Saturday 05/31
  • Best Tools for Network Inventory Management (0)

  • Sunday 05/25
  • Grab 24 Beautifully Scribed Free Programming Books (0)
  • 6 Invaluable Free Ada Books (0)

  • Thursday 05/15
  • 4 Best Free Pascal Books (0)


  • Vote

    What do you find MOST attractive about Open Source software?

    Amount of customization
    Security
    Freedom provided
    Speed of development
    Quality
    Multiple versions
    Cost
    Potential to contribute
    Ability to modify code
    Results
    4830 votes | 2 comments

    Built with GeekLog and phpBB
    Comments to the webmaster are welcome
    Copyright 2009 LinuxLinks.com - All rights reserved