Flylib.com
J
Previous page
Table of content
Next page
K
K Java Virtual Machine (KVM), 17
kadmin command, 333, 334
kdb5_util, 334
KDC (key distribution center), 332
kdmconfig, 78-79
Kerberos, 332-333
compared with SSH, 332
configuring, 333
Internet access, 332-333
managing database with kdb5_util, 334
managing with kadmin command, 333-334
Solaris configuration and, 82
version 5 enhancements, 20
kernel, 35-38
default values for booting, 111
defined, 37
layered design and, 37
SunOS basis of, 35-36
System V and BSD basis of, 37
UNIX development and, 38
UNIX systems, 6, 36
Kernighan, Brian, 25
key distribution center (KDC), 332
keys
IKE (Internet Key Exchange) and, 625
public/private, 540-543
kh (Korn shell), 39
kill command
killing processes, 110
signals, 170, 187-188
kill scripts
single user , 100
writing, 109-111
killall command, 188
killprocid ( ), 110
Korn shell (kh), 39
KVM (K Java Virtual Machine), 17
Previous page
Table of content
Next page
Sun Certified Solaris(tm) 9 System and Network Administrator All-in-One Exam Guide
ISBN: 0072225300
EAN: 2147483647
Year: 2003
Pages: 265
Authors:
Paul Watters
BUY ON AMAZON
Java I/O
The Data Stream Classes
Attributes
Server Socket Channels
File Viewer Finis
Choosing a Locale
Oracle Developer Forms Techniques
An Exclusive Server-Side Commit from Forms
Inheritance
Does Subclassing Exhibit Intelligence?
Additional Interesting Techniques
A Block Level Commit
PostgreSQL(c) The comprehensive guide to building, programming, and administering PostgreSQL databases
Returning Multiple Values from an Extension Function
Summary
Client 2Adding Error Checking
Prerequisites
Summary
The Java Tutorial: A Short Course on the Basics, 4th Edition
What Is an Object?
And the Rest…
Applet Problems
Finishing an Applet
Operator Precedence
Junos Cookbook (Cookbooks (OReilly))
Introduction
Turning On Logging
Viewing Routes Learned by OSPF
Adjusting OSPF Link Costs
Tracing BGP Protocol Traffic
The Oracle Hackers Handbook: Hacking and Defending Oracle
Overview of the Oracle RDBMS
The Oracle Network Architecture
Attacking the TNS Listener and Dispatchers
Indirect Privilege Escalation
Accessing the File System
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies