Rename the file with "." in front of the file name.
Nisheeth Rai
Nov 13th, 2006
To make a file hidden in Solaris, you need to rename it. File names starting with . are hidden.Say if your file name is abc, you must rename it to .abc to make it hidden.
eagy answer:by GOURAV SHIVHARE 1. Environment variables are system parameters set by either OS or the users themselves. For example, a variable "PATH" will set the search path for executable...
Full: Full backup means backing up everything.
Incremental: Incremental backup means backing up everything that has
changed since last full backup.
Differential: Differential seems to be another...
jais
Dec 21st, 2006
When you backup files, means that you make a safe copy of the file. So when the original data is corrupted , and if there is a backup of that original data, we can retrieve that original information.K...
Hi think Demand paging and Demand segmentation are used to implement Virtual memory............paging and segmentation are the techniques of memory management............
devlpr
Nov 16th, 2006
I Think Navneet Kumar's answer is the best.Regardsdevlpr
With Windows XP Service Pack 2 (SP2), Microsoft is introducing a set of security technologies that will help improve Windows XP-based computers' ability to withstand malicious attacks from viruses and...
Aryan Negi
Dec 14th, 2006
The latest version of windows xp is service pack 3 which is 100mb & u can download from internet.
Hi yedukondalu, 1. Stored Programs are the programs which arefrequently used by the system and those are used for the same funcitoning.2. Difference Betwen LAN andnMAN &nbs...
The processor frequency up to 1.2Ghz 12.10X is P3The processor frequency greater than 1.2Ghz is P4The Cache memory in P4 is incereased compared to P3 In P4 We have a special range of processor with HT technology and Dual core
um
Jul 31st, 2006
in p4 the new technology "Hyper Threading" has been implemented... the number of pins has been increased... Cache memory has been increased...p3 is the old technology..
UMASK values is 0002, I hope this is octal form1st 0 ---> stick bit is for .exe file2nd 0 ---> user3rd 0 ---> group4th 2 ---> othersstick bit is for .exe file. If any exe file is set with the stick...
Hi friends,If you are specific to Linux, then yes (in pure linux/unix or when samba is the domain controller and you map your home drive to your window machine)The convenctional method of u...
1- Different operating systems store password in different ways and location.Be sure of - you can't read the password because it is encrypted.HP-UX stores it in /etc/passwd file third field (sepa...
Take an example. To delete all files named like rep*.datfind / -name rep*.dat | xargs rm -fIf you think there may be a directory of same name pattern,find / -name rep*.dat | xargs rm -rf
Ans