Advanced Power Management. A feature used by some BIOSes in order to make the machine enter a standby state after a given period of inactivity. On laptops, APM is also responsible for reporting the battery status and (if supported) the estimated remaining battery life.
American Standard Code for Information Interchange. The standard code used for storing characters, including control characters, on a computer. Many 8-bit codes (such as ISO 8859-1, the Linux default character set) contain ASCII as their lower half.
See Also ISO 8859.
Berkeley Software Distribution. A UNIX variant developed at the Berkeley University computing department. This version has always been considered more technically advanced than the others, and has brought many innovations to the computing world in general and to UNIX in particular.
Challenge-Handshake Authentication Protocol: protocol used by ISPs to authenticate their clients. In this scheme, a value is sent to the client (the machine making the connection), which it uses to calculate a hash based on the value. The client sends the hash back to the server for comparison to the hash calculated by the server. This authentication method is different from PAP in that it re- authenticates on a periodic basis after the initial authentication.
See Also PAP.
Common Internet FileSystem The successor to the SMB file system, used on DOS systems.
Dynamic Host Configuration Protocol. A protocol designed for machines on a local network to dynamically get an IP address from a DHCP server.
Direct Memory Access. A facility used in the PC architecture which allows for a peripheral to read or write from main memory without the help of the CPU. PCI peripherals use bus mastering and do not need DMA.
Domain Name System. The distributed name and address mechanism used in the Internet. This mechanism allows you to map a domain name to an IP address, allowing you to look up a site by domain name without knowing the IP address of the site. DNS also allows reverse lookup, letting you get a machine's IP address from its name.
Display Power Management System. Protocol used by all modern monitors to manage power saving features. Monitors supporting these features are commonly called “green” monitors.
Executable and Linking Format. This is the binary format used by most GNU/Linux distributions.
short for the “Extended 2 file system”. This is GNU/Linux's native file system and has the characteristics of any UNIX file system: support for special files (character devices, symbolic links, etc), file permissions and ownership, and other features.
Frequently Asked Questions. A document containing a series of questions and answers about a specific topic. Historically, FAQs appeared in newsgroups, but this sort of document now appears on various web sites, and even commercial products have FAQs. Generally, they are very good sources of information.
Fiber Distributed Digital Interface. A high-speed network physical layer, which uses optical fiber for communication. Mostly used on large networks, mainly because of its price. It is rarely seen as a means of connection between a PC and a network switch.
File system Hierarchy Standard. A document containing guidelines for a coherent file tree organization on UNIX systems. Mandrake Linux complies with this standard in most aspects.
First In, First Out. A data structure or hardware buffer where items are taken out in the order they were put in. UNIX pipes are the most common examples of FIFO s.
File Transfer Protocol. This is the standard Internet protocol used to transfer files from one machine to another.
The GNU Free Documentation License. The license that applies to all Mandrake Linux documentation.
Graphics Interchange Format. An image file format, widely used on the web. GIF images may be compressed or animated. Due to copyright problems it is a bad idea to use them, so the recommended solution is to replace them as much as possible by the PNG format.
GNU's Not Unix. The GNU project was initiated by at the beginning of the 1980s, and aimed at developing a free operating system (“free” as in “free speech”). Currently, all tools are there, except... the kernel. The GNU project kernel, Hurd, is not rock solid yet. Linux borrows, among others, two things from GNU: its C compiler, gcc, and its license, the GPL.
See Also GPL.
General Public License. The license of the GNU/Linux kernel, it goes the opposite way of all proprietary licenses in that it gives no restriction as to copying, modifying and redistributing the software, as long as the source code is made available. The only restriction is that the persons to whom you redistribute it must also benefit from the same rights.
Graphical User Interface. Interface to a computer consisting of windows with menus, buttons, icons and so on. A great majority of users prefer a GUI to a CLI (Command Line Interface) for ease of use, even though the latter is far more versatile.
HyperText Markup Language. The language used to create web documents.
HyperText Transfer Protocol. The protocol used to connect to web sites and retrieve HTML documents or files.
Integrated Drive Electronics. The most widely used bus on today's PC s for hard disks. An IDE bus can contain up to two devices, and the speed of the bus is limited by the device on the bus with the slower command queue (and not the slower transfer rate!).
See Also ATAPI.
This is a technique where a firewall is used to hide your computer's true IP address from the outside. Typically, any outside network connections you make through the firewall will inherit the firewall's IP address. This is useful in situations where you may have a fast Internet connection with only one IP address but wish to use more than one computer on your internal network.
Internet Relay Chat. One of the few Internet standards for live speech. It allows for channel creation, private talks and file exchange. It also allows servers to connect to each other, which is why several IRC networks exist today: Undernet, DALnet, EFnet to name a few.
are the “places” inside IRC servers where you can chat with other people. Channels are created in IRC servers and users join those channels so they can communicate with each other. Messages written on an channel are only visible to the people connected to that channel. Two or more users can create a “private” channel so they don't get disturbed by other users. Channel names begin with a #.
Industry Standard Architecture. The very first bus used on PC s, it is slowly being abandoned in favor of the PCI bus. ISA is still commonly found on SCSI cards supplied with scanners, CD writers and some other older hardware.
Integrated Services Digital Network. A set of communication standards for voice, digital network services and video. It has been designed to eventually replace the current phone system, known as PSTN (Public Switched Telephone Network) or POTS (Plain Ole Telephone Service). ISDN is known as a circuit switched data network.
International Standards Organization. A group of companies, consultants, universities and other sources which enumerates standards in various disciplines, including computing. The papers describing standards are numbered. The standard number iso9660, for example, describes the file system used on CD-ROMs.
Internet Service Provider. A company which sells Internet access to its customers, either over telephone lines or high-bandwidth circuits such as dedicated T-1 circuits, DSL or cable.
Joint Photographic Experts Group. Another very common image file format. JPEG is mostly suited for compressing real-world scenes, and does not work very well on non-realistic images.
Local Area Network. Generic name given to a network of machines connected to the same physical wire.
Linux Documentation Project. A nonprofit organization that maintains GNU/Linux documentation. It's mostly known for documents like HOWTOs, but it also maintains FAQ s, and even a few books.
Master Boot Record. Name given to the first sector of a bootable hard drive. The MBR contains the code used to load the operating system into memory or a bootloader (such as LILO), and the partition table of that hard drive.
Multipurpose Internet Mail Extensions. A string of the form type/subtype describing the contents of a file attached in an e-mail. This allows MIME -aware mail clients to define actions depending on the type of the file.
Moving Pictures Experts Group. An ISO committee which generates standards for video and audio compression. MPEG is also the name of their algorithms. Unfortunately, the license for this format is very restrictive, and as a consequence there are still no Open Source MPEG players...
NetWare Core Protocol. A protocol defined by Novell to access Novell NetWare™ file and print services.
Network FileSystem. A network file system created by Sun Microsystems in order to share files across a network in a transparent way.
Network Interface Controller. An adapter installed in a computer which provides a physical connection to a network, such as an Ethernet card.
Network Information System. NIS was also known as “Yellow Pages”, but British Telecom holds a copyright on this name. NIS is a protocol designed by Sun Microsystems in order to share common information across a NIS domain, which can consist of an entire LAN, or just a part of it. It can export password databases, service databases, groups information and more.
Password Authentication Protocol. A protocol used by many ISPs to authenticate their clients. In this scheme, the client (you) sends an identifier/password pair to the server, but none of the information is encrypted. See CHAP for the description of a more secure system.
See Also CHAP.
Peripheral Components Interconnect. A bus created by Intel which today is the standard bus for PC and other architectures. It is the successor to ISA, and it offers numerous services: device identification, configuration information, IRQ sharing, bus mastering and more.
Personal Computer Memory Card International Association. More and more commonly called “PC Card” for simplicity reasons, this is the standard for external cards attached to a laptop: modems, hard disks, memory cards, Ethernet cards, and more. The acronym is sometimes humorously expanded to People Cannot Memorize Computer Industry Acronyms...
Portable Network Graphics. Image file format created mainly for web use, it has been designed as a patent-free replacement for GIF and also has some additional features.
Plug'N'Play. First an add-on for ISA in order to add configuration information for devices, it has become a more widespread term which groups all devices able to report their configuration parameters. All PCI devices are Plug'N'Play.
Post Office Protocol. One common protocol used for retrieving mail from an ISP. See IMAP for an example of another remote-access mail protocol.
Point to Point Protocol. This is the protocol used to send data over serial lines. It is commonly used to send IP packets to the Internet, but it can also be used with other protocols such as Novell's IPX protocol.
Redundant Array of Independent Disks. A project initiated at the computing science department of Berkeley University, in which the storage of data is spread along an array of disks using different schemes. At first, this was implemented using floppy drives, which is why the acronym originally stood for Redundant Array of Inexpensive Disks.
Random Access Memory. Term used to identify a computer's main memory. The “Random” here means that any part of the memory can be directly accessed.
Request For Comments. RFC s are the official Internet standard documents, published by the IETF (Internet Engineering Task Force). They describe all protocols, their usage, their requirements and so on. When you want to learn how a protocol works, pick up the corresponding RFC.
Red Hat Package Manager. A packaging format developed by Red Hat in order to create software packages, it is used in many GNU/Linux distributions, including Mandrake Linux.
Small Computers System Interface. A bus with a high throughput designed to allow for several types of peripherals to be connected to it. Unlike IDE, a SCSI bus is not limited by the speed at which the peripherals accept commands. Only high-end machines integrate a SCSI bus directly on the motherboard, therefore most PC s need add-on cards.
Server Message Block. Protocol used by Windows machines (9x or NT ) for file and printer sharing across a network.
See Also CIFS.
Simple Mail Transfer Protocol. This is the common protocol for transferring email. Mail Transfer Agents such as sendmail or postfix use SMTP. They are sometimes called SMTP servers.
Super Video Graphics Array. The video display standard defined by VESA for the PC architecture. The resolution is 800x 600 x 16 colors.
Transmission Control Protocol. This is the most common reliable protocol that uses IP to transfer network packets. TCP adds the necessary checks on top of IP to make sure that packets are delivered. Unlike UDP, TCP works in connected mode, which means that two machines must establish a connection before exchanging data.
Uniform Resource Locator. A string with a special format used to identify a resource on the Internet in a unique way. The resource can be a file, a server or other item. The syntax for a URL is
protocol://server.name[:port]/path/to/resource.
When only a machine name is given and the protocol is http://, it defaults to retrieving the file index.html on the server.
Video Electronics Standards Association. An industry standards association aimed at the PC architecture. For example, it is the author of the SVGA standard.
Wide Area Network. This network, although similar to a LAN, connects computers on a network that are not physically connected to the same wires and are separated by a greater distance.
on a UNIX system, the combination of a name, a personal directory, a password and a shell which allows a person to connect to this system.
a mechanism used in a shell in order to make it substitute one string for another before executing the command. You can see all aliases defined in the current session by typing alias at the prompt.
Address Resolution Protocol. The Internet protocol used to dynamically map an Internet address to a physical (hardware) address on a local area network. This is limited to networks that support hardware broadcasting.
is the programming language that is closest to the computer, which is why it's called a “low level” programming language. Assembly has the advantage of speed since assembly programs are written in terms of processor instructions so little or no translation is needed when generating executables. Its main disadvantage is that it is processor (or architecture) dependent. Writing complex programs is very time-consuming as well. So, assembly is the fastest programming language, but it isn't portable between architectures.
(“AT Attachment Packet Interface”) An extension to the ATA specification (“Advanced Technology Attachment”, more commonly known as IDE, Integrated Drive Electronics) which provides additional commands to control CD-ROM drives and magnetic tape drives. IDE controllers equipped with this extension are also referred to as EIDE (Enhanced IDE) controllers.
This is an acronym for Asynchronous Transfer Mode. An ATM network packages data into standard size blocks (53 bytes: 48 for the data and 5 for the header) that it can convey efficiently from point to point. ATM is a circuit switched packet network technology oriented towards high speed (multi-megabit) optical networks.
a set of operations is said to be atomic when they execute all at once and cannot be preempted.
in shell context, a process is running in the background if you can type commands that are captured by the process while it is running.
See Also job, foreground.
is a means of saving your important data to a safe medium and location. Backups should be done regularly, especially with more critical information and configuration files (the most important directories to backup are /etc, /home and /usr/local). Traditionally, many people use tar with gzip or bzip2 to backup directories and files. You can use these tools or programs like dump and restore, along with many other free or commercial backup solutions.
is a processing mode where jobs are submitted to the CPU that are then executed sequentially until all the jobs have been processed.
is the little noise your computer's speaker emits to warn you of some ambiguous situation when you're using command completion and, for example, there's more than one possible choice for completion. There might be other programs that make beeps to let you know of some particular situation.
is the name given to the process of testing the beta version of a program. Programs usually get released in alpha and beta states for testing prior to final release.
stands for BInary digiT. A single digit which can take the values 0 or 1, because calculation is done in base two.
files whose contents are buffered. All read/write operations for such files go through buffers, which allows for asynchronous writes on the underlying hardware, and for reads, which allows the system to avoid disk access if the data is already in a buffer.
See Also buffer, buffer cache, character mode files.
the procedure taking place when a computer is switched on, where peripherals are recognized sequentially and where the operating system is loaded into memory.
a bootable floppy disk containing the code necessary to load the operating system from the hard disk (sometimes it is self-sufficient).
is a program that starts the operating system. Many bootloaders give you the opportunity to load more than one operating system by letting you choose between them from a menu. Bootloaders like GRUB are popular because of this feature and are very useful in dual- or multi-boot systems.
a small portion of memory with a fixed size, which can be associated with a block mode file, a system table, a process and so on. The buffer cache maintains coherency of all buffers.
See Also buffer cache.
a crucial part of an operating system kernel, it is in charge of keeping all buffers up-to-date, shrinking the cache when needed, clearing unneeded buffers and more.
See Also buffer.
illogical or incoherent behavior of a program in a special case, or a behavior that does not follow the documentation or accepted standards issued for the program. Often, new features introduce new bugs in a program. Historically, this term comes from the old days of punch cards: a bug (the insect!) slipped into a hole of a punch card and, as a consequence, the program misbehaved. Admiral Grace Hopper, having discovered this, declared “It's a bug!”, and since then the term has remained. Note that this is just one of the many stories which attempt to explain the term bug.
eight consecutive bits, which when interpreted in base ten result in a number between 0 and 255.
See Also bit.
when taken in the context of strings, the case is the difference between lowercase letters and uppercase (or capital) letters.
files whose content is not buffered. When associated with physical devices, all input/output on these devices is performed immediately. Some special character devices are created by the operating system (/dev/zero, /dev/null and others). They correspond to data flows.
See Also block mode files.
program or computer that periodically connects to another program or computer to give it orders or ask for information. In the case of peer to peer systems such as SLIP or PPP the client is taken to be the end that initiates the connection and the remote end receiving the call is designated as the server. It is one of the components of a client/server system.
system or protocol consisting of a server and one or several clients.
provided by a shell and which allows the user to type commands directly. Also subject of an eternal “flame war” between its supporters and its detractors.
under Vi or one of its clones, it is the state of the program in which pressing a key will not insert the character in the file being edited, but instead perform an action specific to the key (unless the clone has re-mappable commands and you have customized your configuration). You may get out of it typing one of the “back to insertion mode” commands: i, I, a, A, s, S, o, O, c, C, ...
is the process of translating source code that is human readable (well, with some training) and that is written in some programming language (C, for example) into a binary file that is machine readable.
the ability of a shell to automatically expand a substring to a filename, user name or other item, as long as there is a match.
is a way to shrink files or decrease the number of characters sent over a communications connection. Some file compression programs include compress, zip, gzip, and bzip2.
is the name given to what used to be called terminals. They were the machines (a screen plus a keyboard) connected to one big central mainframe. On PC s, the physical terminal is the keyboard and screen.
See Also virtual console.
temporary files written on the local hard disk by a remote web server. It allows for the server to be aware of a user's preferences when this user connects again.
A datagram is a discrete package of data and headers that contain addresses, which is the basic unit of transmission across an IP network. You might also hear this called a “packet”.
are the stages of compilation that need to be satisfied before going on to other compilation stages in order to successfully compile a program. This term is also used where one set of programs that you wish to install are dependant on other programs that may or may not be on your system, in which case you may get a message telling you that the system needs to “satisfy dependencies” in order to continue the installation.
If you're using the X Window System, the desktop is the place on the screen where you work and upon which your windows and icons are displayed. It is also called the background, and is usually filled with a simple color, a gradient color or even an image.
See Also virtual desktops.
Part of the file system structure. Files or other directories can be stored within a directory. Sometimes there are sub-directories (or branches) within a directory. This is often referred to as a directory tree. If you want to see what's inside another directory, you will either have to list it or change to it. Files inside a directory are referred to as leaves while sub-directories are referred to as branches. Directories follow the same restrictions as files although the permissions mean different things. The special directories . and .. refer to the directory itself and to the parent directory respectively.
are values that are non-continuous. That is, there's some kind of “spacing” between two consecutive values.
is a term used to distinguish one GNU/Linux manufacturers product from another. A distribution is made up of the core Linux kernel and utilities, as well as installation programs, third-party programs, and sometimes proprietary software.
The DLCI is the Data Link Connection Identifier and is used to identify a unique virtual point to point connection via a Frame Relay network. The DLCI's are normally assigned by the Frame Relay network provider.
occurs when the characters you type in a user name entry field, for example, are shown “as is”, instead of showing “*” for each one you type.
is a term typically used for programs that edit text files (aka text editor). The most well-known GNU/Linux editors are the GNU Emacs (Emacs) editor and the UNIX editor Vi.
stands for Electronic Mail. This is a way to send messages electronically between people on the same network. Similar to regular mail (aka snail mail), email needs a destination and sender address to be sent properly. The sender must have an address like “sender@senders.domain” and the recipient must have an address like “recipient@recipients.domain.” Email is a very fast method of communication and typically only takes a few minutes to reach anyone, regardless of where in the world they are located. In order to write email, you need an email client like pine mutt which are text-mode clients, or GUI clients like KMail.
is the execution context of a process. It includes all the information that the operating system needs to manage the process and what the processor needs to execute the process properly.
See Also process.
a part of a process' environment. Environment variables are directly viewable from the shell.
See Also process.
in the shell context, is the action of surrounding some string between quotes to prevent the shell from interpreting that string. For example, when you need to use spaces in some command line and pipe the results to some other command you have to put the first command between quotes (“escape” the command) otherwise the shell will interpret it incorrectly and it won't work as expected.
scheme used to store files on a physical media (hard drive, floppy) in a consistent manner. Examples of file systems are FAT, GNU/Linux' ext2fs, ISO9660 (used by CD-ROMs) and so on. An example of a virtual filesystem is the /proc filesystem.
a machine or a dedicated piece of hardware that in the topology of a local network is the single connection point to the outside network, and which filters, controls the activity on some ports, or makes sure only some specific interfaces may have access to the outside.
is an indicator (usually a bit) that is used to signal some condition to a program. For example, a filesystem has, among others, a flag indicating if it has to be dumped in a backup, so when the flag is active the filesystem gets backed up, and when it's inactive it doesn't.
the state for a window to receive keyboard events (such as key-presses, key-releases and mouse clicks) unless they are trapped by the window manager.
in shell context, the process in the foreground is the one that is currently running. You have to wait for such a process to finish in order to be able to type commands again.
See Also job, background.
Frame Relay is a network technology ideally suited to carrying traffic that is of bursty or sporadic nature. Network costs are reduced by having many Frame Relay customers sharing the same network capacity and relying on them wanting to make use of the network at slightly different times.
projection of a video card's RAM into the machine's address space. This allows for applications to access the video RAM without the chore of having to talk to the card. All high-end graphical workstations use frame buffers.
This term is used to refer to applications that take up the entire visible area of your display.
in the shell, the ability to group a certain set of filenames with a globbing pattern.
See Also globbing pattern.
a string made of normal characters and special characters. Special characters are interpreted and expanded by the shell.
An expert. Used to qualify someone particularly skilled, but also of valuable help for others.
This is a number that uniquely identifies a host in a physical network at the media access layer. Examples of this are Ethernet Addresses and AX.25 Addresses.
is a file which can't be “seen” when doing a ls command with no options. Hidden files' filenames begin with a . and are used to store the user's personal preferences and configurations for the different programs (s)he uses. For example, bash's command history is saved into .bash_history, a hidden file.
often abbreviated as “home”, this is the name for the personal directory of a given user.
See Also account.
refers to a computer and is commonly used when talking about computers that are connected to a network.
is a little drawing (normally sized 16x 16, 32x 32, 48x 48 and sometimes 64x 64 pixels) which in a graphical environment represents a document, a file or a program.
entry point leading to the contents of a file on a UNIX-like filesystem. An inode is identified in a unique way by a number, and contains meta-information about the file it refers to, such as its access times, its type, its size, but not its name!
under Vi or one of its clones, it is the state of the program in which pressing a key will insert that character in the file being edited (except pathological cases like the completion of an abbreviation, right justify at the end of the line, ...). One gets out of it pressing the key Esc (or Ctrl-[).
is a numeric address consisting of four parts which identifies your computer on the Internet. IP addresses are structured in a hierarchical manner, with top level and national domains, domains, subdomains and each machine's personal address. An IP address would look something like 192.168.0.1. A machine's personal address can be one of two types: static or dynamic. Static IP addresses are addresses that never change, but rather are permanent. Dynamic IP addresses mean your IP address will change with each new connection to the network. Dial-up and cable modem users typically have dynamic IP addresses while some DSL and other high-speed connections provide static IP addresses.
The ISO 8859 standard includes several 8-bit extensions to the ASCII character set. Especially important is ISO 8859-1, the “Latin Alphabet No. 1”, which has become widely implemented and may already be seen as the de facto standard ASCII replacement.
ISO 8859-1 supports the following languages: Afrikaans, Basque, Catalan, Danish, Dutch, English, Faroese, Finnish, French, Galician, German, Icelandic, Irish, Italian, Norwegian, Portuguese, Scottish, Spanish, and Swedish.
Note that the ISO 8859-1 characters are also the first 256 characters of ISO 10646 (Unicode). However, it lacks the EURO symbol and does not fully cover Finnish and French. ISO 8859-15 is a modification of ISO 8859-1 to covers these needs.
See Also ASCII.
in a shell context, a job is a process running in the background. You can have several jobs in the same shell and control these jobs independently.
See Also foreground, background.
is the guts of the operating system. The kernel is responsible for allocating resources and separating processes from each other. It handles all of the low-level operations which allow programs to talk directly to the hardware on your computer, manages the buffer cache and so on.
under Emacs, it is the set of text areas cut or copied since the starting the editor. The text areas may be recalled to be inserted again, and the structure is ring-like.
is a collection of procedures and functions in binary form to be used by programmers in their programs (as long as the library's license allows them to do so). The program in charge of loading shared libraries at run time is called the dynamic linker.
reference to an inode in a directory, therefore giving a (file) name to the inode. Examples of inodes which don't have a link (and hence have no name) are: anonymous pipes (as used by the shell), sockets (aka network connections), network devices and so on.
last stage of the compile process, consisting of linking together all object files in order to produce an executable file, and matching unresolved symbols with dynamic libraries (unless a static linkage has been requested, in which case the code of these symbols will be included in the executable).
is a UNIX-like operating system which runs on a variety of different computers, and is free for anyone to use and modify. Linux (the kernel) was written by .
connection name for a user on a UNIX system, and the action to connect.
is a table that stores corresponding codes (or tags) and their meaning. It is often a data file used by a program to get further information about a particular item.
For example, HardDrake uses such a table to know what a manufacturer's product code means. This is one line from the table, giving information about item CTL0001
CTL0001 sound sb Creative Labs SB16 \ HAS_OPL3|HAS_MPU401|HAS_DMA16|HAS_JOYSTICK |
virtual network interface of a machine to itself, allowing the running programs not to have to take into account the special case where two network entities are in fact the same machine.
a small document containing the definition of a command and its usage, to be consulted with the man command. The first thing one should (learn how to) read when learning about a command you aren't familiar with.
number identifying the specific device we are talking about.
is the directory where a partition or another device is attached to the GNU/Linux filesystem. For example, your CD-ROM is mounted in the /mnt/cdrom directory, from where you can explore the contents of any mounted CDs.
A device is mounted when it is attached to the GNU/Linux filesystem. When you mount a device you can browse its contents. This term is partly obsolete due to the “supermount” feature, so users do not need to manually mount removable media.
See Also mount point.
The Maximum Segment Size (MSS) is the largest quantity of data that can be transmitted at one time. If you want to prevent local fragmentation MSS would equal MTU-IP header.
The Maximum Transmission Unit (MTU) is a parameter which determines the largest datagram than can be transmitted by an IP interface without it needing to be broken down into smaller units. The MTU should be larger than the largest datagram you wish to transmit un-fragmented. Note, this only prevents fragmentation locally, some other link in the path may have a smaller MTU and the datagram will be fragmented there. Typical values are 1500 bytes for an Ethernet interface, or 576 bytes for a PPP interface.
the ability of an operating system to share CPU time between several processes. At a low level, this is also known as multiprogramming. Switching from one process to another requires that all the current process context be saved and restored when this process runs again. This operation is called a context switch, and on Intel, is done 100 times per second, thereby making it fast enough so that a user has the illusion that the operating system runs several applications at the same time. There are two types of multitasking: in preemptive multitasking the operating system is responsible for taking away the CPU and passing it to another process; cooperative multitasking is where the process itself gives back the CPU. The first variant is obviously the better choice because no program can consume the entire CPU time and block other processes. GNU/Linux performs preemptive multitasking. The policy to select which process should be run, depending on several parameters, is called scheduling.
is used to describe an operating system which allows multiple users to log into and use the system at the exact same time, each being able to do their own work independent of other users. A multitasking operating system is required to provide multiuser support. GNU/Linux is both a multitasking and multiuser operating system, as is any UNIX system for that matter.
a UNIX pipe which is linked, as opposed to pipes used in shells.
a word commonly used in computing for a method to identify objects. You will often hear of “naming conventions” for files, functions in a program and so on.
discussion and news areas which can be accessed by a news or USENET client to read and write messages specific to the topic of the newsgroup. For example, the newsgroup alt.os.linux.mandrake is an alternate newsgroup (alt) dealing with the Operating System (os) GNU/Linux, and specifically, Mandrake Linux (mandrake). Newsgroups are broken down in this fashion to make it easier to search for a particular topic.
the character or byte number 0. It is used to mark the end of a string.
is the code generated by the compilation process to be linked with other object codes and libraries to form an executable file. Object code is machine readable.
See Also compilation, linkage.
Something is said to be done “on the fly” when it's done along with something else, without you noticing it or explicitly asking for it.
is the name given to free source code of a program that is made available to development community and public at large. The theory behind this is that allowing source code to be used and modified by a broader group of programmers will ultimately produce a more useful product for everyone. Some popular open source programs include Apache, sendmail and GNU/Linux.
is the interface between the applications and the underlying hardware. The tasks for any operating system are primarily to manage all of the machine specific resources. On a GNU/Linux system, this is done by the kernel and loadable modules. Other well-known operating systems include AmigaOS, MacOS, FreeBSD, OS/2, UNIX, Windows NT, and Windows 9x.
in the context of users and their files, the owner of a file is the user who created that file.
in the context of groups and their files, the owner group of a file is the group to which the user who created that file belongs.
program displaying a text file one screen at a time, and making it easy to move back and forth and search for strings in this file. We suggest you to use less.
is a secret word or combination of words or letters that is used to secure something. Passwords are used in conjunction with user logins to multi-user operating systems, web sites, FTP sites, and so forth. Passwords should be hard-to-guess phrases or alphanumeric combinations, and should never be based on common dictionary words. Passwords ensure that other people cannot log into a computer or site with your account.
file holding a list of corrections to issue to source code in order to add new features, to remove bugs, or to modify it according to one's wishes and needs. The action consisting of the application of these corrections to the archive of source code (aka “patching”).
is an assignment for files and directories to the filesystem. The different layers of a path are separated by the "slash" or '/' character. There are two types of paths on GNU/Linux systems. The relative path is the position of a file or directory in relation to the current directory. The absolute path is the position of a file or directory in relation to the root directory.
a special UNIX file type. One program writes data into the pipe, and another program reads the data at the other end. UNIX pipes are FIFO s, so the data is read at the other end in the order it was sent. Very widely used with the shell. See also named pipe.
is an acronym for “pixel map”. It's another way of referring to bitmap images.
add-on program used to display or play some multimedia content found on a web document. It can usually be easily downloaded if your browser is not yet able to display or play that kind of information.
one of two ways to run a program on a system it was not originally intended for. For example, to be able to run a Windows-native program under GNU/Linux (natively), it must first be ported to GNU/Linux.
dictates the order of evaluation of operands in an expression. For example: If you have 4 + 3 * 2 you get 10 as the result, since the multiplication has higher precedence than the addition. If you want to evaluate the addition first, then you have to add parenthesis like this: (4 + 3) * 2. When you do this, you'll get 14 as the result since the parenthesis have higher precedence than the addition and the multiplication, so the operations in parenthesis get evaluated first.
are compilation directives that instruct the compiler to replace those directives for code in the programming language used in the source file. Examples of C 's preprocessors are #include, #define, etc.
in the operating system context, a process is an instance of a program being executed along with its environment.
in a shell, this is the string before the cursor. When you see it, you can type your commands.
Protocols organize the communication between different machines across a network, either using hardware or software. They define the format of transferred data, whether one machine controls another, etc. Many well-known protocols include HTTP, FTP, TCP, and UDP.
a machine that sits between a network and the Internet, whose role is to speed up data transfers for the most widely used protocols (for example, HTTP and FTP). It maintains a cache of previous requests, so a machine which makes a request for something which is already cached will receive it quickly, because it will get the information from the local cache. Proxies are very useful on low bandwidth networks (such as modem connections). Sometimes the proxy is the only machine able to access outside the network.
is a menu that is “rolled” with a button in some of its corners. When you press that button, the menu “unrolls” itself, showing you the full menu.
is a method for restricting disk usage and limits for users. Administrators can restrict the size of home directories for a user by setting quota limits on specific file systems.
for a file means that the file cannot be written to. You can read its contents but you can't modify them.
See Also read-write mode.
for a file, it means that the file can be written to. You can read its contents and modify them.
See Also read-only mode.
a powerful theoretical tool which is used to search and match text strings. It lets one specify patterns these strings must obey. Many UNIX utilities use it: sed, awk, grep, perl and others.
is the superuser of any UNIX system. Typically root (aka the system administrator) is the person responsible for maintaining and supervising the UNIX system. This person also has complete access to everything on the system.
This is the top level directory of a filesystem. This directory has no parent directory, thus '..' for root points back to itself. The root directory is written as '/'.
This is the top level filesystem. This is the filesystem where GNU/Linux mounts its root directory tree. It is necessary for the root filesystem to reside in a partition of its own, as it is the basis for the whole system. It holds the root directory.
Is the path that your datagrams take through the network to reach their destination. Is the path between one machine and another in a network.
is a configuration of the system software that only allows certain selected processes to exist. Allowed processes are defined, for each runlevel, in the file /etc/inittab. There are eight defined runlevels: 0, 1, 2, 3, 4, 5, 6, S and switching among them can only be achieved by a privileged user by means of executing the commands init and telinit.
shell scripts are sequences of commands to be executed as if they were sequentially entered in the console. shell scripts are UNIX's (somewhat) equivalent of DOS batch files.
Mandrake Linux's unique feature that allows you to set different levels of restrictions according to how secure you want to make your system. There are 6 predefined levels ranging from 0 to 5, where 5 is the tightest security. You can also define your own security level.
A segmentation fault occurs when a program tries to access memory that is not allocated to it. This generally causes the program to stop immediately.
program or computer that provides a feature or service and awaits the connections from clients to execute their orders or give them the information they ask. In the case of peer to peer systems such as SLIP or PPP, the server is taken to be the end of the link that is called and the end calling is taken to be the client. It is one of the components of a client/ server system.
a password management suite on UNIX systems in which the file containing the encrypted passwords is not world-readable, unlike what is usually found with a normal password system. It also offers other features such as password aging.
The shell is the basic interface to the operating system kernel and provides the command line where users enter commands to run programs and system commands. All shells provide a scripting language that can be used to automate tasks or simplify often-used complex tasks. These shell scripts are similar to batch files from the DOS operating system, but are much more powerful. Some example shells are bash, sh, and tcsh.
is used to describe a state of an operating system, or even an operating system itself, that only allows a single user to log into and use the system at any time.
means that the information used by programs like imake and make to compile some source file depends on the site, the computer architecture, the computer's installed libraries, and so on.
See symbolic links.
the file descriptor number 2, opened by every process, used by convention to print error messages to the terminal screen.
See Also standard input, standard output.
the file descriptor number 0, opened by every process, used by convention as the file descriptor from which the process receives data.
See Also standard error, standard output.
the file descriptor number 1, opened by every process, used by convention as the file descriptor in which the process prints its output.
See Also standard error, standard input.
is a device that takes “streams” (not interrupted or divided in shorter chunks) of characters as its input. A typical streamer is a tape drive.
Switches are used to change the behavior of programs, and are also called command-line options or arguments. To determine if a program has optional switches that can be used, read the man pages or try to pass the --help switch to the program (i.e.. program --help).
are special files, containing nothing but a string that makes reference to another file. Any access to them is the same as accessing the file whose name is the referenced string, which may or may not exist, and the path to which can be given in a relative or an absolute way.
is the object of compilation, i.e. the binary file to be generated by the compiler.
creates a connection to a remote host and allows you to log into the machine, provided you have an account. Telnet is the most widely-used method of remote logins, however there are better and more secure alternatives, like ssh.
a graphical application is theme-able if it is able to change its appearance in real time. Many window managers are theme-able.
for a directory on a UNIX system, this means that the user is allowed to go through this directory, and possibly to directories under it. This requires that the user has the execute permission on this directory.
is a name (or more generally a word) that identifies a user in a system. Each username is attached to a unique and single UID (user ID)
See Also login.
are strings that are used in Makefile files to be replaced by their value each time they appear. Usually they are set at the beginning of the Makefile. They are used to simplify Makefile and source files tree management.
More generally, variables in programming are words that refer to other entities (numbers, strings, tables, etc.) that are likely to vary while the program is executing.
For commands, the verbose mode means that the command reports to standard (or possibly error) output all the actions it performs and the results of those actions. Sometimes, commands have a way to define the “verbosity level”, which means that the amount of information that the command will report can be controlled.
is the name given to what used to be called terminals. On GNU/Linux systems, you have what are called virtual consoles which enable you to use one screen or monitor for many independently running sessions. By default, you have six virtual consoles that can be reached by pressing ALT-F1 through ALT-F6. There is a seventh virtual console, ALT-F7, which will permit you to reach a running X Window System. In X, you can reach the text console by pressing CTRL-ALT-F1 through CTRL-ALT-F6.
See Also console.
In the X Window System, the window manager may provide you several desktops. This handy feature allows you to organize your windows, avoiding the problem of having dozens of them stacked on top of each other. It works as if you had several screens. You can switch from one virtual desktop to another in a manner that depends on the window manager you're using.
See Also window manager, desktop.
The '*' and '?' characters are used as wildcard characters and can represent anything. The '*' represents any number of characters, including no characters. The '?' represents exactly one character. Wildcards are often used in regular expressions.
In networking, the window is the largest amount of data that the receiving end can accept at a given point in time.
the program responsible for the “look and feel” of a graphical environment, dealing with window bars, frames, buttons, root menus, and some keyboard shortcuts. Without it, it would be hard or impossible to have virtual desktops, to resize windows on the fly, to move them around, ...