by wolftech | Feb 12, 2014 | Uncategorized
A is for awk, which runs like a snail, and B is for biff, which reads all your mail. C is for cc, as hackers recall, while D is for dd, the command that does all. E is for emacs, which rebinds your keys, and F is for fsck, which rebuilds your trees. G is for grep, a...
by wolftech | Feb 12, 2014 | Uncategorized
Topics to be covered: What makes for effective web-based teaching? Goals: To be able to use the web as a means of conducting educational programs. Skills needed: File Management, and a basic understanding of the HTML Level 1 skills. Topics to be covered: What makes...
by wolftech | Feb 12, 2014 | Uncategorized
Several agents and secretaries have asked for a calendar template similar to what WordPerfect and MS Word have. I have not been able to find such a creature. So, I created a couple of calendar templates using Star Calc. These will probably cover 90% of your calendar...
by wolftech | Feb 12, 2014 | Uncategorized
SSH can be used to transfer files between two computers or to work at the command line of a remote machine. SSH stands for Secure SHell. This protocol encrypts all of the data between computers to provide a secure connection that is difficult for hackers to utitize....
by wolftech | Feb 12, 2014 | Uncategorized
All NC State students, faculty and staff automatically receive Unity computing accounts (or Eos accounts for engineering students). This account gives you access to many computing and Internet resources at NC State. What is Unity and what does my Unity account...
by wolftech | Feb 12, 2014 | Uncategorized
Learn about both printed and on-line documentation for UNIX concepts and programs. Printed UNIX Documentation There is a traditional set of basic documentation distributed with UNIX versions. Some vendors (Sun, HP, etc.) have tried to amplify upon these with...