List Of Plan 9 Applications
This is a list of Plan 9 programs. Many of these programs are very similar to the UNIX programs with the same name, others are to be found only on Plan 9. Others again share only the name, but have a different behaviour. System software General user * dd – convert and copy a file * date – date and time * echo – print arguments * file – determine file type * ns – display namespace * plumb – send message to plumber * plumber – interprocess messaging * rc – rc is the Plan 9 shell * rio – the new Plan 9 windowing system * 8½ – the old Plan 9 windowing syste* uptime – show how long the system has been running System management Processes and tasks management * time – time a command * kill, slay, broke – print commands to kill processes * sleep – suspend execution for an interval * ps – process status * psu – process status information about processes started by a specific user User management and support * passwd, netkey, iam ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Plan 9 From Bell Labs
Plan 9 from Bell Labs is a distributed operating system which originated from the Computing Science Research Center (CSRC) at Bell Labs in the mid-1980s and built on UNIX concepts first developed there in the late 1960s. Since 2000, Plan 9 has been free and open-source. The final official release was in early 2015. Under Plan 9, UNIX's '' everything is a file'' metaphor is extended via a pervasive network-centric filesystem, and the cursor-addressed, terminal-based I/O at the heart of UNIX-like operating systems is replaced by a windowing system and graphical user interface without cursor addressing, although rc, the Plan 9 shell, is text-based. The name ''Plan 9 from Bell Labs'' is a reference to the Ed Wood 1957 cult science fiction Z-movie '' Plan 9 from Outer Space''. The system continues to be used and developed by operating system researchers and hobbyists. History Plan 9 from Bell Labs was originally developed, starting in the late 1980s, by members of the ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Slay (Plan9)
Slay may refer to: * Murder, to commit homicide * cause death, to terminate biological function of a living creature or object * greatly impress or amuse (someone) People * Brandon Slay, former American Olympic wrestler * DJ Kay Slay (1966–2022), American hip hop DJ * Dwayne Slay (born 1984), American football player * Francis Slay (born 1955), mayor of St. Louis, Missouri, United States * Frank Slay (1930–2017), American songwriter, record producer * Jill Slay, British-Australian engineer and computer scientist * Tamar Slay (born 1980), American basketball player * Darius Slay (born 1991), American football player Other uses * ''Slay'' (video game), a turn-based strategy video game * SLAY Radio, an Internet radio station * ''SLAY'' (novel), a 2019 young adult novel by Brittney Morris * Slay (slang), a term of appreciation in LGBT slang * Slay (song), a 2023 song by Everglow * Slay, a song by Bonnie McKee from Hot City * Slay, a song by YG from Stay Dangerous * Slay ( ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Cp (Unix)
cp is a shell command for copying files and directories. If the user has write access to a target file, the command copies the content by opening it in update mode. This preserves the file's inode instead of creating a new file with default permissions. The command was part of Version 1 Unix, and is specified by POSIX. The implementation from GNU has many additional options beyond the POSIX specification. The command is bundled in GNU Core Utilities and is available in the EFI shell. Options *-f (force) – specifies removal of each target file if it cannot be opened for write operations; removal precedes any copying * -H (dereference) – follows symbolic link In computing, a symbolic link (also symlink or soft link) is a file whose purpose is to point to a file or directory (called the "target") by specifying a path thereto. Symbolic links are supported by POSIX and by most Unix-like operating syste ...s so that the destination has the target file rather ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Chmod
is a shell command for changing access permissions and special mode flags of files (including special files such as directories). The name is short for ''change mode'' where ''mode'' refers to the permissions and flags collectively. The command originated in AT&T Unix version 1 and was exclusive to Unix and Unix-like operating systems until it was ported to other operating systems such as Windows (in UnxUtils) and IBM i. In Unix and Unix-like operating systems, a system call with the same name as the command, , provides access to the underlying access control data. The command exposes the capabilities of the system call to a shell user. As the need for enhanced file-system permissions grew, access-control lists were added to many file systems to augment the modes controlled via . The implementation of bundled in GNU coreutils was written by David MacKenzie and Jim Meyering. Use Although the syntax of the command varies somewhat by implementation, it generally acc ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Chgrp
, short for change group, is a shell command for changing the group associated with a Unix-based file system file including special files such as directories. Changing the group of a file is restricted to a super-user (such as via ) or to the file's owning user if the user is in the specified group. A file has access permissions for the owning user, a group and for others. Changing the group for a file changes access to it based on users' group memberships. History The command was originally developed as part of the Unix operating system by AT&T Bell Laboratories. It is available in most Unix-like systems, Plan 9, Inferno and IBM i. The version of chgrp bundled in GNU coreutils was written by David MacKenzie. Use Generally, the syntax can be described as: chgrp 'options''''group'' ''files'' * ''group'' specifies the group with which the files should be associated; may be either a symbolic name or an identifier An identifier is a name that identifies (that ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Real-time Clock
A real-time clock (RTC) is an electronic device (most often in the form of an integrated circuit) that measures the passage of time. Although the term often refers to the devices in personal computers, server (computing), servers and embedded systems, RTCs are present in almost any electronic device which needs to keep accurate time of day. Terminology The term ''real-time clock'' is used to avoid confusion with ordinary clock signal, hardware clocks which are only signals that govern digital electronics, and do not count time in human units. RTC should not be confused with real-time computing, which shares its three-letter acronym but does not directly relate to time of day. Purpose Although keeping time can be done without an RTC, using one has benefits: * Reliably maintains and provides current time through disruptive system states such as Hang (computing), hangs, Sleep mode, sleep, reboots, or if given sufficient backup power, full Shutdown (computing), shutdown and hardwa ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Venti (software)
Venti is a network storage system that permanently stores data blocks. A 160-bit SHA-1 hash of the data (called ''score'' by Venti) acts as the address of the data. This enforces a ''write-once'' policy since no other data block can be found with the same address: the addresses of multiple writes of the same data are identical, so it is highly likely that duplicate data is easily identified and the data block is stored only once. Data blocks cannot be removed, making it ideal for permanent or backup storage. Venti is typically used with Fossil to provide a file system with permanent snapshots. History Venti was designed and implemented by Sean Quinlan and Sean Dorward at Bell Labs. It appeared in the Plan 9 distribution in 2002. Development has been continued by Russ Cox who has reimplemented most of the server, written a library for creating datastructures (files, directories and meta-data) to store in Venti and implemented optimizations. Venti is available both in ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Fossil (file System)
Fossil is the default file system in Plan 9 from Bell Labs. It serves the network protocol 9P and runs as a user space daemon, like most Plan 9 file servers. Fossil is different from most other file systems due to its snapshot/archival feature. It can take snapshots of the entire file system on command or automatically (at a user-set interval). These snapshots can be kept on the Fossil partition as long as disk space allows; if the partition fills up then old snapshots will be removed to free up disk space. A snapshot can also be saved permanently to Venti. Fossil and Venti are typically installed together. Features Important features include: *Snapshots are available to all users. No administrator intervention is needed to access old data. (This is possible because Fossil enforces file permissions; users can only access data which they would be allowed to access anyway; thus a user cannot snoop on another's old files or look at old passwords or such.) *Data in perma ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Man (Unix)
A man page (short for manual page) is a form of software documentation found on Unix and Unix-like operating systems. Topics covered include programs, system libraries, system calls, and sometimes local system details. The local host administrators can create and install manual pages associated with the specific host. A manual end user may invoke a documentation page by issuing the man command followed by the name of the item for which they want the documentation. These manual pages are typically requested by end users, programmers and administrators doing real time work but can also be formatted for printing. By default, man typically uses a formatting program such as nroff with a macro package or mandoc, and also a terminal pager program such as more or less to display its output on the user's screen. Man pages are often referred to as an ''online'' form of software documentation, even though the man command does not require internet access. The environment variable MANP ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Who (Unix)
The standard Unix command who displays a list of users who are currently logged into the computer. The who command is related to the command , which provides the same information but also displays additional data and statistics. History A command that displays the names of users logged in was first implemented for the CTSS operating system by ''Noel Morris'' in 1965. This inspired ''Tom Van Vleck'' to write a Multics version. Later, it appeared in Version 1 Unix and became part of the X/Open Portability Guide since issue 2 of 1987. It was inherited by the first version of POSIX.1 and the Single Unix Specification. The existence of presupposes the existence of an online group of users in a shared collegial environment with a need to communicate with each other. The version of who bundled in GNU coreutils was written by Joseph Arceneaux, David MacKenzie, and Michael Stone. Specification The Single UNIX Specification (SUS) specifies that who should list information ab ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |
|
Passwd
passwd is a command on Unix, Plan 9, Inferno, and most Unix-like operating systems used to change a user's password. The password entered by the user is run through a key derivation function to create a hashed version of the new password, which is saved. Only the hashed version is stored; the entered password is not saved for security reasons. When the user logs on, the password entered by the user during the log on process is run through the same key derivation function and the resulting hashed version is compared with the saved version. If the hashes are identical, the entered password is considered to be correct, and the user is authenticated. In theory, it is possible for two different passwords to produce the same hash. However, cryptographic hash functions are designed in such a way that finding any password that produces the same hash is very difficult and practically infeasible, so if the produced hash matches the stored one, the user can be authenticated. The passw ... [...More Info...]       [...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]   |