Toggle navigation
Collections
Fun
Jokes
Fortune
Photo
Nicknames
Blog
ﻮﺑﻻگ
Iran
Crack Root: V. To Defeat The Security System Of A UNIX Machine And Gain {root} Privileges Thereby
Home
›
Fortune Cookies
›
Miscellaneous Collections
:crack root: v. To defeat the security system of a UNIX machine and
gain {root} privileges thereby; see {cracking}.
-- The AI Hackers Dictionary
Related:
crack root v. [very common] To defeat the security system of a Unix machine and gain root privileges thereby
ee cracking....
oot: [UNIX] n. 1. The {superuser} account (with user name `root') that ignores permission bits, user number 0 on a UNIX system.
The term {avatar} is also used. 2. The top node of the system directory structure (home directory of the root user)....
go root: [UNIX] vi. To temporarily enter {root mode} in order to perform a privileged operation.
This use is deprecated in Australia, where v. `root' refers to animal sex....
peon: n. A person with no special ({root} or {wheel}) privileges on a computer system.
I can't create an account on *foovax* for you...
wizard mode: [from {rogue}] n. A special access mode of a program or system, usually passworded, that permits some users godlike privileges.
Generally not used for operating systems themselves (`root mode' or `wheel mode' would be used instead)....
Press Release -- For Immediate Release Microsoft Corporation, Redmond, WA .
..Virtually all version of Linux (and Unix) contain a security hole that allows unauthorized users to gain complete control over the machine....
dumbass attack: /duhm'as *-tak'/ [Purdue] n. Notional cause of a novice's mistake made by the experienced, especially one made while running as {root} under UNIX, e.
g., typing `rm -r *' or `mkfs' on a mounted file system....
uperuser: [UNIX] n. Syn. {root}, {avatar}. This usage has spread to non-UNIX environme
he superuser is any account with all {wheel} bits on....
wheel bit: n. A privilege bit that allows the possessor to perform some restricted operation on a timesharing system
uch as read or write any file on the system regardless of protections, change or look at any address in the running monitor, crash or reload the system, and kill or create jobs and user accounts....