jhonsmith Posted June 6, 2021 Share Posted June 6, 2021 (edited) In unix, with the exception of a few special system process, processes are generated by users (root and others) who have logged onto the system. • During the login process the system queries the password file to obtain two identifications (ID) numbers. • The numbers obtained are in the third and fourth fields of the password entry for the user. • These are respectively , the “real user ID” (UID) and “real group ID”(GID) for the user. Edited June 6, 2021 by Ingolme Removed advertising link Link to comment Share on other sites More sharing options...
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now