|
ssh-keysign(8) -- ssh helper program for hostbased authentication
|
ssh-keysign is used by ssh(1) to access the local host keys and generate the digital signature required during hostbased authentication with SSH protocol version 2. ssh-keysign is disabled by default ... |
sshd(8) -- OpenSSH SSH daemon
|
sshd (SSH Daemon) is the daemon program for ssh(1). Together these programs replace rlogin and rsh, and provide secure encrypted communications between two untrusted hosts over an insecure network. Th... |
|
ssl(8) -- details for libssl and libcrypto
|
This document describes some of the issues relating to the use of the OpenSSL libssl and libcrypto libraries. This document is intended as an overview of what the libraries do, and what uses them. The... |
starttls(8) -- ESMTP over TLS/SSL
|
STARTTLS is an ESMTP option, defined in RFC 2487, which is used to conduct ESMTP transactions over TLS circuits. This is used to increase the security of mail server transactions. As of version 8.11, ... |
stdethers(8) -- YP filtering program
|
stdethers is used to get rid of unwanted information in file, or the standard input if no file argument is given. This utility is used by YP when creating YP maps. |
stdhosts(8) -- YP filtering program
|
stdhosts is used to get rid of unwanted information from file, or the standard input if no file argument is given. This utility is used by YP when creating YP maps. |
sticky(8) -- sticky text and append-only directories
|
A special file mode, called the sticky bit (mode S_ISVTX), is used to indicate special treatment for files and directories. See chmod(2) or the file /usr/include/sys/stat.h for an explanation of file ... |
string2key(8) -- map a password into a key
|
string2key performs the string-to-key function. This is useful when you want to handle the raw key instead of the password. Supported options: -5, --version5 Output Kerberos v5 string-to-key -4, --ver... |
sudo(8) -- execute a command as another user
|
sudo allows a permitted user to execute a command as the superuser or another user, as specified in the sudoers file. The real and effective uid and gid are set to match those of the target user as sp... |
suexec(8) -- Switch User For Exec
|
suexec is the "wrapper" support program for the suexec behaviour for the Apache HTTP server. It is run from within the server automatically to switch the user when an external program has to be run ... |
supfilesrv(8) -- sup server processes
|
Supfilesrv is the server processes used to interact with sup client processes via the IP/TCP network protocol. This server normally is expected to be running on server machines at all times. Each mach... |
supscan(8) -- sup server processes
|
Supfilesrv is the server processes used to interact with sup client processes via the IP/TCP network protocol. This server normally is expected to be running on server machines at all times. Each mach... |
supservers(8) -- sup server processes
|
Supfilesrv is the server processes used to interact with sup client processes via the IP/TCP network protocol. This server normally is expected to be running on server machines at all times. Each mach... |
swapctl(8) -- system swap management tool
|
The swapctl program adds, removes, lists and prioritizes swap devices and files for the system. The swapon program acts the same as the swapctl program, as if called with the -a option, except if swap... |
swapon(8) -- system swap management tool
|
The swapctl program adds, removes, lists and prioritizes swap devices and files for the system. The swapon program acts the same as the swapctl program, as if called with the -a option, except if swap... |