Daemons are programs that continuously listen for other processes. Daemons loosely resemble terminate and stay resident (TSR) programs in the Microsoft platform.These programs remain alive at all times, constantly listening for a particular event. When that event finally occurs, the TSR or Daemon undertakes some action.
What is Inetd Daemon in unix ?
Inetd daemon is the main daemon that listens for all other networking related processes running on unix system.It listens for connection requests from the void and when it receives a request it starts the corresponding process.When it receives a request, it evaluates it. This evaluation seeks to determine one thing only: What service does the requesting machine want? For example, does it want Smtp? If so, inetd starts the SMTP server process.
The behavior of inetd is generally controlled from a file called inetd.conf, located in
the /etc directory in linux and unix platforms.The inetd.conf file is used to specify what
services will be called by inetd. Such services might include FTP, Telnet, SMTP, TFTP,
Finger, Systat, Netstat, or any other processes that you specify.
Apr 14, 2009
Subscribe to Feeds
About Me
Google Translate
Connect !
Categories
ADF
(30)
java
(21)
windows
(20)
Counter Strike 1.6
(13)
Android
(11)
Unix/Linux
(10)
ADF security
(8)
Apache Spark
(8)
Scala
(6)
Search engine Optimization
(6)
jdeveloper11g
(6)
rest
(6)
Computer Networking
(5)
Cool Tutorials
(5)
Retrofit
(5)
Security
(5)
Fortress
(4)
OIM11g
(4)
jsf
(4)
oracle 11g
(4)
Big Data
(3)
Hive
(3)
OPSS
(3)
OpenLDAP
(3)
Wordpress
(3)
javascript
(3)
sql
(3)
website on pc
(3)
Google
(2)
Programming Stuff
(2)
Songbird
(2)
Usenet
(2)
php
(2)
search engines
(2)
wallpapers
(2)
webserver
(2)
Dynamic Dns
(1)
ECM
(1)
Impala
(1)
Lucene
(1)
Softwares
(1)
apache
(1)
code coverage
(1)
firefox
(1)
jmeter
(1)
whitepaper
(1)
Total Pageviews
Popular Posts
-
In this post i am sharing the process to make your own custom reconciliation connector. The process flow of the scheduler is shown in the be...
-
I was recently given a requirement to drive the entity attribute validations at runtime rather than at design time, with the following cri...
-
Developers while creating the applications often ignore guidelines of closing result sets which is the most common cause of memory leaks. In...
-
In this post, I will cover a tutorial that involves different moving pieces. It covers the following: Java WatchService Spring Boot ...