Next:
Config file reading algorithm
Up:
Specifications
Previous:
Communication between lidsadm and
 
Contents
Algorithms
Subsections
Config file reading algorithm
fork
system call
exec
system call
Overload
Hash table
Permission check
Capabilities check
Biondi Philippe 2000-12-15