- Everything in Linux is represented by a file (including hardware)
- Small, single-purpose programs are used
- The capability to chain programs together enables performing complex tasks
- Using captive user interfaces is avoided
- Configuration data is stored in text
UNIX systems have numerous utilities designed to create and manipulate files. The UNIX security model is based on the security of files. By treating everything as a file, consistency can be maintained. This allows you to secure access to hardware in the same way as you would secure access to a document.
UNIX provides many small utilities that perform one task very well. The general idea is to create a separate program when you require new functionality rather than extend an existing utility with new features.
A core design feature of UNIX is that the output of one program can serve as the input for another. This provides the user with the capability to chain many small programs together to perform a larger, more complex task.
Interactive commands are uncommon in UNIX. For most commands, the user needs to type their options and arguments on the command line
when the command is launched. The command completes normally, possibly producing output or it generates an error message and quits.
Interactivity is reserved for programs where it serves best, for example, with text editors (of course, some text editors are not
interactive).
Text is a universal interface, and many UNIX utilities exist to manipulate text. Storing configuration data in text allows the
administrator to easily move a configuration from one system to another.
0 comments:
Post a Comment