fake root

fake root
   A subdirectory that functions as the root directory.
   Fake roots can be useful with network applications that must be installed in the root directory. You can install the application in a subdirectory and then map a fake root on the file server to the subdirectory containing the application. Many Web servers use a fake root.

Dictionary of networking . 2014.

Игры ⚽ Нужно решить контрольную?

Look at other dictionaries:

  • Fake projective plane — For Freedman s example of a non smoothable manifold with the same homotopy type as the complex projective plane, see 4 manifold. In mathematics, a fake projective plane (or Mumford surface) is one of the 50 complex algebraic surfaces that have… …   Wikipedia

  • Fake book — A fake book is a collection of musical lead sheets intended to help a performer quickly learn new songs. Each song in a fake book contains the melody line, basic chords, and lyrics the minimal information needed by a musician to make an impromptu …   Wikipedia

  • ложный корень — — [Л.Г.Суменко. Англо русский словарь по информационным технологиям. М.: ГП ЦНИИС, 2003.] Тематики информационные технологии в целом EN fake root …   Справочник технического переводчика

  • Certificate authority — In cryptography, a certificate authority, or certification authority, (CA) is an entity that issues digital certificates. The digital certificate certifies the ownership of a public key by the named subject of the certificate. This allows others… …   Wikipedia

  • Chord (music) — Instruments and voices playing and singing different notes create chords. This article describes pitch simultaneity and harmony in music. For other meanings of the word, see Chord. A chord in music is any harmonic set of two–three or more notes… …   Wikipedia

  • Computers and Information Systems — ▪ 2009 Introduction Smartphone: The New Computer.       The market for the smartphone in reality a handheld computer for Web browsing, e mail, music, and video that was integrated with a cellular telephone continued to grow in 2008. According to… …   Universalium

  • DigiNotar — BV Former type Subsidiary of a publicly traded company Industry Internet security Fate acquired by VASCO Data Security International in 2010; declared bankrupt in 2011 Founded 1997 Founder(s) Dick Batenburg …   Wikipedia

  • Comparison of privilege authorization features — A number of computer operating systems employ security features to help prevent malicious software from gaining sufficient privileges to compromise the computer system. Operating systems lacking such features, such as DOS, Windows implementations …   Wikipedia

  • This Sporting Life (radio program) — This Sporting Life is a Triple J radio program, created by actor writer comedians John Doyle and Greig Pickhaver, who perform as their characters Roy and HG. First broadcast in 1986 and still on the air, it is one of the longest running, most… …   Wikipedia

  • Back at the Barnyard — This article is about the series. For the film, see Barnyard (film). Back at the Barnyard The show logo with the post 2010 Nick logo. Genre Comedy Surreal humor Off colo …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”