SlideShare a Scribd company logo
1 of 6
Download to read offline
WELCOME TO THE PROJECT
Title: Daemons in Linux Processes
This Photo by Unknown author is licensed under CC BY.
A daemon is a type of program
on Unix-like operating
systems that runs unobtrusively in
the background, rather than under
the direct control of a user,
waiting to be activated by the
occurrence of a specific event or
condition
Almost all daemons have names
that end with the letter "d". For
example, httpd the daemon that
handles the Apache server,
or, sshd which
handles SSH remote access
connections. Linux often start
daemons at boot time. Shell
scripts stored
in /etc/init.d directory are used
to start and stop daemons.
There are three basic types of processes in Linux:
 Interactive......interactive processes are run interactively by a user at the command line
 Batch.....batch processes are submitted from a queue of processes and are not associated with the command line;
they are well suited for performing recurring tasks when system usage is otherwise low.
 Daemon.....daemons are usually generated as processes.
 A process is
an executing instance
of a program.
Processes are
managed by
the kernel which
assigns each a
unique process
identification number
(PID).
The KILLING of a daemon
 kill – Kill a process by ID
#kill -9 3827
 killall – Kill a process by name
#killall -15 3827
9 is the SIGKILL and 15
is the SIGTERM
This Photo by Unknown author is licensed under CC BY-SA.

More Related Content

Similar to Daemons in linux processes

LINUX
LINUXLINUX
LINUX
ARJUN
 

Similar to Daemons in linux processes (20)

Linux Virus
Linux VirusLinux Virus
Linux Virus
 
Project of deamon process
Project of deamon processProject of deamon process
Project of deamon process
 
Threats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in LinuxThreats, Vulnerabilities & Security measures in Linux
Threats, Vulnerabilities & Security measures in Linux
 
Linux
LinuxLinux
Linux
 
Linux
Linux Linux
Linux
 
3. intro
3. intro3. intro
3. intro
 
CNIT 126 11. Malware Behavior
CNIT 126 11. Malware BehaviorCNIT 126 11. Malware Behavior
CNIT 126 11. Malware Behavior
 
Linux introduction (eng)
Linux introduction (eng)Linux introduction (eng)
Linux introduction (eng)
 
Lesson 2 Understanding Linux File System
Lesson 2 Understanding Linux File SystemLesson 2 Understanding Linux File System
Lesson 2 Understanding Linux File System
 
Introduction To Linux Security
Introduction To Linux SecurityIntroduction To Linux Security
Introduction To Linux Security
 
cisco
ciscocisco
cisco
 
Ch1 linux basics
Ch1 linux basicsCh1 linux basics
Ch1 linux basics
 
Introduction to linux
Introduction to linuxIntroduction to linux
Introduction to linux
 
UNIX.ppt
UNIX.pptUNIX.ppt
UNIX.ppt
 
Basics of Linux Commands, Git and Github
Basics of Linux Commands, Git and GithubBasics of Linux Commands, Git and Github
Basics of Linux Commands, Git and Github
 
LINUX
LINUXLINUX
LINUX
 
Intro to linux
Intro to linuxIntro to linux
Intro to linux
 
Practical Malware Analysis: Ch 11: Malware Behavior
Practical Malware Analysis: Ch 11: Malware BehaviorPractical Malware Analysis: Ch 11: Malware Behavior
Practical Malware Analysis: Ch 11: Malware Behavior
 
Tutorial 2
Tutorial 2Tutorial 2
Tutorial 2
 
linux
linuxlinux
linux
 

More from Md Meherab Hossen

More from Md Meherab Hossen (8)

mail server on linux
mail server on linuxmail server on linux
mail server on linux
 
File permission of linux
File permission of linuxFile permission of linux
File permission of linux
 
Linux kickstart
Linux kickstartLinux kickstart
Linux kickstart
 
Linux network manager configuration
Linux network manager configurationLinux network manager configuration
Linux network manager configuration
 
Linux packege manager
Linux packege managerLinux packege manager
Linux packege manager
 
Linux text editors Vim nano
Linux text editors Vim nano Linux text editors Vim nano
Linux text editors Vim nano
 
Special permission in linux.
Special permission in linux.Special permission in linux.
Special permission in linux.
 
Install iRedMail on Red Hat Enterprise Linux, CentOS
Install iRedMail on Red Hat Enterprise Linux, CentOSInstall iRedMail on Red Hat Enterprise Linux, CentOS
Install iRedMail on Red Hat Enterprise Linux, CentOS
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Daemons in linux processes

  • 1. WELCOME TO THE PROJECT Title: Daemons in Linux Processes
  • 2. This Photo by Unknown author is licensed under CC BY. A daemon is a type of program on Unix-like operating systems that runs unobtrusively in the background, rather than under the direct control of a user, waiting to be activated by the occurrence of a specific event or condition Almost all daemons have names that end with the letter "d". For example, httpd the daemon that handles the Apache server, or, sshd which handles SSH remote access connections. Linux often start daemons at boot time. Shell scripts stored in /etc/init.d directory are used to start and stop daemons.
  • 3. There are three basic types of processes in Linux:  Interactive......interactive processes are run interactively by a user at the command line  Batch.....batch processes are submitted from a queue of processes and are not associated with the command line; they are well suited for performing recurring tasks when system usage is otherwise low.  Daemon.....daemons are usually generated as processes.  A process is an executing instance of a program. Processes are managed by the kernel which assigns each a unique process identification number (PID).
  • 4.
  • 5. The KILLING of a daemon  kill – Kill a process by ID #kill -9 3827  killall – Kill a process by name #killall -15 3827 9 is the SIGKILL and 15 is the SIGTERM
  • 6. This Photo by Unknown author is licensed under CC BY-SA.