MTU Cork Library Catalogue

Syndetics cover image
Image from Syndetics

UNIX : system V release 4 : the complete reference / Stephen Coffin.

By: Coffin, Stephen.
Material type: materialTypeLabelBookPublisher: Berkeley : Osborne McGraw-Hill, 1990Description: xxxviii, 905 p. ; 23 cm.ISBN: 007881653X .Subject(s): UNIX System V (Computer file) | Operating systems (Computers)DDC classification: 005.43
Holdings
Item type Current library Call number Copy number Status Date due Barcode Item holds
General Lending MTU Bishopstown Library Store Item 005.43 (Browse shelf(Opens below)) 1 Available 00021381
Total holds: 0

Enhanced descriptions from Syndetics:

For both beginners and experienced UNIX users, provides clearly written discussions of commands, Shell programming, Open Look and X Windows user interfaces, the Korn and C Shells, and UNIX networking features like NFS and Ethernet. Annotation(c) 2003 Book News, Inc., Portland, OR (booknews.com)

Includes bibliographical references (p. 879-881) and index.

Table of contents provided by Syndetics

  • Preface (p. xxxiii)
  • Why This Book Is for You (p. 1)
  • 1 Introduction (p. 3)
  • The Lore and Controversy Surrounding the UNIX System (p. 6)
  • The Philosophy Behind the UNIX System (p. 8)
  • The Modern UNIX System -- Pro and Con (p. 9)
  • UNIX System History (p. 10)
  • The SVR4 Release (p. 15)
  • Networking Support (p. 16)
  • Unification (p. 16)
  • New Development Environment (p. 16)
  • Internationalization (p. 17)
  • X Window System (p. 17)
  • Commands (p. 17)
  • Virtual File System (p. 18)
  • Real-Time Processes (p. 18)
  • Improved Configuration and Installation (p. 18)
  • Enhanced Security (p. 18)
  • Going Further (p. 19)
  • Microcomputer Requirements (p. 19)
  • Assembling a UNIX System (p. 20)
  • A Note on BSD and XENIX Compatibility (p. 21)
  • 2 Tutorial (p. 23)
  • Logging In (p. 24)
  • The X Window System Display (p. 28)
  • Reading the News (p. 28)
  • Listing Your Files (p. 30)
  • Displaying a File (p. 32)
  • Deleting a File (p. 33)
  • Reading Your Mail (p. 34)
  • Sending Mail (p. 36)
  • Who's Logged In (p. 39)
  • Changing Your Password (p. 40)
  • Logging Out (p. 42)
  • Going Further (p. 44)
  • Controlling Output to the Terminal (p. 44)
  • 3 Introduction to the Shell (p. 45)
  • Commands in the UNIX System (p. 46)
  • Command Structure (p. 46)
  • Command-Line Expansion (p. 49)
  • Environment Variables (p. 51)
  • Quoting Command-Line Arguments (p. 54)
  • PS1 (p. 56)
  • Standard Input and Output (p. 57)
  • The End-of-File Mark (p. 59)
  • Appending Standard Output to a File (p. 60)
  • Standard Error (p. 61)
  • Pipes (p. 62)
  • Filters (p. 63)
  • Fields and Delimiters (p. 64)
  • Return Values from Commands (p. 69)
  • The Grave Operator (p. 70)
  • Going Further (p. 72)
  • Command Sequences (p. 72)
  • Shell Redirection (p. 73)
  • 4 The File System (p. 75)
  • Files and Directories (p. 75)
  • Rules for Naming Files (p. 78)
  • Naming Directories (p. 79)
  • The Working Directory (p. 80)
  • Moving Around in the Directory Hierarchy (p. 81)
  • Changing the Directory Hierarchy (p. 83)
  • Your Home Directory (p. 84)
  • File-Oriented Commands (p. 86)
  • Symbolic Links (p. 89)
  • Options for the Is Command (p. 91)
  • File Permissions (p. 93)
  • File Ownership (p. 93)
  • Understanding File Permissions (p. 94)
  • Changing File Ownership (p. 95)
  • Changing Permissions (p. 96)
  • Listing Directory Permissions (p. 97)
  • Going Further (p. 98)
  • The X Window System File Manager (p. 98)
  • basename and dirname (p. 100)
  • Device Files (p. 100)
  • The mesg Command (p. 102)
  • Other Devices (p. 103)
  • More on Symbolic Links (p. 103)
  • Browsing the File System (p. 105)
  • A Note on File System Reorganization in SVR4 (p. 106)
  • Conventions for Naming Files and Directories (p. 110)
  • 5 Basic Editing with vi and emacs (p. 113)
  • A Note on Learning to Use the Editors (p. 114)
  • The vi Text Editor (p. 114)
  • Setting Your Terminal Type (p. 115)
  • Starting the vi Editor (p. 116)
  • Modes in vi (p. 118)
  • Switching Modes (p. 118)
  • Ending your vi Session (p. 119)
  • Writing Files (p. 119)
  • Reading Files (p. 122)
  • Changing Files (p. 122)
  • Redrawing the Screen (p. 122)
  • Escaping to the Shell (p. 123)
  • Editing in vi (p. 123)
  • Undoing a Change (p. 123)
  • Entering Input Mode from Command Mode (p. 124)
  • Input Mode (p. 124)
  • Moving Around in the Buffer (p. 125)
  • Searching for Text (p. 126)
  • Changing Text (p. 127)
  • Deleting Text (p. 127)
  • Repeating a Change (p. 128)
  • Cut and Paste Operations (p. 128)
  • Cut and Paste Using Line Numbers (p. 129)
  • The emacs Editor (p. 130)
  • Fundamental Concepts of emacs (p. 130)
  • Starting emacs (p. 131)
  • Splitting the Screen (p. 134)
  • Writing the File (p. 134)
  • Exiting from emacs (p. 135)
  • Getting Help (p. 135)
  • Changing the Cursor Position (p. 135)
  • Deleting Text (p. 136)
  • Marks in emacs (p. 136)
  • Cut and Paste in emacs (p. 137)
  • Searching and Replacing Text Strings (p. 137)
  • Escaping to the Shell (p. 138)
  • Going Further (p. 139)
  • A Note on Using the Editors with the X Window System (p. 139)
  • Configuring vi Options (p. 140)
  • Filtering Text from Inside vi (p. 141)
  • Major Modes in emacs (p. 142)
  • Minor Modes in emacs (p. 143)
  • The emacs Customization File (p. 143)
  • Macros in emacs (p. 144)
  • Keyboard Macros (p. 144)
  • 6 Regular Expressions and Advanced Editing (p. 147)
  • Basic Concepts of Regular Expressions (p. 148)
  • Matching Any Single Character (p. 148)
  • Matching a Set (p. 148)
  • Matching a Range (p. 149)
  • Escaping the Special Meaning of Regular Expression Operators (p. 150)
  • Special Symbols for the Beginning and End of a Line (p. 150)
  • Building Complex Regular Expressions (p. 151)
  • The Longest Matching String (p. 152)
  • The grep Command (p. 152)
  • The fgrep and egrep Commands (p. 154)
  • Searching in vi Using Regular Expressions (p. 155)
  • Substitutions in vi (p. 155)
  • Using the Matched Regular Expression in a Substitution (p. 157)
  • Substitutions on a Range of Lines (p. 157)
  • More on Line Addressing (p. 158)
  • Context Addressing with Regular Expressions (p. 159)
  • The sed Stream Editor (p. 160)
  • Complex sed Programs (p. 162)
  • Basic Editing with ed (p. 163)
  • Modes in ed (p. 164)
  • Turning on Prompts and Help (p. 164)
  • Reading in Another File (p. 165)
  • Write and Quit (p. 166)
  • Working with Lines (p. 166)
  • Displaying the Current Line (p. 166)
  • Changing the Current Line (p. 168)
  • Input Mode (p. 168)
  • Deleting Lines (p. 169)
  • Undoing Mistakes (p. 169)
  • Searching for Strings (p. 169)
  • Substituting Sections of Text (p. 170)
  • Moving and Copying Lines (p. 171)
  • Shell Escapes -- The Bang Operator (p. 171)
  • Going Further (p. 172)
  • ed Scripts (p. 172)
  • Regular Expression Searches in emacs (p. 173)
  • 7 More Useful General-Purpose Commands (p. 175)
  • The Environment Revisited (p. 176)
  • Using the PATH Variable (p. 176)
  • The banner Command (p. 179)
  • Clearing the Screen (p. 179)
  • The date Command (p. 180)
  • The cal Command (p. 180)
  • The calendar Command (p. 181)
  • The more, tail, and head Programs (p. 182)
  • The cmp and diff Commands (p. 184)
  • The dircmp Command (p. 187)
  • The sort and uniq Commands (p. 188)
  • The cut and paste Commands (p. 192)
  • The join Command (p. 194)
  • Database Operations for Text Files (p. 195)
  • Going Further (p. 198)
  • The sleep Command (p. 199)
  • The find Command (p. 200)
  • The stty Command (p. 205)
  • 8 Shell Programming and More (p. 209)
  • Multiline Commands (p. 210)
  • here Documents (p. 211)
  • Storing Shell Commands in Files (p. 213)
  • Commenting Shell Scripts (p. 215)
  • The if Operator (p. 215)
  • The test Command (p. 217)
  • The exit Command (p. 222)
  • The expr Command (p. 222)
  • The for Operator (p. 224)
  • The while Operator (p. 226)
  • The case Operator (p. 227)
  • The printf Command and Output from Shell Scripts (p. 228)
  • The profile and /etc/profile (p. 230)
  • A Typical profile (p. 231)
  • The Operator (p. 235)
  • Command-Line Arguments (p. 235)
  • $#, $*, and Positional Parameters (p. 236)
  • Errors and Error Messages in Using Shell Scripts (p. 238)
  • Going Further (p. 239)
  • shar -- An Instructive Shell Script (p. 240)
  • The getopts Command (p. 243)
  • The trap Command (p. 245)
  • The wait Command (p. 246)
  • Shell Layers and the shl Command (p. 247)
  • Virtual Consoles (p. 249)
  • Shell Functions (p. 250)
  • Using The CDPATH Variable (p. 252)
  • Command Sequences (p. 252)
  • 9 Understanding UNIX System Documentation (p. 253)
  • The UNIX User's Manual (p. 253)
  • The Layout of the User's Manual (p. 254)
  • Referring to the Manual Section of a Command (p. 257)
  • A Typical Man Page (p. 257)
  • Synopsis (p. 259)
  • Description (p. 260)
  • Other Parts of the Man Page (p. 261)
  • The Permuted Index (p. 262)
  • The On-line man Command (p. 264)
  • On-line help Command (p. 266)
  • Using Help from the Command Line (p. 270)
  • Going Further (p. 271)
  • The Help Directory Structure (p. 272)
  • Changing the Help Database (p. 272)
  • Other Sections of the Manual (p. 274)
  • Command-line Generators (p. 275)
  • 10 Computation and Number Processing (p. 277)
  • A Note on Electronic Spreadsheets (p. 278)
  • Shell Reprise (p. 278)
  • The dc and bc Calculators (p. 278)
  • The dc Command (p. 279)
  • Variables in dc (p. 281)
  • The bc Calculator (p. 283)
  • bc Notation (p. 284)
  • bc Statements and Operators (p. 287)
  • bc Functions (p. 290)
  • The awk Command (p. 292)
  • Basic awk Concepts (p. 293)
  • How awk Reads Input Lines (p. 294)
  • awk Patterns and Actions (p. 294)
  • Numeric Operations with awk (p. 298)
  • Special Patterns for the Beginning and End of Processing (p. 300)
  • awk Statements (p. 301)
  • Formatting Output with awk (p. 304)
  • Going Further (p. 307)
  • The New awk Program (p. 307)
  • 11 The Process (p. 311)
  • Timesharing in the UNIX System (p. 312)
  • A Note on Priority Classes (p. 313)
  • Controlling Process Priority Within the Timesharing Class (p. 314)
  • Background Processes (p. 315)
  • Logging Off While Background Processes Are Running (p. 316)
  • Parents and Children (p. 317)
  • The ps Command (p. 318)
  • Listing the Activity of Other Users (p. 320)
  • System Processes (p. 321)
  • Diagnosing Problems with Processes (p. 325)
  • Killing a Process (p. 326)
  • Signals (p. 327)
  • Going Further (p. 328)
  • Processes that Respawn (p. 328)
  • Why the First ps Takes Longer (p. 330)
  • Waiting and Defunct Processes (p. 330)
  • Session Groups (p. 331)
  • /proc (p. 332)
  • Real-Time Processes (p. 333)
  • 12 UNIX System Administration (p. 337)
  • The Superuser (p. 338)
  • The Superuser Environment (p. 339)
  • The su Command (p. 339)
  • The su Environment (p. 341)
  • Switching to Another Login (p. 341)
  • Creating News and the Message of the Day (p. 342)
  • System Mail Sent to the Administrator (p. 343)
  • Solving Unusual Problems (p. 343)
  • System Administration User Agents (p. 344)
  • Controlling the User Agent (p. 345)
  • When in Doubt, Take the Default Values (p. 348)
  • Handling Floppy Diskettes (p. 349)
  • Formatting Floppy Disks (p. 349)
  • Making a File System on a Formatted Diskette (p. 350)
  • Mounting a Diskette (p. 351)
  • Copying a Floppy Disk (p. 352)
  • Disk Backup and Restore (p. 352)
  • Restoring Files from Backup (p. 354)
  • Displaying Hard Disk Usage (p. 354)
  • Setting the Date and Time (p. 355)
  • Shutting Down the Machine (p. 355)
  • Adding and Removing User Login Ids (p. 356)
  • Installing Software Packages (p. 358)
  • Setting the Machine Name (p. 358)
  • Mail Setup (p. 359)
  • Scheduling Automatic Tasks (p. 361)
  • Printer Management (p. 361)
  • Installing a Printer (p. 362)
  • Managing an Existing Printer (p. 363)
  • Network Services (p. 364)
  • Port Management (p. 364)
  • Quick Terminal Setup (p. 365)
  • Port Monitor Management (p. 365)
  • Port Service Management (p. 366)
  • Going Further (p. 367)
  • The uname Command (p. 368)
  • More on Terminal Modes (p. 369)
  • Starting a Port Monitor (p. 370)
  • Starting a Service Within a Port Monitor (p. 370)
  • Installing New Terminal Descriptions (p. 372)
  • Using Color Monitors (p. 373)
  • 13 Printing (p. 375)
  • Using the lp Command (p. 376)
  • Canceling a Job (p. 378)
  • Printing on Forms (p. 378)
  • Content-Types and Print Filters (p. 379)
  • Additional Print Options and Defaults (p. 380)
  • Determining Printer Status (p. 381)
  • Command-Line Options for lpstat (p. 381)
  • lpsched, the lp Demon (p. 383)
  • Starting and Stopping the Scheduler (p. 384)
  • Connecting a Printer (p. 384)
  • Installing a Printer into the lp System (p. 386)
  • Testing Your Printer Configuration (p. 387)
  • Printer Interface Models (p. 388)
  • Configuring the lp Software (p. 388)
  • The Printer Type (p. 389)
  • Specifying the Printer Content-Type (p. 390)
  • Additional Print Options and Defaults (p. 390)
  • The Default Destination (p. 391)
  • Checking the Installation (p. 392)
  • Removing a Printer (p. 392)
  • Accepting Print Requests (p. 392)
  • Enabling the Printer (p. 393)
  • Moving Jobs from One Printer to Another (p. 395)
  • Going Further (p. 396)
  • Printer Classes (p. 396)
  • Using Forms (p. 398)
  • Using Character Sets and Printwheels (p. 401)
  • Using Filters (p. 402)
  • Server Machines (p. 404)
  • Remote Access to Printing via LAN (p. 405)
  • Remote Access to Printing via uucp (p. 406)
  • The lp Directory Structure (p. 407)
  • Printer Drivers (p. 409)
  • 14 Basic Communications (p. 411)
  • The news Command (p. 412)
  • The Message of the Day (p. 414)
  • The write Command (p. 414)
  • Using write Interactively (p. 416)
  • The wall Command (p. 417)
  • The mail Command Revisited (p. 418)
  • A Note on Versions of the Mail Service (p. 418)
  • Mail Concepts (p. 419)
  • Sending Mail (p. 419)
  • Sending Binary Files in Mail (p. 420)
  • Reading Your Mail (p. 420)
  • mail Message Structure (p. 422)
  • Creating Messages with Headers (p. 422)
  • Displaying a Summary of Mailbox Contents (p. 423)
  • Replying to a Mail Message (p. 424)
  • Addressing Mail to Other Users (p. 425)
  • Domain Addressing (p. 426)
  • Forwarding Mail (p. 427)
  • Automatically Answering Incoming Mail (p. 429)
  • The rmail Command (p. 430)
  • Terminal Emulation with the cu Command (p. 430)
  • Disconnecting from a cu Session (p. 432)
  • cu Command-Line Options (p. 433)
  • Going Further (p. 434)
  • cu Internal Commands (p. 434)
  • ASCII File Transfer with cu (p. 435)
  • Transferring Binary Files with cu (p. 437)
  • Other Internal cu Commands (p. 438)
  • The mailx Command (p. 438)
  • The ct Command (p. 440)
  • 15 The uucp Data Communications Subsystem (p. 441)
  • The uuto Command (p. 442)
  • The uupick Command (p. 443)
  • A Note on uucp Security (p. 444)
  • The uucp Command (p. 445)
  • Logical Path Names (p. 446)
  • Command-Line Options for the uucp Command (p. 447)
  • The uux Command (p. 448)
  • The uustat Command (p. 450)
  • Reporting on Specific Machines (p. 451)
  • Deleting a Queued Job (p. 452)
  • Administration of the uucp Subsystem (p. 452)
  • A Note on Versions of uucp (p. 453)
  • uucp Directory Structure (p. 453)
  • uucp Subsystem Architecture (p. 456)
  • Specifying a Connection Method to a Remote System (p. 457)
  • The Systems Files (p. 459)
  • The Devices File (p. 460)
  • The Dialers File (p. 462)
  • Going Further (p. 463)
  • Debugging uucp Connections (p. 463)
  • The uulog Command (p. 468)
  • The uucp Administrative Demons (p. 469)
  • Polling Other Machines (p. 470)
  • Changing the Data Transfer Protocol (p. 471)
  • Grades of Service (p. 471)
  • The Devconfig File (p. 472)
  • Using uucp on TCP/IP Networks (p. 472)
  • rje and IBM 3270 Emulation (p. 474)
  • 16 The Korn and C Shells (p. 475)
  • Selecting an Enhanced Shell (p. 477)
  • The Korn Shell (p. 477)
  • Starting the Korn Shell (p. 478)
  • Command History in ksh (p. 480)
  • ksh Command Editing with the vi Mode (p. 481)
  • ksh Command Editing with the emacs Mode (p. 483)
  • Aliases in ksh (p. 484)
  • The whence Command (p. 487)
  • The fc Command (p. 487)
  • Tilde Substitution (p. 489)
  • Changing Directories under ksh (p. 489)
  • The set Command (p. 490)
  • ksh Enhancements for Shell Programming (p. 492)
  • Arithmetic Operators (p. 493)
  • Arrays (p. 494)
  • Improved Prompting, Input and Output (p. 494)
  • Environment Variable Processing Under ksh (p. 495)
  • The C Shell (p. 496)
  • Starting the C Shell (p. 496)
  • The csh Command Line (p. 497)
  • Setting csh Variables (p. 498)
  • Command History and Editing in csh (p. 499)
  • Hashing (p. 501)
  • Aliases (p. 502)
  • I/O Redirection with csh (p. 502)
  • Shell Programming with csh (p. 503)
  • Identifying a Command with csh (p. 506)
  • Selecting a Shell to Execute a Shell Script (p. 506)
  • Going Further (p. 507)
  • Selecting a Login Shell (p. 508)
  • Filename Completion (p. 509)
  • More on the ksh ENV File (p. 510)
  • Setting the Current Directory in your PS1 (p. 511)
  • Job Control (p. 511)
  • Coprocesses under ksh (p. 513)
  • 17 Word Processing (p. 515)
  • The spell Command (p. 516)
  • The troff Document Preparation Package (p. 518)
  • The troff Command Line (p. 519)
  • The troff Command Language (p. 520)
  • Basic troff Concepts (p. 520)
  • troff Units (p. 521)
  • Page Layout (p. 521)
  • Font and Character Control (p. 528)
  • Fill Control (p. 529)
  • troff Registers (p. 532)
  • Macro Packages for troff (p. 535)
  • The mm Macros (p. 536)
  • Basic Commands (p. 536)
  • Predefined mm Memo Formats (p. 538)
  • Abstract and "Copy to" Notation (p. 544)
  • Headings (p. 544)
  • Displays (p. 546)
  • Lists (p. 547)
  • Footnotes, References, and Table of Contents (p. 548)
  • Page Headers and Footers (p. 549)
  • The man Macros (p. 550)
  • Going Further (p. 550)
  • The tbl Command (p. 550)
  • Formatting Mathematical Equations and Graphics (p. 556)
  • troff Directory Structure (p. 557)
  • Conditionals and Macros in troff (p. 557)
  • Logos in mm (p. 559)
  • The Writer's Workbench (p. 559)
  • The spell History File (p. 560)
  • Building a New spell Database (p. 561)
  • 18 Media (p. 563)
  • Disk Blocks and Inodes (p. 564)
  • File Systems (p. 565)
  • Hard Disk Management (p. 565)
  • Disk Free Space--The df Command (p. 565)
  • Disk Space Used--The du Command (p. 567)
  • Size of Files and the ulimit (p. 568)
  • Never Fill the Hard Disk (p. 569)
  • File Compression (p. 570)
  • File System Types (p. 572)
  • Floppy Disk Management (p. 573)
  • Device Files for Disks (p. 574)
  • Formatting Floppy Disks (p. 579)
  • Making a File System on the Disk (p. 580)
  • Specifying File System Size (p. 580)
  • Mounting a Floppy Disk (p. 581)
  • Using the mount Command (p. 583)
  • Unmounting a Diskette (p. 584)
  • Reporting on Mounted Media (p. 585)
  • Copying Floppy Disks (p. 586)
  • Manually Copying a Mounted Disk with cp (p. 586)
  • The dd Command (p. 586)
  • The dd Command Line (p. 587)
  • Raw Device Access--The cpio Command (p. 589)
  • Using Media for cpio Operations (p. 590)
  • Creating cpio Archives (p. 590)
  • cpio Compatibility (p. 591)
  • Using cpio (p. 592)
  • Reading a cpio Archive (p. 593)
  • cpio Command-Line Options for Input (p. 594)
  • Displaying a Table of Contents for an Archive (p. 595)
  • Selecting a Subset of Archived Files (p. 596)
  • Archiving to a Floppy Disk or Tape (p. 597)
  • Backing Up and Restoring Your Files (p. 598)
  • Backups Using cpio (p. 599)
  • Backups Using backup and restore (p. 600)
  • Backups Using ufsdump (p. 600)
  • A Note on Backups (p. 600)
  • Care of Floppy Disks (p. 601)
  • Recovering Damaged Archives (p. 602)
  • Going Further (p. 602)
  • Moving a Directory Hierarchy as a Unit (p. 603)
  • Creating Unusual File Systems (p. 603)
  • Mounting a Second Hard Disk (p. 604)
  • Permanently Mounting a File System (p. 605)
  • File System Checking (p. 606)
  • Magnetic Tape (p. 607)
  • The tapecntl Command (p. 609)
  • The tar Command (p. 610)
  • Mounting Your Hard Disk from a Bootable Floppy (p. 612)
  • Quotas (p. 613)
  • 19 Using MS-DOS with the UNIX System (p. 615)
  • Using MS-DOS Disks (p. 616)
  • Mounting MS-DOS Disks (p. 619)
  • Converting Files (p. 620)
  • A Note on Merge Packages (p. 621)
  • Starting and Stopping MS-DOS (p. 622)
  • The MS-DOS Startup Files (p. 623)
  • Ending the MS-DOS Session (p. 624)
  • Background Execution of MS-DOS (p. 624)
  • Screen Switching (p. 625)
  • Invoking MS-DOS Applications Directly from the Shell (p. 626)
  • Pipelines and Shell Scripts (p. 627)
  • MS-DOS Command Extensions (p. 628)
  • PATH and Other Environment Variables (p. 629)
  • Executing UNIX System Programs from the MS-DOS Session (p. 630)
  • Job Control (p. 631)
  • Disk Usage Under the Merge Session (p. 633)
  • File and Directory Naming (p. 634)
  • The udir Command (p. 636)
  • A Note on Multiple Access to Files (p. 636)
  • File Conversions (p. 637)
  • MS-DOS Directories (p. 638)
  • MS-DOS Memory Allocation (p. 639)
  • Other Command-Line Options for the dos Command (p. 640)
  • Device Sharing Between the MS-DOS and UNIX Systems (p. 641)
  • Floppy Disk Management (p. 641)
  • Printing Under MS-DOS (p. 642)
  • Using Communication Ports (p. 643)
  • Going Further (p. 643)
  • Unusable MS-DOS Commands (p. 644)
  • Running Merge from a Terminal (p. 644)
  • Running Merge Under the X Window System (p. 645)
  • Microsoft Windows Under Merge (p. 646)
  • Communications and Interrupts (p. 646)
  • Standalone MS-DOS on a UNIX Machine (p. 647)
  • The E Drive (p. 648)
  • The D Drive (p. 648)
  • The J Drive (p. 649)
  • Virtual Disk Files (p. 649)
  • Booting the MS-DOS Session from a Floppy Disk (p. 651)
  • Using MS-DOS as a Login Shell (p. 652)
  • The dosopt Command (p. 652)
  • Installing the Merge Feature (p. 653)
  • The MS-DOS Image (p. 653)
  • 20 Timing and Scheduling (p. 655)
  • A Note on Timesharing Vs. Real-Time Performance (p. 656)
  • The UNIX System Is Designed to Operate All the Time (p. 656)
  • The date Command Revisited (p. 657)
  • Setting the System Date (p. 658)
  • The Time Zone and Daylight-Saving Time (p. 659)
  • File Times (p. 659)
  • The touch Command (p. 660)
  • The at and batch Commands (p. 661)
  • Specifying a Date for the at Command (p. 662)
  • Displaying the at Job Queue (p. 664)
  • The batch Command (p. 665)
  • Security Considerations with at and batch (p. 666)
  • The cron Facility (p. 668)
  • crontab File Format (p. 669)
  • The crontab Command (p. 672)
  • cron Permissions and Security (p. 673)
  • Going Further (p. 674)
  • The cron Log File (p. 674)
  • Measuring Command Execution Time (p. 675)
  • The sync Operation (p. 677)
  • System Usage Accounting for Individual Users (p. 677)
  • Process Accounting with the sar Package (p. 678)
  • 21 Boot and Shutdown (p. 681)
  • The Ongoing System Environment (p. 681)
  • Shutting Down the Machine (p. 682)
  • The shutdown Command (p. 682)
  • The Boot Sequence (p. 685)
  • init States (p. 688)
  • Changing the init State (p. 689)
  • The /etc/inittab File (p. 690)
  • init Actions (p. 692)
  • Boot-Time Processing (p. 692)
  • rc Scripts (p. 693)
  • The Service Access Facility (p. 695)
  • Making Changes to the inittab File (p. 696)
  • Going Further (p. 696)
  • A Shorter Shutdown Procedure for SVR4 (p. 697)
  • The fsck Command (p. 698)
  • 22 Security (p. 701)
  • A Security Policy (p. 702)
  • Protecting Your Data from Other Users (p. 703)
  • Default Permissions for File Creation (p. 704)
  • File Encryption (p. 705)
  • Login Ids and Passwords (p. 707)
  • Login History (p. 708)
  • The Superuser (p. 709)
  • The Password File (p. 709)
  • A Typical/etc/passwd File (p. 711)
  • Adding and Deleting Users (p. 713)
  • Password Aging (p. 714)
  • Deleting a User (p. 716)
  • Adding Groups (p. 717)
  • The Restricted Shell (p. 718)
  • Protection of the UNIX System and Files (p. 720)
  • Physical Security (p. 721)
  • Local Area Networks (p. 722)
  • uucp Security (p. 722)
  • The uucp Permissions File (p. 723)
  • The Default Permissions (p. 724)
  • Customizing the Permissions File (p. 724)
  • Controlling Incoming Calls with the LOGNAME Line (p. 725)
  • Controlling Outgoing Calls with the MACHINE Lines (p. 726)
  • The uucheck Command (p. 727)
  • Unknown Remote Machines and Polling (p. 727)
  • Going Further (p. 729)
  • System Attacks (p. 729)
  • Defender Behavior (p. 730)
  • Detecting an Attack (p. 731)
  • Trojan Horses, Viruses, and Worms (p. 732)
  • System V/MLS (p. 732)
  • 23 The X Window System (p. 735)
  • Basic X Concepts (p. 736)
  • The X Server (p. 737)
  • Client Applications (p. 737)
  • Window Managers (p. 737)
  • Starting X (p. 739)
  • The DISPLAY Environment Variable (p. 740)
  • Managing Windows (p. 741)
  • Input Focus (p. 742)
  • Controlling Window Position (p. 742)
  • Selecting Multiple Windows (p. 743)
  • Resizing a Window (p. 745)
  • The Workspace Menu (p. 745)
  • Scrollbars (p. 747)
  • The Help System (p. 748)
  • The File Manager (p. 748)
  • Drag-and-Drop Operations (p. 750)
  • Name Matching (p. 750)
  • The xterm Client (p. 751)
  • xterm Menus (p. 752)
  • Cut and Paste with xterm (p. 752)
  • xterm Command-Line Options (p. 754)
  • Generic X Command-Line Arguments (p. 755)
  • Window Geometry (p. 755)
  • Fonts (p. 756)
  • Colors (p. 758)
  • Titles and Names (p. 759)
  • Icons and Help (p. 759)
  • X Clients (p. 759)
  • The xhost Client (p. 761)
  • The xset and xsetroot Clients (p. 763)
  • The xcalc Client (p. 764)
  • xbiff and Reading Mail (p. 764)
  • Going Further (p. 764)
  • The xinit Command Line (p. 765)
  • The xinit Startup Script (p. 765)
  • Ending the X Session (p. 766)
  • The Resource Database (p. 768)
  • The xrdb Command (p. 770)
  • The Keyboard Map and the xmodmap Command (p. 771)
  • Programming the olwm Workspace Menu (p. 773)
  • Using X with Virtual Consoles and DOS (p. 774)
  • Authorizing Users for X (p. 774)
  • Session Management and X Terminals (p. 776)
  • 24 Networking (p. 777)
  • Access to Remote Machines (p. 778)
  • The rlogin Command (p. 779)
  • The rcp Command (p. 780)
  • The rsh Command (p. 780)
  • Network Information Commands (p. 782)
  • The rusers Command (p. 782)
  • The finger Command (p. 783)
  • The ping Command (p. 784)
  • Access to Remote Files (p. 785)
  • Determining Mountable Resources (p. 786)
  • Mounting Resources from Remote Machines (p. 787)
  • Mounting Several Resources (p. 788)
  • Listing Mounted Resources (p. 788)
  • Unmounting Remote Resources (p. 788)
  • Automatic Mounts (p. 789)
  • A Note on Clients, Servers, and init States (p. 789)
  • Sharing Resources with Other Machines (p. 791)
  • Listing Shared Resources (p. 792)
  • Sharing Several Resources (p. 792)
  • Unsharing Resources (p. 793)
  • Reporting on Shared Resources in Use (p. 793)
  • A Note on Security Considerations for Sharing (p. 794)
  • Going Further (p. 794)
  • The rdate Command (p. 795)
  • The telnet Command (p. 795)
  • Networking Demons (p. 797)
  • Setting Up a New Machine on a Net (p. 797)
  • Setting Up NFS (p. 797)
  • Setting Up a Machine on RFS (p. 800)
  • More RFS Issues (p. 804)
  • Using Both NFS and RFS on a Machine (p. 805)
  • SVR3 RFS Commands under SVR4 (p. 805)
  • Configuring mail for a Network (p. 808)
  • A Note on Commercial Networked Applications (p. 810)
  • Device Sharing (p. 810)
  • More Networking Concepts (p. 811)
  • Yellow Pages (p. 812)
  • 25 System Configuration (p. 815)
  • Hardware and the UNIX System (p. 815)
  • The 80386 and Other Machines (p. 816)
  • Memory (RAM) Considerations (p. 817)
  • Disk Considerations (p. 817)
  • The Console and Monitor (p. 819)
  • Ports and Terminals (p. 820)
  • SVR4 Licensing Restrictions (p. 821)
  • Printers (p. 821)
  • Networking (p. 822)
  • Magnetic Tape (p. 822)
  • A Minimal Configuration (p. 823)
  • Setting Up the System (p. 823)
  • Testing the Initial Configuration (p. 824)
  • Hard Disk Partitions (p. 827)
  • Swap and Dump Space (p. 828)
  • File Systems (p. 829)
  • File System Types (p. 830)
  • A Note on Software Packaging (p. 830)
  • Loading the System Software (p. 831)
  • Full or Overlay Installation (p. 832)
  • Hardware Selection (p. 832)
  • Selecting Software Packages (p. 832)
  • fdisk Installation Procedure (p. 833)
  • Prompted Installation Procedure (p. 837)
  • File System Partitioning (p. 840)
  • Loading the Foundation Set (p. 842)
  • The Setup Procedures (p. 842)
  • Installing Additional Software Packages (p. 844)
  • Loading Software from the Shell (p. 845)
  • Using the Installation Commands (p. 845)
  • Terminal Setup (p. 846)
  • Going Further (p. 847)
  • PANIC Messages (p. 847)
  • Booting from a Floppy Disk (p. 848)
  • Upgrading from Older Releases to SVR4 (p. 849)
  • System Defaults (p. 851)
  • Tunable Parameters (p. 852)
  • 26 Going Further (p. 855)
  • Games and Toys (p. 856)
  • The Worldwide User Community (p. 857)
  • Reading the News (p. 859)
  • Replying to an Article by Mail (p. 864)
  • Introduction to xrn (p. 865)
  • Creating an Article (p. 865)
  • A Note on News Etiquette (p. 867)
  • The Internet and the ftp Command (p. 868)
  • ftp Addressing and Login (p. 868)
  • ftp Command Mode (p. 870)
  • File Transfer with ftp (p. 871)
  • Software Development (p. 873)
  • The Source Code Control System (p. 875)
  • The Expanding Influence of the UNIX System (p. 878)
  • Bibliography (p. 879)
  • A Few Last Words (p. 881)
  • Index (p. 883)

Author notes provided by Syndetics

Stephen Coffin, author of the top-selling UNIX: The Complete Reference, does research in the areas of UNIX and X Windows at U.S. West Advanced Technologies, Inc.

Powered by Koha