Index
- a command (append in insert mode), 1st
- a command (append text), 1st,
2nd
- abbreviated user account names, 1st,
2nd, 3rd
- abbreviating
- commands, 1st, 2nd,
3rd, 4th
- macros
- command execution, 1st,
2nd
- HTML files, 1st,
2nd, 3rd,
4th, 5th,
6th
- long words and phrases, 1st,
2nd, 3rd,
4th
- mixing words, 1st,
2nd, 3rd,
4th, 5th
- scripts, 1st, 2nd,
3rd, 4th,
5th, 6th,
7th, 8th
- system administration, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th, 9th,
10th, 11th,
12th, 13th,
14th
- typographical errors, 1st,
2nd, 3rd
- access
- FTP
- restricting, 1st,
2nd, 3rd
- local
- unmounting devices, 1st
- networks
- troubleshooting, 1st,
2nd
- remote
- clear command, 1st
- network configuration, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th, 9th,
10th
- passwords, 1st, 2nd,
3rd
- ping, 1st, 2nd,
3rd, 4th
- reboot command, 1st
- restricting, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th, 9th,
10th, 11th,
12th, 13th,
14th, 15th,
16th, 17th,
18th, 19th,
20th, 21st,
22nd
- single-user state, 1st
- unmounting, 1st
- unmounting devices, 1st
- root
- monitoring, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th
- UID passwords, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th
- superuser root account, 1st
- access permission, 1st
- accounts
- see user accounts, 1st
- achievements
- administrators
- resumes, 1st
- activating
- swap files
- on startup, 1st
- adding
- files
- to terminfo, 1st,
2nd, 3rd,
4th, 5th
- swap files, 1st, 2nd,
3rd, 4th
- user accounts
- from command prompts, 1st,
2nd, 3rd,
4th
- addresses
- Ethernet (MAC)
- outputting, 1st,
2nd, 3rd,
4th, 5th
- IP
- editing, 1st
- administration
- local, 1st
- macros
- abbreviating, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th, 9th,
10th, 11th,
12th, 13th,
14th
- multitasking, 1st
- administrators, 1st
- code of ethics, 1st
- corporate policy, 1st,
2nd
- customer support, 1st
- documentation, 1st
- employment, 1st
- companies, 1st
- conferences, 1st
- conferences/seminars, 1st
- email, 1st
- networking, 1st,
2nd
- newspapers, 1st
- recruiters, 1st,
2nd
- technical job fairs, 1st,
2nd
- Usenet newsgroups, 1st,
2nd, 3rd
- vendors, 1st, 2nd
- web sites, 1st,
2nd
- gurus, 1st, 2nd,
3rd
- intermediate/advanced, 1st,
2nd, 3rd,
4th
- interpersonal skills, 1st,
2nd, 3rd
- interviews
- candidates, 1st
- case scenario questions, 1st,
2nd
- employer questions, 1st,
2nd
- favorite hard questions, 1st,
2nd, 3rd
- file questions, 1st,
2nd, 3rd
- in person, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th, 9th,
10th, 11th,
12th
- interpersonal skills, 1st,
2nd, 3rd,
4th, 5th
- nontechnical, 1st
- preparation, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th
- procedural questions, 1st,
2nd, 3rd
- resume verification questions, 1st,
2nd, 3rd
- standard questions, 1st,
2nd
- system commands, 1st,
2nd, 3rd
- technical, 1st
- telephone, 1st,
2nd, 3rd,
4th
- jobs
- newspaper advertisements, 1st
- junior-level, 1st,
2nd, 3rd
- multiple
- root access, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th
- networking, 1st
- networks, 1st
- porting, 1st
- programming, 1st
- resumes
- achievements, 1st
- contact information, 1st,
2nd
- contracting/consulting, 1st,
2nd, 3rd,
4th
- devices, 1st
- education, 1st,
2nd
- format, 1st, 2nd,
3rd
- keywords, 1st, 2nd,
3rd
- multiple, 1st
- objectives, 1st,
2nd
- operating systems, 1st
- organization affiliations, 1st
- paper type, 1st,
2nd
- sample, 1st, 2nd,
3rd, 4th,
5th, 6th,
7th, 8th,
9th, 10th,
11th, 12th
- size, 1st
- software, 1st, 2nd
- submitting, 1st
- systems, listing, 1st
- updating, 1st
- vendors, 1st
- work experience, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th, 9th
- salary, 1st, 2nd,
3rd
- scripting languages, 1st
- security, 1st
- senior, 1st, 2nd,
3rd, 4th
- support engineers (SE), 1st,
2nd, 3rd,
4th, 5th,
6th
- systems
- configuration, 1st
- installation, 1st
- terminals, 1st
- users
- interpersonal skills, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th, 9th,
10th, 11th,
12th, 13th
- relationship with, 1st,
2nd, 3rd,
4th
- vendor support, 1st
- work experience, 1st
- working hours, 1st
- adminstrators
- flavors
- knowledge of, 1st
- admintool (Aministration Tool), 1st
- advertisements
- employment
- technical job fairs, 1st
- Usenet newsgroups, 1st
- AIX
- smit (System Management Interface Tool), 1st
- alias, 1st
- alias command, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th, 9th,
10th, 11th,
12th
- directories
- displaying, 1st
- disk usage status, 1st
- files
- copying, 1st
- deleting, 1st
- finding, 1st
- renaming, 1st
- grep command, 1st
- help system, 1st
- logout, 1st
- mail clients, 1st
- NIS/YP, 1st
- OpenWindows, 1st
- permissions, 1st
- printers, 1st
- processes
- killing, 1st
- read access
- denying, 1st
- remote access, 1st
- startup files, 1st
- startup login scripts, 1st
- terminals, 1st
- time/date, 1st
- write access
- denying, 1st
- X, 1st
- aliases
- cshrc file, 1st
- directory manipulation, 1st
- hostname, 1st
- ls command, 1st
- X Window applications, 1st
- aliases command
- redirecting to null, 1st,
2nd
- see also unalias command, 1st
- aliases, see also hotkeys, 1st,
2nd, 3rd,
4th, 5th
- Aministration Tool (admintool), 1st
- anonymous FTP servers
- security, 1st, 2nd
- ANSI terminal
- database
- compiling, 1st
- append, 1st
- appending
- stty command
- erase option, 1st
- text, 1st
- application directory
- core files, 1st
- application layer (layer 7), 1st
- applications
- architecture, 1st
- user accounts
- names, 1st, 2nd,
3rd, 4th
- architecture
- applications, 1st
- file servers, 1st
- kernel, 1st
- archiving
- files, 1st, 2nd
- argument, 1st
- arguments
- command line, 1st
- remote hosts
- displaying, 1st
- arp command
- Ethernet (MAC) addresses, 1st,
2nd, 3rd,
4th, 5th
- arrow keys, 1st, 2nd,
3rd
- ASCII
- symbol table, 1st
- ascii command
- symbol table, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th
- ASCII terminals
- Ctrl+Q (unlock), 1st
- Ctrl+S (lock), 1st
- getty daemons, 1st,
2nd, 3rd,
4th
- monitoring, 1st, 2nd,
3rd, 4th,
5th, 6th,
7th, 8th,
9th, 10th,
11th, 12th,
13th, 14th
- noisy lines, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th
- power cycles, 1st,
2nd
- security, 1st
- troubleshooting, 1st
- unlocking, 1st, 2nd,
3rd, 4th
- asterisk (*), 1st
- AT&T
- ASCII symbol table
- locating, 1st, 2nd,
3rd, 4th,
5th, 6th,
7th
- binary files
- decoding, 1st, 2nd,
3rd, 4th,
5th, 6th,
7th
- encoding, 1st, 2nd,
3rd, 4th,
5th, 6th,
7th
- boot up process
- monitoring, 1st,
2nd, 3rd
- commands
- abbreviating, 1st,
2nd, 3rd,
4th
- aliases, 1st, 2nd,
3rd, 4th,
5th, 6th,
7th, 8th,
9th, 10th,
11th, 12th
- core files
- dumping, 1st
- finding, 1st, 2nd
- monitoring, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th
- sizing, 1st, 2nd,
3rd, 4th,
5th, 6th
- crash files
- monitoring, 1st,
2nd, 3rd,
4th
- daemons
- disabling, 1st, 2nd,
3rd, 4th,
5th, 6th,
7th, 8th
- getty, 1st, 2nd,
3rd
- restarting, 1st,
2nd, 3rd,
4th, 5th,
6th
- dashes (-)
- removing, 1st, 2nd
- data
- discarding, 1st,
2nd
- disk drives
- testing, 1st, 2nd,
3rd, 4th,
5th, 6th,
7th, 8th,
9th, 10th,
11th, 12th
- disk usage
- free space, 1st,
2nd
- monitoring, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th, 9th
- percentage, 1st,
2nd, 3rd,
4th, 5th,
6th
- DOS files
- ^M extension, 1st,
2nd, 3rd,
4th, 5th,
6th
- email
- redirecting to null, 1st
- Ethernet (MAC) addresses
- outputting, 1st,
2nd, 3rd,
4th, 5th
- files
- aliases, 1st, 2nd
- backups, 1st, 2nd,
3rd, 4th,
5th
- compression, 1st,
2nd
- cp command, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th
- cpio command, 1st,
2nd, 3rd,
4th, 5th
- dashes (-), 1st,
2nd, 3rd,
4th
- decryption, 1st,
2nd, 3rd
- deleting, 1st, 2nd,
3rd, 4th,
5th, 6th,
7th
- editing multiple, 1st,
2nd, 3rd
- egrep command, 1st,
2nd, 3rd,
4th
- encryption, 1st,
2nd, 3rd,
4th, 5th
- finding, 1st, 2nd,
3rd, 4th,
5th, 6th,
7th, 8th,
9th
- finding multiple, 1st,
2nd
- grep command, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th, 9th,
10th, 11th,
12th
- headers, 1st, 2nd
- hiding, 1st, 2nd,
3rd, 4th,
5th
- loading multiple, 1st,
2nd
- moving, 1st, 2nd,
3rd, 4th,
5th
- null output, 1st
- removing, 1st, 2nd
- renaming, 1st, 2nd,
3rd, 4th,
5th, 6th,
7th
- soft links, 1st
- splitting, 1st,
2nd, 3rd,
4th
- storing, 1st, 2nd,
3rd, 4th
- tar command, 1st,
2nd, 3rd,
4th, 5th,
6th
- uncompression, 1st
- zero size, 1st
- FTP access
- restricting, 1st,
2nd, 3rd
- home directories
- copying files, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th
- hosts
- monitoring with ping, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th
- hotkeys, 1st, 2nd,
3rd, 4th,
5th
- last day of month
- Perl method, 1st,
2nd, 3rd,
4th
- shell method, 1st,
2nd, 3rd
- load averages
- monitoring, 1st,
2nd, 3rd,
4th, 5th
- log files
- grep command, 1st,
2nd, 3rd,
4th, 5th
- reducing, 1st, 2nd,
3rd, 4th,
5th, 6th,
7th, 8th
- splitting, 1st,
2nd, 3rd,
4th, 5th
- macros
- creating, 1st, 2nd,
3rd, 4th,
5th, 6th
- scripts, 1st, 2nd,
3rd, 4th,
5th, 6th,
7th, 8th
- system administration, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th, 9th,
10th, 11th,
12th, 13th,
14th
- man pages
- escape characters, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th, 9th
- mouse
- controlling with keyboard, 1st,
2nd, 3rd,
4th
- MS-DOS, 1st, 2nd,
3rd, 4th,
5th, 6th,
7th, 8th
- networks
- disabling, 1st
- ifconfig command, 1st,
2nd, 3rd,
4th
- troubleshooting, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th, 9th,
10th, 11th,
12th, 13th,
14th, 15th,
16th, 17th
- NFS2
- mounting with NFS3, 1st,
2nd, 3rd
- talking with NFS3, 1st,
2nd, 3rd,
4th
- null
- copying files, 1st
- packets
- routed command, 1st,
2nd, 3rd
- static routing, 1st,
2nd, 3rd,
4th
- passwords
- encryption, 1st,
2nd, 3rd
- interpreting programs, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th
- interpreting shells, 1st,
2nd, 3rd,
4th
- shadow technique, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th
- stripping, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th
- PC users, 1st, 2nd,
3rd, 4th
- processes
- emailing output, 1st,
2nd, 3rd
- monitoring, 1st
- outputting, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th
- redirecting, 1st,
2nd, 3rd,
4th, 5th
- running after log out, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th
- ranges of numbers
- generating, 1st,
2nd, 3rd,
4th
- remote access
- passwords, 1st, 2nd,
3rd
- restricting, 1st
- remote hosts
- copying files, 1st,
2nd, 3rd,
4th, 5th
- FTP, 1st, 2nd,
3rd, 4th,
5th, 6th
- NFS, 1st, 2nd,
3rd
- ping, 1st, 2nd,
3rd, 4th
- rcp command, 1st,
2nd
- tar command, 1st,
2nd, 3rd,
4th
- root access
- UID passwords, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th
- root password
- clearing, 1st, 2nd,
3rd, 4th
- screens
- clear command, 1st,
2nd, 3rd,
4th, 5th
- refreshing, 1st,
2nd, 3rd,
4th, 5th
- xlock command, 1st,
2nd, 3rd,
4th
- scripts
- Edit Run Edit (ere), 1st,
2nd, 3rd,
4th, 5th,
6th
- security
- execute-only, 1st,
2nd
- read/write, 1st,
2nd, 3rd
- shells
- changing, 1st, 2nd,
3rd, 4th,
5th
- STDIN/STDOUT
- displaying, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th, 9th,
10th
- stty command
- echo option, 1st,
2nd, 3rd,
4th
- interrupt option (intr), 1st,
2nd
- ^?, 1st, 2nd,
3rd, 4th,
5th, 6th,
7th
- ^H, 1st, 2nd,
3rd, 4th,
5th, 6th,
7th
- swap files
- adding, 1st, 2nd
- symbolic links, 1st
- creating, 1st, 2nd,
3rd, 4th,
5th, 6th
- dead, 1st, 2nd,
3rd, 4th
- multiple, 1st, 2nd,
3rd
- paths, 1st, 2nd,
3rd, 4th
- physical directory, 1st
- server, 1st
- system data
- collecting, 1st, 2nd,
3rd, 4th,
5th, 6th,
7th
- systems
- migrating to, 1st,
2nd, 3rd,
4th, 5th,
6th
- tail command, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th
- tapes
- rewinding, 1st, 2nd,
3rd, 4th
- tar files
- encryption, 1st,
2nd, 3rd
- telnet
- restricting access, 1st,
2nd, 3rd
- temporary files
- storing, 1st, 2nd,
3rd, 4th,
5th, 6th,
7th, 8th,
9th, 10th,
11th, 12th,
13th, 14th,
15th, 16th
- TERM variable
- configuration, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th, 9th,
10th, 11th,
12th, 13th
- terminals
- columns, 1st, 2nd
- configuration, 1st,
2nd, 3rd,
4th, 5th
- rows, 1st, 2nd
- terminfo database, 1st
- uptime command, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th, 9th
- user accounts
- adding, 1st, 2nd,
3rd, 4th,
5th, 6th
- configuration, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th
- killing, 1st, 2nd
- programs, 1st, 2nd,
3rd
- scripts, 1st, 2nd,
3rd
- startup files, 1st,
2nd, 3rd,
4th
- users
- mailing list, 1st,
2nd, 3rd,
4th, 5th,
6th
- vi editor
- mail command, 1st,
2nd, 3rd,
4th, 5th
- man pages, 1st,
2nd
- windows
- killing, 1st, 2nd,
3rd, 4th
- workstations
- time verification, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th, 9th,
10th
- X session
- killing, 1st, 2nd,
3rd
- X Window application
- displaying, 1st
- hard-coding, 1st
- passing arguments, 1st
- remote hosts, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th, 9th,
10th, 11th
- X Window applications
- aliases, 1st
- authentication
- users, 1st
- autoindentation
- vi editor
- parameters, 1st,
2nd
- automating
- tasks, 1st
- avertisements
- employment, 1st
- conferences/seminars, 1st
- networking, 1st
- recruiters, 1st
- vendors, 1st
- web sites, 1st
- awk command
- ping, 1st
© Copyright Macmillan USA.
All rights reserved.