UNIX Hints & Hacks

Contents

Index

 

Index

A

a command (append in insert mode), 1st
a command (append text), 1st, 2nd
abbreviated user account names, 1st, 2nd, 3rd
abbreviating
commands, 1st, 2nd, 3rd, 4th
macros
command execution, 1st, 2nd
HTML files, 1st, 2nd, 3rd, 4th, 5th, 6th
long words and phrases, 1st, 2nd, 3rd, 4th
mixing words, 1st, 2nd, 3rd, 4th, 5th
scripts, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
system administration, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th, 12th, 13th, 14th
typographical errors, 1st, 2nd, 3rd
access
FTP
restricting, 1st, 2nd, 3rd
local
unmounting devices, 1st
networks
troubleshooting, 1st, 2nd
remote
clear command, 1st
network configuration, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th
passwords, 1st, 2nd, 3rd
ping, 1st, 2nd, 3rd, 4th
reboot command, 1st
restricting, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th, 12th, 13th, 14th, 15th, 16th, 17th, 18th, 19th, 20th, 21st, 22nd
single-user state, 1st
unmounting, 1st
unmounting devices, 1st
root
monitoring, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
UID passwords, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
superuser root account, 1st
access permission, 1st
accounts
see user accounts, 1st
achievements
administrators
resumes, 1st
activating
swap files
on startup, 1st
adding
files
to terminfo, 1st, 2nd, 3rd, 4th, 5th
swap files, 1st, 2nd, 3rd, 4th
user accounts
from command prompts, 1st, 2nd, 3rd, 4th
addresses
Ethernet (MAC)
outputting, 1st, 2nd, 3rd, 4th, 5th
IP
editing, 1st
administration
local, 1st
macros
abbreviating, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th, 12th, 13th, 14th
multitasking, 1st
administrators, 1st
code of ethics, 1st
corporate policy, 1st, 2nd
customer support, 1st
documentation, 1st
employment, 1st
companies, 1st
conferences, 1st
conferences/seminars, 1st
email, 1st
networking, 1st, 2nd
newspapers, 1st
recruiters, 1st, 2nd
technical job fairs, 1st, 2nd
Usenet newsgroups, 1st, 2nd, 3rd
vendors, 1st, 2nd
web sites, 1st, 2nd
gurus, 1st, 2nd, 3rd
intermediate/advanced, 1st, 2nd, 3rd, 4th
interpersonal skills, 1st, 2nd, 3rd
interviews
candidates, 1st
case scenario questions, 1st, 2nd
employer questions, 1st, 2nd
favorite hard questions, 1st, 2nd, 3rd
file questions, 1st, 2nd, 3rd
in person, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th, 12th
interpersonal skills, 1st, 2nd, 3rd, 4th, 5th
nontechnical, 1st
preparation, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
procedural questions, 1st, 2nd, 3rd
resume verification questions, 1st, 2nd, 3rd
standard questions, 1st, 2nd
system commands, 1st, 2nd, 3rd
technical, 1st
telephone, 1st, 2nd, 3rd, 4th
jobs
newspaper advertisements, 1st
junior-level, 1st, 2nd, 3rd
multiple
root access, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
networking, 1st
networks, 1st
porting, 1st
programming, 1st
resumes
achievements, 1st
contact information, 1st, 2nd
contracting/consulting, 1st, 2nd, 3rd, 4th
devices, 1st
education, 1st, 2nd
format, 1st, 2nd, 3rd
keywords, 1st, 2nd, 3rd
multiple, 1st
objectives, 1st, 2nd
operating systems, 1st
organization affiliations, 1st
paper type, 1st, 2nd
sample, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th, 12th
size, 1st
software, 1st, 2nd
submitting, 1st
systems, listing, 1st
updating, 1st
vendors, 1st
work experience, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th
salary, 1st, 2nd, 3rd
scripting languages, 1st
security, 1st
senior, 1st, 2nd, 3rd, 4th
support engineers (SE), 1st, 2nd, 3rd, 4th, 5th, 6th
systems
configuration, 1st
installation, 1st
terminals, 1st
users
interpersonal skills, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th, 12th, 13th
relationship with, 1st, 2nd, 3rd, 4th
vendor support, 1st
work experience, 1st
working hours, 1st
adminstrators
flavors
knowledge of, 1st
admintool (Aministration Tool), 1st
advertisements
employment
technical job fairs, 1st
Usenet newsgroups, 1st
AIX
smit (System Management Interface Tool), 1st
alias, 1st
alias command, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th, 12th
directories
displaying, 1st
disk usage status, 1st
files
copying, 1st
deleting, 1st
finding, 1st
renaming, 1st
grep command, 1st
help system, 1st
logout, 1st
mail clients, 1st
NIS/YP, 1st
OpenWindows, 1st
permissions, 1st
printers, 1st
processes
killing, 1st
read access
denying, 1st
remote access, 1st
startup files, 1st
startup login scripts, 1st
terminals, 1st
time/date, 1st
write access
denying, 1st
X, 1st
aliases
cshrc file, 1st
directory manipulation, 1st
hostname, 1st
ls command, 1st
X Window applications, 1st
aliases command
redirecting to null, 1st, 2nd
see also unalias command, 1st
aliases, see also hotkeys, 1st, 2nd, 3rd, 4th, 5th
Aministration Tool (admintool), 1st
anonymous FTP servers
security, 1st, 2nd
ANSI terminal
database
compiling, 1st
append, 1st
appending
stty command
erase option, 1st
text, 1st
application directory
core files, 1st
application layer (layer 7), 1st
applications
architecture, 1st
user accounts
names, 1st, 2nd, 3rd, 4th
architecture
applications, 1st
file servers, 1st
kernel, 1st
archiving
files, 1st, 2nd
argument, 1st
arguments
command line, 1st
remote hosts
displaying, 1st
arp command
Ethernet (MAC) addresses, 1st, 2nd, 3rd, 4th, 5th
arrow keys, 1st, 2nd, 3rd
ASCII
symbol table, 1st
ascii command
symbol table, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
ASCII terminals
Ctrl+Q (unlock), 1st
Ctrl+S (lock), 1st
getty daemons, 1st, 2nd, 3rd, 4th
monitoring, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th, 12th, 13th, 14th
noisy lines, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
power cycles, 1st, 2nd
security, 1st
troubleshooting, 1st
unlocking, 1st, 2nd, 3rd, 4th
asterisk (*), 1st
AT&T
ASCII symbol table
locating, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
binary files
decoding, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
encoding, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
boot up process
monitoring, 1st, 2nd, 3rd
commands
abbreviating, 1st, 2nd, 3rd, 4th
aliases, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th, 12th
core files
dumping, 1st
finding, 1st, 2nd
monitoring, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
sizing, 1st, 2nd, 3rd, 4th, 5th, 6th
crash files
monitoring, 1st, 2nd, 3rd, 4th
daemons
disabling, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
getty, 1st, 2nd, 3rd
restarting, 1st, 2nd, 3rd, 4th, 5th, 6th
dashes (-)
removing, 1st, 2nd
data
discarding, 1st, 2nd
disk drives
testing, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th, 12th
disk usage
free space, 1st, 2nd
monitoring, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th
percentage, 1st, 2nd, 3rd, 4th, 5th, 6th
DOS files
^M extension, 1st, 2nd, 3rd, 4th, 5th, 6th
email
redirecting to null, 1st
Ethernet (MAC) addresses
outputting, 1st, 2nd, 3rd, 4th, 5th
files
aliases, 1st, 2nd
backups, 1st, 2nd, 3rd, 4th, 5th
compression, 1st, 2nd
cp command, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
cpio command, 1st, 2nd, 3rd, 4th, 5th
dashes (-), 1st, 2nd, 3rd, 4th
decryption, 1st, 2nd, 3rd
deleting, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
editing multiple, 1st, 2nd, 3rd
egrep command, 1st, 2nd, 3rd, 4th
encryption, 1st, 2nd, 3rd, 4th, 5th
finding, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th
finding multiple, 1st, 2nd
grep command, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th, 12th
headers, 1st, 2nd
hiding, 1st, 2nd, 3rd, 4th, 5th
loading multiple, 1st, 2nd
moving, 1st, 2nd, 3rd, 4th, 5th
null output, 1st
removing, 1st, 2nd
renaming, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
soft links, 1st
splitting, 1st, 2nd, 3rd, 4th
storing, 1st, 2nd, 3rd, 4th
tar command, 1st, 2nd, 3rd, 4th, 5th, 6th
uncompression, 1st
zero size, 1st
FTP access
restricting, 1st, 2nd, 3rd
home directories
copying files, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
hosts
monitoring with ping, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
hotkeys, 1st, 2nd, 3rd, 4th, 5th
last day of month
Perl method, 1st, 2nd, 3rd, 4th
shell method, 1st, 2nd, 3rd
load averages
monitoring, 1st, 2nd, 3rd, 4th, 5th
log files
grep command, 1st, 2nd, 3rd, 4th, 5th
reducing, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
splitting, 1st, 2nd, 3rd, 4th, 5th
macros
creating, 1st, 2nd, 3rd, 4th, 5th, 6th
scripts, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
system administration, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th, 12th, 13th, 14th
man pages
escape characters, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th
mouse
controlling with keyboard, 1st, 2nd, 3rd, 4th
MS-DOS, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
networks
disabling, 1st
ifconfig command, 1st, 2nd, 3rd, 4th
troubleshooting, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th, 12th, 13th, 14th, 15th, 16th, 17th
NFS2
mounting with NFS3, 1st, 2nd, 3rd
talking with NFS3, 1st, 2nd, 3rd, 4th
null
copying files, 1st
packets
routed command, 1st, 2nd, 3rd
static routing, 1st, 2nd, 3rd, 4th
passwords
encryption, 1st, 2nd, 3rd
interpreting programs, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
interpreting shells, 1st, 2nd, 3rd, 4th
shadow technique, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
stripping, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
PC users, 1st, 2nd, 3rd, 4th
processes
emailing output, 1st, 2nd, 3rd
monitoring, 1st
outputting, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
redirecting, 1st, 2nd, 3rd, 4th, 5th
running after log out, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
ranges of numbers
generating, 1st, 2nd, 3rd, 4th
remote access
passwords, 1st, 2nd, 3rd
restricting, 1st
remote hosts
copying files, 1st, 2nd, 3rd, 4th, 5th
FTP, 1st, 2nd, 3rd, 4th, 5th, 6th
NFS, 1st, 2nd, 3rd
ping, 1st, 2nd, 3rd, 4th
rcp command, 1st, 2nd
tar command, 1st, 2nd, 3rd, 4th
root access
UID passwords, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
root password
clearing, 1st, 2nd, 3rd, 4th
screens
clear command, 1st, 2nd, 3rd, 4th, 5th
refreshing, 1st, 2nd, 3rd, 4th, 5th
xlock command, 1st, 2nd, 3rd, 4th
scripts
Edit Run Edit (ere), 1st, 2nd, 3rd, 4th, 5th, 6th
security
execute-only, 1st, 2nd
read/write, 1st, 2nd, 3rd
shells
changing, 1st, 2nd, 3rd, 4th, 5th
STDIN/STDOUT
displaying, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th
stty command
echo option, 1st, 2nd, 3rd, 4th
interrupt option (intr), 1st, 2nd
^?, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
^H, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
swap files
adding, 1st, 2nd
symbolic links, 1st
creating, 1st, 2nd, 3rd, 4th, 5th, 6th
dead, 1st, 2nd, 3rd, 4th
multiple, 1st, 2nd, 3rd
paths, 1st, 2nd, 3rd, 4th
physical directory, 1st
server, 1st
system data
collecting, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
systems
migrating to, 1st, 2nd, 3rd, 4th, 5th, 6th
tail command, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
tapes
rewinding, 1st, 2nd, 3rd, 4th
tar files
encryption, 1st, 2nd, 3rd
telnet
restricting access, 1st, 2nd, 3rd
temporary files
storing, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th, 12th, 13th, 14th, 15th, 16th
TERM variable
configuration, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th, 12th, 13th
terminals
columns, 1st, 2nd
configuration, 1st, 2nd, 3rd, 4th, 5th
rows, 1st, 2nd
terminfo database, 1st
uptime command, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th
user accounts
adding, 1st, 2nd, 3rd, 4th, 5th, 6th
configuration, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
killing, 1st, 2nd
programs, 1st, 2nd, 3rd
scripts, 1st, 2nd, 3rd
startup files, 1st, 2nd, 3rd, 4th
users
mailing list, 1st, 2nd, 3rd, 4th, 5th, 6th
vi editor
mail command, 1st, 2nd, 3rd, 4th, 5th
man pages, 1st, 2nd
windows
killing, 1st, 2nd, 3rd, 4th
workstations
time verification, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th
X session
killing, 1st, 2nd, 3rd
X Window application
displaying, 1st
hard-coding, 1st
passing arguments, 1st
remote hosts, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th
X Window applications
aliases, 1st
authentication
users, 1st
autoindentation
vi editor
parameters, 1st, 2nd
automating
tasks, 1st
avertisements
employment, 1st
conferences/seminars, 1st
networking, 1st
recruiters, 1st
vendors, 1st
web sites, 1st
awk command
ping, 1st

UNIX Hints & Hacks

Contents

Index