UNIX Hints & Hacks

Contents

Index

 

B

background
processes
running, 1st, 2nd
background process, 1st
backgrounds
windows, 1st
backslash (\), 1st
backspace, 1st
terminals, 1st
Backspace key, 1st
updating, 1st
^?, 1st
^H, 1st
backups
files, 1st, 2nd
root partition, 1st
filesystem tables, 1st
group files, 1st
home directory, 1st
host table, 1st
installation, 1st
kernel, 1st
password file, 1st
rc files, 1st, 2nd
sendmail config, 1st
startup scripts, 1st
TTY settings, 1st
unmount command, 1st
backwards compatibility
NFS3, 1st, 2nd
badlinks script, 1st
bandwidth
networks
X Window applications, 1st
bash shell
changing, 1st, 2nd
baud rate, 1st
bc command
log files
reducing, 1st
Berkeley Internet Name Domain, see BIND, 1st, 2nd
Berkeley UNIX, see BSD, 1st
beta user, 1st, 2nd, 3rd, 4th, 5th
bigfile.sh script, 1st, 2nd
binary files
decoding, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
encoding, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
bind
disabling, 1st
security, 1st, 2nd
BIND (Berkeley Internet Name Domain), 1st, 2nd
binding
yellow pages, 1st
blank lines
deleting from files, 1st, 2nd, 3rd, 4th, 5th
boot up process
echo statements, 1st, 2nd
monitoring, 1st, 2nd, 3rd
servers, 1st
troubleshooting, 1st
workstations, 1st
boot up processes
monitoring, 1st, 2nd, 3rd
bootpd
disabling, 1st
borrowing
computer equipment, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
Bourne shell, 1st
breaks, 1st
BSD
ASCII symbol table
locating, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
ASCII terminals
noisy lines, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
binary files
decoding, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
encoding, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
boot up process
monitoring, 1st, 2nd, 3rd
commands
abbreviating, 1st, 2nd, 3rd, 4th
aliases, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th, 12th
core files
dumping, 1st
finding, 1st, 2nd
monitoring, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
sizing, 1st, 2nd, 3rd, 4th, 5th, 6th
crash files
monitoring, 1st, 2nd, 3rd, 4th
daemons
disabling, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th, 12th, 13th, 14th
getty, 1st
dashes (-)
removing, 1st, 2nd
data
discarding, 1st, 2nd
disk drives
testing, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th, 12th
disk usage
free space, 1st, 2nd
monitoring, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th
percentage, 1st, 2nd, 3rd, 4th, 5th, 6th
DISPLAY variable
configuration, 1st, 2nd, 3rd, 4th, 5th, 6th
DOS files
^M extension, 1st, 2nd, 3rd, 4th, 5th, 6th
email
redirecting to null, 1st
Ethernet (MAC) addresses
outputting, 1st, 2nd, 3rd, 4th, 5th
files
aliases, 1st, 2nd
backups, 1st, 2nd, 3rd, 4th, 5th
compression, 1st, 2nd
cp command, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
cpio command, 1st, 2nd, 3rd, 4th, 5th
dashes (-), 1st, 2nd, 3rd, 4th
decryption, 1st, 2nd, 3rd
deleting, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
editing, 1st, 2nd, 3rd, 4th, 5th, 6th
editing multiple, 1st, 2nd, 3rd
egrep command, 1st, 2nd, 3rd, 4th
encryption, 1st, 2nd, 3rd, 4th, 5th
executing, 1st, 2nd, 3rd, 4th, 5th, 6th
finding, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th
finding multiple, 1st, 2nd
grep command, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th, 12th
headers, 1st, 2nd
hiding, 1st, 2nd, 3rd, 4th, 5th
loading multiple, 1st, 2nd
moving, 1st, 2nd, 3rd, 4th, 5th
null output, 1st
removing, 1st, 2nd
renaming, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
soft links, 1st
storing, 1st, 2nd, 3rd, 4th
tar command, 1st, 2nd, 3rd, 4th, 5th, 6th
uncompression, 1st
zero size, 1st
FTP access
restricting, 1st, 2nd, 3rd
home directories
copying files, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
hotkeys, 1st, 2nd, 3rd, 4th, 5th
last day of month
Perl method, 1st, 2nd, 3rd, 4th
shell method, 1st, 2nd, 3rd
log files
grep command, 1st, 2nd, 3rd, 4th, 5th
reducing, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
macros
creating, 1st, 2nd, 3rd, 4th, 5th, 6th
scripts, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
system administration, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th, 12th, 13th, 14th
mail clients, 1st
man pages
escape characters, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th
mouse
controlling with keyboard, 1st, 2nd, 3rd, 4th
MS-DOS, 1st, 2nd, 3rd, 4th
networks
ifconfig command, 1st, 2nd, 3rd, 4th
troubleshooting, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th, 12th, 13th, 14th, 15th, 16th, 17th
null
copying files, 1st
packets
routed command, 1st, 2nd, 3rd
static routing, 1st, 2nd, 3rd, 4th
passwords
encryption, 1st, 2nd, 3rd
interpreting programs, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
interpreting shells, 1st, 2nd, 3rd, 4th
shadow technique, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
stripping, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
PC users, 1st, 2nd, 3rd, 4th
printers, 1st
processes
emailing output, 1st, 2nd, 3rd
outputting, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
redirecting, 1st, 2nd, 3rd, 4th, 5th
running after log out, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
ranges of numbers
generating, 1st, 2nd, 3rd, 4th
remote access
passwords, 1st, 2nd, 3rd
restricting, 1st
remote hosts
copying files, 1st, 2nd, 3rd, 4th, 5th
FTP, 1st, 2nd, 3rd, 4th, 5th, 6th
NFS, 1st, 2nd, 3rd
rcp command, 1st, 2nd
tar command, 1st, 2nd, 3rd, 4th
root access
UID passwords, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
root password
clearing, 1st, 2nd, 3rd, 4th
screens
clear command, 1st, 2nd, 3rd, 4th, 5th
refreshing, 1st, 2nd, 3rd, 4th, 5th
xlock command, 1st, 2nd, 3rd, 4th
scripts
Edit Run Edit (ere), 1st, 2nd, 3rd, 4th, 5th, 6th
security
execute-only, 1st, 2nd
group access, 1st, 2nd, 3rd
read/write, 1st, 2nd, 3rd
shells
changing, 1st, 2nd, 3rd, 4th, 5th
STDIN/STDOUT
displaying, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th
stty command
echo option, 1st, 2nd, 3rd, 4th
interrupt option (intr), 1st, 2nd
^?, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
^H, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
swap files
adding, 1st, 2nd
symbolic links, 1st
creating, 1st, 2nd, 3rd, 4th, 5th, 6th
dead, 1st, 2nd, 3rd, 4th
multiple, 1st, 2nd, 3rd
paths, 1st, 2nd, 3rd, 4th
physical directory, 1st
server, 1st
system data
collecting, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
systems
migrating to, 1st, 2nd, 3rd, 4th, 5th, 6th
tail command, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
tapes
rewinding, 1st, 2nd, 3rd, 4th
tar files
encryption, 1st, 2nd, 3rd
telnet
access, 1st, 2nd, 3rd
temporary files
storing, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th, 12th, 13th, 14th, 15th, 16th
TERM variable
configuration, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th, 12th, 13th
terminals
configuration, 1st, 2nd, 3rd, 4th, 5th
user accounts
adding, 1st, 2nd, 3rd, 4th, 5th, 6th
configuration, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
killing, 1st, 2nd
programs, 1st, 2nd, 3rd
scripts, 1st, 2nd, 3rd
startup files, 1st, 2nd, 3rd, 4th
users
mailing list, 1st, 2nd, 3rd, 4th, 5th, 6th
vi editor
mail command, 1st, 2nd, 3rd, 4th, 5th
man pages, 1st, 2nd
windows
killing, 1st, 2nd, 3rd, 4th
workstations
time verification, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th
X Window application
displaying, 1st
hard-coding, 1st
passing arguments, 1st
remote hosts, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th
X Window applications
aliases, 1st
BSD (Berkeley UNIX), 1st
buffer, 1st
buffer cache, 1st
building
scripts, 1st, 2nd, 3rd, 4th, 5th
burning in, see testing, 1st
buzzwords, 1st, 2nd

UNIX Hints & Hacks

Contents

Index