UNIX Hints & Hacks

Contents

Index

 

P

packets
ping
count, 1st
size, 1st
route command
static, 1st, 2nd, 3rd
routed command, 1st, 2nd
quiet mode, 1st, 2nd
server mode, 1st, 2nd, 3rd, 4th
routing
static, 1st
paging server, 1st
paging services, 1st
paper type
administrators
resumes, 1st, 2nd
parameters
vi editor
case-sensitive searches, 1st
configuration, 1st, 2nd, 3rd, 4th
EXINIT variable, 1st, 2nd, 3rd
line numbers, 1st
shells, 1st
show mode, 1st
terminal settings, 1st
wrap margin, 1st
partitions
disk drives, 1st, 2nd, 3rd
disks, 1st
password file
backups, 1st
password files
contents, 1st
permissions, 1st
passwords
changing, 1st, 2nd, 3rd
empty, 1st
encryption, 1st, 2nd, 3rd, 4th
expiring, 1st
fields, 1st, 2nd
clearing, 1st
GECOS field, 1st, 2nd, 3rd, 4th, 5th
hacking, 1st, 2nd, 3rd
login name, 1st
login prompts, 1st
moving, 1st, 2nd, 3rd
programs
interpreting, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
reserved fields, 1st
root
clearing, 1st, 2nd, 3rd, 4th, 5th
root access, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
shading, 1st
shadow technique, 1st, 2nd, 3rd, 4th
shadows, 1st
shells
changing, 1st
interpreting, 1st, 2nd, 3rd, 4th
shtty command, 1st
stripping, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
updating
macros, 1st
user accounts
/etc/groups, 1st
disabling, 1st, 2nd
group IDs (GIDs), 1st, 2nd, 3rd, 4th, 5th
UIDs, 1st, 2nd
weak, 1st, 2nd
patches
installation, 1st
system outages
notification, 1st
paths
symbolic links, 1st, 2nd, 3rd, 4th
PC
UNIX commands, 1st, 2nd, 3rd, 4th
performance
daemons, 1st, 2nd
system, 1st
peripheral device, see devices, 1st
Perl
dummy files
creating, 1st, 2nd, 3rd
predefined scripts
executing, 1st, 2nd, 3rd, 4th
permission
access, 1st
permissions, 1st, 2nd
aliases, 1st
devices, 1st
directories, 1st
private, 1st
editing, 1st
execute-only, 1st, 2nd
files, 1st, 2nd
copying, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
group access, 1st, 2nd, 3rd
password files, 1st
read access, 1st
read/write, 1st, 2nd, 3rd
remote hosts
displaying, 1st
write access, 1st
personal
administrators
job interviews, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th, 12th
physical layer (1), 1st
PID, 1st
PID (process ID), 1st
PID, see process ID, 1st
ping
hosts
monitoring, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
packets
count, 1st
size, 1st
remote hosts, 1st, 2nd, 3rd, 4th
ping command
awk, 1st
grep, 1st
networks
troubleshooting, 1st
pipe, 1st
pipes (|)
macros, 1st, 2nd
piping (|)
files, 1st
platform
installation, 1st, 2nd
plus sign (+), 1st, 2nd
porting
administrators, 1st
portmap daemon, 1st
positioning
cursor, 1st
terminals
cursor, 1st
pound/hash (#), 1st
power button (switch/key)
shutdown, 1st
system shutdown, 1st
power cord
workstation shutdown, 1st
power cords
workstations, 1st
power cycles
ASCII terminals, 1st, 2nd
power tools, 1st
preparation
administrators
job interviews, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
presentation layer (6), 1st
preventing
viruses, 1st
printers
aliases, 1st
configuration, 1st
private directory
permissions, 1st
procedural questions
administrators
job interviews, 1st, 2nd, 3rd
procedures
testing, 1st
process ID (PID), 1st
daemons, 1st, 2nd
text segments, 1st
process IDs (PIDs)
windows
killing, 1st
processes
background, 1st
boot up
monitoring, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
servers, 1st
troubleshooting, 1st
workstations, 1st
init, 1st, 2nd
killing, 1st, 2nd, 3rd, 4th
aliases, 1st
local
unmounting devices, 1st
monitoring, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th
output
emailing, 1st, 2nd, 3rd
redirecting, 1st, 2nd, 3rd, 4th, 5th
process IDs (PIDs)
outputting, 1st, 2nd, 3rd, 4th, 5th, 6th
running
after log out, 1st, 2nd, 3rd, 4th, 5th
background, 1st, 2nd
suspending, 1st
profile command
environment variables
configuration, 1st
programming
administrators, 1st
see also scripting languages, 1st
programs
interpreting, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
output
redirecting to null, 1st
user accounts
configuration, 1st, 2nd, 3rd
proprietary locks
on keystrokes, 1st
ps command
daemons
restarting, 1st, 2nd
process ID (PID)
outputting, 1st, 2nd, 3rd, 4th, 5th, 6th

UNIX Hints & Hacks

Contents

Index