UNIX Hints & Hacks

Contents

Index

 

U

UGU (UNIX Guru Universe), 1st
UIDs (user IDs), 1st, 2nd
unalias command
scripts, 1st
see also aliases command, 1st
uname command, 1st, 2nd
uncompress command
files, 1st
UNIX
case sensitive, 1st
commands
executing, 1st, 2nd
forward slash (/), 1st
UNIX commands
MS-DOS, 1st, 2nd, 3rd, 4th
PC users, 1st, 2nd, 3rd, 4th
UNIX Guru Universe (UGU), 1st
unix2dos command, 1st
unlocking
ASCII terminals, 1st, 2nd
terminals, 1st, 2nd
unmount command
backups, 1st
devices, 1st, 2nd, 3rd, 4th
local access, 1st
local processes, 1st
login shells, 1st
open shells, 1st, 2nd
remote access, 1st, 2nd, 3rd
shells, 1st
showmount command, 1st
soft links, 1st
storage, 1st
files
hiding, 1st
update daemon, 1st
updating
administrators
resumes, 1st
Backspace key, 1st
passwords
macros, 1st
terminals
I/O options, 1st
upload command
systems
comparing, 1st
uppercase files
renaming, 1st, 2nd, 3rd
uptime command, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th
URLs (Uniform Resource Locators), 1st
Usenet newsgroups
employment, 1st
advertisements, 1st, 2nd
user accounts
/etc/groups, 1st
adding
from command prompts, 1st, 2nd, 3rd, 4th
aliases, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th, 12th
configuration
graphical user interfaces (GUI), 1st, 2nd, 3rd, 4th, 5th
disabling, 1st, 2nd, 3rd
group IDs (GIDs), 1st, 2nd, 3rd, 4th, 5th
home directory, 1st, 2nd
remote access, 1st, 2nd, 3rd, 4th, 5th, 6th
killing, 1st, 2nd, 3rd
names, 1st
abbreviated, 1st, 2nd, 3rd
applications, 1st, 2nd, 3rd, 4th
NIS/YP, 1st
passwords, 1st
changing, 1st, 2nd, 3rd
disabling, 1st
encryption, 1st, 2nd, 3rd, 4th
expiring, 1st
fields, 1st
GECOS field, 1st, 2nd, 3rd, 4th, 5th
login name, 1st
reserved fields, 1st
shading, 1st
shadow technique, 1st, 2nd, 3rd, 4th
programs, 1st, 2nd, 3rd
scripts, 1st, 2nd, 3rd
startup files, 1st, 2nd, 3rd, 4th
systems
migrating to, 1st, 2nd, 3rd
UIDs, 1st, 2nd
User Accounts Manager (cpeople), 1st
user groups, 1st
user home directories
monitoring, 1st
write access, 1st
user home directory
core files, 1st
user IDs, 1st
users, 1st
" , 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th, 10th, 11th, 12th, 13th, 14th, 15th, 16th, 17th, 18th, 19th, 20th, 21st, 22nd, 23rd, 24th
accounts, 1st, 2nd
disabling, 1st, 2nd
administrators
relationship, 1st, 2nd, 3rd, 4th
authentication, 1st
beta, 1st, 2nd, 3rd, 4th, 5th
configuration
new accounts, 1st, 2nd, 3rd
contacting, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
corporate policy, 1st, 2nd
equipment
borrowing, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
returning, 1st, 2nd, 3rd, 4th, 5th
finding
on system, 1st
follow-up calls, 1st, 2nd
interpersonal skills, 1st, 2nd
irate, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th, 9th
log out, 1st
mailing list
creating, 1st, 2nd, 3rd, 4th, 5th, 6th
networking with, 1st, 2nd, 3rd
networks
environment, 1st
new, 1st
notification, 1st
online tools, 1st, 2nd, 3rd
remote access
restricting, 1st, 2nd, 3rd, 4th, 5th
root privileges, 1st, 2nd, 3rd, 4th, 5th, 6th
screens
locking, 1st
system outages
emergency, 1st
hardware installation, 1st
notification, 1st, 2nd, 3rd, 4th, 5th
patches, 1st
reboot time, 1st
replacement, 1st
scheduling, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th, 8th
software installation, 1st
vendors, 1st
writing, 1st, 2nd
tail command, 1st, 2nd, 3rd, 4th
troubleshooting, 1st, 2nd, 3rd, 4th
workstations, 1st
users file
FTP access
restricting, 1st, 2nd, 3rd
uudecode command
binary files, 1st, 2nd, 3rd, 4th, 5th, 6th, 7th
uuencode command
binary files, 1st, 2nd, 3rd, 4th, 5th, 6th

UNIX Hints & Hacks

Contents

Index