- UGU (UNIX Guru Universe), 1st
- UIDs (user IDs), 1st,
2nd
- unalias command
- scripts, 1st
- see also aliases command, 1st
- uname command, 1st, 2nd
- uncompress command
- files, 1st
- UNIX
- case sensitive, 1st
- commands
- executing, 1st,
2nd
- forward slash (/), 1st
- UNIX commands
- MS-DOS, 1st, 2nd,
3rd, 4th
- PC users, 1st, 2nd,
3rd, 4th
- UNIX Guru Universe (UGU), 1st
- unix2dos command, 1st
- unlocking
- ASCII terminals, 1st,
2nd
- terminals, 1st, 2nd
- unmount command
- backups, 1st
- devices, 1st, 2nd,
3rd, 4th
- local access, 1st
- local processes, 1st
- login shells, 1st
- open shells, 1st,
2nd
- remote access, 1st,
2nd, 3rd
- shells, 1st
- showmount command, 1st
- soft links, 1st
- storage, 1st
- files
- hiding, 1st
- update daemon, 1st
- updating
- administrators
- resumes, 1st
- Backspace key, 1st
- passwords
- macros, 1st
- terminals
- I/O options, 1st
- upload command
- systems
- comparing, 1st
- uppercase files
- renaming, 1st, 2nd,
3rd
- uptime command, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th, 9th
- URLs (Uniform Resource Locators), 1st
- Usenet newsgroups
- employment, 1st
- advertisements, 1st,
2nd
- user accounts
- /etc/groups, 1st
- adding
- from command prompts, 1st,
2nd, 3rd,
4th
- aliases, 1st, 2nd,
3rd, 4th,
5th, 6th,
7th, 8th,
9th, 10th,
11th, 12th
- configuration
- graphical user interfaces (GUI), 1st,
2nd, 3rd,
4th, 5th
- disabling, 1st, 2nd,
3rd
- group IDs (GIDs), 1st,
2nd, 3rd,
4th, 5th
- home directory, 1st,
2nd
- remote access, 1st,
2nd, 3rd,
4th, 5th,
6th
- killing, 1st, 2nd,
3rd
- names, 1st
- abbreviated, 1st,
2nd, 3rd
- applications, 1st,
2nd, 3rd,
4th
- NIS/YP, 1st
- passwords, 1st
- changing, 1st, 2nd,
3rd
- disabling, 1st
- encryption, 1st,
2nd, 3rd,
4th
- expiring, 1st
- fields, 1st
- GECOS field, 1st,
2nd, 3rd,
4th, 5th
- login name, 1st
- reserved fields, 1st
- shading, 1st
- shadow technique, 1st,
2nd, 3rd,
4th
- programs, 1st, 2nd,
3rd
- scripts, 1st, 2nd,
3rd
- startup files, 1st,
2nd, 3rd,
4th
- systems
- migrating to, 1st,
2nd, 3rd
- UIDs, 1st, 2nd
- User Accounts Manager (cpeople), 1st
- user groups, 1st
- user home directories
- monitoring, 1st
- write access, 1st
- user home directory
- core files, 1st
- user IDs, 1st
- users, 1st
- " , 1st, 2nd,
3rd, 4th,
5th, 6th,
7th, 8th,
9th, 10th,
11th, 12th,
13th, 14th,
15th, 16th,
17th, 18th,
19th, 20th,
21st, 22nd,
23rd, 24th
- accounts, 1st, 2nd
- disabling, 1st,
2nd
- administrators
- relationship, 1st,
2nd, 3rd,
4th
- authentication, 1st
- beta, 1st, 2nd,
3rd, 4th,
5th
- configuration
- new accounts, 1st,
2nd, 3rd
- contacting, 1st, 2nd,
3rd, 4th,
5th, 6th,
7th
- corporate policy, 1st,
2nd
- equipment
- borrowing, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th
- returning, 1st,
2nd, 3rd,
4th, 5th
- finding
- on system, 1st
- follow-up calls, 1st,
2nd
- interpersonal skills, 1st,
2nd
- irate, 1st, 2nd,
3rd, 4th,
5th, 6th,
7th, 8th,
9th
- log out, 1st
- mailing list
- creating, 1st, 2nd,
3rd, 4th,
5th, 6th
- networking with, 1st,
2nd, 3rd
- networks
- environment, 1st
- new, 1st
- notification, 1st
- online tools, 1st,
2nd, 3rd
- remote access
- restricting, 1st,
2nd, 3rd,
4th, 5th
- root privileges, 1st,
2nd, 3rd,
4th, 5th,
6th
- screens
- locking, 1st
- system outages
- emergency, 1st
- hardware installation, 1st
- notification, 1st,
2nd, 3rd,
4th, 5th
- patches, 1st
- reboot time, 1st
- replacement, 1st
- scheduling, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th,
8th
- software installation, 1st
- vendors, 1st
- writing, 1st, 2nd
- tail command, 1st,
2nd, 3rd,
4th
- troubleshooting, 1st,
2nd, 3rd,
4th
- workstations, 1st
- users file
- FTP access
- restricting, 1st,
2nd, 3rd
- uudecode command
- binary files, 1st,
2nd, 3rd,
4th, 5th,
6th, 7th
- uuencode command
- binary files, 1st,
2nd, 3rd,
4th, 5th,
6th
© Copyright Macmillan USA.
All rights reserved.