Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Index: U
- UIDs
: (see user IDs)
- ul command
: 43.18. How nroff Makes Bold and Underline; How to Remove It
- ulimit -f command
: 24.5. Limiting File Sizes
- umask command
- 14.14. Automatic Setup When You Enter/Exit a Directory
- 22.2.1. User, Group, and World
- 22.4. Setting an Exact umask
- 45.36. Shell Lockfile
- setting in shell scripts
: 38.4. Subshells
- umask value
: 52.5.3.3. Running Install
- uname command
- 50.7. How UNIX Systems Remember Their Name
- 52.4. Quick Descriptions of What's on the Disc
- unarchiving
: (see archives)
- uncluttering logins
: 2.15. Unclutter Logins: Show Login Messages Just Once
- uncompress command
- 52.8.1.1. Missing Programs
- 52.8.2.2. Uncompressing the Sources
- undelete program
: 52.4. Quick Descriptions of What's on the Disc
- underlined text
: 43.18. How nroff Makes Bold and Underline; How to Remove It
- underscore (_) in filenames
: 1.15. Filenames
- undoing (vi editor)
- 30.8. Get Back What You Deleted with Numbered Buffers
- 30.10. Confirming Substitutions in ex and vi
- 30.38. Finding Your Place with Undo
- unedit command (SCCS)
: 20.13. SCCS Basics
- unexpand command
- 41.4.1. TAB Is Just Another Character to UNIX
- 52.4. Quick Descriptions of What's on the Disc
- filtering within vi
: 31.5. Keymaps for Pasting into a Window Running vi
- unexpand script
: 24.6. Save Space with Tab Characters
- uniq command
- 35.20. Quick Reference: uniq
- 50.3. apropos on Systems Without apropos
- UNIX
- advantages
- 1.1. What's Special About UNIX?
- 1.7. Power Grows on You
- 1.26. What a Multiuser System Can Do for You
- 44.1. Everyone Should Learn Some Shell Programming
- 52.3. Shrink-Wrapped Software for UNIX
- binary programs
: 52.8.2. Compiling Source Code
- definition of priority
: 39.9. Know When to Be "nice" to OTher Users...and When
- drawbacks of
: 1.34. What's Wrong with UNIX
- flexible handling of TAB characters
: 41.4. How UNIX Handles TAB Characters
- identifying versions
: 50.8. Which Version Am I Using?
- networking and communications utilities
: 1.33. UNIX Networking and Communications
- platforms
: 52.3. Shrink-Wrapped Software for UNIX
- time on
: 39.1. Which Time Is It?
- two main branches of
: 41.2.1. How We Made It This Far (Back?)
- versions of
: About UNIX Versions
- unkillable processes, cleaning up
: 38.15. Cleaning Up an Unkillable Process
- unlimit coredumpsize command
: 24.5. Limiting File Sizes
- unlink command
: 23.15. Using unlink to Remove a File with a Strange Name
- unlinking files
: 24.3. Unlinking Open Files Isn't a Good Idea
- unprintable characters
: (see special characters)
- codes for writing
: 41.11.1. Special Character Codes
- unprintable files
: 25.5. Page Through Compressed, RCS, Unprintable Files
- unset variable errors
: 40.4. Choosing the Shell Run (We Hope) by at
- unsetenv command
: 6.1. What Environment Variables Are Good For
- unshar program
- 19.3. unshar: Unarchive a Shell Archive
- 52.4. Quick Descriptions of What's on the Disc
- 52.8.1.1. Missing Programs
- 52.8.2.4. Unsharring the Sources
- unshar software
: 52.8.2.4. Unsharring the Sources
- untarring software
: 52.8.2.3. Untarring the Sources
- unterrupt characters
: 5.9. Setting Your Erase, Kill, and Interrupt Characters
- until loops
: 44.10.1. Looping Until a Command Succeeds
- in Bourne shells
: 44.10.1. Looping Until a Command Succeeds
- examples
: 44.10.1. Looping Until a Command Succeeds
- while loops compared to
: 44.10.2. Looping Until a Command Fails
- updateb script
: 17.19. Finding Files (Much) Faster with a find Database
- uppercase
- pathname in
: 52.5.3.4. Installing a Single Program
- without CAPS LOCK
: 31.11. Typing in Uppercase Without CAPS LOCK
- uptime command
: 39.7. Checking System Load: uptime
- average reported by
: 39.12.1. The CPU
- Usenet
: 1.33. UNIX Networking and Communications
- $USER
- examples
: 48.4.3. Automating Your Own Calendar
- user dictionaries
: (see dictionary files)
- USER environment variable
- 6.3. Predefined Environment Variables
- 6.9. Special C Shell Variables
- in C shell
: 47.2.5. Variable Syntax
- user IDs (UIDs)
: 38.3. Managing Processes: Overall Concepts
- file access
: 1.23. File Access Permissions
- user time
- 39.2. Timing Programs
- 39.5. Why Is the System So Slow?
- user's login shell, killing
: 38.10. Destroying Processes with kill
- user-defined signal
: (see USR1 signal)
- user-state CPU time
: 39.5. Why Is the System So Slow?
- username field in crontab entries
: 40.12.1. Execution Scheduling
- users
- 17.16. Searching by Owner and Group
- (see also groups)
- classes of
: 39.12.4. User Communities
- effect on system performance
: 39.12.4. User Communities
- ownership
: (see ownership, file)
- SUID bit
- 1.23. File Access Permissions
- 1.25. Access to Directories
- /usr directory
- /usr/bin directory
- programs in
: 1.10. Internal and External Commands
- in search paths
: 44.3.4. Shell Search Paths
- /usr/include, header files in
: 52.8.2.7. Functions, Libraries, and Header Files
- /usr/lib/crontab file
: 40.12.1. Execution Scheduling
- /usr/lib/crontab.local file
: 40.12.1. Execution Scheduling
- /usr/local directory
: 52.5.3.5. Installing Everything Using the Defaults
- /usr/tmp directory
: 21.4. Why Both /tmp and /usr/tmp?
- USR1 (user-defined) signal
: 38.8. What Are Signals?
- utilities, combining
: 44.1. Everyone Should Learn Some Shell Programming
- UUCP (UNIX-to-UNIX copy)
- 1.33. UNIX Networking and Communications
- 52.7.2.3. UUCP
- uudecode command
: 19.5. Using tar to Create and Unpack Archives
- uuencode command
: 19.5. Using tar to Create and Unpack Archives
- uuencoded files
: 11.3. My Favorite Is !$
- UUNET
: 52.7.2.3. UUCP
Symbols
| A
| B
| C
| D
| E
| F
| G
| H
| I
| J
| K
| L
| M
| N
| O
| P
| Q
| R
| S
| T
| U
| V
| W
| X
| Y
| Z
Copyright © 1998
O'Reilly & Associates, Inc.
All Rights Reserved.
|