start page | rating of books | rating of authors | reviews | copyrights
Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Index: U
- UIDs : (see user IDs)
- ul command : 43.18. How nroff Makes Bold and Underline; How to Remove It
- ulimit -f command : 24.5. Limiting File Sizes
- umask command
- 14.14. Automatic Setup When You Enter/Exit a Directory
- 22.2.1. User, Group, and World
- 22.4. Setting an Exact umask
- 45.36. Shell Lockfile
- setting in shell scripts : 38.4. Subshells
- umask value : 52.5.3.3. Running Install
- uname command
- 50.7. How UNIX Systems Remember Their Name
- 52.4. Quick Descriptions of What's on the Disc
- unarchiving : (see archives)
- uncluttering logins : 2.15. Unclutter Logins: Show Login Messages Just Once
- uncompress command
- 52.8.1.1. Missing Programs
- 52.8.2.2. Uncompressing the Sources
- undelete program : 52.4. Quick Descriptions of What's on the Disc
- underlined text : 43.18. How nroff Makes Bold and Underline; How to Remove It
- underscore (_) in filenames : 1.15. Filenames
- undoing (vi editor)
- 30.8. Get Back What You Deleted with Numbered Buffers
- 30.10. Confirming Substitutions in ex and vi
- 30.38. Finding Your Place with Undo
- unedit command (SCCS) : 20.13. SCCS Basics
- unexpand command
- 41.4.1. TAB Is Just Another Character to UNIX
- 52.4. Quick Descriptions of What's on the Disc
- filtering within vi : 31.5. Keymaps for Pasting into a Window Running vi
- unexpand script : 24.6. Save Space with Tab Characters
- uniq command
- 35.20. Quick Reference: uniq
- 50.3. apropos on Systems Without apropos
- UNIX
- advantages
- 1.1. What's Special About UNIX?
- 1.7. Power Grows on You
- 1.26. What a Multiuser System Can Do for You
- 44.1. Everyone Should Learn Some Shell Programming
- 52.3. Shrink-Wrapped Software for UNIX
- binary programs : 52.8.2. Compiling Source Code
- definition of priority : 39.9. Know When to Be "nice" to OTher Users...and When
- drawbacks of : 1.34. What's Wrong with UNIX
- flexible handling of TAB characters : 41.4. How UNIX Handles TAB Characters
- identifying versions : 50.8. Which Version Am I Using?
- networking and communications utilities : 1.33. UNIX Networking and Communications
- platforms : 52.3. Shrink-Wrapped Software for UNIX
- time on : 39.1. Which Time Is It?
- two main branches of : 41.2.1. How We Made It This Far (Back?)
- versions of : About UNIX Versions
- unkillable processes, cleaning up : 38.15. Cleaning Up an Unkillable Process
- unlimit coredumpsize command : 24.5. Limiting File Sizes
- unlink command : 23.15. Using unlink to Remove a File with a Strange Name
- unlinking files : 24.3. Unlinking Open Files Isn't a Good Idea
- unprintable characters : (see special characters)
- codes for writing : 41.11.1. Special Character Codes
- unprintable files : 25.5. Page Through Compressed, RCS, Unprintable Files
- unset variable errors : 40.4. Choosing the Shell Run (We Hope) by at
- unsetenv command : 6.1. What Environment Variables Are Good For
- unshar program
- 19.3. unshar: Unarchive a Shell Archive
- 52.4. Quick Descriptions of What's on the Disc
- 52.8.1.1. Missing Programs
- 52.8.2.4. Unsharring the Sources
- unshar software : 52.8.2.4. Unsharring the Sources
- untarring software : 52.8.2.3. Untarring the Sources
- unterrupt characters : 5.9. Setting Your Erase, Kill, and Interrupt Characters
- until loops : 44.10.1. Looping Until a Command Succeeds
- in Bourne shells : 44.10.1. Looping Until a Command Succeeds
- examples : 44.10.1. Looping Until a Command Succeeds
- while loops compared to : 44.10.2. Looping Until a Command Fails
- updateb script : 17.19. Finding Files (Much) Faster with a find Database
- uppercase
- pathname in : 52.5.3.4. Installing a Single Program
- without CAPS LOCK : 31.11. Typing in Uppercase Without CAPS LOCK
- uptime command : 39.7. Checking System Load: uptime
- average reported by : 39.12.1. The CPU
- Usenet : 1.33. UNIX Networking and Communications
- $USER
- examples : 48.4.3. Automating Your Own Calendar
- user dictionaries : (see dictionary files)
- USER environment variable
- 6.3. Predefined Environment Variables
- 6.9. Special C Shell Variables
- in C shell : 47.2.5. Variable Syntax
- user IDs (UIDs) : 38.3. Managing Processes: Overall Concepts
- file access : 1.23. File Access Permissions
- user time
- 39.2. Timing Programs
- 39.5. Why Is the System So Slow?
- user's login shell, killing : 38.10. Destroying Processes with kill
- user-defined signal : (see USR1 signal)
- user-state CPU time : 39.5. Why Is the System So Slow?
- username field in crontab entries : 40.12.1. Execution Scheduling
- users
- 17.16. Searching by Owner and Group
- (see also groups)
- classes of : 39.12.4. User Communities
- effect on system performance : 39.12.4. User Communities
- ownership : (see ownership, file)
- SUID bit
- 1.23. File Access Permissions
- 1.25. Access to Directories
- /usr directory
- /usr/bin directory
- programs in : 1.10. Internal and External Commands
- in search paths : 44.3.4. Shell Search Paths
- /usr/include, header files in : 52.8.2.7. Functions, Libraries, and Header Files
- /usr/lib/crontab file : 40.12.1. Execution Scheduling
- /usr/lib/crontab.local file : 40.12.1. Execution Scheduling
- /usr/local directory : 52.5.3.5. Installing Everything Using the Defaults
- /usr/tmp directory : 21.4. Why Both /tmp and /usr/tmp?
- USR1 (user-defined) signal : 38.8. What Are Signals?
- utilities, combining : 44.1. Everyone Should Learn Some Shell Programming
- UUCP (UNIX-to-UNIX copy)
- 1.33. UNIX Networking and Communications
- 52.7.2.3. UUCP
- uudecode command : 19.5. Using tar to Create and Unpack Archives
- uuencode command : 19.5. Using tar to Create and Unpack Archives
- uuencoded files : 11.3. My Favorite Is !$
- UUNET : 52.7.2.3. UUCP
Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z
Copyright © 1998 O'Reilly & Associates, Inc. All Rights Reserved.