bash Cookbookm Carl Albing, JP Vossen, and Cameron Newham O'REILLY Beijing Cambridge Farnham Köln Sebastopol Taipei Tokyo
|
|
- Theresa Brianna O’Neal’
- 7 years ago
- Views:
Transcription
1 bash Cookbookm Carl Albing, JP Vossen, and Cameron Newham O'REILLY Beijing Cambridge Farnham Köln Sebastopol Taipei Tokyo
2 Table of Contents Preface xiii 1. Beginning bash Decoding the Prompt Showing Where You Are Finding and Running Commands Getting Information About Files Showing All Hidden (dot) Files in the Current Directory Using Shell Quoting Using or Replacing Built-ins and External Commands Determining If You Are Running Interactively Setting bash As Your Default Shell Getting bash for Linux Getting bash for xbsd Getting bash for Mac OS X Getting bash for Unix Getting bash for Windows Getting bash Without Getting bash Learning More About bash Documentation Standard Output Writing Output to the Terminal/Window Writing Output but Preserving Spacing Writing Output with More Formatting Control Writing Output Without the Newline Saving Output from a Command Saving Output to Other Files 34 iii
3 2.7 Saving Output from the ls Command Sending Both Output and Error Messages to Different Files Sending Both Output and Error Messages to the Same File Appending Rather Than Clobbering Output Using Just the Beginning or End of a File Skipping a Header in a File Throwing Output Away Saving or Grouping Output from Several Commands Connecting Two Programs by Using Output As Input Saving a Copy of Output Even While Using It As Input Connecting Two Programs by Using Output As Arguments Using Multiple Redirects on One Line Saving Output When Redirect Doesn't Seem to Work Swapping STDERR and STDOUT Keeping Files Safe from Accidental Overwriting Clobbering a File on Purpose Standard Input Getting Input from a File Keeping Your Data with Your Script Preventing Weird Behavior in a Here-Document Indenting Here-Documents Getting User Input Getting Yes or No Input Selecting from a List of Options Prompting for a Password Executing Commands Running Any Executable Telling If a Command Succeeded or Not Running Several Commands in Sequence Running Several Commands All at Once Deciding Whether a Command Succeeds Using Fewer if Statements Running Long Jobs Unattended Displaying Error Messages When Failures Occur Running Commands from a Variable Running All Scripts in a Directory 79 iv I Table of Contents
4 5. Basic Scripting: Shell Variables Documenting Your Script Embedding Documentation in Shell Scripts Promoting Script Readability Separating Variable Names from Surrounding Text Exporting Variables Seeing All Variable Values Using Parameters in a Shell Script Looping Over Arguments Passed to a Script Handling Parameters with Blanks Handling Lists of Parameters with Blanks Counting Arguments Consuming Arguments Getting Default Values Setting Default Values Using null As a Valid Default Value Using More Than Just a Constant String for Default Giving an Error Message for Unset Parameters Changing Pieces of a String Using Array Variables Shell Logic and Arithmetic Doing Arithmetic in Your Shell Script Branching an Conditions Testing for File Characteristics Testing for More Than One Thing Testing for String Characteristics Testing for Equal Testing with Pattern Matches Testing with Regular Expressions Changing Behavior with Redirections Looping for a While Looping with a read Looping with a Count Looping with Floating-Point Values Branching Many Ways Parsing Command-Line Arguments Creating Simple Menus 137 TableofContents v
5 6.17 Changing the Prompt on Simple Menus Creating a Simple RPN Calculator Creating a Command-Line Calculator Intermediate Shell Tools I Sifting Through Files for a String Getting Just the Filename from a Search Getting a Simple True/False from a Search Searching for Text While Ignoring Case Doing a Search in a Pipeline Paring Down What the Search Finds Searching with More Complex Patterns Searching for an SSN Grepping Compressed Files Keeping Some Output, Discarding the Rest Keeping Only a Portion of a Line of Output Reversing the Words on Each Line Summing a List of Numbers Counting String Values Showing Data As a Quick and Easy Histogram Showing a Paragraph of Text After a Found Phrase Intermediate Shell Tools II Sorting Your Output Sorting Numbers Sorting IP Addresses Cutting Out Parts of Your Output Removing Duplicate Lines Compressing Files Uncompressing Files Checking a tar Archive for Unique Directories Translating Characters Converting Uppercase to Lowercase Converting DOS Files to Linux Format Removing Smart Quotes Counting Lines, Words, or Characters in a File Rewrapping Paragraphs Doing More with less 181 vi Table of Contents
6 9. Finding Files: find, locate, slocate Finding All Your MP3 Files Handling Filenames Containing Odd Characters Speeding Up Operations on Found Files Finding Files Across Symbolic Links Finding Files Irrespective of Case Finding Files by Date Finding Files by Type Finding Files by Size Finding Files by Content Finding Existing Files and Content Fast Finding a File Using a List of Possible Locations Additional Features for Scripting "Daemon-izing" Your Script Reusing Code with Includes and Sourcing Using Configuration Files in a Script Defining Functions Using Functions: Parameters and Return Values Trapping Interrupts Redefining Commands with alias Avoiding Aliases, Functions Working with Dates and Times Formatting Dates for Display Supplying a Default Date Automating Date Ranges Converting Dates and Times to Epoch Seconds Converting Epoch Seconds to Dates and Times Getting Yesterday or Tomorrow with Perl Figuring Out Date and Time Arithmetic Handling Time Zones, Daylight Saving Time, and Leap Years Using date and cron to Run a Script on the Nth Day End-User Tasks As Shell Scripts Starting Simple by Printing Dashes Viewing Photos in an Album Loading Your MP3 Player Burning a CD Comparing Two Documents 244 Table of Contents I vii
7 13. Parsing and Similar Tasks Parsing Arguments for Your Shell Script Parsing Arguments with Your Own Error Messages Parsing Some HTML Parsing Output into an Array Parsing Output with a Function Call Parsing Text with a read Statement Parsing with read into an Array Getting Your Plurals Right Taking It One Character at a Time Cleaning Up an SVN Source Tree Setting Up a Database with MySQL Isolating Specific Fields in Data Updating Specific Fields in Data Files Trimming Whitespace Compressing Whitespace Processing Fixed-Length Records Processing Files with No Line Breaks Converting a Data File to CSV Parsing a CSV Data File Writing Secure Shell Scripts Avoiding Common Security Problems Avoiding Interpreter Spoofing Setting a Secure $PATH Clearing All Aliases Clearing the Command Hash Preventing Core Dumps Setting a Secure $IFS Setting a Secure umask Finding World-Writable Directories in Your $PATH Adding the Current Directory to the $PATH Using Secure Temporary Files Validating Input Setting Permissions Leaking Passwords into the Process List Writing setuid or setgid Scripts Restricting Guest Users Using chroot Jails 303 viii Table of Contents
8 14.18 Running As a Non-root User Using sudo More Securely Using Passwords in Scripts Using SSH Without a Password Restricting SSH Commands Disconnecting Inactive Sessions Advanced Scripting Finding bash Portably for #! Setting a POSIX $PATH Developing Portable Shell Scripts Testing Scripts in VMware Using for Loops Portably Using echo Portably Splitting Output Only When Necessary Viewing Output in Hex Using bash Net-Redirection Finding My IP Address Getting Input from Another Machine Redirecting Output for the Life of a Script Working Around "argument list too Jong" Errors Logging to syslog from Your Script Sending from Your Script Automating a Process Using Phases Configuring and Customizing bash bash Startup Options Customizing Your Prompt Change Your $PATH Permanently Change Your $PATH Temporarily Setting Your $CDPATH Shortening or Changing Command Names Adjusting Shell Behavior and Environment Adjusting readline Behavior Using.inputrc Keeping a Private Stash of Utilities by Adding -/bin Using Secondary Prompts: $PS2, $PS3, $PS Synchronizing Shell History Between Sessions Setting Shell History Options 377 Table of Contents I ix
9 16.13 Creating a Better cd Command Creating and Changing into a New Directory in One Step Getting to the Bottom of Things Adding New Features to bash Using Loadable Built-ins Improving Programmable Completion Using Initialization Files Correctly Creating Self-Contained, Portable RC Files Getting Started with a Custom Configuration Housekeeping and Administrative Tasks Renaming Many Files Using GNU Texinfo and Info on Linux Unzipping Many ZIP Files Recovering Disconnected Sessions Using screen Sharing a Single bash Session Logging an Entire Session or Batch Job Clearing the Screen When You Log Out Capturing File Metadata for Recovery Creating an Index of Many Files Using diff and patch Counting Differences in Files Removing or Renaming Files Named with Special Characters Prepending Data to a File Editing a File in Place Using sudo on a Group of Commands Finding Lines in One File But Not in the Other Keeping the Most Recent N Objects Grepping ps Output Without Also Getting the grep Process Itself Finding Out Whether a Process Is Running Adding a Prefix or Suffix to Output Numbering Lines Writing Sequences Emulating the DOS Pause Command Commifying Numbers Working Faster by Typing Less Moving Quickly Among Arbitrary Directories Repeating the Last Command Running Almost the Same Command 456 x I Table of Contents
10 18.4 Substituting Across Word Boundaries Reusing Arguments Finishing Names for You Playing It Safe Tips and Traps: Common Goofs for Novices Forgetting to Set Execute Permissions Fixing "No such file or directory" Errors Forgetting That the Current Directory Is Not in the $PATH Naming Your Script Test Expecting to Change Exported Variables Forgetting Quotes Leads to "command not found" an Assignments Forgetting That Pattern Matching Alphabetizes Forgetting That Pipelines Make Subshells Making Your Terminal Sane Again Deleting Files Using an Empty Variable Seeing Odd Behavior from printf Testing bash Script Syntax Debugging Scripts Avoiding "command not found" When Using Functions Confusing Shell Wildcards and Regular Expressions 480 A. Reference Lists 482 bash Invocation 482 Prompt String Customizations 483 ANSI Color Escape Sequences 484 Built-in Commands and Reserved Words 485 Built-in Shell Variables 487 set Options 491 shopt Options 492 Adjusting Shell Behavior Using set, shopt, and Environment Variables 494 Test Operators 505 I/O Redirection 506 echo Options and Escape Sequences 508 printf 509 Date and Time String Formatting with strftime 513 Pattern-Matching Characters 514 extglob Extended Pattern-Matching Operators 515 tr Escape Sequences 515 Table of Contents I xi
11 Readline Init File Syntax 516 emacs Mode Commands 518 vi Control Mode Commands 520 Table of ASCII Values 522 B. Examples Included with bash 524 Startup-Files Directory Examples 524 C. Command-Line Processing 532 Command-Line Processing Steps 532 D. Revision Control 538 CVS 539 Subversion 545 RCS ther 557 E. Building bash from Source 559 Obtaining bash 559 Unpacking the Archive 559 What's in the Archive 560 Who Do I Turn To? 564 Index 567 xii Table of Contents
HP-UX Essentials and Shell Programming Course Summary
Contact Us: (616) 875-4060 HP-UX Essentials and Shell Programming Course Summary Length: 5 Days Prerequisite: Basic computer skills Recommendation Statement: Student should be able to use a computer monitor,
More informationWindows PowerShell Cookbook
Windows PowerShell Cookbook Lee Holmes O'REILLY' Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo Table of Contents Foreword Preface xvii xxi Part I. Tour A Guided Tour of Windows PowerShell
More informationIncremental Backup Script. Jason Healy, Director of Networks and Systems
Incremental Backup Script Jason Healy, Director of Networks and Systems Last Updated Mar 18, 2008 2 Contents 1 Incremental Backup Script 5 1.1 Introduction.............................. 5 1.2 Design Issues.............................
More informationFred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer
Fred Hantelmann LINUX Start-up Guide A self-contained introduction With 57 Figures Springer Contents Contents Introduction 1 1.1 Linux Versus Unix 2 1.2 Kernel Architecture 3 1.3 Guide 5 1.4 Typographical
More informationCisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)
Cisco Networking Academy Program Curriculum Scope & Sequence Fundamentals of UNIX version 2.0 (July, 2002) Course Description: Fundamentals of UNIX teaches you how to use the UNIX operating system and
More informationLinux System Administration on Red Hat
Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with Linux or Unix systems as a user (i.e., they know file manipulation,
More informationCLC Server Command Line Tools USER MANUAL
CLC Server Command Line Tools USER MANUAL Manual for CLC Server Command Line Tools 2.5 Windows, Mac OS X and Linux September 4, 2015 This software is for research purposes only. QIAGEN Aarhus A/S Silkeborgvej
More informationHands-On UNIX Exercise:
Hands-On UNIX Exercise: This exercise takes you around some of the features of the shell. Even if you don't need to use them all straight away, it's very useful to be aware of them and to know how to deal
More informationLINUX SECURITY COOKBOOK. DanieIJ. Barren, Richard E Silverman, and Robert G. Byrnes
LINUX SECURITY COOKBOOK DanieIJ. Barren, Richard E Silverman, and Robert G. Byrnes ORELLY Beijing " Cambridge " Farnham " Koln " Paris " Sebastopol " Taipei - Tokyo Table of Contents Preface............,....................................................A
More informationProfessional. SlickEdif. John Hurst IC..T...L. i 1 8 О 7» \ WILEY \ Wiley Publishing, Inc.
Professional SlickEdif John Hurst IC..T...L i 1 8 О 7» \ WILEY \! 2 0 0 7 " > Wiley Publishing, Inc. Acknowledgments Introduction xiii xxv Part I: Getting Started with SiickEdit Chapter 1: Introducing
More informationUnix Shell Scripts. Contents. 1 Introduction. Norman Matloff. July 30, 2008. 1 Introduction 1. 2 Invoking Shell Scripts 2
Unix Shell Scripts Norman Matloff July 30, 2008 Contents 1 Introduction 1 2 Invoking Shell Scripts 2 2.1 Direct Interpretation....................................... 2 2.2 Indirect Interpretation......................................
More informationBacking Up TestTrack Native Project Databases
Backing Up TestTrack Native Project Databases TestTrack projects should be backed up regularly. You can use the TestTrack Native Database Backup Command Line Utility to back up TestTrack 2012 and later
More informationEventia Log Parsing Editor 1.0 Administration Guide
Eventia Log Parsing Editor 1.0 Administration Guide Revised: November 28, 2007 In This Document Overview page 2 Installation and Supported Platforms page 4 Menus and Main Window page 5 Creating Parsing
More informationPHP Debugging. Draft: March 19, 2013 2013 Christopher Vickery
PHP Debugging Draft: March 19, 2013 2013 Christopher Vickery Introduction Debugging is the art of locating errors in your code. There are three types of errors to deal with: 1. Syntax errors: When code
More informationBasic C Shell. helpdesk@stat.rice.edu. 11th August 2003
Basic C Shell helpdesk@stat.rice.edu 11th August 2003 This is a very brief guide to how to use cshell to speed up your use of Unix commands. Googling C Shell Tutorial can lead you to more detailed information.
More informationWINDOWS SERVER HACKS. HLuHB Darmstadt. O'REILLY 5 Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo
WINDOWS SERVER HACKS HLuHB Darmstadt 15899417 O'REILLY 5 Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo Contents Credits Foreword Preface vii xvii xix Chapter 1. General Administration 1
More informationHARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX
HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX Course Description: This is an introductory course designed for users of UNIX. It is taught
More informationVIP Quick Reference Card
VIP Quick Reference Card Loading VIP (Based on VIP 3.5 in GNU Emacs 18) Just type M-x vip-mode followed by RET VIP Modes VIP has three modes: emacs mode, vi mode and insert mode. Mode line tells you which
More informationThirty Useful Unix Commands
Leaflet U5 Thirty Useful Unix Commands Last revised April 1997 This leaflet contains basic information on thirty of the most frequently used Unix Commands. It is intended for Unix beginners who need a
More informationOnline Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
More informationCommand Line - Part 1
Command Line - Part 1 STAT 133 Gaston Sanchez Department of Statistics, UC Berkeley gastonsanchez.com github.com/gastonstat Course web: gastonsanchez.com/teaching/stat133 GUIs 2 Graphical User Interfaces
More informationA Crash Course on UNIX
A Crash Course on UNIX UNIX is an "operating system". Interface between user and data stored on computer. A Windows-style interface is not required. Many flavors of UNIX (and windows interfaces). Solaris,
More informationgrep, awk and sed three VERY useful command-line utilities Matt Probert, Uni of York grep = global regular expression print
grep, awk and sed three VERY useful command-line utilities Matt Probert, Uni of York grep = global regular expression print In the simplest terms, grep (global regular expression print) will search input
More informationPerl in a nutshell. First CGI Script and Perl. Creating a Link to a Script. print Function. Parsing Data 4/27/2009. First CGI Script and Perl
First CGI Script and Perl Perl in a nutshell Prof. Rasley shebang line tells the operating system where the Perl interpreter is located necessary on UNIX comment line ignored by the Perl interpreter End
More informationOnline Backup Client User Manual
For Mac OS X Software version 4.1.7 Version 2.2 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means.
More informationWS_FTP Professional 12
WS_FTP Professional 12 Tools Guide Contents CHAPTER 1 Introduction Ways to Automate Regular File Transfers...5 Check Transfer Status and Logs...6 Building a List of Files for Transfer...6 Transfer Files
More information1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
More informationPaul McFedries. Home Server 2011 LEASHE. Third Edition. 800 East 96th Street, Indianapolis, Indiana 46240 USA
Paul McFedries Microsoft Windows9 Home Server 2011 LEASHE Third Edition 800 East 96th Street, Indianapolis, Indiana 46240 USA Table of Contents Introduction 1 Part I Unleashing Windows Home Server Configuration
More informationOnline Backup Client User Manual Mac OS
Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC
More informationOnline Backup Client User Manual Mac OS
Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC
More informationMicrosoft" Windows8 Home Server
Paul MeFedries Microsoft" Windows8 Home Server I UNLEASHED Second Edition 800 East 96th Street, Indianapolis, Indiana 46240 USA Table of Contents Introduction 1 Part I Unleashing Windows Home Server Configuration
More informationAN INTRODUCTION TO UNIX
AN INTRODUCTION TO UNIX Paul Johnson School of Mathematics September 24, 2010 OUTLINE 1 SHELL SCRIPTS Shells 2 COMMAND LINE Command Line Input/Output 3 JOBS Processes Job Control 4 NETWORKING Working From
More informationRecoveryVault Express Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
More informationDiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com info@flexense.com 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
More informationLinux command line. An introduction to the Linux command line for genomics. Susan Fairley
Linux command line An introduction to the Linux command line for genomics Susan Fairley Aims Introduce the command line Provide an awareness of basic functionality Illustrate with some examples Provide
More information1 Getting Started. Before you can connect to a network
1 Getting Started This chapter contains the information you need to install either the Apple Remote Access Client or Apple Remote Access Personal Server version of Apple Remote Access 3.0. Use Apple Remote
More informationOnline Backup Linux Client User Manual
Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might
More informationUnix Scripts and Job Scheduling
Unix Scripts and Job Scheduling Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh spring@imap.pitt.edu http://www.sis.pitt.edu/~spring Overview Shell Scripts
More informationLOCKSS on LINUX. Installation Manual and the OpenBSD Transition 02/17/2011
LOCKSS on LINUX Installation Manual and the OpenBSD Transition 02/17/2011 1 Table of Contents Overview... 3 LOCKSS Hardware... 5 Installation Checklist... 7 BIOS Settings... 10 Installation... 11 Firewall
More informationOnline Backup Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
More informationUsing Git for Project Management with µvision
MDK Version 5 Tutorial AN279, Spring 2015, V 1.0 Abstract Teamwork is the basis of many modern microcontroller development projects. Often teams are distributed all over the world and over various time
More informationCS10110 Introduction to personal computer equipment
CS10110 Introduction to personal computer equipment PRACTICAL 4 : Process, Task and Application Management In this practical you will: Use Unix shell commands to find out about the processes the operating
More informationVERITAS NetBackup 6.0 Encryption
VERITAS NetBackup 6.0 Encryption System Administrator s Guide for UNIX, Windows, and Linux N15274C September 2005 Disclaimer The information contained in this publication is subject to change without notice.
More informationOutline. Unix shells Bourne-again Shell (bash) Interacting with bash Basic scripting References
Ryan Hulguin Outline Unix shells Bourne-again Shell (bash) Interacting with bash Basic scripting References Unix shells This lets users issue commands to the Unix operating system Users can interact with
More informationSetting up PostgreSQL
Setting up PostgreSQL 1 Introduction to PostgreSQL PostgreSQL is an object-relational database management system based on POSTGRES, which was developed at the University of California at Berkeley. PostgreSQL
More informationBash Guide for Beginners
Bash Guide for Beginners By Machtelt Garrels Cover design by Fultus Books ISBN 0-9744339-4-2 All rights reserved. Copyright c 2004 by Machtelt Garrels Published by Fultus Corporation Corporate Web Site:
More informationBasic System. Vyatta System. REFERENCE GUIDE Using the CLI Working with Configuration System Management User Management Logging VYATTA, INC.
VYATTA, INC. Vyatta System Basic System REFERENCE GUIDE Using the CLI Working with Configuration System Management User Management Logging Vyatta Suite 200 1301 Shoreway Road Belmont, CA 94002 vyatta.com
More informationPuTTY/Cygwin Tutorial. By Ben Meister Written for CS 23, Winter 2007
PuTTY/Cygwin Tutorial By Ben Meister Written for CS 23, Winter 2007 This tutorial will show you how to set up and use PuTTY to connect to CS Department computers using SSH, and how to install and use the
More informationUSEFUL UNIX COMMANDS
cancel cat file USEFUL UNIX COMMANDS cancel print requested with lp Display the file cat file1 file2 > files Combine file1 and file2 into files cat file1 >> file2 chgrp [options] newgroup files Append
More informationList of FTP commands for the Microsoft command-line FTP client
You are on the nsftools.com site This is a list of the commands available when using the Microsoft Windows command-line FTP client (requires TCP/IP to be installed). All information is from the Windows
More informationBeginners Shell Scripting for Batch Jobs
Beginners Shell Scripting for Batch Jobs Evan Bollig and Geoffrey Womeldorff Before we begin... Everyone please visit this page for example scripts and grab a crib sheet from the front http://www.scs.fsu.edu/~bollig/techseries
More informationQNX Software Development Platform 6.6. Installation Guide
QNX Software Development Platform 6.6 QNX Software Development Platform 6.6 Installation Guide Table of Contents Table of Contents Preface: About This Guide...iv Typographical conventions...v Before you
More informationUnix Sampler. PEOPLE whoami id who
Unix Sampler PEOPLE whoami id who finger username hostname grep pattern /etc/passwd Learn about yourself. See who is logged on Find out about the person who has an account called username on this host
More informationWeb Security Testing Cookbook*
Web Security Testing Cookbook* Systematic Techniques to Find Problems Fast Paco Hope and Ben Walther O'REILLY' Beijing Cambridge Farnham Koln Sebastopol Tokyo Table of Contents Foreword Preface xiii xv
More informationJob Scheduler Daemon Configuration Guide
Job Scheduler Daemon Configuration Guide A component of Mark Dickinsons Unix Job Scheduler This manual covers the server daemon component of Mark Dickinsons unix Job Scheduler. This manual is for version
More informationLECTURE-7. Introduction to DOS. Introduction to UNIX/LINUX OS. Introduction to Windows. Topics:
Topics: LECTURE-7 Introduction to DOS. Introduction to UNIX/LINUX OS. Introduction to Windows. BASIC INTRODUCTION TO DOS OPERATING SYSTEM DISK OPERATING SYSTEM (DOS) In the 1980s or early 1990s, the operating
More informationSOA Software API Gateway Appliance 7.1.x Administration Guide
SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,
More informationVersion Control with. Ben Morgan
Version Control with Ben Morgan Developer Workflow Log what we did: Add foo support Edit Sources Add Files Compile and Test Logbook ======= 1. Initial version Logbook ======= 1. Initial version 2. Remove
More informationObjectives. At the end of this chapter students should be able to:
NTFS PERMISSIONS AND SECURITY SETTING.1 Introduction to NTFS Permissions.1.1 File Permissions and Folder Permission.2 Assigning NTFS Permissions and Special Permission.2.1 Planning NTFS Permissions.2.2
More informationA Brief Introduction to the Use of Shell Variables
A Brief Introduction to the Use of Shell Variables Norman Matloff July 25, 2001 Contents 1 Two Popular Shells: tcsh and bash 1.1 Overview There are many different shells available for Unix systems. Here
More informationSophos Anti-Virus for Linux configuration guide. Product version: 9
Sophos Anti-Virus for Linux configuration guide Product version: 9 Document date: September 2015 Contents 1 About this guide...5 2 About Sophos Anti-Virus for Linux...6 2.1 What Sophos Anti-Virus does...6
More informationSophos Anti-Virus for Linux configuration guide. Product version: 9
Sophos Anti-Virus for Linux configuration guide Product version: 9 Document date: September 2014 Contents 1 About this guide...8 2 About Sophos Anti-Virus for Linux...9 2.1 What Sophos Anti-Virus does...9
More informationLab 1: Introduction to C, ASCII ART and the Linux Command Line Environment
.i.-' `-. i..' `/ \' _`.,-../ o o \.' ` ( / \ ) \\\ (_.'.'"`.`._) /// \\`._(..: :..)_.'// \`. \.:-:. /.'/ `-i-->..
More informationXCloner Official User Manual
XCloner Official User Manual Copyright 2010 XCloner.com www.xcloner.com All rights reserved. xcloner.com is not affiliated with or endorsed by Open Source Matters or the Joomla! Project. What is XCloner?
More informationMySQL Enterprise Backup User's Guide (Version 3.5.4)
MySQL Enterprise Backup User's Guide (Version 3.5.4) MySQL Enterprise Backup User's Guide (Version 3.5.4) Abstract This is the User's Guide for the MySQL Enterprise Backup product, the successor to the
More informationResults CRM 2012 User Manual
Results CRM 2012 User Manual A Guide to Using Results CRM Standard, Results CRM Plus, & Results CRM Business Suite Table of Contents Installation Instructions... 1 Single User & Evaluation Installation
More informationHow To Backup A Database In Navision
Making Database Backups in Microsoft Business Solutions Navision MAKING DATABASE BACKUPS IN MICROSOFT BUSINESS SOLUTIONS NAVISION DISCLAIMER This material is for informational purposes only. Microsoft
More informationBitrix Site Manager 4.0. Quick Start Guide to Newsletters and Subscriptions
Bitrix Site Manager 4.0 Quick Start Guide to Newsletters and Subscriptions Contents PREFACE...3 CONFIGURING THE MODULE...4 SETTING UP FOR MANUAL SENDING E-MAIL MESSAGES...6 Creating a newsletter...6 Providing
More informationInstalling IBM Websphere Application Server 7 and 8 on OS4 Enterprise Linux
Installing IBM Websphere Application Server 7 and 8 on OS4 Enterprise Linux By the OS4 Documentation Team Prepared by Roberto J Dohnert Copyright 2013, PC/OpenSystems LLC This whitepaper describes how
More informationEMC Documentum Webtop
EMC Documentum Webtop Version 6.5 User Guide P/N 300 007 239 A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com Copyright 1994 2008 EMC Corporation. All rights
More informationUsing This Reference Manual Chapter 1 to Issue ACL Commands
Copyright 1998 ACL Services Ltd. All rights reserved No part of this manual may be reproduced or transmitted in any form by any means, electronic or mechanical, including photocopying and recording, information
More informationSSL Tunnels. Introduction
SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,
More informationManaged File Transfer with Universal File Mover
Managed File Transfer with Universal File Mover Roger Lacroix roger.lacroix@capitalware.com http://www.capitalware.com Universal File Mover Overview Universal File Mover (UFM) allows the user to combine
More informationRunning Qshell. Chapter 2 QSHELL IN AN INTERACTIVE JOB
Chapter 2 Running Qshell Use the Start Qshell CL command (STRQSH or QSH) to enter the Qshell environment. STRQSH has one parameter, CMD. The default value for CMD is *NONE, which means that no Qshell command
More informationBasic Installation of the Cisco Collection Manager
CHAPTER 3 Basic Installation of the Cisco Collection Manager Introduction This chapter gives the information required for a basic installation of the Cisco Collection Manager and the bundled Sybase database.
More informationE-mail Settings 1 September 2015
Training Notes 1 September 2015 PrintBoss can be configured to e-mail the documents it processes as PDF attachments. There are limitations to embedding documents in standard e-mails. PrintBoss solves these
More informationIntroduction to Mac OS X
Introduction to Mac OS X The Mac OS X operating system both a graphical user interface and a command line interface. We will see how to use both to our advantage. Using DOCK The dock on Mac OS X is the
More informationC# Cookbook. Stephen Teilhet andjay Hilyard. O'REILLY 8 Beijing Cambridge Farnham Köln Paris Sebastopol Taipei Tokyo '"J""'
C# Cookbook '"J""' Stephen Teilhet andjay Hilyard O'REILLY 8 Beijing Cambridge Farnham Köln Paris Sebastopol Taipei Tokyo Tableof Contents Preface xv 1. Numbers 1 1.1 Determining Approximate Equality Between
More informationTutorial 0A Programming on the command line
Tutorial 0A Programming on the command line Operating systems User Software Program 1 Program 2 Program n Operating System Hardware CPU Memory Disk Screen Keyboard Mouse 2 Operating systems Microsoft Apple
More informationJava 7 Recipes. Freddy Guime. vk» (,\['«** g!p#« Carl Dea. Josh Juneau. John O'Conner
1 vk» Java 7 Recipes (,\['«** - < g!p#«josh Juneau Carl Dea Freddy Guime John O'Conner Contents J Contents at a Glance About the Authors About the Technical Reviewers Acknowledgments Introduction iv xvi
More informationUsing Secure4Audit in an IRIX 6.5 Environment
Using Secure4Audit in an IRIX 6.5 Environment Overview... 3 Icons... 3 Installation Reminders... 4 A Very Brief Overview of IRIX System auditing... 5 Installing System Auditing... 5 The System Audit Directories...
More informationUsing the Radmind Command Line Tools to. Maintain Multiple Mac OS X Machines
Using the Radmind Command Line Tools to Maintain Multiple Mac OS X Machines Version 0.8.1 This document describes how to install, configure and use the radmind client and server tools to maintain a small
More informationBackup Tab. User Guide
Backup Tab User Guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Create a New Backup... 3 3. Manage backup jobs... 4 Using the Edit menu... 5 Overview... 5 Destination...
More informationRetrieving Data Using the SQL SELECT Statement. Copyright 2006, Oracle. All rights reserved.
Retrieving Data Using the SQL SELECT Statement Objectives After completing this lesson, you should be able to do the following: List the capabilities of SQL SELECT statements Execute a basic SELECT statement
More informationNETWORK SECURITY HACKS *
NETWORK SECURITY HACKS * Andrew %pckhart Ji O'REILLY* Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo Contents Credits Preface ix xi Chapter 1. Unix Host Security 1 1. Secure Mount Points
More informationBackup and Recovery. W. Curtis Preston O'REILLY' Beijing Cambridge Farnham Köln Paris Sebastopol Taipei Tokyo
Backup and Recovery W. Curtis Preston O'REILLY' Beijing Cambridge Farnham Köln Paris Sebastopol Taipei Tokyo Table of Contents Preface xv Part I. Introduction 1. The Philosophyof Backup 3 Champagne Backup
More informationName: Class: Date: 9. The compiler ignores all comments they are there strictly for the convenience of anyone reading the program.
Name: Class: Date: Exam #1 - Prep True/False Indicate whether the statement is true or false. 1. Programming is the process of writing a computer program in a language that the computer can respond to
More informationKB_SQL SQL Reference Guide Version 4
KB_SQL SQL Reference Guide Version 4 1995, 1999 by KB Systems, Inc. All rights reserved. KB Systems, Inc., Herndon, Virginia, USA. Printed in the United States of America. No part of this manual may be
More informationSophos Anti-Virus for Linux user manual
Sophos Anti-Virus for Linux user manual Product version: 7 Document date: January 2011 Contents 1 About this manual...3 2 About Sophos Anti-Virus for Linux...4 3 On-access scanning...7 4 On-demand scanning...10
More informationVersion Control with Subversion and Xcode
Version Control with Subversion and Xcode Author: Mark Szymczyk Last Update: June 21, 2006 This article shows you how to place your source code files under version control using Subversion and Xcode. By
More informationOnline Backup Client User Manual
Online Backup Client User Manual Software version 3.21 For Linux distributions January 2011 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have
More informationData Tool Platform SQL Development Tools
Data Tool Platform SQL Development Tools ekapner Contents Setting SQL Development Preferences...5 Execution Plan View Options Preferences...5 General Preferences...5 Label Decorations Preferences...6
More informationNETWORK SECURITY HACKS
SECOND EDITION NETWORK SECURITY HACKS 2008 AGI-Information Management Consultants May be used for personal purporses only or by libraries associated to dandelon.com network. Andrew Lockhart O'REILLY Beijing
More informationRHCSA 7RHCE Red Haf Linux Certification Practice
RHCSA 7RHCE Red Haf Linux Certification Practice Exams with Virtual Machines (Exams EX200 & EX300) "IcGraw-Hill is an independent entity from Red Hat, Inc., and is not affiliated with Red Hat, Inc. in
More informationEnsim WEBppliance 3.1 for Linux (LH) Release Notes
Ensim WEBppliance 3.1 for Linux (LH) Release Notes June 04, 2002 These release notes cover the following topics of Ensim WEBppliance 3.1 for Linux (LH). About WEBppliance 3.1 for Linux (LH) New features
More informationClass Climate Online Evaluation Instructions
I: GETTING STARTED II: IMPORTING MULTIPLE INSTRUCTORS AND COURSES III: CREATING and/or EDITING INDIVIDUAL USERS IV: ADDING and/or EDITING INDIVIDUAL COURSES V: IMPORTING E-MAIL ADDRESSES (BULK) VI: ADDING
More informationMicrosoft Windows Overview Desktop Parts
Microsoft Windows Overview Desktop Parts Icon Shortcut Icon Window Title Bar Menu Bar Program name Scroll Bar File Wallpaper Folder Start Button Quick Launch Task Bar or Start Bar Time/Date function 1
More informationMicrosoft Windows PowerShell v2 For Administrators
Course 50414B: Microsoft Windows PowerShell v2 For Administrators Course Details Course Outline Module 1: Introduction to PowerShell the Basics This module explains how to install and configure PowerShell.
More informationPrescribed Specialised Services 2015/16 Shadow Monitoring Tool
Prescribed Specialised Services 2015/16 Shadow Monitoring Tool Published May 2015 We are the trusted national provider of high-quality information, data and IT systems for health and social care. www.hscic.gov.uk
More informationInteset Secure Lockdown ver. 2.0
Inteset Secure Lockdown ver. 2.0 for Windows XP, 7, 8, 10 Administrator Guide Table of Contents Administrative Tools and Procedures... 3 Automatic Password Generation... 3 Application Installation Guard
More information