Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Standard view
Full view
of .
Look up keyword or section
Like this

Table Of Contents

Printing History
How to Use this Guide
Typographic Conventions
Overview of Your System
Multi-User Systems
Trusted Systems
Logging In and Out of HP-UX
Logging In
Figure 1-1 Type your user name at the login prompt
Using HP-UX Commands
Logging Out
Modifying System Parameters
Changing Your Password
Finding Information
Online Documents
Manual Reference Pages
Creating a File
Listing Files
Naming Files
Guidelines for File Names
Invisible File Names
Viewing and Printing Files
Viewing a File with more
Removing Files with rm
Comparing the Contents of Two Files
Joining Two Files
Understanding a Directory Hierarchy
Figure 2-1 A Typical HP-UX Directory Structure
Figure 2-2 A System Directory Structure
Determining Your Location in an HP-UX Directory Hierarchy
Figure 2-3 The HP-UX Directory Structure
Figure 2-4 Leslie's Home Directory
Specifying Files and Directories
Absolute Path Names
Figure 2-5 Absolute Path Names
Relative Path Names
Figure 2-6 Relative Path Names from /home/engineers/leslie
Creating Directories
Figure 2-7 Creating the “projects” Directory
Figure 2-8 Structure after Creating New Directories
Changing Your Current Directory
Figure 2-9 Effect of Various “cd” Commands
Moving and Copying Files between Directories
Moving Files
Copying Files
Copying Directories
Removing Directories
Removing a Directory with rmdir
Figure 2-10 The “projects” Directory Structure
Removing Everything with rm -rf
File Name Shorthand: Wildcard Characters
The * Wildcard
The ? Wildcard
Using the * Wildcard Character with mv, cp, and rm
Searching for Text Patterns using grep
Searching a File for a Text String
Searching Multiple Files
Searching for Files using find
Finding Files that Match a Pattern
Finding Files that are Newer than a Certain File
Running Commands on Files
Using Logical Operators
Chapter Command Summary
Understanding Command Syntax
Examples Using Options
Examples Using Arguments
Enclosing Arguments in Quotes
Running Multiple Commands on the Same Command Line
Understanding Processes
How Processes are Created
Stopping a Process with kill
Writing Standard Output to a File
Using Files for Standard Input
Redirecting Both Standard Input and Standard Output
Figure 3-4 Redirecting Both Input and Output
Piping Command Output and Input
Figure 3-5 Standard Input and Output with Pipes and tee Command
Shell Features: Determining and Changing Your Shell
Table 3-1 Comparison of Shell Features
Determining Your Login Shell
Table 3-2 Shell File Names and Default Prompts
Temporarily Changing Your Shell
Permanently Changing Your Shell
Editing the Command Line
Using vi Line Editing Commands
An Example of Line Editing with the vi Command Set
Recalling Previous Commands
For More Information…
Setting the Login Environment
The login Program
Environment Variables
Using Login Scripts to Set the System Environment
Why Use Login Scripts?
A Summary of Login Scripts
Table 3-3 Shells and Their Login Scripts
Setting and Referencing Variables
Assigning Values to Variables
Referencing the Values of Variables (Parameter Substitution)
Finding Commands with Search Paths
PATH Variable Format
Changing PATH
Setting PATH as an Environment Variable
Setting Terminal Characteristics
Selecting a Value for the TERM Variable
Setting TERM with the tset Command
Starting the vi Editor
Command Mode and Text Entry Mode in vi
If You Make Mistakes
Entering and Deleting Text
Positioning the Cursor
Scrolling through Text
Finding Text Patterns
Searching for Special Occurrences
Replacing Characters
Substituting Characters
Saving Your Work and Exiting vi
Using Options to Change Your vi Environment
Table 4-1 Editor Options
Making Your vi Environment Permanent
An Example of Changing Your .exrc File
Starting the elm Mailer
Understanding the Main Screen
Figure 5-1 The elm mailer lets you send and receive messages
Entering elm Commands
Reading Your Mail
Figure 5-2 Elm lists your mail messages
Figure 5-3 An example message
Sending Mail to Users on Your System
Figure 5-4 An example message
Creating Mail Aliases
Listing and Deleting Aliases
Replying to Messages
Forwarding Messages
Saving Messages to a File
Deleting Mail Messages
Figure 5-7 Messages are marked with a “D” for deletion
Exiting the elm mailer
Mailing a Directory and Contents
Using Options for Packing Files
Customizing elm
Using the Options Editor
Figure 5-8 You can configure elm using the options editor
Changing the User Level of elm
Table 5-1 Elm Commands
HP-UX Network Services
Remote File Systems: NFS
Using Global Networks
Transferring Files Remotely with ftp
Preparing to Use ftp
Starting ftp
Listing and Creating Directories
Transferring Files from a Remote System
Figure 6-1 Use ftp to get files from remote systems
Transferring Files to a Remote System
Figure 6-2 Use ftp to put files on remote systems
Exiting ftp
Copying Files Remotely with rcp
Preparing to Use rcp
Copying Files to a Remote System
Copying Files from a Remote System
Copying Directories to a Remote System
Copying Directories from a Remote System
Logging In to Another Computer with rlogin
Preparing to Use rlogin
Logging In on a Remote System
Logging Out and Exiting the Remote System
Temporarily Returning to Your Local System
Running a Command Remotely with remsh
Preparing to Use remsh
Running a Command Remotely
Table 6-1 Networking Commands
Security Strategies
Securing Your Terminal
Guidelines for Securing Your Terminal
Working in an Audited Environment
Choosing a Secure Password
What is a Secure Password?
Trusted System Passwords
Protecting Your Password
Protecting Your Files and Directories
Who Has Access?
What Kind of Access?
Table 7-1 A Comparison of Permissions for Directories and Files
Displaying Access Permissions
Using chmod to Set File Permissions
Changing Who Has Access to Directories
Controlling Default Access Permissions
Privileged Groups
Trusted System Access Control
Access Control Lists
Obtaining Software Security Patches
How to use this Reference:
For advanced users
Table B-1 Advanced HP-UX Tasks
Running Commands at Preset Times
Prerequisites for Using at and crontab
Running Commands Using at
Submitting Batch Jobs
Running Commands Using crontab
Using the Key Shell
Using the Key Shell Displays
Figure D-1 Key Shell Softkey Display
Example: Entering a Command with the Key Shell
Figure D-2 Options Displayed
Figure D-3 Required Options Requested
Figure D-4 Optional HP-UX Commands Display
Customizing Your Key Shell Softkeys
Summary of Key Shell Procedures
0 of .
Results for:
No results containing your search query
P. 1


|Views: 13|Likes:
Published by Abdullah Önder

More info:

Published by: Abdullah Önder on Jan 17, 2011
Copyright:Attribution Non-commercial


Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less





You're Reading a Free Preview
Pages 5 to 38 are not shown in this preview.
You're Reading a Free Preview
Pages 43 to 133 are not shown in this preview.
You're Reading a Free Preview
Pages 138 to 173 are not shown in this preview.
You're Reading a Free Preview
Pages 178 to 186 are not shown in this preview.
You're Reading a Free Preview
Pages 191 to 236 are not shown in this preview.

You're Reading a Free Preview

/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->