- absolute pathnames, reading tapes
- Reading Media from Other Systems
- access control violations
- File Permission Violations
- access permissions
- setting
- umask
- accounting
- process
- Process (System) Accounting
- system
- Process (System) Accounting
- Add_disk(1M)
- Configuring SCSI Disks With Add_disk(1M)
- adding
- a group
- Adding a Group Using Shell Commands
- new users
- Adding Users Using Shell Commands
- Adding a new hard disk
- Configuring SCSI Disks With Add_disk(1M)
- adding stations (with BIND)
- Adding a New Station
- adding swap space
- Swap Space
- aliases (mail), creating
- Creating the Aliases File
- aliases database
- building
- Building the Aliases Database
- format of
- The Aliases Database
- modifying
- Modifying the Aliases Database
- rebuilding
- Building the Aliases Database
- /usr/bsd/newaliases
- testing
- Testing the Aliases Database
- troubleshooting
- Potential Problems
- updating
- Updating the aliases Database File
- aliases file
- /etc/aliases
- altering system configuration
- Altering the System Configuration
- anonymous ftp accounts
- Anonymous ftp
- anonymous ftp setup
- Setting Up Anonymous ftp
- archiving audit data
- Archiving Audit Data
- arp command
- Network Management Tools
- ASSERT error messages (UUCP)
- ASSERT Error Messages
- at command
- Automating Tasks with at(1), batch(1), and cron(1M)
- audit
- a file
- Access to Particularly Interesting Files or Resources
- How to Audit a File
- a label
- How to Audit a Label Under Trusted IRIX/B
- a user
- Activity by Particularly Interesting Users
- How to Audit a Specific User
- customizing
- Customizing Auditing
- data archiving
- Archiving Audit Data
- data removing
- Removing Audit Data
- event types
- Auditable Events
- guidelines
- Proper and Improper Management
- improper use
- Proper and Improper Management
- particularly interesting objects
- Access to Particularly Interesting Files or Resources
- particularly interesting subjects
- Activity by Particularly Interesting Users
- sample record
- Understanding the Audit Data
- sat_select(1)
- What Should I Audit?
- system data files modification
- Modifications of System Data Files
- system programs modification
- Modifications of Attributes of System Programs
- the audit trail
- Manipulation of the Audit Trail
- audit data
- interpreting
- Understanding the Audit Data
- understanding
- Understanding the Audit Data
- audit trail
- Administering the System Audit Trail
- auditing, cofiguration utilities
- Customizing Auditing
- auditing, customizing
- Customizing Auditing
- auditing, default environment
- Default Auditing
- auditing, description
- Administering the System Audit Trail
- auditing, enabling
- Enabling Auditing
- auditing, list of items to audit
- Auditable Events
- auditing, reading output
- Understanding the Audit Data
- auditing, recovery
- Saving and Retrieving Your Auditing Environment
- auditing, satconfig utility
- Using satconfig
- auditing, saved files
- Placing the Audit Files
- auditing, saving
- Saving and Retrieving Your Auditing Environment
- auto command
- Booting a Default File
- autoboot
- Summary of Command Monitor Commands
- automating tasks
- Automating Tasks with at(1), batch(1), and cron(1M)
- Backup
- Backing Up and Restoring Files
- Saving a File System with Backup
- backups
- Backing Up and Restoring Files
- across a network
- Backing Up Files Across a Network
- automatic
- Automatic Backups
- available programs
- Backing Up and Restoring Files
- backing up by date
- Saving Files by Modification Date
- byte swapping
- Reading Media from Other Systems
- compressed with bru
- Saving Files Using Data Compression
- dd conversion options
- Reading Media from Other Systems
- errors
- Errors Creating the Backup
- estimate space with bru
- Estimating Space Required for Backup
- file systems
- Backing Up File Systems
- how often
- When to Back Up Data
- if unreadable
- Troubleshooting Unreadable Backup Tapes
- incremental
- Incremental Backups
- incremental with bru
- Incremental Backups with bru
- incremental with cpio
- Incremental Backups with tar and cpio
- incremental with dump
- Incremental Backups with dump
- incremental with tar
- Incremental Backups with tar and cpio
- listing contents of bru
- Listing Files on an Archive
- making
- Backup Procedure
- storing
- Storing Backups
- strategies for
- Backup Strategies
- verifying
- Inspecting an Archive for Consistency
- Checking an Archive
- backups. System Manager
- Saving a File System with the System Manager
- bad blocks
- The Bad-Block Handling Feature
- bad tracks
- The Bad-Block Handling Feature
- batch command
- Automating Tasks with at(1), batch(1), and cron(1M)
- batch processing
- Automating Tasks with at(1), batch(1), and cron(1M)
- /bin/csh
- Available Login Shells
- /bin/rsh
- Available Login Shells
- /bin/sh
- Available Login Shells
- BIND
- adding domains
- Adding Another Domain
- adding new stations
- Adding a New Station
- and caching-only servers
- Caching-Only Server
- and forwarders
- Forwarders
- and network planning
- Berkeley Internet Name Domain (BIND)
- and nslookup
- The nslookup Command
- and the /etc/hosts file
- /etc/hosts
- Alternatives to the Local Hosts Database
- boot file
- BIND's Boot File
- caching-only servers
- Caching-Only Server
- caching-only server setup
- Configuring a Caching-Only Server
- client-server configurations
- BIND Servers and Clients
- database files
- The BIND Database Files
- database management
- Managing the BIND Environment
- Managing the BIND Environment
- debugging
- Debugging named
- deleting stations
- Deleting a Station
- /etc/config/named.options file
- The /etc/config/named.options File
- forwarding servers
- Slave and Forwarding Servers
- forwarding server setup
- Configuring the Forwarding Server
- localhost.rev file
- BIND's localhost.rev File
- management scripts
- The /usr/sbin/named.reload Script
- master servers
- Master Servers
- named.rev file
- BIND's named.rev File
- organization of
- Organization of BIND
- primary master server
- Primary Master
- primary server setup
- Configuring the Primary Server
- Configuring the Client
- root.cache file
- BIND's root.cache File
- secondary master server
- Secondary Master
- secondary server setup
- Configuring the Secondary Server
- server configurations
- The named Server Daemon
- setup example
- Setting Up a BIND Configuration
- slave mode
- Slave Mode
- slave servers
- Slave and Forwarding Servers
- SYSLOG messages
- SYSLOG Messages
- BIND database and MX records
- Questions, Problems, and Troubleshooting
- BIND host lookup routines
- The Domain Name Server
- block devices
- Identifying Devices to IRIX
- blocks
- fixing them
- What Makes a Block Unreliable?
- unreadable
- The Bad-Block Handling Feature
- unreliable
- When Is a Block Bad?
- boot
- Summary of Command Monitor Commands
- boot command
- Booting a Specific Program
- boot file, BIND
- BIND's Boot File
- booting
- across the network
- Booting across the Network
- command
- Booting a Specific Program
- default file
- Booting a Default File
- from a resource list
- Booting from a Resource List
- from various media
- Booting from a Resource List
- fx
- Booting a Specific Program
- prom monitor
- Booting a Program from the Command Monitor
- specific program
- Booting a Specific Program
- through gateways
- Booting across the Network with bootp
- with bootp
- Booting across the Network with bootp
- bootp server
- Booting across the Network with bootp
- Bourne shell
- Available Login Shells
- startup files
- Bourne and Korn Shell Files
- bridge, definition of
- Repeaters, Bridges, Routers, and Gateways
- broadcast message (/etc/wall)
- Shutting Down the System Carefully
- bru
- Backing Up and Restoring Files
- capabilities
- bru
- making backups
- Saving a File System with bru
- Backing Up Files with bru
- restoring data
- Restoring a File System with bru
- restoring files
- Restoring Individual Files with bru
- C-shell
- Available Login Shells
- startup files
- C Shell Files
- cables
- null modem
- Defining the Serial Interface
- Cabling the Serial Ports
- cabling
- serial interface
- Defining the Serial Interface
- serial ports
- Cabling the Serial Ports
- caching-only server, BIND
- Configuring a Caching-Only Server
- caching-only servers
- Caching-Only Server
- Clients
- CD ROM filesystems
- Floppy and CD File Systems
- changing
- default shell
- Changing a User's Default Shell
- groups temporarily
- Temporarily Changing Groups
- passwords
- Changing a User's Password
- system configuration
- Altering the System Configuration
- user information
- Changing User Information
- changing passwords
- Using Password Aging Manually
- Using Password Aging Manually
- character devices
- Identifying Devices to IRIX
- checking system configuration
- Checking the System Configuration
- chkconfig
- Checking the System Configuration
- chkconfig command
- Network Initialization Process
- cleaning temporary directories
- Cleaning Out Temporary Directories
- client setup, BIND
- Configuring the Client
- colors, selecting
- Creating a Custom Shell Window
- colorview command
- Creating a Custom Shell Window
- Command Monitor, entering
- How to Enter the Command (PROM) Monitor
- communication
- user
- News
- Electronic Mail
- Write to a User
- Message of the Day
- Communicating with Users
- Write to All Users
- Compact Disk Filesystems
- Floppy and CD File Systems
- compact disk support
- Floppy and CD File Systems
- configmail script
- /usr/etc/configmail
- configuring
- ASCII terminal
- Configuring the Terminal Software
- network routers
- Setting Up a Router
- configuring network controllers
- Controller Interface Names
- connecting
- a modem
- Attaching a Modem
- ASCII terminal
- Attaching an ASCII Terminal
- peripheral devices
- Serial Ports
- connecting to the Ethernet
- Attaching Your Station to an Ethernet Network
- console
- Summary of Command Monitor Commands
- controller boards, and network troubleshooting
- Hardware Problems
- controller interface names
- Controller Interface Names
- controllers (network), configuring
- Controller Interface Names
- conventions
- reference manuals
- The IRIX Reference Pages
- typographical
- Style Conventions
- cpio
- Backing Up and Restoring Files
- capabilities
- cpio
- making backups
- Saving Files by Modification Date
- restoring files
- Restoring Individual Files with tar and cpio
- cron command
- Automating Tasks with at(1), batch(1), and cron(1M)
- cu command (UUCP)
- UUCP User Programs
- customizing auditing
- Customizing Auditing
- database files, BIND
- The BIND Database Files
- database management, BIND
- Managing the BIND Environment
- date and time
- changing
- Changing the Date and Time
- dbedit(1m)
- Modifications of System Data Files
- DBM database
- /usr/bsd/newaliases
- Building the Aliases Database
- dd
- Backing Up and Restoring Files
- capabilities
- dd
- conversion options
- Reading Media from Other Systems
- copying a file system
- Saving a File System with dd
- debuging a file system
- Kinds of File Systems
- default backup device
- changing
- Changing Device Nodes Manually
- default permissions
- setting
- umask
- default printer
- changing
- Maintaining the lp System
- default shell
- changing
- Changing a User's Default Shell
- deleting a user
- Deleting a User from the System
- deleting staions (with BIND)
- Deleting a Station
- denial of service
- PROM Passwords
- /dev/tape
- Backup Procedure
- device files
- IRIX Device Files
- Defining the Serial Interface
- device names
- Syntax of Command Monitor File Names
- Identifying Devices to IRIX
- devices
- block
- Identifying Devices to IRIX
- character
- Identifying Devices to IRIX
- raw
- Identifying Devices to IRIX
- Devices database (UUCP)
- Supporting Databases
- The Devices File
- df command
- The df(1) Command
- dfsck
- dfsck
- dial & button box
- Dial & Button Box and Spaceball Serial Cabling
- dial and button box
- Terminals and Modems
- Terminals and Modems
- Dialcodes database (UUCP)
- Supporting Databases
- The Dialcodes File
- Dialers database (UUCP)
- The Dialers File
- Supporting Databases
- Supporting Databases
- disable
- Summary of Command Monitor Commands
- disable printer
- cancel: Stop a Print Request
- disk
- bad blocks
- When Is a Block Bad?
- label
- Formatting Disks Using fx
- disk free space display command
- The df(1) Command
- disk quotas
- Imposing Disk Quotas
- site policy
- Disk Use and Quotas
- disk striping
- Logical Volumes and Disk Striping
- disk usage display command
- The du(1) Command
- The diskusg(1) Command
- disk use
- Checking Free Space and Free Inodes
- Identifying Large Space Users
- disks
- formatting
- Booting a Specific Program
- disks, copying hard disks
- Copying Hard Disks From the Command Monitor
- diskusg command
- The diskusg(1) Command
- documentation conventions
- Style Conventions
- domain name macros and classes (sendmail.cf file
- (D)omain Name Macro and Class
- domain space, definition of
- Organization of BIND
- domains
- definition of
- Organization of BIND
- top level
- Organization of BIND
- domains (BIND), adding
- Adding Another Domain
- du command
- The du(1) Command
- dump
- Backing Up and Restoring Files
- capabilities
- dump and restore
- /etc/dumpdates
- Saving a File System with dump
- incremental backups
- Incremental Backups with dump
- making backups
- Saving a File System with dump
- editing the /etc/hosts file
- Modifying the hosts database
- electronic mail
- Electronic Mail
- electronic mail and network planning
- Electronic Mail
- entering the Command Monitor
- How to Enter the Command (PROM) Monitor
- entering the PROM Monitor
- How to Enter the Command (PROM) Monitor
- environment variables
- Environment Variables
- examining
- Environment Variables
- setting
- Environment Variables
- error messages
- IRIX Kernel Error Messages
- lp
- lp Error Messages
- notice
- NOTICE Messages
- panic
- PANIC Messages
- warning
- WARNING Messages
- /etc directory, network files in
- Files and Directories
- /etc/chkconfi file
- Checking the Network Software Configuration
- /etc/config/ifconfig.options file
- Changing Network Parameters
- /etc/config/named.options file
- The /etc/config/named.options File
- /etc/config/netif.options file
- Modifying the Interface Name
- Modifying the Network Interface Configuration
- /etc/dumpdates
- Saving a File System with dump
- /etc/ethers file
- Files and Directories
- /etc/fstab file
- Network Initialization Process
- /etc/ftpusers file
- The /etc/ftpusers File
- /etc/group
- layout of
- Adding Users Using Shell Commands
- /etc/hosts file
- Network Initialization Process
- Files and Directories
- alternatives to
- Alternatives to the Local Hosts Database
- and network planning
- Internet Addresses and the Hosts Database
- editing
- Modifying the hosts database
- host names in
- /etc/hosts
- router entries
- Configuring a Router with Two Interfaces
- /etc/hosts.equiv file
- Files and Directories
- The /etc/hosts.equiv File
- requirements for
- The /etc/hosts.equiv File
- /etc/init.d/mail script
- /etc/init.d/mail
- /etc/init.d/network initialization script
- Network Initialization Process
- /etc/init.d/network script
- Configuring a Router with Two Interfaces
- Creating a Local Network Script
- Network Management Tools
- /etc/init.d/network.local script
- Creating a Local Network Script
- /etc/issue
- Creating a Remote Login Message
- /etc/motd
- Message of the Day
- /etc/motd (message of the day)
- Shutting Down the System Carefully
- /etc/networks file
- Files and Directories
- /etc/password
- layout of
- Adding Users Using Shell Commands
- /etc/protocols file
- Files and Directories
- /etc/rpc file
- Files and Directories
- /etc/services file
- Files and Directories
- /etc/sys_id
- Changing the Name of a System
- /etc/sys_id file
- Network Initialization Process
- Files and Directories
- /etc/hosts
- /etc/wall (broadcast message)
- Shutting Down the System Carefully
- Ethernet
- booting
- Booting across the Network
- gateway
- Booting across the Network with bootp
- Ethernet connections to an IRIS
- Attaching Your Station to an Ethernet Network
- ethernet, testing
- Checking Your Ethernet Connection
- extent file system
- Kinds of File Systems
- description of
- Extent File System (EFS)
- file audit
- How to Audit a File
- file system
- copying with dd
- Saving a File System with dd
- debugging
- Kinds of File Systems
- description
- Extent File System (EFS)
- exporting
- Kinds of File Systems
- extent file system (EFS)
- Kinds of File Systems
- free space
- Checking Free Space and Free Inodes
- maintaining
- Maintaining File Systems
- making
- Making New File Systems
- parameters
- Basic File System Parameters
- types
- Kinds of File Systems
- files
- open
- The Open File Table
- find program
- Using find to Locate Files
- finding files
- Using find to Locate Files
- firewalls
- Firewalls
- fix-hayes program (UUCP)
- UUCP Daemons
- fix-telebit program (UUCP)
- UUCP Daemons
- Floppy Disk Filesystems
- Floppy and CD File Systems
- floppy disk support
- Floppy and CD File Systems
- font selection
- Creating a Custom Shell Window
- .forward mail file
- The .forward File
- forwarders and BIND
- Forwarders
- forwarding server, BIND
- Configuring the Forwarding Server
- forwarding, controlling on routers
- Turning Forwarding Off
- free space
- checking
- Checking Free Space and Free Inodes
- ftp and network security
- Anonymous and Restricted FTP Access
- ftp setup (anonymous)
- Setting Up Anonymous ftp
- fx
- Formatting Disks Using fx
- gated daemon
- Daemons
- gateway
- Booting across the Network with bootp
- gateway, definition of
- Repeaters, Bridges, Routers, and Gateways
- genperm command (UUCP)
- UUCP Administrative Programs
- Geometry Hotline
- Product Support
- gethostbyname routine
- Internet Addresses and the Hosts Database
- The /etc/hosts.equiv File
- getting help
- Getting Help in the Command Monitor
- group file
- layout of
- Adding Users Using Shell Commands
- group ID number
- Group IDs
- /etc/group
- Group IDs
- groups
- determining membership
- Temporarily Changing Groups
- temporarily changing
- Temporarily Changing Groups
- growfs
- Changing File System Size
- Logical Volumes and Disk Striping
- hard disk
- bad blocks
- When Is a Block Bad?
- formatting
- Configuring Disks With MAKEDEV(1M)
- multiple
- Swap Space
- performance
- Hard Disks under IRIX
- supported types
- Hard Disks under IRIX
- hard disks, adding
- Configuring SCSI Disks With Add_disk(1M)
- hardware inventory
- hinv Command
- hardware options (network)
- Networking Hardware Options
- hardware requirements (network)
- Networking Hardware
- hardware upgrades
- cautions
- Hardware Affects Software
- help
- bad blocks
- What Makes a Block Unreliable?
- during boot up
- Summary of Command Monitor Commands
- product
- Product Support
- reference
- The IRIX Reference Pages
- support
- Product Support
- hinv command
- hinv Command
- host name
- Changing the Name of a System
- hostname
- changing
- Changing the Name of a System
- hosts database
- modifying
- Modifying the hosts database
- router entries in
- Configuring a Router with Two Interfaces
- hosts database alternatives
- Alternatives to the Local Hosts Database
- hosts database planning
- Internet Addresses and the Hosts Database
- I-node
- table
- Tables in Memory
- iconlogin (pandora)
- Checking the System Configuration
- id command
- Temporarily Changing Groups
- if/etc/issue
- Remote Login Message
- ifconfig command
- Network Management Tools
- ifconfig-hy.options file
- Network Initialization Process
- ifconfig.options file
- Changing Network Parameters
- inactive files
- Tracking Disk Use
- inetd daemon
- Daemons
- Network Initialization Process
- infocmp command
- Configuring the Terminal Software
- init command
- Reinitializing the Processor from the Command Monitor
- The Command Monitor Environment
- initializing the network
- Network Initialization Process
- insider security violation
- Use and Abuse by Insiders
- InSight servers
- Setting Up an InSight File Server
- InSight, using NFS
- Setting Up an InSight File Server
- Internet addresses
- and BIND
- Internet Addresses
- and NIS
- Internet Addresses
- and subnetworks
- Planning to Subnet Local Networks
- classes of
- Planning to Subnet Local Networks
- obtaining
- Obtaining an Internet Address
- planning
- Internet Addresses
- Internet Control Message Protocol (ICMP)
- Testing Your Network Connectivity
- interpreting network statistics
- Interpreting Network Statistics
- inventory
- hardware
- hinv Command
- software
- versions Command
- ipfiltered daemon
- Network Initialization Process
- IRIS Networker
- Network Management Tools
- iskusg utility
- Identifying Large Space Users
- kerberos
- Security Applications
- kernel parameters and networking
- Kernel Configuration
- kernel tuning
- Tuning System Performance
- IRIX Kernel Tunable Parameters
- keyboard
- variables
- Setting the Keyboard Variable
- label
- disk
- Formatting Disks Using fx
- label audit
- How to Audit a Label Under Trusted IRIX/B
- line disciplines, POSIX
- Description of posix_tty_default
- local station (UUCP), configuring
- Configuring the Local Station
- local stations (UUCP)
- identifying
- Determining the Remote and Local Stations
- localhost entry in /etc/hosts file
- /etc/hosts
- /etc/hosts
- localhost.rev file
- BIND's localhost.rev File
- locking logins
- Using Password Aging Manually
- logging remote access
- Turning On Remote Access Logging
- logical volumes
- Logical Volumes and Disk Striping
- Changing File System Size
- login
- options
- System Login Options
- login icons
- Checking the System Configuration
- login shells
- Available Login Shells
- logins
- Logins and Passwords
- locking
- Using Password Aging Manually
- loopback address
- Modifying the hosts database
- lp
- commands
- User Command Summary
- maintenance
- Maintaining the lp System
- lp error messages
- lp Error Messages
- lp spooler
- Removing Printers
- lp troubleshooting
- Troubleshooting Your Printing System
- lpmove
- lpmove: Move a Request to Another Printer
- lpsched
- lpsched : Start the lp Scheduler
- lvinit
- The lvinit(1M) Command
- lvtab
- The /etc/lvtab File
- mail
- Electronic Mail
- mail domains
- Mail Domains
- mail forwarders
- Mail Forwarders
- mail queue
- Listing the Queue
- mail relays
- Mail Relays
- mail system components
- The Mail System
- mailq command
- /usr/bin/mailq
- maintaining file systems
- Maintaining File Systems
- MAKEDEV
- tape options
- MAKEDEV Commands For Tape Drives
- man command
- The IRIX Reference Pages
- man pages
- The IRIX Reference Pages
- mapping bad blocks
- What Makes a Block Unreliable?
- mapping bad tracks
- What Makes a Block Unreliable?
- Maxuuscheds file (UUCP)
- Other UUCP Files
- Maxuuxqts file (UUCP)
- Other UUCP Files
- media
- storing
- Storing Backups
- mediad
- Floppy and CD File Systems
- mediad(1M)
- Floppy and CD File Systems
- memory
- tables
- How the File System Works
- mesg command
- Write to a User
- message of the day (/etc/motd)
- Shutting Down the System Carefully
- Creating a Message of the Day
- message of the day file
- Message of the Day
- mkfs command
- Making New File Systems
- mklv
- The mklv(1M) Command
- modem connections
- Networking Hardware
- modems
- cables
- Cabling the Serial Ports
- connecting
- Attaching a Modem
- modification of system data files
- Modifications of System Data Files
- modifications of system programs
- Modifications of Attributes of System Programs
- modifying the hosts database
- Modifying the hosts database
- mouted daemon
- Daemons
- mpadmin(1M)
- Changing Processors on Multi-Processor Systems
- mqueue directory
- /var/spool/mqueue
- mtune directory
- IRIX Kernel Tunable Parameters
- multgrps command
- Temporarily Changing Groups
- multiprocessor systems
- Changing Processors on Multi-Processor Systems
- MX records
- Questions, Problems, and Troubleshooting
- MX Record Support
- named daemon
- Checking the System Configuration
- Daemons
- The /usr/sbin/named.reload Script
- named server, definition of
- The BIND Name Server
- named.boot file
- BIND's Boot File
- The /usr/sbin/named.reload Script
- named.host file
- BIND's named.hosts File
- named.hosts file
- BIND's named.hosts File
- named.rev file
- BIND's named.rev File
- naming stations
- Naming Your Station
- ncheck command
- Checking for Set-UIDs in the Root File System
- netif.options file
- Modifying the Interface Name
- Modifying the Network Interface Configuration
- Network Initialization Process
- netmask option
- Setting the Netmask
- netmask, setting
- Subnetting a Network
- netstat command
- Network Management Tools
- The netstat Tool
- NetVisualyzer
- Network Management Tools
- network planning
- traffic
- Performance Planning
- network troubleshooting
- media
- Hardware Problems
- servers
- Network Servers
- network address masks
- Subnetting a Network
- network applications planning
- Using Common Network Applications
- network backups
- Backing Up Files Across a Network
- network booting
- Booting across the Network
- network configurations, sendmail
- sendmail Network Configurations
- network connections, testing
- Testing Your Network Connectivity
- network controllers, choosing
- Performance Planning
- network daemons
- Checking the Network Software Configuration
- network daemons, common
- Daemons
- network daemons, general
- Daemons
- network daemons, option files
- Daemon Option Files
- network equipment, planning
- Repeaters, Bridges, Routers, and Gateways
- Network File System (NFS)
- NFS Under SLIP
- network hardware options
- Networking Hardware Options
- network hardware requirements
- Networking Hardware
- Network Information Center (NIC)
- Organization of BIND
- Obtaining an Internet Address
- Registering Your BIND Domain Name
- network initialization
- Network Initialization Process
- network interfaces
- modifying
- Modifying the Network Interface Configuration
- modifying addresses of
- Modifying the Interface Address
- modifying names of
- Modifying the Interface Name
- network management tools
- Network Management Tools
- network master script
- Network Startup and Shutdown
- network parameters
- changing
- Changing Network Parameters
- network performance factors
- Factors Affecting Network Performance
- network planning
- BIND
- Berkeley Internet Name Domain (BIND)
- device number
- Performance Planning
- electronic mail
- Electronic Mail
- /etc/host file
- Internet Addresses and the Hosts Database
- firewalls
- Firewalls
- Internet addresses
- Internet Addresses
- media selection
- Performance Planning
- network applications
- Using Common Network Applications
- NFS
- Network File System (NFS)
- NIS
- Network Information Service (NIS)
- security
- Planning for Network Security
- security applications
- Security Applications
- size considerations
- Planning the Physical Network
- SLIP
- Serial Line Internet Protocol (SLIP)
- subnetworks
- Planning to Subnet Local Networks
- the .rhosts file
- The .rhosts File
- UUCP
- UNIX-to-UNIX Copy Program (UUCP)
- network printing
- Printing Over the Network
- network script
- Network Startup and Shutdown
- network scripts, creating
- Creating a Local Network Script
- network security
- and ftp
- Anonymous and Restricted FTP Access
- /etc/hosts.equiv file
- The /etc/hosts.equiv File
- network shutdown
- Network Shutdown Process
- Network Startup and Shutdown
- Network SLIP connections (NSLIP)
- Connecting Networks with SLIP
- network software checkout
- Checking the Network Software Configuration
- network software options
- Optional Networking Products
- network software, IRIS standard distribution
- Networking Software
- network statistics, interpreting
- Interpreting Network Statistics
- network troubleshooting
- configurations
- Network Configuration
- hardware
- Hardware Problems
- packet size
- Packet Size
- network, testing
- Checking Your Ethernet Connection
- networking files and directories
- Files and Directories
- networking, preparing an IRIS for
- Configuring an IRIS for a Network
- newaliases program
- /usr/bsd/newaliases
- news system
- News
- NFS
- and network planning
- Network File System (NFS)
- NIS
- and network planning
- Network Information Service (NIS)
- and the /etc/hosts file
- /etc/hosts
- Alternatives to the Local Hosts Database
- Non-Domain Addressing
- Non-Domain Addressing
- notice messages
- NOTICE Messages
- nslookup command
- The nslookup Command
- operating policy
- general
- Operating Policies
- operating system tuning
- IRIX Kernel Tunable Parameters
- operating system, tuning
- Tuning System Performance
- operating the system
- general
- System Accounting
- Operating the System
- outside connections
- Connections with Machines Outside the Local Network
- outsider security violation
- Use and Abuse by Outsiders
- pandora
- Checking the System Configuration
- pandora(iconlogin)
- Checking the System Configuration
- panic messages
- PANIC Messages
- parameters
- kernel
- Kernel Configuration
- parameters, kernel
- Tuning System Performance
- password
- changing
- Using Password Aging Manually
- password file
- layout of
- Adding Users Using Shell Commands
- passwords
- Logins and Passwords
- Logins and Passwords
- aging
- Logins and Passwords
- changing
- Using Password Aging Manually
- Changing a User's Password
- dialup
- Second (Dialup) Passwords
- forcing
- Forcing a Password
- forgotten
- Changing a User's Password
- passwords, PROM
- Setting a PROM Password
- PROM Passwords
- passwords, system
- PROM Passwords
- Setting a PROM Password
- PC TCP/IP connections to an IRIX network
- PC Connectivity
- performance factors (network)
- Factors Affecting Network Performance
- performance tuning
- Tuning System Performance
- IRIX Kernel Tunable Parameters
- permissions
- default
- Privacy
- Permissions database (UUCP)
- Supporting Databases
- The Permissions File
- Supporting Databases
- ping command
- Testing Your Network Connectivity
- Network Management Tools
- The ping Tool
- planning
- for network traffic
- Performance Planning
- Internet addresses
- Internet Addresses
- network controllers
- Performance Planning
- network devices
- Performance Planning
- network equipment
- Repeaters, Bridges, Routers, and Gateways
- network performance
- Performance Planning
- network size
- Planning the Physical Network
- Point to Point Protocol
- Point to Point Protocol (PPP)
- Point to Point Protocol (PPP)
- SLIP and PPP
- Poll database (UUCP)
- The Poll File
- portmap daemon
- Daemons
- POSIX line disciplines
- Description of posix_tty_default
- potential security violations
- Potential Security Violations
- PPP
- Point to Point Protocol (PPP)
- PPP (Point to Point Protocol)
- SLIP and PPP
- preparing for networking
- Configuring an IRIS for a Network
- primary master server, BIND
- Primary Master
- primary server, BIND
- Configuring the Primary Server
- print requests
- allow
- accept : Allow Print Requests
- cancel
- Checking Remote Printer Status
- rejecting
- reject: Prevent Print Requests
- printenv command
- Displaying the Current Environment Variables
- printer
- commands
- User Command Summary
- disable
- cancel: Stop a Print Request
- status
- Checking Remote Printer Status
- printer administration
- Administering Printers
- printer use
- Administering Printers
- printers
- adding
- Adding a Printer
- enabling
- enable: Allow Printer to Process Requests
- removing
- Removing Printers
- printing
- canceling
- lp: Make an Output Request
- over the network
- Printing Over the Network
- process accounting
- Process (System) Accounting
- processor, controlling
- Changing Processors on Multi-Processor Systems
- product support
- Product Support
- PROM monitor
- booting
- Booting a Program from the Command Monitor
- changing variables
- Changing Environment Variables
- command line editor
- Syntax of Command Monitor Commands
- command syntax
- Syntax of Command Monitor File Names
- device names
- Syntax of Command Monitor File Names
- enabling a console
- Enabling a Console in the Command Monitor
- environment variables
- Reinitializing the Processor from the Command Monitor
- keyboard variables
- Setting the Keyboard Variable
- reinitializing
- Reinitializing the Processor from the Command Monitor
- PROM monitor prompt
- Shutting Down from Multiuser Mode
- PROM Monitor, entering
- How to Enter the Command (PROM) Monitor
- PROM passwords
- Setting a PROM Password
- PROM Passwords
- prtvtoc
- Formatting Disks Using fx
- pset(1M)
- Changing Processors on Multi-Processor Systems
- queue, mail
- Listing the Queue
- quotas
- on disk usage
- Imposing Disk Quotas
- RAM
- non-volatile
- The Command Monitor Environment
- rarpd daemon
- Daemons
- Network Initialization Process
- raw devices
- Identifying Devices to IRIX
- rebooting networked stations
- Rebooting the Station
- remote access logging
- Turning On Remote Access Logging
- remote login message
- Creating a Remote Login Message
- Remote Login Message
- remote stations (UUCP)
- identifying
- Determining the Remote and Local Stations
- remote stations (UUCP), configuring
- Configuring the Remote Station
- removing
- audit data
- Removing Audit Data
- removing printers
- Removing Printers
- removing stations (with BIND)
- Deleting a Station
- repeater, definition of
- Repeaters, Bridges, Routers, and Gateways
- reporting trouble
- Reporting Trouble
- reset button
- Booting a Program from the Command Monitor
- resolv.conf file
- The named Server Daemon
- resolver routines, purpose of
- The BIND Name Server
- Restore
- Backing Up and Restoring Files
- Backing Up and Restoring Files
- capabilities
- dump and restore
- interactive mode
- Restoring Individual Files with restore
- restoring data
- Restoring a File System with Restore
- restoring file systems
- Restoring a File System with restore
- restoring individual files
- Restoring Individual Files with restore
- restoring data
- bru
- Restoring a File System with bru
- by file system
- Restoring File Systems
- files with bru
- Restoring Individual Files with bru
- files with cpio
- Restoring Individual Files with tar and cpio
- files with tar
- Restoring Individual Files with tar and cpio
- Restore
- Restoring a File System with Restore
- Restoring a File System with restore
- restoring files
- restore
- Restoring Individual Files with restore
- restricted ftp accounts
- Restricted ftp Accounts
- restricted shell
- Available Login Shells
- .rhosts file
- The .rhosts File
- root directories
- Administrative Directories and Files
- root privilege violation
- Unexpected Use of Root Privilege
- root.cache file
- BIND's root.cache File
- route command
- Network Management Tools
- routed daemon
- Daemons
- router
- configuring
- Setting Up a Router
- controlling forwarding on
- Turning Forwarding Off
- dual interfaces on
- Configuring a Router with Two Interfaces
- multiple interfaces on
- Configuring a Router with More Than Two Interfaces
- router, definition of
- Repeaters, Bridges, Routers, and Gateways
- rpcinfo command
- Network Management Tools
- rtnetd daemon
- Daemons
- rtquery command
- Network Management Tools
- rup command
- Testing Your Network Connectivity
- Network Management Tools
- rwhod daemon
- Daemons
- Network Initialization Process
- Checking the System Configuration
- sash
- Booting the Standalone Shell
- SAT
- customizing
- Customizing Auditing
- event types
- Auditable Events
- sample record
- Understanding the Audit Data
- sat_select(1)
- What Should I Audit?
- System Audit Trail
- Administering the System Audit Trail
- understanding data
- Understanding the Audit Data
- sat_interpret utility
- Understanding the Audit Data
- sat_interpret(1)
- Understanding the Audit Data
- sat_reduce(1) utility
- Understanding the Audit Data
- sat_select utility
- Using sat_select
- sat_select(1)
- What Should I Audit?
- sat_summarize utility
- Understanding the Audit Data
- sat_summarize(1)
- Understanding the Audit Data
- satconfig utility
- Using satconfig
- scheduler
- starting
- lpsched : Start the lp Scheduler
- stopping
- lpsched : Start the lp Scheduler
- SCSI disk, adding
- Configuring SCSI Disks With Add_disk(1M)
- secondary master server, BIND
- Secondary Master
- secondary server, BIND
- Configuring the Secondary Server
- security
- and network planning
- Planning for Network Security
- applications for
- Security Applications
- network
- Network Security
- process accounting
- Process (System) Accounting
- system
- System Security
- xhost command
- Transparent Network Access
- security guidelines
- Security Guidelines
- security violation
- access control
- File Permission Violations
- insider
- Use and Abuse by Insiders
- outside connections
- Connections with Machines Outside the Local Network
- outsider
- Use and Abuse by Outsiders
- potential
- Potential Security Violations
- root privilege
- Unexpected Use of Root Privilege
- unauthorized entry
- Attempts at Unauthorized Entry
- unusual system usage
- System Usage at Unusual Hours or From Unusual Locations
- security, trojan horse attack
- Security Guidelines
- selecting network media
- Performance Planning
- sending files
- lp: Make an Output Request
- sendmail
- and multi-token class matching
- Multi-Token Class Match
- command-line flags
- sendmail Command-line Flags
- configuring
- Configuring sendmail
- design features
- System Organization
- files and directories
- sendmail Related Files and Directories
- functions of
- System Organization
- general description
- An Overview of sendmail
- network configurations
- sendmail Network Configurations
- planning list
- A sendmail Planning Checklist
- software components
- How sendmail Works
- sendmail command
- configuration file flag
- Using a Different Configuration File
- daemon mode
- Daemon Mode
- debugging flags
- Debugging Flags
- delivery mode
- Delivery Mode
- queue mode
- Queue Mode
- test mode
- Test Mode
- verify mode
- Verify Mode
- sendmail commands
- sendmail Commands
- sendmail daemon
- /var/spool/mqueue
- /etc/init.d/mail
- The sendmail Daemon
- Starting the sendmail Daemon
- sendmail managemen
- Managing sendmail
- sendmail script
- /etc/init.d/mail
- sendmail scripts
- /etc/init.d/mail
- sendmail.cf file
- configurable elements
- User Configurable Macros and Classes
- customizing examples
- Customizing the sendmail.cf File
- customizing for complex relay networks
- A Complex (Forwarder) Hierarchical (Relay) Network with Domains
- customizing for relay networks
- Hierarchical (Relay) Network with a Single Domain
- customizing for simple networks
- Simple Isolated Network
- customizing for standalone stations
- Stand-alone Station
- forwarder name macros and class
- (F)orwarder Station Name Macro and Class
- general description
- /etc/sendmail.cf
- killed stations class
- (K)illed Stations Class
- pathalias database macro
- (P)athalias Database Macro
- relay name macro
- (R)elay Station Name Macro
- top-level domain macro
- (T)op-Level Domain Macro
- sendmail.cf.auto file
- /etc/sendmail.cf
- sendmail.fc file
- /etc/sendmail.fc
- sendmail.hf file
- /etc/sendmail.hf
- sendmail.st file
- /etc/sendmail.st
- serial interface
- Defining the Serial Interface
- serial line discipline, POSIX
- Description of posix_tty_default
- Serial Line Interface Protocol (SLIP)
- and bidirectional links
- Configuring a Bidirectional SLIP Link
- Configuring a Bidirectional SLIP Link
- and data compression
- SLIP and PPP
- and file transfers
- File Transfer Under SLIP
- File Transfer Under SLIP
- and NFS
- NFS Under SLIP
- cable specifications
- Cable Specifications
- Cable Specifications
- configuration procedure
- Overview of Configuration
- connecting stations
- Connecting Two Systems with SLIP
- connection media
- SLIP Configuration Information
- SLIP Configuration Information
- connection procedure
- Overview of Configuration
- connection requirements
- Overview of Configuration
- debugging
- Debugging a SLIP Link
- modem configuration
- Configuring the Modem
- Configuring the Modem
- modem settings for
- Modem Specifications
- modems for
- Modem Specifications
- modems settings for
- Modem Specifications
- purpose of
- SLIP and PPP
- NFS Under SLIP
- software requirements
- Overview of Configuration
- station connection
- Connecting Two Systems with SLIP
- Serial Line Internet Protocol (SLIP)
- and network planning
- Serial Line Internet Protocol (SLIP)
- serial line networks
- Networking Hardware
- serial ports
- Serial Ports
- Set-GID
- Checking for Set-UIDs in the Root File System
- Set-UID
- Checking for Set-UIDs in the Root File System
- setenv command
- Changing Environment Variables
- setting environment variables
- Environment Variables
- setting network masks
- Setting the Netmask
- setup
- kernel
- Kernel Configuration
- shell environment
- examining
- Environment Variables
- shell variables
- Environment Variables
- setting
- Environment Variables
- shell window colors
- Creating a Custom Shell Window
- shell window font selection
- Creating a Custom Shell Window
- shutdown command
- Turning Off from Single-user Mode
- shutting down the network
- Network Shutdown Process
- Network Startup and Shutdown
- shutting down the system
- Shutting Down from Multiuser Mode
- Signal Quality Error
- Hardware Problems
- single-user mode
- Going to Single-user Mode From Multiuser Mode
- site policies
- System and Site Policies
- User Services
- accounts
- Accounts and Passwords
- disk quotas
- Disk Use and Quotas
- disk use
- Disk Use and Quotas
- malicious activities
- Malicious Activities
- passwords
- Accounts and Passwords
- privacy
- Privacy
- root access
- Root Access
- user ID numbers
- Accounts and Passwords
- slave mode, BIND
- Slave Mode
- snmpd daemon
- Network Initialization Process
- Daemons
- software inventory
- versions Command
- software upgrades
- cautions
- Leaving Users Stranded
- spaceball
- Dial & Button Box and Spaceball Serial Cabling
- Terminals and Modems
- special login shells
- Special Login Shells
- SPECTRUM
- Network Management Tools
- spooler
- lp
- Removing Printers
- spray command
- Network Management Tools
- standalone mode
- Network Initialization Process
- standalone shell
- Booting the Standalone Shell
- standard distribution network software
- Networking Software
- starting the network
- Network Startup and Shutdown
- station naming
- Naming Your Station
- stop printing
- lp: Make an Output Request
- stopping the system
- /etc/inittab and Power Off
- striping
- disk
- Logical Volumes and Disk Striping
- Logical Volumes and Disk Striping
- disks
- The /etc/lvtab File
- subnetworks
- and network masks
- Subnetting a Network
- and troubleshooting
- Network Configuration
- Internet addresses for
- Planning to Subnet Local Networks
- planning
- Planning to Subnet Local Networks
- Summary
- of chapter 13
- Summary
- super user
- groups
- Temporarily Changing Groups
- swap space
- Swap Space
- adding
- Swap Space
- syntax
- PROM monitor
- Syntax of Command Monitor File Names
- sysadm
- chgloginid
- Changing a User's Password
- chgpasswd
- Changing a User's Password
- chgshell
- Changing a User's Password
- deluser
- Deleting a User from the System
- powerdown
- Shutting Down from Multiuser Mode
- powerdown
- Shutting Down from Multiuser Mode
- Sysfiles database (UUCP)
- The Sysfiles File
- system access
- Using Password Aging Manually
- Using Password Aging Manually
- Using Password Aging Manually
- system accounting
- Process (System) Accounting
- System Audit Trail (SAT)
- Administering the System Audit Trail
- system configuration
- altering
- Altering the System Configuration
- checking
- Checking the System Configuration
- system data files
- modification
- Modifications of System Data Files
- system files
- Important System Directories
- system log hardcopy
- Maintaining a System Log Book
- system name
- changing
- Changing the Name of a System
- system operations
- general
- System Accounting
- Operating the System
- system passwords
- PROM Passwords
- PROM Passwords
- Setting a PROM Password
- Setting a PROM Password
- system security
- System Security
- system shutdown
- /etc/inittab and Power Off
- multi-usermode
- Shutting Down from Multiuser Mode
- system tuning
- IRIX Kernel Tunable Parameters
- Systems database (UUCP)
- Supporting Databases
- The Systems File
- tables in memory
- How the File System Works
- tape
- adding a drive
- Adding a Tape Drive
- Using Floppy Disks Under IRIX
- capacities
- Tape Capacities
- supported types
- Tape Capacities
- using MAKEDEV
- MAKEDEV Commands For Tape Drives
- tape device, default
- Backup Procedure
- tapes
- reusing
- Reusing Tapes
- storing
- Storing Backups
- testing
- Testing for Bad Media
- tapes, absolute pathnames
- Reading Media from Other Systems
- tar
- Backing Up and Restoring Files
- capabilities
- tar
- comparison key characters
- Comparing Archived Files
- making backups
- Saving Files by Modification Date
- restoring files
- Restoring Individual Files with tar and cpio
- TCP/IP and UUCP
- Setting up UUCP on a TCP/IP Connection
- TCP/IP connectivity to personal computers
- PC Connectivity
- temporary directories
- cleaning
- Cleaning Out Temporary Directories
- testing connectivity
- Testing Your Network Connectivity
- time server daemon (timed)
- Checking the System Configuration
- timed daemon
- Changing the Date and Time
- Daemons
- Checking the System Configuration
- Network Initialization Process
- timeslave daemon
- Checking the System Configuration
- Daemons
- Network Initialization Process
- traceroute command
- Network Management Tools
- transmitters, and network troubleshooting
- Hardware Problems
- trojan horse attack
- Security Guidelines
- trouble
- reporting
- Reporting Trouble
- troubleshooting
- hardware
- Troubleshooting Your Printing System
- network printers
- Troubleshooting Network Printers
- out of memory
- Swap Space
- software
- Software Troubleshooting Checklist
- the print system
- Troubleshooting Your Printing System
- troubleshooting network hardware
- Hardware Problems
- ttcp command
- The ttcp Tool
- Network Management Tools
- tty file
- Configuring the Terminal Software
- tunable parameters and networking
- Kernel Configuration
- tuning the kernel
- Tuning System Performance
- tuning the operating system
- IRIX Kernel Tunable Parameters
- typographical conventions
- Style Conventions
- umask
- umask
- unauthorized entry
- Attempts at Unauthorized Entry
- understanding the audit data
- Understanding the Audit Data
- UNIX-to-UNIX Copy Program
- administrative commands
- UUCP Administrative Programs
- administrative files for
- UUCP Administrative Files
- and direct links
- Networking Hardware
- and modem setup
- Networking Hardware
- and telephone lines
- Networking Hardware
- configuring local stations
- Configuring the Local Station
- configuring remote stations
- Configuring the Remote Station
- daemons
- UUCP Daemons
- error messages for
- UUCP Error Messages
- identifying local stations
- Determining the Remote and Local Stations
- physical connections for
- Making the Physical Connection
- programs
- UUCP Daemons
- setting up
- UUCP Administrative Files
- supporting databases
- Supporting Databases
- testing connections for
- Testing the UUCP Connection
- user commands
- UUCP User Programs
- UNIX-to-UNIX Copy Program (UUCP)
- and network planning
- UNIX-to-UNIX Copy Program (UUCP)
- definition of
- UUCP
- unknown file (UUCP)
- Other UUCP Files
- unsetenv command
- Removing Environment Variables
- unusual system usage
- System Usage at Unusual Hours or From Unusual Locations
- upgrading hardware
- cautions
- Hardware Affects Software
- upgrading software
- cautions
- Leaving Users Stranded
- user accounts
- administering
- User Services
- changing passwords
- Changing a User's Password
- closing
- Closing a User Account
- deleting
- Deleting a User from the System
- forcing a password
- Forcing a Password
- login shells
- Available Login Shells
- user environment
- The User's Environment
- user audit
- How to Audit a Specific User
- user environment
- description
- The User's Environment
- environment variables
- Environment Variables
- login shells
- Available Login Shells
- special shells
- Special Login Shells
- user ID number
- User IDs
- /etc/passwd
- User IDs
- site policy
- Accounts and Passwords
- user requests
- anticipate
- Anticipating User Requests
- user services
- User Services
- user trouble log
- maintaining
- Keep a Log
- users
- disk quotas
- Imposing Disk Quotas
- /usr/bin/mailq command
- /usr/bin/mailq
- /usr/bin/rup command
- Network Management Tools
- /usr/bsd/newaliases program
- /usr/bsd/newaliases
- /usr/etc/ directory, network files in
- Files and Directories
- /usr/etc/arp command
- Network Management Tools
- /usr/etc/configmail script
- /usr/etc/configmail
- /usr/etc/gated.conf file
- Files and Directories
- /usr/etc/ifconfig command
- Network Management Tools
- /usr/etc/inetd.conf file
- Files and Directories
- /usr/etc/ipfilterd.conf file
- Files and Directories
- /usr/etc/mrouted.conf file
- Files and Directories
- /usr/etc/named.d/named.boot file
- BIND's Boot File
- /usr/etc/named.reload script
- The /usr/sbin/named.reload Script
- /usr/etc/named.restart script
- The /usr/sbin/named.restart Script
- /usr/etc/netstat command
- Network Management Tools
- /usr/etc/ping command
- Network Management Tools
- /usr/etc/resolv.conf
- BIND and /etc/resolv.conf and /etc/hosts
- /usr/etc/resolv.conf file
- Files and Directories
- /usr/etc/route command
- Network Management Tools
- /usr/etc/rpcinfo command
- Network Management Tools
- /usr/etc/rtquery command
- Network Management Tools
- /usr/etc/snmpd.auth file
- Files and Directories
- /usr/etc/spray command
- Network Management Tools
- /usr/etc/traceroute command
- Network Management Tools
- /usr/etc/ttcp command
- Network Management Tools
- /usr/lib/aliases database
- The Aliases Database
- /usr/lib/aliases file
- /etc/aliases
- /usr/lib/sendmail program
- sendmail
- /usr/lib/sendmail.cf file
- /etc/sendmail.cf
- /usr/lib/sendmail.cf.auto file
- /etc/sendmail.cf
- /usr/lib/sendmail.fc file
- /etc/sendmail.fc
- /usr/lib/sendmail.hf file
- /etc/sendmail.hf
- /usr/lib/sendmail.st file
- /etc/sendmail.st
- /usr/mail directory
- /var/mail
- /usr/news
- News
- /usr/spool/mqueue directory
- /var/spool/mqueue
- /usr/sysgen/master.d/bsd
- Kernel Configuration
- uucheck command (UUCP)
- UUCP Administrative Programs
- uucico daemon (UUCP)
- UUCP Daemons
- UUCP Daemons
- uucleanup command (UUCP)
- UUCP Administrative Programs
- UUCP and TCP/IP
- Setting up UUCP on a TCP/IP Connection
- uucp command (UUCP)
- UUCP User Programs
- UUCP mail
- UUCP Mail
- UUCP see UNIX-to-UNIX Copy program
- UUCP
- uugetty program (UUCP)
- UUCP Daemons
- uulog command (UUCP)
- UUCP Administrative Programs
- uupick command (UUCP)
- UUCP User Programs
- uustat command (UUCP)
- UUCP User Programs
- uuto command (UUCP)
- UUCP User Programs
- Uutry command (UUCP)
- UUCP Administrative Programs
- uux command (UUCP)
- UUCP User Programs
- uuxqt daemon (UUCP)
- UUCP Daemons
- variables
- bootfile
- Booting a Default File
- environment
- Changing Environment Variables
- keyboard
- Setting the Keyboard Variable
- path
- Booting a Specific Program
- removing
- Removing Environment Variables
- versions command
- versions Command
- violations
- of access control security
- File Permission Violations
- of root privilege security
- Unexpected Use of Root Privilege
- of security by insiders
- Use and Abuse by Insiders
- of security by outsiders
- Use and Abuse by Outsiders
- of security by unauthorized entry
- Attempts at Unauthorized Entry
- of security by unusual system usage
- System Usage at Unusual Hours or From Unusual Locations
- possible
- Potential Security Violations
- through outside connections
- Connections with Machines Outside the Local Network
- visual login
- Checking the System Configuration
- w command
- Shutting Down the System Carefully
- wall command
- Write to All Users
- warning messages
- WARNING Messages
- who command
- Shutting Down the System Carefully
- whodo command
- Shutting Down the System Carefully
- workstation
- serial support
- Serial Ports
- write command
- Write to a User
- write to all users
- Write to All Users
- X server access
- changing
- Transparent Network Access
- checking
- Transparent Network Access
- controlling
- Transparent Network Access
- default
- Transparent Network Access
- xhost command
- Transparent Network Access
- zones, definition of
- Organization of BIND