Академический Документы
Профессиональный Документы
Культура Документы
n a shell script or tells witch shell to use as an interpreter for the script.
lt routers. Values must be separated with whitespace, # can be used for comments.
the system and should match the hostname defined in the /etc/hosts file. The file is named with the interface name, such as hostname.hme0 or hostname.le0
base, used by the inetd daemon, which contains a list of available network services.
s shown to the user who tries to log on during a system shutdown process. After the message appears the log on procedure ends.
card catalog database through a shell-level interface. Will enable administrators to delete, add, list, verify and modify AnswerBook entries.
dds the records for processes that execute commands that have the same name , and then shows a summary.
/adm/pacct, and searches the files for account information. Shows the information as described by acct to STDOUT.
reated by acctcon1 and converts them into total accounting (tacct) records.
ding transferred disk blocks by userID or login name by reading the accounting file (usually /var/adm/pacct) and then creates total accounting records.
g to the specified file. If no file name is given, will turns process accounting off.
ed with acct and adds the login names that corresponds with the user IDs.
N in the format created by acctprc1, and sorts them by ID and name, and shows the result to STDOUT.
h the current time and a string of characters that describe the reason, into specified file.
tes a library database of information. After executing addbib it will give step-by-step instructions and prompt for necessary information.
in the computer and assigns device names.
s accounts in an X window environment. Also manages printers and allows installed software to be viewed.
1 of 33
ps.
is used and is free.
ice allocation and ensures that each given device is used by only one user at a time.
ministration GUI interface in your default web browser and shows the URL http://localhost:8888 the management port for the AnswerBook server.
ecture of the current host. All SunOs 5.x SPARC based systems report as sun4.
security administration named Automated Security Enhancement Tool (ASET). Enables the administrator to analyze system files for permissions and attributes.
PPP services to connect to remote hosts. Automatically starts the connection when a PPP request is made.
o allow incoming calls. This command is the actual login service that connects the incoming client to aspppd daemon on the host server.
or batch queues.
es auditing and uses the audit control file to set working environment.
matically upon user requests. It associates automount maps to an installed mount point.
2 of 33
shell. It's compatible with the Bourne shell, with additional functions from Korn and C-shell.
uture time when the system load level permits. The commands is read from STDIN.
uses a C-like arithmetic language. Acts as a pre-processor for the command dc.
s and SunDials stream, autopush facility, and the serial device to use with the stream.
ections and can be used like ed. Default it will show the size of the file.
the background.
uilt-in command.
ds in tcsh.
pressed files.
ame as exit.
stics like hits and misses about a cache file system that is mounted on a particular path.
and the total cache size statistics for the specified cache log file.
ator that you can use with the mouse or the keyboard.
nd shows any notes that you have entered for today and tomorrow.
ers or printerpools. It stops print requests related to the user name on any host or specifies a print request to stop.
3 of 33
cessively against the word and run the commands when the first match is found.
manual pages and the windex database that contains short command descriptions.
he BSD Compatibility Package C compiler. It only works if the SPROcc development package is installed.
ion utility for use with the Cache File System (CacheFS).
prompts the user to select a menu option that will then be verified. Use this to define prompt, help, and error messages, and to define a default value.
OCESS record into the file /var/adm/wtmp for each user logged in. It is then used by the command runacct to track each users connection time.
4 of 33
s for X11 clients that need to run programs that can not use the default color map.
g by assigning color values towards the high end of 255 in the default color map.
type and shows the line number and byte where the files differ.
from the cm Calendar Manager.
ates and combines older versions of SCCS files, s.files. All changes are saved in deltas, together with a version identification line (SID).
ows you the unique and common lines from both files.
d will disable lookup functions in the current shell. Can also give information on how the command will be interpreted by the shell.
should be completed.
ile and replaces the old file with a new file with the extension .Z. The new file will inherit the same permissions and modification times from the original file
nd notifies users that have asked to be told when new mail comes (biff y).
to the terminal or screen specifed. Can show messages on many screens at one time.
commands in the loop and continue to the next iteration. Can be used in the commands for, while, until, select and foreach.
he system.
s to a new destination.
a cpio archive. It operates in three different modes.
sor that insert include files in the source code of the source file creating a single file.
me linking configuration files. If used with no or the -c option, it displays the configuration file. Otherwise, a new file is created.
ed to execute commands at scheduled dates and times specified in the crontab file.
edits the crontab file which contains a list of jobs including the time and date they will execute. If option isn't given read from STDIN.
Uses STDIN and STDOUT.
5 of 33
ing source code files f that can act as markers making it easier to find section headings quickly and edit them using ex or vi.
mat version from text files. Use it when you want to print text files.
e for a user.
o an original SCCS file and creates a new deltaID for that version. The SCCS utilities is a programming feature that helps to keep track of changes and versions.
uests, table descriptions, and backslash constructs from the specified nroff, troff, tbl, eqn, or text files and shows the result to STDOUT.
for a device.
sive use that was assigned exclusive use by the devreserv command.
rious devices by creating symbolic links between the /dev directory tree and the device nodes in the /devices tree.
he device is mounted.
mounted devices.
onfiguration utility.
uration table.
every line.
6 of 33
and shows a file list of the differences between them (unique files).
eates a list of assembly statements. The binary data is shown in octal or hexadecimal.
able groups that are defined on the system, one group per line.
es on STDOUT.
OS format into the ISO standard format. With this you can import your old DOS textfiles.
files, and shows results on the STDOUT.
en created by troff into PostScript files and shows the result on STDOUT.
ectory.
host to login to. Is used by dtlogin and is not intended to run manually.
source code files from Builder Interface Language (BIL) files.
erating system.
le-type database files into CDE 1.0 format. For the files to be recognized by CDE, the files must be named with .dt extension.
m applications or actions that cannot be shown in the context of the executable program.
ers with their content to the target folder. It deletes a file in the target folder if that file does not exist in the source folder.
7 of 33
rsion of the Korn shell. It gives access to many X, Xt, Xm, and CDE functions.
d, and manage mail. It supports MIME, and Sun Mail Tool message formats, as well as IMAP4, to access remote mailboxes.
environment.
tility.
where the desktop is to look for application manager groups, filetypes and action definitions.
. VALUE is always a minus (-) or a plus (+) symbol. Default is always the plus symbol except when using the -aw, -J, or -sb option.
or casual users. It works like ex with novice, report, and showmode set to on.
ufs file system.
om their drives. Only works for VM-managed devices and devices without eject buttons.
nternal commands.
8 of 33
environment.
s to share/unshare commands. Without options it shows a list of all currently shared NFS file systems.
tely.
mands that have recently been used. With no options, edits and runs the last command.
partition table on your internal hard drive. You must specify rdevice, which is the raw device to a fixed disk.
on printers connected to Solaris hosts. It also allows users to manage printer maintenance.
a stopped job in the foreground. Without an argument the current job is used.
ement application. Alters file permissions and creates folders in your file system.
n different computers.
ngs.
directories and subdirectories using the Boolean expression from the input line.
ogged in users.
d prevents route information from being visible by starting /usr/etc/in.routed.asetoriginal with the -q flag.
ection and hierarchy information for users. These hierarchy files are created by the program filemgr and stores information about directories visited by users.
anguage translator. It opens the frames that is specified by the file name argument.
ke the text from the file and produce output lines that are joined in the correct way.
of Contents (VTOC) on hard disks.
9 of 33
n FNS name, or binds a reference specified on the command line to an FNS name.
o use for the FNS (Federated Naming Service) initial context creation.
word in the list, assign the value to variable and run the commands.
word in the list, assign the value to variable and run the commands.
and analyzes disks on the system. Without options, the interactive tool starts.
a crash.
eration numbers to increase security for NFS file systems. It also creates a file system ID in the superblock.
hell functions.
that are specified.
10 of 33
or the process you specify. The default image file name will be core.processID.
ge file and merges the information into the formatted message database called a catfile.
List (ACL), the owner, and the group for the specified file.
mand stack and doesn't treat a at the end of a row in any special way.
n from a specified manual source, which can then be used for creating a table of contents or an introduction section to a manual.
ons given to a shell script. It split option given together and place each option in its own variable. Any additional arguments is placed after --
ment options and process them from the command line. The values specified by name and the index of the next arguments are placed into the shell variable OPTIND.
table via the TCP port connection of a specified host server.
e from a message object created by msgfmt that matches to the specified id.
pecific message file database found in the directory /usr/lib/locale/locale/LC_MESSAGES, where the locale name corresponds to the string language.
ecified is available and that the proper media is inserted and ready for use.
cript.
patch file to the original file. The patch file is made by the diff command.
graph) profile of a program. It can also create files containing portions of this information.
roup file.
are used on servers to find the UID of clients connected by RPCSEC_GSS.
that are created by gzip, zip compress, compress -H and pack.
11 of 33
ompressed files.
ile compressed with gzip if they lost the extension during a file copy, for example.
mpel-Ziv coding. If it is possible, the file is replaced by one with the .gz extension.
pressed with compress (*.Z) even more and gives it a .gz extension.
om C header files.
tion in the internal hash table that stores information about executed commands.
nternal commands. With no option, shows a short description about internal commands.
entication files.
entication.
b server.
ion information to connect with ICE. Reads authorization data from one host and adds the information to another.
shell script. If the first expr is true run the first commands. If not check the next expr and so on. If no expr was true run commands after then.
emplate, a set of cpp macro functions, and a per-directory file that is called Imakefile.
ost Configuration Protocol (DHCP). It is used to forward or respond to DHCP or BOOTP protocol requests.
12 of 33
n that manage FTP services. It is only started by the inetd daemon when requested.
for hosts and routers of Neighbor Discovery and Address Auto configuration for IPv6.
remote execution requests and uses use rname and password authentication. inetd will automatically start the daemon when needed.
command. The server looks at client's source port. If port is not in the range 0-1023, the server will abort the connection.
work routing tables for hosts on the network. Also updates hosts acting as internetwork routers with complete copies of routing tables.
e shell) and allows clients to execute commands from remote clients. The server accepts connections from the client on any port lower the 1024.
abase file in inverted form. It can be read by the commands lookbib and refer. Is an executable in Linux, BSD and a script in AIX, Solaris.
the file /etc/inetd.conf. It starts all Internet standard services such as FTP, telnet, SMTP, and HTTP, and is normally started during bootup.
nteger variables.
by removing identifiers from message queues, semaphores, and shared memory segments that programs or services have left behind.
nter-process communications currently active in the system, such as shared memory segments, semaphores and message queues.
es.
ciation data base (SADB) for the network security services ipsecah and ipsecesp manually. Without options it is started interactively.
nto a single JAR file. Can also compress files in ZIP and ZLIB formats.
va bytecode.
13 of 33
e by C-language compilers.
es.
ns them together where the fields are identical and show the result to STDOUT.
java.
command interpreter. It has similar functions as Bourne shell (sh), with job control.
nslation mode.
rs secret key, which is used in requests to any secure RPC service such as NIS+.
that is stored by the keyserv process.
ores the private encryption keys for the currently logged in users.
a signal to a processes.
Only a superuser can run this command.
hentication system.
granting tickets.
sed to link executables or shared libraries. Ld operates in two modes, static or dynamic.
14 of 33
ntries to the LDAP server; rejects duplicates for the same entry.
oaded into an LDAP server. This file can later be downloaded by an LDAP client.
heir dynamic dependencies or shared objects. Also lists the pathnames of all shared objects that are needed when file is executed.
ess.
used in lexical processing of character input. That can be used as an interface to yacc.
ows the login ID and account field value from specified database.
mation.
n format.
n NFS files.
status of the file system locks. It unlocks file systems that were improperly locked by an application.
15 of 33
tem.
Apache's access log files. This is to reduce the impact for the name server.
m dictionary and show all lines that begins with the specified string.
ographic database and recover records containing the keywords entered at the prompt.
patible for a printer. Specific filters will assist to convert the file into the proper format.
the LP print service.
tion report.
nt queue.
rinter. Will use STDIN if no file is specified.
om the print queue and report the file's name of removed request.
nt service.
tern to STDOUT and shows all 96 printable ASCII characters; useful for testing printers.
ics Accelerator and can also alter some of the X11 window defaults for the M64.
nt for sendmail.
format compatible with SunOS 4.x clients.
om the specified mail file and adds a line to inform how many that was removed.
16 of 33
ows first line for each mail massage, host for the massage, size the date and time.
using ASCII characters for programs that run encryption. It generates a 13-character key from a 10-character input.
ps in sendmail and creates the specified type of database map by reading from STDIN and writes to the specified new map name.
ipt language database file called PSres.upr, which contains the resources in the specified pathnames. Reads from STDIN as default.
se.
the specified command.
ied remote SMTP mail server socket, or to the local host if no remote host is specified.
ugger used to operate crash dumps, processes, core dumps, and so forth.
any X font files found in a directory. It typically looks for .pcf, .snf and .bdf fonts and then creates the file fonts.dir in the same specified directory.
e specified disk partition rawdevicefile by calling upon the default FS or the specific one that is given by the -F FSType option.
s that is accessible with the text retrieval tools gettxt, srchtxt and exstr.The input is a file of text strings for a specified geographic locale.
called netid.byname using the contents of the hosts, passwd, group and netid files.
ining error messages that are extruded from a list of other files.
ary files and places them into /var/adm/acct/fiscal. Also restarts summary files in /var/adm/acct/sum.
17 of 33
rocessor in tabular form. Each row is for one processor activity only.
es from portable object files. It doesn't change the portable object files.
e identifier.
e device.
d directories.
file system.
that answers DNS request and resolves host names and finds their assigned IP address.
iguration files used by BIND 4.9 or older to newer versions used by BIND 8.1.1 or later.
ers. It is used by in.named but can be used directly for debugging purposes.
-line documentation.
Iit is usually used to search for patterns specified by ' scriptstr '.
s from the Solaris Network Cache and Accelerator to Common Log File format.
ommand nroff. It helps when writing equations and is primarily used with terminals.
le.
le line by line.
n public keys that are needed for secure RPC or NFS services.
h information from the RPC operations that were processed by the NFS server.
stics.
n in a different priority.
that are used for authentication.
by using files from the /etc directory and from NIS maps.
cation in NIS+.
18 of 33
cts.
of a NIS+ object.
NIS+ object.
a NIS+ object.
or NIS+ objects.
ents.
tent.
ory within an existing domain. Creates replicated directories and also subdirectories that have the same master.
n NIS+ servers.
S+ server.
statistics.
command. The five primary operations are to: create, delete, add, modify, and remove entries from tables.
19 of 33
ner processes which are configured individually. Every network relates to at least one listener.
nous when the status of a job is changed. If job is not given, the current job is used.
ormats the output for use with a letter quality printer or line printer.
ervices. It is a daemon process that caches passwd, hosts, and groups databases.
rs interactively or non-interactively.
e via the NTP. Gets time from any specified NTP servers.
supports the NTP mode 6 control message format by the command line or interactively.
r from a specified file and exports the content to STDOUT in octal format.
with an interrupt. If option isn't given normal interrupt handle are restored.
rmat. Each file is compressed and replaced. The compressed file will has the same access rights and dates.
at a time.
emory.
h patch files.
20 of 33
rl.
s to specified hosts. The remote host will, if it can, respond with a ICMP echo reply.
ich can then be used as input to questions at installation time. Can be used to prevent any interactions during installation.
ges from file system format to datastream and reverse, or from one file system to another.
5 modules.
mits of a running process identified by process ID list. Only the owner of a process or a superuser is permitted to modify the limits.
s.
a POD source which can then be shown on STDOUT using nroff or to a printer using troff.
21 of 33
ion, each input file/files are read, formatted and written to STDOUT.
he STDOUT.
in the environment.
meters for processes. There are four main ways to use it; specified by the first option.
or the user specified with process attributes used when started using a privileged command interpreter such as: pfcsh, pfksh, and pfexec.
ce that determines client requests, keeping track of available and starting new proxies.
ll, or parts of an SCCS delta table history.
n information.
on time, command name, terminal and other information about the active processes.
on. Shows online/off-line status, powered on/off status and when the status was last modified.
union and structure declarations). It takes .c, .h, or .s files and shows the C program structure.
segments of PostScript language code from the specified file to the PostScript Interpreter.
directory and places the current working directory into a direcory stack.
or buffer stack.
22 of 33
e for field number validation, user and group IDs, login names, and the like.
/etc/shadow from the standard /etc/passwd file.
ks (1024 bytes) in the file system that each user currently owns and summarizes the information.
e systems.
e systems.
omputer to others. Will keep the owner, group, mode and modification times.
em.
e ed utility but is a restricted version. Only allows editing of files in current directory and does not allow the use of shell commands by using the !.
ash table.
ftware database. The output is a list of erasable pathnames that may be safely erased.
the device driver is invalid. It will unload the device driver from memory if possible, and it will also update the system driver configuration files.
ault values.
xterm window and will set the TERMCAP settings to active window.
ning color names. Finds decimals for the colors followed by the color name in STDIN.
23 of 33
emote computer.
rmat as mail to users, reads from STDIN or a terminal. Recipient must be a user.
ore more SCCS files.
skeleton and stub class files for use with remote objects from compiled Java classes.
The Volume Manager uses it to mount the device when a new media is inserted.
ts.
+ service.
DNS forwarder. It is often used from rpc.nisd, but can also be used from the console.
he spray command.
d
comes from yppasswd to set new correct passwords.
Network Information Service (NIS).
n rpc protocol.
24 of 33
DIN and sends it as a broadcast message to the users logged on to the specified host server.
d on the command line and produces a comparable perl script on the STDOUT.
the binary file /var/adm/sa/saDD, where DD is the current day. Sar often uses this collected information.
m activity into the file /var/adm/sa/saDD where DD is the current day. This is similar to sar and it uses the same options.
e executed at a later time from the shell. Note that it is the shell that runs the commands.
shown on the screen during a terminal session and saves the information into a file.
which is a java based application that synchronize handheld Palm devices with CDE.
onnect to a computer.
n STDERR and $PS3 as a prompt wait for user input. Repeats until terminated.
ue. With no argument it shows all variables. In Bourne, Bash, Korn and Z-shell (sh, bash, ksh, zsh) set is used to set shell flags.
25 of 33
or a period of time.
s a smart card.
stration procedure.
26 of 33
ed file or files and look them up in a spelling list. If the word doesn't exist, it will report it. It uses deroff to follow chains of included files.
aller files. The output files will get a double letter extension (.aa, .ab, .ac ... ).
to a host. Reports how many were received and the transfer rate.
essages on STDOUT. Operands can be specified multiple times, but only in triplets.
d the information about debugging and line numbers from an object file.
minal.
le, which is used for controlling the tty port hunt sequences and for line settings.
cessively against the word and runs the commands when the first match is found.
27 of 33
se them in nroff or troff. For BSD and Linux it is only used for troff.
c tape.
the UNIX C shell csh. Primarily a command language interpreter that can be used as a login shell and a shell script command processor.
as well as to files.
he data is saved in the directory /usr/share/lib/terminfo for AIX and Solaris and in the directory /usr/share/terminfo for BSD and Linux.
t takes to run a command. It shows elapsed, user, and system time in seconds.
with full-duplex terminal connection creating an interactive session on a local terminal.
ew time and date stamp. If the file does not exist it will be created.
he shell receive signal. If command is a null string ("") it will reset the signals to there original behavior. Used alone it shows all traps.
s your terminal.
used as STDIN.
28 of 33
cific data.
tty. With no option, it shows the current status.
ng.
ommands type.
for variables. A new variable instance is created when used inside functions.
ted with ufsdump from backup media. Restore is placed in current directory.
anguage to describe the initial state of a user interface for a Motif application.
mits used by the shell and its child processes. Shows the current limit if not given.
file systems. AIX also have a unmount command with the same syntax.
l aliases specified on the command line from the current shell execution environment.
he current system.
CCS history file that was made by the command get -e.
table. In zsh it will remove names from the internal hash table.
s containing an ifdef mark from a C program source, leaving the rest of the file untouched.
to convert a unit quantity to another type, for example, from inches to centimeters.
characters in a file to match with the DOS format.
iables.
29 of 33
d show the compressed files from a zip archive. It also shows or tests compressed files.
m has been up, number of users and the load average for the last 1, 5 and 15 minutes.
om the system.
e an entry in the file /var/adm/wtmp for every user logged on to the system.
tion to an administrator.
mand on a remote UNIX based system and still enable the user to work locally.
d with ckyorn.
30 of 33
o STDOUT with arguments and control statements. Used for version control.
s, it sets the report flags to 1 and turns showmode and novice flags on.
/passwd.
s with its controlling FMLI application. To synchronize, it signals to the FMLI process.
ogged in users.
ocess to complete. C and TC-Shell will wait for all background processes.
ll be interpreted.
and.
m.
nd but only shows the current user. It takes two arguments that can be anything.
on the system.
reen. The messages is read from the console. Can be used to reply in AIX.
type, host ID, IP address, domain, memory, OS version, and more about the system.
tabase files, correct the time and date stamps to make the entries consistent.
31 of 33
with X.
w servers.
ides an application layer firewall for X traffic. Makes it possible to hide destination X-server addresses and secure incoming X-connections.
files, that contains copies of C string that are found in ANSI C source code.
erver specified.
en.
Makefile.
maps in X.
information.
aris
X server. This program normally runs from an X startup file.
X screen.
om component parts in large programs that can be used as shared constant strings.
X-Window. Provides terminal emulation for programs that can't use X-Window.
a dump file.
on on the X server.
32 of 33
lient system.
NIS database.
sion number and master NIS server for the specified map.
d time for the time zones that you specify on the command line.
mpressed file.
zip archive, permissions, compression type, encryption, OS, version type, and more.
y zip files.
and shell script command processor.
33 of 33