firstname.lastname@example.org Tel: (+44) (0)1772 893297 Fax: (+44) (0)1772 892913 WWW: http://www.futuretech.vuurwerk.nl/
Figure 1. A typical root directory shown by 'ls'. Figure 2. The root directory shown by 'ls -F /'. Figure 3. Important directories visible in the root directory. Figure 4. Key files for the novice administrator. Figure 5. Output from 'man -f file'. Figure 6. Hidden files shown with 'ls -a /'. Figure 7. Manipulating an NFS-mounted file system with 'mount'. Figure 8. The various available shells. Figure 9. The commands used most often by any user. Figure 10. Editor commands. Figure 11. The next most commonly used commands. Figure 12. File system manipulation commands. Figure 13. System Information and Process Management Commands. Figure 14. Software Management Commands. Figure 15. Application Development Commands. Figure 16. Online Information Commands (all available from the 'Toolchest') Figure 17. Remote Access Commands. Figure 18. Using chown to change both user ID and group ID. Figure 19. Handing over file ownership using chown.
Figure 20. IP Address Classes: bit field and width allocations. Figure 21. IP Address Classes: supported network types and sizes. Figure 22. The contents of the /etc/hosts file used on the SGI network. Figure 23. Yoda's /etc/named.boot file. Figure 24. The example named.boot file in /var/named/Examples. Figure 25. A typical find command. Figure 26. Using cat to quickly create a simple shell script. Figure 27. Using echo to create a simple one-line shell script. Figure 28. An echo sequence without quote marks. Figure 29. The command fails due to * being treated as a Figure 30. Using a backslash to avoid confusing the shell. Figure 31. Using find with the -exec option to execute rm. Figure 32. Using find with the -exec option to execute ls. Figure 33. Redirecting the output from find to a file. Figure 34. A simple script with two lines. Figure 35. The simple rebootlab script. Figure 36. The simple remountmapleson script. Figure 37. The daily tasks of an admin. Figure 38. Using df without options. Figure 39. The -k option with df to show data in K. Figure 40. Using df to report usage for the file Figure 41. Using du to report usage for several directories/files. Figure 42. Restricting du to a single directory. Figure 43. Forcing du to ignore symbolic links. Figure 44. Typical output from the ps command. Figure 45. Filtering ps output with grep. Figure 46. top shows a continuously updated output. Figure 47. The IRIX 6.5 version of top, giving extra information. Figure 48. System information from osview. Figure 49. CPU information from osview. Figure 50. Memory information from osview. Figure 51. Network information from osview. Figure 51. Miscellaneous information from osview. Figure 52. Results from ttcp between two hosts on a 10Mbit network. Figure 53. The output from netstat. Figure 54. Example use of the ping command. Figure 55. The output from rup. Figure 56. The output from uptime. Figure 57. The output from w showing current user activity. Figure 58. Obtaining full domain addresses from w with the -W option. Figure 59. The output from rusers, showing who is logged on where.
Figure 60. Standard UNIX security features. Figure 61. Aspects of a system relevant to security. Figure 62. Files relevant to network behaviour. Figure 63. hosts.equiv files used by Ve24 Indys. Figure 64. hosts.equiv file for yoda. Figure 65. hosts.equiv file for milamber. Figure 66. Additional line in /etc/passwd enabling NIS. Figure 67. Typical output from fuser. Figure 68. Blocking the use of finger in the /etc/inetd.conf file. Figure 69. Instructing inetd to restart itself (using killall).
(Have you found this page via a web search? Examine the index pages to see all the available items!) [Future Technology Research Index] [SGI Tech/Advice Index] [Nintendo64 Tech Info Index]