Book Home

Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Index: U

UIDs : (see user IDs)
ul command : 43.18. How nroff Makes Bold and Underline; How to Remove It
ulimit -f command : 24.5. Limiting File Sizes
umask command
14.14. Automatic Setup When You Enter/Exit a Directory
22.2.1. User, Group, and World
22.4. Setting an Exact umask
45.36. Shell Lockfile
setting in shell scripts : 38.4. Subshells
umask value : 52.5.3.3. Running Install
uname command
50.7. How UNIX Systems Remember Their Name
52.4. Quick Descriptions of What's on the Disc
unarchiving : (see archives)
uncluttering logins : 2.15. Unclutter Logins: Show Login Messages Just Once
uncompress command
52.8.1.1. Missing Programs
52.8.2.2. Uncompressing the Sources
undelete program : 52.4. Quick Descriptions of What's on the Disc
underlined text : 43.18. How nroff Makes Bold and Underline; How to Remove It
underscore (_) in filenames : 1.15. Filenames
undoing (vi editor)
30.8. Get Back What You Deleted with Numbered Buffers
30.10. Confirming Substitutions in ex and vi
30.38. Finding Your Place with Undo
unedit command (SCCS) : 20.13. SCCS Basics
unexpand command
41.4.1. TAB Is Just Another Character to UNIX
52.4. Quick Descriptions of What's on the Disc
filtering within vi : 31.5. Keymaps for Pasting into a Window Running vi
unexpand script : 24.6. Save Space with Tab Characters
uniq command
35.20. Quick Reference: uniq
50.3. apropos on Systems Without apropos
UNIX
advantages
1.1. What's Special About UNIX?
1.7. Power Grows on You
1.26. What a Multiuser System Can Do for You
44.1. Everyone Should Learn Some Shell Programming
52.3. Shrink-Wrapped Software for UNIX
binary programs : 52.8.2. Compiling Source Code
definition of priority : 39.9. Know When to Be "nice" to OTher Users...and When
drawbacks of : 1.34. What's Wrong with UNIX
flexible handling of TAB characters : 41.4. How UNIX Handles TAB Characters
identifying versions : 50.8. Which Version Am I Using?
networking and communications utilities : 1.33. UNIX Networking and Communications
platforms : 52.3. Shrink-Wrapped Software for UNIX
time on : 39.1. Which Time Is It?
two main branches of : 41.2.1. How We Made It This Far (Back?)
versions of : About UNIX Versions
unkillable processes, cleaning up : 38.15. Cleaning Up an Unkillable Process
unlimit coredumpsize command : 24.5. Limiting File Sizes
unlink command : 23.15. Using unlink to Remove a File with a Strange Name
unlinking files : 24.3. Unlinking Open Files Isn't a Good Idea
unprintable characters : (see special characters)
codes for writing : 41.11.1. Special Character Codes
unprintable files : 25.5. Page Through Compressed, RCS, Unprintable Files
unset variable errors : 40.4. Choosing the Shell Run (We Hope) by at
unsetenv command : 6.1. What Environment Variables Are Good For
unshar program
19.3. unshar: Unarchive a Shell Archive
52.4. Quick Descriptions of What's on the Disc
52.8.1.1. Missing Programs
52.8.2.4. Unsharring the Sources
unshar software : 52.8.2.4. Unsharring the Sources
untarring software : 52.8.2.3. Untarring the Sources
unterrupt characters : 5.9. Setting Your Erase, Kill, and Interrupt Characters
until loops : 44.10.1. Looping Until a Command Succeeds
in Bourne shells : 44.10.1. Looping Until a Command Succeeds
examples : 44.10.1. Looping Until a Command Succeeds
while loops compared to : 44.10.2. Looping Until a Command Fails
updateb script : 17.19. Finding Files (Much) Faster with a find Database
uppercase
pathname in : 52.5.3.4. Installing a Single Program
without CAPS LOCK : 31.11. Typing in Uppercase Without CAPS LOCK
uptime command : 39.7. Checking System Load: uptime
average reported by : 39.12.1. The CPU
Usenet : 1.33. UNIX Networking and Communications
$USER
examples : 48.4.3. Automating Your Own Calendar
user dictionaries : (see dictionary files)
USER environment variable
6.3. Predefined Environment Variables
6.9. Special C Shell Variables
in C shell : 47.2.5. Variable Syntax
user IDs (UIDs) : 38.3. Managing Processes: Overall Concepts
file access : 1.23. File Access Permissions
user time
39.2. Timing Programs
39.5. Why Is the System So Slow?
user's login shell, killing : 38.10. Destroying Processes with kill
user-defined signal : (see USR1 signal)
user-state CPU time : 39.5. Why Is the System So Slow?
username field in crontab entries : 40.12.1. Execution Scheduling
users
17.16. Searching by Owner and Group
(see also groups)
classes of : 39.12.4. User Communities
effect on system performance : 39.12.4. User Communities
ownership : (see ownership, file)
SUID bit
1.23. File Access Permissions
1.25. Access to Directories
/usr directory
/usr/bin directory
programs in : 1.10. Internal and External Commands
in search paths : 44.3.4. Shell Search Paths
/usr/include, header files in : 52.8.2.7. Functions, Libraries, and Header Files
/usr/lib/crontab file : 40.12.1. Execution Scheduling
/usr/lib/crontab.local file : 40.12.1. Execution Scheduling
/usr/local directory : 52.5.3.5. Installing Everything Using the Defaults
/usr/tmp directory : 21.4. Why Both /tmp and /usr/tmp?
USR1 (user-defined) signal : 38.8. What Are Signals?
utilities, combining : 44.1. Everyone Should Learn Some Shell Programming
UUCP (UNIX-to-UNIX copy)
1.33. UNIX Networking and Communications
52.7.2.3. UUCP
uudecode command : 19.5. Using tar to Create and Unpack Archives
uuencode command : 19.5. Using tar to Create and Unpack Archives
uuencoded files : 11.3. My Favorite Is !$
UUNET : 52.7.2.3. UUCP


Symbols | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Copyright © 1998 O'Reilly & Associates, Inc. All Rights Reserved.

The UNIX CD Bookshelf NavigationThe UNIX CD BookshelfUNIX Power ToolsUNIX in a NutshellLearning the vi Editorsed & awkLearning the Korn ShellLearning the UNIX Operating System