Table of Contents

Volumes One and Two

Entry Name(Section): name

 

Description

unset: remove de®nition/setting of ¯ags and arguments ......................................................................

see csh(1)

unset: remove de®nition/setting of options and arguments

................................................................. see ksh(1)

unset: remove de®nition/setting of options and arguments ......................................................

see sh-bourne(1)

unset: remove de®nition/setting of options and arguments

......................................................... see sh-posix(1)

unsetenv: remove variable from environment ....................................................................................

see csh(1)

until: execute commands until expression is non-zero .......................................................................

see ksh(1)

until: execute commands until expression is nonzero ................................................................

see sh-posix(1)

uptime(1): uptime, w .................................................................................

show how long system has been up

users(1):

users .............................................................................

compact list of users who are on the system

uucp(1): uucp, uulog, uuname, uutry

......................................................

UNIX system to UNIX system copy

uudecode: decode a ®le encoded by uuencode .........................................................................

see uuencode(1)

uuencode(1): uuencode, uudecode ..............................

encode/decode a binary ®le for transmission by mailer

uulog: access UUCP summary logs ..................................................................................................

see uucp(1)

uuname: list known UUCP systems ...................................................................................................

see uucp(1)

uupath(1): uupath, mkuupath ........................................................

access and manage the pathalias database

uupick: accept or reject incoming UUCP messages ............................................................................

see uuto(1)

uustat(1):

uustat ......................................................................................

uucp status inquiry and job control

uuto(1): uuto, uupick .................................................................

public UNIX system to UNIX system ®le copy

uutry: test for successful login to remote system ..............................................................................

see uucp(1)

uux(1):

 

uux

...........................................................................

UNIX system to UNIX system command execution

ux2dos: convert ASCII ®le format ..................................................................................................

see dos2ux(1)

vacation(1):

vacation ..................................................................................

return ``I am not here'' indication

val(1):

 

val ............................................................................................................................

 

validate SCCS ®le

vax: provide truth value about processor type ...............................................................................

see machid(1)

vc(1):

vc

.....................................................................................................................................

 

version control

vedit:

 

beginner's screen-oriented text editor .......................................................................................

see vi(1)

vi(1): vedit, vi, view ..............................................................................

extended screen-oriented text editor

view:

read-only screen-oriented text editor ..........................................................................................

see vi(1)

vis(1):

 

vis, inv ..................................

make unprintable and non-ASCII characters in a ®le visible or invisible

vmstat(1):

vmstat ..........................................................................................

report virtual memory statistics

vt(1):

vt

........................................................................................................

 

log in on another system over lan

wait: wait for background processes ....................................................................................................

see csh(1)

wait: wait for child process .................................................................................................................

see ksh(1)

wait: wait for child process .........................................................................................................

see sh-posix(1)

wait: wait for process and report termination status ...............................................................

see sh-bourne(1)

wait(1):

wait .........................................................................................................

await completion of process

wc(1):

 

wc ............................................................................

 

count words, lines, and bytes or characters in a ®le

what(1):

what .............................................................................................

get SCCS identi®cation information

whence: de®ne interpretation of name as a command ..........................................................................

see ksh(1)

whence: de®ne interpretation of name as a command ..................................................................

see sh-posix(1)

whereis(1):

whereis ............................................................

locate source, binary, and/or manual for program

which(1):

which ....................................................................

locate a program ®le including aliases and paths

while: execute commands while expression is non-zero .......................................................................

see csh(1)

while: execute commands while expression is non-zero ......................................................................

see ksh(1)

while: execute commands while expression is nonzero ...............................................................

see sh-posix(1)

who(1):

who

........................................................................................

who is currently logged in on the system

whoami(1):

whoami ............................................................................................

print effective current user id

whois(1):

whois ......................................................................................

Internet user name directory service

write(1):

write ..................................................................................

interactively write (talk) to another user

xargs(1):

xargs .....................................................................

construct argument list(s) and execute command

xd: hexadecimal dump ...........................................................................................................................

see od(1)

xstr(1):

 

xstr ......................................................

extract strings from C programs to implement shared strings

yes(1):

 

yes ................................................................................................................

 

be repetitively af®rmative

ypcat(1): ypcat .....................................................................

print all Network Information Service map values

ypmatch(1): ypmatch ...................................

print values of selected keys in Network Information Service map

yppasswd(1):

yppasswd ....................................

change login password in Network Information System (NIS)

ypwhich(1):

ypwhich .................................................

list Network Information System server or map master

zcat: expand and cat data .........................................................................................................

see compress(1)

xvi Hewlett-Packard Company

HP-UX Release 11i: December 2000