Table of Contents
Volumes One and Two
Entry Name(Section): name |
| Description | ||||
unset: remove de®nition/setting of ¯ags and arguments ...................................................................... | see csh(1) | |||||
unset: remove de®nition/setting of options and arguments | ................................................................. see ksh(1) | |||||
unset: remove de®nition/setting of options and arguments ...................................................... | see | |||||
unset: remove de®nition/setting of options and arguments | ......................................................... see | |||||
unsetenv: remove variable from environment .................................................................................... | see csh(1) | |||||
until: execute commands until expression is | see ksh(1) | |||||
until: execute commands until expression is nonzero ................................................................ | see | |||||
uptime(1): uptime, w ................................................................................. | show how long system has been up | |||||
users(1): | users ............................................................................. | compact list of users who are on the system | ||||
uucp(1): uucp, uulog, uuname, uutry | ...................................................... | UNIX system to UNIX system copy | ||||
uudecode: decode a ®le encoded by uuencode ......................................................................... | see uuencode(1) | |||||
uuencode(1): uuencode, uudecode .............................. | encode/decode a binary ®le for transmission by mailer | |||||
uulog: access UUCP summary logs .................................................................................................. | see uucp(1) | |||||
uuname: list known UUCP systems ................................................................................................... | see uucp(1) | |||||
uupath(1): uupath, mkuupath ........................................................ | access and manage the pathalias database | |||||
uupick: accept or reject incoming UUCP messages ............................................................................ | see uuto(1) | |||||
uustat(1): | uustat ...................................................................................... | uucp status inquiry and job control | ||||
uuto(1): uuto, uupick ................................................................. | public UNIX system to UNIX system ®le copy | |||||
uutry: test for successful login to remote system .............................................................................. | see uucp(1) | |||||
uux(1): |
| uux | ........................................................................... | UNIX system to UNIX system command execution | ||
ux2dos: convert ASCII ®le format .................................................................................................. | see dos2ux(1) | |||||
vacation(1): | vacation .................................................................................. | return ``I am not here'' indication | ||||
val(1): |
| val ............................................................................................................................ |
| validate SCCS ®le | ||
vax: provide truth value about processor type ............................................................................... | see machid(1) | |||||
vc(1): | vc | ..................................................................................................................................... |
| version control | ||
vedit: |
| beginner's | see vi(1) | |||
vi(1): vedit, vi, view .............................................................................. | extended | |||||
view: | see vi(1) | |||||
vis(1): |
| vis, inv .................................. | make unprintable and | |||
vmstat(1): | vmstat .......................................................................................... | report virtual memory statistics | ||||
vt(1): | vt | ........................................................................................................ |
| log in on another system over lan | ||
wait: wait for background processes .................................................................................................... | see csh(1) | |||||
wait: wait for child process ................................................................................................................. | see ksh(1) | |||||
wait: wait for child process ......................................................................................................... | see | |||||
wait: wait for process and report termination status ............................................................... | see | |||||
wait(1): | wait ......................................................................................................... | await completion of process | ||||
wc(1): |
| wc ............................................................................ |
| count words, lines, and bytes or characters in a ®le | ||
what(1): | what ............................................................................................. | get SCCS identi®cation information | ||||
whence: de®ne interpretation of name as a command .......................................................................... | see ksh(1) | |||||
whence: de®ne interpretation of name as a command .................................................................. | see | |||||
whereis(1): | whereis ............................................................ | locate source, binary, and/or manual for program | ||||
which(1): | which .................................................................... | locate a program ®le including aliases and paths | ||||
while: execute commands while expression is | see csh(1) | |||||
while: execute commands while expression is | see ksh(1) | |||||
while: execute commands while expression is nonzero ............................................................... | see | |||||
who(1): | who | ........................................................................................ | who is currently logged in on the system | |||
whoami(1): | whoami ............................................................................................ | print effective current user id | ||||
whois(1): | whois ...................................................................................... | Internet user name directory service | ||||
write(1): | write .................................................................................. | interactively write (talk) to another user | ||||
xargs(1): | xargs ..................................................................... | construct argument list(s) and execute command | ||||
xd: hexadecimal dump ........................................................................................................................... | see od(1) | |||||
xstr(1): |
| xstr ...................................................... | extract strings from C programs to implement shared strings | |||
yes(1): |
| yes ................................................................................................................ |
| be repetitively af®rmative | ||
ypcat(1): ypcat ..................................................................... | print all Network Information Service map values | |||||
ypmatch(1): ypmatch ................................... | print values of selected keys in Network Information Service map | |||||
yppasswd(1): | yppasswd .................................... | change login password in Network Information System (NIS) | ||||
ypwhich(1): | ypwhich ................................................. | list Network Information System server or map master | ||||
zcat: expand and cat data ......................................................................................................... | see compress(1) |
xvi |