• Aucun résultat trouvé

Ta ble of Contents

N/A
N/A
Protected

Academic year: 2022

Partager "Ta ble of Contents"

Copied!
2
0
0

Texte intégral

(1)

Ta ble of Contents

Preface

...

vii

1. Getting Star ted

...

1

Working in the Unix Environment ...1

Syntax of Unix Command Lines ...11

Types of Commands ...14

The Unresponsive Ter minal ...14

2. Using Window Systems

...

17

Intr oduction to Windowing ...18

Starting X ...19

Running Programs ...21

Working with a Mouse ...26

Working with Windows ...29

Other Window Manager Features ...35

Unr esponsive Windows ...37

Other X Window Programs ...39

Quitting ...40

3. Using Your Unix Account

...

42

The Unix Filesystem ...42

Looking Inside Files with less ...54

Pr otecting and Sharing Files ...56

Graphical Filesystem Browsers ...61

v

7 January 2002 13:15

(2)

vi Table of Contents

Completing File and Directory Names ...62

Changing Your Password ...62

Customizing Your Account ...63

4. File Management

...

66

File and Directory Names ...66

File and Directory Wildcards ...67

Cr eating and Editing Files ...69

Managing Your Files ...74

Printing Files ...81

5. Redirecting I/O

...

87

Standard Input and Standard Output ...87

Pipes and Filters ...92

6. Using the Internet and Other Networks

...

97

Remote Logins ...97

Windows from Other Computers ...100

Lynx, a Text-based Web Browser ...101

Transferring Files ...104

Electr onic Mail ...108

Usenet News ...118

Interactive Chat ...123

7. Multitasking

...

130

Running a Command in the Background ...131

Checking on a Process ...132

Cancelling a Process ...134

8. Where to Go from Here

...

136

Documentation ...136

Shell Aliases and Functions ...139

Pr ogramming ...139

Using Unix on Non-Unix Systems ...140

Glossar y

...

143

Index

...

149

7 January 2002 13:15

Références

Documents relatifs

Echo provides Berkeley-style advisory locks, and also uses a form of internal lock to implement the Unix feature that keeps a file from being deleted as long as at least one process

Methods of Creating Files File and Directory Names File and Directory Wildcards Managing Your Files..

construct argument list(s) and constructs. deroff: remove contents of directories. contents of directory context split. controlling terminal conventional names for

SpaceHeader: TYPE = RECORD [ link: POINTER TO SpaceHeader, segment: DataSegmentHandle];. InitSpace:

AddressFromPage, DataSegmentHandle, DataSegmentObject, FileSegmentHandle. FileSegmentObject, Object, ObjectHandle, ObjectType, PageCount. PageNumber,

Then insert the newly created CP/M operations diskette in disk drive A, and insert the NEVADA SOFTWARE distribution diskette in drive Band type (ctl-c) to

NortTlally the 1 K byte RAM buffer is set up to contain the rleader of the sector to be read and the disk state machine state compares this to the data stream corn ing off

(iii) The co-ordination of various national transport policies-and plans, especially between neighbouring countries, in order to minimize the cost of providing an