Unix Power ToolsWith the growing popularity of Linux and the advent of Darwin, Unix has metamorphosed into something new and exciting. No longer perceived as a difficult operating system, more and more users are discovering the advantages of Unix for the first time. But whether you are a newcomer or a Unix power user, you'll find yourself thumbing through the goldmine of information in the new edition of Unix Power Tools to add to your store of knowledge. Want to try something new? Check this book first, and you're sure to find a tip or trick that will prevent you from learning things the hard way.The latest edition of this best-selling favorite is loaded with advice about almost every aspect of Unix, covering all the new technologies that users need to know. In addition to vital information on Linux, Darwin, and BSD, Unix Power Tools 3rd Edition now offers more coverage of bash, zsh, and other new shells, along with discussions about modern utilities and applications. Several sections focus on security and Internet access. And there is a new chapter on access to Unix from Windows, addressing the heterogeneous nature of systems today. You'll also find expanded coverage of software installation and packaging, as well as basic information on Perl and Python.Unix Power Tools 3rd Edition is a browser's book...like a magazine that you don't read from start to finish, but leaf through repeatedly until you realize that you've read it all. Bursting with cross-references, interesting sidebars explore syntax or point out other directions for exploration, including relevant technical details that might not be immediately apparent. The book includes articles abstracted from other O'Reilly books, new information that highlights program tricks and gotchas, tips posted to the Net over the years, and other accumulated wisdom.Affectionately referred to by readers as "the" Unix book, UNIX Power Tools provides access to information every Unix user is going to need to know. It will help you think creatively about UNIX, and will help you get to the point where you can analyze your own problems. Your own solutions won't be far behind. |
From inside the book
Results 1-5 of 86
... screen). Programs that can be used in this way are often called filters. One of the most important consequences of these guidelines is that programs can be strung together in “pipelines” in which the output of one program is used as the ...
... screen. Two users can have a discussion with write. talk A more sophisticated program than write, talk splits the screen into two pieces and lets users type at the same time if they wish. talk can be used over networks, though not all ...
... screen on all ttys except network: # Clear screen non-network ttys: if ("`tty`" !~ /dev/ttyp?) then clear endif Chapter 2: Getting Help 37 This is the Title of the Book, eMatter Edition 2.8 –v13.3 2.9 (Of course, you don't need to clear.
... screen if you're using an xterm window that you close when you log out.) —JP. Who's. On? The who command lists the users logged on to the system now. Here's an example of the output on my system: % who naylor ttyZ1 Nov 6 08:25 hal ttyp0 ...
... screen, type enough of the letters to distinguish the subtopic menu item from any other. You don't have to complete the command: you can just type enough of the letters followed by a TAB to fill in the rest. Once the subtopic menu item ...
Contents
Shell Interpretation | 25-23 |
Saving Time on the Command Line | 27-29 |
Custom Commands | 29-1 |
The Use of History | 30-2 |
Moving Around in a Hurry | 30-26 |
Regular Expressions Pattern Matching | 31-16 |
Wildcards | 32-24 |
The sed Stream Editor | 34-1 |
6-26 | |
8-17 | |
9-30 | |
Comparing Files | 10-15 |
Showing Whats in a File | 11-15 |
Searching Through Files | 13-1 |
Removing Files | 13-16 |
Optimizing Disk Space | 13-31 |
Part IV | 13-47 |
Spell Checking Word Counting and Textual Analysis | 13-49 |
vi Tips and Tricks | 17-2 |
Creating Custom Commands in vi | 17-30 |
GNU Emacs | 18-15 |
Batch Editing | 19-12 |
You Cant Quite Call This Editing | 20-22 |
Sorting | 21-31 |
Part V | 22-12 |
Job Control | 22-14 |
Starting Stopping and Killing Processes | 23-15 |
Delayed Execution | 23-52 |
System Performance and Profiling | 25-10 |
Part VI | 25-21 |
Shell Programming for the Uninitiated | 34-31 |
Shell Programming for the Initiated | 36-1 |
Shell Script Debugging and Gotchas | 36-35 |
Part VII | 37-10 |
Backing Up Files | 38-1 |
Creating and Reading Archives | 38-18 |
Software Installation | 39-11 |
Perl | 39-28 |
Python | 39-58 |
Part VIII | 42-12 |
Redirecting Input and Output | 42-14 |
Devices | 44-1 |
Printing | 44-14 |
Connectivity | 45-22 |
Connecting to MS Windows | 46-14 |
Part IX | 47-15 |
Security Basics | 48-1 |
Root Group and User Management | 49-1 |
File Security Ownership and Sharing | 49-13 |
SSH | 50-16 |
Glossary | 50-35 |
Index | 50-42 |