⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 ch02_01.htm

📁 unix基础教程
💻 HTM
📖 第 1 页 / 共 5 页
字号:
<tr><td><tt class="literal">dterror.ds</tt></td><td><p><tt class="literal">dtksh</tt> script for error notices and dialogues.</p></td></tr><tr><td><tt class="literal">dtfile_error</tt></td><td><p><tt class="literal">dtksh</tt> script for error dialogues.</p></td></tr><tr><td><tt class="literal">dticon</tt></td><td><p>Icon editor.</p></td></tr><tr><td><tt class="literal">dtksh</tt></td><td><p>The &#8220;Desktop Korn shell,&#8221; a version of <tt class="literal">ksh93</tt>.</p></td></tr><tr><td><tt class="literal">dtmail</tt></td><td><p>Mail reader.</p></td></tr><tr><td><tt class="literal">dtpad</tt></td><td><p>Simple text editor.</p></td></tr><tr><td><tt class="literal">dtprintinfo</tt></td><td><p>Print job manager.</p></td></tr><tr><td><tt class="literal">dtscreen</tt></td><td><p>Screen savers.</p></td></tr><tr><td><tt class="literal">dtterm</tt></td><td><p>Terminal emulator.</p></td></tr><tr><td><tt class="literal">fdl</tt></td><td><p>Font downloader utility for PostScript printers.</p></td></tr><tr><td><tt class="literal">hotjava</tt></td><td><p>Java-based web browser.</p></td></tr><tr><td><tt class="literal">sdtconvtool</tt></td><td><p>GUI for <tt class="literal">iconv</tt>.</p></td></tr><tr><td><tt class="literal">sdtfind</tt></td><td><p>File finder.</p></td></tr><tr><td><tt class="literal">sdtimage</tt></td><td><p>Image viewer (PostScript, GIF, JPEG, etc.).</p></td></tr><tr><td><tt class="literal">sdtperfmeter</tt></td><td><p>System performance meter.</p></td></tr><tr><td><tt class="literal">sdtprocess</tt></td><td><p>Process manager.</p></td></tr></table><p></td></tr><tr><td valign="top"><a name="cflow">cflow</a></a></td><td><p><tt class="literal">cflow</tt> [<em class="replaceable"><tt>options</em>] <em class="replaceable">files</tt></em></p><p><a name="IXT-2-121872" /><a name="IXT-2-121873" /><a name="IXT-2-121874" />Produce an outline (or flowchart)of external function calls for theC, <tt class="literal">lex</tt>, <tt class="literal">yacc</tt>, assembler, or object <em class="emphasis">files</em>.<tt class="literal">cflow</tt> also accepts the <tt class="literal">cc</tt> options<tt class="literal">-D</tt>, <tt class="literal">-I</tt>, and <tt class="literal">-U</tt>.</p><h4 class="refsect2">Options</h4><dl><dt><tt class="literal">-d</tt><tt><em class="replaceable">n</em></tt></dt><dd>Stop outlining when nesting level <em class="emphasis">n</em></tt> is reached.</p></dd><dt><tt class="literal">-i_</tt></dt><dd>Include functions whose names begin with <tt class="literal">_</tt>.</p></dd><dt><tt class="literal">-ix</tt></dt><dd>Include external and static data symbols.</p></dd><dt><tt class="literal">-r</tt></dt><dd>Invert the listing; show the callers of each functionand sort in lexicographical order by callee.</p></dd></dl></td></tr><tr><td valign="top"><a name="checkeq">checkeq</a></a></td><td><tt class="literal">checkeq</tt> [<em class="replaceable"><tt>files</tt></em>]<p><a name="IXT-2-121875" /><a name="IXT-2-121876" /><a name="IXT-2-121877" /><a name="IXT-2-121878" />Solaris only.Check <tt class="literal">nroff</tt>/<tt class="literal">troff</tt> input files formissing or unbalanced <tt class="literal">eqn</tt> delimiters.<tt class="literal">checkeq</tt> checks both <tt class="literal">.EQ</tt>/<tt class="literal">.EN</tt>pairs and inline delimiters as indicated by the <tt class="literal">delim</tt>statement.</p></td></tr><tr><td valign="top"><a name="checknr">checknr</a></a></td><td><tt class="literal">checknr</tt> [<em class="replaceable"><tt>options</em>] [<em class="replaceable">files</tt></em>]<p><a name="IXT-2-121879" /><a name="IXT-2-121880" /><a name="IXT-2-121881" />Solaris only.Check <tt class="literal">nroff</tt>/<tt class="literal">troff</tt> sourcefiles for mismatched delimiters and unknown commands.It also checks for macros that come in open/close pairs,such as <tt class="literal">.TS</tt> and <tt class="literal">.TE</tt>.With no <em class="emphasis">files</em>, checks the standard input.</p><p><tt class="literal">checknr</tt> works best when input is designed for itsconventions: <tt class="literal">\fP</tt> always ends a font change,and <tt class="literal">\s0</tt> always restores a point-size change.<tt class="literal">checknr</tt> knows about the <em class="emphasis">me</em>and <em class="emphasis">ms</em> macros.</p><h4 class="refsect2">Options</h4><dl><dt><tt class="literal">-a</tt><tt><em class="replaceable">macros</em></tt></dt><dd>Add new pairs of macros that come in open/close pairs.  The sixcharacters representing the new macros must immediately follow the<tt class="literal">-a</tt>, e.g., <tt class="literal">-a.PS.PE</tt> for the<tt class="literal">pic</tt>  macros.</p></dd><dt><tt class="literal">-c</tt><tt><em class="replaceable">commands</em></tt></dt><dd>Don't complain that the given <em class="emphasis">commands</em></tt>are undefined.String the command names together, as in <tt class="literal">-a</tt>. Useful if you have your own macro package.</p></dd><dt><tt class="literal">-f</tt></dt><dd>Ignore inline font changes (<tt class="literal">\f</tt>).</p></dd><dt><tt class="literal">-s</tt></dt><dd>Ignore inline point-size changes (<tt class="literal">\s</tt>).</p></dd></dl></td></tr><tr><td valign="top"><a name="chgrp">chgrp</a></a></td><td><tt class="literal">chgrp</tt> [<em class="replaceable"><tt>options</em>] <em class="replaceable">newgroup</em> <em class="replaceable">files</tt></em><p><a name="IXT-2-121882" /><a name="IXT-2-121883" /><a name="IXT-2-121884" /><a name="IXT-2-121885" />Change the ownership of one or more <em class="emphasis">files</em> to <em class="emphasis">newgroup</em>.<em class="emphasis">newgroup</em> is either a group ID number or a group name located in<tt class="literal">/etc/group</tt>.  You must own the file or be a privileged userto succeed with this command.</p><h4 class="refsect2">Options</h4><dl><dt><tt class="literal">-f</tt></dt><dd>Force error messages to be suppressed.</p></dd><dt><tt class="literal">-h</tt></dt><dd>Change the group on symbolic links.Normally, <tt class="literal">chgrp</tt> acts on thefile <em class="emphasis">referenced</em> by a symbolic link, not on the linkitself. (This option is not necessarily available on all Unix systems.)</p></dd><dt><tt class="literal">-R</tt></dt><dd>Recursively descend through the directory, including subdirectoriesand symbolic links, setting the specified group ID as it proceeds.</p></dd></dl></td></tr><tr><td valign="top"><a name="chkey">chkey</a></a></td><td><tt class="literal">chkey</tt> [<tt><em class="replaceable"><tt>options</tt></em></tt>]<p><a name="IXT-2-121886" /><a name="IXT-2-121887" /><a name="IXT-2-121888" />Solaris only.Prompt for login password and use it to encrypt a new key.See also <b class="emphasis-bold"><a href="#keylogin">keylogin</a></b> and <b class="emphasis-bold"><a href="#keylogout">keylogout</a></b>.</p><h4 class="refsect2">Options</h4><dl><dt><tt class="literal">-p</tt></dt><dd>Reencrypt the existing secret key with the user'slogin password.</p></dd><dt><tt class="literal">-m</tt> <tt><em class="replaceable">mechanism</em></tt></dt><dd>Change or  reencrypt  the  secret  key  for  thespecified mechanism.(Mechanisms are those allowed by <em class="emphasis">nisauthconf</em></tt>(1).)</p></dd><dt><tt class="literal">-s</tt> <tt><em class="replaceable">database</em></tt></dt><dd>Update the given database, which is one of<tt class="literal">files</tt>,<tt class="literal">nis</tt>,or<tt class="literal">nisplus</tt>.</p></dd></dl></td></tr><tr><td valign="top"><a name="chmod">chmod</a></a></td><td><tt class="literal">chmod</tt> [<em class="replaceable"><tt>option</em>] <em class="replaceable">mode</em> <em class="replaceable">files</tt></em><p><a name="IXT-2-121889" /><a name="IXT-2-121890" /><a name="IXT-2-121891" /><a name="IXT-2-121892" />Change the access <em class="emphasis">mode</em> of one or more <em class="emphasis">files</em>.  Only the owner of afile or a privileged user may change its mode.Create <em class="emphasis">mode</em> by concatenating thecharacters from <em class="emphasis">who</em>, <em class="emphasis">opcode</em>, and <em class="emphasis">permission</em>.<em class="emphasis">who</em> is optional (if omitted, default is <tt class="literal">a</tt>); choose only one <em class="emphasis">opcode</em>.</p><h4 class="refsect2">Options</h4><dl><dt><tt class="literal">-f</tt></dt><dd>Suppress error message upon failure to change a file's mode.</p></dd><dt><tt class="literal">-R</tt></dt><dd>Recursively descend directory arguments while setting modes.</p></dd></dl><h4 class="refsect2">Who</h4><table border="1" cellpadding="3"><tr><td><tt class="literal">u</tt></td><td><p>User</p></td></tr><tr><td><tt class="literal">g</tt></td><td><p>Group</p></td></tr><tr><td><tt class="literal">o</tt></td><td><p>Other</p></td></tr><tr><td><tt class="literal">a</tt></td><td><p>All (default)</p></td></tr></table><p><h4 class="refsect2">Opcode</h4><table border="1" cellpadding="3"><tr><td><tt class="literal">+</tt></td><td><p>Add permission</p></td></tr><tr><td><tt class="literal">-</tt></td><td><p>Remove permission</p></td></tr><tr><td><tt class="literal">=</tt></td><td><p>Assign permission (and remove permission of the unspecified fields)</p></td></tr></table><p><h4 class="refsect2">Permission</h4><table border="1" cellpadding="3"><tr><td><tt class="literal">r</tt></td><td><p>Read</p></td></tr><tr><td><tt class="literal">w</tt></td><td><p>Write</p></td></tr><tr><td><tt class="literal">x</tt></td><td><p>Execute</p></td></tr><tr><td><tt class="literal">s</tt></td><td><p>Set user (or group) ID</p></td></tr><tr><td><tt class="literal">t</tt></td><td><p>Sticky bit; save text mode (file) or prevent removal of files by nonowners(directory)</p></td></tr><tr><td><tt class="literal">u</tt></td><td><p>User's present permission</p></td></tr><tr><td><tt class="literal">g</tt></td><td><p>Group's present permission</p></td></tr><tr><td><tt class="literal">o</tt></td><td><p>Other's present permission</p></td></tr><tr><td><tt class="literal">l</tt></td><td><p>Mandatory locking</p></td></tr></table><p><p>Alternatively, specify permissions by a three-digit sequence.  The firstdigit designates owner permission; the second, group permission; and thethird, others permission.  Permissions are calculated by addingthe following octal values:</p><table border="1" cellpadding="3"><tr><td><tt class="literal">4</tt></td><td><p>Read</p></td></tr><tr><td><tt class="literal">2</tt></td>

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -