ebook img

apple :: mac :: a ux :: aux 3.0 :: AUX 3.0 Local System Administration 1992 PDF

414 Pages·1992·8.4 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview apple :: mac :: a ux :: aux 3.0 :: AUX 3.0 Local System Administration 1992

A/UX Local System Administration Release 3.0 UMITED WARRANTY ON MEDIA AND REPIACEMENT If you discover physical defects in the manuals distributed with an Apple product or in the media on which a software product is distributed, Apple will replace the media or manuals at no charge to you, provided you return the item to be replaced with proof of purchase to Apple or an authorized Apple dealer during the 90-day period after you purchased the software. In addition, Apple will replace damaged software media and manuals for as long as the software product is included in Apple's Media Exchange Program. While not an upgrade or update method, this program offers additional protection for up to two years or more from the date of your original purchase. See your authorized Apple dealer for program coverage and details. In some countries the replacement period may be different; check with your authorized Apple dealer. All IMPLIED WARRANTIES ON TIIE MEDIA AND MANUAIS, INCLUDING IMPLIED WARRANTIES OF MERCHANTABllllY AND FITNESS FOR A PARTICULAR PURPOSE, ARE LIMITED IN DURATION TO NINETY (90) DAYS FROM TIIE DATE OF TIIE ORIGINAL RETAIL PURCHASE OF TIIIS PRODUCT. Even though Apple has tested the sotiware and reviewed the documentation, APPLE MAKES NO WARRANTY OR REPRESENTATION, EITIIER EXPRESS, OR IMPLIED, WITII RESPECT TO SOFTWARE, ITS QUALITY, PERFORMANCE, MERCHANTABllllY, OR FITNESS FOR A PARTICULAR PURPOSE. AS A RESULT, TIIIS SOFTWARE IS SOID "AS IS," AND YOU, TIIE PURCHASER, ARE ASSUMING TIIE ENTIRE RISK AS TO ITS QUALITY AND PERFORMANCE. IN NO EVENT Will APPLE BE LIABLE FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL, OR CONSEQUENTIAL DAMAGES RESULTING FROM ANY DEFECT IN TIIE SOFTWARE OR ITS DOCUMENTATION, even if advised of the possibility of such damages. In particular, Apple shall have no liability for any programs or data stored in or used with Apple products, including the costs of recovering such programs or data. TIIE WARRANTY AND REMEDIES SET FORTII ABOVE ARE EXCLUSIVE AND IN LIEU OF All OTIIERS, ORAL OR WRITTEN, EXPRESS, OR IMPLIED. No Apple dealer, agent, or employee is authorized to make any modification, extension, or addition to this warranty. Some states do not allow the exclusion or limitation of implied warranties or liability for incidental or consequential damages, so the above limitation or exclusion may not apply to you. This warranty gives you specific legal rights, and you may also have other rights which vary from state to state. ti Apple Computer, Inc. This manual and the software described in it are copyrighted, with all rights reserved. Under the copyright laws, this manual or the software may not be copied, in whole or part, without written consent of Apple, except in the normal use of the software or to make a backup copy of the software. The same proprietary and copyright notices must be affixed to any permitted copies as were affixed to the original. This exception does not allow copies to be made for others, whether or not sold, but all of the material purchased (with all backup copies) may be sold, given, or loaned to another person. Under the law, copying includes translating into another language or format. You may use the sotiware on any rnmputer owned by you, but extra copies cannot be made for this purpose. The Apple logo is a registered trademark of Apple Computer, Inc. Use of the "keyboard" Apple logo (Option-Shift-Kl for commercial purposes without the prior written consent of Apple may constitute trademark infringement and unfair competition in violation of federal and stale laws. ©Apple Computer, Inc., 1992 20'i2'i Mariani Avenue Cupertino, CA 9'i014 (408) 996-1010 Apple, the Apple logo. AppleTalk, A/lJX, EtherTalk, lmageWriter, LaserWritcr, LocalTalk, Macintosh, MacTerminal, and MPW are trademarks of Apple Computer, Inc., registered in the United States and other countries. Finder and MacX are trademarks of Apple Computer, Inc. Adobe, Adobe Illustrator, and Postscript are registered trademarks of Adobe Systems Incorporated. Electrocomp 2000 is a trademark of Image Graphics, Inc. ITC Garamond and ITC Zapf Dingbats are registered trademarks of International Typeface Corp. Linotronic is a registered trademark of Linotype Cu. MacWrite and MacPaint arc trademarks of Claris Corporation. Microsoft is a registered trademark of Microsot\ Corp. NFS is a trademark of Sun Microsystems, Inc. NuBus is a trademark of Texas Instruments. Postscript and TranScript are registered tr;:c;cmarks of Adobe Systems, Incorporated. QuarkXPress is a registered trademark of Quark, Inc. UNIX is a registered trademark of UNIX System Laboratories. VT! 00 and VT! 02 are trademarks of Digital Equipment Corporation. X-Window System is a trademark of Massachusetts Institute of Technology. Yellow Pages is a registered trademark of British Telecommunications pie. Simultaneously published in the United States and Canada. Mention of third-party products is for informational purposes only and constitutes neither an endorsement nor a recommendation. Apple assumes no responsibility with regard to the performance or use of these products. Contents Figures and tables I xvii About this Guide I xix Who this manual is for I xix What you need to know I xx What this manual contains I xx Conventions used in this guide I xxii Keys and key comhinations I xxii Terminology I xxiii The Courier font I xxiii Font styles I xxiv A/UX command syntax I xxiv Manual page reference notation I xxv For more information I xxvi 1 Concepts of System Administration I 1-1 Some suggestions before you begin I 1-3 Customizing your system I 1-5 Naming the system I 1-5 Changing the message of the day I 1-6 Setting the system time I 1-6 Resetting after moving a system to a different time zone I 1-7 Administrative logins and groups I l-7 Administrative logins I 1-8 Administrative groups I l-9 Single-user and multi-user states I l-9 Single-user state I 1-10 Multi-user state I 1-l l Initial processes: /etc/inittab I 1-11 Changing run levels: in it I 1-12 Configuring the kernel I 1-13 Autoconfiguration I l-11 The newcon fl g program I 1-15 Changing kernel parametl'.rs I 1-17 Two types of UNIX file systems I 1-17 About A/UX files I 1-19 2 System Startup and Shutdown I 2-1 Starting up the system I 2-4 About A/UX Startup I 2-5 A/UX Startup command shell window I 2-5 Commands that run in A/UX Startup I 2-6 A/UX Startup menus I 2-8 Apple menu I 2-8 File menu I 2-8 Edit menu I 2-9 Execute menu I 2-9 Preferences menu I 2-l () The startup sequence I 2-13 Checking I 2-13 Loading I 2-14 Launching I 2-14 Checking root file system I 2-15 Initializing device drivers I 2-15 Checking file systems I 2-16 Starting hackground processes I 2-17 Logging out, restarting, and shutting down I 2-18 Logging out from the command line I 2-18 Entering single-user state from multi-user state I 2-18 Using the shutdown command I 2-19 The natural order of startup devices I 2-21 Changing the A/UX startup device I 2-22 vi Contents 3 User and Group Administration I 3-l The A/UX working environment I 3-3 An introduction to the working environment I 3-3 Command shells and setup files I 3-6 Command line prompt I 3-7 The C shell setup files I 3-7 The Bourne shell setup files I 3-8 The Korn shell setup files I 3-8 Macintosh System Folders I 3-8 How A/lJX establishes the environment I 3-9 Administering user accounts I 3-10 The /ctc/passwd file I 3-10 Format of /etc/passwd I 3-10 Adding a user I 3-11 Planning a user's working environment I 3-12 Adding users manually I 3-14 Removing users I 3-19 Voiding a user account I 3-19 Deleting a user account I 3-20 Moving a user's home directory within a file system I 3-21 Moving a user's directory across file systems I 3-21 Using cpio I 3-21 Using tar I 3-22 Changing a user's shell I 3-23 Administering groups I 3-24 Creating groups I 3-24 The /etc/group file / 3-25 Multiple group memberships I 3-26 Files, directories, folders, and permissions I 3-27 UNIX file-access permissions I 3-27 File permissions I 3-28 Directory and folder permissions I 3-29 Changing file permissions: chrnod I 3-29 Symbolic terms I 3-30 Numeric terms I 3-31 Commands that assume permissions using setuid and setgid I 3-32 The sticky bit I 3-34 Setting default file permissions with wnask I 3-34 Contents vii How UNIX permissions and Macintosh File-Sharing permissions compare I 3-35 Security I 3-38 Know your open accounts I 3-38 Monitor I etc /password and I etc I group / 3-38 Multiple uscrs--0ne login I 3-39 Password aging I 3-39 Password restrictions I 3-39 Permission restrictions I 3-40 4 Preparing a Hard Disk for A/UX I 4-1 The steps in preparing disks for A/lJX I 4-3 About UNIX file systems I 4-3 Disk partitions I 4-3 Identifying rartitions I 4-5 file systems I 4-6 Accessing file systems I 4-7 Background on Apple Hard Disk SC Setup I 4-9 Choosing a partition I 4-11 Partitioning disks I 4-12 Considerations before you begin I 4-12 Removing a partition I 4-13 Adding a partition I 1-15 Grouping free space I 1-21 Moving a partition I 4-23 Viewing information about partitions I 4-24 Adding swap space I 4-26 Making A/UX file systems I 4-29 Disk parameters: /etc/disktab I 4-29 Making Berkeley file systems: ncwfs I 4-30 Making System V file systems: rnkfs I 4-31 Mounting A/UX file systems I 4-32 Mounting automatically: fsentry I 4-33 Mounting temporarily: mount I 4-34 Unmounting file systems: umount I 4-36 viii Contents 5 Backing Up Your System I 5-1 Backup overview I 5-3 Full versus partial hackups I 5-3 A common hackup scheme I 5-3 Referring to devices hy device file names I 5-4 Multiple archives on a single tape I 5-6 Run levels and backups I 5-7 Hacking up mounted file systems I 5-7 Backup media I 5-7 Storage capacity of hackup media I 5-8 When to use floppy disks I 5-8 When to use tape I 5-9 When to use paper I 5-10 The backup utilities I S-10 Ahout the Finder I 5-11 About cpio I 5-11 cpio and tape backups I 5-13 cpio and the Afill( 3.0 Installation CD-ROM I 5-14 Using cpio I 5-14 Backing up specific files I 5-15 Backing up all files in a directory I 5-15 Creating partial backups I 5-16 Creating multiple-archive backups I 5-16 Listing the contents of the backup medium I 5-16 Extracting specific files from disk or tape I 5-17 Extracting all files from disk or tape I 5-18 Extracting files from multiple-archive backups I 5-19 In the event of hard l/0 errors I 5-19 About tar I 5-20 tar and tape backups I 5-21 If a backup requires multiple volumes I 5-21 Copying to a disk I 5-22 Using tar I 5-23 Backing up specific files I 5-23 Backing up an entire directory I 5-24 Creating multiple-archive backups I 5-24 Appending a file to a disk I 5-25 Adding a later version of a file to a disk I 5-25 Listing the contents of the backup medium I 5-26 Extracting a specific file or directory I 5-26 Extracting files from multiple-archive backups I 5-28 Extracting a particular version of a file I 5-28 Contents ix About dump. bsd an<l restore / 5-29 Dump levels I 5-30 Using <lump levels in a monthly backup strategy I 5-30 dump.bsd, restore, and tape backups I 5-31 Using dump. bsd I 5-32 Full backups I 5-32 Incremental backups I 5-33 Finding out which file systems to back up I 5-54 Using restore / 5-34 Listing the contents of the backup medium I 5-Yi Restoring individual files I 5-35 Restoring a full backup I 5-36 Interactive mode for restore I 5-38 Ahout pax I 5-40 pax and tape backups I 5-40 Using pax I 5-40 Backing up specific files I 5-41 !lacking up all files in a directory I 5-41 Listing the contents of the backup medium I 5-42 Extracting specific files from a disk or tape I 542 Extracting all files from a disk or tape I 5-43 Verifying data on backed-up disks I 5-43 Automating system administration with cron I 5-45 User access to cron I 545 The crontab file format I 5-46 Adding cron commands I 5-47 Changing cron commands I 5-48 Removing cron commands I 5-48 6 Managing Disks I 6-l About autorecovery I 6-3 Overview I 6-3 Using autorecovery I 6-4 How autorecovery works I 6-5 Autorecovery administration I 6-6 The eu utility I 6-6 The eupdate utility I 6-7 Troubleshooting I 6-7 A/UX Startup errors I 6-7 Checking the autorecovery file system I 6-8 Boot time errors I 6-9 Run time errors I 6-10 Clearing autorecovcry partition names I 6-10 x Contents Reclaiming disk space I 6-11 Removing unneeded files I 6-12 Trimming files that grow I 6-13 Compressing infrequently used files I 6-14 Usage notes I 6-1 'i Extensions to names of compressed files I 6-15 Compressing an archive of files I 6-16 CD-ROM and A/UX I 6-16 Mounting a CD-ROM as an A/UX file system I 6-17 Accessing the man pages on a CD-ROM I 6-17 7 Managing Printers, Terminals and Modems I 7-1 Peripheral device drivers I 7-3 Ports I 7-3 Managing the lpr print spooler I 7-4 Definitions I 7-5 Setting up the print spooler I 7-6 The printcap database I 7-6 1 pr commands I 7-9 Commands for general use I 7-10 Commands for line printer administrators I 7-10 Steps to set-up another printer in the lpr system I 7-12 Troubleshooting the lpr system I 7-13 lpr error messages I 7-13 1 pq error messages I 7-14 lprm error messages I 7-15 1 pd error messages I 7-16 lpc error messages I 7-16 Writing printer output filters I 7-16 Setting up a terminal I 7-17 The inittab file I 7-18 Format of /etc/inittab I 7-18 The gettydefs file I 7-19 Using another Macintosh computer as a terminal I 7-21 Attaching a Macintosh computer as a terminal I 7-21 Attaching a VTIOO, VT102, or other terminal I 7-25 Setting up a serial port: setport I 7-28 Contents xi

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.