*nix Documentation Project
·  Home
 +   man pages
·  Linux HOWTOs
·  FreeBSD Tips
·  *niX Forums

  man pages->Tru64 Unix man pages              
Title
Content
Arch
Section
 
 convuser(8) -- convert user profile information between BASE and ENHANCED formats
    The convuser utility is used to provide migration between BASE and ENHANCED security levels, as well as to provide support for the use of existing account-creation scripts. The most common uses are to...
 cp382dof(8) -- Filter for Traditional Chinese CP382 printer controller
    The cp382dof filter is used to filter text data destined for the CP382 printer controller. The filter handles the device dependencies of the printers and performs accounting functions. At the time of ...
 cpqthresh_mib(8) -- Tru64 UNIX SNMP subagent daemon that supports thresholding
    The cpqthresh_mib daemon is the subagent that provides SNMP data about user-defined threshold information to HP Insight Manager. A threshold is a limit you can set for a monitored item to produce an a...
 cpq_mibs(8) -- Tru64 UNIX SNMP subagent daemon for supported MIBS
    The cpq_mibs daemon is the subagent that implements support for the supported Tru64 UNIX MIBs. It currently supports the following MIBs: cpqHealth cpqHost cpqScsi cpqStdEq cpqSysInfo cpqNIC This daemo...
 crashdc(8) -- Diagnostic data collection for a running or crashed system
    The crashdc utility examines the core image of the operating system to extract critical diagnostic data. This utility is a shell script that invokes several tools and commands that extract selected pa...
 cron(8) -- The system clock daemon
    The cron daemon runs shell commands at specified dates and times. Commands that are to run according to a regular or periodic schedule are found within the crontab files. Commands that are to run once...
 db_archive(8) -- displays security database log files no longer involved in active transactions (Enhanced Security)
    A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide highperformance database support for critical security files. The DB includes full transactio...
 db_checkpoint(8) -- Periodically checkpoint the security database log (Enhanced Security)
    A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide highperformance database support for critical security files. The DB includes full transactio...
 db_dump(8) -- Reads and writes the security databases (Enhanced Security)
    A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide highperformance database support for critical security files. The DB includes full transactio...
 db_dump185(8) -- Reads and writes the security databases (Enhanced Security)
    A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide highperformance database support for critical security files. The DB includes full transactio...
 db_load(8) -- Loads standard input to a database files (Enhanced Security)
    A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide highperformance database support for critical security files. The DB includes full transactio...
 db_printlog(8) -- Displays database log file (Enhanced Security)
    A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide highperformance database support for critical security files. The DB includes full transactio...
 db_recover(8) -- Restores the database to a consistent state (Enhanced Security)
    A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide highperformance database support for critical security files. The DB includes full transactio...
 db_stat(8) -- Displays statistics for the database files (Enhanced Security)
    A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide highperformance database support for critical security files. The DB includes full transactio...
 dcheck(8) -- Checks directory consistency
    The fsck command supersedes the dcheck command for normal consistency checking. The dcheck command reads the directories in a file system and compares the link-count in each inode with the number of d...
<<  [Prev]  402  403  404  405  406  407  408  409  410  411  412  413  414  415  416  417  418  419  420  421  422  
423  424  425  426  427  428  429  430  431  432  433  434  435  436  437  438  439  440  441  442  [Next]  >>
Copyright © 2004-2005 DeniX Solutions SRL
newsletter delivery service