*nix Documentation Project
·  Home
 +   man pages
·  Linux HOWTOs
·  FreeBSD Tips
·  *niX Forums

  man pages->Tru64 Unix man pages              
Title
Content
Arch
Section
 
 codconfig(8) -- Configures Compaq Capacity on Demand (CCoD) with the list of initially used (purchased) CPUs
    You must be root or have the appropriate permissions to use this application. The /usr/sbin/codconfig command configures CCoD with capacity CPUs that are either initially purchased with the system, pu...
 collect(8) -- Collects data that describes the current system status
    Collect is a system monitoring tool that records or displays specific operating system data. Any set of the subsystems, such as file systems, message queue, tty, or header can be included in or exclud...
 comsat(8) -- The biff server
    The comsat server receives reports of incoming mail and notifies users who request this service. comsat is invoked by the inetd(8) daemon when it receives messages on a datagram port associated with t...
 config(8) -- Builds system configuration files
    The doconfig command calls the config command to build a set of system configuration files from a file that describes the sort of system that is being configured. The config command also takes as inpu...
 config_hmmod(8) -- web-based configuration report daemon
    The config_hmmod daemon is the subagent that provides the web-based interface for the Tru64 UNIX Configuration Report. This daemon is available only with Version 5.0 and higher of the Tru64 UNIX opera...
 conflict(8) -- search for alias/password conflicts
    The conflict program checks to see if the interface between MH and transport system is in good shape. It also checks for maildrops in /usr/spool/mail which do not belong to a valid user. It assumes th...
 consvar(8) -- Manipulate system firmware console environment variables
    Use the consvar command to get, set, list, and save console environment variables available on SRM system firmware. Some firmware versions on some platforms do not comply with the Alpha SRM when deali...
 convauth(8) -- convert security authorization databases into database format
    The convauth utility is used to convert existing ASCII system authorization database files to database format for faster access and updates. In the case of the ttys and user-profile data, this greatly...
 convuser(8) -- convert user profile information between BASE and ENHANCED formats
    The convuser utility is used to provide migration between BASE and ENHANCED security levels, as well as to provide support for the use of existing account-creation scripts. The most common uses are to...
 cp382dof(8) -- Filter for Traditional Chinese CP382 printer controller
    The cp382dof filter is used to filter text data destined for the CP382 printer controller. The filter handles the device dependencies of the printers and performs accounting functions. At the time of ...
 cpqthresh_mib(8) -- Tru64 UNIX SNMP subagent daemon that supports thresholding
    The cpqthresh_mib daemon is the subagent that provides SNMP data about user-defined threshold information to HP Insight Manager. A threshold is a limit you can set for a monitored item to produce an a...
 cpq_mibs(8) -- Tru64 UNIX SNMP subagent daemon for supported MIBS
    The cpq_mibs daemon is the subagent that implements support for the supported Tru64 UNIX MIBs. It currently supports the following MIBs: cpqHealth cpqHost cpqScsi cpqStdEq cpqSysInfo cpqNIC This daemo...
 crashdc(8) -- Diagnostic data collection for a running or crashed system
    The crashdc utility examines the core image of the operating system to extract critical diagnostic data. This utility is a shell script that invokes several tools and commands that extract selected pa...
 cron(8) -- The system clock daemon
    The cron daemon runs shell commands at specified dates and times. Commands that are to run according to a regular or periodic schedule are found within the crontab files. Commands that are to run once...
 db_archive(8) -- displays security database log files no longer involved in active transactions (Enhanced Security)
    A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide highperformance database support for critical security files. The DB includes full transactio...
<<  [Prev]  1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  
22  23  24  25  26  [Next]  >>
Copyright © 2004-2005 DeniX Solutions SRL
newsletter delivery service