*nix Documentation Project
·  Home
 +   man pages
·  Linux HOWTOs
·  FreeBSD Tips
·  *niX Forums

  man pages->Tru64 Unix man pages              
Title
Content
Arch
Section
 
 db_checkpoint(8) -- Periodically checkpoint the security database log (Enhanced Security)
    A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide highperformance database support for critical security files. The DB includes full transactio...
 db_dump(8) -- Reads and writes the security databases (Enhanced Security)
    A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide highperformance database support for critical security files. The DB includes full transactio...
 db_dump185(8) -- Reads and writes the security databases (Enhanced Security)
    A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide highperformance database support for critical security files. The DB includes full transactio...
 db_load(8) -- Loads standard input to a database files (Enhanced Security)
    A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide highperformance database support for critical security files. The DB includes full transactio...
 db_printlog(8) -- Displays database log file (Enhanced Security)
    A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide highperformance database support for critical security files. The DB includes full transactio...
 db_recover(8) -- Restores the database to a consistent state (Enhanced Security)
    A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide highperformance database support for critical security files. The DB includes full transactio...
 db_stat(8) -- Displays statistics for the database files (Enhanced Security)
    A customized version of the Berkeley Database (Berkeley DB) is embedded in the operating system to provide highperformance database support for critical security files. The DB includes full transactio...
 dcheck(8) -- Checks directory consistency
    The fsck command supersedes the dcheck command for normal consistency checking. The dcheck command reads the directories in a file system and compares the link-count in each inode with the number of d...
 ddr_config(8) -- Compile and display the SCSI CAM I/O device database
    Dynamic Device Recognition (DDR) is a framework for describing the operating parameters and characteristics of SCSI devices to the SCSI CAM I/O subsystem. You use a utility, /sbin/ddr_config, and a te...
 defragcron(8) -- Schedules AdvFS file domains for defragmenting
    The defragcron utility runs the defragment utility to a schedule that you specify on all active AdvFS file domains or on the active domains you specify. The typical use of this utility is to run it as...
 defragment(8) -- Makes the files in a file domain more contiguous
    When a file consists of many discontiguous file extents, the file is fragmented on the disk. File fragmentation reduces the read/write performance because more I/O operations are required to access a ...
 deliver(8) -- Delivers mail to an IMAP mailbox
    The deliver command reads a message from the standard input and delivers it to one or more IMAP mailboxes. The deliver command reads its configuration options out of the imapd.conf file. Depending on ...
 depord(8) -- Sort subset names into dependency order
    The depord command reads the subset *.ctrl files in the specified directories for dependency information, then sorts the subset name argument list (and, optionally, prerequisite subset names) in depen...
 devswmgr(8) -- utility to manage the device switch database
    The devswmgr command helps you manage the device switch table by displaying information about the devices drivers in the table. You can also use the command to release device switch table entries. Typ...
 dhcpcemu(8) -- Emulate a DHCP client
    The dhcpcemu command emulates a DHCP/BOOTP client. Options are provided to set the most important fields in the BOOTP request packet. A packet is constructed, is sent through the interface specified, ...
<<  [Prev]  1  2  3  4  5  6  7  8  9  10  11  12  13  14  15  16  17  18  19  20  21  
22  23  24  25  26  27  [Next]  >>
Copyright © 2004-2005 DeniX Solutions SRL
newsletter delivery service