`
`MS 1123MS 1123
`
`
`
`The Guide
`
`Copyright (C) 1993 Portland State University
`
`This is Edition 0.1 of The Guide,
`last updated 7 September 1993 .
`Printed 2 September 1994.
`
`Published by Portland State University
`P.O. Box 751, CMPS
`Portland, OR 97207
`
`Permission is granted to make and distribute verbatim copies of this manual provided the copyright
`notice and this permission notice are preserved on all copies.
`
`Permission is granted to copy and distribute modified versions of this manual under the conditions for
`verbatim copying, provided that the entire resulting derived work is distributed under the terms of a
`permission notice identical to this one.
`
`Permission is granted to copy and distribute translations of this manual into another language, under the
`above conditions for modified versions, except that this permission notice may be stated in a translation
`approved by the Free Software Foundation.
`
`Preface
`
`This document was adapted from File 901, version 2.0, from the Computer Science Department at OSU.
`It was originally written by Jon Krueger (University of Rochester) and John Sechrest (OSU).
`
`Contributors to version 1 at OSU were: Joel Corcoran, Edward A. Dains, Chris Hansen, Bryce Jasmer,
`Cory Jones, Marilyn Jordan, Lothar Kaul, Saeed Sedatian, Dex Smith, Scott Starr, Doug Strauss,
`Terralyn Udell and Don Willits.
`
`Contributors to version 2 at OSU were: Marcos Barajas, Dan Nixon, Anthony Coughran, Steve Fulling,
`Dana Jacobsen, Cory Jones, Shahid Khan, Rajeev Pandey, Sheryl Parker, Erik Peteresen, Jason Robbins,
`Rebecca Ryden, AJ Schricker, John Sechrest, Satish Srinivas and Ricardo Uribe.
`
`With John Sechrest's kind permission, The Portland State University Computer Science Systems Group
`(Sysgroup) began work on their own version. Initially this was done by converting the document to
`Texinfo and then omitting or altering local (OSUspecific) information.
`
`The primary work at PSU was done by Lynnette Ahmed, Mihail Blaj, George A. Christian, Roger
`Conley, Anthony Fiarito, Trent A. Fisher, John Jendro, Laurentiu Popescu and Darrell K. Root.
`
`Some sections are edited versions of documents available on the Internet. They are section News
`Etiquette, which is adapted from A Primer on How to Work With the Usenet Community, by Chuq Von
`Rospach; and section nn, which is adapted from an article by Rohit Gupta (rohit@uiuc.edu), University
`of Illinois at UrbanaChampaign, Computing Services Office.
`
`MS 1123 - Page 1
`
`
`
`Introduction
`
`This manual was written to help acquaint you with the UNIX computer systems available at PSU. It is
`intended to be an introductionnot a complete guide. If you wish more information about UNIX systems
`in general, you should read one or more of the books listed in section Books.
`
`This manual is available for checkout at the Reserve Library under the title The Guide.
`
`NOTE: This is still an early version of this document. Please report any factual, typographical or
`formatting errors to the‐guide@cs.pdx.edu.
`How to get to a UNIX account
`
`This section is a copy of the instructions included with the account application form (The Form).
`
`Getting an account on a Computer Science UNIX machine is a two step process: you must fill out an
`account application, and then run the addme program. If either step is not completed, then you will not
`receive your account. Once you have finished both steps, you should be able to use your account within
`one business day.
`
`Step One: The Account Application
`
`Account application forms can be obtained from the CS Main office in PCAT 120. You must read this
`form entirely, and determine what type of account you are eligible for.
`
`If your account just needs to be renewed, just fill out and sign the form and turn it in. Otherwise, have
`this form with you for the next step.
`
`Step Two: The Addme program
`
`ADDME is PSU's automated account request system. The easiest way to run addme is to use an X
`Windows terminal in the CS Lab (MSB 120). Sit down at a terminal, and login as `addme'.
`
`If you are dialing in, press ENTER until you see the prompt `malach>'. Then, type addme twice (once to
`reach the right machine and the second time to begin the addme program).
`
`Users who wish to telnet in should telnet to addme.cs.pdx.edu [131.252.20.183] At the `login:' prompt,
`type addme.
`
`Simply press return if it asks you for a password. It will then ask you some questions about yourself
`including asking you to create a password which you will need to remember in order to log in to your
`account.
`
`Do not choose a password that appears in the dictionary! Make sure your password is difficult to
`guess. It should have some digits and punctuation in it. It should be at least six characters long, and it
`shouldn't be anything like your login name or telephone number. addme should make sure that you don't
`choose such a password.
`
`As you give the information to addme you should fill out the form. When you are done with both, turn
`
`MS 1123 - Page 2
`
`
`
`the form in to the CS Office. You should have your account by the end of the next day.
`
`Go to the Tutors Room in Mill Street Building if you need help with either of these steps. See section
`Getting Help, for more info.
`Acceptable Use Policy
`
`The Acceptable Use Policy is the primary policy statement for the CS Systems. Some important clauses
`from this document are on the account form that you fill out and sign in order to receive a UNIX account.
`Other policies are laid down from time to time in order to give more detail, or elaborate on system
`specifics. However, this policy has precedence. These other policies can be found in `/folklore' on most
`CS Systems.
`
`Definitions
`
`The CS Systems consist of all computer systems owned by, or on loan to, the CS Department.
`
`Sysgroup is the body responsible for maintenance of the CS Systems. The CS Systems Manager is in
`charge of Sysgroup and, ultimately, responsible for their actions. For further information see section
``Introduction' in The Sysgroup Handbook, and see section `Systems Manager' in The Sysgroup
`Handbook.
`
`Who can get access to CS Systems
`
`The account application form (The Form) specifies the exact policies for who can get accounts and how
`to do so. See section How to get to a UNIX account for more info.
`
`The general policy is that CS faculty, staff and students (graduate and undergraduate), can easily get
`accounts. Faculty and staff in other departments may be given courtesy accounts. All others must get
`special approval from the Department Head.
`
`Users Rights and Responsibilities
`
`Select a good choice for a password. This rules out any word that you may find in a dictionary in
`any language. Good choices are those that look like gibberish but mean something to you so that it
`is easy to remember. In most cases, there will be software in place to make sure you choose a good
`password, but on machines where such software is not installed, you are responsible for picking a
`good password. See section Changing Your Password, for more info.
`
`Keep you password secure. Do not keep it in an easy to access location, online, or give it to others.
`Whenever possible, use different passwords for machines in different administrative domains.
`While a potential nuisance, this helps localize the effects of a compromised password.
`
`Keys, access codes or computer accounts that access the CS Systems may not be given to others,
`even though they may be authorized users themselves.
`
`Report any system security violation (or suspected system security violation) or any behavior that
`is contrary to the guidelines described in this document to Sysgroup.
`
`Users are responsible for protecting their own files or data (from reading by others) using whatever
`
`MS 1123 - Page 3
`
`
`
`protection mechanisms that are offered by the operating system in use. See section Protecting Files
`and Directories, for more info.
`
`Users are not authorized to enforce any of these rules and guidelines on others. That is the
`responsibility of Sysgroup.
`
`Operate physical equipment responsibly. Do not cause damage to equipment and try to prevent
`damage, if possible. Please report any damaged or malfunctioning equipment immediately to
`Sysgroup. During offhours and in cases of emergency conditions, such as water leaks or fire,
`contact Campus Security and attempt to send email warnings, if possible. See section Getting
`Help, for more info.
`
`Obey all system messages and placards in terminal rooms, attached to computer equipment and
`displayed on the msgs facility or the login message of the day.
`
`Follow the proper use guidelines for the system. See section Proper Use of the CS Systems, for
`more info.
`
`In times of tight resources, users affiliated with the CS department may not be denied access to
`departmental facilities by someone who is not using the facilities for instruction, research, or
`administrative purposes, or who is not a faculty, staff or student member of the CS department. A
`user affiliated with the CS department has the right to ask this person to relinquish the resource, or
`to ask a Sysgroup member to intervene on his or her behalf.
`
`Users have the right not to be harassed while using the CS Systems, whether it be physical, verbal,
`electronic, or any other form of abuse. Harassment should be reported to Sysgroup. See section
`Getting Help, for more info.
`
`Above all, be responsible at all times for using the CS Systems in a manner that is ethical, legal
`and not to the detriment of others.
`
`In general, learn how to use the computing facilities effectively. A knowledgeable user is a
`responsible user.
`
`Operating Guidelines for the CS Systems
`
`Sysgroup, in general, has the right to do whatever is necessary to carry out its responsibility to keep the
`computing resources operating and available.
`
`The networked computer environment provided by Sysgroup is provided to faculty, staff, and
`students to enable them to accomplish certain tasks required by their roles within the CS
`department. There is an acknowledged tradeoff between the absolute right of privacy of a user,
`and the need of Sysgroup to gather necessary information to ensure the continued functioning of
`these resources.
`
`Sysgroup has an obligation to maintain the privacy of a user's files, electronic mail, and printer
`listings to the best of its ability. In cases where a user's privacy must be violated, as specified in the
`next two items, Sysgroup is responsible for keeping records of the violation and the reasons for
`such violations.
`
`In the normal course of systems administration, Sysgroup may have to examine files, electronic
`
`MS 1123 - Page 4
`
`
`
`mail, and printer listings (online or from backups) to gather sufficient information to diagnose and
`correct problems with systems software, or, with reasonable cause for suspicion, to determine if a
`user is acting in violation of the policies set forth in this document.
`
`With reasonable cause for suspicion, Sysgroup has the right to monitor any and all aspects of a
`system, including individual login sessions, to determine if a user is acting in violation of the
`policies set forth in this document.
`
`In order to maintain availability of System resources (cpu, disk, memory, etc.) for all users,
`Sysgroup has the right to do the following, with or without prior notification:
`
`Alter the priority or terminate the execution of any process that is consuming excessive
`system resources or objectionably degrading system response.
`
`Remove or compress disk files which are not related to the CS Department missions and
`which are consuming large amounts of disk space.
`
`Terminate login sessions that have been idle for long periods of time. This applies
`particularly to limited resources such as dialin connections. The definition of "long period"
`of time may vary from system to system, depending on the resource's availability.
`
`Sysgroup has the responsibility to provide advance notice of system shutdown, maintenance,
`upgrades or changes so that users may plan around periods of system unavailability. However, in
`the event of an emergency, Sysgroup has the right to shut down a system with little or no advance
`notification. Every effort will be made to give users a chance to save their work before the system
`is taken out of service.
`
`Sysgroup has the responsibility to report any violations of University policy, state law, or federal
`law pertaining to the use of University computer facilities to the appropriate authorities.
`
`Sysgroup has the right to refuse access to any person who has violated the policies set forth in this
`document, or who has violated the policies of other computer facilities belonging to the University.
`
`Proper Use of the CS Systems
`
`The CS Systems are provided for use by faculty, staff and students in support of programs of the CS
`department. All faculty, staff and students (as well as guest users) are responsible for seeing that these
`computing facilities are used in an effective, efficient, ethical and lawful manner.
`
`The following list is not exhaustive.
`
`Do not monopolize system resources.
`
`Keep disk space usage to a minimum.
`Do not render a system unusable by loading it up with jobs.
`Long printer jobs should be saved for offpeak hours.
`Long running jobs should also be saved for offpeak hours.
`Relinquish licensed software when no longer using the license.
`Do not lock workstations in terminal rooms for long periods of time. (10 minute maximum)
`Limit the number of frivolous gadgets on workstation displays
`
`MS 1123 - Page 5
`
`
`
`Users are expected to use the general use labs responsibly:
`General use labs are to be kept clean. Users are expected to clean up their own messes.
`
`The maintenance of all equipment in the terminals rooms is the responsibility of Sysgroup.
`Do not reboot or power cycle any equipment or tamper with them in any other way. Do not
`disconnect, open, or swap any components on the equipment in terminal rooms.
`
`Food and drink are not allowed in terminal rooms or labs. If you need to have a snack, please
`go outside the lab, or to any other location where eating is allowed.
`
`Speak quietly when conversing with others in the terminal rooms.
`
`Most printers in the CS Systems are selfserve. Clean up after yourself and take care to file
`unclaimed print jobs near the printer. Do not leave a mess for others to clean up.
`
`Users submitting large or complex print jobs need to make sure that their jobs complete properly
`and do not cause jams or hangups.
`
`Game playing, and the development of computer games, must be limited to off periods when the
`demand for system resources is low.
`
`Do not use the CS Systems for any commercial purposes without permission from Sysgroup.
`
`Users may not intentionally use programs that do the following:
`Harass other users of the system
`Bypass security mechanisms, steal or crack passwords
`Consume all of an available resource
`Worms, viruses or trojan horses (Worms and viruses are selfreplicating programs. Trojan
`horses dupe the user into executing programs/commands that were not the user's intent.)
`Evade software licensing or copying mechanisms
`
`Users who believe they have a legitimate reason to use or develop programs in the above
`categories for research purposes must consult with Sysgroup and gain permission before using
`these programs. Special environments may be set up to facilitate the above without causing
`disruptions to the system.
`
`Under no circumstances may a user alter a file or directory that does not belong to him or her
`without prior permission of the file's owner. The ability to alter a file or directory does not imply
`permission to alter that file or directory.
`
`Learn how to run remote programs properly so that the users on remote machines are not affected
`by misdirected output or graphics.
`
`Users are not to forge electronic mail or other such services.
`
`Deliberate alteration of system files by unauthorized individuals is considered vandalism or
`malicious destruction of University property and not allowed.
`
`CS Computing facilities and network connections may not be used for the purposes of making
`unauthorized connections to, breaking into, or adversely affecting the performance of other
`systems on the network, whether these systems are Universityowned or not. The ability to connect
`to other systems via the network does not imply the right to make use of or even connect to these
`
`MS 1123 - Page 6
`
`
`
`systems unless properly authorized by the owners of those systems.
`
`Software Copyrights and Licenses
`
`The software used on the CS Systems is operated under license agreements with AT&T, Sun
`Microsystems, The University of California at Berkeley and others.
`
`United States copyright and patent laws protect the interests of authors, inventors and software
`developers in their products. Software license agreements serve to increase compliance with
`copyright and patent laws. It is against federal and/or law and CS Systems policy to violate the
`copyrights, patents or license agreements on computer software.
`
`The University's UNIX source code license binds each and every user to respect the proprietary
`nature of the UNIX operating system and its source code. The specifics of the operating system
`may not be taught, nor may the system or any part thereof (including source code) be moved to, or
`copies released to any nonlicensed site.
`
`Software in use on CS Systems, unless it is stored in areas specifically marked as containing
`copyable software, may not be copied to magnetic tape, hard or floppy disk or transferred offsite.
`Users may not make copies of licensed software in violation of its license without consulting with
`Sysgroup.
`
`Source code for licensed software may not be included in software that is released for use outside
`of the CS Systems.
`
`Penalties for infractions
`
`Minor infractions of this policy, when likely accidental in nature, are typically handled internally, in an
`informal manner. More serious infractions are handled via formal procedure. The CS Systems Committee
`determines the penalty or rules on whether the case should be referred to another authority.
`
`In general, Sysgroup's first responsibility is to stop the violation (by disabling the user's account pending
`inperson conference) and then to prevent the violation from happening in the future (by issuing formal
`warnings, punitive measures, etc.)
`
`Infractions such as sharing accounts, keys, key access or passwords, harassment, or repeated minor
`infractions as described above may result in the temporary or permanent loss of CS Systems
`privileges and notification of a student's academic advisor.
`
`More serious infractions, such as unauthorized use of resources, attempts to steal passwords or
`data, attempts to steal licensed software, violations of University policies, or repeated violations as
`described above will result in temporary or permanent loss of CS Systems privileges. The case is
`referred to the appropriate University body for handling.
`
`Systems related offenses which are in violation of local, state or federal laws may result in
`immediate loss of all CS Systems privileges and the matter being referred to the appropriate local,
`state or federal agency.
`Etiquette
`
`MS 1123 - Page 7
`
`
`
`Just like in many public establishments, there is a certain level of etiquette that we, as the public, are
`expected to follow. It is wise to understand what is and isn't acceptable. Failure to behave in a reasonable
`fashion could result in the loss of computer privileges.
`Conventions Used
`
`The conventions in this manual are identical to any other manual written using the Texinfo system:
`
`What the computer will respond is given in `this type'. For instance, `TERM = (termtype)'
`
`What you type to the computer is given like this. For instance, xterm
`
`When these are combined, it will look like: `TERM = (termtype)' xterms
`
`TERM = (termtype) xterms
`
`Variable information will be displayed like this. The word termtype in the previous example is
`variable. Inside computer output, this is done in italic typewriter type. This means that you won't
`see the actual word, but that it is a description of what you will see. In this case you will probably
`see `vt100', `network', `xterm', or something else.
`
`Ctrl is an abbreviation for the control key on the keyboard. Other common abbreviations use the ^
`character or C. The control key is always used in conjunction with another key. You hold down
`the control key and then press the other key. CtrlD, ctrld, Cd and ^D all mean to hold down the
`control key and then press D.
`
`esc stands for the escape key, SPC for the space bar and RET for the return key.
`
`BSD, HPUX, System V, DYNIX, and SunOS are all abbreviations for various versions of UNIX,
`and are described in section Unix Files & NFS.
`
`Unless specified otherwise, each line you type must end with a return (often called carriage return
`or enter) in order to be entered.
`
`Getting Help
`
`This chapter explains several ways to get help. When you need help, you should go through the following
`steps in this order:
`
`1. Check the online documentation. Use the man, info / xinfo, and gopher commands.
`2. Bulletin boards. The newsgroups `psu.systems, psu.dialups, psu.TeX' (and others) may have
`answers.
`3. Read the manuals. Manuals are available in the CS lab and in the CS Systems Office.
`4. Ask the Tutors.
`5. Ask your TA or instructor about class and system information.
`6. Ask Sysgroup.
`Online Help
`
`MS 1123 - Page 8
`
`
`
`Several ways to get help are available while you are logged in to a UNIX system. Most of these require
`typing one of the following commands:
`
`man
`info or xinfo
`gopher
`rn psu.systems
`
`man and info are used to get onthespot help when you don't know what to do or you want more
`information. section Man Command and section Info Command explains them. Gopher is another way to
`get more information and is described in section Gopher Command. The last one, rn psu.systems, is
`used to look at files of current information about the UNIX systems. Section section News explains how
`to use it.
`
`Man Command
`
`How to use Man
`
`The man command prints pages of the UNIX Programmers Manual on the screen. Each page, called "a
`man page," describes one command. To use the man command, type the following:
`
`man command
`
`The man command responds by printing on the screen the man page for the command you typed in place
`of command. For example, if you wished to learn more about the man command, you could try:
`
`man man
`
`Once you have a man page on your screen, you'll want to know the information listed below.
`
`If you need help while looking at the man page, you can type a ? to get more information.
`
`If the man page is more than one page long, you'll need to press the space bar to see the next and
`all subsequent pages.
`
`If you're looking for something specific in the man page (for example, the description of a
`particular option), you can have man find a particular word (say, that option name) by typing the
`following: /pattern The man command will go to where it first finds the word you typed in place
`of pattern. To get man to look for the next occurrence of that word, simply type a slash (/) by itself.
`
`If you don't want to look at the entire man page, you can quit by typing ctrl‐c or, if the : prompt is
`on your screen, by typing q.
`
`If you don't know the exact name of the UNIX command you're looking for, you can use: man ‐k
`something man ‐k responds by printing on the screen a list of all the commands it finds that are similar to
`the word you typed in place of something or that contain that word in the description of the command.
`You can then use the man command to get information about the command you're interested in.
`
`For example, here are the results of using man ‐k compiler to find compiler man pages.
`
`cccp, cpp (1) ‐ The GNU C‐Compatible Compiler Preprocessor.
`g++ (1) ‐ GNU project C++ Compiler (v2 preliminary)
`gcc, g++ (1) ‐ GNU project C and C++ Compiler (v2 preliminary)
`
`MS 1123 - Page 9
`
`
`
`cc (1v) ‐ C compiler
`error (1) ‐ categorize compiler error messages, insert at
` responsible source file lines
`rpcgen (1) ‐ RPC protocol compiler
`tic (8v) ‐ terminfo compiler
`yacc (1) ‐ yet another compiler‐compiler
`zic (8) ‐ time zone compiler
`bdftosnf (1) ‐ BDF to SNF font compiler for X11
`cfc (8) ‐ Sendmail cf file compiler
`ease (8) ‐ precompiler for sendmail configuration files
`f77 (1) ‐ Sun FORTRAN compiler
`f90 (1) ‐ Fortran 90 compiler
`fp (1) ‐ Functional Programming language compiler/interpreter
`fpc (1) ‐ fp to C compiler
`orc (1) ‐ The Oregon C++ compiler
`pc (1) ‐ Pascal compiler
`sicstus2.1 (1) ‐ SICS Prolog compiler/interpreter
`sml, smld, smlc (1) ‐ Standard ML compiler
`
`Then you can look at the man page for the C compiler, called cc, by typing: man cc
`
`This command should come up with a page with the following sections:
`
`NAME
`commandbrief description of what it does
`
`SYNOPSIS
`command op files: what the command has to offer and how it is invoked/used.
`
`DESCRIPTION
`a more indepth explanation of what the command has to offer as well as to give examples of how
`to use the command. In this section you will also get the explanation of what options the command
`has and how to properly use them.
`
`FILES
`this is a list of the files which the command utilizes to perform correctly.
`
`SEE ALSO
`these are references to other commands that can give related information on the topic you are
`referencing.
`
`There are other sections that are sometimes used: WARNINGS, BUGS, and others.
`
`Man Pages Organization
`
`Online man pages are organized into eight specific sections based on the actual commands' purpose.
`Some systems organize the sections slightly differently. The original eight sections are:
`
`1. Commands
`2. System Calls
`3. Library Functions
`4. Special Files, Device Info
`5. File Formats and Conventions
`6. Games
`
`MS 1123 - Page 10
`
`
`
`7. Macro Packages and Language Conventions
`8. Maintenance Commands and Procedures
`
`In addition there is a separate hierarchy for each type of software, one for standard UNIX utilities, one
`for local commands, one for GNU utilities, etc.
`
`The man command will always try to show you the manual entry from the correct hierarchy. If you want
`to see all available manual pages with a given name use the `‐A' argument.
`
`Info Command
`
`The info command is part of the Texinfo documentation system, which is the documentation system
`used by the GNU Project. It uses a single source file to produce both online help (and other information)
`and a printed manual. This means that instead of writing two different documents, one providing online
`information and the other for a printed manual, you need write only one complete document.
`
`Most Texinfo documents are intended to be both a reference manual (like the man command in UNIX)
`and a tutorial. The online version of the manual is referred to as an info file, there are several programs
`available to read them. Currently, the only local machine with uptodate info files is `rigel'.
`
`There are several commands that allow you to read infofiles:
`
`If you are on an ASCII terminal with some screen addressability (i.e. vi works properly), there is a
`program called info.
`If you are on an Xterminal, you can use the program xinfo.
`If you are an Emacs user, there is an info reader built into Emacs; just type M‐? i (or M‐x info).
`
`With all of these info readers, typing ? will give a listing of available commands. The commands are very
`similar among all three of these. Typing h will bring up a simple tutorial to show you how to use the info
`readers.
`
`The entire Info system is organized in an hierarchal fashion, with information at each node. At each level
`there is a menu of the subtopics available. At the top level is a listing of the documents available, at the
`next level down you can select chapters, etc. You can select a menu entry with the m command followed
`by the name of the node you wish to visit.
`
`The info system also allows you to follow cross references. To do this, use the f command followed by
`the name of cross reference node.
`
`In either of these cases, you do not need to type a complete nodename; if you type a few letters and then
`a space or tab, info will will try to fill in the rest of the nodename. If you ask for further completion
`without typing any more characters you'll be given a list of possibilities; you can also get the list with ?.
`If you type a few characters and then hit return info will try to do a completion, and if it is ambiguous
`use the first possibility.
`
`Gopher Command
`
`The gopher program is used to talk to gopher servers.(1)
`
`The Internet Gopher is a distributed document delivery service. It allows a neophyte user to access
`various types of data residing on multiple hosts in a seamless fashion. This is accomplished by presenting
`
`MS 1123 - Page 11
`
`
`
`the user a hierarchical arrangement of documents and by using a clientserver communications model.
`The Internet Gopher Server accepts simple queries, and responds by sending the client a document.
`
`Internal Help
`
`Most UNIX interactive utilities have some sort of help function builtin. For most commands the ? key
`will give you a help screen. Some commands may also use h. There are still other possibilities, but you
`should be informed of them when the program starts
`
`Help Through Newsgroups
`
`Another way to get answers is to read the news groups `psu.msgs', `psu.systems' and `psu.general'.
`The CS department systems staff uses the newsgroup for systems information, and answers to common
`questions. In particular, important systems announcements are posted to `psu.msgs'.
`
`To read these newsgroups use either the rn or nn commands. In the case of `psu.msgs' the same
`information can accessed via the msgs command. See section News, for more information.
`Manuals and Books
`
`Everything you try to do (almost) on these systems is described in a manual somewhere. Relevant
`manuals are referred to by name throughout this manual, usually at the beginning of the chapter that
`describes that topic. Some of these manuals can be purchased at Clean Copy or Copyman, and many are
`available for viewing in the CS Lab (MSB Rm 120).
`
`Publications you may find helpful are:
`
`UNIX BSD Quick Reference Guide
`
`The UNIX BSD Quick Reference Guide, sold at the PSU Book Store, is a good quickreference guide to
`UNIX commands. It gives syntax and brief descriptions of commands similar to those provided in
`section Basic UNIX Commands.
`
`UNIX Programmers Manual
`
`The definitive published document about UNIX is the UNIX Programmer's Manual. System V, HPUX,
`and BSD UNIX have slightly different versions of it.
`
`Volume 1 of the UNIX Programmers Manual consists mostly of documentation written for programmers.
`It documents mainly software in little space.
`
`Most of Volume 1 of the UNIX Programmers Manual is kept online. section Man Command explains
`how to utilize it.
`
`Books
`
`Recently, a number of paperback books about UNIX have come out. These books can give you a broader
`perspective on UNIX than the manuals provide.
`
`MS 1123 - Page 12
`
`
`
`Starting with UNIX; Brown; AddisonWesley; 1984.
`UNIX Primer Plus; Waite, Martin, and Prata; Howard W. Sams & Co; 1983.
`Introducing the UNIX System; McGilton and Morgan; McGrawHill; 1983.
`The UNIX Operating System; Christian; John Wiley and Sons; 1983.
`UNIX for People; Birns, Brown, and Muster; PrenticeHall; 1985.
`A Practical Guide to the UNIX System; Sobell; BenjaminCummings; 1984.
`UNIX Text Processing; Dougherty and O'Reilly; Howard Sams and Company.
`The UNIX Programming Environment; Kernighan and Pike; PrenticeHall; 1984.
`
`The UNIX System; Bourne; AddisonWesley; 1983.
`The UNIX Survival Guide; Nichols, Bailin, and Nichols; Holt, Rinehart, and Winston; 1987.
`UNIX System Administration; Burke; Harcourt Brace Jovanovich; 1987.
`Tricks of the UNIX Masters; Sage; Howard Sams and Company; 1987.
`UNIX Communications; Anderson; Howard Sams and Company; 1987.
`UNIX System Security; Wood and Kochan; Hayden Books; 1985.
`The Design of the UNIX Operating System; Bach; PrenticeHall; 1986.
`C Wizards Programming Reference; Schwaderer; Wiley Press; 1985.
`Computer Networks; Tanenbaum; PrenticeHall; 1981.
`The C Programming Language; Kernighan and Ritchie; PrenticeHall; 1978.
`C: A Reference Manual; Harberson and Steele.
`Notable Networks; Quarterman.
`UNIX System Administration Handbook; Evi Nemeth; 1989.
`
`In addition, there is a series of books called the Nutshell Handbooks published by O'Reilly. Titles in this
`series include:
`
`C Programming in the UNIX Environment
`Learning the UNIX Operating System
`Learning the Vi Editor
`MH and XMH
`Programming in Perl
`Reading and Writing