Ludzie pragną czasami się rozstawać, żeby móc tęsknić, czekać i cieszyć się z powrotem.
Kontrola procesów...............................................................................................................101
11.1 Praca w tle....................................................................................................................................101
11.2 Praca na pierwszym planie...........................................................................................................102
11.3 ps..................................................................................................................................................102
11.4 kill................................................................................................................................................105
11.5 top..................................................................................................................
...............................106
Rozdział 12. Podstawowa administracja systemem..................................................................................108
12.1 Użytkownicy i grupy....................................................................................................................108
12.1.1 Skrypty dołączone do dystrybucji........................................................................................108
12.1.2 Zmiana hasła.........................................................................................................................111
12.1.3 Zmiana informacji o użytkowniku........................................................................................112
12.2 Użytkownicy i grupy dla hardcore'owców...................................................................................112
12.3 Poprawne zamykanie systemu......................................................................................................114
Rozdział 13. Podstawowe polecenia sieciowe..........................................................................................116
13.1 ping................................................................................................................
...............................116
13.2 traceroute......................................................................................................................................117
13.3 Narzędzia DNS.............................................................................................................................117
13.1.1 host.......................................................................................................................................117
13.3.2 nslookup...............................................................................................................................118
13.3.3 dig.........................................................................................................................................118
13.4 finger............................................................................................................................................119
13.5 telnet.............................................................................................................................................119
13.5.1 Inne sposoby wykorzystania telnetu.....................................................................................120
13.6 Bezpieczna powłoka – The Secure Shell......................................................................................121
13.7 Poczta elektroniczna.....................................................................................................................121
13.7.1 pine.......................................................................................................................................121
13.7.2 elm........................................................................................................................................122
13.7.3 mutt.......................................................................................................................................123
13.7.4 nail........................................................................................................................................124
13.8 Przeglądarki..................................................................................................................................125
13.8.1 lynx.......................................................................................................................................125
13.8.2 links......................................................................................................................................126
13.8.3 wget......................................................................................................................................126
13.9 Klienty FTP..................................................................................................................................127
13.9.1 ftp.........................................................................................................................................127
13.9.2 ncftp......................................................................................................................................129
13.10 Rozmowa....................................................................................................................................129
13.10.1 wall.....................................................................................................................................129