DS8000 Series Command-Line Interface User's Guide Metro Mirror Functions

Total Page:16

File Type:pdf, Size:1020Kb

DS8000 Series Command-Line Interface User's Guide Metro Mirror Functions IBM DS8000 Series Version 7 Release 5 Command-Line Interface User's Guide IBM GC27-4212-08 Note Before using this information and the product it supports, read the information in the Notices section. This edition applies to version 7, release 5, Modification 2 of theIBM DS8000 Series Command-Line Interface User’s Guide and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright IBM Corporation 2004, 2016. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this book ........... vii Chapter 4. CLI commands ...... 45 Who should use this book ......... vii About CLI commands ........... 45 Conventions and terminology ........ vii Understanding the syntax diagrams ...... 46 Syntax diagram conventions......... vii Common command flags .......... 47 Publications and related information...... viii Framework commands .......... 48 Ordering IBM publications ......... xi dscli ................ 49 Sending comments ............ xi echo ................ 50 exit ................ 51 Summary of Changes ........ xiii help ................ 51 helpmsg .............. 52 Chapter 1. Introduction to the DS8000 quit ................ 53 setenv ............... 53 series................ 1 setoutput .............. 55 Overview of the DS8000 series ........ 1 showenv .............. 58 ver ................ 59 Chapter 2. Installing, upgrading, and Security commands............ 61 uninstalling the DS CLI ........ 3 User account and security commands .... 61 Operating systems that support the DS CLI .... 3 Data encryption and security commands ... 94 Installing the DS CLI ........... 4 User access security commands ...... 116 DS CLI preinstallation information ...... 4 Internet Protocol Security (IPSec) commands 124 Mounting the DS CLI installation CD ..... 6 Application key commands......... 137 Installing the DS CLI using the graphical mode.. 7 applykey .............. 137 Installing the DS CLI using the console mode .. 10 lskey ............... 138 Installing the DS CLI using the unattended Physical resource information commands .... 139 (silent) mode ............. 14 lsda ............... 140 Correcting the Java Virtual Machine Not Found lsframe .............. 142 Error ............... 15 lsstgencl .............. 144 Upgrading the DS CLI on your system ..... 16 lshba ............... 146 Uninstalling the DS CLI .......... 16 lsddm ............... 148 Uninstalling the DS CLI from your system using Storage complex configuration commands .... 152 graphical mode ............ 17 chsp ............... 152 Uninstalling the DS CLI using unattended (silent) setvpn............... 153 mode ............... 18 lsvpn ............... 154 Uninstalling the DS CLI using the console mode 18 showsp .............. 155 Uninstalling the DS CLI from a System i model 18 Storage unit configuration commands ..... 157 Running and configuring the DS CLI ...... 20 chsu ............... 158 Creating a default CLI profile ....... 21 lssu................ 159 Setting up user accounts using the DS CLI ... 27 showsu .............. 161 Activating your machine and feature licenses Storage image configuration commands .... 164 using the DS CLI ........... 30 chsi................ 165 OpenVMS system integration ....... 31 diagsi ............... 167 lsserver .............. 168 Chapter 3. Running the DS CLI .... 35 lssi ................ 170 showsi .............. 172 Logging into the DS CLI .......... 35 I/O port and host connection configuration Using the DS CLI single-shot command mode ... 36 commands .............. 176 Using the DS CLI script command mode .... 37 Storage image I/O port commands ..... 176 Using the DS CLI interactive command mode Host connection commands ....... 192 (history and reports) ........... 38 Storage configuration commands ....... 212 Obtaining the serial (storage image ID) number Array site specific commands ....... 212 using the DS CLI ............ 39 Array specific commands ........ 218 DS CLI command help .......... 39 Rank specific commands ........ 226 Obtaining and interpreting DS CLI exit codes ... 40 Extent pool specific commands ...... 239 DS CLI operational limitations ........ 42 Address group specific commands ..... 255 Messages in the CLI and management console Logical control unit specific commands.... 256 server ................ 42 CKD logical volume specific commands ... 267 © Copyright IBM Corp. 2004, 2016 iii Logical subsystem specific commands .... 300 Configuring new count key data storage using DS Fixed block logical volume specific commands 306 CLI................. 532 Volume group specific commands ..... 342 Creating count key data extent pools using the Advanced operation commands ...... 352 DS CLI .............. 532 Space-efficient storage commands ..... 355 Creating arrays for CKD volumes using the DS I/O Priority Management commands ..... 376 CLI................ 534 lsperfgrp .............. 376 Creating a rank for CKD volumes using the DS lsperfgrprpt ............. 378 CLI................ 535 lsperfrescrpt ............. 380 Creating logical control units for CKD volumes Resource Group commands ........ 382 using DS CLI ............ 536 chresgrp .............. 382 Creating count key data volumes using the DS lsresgrp .............. 383 CLI................ 537 manageresgrp ............ 384 Correcting a CKD volume configuration error 538 mkresgrp .............. 388 Configuring Fibre Channel I/O ports using the rmresgrp .............. 389 DS CLI .............. 539 showresgrp ............. 389 Managing your logical storage configuration ... 540 Copy Services commands ......... 391 Using DS CLI commands on i5/OS ..... 540 FlashCopy commands ......... 391 Modifying an extent pool ........ 542 Remote FlashCopy commands....... 415 Viewing extent pool status ........ 542 Remote Mirror and Copy path commands... 435 Viewing extent pool properties and performance Remote Mirror and Copy commands .... 448 metrics .............. 543 Global Mirror commands ........ 478 Deleting extent pools from a storage Global Mirror session commands ...... 495 configuration ............ 543 Offload file commands .......... 503 Viewing the array disk drive module status .. 544 offloadauditlog ............ 504 Viewing array status .......... 545 offloadfile ............. 506 Viewing properties for one array ...... 545 Removing arrays from a storage configuration Chapter 5. Configuring access and or a rank assignment .......... 546 security .............. 511 Adding a rank to an extent pool ...... 547 Modifying a rank ........... 548 Internet Protocol Security (IPSec) tasks ..... 511 Viewing rank status .......... 549 Creating an IPSec connection configuration file 511 Viewing properties for one rank ...... 549 Creating a PSK IPSec connection ...... 512 Correcting a rank-related configuration error 549 Creating a public key IPSec connection .... 513 Removing ranks from a storage configuration 550 Enabling or disabling an IPSec connection... 514 Modifying a logical control unit ...... 551 Listing IPSec connections ........ 514 Viewing logical control unit status ..... 552 Export an IPSec connection file ...... 515 Viewing properties for one logical control unit 552 Starting or stopping the IPSec server .... 516 Removing logical control units from a CKD Importing certificates .......... 516 storage configuration .......... 553 Listing certificates ........... 517 Chapter 6. Configuring and managing Chapter 7. Copy Services functions 555 logical storage ........... 519 FlashCopy functions ........... 555 Creating a FlashCopy relationship ..... 555 Configuring new fixed block storage using the DS Creating a persistent FlashCopy relationship 556 CLI................. 519 Viewing information about FlashCopy Creating extent pools for fixed block volumes relationships............. 556 using the DS CLI ........... 519 Deleting FlashCopy relationships ...... 557 Creating arrays for fixed block volumes using Creating remote FlashCopy transactions ... 558 the DS CLI ............. 521 Resynchronizing FlashCopy relationships ... 560 Creating a rank using the DS CLI ..... 522 Reversing a FlashCopy relationship ..... 560 Creating fixed block volumes using the DS CLI 523 Applying the FlashCopy revertible option to Creating LUN volumes for System i models .. 524 existing FlashCopy relationships ...... 561 Correcting a fixed block configuration error .. 526 Starting a background copy of a FlashCopy Creating fixed block volume groups using the relationship ............. 562 DS CLI .............. 527 Preventing write operations on FlashCopy target Creating a volume group for System i models 528 volumes .............. 563 Configuring Fibre Channel I/O ports using the Creating a FlashCopy target volume on an DS CLI .............. 529 existing Metro Mirror source volume .... 563 Creating SCSI host port connections using DS Discarding changes to FlashCopy target CLI................ 530 volumes .............. 564 Committing data to FlashCopy target volumes 565 iv DS8000 Series Command-Line Interface User's Guide Metro Mirror functions .......... 566 Using fast reverse restore processing to create Displaying the status of established paths ... 566 consistency .............. 610 Displaying the WWNN of a storage unit ... 566 Waiting for the background copy to complete .. 611 Creating remote mirror and copy paths.... 567 Reestablishing the FlashCopy relationships between Correcting a path-related configuration error 568 B volumes and C volumes ......... 611 Removing paths ..........
Recommended publications
  • Disk Clone Industrial
    Disk Clone Industrial USER MANUAL Ver. 1.0.0 Updated: 9 June 2020 | Contents | ii Contents Legal Statement............................................................................... 4 Introduction......................................................................................4 Cloning Data.................................................................................................................................... 4 Erasing Confidential Data..................................................................................................................5 Disk Clone Overview.......................................................................6 System Requirements....................................................................................................................... 7 Software Licensing........................................................................................................................... 7 Software Updates............................................................................................................................. 8 Getting Started.................................................................................9 Disk Clone Installation and Distribution.......................................................................................... 12 Launching and initial Configuration..................................................................................................12 Navigating Disk Clone.....................................................................................................................14
    [Show full text]
  • Your Performance Task Summary Explanation
    Lab Report: 11.2.5 Manage Files Your Performance Your Score: 0 of 3 (0%) Pass Status: Not Passed Elapsed Time: 6 seconds Required Score: 100% Task Summary Actions you were required to perform: In Compress the D:\Graphics folderHide Details Set the Compressed attribute Apply the changes to all folders and files In Hide the D:\Finances folder In Set Read-only on filesHide Details Set read-only on 2017report.xlsx Set read-only on 2018report.xlsx Do not set read-only for the 2019report.xlsx file Explanation In this lab, your task is to complete the following: Compress the D:\Graphics folder and all of its contents. Hide the D:\Finances folder. Make the following files Read-only: D:\Finances\2017report.xlsx D:\Finances\2018report.xlsx Complete this lab as follows: 1. Compress a folder as follows: a. From the taskbar, open File Explorer. b. Maximize the window for easier viewing. c. In the left pane, expand This PC. d. Select Data (D:). e. Right-click Graphics and select Properties. f. On the General tab, select Advanced. g. Select Compress contents to save disk space. h. Click OK. i. Click OK. j. Make sure Apply changes to this folder, subfolders and files is selected. k. Click OK. 2. Hide a folder as follows: a. Right-click Finances and select Properties. b. Select Hidden. c. Click OK. 3. Set files to Read-only as follows: a. Double-click Finances to view its contents. b. Right-click 2017report.xlsx and select Properties. c. Select Read-only. d. Click OK. e.
    [Show full text]
  • IBM Software Defined Storage Guide
    Front cover IBM Software-Defined Storage Guide Larry Coyne Mathias Defiebre Phil Gilmer Shivaramakrishnan Gopalakrishna Mikael Lindström Brandon Mann Gianluca Perilli Mladen Portak Redpaper International Technical Support Organization IBM Software-Defined Storage Guide January 2016 REDP-5121-00 Note: Before using this information and the product it supports, read the information in “Notices” on page v. First Edition (January 2016) This document was created or updated on January 20, 2016. © Copyright International Business Machines Corporation 201. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . .v Trademarks . vi IBM Redbooks promotions . vii Preface . ix Authors. ix Now you can become a published author, too! . xi Comments welcome. xi Stay connected to IBM Redbooks . xi Chapter 1. Why software-defined storage? . 1 1.1 Introduction to the software-defined architecture . 2 1.2 Software-defined infrastructure (SDI) . 2 Chapter 2. Software-defined storage. 7 2.1 Introduction to SDS . 8 2.2 SDS overview . 8 2.2.1 SDS supports emerging as well as traditional IT consumption models . 9 2.2.2 Required SDS Capabilities . 11 2.2.3 SDS Functions . 12 2.3 SDS Data-access protocols . 13 2.4 SDS Reference Architecture . 14 Chapter 3. IBM SDS product offerings . 17 3.1 SDS architecture . 18 3.2 SDS Control Plane . 19 3.2.1 IBM Spectrum Control. 20 3.2.2 IBM Spectrum Protect. 26 3.3 SDS data plane . 32 3.3.1 IBM Spectrum Virtualize . 32 3.3.2 IBM Spectrum Accelerate .
    [Show full text]
  • Introduction to Computer Networking
    www.PDHcenter.com PDH Course E175 www.PDHonline.org Introduction to Computer Networking Dale Callahan, Ph.D., P.E. MODULE 7: Fun Experiments 7.1 Introduction This chapter will introduce you to some networking experiments that will help you improve your understanding and concepts of networks. (The experiments assume you are using Windows, but Apple, Unix, and Linux systems will have similar commands.) These experiments can be performed on any computer that has Internet connectivity. The commands can be used from the command line using the command prompt window. The commands that can be used are ping, tracert, netstat, nslookup, ipconfig, route, ARP etc. 7.2 PING PING is a network tool that is used on TCP/IP based networks. It stands for Packet INternet Groper. The idea is to verify if a network host is reachable from the site where the PING command issued. The ping command uses the ICMP to verify if the network connections are intact. When a PING command is issued, a packet of 64 bytes is sent to the destination computer. The packet is composed of 8 bytes of ICMP header and 56 bytes of data. The computer then waits for a reply from the destination computer. The source computer receives a reply if the connection between the two computers is good. Apart from testing the connection, it also gives the round trip time for a packet to return to the source computer and the amount of packet loss [19]. In order to run the PING command, go to Start ! Run and in the box type “cmd”.
    [Show full text]
  • TB-1052 Digital Video Systems
    IRIS TECHNICAL BULLETIN TB-1052 Digital Video Systems Subject: Installing and Running Check Disk on XP Embedded Systems Hardware: TotalVision-TS Software: IRIS DVS XPe Ver. 11.04 and Earlier (Including FX and non-FX Units) Release Date: 12/22/08 SUMMARY IRIS DVS units initially produced prior to January 1, 2009 may not have complete support for running chkdsk.exe even though the chkdsk.exe file exist in the Windows/System32 directory. This Technical Bulletin describes how to install and run the Check Disk (ChkDsk) utility to minimize file corruption problems and potential RAW Disk failures. INSTALLING SOFTWARE Several additional files are needed to be installed on the DVS hard drive. You can get a copy of these files at the IRIS Web Service Site www.SecurityTexas.com/service. Download the “Check Disk Upgrade” package and follow the instructions in the ReadMe file of that zip file on how to upgrade the files on the DVS. Once the files are copied to the hard drive, highlight the file “EVENTVWR.MSC” and then select “File- >Pin to Start Menu” to provide an easy way to access the Event Viewer. After the required software has been installed run Windows File Explorer and select the C:\BankIRIS_NT directory. Double-click on the AUTOCHECK.REG file. Answer YES in response to the two prompts to update the registry. Expert Mode: To verify that the registry changes were done you can select “Start->Run” and type in “RegEdit.exe” to run the Registry Editor. Select the key “HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Sesion Manager”. Select the key "BootExecute".
    [Show full text]
  • Service Information
    Service Information VAS Tester Number: AVT-14-20 Subject: VAS Diagnostic Device Hard Disc Maintenance Date: Sept. 24, 2014 Supersedes AVT-12-12 due to updated information. 1.0 – Introduction If persistent diagnostic software or Windows® 7 operating system error messages are displayed while installing or using the diagnostic software, use the Windows CHKDSK utility to check hard disk integrity and fix logical file system errors. CHKDSK can also handle some physical errors and may be able to recover lost data that is readable. We recommend the CHKDSK utility be run on a regular basis on all VAS diagnostic devices in service. Consult with your dealership Systems Administrator or IT Professional about checking the integrity of the hard disk as described below on a regular basis, as well as regular performance of the Windows DEFRAG utility. 2.0 – Procedure Prerequisites: Device plugged into power adapter and booted to Windows desktop 1. Go to Windows Start > Computer 2. Right click/select Local Disk (C:) and select Properties from the dropdown menu: Continued… 2/ Page 1 of 3 © 2014 Audi of America, Inc. All rights reserved. Information contained in this document is based on the latest information available at the time of printing and is subject to the copyright and other intellectual property rights of Audi of America, Inc., its affiliated companies and its licensors. All rights are reserved to make changes at any time without notice. No part of this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, nor may these materials be modified or reposted to other sites, without the prior expressed written permission of the publisher.
    [Show full text]
  • 1 Welcome to the Superduper!
    Welcome to the SuperDuper! User’s Guide! This guide is designed to get you up and running as fast as possible. We’ve taken the most common tasks people perform with SuperDuper!, each placed in its own chapter, and have provided step-by-step guidance (including lots of pictures). In here you’ll find out how to: • Back up your Macintosh for the first time • Update an existing backup • Schedule one or multiple backups • Store a backup alongside other files on a destination drive • Back up your Macintosh over a network • Exclude a folder from a backup • Restore files from a backup • Restore an entire drive in an emergency situation • Troubleshooting We’ve also included a complete program reference, and some more advanced topics, such as: • Creating a Sandbox • Maintaining a Sandbox • Applying (and recovering from) System Updates while running from a Sandbox Note that SuperDuper operates in two different “modes” – registered and unregistered. The unregistered version allows easy, complete and user- specific backup clones to partitions, FireWire drives, and image files. 1 Once registered, SuperDuper allows you to schedule backups, quickly update backups with Smart Update (saving a lot of time), select “copy modes” other than Erase, then copy, create Sandboxes, fully customize the copying process using its unique Copy Scripts, save and restore settings, and avoid authenticating every time you copy. And, on top of that, it allows us to eat. Disclaimer Although SuperDuper! has been carefully tested, and should perform its functions without data loss, you use this software at your own risk and without any warranty.
    [Show full text]
  • The UNIX Time- Sharing System
    1. Introduction There have been three versions of UNIX. The earliest version (circa 1969–70) ran on the Digital Equipment Cor- poration PDP-7 and -9 computers. The second version ran on the unprotected PDP-11/20 computer. This paper describes only the PDP-11/40 and /45 [l] system since it is The UNIX Time- more modern and many of the differences between it and older UNIX systems result from redesign of features found Sharing System to be deficient or lacking. Since PDP-11 UNIX became operational in February Dennis M. Ritchie and Ken Thompson 1971, about 40 installations have been put into service; they Bell Laboratories are generally smaller than the system described here. Most of them are engaged in applications such as the preparation and formatting of patent applications and other textual material, the collection and processing of trouble data from various switching machines within the Bell System, and recording and checking telephone service orders. Our own installation is used mainly for research in operating sys- tems, languages, computer networks, and other topics in computer science, and also for document preparation. UNIX is a general-purpose, multi-user, interactive Perhaps the most important achievement of UNIX is to operating system for the Digital Equipment Corpora- demonstrate that a powerful operating system for interac- tion PDP-11/40 and 11/45 computers. It offers a number tive use need not be expensive either in equipment or in of features seldom found even in larger operating sys- human effort: UNIX can run on hardware costing as little as tems, including: (1) a hierarchical file system incorpo- $40,000, and less than two man years were spent on the rating demountable volumes; (2) compatible file, device, main system software.
    [Show full text]
  • IBM DS8870 Architecture and Implementation (Release 7.5)
    Front cover IBM DS8870 Architecture and Implementation (Release 7.5) Bertrand Dufrasne Werner Bauer Artur Borowicz Adrian Orben Robert Tondini Bob Xiao Redbooks International Technical Support Organization IBM DS8870 Architecture and Implementation (Release 7.5) July 2015 SG24-8085-05 Note: Before using this information and the product it supports, read the information in “Notices” on page xi. Sixth Edition (July 2015) This edition applies to Release 7.5 (DS8000 License Machine Code 7.7.50.xx.xx , bundle version 87.51.52.xx, or later) of the IBM DS8870 (MachineType 2421, 2422, 2423, and 2424). © Copyright International Business Machines Corporation 2013, 2015. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . xi Trademarks . xii IBM Redbooks promotions . xiii Preface . .xv Authors. xvi Now you can become a published author, too! . xvii Comments welcome. xviii Stay connected to IBM Redbooks . xviii Part 1. Concepts and architecture. 1 Chapter 1. Introduction to the IBM DS8870 . 3 1.1 Introduction to the IBM DS8870 . 4 1.1.1 Features of the DS8870 . 5 1.2 DS8870 controller options and frames . 9 1.3 DS8870 architecture and functions overview . 11 1.3.1 Overall architecture and components . 11 1.3.2 Storage capacity . 14 1.3.3 Supported environments. 15 1.3.4 Configuration flexibility . 15 1.3.5 Copy Services functions . 17 1.3.6 Service and setup . 18 1.3.7 IBM Certified Secure Data Overwrite . 18 1.4 Performance features . 19 1.4.1 16 Gbps host adapters .
    [Show full text]
  • Extended Picodos Reference Manual
    Extended PicoDOS® Reference Manual SCHOOL OF OCEANOGRAPHY and APPLIED PHYSICS LABORATORY UNIVERSITY OF WASHINGTON v66.06 July 2009 Chapter 1 Introduction and Conventions 1.1 Introduction This manual is a reference to extensions to the PicoDOS® operating system command set implemented in the Seaglider operating code. PicoDOS® is a registered trademark of Persistor Instruments, Inc., Bourne MA, USA. The version number of this document coincides with the version of the main Seaglider operating code in which these extensions exist. These extensions either make new functions available from the PicoDOS® prompt, or extend the capabilities of existing functions. Commands are only available through the Seaglider operating code, which intercepts and interprets the commands, passing them to PicoDOS® as appropriate. While in this mode, the Seaglider code passes any command not explicitly recognized as an extended PicoDOS® command on to PicoDOS® itself for execution. Limited error reporting exists in this case. The extensions are accessible at the PicoDOS® prompt available from the main menu when connected directly to a Seaglider (exceptions as noted below), or by uploading the pdoscmds.bat file when the Seaglider is operating autonomously. In the former case, the Seaglider code displays a standard PicoDOS® prompt (picoDOS>) with an extra ' >', as follows. picoDOS>> In the latter case, results of the extended PicoDOS® commands are captured to a file and transferred to the Seaglider basestation (in compressed form, named sg0055pz.000, using "0055" as a placeholder for dive number, and "000" for increment number) following execution of the commands. The basestation renames this file per the p1230055.000.pdos convention.
    [Show full text]
  • Digital Backend Software Command Set – Ver
    DBE Memo#12.1 Mark 5 Memo #090.1 MASSACHUSETTS INSTITUTE OF TECHNOLOGY HAYSTACK OBSERVATORY WESTFORD, MASSACHUSETTS 01886 5 June, 2012 Telephone: 781-981-5951 Fax: 781-981-0590 TO: Distribution FROM: Chester Ruszczyk, Mikael Taveniku SUBJECT: Digital Backend Software Command Set – Ver. 1.2 1. Introduction This document describes the command set that the program to be used as the primary software interface on the second generation VLBI digital backends must support. This program will be the command and control interface for the embedded device. The name of the application is rdbe_server, for DBE command and control server daemon, where RDBE refers to the ROACH Digital Backend. The standard method of communication with the application will be via a TCP connection to port 5000 via the standard 10/100/1000 Mbps Ethernet interface. Multiple simultaneously connections, up to a maximum supplied by a command line argument, are allowed, with commands and queries being executed in the order received, regardless of their origin. The VSI-S specification defines the syntax of communication into and out of the RDBE. 2. Notes on RDBE Command Set Note the following with respect to the command set: 1. All of the commands/queries expect the VSI-S communications protocol and command/response syntax. 2. Commands/queries are case insensitive. RDBE COMMAND SET – Ver.1.2 1 3. VSI-S Command, Query and Response Syntax The following explanation of the VSI-S syntax may be useful in understanding the structure of commands, queries, and their respective responses. This explanation has been lifted directly from the VSI-S specification.
    [Show full text]
  • The Linux Command Line
    The Linux Command Line Second Internet Edition William E. Shotts, Jr. A LinuxCommand.org Book Copyright ©2008-2013, William E. Shotts, Jr. This work is licensed under the Creative Commons Attribution-Noncommercial-No De- rivative Works 3.0 United States License. To view a copy of this license, visit the link above or send a letter to Creative Commons, 171 Second Street, Suite 300, San Fran- cisco, California, 94105, USA. Linux® is the registered trademark of Linus Torvalds. All other trademarks belong to their respective owners. This book is part of the LinuxCommand.org project, a site for Linux education and advo- cacy devoted to helping users of legacy operating systems migrate into the future. You may contact the LinuxCommand.org project at http://linuxcommand.org. This book is also available in printed form, published by No Starch Press and may be purchased wherever fine books are sold. No Starch Press also offers this book in elec- tronic formats for most popular e-readers: http://nostarch.com/tlcl.htm Release History Version Date Description 13.07 July 6, 2013 Second Internet Edition. 09.12 December 14, 2009 First Internet Edition. 09.11 November 19, 2009 Fourth draft with almost all reviewer feedback incorporated and edited through chapter 37. 09.10 October 3, 2009 Third draft with revised table formatting, partial application of reviewers feedback and edited through chapter 18. 09.08 August 12, 2009 Second draft incorporating the first editing pass. 09.07 July 18, 2009 Completed first draft. Table of Contents Introduction....................................................................................................xvi
    [Show full text]