UNIX in a NUTSHELL ,TITLE.12845 Page Ii Tuesday, August 22, 2006 4:51 PM

Total Page:16

File Type:pdf, Size:1020Kb

UNIX in a NUTSHELL ,TITLE.12845 Page Ii Tuesday, August 22, 2006 4:51 PM ,TITLE.12845 Page i Tuesday, August 22, 2006 4:51 PM UNIX IN A NUTSHELL ,TITLE.12845 Page ii Tuesday, August 22, 2006 4:51 PM Other resources from O’Reilly Related titles Classic Shell Scripting Managing Projects with Effective awk GNU Make Programming Running Linux Essential CVS sed and awk Pocket Essential System Reference Administration TCP/IP Network GDB Pocket Reference Administration Learning GNU Emacs The Complete FreeBSD Learning the bash Shell Unix Power Tools Learning the Korn Shell Using csh & tcsh Learning the vi Editor Version Control with Linux in a Nutshell Subversion Mac OS X Tiger for Unix Geeks oreilly.com oreilly.com is more than a complete catalog of O’Reilly books. You'll also find links to news, events, articles, weblogs, sample chapters, and code examples. Conferences O’Reilly brings diverse innovators together to nurture the ideas that spark revolutionary industries. We specialize in documenting the latest tools and systems, translating the innovator’s knowledge into useful skills for those in the trenches. Visit conferences.oreilly.com for our upcoming events. Safari Bookshelf (safari.oreilly.com) is the premier online reference library for programmers and IT professionals. Conduct searches across more than 1,000 books. Sub- scribers can zero in on answers to time-critical questions in a matter of seconds. Read the books on your Book- shelf from cover to cover or simply flip to the page you need. Try it today for free. ,TITLE.12845 Page iii Tuesday, August 22, 2006 4:51 PM UNIX IN A NUTSHELL Fourth Edition Arnold Robbins Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo ,COPYRIGHT.12974 Page iv Tuesday, August 22, 2006 4:52 PM Unix in a Nutshell, Fourth Edition by Arnold Robbins Copyright © 2006, 1999, 1992, 1989 O’Reilly Media, Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (safari.oreilly.com). For more information, contact our corporate/institutional sales department: (800) 998-9938 or [email protected]. Editor: Mike Loukides Production Editor: Colleen Gorman Cover Designer: Edie Freedman Interior Designer: David Futato Back Cover Illustration: J.D. “Illiad” Frazer Printing History: May 1989: First Edition. June 1992: Second Edition. August 1999: Third Edition. October 2005: Fourth Edition. Nutshell Handbook, the Nutshell Handbook logo, and the O’Reilly logo are registered trademarks of O’Reilly Media, Inc. The In a Nutshell series designations, Unix in a Nutshell, the image of a tarsier, and related trade dress are trademarks of O’Reilly Media, Inc. Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O’Reilly Media, Inc. was aware of a trademark claim, the designations have been printed in caps or initial caps. UNIX is a registered trademark of The Open Group. While every precaution has been taken in the preparation of this book, the publisher and author assume no responsibility for errors or omissions, or for damages resulting from the use of the information contained herein. ISBN: 0-596-10029-9 [M] [8/06] To my wife, Miriam. May our dreams continue to come true. To my children, Chana, Rivka, Nachum, and Malka. To the memory of Frank Willison. Chapter 1 Table of Contents Preface . xiii Part I. Commands and Shells 1. Introduction . 3 Unix in the 21st Century 3 Obtaining Compilers 5 Building Software 6 What’s in the Quick Reference 7 Beginner’s Guide 8 Solaris: Standard Compliant Programs 11 2. Unix Commands . 13 Introduction 13 Alphabetical Summary of Common Commands 15 Alphabetical Summary of Solaris Commands 241 Alphabetical Summary of GNU/Linux Commands 260 Alphabetical Summary of Mac OS X Commands 304 Alphabetical Summary of Java Commands 321 3. The Unix Shell: An Overview . 341 Introduction to the Shell 341 Purpose of the Shell 342 Shell Flavors 343 vii This is the Title of the Book, eMatter Edition Copyright © 2006 O’Reilly & Associates, Inc. All rights reserved. Shell Source Code URLs 344 Common Features 344 Differing Features 345 4. The Bash and Korn Shells . 347 Overview of Features 348 Invoking the Shell 349 Syntax 350 Functions 357 Variables 358 Arithmetic Expressions 366 Command History 368 Job Control 372 Command Execution 372 Restricted Shells 373 Built-in Commands (Bash and Korn Shells) 374 5. tcsh: An Extended C Shell . 417 Overview of Features 417 Invoking the Shell 418 Syntax 419 Variables 423 Expressions 435 Command History 438 Command-Line Manipulation 442 Job Control 445 Built-in Commands 446 6. Package Management . 467 Linux Package Management 467 The Red Hat Package Manager 470 Yum: Yellowdog Updater Modified 484 up2date: Red Hat Update Agent 489 The Debian Package Manager 492 Mac OS X Package Management 520 Solaris Package Management 521 viii | Table of Contents This is the Title of the Book, eMatter Edition Copyright © 2006 O’Reilly & Associates, Inc. All rights reserved. Part II. Text Editing and Processing 7. Pattern Matching . 535 Filenames Versus Patterns 535 Metacharacters 536 Metacharacters, Listed by Unix Program 538 Examples of Searching 539 8. The Emacs Editor . 543 Conceptual Overview 543 Command-Line Syntax 545 Summary of Commands by Group 546 Summary of Commands by Key 552 Summary of Commands by Name 555 9. The vi, ex, and vim Editors . 561 Conceptual Overview 561 Command-Line Syntax 562 Review of vi Operations 565 vi Commands 567 vi Configuration 574 ex Basics 579 Alphabetical Summary of ex Commands 580 10. The sed Editor . 595 Conceptual Overview 595 Command-Line Syntax 596 Syntax of sed Commands 598 Group Summary of sed Commands 600 Alphabetical Summary of sed Commands 601 11. The awk Programming Language . 611 Conceptual Overview 611 Command-Line Syntax 613 Patterns and Procedures 614 Built-in Variables 616 Operators 617 Variable and Array Assignment 618 User-Defined Functions 619 Gawk-Specific Features 620 Table of Contents | ix This is the Title of the Book, eMatter Edition Copyright © 2006 O’Reilly & Associates, Inc. All rights reserved. Implementation Limits 622 Group Listing of awk Functions and Commands 623 Alphabetical Summary of awk Functions and Commands 623 Output Redirections 632 Source Code 634 Part III. Software Development 12. Source Code Management: An Overview . 637 Introduction and Terminology 637 Usage Models 639 Unix Source Code Management Systems 640 Other Source Code Management Systems 641 13. The Revision Control System . 643 Overview of Commands 643 Basic Operation 644 General RCS Specifications 645 Alphabetical Summary of Commands 649 14. The Concurrent Versions System . 659 Conceptual Overview 659 Command-Line Syntax and Options 661 Dot Files 664 Environment Variables 665 Keywords and Keyword Modes 667 Dates 669 CVSROOT Variables 672 Alphabetical Summary of Commands 674 15. The Subversion Version Control System . 697 Conceptual Overview 697 Obtaining Subversion 702 Using Subversion: A Quick Tour 704 The Subversion Command Line Client: svn 706 Repository Administration: svnadmin 733 Examining the Repository: svnlook 737 Providing Remote Access: svnserve 742 Other Subversion Components 743 x | Table of Contents This is the Title of the Book, eMatter Edition Copyright © 2006 O’Reilly & Associates, Inc. All rights reserved. 16. The GNU make Utility . 745 Conceptual Overview 745 Command-Line Syntax 746 Makefile Lines 749 Macros 754 Special Target Names 761 Writing Command Lines 762 17. The GDB Debugger . 765 Conceptual Overview 765 Command-Line Syntax 768 Initialization Files 770 GDB Expressions 771 The GDB Text User Interface 773 Group Listing of GDB Commands 773 Summary of set and show Commands 777 Summary of the info Command 788 Alphabetical Summary of GDB Commands 790 18. Writing Manual Pages . 813 Introduction 813 Overview of nroff/troff 814 Alphabetical Summary of man Macros 819 Predefined Strings 823 Internal Names 823 Sample Document 823 Part IV. References ISO 8859-1 (Latin-1) Character Set . 829 Bibliography . 837 Index . 849 Table of Contents | xi This is the Title of the Book, eMatter Edition Copyright © 2006 O’Reilly & Associates, Inc. All rights reserved. Chapter 2 Preface The fourth edition of Unix in a Nutshell brings the book into the 21st century. The term “UNIX” is a registered trademark of The Open Group. It is used for branding systems as compliant with the various standards that collectively define the behavior of a modern Unix system. More informally though, many systems in use today are Unix work-alikes, even though their source code base was devel- oped independently from the original Unix systems. Thus, the goal of this edition to present the broader state of Unix in today’s world. In particular, it’s important to cover both the commercial variants, and those where source code for the system and the utilities are freely available. To this end, we have chosen to cover these systems, which are representative of “Unix” today: Solaris 10 Solaris is the most popular commercial system based on the original Unix System V code base. GNU/Linux GNU/Linux systems have gained a huge foothold in the commercial market- place. While currently used most heavily for back-end servers, GNU/Linux is also starting to gain ground in the desktop market. Mac OS X Apple’s rewrite of their operating system has a core based on Mach and various BSD technologies. The command set is derived from FreeBSD. Thus, besides having an exciting user interface, Mac OS X is representative of the BSD strain of free Unix-like systems. The commands covered by the current POSIX standard form the core of our presen- tation. Each specific system has commands that are unique to it; these are covered too.
Recommended publications
  • Unix Introduction
    Unix introduction Mikhail Dozmorov Summer 2018 Mikhail Dozmorov Unix introduction Summer 2018 1 / 37 What is Unix Unix is a family of operating systems and environments that exploits the power of linguistic abstractions to perform tasks Unix is not an acronym; it is a pun on “Multics”. Multics was a large multi-user operating system that was being developed at Bell Labs shortly before Unix was created in the early ’70s. Brian Kernighan is credited with the name. All computational genomics is done in Unix http://www.read.seas.harvard.edu/~kohler/class/aosref/ritchie84evolution.pdfMikhail Dozmorov Unix introduction Summer 2018 2 / 37 History of Unix Initial file system, command interpreter (shell), and process management started by Ken Thompson File system and further development from Dennis Ritchie, as well as Doug McIlroy and Joe Ossanna Vast array of simple, dependable tools that each do one simple task Ken Thompson (sitting) and Dennis Ritchie working together at a PDP-11 Mikhail Dozmorov Unix introduction Summer 2018 3 / 37 Philosophy of Unix Vast array of simple, dependable tools Each do one simple task, and do it really well By combining these tools, one can conduct rather sophisticated analyses The Linux help philosophy: “RTFM” (Read the Fine Manual) Mikhail Dozmorov Unix introduction Summer 2018 4 / 37 Know your Unix Unix users spend a lot of time at the command line In Unix, a word is worth a thousand mouse clicks Mikhail Dozmorov Unix introduction Summer 2018 5 / 37 Unix systems Three common types of laptop/desktop operating systems: Windows, Mac, Linux. Mac and Linux are both Unix-like! What that means for us: Unix-like operating systems are equipped with “shells”" that provide a command line user interface.
    [Show full text]
  • Kutrace: Where Have All the Nanoseconds Gone?
    KUTrace: Where have all the nanoseconds gone? Richard Sites, Invited Professor EPFL 2017.10.27 Tracing Summit 2017, Prague Richard Sites 2017.10.27 Outline Observability problem statement KUTrace solution Tracing design goals Goals drive the design Results Display Design Comparisons Conclusions Richard Sites 2017.10.27 Observability problem statement Richard Sites 2017.10.27 3 Problem statement This talk is about tail latency in real user-facing datacenter transactions. It is not about batch processing throughput, nor about benchmarks. Context: A datacenter of perhaps 20,000 servers running software services that spread work for a user-facing transaction across a few hundred or thousand machines in parallel. Each server handles hundreds of transactions per second. Some transactions are unusually slow, but not repeatably. Slow transactions occur unpredictably, but there are several per minute. We wish to observe where all the time goes in such transactions, and observe why they are slow. Richard Sites 2017.10.27 Problem statement ☞ Some transactions are unusually slow, but not repeatably. ∴ There is some source of interference just before or during a slow transaction. Understanding tail latency requires complete traces of CPU events over a few minutes, with small enough CPU and memory overhead to be usable under busiest-hour live load. Existing tracing tools have much-too-high overhead. Problem: build better tail-latency observation tools Richard Sites 2017.10.27 KUTrace solution Richard Sites 2017.10.27 6 KUTrace solution KUTrace uses minimal Linux kernel patches on a single server to trace every transition between kernel- and user-mode execution, on every CPU core, with small enough overhead to use routinely on live loads.
    [Show full text]
  • Ubuntu Kung Fu
    Prepared exclusively for Alison Tyler Download at Boykma.Com What readers are saying about Ubuntu Kung Fu Ubuntu Kung Fu is excellent. The tips are fun and the hope of discov- ering hidden gems makes it a worthwhile task. John Southern Former editor of Linux Magazine I enjoyed Ubuntu Kung Fu and learned some new things. I would rec- ommend this book—nice tips and a lot of fun to be had. Carthik Sharma Creator of the Ubuntu Blog (http://ubuntu.wordpress.com) Wow! There are some great tips here! I have used Ubuntu since April 2005, starting with version 5.04. I found much in this book to inspire me and to teach me, and it answered lingering questions I didn’t know I had. The book is a good resource that I will gladly recommend to both newcomers and veteran users. Matthew Helmke Administrator, Ubuntu Forums Ubuntu Kung Fu is a fantastic compendium of useful, uncommon Ubuntu knowledge. Eric Hewitt Consultant, LiveLogic, LLC Prepared exclusively for Alison Tyler Download at Boykma.Com Ubuntu Kung Fu Tips, Tricks, Hints, and Hacks Keir Thomas The Pragmatic Bookshelf Raleigh, North Carolina Dallas, Texas Prepared exclusively for Alison Tyler Download at Boykma.Com Many of the designations used by manufacturers and sellers to distinguish their prod- ucts are claimed as trademarks. Where those designations appear in this book, and The Pragmatic Programmers, LLC was aware of a trademark claim, the designations have been printed in initial capital letters or in all capitals. The Pragmatic Starter Kit, The Pragmatic Programmer, Pragmatic Programming, Pragmatic Bookshelf and the linking g device are trademarks of The Pragmatic Programmers, LLC.
    [Show full text]
  • Magic Iso Burn Iso Download
    Magic Iso Burn Iso Download 1 / 5 Magic Iso Burn Iso Download 2 / 5 3 / 5 Magic Iso Burn Iso Download PcDownload Magic Iso MakerMagicISO can also convert any image file format including BIN to the standard ISO format. 1. magic burns 2. magic burning paper 3. magic burns ilona andrews Main features Copy:Magic ISO offers the possibility to generate an exact replica of a CD or DVD and save it on the hard drive.. 2 Ability to directly add/delete/rename/extract file(s) within image files 3 Convert image files to the standard ISO format(Include BIN to ISO,NRG to ISO,CIF to ISO converter etc).. Duplicate disc to ISO file from CD-ROM 7 Magic ISO maker embed with Windows Explorer. magic burns magic burns, magic burner, magic burning paper, magic burns series, magic burns ilona andrews, magic burn deck, magic burns 9 times, magic burn books, magic burns audiobook, magic burner twitter Tdu 2 Iso Download Torrent Features:1 Process almost all CD-ROM image file(s) including (ISO,BIN,NRG,CRF,BWI,BWT,LCD,CUE,CCD,MDF,MDS,VCD,CIF,FCD,VDI,C2D,DMG,IMG,etc).. Create Multi- Bootable CD/DVD image file 14 Open/extract/edit floppy disk image file.. It can also compatible with different files such as uif and bif Magic ISO Maker can convert bin to iso and vice versa.. MagicISO is a powerful CD/DVD image file editor, CD burner, and CD/DVD backup tool. Free download concert papa roach paris 2015 for windows 10 Qgis-user Help Installing Ecw Plugin For Mac magic burning paper 4 / 5 Ana Popovic Hush Rar Magic ISO Maker 5 5 Full + Crack Key is an essential program that will let the user the capability to create, extract, edit and also burn image files.
    [Show full text]
  • A Modern Introduction to Programming
    Eloquent JavaScript A Modern Introduction to Programming Marijn Haverbeke Copyright © 2014 by Marijn Haverbeke This work is licensed under a Creative Commons attribution-noncommercial license (http://creativecommons.org/licenses/by-nc/3.0/). All code in the book may also be considered licensed under an MIT license (http://opensource. org/licenses/MIT). The illustrations are contributed by various artists: Cover by Wasif Hyder. Computer (introduction) and unicycle people (Chapter 21) by Max Xiantu. Sea of bits (Chapter 1) and weresquirrel (Chapter 4) by Margarita Martínez and José Menor. Octopuses (Chapter 2 and 4) by Jim Tierney. Object with on/off switch (Chapter 6) by Dyle MacGre- gor. Regular expression diagrams in Chapter 9 generated with regex- per.com by Jeff Avallone. Game concept for Chapter 15by Thomas Palef. Pixel art in Chapter 16 by Antonio Perdomo Pastor. The second edition of Eloquent JavaScript was made possible by 454 financial backers. You can buy a print version of this book, with an extra bonus chapter included, printed by No Starch Press at http://www.amazon.com/gp/product/ 1593275846/ref=as_li_qf_sp_asin_il_tl?ie=UTF8&camp=1789&creative=9325&creativeASIN= 1593275846&linkCode=as2&tag=marijhaver-20&linkId=VPXXXSRYC5COG5R5. i Contents On programming .......................... 2 Why language matters ....................... 5 What is JavaScript? ......................... 9 Code, and what to do with it ................... 11 Overview of this book ........................ 12 Typographic conventions ...................... 14 1 Values, Types, and Operators 15 Values ................................. 16 Numbers ............................... 17 Strings ................................ 21 Unary operators ........................... 22 Boolean values ............................ 23 Undefined values ........................... 26 Automatic type conversion ..................... 27 Summary ............................... 30 2 Program Structure 32 Expressions and statements .................... 32 Variables ..............................
    [Show full text]
  • UNIX Version 7 Volume 1
    UNIXTM TIME-SHARING SYSTEM: UNIX PROGRAMMER'S MANUAL Seventh Edition, Volume 1 January, 1979 Bell Telephone Laboratories, Incorporated Murray Hill, New Jersey PREFACE Although this Seventh Edition no longer bears their byline, Ken Thompson and Dennis Ritchie remain the fathers and preceptors of the UNIX² time-sharing system. Many of the improvements here described bear their mark. Among many, many other people who have contributed to the further ¯owering of UNIX, we wish especially to acknowledge the contributions of A. V. Aho, S. R. Bourne, L. L. Cherry, G. L. Chesson, S. I. Feldman, C. B. Haley, R. C. Haight, S. C. Johnson, M. E. Lesk, T. L. Lyon, L. E. McMahon, R. Morris, R. Muha, D. A. Nowitz, L. Wehr, and P. J. Weinberger. We appreciate also the effective advice and criticism of T. A. Dolotta, A. G. Fraser, J. F. Maranzano, and J. R. Mashey; and we remember the important work of the late Joseph F. Ossanna. B. W. Kernighan M. D. McIlroy __________________ ²UNIX is a Trademark of Bell Laboratories. INTRODUCTION TO VOLUME 1 This volume gives descriptions of the publicly available features of the UNIX² system. It does not attempt to provide perspective or tutorial information upon the UNIX operating system, its facilities, or its implementation. Various documents on those topics are contained in Volume 2. In particular, for an overview see `The UNIX Time-Sharing System' by Ritchie and Thompson; for a tutorial see `UNIX for Beginners' by Kernighan. Within the area it surveys, this volume attempts to be timely, complete and concise. Where the latter two objectives con¯ict, the obvious is often left unsaid in favor of brevity.
    [Show full text]
  • How to Create a Custom Live CD for Secure Remote Incident Handling in the Enterprise
    How to Create a Custom Live CD for Secure Remote Incident Handling in the Enterprise Abstract This paper will document a process to create a custom Live CD for secure remote incident handling on Windows and Linux systems. The process will include how to configure SSH for remote access to the Live CD even when running behind a NAT device. The combination of customization and secure remote access will make this process valuable to incident handlers working in enterprise environments with limited remote IT support. Bert Hayes, [email protected] How to Create a Custom Live CD for Remote Incident Handling 2 Table of Contents Abstract ...........................................................................................................................................1 1. Introduction ............................................................................................................................5 2. Making Your Own Customized Debian GNU/Linux Based System........................................7 2.1. The Development Environment ......................................................................................7 2.2. Making Your Dream Incident Handling System...............................................................9 2.3. Hardening the Base Install.............................................................................................11 2.3.1. Managing Root Access with Sudo..........................................................................11 2.4. Randomizing the Handler Password at Boot Time ........................................................12
    [Show full text]
  • Debugging Kernel Problems
    Debugging Kernel Problems by GregLehey Edition for AsiaBSDCon 2004 Taipei, 13 March 2004 Debugging Kernel Problems by GregLehey([email protected]) Copyright © 1995-2004 GregLehey 3Debugging Kernel Problems Preface Debugging kernel problems is a black art. Not manypeople do it, and documentation is rare, in- accurate and incomplete. This document is no exception: faced with the choice of accuracyand completeness, I chose to attempt the latter.Asusual, time was the limiting factor,and this draft is still in beta status. This is a typical situation for the whole topic of kernel debugging: building debug tools and documentation is expensive,and the people who write them are also the people who use them, so there'satendencytobuild as much of the tool as necessary to do the job at hand. If the tool is well-written, it will be reusable by the next person who looks at a particular area; if not, it might fall into disuse. Consider this book a starting point for your own develop- ment of debugging tools, and remember: more than anywhere else, this is an area with ``some as- sembly required''. Debugging Kernel Problems 4 1 Introduction Operating systems fail. All operating systems contain bugs, and theywill sometimes cause the system to behave incorrectly.The BSD kernels are no exception. Compared to most other oper- ating systems, both free and commercial, the BSD kernels offer a large number of debugging tools. This tutorial examines the options available both to the experienced end user and also to the developer. In this tutorial, we’ll look at the following topics: • Howand whykernels fail.
    [Show full text]
  • Cygwin User's Guide
    Cygwin User’s Guide Cygwin User’s Guide ii Copyright © Cygwin authors Permission is granted to make and distribute verbatim copies of this documentation provided the copyright notice and this per- mission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this documentation under the conditions for verbatim copying, provided that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this documentation into another language, under the above conditions for modified versions, except that this permission notice may be stated in a translation approved by the Free Software Foundation. Cygwin User’s Guide iii Contents 1 Cygwin Overview 1 1.1 What is it? . .1 1.2 Quick Start Guide for those more experienced with Windows . .1 1.3 Quick Start Guide for those more experienced with UNIX . .1 1.4 Are the Cygwin tools free software? . .2 1.5 A brief history of the Cygwin project . .2 1.6 Highlights of Cygwin Functionality . .3 1.6.1 Introduction . .3 1.6.2 Permissions and Security . .3 1.6.3 File Access . .3 1.6.4 Text Mode vs. Binary Mode . .4 1.6.5 ANSI C Library . .4 1.6.6 Process Creation . .5 1.6.6.1 Problems with process creation . .5 1.6.7 Signals . .6 1.6.8 Sockets . .6 1.6.9 Select . .7 1.7 What’s new and what changed in Cygwin . .7 1.7.1 What’s new and what changed in 3.2 .
    [Show full text]
  • Magic Iso Maker Full Version Download Magiciso Virtual CD/DVD-ROM 5.6
    magic iso maker full version download MagicISO Virtual CD/DVD-ROM 5.6. MagicDisc is freeware. It is very helpful utility designed for creating and managing virtual CD drives and CD/DVD discs. For anyone who deals with CD-based programs it is a must. Download. What's New. Certified. Similar to 4. MagicDisc allows you to use almost all CD/DVD image without burning them onto CD or DVD in order to easily access your favorite games, music, or software programs - It works like a real CD/DVD-ROM: You can run programs, play games, or listen to music from your virtual CD- ROM. Allowing you to run your game images at over 200x faster than from a conventional CD/DVD-ROM. MagicDisc is a powerful utility that uses a unique combination of options to ensure a perfect back-up every time. Partner with MagicISO, Your original games/program discs can be safely stored away, MagicISO mean that you always have your expensive media stored safely as CD/DVD image file on your hard drive, and use them with MagicDisc just like using the original discs. At the office: Program discs and many other applications generally require the original disc to be in the computer's CD-ROM drive. This restricts the amount of people in your office who can have access to the same software at the same time without the cost of additional discs. MagicDisc virtual drives resolve that problem for you. No more hunting around the offices for that elusive disc you need to run your application, everything you require is just a click away.
    [Show full text]
  • Solaris Advanced User's Guide
    Solaris Advanced User’s Guide Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 U.S.A. Part No: 806–7612–10 May 2002 Copyright 2002 Sun Microsystems, Inc. 4150 Network Circle, Santa Clara, CA 95054 U.S.A. All rights reserved. This product or document is protected by copyright and distributed under licenses restricting its use, copying, distribution, and decompilation. No part of this product or document may be reproduced in any form by any means without prior written authorization of Sun and its licensors, if any. Third-party software, including font technology, is copyrighted and licensed from Sun suppliers. Parts of the product may be derived from Berkeley BSD systems, licensed from the University of California. UNIX is a registered trademark in the U.S. and other countries, exclusively licensed through X/Open Company, Ltd. Sun, Sun Microsystems, the Sun logo, docs.sun.com, AnswerBook, AnswerBook2, SunOS, and Solaris are trademarks, registered trademarks, or service marks of Sun Microsystems, Inc. in the U.S. and other countries. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the U.S. and other countries. Products bearing SPARC trademarks are based upon an architecture developed by Sun Microsystems, Inc. The OPEN LOOK and Sun™ Graphical User Interface was developed by Sun Microsystems, Inc. for its users and licensees. Sun acknowledges the pioneering efforts of Xerox in researching and developing the concept of visual or graphical user interfaces for the computer industry. Sun holds a non-exclusive license from Xerox to the Xerox Graphical User Interface, which license also covers Sun’s licensees who implement OPEN LOOK GUIs and otherwise comply with Sun’s written license agreements.
    [Show full text]
  • In Search of the Ideal Storage Configuration for Docker Containers
    In Search of the Ideal Storage Configuration for Docker Containers Vasily Tarasov1, Lukas Rupprecht1, Dimitris Skourtis1, Amit Warke1, Dean Hildebrand1 Mohamed Mohamed1, Nagapramod Mandagere1, Wenji Li2, Raju Rangaswami3, Ming Zhao2 1IBM Research—Almaden 2Arizona State University 3Florida International University Abstract—Containers are a widely successful technology today every running container. This would cause a great burden on popularized by Docker. Containers improve system utilization by the I/O subsystem and make container start time unacceptably increasing workload density. Docker containers enable seamless high for many workloads. As a result, copy-on-write (CoW) deployment of workloads across development, test, and produc- tion environments. Docker’s unique approach to data manage- storage and storage snapshots are popularly used and images ment, which involves frequent snapshot creation and removal, are structured in layers. A layer consists of a set of files and presents a new set of exciting challenges for storage systems. At layers with the same content can be shared across images, the same time, storage management for Docker containers has reducing the amount of storage required to run containers. remained largely unexplored with a dizzying array of solution With Docker, one can choose Aufs [6], Overlay2 [7], choices and configuration options. In this paper we unravel the multi-faceted nature of Docker storage and demonstrate its Btrfs [8], or device-mapper (dm) [9] as storage drivers which impact on system and workload performance. As we uncover provide the required snapshotting and CoW capabilities for new properties of the popular Docker storage drivers, this is a images. None of these solutions, however, were designed with sobering reminder that widespread use of new technologies can Docker in mind and their effectiveness for Docker has not been often precede their careful evaluation.
    [Show full text]