Managing Systems and Workgroups: A Guide for HP-UX System Administrators
Index
1016
defined, 578
rrestore, 675
ruid
how set, 775
ruid (real user ID), 774
run level
checking, 882
run-level
changing, 253
configuration, 515
creating new, 253
description, 252
for HP VUE, 252
runstate, 258
runtime dump device definitions, 546
rvxdump, 675
rvxrestore, 675
S
SAM, 36, 737
adding a disk, 861
adding a local disk drive, 926
adding a local printer, 434
adding a logical volume, 862
adding a remote printer, 436
adding cluster clients, 919
adding LV with mirroring, 863
adding network-based printer, 439
adding printer, 434
asynchronous writes, 731
automated backup schedule, 690
Define Clients form, 908, 919
diagramming server’s disks, 882
displaying device information, 144
enabling or disabling a printer, 704
exporting file system, 395
extending a logical volume, 864
hanging, 144
importing file system, 399
introduction, 141
ioscan, 144
log files, 925
mirroring tasks, 628
mounting a file system, 606
online help, 918
order of printing, 705
print requests, 704
printer class, 439
remote system administration, 143
removing a logical volume, 870
removing a mirror from a logical volume,
870
removing printer from LP spooler, 440
restoring data, 697
Restricted, 143, 745
restricted, 774
starting, 142
stopping and restarting the LP spooler, 703
swap, managing, 670
text terminal, 143
time and date, 268
unmounting a file system, 609
user IDs, 622
X Window System, 143
sam, 142
savecore, 671
savecrash, 539, 553
saving crash dumps
compressed, 542
compressed versus non-compressed, 539
non-compressed, 542
partial saves, 539, 542
scheduling a cron job, 888
SCM, 36
SCR, 37
SCSI interface type, 567
scss command, 757
secondary swap, 663
configuration, 670
securing consolidated logs, 234
security
Bastille, 815
breach, 780
developing a policy, 744
device file, 772
disk partitions, 773
for device files, 772
for NFS diskless clusters, 900
guidelines, 745
HP bulletins, 746
initialization, 777
liability for, 741
on a network, 783
passwords, 748
planning, 744
practices, 744
protecting user accounts, 772
reference, 742
reporting vulnerabilities, 747