HP-UX Reference (11i v2 07/12) - 7 Device (Special) Files, 9 General Information, Index (vol 10)

Index
All Volumes
Description Entry Name(Section)
scroll() - scroll a curses window ...................................................................................................... scroll(3X)
scroll the window, enhanced curses ......................................................................................................... scrl(3X)
scroll_lines - number of scrollable lines used by the Internal Terminal Emulator ................... scroll_lines(5)
scrollable lines used by the Internal Terminal Emulator (ITE), number of ................................... scroll_lines(5)
scrollok() - terminal output control functions .............................................................................. clearok(3X)
SCSI device, control a ........................................................................................................................ scsictl(1M)
SCSI direct access device driver (sdisk) ............................................................................................ scsi_disk(7)
SCSI media changer device drivers ............................................................................................ autochanger(7)
SCSI pass-through device driver ......................................................................................................... scsi_ctl(7)
SCSI pass-through device driver .......................................................................................................... sioc_io(7)
SCSI (SAS) Mass Storage I/O cards / HBAs; utility to manage HP-UX Serial Attached .................... sasmgr(1M)
SCSI sequential access (tape) device driver ...................................................................................... scsi_tape(7)
scsi - Small Computer System Interface device drivers ........................................................................... scsi(7)
SCSI subsystem, enable/disable the use of a device’s write cache in the ................................. default_disk_ir(5)
scsi_ctl - SCSI pass-through device driver ...................................................................................... scsi_ctl(7)
scsi_disk - SCSI direct access device driver (sdisk) ....................................................................... scsi_disk(7)
scsi_max_qdepth - maximum number of I/Os that target will queue up for execution ..... scsi_max_qdepth(5)
scsi_maxphys - maximum allowed length of an I/O on all SCSI devices ................................. scsi_maxphys(5)
scsi_tape - SCSI sequential access (tape) device driver ................................................................. scsi_tape(7)
scsictl - control a SCSI device ........................................................................................................ scsictl(1M)
sd - create and monitor jobs ............................................................................................................... swjob(1M)
SD (Software Distributor) objects; attributes and storage formats ................................................................ sd(4)
sd - Software Distributor; commands to create, distribute, install, monitor, and manage software .............. sd(5)
sdiff - side-by-side file difference program ............................................................................................. sdiff(1)
(sdisk); SCSI direct access device driver ........................................................................................... scsi_disk(7)
search a file for a pattern .................................................................................................................. trufgrep(1)
search a file for a string or expression ...................................................................................................... grep(1)
search and print process accounting files ........................................................................................ acctcom(1M)
search directory tree for files ..................................................................................................................... find(1)
search environment list for value of specified variable name .............................................................. getenv(3C)
search for files ........................................................................................................................................... find(1)
search for named file in named directories ..................................................................................... pathfind(3G)
search path for dynamically loadable kernel modules; change global ................................................ modpath(2)
search physical volumes for LVM volume groups .............................................................................. vgscan(1M)
search routine, binary, for sorted tables ........................................................................................... bsearch(3C)
search table for entry; optional update if missing .............................................................................. lsearch(3C)
search tables, hash, manage ............................................................................................................ hsearch(3C)
search tree, manage a binary ........................................................................................................... tsearch(3C)
searching NIS+ tables ...................................................................................................................... nismatch(1)
secdef - security defaults configuration file routines .............................................................................. secdef(3)
secdsc - get security attribute description entry from /etc/security.dsc ......................................... secdsc(3)
secof2(), SECof2() - test for valid second byte in 16-bit character .......................................... nl_tools_16(3X)
second kind; Bessel functions of the .......................................................................................................... y0(3M)
second, scheduling interval in clock ticks per .................................................................................... timeslice(5)
secondary prompt .............................................................................................................................. glossary(9)
secret key, decrypt and store ............................................................................................................ keylogin(1)
secret key, delete key stored with keyserv .................................................................................... keylogout(1)
secret key; retrieve ................................................................................................................. getpublickey(3N)
section data for ELF files, manipulate ........................................................................................ elf_getdata(3E)
section information for ELF files, get ........................................................................................... elf_getscn(3E)
section sizes and allocation space of object files, print ................................................................................ size(1)
section sizes, disk, calculate default ............................................................................................... disksecn(1M)
secure internet services with Kerberos authentication and authorization .................................................... sis(5)
secure internet services, configuration file ................................................................................. inetsvcs.conf(4)
secure internet services, enable or disable ............................................................................... inetsvcs_sec(1M)
secure password file entry on trusted systems, get ...................................................................... getspwent(3X)
secure password file, get entry from ............................................................................................ getspwent(3X)
secure remote procedure calls, library routines for ..................................................................... secure_rpc(3N)
secure RPC key pair; change user’s ........................................................................................................ chkey(1)
secure_rpc - library routines for secure remote procedure calls .................................................. secure_rpc(3N)
secure_sid_scripts - controls whether setuid and setgid bits on scripts are honored
HP-UX 11i Version 2: December 2007 Update Hewlett-Packard Company 445