UNIX Basic Email and Backup
Under SCO System V, each user has a private mailbox maintained by system, and users can use any user or use.
If you send and receive emails, the information sent and received can be reserved in the mailbox or by independent file processing. Send an email
Mail command, follow the recipient registration name, you can send a message. If you send an email to multiple recipients, the name is spaced
E.g:
$ Mail Peter Amy
Next, the Subject: prompt will appear on the screen, and the user can enter a short information description. After completion, press URN> Key, then you can write mail content. Require correction error, use space characters or left arrow keys to use improper empty The grid or inappropriate arrow key, even on the screen looks right, the recipient may only receive unreadable and tampering. information. Please remember, the contents of Mail are written, not "what you see" (WHAT, " t). If you need to cancel the entire information, press the press Read mail Every time you register into the system, the system will notify you, there can be emails in your mailbox, you need to flush the message, $ Mail If there is a message, each message will display the corresponding information headline, including the number of information, the party, and the date of delivery. Below is mail Parts example: $ Mail SCO SYSTEM V MAIL (VERSIN 3.2) TYPE? For Help "/ usr / spool / mail / joesco": 2 Messages / New / UnRead U2 Mary Sun Aug 05 23:48 47/2109 Level 2500 N1 Paul fri Aug 03 08:01 23/6332 Tardy Reports! To read the part, you can use the arrow keys to move the pick, press Compose number. If you have read the last batch of information in the mailbox, Mail will display "Can't Go Beyond Last Message" on the screen. . Handling mail When you have an invalid instruction, Mail will answer a question mark, or "what" information, display the instructions. If the user miss you Display the Mail instruction table, can you be entered? ; Or to hit H, display the message title table; if you enter L, send information to the printer . another There are some common instructions to help process mail: First, keep mail "s filename" is saved in the ordinary text file to FileName, along with The title information of the message, one and feed it into the file. After "W FileName", save the message to the filename. Second, delete emails "d x" delete information x this information number number "u x" restores the deleted X information Third, the cover "R" is sent to the sender "R" sent an answer to to: and cc: all users on the table, four, forwarding mail "f login" forwarding information, gives other users, and distributes the text (Original Message); login is used as a reference "F login" only forwarded information, regardless of sending text V. Exit the email "q" exits the MAIL program and updates all changes "X" exits the Mail program, but does not make any changes Other ways to process mail In addition to the basic instructions mentioned above, SCO UNIX has other more than Complex instructions can be organized. In Mail, you have a wave diameter before all instructions ~ v, call VI editing, once the editing information is completed, through the VI instruction, such as saving and Exit instruction: WQ, you can return to the mail program; press Send mail information. The other MAIL enhancements are as follows - ~ m messate-no. Specify information in the mailbox (Message-no.) Put it in the written information - ~ r filename reads in the specified file (filename), sent to the current information - ~ p look at the current content in the information - ~? Help To facilitate MAIL communication, system administrators can define different specific single users or group alias, through these single groups, don't name Or name, you can send mail information to the whole group. Send to the alias member, type the following instructions: $ Mail AliasName If you want to limit the access permissions of the Group's private mail, you can use the Chmod instruction, as follows: $ Chmod 600MBOX In the normal email prompt, you can control the option, change the read, and send mail, which can be managed by the system Reason The member is automatically established for the user, or you can modify these settings yourself, for example: SET Page 10 Mailrc environment file Mail's environmental file is called Mailrc, which is responsible for saving the permanent record of the required file. Like other environmental files, Mailrc Required Placed in the home directory, it is a text file, contains a valid Mail instruction, Mailrc typically includes SET instructions and Alias definitions . Do not After running the mail program, you don't have to have .mailrc files. To view .mailrc, you can be entered into more .mailr C, under The surface is an example of .mailrc: CD - In Mail, change the main directory NSET Autombox to remove the read part to private mailbox. SET PAGE 20 - If the information is greater than twenty, use more Alias Crew John Wanda Frank - Message sent to CREW to the user listed in the table Set Editor / US / LIB / WORD - Take Word as Mail Default Editor Unset Chron - Display the current latest mail above the .mailrc example, you can send mail to J Ohn, Wanda and frank. Monitor Mbox is the default setting. If you don't want to set it, you should use unset autombox, and when Mbox The old information is usually deleted when the content is growing. If you want to read the email in MBOX, you can use the following instructions: $ Mail -f mbox Backup In the computer system, the data is a quite important ring. Method for storing data, can be flopped, hard disk or cassette belt (CA Rtridge), The cartridge belt is usually provided to provide backup. Copy catalog In the installed file system, copy a directory content to another directory, with a COPY directive: $ COPY SOURCE> DESTINATION> #Copy -Mor Source> Destination> Convert and copy files Using the DD (c) instruction, you can convert a file into another file or select a part of the file, in the transmission. lost In the data, byte order can also be exchanged. $ DD IF = / dev / fd0 of = / temp / save skip = 5 count = 86 BS = 5K The above instruction "/ dev / fd0" refers to the floppy disk on the computer, "Skip = N" measures before copying to the output file. enter Several records on the file. "BS = n" means setting the input and output word block length, and uses K to represent 1024 bytes. "C Ount = n " Only the specified number of input records is copied. At the same time, you can also use the DD instruction to check the archive (Archive), the instructions are as follows : $ dd if = dev / fd0 of = / dev / null bs = 1k 1200 0 RECORD READ IN 1200 0 Record Read Out Archive file: TAR (C) TAR is the most easy to use and the most reliable utility (utility) that is most useful to non-privileged users, reserves and recovered files from archive media. , You can also extract a single file from the multi-file archive. TAR archives uses the relative or absolute path name of the file and directory. Trich Ar, All variable options are displayed; "CV" is created and archived; "CV #" is used for device number from / etc / default / tar #; "RV" adds an archive; "UV" update in an existing file; "TV" displays the archive content table; "XV" from Archive The file is extracted; "f" is read or written from the specified file; "L" makes Tar follow the symbolic connection to continue to trace it, default Feel friendship The symbol connection is ignored. For example, to archive the specified file, and the existing data on the cover disk, the instructions are as follows: $ CD PUB $ TAR CV6 ASCII Greek Volume End At 1199k, Block Factor = 5K Seek = 0k a ascii 3k Seek = 3k a Greek 1k To list the contents of Tar: $ TAR TV6 RW-R - r - 2/22114 Jan 2 13:41 1996 ASCII RW-R - r - 2/2475 Jan 2 13:41 1996 Greek Create a TAR archive, use the relative path name, otherwise, restore another system will override the files of other systems. #TAR CV6 / ETC / MOTD #CD / TMP #TAR XV6 X / ETC / MOTD, 943 BYtes, 2K Summoned When needed to specify the device, the post-aid empty equipment is not easy to use when using the matching character, Take Use more complex CPIO to summarize the file. For example, you need to select a file to establish archive, the instructions are as follows: $ find / u / bill -print | cpio -ob -o / dev / fd0 20 blocks For example, you need to extract the CPIO archive file name: $ CPIO -IDMUBV -I / DEV / FD0 .profile ASCII eqnchar Greek 20 blocks The CPIO main option is: -v display work -i reading file -o write archive -t content table -d creation directory -m reserves the original modification date -U non-compact copy -B segmentation factor is 5K -CN segmentation factor is n -Kn medium length is set n Rearid copy The reinforcement is to balance the cost of running general contributions and loss data, and determine the data class to be archived, and determine what Level implementation, and determine the number of discs required for the tape and the capacity of the belt, how long to store a post-aid, etc. Generally speaking, Rear A aid can be executed in sysadminsh or scoadmin. The so-called incremental reinforcement (Incremental Backup Levels) , Just only need the part of the data that has changed after the above archive. When implementing the scheduled posttle, in / usr / lib / sys Admin / LAST / In the middle, record the files and can be implemented by using the rearid level. The level 0 of the aid level is all the documents on the post-aid document system; the 1 level will change the document of the last level of grade 0: 2 Level, rear reinforcement is changed by the above level 0 or level 1 post-aid; Level 3, the above level 0, 1 or 2 Change the document after aid. After defining the support tool, the backup schedule can be implemented more conveniently. Configuring files will be placed in / usr / lib / sysadmin / schedule. If it is in an emergency or special case, Users can also use non-scheduled aid to conduct emergency support. button twice. After writing the message content, press the