UNIX Basic Email and Backup

xiaoxiao2021-03-06  42

UNIX Basic Email and Backup

e-mail

Under SCO System V, each user has a private mailbox maintained by system, and users can use any user or use.

If you send and receive emails, the information sent and received can be reserved in the mailbox or by independent file processing. Send an email

Mail command, follow the recipient registration name, you can send a message. If you send an email to multiple recipients, the name is spaced

Separate instead of comma. The recipient can be a separate registration name or an alias, an alias represents a user group.

E.g:

$ Mail Peter Amy

Next, the Subject: prompt will appear on the screen, and the user can enter a short information description. After completion, press

URN>

Key, then you can write mail content. Require correction error, use space characters or left arrow keys to use improper empty

The grid or inappropriate arrow key, even on the screen looks right, the recipient may only receive unreadable and tampering.

information. Please remember, the contents of Mail are written, not "what you see" (WHAT, "

t).

If you need to cancel the entire information, press the button twice. After writing the message content, press the button, after the new line is obtained,

press

D, send mail. D is the abbreviation of DONE.

Read mail

Every time you register into the system, the system will notify you, there can be emails in your mailbox, you need to flush the message,

$ Mail

If there is a message, each message will display the corresponding information headline, including the number of information, the party, and the date of delivery. Below is

mail

Parts example:

$ Mail

SCO SYSTEM V MAIL (VERSIN 3.2) TYPE? For Help

"/ usr / spool / mail / joesco": 2 Messages / New / UnRead

U2 Mary Sun Aug 05 23:48 47/2109 Level 2500

N1 Paul fri Aug 03 08:01 23/6332 Tardy Reports!

To read the part, you can use the arrow keys to move the pick, press to read, or at the prompt, click directly to the part

Compose

number. If you have read the last batch of information in the mailbox, Mail will display "Can't Go Beyond Last Message" on the screen.

.

Handling mail

When you have an invalid instruction, Mail will answer a question mark, or "what" information, display the instructions. If the user

miss you

Display the Mail instruction table, can you be entered? ; Or to hit H, display the message title table; if you enter L, send information to the printer

. another

There are some common instructions to help process mail:

First, keep mail

"s filename" is saved in the ordinary text file to FileName, along with

The title information of the message, one and feed it into the file.

After "W FileName", save the message to the filename.

Second, delete emails

"d x" delete information x this information number number

"u x" restores the deleted X information

Third, the cover

"R" is sent to the sender

"R" sent an answer to to: and cc: all users on the table, four, forwarding mail

"f login" forwarding information, gives other users, and distributes the text (Original

Message); login is used as a reference

"F login" only forwarded information, regardless of sending text

V. Exit the email

"q" exits the MAIL program and updates all changes

"X" exits the Mail program, but does not make any changes

Other ways to process mail

In addition to the basic instructions mentioned above, SCO UNIX has other more than

Complex instructions can be organized. In Mail, you have a wave diameter before all instructions ~

v, call VI editing, once the editing information is completed, through the VI instruction, such as saving and

Exit instruction: WQ, you can return to the mail program; press D to send directly

Send mail information.

The other MAIL enhancements are as follows

- ~ m messate-no. Specify information in the mailbox

(Message-no.) Put it in the written information

- ~ r filename reads in the specified file (filename), sent to the current information

- ~ p look at the current content in the information

- ~? Help

To facilitate MAIL communication, system administrators can define different specific single users or group alias, through these single groups, don't

name

Or name, you can send mail information to the whole group. Send to the alias member, type the following instructions:

$ Mail AliasName

If you want to limit the access permissions of the Group's private mail, you can use the Chmod instruction, as follows:

$ Chmod 600MBOX

In the normal email prompt, you can control the option, change the read, and send mail, which can be managed by the system

Reason

The member is automatically established for the user, or you can modify these settings yourself, for example:

SET Page 10

Mailrc environment file

Mail's environmental file is called Mailrc, which is responsible for saving the permanent record of the required file. Like other environmental files, Mailrc

Required

Placed in the home directory, it is a text file, contains a valid Mail instruction, Mailrc typically includes SET instructions and Alias ​​definitions

. Do not

After running the mail program, you don't have to have .mailrc files. To view .mailrc, you can be entered into more .mailr

C, under

The surface is an example of .mailrc: CD

- In Mail, change the main directory NSET Autombox to remove the read part to private mailbox.

SET PAGE 20

- If the information is greater than twenty, use more

Alias ​​Crew John Wanda Frank

- Message sent to CREW to the user listed in the table

Set Editor / US / LIB / WORD

- Take Word as Mail Default Editor Unset Chron

- Display the current latest mail above the .mailrc example, you can send mail to J

Ohn,

Wanda and frank. Monitor Mbox is the default setting. If you don't want to set it, you should use unset autombox, and when

Mbox

The old information is usually deleted when the content is growing. If you want to read the email in MBOX, you can use the following instructions:

$ Mail -f mbox

Backup

In the computer system, the data is a quite important ring. Method for storing data, can be flopped, hard disk or cassette belt (CA

Rtridge),

The cartridge belt is usually provided to provide backup.

Copy catalog

In the installed file system, copy a directory content to another directory, with a COPY directive:

$ COPY SOURCE> DESTINATION>

#Copy -Mor Source> Destination>

Convert and copy files

Using the DD (c) instruction, you can convert a file into another file or select a part of the file, in the transmission.

lost

In the data, byte order can also be exchanged.

$ DD IF = / dev / fd0 of = / temp / save skip = 5 count = 86 BS = 5K

The above instruction "/ dev / fd0" refers to the floppy disk on the computer, "Skip = N" measures before copying to the output file.

enter

Several records on the file. "BS = n" means setting the input and output word block length, and uses K to represent 1024 bytes. "C

Ount = n "

Only the specified number of input records is copied. At the same time, you can also use the DD instruction to check the archive (Archive), the instructions are as follows

:

$ dd if = dev / fd0 of = / dev / null bs = 1k

1200 0 RECORD READ IN

1200 0 Record Read Out

Archive file: TAR (C)

TAR is the most easy to use and the most reliable utility (utility) that is most useful to non-privileged users, reserves and recovered files from archive media.

,

You can also extract a single file from the multi-file archive. TAR archives uses the relative or absolute path name of the file and directory. Trich

Ar,

All variable options are displayed; "CV" is created and archived; "CV #" is used for device number from / etc / default / tar

#;

"RV" adds an archive; "UV" update in an existing file; "TV" displays the archive content table; "XV" from

Archive

The file is extracted; "f" is read or written from the specified file; "L" makes Tar follow the symbolic connection to continue to trace it, default

Feel friendship

The symbol connection is ignored. For example, to archive the specified file, and the existing data on the cover disk, the instructions are as follows:

$ CD PUB

$ TAR CV6 ASCII Greek

Volume End At 1199k, Block Factor = 5K

Seek = 0k a ascii 3k

Seek = 3k a Greek 1k

To list the contents of Tar:

$ TAR TV6

RW-R - r - 2/22114 Jan 2 13:41 1996 ASCII

RW-R - r - 2/2475 Jan 2 13:41 1996 Greek

Create a TAR archive, use the relative path name, otherwise, restore another system will override the files of other systems.

#TAR CV6 / ETC / MOTD

#CD / TMP

#TAR XV6

X / ETC / MOTD, 943 BYtes, 2K

Summoned

When needed to specify the device, the post-aid empty equipment is not easy to use when using the matching character,

Take

Use more complex CPIO to summarize the file. For example, you need to select a file to establish archive, the instructions are as follows: $ find / u / bill -print | cpio -ob -o / dev / fd0

20 blocks

For example, you need to extract the CPIO archive file name:

$ CPIO -IDMUBV -I / DEV / FD0

.profile

ASCII

eqnchar

Greek

20 blocks

The CPIO main option is:

-v display work

-i reading file

-o write archive

-t content table

-d creation directory

-m reserves the original modification date

-U non-compact copy

-B segmentation factor is 5K

-CN segmentation factor is n

-Kn medium length is set n

Rearid copy

The reinforcement is to balance the cost of running general contributions and loss data, and determine the data class to be archived, and determine

what

Level implementation, and determine the number of discs required for the tape and the capacity of the belt, how long to store a post-aid, etc. Generally speaking,

Rear

A aid can be executed in sysadminsh or scoadmin. The so-called incremental reinforcement (Incremental Backup Levels)

,

Just only need the part of the data that has changed after the above archive. When implementing the scheduled posttle, in / usr / lib / sys

Admin / LAST /

In the middle, record the files and can be implemented by using the rearid level.

The level 0 of the aid level is all the documents on the post-aid document system; the 1 level will change the document of the last level of grade 0:

2

Level, rear reinforcement is changed by the above level 0 or level 1 post-aid; Level 3, the above level 0, 1 or 2

Change the document after aid. After defining the support tool, the backup schedule can be implemented more conveniently.

Configuring files will be placed in / usr / lib / sysadmin / schedule. If it is in an emergency or special case,

Users can also use non-scheduled aid to conduct emergency support.

转载请注明原文地址:https://www.9cbs.com/read-61188.html

New Post(0)