Sample Commands



TAILQ_INSERT_TAIL.3.html

aa-audit is used to set one or more profiles to audit mode. In this mode security policy is enforced and all access (successes and failures) are logged to the s


TAILQ_ENTRY.3.html

These macros define and operate on three types of data structures: lists, tail queues, and circular queues. All three structures support the following functiona


getattrs

These routines allow C programs to make procedure calls on other machines across the network. First, the client calls a procedure to send a data packet to the s


getpary

The crypt, crypt_r, crypt_rn, and crypt_ra functions calculate a cryptographic hash function of key with one of a number of supported methods as requested with


lstat.2.html

The crypt, crypt_r, crypt_rn, and crypt_ra functions calculate a cryptographic hash function of key with one of a number of supported methods as requested with


stat64.2.html

When, as is customary, the proc filesystem is mounted on /proc, you can find in the file /proc/filesystems which filesystems your kernel currently supports; see


reset.1.html

When, as is customary, the proc filesystem is mounted on /proc, you can find in the file /proc/filesystems which filesystems your kernel currently supports; see


test.1.html

The getch, wgetch, mvgetch and mvwgetch, routines read a character from the window. In no-delay mode, if no input is waiting, the value ERR is returned. In dela


gv2gml.1.html

The finite(), finitef(), and finitel() functions return a nonzero value if x is neither infinite nor a not-a-number (NaN) value, and 0 otherwise. The isnan(), i


dog.1x.html

The ISO 8859 standard includes several 8-bit extensions to the ASCII character set (also known as ISO 646-IRV). ISO 8859-11 encodes the characters used in the T


oneko.1x.html

The ISO 8859 standard includes several 8-bit extensions to the ASCII character set (also known as ISO 646-IRV). ISO 8859-2, the Latin Alphabet No. 2 is used to


vncviewer-tigervnc.1.html

The ISO 8859 standard includes several 8-bit extensions to the ASCII character set (also known as ISO 646-IRV). Especially important is ISO 8859-1, the Latin Al


svc_getreq.3.html

The ISO 8859 standard includes several 8-bit extensions to the ASCII character set (also known as ISO 646-IRV). ISO 8859-2, the Latin Alphabet No. 2 is used to


svcerr_auth.3.html

The border, wborder and box routines draw a box around the edges of a window. Other than the window, each argument is a character with attributes: ls - left sid


remainder.3.html

lowriter is a multi-platform word processing and desktop publishing tool derived from OpenOffice.org 3.3 Beta in September 2010. libreoffice is a shell script


in_wchstr.3ncurses.html

Writer is a full-featured word processing and desktop publishing tool. It is powerful enough to create complete books with content diagrams, indexes, and more.


win_wchstr.3ncurses.html

pam_lastlog is a PAM module to display a line of information about the last login of the user. In addition, the module maintains the /var/log/lastlog file. Some


wait.2.html

Passmass changes a password on multiple machines. If you have accounts on several machines that do not share password databases, Passmass can help you keep them


waitid.2.html

select() and pselect() allow a program to monitor multiple file descriptors, waiting until one or more of the file descriptors become ready for some class of I/


SDL_GetKeyName.3.html

select() and pselect() allow a program to monitor multiple file descriptors, waiting until one or more of the file descriptors become ready for some class of I/


SDL_RWFromFile.3.html

These low-level routines must be called by programs that have to deal directly with the terminfo database to handle certain terminal capabilities, such as progr


geteuid32.2.html

The sinh() function returns the hyperbolic sine of x, which is defined mathematically as: sinh(x) = (exp(x) - exp(-x)) / 2 RETURN VALUE On success, these functi


grpck.8.html

The sinh() function returns the hyperbolic sine of x, which is defined mathematically as: sinh(x) = (exp(x) - exp(-x)) / 2 RETURN VALUE On success, these functi


ifcfg-tunnel.5.html

The strspn() function calculates the length (in bytes) of the initial segment of s which consists entirely of bytes in accept. The strcspn() function calculates


regulatory.bin.5.html

The strspn() function calculates the length (in bytes) of the initial segment of s which consists entirely of bytes in accept. The strcspn() function calculates


scout.1.html

The strspn() function calculates the length (in bytes) of the initial segment of s which consists entirely of bytes in accept. The strcspn() function calculates


xconv.pl.8.html

systemd-fsck@.service is a service responsible for file system checks. It is instantiated for each device that requires a file system check. systemd-fsck-root.s