EasyManua.ls Logo

AT&T UNIX - Page 176

AT&T UNIX
406 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Using
Office
Commands
4
Change
as
many
of
the
fields
as
you
want.
The
individual
fields
are
described
below.
For
each
field,
you
can
press
<B3>
or
<Mark>
to
display
each
of
the
choices
in
succession,
or
you
can
press
<B2>,
<Cmd>,
or
<Opts>
to
select
from
a
menu
of
the
choices.
5
When
you
are
finished
changing
the
form,
press
<Enter>.
The
fields
in
the
Security
form
are
explained
below.
~:
The
owner
of
the
files
you
create
and
store
in
the
Office
is
normally
the
user
name
you
used
to
log
in.
For
example,
if
you
log
in
as
tutor,
the
files
and
folders
you
see
are
owned
by
tutor.
You
can
use
this
field
to
assign
a
file
or
folder
to
a
different
owner.
Normally,
you
will
not
assign
ownership
of
a
file
to
another
user.
You
will
need
to
do
this,
however,
for
files
you
are
giving
to
another
user.
The
choices
for
this
field
are
as
follows,
if
you
have
not
set
up
any
user
names
on
your
system:
51
Security
Owner:
Read
permission
"'rite
permission
Run
permission
adm
bin
daemon
install
Ip
nuucp
root
I~OO"'-------fl
am
uucp
uucpadfll
Most
of
these
owners
are
programs
responsible
for
your
system
software
and
need
not
concern
you.
3-90

Table of Contents

Other manuals for AT&T UNIX

Related product manuals