Logo

MH and xmh: Email for Users and Programmers

Small book cover: MH and xmh: Email for Users and Programmers

MH and xmh: Email for Users and Programmers
by

Publisher: O'Reilly
ISBN/ASIN: 1565920937
ISBN-13: 9781565920934
Number of pages: 782

Description:
Learning how to customize your email environment can save you time and make communicating more enjoyable. This book explains how to use, customize, and program with MH electronic mail commands, available on virtually any UNIX system. MH is notable for its power and flexibility: you'll be able to do things you never thought you could do with an email program.

Home page url

Download or read it online for free here:
Read online
(online html)

Similar books

Book cover: The Art of UNIX ProgrammingThe Art of UNIX Programming
by - Addison-Wesley Professional
The first part of the book is philosophy and history of UNIX, the second part unfolds the Unix principles into more specific advice about design, the third part focuses on tools for solving problems, and the fourth part is about community.
(14845 views)
Book cover: Beej's Guide to Unix Interprocess CommunicationBeej's Guide to Unix Interprocess Communication
by
This document discusses several methods of Interprocess Communication, some of which are better suited to certain tasks than others. If you know C or C++ and are pretty good using a Unix environment, these documents are for you.
(12917 views)
Book cover: Introduction to UnixIntroduction to Unix
by - The Ohio State University
Table of contents: History of Unix; Unix Structure; Getting Started; System Resources and Printing; Shells; Special Unix Features; Text Processing; Other Useful Commands; Shell Programming; Editors; Unix Command Summary; A Short Unix Bibliography.
(10360 views)
Book cover: UNIX System Security: A Guide for Users and System AdministratorsUNIX System Security: A Guide for Users and System Administrators
by - Addison-Wesley
The first up-to-date source to provide the UNIX system user or administrator with the information needed to protect data and system from unauthorized use. By following the procedures described, you can protect your UNIX system from most attackers.
(7419 views)