Logo

MH and xmh: Email for Users and Programmers

Small book cover: MH and xmh: Email for Users and Programmers

MH and xmh: Email for Users and Programmers
by

Publisher: O'Reilly
ISBN/ASIN: 1565920937
ISBN-13: 9781565920934
Number of pages: 782

Description:
Learning how to customize your email environment can save you time and make communicating more enjoyable. This book explains how to use, customize, and program with MH electronic mail commands, available on virtually any UNIX system. MH is notable for its power and flexibility: you'll be able to do things you never thought you could do with an email program.

Home page url

Download or read it online for free here:
Read online
(online html)

Similar books

Book cover: The UNIX-HATERS HandbookThe UNIX-HATERS Handbook
by - John Wiley & Sons Inc
Self-help guide for people affected by the world's most esoteric operating system. Turn here for answers to all-important questions, such as... Why does the online documentation lie to us? Why does the user's guide bear no relationship to reality?
(15899 views)
Book cover: Bourne Shell ScriptingBourne Shell Scripting
- Wikibooks
This book covers the practical aspects of using and interacting with the Bourne Shell, the root of all shells in Unix world. That includes interacting with the shell on a day-to-day basis for the purposes of operating the computer in normal tasks.
(13310 views)
Book cover: Learning the vi editorLearning the vi editor
- Wikibooks
vi is a powerful editor that is ubiquitous amongst Unix and Unix-like operating systems, but is available on many other operating systems. Even if you use another editor you must have a passing knowledge of vi as an administrator.
(16735 views)
Book cover: UNIX System Security: A Guide for Users and System AdministratorsUNIX System Security: A Guide for Users and System Administrators
by - Addison-Wesley
The first up-to-date source to provide the UNIX system user or administrator with the information needed to protect data and system from unauthorized use. By following the procedures described, you can protect your UNIX system from most attackers.
(7940 views)