|
|||||||||||
1. Security Planning for Trusted Extensions 2. Installation and Configuration Roadmap for Trusted Extensions 3. Installing Solaris Trusted Extensions Software (Tasks) 4. Configuring Trusted Extensions (Tasks) 5. Configuring LDAP for Trusted Extensions (Tasks) 6. Configuring a Headless System With Trusted Extensions (Tasks) B. Using CDE Actions to Install Zones in Trusted Extensions |
Shell Prompts in Command ExamplesThe following table shows the default UNIX® system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell. Table P-2 Shell Prompts
|
||||||||||
|