Chapter 1 page 13 add
Advanced Review Exercise
16. What is a macro virus and what makes it so troublesome?

Chapter 2 page 39 changed 12 to
12. How many man pages are there in the Devices subsection of the system manual? (Devices is a subsection of Special Files.)

Chapter 3 page 73 dropped exercise 12
Chapter 3 page 73 renumbered exercise 13 as exercise 12
Chapter 3 page 73 renumbered exercise 14 as exercise 13
Chapter 3 page 73 renumbered exercise 15 as exercise 14
Chapter 3 page 73 added exercise before exercise 16. New exercise numbered 15.
15. Assume that in exercise 8 Ace Electronics and the phone number appear on adjacent lines. How can you find the phone number without using a program that displays a large chunk of the file (for example an editor, more, pg, cat, or page? (Hint: use sed.)

Chapter 4 page 100 changed exercise 4
4. If your working directory is /home/alex with a subdirectory named literature, give three sets of commands that you can use to create a subdirectory under literature named classics. Also give several sets of commands that you can use to remove the classics directory and its contents.

Chapter 8 page 289 exercise 3 subsection b
Changed the last word on the line from Unfortunately to Unit

Chapter 15 page 681 changed exercise 12 to
12. A process is using 100% of the CPU time. How do you identify the process and determine if you should kill it?

Chapter 15 page 682 added exercises 22-27

22. Use at to reboot the system

23. Give a command that will make a level 0 dump of the /usr filesystem to the first tape device on the system. What command would you use to take advantage of a drive that supports compression? What command would place a level 3 dump of the /var filesystem immediately after the level 0 dump on the tape?

24. Use an ACL to create a new directory /home/shared/billken so that users Bill and Kendra can create files in the directory. Any new files or subdirectories that either user creates should automatically be writable by either user. No one else should have access to this directory or the files within it. Modify this directory so that the group spiffy has read-only access to all files and directories within billken.

25. A utility named /usr/bin/netclk accepts a connection over the network and quits once the connection is dropped. How can you use the built-in functionality of Solaris to make this program run so that it restarts automatically (without modifying netclk)? (Hint: It should only run in multiuser mode)

26. A process is consuming a great deal of memory. How do you determine how much physical memory it is using and what percentage this is of the total memory?

27. When a user logs in, you would like the system to check for a login name in the local /etc/passwd file first and then to check NIS. How do you implement this strategy?