Commit | Line | Data |
---|---|---|
a46f6f3d KB |
1 | .\" Copyright (c) 1980 The Regents of the University of California. |
2 | .\" All rights reserved. | |
b2575e31 | 3 | .\" |
a46f6f3d KB |
4 | .\" Redistribution and use in source and binary forms are permitted |
5 | .\" provided that the above copyright notice and this paragraph are | |
6 | .\" duplicated in all such forms and that any documentation, | |
7 | .\" advertising materials, and other materials related to such | |
8 | .\" distribution and use acknowledge that the software was developed | |
9 | .\" by the University of California, Berkeley. The name of the | |
10 | .\" University may not be used to endorse or promote products derived | |
11 | .\" from this software without specific prior written permission. | |
12 | .\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR | |
13 | .\" IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED | |
14 | .\" WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE. | |
15 | .\" | |
16 | .\" @(#)finger.1 6.5 (Berkeley) %G% | |
b2575e31 | 17 | .\" |
efb2a383 | 18 | .TH FINGER 1 "" |
b2575e31 KM |
19 | .UC 4 |
20 | .SH NAME | |
21 | finger \- user information lookup program | |
22 | .SH SYNOPSIS | |
23 | .B finger | |
24 | [ | |
25 | options | |
26 | ] name ... | |
27 | .SH DESCRIPTION | |
28 | By default | |
29 | .I finger | |
30 | lists the login name, full name, terminal name and write status | |
2f96ea34 | 31 | (as a `*' before the terminal name if write permission is denied), |
b2575e31 KM |
32 | idle time, login time, and office location and phone number |
33 | (if they are known) for each current UNIX user. | |
34 | (Idle time is minutes if it is a single integer, hours and minutes if a ':' | |
35 | is present, or days and hours if a 'd' is present.) | |
36 | .PP | |
37 | A longer format also exists and is used by | |
38 | .I finger | |
c85f63d3 | 39 | whenever a list of people's names is given. (Account names as well as |
b2575e31 KM |
40 | first and last names of users are accepted.) |
41 | This format is multi-line, and includes all the information described above | |
42 | as well as the user's home | |
43 | directory and login shell, any plan which the person has placed in the file | |
44 | .I \&.plan | |
45 | in their home | |
46 | directory, and the project on which they are working from the file | |
47 | .I \&.project | |
48 | also in the home directory. | |
49 | .PP | |
50 | .I Finger | |
2f96ea34 JB |
51 | may be used to lookup users on a remote machine. The format is to specify |
52 | the user as ``user@host.'' If the user name is left off, the | |
53 | standard format listing is provided on the remote machine. | |
54 | .PP | |
55 | .I Finger | |
b2575e31 KM |
56 | options include: |
57 | .TP | |
58 | .B \-m | |
59 | Match arguments only on user name. | |
60 | .TP | |
61 | .B \-l | |
62 | Force long output format. | |
63 | .TP | |
64 | .B \-p | |
65 | Suppress printing of the | |
66 | .I \&.plan | |
67 | files | |
68 | .TP | |
69 | .B \-s | |
70 | Force short output format. | |
71 | .SH FILES | |
72 | .ta 2i | |
73 | /etc/utmp who file | |
74 | .br | |
75 | /etc/passwd for users names, offices, ... | |
76 | .br | |
77 | /usr/adm/lastlog last login times | |
78 | .br | |
79 | ~/.plan plans | |
80 | .br | |
81 | ~/.project projects | |
82 | .SH "SEE ALSO" | |
efb2a383 | 83 | chfn(1), w(1), who(1) |
b2575e31 KM |
84 | .SH AUTHOR |
85 | Earl T. Cohen | |
86 | .SH BUGS | |
87 | Only the first line of the | |
88 | .I .project | |
89 | file is printed. | |
90 | .PP | |
91 | The encoding of the gcos field is UCB dependent \- it knows that an office | |
92 | `197MC' is `197M Cory Hall', and that `529BE' is `529B Evans Hall'. | |
6fbc41c7 JB |
93 | It also knows that a four digit office phone number should have a ``x2-'' |
94 | prepended. | |
b2575e31 | 95 | .PP |
2f96ea34 JB |
96 | There is no way to pass arguments to the remote machine as |
97 | .I finger | |
98 | uses an internet standard port. | |
99 | .PP | |
b2575e31 KM |
100 | A user information data base is in the works and will radically alter |
101 | the way the information that | |
102 | .I finger | |
103 | uses is stored. Finger will require extensive modification when | |
104 | this is implemented. |