ac.8 (2362d22e487e8971dcc7add6bd84ee37fe542c05) | ac.8 (270d3d754aaf84a6427db275f9a121561af689ad) |
---|---|
1.\" 2.\" Copyright (c) 1994 Simon J. Gerraty 3.\" Copyright (c) 1994 Christopher G. Demetriou 4.\" All rights reserved. 5.\" 6.\" Redistribution and use in source and binary forms, with or without 7.\" modification, are permitted provided that the following conditions 8.\" are met: --- 14 unchanged lines hidden (view full) --- 23.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 24.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 25.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 26.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 27.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 28.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 29.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 30.\" | 1.\" 2.\" Copyright (c) 1994 Simon J. Gerraty 3.\" Copyright (c) 1994 Christopher G. Demetriou 4.\" All rights reserved. 5.\" 6.\" Redistribution and use in source and binary forms, with or without 7.\" modification, are permitted provided that the following conditions 8.\" are met: --- 14 unchanged lines hidden (view full) --- 23.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, 24.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT 25.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, 26.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY 27.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT 28.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF 29.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. 30.\" |
31.\" $Id: ac.8,v 1.2 1994/09/26 22:12:25 davidg Exp $ | 31.\" $Id: ac.8,v 1.3 1995/10/07 12:02:33 joerg Exp $ |
32.\" 33.Dd March 15, 1994 34.Dt AC 8 35.Os 36.Sh NAME 37.Nm ac 38.Nd connect time accounting 39.Sh SYNOPSIS --- 87 unchanged lines hidden (view full) --- 127connect time accounting file 128.It Pa /var/log/wtmp.[0-7] 129rotated files 130.El 131.Sh SEE ALSO 132.Xr init 8 , 133.Xr sa 8 , 134.Xr login 1 , | 32.\" 33.Dd March 15, 1994 34.Dt AC 8 35.Os 36.Sh NAME 37.Nm ac 38.Nd connect time accounting 39.Sh SYNOPSIS --- 87 unchanged lines hidden (view full) --- 127connect time accounting file 128.It Pa /var/log/wtmp.[0-7] 129rotated files 130.El 131.Sh SEE ALSO 132.Xr init 8 , 133.Xr sa 8 , 134.Xr login 1 , |
135.Xr utmp | 135.Xr utmp 5 |
136.\" .Sh NOTES 137.\" If COMPAT_SUNOS is defined 138.\" .Nm ac 139.\" ignores the fact that entries with ut_host of ":0.0" are not real 140.\" login sessions. Normally such entries are ignored except in the case 141.\" of a user being logged in when the 142.\" .Pa wtmp 143.\" file was rotated, in which case a login with ut_host of ":0.0" may --- 12 unchanged lines hidden --- | 136.\" .Sh NOTES 137.\" If COMPAT_SUNOS is defined 138.\" .Nm ac 139.\" ignores the fact that entries with ut_host of ":0.0" are not real 140.\" login sessions. Normally such entries are ignored except in the case 141.\" of a user being logged in when the 142.\" .Pa wtmp 143.\" file was rotated, in which case a login with ut_host of ":0.0" may --- 12 unchanged lines hidden --- |