1.\" Copyright (c) 1980, 1990, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. 9.\" 2. Redistributions in binary form must reproduce the above copyright 10.\" notice, this list of conditions and the following disclaimer in the 11.\" documentation and/or other materials provided with the distribution. 12.\" 3. Neither the name of the University nor the names of its contributors 13.\" may be used to endorse or promote products derived from this software 14.\" without specific prior written permission. 15.\" 16.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 17.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 18.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 19.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 20.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 21.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 22.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 23.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 24.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 25.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 26.\" SUCH DAMAGE. 27.\" 28.\" @(#)from.1 8.2 (Berkeley) 12/30/93 29.\" 30.Dd December 30, 1993 31.Dt FROM 1 32.Os 33.Sh NAME 34.Nm from 35.Nd print names of those who have sent mail 36.Sh SYNOPSIS 37.Nm 38.Op Fl c 39.Op Fl f Ar file 40.Op Fl s Ar sender 41.Op Ar user 42.Sh DESCRIPTION 43The 44.Nm 45utility prints 46out the mail header lines from the invoker's mailbox. 47.Pp 48The following options are available: 49.Bl -tag -width indent 50.It Fl c 51Just print a count of messages and exit. 52.It Fl f Ar file 53The supplied 54.Ar file 55is examined instead of the invoker's mailbox. 56If the 57.Fl f 58option is used, the 59.Ar user 60argument should not be used. 61Read from standard input if file name 62.Dq Fl 63is given. 64.It Fl s Ar sender 65Only mail from addresses containing 66the 67supplied string are printed. 68.El 69.Pp 70If 71.Ar user 72is given, the 73.Ar user Ns 's 74mailbox is examined instead of the invoker's own mailbox. 75(Privileges are required.) 76.Sh ENVIRONMENT 77.Bl -tag -width indent 78.It Ev MAIL 79If set, the location of the invoker's mailbox. 80Otherwise, the default in 81.Pa /var/mail 82is used. 83.El 84.Sh FILES 85.Bl -tag -width ".Pa /var/mail/*" -compact 86.It Pa /var/mail/* 87.El 88.Sh SEE ALSO 89.Xr biff 1 , 90.Xr mail 1 91.Sh HISTORY 92The 93.Nm 94command appeared in 95.Bx 3.0 . 96