SlideShare a Scribd company logo
1 of 8
Download to read offline
LINUX BASIC COMMANDS
(1) alias:
A way to run a command (or) a series of unix commands using a shorter
name than those that are usually associated with such commands.
(2) apt-get:
Apt-get is a tool to automatically update a Debian machine and to get
and install Debian packages/programs.
(3) Aspell:
GNU Aspell is a free and open source spell checker designed to replace
Ispell.It can either be used as a library or as an independent spell checker.
(4) Awk:
A programming language tool used to manipulate text.The language of
the Awk utility resembles the shell programming language in many areas, although
Awk's syntax is very much it's own.
(5) Gawk:
Gawk is the GNU projects version of the Awk programming language.
(6) bzip2:
A portable,fast,open source program used to compress and decompress
files at a high rate.
(7) cat:
A Unix/Linux command that can read,modify (or) concentrate text
files.Cat commands are most commonly used for displaying the contents of a file.
(8) cd:
The cd command changes the current directory in Linux and can toggle
between directories conveniently. Cd is similar to the CD and CHDIR commands in
MS-DOS.
(9) chmod:
Chmod changes the access mode (permissions) of one or more files.Only
the owner of a file or a privileged user may change the access mode.
(10) chown:
Chown changes file or group ownership and has the option to change
ownership of all objects within a directory tree, as well as having the ability to view
information on objects processed.
(11) cmp:
The cmp utility compares two files of any type and writes the results to
the standard output. By default, cmp is silent if the files are the same; if they differ,
the byte and line number at which the first difference occurred is reported.
(12) comm:
Comm compares lines common to file1 and file2.The output is in three
columns; from left to right: lines unique to file1, lines unique to file2 and lines
common to both files.
(13) cp:
The cp command copies files and directories; copies can be made
simultaneous to another directory if the copy is under a different name.
(14) cpio:
Cpio copies files into or out of a cpio or tar archive. A tar archive is a file
that contains other files, plus information about them, such as their file name, owner,
timestamps and access permissions.
The archive can be another file on the disk, a magnetic tape or a pipe.
Cpio has three operating modes and is a more efficient alternative to tar.
(15) cron:
CRON is a Linux system process that will execute a program at a preset
time. To use CRON, a user must prepare a text file that describes the program to be
executed and the times at which CRON should execute them. Then the crontab
program can be used to load the text file that describes the CRON jobs into CRON.
(16) date:
Date sets a system's date and time. This is also a useful way to
output/print current information when working in a script file.
(17) declare:
Declare declares variables, gives them attributes or modifies properties
of variables.
(18) df:
Df displays the amount of disk space available on the file system
containing each file name argument. With no file name, available space on all
currently mounted file systems is shown.
(19) echo:
Echo allows a user to repeat, or "echo," a string variable to standard
output.
(20) enable:
Enable will stop or start printers or classes.
(21) env:
Env runs a program in a modified environment or displays the current
environment and its variables.
(22) eval:
Eval evaluates several arguments, concatenates them into a single
command and then reports on that argument's status.
(23) exec:
Exec replaces the parent process with whatever command is typed.This
command treats its arguments as the specification of one or more subprocesses to
execute.
(24) exit:
The exit command terminates a script and can return a value to the
parent script.
(25) expect:
Expect talks to other interactive programs according to a script and waits
for a response, often from any string that matches a given pattern.
(26) export:
Export converts a file into a different format than the one in which it is
currently. Once a file is exported, it can be accessed by any application that uses its
format.
(27) find:
Find searches the directory tree to find particular groups of files that
meet specified conditions, including --name and --type, -exec and --size and --mtime
and –user.
(28) for,while:
For and while are used to execute or loop items repeatedly as long as
certain conditions are met.
(29) free:
Free displays the total amount of free and used physical memory and
swap space in the system, as well as the buffers and cache used by the kernel.
(30) grep:
Grep searches files for a given character string or pattern and can replace
the string with another. This is one method of searching for files within Linux.
(31) gzip:
Gzip is the GNU project's open source program used for file
compression, compressing web pages on the server end for decompression in the
browser.
This is popular for streaming media compression and can concatenate
and compress several streams simultaneously.
(32) ifconfig:
Ifconfig is used to configure the kernel-resident network interfaces. It is
used at boot time to set up interfaces. After that, it is usually only needed when
debugging or when system tuning is needed.
(33) ifup:
Ifup configures a network interface/enables a network connection.
(34) ifdown:
Ifdown configures a network interface/disables a network connection.
(35) less,more:
The less command lets an admin scroll through configuration and error
log files, displaying text files one screen at a time, with backward or forward moving
available in files.
There is more mobility within files.View several different file types with
less.Similar to less, more pages through text one screen at a time, but is more limited
in moving in files.
(36) locate,slocate:
Locate reads one or more databases and writes file names matching
certain patterns to output.Finding files/directories efficiently with locate.
Like locate, slocate, or secure locate, provides a way to index and
quickly search for files, but also securely stores file permissions and ownership so
unauthorized users will be unable to view such information.
(37) lft:
Lft is similar to traceroute in determining connection routes, but provides
a lot more information for debugging connections or finding where a box/system is.
Lft also displays route packets and file types.
(38) ln:
The ln command creates a new name for a file through hard
linking,allowing multiple users to share one file.
(39) ls:
The ls command lists files and directories within the current working
directory, allowing admins to see when configuration files were last edited.
(40) man:
Short for "manual," man allows a user to format and display the user
manual built into Linux distributions which documents commands and other aspects
of the system.
(41) mc:
A visual shell, text-based file manager for Unix systems.An extensive
guide to managing files with mc.
(42) neat:
Neat is a GNOME GUI admin tool which allows admins to specify the
information needed to set up a network card, among other features.
Setting up an NTL Cable Modem using neat.Where neat falls when
building a network between Unix and Linux systems.
(43) netconfig/netcfg:
Netconfig configures a network, enables network products and displays a
series of screens that ask for configuration information. Configuring networks using
netcfg.
(44) netstat:
Netstat provides information and statistics about protocols in use and
current TCP/IP network connections.
It is a helpful forensic tool in figuring out which processes and programs
are active on a computer and are involved in network communications.
(45) nslookup:
Nslookup allows a user to enter a host name and find the corresponding
IP address. A reverse of that process to find the host name is also possible.
(46) od:
Od is used to dump binary files in octal (or hex/binary) format to
standard output.
(47) passwd:
Passwd updates a user's authentication tokens (changes their current
password).
(48) ping:
Ping allows a user to verify that a particular IP address exists and can
accept requests. Ping can be used to test connectivity and determine response time, as
well as to ensure that a host computer the user is trying to reach is actually operating.
(49) ps:
Ps reports the statuses of current processes in a system.
(50) pwd:
The pwd (print working directory) command displays the name of the
current working directory. This is a basic Linux command.
(51) read:
Read is used to read lines of text from standard input and to assign
values of each field in the input line to shell variables for further processing.
(52) rpm:
Red Hat Package Manager (RPM) is a command-line-driven program
capable of installing, uninstalling and managing software packages in Linux.
(53) rsync:
Rsync syncs data from one disk or file to another across a network
connection. Rsync is similar to rcp, but has more options.
(54) screen:
The GNU screen utility is a terminal multiplexor in which a user can use
a single terminal window to run multiple terminal applications or windows.
(55) sdiff:
Sdiff finds differences between two files by producing a side-by-side
listing indicating lines that are dissimilar. Sdiff then merges the files and outputs
results to the outfile.
(56) sed:
Sed is a stream editor that is used to filter text in a
pipeline,distinguishing it from other editors.
Sed takes text input, performs operations on it and outputs the modified
text. Sed is typically used to extract part of a file using pattern matching or to
substitute multiple occurrences of a string within a file.
(58) snort:
Snort is an open source network intrusion detection system and packet
sniffer that monitors network traffic, looking at each packet to detect dangerous
payloads or suspicious anomalies. Snort is based on libpcap.
(59) sort:
Used to sort lines of text alphabetically or numerically according to
fields; multiple sort keys can also be used.
(60) sudo:
Sudo allows a system admin to give certain users the ability to run some
(or all) commands at the root level and logs all commands and arguments.
(61) ssh:
SSH is a command interface used for securely gaining access to a remote
computer and is used by network admins to control servers remotely.
(62) tar:
The tar program provides the ability to create archives from a number of
specified files or to extract files from such an archive.
(63) top:
TOP is a set of protocols for networks that performs distributed
information processing in offices and displays the tasks on the system that take up the
most memory. TOP can sort tasks by CPU usage,memory usage and runtime.
(64) tr:
Tr is used to translate or delete characters from a text stream. Tr writes to
standard output, but does not accept file names as arguments -- it only accepts inputs
from standard input.
(65) traceroute:
Traceroute determines and records a route through the internet between
two computers and is useful for troubleshooting network/router issues.
If the domain does not work or is not available,an IP can be tracerouted.
(66) uname:
Uname displays the name of the current operating system and can print
information about the system.
(67) uniq:
Uniq compares adjacent lines in a file and removes/reports any duplicate
lines.
(68) vi:
Vi is a text editor that allows a user to control the system by solely using
the keyboard instead of a combination of mouse selections and keystrokes.
(69) vmstat:
Vmstat is used to get a snapshot of everything in a system and to report
information on such items as processes, memory, paging and CPU activity.
This is a good method for admins to use to determine where
issues/slowdown in a system may be occurring.
(70) wc:
Wc counts the number of words, lines and characters in text files and
produces a count for multiple files if several files are selected.
(71) wget:
Wget is a network utility that retrieves files from the web that support
http, https and ftp protocols. Wget works non-interactively in the background while a
user is logged off.
This can create local versions of remote websites, re-creating directories
of original sites.
(72) whoami:
Whoami prints or writes the user/login name associated with the current
user ID to the standard output.
(73) xargs:
Xargs reads, builds and executes arguments from standard input; blank
lines in the input are ignored.

More Related Content

What's hot

101 2.3 manage shared libraries
101 2.3 manage shared libraries101 2.3 manage shared libraries
101 2.3 manage shared librariesAcácio Oliveira
 
Architecture Of The Linux Kernel
Architecture Of The Linux KernelArchitecture Of The Linux Kernel
Architecture Of The Linux Kernelguest547d74
 
Linux presentation
Linux presentationLinux presentation
Linux presentationNikhil Jain
 
NTP Software Jan 2012 Monthly Meeting IPC Presentation
NTP Software Jan 2012 Monthly Meeting IPC PresentationNTP Software Jan 2012 Monthly Meeting IPC Presentation
NTP Software Jan 2012 Monthly Meeting IPC PresentationMuhamad Hesham
 
Data Structures used in Linux kernel
Data Structures used in Linux kernel Data Structures used in Linux kernel
Data Structures used in Linux kernel assinha
 
Linux containers-namespaces(Dec 2014)
Linux containers-namespaces(Dec 2014)Linux containers-namespaces(Dec 2014)
Linux containers-namespaces(Dec 2014)Ralf Dannert
 
Some basic unix commands
Some basic unix commandsSome basic unix commands
Some basic unix commandsaaj_sarkar06
 
2.3 manage shared libraries
2.3 manage shared libraries2.3 manage shared libraries
2.3 manage shared librariesAcácio Oliveira
 
Network File System in Distributed Computing
Network File System in Distributed ComputingNetwork File System in Distributed Computing
Network File System in Distributed ComputingChandan Padalkar
 
Linux basics part 1
Linux basics part 1Linux basics part 1
Linux basics part 1Lilesh Pathe
 
VTU 3RD SEM UNIX AND SHELL PROGRAMMING SOLVED PAPERS
VTU 3RD SEM UNIX AND SHELL PROGRAMMING SOLVED PAPERSVTU 3RD SEM UNIX AND SHELL PROGRAMMING SOLVED PAPERS
VTU 3RD SEM UNIX AND SHELL PROGRAMMING SOLVED PAPERSvtunotesbysree
 
Linux week 2
Linux week 2Linux week 2
Linux week 2Vinoth Sn
 
LINUX Admin Quick Reference
LINUX Admin Quick ReferenceLINUX Admin Quick Reference
LINUX Admin Quick Referencewensheng wei
 
Unix/Linux Basic Commands and Shell Script
Unix/Linux Basic Commands and Shell ScriptUnix/Linux Basic Commands and Shell Script
Unix/Linux Basic Commands and Shell Scriptsbmguys
 
Linux admin interview questions
Linux admin interview questionsLinux admin interview questions
Linux admin interview questionsKavya Sri
 

What's hot (20)

101 2.3 manage shared libraries
101 2.3 manage shared libraries101 2.3 manage shared libraries
101 2.3 manage shared libraries
 
Architecture Of The Linux Kernel
Architecture Of The Linux KernelArchitecture Of The Linux Kernel
Architecture Of The Linux Kernel
 
Ch18 system administration
Ch18 system administration Ch18 system administration
Ch18 system administration
 
Nfs
NfsNfs
Nfs
 
Linux presentation
Linux presentationLinux presentation
Linux presentation
 
NTP Software Jan 2012 Monthly Meeting IPC Presentation
NTP Software Jan 2012 Monthly Meeting IPC PresentationNTP Software Jan 2012 Monthly Meeting IPC Presentation
NTP Software Jan 2012 Monthly Meeting IPC Presentation
 
Data Structures used in Linux kernel
Data Structures used in Linux kernel Data Structures used in Linux kernel
Data Structures used in Linux kernel
 
Linux containers-namespaces(Dec 2014)
Linux containers-namespaces(Dec 2014)Linux containers-namespaces(Dec 2014)
Linux containers-namespaces(Dec 2014)
 
Libra Library OS
Libra Library OSLibra Library OS
Libra Library OS
 
Some basic unix commands
Some basic unix commandsSome basic unix commands
Some basic unix commands
 
2.3 manage shared libraries
2.3 manage shared libraries2.3 manage shared libraries
2.3 manage shared libraries
 
Network File System in Distributed Computing
Network File System in Distributed ComputingNetwork File System in Distributed Computing
Network File System in Distributed Computing
 
Linux basics part 1
Linux basics part 1Linux basics part 1
Linux basics part 1
 
Basic unix commands
Basic unix commandsBasic unix commands
Basic unix commands
 
VTU 3RD SEM UNIX AND SHELL PROGRAMMING SOLVED PAPERS
VTU 3RD SEM UNIX AND SHELL PROGRAMMING SOLVED PAPERSVTU 3RD SEM UNIX AND SHELL PROGRAMMING SOLVED PAPERS
VTU 3RD SEM UNIX AND SHELL PROGRAMMING SOLVED PAPERS
 
Linux week 2
Linux week 2Linux week 2
Linux week 2
 
LINUX Admin Quick Reference
LINUX Admin Quick ReferenceLINUX Admin Quick Reference
LINUX Admin Quick Reference
 
Unix/Linux Basic Commands and Shell Script
Unix/Linux Basic Commands and Shell ScriptUnix/Linux Basic Commands and Shell Script
Unix/Linux Basic Commands and Shell Script
 
Linux admin interview questions
Linux admin interview questionsLinux admin interview questions
Linux admin interview questions
 
Nfs
NfsNfs
Nfs
 

Similar to Linuxbasiccommands

Similar to Linuxbasiccommands (20)

Linux
LinuxLinux
Linux
 
Linux internal
Linux internalLinux internal
Linux internal
 
Linux architecture
Linux architectureLinux architecture
Linux architecture
 
Linux architecture
Linux architectureLinux architecture
Linux architecture
 
Unix1
Unix1Unix1
Unix1
 
Driver Programming Report
Driver Programming ReportDriver Programming Report
Driver Programming Report
 
Linux file commands and shell scripts
Linux file commands and shell scriptsLinux file commands and shell scripts
Linux file commands and shell scripts
 
Linux@assignment ppt
Linux@assignment pptLinux@assignment ppt
Linux@assignment ppt
 
Linux: An Unbeaten Empire
Linux: An Unbeaten EmpireLinux: An Unbeaten Empire
Linux: An Unbeaten Empire
 
chapter-1-introduction-to-linux.ppt
chapter-1-introduction-to-linux.pptchapter-1-introduction-to-linux.ppt
chapter-1-introduction-to-linux.ppt
 
Introduction to Linux.ppt
Introduction to Linux.pptIntroduction to Linux.ppt
Introduction to Linux.ppt
 
Linux basic
Linux basicLinux basic
Linux basic
 
Linuxppt
LinuxpptLinuxppt
Linuxppt
 
Linux
LinuxLinux
Linux
 
Linux introduction (eng)
Linux introduction (eng)Linux introduction (eng)
Linux introduction (eng)
 
Introduction 2 linux
Introduction 2 linuxIntroduction 2 linux
Introduction 2 linux
 
Unit V.pptx
Unit V.pptxUnit V.pptx
Unit V.pptx
 
Linux
LinuxLinux
Linux
 
Bootcamp linux commands
Bootcamp linux commandsBootcamp linux commands
Bootcamp linux commands
 
Unix_Introduction_BCA.pptx the very basi
Unix_Introduction_BCA.pptx the very basiUnix_Introduction_BCA.pptx the very basi
Unix_Introduction_BCA.pptx the very basi
 

Recently uploaded

Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Standamitlee9823
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxfenichawla
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Christo Ananth
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptMsecMca
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 

Recently uploaded (20)

Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night StandCall Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Bangalore ☎ 7737669865 🥵 Book Your One night Stand
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Wakad Call Me 7737669865 Budget Friendly No Advance Booking
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 

Linuxbasiccommands

  • 1. LINUX BASIC COMMANDS (1) alias: A way to run a command (or) a series of unix commands using a shorter name than those that are usually associated with such commands. (2) apt-get: Apt-get is a tool to automatically update a Debian machine and to get and install Debian packages/programs. (3) Aspell: GNU Aspell is a free and open source spell checker designed to replace Ispell.It can either be used as a library or as an independent spell checker. (4) Awk: A programming language tool used to manipulate text.The language of the Awk utility resembles the shell programming language in many areas, although Awk's syntax is very much it's own. (5) Gawk: Gawk is the GNU projects version of the Awk programming language. (6) bzip2: A portable,fast,open source program used to compress and decompress files at a high rate. (7) cat: A Unix/Linux command that can read,modify (or) concentrate text files.Cat commands are most commonly used for displaying the contents of a file. (8) cd: The cd command changes the current directory in Linux and can toggle between directories conveniently. Cd is similar to the CD and CHDIR commands in MS-DOS. (9) chmod: Chmod changes the access mode (permissions) of one or more files.Only the owner of a file or a privileged user may change the access mode. (10) chown: Chown changes file or group ownership and has the option to change ownership of all objects within a directory tree, as well as having the ability to view information on objects processed.
  • 2. (11) cmp: The cmp utility compares two files of any type and writes the results to the standard output. By default, cmp is silent if the files are the same; if they differ, the byte and line number at which the first difference occurred is reported. (12) comm: Comm compares lines common to file1 and file2.The output is in three columns; from left to right: lines unique to file1, lines unique to file2 and lines common to both files. (13) cp: The cp command copies files and directories; copies can be made simultaneous to another directory if the copy is under a different name. (14) cpio: Cpio copies files into or out of a cpio or tar archive. A tar archive is a file that contains other files, plus information about them, such as their file name, owner, timestamps and access permissions. The archive can be another file on the disk, a magnetic tape or a pipe. Cpio has three operating modes and is a more efficient alternative to tar. (15) cron: CRON is a Linux system process that will execute a program at a preset time. To use CRON, a user must prepare a text file that describes the program to be executed and the times at which CRON should execute them. Then the crontab program can be used to load the text file that describes the CRON jobs into CRON. (16) date: Date sets a system's date and time. This is also a useful way to output/print current information when working in a script file. (17) declare: Declare declares variables, gives them attributes or modifies properties of variables. (18) df: Df displays the amount of disk space available on the file system containing each file name argument. With no file name, available space on all currently mounted file systems is shown. (19) echo: Echo allows a user to repeat, or "echo," a string variable to standard output.
  • 3. (20) enable: Enable will stop or start printers or classes. (21) env: Env runs a program in a modified environment or displays the current environment and its variables. (22) eval: Eval evaluates several arguments, concatenates them into a single command and then reports on that argument's status. (23) exec: Exec replaces the parent process with whatever command is typed.This command treats its arguments as the specification of one or more subprocesses to execute. (24) exit: The exit command terminates a script and can return a value to the parent script. (25) expect: Expect talks to other interactive programs according to a script and waits for a response, often from any string that matches a given pattern. (26) export: Export converts a file into a different format than the one in which it is currently. Once a file is exported, it can be accessed by any application that uses its format. (27) find: Find searches the directory tree to find particular groups of files that meet specified conditions, including --name and --type, -exec and --size and --mtime and –user. (28) for,while: For and while are used to execute or loop items repeatedly as long as certain conditions are met. (29) free: Free displays the total amount of free and used physical memory and swap space in the system, as well as the buffers and cache used by the kernel. (30) grep: Grep searches files for a given character string or pattern and can replace the string with another. This is one method of searching for files within Linux.
  • 4. (31) gzip: Gzip is the GNU project's open source program used for file compression, compressing web pages on the server end for decompression in the browser. This is popular for streaming media compression and can concatenate and compress several streams simultaneously. (32) ifconfig: Ifconfig is used to configure the kernel-resident network interfaces. It is used at boot time to set up interfaces. After that, it is usually only needed when debugging or when system tuning is needed. (33) ifup: Ifup configures a network interface/enables a network connection. (34) ifdown: Ifdown configures a network interface/disables a network connection. (35) less,more: The less command lets an admin scroll through configuration and error log files, displaying text files one screen at a time, with backward or forward moving available in files. There is more mobility within files.View several different file types with less.Similar to less, more pages through text one screen at a time, but is more limited in moving in files. (36) locate,slocate: Locate reads one or more databases and writes file names matching certain patterns to output.Finding files/directories efficiently with locate. Like locate, slocate, or secure locate, provides a way to index and quickly search for files, but also securely stores file permissions and ownership so unauthorized users will be unable to view such information. (37) lft: Lft is similar to traceroute in determining connection routes, but provides a lot more information for debugging connections or finding where a box/system is. Lft also displays route packets and file types. (38) ln: The ln command creates a new name for a file through hard linking,allowing multiple users to share one file. (39) ls: The ls command lists files and directories within the current working directory, allowing admins to see when configuration files were last edited.
  • 5. (40) man: Short for "manual," man allows a user to format and display the user manual built into Linux distributions which documents commands and other aspects of the system. (41) mc: A visual shell, text-based file manager for Unix systems.An extensive guide to managing files with mc. (42) neat: Neat is a GNOME GUI admin tool which allows admins to specify the information needed to set up a network card, among other features. Setting up an NTL Cable Modem using neat.Where neat falls when building a network between Unix and Linux systems. (43) netconfig/netcfg: Netconfig configures a network, enables network products and displays a series of screens that ask for configuration information. Configuring networks using netcfg. (44) netstat: Netstat provides information and statistics about protocols in use and current TCP/IP network connections. It is a helpful forensic tool in figuring out which processes and programs are active on a computer and are involved in network communications. (45) nslookup: Nslookup allows a user to enter a host name and find the corresponding IP address. A reverse of that process to find the host name is also possible. (46) od: Od is used to dump binary files in octal (or hex/binary) format to standard output. (47) passwd: Passwd updates a user's authentication tokens (changes their current password). (48) ping: Ping allows a user to verify that a particular IP address exists and can accept requests. Ping can be used to test connectivity and determine response time, as well as to ensure that a host computer the user is trying to reach is actually operating.
  • 6. (49) ps: Ps reports the statuses of current processes in a system. (50) pwd: The pwd (print working directory) command displays the name of the current working directory. This is a basic Linux command. (51) read: Read is used to read lines of text from standard input and to assign values of each field in the input line to shell variables for further processing. (52) rpm: Red Hat Package Manager (RPM) is a command-line-driven program capable of installing, uninstalling and managing software packages in Linux. (53) rsync: Rsync syncs data from one disk or file to another across a network connection. Rsync is similar to rcp, but has more options. (54) screen: The GNU screen utility is a terminal multiplexor in which a user can use a single terminal window to run multiple terminal applications or windows. (55) sdiff: Sdiff finds differences between two files by producing a side-by-side listing indicating lines that are dissimilar. Sdiff then merges the files and outputs results to the outfile. (56) sed: Sed is a stream editor that is used to filter text in a pipeline,distinguishing it from other editors. Sed takes text input, performs operations on it and outputs the modified text. Sed is typically used to extract part of a file using pattern matching or to substitute multiple occurrences of a string within a file. (58) snort: Snort is an open source network intrusion detection system and packet sniffer that monitors network traffic, looking at each packet to detect dangerous payloads or suspicious anomalies. Snort is based on libpcap. (59) sort: Used to sort lines of text alphabetically or numerically according to fields; multiple sort keys can also be used.
  • 7. (60) sudo: Sudo allows a system admin to give certain users the ability to run some (or all) commands at the root level and logs all commands and arguments. (61) ssh: SSH is a command interface used for securely gaining access to a remote computer and is used by network admins to control servers remotely. (62) tar: The tar program provides the ability to create archives from a number of specified files or to extract files from such an archive. (63) top: TOP is a set of protocols for networks that performs distributed information processing in offices and displays the tasks on the system that take up the most memory. TOP can sort tasks by CPU usage,memory usage and runtime. (64) tr: Tr is used to translate or delete characters from a text stream. Tr writes to standard output, but does not accept file names as arguments -- it only accepts inputs from standard input. (65) traceroute: Traceroute determines and records a route through the internet between two computers and is useful for troubleshooting network/router issues. If the domain does not work or is not available,an IP can be tracerouted. (66) uname: Uname displays the name of the current operating system and can print information about the system. (67) uniq: Uniq compares adjacent lines in a file and removes/reports any duplicate lines. (68) vi: Vi is a text editor that allows a user to control the system by solely using the keyboard instead of a combination of mouse selections and keystrokes. (69) vmstat: Vmstat is used to get a snapshot of everything in a system and to report information on such items as processes, memory, paging and CPU activity. This is a good method for admins to use to determine where issues/slowdown in a system may be occurring.
  • 8. (70) wc: Wc counts the number of words, lines and characters in text files and produces a count for multiple files if several files are selected. (71) wget: Wget is a network utility that retrieves files from the web that support http, https and ftp protocols. Wget works non-interactively in the background while a user is logged off. This can create local versions of remote websites, re-creating directories of original sites. (72) whoami: Whoami prints or writes the user/login name associated with the current user ID to the standard output. (73) xargs: Xargs reads, builds and executes arguments from standard input; blank lines in the input are ignored.