...LESSON 2 BASIC COMMANDS IN LINUX AND WINDOWS LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS “License for Use” Information The following lessons and workbooks are open and publicly available under the following terms and conditions of ISECOM: All works in the Hacker Highschool project are provided for non-commercial use with elementary school students, junior high school students, and high school students whether in a public institution, private institution, or a part of home-schooling. These materials may not be reproduced for sale in any form. The provision of any class, course, training, or camp with these materials for which a fee is charged is expressly forbidden without a license including college classes, university classes, trade-school classes, summer or computer camps, and similar. To purchase a license, visit the LICENSE section of the Hacker Highschool web page at www.hackerhighschool.org/license. The HHS Project is a learning tool and as with any learning tool, the instruction is the influence of the instructor and not the tool. ISECOM cannot accept responsibility for how any information herein is applied or abused. The HHS Project is an open community effort and if you find value in this project, we do ask you support us through the purchase of a license, a donation, or sponsorship. All works copyright ISECOM, 2004. 2 LESSON 2 – BASIC COMMANDS IN LINUX AND WINDOWS Table of Contents “License for Use” Information....................
Words: 2543 - Pages: 11
...Discipline is the glue that holds a combat team together. Without it there is no unit cohesion, no espirit de corps, no coordination. However, discipline is a complex product of training, leadership, and respect. It is respect which creates devotion to the team, and the important part is that that respect flows both up and down the chain of command. A leader respects the skills, strengths, and sacrifices of the people who work for him, and by giving that respect, in time and with effort, his troops come to respect him as well. That respect grows into devotion: the devotion of the leader to his troops, to do his best to see them through tough times and bring them home to their families, and the devotion of the troops to accomplishing the tasks of their unit under the vision of their leadership. Disrespect, however, has exactly the opposite effect. If a leader disrespects his troops, he fails to earn their respect and therefore fails to create devotion to the team. His attitude will be noticed and will become detrimental to morale, which in turn will hurt the combat effectiveness of each troop as well as the whole. Because he cannot respect his troops, he will also fail to recognize their true strengths and employ his forces to the best of their respective abilities. If, on the other hand, a troop fails to form respect for ANY leader, no matter how good that leader is at their job, then that troop forms a sort of uprising point... a point of discontention that saps unit...
Words: 508 - Pages: 3
...Apply the Ethical Decision Making Method at Small Unit Level 158-C-1230 FM-1 FM 6-22 AR 600-100. Performance Steps: 1. Clearly define the ethical problem. SFC Sharp failed to shred secret documents that he personally marked as shredded. SGT Day is trying to cover for SFC Sharp and is encouraging me to look the other way. 2. Employ applicable laws and regulations. The unit commander and the unit’s standard operating procedure will determine if the documents were mishandled. SFC Sharp recorded the destruction of the book theses pages were from but the commander and proper personnel can determine if misconduct occurred. My responsibility is to report any questionable or unsafe acts. 3. Reflect on the ethical values and their ramifications. FM 1-60 States: “The Army is a values-based organization (Loyalty, Duty, Respect, Selfless Service, Honor, Integrity, Personal courage). It upholds principles that are grounded in the Constitution and inspire guiding values and standards for its members.” FM 1-61 builds on the value based ethics by stating: “The Army Values are the basic building blocks of a Soldier's character...
Words: 565 - Pages: 3
...For example, to use the shortcut Command-C (copy), hold down Command, press C, then release both keys. Mac menus and keyboards often use symbols for certain keys, including the modifier keys: Command ⌘ Shift ⇧ Option ⌥ Control ⌃ Caps Lock ⇪ Fn If you're using a keyboard made for Windows PCs, use the Alt key instead of Option, and the Windows logo key instead of Command. Some Mac keyboards and shortcuts use special keys in the top row, which include icons for volume, display brightness, and other functions. Press the icon key to perform that function, or combine it with the Fn key to use it as an F1, F2, F3, or other standard function key. To learn more shortcuts, check the menus of the app you're using. Every app can have its own shortcuts, and shortcuts that work in one app may not work in another. Cut, copy, paste, and other common shortcuts Shortcut Description Command-X Cut: Remove the selected item and copy it to the Clipboard. Command-C Copy the selected item to the Clipboard. This also works for files in the Finder. Command-V Paste the contents of the Clipboard into the current document or app. This also works for files in the Finder. Command-Z Undo the previous command. You can then press Command-Shift-Z to Redo, reversing the undo command. In some apps, you can undo and redo multiple commands. Command-A Select All items. Command-F Find: Open a Find window, or find items in a document. Command-G Find Again: Find the next occurrence...
Words: 2262 - Pages: 10
...Digital I/O, 192 I/O, 96 I/O, 96i I/O, Adrenaline, AirSpeed, ALEX, Alienbrain, AME, AniMatte, Archive, Archive II, Assistant Station, AudioPages, AudioStation, AutoLoop, AutoSync, Avid, Avid Active, Avid Advanced Response, Avid DNA, Avid DNxcel, Avid DNxHD, Avid DS Assist Station, Avid Ignite, Avid Liquid, Avid Media Engine, Avid Media Processor, Avid MEDIArray, Avid Mojo, Avid Remote Response, Avid Unity, Avid Unity ISIS, Avid VideoRAID, AvidRAID, AvidShare, AVIDstripe, AVX, Beat Detective, Beauty Without The Bandwidth, Beyond Reality, BF Essentials, Bomb Factory, Bruno, C|24, CaptureManager, ChromaCurve, ChromaWheel, Cineractive Engine, Cineractive Player, Cineractive Viewer, Color Conductor, Command|8, Control|24, Cosmonaut Voice, CountDown, d2, d3, DAE, D-Command, D-Control, Deko, DekoCast, D-Fi, D-fx, Digi 002, Digi 003, DigiBase, Digidesign, Digidesign Audio Engine, Digidesign Development Partners, Digidesign Intelligent Noise Reduction, Digidesign TDM Bus, DigiLink, DigiMeter, DigiPanner, DigiProNet, DigiRack, DigiSerial, DigiSnake, DigiSystem, Digital Choreography, Digital Nonlinear Accelerator, DigiTest, DigiTranslator, DigiWear, DINR, DNxchange, Do More, DPP-1, D-Show, DSP Manager, DS-StorageCalc, DV Toolkit, DVD Complete, D-Verb, Eleven, EM, Euphonix, EUCON, EveryPhase, Expander, ExpertRender, Fairchild, FastBreak, Fast Track, Film Cutter, FilmScribe, Flexevent, FluidMotion, Frame Chase, FXDeko, HD Core, HD Process, HDpack, Home-to-Hollywood, ...
Words: 13199 - Pages: 53
...1. Command used, "whatis ls". The purpose of ls is to list directory contents 2. Command used, "man date". The -R option outputs RFC-2822 complaint date string when used with the date command. 3. Command used, "man clear". Other commands shown from this output in the text were tput and terminfo. 4. Command used, "cal 8 1991". I was born on Friday, August 2nd, 1991. 5. Commands used, "cal 2 20XX (XX being 06 through 15)". By looking for which years contained February 29th, I determined (confirmed) that 2008 and 2012 are both leap years. 6. Commands used, "clear" and "man date". Determined that option -u, --utc, and --universal for the date command will display todays date in UTC. 7. Command used, "date -u". As of right now, todays date and time as displayed from the ouput is Mon Jan 18 21:58:55 UTC 2010. 8. Commands used, "cat > month" and "cal 1 2010 >> month". I used "cat > month" to create a file called month and then " cal 1 2010 >> month" to add information to the existing month file with the current month. 9. Command used, "more month". This command displayed the contents of the month file created in Exercise 8, displaying January of 2010. 10. Commands used, "who -u >> users_info" and "more users_info". The "who -u >> users_info" command input information about idle time for users currently logged into into the file called users_info. The "more users_info" command displayed the contents of this file. 11. Command used, "more month users_info". This displayed the...
Words: 855 - Pages: 4
...Introduction Fayol’s 14 principles derive from the circumstance that Fayol felt that management was not well defined. In his striving to change this circumstance he suggested “some generalized teaching of management” to be a main part of every curriculum at places of higher education and even beginning in “primary schools” . Fayol’s dedication to this idea is demonstrated by the fact that after retirement he went on to not just write books about management ideas, but more importantly, he found the Centre For Administrative Studies (CAS) in 1917 in Paris . The CAS mainly functioned as a centre of discussion between professionals from a large variety of professions, in order to further the knowledge and understanding of management principles. Discussion is what Fayol had in mind, when he presented his 14 principles . In Fayol’s own words: “Are they [the principles] to have a place in the management code which is to be built up? General discussion will show”. In the following I will discuss each of his principles under the aspect of a comparison with examples, historic or modern, and in relation to other theoreticians of management, in order to examine how Fayol’s principles hold up as “management code” today. Principle 1: Division of work The idea of division of work, or as Adam Smith called it “division of labour”, in 1776 probably goes back to the beginning of work itself. Fayol recognizes this in considering specialization as part of “the natural order” comparing...
Words: 4716 - Pages: 19
...to add 500 gold, it would be entered as: player.additem 00000f 500 Targeting To target an object, open the console and click the object. Its name will appear about center screen. An item targeted in the console is also called a reference. A target may also be selected using the PRID command and the target's Reference ID. Short Code or Prefix Required Short code refers to a code having a short form that can be used interchangeably with the Long form. * ToggleFogOfWar is the long code form. * TFOW is the short code form. Prefix Required refers to a code needing a prefix to work as intended. * SetHealth <#> will set the max health of the target selected by clicking or the PRID command to <#>. * Player.SetHealth <#> will set your max health to <#>. Subpages Alchemy | Armor | Items | Food and Drinks Potions and Poisons Ingredients | Heavy Light Clothing Jewelry | Books Keys Miscellaneous Soul Gems | Weapons | Magic | Other | Arrows Blades Blunts Bows Staves | Spells Diseases Enchantments Perks Shouts Skills | Actor Values Batch Lists Characters Factions Locations Weather | Toggle commands Command | Effect | rm | Toggle Run Mode. Will switch between run mode and walking mode. Same function as <Caps Lock> key. | tg | Toggles grass | ts | Toggles display of skybox and fog. | TLL | Toggles LOD | TIM | Toggle Immortal Mode (Still take damage, health will never...
Words: 2661 - Pages: 11
...(starting from node A), what command would you use to get this information? Give the command sequence you would enter at the command line to retrieve this information. I already have the IP Addresses for all the workstations a simple Ping command in CMD will work. Windows+R will bring up run command type CMD or go to start menu then accessories CMD. From CMD we would type Ping –a 192.168.1.5 to retrieve the information we need. Exercise 5.4.2 What is the best (easiest and most efficient) command to determine whether all the hosts on the local-area network are reachable? You can assume that you are starting from computer A. List the command sequence(s) you would need to enter to test this functionality. Windows+R will bring up run command type CMD or go to start menu then accessories CMD. From CMD we would type Ping 192.168.1.5, Ping 192.168.1.4, and Ping 192.168.1.3, Ping 192.168.1.6, and Ping 192.168.1.2. This would be a quick easier way but for a more complex way type FOR /L %i IN (1,1,254) DO ping -n 1 192.168.1.%i | FIND /i "Reply">>c:\ipaddresses.txt in CMD. exercise 5.4.3 Exercise 5.4.3 If your computer (node A) is unable to reach the Internet, what is the best way to determine where the error is occurring using command-line networking? Give the command sequence you would use to determine this. Ping 192.168.1.4 Exercise 5.4.4 If your local machine (node A) is not connecting to any other hosts on the network, what two commands will give you information on whether...
Words: 344 - Pages: 2
...their center. Useful. Option key (Alt) - point on a path between any two points while pressing option. Path will be stretch as you move the pointer. Sometimes useful. Option key (Alt) - when pressed, you can select any object in the group. Very useful. To edit a text block in a group you don't have to use Option, just insert text cursor and edit. Option key (Alt) - when pressed, you can click on any object and drag it to create a copy of this object. You can't however, copy groups this way. Option key (Alt) - when in text-editing mode, you can position cursor between any two letters, press Option and right-arrow or left-arrow keys to increase or decrease tracking. Note: you can combine Shift, Control and Option in many cases. Command key - when pressed, arrow for selection appears. When depressed returns to the last selected tool. Useful when you forget to select a point or an object. Space bar - when pressed, little hand appears, allowing you to move...
Words: 385 - Pages: 2
...------------------------------------------------- Superior orders From Wikipedia, the free encyclopedia (Redirected from Superior Orders) Superior orders, often known as the Nuremberg defense, lawful orders or by the German phrase "Befehl ist Befehl" ("orders are orders"), is a plea in a court of law that a person, whether a member of the armed forces or a civilian, not be held guilty for actions which were ordered by a superior officer or a public official.[1] The superior orders plea is often regarded as the complement to command responsibility.[2] One of the most noted uses of this plea, or "defense," was by the accused in the 1945–46 Nuremberg Trials, such that it is also called the "Nuremberg defense". The Nuremberg Trials were a series of military tribunals, held by the main victorious Allied forces after World War II, most notable for the prosecution of prominent members of the political, military, and economic leadership of the defeated Nazi Germany. It was during these trials, under the London Charter of the International Military Tribunal which set them up, that the defense of superior orders was no longer considered enough to escape punishment; but merely enough to lessen punishment.[3] Historically, the plea of superior orders has been used both before and after the Nuremberg Trials, with a notable lack of consistency in various rulings. Apart from the specific plea of Superior Orders, discussions about how the general concept of superior orders ought to...
Words: 2164 - Pages: 9
...1. O IOS 2. L command-line interface (CLI) 3. I user EXEC mode 4. R privileged EXEC mode 5. S global configuration mode 6. A interface configuration mode 7. N routing protocol configuration mode 8. Q IOS image 9. B feature set 10. C ROM monitor /ROMMON 11. T boot ROM 12. D power-on self test (POST) 13. G bootstrap 14. J configuration register 15. U boot field 16. H boot system command 17. M setup mode 18. F host name 19. P console password 20. E enable password 21. K command recall Concept Questions Pg. 24 1. Attach a rollover cable to the PC’s COM port and then use either the Console port or the Auxiliary port on the router. The Console port is preferred because messages from the router are logged on this line. The second way is to use the Auxiliary port for remote access and can also be used if the Console port is damaged or not responding. The third way to access the CLI is through Telnet. 2. The user EXEC can only use a certain amount of commands and the user EXEC can’t configure anything on the router. The privileged EXEC can use every command and can configure the router anyway that person wants. 3. First it’s the platform in which the image runs on, second is the special features that are supported in the image, and last is where the image runs or whether it’s become a zipped or compressed file. 4. ROMMON is not IOS, so it doesn’t accept IOS commands, and it cannot route...
Words: 354 - Pages: 2
...Labs Lab 4.1: Using Linux Command-Line Basics What is the purpose? This lab demonstrates how to redirect data from a process and how to identify and kill a process. What are the steps? • Task 1: Redirecting and piping standard output Procedure 1. Obtain a list of files from the home directory, including the hidden files. Redirect the output to a file named Listing by using the ls -a > listing command. 2. Obtain a long list of files, including the hidden files, and append the output to the same file. 3. Use the cat listing | less command to view the file and pipe the output to less. 4. Use the cat command to view the file again. However, this time, pipe the output to lpr to print the file. 5. Redirect the output of ls to the special file /dev/null. What happens? It’s redirected to dev/null Why? It’s null. • Task 2: Putting tasks in the background and terminating the job Procedure 1. Use the tail –f command to view your listing file from the previous task. The –f option tells tail to follow changes; therefore, the file will continue to run this command until you cancel the command by pressing Ctrl+C. Put the file in the background using the tail -f listing & command. You may need to press Enter again to view the command prompt. 2. Put the process in the background and display the prompt again. Run the top command in the foreground. This will provide you a list of your top 20 processes by CPU usage. Put this list in the background and stop it by pressing...
Words: 780 - Pages: 4
...“The Things They Carried” “The Things They Carried” tells about the side of war that you don’t read about in history books. The author, Tim O’Brien, does outline with great detail what the soldiers in this specific battalion carried, but in a way that you don’t normally read or see. O’Brien does list off the necessity items (can opener, pocket knife, mosquito repellant, etc.) but he also tells what each individual soldier carries because they are just that, individuals. No two have all the same items for the same reasons, each mans pack and artillery is tailored to suit his individual needs. The central character, First Lieutenant Jimmy Cross carried letters from a girl named Martha. “Rat Kiley carried comic books. Kiowa, a devout Baptist, carried an illustrated New Testament.” Out of fear, Ted Lavender carried thirty-four instead of the typical twenty-five grenade launcher rounds when he was shot down. Lavender also carried tranquilizers to help him cope. It’s this detail that helps this story stand out from the history books. We are told why each man carries certain things and this helps us to connect with the men on a personal level. We follow as Cross looks for comfort in the letters from Martha and eventually realizes that he is searching for something that probably isn’t there and destroys them along with the photographs of her. What I take away from this story is that war is very impersonal and at the same time very individualized. Each man contributes something...
Words: 426 - Pages: 2
...Class: BBA 1 (Section B) Course title: Introduction to logic Assignment no 1 Chapter no 3 Categorical proposition Submitted to: Sir Imran Exercise I. State the converses of the following proposition and indicate which of them are equivalent to the given proposition. 1. No people who are considerate of others are reckless drivers who pay no attention to traffic regulations. Answer: No reckless drivers who pay no attention to traffic regulation are people who are considerate of others. (Equivalent) 2. All those who pass the NDA exam are commissioned officers in Indian army. Answer: *All commissioned officer in Indian army are those who pass NDA exam. (Not equivalent) *Some commissioned officer in Indian army are those who pass NDA exam. (Limit) (Equivalent) 3. Some Korean cars are overpriced and inferior quality automobiles. Answer: Some overpriced and inferior quality automobiles are Korean cars. (Equivalent) 4. No reptiles are warm-blooded animals. Answer: No warm-blooded animals are reptiles. (Equivalent) 5. Some film producers are elderly persons who are incapable of producing works of quality anymore. Answer: Some elderly persons who are incapable of producing works of quality anymore are...
Words: 525 - Pages: 3