Free Essay

Linux Cli Paper

In:

Submitted By whitehead76
Words 1015
Pages 5
1) bash- is a Unix shell written by Brian Fox for the GNU Project as a free software replacement for the Bourne shell. Released in 1989, it has been distributed widely as the shell for the GNU operating system and as the default shell on Linux, Mac OS X and Darwin. 2) bsh- (Bourne shell) was the default Unix shell of Unix Version 7. Developed by Stephen Bourne at AT&T Bell Laboratories, it was a replacement for the Thompson shell. It was released in 1977 in the Version 7 Unix release distributed to colleges and universities. 3) tcsh- is a Unix shell based on and compatible with the C shell (csh). It is essentially the C shell with programmable command line completion, command-line editing, and a few other features. 4) csh- is a Unix shell that was created by Bill Joy while a graduate student at University of California, Berkeley in the 1970s. Other early contributors to the ideas or the code were Michael Ubell, Eric Allman, Mike O'Brien and Jim Kulp. The C shell is a command processor typically run in a text window, allowing the user to type commands. The C shell can also read commands from a file, called a script. 5) ksh- is a Unix shell which was developed by David Korn at Bell Labs in the early. Other early contributors were Bell Labs developers Mike Veach and Pat Sullivan, who wrote the Emacs- and vi-style line editing modes′ code, respectively. KornShell is backward-compatible with the Bourne shell and includes many features of the C shell, inspired by the requests of Bell Labs users. 6) zsh- was written by Paul Falstad in 1990 when he was a student at Princeton University and is a Unix shell that can be used as an interactive login shell and as a powerful command interpreter for shell scripting. Zsh can be thought of as an extended Bourne shell with a large number of improvements, including some features of bash, ksh, and tcsh. 7) rc- is the command line interpreter for Version 10 Unix and Plan 9 from Bell Labs operating systems. It resembles the Bourne shell, but its syntax is somewhat simpler. It was created by Tom Duff, who is better known for an unusual C programming language construct called Duff's device. 8) rsh- is a command line computer program that can execute shell commands as another user, and on another computer across a computer network.
Linux Commands pwd-print working directory
$ pwd
/home/foobar
cd-change directory
$ cd /home echo-places a string on the terminal, typically used in scripts
$ echo This is a test.
This is a test. exec- treats its arguments as the specification of one or more subprocesses to execute.
$ int execl(const char *path, const char *arg, ...) ls-lists contents of working directory
$ ls cat- standard Unix utility that concatenates and lists files
$ cat months rm-removes current file
$ rm months hostname-list current hostname
$ hostname localhost.localdomain cp- copies file to another destination/name
$ cp months /home/brandon/months.two mv-moves file to another destination
$ mv months /home/brandon lpr-lineprinter $ lpr –P lab04 grep- is a command-line utility for searching plain-text data sets for lines matching a regular expression, comes from the ed command g/re/p
$ grep apple fruitlist.txt head-lists the first lines of a file as specified
$ head -15 myfile.txt tail-same has head only for the last lines
$ tail -5 myfile.txt sort-sorts file into alpha order
$ sort months uniq- is a Unix utility which, when fed a text file, outputs the file with adjacent identical lines collapsed to one
$ uniq names diff- is a file comparison utility that outputs the differences between two files
$ diff months.one months.two file- is a standard Unix program for recognizing the type of data contained in a computer file using magic numbers
$ file file.c file.c: C program text
| (pipe)- a set of processes chained by their standard streams, so that the output of each process (stdout) feeds directly as input (stdin) to the next one
$ sort months | cp months months.two unix2dos- is a Unix tool to convert an ASCII text file from Unix format (line break) to DOS format (carriage return and line break) and vice versa
$ unix2dos [-p] [file] bzip2- bzip2 compresses files using the Burrows-Wheeler block sorting text compression algorithm, and Huffman coding
$ bzip2 months.txt gzip- Gzip reduces the size of the named files using Lempel-Ziv coding (LZ77). Whenever possible, each file is replaced by one with the extension .gz
$ gzip months.txt tar- is used to convert a group of files into an archive.
$ tar -cf file.tar file1 file2 file3 which + whereis- which- shows the full path of (shell) commands/whereis- locate the binary, source, and manual page files for a command
$ which ls
/bin/ls

$ whereis ls ls: /bin/ls /usr/share/man/man1p/ls.1p.bz2 /usr/share/man/man1/ls.1.bz2 who-shows who is logged in
$ who finger- is a program you can use to find information about computer users. It usually lists the login name, the full name, and possibly other details about the user you are fingering
$ finger write-sends message to another user
$ write brandon Oh hey stud ;P mesg- controls the access to your terminal by others. It's typically used to allow or disallow other users to write to your terminal
$ mesg [n|y]

gedit- $ gedit months nano- $ nano months vim-$ vim months
CUPS- is a modular printing system for Unix-like computer operating systems which allows a computer to act as a print server. man vs info- The info utility displays more complete and up-to-date information on GNU utilities than man. When a man page displays abbreviated information on a utility that is covered by info, the man page refers to info. The man utility frequently displays the only information available on non-GNU utilities. When info displays information on non-GNU utilities, it is frequently a copy of the man page.

Similar Documents

Premium Essay

It 140 Unit 1 Db 2

...Introduction to Operating Systems and Client/Server Environments IT140-1601A-01 Unit 1 – Discussion Board 2 January 6, 2016 Operating Systems Operating Systems (OS) are the key to managing your computer’s software, hardware, processes and memory (GCF Global, 1998-2016). Without it your computer wouldn’t be able to run various programs that need access to volatile information. As technology advances, we need various OSs that can handle the newer computers. Microsoft Windows, Apple Mac OS X and Linux are OSs used on personal computers today and now use a GUI (graphical user interface) where everything can be managed using a click of the mouse (GCF Global, 1998-2016). Back in the old days computers used a CLI (command-line interface) where the user had to physically type in commands using the keyboard in order to pull up information. Icons and Images weren’t developed for use until later on so all you would see on the screen is text with CLI OSs. There are multiple versions of OS because every information systems and processor architecture requires various specifications (Byron, 2009). Most people are familiar with Windows which was created in the mid-1980s by Microsoft (MS). We have all had different versions including (but not limited to) Windows 98, 2000, XP, 7, 8 and Vista. There are also three editions you can choose from; Home Premium, Professional and Ultimate though you are going to pay more for certain packages (GCF Global, 1998-2016)...

Words: 791 - Pages: 4

Free Essay

Computer

...Hardware and software COMPUTERS 1   Computers ENIAC – 1950 2   What is a computer?  A  data  processing  device   designed  to:   }  input  …   }  data  (e.g.  mp3  3ile)   }  software  (e.g.,  iTunes)     }  process  data  by   applying  software   }  output  results   }  store  data  /  program  /   results  between  uses   Apple II – 1977 3   Computer hardware Storage Nonvolatile Non-portable (hard disk) Portable (e.g. CD) Battery Wall plug RAM (Random Access Memory) Volatile Power Source Mouse Keyboard Tablet Input Microphone Devices Webcam Accelerometer Central Central Processing Processing Units Units (cores) (cores) Monitor Printer Output Plotter Devices Projector Input Processing Output 4 Components of a computer }  Hardware   }  CPU    (Central   Processor  Unit):       }  I/O  devices     (Input  /  Output)   }  Storage   }  Power  source     }  Software   }  Operating  System   }  Applications   Is it a computer? Universal computation }  A  processor  with  the  right  software  can  emulate   any  other  data  processing  device   }  E.g.,  a  smartphone  can  be  a  music  player,   translator,  calculator,    GPS  navigator,...

Words: 2444 - Pages: 10

Free Essay

Linux - Open Source

...Linux is an open source operating system. Considering the difficulties and risks in developing an operating system, is it surprising that Linux has been as successful as it has? What makes it so successful, despite these difficulties? Write a short paper answering this question. OpenSorce Operating systems:- Opensource operating systems are the operating systems that are designed and licenced in such a way that they are free to use, free to change the os and can be distributed for free.the source code used to design the os is made free to public so that people can change and modify depending on their needs and can create their own custom versions and re entitiled to be mostly free the examples of the open source are linux operating systems like Ubuntu,Free BSD.The contrary of the opensource os are the regular copyrighted os and software where source code is not entitiled to be realsed and the os is completely copyrighted with the publisher like the windows and macos. Developping an Operating systems. An operating system is a software that will interact with the hardware resources of the computer and effectively use them inorder to input from the user/interface and get the desired results. Developping the early OS began in early 1950’s where the initial code is written in assembly language but soon after the evolution of C language most of the design for early unix is done in C language and the evolution lead to the opensource linux kernel which may or may not...

Words: 1051 - Pages: 5

Premium Essay

Linux Technology

...Reserch Assignment 2.1 Research Assignment 2.1 Kyle McGraw ITT Technical Institute IT302 Linux Mr. Gort April 14, 2012 In this paper I will go over 3 different types of Linux security technologies those follow with SELinux, chroot jail, and iptables. These technologies aid in prevention of identity theft. I will help you understand what they are and who designed them and what good they are for you to use them. In the next paragraphs you will be able to decide which one is for you and more about the use of them. Under the GPL in late 2000 SElinux was released from the National Security Agency’s Office of Information Assurance. More recently it was developed by the open source community with the help of NSA. SElinux currently ships as a part of Fedora Core, and it’s supported by Red Hat. Also there are packages that exist for Debian, SuSe, and Gentoo although at this time these were unsupported by anyone. SElinux is based on the concept of Mandatory Access Control. Under MAC, administrators control every interaction on the software of the system. A least privilege concept is used, by default applications and users have no rights, because all rights have to be granted by an administrator because of the system’s security policy. Under DAC, the files are owned by the user also that user has full control over them. If an attacker penetrates that user’s account they can do whatever with the files owned by that user. Standard UNIX permissions are still present on the system...

Words: 940 - Pages: 4

Premium Essay

Reserch Assignment 2.1

...Research Assignment 2.1 Kyle McGraw ITT Technical Institute IT302 Linux Mr. Gort April 14, 2012 In this paper I will go over 3 different types of Linux security technologies those follow with SELinux, chroot jail, and iptables. These technologies aid in prevention of identity theft. I will help you understand what they are and who designed them and what good they are for you to use them. In the next paragraphs you will be able to decide which one is for you and more about the use of them. Under the GPL in late 2000 SElinux was released from the National Security Agency’s Office of Information Assurance. More recently it was developed by the open source community with the help of NSA. SElinux currently ships as a part of Fedora Core, and it’s supported by Red Hat. Also there are packages that exist for Debian, SuSe, and Gentoo although at this time these were unsupported by anyone. SElinux is based on the concept of Mandatory Access Control. Under MAC, administrators control every interaction on the software of the system. A least privilege concept is used, by default applications and users have no rights, because all rights have to be granted by an administrator because of the system’s security policy. Under DAC, the files are owned by the user also that user has full control over them. If an attacker penetrates that user’s account they can do whatever with the files owned by that user. Standard UNIX permissions are still present on the system, and will be consulted before...

Words: 938 - Pages: 4

Premium Essay

Asdsa

...OPERATING SYSTEMS LECTURE: Chapter 1 INTRODUCTION TO OPERATING SYSTEMS * Elements of a computer system: Hardware, Software, Peopleware, Communication, Data, * Types of Software: System software and application software | Type | Description | Examples | System software | Basic Software | * SW that manages and controls hw and application sw * usually called OS * includes utility programs/ service programs * language processors | OSDevice driversDisc compressionOptimization swScreen saversAnti virus swCompilers/ interpreters | | Middleware | Sw that operates between OS and appcn sw | DbmsCommunication mgmt sysOperations m toolsSw development system | Application software | Common Application Software | Sw that is used for a variety of industries and work | Word processing swSpreadsheet swCad/camStatistical swGraphics swGroupware | | Specific Application Software | Sw that is used for specific industries and work | Payroll calc swFinancial accounting swSales mgmt swProduction mgmt system | | | | | User | | Software Application software Runs on system software platform | | Systems software Middle ware | | Basic software Acts as interface between the hw and appcn sw, and user | | | | hardware | PURPOSE OF OPERATING SYSTEM * provide an environment within the hardware so that users can execute their programs * serves as a platform where other programs can run goal of OS ...

Words: 3515 - Pages: 15

Free Essay

Counseling Management System

...Company Profile Star Wire (India) Limited, one of the leading Mini Steel Plant is engaged in the manufacturing of Alloy Steels, Stainless Steel and Special Steels for diversified engineering application in shape of castings, forging and rolled products. Plant is fully equipped with modern equipment and testing facilities which have created confidence and ability for manufacturing various sophisticated grades of steel conforming to international and National standards. It has its own research and development center to facilitate the manufacturing activities and also catering to engineering and manufacturing industries for failure analysis and other analytical activities. The plant is situated in Ballabgarh, about 37 KMs from Delhi - Capital of India on Main Mathura Road (NH No. 2). The location is at easy approach by Air, Rail and Road. ABSTRACT The project “Counseling Management system” is to exploit the computer technology with Internet Facility and all its aspects as necessity arises. The proposed project will be a web-based portal to provide support and services to the Students of participating in university counseling. The project will make available the Students care services of member colleges to its Students through the Internet. Through this proposed website the Students can register herself and take Admissions and support accordingly. The project “Counseling management system” is specially associated with online Admission procedure of...

Words: 9525 - Pages: 39

Premium Essay

Evolution of the Universe

...UNIX, Linux, Mac, and Windows OS Comparison Paper B. James Bryant UNIX, Linux, Mac, and Windows OS Comparison In 1956, General Motors produced the first OS for its IBM 704 series mainframe. Since then companies around the world, both big and small, have been tirelessly researched, testing, and releasing newer and faster operating systems for the world to use. Among these are systems developed by/for UNIX, Linux, Microsoft, and Apple. In fact, it’s safe to say that these four companies have a monopoly on all current technology used in both the military, corporate, and private sectors all around the world. UNIX Operating System Unix operating systems have the ability to be multi-user, multi-tasking and portable. Multi-user capabilities are accomplished through time sharing which means the processor allocates slices of time to first one process and then the next, sharing the available time in sequence with waiting processes (Nagpal, 2009). Unix can run in either command line interface, CLI, or graphic user interface or GUI mode. A key and unique feature of Unix is that it has a modular design which allows parts of the system to be added or removed without affecting performance of the other parts making Unix systems highly customizable. Unix operating systems have four core components, (1) the kernel, (2) the shell, (3) the file system, and (4) the utilities or tools and applications (Love et al, 2005). The kernel is the lowest layer of the operating system that...

Words: 5010 - Pages: 21

Free Essay

Designing User Interfaces

...What is user interface design? User interface design or user interface engineering is the design of computers, appliances, machines, mobile communication devices, software applications, and websites with the focus on the user's experience and interaction. The goal of user interface design is to make the user's interaction as simple and efficient as possible, in terms of accomplishing user goals—what is often called user-centered design. Good user interface design facilitates finishing the task at hand without drawing unnecessary attention to itself. Graphic design may be utilized to support its usability. The design process must balance technical functionality and visual elements (e.g., mental model) to create a system that is not only operational but also usable and adaptable to changing user needs. A user interface is the system by which people (users) interact with a machine. The user interface includes hardware (physical) and software (logical) components. User interfaces exist for various systems, and provide a means of Input, which allows the users to manipulate a system, and/or Output, which allows the system to indicate the effects of the users' manipulation. Generally, the goal of human-machine interaction engineering is to produce a user interface which makes it easy, efficient, and enjoyable to operate a machine in the way which produces the desired result. This generally means that the operator needs to provide minimal input to achieve the desired output, and also...

Words: 2479 - Pages: 10

Free Essay

Exadata-Technical-Whitepaper-134575

...An Oracle White Paper April 2011 A Technical Overview of the Oracle Exadata Database Machine and Exadata Storage Server Oracle White Paper— A Technical Overview of the Oracle Exadata Database Machine and Exadata Storage Server Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. Oracle White Paper— A Technical Overview of the Oracle Exadata Database Machine and Exadata Storage Server Introduction ......................................................................................... 2  Exadata Product Family ...................................................................... 4  Exadata Database Machine ............................................................ 4  Exadata Storage Server .................................................................. 8  Exadata Database Machine Architecture .......................................... 12  Database Server Software ............................................................ 14  Exadata Storage Server Software ................................................. 16  Exadata Smart Scan Processing .........................

Words: 10244 - Pages: 41

Free Essay

Capstone Final Documentation

...CNS Capstone A COMPREHENSIVE NETWORK DEVELOPMENT PROJECT SUBMITTED TO THE IT / COMPUTER NETWORKS SYSTEMS PROGRAM IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE ASSOCIATE DEGREE By Instructor – Roman Danyew Table of Contents Introduction to Cornerstone Communications………………………….................. 3 STAR MEDICAL’s Proposal Overview ……………………………….................. 4 Executive Summary………………………………………………………………... 6 Assumptions and Constraints………………………………………………………. 7 Deliverables………………………………………………………………………... 8 Project Details Implementation and Timeline……………………………………………… 9 Network Topology........................................................................................ 11 IP Schema…………………………………………………………………. 16 Security…………………………………………………………………….. 17 Active Directory Structure…………………………………………………………. 18 Active Directory and Exchange……………………………………………………..19 Website hosting and developing…………………………………………………… 20 Maintenance and Training Plan …………………………………………………….22 Risk Analysis………………………………………………………………………. 23 Backup Plan…………………………………………………………………………24 Cost Analysis………………………………………………………………………. 25 Appendix…………………………………………………………………………… 26 Appendix A: Cost Analysis…………………………………………………27 Appendix B: Hardware…………………………………………………….. 29 Introduction to Cornerstone Cornerstone Communications has been providing networking and data communications...

Words: 7795 - Pages: 32

Free Essay

Niloy

...this eBook should be regarded as “Ethical Hack” or “Ethical hacking” respectively. You implement the information given at your own risk. © Copyright 2008 Learn-How-To-Hack.net. All Rights Reserved. 2 Table of Contents A. Introduction..............................................................................................5 1. How can I use this eBook? 2. What is a hacker 3. Hacker Hierarchy 4. What does it take to become a hacker? 5. Disclaimer B. Programming............................................................................................9 1. Do I really need it? 2. Where should I start? 3. Best way to learn C. Linux.......................................................................................................12 1. What is it? 2. Choosing a distribution 3. Running Linux 4. Learning Linux D. Passwords...............................................................................................33 1. Password Cracking 2. Phishing 3. Countermeasures 4....

Words: 16651 - Pages: 67

Free Essay

Digital Marketing

...CHAPTER 1 INTRODUCTION 1.1 OVERVIEW OF ONLINE SHOPPING ONLINE SHOPPING is a web-based application Software Developed in IMB WEBSPHERE using JSP as front end on Pentium machine. The main aim of Online Shopping is to improve the services of Customers and vendors. It maintains the details of customer payments, product receipts, addition of new customers, products and also updating, deletion for the same. It also stores the details of invoices generated by customer and payments made by them with all Payments details like credit card. The primary features of online shopping are high accuracy, design flexibility and easy availability. It uses database tables representing entities and relationships between entities. 1.2 OBJECTIVE OF ONLINE SHOPPING The system is capable of maintaining details of various customers, vendors, Products and storing all the day to day transactions such as generation of shipment address bills, handling customers and product receipts, updating of stores The central concept of the application is to allow the customer to shop virtually using the Internet and allow customers to buy the items and articles of their desire from the store. The information pertaining to the products are stores on an RDBMS at the server side (store). The Server process the customers and the items are shipped to the address submitted by them. 1 The application was designed into two modules 1. Buy module 2. Database module The Buy module is used for the customers who wish...

Words: 4558 - Pages: 19

Free Essay

The Hackers Underground Book

...“Hacking” in this eBook should be regarded as “Ethical Hack” or “Ethical hacking” respectively. You implement the information given at your own risk. © Copyright 2008 Learn-How-To-Hack.net. All Rights Reserved. 2 Table of Contents A. Introduction..............................................................................................5 1. How can I use this eBook? 2. What is a hacker 3. Hacker Hierarchy 4. What does it take to become a hacker? 5. Disclaimer B. Programming............................................................................................9 1. Do I really need it? 2. Where should I start? 3. Best way to learn C. Linux.......................................................................................................12 1. What is it? 2. Choosing a distribution 3. Running Linux 4. Learning Linux D. Passwords...............................................................................................33 1. Password Cracking 2. Phishing 3. Countermeasures 4. More Programs E. Network...

Words: 16651 - Pages: 67

Free Essay

Blah

...……………………………………………………………………………………………………………………………………. 4 Journal Post (8/17) ……………………………………………………………………………………………………………………………… 13 Chapter 1 Questions …………………………………………………………………………………………………………………………… 14 Journal Post (8/24) ……………………………………………………………………………………………………………………………… 16 Chapter 2 Questions ……………………………………………………………………………………………………………………………. 17 Journal Post (9/7) ………………………………………………………………………………………………………………………………… 18 Chapter 3 Questions ……………………………………………………………………………………………………………………………. 19 Journal Post (9/12) ……………………………………………………………………………………………………………………………… 20 Chapter 4 Questions …………………………………………………………………………………………………………………………… 21 Chapter 5 Questions …………………………………………………………………………………………………………………………… 23 NOS 120 Test 2 …………………………………………………………………………………………………………………………………… 24 Linux File System vs. Windows File System …………………………………………………………………………………………. 27 Journal Post (9/14) ……………………………………………………………………………………………………………………………… 28 10.04 Sources List ………………………………………………………………………………………………………………………………. 29 Things to do after installing Ubuntu 10.04 …………………………………………………………………………………………. 37 Journal Post (9/21) …………………………………………………………………………………………………………………………….. 45 How to make Ubuntu look like a Mac ………………………………………………………………………………………………… 46 Journal Post (9/28) …………………………………………………………………………………………………………………………….. 50 Journal Post (10/6)...

Words: 17866 - Pages: 72