Quick Summary of Basic and Common Linux Commands

There are many commands that are used in linux on a daily basis, ones that everyone should know just to get by. Like back in the days of DOS, you had to know how to work with the command line and how to navigate around. Learning new commands is always hard, especially when there are so many new ones that don't always seem to make sense in their names.

cd

Change directory - this command is essential for traversing folders and moving about your linux computer. Its quite straight forward, cd /where/you/want/togo or cd .. to go up a level. It's pretty basic, but be aware of absolute and relative paths. If you are currently in the folder /home/puppy/pictures then you can type cd .. to move up to /home/puppy/ or you could type cd /home/puppy/ not to mention cd ~/puppy/. You must learn how to traverse folders effectively before you can use the operating system.

ls

The ls command gives you a directory listing. This command has many options, but basically provides you with the same information as the "dir" command in DOS. The most common use of ls is probably "ls -la" infact many people have an alias setup, so whenever they type "ls" it actually runs "ls -la".

du

The disk usage command gives you a summary of how much space a program or some piece of data is using. Normally this command uses the -h feature, which simply means it will tell you if the number it gives you is in bytes, kilobytes, etc. -h gives you the human readable output.

mv

Move! The mv command is the move command, but it is far more powerful than the old DOS commands. You must be very careful when using the mv command, if you tell it to move a program to a new location, it will overwrite the stuff that was there, if the same file name exists. In addition the mv command is also the rename command! If I type: mv file1 file2 I just moved or effectively renamed file1 to file2!

date

The date command displays the current date and time of your server to the screen, and can be formatted in many ways, but date by itself will display something similar to: Sat Apr 30 23:58:41 EDT 2005

cp

The copy command is a great program, and is very powerful. Often used with the -R (recursive) option, it can be used to copy single files, or entire paths around with ease.

rmdir

Remove directory is a command that I personally don't use very often. To remove a directory it must be empty, rarely do I take the time to empty a directory before I delete it. Instead I use a variation of the rm command.

rm

This is the mother of all linux commands. Remove. You must always be very careful when you use this program. There aren't too many options with this program, its quite straight forward, you use it to delete things. -R is recursive and -f is force. If you want to clear a big folder and you are 100% sure you want it gone in a hurry, type: rm -Rf /directoryname

chgrp

Change group - this command is used to change the group ownership on a file. For the most part this is more of an administrative thing, and end users don't typically have to worry too often about this. You must know about the design of the linux file system before you worry about the chgrp command.

chown

Change owner - this command very similar to the chgrp command, and changes the owner instead of the group. Again you must really understand the design of the linux file system before this becomes really important. File ownership is an important part of security and permissions in linux.

mkdir

Make directory - this is a very straight forward command in linux, easy to use, just mkdir newfoldername

vi

This is a text editor in linux, its extremely powerful, but not exactly user friendly. I highly suggest that you take the time to learn this program, or at least the most common features. If you want to play with this program, you might get stuck inside it, remember these words. Escape, Colon, q, ! ( escape key, :q! ) That gets you out of interactive or insert mode, then gets you to the menu, then quit without saving!

su

Switch user - the su command lets you login from your account to another account. If you are root, you can type su - username and jump to any account without a password. If you are a normal user account and want to go to root then type su - root. If you do not put the hyphen then you will not use that users environment. Generally if you are logging in as a user it's a good idea to be in their working environment!

pwd

Print working directory - this command gives you the current directory you are working in.

$ pwd - me running command

/home/username/my_pics - this is the output from that command

As I mentioned earlier, there are so many different commands to learn, it really just takes time and effort to play with them and learn their options. The manual (MAN) pages in linux are really great and full of information. Many of the most common commands are located in the /bin folder, check it out!

Ken Dennis http://KenDennis-RSS.homeip.net/

In The News:


Recode

We need a software revolution for the greater social good
Recode
Five years ago, tech entrepreneur and venture capitalist Marc Andreessen famously wrote, “Software is eating the world.” It's hard to think of more prophetic words coming out of Silicon Valley, and new players that have software at their core continue ...


Engadget

Razer's 'paid to play' program bribes gamers to use its Cortex software
Engadget
Lingering in the mind of every gamer is a silly, whimsical idea that very few manage to make a reality. "Gee," we think to ourselves. "It sure would be neat if I could get someone to pay me to play video games." Most of us know it's a futile dream, but ...

and more »

Red Hat software-defined storage takes another step forward
ZDNet
Laura DuBois, IDC's group vice president of enterprise storage, servers, and infrastructure software, said, "This new release of Red Hat Gluster Storage becomes available as the software-defined storage industry is at an inflection point in terms of ...

and more »

CNET

Software bug makes Nest Cams vulnerable to hacks
CNET
The Nest Cam Outdoor. Chris Monroe/CNET. Mobile security and IoT hacker Jason Doyle has uncovered and published three vulnerabilities in the Nest Cam Indoor, Nest Cam Outdoor, Dropcam Pro and Dropcam security cameras. Here's how Doyle ...

and more »

The Register

Amazing new WikiLeaks CIA bombshell: Agents can install software on Apple Macs, iPhones right in front of them
The Register
The CIA wanted to port NightSkies to Apple MacBook Air laptops, calling the resulting software DarkSeaSkies, according to the leaked files. This port would include the NightSkies beacon emitter as well as a tool called DarkMatter to install the malware ...
Now WikiLeaks threatens to disclose software vulnerabilitiesNetwork World
Vault 7: ProjectsWIKILEAKS
WikiLeaks - ReleasesWikiLeaks
Motherboard - Vice
all 178 news articles »

CBS Local

Denver Admits Software Licensing Violations « CBS Denver
CBS Local
Denver taxpayers will be paying millions of dollars more this year for city use of Oracle software after the city admitted it violated its licensing agreements with ...

and more »

USD 457 approves new software
The Garden City Telegram
During Thursday's USD 457 Board of Education meeting, the board approved a DNA Software Services agreement with Illuminate Education, Inc., a provider of technology and services for K-12 districts and charter schools. According to a press release from ...


German Software Maker SAP Sees Benefits From Trump Tax Plans ...
Bloomberg
German software maker SAP SE plans to capitalize on the Trump administration's efforts to encourage the repatriation of cash held by U.S. companies overseas, ...

and more »

Forbes

Why This Canadian Software Company Could Double In The Next Two Years
Forbes
Poor investor communication can cause prices to stay low even when good things are happening, and this could be the case for Redknee Solutions (TSE:RKN), a Canadian software company that serves many of the world's major telecom companies.

Google News

Spyware Definitions List

The adware and spyware definitions list is very long. But... Read More

Assertion in Java

Assertion facility is added in J2SE 1.4. In order to... Read More

Microsoft Great Plains Reporting ? Overview for Developer

Looks like Microsoft Great Plains becomes more and more... Read More

Information Products: A Business Owners Best Friend

We live in a post-industrial age where information is the... Read More

EDI: Electronic Document Interchange for Microsoft Great Plains ? Overview for Software Developer/Pr

Microsoft Great Plains - Microsoft Business Solutions accounting and ERP... Read More

Four Easy Ways To Prevent Spyware

How would you like to prevent spyware and adware from... Read More

Crystal Reports for Microsoft Great Plains

Microsoft Business Solutions ? Great Plains is designed to meet... Read More

Microsoft Great Plains: Interest Calculation Example ? Stored Procedure for Crystal Report

This is intermediate level SQL scripting article for DB Administrator,... Read More

Understanding XML Server

XML Server can be a Web Server that stores the... Read More

OEComplete ? A Personal Information Manager

OEComplete is a utility for managing the personal information of... Read More

Save Your Resources - Combine Your IM Clients

There are so many different programs that clutter up your... Read More

Internet Relay Chat - A Basic Introduction

What is IRC?IRC is Internet Relay Chat. It is a... Read More

Destination: Desktop for Google

First we had the original Google search that evolved into... Read More

Microsoft CRM Implementation ? Fundamental CRM Principles Revision

Microsoft CRM is relatively new player on the now becoming... Read More

Microsoft Office Selecting Secrets

Stop the Runaway MouseWhat's the "runaway mouse?" You've seen it...you... Read More

These Items Are A Must Before Making The Decision To Purchase Any Off-The-Shelf Software

1. What determines the software price? Is it Per Seat... Read More

The Religion And Philosophy Of Small Internet Business

I have always had a tendency to focus on the... Read More

An Easy Way to Develop JAVA Enterprise Applications

Research bears that less than 70 percent of development projects... Read More

Secure File Transfer Using SSH Plus Additional Audit & Automation - FSA Reporting

In order to meet regulatory and corporate compliance requirements reporting... Read More

Are You Waiting for Microsoft Longhorn Operating System

I love new technology. I am still ready to wait... Read More

Screenplay and Script Writing Software

When it comes to screenplay software each screenwriter needs to... Read More

CROOK: A Methodology for the Refinement of Forward-Error Correction

Table of Contents1) Introduction 2) Related Work 3) Framework 4)... Read More

Microsoft Great Plains: Service Business Customization & Integration Example

Microsoft Business Solutions Great Plains might be considered as ERP... Read More

Why Stick With Email Clients Like Outlook?

Trying to figure out a stream in banning one email... Read More

Microsoft Great Plains Implementation for Large Corporation ? Overview for VP IT

Microsoft Business Solutions Great Plains was historically designed to serve... Read More