Preview

Unix Commands

Good Essays
Open Document
Open Document
1253 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unix Commands
Unix commands

6/27/12 10:24 AM

Unix commands
Note that there are thousands of commands available on a typical unix box. In bash, just hit the "Tab" key twice and say yes, to display the the commands currently available on your machine. A standard unix operating system lists currently thousands of commands. Type x to list all commands starting with x. The following list contains some of the more frequently used programs.

Access Control exit - terminate a shell (see "man sh" or "man csh") logout - sign off; end session (C shell and bash shell only;) passwd - change login password rlogin - log in remotely to another UNIX system ssh - secure shell slogin - secure version of rlogin yppasswd - change login password in yellow pages

Miscellaneous alias - define synonym commands chquota - change disk quota on ACITS UNIX systems chsh - change default login shell clear - clear terminal screen echo - echo arguments pbm - portable bitmap manipulation programs popd - pop the directory stack (C shell only) pushd - push directory on stack (C shell only) script - make typescript of terminal session setenv - set an environment variable (C shell only) stty - set terminal options

Communications mail - send and receive mail mesg - permit or deny terminal messages and talk requests pine - send and receive mail talk - talk to another logged-in user write - write to another logged-in user

News/Networks netstat - show network status rsh - run shell or command on another UNIX system ssh - secure-shell version of rsh

Programming Tools as - assembler, specific to each machine architecture awk - pattern scanning and processing language bc - online calculator cc - C compiler csh - C shell command interpreter dbx - source-level debugging program f77 - Fortran compiler gdb - GNU Project debugger gprof - display profile of called routines kill - kill a process ld - the UNIX loader lex - generate lexical analysis programs lint - check C source code make - maintain large

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT1310 Unit 3 Homework

    • 1253 Words
    • 5 Pages

    tem. Each of these numbers identifies the command running in the background. It’s useful to know what jobs the program has completed and which ones are still running. The utility to use to run more than one command is “&”.…

    • 1253 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    What commands can you use to determine who is logged in on a specific terminal?…

    • 344 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 NT1430

    • 377 Words
    • 2 Pages

    1. Which commands can you use to determine who is logged in on a specific terminal?…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT113 Unit 5

    • 393 Words
    • 2 Pages

    defined for each of these are based on the type of server operating systems that are required…

    • 393 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1430

    • 369 Words
    • 2 Pages

    There are an abundant comands for the linux operating system. Some of the most basic can be used almost every day. The command cd changes directories. The command mv will move a file or directory into another file or directory. Pwd will show you the whole path of the directory that you are currently working. One last basic command is rmdir, which will remove a directory. There are many commands…

    • 369 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    You can use commands in the Netsh Interface IP context to configure the TCP/IP protocol (including addresses, default gateways, DNS servers, and WINS servers) and to display configuration and statistical information.…

    • 298 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    What is a utility program? 9. What is a shell? A web browser and file manager that provides file viewer options.…

    • 680 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1430 UNIT 2

    • 565 Words
    • 3 Pages

    1) What commands can you use to determine who is logged in on a specific terminal?…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    0 - System halt; no activity, the system can be safely powered down. 1 - Single user. 2 - Multiple users, no NFS (network filesystem). 3 - Multiple users, command line interface; the standard runlevel for most Linux-based server hardware. 4 - User-definable. 5 - Multiple users, GUI. 6 – Reboot.…

    • 316 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Unix File

    • 566 Words
    • 3 Pages

    In order to understand how to control access to a file in a system that supports 5,000 users to 4,990 of those users, a basic understanding of the file permissions of a file on a UNIX system is necessary. A user has the ability to perform three basic actions to a file, read, write and execute. These three actions will be represented by r, w, and x respectively. A UNIX system uses a combination of these characters to control the file permissions. The first three characters represent the owner’s permissions, the middle three characters represent the group’s permissions, and the last three characters represent others permission. A sample of file permission would look like the following:…

    • 566 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    CISSH

    • 1734 Words
    • 7 Pages

    You need to download the cissh distribution file from Blackboard. There is a zip file,…

    • 1734 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    How To Persuasive Memo

    • 676 Words
    • 3 Pages

    Throughout my staff experience in the variety of servers I've became staff on, I have gathered a vast majority of knowledge regarding commands. I'm not going to go through all the commands I know, but I can say there will be nothing new to me regarding commands if I am…

    • 676 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Explanation of Ssh

    • 835 Words
    • 4 Pages

    SSH (Secure Shell) is a protocol that can be used to log into a remote machine and provide secure encrypted communications between the Virtual Server and the local computer. The communication is made via encrypted channels. Telnet on the other hand communicates without any encryption, allowing a sniffer to capture information, e.g. user names and passwords. This is why SSH is preferred over Telnet.…

    • 835 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Ms Excel

    • 3101 Words
    • 13 Pages

    1. Each tab contains a set of groups that share a theme in common. The Home tab, for example, contains all of the commands that are used most often by most people. 2. Within each tab are groups of command icons that share a common design…

    • 3101 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Telnet Server

    • 257 Words
    • 2 Pages

    The term telnet may also refer to the software that implements the client part of the protocol. Telnet client applications are available for virtually all computer platforms. Telnet is also used as a verb. To telnet means to establish a connection with the Telnet protocol, either with command line client or with a programmatic interface. For example, a common directive might be: "To change your password, telnet to the server, log in and run the passwd command." Most often, a user will be telnetting to a Unix-like server system or a network device (such as a router) and obtain a login prompt to a command line text interface or a character-based full-screen…

    • 257 Words
    • 2 Pages
    Satisfactory Essays

Related Topics