Preview

Unix Commands

Good Essays
Open Document
Open Document
1253 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unix Commands
Unix commands

6/27/12 10:24 AM

Unix commands
Note that there are thousands of commands available on a typical unix box. In bash, just hit the "Tab" key twice and say yes, to display the the commands currently available on your machine. A standard unix operating system lists currently thousands of commands. Type x to list all commands starting with x. The following list contains some of the more frequently used programs.

Access Control exit - terminate a shell (see "man sh" or "man csh") logout - sign off; end session (C shell and bash shell only;) passwd - change login password rlogin - log in remotely to another UNIX system ssh - secure shell slogin - secure version of rlogin yppasswd - change login password in yellow pages

Miscellaneous alias - define synonym commands chquota - change disk quota on ACITS UNIX systems chsh - change default login shell clear - clear terminal screen echo - echo arguments pbm - portable bitmap manipulation programs popd - pop the directory stack (C shell only) pushd - push directory on stack (C shell only) script - make typescript of terminal session setenv - set an environment variable (C shell only) stty - set terminal options

Communications mail - send and receive mail mesg - permit or deny terminal messages and talk requests pine - send and receive mail talk - talk to another logged-in user write - write to another logged-in user

News/Networks netstat - show network status rsh - run shell or command on another UNIX system ssh - secure-shell version of rsh

Programming Tools as - assembler, specific to each machine architecture awk - pattern scanning and processing language bc - online calculator cc - C compiler csh - C shell command interpreter dbx - source-level debugging program f77 - Fortran compiler gdb - GNU Project debugger gprof - display profile of called routines kill - kill a process ld - the UNIX loader lex - generate lexical analysis programs lint - check C source code make - maintain large

You May Also Find These Documents Helpful

  • Satisfactory Essays

    What commands can you use to determine who is logged in on a specific terminal?…

    • 344 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2 NT1430

    • 377 Words
    • 2 Pages

    1. Which commands can you use to determine who is logged in on a specific terminal?…

    • 377 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1430

    • 369 Words
    • 2 Pages

    There are an abundant comands for the linux operating system. Some of the most basic can be used almost every day. The command cd changes directories. The command mv will move a file or directory into another file or directory. Pwd will show you the whole path of the directory that you are currently working. One last basic command is rmdir, which will remove a directory. There are many commands…

    • 369 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Provides file management capabilities for the system Software that provides user interface with the OS 10. 11. 12. Would you set up a GUI on a server system? Why or why not? What is a terminal emulator? Which commands can you use to determine who is logged in on a specific…

    • 680 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT1430 UNIT 2

    • 565 Words
    • 3 Pages

    1) What commands can you use to determine who is logged in on a specific terminal?…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Ubuntu also has a build-in firewall, and most network ports are closed by default to prevent hacking.…

    • 1499 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    0 - System halt; no activity, the system can be safely powered down. 1 - Single user. 2 - Multiple users, no NFS (network filesystem). 3 - Multiple users, command line interface; the standard runlevel for most Linux-based server hardware. 4 - User-definable. 5 - Multiple users, GUI. 6 – Reboot.…

    • 316 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    You can use commands in the Netsh Interface IP context to configure the TCP/IP protocol (including addresses, default gateways, DNS servers, and WINS servers) and to display configuration and statistical information.…

    • 298 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Unix/Linux

    • 2760 Words
    • 12 Pages

    Windows, a much younger operating system, released in 1985, has exponentially grown in popularity ever since. Windows popularity is the biggest reason that it suffers malicious attacks more than any other operating system available. The numerous attacks…

    • 2760 Words
    • 12 Pages
    Best Essays
  • Good Essays

    Binary Code

    • 597 Words
    • 3 Pages

    You may have seen these abbreviations many times before. Do you know what they mean?…

    • 597 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    CISSH

    • 1734 Words
    • 7 Pages

    You need to download the cissh distribution file from Blackboard. There is a zip file,…

    • 1734 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    How To Persuasive Memo

    • 676 Words
    • 3 Pages

    Throughout my staff experience in the variety of servers I've became staff on, I have gathered a vast majority of knowledge regarding commands. I'm not going to go through all the commands I know, but I can say there will be nothing new to me regarding commands if I am…

    • 676 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Explanation of Ssh

    • 835 Words
    • 4 Pages

    SSH (Secure Shell) is a protocol that can be used to log into a remote machine and provide secure encrypted communications between the Virtual Server and the local computer. The communication is made via encrypted channels. Telnet on the other hand communicates without any encryption, allowing a sniffer to capture information, e.g. user names and passwords. This is why SSH is preferred over Telnet.…

    • 835 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Ms Excel

    • 3101 Words
    • 13 Pages

    1. Each tab contains a set of groups that share a theme in common. The Home tab, for example, contains all of the commands that are used most often by most people. 2. Within each tab are groups of command icons that share a common design…

    • 3101 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Telnet Server

    • 257 Words
    • 2 Pages

    The term telnet may also refer to the software that implements the client part of the protocol. Telnet client applications are available for virtually all computer platforms. Telnet is also used as a verb. To telnet means to establish a connection with the Telnet protocol, either with command line client or with a programmatic interface. For example, a common directive might be: "To change your password, telnet to the server, log in and run the passwd command." Most often, a user will be telnetting to a Unix-like server system or a network device (such as a router) and obtain a login prompt to a command line text interface or a character-based full-screen…

    • 257 Words
    • 2 Pages
    Satisfactory Essays

Related Topics