Commands

Facebook Twitter
how do i change uuid of swap partition type [SOLVED] (Page 1) / Kernel & Hardware
Uniq - Removing duplicate lines The following command will sort all lines and remove duplicates (keeping unique lines): :sort u If you need more control, here are some alternatives. There are two versions (and \v "verymagic" version as a variant of the second): the first leaves only the last line, the second leaves only the first line. (Use \zs for speed reason.) Uniq - Removing duplicate lines
Footnotes 1. In System V-based Unixes, run level relates to booting, shutdown, and single-user mode. In BSD, it has to do with security. 2. Rosetta Stone for Unix

Rosetta Stone for Unix

A userspace utility for testing the memory subsystem for faults. It's portable and should compile and work on any 32- or 64-bit Unix-like system. (Yes, even weird, proprietary Unices, and even Mac OS X.) memtester version 4 memtester version 4
The GNU Privacy Handbook Copyright © 1999 by The Free Software Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled "GNU Free Documentation License". Please direct questions, bug reports, or suggestions concerning this manual to the maintainer, Mike Ashley (<jashley@acm.org>). When referring to the manual please specify which version of the manual you have by using this version string: $Name: v1_1 $. Contributors to this manual include Matthew Copeland, Joergen Grahn, and David A. The GNU Privacy Handbook
Finding open files with lsof Files are ubiquitous in the UNIX® environment, leading to a common phrase: "Everything is a file." Not only is regular data accessed through files, but also network connections and, often, hardware. In some cases, an entry appears when you request a directory listing through ls. In other cases, such as Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) sockets, there is no directory listing. But behind the scenes, a file descriptor has been assigned to the application, regardless of the nature of the file, providing a common interface for applications to interact with the underlying operating system. Finding open files with lsof
Native Win32 ports of some GNU utilities md5 sums Links: The gcc compiler for Win32: http://www.mingw.orgDigital Mars compiler: http://www.digitalmars.comA zsh shell for Win32: ftp://ftp.blarg.net/users/amol/zshThe home of vim, has a Win32 version: http://www.vim.orgAn emacs for NT: http://www.gnu.org/software/emacs/windows/ntemacs.htmlThe CVS version control system: http://www.cvshome.org http://www.cvsnt.orgA free IDE for the Win32 gcc: VIDE Native Win32 ports of some GNU utilities
CS360 Lecture notes -- Signals

Unix Toolbox

Unix Toolbox Hardware | Statistics | Users | Limits | Runlevels | root password | Compile kernel | Repair grub | Misc Running kernel and system information # uname -a # Get the kernel version (and BSD version) # lsb_release -a # Full release info of any LSB distribution # cat /etc/SuSE-release # Get SuSE version # cat /etc/debian_version # Get Debian version
System accounting in Linux Monitoring user activity is a first line of defense in discovering unauthorized activity on your system. Jim McIntyre covers monitoring tools and system accounting procedures for your Linux system in this Daily Drill Down. The ability to monitor user activity on a Linux system is one of the first skills a Linux administrator should master. System accounting in Linux