background preloader

50 Most Frequently Used UNIX / Linux Commands (With Examples)

50 Most Frequently Used UNIX / Linux Commands (With Examples)
This article provides practical examples for 50 most frequently used commands in Linux / UNIX. This is not a comprehensive list by any means, but this should give you a jumpstart on some of the common Linux commands. Bookmark this article for your future reference. Did I miss any frequently used Linux commands? 1. tar command examples Create a new tar archive. $ tar cvf archive_name.tar dirname/ Extract from an existing tar archive. $ tar xvf archive_name.tar View an existing tar archive. $ tar tvf archive_name.tar More tar examples: The Ultimate Tar Command Tutorial with 10 Practical Examples 2. grep command examples Search for a given string in a file (case in-sensitive search). $ grep -i "the" demo_file Print the matched line, along with the 3 lines after it. $ grep -A 3 -i "example" demo_text Search for a given string in all files recursively $ grep -r "ramesh" * More grep examples: Get a Grip on the Grep! 3. find command examples Find files using file-name ( case in-sensitve find) # find ~ -empty

Linux Directory Structure (File System Structure) Explained with Examples by Ramesh Natarajan on September 8, 2010 Have you wondered why certain programs are located under /bin, or /sbin, or /usr/bin, or /usr/sbin? For example, less command is located under /usr/bin directory. Why not /bin, or /sbin, or /usr/sbin? What is the different between all these directories? In this article, let us review the Linux filesystem structures and understand the meaning of individual high-level directories. 1. / – Root Every single file and directory starts from the root directory.Only root user has write privilege under this directory.Please note that /root is root user’s home directory, which is not same as /. 2. Contains binary executables.Common linux commands you need to use in single-user modes are located under this directory.Commands used by all the users of the system are located here.For example: ps, ls, ping, grep, cp. 3. 4. 5. Contains device files.These include terminal devices, usb, or any device attached to the system.For example: /dev/tty1, /dev/usbmon0 6. 7. 8. 9.

Forget WiFi, Its LiFi: Internet Through Lightbulbs Whether you’re using wireless internet in a coffee shop, stealing it from the guy next door, or competing for bandwidth at a conference, you’ve probably gotten frustrated at the slow speeds you face when more than one device is tapped into the network. As more and more people—and their many devices—access wireless internet, clogged airwaves are going to make it increasingly difficult to latch onto a reliable signal. But radio waves are just one part of the spectrum that can carry our data. What if we could use other waves to surf the internet? One German physicist, Harald Haas, has come up with a solution he calls “data through illumination”—taking the fiber out of fiber optics by sending data through an LED lightbulb that varies in intensity faster than the human eye can follow. It’s the same idea behind infrared remote controls, but far more powerful. Photo (cc) via otto-otto.com

iis6 - How do you work out the IIS Virtual Path for an application How to Find Keywords For Effective SEO In other words, keywords are tools used to help you improve your search rankings. Their strategic use in Internet marketing is one of the most important search engine optimization (SEO) strategies. A highly visible and successful site depends on your understanding of keywords (choosing the right ones, where to find them, best ways to use them). Using the right keywords may list your page among the first 20 sites returned by search engines and the wrong keywords may bury your pages under hundreds of results returned before your site. How to choose the right keywords? Before you can choose the right keywords, you need to know how keywords are classified. Ø Brand Keywords – are those keywords contained in your business name, business description or specific category of business. Ø Generic Keywords – are keywords which are not directly associated with your company brand, but those which indirectly describe what you are offering or selling. Brainstorming: Broad keywords vs. Organic keywords

Business Intelligence (BusinessObjects) - Crystal Reports 2008 - Version and Download information for SPs and FPs Skip to end of metadataGo to start of metadata For a current AND temporary download of SP 5 please see the CR 2008 reference page ** Note; Service Pack 2, contains all earlier fixes up to and including FP1.5. To install SP 2, you must install SP 1 first. For more information see the blog Topic of the Week - Crystal Reports, Report Application Server, Business Objects Enterprise, post from 7/31/2009. # Note; Service Pack 3 contains all fixes up to and including Fix Pack 2.5. To find the Crystal Reports version, click Help > About Update Feb. 10, 2010; A request has been received to add links or information to this wiki regarding what is actually fixed in each FP. Update March 8, 2010; A wiki titled Resolved issues for Crystal Reports & InProc RAS SDK for VS .NET has been created. Update November 2, 2010; For fix pack and service information for CR 9.1 to 12 see the blog Crystal Reports 2008 (and 9.1, XI R1, XI R2) - Version and Download information for Service Packs & Fix Packs

Black Viper’s Windows 7 Service Pack 1 Service Configurations Introduction To continue my fine tradition of optimizing MS’s latest OS, I have here my findings to date. If you are looking for Windows 7 Retail information, you are almost in the right spot. Before adjusting your service settings, ensure that your system has already installed all updates by “checking now” for any available updates via Windows Update. Breakdown of all changes to date: Windows 7 Information Changelog. I cannot possibly test all configurations extensively (meaning, each persons specific computer needs), but what I can offer is what “works for me” and the obstacles I have came across so you do not have to discover them on your own. An * (asterisk) indicates changes from the default Two ** (asterisks) indicates you can add or remove this service by: Head to StartSelect Control PanelSelect ProgramsSelect Programs and FeaturesSelect Turn Windows Features on or off Three *** (asterisks) indicates optional services installed with Windows Live Essentials. Table Header Information

Drink Ideas: Glowing Drinks, Flaming Drinks, Fogging Drinks, Ice Shots, and More Drinks that have a mysterious fog rolling out of them are a great conversation starter at any party. Making fogging drinks is easy with dry ice. Relax--it isn't poisonous, or extremely dangerous. Dry ice is just the frozen form of carbon dioxide, the gas we exhale. The main precaution when using it with drinks is that it can cause a freezer burn if handled with bare skin. So, if you want to use it in drinks, you will just need to be careful. You can either make a fogging punch or you can drop a piece into individual drinks for a smoking effect. To make an individual drink, drop a small piece of the dry ice into the bottom of the glass. Fogging drinks are a good addition for Hawaiian luau theme, Halloween parties, fire and ice parties, or just to add a bit of sensation to any party.

Command Line Hack for: "Terminal Server Has Exceeded the Maximum Number of Allowed Connections" If you’ve worked on a network with Windows servers, you’ve encountered this error message at least 37,000 times: “The terminal server has exceeded the maximum number of allowed connections. The system can not log you on. The system has reached its licensed logon limit. Please try again later.” This problem happens because Windows only allows two remote terminal services connections when you are in administrative mode, and you’ve either got two people already on that server, or more likely, you’ve got a disconnected session that still thinks it is active. The problem with this error is that you have to actually get on the server console to fix the problem if the server isn’t in a domain. To use the command line hacks, you might need to run them from another server if your local operating system doesn’t include the commands. net use /user:[username] \\servername\share Here’s a command line hack that you can use to figure out what sessions are connected to the server. Sample output: Sample:

NetSpeedMonitor Monitors Your Network Speed and Data Transfer [Tool] Updated: 12/18/2009 Home » Tools » NetSpeedMonitor Monitors Your Network Speed and… The built-in Network Status in Windows 7 doesn’t actually provide that much information as needed, for example, the transfer speed rate is one of those features missed. So here comes NetSpeedMonitor, a little free tool that monitor the speed (up- and downstream) of your network interfaces and the amount of data transferred. It’s a small tool that runs as a monitoring toolbar on your taskbar with a useful tooltip that gives you a quick and short traffic overview for Month, Today, and Session. Monitoring Network Interface SpeedTraffic Logging with SQLite DatabaseAdvanced Tooltip with Traffic OverviewCustom Double Click EventsMultilingual User Interface (MUI)Windows Vista and Windows 7 Aero SupportSupports 32 and 64 Bit Operating SystemsNo additional drivers required Note that it uses an open source SQLite3 as backend database to save all the traffic data. The tool supports Windows 7, but only 32-bit.

How to Write Better: 7 Instant Fixes Does your writing stand out? Do you worry whether your writing is good enough? I can see you nodding your head. You are not alone. Every writer has doubts about his or her writing. The good thing is that writing is a journey. On this journey, you can either travel the long road – or use shortcuts. Using shortcuts means learning to spot and fix mistakes in order to write better. Here are seven instant fixes that will improve your writing. But … what is good writing? Inexperienced writers think that ‘good’ writing is elaborate. No, good writing is simple. 1: The art of natural Check out an example of elaborate writing below (I’ve sourced examples of writing from free Kindle books chosen at random). This is from a story about a young girl who is at home with her young brother when a thunderstorm strikes. An ebony abyss claimed the den. I take this to mean, “The room went dark.” Maybe the author consulted a Thesaurus to create a sentence with special words. Your words should sound natural. Careful!

Who invented the Caesar Salad? For me, the Caesar Salad has been around as long as I've held a fork. Given the monumental name "Caesar", I spent most of my life assuming that this was some kind of "centuries old" and "passed down" salad dressing recipe, that perhaps traced its roots all the way back to ancient Rome, Greece, or maybe even somewhere in the Mediterranean. Its a simple enough salad recipe that could have been used generations ago. The recipe I'm familiar with (my favorite) consists of Romain lettuce, chopped anchovies, lemon juice, pepper, oil, vinegar, ... ingredients that were available back then. Seems plausible right? I was surprised when I found out who invented the Caesar Salad.

Howlermunkeys Essential Guide to Install, Use, and Tweak Windows 8 Microsoft Windows 8 has been released to the public and is free for "Consumer Preview". What this means is that you have a chance to download the complete Windows 8 Operating System before it's been officially released to the market (expected date is October 26th, 2012, but has been released to manufacturing already). You should check this new Windows edition out (before buying a new gadget) as it includes the new “metro” interface and at first glance appears to be missing some core Windows 7 features. Most features are actually still there (or can be), you just need to know how to get to them. In this hub I’ll completely guide you from start to finish. Downloading the Windows 8 release, Using the ISO image (on a Real or Virtual Machine), Windows 8 installation, navigation through the new metro interface and the desktop, (hotkeys you must know), as well as offer some great Windows 8 tweaks to use. If you have never created or used a Virtual Machine, Read On! You'll need a Test PC 1. 2.

Related: