Some basic unix commands
|
|
|
- Erik Wade
- 9 years ago
- Views:
Transcription
1 Angling may be said to be so like the mathematics, that it can never be fully learnt. So is UNIX. IZAAK WALTON K. Nandakumar Appendix C Some basic unix commands C.1 Introduction to the shell and the desktop In a command line oriented, interactive environment, a command shell (which is a program or a process) accepts a command from the keyboard, passes it to the operating system for execution, prints out any error or informational messages generated by the command and displays a prompt string indicating the readiness to accept another command. There are several shells available under AIX. The Kron shell or ksh is one of the most powerful shells and is the default shell on the AIX machines maintained by the department of chemical engineering. In the GUI oriented environment, the equivalent of a command shell is the desktop which organizes various tools and application programs such as file manager, program manager, printer manager, etc. as objects accessible via icons. The interaction takes place through dialogue boxes and forms that must be completed. Program execution begins simply by double clicking on the appropriate icons. If you have a good reason to change your default shell to something other that ksh, you can do so with the chsh command, user@machine:dir> chsh This command will display your current shell, and prompt you for the C.1
2 C.1. INTRODUCTION TO THE SHELL AND THE DESKTOP C.2 name of the new shell. The change takes effect when you login the next time. At any time you can invoke a new shell, different from the login shell, e.g., user@machine:dir> csh invokes a C-shell. You can invoke a desktop at any time on AIX machines by entering user@machine:dir> xdt3 Since the use of desktop is supposed to be rather intuitive, you are encouraged to explore its features on your own! C.1.1 The ".profile" file The ".profile" file is used to customize the shell environment for ksh. The following is a typical example of a ".profile" file. PATH=$PATH:$HOME/bin:$KHOROS_HOME/bin HOSTNAME= hostname PS1= $LOGNAME@$HOSTNAME:$PWD> EDITOR=emacs #defines alias for commonly used commands alias ls= ls -al alias rm= rm -i #export environment variables to other processes... export PATH HOSTNAME PS1 EDITOR TERM Here, several environment variables such as PATH, HOSTNAME, PS1 etc. have been defined. The concept of the environment is like a bulletin board. You can post definitions of any number of variables there. Application programs that expect specific variables can look for them and use their values, if they are defined. Note that when you set the value of a variable ( i.e., left hand side of an equal sign), the name is used without any prefix. When you want to retrieve the value the $ prefix is used. For example try, user@machine:dir> echo $PATH to look at the value of the current path.
3 C.1. INTRODUCTION TO THE SHELL AND THE DESKTOP C.3 In the first line of the example above, a system wide environment variable $PATH, which is already defined, is redefined to add additional paths, such as $HOME/bin separated by colon. Observe the $ prefix to the name of the environment variable. $HOME itself is an environment variable, containing the value of the home directory. In the 2nd line the variable HOSTNAME is defined to contain the name of the workstation. This name is actually retrieved by the program hostname. The 3rd line redefines the prompt string PS1 using other variables such as LOGNAME, HOSTNAME and PWD. These variables contain, respectively, the values of the userid, machine name and present working directory. If the variable EDITOR is set to emacs, then command line editing features using emacs keys are enabled. You can also define aliases for certain commands. In the example above, the "ls" string is defined to be ls -al - so when you enter "ls" at the prompt, the command ls -al is executed. To examine all the currently defined aliases, enter, user@machine:dir> alias By default, the "rm" command removes files without prompting you for confirmation which could result in accidental deletion of files. The alias defined above, assigns rm -i to "rm". The keyword "-i" stands for interactive mode and hence you will always be prompted before removing a file. The variables defined in a shell environment are available only to that shell environment and not to other shells that you may start from the current one. The export command is used to export the variables to all subsequent shells. The last line in the above example exports several environment variables. To look at all of the environment variables defined in the current ksh shell, enter, user@machine:dir> set To examine the value of an environment variable, enter, user@machine:dir> echo $PS1 To set a new environment variable, use user@machine:dir> DUMMY=junk
4 C.2. MANAGING FILES C.4 In addition to assigning values to environment variables, the shell allows programming flow control features. Thus one can write quite powerful scripts to execute a complex sequence of commands. A script is nothing but a set of AIX instructions placed in a file. By enabling the execute permission for this file, and entering its name from the command line you can cause the instructions in that file to be executed. C.2 Managing files In managing your files and directories, you need to be able to list the contents of a directory or file, copy and move files, compress and uncompress files, create and delete files and directories, control the ownership and access to files etc. Commands to carryout these tasks are illustrated below with specific examples. Try them out at a terminal. To get a complete description of each command use the man pages i.e., user@machine:dir> man command C.2.1 Making sense of the directory listing - the "ls" command The ls command produces a listing of all the files in the current directory. In its most useful form, you will use the -al keywords, i.e., user@machine:dir> ls -al dir Typically, files that begin with the. ( e.g.,.profile) are treated as hidden files. They keyword -a however lists all of the files including the hidden ones. The keyword -l produces the long listing, a sample of which is shown in figure C.1. This listing provides information on file access control, ownership, size, time stamp etc. Each line contains information for a file or directory. The first character identifies whether it is a file (-), a directory (d) or a symbolic link (l). A symbolic link is a pointer to some other file (think of it as an alias). The next set of nine characters identify the file access control, in groups of three. Since AIX is a multiuser environment, users can control ownership and access of their files to others. The possible access modes are: read (r), write (w) execute (x) or none(-). These modes apply to (user, group, others). The groups are established by the system administrator. The owner and group names are listed next, followed by file size in bytes, the time stamp for last change and the file name.
5 { C.2. MANAGING FILES C.5 permission control { Owner { Group { File size { {time stamp {File name drwxr-sr-x 27 kumar sys 1536 May 24 23:14. drwxr-sr-x 59 sys sys 1536 May 13 08:52.. -rw-r--r-- 1 kumar others 1937 Jan 07 11:47.Xdefaults drwx kumar others 512 Jul elm -rw-r--r-- 1 kumar sys 2504 May 19 12:08.mwmrc -rwxr-xr-x 1 kumar sys 610 May 04 12:36.profile -rw kumar sys 348 May 14 12:22.rhosts drwxr-xr-x 3 kumar others 512 Jul tin -rw-r--r-- 1 kumar sys 136 May 11 14:11.xdt3 -rw-r kumar others 1222 Jan Ass1.m drwxr-xr-x 2 kumar others 512 May 19 13:12 CHEM2 drwx kumar others 512 May Mail r read permission w write permission x execute permission - no permission d indicates a directory l indicates a symbolic link 1st set applies to owner 2nd set applies to group 3rd set applies to all Examples: The file.profile has (read,write,execute) permission for owner (kumar in this case) and (read,execute) permission for both the group (sys in this case) and everyone. The directory Mail has (read,write,execute) permission for owner only The command chmod g+r file will give read access to group for file, while chmod o-w file takes away write access to all for file ls -al chmod chown rm rmdir mkdir Other related Unix commands - detailed listing of directory such as the above - change permission on files and directories - change ownership of files and directories - remove or delete a file - remove or delete a directory - create a new directory Figure C.1: Output of the "ls" command
6 C.2. MANAGING FILES C.6 C.2.2 Changing permission on files - the "chmod" command The chmod command allows you to modify the access control of files and directories. Examples To give read permission to group for file use, user@machine:dir> chmod g+r file To give write permission to everyone for all the files in a directory use, user@machine:dir> chmod -R a+w dir Note the the "-R" flag stands for recursive use of the command for all files in all subdirectories. Note that, in order to give read permission to a directory, the execute permission at the directory level must be set. user@machine:dir> chmod a+x dir C.2.3 Moving files The mv (move) command moves files and directories from one directory to another, or renames a file or directory. You cannot move a file onto itself. Warning: The mv command can overwrite many existing files unless you specify the -i flag. The -i flag prompts you to confirm before it overwrites a file. Examples To rename a file, enter: user@machine:dir> mv oldname newname This renames file oldname to newname. If a file named newname already exists, its contents are replaced with those of oldname.
7 C.2. MANAGING FILES C.7 To move a directory, enter: user@machine:dir> mv olddir newdir This moves all files and directories under olddir to the directory named newdir, if newdir exists. Otherwise, the directory olddir is renamed to newdir. To move several files into another directory, enter: user@machine:dir> mv file1 dir1/file2 newdir This moves file1 to newdir and dir1/file2 to newdir/file2. C.2.4 Copying files The cp command creates a copy of the contents of the file or directory from a source to a target. If the file specified as the target exists, the copy writes over the original contents of the file. If you are coping more than one source file, the target must be a directory. Examples To make a copy of a file in the current directory, enter: user@machine:dir> cp file.old file.new If file.new does not already exist, then the cp command creates it. If it does exist, then the cp command replaces it with a copy of the file.old file. To copy a file in your current directory into another directory, enter: user@machine:dir> cp file.old dir/sub.dir/ This copies file.old to dir/sub.dir/file.old. To copy all the files in a directory to a new directory, enter: user@machine:dir> cp /home/user/dir1/* /home/user/dir2 This copies all the files in the directory /home/user/dir1/ to the directory /home/user/dir2/. As a variant, explore the "-R" flag to copy not only all of the files, but also all of the subdirectories.
8 C.2. MANAGING FILES C.8 C.2.5 Changing ownership of files - the "chown" command The chown command changes the owner of the file specified by the File parameter to the user specified by the Owner parameter. The Owner parameter can be specified either as a user ID or as a lo- gin name found in the /etc/passwd file. Optionally, a group can also be specified. The group can be specified either as a group ID or as a group name found in the /etc/group file. The syntax is, user@machine:dir> chown -R owner:group file Only the root user can change the owner of a file. C.2.6 Compressing files - the "compress" command The compress command reduces the size of files using adaptive Lempel- Zev coding. Each original file specified by the file parameter is replaced by a compressed file with a ".Z" appended to its name. The compressed file retains the same ownership, modes, and access and modification times of the original file. If compression does not reduce the size of a file, a message is written to standard error and the original file is not replaced. The syntax is, user@machine:dir> compress file To restore the file to its original state use the command, user@machine:dir> uncompress file Also try the GNU version of compress utility called gzip and gunzip - they are more efficient in both speed and size. C.2.7 Removing files - the "rm" command The rm command removes the entries for the specified file or files from a directory. If an entry is the last link to a file, the file is then deleted. You do not need read or write permission for the file you want to remove. However, you must have write permission for the directory containing that file. Examples To delete a file, enter:
9 C.3. MANAGING PROCESSES C.9 rm myfile If there is another link to this file, then the file remains under that name, but the name myfile is removed. If myfile is the only link, the file itself is deleted. Caution: You are not asked for confirmation before deleting the file. It is useful to set an alias in your ".profile" file to redefine "rm" as alias rm= rm -i After each file name is displayed, enter "y" to delete the file, or press the Enter key to keep it. C.3 Managing processes Since AIX is a multi-tasking operating system, several tasks (or processes) can be running at the same time. So we need a set of tools to monitor the currently running processes and the resources they consume, suspend or terminate specific processes, set priority for certain tasks or schedule some tasks for execution at specified times. Commands to accomplish these tasks are illustrated next. C.3.1 Examining jobs or processes - the "ps" command The ps command displays a set of currently running tasks. In its simplest and most useful form, the command is, user@machine:dir> ps -ael This provides a long listing of all the currently running processes including all of the daemons started by the root at the time of booting the computer. A typical sample output might look like, F S UID PID PPID C PRI NI ADDR SZ WCHAN TTY TIME CMD R d 116 pts/0 0:00 ps S dce 108 pts/0 0:00 ksh S b :00 sendmail S a5 152 hft/0 0:00 lmgrd S aa 352 hft/0 0:05 CFDSd S a 196-0:11 nfsd The process name (or the command name) is shown in the last column. Other useful parameters are the process identification number (PID), the nice value (NI) which determines the priority of the process,
10 C.3. MANAGING PROCESSES C.10 and the cpu time (TIME) used up by the task. In the above example listing, sendmail is the mail program, lmgrd is the license manager daemon, CFDSd is the license server for FLOW3D program, nfsd is the NFS daemon; all of these tasks are run by root with a user identification number (UID) of 0. Note that the ps command itself is a task. C.3.2 Suspending jobs or processes If you started a process like "emacs" or"matlab" and you want to suspend that task and return to the shell you can do so with the key sequence user@machine:dir> ctrl-z The PID number is displayed at that time. Even if you did not note it down, you can find a list of all suspended jobs with the command user@machine:dir> jobs To resume the job, enter user@machine:dir> fg %n where n is the job number produced by the jobs command (and not the PID number!). The "fg" command brings a job to the foreground. C.3.3 Terminating jobs or processes - the "kill" command If you started a process in error and want to terminate it, you can use the "kill" command. You need to find out the PID number of the process using "ps command. user@machine:dir> kill -9 PID Except for the super user (or root), one can terminate only those processes that belong to (or initiated by) individual users. C.3.4 Initiating background jobs - the "nohup" command The nohup command runs a command or a script ignoring all hangups and QUIT signals. Use this command to run programs in the background after logging off. To run a nohup command in the background, add an & (ampersand) to the end of the command. Its syntax is:
11 C.3. MANAGING PROCESSES C.11 nohup command or script & When used in its simplest form as above, any output that would normally appear on the screen will be saved in a file named nohup.out in the current directory. Wait before logging off because the nohup command takes a moment to start the command or script you specified. If you log off too quickly, your command or script may not run at all. Once your command or script starts, logging off does not affect it. Note that in order to run a script, the script file must have execute permission. C.3.5 Script files & scheduling jobs - the "at" command If you wish to schedule a job to begin at a specified time (typically late night), use the at command. The job should be constructed in the form of a script file. For example a file named test.bat contains the following lines and has execute permission enabled with the chmod command. matlab >out «eof secant( ass3a,[0,1],eps,1) fzero( ass3a,0.5,eps,1) quit eof In the above script we start MATLAB in the first line and redirect any output generated by MATLAB for the standard output ( i.e., screen during an interactive session) to a file named out. During an interactive session, MATLAB expects commands from the standard input ( i.e., the keyboard). Such inputs are now taken from the script file itself as seen in the next few lines where we execute some MATLAB functions and finally quit MATLAB. The contents of such a script file can be executed interactively while logged in to a machine by simply entering the file name as user@machine:dir> test.bat The above example illustrates script programming in its simplest form. It is possible to write very sophisticated scripts in the Kron shell or any other shell. When you invoke MATLAB, for example, with the command matlab, you are actually executing a powerful script. Browse through the matlab script file using user@machine:dir> pg /usr/local/matlab/bin/matlab
12 C.4. LIST OF OTHER USEFUL AIX COMMAND C.12 to appreciate the power of script programming. Once a script file has been constructed, you can schedule it to be executed at a specified time using the at command as follows user@machine:dir> at 21:00 scrit file which will begin executing the script file at 21:00 hours. To examine a listing of all the jobs scheduled use, user@machine:dir> at -l To remove a job that you have accidentally submitted, you can use, user@machine:dir> at -r job number C.4 List of other useful AIX command A list of less frequently used AIX commands is given in Table C.1. You can use either the man page feature with or the user@machine:dir> man command user@machine:dir> info command which starts the InfoExplorer to find out about the syntax and usage of these and other commands. The directory /usr/bin contains all of the Unix commands.
13 C.4. LIST OF OTHER USEFUL AIX COMMAND C.13 command at cat cd diff dosformat dosread doswrite find info ksh make mail mkdir man logout lpq lpr lprm nice nohup pg ping pwd rlogin rcp rm rmdir rsh rusers script talk tar telnet whoami xinit xlc xlc xlf Function to schedule a task to start at a given time to list a file to change directory compare two files formats a floppy diskette using MS-DOS standards copies a DOS file from a floppy copies a unix file to a DOS formatted floppy find a file InfoExplorer - online documentation start a Kron Shell a powerful UNIX make facility read mail create a directory display online manual pages logout of current AIX session list the queue of print jobs send a print job to a network printer remove a print job from a queue control job priority Don t kill a process upon logout display a file, one page at a time to check if another machine is alive display present working directory remote login to another machine remote copy files from one host to other need to have ".rhosts" file setup remove (delete) files remove directories execute a command on a remote machine need to have ".rhosts" file setup list remote users in the local area network logs a terminal session to a file talk to another user currently signed on archive files connect to remote hosts find out the current user start X-server c-compiler c++ compiler Fortran compiler Table C.1: List of other useful AIX command
Thirty Useful Unix Commands
Leaflet U5 Thirty Useful Unix Commands Last revised April 1997 This leaflet contains basic information on thirty of the most frequently used Unix Commands. It is intended for Unix beginners who need a
Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)
Cisco Networking Academy Program Curriculum Scope & Sequence Fundamentals of UNIX version 2.0 (July, 2002) Course Description: Fundamentals of UNIX teaches you how to use the UNIX operating system and
Fred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer
Fred Hantelmann LINUX Start-up Guide A self-contained introduction With 57 Figures Springer Contents Contents Introduction 1 1.1 Linux Versus Unix 2 1.2 Kernel Architecture 3 1.3 Guide 5 1.4 Typographical
USEFUL UNIX COMMANDS
cancel cat file USEFUL UNIX COMMANDS cancel print requested with lp Display the file cat file1 file2 > files Combine file1 and file2 into files cat file1 >> file2 chgrp [options] newgroup files Append
Unix Sampler. PEOPLE whoami id who
Unix Sampler PEOPLE whoami id who finger username hostname grep pattern /etc/passwd Learn about yourself. See who is logged on Find out about the person who has an account called username on this host
Introduction to Unix Tutorial
Topics covered in this Tutorial Introduction to Unix Tutorial 1. CSIF Computer Network 2. Local Logging in. 3. Remote computer access: ssh 4. Navigating the UNIX file structure: cd, ls, and pwd 5. Making
Introduction to Mac OS X
Introduction to Mac OS X The Mac OS X operating system both a graphical user interface and a command line interface. We will see how to use both to our advantage. Using DOCK The dock on Mac OS X is the
An Introduction to Using the Command Line Interface (CLI) to Work with Files and Directories
An Introduction to Using the Command Line Interface (CLI) to Work with Files and Directories Mac OS by bertram lyons senior consultant avpreserve AVPreserve Media Archiving & Data Management Consultants
Introduction to the UNIX Operating System and Open Windows Desktop Environment
Introduction to the UNIX Operating System and Open Windows Desktop Environment Welcome to the Unix world! And welcome to the Unity300. As you may have already noticed, there are three Sun Microsystems
system or read a good Unix book from the DESY library (e.g. Mark Sobell, APractical Guide to
Introduction to Unix at DESY There are only a few commands that you have to know in order to get started on Unix. These will be presented in this introduction. For a more detailed description of the syntax
Birmingham Environment for Academic Research. Introduction to Linux Quick Reference Guide. Research Computing Team V1.0
Birmingham Environment for Academic Research Introduction to Linux Quick Reference Guide Research Computing Team V1.0 Contents The Basics... 4 Directory / File Permissions... 5 Process Management... 6
Introduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
A UNIX/Linux in a nutshell
bergman p.1/23 A UNIX/Linux in a nutshell Introduction Linux/UNIX Tommi Bergman tommi.bergman[at]csc.fi Computational Environment & Application CSC IT center for science Ltd. Espoo, Finland bergman p.2/23
Unix Primer - Basic Commands In the Unix Shell
Unix Primer - Basic Commands In the Unix Shell If you have no experience with the Unix command shell, it will be best to work through this primer. The last section summarizes the basic file manipulation
LECTURE-7. Introduction to DOS. Introduction to UNIX/LINUX OS. Introduction to Windows. Topics:
Topics: LECTURE-7 Introduction to DOS. Introduction to UNIX/LINUX OS. Introduction to Windows. BASIC INTRODUCTION TO DOS OPERATING SYSTEM DISK OPERATING SYSTEM (DOS) In the 1980s or early 1990s, the operating
1 Basic commands. 2 Terminology. CS61B, Fall 2009 Simple UNIX Commands P. N. Hilfinger
CS61B, Fall 2009 Simple UNIX Commands P. N. Hilfinger 1 Basic commands This section describes a list of commonly used commands that are available on the EECS UNIX systems. Most commands are executed by
UNIX / Linux commands Basic level. Magali COTTEVIEILLE - September 2009
UNIX / Linux commands Basic level Magali COTTEVIEILLE - September 2009 What is Linux? Linux is a UNIX system Free Open source Developped in 1991 by Linus Torvalds There are several Linux distributions:
Partitioning. Files on the Hard Drive. Administration of Operating Systems DO2003. Partition = Binder with index. Write file = Insert document
Administration of Operating Systems DO2003 Mounting the file structure Devices Wecksten, Mattias 2008 Partitioning Wecksten, Mattias 2008 Files on the Hard Drive Partition = Binder with index Write file
Linux command line. An introduction to the Linux command line for genomics. Susan Fairley
Linux command line An introduction to the Linux command line for genomics Susan Fairley Aims Introduce the command line Provide an awareness of basic functionality Illustrate with some examples Provide
Tutorial 0A Programming on the command line
Tutorial 0A Programming on the command line Operating systems User Software Program 1 Program 2 Program n Operating System Hardware CPU Memory Disk Screen Keyboard Mouse 2 Operating systems Microsoft Apple
A Crash Course on UNIX
A Crash Course on UNIX UNIX is an "operating system". Interface between user and data stored on computer. A Windows-style interface is not required. Many flavors of UNIX (and windows interfaces). Solaris,
Linux Overview. Local facilities. Linux commands. The vi (gvim) editor
Linux Overview Local facilities Linux commands The vi (gvim) editor MobiLan This system consists of a number of laptop computers (Windows) connected to a wireless Local Area Network. You need to be careful
Running your first Linux Program
Running your first Linux Program This document describes how edit, compile, link, and run your first linux program using: - Gnome a nice graphical user interface desktop that runs on top of X- Windows
Secure File Transfer Installation. Sender Recipient Attached FIles Pages Date. Development Internal/External None 11 6/23/08
Technical Note Secure File Transfer Installation Sender Recipient Attached FIles Pages Date Development Internal/External None 11 6/23/08 Overview This document explains how to install OpenSSH for Secure
An Introduction to the Linux Command Shell For Beginners
An Introduction to the Linux Command Shell For Beginners Presented by: Victor Gedris In Co-Operation With: The Ottawa Canada Linux Users Group and ExitCertified Copyright and Redistribution This manual
Introduction to the UNIX Operating System on IT Systems
Information Technology Rice University Document UNIX 1 June 21, 2000 Introduction to the UNIX Operating System on IT Systems This document is intended to introduce you to the UNIX operating system. It
Lab 1: Introduction to C, ASCII ART and the Linux Command Line Environment
.i.-' `-. i..' `/ \' _`.,-../ o o \.' ` ( / \ ) \\\ (_.'.'"`.`._) /// \\`._(..: :..)_.'// \`. \.:-:. /.'/ `-i-->..
Tutorial Guide to the IS Unix Service
Tutorial Guide to the IS Unix Service The aim of this guide is to help people to start using the facilities available on the Unix and Linux servers managed by Information Services. It refers in particular
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check
CS10110 Introduction to personal computer equipment
CS10110 Introduction to personal computer equipment PRACTICAL 4 : Process, Task and Application Management In this practical you will: Use Unix shell commands to find out about the processes the operating
L01 Introduction to the Unix OS
Geophysical Computing L01-1 1. What is Unix? L01 Introduction to the Unix OS Unix is an operating system (OS): it manages the way the computer works by driving the processor, memory, disk drives, keyboards,
CSIL MiniCourses. Introduction To Unix (I) John Lekberg Sean Hogan Cannon Matthews Graham Smith. Updated on: 2015-10-14
CSIL MiniCourses Introduction To Unix (I) John Lekberg Sean Hogan Cannon Matthews Graham Smith Updated on: 2015-10-14 What s a Unix? 2 Now what? 2 Your Home Directory and Other Things 2 Making a New Directory
Unix the Bare Minimum
Unix the Bare Minimum Norman Matloff September 27, 2005 c 2001-2005, N.S. Matloff Contents 1 Purpose 2 2 Shells 2 3 Files and Directories 4 3.1 Creating Directories.......................................
Syntax: cd <Path> Or cd $<Custom/Standard Top Name>_TOP (In CAPS)
List of Useful Commands for UNIX SHELL Scripting We all are well aware of Unix Commands but still would like to walk you through some of the commands that we generally come across in our day to day task.
AN INTRODUCTION TO UNIX
AN INTRODUCTION TO UNIX Paul Johnson School of Mathematics September 24, 2010 OUTLINE 1 SHELL SCRIPTS Shells 2 COMMAND LINE Command Line Input/Output 3 JOBS Processes Job Control 4 NETWORKING Working From
Hands-On UNIX Exercise:
Hands-On UNIX Exercise: This exercise takes you around some of the features of the shell. Even if you don't need to use them all straight away, it's very useful to be aware of them and to know how to deal
Computing Service G72. File Transfer Using SCP, SFTP or FTP. many leaflets can be found at: http://www.cam.ac.uk/cs/docs
Computing Service G72 File Transfer Using SCP, SFTP or FTP many leaflets can be found at: http://www.cam.ac.uk/cs/docs 50 pence April 2003 Contents Introduction Servers and clients... 2 Comparison of FTP,
CS 103 Lab Linux and Virtual Machines
1 Introduction In this lab you will login to your Linux VM and write your first C/C++ program, compile it, and then execute it. 2 What you will learn In this lab you will learn the basic commands and navigation
An A-Z Index of the Apple OS X command line (TERMINAL) The tcsh command shell of Darwin (the open source core of OSX)
An A-Z Index of the Apple OS X command line (TERMINAL) The tcsh command shell of Darwin (the open source core of OSX) alias alloc awk Create an alias List used and free memory Find and Replace text within
SSH Connections MACs the MAC XTerm application can be used to create an ssh connection, no utility is needed.
Overview of MSU Compute Servers The DECS Linux based compute servers are well suited for programs that are too slow to run on typical desktop computers but do not require the power of supercomputers. The
New Lab Intro to KDE Terminal Konsole
New Lab Intro to KDE Terminal Konsole After completing this lab activity the student will be able to; Access the KDE Terminal Konsole and enter basic commands. Enter commands using a typical command line
Using SVN to Manage Source RTL
Using SVN to Manage Source RTL CS250 Tutorial 1 (Version 083010a) August 30, 2010 Yunsup Lee In this tutorial you will gain experience using the Subversion (SVN) to manage your source RTL and code. You
CMSC 216 UNIX tutorial Fall 2010
CMSC 216 UNIX tutorial Fall 2010 Larry Herman Jandelyn Plane Gwen Kaye August 28, 2010 Contents 1 Introduction 2 2 Getting started 3 2.1 Logging in........................................... 3 2.2 Logging
Lab 1: Introduction to the network lab
CSCI 312 - DATA COMMUNICATIONS AND NETWORKS FALL, 2014 Lab 1: Introduction to the network lab NOTE: Be sure to bring a flash drive to the lab; you will need it to save your data. For this and future labs,
Kernel. What is an Operating System? Systems Software and Application Software. The core of an OS is called kernel, which. Module 9: Operating Systems
Module 9: Operating Systems Objective What is an operating system (OS)? OS kernel, and basic functions OS Examples: MS-DOS, MS Windows, Mac OS Unix/Linux Features of modern OS Graphical operating system
HP-UX Essentials and Shell Programming Course Summary
Contact Us: (616) 875-4060 HP-UX Essentials and Shell Programming Course Summary Length: 5 Days Prerequisite: Basic computer skills Recommendation Statement: Student should be able to use a computer monitor,
Command Line - Part 1
Command Line - Part 1 STAT 133 Gaston Sanchez Department of Statistics, UC Berkeley gastonsanchez.com github.com/gastonstat Course web: gastonsanchez.com/teaching/stat133 GUIs 2 Graphical User Interfaces
Introduction to the new mainframe Chapter 4: Interactive facilities of z/os: TSO/E, ISPF, and UNIX
Chapter 4: Interactive facilities of z/os: TSO/E, ISPF, and UNIX Chapter 4 objectives Be able to: Log on to z/os Run programs from the TSO READY prompt Navigate through the menu options of ISPF Use the
1 Intro 1. 2 man - Accessing On-Line Manual Pages 1. 3 pwd - Print the Working Directory 2. 4 cd - Changing Directory 2
BASIC UNIX COMMANDS Contents 1 Intro 1 2 man - Accessing On-Line Manual Pages 1 3 pwd - Print the Working Directory 2 4 cd - Changing Directory 2 5 ls - Listing the Contents of Directories 2 6 mkdir -
How to Tunnel Remote Desktop using SSH (Cygwin) for Windows XP (SP2)
How to Tunnel Remote Desktop using SSH (Cygwin) for Windows XP (SP2) The ssh server is an emulation of the UNIX environment and OpenSSH for Windows, by Redhat, called cygwin This manual covers: Installation
UNIX Basics. Ian Darwin TCP Informatics January, 2005. Presented from a Mac using Apple s Keynote presentation software
UNIX Basics Ian Darwin TCP Informatics January, 2005 Presented from a Mac using Apple s Keynote presentation software 1 What is this about? Brief Introduction to UNIX - ideas - basic commands - some examples
Basic C Shell. [email protected]. 11th August 2003
Basic C Shell [email protected] 11th August 2003 This is a very brief guide to how to use cshell to speed up your use of Unix commands. Googling C Shell Tutorial can lead you to more detailed information.
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 3.4, Last Edited 9/10/2011 Students Name: Date of Experiment: Read the following guidelines before working in
DS License Server V6R2013x
DS License Server V6R2013x DS License Server V6R2013x Installation and Configuration Guide Contains JAVA SE RUNTIME ENVIRONMENT (JRE) VERSION 7 Contains IBM(R) 64-bit SDK for AIX(TM), Java(TM) Technology
ICS 351: Today's plan
ICS 351: Today's plan routing protocols linux commands Routing protocols: overview maintaining the routing tables is very labor-intensive if done manually so routing tables are maintained automatically:
Linux System Administration on Red Hat
Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with Linux or Unix systems as a user (i.e., they know file manipulation,
UNIX Tutorial for Beginners
UNIX Tutorial for Beginners Typographical conventions In what follows, we shall use the following typographical conventions: Characters written in bold typewriter font are commands to be typed into the
CPSC2800: Linux Hands-on Lab #3 Explore Linux file system and file security. Project 3-1
CPSC2800: Linux Hands-on Lab #3 Explore Linux file system and file security Project 3-1 Linux support many different file systems that can be mounted using the mount command. In this project, you use the
A Brief Introduction to the Use of Shell Variables
A Brief Introduction to the Use of Shell Variables Norman Matloff July 25, 2001 Contents 1 Two Popular Shells: tcsh and bash 1.1 Overview There are many different shells available for Unix systems. Here
UNIX Remote Job Entry User s Guide A. L. Sabsevitz K. A. Kelleman
UNIX Remote Job Entry User s Guide A. L. Sabsevitz K. A. Kelleman 1. PREFACE A set of background processes running under UNIX* support remote job entry to IBM System/360 and /370 host computers. RJE is
DiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com [email protected] 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
INASP: Effective Network Management Workshops
INASP: Effective Network Management Workshops Linux Familiarization and Commands (Exercises) Based on the materials developed by NSRC for AfNOG 2013, and reused with thanks. Adapted for the INASP Network
Attix5 Pro Server Edition
Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.
UNIX: Introduction to TELNET and FTP on UNIX
Introduction to TELNET and FTP on UNIX SYNOPSIS This document is written with the novice user in mind. It describes the use of TCP/IP and FTP to transfer files to and from the UNIX operating system and
University of Toronto
1 University of Toronto APS 105 Computer Fundamentals A Tutorial about UNIX Basics Fall 2011 I. INTRODUCTION This document serves as your introduction to the computers we will be using in this course.
Using SVN to Manage Source RTL
Using SVN to Manage Source RTL CS250 Tutorial 1 (Version 092509a) September 25, 2009 Yunsup Lee In this tutorial you will gain experience using the Subversion (SVN) to manage your source RTL and code.
Command Line Crash Course For Unix
Command Line Crash Course For Unix Controlling Your Computer From The Terminal Zed A. Shaw December 2011 Introduction How To Use This Course You cannot learn to do this from videos alone. You can learn
Introduction to Linux and Cluster Basics for the CCR General Computing Cluster
Introduction to Linux and Cluster Basics for the CCR General Computing Cluster Cynthia Cornelius Center for Computational Research University at Buffalo, SUNY 701 Ellicott St Buffalo, NY 14203 Phone: 716-881-8959
Automating FTP with the CP 443-1 IT
Automating FTP with the CP 443-1 IT Contents Page Introduction 2 FTP Basics with the SIMATIC NET CP 443-1 IT 3 CONFIGURATION 3 FTP SERVICES 6 FTP Server with the SIMATIC NET CP 443-1 IT 9 OVERVIEW 9 CONFIGURATION
Open Source Computational Fluid Dynamics
Open Source Computational Fluid Dynamics An MSc course to gain extended knowledge in Computational Fluid Dynamics (CFD) using open source software. Teachers: Miklós Balogh and Zoltán Hernádi Department
PuTTY/Cygwin Tutorial. By Ben Meister Written for CS 23, Winter 2007
PuTTY/Cygwin Tutorial By Ben Meister Written for CS 23, Winter 2007 This tutorial will show you how to set up and use PuTTY to connect to CS Department computers using SSH, and how to install and use the
UNIX (LINUX) PRACTICAL 1 INTRODUCTION
UNIX (LINUX) PRACTICAL 1 INTRODUCTION 1. CONNECTING TO UNIX (LOGGING ON) 2. FILES AND DIRECTORIES - Listing, viewing, copying, making. How your workspace is structured. 3. HELP! - How to get it. Is it
Unix Shell Scripts. Contents. 1 Introduction. Norman Matloff. July 30, 2008. 1 Introduction 1. 2 Invoking Shell Scripts 2
Unix Shell Scripts Norman Matloff July 30, 2008 Contents 1 Introduction 1 2 Invoking Shell Scripts 2 2.1 Direct Interpretation....................................... 2 2.2 Indirect Interpretation......................................
Downloading Files using FTP
Downloading Files using FTP Transferring files to and from Barney or other server is done using the File Transfer Protocol, more commonly referred to as FTP. Using FTP, you can transfer files to and from
HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX
HARFORD COMMUNITY COLLEGE 401 Thomas Run Road Bel Air, MD 21015 Course Outline CIS 110 - INTRODUCTION TO UNIX Course Description: This is an introductory course designed for users of UNIX. It is taught
IBM WebSphere Application Server Version 7.0
IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the
1. Installation Instructions - Unix & Linux
Planning Your Installation 1. Installation Instructions - Unix & Linux There are two types of Gridgen installations: a First Time Installation and a Maintenance Release Installation. A First Time Installation
RECOVER ( 8 ) Maintenance Procedures RECOVER ( 8 )
NAME recover browse and recover NetWorker files SYNOPSIS recover [-f] [-n] [-q] [-u] [-i {nnyyrr}] [-d destination] [-c client] [-t date] [-sserver] [dir] recover [-f] [-n] [-u] [-q] [-i {nnyyrr}] [-I
TOSHIBA GA-1310. Printing from Windows
TOSHIBA GA-1310 Printing from Windows 2009 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45081979 04 February 2009 CONTENTS 3 CONTENTS
DOS Command Reference
DOS Command Reference Introduction Some course material on the Teaching Network may still use the command line operating system called DOS (Disk Operating System). This requires the user to type specific
DS License Server. Installation and Configuration Guide. 3DEXPERIENCE R2014x
DS License Server Installation and Configuration Guide 3DEXPERIENCE R2014x Contains JAVA SE RUNTIME ENVIRONMENT (JRE) VERSION 7 Contains IBM(R) 64-bit SDK for AIX(TM), Java(TM) Technology Edition, Version
Installation & Configuration Guide for Solaris 8
Installation & Configuration Guide for Solaris 8 Document version 1.1.2, 2003-02-27 CWRU Information Technology Services If you have any questions or problems using these instructions, simply contact the
Installation Guide for WebSphere Application Server (WAS) and its Fix Packs on AIX V5.3L
Installation Guide for WebSphere Application Server (WAS) and its Fix Packs on AIX V5.3L Introduction: This guide is written to help any person with little knowledge in AIX V5.3L to prepare the P Server
Basic Linux and Unix commands, editing and transfering files
First version: February 3, 2002 Last update: February 5, 2010 PATRICIA LEDESMA LIÉBANA Basic Linux and Unix commands, editing and transfering files The most recent version of this document can be found
Macintosh Printer Management using Centrify DirectControl Group Policies
WHITE PAPER CENTRIFY CORP. MARCH 2010 Macintosh Printer Management using Centrify DirectControl Group Policies ABSTRACT This white paper examines various approaches to managing printer configuration files
Unix Scripts and Job Scheduling
Unix Scripts and Job Scheduling Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh [email protected] http://www.sis.pitt.edu/~spring Overview Shell Scripts
MFCF Grad Session 2015
MFCF Grad Session 2015 Agenda Introduction Help Centre and requests Dept. Grad reps Linux clusters using R with MPI Remote applications Future computing direction Technical question and answer period MFCF
Sophos Anti-Virus for Linux configuration guide. Product version: 9
Sophos Anti-Virus for Linux configuration guide Product version: 9 Document date: September 2014 Contents 1 About this guide...8 2 About Sophos Anti-Virus for Linux...9 2.1 What Sophos Anti-Virus does...9
SAS Marketing Automation 4.4. Unix Install Instructions for Hot Fix 44MA10
SAS Marketing Automation 4.4 Unix Install Instructions for Hot Fix 44MA10 Introduction This document describes the steps necessary to install and deploy the SAS Marketing Automation 4.4 Hot fix Release
Using Secure4Audit in an IRIX 6.5 Environment
Using Secure4Audit in an IRIX 6.5 Environment Overview... 3 Icons... 3 Installation Reminders... 4 A Very Brief Overview of IRIX System auditing... 5 Installing System Auditing... 5 The System Audit Directories...
Higher National Unit Specification. General information for centres. Multi User Operating Systems. Unit code: DH3A 34
Higher National Unit Specification General information for centres Unit code: DH3A 34 Unit purpose: This Unit is designed to provide candidates with a practical introduction to, and understanding of, the
Unix Guide. Logo Reproduction. School of Computing & Information Systems. Colours red and black on white backgroun
Logo Reproduction Colours red and black on white backgroun School of Computing & Information Systems Unix Guide Mono positive black on white background 2013 Mono negative white only out of any colou 2
NASA Workflow Tool. User Guide. September 29, 2010
NASA Workflow Tool User Guide September 29, 2010 NASA Workflow Tool User Guide 1. Overview 2. Getting Started Preparing the Environment 3. Using the NED Client Common Terminology Workflow Configuration
