Free Computer Help - Geeks To Go

Tuesday, September 25, 2007

most powerful linux command tht dsnt come installed with linux

lsof is the Linux/Unix über-tool. used mostly for gettinging network connection related information from a system, but that's just the beginning for this amazing and little-known application.. the tool is aptly called lsof because it "lists open files".. and rmbr, in Unix just about everything (including a network socket) is a file.. havent tried this but got fr another blog.. hope this tool is perfect..

Labels: , , , , ,

Thursday, September 20, 2007

funny linux commands

% cat "food in cans"
cat: can't open food in cans

% nice man woman
No manual entry for woman.

% "How would you rate Quayle's incompetence?
Unmatched ".

% Unmatched ".
Unmatched ".

% [Where is Jimmy Hoffa?
Missing ].

% ^How did the sex change operation go?^
Modifier failed.

% If I had a ( for every $ the Congress spent, what would I have?
Too many ('s.

% make love
Make: Don't know how to make love. Stop.

% sleep with me
bad character

% got a light?
No match.

% man: why did you get a divorce?
man:: Too many arguments.

% !:say, what is saccharine?
Bad substitute.

% %blow
%blow: No such job.

% \(-
(-: Command not found.

$ PATH=pretending! /usr/ucb/which sense
no sense in pretending!

$ drink matter
matter: cannot create

taken from http://frankmash.blogspot.com

Labels: , , , , , , , , , ,

Friday, September 14, 2007

having 145 os

that 2 in a single pc.. i no thr r many os out thr.. but having all them in one shot, OMG.. phenomenal >>

Labels: , , , , , , , , , , ,

Wednesday, September 12, 2007

network commands

1 more tutorial for linux.. but only 'advanced' commands, i believe >>

Labels: , , , , , , , ,

Monday, September 10, 2007

bashpitfalls

the tutorial says all.. dnt knw how many more times am gonna use that title.. titles r getting really messy with me knw >>

Labels: , , , , , , , , , , ,

dvd authoring

wow.. atlast i can say tht with linux am getting to my familiar territory >>

Labels: , , , , , , , ,

linux something

dnt wanna give a title coz am running out of titles now.. LOl.. anyways, one more linux resource >>

Labels: , , , , , , , , , ,

Tuesday, September 04, 2007

things not 2 b done

thr r things wich u shd not do in any scenario.. here is a case with linux kernel.. but u mite feel it's not best suited for the beginners >>

Labels: , , , , , , ,

Friday, August 31, 2007

something (un)usual

story on computer forensics and open source tools used.. and the stuff discussed here is very relevant >>

Labels: , , , , , , , ,

Thursday, August 30, 2007

bash faq

dnt rmbr whehter i had given this link earlier.. hav a good time with bash >>

Labels: , , , , , , , , ,

Thursday, August 23, 2007

used find??

oldie but goodie terminal command, find, can be used to locate literally any file on your system.. hav u tried it's full utility.. it's really good >>

Labels: , , , , , , , ,

Wednesday, August 22, 2007

25 useful commands in Linux/UNIX for Beginners (descending order)

25)host

host is a simple utility for performing DNS lookups. It is normally used to convert names to IP addresses and vice versa. When no arguments or options are given, host prints a short summary of its command line arguments and options.

Example:
$ host mail.yahoo.com
mail.yahoo.com is an alias for login.yahoo.com.
login.yahoo.com is an alias for login-global.yahoo8.akadns.net.
login-global.yahoo8.akadns.net is an alias for login.yahoo.akadns.net.
login.yahoo.akadns.net has address 69.147.112.160

24)dig

dig (domain information groper) is a flexible tool for interrogating DNS name servers. It performs DNS lookups and displays the answers that are returned from the name server(s) that were queried. Most DNS administrators use dig to troubleshoot DNS problems because of its flexibility, ease of use and clarity of output. Other lookup tools tend to have less functionality than dig.

$ dig mail.yahoo.com

; <<>> DiG 9.4.1-P1 <<>> mail.yahoo.com
;; global options: printcmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 9867
;; flags: qr rd ra; QUERY: 1, ANSWER: 4, AUTHORITY: 8, ADDITIONAL: 8

;; QUESTION SECTION:
;mail.yahoo.com. IN A

;; ANSWER SECTION:
mail.yahoo.com. 195 IN CNAME login.yahoo.com.
login.yahoo.com. 65 IN CNAME login-global.yahoo8.akadns.net.
login-global.yahoo8.akadns.net. 122 IN CNAME login.yahoo.akadns.net.
login.yahoo.akadns.net. 51 IN A 69.147.112.160

;; AUTHORITY SECTION:
akadns.net. 84671 IN NS zc.akadns.org.
akadns.net. 84671 IN NS zd.akadns.org.
akadns.net. 84671 IN NS eur1.akadns.net.
akadns.net. 84671 IN NS use3.akadns.net.
akadns.net. 84671 IN NS usw2.akadns.net.
akadns.net. 84671 IN NS asia9.akadns.net.
akadns.net. 84671 IN NS za.akadns.org.
akadns.net. 84671 IN NS zb.akadns.org.

;; ADDITIONAL SECTION:
za.akadns.org. 23366 IN A 195.219.3.169
zb.akadns.org. 23366 IN A 206.132.100.105
zc.akadns.org. 23366 IN A 61.200.81.111
zd.akadns.org. 23366 IN A 63.209.3.132
eur1.akadns.net. 17773 IN A 213.254.204.197
use3.akadns.net. 17773 IN A 204.2.178.133
usw2.akadns.net. 17773 IN A 208.185.132.166
asia9.akadns.net. 17773 IN A 220.73.220.4

;; Query time: 27 msec
;; SERVER: 24.92.226.9#53(24.92.226.9)
;; WHEN: Mon Aug 20 13:34:17 2007
;; MSG SIZE rcvd: 421


23)mkdir

The mkdir utility creates the directories named as operands, in the order specified, using mode ``rwxrwxrwx'' (0777) as modified by the current umask(2).

Example:
$ mkdir test
$ ls -l | grep test
drwxr-xr-x 2 owner group 512 Aug 20 13:35 test

22)rm

The rm utility attempts to remove the non-directory type files specified on the command line. If the permissions of the file do not permit writ- ing, and the standard input device is a terminal, the user is prompted (on the standard error output) for confirmation.

Example (file):

$ rm test2
$ ls -l | grep test2

Example (dir):
what you get when you try to rm a dir is:

$ rm test
rm: test: is a directory

to get around this do:

$ rm -r test
$ ls -l | grep test


21)cp

In the first synopsis form, the cp utility copies the contents of the source_file to the target_file. In the second synopsis form, the con- tents of each named source_file is copied to the destination target_directory. The names of the files themselves are not changed. If cp detects an attempt to copy a file to itself, the copy will fail.

Example:

$ cp test test2
$ ls -l | grep test
-rw-r--r-- 1 owner group 0 Aug 20 13:40 test
-rw-r--r-- 1 owner group 0 Aug 20 13:41 test2

copy a directory do:

$ cp -r test test2
$ ls -l | grep test
drwxr-xr-x 2 owner group 512 Aug 20 13:42 test
drwxr-xr-x 2 owner group 512 Aug 20 13:42 test2


20)grep

grep searches the named input FILEs (or standard input if no files are named, or the file name - is given) for lines containing a match to the given PATTERN. By default, grep prints the matching lines.

Example:

$ ls
example test three
$ ls | grep th
three


19)ls

For each operand that names a file of a type other than directory, ls displays its name as well as any requested, associated information. For each operand that names a file of type directory, ls displays the names of files contained within that directory, as well as any requested, asso- ciated information.

Example:

$ ls
example test three
$ ls -l
total 0
-rw-r--r-- 1 owner group 0 Aug 20 13:44 example
-rw-r--r-- 1 owner group 0 Aug 20 13:44 test
-rw-r--r-- 1 owner group 0 Aug 20 13:44 three


18)startx

The startx script is a front end to xinit that provides a somewhat nicer user interface for running a single session of the X Window Sys- tem. It is often run with no arguments.

Example:
To use startx user most have .xinitrc file in there home directory. Examples of the file are:

$ cat ~/.xinitrc
exec fluxbox
(this will start fluxbox)
$ cat ~/.xinitrc
exec gnome-session
(this will start gnome)
$ cat ~/.xinitrc
exec startkde
(this will start kde)

17)nano

nano is a small, free and friendly editor which aims to replace Pico, the default editor included in the non-free Pine package. Rather than just copying Pico's look and feel, nano also implements some missing (or disabled by default) features in Pico, such as "search and replace" and "go to line and column number".

Example:

$nano test

(will open test file for edit to exit type: Ctrl+X)

*)vi

Vi is a screen oriented text editor. Ex is a line-oriented text edi- tor. Ex and vi are different interfaces to the same program, and it is possible to switch back and forth during an edit session. View is the equivalent of using the -R (read-only) option of vi.

Example:

$vi test

(Added on request)
to start typing on test use: i when your done type (esc) to save type :wq! to not save use :q!

16)pwd

The pwd utility writes the absolute pathname of the current working directory to the standard output.

Example:

$ pwd
/usr/home/username/test

15)cat

The cat utility reads files sequentially, writing them to the standard output. The file operands are processed in command-line order. If file is a single dash (`-') or absent, cat reads from the standard input. If file is a UNIX domain socket, cat connects to it and then reads it until EOF. This complements the UNIX domain binding capability available in inetd(8).

Example:

$ cat test
this is the contents of the file test


14)man

The man utility formats and displays the on-line manual pages. This ver- sion knows about the MANPATH and PAGER environment variables, so you can have your own set(s) of personal man pages and choose whatever program you like to display the formatted pages. If section is specified, man only looks in that section of the manual. You may also specify the order to search the sections for entries and which preprocessors to run on the source files via command line options or environment variables. If enabled by the system administrator, formatted man pages will also be compressed with the ``/usr/bin/gzip -c'' command to save space.

Example:

$ man find

Show information about the command find

13)kill

The kill utility sends a signal to the processes specified by the pid op- erands.

Example:

$ kill 694

(694 is the id of the program running)

12)locate

The locate program searches a database for all pathnames which match the specified pattern. The database is recomputed periodically (usually weekly or daily), and contains the pathnames of all files which are pub- licly accessible.

Example:

#locate Xorg.0.log
/var/log/Xorg.0.log
/var/log/Xorg.0.log.old

(you man need to run /usr/libexec/locate.updatedb to update locate listing)

11)ifconfig

The ifconfig utility is used to assign an address to a network interface and/or configure network interface parameters. The ifconfig utility must be used at boot time to define the network address of each interface present on a machine; it may also be used at a later time to redefine an interface's address or other operating parameters.

Example:
# ifconfig
em0: flags=8843 metric 0 mtu 1500
options=18b
ether 00:16:41:16:28:2a
inet 192.168.1.2 netmask 0xffffff00 broadcast 192.168.1.255
media: Ethernet autoselect (1000baseTX )
status: active
lo0: flags=8049 metric 0 mtu 16384
inet6 fe80::1%lo0 prefixlen 64 scopeid 0x2
inet6 ::1 prefixlen 128
inet 127.0.0.1 netmask 0xff000000

10)ssh

ssh (SSH client) is a program for logging into a remote machine and for executing commands on a remote machine. It is intended to replace rlogin and rsh, and provide secure encrypted communications between two untrusted hosts over an insecure network. X11 connections and arbitrary TCP ports can also be forwarded over the secure channel.

Example:

#ssh localhost
Password:
Welcome to FreeBSD-World

(you wouldn't use local host you would use the computer ip or hostname you are connecting to)

9)gzip

The gzip program compresses and decompresses files using Lempel-Ziv cod- ing (LZ77). If no files are specified, gzip will compress from standard input, or decompress to standard output. When in compression mode, each file will be replaced with another file with the suffix, set by the -S suffix option, added, if possible. In decompression mode, each file will be checked for existence, as will the file with the suffix added.

Example:

$ gzip -9 test.tar
test.tar.gz

$ gzip -d test.tar.gz
$ ls | grep test.tar
test.tar


8)bzip2

bzip2 compresses files using the Burrows-Wheeler block sorting text compression algorithm, and Huffman coding. Compression is generally considerably better than that achieved by more conventional LZ77/LZ78-based compressors, and approaches the performance of the PPM family of statistical compressors.

Example:

$ bzip2 -9 test.tar
$ ls | grep test.tar
test.tar.bz2
$ bzip2 -d test.tar.bz2
$ ls | grep test.tar
test.tar


7)zip

zip is a compression and file packaging utility for Unix, VMS, MSDOS, OS/2, Windows NT, Minix, Atari and Macintosh, Amiga and Acorn RISC OS.

Example:

$ zip test.zip test
adding: test/ (stored 0%)
$ ls | grep test
test
test.zip
$ unzip test.zip
Archive: test.zip


6)tar

tar creates and manipulates streaming archive files. This implementation can extract from tar, pax, cpio, zip, jar, ar, and ISO 9660 cdrom images and can create tar, pax, cpio, ar, and shar archives.


Example:

$ tar -cf t2.tar example test three
$ ls | grep t2
t2.tar
$ tar -xf t2.tar
(files are now extracted)


5)mount

The mount utility calls the nmount(2) system call to prepare and graft a special device or the remote node (rhost:path) on to the file system tree at the point node. If either special or node are not provided, the appropriate information is taken from the fstab(5) file.

Example:

# cat /etc/fstab
# Device Mountpoint FStype Options Dump Pass#
/dev/ad4s1b none swap sw 0 0
/dev/ad4s1a / ufs rw 1 1
/dev/acd0 /cdrom cd9660 ro,noauto 0 0
# mount /cdrom
# ls /cdrom
4.1 TRANS.TBL etc
# umount /cdrom
# ls /cdrom
#

(/cdrom is already listed in the fstab if it was not I would have to do 'mount /dev/acd0 /cdrom')

4)passwd

The passwd utility changes the user's local, Kerberos, or NIS password. If the user is not the super-user, passwd first prompts for the current password and will not continue unless the correct password is entered.

Example:

$ passwd
Changing local password for username
Old Password:
New Password:
Retype New Password:
$


3)ping

The ping utility uses the ICMP protocol's mandatory ECHO_REQUEST datagram to elicit an ICMP ECHO_RESPONSE from a host or gateway. ECHO_REQUEST datagrams (``pings'') have an IP and ICMP header, followed by a ``struct timeval'' and then an arbitrary number of ``pad'' bytes used to fill out the packet.

Example:

$ ping -c 5 www.yahoo.com
PING www.yahoo-ht3.akadns.net (69.147.114.210): 56 data bytes
64 bytes from 69.147.114.210: icmp_seq=0 ttl=47 time=48.814 ms
64 bytes from 69.147.114.210: icmp_seq=1 ttl=47 time=32.916 ms
64 bytes from 69.147.114.210: icmp_seq=2 ttl=47 time=32.361 ms
64 bytes from 69.147.114.210: icmp_seq=3 ttl=47 time=33.912 ms
64 bytes from 69.147.114.210: icmp_seq=4 ttl=47 time=33.846 ms

--- www.yahoo-ht3.akadns.net ping statistics ---
5 packets transmitted, 5 packets received, 0.0% packet loss
round-trip min/avg/max/stddev = 32.361/36.370/48.814/6.249 ms


2)tail

The tail utility displays the contents of file or, by default, its stan- dard input, to the standard output.

# tail /var/log/auth.log
Aug 19 20:38:05 laptop su: username to root on /dev/ttyv0
Aug 20 00:10:38 laptop login: login on ttyv0 as username
Aug 20 00:11:30 laptop su: username to root on /dev/ttyp0
Aug 20 00:56:32 laptop su: username to root on /dev/ttyp1
Aug 20 01:31:26 laptop su: username to root on /dev/ttyv0
Aug 20 10:25:58 laptop login: login on ttyv0 as username
Aug 20 10:26:21 laptop su: username to root on /dev/ttyp0
Aug 20 13:58:06 laptop su: username to root on /dev/ttyp1
Aug 20 14:18:23 laptop su: username to root on /dev/ttyp1
Aug 20 14:27:39 laptop su: useranme to root on /dev/ttyp1


1)top

Top displays the top processes on the system and periodically updates this information.

Example:

last pid: 5327; load averages: 0.00, 0.00, 0.00 up 0+04:05:41 14:30:28
44 processes: 1 running, 43 sleeping
CPU states: 0.2% user, 0.0% nice, 1.3% system, 0.0% interrupt, 98.5% idle
Mem: 198M Active, 608M Inact, 128M Wired, 26M Cache, 111M Buf, 31M Free
Swap: 1024M Total, 8K Used, 1024M Free

PID USERNAME THR PRI NICE SIZE RES STATE C TIME WCPU COMMAND
694 username 1 96 0 53004K 48212K select 1 4:23 0.10% Xorg
10306 username 1 96 0 7496K 4300K select 1 0:04 0.05% xterm

From >>

Labels: , , , , , , , ,

handful

a handful of tools and utilities to make troubleshooting, management and deployment easier and faster, whether it's diagnosing a troublesome system, deploying a new device or managing a complicated environment >>

Labels: , , , , , , , ,

Tuesday, August 21, 2007

sys admin toolkit

if u hav guessed it rite, cheers.. it's abot ssh.. this time this stuff is from ibm >>

Labels: , , , , , , , , , , , ,

Monday, August 20, 2007

linux cheat sheet

this time it's with a bit of explanation >>

Labels: , , , ,

linux networking stack

one of the greatest features of the linux is its networking stack.. let's explores the structure of the Linux networking stack from the perspective of its layers >>

Labels: , , , , ,

Saturday, August 11, 2007

rescuing linux

is it true?? yaa, at times.. when linux does not tend 2 start, here is a way of getting it rite >>

Labels: , , , , , , , ,

Monday, August 06, 2007

free firewalls

most of these are based on some form of Linux, FreeBSD, or OpenBSD >>

Labels: , , , , , , , , , ,

cheat sheet for unix/linux

divided in2 categories as File Commands, Process Management, File Permissions, SSH, Searching, System Info, Compression, Network, Installation, and Shortcuts >>

Labels: , , , , , , , ,

useful linux commands

i found the commands listed here very useful.. dnt miss the links tht r part of this.. hav a good voyage >>

Labels: , , , , , , , ,