Free Essay

Linux Shortcut

In:

Submitted By mavboyjd
Words 1920
Pages 8
* Reference:
** Basics:
*** Getting help:

# View the manual for target command man command

# Get help with a target command (probably the same as above, but not always): command -h

# In case you forget the name of a command, print possible commands relating to any given word: apropos word

# View index of help pages: info *** Command Line Utilities:
**** Basic File and Directory Operations:
# Print current working directory: pwd # Show files in current directory: ls # Show maximum information about all files, including hidden: ls -a

# Recurse into subdirectories and list those as well: ls -R

# List files by modification time, most recent first. ls -lt

# Move/rename a file or directory (be careful that you don't move the source over a destination with the same name): mv source destination

# Delete target forever (be very careful), use -r recursive flag for directories: rm target

# Copy file or directory: cp source destination

# Mount filesytem: mount /dev/device_name /media/device_name

# Unmount: umount /media/device_name

# Forensically clone filesystems and do other low-level operations on files. Be careful with this one. Can be destructive: dd # Work with disk partitions: parted # Filesystem creation tool: mkfs **** System Administration:

# Execute command as an administrator (can be destructive/insecure. Use only for system administration tasks): sudo command

# Become system administrator: sudo -s

# Quit system administration: exit # Forgot to type sudo in front of a command and already hit enter? Repeat the last command using sudo: sudo !!

***** Installing software from a .tgz (also known as a tarball):

# First, unzip the tarball (see section on tar, below)
# Next, move into unzipped directory: cd software_directory

# Always read README first if it is provided, in case there are any modifications to the procedure outlined below: cat README

# Automatically check for appropriate configurations and generate a MAKE file in the directory:
./configure

# Compile software. May require sudo: make # Move files into their appropriate locations. May also require sudo: make install

# Clean up files in directory, in case make command fails, or just to remove unnecessary cruft: make clean

***** Ubuntu/Debian Software repositories:

# Check distro repositories for software updates: sudo apt-get update

# Download and install updates (update first): sudo apt-get upgrade

# Search for package in the repositories: apt-cache search keyword

# Get more detail on one specific package: apt-cache show package_name

# Download and install a package: sudo apt-get install package_name

# View the output of a command in a more convenient format: command | less

**** Working With Files:

# Print a file in terminal: cat file

# Find files matching filename: locate filename

# See the version of a program or the location of the program which appname

# Search through filename for matches to phrase: grep phrase filename

# Search through output of a command for phrase: command | grep phrase

**** Working With Processes:

# List all running processes: ps -e

# Standard system monitor showing a more extensive view of all processes and system resources: top # Like top, but with a better, cleaner interface: htop # Stop a process from using all system resources and lagging computer: renice process_name

# Kill misbehaving process (use sparingly, last resort, try 'renice' command first): pkill process name

# Start a process in the background command &

# Start a process in the background and have it keep running after you log off nohup command &

**** Compression and Encryption:

# Make a simple compressed backup of files or directories: tar -cvzf backup_output.tgz target_files_or_directories

# Open a compressed .tgz or .tar.gz file: tar -xvf target.tgz

# Encrypt a file: gpg -o outputfilename.gpg -c target_file

# Decrypt a file: gpg -o outputfilename -d target.gpg

# Zip and encrypt a directory simultaneously: gpg-zip -o encrypted_filename.tgz.gpg -c -s file_to_be_encrypted

*** The Bash shell:
**** File Name expansions:
# Current user's home directory:
~/

# Current directory:
./

# Parent directory:
../

# Or even (Two parent directories down):
../../

# All files in target directory. (Be very careful.):
/*

**** Output Redirects:

# Redirect output of one command into the input of another with a pipe: command_1 | command_2

# Or even:

command_1 | command_2 | command_3

# Redirect output to a file: command > file

# Or:

file > file

# Or even, to redirect in a different direction: file < file

# Append output rather than writing over the target file:

file_or_command >> file

# Works like |, but it writes output to both target and terminal: tee target

# Redirect standard output and error to /dev/null, where it is deleted. command > /dev/null 2>&1

**** Controlling Execution:
# Wait until command 1 is finished to execute command 2 command_1 ; command_2

# Or even: command_1 ; command_2 ; command_3

# && acts like ; but only executes command_2 if command_1 indicates that it succeeded without error by returning 0. command_1 && command_2

# || acts like && but only executes command_2 if command_1 indicates an error by returning 1. command_1 || command_2

**** Bash Wildcards:
# Zero or more characters:
*

# Matches "phrase" and any number of trailing characters: phrase* # Matches any incidences of "phrase" with any trailing or leading chars:
*phrase*

# Matches any one char:
?

# Matches any of the characters listed inside brackets:
[chars]

# Matches a range of chars between a-z:
[a-z]

** Advanced:
*** Command Line Utilities, Continued:
**** Networking:

# Configure network interfaces: ifconfig # Configure wireless network interfaces: iwconfig # Connect to a remote server. ssh username@ip_address

# Forward X from target to current machine (Get a remote desktop. Somewhat obscure, but very useful): ssh -X username@ip_address

# Copy files/directory over the network from one machine to another recursively: scp -r source_filename:username@ip_address target_filename:target_username@target_ip_address

# Copy only changes between files or directories (super efficient way to sync directories, works either locally or with remote servers using username@ip_address:optionalport, just like ssh): rsync source target

# Check to see if target is online and responding ping ip_address

# View network route to target: traceroute6 ip_address

# Network Monitor netstat # View firewall rules iptables -L

# Scan this machine(localhost) to check for open ports: nmap localhost

***** wget:

# download a file over http: wget http://example.com/folder/file

# complete a partially downloaded file: wget -c http://example.com/folder/file

# start download in background: wget -b wget -c http://example.com/folder/file

# download a file from ftp server: wget --ftp-user=USER --ftp-password=PASS ftp://example.com/folder/file

***** netcat:

# Listen for input from network on recieving_port, dump it to a file (insecure, but handy): netcat -l recieving_port > file_copied

# Pipe the output of a command to a target ip and port over the network: command | netcat -w number_of_seconds_before_timeout target_ip target_port

# Use tar to compress and output a file as a stream, pipe it to a target ip and port over the network: sudo tar -czf - filename | netcat -w number_of_seconds_before_timeout target_ip target_port

**** Users and Groups:
# Change owner of a file or directory: chown user_name:group_name directory_name

# Change privileges over file or directory (see man page for details.) chmod # Create a new user: adduser # Change user privileges (be very careful with this one): usermod # Delete user deluser # Print groups: groups # Create a new group: groupadd # Change group privileges: groupmod # Delete group: delgroup # Temporarily become a different user: su username

# Print usernames of logged in users: users # Write one line to another user from your terminal: talk # Interactive talk program to talk to other users from terminal (must be installed from repositories.): ytalk **** Working With Files, Continued:
# View what processes are using what files: lsof # View the differences between two files: diff file_1 file_2

# Output the top number_of_lines of file: head -n number_of_lines file

# Like head, but it outputs the last -n lines: tail -n number_of_lines file

# Checksum a file: md5sum file

# Checksum every file in a directory (install this one from repositories.): md5deep directory

# Checksum a file (better algorithm with no hash collisions): sha1sum # Same operation as md5deep, but using sha1: sha1deep # Call command every few number_of_seconds, and highlight difference in output: watch -d -n number_of_seconds command

# Execute command, print how long it took: time command

# View files in directory from largest to smallest: du -a directory | sort -n -r | less

# remove spaces from filenames in current directory: rename -n 's/[\s]/''/g' *

# change capitals to lowercase in filenames in current directory: rename 'y/A-Z/a-z/' *

***** Environment and Hardware:
# print motherboard information dmidecode # Print full date and time: date # Print the hostname of this machine: echo $HOSTNAME

# Print information about current linux distro: lsb_release -a

# Or even:

more /etc/issue

# Print linux kernel version: uname -a

# Print information about kernel modules: lsmod # Configure kernel modules (never do this ;p ): modprobe # View Installed packages: dpkg --get-selections

# Print environment variables: printenv # List hardware connected via PCI ports: lspci # List hardware connected via USB ports: lsusb # Print hardware info stored in BIOS: sudo dmidecode

# Dump captured data off of wireless card: dumpcap # Dump info about keyboard drivers: dumpkeys ***** Ubuntu System Administration, Advanced (Continued):

# Add a Personal Package Archive from Ubuntu Launchpad: add-apt-repository # Install a .deb file from command line: sudo dpkg -i package.deb

**** Python:

# Update pip (Python package manager): pip install -U pip

# search pip repos for a library: pip search library_name

# create a virtual python environment to allow install of many different versions of the same Python modules: virtualenv dirname --no-site-packages

# connect to a virtual python environment source dirname/bin/activate

# disconnect from a virtual python environment: deactivate # install package into virtual python environment from outside: pip install packagename==version_number -E dirname

# export python virtual environment into a shareable format: pip freeze -E dirname > requirements.txt

# import python virtual environment from a requirements.txt file: pip install -E dirname -r requirements.txt

**** git (all commands must be performed in the same directory as .git folder):

# Start a new git project: git init

git config user.name "user_name"

git config user.email "email"

# Make a copy of a git (target can be specified either locally or remotely, via any number of protocols): git clone target

# Commit changes to a git: git commit -m "message"

# Get info on current repository: git status

# Show change log for current repository: git log

# Update git directory from another repository: git pull [target]

# Push branch to other repository: git push [target]

# Create a new branch: git branch [branchname]

# Switch to target branch: git checkout [branchname]

# Delete a branch: git branch -d [branchname]

# Merge two branches: git merge [branchname] [branchname]

# Show all branches of a project: git branch

*** Virtualization:

#clone a virtual machine (this works, it's been tested): vboxmanage clonehd virtual_machine_name.vdi --format VDI ~/target_virtual_machine_name.vdi

#mount a shared virtual folder:
#you need to make sure you have the right kernel modules. You can do this with modprobe, but this package works instead in a ubuntu-specific way.

sudo apt-get install virtualbox-ose-guest-utils

sudo mount -t vboxsf name_of_shared_folder_specified_in_Virtualbox path_of_mountpoint

*** mysql:

# Get help: help # Show databases: show databases;

# Choose a database to use: use database_name_here;

# Show database schema: show tables;

# Delete database:
DROP DATABASE databasename;

# New database:
CREATE DATABASE databasename;

# Create a new user:
CREATE USER username@localhost IDENTIFIED BY 'password';

# Show users: select * from mysql.user;

# Delete a user: delete from mysql.user WHERE User='user_name';

# Give user access to all tables (make them root). the "%" means that they can sign in remotely, from any machine, not just localhost.: grant all privileges on *.* to someusr@"%" identified by 'password';

# give certain privileges to a user on a certain database: grant select,insert,update,delete,create,drop on somedb.* to someusr@"%" identified by 'password';

# Tell mysql to use new user priv policies: flush privileges;

# change user password: use mysql;

update user set password='password'('newpassword') where User='user_name';

# mysql command line args:
# export text file with commands to rebuild all mysql tables: mysqldump databasename > dumpfilename.txt

# restore from a dump: mysql -u username -p < dumpfilename.txt

# dump entire database: mysqldump -u username -p --opt databasename > dumpfile.sql

# restore from entire database dump: mysql -u username -p --database=databasename < dumpfile.sql

Similar Documents

Premium Essay

Bernard Madoff

...want, instead, they have decided to create shortcuts to get to the point where everything come to their hands very easily and they actually get more than they really need and they really want. This is the case of those people who get tired of regular jobs that don’t pay off as they expected, so they start dealing with drugs along the world. These people they don’t even think about how they affect society by bringing the different king=ds of drugs into the market. They don’t even care if they target market in most of the cases are young kids who are not conscious of what they do and start consuming their drugs without knowing that they are destroying their own lives. Another example is a different kind of people who have the opportunity to serve their communities by doing a good job and investing their time by performing well at different scenarios. These people who work for the biggest companies and markets in the world, like people working at Wall Street. They do have the chance to get more comfortable living standards. However, they never end up getting what they really want and also decide to create some other shortcuts in order to get more, even though they have to betray other people’s trust. These people don’t measure the consequences of their acts and most of the times they end up on jail, empty- handed. This was the case of the famous Bernard Madoff, the most famous person in the US, for having created a $50 billion dollars shortcut. The next pages are dedicated to explain...

Words: 357 - Pages: 2

Free Essay

Deep Residual Learning for Image Recognition

...Deep Residual Learning for Image Recognition Kaiming He Xiangyu Zhang Shaoqing Ren Microsoft Research Jian Sun Deeper neural networks are more difficult to train. We present a residual learning framework to ease the training of networks that are substantially deeper than those used previously. We explicitly reformulate the layers as learning residual functions with reference to the layer inputs, instead of learning unreferenced functions. We provide comprehensive empirical evidence showing that these residual networks are easier to optimize, and can gain accuracy from considerably increased depth. On the ImageNet dataset we evaluate residual nets with a depth of up to 152 layers—8× deeper than VGG nets [41] but still having lower complexity. An ensemble of these residual nets achieves 3.57% error on the ImageNet test set. This result won the 1st place on the ILSVRC 2015 classification task. We also present analysis on CIFAR-10 with 100 and 1000 layers. The depth of representations is of central importance for many visual recognition tasks. Solely due to our extremely deep representations, we obtain a 28% relative improvement on the COCO object detection dataset. Deep residual nets are foundations of our submissions to ILSVRC & COCO 2015 competitions1 , where we also won the 1st places on the tasks of ImageNet detection, ImageNet localization, COCO detection, and COCO segmentation. 20 10 56-layer test error (%) 20 Abstract training...

Words: 5761 - Pages: 24

Free Essay

Case Project

...Project Student College Case Project Linux as an operating system is a powerful tool used in businesses for its secure kernel and command line interface. From a small business to a large enterprise, Linux is used to run servers, store vital information and documents. In Outdoor Adventures, this store needs a more efficient computing system. The system will need to keep information available and secure enough to ensure that the information can only be seen by the right people. To help keep things organized, a file structure will also be required to keep all the files with special permissions together for easy access. To better illustrate the security capabilities of Linux Ed Sawicki of Biznix.org said, “The Linux firewall has functionality that rivals expensive commercial firewalls. Its rules allow fine grained control over stateless and stateful packet filtering. The Linux firewall is extensible, allowing new filtering capabilities as the need arises.” This comparison is powerful when considering what would be the most cost effective direction for a business, but also the safest. Another advantage of linux is that it is generally free to try before applying it to a commercial setting. The product can in effect speak for its self by allowing itself to be made publicly available so there is no need to consider it a “business risk” when a technician can experiment with it first before applying it on a much grander scale. “Linux…is a freely available multitasking and multiuser...

Words: 1333 - Pages: 6

Premium Essay

Apply Hardening Security for Linux

...configuring services, what Linux directory typically contains server configuration files? cn=config is the is the subtree location where the default configuration is stored as a series of LDAP entries. 2. What command disables remote access to the MySQL Database? Is this a security hardening best practice? Remote access is disabled by default. Hardening security is recommended by installing the whole security package: Antivirus and Antispam, Firewall, and all of the security packages recommended by your operating system. 3. What is a Linux runlevel for a specific service or application? What command allows you to define the runlevel for a service or application? Runlevel 0 = halt Runlevel 1 = Single user mode Runlevel 2 = Basic multi-user mode (without networking)/User defineable Runlevel 3 = Full (text based) multi-user mode/Mulit-user mode Runlevel 4 = Not used Runlevel 5 = Full (GUI based) multi-user mode/Full multi-user mode Runlevel 6 = reboot /etc/rc.d 4. What is the Apache Web Server? Review the /etc/httpd/conf/httpd.conf configuration file, and point out a setting that could enhance security. The worlds most popular Web server. mod_reqtimeout.c = Set timeout and minimum data rate for receiving requests/set this to RequestReadTimeout header=10 body=30 (Allow 10 seconds to receive the request including the headers and 30 seconds for receiving the request body) 5. OpenSSH is the de facto method to remotely access Linux systems. Explain why the use...

Words: 393 - Pages: 2

Free Essay

It250

...Chapter One (History of Linux): The history of Linux begins not with the release of Linux in 1991 but with the creation of GNU (which stands for Gnu’s not UNIX). This started with the purpose of creating a free OS to anyone who wanted with. By 1991 everything was complete except for the kernel which Linus Torvalds provided. The Code was free, this dated to back to when UNIX was released to Universities for a low cost and that way its students would be familiar with it and it would slowly permeate the marketplace once those students got out of the schoolhouse and made their way up the ladder of business. Some of the best things about Linux is the fact that is has a large selection of applications written for it that range from word processing to graphical tools to security administration software. It provides a wide range of peripherals and easy to install software. It works on a variety of platforms as well with a variety of hardware which allows it to be extremely portable. Another big key in this development is the creation of UNIX in B programming language which gave rise to C, C++ and Objective C. Linux has the shells to be able to interpret command language and programming language. GUI allows people to customize the desktop environment to suit their needs or tastes. Chapter Two and Three (Installation and Step by Step Installation): In the installation of Linux there are many different mediums to install it from. You can install it form a Live CD, An install...

Words: 539 - Pages: 3

Premium Essay

Homework Assignment 2.1

...users have the freedom to distribute and change. 2. Describe the relationship between Linux and the GNU Project.  Linux is the kernel: the program in the system that allocates the machine's resources to the other programs that you run. The kernel is an essential part of an operating system, but useless by itself; it can only function in the context of a complete operating system. Linux is normally used in combination with the GNU operating system: the whole system is basically GNU with Linux added, or GNU/Linux. All the so-called “Linux” distributions are really distributions of GNU/Linux. 3. List and describe in detail four advantages of Linux. Applications – Linux is both free and commercial as well as a wide variety of tools: graphical, word processing, networking, security administration, Web server and many others. Flexibility - Linux can be used for high performance server applications, desktop applications, and embedded systems. You can save disk space by only installing the components needed for a particular use. You can restrict the use of specific computers by installing for example only selected office applications instead of the whole suite. Performance - Linux provides persistent high performance on workstations and on networks. It can handle unusually large numbers of users simultaneously, and can make old computers sufficiently responsive to be useful again. Stability - Linux doesn’t need to be rebooted periodically to maintain performance levels. It doesn’t...

Words: 1165 - Pages: 5

Premium Essay

Nt1310 Unit 3 Assignment 1

...You can open it from the Start menu, you can open it from the desktop or the File Explorer, you can search for it from the search bar and then open it, or you can pin it to the taskbar and open it from there. However, that isn’t enough… Or so Microsoft thought. Especially for the keyboard-pro people who prefer to do every task with the keyboard and rely extremely heavily on keyboard shortcuts, Microsoft has provided a useful feature which prevents them from lifting their fingers from the keyboard and bringing them to the touchpad in order to open up a program. Now, you can define keyboard shortcuts for programs. In all fairness, this feature was available in previous versions of Windows. But this has always been a very less-known feature, so if you didn't know about it before, here's how you go about it: Open the Properties of the program. Normally, this would mean that if it's a desktop app, you would have to locate it in the directory in which it is installed, which might result in a lot of searching – an easier way would be to go to the app from the Start menu, right-click it and select ‘Open File...

Words: 1354 - Pages: 6

Premium Essay

Accounting

...Efficiency Improvements To improve your efficiency, it is helpful to know and use keyboard shortcuts. These allow you to use Excel much more quickly than by using a mouse. The following is a list of commonly used functions in Excel that you are expected to memorize. We encourage you to practice these shortcut keys, and if you do not understand a shortcut description to look it up via the Internet to learn more about how it works. These shortcuts will be tested on future quizzes and exams. For those interested, additional shortcuts can be found at http://office.microsoft.com/en-us/excelhelp/excel-shortcut-and-function-keys-HP001111659.aspx (these will not be tested). Code CTRL+( CTRL+) CTRL+9 CTRL+0 CTRL+A Description Unhides any hidden rows within the selection. Unhides any hidden columns within the selection. Hides the selected rows. Hides the selected columns. Selects the entire worksheet. If the worksheet contains data, CTRL+A selects the current region. Pressing CTRL+A a second time selects the entire worksheet. Applies or removes bold formatting. Copies the selected cells. Uses the Fill Down command to copy the contents and format of the topmost cell of a selected range into the cells below. Displays the Find dialog box. Applies or removes italic formatting. Creates a new, blank file. Displays the Print dialog box. Saves the active file with its current file name, location, and file format. Applies or removes underlining. Inserts the contents of the Clipboard at the insertion...

Words: 627 - Pages: 3

Free Essay

Accounting Information System Questions

...1. Your department is developing its own set of marketing applications. In a meeting, a member of the department asks whether a menu can be set up in the GNOME desktop for easy access to the new applications.What is your response? a. A menu can be set up and launched from a Panel in GNOME. b. A menu can be set up only through use of third-party software called CUSTOMIZE. c. Menus are run by default from the Start menu on the bottom Panel. d. GNOME does not support the setup of custom menus and so you recommend using KDE, which does. 11 2. Once in a while after your system has been improperly shut down, such as during a power outage, it reboots into the command line. After you log in, what command can you use to start XWindow and your desktop? a. gui b. xwin c. startx d. run gui 3. You want to delete several old files in your home directory.Which of the following is a good tool to use for this purpose in GNOME? a. Nautilus b. System Tray c. My Computer d. GNUFile 4. Which of the following is a good tool to use for finding and deleting files in KDE? (Choose all that apply.) a. KFiler b. Kabinet c. Knop d. Konqueror 5. Which of the following areWindow Managers that can be used with XWindow? (Choose all that apply.) a. fvwm b. sawfish c. kwm d. Window Maker 6. A new inventory specialist in your company inherited a computer that has KDE installed, but the operating system boots into the command line instead of starting KDE automatically.What can the inventory specialist do to have...

Words: 1397 - Pages: 6

Free Essay

Securing Linux Lab Assignment

...lab it is recommended that you review the Demo Lab presentations in the Unit 5 and Unit 6 Learning Space. Click the PRACTICE link > DEMO LAB > then click the hyperlink to launch the demonstration. Part #1 Apply Hardened Security for Linux Services & Applications Learning Objectives and Outcomes Upon completing this lab, students will learn about the following tasks: * Harden Linux server services when enabling and installing them, and keep a security perspective during configuration * Create an Apache Web Server installation and perform basic security configurations to assure that the system has been hardened before hosting a web site * Configure and perform basic security for a MySQL database, understanding the ramifications of a default installation and recommending hardening steps for the database instance * Install, setup and perform basic security configuration for Sendmail to be able to leverage the built-in messaging capabilities of the Linux System * Enable and implement secure SSH for encrypted remote access over the network or across the Internet of a Linux server system Overview This lab is an extension of the previous hands-on labs, and it incorporates security hardening for Linux services and applications loaded in the physical server. This demonstration will configure security and hardened services and applications to ensure C-I-A of these services. It will take the steps to configure and secure an Apache web server and...

Words: 2020 - Pages: 9

Free Essay

Linux

...University of Sunderland School of Computing and Technology File Management System in Linux CUI Interface A Project Dissertation submitted in partial fulfillment of the Regulations governing the award of the degree of BA in Computer Studies, University of Sunderland 2006 I. Abstract This dissertation details a project to design and produce a prototype Linux character environment file manipulation assisting application. The application is offering a friendly menu driven interface to handle the jobs that non-programmers keep finding cumbersome to master when it comes to working in a Unix/Linux interface, resulting in serious mistakes and much loss of productive time. The Linux File Management System is a basic program for every user at a Unix/Linux terminal. Advantages here include the fact that the support team does not have to be burdened with solving simple file based queries by the employees. The areas of Designing GUI interfaces in Linux and Windows versus Linux Security were researched and a prototype has been designed, developed and tested. An evaluation of the overall success of the project has been conducted and recommendations for future work are also given. Words II. Table of Contents 1) Introduction.................................................................................................................................4 1.1 Overview.................................

Words: 17681 - Pages: 71

Free Essay

Blah

...……………………………………………………………………………………………………………………………………. 4 Journal Post (8/17) ……………………………………………………………………………………………………………………………… 13 Chapter 1 Questions …………………………………………………………………………………………………………………………… 14 Journal Post (8/24) ……………………………………………………………………………………………………………………………… 16 Chapter 2 Questions ……………………………………………………………………………………………………………………………. 17 Journal Post (9/7) ………………………………………………………………………………………………………………………………… 18 Chapter 3 Questions ……………………………………………………………………………………………………………………………. 19 Journal Post (9/12) ……………………………………………………………………………………………………………………………… 20 Chapter 4 Questions …………………………………………………………………………………………………………………………… 21 Chapter 5 Questions …………………………………………………………………………………………………………………………… 23 NOS 120 Test 2 …………………………………………………………………………………………………………………………………… 24 Linux File System vs. Windows File System …………………………………………………………………………………………. 27 Journal Post (9/14) ……………………………………………………………………………………………………………………………… 28 10.04 Sources List ………………………………………………………………………………………………………………………………. 29 Things to do after installing Ubuntu 10.04 …………………………………………………………………………………………. 37 Journal Post (9/21) …………………………………………………………………………………………………………………………….. 45 How to make Ubuntu look like a Mac ………………………………………………………………………………………………… 46 Journal Post (9/28) …………………………………………………………………………………………………………………………….. 50 Journal Post (10/6)...

Words: 17866 - Pages: 72

Free Essay

Linux System Programming

...LINUX System Programming Other Linux resources from O’Reilly Related titles Building Embedded Linux Systems Designing Embedded Hardware Linux Device Drivers Linux Kernel in a Nutshell Programming Embedded Systems Running Linux Understanding Linux Network Internals Understanding the Linux Kernel Linux Books Resource Center linux.oreilly.com is a complete catalog of O’Reilly’s books on Linux and Unix and related technologies, including sample chapters and code examples. ONLamp.com is the premier site for the open source web platform: Linux, Apache, MySQL and either Perl, Python, or PHP. Conferences O’Reilly brings diverse innovators together to nurture the ideas that spark revolutionary industries. We specialize in documenting the latest tools and systems, translating the innovator’s knowledge into useful skills for those in the trenches. Visit conferences.oreilly.com for our upcoming events. Safari Bookshelf (safari.oreilly.com) is the premier online reference library for programmers and IT professionals. Conduct searches across more than 1,000 books. Subscribers can zero in on answers to time-critical questions in a matter of seconds. Read the books on your Bookshelf from cover to cover or simply flip to the page you need. Try it today for free. LINUX System Programming Robert Love Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo Linux System Programming by Robert Love Copyright...

Words: 125679 - Pages: 503

Premium Essay

Microsoft Server 1 Lab 6.1

...What is the average value of processor queue length on the W2kzzcomputer? 0.700 6.What subheading are available in the system stability report selection? Software unitalls, application failure, hardware failure, windows and miscellaneous 7.Waht logs are available by default? Application,security,setup,system and forward event 8.What is most recent Event id logged to the Application log? Application,security,setup,system,forward events 9.What is the most recent Event ID logged to security log? 4634 10.What is most recent event id logged to setup log? 1610 11. What is most recent event id logged to system log? 7036 12.How many events are displayed in this custom view? 52 13.What is the keyboard shortcut to begin a network capture? F5 14.What appears in the Capture Filter pane? 15.Does anything appear in the Network Conversations pane? no 16.Does anything appear in the Network Conversations pane? All traffic,my traffic, 17.Where will WSUS downloads be stored by default? (c:/wsus) 18.What database does WSUS use by Default? MSDE 19.What types of updates does WSUS download by default? Automatic updates 20.What nodes are available under the W2K40 node?...

Words: 260 - Pages: 2

Free Essay

Excel Short Keys

...Ctrl+Z Undo Ctrl+C Enter, Ctrl+V Ctrl+X Copy, Paste, Multiple Paste, Cut Ctrl+F, Ctrl+H Find, Find&Replace Ctrl+P, Ctrl+S, Ctrl+F4, Alt+F4 Print, Save, Close, Close Excel Ctrl+Arrow Move to edge of region Ctrl+* Select current region Ctrl+A Select all cells Ctrl+Home Ctrl+End Select A1, Select last cell in used range Ctrl+Shift+End Select from active cell to last cell in used range. Ctrl+Shift+Home Select from active cell to A1 Ctrl+Page Down Ctrl+Page Up Move to the next sheet, Move to the previous sheet Ctrl+Tab Move to next open workbook Ctrl+N Open new workbook Shift+F11 Insert new worksheet Shift+F3 Paste function window =+FunctionName+Ctrl+A Insert new function Alt+F11 Open VBE Ctrl+Shift+Enter Array formula Ctrl+F3, F3 Define name, Paste name Ctrl+Spacebar Shift+Spacebar Select columns, Select rows Ctrl+1, Ctrl+B, Ctrl+U Format cells, Bold, Underline Ctrl+; , Ctrl+shift+: Current date, Current time | | | | |Rate this tip | |  RATING: | |Email Tip | |Top of Form | |2.96 | | | | ...

Words: 1257 - Pages: 6