Quick Summary of Basic and Common Linux Commands

There are many commands that are used in linux on a daily basis, ones that everyone should know just to get by. Like back in the days of DOS, you had to know how to work with the command line and how to navigate around. Learning new commands is always hard, especially when there are so many new ones that don't always seem to make sense in their names.

cd

Change directory - this command is essential for traversing folders and moving about your linux computer. Its quite straight forward, cd /where/you/want/togo or cd .. to go up a level. It's pretty basic, but be aware of absolute and relative paths. If you are currently in the folder /home/puppy/pictures then you can type cd .. to move up to /home/puppy/ or you could type cd /home/puppy/ not to mention cd ~/puppy/. You must learn how to traverse folders effectively before you can use the operating system.

ls

The ls command gives you a directory listing. This command has many options, but basically provides you with the same information as the "dir" command in DOS. The most common use of ls is probably "ls -la" infact many people have an alias setup, so whenever they type "ls" it actually runs "ls -la".

du

The disk usage command gives you a summary of how much space a program or some piece of data is using. Normally this command uses the -h feature, which simply means it will tell you if the number it gives you is in bytes, kilobytes, etc. -h gives you the human readable output.

mv

Move! The mv command is the move command, but it is far more powerful than the old DOS commands. You must be very careful when using the mv command, if you tell it to move a program to a new location, it will overwrite the stuff that was there, if the same file name exists. In addition the mv command is also the rename command! If I type: mv file1 file2 I just moved or effectively renamed file1 to file2!

date

The date command displays the current date and time of your server to the screen, and can be formatted in many ways, but date by itself will display something similar to: Sat Apr 30 23:58:41 EDT 2005

cp

The copy command is a great program, and is very powerful. Often used with the -R (recursive) option, it can be used to copy single files, or entire paths around with ease.

rmdir

Remove directory is a command that I personally don't use very often. To remove a directory it must be empty, rarely do I take the time to empty a directory before I delete it. Instead I use a variation of the rm command.

rm

This is the mother of all linux commands. Remove. You must always be very careful when you use this program. There aren't too many options with this program, its quite straight forward, you use it to delete things. -R is recursive and -f is force. If you want to clear a big folder and you are 100% sure you want it gone in a hurry, type: rm -Rf /directoryname

chgrp

Change group - this command is used to change the group ownership on a file. For the most part this is more of an administrative thing, and end users don't typically have to worry too often about this. You must know about the design of the linux file system before you worry about the chgrp command.

chown

Change owner - this command very similar to the chgrp command, and changes the owner instead of the group. Again you must really understand the design of the linux file system before this becomes really important. File ownership is an important part of security and permissions in linux.

mkdir

Make directory - this is a very straight forward command in linux, easy to use, just mkdir newfoldername

vi

This is a text editor in linux, its extremely powerful, but not exactly user friendly. I highly suggest that you take the time to learn this program, or at least the most common features. If you want to play with this program, you might get stuck inside it, remember these words. Escape, Colon, q, ! ( escape key, :q! ) That gets you out of interactive or insert mode, then gets you to the menu, then quit without saving!

su

Switch user - the su command lets you login from your account to another account. If you are root, you can type su - username and jump to any account without a password. If you are a normal user account and want to go to root then type su - root. If you do not put the hyphen then you will not use that users environment. Generally if you are logging in as a user it's a good idea to be in their working environment!

pwd

Print working directory - this command gives you the current directory you are working in.

$ pwd - me running command

/home/username/my_pics - this is the output from that command

As I mentioned earlier, there are so many different commands to learn, it really just takes time and effort to play with them and learn their options. The manual (MAN) pages in linux are really great and full of information. Many of the most common commands are located in the /bin folder, check it out!

Ken Dennis http://kendennis-rss.homeip.net/

no-contract cleaning service Morton Grove ..
In The News:

Chrome faces its sixth zero-day attack in 2025 as Google patches critical V8 engine flaw CVE-2025-10585 discovered by Threat Analysis Group.
The Hypershell X Ultra exoskeleton features 12 terrain modes and carbon fiber construction to enhance hiking, cycling and outdoor adventures.
Personal data from public records and data brokers helps scammers create tailored scam stories, making their calls and emails more believable to potential victims.
Uber Eats partners with drone delivery startup Flytrex to test autonomous food delivery services in U.S. markets, marking the company's first investment in drone technology.
OpenAI announces 120-day plan to strengthen ChatGPT safeguards for teens, including parental controls and expert council on AI wellbeing.
Spam emails can help improve security — if reported correctly. Learn how to report spam across major email services and get key tips to protect your inbox and personal data.
Harvard researcher Avi Loeb says comet 3I/ATLAS weighs 33 billion tons and spans 3.1 miles, making it far larger than previous interstellar visitors.
The Glassboro Public School District in New Jersey has partnered with ZeroEyes and InformaCast to detect visible firearms and alert staff and law enforcement within seconds.
Hackers use fake Google search results to trick users into downloading lookalike apps laced with malware that have been pushed to the top.
Generative A.I. has lowered barriers for sophisticated cyberattacks as hackers exploit ChatGPT and other tools to forge documents and identities.
IOS 26's new features include bigger lock screen clocks, dirty lens alerts, and improved spam detection for iPhones.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Sophisticated phishing scams now exploit Apple's iCloud Calendar invite system to bypass spam filters and trick users into calling fake support numbers.
Complete guide to medication tracking apps for iPhone and Android users, featuring built-in Health apps, MediSafe, MyTherapy, and smart pill dispensers.
Alef Aeronautics plans to begin production of its electric flying car Model A by late 2025, following FAA approval for limited testing at five airport locations.
Five common overpayment scams use fake checks and third-party payment requests to steal money from unsuspecting victims across various scenarios.
The Robeta Ananya luxury camper van features a full living room, ceiling bed, washer-dryer, and complete kitchen starting at $295,000 for the limited Founders' Edition.
Scammers exploit retirees' trust and assets through fake debt collection calls, but proper verification methods and reporting can stop these fraudulent schemes.
Social media scams are rising as fraudsters create fake accounts and buy verification badges to deceive users, but these simple safety steps can protect you.
The new groundbreaking Paris Solar-Battery Park in Wisconsin provides renewable energy day and night by capturing excess energy from its solar panels.
Travelers face increased risks from fake Wi-Fi networks at airports and on flights as attackers exploit growing reliance on in-flight internet for entertainment and services.
Older Android phones, tablets and car systems will lose access to new Waze features as the app drops support for Android versions below 10.
Research shows iPhone owners' overconfidence in Apple security makes them easier targets for cybercriminals compared to Android users who take more precautions.
Five key tech terms reshaping online shopping from mobile payments and instant delivery to social media commerce and inventory-free retail models.
AI browsers from Microsoft, OpenAI and Perplexity can fall for scams faster than humans, completing fraudulent purchases and clicking malicious links without verification.

Making The Decision To Automate Your Software Testing

Not every software testing project can or should be automated.... Read More

Online PowerPoint Presentation ? Convert PowerPoint to Flash

Although we don't know whether Microsoft ever envisioned such a... Read More

Preventive Maintenance Software Companies

Several software companies design programs for preventive maintenance. Most of... Read More

Microsoft Great Plains implementation: Restaurants Supply Chain Management Example

Microsoft Great Plains serves majority of US based horizontal and... Read More

Microsoft CRM Customization

Microsoft CRM customization techniques are very diversified and based on... Read More

What is Groupware?

Vince Lombardi once said that, "The achievements of an organization... Read More

Navision Attain C/ODBC Crystal Report ? Customization Example

Microsoft Business Solutions Navision is main ERP application for European,... Read More

Screenshots Vista Windows

Features Additionally, Vista will include many other new features.Aero Vista... Read More

Most Dangerous Types of Spyware are on the Rise: How to Choose the Weapon

Bad News - the Threat is Bigger than it SeemedHow... Read More

Are You Waiting for Microsoft Longhorn Operating System

I love new technology. I am still ready to wait... Read More

RFID: Strengthen the Position for SAP; United States

SAP Inc., a global leader in client/server enterprise application software... Read More

Windows x: Basic Windows ?Security? Issues

Language development computer: Computer-based method for aiding language development seems... Read More

Microsoft Great Plains Customization Tools ? Overview

Former Great Plains Software Dynamics/eEnterprise, and currently Microsoft Business Solutions... Read More

Selecting Microsoft Great Plains Partner/VAR/Reseller: ERP Implementation & Customization ? Overview

In the case when you represent mid-size or mid-size-to-large business,... Read More

Algebra Help Software

Need help making sense of algebra? Have algebra lectures in... Read More

C++ Function Templates

C++ Function templates are those functions which can handle different... Read More

Running a Program on a Remote Server Using SSH

How do you run a program on a remote server... Read More

IT Department Skills to Support Microsoft Great Plains and Microsoft CRM

Microsoft Great Plains as ERP and Microsoft CRM as... Read More

Fast Car Knoppix

Small can be beautiful! Working with Knoppix for the past... Read More

ERP for Large Corporation ? New Selling Strategy

Our opinion is based on our Microsoft Business Solutions Great... Read More

Groove Network. Are you in it?

If you are in a business that passes documents around... Read More

Microsoft Great Plains Upgrade ? Version 8.0 Overview for IT Director/Controller

If you have Microsoft Great Plains as main accounting and... Read More

Reporting Tools for Microsoft Great Plains ? Overview For Developers

Looks like Microsoft Great Plains becomes more and more popular,... Read More

What is Spyware? Are You Being Watched?

Find out why Spyware Removal from computers is important and... Read More

SyncUp ? A File/Folder Synchronizer For Windows

SyncUp, a file synchronizer is designed to assist the home... Read More

luxury cleaning services Des Plaines ..