Quick Summary of Basic and Common Linux Commands

There are many commands that are used in linux on a daily basis, ones that everyone should know just to get by. Like back in the days of DOS, you had to know how to work with the command line and how to navigate around. Learning new commands is always hard, especially when there are so many new ones that don't always seem to make sense in their names.

cd

Change directory - this command is essential for traversing folders and moving about your linux computer. Its quite straight forward, cd /where/you/want/togo or cd .. to go up a level. It's pretty basic, but be aware of absolute and relative paths. If you are currently in the folder /home/puppy/pictures then you can type cd .. to move up to /home/puppy/ or you could type cd /home/puppy/ not to mention cd ~/puppy/. You must learn how to traverse folders effectively before you can use the operating system.

ls

The ls command gives you a directory listing. This command has many options, but basically provides you with the same information as the "dir" command in DOS. The most common use of ls is probably "ls -la" infact many people have an alias setup, so whenever they type "ls" it actually runs "ls -la".

du

The disk usage command gives you a summary of how much space a program or some piece of data is using. Normally this command uses the -h feature, which simply means it will tell you if the number it gives you is in bytes, kilobytes, etc. -h gives you the human readable output.

mv

Move! The mv command is the move command, but it is far more powerful than the old DOS commands. You must be very careful when using the mv command, if you tell it to move a program to a new location, it will overwrite the stuff that was there, if the same file name exists. In addition the mv command is also the rename command! If I type: mv file1 file2 I just moved or effectively renamed file1 to file2!

date

The date command displays the current date and time of your server to the screen, and can be formatted in many ways, but date by itself will display something similar to: Sat Apr 30 23:58:41 EDT 2005

cp

The copy command is a great program, and is very powerful. Often used with the -R (recursive) option, it can be used to copy single files, or entire paths around with ease.

rmdir

Remove directory is a command that I personally don't use very often. To remove a directory it must be empty, rarely do I take the time to empty a directory before I delete it. Instead I use a variation of the rm command.

rm

This is the mother of all linux commands. Remove. You must always be very careful when you use this program. There aren't too many options with this program, its quite straight forward, you use it to delete things. -R is recursive and -f is force. If you want to clear a big folder and you are 100% sure you want it gone in a hurry, type: rm -Rf /directoryname

chgrp

Change group - this command is used to change the group ownership on a file. For the most part this is more of an administrative thing, and end users don't typically have to worry too often about this. You must know about the design of the linux file system before you worry about the chgrp command.

chown

Change owner - this command very similar to the chgrp command, and changes the owner instead of the group. Again you must really understand the design of the linux file system before this becomes really important. File ownership is an important part of security and permissions in linux.

mkdir

Make directory - this is a very straight forward command in linux, easy to use, just mkdir newfoldername

vi

This is a text editor in linux, its extremely powerful, but not exactly user friendly. I highly suggest that you take the time to learn this program, or at least the most common features. If you want to play with this program, you might get stuck inside it, remember these words. Escape, Colon, q, ! ( escape key, :q! ) That gets you out of interactive or insert mode, then gets you to the menu, then quit without saving!

su

Switch user - the su command lets you login from your account to another account. If you are root, you can type su - username and jump to any account without a password. If you are a normal user account and want to go to root then type su - root. If you do not put the hyphen then you will not use that users environment. Generally if you are logging in as a user it's a good idea to be in their working environment!

pwd

Print working directory - this command gives you the current directory you are working in.

$ pwd - me running command

/home/username/my_pics - this is the output from that command

As I mentioned earlier, there are so many different commands to learn, it really just takes time and effort to play with them and learn their options. The manual (MAN) pages in linux are really great and full of information. Many of the most common commands are located in the /bin folder, check it out!

Ken Dennis http://kendennis-rss.homeip.net/

housekeepers near Des Plaines ..
In The News:

Sora 2, OpenAI's new video-generation app, can create AI-generated videos based on a singular prompt. The results are both mind-blowing and terrifying.
iPhone and Android users can reduce Wi-Fi calling battery drainage through settings adjustments, background app limits and stronger Wi-Fi connections.
Work email scams are becoming harder to detect as criminals use AI and spoofed addresses to trick employees into opening malicious attachments and links.
From her Arizona living room, Christina Chapman ran a covert hub that helped North Korean operatives infiltrate U.S. firms, netting $17 million in stolen salaries.
UC Santa Barbara researchers developed a soft robotic intubation system that achieved 100% success rates for experts and 96% for paramedics with minimal training.
Scammers exploit probate filings to target grieving families with fake fees and debts, Kurt "Cyberguy" Knutsson reports.
Automotive giant Stellantis becomes latest victim of widespread Salesforce breaches affecting companies like Google, Cisco and Adidas this year.
A woman from Washington reunited with her missing Maine Coon cat Louie after 11 days using Love Lost, a free AI-powered pet recovery platform.
Expert cybersecurity tips help Mac owners remove malware infections and strengthen defenses with antivirus software, password managers and system updates.
Meta's AI chatbot training rules bans sexual roleplay with minors and block access to child abuse material as regulators scrutinize its safety measures.
Online banking users face a new threat: web injection scams that overlay fake pop-ups to steal logins. Here’s how to spot them and protect your accounts.
Meta introduced Teen Accounts to Facebook and Messenger while launching a School Partnership Program for U.S. educators to report bullying within 48 hours.
Executive order signed by President Donald Trump tasks Robert F. Kennedy Jr.'s MAHA Commission with using AI to find new cures for childhood cancers.
New FileFix attack tricks Facebook and Instagram users into running malicious PowerShell commands disguised as Meta account maintenance to deploy StealC infostealer.
Step-by-step instructions help users migrate to Windows 11 while preserving emails, contacts, documents, and software licenses during the transition.
Chrome faces its sixth zero-day attack in 2025 as Google patches critical V8 engine flaw CVE-2025-10585 discovered by Threat Analysis Group.
The Hypershell X Ultra exoskeleton features 12 terrain modes and carbon fiber construction to enhance hiking, cycling and outdoor adventures.
Personal data from public records and data brokers helps scammers create tailored scam stories, making their calls and emails more believable to potential victims.
Uber Eats partners with drone delivery startup Flytrex to test autonomous food delivery services in U.S. markets, marking the company's first investment in drone technology.
OpenAI announces 120-day plan to strengthen ChatGPT safeguards for teens, including parental controls and expert council on AI wellbeing.
Spam emails can help improve security — if reported correctly. Learn how to report spam across major email services and get key tips to protect your inbox and personal data.
Harvard researcher Avi Loeb says comet 3I/ATLAS weighs 33 billion tons and spans 3.1 miles, making it far larger than previous interstellar visitors.
The Glassboro Public School District in New Jersey has partnered with ZeroEyes and InformaCast to detect visible firearms and alert staff and law enforcement within seconds.
Hackers use fake Google search results to trick users into downloading lookalike apps laced with malware that have been pushed to the top.
Generative A.I. has lowered barriers for sophisticated cyberattacks as hackers exploit ChatGPT and other tools to forge documents and identities.

Microsoft Great Plains: Manufacturing or Bill of Materials - Overview for IT Specialist

Microsoft Great Plains is main Microsoft Business Solutions product, targeted... Read More

What is Software Piracy?

There are several kinds of software piracy. The bottom line... Read More

Software Automation Helps Increase your Bottom Line

When you own a small business, time is money. And... Read More

Microsoft Great Plains Upgrade ? Things to Consider and FAQ

If you have Microsoft Great Plains and support it for... Read More

Google Brings the Earth to Your Desktop

Google Inc. has launched a new software package that allows... Read More

Lotus Notes Domino and Web: Application Development ? Tips for Programmers

Beginning with Domino version R4 it has integration with the... Read More

Great Plains Dexterity: Customizations & Source Code Programming

Great Plains Software Dynamics, Dynamics C/S+, eEnterprise were written on... Read More

Tools for Customizing Great Plains

Microsoft Business Solutions ? Great Plains has captured the US... Read More

Crystal Reports For Microsoft Navision - Overview For Programmer/IT Specialist

Let us give you - developer some hints in the... Read More

Navision Attain Database access via C/ODBC in ASP.NET Application

Navision Software was purchased by Microsoft and now it is... Read More

An Introduction to .NET Framework

.Net Framework is a platform or development environment to seamlessly... Read More

IT Strategy for Large Corporation: ERP/MRP/CRM, Unix/Linux/Windows, Microsoft/Java

Combining Microsoft Business Solutions Great Plains ERP with non-Microsoft Business... Read More

Three Steps To Windows Safety Heaven

Now there are Three Steps To Heaven Just listen and... Read More

Microsoft Great Plains Furniture & Fixtures ? Implementation & Customization Highlights

Microsoft Great Plains, former Great Plains Software Dynamics / eEnterprise... Read More

15 Questions to Ask Your Software Vendor

When making a decision to buy any piece of software... Read More

Device Driver Basics

Most people understand that the "hardware" part of their computer... Read More

HelpDesk & Asset Management Software - Choosing The Right One

If you are to buy a HelpDesk & Asset Management... Read More

Microsoft Great Plains Installation ? Overview for IT Director/Controller

Microsoft Great Plains is main mid-market application from Microsoft Business... Read More

How to Evaluate Staffing Software

If you are in the market for new staffing software,... Read More

Does your Company have Documentum?

Are you lost in the mess of documents that get... Read More

The Software 2005 Conference - A Review

The Software 2005 conference is now a wrap. This conference,... Read More

Microsoft Navision and Crystal Reports - An Overview

Microsoft Business Solutions ? Navision is an integrated solution for... Read More

Is Software Tester a Most Infamous Person in a Software Project Team?

The fact that a software tester is a most infamous... Read More

What You Must Know About Spyware Right Now

Spyware is like the new technological nuclear weapon on the... Read More

Groove Network. Are you in it?

If you are in a business that passes documents around... Read More

custom home cleaning Glenview ..