The primary function of the Unix tar command is to create backups. It is used to create a ‘tape archive’ of a directory tree, that could be backed up and restored from a tape-based storage device. The term ‘tar’ also refers to the file format of the resulting archive file. Table...
To modify and rebuild the kernel, copy the generic configuration file to a new name and edit it as needed (you can also edit the fileGENERICdirectly). To restart the build after an interruption, add the optionNO_CLEAN=YESto the make command to avoid cleaning the objects already build. # ...
To install the Configuration Manager Client on Linux and UNIX servers Copy theinstallscript and the client installation .tar file to a folder on the RHEL 5 x64 based computer. On the RHEL5 computer, run the following command to enable the script to run as a program:chmod +x install ...
sed, pr, and tr, batch processing tools such as at, cron, and batch, as well as job control tools like ps, nice, kill, and so on. They're all there and they work exactly as you would expect. Even the man command is just as ugly (but infinitely useful) as it's always been. ...
Create a new certificate with the desired host name. To change the name on the certificate: If the certificate was created with an incorrect name, you can change the host name and re-create the certificate and private key. To do this, run the following command on the UNIX or Linux comp...
14. cd command examples Use “cd -” to toggle between the last two directories Use “shopt -s cdspell” to automatically correct mistyped directory names on cd More cd examples: 6 Awesome Linux cd command Hacks 15. gzip command examples To create a *.gz compressed file: $ gzip test.tx...
Create and view interactive cheatsheets on the command-line. tldr A community effort to simplifymanpages with practical examples. bottom Yet another cross-platform graphical process/system monitor. glances Glances an Eye on your system. Atop/htopalternative for GNU/Linux, BSD, Mac OS and Windows ...
Security note: as shell.exec() executes an arbitrary string in the system shell, it is critical to properly sanitize user input to avoid command injection. For more context, consult the Security Guidelines.find(path [, path ...])find(path_array)Examples:...
This hierarchical arrangement is used to manage processes within applications.The Win32 subsystem does not use a process hierarchy.However, Interix does maintain a process hierarchy, and even tracks the parent-child relationship of Win32 processes on the same system. The Interix command ps-efi ...
ar — Create or maintain library archives as — Use the HLASM assembler to produce object files asa — Interpret ASA/FORTRAN carriage control at — Run a command at a specified time autoload — Indicate function name not defined automount — Configure the automount facility awk — Proc...