Assignment ON Networking
Assignment ON Networking
Assignment ON Networking
ON
NETWORKING
TOPIC:LINEX COMMANDS
SUBMITED TO : SUBMITED BY :
SHIRON KURIAN ANANTHU A NAIR
18PMC212
INTRODUCTION
Linux is a UNIX-base operating system. Its original creator was a Finnish student named Linus
Torvalds, although being ‘open source’ it has changed a great deal since its original conception.
It belongs to nobody and is free to download and use. Any changes to it are open for all to
adopt, and as a result, it has developed into a very powerful OS that is rapidly gaining in
popularity worldwide, particularly among those seeking an alternative to Windows.
In 1991, hardware was expanding rapidly, and DOS was the king of operating systems.
Software development was slower, and Macs, while better, were also much pricier than PCs.
UNIX was growing, but at that time in its history, the source code was jealously guarded and
expensive to use. Linus Torvalds was a Helsinki university student who liked playing around with
software and computers, and in 1991 he announced the creation of a new core operating
system that he had named Linux. It is now one of the most used systems for the PC and is
particularly suitable for businesses with small IT budgets. Linux is free to use and install, and is
more reliable than almost all other systems, running for many months and even years without a
reboot being necessary.
Directory Related Commands
4. pwd : Trying to find out where on your Linux server you currently are
located? The pwd (print working directory) command will show you the full
path to the directory you are currently in. This is very handy to use,
especially when performing some of the other commands on this page!
1. touch : touch is actually a command we may use to modify the access and
modification times on a file (normally not needed but sometimes when
you're testing a system that relies on file access or modification times it can
be useful). I know some students have tried using this command to make it
look like their assignment files were not modified after the due date (there
are means to detect this so it never works but points for being creative).
What we are taking advantage of here is that if we touch a file and it does
not exist, the command will do us a favor and automatically create it for us
manually check all file systems to insure that no files remain with the
8. sudo : command allows you to run programs with the security privileges
of another user (by default, as the superuser). It prompts you for your
personal password and confirms your request to execute a command by
checking a file, called sudoers, which the system administrator configures.
Using the sudoers file, system administrators can give certain users or
groups access to some or all commands without those users having to know
the root password. It also logs all commands and arguments so there is a
record of who used it for what, and when.
1. chown : Now that you can list permissions, you surely want to mess up
with them. Chown is the first command we’re going through. It is used
to change the owner (or user subject)
2. Chmod : is probably the most difficult command among the three
presented in this post. It is used to change the permissions of the three
subjects