Some Suggested Exercises

Total Page:16

File Type:pdf, Size:1020Kb

Some Suggested Exercises Some Suggested Exercises Introductory Session Exercises: 1) Run a few commands of your choice. Type history and see what gets listed. Run a command from the history, (hint: use ! followed by the number of the command). Enter a new shell of your choice. Type history and see what gets listed. Exit this shell to go back to your previous shell. Change the HISTSIZE environmental variable to 5. View your history again. 2) Look at the environmental variables currently set. Add another directory to your PATH variable. (Look inside the /usr/software/bioenvrc file for the syntax for this command.) 3) Look at how your machine is organized using df –k. Read the man page for df. 4) Put in a floppy disk and mount the floppy drive. Read the /etc/fstab file and the manual page for fstab (and related web links if you have time.) Can you see why the command to mount a floppy is what it is? Unmount the floppy drive. 5) Type umask to see the default permission settings for new files. Create a new file, (e.g. use the command touch ) and see what permissions are on the file. Change the umask to 066, create a file and check the permissions for that file. Now create a new directory, (e.g. use the mkdir command) and check the permissions on the directory. User1 has a folder (~home/user1/sequences/testseqs) and he wants user2 to be able to see data stored in that folder of user1’s account. Use permissions to enable this. How could you ensure that data added after to this folder after this point in time would also be readable by user2? 6) User1 now wants user2 to be able to access only specific files in ~home/user1/sequences/testseqs. He wants to give user2 a list of specific filenames he can view, but does not want user2 to see what else is in that directory. How would you grant permissions that allow user2 the appropriate level of access? 7) Look at the information on creating users produced when you type the command man useradd Create a new user. Decide where you want their home directory to go, and what you want their username and default login shell to be. Run ls –la on the new user account’s home directory. Investigate the contents of some of these files and directories. (Where did these directories and files come from?) Try using the usermod command to alter information about a user already on the system. 8) Run df –k and look at the output. Do you know what it is telling you? Read the man page for df. 9) Read /etc/fstab. Do you understand what the different lines are referring to? When you run mount /mnt/cdrom , what is being mounted where? What is the relative amount of space designated to each filesystem? Will this suit your requirements? Can you see why the current setup should be monitored? What happens if someone decides to load EMBL into their home directory? (For the true sysadmins out there – EMBL is a VERY large flatfile database.) For the next few exercises, please move into the directory /home/manager/eg_bio-linux2.0_course Further Command Line Session Exercises: 1) List processes that access the /var partition 2) List processes that use the ssh port a. using fuser b. using lsof 3) Launch artemis Consult the man page for fuser and figure out a way to send a kill signal to all process that use /usr/software What happens? 4) List all manual pages relevant to password 5) Email the man passwd page to your email account 6) cd ~manager/examples/further_cli/tar/ Compress all the blast reports (.blastp) files into a tar.gz file 7) cd ../compressed expand compressed.tar file in current directory 8) Compress/gzip all .prot files What sort of compression ratio do you get? Can you alter/improve this? Possible commands (solutions) for Further Command Line exercises numbers 1-8: 1) lsof /var 2a) fuser ssh/tcp | awk '{print $2}' | xargs ps ho cmd 2b) lsof -i :ssh lsof | grep ssh | grep -v TCP 3) fuser -k 4) man -k password 5) man passwd | mail -s "man passwd| [email protected] 6) tar xzf blastarchive.tar.gz *.blastp 7) file compressed.tar reveals: file compressed.tar compressed.tar: bzip2 compressed data, block size = 900k tar tjf compressed.tar then tar xjf compressed.tar Better yet... mv compressed.tar compressed.tar.bz2 tar xvjf compressed.tar.bz2 or bunzip2 then tar xvf or even bzip -d then tar xvf 8) ls *.prot > list_prot for i in `cat list_prot`;do;gzip -v $i; done Process and System management: Exercises: 1) Experiment with ps and its modifying switches. Refer to the man pages to alter the display. 2) Top is a very system intensive command – see if you can work out how to run top so it only updates the display once every 20 seconds. Does this reduce the load? 3) Using the man pages try to figure out how to use top to do process management tasks. 4) View the tree like structure of the processes running on the machine. Which processes have the most child processes, and why do you think this is? 5) Work out how to list the processes associated with a terminal using pgrep. 6) Relate free, cat /proc/meminfo and vmstat information, can you see where the commands get their information from? 7) Get some size information from some of the directories on the filesystem. What do the larger directories contain? 8) Load up gtop and learn what the various displays are showing relative to the commands learnt in the session. 9) Work out what the crontab entry would be to run a program every Saturday at 2.34pm in every even numbered month. Further Linux command line Exercises: 1) Create a text file with a favoured line of prose or verse. Turn it into parody with sed. 2) Use grep to display genbank.txt without the AUTHOR lines. 3) Use grep to pull out lines of genbank.txt which have an EcoRI restriction site. 4) Read and try some of the things in these two links: http://pegasus.rutgers.edu/~elflord/unix/sed.html http://pegasus.rugers.edu/~elflord/unix/grep.html 5) cat fofn.txt. Use foreach to display each file listed in fofn.txt to screen. Essential Linux administration Exercises: 1) Examine the output of rpm -qa. If you don't recognise what they are use man to investigate what kind of services the rpms are providing. 2) Attempt to install pan-0.13.4-nospell1.i686.rpm by searching out the dependencies on the net. Google for the errors, has anyone else had the same problem? Do their fixes work? Which forums have good information? If all else fails install it with no dependencies and see if it works. 3) Uninstall the rpm from 2). 4) Play around with the rpm -q options. Try to make some sense of the man pages. 5) Go to www.sourceforge.net . Find a small package that comes as a .tar.gz or .tgz file (not rpm) and attempt to compile and install it. 6) Install snort to /tmp/. Printer setup Exercises: 1) Load printconf-gui as manager with sudo. Set up some dummy printers to familiarise yourself with the interface. Log files and log monitoring Exercises 1) Read /var/log/dmesg and deconstruct with: http://www.linuxgazette.com/issue59/nazario.html 2) Examine the file logwatch.txt. This is the output from logcheck.sh. What time did an active attack occur? Where did this originate from? Are there any other messages related to this attack in the file? How can you identify them? How could you parse the file to only pull out lines related to the attack to submit a report? Linux security 101 Exercises: 1) Think about the passwords you're currently using. Do you really think that they are sufficiently secure to stop someone guessing them? If not CHANGE THEM! 2) Check /etc/narc/narc.conf and see if you can work out how to change the firewall rules to allow incoming web traffic on port 80. 3) man netstat, and play with netstat to see if you can decode some of the information that is given. 4) Read some of : http://www.ecst.csuchico.edu/LDP/HOWTO/Security-HOWTO/ Booting up and Shutdown Session Exercises: 1) Read /etc/inittab to determine what scripts are executed in what order. Where/when is X started? What does this suggest about troubleshooting X problems? Read the /etc/rc.d/rc script. Can you see, looking at the information, why you can run virtual terminals using the Cntl-Alt-F1 through to Cntl-Alt-F6 keys combinations? 2) Read the man page for chkconfig. Find out about all the services chkconfig knows about on the machine you are working on. Look at the names of the scripts in the init directories for the various run levels, (/etc/rc.d/rc0.d, /etc/rc.d/rc1.d, /etc/rc.d/rc5.d, and so on.) Can you see a connection between the information you see in chkconfig and the scripts that will be executed at the various run levels? 3) Stop sshd running on your machine using the appropriate init.d command. Start sshd running again. .
Recommended publications
  • Plw Sc/Nt/Ntr/Ls
    K Service Source PLW SC/NT/NTR/LS Personal LaserWriter SC, Personal LaserWriter NT, Personal LaserWriter NTR, Personal LaserWriter LS, Personal LaserWriter LS/L K Service Source Basics PLW SC/NT/NTR/LS Basics Product Information - 1 Product Information The printers covered in this manual are • Personal LaserWriter SC • Personal LaserWriter NT • Personal LaserWriter NTR • Personal LaserWriter LS • Personal LaserWriter LS/L Compatibility Not all parts are compatible among the five models. Refer to Illustrated Parts for compatibility cross references. The cassette feeder tray and its associated parts are optional on the LS, LS/L, and NTR models. Basics Paper Paths - 2 Paper Paths There are four paper paths in the Personal LaserWriter. Paper is fed from the cassette or multipurpose tray and delivered to the face-down or face-up delivery trays. Note: Face signifies image side. Default delivery is face- down at the top of the printer. Basics LS–LS/L Identification - 3 LS–LS/L Identification I/O Board Bracket The LS/L is a cost-reduced version of the LS but is sold and packaged under the same LS name. Parts are not necessarily interchangeable between the two models. Power Switch External distinguishing characteristics: • LS: The power switch is on the left rear of printer; the rear cover has an opening for an I/O board bracket and Personal LaserWriter LS displays the family number M2000. • LS/L: The power switch is on the right rear of printer; Solid Rear Cover the rear cover is solid plastic and displays the family number M2002. Power Switch Personal LaserWriter LS/L Basics Sensing System Theory - 4 Sensing System Theory There are six sensors in the PS11 Personal LaserWriter: four PS12 paper sensors and two printer-open sensors.
    [Show full text]
  • Advanced Bash-Scripting Guide
    Advanced Bash−Scripting Guide An in−depth exploration of the art of shell scripting Mendel Cooper <[email protected]> 2.2 31 October 2003 Revision History Revision 0.1 14 June 2000 Revised by: mc Initial release. Revision 0.2 30 October 2000 Revised by: mc Bugs fixed, plus much additional material and more example scripts. Revision 0.3 12 February 2001 Revised by: mc Another major update. Revision 0.4 08 July 2001 Revised by: mc More bugfixes, much more material, more scripts − a complete revision and expansion of the book. Revision 0.5 03 September 2001 Revised by: mc Major update. Bugfixes, material added, chapters and sections reorganized. Revision 1.0 14 October 2001 Revised by: mc Bugfixes, reorganization, material added. Stable release. Revision 1.1 06 January 2002 Revised by: mc Bugfixes, material and scripts added. Revision 1.2 31 March 2002 Revised by: mc Bugfixes, material and scripts added. Revision 1.3 02 June 2002 Revised by: mc 'TANGERINE' release: A few bugfixes, much more material and scripts added. Revision 1.4 16 June 2002 Revised by: mc 'MANGO' release: Quite a number of typos fixed, more material and scripts added. Revision 1.5 13 July 2002 Revised by: mc 'PAPAYA' release: A few bugfixes, much more material and scripts added. Revision 1.6 29 September 2002 Revised by: mc 'POMEGRANATE' release: some bugfixes, more material, one more script added. Revision 1.7 05 January 2003 Revised by: mc 'COCONUT' release: a couple of bugfixes, more material, one more script. Revision 1.8 10 May 2003 Revised by: mc 'BREADFRUIT' release: a number of bugfixes, more scripts and material.
    [Show full text]
  • System Analysis and Tuning Guide System Analysis and Tuning Guide SUSE Linux Enterprise Server 15 SP1
    SUSE Linux Enterprise Server 15 SP1 System Analysis and Tuning Guide System Analysis and Tuning Guide SUSE Linux Enterprise Server 15 SP1 An administrator's guide for problem detection, resolution and optimization. Find how to inspect and optimize your system by means of monitoring tools and how to eciently manage resources. Also contains an overview of common problems and solutions and of additional help and documentation resources. Publication Date: September 24, 2021 SUSE LLC 1800 South Novell Place Provo, UT 84606 USA https://documentation.suse.com Copyright © 2006– 2021 SUSE LLC and contributors. All rights reserved. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license. A copy of the license version 1.2 is included in the section entitled “GNU Free Documentation License”. For SUSE trademarks, see https://www.suse.com/company/legal/ . All other third-party trademarks are the property of their respective owners. Trademark symbols (®, ™ etc.) denote trademarks of SUSE and its aliates. Asterisks (*) denote third-party trademarks. All information found in this book has been compiled with utmost attention to detail. However, this does not guarantee complete accuracy. Neither SUSE LLC, its aliates, the authors nor the translators shall be held liable for possible errors or the consequences thereof. Contents About This Guide xii 1 Available Documentation xiii
    [Show full text]
  • Mostly-Static Decentralized Information Flow Control by Andrew C
    Mostly-Static Decentralized Information Flow Control by Andrew C. Myers Submitted to the Department of Electrical Engineering and Computer Science in partial ful®llment of the requirements for the degree of Doctor of Philosophy at the Massachusetts Institute of Technology February 1999 c Massachusetts Institute of Technology 1999. All rights reserved. Author :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Department of Electrical Engineering and Computer Science January 7, 1999 Certi®ed by :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Barbara Liskov Ford Professor of Engineering Thesis Supervisor Accepted by ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: Arthur C. Smith Chairman, Departmental Committee on Graduate Students Mostly-Static Decentralized Information Flow Control by Andrew C. Myers Submitted to the Department of Electrical Engineering and Computer Science on January 7, 1999, in partial ful®llment of the requirements for the degree of Doctor of Philosophy Abstract The growing use of mobile code in downloaded programs such as applets and servlets has increased interest in robust mechanisms for ensuring privacy and secrecy. Common security mechanisms such as sandboxing and access control are either too restrictive or too weakÐthey prevent applications from sharing data usefully, or allow private information to leak. For example, security mechanisms in Java prevent many useful applications while still permitting Trojan horse applets
    [Show full text]
  • 07 07 Unixintropart2 Lucio Week 3
    Unix Basics Command line tools Daniel Lucio Overview • Where to use it? • Command syntax • What are commands? • Where to get help? • Standard streams(stdin, stdout, stderr) • Pipelines (Power of combining commands) • Redirection • More Information Introduction to Unix Where to use it? • Login to a Unix system like ’kraken’ or any other NICS/ UT/XSEDE resource. • Download and boot from a Linux LiveCD either from a CD/DVD or USB drive. • http://www.puppylinux.com/ • http://www.knopper.net/knoppix/index-en.html • http://www.ubuntu.com/ Introduction to Unix Where to use it? • Install Cygwin: a collection of tools which provide a Linux look and feel environment for Windows. • http://cygwin.com/index.html • https://newton.utk.edu/bin/view/Main/Workshop0InstallingCygwin • Online terminal emulator • http://bellard.org/jslinux/ • http://cb.vu/ • http://simpleshell.com/ Introduction to Unix Command syntax $ command [<options>] [<file> | <argument> ...] Example: cp [-R [-H | -L | -P]] [-fi | -n] [-apvX] source_file target_file Introduction to Unix What are commands? • An executable program (date) • A command built into the shell itself (cd) • A shell program/function • An alias Introduction to Unix Bash commands (Linux) alias! crontab! false! if! mknod! ram! strace! unshar! apropos! csplit! fdformat! ifconfig! more! rcp! su! until! apt-get! cut! fdisk! ifdown! mount! read! sudo! uptime! aptitude! date! fg! ifup! mtools! readarray! sum! useradd! aspell! dc! fgrep! import! mtr! readonly! suspend! userdel! awk! dd! file! install! mv! reboot! symlink!
    [Show full text]
  • UNIX System Services Z/OS Version 1 Release 7 Implementation
    Front cover UNIX System Services z/OS Version 1 Release 7 Implementation z/OS UNIX overview z/OS UNIX setup z/OS UNIX usage Paul Rogers Theodore Antoff Patrick Bruinsma Paul-Robert Hering Lutz Kühner Neil O’Connor Lívio Sousa ibm.com/redbooks International Technical Support Organization UNIX System Services z/OS Version 1 Release 7 Implementation March 2006 SG24-7035-01 Note: Before using this information and the product it supports, read the information in “Notices” on page xiii. Second Edition (March 2006) This edition applies to Version 1 Release 7 of z/OS (5637-A01), and Version 1, Release 7 of z/OS.e (5655-G52), and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 2003, 2006. All rights reserved. Note to U.S. Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Notices . xiii Trademarks . xiv Preface . .xv The team that wrote this redbook. .xv Become a published author . xvi Comments welcome. xvii Chapter 1. UNIX overview. 1 1.1 UNIX fundamentals . 2 1.1.1 UNIX objectives . 2 1.1.2 What people like about UNIX . 2 1.1.3 What people don’t like about UNIX . 3 1.1.4 UNIX operating system . 3 1.1.5 UNIX file system . 4 1.1.6 Parameter files . 6 1.1.7 Daemons. 6 1.1.8 Accessing UNIX . 6 1.1.9 UNIX standards. 7 1.1.10 MVS and UNIX functional comparison . 8 1.2 z/OS UNIX System Services fundamentals .
    [Show full text]
  • (12) United States Patent (10) Patent N0.: US 7,283,777 B2 Russel Et Al
    US007283777B2 (12) United States Patent (10) Patent N0.: US 7,283,777 B2 Russel et al. (45) Date of Patent: Oct. 16, 2007 (54) SYSTEM AND METHOD FOR (58) Field of Classi?cation Search .............. .. 399/323, CHARACTERIZING FUSER STRIPPING 399/33, 315, 21, 324, 322 PERFORMANCE See application ?le for complete search history. (75) Inventors: Steven M. Russel, Pittsford, NY (US); (56) References Cited Mansour Messalti, Sherwood, OR U. S. PATENT DOCUMENTS (US); Jeremy Christopher deJong, Orchard Park, NY (US); Anthony S. 4,952,982 A * 8/1990 Tabuchi ....... .. 399/22 Condello, Webster, NY (US); Daniel 5,282,009 A * l/l994 Derimiggio 399/46 James McVeigh, Webster, NY (US); 5,406,363 A * 4/1995 Siegel et a1. .............. .. 399/323 Donald M. Bott, Rochester, NY (US); 6,795,677 B2 9/2004 Berkes et a1. James Joseph Padula, Webster, NY * cited by examiner (Us) Primary ExamineriDavid M. Gray (73) Assignee: Xerox Corporation, Stamford, CT Assistant Examiner4Geoifrey T Evans (Us) (74) Attorney, Agent, or FirmiDuane C. Basch; Basch & Nickerson LLP ( * ) Notice: Subject to any disclaimer, the term of this patent is extended or adjusted under 35 (57) ABSTRACT U.S.C. 154(b) by 0 days. Disclosed herein are several embodiments to facilitate the (21) Appl. No.: 11/343,672 characterization of fuser stripping performance. Recogniz ing that the characteristics of a substrate exiting a fusing nip (22) Filed: Jan. 31, 2006 are indicative of the operation of the nip and the stripping operation itself, several contact and non-contact sensing (65) Prior Publication Data methods are described to detect or predict degraded strip US 2007/0177913 A1 Aug.
    [Show full text]
  • Centos Cheat Sheet Cheat Sheet by Bromono Via Cheatography.Com/20940/Cs/3795
    CentOS Cheat Sheet Cheat Sheet by bromono via cheatography.com/20940/cs/3795/ Help Commands Partitions and Disk Management File Operations (cont) ls Options whatis df less View a file on page at a -a Show all (including hidden) time, allows for going Search whatis database for Report file system disk space -R Recursive list backwards complete words; used to find usage -r Reverse order short descrip​ tions of system head Print the first 10 lines of a mount commands file -t Sort by last modified Show whats mounted or mount Sort by file size which tail Print the last 10 lines of a -S a file system file Long listing format Shows the full path to shell -l unmou​ nt wc Count the number of commands -1 One file per line Unmount a file system words or characters in a where​ is file -m Comma-s​ epa​ rated output fuser Locate binary, source and man stat Display file of file system -Q Quoted output pages for a command Identifies processes using files status or sockets aprop​ os cut Remove sections from grep Options isof lines of input Search through a database of -i Case insensi​ tive search short descrip​ tion to find help list open files on the system paste Merge lines of files -r Recursive search and man pages containing -v Inverted search certain terms and commands Directory Operations Searching Files -o Show matched part of file only man clear clears your screen grep Search text files for lines Manual pages for commands containing a matching pwd Shows current directory Process Management pattern cd Change directo​ ries Report on current Bash
    [Show full text]
  • Выключатели Нагрузки Socomec Sirco M И Sirco MV - Брошюра На Продукцию
    ---------- ,__ _________ Выключатели нагрузки Socomec Sirco M и Sirco MV - брошюра на продукцию. Юниджет SIRCO M - https://www.uni-jet.com/catalog/commutation/vyiklyuchateli-nagruzki/ socomec-sirco-m/ SIRCO MV - https://www.uni-jet.com/catalog/commutation/vyiklyuchateli-nagruzki/ l�-' socomec-sirco-mv/ un I Jet SIRCO M and MV Modular universal switches from 16 to 160 A SOCOMEC : ADDITIONAL SOCOMEC Innovators in LV switching solutions SWITCHING SOLUTIONS As a world leader in electrical switching and protection systems, SOCOMEC launches a new generation of load > SIRCO load break switches up to 5000 A break and changeover switches for applications from 16 to 160 A. SIRCO M and MV : Total integration of all electrical functions: isolating, control and changeover switching SOCOMEC has developed a new technical concept that combines the features of a load break switch and a SIRCM 353 A changeover switch in order to propose a highly innovative modular design. > Manualandmotorisedchangeover SIRCO M and MV : switch Full compliance with IEC, EN 60947-3 or UL 508 standards The new SIRCO M and MV range of load break switches has been designed, qualified and tested according to the criteria defined by the IEC 60947-3 standard. This process guarantees a high quality level for the product which is fully adapted to arduous operating environments when operating in the field. ATYSM 007 A > FusecombinationswitchesFUSERBLOC - Frontorrightsideoperation FUSER 703 A ATYS 079 A SIRCO M Modular universal switches the versatile solution Usestandardcomponentstocreateasolutionthatperfectlysuitstoyourapplication. SWITCHING & DISCONNECTION CHANGEOVER SWITCHING ADAPTABLE For safe and optimised operation of LV Two mechanically interlocked switches. To all motor or distribution load applications.
    [Show full text]
  • Unix Command
    Veloce descrizione di comandi Unix Buona parte dei comandi dell’elenco seguente fanno parte della distribuzione standard di molte architetture Unix. Per i dettagli vedere le relative pagine di manuale, invocabili con il comando "man topic". a2p convertitore awk - perl amstex AmSTeX language create, modify, and extract from archives (per creare ar librerie) arch print machine architecture at, batch, atq, atrm - queue, examine or delete jobs for later at execution awk gawk - pattern scanning and processing language basename strip directory and suffix from filenames bash GNU Bourne-Again SHell bc An arbitrary precision calculator language bibtex make a bibliography for (La)TeX c++ GNU project C++ Compiler cal displays a calendar cat concatenate files and print on the standard output cc gcc, g++ - GNU project C and C++ Compiler checkalias usage: /usr/bin/checkalias alias .. chfn change your finger information chgrp change the group ownership of files chmod change the access permissions of files chown change the user and group ownership of files chsh change your login shell cksum checksum and count the bytes in a file clear clear terminal screen cmp compare two files col filter reverse line feeds from input column columnate lists comm compare two sorted files line by line compress compress, uncompress, zcat - compress and expand data cp copy files cpio copy files to and from archives tcsh - C shell with file name completion and command line csh editing csplit split a file into sections determined by context lines cut remove sections from each
    [Show full text]
  • Oracle Universal Installer and Opatch User's Guide for Windows and UNIX
    Oracle® Universal Installer and OPatch User’s Guide 11g Release 2 (11.2) for Windows and UNIX E12255-11 March 2011 Oracle Universal Installer and OPatch User’s Guide, 11g Release 2 (11.2) for Windows and UNIX E12255-11 Copyright © 1996, 2011, Oracle and/or its affiliates. All rights reserved. Primary Author: Michael Zampiceni Contributor: Smitha Viswanathan, Sumant Sankaran, Phi Nguyen This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this software or related documentation is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms set forth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007).
    [Show full text]
  • POSIX-2017 Shell & Utilities Utilities
    POSIX-2017 Shell & Utilities Utilities admin - create and administer SCCS files (DEVELOPMENT) ex - text editor alias - define or display aliases expand - convert tabs to spaces ar - create and maintain library archives expr - evaluate arguments as an expression asa - interpret carriage-control characters false - return false value at - execute commands at a later time fc - process the command history list awk - pattern scanning and processing language fg - run jobs in the foreground basename - return non-directory portion of a pathname file - determine file type batch - schedule commands to be executed in a batch queue find - find files bc - arbitrary-precision arithmetic language fold - filter for folding lines bg - run jobs in the background fort77 - FORTRAN compiler (FORTRAN) c99 - compile standard C programs fuser - list process IDs of all processes that have one or more files cal - print a calendar open cat - concatenate and print files gencat - generate a formatted message catalog cd - change the working directory getconf - get configuration values cflow - generate a C-language flowgraph (DEVELOPMENT) get - get a version of an SCCS file (DEVELOPMENT) chgrp - change the file group ownership getopts - parse utility options chmod - change the file modes grep - search a file for a pattern chown - change the file ownership hash - remember or report utility locations cksum - write file checksums and sizes head - copy the first part of files cmp - compare two files iconv - codeset conversion command - execute a simple command id - return
    [Show full text]