Linux Tutorials Network Design/Computer Vision by Helal Saghir the Command Prompt

Total Page:16

File Type:pdf, Size:1020Kb

Linux Tutorials Network Design/Computer Vision by Helal Saghir the Command Prompt Linux Tutorials Network Design/Computer vision by Helal Saghir The Command Prompt • Commands are the way to “do things” in Unix • A command consists of a command name and options called “flags” • Commands are typed at the command prompt • In Unix, everything (including commands) is case- sensitive [prompt]$ <command> <flags> <args> helal:~$ ls –l -a unix-tutorial Command (Optional) arguments Command Prompt (Optional) flags Note: Many Unix commands will print a message only if something went wrong. Be careful with rm and mv. Getting help with man • man (short for “manual”) documents commands – man <cmd> retrieves detailed information about <cmd> – man –k <keyword> searches the man page summaries (faster, and will probably give better results) – man –K <keyword> searches the full text of the man pages helal:~$ man –k password passwd (5) - password file xlock (1) - Locks the local X display until a password is entered helal:~$ passwd ssh (secure shell) • Open secure shell from windows. • Enter server name , username and password . You can login remotely. • In linux use this command • ssh [email protected] • Will ask your password and let you enter. yppasswd • To change the password on linux use • passwd • In lab you have to use yppasswd as we are running NIS. Quota • Quota limit is 100 MB. • Check quota by using du • du – disk usage. • du –cms • -c : total • -m: megabytes • -s: summary • There is quota command also but it won’t work because of NIS running on clients. It should work on your home computer, if you have Linux installed on it and quota rpm on. Linux Commands • cd – change directory • cd .. – changes to one up-level • cd / - goes to the root • cd $HOME – takes to you home directory • cd $home – does the same thing • Handy directories to know ~ Your home directory ls command • ls – shows the list of files/directory • ls –al – shows all files including hidden with detail. • ls –l - shows all files not including hidden. • ls <directory> - shows the list in that directory cp • cp – copy files • cp [source_file1] [des_file1] • -p : preserve=mode,ownership,timestamp • -R –r : copy directories recursively Move / mkdir • mv : move files /directory • mv [source] [destination] • mkdir : make directory – Syntax: mkdir <directories> • rmdir : remove directory which must be empty. – Syntax: rmdir <directories> rm • Rm –remove non-empty directory or file • -r: recursive • -f : force • -v: verbose Shell Shortcuts • Tab completion – Type part of a file/directory name, hit <tab>, and the shell will finish as much of the name as it can – Works if you’re running tcsh or bash • Command history – Don’t re-type previous commands – use the up-arrow to access them • Wildcards – Special character(s) which can be expanded to match other file/directory names * Zero or more characters ? Zero or one character – Examples: • ls *.txt • rm may-?-notes.txt Editing Text • Which text editor is “the best” is a holy war. Pick one and get comfortable with it. • Three text editors you should be aware of: – pico – Easy! Comes with pine (Dante’s email program) – emacs/xemacs – A heavily-featured editor commonly used in programming – vim/vi – A lighter editor, also used in programming – Your opinion is wrong. Commands Contd.. • Cat : concatenation • -cat [file1] [file2] • Attach both file and gives the output • more : views a file, pausing every screenful • more [file1] Redirection • Standard Input is from keyboard • Standard Output is the monitor • Able to change this! command < infile > outfile command < infile command > outfile command >> outfile –attach at end Pipes • Output of one command “piped into” another command1 | command2 • Do the first command command1 • Feed its output as input for command2 Wildcards Group of files accessed using wildcards * matches everything ls g* lists all files beginning with g ls go.* lists files named go with any extension ls * lists all files Commands cond. • history gives a history of your commands • date displays date >date • who who is on the system • finger get more info about another user. • jobs one of a number of job control commands. Gives the job No. of your jobs. – kill kill a specified job number Find command • find: find the file • find [place to find] –name “filename” –print • . – current directory • ~ home directory • / whole root directory chmod • chmod : change mode • ugo : user, group, other • rwx: read, write, execute • 777 :read, write, execute for all • chmod 755 test.c printing • lpr <filename> : send print to default printer • a2ps –p <printername> <filename> : format text file in postscript and prints Compilation in c • gcc –o <executable_file> <file1.c> • Make different executable file name for different files compiled. • Default executable is a.out • Run using ./a.out • Or a.out in 410 lab Detail on Compilation in c • g++ syntax: g++ [<options>] <input files> • Some useful options: -g produce debugging info (for gdb) -Wall “Warnings all” -ansi force ANSI compliant compilation -D<sym> define <sym> in all source files -o <name> output filename • Example: g++ -g –Wall –ansi –o hello hello.cpp Editor • Choice is on you : • emacs • vi • gedit • pico • other Make • The make utility is a software engineering tool for managing and maintaining computer programs. • make provides most help when the program consists of many component files. As the number of files in the program increases so to does the compile time, complexity of compilation command and the likelihood of human error when entering command lines, i.e. typos and missing file names. make cont. • By creating a descriptor file containing • dependency rules, • macros and • suffix rules • you can instruct make to automatically rebuild your program whenever one of the program's component files is modified. • make is smart enough to only recompile the files that were affected by changes thus saving compile time. make cont.. • Make goes through a descriptor file starting with the target it is going to create. • Make looks at each of the target's dependencies to see if they are also listed as targets. • It follows the chain of dependencies until it reaches the end of the chain and then begins backing out executing the commands found in each target's rule. • Make builds object files from the source files and then links the object files to create the executable. The Make Command • make syntax: make [-f <file>] [<target>] • argument descriptions: -f <file> use <file> as the makefile default: Makefile or makefile <target> compile configuration “target” default: first target in the makefile Lets Make to make breakfast • So, let's say we need (boiled) eggs, toast, and coffee for our breakfast. Then our breakfast rule will be simply: • breakfast : boiled_eggs toast coffee butter <TAB> peel boiled_eggs <TAB> put toast on a plate <TAB> pour coffee into cup • So far so good, but we don't have boiled_eggs, we only have raw eggs. So we need another rule: • boiled_eggs : raw_eggs water pot stove <TAB> pour water into pot <TAB> put eggs in the water <TAB> put pot on the stove <TAB> boil until eggs ready Make cont. • Now we need a rule to make a toast, and another to make coffee. I won't go through the excercise of writing these rules out: I think you get the idea. Makefile Syntax • Rule Syntax: <target>: <requirements> <command> • The <requirements> may be files and/or other targets • It must be a tab before <command>, or it won’t work • The first rule is the default <target> for make • Variable Syntax: <variable>=<string value> • All variable values default to the shell variable values Simple example for Makefile • This is an example descriptor file to build an executable file called prog1. • It requires the source files file1.cc, file2.cc, and file3.cc. • An include file, mydefs.h, is required by files file1.cc and file2.cc. • You can run it in a normal way by : % CC -o prog1 file1.cc file2.cc file3.cc Descriptor file will run it like this : % make prog1 or if prog1 is the first target defined in the descriptor file % make Simple example of Descriptor file #top level rule to compile the whole process all:prog1 #program is made of several source files prog1 : file1.o file2.o file3.o gcc -o prog1 file1.o file2.o file3.o #rule for the file “file1.o” file1.o : file1.cc mydefs.h gcc -c file1.cc #rule for the file “file2.o” file2.o : file2.cc mydefs.h gcc -c file2.cc #rule for the file “file3.o” file3.o : file3.cc gcc -c file3.cc #rule for cleaning files generator during compilation clean : rm file1.o file2.o file3.o Making Descriptor file smaller OBJS= file1.o file2.o file3.o Prog1:${OBJS} gcc -o prog1 ${OBJS} file1.o : file1.cc mydefs.h gcc -c file1.cc file2.o : file2.cc mydefs.h gcc -c file2.cc file3.o : file3.cc gcc -c file3.cc clean : rm ${OBJS} Making Descriptor file even smaller #this is macro OBJS= file1.o file2.o file3.o CC=gcc CFLAGS = -g –wall prog1:${OBJS} ${CC} -o $@ ${OBJS} file1.o file2.0: mydefs.h clean : rm ${OBJS} Make Power Features • “Fake” targets – targets that are not actually files – can do just about anything, not just compile – like the “clean” target • Forcing re-compiles – touch the required files – touch the Makefile to rebuild everything Debugging • The ideal: do it right the first time • The reality: bugs happen • The goal: exterminate, quickly and efficiently Debugging Methods • The best way: read the code – If you don’t understand it, it’ll happen again • Consistent use of error checking & handling – most uncaught errors are not where they appear to be • Examine the state at key points in the code – wrap debug output with
Recommended publications
  • Application Program Interface Guide
    APPLICATION PROGRAM INTERFACE GUIDE VWS-2001, VWS-2002 V WS-2001 V WS-2002 API GUIDE 24/7 TECHNICAL SUPPORT AT 1.877.877.2269 OR VISIT BLACKBOX.COM RemoteRemote Command Command Line Line Status Configure Status Client connected Enabled Monitor Client authorized Settings… Client disconnected Client authorized “C:\Program Files (x86)\Wall Control\wallctl.exe”- Active Server Telnet Command Lin — — — OK Cancel Apply Help NEED HELP? LEAVE THE TECH TO US LIVE 24/7 TABLE OF CONTENTS TECHNICAL SUPPORT 1.877.877.2269 1. INTRODUCTION ............................................................................................................................................................................. 3 1.1 API Programs ................................................................................................................................................................................................................3 1.2 Nomenclature ...............................................................................................................................................................................................................3 2. LAYOUTS ........................................................................................................................................................................................ 4 2.1 Example Usage ............................................................................................................................................................................................................4
    [Show full text]
  • 13-DUALOSS-MV Commercial Grade In-Wall Occupancy/Vacancy Sensor
    13-DUALOSS-MV Commercial Grade In-Wall Occupancy/Vacancy Sensor APPLICATIONS This Multi-Technology Wall Switch Sensor combine advanced passive infrared (PIR) and ultrasonic technologies into one unit. The combined technologies helps eliminate false triggering even in difficult applications. Selectable operating modes allow the sensor to turn a load on, and hold it on as long as either or both technologies detect occupancy . After no movement is detected for the selected time delay, the lights switch off. A "walk-through" mode can turn lights off after only 3 minutes, if no activity is detected after 30 seconds following an occupancy detection. This sensor also contains a light level sensor. If adequate daylight is present, the sensor holds the load OFF until light levels drop, even if the area is occupied. MODEL #: 13-DUALOSS-MV FEATURES • Integrated PIR and Ultrasonic sensor technology to detect very fine COVERAGE AREA motion and provide accurate motion sensing Top View • Allows to choose triggering when both technologies detect motion or when only PIR detects motion 20' • Less false trigger, fast ON/OFF; commercial grade sensor for closet, garage, hotels, meeting room, work places 10' • Adjustable timeout from 15 seconds to 30 minutes; Walk-Through mode: 3 minutes if no activity after first 30 seconds SPECIFICATIONS 10' • Voltage: 120/277VAC, 50/60Hz • Incandescent: 800W-120VAC, 50/60Hz • Fluorescent: 800VA-120VAC, 1600VA-277VAC, 50/60Hz 20' • Resistive: 800W-120VAC, 50/60Hz • Motor: 1/4 HP-120VAC, 50/60Hz • Adjustment Time Delay: 5 Sec to 30 Mins 5' • Walk-Through Mode: 3-minutes if no activity after 30 sec.
    [Show full text]
  • PS TEXT EDIT Reference Manual Is Designed to Give You a Complete Is About Overview of TEDIT
    Information Management Technology Library PS TEXT EDIT™ Reference Manual Abstract This manual describes PS TEXT EDIT, a multi-screen block mode text editor. It provides a complete overview of the product and instructions for using each command. Part Number 058059 Tandem Computers Incorporated Document History Edition Part Number Product Version OS Version Date First Edition 82550 A00 TEDIT B20 GUARDIAN 90 B20 October 1985 (Preliminary) Second Edition 82550 B00 TEDIT B30 GUARDIAN 90 B30 April 1986 Update 1 82242 TEDIT C00 GUARDIAN 90 C00 November 1987 Third Edition 058059 TEDIT C00 GUARDIAN 90 C00 July 1991 Note The second edition of this manual was reformatted in July 1991; no changes were made to the manual’s content at that time. New editions incorporate any updates issued since the previous edition. Copyright All rights reserved. No part of this document may be reproduced in any form, including photocopying or translation to another language, without the prior written consent of Tandem Computers Incorporated. Copyright 1991 Tandem Computers Incorporated. Contents What This Book Is About xvii Who Should Use This Book xvii How to Use This Book xvii Where to Go for More Information xix What’s New in This Update xx Section 1 Introduction to TEDIT What Is PS TEXT EDIT? 1-1 TEDIT Features 1-1 TEDIT Commands 1-2 Using TEDIT Commands 1-3 Terminals and TEDIT 1-3 Starting TEDIT 1-4 Section 2 TEDIT Topics Overview 2-1 Understanding Syntax 2-2 Note About the Examples in This Book 2-3 BALANCED-EXPRESSION 2-5 CHARACTER 2-9 058059 Tandem Computers
    [Show full text]
  • Unix for Newbies from Duane A
    Content borrowed and updated (with permission) Unix for Newbies from Duane A. Bailey’s guidelines from 2007. Getting help on unix: Some Tips To Make Your UNIX Life More Reasonable man <command-name>!!Get full description of command man -k <keyword>!! ! List command mentioning keyword in title 0. Walk away from the machine. If you’re not making progress, don’t waste time banging your head (literally or Logging in and out of a system: figuratively) against the machine. Save your files, print the buggy output, or logout!!!!Terminate session create a backup and walk away. Find someone to talk to about something else. Your exit!!!!Terminate current “shell” mind will work on the problem while you go get a snack and take a break. ssh <username>@<remote host>!Login securely as username to remote host 1. Read man pages. File Manipulation: Realize that you don’t know everything. Take the time to learn how man pages are emacs <file>!!!Edit a text file (See the emacs cheatsheet) structured and what they can teach you. You find answers to many questions on the mv <old> <new>!!!Move or rename <old> file as <new> file internet, but you learn even more by finding and reading the man pages. Better, rm <file(s)>!!!Delete file(s) from filesystem you learn elegant solutions to questions you didn’t think to ask. cp <orig> <duplicate>!!Copy <orig> to file named <duplicate> sftp <remote host>!!Secure batch file transfers between machines 2. Learn the emacs keystrokes. scp host:<orig> host:<dub>!Securely transfer files between machines It will save you time when you work on a machine whose mouse or arrow keys aren’t cat <file>!!!Display or catenate file contents to screen working, and the keystrokes often work in other editors.
    [Show full text]
  • The Intercal Programming Language Revised Reference Manual
    THE INTERCAL PROGRAMMING LANGUAGE REVISED REFERENCE MANUAL Donald R. Woods and James M. Lyon C-INTERCAL revisions: Louis Howell and Eric S. Raymond Copyright (C) 1973 by Donald R. Woods and James M. Lyon Copyright (C) 1996 by Eric S. Raymond Redistribution encouragedunder GPL (This version distributed with C-INTERCAL 0.15) -1- 1. INTRODUCTION The names you are about to ignore are true. However, the story has been changed significantly.Any resemblance of the programming language portrayed here to other programming languages, living or dead, is purely coincidental. 1.1 Origin and Purpose The INTERCAL programming language was designed the morning of May 26, 1972 by Donald R. Woods and James M. Lyon, at Princeton University.Exactly when in the morning will become apparent in the course of this manual. Eighteen years later (give ortakeafew months) Eric S. Raymond perpetrated a UNIX-hosted INTERCAL compiler as a weekend hack. The C-INTERCAL implementation has since been maintained and extended by an international community of technomasochists, including Louis Howell, Steve Swales, Michael Ernst, and Brian Raiter. (There was evidently an Atari implementation sometime between these two; notes on it got appended to the INTERCAL-72 manual. The culprits have sensibly declined to identify themselves.) INTERCAL was inspired by one ambition: to have a compiler language which has nothing at all in common with anyother major language. By ’major’ was meant anything with which the authors were at all familiar,e.g., FORTRAN, BASIC, COBOL, ALGOL, SNOBOL, SPITBOL, FOCAL, SOLVE, TEACH, APL, LISP,and PL/I. For the most part, INTERCAL has remained true to this goal, sharing only the basic elements such as variables, arrays, and the ability to do I/O, and eschewing all conventional operations other than the assignment statement (FORTRAN "=").
    [Show full text]
  • After the Wall: the Legal Ramifications of the East German Border Guard Trials in Unified Germany Micah Goodman
    Cornell International Law Journal Volume 29 Article 3 Issue 3 1996 After the Wall: The Legal Ramifications of the East German Border Guard Trials in Unified Germany Micah Goodman Follow this and additional works at: http://scholarship.law.cornell.edu/cilj Part of the Law Commons Recommended Citation Goodman, Micah (1996) "After the Wall: The Legal Ramifications of the East German Border Guard Trials in Unified Germany," Cornell International Law Journal: Vol. 29: Iss. 3, Article 3. Available at: http://scholarship.law.cornell.edu/cilj/vol29/iss3/3 This Note is brought to you for free and open access by Scholarship@Cornell Law: A Digital Repository. It has been accepted for inclusion in Cornell International Law Journal by an authorized administrator of Scholarship@Cornell Law: A Digital Repository. For more information, please contact [email protected]. NOTES After the Wall: The Legal Ramifications of the East German Border Guard Trials in Unified Germany Micah Goodman* Introduction Since the reunification of East and West Germany in 1990, the German government' has tried over fifty2 former East German soldiers for shooting and killing East German citizens who attempted to escape across the East- West German border.3 The government has also indicted a dozen high- ranking East German government officials.4 The German government charged and briefly tried Erich Honecker, the leader of the German Demo- cratic Republic (G.D.R.) from 1971 to 1989, for giving the orders to shoot escaping defectors. 5 While on guard duty at the border between the two * Associate, Rogers & Wells; J.D., Cornell Law School, 1996; B.A., Swarthmore College, 1991.
    [Show full text]
  • Demystifying the Title 10-Title 50 Debate: Distinguishing Military Operations, Intelligence Activities & Covert Action
    ARTICLE Demystifying the Title 10-Title 50 Debate: Distinguishing Military Operations, Intelligence Activities & Covert Action Andru E. Wall* Abstract Modern warfare requires close integration of military and intelligence forces. The Secretary of Defense possesses authorities under Title 10 and Title 50 and is best suited to lead US government operations against external unconventional and cyber threats. Titles 10 and 50 create mutually supporting, not mutually exclusive, authorities. Operations conducted under military command and control pursuant to a Secretary of Defense-issued execute order are military operations and not intelligence activities. Attempts by congressional overseers to redefine military preparatory operations as intelligence activities are legally and historically unsupportable. Congress should revise its antiquated oversight structure to reflect our integrated and interconnected world. I. Introduction After being hunted for nearly ten years, Osama Bin Laden was shot and killed by U.S. Navy SEALs in the early hours of May 2, 2011. The identity of the elite special operations unit that conducted the raid on bin Laden's compound in Pakistan was not immediately released, as the * Senior Associate with Alston & Bird LLP; former senior legal advisor for U.S. Special Operations Command Central (2007 to 2009). While this article was cleared for publication as required by my security clearance and nondisclosure agreements, the views expressed herein are my own and do not necessarily reflect the position of the U.S. government or Department of Defense. I thank Harvard Law School for its generous support of this paper andJack Goldsmith, Hagan Scotten., Mark Grdovic, Nick Dotti, Chris Costa, Michael Bahar, and Lenn Ferrer for their invaluable comments and suggestions.
    [Show full text]
  • Unix Commands (09/04/2014)
    Unix Commands (09/04/2014) • Access control – login <login_name> – exit – passwd <login_name> – yppassswd <loginname> – su – • Login as Super user – su <login> • Login as user <login> • Root Prompt – [root@localhost ~] # • User Prompt – [bms@raxama ~] $ On Line Documentation – man <command/topic> – info <command/topic> • Working with directories – mkdir –p <subdir> ... {-p create all directories in path if not present} mkdir –p /2015/Jan/21/14 will create /2015, Jan, 21 & 14 in case any of these is absent – cd <dir> – rm -r <subdir> ... Man Pages • 1 Executable programs or shell commands • 2 System calls (functions provided by the kernel) • 3 Library calls (functions within program libraries) • 4 Special files (usually found in /dev) • 5 File formats and conventions eg /etc/passwd • 6 Games • 7 Miscellaneous (including macro packages and conventions), e.g. man(7), groff(7) • 8 System administration commands (usually only for root) • 9 Kernel routines [Non standard] – man grep, {awk,sed,find,cut,sort} – man –k mysql, man –k dhcp – man crontab ,man 5 crontab – man printf, man 3 printf – man read, man 2 read – man info Runlevels used by Fedora/RHS Refer /etc/inittab • 0 - halt (Do NOT set initdefault to this) • 1 - Single user mode • 2 - Multiuser, – without NFS (The same as 3, if you do not have networking) • 3 - Full multi user mode w/o X • 4 - unused • 5 - X11 • 6 - reboot (Do NOT set init default to this) – init 6 {Reboot System} – init 0 {Halt the System} – reboot {Requires Super User} – <ctrl> <alt> <del> • in tty[2-7] mode – tty switching • <ctrl> <alt> <F1-7> • In Fedora 10 tty1 is X.
    [Show full text]
  • Uname Hlocation of Legal Description
    Form No. 10-300 (Rev. 10-74) UNITED STATES DEPARTMENT OF THE INTERIOR NATIONAL PARK SERVICE NATIONAL REGISTER OF HISTORIC PLACES INVENTORY -- NOMINATION FORM SEE INSTRUCTIONS IN HOW TO COMPLETE NATIONAL REGISTER FORMS ______TYPE ALL ENTRIES -- COMPLETE APPLICABLE SECTIONS UNAME HISTORIC OCEAN DRIVE—NEWPORT HISTORIC DISTRICT AND/OR COMMON LOCATION STREET& NUMBER _NOT FOR PUBLICATION CITY. TOWN CONGRESSIONAL DISTRICT Newport VICINITY OF STATE CODE COUNTY CODE Rhode Island Newport HCLASSIFI CATION CATEGORY OWNERSHIP STATUS PRESENT USE X_DISTRICT —PUBLIC ^OCCUPIED —AGRICULTURE —MUSEUM _BUILDING(S) —PRIVATE —UNOCCUPIED —COMMERCIAL .XPARK —STRUCTURE ^_BOTH —WORK IN PROGRESS —EDUCATIONAL ^PRIVATE RESIDENCE —SITE PUBLIC ACQUISITION ACCESSIBLE —ENTERTAINMENT —RELIGIOUS —OBJECT _|N PROCESS —YES: RESTRICTED ^-GOVERNMENT —SCIENTIFIC —BEING CONSIDERED * YES: UNRESTRICTED —INDUSTRIAL —TRANSPORTATION _NO —MILITARY —OTHER: OWNER OF PROPERTY NAME STREET & NUMBER CITY. TOWN STATE __ VICINITY OF HLOCATION OF LEGAL DESCRIPTION COURTHOUSE, REGISTRY OF DEEDS,ETC. Newport City Hall STREET & NUMBER Broadway CITY. TOWN STATE Newport Rhode Island REPRESENTATION IN EXISTING SURVEYS TITLE DATE —FEDERAL —STATE —COUNTY —LOCAL DEPOSITORY FOR SURVEY RECORDS CITY. TOWN STATE DESCRIPTION CONDITION CHECK ONE CHECK ONE —EXCELLENT —DETERIORATED —UNALTERED —ORIGINAL SITE —GOOD —RUINS —ALTERED —MOVED DATE_______ —FAIR _UNEXPOSED ———————————DESCRIBETHE PRESENT AND ORIGINAL (IF KNOWN) PHYSICAL APPEARANCE The Ocean Drive Ocean Avenue, or "the Ocean Drive" as it is also called, is a roadway and an area, really, which bounds the city of Newport from its southeastern to its southwestern extremities. This avenue extends circuitously for a distance of about four miles, beginning easterly at the south end of Bellevue Avenue and terminating westerly where it turns a corner and runs into Ridge Road, which leads back past Fort Adams towards the city.
    [Show full text]
  • Linux/Unix: the Command Line
    Linux/Unix: The Command Line Adapted from materials by Dan Hood Essentials of Linux • Kernel ú Allocates time and memory, handles file operations and system calls. • Shell ú An interface between the user and the kernel. • File System ú Groups all files together in a hierarchical tree structure. 2 Format of UNIX Commands • UNIX commands can be very simple one word commands, or they can take a number of additional arguments (parameters) as part of the command. In general, a UNIX command has the following form: command options(s) filename(s) • The command is the name of the utility or program that we are going to execute. • The options modify the way the command works. It is typical for these options to have be a hyphen followed by a single character, such as -a. It is also a common convention under Linux to have options that are in the form of 2 hyphens followed by a word or hyphenated words, such as --color or --pretty-print. • The filename is the last argument for a lot of UNIX commands. It is simply the file or files that you want the command to work on. Not all commands work on files, such as ssh, which takes the name of a host as its argument. Common UNIX Conventions • In UNIX, the command is almost always entered in all lowercase characters. • Typically any options come before filenames. • Many times, individual options may need a word after them to designate some additional meaning to the command. Familiar Commands: scp (Secure CoPy) • The scp command is a way to copy files back and forth between multiple computers.
    [Show full text]
  • RISA-3D Tutorials, General Reference Guide and Licensing Guide Can Be Found
    RISA-3D Tutorial – Version 19 RISA Tech, Inc. 26632 Towne Centre Drive, Suite 210 Foothill Ranch, California 92610 Phone: (949) 951-5815 Email: [email protected] risa.com Copyright © 2020, RISA Tech, Inc. All Rights Reserved. RISA is part of the Nemetschek Group . RISA, the RISA logo and RISA-3D are registered trademarks of RISA Tech, Inc. All other trademarks mentioned in this publication are the property of their respective owners. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording, or otherwise, without the prior written permission of RISA Tech, Inc. Every effort has been made to make this publication as complete and accurate as possible, but no warranty of fitness is implied. The concepts, methods, and examples presented in this publication are for illustrative and educational purposes only and are not intended to be exhaustive or to apply to any particular engineering problem or design. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. RISA Tech, Inc. assumes no liability or responsibility to any person or company for direct or indirect damages resulting from the use of any information contained herein. Table of Contents Table of Contents Table of Contents ............................................................................................................................................................. i Online Help ........................................................................................................................................................................
    [Show full text]
  • Gnucobol 3.1.2 [23Dec2020] Build Guide for MSYS2 64-Bit
    GnuCOBOL 3.1.2 Build Guide for MSYS2 64-bit (draft) GnuCOBOL 3.1.2 [23Dec2020] Build Guide for MSYS2 64-bit - Minimalist GNU for Windows GCC version (MinGW) "10.2.0" cobc (GnuCOBOL) 3.1.2 Copyright (C) 2020 Free Software Foundation, Inc. Written by Keisuke Nishida, Roger While, Ron Norman, Simon Sobisch, Edward Hart. This document was prepared by: Arnold J. Trembley ([email protected]) and last updated Wednesday, 30 December 2020. Special thanks go to Simon Sobisch, the GnuCOBOL project leader, who built the "pacman" package and answered numerous questions for me. This procedure will build a 64-bit MSYS2 MinGW GnuCOBOL 3.1.2 compiler on Windows, with gmplib, ncurses, and Oracle Berkeley Database (for Indexed Sequential file access support). STEP01 - Download MSYS2/MinGW64 Go to http://www.msys2.org/ and download "msys2-x86_64-20201109.exe" "msys2-x86_64-20201109.exe" STEP02 - Disable Anti-Virus (optional) Close all web browsers and disable real-time Anti-Virus scanning. STEP03 - Install MSYS2/MinGW64 Install "msys2-x86_64-20201109.exe" into the default "C:\msys64" folder. Accept the default start menu shortcut folder "MSYS2 64bit". (You can actually install this to ANY folder on ANY drive letter, but for my example I am using the supplied default of "C:\msys64". ) Then click on "run MSYS2 64-bit now" and click on finish. This should open the bash shell window for you. Page 1 GnuCOBOL 3.1.2 Build Guide for MSYS2 64-bit (draft) STEP04 - Apply MSYS2 Updates In the bash shell, run "pacman -Syu" Answer "Y" to "Proceed with installation?" After installation finishes, shut down MSYS2, and start it up again.
    [Show full text]