TheUrbanPenguin : Video Tutorials Linux, Windows, Novell and Citrix
All commands
Linux Newbie Guide: Shortcuts And Commands
[an error occurred while processing this directive] Linux Shortcuts and Commands: Linux Newbie Administrator Guideby Stan and Peter Klimas This is a practical selection of the commands we use most often. Legend:<> = single special or function key on the keyboard. Notes for the UNIX Clueless:1. 7.1 Linux essential shortcuts and sanity commands <Ctrl><Alt><F1>Switch to the first text terminal. <Ctrl><Alt><Fn> (n=1..6) Switch to the nth text terminal. ttyPrint the name of the terminal in which you are typing this command. <Ctrl><Alt><F7>Switch to the first GUI terminal (if X-windows is running on this terminal). <Ctrl><Alt><Fn> (n=7..12) Switch to the nth GUI terminal (if a GUI terminal is running on screen n-1). <Tab>(In a text terminal) Autocomplete the command if there is only one option, or else show all the available options. <ArrowUp>Scroll and edit the command history. <Shift><PgUp>Scroll terminal output up. <Shift><PgDown>Scroll terminal output down. exitLogout. . .. lsmod(As root. .
Extenseur CPL Wifi
-Compatible avec la norme Homeplug AV, vitesse de transfert de données jusqu'à 200 Mbps -Avec son format de poche et son nouvel habillage, il se fond parfaitement devant n’importe quelle prise électrique -Aucun nouveau fil, installation Plug-and-Play facile, aucune configuration nécessaire Fonctions L'extenseur CPL sans fil N TL-WPA281 de TP-LINK permet d'étendre la connexion Internet à toutes les pièces reliées au réseau électrique. Jusqu’à 200 Mbps et 300 mètres Grâce à la technologie HomePlug AV avancée, le TL-WPA281 offre aux utilisateurs des vitesses de transfert de données stables allant jusqu’à 300 Mbps sur une longueur de ligne pouvant atteindre 300 mètres. Vitesse sans fil N 300 Mbps : étendez votre couverture sans fil Avec une vitesse sans fil jusqu'à 300 Mbps, les utilisateurs peuvent étendre facilement leur réseau via le réseau électrique existant et diffuser un signal sans fil vers d'autres zones auparavant inaccessibles de leur domicile ou bureau. Streaming vidéo HD multiple
Learn Linux, 101: The Linux command line
Overview This article gives you a brief introduction to some of the major features of the bash shell, and covers the following topics: Interacting with shells and commands using the command lineUsing valid commands and command sequencesDefining, modifying, referencing, and exporting environment variablesAccessing command history and editing facilitiesInvoking commands in the path and outside the pathUsing man (manual) pages to find out about commands This article helps you prepare for Objective 103.1 in Topic 103 of the Junior Level Administration (LPIC-1) exam 101. Back to top The bash shell The bash shell is one of several shells available for Linux. Before we delve deeper into bash, recall that a shell is a program that accepts and executes commands. Shells have some builtin commands, such as cd, break, and exec. Shells also use three standard I/O streams: Input streams provide input to programs, usually from terminal keystrokes. Listing 1. [db2inst1@echidna db2inst1]$ ian@lyrebird:~> $
Linux Live for CD & USB
Hébergement Internet, Cloud, et Serveurs dédiés
Malicious Linux Commands -
From (This article was originally published in Ubuntu Forums but was removed there. Ubuntuguide feels that knowledge about these risks is more important than any misguided attempts to "protect the public" by hiding their potential dangers or protect the (K)Ubuntu/Linux image. The original article has therefore been re-created (and subsequently edited) here.) ATTENTION: It is worthwhile to have some basic awareness about malicious commands in Linux. It is also worthwhile to always enable a Kubuntu screensaver or Ubuntu screensaver with a password so that a casual passerby is not able to maliciously execute one of these commands from your keyboard while you are away from your computer. When in doubt as to the safety of a recommended procedure or command, it is best to verify the command's function from several sources, such as from readily available documentation on Linux commands (e.g. manpages). Here are some common examples of dangerous commands that should raise a red flag. rm -r In Perl
Kernel links
Juan-Mariano de Goyeneche < jmseyas@dit.upm.es > /* * The latest version of this document may be found at: * */ The need for a document like this one became apparent in the linux-kernel mailing list as the same questions, asking for pointers to information, appeared again and again. Fortunately, as more and more people get to GNU/Linux, more and more get interested in the Kernel. But reading the sources is not always enough. It is easy to understand the code, but miss the concepts, the philosophy and design decisions behind this code. Unfortunately, not many documents are available for beginners to start. Please, if you know any paper not listed here or write a new document, send me an e-mail , and I'll include a reference to it here. The papers that follow are listed in no particular order. Enjoy! : "Iptables-tutorial" : Oskar Andreasson. : : iptables, netfilter, firewalls. : "The Linux Kernel"