8/30/2020

Top System Related Commands In Linux With Descriptive Definitions


Commands are just like an instructions given to a system to do something and display an output for that instruction. So if you don't know how to gave an order to a system to do a task then how it can do while you don't know how to deal with. So commands are really important for Linux users. If you don't have any idea about commands of Linux and definitely you also don't know about the Linux terminal. You cannot explore Linux deeply. Because terminal is the brain of the Linux and you can do everything by using Linux terminal in any Linux distribution. So, if you wanna work over the Linux distro then you should know about the commands as well.
In this blog you will get a content about commands of Linux which are collectively related to the system. That means if you wanna know any kind of information about the system like operating system, kernel release information, reboot history, system host name, ip address of the host, current date and time and many more.

Note:

If you know about the command but you don't have any idea to use it. In this way you just type the command, then space and then type -h or --help or ? to get all the usage information about that particular command like "uname" this command is used for displaying the Linux system information. You don't know how to use it. Just type the command with help parameter like: uname -h or uname --help etc.

uname 

The "uname" is a Linux terminal command responsible of displaying the information about Linux system. This command has different parameter to display a particular part of information like kernel release (uname -r) or all the information displayed by typing only one command (uname -a).

uptime

This command is used to show how long the system has been running and how much load on it at current state of the CPU. This command is very useful when you system slows down or hang etc and you can easily get the info about the load on the CPU with the help of this command.

hostname

The "hostname" is the the command in Linux having different parameters to display the information bout the current host which is running the kernel at that time. If you wanna know about the parameters of hostname command then you just type hostname --help or hostname -h to get all the info about the command and the usage of the command.

last reboot

The "last reboot" is the command in Linux operating system used to display the reboot history. You just have to type this command over the Linux terminal it will display the reboot history of that Linux system.

date

The "date" is the command used in Linux operating system to show the date of the day along with the current time of the day.

cal

The "cal" command in Linux used to display the calendar which has the current date highlighted with a square box along with a current month dates and days just like a real calendar.

w

The "w" is the command used in Linux distro for the sake of getting the information about current user. If you type this command it will display who is online at the time.

whoami

The "whoami" is the command in Linux operating system used to show the information that who you are logged in as. For example if you are logged in as a root then it'll display "root" etc.

finger user

The "finger user" is the command used in Linux distribution to display the information about user which is online currently over that Linux system.

Related news

OVER $60 MILLION WORTH OF BITCOINS HACKED FROM NICEHASH EXCHANGE

Over $60 Million Worth of Bitcoins Hacked from NiceHash Exchange. Bitcoin mining platform and exchange NiceHash has been hacked, leaving investors short of close to $68 million in BTC.
As the price of Bitcoin continues to rocket, surging past the $14,500 mark at the time of writing, cyberattackers have once again begun hunting for a fresh target to cash in on in this lucrative industry.
Banks and financial institutions have long cautioned that the volatility of Bitcoin and other cryptocurrency makes it a risky investment, but for successful attackers, the industry potentially provides a quick method to get rich — much to the frustration of investors.
Unfortunately, it seems that one such criminal has gone down this path, compromising NiceHash servers and clearing the company out.
In a press release posted on Reddit, on Wednesday, NiceHash said that all operations will stop for the next 24 hours after their "payment system was compromised and the contents of the NiceHash Bitcoin wallet have been stolen."
NiceHash said it was working to "verify" the precise amount of BTC stolen, but according to a wallet which allegedly belongs to the attacker — traceable through the blockchain — 4,736.42 BTC was stolen, which at current pricing equates to $67,867,781.
"Clearly, this is a matter of deep concern and we are working hard to rectify the matter in the coming days," NiceHash says. "In addition to undertaking our own investigation, the incident has been reported to the relevant authorities and law enforcement and we are co-operating with them as a matter of urgency."
"We are fully committed to restoring the NiceHash service with the highest security measures at the earliest opportunity," the trading platform added.
The company has also asked users to change their online passwords as a precaution. NiceHash says the "full scope" of the incident is unknown.
"We are truly sorry for any inconvenience that this may have caused and are committing every resource towards solving this issue as soon as possible," the company added.
Inconvenience is an understatement — especially as so much was left in a single wallet — but the moment those coins shift, we may know more about the fate of the stolen investor funds.

Related links


How To Remove Write Protection From USB Drives And Memory Cards

If you've got a USB drive or SD card that can't be formatted and to which you can't copy files, then take a look at our guide to removing write protection.

Sometimes you'll find that it's impossible to format, delete or copy new files to an SD card or USB flash drive. Windows will tell you that it is write protected, even though there is no 'lock' switch or – if there is – you've made sure the switch is set correctly to allow files to be written to the drive.
But just in case this switch is news to you, it is well worth checking that your device has the switch set to 'unlocked'. When set to 'locked' you won't be able to copy any new files on to the memory card or USB stick, and it also stops you from accidentally formatting it.
iemhacker-remove-write-protection-from-usb
You'll still be able to view files which are already stored on the drive, but you can't delete them (they sometimes seem to delete OK, but the next time you check, there they are again!).
ut if this isn't the problem, you might still be able to fix things and continue to use your USB flash drive or SD card – we'll explain how.
Unfortunately, in some cases the device may be corrupt or physically broken and no tricks or software will make it work again. The only solution in this case is to buy a new drive. And if you're just trying to get back lost data, see our guide on How to recover deleted filed for free.
iemhacker
In any version of Windows from XP onwards, run Regedit.exe.
If you're not sure how to find it, searching 'regedit' in the Start menu will usually show the program at the top of the list.
It's a bit like File Explorer, so use the pane on the left to navigate to the following key:
Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\StorageDevicePolicies
Note: if you can't find StorageDevicePolicies, see the next step.
Double-click on the WriteProtect value in the right-hand pane. You can now change the Value data from 1 to 0. Then click OK to save the change. Close Regedit and restart your computer. Connect your USB drive again and, with a bit of luck, you should find it is no longer write protected.
You can now continue to use the drive, but it's worth copying off any files you want to keep and then formatting it by right-clicking on it in the list of drives in File Explorer and choosing Format.

StorageDevicePolicies

If you can't find StorageDevicePolicies, you can create it by right-clicking in the white space in the 'Control' folder and choosing New -> Key and entering the name StorageDevicePolicies.
Now double-click on the new key (it will show as a folder) and right-click once again in the white space and choose New -> DWORD. Name this WriteProtect and set its value to 0. Click OK, exit Regedit and reboot your computer.
If this method doesn't work, go to the next step.

Diskpart

iemhacker
With your USB drive or memory card attached to your computer, launch a command prompt. You can do this by searching for cmd.exe or 'Command Prompt' in the Start menu.
Note: you may need to run cmd.exe with administrator privileges if you see an "access is denied" message. To do this, right-click on Command Prompt in the Start menu and choose 'Run as administrator' from the menu that appears.
If you have Windows 10, simply right-click on the Start button (bottom left of the screen) and choose Command Prompt (admin).
Now, at the prompt, type the following and press Enter after each command:
diskpart
list disk
select disk x (where x is the number of your non-working drive – use the capacity to work out which one it is)
attributes disk clear readonly
clean
create partition primary
format fs=fat32 (you can swap fat32 for ntfs if you only need to use the drive with Windows computers)
exit
That's it. Your drive should now work as normal in File Explorer. If it doesn't, it's bad news and there's nothing more to be done. Your stick or memory card is scrap and fit only for the bin. But the good news is that storage is cheap.

Related articles


  1. Top Pentest Tools
  2. Nsa Hack Tools Download
  3. Best Pentesting Tools 2018
  4. Best Hacking Tools 2019
  5. Hacking Tools For Games
  6. Hacking Tools Windows
  7. Beginner Hacker Tools
  8. Growth Hacker Tools
  9. Github Hacking Tools
  10. Hacker Tools Software
  11. Hack Tools Pc
  12. Hacker Tools 2019
  13. Pentest Tools Kali Linux
  14. Pentest Tools Github
  15. Hacker Tools Mac
  16. Github Hacking Tools
  17. Hacker Tools For Pc
  18. Wifi Hacker Tools For Windows
  19. Hacker Tools Github
  20. Hacking Tools Kit
  21. Hack Tools For Games
  22. Hacking Tools For Windows 7
  23. Hacking Tools For Windows
  24. Tools For Hacker
  25. Hacker Tools Linux
  26. Hack Website Online Tool
  27. Tools Used For Hacking
  28. Tools For Hacker
  29. Hacker Tool Kit
  30. Black Hat Hacker Tools
  31. Hacker Tools For Pc
  32. Pentest Recon Tools
  33. Hacker Tools Linux
  34. Hacking Tools Hardware
  35. Pentest Tools Bluekeep
  36. How To Make Hacking Tools
  37. Wifi Hacker Tools For Windows
  38. Pentest Tools Website Vulnerability
  39. Nsa Hacker Tools
  40. Hacking Tools Hardware
  41. Hacking Tools For Games
  42. How To Make Hacking Tools
  43. Hack Tools Pc
  44. Hacking Tools 2019
  45. Hack Tools 2019
  46. Pentest Tools Online
  47. World No 1 Hacker Software
  48. Hacker Tools Free Download
  49. Pentest Tools Website
  50. Hacker Tools Apk
  51. Hacking Tools Windows 10
  52. Blackhat Hacker Tools
  53. Pentest Box Tools Download
  54. Hack Tools 2019
  55. Ethical Hacker Tools
  56. Pentest Tools
  57. New Hacker Tools
  58. Pentest Tools
  59. Hacking Tools 2020
  60. Pentest Tools Website Vulnerability
  61. Hack Tools For Games
  62. Hacking Tools Pc
  63. Hacking Tools Online
  64. Hacking Tools Hardware
  65. Pentest Tools Tcp Port Scanner
  66. Pentest Tools Apk
  67. Black Hat Hacker Tools
  68. Hacker Tools For Ios
  69. Pentest Tools For Windows
  70. Hacking Tools For Windows 7
  71. Hacking Tools For Windows 7
  72. Pentest Tools For Ubuntu
  73. Hacker Tools Windows
  74. Tools For Hacker
  75. Hacking Tools For Beginners
  76. Hacking Tools For Kali Linux
  77. Pentest Reporting Tools
  78. Hack Apps
  79. Pentest Automation Tools
  80. Pentest Tools Find Subdomains
  81. Hacker Tools For Windows
  82. Pentest Tools Online
  83. Game Hacking
  84. Pentest Reporting Tools
  85. Pentest Tools Linux
  86. Hacker Tools Apk
  87. New Hacker Tools
  88. Hacking Tools 2020
  89. How To Hack
  90. Hacking Tools Name
  91. Best Pentesting Tools 2018
  92. Hacker Tools Software
  93. Hacking Tools Kit
  94. Pentest Tools Subdomain
  95. How To Make Hacking Tools
  96. Hack Tools For Pc
  97. Hack Apps
  98. Hacker Tool Kit
  99. Top Pentest Tools
  100. Hacker Techniques Tools And Incident Handling
  101. Hack Tools 2019
  102. Pentest Tools Website