Thursday, 30 January 2014

Testing Job: Pune : 1-3 Years : Magna Infotech: February 2014

An opportunity to work with a CMM level 5 organization at Pune location.
Looking for candidates having 1-3 yrs of experience in Manual Testing , candidates must have working experience on UNIX /Sql and on QC.

Preferably candidates who can join immediately or within a week.

Interested candidates share your profiles to saptamita.chandra@magna.in

Testing Job : Pune: L&T infotech : February 2014

Hope this mail finds you in best of health..

One of our Esteem Clients " L&T Infotech Ltd " are urgently looking out for professionals having good experience in Selenium Testing .

Larsen & Tubro Infotech Ltd.
Corporate Profile.
Larsen & Toubro Infotech Limited (L&T Infotech), a 100% subsidiary of the US$ 4 billion plus, Forbes Global 2000 and Business Week Asia Top 50 technology-driven engineering and construction major, Larsen & Toubro Limited, offers comprehensive, end-to-end software solutions and services. Leveraging the heritage and domain expertise of the parent company, its services encompass a broad technology spectrum, catering to leading international companies across the globe.
For Details Log to: - http://www.lntinfotech.com

*Job Profile / Requirement

Primary Skill :- Automation Testing using Selenium.
Position :- Permanent
Required Experience:- 3 -5yrs
Job Location : Pune ( Hadapsar / Hinjewadi )
Salary :- Open to discuss
Min Notice Period :- should be able to join within 30-45 days max.

If the above requirement matches your resume , plz let me know your interest for the above position and mail me your updated resume at the earliest for futher processing along with the following details ( Mandatory)

Total IT Exp :-
Total Exp in Selenium Testing :-
Current CTC :-
Expected CTC :-
Min Notice Period :-
Availability for Interview:- Yes/No.

Kindly mail me your resume on dheereshogc@gmail.com.


Warm Regards,
Dheeresh N Kuckian
dheereshogc@gmail.com

Testing Job: 2-3 Years: Pune: January 2014

We have an opening for Tester Positions with one of our MNC client in Pune.

Before applying join us on -
Linked In-
in.linkedin.com/in/prudentialinfotech/
Facebook Link-
http://www.facebook.com/Prudential.InfoTech.1

Candidate should have below Exp.....
BSS - CRM Billing Knowledge, Full life cycle testing experience within a structured testing environment (ideally V-model), Good knowledge of Unix, Oracle, SQL, Working knowledge of software Defect Tracking tools, Strong background in software testing within Unix environments and have a thorough understanding of test tools. Desirable : Strong analystical skills, Excellent verbal and written communication skills, Proven experience in client-facing roles, Performance testing is an advantage

Location: Pune


Education
B.E / B.Tech / MCA / BCA
Candidate should possess the degree from a recognized University/ Institution only


If you are interested in this opportunity, please mail us a copy of your resume in MS-Word format.
Please do this as earliest as the number openings are limited.
The following details should be clearly mention in the mail :-
Present CTC
Expected CTC
Notice Period
Current Location
Feel free to forward this mail to any of your friends who might also be interested in exploring this opportunity.

Please also connect with us on linkedin or facebook to get more job opportunity in India & Abroad-

Linked In-
in.linkedin.com/in/prudentialinfotech/
Facebook Link-
http://www.facebook.com/Prudential.InfoTech.1

You may write us to :- admin@prudentialconsultants.com for further clarifications/queries.

Thanks,
Saroj
Prudential Consultants
saroj@prudentialconsultants.com

Testing Job : Chennai : January 2014

GAVS Technologies., Chennai, We have our global operations spread across U.S.A., U.K., Middle East (Muscat), Singapore.
We have an immediate opening for Manual Testing Professionals

Required Skills
* Should have worked on Manual Testing
* Good experience in CMS ( Content Management System )
* Should have worked on any CMS tools like Documentum,Drupal Teamsite etc.
*Job Location : Chennai
* Looking for candidates who can join at the earliest.

Interested candidates please send your updated resume to renuka.v@gavsin.com with the following details
Current CTC
Expected CTC
Notice period

 

Tuesday, 28 January 2014

Testing Job: Pune: Synerzip: January 2014

We have an opportunity for you with our client Synerzip Softech India Pvt Ltd (www.synerzip.com )

Synerzip is a leading dual shore - US and India - outsource software product development and softwar testing company, based in Dallas, TX. Using the Agile development method, they create cutting-edge software products exclusively for small to mid-size technology companies.
Lead by an executive team with with over 20 years experience in the software products business and a product development team with in-depth experience in the full software development life-cycle – prototyping, design, development, QA testing, & deployment.

Over last several years, Synerzip team has assisted over 40 technology companies leverage the offshore advantage.

Our Client is looking out for Sr QA Engineer in the following skills.


Required Skills
• Ability to write detailed test plans, Automation scripts, and reports and execute test plans and document results.
• Ability to read, analyze, and interpret technical software requirements, specifications.
• Ability to understand client-server or web application
• Must understand relational database schemas and be able to write complex SQL queries
• Ability to solve practical problems and deal with a variety of concrete variables in situations where constraining parameters exist. Should be able to think out of box
• Ability to learn processes and applications quickly.
• Must have strong attention to detail.
• Test Automation Experience:
o Any Hands on scripting (Test Automation) experience on automation tool like Selenium, QTP, SAHI, SopaUI, LoadUI etc
o Strong Manual Testing skills.
QA Methodology and Process: Familiarity with Agile product development methodology will be a big plus. Should have knowledge of tools used in QA process for test case organization, bug tracking, etc.
Communication: Excellent verbal and written communication skills in English.


Job Location-Pune

Kindly let us know your willingness for the same by mailing your up dated resume including the following details:

Current CTC-
Expected CTC-
Willing to join within 15/20 days:-
Total Exp in Automation Testing:-
Date of Birth-
Current Work Location:-
Willing to relocate to Pune:-
Valid Passport:-
Have you applied to/interviewed at Synerzip earlier:-


Email to Infinite Ideas HR Solutions <jobs@infiniteideashr.com>

Testing Job: Contract To hire: Pune : January 2014

Our client which is a CMMi level 5 company is looking for a QA- Manual Tester, an immediate joinee on Contract to hire for 6 months / 1 yr.


If you find the opportunity interesting and suitable do send us your updated resume in MS-word format with following details /or you can forward this mail to friends or Colleagues.

Current CTC
Expected CTC
Notice period
Highest Degree




E-Mail to Shuken Systems <laveena.shukensys@gmail.com>

Monday, 27 January 2014

Testing Job : Pune: Tech Mahindra : 3- 7 Years : January 2014

We are looking for Telecom testers with OSS/BSS and CRM exp for Pune location.

Below is the JD for the same.

Job /Role: Sr. Tester

Required Experience: 3.5 - 7 Years


Skill required:
Functional Knowledge
* Experience in Telecom Domain, Exposure to BSS/OSS systems
* Experience in Testing of CRM application
* Understanding of Complete workflow of Order Fulfillment and Customer /account management in Telecom.
* Experience in testing of applications like Billing provisioning will be added advantage.
Process Experience:
* Understanding Functional Requirements
* Preparation of Test Plan
* Preparation of Test Scenarios
* Preparation of Test Cases
* Experience in Manual Test Execution,
* Experience in Integration Testing
* Experience in SQL and PL/SQL Testing
* Test Analysis and Reporting.

Tools and Techniques:
* Experience or exposure to following tools will be added advantage
Test Automation Tools ,Test management Tool, Integration Testing Tools and Performance testing tools .
e.g.
Rational Tools: Rational Functional Tester, Clear case, Clear Quest, Test Manager, etc.
HP Tools: Quality Centre, Quick Test Professional, Service Test, etc.
Other Frame work / Tools: JUnit SOAP, UI, JMeter ,etc.

* Knowledge in Scripting Language: E.g. Jscript,Unix Shell Scripts ,etc.

Interested candidates, please share your updated resume with following details:

Passport No.:
Date of birth:
Current CTC:
Expected CTC:
Notice period:
Current City:
Preferred City:


Mail to "Tech Mahindra Ltd." <akankshya.lavania@techmahindra.com>

Thursday, 23 January 2014

Testing Job ; Pune : 3-5 Years: January 2014

Please find the Job Description below:
Sr. QA Engg
Experience: 3 - 5 Years

Required Skills :

* Ability to write detailed test plans, Automation scripts, and reports and execute test plans and document results.
* Ability to read, analyze, and interpret technical software requirements, specifications.
* Ability to understand client-server or web application
* Must understand relational database schemas and be able to write complex SQL queries
* Ability to solve practical problems and deal with a variety of concrete variables in situations where constraining parameters exist. Should be able to think out of box
* Ability to learn processes and applications quickly.
* Must have strong attention to detail.
* Test Automation Experience:
o Any Hands on scripting (Test Automation) experience on automation tool like Selenium, QTP, SAHI, SopaUI, LoadUI etc
o Strong Manual Testing skills.
QA Methodology and Process: Familiarity with Agile product development methodology will be a big plus. Should have knowledge of tools used in QA process for test case organization, bug tracking, etc.

Communication: Excellent verbal and written communication skills in English.

If available & interested send me your updated copy of profile with the following mentioned details:

Total Exp:
Relevant Exp:
Current CTC:
Expected CTC:
Notice Period:







snehal.dalbhanjan@workforce-asia.com

Testing Job: Mumbai : 3-5 Years of Exp : January 2014

Job Location:  Mumbai


Candidate Skill Requirements: Manual Testing 


Experience: 3 to 5 yrs


You are interested to take it ahead please send me your latest profile in word format furnishing the following details:
1. Current CTC:
2. Expected CTC:
3. Notice Period:
4. Reason for Change:
5. Willingness to attend interview on a weekday:
6. Total Exp :
7. Rel Manual Testing Exp :
8. Sql Exp :



If you find the job profile as per your needs then apply to rashmi.mehta.mum@sampoorna.com. If you feel that this job opening is unsuitable for your skill set or experience level please update your profile in the Sampoorna Database to prevent such mismatches in the future. The profile can be updated by logging on to the sampoorna site.

Monday, 20 January 2014

Testing Job (Performance Testing): Pune : 3+ Years : January 2014

Greetings from Survik Software!

We are looking for Performance Tester for our renowned client in Pune.

Exp required:3+Yrs

Job location : Pune

Skills: Performance Testing with VSTS exposure

Position : Contract to Hire

Kindly revert with your updated resume and following details if keen in this job position.
1.Current comapny:
2.Current CTC:
3.Expected CTC:
4.Notice period:
5.Reason for change:



Email to  alka.yadav@survik.com

Friday, 10 January 2014

Performance Testing: 2+Years Experience: Addeco : Pune: January 2014

Client who is a World leader in providing Telecom Service is looking for candidates like you who has good experience as Software Tester with good experience in Performance Testing using Load Runner in Telecom domain.

Skills:

Performance Testing
HP Load Runner
Telecom Domain(OSS/BSS/Web Testing)
Ideally NFT(Non Functional Testing) experience

Job Location: Pune
Experience: 2+yrs

If you want to be part of this great team please send me your updated CV with following details:

Current CTC:
Expected CTC:
Notice Period:
Highest Degree with passing year:
University Name:
DOB:
Any offers in hand:


If you are not looking for change please share the same with anyone who might be interested in the same.

Mail your resume to nitin.bindal@adecco.co.in

Testing Job: 3-5 Years Experience:Vision Consulting: Opening in a MNC: Pune: January 2014

Greetings!!


Vision Ahead Consultants is a leading Manpower Recruitment Agency in Pune, India having its Clients in all major Software Companies, OEM's, MNC's & Auto Components industries across Maharashtra.

We have urgent opening of "Engineer - Quality assurance' for our Client Company its MNC in pune .

Notice Period : 30 Days(Official NP) or less then candidate will apply .
Job Location: Pune

- Total 3-5 Yrs of Industry experience.
- Manual Testing Required
- Oracle Database concept has to be very clear.
- Experience in SQL must
- C/C++ Strong Knowledge . (Preferred)
- 1 year experience in Scripting ( Shell/Perl/Python) Any
- Linux based system
- Very Good SQL knowledge (SQL and PL SQL) and SQL client tools is a must.
- Well awareness of Automation test tools.
- Strong in QA Processes planning, scripting, testing and bug tracking.
- Execute stress and load tests, analyze results and prepared test result reports.
- Document tests results and advise on alternatives to improve as warranted.

If you are interested and ready to relocate, so please confirm and send your updated resume along with your
1. Total Experience
2. Relevant Experience
3. Present CTC
4. Expected CTC
5. Notice Period
6. Current Location
7. Details about salary hike/Appraisal
8. Any offer (Yes/No)

If you are not interested, kindly forward this mail to other relevant candidates you know.
In case you have any queries please feel free to call us between 10.00 am to 5.30pm.


---
Regards
Meenakshi Chauhan
Vision Ahead Consultants
(M) : +91-8793049995
(L) : +91-2064016100
(W) : VisionAhead.Co.In

Testing Job: Vision Consulting : Opening in an MNC: 3-5 Years Experience: Pune : January 2014

Greetings!!


Vision Ahead Consultants is a leading Manpower Recruitment Agency in Pune, India having its Clients in all major Software Companies, OEM's, MNC's & Auto Components industries across Maharashtra.

We have urgent opening of "Engineer - Quality assurance' for our Client Company its MNC in pune .

Notice Period : 30 Days(Official NP) or less then candidate will apply .
Job Location: Pune

- Total 3-5 Yrs of Industry experience.
- Manual Testing Required
- Oracle Database concept has to be very clear.
- Experience in SQL must
- C/C++ Strong Knowledge . (Preferred)
- 1 year experience in Scripting ( Shell/Perl/Python) Any
- Linux based system
- Very Good SQL knowledge (SQL and PL SQL) and SQL client tools is a must.
- Well awareness of Automation test tools.
- Strong in QA Processes planning, scripting, testing and bug tracking.
- Execute stress and load tests, analyze results and prepared test result reports.
- Document tests results and advise on alternatives to improve as warranted.

If you are interested and ready to relocate, so please confirm and send your updated resume along with your
1. Total Experience
2. Relevant Experience
3. Present CTC
4. Expected CTC
5. Notice Period
6. Current Location
7. Details about salary hike/Appraisal
8. Any offer (Yes/No)

If you are not interested, kindly forward this mail to other relevant candidates you know.
In case you have any queries please feel free to call us between 10.00 am to 5.30pm.





Mail your resumes to meenakshi@visionahead.co.in

 
Vision Ahead Consultants
(M) : +91-8793049995
(L) : +91-2064016100
(W) : VisionAhead.Co.In

Testing Job: IBM: 1+ Year Experience: Gurgoan : January 2014

Greetings from Atlas Systems.

Currently we do have the following requirement for us (WWW.ATLASSYSTEMS.COM - SOFTWARE DEVELOPMENT COMPAY) at Gurgaon(Our client IBM) location.


Job Title                              : Manual/Automation and SQL
Relevant Experience      : 1Yrs (Minimum)
Job Location                       : Pune
Required documents     : Updated Profile (Should have all the skills in the projects) and scan copy of your photo ID (Passport/PAN card/Driving Licence).

Please provide below details to speed up the process.

Attended interview with IBM before:-
Total yrs of exp. In Skills 3:
Total yrs of exp. In Skills 3:
Passport Number &Pan Card Number (Mandatory): -
Current Location  & Preferred Location:-
Current CTC /Expected CTC :-
Notice Period (preferred Immd joinees) :-

Kindly ignore if you have already received this email or applied. We appreciate, if you can refer or forward to your friends who would be suitable for the position.

Mobile Testers : 1-5 Years : Pune: January 2014

Greetings from AgreeYa Mobility.

We are hiring for Mobile Application Developer-Android @ AgreeYa Mobility_Pune.

JOB DESCRIPTION:

Work Location: Pune
Designation: Android Developer/Software Engineer
Total Experience: 1-5 Yrs

Required Skills:
Experience of working on Android for at least 1+ Years
Experience of working on Android Developer
Experience in JNI (good to have)
Expert in Java
Expert in Object Orientated Concepts
Excellent Programming Skills
Exposure to Design Patterns
Sound Operating System Fundamentals
Ability to thrive in high pressure scenario
Minimally Bachelor's degree in computer science or related technical field.

Hope you are interested in the above mention position. Please reply to us with your updated profile with following details.

Current CTC :
Exp CTC :
Notice Period :
Total Exp :
Relevant Exp on ASP.Net :
Experience on C#.net:
Experience on HTML5, Jquery, CSS3:
Current Location:
Ready to relocate :



Mail you resume to career@agreeyamobility.net

Tech Mahindra Testing Walkin in Mumbai for 3-8 Years

Greeting from Tech Mahindra Recruitment Team!!
WALK-IN INTERIVIEW FOR 3-8 YRS EXP Mobile Application Tester / Test Lead ON 11th Jan, 2014 (Saturday)

Job Location : 
Mumbai

Build your career by working in large setup for Big Testing Engagement

Interested Candidates need to Click on the Apply link to register as a confirmation of your arrival for the interview.

INTERVIEW DETAILS:

Timing :
9:45 AM to 12:30 PM
Contact Peron : Amar Sinha

Mumbai Office Address for Interview:

Tech Mahindra
Wing 1, Oberoi Estate Gardens,
Chandivali, Andheri (E),
Mumbai-72


Eligibility Criteria
Experience Range: 3- 8 Yrs
Job Location : Mumbai
Educational Qualification: BE/B.Tech/ M.Tech / MCA/ MSC

Required Skills
Mobile Application Testing
Should be able to Test Native application for Smart Phones.
Should have good understanding of 3G / LTE technologies.
Should have worked with Android/ IPhone / Windows Phone Application Testing. 

Documents need to be carried at the Time of interview. Hard Copy of the resume.
Releasing & experience letter of previous organizations. ( Document should contain the duration of the employment; joining and the exit date. )
Present organization offer letter.
Present organization Latest Salary Revision Letter .
Present organization Latest salary slip.
Degree certificate of your highest qualification. ( Pursued full time )
Marks sheet of your highest qualification. (Pursued full time )
Degree certificate of your highest qualification. (Pursued through Distance learning - If applicable )
Marks sheet of your highest qualification. (Pursued through Distance learning - If applicable )
Passport Copy. ( first and last page )
2 Passport size photograph.
Current address proof. ( Not Required of the Passport address is same as current address )

Regards
Recruitment Team
Tech Mahindra

Testing Job : Pune : 1-3 Years : January 2014

Web Site Tester. 

Looking for people around 1 year of experience....(They should have worked on atleast 2 websites ) 

Responsibilities: Design and executive test plans on Web site Modules Record and document results and compare to expected results. 
Detect failures so that defects may be discovered and corrected. 
Generate historical analysis of test results.Document anomalies and issues. 
Maintain database of software defects.Verify specific action or function of code.Operate and maintain test networks. 
Provide application instructions for users. 
Develop and document application test plans based on software requirements and technical specifications. 
Participate in application planning meetings. 
Ensure data integrity standards. 

Email ur resume to anushka@hralways.com

Tuesday, 7 January 2014

Unix Commands - Consolidated




UNIX Commands


1) ^D - indicates end of data stream; can log a user off. The latter is disabled on many systems
^C - interrupt
^U -Control-U is normally the "line-kill" signal for your terminal. When typed it erases the entire input
logout - leave the system
exit - leave the shell
-----------------------------------------------------------------------------------------------------------------------------------------
2) id
 id - return user identity
You can determine your userid and the list of groups you belong to with the id and groups commands.
The format in which we get as o/p is

   "uid=%u(%s) gid=%u(%s)\n" <real user ID>, <user-name>,
         <real group ID>, <group-name>
eg :
$ id
uid=1005(tibadmin) gid=1(other)

$ id -a ( Reports user name, user  ID and all the  groups  to which the user belongs.)
uid=1005(tibadmin) gid=1(other) groups=1(other)
------------------------------------------------------------------------------------------------------------------------------------------
3) man
The Unix manual, usually called man pages, is available on-line to explain the usage of the Unix system and commands.
Syntax
man [options] command_name
------------------------------------------------------------------------------------------------------------------------------------------
4) cd [directory] ---change directory
You can change to a new directory with the cd command. cd will accept both absolute and relative path names.
cd -----changes to user's home directory
cd / ---changes directory to the system's root
cd .. ---goes up one directory level
cd ../.. --goes up two directory levels
cd /full/path/name/from/root changes directory to absolute path named (note the leading slash)
cd path/from/current/location changes directory to path relative to current location (no leading
slash)
cd ~--------username/directory changes directory to the named username's indicated directory
------------------------------------------------------------------------------------------------------------------------------------------
5) ls [options] [directory or file] list directory contents or file permissions
At any time you can determine where you are in the file system hierarchy with the pwd, print workingdirectory, command.
------------------------------------------------------------------------------------------------------------------------------------------
6) mkdir [options] --directory make a directory
You extend your home hierarchy by making sub-directories underneath it. This is done with the mkdir command. Again, you specify either the full or relative path of the directory:
Syntax
mkdir [options] directory
------------------------------------------------------------------------------------------------------------------------------------------
7) pwd ---- print working (current) directory
To find out your current location—that is the directory in which you are currently working
------------------------------------------------------------------------------------------------------------------------------------------
8) rmdir [options] directory -------remove a directory
A directory needs to be empty before you can remove it. If it’s not, you need to remove the files first.Also, you can’t remove a directory if it is your present working directory; you must first change outof it.
Syntax
rmdir directory
------------------------------------------------------------------------------------------------------------------------------------------
9) ls ------list
The command to list your directories and files is ls. With options it can provide information about the size, type of file, permissions, dates of file creation, change and access.
-a lists all files, including those beginning with a dot (.)---hidden files
-d lists only names of directories, not the files in the directory
-g displays Unix group assigned to the file, requires the -l option (BSD only)
-l long listing: lists the mode, link information, owner, size, last modification (time). If the file is a symbolic link, an arrow (-->) precedes the pathname
-c list in columns
-s to ascertain the size of the file,The size indicated is the number of kilobytes, rounded upward, for each file
-F Adding the -F flag to ls appends suffixes to certain filenames so that you can ascertain more easily what types of files they are.
-m This flag outputs the files as a comma-separated list

File syntax :
if file ends with /  ---directory
                        * ---executable prog
                        @---is a symbolic link to another file or directory

staying in the same directory and searching the file :
ls -F \tibco
ls -F ..
------------------------------------------------------------------------------------------------------------------------------------------
10) chgrp [options] group file change the group of the file
------------------------------------------------------------------------------------------------------------------------------------------
11) chown [options] owner file change the ownership of a file; can only be done by the superuser
------------------------------------------------------------------------------------------------------------------------------------------
12) Rmdir -remove any directory for which you have appropriate permissions
--To remove a directory, you must first remove all files therein using the rm command.
--There’s no way to restore a directory you’ve removed
--The rmdir command removes only directories that are empty
------------------------------------------------------------------------------------------------------------------------------------------
13) cp [options] file1 file2
copy file1 into file2; file2 shouldn't already exist. This command creates or overwrites file2.
The format of a cp command is to specify first the name of the file you want to copy and then the new filename. Both names must be either relative filenames or absolute filenames.
--Copy the contents of one file to another with the cp command.
--Cant copy directories
--Can copy many files at once if you specify a directory as the destination rather than specifying a new filename.
Syntax
cp [options] old_filename new_filename
Common Options
-i interactive (prompt and wait for confirmation before proceeding)
-r recursively copy a directory
------------------------------------------------------------------------------------------------------------------------------------------
14) mv [options] file1 file2
move file1 into file2
--Rename a file with the move command, mv.
--Rather than creating multiple copies of the files you’re copying, mv physically relocates them from the old directory to the new.
Syntax
mv [options] old_filename new_filename
Common Options
-i interactive (prompt and wait for confirmation before proceeding)
-f don’t prompt, even when copying over an existing target file (overrides -i)
------------------------------------------------------------------------------------------------------------------------------------------
15) rm [options] file remove (delete) a file or directory
(-r recursively deletes the directory and its contents)
(-i prompts before removing files)
--Remove a file with the rm, remove, command.
--The rm command removes files permanently
--You can remove more than one file at a time by specifying each of the files to the rm command
Syntax
rm [options] filename
Common Options
-i interactive (prompt and wait for confirmation before proceeding)
-r recursively remove a directory, first removing the files and subdirectories beneath it (but all files and directories inside it as well, to be removed.)
-f don’t prompt for confirmation (overrides -i)
------------------------------------------------------------------------------------------------------------------------------------------
16) chmod - change file permissions
The command to change permissions on an item (file, directory, etc) is chmod (change mode). The syntax involves using the command with three digits (representing the user (owner, u) permissions,the group (g) permissions, and other (o) user's permissions) followed by the argument (which may
be a file name or list of files and directories). Or by using symbolic representation for the permissions and who they apply to.

chmod [who]op[perm] [argument list]
--- No access is allowed
r-- Read-only access
r-x Read and execute access, for programs and shell scripts
rw- Read and write access, for files
rwx All access allowed, for programs
Interpretation of the following few examples should help:
-rw------- 1 taylor 3843 Oct 10 16:22 iecc.list
-rw-rw-r-- 1 taylor 280232 Oct 10 16:22 mailing.lists
-rw-rw---- 1 taylor 1031 Oct 7 15:44 newlists
-rwxr-x--- 1 taylor 64 Oct 9 09:31 the.script
The first file, iecc.list, has read and write permission for the owner (taylor) and is off-limits
to all other users. The file mailing.lists offers similar access to the file owner (taylor) and
to the group but offers read-only access to everyone else on the system. The third file,
newlists, provides read and write access to both the file owner and group, but no access to
anyone not in the group.
The fourth file on the list, the.script, is a program that can be run by both the owner and
group members, read (or copied) by both the owner and group, and written (altered) by the
owner. In practice, this probably would be a shell script, as described earlier, and these
permissions would enable the owner (taylor) to use an editor to modify the commands
therein. Other members of the group could read and use the shell script but would be denied
access to change it.
------------------------------------------------------------------------------------------------------------------------------------------
17) chown - change ownership
Ownership of a file can be changed with the chown command. On most versions of Unix this can only be done by the super-user, i.e. a normal user can’t give away ownership of their files. chown is used as below, where # represents the shell prompt for the super-user:
Syntax
chown [options] user[:group] file
------------------------------------------------------------------------------------------------------------------------------------------
18) cat [options] file concatenate (list) a file
Display the contents of a file with the concatenate command, cat.
Syntax
cat [options] [file]
Common Options
-n precede each line with a line number
-v display non-printing characters, except tabs, new-lines, and form-feeds
-e display $ at the end of each line (prior to new-line) (when used with -v option)
------------------------------------------------------------------------------------------------------------------------------------------
19) echo [text string] echo the text string to stdout
The echo command is used to repeat, or echo, the argument you give it back to the standard output device. It normally ends with a line-feed, but you can specify an option to prevent this.
Syntax
echo [string]
------------------------------------------------------------------------------------------------------------------------------------------
20) head [-number] file
--display the first 10 (or number of) lines of a file
head displays the head, or start, of the file.
head [options] file
Common Options
-n number number of lines to display, counting from the top of the file
21) more (or less or pg) [options] file page through a text file
------------------------------------------------------------------------------------------------------------------------------------------
22) tail [options] file display the last few lines (or parts) of a file
tail displays the tail, or end, of the file.
Syntax
tail [options] file
Common Options
-number number of lines to display, counting from the bottom of the file
------------------------------------------------------------------------------------------------------------------------------------------
23) date [options] report the current date and time
------------------------------------------------------------------------------------------------------------------------------------------
24) df [options] [resource] report the summary of disk blocks and inodes free and in use
df is used to report the number of disk blocks and inodes used and free for each file system. The
output format and valid options are very specific to the OS and program version in use.
Syntax
df [options] [resource]
Common Options
-l local file systems only (SVR4)
-k report in kilobytes (SVR4)
------------------------------------------------------------------------------------------------------------------------------------------
25) du [options] [directory or file] report amount of disk space in use+
du reports the amount of disk space in use for the files or directories you specify.
Syntax
du [options] [directory or file]
Common Options
-a display disk usage for each file, not just subdirectories
-s display a summary total only
-k report in kilobytes (SVR4)
------------------------------------------------------------------------------------------------------------------------------------------
26) hostname/uname display or set (super-user only) the name of the current machine
------------------------------------------------------------------------------------------------------------------------------------------
27) kill [options] [-SIGNAL] [pid#] [%job] send a signal to the process with the process id number (pid#) or job
control number (%n). The default signal is to kill the process.
kill sends a signal to a process, usually to terminate it.
Syntax
kill [-signal] process-id
------------------------------------------------------------------------------------------------------------------------------------------
28) man [options] command show the manual (man) page for a command
------------------------------------------------------------------------------------------------------------------------------------------
29) passwd [options] set or change your password
------------------------------------------------------------------------------------------------------------------------------------------
30) ps [options] show status of active processes
ps is used to report on processes currently running on the system. The output format and valid
options are very specific to the OS and program version in use.
Syntax
ps [options]
------------------------------------------------------------------------------------------------------------------------------------------
31) script file saves everything that appears on the screen to file until exit is executed
script creates a script of your session input and output. Using the script command, you can capture
all the data transmission from and to your terminal screen until you exit the script program. This can
be useful during the programming-and-debugging process, to document the combination of things
you have tried, or to get a printed copy of it all for later perusal.
Syntax
script [-a] [file] <. . .> exit
------------------------------------------------------------------------------------------------------------------------------------------
32) whereis [options] command report the binary, source, and man page locations for the command
named
----------------------------------------------------------------------------------------------------------------------------------------------
33) which command reports the path to the command or the shell alias in use
----------------------------------------------------------------------------------------------------------------------------------------------
34) who or w report who is logged in and what processes are running
J10BCPNCAP $ who
root       console      Apr 26 10:17
tibadmin   pts/17       Jun 30 09:37    (10.8.149.62)
oracle     pts/18       Jun 27 14:24    (10.8.85.140)
tibadmin   pts/19       Jun 30 10:09    (10.8.149.154)
tibadmin   pts/21       Jun 30 15:11    (10.8.149.91)
tibadmin   pts/26       Jun 30 12:10    (10.8.74.107)
tibadmin   pts/27       Jun 30 12:55    (10.8.74.107)
----------------------------------------------------------------------------------------------------------------------------------------------
35) grep
 The grep utility is used to search for generalized regular expressions occurring in Unix files.The egrep utility provides searching capability using an extended set of meta-characters. The syntax of the grep utility, some of the available options, and a few examples are
shown below.
Syntax
grep [options] regexp [file[s]]
Common Options
-i ignore case
-c report only a count of the number of lines containing matches, not the
matches themselves
-v invert the search, displaying only lines that do not match
-n display the line number along with the line on which a match was found
-s work silently, reporting only the final status:
0, for match(es) found
1, for no matches
2, for errors
-l list filenames, but not lines, in which matches were found
----------------------------------------------------------------------------------------------------------------------------------------------
36) whoami
J10BCPNCAP $ whoami
tibadmin
----------------------------------------------------------------------------------------------------------------------------------------------
37) who am i
J10BCPNCAP $ who am i
tibadmin   pts/21       Jun 30 15:11    (10.8.149.91)
----------------------------------------------------------------------------------------------------------------------------------------------
38) id
The purpose of
this command is to tell you what group or groups you’re in and the numeric identifier for your account name (known as your user ID number or user ID). Enter id and see what you get. I get the following result:
% id
uid=211(taylor) gid=50(users0) groups=50(users0)
%
J10BCPNCAP $ id
uid=1005(tibadmin) gid=1(other)
----------------------------------------------------------------------------------------------------------------------------------------------
39) users-which lists the account names of all people using the system:
J10BCPNCAP $ users  
root tibadmin oracle tibadmin tibadmin tibadmin tibadmin
----------------------------------------------------------------------------------------------------------------------------------------------
40) w
 w is a complex command which summarizes information
This is a much more complex command, offering more information than either users or who. Notice that the output is broken into different areas. The first line summarizes the status of the system and, rather cryptically, the number of programs that the computer is running at one time. Finally, for each user, the output indicates the user name, the tty, when the user logged in to the system, how long it’s been since the user has done anything (in minutes and seconds), the combined CPU time of all jobs the user has run, and the amount of CPU time taken by the
current job. The last field tells you what you wanted to know in the first place: what are the users doing?

  3:18pm  up 65 day(s), 11:12,  7 users,  load average: 1.39, 1.42, 1.43
User     tty           login@  idle   JCPU   PCPU  what
root     console      26Apr1165days                -sh
tibadmin pts/17        9:37am  5:40      1      1  tail -100f SUBSCRIPTION_DTH-Proc
oracle   pts/18       Mon 2pm 3days                oracleSDP (DESCRIPTION=(LOCAL=YE
tibadmin pts/19       10:09am  5:09      1      1  tail -f SUBSCRIPTION_DTH-Process
tibadmin pts/21        3:11pm                      w
tibadmin pts/26       12:10pm  3:07                -sh
tibadmin pts/27       12:55pm  2:22                less ICCM_BW-ICCM_BW.log
----------------------------------------------------------------------------------------------------------------------------------------------
41) cal
shows a simple calendar for the month or year specified.
eg:
$ cal
   June 2011
 S  M Tu  W Th  F  S
          1  2  3  4
 5  6  7  8  9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30

For a particular month cal [ [month] year ]
$ cal 3 1988
   March 1988
 S  M Tu  W Th  F  S
       1  2  3  4  5
 6  7  8  9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31

cal 2007
                                2007

         Jan                    Feb                    Mar
 S  M Tu  W Th  F  S    S  M Tu  W Th  F  S    S  M Tu  W Th  F  S
    1  2  3  4  5  6                1  2  3                1  2  3
 7  8  9 10 11 12 13    4  5  6  7  8  9 10    4  5  6  7  8  9 10
14 15 16 17 18 19 20   11 12 13 14 15 16 17   11 12 13 14 15 16 17
21 22 23 24 25 26 27   18 19 20 21 22 23 24   18 19 20 21 22 23 24
28 29 30 31            25 26 27 28            25 26 27 28 29 30 31

         Apr                    May                    Jun
 S  M Tu  W Th  F  S    S  M Tu  W Th  F  S    S  M Tu  W Th  F  S
 1  2  3  4  5  6  7          1  2  3  4  5                   1  2
 8  9 10 11 12 13 14    6  7  8  9 10 11 12    3  4  5  6  7  8  9
15 16 17 18 19 20 21   13 14 15 16 17 18 19   10 11 12 13 14 15 16
22 23 24 25 26 27 28   20 21 22 23 24 25 26   17 18 19 20 21 22 23
29 30                  27 28 29 30 31         24 25 26 27 28 29 30

         Jul                    Aug                    Sep
 S  M Tu  W Th  F  S    S  M Tu  W Th  F  S    S  M Tu  W Th  F  S
 1  2  3  4  5  6  7             1  2  3  4                      1
 8  9 10 11 12 13 14    5  6  7  8  9 10 11    2  3  4  5  6  7  8
15 16 17 18 19 20 21   12 13 14 15 16 17 18    9 10 11 12 13 14 15
22 23 24 25 26 27 28   19 20 21 22 23 24 25   16 17 18 19 20 21 22
29 30 31               26 27 28 29 30 31      23 24 25 26 27 28 29
                                              30
         Oct                    Nov                    Dec
 S  M Tu  W Th  F  S    S  M Tu  W Th  F  S    S  M Tu  W Th  F  S
    1  2  3  4  5  6                1  2  3                      1
 7  8  9 10 11 12 13    4  5  6  7  8  9 10    2  3  4  5  6  7  8
14 15 16 17 18 19 20   11 12 13 14 15 16 17    9 10 11 12 13 14 15
21 22 23 24 25 26 27   18 19 20 21 22 23 24   16 17 18 19 20 21 22
28 29 30 31            25 26 27 28 29 30      23 24 25 26 27 28 29
                                              30 31
----------------------------------------------------------------------------------------------------------------------------------------------

42) bc
The bc utility implements an arbitrary precision calculator.It  takes  input  from  any files given, then reads from the standard input.
J10BCPNCAP $ bc
4*2
8
5-8
-3
6+9
15
sqrt(25)         
5
----------------------------------------------------------------------------------------------------------------------------------------------
43) dc
The dc command works with the postfix notation, and each number or operation must be on its own line. Further, the result of an operation isn’t
automatically shown; you have to enter p to see the most recently calculated result.

J10BCPNCAP $ dc
9
*
p
81
----------------------------------------------------------------------------------------------------------------------------------------------
44) Directories

Any filename that ends with a slash (/) is a folder (UNIX calls these directories). Any filename that ends with an asterisk (*) is a program. Anything ending with an at sign (@) is a symbolic link, and everything else is a normal, plain file.directory .A type of UNIX file used to group other files. Files and directories can be placed inside other directories, to build a hierarchical system.

a) The bin Directory
This directory is used to store all the executable programs on the system.

b) The dev Directory
All device drivers—often numbering into the hundreds—are stored as separate files in the standard UNIX dev (devices) directory.

c) The etc Directory
The file system, security, device drivers, hardware configurations, and more. It designates the etc directory as the storage place for all administrative files and information

d) The lib Directory
UNIX has a central storage place for function and procedural libraries. These specific executables are included with specific programs, allowing
programs to offer features and capabilities otherwise unavailable.

e) The lost+found Directory
When files are recovered after any sort of problem or failure, they are placed here, in the lost+found directory, if the kernel cannot ascertain the proper location in the file system.

f) The mnt and sys Directories
The mnt directory is intended to be a common place to mount external media—hard disks, removable cartridge drives.

g) The tmp Directory
If you’re editing a file, for example, the program makes a copy of the file and saves it in tmp, and you work directly with that, saving the new file back to your original file only when you’ve completed your work.

h) The usr Directory
This directory was intended to be the central storage place for all user-related commands.

i) Home directory
This is your private directory, and is also where you start out when you log in to the system.

j) Root directory
The directory at the very top of the file system hierarchy, also known as slash.
----------------------------------------------------------------------------------------------------------------------------------------------
45) Absolute and relative file names
If it’s a slash, you’ve got an absolute filename (because the filename is rooted to the very top level of the file system). If you don’t have a slash as the first character, the filename’s a relative filename.
A hidden file is any file with a dot as the first character of the filename.
. current directory
.. parent directory
Absolute name :Specifying the location of a file in a hierarchy to ensure that the filename is unique is known in UNIX parlance as specifying its absolute filename. That is, regardless of where you are within the file system, the absolute filename always specifies a particular file. By contrast, relative filenames are not unique descriptors.
Relative name :Relative filenames describe files that are referenced relative to an assumed position in the file system.
----------------------------------------------------------------------------------------------------------------------------------------------
46) env
The env utility obtains the current environment, modifies it according  to  its arguments, then invokes the utility named by the utility operand with the modified environment.
Environment variables--
PATH-The PATH environment variable lists the set of directories, in left-to-right order, that the system searches to find commands and applications you request.
echo $PATH
HOME-Your home directory (as it’s known) is the name of the directory that you always begin your UNIX session within.
 echo $HOME
----------------------------------------------------------------------------------------------------------------------------------------------
47) dynamic linking Although most UNIX systems require all necessary utilities and library
routines (such as the routines for reading information from the keyboard and displaying it
to the screen) to be plugged into a program when it’s built (known in UNIX parlance as static
linking), some of the more sophisticated systems can delay this inclusion until you actually
need to run the program. In this case, the utilities and libraries are linked when you start the
program, and this is called dynamic linking.
----------------------------------------------------------------------------------------------------------------------------------------------
48) symbolic link A file that contains a pointer to another file rather than contents of its own.
This can also be a directory that points to another directory rather than having files of its own.
A useful way to have multiple names for a single program or allow multiple people to share
a single copy of a file.
----------------------------------------------------------------------------------------------------------------------------------------------
49) touch
The touch utility sets the access and modification times  of each  file.  The  file  operand  is  created  if it does not already exist.
----------------------------------------------------------------------------------------------------------------------------------------------
50) Compress
The compress program is given a list of filenames and then compresses each of the files, renaming them with a .Z suffix, which indicates that
they are compressed.
To reverse the operation, use the companion command uncompress, and specify either the current name of the file (that is, with the .Z suffix) or the name of the file before it was compressed (that is, without the .Z suffix.
----------------------------------------------------------------------------------------------------------------------------------------------
51) file
--similar to ls
J10BCPNCAP $ file SUBSCRIPTION_DTH-Process_Archive.log
SUBSCRIPTION_DTH-Process_Archive.log:   ascii text
----------------------------------------------------------------------------------------------------------------------------------------------
52) banner
banner prints its arguments (each up to 10 characters  long) in large letters on the standard output.
Print characters as a poster on the standard output. Each word supplied must contain ten characters or less.
Eg : banner archana
----------------------------------------------------------------------------------------------------------------------------------------------
53) finger
Display information about local and remote users.
----------------------------------------------------------------------------------------------------------------------------------------------
54) File Redirection
File redirection Most UNIX programs expect to read their input from the user (that is, standard input) and write their output to the screen (standard output). By use of file redirection, however, input can come from a previously created file, and output can be saved to a file instead of being displayed on the screen.
By placing a file-redirection command in a regular command line:
< redirects input,
> redirects output
 >> redirects output and appends the information to the existing file.

cat < file1 >file2
Copies from file 1 to file2
cat > new_filename
creates new file
----------------------------------------------------------------------------------------------------------------------------------------------
55) WC
It computes a word count for the file.
-w counts words
 -c counts characters
 -l counts
----------------------------------------------------------------------------------------------------------------------------------------------
56) uniq
Sometimes when you’re looking at a file, you’ll notice that there are many duplicate entries, either blank lines or, perhaps, lines of repeated information. To clean up these files and shrink their size at the same time, you can use the uniq command, which lists each unique line in the file.
Well, it sort of lists each unique line in the file. What uniq really does is compare each line it reads with the previous line. If the lines are the same, uniq does not list the second line. You can use flags with uniq to get more specific results: -u lists only lines that are not repeated.

The uniq command removes duplicate lines only if they’re adjacent.
-d lists only lines that are repeated (the exact opposite of -u),
-c adds a count of how many times each line occurred.
----------------------------------------------------------------------------------------------------------------------------------------------
57) Standard input and output
When a program is run, the default location for receiving input is called standard input. The default location for output is standard output. If you are running UNIX from a terminal, standard input and output are your terminal.
Standard input UNIX programs always default to reading information from the user by reading the keyboard and watching what’s typed. With file redirection, input can come from a file, and with pipelines, input can be the result of a previous UNIX command.
standard error.
Standard output, but you can redirect standard error to a different location than standard output.
Standard output When processing information, UNIX programs default to displaying the output on the screen itself, also known as standard output. With file redirection, output can easily be saved to a file; with pipelines, output can be sent to other programs.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------
58)Sort
A program that reads information and sorts it alphabetically. The program sort also enables you to sort lists of numbers.

To sort filenames alphabetically regardless of case, you can use sort -f:
% ls -1 | sort -f
To sort lines of a file:
% sort < testme
------------------------------------------------------------------------------------------------------------------------------------------------------------------------
59)Number Lines in Files Using cat -n and nl

To have a line number listed next to each line of a file. It’s quite simple to do with the cat program by specifying the -n flag to number lines in the file displayed.A program that prefaces each line with a line number isn’t much of an addition to the UNIX command toolbox.
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------
60) diff
compare two files
The diff utility will compare  the  contents  of  file1  and file2  and write to standard output a list of changes necessary to convert  file1  into  file2.
Eg : diff mon.logins tues.logins
2d1
< bsmith
4a4
> jdoe
7c7
< mschmidt
---
> proy
Note that the output lists the differences as well as in which file the difference exists. Lines in the
first file are preceded by "< ", and those in the second file are preceded by "> ".
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
61) comm
select or reject lines common to two files
The comm utility  reads  file1  and  file2,  which  must  be ordered  in  the  current  collating  sequence, and produces three text columns as output: lines  only  in  file1;  lines only in file2; and lines in both files.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
62) nl
line numbering
The best option, though, is that nl can selectively number just those lines that contain a specified pattern.
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
63) spell
 The spell command collects words from the  named  files  and looks  them  up in a spelling list. Words that neither occur
 among nor are derivable (by  applying  certain  inflections, prefixes,  or  suffixes) from words in the spelling list are written to the standard output.
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
64)Filters
Filters are a particular type of UNIX program that expects to work either with file redirection or as part of a pipeline. These programs read input from standard input, write output to standard output, and often don’t have any starting arguments.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
65) Wild Cards
There are two wildcards to learn here: * acts as a match for any number and sequence of characters, and ? acts as a match for any single character. In the broadest sense, a lone * acts as a match for all files in the current directory (in other words, ls * is identical to ls), whereas a single ? acts as a match for all one-character-long filenames in a directory (for instance, ls?, which will list only those filenames that are one character long).

Eg :
1) ls -ld S*
2) ls -ld S
3)ls -ld a* b* k* o* s* t*
4)ls -ld [abkost]*
5)ls -ld [a-z]*
6)
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
66) egrep
Sometimes a single regular expression can’t locate what you seek. For example, perhaps you’re looking for lines that have either one pattern or a second pattern. That’s where the egrep command proves helpful. The command gets its name from“expression grep,” and it has a notational scheme more powerful than that of grep.( use  the  full  set  of alphanumeric and special characters) to match the  patterns)
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
67) fgrep

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
68) Expressions
Some text processing programs, such as grep, egrep, sed, awk and vi, let you search on patterns instead of fixed strings. These text patterns are known as regular expressions. You form a regular expression by combining normal characters and special characters, also known as meta-characters,
with the rules below. With these regular expressions you can do pattern matching on text data.
Regular expressions come in three different forms:
• Anchors which tie the pattern to a location on the line
• Character sets which match a character at a single position
• Modifiers which specify how many times to repeat the previous expression

1) . match any single character except <newline>
2) * match zero or more instances of the single character (or meta-character) immediately preceding it
3) [abc] match any of the characters enclosed
4) [a-d] match any character in the enclosed range
5) [^exp] match any character not in the following expression
6) ^abc the regular expression must start at the beginning of the line (Anchor)
7) abc$ the regular expression must end at the end of the line (Anchor)
8) \ treat the next character literally. This is normally used to escape the meaning of special characters such as "." and "*".

Example
1) To find lines which begin with 'O'
grep ^O time.sh
2) To find lines which begin with 'SMS'
grep ^SMS time.sh
3) To find lines which begin with OMS
grep OMS* time.sh
4) search for any instances of t followed by zero or more occurrences of e
grep 'te*' num.list
5) search for any instances of t followed by one or more occurrences of e
grep 'tee*' time.sh
6)
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
69) sed - stream editor
The non-interactive, stream editor, sed, edits the input stream, line by line, making the specified changes, and sends the result to standard output.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
70) AWK
awk is a pattern scanning and processing language. Its name comes from the last initials of the threeauthors: Alfred. V. Aho, Brian. W. Kernighan, and Peter. J. Weinberger.
nawk is new awk, a newer version of the program
gawk is gnu awk, from the Free Software Foundation.
awk searches its input for patterns and performs the specified operation on each line, or fields of the line, that contain those patterns. You can specify the pattern matching statements for awk either on the command line, or by putting them in a file and using the -f program_file option.Each input line is checked for a pattern match with the indicated action being taken on a match. This continues through the full sequence of patterns, then the next line of input is checked.
Input is divided into records and fields.
Syntax
awk program [file]
where program is composed of one or more:
pattern { action }
fields.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
71)cmp [options] file1 file2
compare two files and list where differences occur (text or binary files)
Eg : % cmp mon.logins tues.logins
mon.logins tues.logins differ: char 9, line 2
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
72) cut [options] [file(s)]
The cut command allows a portion of a file to be extracted for another use.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
73) find
find files matching a type or pattern
The find command will recursively search the indicated directory tree to find files matching a type or pattern you specify. find can then list the files or execute arbitrary commands based on the results.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
74) paste - merge files
The paste command allows two files to be combined side-by-side. The default delimiter between the
columns in a paste is a tab, but options allow other delimiters to be used.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
75) sort [options] file sort the lines of the file according to the options chosen
The sort command is used to order the lines of a file. Various options can be used to choose the order
as well as the field on which a file is sorted. Without any options, the sort compares entire lines in the
file and outputs them in ASCII order (numbers first, upper case letters, then lower case letters).
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
76) ln
The ln command creates a "link" or an additional way to access (or gives an additional name to)
another file.
Syntax
ln [options] source [target]
If not specified target defaults to a file of the same name in the present working directory.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
77) tee
tee sends standard in to specified files and also to standard out. It’s often used in command pipelines.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
78) strings
To search a binary file for printable, ASCII, strings use the strings command. It searches for any sequence of 4 or more ASCII characters terminated
by a  <newline> or null character. I find this command useful for searching for file names and possible error messages within compiled programs
that I don’t have source code for.
Syntax
strings [options] file
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
79) tr
The tr command translates characters from stdin to stdout. With no options the characters in string1 are translated into the characters in string2, character by character in the string arrays. The first character in string1 is translated into the first character in string2, etc.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
80) File Compression
The compress command is used to reduce the amount of disk space utilized by a file. When a file has been compressed using the compress
command, a suffix of .Z is appended to the file name. The ownership modes and access and modification times of the original file are preserved. uncompress restores the files originally compressed by compress.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
81) tar - archive files
The tar command combines files into one device or filename for archiving purposes. The tar
command does not compress the files; it merely makes a large quantity of files more manageable
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
82) uuencode/uudecode - encode a file
To encode a binary file into 7-bit ASCII use the uuencode command. To decode the file back to binary use the uudecode command. The uu in the names comes because they are part of the
Unix-to-Unix CoPy (UUCP) set of commands. The uuencode and uudecode commands are
commonly used when sending binary files through e-mail. In e-mail there’s no guarantee that 8-bit
binary files will be transferred cleanly. So to ensure delivery you should encode the binary file, either
directly, on the command line and then include the encoded file, or indirectly, by letting your MIME
mailer program do it for you. In a similar manner, the user decodes the file on the receiving end.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
83) od - octal dump of a file
od dumps a file to stdout in different formats, including octal, decimal, floating point, hex, and
character format.
Syntax
od [options] file
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
84) TELNET and FTP - remote login and file transfer protocols
TELNET and FTP are Application Level Internet protocols. The TELNET and FTP protocol
specifications have been implemented by many different sources, including The National Center for
Supercomputer Applications (NCSA), and many other public domain and shareware sources.
The programs implementing the TELNET protocol are usually called telnet, but not always. Some
notable exceptions are tn3270, WinQVT, and QWS3270, which are also TELNET protocol
implementations. TELNET is used for remote login to other computers on the Internet.
The programs implementing the FTP protocol are usually called ftp, but there are exceptions to that
too. A program called Fetch, distributed by Dartmouth College, WS_FTP, written and distributed by
John Junod, and Ftptool, written by a Mike Sullivan, are FTP protocol implementations with graphic
user interfaces. There’s an enhanced FTP version, ncftp, that allows additional features, written by
Mike Gleason. Also, FTP protocol implementations are often included in TELNET implementation
programs, such as the ones distributed by NCSA. FTP is used for transferring files between
computers on the Internet.
rlogin is a remote login service that was at one time exclusive to Berkeley 4.3 BSD UNIX.
Essentially, it offers the same functionality as telnet, except that it passes to the remote computer
information about the user's login environment. Machines can be configured to allow connections
from trusted hosts without prompting for the users’ passwords. A more secure version of this
protocol is the Secure SHell, SSH, software written by Tatu Ylonen and available via
ftp://ftp.net.ohio-state.edu/pub/security/ssh.
From a Unix prompt, these programs are invoked by typing the command (program name) and the
(Internet) name of the remote machine to which to connect. You can also specify various options, as
allowed, for these commands.

85) Remote commands
A number of Unix machines can be connected together to form a local area network. When this is the
case, it often happens that a user of one machine has valid login access to several of the other
machines in the local network. There are Unix commands available to such users which provide
convenience in carrying out certain common operations. Because these commands focus on
communications with remote hosts in the local network, the command names begin with the letter
"r": rlogin, rsh, and rcp. The remote access capability of these commands is supported (optionally)
by the dotfile, ~/.rhosts, for individual users and by the system-wide file /etc/hosts.equiv. For
security reasons these may be restricted on some hosts.
The rlogin command allows remote login access to another host in the local network. rlogin passes
information about the local environment, including the value of the TERM environment variable, to
the remote host.
The rsh command provides the ability to invoke a Unix shell on a remote host in the local network for
the purpose of executing a shell command there. This capability is similar to the "shell escape"
function commonly available from within such Unix software systems as editors and email.
The rcp command provides the ability to copy files from the local host to a remote host in the local
network.
Syntax
rlogin [ -l username ] remote_host
rsh [ -l username ] remote_host [ command ]
rcp [ [user1]@host1:]original_filename [ [user2]@host2:]new_filename
where the parts in brackets ([]) are optional. rcp does not prompt for passwords, so you must have
permission to execute remote commands on the specified machines as the selected user on each
machine.

86)basename
deliver portions of path names
basename pathname [suffix]
Given a pathname, strip the path prefix and leave just the filename, which is printed on standard output. If specified, a filename suffix (e.g., .c) is removed also. basename is typically invoked via command substitution (`...`) to generate a filename. See also dirname.
The Solaris version of basename allows the suffix to be a pattern of the form accepted by expr. See the entry for expr for more detailsA command is a program that tells the Unix system to do something. It has the form:
command [options] [arguments]
An argument indicates on what the command is to perform its action, usually a file or series of files.
An option modifies the command, changing the way it performs.
Commands are case sensitive.
Options are generally preceded by a hyphen (-), and for most commands, more than one option can be strung together, in the form:
command -[option][option][option]

Any filename that ends with a slash (/) is a folder (UNIX calls these directories). Any filename that ends with an asterisk (*) is a program. Anything ending with an at sign (@) is a symbolic link, and everything else is a normal, plain file.

Advantages of UNIX

multitasking A multitasking computer is one that actually can run more than one
program, or task, at a time. By contrast, most personal computers lock you into a single
program that you must exit before you launch another.

multiuser Computers intended to have more than a single person working on them
simultaneously are designed to support multiple users, hence the term multiuser. By contrast,
personal computers are almost always single-user because someone else can’t be running a
program or editing a file while you are using the computer for your own work.
----------------------------------------------------------------------------------------------------------------------------------------------
1) ^D - indicates end of data stream; can log a user off. The latter is disabled on many systems
^C - interrupt
^U -Control-U is normally the "line-kill" signal for your terminal. When typed it erases the entire input
logout - leave the system
exit - leave the shell
----------------------------------------------------------------------------------------------------------------------------------------------
2) id
 id - return user identity
You can determine your userid and the list of groups you belong to with the id and groups commands.
The format in which we get as o/p is

   "uid=%u(%s) gid=%u(%s)\n" <real user ID>, <user-name>,
         <real group ID>, <group-name>
eg :
$ id
uid=1005(tibadmin) gid=1(other)

$ id -a ( Reports user name, user  ID and all the  groups  to which the user belongs.)
uid=1005(tibadmin) gid=1(other) groups=1(other)
----------------------------------------------------------------------------------------------------------------------------------------------
3) man
The Unix manual, usually called man pages, is available on-line to explain the usage of the Unix system and commands.
Syntax
man [options] command_name
------------------------------------------------------------------------------------------------------------------------------------------------
4) cd [directory] ---change directory
You can change to a new directory with the cd command. cd will accept both absolute and relative path names.
cd -----changes to user's home directory
cd / ---changes directory to the system's root
cd .. ---goes up one directory level
cd ../.. --goes up two directory levels
cd /full/path/name/from/root changes directory to absolute path named (note the leading slash)
cd path/from/current/location changes directory to path relative to current location (no leading
slash)
cd ~--------username/directory changes directory to the named username's indicated directory
----------------------------------------------------------------------------------------------------------------------------------------------
5) ls [options] [directory or file] list directory contents or file permissions
At any time you can determine where you are in the file system hierarchy with the pwd, print workingdirectory, command.
----------------------------------------------------------------------------------------------------------------------------------------------
6) mkdir [options] --directory make a directory
You extend your home hierarchy by making sub-directories underneath it. This is done with the mkdir command. Again, you specify either the full or relative path of the directory:
Syntax
mkdir [options] directory
----------------------------------------------------------------------------------------------------------------------------------------------
7) pwd ---- print working (current) directory
To find out your current location—that is the directory in which you are currently working
----------------------------------------------------------------------------------------------------------------------------------------------
8) rmdir [options] directory -------remove a directory
A directory needs to be empty before you can remove it. If it’s not, you need to remove the files first.Also, you can’t remove a directory if it is your present working directory; you must first change outof it.
Syntax
rmdir directory
----------------------------------------------------------------------------------------------------------------------------------------------
9) ls ------list
The command to list your directories and files is ls. With options it can provide information about the size, type of file, permissions, dates of file creation, change and access.
-a lists all files, including those beginning with a dot (.)---hidden files
-d lists only names of directories, not the files in the directory
-g displays Unix group assigned to the file, requires the -l option (BSD only)
-l long listing: lists the mode, link information, owner, size, last modification (time). If the file is a symbolic link, an arrow (-->) precedes the pathname
-c list in columns
-s to ascertain the size of the file,The size indicated is the number of kilobytes, rounded upward, for each file
-F Adding the -F flag to ls appends suffixes to certain filenames so that you can ascertain more easily what types of files they are.
-m This flag outputs the files as a comma-separated list

File syntax :
if file ends with /  ---directory
                        * ---executable prog
                        @---is a symbolic link to another file or directory

staying in the same directory and searching the file :
ls -F \tibco
ls -F ..
----------------------------------------------------------------------------------------------------------------------------------------------
10) chgrp [options] group file change the group of the file
----------------------------------------------------------------------------------------------------------------------------------------------
11) chown [options] owner file change the ownership of a file; can only be done by the superuser
----------------------------------------------------------------------------------------------------------------------------------------------
12) Rmdir -remove any directory for which you have appropriate permissions
--To remove a directory, you must first remove all files therein using the rm command.
--There’s no way to restore a directory you’ve removed
--The rmdir command removes only directories that are empty
----------------------------------------------------------------------------------------------------------------------------------------------
13) cp [options] file1 file2
copy file1 into file2; file2 shouldn't already exist. This command creates or overwrites file2.
The format of a cp command is to specify first the name of the file you want to copy and then the new filename. Both names must be either relative filenames or absolute filenames.
--Copy the contents of one file to another with the cp command.
--Cant copy directories
--Can copy many files at once if you specify a directory as the destination rather than specifying a new filename.
Syntax
cp [options] old_filename new_filename
Common Options
-i interactive (prompt and wait for confirmation before proceeding)
-r recursively copy a directory
----------------------------------------------------------------------------------------------------------------------------------------------
14) mv [options] file1 file2
move file1 into file2
--Rename a file with the move command, mv.
--Rather than creating multiple copies of the files you’re copying, mv physically relocates them from the old directory to the new.
Syntax
mv [options] old_filename new_filename
Common Options
-i interactive (prompt and wait for confirmation before proceeding)
-f don’t prompt, even when copying over an existing target file (overrides -i)
----------------------------------------------------------------------------------------------------------------------------------------------
15) rm [options] file remove (delete) a file or directory
(-r recursively deletes the directory and its contents)
(-i prompts before removing files)
--Remove a file with the rm, remove, command.
--The rm command removes files permanently
--You can remove more than one file at a time by specifying each of the files to the rm command
Syntax
rm [options] filename
Common Options
-i interactive (prompt and wait for confirmation before proceeding)
-r recursively remove a directory, first removing the files and subdirectories beneath it (but all files and directories inside it as well, to be removed.)
-f don’t prompt for confirmation (overrides -i)
----------------------------------------------------------------------------------------------------------------------------------------------
16) chmod - change file permissions
The command to change permissions on an item (file, directory, etc) is chmod (change mode). The syntax involves using the command with three digits (representing the user (owner, u) permissions,the group (g) permissions, and other (o) user's permissions) followed by the argument (which may
be a file name or list of files and directories). Or by using symbolic representation for the permissions and who they apply to.

chmod [who]op[perm] [argument list]

--- No access is allowed
r-- Read-only access
r-x Read and execute access, for programs and shell scripts
rw- Read and write access, for files
rwx All access allowed, for programs

Interpretation of the following few examples should help:
-rw------- 1 taylor 3843 Oct 10 16:22 iecc.list
-rw-rw-r-- 1 taylor 280232 Oct 10 16:22 mailing.lists
-rw-rw---- 1 taylor 1031 Oct 7 15:44 newlists
-rwxr-x--- 1 taylor 64 Oct 9 09:31 the.script
The first file, iecc.list, has read and write permission for the owner (taylor) and is off-limits
to all other users. The file mailing.lists offers similar access to the file owner (taylor) and
to the group but offers read-only access to everyone else on the system. The third file,
newlists, provides read and write access to both the file owner and group, but no access to
anyone not in the group.
The fourth file on the list, the.script, is a program that can be run by both the owner and
group members, read (or copied) by both the owner and group, and written (altered) by the
owner. In practice, this probably would be a shell script, as described earlier, and these
permissions would enable the owner (taylor) to use an editor to modify the commands
therein. Other members of the group could read and use the shell script but would be denied
access to change it.
----------------------------------------------------------------------------------------------------------------------------------------------
17) chown - change ownership
Ownership of a file can be changed with the chown command. On most versions of Unix this can only be done by the super-user, i.e. a normal user can’t give away ownership of their files. chown is used as below, where # represents the shell prompt for the super-user:
Syntax
chown [options] user[:group] file
----------------------------------------------------------------------------------------------------------------------------------------------
18) cat [options] file concatenate (list) a file
Display the contents of a file with the concatenate command, cat.
Syntax
cat [options] [file]
Common Options
-n precede each line with a line number
-v display non-printing characters, except tabs, new-lines, and form-feeds
-e display $ at the end of each line (prior to new-line) (when used with -v option)
----------------------------------------------------------------------------------------------------------------------------------------------
19) echo [text string] echo the text string to stdout
The echo command is used to repeat, or echo, the argument you give it back to the standard output device. It normally ends with a line-feed, but you can specify an option to prevent this.
Syntax
echo [string]
----------------------------------------------------------------------------------------------------------------------------------------------
20) head [-number] file
--display the first 10 (or number of) lines of a file
head displays the head, or start, of the file.
head [options] file
Common Options
-n number number of lines to display, counting from the top of the file
----------------------------------------------------------------------------------------------------------------------------------------------
21) more (or less or pg) [options] file page through a text file
----------------------------------------------------------------------------------------------------------------------------------------------
22) tail [options] file display the last few lines (or parts) of a file
tail displays the tail, or end, of the file.
Syntax
tail [options] file
Common Options
-number number of lines to display, counting from the bottom of the file
----------------------------------------------------------------------------------------------------------------------------------------------
23) date [options] report the current date and time
----------------------------------------------------------------------------------------------------------------------------------------------
24) df [options] [resource] report the summary of disk blocks and inodes free and in use
df is used to report the number of disk blocks and inodes used and free for each file system. The
output format and valid options are very specific to the OS and program version in use.

Syntax
df [options] [resource]
Common Options
-l local file systems only (SVR4)
-k report in kilobytes (SVR4)
----------------------------------------------------------------------------------------------------------------------------------------------
25) du [options] [directory or file] report amount of disk space in use+
du reports the amount of disk space in use for the files or directories you specify.

Syntax
du [options] [directory or file]
Common Options
-a display disk usage for each file, not just subdirectories
-s display a summary total only
-k report in kilobytes (SVR4)
----------------------------------------------------------------------------------------------------------------------------------------------
26) hostname/uname display or set (super-user only) the name of the current machine
----------------------------------------------------------------------------------------------------------------------------------------------
27) kill [options] [-SIGNAL] [pid#] [%job] send a signal to the process with the process id number (pid#) or job
control number (%n). The default signal is to kill the process.
kill sends a signal to a process, usually to terminate it.

Syntax
kill [-signal] process-id
----------------------------------------------------------------------------------------------------------------------------------------------
28) man [options] command show the manual (man) page for a command
----------------------------------------------------------------------------------------------------------------------------------------------
29) passwd [options] set or change your password
----------------------------------------------------------------------------------------------------------------------------------------------
30) ps [options] show status of active processes
ps is used to report on processes currently running on the system. The output format and valid
options are very specific to the OS and program version in use.

Syntax
ps [options]
----------------------------------------------------------------------------------------------------------------------------------------------
31) script file saves everything that appears on the screen to file until exit is executed
script creates a script of your session input and output. Using the script command, you can capture
all the data transmission from and to your terminal screen until you exit the script program. This can
be useful during the programming-and-debugging process, to document the combination of things
you have tried, or to get a printed copy of it all for later perusal.

Syntax
script [-a] [file] <. . .> exit
----------------------------------------------------------------------------------------------------------------------------------------------
32) whereis [options] command report the binary, source, and man page locations for the command
named
----------------------------------------------------------------------------------------------------------------------------------------------
33) which command reports the path to the command or the shell alias in use
----------------------------------------------------------------------------------------------------------------------------------------------
34) who or w report who is logged in and what processes are running
J10BCPNCAP $ who
root       console      Apr 26 10:17
tibadmin   pts/17       Jun 30 09:37    (10.8.149.62)
oracle     pts/18       Jun 27 14:24    (10.8.85.140)
tibadmin   pts/19       Jun 30 10:09    (10.8.149.154)
tibadmin   pts/21       Jun 30 15:11    (10.8.149.91)
tibadmin   pts/26       Jun 30 12:10    (10.8.74.107)
tibadmin   pts/27       Jun 30 12:55    (10.8.74.107)
----------------------------------------------------------------------------------------------------------------------------------------------
35) grep
 The grep utility is used to search for generalized regular expressions occurring in Unix files.The egrep utility provides searching capability using an extended set of meta-characters. The syntax of the grep utility, some of the available options, and a few examples are
shown below.
Syntax
grep [options] regexp [file[s]]
Common Options
-i ignore case
-c report only a count of the number of lines containing matches, not the
matches themselves
-v invert the search, displaying only lines that do not match
-n display the line number along with the line on which a match was found
-s work silently, reporting only the final status:
0, for match(es) found
1, for no matches
2, for errors
-l list filenames, but not lines, in which matches were found
----------------------------------------------------------------------------------------------------------------------------------------------
36) whoami
J10BCPNCAP $ whoami
tibadmin
----------------------------------------------------------------------------------------------------------------------------------------------
37) who am i
J10BCPNCAP $ who am i
tibadmin   pts/21       Jun 30 15:11    (10.8.149.91)
----------------------------------------------------------------------------------------------------------------------------------------------
38) id
The purpose of
this command is to tell you what group or groups you’re in and the numeric identifier for your account name (known as your user ID number or user ID). Enter id and see what you get. I get the following result:
% id
uid=211(taylor) gid=50(users0) groups=50(users0)
%
J10BCPNCAP $ id
uid=1005(tibadmin) gid=1(other)
----------------------------------------------------------------------------------------------------------------------------------------------
39) users-which lists the account names of all people using the system:
J10BCPNCAP $ users  
root tibadmin oracle tibadmin tibadmin tibadmin tibadmin
----------------------------------------------------------------------------------------------------------------------------------------------
40) w
 w is a complex command which summarizes information
This is a much more complex command, offering more information than either users or who. Notice that the output is broken into different areas. The first line summarizes the status of the system and, rather cryptically, the number of programs that the computer is running at one time. Finally, for each user, the output indicates the user name, the tty, when the user logged in to the system, how long it’s been since the user has done anything (in minutes and seconds), the combined CPU time of all jobs the user has run, and the amount of CPU time taken by the
current job. The last field tells you what you wanted to know in the first place: what are the users doing?

  3:18pm  up 65 day(s), 11:12,  7 users,  load average: 1.39, 1.42, 1.43
User     tty           login@  idle   JCPU   PCPU  what
root     console      26Apr1165days                -sh
tibadmin pts/17        9:37am  5:40      1      1  tail -100f SUBSCRIPTION_DTH-Proc
oracle   pts/18       Mon 2pm 3days                oracleSDP (DESCRIPTION=(LOCAL=YE
tibadmin pts/19       10:09am  5:09      1      1  tail -f SUBSCRIPTION_DTH-Process
tibadmin pts/21        3:11pm                      w
tibadmin pts/26       12:10pm  3:07                -sh
tibadmin pts/27       12:55pm  2:22                less ICCM_BW-ICCM_BW.log
----------------------------------------------------------------------------------------------------------------------------------------------
41) cal
shows a simple calendar for the month or year specified.
eg:
$ cal
   June 2011
 S  M Tu  W Th  F  S
          1  2  3  4
 5  6  7  8  9 10 11
12 13 14 15 16 17 18
19 20 21 22 23 24 25
26 27 28 29 30

For a particular month cal [ [month] year ]
$ cal 3 1988
   March 1988
 S  M Tu  W Th  F  S
       1  2  3  4  5
 6  7  8  9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 31

cal 2007
                                2007

         Jan                    Feb                    Mar
 S  M Tu  W Th  F  S    S  M Tu  W Th  F  S    S  M Tu  W Th  F  S
    1  2  3  4  5  6                1  2  3                1  2  3
 7  8  9 10 11 12 13    4  5  6  7  8  9 10    4  5  6  7  8  9 10
14 15 16 17 18 19 20   11 12 13 14 15 16 17   11 12 13 14 15 16 17
21 22 23 24 25 26 27   18 19 20 21 22 23 24   18 19 20 21 22 23 24
28 29 30 31            25 26 27 28            25 26 27 28 29 30 31

         Apr                    May                    Jun
 S  M Tu  W Th  F  S    S  M Tu  W Th  F  S    S  M Tu  W Th  F  S
 1  2  3  4  5  6  7          1  2  3  4  5                   1  2
 8  9 10 11 12 13 14    6  7  8  9 10 11 12    3  4  5  6  7  8  9
15 16 17 18 19 20 21   13 14 15 16 17 18 19   10 11 12 13 14 15 16
22 23 24 25 26 27 28   20 21 22 23 24 25 26   17 18 19 20 21 22 23
29 30                  27 28 29 30 31         24 25 26 27 28 29 30

         Jul                    Aug                    Sep
 S  M Tu  W Th  F  S    S  M Tu  W Th  F  S    S  M Tu  W Th  F  S
 1  2  3  4  5  6  7             1  2  3  4                      1
 8  9 10 11 12 13 14    5  6  7  8  9 10 11    2  3  4  5  6  7  8
15 16 17 18 19 20 21   12 13 14 15 16 17 18    9 10 11 12 13 14 15
22 23 24 25 26 27 28   19 20 21 22 23 24 25   16 17 18 19 20 21 22
29 30 31               26 27 28 29 30 31      23 24 25 26 27 28 29
                                              30
         Oct                    Nov                    Dec
 S  M Tu  W Th  F  S    S  M Tu  W Th  F  S    S  M Tu  W Th  F  S
    1  2  3  4  5  6                1  2  3                      1
 7  8  9 10 11 12 13    4  5  6  7  8  9 10    2  3  4  5  6  7  8
14 15 16 17 18 19 20   11 12 13 14 15 16 17    9 10 11 12 13 14 15
21 22 23 24 25 26 27   18 19 20 21 22 23 24   16 17 18 19 20 21 22
28 29 30 31            25 26 27 28 29 30      23 24 25 26 27 28 29
                                              30 31
----------------------------------------------------------------------------------------------------------------------------------------------

42) bc
The bc utility implements an arbitrary precision calculator.It  takes  input  from  any files given, then reads from the standard input.
J10BCPNCAP $ bc
4*2
8
5-8
-3
6+9
15
sqrt(25)         
5
----------------------------------------------------------------------------------------------------------------------------------------------
43) dc
The dc command works with the postfix notation, and each number or operation must be on its own line. Further, the result of an operation isn’t
automatically shown; you have to enter p to see the most recently calculated result.

J10BCPNCAP $ dc
9
*
p
81
----------------------------------------------------------------------------------------------------------------------------------------------
44) Directories

Any filename that ends with a slash (/) is a folder (UNIX calls these directories). Any filename that ends with an asterisk (*) is a program. Anything ending with an at sign (@) is a symbolic link, and everything else is a normal, plain file.directory .A type of UNIX file used to group other files. Files and directories can be placed inside other directories, to build a hierarchical system.

a) The bin Directory
This directory is used to store all the executable programs on the system.

b) The dev Directory
All device drivers—often numbering into the hundreds—are stored as separate files in the standard UNIX dev (devices) directory.

c) The etc Directory
The file system, security, device drivers, hardware configurations, and more. It designates the etc directory as the storage place for all administrative files and information

d) The lib Directory
UNIX has a central storage place for function and procedural libraries. These specific executables are included with specific programs, allowing
programs to offer features and capabilities otherwise unavailable.

e) The lost+found Directory
When files are recovered after any sort of problem or failure, they are placed here, in the lost+found directory, if the kernel cannot ascertain the proper location in the file system.

f) The mnt and sys Directories
The mnt directory is intended to be a common place to mount external media—hard disks, removable cartridge drives.

g) The tmp Directory
If you’re editing a file, for example, the program makes a copy of the file and saves it in tmp, and you work directly with that, saving the new file back to your original file only when you’ve completed your work.

h) The usr Directory
This directory was intended to be the central storage place for all user-related commands.

i) Home directory
This is your private directory, and is also where you start out when you log in to the system.

j) Root directory
The directory at the very top of the file system hierarchy, also known as slash.
----------------------------------------------------------------------------------------------------------------------------------------------
45) Absolute and relative file names
If it’s a slash, you’ve got an absolute filename (because the filename is rooted to the very top level of the file system). If you don’t have a slash as the first character, the filename’s a relative filename.
A hidden file is any file with a dot as the first character of the filename.
. current directory
.. parent directory
Absolute name :Specifying the location of a file in a hierarchy to ensure that the filename is unique is known in UNIX parlance as specifying its absolute filename. That is, regardless of where you are within the file system, the absolute filename always specifies a particular file. By contrast, relative filenames are not unique descriptors.
Relative name :Relative filenames describe files that are referenced relative to an assumed position in the file system.
----------------------------------------------------------------------------------------------------------------------------------------------
46) env
The env utility obtains the current environment, modifies it according  to  its arguments, then invokes the utility named by the utility operand with the modified environment.
Environment variables--
PATH-The PATH environment variable lists the set of directories, in left-to-right order, that the system searches to find commands and applications you request.
echo $PATH
HOME-Your home directory (as it’s known) is the name of the directory that you always begin your UNIX session within.
 echo $HOME
----------------------------------------------------------------------------------------------------------------------------------------------
47) dynamic linking Although most UNIX systems require all necessary utilities and library
routines (such as the routines for reading information from the keyboard and displaying it
to the screen) to be plugged into a program when it’s built (known in UNIX parlance as static
linking), some of the more sophisticated systems can delay this inclusion until you actually
need to run the program. In this case, the utilities and libraries are linked when you start the
program, and this is called dynamic linking.
----------------------------------------------------------------------------------------------------------------------------------------------
48) symbolic link A file that contains a pointer to another file rather than contents of its own.
This can also be a directory that points to another directory rather than having files of its own.
A useful way to have multiple names for a single program or allow multiple people to share
a single copy of a file.
----------------------------------------------------------------------------------------------------------------------------------------------
49) touch
The touch utility sets the access and modification times  of each  file.  The  file  operand  is  created  if it does not already exist.
----------------------------------------------------------------------------------------------------------------------------------------------
50) Compress
The compress program is given a list of filenames and then compresses each of the files, renaming them with a .Z suffix, which indicates that
they are compressed.
To reverse the operation, use the companion command uncompress, and specify either the current name of the file (that is, with the .Z suffix) or the name of the file before it was compressed (that is, without the .Z suffix.
----------------------------------------------------------------------------------------------------------------------------------------------
51) file
--similar to ls
J10BCPNCAP $ file SUBSCRIPTION_DTH-Process_Archive.log
SUBSCRIPTION_DTH-Process_Archive.log:   ascii text
----------------------------------------------------------------------------------------------------------------------------------------------
52) banner
banner prints its arguments (each up to 10 characters  long) in large letters on the standard output.
Print characters as a poster on the standard output. Each word supplied must contain ten characters or less.
Eg : banner archana
----------------------------------------------------------------------------------------------------------------------------------------------
53) finger
Display information about local and remote users.
----------------------------------------------------------------------------------------------------------------------------------------------
54) File Redirection
File redirection Most UNIX programs expect to read their input from the user (that is, standard input) and write their output to the screen (standard output). By use of file redirection, however, input can come from a previously created file, and output can be saved to a file instead of being displayed on the screen.
By placing a file-redirection command in a regular command line:
< redirects input,
> redirects output
 >> redirects output and appends the information to the existing file.

cat < file1 >file2
Copies from file 1 to file2
cat > new_filename
creates new file
----------------------------------------------------------------------------------------------------------------------------------------------
55) WC
It computes a word count for the file.
-w counts words
 -c counts characters
 -l counts
----------------------------------------------------------------------------------------------------------------------------------------------
56) uniq
Sometimes when you’re looking at a file, you’ll notice that there are many duplicate entries, either blank lines or, perhaps, lines of repeated information. To clean up these files and shrink their size at the same time, you can use the uniq command, which lists each unique line in the file.
Well, it sort of lists each unique line in the file. What uniq really does is compare each line it reads with the previous line. If the lines are the same, uniq does not list the second line. You can use flags with uniq to get more specific results: -u lists only lines that are not repeated.

The uniq command removes duplicate lines only if they’re adjacent.
-d lists only lines that are repeated (the exact opposite of -u),
-c adds a count of how many times each line occurred.
----------------------------------------------------------------------------------------------------------------------------------------------
57) Standard input and output
When a program is run, the default location for receiving input is called standard input. The default location for output is standard output. If you are running UNIX from a terminal, standard input and output are your terminal.
Standard input UNIX programs always default to reading information from the user by reading the keyboard and watching what’s typed. With file redirection, input can come from a file, and with pipelines, input can be the result of a previous UNIX command.
standard error.
Standard output, but you can redirect standard error to a different location than standard output.
Standard output When processing information, UNIX programs default to displaying the output on the screen itself, also known as standard output. With file redirection, output can easily be saved to a file; with pipelines, output can be sent to other programs.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------
58)Sort
A program that reads information and sorts it alphabetically. The program sort also enables you to sort lists of numbers.

To sort filenames alphabetically regardless of case, you can use sort -f:
% ls -1 | sort -f
To sort lines of a file:
% sort < testme
------------------------------------------------------------------------------------------------------------------------------------------------------------------------
59)Number Lines in Files Using cat -n and nl

To have a line number listed next to each line of a file. It’s quite simple to do with the cat program by specifying the -n flag to number lines in the file displayed.A program that prefaces each line with a line number isn’t much of an addition to the UNIX command toolbox.
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------
60) diff
compare two files
The diff utility will compare  the  contents  of  file1  and file2  and write to standard output a list of changes necessary to convert  file1  into  file2.
Eg : diff mon.logins tues.logins
2d1
< bsmith
4a4
> jdoe
7c7
< mschmidt
---
> proy
Note that the output lists the differences as well as in which file the difference exists. Lines in the
first file are preceded by "< ", and those in the second file are preceded by "> ".
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
61) comm
select or reject lines common to two files
The comm utility  reads  file1  and  file2,  which  must  be ordered  in  the  current  collating  sequence, and produces three text columns as output: lines  only  in  file1;  lines only in file2; and lines in both files.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
62) nl
line numbering
The best option, though, is that nl can selectively number just those lines that contain a specified pattern.
----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
63) spell
 The spell command collects words from the  named  files  and looks  them  up in a spelling list. Words that neither occur
 among nor are derivable (by  applying  certain  inflections, prefixes,  or  suffixes) from words in the spelling list are written to the standard output.
-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
64)Filters
Filters are a particular type of UNIX program that expects to work either with file redirection or as part of a pipeline. These programs read input from standard input, write output to standard output, and often don’t have any starting arguments.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
65) Wild Cards
There are two wildcards to learn here: * acts as a match for any number and sequence of characters, and ? acts as a match for any single character. In the broadest sense, a lone * acts as a match for all files in the current directory (in other words, ls * is identical to ls), whereas a single ? acts as a match for all one-character-long filenames in a directory (for instance, ls?, which will list only those filenames that are one character long).

Eg :
1) ls -ld S*
2) ls -ld S
3)ls -ld a* b* k* o* s* t*
4)ls -ld [abkost]*
5)ls -ld [a-z]*
6)
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
66) egrep
Sometimes a single regular expression can’t locate what you seek. For example, perhaps you’re looking for lines that have either one pattern or a second pattern. That’s where the egrep command proves helpful. The command gets its name from“expression grep,” and it has a notational scheme more powerful than that of grep.( use  the  full  set  of alphanumeric and special characters) to match the  patterns)
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
67) fgrep

------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
68) Expressions
Some text processing programs, such as grep, egrep, sed, awk and vi, let you search on patterns instead of fixed strings. These text patterns are known as regular expressions. You form a regular expression by combining normal characters and special characters, also known as meta-characters,
with the rules below. With these regular expressions you can do pattern matching on text data.
Regular expressions come in three different forms:
• Anchors which tie the pattern to a location on the line
• Character sets which match a character at a single position
• Modifiers which specify how many times to repeat the previous expression

1) . match any single character except <newline>
2) * match zero or more instances of the single character (or meta-character) immediately preceding it
3) [abc] match any of the characters enclosed
4) [a-d] match any character in the enclosed range
5) [^exp] match any character not in the following expression
6) ^abc the regular expression must start at the beginning of the line (Anchor)
7) abc$ the regular expression must end at the end of the line (Anchor)
8) \ treat the next character literally. This is normally used to escape the meaning of special characters such as "." and "*".

Example
1) To find lines which begin with 'O'
grep ^O time.sh
2) To find lines which begin with 'SMS'
grep ^SMS time.sh
3) To find lines which begin with OMS
grep OMS* time.sh
4) search for any instances of t followed by zero or more occurrences of e
grep 'te*' num.list
5) search for any instances of t followed by one or more occurrences of e
grep 'tee*' time.sh
6)
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
69) sed - stream editor
The non-interactive, stream editor, sed, edits the input stream, line by line, making the specified changes, and sends the result to standard output.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
70) AWK
awk is a pattern scanning and processing language. Its name comes from the last initials of the threeauthors: Alfred. V. Aho, Brian. W. Kernighan, and Peter. J. Weinberger.
nawk is new awk, a newer version of the program
gawk is gnu awk, from the Free Software Foundation.
awk searches its input for patterns and performs the specified operation on each line, or fields of the line, that contain those patterns. You can specify the pattern matching statements for awk either on the command line, or by putting them in a file and using the -f program_file option.Each input line is checked for a pattern match with the indicated action being taken on a match. This continues through the full sequence of patterns, then the next line of input is checked.
Input is divided into records and fields.
Syntax
awk program [file]
where program is composed of one or more:
pattern { action }
fields.
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
71)cmp [options] file1 file2
compare two files and list where differences occur (text or binary files)
Eg : % cmp mon.logins tues.logins
mon.logins tues.logins differ: char 9, line 2
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
72) cut [options] [file(s)]
The cut command allows a portion of a file to be extracted for another use.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
73) find
find files matching a type or pattern
The find command will recursively search the indicated directory tree to find files matching a type or pattern you specify. find can then list the files or execute arbitrary commands based on the results.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
74) paste - merge files
The paste command allows two files to be combined side-by-side. The default delimiter between the
columns in a paste is a tab, but options allow other delimiters to be used.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
75) sort [options] file sort the lines of the file according to the options chosen
The sort command is used to order the lines of a file. Various options can be used to choose the order
as well as the field on which a file is sorted. Without any options, the sort compares entire lines in the
file and outputs them in ASCII order (numbers first, upper case letters, then lower case letters).
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
76) ln
The ln command creates a "link" or an additional way to access (or gives an additional name to)
another file.
Syntax
ln [options] source [target]
If not specified target defaults to a file of the same name in the present working directory.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
77) tee
tee sends standard in to specified files and also to standard out. It’s often used in command pipelines.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
78) strings
To search a binary file for printable, ASCII, strings use the strings command. It searches for any sequence of 4 or more ASCII characters terminated
by a  <newline> or null character. I find this command useful for searching for file names and possible error messages within compiled programs
that I don’t have source code for.
Syntax
strings [options] file
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
79) tr
The tr command translates characters from stdin to stdout. With no options the characters in string1 are translated into the characters in string2, character by character in the string arrays. The first character in string1 is translated into the first character in string2, etc.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
80) File Compression
The compress command is used to reduce the amount of disk space utilized by a file. When a file has been compressed using the compress
command, a suffix of .Z is appended to the file name. The ownership modes and access and modification times of the original file are preserved. uncompress restores the files originally compressed by compress.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
81) tar - archive files
The tar command combines files into one device or filename for archiving purposes. The tar
command does not compress the files; it merely makes a large quantity of files more manageable
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
82) uuencode/uudecode - encode a file
To encode a binary file into 7-bit ASCII use the uuencode command. To decode the file back to binary use the uudecode command. The uu in the names comes because they are part of the
Unix-to-Unix CoPy (UUCP) set of commands. The uuencode and uudecode commands are
commonly used when sending binary files through e-mail. In e-mail there’s no guarantee that 8-bit
binary files will be transferred cleanly. So to ensure delivery you should encode the binary file, either
directly, on the command line and then include the encoded file, or indirectly, by letting your MIME
mailer program do it for you. In a similar manner, the user decodes the file on the receiving end.
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
83) od - octal dump of a file
od dumps a file to stdout in different formats, including octal, decimal, floating point, hex, and
character format.
Syntax
od [options] file
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
84) TELNET and FTP - remote login and file transfer protocols
TELNET and FTP are Application Level Internet protocols. The TELNET and FTP protocol
specifications have been implemented by many different sources, including The National Center for
Supercomputer Applications (NCSA), and many other public domain and shareware sources.
The programs implementing the TELNET protocol are usually called telnet, but not always. Some
notable exceptions are tn3270, WinQVT, and QWS3270, which are also TELNET protocol
implementations. TELNET is used for remote login to other computers on the Internet.
The programs implementing the FTP protocol are usually called ftp, but there are exceptions to that
too. A program called Fetch, distributed by Dartmouth College, WS_FTP, written and distributed by
John Junod, and Ftptool, written by a Mike Sullivan, are FTP protocol implementations with graphic
user interfaces. There’s an enhanced FTP version, ncftp, that allows additional features, written by
Mike Gleason. Also, FTP protocol implementations are often included in TELNET implementation
programs, such as the ones distributed by NCSA. FTP is used for transferring files between
computers on the Internet.
rlogin is a remote login service that was at one time exclusive to Berkeley 4.3 BSD UNIX.
Essentially, it offers the same functionality as telnet, except that it passes to the remote computer
information about the user's login environment. Machines can be configured to allow connections
from trusted hosts without prompting for the users’ passwords. A more secure version of this
protocol is the Secure SHell, SSH, software written by Tatu Ylonen and available via
ftp://ftp.net.ohio-state.edu/pub/security/ssh.
From a Unix prompt, these programs are invoked by typing the command (program name) and the
(Internet) name of the remote machine to which to connect. You can also specify various options, as
allowed, for these commands.

85) Remote commands
A number of Unix machines can be connected together to form a local area network. When this is the
case, it often happens that a user of one machine has valid login access to several of the other
machines in the local network. There are Unix commands available to such users which provide
convenience in carrying out certain common operations. Because these commands focus on
communications with remote hosts in the local network, the command names begin with the letter
"r": rlogin, rsh, and rcp. The remote access capability of these commands is supported (optionally)
by the dotfile, ~/.rhosts, for individual users and by the system-wide file /etc/hosts.equiv. For
security reasons these may be restricted on some hosts.
The rlogin command allows remote login access to another host in the local network. rlogin passes
information about the local environment, including the value of the TERM environment variable, to
the remote host.
The rsh command provides the ability to invoke a Unix shell on a remote host in the local network for
the purpose of executing a shell command there. This capability is similar to the "shell escape"
function commonly available from within such Unix software systems as editors and email.
The rcp command provides the ability to copy files from the local host to a remote host in the local
network.
Syntax
rlogin [ -l username ] remote_host
rsh [ -l username ] remote_host [ command ]
rcp [ [user1]@host1:]original_filename [ [user2]@host2:]new_filename
where the parts in brackets ([]) are optional. rcp does not prompt for passwords, so you must have
permission to execute remote commands on the specified machines as the selected user on each
machine.

86)basename
deliver portions of path names
basename pathname [suffix]
Given a pathname, strip the path prefix and leave just the filename, which is printed on standard output. If specified, a filename suffix (e.g., .c) is removed also. basename is typically invoked via command substitution (`...`) to generate a filename. See also dirname.
The Solaris version of basename allows the suffix to be a pattern of the form accepted by expr. See the entry for expr for more details