Search and explore various Linux commands.
Summarize the situation you want to resolve in up to 300 characters and ask the AI which commands you need.
Click on the desired category to filter the commands. You can also enter a keyword to search for specific content.
passwd: Change User Password
The passwd command is used to change user account passwords on a Linux system. Regular users can only change their own passwords, while the root user can change passwords for all user accounts or perform additional tasks such as locking/unlocking accounts.
perf: Linux Performance Analysis Tool
perf is a powerful performance monitoring and analysis tool built into the Linux kernel. It is used to identify and optimize performance bottlenecks in applications and systems by tracking various hardware and software events such as CPU usage, cache misses, and system calls. It operates at the kernel level, providing highly detailed and accurate performance data.
poweroff: Guide to Shutting Down the System
The poweroff command is used to safely shut down the system and completely cut off power. It is similar to 'halt' but its primary purpose is to turn off the power. It is mainly used by system administrators to shut down servers.
quota: Check Disk Usage Quotas
The quota command reports disk usage and quota limits for users or groups on a file system. It is useful for users to check the disk usage limits set by system administrators.
readelf: Display Information About ELF Files
The readelf command is used to analyze and display detailed information about executable files, shared libraries, object files, and other files in the ELF (Executable and Linkable Format). This information includes headers, sections, symbol tables, and dynamic linking information.
Guide to the reboot Command: Restarting the System
`reboot` command is used to safely restart a Linux system. It is utilized when applying system updates, troubleshooting issues, or needing to reset the system state. This guide explains the basic usage of `reboot` and highlights the differences with the recommended `systemctl reboot` method in modern Linux systems.
restorecon: Restore SELinux Security Contexts
The restorecon command is used to restore the SELinux security contexts of files and directories on the filesystem to their system policy-defined defaults. This is essential for resolving access denial issues that can occur when files have incorrect contexts, particularly useful after moving, copying, or creating files where the context might not have been set correctly.
rmmod: Remove a Kernel Module
rmmod is a command used to remove a currently loaded module from the Linux kernel. This command automatically checks module dependencies, ensuring that modules depended upon by other modules are not removed. It is useful for efficiently managing system resources or resolving specific hardware driver issues.
rpm: RPM Package Management
RPM (Red Hat Package Manager) is a powerful command-line tool used in Red Hat-based Linux distributions (RHEL, CentOS, Fedora, etc.) for installing, updating, removing, and querying software packages. It is designed for efficient management of packages in the `.rpm` format.
sar: System Activity Reporter
The sar (System Activity Reporter) command is used to collect and report various system activity information in real-time, including CPU, memory, disk I/O, and network. It is an essential tool for system performance analysis and troubleshooting.
scriptreplay: Replaying Terminal Sessions
scriptreplay is a tool that replays terminal sessions (typescript) recorded by the 'script' command, along with timing information. It recreates everything a user typed and outputted in the terminal at the recorded time intervals, making it useful for various purposes such as education, demonstrations, troubleshooting, and security audits. It is particularly effective for reproducing complex command sequences or specific scenarios.
sedutil-cli: Self-Encrypting Drive (SED) Management
sedutil-cli is a command-line utility for managing Self-Encrypting Drives (SEDs) that comply with the TCG Opal standard. It allows you to perform various operations such as enabling drive encryption, setting passwords, configuring locking ranges, and querying drive status.