Linux Command Guide

Search and explore various Linux commands.

Ask AI

Summarize the situation you want to resolve in up to 300 characters and ask the AI which commands you need.

Search freely

Click on the desired category to filter the commands. You can also enter a keyword to search for specific content.

sedutil-test

sedutil-test: SED Compatibility and Functionality Testing

sedutil-test is a utility for verifying the compatibility and functionality of TCG Opal Self-Encrypting Drives (SEDs). It performs various tests to ensure that a specified drive can be used with sedutil-cli and that its encryption features are working correctly.

Learn more

semanage

semanage: SELinux Policy Management

semanage is a command-line tool used for managing SELinux (Security-Enhanced Linux) policies. It allows you to add, modify, delete, and list various SELinux policy elements, including file contexts, network ports, booleans, and user mappings. It helps ensure that applications and services operate securely by providing fine-grained control over your system's security policy.

Learn more

service

service: System Service Management

The `service` command is used to manage system services by executing System V init scripts. It is primarily used for tasks such as starting, stopping, restarting, and checking the status of services. While `systemctl` is more recommended on `systemd`-based systems, `service` can still be useful for backward compatibility or in specific scenarios.

Learn more

sestatus

sestatus: Check SELinux Status

The sestatus command is used to check the current status and policy information of SELinux (Security-Enhanced Linux). It allows you to quickly grasp important security-related information such as whether SELinux is enabled, its current operating mode (enforcing, permissive, disabled), and the path to the loaded policy file and its version.

Learn more

setfacl

setfacl: Setting File Access Control Lists (ACLs)

The `setfacl` command is used to set Access Control Lists (ACLs) for files and directories. It goes beyond the traditional Unix permission model (owner, group, others) by allowing you to grant or revoke fine-grained read, write, and execute permissions for specific users or groups. This enables flexible management of complex permission requirements.

Learn more

setgid

setgid: Understanding and Setting the SGID Bit

setgid is a special permission bit applied to files or directories. When set on a directory, all files and subdirectories created within it inherit the group ownership of the parent directory. When set on an executable file, the file is executed with the group ID of the file's owner. This is useful for simplifying group permission management in shared environments or for ensuring specific programs run with particular group privileges.

Learn more

sha256sum

sha256sum: Calculate and Verify SHA256 Checksums

The sha256sum command is used to calculate the SHA256 hash value of a file or to verify the integrity of a file by comparing it against a pre-generated hash file. This is essential for ensuring file reliability in various scenarios, such as checking for file corruption after data transfer or verifying the integrity of downloaded software files.

Learn more

shutdown

shutdown: Safely Shutting Down Your System

The `shutdown` command is used to safely shut down or reboot the system. It notifies all users of the shutdown at a specified time and gracefully terminates all processes to prevent data loss.

Learn more

strace

strace: System Call and Signal Tracer

strace is a powerful diagnostic tool for Linux that traces and records the system calls (syscalls) made by a process and the signals it receives. It allows you to understand in detail how a program interacts with the kernel, making it useful for debugging, performance analysis, and security auditing.

Learn more

su

su: Switch User

The `su` command, short for 'substitute user' or 'switch user', is used to change the current user ID to another user's ID. It is commonly used to gain administrator privileges (root) or to perform tasks within another user's environment. It requires password authentication to gain privileges and is a critical command for security.

Learn more

sudo

Guide to the sudo Command: Execute Commands with Administrative Privileges

`sudo` (short for substitute user do or superuser do) is a tool that allows a regular user to execute programs with the privileges of another user (usually the root user) in Linux and Unix-like operating systems. This enables management tasks to be performed safely while maintaining system security, making it much safer than performing all tasks directly as the root account. Through this guide, you will learn the basic usage of `sudo` and important security considerations.

Learn more

sudoedit

sudoedit: Safely Edit Privileged Files

`sudoedit` is a command that allows you to safely edit files requiring `sudo` privileges. It reduces security risks by automatically copying the file for editing as a regular user and then copying it back to its original location. The `-l` option, in particular, lists files that the current user can edit via `sudoedit`.

Learn more
previous Page 7 / 10 Next