Linux Command Guide

Search and explore various Linux commands.

Ask AI

Summarize the situation you want to resolve in up to 300 characters and ask the AI which commands you need.

Search freely

Click on the desired category to filter the commands. You can also enter a keyword to search for specific content.



logrotate

logrotate: System Log File Management

logrotate is a utility that automates the rotation, compression, removal, and mailing of system log files. This tool prevents log files from growing too large, consuming disk space, or impacting system performance, thereby enabling efficient log management.

Learn more

lshw

lshw: Display detailed hardware information

A command that lists the hardware components of your system in detail. You can check various information such as CPU, memory, disks, and network interfaces.

Learn more

lspci

lspci: Check PCI Device Information

This command displays detailed information about all devices connected to the system's PCI (Peripheral Component Interconnect) bus. It is used to check information for various hardware devices such as graphics cards, network cards, and sound cards.

Learn more

lsusb

lsusb: List USB Devices

Lists information about USB devices connected to the system. It displays details such as USB bus, device ID, manufacturer, product name, and speed, making it useful for troubleshooting and identifying USB devices.

Learn more

man

man Command Guide: Accessing Linux Manual Pages

`man` command (short for manual) is used to display online manual pages for various system elements such as commands, functions, file formats, and kernel interfaces in Linux and Unix-like operating systems. It is a fundamental source of information to understand system functionality and troubleshoot issues. Through this guide, learn how to use the `man` command and efficiently navigate the manual pages.

Learn more

mkfs

mkfs: File System Creation Tool

The mkfs command is used in Linux to create (format) file systems on disk partitions. With this tool, you can create new partitions and build a logical structure where data can be stored. It supports various file system types (ext4, XFS, FAT, etc.).

Learn more

mknod

mknod: Create Special Files

The mknod command is used to create special files, such as block devices, character devices, and FIFOs (named pipes). Unlike regular files, these files are associated with specific hardware devices or inter-process communication mechanisms in the system. They are primarily used by system administrators when interacting with device drivers or setting up inter-process communication channels.

Learn more

mkswap

mkswap: Set up a Linux swap area

The mkswap command sets up a Linux swap area on a specified device (partition) or file. A swap area is a virtual memory space used when the system's physical memory is insufficient, playing a crucial role in system performance. Executing this command will result in the loss of all existing data on the target disk space.

Learn more

modprobe

modprobe: Kernel Module Management

modprobe is a command used to add or remove modules from the Linux kernel. It automatically handles module dependencies, loading or unloading all necessary modules together. It manages modules at a higher level than `insmod` or `rmmod`.

Learn more

mount

mount: Mount and Unmount File Systems

The `mount` command connects a file system to a specified directory, making it accessible. It is used to integrate various storage devices such as hard disks, USB drives, and CD-ROMs into the system's file hierarchy.

Learn more

objdump

objdump: Display Information for Object Files

This command analyzes and displays various information from binary files such as executable files, object files, and libraries. It is useful for debugging and reverse engineering as it can show assembly code, headers, sections, and symbol tables.

Learn more

openssl

openssl: Encryption and Security Tool

OpenSSL is a powerful open-source toolkit that provides an implementation of the SSL/TLS protocol and various cryptographic functionalities. It is used for security-related tasks such as generating certificates, managing keys, and encrypting/decrypting data.

Learn more
previous Page 5 / 11 Next