Search and explore various Linux commands.
Summarize the situation you want to resolve in up to 300 characters and ask the AI which commands you need.
Click on the desired category to filter the commands. You can also enter a keyword to search for specific content.
sedutil-test: SED Compatibility and Functionality Testing
sedutil-test is a utility for verifying the compatibility and functionality of TCG Opal Self-Encrypting Drives (SEDs). It performs various tests to ensure that a specified drive can be used with sedutil-cli and that its encryption features are working correctly.
semanage: SELinux Policy Management
semanage is a command-line tool used for managing SELinux (Security-Enhanced Linux) policies. It allows you to add, modify, delete, and list various SELinux policy elements, including file contexts, network ports, booleans, and user mappings. It helps ensure that applications and services operate securely by providing fine-grained control over your system's security policy.
service: System Service Management
The `service` command is used to manage system services by executing System V init scripts. It is primarily used for tasks such as starting, stopping, restarting, and checking the status of services. While `systemctl` is more recommended on `systemd`-based systems, `service` can still be useful for backward compatibility or in specific scenarios.
sestatus: Check SELinux Status
The sestatus command is used to check the current status and policy information of SELinux (Security-Enhanced Linux). It allows you to quickly grasp important security-related information such as whether SELinux is enabled, its current operating mode (enforcing, permissive, disabled), and the path to the loaded policy file and its version.
setfacl: Setting File Access Control Lists (ACLs)
The `setfacl` command is used to set Access Control Lists (ACLs) for files and directories. It goes beyond the traditional Unix permission model (owner, group, others) by allowing you to grant or revoke fine-grained read, write, and execute permissions for specific users or groups. This enables flexible management of complex permission requirements.
setgid: Understanding and Setting the SGID Bit
setgid is a special permission bit applied to files or directories. When set on a directory, all files and subdirectories created within it inherit the group ownership of the parent directory. When set on an executable file, the file is executed with the group ID of the file's owner. This is useful for simplifying group permission management in shared environments or for ensuring specific programs run with particular group privileges.
sha256sum: Calculate and Verify SHA256 Checksums
The sha256sum command is used to calculate the SHA256 hash value of a file or to verify the integrity of a file by comparing it against a pre-generated hash file. This is essential for ensuring file reliability in various scenarios, such as checking for file corruption after data transfer or verifying the integrity of downloaded software files.
shutdown: Safely Shutting Down Your System
The `shutdown` command is used to safely shut down or reboot the system. It notifies all users of the shutdown at a specified time and gracefully terminates all processes to prevent data loss.
strace: System Call and Signal Tracer
strace is a powerful diagnostic tool for Linux that traces and records the system calls (syscalls) made by a process and the signals it receives. It allows you to understand in detail how a program interacts with the kernel, making it useful for debugging, performance analysis, and security auditing.
su: Switch User
The `su` command, short for 'substitute user' or 'switch user', is used to change the current user ID to another user's ID. It is commonly used to gain administrator privileges (root) or to perform tasks within another user's environment. It requires password authentication to gain privileges and is a critical command for security.
Guide to the sudo Command: Execute Commands with Administrative Privileges
`sudo` (short for substitute user do or superuser do) is a tool that allows a regular user to execute programs with the privileges of another user (usually the root user) in Linux and Unix-like operating systems. This enables management tasks to be performed safely while maintaining system security, making it much safer than performing all tasks directly as the root account. Through this guide, you will learn the basic usage of `sudo` and important security considerations.
sudoedit: Safely Edit Privileged Files
`sudoedit` is a command that allows you to safely edit files requiring `sudo` privileges. It reduces security risks by automatically copying the file for editing as a regular user and then copying it back to its original location. The `-l` option, in particular, lists files that the current user can edit via `sudoedit`.