Linux Command Guide

Search and explore various Linux commands.

Ask AI

Summarize the situation you want to resolve in up to 300 characters and ask the AI which commands you need.

Search freely

Click on the desired category to filter the commands. You can also enter a keyword to search for specific content.



tr

tr: Character Translation and Deletion Filter

The `tr` command is a filter command used to translate or delete characters from text received via standard input (stdin). It is particularly useful when used with pipes (|) to process the output of other commands.

Learn more

traceroute

traceroute: Trace Network Path

The traceroute command traces the route packets take to a network host and measures the transit delays of the packets through the Internet protocol. It is useful for diagnosing network problems and analyzing paths.

Learn more

tree

Guide to the tree Command: Output Directory Structure in Tree Format

`tree` command is used in Linux and Unix-like operating systems to visually display the contents of a specified directory in a hierarchical tree format. It allows you to quickly grasp files and subdirectories, making it very useful for navigating and documenting complex project structures or file systems. In this guide, learn how to install the `tree` command, its basic usage, and various options.

Learn more

true

true: The Always Successful Command

The true command performs no action and always exits successfully (with a status code of 0). It is primarily used in shell scripting to control the flow of conditional statements or loops, or to force the success of a particular command.

Learn more

tty

tty: Print the terminal device name

The tty command prints the file name of the terminal (TTY) device connected to standard input. This is useful in scripts to check if the current session is connected to a terminal.

Learn more

ufw

Mastering the ufw Command

`ufw` (Uncomplicated Firewall) is a command that makes it easy to manage firewalls in Ubuntu/Debian environments. It is important to fully understand its basic operation principles and options as it is the first step in server security.

Learn more

umask

umask Command Guide: Setting Default Permissions for Newly Created Files/Directories

`umask` command (user file-creation mode mask) is used in Linux and Unix-like operating systems to control the default access permissions for newly created files and directories. It plays an important role in enhancing security by setting a permission restriction mask that is automatically applied when files are created, preventing files from being created with unnecessarily broad permissions. Through this guide, you will learn the concept and usage of `umask`.

Learn more

umount

umount: Unmounting File Systems

The `umount` command safely detaches file systems that were mounted using the `mount` command. It is an essential command that must be executed before physically removing storage devices such as USB drives or external hard drives.

Learn more

unalias

unalias: Remove Alias

The unalias command is used to remove previously defined aliases in the shell. You can remove specific aliases or remove all aliases at once to clean up your shell environment. This command only affects the current shell session.

Learn more

uname

uname -i: Check Hardware Platform Information

The `uname -i` command prints the hardware platform or architecture name of the current system. This is useful for identifying the type of hardware the system is running on, especially when scripts need to perform different actions based on a specific architecture.

Learn more

uname

uname -m: Check System Architecture

The `uname -m` command outputs the hardware architecture of the current system (e.g., x86_64, aarch64). This is useful for determining if the system is 32-bit or 64-bit, or if it's ARM-based, and is essential for verifying software compatibility.

Learn more

uniq

uniq: Remove and Count Duplicate Lines

The `uniq` command is used to filter or report lines that are adjacent and identical in a text file or standard input. It's particularly useful with the `-c` option, which prefixes each line with the count of its occurrences, making it valuable for data analysis.

Learn more
previous Page 28 / 31 Next