Skip to main content

Few important thing in linux world

Changing permissions with chmod (numbers)

If you own a fi le, you can use the chmod command to change the permission on it as you
please. In one method of doing this, each permission (read, write, and execute) is assigned
a number —

r=4,
w=2, (important)
x=1

— and you use each set’s total number to establish the
permission. For example, to make permissions wide open for yourself as owner, you would
set the fi rst number to 7 (4+2+1), and then you would give the group and others read-only
permission by setting both the second and third numbers to 4 (4+0+0), so that the fi nal
number is 744. Any combination of permissions can result from 0 (no permission) through
7 (full permission).

chmod 777 file

Changing permissions with chmod(letters)

you can change permission for the
user (u),
group (g),
other (o),
and all users(a).

What you would change includes the
read (r),
write (w), and
execute (x) bits

Metacharacters in file matching

* — Matches any number of characters.
? — Matches any one character.
[...] — Matches any one of the characters between the brackets, which can
include a hyphen-separated range of letters or numbers.

Redirection in Linux Terminal:

< — Directs the contents of a file to the command. In most cases, this is the
default action expected by the command and the use of the character is optional

> — Directs the standard output of a command to a file. If the file exists, the
content of that file is overwritten.
 2> — Directs standard error (error messages) to the file.
 &> — Directs both standard output and standard error to the file.
 >> — Directs the output of a command to a file, adding the output to the end of
the existing file.

Using brace expansion characters

By using curly braces ({}), you can expand out a set of characters across fi lenames,
directory names, or other arguments you give commands. For example, if you want to
create a set of files such as memo1 through memo5, you can do that as follows:

$ touch memo{1,2,3,4,5}
$ ls

memo1
memo2
memo3
memo4
memo5

The items that are expanded don’t have to be number or even single digits. For example,
you could use ranges of numbers or digits. You could also use any string of characters,
as long as you separate them with commas. Here are some examples:

$ touch {John,Bill,Sally}-{Breakfast,Lunch,Dinner}
$ ls

Bill-Breakfast Bill-Lunch
John-Dinner Sally-Breakfast
Bill-Dinner
John-Breakfast John-Lunch
Sally-Dinner

$ rm -f {John,Bill,Sally}-{Breakfast,Lunch,Dinner}
$ touch {a..f}{1..5}
$ ls
a1 a3 a5 b2 b4 c1 c3 c5 d2 d4 e1 e3 e5 f2 f4
a2 a4 b1 b3 b5 c2 c4 d1 d3 d5 e2 e4 f1 f3 f5
Sally-Lunch

In the first example, the use of two sets of braces means John, Bill, and Sally each have
filenames associated with Breakfast, Lunch, and Dinner. If I had made a mistake, I could
easily recall the command and change touch to rm -f to delete all the files. In the next
example, the use of two dots between letters a and f and numbers 1 and 5 specifies the
ranges to be used. Notice the files that were created from those few characters.

Comments

Popular posts from this blog

Docker

Docker is used to run software packages called "containers". Containers are isolated from each other and bundle their own tools, libraries and configuration files; they can communicate with each other through well-defined channels                                                                                                --Wikipedia  I have already written a article about the containers you can check out in here https://thangaayyanar.blogspot.com/2018/06/containers.html This time, let's learn more about docker engine how we can use this. The important things we need to know in docker are Docker Image:  The container can be created with the help of Image. The Image file consists of code, libraries, environment variable...

My experience in iOS Hackathon

This is my second hackathon, my first hackathon was on machine learning if you want to check out that article by following the below link https://thangaayyanar.blogspot.com/2018/02/what-i-learned-from-machine-learning.html So let's get started First let us discuss about the idea of what we are trying to achieve in this hackathon. From the above image you can able to know that we are going to recognize text from the image and use it to do find which field it is.  we separated this idea into three modules Identify the region Recognize the text  Field classification Module I : Identify the region To identify the selected region we used Vision framework ( ML framework provided by apple to detect the object ). The vision framework give us the boundary of the text region ( i.e frame - x,y,width,height ).  Then using the above region we crop the selected region and pass it to the next module. Module II : Recognize the text To recognize the text we ...

codefest-ctf-18 writeup

Codefest is online CTF challenge conducted by Hackerrank on August 31 2018 6:00 PM IST to September 1 2018 12:00 PM IST. They have given dozens of challenges.  link: https://www.hackerrank.com/contests/codefest-ctf-18/challenges I manage to complete two challenges in this article i will explain how i solved the two  Typing Master Question If you think you have it in you, connect now to 34.216.132.109 9093 and prove your mettle. You will be presented with a simple typing task which is meant to check your typing speed. For example, Can you type 'Z' 10 times followed by 'u' 6 times, followed by the sum of their ASCII values? ZZZZZZZZZZuuuuuu207 Input Format Regarding input to the server - The question was designed keeping netcat in mind. Some users who are using other tools/language (eg, Python, PuTTY, TELNET) to connect to the server please note that they do not terminate the strings like netcat does. If you choose not to use netcat, t...