commandlinefu.com is the place to record those command-line gems that you return to again and again.
Delete that bloated snippets file you've been using and share your personal repository with the world. That way others can gain from your CLI wisdom and you from theirs too. All commands can be commented on, discussed and voted up or down.
If you have a new feature suggestion or find a bug, please get in touch via http://commandlinefu.uservoice.com/
You can sign-in using OpenID credentials, or register a traditional username and password.
First-time OpenID users will be automatically assigned a username which can be changed after signing in.
Every new command is wrapped in a tweet and posted to Twitter. Following the stream is a great way of staying abreast of the latest commands. For the more discerning, there are Twitter accounts for commands that get a minimum of 3 and 10 votes - that way only the great commands get tweeted.
Use your favourite RSS aggregator to stay in touch with the latest commands. There are feeds mirroring the 3 Twitter streams as well as for virtually every other subset (users, tags, functions,…):
Subscribe to the feed for:
I can remember "cp -av" on Unix like systems to copy files and directories. The same can be done on Windows without extra software, somewhat.
The switches mean:
/E Copies directories and subdirectories, including empty ones.
Same as /S /E. May be used to modify /T.
/H Copies hidden and system files also.
/Y Suppresses prompting to confirm you want to overwrite an
existing destination file.
/Z Copies networked files in restartable mode.
/I If destination does not exist and copying more than one file,
assumes that destination must be a directory.
/K Copies attributes. Normal Xcopy will reset read-only attributes.
/F Displays full source and destination file names while copying.
I don't type that all the time, I stick it into a file called "cpav.cmd" and run that.
echo xcopy /e/h/y /z/i /k /f %1 %2 > cpav.cmd
cpav zsh zsh2
I use this command to select a random movie from my movie collection..
shell loop to scan netstat output avoiding loolback aliases (local/remote swap for local connections)
greps your bash history for whatever you type in at the end returning it in reverse chronological order (most recent invocations first), should work on all distros.
works well as an alias
This command loops over all indexes of the system variable array ARRAY and puts its content into %A.
Create this array before, e.g. by
For using inside of a batch file, write %%A instead of %A.
The same thing using only Bash built-in's.
For readability I've kept the variables out, but it could me made extremely more compact (and totally unreadable!) by stuffing everything inside the single echo command.
This is *NOT* about the -i option in grep. I guess everybody already knows that option. This is about the basic rule of life that the simplest things are sometimes the best. ;-)
One day when I used "grep -i" for the umpteenth time, I decided to make this alias, and I've used it ever since, probably more often than plain grep. (In fact I also have aliases egrip and fgrip defined accordingly. I also have wrip="grep -wi" but I don't use this one that often.)
If you vote this down because it's too trivial and simplistic, that's no problem. I understand that. But still this is really one of my most favourite aliases.
Replaces tabs in output with spaces. Uses perl since sed seems to work differently across platforms.
Replace FILE with a filename (or - for stdin).
Shows a single line per interface (device), with its IPv4 settings.
Shorter command, better readability in output.
After you install slocate ,the first thing you have to do with it to initialise the database by issuing a command " slocate -u" . And then onwards just give the filename or dirname as a argument to the slocate command will reveal the files/dirs location in the system along with path.Moreover over it's an securely way of looking into the file system.
file displays a files type
the -L flag means follow sym-links (as libraries are often sym-linked to another this behavior is likely preferred)
more complex behavior (*two* grep commands!) could be used to determine if the file is or is not a shared library.
Now a bit of explanation required for this command.Once you type the command it opens up an vi editor with an temporary file enlisting the password file information .So if you make an change it will not reflected in the passwd file until you save the file.The reason behind using this command over other way to view the password file in network environment is that it locks the password file when you start working with it.So no one can temper with it during that period.Once you are done(means you save the tmp file) ,it will release the lock associated with it.I think it's a better mechanism to view the sensitive data like passwd file.Never ever use other tool like cat, nano or any other means.
In bash, by pressing ALT+n and then a character x, x will be printed n times
I know is not the same as the original command, but is correlated.