Don't Try This at Home
For remove "*" you can try:
rm -Rf \*
Show Sample Output
run sync first to flush useful things out to disk!!! To free pagecache: echo 1 > /proc/sys/vm/drop_caches To free dentries and inodes: echo 2 > /proc/sys/vm/drop_caches To free pagecache, dentries and inodes: echo 3 > /proc/sys/vm/drop_caches Show Sample Output
This command adds a urpmi media source called "google-chrome" to the urpmi configuration on Mandriva or Mageia. Needs to be run as root. We specify the option "--update" so that when Google provides a newer version of Google Chrome web browser in their download system then running a system update (eg: "urpmi --auto-update") will result in our copy of Google Chrome getting updated (along with any other Mandriva/Mageia pending updates). To install Google Chrome from this source, use: urpmi google-chrome-stable #install Google chrome web browser Show Sample Output
A *.tar.gz file needs to be unzipped & then untarred. Previously I might have unzipped first with
gunzip -d file.tar.gz
and then untarred the result with
tar -xvf file.tar
(Options are extract, verbose, file)
Using the -z (decompress) option on tar avoids the use of gzip (or gunzip) first.
Additionally the -C option will specify the directory to extract to.
where proc filesystem mounted under /proc Show Sample Output
hello Show Sample Output
You send a unicast ICMP packet to each host. Many firewalls will drop that ICMP. However, in order to send the ICMP, you'll have first done an ARP request and the remote machine is unlikely to ignore that, so the computer will be in your ARP table. Show Sample Output
There's no need to be logged in facebook. I could do more JSON filtering but you get the idea... Replace u=4 (Mark Zuckerberg, Facebook creator) with desired uid. Hidden or not hidden... Scary, don't you? Show Sample Output
A ping flood is a simple DoS attack where the attacker overwhelms the victim with ICMP Echo Request (ping) packets. It only succeeds if the attacker has more bandwidth than the victim (for instance an attacker with a DSL line and the victim on a dial-up modem). In this command replace 192.168.1.100 with victim IP address.
WARNING!! This command can produce to crash the unix system where you execute it. What this command do is to generate a lot of threads (so in practice -> process) until the system is overloaded, and to recover it, it is needed a reboot of the machine. I believe it is interesting to study how this command works, however It is important to notice that executing this, the system is going to crash, so PLEASE save all the work you have opened before. Maybe it can also corrupt the system... This is a fork bomb. More info: http://en.wikipedia.org/wiki/Fork_bomb
This command will show you the entire payload of a packet. The final "s" increases the snaplength, grabbing the whole packet. Show Sample Output
commandlinefu.com is the place to record those command-line gems that you return to again and again. That way others can gain from your CLI wisdom and you from theirs too. All commands can be commented on, discussed and voted up or down.
Every new command is wrapped in a tweet and posted to Twitter. Following the stream is a great way of staying abreast of the latest commands. For the more discerning, there are Twitter accounts for commands that get a minimum of 3 and 10 votes - that way only the great commands get tweeted.
» http://twitter.com/commandlinefu
» http://twitter.com/commandlinefu3
» http://twitter.com/commandlinefu10
Use your favourite RSS aggregator to stay in touch with the latest commands. There are feeds mirroring the 3 Twitter streams as well as for virtually every other subset (users, tags, functions,…):
Subscribe to the feed for: