Thanks for so much help dude i just loved it.
Tips and Tricks
Topic: Tips and Tricks
By Abhradeep Ghosh
Subject Thanks Man!Reply
Subject tips on facebook privacyReply
Tips to Stay Safe
Here's some advice from Sileo, who wrote the "Facebook Safety Survival Guide," about protecting online privacy on all social-networking sites:
• Never post your exact date and place of birth. It's invaluable information to identity thieves, particularly when the two are bundled together.
• Never post your address, phone number or email address. This is plum information to scammers and marketers who are looking for nuggets of your identity.
• Control who can see your personal information. Many social-networking sites have privacy features, but they change often. Know what they are, stay on top of them and restrict your page to your real friends, not friends of friends or someone you met in a bar.
• Limit information about your activities. If you must brag about a trip or a fabulous party, do it after the fact.
• Remember that what you post is public and permanent. Don't put up embarrassing photos that you wouldn't show your grandmother. Don't complain about your job or your boss. Don't say something to or about someone that you wouldn't say to his face. Don't threaten others.
• Know the four types of Facebook users: friends, outsiders, businesses and enemies.
• You should know exactly who wants to be your friend or is asking you to link into their network. Some people will befriend your friends to get to you or your company.
• Be wary of seemingly harmless quizzes. When someone invites you to take a survey, say, "10 Things Others Don't Know About You" or "My Favorite Things," it may be designed to harvest your data. The name of the street you grew up on or your favorite vacation spot could be clues to your passwords.
• Before you share any information anywhere online about yourself or your workplace, ask this question: What would the consequences be if this information fell into the hands of my boss, competitor or people who don't like me?
Subject need for thesis websiteReply
Subject thesis guide websiteReply
Subject tips for system managementReply
Valen Yvone Bolloso BSIT4
-refers to enterprise-wide administration of distributed systems including (and commonly in practice) computer systems . Systems management is strongly influenced by network management initiatives in telecommunications.
-The general area of Information Technology (IT) that concerns configuring and managing computer resources, especially network resources.
System administrator, systems administrator, or sysadmin,
- is a person employed to maintain and operate a computer system and/or network. System administrators may be members of an information technology (IT) department.
• apropos whatis -Show commands pertinent to string. See also threadsafe
• man -t man | ps2pdf - > man.pdf- make a pdf of a manual page
which command -Show full path name of command
time command -See how long a command takes
• time cat -Start stopwatch. Ctrl-d to stop. See also sw
• cd - Go to previous directory
• cd -Go to $HOME directory
(cd dir && command) -Go to dir, execute command and return to current dir
• pushd . -Put current dir on stack so you can popd back to it
• alias l='ls -l --color=auto'- quick dir listing
• ls -lrt -List files by date. See also newest and find_mm_yyyy
• ls /usr/bin | pr -T9 -W$COLUMNS -Print in 9 columns to width of terminal
find -name '*.[ch]' | xargs grep -E 'expr' -Search 'expr' in this dir and below. See also findrepo
find -type f -print0 | xargs -r0 grep -F 'example' -Search all regular files for 'example' in this dir and below
find -maxdepth 1 -type f | xargs grep -F 'example' -Search all regular files for 'example' in this dir
find -maxdepth 1 -type d | while read dir; do echo $dir; echo cmd2; done- Process each item with multiple commands (in while loop)
• find -type f ! -perm -444- Find files not readable by all (useful for web site)
• find -type d ! -perm -111 -Find dirs not accessible by all (useful for web site)
• locate -r 'file[^/]*\.txt' -Search cached index for names. This re is like glob *file*.txt
• look reference -Quickly search (sorted) dictionary for prefix
• grep --color reference /usr/share/dict/words -Highlight occurances of regular expression in dictionary
archives and compression
gpg -c file -Encrypt file
gpg file.gpg- Decrypt file
tar -c dir/ | bzip2 > dir.tar.bz2 -Make compressed archive of dir/
bzip2 -dc dir.tar.bz2 | tar -x- Extract archive (use gzip instead of bzip2 for tar.gz files)
tar -c dir/ | gzip | gpg -c | ssh user@remote 'dd of=dir.tar.gz.gpg' -Make encrypted archive of dir/ on remote machine
find dir/ -name '*.txt' | tar -c --files-from=- | bzip2 > dir_txt.tar.bz2 -Make archive of subset of dir/ and below
find dir/ -name '*.txt' | xargs cp -a --target-directory=dir_txt/ --parents- Make copy of subset of dir/ and below
( tar -c /dir/to/copy ) | ( cd /where/to/ && tar -x -p ) -Copy (with permissions) copy/ dir to /where/to/ dir
( cd /dir/to/copy && tar -c . ) | ( cd /where/to/ && tar -x -p )- Copy (with permissions) contents of copy/ dir to /where/to/
( tar -c /dir/to/copy ) | ssh -C user@remote 'cd /where/to/ && tar -x -p' -Copy (with permissions) copy/ dir to remote:/where/to/ dir
dd bs=1M if=/dev/sda | gzip | ssh user@remote 'dd of=sda.gz'
ssh (Secure SHell)
ssh $USER@$HOST command -Run command on $HOST as $USER (default command=shell)
• ssh -f -Y $USER@$HOSTNAME xeyes -Run GUI command on $HOSTNAME as $USER
scp -p -r $USER@$HOST: file dir/ -Copy with permissions to $USER's home directory on $HOST
ssh -g -L 8080:localhost:80 root@$HOST -Forward connections to $HOSTNAME:8080 out to $HOST:80
ssh -R 1434:imap:143 root@$HOST -Forward connections from $HOST:1434 in to imap:143