![]() ![]() It is used to list all the files and directories. It is also used to edit any kind of Linux files. The Unix 'vi' editor is a standard text editor. It is used to edit all kinds of Unix files. It is used to download files from the internet. Package management tool:- It is used to install / update / erase rpm packages It is used to view the contents of a text file one full screen at a time, Using the spacebar key to help move to the next page. Timestamps: It is used for timestamps of a file like "create, update, modify".It can also be used to create an empty file. Word count:- It is mainly used for counting, either words, characters, or lines.Ĭreate directory: It is used to create a directoryĭelete file:- It is used to delete files and directories Search pattern of a file:- It is used to search for a given file pattern by specific users It is also referred to as "chdir".Ĭopy:- It is used to copy files and directories from one place to another.Ĭhange permission:- It is used to change the read, write, or execution permission of a file or directory.Ĭhange owner:- It is used to change the ownership of a file or directory Some of the most used general shell commands in Linux :Ĭhange directory:- It is used to change the working directory. The sftp utility accepts the same commands as normal FTPs. ![]() Using the above 'sftp' command we can access the remote server with a secure encrypted connection. SSH client : An active ssh client like " Terminal for Linux/Mac and Putty for Windows" Our goal is to access the remote server using the 'ssh' command. This guide assumes that you already have some servers at a remote location which is running on Linux (CentOS / RHEL), it could be either a Web server or Mail Server or DNS Server. Therefore, it is highly recommended to read the guidelines. You can use the same guide for all the RHEL / CentOS / Fedora versions, but for other distros, there might be a small type of difference in using it. All the below examples of ssh commands are tested on RHEL/CentOS 7.6. This guide will help you on how to login to the remote server (let's say a Web Server) from your local system/host (client PC). We can also say SSH is a replacement for Telnet, rlogin, and rsh which is a completely insecure protocol to connect the system across the network. This service is mainly used by System and Network Administrators to execute commands and manage servers/systems. SSH protocol is used to access the remote server/system with an encrypted method of login using the default TCP/IP port 22 or a custom based port number. SSH is one of the main key services in Linux/Unix based systems. ![]()
0 Comments
Leave a Reply. |