Skip to main content

Unix and Linux shortcut keys


Keyboard shortcut keys
CTRL + BMoves the cursor backward one character.
CTRL + CCancels the currently running command.
CTRL + DLogs out of the current session.
CTRL + FMoves the cursor forward one character.
CTRL + HErase one character. Similar to pressing backspace.
CTRL + PPaste previous line(s).
CTRL + SStops all output on screen (XOFF).
CTRL + QTurns all output stopped on screen back on (XON).
CTRL + UErases the complete line.
CTRL + WDeletes the last word typed in. For example, if you typed 'mv file1 file2' this shortcut would delete file2.
CTRL + ZCancels current operation, moves back a directory or takes the current operation and moves it to the background. See bg command for additional information about background.
Command line shortcuts
In addition to the below command line shortcuts, it is also helpful to use the alias command that allows you to specify a keyword for frequently used commands or mistakes.
~Moves to the user's home directory.
!!Repeats the line last entered at the shell. See history command for previous commands.
!$Repeats the last argument for the command last used. See history command for previous commands.
resetResets the terminal if terminal screen is not displaying correctly.
shutdown -h nowRemotely or locally shuts the system down.

Comments

Popular posts from this blog

Proxy list

* http://www.proxy4free.com * http://www.publicproxyservers.com * http://www.anonymitychecker.com * http://www.proxz.com * http://www.digitalcybersoft.com/ProxyList/ * http://www.checker.freeproxy.ru * http://tools.rosinstrument.com/proxy/ * http://www.samair.ru/proxy/ * http://www.multiproxy.org/anon_proxy.htm * http://www.atomintersoft.com/product...xy/proxy-list/ [/b]

Useful & Valuable Sites

For Urgent Blood Requirements call +91888704898 Learn online Udemy Coursera Khan Openculture W3Schools Buy online Flipkart Amazon Myntra shopclues freekaamaal Online App Ajio Craftvilla Mirraw Limeroad Voonik Travel Booking Railway Paytm Redbus goibibo Trivago Sales OLX Justdail Quikr carwale 2ndhandbazar Jobs Search Bank Jobs BJS Glassdoor LinkedIn Freelancer S/W Downloads Filehippo Softpedia Download.com SourceForge BrotherSoft Flight Booking Qatar Singapore Makeytrip goindgo Emirates Status Enquiry Passport Panind Aadhar voter PF Yoga Acupoints Acupuncture Prachina Yoga Ayurveda Learn Cloud AWS Azure IBM VMware Redhat Search Engines Google yahoo amazon dogpile aol
Top 10 Most Common Cyber Attacks Denial-of-service (DoS) and distributed denial-of-service (DDoS) attacks A denial-of-service attack overwhelms a system’s resources so that it cannot respond to service requests. A DDoS attack is also an attack on system’s resources, but it is launched from a large number of other host machines that are infected by malicious software controlled by the attacker. Unlike attacks that are designed to enable the attacker to gain or increase access, denial-of-service doesn’t provide direct benefits for attackers. For some of them, it’s enough to have the satisfaction of service denial. However, if the attacked resource belongs to a business competitor, then the benefit to the attacker may be real enough. Another purpose of a DoS attack can be to take a system offline so that a different kind of attack can be launched. One common example is session hijacking, which I’ll describe later. There are different types of DoS and DDoS attacks; the most common are ...