A brief guide to UNIX

UNIX- Unix is an operating system that lets multiple people use a computer at the same time and run different programs. it is known for being stable, secure, and efficient. many modern systems, like Linux and macOS, are based on UNIX. it’s often used in servers and big computer systems because it works well for managing files and running programs smoothly.

Unix architecture

Unix Architecture Explained

Unix architecture is typically divided into four main layers, each playing a crucial role in how the system operates:

  1. Hardware:

    • This is the physical layer, including the CPU, memory, and storage devices.

    • It executes machine-level instructions provided by the operating system.

  2. Kernel:

    • The core of Unix, responsible for managing hardware resources.

    • It handles process management, memory management, file system, device management, and system calls.

    • Directly interacts with the hardware and provides a layer of abstraction for software.

  3. Shell:

    • The interface between users and the kernel.

    • It takes user commands, interprets them, and passes them to the kernel for execution.

    • Examples: Bash, C Shell (csh), Korn Shell (ksh), Z Shell (zsh).

  4. Applications & Utilities:

    • These are user-level programs like text editors, compilers, and file management tools.

    • Common utilities include ls, cat, grep, awk, sed, vi, gcc.

Each layer ensures a structured and modular design, allowing Unix to be secure, stable, and multitasking.

Features of Unix

Unix is known for its stability, security, and efficiency. Here are its key features:

  1. Multiuser System

    • Multiple users can access the system simultaneously without interference.
  2. Multitasking

    • Supports running multiple programs at the same time using process scheduling.
  3. Portability

    • Written in C, making it adaptable to different hardware platforms.
  4. Hierarchical File System

    • Organizes files into directories (folders) in a structured manner.
  5. Shell (Command-line Interface)

    • Provides a powerful way to interact with the system using commands.
  6. Piping & Redirection

    • Allows combining multiple commands to process data efficiently (|, >, <).
  7. Device Independence

    • Treats hardware devices (printers, disks, etc.) as files, making management easier.
  8. Security & Permissions

    • Provides strong file and user-level security with permissions (read, write, execute).
  9. Process Management

    • Supports process creation, termination, and background execution.

Because of these features, Unix is widely used in servers, cloud computing, and enterprise environments.

Internal Commands (Built-in Shell Commands)

  • These are built into the shell (e.g., Bash, Zsh, etc.).

  • They do not require separate executable files.

  • They execute faster because the shell processes them directly.

  • Used for basic system operations like navigation, variable handling, and process control.

Examples of Internal Commands:

CommandDescription
cdChange directory
pwdPrint current working directory
echoDisplay a message or variable value
setSet shell options and variables
unsetRemove shell variables
exportExport an environment variable
aliasCreate command shortcuts
umaskSet default file permissions
exitClose the shell session

2. External Commands (Stored in /bin, /usr/bin, etc.)

  • These are separate executable files stored in system directories.

  • They require a full path or must be in the system’s $PATH to execute.

  • Typically, these are utility programs used for file manipulation, networking, etc.

Examples of External Commands:

CommandDescription
/bin/lsList files in a directory
/bin/cpCopy files and directories
/bin/mvMove or rename files
/usr/bin/grepSearch for text in files
/usr/bin/findLocate files in a directory
/usr/bin/tarArchive files
/usr/bin/awkText processing tool
/usr/bin/gccGNU C compiler

Basic Commands in UNIX

Echo Command in Unix

The echo command is used to display text, variables, or command outputs on the terminal.

Syntax:

echo [options] [text or variable]


Common Options & Examples

OptionDescriptionExample
(No option)Print simple textecho "Hello, Unix!" → Hello, Unix!
-nPrint without a newlineecho -n "Hello" → Hello (No newline)
-eEnable escape sequencesecho -e "Line1\nLine2" → Line1 (new line) Line2
-EDisable escape sequences (default)echo -E "Line1\nLine2" → Line1\nLine2 (No new line)

Date Command in Unix

The date command is used to display and format the system date and time.


Syntax:

date [OPTION] [+FORMAT]

Common Examples

CommandDescriptionExample Output
dateShow current date and timeMon Mar 24 14:30:00 UTC 2025
date "+%Y-%m-%d"Show date in YYYY-MM-DD format2025-03-24
date "+%d-%m-%Y %H:%M:%S"Custom date and time format24-03-2025 14:30:00
date "+%A, %B %d, %Y"Display full weekday and month namesMonday, March 24, 2025
date -uShow time in UTC (Coordinated Universal Time)Mon Mar 24 14:30:00 UTC 2025
date -d "next Monday"Get the date of next MondayMon Apr 01 00:00:00 UTC 2025
date -s "2025-03-24 15:00:00"Set system date and time (Requires root)Changes system time

Calender Command in Unix

The cal command in Unix is used to display a calendar. By default, it shows the current month's calendar, but you can use various options to customize the output.

Basic Syntax:

cal [OPTION]... [MONTH] [YEAR]
  • OPTION: Options to modify how the calendar is displayed (e.g., displaying a specific year, setting the start of the week).

  • MONTH: Optional. The month for which you want to display the calendar (1-12).

  • YEAR: Optional. The year for which you want to display the calendar (e.g., 2025).

Common Options:

  • -3: Shows the previous, current, and next months.

  • -y: Displays the entire year.

  • -m: Displays the month (default behavior).

  • -1: Displays a single month (default).

  • -A <number>: Displays the next <number> months.

  • -B <number>: Displays the previous <number> months.

  • -s <weekday>: Starts the week on the specified weekday (e.g., -s sunday).

  • -j: Displays the Julian date.

Common Examples:Display the current month's calendar:

Output:

Display the calendar :

1.     cal

Output:

Passsword Command in Unix

The passwd command in Unix is used to change the user password. By default, it changes the password of the current user, but you can also specify other users (if you're an administrator or have the necessary permissions).

Basic Syntax:

passwd [OPTION]... [LOGIN]

  • OPTION: Various options that modify how the password command works.

  • LOGIN: The username of the account whose password you want to change. If not specified, it defaults to the current user.

Common Options:

  • -d: Deletes the password of a user (makes the account passwordless).

  • -e: Forces the user to change their password at the next login (expires the password).

  • -i: Sets the number of days after a password expires before the account is disabled (e.g., -i 7 means the account will be disabled 7 days after the password expires).

  • -l: Locks the user account, disabling login.

  • -u: Unlocks a previously locked account.

  • -n: Sets the minimum number of days between password changes.

  • -x: Sets the maximum number of days a password is valid.

  • -w: Sets a warning period before the password expires, notifying the user to change their password.

  • -h: Displays help information for the passwd command.

Common Examples:

  1. Change the current user's password:
  1. Passwd This will prompt you to enter the current password and then ask for a new password.

  2. Change the password for a specific user (requires root or sudo):

  1. [sudo passwd username Replace username with the account name whose password you want to change.

  2. Delete the password for a user (makes it passwordless):

  1. sudo passwd -d username This removes the password for username, effectively making it a passwordless account.

Man Command in Unix

The man command in Unix is used to display the manual (help) pages for various commands, system calls, library functions, and configuration files. It’s a great way to find detailed documentation for commands and their options.

Basic Syntax:

man [OPTION]... [COMMAND]

  • OPTION: Various options to modify how man displays the manual.

  • COMMAND: The name of the command or topic for which you want to view the manual.

The man command and its options:

OptionDescriptionExample
-kSearch for a keyword in the manual page database.man -k keyword
-fDisplay a short description of a command (similar to whatis).man -f command
-aDisplay all available manual pages for the given command (e.g., multiple sections).man -a command
-uUpdate the manual page cache (refreshes or clears the cache).man -u
-tFormat the manual page as a PostScript document and send it to the printer or standard output.man -t command
-cOnce the manual page is displayed, it is cleared from memory.man -c
-wDisplay the location of the manual page file without opening it.man -w command
-lOpen a manual page file directly from a file path rather than from the manual page database.man -l /path/to/manual_page
-M <path>Set the location of the manual page directories (custom locations for manuals).man -M /path/to/manuals command
-P <pager>Specify the pager program (e.g., less, more) to be used to view the manual pages.man -P less command
-S <section>Specify a particular section of the manual to search in (e.g., system calls, user commands).man -S 2 open
-hDisplay help information about the man command itself.man -h
-vDisplay version information for the man command.man -v

Key Points:

  • Searching and Listing: Use -k for searching keywords, -f for short descriptions, and -a to view all sections.

  • Formatting and Customization: Use -t to format as PostScript, -w to show the location of the manual page, and -P to use a custom pager.

  • Section and File: Use -S to view specific sections of the manual or -l to open a manual page file directly.

  • Cache and Help: -u updates the cache, -c clears the page, and -h shows help for the man command.

This breakdown covers the essential options you can use with the man command to explore and customize how you access manual pages.

Example

Superuser in Unix

In Unix, the superuser (also known as root) is the user account with the highest level of privileges. It has full control over the system, including access to all files, the ability to modify configurations, install software, and manage users. The root user is essential for system administration tasks.


How to Become a Superuser in Unix?

1. Using su (Switch User to Root)

The su (substitute user) command allows you to switch to the superuser account if you have the root password.

Syntax:

su -

Example:

su -
  • The - option loads the root user’s environment variables.

  • You will be prompted to enter the root password.

  • Once authenticated, the shell changes to #, indicating root access.

You can also run a single command as root using:

su -c "<command>"

Example:

su -c "shutdown -h now"

The sudo command allows authorized users to execute administrative tasks without needing the root password. Instead, they authenticate with their own password.

Syntax:

sudo <command>

Example:

sudo ls /root
  • If you are using sudo for the first time, it will ask for your user password.

  • This is safer than su since it logs commands and limits privileges to specific users.

To check if your user has sudo privileges, run:

sudo -l

Superuser Privileges in Unix

Once you have superuser access, you can:

  • Modify system files (/etc/passwd, /etc/shadow)

  • Install/remove software

  • Change user accounts and passwords (useradd, passwd)

  • Start/stop system services (service, systemctl)

  • Shutdown or restart the system (shutdown, reboot)


Checking Superuser Status

To check if you are currently the superuser, run:

whoami
  • If it returns root, you are the superuser.

To verify if a user has sudo privileges, run:

sudo -l

Security Considerations for Superuser

  • Avoid using root for daily tasks to prevent accidental system damage.

  • Use sudo instead of su to improve security and auditing.

  • Restrict superuser access to trusted users.

  • Edit sudo permissions carefully using:

·       sudo visudo
  • Disable direct root login via SSH for better security.

User and Group Management in Unix

In Unix, you can manage users and groups using the useradd, userdel, groupadd, and groupdel commands. These commands help system administrators create, delete, and manage user accounts and groups.


1. Adding a User (useradd)

The useradd command is used to create a new user in Unix.

Syntax:

useradd [options] <username>

Examples:

  • Create a new user:

useradd john

  • Create a user with a home directory:

useradd -m john

  • Set a custom home directory for the user:

useradd -d /custom/home/john john

  • Set a specific shell for the user:

useradd -s /bin/bash john

  • Assign a user to a primary group:

useradd -g developers john

After adding a user, set a password:

passwd john


2. Deleting a User (userdel)

The userdel command is used to remove a user account.

Syntax:

userdel [options] <username>

Examples:

  • Delete a user (without removing home directory):

userdel john

  • Delete a user and their home directory:

userdel -r john


3. Adding a Group (groupadd)

The groupadd command creates a new user group.

Syntax:

groupadd [options] <groupname>

Examples:

  • Create a new group:

groupadd developers

  • Create a group with a specific Group ID (GID):

groupadd -g 5000 developers


4. Deleting a Group (groupdel)

  • Delete a group:

Examples:

groupdel <groupname>

groupdel developers

Syntax:

The groupdel command removes a group.


Significance of the ls Command in Unix

The ls command in Unix is used to list files and directories in the current or specified directory. It is one of the most commonly used commands for navigating and managing files in a Unix-based system.


1. Basic Syntax:

ls [options] [directory]

If no directory is specified, ls lists the contents of the current working directory.


2. Importance of ls Command:

  • File & Directory Management: Helps users view available files and directories.

  • Permissions & Ownership: Displays file permissions, owners, and group details.

  • Sorting & Filtering: Helps organize files based on various attributes like size, date, and type.

  • Troubleshooting: Useful in debugging file-related issues.


3. Commonly Used Options with ls

OptionDescriptionExample
lsLists files and directories in the current directory.ls
ls -lDisplays detailed information, including permissions, owner, and file size.ls -l
ls -aShows all files, including hidden files (files starting with .).ls -a
ls -hDisplays file sizes in a human-readable format (KB, MB, GB).ls -lh
ls -tSorts files by modification time (latest first).ls -lt
ls -rReverses the order of the listing.ls -lr
ls -SSorts files by size (largest first).ls -lS
ls -d */Lists only directories (not files).ls -d */
ls -RLists all subdirectories recursively.ls -R
ls -iDisplays the inode number of files.ls -i

4. Examples

  • List all files including hidden ones:
·       ls -a
  • List files with detailed information:
·       ls -l
  • List files sorted by size in human-readable format:
·       ls -lhS
  • List directories only:
·       ls -d */
  • List all files recursively from the current directory:
·       ls -R

7 Fields in ls -l

When using the ls -l command in Unix, it displays a detailed list of files and directories with 7 key fields of information. Below is a breakdown of these fields:

Syntax of ls -l:

ls -l

Example Output:

-rw-r--r--  1 user group  1024 Mar 24 10:00 file.txt

7 Fields in ls -l Output

Field NumberField NameDescription
1File PermissionsIndicates the file type and permissions (e.g., -rw-r--r--).
2Number of LinksThe number of hard links to the file or directory.
3Owner (User)The user who owns the file.
4GroupThe group associated with the file.
5File SizeThe size of the file in bytes.
6Modification Date & TimeThe last modification date and time.
7FilenameThe name of the file or directory.

Example Breakdown

-rw-r--r--  1  user  group  1024  Mar 24 10:00  file.txt
  • -rw-r--r--File permissions (regular file, read/write for owner, read-only for group/others)

  • 1Number of links (only one hard link)

  • userOwner (User)

  • groupGroup Name

  • 1024File size in bytes (1 KB)

  • Mar 24 10:00Last modified date & time

  • file.txtFilename

Introduction to the Unix File System

The Unix file system is a methodology for logically organizing and storing large quantities of data such that the system is easy to manage. A file can be informally defined as a collection of (typically related) data, which can be logically viewed as a stream of bytes (i.e. characters). A file is the smallest unit of storage in the Unix file system.

By contrast, a file system consists of files, relationships to other files, as well as the attributes of each file. File attributes are information relating to the file, but do not include the data contained within a file. File attributes for a generic operating system might include (but are not limited to):

  • a file type (i.e. what kind of data is in the file)

  • a file name (which may or may not include an extension)

  • a physical file size

  • a file owner

  • file protection/privacy capability

  • file time stamp (time and date created/modified)

Additionally, file systems provide tools which allow the manipulation of files, provide a logical organization as well as provide services which map the logical organization of files to physical devices.

From the beginners perspective, the Unix file system is essentially composed of files and directories. Directories are special files that may contain other files.

The Unix file system has a hierarchical (or tree-like) structure with its highest level directory called root (denoted by /, pronounced slash). Immediately below the root level directory are several subdirectories, most of which contain system files. Below this can exist system files, application files, and/or user data files. Similar to the concept of the process parent-child relationship, all files on a Unix system are related to one another. That is, files also have a parent-child existence. Thus, all files (except one) share a common parental link, the top-most file (i.e. /) being the exception.

Below is a diagram (slice) of a "typical" Unix file system. As you can see, the top-most directory is / (slash), with the directories directly beneath being system directories. Note that as Unix implementaions and vendors vary, so will this file system hierarchy. However, the organization of most file systems is similar.

While this diagram is not all inclusive, the following system files (i.e. directories) are present in most Unix filesystems:

  • bin - short for binaries, this is the directory where many commonly used executable commands reside

  • dev - contains device specific files

  • etc - contains system configuration files

  • home - contains user directories and files

  • lib - contains all library files

  • mnt - contains device files related to mounted devices

  • proc - contains files related to system processes

  • root - the root users' home directory (note this is different than /)

  • sbin - system binary files reside here. If there is no sbin directory on your system, these files most likely reside in etc

  • tmp - storage for temporary files which are periodically removed from the filesystem

  • usr - also contains executable commands

File Types

All files in the Unix file system can be loosely categorized into 3 types, specifically:

  1. ordinary files

  2. directory files

  3. device files

The first type of file listed above is an ordinary file, that is, a file with no "special-ness". Ordinary files are comprised of streams of data (bytes) stored on some physical device. Examples of ordinary files include simple text files, application data files, files containing high-level source code, executable text files, and binary image files. Note that unlike some other OS implementations, files do not have to be binary Images to be executable (more on this to come).

The second type of file listed above is a special file called a directory Directory files act as a container for other files, of any category. Thus we can have a directory file contained within a directory file (this is commonly referred to as a subdirectory). Directory files don't contain data in the user sense of data, they merely contain references to the files contained within them.

It is perhaps noteworthy at this point to mention that any "file" that has files directly below (contained within) it in the hierarchy must be a directory, and any "file" that does not have files below it in the hierarchy can be an ordinary file, or a directory, albeit empty.

The third category of file mentioned above is a device file. This is another special file that is used to describe a physical device, such as a printer or a portable drive. This file contains no data whatsoever, it merely maps any data coming its way to the physical device it describes.

Device file types typically include: character device files, block device files, Unix domain sockets, named pipes and symbolic links. However, not all of these file types may be present across various Unix implementations.

Relative Pathname vs. Absolute Pathname in Unix

In Unix, pathnames are used to specify the location of a file or directory in the filesystem. There are two types of pathnames:

  1. Absolute Pathname

  2. Relative Pathname


1. Absolute Pathname

An absolute pathname specifies the full path of a file or directory from the root (/) directory.

  • It always starts with /.

  • It provides a unique location in the filesystem, no matter where you are.

Example:

/home/user/Documents/file.txt
  • / → Root directory

  • home → Directory under root

  • user → User’s home directory

  • Documents → A subdirectory

  • file.txt → Target file

Command Example Using Absolute Path:

cd /usr/local/bin

This command moves to /usr/local/bin, no matter the current directory.


2. Relative Pathname

A relative pathname specifies a file or directory location relative to the current working directory (pwd).

  • It does not start with /.

  • Uses . (current directory) and .. (parent directory) for navigation.

Example:

If the current directory is /home/user, then:

cd Documents

is equivalent to:

cd /home/user/Documents

because Documents is relative to /home/user.

Common Relative Path Commands:

  • Move to the parent directory:
·       cd ..
  • Move to a subdirectory:
·       cd Downloads
  • Move up two levels:
·       cd ../../

Key Differences Between Absolute and Relative Pathnames

FeatureAbsolute PathnameRelative Pathname
Starts With/ (root directory)No /, depends on pwd
Example/etc/passwd../Documents/file.txt
Works From Any Directory?YesNo, depends on location
UsageSystem-wide accessShortcuts for navigation

Which One to Use?

  • Use absolute paths when you need a fixed reference to a file, like in scripts or system configurations.

  • Use relative paths for easier navigation in the terminal when working within a known directory.

Commands and Arguments in Unix

In Unix, a command is an instruction given to the shell to perform a specific task. Commands often take arguments, which modify their behavior or specify inputs.


1. Command Syntax

command [options] [arguments]
  • command → The actual Unix command.

  • options (flags) → Modify the behavior of the command (usually start with - or --).

  • arguments → Specify the target file, directory, or value for the command.


2. Examples of Commands with Arguments

Basic Example

ls -l /home/user
  • ls → Command to list files

  • -l → Option (long format)

  • /home/user → Argument (directory to list)


3. Types of Arguments in Unix

(a) Positional Arguments

  • These are the normal arguments passed to a command.

  • Example:

·       cp file1.txt file2.txt
    • cp → Command

      • file1.txt → Source file (argument)

      • file2.txt → Destination file (argument)

(b) Options (Flags) as Arguments

  • Options modify how a command behaves.

  • Example:

·       rm -r myfolder
    • rm → Command to remove

      • -r → Recursive option (needed to delete directories)

      • myfolder → Argument (directory to delete)

(c) Combined Options

  • Multiple options can be used together.

  • Example:

·       ls -lah /var/log
    • -l → Long format

      • -a → Show hidden files

      • -h → Human-readable sizes

      • /var/log → Argument (directory)


4. Checking Command Arguments (man and --help)

  • Use man to check details:
·       man ls
  • Use --help for quick help:
·       ls –help

Relative and Absolute Permissions in Unix

Unix file permissions determine who can read, write, or execute a file or directory. There are two ways to change permissions:

  1. Relative (Symbolic) Permissions

  2. Absolute (Numeric) Permissions


1. Relative (Symbolic) Permissions

Relative permissions use symbols (u, g, o, a, +, -, =) to modify specific permissions without affecting other existing permissions.

Syntax:

chmod [who][operator][permission] filename

[if !supportLists]· [endif]Who (u, g, o, a):

    • u → User (owner)

      • g → Group

      • o → Others

      • a → All (user, group, others)

[if !supportLists]· [endif]Operator (+, -, =):

    • + → Add permission

      • - → Remove permission

      • = → Set exact permission (overwrites previous settings)

[if !supportLists]· [endif]Permissions (r, w, x):

    • r → Read

      • w → Write

      • x → Execute

Examples:

  1. Give the owner (u) execute permission (+x)
2.     chmod u+x file.txt
  1. Remove write (-w) permission for group (g)
4.     chmod g-w file.txt
  1. Give all users (a) read (r) and write (w) permissions
6.     chmod a+rw file.txt
  1. Set exact permissions (only read for group and others)
8.     chmod g=r,o=r file.txt

2. Absolute (Numeric) Permissions

Absolute permissions use octal (numeric) values to represent permissions, making it a faster way to set file permissions.

Octal Values:

PermissionSymbolicOctal Value
No permission---0
Execute only--x1
Write only-w-2
Write + Execute-wx3
Read onlyr--4
Read + Executer-x5
Read + Writerw-6
Read + Write + Executerwx7

Syntax:

chmod [###] filename

Each digit represents user (owner), group, and others in that order.

Examples:

  1. Give full permissions (rwx) to owner, read and execute (r-x) to group, and read (r--) to others
2.     chmod 754 file.txt
    • 7 → Owner (rwx)

      • 5 → Group (r-x)

      • 4 → Others (r--)

  1. Give read and write (rw-) to owner, read-only (r--) to group and others
4.     chmod 644 file.txt
  1. Give full permissions to everyone (rwxrwxrwx)
6.     chmod 777 file.txt
  1. Remove all permissions (---------)
8.     chmod 000 file.txt

Key Differences Between Relative and Absolute Permissions

FeatureRelative (Symbolic) PermissionsAbsolute (Numeric) Permissions
MethodUses u, g, o, a, +, -, =Uses octal numbers (0-7)
FlexibilityCan modify specific permissionsSets all permissions at once
ReadabilityEasier to understandFaster to apply but less readable
Examplechmod u+x file.txtchmod 744 file.txt

Conclusion

  • Use relative permissions (chmod u+x file.txt) when modifying specific permissions.

  • Use absolute permissions (chmod 755 file.txt) when setting all permissions at once.

Wildcards in Unix

Wildcards are special characters used in Unix to match file names or patterns in commands. They help simplify searching and batch processing of files.


Types of Wildcard Characters in Unix

WildcardDescriptionExample
* (Asterisk)Matches zero or more charactersls *.txt → Lists all .txt files
? (Question Mark)Matches exactly one characterls file?.txt → Matches file1.txt, file2.txt but not file10.txt
[ ] (Square Brackets)Matches one character from a setls file[12].txt → Matches file1.txt, file2.txt but not file3.txt
[^] (Negation in Brackets)Matches one character not in a setls file[^3].txt → Matches file1.txt, file2.txt but not file3.txt
{ } (Curly Braces)Expands into multiple patternsls file{1,2,3}.txt → Matches file1.txt, file2.txt, file3.txt
- (Range in Brackets)Matches a range of charactersls file[1-5].txt → Matches file1.txt to file5.txt
~ (Tilde)Expands to home directorycd ~ → Moves to home directory
! (Negation)Used with find to exclude filesfind . ! -name "*.txt" → Finds files excluding .txt

Examples of Using Wildcards

1. Using * (Asterisk)

ls *.sh
  • Lists all files ending with .sh.

2. Using ? (Question Mark)

ls file?.txt
  • Matches file1.txt, file2.txt, etc.

  • Does not match file10.txt (because ? represents exactly one character).


3. Using [ ] (Character Set)

ls file[12].txt
  • Matches file1.txt, file2.txt.

  • Does not match file3.txt.


4. Using [^ ] (Negation)

ls file[^3].txt
  • Matches file1.txt, file2.txt but not file3.txt.

5. Using { } (Brace Expansion)

ls file{1,3,5}.txt
  • Matches file1.txt, file3.txt, file5.txt.

6. Using - (Range)

ls file[1-5].txt
  • Matches file1.txt to file5.txt.

7. Using ~ (Tilde)

cd ~
  • Moves to the home directory.

8. Using ! (Negation with find)

find . ! -name "*.txt"
  • Finds all files except .txt files.

Summary of Wildcard Usage

WildcardUsage ExampleMatches
*ls *.txtfile.txt, notes.txt, data.txt
?ls file?.txtfile1.txt, file2.txt, not file10.txt
[ ]ls file[12].txtfile1.txt, file2.txt
[^ ]ls file[^3].txtMatches file1.txt, but not file3.txt
{ }ls file{1,3,5}.txtfile1.txt, file3.txt, file5.txt
-ls file[1-5].txtfile1.txt to file5.txt
~cd ~Moves to home directory
!find . ! -name "*.txt"Finds all files except .txt

Grep Command in Unix

The grep command helps search for words or patterns inside files. Below is a table with common grep commands, explanations, and examples.


CommandWhat It DoesExample Output
grep "error" logfile.txtFinds lines containing "error" inside logfile.txt.System error detected
grep -i "error" logfile.txtCase-insensitive search (matches Error, ERROR, etc.).CRITICAL ERROR found
grep -n "error" logfile.txtShows line numbers where "error" appears.5: System error detected
grep -o "error" logfile.txtShows only the matching word, not the full line.error
grep -c "error" logfile.txtCounts how many times "error" appears.10 (meaning found 10 times)
grep -v "error" logfile.txtShows lines that do NOT contain "error".System is running fine
grep -w "error" logfile.txtMatches the exact word "error", not "errors" or "error_log".error found in logs
grep -r "error" /var/logs/Searches for "error" in all files inside /var/logs/.log1.txt: System error detected
`grep -E "errorfailure" logfile.txt`Uses extended regular expressions to find "error" or "failure".
grep --color "error" logfile.txtHighlights the word "error" in red for easy identification.⚠️ error found in logs
`ps auxgrep "firefox"`Finds if a process like "firefox" is running.
`dmesggrep "usb"`Searches system logs for USB-related messages.
`grep "failed" /var/log/auth.logwc -l`Counts how many times "failed" appears in the login logs.

Explanation of Key Features

  1. Case Sensitivity: Use -i to ignore uppercase/lowercase differences.

  2. Count Matches: Use -c to see how many times a word appears.

  3. Exclude Lines: Use -v to find lines that do not contain a word.

  4. Recursive Search: Use -r to search inside all files in a folder.

  5. Highlighting: Use --color to make matches easier to see.

Difference Between grep and Wildcards in Unix

Both grep and wildcards are used for searching, but they work differently.


1. Wildcards (*, ?, [ ])

Wildcards are used to match file names in Unix commands like ls, rm, cp, etc.
They do not search inside files.

Example (Wildcards in ls)

ls *.txt

👉 Lists all files ending in .txt.


2. grep (Global Regular Expression Print)

grep is used to search inside files for specific words or patterns.

Example (Search for "error" in a log file)

grep "error" logfile.txt

👉 Finds lines containing "error" inside logfile.txt.


Key Differences

FeatureWildcards (*, ?, [ ])grep
UseMatches file namesSearches inside files
Where it WorksCommands like ls, rm, cp, mvReads file content
Examplels *.txt → Lists all .txt filesgrep "error" logfile.txt → Finds "error" in a file
Can search inside files?❌ No✅ Yes
Can filter by content?❌ No✅ Yes
Supports complex patterns?❌ Limited (*, ?, [ ])✅ Uses regular expressions (.*, ^, $)

When to Use What?

Use Wildcards when you need to match file names.
Use grep when you need to search inside files.

Shell

What is a Shell in Unix/Linux?

A shell is a command-line interface that allows users to interact with the Unix/Linux operating system. It takes user commands, processes them, and sends them to the operating system to execute.

Functions of a Shell

· Accepts commands from the user.

· Interprets and converts commands into machine instructions.

· Executes commands and displays the output.

· Supports scripting (writing programs with commands).

Common Types of Shells

Shell TypeDescriptionCommand to Check
Bash (Bourne Again Shell)Default shell in most Linux systems.echo $SHELL
Sh (Bourne Shell)The original Unix shell.sh
C Shell (csh)Uses C-like syntax for scripting.csh
Korn Shell (ksh)Advanced shell with scripting improvements.ksh
Z Shell (zsh)Powerful shell with auto-completion and plugins.zsh

Shell Interpretive Cycle (How the Shell Works)

The Shell Interpretive Cycle describes how the shell processes user commands. It follows these steps:

1. User Inputs a Command

  • Example:
·       ls -l
  • The user types a command and presses Enter.

2. Shell Reads the Command

  • The shell takes the input command and breaks it down into command and options.

3. Shell Interprets the Command

  • It checks if the command is built-in (like cd, echo) or an external program (ls, grep).

4. Shell Finds the Command

  • If it is an external command, the shell looks for it in system directories (/bin, /usr/bin) using the PATH variable.

  • Example:

·       which ls

Output:

/bin/ls

5. Shell Executes the Command

  • The shell sends the command to the kernel (OS core) for execution.

  • The command runs and produces output.

6. Shell Displays Output

  • The shell prints the result on the terminal.

  • Example Output:

·       drwxr-xr-x  5 user user  4096 Mar 24 10:30 Documents

7. Shell Waits for Next Command

  • After execution, the shell returns to the prompt, waiting for the next command.

Example of Shell Interpretive Cycle

User Enters Command

echo "Hello, World!"

Shell Processing

  • Recognizes echo as a built-in command.

  • Passes "Hello, World!" as an argument.

Execution & Output

Hello, World!

Shell Script Example (Automating Commands)

Instead of typing multiple commands manually, we can write a script:

#!/bin/bash
echo "Hello, this is a shell script!"
date
ls

🔹 Saves time by automating tasks!


Summary Table

StepActionExample
1. User Inputs CommandUser types a command.ls -l
2. Shell Reads CommandBreaks it into parts.Command: ls, Option: -l
3. Shell InterpretsChecks if it's built-in or external.ls is an external command.
4. Shell Finds CommandLooks for it in system directories.Found in /bin/ls
5. Shell ExecutesSends it to the OS (kernel).Runs the command.
6. Shell Displays OutputPrints result on screen.Shows file list.
7. Shell WaitsReturns to prompt for next input.$ (Waiting for new command)

Why is the Shell Important?

· Helps users communicate with the OS.

· Automates tasks using shell scripts.

· Provides a flexible and powerful interface.

Exit Status in Unix/Linux

The exit status (also called the return code) is a numeric value returned by a command after it executes. It helps determine whether a command succeeded or failed.


Checking Exit Status

After running a command, you can check its exit status using:

echo $?

✅ If the exit status is 0, the command was successful.
❌ If the exit status is non-zero (e.g., 1, 2, 127), the command failed.


Examples of Exit Status

1. Successful Command (exit status = 0)

ls
echo $?  # Check exit status
0

✅ Output:

0

Exit code 0 means the command ran successfully.


2. Failed Command (exit status ≠ 0)

ls nonexistentfile
echo $?  # Check exit status

❌ Output:

ls: cannot access 'nonexistentfile': No such file or directory
2

Exit code 2 indicates an error.


Common Exit Codes

Exit CodeMeaning
0Success
1General error
2Misuse of shell command
126Command found but not executable
127Command not found
130Command terminated by Ctrl+C

Using Exit Status in Scripts

You can use exit codes to control script execution.

Example: Checking if a Command Succeeded

#!/bin/bash
mkdir myfolder  # Create a folder
if [ $? -eq 0 ]; then
    echo "Folder created successfully!"
else
 echo "Failed to create folder!"
fi

✅ If mkdir runs successfully, it prints "Folder created successfully!"
❌ Otherwise, it prints "Failed to create folder!"


Manually Setting Exit Status in Scripts

#!/bin/bash
echo "This script will fail"
exit 1  # Manually return error code 1

🔹 Running this script will always fail with an exit status of 1.

Logical Operators for Conditional Execution in Unix/Linux

Logical operators allow combining commands and executing them conditionally based on their exit status.


Types of Logical Operators

OperatorNameUsageMeaning
&&Logical ANDcommand1 && command2Runs command2 only if command1 succeeds (exit status = 0).
``Logical OR
;Command Separatorcommand1 ; command2Runs command1, then command2 regardless of success or failure.
!Logical NOT! commandRuns command and reverses the exit status (0 → 1, 1 → 0).
`&&`Ternary Operator

Examples

1. Logical AND (&&)

Runs the second command only if the first one succeeds.

mkdir myfolder && echo "Folder created successfully!"
  • If mkdir succeeds, "Folder created successfully!" is printed.

  • If mkdir fails, nothing happens.


2. Logical OR (||)

Runs the second command only if the first one fails.

ls myfile || echo "File not found!"
  • If ls myfile fails (file does not exist), it prints "File not found!".

  • If ls succeeds, nothing happens.


3. Command Separator (;)

Runs both commands regardless of success or failure.

echo "Hello"; ls nonexistentfile
  • "Hello" is printed.

  • ls fails, but it does not affect the first command.


4. Logical NOT (!)

Reverses the exit status of a command.

! ls myfile
echo $?
  • If ls myfile succeeds (exit status 0), ! changes it to 1.

  • If ls myfile fails (exit status 1), ! changes it to 0.


5. Combining && and || (Ternary Operator)

Runs command2 if command1 succeeds, otherwise runs command3.

mkdir myfolder && echo "Success" || echo "Failure"
  • If mkdir succeeds, it prints "Success".

  • If mkdir fails, it prints "Failure".


Summary Table

OperatorExampleWhen Command2 Runs?
&&mkdir test && echo "Success"If mkdir succeeds (exit 0).
``
;echo "Hello"; ls fileAlways runs both.
!! ls fileReverses success/failure.
`&&`

When to Use These Operators?

  • For efficient scripting (run commands conditionally).

  • To automate error handling (&& for success, || for failure).

  • To chain multiple commands in one line.

Three Ways of Using the test Command in Unix/Linux

The test command is used to evaluate numeric comparisons, string operations, and file conditions.

1. Numeric Test (-eq, -ne, -gt, -lt, -ge, -le)

Used to compare numbers.

Example: Check if Two Numbers are Equal

num1=10
num2=20
if [ $num1 -lt $num2 ]; then
    echo "$num1 is less than $num2"
fi

Explanation:

  • -eq (equal)

  • -ne (not equal)

  • -gt (greater than)

  • -lt (less than)

  • -ge (greater than or equal to)

  • -le (less than or equal to)


2. String Test (=, !=, -z, -n)

Used to check strings, including their length and equality.

Example: Check if a String is Empty

str=""
if [ -z "$str" ]; then
    echo "String is empty"
fi

Explanation:

  • = (equal)

  • != (not equal)

  • -z (string is empty)

  • -n (string is not empty)


3. File Test (-f, -d, -e, -r, -w, -x)

Used to check if a file or directory exists and its properties.

Example: Check if a File Exists and is Writable

if [ -f myfile ] && [ -w myfile ]; then
    echo "File exists and is writable"
}

Explanation:

  • -f (file exists)

  • -d (directory exists)

  • -e (file/directory exists)

  • -r (readable)

  • -w (writable)

  • -x (executable)


Summary Table

Test TypeOperatorExample
Numeric-eq, -ne, -gt, -lt, -ge, -le[ $a -gt $b ]
String=, !=, -z, -n[ -z "$str" ]
File-f, -d, -e, -r, -w, -x[ -f file ]

General UNIX File APIs

UNIX provides several File APIs for creating, opening, reading, writing, and closing files. These APIs are part of the POSIX standard and are commonly used in C programming.


1. open() – Open or Create a File

Syntax:

int open(const char *pathname, int flags, mode_t mode);

Explanation of Parameters:

ParameterDescription
pathnameThe name (path) of the file to open or create.
flagsSpecifies the mode of opening the file (read, write, append, etc.).
mode(Optional) If creating a file, defines the file permissions (e.g., 0644).

Common flags Options:

FlagDescription
O_RDONLYOpen for read only.
O_WRONLYOpen for write only.
O_RDWROpen for read and write.
O_CREATCreate the file if it does not exist.
O_TRUNCTruncate the file to 0 bytes if it exists.
O_APPENDAppend to the file instead of overwriting.

Example: Open a File for Writing

int fd = open("example.txt", O_WRONLY | O_CREAT, 0644);
if (fd == -1) {
    perror("Error opening file");
}

2. read() – Read Data from a File

Syntax:

ssize_t read(int fd, void *buf, size_t count);

Explanation of Parameters:

ParameterDescription
fdFile descriptor obtained from open().
bufPointer to a buffer where data will be stored.
countNumber of bytes to read.

Example: Read 100 Bytes from a File

char buffer[100];
ssize_t bytesRead = read(fd, buffer, sizeof(buffer));
if (bytesRead == -1) {
    perror("Error reading file");
}

3. write() – Write Data to a File

Syntax:

ssize_t write(int fd, const void *buf, size_t count);

Explanation of Parameters:

ParameterDescription
fdFile descriptor obtained from open().
bufPointer to the buffer containing data to write.
countNumber of bytes to write.

Example: Write a String to a File

const char *msg = "Hello, UNIX!";
ssize_t bytesWritten = write(fd, msg, strlen(msg));
if (bytesWritten == -1) {
    perror("Error writing file");
}

4. lseek() – Move the File Pointer

Syntax:

off_t lseek(int fd, off_t offset, int whence);

Explanation of Parameters:

ParameterDescription
fdFile descriptor.
offsetNumber of bytes to move the pointer.
whencePosition reference (SEEK_SET, SEEK_CUR, SEEK_END).

Common whence Values:

ValueDescription
SEEK_SETMove to offset from the beginning of the file.
SEEK_CURMove offset bytes from the current position.
SEEK_ENDMove offset bytes from the end of the file.

Example: Move to the 10th Byte

off_t newPos = lseek(fd, 10, SEEK_SET);
if (newPos == -1) {
    perror("Error seeking file");
}

5. close() – Close a File

Syntax:

int close(int fd);

Explanation of Parameters:

ParameterDescription
fdFile descriptor to be closed.

Example: Close the File

if (close(fd) == -1) {
perror("Error closing file");
}

Syntax:

int unlink(const char *pathname);

Explanation of Parameters:

ParameterDescription
pathnameName of the file to delete.

Example: Delete a File

if (unlink("example.txt") == -1) {
   perror("Error deleting file");
}

Summary of UNIX File APIs

FunctionPurposeExample Usage
open()Open or create a file`int fd = open("file.txt", O_RDWR
read()Read from a fileread(fd, buffer, 100);
write()Write to a filewrite(fd, "Hello", 5);
lseek()Move file pointerlseek(fd, 10, SEEK_SET);
close()Close a fileclose(fd);
unlink()Delete a fileunlink("file.txt");

What is a Race Condition?

A race condition occurs when two or more processes or threads attempt to access and modify shared resources simultaneously, leading to unpredictable results. This typically happens in multithreading or multi-processing environments when proper synchronization is not used.

Example Scenario

Imagine two bank customers trying to withdraw money from the same account at the same time:

  1. Person A checks the balance – it shows $1000.

  2. Person B checks the balance – it also shows $1000.

  3. Person A withdraws $500, leaving $500 in the account.

  4. Person B also withdraws $500, thinking there is still $1000 available.

  5. Now, the account should have $0, but due to the race condition, it may become negative (-$500) or still show $500 incorrectly!

Causes of Race Conditions

  1. Concurrent Access to Shared Resources – Multiple processes access the same file, variable, or database without control.

  2. Context Switching – The operating system switches between tasks unpredictably, causing conflicts.

  3. Lack of Synchronization – No locking mechanism to ensure one process completes before another starts.

  4. Uncontrolled Input/Output (I/O) Operations – Multiple users or programs reading/writing to the same file simultaneously.

Common Examples of Race Conditions

ScenarioWhat Happens?
File WritingTwo processes write to a file at the same time, leading to corrupted or missing data.
Bank TransactionsTwo users withdraw money at the same time, causing incorrect balance updates.
Process Creation (fork())A parent process modifies data, but a child process reads an old value before it is updated.
Printing to ConsoleTwo threads print at the same time, mixing or overlapping output.

How to Prevent Race Conditions?

To avoid race conditions, we use synchronization mechanisms that control the order of execution.

MethodHow It Works?
Mutex (Mutual Exclusion)Only one thread/process can access the resource at a time.
SemaphoreLimits the number of processes that can access a resource simultaneously.
File LockingPrevents multiple processes from modifying the same file at once.
Atomic OperationsEnsures that shared resource updates happen in one step, avoiding conflicts.

Real-World Example

In online ticket booking systems, multiple users may try to book the last seat at the same time. If proper synchronization is not used, two users might receive confirmation for the same seat, leading to double booking and customer disputes.

What is a Daemon Process in Unix/Linux?

A daemon is a background process in Unix/Linux that runs continuously and is not controlled by a user. It typically performs system-level tasks, such as handling network requests, scheduling jobs, or managing hardware.

🔹 Example: Web servers, database services, and logging processes are all daemon processes.


Characteristics of Daemon Processes

FeatureDescription
Runs in BackgroundDoes not require user interaction and runs independently.
No Controlling TerminalDetached from the user’s shell session to prevent accidental termination.
Started at BootMany daemons start automatically when the system boots (e.g., cron, syslog).
Parent Process is init or systemdOnce a daemon starts, its parent process is usually init (older systems) or systemd (modern systems).

Examples of Daemon Processes

DaemonFunction
cronRuns scheduled jobs (e.g., backups, script execution).
sshdManages SSH remote login sessions.
httpd (Apache/Nginx)Web server daemon handling HTTP requests.
mysqldManages MySQL database operations.
syslogdHandles system logging and stores logs.

How to Identify Running Daemons?

1. Using ps Command

ps aux | grep daemon_name

🔹 This lists processes related to a particular daemon.

2. Using systemctl (for systemd-based systems)

systemctl status sshd

🔹 Checks the status of a daemon (e.g., SSH service).


How to Create a Daemon Process?

A daemon is typically created by forking a child process and detaching it from the terminal.

Steps to Create a Daemon Process:

  1. Fork the process – The parent exits, and the child continues.

  2. Create a new session – Detach from the terminal using setsid().

  3. Close standard I/O (stdin, stdout, stderr) – Prevents accidental terminal output.

  4. Change working directory – Usually set to / to avoid tying the process to a mount point.

  5. Run in an infinite loop – To keep the daemon running.


Advantages of Daemon Processes

Automates tasks – Runs scheduled or background tasks without manual intervention.
Improves system performance – Handles specific tasks efficiently in the background.
Supports multitasking – Allows multiple services to run simultaneously.

0
Subscribe to my newsletter

Read articles from Abhay Smaran Halemane directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Abhay Smaran Halemane
Abhay Smaran Halemane