Upgrade to Pro
— share decks privately, control downloads, hide ads and more …
Speaker Deck
Features
Speaker Deck
PRO
Sign in
Sign up for free
Search
Search
Bash Introduction
Search
Sponsored
·
Your Podcast. Everywhere. Effortlessly.
Share. Educate. Inspire. Entertain. You do you. We'll handle the rest.
→
André Augusto Costa Santos
October 24, 2013
Programming
210k
615
Share
Bash Introduction
Introduction to the Unix command line
André Augusto Costa Santos
October 24, 2013
Other Decks in Programming
See All in Programming
Cache-moi si tu peux : patterns et pièges du cache en production - Devoxx France 2026 - Conférence
slecache
0
290
PCOVから学ぶコードカバレッジ #phpcon_odawara
o0h
PRO
0
280
How Swift's Type System Guides AI Agents
koher
0
300
JAWS-UG横浜 #100 祝・第100回スペシャルAWS は VPC レスの時代へ
maroon1st
0
170
AIを導入する前にやるべきこと
negima
2
180
実践CRDT
tamadeveloper
0
590
クラウドネイティブなエンジニアに向ける Raycastの魅力と実際の活用事例
nealle
2
220
瑠璃の宝石に学ぶ技術の声の聴き方 / 【劇場版】アニメから得た学びを発表会2026 #エンジニアニメ
mazrean
0
290
「Linuxサーバー構築標準教科書」を読んでみた #ツナギメオフライン.7
akase244
0
1.4k
「話せることがない」を乗り越える 〜日常業務から登壇テーマをつくる思考法〜
shoheimitani
4
850
ドメインイベントでビジネスロジックを解きほぐす #phpcon_odawara
kajitack
3
800
属人化しないコード品質の作り方_2026.04.07.pdf
muraaano
0
230
Featured
See All Featured
Being A Developer After 40
akosma
91
590k
Darren the Foodie - Storyboard
khoart
PRO
3
3.3k
The State of eCommerce SEO: How to Win in Today's Products SERPs - #SEOweek
aleyda
2
10k
Measuring Dark Social's Impact On Conversion and Attribution
stephenakadiri
2
190
Ecommerce SEO: The Keys for Success Now & Beyond - #SERPConf2024
aleyda
1
1.9k
Agile Leadership in an Agile Organization
kimpetersen
PRO
0
140
The Language of Interfaces
destraynor
162
26k
The Power of CSS Pseudo Elements
geoffreycrofte
82
6.2k
Automating Front-end Workflow
addyosmani
1370
200k
SEOcharity - Dark patterns in SEO and UX: How to avoid them and build a more ethical web
sarafernandez
0
170
Gemini Prompt Engineering: Practical Techniques for Tangible AI Outcomes
mfonobong
2
370
The World Runs on Bad Software
bkeepers
PRO
72
12k
Transcript
INTRODUCTION BASH
ANDRÉ SANTOS FRANCISCO NEVES 62Gerente
[email protected]
andre-santos.pt francisconeves
[email protected]
francisconeves.com
None
UNIX BASED SYSTEMS
UNIX BASED SYSTEMS STABILITY PERFORMANCE SCALABILITY COMPATIBILITY PRICE VS WINDOWS
BASH? ‣WHAT DOES IT MEAN? ‣ADVANTAGES? WHAT IS
BASH? ‣AUTOCOMPLETE ‣MAN PAGES ‣CLEAR SCREEN HOW TO DEAL WITH
COMMANDS SOME REQUIRED
LIST ls -a -l ALL FILES LONG FORMAT MAKE DIRECTORY
mkdir [OPT] DIR -p MAKE PARENTS
CHANGE DIRECTORY cd PATH . CURRENT DIR ~ .. PARENT
DIR HOME DIR PRINT WORKING DIRECTORY pwd CREATE EMPTY FILE touch FILE
COPY cp [OPT] FROM TO MOVE OR RENAME mv FROM
TO -r COPY DIRECTORIES RECURSIVELY
REMOVE rm [OPT] FILE REMOVE DIRECTORY rmdir [OPT] DIR -r
RECURSIVELY REMOVE DIRECTORIES -f FORCE -p PARENTS
CONCATENATE AND PRINT FILES cat [OPT] FILES less [OPT] FILE
-N NUMBER THE OUTPUT LINES VIEW FILE -l NUMBER THE OUTPUT LINES
FREQUENT COMMANDS LESS Key COMMAND Space NEXT PAGE b PREVIOUS
PAGE j NEXT LINE k PREVIOUS LINE g FIRST LINE G LAST LINE <n>G LINE <n> Key COMMAND /<text> FOWARD SEARCH FOR <TEXT> ?<text> BACKWARD SEARCH FOR <TEXT> n NEXT SEARCH MATCH N PREVIOUS SEARCH MATCH = FILE INFORMATION h HELP q QUIT
DISPLAY FIRST LINES head [OPT] FILE tail [OPT] FILE -n
LAST N LINES -n FIRST N LINES DISPLAY LAST LINES
PRINT LINES MATCHING A PATTERN grep [OPT] PATTERN [FILE...] -c
DISPLAY THE NUMBER OF MATCHED LINES -i IGNORE CASE SENSITIVITY -l DISPLAY THE FILENAMES -n DISPLAY THE LINE NUMBERS -w MATCH WHOLE WORD
WORD COUNT wc [OPT] FILE -l LINE COUNT -c BYTE
COUNT -m CHARACTER COUNT -w WORD COUNT
COMMANDS CTRL-KEY
KILL PROCESS CTRL + C STOP PROCESS CTRL + Z
END OF FILE CTRL + D
REDIRECTION I/O
COMMAND > FILE REDIRECT STDOUT TO A FILE OVERWRITE COMMAND
>> FILE REDIRECT STDIN TO A FILE APPEND COMMAND < FILE
COMMAND1 | COMMAND2 | COMMAND3 REDIRECT THE OUTPUT FROM ONE
COMMAND AS INPUT TO THE NEXT ONE
WILDCARDS
WHAT ARE WILDCARDS?
* ? ANY SINGLE CHARACTER ANY NUMBER OF CHARACTERS
SECURITY SYSTEM AND
PERMISSIONS UNIX sudo [OPT] [USER] COMMAND ALLOWS USERS TO RUN
PROGRAMS WITH THE SECURITY PRIVILEGES OF ANOTHER USER NORMALLY THE ROOT
PERMISSIONS UNIX u u u g g g o o
o user user user group group group others others others r w x r w x r w x 4 2 1 4 2 1 4 2 1 a = all 7
CHANGE PERMISSIONS chmod [OPT] MODE FILE -R RECURSIVELY +rx g-w
777 READ AND EXECUTE FOR ALL DENY WRITE ACESS FOR GROUP READ, WRITE AND EXECUTE FOR ALL
PROCESSES UNIX COMMAND & RUN PROCESS ON BACKGROUND jobs BACKGROUND
OR SUSPENDED PROCESSES kill SIGNAL PROCESS SEND SIGNAL TO A PROCESS killall PROCESS KILL PROCESS BY NAME
top DISPLAY TOP CPU PROCESSES ps REPORTS THE PROCESS STATUS
-e FULL LISTING ALL PROCESSES -f
LEAST LAST BUT NOT
history -c CLEAR LAST COMMANDS USED time COMMAND TIME COMMAND
EXECUTION diff COMPARE FILES LINE BY LINE !* LAST MATCHED COMMAND
WALK A FILE HIERARCHY find PATH [OPT] [EXPRESSION] -name FIND
BY NAME -size FIND BY SIZE -iname CASE INSENSITIVE MODE
?