Feeds

The netbook newbie's guide to Linux

One small step for Man...

High performance access to file storage

Open a terminal window in whichever version of Linux you are running and type pwd. This stands for 'print working directory', and the response you get will look something like this:

/home/user

This tells you that your current directory is called user, and is one level beneath the home directory, which is immediately off the topmost, 'root' directory, represented by the initial /. To get to a new directory we use the cd command we touched on last time, which stands for 'change directory', just as it does under DOS. To show the contents of the current working directory type ls, which is shorthand for 'list'.

Man man

Man Man

These commands - carried over from the original Unix on which Linux is modelled - are all characterised by brevity. Back in the day when you were having to enter all your commands from the keyboard there was an advantage to using as few keystrokes as possible. The GUI is often seen as a welcome release from this drudgery. But old hands - like Dave the Fingers - would point out that mouse excursions over the GUI can often be much more time and energy consuming, particularly when it sends you delving through layers of dialogue boxes, negotiating tabs and ticking boxes. A single command line incantation - assuming you know and can remember what it is - may get the same job done more quickly and more effectively.

But how did those old Unix guys remember all those esoteric commands? The answer: man. This three-letter command, standing for 'manual pages' gives the user systematic access to information about all the command-line operations, including the usually bewildering variety of parameters these commands accept.

Both SuSE Linux, supplied with the Wind, and the Xandros distro that comes with the Eee PC provide the man pages facility. Alas, it's missing from the AA1 . But that's very easily remedied. Last time, we saw how the yum package manager can be used to show what software is available on the machine and what can be added. It's not safe to add everything on the list, but let's see how we get on with the man pages.

Unix as Literature

Command line-averse users might do worse than read Thomas Scoville's article Unix as Literature here. It may not convert mouse-pushers, but it will at least give them some idea of where the key-tappers are coming from.

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Windows XP still has 27 per cent market share on its deathbed
Windows 7 making some gains on XP Death Day
Internet-of-stuff startup dumps NoSQL for ... SQL?
NoSQL taste great at first but lacks proper nutrients, says startup cloud whiz
US taxman blows Win XP deadline, must now spend millions on custom support
Gov't IT likened to 'a Model T with a lot of things on top of it'
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.