Best notepad hacks and tricks

notepad-tricks-hacksNotepad Is Just A Simple Text Editor Provided By Every OS. It Is A Program That Is Pre-Installed In The Operating System To Create Text Files. It Almost Supports All Extension Like Html, JavaScript, JQuery, Batch Files Etc. Mostly The Programmers Use Notepad For Coding Because It Is The Best Way To Improve Programming Skills. It Has A Simple Graphical User Interface And Very Easy To Use. But If You Think That Notepad Is Only Use For This Stuff Then You Are Wrong. There Are Many Notepad Tricks And Hacks, With This You Can Make Fun With Your Friends In The School And College. The Notepad Tricks Are Just Simple Commands To Use To Run Small Programs. You Just Have To Copy The Code And Paste In Your Notepad And Then Save With The Extension Of That File. It Will Create A Simple Icon On Your Desktop Or Where Ever You Save The File. Run The File And You Will See The Effect Of That File. So Here I Am Going To Discuss You Notepad Tricks And The Features That Make Notepad Very Famous.

 

Notepad Tricks And Hacks 2016

#1. Falling Matrix Code Effect

This Is The Cool And Best Notepad Trick Ever. In This Trick You Will See The Green Code Falling Continuously. This Trick Is Inspired By The Matrix Movie.

  • Open Your Notepad
  • Copy The Below Given Code And Paste In Your Notepad.
  • Then Save The File With Name.Bat Extension. You Can Place The Name Whatever You Want To But .Bat Is Must.
@Echo Off
Color 02
:Start
Echo %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random% %Random%
 Goto Start

#2. Create Your Own Diary

This Is The Another Best Notepad Trick. In This Trick  I Will Show  You How You Can Create Your Own Diary So Whenever You Write Something On Notepad And Save It Will Automatically Save Your File With Date And Time.

  • Open Notepad
  • Now Type .LOG In Notepad
  • Then Save The File As A Log.Txt
  • Then Open The Program And Type Anything In The Notepad Then Save It And You Will See It Will Automatically Save With The Date And Time.

#3. Computer Speaking Your Message

With The Help Of  This Cool Notepad Trick Your Computer Will Be Able To Speak Whatever You Want To Speak From Your Computer.

  • Open Notepad.
  • Copy The Below Given Code And Paste In Your Notepad.
  • Then Save The File With Name.Vbs Extension Then Double Click On The Icon To Run It.
  • You Can Replace Text “Welcome To Mytrickscorner.Com” With Your Own Message.
Dim Speaks, Speech
Speaks="Welcome To Mytrickscorner.Com"
Set Speech=CreateObject("Sapi.Spvoice")
Speech.Speak Speaks

#4. Dancing Keyboard LED

This Notepad Trick Make Your Computer’s LEDs Dancing.

  • Open Notepad.
  • Copy The Given Code And Paste In Yout Notepad.
  • Then Save The File With Name.Vbs Extension Then Double Click To Run It.
Set WshShell =Wscript.CreateObject("WScript.Shell")
 Do
 Wscript.Sleep 100
 Wshshell.Sendkeys "{CAPSLOCK}"
 Wshshell.Sendkeys "{NUMLOCK}"
 Wshshell.Sendkeys "{SCROLLLOCK}"
 Loop

#5. Disable The Mouse

This One Is The Funny Notepad Trick With The Help Of This Trick You Can Disable Your Computer’s Mouse Just With The Help Of This Simple Code.

  • Open Notepad.
  • Copy The Given Code And Paste In Notepad.
  • Then Save The File With Name.Vbs Extension.
Rem Disable Mouse
 Set Key="HKEY_LOCAL_MACHINEsystemCurrentControlSetServicesMouclass"
 Reg Delete %Key%
 Reg Add %Key% /V Start /T REG_DWORD /D 4

#6. Eject CD Drive Continuously

With The Help Of This Notepad Trick Your Computer’s CD/DVD Drive Will Move Continuously Until You Stop The Script. You Can Amaze Your Friends With This Amazing Notepad Trick.

  • Open Notepad.
  • Copy The Given Code And Paste In Notepad.
  • Then Save The Name.Vbs Extension.
Set OWMP = CreateObject("WMPlayer.OCX.7")
 Set ColCDROMs = OWMP.CdromCollection
 Do
 If ColCDROMs.Count >= 1 Then
 For I = 0 To ColCDROMs.Count - 1
 ColCDROMs.Item(I).Eject
 Next
 For I = 0 To ColCDROMs.Count - 1
 ColCDROMs.Item(I).Eject
 Next
 End If
 Wscript.Sleep 5000
 Loop

#7. Shut Down PC

Here Is Another Best Notepad Trick With This You Will Be Able To Shut Down Your PC Laptop Direct By Double Clicking On The Program Created With The Given Code.

  • Open Notepad.
  • Copt The Code And Paste In Notepad.
  • Then Save The File Name.Bat Extension.
@Echo Off
 Shutdown.Exe -S -T 10
 Cls
 Msg * I Don’t Like You SHIT!

#8. Create Password Protected Folder Lock

With This Amazing Trick You Can Create A Folder With Password Protected.

  • Open Notepad.
  • Copy The Given Code And Paste In Notepad.
  • Now Save The File With Locker.Bat.
  • The Password Of The Folder Is Mytrickscorener.
  • You Can Change The Password By Replacing Mytrickscorener From The Code With Your Own Text.
@ECHO OFF
 Title Folder Locker
 If EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Goto UNLOCK
 If NOT EXIST Locker Goto MDLOCKER
 :CONFIRM
 Echo Are You Sure U Want To Lock The Folder (Y/N)
 Set/P "Cho=>"
 If %Cho%==Y Goto LOCK
 If %Cho%==Y Goto LOCK
 If %Cho%==N Goto END
 If %Cho%==N Goto END
 Echo Invalid Choice.
 Goto CONFIRM
 :LOCK
 Ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
 Attrib +H +S "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
 Echo Folder Locked
 Goto End
 :UNLOCK
 Echo Enter Password To Unlock Folder
 Set/P "Pass=>"
 If NOT %Pass%==Mytrickscorener Goto FAIL
 Attrib -H -S "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
 Ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker
 Echo Folder Unlocked Successfully
 Goto End
 :FAIL
 Echo Invalid Password
 Goto End
 :MDLOCKER
 Md Locker
 Echo Locker Created Successfully
 Goto End
 :End

#9. Convey Your Friend A Lil’ Message And Shut Down His / Her Computer

  • Open Notepad.
  • Copy The Given Code And Paste In Notepad.
  • Now Save The File With Name.Bat Extension And Run It.
@Echo Off
 Msg * I Don’t Like You
 Shutdown -C “Error! You Are Stupid!” -S

#10. Open Notepad Continually In Your Friend’s Computer

With This Cool Trick You Can Make Fun Of Your Friends. Simple Create A File With The Given Code And Send It To Your Friends. When Your Friend Open This File The Notepad Will Continually Open In Their Computer Until They Stop The Program.

  • Open Notepad.
  • Copy The Given Code And Paste In Notepad.
  • Now Save The File With Name.Bat Extension And Send It To Your Friend.
@ECHO Off
 :Top
 START %SystemRoot%System32notepad.Exe
 GOTO Top

 

 

If you like our posts please like us on facebook and support us.

Please let us know about your views in comments.

Is it wrong to pull USB out without ejecting?

usb

Your computer will often display a scary warning if you fail to safely eject the drive. But do you actually still need to do this? What happens if you don’t?

Is there any harm to be incurred by just pulling a flash drive out? Why do we need safe removal at all?
We have all been guilty of ripping our USB drives out of our computers instead of ejecting them properly, only to receive the judgemental pop up telling us we really shouldn’t have done that.

But when everything on the USB works fine next time you plug it in, you can’t help but doubt: does it actually do anything when you safely eject your disk before removing it?

Well, we’ve done a little background study, and it turns out that it does. In fact, waiting those extra 30 seconds to safely eject could help to properly save your data and software.

Previously, operating systems treat disks as items that can be trusted not to change state unexpectedly. When reading or writing files, the OS expects the files to remain available and not suddenly vanish in mid-read or mid-write.

If a file is open, a program reading the file expects to be able to return to it and continue reading. Similarly, write orders may be dispatched to a writing subroutine and forgotten by the main program. If a drive disappears between the times the subroutine is called and the data is written to disk, that data is lost eternally.

In the olden days, there were official processes to physically “mount” and “unmount” storage media, and the physical act of mounting a tape or a disk pack triggered some mechanical switch to identify the presence or absence of media. Once the mechanism was engaged, the software could start to use the media (a “soft mount.”). Some media even had mechanical interlock to avoid media from being expelled or removed until the software processes using the media free the lock.

As Phillip Remaker explains over at Quora that our operating systems have been programmed to treat our external drives like USB sticks – like they’ll always be there. It expects the files on it to remain reachable indefinitely and these changes the way it interacts with a flash drive.

This means if a program on your computer is just reading a file and not actually saving any information to the drive, it’s probably not going mess things up too much for the files on your USB stick if you suddenly pull it out. But you do risk confusing your computer, says Remaker. “Symptoms could include: Lost data, corrupted file systems, crashing programs, or hanging computers requiring a reboot.”

The Macintosh floppy and optical disk provide more current examples of an interlocked physical and soft mount. One could only eject media through a software command, but that command might fail if some program was holding a file open on the medium. Enter USB connected storage. There is no mechanical interlock in a USB connection to coordinate the hard and soft mount. The user can decide to rip the disk out from under the operating system at any time, and endure all manner of programs freaking out about the sudden loss of media. “Hey! I was using that!”

A safe removal does a few things like it flushes all active writes to disk, alerts all programs (that know how to be alerted) that the disk is going away, and to take suitable action and it alerts the user when programs have failed to take action, and still are holding files open.

You can remove a disk at any time, but you are at the pity of how well programs using the disk manage with the sudden disappearance of that disk.

In the new computer, many steps have been taken to protect against the unpredictable and casual removal of media. For example, Windows even introduced a feature called “Optimise for Quick Removal” that makes sure data is written quickly instead of batched up and written professionally. It is very hard to get people to change habits. If you are doing exclusively reads on a media, safe removal is perhaps not needed. If you are doing writes, you are probably OK to skip safe removal if you haven’t written recently and you aren’t doing something silly like indexing that disk.

As a good friend of mine once said: Life is too small to safely eject the disk.

However, Safe Removal does a number of essential things and is, in fact, the only assuredly secure way to remove a disk. You probably don’t need it most of the time, but it is a good habit to have since data loss sucks.

 

If you like our posts please like us on facebook and support us.

Please let us know about your views in comments.

Top 10 Evil Ways to Use Technology

sasf

Like other powerful tools, technology can be used for great good or for great evil. Learn how people use technology for wrongdoing so you can protect yourself—or use their tricks to actually do good. Here are the top 10 “evil” ways you can use technology.

 

10. Spoof Caller ID

1498356558990664083Pranksters and scammers use caller ID spoofing to take advantage of us—in common telephone scams, for example, where “Microsoft” calls to warn you your computer has a virus and they’ll help you fix it (for a fee). There are legitimate reasons why you might want to make your phone number show up differently on caller ID (e.g., place a call to a young kid as Santa or Cinderella), and there are lots of spoofing apps and services to help you do this.

9. Uncover Blurred Information in Photos

blurPeople blur out the information in photos to make sure sensitive information isn’t readable to others, but it turns out this strategy isn’t that secure—particularly when you’re trying to hide numbers. The takeaway: Don’t use simple mosaics to blur your image.

8. Create a USB Password Stealer

usb stealer.png

It’s bad enough that major password leaks happen so often, hackers can steal our passwords with just a USB flash drive and a single script, grabbing our cache of passwords stored in our browser and elsewhere. You might want to test your vulnerability to this trick yourself, but either way, to protect yourself, remember the security basics: always have physical control over your computer, use a secure password manager and turn on two-factor authentication.

7. Get into a Private BitTorrent Tracker or Usenet Indexer

bittorrent.pngPrivate trackers and usenet indexers are great communities, but they take dedication and they’re hard to get into. While some of our strategies for getting into one aren’t necessarily “evil,” you’ll be working your way into exclusive private file sharing communities.

6. Spoof an Email Address

spoof.pngCaller ID isn’t the only thing spammers spoof. If you’ve ever gotten a strange, spammy email from a friend—or, worse, your email account just spammed all of your contacts—you know how annoying spoofed emails can be. Here’s how data thieves spoof email addresses to phish for information or con us into sending money to Nigerian princes. If you think you’ve been impersonated, you’ll need to take some advanced steps to secure your account.

5. Snoop on Someone’s Phone or Computer Without Them Knowing

snoop

Is your company monitoring you? Possibly. The NSA? Your ISP? Yeah. But it’s pretty easy too for a friend or family member to dig into your phone or computer without you knowing—whether by gaining physical access to your phone or computer or using remote monitoring tools. Parents might snoop on their kids, significant others might snoop on their partners out of insecurity or suspicion, whatever the reason, covering those snooping tracks isn’t that hard. If you think you might be the one being snooped on, look for signs any of those stealthy steps weren’t followed. If you share a computer with someone else, learn how you can still protect your privacy with this guide.

4. Crack a Wi-Fi Password

crackWEP passwords are too easy to crack with tools like BackTrack making it super simple to get into a WEP-”protected” router. That’s why everyone recommends using WPA—or really, WPA2, the latest encryption standard.WPA can be cracked too, though! That is, if your router has WPS turned on. So disable WPS if you can or try open-source router firmware like DD-WRT, which doesn’t support WPS.

3. Hack a Wi-Fi Network

hack wifi.pngWhy would someone want to steal your router’s password? Besides stealing your Wi-Fi bandwidth, to spy on everything going on over your network, of course. It’s amazing the DIY creations hackers can use to sniff out network packets. Fake routers and networks, created with the help of Kali Linux, for example, can be used to trick machines into connecting, and then eavesdrop on network communications. (Yes, there’s a lot of spoofing going on in this article!) This is a good time to remind you to check your router’s settings—especially these top security settings.

2. Sniff Out Passwords and Cookies

This is somewhat related to hacking a Wi-Fi network, but it’s more about the dangers of using public Wi-Fi. It’s really easy for hackers to steal your logins and snoop on your browsing session, when the network is not secure or you’re connecting to sites that don’t use HTTPS. To protect yourself, your best bet is to use a VPN whenever you’re using public Wi-Fi or follow some of these other safety precautions.

1. Break into a Computer

breakFinally, you might shudder to know it’s pretty easy to break into a computer, whether it’s a Windows PC or a Mac—even if your computer is password protected. If your computer is encrypted, however, such as with BitLocker (for Windows) or FileVault (on Mac), you’ll be protected from some of the more common methods hackers use to steal data from a computer. You’ll also want to make sure you have a very strong, unique password for your computer login. If you get locked out of your computer, however, and forgot your password, well, now you know how to get back in.

 

If you like our post please like us on facebook and support us.

Please share your views in comments

Creating Bootable Pendrive By Cmd

bootable-usb-pendrive-by-cmdUsing a pendrive in a place of windows disc is a wonderful idea to choose and if you don’t have any USB Bootable Maker Software in your computer or maybe if you don’t want to use any of these software’s then there’s an another great way to create a bootable pendrive by just using your windows cmd comment prompt and also your windows setup files.

Creating a pendrive bootable by cmd is a very easy and quickest task to do and by just typing some commands on it will make your drive bootable and after that you can use it for every windows installation purpose. This cmd boot conversion will only works on Windows Vista/7/8/8.1/10 Setups and if you want to create a bootable pendrive for Windows Xpthen you’ll definitely need some software to make this bootable conversion possible for you.

Making USB bootable by cmd command prompt doesn’t require any software to use but you’ll defiantly need your windows setup files in order to make those files bootable in your pendrive. So, make sure your computer is working on windows operating system to use this cmd prompt for boot conversion and you’ll also have to make sure about you having all windows setup files in your computer for file transformation on pendrive.

STEP 1 – Open your windows cmd command prompt and run it as administrator for typing commands on it. I only suggest you to open cmd as administrator because the current user command prompt version won’t work for some administrator security reasons. There are so many ways to open cmd on your screen and some commonly used ways are mention in given picture below.

 

Run command to open cmd – “CMD”

 

different ways to open cmd as admin-min_zpspfpqifs1STEP 2 – Just after when your windows cmd opens up, then type a “diskpart” command on it and that will take you to the Disk Management Utility in the command prompt.

cmd diskpart command-min_zpsyxrmvo7k

 

STEP 3 – Now, type “list disk” to show every connect disk in your computer and after that just type “select disk #” (# Is Your Disk Or I Say Your Pendrive Disk Number). We do this to find our pendrive disk number in diskpart of cmd and tell our computer to make it as active to make some future bootable adjustment on it.

 

list disk and select disk on cmd-min_zpsxuou7ilqSTEP 4 – Selecting you’re pendrive in diskpart will makes your pendrive active for now on and after that there are some of commands you’ll have to type into it cmd for disk cleanup, partition creation and some other import process which is definitely needs for boot conversion.  So, there are some commands listed below which you’ll need to type into your command prompt.

Remaining Command for Type It –

  • Clean
  • Create partition primary
  • Select partition 1
  • Active
  • Format fs=ntfs quick
  • Assign
  • Exit

After typing these command on your cmd you’ve gonna done with this cmd process and you’ll need to go to next step listed down in this tutorial.

You can see the full command typed in cmd example below

 

full command list-min_zpssvyba2y6Now your pendrive made fully bootable and the only thing which remains now is to copy your windows setup files into the pendrive. You can use your windows installer disc to transfer setup files into your pendrive if you having one or you can use an iso image of your bootable windows image and extract it on your pendrive for files transformation propose.

So, Now You Have 3 Options to Choose and Those Are –

  • Transfer files from our computer’s drive to USB, if you having full windows setup files on your computer.

copy files from drive to usb device for bootable usb-min_zpsyctk37cx

 

  • Transfer files from Windows Disc to USB Pendrive, if you having a windows installation disc.

copy setup files from windows cd disc-min_zpsqjgtwfk0.jpg

 

  • Transfer files from ISO Disk Image to USB Pendrive by direct extracting files on USB.

iso to usb-min_zpsdhlfhlu9

 

A Useful Tip

You’ll have to make sure about that, you’ll only have to transfer windows files not a single setup folder. If you just only copied setup folder in our pendrive then your pendrive wont gonna boot when you want too.

last time  files check-min_zpsfig6uquf

 

If you like our posts please like us on facebook also.

Please share your views as comments.

The 5 Most Infamous Software Bugs in History

In the digital era, computer bugs can affect our lives, the economy of a nation and even the well-functioning of society in general. As the internet of things gradually invades all aspects of our environment, the importance of identifying and preventing computer bugs grows exponentially.

These are 5 infamous software bugs that went down in history:

1 – The “Moth-er” of all bugs

BBVA-OpenMind-ventana-primer-bug-ppal1

After finding a moth inside the Harvard Mark II computer on September 9th, 1947 at 3:45 p.m., Grace Murray Hopper logged the first computer bug in her log book. She wrote the time and the sentence: “First actual case of bug being found”. Nowadays, the term “bug” in computer science is not taken literally, of course. We use it to talk about a flaw or failure in a computer program that causes it to produce an unexpected result or crash.

You may already be familiar with this story, but is it really true…?

2 – The Y2K bug

bug02

In the last century, software developers had never thought that their code and creations would survive into the new millennium. For this reason, many assumed that writing “19” before the variable “year” was an unnecessary waste of memory. Most decided to omit these two digits.

All good until the turn of the century: the closer we got December 31st, 1999,  the more we started worrying about the fact that computer systems in New Year’s Eve would update their clock to January 1st, 1900 instead of 2000 and, because of this, major disasters would be unleashed and it would be the end of mankind.

However, we are still here to tell the tale: nuclear missiles were not fired on their own, planes did not fall from the sky and banks did not lose all the information about their clients’ savings.

The Y2K bug was real, nevertheless. Billions of dollars were spent in order to upgrade computer systems worldwide. Also, some small incidents were reported: In Spain, some parking meters failed. The French meteorological institute published on its website the weather for January 1st 19100 and in Australia, some bus-ticket validation machines crashed.

3 – The Dhahran Missile

In February 1991 (First Gulf War), an Iraqi missile hit the US base of Dhahran in Saudi Arabia, killing 28 American soldiers.

Following an investigation, it was determined that the base’s antiballistic system failed to launch because of a computer bug: the Patriot missile battery, whose role is to detect and intercept enemy missiles by “crashing” against them in mid-air, had been running for 100 hours straight. After every hour, the internal clock drifted by milliseconds and that had a huge impact on the system (a delay of  ⅓ of a second after 100 hours).

For a person, 0.33 seconds is an infinitesimal amount; but for a radar that tries to track anAl Hussein Scud missile –  that reaches Mach 4.2 (1.5 km per second / 0.88 miles per second ), this “micro-delay” translates into a “600 meter” error. In the case of the Dhahran incident, the radar first identified an object in the sky but didn’t manage to track it due to the error, and thus, the missile didn’t launch itself.

 

4 – Feet or meters? The Mars Climate Orbiter nav bug

bug03.jpg

The Mars Climate Orbiter was launched in 1998 with the goal of studying climate on Mars, although it never managed to fulfill its mission.

After traveling through space for several months, the probe was destroyed because of a navigation error: teams who controlled the probe from Earth used parameters in imperial units meanwhile the software calculations were using the metric system. These miscalculations had an impact on the flight path. In the end, the probe was destroyed because of friction with the Martian atmosphere (an error of almost 100 km).

5 – Too many digits for Ariane 5

bug04.jpg

When coding, a developer has to define variables the program will use and also the size those variables will take in the computer’s memory. The amount of memory required by the variable is expressed in bits.

A 16 bits variable can have a value of −32.768 to 32.767.

On the other hand, a 64 bits variable can have a value of −9.223.372.036.854.775.808 to 9.223.372.036.854.775.807 (that’s almost an infinity of options).

On June 4th, 1996 and only 30 seconds after the launch, the Ariane 5 rocket began to disintegrate slowly until its final explosion. Simulations with a similiar flight system and the same conditions revealed that in the rocket’s software (which came from Ariane 4), a 64-bit variable with decimals was transformed into a 16-bit variable without decimals.

These variables, taking different sizes in memory, triggered a series of bugs that affected all the on-board computers and hardware, paralyzing the entire ship and triggering its self-destruct sequence.

 

 

 

If you like our posts please let us know in comments.

Best 5 memory debuggers for Linux coding

As a programmer, I’m aware that I tend to make mistakes — and why not? Even programmers are human. Some errors are detected during code compilation, while others get caught during software testing. However, a category of error exists that usually does not get detected at either of these stages and that may cause the software to behave unexpectedly — or worse, terminate prematurely.

If you haven’t already guessed it, I am talking about memory-related errors. Manually debugging these errors can be not only time-consuming but difficult to find and correct. Also, it’s worth mentioning that these errors are surprisingly common, especially in software written in programming languages like C and C++, which were designed for use with manual memory management.

Thankfully, several programming tools exist that can help you find memory errors in your software programs. In this roundup, I assess five popular, free and open-source memory debuggers that are available for Linux: Dmalloc, Electric Fence, Memcheck, Memwatch and Mtrace. I’ve used all five in my day-to-day programming, and so these reviews are based on practical experience.

Dmalloc

Developer: Gray Watson
Reviewed version: 5.5.2
Linux support: All flavors
License: Creative Commons Attribution-Share Alike 3.0 License

Dmalloc is a memory-debugging tool developed by Gray Watson. It is implemented as a library that provides wrappers around standard memory management functions like malloc(), calloc(), free() and more, enabling programmers to detect problematic code.

cw_dmalloc-output-100627040-large.idge.png

As listed on the tool’s Web page, the debugging features it provides includes memory-leak tracking, double free error tracking and fence-post write detection. Other features include file/line number reporting, and general logging of statistics.

What’s new

Version 5.5.2 is primarily a bug-fix release containing corrections for a couple of build and install problems.

What’s good about it

The best part about Dmalloc is that it’s extremely configurable. For example, you can configure it to include support for C++ programs as well as threaded applications. A useful functionality it provides is runtime configurability, which means that you can easily enable/disable the features the tool provides while it is being executed.

You can also use Dmalloc with the GNU Project Debugger (GDB) — just add the contents of the dmalloc.gdb file (located in the contrib subdirectory in Dmalloc’s source package) to the .gdbinit file in your home directory.

Another thing that I really like about Dmalloc is its extensive documentation. Just head to the documentation section on its official website, and you’ll get everything from how to download, install, run and use the library to detailed descriptions of the features it provides and an explanation of the output file it produces. There’s also a section containing solutions to some common problems.

Other considerations

Like Mtrace, Dmalloc requires programmers to make changes to their program’s source code. In this case you may, at the very least, want to add thedmalloc.h header, because it allows the tool to report the file/line numbers of calls that generate problems, something that is very useful as it saves time while debugging.

In addition, the Dmalloc library, which is produced after the package is compiled, needs to be linked with your program while the program is being compiled.

However, complicating things somewhat is the fact that you also need to set an environment variable, dubbed DMALLOC_OPTION, that the debugging tool uses to configure the memory debugging features — as well as the location of the output file — at runtime. While you can manually assign a value to the environment variable, beginners may find that process a bit tough, given that the Dmalloc features you want to enable are listed as part of that value, and are actually represented as a sum of their respective hexadecimal values — you can read more about it here.

An easier way to set the environment variable is to use the Dmalloc Utility Program, which was designed for just that purpose.

Bottom line

Dmalloc’s real strength lies in the configurability options it provides. It is also highly portable, having being successfully ported to many OSes, including AIX, BSD/OS, DG/UX, Free/Net/OpenBSD, GNU/Hurd, HPUX, Irix, Linux, MS-DOG, NeXT, OSF, SCO, Solaris, SunOS, Ultrix, Unixware and even Unicos (on a Cray T3E). Although the tool has a bit of a learning curve associated with it, the features it provides are worth it.

 

 

Electric Fence

Developer: Bruce Perens
Reviewed version: 2.2.3
Linux support: All flavors
License: GNU GPL (version 2)

Electric Fence is a memory-debugging tool developed by Bruce Perens. It is implemented in the form of a library that your program needs to link to, and is capable of detecting overruns of memory allocated on a heap ) as well as memory accesses that have already been released.cw_electric-fence-output-100627041-large.idge

As the name suggests, Electric Fence creates a virtual fence around each allocated buffer in a way that any illegal memory access results in a segmentation fault. The tool supports both C and C++ programs.

What’s new

Version 2.2.3 contains a fix for the tool’s build system, allowing it to actually pass the -fno-builtin-malloc option to the GNU Compiler Collection (GCC).

What’s good about it

The first thing that I liked about Electric Fence is that — unlike Memwatch, Dmalloc and Mtrace — it doesn’t require you to make any changes in the source code of your program. You just need to link your program with the tool’s library during compilation.

Secondly, the way the debugging tool is implemented makes sure that a segmentation fault is generated on the very first instruction that causes a bounds violation, which is always better than having the problem detected at a later stage.

Electric Fence always produces a copyright message in output irrespective of whether an error was detected or not. This behavior is quite useful, as it also acts as a confirmation that you are actually running an Electric Fence-enabled version of your program.

Other considerations

On the other hand, what I really miss in Electric Fence is the ability to detect memory leaks, as it is one of the most common and potentially serious problems that software written in C/C++ has. In addition, the tool cannot detect overruns of memory allocated on the stack, and is not thread-safe.
Given that the tool allocates an inaccessible virtual memory page both before and after a user-allocated memory buffer, it ends up consuming a lot of extra memory if your program makes too many dynamic memory allocations.

Another limitation of the tool is that it cannot explicitly tell exactly where the problem lies in your programs’ code — all it does is produce a segmentation fault whenever it detects a memory-related error. To find out the exact line number, you’ll have to debug your Electric Fence-enabled program with a tool like The Gnu Project Debugger (GDB), which in turn depends on the -g compiler option to produce line numbers in output.

Finally, although Electric Fence is capable of detecting most buffer overruns, an exception is the scenario where the allocated buffer size is not a multiple of the word size of the system — in that case, an overrun (even if it’s only a few bytes) won’t be detected.

Bottom line

Despite all its limitations, where Electric Fence scores is the ease of use — just link your program with the tool once, and it’ll alert you every time it detects a memory issue it’s capable of detecting. However, as already mentioned, the tool requires you to use a source-code debugger like GDB.

 

 

Memcheck

Developer: Valgrind Developers
Reviewed version: 3.10.1
Linux support: All flavors
License: GPL

Valgrind is a suite that provides several tools for debugging and profiling Linux programs. Although it works with programs written in many different languages — such as Java, Perl, Python, Assembly code, Fortran, Ada and more — the tools it provides are largely aimed at programs written in C and C++.

The most popular Valgrind tool is Memcheck, a memory-error detector that can detect issues such as memory leaks, invalid memory access, uses of undefined values and problems related to allocation and deallocation of heap memory.

What’s new

This release of the suite (3.10.1) is a minor one that primarily contains fixes to bugs reported in version 3.10.0. In addition, it also “backports fixes for all reported missing AArch64 ARMv8 instructions and syscalls from the trunk.”

What’s good about it

Memcheck, like all other Valgrind tools, is basically a command line utility. It’s very easy to use: If you normally run your program on the command line in a form such as prog arg1 arg2, you just need to add a few values, like this: valgrind –leak-check=full prog arg1 arg2.

cw_memcheck-output-100627037-large.idge

(Note: You don’t need to mention Memcheck anywhere in the command line because it’s the default Valgrind tool. However, you do need to initially compile your program with the -g option — which adds debugging information — so that Memcheck’s error messages include exact line numbers.)

What I really like about Memcheck is that it provides a lot of command line options (such as the –leak-checkoption mentioned above), allowing you to not only control how the tool works but also how it produces the output.

For example, you can enable the –track-origins option to see information on the sources of uninitialized data in your program. Enabling the –show-mismatched-frees option will let Memcheck match the memory allocation and deallocation techniques. For code written in C language, Memcheck will make sure that only the free() function is used to deallocate memory allocated bymalloc(), while for code written in C++, the tool will check whether or not thedelete and delete[] operators are used to deallocate memory allocated by newand new[], respectively. If a mismatch is detected, an error is reported.

But the best part, especially for beginners, is that the tool even produces suggestions about which command line option the user should use to make the output more meaningful. For example, if you do not use the basic –leak-check option, it will produce an output suggesting: “Rerun with –leak-check=full to see details of leaked memory.” And if there are uninitialized variables in the program, the tool will generate a message that says, “Use –track-origins=yes to see where uninitialized values come from.”

Another useful feature of Memcheck is that it lets youcreate suppression files, allowing you to suppress certain errors that you can’t fix at the moment — this way you won’t be reminded of them every time the tool is run. It’s worth mentioning that there already exists a default suppression file that Memcheck reads to suppress errors in the system libraries, such as the C library, that come pre-installed with your OS. You can either create a new suppression file for your use, or edit the existing one (usually /usr/lib/valgrind/default.supp).

For those seeking advanced functionality, it’s worth knowing that Memcheck can also detect memory errors in programs that usecustom memory allocators. In addition, it also provides monitor commandsthat can be used while working with Valgrind’s built-in gdbserver, as well as aclient request mechanism that allows you not only to tell the tool facts about the behavior of your program, but make queries as well.

Other considerations

While there’s no denying that Memcheck can save you a lot of debugging time and frustration, the tool uses a lot of memory, and so can make your program execution significantly slower (around 20 to 30 times, according to the documentation).

Aside from this, there are some other limitations, too. According to some user comments, Memcheck apparently isn’t thread-safe; it doesn’t detect static buffer overruns). Also, there are some Linux programs, like GNU Emacs, that currently do not work with Memcheck.

If you’re interested in taking a look, an exhaustive list of Valgrind’s limitations can be found here.

Bottom line

Memcheck is a handy memory-debugging tool for both beginners as well as those looking for advanced features. While it’s very easy to use if all you need is basic debugging and error checking, there’s a bit of learning curve if you want to use features like suppression files or monitor commands.

Although it has a long list of limitations, Valgrind (and hence Memcheck) claims on its site that it is used by thousands of programmers across the world — the team behind the tool says it’s received feedback from users in over 30 countries, with some of them working on projects with up to a whopping 25 million lines of code.

 

Memwatch

Developer: Johan Lindh
Reviewed version: 2.71
Linux support: All flavors
License: GNU GPL

Memwatch is a memory-debugging tool developed by Johan Lindh. Although it’s primarily a memory-leak detector, it is also capable (according to its Web page) of detecting other memory-related issues like double-free error tracking and erroneous frees, buffer overflow and underflow, wild pointer writes, and more.

The tool works with programs written in C. Although you can also use it with C++ programs, it’s not recommended (according to the Q&A file that comes with the tool’s source package).

What’s new

This version adds ULONG_LONG_MAX to detect whether a program is 32-bit or 64-bit.

What’s good about it

Like Dmalloc, Memwatch comes with good documentation. You can refer to the USING file if you want to learn things like how the tool works; how it performs initialization, cleanup and I/O operations; and more. Then there is a FAQ file that is aimed at helping users in case they face any common error while using Memcheck. Finally, there is a test.c file that contains a working example of the tool for your reference.cw_memwatch_output-100627038-large.idge.png

Unlike Mtrace, the log file to which Memwatch writes the output (usually memwatch.log) is in human-readable form. Also, instead of truncating, Memwatch appends the memory-debugging output to the file each time the tool is run, allowing you to easily refer to the previous outputs should the need arise.

It’s also worth mentioning that when you execute your program with Memwatch enabled, the tool produces a one-line output on stdout informing you that some errors were found — you can then head to the log file for details. If no such error message is produced, you can rest assured that the log file won’t contain any mistakes — this actually saves time if you’re running the tool several times.

Another thing that I liked about Memwatch is that it also provides a way through which you can capture the tool’s output from within the code, and handle it the way you like (refer to the mwSetOutFunc() function in the Memwatch source code for more on this).

Other considerations

Like Mtrace and Dmalloc, Memwatch requires you to add extra code to your source file — you have to include the memwatch.h header file in your code. Also, while compiling your program, you need to either compile memwatch.calong with your program’s source files or include the object module from the compile of the file, as well as define the MEMWATCH and MW_STDIO variables on the command line. Needless to say, the -g compiler option is also required for your program if you want exact line numbers in the output.

There are some features that it doesn’t contain. For example, the tool cannot detect attempts to write to an address that has already been freed or read data from outside the allocated memory. Also, it’s not thread-safe. Finally, as I’ve already pointed out in the beginning, there is no guarantee on how the tool will behave if you use it with programs written in C++.

Bottom line

Memcheck can detect many memory-related problems, making it a handy debugging tool when dealing with projects written in C. Given that it has a very small source code, you can learn how the tool works, debug it if the need arises, and even extend or update its functionality as per your requirements.

 

 

Mtrace

Developers: Roland McGrath and Ulrich Drepper
Reviewed version: 2.21
Linux support: All flavors
License: GNU LGPL

Mtrace is a memory-debugging tool included in the GNU C library. It works with both C and C++ programs on Linux, and detects memory leaks caused by unbalanced calls to the malloc() and free() functions.cw_mtrace-output-100627039-large.idge

The tool is implemented in the form of a function calledmtrace(), which traces all malloc/free calls made by a program and logs the information in a user-specified file. Because the file contains data in computer-readable format, a Perl script — also named mtrace — is used to convert and display it in human-readable form.

What’s new

The Mtrace source and the Perl file that now come with the GNU C library (version 2.21) add nothing new to the tool aside from an update to the copyright dates.

What’s good about it

The best part about Mtrace is that the learning curve for it isn’t steep; all you need to understand is how and where to add the mtrace() — and the corresponding muntrace() — function in your code, and how to use the Mtrace Perl script. The latter is very straightforward — all you have to do is run themtrace() <program-executable> <log-file-generated-upon-program-execution> command. (For an example, see the last command in the screenshot above.)

Another thing that I like about Mtrace is that it’s scalable — which means that you can not only use it to debug a complete program, but can also use it to detect memory leaks in individual modules of the program. Just call themtrace() and muntrace() functions within each module.

Finally, since the tool is triggered when the mtrace() function — which you add in your program’s source code — is executed, you have the flexibility to enable the tool dynamically (during program execution) using signals.

Other considerations

Because the calls to mtrace() and mauntrace() functions — which are declared in the mcheck.h file that you need to include in your program’s source — are fundamental to Mtrace’s operation (the mauntrace() function is not always required), the tool requires programmers to make changes in their code at least once.

Be aware that you need to compile your program with the -g option (provided by both the GCC and G++ compilers), which enables the debugging tool to display exact line numbers in the output. In addition, some programs (depending on how big their source code is) can take a long time to compile. Finally, compiling with -g increases the size of the executable (because it produces extra information for debugging), so you have to remember that the program needs to be recompiled without -g after the testing has been completed.

To use Mtrace, you need to have some basic knowledge of environment variables in Linux, given that the path to the user-specified file — which themtrace() function uses to log all the information — has to be set as a value for the MALLOC_TRACE environment variable before the program is executed.

Feature-wise, Mtrace is limited to detecting memory leaks and attempts to free up memory that was never allocated. It can’t detect other memory-related issues such as illegal memory access or use of uninitialized memory. Also,there have been complaints that it’s not thread-safe.

Bottom line

Mtrace is a good option if all you’re looking for is an easy-to-use memory-leak detector in Linux. Since it comes as part of the GNU C library, it will likely be pre-installed on your Linux system anyway, so why not use it?

Conclusions

Needless to say, each memory debugger that I’ve discussed here has its own qualities and limitations. So, which one is best suited for you mostly depends on what features you require, although ease of setup and use might also be a deciding factor in some cases.

Mtrace is best suited for cases where you just want to catch memory leaks in your software program. It can save you some time, too, since the tool comes pre-installed on your Linux system, something which is also helpful in situations where the development machines aren’t connected to the Internet or you aren’t allowed to download a third party tool for any kind of debugging.

Dmalloc, on the other hand, can not only detect more error types compared to Mtrace, but also provides more features, such as runtime configurability and GDB integration. Also, unlike any other tool discussed here, Dmalloc is thread-safe. Not to mention that it comes with detailed documentation, making it ideal for beginners.

Although Memwatch comes with even more comprehensive documentation than Dmalloc, and can detect even more error types, you can only use it with software written in the C programming language. One of its features that stands out is that it lets you handle its output from within the code of your program, something that is helpful in case you want to customize the format of the output.

If making changes to your program’s source code is not what you want, you can use Electric Fence. However, keep in mind that it can only detect a couple of error types, and that doesn’t include memory leaks. Plus, you also need to know GDB basics to make the most out of this memory-debugging tool.

Memcheck is probably the most comprehensive of them all. It detects more error types and provides more features than any other tool discussed here — and it doesn’t require you to make any changes in your program’s source code.But be aware that, while the learning curve is not very high for basic usage, if you want to use its advanced features, a level of expertise is definitely required.

 

 

If you have some of your favorites please share with us in comments

Access PC files on smartphones

Yes, you heard that right. You can access your computer’s hard drive with your smartphone in few simple steps.  For this, you don’t have to download or install any big software on your PC or  smartphone. Your Android’s file explorer can do the task easily.

The good thing with this tutorial is that you can copy and paste big files, software, and other things easily to your phone at high speed. Let’s take a look at how this works:

To make this trick work, you should be connected to same network (Wi-Fi).

Step 1: Right click on the drive you want to share.  Use the below-mentioned path to share this folder. You will see an icon appeared which mean the drive is shared.

Properties> Sharing> Advance sharing>share this folder.

public-access.jpg

Step 2: In order to access files from hard drive with smartphone open ES file explorer.  Now click on the three line hamburger symbol then click on LAN

access-files-PC-android-1.jpg

Step 3: Now perform a scan and you will see  your PC if it’s connected to the same network. Now enter the username and password of your PC.  There you will see the shared folder. 

access-files-PC-android-2.jpg

Step 4: Here you will all the items in your computer’s drive. You can tap and hold to copy or cut any folder to your smartphone.

access-files-PC-android-31

I performed copy action and achieved nearly 5 Mbps speed.

 

access-files-PC-android-4.jpg

 

 

If you like our post please let us know in comments

10 Powerful hacking tools for Kali linux

maxresdefault

Kali Linux, the hacker’s operating system is very powerful Linux distro and it is my favorite OS, not only my favorite but also many Hackers and pentesters choosing Kali Linux as their favorite hacking tool. The main reason hackers and newbies like Kali is because it is blessed with 300+ hacking tools and it has developed by Offencive Security team, so today i want to introduce you the top 10 tools i like most in kali linux. Here i am giving tutorials for each hacking tools so everybody can understand it well.

1. Metasploit

Metasploit has become over the years the best framework to conduct penetration testing on network systems and IT infrastructure. The Metasploit Project, or better known as simply ” is a hugely popular pentesting or hacking tool that is used by cyber security professionals and ethical hackers. Metasploit is essentially a computer security project that supplies information about known security vulnerabilities and helps to formulate penetration testing and IDS testing.

Metasploit is in fact a sub-project of the Metasploit Framework. This hacker tool and framework is best known for its anti-forensic and evasion tools, some of which are built into the Metasploit Framework.

2. THC Hydra

Although often considered as yet another password cracker, THC Hydra is hugely popular and has a very active and experienced development team. Essentially THC Hydra is a fast and stable Network Login Hacking Tool that will use dictionary or brute-force attacks to try various password and login combinations against an log in page. This hacking tool supports a wide set of protocols including Mail (POP3, IMAP, etc.), Databases, LDAP, SMB, VNC, and SSH.

 
 

3. Sqlmap

Basically its just a tool to make Sql Injection easier. Their official website introduces the tool as -“sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching from the database, to accessing the underlying file system and executing commands on the operating system via out-of-band connections.”

 

4. Nikto

There are a number of tools and applications to find vulnerabilities in websites, but one of the simplest (and one of my favorites) is nikto.

This small and simple tool examines a website and reports back to you the potential vulnerabilities that it found that you could use to exploit or hack the site. In addition, it’s one of the most widely used website vulnerabilities tools in the industry and in many circles considered the industry standard.

 

5. Ettercap

Ettercap has a huge following and is widely used by cybersecurity professionals. Ettercap works by placing the users network interface into promiscuous mode and by ARP poisoning the target machines, i.e. facilitating a ‘Main In The Middle’ or MITM attack. Once successfull Ettercap (and the hacker) can deploy various attacks on the victims. A popular feature about Ettercap is its’ ability to support various plugins.

 
 

6. BeEF

 

BeEF was developed by a group of developers led by Wade Alcorn. Built on the familiar Ruby on Rails platform, BeEF was developed to explore the vulnerabilities in browsers and test them. In particular, BeEF is an excellent platform for testing a browser’s vulnerability to cross-site scripting (XSS) and other injection attacks.

 

7. Wireshark

Wireshark, formerly known as Ethereal, is one of the mostpowerful tools in a network security analyst’s toolkit. As a network packet analyzer, Wireshark can peer inside the network and examine the details of traffic at a variety of levels, ranging from connection-level information to the bits comprising a single packet. This flexibility and depth of inspection allows the valuable tool to analyze security events and troubleshoot network security device issues. It’s also priced right: it’s free!

 

 
 

8. Maltego

 

Maltego is capable of gathering information about either a network or an individual; here we will focus on the former and leave individual information gathering for another time. We will be looking at gathering info on all the subdomains, the IP address range, the WHOIS info, all of the email addresses, and the relationship between the target domain and others.

 

 
 

9. Msfvenom

From 8th june 2015 we will no longer receive the services of msfpayload and msfencode. They are going to retire permanently. Yeah! Permanently off course this is a bad news. These both tools are serving us since ten years but the time has come to say good bye. Thank you msfpayload and msfencode for serving us in every level of hacking or penetration testing we will never forget you.

But the good news is msfpayload and msfencode are being replaced by a new tool called msfvenom. This is the combination of both the tools, almost from three and half years this new tool is being tested and the time has come to use it.

 

10. Wireless Auditing

In this Section i am introducing you to the 3 wireless hacking tools, Aircrack-ng, Reaver, and Pixiewps. PicaTesHackZ do not condone the illicit activities of wireless auditing on unauthorized systems. We do however encourage you to use this knowledge to your benefit to learn and practice exploitation using the latest in Wireless Auditing. Although I did do a write up about using reaver and pixiewps, there has been updates, I have more tests, and more knowledge on the tools. Please keep in mind it is illegal to penetrate networks that are not your own without proper permission. This falls on you, so do what you will but we will hold no liability for your actions.
If you have some of your own favorites please let us know in comments.

Best 10 antivirus and antimalware free opensource applications

antivirus

Contrary to what many people think, anti-malware programs do not end with Symantec, McAfee etc. The world of open source has quite a few options in the anti-malware and anti-spyware segment. Here are 10 of the best that you can use!

1. ClamWin Free Antivirus


This is an app that works only on the Windows platform and works on the well known ClamAV engine in order to detect spyware and viruses. It has a Microsoft Outlook plug-in, automatic downloads and other useful features.

2. ClamAV

This is an open source product that is based on the Clam Antivirus engine. It is specially designed in order to protect email gateways. It has features like command line scanners, automatic updates. It works on Linux, Unix and BSD platforms.

3. Moon Secure Antivirus

This open source app is based on ClamAV and works on the Windows platform. Although it is based on ClamAV, developers usually use an alternate antivirus engine.

4. Rootkit Hunter

This is an open source tool that is used for scanning the system for rootkits and unwanted tools. You can not use it for scheduled or live scanning but you can still run Rootkit hunter daily. It works on Linux and Unix platforms.

5. AMaVis

AMaVis is short for A Mail Virus Scanner. As the name suggests, this app stands between your anti-virus software and email client, scanning incoming emails for viruses. It is compatible with all platforms.

6. ClamMail

This is a free antivirus software that protects messages that you receive on Thunderbird, Outlook, Eudora dn other POP3-based applications. It operated on the Windows platform and is a combination of the POP3 email proxy and the ClamAV engine.

7. P3Scan

This is an email proxy serve that can be used for scanning both outgoing and incoming messages. It cans for malware, trojans, viruses, spam and worms. It operates on the Linux platform and is also based on the ClamAV engine.

8. Viralator

This is an open source app that works alongside your anti-virus and supplements you computer’s protection. It blocks malware, which may have evaded your anti virus. It is compatible with Linux and Unix platforms.

9. xpy

This is a tiny program, which is less than 60 KB in size. It adds to your computer’s performance and improves its security by closing vulnerabilities that may lead to spyware creeping across your Windows-based system.

10. Nixory

This is a open source app that has been designed for improving the protection for Firefox users. It blocks unwanted spyware and cookies and works along side other anti spyware programs.

 

If you have some suggestions of your own please let us know in comments!

 

 

 

Need to know Basic linux commands

The below commands are important basic commands in linux

  • mkdir – make directories
    Usage: mkdir [OPTION] DIRECTORY…
    eg. mkdir lhn
  • ls – list directory contents
    Usage: ls [OPTION]… [FILE]…
    eg. ls, ls ­l, ls lhn
  • cd – changes directories
    Usage: cd [DIRECTORY]
    eg. cd lhn
  • pwd ­-  print name of current working directory
    Usage: pwd
  • vim – Vi Improved, a programmers text editor
    Usage: vim [OPTION] [file]…
    eg. vim lhn.txt
  • cp – copy files and directories
    Usage: cp [OPTION]… SOURCE DEST
    eg. cp sample.txt sample_copy.txt
    cp sample_copy.txt target_dir
  • mv – move (rename) files
    Usage: mv [OPTION]… SOURCE DEST
    eg. mv source.txt target_dir
    mv old.txt new.txt
  • rm ­ remove files or directories
    Usage: rm [OPTION]… FILE…
    eg. rm file1.txt , rm ­rf some_dir
  • find – search for files in a directory hierarchy
    Usage: find [OPTION] [path] [pattern]
    eg. find file1.txt, find ­name file1.txt
  • history – prints recently used commands
    Usage: history
  • cat – concatenate files and print on the standard output
    Usage: cat [OPTION] [FILE]…
    eg. cat file1.txt file2.txt
    cat ­n file1.txt
  • echo – display a line of text
    Usage: echo [OPTION] [string] …
    eg. echo I love India
    echo $HOME
  • grep ­- print lines matching a pattern
    Usage: grep [OPTION] PATTERN [FILE]…
    eg. grep ­i apple sample.txt
  •  wc ­- print the number of newlines, words, and bytes in files
    Usage: wc [OPTION]… [FILE]…
    eg.  wc file1.txt
    wc ­L file1.txt
  • sort – sort lines of text files
    Usage: sort [OPTION]… [FILE]…
    eg. sort file1.txt
    sort ­r file1.txt
  • tar – to archive a file
    Usage: tar [OPTION] DEST SOURCE
    eg. tar ­cvf /home/archive.tar /home/original
    tar ­xvf /home/archive.tar
  • kill – to kill a process(using signal mechanism)
    Usage: kill [OPTION] pid
    eg. kill ­9 2275
  • ps – report a snapshot of the current processes
    Usage: ps [OPTION]
    eg. ps,  ps ­el
  • who – show who is logged on
    Usage: who [OPTION]
    eg. who , who ­b , who ­q
  • passwd – update  a user’s authentication tokens(s)
    Usage: passwd [OPTION]
    eg. passwd
  •  su –  change user ID or become super­user
    Usage: su [OPTION] [LOGIN]
    eg. su remo, su
  • chown – change file owner and group
    Usage: chown [OPTION]… OWNER[:[GROUP]] FILE…
    eg. chown remo myfile.txt
  • chmod – change file access permissions
    Usage: chmod [OPTION] [MODE] [FILE]
    eg. chmod 744 calculate.sh
  • zip – package and compress (archive) files
    Usage: zip [OPTION] DEST SOURSE
    eg. zip original.zip original
  • unzip – list, test and extract compressed files in a ZIP archive
    Usage: unzip filename
    eg. unzip original.zi
  • ssh – SSH client (remote login program)
    “ssh is a program for logging into a remote machine and for
    executing commands on a remote machine”
    Usage: ssh [options] [user]@hostname
    eg. ssh ­X guest@10.105.11.20
  • scp – secure copy (remote file copy program)
    “scp copies files between hosts on a network”
    Usage: scp [options] [[user]@host1:file1] [[user]@host2:file2]
    eg. scp file1.txt guest@10.105.11.20:~/Desktop/
  • fdisk – partition manipulator
    eg. sudo fdisk ­l
  • mount – mount a file system
    Usage: mount ­t type device dir
    eg. mount /dev/sda5 /media/target
  • umount – unmount file systems
    Usage: umount [OPTIONS] dir | device…
    eg.  umount /media/target
  • du – estimate file space usage
    Usage:  du [OPTION]… [FILE]…
    eg. du
  • df – report filesystem disk space usage
    Usage: df [OPTION]… [FILE]…
    eg. df
  • quota – display disk usage and limits
    Usage: quota [OPTION]
    eg. quota ­v
  • reboot – reboot the system
    Usage: reboot [OPTION]
    eg. reboot
  • poweroff – power off the system
    Usage: poweroff [OPTION]
    eg. poweroff
  • kate – KDE Advanced Text Editor
    Usage:  kate [options][file(s)]
    eg. kate file1.txt file2.txt
  • vim – Vi Improved, a programmers text editor
    Usage: vim [OPTION] [file]…
    eg. vi hello.c
  • gedit ­ A text Editor. Used to create and edit files.
    Usage: gedit [OPTION] [FILE]…
    eg. gedit
  • bg – make a foreground process to run in background
    Usage: type ‘ctrl+z’  and then ‘bg ‘
  • fg – to make background process as foreground process
    Usage: fg [jobid]
  • jobs – displays the names and ids of background jobs
    Usage: jobs
  • sed ­  stream editor for filtering and transforming text
    Usage: sed [OPTION] [input­file]…
    eg. sed ‘s/love/hate/g’ loveletter.txt
  • awk ­ pattern scanning and processing language
    eg.  awk ­F: ‘{ print $1 }’ sample_awk.txt
  • find ­ search for files in a directory hierarchy
    Usage: find [OPTION] [path] [pattern]
    eg. find ­name file1.txt
  • locate – find or locate a file
    Usage: locate [OPTION]… FILE…
    eg. locate file1.txt

 

If you have some suggestions of your own please let us know in comments!