Thursday, October 25, 2012

Bhoot Returns (2012) -Pre Dvd Rip

 






Student Of The Year (2012) Pre Dvd Rip




English Vinglish Full Movie 2012

Watch Here










 


Download Here

Sunday, October 7, 2012

OMG Oh My God DVDScr Movie Download









































OMG Oh My God is a 2012 Bollywood divine comedy directed by Umesh Shukla, and produced by Akshay Kumar. The film features Paresh Rawal,Akshay Kumar and Mithun Chakraborty in the lead role.OMG Oh My God is Akshay's 116th film.
[Movie Title].......................[OMG Oh My God]
[Release Year].......................[2012]
[Genre]......................[ Comedy]
[Size]...........................[694 MB]
[Resolution]....................[640*256]
[Format]..............................[Audio Video Interleave (.avi)]


[Language]..............................[Hindi]

Tuesday, September 18, 2012

Barfi! DVDScr Movie Download

Barfi! is a 2012 Indian romantic comedy film written and directed by Anurag Basu. It tells story of "Barfi", a mute and deaf Nepali-origin boy in Darjeeling, West Bengal and his relation with two girls, one of whom is autistic. The film stars Ranbir Kapoor, Priyanka Chopra and Ileana D'Cruz in lead roles. It was released on 14 September 2012 across 1750 screens in India and 350 screens overseas. The title was earlier credited as Khamoshi and Silence.

 
[Movie Title].......................[Barfi!]
[Release Year].......................[2012]
[Genre]......[Drama | Mystery | Thriller]
[Size]...........................[695 MB]
[Resolution]....................[624*256]
[Format]................[MatRoska (.mkv)]
[Language]..............................[Hindi]



Download link

Sunday, September 16, 2012

Samsung compares the Galaxy S III to the iPhone 5 in latest ad, says 'It doesn’t take a genius.'


There have been many instances where Samsung has mocked up Apple fans in its advertisements and now with the launch of the next generation of iPhone, called the iPhone 5 Samsung is not holding back again.

Samsung has released an ad titled ‘It doesn’t take a genius.’ and has compared the Samsung Galaxy S III head-on with Apple’s iPhone 5. Almost all the features of the iPhone 5 have a competition from Samsung but then, as the ad suggests the Galaxy S III arrives with more features.
 
Well before you come onto a conclusion catch the full ad released by Samsung below.

S3-vs-Iphone5-Ad-Full 
So what do you think? Which is the better one, Samsung Galaxy S III or the Apple iPhone 5? Do let us know us know in the comments section below.

First Look iphone 5


Saturday, September 15, 2012

Hack Your BSNL Internet Speed 8mbps 200%working HD

Adds For your Blog and Websites

How to Hide the drives(c:,d:,e:,...etc) in Ur Computer


This is a great trick you can play on your friends. To disable the display of local or networked drives when you click My Computer.

1.Go to start->run.Type regedit.Now go to:
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer

Now in the right pane
create a new DWORD item and name it NoDrives (it is case sensitive).
Now modify it's value and set it to 3FFFFFF (Hexadecimal) .
Now restart your computer.
So, now when you click on My Computer, no drives will be shown(all gone...).

To enable display of drives in My Computer, simply delete this DWORD item that you created.Again restart your computer.You can now see all the drives again. Magic........lol...

Make friends scare for VIRUS


Open notepad and type this:

lol=msgbox ("Warning a virus has been detected on your PC. Press YES to format your hard disk now or press NO to format your hard disk after system reboot",20,"Warning")

Then save it as Virus.VBS

and go to the folder that contains it and open it if a window pops out saying a virus has been detected it's working. Press yes or no to close the window and put it in the startup folder of the victim's account.
On startup the window should appear.
Note: This does not harm your computer as it does not contain virus.

The Yes and no button does not do anything except closing the window. And you can edit the virus in the sentence: Warning a virus has detected on your PC to any kind of virus eg.Trojan Horse like this lol=msgbox ("Warning a Trojan horse has been detected on your PC. Press YES to format your hard disk now or press NO to format format your hard disk after system reboot",20,"Warning")

Oh in between make sure your victim does not panic and really reformat his harddisk. hahaha :

Updated trick for enabling Folder option


Many times Windows users face a common problem. The “Folder Options” in “Tools” menu is not visible. Even It can’t be accessed from Control Panel. Also “Registry Editor” is disabled.
Follow the simple steps mentioned in this tutorial and your problem will be solved:

1. If Folder Options is disabled but Registry Editor is still working in your system, then you can enable Folder Options by editing Windows Registry.
Type regedit in RUN dialog box and press Enter.
it’ll open Registry Editor, now go to following keys:
HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Policies\ExplorerHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\Current Version\Policies\Explorer
In right-side pane, check whether a DWORD value named NoFolderOptions exists or not? If it exists, delete it.

2. If you are not familiar with editing the registry, then you can simply download following file, extract it and then run the .REG file:
Folder_option.zip

................................................................................................................
If u cant run regedit ....
Seems like your system is infected with a virus. Pls follow following link:
http://www.askvg.com/is-your-system-infected-with-a-virus-spyware-adware-trojan/

..................................................................................................................
Some ppl find that "show hidden files and folders" option ll not b enabled..
though enabled they cant c the hidden folders...
for that dont worry
--open RUN
--type regedit
--HKEY_CURRENT_USER\Software\Microsoft\Windows\Current Version\Explorer\Advanced
And in right-side pane, change value of “Hidden” to 1 and refresh My Computer window and you’ll be able to see hidden files again

Add Your Name (or) Application to right click Of My Computer


Caution ..

As it is related to Windows regisrty it can be dangerous

so,Try This at ur own risk



To write your name on right click application
please follow the steps.
1.Copy/Paste the following code in Notepad And then Save it as .reg

Windows Registry Editor Version 5.00
[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor]
@="Your Name Or Name of the Application"
[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor\command]
@="Location Of The Application"

2.
Now edit it and then Type your name In

Eg:

[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor]
@="Rajesh"

3. If u want to get any application, once you click Your name or name of application
Then , Type the location Of the application Which u want to open In:

[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Registry Editor\command]
@="Location Of The Application"

For eg.C:\Program Files\Yahoo!\Messenger\messenger.exe
Thats It finally save it And then Run it .


------------------------------------------------------------
To add Application Control Panel

[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Control Panel\command]
@="rundll32.exe shell32.dll,Control_RunDLL"

To add Application Add/Remove

[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\Add/Remove\command]
@="control appwiz.cpl"

To add Application Reboot

[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\[Reboot]\command]
@="shutdown -r -f -t 5"

To add Application Shutdown

[HKEY_CLASSES_ROOT\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\shell\[Shutdown]\command]
@="shutdown -s -f -t 5"

-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-....-......----..--.-...--.-..-

How to "Delete administrator Password" without any software


Method 1

Boot up with DOS and delete the sam.exe and sam.log files from Windows\system32\config in your hard drive. Now when you boot up in NT the password on your built-in administrator account which will be blank (i.e No password). This solution works only if your hard drive is FAT kind.

Method 2

Step
1. Put your hard disk of your computer in any other pc .Step 2. Boot that computer and use your hard disk as a secondary hard disk (D'nt boot as primary hard disk ).Step 3. Then open that drive in which the victim’s window(or your window) is installed.Step 4. Go to location windows->system32->configStep 5. And delete SAM.exe and SAM.log
Step 6. Now remove hard disk and put in your computer.
Step 7. And boot your computer :-)

All (Ctrl+Alt+Del) Permanently deleted files Recovery solution


Sometimes we delete the files permanently, and realize that deleting them is like a Blunder...

For all those folks,
Here is the solution

Software called "Kissass Undelete" , can bring those files from the hard disk or your flash drive.
Conditions : Only if the data on that drive is not re-occupied(or written). that means the space which was available after the deletion is not been occupied after the deletion.

Click Here to download the .

1)
To start searching for the files,
Select the drive from the Left panel of the Windows and Click the scan button.
the Scan might take upto 10 secs.

2)
When the files search has been completed, it will show you the results with the name, typ, size and the last modified date of the searched file.

3) Now you can select the file to be recover. This is an Open source application and available for All Windows OS(Windows XP/Vista/ 7).

Page Rank


Check Page Rank of your Web site pages instantly:
This page rank checking tool is powered by Page Rank Checker service

Friday, September 14, 2012

Raaz 3

Download Raaz 3 from here



3 Great Firefox 15 Features You Should Enable Right Now

firefoxMozilla debuted Firefox 15 just a few days ago, and unlike most of the recent releases, version 15 includes some major changes. The most notable among them is an improvement in the way the browser uses and releases memory. Mozilla has been working to fix the memory leak problem that has been plaguing the browser for years, and although I won’t hold my breath, Firefox 15 is showing appreciable improvement. According to the organization, the developers have managed to patch Firefox 15 solving the most common add-on leaks. The best part is that add-on developers don’t have to do anything as the fix applies to all add-ons.

While most changes are performance based, there are a few new features that users can benefit from during the day to day use of their browser. You won’t see them because they are disabled by default. And that’s for good reason – they are not ready for prime time as the developers feel there are still a few issues that needs to be ironed out before the new features can be released to the masses. If you are willing to accept the occasional hiccups that you might encounter on the way, here are 3 hidden features that you should enable in Firefox 15 right away.

Native PDF Viewer

firefox-native-pdf
Mozilla has been working on PDF rendering functionality since first introducing pdf.js a year ago. Initially available as a separate PDF Viewer add-on for the browser, pdf.js displays PDF files in HTML5 with JavaScript using Canvas and SVG APIs. The PDF viewer functionality is now built-in by default and its user interface was refreshed several times during the development stage.
How to Enable?
Go to about:config, search for “pdfjs.disabled”. Double click on it to change the value to “false.” Restart Firefox for the changes to take effect.

Click-to-play Plugins

firefox-click-plugin
Click-to-play plugins disable plugins by default, such as embedded Flash player, so videos in YouTube will not autoplay as soon as the page loads; you will have to click the Play button to load the Flash player. This is a good thing as it prevents any Flash content from auto playing.
Both Google Chrome and Opera has had a “click-to-play” plugins for more than a year now. Now Firefox has one as well.
How to Enable?
Go to about:config, search for “plugins.click_to_play”. Double click on it to change the value to “true”. Restart Firefox for the changes to take effect.

Options in Tab

firefox-tab-options
Taking a cue from Google Chrome, Mozilla developers have included an option in Firefox 15 that allows users to view the browser’s Options window in a tab instead of in a separate window. Peculiarly, only the Options window is affected by the change; the Downloads, Bookmarks and History still open in their own windows.
How to Enable?
Go to about:config, search for “browser.preferences.InContent”. Double click on it to change the value to “true”. You don’t to restart Firefox for the changes to take effect.

Exchange 2013 Preview

Introduction

Public Folders [PFs] were introduced in Exchange 4.0 as a approach to collect, classify and simply share information with other users. They were, and still are, used to share documents, e-mail messages, contacts and calendars. By mail-enabling a PF, users can also send e-mails to them, a underline that allows PFs to offer as a placement organisation repository or a contention forum for example.
Until Exchange 2007 and Outlook 2007, PFs were also compulsory in sequence to yield Free/Busy Information and concede users to download a Offline Address Book. Now, these facilities are supposing by a Autodiscover service, a Microsoft Exchange System Attendant use and a Microsoft Exchange File Distribution service.
PFs have always had their dedicated database that is customarily replicated between servers for high availability. This also allows for a PF reproduction to be closer to users from a network perspective, so saving bandwidth and improving performance. The obstacle is that a riposte process used between PF databases is distant from ideal and infrequently users have to wait mins for their PFs to get updated.
Throughout a years PFs have turn so renouned and useful that some companies have literary thousands and thousands of them. However, they are mostly used in a approach they shouldn’t be. For example:
For many years Microsoft has attempted to pierce divided from PFs and their superintendence around Exchange 2007 was for administrators to cruise relocating PFs into SharePoint as they wouldn’t be around for most longer. Although there are many collection now accessible to grasp this, for some companies it is simply usually not doable as SharePoint still doesn’t broach a same functionalities of PFs. They competence be old, a calamity to say and manage, yet they are still really valuable.
So once more, this time with Exchange 2013 and a new Office 365 “Wave 15”, PFs are here to stay! Although they haven’t most developed given they were initial introduced, with Exchange 2013 they finally have!

Improvements in Exchange 2013 Preview

One of my disappointments with Exchange 2010 is that PFs can't be partial of a Database Availability Group [DAG] and we still have to use a same riposte process accessible for PFs to grasp resilience and high availability.
The good news is that with Exchange 2013 Preview, PFs do take advantage of a existent high accessibility and storage technologies of a mailbox store, regulating specifically designed mailboxes to store both a hierarchy (the properties of a PFs and a structure in that they are organized) and a content (the tangible data) of PFs.
Besides PFs now being special mailboxes, there is no longer a Public Folder Database! The best partial is that PF riposte now uses a continual riposte model, and high accessibility for a PF mailboxes is achieved by a DAG, so relocating divided from a Multi-Master Replication Model PFs had, to a Single-Master Replication Model of DAGs.
A Multi-Master Replication Model is one where we have dual or some-more PF databases replicating between them. “Multi-Master” comes from a fact all PF databases are writable so we can have some users regulating one database, other users regulating a other database to entrance a same data, yet their calm is being constantly replicated between them, so all users have entrance to a same information. The problem is that this riposte is finished by SMTP messages sent between a servers holding a PF databases and is not really efficient, mostly causing conflicts when a same information is updated during a same time.
Because now PFs can be partial of a DAG, we no longer have this multi-master riposte model. Instead they replicate regulating a customary transaction record shipping method.
One emanate with a Preview book of Exchange 2013, is that since of a approach DAGs work, we can usually have a singular active duplicate of a sold PF mailbox anywhere in a organization. So if we wish to share a same PF between users in opposite locations, keep this in mind! However, it seems that Microsoft will be changing this in a future!

Creating Public Folder Mailboxes

The initial step to start regulating PFs in Exchange 2013 is to emanate a PF Mailbox. When we emanate a initial PF Mailbox, this will turn a Public Folder Master Hierarchy Mailbox, that is a usually one with a writable duplicate of a PF hierarchy. Every successive PF mailbox we emanate will be a elementary PF mailbox with a read-only duplicate of a hierarchy.
When a user performs a hierarchy change such as formulating or deletion a folder, this change is redirected to a Master Hierarchy PF Mailbox and afterwards replicated to all other PF Mailboxes, so avoiding conflicts.
Because we no longer have a Public Folder Management Console, we have to use a Exchange Management Shell [EMS] or a new Exchange Administration Center [EAC] to conduct PFs. Let’s start by regulating a EMS.
In a screenshot next we can see that we am regulating a cmdlets on a server named EXC2013, that is an all-in-one server. However, when we emanate a initial mailbox, this gets combined on a server named EXC2013MBX01, that hosts usually a mailbox server role. This is since Exchange will collect a pointless database if we do not use a –Database parameter.
Next, we emanate a second mailbox yet this time we manually mention in that database to emanate it. In this case, both PF mailboxes are on opposite databases and in opposite servers, that is not required.

Figure 1.1: Creating Public Folder Mailboxes by a EMS
In sequence to determine that a Master Hierarchy mailbox has been successfully created, we review a RootPublicFolderMailbox charge of your OrganizationConfig with a ExchangeGuid of your PF mailboxes. In this case, we will see that a MasterHierarchy mailbox we usually combined is indeed a Master:

Figure 1.2: Checking a Master Hierarchy Mailbox
In a screenshot above we can also see that it is regulating Set-OrganizationConfig that we set tellurian settings for PFs (unlike with Exchange 2007 and 2010), such as a quotas, limit distance for equipment or influence period, for example. The attributes PublicFolderLockedForMigration and PublicFolderMigrationComplete are used when migrating PFs from Exchange 2010.
You can also use a EAC to emanate PF Mailboxes. To do this, login to a EAC, navigate to Public Folders on a left side menu and name Public Folder Mailboxes:

Microsoft Office 2010

Microsoft Office 2010 full version

 Download Here

Wednesday, April 4, 2012

Unlock Your mobile here using IMEI Number

You can unlock your mobile here by just using your Mobiles IMEI number.
Just you have to do is to enter your IMEI number and click on go.


FREE Nokia Master Code
IMEI:

Saturday, February 4, 2012

Internet Download Manager



Friends ,Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads . Unlike other download accelerators and managers that segment files before downloading starts , Internet Download Manager segments downloaded files dynamically during download process . Internet Download Manager reuses available connections without additional connect and login stages to achieve better acceleration performance . Internet Download Manager supports proxy servers , ftp and http protocols , firewalls , redirects , cookies , authorization , MP3 audio and MPEG video content processing . IDM integrates seamlessly into Microsoft Internet Explorer , Netscape , MSN Explorer , AOL , Opera , Mozilla , Mozilla Firefox , Mozilla ,Avant Browser , MyIE2 , and all other popular browsers to automatically handle your downloads . You can also drag and drop files , or use Internet Download Manager from command line . Internet Download Manager can dial your modem at the set time , download the files you want , then hang up or even shut down your computer when it's done .

Just have a look its fantastic features :

Download Speed Acceleration . Internet Download Manager can accelerate downloads by up to 5 times due to its intelligent dynamic file segmentation technology . Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance .

All popular browsers and applications are supported ! Internet Download Manager has been tested with the following browsers : Internet Explorer , MSN Explorer , AOL , Netscape Communicator , Netscape 6 , Netscape 7 , Mozilla , Mozilla Firefox , Mozilla Firebird , Opera , NetCaptor , UltraBrowser , Slim Browser , Avant Browser , MyIE2 , Optimal Desktop , Ace Explorer , Advanced Browser , 27 Tools-in-1 Wichio Browser , WindowSurfer , 550 Access Browser , FineBrowser Freeware , Kopassa Browser , Fast Browser Pro , Enigma Browser , GoSuRF , K-Meleon , Smart Explorer , The Off By One Web Browser , Smartalec Voyager , CrystalPort AppCapture , The Family Browser , XANA Web Browser , Bluto , AutoSurf , 32bit Web Browser , BrowseMan , WrestlingBrowser , Eminem Browser , UltraBrowser , Cygsoft LDAP Browser , and Net Manager . Internet Download Manager supports all versions of popular browsers , and can be integrated into any 3rd party Internet applications

YouTube grabber . Internet Download Manager can grab FLV videos from popular sites like YouTube , MySpaceTV , and Google Video .

Simple installation wizard . Quick and easy installation program will make necessary settings for you , and check your connection at the end to ensure trouble free installation of Internet Download Manager .

Easy downloading with one click . When you click on a download link in a browser , IDM will take over the download and accelerate it . IDM supports HTTP , FTP , HTTPS and MMS protocols .

Simple installation wizard . Quick and easy installation program will make necessary settings for you , and check your connection at the end to ensure trouble free installation of Internet Download Manager .

Built-in Scheduler . Internet Download Manager can connect to the Internet at a set time , download the files you want , disconnect , or shut down your computer when it's done .

Drag and Drop . You may simply drag and drop links to IDM , and drag and drop downloaded files out of Internet Download Manager .

Automatic Antivirus checking . Antivirus checking makes your downloads free from viruses and trojans .

Advanced Browser Integration . When enabled , the feature can be used to catch any download from any application . None of download managers have this feature .

IDM supports many types of proxy servers . For example , IDM works with Microsoft ISA , and FTP proxy servers .

IDM supports main authentication protocols : Basic , Negotiate , NTLM , and Keberos . Thus IDM can access many Internet and proxy servers using login name and password .

IDM includes web site spider and grabber . IDM downloads all
required files that are specified with filters from web sites , for example all pictures from a web site , or subsets of web sites , or complete web sites for offline browsing . It's possible to schedule multiple grabber projects to run them once at a specified time , stop them at a specified time , or run periodically to synchronize changes .

Download limits . Progressive downloading with quotas feature . The feature is useful for

connections that use some kind of fair access policy like Direcway , Direct PC , Hughes , etc .

IDM is multilingual .
You can download full version from 
Here.

Thursday, February 2, 2012

A To Z Linux Commands


Linux dark HackTheWorld

Here are some linux commands for you so you can make your hands more and more dirty with ubuntu terminal.
mkisofs  Create an hybrid ISO9660/JOLIET/HFS filesystem
mknod Make block or character special files
more Display output one screen at a time
mount Mount a file system
mtools Manipulate MS-DOS files
mtr Network diagnostics (traceroute/ping)
mv Move or rename files or directories
adduser  Add a user to the system
addgroup Add a group to the system
alias Create an alias •
apropos  Search Help manual pages (man -k)
apt-get Search for and install software packages (Debian/Ubuntu)
aptitude Search for and install software packages (Debian/Ubuntu)
aspell Spell Checker
awk Find and Replace text, database sort/validate/index
b
basename Strip directory and suffix from filenames
bash     GNU Bourne-Again SHell
bc Arbitrary precision calculator language
bg Send to background
break Exit from a loop •
builtin Run a shell builtin
bzip2 Compress or decompress named file(s)
c
cal Display a calendar
case Conditionally perform a command
cat Display the contents of a file
cd Change Directory
cfdisk Partition table manipulator for Linux
chgrp Change group ownership
chmod Change access permissions
chown Change file owner and group
chroot Run a command with a different root directory
chkconfig System services (runlevel)
cksum Print CRC checksum and byte counts
clear    Clear terminal screen
cmp Compare two files
comm Compare two sorted files line by line
command Run a command – ignoring shell functions •
continue Resume the next iteration of a loop •
cp Copy one or more files to another location
cron Daemon to execute scheduled commands
crontab Schedule a command to run at a later time
csplit Split a file into context-determined pieces
cut Divide a file into several parts
d
date Display or change the date & time
dc Desk Calculator
dd Convert and copy a file, write disk headers, boot records
ddrescue Data recovery tool
declare Declare variables and give them attributes •
df Display free disk space
diff Display the differences between two files
diff3 Show differences among three files
dig DNS lookup
dir Briefly list directory contents
dircolors Colour setup for `ls’
dirname Convert a full pathname to just a path
dirs Display list of remembered directories
dmesg Print kernel & driver messages
du Estimate file space usage
e
echo Display message on screen •
egrep Search file(s) for lines that match an extended expression
eject Eject removable media
enable Enable and disable builtin shell commands •
env Environment variables
ethtool  Ethernet card settings
eval Evaluate several commands/arguments
exec Execute a command
exit Exit the shell
expect Automate arbitrary applications accessed over a terminal
expand Convert tabs to spaces
export Set an environment variable
expr Evaluate expressions
f
false Do nothing, unsuccessfully
fdformat Low-level format a floppy disk
fdisk Partition table manipulator for Linux
fg Send job to foreground
fgrep Search file(s) for lines that match a fixed string
file     Determine file type
find Search for files that meet a desired criteria
fmt Reformat paragraph text
fold Wrap text to fit a specified width.
for Expand words, and execute commands
format   Format disks or tapes
free     Display memory usage
fsck File system consistency check and repair
ftp      File Transfer Protocol
function Define Function Macros
fuser Identify/kill the process that is accessing a file
g
gawk Find and Replace text within file(s)
getopts Parse positional parameters
grep Search file(s) for lines that match a given pattern
groups Print group names a user is in
gzip Compress or decompress named file(s)
h
hash Remember the full pathname of a name argument
head Output the first part of file(s)
help     Display help for a built-in command •
history Command History
hostname Print or set system name
i
id Print user and group id’s
if Conditionally perform a command
ifconfig Configure a network interface
ifdown Stop a network interface
ifup Start a network interface up
import Capture an X server screen and save the image to file
install Copy files and set attributes
j
jobs List active jobs •
join Join lines on a common field
k
kill Stop a process from running
killall Kill processes by name
l
less Display output one screen at a time
let Perform arithmetic on shell variables •
ln Make links between files
local Create variables •
locate Find files
logname Print current login name
logout Exit a login shell •
look Display lines beginning with a given string
lpc Line printer control program
lpr Off line print
lprint   Print a file
lprintd  Abort a print job
lprintq  List the print queue
lprm Remove jobs from the print queue
ls List information about file(s)
lsof List open files
m
make     Recompile a group of programs
man Help manual
mkdir Create new folder(s)
mkfifo Make FIFOs (named pipes)
mmv Mass Move and rename (files)
n
netstat  Networking information
nice Set the priority of a command or job
nl Number lines and write files
nohup Run a command immune to hangups
Notify-send Send desktop notifications
nslookup Query Internet name servers interactively
o
open Open a file in its default application
op Operator access
p
passwd Modify a user password
paste Merge lines of files
pathchk  Check file name portability
ping Test a network connection
pkill Stop processes from running
popd Restore the previous value of the current directory
pr Prepare files for printing
printcap Printer capability database
printenv Print environment variables
printf Format and print data •
ps Process status
pushd Save and then change the current directory
pwd Print Working Directory
q
quota Display disk usage and limits
quotacheck Scan a file system for disk usage
quotactl Set disk quotas
r
ram ram disk device
rcp Copy files between two machines
read Read a line from standard input •
readarray Read from stdin into an array variable •
readonly Mark variables/functions as readonly
reboot   Reboot the system
rename Rename files
renice   Alter priority of running processes
remsync  Synchronize remote files via email
return Exit a shell function
rev Reverse lines of a file
rm Remove files
rmdir Remove folder(s)
rsync Remote file copy (Synchronize file trees)
s
screen Multiplex terminal, run remote shells via ssh
scp Secure copy (remote file copy)
sdiff Merge two files interactively
sed Stream Editor
select Accept keyboard input
seq Print numeric sequences
set Manipulate shell variables and functions
sftp     Secure File Transfer Program
shift Shift positional parameters
shopt Shell Options
shutdown Shutdown or restart linux
sleep Delay for a specified time
slocate Find files
sort Sort text files
source Run commands from a file `.’
split Split a file into fixed-size pieces
ssh Secure Shell client (remote login program)
strace   Trace system calls and signals
su Substitute user identity
sudo Execute a command as another user
sum Print a checksum for a file
suspend Suspend execution of this shell •
symlink Make a new name for a file
sync Synchronize data on disk with memory
t
tail Output the last part of files
tar Tape ARchiver
tee Redirect output to multiple files
test Evaluate a conditional expression
time Measure Program running time
times User and system times
touch Change file timestamps
top List processes running on the system
traceroute Trace Route to Host
trap     Run a command when a signal is set(bourne)
tr Translate, squeeze, and/or delete characters
true Do nothing, successfully
tsort Topological sort
tty Print filename of terminal on stdin
type Describe a command •
u
ulimit Limit user resources •
umask Users file creation mask
umount   Unmount a device
unalias Remove an alias •
uname Print system information
unexpand Convert spaces to tabs
uniq Uniquify files
units Convert units from one scale to another
unset Remove variable or function names
unshar Unpack shell archive scripts
until Execute commands (until error)
useradd Create new user account
usermod Modify user account
users List users currently logged in
uuencode Encode a binary file
uudecode Decode a file created by uuencode
v
v        Verbosely list directory contents (`ls -l -b’)
vdir     Verbosely list directory contents (`ls -l -b’)
vi Text Editor
vmstat Report virtual memory statistics
w
watch Execute/display a program periodically
wc Print byte, word, and line counts
whereis Search the user’s $path, man pages and source files for a program
which Search the user’s $path for a program file
while Execute commands
who Print all usernames currently logged in
whoami Print the current user id and name (`id -un’)
Wget     Retrieve web pages or files via HTTP, HTTPS or FTP
write Send a message to another user
x
xargs Execute utility, passing constructed argument list(s)
xdg-open Open a file or URL in the user’s preferred application.
yes Print a string until interrupted
. Run a command script in the current shell