1. cheat_sheet.org
  2. (C) William Hackmore, 2010
  3. The contents of this file are released under the GNU General Public License. Feel free to reuse the contents of this work, as long as the resultant works give proper attribution and are made publicly available under the GNU General Public License.
  4. Last updated 8/14/2012
  5. Best viewed in emacs org-mode.
  • Command Reference:
    • Basics:
      • Getting help:
  1. View the manual for target command
man [command]
  1. Get help with a target command (probably the same as above, but not always):
[command] -h
  1. In case you forget the name of a command, print possible commands relating to [guess]:
apropos [guess]
  1. View index of help pages:
info
      • Command Line Utilities:
        • Basic File and Directory Operations:
  1. Print current working directory:
pwd
  1. Show files in current directory:
ls
  1. Show maximum information about all files, including hidden:
ls -a
  1. Recurse into subdirectories and list those as well:
ls -r
  1. Move/rename a file or directory (be careful that you don’t move the source over a destination with the same name):
mv [source] [destination]
  1. Delete target forever (be very careful), use -r recursive flag for directories:
rm [target]
  1. Copy file or directory:
cp [source] [destination]
  1. Mount filesytem:
mount /dev/[device name] /media/[device name]
  1. Unmount:
umount /media/[device name]
  1. Forensically clone filesystems and do other low-level operations on files. Very dangerous:
dd
  1. Work with filesystems and partitions. (Easier, still quite dangerous):
fdisk
        • System Administration:
  1. Execute command as an administrator (dangerous, but necessary for system administration tasks):
sudo [command]
  1. Become system administrator:
sudo -s
  1. Quit system administration:
exit
  1. Check distro repositories for software updates:
sudo apt-get update
  1. Download and install updates (update first):
sudo apt-get upgrade
  1. Search for package in the repositories:
apt-cache search [keyword]
  1. Get more detail on one specific package:
apt-cache show [package name]
  1. Download and install a package:
sudo apt-get install [package name]
  1. View the output of a command in a more convenient format:
[command] | less
        • Working With Files:
  1. Print a file in terminal:
cat [file]
  1. Find files matching [filename]:
locate [filename]
  1. Search through [filename] for matches to [phrase]:
grep [phrase] [filename]
  1. Search through output of a command for [phrase]:
[command] | grep [phrase]
        • Working With Processes:
  1. List all running processes:
ps -e
  1. Standard system monitor showing a more extensive view of all processes and system resources:
top
  1. Like top, but with a better, cleaner interface:
htop
  1. Stop a process from using all system resources and lagging computer:
nice [process name]
  1. Kill misbehaving process (use sparingly, last resort, try ‘nice’ command first):
pkill [process name]
        • Compression and Encryption:
  1. Make a simple compressed backup of a file or directory:
tar -cvzf [backup output.tgz] [target file or directory]
  1. Open a compressed .tgz or .tar.gz file:
tar -xvf [target.tgz]
  1. Encrypt a file:
gpg -o [outputfilename.gpg] -c [target file]
  1. Decrypt a file:
gpg -o [outputfilename] -d [target.gpg]
  1. Zip and encrypt a directory simultaneously:
gpg-zip -o encrypted-filename.tgz.gpg -c -s file-to-be-encrypted
      • The Bash shell:
        • File Name expansions:
  1. Current user’s home directory:

~/

  1. Current directory:
./
  1. Parent directory:
../
  1. Or even (Two parent directories down):
../../
  1. All files in target directory. (Be very careful.):
/*
        • Output Redirects:
  1. Redirect output of one command into the input of another with a pipe:
[command 1] | [command 2]
  1. Or even:
[command 1] | [command 2] | [command 3]
  1. Redirect output to a file:
[command] > file
  1. Or:
[file] > [file]
  1. Or even, to redirect in a different direction:
[file] < [file]
  1. Append output rather than writing over the target file:
[file/command] >> [file]
  1. Works like |, but it writes output to both target and terminal:

tee [target]

        • Controlling Execution:
  1. Wait until [command 1] is finished to execute [command 2]
[command 1] ; [command 2]
  1. Or even:
[command 1] ; [command 2] ; [command 3]
        • Wildcards:
  1. Zero or more characters:
*
  1. Matches “phrase” and any number of trailing characters:
phrase*
  1. Matches any incidences of “phrase” with any trailing or leading chars:
*phrase*
  1. Matches any one char:
?
  1. Matches any of the characters listed inside brackets:
[chars]
  1. Matches a range of chars between a-z:
[a-z]
    • Advanced:
      • Command Line Utilities, Continued:
        • Networking:
  1. Configure network interfaces:
ifconfig
  1. Configure wireless network interfaces:
iwconfig
  1. Connect to a remote server.
ssh [username]@[ipaddress]
  1. Forward x from target to current machine (Get a remote desktop. Very obscure and very useful):
ssh -x [username]@[ipaddress]
  1. Copy files over the network from one machine to another:
scp [source filename]:[username]@[ipaddress] [target filename]:[target username]@[target ipaddress]
  1. Copy only changes between files or directories (super efficient way to sync directories, works either locally or with remote servers using username@ipaddress:optionalport, just like ssh):
rsync [source] [target]
  1. Check to see if target is online and responding
ping [ip address]
  1. View network route to target:
traceroute6 [ip address]
  1. Network Monitor
netstat
  1. Manage standard linux firewall (advanced users only)
iptables
  1. Scan this machine to check for open ports:
nmap 127.0.0.1
          • netcat:
  1. Listen for input from network on [recieving port], dump it to a file (possibly insecure):
netcat -l [recieving port] > file_copied
  1. Pipe the output of a command to a target ip and port over the network:
[command] | netcat -w [number of seconds before timeout] [target ip] [target port]
  1. Use tar to compress and output a file as a stream, pipe it to a target ip and port over the network:
sudo tar -czf - [filename] | netcat -w [number of seconds before timeout] [target ip] [target port]
        • Users and Groups:
  1. Change owner of a file or directory:
chown
  1. Change privileges over file or directory:
chmod
  1. Create a new user:
adduser
  1. Change user privileges (be very careful with this one):
usermod
  1. Delete user”
deluser
  1. Print groups:
groups
  1. Create a new group:
groupadd
  1. Change group privileges:
groupmod
  1. Delete group:
delgroup
  1. Temporarily become a different user:
su [username]
  1. Print usernames of logged in users:
users
  1. Write one line to another user from your terminal:
talk
  1. Interactive talk program to talk to other users from terminal:
ytalk
        • Working With Files, Continued:
  1. View what processes are using what files:
lsof
  1. View the differences between two files:
diff [file 1] [file 2]
  1. Output the top -n lines of [file]:
head -n [number of lines] [file]
  1. Like head, but it outputs the last -n lines:
tail
  1. Checksum a file:
md5sum [file]
  1. Checksum every file in a directory:
md5deep [directory]
  1. Checksum a file (safer algorithm with no hash collisions):
sha1sum
  1. Same operation as md5deep, but using sha1:
sha1deep
  1. Call [command] every -n seconds, and display output:
watch -n [number of seconds] [command]
  1. Execute [command], print how long it took:
time [command]
  1. View files in home from largest to smallest:
du -a ~/ | sort -n -r | less
  1. remove spaces from filenames in current directory
rename -n 's/[\s]/<i>/g' *</i>
  1. change capitals to lowercase in filenames in current directory
rename 'y/A-Z/a-z/' *
          • Environment and Hardware:
  1. Print full date and time:
date
  1. Print the hostname of this machine:
echo $HOSTNAME
  1. Print information about current linux distro:
lsb_release -a
  1. Print linux kernel version:
uname -a
  1. Print information about kernel modules:
lsmod
  1. Configure kernel modules (never do this):
modprobe
  1. View Installed packages:
dpkg --get-selections
  1. Print environment variables:
printenv 
  1. List hardware connected via PCI ports:
lspci
  1. List hardware connected via USB ports:
lsusb
  1. Print hardware info stored in BIOS:
sudo dmidecode
  1. Dump captured data off of wireless card:
dumpcap
  1. Dump info about keyboard drivers:
dumpkeys
          • System Administration (Continued):
  1. Add a Personal Package Archive from Ubuntu Launchpad:
add-apt-repository
  1. Install a .deb file from command line:
sudo dpkg -i package.deb
        • Python:
  1. update pip (Python package manager):
pip install -U pip
  1. search pip repos
pip
  1. create a virtual python environment
virtualenv [dirname] --no-site-packages
  1. connect to a virtual python environment
source [dirname]/bin/activate
  1. disconnect from a python environment:
deactivate
  1. install package into virtual python environment from outsie:
pip install [packagename]==[version_number] -E [dirname]
  1. export python virtual environment into a shareable format:
pip freeze -E [dirname] &gt; requirements.txt
  1. import python virtual environment from a requirements.txt file:
pip install -E [dirname] -r requirements.txt
        • git (all commands must be performed in the same directory as .git folder):
  1. Start a new git project:
git init
  1. Clone a git (target can be specified either locally or remotely, via any number of protocols):
git clone [target]
  1. Commit changes to a git:
git commit -m "[message]"
  1. Get info on current repository:
git status
  1. Show change log for current repository:
git log
  1. Update git directory from another repository:
git pull [target]
  1. Push branch to other repository:
git push [target]
  1. Create a new branch:
git branch [branchname]
  1. Switch to target branch:
git checkout [branchname]
  1. Delete a branch:
git branch -d [branchname]
  1. Merge two branches:
git merge [branchname] [branchname]
      • Virtualization:
  1. clone a virtual machine (this works, it’s been tested):
vboxmanage clonehd [virtual machine name].vdi --format VDI ~/[target virtual machine name].vdi
  1. mount a shared virtual folder:
  2. you need to make sure you have the right kernel modules. You can do this with modprobe, but this package works instead in a ubuntu-specific way.
sudo apt-get install virtualbox-ose-guest-utils
sudo mount -t vboxsf [name of Shared folder specified in Virtualbox] [path of mountpoint]
      • mysql:
  1. Get help:
help
  1. Show databases:
show databases;
  1. Choose a database to use:
use [database name here];
  1. Show database schema:
show tables;
  1. Delete database:
DROP DATABASE [databasename];
  1. New database:
CREATE DATABASE [databasename];
  1. Create a new user:
CREATE USER [username@localhost] IDENTIFIED BY '[password]' ;
  1. Show users:
select * from mysql.user;
  1. Delete a user:
delete from mysql.user WHERE User='[user_name]';
  1. Give user access to all tables (make them root). the “%” means that they can sign in remotely, from any machine, not just localhost.:
grant all privileges on *.* to someusr@"%" identified by '[password]';
  1. give certain privileges to a user on a certain database:
grant select,insert,update,delete,create,drop on [somedb].* to [someusr]@["%"] identified by '[password]';
  1. Tell mysql to use new user priv policies:
flush privileges;
  1. change user password:
use mysql;

update user set password='[password]'(‘[newpassword]’) where User='[user_name]’ ;

  1. mysql command line args:
  1. export text file with commands to rebuild all mysql tables:
mysqldump [databasename] &gt; [dumpfilename.txt]
  1. restore from a dump:
mysql -u [username] -p &lt; [dumpfilename.txt]
  1. dump entire database:
mysqldump -u [username] -p --opt [databasename] &gt; [dumpfile.sql]
  1. restore from entire database dump:
mysql -u [username] -p --database=[databasename] &lt; [dumpfile.sql]

The issue is that cpanel from the https://domain.com:2083 looks like its missing css or files…

Symptom:
You try to access your cPanel behind CloudFlare and are finding that on the first page load that no images (or stylesheets or javascript) load – and, when trying to navigate to any link, you are immediately logged out. The experience is as if cPanel were broken in some way.

Cause:
cPanel has an option called “Cookie IP Validation”. This setting checks that the IP address that the visitor originally came from matches their IP address on subsequent requests. With CloudFlare, the IP address for requests to your server can variably come from any IP address in the list at https://www.cloudflare.com/ips

Resolution:
To resolve this issue, in your WHM, navigate to “Tweak Settings” -> “Security” -> “Cookie IP Validation”. On this screen, set the value for “Cookie IP Validation” to “disabled”. After this, loading your cPanel WHM interface through CloudFlare should work as expected.

Other resources:

https://support.cloudflare.com/hc/en-us/articles/200063289-My-cPanel-won-t-load-or-keeps-logging-me-out-after-enabling-CloudFlare

https://forums.cpanel.net/threads/cpanel-looks-stupid-when-i-log-in.266321/

https://support.cloudflare.com/hc/en-us/articles/200169276-How-do-I-use-cPanel-with-CloudFlare-

Install APCu. APC is not supported after php 5.4

Edit php.ini

extension="apcu.so"
; APC Configuration
apc.enabled = 1
apc.shm_segments = 1
apc.shm_size = 128M
apc.max_file_size = 2M
apc.ttl = 7200
apc.user_ttl = 7200
apc.num_files_hint = 1024
apc.enable_cli = 1

Restart apache

Is it mysql or maria?

# service mysqld status
Redirecting to /bin/systemctl status  mysqld.service
mysqld.service
   Loaded: not-found (Reason: No such file or directory)
   Active: inactive (dead)

]# systemctl status mariadb.service
mariadb.service - MariaDB database server
   Loaded: loaded (/usr/lib/systemd/system/mariadb.service; enabled)
   Active: active (running) since Mon 2015-10-05 21:03:57 EST; 3min 30s ago
  Process: 26953 ExecStartPost=/usr/libexec/mariadb-wait-ready $MAINPID (code=exited, status=0/SUCCESS)
  Process: 26922 ExecStartPre=/usr/libexec/mariadb-prepare-db-dir %n (code=exited, status=0/SUCCESS)
 Main PID: 26952 (mysqld_safe)
   CGroup: /system.slice/mariadb.service
           ├─26952 /bin/sh /usr/bin/mysqld_safe --basedir=/usr
           └─27120 /usr/libexec/mysqld --basedir=/usr --datadir=/var/lib/mysql --plugin-dir=/usr/lib64/mysql/plugin --log-error=/var/log/mariadb/mariadb.log --pid-file=/var/run/mariadb/mariadb.pid --socket=/var/lib/mysql/mysql.sock

Oct 05 21:03:55 domain.com mysqld_safe[26952]: 151005 21:03:55 mysqld_safe Logging to '/var/log/mariadb/mariadb.log'.
Oct 05 21:03:55 domain.com mysqld_safe[26952]: 151005 21:03:55 mysqld_safe Starting mysqld daemon with databases from /var/lib/mysql
Oct 05 21:03:57 domain.com systemd[1]: Started MariaDB database server.

Find the existing password

# cat /etc/psa/.psa.shadow
$AES-128-CBC$MnglmyKq3wJbZVgmb4YKTQ==$p/zX+xpnhJ20kIrrZiFsq7VLE3kI+86JwVdPYJtWdEE=[root@69-64-92-195 ~]#

Stop the database

]# systemctl stop mariadb.service

Edit my.cnf and add skip-grant-tables

[mysqld]
local-infile=0
datadir=/var/lib/mysql
socket=/var/lib/mysql/mysql.sock
# Disabling symbolic-links is recommended to prevent assorted security risks
symbolic-links=0
# Settings user and group are ignored when systemd is used.
# If you need to run mysqld under a different user or group,
# customize your systemd unit file for mariadb according to the
# instructions in http://fedoraproject.org/wiki/Systemd
skip-grant-tables
[mysqld_safe]
log-error=/var/log/mariadb/mariadb.log
pid-file=/var/run/mariadb/mariadb.pid

#
# include all files from the config directory
#
!includedir /etc/my.cnf.d

Restart mysql

# systemctl restart mariadb.service

Reset the mysql password no

# mysql -uadmin -p`cat /etc/psa/.psa.shadow` psa
mysql> UPDATE mysql.user SET Password=PASSWORD('# mysql -uadmin -p`cat /etc/psa/.psa.shadow` psa
mysql> UPDATE mysql.user SET Password=PASSWORD('$AES-128-CBC......') WHERE User='admin';') WHERE User='admin';

Edit my.cnf and remove skip-grant-tables

[mysqld]
local-infile=0
datadir=/var/lib/mysql
socket=/var/lib/mysql/mysql.sock
# Disabling symbolic-links is recommended to prevent assorted security risks
symbolic-links=0
# Settings user and group are ignored when systemd is used.
# If you need to run mysqld under a different user or group,
# customize your systemd unit file for mariadb according to the
# instructions in http://fedoraproject.org/wiki/Systemd
# skip-grant-tables
[mysqld_safe]
log-error=/var/log/mariadb/mariadb.log
pid-file=/var/run/mariadb/mariadb.pid

Install RPMForge on CentOS 6

# wget http://packages.sw.be/rpmforge-release/rpmforge-release-0.5.2-2.el6.rf.x86_64.rpm
# rpm -Uvh rpmforge-release-0.5.2-2.el6.rf.x86_64.rpm

Import RPMForge Repository Key in CentOS 6


# wget http://dag.wieers.com/rpm/packages/RPM-GPG-KEY.dag.txt
# rpm --import RPM-GPG-KEY.dag.txt

Install Mtop in CentOS 6

Once you’ve installed and enabled RPMForge repository, let’s install MTOP using following YUM command.


# yum install mtop

To start Mtop program, you need to connect to your MySQL Server, using following command.


# mysql -u root -p

Then you need to create separate user called mysqltop and grant privileges to him under your MySQL server. To do, this just run the following commands in mysql shell.


mysql> grant super, reload, process on *.* to mysqltop;
Query OK, 0 rows affected (0.00 sec)

mysql> grant super, reload, process on *.* to mysqltop@localhost;
Query OK, 0 rows affected (0.00 sec)

mysql> flush privileges;
Query OK, 0 rows affected (0.00 sec)

mysql> quit;
Bye

Let’s start the Mtop program.


# mtop

Sample Output:

load average: 0.03, 0.06, 0.08 mysqld 5.5.44-cll-lve up 4 day(s), 19:08 hrs
12 threads: 1 running, 0 cached. Queries/slow: 5/0 Cache Hit: 100.00%
Opened tables: 0  RRN: 332  TLW: 1  SFJ: 0  SMP: 0  QPS: 0

ID       USER     HOST             DB           TIME   COMMAND STATE        INFO
39965    mysqltop localhost                            Query                show full processlist

Monitor Remote MySQL Server using Mtop


# mtop  –host=remotehost –dbuser=username –password=password –seconds=1