2. Linux basics for CSC
The servers of CSC use Linux operating systems. While the user's local computer is normally used mainly through a graphical user interface, the remote usage of the servers of CSC is in most cases based on working on command line: instead of using mouse and command menus, the user types commands to a screen called terminal or console. Even though more and more tools provided by CSC can be used through graphical interfaces, using the basic linux commands is in many cases still the most efficient way.
This chapter provides introduction to the usage of the Linux environment of CSC. The application server, taito-shell.csc.fi, is used in the examples but the same commands can be used in the other servers of CSC, too. If you are using Linux or Mac OSX machine, you can also use most of the commands in a terminal on your local machine. Once you are familiar with the basic Linux commands, you can continue to chapters that go deeper to the file and data management commands of Linux systems.
The recommended command shell in the CSC computing environment is bash, which is also a default for the new users. We recommend to stick with this choice if no special reason for another flavour is given. Previously, before 1st June 2012, the default was tcsh, which still can be used, as well as other shells like csh, sh or ksh. Users can change their default shell from within SUI - Scientist User Interface on https://sui.csc.fi.
This guide is accurate for bash shell only. If you are using some other Linux command shell, e.g. tcsh, some instructions/details may not apply or work.
2.1.1 Files and directories in linux
2.1.2 Structure of linux commands
2.1.3 Basic commands for using directories
2.1.4 Basic commands for files
2.1.5 Special characters
22.214.171.124 Wild card characters
126.96.36.199 Redirecting standard input and output
2.4.1 Using find to locate files
2.4.2 File command tells the file type
2.4.3 Count rows and characters with wc
2.4.4 Comparing two files with diff
2.4.5 Using checksums to verify successful data storage or transfer
2.4.6 Encrypting files with gpg
2.4.7 Managing access permissions of files and directories
2.4.8 Managing access permissions with Scientist's User Interface
2.4.9 Managing access permissions in command line usage
2.5.1 Grep selects rows that match given string
2.5.2 Using sed to select rows by row number
2.5.3 Simple column selection with cut
2.5.4 Using awk to work with columns
2.5.5 Using sort to order rows
2.5.6 Removing duplicate rows with uniq
2.5.7 Replacing characters with tr
2.5.8 Replacing words and strings with sed
|Previous chapter||One level up||Next chapter|