Friday, December 12, 2014

How to get your Huawei airtel dongle to work with OS X Yosemite



I've been using a Huawei E3272 4G dongle,(might be exclusive to the operator airtel service in India). with service provider software as it was minimal and provided everything I needed to connect and go online.


Everything worked fine until Apple released their new OS X Yosemite ; it is a cool operating system with a lot of new features and best thing was it's offered for  free upgrade form OS_X_Mavericks to OS X Yosemite! What more can you ask?



So I went ahead and upgraded the OS of my mac, checked out the software’s I had and pretty much everything worked fine until I opened up the Huawei airtel dongle software, it's not compatible with OS X Yosemite well that's a bummer!

Having seeing the incompatible issue, I went ahead with and downloaded Airtel dongle connection manager  software, but that didn't even recognized my 4G dongle. Tried the software from Huawei and I ended up with the same issue, it does not identify my dongle. After going through numerous Apple discussion forums; I found a solution finally.

If your Huawei dongle not working on Mac OSX Yosemite, Here is a workaround until your service provider releases an updated dialer.


Please follow below steps to get your Huawai 4G or 3G dongle to work with OS X Yosemite:

Step 1:

Click on this link to download the new compitable driver from Huawei website 

Step 2:  Open the archive, you will find two files


1. Mobile Partner install user guide.docx
2. Mobile Partner.zip

Open the zip file Mobile Partner.zip, you will find Mobile Partner.app. Double click on this file to install the app in your new OS X Yosemite.

Step 3:  Once installation finish, start the app and go to Tools -> Options to create an profile manually.

In the Options window, select “Profile Management” from the left side menu

Click on “New” button to create a new profile. Give it a name, such as “airtel 4g”. Also, make sure the “Access Number” is set to *99#. Click “Save”, then “Ok”

Step 4:  Insert your Dongel into an USB port. You should see “Mobile Partner” application starting automatically. Choose the profile you created (airtel 4g) and “Connect”.


That's it!!



Friday, April 4, 2014

how to setup a free proxy server for small offices ?

What is a firewall?

Firewall is a device, which is placed between something dangerous, and something to be protected. A typical firewall configuration starting from the left the physical connection to the outside world attached to a border router, which may be under the local area network administrator or another organization. A LAN network such as an Ethernet is attached to the border router. This network is known as de-militarized zone (DMZ). It provides an attachment point for the bastion hosts which provide external connection points for services such as email, web, etc 

Why System administrator  Use Proxy Server?


  • Using Proxy server  sys admin can control and restrict users' access to websites based on their content.
  • You can allow/block a user from visiting all websites except a list of those you add as an exception; or you can block all websites in a specific category.
  • Proxy server  plays a key role in enabling organizations to limit web activity at the workplace.
  •  Normally a firewall is installed where your internal network connects to the Internet. Although larger organizations may also place firewalls between different parts of their own network that require different levels of security, most firewalls screen traffic passing between an internal network and the Internet. This internal network may be a single computer or it may contain thousands of computers.
    The following list includes the most common features of firewalls:
  • Block incoming network traffic based on source or destination: Blocking unwanted incoming traffic is the most common feature of a firewall.

  • Block outgoing network traffic based on source or destination: Many firewalls can also screen network traffic from your internal network to the Internet. For example, you may want to prevent employees from accessing inappropriate Web sites.

  • Block network traffic based on content: More advanced firewalls can screen network traffic for unacceptable content. For example, a firewall that is integrated with a virus scanner can prevent files that contain viruses from entering your network. Other firewalls integrate with e-mail services to screen out unacceptable e-mail.

  • Make internal resources available: Although the primary purpose of a firewall is to prevent unwanted network traffic from passing through it, you can also configure many firewalls to allow selective access to internal resources, such as a public Web server, while still preventing other access from the Internet to your internal network.

  • Allow connections to internal network: A common method for employees to connect to a network is using virtual private networks. VPNs allow secure connections from the Internet to a corporate network. For example, telecommuters and traveling salespeople can use a VPN to connect to the corporate network. VPNs are also used to connect branch offices to each other. Some firewalls include VPN functionality and make it easy to establish such connections.

  • Report on network traffic and firewall activities: When screening network traffic to and from the Internet, it's also important to know what your firewall is doing, who tried to break into your network, and who tried to access inappropriate material on the Internet. Most firewalls include a reporting mechanism of some kind or another.



Use  Squid Proxy Server  in debian operating system to Build Your Own Proxy server

for installation instruction see me next post>>>>>>>>>>>>>> 

Tuesday, March 11, 2014

Step by Step instruction of Email Address configuraton in Apple Mac OS


1. Open your Apple Mail client
2. Fill in the ‘Welcome to Mail’ window with the following information:
· Full Name: [your name]
· Email Address: your full email address [eg: username@your-domain.com]
· Password: your Email password
· Important: Hold the option button down until ‘Create’ turns into ‘Continue’

















Click Continue
3. Fill in the following Incoming Mail Server information:
· Account Type: POP
Incoming Mail Server:
pop.your-domain.com (For Free Email Service / Email Hosting Plans)                                    
· User Name: your full email address [username@your-domain.com]
· Password: your Email password
· Important: Hold the option button down until ‘Create’ turns into ‘Continue’

















Click Continue

4. Incoming Mail Security
· Use Secure Sockets Layer (SSL): Do not select
· Authentication: Password
· Important: Hold the option button down until ‘Create’ turns into ‘Continue’
















Click Continue

5. Enter the following Outgoing Mail Server information:
· You can leave description blank - this field is optional Outgoing Mail Server:
smtp.your-domain.com (For Free Email Service / Email Hosting Plans)
· Use Authentication: Do not select
· User Name: your full Email address [username@your-domain.com]
· Password: your Email password
  Important: Hold the option button down until ‘Create’ turns into ‘Continue’

















· Click Continue.
· Outgoing Mail Security
· Use Secure Sockets Layer (SSL): Do not select
· Authentication: Password
· Important: Hold the option button down until ‘Create’ turns into ‘Continue’

















Click Continue

· Review your Account Summary and uncheck Take account online as you will need to adjust your incoming port number
· Click Create


















Once your client opens, you’ll need to change your incoming port number to 110. To edit your incoming port number,
please click Mail> Preferences... > Accounts tab > Advanced

· Important:
     ***For POP configuration,
      Incoming (POP) Server Port Number: 110
      Outgoing (SMTP) Server Port Number: 587





















 After you’ve updated your port number, you can take your accounts online and download new messages by clicking
     Mailbox > Get All New Mail

If you have already configured  for POP and are trying to add an additional email, please start by following these steps:
1. Click Mail > Preferences....
2. On the Accounts tab, click the + button to add a new account.

You will then need to repeat the steps above.

Free Word and Excel Password Recovery Wizard

Tuesday, February 25, 2014

How to Installing Ubuntu on windows 8 ; Guide tutorial



In this post I will show the step by step procedure  to install Ubuntu  as a dual boot OS on Windows 8 system.

  • The first step to install Ubuntu (Linux) was to creat a partition on my existing hard drive.
  • Making Space using "Shrink Disc" feature in windows 8.
    • Right-Click on "My computer" in the main menu and select "Manage" 
    • It will ask for administrator permission, click "yes".
    • Click on Disc Management.On right side of the menu.
    • There is will show the available partitions and external storage devices if any
    • Right Click on the disc partition you want to shrink and select "shrink volume" (/here i suggest you to select D or E drive to shrink).
    •  Windows 8 will assess how much space can be made free
    • It will suggest the value which can be made free. Be sure that this is at least 10-15 GB. If you dont have this space, you will have to delete some data to make space for the partition.
    • Then select "shrink"
    • Vista will shrink the volume and show the new freed space as "unallocated" space.
    • After this close the window. You are done with shrinking .
     
  • The next step is to install Ubuntu.
    • You will need to download the latest ISO for Ubuntu  from here:
    • http://www.ubuntu.com/download/desktop 
    • You will need to burn this ISO image on to a CD.
    • For burning this ISO you will have to use an ISO burning software. One such free software is: Free ISO burner: http://www.freeisoburner.com/ 
    • Be sure to burn the ISO image at a very slow speed. This extra time spent will help you install Linux trouble-free.
    • When the disc is ready, restart the computer. Be sure that in BIOS setup the CD drive is above the hard disc in boot priority.
    • Once restarted the disc will boot before the hard disc.
    • In the menu that is displayed, select "run installer" and follow the instructions.
    • Once you have selected language, Location and Keyboard configuration....the disk partitioner of ubuntu will run and show you various options as to where Ubuntu should be installed.
    • Select "Largest continuous free space" as this will select the "unallocated space" that we have created in the earlier step by shrink tool.
    • After this follow the next instructions to complete the installation.
    • Complete the installation. It will prompt to restart the computer. Do so.
    •  After restart, the menu will show Ubuntu and Windows 8 a dual boot OS and now you are free to choose the OS you want to load.

     

Friday, January 24, 2014

Cygwin complete Commands on Windows

Cygwin on Windows

Commands in Course Order:

Command
Usage
Comment
pwd
pwd
Print your current directory (folder) location
ls
ls
List the files in the current folder
mkdir
mkdir  Blast
Make a new folder.  Example Blast
cd
cd  /Blast
Change to another folder like Blast
cd
cd  c:/
Change to C drive
cd
cd   /
Change to the root directory.  Cygwin files are here
man
man  pwd
Show the manual pages for all command
cat  >
cat  >  file1
Create file1 and write data to it
cat  >>
cat  >>  file1
Add new lines to the bottom of file1
cat
cat  file1
Show/display contents of file1 to the screen
cat
cat  file1  file2
Show/display contents of file1 and file2 to the screen
sort
sort  file1
Sort the contents of file1
sort
sort  file1  file2
Sort the contents of file1 and file2 together
alias
alias  dog = “cat”
Assign the work dog to the cat command
alias
alias  path = “/BioDownload/bin/”
Type path instead of /BioDownload/bin/
|
cat  file1  file2  |  sort
Called Pipe.  Places output of cat into sort
head
head  TA496Seq1
View the first few lines of a file, especially a large file
tail
tail  TA496Seq1
View the first few lines of a file, especially a large file
less
less   TA496Seq1
View a large file and control the output
cp
cp  file1  file2_copy
Make a copy of file1 and call it file2_copy
cp
cp  file1  /Bioinfo
Make a copy of file1 and place it in the folder Bioinfo
cp
cp  file1  /Bioinfo/cp_test
Copy file1 into the folder Bioinfo and call it cp_test
mv
mv  file1  /Bioinfo
Move file1 into the folder Bioinfo
rm
rm  file1
Permanently delete file1
rm
rm  /Bioinfo/file2
Delete file2 which is located in the Bioinfo folder
rmdir
rmdir  /Bioinfo
Remove the folder called Bioinfo
grep
grep  “ATG”  file1 
Search for ATG in file1
grep
grep  “ATG”  file1  file2
Search for ATG in file1 and file2
grep
grep  -i  “ATG”  file1
Search for ATG in file1 regardless of case:  Atg, atg, ATg, and so on
grep
grep  -ic  “ATG”  file1
Search but return only a count of occurrences of all ATG
grep
An excellent reference
www.cyberciti.biz/faq/howto-use-grep-command-in-linux-unix/

Commands in Alphabetical Order
Command
Usage
Comment
|
cat  file1  file2  |  sort
Called Pipe.  Places output of cat into sort
alias
alias  dog = “cat”
Assign the work dog to the cat command
alias
1alias  pathx = “/BioDownload/bin/”
Type pathx instead of /BioDownload/bin/
cat
cat  file1
Show/display contents of file1 to the screen
cat
cat  file1  file2
Show/display contents of file1 and file2 to the screen
cat  >
cat  >  file1
Create file1 and write data to it
cat  >>
cat  >>  file1
Add new lines to the bottom of file1
cd
cd  /Blast
Change to another folder like Blast
cd
cd  c:/
Change to C drive
cd
cd   /
Change to the root directory.  Cygwin files are here
cp
cp  file1  file2_copy
Make a copy of file1 and call it file2_copy
cp
cp  file1  /Bioinfo
Make a copy of file1 and place it in the folder Bioinfo
cp
cp  file1  /Bioinfo/cp_test
Copy file1 into the folder Bioinfo and call it cp_test
grep
grep  “ATG”  file1 
Search for ATG in file1
grep
grep  “ATG”  file1  file2
Search for ATG in file1 and file2
grep
grep  -i  “ATG”  file1
Search for ATG in file1 regardless of case:  Atg, atg, ATg, and so on
grep
grep  -ic  “ATG”  file1
Search but return only a count of occurrences of all ATG
grep
An excellent reference
www.cyberciti.biz/faq/howto-use-grep-command-in-linux-unix/
head
head  TA496Seq1
View the first few lines of a file, especially a large file
less
less   TA496Seq1
View a large file and control the output
ls
ls
List the files in the current folder
man
man  pwd
Show the manual pages for all command
mkdir
mkdir  Blast
Make a new folder.  Example Blast
mv
mv  file1  /Bioinfo
Move file1 into the folder Bioinfo
pwd
pwd
Print your current directory (folder) location
rm
rm  file1
Permanently delete file1
rm
rm  /Bioinfo/file2
Delete file2 which is located in the Bioinfo folder
rmdir
rmdir  /Bioinfo
Remove the folder called Bioinfo
sort
sort  file1
Sort the contents of file1
sort
sort  file1  file2
Sort the contents of file1 and file2 together
tail
tail  TA496Seq1
View the first few lines of a file, especially a large file


1Note:  there are certain words that are reserved as “commands”.  For example we could not use “path” as an alias, but we could use “pathx”.

How to get your Huawei airtel dongle to work with OS X Yosemite



I've been using a Huawei E3272 4G dongle,(might be exclusive to the operator airtel service in India). with service provider software as it was minimal and provided everything I needed to connect and go online.


Everything worked fine until Apple released their new OS X Yosemite ; it is a cool operating system with a lot of new features and best thing was it's offered for  free upgrade form OS_X_Mavericks to OS X Yosemite! What more can you ask?



So I went ahead and upgraded the OS of my mac, checked out the software’s I had and pretty much everything worked fine until I opened up the Huawei airtel dongle software, it's not compatible with OS X Yosemite well that's a bummer!

Having seeing the incompatible issue, I went ahead with and downloaded Airtel dongle connection manager  software, but that didn't even recognized my 4G dongle. Tried the software from Huawei and I ended up with the same issue, it does not identify my dongle. After going through numerous Apple discussion forums; I found a solution finally.

If your Huawei dongle not working on Mac OSX Yosemite, Here is a workaround until your service provider releases an updated dialer.


Please follow below steps to get your Huawai 4G or 3G dongle to work with OS X Yosemite:

Step 1:

Click on this link to download the new compitable driver from Huawei website 

Step 2:  Open the archive, you will find two files


1. Mobile Partner install user guide.docx
2. Mobile Partner.zip

Open the zip file Mobile Partner.zip, you will find Mobile Partner.app. Double click on this file to install the app in your new OS X Yosemite.

Step 3:  Once installation finish, start the app and go to Tools -> Options to create an profile manually.

In the Options window, select “Profile Management” from the left side menu

Click on “New” button to create a new profile. Give it a name, such as “airtel 4g”. Also, make sure the “Access Number” is set to *99#. Click “Save”, then “Ok”

Step 4:  Insert your Dongel into an USB port. You should see “Mobile Partner” application starting automatically. Choose the profile you created (airtel 4g) and “Connect”.


That's it!!



how to setup a free proxy server for small offices ?

What is a firewall?

Firewall is a device, which is placed between something dangerous, and something to be protected. A typical firewall configuration starting from the left the physical connection to the outside world attached to a border router, which may be under the local area network administrator or another organization. A LAN network such as an Ethernet is attached to the border router. This network is known as de-militarized zone (DMZ). It provides an attachment point for the bastion hosts which provide external connection points for services such as email, web, etc 

Why System administrator  Use Proxy Server?


  • Using Proxy server  sys admin can control and restrict users' access to websites based on their content.
  • You can allow/block a user from visiting all websites except a list of those you add as an exception; or you can block all websites in a specific category.
  • Proxy server  plays a key role in enabling organizations to limit web activity at the workplace.
  •  Normally a firewall is installed where your internal network connects to the Internet. Although larger organizations may also place firewalls between different parts of their own network that require different levels of security, most firewalls screen traffic passing between an internal network and the Internet. This internal network may be a single computer or it may contain thousands of computers.
    The following list includes the most common features of firewalls:
  • Block incoming network traffic based on source or destination: Blocking unwanted incoming traffic is the most common feature of a firewall.

  • Block outgoing network traffic based on source or destination: Many firewalls can also screen network traffic from your internal network to the Internet. For example, you may want to prevent employees from accessing inappropriate Web sites.

  • Block network traffic based on content: More advanced firewalls can screen network traffic for unacceptable content. For example, a firewall that is integrated with a virus scanner can prevent files that contain viruses from entering your network. Other firewalls integrate with e-mail services to screen out unacceptable e-mail.

  • Make internal resources available: Although the primary purpose of a firewall is to prevent unwanted network traffic from passing through it, you can also configure many firewalls to allow selective access to internal resources, such as a public Web server, while still preventing other access from the Internet to your internal network.

  • Allow connections to internal network: A common method for employees to connect to a network is using virtual private networks. VPNs allow secure connections from the Internet to a corporate network. For example, telecommuters and traveling salespeople can use a VPN to connect to the corporate network. VPNs are also used to connect branch offices to each other. Some firewalls include VPN functionality and make it easy to establish such connections.

  • Report on network traffic and firewall activities: When screening network traffic to and from the Internet, it's also important to know what your firewall is doing, who tried to break into your network, and who tried to access inappropriate material on the Internet. Most firewalls include a reporting mechanism of some kind or another.



Use  Squid Proxy Server  in debian operating system to Build Your Own Proxy server

for installation instruction see me next post>>>>>>>>>>>>>> 

Step by Step instruction of Email Address configuraton in Apple Mac OS


1. Open your Apple Mail client
2. Fill in the ‘Welcome to Mail’ window with the following information:
· Full Name: [your name]
· Email Address: your full email address [eg: username@your-domain.com]
· Password: your Email password
· Important: Hold the option button down until ‘Create’ turns into ‘Continue’

















Click Continue
3. Fill in the following Incoming Mail Server information:
· Account Type: POP
Incoming Mail Server:
pop.your-domain.com (For Free Email Service / Email Hosting Plans)                                    
· User Name: your full email address [username@your-domain.com]
· Password: your Email password
· Important: Hold the option button down until ‘Create’ turns into ‘Continue’

















Click Continue

4. Incoming Mail Security
· Use Secure Sockets Layer (SSL): Do not select
· Authentication: Password
· Important: Hold the option button down until ‘Create’ turns into ‘Continue’
















Click Continue

5. Enter the following Outgoing Mail Server information:
· You can leave description blank - this field is optional Outgoing Mail Server:
smtp.your-domain.com (For Free Email Service / Email Hosting Plans)
· Use Authentication: Do not select
· User Name: your full Email address [username@your-domain.com]
· Password: your Email password
  Important: Hold the option button down until ‘Create’ turns into ‘Continue’

















· Click Continue.
· Outgoing Mail Security
· Use Secure Sockets Layer (SSL): Do not select
· Authentication: Password
· Important: Hold the option button down until ‘Create’ turns into ‘Continue’

















Click Continue

· Review your Account Summary and uncheck Take account online as you will need to adjust your incoming port number
· Click Create


















Once your client opens, you’ll need to change your incoming port number to 110. To edit your incoming port number,
please click Mail> Preferences... > Accounts tab > Advanced

· Important:
     ***For POP configuration,
      Incoming (POP) Server Port Number: 110
      Outgoing (SMTP) Server Port Number: 587





















 After you’ve updated your port number, you can take your accounts online and download new messages by clicking
     Mailbox > Get All New Mail

If you have already configured  for POP and are trying to add an additional email, please start by following these steps:
1. Click Mail > Preferences....
2. On the Accounts tab, click the + button to add a new account.

You will then need to repeat the steps above.

Free Word and Excel Password Recovery Wizard

How to Installing Ubuntu on windows 8 ; Guide tutorial



In this post I will show the step by step procedure  to install Ubuntu  as a dual boot OS on Windows 8 system.

  • The first step to install Ubuntu (Linux) was to creat a partition on my existing hard drive.
  • Making Space using "Shrink Disc" feature in windows 8.
    • Right-Click on "My computer" in the main menu and select "Manage" 
    • It will ask for administrator permission, click "yes".
    • Click on Disc Management.On right side of the menu.
    • There is will show the available partitions and external storage devices if any
    • Right Click on the disc partition you want to shrink and select "shrink volume" (/here i suggest you to select D or E drive to shrink).
    •  Windows 8 will assess how much space can be made free
    • It will suggest the value which can be made free. Be sure that this is at least 10-15 GB. If you dont have this space, you will have to delete some data to make space for the partition.
    • Then select "shrink"
    • Vista will shrink the volume and show the new freed space as "unallocated" space.
    • After this close the window. You are done with shrinking .
     
  • The next step is to install Ubuntu.
    • You will need to download the latest ISO for Ubuntu  from here:
    • http://www.ubuntu.com/download/desktop 
    • You will need to burn this ISO image on to a CD.
    • For burning this ISO you will have to use an ISO burning software. One such free software is: Free ISO burner: http://www.freeisoburner.com/ 
    • Be sure to burn the ISO image at a very slow speed. This extra time spent will help you install Linux trouble-free.
    • When the disc is ready, restart the computer. Be sure that in BIOS setup the CD drive is above the hard disc in boot priority.
    • Once restarted the disc will boot before the hard disc.
    • In the menu that is displayed, select "run installer" and follow the instructions.
    • Once you have selected language, Location and Keyboard configuration....the disk partitioner of ubuntu will run and show you various options as to where Ubuntu should be installed.
    • Select "Largest continuous free space" as this will select the "unallocated space" that we have created in the earlier step by shrink tool.
    • After this follow the next instructions to complete the installation.
    • Complete the installation. It will prompt to restart the computer. Do so.
    •  After restart, the menu will show Ubuntu and Windows 8 a dual boot OS and now you are free to choose the OS you want to load.

     

Cygwin complete Commands on Windows

Cygwin on Windows

Commands in Course Order:

Command
Usage
Comment
pwd
pwd
Print your current directory (folder) location
ls
ls
List the files in the current folder
mkdir
mkdir  Blast
Make a new folder.  Example Blast
cd
cd  /Blast
Change to another folder like Blast
cd
cd  c:/
Change to C drive
cd
cd   /
Change to the root directory.  Cygwin files are here
man
man  pwd
Show the manual pages for all command
cat  >
cat  >  file1
Create file1 and write data to it
cat  >>
cat  >>  file1
Add new lines to the bottom of file1
cat
cat  file1
Show/display contents of file1 to the screen
cat
cat  file1  file2
Show/display contents of file1 and file2 to the screen
sort
sort  file1
Sort the contents of file1
sort
sort  file1  file2
Sort the contents of file1 and file2 together
alias
alias  dog = “cat”
Assign the work dog to the cat command
alias
alias  path = “/BioDownload/bin/”
Type path instead of /BioDownload/bin/
|
cat  file1  file2  |  sort
Called Pipe.  Places output of cat into sort
head
head  TA496Seq1
View the first few lines of a file, especially a large file
tail
tail  TA496Seq1
View the first few lines of a file, especially a large file
less
less   TA496Seq1
View a large file and control the output
cp
cp  file1  file2_copy
Make a copy of file1 and call it file2_copy
cp
cp  file1  /Bioinfo
Make a copy of file1 and place it in the folder Bioinfo
cp
cp  file1  /Bioinfo/cp_test
Copy file1 into the folder Bioinfo and call it cp_test
mv
mv  file1  /Bioinfo
Move file1 into the folder Bioinfo
rm
rm  file1
Permanently delete file1
rm
rm  /Bioinfo/file2
Delete file2 which is located in the Bioinfo folder
rmdir
rmdir  /Bioinfo
Remove the folder called Bioinfo
grep
grep  “ATG”  file1 
Search for ATG in file1
grep
grep  “ATG”  file1  file2
Search for ATG in file1 and file2
grep
grep  -i  “ATG”  file1
Search for ATG in file1 regardless of case:  Atg, atg, ATg, and so on
grep
grep  -ic  “ATG”  file1
Search but return only a count of occurrences of all ATG
grep
An excellent reference
www.cyberciti.biz/faq/howto-use-grep-command-in-linux-unix/

Commands in Alphabetical Order
Command
Usage
Comment
|
cat  file1  file2  |  sort
Called Pipe.  Places output of cat into sort
alias
alias  dog = “cat”
Assign the work dog to the cat command
alias
1alias  pathx = “/BioDownload/bin/”
Type pathx instead of /BioDownload/bin/
cat
cat  file1
Show/display contents of file1 to the screen
cat
cat  file1  file2
Show/display contents of file1 and file2 to the screen
cat  >
cat  >  file1
Create file1 and write data to it
cat  >>
cat  >>  file1
Add new lines to the bottom of file1
cd
cd  /Blast
Change to another folder like Blast
cd
cd  c:/
Change to C drive
cd
cd   /
Change to the root directory.  Cygwin files are here
cp
cp  file1  file2_copy
Make a copy of file1 and call it file2_copy
cp
cp  file1  /Bioinfo
Make a copy of file1 and place it in the folder Bioinfo
cp
cp  file1  /Bioinfo/cp_test
Copy file1 into the folder Bioinfo and call it cp_test
grep
grep  “ATG”  file1 
Search for ATG in file1
grep
grep  “ATG”  file1  file2
Search for ATG in file1 and file2
grep
grep  -i  “ATG”  file1
Search for ATG in file1 regardless of case:  Atg, atg, ATg, and so on
grep
grep  -ic  “ATG”  file1
Search but return only a count of occurrences of all ATG
grep
An excellent reference
www.cyberciti.biz/faq/howto-use-grep-command-in-linux-unix/
head
head  TA496Seq1
View the first few lines of a file, especially a large file
less
less   TA496Seq1
View a large file and control the output
ls
ls
List the files in the current folder
man
man  pwd
Show the manual pages for all command
mkdir
mkdir  Blast
Make a new folder.  Example Blast
mv
mv  file1  /Bioinfo
Move file1 into the folder Bioinfo
pwd
pwd
Print your current directory (folder) location
rm
rm  file1
Permanently delete file1
rm
rm  /Bioinfo/file2
Delete file2 which is located in the Bioinfo folder
rmdir
rmdir  /Bioinfo
Remove the folder called Bioinfo
sort
sort  file1
Sort the contents of file1
sort
sort  file1  file2
Sort the contents of file1 and file2 together
tail
tail  TA496Seq1
View the first few lines of a file, especially a large file


1Note:  there are certain words that are reserved as “commands”.  For example we could not use “path” as an alias, but we could use “pathx”.