Skip to main content

Linux File Structure

As you use Linux distributions you will notice folders on the root directory. As you read below it will explain what these folders do. The following list provides more detailed information and gives some examples which files and sub directories can be found in the directories:

File Structure

/bin
Contains the basic shell commands that may be used both by root and by other users. These commands include ls, mkdir, cp, mv, rm, and rmdir. /bin also contains Bash, the default shell, and other shells such as csh, tsh, TC.


/boot
Contains data required for booting, such as the boot loader, the kernel, and other data that is used before the kernel begins executing user mode programs.


/dev
This holds device files that represent hardware components.


/etc
this is where the local configuration files that control the operation of programs like the X Window System. The /etc/init.d subdirectory contains scripts that are executed during the boot process.


/home/username
this holds the private data of every user who has an account on the system. The files located here can only be modified by their owner or by the system administrator.


/lib
this is the necessary shared libraries needed to boot the system and to run the commands in the root file system.


/media
Contains mount points for removable media, such as CD-ROMs, USB sticks, and digital cameras (if they use USB). /media generally holds any type of drive except the hard drive of your system. As soon as your removable medium has been inserted or connected to the system and has been mounted, you can access it from here.


/mnt
this directory provides a mount point for a temporarily mounted file system. Root may mount file systems here.
Note: the /mnt and /media do the following item it depends how the Linux Distribution is created


/opt
Reserved for the installation of additional software. Optional software and larger add-on program packages can be found there.
/root
Home directory for the root user. Personal data of root is located here.


/sbin
As the s indicates, this directory holds utilities for the superuser. /sbin contains binaries essential for booting, restoring, and recovering the system in addition to the binaries in /bin.


/srv
Holds data for services provided by the system, such as FTP and HTTP.


/tmp
This directory is used by programs that require temporary storage of files.


/usr
/usr has nothing to do with users, but is the acronym for UNIX system resources. The data in /usr is static, read-only data that can be shared among various hosts compliant to the Filesystem Hierarchy Standard (FHS). This directory contains all application programs and establishes a secondary hierarchy in the file system. KDE4 and GNOME are also located here. /usr holds a number of subdirectories, such as /usr/bin, /usr/sbin, /usr/local, and /usr/share/doc.


/usr/bin
contains generally accessible programs.


/usr/sbin
Contains programs reserved for the system administrator, such as repair functions.


/usr/local
In this directory, the system administrator can install local, distribution-independent extensions.


/usr/share/doc
Holds various documentation files and the release notes for your system. In the manual subdirectory, find an online version of this manual. If more than one language is installed, this directory may contain versions of the manuals for different languages.
Under packages, find the documentation included in the software packages installed on your system. For every package, a subdirectory /usr/share/doc/packages/packagename is created that often holds README files for the package and sometimes examples, configuration files, or additional scripts.


/var
This holds static, read-only data, /var is for data which is written during system operation and thus is variable data, such as log files or spooling data. For example, the log files of your system are in /var/log/messages (only accessible for root).


File Name: Linux File Stucture.pdf
File Size: 457KB
Date Created: 04/14/2010
Download Now

Comments

Popular posts from this blog

Netwars Competition

The NetWars game is a collection of computer and network security challenges. It is designed to represent real-world security issues: their flaws and their resolutions. Each player can follow an independent path based on individual problem solving skills, technical skills, aptitude, and creativity. The game is played in a fun but safe environment using the technology that drives our lives every day. The game starts when a player downloads and starts a CD-ROM image on a PC or in a virtual environment such as VMware Player. The image contains a brief tutorial and the game's full instructions. The player must find a hidden key within the image that is downloaded and then uses that key to enter an online environment where knowledge of security vulnerabilities and their exploits can be turned into points. Upcoming Competitions   June 18-20, 2010 PST September 17-19, 2010 November 5-7, 2010 December 17-19, 2010 April 29 - May 1, 2011 Click Here to read more

Learning Linux

Learning linux from the ground up is really a challenge. As you progress even more you start customizing your OS from how it starts and how it shutdown. As soon as you start on a Live CD your x server is pretty much either gnome or KDE. I mean it looks easy to do, but as soon as you start research how the x server it can get trick. My recommendation is to also learn the bash line or command prompt. if your good with the line commands then reconfiguring your computer shouldn't be a problem, but you just learn the GUI layer of it and not the line commands believe me your going to have hard time restoring your computer. As I ask people around they say linux is hard to install. The easiest way to partition your drive manually is like this. sda1 /home -- This is where you want to store all your data in case your linux gets corrupted. This space can be as big as you want sda2 /swap -- Linux is just like windows it needs it virtual space. The swap size depends on your phys...

WPA Encryption

Yes it can be crack the only issue is that you really need a huge dictionary list the more the better. what does this mean it just means that you just have to think of a long pass-phrase for your password. Back in mid 2005 you just needed a good CPU to process large amount of data, but now on curtain NVidia cards it can speed up decryption 8 characters - This is consider weak password to industry standards. 20 characters - This is the minimum for industry standards. 63 characters - This is the maximum and consider tough to crack. You may start thinking that any wireless connection is unsafe well its like a catch-22. There are tools out there that can alert you when a hacker is attempting to get in your network. I know most large corporations do have these tools they can either software or hardware. Remember, doing this illegal without the person or corporations permission, but its legal to try it at your own home router. Want to see the process of cr...