{"id":263,"date":"2018-05-21T09:47:23","date_gmt":"2018-05-21T09:47:23","guid":{"rendered":"https:\/\/secureethics.com\/?p=263"},"modified":"2018-08-04T07:13:45","modified_gmt":"2018-08-04T07:13:45","slug":"linux-directory-structure-and-details","status":"publish","type":"post","link":"https:\/\/secureethics.com\/?p=263","title":{"rendered":"Linux directory structure and details"},"content":{"rendered":"<p>Linux common directory structure of Centos\/Ubuntu<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-264\" src=\"https:\/\/secureethics.com\/wp-content\/uploads\/2018\/05\/Linux-Directory-Structure.png\" alt=\"\" width=\"1070\" height=\"252\" srcset=\"https:\/\/secureethics.com\/wp-content\/uploads\/2018\/05\/Linux-Directory-Structure.png 1070w, https:\/\/secureethics.com\/wp-content\/uploads\/2018\/05\/Linux-Directory-Structure-300x71.png 300w, https:\/\/secureethics.com\/wp-content\/uploads\/2018\/05\/Linux-Directory-Structure-768x181.png 768w, https:\/\/secureethics.com\/wp-content\/uploads\/2018\/05\/Linux-Directory-Structure-1024x241.png 1024w, https:\/\/secureethics.com\/wp-content\/uploads\/2018\/05\/Linux-Directory-Structure-520x122.png 520w\" sizes=\"auto, (max-width: 1070px) 100vw, 1070px\" \/><\/p>\n<p>Use of directory&#8217;s<\/p>\n<ul>\n<li><strong>\/bin\u00a0 \u00a0 \u00a0<\/strong><\/li>\n<\/ul>\n<p style=\"padding-left: 60px;\">1. contains user(Essential) command binaries (executable file)<\/p>\n<p style=\"padding-left: 60px;\">2. Examples: \/bin\/top,\/bin\/mv,\/bin\/cut,\/bin\/cp,\/bin\/rename,\/bin\/mkdir,etc&#8230;<\/p>\n<ul>\n<li><strong>\/boot<\/strong><\/li>\n<\/ul>\n<p style=\"padding-left: 60px;\">1. contains\u00a0 boot related file<\/p>\n<p style=\"padding-left: 60px;\">2. Examples: grup, boot loader,kernel<\/p>\n<ul>\n<li><strong>\/dev\u00a0 \u00a0<\/strong><\/li>\n<\/ul>\n<p style=\"padding-left: 60px;\">1. contains internal attached device\u00a0 details<\/p>\n<p style=\"padding-left: 60px;\">2. Examples: \/dev\/sda,\/dev\/sdb,\/dev\/sdc,\/dev\/cdrom<\/p>\n<ul>\n<li><strong>\/etc\u00a0<\/strong><\/li>\n<\/ul>\n<p style=\"padding-left: 60px;\">1. contains configuration related files<\/p>\n<p style=\"padding-left: 60px;\">2. Examples: httpd.conf,hosts,reslov.conf,smb.conf,etc&#8230;.<\/p>\n<ul>\n<li><strong>\/home<\/strong><\/li>\n<\/ul>\n<p style=\"padding-left: 60px;\">1. contains all users home directories<\/p>\n<p style=\"padding-left: 60px;\">2. Examples: \/home\/secureethics,\/home\/bala<\/p>\n<ul>\n<li><strong>\/lib<\/strong><\/li>\n<\/ul>\n<p style=\"padding-left: 60px;\">1. contains 32 bit Libraries for the binaries<\/p>\n<ul>\n<li><strong>\/lib64\u00a0<\/strong><\/li>\n<\/ul>\n<p style=\"padding-left: 60px;\">1. contains 64 bit\u00a0Libraries for the binaries<\/p>\n<ul>\n<li><strong>\/media<\/strong><\/li>\n<\/ul>\n<p style=\"padding-left: 60px;\">1. Used for mount point of removable media<\/p>\n<p style=\"padding-left: 60px;\">2. Examples: CD-ROM, Pendrive<\/p>\n<ul>\n<li><strong>\/mnt\u00a0<\/strong><\/li>\n<\/ul>\n<p style=\"padding-left: 60px;\">1. Used for temporary mounting point<\/p>\n<p style=\"padding-left: 60px;\">2. Example: NFS,SMB,etc<\/p>\n<ul>\n<li><strong>\/opt<\/strong><\/li>\n<\/ul>\n<p style=\"padding-left: 60px;\">1. Used for third party application installations<\/p>\n<ul>\n<li><strong>\/proc<\/strong> &#8211;<\/li>\n<\/ul>\n<p style=\"padding-left: 60px;\">1. contains\u00a0 running process information<\/p>\n<p style=\"padding-left: 60px;\">2. Examples: \/proc\/meminfo,\/proc\/mdstat,\/proc\/cpuinfo,etc&#8230;<\/p>\n<ul>\n<li><strong>\/root<\/strong> &#8211;<\/li>\n<\/ul>\n<p style=\"padding-left: 60px;\">1. root user(super user) home directory<\/p>\n<p>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a02. Examples: \/root\/<\/p>\n<ul>\n<li><strong>\/run<\/strong><\/li>\n<\/ul>\n<p style=\"padding-left: 60px;\">1. used for stored the run time\u00a0 application\/service files(It will store file temporary )<\/p>\n<ul>\n<li><strong>\/sbin<\/strong><\/li>\n<\/ul>\n<p style=\"padding-left: 60px;\">1. contains system command binaries (executable file)<\/p>\n<p style=\"padding-left: 60px;\">2. Examples: \/sbin\/service,\/sbin\/sshd,\/sbin\/smbd.<\/p>\n<ul>\n<li><strong>\/srv<\/strong><\/li>\n<\/ul>\n<p style=\"padding-left: 60px;\">1. Contains server specific services related data.<\/p>\n<p>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a02. Example: \/srv\/cvs<\/p>\n<ul>\n<li><strong>\/sys<\/strong><\/li>\n<\/ul>\n<p style=\"padding-left: 60px;\">1.contains device drivers,firmware<\/p>\n<p>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a02. Examples: \/sys\/drivers,\/sys\/firmware,\/sys\/bus<\/p>\n<ul>\n<li><strong>\/var\u00a0<\/strong><\/li>\n<\/ul>\n<p style=\"padding-left: 60px;\">1. var stands for variable files.<\/p>\n<p style=\"padding-left: 60px;\">2. Content of the files that are expected to grow can be found under this directory.<\/p>\n<p style=\"padding-left: 60px;\">3. This includes \u2014 system log files (\/var\/log); packages and database files (\/var\/lib); emails (\/var\/mail); print queues (\/var\/spool); lock files (\/var\/lock); temp files needed across reboots (\/var\/tmp);<\/p>\n<ul>\n<li><strong>\/tmp\u00a0<\/strong><\/li>\n<\/ul>\n<p style=\"padding-left: 60px;\">1. Directory that contains temporary files created by system and users.<\/p>\n<p style=\"padding-left: 60px;\">2. Files under this directory are deleted when system is rebooted.<\/p>\n<ul>\n<li>\u00a0<strong>\/usr<\/strong><\/li>\n<\/ul>\n<p style=\"padding-left: 60px;\">1. Contains binaries, libraries, documentation, and source-code for second level programs.<\/p>\n<p style=\"padding-left: 60px;\">2. \/usr\/bin contains binary files for user programs. If you can\u2019t find a user binary under \/bin, look under \/usr\/bin. For example: at, awk, cc, less, scp<\/p>\n<p style=\"padding-left: 60px;\">3. \/usr\/sbin contains binary files for system administrators. If you can\u2019t find a system binary under \/sbin, look under \/usr\/sbin. For example: atd, cron, 3. sshd, useradd, userdel<\/p>\n<p style=\"padding-left: 60px;\">4. \/usr\/lib contains libraries for \/usr\/bin and \/usr\/sbin<\/p>\n<p style=\"padding-left: 60px;\">5. \/usr\/local contains users programs that you install from source. For example, when you install apache from source, it goes under \/usr\/local\/apache2<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Linux common directory structure of Centos\/Ubuntu Use of directory&#8217;s \/bin\u00a0 \u00a0 \u00a0 1. contains user(Essential) command binaries (executable file) 2. Examples: \/bin\/top,\/bin\/mv,\/bin\/cut,\/bin\/cp,\/bin\/rename,\/bin\/mkdir,etc&#8230; \/boot 1. contains\u00a0 boot related file 2. Examples: grup, boot loader,kernel \/dev\u00a0 \u00a0 1. contains internal attached device\u00a0&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":264,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10,4,9],"tags":[],"class_list":["post-263","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-centos","category-linux","category-ubuntu"],"_links":{"self":[{"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/posts\/263","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/secureethics.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=263"}],"version-history":[{"count":0,"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/posts\/263\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/media\/264"}],"wp:attachment":[{"href":"https:\/\/secureethics.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=263"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secureethics.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=263"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secureethics.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}