Configuring Bash

A quick introduction to the Bash shell.

The $MAIL variable specifies which mailbox you want Bash to poll for new mail. You generally want to set this to your inbox. I use procmail, so I have many mail folders. My inbox (where mail that's actually addressed to me gets sent) is /home/blackmad/Mail/inbox, so when I get new e-mail there, Bash tells me: “You have mail in /home/blackmad/Mail/inbox.”


The PATH variable determines where, and in what order, Bash will look for executables. Each directory is separated by a colon (:). Bash interprets your path from right to left. Let's say your PATH is set to /usr/bin:/bin/:/sbin/:/sbin/. When you enter a command, Bash will look for it in its internal shell functions first, then /usr/bin, then /bin and so on, until it either finds the command or gets to the end of your PATH. Often you may simply want to append or prefix your current PATH; you can do this by specifying



export PATH
In the first example, Bash will look through /next/path and /next_next/path after it finishes with your current PATH. In the second example, Bash will first look in /prev/path. You may want to prefix your PATH with /usr/local/bin, since that is where hand-compiled programs are usually located, and these are generally more recent then those that came with your distribution. You may also want to prefix ~/bin and have a bin directory in your home directory where you can put customized versions of programs and scripts (useful if you don't have root on the box).

The Last Step

Since Bash just runs through your .bashrc file and executes everything in it, you can toss in programs you want to run each time you log in. At the end of my .bashrc file, I have the following:

mesg y

So whenever I log in, fortune greets me with a bit of wisdom, messages are turned on, and I find out who's logged in to the systems.

David Blackman is a sophomore and a system administrator at Stuyvesant High School. He hopes to write the killer application for Linux soon and get hired by VA Linux Systems. He loves Perl, even though he knows it's evil, and enjoys the pointer arithmetic of C.


One Click, Universal Protection: Implementing Centralized Security Policies on Linux Systems

As Linux continues to play an ever increasing role in corporate data centers and institutions, ensuring the integrity and protection of these systems must be a priority. With 60% of the world's websites and an increasing share of organization's mission-critical workloads running on Linux, failing to stop malware and other advanced threats on Linux can increasingly impact an organization's reputation and bottom line.

Learn More

Sponsored by Bit9

Linux Backup and Recovery Webinar

Most companies incorporate backup procedures for critical data, which can be restored quickly if a loss occurs. However, fewer companies are prepared for catastrophic system failures, in which they lose all data, the entire operating system, applications, settings, patches and more, reducing their system(s) to “bare metal.” After all, before data can be restored to a system, there must be a system to restore it to.

In this one hour webinar, learn how to enhance your existing backup strategies for better disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible bare-metal recovery solution for UNIX and Linux systems.

Learn More

Sponsored by Storix