Assumptions

You need the correct authorization to use the commands. The examples assume that the file system is set up in a certain way.