CS 200. User IDs, Passwords, Permissions & Groups. User IDs, Passwords, Permissions & Groups. CS 200 Spring 2017

Size: px
Start display at page:

Download "CS 200. User IDs, Passwords, Permissions & Groups. User IDs, Passwords, Permissions & Groups. CS 200 Spring 2017"

Transcription

1 CS 200 User IDs, Passwords, Permissions & Groups 1

2 Needed to control access to sharepoints and their contents Because Macs & PCs now support multiple accounts, user IDs and passwords are also needed on your client machine by default, you and only you, have access to the folders & files you create for the most part you don t notice them because it s automatic ie. happens by default, although you can give others access A group is a named collection of user IDs User IDs & Passwords on unix machines (eg. Macs), access to a file or folder can be given to the members of a group in addition to the owner 2

3 Permissions as seen by OS X s Finder Permissions for files Read & Write Read Only No Access Permissions for folders Read & Write (full access) Read Only (list contents) Write Only (Drop Box) No Access Permissions are granted separately to the owner (identified by a userid) a group others ie everyone else, aka public permissions if you are not the owner & your userid is in the group, you get group access otherwise you have whatever access the file or folder s public permissions provide Only the owner can change a file or folder s permissions 3

4 Changing Permissions in a Unix Terminal Open a Terminal/Unix shell Applications: Utilities: Terminal Log into your student.cs.account ssh bmdaly@linux.student.cs.uwaterloo.ca Change to your public_html directory (web root folder) cd public_html Look at the permissions of the files within that folder CS 200 Spring Userids, Passwords, Permissions & Groups

5 What do the permissions mean? User (u) first three or four letters Group (g) next set of three letters Other (o) last set of three letters r Read Only w Write Only x Executable d Directory 5

6 Final steps to change permissions on a folder Change the group and everyone permissions to be readable chmod go+rx cs200.html This will change the permissions on the file cs200.html to be: readable and executable to the group and everyone chmod -R go+rx publc_html This will change the permissions of all files within the public_html folder to be: readable and executable to the group and everyone it applies to all the files within public_html because -R means recursive chmod g+rwx cs200.html This will change the permissions on the file cs200.html to be: readable, writable, executable to the group chmod g-w cs200.html This changes the permissions of the file cs200.html: It removes the writable permissions for the group CS 200 Fall Userids, Passwords, Permissions & Groups

7 Using your own machine (1) You can change permissions on files on your own machine by accessing a unix shell such as Terminal To change permissions on files on your student.cs network drive from your own machine: use a unix shell such as Terminal login to your student.cs account by typing ssh userid@linux.student.cs.uwaterloo.ca, where userid is your Quest/student.cs username, then press Enter type your student.cs password and press Enter you can now change permissions on the files in your student.cs network drive as you would from a campus machine 7

8 Using your own machine (2) If you want to access and use the files from your student.cs network drive on your own machine: Connect to the server smb://smb-files.student.cs.uwaterloo.ca On a mac, go to Finder > Go > Connect to Server Enter your Quest/student.cs username and your student.cs password You can then select your username to mount your network drive If you want to access and use these files on your own machine and you are off campus: Follow the instructions here: to set up a VPN client and access the university s VPN You can then follow the above instructions 8

:

: CS200 Assignment 5 HTML and CSS Due Monday February 11th 2019, 11:59 pm Readings and Resources On the web: http://validator.w3.org/ : a site that will check a web page for faulty HTML tags http://jigsaw.w3.org/css-validator/

More information

CS CS Tutorial 2 2 Winter 2018

CS CS Tutorial 2 2 Winter 2018 CS CS 230 - Tutorial 2 2 Winter 2018 Sections 1. Unix Basics and connecting to CS environment 2. MIPS Introduction & CS230 Interface 3. Connecting Remotely If you haven t set up a CS environment password,

More information

CS 1301 Fall 2008 Lab 2 Introduction to UNIX

CS 1301 Fall 2008 Lab 2 Introduction to UNIX CS 1301 Fall 2008 Lab 2 Introduction to UNIX Due: Friday, September 19 th, at 6 PM (Monday, September 22 nd for 10% off) Notes: Do not wait until the last minute to do this assignment in case you run into

More information

CS 1301 Lab 2 Introduction to Webservers at GaTech

CS 1301 Lab 2 Introduction to Webservers at GaTech CS 1301 Lab 2 Introduction to Webservers at GaTech Due Friday February 19th, 2016, Before 11:55pm Notes: Do not wait until the last minute to do this assignment in case you run into problems. If you find

More information

Introduction to the Linux Command Line

Introduction to the Linux Command Line Introduction to the Linux Command Line May, 2015 How to Connect (securely) ssh sftp scp Basic Unix or Linux Commands Files & directories Environment variables Not necessarily in this order.? Getting Connected

More information

Unix Groups and Users

Unix Groups and Users CHMOD TUTORIAL AND XOOPS FILE SECURITIES The Xoops Site Security Guide has dealt with securities issues almost exclusively about possible intrusions or threats from outside of your Xoops site or server.

More information

Where to save your work

Where to save your work Where to save your work on the Kent network Contents Your network folders...2 Where to find your folders...2 Access your files from your laptop...3 Access your files from off campus...4 Help and support...5

More information

File Transfer with SSH

File Transfer with SSH File Transfer with SSH To complete the lab experiment reports, the student is first required to upload the report templates from the course website to his OIT UNIX account home area. From there he has

More information

FIT 100: Fluency with Information Technology

FIT 100: Fluency with Information Technology FIT 100: Fluency with Information Technology Lab 2: Creating Directories and Navigating Directory Structures (or, Where am I, where are my files, and how do I put my files somewhere else?) Local vs. Remote

More information

Principles of Bioinformatics. BIO540/STA569/CSI660 Fall 2010

Principles of Bioinformatics. BIO540/STA569/CSI660 Fall 2010 Principles of Bioinformatics BIO540/STA569/CSI660 Fall 2010 Lecture Five Practical Computing Skills Emphasis This time it s concrete, not abstract. Fall 2010 BIO540/STA569/CSI660 3 Administrivia Monday

More information

Users, Groups and Permission in Linux

Users, Groups and Permission in Linux Users, Groups and Permission in Linux A small company is using Linux as the main operating and has hired you as a consultant. You completed a site walk through and also met with various individuals for

More information

Contents. CMSP File Sharing User s Guide

Contents. CMSP File Sharing User s Guide 2 Contents Overview... 3 x.500 id access... 4 Internal Accounts... 4 Virtual Private Network (VPN)... 5 Accessing Your Data on UMN network... 5 Windows Platforms... 5 OS X Platforms...14 3 Overview As

More information

CS Fundamentals of Programming II Fall Very Basic UNIX

CS Fundamentals of Programming II Fall Very Basic UNIX CS 215 - Fundamentals of Programming II Fall 2012 - Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the CS (Project) Lab (KC-265)

More information

Common UNIX Commands. Unix. User Interfaces. Unix Commands Winter COMP 1270 Computer Usage II 9-1. Using UNIX. Unix has a command line interface

Common UNIX Commands. Unix. User Interfaces. Unix Commands Winter COMP 1270 Computer Usage II 9-1. Using UNIX. Unix has a command line interface Common UNIX Commands Using UNIX Unix Unix has a command line interface Unix commands must be typed Similar to the DOS operating system for PC s Compare to the Graphical User Interface (GUI) used by Windows,

More information

CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX

CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the EECS labs that dual boot

More information

Session 1: Accessing MUGrid and Command Line Basics

Session 1: Accessing MUGrid and Command Line Basics Session 1: Accessing MUGrid and Command Line Basics Craig A. Struble, Ph.D. July 14, 2010 1 Introduction The Marquette University Grid (MUGrid) is a collection of dedicated and opportunistic resources

More information

Lab 5: Dreamweaver CS5, Uploading your Web site

Lab 5: Dreamweaver CS5, Uploading your Web site Lab 5: Dreamweaver CS5, Uploading your Web site Setting up Local and Remote Information: 1. Launch Dreamweaver 2. Choose site->new site 3. By Site Name give your site a name. Make sure the name has no

More information

Oregon State University School of Electrical Engineering and Computer Science. CS 261 Recitation 1. Spring 2011

Oregon State University School of Electrical Engineering and Computer Science. CS 261 Recitation 1. Spring 2011 Oregon State University School of Electrical Engineering and Computer Science CS 261 Recitation 1 Spring 2011 Outline Using Secure Shell Clients GCC Some Examples Intro to C * * Windows File transfer client:

More information

commandname flags arguments

commandname flags arguments Unix Review, additional Unix commands CS101, Mock Introduction This handout/lecture reviews some basic UNIX commands that you should know how to use. A more detailed description of this and other commands

More information

Using WestGrid from the desktop Oct on Access Grid

Using WestGrid from the desktop Oct on Access Grid Using WestGrid from the desktop Oct 11 2007 on Access Grid Introduction Simon Sharpe, UCIT Client Services The best way to contact WestGrid support is to email support@westgrid.ca This seminar gives you

More information

Clearspan Communicator Desktop R20.2.2

Clearspan Communicator Desktop R20.2.2 Clearspan Communicator Desktop R20.2.2 UPGRADE INSTRUCTIONS APRIL 2015 Table of Contents Overview... 3 Upgrading (Windows 7 or above, Mac OS 10.6 or above)... 3 Recording Your Settings (Windows and Mac

More information

CENG 334 Computer Networks. Laboratory I Linux Tutorial

CENG 334 Computer Networks. Laboratory I Linux Tutorial CENG 334 Computer Networks Laboratory I Linux Tutorial Contents 1. Logging In and Starting Session 2. Using Commands 1. Basic Commands 2. Working With Files and Directories 3. Permission Bits 3. Introduction

More information

From using an External Harddrive, to a Google Cloud Drive; there is no one way to backup data.

From using an External Harddrive, to a Google Cloud Drive; there is no one way to backup data. Mac (OS X): Data Backup Guide 6/14/2016 Why: Backing up data should be done on a regular basis, not just when you think it is necessary, as a failure can happen at any time. While there are no set intervals

More information

Basic Unix. Set-up. Finding Terminal on the imac. Method 1. Biochemistry laboratories Jean-Yves Sgro

Basic Unix. Set-up. Finding Terminal on the imac. Method 1. Biochemistry laboratories Jean-Yves Sgro Basic Unix Biochemistry laboratories - 201 Jean-Yves Sgro -jsgro@wisc.edu Find this document here (short URL) today: http://go.wisc.edu/4iu8u5 *Note*: To see as slides click on **"Gift icon"** at the top

More information

Exercise Sheet 2. (Classifications of Operating Systems)

Exercise Sheet 2. (Classifications of Operating Systems) Exercise Sheet 2 Exercise 1 (Classifications of Operating Systems) 1. At any given moment, only a single program can be executed. What is the technical term for this operation mode? 2. What are half multi-user

More information

5/8/2012. Encryption-based Protection. Protection based on Access Permission (Contd) File Security, Setting and Using Permissions Chapter 9

5/8/2012. Encryption-based Protection. Protection based on Access Permission (Contd) File Security, Setting and Using Permissions Chapter 9 File Security, Setting and Using Permissions Chapter 9 To show the three protection and security mechanisms that UNIX provides To describe the types of users of a UNIX file To discuss the basic operations

More information

Mapping Network Shares

Mapping Network Shares CAS Computing Mapping Network Shares Contents: Mapping Network Shares in Windows Vista/7.1 Mapping Network Shares in Mac OS X (10.5+). 3 Access to Shares and Student Access.5 CAS Computing Services, (518)

More information

Hitchhiker s Guide to VLSI Design with Cadence & Synopsys

Hitchhiker s Guide to VLSI Design with Cadence & Synopsys Hitchhiker s Guide to VLSI Design with Cadence & Synopsys David Money Harris 17 January 2009 The VLSI design tools at Harvey Mudd College are hosted on a Linux server named chips. This document introduces

More information

Programming Project # 2. cs155 Due 5/5/05, 11:59 pm Elizabeth Stinson (Some material from Priyank Patel)

Programming Project # 2. cs155 Due 5/5/05, 11:59 pm Elizabeth Stinson (Some material from Priyank Patel) Programming Project # 2 cs155 Due 5/5/05, 11:59 pm Elizabeth Stinson (Some material from Priyank Patel) Background context Unix permissions model Prof Mitchell will cover during OS security (next week

More information

Microsoft TS: Windows Small Business Server 2011 Standard, Configuring. Practice Test. Version:

Microsoft TS: Windows Small Business Server 2011 Standard, Configuring. Practice Test. Version: Microsoft 70-169 TS: Windows Small Business Server 2011 Standard, Configuring Practice Test Version: 14.21 QUESTION NO: 1 Standard. You create an email-enabled security group named Accounting. You add

More information

Remote Access User Guide for Mac OS (Citrix Instructions)

Remote Access User Guide for Mac OS (Citrix Instructions) (Citrix Instructions) VERSION: 003 PUBLISHED: 2/2018 Page 1 of 8 Remote Access User Guide for Mac OS Please follow the steps outlined in this guide which will show you how to access the Clarion Partners

More information

1. A broadband connection. 2. Windows Vista (for these instructions; other operating systems have other instructions).

1. A broadband connection. 2. Windows Vista (for these instructions; other operating systems have other instructions). A VPN (Virtual Private Network) provides a secure, encrypted tunnel from your computer to UHCL's network when off campus. UHCL offers VPN software to allow authenticated, secure access to many UHCL resources

More information

IT Essentials II: NOS Linux Labs Using Knoppix

IT Essentials II: NOS Linux Labs Using Knoppix IT Essentials II: NOS Linux Labs Using Knoppix 1 IT Essentials II Linux Labs Using Knoppix Agenda Course Overview Knoppix Lab Map Knoppix Overview Lab: Basic System Administration in Knoppix v2 2 IT Essentials

More information

WebDAV. Overview. File Permissions and Management. Authentication Methods

WebDAV. Overview. File Permissions and Management. Authentication Methods WebDAV Overview WebDAV integration provides access to the file system on the staging server similar to FTP/SFTP and can be used in lieu of FTP/SFTP. WebDAV (Web Distributed Authoring and Versioning) is

More information

Chapter 8: Security under Linux

Chapter 8: Security under Linux Chapter 8: Security under Linux 8.1 File and Password security Linux security may be divided into two major parts: a) Password security b) File security 8.1.1 Password security To connect to a Linux system

More information

Outlook Desktop Application for Windows

Outlook Desktop Application for Windows Access Your Email There are two common ways to access your mail: via the Outlook Desktop Application and the Outlook Web Application. This document focuses on how to use the Outlook Desktop Application

More information

Permission and Ownership

Permission and Ownership Permission and Ownership 1. Understanding file and directory ownership Every file on your Linux system, including directories, is owned by a specific user and group. Therefore, file permissions are defined

More information

Operating Systems Linux 1-2 Measurements Background material

Operating Systems Linux 1-2 Measurements Background material Operating Systems Linux 1-2 Measurements Background material Introduction The Linux measurements were designed to allow you to have an impression about the administration of Linux severs along with providing

More information

Telnet & FTP. Department of Educational Multimedia Faculty of Education

Telnet & FTP. Department of Educational Multimedia Faculty of Education Telnet & FTP Department of Educational Multimedia Faculty of Education TCP/IP Applications World Wide Web's Hypertext Transfer Protocol (HTTP) Simple Mail Transfer Protocol (SMTP) File Transfer Protocol

More information

CMPSCI 120 Fall 2013 Lab #2 Professor William T. Verts

CMPSCI 120 Fall 2013 Lab #2 Professor William T. Verts CMPSCI 120 Fall 2013 Lab #2 Professor William T. Verts Setting Up (PC) Go to the link for the encrypted telnet program PuTTY (Simon Tatham s site in the UK at http://www.chiark.greenend.org.uk/~sgtatham/putty/).

More information

Linux at the Command Line Don Johnson of BU IS&T

Linux at the Command Line Don Johnson of BU IS&T Linux at the Command Line Don Johnson of BU IS&T We ll start with a sign in sheet. We ll end with a class evaluation. We ll cover as much as we can in the time allowed; if we don t cover everything, you

More information

TEMPO INSTALLATION I O A. Platform Independent Notes 1. Installing Tempo 3. Installing Tools for the Plugins 5. v0.2.

TEMPO INSTALLATION I O A. Platform Independent Notes 1. Installing Tempo 3. Installing Tools for the Plugins 5. v0.2. TEMPO INSTALLATION v0.2.2 (BETA) 2/7/2008 Platform Independent Notes 1 On Windows: 2 On Linux: 2 On OS X (Tiger 10.4.7 and later) 2 I O A Installing Tempo 3 Installing on Windows (Vista/XP/W2K) 3 Installing

More information

SIMICART USER GUIDE SERIES. SimiCart Install SimiConnector

SIMICART USER GUIDE SERIES. SimiCart Install SimiConnector SIMICART USER GUIDE SERIES Install SimiConnector TABLE OF CONTENTS I. INSTALL SIMICONNECTOR 3 II. CHECK CONNECTOR AFTER INSTALL 12 I. INSTALL SIMICONNECTOR 1) Download SimiConnector: https://github.com/simicart/simicart-magento2.x

More information

CENG200 - Lab 2: Security, Simple Web Pages

CENG200 - Lab 2: Security, Simple Web Pages Out: Sept 12, 2016 Due: Sept 26, 2016 (start of lecture) Preliminary Steps CENG200 - Lab 2: Security, Simple Web Pages A. When you log in for this lab, perform the following actions (one time only) chmod

More information

How to Create a NetBeans PHP Project

How to Create a NetBeans PHP Project How to Create a NetBeans PHP Project 1. SET UP PERMISSIONS FOR YOUR PHP WEB SITE... 2 2. CREATE NEW PROJECT ("PHP APPLICATION FROM REMOTE SERVER")... 2 3. SPECIFY PROJECT NAME AND LOCATION... 2 4. SPECIFY

More information

Find out where you currently are in the path Change directories to be at the root of your home directory (/home/username) cd ~

Find out where you currently are in the path Change directories to be at the root of your home directory (/home/username) cd ~ CIS 105 Working with directories You have using directories in a Windows environment extensively. Often in Windows we are calling them folders. They are important in order to organize our files. It is

More information

Faculty and Staff Instructions for connecting to the Hood College VPN to access your files on Blazer and/or your on-campus computer

Faculty and Staff Instructions for connecting to the Hood College VPN to access your files on Blazer and/or your on-campus computer Faculty and Staff Instructions for connecting to the Hood College VPN to access your files on Blazer and/or your on-campus computer NOTE: These instructions were written for Windows XP. Also, please note

More information

My Site. Introduction

My Site. Introduction My Site Introduction My Site is a component of the portal that is available to all NB educators. It is a personalized site that provides all users with the following features: A place to save and share

More information

Remote Access to Matlab at Mason. CDS-130: Computing for Scientists. Spring Jie Zhang

Remote Access to Matlab at Mason. CDS-130: Computing for Scientists. Spring Jie Zhang Remote Access to Matlab at Mason CDS-130: Computing for Scientists Spring 2013 Jie Zhang Credit: Joseph Marr, Samantha Fleming Accessing Matlab at Mason There are four different methods to access Matlab

More information

Goals for This Lecture:

Goals for This Lecture: Goals for This Lecture: Understand how to log in remotely with SSH Understand how to transfer files with SCP Learn how to log in from SINC site windows PC s with XWIN32 Understand the long form listings

More information

Chap2: Operating-System Structures

Chap2: Operating-System Structures Chap2: Operating-System Structures Objectives: services OS provides to users, processes, and other systems structuring an operating system how operating systems are designed and customized and how they

More information

SBCC Web File System - Xythos

SBCC Web File System - Xythos Table of Contents Table of Contents...1 Purpose...1 Login Procedure...1 Creating and Sharing a Web Folder for MAT153...2 Dreamweaver Remote Info...4 I Forgot My Pipeline Credentials...6 Purpose This purpose

More information

CMPSCI 120 Fall 2017 Lab #1 Professor William T. Verts

CMPSCI 120 Fall 2017 Lab #1 Professor William T. Verts CMPSCI 120 Fall 2017 Lab #1 Professor William T. Verts The Goal The ultimate goal of this assignment is to create a Web page on the server, make sure it is visible to the outside world, and to design and

More information

Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades Q2

Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades Q2 Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades 2017-2018 Q2 Facultat d Informàtica de Barcelona This first lab session is focused on getting experience in working

More information

Using BlueStep Data Vault with WebDAV

Using BlueStep Data Vault with WebDAV Using BlueStep Data Vault with WebDAV New BlueStep Functionality In order to meet our client s needs and expand our capabilities and services, BlueStep has implemented the use of the WebDAV Internet standard

More information

PeopleSoft Financials for Macintosh

PeopleSoft Financials for Macintosh PeopleSoft Financials for Macintosh Microsoft Remote Desktop for Macintosh Download Microsoft Remote Desktop from the Mac App Store Install the app and place a shortcut on the dock for easy access Configure

More information

Unix Workshop Aug 2014

Unix Workshop Aug 2014 Unix Workshop 2014 5 Aug 2014 What is Unix Multitasking, multiuser operating system Often the OS of choice for large servers, large clusters Unix Around You You re probably familiar with these: Linux Solaris

More information

CSE 390a Lecture 3. Multi-user systems; remote login; editors; users/groups; permissions

CSE 390a Lecture 3. Multi-user systems; remote login; editors; users/groups; permissions CSE 390a Lecture 3 Multi-user systems; remote login; editors; users/groups; permissions slides created by Marty Stepp, modified by Jessica Miller and Ruth Anderson http://www.cs.washington.edu/390a/ 1

More information

Flash Video Encoder CS3 Fetch Microsoft Office 2004 (Excel, imovie. Powerpoint, Word, Entourage) itunes

Flash Video Encoder CS3 Fetch Microsoft Office 2004 (Excel, imovie. Powerpoint, Word, Entourage) itunes Welcome This is a small packet of information concerning some of the simpler uses of technology in the department, how to transfer files, change your password, that sort of thing. In this department, we

More information

Booting a Galaxy Instance

Booting a Galaxy Instance Booting a Galaxy Instance Create Security Groups First time Only Create Security Group for Galaxy Name the group galaxy Click Manage Rules for galaxy Click Add Rule Choose HTTPS and Click Add Repeat Security

More information

How to Access CTC via VPN with Mac OS 10.7x

How to Access CTC via VPN with Mac OS 10.7x NAME: How to Access CTC via VPN with Mac OS 10.7x PAGE: 1 of 16 How to Access CTC via VPN with Mac OS 10.7x Before you begin, please review the following: If you do not already have VPN permission, please

More information

Short Read Sequencing Analysis Workshop

Short Read Sequencing Analysis Workshop Short Read Sequencing Analysis Workshop Day 2 Learning the Linux Compute Environment In-class Slides Matt Hynes-Grace Manager of IT Operations, BioFrontiers Institute Review of Day 2 Videos Video 1 Introduction

More information

: the User (owner) for this file (your cruzid, when you do it) Position: directory flag. read Group.

: the User (owner) for this file (your cruzid, when you do it) Position: directory flag. read Group. CMPS 12L Introduction to Programming Lab Assignment 2 We have three goals in this assignment: to learn about file permissions in Unix, to get a basic introduction to the Andrew File System and it s directory

More information

CSCI 350 Virtual Machine Setup Guide

CSCI 350 Virtual Machine Setup Guide CSCI 350 Virtual Machine Setup Guide This guide will take you through the steps needed to set up the virtual machine to do the PintOS project. Both Macintosh and Windows will run just fine. We have yet

More information

Remote Access to Unix Machines

Remote Access to Unix Machines Remote Access to Unix Machines Alvin R. Lebeck Department of Computer Science Department of Electrical and Computer Engineering Duke University Overview We are using OIT Linux machines for some homework

More information

Citrix Desktop for Home Computers Mac OS Instructions

Citrix Desktop for Home Computers Mac OS Instructions Citrix Desktop for Home Computers Mac OS Instructions You can use Citrix to create and access a virtual work desktop from your home computer. Step 1 Uninstall: To install the newest version of Citrix on

More information

Linux Command Line Primer. By: Scott Marshall

Linux Command Line Primer. By: Scott Marshall Linux Command Line Primer By: Scott Marshall Draft: 10/21/2007 Table of Contents Topic Page(s) Preface 1 General Filesystem Background Information 2 General Filesystem Commands 2 Working with Files and

More information

Automatic Creation of a Virtual Network with VBoxManage [1]

Automatic Creation of a Virtual Network with VBoxManage [1] Automatic Creation of a Virtual Network with V... 1 Automatic Creation of a Virtual Network with VBoxManage [1] Submitted by Steve [2] on Wed, 18/09/2013-5:46pm I am using VirtualBox to create multiple

More information

Unit: Making a move (using FTP)

Unit: Making a move (using FTP) Data Introduction to Unix and HPC (HPC for Wimps) Unit: Making a move (using FTP) Goals: Can login via Secure FTP and see home directory. Can transfer a file from local machine via FTP to home directory.

More information

VMWARE HORIZON CLIENT OFF CAMPUS TUTORIAL. Software Installed: What is VMware Horizon Client? In This Manual

VMWARE HORIZON CLIENT OFF CAMPUS TUTORIAL. Software Installed: What is VMware Horizon Client? In This Manual VMWARE HORIZON CLIENT OFF CAMPUS TUTORIAL Revised May 2017 What is VMware Horizon Client? VMware Horizon Client for Windows operating systems allows you to connect to our department VMware Horizon View

More information

A Brief Introduction to Unix

A Brief Introduction to Unix A Brief Introduction to Unix Sean Barag Drexel University March 30, 2011 Sean Barag (Drexel University) CS 265 - A Brief Introduction to Unix March 30, 2011 1 / 17 Outline 1 Directories

More information

UTA Tech Orientation Spring 2019

UTA Tech Orientation Spring 2019 UTA Tech Orientation Spring 2019 Overview Why is Tech Stuff Important? The Filesystem Shell Commands File Permissions Miscellaneous Why is Tech Stuff Important? Why is TA Tech Stuff Important? Different

More information

Using UNIX. -rwxr--r-- 1 root sys Sep 5 14:15 good_program

Using UNIX. -rwxr--r-- 1 root sys Sep 5 14:15 good_program Using UNIX. UNIX is mainly a command line interface. This means that you write the commands you want executed. In the beginning that will seem inferior to windows point-and-click, but in the long run the

More information

8 MANAGING SHARED FOLDERS & DATA

8 MANAGING SHARED FOLDERS & DATA MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to

More information

Creating Avid Projects, and Media Sharing with Small Tree TitaniumZ

Creating Avid Projects, and Media Sharing with Small Tree TitaniumZ When using Avid Media Composer System with Small Tree's Titanium Z storage, there are a few steps to take to share project and media files. It is important to note that While Small Tree can work in an

More information

You can access data using the FTP/SFTP protocol. This document will guide you in the procedures for configuring FTP/SFTP access.

You can access data using the FTP/SFTP protocol. This document will guide you in the procedures for configuring FTP/SFTP access. You can access data using the FTP/SFTP protocol. This document will guide you in the procedures for configuring FTP/SFTP access. Overview of Configuring FTP/SFTP Access In order to access data using the

More information

What is VMware View. IMPORTANT: Connecting from Off-Campus. Connecting to View Desktops. Downloading the Client

What is VMware View. IMPORTANT: Connecting from Off-Campus. Connecting to View Desktops. Downloading the Client 1. What is VMware View 2. Connecting from Off-Campus 3. Connecting to View Desktops 4. Extra View Tips 5. What to do if something is wrong What is VMware View VMware View is a technology that allows us

More information

Security and File Permission. Harish Kumar.H.C Asst.Professor Department of CSE

Security and File Permission. Harish Kumar.H.C Asst.Professor Department of CSE Security and File Permission Harish Kumar.H.C Asst.Professor Department of CSE Introduction The security system in UNIX, like any other operating system, is designed to control the access to resources.

More information

Getting Started with VPN

Getting Started with VPN What is a VPN? VPN (Virtual Private Network) provides you with a way to connect to the HBU campus server securely over the internet in order to access your work computer and shared drives from home. VPN

More information

Race Condition Vulnerability Lab

Race Condition Vulnerability Lab Concordia Institute for Information Systems Engineering - INSE 6130 1 Race Condition Vulnerability Lab Copyright c 2006-2012 Wenliang Du, Syracuse University. The development of this document is funded

More information

Basic Survival UNIX.

Basic Survival UNIX. Basic Survival UNIX Many Unix based operating systems make available a Graphical User Interface for the sake of providing an easy way for less experienced users to work with the system. Some examples are

More information

SharePoint General Instructions

SharePoint General Instructions SharePoint General Instructions Table of Content What is GC Drive?... 2 Access GC Drive... 2 Navigate GC Drive... 2 View and Edit My Profile... 3 OneDrive for Business... 3 What is OneDrive for Business...

More information

CS197U: A Hands on Introduction to Unix

CS197U: A Hands on Introduction to Unix CS197U: A Hands on Introduction to Unix Lecture 3: UNIX Operating System Organization Tian Guo CICS, Umass Amherst 1 Reminders Assignment 2 is due THURSDAY 09/24 at 3:45 pm Directions are on the website

More information

Introduction. SSH Secure Shell Client 1

Introduction. SSH Secure Shell Client 1 SSH Secure Shell Client 1 Introduction An SSH Secure Shell Client is a piece of software that allows a user to do a number of functions. Some of these functions are: file transferring, setting permissions,

More information

Bitnami MEAN for Huawei Enterprise Cloud

Bitnami MEAN for Huawei Enterprise Cloud Bitnami MEAN for Huawei Enterprise Cloud Description Bitnami MEAN Stack provides a complete development environment for mongodb and Node.js that can be deployed in one click. It includes the latest stable

More information

TECH 4272 Operating Systems

TECH 4272 Operating Systems TECH 4272 Lecture 3 2 Todd S. Canaday Adjunct Professor Herff College of Engineering sudo sudo is a program for Unix like computer operating systems that allows users to run programs with the security

More information

Introduction to Linux Spring 2014, Section 02, Lecture 3 Jason Tang

Introduction to Linux Spring 2014, Section 02, Lecture 3 Jason Tang Introduction to Linux Spring 2014, Section 02, Lecture 3 Jason Tang Topics What is an Operating System Overview of Linux Linux commands Shell Submit system What is an Operating System? Special type of

More information

CSC111 Computer Science II

CSC111 Computer Science II CSC111 Computer Science II Lab 1 Getting to know Linux Introduction The purpose of this lab is to introduce you to the command line interface in Linux. Getting started In our labs If you are in one of

More information

RWT Network System Installation Guide

RWT Network System Installation Guide RWT Network System Installation Guide Copyright 2003, Talking Fingers, Inc. Page 1 of 48 This document is Copyright 2003 by Talking Fingers, Inc. All rights are reserved. This document may not be copied

More information

You will automatically be in your user (home) directory when you login.

You will automatically be in your user (home) directory when you login. Directory structure / (root) bin dev etc lib users users2 tmp These directories typically contain system libraries, executable binary files, device handlers and drivers, etc. The user home directories

More information

Lab 2A> ADDING USERS in Linux

Lab 2A> ADDING USERS in Linux Lab 2A> ADDING USERS in Linux Objective In this lab, student will learn how to create user accounts using the Linux operating system. Scenario The XYZ Company has just installed a server running Linux.

More information

macos Security Checklist:

macos Security Checklist: WHITE PAPER macos Security Checklist: implementing the Center for Internet Security Benchmark for macos Recommendations for securing macos The Center for Internet Security (CIS) benchmark for macos is

More information

Linux File System and Basic Commands

Linux File System and Basic Commands Linux File System and Basic Commands 0.1 Files, directories, and pwd The GNU/Linux operating system is much different from your typical Microsoft Windows PC, and probably looks different from Apple OS

More information

Filesharing. Jason Healy, Director of Networks and Systems

Filesharing. Jason Healy, Director of Networks and Systems Filesharing Jason Healy, Director of Networks and Systems Last Updated Mar 18, 2008 2 Contents 1 Name of Project Here 5 1.1 Introduction.............................. 5 1.2 Initial Setup..............................

More information

User Guide Version 2.0

User Guide Version 2.0 User Guide Version 2.0 Page 2 of 8 Summary Contents 1 INTRODUCTION... 3 2 SECURESHELL (SSH)... 4 2.1 ENABLING SSH... 4 2.2 DISABLING SSH... 4 2.2.1 Change Password... 4 2.2.2 Secure Shell Connection Information...

More information

LING203: Corpus. March 9, 2009

LING203: Corpus. March 9, 2009 LING203: Corpus March 9, 2009 Corpus A collection of machine readable texts SJSU LLD have many corpora http://linguistics.sjsu.edu/bin/view/public/chltcorpora Each corpus has a link to a description page

More information

Remote VPN Remote access for personal devices

Remote VPN Remote access for personal devices Remote VPN Remote access for personal devices About Remote VPN Remote VPN provides staff and students with secure, authenticated remote access to personal and shared network filespace and to web-based

More information

WINDOWS CONFIGURATION

WINDOWS CONFIGURATION WINDOWS CONFIGURATION 1. Go to the App store on your ipad and purchase CrystalPM Signature Capture then install. 2. On the computer that contains the PDF files that you want the patients to sign: a. Go

More information

Connecting from Off-Campus to Your Office Mac Using a Windows 10 PC

Connecting from Off-Campus to Your Office Mac Using a Windows 10 PC University Information Technology Services Technology Outreach Connecting from Off-Campus to Your Office Mac Using a Windows 10 PC The following describes how to set up and connect remotely to your office

More information

CpSc 1111 Lab 1 Introduction to Unix Systems, Editors, and C

CpSc 1111 Lab 1 Introduction to Unix Systems, Editors, and C CpSc 1111 Lab 1 Introduction to Unix Systems, Editors, and C Welcome! Welcome to your CpSc 111 lab! For each lab this semester, you will be provided a document like this to guide you. This material, as

More information