UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES. BSc (Hons) COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATION 2017/2018 UNIX MODULE NO: CPU5003
|
|
- Joan Carroll
- 6 years ago
- Views:
Transcription
1 [CRT06] UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES BSc (Hons) COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATION 2017/2018 UNIX MODULE NO: CPU5003 Date: Wednesday 17 th January 2018 Time: 10:00 12:00 INSTRUCTIONS TO CANDIDATES: There are SIX questions. Answer ANY FOUR questions. All questions carry equal marks. Marks for parts of questions are shown in brackets. Unless otherwise stated all symbols take their usual meaning. Electronic calculators may be used provided that data and program storage memory is cleared prior to the examination.
2 Page 2 of 8 Question 1 Q1 a) Describe the primary function of the following UNIX directories: /home /tmp /var /root /sbin /dev /etc /mnt (8 marks) Q1 b) A root user issues the following sequence of commands in the order shown. After each command, what would be the full pathname of the user s present working directory. (You should assume that the directories /etc/logwatch/scripts/etc and /etc/var do not exist) cd /etc/logwatch/scripts cd etc cd../.. cd var cd /var cd.. cd - cd ~/private cd / cd.. cd. cd ~ cd../var cd spool cd /etc/passwd cd mail cd (17 marks)
3 Page 3 of 8 Question 2 Q2 a) Compare and contrast the three formats of iteration commonly used in UNIX bash scripting. You should explain in detail how these forms of iteration operate and illustrate your answer with example algorithms. (25 marks) Question 3 Q3 a) Examine the following two lines of code. Only one of these would work correctly. Describe what these operators do and explain why one is correct while the other is wrong. (6 marks) who grep rhc1 echo user rhc1bct is logged on who grep rhc1 && echo user rhc1bct is logged on Q3 b) Write a script that will ping the IP address once and only once. Based on wether or not the ping was successful the script should then echo either the phrase is fine or is down. (10 marks) Q3 c) A common form of conditional statement used in shell scripting is the case statement. Write a short shell script the employs a case statement. (9 marks)
4 Page 4 of 8 Question 4 Q4 a) Write a command that will extract the broadcast address from the output of the /sbin/ifconfig command. An example of the /sbin/ifconfig output can be found below. In this case the broadcast address (4 marks) [root@pascal cron]# /sbin/ifconfig eth0 eth0 Link encap:ethernet HWaddr 00:0C:29:D0:2E:53 inet addr: Bcast: Mask: inet6 addr: fe80::20c:29ff:fed0:2e53/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:2456 errors:0 dropped:0 overruns:0 frame:0 TX packets:1604 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes: (161.7 KiB) TX bytes: (147.1 KiB) Q4 b) Write a command that would extract the hardware address from the output of the /sbin/ifconfig command and save it in a variable named hardware. In the example above the hardware address is 00:0C:29:D0:2E:53 (4 marks) Q4 c) What would the effect of the following command be and what is the purpose of the pipe? (4 marks) cat /etc/passwd grep n$ To assist you an example of a UNIX password file (/etc/passwd) is below: root@gem-gateway ~]# cat /etc/passwd root:x:0:0:root:/root:/bin/bash bin:x:1:1:bin:/bin:/sbin/nologin daemon:x:2:2:daemon:/sbin:/sbin/nologin information taken out ra4bct:x:303:500::/home/ra4bct:/bin/bash ad3ect:x:304:500::/home/ad3ect:/bin/bash rc2ect:x:305:500::/home/rc2ect:/bin/bash lb1bct:x:306:500::/home/lb1bct:/bin/bash ai1ect:x:309:500::/home/ai1ect:/bin/bash tut1mon:x:310:501::/home/tut1mon:/bin/bash tut1tue:x:311:501::/home/tut1tue:/bin/bash tut2wed:x:312:501::/home/tut2wed:/bin/bash information taken out Question 4 continues over the page.
5 Page 5 of 8 Question 4 continued. Q4 d) Below is the output of the command cat /etc/hosts executed on a machine in the University of Bolton called ruby. While examining this /etc/hosts file, an administrator notices that the domain names are all incorrect. All machines refer to bct where as they should refer to cet. For example sapphire.bct.bolton.ac.uk should be sapphire.cet.bolton.ac.uk. Write a series of commands that would facilitate this change without the need for the file to be edited manually. (5 marks) [root@ruby ~]# cat /etc/hosts # # Hosts on the Gem network ruby.bct.bolton.ac.uk ruby garnet.bct.bolton.ac.uk garnet pearl.bct.bolton.ac.uk pearl sapphire.bct.bolton.ac.uk sapphire ruby.bct.bolton.ac.uk ruby jet.bct.bolton.ac.uk jet onyx.bct.bolton.ac.uk onyx emerald.bct.bolton.ac.uk emerald kirk.bct.bolton.ac.uk kirk spock.bct.bolton.ac.uk spock mars.bct.bolton.ac.uk mars twix.bct.bolton.ac.uk twix information taken out. Q4 e) Write a command that will extract from the /etc/hosts file, all lines that refer to machines with an IP address in the range to (8 marks)
6 Page 6 of 8 Question 5 Q5 a) Examine the following output.. [rhc1@central ~]$ ls -l total 8 -rwxr-xr-- 1 rhc1 secgroup 2716 Oct 30 12:37 syschange [rhc1@central ~]$ The user rhc1 would like to change the permissions on the file syschange so that other members of his group can read the script but cannot execute it. What command might he issue to make this change? No other permissions on the file should be changed. What would be the effect of the following two commands: chmod 666 syschange chmod 755 syschange (4 marks) Q5 b) Examine the following output and provide an interpretation of the permissions listed that explains who has permission to do what. (11 marks) [root@central ~]$ ls -l total 16 -rwxr-x--x 1 root secgroup Apr 20 22: datafile drwxr-xr-- 1 root secgroup Mar 20 20: systemdata [root@central ~]$ Q5 c) Provide a brief overview of the sticky bit. Ensure that you cover its affect, how it is assigned and how you can tell if it is present. (4 marks) Q5 d) Explain the concept of an SUID script. How do you create such a script, how do its permissions appear and why are they often viewed as a security risk? (6 marks)
7 Page 7 of 8 Question 6 Q6 a) A UNIX system that provides a service to a retail organisation is used around the clock each weekend. Each week day it runs from 10 am to 10 pm. Accordingly the service hours each week are : Tuesday 10 am to Tuesday 10pm Wednesday 10 am to Wednesday 10 pm Thursday 10 am to Thursday 10 pm Friday 10 am to Monday 10 pm Two requests have been made of the UNIX administrator. One is that a reboot should be scheduled at some point each night that the service is not required. Secondly, a backup script (/usr/local/bin/backup) has been produced that takes 3 hours to run, this script needs to run once a week at a time that the service not in use. Provide a detailed explanation of how cron can be used to achieve this inclusive of the configuration changes that need to be made and the commands that will be used (15 marks) To assist you, an extract from the output of the command man cron can be found below. [rhc1@cet-apache-02 ~]$ man cron. information taken out. The time and date fields are: field allowed values minute 0-59 hour 0-23 day of month 1-31 month 1-12 (or names, see below) day of week 0-7 (0 or 7 is Sun, or use names) A field may be an asterisk (*), which always stands for first-last.. information taken out. Question 6 continues over the page.
8 Page 8 of 8 Question 6 continued. Q6 b) A 24 hour power cut has been scheduled for a server room while the UNIX administrator is away at a conference. To this end the administrator has decided to implement a series of at commands that will remind users of the power cut, stop them login in and ensure that the system is shut down in an orderly manner. Assuming the current time to be 9.00 am on Thursday morning, write a series of commands as root, that will schedule the following events : at 4 pm this evening, send a message to all users informing them that the system will unavailable from midnight on Friday to midnight on Saturday. at 10 am on Friday morning, send a message to all users informing them that they only have 14 hours remaining until the shutdown. at 8.00 pm on Friday evening create a file called /etc/nologin (the existence of this file will stop users from logging in) at pm on Friday evening shutdown the system. at 1 am on Sunday morning, delete the /etc/nologin file (10 marks) END OF QUESTIONS
UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES. BSc (Hons) COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATION 2014/2015 UNIX MODULE NO: CPU5003
[CRT09] UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES BSc (Hons) COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATION 2014/2015 MODULE NO: CPU5003 Date: Wednesday 21 st January 2015 Time: 10:00 13:00 INSTRUCTIONS
More informationLet us ping! First we will learn the Hello World of a networked machine.
AN INTRODUCTION TO LINUX NETWORKING In this article, we ll explore networking under GNU/Linux. You ll find it interesting to manage the entire network through certain valid keystrokes known as commands.
More informationUNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING WITH WEBSITE DEVELOPMENT SEMESTER ONE EXAMINATIONS 2018/2019 UNIX MODULE NO: CPU5003
[CRT08] UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING WITH WEBSITE DEVELOPMENT SEMESTER ONE EXAMINATIONS 2018/2019 UNIX MODULE NO: CPU5003 Date: Wednesday 16 th January 2019 Time: 10:00 12:00 INSTRUCTIONS
More informationWi-Fi Guide: Edimax USB Adapter on BBG
Wi-Fi Guide: Edimax USB Adapter on BBG August 3 rd 2017 Table of Contents: Page 1: Page 2: Page 3: Page 4: Page 5: Introduction & Hardware requirements Getting Started Connecting to a network using Network
More informationCIS Test 1- Practice - Fall 2011
CIS 192 - Test 1- Practice - Fall 2011 Name Each question worth 2 points: Tip: When not logged in as root, you can still use many of the network commands but you must preface them with /sbin/ because you
More informationIP over IB Protocol. Introduction CHAPTER
CHAPTER 3 The following sections appear in this chapter: Introduction, page 3-1 Manually Configure IPoIB for Default IB Partition, page 3-2 Subinterfaces, page 3-2 Verify IPoIB Functionality, page 3-5
More informationEnabling CDC_ETHER Connection for Skywire GSM CAT1
Enabling CDC_ETHER Connection for Skywire GSM CAT1 NimbeLink Corp Updated: February 2018 PN 30262 rev 4 NimbeLink Corp. 2018. All rights reserved. 1 Table of Contents Table of Contents 2 1. Introduction
More informationGM8126 MAC DRIVER. User Guide Rev.: 1.0 Issue Date: December 2010
GM8126 MAC DRIVER User Guide Rev.: 1.0 Issue Date: December 2010 REVISION HISTORY Date Rev. From To Dec. 2010 1.0 - Original Copyright 2010 Grain Media, Inc. All Rights Reserved. Printed in Taiwan 2010
More informationCreate Test Environment
Create Test Environment Describes how to set up the Trafodion test environment used by developers and testers Prerequisites Python Passwordless ssh If you already have an existing set of ssh keys If you
More informationEnabling CDC-ETHER Connection for Skywire CAT1
Enabling CDC-ETHER Connection for Skywire CAT1 NimbeLink Corp Updated: May 2017 PN 30111 rev 5 NimbeLink Corp. 2017. All rights reserved. 1 Table of Contents Table of Contents 2 1. Introduction 2 1.1 Orderable
More informationTABLE OF CONTENTS. ACI Solutions Team by Tomas de Leon 2
TABLE OF CONTENTS 1 INTRODUCTION... 3 2 LAB REFERENCE & TOPOLOGY INFORMATION... 3 3 DELETE THE EXISTING OUT OF BAND NODE MANAGEMENT ADDRESSES CONFIGURATION FOR YOUR DESIGNATED ACI FABRIC... 4 4 CONFIGURE
More informationStampA5D3x/PortuxA5/PanelA5. Quickstart Guide
StampA5D3x/PortuxA5/PanelA5 Quickstart Guide StampA5D3x/PortuxA5/PanelA5 StampA5D3x/PortuxA5/PanelA5: Quickstart Guide Copyright 2015 taskit GmbH All rights to this documentation and to the product(s)
More informationAccessing the Networking Stack
The Cisco IOS XR Software serves as a networking stack for communication. This section explains how applications on IOS XR can communicate with internal processes, and with servers or outside devices.
More informationRG-MACC_2.0 Installation Manual
RG-MACC_2.0 Installation Manual Ruijie Networks Co., Ltd all rights reserved 1 Copyright Clarify Copyright ownership belongs to Ruijie, shall not be reproduced, copied, or used in other ways without permission.
More informationUsing Shell Commands
This chapter contains the following sections: General Administration, page 1 Working with Databases, page 9 Importing Certificates, page 13 Accessing Root Privileges, page 14 Using a Multi-Node Setup,
More informationOracle 11g RAC on Linux- CRS Inderpal S. Johal. Inderpal S. Johal
ORACLE CRS INSTALLATION : INSTALLATION AND CONFIGURATION GUIDE Inderpal S. Johal INTRODUCTION This document will gives details of Oracle Clusterware installation on RHEL 4. CRS INSTALLATION STEPS 1. Cluster
More informationConfiguring a Standalone VCL Environment using VMware Server 2.0
Configuring a Standalone VCL Environment using VMware Server 2.0 DISCLAIMER! This document provides instuctions for configuring a standalone VCL environment running on a single computer which is able to
More informationXE2000/XE3000 IP-PBX: Getting Started Guide Package Contents
XE2000/XE3000 IP-PBX: Getting Started Guide Package Contents XE2000/XE3000 (2U 19'' width unit) Power cord Support hardware for 19'' cabinet Prerequisites You need a computer equipped with Internet browser.
More informationHostname and IP Address
1/19 IP Addressing Surasak Sanguanpong nguan@ku.ac.th http://www.cpe.ku.ac.th/~nguan Last updated: 27 June 2002 Hostname and IP Address 2/19 browser What is the IP address of www.isoc.org? www.isoc.org
More informationCHAPTER 7 DEMONSTRATE THE PAN IN LINUX
CHAPTER 7 DEMONSTRATE THE PAN IN LINUX SYSTEM The new model - Network Access Point Group Network 7.1 DEMONSTRATION Software: All machines are installed with Linux Redhat 8.0 Hardware list:- There are two
More informationRG-MACC-BASE_v2.01. Installation Guide
RG-MACC-BASE_v2.01 Preface Thank you for using our products. Audience This manual is intended for: Network engineers Technical support and servicing engineers Network administrators Symbols Important information.
More informationNewsreader virtual machines Technical Report NWR
Newsreader virtual machines Technical Report NWR-2014-4 Version FINAL Aitor Soroa 1, Enrique Fernández 2 1 University of Basque Country Donostia, Basque Country a.soroa@ehu.es 2 University of Basque Country
More informationUCS IPv6 Management Configuration Example
UCS IPv6 Management Configuration Example Document ID: 118784 Contributed by Padmanabhan Ramaswamy and Shankar Prasath, Cisco TAC Engineers. Mar 06, 2015 Contents Introduction Prerequisites Requirements
More informationClustered Data ONTAP 8.3 Update 2, IPspaces. Self-paced Lab NETAPP UNIVERSITY. NetApp University - Do Not Distribute
NETAPP UNIVERSITY Clustered Data ONTAP 8.3 Update 2, IPspaces Self-paced Lab Course ID: STRSW-SPL-CDOT83UPD2 Content Version: 1.0 ATTENTION The information contained in this course is intended only for
More informationssh keys, yum, ntp, rsync
ssh keys, yum, ntp, rsync 1 CST8177 Linux Operating Systems II Saturday 25-April-15 9:00-11:00 T119/T126 2 ifconfig to find your VM's ip address so you can ssh to it ssh key login yum ntp tar scp rsync
More informationNetwork Configuration for Cisco UCS Director Baremetal Agent
Network Configuration for Cisco UCS Director Baremetal Agent This chapter contains the following sections: About the Network Configuration Options, page 1 Single Network for Management and PXE, page 1
More informationChapter 5 Network Layer
Chapter 5 Network Layer Network Layer IPv4 2 IP Header Application Header + data 3 IP IP IP IP 4 Focus on Transport Layer IP IP 5 Network Layer The Network layer (Layer 3) provides services to exchange
More informationAccess Server: User's and Developer's Guide <<< Previous Next >>>
1 of 14 12/9/2008 10:18 AM Access Server: User's and Developer's Guide > Chapter 2. Getting Started with Access Server Access Server can be controlled in three ways: by using the WWW
More informationFiles
http://www.cs.fsu.edu/~langley/cop3353-2013-1/reveal.js-2013-02-11/02.html?print-pdf 02/11/2013 10:55 AM Files A normal "flat" file is a collection of information. It's usually stored somewhere reasonably
More informationNVIDIA Professional Application Center
NVIDIA Professional Application Center Network Licensing Guide 5 May 2017 Document version 2.0 Copyright Information 2017 NVIDIA Corporation. All rights reserved. This document is protected under copyright
More informationQuick guide for configuring a system with multiple IP-LINKs
Quick guide for configuring a system with multiple IP-LINKs October 4 th 2005, KK. This guide will show an example configurations for a system with multiple IP-LINKs. Example 1, three devices connected
More informationGetting Started with PetaLinux SDK
Getting Started with PetaLinux SDK November 26, 2009 Table of Contents Table of Contents...2 About This Guide...3 Related PetaLinux Documents...3 Getting Started...3 Prerequisites...3 Installation...4
More informationSirindhorn International Institute of Technology Thammasat University
1 Name...ID....Section. Seat No.. Sirindhorn International Institute of Technology Thammasat University Midterm Examination: Semester 2/2007 Course Title : ITS 332 Information Technology II Lab (Networking)
More informationcron How-To How to use cron to Schedule rsync Synchronizations September 29, 2004
cron How-To How to use cron to Schedule rsync Synchronizations September 29, 2004 615-0006-01 2004 Net Integration Technologies Inc. All company and product names are registered trademarks off their respective
More informationNew System Setup Guide
New System Setup Guide Logging into PBXact UC Quick Setup Wizard STEP 1: Time Zone and Email STEP 2: Extension Creation STEP 3: Extension Customization Dashboard Module Configuration Extensions IVR Inbound
More informationUser module. Guest Configuration APPLICATION NOTE
User module Guest Configuration APPLICATION NOTE USED SYMBOLS Used symbols Danger important notice, which may have an influence on the user s safety or the function of the device. Attention notice on possible
More informationLinux Essentials. Programming and Data Structures Lab M Tech CS First Year, First Semester
Linux Essentials Programming and Data Structures Lab M Tech CS First Year, First Semester Adapted from PDS Lab 2014 and 2015 Login, Logout, Password $ ssh mtc16xx@192.168.---.--- $ ssh X mtc16xx@192.168.---.---
More informationCS 300. Data Structures
CS 300 Data Structures Start VirtualBox Search or Windows Run C:\CS300 Launches CS 300/360 Virtual Machine (Eventually) Logon with Zeus password Syllabus http://zeus.cs.pacificu.edu/chadd/cs300f18/syllabus.html
More informationInstallation von Oracle Real Application Cluster 10gR1 auf CentOS 4.2 mit Raw-Devices
Installation von Oracle Real Application Cluster 10gR1 auf CentOS 4.2 mit Raw-Devices Inhaltsverzeichnis Installation von Oracle Real Application Cluster 10gR1 auf CentOS 4.2 mit Raw-Devices... 1 1. Installation
More informationInternet Tool Practice. 이지민 장동현
Internet Tool Practice 이지민 (jmlee@mmlab.snu.ac.kr) 장동현 (dhjang@mmlab.snu.ac.kr) 2011. 11. 2 1 Outline Internet Tools ping traceroute nslookup ifconfig arp netstat synack nmap Iperf crontab Homeworks 2
More informationGNU/Linux 101. Casey McLaughlin. Research Computing Center Spring Workshop Series 2018
GNU/Linux 101 Casey McLaughlin Research Computing Center Spring Workshop Series 2018 rccworkshop IC;3df4mu bash-2.1~# man workshop Linux101 RCC Workshop L101 OBJECTIVES - Operating system concepts - Linux
More informationHosting Applications Using Configuration Management Tools
Hosting Applications Using Configuration Management Tools Configuration management tools are used to automate manual tasks, such as setting up servers and network devices. As application delivery requirements
More informationOperating Systems Lab 1 (Users, Groups, and Security)
Operating Systems Lab 1 (Users, Groups, and Security) Overview This chapter covers the most common commands related to users, groups, and security. It will also discuss topics like account creation/deletion,
More informationAOS 452 Lab 9 Handout Automated Plot Generation
1 AOS 452 Lab 9 Handout Automated Plot Generation INTRODUCTION The command that is new to this lab is crontab. Crontab allows one to run scripts automatically without having to be at the computer terminal
More informationPetaLinux SDK Guide to QEMU System Simulation
PetaLinux SDK Guide to QEMU System Simulation v1.1 November 27, 2009 Table of Contents Table of Contents...2 About This Guide...3 Related PetaLinux Documents...3 PetaLinux Software Simulation with QEMU...3
More informationAnswers to Even- Numbered Exercises
Answers to Even- 17 Numbered Exercises from page 1077 1. What option should you use with fsck if you want to review the status of your filesystems without making any changes to them? How does fsck determine
More informationShell Script Programs with If Then Else Statements
Shell Script Programs with If Then Else Statements June 3, 2010 Copyright 2010 by World Class CAD, LLC. All Rights Reserved. Adding Comments When we want to place a comment in a Shell Script, we type the
More informationThese documents and software are covered under the terms and conditions of the fp Technologies, Inc. Program License Agreement
Copyright 2017, fp Technologies, Inc. All Rights Reserved These documents and software are covered under the terms and conditions of the fp Technologies, Inc. Program License Agreement You will need to
More informationFiberstoreOS IP Service Configuration Guide
FiberstoreOS IP Service Configuration Guide Contents 1 Configuring ARP...4 1.1 Overview...4 1.2 Configuring ARP... 4 1.3 Validation commands...5 2 Configuring Proxy ARP... 7 2.1 Overview...7 2.2 Configuring
More informationMultiplying Your Server Ubuntu Server and Virtualization
CHAPTER 12 Multiplying Your Server Ubuntu Server and Virtualization One of the hottest new technologies for servers is virtualization, which allows you to install multiple instances of one or more operating
More informationManage Jobs with cron and at
Manage Jobs with cron and at As a SLES 11 administrator, you will find that there are many tasks that need to be carried out on a regular basis on your Linux system. For example, you may need to update
More informationHP Services zl Module ngenius Integrated Agent Installation and Getting Started Guide
HP Services zl Module ngenius Integrated Agent Installation and Getting Started Guide Part Number 733-0207 www.hp.com/networking Revision A www.netscout.com September 28, 2010 Copyright 2008 Hewlett-Packard
More informationCSC209. Software Tools and Systems Programming. https://mcs.utm.utoronto.ca/~209
CSC209 Software Tools and Systems Programming https://mcs.utm.utoronto.ca/~209 What is this Course About? Software Tools Using them Building them Systems Programming Quirks of C The file system System
More informationIntroduction to Unix May 24, 2008
Introduction to Unix May 24, 2008 Exercises: Privileges REFERENCE Reference: Shah, Steve, "Linux Administration: A Beginner's Guide", 2nd. ed., Osborne press, New York, NY. If you look at files in a directory
More informationUNIX File Hierarchy: Structure and Commands
UNIX File Hierarchy: Structure and Commands The UNIX operating system organizes files into a tree structure with a root named by the character /. An example of the directory tree is shown below. / bin
More informationThe following topics explain how and when Prime Network performs backups.
CHAPTER 8 These topics describe how to back up and restore your data: Backing Up Your Data, page 8-1 Restoring Prime Network Data, page 8-4 For information on how to backup and restore an embedded database,
More informationGMSplus Customer Connection Test Procedure
GMS-xx Customer Connection Test Procedure Page 1/14 GMSplus Customer Connection Test Procedure Company: Author: Checked: Approved: Distribution: GeoSIG Ltd Wiesenstrasse 39, 8952 Schlieren, Switzerland,
More informationLinux & Shell Programming 2014
Unit -1: Introduction to UNIX/LINUX Operating System Practical Practice Questions: Find errors (if any) otherwise write output or interpretation of following commands. (Consider default shell is bash shell.)
More informationLinux & Shell Programming 2014
Practical No : 1 Enrollment No: Group : A Practical Problem Write a date command to display date in following format: (Consider current date as 4 th January 2014) 1. dd/mm/yy hh:mm:ss 2. Today's date is:
More informationChapter-3. Introduction to Unix: Fundamental Commands
Chapter-3 Introduction to Unix: Fundamental Commands What You Will Learn The fundamental commands of the Unix operating system. Everything told for Unix here is applicable to the Linux operating system
More information5/20/2007. Touring Essential Programs
Touring Essential Programs Employing fundamental utilities. Managing input and output. Using special characters in the command-line. Managing user environment. Surveying elements of a functioning system.
More informationGetting your department account
02/11/2013 11:35 AM Getting your department account The instructions are at Creating a CS account 02/11/2013 11:36 AM Getting help Vijay Adusumalli will be in the CS majors lab in the basement of the Love
More informationVisibleThread - Server Configuration Help
VisibleThread - Server Configuration Help Version 2.13 (November 2016) Copyright 2017 VisibleThread Limited. This document is the copyright of VisibleThread Limited and may not be reproduced in whole or
More informationSetting Up A High-Availability Load Balancer (With Failover and Session Support) With HAProxy/Wackamole/Spread On Debian Etch
By Falko Timme Published: 2009-01-04 17:28 Setting Up A High-Availability Load Balancer (With Failover and Session Support) With HAProxy/Wackamole/Spread On Debian Etch Version 1.0 Author: Falko Timme
More informationLinux Essentials Objectives Topics:
Linux Essentials Linux Essentials is a professional development certificate program that covers basic knowledge for those working and studying Open Source and various distributions of Linux. Exam Objectives
More informationBasics of GNS3 and Cisco IOS
Lab00: Objectives: Basics of GNS3 and Cisco IOS IERG4090 Lab00 P.1 Upon completion of this lab, you will be able to: - Extract a given topology GNS3 archive - Start GNS3 - Open the given topology file
More informationWelcome to getting started with Ubuntu Server. This System Administrator Manual. guide to be simple to follow, with step by step instructions
Welcome to getting started with Ubuntu 12.04 Server. This System Administrator Manual guide to be simple to follow, with step by step instructions with screenshots INDEX 1.Installation of Ubuntu 12.04
More informationConfiguring the BeagleBone Black s Ethernet Port for SSH Access
Configuring the BeagleBone Black s Ethernet Port for SSH Access NimbeLink Corp Updated: April 2016 PN 30112 rev 1 NimbeLink Corp. 2017. All rights reserved. 1 Table of Contents Table of Contents 2 1. Introduction
More informationCisco HSI Backup and Restore Procedures
CHAPTER 6 The Cisco HSI provides a script for backing up configuration data. The script enables a system administrator to perform manual backups, schedule and administer automatic backups, and view a history
More informationCSC209. Software Tools and Systems Programming. https://mcs.utm.utoronto.ca/~209
CSC209 Software Tools and Systems Programming https://mcs.utm.utoronto.ca/~209 What is this Course About? Software Tools Using them Building them Systems Programming Quirks of C The file system System
More informationUnix Basics. UNIX Introduction. Lecture 14
Unix Basics Lecture 14 UNIX Introduction The UNIX operating system is made up of three parts; the kernel, the shell and the programs. The kernel of UNIX is the hub of the operating system: it allocates
More informationEssential Unix and Linux! Perl for Bioinformatics, ! F. Pineda
Essential Unix and Linux! Perl for Bioinformatics, 140.636! F. Pineda Generic computer architecture Memory Storage Fig. 1.2 From Designing Embedded Hardware, 2 nd Ed. by John Catsoulis OS concepts Shell
More informationSirindhorn International Institute of Technology Thammasat University
Name...ID... Section...Seat No... Sirindhorn International Institute of Technology Thammasat University Midterm Examination s: Semester 2/2009 Course Title Instructor : ITS332 Information Technology II
More informationCS : Computer Programming, Spring 2000 Programming Project #1: Thinking of a Number Due in class Thursday 27 January 2000
CS 1313 010: Computer Programming, Spring 2000 Programming Project #1: Thinking of a Number Due in class Thursday 27 January 2000 For online help check the class website http://www.ecn.ou.edu/cs1313010/
More informationPermission and Ownership
Permission and Ownership 1. Understanding file and directory ownership Every file on your Linux system, including directories, is owned by a specific user and group. Therefore, file permissions are defined
More informationBlueprints. Quick Start Guide for installing and running KVM
Blueprints Quick Start Guide for installing and running KVM Blueprints Quick Start Guide for installing and running KVM Note Before using this information and the product it supports, read the information
More informationUsing Juju with a Local Provider with KVM and LXC in Ubuntu LTS
Using Juju with a Local Provider with KVM and LXC in Ubuntu 14.04 LTS A Dell and Canonical Technical White Paper Mark Wenning Canonical Field Engineer Jose De la Rosa Dell Software Engineer 2 THIS WHITE
More information5/8/2012. Encryption-based Protection. Protection based on Access Permission (Contd) File Security, Setting and Using Permissions Chapter 9
File Security, Setting and Using Permissions Chapter 9 To show the three protection and security mechanisms that UNIX provides To describe the types of users of a UNIX file To discuss the basic operations
More informationLinux Systems Administration Getting Started with Linux
Linux Systems Administration Getting Started with Linux Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International
More informationOperating Systems, Unix Files and Commands SEEM
Operating Systems, Unix Files and Commands SEEM 3460 1 Major Components of Operating Systems (OS) Process management Resource management CPU Memory Device File system Bootstrapping SEEM 3460 2 Programs
More information1. What statistic did the wc -l command show? (do man wc to get the answer) A. The number of bytes B. The number of lines C. The number of words
More Linux Commands 1 wc The Linux command for acquiring size statistics on a file is wc. This command provides the line count, word count and number of bytes in a file. Open up a terminal, make sure you
More informationIntroduction to Unix: Fundamental Commands
Introduction to Unix: Fundamental Commands Ricky Patterson UVA Library Based on slides from Turgut Yilmaz Istanbul Teknik University 1 What We Will Learn The fundamental commands of the Unix operating
More informationLoad Balancing in Oracle Database Real Application Cluster
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 2, Ver. II (Mar.-Apr. 2017), PP 01-06 www.iosrjournals.org Load Balancing in Oracle Database Real Application
More informationFor personnal use only
Network Namespaces in RHEL7 Finnbarr P. Murphy (fpm@fpmurphy.com) Linux namespaces are somewhat like Solaris zones in many ways from a user perspective but have significant differences under the hood.
More informationFiles and Directories
CSCI 2132: Software Development Files and Directories Norbert Zeh Faculty of Computer Science Dalhousie University Winter 2019 Files and Directories Much of the operation of Unix and programs running on
More informationUNIX System Programming Lecture 3: BASH Programming
UNIX System Programming Outline Filesystems Redirection Shell Programming Reference BLP: Chapter 2 BFAQ: Bash FAQ BMAN: Bash man page BPRI: Bash Programming Introduction BABS: Advanced Bash Scripting Guide
More informationReplace HyperFlex Self-Signed SSL Certificates with CA-issued Certificates
Replace HyperFlex Self-Signed SSL Certificates with CA-issued Certificates Contents Google Chrome Mozila FireFox Software Credentials HX Cluster DNS Server Certificate Authority vcenter Server 1. Create
More informationNetworking Approaches in. a Container World. Flavio Castelli Engineering Manager
Networking Approaches in a Container World Flavio Castelli Engineering Manager fcastelli@suse.com Rossella Sblendido Engineering Manager rsblendido@suse.com Disclaimer There a many container engines, I
More informationCS158 - Assignment 9 Faster Naive Bayes? Say it ain t so...
CS158 - Assignment 9 Faster Naive Bayes? Say it ain t so... Part 1 due: Sunday, Nov. 13 by 11:59pm Part 2 due: Sunday, Nov. 20 by 11:59pm http://www.hadoopwizard.com/what-is-hadoop-a-light-hearted-view/
More informationRH-202. RedHat. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs)
RedHat RH-202 Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) Download Full Version : https://killexams.com/pass4sure/exam-detail/rh-202 QUESTION: 159 Install the dialog-* Questions asking
More informationLab Working with Linux Command Line
Introduction In this lab, you will use the Linux command line to manage files and folders and perform some basic administrative tasks. Recommended Equipment A computer with a Linux OS, either installed
More informationCommands are in black
Starting From the Shell Prompt (Terminal) Commands are in black / +--------+---------+-------+---------+---------+------ +------ +------ +------ +------ +------ +-- Bin boot dev etc home media sbin bin
More informationHow to configure VIVACOM 3g USB ( internet ) modem HUAWEI Mobile broadband E173 on Debian and Ubuntu GNU / Linux
How to configure VIVACOM 3g USB ( internet ) modem HUAWEI Mobile broadband E173 on Debian and Ubuntu GNU / Linux Author : admin I've been given a HUAWEI Mobile Broadband E173 USB 3g model. The USB modem
More informationFall 2006 Shell programming, part 3. touch
touch Touch is usually a program, but it can be a shell built-in such as with busybox. The touch program by default changes the access and modification times for the files listed as arguments. If the file
More informationThis document guides the user through: 1. Setting up and configuring networking for the BeagleBone black or green with the host.
Networking Guide for BeagleBone (Black or Green) by Brian Fraser Last update: Nov 17, 2017 This document guides the user through: 1. Setting up and configuring networking for the BeagleBone black or green
More informationUnix Handouts. Shantanu N Kulkarni
Unix Handouts Shantanu N Kulkarni Abstract These handouts are meant to be used as a study aid during my class. They are neither complete nor sincerely accurate. The idea is that the participants should
More informationGetting Started with Application Hosting
This section introduces application hosting and the Linux environment used for hosting applications on the Cisco IOS XR Operating System. Need for Application Hosting, page 1 Deep Dive Into Application
More informationAdding NetFPGA board into CRON. Change wires table, if you change the switch cable connection
Adding NetFPGA board into CRON Lin Xue, lxue2@tigers.lsu.edu, LANET@LSU April 2011 Change wires table, if you change the switch cable connection Note: this might not related to adding a NetFPGA, but this
More informationCS197U: A Hands on Introduction to Unix
CS197U: A Hands on Introduction to Unix Lecture 3: UNIX Operating System Organization Tian Guo CICS, Umass Amherst 1 Reminders Assignment 2 is due THURSDAY 09/24 at 3:45 pm Directions are on the website
More informationHigh Availability for Cisco RAN Management Systems
First Published: 2014-10-13 Last Modified: 2016-06-13 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)
More information