UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES. BSc (Hons) COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATION 2017/2018 UNIX MODULE NO: CPU5003

Size: px
Start display at page:

Download "UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES. BSc (Hons) COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATION 2017/2018 UNIX MODULE NO: CPU5003"

Transcription

1 [CRT06] UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES BSc (Hons) COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATION 2017/2018 UNIX MODULE NO: CPU5003 Date: Wednesday 17 th January 2018 Time: 10:00 12:00 INSTRUCTIONS TO CANDIDATES: There are SIX questions. Answer ANY FOUR questions. All questions carry equal marks. Marks for parts of questions are shown in brackets. Unless otherwise stated all symbols take their usual meaning. Electronic calculators may be used provided that data and program storage memory is cleared prior to the examination.

2 Page 2 of 8 Question 1 Q1 a) Describe the primary function of the following UNIX directories: /home /tmp /var /root /sbin /dev /etc /mnt (8 marks) Q1 b) A root user issues the following sequence of commands in the order shown. After each command, what would be the full pathname of the user s present working directory. (You should assume that the directories /etc/logwatch/scripts/etc and /etc/var do not exist) cd /etc/logwatch/scripts cd etc cd../.. cd var cd /var cd.. cd - cd ~/private cd / cd.. cd. cd ~ cd../var cd spool cd /etc/passwd cd mail cd (17 marks)

3 Page 3 of 8 Question 2 Q2 a) Compare and contrast the three formats of iteration commonly used in UNIX bash scripting. You should explain in detail how these forms of iteration operate and illustrate your answer with example algorithms. (25 marks) Question 3 Q3 a) Examine the following two lines of code. Only one of these would work correctly. Describe what these operators do and explain why one is correct while the other is wrong. (6 marks) who grep rhc1 echo user rhc1bct is logged on who grep rhc1 && echo user rhc1bct is logged on Q3 b) Write a script that will ping the IP address once and only once. Based on wether or not the ping was successful the script should then echo either the phrase is fine or is down. (10 marks) Q3 c) A common form of conditional statement used in shell scripting is the case statement. Write a short shell script the employs a case statement. (9 marks)

4 Page 4 of 8 Question 4 Q4 a) Write a command that will extract the broadcast address from the output of the /sbin/ifconfig command. An example of the /sbin/ifconfig output can be found below. In this case the broadcast address (4 marks) [root@pascal cron]# /sbin/ifconfig eth0 eth0 Link encap:ethernet HWaddr 00:0C:29:D0:2E:53 inet addr: Bcast: Mask: inet6 addr: fe80::20c:29ff:fed0:2e53/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:2456 errors:0 dropped:0 overruns:0 frame:0 TX packets:1604 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes: (161.7 KiB) TX bytes: (147.1 KiB) Q4 b) Write a command that would extract the hardware address from the output of the /sbin/ifconfig command and save it in a variable named hardware. In the example above the hardware address is 00:0C:29:D0:2E:53 (4 marks) Q4 c) What would the effect of the following command be and what is the purpose of the pipe? (4 marks) cat /etc/passwd grep n$ To assist you an example of a UNIX password file (/etc/passwd) is below: root@gem-gateway ~]# cat /etc/passwd root:x:0:0:root:/root:/bin/bash bin:x:1:1:bin:/bin:/sbin/nologin daemon:x:2:2:daemon:/sbin:/sbin/nologin information taken out ra4bct:x:303:500::/home/ra4bct:/bin/bash ad3ect:x:304:500::/home/ad3ect:/bin/bash rc2ect:x:305:500::/home/rc2ect:/bin/bash lb1bct:x:306:500::/home/lb1bct:/bin/bash ai1ect:x:309:500::/home/ai1ect:/bin/bash tut1mon:x:310:501::/home/tut1mon:/bin/bash tut1tue:x:311:501::/home/tut1tue:/bin/bash tut2wed:x:312:501::/home/tut2wed:/bin/bash information taken out Question 4 continues over the page.

5 Page 5 of 8 Question 4 continued. Q4 d) Below is the output of the command cat /etc/hosts executed on a machine in the University of Bolton called ruby. While examining this /etc/hosts file, an administrator notices that the domain names are all incorrect. All machines refer to bct where as they should refer to cet. For example sapphire.bct.bolton.ac.uk should be sapphire.cet.bolton.ac.uk. Write a series of commands that would facilitate this change without the need for the file to be edited manually. (5 marks) [root@ruby ~]# cat /etc/hosts # # Hosts on the Gem network ruby.bct.bolton.ac.uk ruby garnet.bct.bolton.ac.uk garnet pearl.bct.bolton.ac.uk pearl sapphire.bct.bolton.ac.uk sapphire ruby.bct.bolton.ac.uk ruby jet.bct.bolton.ac.uk jet onyx.bct.bolton.ac.uk onyx emerald.bct.bolton.ac.uk emerald kirk.bct.bolton.ac.uk kirk spock.bct.bolton.ac.uk spock mars.bct.bolton.ac.uk mars twix.bct.bolton.ac.uk twix information taken out. Q4 e) Write a command that will extract from the /etc/hosts file, all lines that refer to machines with an IP address in the range to (8 marks)

6 Page 6 of 8 Question 5 Q5 a) Examine the following output.. [rhc1@central ~]$ ls -l total 8 -rwxr-xr-- 1 rhc1 secgroup 2716 Oct 30 12:37 syschange [rhc1@central ~]$ The user rhc1 would like to change the permissions on the file syschange so that other members of his group can read the script but cannot execute it. What command might he issue to make this change? No other permissions on the file should be changed. What would be the effect of the following two commands: chmod 666 syschange chmod 755 syschange (4 marks) Q5 b) Examine the following output and provide an interpretation of the permissions listed that explains who has permission to do what. (11 marks) [root@central ~]$ ls -l total 16 -rwxr-x--x 1 root secgroup Apr 20 22: datafile drwxr-xr-- 1 root secgroup Mar 20 20: systemdata [root@central ~]$ Q5 c) Provide a brief overview of the sticky bit. Ensure that you cover its affect, how it is assigned and how you can tell if it is present. (4 marks) Q5 d) Explain the concept of an SUID script. How do you create such a script, how do its permissions appear and why are they often viewed as a security risk? (6 marks)

7 Page 7 of 8 Question 6 Q6 a) A UNIX system that provides a service to a retail organisation is used around the clock each weekend. Each week day it runs from 10 am to 10 pm. Accordingly the service hours each week are : Tuesday 10 am to Tuesday 10pm Wednesday 10 am to Wednesday 10 pm Thursday 10 am to Thursday 10 pm Friday 10 am to Monday 10 pm Two requests have been made of the UNIX administrator. One is that a reboot should be scheduled at some point each night that the service is not required. Secondly, a backup script (/usr/local/bin/backup) has been produced that takes 3 hours to run, this script needs to run once a week at a time that the service not in use. Provide a detailed explanation of how cron can be used to achieve this inclusive of the configuration changes that need to be made and the commands that will be used (15 marks) To assist you, an extract from the output of the command man cron can be found below. [rhc1@cet-apache-02 ~]$ man cron. information taken out. The time and date fields are: field allowed values minute 0-59 hour 0-23 day of month 1-31 month 1-12 (or names, see below) day of week 0-7 (0 or 7 is Sun, or use names) A field may be an asterisk (*), which always stands for first-last.. information taken out. Question 6 continues over the page.

8 Page 8 of 8 Question 6 continued. Q6 b) A 24 hour power cut has been scheduled for a server room while the UNIX administrator is away at a conference. To this end the administrator has decided to implement a series of at commands that will remind users of the power cut, stop them login in and ensure that the system is shut down in an orderly manner. Assuming the current time to be 9.00 am on Thursday morning, write a series of commands as root, that will schedule the following events : at 4 pm this evening, send a message to all users informing them that the system will unavailable from midnight on Friday to midnight on Saturday. at 10 am on Friday morning, send a message to all users informing them that they only have 14 hours remaining until the shutdown. at 8.00 pm on Friday evening create a file called /etc/nologin (the existence of this file will stop users from logging in) at pm on Friday evening shutdown the system. at 1 am on Sunday morning, delete the /etc/nologin file (10 marks) END OF QUESTIONS

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES. BSc (Hons) COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATION 2014/2015 UNIX MODULE NO: CPU5003

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES. BSc (Hons) COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATION 2014/2015 UNIX MODULE NO: CPU5003 [CRT09] UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES BSc (Hons) COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATION 2014/2015 MODULE NO: CPU5003 Date: Wednesday 21 st January 2015 Time: 10:00 13:00 INSTRUCTIONS

More information

Let us ping! First we will learn the Hello World of a networked machine.

Let us ping! First we will learn the Hello World of a networked machine. AN INTRODUCTION TO LINUX NETWORKING In this article, we ll explore networking under GNU/Linux. You ll find it interesting to manage the entire network through certain valid keystrokes known as commands.

More information

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING WITH WEBSITE DEVELOPMENT SEMESTER ONE EXAMINATIONS 2018/2019 UNIX MODULE NO: CPU5003

UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING WITH WEBSITE DEVELOPMENT SEMESTER ONE EXAMINATIONS 2018/2019 UNIX MODULE NO: CPU5003 [CRT08] UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING WITH WEBSITE DEVELOPMENT SEMESTER ONE EXAMINATIONS 2018/2019 UNIX MODULE NO: CPU5003 Date: Wednesday 16 th January 2019 Time: 10:00 12:00 INSTRUCTIONS

More information

Wi-Fi Guide: Edimax USB Adapter on BBG

Wi-Fi Guide: Edimax USB Adapter on BBG Wi-Fi Guide: Edimax USB Adapter on BBG August 3 rd 2017 Table of Contents: Page 1: Page 2: Page 3: Page 4: Page 5: Introduction & Hardware requirements Getting Started Connecting to a network using Network

More information

CIS Test 1- Practice - Fall 2011

CIS Test 1- Practice - Fall 2011 CIS 192 - Test 1- Practice - Fall 2011 Name Each question worth 2 points: Tip: When not logged in as root, you can still use many of the network commands but you must preface them with /sbin/ because you

More information

IP over IB Protocol. Introduction CHAPTER

IP over IB Protocol. Introduction CHAPTER CHAPTER 3 The following sections appear in this chapter: Introduction, page 3-1 Manually Configure IPoIB for Default IB Partition, page 3-2 Subinterfaces, page 3-2 Verify IPoIB Functionality, page 3-5

More information

Enabling CDC_ETHER Connection for Skywire GSM CAT1

Enabling CDC_ETHER Connection for Skywire GSM CAT1 Enabling CDC_ETHER Connection for Skywire GSM CAT1 NimbeLink Corp Updated: February 2018 PN 30262 rev 4 NimbeLink Corp. 2018. All rights reserved. 1 Table of Contents Table of Contents 2 1. Introduction

More information

GM8126 MAC DRIVER. User Guide Rev.: 1.0 Issue Date: December 2010

GM8126 MAC DRIVER. User Guide Rev.: 1.0 Issue Date: December 2010 GM8126 MAC DRIVER User Guide Rev.: 1.0 Issue Date: December 2010 REVISION HISTORY Date Rev. From To Dec. 2010 1.0 - Original Copyright 2010 Grain Media, Inc. All Rights Reserved. Printed in Taiwan 2010

More information

Create Test Environment

Create Test Environment Create Test Environment Describes how to set up the Trafodion test environment used by developers and testers Prerequisites Python Passwordless ssh If you already have an existing set of ssh keys If you

More information

Enabling CDC-ETHER Connection for Skywire CAT1

Enabling CDC-ETHER Connection for Skywire CAT1 Enabling CDC-ETHER Connection for Skywire CAT1 NimbeLink Corp Updated: May 2017 PN 30111 rev 5 NimbeLink Corp. 2017. All rights reserved. 1 Table of Contents Table of Contents 2 1. Introduction 2 1.1 Orderable

More information

TABLE OF CONTENTS. ACI Solutions Team by Tomas de Leon 2

TABLE OF CONTENTS. ACI Solutions Team by Tomas de Leon 2 TABLE OF CONTENTS 1 INTRODUCTION... 3 2 LAB REFERENCE & TOPOLOGY INFORMATION... 3 3 DELETE THE EXISTING OUT OF BAND NODE MANAGEMENT ADDRESSES CONFIGURATION FOR YOUR DESIGNATED ACI FABRIC... 4 4 CONFIGURE

More information

StampA5D3x/PortuxA5/PanelA5. Quickstart Guide

StampA5D3x/PortuxA5/PanelA5. Quickstart Guide StampA5D3x/PortuxA5/PanelA5 Quickstart Guide StampA5D3x/PortuxA5/PanelA5 StampA5D3x/PortuxA5/PanelA5: Quickstart Guide Copyright 2015 taskit GmbH All rights to this documentation and to the product(s)

More information

Accessing the Networking Stack

Accessing the Networking Stack The Cisco IOS XR Software serves as a networking stack for communication. This section explains how applications on IOS XR can communicate with internal processes, and with servers or outside devices.

More information

RG-MACC_2.0 Installation Manual

RG-MACC_2.0 Installation Manual RG-MACC_2.0 Installation Manual Ruijie Networks Co., Ltd all rights reserved 1 Copyright Clarify Copyright ownership belongs to Ruijie, shall not be reproduced, copied, or used in other ways without permission.

More information

Using Shell Commands

Using Shell Commands This chapter contains the following sections: General Administration, page 1 Working with Databases, page 9 Importing Certificates, page 13 Accessing Root Privileges, page 14 Using a Multi-Node Setup,

More information

Oracle 11g RAC on Linux- CRS Inderpal S. Johal. Inderpal S. Johal

Oracle 11g RAC on Linux- CRS   Inderpal S. Johal. Inderpal S. Johal ORACLE CRS INSTALLATION : INSTALLATION AND CONFIGURATION GUIDE Inderpal S. Johal INTRODUCTION This document will gives details of Oracle Clusterware installation on RHEL 4. CRS INSTALLATION STEPS 1. Cluster

More information

Configuring a Standalone VCL Environment using VMware Server 2.0

Configuring a Standalone VCL Environment using VMware Server 2.0 Configuring a Standalone VCL Environment using VMware Server 2.0 DISCLAIMER! This document provides instuctions for configuring a standalone VCL environment running on a single computer which is able to

More information

XE2000/XE3000 IP-PBX: Getting Started Guide Package Contents

XE2000/XE3000 IP-PBX: Getting Started Guide Package Contents XE2000/XE3000 IP-PBX: Getting Started Guide Package Contents XE2000/XE3000 (2U 19'' width unit) Power cord Support hardware for 19'' cabinet Prerequisites You need a computer equipped with Internet browser.

More information

Hostname and IP Address

Hostname and IP Address 1/19 IP Addressing Surasak Sanguanpong nguan@ku.ac.th http://www.cpe.ku.ac.th/~nguan Last updated: 27 June 2002 Hostname and IP Address 2/19 browser What is the IP address of www.isoc.org? www.isoc.org

More information

CHAPTER 7 DEMONSTRATE THE PAN IN LINUX

CHAPTER 7 DEMONSTRATE THE PAN IN LINUX CHAPTER 7 DEMONSTRATE THE PAN IN LINUX SYSTEM The new model - Network Access Point Group Network 7.1 DEMONSTRATION Software: All machines are installed with Linux Redhat 8.0 Hardware list:- There are two

More information

RG-MACC-BASE_v2.01. Installation Guide

RG-MACC-BASE_v2.01. Installation Guide RG-MACC-BASE_v2.01 Preface Thank you for using our products. Audience This manual is intended for: Network engineers Technical support and servicing engineers Network administrators Symbols Important information.

More information

Newsreader virtual machines Technical Report NWR

Newsreader virtual machines Technical Report NWR Newsreader virtual machines Technical Report NWR-2014-4 Version FINAL Aitor Soroa 1, Enrique Fernández 2 1 University of Basque Country Donostia, Basque Country a.soroa@ehu.es 2 University of Basque Country

More information

UCS IPv6 Management Configuration Example

UCS IPv6 Management Configuration Example UCS IPv6 Management Configuration Example Document ID: 118784 Contributed by Padmanabhan Ramaswamy and Shankar Prasath, Cisco TAC Engineers. Mar 06, 2015 Contents Introduction Prerequisites Requirements

More information

Clustered Data ONTAP 8.3 Update 2, IPspaces. Self-paced Lab NETAPP UNIVERSITY. NetApp University - Do Not Distribute

Clustered Data ONTAP 8.3 Update 2, IPspaces. Self-paced Lab NETAPP UNIVERSITY. NetApp University - Do Not Distribute NETAPP UNIVERSITY Clustered Data ONTAP 8.3 Update 2, IPspaces Self-paced Lab Course ID: STRSW-SPL-CDOT83UPD2 Content Version: 1.0 ATTENTION The information contained in this course is intended only for

More information

ssh keys, yum, ntp, rsync

ssh keys, yum, ntp, rsync ssh keys, yum, ntp, rsync 1 CST8177 Linux Operating Systems II Saturday 25-April-15 9:00-11:00 T119/T126 2 ifconfig to find your VM's ip address so you can ssh to it ssh key login yum ntp tar scp rsync

More information

Network Configuration for Cisco UCS Director Baremetal Agent

Network Configuration for Cisco UCS Director Baremetal Agent Network Configuration for Cisco UCS Director Baremetal Agent This chapter contains the following sections: About the Network Configuration Options, page 1 Single Network for Management and PXE, page 1

More information

Chapter 5 Network Layer

Chapter 5 Network Layer Chapter 5 Network Layer Network Layer IPv4 2 IP Header Application Header + data 3 IP IP IP IP 4 Focus on Transport Layer IP IP 5 Network Layer The Network layer (Layer 3) provides services to exchange

More information

Access Server: User's and Developer's Guide <<< Previous Next >>>

Access Server: User's and Developer's Guide <<< Previous Next >>> 1 of 14 12/9/2008 10:18 AM Access Server: User's and Developer's Guide > Chapter 2. Getting Started with Access Server Access Server can be controlled in three ways: by using the WWW

More information

Files

Files http://www.cs.fsu.edu/~langley/cop3353-2013-1/reveal.js-2013-02-11/02.html?print-pdf 02/11/2013 10:55 AM Files A normal "flat" file is a collection of information. It's usually stored somewhere reasonably

More information

NVIDIA Professional Application Center

NVIDIA Professional Application Center NVIDIA Professional Application Center Network Licensing Guide 5 May 2017 Document version 2.0 Copyright Information 2017 NVIDIA Corporation. All rights reserved. This document is protected under copyright

More information

Quick guide for configuring a system with multiple IP-LINKs

Quick guide for configuring a system with multiple IP-LINKs Quick guide for configuring a system with multiple IP-LINKs October 4 th 2005, KK. This guide will show an example configurations for a system with multiple IP-LINKs. Example 1, three devices connected

More information

Getting Started with PetaLinux SDK

Getting Started with PetaLinux SDK Getting Started with PetaLinux SDK November 26, 2009 Table of Contents Table of Contents...2 About This Guide...3 Related PetaLinux Documents...3 Getting Started...3 Prerequisites...3 Installation...4

More information

Sirindhorn International Institute of Technology Thammasat University

Sirindhorn International Institute of Technology Thammasat University 1 Name...ID....Section. Seat No.. Sirindhorn International Institute of Technology Thammasat University Midterm Examination: Semester 2/2007 Course Title : ITS 332 Information Technology II Lab (Networking)

More information

cron How-To How to use cron to Schedule rsync Synchronizations September 29, 2004

cron How-To How to use cron to Schedule rsync Synchronizations September 29, 2004 cron How-To How to use cron to Schedule rsync Synchronizations September 29, 2004 615-0006-01 2004 Net Integration Technologies Inc. All company and product names are registered trademarks off their respective

More information

New System Setup Guide

New System Setup Guide New System Setup Guide Logging into PBXact UC Quick Setup Wizard STEP 1: Time Zone and Email STEP 2: Extension Creation STEP 3: Extension Customization Dashboard Module Configuration Extensions IVR Inbound

More information

User module. Guest Configuration APPLICATION NOTE

User module. Guest Configuration APPLICATION NOTE User module Guest Configuration APPLICATION NOTE USED SYMBOLS Used symbols Danger important notice, which may have an influence on the user s safety or the function of the device. Attention notice on possible

More information

Linux Essentials. Programming and Data Structures Lab M Tech CS First Year, First Semester

Linux Essentials. Programming and Data Structures Lab M Tech CS First Year, First Semester Linux Essentials Programming and Data Structures Lab M Tech CS First Year, First Semester Adapted from PDS Lab 2014 and 2015 Login, Logout, Password $ ssh mtc16xx@192.168.---.--- $ ssh X mtc16xx@192.168.---.---

More information

CS 300. Data Structures

CS 300. Data Structures CS 300 Data Structures Start VirtualBox Search or Windows Run C:\CS300 Launches CS 300/360 Virtual Machine (Eventually) Logon with Zeus password Syllabus http://zeus.cs.pacificu.edu/chadd/cs300f18/syllabus.html

More information

Installation von Oracle Real Application Cluster 10gR1 auf CentOS 4.2 mit Raw-Devices

Installation von Oracle Real Application Cluster 10gR1 auf CentOS 4.2 mit Raw-Devices Installation von Oracle Real Application Cluster 10gR1 auf CentOS 4.2 mit Raw-Devices Inhaltsverzeichnis Installation von Oracle Real Application Cluster 10gR1 auf CentOS 4.2 mit Raw-Devices... 1 1. Installation

More information

Internet Tool Practice. 이지민 장동현

Internet Tool Practice. 이지민 장동현 Internet Tool Practice 이지민 (jmlee@mmlab.snu.ac.kr) 장동현 (dhjang@mmlab.snu.ac.kr) 2011. 11. 2 1 Outline Internet Tools ping traceroute nslookup ifconfig arp netstat synack nmap Iperf crontab Homeworks 2

More information

GNU/Linux 101. Casey McLaughlin. Research Computing Center Spring Workshop Series 2018

GNU/Linux 101. Casey McLaughlin. Research Computing Center Spring Workshop Series 2018 GNU/Linux 101 Casey McLaughlin Research Computing Center Spring Workshop Series 2018 rccworkshop IC;3df4mu bash-2.1~# man workshop Linux101 RCC Workshop L101 OBJECTIVES - Operating system concepts - Linux

More information

Hosting Applications Using Configuration Management Tools

Hosting Applications Using Configuration Management Tools Hosting Applications Using Configuration Management Tools Configuration management tools are used to automate manual tasks, such as setting up servers and network devices. As application delivery requirements

More information

Operating Systems Lab 1 (Users, Groups, and Security)

Operating Systems Lab 1 (Users, Groups, and Security) Operating Systems Lab 1 (Users, Groups, and Security) Overview This chapter covers the most common commands related to users, groups, and security. It will also discuss topics like account creation/deletion,

More information

AOS 452 Lab 9 Handout Automated Plot Generation

AOS 452 Lab 9 Handout Automated Plot Generation 1 AOS 452 Lab 9 Handout Automated Plot Generation INTRODUCTION The command that is new to this lab is crontab. Crontab allows one to run scripts automatically without having to be at the computer terminal

More information

PetaLinux SDK Guide to QEMU System Simulation

PetaLinux SDK Guide to QEMU System Simulation PetaLinux SDK Guide to QEMU System Simulation v1.1 November 27, 2009 Table of Contents Table of Contents...2 About This Guide...3 Related PetaLinux Documents...3 PetaLinux Software Simulation with QEMU...3

More information

Answers to Even- Numbered Exercises

Answers to Even- Numbered Exercises Answers to Even- 17 Numbered Exercises from page 1077 1. What option should you use with fsck if you want to review the status of your filesystems without making any changes to them? How does fsck determine

More information

Shell Script Programs with If Then Else Statements

Shell Script Programs with If Then Else Statements Shell Script Programs with If Then Else Statements June 3, 2010 Copyright 2010 by World Class CAD, LLC. All Rights Reserved. Adding Comments When we want to place a comment in a Shell Script, we type the

More information

These documents and software are covered under the terms and conditions of the fp Technologies, Inc. Program License Agreement

These documents and software are covered under the terms and conditions of the fp Technologies, Inc. Program License Agreement Copyright 2017, fp Technologies, Inc. All Rights Reserved These documents and software are covered under the terms and conditions of the fp Technologies, Inc. Program License Agreement You will need to

More information

FiberstoreOS IP Service Configuration Guide

FiberstoreOS IP Service Configuration Guide FiberstoreOS IP Service Configuration Guide Contents 1 Configuring ARP...4 1.1 Overview...4 1.2 Configuring ARP... 4 1.3 Validation commands...5 2 Configuring Proxy ARP... 7 2.1 Overview...7 2.2 Configuring

More information

Multiplying Your Server Ubuntu Server and Virtualization

Multiplying Your Server Ubuntu Server and Virtualization CHAPTER 12 Multiplying Your Server Ubuntu Server and Virtualization One of the hottest new technologies for servers is virtualization, which allows you to install multiple instances of one or more operating

More information

Manage Jobs with cron and at

Manage Jobs with cron and at Manage Jobs with cron and at As a SLES 11 administrator, you will find that there are many tasks that need to be carried out on a regular basis on your Linux system. For example, you may need to update

More information

HP Services zl Module ngenius Integrated Agent Installation and Getting Started Guide

HP Services zl Module ngenius Integrated Agent Installation and Getting Started Guide HP Services zl Module ngenius Integrated Agent Installation and Getting Started Guide Part Number 733-0207 www.hp.com/networking Revision A www.netscout.com September 28, 2010 Copyright 2008 Hewlett-Packard

More information

CSC209. Software Tools and Systems Programming. https://mcs.utm.utoronto.ca/~209

CSC209. Software Tools and Systems Programming. https://mcs.utm.utoronto.ca/~209 CSC209 Software Tools and Systems Programming https://mcs.utm.utoronto.ca/~209 What is this Course About? Software Tools Using them Building them Systems Programming Quirks of C The file system System

More information

Introduction to Unix May 24, 2008

Introduction to Unix May 24, 2008 Introduction to Unix May 24, 2008 Exercises: Privileges REFERENCE Reference: Shah, Steve, "Linux Administration: A Beginner's Guide", 2nd. ed., Osborne press, New York, NY. If you look at files in a directory

More information

UNIX File Hierarchy: Structure and Commands

UNIX File Hierarchy: Structure and Commands UNIX File Hierarchy: Structure and Commands The UNIX operating system organizes files into a tree structure with a root named by the character /. An example of the directory tree is shown below. / bin

More information

The following topics explain how and when Prime Network performs backups.

The following topics explain how and when Prime Network performs backups. CHAPTER 8 These topics describe how to back up and restore your data: Backing Up Your Data, page 8-1 Restoring Prime Network Data, page 8-4 For information on how to backup and restore an embedded database,

More information

GMSplus Customer Connection Test Procedure

GMSplus Customer Connection Test Procedure GMS-xx Customer Connection Test Procedure Page 1/14 GMSplus Customer Connection Test Procedure Company: Author: Checked: Approved: Distribution: GeoSIG Ltd Wiesenstrasse 39, 8952 Schlieren, Switzerland,

More information

Linux & Shell Programming 2014

Linux & Shell Programming 2014 Unit -1: Introduction to UNIX/LINUX Operating System Practical Practice Questions: Find errors (if any) otherwise write output or interpretation of following commands. (Consider default shell is bash shell.)

More information

Linux & Shell Programming 2014

Linux & Shell Programming 2014 Practical No : 1 Enrollment No: Group : A Practical Problem Write a date command to display date in following format: (Consider current date as 4 th January 2014) 1. dd/mm/yy hh:mm:ss 2. Today's date is:

More information

Chapter-3. Introduction to Unix: Fundamental Commands

Chapter-3. Introduction to Unix: Fundamental Commands Chapter-3 Introduction to Unix: Fundamental Commands What You Will Learn The fundamental commands of the Unix operating system. Everything told for Unix here is applicable to the Linux operating system

More information

5/20/2007. Touring Essential Programs

5/20/2007. Touring Essential Programs Touring Essential Programs Employing fundamental utilities. Managing input and output. Using special characters in the command-line. Managing user environment. Surveying elements of a functioning system.

More information

Getting your department account

Getting your department account 02/11/2013 11:35 AM Getting your department account The instructions are at Creating a CS account 02/11/2013 11:36 AM Getting help Vijay Adusumalli will be in the CS majors lab in the basement of the Love

More information

VisibleThread - Server Configuration Help

VisibleThread - Server Configuration Help VisibleThread - Server Configuration Help Version 2.13 (November 2016) Copyright 2017 VisibleThread Limited. This document is the copyright of VisibleThread Limited and may not be reproduced in whole or

More information

Setting Up A High-Availability Load Balancer (With Failover and Session Support) With HAProxy/Wackamole/Spread On Debian Etch

Setting Up A High-Availability Load Balancer (With Failover and Session Support) With HAProxy/Wackamole/Spread On Debian Etch By Falko Timme Published: 2009-01-04 17:28 Setting Up A High-Availability Load Balancer (With Failover and Session Support) With HAProxy/Wackamole/Spread On Debian Etch Version 1.0 Author: Falko Timme

More information

Linux Essentials Objectives Topics:

Linux Essentials Objectives Topics: Linux Essentials Linux Essentials is a professional development certificate program that covers basic knowledge for those working and studying Open Source and various distributions of Linux. Exam Objectives

More information

Basics of GNS3 and Cisco IOS

Basics of GNS3 and Cisco IOS Lab00: Objectives: Basics of GNS3 and Cisco IOS IERG4090 Lab00 P.1 Upon completion of this lab, you will be able to: - Extract a given topology GNS3 archive - Start GNS3 - Open the given topology file

More information

Welcome to getting started with Ubuntu Server. This System Administrator Manual. guide to be simple to follow, with step by step instructions

Welcome to getting started with Ubuntu Server. This System Administrator Manual. guide to be simple to follow, with step by step instructions Welcome to getting started with Ubuntu 12.04 Server. This System Administrator Manual guide to be simple to follow, with step by step instructions with screenshots INDEX 1.Installation of Ubuntu 12.04

More information

Configuring the BeagleBone Black s Ethernet Port for SSH Access

Configuring the BeagleBone Black s Ethernet Port for SSH Access Configuring the BeagleBone Black s Ethernet Port for SSH Access NimbeLink Corp Updated: April 2016 PN 30112 rev 1 NimbeLink Corp. 2017. All rights reserved. 1 Table of Contents Table of Contents 2 1. Introduction

More information

Cisco HSI Backup and Restore Procedures

Cisco HSI Backup and Restore Procedures CHAPTER 6 The Cisco HSI provides a script for backing up configuration data. The script enables a system administrator to perform manual backups, schedule and administer automatic backups, and view a history

More information

CSC209. Software Tools and Systems Programming. https://mcs.utm.utoronto.ca/~209

CSC209. Software Tools and Systems Programming. https://mcs.utm.utoronto.ca/~209 CSC209 Software Tools and Systems Programming https://mcs.utm.utoronto.ca/~209 What is this Course About? Software Tools Using them Building them Systems Programming Quirks of C The file system System

More information

Unix Basics. UNIX Introduction. Lecture 14

Unix Basics. UNIX Introduction. Lecture 14 Unix Basics Lecture 14 UNIX Introduction The UNIX operating system is made up of three parts; the kernel, the shell and the programs. The kernel of UNIX is the hub of the operating system: it allocates

More information

Essential Unix and Linux! Perl for Bioinformatics, ! F. Pineda

Essential Unix and Linux! Perl for Bioinformatics, ! F. Pineda Essential Unix and Linux! Perl for Bioinformatics, 140.636! F. Pineda Generic computer architecture Memory Storage Fig. 1.2 From Designing Embedded Hardware, 2 nd Ed. by John Catsoulis OS concepts Shell

More information

Sirindhorn International Institute of Technology Thammasat University

Sirindhorn International Institute of Technology Thammasat University Name...ID... Section...Seat No... Sirindhorn International Institute of Technology Thammasat University Midterm Examination s: Semester 2/2009 Course Title Instructor : ITS332 Information Technology II

More information

CS : Computer Programming, Spring 2000 Programming Project #1: Thinking of a Number Due in class Thursday 27 January 2000

CS : Computer Programming, Spring 2000 Programming Project #1: Thinking of a Number Due in class Thursday 27 January 2000 CS 1313 010: Computer Programming, Spring 2000 Programming Project #1: Thinking of a Number Due in class Thursday 27 January 2000 For online help check the class website http://www.ecn.ou.edu/cs1313010/

More information

Permission and Ownership

Permission and Ownership Permission and Ownership 1. Understanding file and directory ownership Every file on your Linux system, including directories, is owned by a specific user and group. Therefore, file permissions are defined

More information

Blueprints. Quick Start Guide for installing and running KVM

Blueprints. Quick Start Guide for installing and running KVM Blueprints Quick Start Guide for installing and running KVM Blueprints Quick Start Guide for installing and running KVM Note Before using this information and the product it supports, read the information

More information

Using Juju with a Local Provider with KVM and LXC in Ubuntu LTS

Using Juju with a Local Provider with KVM and LXC in Ubuntu LTS Using Juju with a Local Provider with KVM and LXC in Ubuntu 14.04 LTS A Dell and Canonical Technical White Paper Mark Wenning Canonical Field Engineer Jose De la Rosa Dell Software Engineer 2 THIS WHITE

More information

5/8/2012. Encryption-based Protection. Protection based on Access Permission (Contd) File Security, Setting and Using Permissions Chapter 9

5/8/2012. Encryption-based Protection. Protection based on Access Permission (Contd) File Security, Setting and Using Permissions Chapter 9 File Security, Setting and Using Permissions Chapter 9 To show the three protection and security mechanisms that UNIX provides To describe the types of users of a UNIX file To discuss the basic operations

More information

Linux Systems Administration Getting Started with Linux

Linux Systems Administration Getting Started with Linux Linux Systems Administration Getting Started with Linux Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International

More information

Operating Systems, Unix Files and Commands SEEM

Operating Systems, Unix Files and Commands SEEM Operating Systems, Unix Files and Commands SEEM 3460 1 Major Components of Operating Systems (OS) Process management Resource management CPU Memory Device File system Bootstrapping SEEM 3460 2 Programs

More information

1. What statistic did the wc -l command show? (do man wc to get the answer) A. The number of bytes B. The number of lines C. The number of words

1. What statistic did the wc -l command show? (do man wc to get the answer) A. The number of bytes B. The number of lines C. The number of words More Linux Commands 1 wc The Linux command for acquiring size statistics on a file is wc. This command provides the line count, word count and number of bytes in a file. Open up a terminal, make sure you

More information

Introduction to Unix: Fundamental Commands

Introduction to Unix: Fundamental Commands Introduction to Unix: Fundamental Commands Ricky Patterson UVA Library Based on slides from Turgut Yilmaz Istanbul Teknik University 1 What We Will Learn The fundamental commands of the Unix operating

More information

Load Balancing in Oracle Database Real Application Cluster

Load Balancing in Oracle Database Real Application Cluster IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 19, Issue 2, Ver. II (Mar.-Apr. 2017), PP 01-06 www.iosrjournals.org Load Balancing in Oracle Database Real Application

More information

For personnal use only

For personnal use only Network Namespaces in RHEL7 Finnbarr P. Murphy (fpm@fpmurphy.com) Linux namespaces are somewhat like Solaris zones in many ways from a user perspective but have significant differences under the hood.

More information

Files and Directories

Files and Directories CSCI 2132: Software Development Files and Directories Norbert Zeh Faculty of Computer Science Dalhousie University Winter 2019 Files and Directories Much of the operation of Unix and programs running on

More information

UNIX System Programming Lecture 3: BASH Programming

UNIX System Programming Lecture 3: BASH Programming UNIX System Programming Outline Filesystems Redirection Shell Programming Reference BLP: Chapter 2 BFAQ: Bash FAQ BMAN: Bash man page BPRI: Bash Programming Introduction BABS: Advanced Bash Scripting Guide

More information

Replace HyperFlex Self-Signed SSL Certificates with CA-issued Certificates

Replace HyperFlex Self-Signed SSL Certificates with CA-issued Certificates Replace HyperFlex Self-Signed SSL Certificates with CA-issued Certificates Contents Google Chrome Mozila FireFox Software Credentials HX Cluster DNS Server Certificate Authority vcenter Server 1. Create

More information

Networking Approaches in. a Container World. Flavio Castelli Engineering Manager

Networking Approaches in. a Container World. Flavio Castelli Engineering Manager Networking Approaches in a Container World Flavio Castelli Engineering Manager fcastelli@suse.com Rossella Sblendido Engineering Manager rsblendido@suse.com Disclaimer There a many container engines, I

More information

CS158 - Assignment 9 Faster Naive Bayes? Say it ain t so...

CS158 - Assignment 9 Faster Naive Bayes? Say it ain t so... CS158 - Assignment 9 Faster Naive Bayes? Say it ain t so... Part 1 due: Sunday, Nov. 13 by 11:59pm Part 2 due: Sunday, Nov. 20 by 11:59pm http://www.hadoopwizard.com/what-is-hadoop-a-light-hearted-view/

More information

RH-202. RedHat. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs)

RH-202. RedHat. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) RedHat RH-202 Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) Download Full Version : https://killexams.com/pass4sure/exam-detail/rh-202 QUESTION: 159 Install the dialog-* Questions asking

More information

Lab Working with Linux Command Line

Lab Working with Linux Command Line Introduction In this lab, you will use the Linux command line to manage files and folders and perform some basic administrative tasks. Recommended Equipment A computer with a Linux OS, either installed

More information

Commands are in black

Commands are in black Starting From the Shell Prompt (Terminal) Commands are in black / +--------+---------+-------+---------+---------+------ +------ +------ +------ +------ +------ +-- Bin boot dev etc home media sbin bin

More information

How to configure VIVACOM 3g USB ( internet ) modem HUAWEI Mobile broadband E173 on Debian and Ubuntu GNU / Linux

How to configure VIVACOM 3g USB ( internet ) modem HUAWEI Mobile broadband E173 on Debian and Ubuntu GNU / Linux How to configure VIVACOM 3g USB ( internet ) modem HUAWEI Mobile broadband E173 on Debian and Ubuntu GNU / Linux Author : admin I've been given a HUAWEI Mobile Broadband E173 USB 3g model. The USB modem

More information

Fall 2006 Shell programming, part 3. touch

Fall 2006 Shell programming, part 3. touch touch Touch is usually a program, but it can be a shell built-in such as with busybox. The touch program by default changes the access and modification times for the files listed as arguments. If the file

More information

This document guides the user through: 1. Setting up and configuring networking for the BeagleBone black or green with the host.

This document guides the user through: 1. Setting up and configuring networking for the BeagleBone black or green with the host. Networking Guide for BeagleBone (Black or Green) by Brian Fraser Last update: Nov 17, 2017 This document guides the user through: 1. Setting up and configuring networking for the BeagleBone black or green

More information

Unix Handouts. Shantanu N Kulkarni

Unix Handouts. Shantanu N Kulkarni Unix Handouts Shantanu N Kulkarni Abstract These handouts are meant to be used as a study aid during my class. They are neither complete nor sincerely accurate. The idea is that the participants should

More information

Getting Started with Application Hosting

Getting Started with Application Hosting This section introduces application hosting and the Linux environment used for hosting applications on the Cisco IOS XR Operating System. Need for Application Hosting, page 1 Deep Dive Into Application

More information

Adding NetFPGA board into CRON. Change wires table, if you change the switch cable connection

Adding NetFPGA board into CRON. Change wires table, if you change the switch cable connection Adding NetFPGA board into CRON Lin Xue, lxue2@tigers.lsu.edu, LANET@LSU April 2011 Change wires table, if you change the switch cable connection Note: this might not related to adding a NetFPGA, but this

More information

CS197U: A Hands on Introduction to Unix

CS197U: A Hands on Introduction to Unix CS197U: A Hands on Introduction to Unix Lecture 3: UNIX Operating System Organization Tian Guo CICS, Umass Amherst 1 Reminders Assignment 2 is due THURSDAY 09/24 at 3:45 pm Directions are on the website

More information

High Availability for Cisco RAN Management Systems

High Availability for Cisco RAN Management Systems First Published: 2014-10-13 Last Modified: 2016-06-13 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)

More information