CLOUD INFRASTRUCTURE AND OPERATIONS IT3202FP - CHAPTER 1A/8 Page 1 CONTENTS

Size: px
Start display at page:

Download "CLOUD INFRASTRUCTURE AND OPERATIONS IT3202FP - CHAPTER 1A/8 Page 1 CONTENTS"

Transcription

1 CLOUD INFRASTRUCTURE AND OPERATIONS IT3202FP - CHAPTER 1A/8 Page 1 CONTENTS CHAPTER 1. Linux OS, Server System maintenance and deployment. 2. Cloud Layer setup and maintenance. 3. Automation: Self-service and catalogue service. 4. Cloud Security. 5. Backup and recovery for Cloud Infrastructure. 6. Performance and tracking of resources. 7. Business continuity plan. 8. IT service management.

2 CLOUD INFRASTRUCTURE AND OPERATIONS IT3202FP - CHAPTER 1A/8 Page 2 Chapter 1: Server System maintenance and deployment Topics covered: 1.1 Linux OS Concept 1.2 Linux Command line Interface 1.3 Linux Server Security Concept 1.4 Internal and External Threats 1.5 Different Types of Attacks 1.6 Concept of Network Storage 1.7 Scripting

3 CLOUD INFRASTRUCTURE AND OPERATIONS IT3202FP - CHAPTER 1A/8 Page 3 1.1: Linux Operating System Concept: Unix is an operating system developed by Ken Thompson and Dennis Ritchie at AT&T Bell Laboratories in the late 1960's. In 1978 AT&T's Unix seventh edition was split off into Berkeley Software Distribution (BSD). AT&T SVR5 spawned several other commercial versions of Unix including: 1. Oracle Solaris 2. HP-UX (Hewlett-Packard) 3. AIX (IBM) 4. IRIX (Silicon Graphics) 5. Digital Unix / Tru64 Unix (Digital Equipment Corporation) Based on Unix, Linux was born. Linux is a freely available version of the UNIX operating system Started by Linus Torvalds in 1991 Programmers from around the world contributed codes Main portion of Linux is the Linux Kernel It can be downloaded from a number of sites ( as well as purchased in packages (called distributions) from companies such as RedHat ( and Suse ( Runs on old Intel 486, Pentium (and better) processors, as well as Oracle Sparc, DEC Alpha and dozens of other processors. Ways of installing/using Linux: Install Linux on a separate drive or hard drive partition Boot up and use Linux from a CD-ROM or USB Drive Run Linux from within another operating system (like Windows) using VMware player, workstation or Microsoft Virtual PC. Linux Advantages Linux is free: It can be downloaded from the Internet completely for free. No registration fees, no costs per user, free updates, and freely available source code in case you want to change the behaviour of your system. Linux is portable to any hardware platform and its documentation freely available. Linux can run without rebooting. This property allows for Linux to be applicable also in environments where people don t have the time or the possibility to control their systems night and day. Linux is secure and versatile. The security model used in Linux is based on the UNIX idea of security, which is known to be robust and of proven quality. Linux is scalable. It can be expanded. Errors are usually discovered quickly. Technical support are easily available. Open Source products are trustworthy.

4 CLOUD INFRASTRUCTURE AND OPERATIONS IT3202FP - CHAPTER 1A/8 Page 4 Linux Disadvantages There are too many different distributions. Linux is not very user-friendly, and confusing for beginners: Linux File system Every OS needs a file system to manage program files, data files, etc. Linux maintains a hierarchical file system, similar to what you are used to with Windows or Mac OS. Hierarchical because directories (or folders) can be created inside other directories to create a hierarchical treelike structure. Unlike Windows and Mac OS, this tree has only one root, called the root directory, represented by / (a forward slash). An example of a hierarchical file system is shown in Figure 1. Each boxed name represents a directory, while the unboxed names are files. Figure 1 Linux file names are case sensitive File names extension like.txt or.cc or html are optional. Extensions are rarely required for a file to be opened by a particular application. However, it is good to include an extension for a file so it is easier for you to figure out what kind of file it is. By convention, executable programs in Linux usually have no extension. Any directory that is not the root is usually called a subdirectory. The directory above a subdirectory is known as its parent. For example, in Figure 1, - usr is a subdirectory of /, - doc is a subdirectory of usr. - usr is the parent directory of doc - / is the parent directory of usr. The root directory is the only directory without a parent; the root directory is its own parent.

5 CLOUD INFRASTRUCTURE AND OPERATIONS IT3202FP - CHAPTER 1A/8 Page 5 In a Linux file system, - the bin subdirectory contains programs that correspond to core Linux commands. - The usr subdirectory contains many other parts of the basic Linux system. - The home subdirectory contains the home directories of all the users with accounts on the system. If your username were joe, you could store your files in the joe subdirectory of home. The pathname of a file contains a sequence of directories to follow to reach the file. For example, the pathname of the joe subdirectory is /home/joe. The pathname of the file myfile.txt in the joe subdirectory is /home/joe/myfile.txt. The pathnames above are called absolute pathnames because they contain all the information needed to find a file. It begins with a leading forward slash. On the other hand, a relative pathname gives the information necessary to find a file from a particular point in the tree. For example, from the directory /home, the relative pathname of myfile.txt is just joe/myfile.txt. A relative pathname does not begin with a leading forward slash. Linux Disks and Partitions Disks: Linux treats its devices as files. The special directory where these "files" are maintained is "/dev".

6 CLOUD INFRASTRUCTURE AND OPERATIONS IT3202FP - CHAPTER 1A/8 Page 6 A standard IDE disk is "hdx", hda - if the disk is connected to the primary IDE controller as master hdb" if the disk is connected to the primary IDE controller as a slave device. hdc - if the disk is connected to the secondary IDE controller as master hdd" if the disk is connected to the secondary IDE controller as a slave device. Before a file system on devices can be used, they must be mounted. The mount command attaches a filesystem, located on a device, to the file tree. Linux File Permissions Every file or folder in Linux has access permissions. There are three types of permissions: read access write access execute access Permissions are defined for three types of users: the owner of the file the group that the owner belongs to other users Linux file permissions are nine bits of information (3 types x 3 type of users), each of them may have just one of two values: allowed or denied. It is used in Linux long directory listings. It consists of 10 characters. The first character shows the file type. Next 9 characters are permissions, consisting of three groups: owner, group, others. Each group consists of three symbols: rwx (in this order) a dash "-" is used to show permission denied, eg, r rwx,r-x Symbols in positions 1 to 3 ("rwx") are permissions for the owner of the file. Symbols in positions 4 to 6 ("rwx") are permissions for the group. Symbols in positions 7 to 9 ("rwx") are permissions for others. Example: d rwx rwx rwx owner others group

7 CLOUD INFRASTRUCTURE AND OPERATIONS IT3202FP - CHAPTER 1A/8 Page 7 (r=read, w=write & x=execute d=directory) The first letter can be: d = directory, eg, d rwx,rwx,rwx - = regular file, eg, - rwx,rwx,rwx l = symbolic link, eg, l rwx,rwx,rwx s = Unix domain socket, eg, s rwx,rwx,rwx p = named pipe, eg, p rwx,rwx,rwx c = character device file, eg, c rwx,rwx,rwx b = block device file, eg, b rwx,rwx,rwx In the above example, chem is a directory with the following permission: Owner = rwx, group=rwx and others=r-x r w x Read access is allowed Write access is allowed Execute access is allowed - Replaces "r", "w" or "x" if according access type is denied

8 CLOUD INFRASTRUCTURE AND OPERATIONS IT3202FP - CHAPTER 1A/8 Page 8 With 3 binary bits, the corresponding binary value of the file permissions are shown: Linux Users and Groups Text equivalent Binary value Meaning All types of access are denied 1 --x 001 Execute access is allowed only 2 -w- 010 Write access is allowed only 3 -wx 011 Write and execute access are allowed 4 r Read access is allowed only 5 r-x 101 Read and execute access are allowed 6 rw- 110 Read and write access are allowed 7 rwx 111 Everything is allowed Linux is a multi-user operating system. This means more than one "users" can make use of the system's resources at the same time Resources include: Disk, memory, processing time on the CPU, etc. resources are shared among the users Linux Username Each user has an associated Linux username. This Linux username is also given a unique identifier called the user id (or uid for short). Files and directories on disk, and processes (executing programs) are stamped with their owner's uid. The uid is also used for security purposes. To see what your uid is enter the command, $ id username It will reveal uid=500(username) gid=500(username) groups=500(username).

9 CLOUD INFRASTRUCTURE AND OPERATIONS IT3202FP - CHAPTER 1A/8 Page 9 Root User or Super user There is a special user on each Linux system called the root user. Also called the "Super user". The root user acts as the system administrator and has the authority (and privileges) to create users, directories, modify any file, and so on. Two ways to user root privileges: - Log in as root user, or - use the sudo program ("Super User Do") Groups in Linux In Linux, a group is a collection of users. Each user belongs to one or more groups. A group is identified by a Group id (gid for short). The gid of the owner (user) is also stamped on each file and process. To see what your gid is, try the id program: $ id username Directories Linux "folders" are called directories. The top-level, root directory is called /. Your home directory is /home/username. From anywhere you can get back there by typing simply cd command. Some frequently used command is as follows: Command Function Examples cd Change directory cd, cd.., cd /home/catyp pwd Print working pwd directory mkdir Make a new mkdir newdirectory subdirectory rmdir Remove a directory rmdir emptydirectory ls List files in a ls, ls l directory mv Rename (move) a file mv oldname newname

10 CLOUD INFRASTRUCTURE AND OPERATIONS IT3202FP - CHAPTER 1A/8 Page 10 cp Copy a file cp oldname newname cp oldname dirname/ rm Delete (remove) a file rm filename rm file1 file2 file3 rm -r dirname cat Output the contents cat filename of a file to the screen file Identify the type of file filename file chmod Change access chmod mode filename permissions on file(s) passwd Change your Passwd kill password. Stop a process by passing its processid (shown by ps as PID). tar Create / expand / query archives. mount Make a device visible in the filesystem. For users, this is typically used to access CD- ROMs or USB drive or floppies. umount df find grep Un-mount a device from a given point in the filesystem. Reports on used disk space on the partition containing file. Find files in the file system hierarchy Print lines in file containing the search pattern. kill TERM process-id kill -9 process-id tar cfv arch.tar somedir/ tar xfv arch.tar mount /mnt/floppy umount floppy df file ifconfig Configures a network ifconfig interface exit or logout Leave this session Exit find path expression grep PATTERN file

11 CLOUD INFRASTRUCTURE AND OPERATIONS IT3202FP - CHAPTER 1A/8 Page 11 Using the vi Editor vi (pronounced " v - i ) is short for "vi"sual editor. It displays a window into the file being edited that shows 24 lines of text. vi is a text editor, not a "what you see is what you get" word processor. vi lets you add, change, and delete text, but does not provide such formatting capabilities as centring lines or indenting paragraphs The following explains the basics of vi: Open an existing file - vi filename, where "filename" is the name of the existing file. To create a new file : vi newname, where "newname" is the name you wish to give the new file. On-screen, you will see blank lines, each with a tilde (~) at the left, and a line at the bottom giving the name and status of the new file: ~ "newname" [New file]

12 CLOUD INFRASTRUCTURE AND OPERATIONS IT3202FP - CHAPTER 1A/8 Page 12 Text editing command keys Press i Press esc Press esc then j Press esc then K Press esc then l Press esc then h Press esc then x Press esc then dw Press esc then dd Press esc then a Press esc then o Press esc then u Press esc then :w Press esc then :wq Press esc then :q = insert mode = command mode = move cursor down = move cursor up = move cursor right = move cursor left = delete one character = delete one word = delete one line = append text after the cursor = insert a blank line below the current line = undo your most recent edit = save changes you have made = save changes and exit vi = exit vi without saving the changes Linux system configuration and setting Every Linux program is an executable file. It holds a the list of opcodes the CPU executes. For instance, the ls executable file is provided by the file /bin/ls. It holds the list of machine instructions needed to display the list of files in the current directory onto the screen. Is there a standard configuration file format in Linux? No. Each programmer is free to choose the configuration file format he or she prefers. One example is the /etc/shells file, which contains a list of possible shells separated by a newline. What are system configuration files? The kernel needs to know the list of users and groups in the system, and manage file permissions. These files are read by a function provided by a system library, and used by the kernel. For instance, a program needing the (encrypted) password of a user should call the system library function getpw(). This kind of function is also known as a system call. Most of the configuration files in the Red Hat Linux system are in the /etc directory unless otherwise specified. The configuration files can be classified into the following categories.

13 CLOUD INFRASTRUCTURE AND OPERATIONS IT3202FP - CHAPTER 1A/8 Page 13 Cat 1 : Access files Example: /etc/host.conf /etc/hosts Tells the network domain server how to look up hostnames. (Normally /etc/hosts, then name server; it can be changed through netconf.) Contains a list of known hosts (in the local network). Can be used if the IP of the system is not dynamically generated. For simple hostname resolution (to dotted notation), /etc/hosts.conf normally tells the resolver to look here before asking the network nameserver, DNS or NIS. Cat 2 : Dummy File system The kernel provides an interface to display some of its data structures is provided as a ummy filesystem known as the /proc filesystem. Many system utilities use the values present in this filesystem or displaying the system statistics. /etc/mtab /etc/fstab /etc/mtools.conf This change continuously as the file /proc/mount changes. In other words, when filesystems are mounted and unmounted, the change is immediately reflected in this file. Lists the filesystems currently "mountable" by the computer. This is important because when the computer boots, it runs the command mount -a, which takes care of mounting every file system marked with a "1" in the next-to-last column of fstab. Configuration for all the operations (mkdir, copy, format, etc.) on a DOS-type filesystem. Cat 3 : System administration Files /etc/group /etc/nologin Contains the valid group names and the users included in the specified groups. A single user can be present in more than one group if he performs multiple tasks. For example, is a "user" is the administrator as well as a member of the project group "project 1", then his entry in the group file will look like: user: * : group-id : project1 If the file /etc/nologin exists, login(1) will allow access only to root. Other users will be shown the contents of this file and their logins refused.

14 CLOUD INFRASTRUCTURE AND OPERATIONS IT3202FP - CHAPTER 1A/8 Page 14 etc/passwd /etc/usertty /etc/shadow /etc/shells /etc/motd See "man passwd". Holds some user account info including passwords (when not "shadowed"). Contains the encrypted password information for users' accounts and optionally the password aging information. Included fields are: Login name Encrypted password Days since Jan 1, 1970 that password was last changed Days before password may be changed Days after which password must be changed Days before password is to expire that user is warned Days after password expires that account is disabled Days since Jan 1, 1970 that account is disabled Holds the list of possible "shells" available to the system. Message Of The Day; used if an administrator wants to convey some message to all the users of a Linux server. Cat 4 : Networking Files /etc/networks /etc/resolv.conf /etc/exports /etc/services Lists names and addresses of networks accessible from the network to which the machine is connected. Used by route command. Allows use of name for network. Tells the kernel which name server should be queried when a program asks to "resolve" an IP Address. The file system to be exported (NFS) and permissions for it. Translates network service names to port number/protocol. Read by inetd, telnet, tcpdump, and some other programs. There are C access routines.

15 CLOUD INFRASTRUCTURE AND OPERATIONS IT3202FP - CHAPTER 1A/8 Page 15 Cat 5 : System commands System commands are meant to control the system, and make everything work properly. Examples are login (performing the authentication phase of a user on the console and bash (providing the interaction between a user and the computer) are system commands. The files associated with them are therefore particularly important. This category has the following files of interest to users and administrators. /etc/lilo.conf /etc/logrotate.conf /etc/inittab Contains the system's default boot command line parameters and also the different images to boot with. You can see this list by pressing Tab at the LILO prompt. Maintains the log files present in the /var/log directory. This is chronologically the first configuration file in UNIX. The first program launched after a UNIX machine is switched on is init, which knows what to launch, thanks to inittab. It is read by init at run level changes, and controls the startup of the main process. Cat 6 : Daemons A daemon is a program running in non-interactive mode. Typically, daemon tasks are related to the networking area: they wait for connections, so that they can provide services through them. Many daemons are available for Linux, ranging from Web servers to FTP servers. Common ones are in.ftpd (ftp server daemon) in.telnetd (telnet server daemon), syslogd (system logging daemon). Some daemons, while running, and reload configuration files automatically when they change, but most don t. Some services must be used to manually restart the files. Cat 7 : The kernel When any configuration file is changed, the whole Linux system it affected. For example, changing the passwd file to add a user immediately enables that user. Cat 8 : User programs A user or system program reads its configuration file every time it is launched. So, the first time a user program is started, the default configuration is read from the files

16 CLOUD INFRASTRUCTURE AND OPERATIONS IT3202FP - CHAPTER 1A/8 Page 16 present in the /etc/ directory. Later, the user can customise the programs by using rc and. (dot) files as explained in the next section. Basic Server Security Concept A firewall is a network device with two or more network interfaces one connected to the protected internal network and the other connected to unprotected networks, such as the Internet. The firewall controls access to and from the protected internal network. The firewall runs software that examines the network packets arriving at its network interfaces and takes appropriate action based on a set of rules. It allows only authorized network traffic to flow between the two interfaces. Configuring the firewall involves setting up the rules properly. A configuration strategy is to reject all network traffic and then enable only a limited set of network packets to go through the firewall. The authorized network traffic would include the connections necessary to enable internal users to do things such as visit Web sites and receive electronic mail. To be useful, a firewall has the following general characteristics: It must control the flow of packets between the Internet and the internal network. It must not provide dynamic routing because dynamic routing tables are subject to route spoofing the use of fake routes by intruders. Instead, the firewall uses static routing tables (which you can set up with the route command on Linux systems). It must not allow any external user to log in as root. That way, even if the firewall system is compromised, the intruder is blocked from using root privileges from a remote login. It must be kept in a physically secure location. It must distinguish between packets that come from the Internet and packets that come from the internal protected network. This feature allows the firewall to reject packets that come from the Internet but have the IP address of a trusted system on the internal network. Its user accounts are limited to a few user accounts for those internal users who need access to external systems. External users who need access to the internal network should use SSH for remote.

17 CLOUD INFRASTRUCTURE AND OPERATIONS IT3202FP - CHAPTER 1A/8 Page 17 It keeps a log of all system activities, such as successful and unsuccessful login attempts. It provides DNS name-lookup service to the outside world to resolve any hostnames that are known to the outside world. It provides good performance so that it doesn t hinder the internal users access to specific Internet services (such as HTTP and FTP). A firewall can take many different forms. Here are three common forms of a firewall: Form 1 : Packet filter firewall: This simple firewall uses a router capable of filtering (blocking or allowing) packets according to a number of their characteristics, including, - the source and destination IP addresses, - the network protocol (TCP or UDP), - and the source and destination port numbers. Packet filter firewalls, - are usually placed at the outermost boundary with an untrusted network. They form the first line of defence. - are fast and flexible, but they can t prevent attacks that exploit application-specific vulnerabilities or functions. - can log only a minimal amount of information, such as source IP address, destination IP address, and traffic type. - are vulnerable to attacks and exploits that take advantage of flaws within the TCP/IP protocol, such as IP address spoofing. Form 2 : Stateful inspection firewall: This type of firewall, - keeps track of the network connections that network applications are using. When an application on an internal system uses a network connection to create a session with a remote system, a port is also opened in the internal system. Opening up many ports to incoming traffic creates a risk of intrusion by unauthorized users. - creats a state table of outbound network connections, along with each session s corresponding internal port. This state table is then used to validate any inbound packets. - more secure than a packet filter because it tracks internal ports individually rather than opening all internal ports for external access. Form 3 : Application-proxy gateway firewall: This firewall acts as an intermediary between internal applications that attempt to communicate with external servers such as a Web server. No direct network connection is ever made from the inside client host to the external Web server. - are better than packet filter and stateful inspection firewalls - spends more time reading and interpreting each packet. Not well suited to high bandwidth or real-time applications.

18 CLOUD INFRASTRUCTURE AND OPERATIONS IT3202FP - CHAPTER 1A/8 Page 18 Choice of firewall Most firewalls implement a combination of these firewall functionalities. For example, many vendors of packet filter firewalls or stateful inspection firewalls have also implemented basic application-proxy functionality to offset some of the weaknesses associated with their firewalls. In most cases, these vendors implement application proxies to provide better logging of network traffic and stronger user authentication. Nearly all major firewall vendors have introduced multiple firewall functions into their products in some manner. Linux system security best practices Practice 1 : Scanning for malware To keep your system safe and healthy, you should consider using a scanner to probe your system for nefarious changes. There are lots of free utilities that can do a decent job to keep your system safe on the internet. Practice 2 :Anti-virus Anti-virus software will act as another layer of protection for your system. In Linux, there's ClamAV (including Klam for KDE), as well as a number of commercial products that have started shipping solution for Linux. With the anti-virus installed, you can scan files that you receive from your friends before forwarding them to other users. That way, you may break the chain of accidental malware spreading. Practice 3 : Startup applications and services Some undesired processes might be left running, hogging resources and possibly exposing your machine to threats. By optimizing your startup application and services, you could potentially reduce your system exposure to risk. Practice 4 : Read your logs > /var/log/messages This is the system log. Almost everything goes in there. Reading the log will give you an indication of possible system issues, including software errors, as well as possible security-related items. Practice 5 : /var/log/secure You can configure your machine to log ssh and sudo attempts to a separate file, like /var/log/secure. Then, you can examine the log for any privilege escalation attempts or remote connection attempts. Practice 6 : Examine logged in users There are many ways of doing this. The most accurate one is to parse the output of the ps command. But you can also use w and who and lastlog. Manually dumping utmp and wtmp can also work.

19 CLOUD INFRASTRUCTURE AND OPERATIONS IT3202FP - CHAPTER 1A/8 Page 19 Practice 7 : Other tools You also have a range of other utilities available, like netstat or nmap, which can help you examine your machine network visibility. Internal and External threats Threats to any computer network arise from both external and internal entities. External threats include unauthorized access by outsiders such as hackers, virus attacks etc. Among internal threats is exploitation of the network by its users - knowingly or unknowingly. Internal threats arise due to malicious intentions and/or ignorance of the users of your computer network. For example, a person can leave the computer unattended exposing it to others who are not authorized to access the information. Another example of internal threat can be a person downloading something from the Internet that results in a malware attack. Hackers and External threats can disrupt your business by sending a malicious code or a Trojan horse, which conceals itself inside a known or seemingly safe program. The user opens the attachment or clicks on the link and in the blink of an eye a malicious hacker has entered your server, database and network. Disgruntled ex-employee who wants personal revenge decides to spam every inbox in your network in another form of an external threat. No matter the reason, if you use the Internet at all, these bad guys have an in into your network and the only way to keep the garbage out is to fully protect your system and network. Internal threats and accidents are similar in that an employee can unknowingly misuse secure access privileges and leave important passwords and security questions open to someone monitoring your system through spyware. This can be a simple mistake, an accident or an intentional act that occurred when a program restarts but either way, important and confidential information is at risk. Employees have to use the Internet while working and during their searches may enter sites that are not work-related and can have harmful software on it that needs only a splitsecond to gain access into your network and begin a series of chaotic actions that could in some extreme cases shut the whole network down. Once you know the dangers that exist, you can take proactive steps to try and prevent them. You should protect your computers, servers, database and network through a variety of security solutions. Network monitoring support, managed Microsoft security patches, firewall installation, intrusion detection programs, managed anti-virus and anti-spyware software, all take a part in securing your line-of-business applications and in some cases restricting use of the Internet to only work-related.

Introduction to Linux

Introduction to Linux Introduction to Linux Mukesh Pund Principal Scientist, NISCAIR, New Delhi, India History In 1969, a team of developers developed a new operating system called Unix which was written using C Linus Torvalds,

More information

Embedded Linux Systems. Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island

Embedded Linux Systems. Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island Embedded Linux Systems Bin Li Assistant Professor Dept. of Electrical, Computer and Biomedical Engineering University of Rhode Island Generic Embedded Systems Structure User Sensors ADC microcontroller

More information

Overview LEARN. History of Linux Linux Architecture Linux File System Linux Access Linux Commands File Permission Editors Conclusion and Questions

Overview LEARN. History of Linux Linux Architecture Linux File System Linux Access Linux Commands File Permission Editors Conclusion and Questions Lanka Education and Research Network Linux Architecture, Linux File System, Linux Basic Commands 28 th November 2016 Dilum Samarasinhe () Overview History of Linux Linux Architecture Linux File System

More information

Unix Introduction to UNIX

Unix Introduction to UNIX Unix Introduction to UNIX Get Started Introduction The UNIX operating system Set of programs that act as a link between the computer and the user. Developed in 1969 by a group of AT&T employees Various

More information

LAB #7 Linux Tutorial

LAB #7 Linux Tutorial Gathering information: LAB #7 Linux Tutorial Find the password file on a Linux box Scenario You have access to a Linux computer. You must find the password file on the computer. Objective Get a listing

More information

CS Fundamentals of Programming II Fall Very Basic UNIX

CS Fundamentals of Programming II Fall Very Basic UNIX CS 215 - Fundamentals of Programming II Fall 2012 - Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the CS (Project) Lab (KC-265)

More information

UNIX. The Very 10 Short Howto for beginners. Soon-Hyung Yook. March 27, Soon-Hyung Yook UNIX March 27, / 29

UNIX. The Very 10 Short Howto for beginners. Soon-Hyung Yook. March 27, Soon-Hyung Yook UNIX March 27, / 29 UNIX The Very 10 Short Howto for beginners Soon-Hyung Yook March 27, 2015 Soon-Hyung Yook UNIX March 27, 2015 1 / 29 Table of Contents 1 History of Unix 2 What is UNIX? 3 What is Linux? 4 How does Unix

More information

Chapter-3. Introduction to Unix: Fundamental Commands

Chapter-3. Introduction to Unix: Fundamental Commands Chapter-3 Introduction to Unix: Fundamental Commands What You Will Learn The fundamental commands of the Unix operating system. Everything told for Unix here is applicable to the Linux operating system

More information

Perl and R Scripting for Biologists

Perl and R Scripting for Biologists Perl and R Scripting for Biologists Lukas Mueller PLBR 4092 Course overview Linux basics (today) Linux advanced (Aure, next week) Why Linux? Free open source operating system based on UNIX specifications

More information

Outline. Structure of a UNIX command

Outline. Structure of a UNIX command Outline Structure of Unix Commands Command help (man) Log on (terminal vs. graphical) System information (utility) File and directory structure (path) Permission (owner, group, rwx) File and directory

More information

Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers

Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Review of the Linux File System and Linux Commands 1. Introduction Becoming adept at using the Linux OS requires gaining familiarity

More information

CS246 Spring14 Programming Paradigm Notes on Linux

CS246 Spring14 Programming Paradigm Notes on Linux 1 Unix History 1965: Researchers from Bell Labs and other organizations begin work on Multics, a state-of-the-art interactive, multi-user operating system. 1969: Bell Labs researchers, losing hope for

More information

Linux Systems Administration Getting Started with Linux

Linux Systems Administration Getting Started with Linux Linux Systems Administration Getting Started with Linux Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International

More information

Introduction to Unix: Fundamental Commands

Introduction to Unix: Fundamental Commands Introduction to Unix: Fundamental Commands Ricky Patterson UVA Library Based on slides from Turgut Yilmaz Istanbul Teknik University 1 What We Will Learn The fundamental commands of the Unix operating

More information

Introduction to Linux

Introduction to Linux p. 1/40 Introduction to Linux Xiaoxu Guan High Performance Computing, LSU January 31, 2018 p. 2/40 Outline What is an OS or Linux OS? Basic commands for files/directories Basic commands for text processing

More information

Chapter Two. Lesson A. Objectives. Exploring the UNIX File System and File Security. Understanding Files and Directories

Chapter Two. Lesson A. Objectives. Exploring the UNIX File System and File Security. Understanding Files and Directories Chapter Two Exploring the UNIX File System and File Security Lesson A Understanding Files and Directories 2 Objectives Discuss and explain the UNIX file system Define a UNIX file system partition Use the

More information

CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX

CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the EECS labs that dual boot

More information

Introduction to Linux (Part I) BUPT/QMUL 2018/03/14

Introduction to Linux (Part I) BUPT/QMUL 2018/03/14 Introduction to Linux (Part I) BUPT/QMUL 2018/03/14 Contents 1. Background on Linux 2. Starting / Finishing 3. Typing Linux Commands 4. Commands to Use Right Away 5. Linux help continued 2 Contents 6.

More information

Stop all processes and then reboot - same as above startx. Log in as superuser from current login exit

Stop all processes and then reboot - same as above startx. Log in as superuser from current login exit Starting & Stopping shutdown -h now Shutdown the system now and do not reboot shutdown -r 5 Shutdown the system in 5 minutes and reboot shutdown -r now Shutdown the system now and reboot reboot Stop all

More information

Users and Groups. his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and UNIX groups.

Users and Groups. his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and UNIX groups. cameron.book Page 19 Monday, June 30, 2003 8:51 AM C H A P T E R 4 Users and Groups T his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and

More information

Brief Linux Presentation. July 10th, 2006 Elan Borenstein

Brief Linux Presentation. July 10th, 2006 Elan Borenstein Brief Linux Presentation July 10th, 2006 Elan Borenstein History 1965 - Bell Labs (AT&T), GE and MIT Project to develop a new (multiuser, multitasking) operating system - MULTICS. (not successful) History

More information

Welcome to getting started with Ubuntu Server. This System Administrator Manual. guide to be simple to follow, with step by step instructions

Welcome to getting started with Ubuntu Server. This System Administrator Manual. guide to be simple to follow, with step by step instructions Welcome to getting started with Ubuntu 12.04 Server. This System Administrator Manual guide to be simple to follow, with step by step instructions with screenshots INDEX 1.Installation of Ubuntu 12.04

More information

Mills HPC Tutorial Series. Linux Basics I

Mills HPC Tutorial Series. Linux Basics I Mills HPC Tutorial Series Linux Basics I Objectives Command Line Window Anatomy Command Structure Command Examples Help Files and Directories Permissions Wildcards and Home (~) Redirection and Pipe Create

More information

Basic Linux Command Line Interface Guide

Basic Linux Command Line Interface Guide This basic Linux Command-Line Interface (CLI) Guide provides a general explanation of commonly used Bash shell commands for the Barracuda NG Firewall. You can access the command-line interface by connecting

More information

Basic Linux Security. Roman Bohuk University of Virginia

Basic Linux Security. Roman Bohuk University of Virginia Basic Linux Security Roman Bohuk University of Virginia What is Linux? An open source operating system Project started by Linus Torvalds kernel Kernel: core program that controls everything else (controls

More information

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network

n Learn about the Security+ exam n Learn basic terminology and the basic approaches n Implement security configuration parameters on network Always Remember Chapter #1: Network Device Configuration There is no 100 percent secure system, and there is nothing that is foolproof! 2 Outline Learn about the Security+ exam Learn basic terminology

More information

CS4350 Unix Programming. Outline

CS4350 Unix Programming. Outline Outline Unix Management Files and file systems Structure of Unix Commands Command help (man) Log on (terminal vs. graphical) System information (utility) File and directory structure (path) Permission

More information

System Programming. Introduction to Unix

System Programming. Introduction to Unix Content : by Dr. B. Boufama School of Computer Science University of Windsor Instructor: Dr. A. Habed adlane@cs.uwindsor.ca http://cs.uwindsor.ca/ adlane/60-256 Content Content 1 Introduction 2 3 Introduction

More information

Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades Q2

Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades Q2 Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades 2017-2018 Q2 Facultat d Informàtica de Barcelona This first lab session is focused on getting experience in working

More information

Systems Programming. The Unix/Linux Operating System

Systems Programming. The Unix/Linux Operating System Systems Programming The Unix/Linux Operating System 1 What is UNIX? A modern computer operating system Operating system: a program that acts as an intermediary between a user of the computer and the computer

More information

Introduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines

Introduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines Introduction to UNIX Logging in Basic system architecture Getting help Intro to shell (tcsh) Basic UNIX File Maintenance Intro to emacs I/O Redirection Shell scripts Logging in most systems have graphical

More information

Full file at https://fratstock.eu

Full file at https://fratstock.eu Guide to UNIX Using Linux Fourth Edition Chapter 2 Solutions Answers to the Chapter 2 Review Questions 1. Your company is discussing plans to migrate desktop and laptop users to Linux. One concern raised

More information

Chapter 6. Linux File System

Chapter 6. Linux File System Chapter 6 Linux File System 1 File System File System management how to store informations on storage devices The Hierarchical Structure Types of file Common File system Tasks 2 The Hierarchical Structure

More information

INTRODUCTION TO BIOINFORMATICS

INTRODUCTION TO BIOINFORMATICS Introducing the LINUX Operating System BecA-ILRI INTRODUCTION TO BIOINFORMATICS Mark Wamalwa BecA- ILRI Hub, Nairobi, Kenya h"p://hub.africabiosciences.org/ h"p://www.ilri.org/ m.wamalwa@cgiar.org 1 What

More information

Please choose the best answer. More than one answer might be true, but choose the one that is best.

Please choose the best answer. More than one answer might be true, but choose the one that is best. Introduction to Linux and Unix - endterm Please choose the best answer. More than one answer might be true, but choose the one that is best. SYSTEM STARTUP 1. A hard disk master boot record is located:

More information

Exercise Sheet 2. (Classifications of Operating Systems)

Exercise Sheet 2. (Classifications of Operating Systems) Exercise Sheet 2 Exercise 1 (Classifications of Operating Systems) 1. At any given moment, only a single program can be executed. What is the technical term for this operation mode? 2. What are half multi-user

More information

Linux Essentials Objectives Topics:

Linux Essentials Objectives Topics: Linux Essentials Linux Essentials is a professional development certificate program that covers basic knowledge for those working and studying Open Source and various distributions of Linux. Exam Objectives

More information

Basic Linux Command Line Interface Guide

Basic Linux Command Line Interface Guide This basic Linux Command-Line Interface (CLI) Guide provides a general explanation of commonly used Bash shell commands for the Barracuda NG Firewall. You can access the command-line interface by connecting

More information

Linux Interview Questions and Answers

Linux Interview Questions and Answers Linux Interview Questions and Answers You need to see the last fifteen lines of the files dog, cat and horse. What command should you use? tail -15 dog cat horse The tail utility displays the end of a

More information

Using LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12)

Using LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12) Using LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12) Objective: Learn some basic aspects of the UNIX operating system and how to use it. What is UNIX? UNIX is the operating system used by most computers

More information

Overview of Unix / Linux operating systems

Overview of Unix / Linux operating systems Overview of Unix / Linux operating systems Mohammad S. Hasan Staffordshire University, UK Overview of Unix / Linux operating systems Slide 1 Lecture Outline History and development of Unix / Linux Early

More information

INSE Lab 1 Introduction to UNIX Fall 2017

INSE Lab 1 Introduction to UNIX Fall 2017 INSE 6130 - Lab 1 Introduction to UNIX Fall 2017 Updated by: Paria Shirani Overview In this lab session, students will learn the basics of UNIX /Linux commands. They will be able to perform the basic operations:

More information

The Unix Shell & Shell Scripts

The Unix Shell & Shell Scripts The Unix Shell & Shell Scripts You should do steps 1 to 7 before going to the lab. Use the Linux system you installed in the previous lab. In the lab do step 8, the TA may give you additional exercises

More information

Embedded System Design

Embedded System Design Embedded System Design Lecture 10 Jaeyong Chung Systems-on-Chips (SoC) Laboratory Incheon National University Environment Variables Environment variables are a set of dynamic named values that can affect

More information

UNIX System Administration

UNIX System Administration $!... 14:13 $$... 14:13.netrc...12:27-28 /etc/fstab... 6:25 /etc/hosts.equiv... 8:23 /etc/inittab Entries... 4:8 /etc/netmasks... 8:22 /etc/shells... 12:25 /home... 6:69 /tmp...6:61-67 /usr... 6:70 /var...

More information

Linux Essentials. Smith, Roderick W. Table of Contents ISBN-13: Introduction xvii. Chapter 1 Selecting an Operating System 1

Linux Essentials. Smith, Roderick W. Table of Contents ISBN-13: Introduction xvii. Chapter 1 Selecting an Operating System 1 Linux Essentials Smith, Roderick W. ISBN-13: 9781118106792 Table of Contents Introduction xvii Chapter 1 Selecting an Operating System 1 What Is an OS? 1 What Is a Kernel? 1 What Else Identifies an OS?

More information

Course 144 Supplementary Materials. UNIX Fundamentals

Course 144 Supplementary Materials. UNIX Fundamentals Course 144 Supplementary Materials UNIX Fundamentals 1 Background to UNIX Command Fundamentals This appendix provides a overview of critical commands and concepts Prerequisite knowledge attendees should

More information

Physics REU Unix Tutorial

Physics REU Unix Tutorial Physics REU Unix Tutorial What is unix? Unix is an operating system. In simple terms, its the set of programs that makes a computer work. It can be broken down into three parts. (1) kernel: The component

More information

EECS Software Tools. Lab 2 Tutorial: Introduction to UNIX/Linux. Tilemachos Pechlivanoglou

EECS Software Tools. Lab 2 Tutorial: Introduction to UNIX/Linux. Tilemachos Pechlivanoglou EECS 2031 - Software Tools Lab 2 Tutorial: Introduction to UNIX/Linux Tilemachos Pechlivanoglou (tipech@eecs.yorku.ca) Sep 22 & 25, 2017 Material marked with will be in your exams Sep 22 & 25, 2017 Introduction

More information

5/8/2012. Creating and Changing Directories Chapter 7

5/8/2012. Creating and Changing Directories Chapter 7 Creating and Changing Directories Chapter 7 Types of files File systems concepts Using directories to create order. Managing files in directories. Using pathnames to manage files in directories. Managing

More information

Introduction to Linux. Woo-Yeong Jeong Computer Systems Laboratory Sungkyunkwan University

Introduction to Linux. Woo-Yeong Jeong Computer Systems Laboratory Sungkyunkwan University Introduction to Linux Woo-Yeong Jeong (wooyeong@csl.skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu What is Linux? A Unix-like operating system of a computer What is an

More information

Linux Command Line Primer. By: Scott Marshall

Linux Command Line Primer. By: Scott Marshall Linux Command Line Primer By: Scott Marshall Draft: 10/21/2007 Table of Contents Topic Page(s) Preface 1 General Filesystem Background Information 2 General Filesystem Commands 2 Working with Files and

More information

Linux/Cygwin Practice Computer Architecture

Linux/Cygwin Practice Computer Architecture Linux/Cygwin Practice 2010 Computer Architecture Linux Login Use ssh client applications to connect (Port : 22) SSH Clients zterm ( http://www.brainz.co.kr/products/products4_2.php ) Putty ( http://kldp.net/frs/download.php/3411/hangulputty-0.58.h2.exe

More information

Introduction: What is Unix?

Introduction: What is Unix? Introduction Introduction: What is Unix? An operating system Developed at AT&T Bell Labs in the 1960 s Command Line Interpreter GUIs (Window systems) are now available Introduction: Unix vs. Linux Unix

More information

GNU/Linux 101. Casey McLaughlin. Research Computing Center Spring Workshop Series 2018

GNU/Linux 101. Casey McLaughlin. Research Computing Center Spring Workshop Series 2018 GNU/Linux 101 Casey McLaughlin Research Computing Center Spring Workshop Series 2018 rccworkshop IC;3df4mu bash-2.1~# man workshop Linux101 RCC Workshop L101 OBJECTIVES - Operating system concepts - Linux

More information

Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system...

Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system... Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system... Q) Q) What is the difference between home directory and working directory? Answer

More information

This material is based on work supported by the National Science Foundation under Grant No

This material is based on work supported by the National Science Foundation under Grant No Source: http://en.wikipedia.org/wiki/file:firewall.png This material is based on work supported by the National Science Foundation under Grant No. 0802551 Any opinions, findings, and conclusions or recommendations

More information

OPERATING SYSTEMS LINUX

OPERATING SYSTEMS LINUX OPERATING SYSTEMS LINUX Božo Krstajić, PhD, University of Montenegro Podgorica bozok@cg.ac.yu Process management Linux operating systems work with processes. Basically a process consists of program code

More information

Working with Basic Linux. Daniel Balagué

Working with Basic Linux. Daniel Balagué Working with Basic Linux Daniel Balagué How Linux Works? Everything in Linux is either a file or a process. A process is an executing program identified with a PID number. It runs in short or long duration

More information

Shell Programming Overview

Shell Programming Overview Overview Shell programming is a way of taking several command line instructions that you would use in a Unix command prompt and incorporating them into one program. There are many versions of Unix. Some

More information

CS197U: A Hands on Introduction to Unix

CS197U: A Hands on Introduction to Unix CS197U: A Hands on Introduction to Unix Lecture 3: UNIX Operating System Organization Tian Guo CICS, Umass Amherst 1 Reminders Assignment 2 is due THURSDAY 09/24 at 3:45 pm Directions are on the website

More information

Std: XI CHAPTER-3 LINUX

Std: XI CHAPTER-3 LINUX Commands: General format: Command Option Argument Command: ls - Lists the contents of a file. Option: Begins with minus sign (-) ls a Lists including the hidden files. Argument refers to the name of a

More information

Operating Systems. Copyleft 2005, Binnur Kurt

Operating Systems. Copyleft 2005, Binnur Kurt 3 Operating Systems Copyleft 2005, Binnur Kurt Content The concept of an operating system. The internal architecture of an operating system. The architecture of the Linux operating system in more detail.

More information

INTRODUCTION TO LINUX

INTRODUCTION TO LINUX INTRODUCTION TO LINUX REALLY SHORT HISTORY Before GNU/Linux there were DOS, MAC and UNIX. All systems were proprietary. The GNU project started in the early 80s by Richard Stallman Goal to make a free

More information

Operating Systems 3. Operating Systems. Content. What is an Operating System? What is an Operating System? Resource Abstraction and Sharing

Operating Systems 3. Operating Systems. Content. What is an Operating System? What is an Operating System? Resource Abstraction and Sharing Content 3 Operating Systems The concept of an operating system. The internal architecture of an operating system. The architecture of the Linux operating system in more detail. How to log into (and out

More information

Using UNIX. -rwxr--r-- 1 root sys Sep 5 14:15 good_program

Using UNIX. -rwxr--r-- 1 root sys Sep 5 14:15 good_program Using UNIX. UNIX is mainly a command line interface. This means that you write the commands you want executed. In the beginning that will seem inferior to windows point-and-click, but in the long run the

More information

Computer Architecture Lab 1 (Starting with Linux)

Computer Architecture Lab 1 (Starting with Linux) Computer Architecture Lab 1 (Starting with Linux) Linux is a computer operating system. An operating system consists of the software that manages your computer and lets you run applications on it. The

More information

Introduction to Linux. Fundamentals of Computer Science

Introduction to Linux. Fundamentals of Computer Science Introduction to Linux Fundamentals of Computer Science Outline Operating Systems Linux History Linux Architecture Logging in to Linux Command Format Linux Filesystem Directory and File Commands Wildcard

More information

Introduction to Unix. University of Massachusetts Medical School. October, 2014

Introduction to Unix. University of Massachusetts Medical School. October, 2014 .. Introduction to Unix University of Massachusetts Medical School October, 2014 . DISCLAIMER For the sake of clarity, the concepts mentioned in these slides have been simplified significantly. Most of

More information

First of all, these notes will cover only a small subset of the available commands and utilities, and will cover most of those in a shallow fashion.

First of all, these notes will cover only a small subset of the available commands and utilities, and will cover most of those in a shallow fashion. Warnings 1 First of all, these notes will cover only a small subset of the available commands and utilities, and will cover most of those in a shallow fashion. Read the relevant material in Sobell! If

More information

Introduction to Linux Workshop 1

Introduction to Linux Workshop 1 Introduction to Linux Workshop 1 The George Washington University SEAS Computing Facility Created by Jason Hurlburt, Hadi Mohammadi, Marco Suarez hurlburj@gwu.edu Logging In The lab computers will authenticate

More information

UNIX File Hierarchy: Structure and Commands

UNIX File Hierarchy: Structure and Commands UNIX File Hierarchy: Structure and Commands The UNIX operating system organizes files into a tree structure with a root named by the character /. An example of the directory tree is shown below. / bin

More information

G54ADM Sample Exam Questions and Answers

G54ADM Sample Exam Questions and Answers G54ADM Sample Exam Questions and Answers Question 1 Compulsory Question (34 marks) (a) i. Explain the purpose of the UNIX password file. (2 marks) ii. Why doesn t the password file contain passwords? (2

More information

UNIX / LINUX - GETTING STARTED

UNIX / LINUX - GETTING STARTED UNIX / LINUX - GETTING STARTED http://www.tutorialspoint.com/unix/unix-getting-started.htm Copyright tutorialspoint.com Advertisements What is Unix? The Unix operating system is a set of programs that

More information

Introduction to Linux

Introduction to Linux Introduction to Linux Prof. Jin-Soo Kim( jinsookim@skku.edu) TA - Kisik Jeong (kisik@csl.skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu What is Linux? A Unix-like operating

More information

Crash Course in Unix. For more info check out the Unix man pages -orhttp://www.cs.rpi.edu/~hollingd/unix. -or- Unix in a Nutshell (an O Reilly book).

Crash Course in Unix. For more info check out the Unix man pages -orhttp://www.cs.rpi.edu/~hollingd/unix. -or- Unix in a Nutshell (an O Reilly book). Crash Course in Unix For more info check out the Unix man pages -orhttp://www.cs.rpi.edu/~hollingd/unix -or- Unix in a Nutshell (an O Reilly book). 1 Unix Accounts To access a Unix system you need to have

More information

Introduction to Linux

Introduction to Linux Introduction to Linux Prof. Jin-Soo Kim( jinsookim@skku.edu) TA Sanghoon Han(sanghoon.han@csl.skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Announcement (1) Please come

More information

UNIT 9 Introduction to Linux and Ubuntu

UNIT 9 Introduction to Linux and Ubuntu AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT 9 Introduction to Linux and Ubuntu Learning Objectives Participants will understand the basics of Linux, including the nature,

More information

Linux Training. for New Users of Cluster. Georgia Advanced Computing Resource Center University of Georgia Suchitra Pakala

Linux Training. for New Users of Cluster. Georgia Advanced Computing Resource Center University of Georgia Suchitra Pakala Linux Training for New Users of Cluster Georgia Advanced Computing Resource Center University of Georgia Suchitra Pakala pakala@uga.edu 1 Overview GACRC Linux Operating System Shell, Filesystem, and Common

More information

Lab 3a Using the vi editor

Lab 3a Using the vi editor Lab 3a Using the vi editor Objectives: Become familiar with the vi Editor Review the three vi Modes Review keystrokes to move between vi modes Create a new file with vi Editor Invoke vi with show mode

More information

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering

THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering THE HONG KONG POLYTECHNIC UNIVERSITY Department of Electronic and Information Engineering ENG224 Information Technology Part I: Computers and the Internet Laboratory 2 Linux Shell Commands and vi Editor

More information

CISC 220 fall 2011, set 1: Linux basics

CISC 220 fall 2011, set 1: Linux basics CISC 220: System-Level Programming instructor: Margaret Lamb e-mail: malamb@cs.queensu.ca office: Goodwin 554 office phone: 533-6059 (internal extension 36059) office hours: Tues/Wed/Thurs 2-3 (this week

More information

Introduction to remote command line Linux. Research Computing Team University of Birmingham

Introduction to remote command line Linux. Research Computing Team University of Birmingham Introduction to remote command line Linux Research Computing Team University of Birmingham Linux/UNIX/BSD/OSX/what? v All different v UNIX is the oldest, mostly now commercial only in large environments

More information

Operating Systems, Unix Files and Commands SEEM

Operating Systems, Unix Files and Commands SEEM Operating Systems, Unix Files and Commands SEEM 3460 1 Major Components of Operating Systems (OS) Process management Resource management CPU Memory Device File system Bootstrapping SEEM 3460 2 Programs

More information

Unix Basics. UNIX Introduction. Lecture 14

Unix Basics. UNIX Introduction. Lecture 14 Unix Basics Lecture 14 UNIX Introduction The UNIX operating system is made up of three parts; the kernel, the shell and the programs. The kernel of UNIX is the hub of the operating system: it allocates

More information

Lab Authentication, Authorization, and Accounting

Lab Authentication, Authorization, and Accounting Objectives Given a scenario, select the appropriate authentication, authorization, or access control Install and configure security controls when performing account management, based on best practices

More information

This is Lab Worksheet 3 - not an Assignment

This is Lab Worksheet 3 - not an Assignment This is Lab Worksheet 3 - not an Assignment This Lab Worksheet contains some practical examples that will prepare you to complete your Assignments. You do not have to hand in this Lab Worksheet. Make sure

More information

Essential Unix (and Linux) for the Oracle DBA. Revision no.: PPT/2K403/02

Essential Unix (and Linux) for the Oracle DBA. Revision no.: PPT/2K403/02 Essential Unix (and Linux) for the Oracle DBA Revision no.: PPT/2K403/02 Architecture of UNIX Systems 2 UNIX System Structure 3 Operating system interacts directly with Hardware Provides common services

More information

Linux Kung Fu. Stephen James UBNetDef, Spring 2017

Linux Kung Fu. Stephen James UBNetDef, Spring 2017 Linux Kung Fu Stephen James UBNetDef, Spring 2017 Introduction What is Linux? What is the difference between a client and a server? What is Linux? Linux generally refers to a group of Unix-like free and

More information

An Introduction to Unix Power Tools

An Introduction to Unix Power Tools An to Unix Power Tools Randolph Langley Department of Computer Science Florida State University August 27, 2008 History of Unix Unix Today Command line versus graphical interfaces to COP 4342, Fall History

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

Lab Working with Linux Command Line

Lab Working with Linux Command Line Introduction In this lab, you will use the Linux command line to manage files and folders and perform some basic administrative tasks. Recommended Equipment A computer with a Linux OS, either installed

More information

Welcome to Linux. Lecture 1.1

Welcome to Linux. Lecture 1.1 Welcome to Linux Lecture 1.1 Some history 1969 - the Unix operating system by Ken Thompson and Dennis Ritchie Unix became widely adopted by academics and businesses 1977 - the Berkeley Software Distribution

More information

Optional Labs. 0Handouts: 2002 ProsoftTraining All Rights Reserved. Version 3.07

Optional Labs. 0Handouts: 2002 ProsoftTraining All Rights Reserved. Version 3.07 0Handouts: Optional Lab 1-1: Understanding the /etc/securetty file In this lab, you will examine a PAM component, the /etc/securetty file. 1. Boot into Linux as root. Open a Telnet client and attempt to

More information

Some Linux (Unix) Commands that might help you in ENSC351

Some Linux (Unix) Commands that might help you in ENSC351 Some Linux (Unix) Commands that might help you in ENSC351 First, like Windows, Linux and Unix (for our purposes, they are the basically the same) use a hierarchical directory structure. What would be called

More information

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file

More information

Appendix A GLOSSARY. SYS-ED/ Computer Education Techniques, Inc.

Appendix A GLOSSARY. SYS-ED/ Computer Education Techniques, Inc. Appendix A GLOSSARY SYS-ED/ Computer Education Techniques, Inc. $# Number of arguments passed to a script. $@ Holds the arguments; unlike $* it has the capability for separating the arguments. $* Holds

More information

Scripting Languages Course 1. Diana Trandabăț

Scripting Languages Course 1. Diana Trandabăț Scripting Languages Course 1 Diana Trandabăț Master in Computational Linguistics - 1 st year 2017-2018 Today s lecture Introduction to scripting languages What is a script? What is a scripting language

More information

Commands are in black

Commands are in black Starting From the Shell Prompt (Terminal) Commands are in black / +--------+---------+-------+---------+---------+------ +------ +------ +------ +------ +------ +-- Bin boot dev etc home media sbin bin

More information

Best practices on deployment of IBM Rational. servers

Best practices on deployment of IBM Rational. servers Best practices on deployment of IBM Rational License key server(rlks) on Linux and Unix servers Pankaj Sharma and Sombir Yadav October 21, 2015 Page 1 of 25 INTRODUCTION CONFIGURATION OF LICENSE FILE ON

More information