UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES. BSc (Hons) COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATION 2014/2015 UNIX MODULE NO: CPU5003
|
|
- Lawrence Jessie Stephens
- 5 years ago
- Views:
Transcription
1 [CRT09] UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES BSc (Hons) COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATION 2014/2015 MODULE NO: CPU5003 Date: Wednesday 21 st January 2015 Time: 10:00 13:00 INSTRUCTIONS TO CANDIDATES: There are SIX questions. Answer ANY FOUR questions. All questions carry equal marks. Marks for parts of questions are shown in brackets. Unless otherwise stated all symbols take their usual meaning. Electronic calculators may be used provided that data and program storage memory is cleared prior to the examination.
2 Page 2 of 7 Question 1 Q1 a) Describe the primary function of the following directories: /home /tmp /var /root /sbin /dev /etc /mnt (8 marks) Q1 b) Compare and contrast the functionality of the following two commands: cp mv (2 marks) Q1 c) A root user issues the following sequence of commands in the order shown. After each command, what would be the full pathname of the user s present working directory. (You should assume that the directory /var/spool/mail/etc does not exist) cd /var/spool/mail cd etc cd../.. cd /etc cd.. cd - cd ~/games cd / cd.. cd ~ cd. cd../var cd spool cd (14 marks)
3 Page 3 of 7 Question 2 Q2 a) Examine the following output.. [rhc1@central ~]$ ls -l total 8 -rwxr--r-- 1 rhc1 secgroup 2716 Oct 30 12:37 pentest [rhc1@central ~]$ The user rhc1 would like to change the permissions on the file pentest so that other members of his group could execute this script. What command might he issue to make this change? No other permissions on the file should be changed. What would be the affect of the following two commands: chmod 777 pentest chmod 444 pentest (4 marks) Q2 b) Examine the following output and provide an interpretation of the permissions listed that explains who has permission to do what. (11 marks) [root@central ~]$ ls -l total 16 -rwxr-xr-- 1 root secgroup Mar 14 22: list drwxr-x--- 1 root secgroup Mar 16 20: listoutput [root@central ~]$ Q2 c) Explain the concept of an SUID script. How do you create such a script, how do its permissions appear and why are they often viewed as a security risk? (6 marks) Q2 d) Provide a brief overview of the sticky bit. Ensure that you cover its affect, how it is assigned and how you can tell if it is present. (4 marks)
4 Page 4 of 7 Question 3 Q3 a) A system provides a service that must be available for 20 hours each day. The only time that this service does not run is between the hours of 3 and 7 each morning. The following two requests have been made of the administrator: that the system should be re-booted every day; and that an audit script (/usr/local/bin/audit) should be executed every Monday morning. This script takes an hour to run. Both of these activates need to be completed during the hours that the service does not run (between 3 and 7 in the morning). Provide a detailed explanation of how cron can be used to achieve this inclusive of the configuration changes that need to be made and the commands that will be used. To assist you, an extract from the output of the command man cron can be found in below. [rhc1@cet-apache-02 ~]$ man cron. information taken out. The time and date fields are: field allowed values minute 0-59 hour 0-23 day of month 1-31 month 1-12 (or names, see below) day of week 0-7 (0 or 7 is Sun, or use names) A field may be an asterisk (*), which always stands for first-last.. information taken out. (15 marks) Question 3 continues over the page.
5 Page 5 of 7 Question 3 continued. Q3 b) A system is to be brought down for maintenance at 9.00 am on a Sunday morning and will not be operational again until 1.00 am on Monday. Assuming that it is now 4.00 pm on Friday evening, write a series of commands as root that will schedule the following events: at 5 pm this evening, send a message to all users informing them that no one will be able to use the system from 8.00 am on Sunday until 2.00 am on Monday; send a similar message to all users at 5 pm on Saturday; at 8.00 am on Sunday morning create a file called /etc/nologin (the existence of this file will stop users from logging in); at 8.30 am on Sunday morning shutdown the system; at 2 pm on Monday morning, delete the /etc/nologin file. (10 marks) Question 4 Q4 a) Write two commands, one that will extract the IP address from the output of the /sbin/ifconfig command and place it into a variable called IPADDR and another that will extract the MAC address and place it in a variable called MACADDR. An example output from the /sbin/ifconfig command can be found below. In this case the IP address is and the MAC address is 00:10:83:02:E2:A8 (8 marks) [rhc1@cet-apache-02 class]$ /sbin/ifconfig eth0 eth0 Link encap:ethernet HWaddr 00:10:83:02:E2:A8 inet addr: Bcast: Mask: inet6 addr: fe80::210:83ff:fe02:e2a8/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets: errors:0 dropped:0 overruns:0 frame:0 TX packets: errors:0 dropped:0 overruns:0 carrier:0 collisions:6593 txqueuelen:1000 RX bytes: (158.0 MiB) TX bytes: (122.8 MiB) Interrupt:5 Base address:0xece0 Question 4 continues over the page.
6 Page 6 of 7 Question 4 continued. Q4 b) What would be the affect of the following command? (4 marks) /sbin/ifconfig eth0 grep [0-9]$ Q4 c) A change has been made in the University and all user ids that contain the abbreviation 'ect' but now be changed to contain the abbreviation 'crt'. For example a username abc1ect must now be changed to abc1crt. Write a command that will effect these changes in the password file. You should assume that home directory names are not going to change. (6 marks) To assist you an example of a password file (/etc/passwd) is below: root@gem-gateway ~]# cat /etc/passwd root:x:0:0:root:/root:/bin/bash bin:x:1:1:bin:/bin:/sbin/nologin daemon:x:2:2:daemon:/sbin:/sbin/nologin information taken out ra4bct:x:303:500::/home/ra4bct:/bin/bash ad3ect:x:304:500::/home/ad3ect:/bin/bash rc2ect:x:305:500::/home/rc2ect:/bin/bash lb1bct:x:306:500::/home/lb1bct:/bin/bash ms1ect:x:307:500::/home/ms1ect:/bin/bash ge3bct:x:308:500::/home/ge3bct:/bin/bash ai1ect:x:309:500::/home/ai1ect:/bin/bash tut1mon:x:310:501::/home/tut1mon:/bin/bash tut1tue:x:311:501::/home/tut1tue:/bin/bash tut2wed:x:312:501::/home/tut2wed:/bin/bash information taken out Q4 d) Write a command that will list the usernames of all users on a system who have a UID between 300 and 350 Demonstrate how grep can be added to this to separate out all user names starting with tut (10 marks)
7 Page 7 of 7 Question 5 Q5 a) Compare and contrast the three formats of iteration commonly used in bash scripting. You should explain in detail how these forms of iteration operate and illustrate your answer with example algorithms. (25 marks) Question 6 Q6 a) Compare and contrast three formats of conditional statements used in bash scripting. You should explain in detail how these forms of conditional statement operate and illustrate your answer with example algorithms. (25 marks) END OF QUESTIONS
UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES. BSc (Hons) COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATION 2017/2018 UNIX MODULE NO: CPU5003
[CRT06] UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES BSc (Hons) COMPUTER NETWORKS AND SECURITY SEMESTER ONE EXAMINATION 2017/2018 UNIX MODULE NO: CPU5003 Date: Wednesday 17 th January 2018 Time: 10:00 12:00
More informationUNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING WITH WEBSITE DEVELOPMENT SEMESTER ONE EXAMINATIONS 2018/2019 UNIX MODULE NO: CPU5003
[CRT08] UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING WITH WEBSITE DEVELOPMENT SEMESTER ONE EXAMINATIONS 2018/2019 UNIX MODULE NO: CPU5003 Date: Wednesday 16 th January 2019 Time: 10:00 12:00 INSTRUCTIONS
More informationLet us ping! First we will learn the Hello World of a networked machine.
AN INTRODUCTION TO LINUX NETWORKING In this article, we ll explore networking under GNU/Linux. You ll find it interesting to manage the entire network through certain valid keystrokes known as commands.
More informationWi-Fi Guide: Edimax USB Adapter on BBG
Wi-Fi Guide: Edimax USB Adapter on BBG August 3 rd 2017 Table of Contents: Page 1: Page 2: Page 3: Page 4: Page 5: Introduction & Hardware requirements Getting Started Connecting to a network using Network
More informationRG-MACC_2.0 Installation Manual
RG-MACC_2.0 Installation Manual Ruijie Networks Co., Ltd all rights reserved 1 Copyright Clarify Copyright ownership belongs to Ruijie, shall not be reproduced, copied, or used in other ways without permission.
More informationCIS Test 1- Practice - Fall 2011
CIS 192 - Test 1- Practice - Fall 2011 Name Each question worth 2 points: Tip: When not logged in as root, you can still use many of the network commands but you must preface them with /sbin/ because you
More informationGM8126 MAC DRIVER. User Guide Rev.: 1.0 Issue Date: December 2010
GM8126 MAC DRIVER User Guide Rev.: 1.0 Issue Date: December 2010 REVISION HISTORY Date Rev. From To Dec. 2010 1.0 - Original Copyright 2010 Grain Media, Inc. All Rights Reserved. Printed in Taiwan 2010
More informationIP over IB Protocol. Introduction CHAPTER
CHAPTER 3 The following sections appear in this chapter: Introduction, page 3-1 Manually Configure IPoIB for Default IB Partition, page 3-2 Subinterfaces, page 3-2 Verify IPoIB Functionality, page 3-5
More informationOracle 11g RAC on Linux- CRS Inderpal S. Johal. Inderpal S. Johal
ORACLE CRS INSTALLATION : INSTALLATION AND CONFIGURATION GUIDE Inderpal S. Johal INTRODUCTION This document will gives details of Oracle Clusterware installation on RHEL 4. CRS INSTALLATION STEPS 1. Cluster
More informationTABLE OF CONTENTS. ACI Solutions Team by Tomas de Leon 2
TABLE OF CONTENTS 1 INTRODUCTION... 3 2 LAB REFERENCE & TOPOLOGY INFORMATION... 3 3 DELETE THE EXISTING OUT OF BAND NODE MANAGEMENT ADDRESSES CONFIGURATION FOR YOUR DESIGNATED ACI FABRIC... 4 4 CONFIGURE
More informationRG-MACC-BASE_v2.01. Installation Guide
RG-MACC-BASE_v2.01 Preface Thank you for using our products. Audience This manual is intended for: Network engineers Technical support and servicing engineers Network administrators Symbols Important information.
More informationEnabling CDC_ETHER Connection for Skywire GSM CAT1
Enabling CDC_ETHER Connection for Skywire GSM CAT1 NimbeLink Corp Updated: February 2018 PN 30262 rev 4 NimbeLink Corp. 2018. All rights reserved. 1 Table of Contents Table of Contents 2 1. Introduction
More informationAccessing the Networking Stack
The Cisco IOS XR Software serves as a networking stack for communication. This section explains how applications on IOS XR can communicate with internal processes, and with servers or outside devices.
More informationStampA5D3x/PortuxA5/PanelA5. Quickstart Guide
StampA5D3x/PortuxA5/PanelA5 Quickstart Guide StampA5D3x/PortuxA5/PanelA5 StampA5D3x/PortuxA5/PanelA5: Quickstart Guide Copyright 2015 taskit GmbH All rights to this documentation and to the product(s)
More informationEnabling CDC-ETHER Connection for Skywire CAT1
Enabling CDC-ETHER Connection for Skywire CAT1 NimbeLink Corp Updated: May 2017 PN 30111 rev 5 NimbeLink Corp. 2017. All rights reserved. 1 Table of Contents Table of Contents 2 1. Introduction 2 1.1 Orderable
More informationXE2000/XE3000 IP-PBX: Getting Started Guide Package Contents
XE2000/XE3000 IP-PBX: Getting Started Guide Package Contents XE2000/XE3000 (2U 19'' width unit) Power cord Support hardware for 19'' cabinet Prerequisites You need a computer equipped with Internet browser.
More informationNetwork Configuration for Cisco UCS Director Baremetal Agent
Network Configuration for Cisco UCS Director Baremetal Agent This chapter contains the following sections: About the Network Configuration Options, page 1 Single Network for Management and PXE, page 1
More informationHostname and IP Address
1/19 IP Addressing Surasak Sanguanpong nguan@ku.ac.th http://www.cpe.ku.ac.th/~nguan Last updated: 27 June 2002 Hostname and IP Address 2/19 browser What is the IP address of www.isoc.org? www.isoc.org
More informationUCS IPv6 Management Configuration Example
UCS IPv6 Management Configuration Example Document ID: 118784 Contributed by Padmanabhan Ramaswamy and Shankar Prasath, Cisco TAC Engineers. Mar 06, 2015 Contents Introduction Prerequisites Requirements
More informationNew System Setup Guide
New System Setup Guide Logging into PBXact UC Quick Setup Wizard STEP 1: Time Zone and Email STEP 2: Extension Creation STEP 3: Extension Customization Dashboard Module Configuration Extensions IVR Inbound
More informationCHAPTER 7 DEMONSTRATE THE PAN IN LINUX
CHAPTER 7 DEMONSTRATE THE PAN IN LINUX SYSTEM The new model - Network Access Point Group Network 7.1 DEMONSTRATION Software: All machines are installed with Linux Redhat 8.0 Hardware list:- There are two
More informationAccess Server: User's and Developer's Guide <<< Previous Next >>>
1 of 14 12/9/2008 10:18 AM Access Server: User's and Developer's Guide > Chapter 2. Getting Started with Access Server Access Server can be controlled in three ways: by using the WWW
More informationChapter 5 Network Layer
Chapter 5 Network Layer Network Layer IPv4 2 IP Header Application Header + data 3 IP IP IP IP 4 Focus on Transport Layer IP IP 5 Network Layer The Network layer (Layer 3) provides services to exchange
More informationClustered Data ONTAP 8.3 Update 2, IPspaces. Self-paced Lab NETAPP UNIVERSITY. NetApp University - Do Not Distribute
NETAPP UNIVERSITY Clustered Data ONTAP 8.3 Update 2, IPspaces Self-paced Lab Course ID: STRSW-SPL-CDOT83UPD2 Content Version: 1.0 ATTENTION The information contained in this course is intended only for
More informationCreate Test Environment
Create Test Environment Describes how to set up the Trafodion test environment used by developers and testers Prerequisites Python Passwordless ssh If you already have an existing set of ssh keys If you
More informationNVIDIA Professional Application Center
NVIDIA Professional Application Center Network Licensing Guide 5 May 2017 Document version 2.0 Copyright Information 2017 NVIDIA Corporation. All rights reserved. This document is protected under copyright
More informationConfiguring a Standalone VCL Environment using VMware Server 2.0
Configuring a Standalone VCL Environment using VMware Server 2.0 DISCLAIMER! This document provides instuctions for configuring a standalone VCL environment running on a single computer which is able to
More informationssh keys, yum, ntp, rsync
ssh keys, yum, ntp, rsync 1 CST8177 Linux Operating Systems II Saturday 25-April-15 9:00-11:00 T119/T126 2 ifconfig to find your VM's ip address so you can ssh to it ssh key login yum ntp tar scp rsync
More informationGetting Started with PetaLinux SDK
Getting Started with PetaLinux SDK November 26, 2009 Table of Contents Table of Contents...2 About This Guide...3 Related PetaLinux Documents...3 Getting Started...3 Prerequisites...3 Installation...4
More informationNewsreader virtual machines Technical Report NWR
Newsreader virtual machines Technical Report NWR-2014-4 Version FINAL Aitor Soroa 1, Enrique Fernández 2 1 University of Basque Country Donostia, Basque Country a.soroa@ehu.es 2 University of Basque Country
More informationHosting Applications Using Configuration Management Tools
Hosting Applications Using Configuration Management Tools Configuration management tools are used to automate manual tasks, such as setting up servers and network devices. As application delivery requirements
More informationQuick guide for configuring a system with multiple IP-LINKs
Quick guide for configuring a system with multiple IP-LINKs October 4 th 2005, KK. This guide will show an example configurations for a system with multiple IP-LINKs. Example 1, three devices connected
More informationThese documents and software are covered under the terms and conditions of the fp Technologies, Inc. Program License Agreement
Copyright 2017, fp Technologies, Inc. All Rights Reserved These documents and software are covered under the terms and conditions of the fp Technologies, Inc. Program License Agreement You will need to
More informationLinux Systems Administration Getting Started with Linux
Linux Systems Administration Getting Started with Linux Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International
More informationBlueprints. Quick Start Guide for installing and running KVM
Blueprints Quick Start Guide for installing and running KVM Blueprints Quick Start Guide for installing and running KVM Note Before using this information and the product it supports, read the information
More informationMultiplying Your Server Ubuntu Server and Virtualization
CHAPTER 12 Multiplying Your Server Ubuntu Server and Virtualization One of the hottest new technologies for servers is virtualization, which allows you to install multiple instances of one or more operating
More informationInternet Tool Practice. 이지민 장동현
Internet Tool Practice 이지민 (jmlee@mmlab.snu.ac.kr) 장동현 (dhjang@mmlab.snu.ac.kr) 2011. 11. 2 1 Outline Internet Tools ping traceroute nslookup ifconfig arp netstat synack nmap Iperf crontab Homeworks 2
More informationPetaLinux SDK Guide to QEMU System Simulation
PetaLinux SDK Guide to QEMU System Simulation v1.1 November 27, 2009 Table of Contents Table of Contents...2 About This Guide...3 Related PetaLinux Documents...3 PetaLinux Software Simulation with QEMU...3
More informationLinux. Computer networks - Administration 1DV202. fredag 30 mars 12
Linux Computer networks - Administration 1DV202 Configuration files /etc/hosts /etc/resolv.conf /etc/network/interfaces /etc/hosts 127.0.0.1 localhost.localdomain localhost 127.0.1.1 lokal.kalmar.se lokal
More informationLinux & Shell Programming 2014
Unit -1: Introduction to UNIX/LINUX Operating System Practical Practice Questions: Find errors (if any) otherwise write output or interpretation of following commands. (Consider default shell is bash shell.)
More informationUser module. Guest Configuration APPLICATION NOTE
User module Guest Configuration APPLICATION NOTE USED SYMBOLS Used symbols Danger important notice, which may have an influence on the user s safety or the function of the device. Attention notice on possible
More informationGNU/Linux 101. Casey McLaughlin. Research Computing Center Spring Workshop Series 2018
GNU/Linux 101 Casey McLaughlin Research Computing Center Spring Workshop Series 2018 rccworkshop IC;3df4mu bash-2.1~# man workshop Linux101 RCC Workshop L101 OBJECTIVES - Operating system concepts - Linux
More informationSirindhorn International Institute of Technology Thammasat University
1 Name...ID....Section. Seat No.. Sirindhorn International Institute of Technology Thammasat University Midterm Examination: Semester 2/2007 Course Title : ITS 332 Information Technology II Lab (Networking)
More informationSetting Up A High-Availability Load Balancer (With Failover and Session Support) With HAProxy/Wackamole/Spread On Debian Etch
By Falko Timme Published: 2009-01-04 17:28 Setting Up A High-Availability Load Balancer (With Failover and Session Support) With HAProxy/Wackamole/Spread On Debian Etch Version 1.0 Author: Falko Timme
More informationWelcome to getting started with Ubuntu Server. This System Administrator Manual. guide to be simple to follow, with step by step instructions
Welcome to getting started with Ubuntu 12.04 Server. This System Administrator Manual guide to be simple to follow, with step by step instructions with screenshots INDEX 1.Installation of Ubuntu 12.04
More informationManage Jobs with cron and at
Manage Jobs with cron and at As a SLES 11 administrator, you will find that there are many tasks that need to be carried out on a regular basis on your Linux system. For example, you may need to update
More informationUsing Shell Commands
This chapter contains the following sections: General Administration, page 1 Working with Databases, page 9 Importing Certificates, page 13 Accessing Root Privileges, page 14 Using a Multi-Node Setup,
More informationUsing Juju with a Local Provider with KVM and LXC in Ubuntu LTS
Using Juju with a Local Provider with KVM and LXC in Ubuntu 14.04 LTS A Dell and Canonical Technical White Paper Mark Wenning Canonical Field Engineer Jose De la Rosa Dell Software Engineer 2 THIS WHITE
More informationMonospace $ ls -latr pictures # less /var/log/messages $ # ipchains turboclusteradmin # mount /mnt/cdrom # cd /mnt/cdrom TLCS-install #./TLCS-install redhat turbolinux
More informationFiberstoreOS IP Service Configuration Guide
FiberstoreOS IP Service Configuration Guide Contents 1 Configuring ARP...4 1.1 Overview...4 1.2 Configuring ARP... 4 1.3 Validation commands...5 2 Configuring Proxy ARP... 7 2.1 Overview...7 2.2 Configuring
More informationLinux Essentials. Programming and Data Structures Lab M Tech CS First Year, First Semester
Linux Essentials Programming and Data Structures Lab M Tech CS First Year, First Semester Adapted from PDS Lab 2014 and 2015 Login, Logout, Password $ ssh mtc16xx@192.168.---.--- $ ssh X mtc16xx@192.168.---.---
More informationGetting your department account
02/11/2013 11:35 AM Getting your department account The instructions are at Creating a CS account 02/11/2013 11:36 AM Getting help Vijay Adusumalli will be in the CS majors lab in the basement of the Love
More informationIntroduction to Linux. Roman Cheplyaka
Introduction to Linux Roman Cheplyaka Generic commands, files, directories What am I running? ngsuser@ubuntu:~$ cat /etc/lsb-release DISTRIB_ID=Ubuntu DISTRIB_RELEASE=16.04 DISTRIB_CODENAME=xenial DISTRIB_DESCRIPTION="Ubuntu
More informationGetting Started with Application Hosting
This section introduces application hosting and the Linux environment used for hosting applications on the Cisco IOS XR Operating System. Need for Application Hosting, page 1 Deep Dive Into Application
More informationcron How-To How to use cron to Schedule rsync Synchronizations September 29, 2004
cron How-To How to use cron to Schedule rsync Synchronizations September 29, 2004 615-0006-01 2004 Net Integration Technologies Inc. All company and product names are registered trademarks off their respective
More informationAdding NetFPGA board into CRON. Change wires table, if you change the switch cable connection
Adding NetFPGA board into CRON Lin Xue, lxue2@tigers.lsu.edu, LANET@LSU April 2011 Change wires table, if you change the switch cable connection Note: this might not related to adding a NetFPGA, but this
More informationGMSplus Customer Connection Test Procedure
GMS-xx Customer Connection Test Procedure Page 1/14 GMSplus Customer Connection Test Procedure Company: Author: Checked: Approved: Distribution: GeoSIG Ltd Wiesenstrasse 39, 8952 Schlieren, Switzerland,
More informationWLAN on DILNetPC DNP9200 External SWAP Device on DNP9200
WLAN on DILNetPC DNP9200 External SWAP Device on DNP9200 Picture 1: DNP9200 + eval board SK23, external mini USB2.0 Hub with a 11Mbps WLAN USB Adapter and 1GB high speed(192x) USB SWAP device. Attention:
More informationUNIX File Hierarchy: Structure and Commands
UNIX File Hierarchy: Structure and Commands The UNIX operating system organizes files into a tree structure with a root named by the character /. An example of the directory tree is shown below. / bin
More informationChapter-3. Introduction to Unix: Fundamental Commands
Chapter-3 Introduction to Unix: Fundamental Commands What You Will Learn The fundamental commands of the Unix operating system. Everything told for Unix here is applicable to the Linux operating system
More informationAPPLICATION NOTE. Scope. Reference Documents. Software Ethernet Bridge on SAMA5D3/D4. Atmel SMART SAMA5D3/D4 Series
SMART APPLICATION NOTE Software Ethernet Bridge on SAMA5D3/D4 Atmel SMART SAMA5D3/D4 Series Scope The Atmel SMART SAMA5D3/D4 series are high-performance, power-efficient embedded MPUs based on the ARM
More informationChapter Two. Lesson A. Objectives. Exploring the UNIX File System and File Security. Understanding Files and Directories
Chapter Two Exploring the UNIX File System and File Security Lesson A Understanding Files and Directories 2 Objectives Discuss and explain the UNIX file system Define a UNIX file system partition Use the
More informationProduct Correction Notice (PCN)
Product Correction Notice (PCN) Issue Date: April 15, 2005 Archive Date: July 31, 2009 Supplement 2 Release Date: June 7, 2007 PCN Number: 1499P SECTION 1 - CUSTOMER NOTICE Product Impacted: S8300B MEDIA
More informationInstallation von Oracle Real Application Cluster 10gR1 auf CentOS 4.2 mit Raw-Devices
Installation von Oracle Real Application Cluster 10gR1 auf CentOS 4.2 mit Raw-Devices Inhaltsverzeichnis Installation von Oracle Real Application Cluster 10gR1 auf CentOS 4.2 mit Raw-Devices... 1 1. Installation
More informationThe following topics explain how and when Prime Network performs backups.
CHAPTER 8 These topics describe how to back up and restore your data: Backing Up Your Data, page 8-1 Restoring Prime Network Data, page 8-4 For information on how to backup and restore an embedded database,
More informationHP Services zl Module ngenius Integrated Agent Installation and Getting Started Guide
HP Services zl Module ngenius Integrated Agent Installation and Getting Started Guide Part Number 733-0207 www.hp.com/networking Revision A www.netscout.com September 28, 2010 Copyright 2008 Hewlett-Packard
More informationCS158 - Assignment 9 Faster Naive Bayes? Say it ain t so...
CS158 - Assignment 9 Faster Naive Bayes? Say it ain t so... Part 1 due: Sunday, Nov. 13 by 11:59pm Part 2 due: Sunday, Nov. 20 by 11:59pm http://www.hadoopwizard.com/what-is-hadoop-a-light-hearted-view/
More informationIntroduction to Unix: Fundamental Commands
Introduction to Unix: Fundamental Commands Ricky Patterson UVA Library Based on slides from Turgut Yilmaz Istanbul Teknik University 1 What We Will Learn The fundamental commands of the Unix operating
More informationVisibleThread - Server Configuration Help
VisibleThread - Server Configuration Help Version 2.13 (November 2016) Copyright 2017 VisibleThread Limited. This document is the copyright of VisibleThread Limited and may not be reproduced in whole or
More informationGM8126 U-BOOT. User Guide Rev.: 0.2 Issue Date: May 2011
GM8126 U-BOOT User Guide Rev.: 0.2 Issue Date: May 2011 REVISION HISTORY Date Rev. From To Apr. 2011 0.1 - Original May 2011 0.2 - Modified Chapters 5 and 8 Added Chapter 7 Copyright 2011 Grain Media,
More informationApplication Hosting Configuration Guide for Cisco ASR 9000 Series Routers
Application Hosting Configuration Guide for Cisco ASR 9000 Series Routers First Published: 2016-11-01 Last Modified: 2017-09-05 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose,
More informationCommands are in black
Starting From the Shell Prompt (Terminal) Commands are in black / +--------+---------+-------+---------+---------+------ +------ +------ +------ +------ +------ +-- Bin boot dev etc home media sbin bin
More informationOverview LEARN. History of Linux Linux Architecture Linux File System Linux Access Linux Commands File Permission Editors Conclusion and Questions
Lanka Education and Research Network Linux Architecture, Linux File System, Linux Basic Commands 28 th November 2016 Dilum Samarasinhe () Overview History of Linux Linux Architecture Linux File System
More informationThis document guides the user through: 1. Setting up and configuring networking for the BeagleBone black or green with the host.
Networking Guide for BeagleBone (Black or Green) by Brian Fraser Last update: Nov 17, 2017 This document guides the user through: 1. Setting up and configuring networking for the BeagleBone black or green
More informationNetworking Approaches in. a Container World. Flavio Castelli Engineering Manager
Networking Approaches in a Container World Flavio Castelli Engineering Manager fcastelli@suse.com Rossella Sblendido Engineering Manager rsblendido@suse.com Disclaimer There a many container engines, I
More informationOperating Systems. Copyleft 2005, Binnur Kurt
3 Operating Systems Copyleft 2005, Binnur Kurt Content The concept of an operating system. The internal architecture of an operating system. The architecture of the Linux operating system in more detail.
More informationOperating Systems 3. Operating Systems. Content. What is an Operating System? What is an Operating System? Resource Abstraction and Sharing
Content 3 Operating Systems The concept of an operating system. The internal architecture of an operating system. The architecture of the Linux operating system in more detail. How to log into (and out
More informationLinux Essentials Objectives Topics:
Linux Essentials Linux Essentials is a professional development certificate program that covers basic knowledge for those working and studying Open Source and various distributions of Linux. Exam Objectives
More informationIntroduction Into Linux Lecture 1 Johannes Werner WS 2017
Introduction Into Linux Lecture 1 Johannes Werner WS 2017 Table of contents Introduction Operating systems Command line Programming Take home messages Introduction Lecturers Johannes Werner (j.werner@dkfz-heidelberg.de)
More informationOperating Systems Lab 1 (Users, Groups, and Security)
Operating Systems Lab 1 (Users, Groups, and Security) Overview This chapter covers the most common commands related to users, groups, and security. It will also discuss topics like account creation/deletion,
More informationCS 300. Data Structures
CS 300 Data Structures Start VirtualBox Search or Windows Run C:\CS300 Launches CS 300/360 Virtual Machine (Eventually) Logon with Zeus password Syllabus http://zeus.cs.pacificu.edu/chadd/cs300f18/syllabus.html
More informationSTEP BY STEP ORACLE RAC 12C (FLEX ASM) INSTALLATION ON LINUX X86_64 (VM)
STEP BY STEP ORACLE RAC 12C (FLEX ASM) INSTALLATION ON LINUX X86_64 (VM) V1.0 Contents 1. Prepare Operating System 2. GRID Infrastructure Installation 3. RDBMS Installation 4. Container Database Creation
More informationIntroduction to Unix May 24, 2008
Introduction to Unix May 24, 2008 Exercises: Privileges REFERENCE Reference: Shah, Steve, "Linux Administration: A Beginner's Guide", 2nd. ed., Osborne press, New York, NY. If you look at files in a directory
More informationUnix Basics. UNIX Introduction. Lecture 14
Unix Basics Lecture 14 UNIX Introduction The UNIX operating system is made up of three parts; the kernel, the shell and the programs. The kernel of UNIX is the hub of the operating system: it allocates
More informationFiles
http://www.cs.fsu.edu/~langley/cop3353-2013-1/reveal.js-2013-02-11/02.html?print-pdf 02/11/2013 10:55 AM Files A normal "flat" file is a collection of information. It's usually stored somewhere reasonably
More informationRH-202. RedHat. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs)
RedHat RH-202 Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) Download Full Version : https://killexams.com/pass4sure/exam-detail/rh-202 QUESTION: 159 Install the dialog-* Questions asking
More informationBasics of GNS3 and Cisco IOS
Lab00: Objectives: Basics of GNS3 and Cisco IOS IERG4090 Lab00 P.1 Upon completion of this lab, you will be able to: - Extract a given topology GNS3 archive - Start GNS3 - Open the given topology file
More informationEssential Unix and Linux! Perl for Bioinformatics, ! F. Pineda
Essential Unix and Linux! Perl for Bioinformatics, 140.636! F. Pineda Generic computer architecture Memory Storage Fig. 1.2 From Designing Embedded Hardware, 2 nd Ed. by John Catsoulis OS concepts Shell
More informationReplace HyperFlex Self-Signed SSL Certificates with CA-issued Certificates
Replace HyperFlex Self-Signed SSL Certificates with CA-issued Certificates Contents Google Chrome Mozila FireFox Software Credentials HX Cluster DNS Server Certificate Authority vcenter Server 1. Create
More informationHow to configure VIVACOM 3g USB ( internet ) modem HUAWEI Mobile broadband E173 on Debian and Ubuntu GNU / Linux
How to configure VIVACOM 3g USB ( internet ) modem HUAWEI Mobile broadband E173 on Debian and Ubuntu GNU / Linux Author : admin I've been given a HUAWEI Mobile Broadband E173 USB 3g model. The USB modem
More informationCS : Computer Programming, Spring 2000 Programming Project #1: Thinking of a Number Due in class Thursday 27 January 2000
CS 1313 010: Computer Programming, Spring 2000 Programming Project #1: Thinking of a Number Due in class Thursday 27 January 2000 For online help check the class website http://www.ecn.ou.edu/cs1313010/
More informationSirindhorn International Institute of Technology Thammasat University
Name...ID... Section...Seat No... Sirindhorn International Institute of Technology Thammasat University Midterm Examination s: Semester 2/2009 Course Title Instructor : ITS332 Information Technology II
More informationUnix Filesystem. January 26 th, 2004 Class Meeting 2
Unix Filesystem January 26 th, 2004 Class Meeting 2 * Notes adapted by Christian Allgood from previous work by other members of the CS faculty at Virginia Tech Unix Filesystem! The filesystem is your interface
More informationCANopen Object Browser, Version 0.2
CANopen Object Browser, Version 0.2 CANopen Object Browser for Linux The CANopen Object Browser is a tool to display and browse through a CANopen Object Dictionary based on EDS-Files. The program allows
More informationUsing vswitch on z/vm
Using z/vm VSWITCH David Kreuter February 13, 2007 Tampa SHARE Session 9124 Using vswitch on z/vm Definition of guest lan Vswitch concepts Vswitch implementation, management, and recovery VM TCPIP stack
More informationHardware. Ahmet Burak Can Hacettepe University. Operating system. Applications programs. Users
Operating System Security Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr Computer System Components Hardware Provides basic computing resources (CPU, memory, I/O devices). Operating system Controls
More informationLS9200 User Guide LinkSprite Technologies, Inc.
LS9200 User Guide LinkSprite Technologies, Inc. 1 / 17 Table of Contents 1. Foreword... 3 2. Features... 3 3. Part and jumper description... 4 Part description... 4 LED and Key description... 4 Jumper
More informationHigh Availability for Cisco RAN Management Systems
First Published: 2014-10-13 Last Modified: 2016-06-13 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387)
More informationRenesas Koelsch Hardware Setup and Software Installation
Renesas Koelsch Hardware Setup and Software Installation Table of content Introduction Master GDP-ivi10 GDP-ivi9 GDP-ivi7 Software setup Pre-built binaries Quick Start Obtain and Install Renesas Graphics
More informationOperating System Security
Operating System Security Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr 1 Computer System Components Hardware Provides basic computing resources (CPU, memory, I/O devices). Operating system
More information