IT Essentials II: NOS Linux Labs Using Knoppix

Size: px
Start display at page:

Download "IT Essentials II: NOS Linux Labs Using Knoppix"

Transcription

1 IT Essentials II: NOS Linux Labs Using Knoppix 1

2 IT Essentials II Linux Labs Using Knoppix Agenda Course Overview Knoppix Lab Map Knoppix Overview Lab: Basic System Administration in Knoppix v2 2

3 IT Essentials II: Network Operating Systems Introduction to multi-user, multitasking networking operating systems Hands-on, lab-oriented course overviews the characteristics of Linux and Windows NT, 2000, and XP operating systems Students will learn about installation procedures, security issues, backup procedures, and remote access IT Essentials II: NOS v3 AND Fundamentals of UNIX course map to CompTIA Linux+ 3

4 Knoppix Lab Map 2005, 2006 Cisco Cisco Systems, Systems, Inc. Inc. All All rights rights reserved. reserved. 4 4

5 Linux Labs in IT Essentials II Package to assist instructors in delivering the Linux labs from the HP IT Essentials II: NOS course A run-from-cd version of Linux Allows a computer to be booted into the Linux OS without installing onto the host machine Boots from the CD, runs entirely in RAM Does not use or write to the hard drive We have chosen Knoppix v3.9 to validate these labs 5

6 Linux Labs in IT Essentials II The package includes the following: A spreadsheet that maps each Linux lab to an alternate Knoppix lab and provides instructions for completion An Instructor Lab Manual that includes a short Knoppix instructor guide and Knoppix labs with answers A Student Lab Manual that contains Knoppix labs without answers 6

7 Linux Labs in IT Essentials II These materials are available: IT Essentials II Tools page Class Home page IT Essentials II Ver. 3.0 KnoppixLabs Map v4 7

8 Knoppix Overview 2005, 2006 Cisco Cisco Systems, Systems, Inc. Inc. All All rights rights reserved. reserved. 8 8

9 Knoppix One of several Run-from-CD distros Boots from the CD, runs entirely in RAM Does not use or write to the hard drive Open Source community -- widely-used = rapid development Ver 3.9 used to validate the Linux labs 9

10 Knoppix Download English Knoppix main page Download the ISO file, approximately 700 MB Burn ISO file to a CD as an image 10

11 Knoppix Lab 2005, 2006 Cisco Cisco Systems, Systems, Inc. Inc. All All rights rights reserved. reserved

12 Knoppix SysAdmin Lab Basic System Administration in Knoppix v2 PART 1 -- Adding Users, Creating Accounts, Assigning passwords, Deleting Users PART 2 -- Creating a Group and Adding Users to the Group, Changing permissions, Renaming and deleting a group PART 3 -- Creating Directories, Removing Directories PART 4 -- Creating a File, Moving the File, Exploring Permissions for a file and a directory 12

13 Using Knoppix Put burned CD into drive and restart computer If the computer is not set to boot from a CD, enter the BIOS by pressing F2 (or DEL or the appropriate key) In BIOS settings, select the CDROM as the first boot device 13

14 Knoppix Boot Boot process: knoppix nosound nodhcp If Knoppix does not recognize the video card it will scan the video card for the different modes it will support A list of resolutions starting with basic VGA (640x480) It is best to use the selection at the bottom of the list 14

15 Knoppix Root Access To open the Root Terminal Press the Penguin icon in bottom taskbar Select Root Shell 15

16 Linux Permissions 2005, 2006 Cisco Cisco Systems, Systems, Inc. Inc. All All rights rights reserved. reserved

17 Linux Permissions Directory had full permissions for all users, output of the ls l command would be drwxrwxrwx rwx stand for Read, Write, and Execute permission Initial d indicates directory, initial - indicates file First rwx grouping is for the owner of the file or directory Second rwx is for a group to whom that file or directory is assigned Third rwx is for everyone else Dash in a grouping indicates no permission 17

18 Linux Permissions For example, drwxr-x--- drwxr-x--- directory drwxr-x--- owner has Read, Write and Execute permission drwxr-x--- group members have Read and Execute permission drwxr-x--- everyone else has no permission at all to access the contents of the directory 18

19 Linux Permissions Three binary digits can be used to efficiently represent the possible combinations of rwx Binary 1 means a permission is granted Binary 0 means a permission is not granted The example drwxr-x--- would be represented by 750 Permissions Binary Conversion Octal Number drwxr-x drwxr-x drwxr-x

20 Linux Permissions r w x octal number

21 Q and A 21

22 22

15. Creating a Samba Server in Knoppix v.3

15. Creating a Samba Server in Knoppix v.3 15. Creating a Samba Server in Knoppix v.3 Estimated Time: 60 minutes Objective In this lab, the student will start the samba service in Knoppix, allowing transfer of files to and from a indows XP computer

More information

Permission and Ownership

Permission and Ownership Permission and Ownership 1. Understanding file and directory ownership Every file on your Linux system, including directories, is owned by a specific user and group. Therefore, file permissions are defined

More information

Fundamentals and Essentials Curriculum Update

Fundamentals and Essentials Curriculum Update Fundamentals and Essentials Curriculum Update 1 Fundamentals / Essentials Courses Agenda Course Pathways Curriculum Updates PNIE IT Essentials I & II Java / UNIX Web Design 2 Current Curriculum Paths CAREERS

More information

Linux Essentials. Programming and Data Structures Lab M Tech CS First Year, First Semester

Linux Essentials. Programming and Data Structures Lab M Tech CS First Year, First Semester Linux Essentials Programming and Data Structures Lab M Tech CS First Year, First Semester Adapted from PDS Lab 2014 and 2015 Login, Logout, Password $ ssh mtc16xx@192.168.---.--- $ ssh X mtc16xx@192.168.---.---

More information

CS Fundamentals of Programming II Fall Very Basic UNIX

CS Fundamentals of Programming II Fall Very Basic UNIX CS 215 - Fundamentals of Programming II Fall 2012 - Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the CS (Project) Lab (KC-265)

More information

5/8/2012. Encryption-based Protection. Protection based on Access Permission (Contd) File Security, Setting and Using Permissions Chapter 9

5/8/2012. Encryption-based Protection. Protection based on Access Permission (Contd) File Security, Setting and Using Permissions Chapter 9 File Security, Setting and Using Permissions Chapter 9 To show the three protection and security mechanisms that UNIX provides To describe the types of users of a UNIX file To discuss the basic operations

More information

Lab Authentication, Authorization, and Accounting

Lab Authentication, Authorization, and Accounting Objectives Given a scenario, select the appropriate authentication, authorization, or access control Install and configure security controls when performing account management, based on best practices

More information

Users, Groups and Permission in Linux

Users, Groups and Permission in Linux Users, Groups and Permission in Linux A small company is using Linux as the main operating and has hired you as a consultant. You completed a site walk through and also met with various individuals for

More information

Unix File System. Class Meeting 2. * Notes adapted by Joy Mukherjee from previous work by other members of the CS faculty at Virginia Tech

Unix File System. Class Meeting 2. * Notes adapted by Joy Mukherjee from previous work by other members of the CS faculty at Virginia Tech Unix File System Class Meeting 2 * Notes adapted by Joy Mukherjee from previous work by other members of the CS faculty at Virginia Tech Unix File System The file system is your interface to: physical

More information

Working with Basic Linux. Daniel Balagué

Working with Basic Linux. Daniel Balagué Working with Basic Linux Daniel Balagué How Linux Works? Everything in Linux is either a file or a process. A process is an executing program identified with a PID number. It runs in short or long duration

More information

Setting Up a Linux Operating System

Setting Up a Linux Operating System Name: Setting Up a Linux Operating System We will be using the Linux operating system for most of our practical work in this class. Knoppix is a live CD distribution of Linux, based on the Debian distribution.

More information

Lab 2A> ADDING USERS in Linux

Lab 2A> ADDING USERS in Linux Lab 2A> ADDING USERS in Linux Objective In this lab, student will learn how to create user accounts using the Linux operating system. Scenario The XYZ Company has just installed a server running Linux.

More information

Lab Install Windows 8

Lab Install Windows 8 Introduction In this lab, you will install Windows 8.1 and 8.0. Recommended Equipment A computer with a blank hard disk drive Windows 8.1 and 8.0 installation DVD or USB flash drive Step 1: Starting the

More information

CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX

CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the EECS labs that dual boot

More information

Operating systems fundamentals - B10

Operating systems fundamentals - B10 Operating systems fundamentals - B10 David Kendall Northumbria University David Kendall (Northumbria University) Operating systems fundamentals - B10 1 / 12 Introduction Basics of protection and security

More information

IT Essentials v6.0 Windows 10 Software Labs

IT Essentials v6.0 Windows 10 Software Labs IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows

More information

Due: February 26, 2014, 7.30 PM

Due: February 26, 2014, 7.30 PM Jackson State University Department of Computer Science CSC 438-01/539-01 Systems and Software Security, Spring 2014 Instructor: Dr. Natarajan Meghanathan Project 1: Exploring UNIX Access Control in a

More information

CST Lab 2 Review #1

CST Lab 2 Review #1 CST8177 - Lab 2 Review #1 Student Name Student number Section Objectives To review command line features, file system access, and permissions Lab Outcome A review of working with the command line A review

More information

Definition. A series of detailed instructions that control the operation of a computer system. are developed by computer programmers

Definition. A series of detailed instructions that control the operation of a computer system. are developed by computer programmers Computer Software Definition A series of detailed instructions that control the operation of a computer system. Software exists as programs that are developed by computer programmers Categories of software

More information

Chapter 8 Operating Systems and Utility Programs أ.أمل زهران

Chapter 8 Operating Systems and Utility Programs أ.أمل زهران Chapter 8 Operating Systems and Utility Programs Chapter 8 Objectives Identify the types of system software Summarize the startup process on a personal computer Summarize the features of several stand-alone

More information

OPS235: Week 1. Installing Linux ( Lab1: Investigations 1-4)

OPS235: Week 1. Installing Linux ( Lab1: Investigations 1-4) OPS235: Week 1 Installing Linux ( Lab1: Investigations 1-4) 1 Agenda: Lab 1 Required materials Thinking Ahead (Tips / Warnings): Importance of Command Line LVM / Host vs Virtual Machines Importance of

More information

Welcome to getting started with Ubuntu Server. This System Administrator Manual. guide to be simple to follow, with step by step instructions

Welcome to getting started with Ubuntu Server. This System Administrator Manual. guide to be simple to follow, with step by step instructions Welcome to getting started with Ubuntu 12.04 Server. This System Administrator Manual guide to be simple to follow, with step by step instructions with screenshots INDEX 1.Installation of Ubuntu 12.04

More information

Downloaded from various sources on the NET

Downloaded from various sources on the NET Overview Computers. Hardware components of a Computer. Purpose and functions of computer operating systems. Evolution of computer operating systems. Operating systems available today. Downloaded from various

More information

1. Open VirtualBox and start your linux VM. Boot the machine and log in with the user account you created in Lab #1. Open the Terminal application.

1. Open VirtualBox and start your linux VM. Boot the machine and log in with the user account you created in Lab #1. Open the Terminal application. CIT 210L Name: Lab #2 1. Open VirtualBox and start your linux VM. Boot the machine and log in with the user account you created in Lab #1. Open the Terminal application. 2. Listing installed packages -

More information

14. Configuring Telnet in Knoppix

14. Configuring Telnet in Knoppix 14. Configuring Telnet in Knoppix Estimated Time: 45 Minutes Objective In this lab, the student will learn how to configure the Telnet service on a system so that the user can remotely administer a Knoppix

More information

CS 200. User IDs, Passwords, Permissions & Groups. User IDs, Passwords, Permissions & Groups. CS 200 Spring 2017

CS 200. User IDs, Passwords, Permissions & Groups. User IDs, Passwords, Permissions & Groups. CS 200 Spring 2017 CS 200 User IDs, Passwords, Permissions & Groups 1 Needed to control access to sharepoints and their contents Because Macs & PCs now support multiple accounts, user IDs and passwords are also needed on

More information

Unix Filesystem. January 26 th, 2004 Class Meeting 2

Unix Filesystem. January 26 th, 2004 Class Meeting 2 Unix Filesystem January 26 th, 2004 Class Meeting 2 * Notes adapted by Christian Allgood from previous work by other members of the CS faculty at Virginia Tech Unix Filesystem! The filesystem is your interface

More information

CST8207: GNU/Linux Operating Systems I Lab Six Linux File System Permissions. Linux File System Permissions (modes) - Part 1

CST8207: GNU/Linux Operating Systems I Lab Six Linux File System Permissions. Linux File System Permissions (modes) - Part 1 Student Name: Lab Section: Linux File System Permissions (modes) - Part 1 Due Date - Upload to Blackboard by 8:30am Monday March 12, 2012 Submit the completed lab to Blackboard following the Rules for

More information

Documentation. OTRS Appliance Installation Guide. Build Date:

Documentation. OTRS Appliance Installation Guide. Build Date: Documentation OTRS Appliance Installation Guide Build Date: 12/10/2014 OTRS Appliance Installation Guide Copyright 2001-2014 OTRS AG This work is copyrighted by OTRS AG. You may copy it in whole or in

More information

Exercise Sheet 2. (Classifications of Operating Systems)

Exercise Sheet 2. (Classifications of Operating Systems) Exercise Sheet 2 Exercise 1 (Classifications of Operating Systems) 1. At any given moment, only a single program can be executed. What is the technical term for this operation mode? 2. What are half multi-user

More information

A. Windows 7 and USB driver installation

A. Windows 7 and USB driver installation DE173 First Edition October 2016 A. Windows 7 and USB driver installation Based on the chipset specification, your system requires the USB driver to be preloaded in order to use USB keyboard/mouse during

More information

Introduction to Linux

Introduction to Linux Introduction to Linux M Tech CS I 2015-16 Arijit Bishnu Debapriyo Majumdar Sourav Sengupta Mandar Mitra Login, Logout, Change password $ ssh, ssh X secure shell $ ssh www.isical.ac.in $ ssh 192.168 $ logout,

More information

Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers

Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Review of the Linux File System and Linux Commands 1. Introduction Becoming adept at using the Linux OS requires gaining familiarity

More information

CISC 220 fall 2011, set 1: Linux basics

CISC 220 fall 2011, set 1: Linux basics CISC 220: System-Level Programming instructor: Margaret Lamb e-mail: malamb@cs.queensu.ca office: Goodwin 554 office phone: 533-6059 (internal extension 36059) office hours: Tues/Wed/Thurs 2-3 (this week

More information

Users Manual. OP5 System 2.4. OP5 AB. Page 1 of 6

Users Manual. OP5 System 2.4. OP5 AB. Page 1 of 6 Users Manual OP5 System 2.4 OP5 AB. Page 1 of 6 Table of Contents INTRODUCTION...3 FUNDAMENTALS...3 SYSTEM...3 ACCESS...3 ACCOUNTS...3 CONFIGURATION...4 NETWORK...4 SHUTDOWN...4 SERVICES...5 UPGRADE /

More information

Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades Q2

Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades Q2 Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades 2017-2018 Q2 Facultat d Informàtica de Barcelona This first lab session is focused on getting experience in working

More information

Operating Systems. Copyleft 2005, Binnur Kurt

Operating Systems. Copyleft 2005, Binnur Kurt 3 Operating Systems Copyleft 2005, Binnur Kurt Content The concept of an operating system. The internal architecture of an operating system. The architecture of the Linux operating system in more detail.

More information

commandname flags arguments

commandname flags arguments Unix Review, additional Unix commands CS101, Mock Introduction This handout/lecture reviews some basic UNIX commands that you should know how to use. A more detailed description of this and other commands

More information

Operating Systems 3. Operating Systems. Content. What is an Operating System? What is an Operating System? Resource Abstraction and Sharing

Operating Systems 3. Operating Systems. Content. What is an Operating System? What is an Operating System? Resource Abstraction and Sharing Content 3 Operating Systems The concept of an operating system. The internal architecture of an operating system. The architecture of the Linux operating system in more detail. How to log into (and out

More information

The UNIX Operating System. HORT Lecture 2 Instructor: Kranthi Varala

The UNIX Operating System. HORT Lecture 2 Instructor: Kranthi Varala The UNIX Operating System HORT 59000 Lecture 2 Instructor: Kranthi Varala Operating Systems Image By Golftheman - Own work, CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=4558519 Operating

More information

Systems software. Definition. Categories of software. Examples Of Systems Software 11/23/2018

Systems software. Definition. Categories of software. Examples Of Systems Software 11/23/2018 Systems Computer Software Is an interface or buffer between application and hardware Controls the computer hardware and acts as an interface with applications programs Definition A series of detailed instructions

More information

Perform Disaster Recovery

Perform Disaster Recovery The topics covered in this chapter are: Create a Bootable USB Drive, page 1 Boot the Router Using USB, page 5 Perform System Upgrade Using USB, page 7 Create a Bootable USB Drive The bootable USB drive

More information

Files (review) and Regular Expressions. Todd Kelley CST8207 Todd Kelley 1

Files (review) and Regular Expressions. Todd Kelley CST8207 Todd Kelley 1 Files (review) and Regular Expressions Todd Kelley kelleyt@algonquincollege.com CST8207 Todd Kelley 1 midterms (Feb 11 and April 1) Files and Permissions Regular Expressions 2 Sobel, Chapter 6 160_pathnames.html

More information

Basic Unix. Set-up. Finding Terminal on the imac. Method 1. Biochemistry laboratories Jean-Yves Sgro

Basic Unix. Set-up. Finding Terminal on the imac. Method 1. Biochemistry laboratories Jean-Yves Sgro Basic Unix Biochemistry laboratories - 201 Jean-Yves Sgro -jsgro@wisc.edu Find this document here (short URL) today: http://go.wisc.edu/4iu8u5 *Note*: To see as slides click on **"Gift icon"** at the top

More information

A+ Guide to Managing and Maintaining Your PC. How Hardware and Software Work Together

A+ Guide to Managing and Maintaining Your PC. How Hardware and Software Work Together A+ Guide to Managing and Maintaining Your PC Fifth Edition Chapter 2 How Hardware and Software Work Together You Will Learn About operating systems, what they are, and what they do How an OS interfaces

More information

Lab Working with Linux Command Line

Lab Working with Linux Command Line Introduction In this lab, you will use the Linux command line to manage files and folders and perform some basic administrative tasks. Recommended Equipment A computer with a Linux OS, either installed

More information

Title: Demonstrate the linux installation and administration settings.

Title: Demonstrate the linux installation and administration settings. OOPL Assignment 1 Title: Demonstrate the linux installation and administration settings. Objectives: 1) To install Ubuntu Linux on Windows without erasing current operating system. 2) To give the students

More information

User s Manual. Rev July 29,

User s Manual. Rev July 29, User s Manual Rev. 3.3.0.75 July 29, 2009 www.comsol.com.au Contents 1. Introduction...2 1.1 System Requirements... 2 1.2 Multilingual Support... 2 1.3 Disk Partitioning... 2 1.4 Note... 3 2. Icon Descriptions...4

More information

Windows Password Reset 6.0 User Guide

Windows Password Reset 6.0 User Guide page 1 of 11 Contents Contents...1 Introduction...2 Instructions on This Manual...3 System Requirements...4 How to Use Windows Password Reset 6.0...5 i. Remove the Password...5 ii. Burning Your CD/DVD

More information

Course Wiki. Today s Topics. Web Resources. Amazon EC2. Linux. Apache PHP. Workflow and Tools. Extensible Networking Platform 1

Course Wiki. Today s Topics. Web Resources. Amazon EC2. Linux. Apache PHP. Workflow and Tools. Extensible Networking Platform 1 Today s Topics Web Resources Amazon EC2 Linux Apache PHP Workflow and Tools Extensible Networking Platform 1 1 - CSE 330 Creative Programming and Rapid Prototyping Course Wiki Extensible Networking Platform

More information

CSCI 2132 Software Development. Lecture 5: File Permissions

CSCI 2132 Software Development. Lecture 5: File Permissions CSCI 2132 Software Development Lecture 5: File Permissions Instructor: Vlado Keselj Faculty of Computer Science Dalhousie University 14-Sep-2018 (5) CSCI 2132 1 Files and Directories Pathnames Previous

More information

Lab E2: bypassing authentication and resetting passwords

Lab E2: bypassing authentication and resetting passwords Lab E2: bypassing authentication and resetting passwords TTM4175 September 7, 2015 The purpose of this lab is to learn about techniques for bypassing the authentication and access control of Windows and

More information

Linux & Shell Programming 2014

Linux & Shell Programming 2014 Unit -1: Introduction to UNIX/LINUX Operating System Practical Practice Questions: Find errors (if any) otherwise write output or interpretation of following commands. (Consider default shell is bash shell.)

More information

Introduction to Linux Basics

Introduction to Linux Basics Introduction to Linux Basics Part-I Georgia Advanced Computing Resource Center University of Georgia Zhuofei Hou, HPC Trainer zhuofei@uga.edu Outline What is GACRC? What is Linux? Linux Command, Shell

More information

Introduction to Puppy Linux: Installation on a USB Flash Disk

Introduction to Puppy Linux: Installation on a USB Flash Disk Introduction to Puppy Linux: Installation on a USB Flash Disk Alex Gotev 1 Contents What is Puppy Linux? How can I have it? How do I boot it? What programs does it include? Installation on a USB Flash

More information

The Unix Shell. Permissions

The Unix Shell. Permissions The Unix Shell Copyright Software Carpentry 2010 This work is licensed under the Creative Commons Attribution License See http://software-carpentry.org/license.html for more information. shell shell pwd,

More information

Chapter 8 Operating Systems and Utility Programs

Chapter 8 Operating Systems and Utility Programs Chapter 8 Operating Systems and Utility Programs Chapter 8 Objectives Identify the types of system software Summarize the startup process on a personal computer Summarize the features of several stand-alone

More information

Lecture 2b. Pathnames, files, special characters in filenames, and file permissions. COP 3353 Introduction to UNIX, FALL 2013

Lecture 2b. Pathnames, files, special characters in filenames, and file permissions. COP 3353 Introduction to UNIX, FALL 2013 Lecture 2b Pathnames, files, special characters in filenames, and file permissions. COP 3353 Introduction to UNIX, FALL 2013 Files Files A well defined repository of information Program or component of

More information

I. Ch 5 System Software

I. Ch 5 System Software I. Ch 5 System Software A. Competencies 1. Describe the differences between system software and application software 2. Discuss the four types of system software 3. Discuss the basic functions, features

More information

Ubuntu installation alongside windows 8/8.1 and 10

Ubuntu installation alongside windows 8/8.1 and 10 Ubuntu installation alongside windows 8/8.1 and 10 Important safety precautions in windows - Before starting the installation process NOTE:1. If you are already using Windows OS in your computer, take

More information

CCNA Discovery Server Live CD v2.0

CCNA Discovery Server Live CD v2.0 CCNA Discovery Overview CCNA Discovery Server Live CD v2.0 Information and Installation Instructions The Discovery Server Live CD provides all of the network services necessary to support the CCNA Discovery

More information

Computers: Tools for an Information Age. System Software

Computers: Tools for an Information Age. System Software Computers: Tools for an Information Age System Software Objectives System Software Operating system (OS) Popular Operating Systems System Utilities 2 System Software 3 System Software System software includes

More information

Access Permissions. Agenda. chmod Command (Relative Method) File / Directory Permissions

Access Permissions. Agenda. chmod Command (Relative Method) File / Directory Permissions Agenda The Linux File System (chapter 4 in text) Setting Access Permissions Directory vs File Permissions chmod Utility Symbolic Method Absolute Method umask Utility Access Permissions Limiting unauthorized

More information

Goals for This Lecture:

Goals for This Lecture: Goals for This Lecture: Understand how to log in remotely with SSH Understand how to transfer files with SCP Learn how to log in from SINC site windows PC s with XWIN32 Understand the long form listings

More information

UNIX Tutorial Five

UNIX Tutorial Five UNIX Tutorial Five 5.1 File system security (access rights) In your unixstuff directory, type % ls -l (l for long listing!) You will see that you now get lots of details about the contents of your directory,

More information

Installation of PC Wrapper

Installation of PC Wrapper Installation of PC Wrapper Requirement for installing PC Wrapper: at least 2GB RAM at least 10GB hard drive tested with: PC Wrapper version 1.0-amd64 10.00 build 034 Here is a step-by-step guide to install

More information

File system Security (Access Rights)

File system Security (Access Rights) File system Security (Access Rights) In your home directory, type % ls -l (l for long listing!) You will see that you now get lots of details about the contents of your directory, similar to the example

More information

Project #4: Implementing NFS

Project #4: Implementing NFS Project #4: Implementing NFS Distributed File Systems NFS Ports and Network Conversations Destination and Return Ports RPC-based Services Configuring Server Daemons /etc/exports autofs Sharing home directories

More information

Hitchhiker s Guide to VLSI Design with Cadence & Synopsys

Hitchhiker s Guide to VLSI Design with Cadence & Synopsys Hitchhiker s Guide to VLSI Design with Cadence & Synopsys David Money Harris 17 January 2009 The VLSI design tools at Harvey Mudd College are hosted on a Linux server named chips. This document introduces

More information

MDA HMI. Commissioning Guide Edition 04/2005. Machine Data Evaluation. Machine Data Acquisition. Archiving History

MDA HMI. Commissioning Guide Edition 04/2005. Machine Data Evaluation. Machine Data Acquisition. Archiving History MDA HMI Commissioning Guide Edition 04/2005 Machine Data Acquisition Machine Data Evaluation Archiving History Commissioning Guide MDA HMI General 1 Standard Software for Production Automation Installation

More information

Common UNIX Commands. Unix. User Interfaces. Unix Commands Winter COMP 1270 Computer Usage II 9-1. Using UNIX. Unix has a command line interface

Common UNIX Commands. Unix. User Interfaces. Unix Commands Winter COMP 1270 Computer Usage II 9-1. Using UNIX. Unix has a command line interface Common UNIX Commands Using UNIX Unix Unix has a command line interface Unix commands must be typed Similar to the DOS operating system for PC s Compare to the Graphical User Interface (GUI) used by Windows,

More information

Chapter 8: Security under Linux

Chapter 8: Security under Linux Chapter 8: Security under Linux 8.1 File and Password security Linux security may be divided into two major parts: a) Password security b) File security 8.1.1 Password security To connect to a Linux system

More information

LAB #7 Linux Tutorial

LAB #7 Linux Tutorial Gathering information: LAB #7 Linux Tutorial Find the password file on a Linux box Scenario You have access to a Linux computer. You must find the password file on the computer. Objective Get a listing

More information

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 1.0, Last Edited 09/20/2005 Name of Students: Date of Experiment: Part I: Objective The objective of the exercises

More information

Chapter 12: Advanced Operating Systems

Chapter 12: Advanced Operating Systems : Advanced Operating Systems IT Essentials: PC Hardware and Software v4.0 1 Purpose of this Presentation To provide to instructors an overview of : List of chapter objectives Overview of the chapter contents,

More information

5.4.8 Optional Lab: Managing System Files with Built-in Utilities in Windows Vista

5.4.8 Optional Lab: Managing System Files with Built-in Utilities in Windows Vista 5.4.8 Optional Lab: Managing System Files with Built-in Utilities in Windows Vista Introduction Print and complete this lab. In this lab, you will use Windows built-in utilities to gather information about

More information

PXM45 Backup Boot Procedures

PXM45 Backup Boot Procedures APPENDIX B 2 When a PXM45 card starts up, it first loads the boot software on the card. If the PXM45 cannot load the runtime firmware, the card continues to run the boot software in what is called backup

More information

Unix Groups and Users

Unix Groups and Users CHMOD TUTORIAL AND XOOPS FILE SECURITIES The Xoops Site Security Guide has dealt with securities issues almost exclusively about possible intrusions or threats from outside of your Xoops site or server.

More information

Configure Windows Server 2003 Release 2 Server Network File Share (NFS) as an authenticated storage repository for XenServer

Configure Windows Server 2003 Release 2 Server Network File Share (NFS) as an authenticated storage repository for XenServer Summary This document outlines the process to perform the following tasks. 1. Configure Windows Server 2003 Release 2 Server Network File Share (NFS) as an authenticated storage repository for XenServer.

More information

Introduction to Unix: Fundamental Commands

Introduction to Unix: Fundamental Commands Introduction to Unix: Fundamental Commands Ricky Patterson UVA Library Based on slides from Turgut Yilmaz Istanbul Teknik University 1 What We Will Learn The fundamental commands of the Unix operating

More information

Full file at https://fratstock.eu

Full file at https://fratstock.eu Guide to UNIX Using Linux Fourth Edition Chapter 2 Solutions Answers to the Chapter 2 Review Questions 1. Your company is discussing plans to migrate desktop and laptop users to Linux. One concern raised

More information

Lab: Advanced Installation of Windows XP. Introduction

Lab: Advanced Installation of Windows XP. Introduction 12.2.2 Lab: Advanced Installation of Windows XP Introduction Print and complete this lab. In this lab, you will install a Windows XP operating system by using an answer file for automation. You will customize

More information

Lesson 1: Preparing for Installation

Lesson 1: Preparing for Installation 2-2 Chapter 2 Installing Windows XP Professional Lesson 1: Preparing for Installation When you install Windows XP Professional, the Windows XP Professional Setup program allows you to specify how to install

More information

3 INSTALLING WINDOWS XP PROFESSIONAL

3 INSTALLING WINDOWS XP PROFESSIONAL INSTALLING WINDOWS XP PROFESSIONAL.1 Preparing for installation Objectives.1.1 Windows XP Professional Hardware Requirements.1.2 Hardware Compatibility List (HCL) check.1. Hard Disk Partition.1.4 Required

More information

Commands are in black

Commands are in black Starting From the Shell Prompt (Terminal) Commands are in black / +--------+---------+-------+---------+---------+------ +------ +------ +------ +------ +------ +-- Bin boot dev etc home media sbin bin

More information

Lab - Share Resources in Windows

Lab - Share Resources in Windows Introduction In this lab, you will create and share a folder, set permissions for the shares, create a Homegroup and a Workgroup to share resources, and map a network drive. Due to Windows Vista lack of

More information

Chapter Two. Lesson A. Objectives. Exploring the UNIX File System and File Security. Understanding Files and Directories

Chapter Two. Lesson A. Objectives. Exploring the UNIX File System and File Security. Understanding Files and Directories Chapter Two Exploring the UNIX File System and File Security Lesson A Understanding Files and Directories 2 Objectives Discuss and explain the UNIX file system Define a UNIX file system partition Use the

More information

IT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems

IT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems IT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems 5.0 Introduction 1. What controls almost all functions on a computer? The operating system 5.1 Explain the purpose of an operating system 2.

More information

Network Update Method Page 2 (Recommended method if your Blu-ray Player is connected to the Internet.)

Network Update Method Page 2 (Recommended method if your Blu-ray Player is connected to the Internet.) IMPORTANT NOTICE Do not attempt to update your Yamaha Blu-ray Disc Player using any other data file except those provided directly from the Yamaha website. Follow the instructions carefully and do not

More information

CMSC421: Principles of Operating Systems

CMSC421: Principles of Operating Systems CMSC421: Principles of Operating Systems Nilanjan Banerjee Assistant Professor, University of Maryland Baltimore County nilanb@umbc.edu http://www.csee.umbc.edu/~nilanb/teaching/421/ Principles of Operating

More information

Installing IPM on Windows

Installing IPM on Windows CHAPTER 5 This chapter describes how to install the IPM server software on Windows NT, Windows 2000 Professional, or Windows 2000 Server system, and how to install the IPM client software on a Windows

More information

ARM Firmware Suite v1.4 Installation Guide

ARM Firmware Suite v1.4 Installation Guide ARM Firmware Suite v1.4 Installation Guide Copyright 2000-2002 ARM Limited. All rights reserved. Release Information Date Issue Change 16 February 2000 A First Release 1 June 2000 B P720 Release 1 October

More information

CompTIA A+ Accelerated course for & exams

CompTIA A+ Accelerated course for & exams CompTIA A+ Accelerated course for 220-901 & 220-902 exams Course overview Target Audience This course is for Participants wishing to take and pass both CompTIA A+ exams (220-901 and 220-902) exam. It is

More information

How To Reinstall Grub In Windows 7 With Cd Rom

How To Reinstall Grub In Windows 7 With Cd Rom How To Reinstall Grub In Windows 7 With Cd Rom Sep 23, 2014. I have the Windows 7 install disk (not an upgrade disk). it to CD-ROM, from there you can install windows by inserting the w7 disc and following

More information

Network Planning and Implementation

Network Planning and Implementation Network Planning and Implementation SYLLABUS 3.1 Designing network 3.1.1 Accessing network needs- applications, users, network services, security and safety, growth and capacity planning 3.1.2 Meeting

More information

File Properties and Permissions

File Properties and Permissions File Properties and Permissions Managing File Access in Linux Peter Perry July 2009 What is it about? Open a shell (terminal) and type ls -l You get quite a bit of information about each file. Tonight,

More information

Computer Software A computer contains two major sets of tools, software and hardware. Software is generally divided into Systems software and

Computer Software A computer contains two major sets of tools, software and hardware. Software is generally divided into Systems software and Computer Software A computer contains two major sets of tools, software and hardware. Software is generally divided into Systems software and Applications software. Systems software provides infrastructure

More information

Lab 3a Using the vi editor

Lab 3a Using the vi editor Lab 3a Using the vi editor Objectives: Become familiar with the vi Editor Review the three vi Modes Review keystrokes to move between vi modes Create a new file with vi Editor Invoke vi with show mode

More information

CompTIA A+ Certification ( ) Study Guide Table of Contents

CompTIA A+ Certification ( ) Study Guide Table of Contents CompTIA A+ Certification (220-902) Study Guide Table of Contents Course Introduction About This Course About CompTIA Certifications Module 1 / Supporting Windows 1 Module 1 / Unit 1 Windows Operating System

More information

Ftp Get Command Line Windows 7 Bootable Usb

Ftp Get Command Line Windows 7 Bootable Usb Ftp Get Command Line Windows 7 Bootable Usb Using WinPE 3.1: Built from Windows 7 SP1 code base. _Burn c:/bitpe_x64.iso to an optical disk or copy it to a Bootable USB Flash Drive, refer step 9_ Walkthrough

More information