NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1

Size: px
Start display at page:

Download "NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1"

Transcription

1 NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1 Objective At the conclusion of this lab, the student will be able to add and delete users, create and assign users to groups, and assign users and group privileges using the CLI and XWINDOWS. Journal Assignment From the man pages and online search, write down information, instructions, and options with respect to UNIX and LINUX for the following: pwconv pwunconv useradd userdel groupadd groupmod groupdel passwd gpaswd chage chgrp chown chmod UNIX pipes Find information on the files: /etc/password /etc/shadow /etc/group /etc/gshadow /etc/fstab Procedure 1. Logon as with your general username and assume privileges as su. Make a directory named /home/username/lab05 Make a backup copy of /etc/fstab Since we wish to assign quotas to users, we must modify /etc/fstab. Open the file /etc/fstab in vi There should be a line similar to the following: LABEL=/home /home ext3 defaults 1 2 Change to the insert mode. Move the cursor and add the text,usrquota after defaults with no spaces after the s in defaults, and do not forget the comma before usrquota Save and exit from vi reboot 2. Logon as with your general username and assume privileges as su Copy the file/etc/fstab to the /home/andrewjr/lab05 directory In this course, we want to use shadow passwords. Enable shadow passwords for all users with the command pwconv We will now create user accounts and passwords. The UserIDs in the following table may be different from the ones assigned by the system. From the CLI to create the accounts listed in the following table using the useradd and passwd commands as follows: useradd username passwd username

2 NETW 110 Lab 5 Creating and Assigning Users and Groups Page 2 User Name Name Password UserID Home directory stu01 student 01 stu01pass 501 /home/stu01 stu02 student 02 stu02pass 502 /home/stu02 stu03 student 03 stu03pass 503 /home/stu03 stu04 student 04 stu04pass 504 /home/stu04 When we use this method the UID is automatically assigned. If you created an account for yourself when you booted the system the first time, it was UID 500 by default. After you create the login and password for stu01, verify that the user account was created by entering the command: finger stu01 You should receive a reply that gives you the login name, the Name (if entered), the home directory, the Shell, the date of the last login (never), if the user has mail, and if there is a plan. Since you just created the account, there should be no mail, and no plan. Now let us add four more users, but we will enter a name, a UID and password from the useradd command. The syntax of the command is: useradd c Real Name username -u UID p userpassword To create an account for stu05, the syntax of the command is: useradd c student 05 stu05 -u 505 p stu05pass Now add the other three. User Name Name Password UserID Home directory stu05 student 05 stu05pass 505 /home/stu05 stu06 student 06 stu06pass 506 /home/stu06 stu07 student 07 stu07pass 507 /home/stu07 stu08 student 08 stu08pass 508 /home/stu08 Press CRTL-ALT-F2 to start a new virtual connection. Login as stu08. Verify that you are logged in as stu08 by looking at your prompt. It should be something like [stu08@apple stu08]$ Now let us create a new blank file with the command touch myfile.txt Verify the file was created with the command ls l It should show the file myfile.txt exists and is 0 bytes in size. Now let us modify the file. Enter the command: vi myfile.txt The file opens in the editor. Press i to enter the insert mode. The cursor should be on the first line. Enter the following text: This is my file. Press Esc to enter the command mode. Press :wq to save (write) and quit. Let us verify that the file exists and was modified. Enter the command cat myfile.txt and verify the contents of the file Now logout with the command exit Change back to the root account by pressing CRTL-ALT-F1 Occasionally, it may be necessary to disable a user s account. To prevent the user from logging in, we modify the users password with the l (Lock option) This places an! at the beginning of the users password. Once this is done, any attempt to login will receive a reply as if the user entered an incorrect login or password. Lock the account for stu08 as follows:

3 NETW 110 Lab 5 Creating and Assigning Users and Groups Page 3 passwd l stu08 The system should reply that the password for the user was locked and the passwd command was successfully. Now let us verify that the directory and its contents are still present. Enter the command: ls l /home/stu08 You should see how many files are present, the names of the files and their size. Hidden files are not displayed. To see the hidden files, you need to add the a (all) option ls la /home/stu08 Open a new virtual terminal by pressing CRTL-ALT-F2 Try to login as stu08 When you get tired of trying, Change back to the root account by pressing CRTL-ALT-F1 Unlock the account with the u option passwd u stu08 Open a new virtual terminal with CRTL-ALT-F2 and login as stu08 (successfully this time) Force the user to change his/her password on the next login with the command: chage d 0 stu08 login as stu08 Change the password as required Exit and return to the root account with CTRL-ALT-F1 3. A group is a way to organize users on any Unix-based machine including Linux. Members of a group can share files and directories. For instance, if you have two webmasters of an internet site and both need access to read/write to the files and directories for the website, the two webmasters could be members of the same group and have equal permissions to the files and directories within the group. You must have root access to add a group. After logging in as root, the command groupadd can be used to add groups to your machine. In Red Hat Linux, the groupadd command is located in the /usr/sbin directory. The command to create a group named students with a GID (Group ID) of 600 is: groupadd g 600 f students Now create a group name faculty with a gid of 700 and a group named admin with a gid of 800 To add users to the group in the text mode, you have to edit a file called /etc/group as the root. Enter the command vi /etc/group Press i to enter the insert mode Scroll down until you see a line students:x:600: You add a user to the group by adding the username as a comma delimited list with no spaces after the : or after the last username in the list. Place the cursor at the end of the line students group line and add the user s stu01, stu03, stu05 When you are finished, the line should look like the following: students:x:600:stu01,stu03,stu05 Press ESC Enter :wq Verify that you entries were made to the file with the command cat /etc/group less

4 NETW 110 Lab 5 Creating and Assigning Users and Groups Page 4 You will see one screen of information at a time ( this is cause by adding either less or more at the end of the command). Press the spacebar to scroll in the next screen. (The Enter key scrolls only the next line, and you can use CRTL-C to abort) Continue to scroll until you verify that stu01, stu03, and stu05 were added to the group students. When you get to the end of the file, press q to return to the system prompt. 4. Red Hat has a GUI application called redhat-config-users that only runs from X or from a virtual terminal window in X. If you enter the command from the CLI, you will get a message that the X Server must be running. It allows you to enter the all the information we just did in a graphical environment. While this is convenient, you should know how to use the CLI as this environment only exists in Red Hat. Make sure you are logged in as the root. If not, type exit and login as root. From the CLI, enter the command startx CL on Red Hat Applications Highlight System Setting CL on Users and Groups If necessary, CL on the Users tab. You should see a display similar to the following. We are now going to add four more users as listed in the table below. User Name Name Password UserID Home directory stu09 student 09 stu09pass 509 /home/stu09 stu10 student 10 stu10pass 510 /home/stu10 stu11 student 11 stu11pass 511 /home/stu11 stu12 student 12 stu12pass 512 /home/stu12

5 NETW 110 Lab 5 Creating and Assigning Users and Groups Page 5 It is merely a matter of filling in text boxes in a dialog box so it is much easier that from the CLI. You can manually enter a UID from the bottom right corner of the dialog box, but we will not do that now. From this environment, we can easily see all users and their UID, so there will be no conflicts. CL on Add User and enter the data for stu09 and CL on OK Repeat the previous step for stu10 through stu12. CL on the Groups Tab CL on the students group in the list. CL on Properties CL on the Group Users tab Scroll through the list and place a check in each user from stu01 through stu12 CL on Add Group Name the group techies and assign a group ID manually of 750 Add all students with an odd numbered UID Close the Red Hat User Manager

6 NETW 110 Lab 5 Creating and Assigning Users and Groups Page 6 5. CL on Red Hat - Highlight Accessories - CL on Text Editor CL on File - CL on Open - From the /etc directory, Open the file group Scroll to the end of the file and verify that the group students and techies contain the correct members. Close the file. 6. Switch to the CLI root account Enter the command userdel r stu08 Enter the command ls l /home and verify that the stu08 directory is gone. Enter the command cd /home/stu08, which should fail 7. Press CRL-ALT-F7 to switch to the GUI Open the Users and Groups from the Systems Settings menu. CL on Groups and verify that stu08 was removed from the students group. CL on the Users tab Recreate the user stu08 CL on stu01 and CL on Properties Enter the Full Name student 01 Repeat this step for all users in the list that have no Full Name. Close the Red Hat User Manager and Shutdown X 8. For the following, refer to the quota section of the handout on Creating Users and quotas to perform the following: Change to the single user mode (init 1) Make a backup copy of /etc/fstab and open /etc/fstab in an editor. On the line /home, change defaults to defaults,usrquota Return to runlevel 3 (init 3) Create a quota configuration file with the proper permissions with the commands touch /home/aquota.user chmod 600 /home/aquota.user Create a quota table with the command quotacheck -vagum Set a soft limit for all stu users to a maximum of 5 MB (edquota u username) Set the grace period to 5 days using edquota -t Generate a copy of the quota limits of the /home directory with the command: repquota /home > /home/andrewjr/lab05/quota_report.txt Final Steps 1. With su privileges, copy the following files to the /home/andrewjr/lab05 directory /etc/passwd /etc/shadow /etc/group /etc/gshadow /etc/gshadow /etc/fstab 2. Change the ownership of /home/username/lab05 and all its files from root to your username. Logout as su 3. ftp to the class server and login as your servername. Create a directory named lab05. Upload all the files from /home/username/lab05/ on the local computer to the lab05 directory on the ftp server. Exit from the ftp session. 4. Review documentation and your course text. In your journal, discuss the procedure and commands, and give examples of how to enable other user password options

NETW 110 Lab 3 Post-Installation Configuration Page 1

NETW 110 Lab 3 Post-Installation Configuration Page 1 NETW 110 Lab 3 Post-Installation Configuration Page 1 Objective At the conclusion of this lab, the student will learn some very basic functions of vi, use vi to perform some post-installation configuration

More information

Chapter 5: User Management. Chapter 5 User Management

Chapter 5: User Management. Chapter 5 User Management Chapter 5: User Management Chapter 5 User Management Last revised: 20/6/2004 Chapter 5 Outline In this chapter we will learn Where user and group account information is stored How to manage user accounts

More information

Lab 2A> ADDING USERS in Linux

Lab 2A> ADDING USERS in Linux Lab 2A> ADDING USERS in Linux Objective In this lab, student will learn how to create user accounts using the Linux operating system. Scenario The XYZ Company has just installed a server running Linux.

More information

MANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG

MANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG MANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG Terminals and keyboards have no uniform behavioral pattern. Terminal settings directly impact the keyboard operation.

More information

CST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management

CST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management Student Name: Lab Section: Linux User and Group Management 1 Due Date - Upload to Blackboard by 8:30am Monday April 2, 2012 Submit the completed lab to Blackboard following the Rules for submitting Online

More information

CST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management

CST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management Student Name: YOUR NAME Lab Section: 011 012 013 or 014 Linux User and Group Management 1 Due Date - Upload to Blackboard by 8:30am Monday April 2, 2012 Submit the completed lab to Blackboard following

More information

Redhat Basic. Need. Your. What. Operation G U I D E. Technical Hand Note template version

Redhat Basic. Need. Your. What. Operation G U I D E. Technical Hand Note template version Redhat Basic Operation G U I D E What Need Your www.next-asia.com Readhat Basic Operation Guide, Prepared by Nazmul Khan Page 1 of 43 Redhat Basic Operation Guide RedHat Installation Guide... 2 Installation...

More information

Commands are in black

Commands are in black Starting From the Shell Prompt (Terminal) Commands are in black / +--------+---------+-------+---------+---------+------ +------ +------ +------ +------ +------ +-- Bin boot dev etc home media sbin bin

More information

The kernel is the low-level software that manages hardware, multitasks programs, etc.

The kernel is the low-level software that manages hardware, multitasks programs, etc. November 2011 1 Why Use Linux? Save Money Initial purchase and maintenance Resume Linux is used by MANY organizations More choices Tons of Linux operating systems November 2011 2 What is Linux? 1. Contains

More information

CSE 265: System and Network Administration

CSE 265: System and Network Administration CSE 265: System and Network Administration User accounts The /etc/passwd file The /etc/shadow file Root powers Ownership of files and processes The superuser The /etc/group file Adding users Removing users

More information

10 userdel: deleting a user account 9. 1 Context Tune the user environment and system environment variables [3]

10 userdel: deleting a user account 9. 1 Context Tune the user environment and system environment variables [3] 1. Context 1.111.1 2 8 Deleting a group 8 1.111.1 Manage users and group accounts and related system files Weight 4 Outline Contents Linux Professional Institute Certification 102 Nick Urbanik

More information

User accounts and authorization

User accounts and authorization User accounts and authorization Authentication vs authorization Authentication: proving the identity of someone Authorization: allowing a user to access certain resources 1 Government authorization documents

More information

Operating Systems Lab 1 (Users, Groups, and Security)

Operating Systems Lab 1 (Users, Groups, and Security) Operating Systems Lab 1 (Users, Groups, and Security) Overview This chapter covers the most common commands related to users, groups, and security. It will also discuss topics like account creation/deletion,

More information

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 1.0, Last Edited 09/20/2005 Name of Students: Date of Experiment: Part I: Objective The objective of the exercises

More information

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Actual4Test.   Actual4test - actual test exam dumps-pass for IT exams Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : RH-302 Title : Red Hat Certified Engineer on Redhat Enterprise Linux 5 (Labs) Vendors : RedHat Version

More information

User & Group Administration

User & Group Administration User & Group Administration David Morgan Users useradd/userdel /home/ /etc/passwd is the user database /etc/shadow has passwords (relocated from passwd) /etc/group whoami su / sudo / SUID process

More information

UNIT V. Dr.T.Logeswari. Unix Shell Programming - Forouzan

UNIT V. Dr.T.Logeswari. Unix Shell Programming - Forouzan UNIT V UNIX SYSTEM COMMUNICATION Dr.T.Logeswari 1 Electronic mail or email is easiest way of communication on unix. Fast and cheap Used to exchange graphics, sound and video files 2 3 Elements of a communication

More information

Lab Authentication, Authorization, and Accounting

Lab Authentication, Authorization, and Accounting Objectives Given a scenario, select the appropriate authentication, authorization, or access control Install and configure security controls when performing account management, based on best practices

More information

User Accounts. The Passwd, Group, and Shadow Files

User Accounts. The Passwd, Group, and Shadow Files User Accounts The Passwd, Group, and Shadow Files We'll start with the passwd (pronounced "password") file, located at /etc/passwd. This file holds information about all of the user accounts on the system.

More information

RH202. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) Exam.

RH202. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) Exam. REDHAT RH202 Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) Exam TYPE: DEMO http://www.examskey.com/rh202.html Examskey REDHAT RH202 exam demo product is here for you to test the quality

More information

Course 144 Supplementary Materials. UNIX Fundamentals

Course 144 Supplementary Materials. UNIX Fundamentals Course 144 Supplementary Materials UNIX Fundamentals 1 Background to UNIX Command Fundamentals This appendix provides a overview of critical commands and concepts Prerequisite knowledge attendees should

More information

CS/CIS 249 SP18 - Intro to Information Security

CS/CIS 249 SP18 - Intro to Information Security Lab assignment CS/CIS 249 SP18 - Intro to Information Security Lab #2 - UNIX/Linux Access Controls, version 1.2 A typed document is required for this assignment. You must type the questions and your responses

More information

NETW 110 Lab 4 Using eth0 Configuration Mounting Drives and Devices Page 1

NETW 110 Lab 4 Using eth0 Configuration Mounting Drives and Devices Page 1 NETW 110 Lab 4 Using eth0 Configuration Mounting Drives and Devices Page 1 Objective At the conclusion of this lab, the student will be able to perform necessary post-installation hardware configuration

More information

RH-202. RedHat. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs)

RH-202. RedHat. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) RedHat RH-202 Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) Download Full Version : https://killexams.com/pass4sure/exam-detail/rh-202 QUESTION: 159 Install the dialog-* Questions asking

More information

Lab 3a Using the vi editor

Lab 3a Using the vi editor Lab 3a Using the vi editor Objectives: Become familiar with the vi Editor Review the three vi Modes Review keystrokes to move between vi modes Create a new file with vi Editor Invoke vi with show mode

More information

RedHat. Rh202. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs)

RedHat. Rh202. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) RedHat Rh202 Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) http://killexams.com/exam-detail/rh202 QUESTION: 156 Who ever creates the files/directories on /data group owner should be automatically

More information

UNIT 10 Ubuntu Security

UNIT 10 Ubuntu Security AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT 10 Ubuntu Security Learning Objectives Participants will understand how to configure major components of Linux/Ubuntu Account

More information

Linux File System Quotas

Linux File System Quotas yolinux.com Linux File System Quotas Greg Ippolito Configuration: Configuration of disk usage quotas on Linux - Perform the following as root: 1. Edit file /etc/fstab to add qualifier "usrquota" or "grpquota"

More information

User Management. René Serral-Gracià Xavier Martorell-Bofill 1. May 26, Universitat Politècnica de Catalunya (UPC)

User Management. René Serral-Gracià Xavier Martorell-Bofill 1. May 26, Universitat Politècnica de Catalunya (UPC) User Management René Serral-Gracià Xavier Martorell-Bofill 1 1 Universitat Politècnica de Catalunya (UPC) May 26, 2014 Lectures 1 System administration introduction 2 Operating System installation 3 User

More information

Linux Interview Questions and Answers

Linux Interview Questions and Answers Linux Interview Questions and Answers You need to see the last fifteen lines of the files dog, cat and horse. What command should you use? tail -15 dog cat horse The tail utility displays the end of a

More information

RH133. Red Hat Linux System Administration

RH133. Red Hat Linux System Administration RH133 Red Hat Linux System Administration Version 3.5 QUESTION NO: 1 RH133 John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. He is working as a root

More information

CTEC1863/2018F Bonus Lab Page 1 of 5

CTEC1863/2018F Bonus Lab Page 1 of 5 CTEC1863/2018F Bonus Lab Page 1 of 5 Bonus Lab: OpenSUSE Linux Rescue In this lab, we will install an OpenSUSE virtual machine. However, both the non-root user and the root passwords are unknown. To fix

More information

System Administration

System Administration User and Group Management All processes on the system run under by a user. Users can be collected into groups which can be given common attributes Users and groups are represented by the system using unique

More information

CST8207: GNU/Linux Operating Systems I Lab Six Linux File System Permissions. Linux File System Permissions (modes) - Part 1

CST8207: GNU/Linux Operating Systems I Lab Six Linux File System Permissions. Linux File System Permissions (modes) - Part 1 Student Name: Lab Section: Linux File System Permissions (modes) - Part 1 Due Date - Upload to Blackboard by 8:30am Monday March 12, 2012 Submit the completed lab to Blackboard following the Rules for

More information

CS Fundamentals of Programming II Fall Very Basic UNIX

CS Fundamentals of Programming II Fall Very Basic UNIX CS 215 - Fundamentals of Programming II Fall 2012 - Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the CS (Project) Lab (KC-265)

More information

Optional Labs. 0Handouts: 2002 ProsoftTraining All Rights Reserved. Version 3.07

Optional Labs. 0Handouts: 2002 ProsoftTraining All Rights Reserved. Version 3.07 0Handouts: Optional Lab 1-1: Understanding the /etc/securetty file In this lab, you will examine a PAM component, the /etc/securetty file. 1. Boot into Linux as root. Open a Telnet client and attempt to

More information

Accurate study guides, High passing rate! IT TEST BOOK QUESTION & ANSWER. Ittestbook provides update free of charge in one year!

Accurate study guides, High passing rate! IT TEST BOOK QUESTION & ANSWER. Ittestbook provides update free of charge in one year! IT TEST BOOK QUESTION & ANSWER Ittestbook provides update free of charge in one year! Accurate study guides, High passing rate! Exam : RH133 Title : Red Hat Linux System Administration Version : Demo 1

More information

Introduction to the UNIX command line

Introduction to the UNIX command line Introduction to the UNIX command line Steven Abreu Introduction to Computer Science (ICS) Tutorial Jacobs University s.abreu@jacobs-university.de September 19, 2017 Overview What is UNIX? UNIX Shell Commands

More information

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 2.0, Last Edited 10/1/2006 Students Name: Date of Experiment: Part I: Objective The objective of the exercises

More information

Getting Started With UNIX Lab Exercises

Getting Started With UNIX Lab Exercises Getting Started With UNIX Lab Exercises This is the lab exercise handout for the Getting Started with UNIX tutorial. The exercises provide hands-on experience with the topics discussed in the tutorial.

More information

Quick Installation Guide for RHV/Ovirt

Quick Installation Guide for RHV/Ovirt Quick Installation Guide for RHV/Ovirt 2017 Chengdu Vinchin Technology Co. Ltd. All rights reserved. CONTENTS 1. Create New Virtual Machine...2 2. Install Backup Server ( as master)...5 3. Install Backup

More information

CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX

CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the EECS labs that dual boot

More information

Exam Name: Red Hat Certified Engineer on Redhat

Exam Name: Red Hat Certified Engineer on Redhat Vendor: Red Hat Exam Code: RH302 Exam Name: Red Hat Certified Engineer on Redhat Version: DEMO QUESTION 1 One Logical Volume is created named as myvol under vo volume group and is mounted. The Initial

More information

Introduction to Unix May 24, 2008

Introduction to Unix May 24, 2008 Introduction to Unix May 24, 2008 Exercises: Privileges REFERENCE Reference: Shah, Steve, "Linux Administration: A Beginner's Guide", 2nd. ed., Osborne press, New York, NY. If you look at files in a directory

More information

OPERATING SYSTEMS LINUX

OPERATING SYSTEMS LINUX OPERATING SYSTEMS LINUX Božo Krstajić, PhD, University of Montenegro Podgorica bozok@cg.ac.yu Process management Linux operating systems work with processes. Basically a process consists of program code

More information

Exam Questions RH133

Exam Questions RH133 Exam Questions RH133 Red Hat Linux System Administration https://www.2passeasy.com/dumps/rh133/ 1.John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network.

More information

CST Lab 2 Review #1

CST Lab 2 Review #1 CST8177 - Lab 2 Review #1 Student Name Student number Section Objectives To review command line features, file system access, and permissions Lab Outcome A review of working with the command line A review

More information

Linux Essentials Objectives Topics:

Linux Essentials Objectives Topics: Linux Essentials Linux Essentials is a professional development certificate program that covers basic knowledge for those working and studying Open Source and various distributions of Linux. Exam Objectives

More information

Assume that username is cse. The user s home directory will be /home/cse. You may remember what the relative pathname for users home directory is: ~

Assume that username is cse. The user s home directory will be /home/cse. You may remember what the relative pathname for users home directory is: ~ Introduction to Open Source Software Development Spring semester, 2017 School of Computer Science and Engineering, Pusan National University Joon-Seok Kim LINUX: COMMANDS Review Lab #1 2 Create Directories

More information

CSE Linux VM. For Microsoft Windows. Based on opensuse Leap 42.2

CSE Linux VM. For Microsoft Windows. Based on opensuse Leap 42.2 CSE Linux VM For Microsoft Windows Based on opensuse Leap 42.2 Dr. K. M. Flurchick February 2, 2017 Contents 1 Introduction 1 2 Requirements 1 3 Procedure 1 4 Usage 3 4.1 Start/Stop.................................................

More information

Perl and R Scripting for Biologists

Perl and R Scripting for Biologists Perl and R Scripting for Biologists Lukas Mueller PLBR 4092 Course overview Linux basics (today) Linux advanced (Aure, next week) Why Linux? Free open source operating system based on UNIX specifications

More information

Part I. Introduction to Linux

Part I. Introduction to Linux Part I Introduction to Linux 7 Chapter 1 Linux operating system Goal-of-the-Day Familiarisation with basic Linux commands and creation of data plots. 1.1 What is Linux? All astronomical data processing

More information

Lab 1: Accessing the Linux Operating System Spring 2009

Lab 1: Accessing the Linux Operating System Spring 2009 CIS 90 Linux Lab Exercise Lab 1: Accessing the Linux Operating System Spring 2009 Lab 1: Accessing the Linux Operating System This lab takes a look at UNIX through an online experience on an Ubuntu Linux

More information

Unix Introduction to UNIX

Unix Introduction to UNIX Unix Introduction to UNIX Get Started Introduction The UNIX operating system Set of programs that act as a link between the computer and the user. Developed in 1969 by a group of AT&T employees Various

More information

Presented by Bill Genske Gary Jackson

Presented by Bill Genske Gary Jackson Quintessential School Systems Session C Linux Presented by Bill Genske Gary Jackson Copyright Quintessential School Systems, 2009 All Rights Reserved 867 American Street --- Second Floor --- San Carlos,

More information

File Properties and Permissions

File Properties and Permissions File Properties and Permissions Managing File Access in Linux Peter Perry July 2009 What is it about? Open a shell (terminal) and type ls -l You get quite a bit of information about each file. Tonight,

More information

Exam Linux-Praxis - 1 ( From )

Exam Linux-Praxis - 1 ( From  ) Exam Linux-Praxis - 1 ( From http://www.linux-praxis.de ) (1)Which of the following commands results in mailing the content of the current directory to Bob? A. mail Bob < ls B. ls > mail Bob C. ls mail

More information

Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system...

Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system... Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system... Q) Q) What is the difference between home directory and working directory? Answer

More information

No Food or Drink in this room. Logon to Windows machine

No Food or Drink in this room. Logon to Windows machine While you are waiting No Food or Drink in this room Logon to Windows machine Username/password on right-hand monitor Not the username/password I gave you earlier We will walk through connecting to the

More information

SECURITY+ LAB SERIES. Lab 6: Secure Network Administration Principles Log Analysis

SECURITY+ LAB SERIES. Lab 6: Secure Network Administration Principles Log Analysis SECURITY+ LAB SERIES Lab 6: Secure Network Administration Principles Log Analysis Document Version: 2015-09-24 otherwise noted, is licensed under the Creative Commons Attribution 3.0 Unported License.

More information

Users and Groups. his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and UNIX groups.

Users and Groups. his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and UNIX groups. cameron.book Page 19 Monday, June 30, 2003 8:51 AM C H A P T E R 4 Users and Groups T his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and

More information

Chapter 8: Security under Linux

Chapter 8: Security under Linux Chapter 8: Security under Linux 8.1 File and Password security Linux security may be divided into two major parts: a) Password security b) File security 8.1.1 Password security To connect to a Linux system

More information

Using WestGrid from the desktop Oct on Access Grid

Using WestGrid from the desktop Oct on Access Grid Using WestGrid from the desktop Oct 11 2007 on Access Grid Introduction Simon Sharpe, UCIT Client Services The best way to contact WestGrid support is to email support@westgrid.ca This seminar gives you

More information

Outline. Structure of a UNIX command

Outline. Structure of a UNIX command Outline Structure of Unix Commands Command help (man) Log on (terminal vs. graphical) System information (utility) File and directory structure (path) Permission (owner, group, rwx) File and directory

More information

Linux Survival Guide

Linux Survival Guide Linux Survival Guide Introduction: This guide is intended for use with classes at DACC that use a Linux operating system as the platform for students. It provides a quick summary and examples of how to

More information

FreeBSD Installation

FreeBSD Installation 1 FreeBSD Installation AFNOG Chix 2011 Blantyre, Malawi 31 st Oct - 4 th Nov 2011 Dorcas Muthoni and Evelyn Namara 2 READ THE INSTRUCTIONS These slides contain explicit instructions to allow you to successfully

More information

Linux/Cygwin Practice Computer Architecture

Linux/Cygwin Practice Computer Architecture Linux/Cygwin Practice 2010 Computer Architecture Linux Login Use ssh client applications to connect (Port : 22) SSH Clients zterm ( http://www.brainz.co.kr/products/products4_2.php ) Putty ( http://kldp.net/frs/download.php/3411/hangulputty-0.58.h2.exe

More information

This lab exercise is to be submitted at the end of the lab session! passwd [That is the command to change your current password to a new one]

This lab exercise is to be submitted at the end of the lab session! passwd [That is the command to change your current password to a new one] Data and Computer Security (CMPD414) Lab II Topics: secure login, moving into HOME-directory, navigation on Unix, basic commands for vi, Message Digest This lab exercise is to be submitted at the end of

More information

02. At the command prompt, type usermod -l bozo bozo2 and press Enter to change the login name for the user bozo2 back to bozo. => steps 03.

02. At the command prompt, type usermod -l bozo bozo2 and press Enter to change the login name for the user bozo2 back to bozo. => steps 03. Laboratory Exercises: ===================== Complete the following laboratory exercises. All steps are numbered but not every step includes a question. You only need to record answers for those steps that

More information

CST8207: GNU/Linux Operating Systems I Lab Ten Boot Process and GRUB. Boot Process and GRUB

CST8207: GNU/Linux Operating Systems I Lab Ten Boot Process and GRUB. Boot Process and GRUB Student Name: Lab Section: Boot Process and GRUB 1 Due Date - Upload to Blackboard by 8:30am Monday April 16, 2012 Submit the completed lab to Blackboard following the Rules for submitting Online Labs

More information

Short Read Sequencing Analysis Workshop

Short Read Sequencing Analysis Workshop Short Read Sequencing Analysis Workshop Day 2 Learning the Linux Compute Environment In-class Slides Matt Hynes-Grace Manager of IT Operations, BioFrontiers Institute Review of Day 2 Videos Video 1 Introduction

More information

Linux Kung-Fu. James Droste UBNetDef Fall 2016

Linux Kung-Fu. James Droste UBNetDef Fall 2016 Linux Kung-Fu James Droste UBNetDef Fall 2016 $ init 1 GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org

More information

Linux Systems Administration Getting Started with Linux

Linux Systems Administration Getting Started with Linux Linux Systems Administration Getting Started with Linux Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International

More information

Installing and Upgrading Cisco Network Registrar Virtual Appliance

Installing and Upgrading Cisco Network Registrar Virtual Appliance CHAPTER 3 Installing and Upgrading Cisco Network Registrar Virtual Appliance The Cisco Network Registrar virtual appliance includes all the functionality available in a version of Cisco Network Registrar

More information

Post Ubuntu Install Exercises

Post Ubuntu Install Exercises Post Ubuntu Install Exercises PacNOG 3 June 18 Rarotonga, Cook Islands 1. Get used to using sudo 2. Create an ainst account 3. Learn how to install software 4. Install gcc and make 5. Learn how to control

More information

AST2500 ibmc Configuration Guide

AST2500 ibmc Configuration Guide AST2500 ibmc Configuration Guide Version 1.0b Copyright Copyright 2017 MITAC COMPUTING TECHNOLOGY CORPORATION. All rights reserved. No part of this manual may be reproduced or translated without prior

More information

ITEC451 Network Design & Analysis Laboratory Guide: Appendix

ITEC451 Network Design & Analysis Laboratory Guide: Appendix Linux Guide Accessing the command prompt Before you can access the command prompt, you must login to the system. The administrative user on Linux machines is named root. On most Linux distributions, you

More information

Please choose the best answer. More than one answer might be true, but choose the one that is best.

Please choose the best answer. More than one answer might be true, but choose the one that is best. Introduction to Linux and Unix - endterm Please choose the best answer. More than one answer might be true, but choose the one that is best. SYSTEM STARTUP 1. A hard disk master boot record is located:

More information

14. Configuring Telnet in Knoppix

14. Configuring Telnet in Knoppix 14. Configuring Telnet in Knoppix Estimated Time: 45 Minutes Objective In this lab, the student will learn how to configure the Telnet service on a system so that the user can remotely administer a Knoppix

More information

Overview LEARN. History of Linux Linux Architecture Linux File System Linux Access Linux Commands File Permission Editors Conclusion and Questions

Overview LEARN. History of Linux Linux Architecture Linux File System Linux Access Linux Commands File Permission Editors Conclusion and Questions Lanka Education and Research Network Linux Architecture, Linux File System, Linux Basic Commands 28 th November 2016 Dilum Samarasinhe () Overview History of Linux Linux Architecture Linux File System

More information

DELL EMC UNITY: DR ACCESS AND TESTING. Dell EMC Unity OE 4.3

DELL EMC UNITY: DR ACCESS AND TESTING. Dell EMC Unity OE 4.3 DELL EMC UNITY: DR ACCESS AND TESTING Dell EMC Unity OE 4.3 1 The information in this publication is provided as is. Dell Inc. makes no representations or warranties of any kind with respect to the information

More information

Exam Questions RH202

Exam Questions RH202 Exam Questions RH202 Redhat Certified Technician on Redhat Enterprise Linux 5 (Labs) https://www.2passeasy.com/dumps/rh202/ 1.CORRECT TEXT Change the root Password to redtophat Boot the system in Single

More information

Introduction to Linux. Woo-Yeong Jeong Computer Systems Laboratory Sungkyunkwan University

Introduction to Linux. Woo-Yeong Jeong Computer Systems Laboratory Sungkyunkwan University Introduction to Linux Woo-Yeong Jeong (wooyeong@csl.skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu What is Linux? A Unix-like operating system of a computer What is an

More information

Introduction. SSH Secure Shell Client 1

Introduction. SSH Secure Shell Client 1 SSH Secure Shell Client 1 Introduction An SSH Secure Shell Client is a piece of software that allows a user to do a number of functions. Some of these functions are: file transferring, setting permissions,

More information

Setting up a Chaincoin Masternode

Setting up a Chaincoin Masternode Setting up a Chaincoin Masternode Introduction So you want to set up your own Chaincoin Masternode? You ve come to the right place! These instructions are correct as of April, 2017, and relate to version

More information

Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades Q2

Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades Q2 Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades 2017-2018 Q2 Facultat d Informàtica de Barcelona This first lab session is focused on getting experience in working

More information

Everything about Linux User- and Filemanagement

Everything about Linux User- and Filemanagement Everything about Linux User- and Filemanagement Lukas Prokop 20. April 2009 Inhaltsverzeichnis 1 Who I am 2 1.1 whoami..................................... 3 1.2 passwd......................................

More information

Project #3: Implementing NIS

Project #3: Implementing NIS Project #3: Implementing NIS NIS Daemons Limitations of NIS How We Will Use NIS NIS Domain Name NIS Software Setting Up NIS on it20 /etc/nsswitch.conf Creating New Accounts on Ubuntu /etc/passwd /etc/shadow

More information

Configuring Linux as an NIS Client

Configuring Linux as an NIS Client Configuring Linux as an NIS Client Estimated Time: 30 minutes Objective Equipment Scenario Procedures To configure a Linux Red Hat system as an NIS server and client. A computer with Linux Red Hat 7.X

More information

Using LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12)

Using LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12) Using LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12) Objective: Learn some basic aspects of the UNIX operating system and how to use it. What is UNIX? UNIX is the operating system used by most computers

More information

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Actual4Test.   Actual4test - actual test exam dumps-pass for IT exams Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : RH133 Title : Red Hat Linux System Administration Vendor : RedHat Version : DEMO Get Latest & Valid

More information

Unix Tutorial. Beginner. CS Help Desk: Marc Jarvis (in spirit), Monica Ung, Corey Antoniuk 2015

Unix Tutorial. Beginner. CS Help Desk: Marc Jarvis (in spirit), Monica Ung, Corey Antoniuk 2015 Unix Tutorial Beginner CS Help Desk: Marc Jarvis (in spirit), Monica Ung, Corey Antoniuk 2015 Helpful info SOCS wiki cs.mcgill.ca/docs Help desk - McConnell 209N help@cs.mcgill.ca CSUS help desk - 3rd

More information

UNIX. Basic UNIX Command

UNIX. Basic UNIX Command UNIX Basic UNIX Command Command List ls mkdir mv chmod groupadd hostname kill head top compress/ uncompress pwd Cat find chown useradd id ioscan pdf sar cd more grep chgrp passwd mount dmesg netstat tar

More information

commands exercises Linux System Administration and IP Services AfNOG 2015 Linux Commands # Notes

commands exercises Linux System Administration and IP Services AfNOG 2015 Linux Commands # Notes Linux System Administration and IP Services AfNOG 2015 Linux Commands # Notes * Commands preceded with "$" imply that you should execute the command as a general user not as root. * Commands preceded with

More information

Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers

Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Review of the Linux File System and Linux Commands 1. Introduction Becoming adept at using the Linux OS requires gaining familiarity

More information

Tutorial 1: Unix Basics

Tutorial 1: Unix Basics Tutorial 1: Unix Basics To log in to your ece account, enter your ece username and password in the space provided in the login screen. Note that when you type your password, nothing will show up in the

More information

LAB #5 Intro to Linux and Python on ENGR

LAB #5 Intro to Linux and Python on ENGR LAB #5 Intro to Linux and Python on ENGR 1. Pre-Lab: In this lab, we are going to download some useful tools needed throughout your CS career. First, you need to download a secure shell (ssh) client for

More information

Editors in Unix come in two general flavours:

Editors in Unix come in two general flavours: Review notes #2 1. Unix account 2.Login: with a terminal or using telnet or ssh 3. Change password 4. Must logout! 5. Emails: (a) mutt (b) pine (c).forward file 6.Basic commands: who, ls, cat, more, man

More information

1. Open VirtualBox and start your linux VM. Boot the machine and log in with the user account you created in Lab #1. Open the Terminal application.

1. Open VirtualBox and start your linux VM. Boot the machine and log in with the user account you created in Lab #1. Open the Terminal application. CIT 210L Name: Lab #2 1. Open VirtualBox and start your linux VM. Boot the machine and log in with the user account you created in Lab #1. Open the Terminal application. 2. Listing installed packages -

More information

This is Lab Worksheet 13 - not an Assignment. Boot Process and GRUB

This is Lab Worksheet 13 - not an Assignment. Boot Process and GRUB This is Lab Worksheet 13 - not an Assignment This Lab Worksheet contains some practical examples that will prepare you to complete your Assignments. You do not have to hand in this Lab Worksheet. Make

More information