NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1
|
|
- Jennifer Bennett
- 6 years ago
- Views:
Transcription
1 NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1 Objective At the conclusion of this lab, the student will be able to add and delete users, create and assign users to groups, and assign users and group privileges using the CLI and XWINDOWS. Journal Assignment From the man pages and online search, write down information, instructions, and options with respect to UNIX and LINUX for the following: pwconv pwunconv useradd userdel groupadd groupmod groupdel passwd gpaswd chage chgrp chown chmod UNIX pipes Find information on the files: /etc/password /etc/shadow /etc/group /etc/gshadow /etc/fstab Procedure 1. Logon as with your general username and assume privileges as su. Make a directory named /home/username/lab05 Make a backup copy of /etc/fstab Since we wish to assign quotas to users, we must modify /etc/fstab. Open the file /etc/fstab in vi There should be a line similar to the following: LABEL=/home /home ext3 defaults 1 2 Change to the insert mode. Move the cursor and add the text,usrquota after defaults with no spaces after the s in defaults, and do not forget the comma before usrquota Save and exit from vi reboot 2. Logon as with your general username and assume privileges as su Copy the file/etc/fstab to the /home/andrewjr/lab05 directory In this course, we want to use shadow passwords. Enable shadow passwords for all users with the command pwconv We will now create user accounts and passwords. The UserIDs in the following table may be different from the ones assigned by the system. From the CLI to create the accounts listed in the following table using the useradd and passwd commands as follows: useradd username passwd username
2 NETW 110 Lab 5 Creating and Assigning Users and Groups Page 2 User Name Name Password UserID Home directory stu01 student 01 stu01pass 501 /home/stu01 stu02 student 02 stu02pass 502 /home/stu02 stu03 student 03 stu03pass 503 /home/stu03 stu04 student 04 stu04pass 504 /home/stu04 When we use this method the UID is automatically assigned. If you created an account for yourself when you booted the system the first time, it was UID 500 by default. After you create the login and password for stu01, verify that the user account was created by entering the command: finger stu01 You should receive a reply that gives you the login name, the Name (if entered), the home directory, the Shell, the date of the last login (never), if the user has mail, and if there is a plan. Since you just created the account, there should be no mail, and no plan. Now let us add four more users, but we will enter a name, a UID and password from the useradd command. The syntax of the command is: useradd c Real Name username -u UID p userpassword To create an account for stu05, the syntax of the command is: useradd c student 05 stu05 -u 505 p stu05pass Now add the other three. User Name Name Password UserID Home directory stu05 student 05 stu05pass 505 /home/stu05 stu06 student 06 stu06pass 506 /home/stu06 stu07 student 07 stu07pass 507 /home/stu07 stu08 student 08 stu08pass 508 /home/stu08 Press CRTL-ALT-F2 to start a new virtual connection. Login as stu08. Verify that you are logged in as stu08 by looking at your prompt. It should be something like [stu08@apple stu08]$ Now let us create a new blank file with the command touch myfile.txt Verify the file was created with the command ls l It should show the file myfile.txt exists and is 0 bytes in size. Now let us modify the file. Enter the command: vi myfile.txt The file opens in the editor. Press i to enter the insert mode. The cursor should be on the first line. Enter the following text: This is my file. Press Esc to enter the command mode. Press :wq to save (write) and quit. Let us verify that the file exists and was modified. Enter the command cat myfile.txt and verify the contents of the file Now logout with the command exit Change back to the root account by pressing CRTL-ALT-F1 Occasionally, it may be necessary to disable a user s account. To prevent the user from logging in, we modify the users password with the l (Lock option) This places an! at the beginning of the users password. Once this is done, any attempt to login will receive a reply as if the user entered an incorrect login or password. Lock the account for stu08 as follows:
3 NETW 110 Lab 5 Creating and Assigning Users and Groups Page 3 passwd l stu08 The system should reply that the password for the user was locked and the passwd command was successfully. Now let us verify that the directory and its contents are still present. Enter the command: ls l /home/stu08 You should see how many files are present, the names of the files and their size. Hidden files are not displayed. To see the hidden files, you need to add the a (all) option ls la /home/stu08 Open a new virtual terminal by pressing CRTL-ALT-F2 Try to login as stu08 When you get tired of trying, Change back to the root account by pressing CRTL-ALT-F1 Unlock the account with the u option passwd u stu08 Open a new virtual terminal with CRTL-ALT-F2 and login as stu08 (successfully this time) Force the user to change his/her password on the next login with the command: chage d 0 stu08 login as stu08 Change the password as required Exit and return to the root account with CTRL-ALT-F1 3. A group is a way to organize users on any Unix-based machine including Linux. Members of a group can share files and directories. For instance, if you have two webmasters of an internet site and both need access to read/write to the files and directories for the website, the two webmasters could be members of the same group and have equal permissions to the files and directories within the group. You must have root access to add a group. After logging in as root, the command groupadd can be used to add groups to your machine. In Red Hat Linux, the groupadd command is located in the /usr/sbin directory. The command to create a group named students with a GID (Group ID) of 600 is: groupadd g 600 f students Now create a group name faculty with a gid of 700 and a group named admin with a gid of 800 To add users to the group in the text mode, you have to edit a file called /etc/group as the root. Enter the command vi /etc/group Press i to enter the insert mode Scroll down until you see a line students:x:600: You add a user to the group by adding the username as a comma delimited list with no spaces after the : or after the last username in the list. Place the cursor at the end of the line students group line and add the user s stu01, stu03, stu05 When you are finished, the line should look like the following: students:x:600:stu01,stu03,stu05 Press ESC Enter :wq Verify that you entries were made to the file with the command cat /etc/group less
4 NETW 110 Lab 5 Creating and Assigning Users and Groups Page 4 You will see one screen of information at a time ( this is cause by adding either less or more at the end of the command). Press the spacebar to scroll in the next screen. (The Enter key scrolls only the next line, and you can use CRTL-C to abort) Continue to scroll until you verify that stu01, stu03, and stu05 were added to the group students. When you get to the end of the file, press q to return to the system prompt. 4. Red Hat has a GUI application called redhat-config-users that only runs from X or from a virtual terminal window in X. If you enter the command from the CLI, you will get a message that the X Server must be running. It allows you to enter the all the information we just did in a graphical environment. While this is convenient, you should know how to use the CLI as this environment only exists in Red Hat. Make sure you are logged in as the root. If not, type exit and login as root. From the CLI, enter the command startx CL on Red Hat Applications Highlight System Setting CL on Users and Groups If necessary, CL on the Users tab. You should see a display similar to the following. We are now going to add four more users as listed in the table below. User Name Name Password UserID Home directory stu09 student 09 stu09pass 509 /home/stu09 stu10 student 10 stu10pass 510 /home/stu10 stu11 student 11 stu11pass 511 /home/stu11 stu12 student 12 stu12pass 512 /home/stu12
5 NETW 110 Lab 5 Creating and Assigning Users and Groups Page 5 It is merely a matter of filling in text boxes in a dialog box so it is much easier that from the CLI. You can manually enter a UID from the bottom right corner of the dialog box, but we will not do that now. From this environment, we can easily see all users and their UID, so there will be no conflicts. CL on Add User and enter the data for stu09 and CL on OK Repeat the previous step for stu10 through stu12. CL on the Groups Tab CL on the students group in the list. CL on Properties CL on the Group Users tab Scroll through the list and place a check in each user from stu01 through stu12 CL on Add Group Name the group techies and assign a group ID manually of 750 Add all students with an odd numbered UID Close the Red Hat User Manager
6 NETW 110 Lab 5 Creating and Assigning Users and Groups Page 6 5. CL on Red Hat - Highlight Accessories - CL on Text Editor CL on File - CL on Open - From the /etc directory, Open the file group Scroll to the end of the file and verify that the group students and techies contain the correct members. Close the file. 6. Switch to the CLI root account Enter the command userdel r stu08 Enter the command ls l /home and verify that the stu08 directory is gone. Enter the command cd /home/stu08, which should fail 7. Press CRL-ALT-F7 to switch to the GUI Open the Users and Groups from the Systems Settings menu. CL on Groups and verify that stu08 was removed from the students group. CL on the Users tab Recreate the user stu08 CL on stu01 and CL on Properties Enter the Full Name student 01 Repeat this step for all users in the list that have no Full Name. Close the Red Hat User Manager and Shutdown X 8. For the following, refer to the quota section of the handout on Creating Users and quotas to perform the following: Change to the single user mode (init 1) Make a backup copy of /etc/fstab and open /etc/fstab in an editor. On the line /home, change defaults to defaults,usrquota Return to runlevel 3 (init 3) Create a quota configuration file with the proper permissions with the commands touch /home/aquota.user chmod 600 /home/aquota.user Create a quota table with the command quotacheck -vagum Set a soft limit for all stu users to a maximum of 5 MB (edquota u username) Set the grace period to 5 days using edquota -t Generate a copy of the quota limits of the /home directory with the command: repquota /home > /home/andrewjr/lab05/quota_report.txt Final Steps 1. With su privileges, copy the following files to the /home/andrewjr/lab05 directory /etc/passwd /etc/shadow /etc/group /etc/gshadow /etc/gshadow /etc/fstab 2. Change the ownership of /home/username/lab05 and all its files from root to your username. Logout as su 3. ftp to the class server and login as your servername. Create a directory named lab05. Upload all the files from /home/username/lab05/ on the local computer to the lab05 directory on the ftp server. Exit from the ftp session. 4. Review documentation and your course text. In your journal, discuss the procedure and commands, and give examples of how to enable other user password options
NETW 110 Lab 3 Post-Installation Configuration Page 1
NETW 110 Lab 3 Post-Installation Configuration Page 1 Objective At the conclusion of this lab, the student will learn some very basic functions of vi, use vi to perform some post-installation configuration
More informationChapter 5: User Management. Chapter 5 User Management
Chapter 5: User Management Chapter 5 User Management Last revised: 20/6/2004 Chapter 5 Outline In this chapter we will learn Where user and group account information is stored How to manage user accounts
More informationLab 2A> ADDING USERS in Linux
Lab 2A> ADDING USERS in Linux Objective In this lab, student will learn how to create user accounts using the Linux operating system. Scenario The XYZ Company has just installed a server running Linux.
More informationMANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG
MANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG Terminals and keyboards have no uniform behavioral pattern. Terminal settings directly impact the keyboard operation.
More informationCST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management
Student Name: Lab Section: Linux User and Group Management 1 Due Date - Upload to Blackboard by 8:30am Monday April 2, 2012 Submit the completed lab to Blackboard following the Rules for submitting Online
More informationCST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management
Student Name: YOUR NAME Lab Section: 011 012 013 or 014 Linux User and Group Management 1 Due Date - Upload to Blackboard by 8:30am Monday April 2, 2012 Submit the completed lab to Blackboard following
More informationRedhat Basic. Need. Your. What. Operation G U I D E. Technical Hand Note template version
Redhat Basic Operation G U I D E What Need Your www.next-asia.com Readhat Basic Operation Guide, Prepared by Nazmul Khan Page 1 of 43 Redhat Basic Operation Guide RedHat Installation Guide... 2 Installation...
More informationCommands are in black
Starting From the Shell Prompt (Terminal) Commands are in black / +--------+---------+-------+---------+---------+------ +------ +------ +------ +------ +------ +-- Bin boot dev etc home media sbin bin
More informationThe kernel is the low-level software that manages hardware, multitasks programs, etc.
November 2011 1 Why Use Linux? Save Money Initial purchase and maintenance Resume Linux is used by MANY organizations More choices Tons of Linux operating systems November 2011 2 What is Linux? 1. Contains
More informationCSE 265: System and Network Administration
CSE 265: System and Network Administration User accounts The /etc/passwd file The /etc/shadow file Root powers Ownership of files and processes The superuser The /etc/group file Adding users Removing users
More information10 userdel: deleting a user account 9. 1 Context Tune the user environment and system environment variables [3]
1. Context 1.111.1 2 8 Deleting a group 8 1.111.1 Manage users and group accounts and related system files Weight 4 Outline Contents Linux Professional Institute Certification 102 Nick Urbanik
More informationUser accounts and authorization
User accounts and authorization Authentication vs authorization Authentication: proving the identity of someone Authorization: allowing a user to access certain resources 1 Government authorization documents
More informationOperating Systems Lab 1 (Users, Groups, and Security)
Operating Systems Lab 1 (Users, Groups, and Security) Overview This chapter covers the most common commands related to users, groups, and security. It will also discuss topics like account creation/deletion,
More informationTEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 1.0, Last Edited 09/20/2005 Name of Students: Date of Experiment: Part I: Objective The objective of the exercises
More informationActual4Test. Actual4test - actual test exam dumps-pass for IT exams
Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : RH-302 Title : Red Hat Certified Engineer on Redhat Enterprise Linux 5 (Labs) Vendors : RedHat Version
More informationUser & Group Administration
User & Group Administration David Morgan Users useradd/userdel /home/ /etc/passwd is the user database /etc/shadow has passwords (relocated from passwd) /etc/group whoami su / sudo / SUID process
More informationUNIT V. Dr.T.Logeswari. Unix Shell Programming - Forouzan
UNIT V UNIX SYSTEM COMMUNICATION Dr.T.Logeswari 1 Electronic mail or email is easiest way of communication on unix. Fast and cheap Used to exchange graphics, sound and video files 2 3 Elements of a communication
More informationLab Authentication, Authorization, and Accounting
Objectives Given a scenario, select the appropriate authentication, authorization, or access control Install and configure security controls when performing account management, based on best practices
More informationUser Accounts. The Passwd, Group, and Shadow Files
User Accounts The Passwd, Group, and Shadow Files We'll start with the passwd (pronounced "password") file, located at /etc/passwd. This file holds information about all of the user accounts on the system.
More informationRH202. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) Exam.
REDHAT RH202 Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) Exam TYPE: DEMO http://www.examskey.com/rh202.html Examskey REDHAT RH202 exam demo product is here for you to test the quality
More informationCourse 144 Supplementary Materials. UNIX Fundamentals
Course 144 Supplementary Materials UNIX Fundamentals 1 Background to UNIX Command Fundamentals This appendix provides a overview of critical commands and concepts Prerequisite knowledge attendees should
More informationCS/CIS 249 SP18 - Intro to Information Security
Lab assignment CS/CIS 249 SP18 - Intro to Information Security Lab #2 - UNIX/Linux Access Controls, version 1.2 A typed document is required for this assignment. You must type the questions and your responses
More informationNETW 110 Lab 4 Using eth0 Configuration Mounting Drives and Devices Page 1
NETW 110 Lab 4 Using eth0 Configuration Mounting Drives and Devices Page 1 Objective At the conclusion of this lab, the student will be able to perform necessary post-installation hardware configuration
More informationRH-202. RedHat. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs)
RedHat RH-202 Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) Download Full Version : https://killexams.com/pass4sure/exam-detail/rh-202 QUESTION: 159 Install the dialog-* Questions asking
More informationLab 3a Using the vi editor
Lab 3a Using the vi editor Objectives: Become familiar with the vi Editor Review the three vi Modes Review keystrokes to move between vi modes Create a new file with vi Editor Invoke vi with show mode
More informationRedHat. Rh202. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs)
RedHat Rh202 Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) http://killexams.com/exam-detail/rh202 QUESTION: 156 Who ever creates the files/directories on /data group owner should be automatically
More informationUNIT 10 Ubuntu Security
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT 10 Ubuntu Security Learning Objectives Participants will understand how to configure major components of Linux/Ubuntu Account
More informationLinux File System Quotas
yolinux.com Linux File System Quotas Greg Ippolito Configuration: Configuration of disk usage quotas on Linux - Perform the following as root: 1. Edit file /etc/fstab to add qualifier "usrquota" or "grpquota"
More informationUser Management. René Serral-Gracià Xavier Martorell-Bofill 1. May 26, Universitat Politècnica de Catalunya (UPC)
User Management René Serral-Gracià Xavier Martorell-Bofill 1 1 Universitat Politècnica de Catalunya (UPC) May 26, 2014 Lectures 1 System administration introduction 2 Operating System installation 3 User
More informationLinux Interview Questions and Answers
Linux Interview Questions and Answers You need to see the last fifteen lines of the files dog, cat and horse. What command should you use? tail -15 dog cat horse The tail utility displays the end of a
More informationRH133. Red Hat Linux System Administration
RH133 Red Hat Linux System Administration Version 3.5 QUESTION NO: 1 RH133 John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. He is working as a root
More informationCTEC1863/2018F Bonus Lab Page 1 of 5
CTEC1863/2018F Bonus Lab Page 1 of 5 Bonus Lab: OpenSUSE Linux Rescue In this lab, we will install an OpenSUSE virtual machine. However, both the non-root user and the root passwords are unknown. To fix
More informationSystem Administration
User and Group Management All processes on the system run under by a user. Users can be collected into groups which can be given common attributes Users and groups are represented by the system using unique
More informationCST8207: GNU/Linux Operating Systems I Lab Six Linux File System Permissions. Linux File System Permissions (modes) - Part 1
Student Name: Lab Section: Linux File System Permissions (modes) - Part 1 Due Date - Upload to Blackboard by 8:30am Monday March 12, 2012 Submit the completed lab to Blackboard following the Rules for
More informationCS Fundamentals of Programming II Fall Very Basic UNIX
CS 215 - Fundamentals of Programming II Fall 2012 - Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the CS (Project) Lab (KC-265)
More informationOptional Labs. 0Handouts: 2002 ProsoftTraining All Rights Reserved. Version 3.07
0Handouts: Optional Lab 1-1: Understanding the /etc/securetty file In this lab, you will examine a PAM component, the /etc/securetty file. 1. Boot into Linux as root. Open a Telnet client and attempt to
More informationAccurate study guides, High passing rate! IT TEST BOOK QUESTION & ANSWER. Ittestbook provides update free of charge in one year!
IT TEST BOOK QUESTION & ANSWER Ittestbook provides update free of charge in one year! Accurate study guides, High passing rate! Exam : RH133 Title : Red Hat Linux System Administration Version : Demo 1
More informationIntroduction to the UNIX command line
Introduction to the UNIX command line Steven Abreu Introduction to Computer Science (ICS) Tutorial Jacobs University s.abreu@jacobs-university.de September 19, 2017 Overview What is UNIX? UNIX Shell Commands
More informationTEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 2.0, Last Edited 10/1/2006 Students Name: Date of Experiment: Part I: Objective The objective of the exercises
More informationGetting Started With UNIX Lab Exercises
Getting Started With UNIX Lab Exercises This is the lab exercise handout for the Getting Started with UNIX tutorial. The exercises provide hands-on experience with the topics discussed in the tutorial.
More informationQuick Installation Guide for RHV/Ovirt
Quick Installation Guide for RHV/Ovirt 2017 Chengdu Vinchin Technology Co. Ltd. All rights reserved. CONTENTS 1. Create New Virtual Machine...2 2. Install Backup Server ( as master)...5 3. Install Backup
More informationCS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX
CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the EECS labs that dual boot
More informationExam Name: Red Hat Certified Engineer on Redhat
Vendor: Red Hat Exam Code: RH302 Exam Name: Red Hat Certified Engineer on Redhat Version: DEMO QUESTION 1 One Logical Volume is created named as myvol under vo volume group and is mounted. The Initial
More informationIntroduction to Unix May 24, 2008
Introduction to Unix May 24, 2008 Exercises: Privileges REFERENCE Reference: Shah, Steve, "Linux Administration: A Beginner's Guide", 2nd. ed., Osborne press, New York, NY. If you look at files in a directory
More informationOPERATING SYSTEMS LINUX
OPERATING SYSTEMS LINUX Božo Krstajić, PhD, University of Montenegro Podgorica bozok@cg.ac.yu Process management Linux operating systems work with processes. Basically a process consists of program code
More informationExam Questions RH133
Exam Questions RH133 Red Hat Linux System Administration https://www.2passeasy.com/dumps/rh133/ 1.John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network.
More informationCST Lab 2 Review #1
CST8177 - Lab 2 Review #1 Student Name Student number Section Objectives To review command line features, file system access, and permissions Lab Outcome A review of working with the command line A review
More informationLinux Essentials Objectives Topics:
Linux Essentials Linux Essentials is a professional development certificate program that covers basic knowledge for those working and studying Open Source and various distributions of Linux. Exam Objectives
More informationAssume that username is cse. The user s home directory will be /home/cse. You may remember what the relative pathname for users home directory is: ~
Introduction to Open Source Software Development Spring semester, 2017 School of Computer Science and Engineering, Pusan National University Joon-Seok Kim LINUX: COMMANDS Review Lab #1 2 Create Directories
More informationCSE Linux VM. For Microsoft Windows. Based on opensuse Leap 42.2
CSE Linux VM For Microsoft Windows Based on opensuse Leap 42.2 Dr. K. M. Flurchick February 2, 2017 Contents 1 Introduction 1 2 Requirements 1 3 Procedure 1 4 Usage 3 4.1 Start/Stop.................................................
More informationPerl and R Scripting for Biologists
Perl and R Scripting for Biologists Lukas Mueller PLBR 4092 Course overview Linux basics (today) Linux advanced (Aure, next week) Why Linux? Free open source operating system based on UNIX specifications
More informationPart I. Introduction to Linux
Part I Introduction to Linux 7 Chapter 1 Linux operating system Goal-of-the-Day Familiarisation with basic Linux commands and creation of data plots. 1.1 What is Linux? All astronomical data processing
More informationLab 1: Accessing the Linux Operating System Spring 2009
CIS 90 Linux Lab Exercise Lab 1: Accessing the Linux Operating System Spring 2009 Lab 1: Accessing the Linux Operating System This lab takes a look at UNIX through an online experience on an Ubuntu Linux
More informationUnix Introduction to UNIX
Unix Introduction to UNIX Get Started Introduction The UNIX operating system Set of programs that act as a link between the computer and the user. Developed in 1969 by a group of AT&T employees Various
More informationPresented by Bill Genske Gary Jackson
Quintessential School Systems Session C Linux Presented by Bill Genske Gary Jackson Copyright Quintessential School Systems, 2009 All Rights Reserved 867 American Street --- Second Floor --- San Carlos,
More informationFile Properties and Permissions
File Properties and Permissions Managing File Access in Linux Peter Perry July 2009 What is it about? Open a shell (terminal) and type ls -l You get quite a bit of information about each file. Tonight,
More informationExam Linux-Praxis - 1 ( From )
Exam Linux-Praxis - 1 ( From http://www.linux-praxis.de ) (1)Which of the following commands results in mailing the content of the current directory to Bob? A. mail Bob < ls B. ls > mail Bob C. ls mail
More informationQ) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system...
Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system... Q) Q) What is the difference between home directory and working directory? Answer
More informationNo Food or Drink in this room. Logon to Windows machine
While you are waiting No Food or Drink in this room Logon to Windows machine Username/password on right-hand monitor Not the username/password I gave you earlier We will walk through connecting to the
More informationSECURITY+ LAB SERIES. Lab 6: Secure Network Administration Principles Log Analysis
SECURITY+ LAB SERIES Lab 6: Secure Network Administration Principles Log Analysis Document Version: 2015-09-24 otherwise noted, is licensed under the Creative Commons Attribution 3.0 Unported License.
More informationUsers and Groups. his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and UNIX groups.
cameron.book Page 19 Monday, June 30, 2003 8:51 AM C H A P T E R 4 Users and Groups T his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and
More informationChapter 8: Security under Linux
Chapter 8: Security under Linux 8.1 File and Password security Linux security may be divided into two major parts: a) Password security b) File security 8.1.1 Password security To connect to a Linux system
More informationUsing WestGrid from the desktop Oct on Access Grid
Using WestGrid from the desktop Oct 11 2007 on Access Grid Introduction Simon Sharpe, UCIT Client Services The best way to contact WestGrid support is to email support@westgrid.ca This seminar gives you
More informationOutline. Structure of a UNIX command
Outline Structure of Unix Commands Command help (man) Log on (terminal vs. graphical) System information (utility) File and directory structure (path) Permission (owner, group, rwx) File and directory
More informationLinux Survival Guide
Linux Survival Guide Introduction: This guide is intended for use with classes at DACC that use a Linux operating system as the platform for students. It provides a quick summary and examples of how to
More informationFreeBSD Installation
1 FreeBSD Installation AFNOG Chix 2011 Blantyre, Malawi 31 st Oct - 4 th Nov 2011 Dorcas Muthoni and Evelyn Namara 2 READ THE INSTRUCTIONS These slides contain explicit instructions to allow you to successfully
More informationLinux/Cygwin Practice Computer Architecture
Linux/Cygwin Practice 2010 Computer Architecture Linux Login Use ssh client applications to connect (Port : 22) SSH Clients zterm ( http://www.brainz.co.kr/products/products4_2.php ) Putty ( http://kldp.net/frs/download.php/3411/hangulputty-0.58.h2.exe
More informationThis lab exercise is to be submitted at the end of the lab session! passwd [That is the command to change your current password to a new one]
Data and Computer Security (CMPD414) Lab II Topics: secure login, moving into HOME-directory, navigation on Unix, basic commands for vi, Message Digest This lab exercise is to be submitted at the end of
More information02. At the command prompt, type usermod -l bozo bozo2 and press Enter to change the login name for the user bozo2 back to bozo. => steps 03.
Laboratory Exercises: ===================== Complete the following laboratory exercises. All steps are numbered but not every step includes a question. You only need to record answers for those steps that
More informationCST8207: GNU/Linux Operating Systems I Lab Ten Boot Process and GRUB. Boot Process and GRUB
Student Name: Lab Section: Boot Process and GRUB 1 Due Date - Upload to Blackboard by 8:30am Monday April 16, 2012 Submit the completed lab to Blackboard following the Rules for submitting Online Labs
More informationShort Read Sequencing Analysis Workshop
Short Read Sequencing Analysis Workshop Day 2 Learning the Linux Compute Environment In-class Slides Matt Hynes-Grace Manager of IT Operations, BioFrontiers Institute Review of Day 2 Videos Video 1 Introduction
More informationLinux Kung-Fu. James Droste UBNetDef Fall 2016
Linux Kung-Fu James Droste UBNetDef Fall 2016 $ init 1 GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org
More informationLinux Systems Administration Getting Started with Linux
Linux Systems Administration Getting Started with Linux Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International
More informationInstalling and Upgrading Cisco Network Registrar Virtual Appliance
CHAPTER 3 Installing and Upgrading Cisco Network Registrar Virtual Appliance The Cisco Network Registrar virtual appliance includes all the functionality available in a version of Cisco Network Registrar
More informationPost Ubuntu Install Exercises
Post Ubuntu Install Exercises PacNOG 3 June 18 Rarotonga, Cook Islands 1. Get used to using sudo 2. Create an ainst account 3. Learn how to install software 4. Install gcc and make 5. Learn how to control
More informationAST2500 ibmc Configuration Guide
AST2500 ibmc Configuration Guide Version 1.0b Copyright Copyright 2017 MITAC COMPUTING TECHNOLOGY CORPORATION. All rights reserved. No part of this manual may be reproduced or translated without prior
More informationITEC451 Network Design & Analysis Laboratory Guide: Appendix
Linux Guide Accessing the command prompt Before you can access the command prompt, you must login to the system. The administrative user on Linux machines is named root. On most Linux distributions, you
More informationPlease choose the best answer. More than one answer might be true, but choose the one that is best.
Introduction to Linux and Unix - endterm Please choose the best answer. More than one answer might be true, but choose the one that is best. SYSTEM STARTUP 1. A hard disk master boot record is located:
More information14. Configuring Telnet in Knoppix
14. Configuring Telnet in Knoppix Estimated Time: 45 Minutes Objective In this lab, the student will learn how to configure the Telnet service on a system so that the user can remotely administer a Knoppix
More informationOverview LEARN. History of Linux Linux Architecture Linux File System Linux Access Linux Commands File Permission Editors Conclusion and Questions
Lanka Education and Research Network Linux Architecture, Linux File System, Linux Basic Commands 28 th November 2016 Dilum Samarasinhe () Overview History of Linux Linux Architecture Linux File System
More informationDELL EMC UNITY: DR ACCESS AND TESTING. Dell EMC Unity OE 4.3
DELL EMC UNITY: DR ACCESS AND TESTING Dell EMC Unity OE 4.3 1 The information in this publication is provided as is. Dell Inc. makes no representations or warranties of any kind with respect to the information
More informationExam Questions RH202
Exam Questions RH202 Redhat Certified Technician on Redhat Enterprise Linux 5 (Labs) https://www.2passeasy.com/dumps/rh202/ 1.CORRECT TEXT Change the root Password to redtophat Boot the system in Single
More informationIntroduction to Linux. Woo-Yeong Jeong Computer Systems Laboratory Sungkyunkwan University
Introduction to Linux Woo-Yeong Jeong (wooyeong@csl.skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu What is Linux? A Unix-like operating system of a computer What is an
More informationIntroduction. SSH Secure Shell Client 1
SSH Secure Shell Client 1 Introduction An SSH Secure Shell Client is a piece of software that allows a user to do a number of functions. Some of these functions are: file transferring, setting permissions,
More informationSetting up a Chaincoin Masternode
Setting up a Chaincoin Masternode Introduction So you want to set up your own Chaincoin Masternode? You ve come to the right place! These instructions are correct as of April, 2017, and relate to version
More informationLinux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades Q2
Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades 2017-2018 Q2 Facultat d Informàtica de Barcelona This first lab session is focused on getting experience in working
More informationEverything about Linux User- and Filemanagement
Everything about Linux User- and Filemanagement Lukas Prokop 20. April 2009 Inhaltsverzeichnis 1 Who I am 2 1.1 whoami..................................... 3 1.2 passwd......................................
More informationProject #3: Implementing NIS
Project #3: Implementing NIS NIS Daemons Limitations of NIS How We Will Use NIS NIS Domain Name NIS Software Setting Up NIS on it20 /etc/nsswitch.conf Creating New Accounts on Ubuntu /etc/passwd /etc/shadow
More informationConfiguring Linux as an NIS Client
Configuring Linux as an NIS Client Estimated Time: 30 minutes Objective Equipment Scenario Procedures To configure a Linux Red Hat system as an NIS server and client. A computer with Linux Red Hat 7.X
More informationUsing LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12)
Using LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12) Objective: Learn some basic aspects of the UNIX operating system and how to use it. What is UNIX? UNIX is the operating system used by most computers
More informationActual4Test. Actual4test - actual test exam dumps-pass for IT exams
Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : RH133 Title : Red Hat Linux System Administration Vendor : RedHat Version : DEMO Get Latest & Valid
More informationUnix Tutorial. Beginner. CS Help Desk: Marc Jarvis (in spirit), Monica Ung, Corey Antoniuk 2015
Unix Tutorial Beginner CS Help Desk: Marc Jarvis (in spirit), Monica Ung, Corey Antoniuk 2015 Helpful info SOCS wiki cs.mcgill.ca/docs Help desk - McConnell 209N help@cs.mcgill.ca CSUS help desk - 3rd
More informationUNIX. Basic UNIX Command
UNIX Basic UNIX Command Command List ls mkdir mv chmod groupadd hostname kill head top compress/ uncompress pwd Cat find chown useradd id ioscan pdf sar cd more grep chgrp passwd mount dmesg netstat tar
More informationcommands exercises Linux System Administration and IP Services AfNOG 2015 Linux Commands # Notes
Linux System Administration and IP Services AfNOG 2015 Linux Commands # Notes * Commands preceded with "$" imply that you should execute the command as a general user not as root. * Commands preceded with
More informationHands-on Keyboard: Cyber Experiments for Strategists and Policy Makers
Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Review of the Linux File System and Linux Commands 1. Introduction Becoming adept at using the Linux OS requires gaining familiarity
More informationTutorial 1: Unix Basics
Tutorial 1: Unix Basics To log in to your ece account, enter your ece username and password in the space provided in the login screen. Note that when you type your password, nothing will show up in the
More informationLAB #5 Intro to Linux and Python on ENGR
LAB #5 Intro to Linux and Python on ENGR 1. Pre-Lab: In this lab, we are going to download some useful tools needed throughout your CS career. First, you need to download a secure shell (ssh) client for
More informationEditors in Unix come in two general flavours:
Review notes #2 1. Unix account 2.Login: with a terminal or using telnet or ssh 3. Change password 4. Must logout! 5. Emails: (a) mutt (b) pine (c).forward file 6.Basic commands: who, ls, cat, more, man
More information1. Open VirtualBox and start your linux VM. Boot the machine and log in with the user account you created in Lab #1. Open the Terminal application.
CIT 210L Name: Lab #2 1. Open VirtualBox and start your linux VM. Boot the machine and log in with the user account you created in Lab #1. Open the Terminal application. 2. Listing installed packages -
More informationThis is Lab Worksheet 13 - not an Assignment. Boot Process and GRUB
This is Lab Worksheet 13 - not an Assignment This Lab Worksheet contains some practical examples that will prepare you to complete your Assignments. You do not have to hand in this Lab Worksheet. Make
More information