Ashutosh Bhadoria Banty Kumar

Size: px
Start display at page:

Download "Ashutosh Bhadoria Banty Kumar"

Transcription

1 Ashutosh Bhadoria Banty Kumar

2 Detailed list of an application information, system performance, or user activities. A log can be useful for keeping track of computer use, emergency recovery, and application improvement. Each software program that is capable of creating a log has different methods of starting or stopping the log creation. A log is a record of computer activity used for statistical purposes as well as backup and recovery. Log files are written by the operating system or other control program for such purposes as recording incoming dialogs, error and status messages and certain transaction details. Start and stop times of routine jobs may also be recorded.

3 The logs generated by any system are stored in files which are called as log files. We can retrieve this information using various system commands which is called Log Capturing. Linux systems have a very flexible and powerful logging system, which enables you to record almost anything you can imagine and then manipulate the logs to retrieve the information you require. Linux uses a set of configuration files, directories, programs, commands and daemons to create, store and recycle these log messages.

4 Linux system administrators often need to look at log files for troubleshooting purposes. Knowing where the system keeps its log files and how to make use of related commands can therefore help save valuable time during troubleshooting. It helps to monitor the system performance. From security point of view the events logged in the log file are mainly: 1. Authentication attempts both successful and failed. 2. All bad requests which includes attempts for SQL injections and various hacking efforts. Helps to monitor and check resource allocation and usage.

5 At the heart of the logging mechanism is the rsyslog daemon. This service is responsible for listening to log messages from different parts of a Linux system and routing the message to an appropriate log file in the /var/log directory. The rsyslog daemon gets its configuration information from the rsyslog.conf file. The rsyslog.conf file is found in the /etc directory. This instruction comes from a series of two-part lines within the file. The two part instruction is made up of a selector and an action. The two parts are separated by white space.

6 1) auth or authpriv: Messages coming from authorization and security related events. 2) kern: Any message coming from the Linux kernel. 3) mail: Messages generated by the mail subsystem. 4) cron: Cron daemon related messages. 5) daemon: Messages coming from daemons. 6) news: Messages coming from network news subsystem. 7) lpr: Printing related log messages. 8) user: Log messages coming from user programs. 9) local0 to local7: Reserved for local use

7 top - top provides an ongoing look at processor activity in real time. It displays a listing of the most CPU-intensive tasks on the system, and can provide an interactive interface for manipulating processes. who shows who is logged in. last shows listing of last logged in users, last searches back through the file /var/log/wtmp and displays a list of all users logged in since that file was created. lastlog - reports the most recent login of all users or of a given user, lastlog formats and prints the contents of the last login log /var/log/lastlog file.

8 last reboot - to find out when was the system last rebooted. strace - In the simplest case strace runs the specified command until it exits. It intercepts and records the system calls which are called by a process and the signals which are received by a process. The name of each system call, its arguments and its return value are printed on standard error or to the file specified with the -o option. cat - concatenate files and print on the standard output. system() - The C library function int system(const char *command) passes the command name or program name specified by command to the host environment to be executed by the command processor and returns after the command has been completed.

9 Event correlation is a technique for making sense of a large number of events and pinpointing the few events that are really important in that mass of information. Event correlation is performed by a special utility called as event correlator. Event correlation can be decomposed into four steps: event filtering, event aggregation, event masking and root cause analysis.

10 Event filtering:- Event filtering consists in discarding events that are deemed to be irrelevant by the event correlator. Event aggregation:- Event aggregation (also known as event de-duplication) consists in merging duplicates of the same event. Event masking:- Event masking consists in ignoring events pertaining to systems that are downstream of a failed system. Root cause analysis:- It consists in analyzing dependencies between events, based for instance on a model of the environment and dependency graphs, to detect whether some events can be explained by others.

11 In the Log folder in Desktop there is a file ProcessLog which has the process related logs. To make sense out of the captured log we sort out the top 10 CPU intensive processes from rest of the large entries of the logs. These processes may be running in the background or foreground. This has been achieved by using the sed command from the coreutils package. sed is a stream editor for filtering and transforming text. We have also made a provision to search how many times a particular process has been invoked, the process being provided by the user.

12

Services, logging, accounting Todd Kelley CST8177 Todd Kelley 1

Services, logging, accounting Todd Kelley CST8177 Todd Kelley 1 Services, logging, accounting Todd Kelley kelleyt@algonquincollege.com CST8177 Todd Kelley 1 services syslog logger command line utility psacct lastcomm ac, last, lastlog 2 chkconfig vs service (review)

More information

CounterACT Syslog Plugin

CounterACT Syslog Plugin Version 3.2.0 Table of Contents About the Syslog Plugin... 3 Multiple Destination Syslog Server Support... 3 Receiving Event Messages... 3 Sending Syslog Messages... 4 Sending CounterACT Event Messages...

More information

Forescout. Configuration Guide. Version 3.5

Forescout. Configuration Guide. Version 3.5 Forescout Version 3.5 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

Advanced Linux System Administra3on

Advanced Linux System Administra3on Advanced Linux System Administra3on Subject 9. Logging Pablo Abad Fidalgo José Ángel Herrero Velasco Departamento de Ingeniería Informá2ca y Electrónica Este tema se publica bajo Licencia: Crea2ve Commons

More information

Configure and Use System Log Files

Configure and Use System Log Files Information These notes were originally written in the year 2000 as part of a set of LPI Exam 101 training materials. The LPI training course at Bromley College was subsequently discontinued and some of

More information

CIT 470: Advanced Network and System Administration. Topics. System Logs. Logging

CIT 470: Advanced Network and System Administration. Topics. System Logs. Logging CIT 470: Advanced Network and System Administration Logging CIT 470: Advanced Network and System Administration Slide #1 1. System logs 2. Logging policies 3. Finding logs 4. Syslog 5. Syslog servers 6.

More information

Operating Systems Lab 1 (Users, Groups, and Security)

Operating Systems Lab 1 (Users, Groups, and Security) Operating Systems Lab 1 (Users, Groups, and Security) Overview This chapter covers the most common commands related to users, groups, and security. It will also discuss topics like account creation/deletion,

More information

Prerequisites: Students must be proficient in general computing skills but not necessarily experienced with Linux or Unix. Supported Distributions:

Prerequisites: Students must be proficient in general computing skills but not necessarily experienced with Linux or Unix. Supported Distributions: This GL124 course is designed to follow an identical set of topics as the Red Hat RH124 course with the added benefit of very comprehensive lab exercises and detailed lecture material. The Red Hat Enterprise

More information

Network and storage settings of ES NAS high-availability network storage services

Network and storage settings of ES NAS high-availability network storage services User Guide September 2017 Network and storage settings of ES NAS high-availability network storage services 2017 QNAP Systems, Inc. All Rights Reserved. 1 Before the setup... 3 Purpose... 3 Glossary...

More information

Chapter 2: Operating-System Structures. Operating System Concepts 9 th Edit9on

Chapter 2: Operating-System Structures. Operating System Concepts 9 th Edit9on Chapter 2: Operating-System Structures Operating System Concepts 9 th Edit9on Silberschatz, Galvin and Gagne 2013 Objectives To describe the services an operating system provides to users, processes, and

More information

External Alerting with Alert Responses

External Alerting with Alert Responses The following topics describe how to send external event alerts from the Firepower Management Center using alert responses: Firepower Management Center Alert Responses, page 1 Creating an SNMP Alert Response,

More information

Network and storage settings of ES NAS high-availability network storage services

Network and storage settings of ES NAS high-availability network storage services User Guide Jan 2018 Network and storage settings of ES NAS high-availability network storage services 2018 QNAP Systems, Inc. All Rights Reserved. 1 Table of Content Before the Setup... 3 Purpose... 3

More information

Mon Sep 17, 2007 Lecture 3: Process Management

Mon Sep 17, 2007 Lecture 3: Process Management Mon Sep 17, 2007 Lecture 3: Process Management September 19, 2007 1 Review OS mediates between hardware and user software QUIZ: Q: Name three layers of a computer system where the OS is one of these layers.

More information

MCSA SQL SERVER 2012

MCSA SQL SERVER 2012 MCSA SQL SERVER 2012 1. Course 10774A: Querying Microsoft SQL Server 2012 Course Outline Module 1: Introduction to Microsoft SQL Server 2012 Introducing Microsoft SQL Server 2012 Getting Started with SQL

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 3 This chapter describes how to configure system message logging on Cisco MDS 9000 Family switches. It includes the following sections: About System Message Logging, page 3-1 System Message Logging

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 3 This chapter describes how to configure system message logging on Cisco DCNM-SAN. It includes the following sections: Information About System Message Logging, page 3-1 Guidelines and Limitations,

More information

UNIX/Linux Auditing. Baccam Consulting, LLC Training Events

UNIX/Linux Auditing. Baccam Consulting, LLC Training Events UNIX/Linux Auditing Baccam Consulting, LLC tanya@securityaudits.org Training Events www.securityaudits.org/events.html ***CISSP Course being offered April 25-April 29, 2016 Copyright 2005-2016, Baccam

More information

5/8/2012. Exploring Utilities Chapter 5

5/8/2012. Exploring Utilities Chapter 5 Exploring Utilities Chapter 5 Examining the contents of files. Working with the cut and paste feature. Formatting output with the column utility. Searching for lines containing a target string with grep.

More information

Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system...

Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system... Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system... Q) Q) What is the difference between home directory and working directory? Answer

More information

Chapter 2: System Structures. Operating System Concepts 9 th Edition

Chapter 2: System Structures. Operating System Concepts 9 th Edition Chapter 2: System Structures Silberschatz, Galvin and Gagne 2013 Chapter 2: System Structures Operating System Services User Operating System Interface System Calls Types of System Calls System Programs

More information

EveryonePrint Integration with Equitrac. Configuration Guide. EveryonePrint Integration with Equitrac Page 1 of 14

EveryonePrint Integration with Equitrac. Configuration Guide. EveryonePrint Integration with Equitrac Page 1 of 14 EveryonePrint Integration with Equitrac Configuration Guide EveryonePrint Integration with Equitrac 2014.06.02 Page 1 of 14 1. Overview... 3 1.1 Added features with Equitrac integration... 3 1.2 Prerequisites

More information

Integrate Apache Web Server

Integrate Apache Web Server Publication Date: January 13, 2017 Abstract This guide helps you in configuring Apache Web Server and EventTracker to receive Apache Web server events. The detailed procedures required for monitoring Apache

More information

Veritas NetBackup for Lotus Notes Administrator's Guide

Veritas NetBackup for Lotus Notes Administrator's Guide Veritas NetBackup for Lotus Notes Administrator's Guide for UNIX, Windows, and Linux Release 8.0 Veritas NetBackup for Lotus Notes Administrator's Guide Document version: 8.0 Legal Notice Copyright 2016

More information

Advanced training. Linux components Command shell. LiLux a.s.b.l.

Advanced training. Linux components Command shell. LiLux a.s.b.l. Advanced training Linux components Command shell LiLux a.s.b.l. alexw@linux.lu Kernel Interface between devices and hardware Monolithic kernel Micro kernel Supports dynamics loading of modules Support

More information

Process Management! Goals of this Lecture!

Process Management! Goals of this Lecture! Process Management! 1 Goals of this Lecture! Help you learn about:" Creating new processes" Programmatically redirecting stdin, stdout, and stderr" (Appendix) communication between processes via pipes"

More information

o Reality The CPU switches between each process rapidly (multiprogramming) Only one program is active at a given time

o Reality The CPU switches between each process rapidly (multiprogramming) Only one program is active at a given time Introduction o Processes are a key concept in operating systems Abstraction of a running program Contains all information necessary to run o On modern systems, many processes are active at the same time

More information

Contents. 1.1 What Operating Systems Do Computer-System Organization Computer-System Architecture 12. Operating-System Structures

Contents. 1.1 What Operating Systems Do Computer-System Organization Computer-System Architecture 12. Operating-System Structures Contents PART ONE Chapter 1 Introduction OVERVIEW 1.1 What Operating Systems Do 3 1.2 Computer-System Organization 6 1.3 Computer-System Architecture 12 1.4 Operating-System Structure 18 1.5 Operating-System

More information

Linux System Administration

Linux System Administration System Processes Objective At the conclusion of this module, the student will be able to: Describe and define a process Identify a process ID, the parent process and the child process Learn the PID for

More information

2012 Peer Small Business Data

2012 Peer Small Business Data Welcome The installation program installs the following data sets: 2012 Peer Small Business Data 2012 Peer Small Business Data In order to use this data set you should be running CRA Wiz and Fair Lending

More information

Midterm Exam CPS 210: Operating Systems Spring 2013

Midterm Exam CPS 210: Operating Systems Spring 2013 Your name: Sign for your honor: Midterm Exam CPS 210: Operating Systems Spring 2013 The last page of this exam is a list of terms used in this class, and whose meanings you should know. You may detach

More information

Quick Installation Guide for RHV/Ovirt

Quick Installation Guide for RHV/Ovirt Quick Installation Guide for RHV/Ovirt 2017 Chengdu Vinchin Technology Co. Ltd. All rights reserved. CONTENTS 1. Create New Virtual Machine...2 2. Install Backup Server ( as master)...5 3. Install Backup

More information

Process Management 1

Process Management 1 Process Management 1 Goals of this Lecture Help you learn about: Creating new processes Programmatically redirecting stdin, stdout, and stderr (Appendix) communication between processes via pipes Why?

More information

Jan 20, 2005 Lecture 2: Multiprogramming OS

Jan 20, 2005 Lecture 2: Multiprogramming OS Jan 20, 2005 Lecture 2: Multiprogramming OS February 17, 2005 1 Review OS mediates between hardware and user software QUIZ: Q: What is the most important function in an OS? A: To support multiprogramming

More information

Utilities. Introduction. Working with SCE Platform Files. Working with Directories CHAPTER

Utilities. Introduction. Working with SCE Platform Files. Working with Directories CHAPTER CHAPTER 4 Revised: September 27, 2012, Introduction This chapter describes the following utilities: Working with SCE Platform Files, page 4-1 The User Log, page 4-5 Managing Syslog, page 4-8 Flow Capture,

More information

M.C.A. (Sem.-lll) (CBCS) Examination November CCA-3003 Operating System and LinuxlUnix programming

M.C.A. (Sem.-lll) (CBCS) Examination November CCA-3003 Operating System and LinuxlUnix programming IIMII 003-007303 M.C.A. (Sem.-lll) (CBCS) Examination November-20 13 CCA-3003 Operating System and LinuxlUnix programming Faculty Code: 003 Subject Code: 007303 Time: 2'/' Hoursl ITotal Marks: 70 I. Attempt

More information

User Guide. Data Gatherer 1.1 6/20/2014. Edition: A

User Guide. Data Gatherer 1.1 6/20/2014. Edition: A Data Gatherer 1.1 6/20/2014 Edition: A Data Gatherer 1.1 Publication Information 2014 Imagine Communications. Proprietary and Confidential. Imagine Communications considers this document and its contents

More information

External Alerting for Intrusion Events

External Alerting for Intrusion Events The following topics describe how to configure external alerting for intrusion events: About, page 1 Configuring SNMP Alerting for Intrusion Events, page 2 Configuring Syslog Alerting for Intrusion Events,

More information

Prerequisites: General computing knowledge and experience. No prior knowledge with Linux is required. Supported Distributions:

Prerequisites: General computing knowledge and experience. No prior knowledge with Linux is required. Supported Distributions: This course prepares students to take the 101 exam of the LPI level 1 certification. The Linux Professional Institute (LPI) is the go to certification body for vendor independent Linux certifications.

More information

Mastering Linux. Paul S. Wang. CRC Press. Taylor & Francis Group. Taylor & Francis Croup an informa business. A CHAPMAN St HALL BOOK

Mastering Linux. Paul S. Wang. CRC Press. Taylor & Francis Group. Taylor & Francis Croup an informa business. A CHAPMAN St HALL BOOK Mastering Linux Paul S. Wang CRC Press Taylor & Francis Group Boca Raton London New York CRC Press is an Imprint of the Taylor & Francis Croup an informa business A CHAPMAN St HALL BOOK Contents Preface

More information

Using the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1

Using the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1 Using the VMware vcenter Orchestrator Client vrealize Orchestrator 5.5.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Appliance Guide. Version 1.0

Appliance Guide. Version 1.0 Appliance Guide Version 1.0 Contents Contents 1 Revision history 2 Getting Started 3 Getting to Know the R7-3000/5000/5000x 5 Getting to Know the R7-1000 6 Setting Up the Appliance 7 Logging in to the

More information

client X11 Linux workstation

client X11 Linux workstation LPIC1 LPIC Linux: System Administrator LPIC 1 LPI command line LPIC-1 Linux LPIC-1 client X11 Linux workstation Unix GNU Linux Fundamentals Unix and its Design Principles FSF and GNU GPL - General Public

More information

HP-UX System Administration

HP-UX System Administration HP-UX System Administration This intensive course is designed for experienced UNIX administrators who like to understand the differences between HP-UX and standard UNIX. It is essential that students have

More information

CS370 Operating Systems

CS370 Operating Systems CS370 Operating Systems Colorado State University Yashwant K Malaiya Fall 2016 Lecture 5 Slides based on Text by Silberschatz, Galvin, Gagne Various sources 1 1 User Operating System Interface - CLI CLI

More information

Operating Systems. Lecture 05

Operating Systems. Lecture 05 Operating Systems Lecture 05 http://web.uettaxila.edu.pk/cms/sp2013/seosbs/ February 25, 2013 Process Scheduling, System Calls Execution (Fork,Wait,Exit,Exec), Inter- Process Communication Schedulers Long

More information

The Wonderful World of Services VINCE

The Wonderful World of Services VINCE The Wonderful World of Services VINCE Agenda definitions services for Windows and Linux breaks? auditing Linux logs for Linux useful tools Goals develop a better understanding of Linux and Windows services

More information

Using the VMware vrealize Orchestrator Client

Using the VMware vrealize Orchestrator Client Using the VMware vrealize Orchestrator Client vrealize Orchestrator 7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

CS420: Operating Systems. OS Services & System Calls

CS420: Operating Systems. OS Services & System Calls OS Services & System Calls James Moscola Department of Engineering & Computer Science York College of Pennsylvania Based on Operating System Concepts, 9th Edition by Silberschatz, Galvin, Gagne Operating

More information

Virtual Data Center (vdc) Manual

Virtual Data Center (vdc) Manual Virtual Data Center (vdc) Manual English Version 1.0 Page 1 of 43 Content 1 HOW TO USE CLOUD PORTAL (VMWARE VIRTUAL DATA CENTER)... 3 2 VMWARE SYSTEM DETAILS... 5 3 HOW TO MANAGE VIRTUAL MACHINE... 6 Edit

More information

KeyWallPRO QuickStart Guide - File Management and Saving -

KeyWallPRO QuickStart Guide - File Management and Saving - KeyWallPRO QuickStart Guide - File Management and Saving - This QuickStart guide is intended to help the User understand the project file system employed by KeyWallPRO and how to protect project data.

More information

ORANET- Course Contents

ORANET- Course Contents ORANET- Course Contents 1. Oracle 11g SQL Fundamental-l 2. Oracle 11g Administration-l 3. Oracle 11g Administration-ll Oracle 11g Structure Query Language Fundamental-l (SQL) This Intro to SQL training

More information

Processes. Operating System CS 217. Supports virtual machines. Provides services: User Process. User Process. OS Kernel. Hardware

Processes. Operating System CS 217. Supports virtual machines. Provides services: User Process. User Process. OS Kernel. Hardware es CS 217 Operating System Supports virtual machines Promises each process the illusion of having whole machine to itself Provides services: Protection Scheduling Memory management File systems Synchronization

More information

Product Overview. Technical Summary, Samples, and Specifications

Product Overview. Technical Summary, Samples, and Specifications Product Overview Technical Summary, Samples, and Specifications Introduction IRI FACT (Fast Extract) is a high-performance unload utility for very large database (VLDB) systems. It s primarily for data

More information

Configuring Databases

Configuring Databases CHAPTER 6 This module describes how to configure the Cisco Service Control Management Suite (SCMS) Collection Manager (CM) to work with your database, and how to use the database infrastructure of the

More information

Prerequisites: Students should be comfortable with computers. No familiarity with Linux or other Unix operating systems is required.

Prerequisites: Students should be comfortable with computers. No familiarity with Linux or other Unix operating systems is required. GL-120: Linux Fundamentals Course Length: 4 days Course Description: The GL120 is a challenging course that focuses on the fundamental tools and concepts of Linux and Unix. Students gain proficiency using

More information

Perl and R Scripting for Biologists

Perl and R Scripting for Biologists Perl and R Scripting for Biologists Lukas Mueller PLBR 4092 Course overview Linux basics (today) Linux advanced (Aure, next week) Why Linux? Free open source operating system based on UNIX specifications

More information

Question No: 2 Which identifier is used to describe the application or process that submitted a log message?

Question No: 2 Which identifier is used to describe the application or process that submitted a log message? Volume: 65 Questions Question No: 1 Which definition of a fork in Linux is true? A. daemon to execute scheduled commands B. parent directory name of a file pathname C. macros for manipulating CPU sets

More information

Configuration Note. AudioCodes One Voice for Microsoft Skype for Business. CloudBond 365. Backup and Restore Functionality. Version 9.

Configuration Note. AudioCodes One Voice for Microsoft Skype for Business. CloudBond 365. Backup and Restore Functionality. Version 9. 7 Configuration Note AudioCodes One Voice for Microsoft Skype for Business CloudBond 365 Backup and Restore Functionality Version 9.5 Update 4 Configuration Note Contents Table of Contents 1 Introduction...

More information

Create a personal geodatabase

Create a personal geodatabase Create a personal geodatabase To create a personal geodatabase that corresponds to the same release as the ArcGIS for Desktop client you are using, follow these steps: 1. In ArcCatalog, right-click the

More information

COURSE OUTLINE: Supporting and Troubleshooting Windows 10

COURSE OUTLINE: Supporting and Troubleshooting Windows 10 Course Name 10982-Supporting and Troubleshooting Course Duration 5 Days Course Structure Instructor-Led Course Overview This course is designed to provide students with the knowledge and skills required

More information

EG 4.1. PC-SAS users. for. I C T EG 4.1 for PC-SAS Users. Thursday - May 7 th, 2009

EG 4.1. PC-SAS users. for. I C T EG 4.1 for PC-SAS Users. Thursday - May 7 th, 2009 EG 4.1 for PC-SAS users Agenda What EG 4.1 is? EG 4.1 vs. PC-SAS. Why not to use EG 4.1? Why to use EG 4.1? What s next for EG? Conclusion. Questions. 2 What EG 4.1 is? SAS Enterprise SAS ships Guide Enterprise

More information

Operating Systems ( )

Operating Systems ( ) Operating Systems (202-1-3031) Itai Dinur Office: Alon, 224 dinuri@cs.bgu.ac.il Office hours: Wednesday, 16:00-18:00 Danny Hendler Office: Alon, 218 hendlerd@cs.bgu.ac.il Office hours: Wednesday, 13:00-15:00

More information

Administering Microsoft SQL Server 2012 Databases

Administering Microsoft SQL Server 2012 Databases Course 10775A: Administering Microsoft SQL Server 2012 Databases Course Details Course Outline Module 1: Introduction to SQL Server 2012 and its Toolset This module introduces the entire SQL Server platform

More information

PDI Techniques Logging and Monitoring

PDI Techniques Logging and Monitoring PDI Techniques Logging and Monitoring Change log (if you want to use it): Date Version Author Changes Contents Overview... 1 Before You Begin... 1 Terms You Should Know... 1 Use Case: Setting Appropriate

More information

G54ADM Sample Exam Questions and Answers

G54ADM Sample Exam Questions and Answers G54ADM Sample Exam Questions and Answers Question 1 Compulsory Question (34 marks) (a) i. Explain the purpose of the UNIX password file. (2 marks) ii. Why doesn t the password file contain passwords? (2

More information

Storage and File System

Storage and File System COS 318: Operating Systems Storage and File System Andy Bavier Computer Science Department Princeton University http://www.cs.princeton.edu/courses/archive/fall10/cos318/ Topics Storage hierarchy File

More information

Bash Script. CIRC Summer School 2015 Baowei Liu

Bash Script. CIRC Summer School 2015 Baowei Liu Bash Script CIRC Summer School 2015 Baowei Liu Filename Expansion / Globbing Expanding filenames containing special characters Wild cards *?, not include... Square brackets [set]: - Special characters:!

More information

Spi-Wizard II Installation Guide

Spi-Wizard II Installation Guide Spi-Wizard II Installation Guide - 1 - Spi-Wizard II Installation Guide Thank you for purchasing the Frieling-Racing Spi-Wizard II Serial Programming tool. This document will assist you with the software

More information

tailon Documentation Release Georgi Valkov

tailon Documentation Release Georgi Valkov tailon Documentation Release 1.3.0 Georgi Valkov Nov 21, 2017 Contents 1 Screenshots 3 2 Installation 7 3 Quick start 9 3.1 Tailon................................................... 9 4 Reverse proxy

More information

Programming Assignment #1: A Simple Shell

Programming Assignment #1: A Simple Shell Programming Assignment #1: A Simple Shell Due: Check My Courses In this assignment you are required to create a C program that implements a shell interface that accepts user commands and executes each

More information

LINUX FUNDAMENTALS. Supported Distributions: Red Hat Enterprise Linux 6 SUSE Linux Enterprise 11 Ubuntu LTS. Recommended Class Length: 5 days

LINUX FUNDAMENTALS. Supported Distributions: Red Hat Enterprise Linux 6 SUSE Linux Enterprise 11 Ubuntu LTS. Recommended Class Length: 5 days LINUX FUNDAMENTALS The course is a challenging course that focuses on the fundamental tools and concepts of Linux and Unix. Students gain proficiency using the command line. Beginners develop a solid foundation

More information

Sagem MEMS 7.3 Quick Installation Guide

Sagem MEMS 7.3 Quick Installation Guide Sagem MEMS 7.3 Quick Installation Guide This document is an installation supplement to the MorphoAccess Enrollment Management System (MEMS) Installation Guide and User Guide. To ensure the most effective

More information

Chapter 2: Operating-System Structures

Chapter 2: Operating-System Structures Chapter 2: Operating-System Structures Chapter 2: Operating-System Structures Operating System Services User Operating System Interface System Calls Types of System Calls System Programs Operating System

More information

Veritas NetBackup AdvancedDisk Storage Solutions Guide

Veritas NetBackup AdvancedDisk Storage Solutions Guide Veritas NetBackup AdvancedDisk Storage Solutions Guide UNIX, Windows, Linux Release 8.1 Veritas NetBackup AdvancedDisk Storage Solutions Guide Last updated: 2017-09-25 Legal Notice Copyright 2017 Veritas

More information

Introduction to remote command line Linux. Research Computing Team University of Birmingham

Introduction to remote command line Linux. Research Computing Team University of Birmingham Introduction to remote command line Linux Research Computing Team University of Birmingham Linux/UNIX/BSD/OSX/what? v All different v UNIX is the oldest, mostly now commercial only in large environments

More information

TDDI04, K. Arvidsson, IDA, Linköpings universitet Operating System Structures. Operating System Structures Overview. Operating System Services

TDDI04, K. Arvidsson, IDA, Linköpings universitet Operating System Structures. Operating System Structures Overview. Operating System Services TDDI04 Concurrent Programming, Operating Systems, and Real-time Operating Systems Operating System Structures [SGG7] Chapter 2 Copyright Notice: The lecture notes are mainly based on Silberschatz s, Galvin

More information

Technology in Action. Chapter 5 System Software: The Operating System, Utility Programs, and File Management

Technology in Action. Chapter 5 System Software: The Operating System, Utility Programs, and File Management Technology in Action Chapter 5 System Software: The Operating System, Utility Programs, and File Management Chapter Topics Operating System Fundamentals What the Operating System Does The Boot Process:

More information

COS 318: Operating Systems. File Systems. Topics. Evolved Data Center Storage Hierarchy. Traditional Data Center Storage Hierarchy

COS 318: Operating Systems. File Systems. Topics. Evolved Data Center Storage Hierarchy. Traditional Data Center Storage Hierarchy Topics COS 318: Operating Systems File Systems hierarchy File system abstraction File system operations File system protection 2 Traditional Data Center Hierarchy Evolved Data Center Hierarchy Clients

More information

Getting to know you. Anatomy of a Process. Processes. Of Programs and Processes

Getting to know you. Anatomy of a Process. Processes. Of Programs and Processes Getting to know you Processes A process is an abstraction that supports running programs A sequential stream of execution in its own address space A process is NOT the same as a program! So, two parts

More information

XLink EzRollBack Pro User Manual Table Contents

XLink EzRollBack Pro User Manual Table Contents XLink EzRollBack Pro User Manual Table Contents Chapter 1 Welcome to XLink's EzRollback... 2 1.1 System Requirements... 4 1.2 Installation Guide... 5 1.3 License Information... 9 1.4 How To Get Help From

More information

alphacontrol 2 Setup MSAsafety.com 1. File Structure 2. Setup Launcher This is what the root setup directory looks like:

alphacontrol 2 Setup MSAsafety.com 1. File Structure 2. Setup Launcher This is what the root setup directory looks like: alphacontrol 2 Setup 1. File Structure This is what the root setup directory looks like: alphacontrol DbInit: Contains setup routine to install an empty database instance common: Contains Firebird DMBS

More information

Data Validation Option Best Practices

Data Validation Option Best Practices Data Validation Option Best Practices 1993-2016 Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise) without

More information

Installing SQL Server Developer Last updated 8/28/2010

Installing SQL Server Developer Last updated 8/28/2010 Installing SQL Server Developer Last updated 8/28/2010 1. Run Setup.Exe to start the setup of SQL Server 2008 Developer 2. On some OS installations (i.e. Windows 7) you will be prompted a reminder to install

More information

UNIX Kernel. UNIX History

UNIX Kernel. UNIX History UNIX History UNIX Kernel 1965-1969 Bell Labs participates in the Multics project. 1969 Ken Thomson develops the first UNIX version in assembly for an DEC PDP-7 1973 Dennis Ritchie helps to rewrite UNIX

More information

[AVNICF-MCSASQL2012]: NICF - Microsoft Certified Solutions Associate (MCSA): SQL Server 2012

[AVNICF-MCSASQL2012]: NICF - Microsoft Certified Solutions Associate (MCSA): SQL Server 2012 [AVNICF-MCSASQL2012]: NICF - Microsoft Certified Solutions Associate (MCSA): SQL Server 2012 Length Delivery Method : 5 Days : Instructor-led (Classroom) Course Overview Participants will gain the knowledge

More information

CompTIA Exam LX0-102 Linux Part 2 Version: 10.0 [ Total Questions: 177 ]

CompTIA Exam LX0-102 Linux Part 2 Version: 10.0 [ Total Questions: 177 ] s@lm@n CompTIA Exam LX0-102 Linux Part 2 Version: 10.0 [ Total Questions: 177 ] CompTIA LX0-102 : Practice Test Topic break down Topic No. of Questions Topic 1: Volume A 60 Topic 2: Volume B 59 Topic 3:

More information

Dell Storage Compellent Integration Tools for VMware

Dell Storage Compellent Integration Tools for VMware Dell Storage Compellent Integration Tools for VMware Version 4.0 Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your

More information

Chapter 2: Operating-System Structures. Operating System Concepts 9 th Edition

Chapter 2: Operating-System Structures. Operating System Concepts 9 th Edition Chapter 2: Operating-System Structures Silberschatz, Galvin and Gagne 2013 Chapter 2: Operating-System Structures Operating System Services User Operating System Interface System Calls Types of System

More information

Contents in Detail. Acknowledgments

Contents in Detail. Acknowledgments Acknowledgments xix Introduction What s in This Book... xxii What Is Ethical Hacking?... xxiii Penetration Testing... xxiii Military and Espionage... xxiii Why Hackers Use Linux... xxiv Linux Is Open Source....

More information

Tanium Asset User Guide. Version 1.3.1

Tanium Asset User Guide. Version 1.3.1 Tanium Asset User Guide Version 1.3.1 June 12, 2018 The information in this document is subject to change without notice. Further, the information provided in this document is provided as is and is believed

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!  We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 1Y0-400 Title : Designing Citrix XenDesktop 7 Solutions Exam Vendor : Citrix

More information

Topics - System Administration for Glovia

Topics - System Administration for Glovia Topics - System Administration for Glovia 1. Network Architecture Sample Network 2. glovia.com Technology Architecture Application Server Database Server Web Server 3. Operating System Architecture High

More information

Talend Open Studio for MDM Web User Interface. User Guide 5.6.2

Talend Open Studio for MDM Web User Interface. User Guide 5.6.2 Talend Open Studio for MDM Web User Interface User Guide 5.6.2 Talend Open Studio for MDM Web User Interface Adapted for v5.6.2. Supersedes previous releases. Publication date: May 12, 2015 Copyleft This

More information

Linux Systems Security. Logging and Network Monitoring NETS1028 Fall 2016

Linux Systems Security. Logging and Network Monitoring NETS1028 Fall 2016 Linux Systems Security Logging and Network Monitoring NETS1028 Fall 2016 Monitoring Monitoring can take many forms, from passive periodic inspection to realtime intrusion detection For this unit, we will

More information

Version 3.3 System Administrator Guide

Version 3.3 System Administrator Guide Version 3.3 System Administrator Guide This document provides information Ensemble Video System Administrators can use to design and implement an appropriate Ensemble Video organizational framework, manage

More information

COL100 Lab 2. I semester Week 2, Open the web-browser and visit the page and visit the COL100 course page.

COL100 Lab 2. I semester Week 2, Open the web-browser and visit the page   and visit the COL100 course page. COL100 Lab 2 I semester 2017-18 Week 2, 2017 Objective More familiarisation with Linux and its standard commands Part 1 1. Login to your system and open a terminal window. 2. Open the web-browser and visit

More information

Saving and Restoring the System on the Fast Internet Computers CFS-249 December 15, 2004

Saving and Restoring the System on the Fast Internet Computers CFS-249 December 15, 2004 Saving and Restoring the System on the Fast Internet Computers CFS-249 December 15, 2004 David Dunthorn www.c-f-systems.com Comment This is a long document to describe what really turns out to be a simple

More information

Unix Internal Assessment-2 solution. Ans:There are two ways of starting a job in the background with the shell s & operator and the nohup command.

Unix Internal Assessment-2 solution. Ans:There are two ways of starting a job in the background with the shell s & operator and the nohup command. Unix Internal Assessment-2 solution 1 a.explain the mechanism of process creation. Ans: There are three distinct phases in the creation of a process and uses three important system calls viz., fork, exec,

More information

EECS 3221 Operating System Fundamentals

EECS 3221 Operating System Fundamentals EECS 3221 Operating System Fundamentals Instructor: Prof. Hui Jiang Email: hj@cse.yorku.ca Web: http://www.eecs.yorku.ca/course/3221 General Info 3 lecture hours each week 2 assignments (2*5%=10%) 1 project

More information

EECS 3221 Operating System Fundamentals

EECS 3221 Operating System Fundamentals General Info EECS 3221 Operating System Fundamentals Instructor: Prof. Hui Jiang Email: hj@cse.yorku.ca Web: http://www.eecs.yorku.ca/course/3221 3 lecture hours each week 2 assignments (2*5%=10%) 1 project

More information