User & Groups, Permissions and Printing
|
|
- Karen Day
- 5 years ago
- Views:
Transcription
1 nit 7 ser & roups, ermissions and rinting DW DW
2 opics for this nit sers and groups inux ermissions inux rinting DW DW
3 sers and roups DW DW
4 oot is the superuser which means root is the system administrator oot s home directory is located at /root ll other user home directories are located at /home DW DW
5 ser asswords ocated in /etc/passwd Consists of seven fields username password (encrypted) D (user id) D (group id) comment home directory shell DW DW
6 hadow asswords ocated in the /etc/shadow file hadow file is an encrypted version of the user password from the /etc/passwd file sers with an * in the password field are system users sers with!! n the password field must have a valid password to login the system DW DW
7 ser ccount arameters ocated in the /etc/login.defs Contains the default values to use when creating user accounts such as inimum - maximum password age inimum - - maximum values for D inimum - maximum values for D Whether or not to create a home directory, etc DW DW
8 Default nvironment Files ocated in the /etc/skel Directory hese files are copied to the user s home directory such as.bash_logout.bash_profile.bashrc.emacs.gtkrc.kde.gnome, etc. DW DW
9 useradd Creates new users and modifies existing users -d name creates the user home dir if other than the default -D creates new settings for the default account -e date sets an expiration date -g name adds user to the group -m -k skel-dir copies group template configuration and script files -n turns off creating each user as a separate group -s shell allows you to set the shell for the user DW DW
10 ser Creation rocess 1. useradd gets the default account values from /etc/login.defs 2. arses the command line to see what default values should be overwritten 3. Creates new entry in both /etc/passwd and /etc/shadow 4. Creates group entry in /etc/group 5. Creates the user home directory in the /home directory 6. Copies files from the /etc/skel directory to the new user s home directory DW DW
11 emoving sers se the userdel command se linuxconf dit the /etc/passwd file se the user manager in nome DW DW
12 Creating roups se groupadd command yntax groupadd g [D] [groupname] groupadd g 900 nt41 tored in the /etc/group file ssigned a roup D (D) Can assign users to a group using the usermod command yntax usermod [groupname] [username] usermod nt41 newguy DW DW
13 su command he substitute user allows you to run a shell as a different user without changing the directory you are in yntax su - username witches -, -l, --login makes it a login shell -m preserves environment ote: if no username is given, the root user is assumed DW DW
14 Wheel roup special group that can be used to assign administrative privileges to specific users and restrict just anyone from using the su command Create the wheel group dd users who need administrative permissions Change ownership of the /bin/su program to the wheel group chgrp wheel /bin/su chmod 4750 /bin/su DW DW
15 ser nformation id command displays user and group information yntax id or id username (no argument displays current user) finger command displays detailed information yntax finger or finger username who or who am i displays the users currently logged in yntax who argument or who am i DW DW
16 Virtual erminals ach login shell is identified as a different device by the system and is treated as a virtual terminal se alt+f1 to view the first virtual terminal, lt+f2, etc to view each succeeding terminal DW DW
17 Host ames very machine has a FQD (fully Qualified Domain ame) that consist of the hostname plus the domain name he default hostname is localhost he default domain name is localdomain herefore the default FQD is localhost.localdomain DW DW
18 ermissions DW DW
19 inux File ermissions efers to the type of access that a user has to a file or directory here are three file permissions ead (r) read a file Write (w) allows user to write to, add, or change files xecute (x) allows user to execute programs DW DW
20 ermission ssignment ser (u) means the owner of the file roup (g) means a group of users that the owner belongs to ther (o) means everyone else who are not the owner or a member of the group assigned permission to this object DW DW
21 File ermissions umerical method ead = 4 Write = 2 xecute = 1 o can use the following syntax chmod 74- means user rwxr----- DW DW
22 File ermissions Components ser D (D)- user identification assigned by the administrator to track user actions roup D (D) - group identification used to identify groups the user belongs to ticky bit - prevents users from removing files from public directories that they don t own. DW DW
23 ermissions File permissions Directory permissions r = read r = list contents w = write w = add/delete files x = execute x = cd to directory - = permission denied - = permission denied DW DW
24 ine permission bits are associated with each file and directory owner group other s rights rights rights xample File ermissions -rwxrwxr-- 1 myid Feb 02 20:36 grades.nd14 DW DW
25 File Directory Default ermissions rw-r--r rwxr-xr-x DW DW
26 he ticky Bit f a directory is writable and has the sticky bit set, files within that directory can be deleted or renamed f the user owns the file he user owns the directory he file is writable by the user he user is root DW DW
27 File ermissions Commands id command lists user id and group id chmod command changes access rights chown command changes ownership chgrp command changes group DW DW
28 umask command umask allows you to change the default file and directory permissions. fter changing with umask, all new files and directories will have the new default permissions he umask command has no effect on existing files DW DW
29 etting ermissions raphically se file manager ight click and open properties Can set permissions by checking proper box in the proper column Can also change the owner and the group DW DW
30 rinting DW DW
31 inux rinting rchitecture he lpr command prepares files to be sent to the printer rint job a file submitted for printing via the lpr command rint Filter a script used by the lpr program to prepare files to be sent to a printer DW DW
32 inux rinting rchitecture dministrative utilities that are programs used by the system administrator to manage Files that have been printed or are in the process of being printed he printer definition file (printcap) he status of each printer DW DW
33 inux rinting rchitecture Block pecial File refers to a physical device that transfers data in blocks of characters, such as a parallel port or hard disk storage. ormally located in /dev Character pecial File refers to a physical device such as a serial port that transfers data in single characters DW DW
34 ser prints a document cupsd.conf File rint rocess rint Filter formats the document cupsd sends print job to print device rint job created Job spooled to print queue (rint pool Directory) rint device creates a hard copy of the document DW DW
35 oad Balancing Cupsd daemon load balances by default if a single queue is connected to several physical print devices he term printer actually refers to the print queue rather than the physical print device his is similar to printer pooling in windows 2008 DW DW
36 rinter Queues everal printer queues can all point to the same physical print device llows a method of directing jobs requiring different forms to be sent to the same print device r segregating different types of jobs lpstat checks the state of the queue cancel cancel a job DW DW
37 he ole of rint Filters inux uses special programs that prepare data for printing ou have complete control over the operation of these programs DW DW
38 Driver oftware program that provides abstract services for a hardware component such as opening files or reading character input inux drivers are stored in a ppdfile DW DW
39 rinter anguages age Description anguage special set of codes that determine graphic elements, text font, and everything else about what appears on the page ost widely used are ostscript developed by dobe rinter Control anguage C developed by Hewlett-ackard DW DW
40 rint Filter script that contains instructions for formatting all documents for a specific printer using the page description language that the printer queue requires sed by the lpr program to prepare files to be sent to a physical printer arely as powerful as a driver because it provides no access to the advanced features of the printer agic Filter automatically processes a file into the correct output format based on the file's type DW DW
41 rinter Filter rograms wo common print filters _gshost cript _enscript ormally stored in the usr/share/zsh/4.3.10/functions different filter is defined for each print queue DW DW
42 rint olicies rinter olicy is a brief document that describes how print resources can be used and how the management of the printers will be conducted within an organization ddresses who can print, where, when, etc. ets up maintenance schedules ssigns responsibility to re-supply the printers DW DW
43 cupsd.conf ntry he printer definition file used by the inux printing system pecifies how and where files to be printed are stored and processed by lpr and cupsd Can be edited in any test editor or by using one of the graphical utilities provided with the inux distribution eneral format consists of a printer name, followed by a series of two-character option codes that apply to the printer with the option separated by two colons DW DW
44 sing the C tility 1. he inux printer control utility that lets you control the actions of the cupsd daemon specify how print jobs are accepted and processed 2. rovides functionality that is not available with most graphical utilities such as prevent any jobs from entering a print queue, cancel a print job while it is being printed, pause the print queue or check the status of all printers DW DW
45 sing the C tility ou can include an lpc command as a parameter on the command line (lpc status) or you can use lpc in an interactive mode in which you can enter multiple commands he default printer is the first printer listed in the cups file arameter all can be used to affect all printers or a name to effect only specific printers DW DW
46 rinter ptions ocal rinter attached to local machine emote remote server that uses the lpd daemon to print users jobs B/Windows 95/ rinter B does not use lpd daemon etware rinter (C) connected to a etware server on the network and uses the C protocol DW DW
47 rinter ool llows you to automatically create complex print filters for many popular printers with the Configure Filter dialog box he tool automatically updates the cups file reducing the chance of making typing or syntax errors Don t need to restart your cupsd daemon but it is usually a good idea to do it DW DW
48 How lpr elects the rinter 1. f the option is used with the lpr command, the job is sent to that printer 2. f the option is not used and an environmental variable exists for the user printing the file, the job is sent to the printer listed in the printer variable 3. f neither is present, then the printer named in the default_printer line in lpd.conf is used 4. therwise, the first printer in the printcap file is used DW DW
49 inux vs icrosoft rinting inux printing provides very few options rimarily allows direct printing with the lpr command or another command such as enscript and the choice of the selection or the entire document pplications can provide further options for printing but it is still limited compared to what windows users are accustomed to DW DW
50 anaging rinting etting up and enabling the printer Keeping printers stocked with paper, toner, ribbons, ink Clearing paper jams Keeping the printer online racking print jobs in the print queues DW DW
51 racking rint Jobs inux includes both command line and graphical utilities s usual there are some tasks that can only be done at the command line he lpq utility provides status, owner, class (priority), job number, file size and the time the print job was submitted DW DW
52 lpq ptions -s displays a shorter format Can add a job D to the lpq command - to view jobs in a specific print queue se lprm job_id to delete a print job from the queue dash can delete all of the jobs in a queue lprm printer_name - DW DW
53 rint ccounting eports se the pac (print accounting) command to display reports based on the accounting data f you use the af option in the printcap file, each print job creates a print accounting entry in the file specified by the af option -m combines all of the user s job from all servers into a single listing se the user s D to see all accounting information for a single user DW DW
54 raphical tilities he klpq program part of the KD desktop Can remove jobs Can select the print queue to view When queuing box is checked new jobs can be sent to the queue Checking printing allows jobs to be sent to lpd daemon DW DW
55 emote rinting ittle configuration required to connect the lpd daemon on one inux box to the lpd daemon on another box and transfer a print job for remote printing systems useing the lpd daemon can accept print jobs from a inux system and vice versa eeds the print queue name, hostname or ip address of the remote computer dd these to printcap to the rp and rm options or define a new print queue for the remote printer DW DW
56 rocessing a emote rint Job he print job is not passed through a filter until it reaches the lpd program on the remote system nce a print jon has been submitted to a remote system, the local lpd daemon has nothing to do with it ust have a user account on the remote system o restrict user from using a remote printer default settings must be changed in the printcap or lpd.perms file DW DW
57 rinting o etwork rinters Bounce Queue (bq) is an option code in the printcap file that causes print jobs to be processed by the print filter before being sent to a remote printer Designed especially for printers connected directly to the network Bq lexmark DW DW
58 rinting o on-inux ystems special printer daemon can be used by other operating systems along with F to enable printing he amba uite of pplications must be installed and configured to print to a printer connected to a windows based computer rovides B protocol support to inux so that files and printers can be shared between inux and Windows systems DW DW
59 ab 7 dd users at both the command line and the dd the users to a group et the users password Configure a dummy printer Configure a network printer DW DW
Lab 2A> ADDING USERS in Linux
Lab 2A> ADDING USERS in Linux Objective In this lab, student will learn how to create user accounts using the Linux operating system. Scenario The XYZ Company has just installed a server running Linux.
More informationOperating Systems Lab 1 (Users, Groups, and Security)
Operating Systems Lab 1 (Users, Groups, and Security) Overview This chapter covers the most common commands related to users, groups, and security. It will also discuss topics like account creation/deletion,
More informationCSE 265: System and Network Administration
CSE 265: System and Network Administration User accounts The /etc/passwd file The /etc/shadow file Root powers Ownership of files and processes The superuser The /etc/group file Adding users Removing users
More informationUNIT 2. Internet Information Server
UIT 2 Internet Information erver Topics in this Unit xamine the features in II7 reate web site content Install, configure an II site ublish an II Web site onfigure web site security The Internet The Internet
More informationChapter 5: User Management. Chapter 5 User Management
Chapter 5: User Management Chapter 5 User Management Last revised: 20/6/2004 Chapter 5 Outline In this chapter we will learn Where user and group account information is stored How to manage user accounts
More informationCST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management
Student Name: YOUR NAME Lab Section: 011 012 013 or 014 Linux User and Group Management 1 Due Date - Upload to Blackboard by 8:30am Monday April 2, 2012 Submit the completed lab to Blackboard following
More informationIMPORTANT: Logging Off LOGGING IN
These are a few basic Unix commands compiled from Unix web sites, and printed materials. The main purpose is to help a beginner to go around with fewer difficulties. Therefore, I will be adding to this
More informationRH-202. RedHat. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs)
RedHat RH-202 Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) Download Full Version : https://killexams.com/pass4sure/exam-detail/rh-202 QUESTION: 159 Install the dialog-* Questions asking
More informationUser Management. René Serral-Gracià Xavier Martorell-Bofill 1. May 26, Universitat Politècnica de Catalunya (UPC)
User Management René Serral-Gracià Xavier Martorell-Bofill 1 1 Universitat Politècnica de Catalunya (UPC) May 26, 2014 Lectures 1 System administration introduction 2 Operating System installation 3 User
More informationCourse 144 Supplementary Materials. UNIX Fundamentals
Course 144 Supplementary Materials UNIX Fundamentals 1 Background to UNIX Command Fundamentals This appendix provides a overview of critical commands and concepts Prerequisite knowledge attendees should
More informationMore Linux Shell Scripts
nit 5 ore Linux hell cripts opics for this nit ore shell commands Control statements Constraints xpressions elect command Case command unning hell cripts shell script as a standalone is an executable program
More informationChapter 8: Security under Linux
Chapter 8: Security under Linux 8.1 File and Password security Linux security may be divided into two major parts: a) Password security b) File security 8.1.1 Password security To connect to a Linux system
More informationUser accounts and authorization
User accounts and authorization Authentication vs authorization Authentication: proving the identity of someone Authorization: allowing a user to access certain resources 1 Government authorization documents
More information5/8/2012. Encryption-based Protection. Protection based on Access Permission (Contd) File Security, Setting and Using Permissions Chapter 9
File Security, Setting and Using Permissions Chapter 9 To show the three protection and security mechanisms that UNIX provides To describe the types of users of a UNIX file To discuss the basic operations
More informationManaging & Supporting Windows XP
UI 9 Managing & Supporting Windows X Definitions User - individual granted access to the system roups - logical collection of users Accounts - ogical construct containing all information that defines a
More informationMANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG
MANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG Terminals and keyboards have no uniform behavioral pattern. Terminal settings directly impact the keyboard operation.
More informationHands-on Keyboard: Cyber Experiments for Strategists and Policy Makers
Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Review of the Linux File System and Linux Commands 1. Introduction Becoming adept at using the Linux OS requires gaining familiarity
More informationIntroduction to Active Directory
UT ntroduction to Active irectory 5-1 Topics for this Unit irectory ervices Active irectory Forests omains rganizational Units Groups A features ites Accounts 5-1 irectory ervice A directory service is
More informationCST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management
Student Name: Lab Section: Linux User and Group Management 1 Due Date - Upload to Blackboard by 8:30am Monday April 2, 2012 Submit the completed lab to Blackboard following the Rules for submitting Online
More informationMTU Computer Structure
1 MTU Computer Structure Home directory: h drive Same for Suns & PC s Location to store files Organize files by creating appropriate directories (folders) Subdirectory - any directory within in another
More informationUNIT V. Dr.T.Logeswari. Unix Shell Programming - Forouzan
UNIT V UNIX SYSTEM COMMUNICATION Dr.T.Logeswari 1 Electronic mail or email is easiest way of communication on unix. Fast and cheap Used to exchange graphics, sound and video files 2 3 Elements of a communication
More informationUsers, Groups and Permission in Linux
Users, Groups and Permission in Linux A small company is using Linux as the main operating and has hired you as a consultant. You completed a site walk through and also met with various individuals for
More informationThe kernel is the low-level software that manages hardware, multitasks programs, etc.
November 2011 1 Why Use Linux? Save Money Initial purchase and maintenance Resume Linux is used by MANY organizations More choices Tons of Linux operating systems November 2011 2 What is Linux? 1. Contains
More informationUser & Group Administration
User & Group Administration David Morgan Users useradd/userdel /home/ /etc/passwd is the user database /etc/shadow has passwords (relocated from passwd) /etc/group whoami su / sudo / SUID process
More informationProcesses are subjects.
Identification and Authentication Access Control Other security related things: Devices, mounting filesystems Search path Race conditions NOTE: filenames may differ between OS/distributions Principals
More informationProcesses are subjects.
Identification and Authentication Access Control Other security related things: Devices, mounting filesystems Search path TCP wrappers Race conditions NOTE: filenames may differ between OS/distributions
More informationFiles (review) and Regular Expressions. Todd Kelley CST8207 Todd Kelley 1
Files (review) and Regular Expressions Todd Kelley kelleyt@algonquincollege.com CST8207 Todd Kelley 1 midterms (Feb 11 and April 1) Files and Permissions Regular Expressions 2 Sobel, Chapter 6 160_pathnames.html
More informationCompTIA Exam LX0-102 Linux Part 2 Version: 10.0 [ Total Questions: 177 ]
s@lm@n CompTIA Exam LX0-102 Linux Part 2 Version: 10.0 [ Total Questions: 177 ] CompTIA LX0-102 : Practice Test Topic break down Topic No. of Questions Topic 1: Volume A 60 Topic 2: Volume B 59 Topic 3:
More informationFile Properties and Permissions
File Properties and Permissions Managing File Access in Linux Peter Perry July 2009 What is it about? Open a shell (terminal) and type ls -l You get quite a bit of information about each file. Tonight,
More informationread: permitted to read the contents of directory ( view files and sub-directories in that directory ).
File permissions Three file permissions:- read: permitted to read the contents of file. write: permitted to write to the file. execute: permitted to execute the file as a program/script. Three directory
More informationUNIX/Linux Auditing. Baccam Consulting, LLC Training Events
UNIX/Linux Auditing Baccam Consulting, LLC tanya@securityaudits.org Training Events www.securityaudits.org/events.html ***CISSP Course being offered April 25-April 29, 2016 Copyright 2005-2016, Baccam
More informationCSE 390a Lecture 3. Multi-user systems; remote login; editors; users/groups; permissions
CSE 390a Lecture 3 Multi-user systems; remote login; editors; users/groups; permissions slides created by Marty Stepp, modified by Jessica Miller and Ruth Anderson http://www.cs.washington.edu/390a/ 1
More informationAN INTRODUCTION TO UNIX
AN INTRODUCTION TO UNIX Paul Johnson School of Mathematics September 18, 2011 OUTLINE 1 INTRODUTION Unix Common Tasks 2 THE UNIX FILESYSTEM Moving around Copying, deleting File Permissions 3 SUMMARY OUTLINE
More informationHP-UX System Administration
HP-UX System Administration This intensive course is designed for experienced UNIX administrators who like to understand the differences between HP-UX and standard UNIX. It is essential that students have
More information5. UNIX/Linux Environment
5. This chapter will explain how to print using LPD and FTP in a UNIX/Linux environment. This chapter contains examples; please refer to the manual of the workstation for specific details. Before proceeding,
More informationUsers Manual SX2. 2. Register this product host name and IP address to /etc/hosts file.
5. This chapter will explain how to print using LPD and FTP in a UNIX/Linux environment. This chapter contains examples; please refer to the manual of the workstation for specific details. Before proceeding,
More informationProject #3: Implementing NIS
Project #3: Implementing NIS NIS Daemons Limitations of NIS How We Will Use NIS NIS Domain Name NIS Software Setting Up NIS on it20 /etc/nsswitch.conf Creating New Accounts on Ubuntu /etc/passwd /etc/shadow
More informationCS/CIS 249 SP18 - Intro to Information Security
Lab assignment CS/CIS 249 SP18 - Intro to Information Security Lab #2 - UNIX/Linux Access Controls, version 1.2 A typed document is required for this assignment. You must type the questions and your responses
More informationRedHat. Rh202. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs)
RedHat Rh202 Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) http://killexams.com/exam-detail/rh202 QUESTION: 156 Who ever creates the files/directories on /data group owner should be automatically
More informationCST8207: GNU/Linux Operating Systems I Lab Six Linux File System Permissions. Linux File System Permissions (modes) - Part 1
Student Name: Lab Section: Linux File System Permissions (modes) - Part 1 Due Date - Upload to Blackboard by 8:30am Monday March 12, 2012 Submit the completed lab to Blackboard following the Rules for
More informationUnit 1. Application Servers
Unit 1 pplication ervers DW DW Donna. Warren ducation ccounting B lectrical ngineering M omputer cience Work xperience 8 years as etwork ngineer and owner of a small IT consulting company 7 years as networking
More informationSystem Administration
User and Group Management All processes on the system run under by a user. Users can be collected into groups which can be given common attributes Users and groups are represented by the system using unique
More informationTEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 1.0, Last Edited 09/20/2005 Name of Students: Date of Experiment: Part I: Objective The objective of the exercises
More informationFiery EXP6000/EXP5000 Color Server SERVER & CONTROLLER SOLUTIONS. Printing from UNIX
Fiery EXP6000/EXP5000 Color Server SERVER & CONTROLLER SOLUTIONS Printing from UNIX 2005 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product.
More informationOutline. UNIX security ideas Users and groups File protection Setting temporary privileges. Examples. Permission bits Program language components
UNIX security Ulf Larson (modified by Erland Jonsson/Magnus Almgren) Computer security group Dept. of Computer Science and Engineering Chalmers University of Technology, Sweden Outline UNIX security ideas
More information10 userdel: deleting a user account 9. 1 Context Tune the user environment and system environment variables [3]
1. Context 1.111.1 2 8 Deleting a group 8 1.111.1 Manage users and group accounts and related system files Weight 4 Outline Contents Linux Professional Institute Certification 102 Nick Urbanik
More informationCase Studies in Access Control
Joint software development Mail 1 / 38 Situations Roles Permissions Why Enforce Access Controls? Unix Setup Windows ACL Setup Reviewer/Tester Access Medium-Size Group Basic Structure Version Control Systems
More informationSANJAY GHODAWAT POLYTECHNIC
EXPERIMENT NO. 01 Name of Experiment Implement following commands with their options: ps and kill. df and du mount and umount. (4 Hours) Prerequisite of. / execution of Basic knowledge about linux command.
More informationSystem Administration and Networking
System Administration and Networking Topics 1. System Administration 1 2. System Administration 2 3. Managing Directories & Files 4. Networking & Integrating Linux with the MS Infrastructure Samba Wireless
More informationLinux Essentials Objectives Topics:
Linux Essentials Linux Essentials is a professional development certificate program that covers basic knowledge for those working and studying Open Source and various distributions of Linux. Exam Objectives
More informationN Unit 1. Introduction to Fedora Linux
nit 1 ntroduction to Fedora Linux opics for this nit Definition of an operating system History and development of Linux he L (eneral ublic License) Version umbers Linux Features Comparison of Linux with
More informationBasic File Attributes
Basic File Attributes The UNIX file system allows the user to access other files not belonging to them and without infringing on security. A file has a number of attributes (properties) that are stored
More informationIntroduction to Unix May 24, 2008
Introduction to Unix May 24, 2008 Exercises: Privileges REFERENCE Reference: Shah, Steve, "Linux Administration: A Beginner's Guide", 2nd. ed., Osborne press, New York, NY. If you look at files in a directory
More informationUsers Manual SX. 5. Using PRICOM in UNIX/Linux Environment
5. This chapter explains how to configure PRICOM in UNIX/Linux environment and how to print using LPD and FTP. For further information not covered in this manual, refer to the manual of workstation you
More informationAnswers to Even- Numbered Exercises
Answers to Even- 17 Numbered Exercises from page 1077 1. What option should you use with fsck if you want to review the status of your filesystems without making any changes to them? How does fsck determine
More informationCSE 390a Lecture 4. Persistent shell settings; users/groups; permissions
CSE 390a Lecture 4 Persistent shell settings; users/groups; permissions slides created by Marty Stepp, modified by Jessica Miller and Ruth Anderson http://www.cs.washington.edu/390a/ 1 2 Lecture summary
More informationPermission and Ownership
Permission and Ownership 1. Understanding file and directory ownership Every file on your Linux system, including directories, is owned by a specific user and group. Therefore, file permissions are defined
More informationCSE 390a Lecture 4. Persistent shell settings; users/groups; permissions
CSE 390a Lecture 4 Persistent shell settings; users/groups; permissions slides created by Marty Stepp, modified by Jessica Miller and Ruth Anderson http://www.cs.washington.edu/390a/ 1 2 Lecture summary
More informationOperating systems fundamentals - B10
Operating systems fundamentals - B10 David Kendall Northumbria University David Kendall (Northumbria University) Operating systems fundamentals - B10 1 / 12 Introduction Basics of protection and security
More informationRH033 Red Hat Linux Essentials
RH033 Red Hat Linux Essentials Version 3.5 QUESTION NO: 1 You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. A printer is configured on the network. You want to
More informationLPR for Windows 95/98/Me/2000 TCP/IP Printing User s Guide
LPR for Windows 95/98/Me/2000 TCP/IP Printing User s Guide Rev. 02 (August, 2001) Copyright Statement Trademarks Copyright 1997 No part of this publication may be reproduced in any form or by any means
More informationIntroduction to Linux (Part I) BUPT/QMUL 2018/03/14
Introduction to Linux (Part I) BUPT/QMUL 2018/03/14 Contents 1. Background on Linux 2. Starting / Finishing 3. Typing Linux Commands 4. Commands to Use Right Away 5. Linux help continued 2 Contents 6.
More informationUNIX Quick Reference
UNIX Quick Reference This card represents a brief summary of some of the more frequently used UNIX commands that all users should be at least somewhat familiar with. Some commands listed have much more
More informationCSE/ISE 311: Systems Administra5on Access Control and Processes
Access Control and Processes Por$ons courtesy Ellen Liu Outline Access control Tradi$onal UNIX access control File system access control; File permissions, Some commands; The root account Modern access
More informationbash startup files Linux/Unix files stty Todd Kelley CST8207 Todd Kelley 1
bash startup files Linux/Unix files stty Todd Kelley kelleyt@algonquincollege.com CST8207 Todd Kelley 1 midterms (Feb 27 and April 10) bash startup files More Linux Files review stty 2 We customize our
More informationLab Authentication, Authorization, and Accounting
Objectives Given a scenario, select the appropriate authentication, authorization, or access control Install and configure security controls when performing account management, based on best practices
More informationExercise Sheet 2. (Classifications of Operating Systems)
Exercise Sheet 2 Exercise 1 (Classifications of Operating Systems) 1. At any given moment, only a single program can be executed. What is the technical term for this operation mode? 2. What are half multi-user
More informationcommandname flags arguments
Unix Review, additional Unix commands CS101, Mock Introduction This handout/lecture reviews some basic UNIX commands that you should know how to use. A more detailed description of this and other commands
More informationUNIX Quick Reference
UNIX Quick Reference Charles Duan FAS Computer Services August 26, 2002 1 Command Reference Many of these commands have many more options than the ones displayed here. Most also take the option h or help,
More informationUpdating The Operating System & User Accounts
U Updating he perating ystem & User Accounts P PAG YM UPA Update A minor revision to a software product, usually intended to address specific performance issues rather than add new features Upgrade A major
More informationIntroduction to Linux
Introduction to Linux Mukesh Pund Principal Scientist, NISCAIR, New Delhi, India History In 1969, a team of developers developed a new operating system called Unix which was written using C Linus Torvalds,
More informationThe table below lists the domains measured by this examination and the extent to which they are represented in the examination.
Introduction The Linux+ Certification is designed to measure the competencies of the Linux Professional with six to twelve months experience with the Linux operating system. This person provides basic
More informationOxford University Computing Services. Getting Started with Unix
Oxford University Computing Services Getting Started with Unix Unix c3.1/2 Typographical Conventions Listed below are the typographical conventions used in this guide. Names of keys on the keyboard are
More informationUser Accounts. The Passwd, Group, and Shadow Files
User Accounts The Passwd, Group, and Shadow Files We'll start with the passwd (pronounced "password") file, located at /etc/passwd. This file holds information about all of the user accounts on the system.
More informationNETW 110 Lab 5 Creating and Assigning Users and Groups Page 1
NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1 Objective At the conclusion of this lab, the student will be able to add and delete users, create and assign users to groups, and assign users
More informationPermissions and Links
Permissions and Links The root account Setuid and Setgid Permissions Setting Setuid and Setgid with chmod Directory Access Permissions Links o Two Types of Links o The ln command o Removing a link The
More informationCase Study: Access Control. Steven M. Bellovin October 4,
Case Study: Access Control Steven M. Bellovin October 4, 2015 1 Case Studies in Access Control Joint software development Mail Steven M. Bellovin October 4, 2015 2 Situations Small team on a single machine
More informationCommands are in black
Starting From the Shell Prompt (Terminal) Commands are in black / +--------+---------+-------+---------+---------+------ +------ +------ +------ +------ +------ +-- Bin boot dev etc home media sbin bin
More informationPrivileges: who can control what
Privileges: who can control what Introduction to Unix May 24, 2008, Morocco Hervey Allen Goal Understand the following: The Unix security model How a program is allowed to run Where user and group information
More informationExam Linux-Praxis - 1 ( From )
Exam Linux-Praxis - 1 ( From http://www.linux-praxis.de ) (1)Which of the following commands results in mailing the content of the current directory to Bob? A. mail Bob < ls B. ls > mail Bob C. ls mail
More informationGetting Started. Running Utilities. Shells. Special Characters. Special Characters. Chapter 2 Unix Utilities for non-programmers
Chapter 2 Unix Utilities for non-programmers Graham Glass and King Ables, UNIX for Programmers and Users, Third Edition, Pearson Prentice Hall, 2003. Original Notes by Raj Sunderraman Converted to presentation
More informationOn successful completion of the course, the students will be able to attain CO: Experiment linked. 2 to 4. 5 to 8. 9 to 12.
CIE- 25 Marks Government of Karnataka Department of Technical Education Bengaluru Course Title: Linux Lab Scheme (L:T:P) : 0:2:4 Total Contact Hours: 78 Type of Course: Tutorial, Practical s & Student
More informationChapter 8: Implementing and Managing Printers
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 8: Implementing and Managing Printers Objectives Understand Windows Server 2003 printing terms and concepts
More informationBasic File Attributes
Basic File Attributes The UNIX file system allows the user to access other files not belonging to them and without infringing on security. A file has a number of attributes (properties) that are stored
More informationPrint Server. Quick Configuration Guide. Network Connectivity for Printers
Print Server Quick Configuration Guide Network Connectivity for Printers 1 Features The DPO NIC enables printers to communicate over an Ethernet network with many different network operating systems, including
More informationUser Management. lctseng
User Management lctseng ID User ID, Group ID % id lctseng uid=10554(lctseng) gid=1130(cs) groups=1130(cs),0(wheel),2000(taever),2012(security) % id 10047 Same as above Super user (defined by uid = 0) root
More informationLevelOne FPS-9021/FPS User Manual. Mini Printer Server w/parallel (USB2.0) Port V
LevelOne FPS-9021/FPS-9022 Mini Printer Server w/parallel (USB2.0) Port User Manual V1.0.0-0601 CONTENTS 1. INTRODUCTION...1 1.1 Product Introduction... 2 1.2 Product Package... 3 1.3 Network Printing
More informationBasic UNIX system administration
Basic UNIX system administration CS 2204 Class meeting 14 *Notes by Doug Bowman and other members of the CS faculty at Virginia Tech. Copyright 2001-2003. System administration Thus far, we ve only discussed:
More informationUsers and Groups. his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and UNIX groups.
cameron.book Page 19 Monday, June 30, 2003 8:51 AM C H A P T E R 4 Users and Groups T his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and
More informationUnix Filesystem. January 26 th, 2004 Class Meeting 2
Unix Filesystem January 26 th, 2004 Class Meeting 2 * Notes adapted by Christian Allgood from previous work by other members of the CS faculty at Virginia Tech Unix Filesystem! The filesystem is your interface
More informationSiemens PLM Software. HEEDS MDO Setting up a Windows-to- Linux Compute Resource.
Siemens PLM Software HEEDS MDO 2018.04 Setting up a Windows-to- Linux Compute Resource www.redcedartech.com. Contents Introduction 1 On Remote Machine B 2 Installing the SSH Server 2 Configuring the SSH
More informationOperating system security
Operating system security Tuomas Aura T-110.4206 Information security technology Aalto University, autumn 2011 Outline Access control models in operating systems: 1. Unix 2. Windows Acknowledgements: This
More informationThe Microsoft Windows. User Interface
U 7 he icrosoft Windows User nterface he Desktop nterface Desktop tart button askbar otification and system ray area Desktop Components tart button Contains access menus to applications, data folders,
More informationOPERATING SYSTEMS LINUX
OPERATING SYSTEMS LINUX Božo Krstajić, PhD, University of Montenegro Podgorica bozok@cg.ac.yu Process management Linux operating systems work with processes. Basically a process consists of program code
More informationConfiguring and Managing WAAS Print Services
13 CHAPTER This chapter describes how to configure and manage the WAAS print services feature that allows Edge WAEs to function as print servers in your branch offices. Note Throughout this chapter, the
More informationCS246 Spring14 Programming Paradigm Notes on Linux
1 Unix History 1965: Researchers from Bell Labs and other organizations begin work on Multics, a state-of-the-art interactive, multi-user operating system. 1969: Bell Labs researchers, losing hope for
More informationNetworks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003
Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003 In Windows NT server, the user manager for domains is the primary administrative tool for managing user accounts,
More informationLinux Kung-Fu. James Droste UBNetDef Fall 2016
Linux Kung-Fu James Droste UBNetDef Fall 2016 $ init 1 GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org
More informationComputer Center, CS, NCTU
User Management Adding New Users ID User ID, Group ID % id liuyh uid=10047(liuyh) gid=200(dcs) groups=200(dcs),0(wheel),700(ta),800(security),888(wwwadm) % id 10047 Super user root uid=10047(liuyh) gid=200(dcs)
More informationCS Fundamentals of Programming II Fall Very Basic UNIX
CS 215 - Fundamentals of Programming II Fall 2012 - Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the CS (Project) Lab (KC-265)
More information