User & Groups, Permissions and Printing

Size: px
Start display at page:

Download "User & Groups, Permissions and Printing"

Transcription

1 nit 7 ser & roups, ermissions and rinting DW DW

2 opics for this nit sers and groups inux ermissions inux rinting DW DW

3 sers and roups DW DW

4 oot is the superuser which means root is the system administrator oot s home directory is located at /root ll other user home directories are located at /home DW DW

5 ser asswords ocated in /etc/passwd Consists of seven fields username password (encrypted) D (user id) D (group id) comment home directory shell DW DW

6 hadow asswords ocated in the /etc/shadow file hadow file is an encrypted version of the user password from the /etc/passwd file sers with an * in the password field are system users sers with!! n the password field must have a valid password to login the system DW DW

7 ser ccount arameters ocated in the /etc/login.defs Contains the default values to use when creating user accounts such as inimum - maximum password age inimum - - maximum values for D inimum - maximum values for D Whether or not to create a home directory, etc DW DW

8 Default nvironment Files ocated in the /etc/skel Directory hese files are copied to the user s home directory such as.bash_logout.bash_profile.bashrc.emacs.gtkrc.kde.gnome, etc. DW DW

9 useradd Creates new users and modifies existing users -d name creates the user home dir if other than the default -D creates new settings for the default account -e date sets an expiration date -g name adds user to the group -m -k skel-dir copies group template configuration and script files -n turns off creating each user as a separate group -s shell allows you to set the shell for the user DW DW

10 ser Creation rocess 1. useradd gets the default account values from /etc/login.defs 2. arses the command line to see what default values should be overwritten 3. Creates new entry in both /etc/passwd and /etc/shadow 4. Creates group entry in /etc/group 5. Creates the user home directory in the /home directory 6. Copies files from the /etc/skel directory to the new user s home directory DW DW

11 emoving sers se the userdel command se linuxconf dit the /etc/passwd file se the user manager in nome DW DW

12 Creating roups se groupadd command yntax groupadd g [D] [groupname] groupadd g 900 nt41 tored in the /etc/group file ssigned a roup D (D) Can assign users to a group using the usermod command yntax usermod [groupname] [username] usermod nt41 newguy DW DW

13 su command he substitute user allows you to run a shell as a different user without changing the directory you are in yntax su - username witches -, -l, --login makes it a login shell -m preserves environment ote: if no username is given, the root user is assumed DW DW

14 Wheel roup special group that can be used to assign administrative privileges to specific users and restrict just anyone from using the su command Create the wheel group dd users who need administrative permissions Change ownership of the /bin/su program to the wheel group chgrp wheel /bin/su chmod 4750 /bin/su DW DW

15 ser nformation id command displays user and group information yntax id or id username (no argument displays current user) finger command displays detailed information yntax finger or finger username who or who am i displays the users currently logged in yntax who argument or who am i DW DW

16 Virtual erminals ach login shell is identified as a different device by the system and is treated as a virtual terminal se alt+f1 to view the first virtual terminal, lt+f2, etc to view each succeeding terminal DW DW

17 Host ames very machine has a FQD (fully Qualified Domain ame) that consist of the hostname plus the domain name he default hostname is localhost he default domain name is localdomain herefore the default FQD is localhost.localdomain DW DW

18 ermissions DW DW

19 inux File ermissions efers to the type of access that a user has to a file or directory here are three file permissions ead (r) read a file Write (w) allows user to write to, add, or change files xecute (x) allows user to execute programs DW DW

20 ermission ssignment ser (u) means the owner of the file roup (g) means a group of users that the owner belongs to ther (o) means everyone else who are not the owner or a member of the group assigned permission to this object DW DW

21 File ermissions umerical method ead = 4 Write = 2 xecute = 1 o can use the following syntax chmod 74- means user rwxr----- DW DW

22 File ermissions Components ser D (D)- user identification assigned by the administrator to track user actions roup D (D) - group identification used to identify groups the user belongs to ticky bit - prevents users from removing files from public directories that they don t own. DW DW

23 ermissions File permissions Directory permissions r = read r = list contents w = write w = add/delete files x = execute x = cd to directory - = permission denied - = permission denied DW DW

24 ine permission bits are associated with each file and directory owner group other s rights rights rights xample File ermissions -rwxrwxr-- 1 myid Feb 02 20:36 grades.nd14 DW DW

25 File Directory Default ermissions rw-r--r rwxr-xr-x DW DW

26 he ticky Bit f a directory is writable and has the sticky bit set, files within that directory can be deleted or renamed f the user owns the file he user owns the directory he file is writable by the user he user is root DW DW

27 File ermissions Commands id command lists user id and group id chmod command changes access rights chown command changes ownership chgrp command changes group DW DW

28 umask command umask allows you to change the default file and directory permissions. fter changing with umask, all new files and directories will have the new default permissions he umask command has no effect on existing files DW DW

29 etting ermissions raphically se file manager ight click and open properties Can set permissions by checking proper box in the proper column Can also change the owner and the group DW DW

30 rinting DW DW

31 inux rinting rchitecture he lpr command prepares files to be sent to the printer rint job a file submitted for printing via the lpr command rint Filter a script used by the lpr program to prepare files to be sent to a printer DW DW

32 inux rinting rchitecture dministrative utilities that are programs used by the system administrator to manage Files that have been printed or are in the process of being printed he printer definition file (printcap) he status of each printer DW DW

33 inux rinting rchitecture Block pecial File refers to a physical device that transfers data in blocks of characters, such as a parallel port or hard disk storage. ormally located in /dev Character pecial File refers to a physical device such as a serial port that transfers data in single characters DW DW

34 ser prints a document cupsd.conf File rint rocess rint Filter formats the document cupsd sends print job to print device rint job created Job spooled to print queue (rint pool Directory) rint device creates a hard copy of the document DW DW

35 oad Balancing Cupsd daemon load balances by default if a single queue is connected to several physical print devices he term printer actually refers to the print queue rather than the physical print device his is similar to printer pooling in windows 2008 DW DW

36 rinter Queues everal printer queues can all point to the same physical print device llows a method of directing jobs requiring different forms to be sent to the same print device r segregating different types of jobs lpstat checks the state of the queue cancel cancel a job DW DW

37 he ole of rint Filters inux uses special programs that prepare data for printing ou have complete control over the operation of these programs DW DW

38 Driver oftware program that provides abstract services for a hardware component such as opening files or reading character input inux drivers are stored in a ppdfile DW DW

39 rinter anguages age Description anguage special set of codes that determine graphic elements, text font, and everything else about what appears on the page ost widely used are ostscript developed by dobe rinter Control anguage C developed by Hewlett-ackard DW DW

40 rint Filter script that contains instructions for formatting all documents for a specific printer using the page description language that the printer queue requires sed by the lpr program to prepare files to be sent to a physical printer arely as powerful as a driver because it provides no access to the advanced features of the printer agic Filter automatically processes a file into the correct output format based on the file's type DW DW

41 rinter Filter rograms wo common print filters _gshost cript _enscript ormally stored in the usr/share/zsh/4.3.10/functions different filter is defined for each print queue DW DW

42 rint olicies rinter olicy is a brief document that describes how print resources can be used and how the management of the printers will be conducted within an organization ddresses who can print, where, when, etc. ets up maintenance schedules ssigns responsibility to re-supply the printers DW DW

43 cupsd.conf ntry he printer definition file used by the inux printing system pecifies how and where files to be printed are stored and processed by lpr and cupsd Can be edited in any test editor or by using one of the graphical utilities provided with the inux distribution eneral format consists of a printer name, followed by a series of two-character option codes that apply to the printer with the option separated by two colons DW DW

44 sing the C tility 1. he inux printer control utility that lets you control the actions of the cupsd daemon specify how print jobs are accepted and processed 2. rovides functionality that is not available with most graphical utilities such as prevent any jobs from entering a print queue, cancel a print job while it is being printed, pause the print queue or check the status of all printers DW DW

45 sing the C tility ou can include an lpc command as a parameter on the command line (lpc status) or you can use lpc in an interactive mode in which you can enter multiple commands he default printer is the first printer listed in the cups file arameter all can be used to affect all printers or a name to effect only specific printers DW DW

46 rinter ptions ocal rinter attached to local machine emote remote server that uses the lpd daemon to print users jobs B/Windows 95/ rinter B does not use lpd daemon etware rinter (C) connected to a etware server on the network and uses the C protocol DW DW

47 rinter ool llows you to automatically create complex print filters for many popular printers with the Configure Filter dialog box he tool automatically updates the cups file reducing the chance of making typing or syntax errors Don t need to restart your cupsd daemon but it is usually a good idea to do it DW DW

48 How lpr elects the rinter 1. f the option is used with the lpr command, the job is sent to that printer 2. f the option is not used and an environmental variable exists for the user printing the file, the job is sent to the printer listed in the printer variable 3. f neither is present, then the printer named in the default_printer line in lpd.conf is used 4. therwise, the first printer in the printcap file is used DW DW

49 inux vs icrosoft rinting inux printing provides very few options rimarily allows direct printing with the lpr command or another command such as enscript and the choice of the selection or the entire document pplications can provide further options for printing but it is still limited compared to what windows users are accustomed to DW DW

50 anaging rinting etting up and enabling the printer Keeping printers stocked with paper, toner, ribbons, ink Clearing paper jams Keeping the printer online racking print jobs in the print queues DW DW

51 racking rint Jobs inux includes both command line and graphical utilities s usual there are some tasks that can only be done at the command line he lpq utility provides status, owner, class (priority), job number, file size and the time the print job was submitted DW DW

52 lpq ptions -s displays a shorter format Can add a job D to the lpq command - to view jobs in a specific print queue se lprm job_id to delete a print job from the queue dash can delete all of the jobs in a queue lprm printer_name - DW DW

53 rint ccounting eports se the pac (print accounting) command to display reports based on the accounting data f you use the af option in the printcap file, each print job creates a print accounting entry in the file specified by the af option -m combines all of the user s job from all servers into a single listing se the user s D to see all accounting information for a single user DW DW

54 raphical tilities he klpq program part of the KD desktop Can remove jobs Can select the print queue to view When queuing box is checked new jobs can be sent to the queue Checking printing allows jobs to be sent to lpd daemon DW DW

55 emote rinting ittle configuration required to connect the lpd daemon on one inux box to the lpd daemon on another box and transfer a print job for remote printing systems useing the lpd daemon can accept print jobs from a inux system and vice versa eeds the print queue name, hostname or ip address of the remote computer dd these to printcap to the rp and rm options or define a new print queue for the remote printer DW DW

56 rocessing a emote rint Job he print job is not passed through a filter until it reaches the lpd program on the remote system nce a print jon has been submitted to a remote system, the local lpd daemon has nothing to do with it ust have a user account on the remote system o restrict user from using a remote printer default settings must be changed in the printcap or lpd.perms file DW DW

57 rinting o etwork rinters Bounce Queue (bq) is an option code in the printcap file that causes print jobs to be processed by the print filter before being sent to a remote printer Designed especially for printers connected directly to the network Bq lexmark DW DW

58 rinting o on-inux ystems special printer daemon can be used by other operating systems along with F to enable printing he amba uite of pplications must be installed and configured to print to a printer connected to a windows based computer rovides B protocol support to inux so that files and printers can be shared between inux and Windows systems DW DW

59 ab 7 dd users at both the command line and the dd the users to a group et the users password Configure a dummy printer Configure a network printer DW DW

Lab 2A> ADDING USERS in Linux

Lab 2A> ADDING USERS in Linux Lab 2A> ADDING USERS in Linux Objective In this lab, student will learn how to create user accounts using the Linux operating system. Scenario The XYZ Company has just installed a server running Linux.

More information

Operating Systems Lab 1 (Users, Groups, and Security)

Operating Systems Lab 1 (Users, Groups, and Security) Operating Systems Lab 1 (Users, Groups, and Security) Overview This chapter covers the most common commands related to users, groups, and security. It will also discuss topics like account creation/deletion,

More information

CSE 265: System and Network Administration

CSE 265: System and Network Administration CSE 265: System and Network Administration User accounts The /etc/passwd file The /etc/shadow file Root powers Ownership of files and processes The superuser The /etc/group file Adding users Removing users

More information

UNIT 2. Internet Information Server

UNIT 2. Internet Information Server UIT 2 Internet Information erver Topics in this Unit xamine the features in II7 reate web site content Install, configure an II site ublish an II Web site onfigure web site security The Internet The Internet

More information

Chapter 5: User Management. Chapter 5 User Management

Chapter 5: User Management. Chapter 5 User Management Chapter 5: User Management Chapter 5 User Management Last revised: 20/6/2004 Chapter 5 Outline In this chapter we will learn Where user and group account information is stored How to manage user accounts

More information

CST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management

CST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management Student Name: YOUR NAME Lab Section: 011 012 013 or 014 Linux User and Group Management 1 Due Date - Upload to Blackboard by 8:30am Monday April 2, 2012 Submit the completed lab to Blackboard following

More information

IMPORTANT: Logging Off LOGGING IN

IMPORTANT: Logging Off LOGGING IN These are a few basic Unix commands compiled from Unix web sites, and printed materials. The main purpose is to help a beginner to go around with fewer difficulties. Therefore, I will be adding to this

More information

RH-202. RedHat. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs)

RH-202. RedHat. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) RedHat RH-202 Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) Download Full Version : https://killexams.com/pass4sure/exam-detail/rh-202 QUESTION: 159 Install the dialog-* Questions asking

More information

User Management. René Serral-Gracià Xavier Martorell-Bofill 1. May 26, Universitat Politècnica de Catalunya (UPC)

User Management. René Serral-Gracià Xavier Martorell-Bofill 1. May 26, Universitat Politècnica de Catalunya (UPC) User Management René Serral-Gracià Xavier Martorell-Bofill 1 1 Universitat Politècnica de Catalunya (UPC) May 26, 2014 Lectures 1 System administration introduction 2 Operating System installation 3 User

More information

Course 144 Supplementary Materials. UNIX Fundamentals

Course 144 Supplementary Materials. UNIX Fundamentals Course 144 Supplementary Materials UNIX Fundamentals 1 Background to UNIX Command Fundamentals This appendix provides a overview of critical commands and concepts Prerequisite knowledge attendees should

More information

More Linux Shell Scripts

More Linux Shell Scripts nit 5 ore Linux hell cripts opics for this nit ore shell commands Control statements Constraints xpressions elect command Case command unning hell cripts shell script as a standalone is an executable program

More information

Chapter 8: Security under Linux

Chapter 8: Security under Linux Chapter 8: Security under Linux 8.1 File and Password security Linux security may be divided into two major parts: a) Password security b) File security 8.1.1 Password security To connect to a Linux system

More information

User accounts and authorization

User accounts and authorization User accounts and authorization Authentication vs authorization Authentication: proving the identity of someone Authorization: allowing a user to access certain resources 1 Government authorization documents

More information

5/8/2012. Encryption-based Protection. Protection based on Access Permission (Contd) File Security, Setting and Using Permissions Chapter 9

5/8/2012. Encryption-based Protection. Protection based on Access Permission (Contd) File Security, Setting and Using Permissions Chapter 9 File Security, Setting and Using Permissions Chapter 9 To show the three protection and security mechanisms that UNIX provides To describe the types of users of a UNIX file To discuss the basic operations

More information

Managing & Supporting Windows XP

Managing & Supporting Windows XP UI 9 Managing & Supporting Windows X Definitions User - individual granted access to the system roups - logical collection of users Accounts - ogical construct containing all information that defines a

More information

MANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG

MANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG MANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG Terminals and keyboards have no uniform behavioral pattern. Terminal settings directly impact the keyboard operation.

More information

Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers

Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers Review of the Linux File System and Linux Commands 1. Introduction Becoming adept at using the Linux OS requires gaining familiarity

More information

Introduction to Active Directory

Introduction to Active Directory UT ntroduction to Active irectory 5-1 Topics for this Unit irectory ervices Active irectory Forests omains rganizational Units Groups A features ites Accounts 5-1 irectory ervice A directory service is

More information

CST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management

CST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management Student Name: Lab Section: Linux User and Group Management 1 Due Date - Upload to Blackboard by 8:30am Monday April 2, 2012 Submit the completed lab to Blackboard following the Rules for submitting Online

More information

MTU Computer Structure

MTU Computer Structure 1 MTU Computer Structure Home directory: h drive Same for Suns & PC s Location to store files Organize files by creating appropriate directories (folders) Subdirectory - any directory within in another

More information

UNIT V. Dr.T.Logeswari. Unix Shell Programming - Forouzan

UNIT V. Dr.T.Logeswari. Unix Shell Programming - Forouzan UNIT V UNIX SYSTEM COMMUNICATION Dr.T.Logeswari 1 Electronic mail or email is easiest way of communication on unix. Fast and cheap Used to exchange graphics, sound and video files 2 3 Elements of a communication

More information

Users, Groups and Permission in Linux

Users, Groups and Permission in Linux Users, Groups and Permission in Linux A small company is using Linux as the main operating and has hired you as a consultant. You completed a site walk through and also met with various individuals for

More information

The kernel is the low-level software that manages hardware, multitasks programs, etc.

The kernel is the low-level software that manages hardware, multitasks programs, etc. November 2011 1 Why Use Linux? Save Money Initial purchase and maintenance Resume Linux is used by MANY organizations More choices Tons of Linux operating systems November 2011 2 What is Linux? 1. Contains

More information

User & Group Administration

User & Group Administration User & Group Administration David Morgan Users useradd/userdel /home/ /etc/passwd is the user database /etc/shadow has passwords (relocated from passwd) /etc/group whoami su / sudo / SUID process

More information

Processes are subjects.

Processes are subjects. Identification and Authentication Access Control Other security related things: Devices, mounting filesystems Search path Race conditions NOTE: filenames may differ between OS/distributions Principals

More information

Processes are subjects.

Processes are subjects. Identification and Authentication Access Control Other security related things: Devices, mounting filesystems Search path TCP wrappers Race conditions NOTE: filenames may differ between OS/distributions

More information

Files (review) and Regular Expressions. Todd Kelley CST8207 Todd Kelley 1

Files (review) and Regular Expressions. Todd Kelley CST8207 Todd Kelley 1 Files (review) and Regular Expressions Todd Kelley kelleyt@algonquincollege.com CST8207 Todd Kelley 1 midterms (Feb 11 and April 1) Files and Permissions Regular Expressions 2 Sobel, Chapter 6 160_pathnames.html

More information

CompTIA Exam LX0-102 Linux Part 2 Version: 10.0 [ Total Questions: 177 ]

CompTIA Exam LX0-102 Linux Part 2 Version: 10.0 [ Total Questions: 177 ] s@lm@n CompTIA Exam LX0-102 Linux Part 2 Version: 10.0 [ Total Questions: 177 ] CompTIA LX0-102 : Practice Test Topic break down Topic No. of Questions Topic 1: Volume A 60 Topic 2: Volume B 59 Topic 3:

More information

File Properties and Permissions

File Properties and Permissions File Properties and Permissions Managing File Access in Linux Peter Perry July 2009 What is it about? Open a shell (terminal) and type ls -l You get quite a bit of information about each file. Tonight,

More information

read: permitted to read the contents of directory ( view files and sub-directories in that directory ).

read: permitted to read the contents of directory ( view files and sub-directories in that directory ). File permissions Three file permissions:- read: permitted to read the contents of file. write: permitted to write to the file. execute: permitted to execute the file as a program/script. Three directory

More information

UNIX/Linux Auditing. Baccam Consulting, LLC Training Events

UNIX/Linux Auditing. Baccam Consulting, LLC Training Events UNIX/Linux Auditing Baccam Consulting, LLC tanya@securityaudits.org Training Events www.securityaudits.org/events.html ***CISSP Course being offered April 25-April 29, 2016 Copyright 2005-2016, Baccam

More information

CSE 390a Lecture 3. Multi-user systems; remote login; editors; users/groups; permissions

CSE 390a Lecture 3. Multi-user systems; remote login; editors; users/groups; permissions CSE 390a Lecture 3 Multi-user systems; remote login; editors; users/groups; permissions slides created by Marty Stepp, modified by Jessica Miller and Ruth Anderson http://www.cs.washington.edu/390a/ 1

More information

AN INTRODUCTION TO UNIX

AN INTRODUCTION TO UNIX AN INTRODUCTION TO UNIX Paul Johnson School of Mathematics September 18, 2011 OUTLINE 1 INTRODUTION Unix Common Tasks 2 THE UNIX FILESYSTEM Moving around Copying, deleting File Permissions 3 SUMMARY OUTLINE

More information

HP-UX System Administration

HP-UX System Administration HP-UX System Administration This intensive course is designed for experienced UNIX administrators who like to understand the differences between HP-UX and standard UNIX. It is essential that students have

More information

5. UNIX/Linux Environment

5. UNIX/Linux Environment 5. This chapter will explain how to print using LPD and FTP in a UNIX/Linux environment. This chapter contains examples; please refer to the manual of the workstation for specific details. Before proceeding,

More information

Users Manual SX2. 2. Register this product host name and IP address to /etc/hosts file.

Users Manual SX2. 2. Register this product host name and IP address to /etc/hosts file. 5. This chapter will explain how to print using LPD and FTP in a UNIX/Linux environment. This chapter contains examples; please refer to the manual of the workstation for specific details. Before proceeding,

More information

Project #3: Implementing NIS

Project #3: Implementing NIS Project #3: Implementing NIS NIS Daemons Limitations of NIS How We Will Use NIS NIS Domain Name NIS Software Setting Up NIS on it20 /etc/nsswitch.conf Creating New Accounts on Ubuntu /etc/passwd /etc/shadow

More information

CS/CIS 249 SP18 - Intro to Information Security

CS/CIS 249 SP18 - Intro to Information Security Lab assignment CS/CIS 249 SP18 - Intro to Information Security Lab #2 - UNIX/Linux Access Controls, version 1.2 A typed document is required for this assignment. You must type the questions and your responses

More information

RedHat. Rh202. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs)

RedHat. Rh202. Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) RedHat Rh202 Redhat Certified Technician on Redhat Enterprise Linux 4 (Labs) http://killexams.com/exam-detail/rh202 QUESTION: 156 Who ever creates the files/directories on /data group owner should be automatically

More information

CST8207: GNU/Linux Operating Systems I Lab Six Linux File System Permissions. Linux File System Permissions (modes) - Part 1

CST8207: GNU/Linux Operating Systems I Lab Six Linux File System Permissions. Linux File System Permissions (modes) - Part 1 Student Name: Lab Section: Linux File System Permissions (modes) - Part 1 Due Date - Upload to Blackboard by 8:30am Monday March 12, 2012 Submit the completed lab to Blackboard following the Rules for

More information

Unit 1. Application Servers

Unit 1. Application Servers Unit 1 pplication ervers DW DW Donna. Warren ducation ccounting B lectrical ngineering M omputer cience Work xperience 8 years as etwork ngineer and owner of a small IT consulting company 7 years as networking

More information

System Administration

System Administration User and Group Management All processes on the system run under by a user. Users can be collected into groups which can be given common attributes Users and groups are represented by the system using unique

More information

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 1.0, Last Edited 09/20/2005 Name of Students: Date of Experiment: Part I: Objective The objective of the exercises

More information

Fiery EXP6000/EXP5000 Color Server SERVER & CONTROLLER SOLUTIONS. Printing from UNIX

Fiery EXP6000/EXP5000 Color Server SERVER & CONTROLLER SOLUTIONS. Printing from UNIX Fiery EXP6000/EXP5000 Color Server SERVER & CONTROLLER SOLUTIONS Printing from UNIX 2005 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product.

More information

Outline. UNIX security ideas Users and groups File protection Setting temporary privileges. Examples. Permission bits Program language components

Outline. UNIX security ideas Users and groups File protection Setting temporary privileges. Examples. Permission bits Program language components UNIX security Ulf Larson (modified by Erland Jonsson/Magnus Almgren) Computer security group Dept. of Computer Science and Engineering Chalmers University of Technology, Sweden Outline UNIX security ideas

More information

10 userdel: deleting a user account 9. 1 Context Tune the user environment and system environment variables [3]

10 userdel: deleting a user account 9. 1 Context Tune the user environment and system environment variables [3] 1. Context 1.111.1 2 8 Deleting a group 8 1.111.1 Manage users and group accounts and related system files Weight 4 Outline Contents Linux Professional Institute Certification 102 Nick Urbanik

More information

Case Studies in Access Control

Case Studies in Access Control Joint software development Mail 1 / 38 Situations Roles Permissions Why Enforce Access Controls? Unix Setup Windows ACL Setup Reviewer/Tester Access Medium-Size Group Basic Structure Version Control Systems

More information

SANJAY GHODAWAT POLYTECHNIC

SANJAY GHODAWAT POLYTECHNIC EXPERIMENT NO. 01 Name of Experiment Implement following commands with their options: ps and kill. df and du mount and umount. (4 Hours) Prerequisite of. / execution of Basic knowledge about linux command.

More information

System Administration and Networking

System Administration and Networking System Administration and Networking Topics 1. System Administration 1 2. System Administration 2 3. Managing Directories & Files 4. Networking & Integrating Linux with the MS Infrastructure Samba Wireless

More information

Linux Essentials Objectives Topics:

Linux Essentials Objectives Topics: Linux Essentials Linux Essentials is a professional development certificate program that covers basic knowledge for those working and studying Open Source and various distributions of Linux. Exam Objectives

More information

N Unit 1. Introduction to Fedora Linux

N Unit 1. Introduction to Fedora Linux nit 1 ntroduction to Fedora Linux opics for this nit Definition of an operating system History and development of Linux he L (eneral ublic License) Version umbers Linux Features Comparison of Linux with

More information

Basic File Attributes

Basic File Attributes Basic File Attributes The UNIX file system allows the user to access other files not belonging to them and without infringing on security. A file has a number of attributes (properties) that are stored

More information

Introduction to Unix May 24, 2008

Introduction to Unix May 24, 2008 Introduction to Unix May 24, 2008 Exercises: Privileges REFERENCE Reference: Shah, Steve, "Linux Administration: A Beginner's Guide", 2nd. ed., Osborne press, New York, NY. If you look at files in a directory

More information

Users Manual SX. 5. Using PRICOM in UNIX/Linux Environment

Users Manual SX. 5. Using PRICOM in UNIX/Linux Environment 5. This chapter explains how to configure PRICOM in UNIX/Linux environment and how to print using LPD and FTP. For further information not covered in this manual, refer to the manual of workstation you

More information

Answers to Even- Numbered Exercises

Answers to Even- Numbered Exercises Answers to Even- 17 Numbered Exercises from page 1077 1. What option should you use with fsck if you want to review the status of your filesystems without making any changes to them? How does fsck determine

More information

CSE 390a Lecture 4. Persistent shell settings; users/groups; permissions

CSE 390a Lecture 4. Persistent shell settings; users/groups; permissions CSE 390a Lecture 4 Persistent shell settings; users/groups; permissions slides created by Marty Stepp, modified by Jessica Miller and Ruth Anderson http://www.cs.washington.edu/390a/ 1 2 Lecture summary

More information

Permission and Ownership

Permission and Ownership Permission and Ownership 1. Understanding file and directory ownership Every file on your Linux system, including directories, is owned by a specific user and group. Therefore, file permissions are defined

More information

CSE 390a Lecture 4. Persistent shell settings; users/groups; permissions

CSE 390a Lecture 4. Persistent shell settings; users/groups; permissions CSE 390a Lecture 4 Persistent shell settings; users/groups; permissions slides created by Marty Stepp, modified by Jessica Miller and Ruth Anderson http://www.cs.washington.edu/390a/ 1 2 Lecture summary

More information

Operating systems fundamentals - B10

Operating systems fundamentals - B10 Operating systems fundamentals - B10 David Kendall Northumbria University David Kendall (Northumbria University) Operating systems fundamentals - B10 1 / 12 Introduction Basics of protection and security

More information

RH033 Red Hat Linux Essentials

RH033 Red Hat Linux Essentials RH033 Red Hat Linux Essentials Version 3.5 QUESTION NO: 1 You work as a Network Administrator for McNeil Inc. The company has a Linux-based network. A printer is configured on the network. You want to

More information

LPR for Windows 95/98/Me/2000 TCP/IP Printing User s Guide

LPR for Windows 95/98/Me/2000 TCP/IP Printing User s Guide LPR for Windows 95/98/Me/2000 TCP/IP Printing User s Guide Rev. 02 (August, 2001) Copyright Statement Trademarks Copyright 1997 No part of this publication may be reproduced in any form or by any means

More information

Introduction to Linux (Part I) BUPT/QMUL 2018/03/14

Introduction to Linux (Part I) BUPT/QMUL 2018/03/14 Introduction to Linux (Part I) BUPT/QMUL 2018/03/14 Contents 1. Background on Linux 2. Starting / Finishing 3. Typing Linux Commands 4. Commands to Use Right Away 5. Linux help continued 2 Contents 6.

More information

UNIX Quick Reference

UNIX Quick Reference UNIX Quick Reference This card represents a brief summary of some of the more frequently used UNIX commands that all users should be at least somewhat familiar with. Some commands listed have much more

More information

CSE/ISE 311: Systems Administra5on Access Control and Processes

CSE/ISE 311: Systems Administra5on Access Control and Processes Access Control and Processes Por$ons courtesy Ellen Liu Outline Access control Tradi$onal UNIX access control File system access control; File permissions, Some commands; The root account Modern access

More information

bash startup files Linux/Unix files stty Todd Kelley CST8207 Todd Kelley 1

bash startup files Linux/Unix files stty Todd Kelley CST8207 Todd Kelley 1 bash startup files Linux/Unix files stty Todd Kelley kelleyt@algonquincollege.com CST8207 Todd Kelley 1 midterms (Feb 27 and April 10) bash startup files More Linux Files review stty 2 We customize our

More information

Lab Authentication, Authorization, and Accounting

Lab Authentication, Authorization, and Accounting Objectives Given a scenario, select the appropriate authentication, authorization, or access control Install and configure security controls when performing account management, based on best practices

More information

Exercise Sheet 2. (Classifications of Operating Systems)

Exercise Sheet 2. (Classifications of Operating Systems) Exercise Sheet 2 Exercise 1 (Classifications of Operating Systems) 1. At any given moment, only a single program can be executed. What is the technical term for this operation mode? 2. What are half multi-user

More information

commandname flags arguments

commandname flags arguments Unix Review, additional Unix commands CS101, Mock Introduction This handout/lecture reviews some basic UNIX commands that you should know how to use. A more detailed description of this and other commands

More information

UNIX Quick Reference

UNIX Quick Reference UNIX Quick Reference Charles Duan FAS Computer Services August 26, 2002 1 Command Reference Many of these commands have many more options than the ones displayed here. Most also take the option h or help,

More information

Updating The Operating System & User Accounts

Updating The Operating System & User Accounts U Updating he perating ystem & User Accounts P PAG YM UPA Update A minor revision to a software product, usually intended to address specific performance issues rather than add new features Upgrade A major

More information

Introduction to Linux

Introduction to Linux Introduction to Linux Mukesh Pund Principal Scientist, NISCAIR, New Delhi, India History In 1969, a team of developers developed a new operating system called Unix which was written using C Linus Torvalds,

More information

The table below lists the domains measured by this examination and the extent to which they are represented in the examination.

The table below lists the domains measured by this examination and the extent to which they are represented in the examination. Introduction The Linux+ Certification is designed to measure the competencies of the Linux Professional with six to twelve months experience with the Linux operating system. This person provides basic

More information

Oxford University Computing Services. Getting Started with Unix

Oxford University Computing Services. Getting Started with Unix Oxford University Computing Services Getting Started with Unix Unix c3.1/2 Typographical Conventions Listed below are the typographical conventions used in this guide. Names of keys on the keyboard are

More information

User Accounts. The Passwd, Group, and Shadow Files

User Accounts. The Passwd, Group, and Shadow Files User Accounts The Passwd, Group, and Shadow Files We'll start with the passwd (pronounced "password") file, located at /etc/passwd. This file holds information about all of the user accounts on the system.

More information

NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1

NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1 NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1 Objective At the conclusion of this lab, the student will be able to add and delete users, create and assign users to groups, and assign users

More information

Permissions and Links

Permissions and Links Permissions and Links The root account Setuid and Setgid Permissions Setting Setuid and Setgid with chmod Directory Access Permissions Links o Two Types of Links o The ln command o Removing a link The

More information

Case Study: Access Control. Steven M. Bellovin October 4,

Case Study: Access Control. Steven M. Bellovin October 4, Case Study: Access Control Steven M. Bellovin October 4, 2015 1 Case Studies in Access Control Joint software development Mail Steven M. Bellovin October 4, 2015 2 Situations Small team on a single machine

More information

Commands are in black

Commands are in black Starting From the Shell Prompt (Terminal) Commands are in black / +--------+---------+-------+---------+---------+------ +------ +------ +------ +------ +------ +-- Bin boot dev etc home media sbin bin

More information

Privileges: who can control what

Privileges: who can control what Privileges: who can control what Introduction to Unix May 24, 2008, Morocco Hervey Allen Goal Understand the following: The Unix security model How a program is allowed to run Where user and group information

More information

Exam Linux-Praxis - 1 ( From )

Exam Linux-Praxis - 1 ( From  ) Exam Linux-Praxis - 1 ( From http://www.linux-praxis.de ) (1)Which of the following commands results in mailing the content of the current directory to Bob? A. mail Bob < ls B. ls > mail Bob C. ls mail

More information

Getting Started. Running Utilities. Shells. Special Characters. Special Characters. Chapter 2 Unix Utilities for non-programmers

Getting Started. Running Utilities. Shells. Special Characters. Special Characters. Chapter 2 Unix Utilities for non-programmers Chapter 2 Unix Utilities for non-programmers Graham Glass and King Ables, UNIX for Programmers and Users, Third Edition, Pearson Prentice Hall, 2003. Original Notes by Raj Sunderraman Converted to presentation

More information

On successful completion of the course, the students will be able to attain CO: Experiment linked. 2 to 4. 5 to 8. 9 to 12.

On successful completion of the course, the students will be able to attain CO: Experiment linked. 2 to 4. 5 to 8. 9 to 12. CIE- 25 Marks Government of Karnataka Department of Technical Education Bengaluru Course Title: Linux Lab Scheme (L:T:P) : 0:2:4 Total Contact Hours: 78 Type of Course: Tutorial, Practical s & Student

More information

Chapter 8: Implementing and Managing Printers

Chapter 8: Implementing and Managing Printers 70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 8: Implementing and Managing Printers Objectives Understand Windows Server 2003 printing terms and concepts

More information

Basic File Attributes

Basic File Attributes Basic File Attributes The UNIX file system allows the user to access other files not belonging to them and without infringing on security. A file has a number of attributes (properties) that are stored

More information

Print Server. Quick Configuration Guide. Network Connectivity for Printers

Print Server. Quick Configuration Guide. Network Connectivity for Printers Print Server Quick Configuration Guide Network Connectivity for Printers 1 Features The DPO NIC enables printers to communicate over an Ethernet network with many different network operating systems, including

More information

User Management. lctseng

User Management. lctseng User Management lctseng ID User ID, Group ID % id lctseng uid=10554(lctseng) gid=1130(cs) groups=1130(cs),0(wheel),2000(taever),2012(security) % id 10047 Same as above Super user (defined by uid = 0) root

More information

LevelOne FPS-9021/FPS User Manual. Mini Printer Server w/parallel (USB2.0) Port V

LevelOne FPS-9021/FPS User Manual. Mini Printer Server w/parallel (USB2.0) Port V LevelOne FPS-9021/FPS-9022 Mini Printer Server w/parallel (USB2.0) Port User Manual V1.0.0-0601 CONTENTS 1. INTRODUCTION...1 1.1 Product Introduction... 2 1.2 Product Package... 3 1.3 Network Printing

More information

Basic UNIX system administration

Basic UNIX system administration Basic UNIX system administration CS 2204 Class meeting 14 *Notes by Doug Bowman and other members of the CS faculty at Virginia Tech. Copyright 2001-2003. System administration Thus far, we ve only discussed:

More information

Users and Groups. his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and UNIX groups.

Users and Groups. his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and UNIX groups. cameron.book Page 19 Monday, June 30, 2003 8:51 AM C H A P T E R 4 Users and Groups T his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and

More information

Unix Filesystem. January 26 th, 2004 Class Meeting 2

Unix Filesystem. January 26 th, 2004 Class Meeting 2 Unix Filesystem January 26 th, 2004 Class Meeting 2 * Notes adapted by Christian Allgood from previous work by other members of the CS faculty at Virginia Tech Unix Filesystem! The filesystem is your interface

More information

Siemens PLM Software. HEEDS MDO Setting up a Windows-to- Linux Compute Resource.

Siemens PLM Software. HEEDS MDO Setting up a Windows-to- Linux Compute Resource. Siemens PLM Software HEEDS MDO 2018.04 Setting up a Windows-to- Linux Compute Resource www.redcedartech.com. Contents Introduction 1 On Remote Machine B 2 Installing the SSH Server 2 Configuring the SSH

More information

Operating system security

Operating system security Operating system security Tuomas Aura T-110.4206 Information security technology Aalto University, autumn 2011 Outline Access control models in operating systems: 1. Unix 2. Windows Acknowledgements: This

More information

The Microsoft Windows. User Interface

The Microsoft Windows. User Interface U 7 he icrosoft Windows User nterface he Desktop nterface Desktop tart button askbar otification and system ray area Desktop Components tart button Contains access menus to applications, data folders,

More information

OPERATING SYSTEMS LINUX

OPERATING SYSTEMS LINUX OPERATING SYSTEMS LINUX Božo Krstajić, PhD, University of Montenegro Podgorica bozok@cg.ac.yu Process management Linux operating systems work with processes. Basically a process consists of program code

More information

Configuring and Managing WAAS Print Services

Configuring and Managing WAAS Print Services 13 CHAPTER This chapter describes how to configure and manage the WAAS print services feature that allows Edge WAEs to function as print servers in your branch offices. Note Throughout this chapter, the

More information

CS246 Spring14 Programming Paradigm Notes on Linux

CS246 Spring14 Programming Paradigm Notes on Linux 1 Unix History 1965: Researchers from Bell Labs and other organizations begin work on Multics, a state-of-the-art interactive, multi-user operating system. 1969: Bell Labs researchers, losing hope for

More information

Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003

Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003 Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003 In Windows NT server, the user manager for domains is the primary administrative tool for managing user accounts,

More information

Linux Kung-Fu. James Droste UBNetDef Fall 2016

Linux Kung-Fu. James Droste UBNetDef Fall 2016 Linux Kung-Fu James Droste UBNetDef Fall 2016 $ init 1 GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org

More information

Computer Center, CS, NCTU

Computer Center, CS, NCTU User Management Adding New Users ID User ID, Group ID % id liuyh uid=10047(liuyh) gid=200(dcs) groups=200(dcs),0(wheel),700(ta),800(security),888(wwwadm) % id 10047 Super user root uid=10047(liuyh) gid=200(dcs)

More information

CS Fundamentals of Programming II Fall Very Basic UNIX

CS Fundamentals of Programming II Fall Very Basic UNIX CS 215 - Fundamentals of Programming II Fall 2012 - Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the CS (Project) Lab (KC-265)

More information