NETW 110 Lab 3 Post-Installation Configuration Page 1
|
|
- Curtis Hines
- 6 years ago
- Views:
Transcription
1 NETW 110 Lab 3 Post-Installation Configuration Page 1 Objective At the conclusion of this lab, the student will learn some very basic functions of vi, use vi to perform some post-installation configuration duties, and upload and download files using ftp. Finally, you will properly shutdown and reboot Linux. Getting Help You can get help on any command, its syntax, and all options from the man pages. For some basic information on vi, see the handout on editors. Journal Assignment From the man pages and online search, write down information, instructions, and options with respect to UNIX and LINUX for the following commands and definitions: Linux/UNIX runlevels Linux/UNIX boot loaders grub lilo Linux/UNIX change virtual terminals vi inittab ps shutdown reboot halt Overview When we install hardware and software, some configuration files need to be modified. These configuration files are ASCII text files, which are opened in a text editor, modified, and saved. When we are working at the CLI, the typical text editor for Linux/UNIX is vi (which has been replaced by vim). If you have never used vi, see the handout. Now we will practice some very basic editing functions using vi, but first we must download a text file. Based on our installation configuration, Fedora will boot into the GUI (Graphical User Interface or X). Throughout this course, we perform most of our configuration assignments from the CLI (Command Line Interface also know as the text mode). When X is running, there are two ways to get to the CLI quickly. 1. We can start a virtual terminal session in a new Window. To do this: CL on Applications => Highlight System Tools CL on Terminal 2. There are seven shell based Virtual Terminal (VT) sessions (also called Virtual Console sessions). These sessions are accessed by pressing CTRL-ALT-F1 through CTRL-ALT-F6, and one GUI VT, which is accessed by pressing CTRL-ALT-F7. You can start a process that will take a long time in one session, and perform a different function by changing to a different VT. NOTE: During this course, we will configure Linux to boot into the CLI. When Linux boots to the CLI, the session is represented by the F1 key. If you start X from the CLI, F1 will not give you a command prompt until the X session is terminated. If you change to the F1 session, you will see some text on the display that represents the functions that Linux performed to start the X session, and at the bottom of the display, you will probably see a blinking underline. If you press the enter key, it merely inserts a blank line. You should change to a different VT, or change back to the X session.
2 NETW 110 Lab 3 Post-Installation Configuration Page 2 Virtual Terminals In a UNIX/Linux system, you have only one keyboard (terminal), but you have up to six virtual terminals named tty1 through tty6 that operate in the text mode, and tty7, which is the GUI mode. When you system starts in the CLI, you are logging in and operating in tty1. Each virtual terminal uses about 8KB of kernel memory. If this matters, it is easy to allocate fewer virtual terminals. In the Linux 2.4 kernel, virtual terminals are created on demand, so not starting mingetty on the virtual terminal will not create the virtual terminal. mingetty is designed to be a minimal getty for the virtual terminals on the workstation's monitor and keyboard. It has no support for serial lines. If the machine does not have a video card then remove all the mingetty entries from /etc/inittab. The six mingetty s are created in your inittab file with the lines: # Run gettys in standard runlevels 1:2345:respawn:/sbin/mingetty tty1 2:2345:respawn:/sbin/mingetty tty2 3:2345:respawn:/sbin/mingetty tty3 4:2345:respawn:/sbin/mingetty tty4 5:2345:respawn:/sbin/mingetty tty5 6:2345:respawn:/sbin/mingetty tty6 By pressing a function key F1 through F6 with CRTL-ALT, you are changing to the virtual terminal that corresponds to the number of the function key (F1 through F6 starts tty1 through tty6 respectively) When you are operating in X, you can also perform tasks at the CLI by opening a terminal window in X by CL on Red Hat Applications, CL on System Tools, CL on Terminal You can start a new virtual terminal at the CLI by pressing CTRL-ALT-F2 This started tty2, and you will now receive a standard login prompt. You can now login as any user for which you have logon privileges. When you startx, the CLI prompt and cursor in tty1 is no longer present as a process is running, and you are operating in tty7, the first terminal device after the six text consoles. You can logout of a virtual terminal by entering the command exit. The system login prompt returns. You can now change to any other virtual terminal. If you opened a virtual terminal and X is running, you can return to X by pressing CTRL-ALT-F7 Procedure Using a Text Editor 1. Boot Linux and login with your general user account. Make a directory in your /home/username called lab02 with the command mkdir lab02 Make a directory in /home/username called lab03 with the command mkdir lab03 2. Start a browser, the web browser. Open the NETW110 website on the class server by entering the address Place the mouse over the link for text.txt and CR From the menu, CL on Save Link Target As Save the file in your /home/username directory as text.txt 3. Start a Virtual Terminal session in a new window by:
3 NETW 110 Lab 3 Post-Installation Configuration Page 3 CL on Applications Highlight System Tools CL on Terminal Enter the command vi text.txt There are six lines of text similar to the following: The name of this file is text.txt When you type ussing an edior, you may often make a mistoke that you have to correct. vi will allow you to correct the the problem, get rid of the bad stuff, and make your life easy. This is the first line of the text. As you can see, there are a number of typographical errors. Change to the insert mode and make the following corrections: Line Error Correction 2 using misspelled delete one s 2 edior misspelled editor insert a t between the i and the o 2 two spaces between the comma and before you delete the extra space 3 mistoke mistake 4 the the delete extra the We have finished with the corrections. Now we will make some changes. Move to the last line of text, change to the command mode, and press dd Move to the first line of the file and press p Copy the first six lines to the buffer (from the first line press 6yy ) Create 10 blank lines at the end of the file and Paste the buffer contents. Save the file as editor.txt and exit View the contents of the file cat editor.txt If the file is correct, copy the file to the lab03 directory with the command: cp editor.txt lab03/. Note: the destination filename in the previous line is lab03 slash dot with no spaces. If this gives you a problem, use cp editor.txt lab03/editor.txt Assigning root privileges to your general user account. Login as root Change to the /etc directory Enter the command visudo The contents of the screen is similar to the following: # sudoers file. # # This file MUST be edited with the 'visudo' command as root. # # See the sudoers man page for the details on how to write a sudoers file. # # Host alias specification # User alias specification
4 NETW 110 Lab 3 Post-Installation Configuration Page 4 # Cmnd alias specification # Defaults specification # User privilege specification root ALL=(ALL) ALL # Uncomment to allow people in group wheel to run all commands # %wheel ALL=(ALL) ALL # Same thing without a password # %wheel ALL=(ALL) NOPASSWD: ALL # Samples # %users ALL=/sbin/mount /cdrom,/sbin/umount /cdrom # %users localhost=/sbin/shutdown -h now Press I. Move to the end of the line that states root ALL=(ALL) ALL Press enter and add the following line yourusername ALL=(ALL) ALL where yourusername is your general username. Press Escape, write and quit. Copy the file /etc/sudoers to /home/lab03/sudoers motd When users login in, you can display a message. It is called the message of the day (even though it does not automatically change.) It is the same regardless of how a user logs in. The file is automatically created in /etc with the name motd when the OS is installed, but it is blank so no message is displayed. We will now modify the file. Since the original version of the file is blank, there is no need to make a backup copy. You must be logged in with root privileges. Login as the superuser with the command su, and enter the root password. Change to the /root directory. Copy the kickstart configuration file created anaconda when you installed Fedora with the command: cp anaconda-ks.cfg to /home/username/lab02/ks.cfg Change to the /etc directory Enter the command: vi motd Press i Press the enter key three times to insert 3 blank lines. Press the space bar 7 times and enter in the text Warning. Access to this system is limited to authorized users. Press the enter key and the spacebar until the cursor is directly under the space between the words Access and to and enter the text Trespassers will be persecuted! Press the enter key three times to insert 3 blank lines. Press ESC Write the changes and quit :wq Enter the command clear to clear the display and home the cursor View your motd by entering the command cat /etc/motd
5 NETW 110 Lab 3 Post-Installation Configuration Page 5 If the file is correct, copy the file /etc/motd to /home/username/lab03/. where username is your default username. Default Shell Settings Make sure that you have superuser privileges (login as su). Change to the /root directory Make a backup copy of.bash_profile to.bash_profile.orig Open.bash_profile in vi and change to the insert mode. Add :$HOME the PATH statement as follows: PATH=$PATH:$HOME:$HOME/bin Skip one blank line and add the statement umask 077 Go to the end of the file and add the following lines: alias dir='ls -la less' alias cls='clear' alias copy='cp' Change to the /etc/skel directory Make a backup copy of.bash_profile to.bash_profile.orig Open.bash_profile in vi and change to the insert mode. Add :$HOME the PATH statement as follows: PATH=$PATH:$HOME:$HOME/bin Skip one blank line and add the statement umask 002 Go to the end of the file and add the following lines: alias dir='ls -la less' alias cls='clear' alias copy='cp' Verify the file is correct, and copy the file /etc/skel/.bash_profile to /home/username/lab03/. where username is your default username. Default runlevel Currently, Fedora boots to the GUI (runlevel 5). We are going to change a file that will cause Fedora to boot to the CLI (runlevel 3). If you make an error editing this file, Fedora may not boot, so be careful. You must have superuser or root privileges to access this file. Make a backup copy of inittab to inittab.orig Open inittab in vi and change to the insert mode. Near the middle of the file, you will see a description of the 7 runlevels for Linux. The current default runlevel is 5 (X-WINDOWS). Below the runlevel list in inittab is the id command that looks like the following. id:5:initdefault: We wish to change the default runlevel from 5 to 3 (CLI). Modify this line to read id:3:initdefault:
6 NETW 110 Lab 3 Post-Installation Configuration Page 6 Write the file and quit. Verify the file was changed with the cat command. Verify the file is correct, and copy the file /etc/inittab to /home/username/lab03/. directory where username is your default username. Let us make sure everything is working properly. You should still have root privileges. At the system prompt, enter the command reboot You will see the CLI login prompt. Enter your regular username and password. The screen will now display the motd and your system prompt. Login with your general user account. Failure to boot after Changes made to files It is possible that a typo in one of the files that we just modified. It is also possible that we may not be able to login as root or su because we forgot the root password, or another su changed the password and did not tell us. In either case, we need to boot to runlevel 1 so we can fix the problems. We do this by interrupting the grub bootloader and force a boot to the single user mode (runlevel1). TO do this: Reboot or start the system. When you see the warning that you have 5 seconds to interrupt the boot process Press the Enter key Press e From the grub menu, press e Press the down arrow Press e From the end of the line press the backspace and delete rhgb quiet Type the text single and press the Enter key Press b After much text goes by, you are logged in as root without providing the password, and you should see the prompt sh-3.00# You can now perform any functions on any file that you would do under a normal boot. To change the root password, enter the command passwd If you could not boot due to a typo in a critical file and you made a backup copy before you edited the file, you can restore the original file by changing to the directory and copying the backup version of the file (we used the same filename and added a.orig extension at the end) over the original file. For example: cp filename.orig filename If asked do you wish to overwrite, say y or yes. When you are finished, you can boot to the default runlevel by pressing CTRL-D Final Steps The handout of using ftp from the CLI explains the procedure to use ftp to upload and download files. For now, we will just give you instructions to upload the files that you just created and modified. Your default login and password is your server name (ie login apple and password apple). You should change your password upon connection.
7 NETW 110 Lab 3 Post-Installation Configuration Page 7 Even though the files are in your username directory, they are owned by root since they were created and copied by su. In order for you to access them under your general username, you must change the ownership of the files. Make sure that you have su privileges. Change the ownership of all the files in the lab02 and lab03 directory (recursively) to your general username (ie apple:apple) chown R username:username /home/username/lab02 chown R username:username /home/username/lab03 You can now exit from su From the CLI, enter the command to connect to the class server using secure shell: ssh You will receive a server response The authenticity of host ' ( )' can't be established. RSA key fingerprint is 37:76:a4:6a:ad:88:84:7f:19:81:67:06:ca:cb:e2:03. Are you sure you want to continue connecting (yes/no)? Enter yes At the prompts for login and password, use your servername (apple) for both. Change your password to something appropriate by entering the command!passwd Close the ssh session with the command exit From the prompt, enter the command to connect to the class ftp server: ftp At the login prompt, use your servername (apple) for the login and your new password Your prompt is ftp> On the ftp server, make a directory named lab02 and lab03 Upload all the files from your /home/username/lab02/ directory to your lab02 directory on the server. (mput /home/username/lab02/ lab02/.) Upload all the files from your /home/username/lab03/ directory to your lab03 directory on the server. (mput /home/username/lab03/ lab03/.) Verify that all files were uploaded to the server. When you are finished, logoff with the command bye Shutdown from the CLI Note: In the lab, it is not necessary to shutdown the system at the end of class. However, you should logoff by entering the command exit After you exit, you will see a login prompt. In the real world, you should never remain logged on with root privileges. You should logoff by entering the command exit as soon as you have finished your tasks. After you exit, you should see your user prompt. For security reasons, anytime you plan to leave the area, you should exit even from you general user account. Once again, just enter the command exit Occasionally, it is necessary to shutdown the computer for routine maintenance. This could be a system backup, installation of new hardware, etc. You should be logged in at runlevel3 as a generaluser. Login as su since you will not be allowed to shutdown the server without root privileges. Enter the command shutdown r 15 to reboot in 15 minutes and send a broadcast message to all users. The message is similar to the following: Broadcast message from root (tty1) (Thu May 20 10:02: )
8 NETW 110 Lab 3 Post-Installation Configuration Page 8 The system is going DOWN for reboot in 15 minutes! Notice that you have no prompt. Press CTRL-C to abort the shutdown. You should receive the message Shutdown Cancelled, and the CLI prompt is back. If you use h instead of r, the system will shutdown and halt instead of reboot. If you use now instead of 15, the system would send a message and shutdown immediately. Any logged on users would loose their connection and perhaps files might be lost or corrupted. You might have some very angry users visit your office. To include your own message, you can enter the command: shutdown h 15 The system will be shutdown for routine maintenance for 3 hours. These will shutdown the system in 15 minutes and immediately send the broadcast message: Broadcast message from root (tty1) (Thu May 20 10:02: ) The system will be shutdown for routine maintenance for 3 hours. The system is going DOWN for system halt in 15 minutes! Every minute, a broadcast message informs all users how long until shutdown. Cancel the shutdown with the command CTRL-C You could type halt does the same thing as shutdown h now Also, you could enter the command init 0 To restart the system, you could type reboot, which is equivalent to shutdown r now. An appropriate broadcast message is displayed. You could also reboot using the command init 6 Both halt and reboot are all immediate commands. They send appropriate Broadcast messages, but do not give you a chance to change your mind. Finally, you can reboot by pressing CTRL-ALT-DEL (known as the Vulcan Neck Squeeze and the three finger salute), which is equivalent to shutdown r now
NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1
NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1 Objective At the conclusion of this lab, the student will be able to add and delete users, create and assign users to groups, and assign users
More informationLab 3a Using the vi editor
Lab 3a Using the vi editor Objectives: Become familiar with the vi Editor Review the three vi Modes Review keystrokes to move between vi modes Create a new file with vi Editor Invoke vi with show mode
More informationThis is Lab Worksheet 13 - not an Assignment. Boot Process and GRUB
This is Lab Worksheet 13 - not an Assignment This Lab Worksheet contains some practical examples that will prepare you to complete your Assignments. You do not have to hand in this Lab Worksheet. Make
More informationINTRODUCTION. NOTE Some symbols used in this manual CL = Click Left CR = Click Right DCL = Double Click Left = Enter. Page 1
INTRODUCTION OBJECTIVE The purpose of this manual is to provide the student with practical experience in the writing of assembly language programs, and give them background and instructions on how to use
More informationNETW 110 Lab 4 Using eth0 Configuration Mounting Drives and Devices Page 1
NETW 110 Lab 4 Using eth0 Configuration Mounting Drives and Devices Page 1 Objective At the conclusion of this lab, the student will be able to perform necessary post-installation hardware configuration
More informationCST8207: GNU/Linux Operating Systems I Lab Ten Boot Process and GRUB. Boot Process and GRUB
Student Name: Lab Section: Boot Process and GRUB 1 Due Date - Upload to Blackboard by 8:30am Monday April 16, 2012 Submit the completed lab to Blackboard following the Rules for submitting Online Labs
More informationEditors in Unix come in two general flavours:
Review notes #2 1. Unix account 2.Login: with a terminal or using telnet or ssh 3. Change password 4. Must logout! 5. Emails: (a) mutt (b) pine (c).forward file 6.Basic commands: who, ls, cat, more, man
More informationInstalling and Upgrading Cisco Network Registrar Virtual Appliance
CHAPTER 3 Installing and Upgrading Cisco Network Registrar Virtual Appliance The Cisco Network Registrar virtual appliance includes all the functionality available in a version of Cisco Network Registrar
More informationSystem Administration. Startup Process
System Administration Startup Process Why Care? Every process on your system comes about by following a specific chain of events from the machine startup You may want to disable processes You may want
More informationCisco ISE Command-Line Interface
This chapter provides information on the Cisco Identity Services Engine (Cisco ISE) command-line interface (CLI) that you can use to configure and maintain Cisco ISE. Cisco ISE Administration and Configuration
More informationOutline. Structure of a UNIX command
Outline Structure of Unix Commands Command help (man) Log on (terminal vs. graphical) System information (utility) File and directory structure (path) Permission (owner, group, rwx) File and directory
More informationCertification. System Initialization and Services
Certification System Initialization and Services UNIT 3 System Initialization and Services UNIT 3: Objectives Upon completion of this unit the student should be able to: Describe BIOS functions with respect
More informationThere are two tools with which you should be familiar: the program su, and more importantly, sudo. Here we see how to use them.
Operating Systems and Systems Integration Administration, the root User and Configuring sudo 1 Aim The aim of this activity is to understand the purpose of the root account, and the security risks of logging
More informationPerl and R Scripting for Biologists
Perl and R Scripting for Biologists Lukas Mueller PLBR 4092 Course overview Linux basics (today) Linux advanced (Aure, next week) Why Linux? Free open source operating system based on UNIX specifications
More informationLab 1: Accessing the Linux Operating System Spring 2009
CIS 90 Linux Lab Exercise Lab 1: Accessing the Linux Operating System Spring 2009 Lab 1: Accessing the Linux Operating System This lab takes a look at UNIX through an online experience on an Ubuntu Linux
More informationIntegrated Lights-Out 3 Virtual Serial Port configuration and operation
Integrated Lights-Out 3 Virtual Serial Port configuration and operation HOWTO, 6 th Edition Introduction... 2 Conceptual overview... 2 Security... 3 Configuration... 4 Configuring VSP in the host system
More informationRunlevels, System Shutdown and Reboot
Information These notes were originally written in the year 2000 as part of a set of LPI Exam 101 training materials. The LPI training course at Bromley College was subsequently discontinued and some of
More informationPart I. Introduction to Linux
Part I Introduction to Linux 7 Chapter 1 Linux operating system Goal-of-the-Day Familiarisation with basic Linux commands and creation of data plots. 1.1 What is Linux? All astronomical data processing
More informationUsing LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12)
Using LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12) Objective: Learn some basic aspects of the UNIX operating system and how to use it. What is UNIX? UNIX is the operating system used by most computers
More informationSANOG VI IP Services Workshop: FreeBSD Install
SANOG VI IP Services Workshop: FreeBSD Install FreeBSD is designed to be a server operating system. This becomes apparent during the installation process. The FreeBSD installer is a console-based (not
More informationUsing grub to Boot various Operating Systems
Operating Systems and Systems Integration Using grub to Boot various Operating Systems Contents 1 Aim 2 2 What You Will Do 2 3 Background 2 3.1 Installing grub in MBR from a floppy, and from the OS........
More informationConsole Redirection on VMware ESX Server Software and Dell PowerEdge Servers
Console Redirection on VMware ESX Server Software and Dell PowerEdge Servers October 2005 Notes, Notices, and Cautions NOTE: A NOTE indicates important information that helps you make better use of your
More informationCommand-Line Interfaces
CHAPTER 2 This chapter describes the CLIs you use to configure the Catalyst 4500 series switch. This chapter includes the following major sections: Accessing the Switch CLI, page 2-1 Performing Command-Line
More informationThis lab exercise is to be submitted at the end of the lab session! passwd [That is the command to change your current password to a new one]
Data and Computer Security (CMPD414) Lab II Topics: secure login, moving into HOME-directory, navigation on Unix, basic commands for vi, Message Digest This lab exercise is to be submitted at the end of
More informationOverview LEARN. History of Linux Linux Architecture Linux File System Linux Access Linux Commands File Permission Editors Conclusion and Questions
Lanka Education and Research Network Linux Architecture, Linux File System, Linux Basic Commands 28 th November 2016 Dilum Samarasinhe () Overview History of Linux Linux Architecture Linux File System
More informationLinux Systems Administration Getting Started with Linux
Linux Systems Administration Getting Started with Linux Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International
More informationIntroduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines
Introduction to UNIX Logging in Basic system architecture Getting help Intro to shell (tcsh) Basic UNIX File Maintenance Intro to emacs I/O Redirection Shell scripts Logging in most systems have graphical
More informationUsing the Vi Text Editor
Using the Vi Text Editor This document is intended to provide you with the basic information you need to use the vi text editor from your WAM/Glue or OIT cluster UNIX account. This document assumes that
More informationChapter 1 An Introduction to C++, Unix, SSH and Komodo Edit
Chapter 1 An Introduction to C++, Unix, SSH and Komodo Edit Contents 1 An Introduction to C++, Unix, SSH and Komodo Edit 1.1 Introduction 1.2 The C++ Language 1.2.1 A Brief Introduction 1.2.1.1 Recommended
More informationStart Up and Shutdown Procedures (Unix)
Start Up and Shutdown Procedures (Unix) Start Up On Main Console 1. Press the Server main power button ON 2. The system will automatically go through the start-up procedures, which will be displayed on
More informationh/w m/c Kernel shell Application s/w user
Structure of Unix h/w m/c Kernel shell Application s/w. user While working with unix, several layers of interaction occur b/w the computer h/w & the user. 1. Kernel : It is the first layer which runs on
More informationDevelopment Environment. ICLAB NCTU Institute of Electronics
Development Environment Lecturer: De-An Chen 1 ü Login to the terminal & Change Password ü Upload/Download Files Through FTP ü Set DISPLAY Environment ü Basic Operations ü On-line Text Editor VIM ü Text
More informationCS4350 Unix Programming. Outline
Outline Unix Management Files and file systems Structure of Unix Commands Command help (man) Log on (terminal vs. graphical) System information (utility) File and directory structure (path) Permission
More informationLinux Home Lab Environment
Environment Introduction Welcome! The best way to learn for most IT people is to actually do it, so that s the goal of this selfpaced lab workbook. The skills outlined here will begin to prepare you for
More informationUsing the Cisco NCS Command-Line Interface
CHAPTER 2 This chapter provides helpful tips for understanding and configuring the Cisco Prime Network Control System (NCS) from the command-line interface (CLI). The Cisco NCS can be deployed for small,
More informationOptional Labs. 0Handouts: 2002 ProsoftTraining All Rights Reserved. Version 3.07
0Handouts: Optional Lab 1-1: Understanding the /etc/securetty file In this lab, you will examine a PAM component, the /etc/securetty file. 1. Boot into Linux as root. Open a Telnet client and attempt to
More informationChapter 1 An Introduction to C++, Unix, SSH and Komodo Edit
Chapter 1 An Introduction to C++, Unix, SSH and Komodo Edit A portion of this lab is to be done during the scheduled lab time. The take-home programming assignment is to be turned in before the next lab;
More informationCourse 144 Supplementary Materials. UNIX Fundamentals
Course 144 Supplementary Materials UNIX Fundamentals 1 Background to UNIX Command Fundamentals This appendix provides a overview of critical commands and concepts Prerequisite knowledge attendees should
More informationSetting up a Chaincoin Masternode
Setting up a Chaincoin Masternode Introduction So you want to set up your own Chaincoin Masternode? You ve come to the right place! These instructions are correct as of April, 2017, and relate to version
More informationConfiguring the Cisco NAM 2220 Appliance
CHAPTER 5 This section describes how to configure the Cisco NAM 2220 appliance to establish network connectivity, configure IP parameters, and how to perform other required administrative tasks using the
More informationIntroduction to Linux (Part II) BUPT/QMUL 2018/03/21
Introduction to Linux (Part II) BUPT/QMUL 2018/03/21 Contents 10. vi 11. Other commands 12. Developing tools 2 10. Editor - vi Text editor Insert mode Override mode Use sub-commands Tradition tools and
More informationITEC451 Network Design & Analysis Laboratory Guide: Appendix
Linux Guide Accessing the command prompt Before you can access the command prompt, you must login to the system. The administrative user on Linux machines is named root. On most Linux distributions, you
More informationGetting Started With UNIX Lab Exercises
Getting Started With UNIX Lab Exercises This is the lab exercise handout for the Getting Started with UNIX tutorial. The exercises provide hands-on experience with the topics discussed in the tutorial.
More informationMDS - UNIX SYSTEM ADMINISTRATOR MANUAL. INTRODUCTION... i
MDS - UNIX SYSTEM ADMINISTRATOR MANUAL INTRODUCTION........................... i SUPER USER MENU.......................... 1 1 SET USER PRIVILEGE..................... 2 2 MAKE USER.........................
More informationCommand-Line Interfaces
CHAPTER 2 This chapter describes the CLIs you use to configure the Catalyst 4500 series switch. This chapter includes the following major sections: Accessing the Switch CLI, page 2-2 Performing Command-Line
More informationclient X11 Linux workstation
LPIC1 LPIC Linux: System Administrator LPIC 1 LPI command line LPIC-1 Linux LPIC-1 client X11 Linux workstation Unix GNU Linux Fundamentals Unix and its Design Principles FSF and GNU GPL - General Public
More informationUsing the Command-Line Interface
CHAPTER 2 This chapter describes the Cisco IOS command-line interface (CLI) and how to use it to configure your Cisco ME 3400 Ethernet Access switch. It contains these sections: Understanding Command Modes,
More informationUsing the Zoo Workstations
Using the Zoo Workstations Version 1.86: January 16, 2014 If you ve used Linux before, you can probably skip many of these instructions, but skim just in case. Please direct corrections and suggestions
More informationCSE Linux VM. For Microsoft Windows. Based on opensuse Leap 42.2
CSE Linux VM For Microsoft Windows Based on opensuse Leap 42.2 Dr. K. M. Flurchick February 2, 2017 Contents 1 Introduction 1 2 Requirements 1 3 Procedure 1 4 Usage 3 4.1 Start/Stop.................................................
More informationCSE 265: System and Network Administration
CSE 265: System and Network Administration System startup and shutdown Bootstrapping Booting PCs Boot loaders Booting into single user mode Startup scripts Rebooting and shutting down Bootstrapping i.e.,
More informationCSE 265: System and Network Administration
CSE 265: System and Network Administration System startup and shutdown Bootstrapping Booting PCs Boot loaders Booting into single user mode Startup scripts Rebooting and shutting down Bootstrapping i.e.,
More informationIntroduction. SSH Secure Shell Client 1
SSH Secure Shell Client 1 Introduction An SSH Secure Shell Client is a piece of software that allows a user to do a number of functions. Some of these functions are: file transferring, setting permissions,
More informationIntroduction to Linux. Woo-Yeong Jeong Computer Systems Laboratory Sungkyunkwan University
Introduction to Linux Woo-Yeong Jeong (wooyeong@csl.skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu What is Linux? A Unix-like operating system of a computer What is an
More informationAST2500 ibmc Configuration Guide
AST2500 ibmc Configuration Guide Version 1.0b Copyright Copyright 2017 MITAC COMPUTING TECHNOLOGY CORPORATION. All rights reserved. No part of this manual may be reproduced or translated without prior
More informationYou can use the WinSCP program to load or copy (FTP) files from your computer onto the Codd server.
CODD SERVER ACCESS INSTRUCTIONS OVERVIEW Codd (codd.franklin.edu) is a server that is used for many Computer Science (COMP) courses. To access the Franklin University Linux Server called Codd, an SSH connection
More informationCHE3935. Lecture 1. Introduction to Linux
CHE3935 Lecture 1 Introduction to Linux 1 Logging In PuTTY is a free telnet/ssh client that can be run without installing it within Windows. It will only give you a terminal interface, but used with a
More informationThe Linux IPL Procedure
The Linux IPL Procedure SHARE - Tampa February 13, 2007 Session 9274 Edmund MacKenty Rocket Software, Inc. Purpose De-mystify the Linux boot sequence Explain what happens each step of the way Describe
More informationGetting Started with UNIX
Getting Started with UNIX What is UNIX? Boston University Information Services & Technology Course Number: 4000 Course Instructor: Kenny Burns Operating System Interface between a user and the computer
More informationgrub-md5-crypt --help Usage: grub-md5-crypt [OPTION] Encrypt a password in MD5 format.
(OS Hardening). Minimal.1. grub.2..3. DVD Update.4. root ssh.5 kernel grub kernel.6. comment vi /etc/grub.conf # grub.conf generated by anaconda # # Note that you do not have to rerun grub after making
More informationGuide to Linux+, Fourth Edition Chapter 2 Solutions
Guide to Linux+, Fourth Edition Chapter 2 Solutions Review Questions 1. What is the default shell in Linux called? a. SH b. BSH c. CSH d. BASH Answer: d 2. What equivalent to the man command generally
More informationBooting up and Shutting down A primer for troubleshooting
Booting up and Shutting down A primer for troubleshooting In this section, we touch upon the startup and shutdown process on Linux. It is beyond the scope of this course to cover this topic in depth and
More informationLinux Exercise. pwd answer: We call this directory (into which you get when you log in) your home directory.
Linux Exercise The following steps will guide you through the most common Linux commands. If you are using windows (Library and any Windows lab on campus), then start with step 1. If you are using a linux
More informationEKT332 COMPUTER NETWORK
EKT332 COMPUTER NETWORK LAB 1 INTRODUCTION TO GNU/LINUX OS Lab #1 : Introduction to GNU/Linux OS Objectives 1. Introduction to Linux File System (Red Hat Distribution). 2. Introduction to various packages
More informationThe kernel is the low-level software that manages hardware, multitasks programs, etc.
November 2011 1 Why Use Linux? Save Money Initial purchase and maintenance Resume Linux is used by MANY organizations More choices Tons of Linux operating systems November 2011 2 What is Linux? 1. Contains
More informationManaging Users, Managing Security
CHAPTER 19 Managing Users, Managing Security The heart of Linux security is determining who can use what file and what kind of use is permitted. This is not all there is to making Linux a more secure system,
More informationeftp Application User Guide
Team A eftp User Guide 1/30 eftp Application User Guide Table of Contents Page 1. Acknowledgement 2 2. Introduction a. Welcome eftp Audience 3 b. What s in this manual 3 c. Manual Conventions 3 d. Getting
More informationLAB #5 Intro to Linux and Python on ENGR
LAB #5 Intro to Linux and Python on ENGR 1. Pre-Lab: In this lab, we are going to download some useful tools needed throughout your CS career. First, you need to download a secure shell (ssh) client for
More informationBasic File Attributes
Basic File Attributes The UNIX file system allows the user to access other files not belonging to them and without infringing on security. A file has a number of attributes (properties) that are stored
More informationUNIX: Using PICO on Central UNIX
Using PICO on Central UNIX SYNOPSIS This chapter provides a summary of the basic pico commands. Basic operations such as cursor movement, inserting and deleting text, and searches are covered to give the
More informationLinux/Cygwin Practice Computer Architecture
Linux/Cygwin Practice 2010 Computer Architecture Linux Login Use ssh client applications to connect (Port : 22) SSH Clients zterm ( http://www.brainz.co.kr/products/products4_2.php ) Putty ( http://kldp.net/frs/download.php/3411/hangulputty-0.58.h2.exe
More informationIMPORTANT: Logging Off LOGGING IN
These are a few basic Unix commands compiled from Unix web sites, and printed materials. The main purpose is to help a beginner to go around with fewer difficulties. Therefore, I will be adding to this
More informationUsing WestGrid from the desktop Oct on Access Grid
Using WestGrid from the desktop Oct 11 2007 on Access Grid Introduction Simon Sharpe, UCIT Client Services The best way to contact WestGrid support is to email support@westgrid.ca This seminar gives you
More informationCSE 391 Lecture 3. bash shell continued: processes; multi-user systems; remote login; editors
CSE 391 Lecture 3 bash shell continued: processes; multi-user systems; remote login; editors slides created by Marty Stepp, modified by Jessica Miller and Ruth Anderson http://www.cs.washington.edu/391/
More informationCS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX
CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the EECS labs that dual boot
More informationStop all processes and then reboot - same as above startx. Log in as superuser from current login exit
Starting & Stopping shutdown -h now Shutdown the system now and do not reboot shutdown -r 5 Shutdown the system in 5 minutes and reboot shutdown -r now Shutdown the system now and reboot reboot Stop all
More informationHelsinki 19 Jan Practical course in genome bioinformatics DAY 0
Helsinki 19 Jan 2017 529028 Practical course in genome bioinformatics DAY 0 This document can be downloaded at: http://ekhidna.biocenter.helsinki.fi/downloads/teaching/spring2017/exercises_day0.pdf The
More informationHow to Use This Lab Manual
3 Contents How to Use This Lab Manual........................................ 5 Lab 1: Setting Up the Student System.................................. 7 Lab 2: Installing Fedora............................................
More informationPhysics REU Unix Tutorial
Physics REU Unix Tutorial What is unix? Unix is an operating system. In simple terms, its the set of programs that makes a computer work. It can be broken down into three parts. (1) kernel: The component
More informationUnix File System. Learning command-line navigation of the file system is essential for efficient system usage
ULI101 Week 02 Week Overview Unix file system File types and file naming Basic file system commands: pwd,cd,ls,mkdir,rmdir,mv,cp,rm man pages Text editing Common file utilities: cat,more,less,touch,file,find
More informationTEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 1.0, Last Edited 09/20/2005 Name of Students: Date of Experiment: Part I: Objective The objective of the exercises
More informationPerforming Maintenance Operations
This chapter describes how to back up and restore Cisco Mobility Services Engine (MSE) data and how to update the MSE software. It also describes other maintenance operations. Guidelines and Limitations,
More informationINF322 Operating Systems
Galatasaray University Computer Engineering Department INF322 Operating Systems TP01: Introduction to Linux Ozan Çağlayan ocaglayan@gsu.edu.tr ozancaglayan.com Fundamental Concepts Definition of Operating
More informationRed Hat Network Satellite 5.0.0: Virtualization Step by Step
Red Hat Network Satellite 5.0.0: Virtualization Step by Step By Máirín Duffy, Red Hat Network Engineering Abstract Red Hat Network Satellite 5.0 is the first Satellite release to include virtual platform
More informationPresented by Bill Genske Gary Jackson
Quintessential School Systems Session C Linux Presented by Bill Genske Gary Jackson Copyright Quintessential School Systems, 2009 All Rights Reserved 867 American Street --- Second Floor --- San Carlos,
More informationCS Fundamentals of Programming II Fall Very Basic UNIX
CS 215 - Fundamentals of Programming II Fall 2012 - Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the CS (Project) Lab (KC-265)
More informationIT Essentials v6.0 Windows 10 Software Labs
IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows
More informationCommand Line Interface The basics
Command Line Interface The basics Marco Berghoff, SCC, KIT Steinbuch Centre for Computing (SCC) Funding: www.bwhpc-c5.de Motivation In the Beginning was the Command Line by Neal Stephenson In contrast
More informationAutomatically Logging on a User at Linux System Boot time for Console Management
Automatically Logging on a User at Linux System Boot time for Console Management This document can be found on the web at www.ibm.com/support/techdocs Search for author s name under the category of White
More informationWashington WASHINGTON UNIVERSITY IN ST LOUIS
NetBSD Installation Procedure NetBSD Installation for the Washington University Gigabit Switch Kits Program Presented by: jdd@arl.wustl.edu http://www.arl.wustl.edu/~jdd http://www.arl.wustl.edu/arl Applied
More informationLAB #7 Linux Tutorial
Gathering information: LAB #7 Linux Tutorial Find the password file on a Linux box Scenario You have access to a Linux computer. You must find the password file on the computer. Objective Get a listing
More informationmkdir Phys338 s2017 Draw the tree of the directories and files for this step and all the following cd Phys338 s2017
Linux Exercise The following steps will guide you through the most common Linux commands. If you are using windows (Library and any Windows lab on campus), then start with step 1. If you are using a linux
More informationHelpful Tips for Labs. CS140, Spring 2015
Helpful Tips for Labs CS140, Spring 2015 Linux/Unix Commands Creating, Entering, Changing Directories to Create a Directory (a Folder) on the command line type mkdir folder_name to Enter that Folder cd
More informationShort Read Sequencing Analysis Workshop
Short Read Sequencing Analysis Workshop Day 2 Learning the Linux Compute Environment In-class Slides Matt Hynes-Grace Manager of IT Operations, BioFrontiers Institute Review of Day 2 Videos Video 1 Introduction
More informationWeek Overview. Unix file system File types and file naming Basic file system commands: pwd,cd,ls,mkdir,rmdir,mv,cp,rm man pages
ULI101 Week 02 Week Overview Unix file system File types and file naming Basic file system commands: pwd,cd,ls,mkdir,rmdir,mv,cp,rm man pages Text editing Common file utilities: cat,more,less,touch,file,find
More information15-122: Principles of Imperative Computation
15-122: Principles of Imperative Computation Lab 0 Navigating your account in Linux Tom Cortina, Rob Simmons Unlike typical graphical interfaces for operating systems, here you are entering commands directly
More informationUNLV Computer Science Department CS 135 Lab Manual
UNLV Computer Science Department CS 135 Lab Manual prepared by Lee Misch revised July 2013 CS 135 Lab Manual Content Page Introduction 3 CS Computer Accounts. 3 TBE B361 Computer Basics. 3 Choosing an
More informationLecture # 2 Introduction to UNIX (Part 2)
CS390 UNIX Programming Spring 2009 Page 1 Lecture # 2 Introduction to UNIX (Part 2) UNIX is case sensitive (lowercase, lowercase, lowercase) Logging in (Terminal Method) Two basic techniques: 1. Network
More informationWLM1200-RMTS User s Guide
WLM1200-RMTS User s Guide Copyright 2011, Juniper Networks, Inc. 1 WLM1200-RMTS User Guide Contents WLM1200-RMTS Publication Suite........................................ 2 WLM1200-RMTS Hardware Description....................................
More informationHOW LINUX BOOTS. As it turns out, there isn t much to the boot process:
3 HOW LINUX BOOTS You now know the physical structure of a Linux system, what the kernel is, and how to work with processes. This chapter teaches you how the system starts (boots) that is, how the kernel
More informationSysinstall main menu. Move the cursor down by using the DOWN-ARROW and select Standard.
Initial Boot from Install Disc 1 Turn on the power for your machine. Sysinstall main menu Immediately place the first CD-ROM of the FreeBSD 5.3 install set in your machine's CD-ROM drive. You'll see an
More information