NETW 110 Lab 3 Post-Installation Configuration Page 1

Size: px
Start display at page:

Download "NETW 110 Lab 3 Post-Installation Configuration Page 1"

Transcription

1 NETW 110 Lab 3 Post-Installation Configuration Page 1 Objective At the conclusion of this lab, the student will learn some very basic functions of vi, use vi to perform some post-installation configuration duties, and upload and download files using ftp. Finally, you will properly shutdown and reboot Linux. Getting Help You can get help on any command, its syntax, and all options from the man pages. For some basic information on vi, see the handout on editors. Journal Assignment From the man pages and online search, write down information, instructions, and options with respect to UNIX and LINUX for the following commands and definitions: Linux/UNIX runlevels Linux/UNIX boot loaders grub lilo Linux/UNIX change virtual terminals vi inittab ps shutdown reboot halt Overview When we install hardware and software, some configuration files need to be modified. These configuration files are ASCII text files, which are opened in a text editor, modified, and saved. When we are working at the CLI, the typical text editor for Linux/UNIX is vi (which has been replaced by vim). If you have never used vi, see the handout. Now we will practice some very basic editing functions using vi, but first we must download a text file. Based on our installation configuration, Fedora will boot into the GUI (Graphical User Interface or X). Throughout this course, we perform most of our configuration assignments from the CLI (Command Line Interface also know as the text mode). When X is running, there are two ways to get to the CLI quickly. 1. We can start a virtual terminal session in a new Window. To do this: CL on Applications => Highlight System Tools CL on Terminal 2. There are seven shell based Virtual Terminal (VT) sessions (also called Virtual Console sessions). These sessions are accessed by pressing CTRL-ALT-F1 through CTRL-ALT-F6, and one GUI VT, which is accessed by pressing CTRL-ALT-F7. You can start a process that will take a long time in one session, and perform a different function by changing to a different VT. NOTE: During this course, we will configure Linux to boot into the CLI. When Linux boots to the CLI, the session is represented by the F1 key. If you start X from the CLI, F1 will not give you a command prompt until the X session is terminated. If you change to the F1 session, you will see some text on the display that represents the functions that Linux performed to start the X session, and at the bottom of the display, you will probably see a blinking underline. If you press the enter key, it merely inserts a blank line. You should change to a different VT, or change back to the X session.

2 NETW 110 Lab 3 Post-Installation Configuration Page 2 Virtual Terminals In a UNIX/Linux system, you have only one keyboard (terminal), but you have up to six virtual terminals named tty1 through tty6 that operate in the text mode, and tty7, which is the GUI mode. When you system starts in the CLI, you are logging in and operating in tty1. Each virtual terminal uses about 8KB of kernel memory. If this matters, it is easy to allocate fewer virtual terminals. In the Linux 2.4 kernel, virtual terminals are created on demand, so not starting mingetty on the virtual terminal will not create the virtual terminal. mingetty is designed to be a minimal getty for the virtual terminals on the workstation's monitor and keyboard. It has no support for serial lines. If the machine does not have a video card then remove all the mingetty entries from /etc/inittab. The six mingetty s are created in your inittab file with the lines: # Run gettys in standard runlevels 1:2345:respawn:/sbin/mingetty tty1 2:2345:respawn:/sbin/mingetty tty2 3:2345:respawn:/sbin/mingetty tty3 4:2345:respawn:/sbin/mingetty tty4 5:2345:respawn:/sbin/mingetty tty5 6:2345:respawn:/sbin/mingetty tty6 By pressing a function key F1 through F6 with CRTL-ALT, you are changing to the virtual terminal that corresponds to the number of the function key (F1 through F6 starts tty1 through tty6 respectively) When you are operating in X, you can also perform tasks at the CLI by opening a terminal window in X by CL on Red Hat Applications, CL on System Tools, CL on Terminal You can start a new virtual terminal at the CLI by pressing CTRL-ALT-F2 This started tty2, and you will now receive a standard login prompt. You can now login as any user for which you have logon privileges. When you startx, the CLI prompt and cursor in tty1 is no longer present as a process is running, and you are operating in tty7, the first terminal device after the six text consoles. You can logout of a virtual terminal by entering the command exit. The system login prompt returns. You can now change to any other virtual terminal. If you opened a virtual terminal and X is running, you can return to X by pressing CTRL-ALT-F7 Procedure Using a Text Editor 1. Boot Linux and login with your general user account. Make a directory in your /home/username called lab02 with the command mkdir lab02 Make a directory in /home/username called lab03 with the command mkdir lab03 2. Start a browser, the web browser. Open the NETW110 website on the class server by entering the address Place the mouse over the link for text.txt and CR From the menu, CL on Save Link Target As Save the file in your /home/username directory as text.txt 3. Start a Virtual Terminal session in a new window by:

3 NETW 110 Lab 3 Post-Installation Configuration Page 3 CL on Applications Highlight System Tools CL on Terminal Enter the command vi text.txt There are six lines of text similar to the following: The name of this file is text.txt When you type ussing an edior, you may often make a mistoke that you have to correct. vi will allow you to correct the the problem, get rid of the bad stuff, and make your life easy. This is the first line of the text. As you can see, there are a number of typographical errors. Change to the insert mode and make the following corrections: Line Error Correction 2 using misspelled delete one s 2 edior misspelled editor insert a t between the i and the o 2 two spaces between the comma and before you delete the extra space 3 mistoke mistake 4 the the delete extra the We have finished with the corrections. Now we will make some changes. Move to the last line of text, change to the command mode, and press dd Move to the first line of the file and press p Copy the first six lines to the buffer (from the first line press 6yy ) Create 10 blank lines at the end of the file and Paste the buffer contents. Save the file as editor.txt and exit View the contents of the file cat editor.txt If the file is correct, copy the file to the lab03 directory with the command: cp editor.txt lab03/. Note: the destination filename in the previous line is lab03 slash dot with no spaces. If this gives you a problem, use cp editor.txt lab03/editor.txt Assigning root privileges to your general user account. Login as root Change to the /etc directory Enter the command visudo The contents of the screen is similar to the following: # sudoers file. # # This file MUST be edited with the 'visudo' command as root. # # See the sudoers man page for the details on how to write a sudoers file. # # Host alias specification # User alias specification

4 NETW 110 Lab 3 Post-Installation Configuration Page 4 # Cmnd alias specification # Defaults specification # User privilege specification root ALL=(ALL) ALL # Uncomment to allow people in group wheel to run all commands # %wheel ALL=(ALL) ALL # Same thing without a password # %wheel ALL=(ALL) NOPASSWD: ALL # Samples # %users ALL=/sbin/mount /cdrom,/sbin/umount /cdrom # %users localhost=/sbin/shutdown -h now Press I. Move to the end of the line that states root ALL=(ALL) ALL Press enter and add the following line yourusername ALL=(ALL) ALL where yourusername is your general username. Press Escape, write and quit. Copy the file /etc/sudoers to /home/lab03/sudoers motd When users login in, you can display a message. It is called the message of the day (even though it does not automatically change.) It is the same regardless of how a user logs in. The file is automatically created in /etc with the name motd when the OS is installed, but it is blank so no message is displayed. We will now modify the file. Since the original version of the file is blank, there is no need to make a backup copy. You must be logged in with root privileges. Login as the superuser with the command su, and enter the root password. Change to the /root directory. Copy the kickstart configuration file created anaconda when you installed Fedora with the command: cp anaconda-ks.cfg to /home/username/lab02/ks.cfg Change to the /etc directory Enter the command: vi motd Press i Press the enter key three times to insert 3 blank lines. Press the space bar 7 times and enter in the text Warning. Access to this system is limited to authorized users. Press the enter key and the spacebar until the cursor is directly under the space between the words Access and to and enter the text Trespassers will be persecuted! Press the enter key three times to insert 3 blank lines. Press ESC Write the changes and quit :wq Enter the command clear to clear the display and home the cursor View your motd by entering the command cat /etc/motd

5 NETW 110 Lab 3 Post-Installation Configuration Page 5 If the file is correct, copy the file /etc/motd to /home/username/lab03/. where username is your default username. Default Shell Settings Make sure that you have superuser privileges (login as su). Change to the /root directory Make a backup copy of.bash_profile to.bash_profile.orig Open.bash_profile in vi and change to the insert mode. Add :$HOME the PATH statement as follows: PATH=$PATH:$HOME:$HOME/bin Skip one blank line and add the statement umask 077 Go to the end of the file and add the following lines: alias dir='ls -la less' alias cls='clear' alias copy='cp' Change to the /etc/skel directory Make a backup copy of.bash_profile to.bash_profile.orig Open.bash_profile in vi and change to the insert mode. Add :$HOME the PATH statement as follows: PATH=$PATH:$HOME:$HOME/bin Skip one blank line and add the statement umask 002 Go to the end of the file and add the following lines: alias dir='ls -la less' alias cls='clear' alias copy='cp' Verify the file is correct, and copy the file /etc/skel/.bash_profile to /home/username/lab03/. where username is your default username. Default runlevel Currently, Fedora boots to the GUI (runlevel 5). We are going to change a file that will cause Fedora to boot to the CLI (runlevel 3). If you make an error editing this file, Fedora may not boot, so be careful. You must have superuser or root privileges to access this file. Make a backup copy of inittab to inittab.orig Open inittab in vi and change to the insert mode. Near the middle of the file, you will see a description of the 7 runlevels for Linux. The current default runlevel is 5 (X-WINDOWS). Below the runlevel list in inittab is the id command that looks like the following. id:5:initdefault: We wish to change the default runlevel from 5 to 3 (CLI). Modify this line to read id:3:initdefault:

6 NETW 110 Lab 3 Post-Installation Configuration Page 6 Write the file and quit. Verify the file was changed with the cat command. Verify the file is correct, and copy the file /etc/inittab to /home/username/lab03/. directory where username is your default username. Let us make sure everything is working properly. You should still have root privileges. At the system prompt, enter the command reboot You will see the CLI login prompt. Enter your regular username and password. The screen will now display the motd and your system prompt. Login with your general user account. Failure to boot after Changes made to files It is possible that a typo in one of the files that we just modified. It is also possible that we may not be able to login as root or su because we forgot the root password, or another su changed the password and did not tell us. In either case, we need to boot to runlevel 1 so we can fix the problems. We do this by interrupting the grub bootloader and force a boot to the single user mode (runlevel1). TO do this: Reboot or start the system. When you see the warning that you have 5 seconds to interrupt the boot process Press the Enter key Press e From the grub menu, press e Press the down arrow Press e From the end of the line press the backspace and delete rhgb quiet Type the text single and press the Enter key Press b After much text goes by, you are logged in as root without providing the password, and you should see the prompt sh-3.00# You can now perform any functions on any file that you would do under a normal boot. To change the root password, enter the command passwd If you could not boot due to a typo in a critical file and you made a backup copy before you edited the file, you can restore the original file by changing to the directory and copying the backup version of the file (we used the same filename and added a.orig extension at the end) over the original file. For example: cp filename.orig filename If asked do you wish to overwrite, say y or yes. When you are finished, you can boot to the default runlevel by pressing CTRL-D Final Steps The handout of using ftp from the CLI explains the procedure to use ftp to upload and download files. For now, we will just give you instructions to upload the files that you just created and modified. Your default login and password is your server name (ie login apple and password apple). You should change your password upon connection.

7 NETW 110 Lab 3 Post-Installation Configuration Page 7 Even though the files are in your username directory, they are owned by root since they were created and copied by su. In order for you to access them under your general username, you must change the ownership of the files. Make sure that you have su privileges. Change the ownership of all the files in the lab02 and lab03 directory (recursively) to your general username (ie apple:apple) chown R username:username /home/username/lab02 chown R username:username /home/username/lab03 You can now exit from su From the CLI, enter the command to connect to the class server using secure shell: ssh You will receive a server response The authenticity of host ' ( )' can't be established. RSA key fingerprint is 37:76:a4:6a:ad:88:84:7f:19:81:67:06:ca:cb:e2:03. Are you sure you want to continue connecting (yes/no)? Enter yes At the prompts for login and password, use your servername (apple) for both. Change your password to something appropriate by entering the command!passwd Close the ssh session with the command exit From the prompt, enter the command to connect to the class ftp server: ftp At the login prompt, use your servername (apple) for the login and your new password Your prompt is ftp> On the ftp server, make a directory named lab02 and lab03 Upload all the files from your /home/username/lab02/ directory to your lab02 directory on the server. (mput /home/username/lab02/ lab02/.) Upload all the files from your /home/username/lab03/ directory to your lab03 directory on the server. (mput /home/username/lab03/ lab03/.) Verify that all files were uploaded to the server. When you are finished, logoff with the command bye Shutdown from the CLI Note: In the lab, it is not necessary to shutdown the system at the end of class. However, you should logoff by entering the command exit After you exit, you will see a login prompt. In the real world, you should never remain logged on with root privileges. You should logoff by entering the command exit as soon as you have finished your tasks. After you exit, you should see your user prompt. For security reasons, anytime you plan to leave the area, you should exit even from you general user account. Once again, just enter the command exit Occasionally, it is necessary to shutdown the computer for routine maintenance. This could be a system backup, installation of new hardware, etc. You should be logged in at runlevel3 as a generaluser. Login as su since you will not be allowed to shutdown the server without root privileges. Enter the command shutdown r 15 to reboot in 15 minutes and send a broadcast message to all users. The message is similar to the following: Broadcast message from root (tty1) (Thu May 20 10:02: )

8 NETW 110 Lab 3 Post-Installation Configuration Page 8 The system is going DOWN for reboot in 15 minutes! Notice that you have no prompt. Press CTRL-C to abort the shutdown. You should receive the message Shutdown Cancelled, and the CLI prompt is back. If you use h instead of r, the system will shutdown and halt instead of reboot. If you use now instead of 15, the system would send a message and shutdown immediately. Any logged on users would loose their connection and perhaps files might be lost or corrupted. You might have some very angry users visit your office. To include your own message, you can enter the command: shutdown h 15 The system will be shutdown for routine maintenance for 3 hours. These will shutdown the system in 15 minutes and immediately send the broadcast message: Broadcast message from root (tty1) (Thu May 20 10:02: ) The system will be shutdown for routine maintenance for 3 hours. The system is going DOWN for system halt in 15 minutes! Every minute, a broadcast message informs all users how long until shutdown. Cancel the shutdown with the command CTRL-C You could type halt does the same thing as shutdown h now Also, you could enter the command init 0 To restart the system, you could type reboot, which is equivalent to shutdown r now. An appropriate broadcast message is displayed. You could also reboot using the command init 6 Both halt and reboot are all immediate commands. They send appropriate Broadcast messages, but do not give you a chance to change your mind. Finally, you can reboot by pressing CTRL-ALT-DEL (known as the Vulcan Neck Squeeze and the three finger salute), which is equivalent to shutdown r now

NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1

NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1 NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1 Objective At the conclusion of this lab, the student will be able to add and delete users, create and assign users to groups, and assign users

More information

Lab 3a Using the vi editor

Lab 3a Using the vi editor Lab 3a Using the vi editor Objectives: Become familiar with the vi Editor Review the three vi Modes Review keystrokes to move between vi modes Create a new file with vi Editor Invoke vi with show mode

More information

This is Lab Worksheet 13 - not an Assignment. Boot Process and GRUB

This is Lab Worksheet 13 - not an Assignment. Boot Process and GRUB This is Lab Worksheet 13 - not an Assignment This Lab Worksheet contains some practical examples that will prepare you to complete your Assignments. You do not have to hand in this Lab Worksheet. Make

More information

INTRODUCTION. NOTE Some symbols used in this manual CL = Click Left CR = Click Right DCL = Double Click Left = Enter. Page 1

INTRODUCTION. NOTE Some symbols used in this manual CL = Click Left CR = Click Right DCL = Double Click Left = Enter. Page 1 INTRODUCTION OBJECTIVE The purpose of this manual is to provide the student with practical experience in the writing of assembly language programs, and give them background and instructions on how to use

More information

NETW 110 Lab 4 Using eth0 Configuration Mounting Drives and Devices Page 1

NETW 110 Lab 4 Using eth0 Configuration Mounting Drives and Devices Page 1 NETW 110 Lab 4 Using eth0 Configuration Mounting Drives and Devices Page 1 Objective At the conclusion of this lab, the student will be able to perform necessary post-installation hardware configuration

More information

CST8207: GNU/Linux Operating Systems I Lab Ten Boot Process and GRUB. Boot Process and GRUB

CST8207: GNU/Linux Operating Systems I Lab Ten Boot Process and GRUB. Boot Process and GRUB Student Name: Lab Section: Boot Process and GRUB 1 Due Date - Upload to Blackboard by 8:30am Monday April 16, 2012 Submit the completed lab to Blackboard following the Rules for submitting Online Labs

More information

Editors in Unix come in two general flavours:

Editors in Unix come in two general flavours: Review notes #2 1. Unix account 2.Login: with a terminal or using telnet or ssh 3. Change password 4. Must logout! 5. Emails: (a) mutt (b) pine (c).forward file 6.Basic commands: who, ls, cat, more, man

More information

Installing and Upgrading Cisco Network Registrar Virtual Appliance

Installing and Upgrading Cisco Network Registrar Virtual Appliance CHAPTER 3 Installing and Upgrading Cisco Network Registrar Virtual Appliance The Cisco Network Registrar virtual appliance includes all the functionality available in a version of Cisco Network Registrar

More information

System Administration. Startup Process

System Administration. Startup Process System Administration Startup Process Why Care? Every process on your system comes about by following a specific chain of events from the machine startup You may want to disable processes You may want

More information

Cisco ISE Command-Line Interface

Cisco ISE Command-Line Interface This chapter provides information on the Cisco Identity Services Engine (Cisco ISE) command-line interface (CLI) that you can use to configure and maintain Cisco ISE. Cisco ISE Administration and Configuration

More information

Outline. Structure of a UNIX command

Outline. Structure of a UNIX command Outline Structure of Unix Commands Command help (man) Log on (terminal vs. graphical) System information (utility) File and directory structure (path) Permission (owner, group, rwx) File and directory

More information

Certification. System Initialization and Services

Certification. System Initialization and Services Certification System Initialization and Services UNIT 3 System Initialization and Services UNIT 3: Objectives Upon completion of this unit the student should be able to: Describe BIOS functions with respect

More information

There are two tools with which you should be familiar: the program su, and more importantly, sudo. Here we see how to use them.

There are two tools with which you should be familiar: the program su, and more importantly, sudo. Here we see how to use them. Operating Systems and Systems Integration Administration, the root User and Configuring sudo 1 Aim The aim of this activity is to understand the purpose of the root account, and the security risks of logging

More information

Perl and R Scripting for Biologists

Perl and R Scripting for Biologists Perl and R Scripting for Biologists Lukas Mueller PLBR 4092 Course overview Linux basics (today) Linux advanced (Aure, next week) Why Linux? Free open source operating system based on UNIX specifications

More information

Lab 1: Accessing the Linux Operating System Spring 2009

Lab 1: Accessing the Linux Operating System Spring 2009 CIS 90 Linux Lab Exercise Lab 1: Accessing the Linux Operating System Spring 2009 Lab 1: Accessing the Linux Operating System This lab takes a look at UNIX through an online experience on an Ubuntu Linux

More information

Integrated Lights-Out 3 Virtual Serial Port configuration and operation

Integrated Lights-Out 3 Virtual Serial Port configuration and operation Integrated Lights-Out 3 Virtual Serial Port configuration and operation HOWTO, 6 th Edition Introduction... 2 Conceptual overview... 2 Security... 3 Configuration... 4 Configuring VSP in the host system

More information

Runlevels, System Shutdown and Reboot

Runlevels, System Shutdown and Reboot Information These notes were originally written in the year 2000 as part of a set of LPI Exam 101 training materials. The LPI training course at Bromley College was subsequently discontinued and some of

More information

Part I. Introduction to Linux

Part I. Introduction to Linux Part I Introduction to Linux 7 Chapter 1 Linux operating system Goal-of-the-Day Familiarisation with basic Linux commands and creation of data plots. 1.1 What is Linux? All astronomical data processing

More information

Using LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12)

Using LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12) Using LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12) Objective: Learn some basic aspects of the UNIX operating system and how to use it. What is UNIX? UNIX is the operating system used by most computers

More information

SANOG VI IP Services Workshop: FreeBSD Install

SANOG VI IP Services Workshop: FreeBSD Install SANOG VI IP Services Workshop: FreeBSD Install FreeBSD is designed to be a server operating system. This becomes apparent during the installation process. The FreeBSD installer is a console-based (not

More information

Using grub to Boot various Operating Systems

Using grub to Boot various Operating Systems Operating Systems and Systems Integration Using grub to Boot various Operating Systems Contents 1 Aim 2 2 What You Will Do 2 3 Background 2 3.1 Installing grub in MBR from a floppy, and from the OS........

More information

Console Redirection on VMware ESX Server Software and Dell PowerEdge Servers

Console Redirection on VMware ESX Server Software and Dell PowerEdge Servers Console Redirection on VMware ESX Server Software and Dell PowerEdge Servers October 2005 Notes, Notices, and Cautions NOTE: A NOTE indicates important information that helps you make better use of your

More information

Command-Line Interfaces

Command-Line Interfaces CHAPTER 2 This chapter describes the CLIs you use to configure the Catalyst 4500 series switch. This chapter includes the following major sections: Accessing the Switch CLI, page 2-1 Performing Command-Line

More information

This lab exercise is to be submitted at the end of the lab session! passwd [That is the command to change your current password to a new one]

This lab exercise is to be submitted at the end of the lab session! passwd [That is the command to change your current password to a new one] Data and Computer Security (CMPD414) Lab II Topics: secure login, moving into HOME-directory, navigation on Unix, basic commands for vi, Message Digest This lab exercise is to be submitted at the end of

More information

Overview LEARN. History of Linux Linux Architecture Linux File System Linux Access Linux Commands File Permission Editors Conclusion and Questions

Overview LEARN. History of Linux Linux Architecture Linux File System Linux Access Linux Commands File Permission Editors Conclusion and Questions Lanka Education and Research Network Linux Architecture, Linux File System, Linux Basic Commands 28 th November 2016 Dilum Samarasinhe () Overview History of Linux Linux Architecture Linux File System

More information

Linux Systems Administration Getting Started with Linux

Linux Systems Administration Getting Started with Linux Linux Systems Administration Getting Started with Linux Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International

More information

Introduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines

Introduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines Introduction to UNIX Logging in Basic system architecture Getting help Intro to shell (tcsh) Basic UNIX File Maintenance Intro to emacs I/O Redirection Shell scripts Logging in most systems have graphical

More information

Using the Vi Text Editor

Using the Vi Text Editor Using the Vi Text Editor This document is intended to provide you with the basic information you need to use the vi text editor from your WAM/Glue or OIT cluster UNIX account. This document assumes that

More information

Chapter 1 An Introduction to C++, Unix, SSH and Komodo Edit

Chapter 1 An Introduction to C++, Unix, SSH and Komodo Edit Chapter 1 An Introduction to C++, Unix, SSH and Komodo Edit Contents 1 An Introduction to C++, Unix, SSH and Komodo Edit 1.1 Introduction 1.2 The C++ Language 1.2.1 A Brief Introduction 1.2.1.1 Recommended

More information

Start Up and Shutdown Procedures (Unix)

Start Up and Shutdown Procedures (Unix) Start Up and Shutdown Procedures (Unix) Start Up On Main Console 1. Press the Server main power button ON 2. The system will automatically go through the start-up procedures, which will be displayed on

More information

h/w m/c Kernel shell Application s/w user

h/w m/c Kernel shell Application s/w user Structure of Unix h/w m/c Kernel shell Application s/w. user While working with unix, several layers of interaction occur b/w the computer h/w & the user. 1. Kernel : It is the first layer which runs on

More information

Development Environment. ICLAB NCTU Institute of Electronics

Development Environment. ICLAB NCTU Institute of Electronics Development Environment Lecturer: De-An Chen 1 ü Login to the terminal & Change Password ü Upload/Download Files Through FTP ü Set DISPLAY Environment ü Basic Operations ü On-line Text Editor VIM ü Text

More information

CS4350 Unix Programming. Outline

CS4350 Unix Programming. Outline Outline Unix Management Files and file systems Structure of Unix Commands Command help (man) Log on (terminal vs. graphical) System information (utility) File and directory structure (path) Permission

More information

Linux Home Lab Environment

Linux Home Lab Environment Environment Introduction Welcome! The best way to learn for most IT people is to actually do it, so that s the goal of this selfpaced lab workbook. The skills outlined here will begin to prepare you for

More information

Using the Cisco NCS Command-Line Interface

Using the Cisco NCS Command-Line Interface CHAPTER 2 This chapter provides helpful tips for understanding and configuring the Cisco Prime Network Control System (NCS) from the command-line interface (CLI). The Cisco NCS can be deployed for small,

More information

Optional Labs. 0Handouts: 2002 ProsoftTraining All Rights Reserved. Version 3.07

Optional Labs. 0Handouts: 2002 ProsoftTraining All Rights Reserved. Version 3.07 0Handouts: Optional Lab 1-1: Understanding the /etc/securetty file In this lab, you will examine a PAM component, the /etc/securetty file. 1. Boot into Linux as root. Open a Telnet client and attempt to

More information

Chapter 1 An Introduction to C++, Unix, SSH and Komodo Edit

Chapter 1 An Introduction to C++, Unix, SSH and Komodo Edit Chapter 1 An Introduction to C++, Unix, SSH and Komodo Edit A portion of this lab is to be done during the scheduled lab time. The take-home programming assignment is to be turned in before the next lab;

More information

Course 144 Supplementary Materials. UNIX Fundamentals

Course 144 Supplementary Materials. UNIX Fundamentals Course 144 Supplementary Materials UNIX Fundamentals 1 Background to UNIX Command Fundamentals This appendix provides a overview of critical commands and concepts Prerequisite knowledge attendees should

More information

Setting up a Chaincoin Masternode

Setting up a Chaincoin Masternode Setting up a Chaincoin Masternode Introduction So you want to set up your own Chaincoin Masternode? You ve come to the right place! These instructions are correct as of April, 2017, and relate to version

More information

Configuring the Cisco NAM 2220 Appliance

Configuring the Cisco NAM 2220 Appliance CHAPTER 5 This section describes how to configure the Cisco NAM 2220 appliance to establish network connectivity, configure IP parameters, and how to perform other required administrative tasks using the

More information

Introduction to Linux (Part II) BUPT/QMUL 2018/03/21

Introduction to Linux (Part II) BUPT/QMUL 2018/03/21 Introduction to Linux (Part II) BUPT/QMUL 2018/03/21 Contents 10. vi 11. Other commands 12. Developing tools 2 10. Editor - vi Text editor Insert mode Override mode Use sub-commands Tradition tools and

More information

ITEC451 Network Design & Analysis Laboratory Guide: Appendix

ITEC451 Network Design & Analysis Laboratory Guide: Appendix Linux Guide Accessing the command prompt Before you can access the command prompt, you must login to the system. The administrative user on Linux machines is named root. On most Linux distributions, you

More information

Getting Started With UNIX Lab Exercises

Getting Started With UNIX Lab Exercises Getting Started With UNIX Lab Exercises This is the lab exercise handout for the Getting Started with UNIX tutorial. The exercises provide hands-on experience with the topics discussed in the tutorial.

More information

MDS - UNIX SYSTEM ADMINISTRATOR MANUAL. INTRODUCTION... i

MDS - UNIX SYSTEM ADMINISTRATOR MANUAL. INTRODUCTION... i MDS - UNIX SYSTEM ADMINISTRATOR MANUAL INTRODUCTION........................... i SUPER USER MENU.......................... 1 1 SET USER PRIVILEGE..................... 2 2 MAKE USER.........................

More information

Command-Line Interfaces

Command-Line Interfaces CHAPTER 2 This chapter describes the CLIs you use to configure the Catalyst 4500 series switch. This chapter includes the following major sections: Accessing the Switch CLI, page 2-2 Performing Command-Line

More information

client X11 Linux workstation

client X11 Linux workstation LPIC1 LPIC Linux: System Administrator LPIC 1 LPI command line LPIC-1 Linux LPIC-1 client X11 Linux workstation Unix GNU Linux Fundamentals Unix and its Design Principles FSF and GNU GPL - General Public

More information

Using the Command-Line Interface

Using the Command-Line Interface CHAPTER 2 This chapter describes the Cisco IOS command-line interface (CLI) and how to use it to configure your Cisco ME 3400 Ethernet Access switch. It contains these sections: Understanding Command Modes,

More information

Using the Zoo Workstations

Using the Zoo Workstations Using the Zoo Workstations Version 1.86: January 16, 2014 If you ve used Linux before, you can probably skip many of these instructions, but skim just in case. Please direct corrections and suggestions

More information

CSE Linux VM. For Microsoft Windows. Based on opensuse Leap 42.2

CSE Linux VM. For Microsoft Windows. Based on opensuse Leap 42.2 CSE Linux VM For Microsoft Windows Based on opensuse Leap 42.2 Dr. K. M. Flurchick February 2, 2017 Contents 1 Introduction 1 2 Requirements 1 3 Procedure 1 4 Usage 3 4.1 Start/Stop.................................................

More information

CSE 265: System and Network Administration

CSE 265: System and Network Administration CSE 265: System and Network Administration System startup and shutdown Bootstrapping Booting PCs Boot loaders Booting into single user mode Startup scripts Rebooting and shutting down Bootstrapping i.e.,

More information

CSE 265: System and Network Administration

CSE 265: System and Network Administration CSE 265: System and Network Administration System startup and shutdown Bootstrapping Booting PCs Boot loaders Booting into single user mode Startup scripts Rebooting and shutting down Bootstrapping i.e.,

More information

Introduction. SSH Secure Shell Client 1

Introduction. SSH Secure Shell Client 1 SSH Secure Shell Client 1 Introduction An SSH Secure Shell Client is a piece of software that allows a user to do a number of functions. Some of these functions are: file transferring, setting permissions,

More information

Introduction to Linux. Woo-Yeong Jeong Computer Systems Laboratory Sungkyunkwan University

Introduction to Linux. Woo-Yeong Jeong Computer Systems Laboratory Sungkyunkwan University Introduction to Linux Woo-Yeong Jeong (wooyeong@csl.skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu What is Linux? A Unix-like operating system of a computer What is an

More information

AST2500 ibmc Configuration Guide

AST2500 ibmc Configuration Guide AST2500 ibmc Configuration Guide Version 1.0b Copyright Copyright 2017 MITAC COMPUTING TECHNOLOGY CORPORATION. All rights reserved. No part of this manual may be reproduced or translated without prior

More information

You can use the WinSCP program to load or copy (FTP) files from your computer onto the Codd server.

You can use the WinSCP program to load or copy (FTP) files from your computer onto the Codd server. CODD SERVER ACCESS INSTRUCTIONS OVERVIEW Codd (codd.franklin.edu) is a server that is used for many Computer Science (COMP) courses. To access the Franklin University Linux Server called Codd, an SSH connection

More information

CHE3935. Lecture 1. Introduction to Linux

CHE3935. Lecture 1. Introduction to Linux CHE3935 Lecture 1 Introduction to Linux 1 Logging In PuTTY is a free telnet/ssh client that can be run without installing it within Windows. It will only give you a terminal interface, but used with a

More information

The Linux IPL Procedure

The Linux IPL Procedure The Linux IPL Procedure SHARE - Tampa February 13, 2007 Session 9274 Edmund MacKenty Rocket Software, Inc. Purpose De-mystify the Linux boot sequence Explain what happens each step of the way Describe

More information

Getting Started with UNIX

Getting Started with UNIX Getting Started with UNIX What is UNIX? Boston University Information Services & Technology Course Number: 4000 Course Instructor: Kenny Burns Operating System Interface between a user and the computer

More information

grub-md5-crypt --help Usage: grub-md5-crypt [OPTION] Encrypt a password in MD5 format.

grub-md5-crypt --help Usage: grub-md5-crypt [OPTION] Encrypt a password in MD5 format. (OS Hardening). Minimal.1. grub.2..3. DVD Update.4. root ssh.5 kernel grub kernel.6. comment vi /etc/grub.conf # grub.conf generated by anaconda # # Note that you do not have to rerun grub after making

More information

Guide to Linux+, Fourth Edition Chapter 2 Solutions

Guide to Linux+, Fourth Edition Chapter 2 Solutions Guide to Linux+, Fourth Edition Chapter 2 Solutions Review Questions 1. What is the default shell in Linux called? a. SH b. BSH c. CSH d. BASH Answer: d 2. What equivalent to the man command generally

More information

Booting up and Shutting down A primer for troubleshooting

Booting up and Shutting down A primer for troubleshooting Booting up and Shutting down A primer for troubleshooting In this section, we touch upon the startup and shutdown process on Linux. It is beyond the scope of this course to cover this topic in depth and

More information

Linux Exercise. pwd answer: We call this directory (into which you get when you log in) your home directory.

Linux Exercise. pwd answer: We call this directory (into which you get when you log in) your home directory. Linux Exercise The following steps will guide you through the most common Linux commands. If you are using windows (Library and any Windows lab on campus), then start with step 1. If you are using a linux

More information

EKT332 COMPUTER NETWORK

EKT332 COMPUTER NETWORK EKT332 COMPUTER NETWORK LAB 1 INTRODUCTION TO GNU/LINUX OS Lab #1 : Introduction to GNU/Linux OS Objectives 1. Introduction to Linux File System (Red Hat Distribution). 2. Introduction to various packages

More information

The kernel is the low-level software that manages hardware, multitasks programs, etc.

The kernel is the low-level software that manages hardware, multitasks programs, etc. November 2011 1 Why Use Linux? Save Money Initial purchase and maintenance Resume Linux is used by MANY organizations More choices Tons of Linux operating systems November 2011 2 What is Linux? 1. Contains

More information

Managing Users, Managing Security

Managing Users, Managing Security CHAPTER 19 Managing Users, Managing Security The heart of Linux security is determining who can use what file and what kind of use is permitted. This is not all there is to making Linux a more secure system,

More information

eftp Application User Guide

eftp Application User Guide Team A eftp User Guide 1/30 eftp Application User Guide Table of Contents Page 1. Acknowledgement 2 2. Introduction a. Welcome eftp Audience 3 b. What s in this manual 3 c. Manual Conventions 3 d. Getting

More information

LAB #5 Intro to Linux and Python on ENGR

LAB #5 Intro to Linux and Python on ENGR LAB #5 Intro to Linux and Python on ENGR 1. Pre-Lab: In this lab, we are going to download some useful tools needed throughout your CS career. First, you need to download a secure shell (ssh) client for

More information

Basic File Attributes

Basic File Attributes Basic File Attributes The UNIX file system allows the user to access other files not belonging to them and without infringing on security. A file has a number of attributes (properties) that are stored

More information

UNIX: Using PICO on Central UNIX

UNIX: Using PICO on Central UNIX Using PICO on Central UNIX SYNOPSIS This chapter provides a summary of the basic pico commands. Basic operations such as cursor movement, inserting and deleting text, and searches are covered to give the

More information

Linux/Cygwin Practice Computer Architecture

Linux/Cygwin Practice Computer Architecture Linux/Cygwin Practice 2010 Computer Architecture Linux Login Use ssh client applications to connect (Port : 22) SSH Clients zterm ( http://www.brainz.co.kr/products/products4_2.php ) Putty ( http://kldp.net/frs/download.php/3411/hangulputty-0.58.h2.exe

More information

IMPORTANT: Logging Off LOGGING IN

IMPORTANT: Logging Off LOGGING IN These are a few basic Unix commands compiled from Unix web sites, and printed materials. The main purpose is to help a beginner to go around with fewer difficulties. Therefore, I will be adding to this

More information

Using WestGrid from the desktop Oct on Access Grid

Using WestGrid from the desktop Oct on Access Grid Using WestGrid from the desktop Oct 11 2007 on Access Grid Introduction Simon Sharpe, UCIT Client Services The best way to contact WestGrid support is to email support@westgrid.ca This seminar gives you

More information

CSE 391 Lecture 3. bash shell continued: processes; multi-user systems; remote login; editors

CSE 391 Lecture 3. bash shell continued: processes; multi-user systems; remote login; editors CSE 391 Lecture 3 bash shell continued: processes; multi-user systems; remote login; editors slides created by Marty Stepp, modified by Jessica Miller and Ruth Anderson http://www.cs.washington.edu/391/

More information

CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX

CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the EECS labs that dual boot

More information

Stop all processes and then reboot - same as above startx. Log in as superuser from current login exit

Stop all processes and then reboot - same as above startx. Log in as superuser from current login exit Starting & Stopping shutdown -h now Shutdown the system now and do not reboot shutdown -r 5 Shutdown the system in 5 minutes and reboot shutdown -r now Shutdown the system now and reboot reboot Stop all

More information

Helsinki 19 Jan Practical course in genome bioinformatics DAY 0

Helsinki 19 Jan Practical course in genome bioinformatics DAY 0 Helsinki 19 Jan 2017 529028 Practical course in genome bioinformatics DAY 0 This document can be downloaded at: http://ekhidna.biocenter.helsinki.fi/downloads/teaching/spring2017/exercises_day0.pdf The

More information

How to Use This Lab Manual

How to Use This Lab Manual 3 Contents How to Use This Lab Manual........................................ 5 Lab 1: Setting Up the Student System.................................. 7 Lab 2: Installing Fedora............................................

More information

Physics REU Unix Tutorial

Physics REU Unix Tutorial Physics REU Unix Tutorial What is unix? Unix is an operating system. In simple terms, its the set of programs that makes a computer work. It can be broken down into three parts. (1) kernel: The component

More information

Unix File System. Learning command-line navigation of the file system is essential for efficient system usage

Unix File System. Learning command-line navigation of the file system is essential for efficient system usage ULI101 Week 02 Week Overview Unix file system File types and file naming Basic file system commands: pwd,cd,ls,mkdir,rmdir,mv,cp,rm man pages Text editing Common file utilities: cat,more,less,touch,file,find

More information

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 1.0, Last Edited 09/20/2005 Name of Students: Date of Experiment: Part I: Objective The objective of the exercises

More information

Performing Maintenance Operations

Performing Maintenance Operations This chapter describes how to back up and restore Cisco Mobility Services Engine (MSE) data and how to update the MSE software. It also describes other maintenance operations. Guidelines and Limitations,

More information

INF322 Operating Systems

INF322 Operating Systems Galatasaray University Computer Engineering Department INF322 Operating Systems TP01: Introduction to Linux Ozan Çağlayan ocaglayan@gsu.edu.tr ozancaglayan.com Fundamental Concepts Definition of Operating

More information

Red Hat Network Satellite 5.0.0: Virtualization Step by Step

Red Hat Network Satellite 5.0.0: Virtualization Step by Step Red Hat Network Satellite 5.0.0: Virtualization Step by Step By Máirín Duffy, Red Hat Network Engineering Abstract Red Hat Network Satellite 5.0 is the first Satellite release to include virtual platform

More information

Presented by Bill Genske Gary Jackson

Presented by Bill Genske Gary Jackson Quintessential School Systems Session C Linux Presented by Bill Genske Gary Jackson Copyright Quintessential School Systems, 2009 All Rights Reserved 867 American Street --- Second Floor --- San Carlos,

More information

CS Fundamentals of Programming II Fall Very Basic UNIX

CS Fundamentals of Programming II Fall Very Basic UNIX CS 215 - Fundamentals of Programming II Fall 2012 - Very Basic UNIX This handout very briefly describes how to use Unix and how to use the Linux server and client machines in the CS (Project) Lab (KC-265)

More information

IT Essentials v6.0 Windows 10 Software Labs

IT Essentials v6.0 Windows 10 Software Labs IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows

More information

Command Line Interface The basics

Command Line Interface The basics Command Line Interface The basics Marco Berghoff, SCC, KIT Steinbuch Centre for Computing (SCC) Funding: www.bwhpc-c5.de Motivation In the Beginning was the Command Line by Neal Stephenson In contrast

More information

Automatically Logging on a User at Linux System Boot time for Console Management

Automatically Logging on a User at Linux System Boot time for Console Management Automatically Logging on a User at Linux System Boot time for Console Management This document can be found on the web at www.ibm.com/support/techdocs Search for author s name under the category of White

More information

Washington WASHINGTON UNIVERSITY IN ST LOUIS

Washington WASHINGTON UNIVERSITY IN ST LOUIS NetBSD Installation Procedure NetBSD Installation for the Washington University Gigabit Switch Kits Program Presented by: jdd@arl.wustl.edu http://www.arl.wustl.edu/~jdd http://www.arl.wustl.edu/arl Applied

More information

LAB #7 Linux Tutorial

LAB #7 Linux Tutorial Gathering information: LAB #7 Linux Tutorial Find the password file on a Linux box Scenario You have access to a Linux computer. You must find the password file on the computer. Objective Get a listing

More information

mkdir Phys338 s2017 Draw the tree of the directories and files for this step and all the following cd Phys338 s2017

mkdir Phys338 s2017 Draw the tree of the directories and files for this step and all the following cd Phys338 s2017 Linux Exercise The following steps will guide you through the most common Linux commands. If you are using windows (Library and any Windows lab on campus), then start with step 1. If you are using a linux

More information

Helpful Tips for Labs. CS140, Spring 2015

Helpful Tips for Labs. CS140, Spring 2015 Helpful Tips for Labs CS140, Spring 2015 Linux/Unix Commands Creating, Entering, Changing Directories to Create a Directory (a Folder) on the command line type mkdir folder_name to Enter that Folder cd

More information

Short Read Sequencing Analysis Workshop

Short Read Sequencing Analysis Workshop Short Read Sequencing Analysis Workshop Day 2 Learning the Linux Compute Environment In-class Slides Matt Hynes-Grace Manager of IT Operations, BioFrontiers Institute Review of Day 2 Videos Video 1 Introduction

More information

Week Overview. Unix file system File types and file naming Basic file system commands: pwd,cd,ls,mkdir,rmdir,mv,cp,rm man pages

Week Overview. Unix file system File types and file naming Basic file system commands: pwd,cd,ls,mkdir,rmdir,mv,cp,rm man pages ULI101 Week 02 Week Overview Unix file system File types and file naming Basic file system commands: pwd,cd,ls,mkdir,rmdir,mv,cp,rm man pages Text editing Common file utilities: cat,more,less,touch,file,find

More information

15-122: Principles of Imperative Computation

15-122: Principles of Imperative Computation 15-122: Principles of Imperative Computation Lab 0 Navigating your account in Linux Tom Cortina, Rob Simmons Unlike typical graphical interfaces for operating systems, here you are entering commands directly

More information

UNLV Computer Science Department CS 135 Lab Manual

UNLV Computer Science Department CS 135 Lab Manual UNLV Computer Science Department CS 135 Lab Manual prepared by Lee Misch revised July 2013 CS 135 Lab Manual Content Page Introduction 3 CS Computer Accounts. 3 TBE B361 Computer Basics. 3 Choosing an

More information

Lecture # 2 Introduction to UNIX (Part 2)

Lecture # 2 Introduction to UNIX (Part 2) CS390 UNIX Programming Spring 2009 Page 1 Lecture # 2 Introduction to UNIX (Part 2) UNIX is case sensitive (lowercase, lowercase, lowercase) Logging in (Terminal Method) Two basic techniques: 1. Network

More information

WLM1200-RMTS User s Guide

WLM1200-RMTS User s Guide WLM1200-RMTS User s Guide Copyright 2011, Juniper Networks, Inc. 1 WLM1200-RMTS User Guide Contents WLM1200-RMTS Publication Suite........................................ 2 WLM1200-RMTS Hardware Description....................................

More information

HOW LINUX BOOTS. As it turns out, there isn t much to the boot process:

HOW LINUX BOOTS. As it turns out, there isn t much to the boot process: 3 HOW LINUX BOOTS You now know the physical structure of a Linux system, what the kernel is, and how to work with processes. This chapter teaches you how the system starts (boots) that is, how the kernel

More information

Sysinstall main menu. Move the cursor down by using the DOWN-ARROW and select Standard.

Sysinstall main menu. Move the cursor down by using the DOWN-ARROW and select Standard. Initial Boot from Install Disc 1 Turn on the power for your machine. Sysinstall main menu Immediately place the first CD-ROM of the FreeBSD 5.3 install set in your machine's CD-ROM drive. You'll see an

More information