OPERATING SYSTEMS LINUX

Size: px
Start display at page:

Download "OPERATING SYSTEMS LINUX"

Transcription

1 OPERATING SYSTEMS LINUX Božo Krstajić, PhD, University of Montenegro Podgorica

2 Process management Linux operating systems work with processes. Basically a process consists of program code (named text), data (used by a program) and a stack. The stack is used by the program to store variables. Programs are at least one process. You have control over all the processes that you start. A user can control a process by sending signals to the process.

3 Process management ps The ps command is used to report which processes are currently active. The ps without any parameters shows which processes are active in the current user session. $ ps PID TTY TIME CMD 1191 pts/2 00:00:00 bash 1216 pts/2 00:00:00 ps

4 Process management As you can see each process has a process ID (PID). All running processes are given a unique identifier (PID). On 2.2.x kernels, this process ID can be anywhere between 1 and You will need the process number if you want to send a signal to a process, for example a kill signal (for stopping process execution). The TTY column indicated which terminal the process is running on. The TIME column indicated how much CPU time the process has been running. Finally, the CMD column shows what the program actually is. It only lists the base name of the program, not any command line options.

5 Process management The ps has many parameters to modify the output. Have a look at the ps manual pages. You can get a complete listing of the processes running on your system using the right combination of options: ps ax There is a new column: STAT. It shows the status of the process. S stands for sleeping (the process is waiting for something to happen); R stands for running process. For example type and explain: ps aux

6 Process management kill The kill sends a signal to a process. If no signal is specified the TERM signal is send, which asks a process to exit gracefully. kill [ sig_numb] PID Example 1: Kill process which started with command mc ps x grep mc kill 1024 ps x grep mc

7 Process management The kill -l displays a list of signals that can be sent. The SIGKILL signal is often used to kill processes that refuse to terminate with the default SIGTERM signal. The signal can be specified by using the number as a parameter: kill -9 PID

8 Background processes Normally a process takes control over the screen and keyboard after it is started. Programs started from the command line start up in the foreground. It is also possible to start processes as a background process, this means that the shell starts the process, but keeps control over the terminal. In most shells a process can be started as a background process by placing an ampersand (&) after the command: command arguments &

9 Example 1 Create script file named EHO.sc which will: - Say : Hi, my friend. Type your name, surname and your personal ID, please: - Assign input values to the property variables. - Show on the screen entered data. - Reenter same data if they are wrong. - Say : Thanks. have nice day if they are correct. Start this script as background process.

10 function inp { Example 1 echo Type Your NAME, SURENAME nad pid read N S P echo Hi $N $S with your pid $P! } function qu { echo Is these date correct? [no/yes or Enter] read answer } inp qu if [ $answer = 'no' ];then inp else echo Thank, have nice day fi

11 Background processes A process that runs in the background can be brought to the foreground using the command: fg %<job ID> You can see which jobs are running, with their job numbers, using the jobs command. For example:./eho.sc & jobs fg %1

12 Stopping processes A process that is running can be stopped by pressing the <Control> and <z> keys simultaneously. Stopped processes can be moved to the foreground with the fg command. Running fg without any parameters moves the last process that was stopped to the foreground. Other processes can be moved to the foreground by specifying the job ID as a parameter to fg. A stopped process can also be told to continue as a background process, by executing bg <job ID>. Executing bg without any parameter will move the last stopped process to the background.

13 Process management Finally, there's a command you can use to display updating information about the processes running on the system. This command is called top, and is started like so: $ top This will display a full screen of information about the processes running on the system, as well as some overall information about the system.

14 Process management This includes: load average, number of processes, the CPU status, free memory information, and details about processes including PID, user, priority, CPU and memory usage information, running time, and program name. It's called top because the most CPU intensive programs will be listed at the top.

15 Essential System Administration -User management You are the administrator of any computers that you have root on. GNU/Linux is a multi-user operating system. This means that multiple users can use the system, and they can use the system simultaneously. First of all, there are several user accounts on each system. Users can be members of groups.

16 User management There are a few reserved users and groups on each system. The most important of these is the root account. The root user is the system administrator. The available user accounts are specified in the file: /etc/passwd. There are no passwords in this file. Passwords are kept in the separate /etc/shadow, as an encrypted string.

17 Default System User Names root The superuser account (UID=0) with unrestricted access. daemon Used for system processes. bin Owns executable sys Owns executable adm Owns accounting and log files uucp Used for UNIX to UNIX copy communication access and files

18 User management Information about groups is stored in /etc/group and /etc/gshadow. It is generally speaking not a good idea to edit these files directly. There are some excellent tools that can help you with user and group administration: adduser, userdel, passwd, groupadd, groupdel, groupmod,

19 adduser Adding and removing users The adduser command combines useradd and passwd in an interactive script. It will ask you to fill in information about the account to-be created. The screen listing below shows a sample session. # adduser

20 Adding and removing users Login name for new user []: john User ID ( UID ) [ defaults to next available ]: <Enter> Initial group [ users ]: <Enter> Additional groups (comma separated) []: <Enter> Home directory [ /home/john ] <Enter> Shell [ /bin/bash ] <Enter> Expiry date (YYYY-MM-DD) []: <Enter> New account will be created as follows:

21 Adding and removing users Login name...: john UID...: [ Next available ] Initial group...: users Additional groups: [ None ] Home directory...: /home/john Shell...: /bin/bash Expiry date...: [ Never ] This is it... if you want to bail out, hit Control-C. Otherwise, press ENTER to go ahead and make the account. <Enter>

22 Adding and removing users Creating new account... Changing the user information for john Enter the new value, or press ENTER for the default Full Name []: John Doe Room Number []: <Enter> Work Phone []: <Enter> Home Phone []: <Enter> Other []: <Enter>

23 Adding and removing users Changing password for john Enter the new password (minimum of 5, maximum of 127 characters) Please use a combination of upper and lower case letters and numbers. New password: password Re-enter new password: password

24 Change a password passwd The passwd command is used to set a password for a user. Running this command as a user without a parameter will change the password for this user. The password command will ask for the old password, once and twice for the new password: $ passwd The root user can set passwords for all users. The passwd command will only ask for the new password. # passwd username

25 userdel Remove a user account Linux offers the userdel tool to remove a user account. Just specify the username as a parameter to remove that user from the system. # userdel bob This will only remove the user account, not the user s home directory and mail spool. Just add the -r parameter to delete the user s home directory and mail spool too. # userdel -r bob

26 SU command It is a good idea to avoid logging in as root. There are many reasons for not doing this. Fortunately the su can give you temporal root privileges. Example: $ whoami bob $ su Password: # whoami root # exit $ whoami bob

27 Adding and removing groups The programs to add and remove groups are very simple: groupadd will just add another entry to the /etc/group file with a unique group ID, while groupdel will remove the specified group. You create a group like so: # groupadd cvs And remove it like so: # groupdel cvs

28 By hand Of course, it is possible to add, modify, and remove users and groups by hand. First, we'll add a new user to the /etc/passwd, /etc/shadow, and /etc/group files. After that use the passwd command to create a new password for the user. Finally, use mkdir to create the new user's home directory (/home/username or in the location you entered into the /etc/passwd file).

29 Example Find and show files:/etc/passwd, /etc/shadow, and /etc/group files. Check content of /home directory Add new user (stud1, users group) Again find and show files:/etc/passwd, /etc/shadow, and /etc/group files and notice diference. Check again content of /home directory. Change the new user password. Remove the new user account and home directory

30 Shutting Down Properly It is very important that the system is shut down properly. Simply turning the power off can cause serious filesystem damage. While the system is on, files are in use even if you aren't doing anything. Remember that there are many processes running in the background all the time. So, when you go to reboot or power down your computer, it is important to do so the right way.

31 Shutting Down Properly The first method is through the shutdown program, and it is probably the most popular. Basic usage of shutdown to turn off the computer is: # shutdown -h now (-h +60) Rebooting the system uses the same command, but substitutes -r for -h : # shutdown -r now The second way of shutting down or powering off the computer is to use the halt and reboot commands.

32 The /etc/rc.d directory The system initialization files are stored in the /etc/rc.d directory. Each task or runlevel is given its own rc file. There are several categories of initialization files: - system startup, - runlevels, - network initilization, - and System V compatibility.

33 System Startup The first program to run under Slackware besides the Linux kernel is init. This program reads the /etc/inittab file to see how to run the system. It runs the /etc/rc.d/rc.s script to prepare the system before going into your desired runlevel. The rc.s file enables your virtual memory, mounts your filesystems, cleans up certain log directories, initializes Plug and Play devices, loads kernel modules, configures PCMCIA devices, sets up serial ports, and runs System V init scripts (if found).

34 Runlevel Initialization Scripts After system initialization is complete, init moves on to runlevel initialization. A runlevel describes the state that your machine will be running in (the runlevel tells init if you will be accepting multiuser logins or just a single user, whether or not you want network services, and if you will be using the X Window, ). The files below define the different runlevels in Slackware Linux: rc.0 - Halt the system (runlevel 0). By default, this is symlinked to rc.6. rc.4 - Multiuser startup (runlevel 4), but in X11 with KDM, GDM, or XDM as the login manager.

35 Runlevel Initialization Scripts rc.6 - Reboot the system (runlevel 6). rc.k - Startup in single user mode (runlevel 1). rc.m - Multiuser mode (runlevels 2 and 3), but with the standard text-based login. This is the default runlevel in Slackware.

36 Network Initialization Runlevels 2, 3, and 4 will start up the network services. The following files are responsible for the network initialization: rc.inet1- Created by netconfig, this file is responsible for configuring the actual network interface. rc.inet2- Runs after rc.inet1 and starts up basic network services. rc.httpd- Starts up the Apache web server. rc.samba- Starts up Windows file and print sharing services. rc.news - Starts up the news server.

37 Other Files rc.cdrom - If enabled, this script will scan for a CD- ROM in a drive and mount it under /cdrom if it finds one. rc.gpm - Starts up general purpose mouse services. Allows you to copy and paste at the Linux console. rc.font - Loads the custom screen font for the console. rc.local - Contains any specific startup commands for your system. This is empty after a fresh install, as it is reserved for local administrators. This script is run after all other initialization has taken place.

38 Automatic: Enabling/disabling scripts To enable a script, all you need to do is add the execute permissions to it. To disable a script, remove the execute permissions from it. Manual: rc.name start rc.name stop

39 Networking configuration Drivers for NICs are installed as kernel modules. The module for your NIC has to be loaded during the initialization of Slackware Linux. On most systems the NIC is automatically detected and configured during the installation of Slackware Linux. You can reconfigure your NIC with the netconfig command. The netconfig adds the driver (module) for the detected card to /etc/rc.d/rc.netdevice. netconfig

40 Configuration of interfaces Network cards are available under Linux through socalled interfaces. The ifconfig command can be used to display the available interfaces details: # ifconfig a Network cards get the name ethn, in which n is a number, starting with 0. Interfaces can be configured in the /etc/rc.d/rc.inet1.conf file. You can simply read the comments, and fill in the required information.

41 Resolving Each computer on the internet has a hostname and IP address-. /etc/hosts is a table of IP addresses with associated hostnames. This file can be used to name computers in a small network. An example of the /etc/hosts file: localhost tazzy.slackfans.org tazzy gideon.slackfans.org

42 Resolving The /etc/resolv.conf file is used to specify which nameservers the system should use. A nameserver converts hostnames to IP addresses. Your provider should have given you at least two nameserver addresses (DNS servers). You can add these nameservers to /etc/resolv.conf by adding the line nameserver ipaddress for each nameserver. For example: nameserver nameserver

43 The internet super server There are two ways to offer TCP/IP services: by running server applications standalone as a daemon or by using the internet super server, inetd. The inetd is a daemon which monitors a range of ports. If a client attempts to connect to a port inetd handles the connection and forwards the connection to the server software which handles that kind of connection. The inetd can be configured using the /etc/inetd.conf file.

44 The internet super server For example: How loaded FTP server? Let s have a look at an example line (for FTP) from inetd.conf: # File Transfer Protocol (FTP) server: # ftp stream tcp nowait root /usr/sbin/tcpd proftpd This line specifies that inetd should accept FTP connections and pass them to tcpd. So, just remove # and reenable initd or reboot host!

45 Apache web server Apache is the most popular web server since Apache can be installed automatically by adding the apache package from the n disk set. After installing Apache it can be started automatically while booting the system by making the /etc/rc.d/rc.httpd file executable. The Apache configuration can be changed in the /etc/apache/httpd.conf file. Apache can be stopped/started/restarted every moment with the apachectl command, and the stop, start and restart parameters. For example, the command to restart Apache: # rc.httpd start/stop/restart # apachectl restart

OPERATING SYSTEMS. Božo Krstajić, PhD, University of Montenegro Podgorica.

OPERATING SYSTEMS. Božo Krstajić, PhD, University of Montenegro Podgorica. OPERATING SYSTEMS Božo Krstajić, PhD, University of Montenegro Podgorica bozok@cg.ac.yu 1 The /etc/rc.d directory The system initialization files are stored in the /etc/rc.d directory. Each task or runlevel

More information

Operating Systems Lab 1 (Users, Groups, and Security)

Operating Systems Lab 1 (Users, Groups, and Security) Operating Systems Lab 1 (Users, Groups, and Security) Overview This chapter covers the most common commands related to users, groups, and security. It will also discuss topics like account creation/deletion,

More information

MANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG

MANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG MANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG Terminals and keyboards have no uniform behavioral pattern. Terminal settings directly impact the keyboard operation.

More information

Lab 2A> ADDING USERS in Linux

Lab 2A> ADDING USERS in Linux Lab 2A> ADDING USERS in Linux Objective In this lab, student will learn how to create user accounts using the Linux operating system. Scenario The XYZ Company has just installed a server running Linux.

More information

Introduction. What is Linux? What is the difference between a client and a server?

Introduction. What is Linux? What is the difference between a client and a server? Linux Kung Fu Introduction What is Linux? What is the difference between a client and a server? What is Linux? Linux generally refers to a group of Unix-like free and open-source operating system distributions

More information

Linux Kung Fu. Ross Ventresca UBNetDef, Fall 2017

Linux Kung Fu. Ross Ventresca UBNetDef, Fall 2017 Linux Kung Fu Ross Ventresca UBNetDef, Fall 2017 GOTO: https://apps.ubnetdef.org/ What is Linux? Linux generally refers to a group of Unix-like free and open source operating system distributions built

More information

Linux Kung Fu. Stephen James UBNetDef, Spring 2017

Linux Kung Fu. Stephen James UBNetDef, Spring 2017 Linux Kung Fu Stephen James UBNetDef, Spring 2017 Introduction What is Linux? What is the difference between a client and a server? What is Linux? Linux generally refers to a group of Unix-like free and

More information

Course 144 Supplementary Materials. UNIX Fundamentals

Course 144 Supplementary Materials. UNIX Fundamentals Course 144 Supplementary Materials UNIX Fundamentals 1 Background to UNIX Command Fundamentals This appendix provides a overview of critical commands and concepts Prerequisite knowledge attendees should

More information

CSE 265: System and Network Administration

CSE 265: System and Network Administration CSE 265: System and Network Administration System startup and shutdown Bootstrapping Booting PCs Boot loaders Booting into single user mode Startup scripts Rebooting and shutting down Bootstrapping i.e.,

More information

CSE 265: System and Network Administration

CSE 265: System and Network Administration CSE 265: System and Network Administration System startup and shutdown Bootstrapping Booting PCs Boot loaders Booting into single user mode Startup scripts Rebooting and shutting down Bootstrapping i.e.,

More information

The kernel is the low-level software that manages hardware, multitasks programs, etc.

The kernel is the low-level software that manages hardware, multitasks programs, etc. November 2011 1 Why Use Linux? Save Money Initial purchase and maintenance Resume Linux is used by MANY organizations More choices Tons of Linux operating systems November 2011 2 What is Linux? 1. Contains

More information

CSE 265: System and Network Administration

CSE 265: System and Network Administration CSE 265: System and Network Administration User accounts The /etc/passwd file The /etc/shadow file Root powers Ownership of files and processes The superuser The /etc/group file Adding users Removing users

More information

Linux System Administration

Linux System Administration System Processes Objective At the conclusion of this module, the student will be able to: Describe and define a process Identify a process ID, the parent process and the child process Learn the PID for

More information

User Accounts. The Passwd, Group, and Shadow Files

User Accounts. The Passwd, Group, and Shadow Files User Accounts The Passwd, Group, and Shadow Files We'll start with the passwd (pronounced "password") file, located at /etc/passwd. This file holds information about all of the user accounts on the system.

More information

Stop all processes and then reboot - same as above startx. Log in as superuser from current login exit

Stop all processes and then reboot - same as above startx. Log in as superuser from current login exit Starting & Stopping shutdown -h now Shutdown the system now and do not reboot shutdown -r 5 Shutdown the system in 5 minutes and reboot shutdown -r now Shutdown the system now and reboot reboot Stop all

More information

CST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management

CST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management Student Name: Lab Section: Linux User and Group Management 1 Due Date - Upload to Blackboard by 8:30am Monday April 2, 2012 Submit the completed lab to Blackboard following the Rules for submitting Online

More information

Basic Linux Security. Roman Bohuk University of Virginia

Basic Linux Security. Roman Bohuk University of Virginia Basic Linux Security Roman Bohuk University of Virginia What is Linux? An open source operating system Project started by Linus Torvalds kernel Kernel: core program that controls everything else (controls

More information

User & Group Administration

User & Group Administration User & Group Administration David Morgan Users useradd/userdel /home/ /etc/passwd is the user database /etc/shadow has passwords (relocated from passwd) /etc/group whoami su / sudo / SUID process

More information

NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1

NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1 NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1 Objective At the conclusion of this lab, the student will be able to add and delete users, create and assign users to groups, and assign users

More information

UNIT V. Dr.T.Logeswari. Unix Shell Programming - Forouzan

UNIT V. Dr.T.Logeswari. Unix Shell Programming - Forouzan UNIT V UNIX SYSTEM COMMUNICATION Dr.T.Logeswari 1 Electronic mail or email is easiest way of communication on unix. Fast and cheap Used to exchange graphics, sound and video files 2 3 Elements of a communication

More information

CL030 is a csage Certification Preparatory Course!

CL030 is a csage Certification Preparatory Course! Corder Enterprises International Building World Class MIS Teams, for you! CL030 is a csage Certification Preparatory Course! CL030 - LINUX System Administration Course Description: Learn and practice essential

More information

Advanced Unix System Administration

Advanced Unix System Administration Advanced Unix System Administration Lecture 5 February 14, 2007 Steven Luo Shared Libraries The dynamic linker Binaries have a symbol table containing functions, etc. and

More information

Exam Linux-Praxis - 1 ( From )

Exam Linux-Praxis - 1 ( From  ) Exam Linux-Praxis - 1 ( From http://www.linux-praxis.de ) (1)Which of the following commands results in mailing the content of the current directory to Bob? A. mail Bob < ls B. ls > mail Bob C. ls mail

More information

Introduction to Linux

Introduction to Linux Introduction to Linux Mukesh Pund Principal Scientist, NISCAIR, New Delhi, India History In 1969, a team of developers developed a new operating system called Unix which was written using C Linus Torvalds,

More information

Certification. System Initialization and Services

Certification. System Initialization and Services Certification System Initialization and Services UNIT 3 System Initialization and Services UNIT 3: Objectives Upon completion of this unit the student should be able to: Describe BIOS functions with respect

More information

Study Guide Processes & Job Control

Study Guide Processes & Job Control Study Guide Processes & Job Control Q1 - PID What does PID stand for? Q2 - Shell PID What shell command would I issue to display the PID of the shell I'm using? Q3 - Process vs. executable file Explain,

More information

Basic UNIX system administration

Basic UNIX system administration Basic UNIX system administration CS 2204 Class meeting 14 *Notes by Doug Bowman and other members of the CS faculty at Virginia Tech. Copyright 2001-2003. System administration Thus far, we ve only discussed:

More information

INTRODUCTION TO LINUX

INTRODUCTION TO LINUX INTRODUCTION TO LINUX REALLY SHORT HISTORY Before GNU/Linux there were DOS, MAC and UNIX. All systems were proprietary. The GNU project started in the early 80s by Richard Stallman Goal to make a free

More information

Redhat Basic. Need. Your. What. Operation G U I D E. Technical Hand Note template version

Redhat Basic. Need. Your. What. Operation G U I D E. Technical Hand Note template version Redhat Basic Operation G U I D E What Need Your www.next-asia.com Readhat Basic Operation Guide, Prepared by Nazmul Khan Page 1 of 43 Redhat Basic Operation Guide RedHat Installation Guide... 2 Installation...

More information

The table below lists the domains measured by this examination and the extent to which they are represented in the examination.

The table below lists the domains measured by this examination and the extent to which they are represented in the examination. Introduction The Linux+ Certification is designed to measure the competencies of the Linux Professional with six to twelve months experience with the Linux operating system. This person provides basic

More information

System Administration. Startup Process

System Administration. Startup Process System Administration Startup Process Why Care? Every process on your system comes about by following a specific chain of events from the machine startup You may want to disable processes You may want

More information

Booting up and Shutting down A primer for troubleshooting

Booting up and Shutting down A primer for troubleshooting Booting up and Shutting down A primer for troubleshooting In this section, we touch upon the startup and shutdown process on Linux. It is beyond the scope of this course to cover this topic in depth and

More information

Process Management forks, bombs, zombies, and daemons! Lecture 5, Hands-On Unix System Administration DeCal

Process Management forks, bombs, zombies, and daemons! Lecture 5, Hands-On Unix System Administration DeCal Process Management forks, bombs, zombies, and daemons! Lecture 5, Hands-On Unix System Administration DeCal 2012-10-01 what is a process? an abstraction! you can think of it as a program in the midst of

More information

Project #3: Implementing NIS

Project #3: Implementing NIS Project #3: Implementing NIS NIS Daemons Limitations of NIS How We Will Use NIS NIS Domain Name NIS Software Setting Up NIS on it20 /etc/nsswitch.conf Creating New Accounts on Ubuntu /etc/passwd /etc/shadow

More information

Everything about Linux User- and Filemanagement

Everything about Linux User- and Filemanagement Everything about Linux User- and Filemanagement Lukas Prokop 20. April 2009 Inhaltsverzeichnis 1 Who I am 2 1.1 whoami..................................... 3 1.2 passwd......................................

More information

Welcome to getting started with Ubuntu Server. This System Administrator Manual. guide to be simple to follow, with step by step instructions

Welcome to getting started with Ubuntu Server. This System Administrator Manual. guide to be simple to follow, with step by step instructions Welcome to getting started with Ubuntu 12.04 Server. This System Administrator Manual guide to be simple to follow, with step by step instructions with screenshots INDEX 1.Installation of Ubuntu 12.04

More information

More Raspian. An editor Configuration files Shell scripts Shell variables System admin

More Raspian. An editor Configuration files Shell scripts Shell variables System admin More Raspian An editor Configuration files Shell scripts Shell variables System admin Nano, a simple editor Nano does not require the mouse. You must use your keyboard to move around the file and make

More information

CST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management

CST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management Student Name: YOUR NAME Lab Section: 011 012 013 or 014 Linux User and Group Management 1 Due Date - Upload to Blackboard by 8:30am Monday April 2, 2012 Submit the completed lab to Blackboard following

More information

Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system...

Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system... Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system... Q) Q) What is the difference between home directory and working directory? Answer

More information

Presented by Bill Genske Gary Jackson

Presented by Bill Genske Gary Jackson Quintessential School Systems Session C Linux Presented by Bill Genske Gary Jackson Copyright Quintessential School Systems, 2009 All Rights Reserved 867 American Street --- Second Floor --- San Carlos,

More information

Linux Essentials Objectives Topics:

Linux Essentials Objectives Topics: Linux Essentials Linux Essentials is a professional development certificate program that covers basic knowledge for those working and studying Open Source and various distributions of Linux. Exam Objectives

More information

Installing Altiris Agent on Ubuntu

Installing Altiris Agent on Ubuntu Installing Altiris Agent on Ubuntu DISCLAIMER: Altiris does not warrant that their software will run on Ubuntu using the Unix Agent version 6.2, which as of publication of this article, is the latest release.

More information

Exercise Sheet 2. (Classifications of Operating Systems)

Exercise Sheet 2. (Classifications of Operating Systems) Exercise Sheet 2 Exercise 1 (Classifications of Operating Systems) 1. At any given moment, only a single program can be executed. What is the technical term for this operation mode? 2. What are half multi-user

More information

Linux Kung-Fu. James Droste UBNetDef Fall 2016

Linux Kung-Fu. James Droste UBNetDef Fall 2016 Linux Kung-Fu James Droste UBNetDef Fall 2016 $ init 1 GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org

More information

User accounts and authorization

User accounts and authorization User accounts and authorization Authentication vs authorization Authentication: proving the identity of someone Authorization: allowing a user to access certain resources 1 Government authorization documents

More information

UNIX System Administration

UNIX System Administration $!... 14:13 $$... 14:13.netrc...12:27-28 /etc/fstab... 6:25 /etc/hosts.equiv... 8:23 /etc/inittab Entries... 4:8 /etc/netmasks... 8:22 /etc/shells... 12:25 /home... 6:69 /tmp...6:61-67 /usr... 6:70 /var...

More information

14. Configuring Telnet in Knoppix

14. Configuring Telnet in Knoppix 14. Configuring Telnet in Knoppix Estimated Time: 45 Minutes Objective In this lab, the student will learn how to configure the Telnet service on a system so that the user can remotely administer a Knoppix

More information

LAB #7 Linux Tutorial

LAB #7 Linux Tutorial Gathering information: LAB #7 Linux Tutorial Find the password file on a Linux box Scenario You have access to a Linux computer. You must find the password file on the computer. Objective Get a listing

More information

TELE 301 Lecture 8: Post

TELE 301 Lecture 8: Post Last Lecture System installation This Lecture Post installation Next Lecture Wireless networking Overview TELE 301 Lecture 8: Post 1 Post-configuration Create user accounts and environments Sort out the

More information

Linux Systems Administration Getting Started with Linux

Linux Systems Administration Getting Started with Linux Linux Systems Administration Getting Started with Linux Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International

More information

Answers to Even- Numbered Exercises

Answers to Even- Numbered Exercises Answers to Even- 17 Numbered Exercises from page 1077 1. What option should you use with fsck if you want to review the status of your filesystems without making any changes to them? How does fsck determine

More information

[ Terminal ] [ Users management ] Alt +F6 = Terminal switcher. useradd [option] JohnG

[ Terminal ] [ Users management ] Alt +F6 = Terminal switcher. useradd [option] JohnG [ Terminal ] Alt +F6 = Terminal switcher [ Users management ] useradd [option] JohnG -d : to assign homedirectory -u : to assign UID -s : to set shell -g : to assign group ID ex) Linux# useradd JohnG -d

More information

Install the Marionnet network simulator on Kali Linux Light vbox-i686

Install the Marionnet network simulator on Kali Linux Light vbox-i686 Install the Marionnet network simulator on Kali Linux Light 2017.1-vbox-i686 August 26, 2017 by Lucian Visinescu (this work is licensed under CC BY-NC 4.0) This installation is based on Install the Marionnet

More information

Chapter 5: User Management. Chapter 5 User Management

Chapter 5: User Management. Chapter 5 User Management Chapter 5: User Management Chapter 5 User Management Last revised: 20/6/2004 Chapter 5 Outline In this chapter we will learn Where user and group account information is stored How to manage user accounts

More information

Authored by: Brian E. Brzezicki Copyright 2013, Paladin Group LLC Reuse without permission is strictly prohibited

Authored by: Brian E. Brzezicki Copyright 2013, Paladin Group LLC Reuse without permission is strictly prohibited Authored by: Brian E. Brzezicki Copyright 2013, Paladin Group LLC Reuse without permission is strictly prohibited Traditionally Unix systems have used the ATT System V initialization mechanism In System

More information

CTEC1863/2018F Bonus Lab Page 1 of 5

CTEC1863/2018F Bonus Lab Page 1 of 5 CTEC1863/2018F Bonus Lab Page 1 of 5 Bonus Lab: OpenSUSE Linux Rescue In this lab, we will install an OpenSUSE virtual machine. However, both the non-root user and the root passwords are unknown. To fix

More information

Unit 2 System startup and shutdown

Unit 2 System startup and shutdown Unit 2 System startup and shutdown Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 5.2 Unit objectives After completing this unit, you should be

More information

The Unix Shell & Shell Scripts

The Unix Shell & Shell Scripts The Unix Shell & Shell Scripts You should do steps 1 to 7 before going to the lab. Use the Linux system you installed in the previous lab. In the lab do step 8, the TA may give you additional exercises

More information

StormTracker EMS 2.3 Installation Instructions. Contents. Document Number EMS-A2-GN10-00 July 2002

StormTracker EMS 2.3 Installation Instructions. Contents. Document Number EMS-A2-GN10-00 July 2002 StormTracker EMS 2.3 Installation Instructions Document Number EMS-A2-GN10-00 July 2002 Contents Overview... 2 Basic StormTracker EMS Functionality... 2 Oware and StormTracker EMS... 2 Supported Systems...

More information

CRUK cluster practical sessions (SLURM) Part I processes & scripts

CRUK cluster practical sessions (SLURM) Part I processes & scripts CRUK cluster practical sessions (SLURM) Part I processes & scripts login Log in to the head node, clust1-headnode, using ssh and your usual user name & password. SSH Secure Shell 3.2.9 (Build 283) Copyright

More information

Freescale FAE75 Training Genesi Pegasos II LinuxTraining. Maurie Ommerman June 10, 2004

Freescale FAE75 Training Genesi Pegasos II LinuxTraining. Maurie Ommerman June 10, 2004 Freescale FAE75 Training Genesi Pegasos II LinuxTraining Maurie Ommerman June 10, 2004 FAE75 Part 3 Debian Linux Maurie Ommerman June 10, 2004 Open Firmware boot script Boot Options Upon PowerUP, this

More information

GNU/Linux: An Essential Guide for Students Undertaking BLOSSOM

GNU/Linux: An Essential Guide for Students Undertaking BLOSSOM Copyright: The development of this document is funded by Higher Education of Academy. Permission is granted to copy, distribute and /or modify this document under a license compliant with the Creative

More information

Programs. Program: Set of commands stored in a file Stored on disk Starting a program creates a process static Process: Program loaded in RAM dynamic

Programs. Program: Set of commands stored in a file Stored on disk Starting a program creates a process static Process: Program loaded in RAM dynamic Programs Program: Set of commands stored in a file Stored on disk Starting a program creates a process static Process: Program loaded in RAM dynamic Types of Processes 1. User process: Process started

More information

Linux Tutorial #6. -rw-r csce_user csce_user 20 Jan 4 09:15 list1.txt -rw-r csce_user csce_user 26 Jan 4 09:16 list2.

Linux Tutorial #6. -rw-r csce_user csce_user 20 Jan 4 09:15 list1.txt -rw-r csce_user csce_user 26 Jan 4 09:16 list2. File system access rights Linux Tutorial #6 Linux provides file system security using a three- level system of access rights. These special codes control who can read/write/execute every file and directory

More information

Linux Interview Questions and Answers

Linux Interview Questions and Answers Linux Interview Questions and Answers You need to see the last fifteen lines of the files dog, cat and horse. What command should you use? tail -15 dog cat horse The tail utility displays the end of a

More information

File System Hierarchy Standard (FHS)

File System Hierarchy Standard (FHS) File System Hierarchy Standard (FHS) Filesystem hierarchy standard describes directory structure and its content in Unix and Unix like operating system. It explains where files and directories should be

More information

Please choose the best answer. More than one answer might be true, but choose the one that is best.

Please choose the best answer. More than one answer might be true, but choose the one that is best. Introduction to Linux and Unix - endterm Please choose the best answer. More than one answer might be true, but choose the one that is best. SYSTEM STARTUP 1. A hard disk master boot record is located:

More information

Perl and R Scripting for Biologists

Perl and R Scripting for Biologists Perl and R Scripting for Biologists Lukas Mueller PLBR 4092 Course overview Linux basics (today) Linux advanced (Aure, next week) Why Linux? Free open source operating system based on UNIX specifications

More information

Commands are in black

Commands are in black Starting From the Shell Prompt (Terminal) Commands are in black / +--------+---------+-------+---------+---------+------ +------ +------ +------ +------ +------ +-- Bin boot dev etc home media sbin bin

More information

Using grub to Boot various Operating Systems

Using grub to Boot various Operating Systems Operating Systems and Systems Integration Using grub to Boot various Operating Systems Contents 1 Aim 2 2 What You Will Do 2 3 Background 2 3.1 Installing grub in MBR from a floppy, and from the OS........

More information

RHCE BOOT CAMP. The Boot Process. Wednesday, November 28, 12

RHCE BOOT CAMP. The Boot Process. Wednesday, November 28, 12 RHCE BOOT CAMP The Boot Process OVERVIEW The boot process gets a machine from the useless off state to the feature rich operating system we all know and love Requires cooperation between hardware and software

More information

G54ADM Sample Exam Questions and Answers

G54ADM Sample Exam Questions and Answers G54ADM Sample Exam Questions and Answers Question 1 Compulsory Question (34 marks) (a) i. Explain the purpose of the UNIX password file. (2 marks) ii. Why doesn t the password file contain passwords? (2

More information

CompTIA Exam LX0-102 Linux Part 2 Version: 10.0 [ Total Questions: 177 ]

CompTIA Exam LX0-102 Linux Part 2 Version: 10.0 [ Total Questions: 177 ] s@lm@n CompTIA Exam LX0-102 Linux Part 2 Version: 10.0 [ Total Questions: 177 ] CompTIA LX0-102 : Practice Test Topic break down Topic No. of Questions Topic 1: Volume A 60 Topic 2: Volume B 59 Topic 3:

More information

More on file systems, Booting Todd Kelley CST8177 Todd Kelley 1

More on file systems, Booting Todd Kelley CST8177 Todd Kelley 1 More on file systems, Booting Todd Kelley kelleyt@algonquincollege.com CST8177 Todd Kelley 1 bind mounts quotas Booting process and SysVinit Installation Disk rescue mode 2 A bind mount is used to mount

More information

System Programming. Introduction to Unix

System Programming. Introduction to Unix Content : by Dr. B. Boufama School of Computer Science University of Windsor Instructor: Dr. A. Habed adlane@cs.uwindsor.ca http://cs.uwindsor.ca/ adlane/60-256 Content Content 1 Introduction 2 3 Introduction

More information

Bamuengine.com. Chapter 7. The Process

Bamuengine.com. Chapter 7. The Process Chapter 7. The Process Introduction A process is an OS abstraction that enables us to look at files and programs as their time image. This chapter discusses processes, the mechanism of creating a process,

More information

Contents in Detail. Acknowledgments

Contents in Detail. Acknowledgments Acknowledgments xix Introduction What s in This Book... xxii What Is Ethical Hacking?... xxiii Penetration Testing... xxiii Military and Espionage... xxiii Why Hackers Use Linux... xxiv Linux Is Open Source....

More information

The Linux IPL Procedure

The Linux IPL Procedure The Linux IPL Procedure SHARE - Tampa February 13, 2007 Session 9274 Edmund MacKenty Rocket Software, Inc. Purpose De-mystify the Linux boot sequence Explain what happens each step of the way Describe

More information

22-Sep CSCI 2132 Software Development Lecture 8: Shells, Processes, and Job Control. Faculty of Computer Science, Dalhousie University

22-Sep CSCI 2132 Software Development Lecture 8: Shells, Processes, and Job Control. Faculty of Computer Science, Dalhousie University Lecture 8 p.1 Faculty of Computer Science, Dalhousie University CSCI 2132 Software Development Lecture 8: Shells, Processes, and Job Control 22-Sep-2017 Location: Goldberg CS 127 Time: 14:35 15:25 Instructor:

More information

HOW LINUX BOOTS. As it turns out, there isn t much to the boot process:

HOW LINUX BOOTS. As it turns out, there isn t much to the boot process: 3 HOW LINUX BOOTS You now know the physical structure of a Linux system, what the kernel is, and how to work with processes. This chapter teaches you how the system starts (boots) that is, how the kernel

More information

Some Ubuntu Practice...

Some Ubuntu Practice... Some Ubuntu Practice... SANOG 10 August 29 New Delhi, India 1. Get used to using sudo 2. Create an inst account 3. Learn how to install software 4. Install gcc and make 5. Learn how to control services

More information

Lab Authentication, Authorization, and Accounting

Lab Authentication, Authorization, and Accounting Objectives Given a scenario, select the appropriate authentication, authorization, or access control Install and configure security controls when performing account management, based on best practices

More information

Users and Groups. his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and UNIX groups.

Users and Groups. his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and UNIX groups. cameron.book Page 19 Monday, June 30, 2003 8:51 AM C H A P T E R 4 Users and Groups T his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and

More information

List of Linux Commands in an IPm

List of Linux Commands in an IPm List of Linux Commands in an IPm Directory structure for Executables bin: ash cpio false ln mount rm tar zcat busybox date getopt login mv rmdir touch cat dd grep ls perl sed true chgrp df gunzip mkdir

More information

h/w m/c Kernel shell Application s/w user

h/w m/c Kernel shell Application s/w user Structure of Unix h/w m/c Kernel shell Application s/w. user While working with unix, several layers of interaction occur b/w the computer h/w & the user. 1. Kernel : It is the first layer which runs on

More information

HANDS UP IF YOU DON T HAVE A VM OR IF YOU DON T REMEMBER YOUR PASSWORDS. Or something broke

HANDS UP IF YOU DON T HAVE A VM OR IF YOU DON T REMEMBER YOUR PASSWORDS. Or something broke HANDS UP IF YOU DON T HAVE A VM OR IF YOU DON T REMEMBER YOUR PASSWORDS Or something broke Securing your VM 101 Getting Comfy in Linux -> Comfort ++ You After This Talk Quick recap from last week. Setup

More information

elinks, mail processes nice ps, pstree, top job control, jobs, fg, bg signals, kill, killall crontab, anacron, at

elinks, mail processes nice ps, pstree, top job control, jobs, fg, bg signals, kill, killall crontab, anacron, at Processes 1 elinks, mail processes nice ps, pstree, top job control, jobs, fg, bg signals, kill, killall crontab, anacron, at 2 elinks is a text-based (character mode) web browser we will use it to enable

More information

Start Up and Shutdown Procedures (Unix)

Start Up and Shutdown Procedures (Unix) Start Up and Shutdown Procedures (Unix) Start Up On Main Console 1. Press the Server main power button ON 2. The system will automatically go through the start-up procedures, which will be displayed on

More information

Ubuntu Practice and Configuration Post Installation Exercises interlab at AIT Bangkok, Thailand

Ubuntu Practice and Configuration Post Installation Exercises interlab at AIT Bangkok, Thailand Ubuntu Practice and Configuration Post Installation Exercises interlab at AIT Bangkok, Thailand 1. Get used to using sudo 2. Create an inst account 3. Learn how to install software 4. Update /etc/apt/sources.list

More information

Processes are subjects.

Processes are subjects. Identification and Authentication Access Control Other security related things: Devices, mounting filesystems Search path TCP wrappers Race conditions NOTE: filenames may differ between OS/distributions

More information

Runlevels, System Shutdown and Reboot

Runlevels, System Shutdown and Reboot Information These notes were originally written in the year 2000 as part of a set of LPI Exam 101 training materials. The LPI training course at Bromley College was subsequently discontinued and some of

More information

CSE 391 Lecture 3. bash shell continued: processes; multi-user systems; remote login; editors

CSE 391 Lecture 3. bash shell continued: processes; multi-user systems; remote login; editors CSE 391 Lecture 3 bash shell continued: processes; multi-user systems; remote login; editors slides created by Marty Stepp, modified by Jessica Miller and Ruth Anderson http://www.cs.washington.edu/391/

More information

10 userdel: deleting a user account 9. 1 Context Tune the user environment and system environment variables [3]

10 userdel: deleting a user account 9. 1 Context Tune the user environment and system environment variables [3] 1. Context 1.111.1 2 8 Deleting a group 8 1.111.1 Manage users and group accounts and related system files Weight 4 Outline Contents Linux Professional Institute Certification 102 Nick Urbanik

More information

Using LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12)

Using LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12) Using LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12) Objective: Learn some basic aspects of the UNIX operating system and how to use it. What is UNIX? UNIX is the operating system used by most computers

More information

Adding users actions/mechanics

Adding users actions/mechanics User management-- a generalized management script example David Morgan Adding users actions/mechanics add record to /etc/passwd add record to /etc/shadow add record to /etc/group for user s default group

More information

My Own Help On Unix Environment

My Own Help On Unix Environment My Own Help On Unix Environment ***** *** * This is my own collection on some tips/hints to help my work on Unix Environment. As my Unix is my second skill, hence the information here is very basic and

More information

Introduction to Linux (Part I) BUPT/QMUL 2018/03/14

Introduction to Linux (Part I) BUPT/QMUL 2018/03/14 Introduction to Linux (Part I) BUPT/QMUL 2018/03/14 Contents 1. Background on Linux 2. Starting / Finishing 3. Typing Linux Commands 4. Commands to Use Right Away 5. Linux help continued 2 Contents 6.

More information

HP-UX System Administration Course Overview. Skills Gained. Who will the Course Benefit?

HP-UX System Administration Course Overview. Skills Gained. Who will the Course Benefit? HP-UX System Administration Course Overview This Hewlett Packard HP-UX System Administration training course is designed to give delegates practical experience in the administration of an HP-UX UNIX System.

More information

Lab on User administration

Lab on User administration Lab on User administration To add user #useradd [options] -c Change the comment field. This is often the users full name. -d Change the home directory -e Set

More information

Linux Reference Card - Command Summary

Linux Reference Card - Command Summary Linux Reference Card - Command Summary adduser adduser dsoneil This command will automatically add a new user to the system The Bash script can be found in /usr/sbin if it needs to be changes alias alias

More information