OPERATING SYSTEMS LINUX
|
|
- Dana Simpson
- 5 years ago
- Views:
Transcription
1 OPERATING SYSTEMS LINUX Božo Krstajić, PhD, University of Montenegro Podgorica
2 Process management Linux operating systems work with processes. Basically a process consists of program code (named text), data (used by a program) and a stack. The stack is used by the program to store variables. Programs are at least one process. You have control over all the processes that you start. A user can control a process by sending signals to the process.
3 Process management ps The ps command is used to report which processes are currently active. The ps without any parameters shows which processes are active in the current user session. $ ps PID TTY TIME CMD 1191 pts/2 00:00:00 bash 1216 pts/2 00:00:00 ps
4 Process management As you can see each process has a process ID (PID). All running processes are given a unique identifier (PID). On 2.2.x kernels, this process ID can be anywhere between 1 and You will need the process number if you want to send a signal to a process, for example a kill signal (for stopping process execution). The TTY column indicated which terminal the process is running on. The TIME column indicated how much CPU time the process has been running. Finally, the CMD column shows what the program actually is. It only lists the base name of the program, not any command line options.
5 Process management The ps has many parameters to modify the output. Have a look at the ps manual pages. You can get a complete listing of the processes running on your system using the right combination of options: ps ax There is a new column: STAT. It shows the status of the process. S stands for sleeping (the process is waiting for something to happen); R stands for running process. For example type and explain: ps aux
6 Process management kill The kill sends a signal to a process. If no signal is specified the TERM signal is send, which asks a process to exit gracefully. kill [ sig_numb] PID Example 1: Kill process which started with command mc ps x grep mc kill 1024 ps x grep mc
7 Process management The kill -l displays a list of signals that can be sent. The SIGKILL signal is often used to kill processes that refuse to terminate with the default SIGTERM signal. The signal can be specified by using the number as a parameter: kill -9 PID
8 Background processes Normally a process takes control over the screen and keyboard after it is started. Programs started from the command line start up in the foreground. It is also possible to start processes as a background process, this means that the shell starts the process, but keeps control over the terminal. In most shells a process can be started as a background process by placing an ampersand (&) after the command: command arguments &
9 Example 1 Create script file named EHO.sc which will: - Say : Hi, my friend. Type your name, surname and your personal ID, please: - Assign input values to the property variables. - Show on the screen entered data. - Reenter same data if they are wrong. - Say : Thanks. have nice day if they are correct. Start this script as background process.
10 function inp { Example 1 echo Type Your NAME, SURENAME nad pid read N S P echo Hi $N $S with your pid $P! } function qu { echo Is these date correct? [no/yes or Enter] read answer } inp qu if [ $answer = 'no' ];then inp else echo Thank, have nice day fi
11 Background processes A process that runs in the background can be brought to the foreground using the command: fg %<job ID> You can see which jobs are running, with their job numbers, using the jobs command. For example:./eho.sc & jobs fg %1
12 Stopping processes A process that is running can be stopped by pressing the <Control> and <z> keys simultaneously. Stopped processes can be moved to the foreground with the fg command. Running fg without any parameters moves the last process that was stopped to the foreground. Other processes can be moved to the foreground by specifying the job ID as a parameter to fg. A stopped process can also be told to continue as a background process, by executing bg <job ID>. Executing bg without any parameter will move the last stopped process to the background.
13 Process management Finally, there's a command you can use to display updating information about the processes running on the system. This command is called top, and is started like so: $ top This will display a full screen of information about the processes running on the system, as well as some overall information about the system.
14 Process management This includes: load average, number of processes, the CPU status, free memory information, and details about processes including PID, user, priority, CPU and memory usage information, running time, and program name. It's called top because the most CPU intensive programs will be listed at the top.
15 Essential System Administration -User management You are the administrator of any computers that you have root on. GNU/Linux is a multi-user operating system. This means that multiple users can use the system, and they can use the system simultaneously. First of all, there are several user accounts on each system. Users can be members of groups.
16 User management There are a few reserved users and groups on each system. The most important of these is the root account. The root user is the system administrator. The available user accounts are specified in the file: /etc/passwd. There are no passwords in this file. Passwords are kept in the separate /etc/shadow, as an encrypted string.
17 Default System User Names root The superuser account (UID=0) with unrestricted access. daemon Used for system processes. bin Owns executable sys Owns executable adm Owns accounting and log files uucp Used for UNIX to UNIX copy communication access and files
18 User management Information about groups is stored in /etc/group and /etc/gshadow. It is generally speaking not a good idea to edit these files directly. There are some excellent tools that can help you with user and group administration: adduser, userdel, passwd, groupadd, groupdel, groupmod,
19 adduser Adding and removing users The adduser command combines useradd and passwd in an interactive script. It will ask you to fill in information about the account to-be created. The screen listing below shows a sample session. # adduser
20 Adding and removing users Login name for new user []: john User ID ( UID ) [ defaults to next available ]: <Enter> Initial group [ users ]: <Enter> Additional groups (comma separated) []: <Enter> Home directory [ /home/john ] <Enter> Shell [ /bin/bash ] <Enter> Expiry date (YYYY-MM-DD) []: <Enter> New account will be created as follows:
21 Adding and removing users Login name...: john UID...: [ Next available ] Initial group...: users Additional groups: [ None ] Home directory...: /home/john Shell...: /bin/bash Expiry date...: [ Never ] This is it... if you want to bail out, hit Control-C. Otherwise, press ENTER to go ahead and make the account. <Enter>
22 Adding and removing users Creating new account... Changing the user information for john Enter the new value, or press ENTER for the default Full Name []: John Doe Room Number []: <Enter> Work Phone []: <Enter> Home Phone []: <Enter> Other []: <Enter>
23 Adding and removing users Changing password for john Enter the new password (minimum of 5, maximum of 127 characters) Please use a combination of upper and lower case letters and numbers. New password: password Re-enter new password: password
24 Change a password passwd The passwd command is used to set a password for a user. Running this command as a user without a parameter will change the password for this user. The password command will ask for the old password, once and twice for the new password: $ passwd The root user can set passwords for all users. The passwd command will only ask for the new password. # passwd username
25 userdel Remove a user account Linux offers the userdel tool to remove a user account. Just specify the username as a parameter to remove that user from the system. # userdel bob This will only remove the user account, not the user s home directory and mail spool. Just add the -r parameter to delete the user s home directory and mail spool too. # userdel -r bob
26 SU command It is a good idea to avoid logging in as root. There are many reasons for not doing this. Fortunately the su can give you temporal root privileges. Example: $ whoami bob $ su Password: # whoami root # exit $ whoami bob
27 Adding and removing groups The programs to add and remove groups are very simple: groupadd will just add another entry to the /etc/group file with a unique group ID, while groupdel will remove the specified group. You create a group like so: # groupadd cvs And remove it like so: # groupdel cvs
28 By hand Of course, it is possible to add, modify, and remove users and groups by hand. First, we'll add a new user to the /etc/passwd, /etc/shadow, and /etc/group files. After that use the passwd command to create a new password for the user. Finally, use mkdir to create the new user's home directory (/home/username or in the location you entered into the /etc/passwd file).
29 Example Find and show files:/etc/passwd, /etc/shadow, and /etc/group files. Check content of /home directory Add new user (stud1, users group) Again find and show files:/etc/passwd, /etc/shadow, and /etc/group files and notice diference. Check again content of /home directory. Change the new user password. Remove the new user account and home directory
30 Shutting Down Properly It is very important that the system is shut down properly. Simply turning the power off can cause serious filesystem damage. While the system is on, files are in use even if you aren't doing anything. Remember that there are many processes running in the background all the time. So, when you go to reboot or power down your computer, it is important to do so the right way.
31 Shutting Down Properly The first method is through the shutdown program, and it is probably the most popular. Basic usage of shutdown to turn off the computer is: # shutdown -h now (-h +60) Rebooting the system uses the same command, but substitutes -r for -h : # shutdown -r now The second way of shutting down or powering off the computer is to use the halt and reboot commands.
32 The /etc/rc.d directory The system initialization files are stored in the /etc/rc.d directory. Each task or runlevel is given its own rc file. There are several categories of initialization files: - system startup, - runlevels, - network initilization, - and System V compatibility.
33 System Startup The first program to run under Slackware besides the Linux kernel is init. This program reads the /etc/inittab file to see how to run the system. It runs the /etc/rc.d/rc.s script to prepare the system before going into your desired runlevel. The rc.s file enables your virtual memory, mounts your filesystems, cleans up certain log directories, initializes Plug and Play devices, loads kernel modules, configures PCMCIA devices, sets up serial ports, and runs System V init scripts (if found).
34 Runlevel Initialization Scripts After system initialization is complete, init moves on to runlevel initialization. A runlevel describes the state that your machine will be running in (the runlevel tells init if you will be accepting multiuser logins or just a single user, whether or not you want network services, and if you will be using the X Window, ). The files below define the different runlevels in Slackware Linux: rc.0 - Halt the system (runlevel 0). By default, this is symlinked to rc.6. rc.4 - Multiuser startup (runlevel 4), but in X11 with KDM, GDM, or XDM as the login manager.
35 Runlevel Initialization Scripts rc.6 - Reboot the system (runlevel 6). rc.k - Startup in single user mode (runlevel 1). rc.m - Multiuser mode (runlevels 2 and 3), but with the standard text-based login. This is the default runlevel in Slackware.
36 Network Initialization Runlevels 2, 3, and 4 will start up the network services. The following files are responsible for the network initialization: rc.inet1- Created by netconfig, this file is responsible for configuring the actual network interface. rc.inet2- Runs after rc.inet1 and starts up basic network services. rc.httpd- Starts up the Apache web server. rc.samba- Starts up Windows file and print sharing services. rc.news - Starts up the news server.
37 Other Files rc.cdrom - If enabled, this script will scan for a CD- ROM in a drive and mount it under /cdrom if it finds one. rc.gpm - Starts up general purpose mouse services. Allows you to copy and paste at the Linux console. rc.font - Loads the custom screen font for the console. rc.local - Contains any specific startup commands for your system. This is empty after a fresh install, as it is reserved for local administrators. This script is run after all other initialization has taken place.
38 Automatic: Enabling/disabling scripts To enable a script, all you need to do is add the execute permissions to it. To disable a script, remove the execute permissions from it. Manual: rc.name start rc.name stop
39 Networking configuration Drivers for NICs are installed as kernel modules. The module for your NIC has to be loaded during the initialization of Slackware Linux. On most systems the NIC is automatically detected and configured during the installation of Slackware Linux. You can reconfigure your NIC with the netconfig command. The netconfig adds the driver (module) for the detected card to /etc/rc.d/rc.netdevice. netconfig
40 Configuration of interfaces Network cards are available under Linux through socalled interfaces. The ifconfig command can be used to display the available interfaces details: # ifconfig a Network cards get the name ethn, in which n is a number, starting with 0. Interfaces can be configured in the /etc/rc.d/rc.inet1.conf file. You can simply read the comments, and fill in the required information.
41 Resolving Each computer on the internet has a hostname and IP address-. /etc/hosts is a table of IP addresses with associated hostnames. This file can be used to name computers in a small network. An example of the /etc/hosts file: localhost tazzy.slackfans.org tazzy gideon.slackfans.org
42 Resolving The /etc/resolv.conf file is used to specify which nameservers the system should use. A nameserver converts hostnames to IP addresses. Your provider should have given you at least two nameserver addresses (DNS servers). You can add these nameservers to /etc/resolv.conf by adding the line nameserver ipaddress for each nameserver. For example: nameserver nameserver
43 The internet super server There are two ways to offer TCP/IP services: by running server applications standalone as a daemon or by using the internet super server, inetd. The inetd is a daemon which monitors a range of ports. If a client attempts to connect to a port inetd handles the connection and forwards the connection to the server software which handles that kind of connection. The inetd can be configured using the /etc/inetd.conf file.
44 The internet super server For example: How loaded FTP server? Let s have a look at an example line (for FTP) from inetd.conf: # File Transfer Protocol (FTP) server: # ftp stream tcp nowait root /usr/sbin/tcpd proftpd This line specifies that inetd should accept FTP connections and pass them to tcpd. So, just remove # and reenable initd or reboot host!
45 Apache web server Apache is the most popular web server since Apache can be installed automatically by adding the apache package from the n disk set. After installing Apache it can be started automatically while booting the system by making the /etc/rc.d/rc.httpd file executable. The Apache configuration can be changed in the /etc/apache/httpd.conf file. Apache can be stopped/started/restarted every moment with the apachectl command, and the stop, start and restart parameters. For example, the command to restart Apache: # rc.httpd start/stop/restart # apachectl restart
OPERATING SYSTEMS. Božo Krstajić, PhD, University of Montenegro Podgorica.
OPERATING SYSTEMS Božo Krstajić, PhD, University of Montenegro Podgorica bozok@cg.ac.yu 1 The /etc/rc.d directory The system initialization files are stored in the /etc/rc.d directory. Each task or runlevel
More informationOperating Systems Lab 1 (Users, Groups, and Security)
Operating Systems Lab 1 (Users, Groups, and Security) Overview This chapter covers the most common commands related to users, groups, and security. It will also discuss topics like account creation/deletion,
More informationMANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG
MANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG Terminals and keyboards have no uniform behavioral pattern. Terminal settings directly impact the keyboard operation.
More informationLab 2A> ADDING USERS in Linux
Lab 2A> ADDING USERS in Linux Objective In this lab, student will learn how to create user accounts using the Linux operating system. Scenario The XYZ Company has just installed a server running Linux.
More informationIntroduction. What is Linux? What is the difference between a client and a server?
Linux Kung Fu Introduction What is Linux? What is the difference between a client and a server? What is Linux? Linux generally refers to a group of Unix-like free and open-source operating system distributions
More informationLinux Kung Fu. Ross Ventresca UBNetDef, Fall 2017
Linux Kung Fu Ross Ventresca UBNetDef, Fall 2017 GOTO: https://apps.ubnetdef.org/ What is Linux? Linux generally refers to a group of Unix-like free and open source operating system distributions built
More informationLinux Kung Fu. Stephen James UBNetDef, Spring 2017
Linux Kung Fu Stephen James UBNetDef, Spring 2017 Introduction What is Linux? What is the difference between a client and a server? What is Linux? Linux generally refers to a group of Unix-like free and
More informationCourse 144 Supplementary Materials. UNIX Fundamentals
Course 144 Supplementary Materials UNIX Fundamentals 1 Background to UNIX Command Fundamentals This appendix provides a overview of critical commands and concepts Prerequisite knowledge attendees should
More informationCSE 265: System and Network Administration
CSE 265: System and Network Administration System startup and shutdown Bootstrapping Booting PCs Boot loaders Booting into single user mode Startup scripts Rebooting and shutting down Bootstrapping i.e.,
More informationCSE 265: System and Network Administration
CSE 265: System and Network Administration System startup and shutdown Bootstrapping Booting PCs Boot loaders Booting into single user mode Startup scripts Rebooting and shutting down Bootstrapping i.e.,
More informationThe kernel is the low-level software that manages hardware, multitasks programs, etc.
November 2011 1 Why Use Linux? Save Money Initial purchase and maintenance Resume Linux is used by MANY organizations More choices Tons of Linux operating systems November 2011 2 What is Linux? 1. Contains
More informationCSE 265: System and Network Administration
CSE 265: System and Network Administration User accounts The /etc/passwd file The /etc/shadow file Root powers Ownership of files and processes The superuser The /etc/group file Adding users Removing users
More informationLinux System Administration
System Processes Objective At the conclusion of this module, the student will be able to: Describe and define a process Identify a process ID, the parent process and the child process Learn the PID for
More informationUser Accounts. The Passwd, Group, and Shadow Files
User Accounts The Passwd, Group, and Shadow Files We'll start with the passwd (pronounced "password") file, located at /etc/passwd. This file holds information about all of the user accounts on the system.
More informationStop all processes and then reboot - same as above startx. Log in as superuser from current login exit
Starting & Stopping shutdown -h now Shutdown the system now and do not reboot shutdown -r 5 Shutdown the system in 5 minutes and reboot shutdown -r now Shutdown the system now and reboot reboot Stop all
More informationCST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management
Student Name: Lab Section: Linux User and Group Management 1 Due Date - Upload to Blackboard by 8:30am Monday April 2, 2012 Submit the completed lab to Blackboard following the Rules for submitting Online
More informationBasic Linux Security. Roman Bohuk University of Virginia
Basic Linux Security Roman Bohuk University of Virginia What is Linux? An open source operating system Project started by Linus Torvalds kernel Kernel: core program that controls everything else (controls
More informationUser & Group Administration
User & Group Administration David Morgan Users useradd/userdel /home/ /etc/passwd is the user database /etc/shadow has passwords (relocated from passwd) /etc/group whoami su / sudo / SUID process
More informationNETW 110 Lab 5 Creating and Assigning Users and Groups Page 1
NETW 110 Lab 5 Creating and Assigning Users and Groups Page 1 Objective At the conclusion of this lab, the student will be able to add and delete users, create and assign users to groups, and assign users
More informationUNIT V. Dr.T.Logeswari. Unix Shell Programming - Forouzan
UNIT V UNIX SYSTEM COMMUNICATION Dr.T.Logeswari 1 Electronic mail or email is easiest way of communication on unix. Fast and cheap Used to exchange graphics, sound and video files 2 3 Elements of a communication
More informationCL030 is a csage Certification Preparatory Course!
Corder Enterprises International Building World Class MIS Teams, for you! CL030 is a csage Certification Preparatory Course! CL030 - LINUX System Administration Course Description: Learn and practice essential
More informationAdvanced Unix System Administration
Advanced Unix System Administration Lecture 5 February 14, 2007 Steven Luo Shared Libraries The dynamic linker Binaries have a symbol table containing functions, etc. and
More informationExam Linux-Praxis - 1 ( From )
Exam Linux-Praxis - 1 ( From http://www.linux-praxis.de ) (1)Which of the following commands results in mailing the content of the current directory to Bob? A. mail Bob < ls B. ls > mail Bob C. ls mail
More informationIntroduction to Linux
Introduction to Linux Mukesh Pund Principal Scientist, NISCAIR, New Delhi, India History In 1969, a team of developers developed a new operating system called Unix which was written using C Linus Torvalds,
More informationCertification. System Initialization and Services
Certification System Initialization and Services UNIT 3 System Initialization and Services UNIT 3: Objectives Upon completion of this unit the student should be able to: Describe BIOS functions with respect
More informationStudy Guide Processes & Job Control
Study Guide Processes & Job Control Q1 - PID What does PID stand for? Q2 - Shell PID What shell command would I issue to display the PID of the shell I'm using? Q3 - Process vs. executable file Explain,
More informationBasic UNIX system administration
Basic UNIX system administration CS 2204 Class meeting 14 *Notes by Doug Bowman and other members of the CS faculty at Virginia Tech. Copyright 2001-2003. System administration Thus far, we ve only discussed:
More informationINTRODUCTION TO LINUX
INTRODUCTION TO LINUX REALLY SHORT HISTORY Before GNU/Linux there were DOS, MAC and UNIX. All systems were proprietary. The GNU project started in the early 80s by Richard Stallman Goal to make a free
More informationRedhat Basic. Need. Your. What. Operation G U I D E. Technical Hand Note template version
Redhat Basic Operation G U I D E What Need Your www.next-asia.com Readhat Basic Operation Guide, Prepared by Nazmul Khan Page 1 of 43 Redhat Basic Operation Guide RedHat Installation Guide... 2 Installation...
More informationThe table below lists the domains measured by this examination and the extent to which they are represented in the examination.
Introduction The Linux+ Certification is designed to measure the competencies of the Linux Professional with six to twelve months experience with the Linux operating system. This person provides basic
More informationSystem Administration. Startup Process
System Administration Startup Process Why Care? Every process on your system comes about by following a specific chain of events from the machine startup You may want to disable processes You may want
More informationBooting up and Shutting down A primer for troubleshooting
Booting up and Shutting down A primer for troubleshooting In this section, we touch upon the startup and shutdown process on Linux. It is beyond the scope of this course to cover this topic in depth and
More informationProcess Management forks, bombs, zombies, and daemons! Lecture 5, Hands-On Unix System Administration DeCal
Process Management forks, bombs, zombies, and daemons! Lecture 5, Hands-On Unix System Administration DeCal 2012-10-01 what is a process? an abstraction! you can think of it as a program in the midst of
More informationProject #3: Implementing NIS
Project #3: Implementing NIS NIS Daemons Limitations of NIS How We Will Use NIS NIS Domain Name NIS Software Setting Up NIS on it20 /etc/nsswitch.conf Creating New Accounts on Ubuntu /etc/passwd /etc/shadow
More informationEverything about Linux User- and Filemanagement
Everything about Linux User- and Filemanagement Lukas Prokop 20. April 2009 Inhaltsverzeichnis 1 Who I am 2 1.1 whoami..................................... 3 1.2 passwd......................................
More informationWelcome to getting started with Ubuntu Server. This System Administrator Manual. guide to be simple to follow, with step by step instructions
Welcome to getting started with Ubuntu 12.04 Server. This System Administrator Manual guide to be simple to follow, with step by step instructions with screenshots INDEX 1.Installation of Ubuntu 12.04
More informationMore Raspian. An editor Configuration files Shell scripts Shell variables System admin
More Raspian An editor Configuration files Shell scripts Shell variables System admin Nano, a simple editor Nano does not require the mouse. You must use your keyboard to move around the file and make
More informationCST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management
Student Name: YOUR NAME Lab Section: 011 012 013 or 014 Linux User and Group Management 1 Due Date - Upload to Blackboard by 8:30am Monday April 2, 2012 Submit the completed lab to Blackboard following
More informationQ) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system...
Q) Q) What is Linux and why is it so popular? Answer - Linux is an operating system that uses UNIX like Operating system... Q) Q) What is the difference between home directory and working directory? Answer
More informationPresented by Bill Genske Gary Jackson
Quintessential School Systems Session C Linux Presented by Bill Genske Gary Jackson Copyright Quintessential School Systems, 2009 All Rights Reserved 867 American Street --- Second Floor --- San Carlos,
More informationLinux Essentials Objectives Topics:
Linux Essentials Linux Essentials is a professional development certificate program that covers basic knowledge for those working and studying Open Source and various distributions of Linux. Exam Objectives
More informationInstalling Altiris Agent on Ubuntu
Installing Altiris Agent on Ubuntu DISCLAIMER: Altiris does not warrant that their software will run on Ubuntu using the Unix Agent version 6.2, which as of publication of this article, is the latest release.
More informationExercise Sheet 2. (Classifications of Operating Systems)
Exercise Sheet 2 Exercise 1 (Classifications of Operating Systems) 1. At any given moment, only a single program can be executed. What is the technical term for this operation mode? 2. What are half multi-user
More informationLinux Kung-Fu. James Droste UBNetDef Fall 2016
Linux Kung-Fu James Droste UBNetDef Fall 2016 $ init 1 GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org GO TO https://apps.ubnetdef.org
More informationUser accounts and authorization
User accounts and authorization Authentication vs authorization Authentication: proving the identity of someone Authorization: allowing a user to access certain resources 1 Government authorization documents
More informationUNIX System Administration
$!... 14:13 $$... 14:13.netrc...12:27-28 /etc/fstab... 6:25 /etc/hosts.equiv... 8:23 /etc/inittab Entries... 4:8 /etc/netmasks... 8:22 /etc/shells... 12:25 /home... 6:69 /tmp...6:61-67 /usr... 6:70 /var...
More information14. Configuring Telnet in Knoppix
14. Configuring Telnet in Knoppix Estimated Time: 45 Minutes Objective In this lab, the student will learn how to configure the Telnet service on a system so that the user can remotely administer a Knoppix
More informationLAB #7 Linux Tutorial
Gathering information: LAB #7 Linux Tutorial Find the password file on a Linux box Scenario You have access to a Linux computer. You must find the password file on the computer. Objective Get a listing
More informationTELE 301 Lecture 8: Post
Last Lecture System installation This Lecture Post installation Next Lecture Wireless networking Overview TELE 301 Lecture 8: Post 1 Post-configuration Create user accounts and environments Sort out the
More informationLinux Systems Administration Getting Started with Linux
Linux Systems Administration Getting Started with Linux Network Startup Resource Center www.nsrc.org These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International
More informationAnswers to Even- Numbered Exercises
Answers to Even- 17 Numbered Exercises from page 1077 1. What option should you use with fsck if you want to review the status of your filesystems without making any changes to them? How does fsck determine
More information[ Terminal ] [ Users management ] Alt +F6 = Terminal switcher. useradd [option] JohnG
[ Terminal ] Alt +F6 = Terminal switcher [ Users management ] useradd [option] JohnG -d : to assign homedirectory -u : to assign UID -s : to set shell -g : to assign group ID ex) Linux# useradd JohnG -d
More informationInstall the Marionnet network simulator on Kali Linux Light vbox-i686
Install the Marionnet network simulator on Kali Linux Light 2017.1-vbox-i686 August 26, 2017 by Lucian Visinescu (this work is licensed under CC BY-NC 4.0) This installation is based on Install the Marionnet
More informationChapter 5: User Management. Chapter 5 User Management
Chapter 5: User Management Chapter 5 User Management Last revised: 20/6/2004 Chapter 5 Outline In this chapter we will learn Where user and group account information is stored How to manage user accounts
More informationAuthored by: Brian E. Brzezicki Copyright 2013, Paladin Group LLC Reuse without permission is strictly prohibited
Authored by: Brian E. Brzezicki Copyright 2013, Paladin Group LLC Reuse without permission is strictly prohibited Traditionally Unix systems have used the ATT System V initialization mechanism In System
More informationCTEC1863/2018F Bonus Lab Page 1 of 5
CTEC1863/2018F Bonus Lab Page 1 of 5 Bonus Lab: OpenSUSE Linux Rescue In this lab, we will install an OpenSUSE virtual machine. However, both the non-root user and the root passwords are unknown. To fix
More informationUnit 2 System startup and shutdown
Unit 2 System startup and shutdown Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 5.2 Unit objectives After completing this unit, you should be
More informationThe Unix Shell & Shell Scripts
The Unix Shell & Shell Scripts You should do steps 1 to 7 before going to the lab. Use the Linux system you installed in the previous lab. In the lab do step 8, the TA may give you additional exercises
More informationStormTracker EMS 2.3 Installation Instructions. Contents. Document Number EMS-A2-GN10-00 July 2002
StormTracker EMS 2.3 Installation Instructions Document Number EMS-A2-GN10-00 July 2002 Contents Overview... 2 Basic StormTracker EMS Functionality... 2 Oware and StormTracker EMS... 2 Supported Systems...
More informationCRUK cluster practical sessions (SLURM) Part I processes & scripts
CRUK cluster practical sessions (SLURM) Part I processes & scripts login Log in to the head node, clust1-headnode, using ssh and your usual user name & password. SSH Secure Shell 3.2.9 (Build 283) Copyright
More informationFreescale FAE75 Training Genesi Pegasos II LinuxTraining. Maurie Ommerman June 10, 2004
Freescale FAE75 Training Genesi Pegasos II LinuxTraining Maurie Ommerman June 10, 2004 FAE75 Part 3 Debian Linux Maurie Ommerman June 10, 2004 Open Firmware boot script Boot Options Upon PowerUP, this
More informationGNU/Linux: An Essential Guide for Students Undertaking BLOSSOM
Copyright: The development of this document is funded by Higher Education of Academy. Permission is granted to copy, distribute and /or modify this document under a license compliant with the Creative
More informationPrograms. Program: Set of commands stored in a file Stored on disk Starting a program creates a process static Process: Program loaded in RAM dynamic
Programs Program: Set of commands stored in a file Stored on disk Starting a program creates a process static Process: Program loaded in RAM dynamic Types of Processes 1. User process: Process started
More informationLinux Tutorial #6. -rw-r csce_user csce_user 20 Jan 4 09:15 list1.txt -rw-r csce_user csce_user 26 Jan 4 09:16 list2.
File system access rights Linux Tutorial #6 Linux provides file system security using a three- level system of access rights. These special codes control who can read/write/execute every file and directory
More informationLinux Interview Questions and Answers
Linux Interview Questions and Answers You need to see the last fifteen lines of the files dog, cat and horse. What command should you use? tail -15 dog cat horse The tail utility displays the end of a
More informationFile System Hierarchy Standard (FHS)
File System Hierarchy Standard (FHS) Filesystem hierarchy standard describes directory structure and its content in Unix and Unix like operating system. It explains where files and directories should be
More informationPlease choose the best answer. More than one answer might be true, but choose the one that is best.
Introduction to Linux and Unix - endterm Please choose the best answer. More than one answer might be true, but choose the one that is best. SYSTEM STARTUP 1. A hard disk master boot record is located:
More informationPerl and R Scripting for Biologists
Perl and R Scripting for Biologists Lukas Mueller PLBR 4092 Course overview Linux basics (today) Linux advanced (Aure, next week) Why Linux? Free open source operating system based on UNIX specifications
More informationCommands are in black
Starting From the Shell Prompt (Terminal) Commands are in black / +--------+---------+-------+---------+---------+------ +------ +------ +------ +------ +------ +-- Bin boot dev etc home media sbin bin
More informationUsing grub to Boot various Operating Systems
Operating Systems and Systems Integration Using grub to Boot various Operating Systems Contents 1 Aim 2 2 What You Will Do 2 3 Background 2 3.1 Installing grub in MBR from a floppy, and from the OS........
More informationRHCE BOOT CAMP. The Boot Process. Wednesday, November 28, 12
RHCE BOOT CAMP The Boot Process OVERVIEW The boot process gets a machine from the useless off state to the feature rich operating system we all know and love Requires cooperation between hardware and software
More informationG54ADM Sample Exam Questions and Answers
G54ADM Sample Exam Questions and Answers Question 1 Compulsory Question (34 marks) (a) i. Explain the purpose of the UNIX password file. (2 marks) ii. Why doesn t the password file contain passwords? (2
More informationCompTIA Exam LX0-102 Linux Part 2 Version: 10.0 [ Total Questions: 177 ]
s@lm@n CompTIA Exam LX0-102 Linux Part 2 Version: 10.0 [ Total Questions: 177 ] CompTIA LX0-102 : Practice Test Topic break down Topic No. of Questions Topic 1: Volume A 60 Topic 2: Volume B 59 Topic 3:
More informationMore on file systems, Booting Todd Kelley CST8177 Todd Kelley 1
More on file systems, Booting Todd Kelley kelleyt@algonquincollege.com CST8177 Todd Kelley 1 bind mounts quotas Booting process and SysVinit Installation Disk rescue mode 2 A bind mount is used to mount
More informationSystem Programming. Introduction to Unix
Content : by Dr. B. Boufama School of Computer Science University of Windsor Instructor: Dr. A. Habed adlane@cs.uwindsor.ca http://cs.uwindsor.ca/ adlane/60-256 Content Content 1 Introduction 2 3 Introduction
More informationBamuengine.com. Chapter 7. The Process
Chapter 7. The Process Introduction A process is an OS abstraction that enables us to look at files and programs as their time image. This chapter discusses processes, the mechanism of creating a process,
More informationContents in Detail. Acknowledgments
Acknowledgments xix Introduction What s in This Book... xxii What Is Ethical Hacking?... xxiii Penetration Testing... xxiii Military and Espionage... xxiii Why Hackers Use Linux... xxiv Linux Is Open Source....
More informationThe Linux IPL Procedure
The Linux IPL Procedure SHARE - Tampa February 13, 2007 Session 9274 Edmund MacKenty Rocket Software, Inc. Purpose De-mystify the Linux boot sequence Explain what happens each step of the way Describe
More information22-Sep CSCI 2132 Software Development Lecture 8: Shells, Processes, and Job Control. Faculty of Computer Science, Dalhousie University
Lecture 8 p.1 Faculty of Computer Science, Dalhousie University CSCI 2132 Software Development Lecture 8: Shells, Processes, and Job Control 22-Sep-2017 Location: Goldberg CS 127 Time: 14:35 15:25 Instructor:
More informationHOW LINUX BOOTS. As it turns out, there isn t much to the boot process:
3 HOW LINUX BOOTS You now know the physical structure of a Linux system, what the kernel is, and how to work with processes. This chapter teaches you how the system starts (boots) that is, how the kernel
More informationSome Ubuntu Practice...
Some Ubuntu Practice... SANOG 10 August 29 New Delhi, India 1. Get used to using sudo 2. Create an inst account 3. Learn how to install software 4. Install gcc and make 5. Learn how to control services
More informationLab Authentication, Authorization, and Accounting
Objectives Given a scenario, select the appropriate authentication, authorization, or access control Install and configure security controls when performing account management, based on best practices
More informationUsers and Groups. his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and UNIX groups.
cameron.book Page 19 Monday, June 30, 2003 8:51 AM C H A P T E R 4 Users and Groups T his chapter is devoted to the Users and Groups module, which allows you to create and manage UNIX user accounts and
More informationList of Linux Commands in an IPm
List of Linux Commands in an IPm Directory structure for Executables bin: ash cpio false ln mount rm tar zcat busybox date getopt login mv rmdir touch cat dd grep ls perl sed true chgrp df gunzip mkdir
More informationh/w m/c Kernel shell Application s/w user
Structure of Unix h/w m/c Kernel shell Application s/w. user While working with unix, several layers of interaction occur b/w the computer h/w & the user. 1. Kernel : It is the first layer which runs on
More informationHANDS UP IF YOU DON T HAVE A VM OR IF YOU DON T REMEMBER YOUR PASSWORDS. Or something broke
HANDS UP IF YOU DON T HAVE A VM OR IF YOU DON T REMEMBER YOUR PASSWORDS Or something broke Securing your VM 101 Getting Comfy in Linux -> Comfort ++ You After This Talk Quick recap from last week. Setup
More informationelinks, mail processes nice ps, pstree, top job control, jobs, fg, bg signals, kill, killall crontab, anacron, at
Processes 1 elinks, mail processes nice ps, pstree, top job control, jobs, fg, bg signals, kill, killall crontab, anacron, at 2 elinks is a text-based (character mode) web browser we will use it to enable
More informationStart Up and Shutdown Procedures (Unix)
Start Up and Shutdown Procedures (Unix) Start Up On Main Console 1. Press the Server main power button ON 2. The system will automatically go through the start-up procedures, which will be displayed on
More informationUbuntu Practice and Configuration Post Installation Exercises interlab at AIT Bangkok, Thailand
Ubuntu Practice and Configuration Post Installation Exercises interlab at AIT Bangkok, Thailand 1. Get used to using sudo 2. Create an inst account 3. Learn how to install software 4. Update /etc/apt/sources.list
More informationProcesses are subjects.
Identification and Authentication Access Control Other security related things: Devices, mounting filesystems Search path TCP wrappers Race conditions NOTE: filenames may differ between OS/distributions
More informationRunlevels, System Shutdown and Reboot
Information These notes were originally written in the year 2000 as part of a set of LPI Exam 101 training materials. The LPI training course at Bromley College was subsequently discontinued and some of
More informationCSE 391 Lecture 3. bash shell continued: processes; multi-user systems; remote login; editors
CSE 391 Lecture 3 bash shell continued: processes; multi-user systems; remote login; editors slides created by Marty Stepp, modified by Jessica Miller and Ruth Anderson http://www.cs.washington.edu/391/
More information10 userdel: deleting a user account 9. 1 Context Tune the user environment and system environment variables [3]
1. Context 1.111.1 2 8 Deleting a group 8 1.111.1 Manage users and group accounts and related system files Weight 4 Outline Contents Linux Professional Institute Certification 102 Nick Urbanik
More informationUsing LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12)
Using LINUX a BCMB/CHEM 8190 Tutorial Updated (1/17/12) Objective: Learn some basic aspects of the UNIX operating system and how to use it. What is UNIX? UNIX is the operating system used by most computers
More informationAdding users actions/mechanics
User management-- a generalized management script example David Morgan Adding users actions/mechanics add record to /etc/passwd add record to /etc/shadow add record to /etc/group for user s default group
More informationMy Own Help On Unix Environment
My Own Help On Unix Environment ***** *** * This is my own collection on some tips/hints to help my work on Unix Environment. As my Unix is my second skill, hence the information here is very basic and
More informationIntroduction to Linux (Part I) BUPT/QMUL 2018/03/14
Introduction to Linux (Part I) BUPT/QMUL 2018/03/14 Contents 1. Background on Linux 2. Starting / Finishing 3. Typing Linux Commands 4. Commands to Use Right Away 5. Linux help continued 2 Contents 6.
More informationHP-UX System Administration Course Overview. Skills Gained. Who will the Course Benefit?
HP-UX System Administration Course Overview This Hewlett Packard HP-UX System Administration training course is designed to give delegates practical experience in the administration of an HP-UX UNIX System.
More informationLab on User administration
Lab on User administration To add user #useradd [options] -c Change the comment field. This is often the users full name. -d Change the home directory -e Set
More informationLinux Reference Card - Command Summary
Linux Reference Card - Command Summary adduser adduser dsoneil This command will automatically add a new user to the system The Bash script can be found in /usr/sbin if it needs to be changes alias alias
More information