IT Essentials II: NOS Linux Labs Using Knoppix

Similar documents
15. Creating a Samba Server in Knoppix v.3

Permission and Ownership

Fundamentals and Essentials Curriculum Update

Linux Essentials. Programming and Data Structures Lab M Tech CS First Year, First Semester

CS Fundamentals of Programming II Fall Very Basic UNIX

5/8/2012. Encryption-based Protection. Protection based on Access Permission (Contd) File Security, Setting and Using Permissions Chapter 9

Lab Authentication, Authorization, and Accounting

Users, Groups and Permission in Linux

Unix File System. Class Meeting 2. * Notes adapted by Joy Mukherjee from previous work by other members of the CS faculty at Virginia Tech

Working with Basic Linux. Daniel Balagué

Setting Up a Linux Operating System

Lab 2A> ADDING USERS in Linux

Lab Install Windows 8

CS 215 Fundamentals of Programming II Spring 2019 Very Basic UNIX

Operating systems fundamentals - B10

IT Essentials v6.0 Windows 10 Software Labs

Due: February 26, 2014, 7.30 PM

CST Lab 2 Review #1

Definition. A series of detailed instructions that control the operation of a computer system. are developed by computer programmers

Chapter 8 Operating Systems and Utility Programs أ.أمل زهران

OPS235: Week 1. Installing Linux ( Lab1: Investigations 1-4)

Welcome to getting started with Ubuntu Server. This System Administrator Manual. guide to be simple to follow, with step by step instructions

Downloaded from various sources on the NET

1. Open VirtualBox and start your linux VM. Boot the machine and log in with the user account you created in Lab #1. Open the Terminal application.

14. Configuring Telnet in Knoppix

CS 200. User IDs, Passwords, Permissions & Groups. User IDs, Passwords, Permissions & Groups. CS 200 Spring 2017

Unix Filesystem. January 26 th, 2004 Class Meeting 2

CST8207: GNU/Linux Operating Systems I Lab Six Linux File System Permissions. Linux File System Permissions (modes) - Part 1

Documentation. OTRS Appliance Installation Guide. Build Date:

Exercise Sheet 2. (Classifications of Operating Systems)

A. Windows 7 and USB driver installation

Introduction to Linux

Hands-on Keyboard: Cyber Experiments for Strategists and Policy Makers

CISC 220 fall 2011, set 1: Linux basics

Users Manual. OP5 System 2.4. OP5 AB. Page 1 of 6

Linux Operating System Environment Computadors Grau en Ciència i Enginyeria de Dades Q2

Operating Systems. Copyleft 2005, Binnur Kurt

commandname flags arguments

Operating Systems 3. Operating Systems. Content. What is an Operating System? What is an Operating System? Resource Abstraction and Sharing

The UNIX Operating System. HORT Lecture 2 Instructor: Kranthi Varala

Systems software. Definition. Categories of software. Examples Of Systems Software 11/23/2018

Perform Disaster Recovery

Files (review) and Regular Expressions. Todd Kelley CST8207 Todd Kelley 1

Basic Unix. Set-up. Finding Terminal on the imac. Method 1. Biochemistry laboratories Jean-Yves Sgro

A+ Guide to Managing and Maintaining Your PC. How Hardware and Software Work Together

Lab Working with Linux Command Line

Title: Demonstrate the linux installation and administration settings.

User s Manual. Rev July 29,

Windows Password Reset 6.0 User Guide

Course Wiki. Today s Topics. Web Resources. Amazon EC2. Linux. Apache PHP. Workflow and Tools. Extensible Networking Platform 1

CSCI 2132 Software Development. Lecture 5: File Permissions

Lab E2: bypassing authentication and resetting passwords

Linux & Shell Programming 2014

Introduction to Linux Basics

Introduction to Puppy Linux: Installation on a USB Flash Disk

The Unix Shell. Permissions

Chapter 8 Operating Systems and Utility Programs

Lecture 2b. Pathnames, files, special characters in filenames, and file permissions. COP 3353 Introduction to UNIX, FALL 2013

I. Ch 5 System Software

Ubuntu installation alongside windows 8/8.1 and 10

CCNA Discovery Server Live CD v2.0

Computers: Tools for an Information Age. System Software

Access Permissions. Agenda. chmod Command (Relative Method) File / Directory Permissions

Goals for This Lecture:

UNIX Tutorial Five

Installation of PC Wrapper

File system Security (Access Rights)

Project #4: Implementing NFS

Hitchhiker s Guide to VLSI Design with Cadence & Synopsys

MDA HMI. Commissioning Guide Edition 04/2005. Machine Data Evaluation. Machine Data Acquisition. Archiving History

Common UNIX Commands. Unix. User Interfaces. Unix Commands Winter COMP 1270 Computer Usage II 9-1. Using UNIX. Unix has a command line interface

Chapter 8: Security under Linux

LAB #7 Linux Tutorial

TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control

Chapter 12: Advanced Operating Systems

5.4.8 Optional Lab: Managing System Files with Built-in Utilities in Windows Vista

PXM45 Backup Boot Procedures

Unix Groups and Users

Configure Windows Server 2003 Release 2 Server Network File Share (NFS) as an authenticated storage repository for XenServer

Introduction to Unix: Fundamental Commands

Full file at

Lab: Advanced Installation of Windows XP. Introduction

Lesson 1: Preparing for Installation

3 INSTALLING WINDOWS XP PROFESSIONAL

Commands are in black

Lab - Share Resources in Windows

Chapter Two. Lesson A. Objectives. Exploring the UNIX File System and File Security. Understanding Files and Directories

IT ESSENTIALS V. 4.1 Module 5 Fundamental Operating Systems

Network Update Method Page 2 (Recommended method if your Blu-ray Player is connected to the Internet.)

CMSC421: Principles of Operating Systems

Installing IPM on Windows

ARM Firmware Suite v1.4 Installation Guide

CompTIA A+ Accelerated course for & exams

How To Reinstall Grub In Windows 7 With Cd Rom

Network Planning and Implementation

File Properties and Permissions

Computer Software A computer contains two major sets of tools, software and hardware. Software is generally divided into Systems software and

Lab 3a Using the vi editor

CompTIA A+ Certification ( ) Study Guide Table of Contents

Ftp Get Command Line Windows 7 Bootable Usb

Transcription:

IT Essentials II: NOS Linux Labs Using Knoppix 1

IT Essentials II Linux Labs Using Knoppix Agenda Course Overview Knoppix Lab Map Knoppix Overview Lab: Basic System Administration in Knoppix v2 2

IT Essentials II: Network Operating Systems Introduction to multi-user, multitasking networking operating systems Hands-on, lab-oriented course overviews the characteristics of Linux and Windows NT, 2000, and XP operating systems Students will learn about installation procedures, security issues, backup procedures, and remote access IT Essentials II: NOS v3 AND Fundamentals of UNIX course map to CompTIA Linux+ 3

Knoppix Lab Map 2005, 2006 Cisco Cisco Systems, Systems, Inc. Inc. All All rights rights reserved. reserved. 4 4

Linux Labs in IT Essentials II Package to assist instructors in delivering the Linux labs from the HP IT Essentials II: NOS course A run-from-cd version of Linux Allows a computer to be booted into the Linux OS without installing onto the host machine Boots from the CD, runs entirely in RAM Does not use or write to the hard drive We have chosen Knoppix v3.9 to validate these labs 5

Linux Labs in IT Essentials II The package includes the following: A spreadsheet that maps each Linux lab to an alternate Knoppix lab and provides instructions for completion An Instructor Lab Manual that includes a short Knoppix instructor guide and Knoppix labs with answers A Student Lab Manual that contains Knoppix labs without answers 6

Linux Labs in IT Essentials II These materials are available: IT Essentials II Tools page Class Home page IT Essentials II Ver. 3.0 KnoppixLabs Map v4 7

Knoppix Overview 2005, 2006 Cisco Cisco Systems, Systems, Inc. Inc. All All rights rights reserved. reserved. 8 8

Knoppix One of several Run-from-CD distros Boots from the CD, runs entirely in RAM Does not use or write to the hard drive Open Source community -- widely-used = rapid development Ver 3.9 used to validate the Linux labs 9

Knoppix Download English Knoppix main page http://www.knopper.net/knoppix/index-en.html Download the ISO file, approximately 700 MB Burn ISO file to a CD as an image 10

Knoppix Lab 2005, 2006 Cisco Cisco Systems, Systems, Inc. Inc. All All rights rights reserved. reserved. 11 11

Knoppix SysAdmin Lab Basic System Administration in Knoppix v2 PART 1 -- Adding Users, Creating Accounts, Assigning passwords, Deleting Users PART 2 -- Creating a Group and Adding Users to the Group, Changing permissions, Renaming and deleting a group PART 3 -- Creating Directories, Removing Directories PART 4 -- Creating a File, Moving the File, Exploring Permissions for a file and a directory 12

Using Knoppix Put burned CD into drive and restart computer If the computer is not set to boot from a CD, enter the BIOS by pressing F2 (or DEL or the appropriate key) In BIOS settings, select the CDROM as the first boot device 13

Knoppix Boot Boot process: knoppix nosound nodhcp If Knoppix does not recognize the video card it will scan the video card for the different modes it will support A list of resolutions starting with basic VGA (640x480) It is best to use the selection at the bottom of the list 14

Knoppix Root Access To open the Root Terminal Press the Penguin icon in bottom taskbar Select Root Shell 15

Linux Permissions 2005, 2006 Cisco Cisco Systems, Systems, Inc. Inc. All All rights rights reserved. reserved. 16 16

Linux Permissions Directory had full permissions for all users, output of the ls l command would be drwxrwxrwx rwx stand for Read, Write, and Execute permission Initial d indicates directory, initial - indicates file First rwx grouping is for the owner of the file or directory Second rwx is for a group to whom that file or directory is assigned Third rwx is for everyone else Dash in a grouping indicates no permission 17

Linux Permissions For example, drwxr-x--- drwxr-x--- directory drwxr-x--- owner has Read, Write and Execute permission drwxr-x--- group members have Read and Execute permission drwxr-x--- everyone else has no permission at all to access the contents of the directory 18

Linux Permissions Three binary digits can be used to efficiently represent the possible combinations of rwx Binary 1 means a permission is granted Binary 0 means a permission is not granted The example drwxr-x--- would be represented by 750 Permissions Binary Conversion Octal Number drwxr-x--- 111 4+2+1 7 drwxr-x--- 101 4+0+1 5 drwxr-x--- 000 0+0+0 0 19

Linux Permissions r w x octal number 0 0 0 0 0 0 1 1 0 1 0 2 0 1 1 3 1 0 0 4 1 0 1 5 1 1 0 6 1 1 1 7 20

Q and A 21

22