SlideShare a Scribd company logo
1 of 24
Fundamental System Administration Tools Chapter 3
Chapter Goals ,[object Object],[object Object],[object Object],[object Object]
Fundamental Sysadmin Tasks ,[object Object],[object Object],[object Object],[object Object],[object Object]
Fundamental Sysadmin Tasks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Good Practices ,[object Object],[object Object],[object Object],[object Object]
Good Practices ,[object Object],[object Object]
Good Practices ,[object Object],[object Object],[object Object],[object Object]
Moving Around the File Tree ,[object Object],[object Object],[object Object],[object Object],[object Object]
Moving Around the File Tree ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Moving Around the File Tree ,[object Object],[object Object],[object Object]
Why vi ,[object Object],[object Object],[object Object],[object Object]
Why vi ,[object Object],[object Object],[object Object],[object Object]
Power Tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Power Tools ,[object Object],[object Object],[object Object],[object Object],[object Object]
Power Tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Power Tools ,[object Object],[object Object],[object Object]
Juggling Multiple Tasks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Windowed Environments ,[object Object],[object Object],[object Object],[object Object]
Windowed Environments ,[object Object],[object Object],[object Object],[object Object]
General-purpose GUI Tools ,[object Object],[object Object],[object Object],[object Object]
General-purpose GUI Tools ,[object Object],[object Object],[object Object],[object Object]
General-purpose GUI Tools ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
General-purpose GUI Tools ,[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

More Related Content

What's hot

Network operating systems
Network operating systemsNetwork operating systems
Network operating systemsrahmanitayulia
 
Itk rawa t____operatingsystems2
Itk rawa t____operatingsystems2Itk rawa t____operatingsystems2
Itk rawa t____operatingsystems2KapiL RawaT
 
Intro to linux systems administration
Intro to linux systems administrationIntro to linux systems administration
Intro to linux systems administrationPadam Banthia
 
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya JyothiIntroduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya JyothiSowmya Jyothi
 
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHINETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHISowmya Jyothi
 
File Management in Operating Systems
File Management in Operating SystemsFile Management in Operating Systems
File Management in Operating Systemsvampugani
 
I/O System and Case study
I/O System and Case studyI/O System and Case study
I/O System and Case studyLavanya G
 
Internal representation of file chapter 4 Sowmya Jyothi
Internal representation of file chapter 4 Sowmya JyothiInternal representation of file chapter 4 Sowmya Jyothi
Internal representation of file chapter 4 Sowmya JyothiSowmya Jyothi
 
Operating system by aman kr kushwaha
Operating system by aman kr kushwahaOperating system by aman kr kushwaha
Operating system by aman kr kushwahaAMAN KUMAR KUSHWAHA
 
Windows for Everyone(Operating System)
Windows for Everyone(Operating System)Windows for Everyone(Operating System)
Windows for Everyone(Operating System)Waleed Khan
 
16. Computer Systems Basic Software 2
16. Computer Systems   Basic Software 216. Computer Systems   Basic Software 2
16. Computer Systems Basic Software 2New Era University
 

What's hot (19)

Network operating systems
Network operating systemsNetwork operating systems
Network operating systems
 
Operating System
Operating SystemOperating System
Operating System
 
Ch12
Ch12Ch12
Ch12
 
Itk rawa t____operatingsystems2
Itk rawa t____operatingsystems2Itk rawa t____operatingsystems2
Itk rawa t____operatingsystems2
 
Intro to linux systems administration
Intro to linux systems administrationIntro to linux systems administration
Intro to linux systems administration
 
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya JyothiIntroduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
Introduction to Unix operating system Chapter 1-PPT Mrs.Sowmya Jyothi
 
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHINETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
 
Windows xp
Windows xpWindows xp
Windows xp
 
OSCh20
OSCh20OSCh20
OSCh20
 
File Management in Operating Systems
File Management in Operating SystemsFile Management in Operating Systems
File Management in Operating Systems
 
I/O System and Case study
I/O System and Case studyI/O System and Case study
I/O System and Case study
 
Internal representation of file chapter 4 Sowmya Jyothi
Internal representation of file chapter 4 Sowmya JyothiInternal representation of file chapter 4 Sowmya Jyothi
Internal representation of file chapter 4 Sowmya Jyothi
 
Operating system
Operating systemOperating system
Operating system
 
IMD 203 - Ch02
IMD 203 - Ch02IMD 203 - Ch02
IMD 203 - Ch02
 
Ch11
Ch11Ch11
Ch11
 
Operating system by aman kr kushwaha
Operating system by aman kr kushwahaOperating system by aman kr kushwaha
Operating system by aman kr kushwaha
 
OSCh13
OSCh13OSCh13
OSCh13
 
Windows for Everyone(Operating System)
Windows for Everyone(Operating System)Windows for Everyone(Operating System)
Windows for Everyone(Operating System)
 
16. Computer Systems Basic Software 2
16. Computer Systems   Basic Software 216. Computer Systems   Basic Software 2
16. Computer Systems Basic Software 2
 

Viewers also liked (20)

Ch10 system administration
Ch10 system administration Ch10 system administration
Ch10 system administration
 
Ch24 system administration
Ch24 system administration Ch24 system administration
Ch24 system administration
 
Ch21 system administration
Ch21 system administration Ch21 system administration
Ch21 system administration
 
Chapter10 -- netware-based networking
Chapter10  -- netware-based networkingChapter10  -- netware-based networking
Chapter10 -- netware-based networking
 
Drink Water To Your Health
Drink Water To Your HealthDrink Water To Your Health
Drink Water To Your Health
 
Chapter14 -- networking security
Chapter14  -- networking securityChapter14  -- networking security
Chapter14 -- networking security
 
Chapter15 -- implementing and managing networks
Chapter15  -- implementing and managing networksChapter15  -- implementing and managing networks
Chapter15 -- implementing and managing networks
 
Ch05 system administration
Ch05 system administration Ch05 system administration
Ch05 system administration
 
Ch11 system administration
Ch11 system administration Ch11 system administration
Ch11 system administration
 
Excel 2007 Unit P
Excel 2007 Unit PExcel 2007 Unit P
Excel 2007 Unit P
 
Ramadan 2008
Ramadan 2008Ramadan 2008
Ramadan 2008
 
Namaz ka tareeqa
Namaz ka tareeqaNamaz ka tareeqa
Namaz ka tareeqa
 
Indiansoldiers
IndiansoldiersIndiansoldiers
Indiansoldiers
 
Ch14 system administration
Ch14 system administration Ch14 system administration
Ch14 system administration
 
Ch10
Ch10Ch10
Ch10
 
Ch20 system administration
Ch20 system administration Ch20 system administration
Ch20 system administration
 
Ch06 system administration
Ch06 system administration Ch06 system administration
Ch06 system administration
 
Ch04
Ch04Ch04
Ch04
 
Ch06
Ch06Ch06
Ch06
 
Ch04 system administration
Ch04 system administration Ch04 system administration
Ch04 system administration
 

Similar to Ch03 (20)

Software
SoftwareSoftware
Software
 
Software
SoftwareSoftware
Software
 
84640411 study-of-unix-os
84640411 study-of-unix-os84640411 study-of-unix-os
84640411 study-of-unix-os
 
Operating Systems
Operating SystemsOperating Systems
Operating Systems
 
OPERATING SYSTEM
OPERATING SYSTEMOPERATING SYSTEM
OPERATING SYSTEM
 
App A
App AApp A
App A
 
Spsl unit1
Spsl   unit1Spsl   unit1
Spsl unit1
 
OS
OSOS
OS
 
ICT PERSENTATION 1.pptx
ICT  PERSENTATION 1.pptxICT  PERSENTATION 1.pptx
ICT PERSENTATION 1.pptx
 
UNIT II-Programming in Linux
UNIT II-Programming in LinuxUNIT II-Programming in Linux
UNIT II-Programming in Linux
 
Unix Tutorial & overview
Unix Tutorial & overviewUnix Tutorial & overview
Unix Tutorial & overview
 
Introduction to Unix
Introduction to UnixIntroduction to Unix
Introduction to Unix
 
Characteristic & Aplication of some popular operating system.
Characteristic & Aplication of some popular operating system.Characteristic & Aplication of some popular operating system.
Characteristic & Aplication of some popular operating system.
 
Edubooktraining
EdubooktrainingEdubooktraining
Edubooktraining
 
Ch3
Ch3Ch3
Ch3
 
Operating-System Structures
Operating-System StructuresOperating-System Structures
Operating-System Structures
 
Unix1
Unix1Unix1
Unix1
 
Two Operating Systems
Two   Operating SystemsTwo   Operating Systems
Two Operating Systems
 
System structure
System structureSystem structure
System structure
 
Linux
LinuxLinux
Linux
 

More from Raja Waseem Akhtar

Chapter16 - the internet and its tools
Chapter16  - the internet and its toolsChapter16  - the internet and its tools
Chapter16 - the internet and its toolsRaja Waseem Akhtar
 
Chapter13 -- ensuring integrity and availability
Chapter13  -- ensuring integrity and availabilityChapter13  -- ensuring integrity and availability
Chapter13 -- ensuring integrity and availabilityRaja Waseem Akhtar
 
Chapter12 -- troubleshooting networking problems
Chapter12  -- troubleshooting networking problemsChapter12  -- troubleshooting networking problems
Chapter12 -- troubleshooting networking problemsRaja Waseem Akhtar
 
Chapter11 -- networking with tcpip and the internet
Chapter11  -- networking with tcpip and the internetChapter11  -- networking with tcpip and the internet
Chapter11 -- networking with tcpip and the internetRaja Waseem Akhtar
 
Chapter09 -- networking with unix and linux
Chapter09  -- networking with unix and linuxChapter09  -- networking with unix and linux
Chapter09 -- networking with unix and linuxRaja Waseem Akhtar
 
Chapter08 -- network operating systems and windows server 2003-based networking
Chapter08  -- network operating systems and windows server 2003-based networkingChapter08  -- network operating systems and windows server 2003-based networking
Chapter08 -- network operating systems and windows server 2003-based networkingRaja Waseem Akhtar
 
Chapter07 -- wa ns and remote connectivity
Chapter07  -- wa ns and remote connectivityChapter07  -- wa ns and remote connectivity
Chapter07 -- wa ns and remote connectivityRaja Waseem Akhtar
 
Chapter06 -- topologies and access methods
Chapter06  -- topologies and access methodsChapter06  -- topologies and access methods
Chapter06 -- topologies and access methodsRaja Waseem Akhtar
 
Chapter05 -- networking hardware
Chapter05  -- networking hardwareChapter05  -- networking hardware
Chapter05 -- networking hardwareRaja Waseem Akhtar
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocolsRaja Waseem Akhtar
 

More from Raja Waseem Akhtar (20)

The prophet's wives
The prophet's wivesThe prophet's wives
The prophet's wives
 
God is Great
God is GreatGod is Great
God is Great
 
Aayat ul qursi
Aayat ul qursiAayat ul qursi
Aayat ul qursi
 
2ªwwii how did it fought
2ªwwii how did it fought2ªwwii how did it fought
2ªwwii how did it fought
 
Fun with EMC2
Fun with EMC2Fun with EMC2
Fun with EMC2
 
Jerusalm at night.pps
Jerusalm at night.ppsJerusalm at night.pps
Jerusalm at night.pps
 
From the sky
From the skyFrom the sky
From the sky
 
Discover the discovery
Discover the discoveryDiscover the discovery
Discover the discovery
 
Solaris servers sec
Solaris servers secSolaris servers sec
Solaris servers sec
 
The OSI - seven layers
The OSI  - seven layersThe OSI  - seven layers
The OSI - seven layers
 
Chapter16 - the internet and its tools
Chapter16  - the internet and its toolsChapter16  - the internet and its tools
Chapter16 - the internet and its tools
 
Chapter13 -- ensuring integrity and availability
Chapter13  -- ensuring integrity and availabilityChapter13  -- ensuring integrity and availability
Chapter13 -- ensuring integrity and availability
 
Chapter12 -- troubleshooting networking problems
Chapter12  -- troubleshooting networking problemsChapter12  -- troubleshooting networking problems
Chapter12 -- troubleshooting networking problems
 
Chapter11 -- networking with tcpip and the internet
Chapter11  -- networking with tcpip and the internetChapter11  -- networking with tcpip and the internet
Chapter11 -- networking with tcpip and the internet
 
Chapter09 -- networking with unix and linux
Chapter09  -- networking with unix and linuxChapter09  -- networking with unix and linux
Chapter09 -- networking with unix and linux
 
Chapter08 -- network operating systems and windows server 2003-based networking
Chapter08  -- network operating systems and windows server 2003-based networkingChapter08  -- network operating systems and windows server 2003-based networking
Chapter08 -- network operating systems and windows server 2003-based networking
 
Chapter07 -- wa ns and remote connectivity
Chapter07  -- wa ns and remote connectivityChapter07  -- wa ns and remote connectivity
Chapter07 -- wa ns and remote connectivity
 
Chapter06 -- topologies and access methods
Chapter06  -- topologies and access methodsChapter06  -- topologies and access methods
Chapter06 -- topologies and access methods
 
Chapter05 -- networking hardware
Chapter05  -- networking hardwareChapter05  -- networking hardware
Chapter05 -- networking hardware
 
Chapter04 -- network protocols
Chapter04  -- network protocolsChapter04  -- network protocols
Chapter04 -- network protocols
 

Recently uploaded

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 

Recently uploaded (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 

Ch03

Editor's Notes

  1. If you are new to the systems you are managing, a first step is to get a laboratory-style notebook and make a map of your network and an inventory of the systems. This map does not need to be complete at the start, but you should create it with an eye toward adding information as you go along. The type of information you keep depends somewhat on your environment, but basic network and system configuration data are a good start. Along the way, you will want to add system-specific quirks, such as odd potential problems or unusual things that need to be done when a system is rebooted. A list of local system modifications and installation procedures should form another section of your system administrator’s notebook. Careful organization can help keep system modifications corralled into manageable areas, but some system configuration information will need to be changed and reinstalled when a system is upgraded. Local installation customs and procedures will also need to be noted, not only for your use but for their use in teaching others and delegating tasks.
  2. System administration is a rapidly evolving field. New tools and new versions of tools appear daily. Security threats and techniques to thwart them are continually changing. Reading books, such as this one and those listed in each chapter’s “References” section, is good a place to start. Short courses and technical conferences offer another avenue for education on current topics. Among the best of these are offered by the USENIX organization in concert with the System Administrator’s Guild (SAGE), and by the System Administration Network Security Institute (SANS). Contact information for both of these organizations is found in the “Reference” section at the end of this chapter.
  3. The graphical user interface (GUI) that is common today originally came from systems developed at Xerox’s Palo Alto Research Center. The Xerox Star was an early office system with overlapping windows, mouse pointer, and WYSIWYG text editing. Although the Star did not survive in the marketplace, it was seen by Steve Jobs (of Apple) on a visit to PARC. Inspired by the Star, Apple produced the LISA and Macintosh, bringing the GUI to a wide market.
  4. One of the fundamental design ideas in the UNIX command line interface is the modular combination of basic commands. Many UNIX commands were designed to allow them to be flexibly combined to process or filter information as it is passed from command to command. The vertical bar character, called a pipe, is used to form the connection between commands. Data flows from left to right between commands.
  5. One of the fundamental design ideas in the UNIX command line interface is the modular combination of basic commands. Many UNIX commands were designed to allow them to be flexibly combined to process or filter information as it is passed from command to command. The vertical bar character, called a pipe, is used to form the connection between commands. Data flows from left to right between commands. NOTE: When creating archives using tar , be aware that the path given to tar for the files or directories being archived is saved in the archive, along with the files and directories. If a full path is given (e.g., /home/dwight/AudioBooks ), older versions of tar will not be able to extract the files and directories in any location other than the path they were archived from. Although modern tar commands have the ability to get around this using an option flag, it is a good habit to use a relative path, as demonstrated in the previous example. Archives created with a relative path can be extracted in any location.
  6. One of the fundamental design ideas in the UNIX command line interface is the modular combination of basic commands. Many UNIX commands were designed to allow them to be flexibly combined to process or filter information as it is passed from command to command. The vertical bar character, called a pipe, is used to form the connection between commands. Data flows from left to right between commands. NOTE: When creating archives using tar , be aware that the path given to tar for the files or directories being archived is saved in the archive, along with the files and directories. If a full path is given (e.g., /home/dwight/AudioBooks ), older versions of tar will not be able to extract the files and directories in any location other than the path they were archived from. Although modern tar commands have the ability to get around this using an option flag, it is a good habit to use a relative path, as demonstrated in the previous example. Archives created with a relative path can be extracted in any location. NOTE: One of the most important aspects of the Windows versions of perl and UNIX-like toolkits for Windows is their use in remote system administration. Command line tools such as these can be used remotely to perform basic administration tasks that would ordinarily need to be performed from the Windows console.
  7. As mentioned, information on GUI tools and windowed desktop environments is incorporated where it relates to the task at hand. Most of the tools covered are specific to a given task. However, there are several general-purpose GUI tools a system administrator should be aware of.