This document provides an overview of Unix users and file permissions. It discusses the different types of users in Unix including root, system, and general users. It also covers file permissions in terms of ownership levels, permission types, and how to change permissions using the chmod command in both symbolic and octal modes. Examples are provided for managing users and groups as well as setting permissions on files and directories. The document contains content for a training course on Unix users and file permissions.
The document provides information about various Unix commands including:
- The type command is used to determine if a command is internal or external. Internal commands are built into the shell while external commands are located in directories like /bin.
- The man command displays online manual pages for commands and provides details on usage, options, and examples. It can be used with options like -f to show what section a command is in or -k to search manuals.
- The whatis command displays a one-line description of commands from their manual pages.
- Commands like who, users, whoami display information about the logged in user like username, terminal, and login time. The last command shows login history
This document provides an overview of basic Unix commands, including:
- Commands for navigating directories (cd, pwd, ls), creating/removing directories and files (mkdir, rmdir, cp, rm)
- Commands for viewing file contents (cat, more, less) and comparing files (diff)
- Commands for searching files (grep) and counting elements (wc)
- Commands for changing file permissions (chmod) and moving/renaming files (mv)
It also briefly describes shells, files and pathnames in Unix systems. The document is intended as an introduction for new Unix users to understand basic file management and navigation.
The document provides an overview of the Linux operating system. It discusses key Linux concepts like the kernel, shell, file structure, users and permissions. It also summarizes common Linux commands for file management, editing, users, groups, software installation and services. Key tools covered include vi editor, rpm, tar, useradd/del, service and chkconfig. The document is intended as part of an introductory Linux presentation.
Chapter 2 Introduction to Unix ConceptsMeenalJabde
The document provides an introduction to Unix concepts including:
1. It describes the architecture of Unix as having 4 layers - hardware, kernel, shell commands, and application layer. The kernel interacts with hardware and manages tasks like memory and process scheduling.
2. It lists some basic Unix commands like ls, echo, printf, who, date, passwd, cal and explains how to combine commands using operators like && and ||.
3. It explains Unix files and directories are organized in a hierarchical tree structure with the root directory at the top. There are different types of files like ordinary, special, pipes and symbolic links.
This document provides information on the AddUsers.exe and ARP.exe Windows commands and the ASSOC command. It describes:
- AddUsers.exe automates creating large numbers of user accounts from a comma-delimited file and has options to create, dump, or erase accounts.
- ARP.exe displays and modifies the IP to physical address translation tables used for address resolution, allowing the viewing, adding, and deleting of ARP entries.
- ASSOC associates file extensions with file types in Windows so applications know what type of file it is based on the extension. It allows displaying, adding, and changing the file type associated with an extension.
This document provides an overview of the Linux operating system. It discusses key Linux concepts like the kernel, shell, file system structure, permissions, users and groups. It also summarizes important commands for navigating and managing files, directories, users, software and services in Linux. These include commands like ls, cd, mkdir, chmod, useradd, yum, service and chkconfig. The document outlines the directory structure in Linux and describes important directories like /bin, /home, /etc. It also covers processes, pipes, redirection and Linux file systems & partitions.
Tool Development 08 - Windows Command PromptNick Pruehs
Chapter 08 of the lecture Tool Development taught at SAE Institute Hamburg.
Introduction to the windows command prompt, and command-line arguments and calling external programs in .NET.
The document provides information about various Unix commands including:
- The type command is used to determine if a command is internal or external. Internal commands are built into the shell while external commands are located in directories like /bin.
- The man command displays online manual pages for commands and provides details on usage, options, and examples. It can be used with options like -f to show what section a command is in or -k to search manuals.
- The whatis command displays a one-line description of commands from their manual pages.
- Commands like who, users, whoami display information about the logged in user like username, terminal, and login time. The last command shows login history
This document provides an overview of basic Unix commands, including:
- Commands for navigating directories (cd, pwd, ls), creating/removing directories and files (mkdir, rmdir, cp, rm)
- Commands for viewing file contents (cat, more, less) and comparing files (diff)
- Commands for searching files (grep) and counting elements (wc)
- Commands for changing file permissions (chmod) and moving/renaming files (mv)
It also briefly describes shells, files and pathnames in Unix systems. The document is intended as an introduction for new Unix users to understand basic file management and navigation.
The document provides an overview of the Linux operating system. It discusses key Linux concepts like the kernel, shell, file structure, users and permissions. It also summarizes common Linux commands for file management, editing, users, groups, software installation and services. Key tools covered include vi editor, rpm, tar, useradd/del, service and chkconfig. The document is intended as part of an introductory Linux presentation.
Chapter 2 Introduction to Unix ConceptsMeenalJabde
The document provides an introduction to Unix concepts including:
1. It describes the architecture of Unix as having 4 layers - hardware, kernel, shell commands, and application layer. The kernel interacts with hardware and manages tasks like memory and process scheduling.
2. It lists some basic Unix commands like ls, echo, printf, who, date, passwd, cal and explains how to combine commands using operators like && and ||.
3. It explains Unix files and directories are organized in a hierarchical tree structure with the root directory at the top. There are different types of files like ordinary, special, pipes and symbolic links.
This document provides information on the AddUsers.exe and ARP.exe Windows commands and the ASSOC command. It describes:
- AddUsers.exe automates creating large numbers of user accounts from a comma-delimited file and has options to create, dump, or erase accounts.
- ARP.exe displays and modifies the IP to physical address translation tables used for address resolution, allowing the viewing, adding, and deleting of ARP entries.
- ASSOC associates file extensions with file types in Windows so applications know what type of file it is based on the extension. It allows displaying, adding, and changing the file type associated with an extension.
This document provides an overview of the Linux operating system. It discusses key Linux concepts like the kernel, shell, file system structure, permissions, users and groups. It also summarizes important commands for navigating and managing files, directories, users, software and services in Linux. These include commands like ls, cd, mkdir, chmod, useradd, yum, service and chkconfig. The document outlines the directory structure in Linux and describes important directories like /bin, /home, /etc. It also covers processes, pipes, redirection and Linux file systems & partitions.
Tool Development 08 - Windows Command PromptNick Pruehs
Chapter 08 of the lecture Tool Development taught at SAE Institute Hamburg.
Introduction to the windows command prompt, and command-line arguments and calling external programs in .NET.
The document provides an overview of the history and development of the UNIX operating system from 1965 to 1983. It describes how UNIX originated from the Multics project at Bell Labs and MIT in 1965. It was further developed by AT&T in the 1970s and rewritten in C by Dennis Ritchie in 1973. The document also discusses the development of BSD and System V UNIX variants in the 1980s.
The document provides tips for improving productivity when using the Unix command line. It discusses advantages of the shell like flexibility and chaining commands together. It then gives examples of using shell commands in scripting languages. The majority of the document provides examples of specific Unix commands like grep, find, less and their usage for tasks like file searching, viewing files and directory listings. It concludes with tips on aliases, environment variables and symbolic links.
This document provides an overview of system administrator tasks and basic UNIX concepts. It discusses the roles and responsibilities of system administrators, the structure and components of UNIX operating systems, basic commands for navigating the file system, managing files and directories, editing text, and running processes. It also covers shells, variables, and cron jobs for scheduling automated tasks. The document concludes with introductions to AIX operating systems and IBM pSeries servers.
This program implements the First Come First Serve (FCFS) CPU scheduling algorithm in C. It takes the arrival time and service time of each process as input, calculates the start time, finish time, waiting time and turnaround time of each process, and outputs these values along with the average waiting time and average turnaround time. The processes are scheduled in the order of their arrival, with no preemption, following the FCFS principle.
Basic of and Unix and Command. More presentation you can find on www.scmGalaxy.com.
scmGalaxy.com is dedicated to software configuration, build and Release management. This covers CVS, VSS (Visual Source Safe),Perforce, SVN(Subversion) MKS Integrity, ClearCase,TFS,CM Synergy, Best Practices ,AnthillPro, Apache Ant, Maven, Bamboo, Cruise Control and many more tools.
Linux is an open source operating system created by Linus Torvalds in 1991. It uses a Linux kernel and includes many common Unix tools. Linux is free to use and modify due to its open source licensing. It runs on many hardware platforms and is growing in popularity for servers, desktops, and embedded systems due to its low cost, stability, and security. Users can download Linux from distributions like Red Hat which package the Linux kernel with additional software and support.
This document provides information about various Linux commands. It begins by defining what a command is and explaining the different types of commands - built-in shell commands and external commands. It then discusses command navigation shortcuts and various file manipulation commands like mkdir, rmdir, touch, cp, rm, man, head, tail, cat, tac, more and files. The document also covers the Linux filesystem hierarchy standard and describes the main directories for binaries, configuration, data and memory. Overall, the document serves as a guide to common Linux commands and filesystem structure.
This document provides an overview of basic Unix commands including ls, cd, pwd, mkdir, rm, rmdir, cp, find, touch, echo, cat, who, and du. It explains what each command is used for and provides examples of common usages. The document serves as a beginner's guide to learning Unix commands.
Linux provides a login prompt to enter a username and password. Upon successful login, the shell prompt is displayed and the user can begin entering commands. Common commands include ls to view files, man to access documentation, and vim to edit text files. Help is available through built-in documentation accessed with commands like man, info, and --help flags.
This document provides instructions for various exercises to be completed as part of an Operating Systems lab manual. It includes exercises on system calls like fork, exec, wait; I/O system calls; simulating commands like ls and grep; scheduling algorithms like FCFS, SJF, priority, round robin; inter-process communication using shared memory, pipes, message queues; the producer-consumer problem using semaphores; and memory management schemes including paging, segmentation, and file allocation techniques. Example code is provided for implementing different memory management algorithms using concepts like free space list, allocated space list, and block merging.
This document provides an index of 21 coding topics that include performing arithmetic operations, comparison of numbers, compound interest calculation, prime number checking, and palindrome checking. It also includes displaying a Fibonacci series, calculating simple interest, and swapping numbers without using three variables. The index provides the topic name and number for each item.
This Operating System lab manual is designed strictly according to BPUT Syllabus.Any suggestions or comments are well come at neelamani.samal@gmail.com
This document provides an overview of basic Linux commands for navigation, listing directories, reading and manipulating files. It explains commands like pwd, cd, ls, cat, cp, mv, rm, mkdir to change directories, list files, read files, copy, move and delete files/directories. It also introduces the vi editor for creating new files and mentions some other miscellaneous commands like date, chmod, user management tools.
5_File_Handling_Commands__vi_editor_and_environment_variablesGautam Raja
This document provides a content manual for the TATA CONSULTANCY SERVICES Pre ILP – Unix LOUNGE. It contains two chapters, the first discussing basic Unix file commands like touch, cat, cp, mv, rm, and find. The second chapter covers basics of the vi text editor and environment variables. It describes vi modes, commands for navigation, editing, saving and exiting. It also explains how environment variables control the system behavior and lists some common ones like HOME, PATH, and PS1.
Unix is an operating system that provides an interface between users and hardware. It manages storage, I/O devices, and allows for multi-tasking and multi-user access. The Unix operating system originated in 1969 and has evolved over time with contributions from various universities and companies. It uses a kernel to manage interactions between users, applications, and hardware. The shell is the interface that users interact with to run commands and programs on the system.
VTU 3RD SEM UNIX AND SHELL PROGRAMMING SOLVED PAPERSvtunotesbysree
This document contains information about a UNIX and Shell Programming exam, including:
- The exam is for a 4th semester BE degree and covers UNIX and Shell Programming topics.
- It has two parts (A and B) and students must answer 5 full questions selecting at least 2 from each part.
- Part 1 covers topics like UNIX architecture, parent-child relationships, file systems, and file permissions.
- Part 2 covers topics like grep commands, sed editing, regular expressions, shell features, AWK and Perl programming.
This ppt contains basic commands of UNIX operating system. This ppt is prepared by Dr. Rajiv Srivastava who is a director of SIRT, Bhopal which is a Best Engineering College in Central. India
Linux allows multiple users to access the system simultaneously. Users are uniquely identified by their UID, and can be regular users or superusers. Superusers have full access while regular users have limited access. The system administrator manages users and groups. Users can be created with the useradd command and assigned to primary and supplementary groups. User properties like login, UID, home directory and shell are set during creation. Users can be modified, locked, unlocked and deleted using related commands. Groups organize users and are managed using groupadd, groupmod, and groupdel. Permissions allow controlling access for users and groups.
This document provides information about the vi text editor in Unix-based systems. It discusses vi's three modes: command mode, insert mode, and ex mode. It describes basic cursor movement, editing, searching, and file saving commands. The document is intended to help users understand how to use the vi editor to create, edit, and save text files on Unix systems.
SharePoint Summit Toronto - Practical Information Architecture Tools and Tech...Richard Harbridge
This document provides an overview of a presentation on practical tools and techniques for SharePoint information architects. The presentation covers why SharePoint information architecture is difficult due to its large scale and complex people aspects. It discusses using an iterative approach to define problems and build solutions. The presentation aims to share ideas and tools to help attendees improve communication and gain knowledge to use with confidence. It outlines covering topics like visualizing and communicating SharePoint concepts, making IA decisions, and tips and tricks, as well as a case study approach.
The document provides an overview of the history and development of the UNIX operating system from 1965 to 1983. It describes how UNIX originated from the Multics project at Bell Labs and MIT in 1965. It was further developed by AT&T in the 1970s and rewritten in C by Dennis Ritchie in 1973. The document also discusses the development of BSD and System V UNIX variants in the 1980s.
The document provides tips for improving productivity when using the Unix command line. It discusses advantages of the shell like flexibility and chaining commands together. It then gives examples of using shell commands in scripting languages. The majority of the document provides examples of specific Unix commands like grep, find, less and their usage for tasks like file searching, viewing files and directory listings. It concludes with tips on aliases, environment variables and symbolic links.
This document provides an overview of system administrator tasks and basic UNIX concepts. It discusses the roles and responsibilities of system administrators, the structure and components of UNIX operating systems, basic commands for navigating the file system, managing files and directories, editing text, and running processes. It also covers shells, variables, and cron jobs for scheduling automated tasks. The document concludes with introductions to AIX operating systems and IBM pSeries servers.
This program implements the First Come First Serve (FCFS) CPU scheduling algorithm in C. It takes the arrival time and service time of each process as input, calculates the start time, finish time, waiting time and turnaround time of each process, and outputs these values along with the average waiting time and average turnaround time. The processes are scheduled in the order of their arrival, with no preemption, following the FCFS principle.
Basic of and Unix and Command. More presentation you can find on www.scmGalaxy.com.
scmGalaxy.com is dedicated to software configuration, build and Release management. This covers CVS, VSS (Visual Source Safe),Perforce, SVN(Subversion) MKS Integrity, ClearCase,TFS,CM Synergy, Best Practices ,AnthillPro, Apache Ant, Maven, Bamboo, Cruise Control and many more tools.
Linux is an open source operating system created by Linus Torvalds in 1991. It uses a Linux kernel and includes many common Unix tools. Linux is free to use and modify due to its open source licensing. It runs on many hardware platforms and is growing in popularity for servers, desktops, and embedded systems due to its low cost, stability, and security. Users can download Linux from distributions like Red Hat which package the Linux kernel with additional software and support.
This document provides information about various Linux commands. It begins by defining what a command is and explaining the different types of commands - built-in shell commands and external commands. It then discusses command navigation shortcuts and various file manipulation commands like mkdir, rmdir, touch, cp, rm, man, head, tail, cat, tac, more and files. The document also covers the Linux filesystem hierarchy standard and describes the main directories for binaries, configuration, data and memory. Overall, the document serves as a guide to common Linux commands and filesystem structure.
This document provides an overview of basic Unix commands including ls, cd, pwd, mkdir, rm, rmdir, cp, find, touch, echo, cat, who, and du. It explains what each command is used for and provides examples of common usages. The document serves as a beginner's guide to learning Unix commands.
Linux provides a login prompt to enter a username and password. Upon successful login, the shell prompt is displayed and the user can begin entering commands. Common commands include ls to view files, man to access documentation, and vim to edit text files. Help is available through built-in documentation accessed with commands like man, info, and --help flags.
This document provides instructions for various exercises to be completed as part of an Operating Systems lab manual. It includes exercises on system calls like fork, exec, wait; I/O system calls; simulating commands like ls and grep; scheduling algorithms like FCFS, SJF, priority, round robin; inter-process communication using shared memory, pipes, message queues; the producer-consumer problem using semaphores; and memory management schemes including paging, segmentation, and file allocation techniques. Example code is provided for implementing different memory management algorithms using concepts like free space list, allocated space list, and block merging.
This document provides an index of 21 coding topics that include performing arithmetic operations, comparison of numbers, compound interest calculation, prime number checking, and palindrome checking. It also includes displaying a Fibonacci series, calculating simple interest, and swapping numbers without using three variables. The index provides the topic name and number for each item.
This Operating System lab manual is designed strictly according to BPUT Syllabus.Any suggestions or comments are well come at neelamani.samal@gmail.com
This document provides an overview of basic Linux commands for navigation, listing directories, reading and manipulating files. It explains commands like pwd, cd, ls, cat, cp, mv, rm, mkdir to change directories, list files, read files, copy, move and delete files/directories. It also introduces the vi editor for creating new files and mentions some other miscellaneous commands like date, chmod, user management tools.
5_File_Handling_Commands__vi_editor_and_environment_variablesGautam Raja
This document provides a content manual for the TATA CONSULTANCY SERVICES Pre ILP – Unix LOUNGE. It contains two chapters, the first discussing basic Unix file commands like touch, cat, cp, mv, rm, and find. The second chapter covers basics of the vi text editor and environment variables. It describes vi modes, commands for navigation, editing, saving and exiting. It also explains how environment variables control the system behavior and lists some common ones like HOME, PATH, and PS1.
Unix is an operating system that provides an interface between users and hardware. It manages storage, I/O devices, and allows for multi-tasking and multi-user access. The Unix operating system originated in 1969 and has evolved over time with contributions from various universities and companies. It uses a kernel to manage interactions between users, applications, and hardware. The shell is the interface that users interact with to run commands and programs on the system.
VTU 3RD SEM UNIX AND SHELL PROGRAMMING SOLVED PAPERSvtunotesbysree
This document contains information about a UNIX and Shell Programming exam, including:
- The exam is for a 4th semester BE degree and covers UNIX and Shell Programming topics.
- It has two parts (A and B) and students must answer 5 full questions selecting at least 2 from each part.
- Part 1 covers topics like UNIX architecture, parent-child relationships, file systems, and file permissions.
- Part 2 covers topics like grep commands, sed editing, regular expressions, shell features, AWK and Perl programming.
This ppt contains basic commands of UNIX operating system. This ppt is prepared by Dr. Rajiv Srivastava who is a director of SIRT, Bhopal which is a Best Engineering College in Central. India
Linux allows multiple users to access the system simultaneously. Users are uniquely identified by their UID, and can be regular users or superusers. Superusers have full access while regular users have limited access. The system administrator manages users and groups. Users can be created with the useradd command and assigned to primary and supplementary groups. User properties like login, UID, home directory and shell are set during creation. Users can be modified, locked, unlocked and deleted using related commands. Groups organize users and are managed using groupadd, groupmod, and groupdel. Permissions allow controlling access for users and groups.
This document provides information about the vi text editor in Unix-based systems. It discusses vi's three modes: command mode, insert mode, and ex mode. It describes basic cursor movement, editing, searching, and file saving commands. The document is intended to help users understand how to use the vi editor to create, edit, and save text files on Unix systems.
SharePoint Summit Toronto - Practical Information Architecture Tools and Tech...Richard Harbridge
This document provides an overview of a presentation on practical tools and techniques for SharePoint information architects. The presentation covers why SharePoint information architecture is difficult due to its large scale and complex people aspects. It discusses using an iterative approach to define problems and build solutions. The presentation aims to share ideas and tools to help attendees improve communication and gain knowledge to use with confidence. It outlines covering topics like visualizing and communicating SharePoint concepts, making IA decisions, and tips and tricks, as well as a case study approach.
The second presentation in the 'Governance Rules!' series for the European SharePoint community, focusing on the important role permissions play in building your SharePoint governance strategy.
Active Directory File Permissions. Get Fast Answers to Who? What?SolarWinds
Need instantaneous visibility into user group permissions? Look no further. SolarWinds has a Free Tool that provides you a complete hierarchical view of the effective permissions access rights for a specific file folder (NTFS) or share drive! Learn more.
This document discusses Linux file permissions. It explains that each file belongs to a user and group, and access is controlled by permissions for the user, group and others. It then covers the chmod command for modifying permissions, showing examples of using numbers, letters, and operators to set read, write and execute permissions for users, groups and others. The document also introduces the chown and chgrp commands for changing a file's owner and group.
Data-Ed Webinar: Data Governance StrategiesDATAVERSITY
This webinar discusses data governance strategies and provides an overview of key concepts. It covers defining data governance and why it is important, outlining requirements for effective data governance such as accessibility, security, consistency, quality and being auditable. The presentation also discusses data governance frameworks, components, and best practices, providing examples to illustrate how data governance can be implemented and help organizations.
The document discusses six key questions organizations should ask about data governance: 1) Do we have a government structure in place to oversee data governance? 2) How can we assess our current data governance situation? 3) What is our data governance strategy? 4) What is the value of our data? 5) What are our data vulnerabilities? 6) How can we measure progress in data governance? It provides details on each question, highlighting the importance of leadership, benchmarks, strategic planning, risk assessment, and metrics in developing an effective data governance program.
This presentation reports on data governance best practices. Based on a definition of fundamental terms and the business rationale for data governance, a set of case studies from leading companies is presented. The content of this presentation is a result of the Competence Center Corporate Data Quality (CC CDQ) at the University of St. Gallen, Switzerland.
How to Build & Sustain a Data Governance Operating Model DATUM LLC
Learn how to execute a data governance strategy through creation of a successful business case and operating model.
Originally presented to an audience of 400+ at the Master Data Management & Data Governance Summit.
Visit www.datumstrategy.com for more!
Don't be deceived by the simplified experience of managing SharePoint permissions! What appears to be harmless could tailspin to a giant mess, requiring massive cleanup. This presentation walks through real-world scenarios and pitfalls of permissions administrations, so you could learn from the mistakes of others and not end up digging yourself into a SharePoint permissions hole.
View a recording of the session here: https://www.youtube.com/watch?v=Poh4zxHTNvw
Introduction to Data Governance
Seminar hosted by Embarcadero technologies, where Christopher Bradley presented a session on Data Governance.
Drivers for Data Governance & Benefits
Data Governance Framework
Organization & Structures
Roles & responsibilities
Policies & Processes
Programme & Implementation
Reporting & Assurance
This document reviews several existing data management maturity models to identify characteristics of an effective model. It discusses maturity models in general and how they aim to measure the maturity of processes. The document reviews ISO/IEC 15504, the original maturity model standard, outlining its defined structure and relationship between the reference model and assessment model. It discusses how maturity levels and capability levels are used to characterize process maturity. The document also looks at issues with maturity models and how they can be improved.
The document discusses file permissions and access modes in Unix/Linux systems. It covers the three levels of permissions - owner, group, and other. It explains how to use the ls -l command to view permissions and the chmod command to modify permissions using either symbolic modes like u+x or absolute modes like 755. It also covers changing file ownership with chown and group ownership with chgrp.
The document provides an introduction to the Linux operating system, explaining that it allows multiple users to be logged in simultaneously and runs processes separately using the kernel. It describes the directory and file system structure, including inodes that contain metadata for each file, and how permissions are assigned to users, groups, and others for access to files based on read, write and execute permissions. Finally, it covers how to view and set file permissions using symbolic modes like chmod and absolute octal modes.
The document discusses Linux file systems and permissions. It describes the Virtual File System (VFS) interface and how it interacts with filesystems, inodes, and open files. It then discusses the EXT2 filesystem in more detail, including how inodes store file metadata and pointers to data blocks. It also covers how permissions and ownership are represented, and commands to view and modify permissions like chmod, chown, and umask. Finally, it briefly discusses hard and soft links, and sticky bits.
The document discusses Linux file systems and permissions. It describes the Virtual File System (VFS) interface and how it interacts with filesystems, inodes, and open files. It then discusses the EXT2 filesystem in more detail, describing how inodes store file metadata and how hard and soft links work. It also covers common Linux permissions and how to manage users, groups, and permissions using commands like chmod, chown, useradd, and others.
This document provides an overview of the basics of Linux, including Linux distributions, components other than the kernel, popular distributions, getting connected via command line and SSH, common directories, the shell, command line vs GUI, basic commands, file permissions, and copying/moving files. It discusses key topics like the Linux kernel, distributions, directories, shells, commands, permissions, and file operations.
The document discusses Unix system accounts and account management. It covers the following key points:
- There are two types of user accounts: root (superuser) and normal users. Root has full access and control over the system.
- Files like /etc/passwd, /etc/shadow, and /etc/group are used to store user, password, and group information. Commands like useradd, userdel, and groupadd are used to manage accounts.
- Groups allow grouping of users to facilitate sharing of files/directories. The group file, /etc/group, associates users with groups. Permissions can be set to allow group access/modification of files.
Most frequently used unix commands for database administratorDinesh jaisankar
This document provides a summary of common UNIX commands for database administrators (DBAs). It begins with an introduction and is organized into sections on file and directory navigation, file permissions, OS user management, process monitoring, and performance monitoring. Specific commands covered include ls, cd, cp, find, head, tail, less, more, cat, mkdir, rm, rmdir, touch, whereis, which, umask, chmod, chown, chgrp, useradd, usermod, userdel, passwd, who, groupadd, groupdel, ps, uname, hostname, gzip, gunzip, vmstat, top, mpstat, sar, and df.
This document provides information about the Operating System & Linux Programming course BCA 301. It covers topics like file concepts, types, operations, directory structure, file security permissions in Linux. File concepts are explained - files store data and act as input/output medium. Types of files are ordinary, directory, device, FIFO. File operations include create, delete, open, close, read, write etc. Directory structure can be single level, hierarchical with examples. File system structure and access methods like sequential, indexed, direct are defined. Linux file security model and permissions for owner, group, other users are described. Methods to view, modify permissions using symbolic and numeric modes with chmod command are explained.
Human: Thank
- Linux originated as a clone of the UNIX operating system. Key developers included Linus Torvalds and developers from the GNU project.
- Linux is open source, multi-user, and can run on a variety of hardware. It includes components like the Linux kernel, shell, terminal emulator, and desktop environments.
- The document provides information on common Linux commands, files, users/groups, permissions, and startup scripts. It describes the Linux file system and compression/archiving utilities.
Linux Operating System. Unix_Lec-6.pptxHITENKHEMANI
This document discusses Unix shell programming and specifically focuses on redirection of standard input and output streams. It describes how the standard input, output, and error streams are represented by file descriptors 0, 1, and 2 respectively. It explains how to redirect standard input using <, standard output using >, and standard error using 2>. The document also covers changing file and directory permissions using the chmod command in both relative and absolute manners.
The document discusses file access permissions in Linux operating systems. It explains that there are three types of permissions - read, write and execute - that can be assigned to a file's owner, group and others. These permissions determine who can access the file and what actions they can take. The ls -l command displays the permissions in the form of 10 characters that show the file type and permissions for each user category. The chmod command can be used to change these permissions using either absolute numeric modes or symbolic modes.
Most file systems have methods to assign permissions or access rights to specific users and groups of users.
These system control the ability of the users to view, change, navigate, and execute the contents of the file system.
Permissions on the linux- systems are managed in three distinct scopes or classes. Theses scopes are known as users, groups or others.
This document provides an overview of shell scripting. It begins with an introduction to shells and shell scripting languages. The main sections cover variables, file permissions, input/output redirection, writing simple scripts, arithmetic operations, flow control statements like if/else and loops, and common Unix utilities that can be used in scripts like grep, sed, and awk. The document aims to introduce the basics of shell scripting to help users get started with writing and running simple shell scripts on Linux/Unix systems.
The document provides information on basic Linux commands for working with files, permissions, users and running levels. Some key points:
- Commands like ls, du, df, free are used to view disk usage, files, permissions and available memory. chmod, chown, chgrp change file/folder permissions and ownership.
- Permissions are represented by rwx for read, write and execute for the user, group and others. Numerical values like 755 can set complex permission schemes.
- Linux has 7 run levels from 0-6 for different system states like shutdown, single-user mode, multi-user with networking. Services are started via links in run level directories.
- Common commands
This document provides an overview of a presentation on Linux programming and administration. It covers the history of Unix and Linux, files and directories in Linux, Linux installation, basic Linux commands, user and group administration, and LILO (Linux Loader). The document introduces key topics like Unix flavors, Linux distributions, partitioning and formatting disks for Linux installation, the file system hierarchy standard, and access permissions in Linux.
101 4.5 manage file permissions and ownership v3Acácio Oliveira
This document discusses Linux file permissions and ownership. It covers commands used to manage permissions and ownership, including chmod, chown, chgrp, umask. Key areas covered include permissions for users, groups and others; permission levels for files and directories; and configuring user and group information stored in /etc/passwd, /etc/shadow, and /etc/groups files. The goal is to teach system administrators how to manage access permissions on files and directories to maintain security.
The document discusses Linux file security and permissions. It covers users and groups, file ownership and permissions, and tools for managing them like useradd, chown, chmod, and ACLs. Key points include each user having a unique UID and belonging to groups with GIDs. File permissions are controlled by the user, group and other access modes. Tools like chmod and ACLs provide advanced permission control beyond the standard user/group/other model.
This document discusses several aspects of the Unix operating system including its architecture, file system, and common commands.
The Unix architecture allows multiple users to simultaneously access the same system through its multi-user capabilities. The operating system is divided into layers with different components handling file creation, date display, and other functions.
The Unix file system distinguishes between different file types and stores file data and metadata in blocks across memory. File information is stored in inodes which can be changed under certain conditions like modifying file attributes.
Common Unix commands allow users to secure their accounts, display messages, check active users, print file names, and format output text over multiple lines.
This document provides examples of using the find command to search for files on Linux/Unix systems based on various criteria such as name, type, size, permissions, and modification time. It demonstrates how to search for files by name using wildcards, search multiple directories, and execute actions on the search results. The find command is a powerful and flexible utility for locating files and performing operations on the files found.
This document contains 3 sections:
1. A confidentiality statement for a proposal from Tata Consultancy Services noting that any information received should be kept confidential.
2. A reference to Tata's Code of Conduct which all employees are expected to adhere to, including reporting any violations.
3. A table of contents for a document on Unix command usage which provides examples of commands like bc, passwd, uname, and tty.
The document contains a confidentiality statement indicating that the information is confidential and intended solely for the purpose of evaluating a proposal from Tata Consultancy Services Limited. It requires recipients to maintain confidentiality and not disclose the information without authorization. It also references Tata's Code of Conduct which governs dealings in an ethical manner. The document includes a table of contents listing basic UNIX commands that will be described.
This document contains 3 sections that discuss shell quoting mechanisms in Unix shells:
1. It defines wildcard characters like * and ? that can represent multiple or single characters when listing files.
2. It describes different quoting mechanisms - single quotes, double quotes, and backticks. Single quotes preserve literal meaning, double quotes allow variable substitution but preserve special characters, and backticks execute commands.
3. It provides examples of using each quoting mechanism, such as using double quotes to substitute a variable value and backticks to capture the output of a date command.
This document provides instructions for using WinSCP to securely transfer files between a local computer and a remote server. It begins with an introduction to WinSCP and Secure FTP. It then outlines the steps to log in to a server, download files from the remote server to the local machine, upload files from the local machine to the remote server, and save login sessions for future use. The steps include entering host name, username, password, selecting protocol (SFTP/SCP), navigating directories, dragging and dropping or copying files between the local and remote panes.
Putty is a free SSH and telnet client for Windows systems that allows connecting to remote servers via command line. To use Putty, enter the server IP address and login credentials. Settings like background color can be changed by going to Change Settings and selecting Color from the menu. Changes are saved by giving a name to the session and clicking Save.
1_Introduction_To_Unix_and_Basic_Unix_CommandsGautam Raja
This document provides a content manual for the TATA CONSULTANCY SERVICES Pre ILP – Unix LOUNGE. It contains two chapters that introduce basic Unix concepts and commands. Chapter 1 covers an overview of operating systems and the architecture of Unix, including the kernel, shell, file system structure, and flavors of Unix. Chapter 2 describes basic Unix commands such as ls, pwd, man, date, and cal. It provides examples and explanations of how to use the options for each command. The document is intended to teach users fundamental Unix knowledge and skills.
1. Document Number: Copy Number:
TATA CONSULTANCY SERVICES
PRE ILP – Unix LOUNGE
Content Manual Version 1.0
March 2014
2. DOCUMENT RELEASE NOTICE
Notice No.
Client
Project
Document details
Name Version No. Author Description
Revision details:
Action taken
(add/del/chg
)
Preceding
page No.
New
page No.
Revision
description
Change Register serial numbers covered:
The documents or revised pages are subject to document control.
Please keep them up-to-date using the release notices from the distributor of the document.
These are confidential documents. Unauthorised access or copying is prohibited.
Approved by : ________________________________ Date: _________
Authorised by: ________________________________ Date: _________
TCS PreILP - Unix Lounge Content Manual – Ver. 1.0
5. CHAPTER 3 - UNIX USERS AND FILE
PERMISSIONS
3.1 Objective
To understand about the different users in UNIX and their access rights.
3.2 Course Content
Type of users
File permissions
Changing permissions using symbolic mode
Changing permissions using octal mode
3.2.1 Types of users in Unix
There are three types of accounts on a Unix system:
- Root Account
- System Account
- User Account
Root System User
● This is also called
superuser and would
have complete and
unfettered control of the
system.
● A superuser can run
any commands without
any restriction. This
user should be
assumed as a system
administrator.
● System accounts are
those needed for the
operation of system-
specific components for
example mail accounts
and the sshd accounts.
● These accounts are
usually needed for
some specific function
on your system, and
any modifications to
them could adversely
affect the system.
● User accounts provide
interactive access to
the system for users
and groups of users.
● General users are
typically assigned to
these accounts and
usually have limited
access to critical
system files and
directories.
6. 3.2.2 Managing users and groups
Unix supports a concept of Group which logically groups a number of
accounts.
Every account would be a part of any group.
Unix groups plays important role in handling file permissions and process
management.
Grouping of users allows to grant and revoke file permissions collectively.
/etc/passwd: Keeps user account and password information.
/etc/shadow: Holds the encrypted password of the corresponding account. Not
all the system support this file.
/etc/group: This file contains the group information for each account.
/etc/gshadow: This file contains secure group account information.
3.2.3 File Permission: Ownerships level
File ownership is an important component of Unix that provides a secure method
for storing files. Every file in Unix has the following attributes:
Permission Symbol Description
Owner
Permissions
u The owner's permissions determine what actions the
owner of the file can perform on the file.
Group
Permissions
g The group's permissions determine what actions a
user, who is a member of the group that a file
belongs to, can perform on the file.
Other
Permissions
o The permissions for others indicate what action all
other users can perform on the file.
7. 3.2.4 File Permission Types (Mode)
Three type of permissions can be set any ownership level:
Read, Write and Execute
Three modes or permissions have different meaning for file and directory;
3.2.5 Unix - File Permission / Access Modes
Consider the output of the command ls -l
Out of 9 columns in output, 1st column indicates the file type and its
permissions.
This Column contains 10 characters.
Character 1 : Represents File Type ( 'd' : Directory; '-' : Regular File )
Character 2-4 : Represents Permission for owner(user) of file
Character 5-7 : Represents Permission for group user belongs to.
Character 8-10 : Represents Permission for other
Mode Sym
bol
For File For Directory
Read r Allows to view the content Allows to view the directory
content using ls command
Write
w Allows edit and save changes. Create and delete files in the
directory
Execute
x Allows to run program or script Allows to access the files in the
directory
8. 3.2.6 Changing Permissions (chmod)
To change file or directory permissions, the chmod (change mode) command is
used.
There are two ways to use chmod:
Symbolic mode
Absolute mode
chmod command options:
3.2.6.1 Using chmod in Symbolic Mode
With symbolic representation, permission set can be added, deleted, or specified
using the operators in the following table:
For example, to give everyone execute permission for a file, you can use :
$chmod ugo+x filename
or
$chmod a+x filename
For example, to remove execute permission from others and retain the
Syntax:
$ chmod [OPTION] MODE FILENAME
$ chmod [OPTION] OCTAL-MODE FILENAME
-f, --silent, --quiet suppress most error messages
-R, --recursive change files and directories recursively
--help display this help and exit
chmod operators Description
+ Adds the designated permission(s) to a file or directory.
- Removes the designated permission(s) from a file or directory.
= Sets the designated permission(s).
9. existing permissions for all for a file, you can use :
$chmod o-x filename
In the above example,
$ chmod u+wx,g+wx abc , adds execute permission to user and group to the file
abc
$ chmod g-x abc, removes execute permission from group from the file abc.
$ chmod o=r-- abc, provides read permission and removes write and execute
permission from others for file abc
3.2.6.2 Using chmod in Absolute(octal) Mode
The second way to modify permissions with the chmod command is to use
a number to specify each set of permissions for the file.
Each permission is assigned a value, as the following table shows, and
the total of each set of permissions provides a number for that set.
10. Examples:
-bash-3.2$ ls -l abc
-rw-r--r-- 1 735873 oinstall 0 Feb 7 12:37 abc
-bash-3.2$ chmod 0 abc
-bash-3.2$ ls -l abc
---------- 1 735873 oinstall 0 Feb 7 12:37 abc
-bash-3.2$ chmod 743 abc
-bash-3.2$ ls -l abc
-rwxr---wx 1 735873 oinstall 0 Feb 7 12:37 abc
-bash-3.2$ chmod 755 abc
-bash-3.2$ ls -l abc
-rwxr-xr-x 1 735873 oinstall 0 Feb 7 12:37 abc
-bash-3.2$ chmod 777 abc
-bash-3.2$ ls -l abc
-rwxrwxrwx 1 735873 oinstall 0 Feb 7 12:37 abc
3.3 Video 3 : Users, File Permission
http://www.youtube.com/watch?v=zRw0SKaXSfI
3.4 Quiz Time
Q1. Which is the superuser for Unix
A. system
B. root
Number Octal Permission Representation Ref
0 No permission ---
1 Execute permission --x
2 Write permission -w-
3 Execute and write permission: 1 (execute) + 2 (write) = 3 -wx
4 Read permission r--
5 Read and execute permission: 4 (read) + 1 (execute) = 5 r-x
6 Read and write permission: 4 (read) + 2 (write) = 6 rw-
7 All permissions: 4 (read) + 2 (write) + 1 (execute) = 7 rwx
11. C. all users
D. there's no such user
Answer :B
Q2. What is stored in the /etc/passwd file?
A. user account information
B. user password
C. Both A and B
D. password configuration details
Answer: C
Q3. Which command is used to change the file permissions in Unix?
A. perm
B. sysconfig
C. systemconfig
D. chmod
Answer: D
Q4. Unix logically groups the users.
A. True
B. False
C. Not completely
D. Sometimes
Answer: A
CHAPTER 4 - UNIX DIRECTORY COMMANDS
4.1 Objective
To provide overview of the most common commands to work with
directories. These commands are available on any Linux (or Unix) system.
4.2 Course Content
The commands discussed include:
mkdir
cd
12. cp
mv
rmdir
rm
4.2.1 Introduction
What is a directory?
When a user interacts with the UNIX shell, the shell considers the user to
be located somewhere within a filesystem. Every item in the UNIX
filesystem tree is either a file, or a directory. A directory is like a file
folder. A directory can contain files, and other directories. A directory
contained within another is called the child of the other. A directory in
the filesystem tree may have many children, but it can only have one
parent. A file can hold information, but cannot contain other files, or
directories. A directory is actually implemented as a file that has one line
for each item contained within the directory. Each line in a directory file
contains only the name of the item, and a numerical reference to the
location of the item. The reference is called an i-number(inode), and is an
index to a table known as thei-list. The i-list is a complete list of all the
storage space available to the file system. The place in the file system
tree where an user is located is called the current working directory.
A file in unix file system which contains information about other files .
It contains information about files and directories through which UNIX
looks up to obtain information about a particular file.
As we login, we are put in our home directory.
At a time where the user is located is called the current working
directory.
4.2.2 mkdir(make directory) command:
The mkdir command creates a directory with specified name in the present
working directory or specified path.
Syntax: $ mkdir <dir_name> [ <dir_name2> ]
13. 4.2.3 cd (Change Directory) command:
cd command provides navigation between directories.
$ cd / : Takes you to root directory
$ cd ~ : Takes you to home Directory (/home/userid)
$ cd .. : Takes you to current parent Directory
$ cd <dir_name> : Takes you to the desired directory
$ mkdir Games
$ ls
Games
$
$ mkdir Games/Indoor Games/Outdoor
$ ls Games
Indoor Outdoor
$
The above command creates two directories, Indoor and Outdoor in
specified path under Games
$ pwd
/home/amit
$ cd /
$ pwd
/
$
$ pwd
$ /
$ cd ~
$ pwd
/home/amit
$
$ pwd
/home/amit
$ cd ..
$ pwd
/home
$
14. 4.2.4 cp command:
The command cp with -r option copies a directory and all its contents(sub-
directory and files) recursively to another.
Syntax:
cp -r <source_directory> <destination_path>
4.2.5 mv Command:
Moves the contents of a file or directory.
If the source and destination path is same it renames the file or directory.
Syntax: $ mv <source_dir> <destination_dir>
$ pwd
/home
$ cd amit
$ pwd
/home/amit
$cd Games/Indoor
$ pwd
/home/amit/Games/Indoor
$ ls
Dir1 Games
$ cp -r Games Dir1
$ ls Dir1
Games
$ ls
Dir1 Games
Copies Games into Dir1
Directory Dir1 now contains a copy of Games
One copy of Games still exist in source path
$ ls
Dir1 Games
$ mv Games Sports
$ ls
Dir1 Sports
$ mv Sports Dir1
$ ls Dir1
Games Sports
$ ls
Dir1
$
Command mv renames Games to Sports
Now Directory Sports moved into Dir1
15. 4.2.6 rmdir(remove directory) command:
To remove any existing empty directory.
Syntax: rmdir <dir_name>
Remark: To delete a Directory with content/which is not empty rm command can
be used.
Syntax: rm -R /path
4.2.7 rm (remove files) command:
Removes existing files and directories.
Syntax: rm filename
Remark: The file being deleted may contain important information,so “-i” option is
recommended to be used along with rm command.
$ ls
Dir1 Games
$ ls Games
Indoor Outdoor
$ rmdir Games
rmdir: Directory not empty
$ rmdir Games/Indoor
$ rmdir Games/Outdoor
$ rmdir Games
$ ls
Dir1
$
Directory can be removed
only if it is empty
Contents of Games removed
Directory Games removed now
List the file in current directory
Interactive Deletion Performed
File testRm is removed
16. 4.2.8 Video 4: Directory commands
http://www.youtube.com/watch?v=VPgrtk0HQB0&list=PL8A83A276F0D85E70
http://www.youtube.com/watch?v=HsBEzs6Q7w4&list=PL8A83A276F0D85E70
4.3 Quiz Time
Q1. Which command in Unix will help in creating new directories?
A. mkdir
B. makedir
C. create
D. new
Answer: A
Q2. Which command will help in deleting an empty directory?
A. delete
B. deletedir
C. remove
D. rmdir
17. Answer: D
Q3. Which command will help in moving a directory?
A. move
B. dirmover
C. mv
D. mvdir
Answer: C
Q4. Which command is used to rename a directory?
A. rename
B. changename
C. remdir
D. mv
Answer: D
Q5. Which option when used with cp will copy an directory will all its contents?
A. -R
B. -a
C. -m
D. -f
Answer: A