This document contains information about Linux topics presented by Mohammad Reza Gerami. It includes sections on limiting users, sudoers, journaling filesystems, foreign filesystems, disk management, file system health checks, installing software, networking configuration, IP assignment, firewalls, and various networking tools. Each section has multiple slides with details about the given topic. The document appears to be from a Linux training course.
Advanced Level Training on Koha / TLS (ToT)Ata Rehman
Advanced Level Training on Koha / Total Library Solution - TLS - (ToT), December 4-8, 2017 – PASTIC, Islamabad
All training material provided during this training can be found at: https://drive.google.com/drive/folders/1hwWGHV1iHgcpjK_tw6-Xgf-ZVUPchIS_
Advanced Level Training on Koha / TLS (ToT)Ata Rehman
Advanced Level Training on Koha / Total Library Solution - TLS - (ToT), December 4-8, 2017 – PASTIC, Islamabad
All training material provided during this training can be found at: https://drive.google.com/drive/folders/1hwWGHV1iHgcpjK_tw6-Xgf-ZVUPchIS_
Kernel Recipes 2015: Linux Kernel IO subsystem - How it works and how can I s...Anne Nicolas
Understanding how Linux kernel IO subsystem works is a key to analysis of a wide variety of issues occurring when running a Linux system. This talk is aimed at helping Linux users understand what is going on and how to get more insight into what is happening.
First we present an overview of Linux kernel block layer including different IO schedulers. We also talk about a new block multiqueue implementation that gets used for more and more devices.
After surveying the basic architecture we will be prepared to talk about tools to peek into it. We start with lightweight monitoring like iostat and continue with more heavy blktrace and variety of tools that are based on it. We demonstrate use of the tools on analysis of real world issues.
Jan Kara, SUSE
Kernel Recipes 2015: Linux Kernel IO subsystem - How it works and how can I s...Anne Nicolas
Understanding how Linux kernel IO subsystem works is a key to analysis of a wide variety of issues occurring when running a Linux system. This talk is aimed at helping Linux users understand what is going on and how to get more insight into what is happening.
First we present an overview of Linux kernel block layer including different IO schedulers. We also talk about a new block multiqueue implementation that gets used for more and more devices.
After surveying the basic architecture we will be prepared to talk about tools to peek into it. We start with lightweight monitoring like iostat and continue with more heavy blktrace and variety of tools that are based on it. We demonstrate use of the tools on analysis of real world issues.
Jan Kara, SUSE
8 Ways a Digital Media Platform is More Powerful than “Marketing”New Rainmaker
You may have heard that “media not marketing” is the future of online business … but what does that actually mean, what can it look like?
As you’ll see in this SlideShare, examples of a media-first approach done very well are all around us, it only takes a simple shift in thinking to see them.
Can this "media not marketing" approach to building an audience have an actual effect on the bottom line revenue of your business, or is it just more philosophical wordplay?
Let's find out ...
SlideShare now has a player specifically designed for infographics. Upload your infographics now and see them take off! Need advice on creating infographics? This presentation includes tips for producing stand-out infographics. Read more about the new SlideShare infographics player here: http://wp.me/p24NNG-2ay
This infographic was designed by Column Five: http://columnfivemedia.com/
Are you new to SlideShare? Are you looking to fine tune your channel plan? Are you using SlideShare but are looking for ways to enhance what you're doing? How can you use SlideShare for content marketing tactics such as lead generation, calls-to-action to other pieces of your content, or thought leadership? Read more from the CMI team in their latest SlideShare presentation on SlideShare.
No need to wonder how the best on SlideShare do it. The Masters of SlideShare provides storytelling, design, customization and promotion tips from 13 experts of the form. Learn what it takes to master this type of content marketing yourself.
10 Ways to Win at SlideShare SEO & Presentation OptimizationOneupweb
Thank you, SlideShare, for teaching us that PowerPoint presentations don't have to be a total bore. But in order to tap SlideShare's 60 million global users, you must optimize. Here are 10 quick tips to make your next presentation highly engaging, shareable and well worth the effort.
For more content marketing tips: http://www.oneupweb.com/blog/
How to Make Awesome SlideShares: Tips & TricksSlideShare
Turbocharge your online presence with SlideShare. We provide the best tips and tricks for succeeding on SlideShare. Get ideas for what to upload, tips for designing your deck and more.
In February, 2016 I had the privilege of working with employees of STARR Computers on a course to orient them to Linux. The course was delivered over a series of 90-120 minute sessions. It was designed so that
This is a compilation of the slides which were used. There were some other resources which were shared. There were practice exercises which were designed to reinforce some concepts.
Check http://churchroadman.blogspot.com/2016/04/basic-orientation-to-linux-course.html for some other details.
System Programming
Deamon Process
A daemon process is a process which runs in background and has no controlling terminal. A daemon (also known as background processes) is UNIX and it is known as services and agents in windows. Since a daemon process usually has no controlling terminal so almost no user interaction is required. Daemon processes are used to provide services that can well be done in background without any user interaction. Daemons are processes that are often started when the system is bootstrapped (boot time) and terminate only when the system is shut down.
The Indian economy is classified into different sectors to simplify the analysis and understanding of economic activities. For Class 10, it's essential to grasp the sectors of the Indian economy, understand their characteristics, and recognize their importance. This guide will provide detailed notes on the Sectors of the Indian Economy Class 10, using specific long-tail keywords to enhance comprehension.
For more information, visit-www.vavaclasses.com
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Ethnobotany and Ethnopharmacology:
Ethnobotany in herbal drug evaluation,
Impact of Ethnobotany in traditional medicine,
New development in herbals,
Bio-prospecting tools for drug discovery,
Role of Ethnopharmacology in drug evaluation,
Reverse Pharmacology.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdfTechSoup
In this webinar you will learn how your organization can access TechSoup's wide variety of product discount and donation programs. From hardware to software, we'll give you a tour of the tools available to help your nonprofit with productivity, collaboration, financial management, donor tracking, security, and more.
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
We all have good and bad thoughts from time to time and situation to situation. We are bombarded daily with spiraling thoughts(both negative and positive) creating all-consuming feel , making us difficult to manage with associated suffering. Good thoughts are like our Mob Signal (Positive thought) amidst noise(negative thought) in the atmosphere. Negative thoughts like noise outweigh positive thoughts. These thoughts often create unwanted confusion, trouble, stress and frustration in our mind as well as chaos in our physical world. Negative thoughts are also known as “distorted thinking”.
How to Split Bills in the Odoo 17 POS ModuleCeline George
Bills have a main role in point of sale procedure. It will help to track sales, handling payments and giving receipts to customers. Bill splitting also has an important role in POS. For example, If some friends come together for dinner and if they want to divide the bill then it is possible by POS bill splitting. This slide will show how to split bills in odoo 17 POS.
5. Linux Introduction
Mohammad Reza Gerami gerami@ipm.ir 5
A Linux distribution has software worth thousands of
dollars, for virtually no cost
Linux operating system is reliable, stable, and very
powerful
Linux comes with a complete development environment,
including compilers, toolkits, and scripting languages
Linux comes with networking facilities, allowing you to
share hardware
Linux utilizes your memory, CPU, and other hardware to
the fullest
A wide variety of commercial software is also available
Linux is very easily upgradeable
Supports multiple processors as standard
True multitasking. So many apps, all at once
6. Linux Introduction
Mohammad Reza Gerami gerami@ipm.ir 6
Freely Downloadable from websites
Available as sets of CDs
Installation is very simple
After installation you can create logins
for different users
Each user may login by his/her own login
and passwd – own login area
Upon login, default directory is home
directory of the user
7. Linux Introduction
Mohammad Reza Gerami gerami@ipm.ir 7
ls, Give a listing of the current directory. Try
also ls -l
cp, Copy file from source to destination
mv, Move file from source to destination. If both
are the same directory, the file is renamed
vi, Edit a file. vi is one of the most powerful
text editors
chmod, Change file permissions
mkdir, rmdir Make/Remove a directory
cd, Change directory
rm, Remove a file. Can also remove directory tree
man ls, Get help for ls. All commands have help
9. Linux Introduction
Mohammad Reza Gerami gerami@ipm.ir 9
/
bin
boot
dev
etc
home
lib
lost+found
misc
mnt
opt
proc
root
sbin
tmp
usr
var
/bin System binaries, including the command shell
/boot Boot-up routines
/dev Device files for all your peripherals
/etc System configuration files
/home User directories
/lib Shared libraries and modules
/lost+found Lost-cluster files, recovered from a disk-check
/mnt Mounted file-systems
/opt Optional software
/proc Kernel-processes pseudo file-system
/root Administrator’s home directory
/sbin System administration binaries
/usr User-oriented software
/var Various other files: mail, spooling and logging
11. Limiting Users
Directory
/etc/security
Login edit limits.conf
@test - maxlogin 1
Process
@test hard nproc 6 (count of Process)
File Size
@test hard fsize 500 (kilobyte)
Mohammad Reza Gerami gerami@ipm.ir 11
12. Limiting Users
core -- Limits the core file size (KB); usually set to 0 for most users
to prevent core dumps.
data -- Maximum data size (KB).
fsize -- Maximum file size (KB).
memlock -- Maximum locked-in-memory address space (KB).
nofile -- Maximum number of open files.
rss -- Maximum resident set size (KB).
stack -- Maximum stack size (KB).
cpu -- Maximum CPU time (MIN).
nproc -- Maximum number of processes.
as --Address space limit.
maxlogins -- Maximum number of logins for this user or group.
priority --The priority to run user process with.
Mohammad Reza Gerami gerami@ipm.ir 12
13. Limiting Users
Sudoers
The super user with unrestricted access to all system resources and
files in Linux is the user named root.
If a server needs to be administered by a number of people it is
normally not a good idea for them all to use the root account. This is
because it becomes difficult to determine exactly who did what, when
and where if everyone logs in with the same credentials. The sudo
utility was designed to overcome this difficulty.
Mohammad Reza Gerami gerami@ipm.ir 13
14. Sudoers Example
/etc/sudoers
User_Alias OPERATORS = reza,masood
Runas_Alias OP = root, operator
Host_Alias DataCenter = 10.10.10.0/255.255.255.0
Host_Alias Servers = 20.20.20.0/24
Cmd Server_cmd = ls,vi,cat,top
OPERATORS ALL=ALL
reza ALL=(ALL) ALL
masood DataCenter = (ALL) ALL
reza Servers = (reza) Server_cmd
Mohammad Reza Gerami gerami@ipm.ir 14
16. Disk Management
Journaling
A journaling file system is a file system that keeps track
of the changes that will be made in a journal (usually a
circular log in a dedicated area of the file system) before
committing them to the main file system.
In the event of a system crash or power failure, such file
systems are quicker to bring back online and less likely to
become corrupted
Mohammad Reza Gerami gerami@ipm.ir 16
17. Disk Management
Journaling
Third Extended TheThird Extended Filesystem (ext3 or
ext3fs)
ReiserFSThis filesystem is a completely new design,
which was added to the 2.4.1 Linux kernel
XFS XFS is Silicon Graphics's (SGI's) journaling
filesystem
JFS IBM's Journaled Filesystem (JFS)
Mohammad Reza Gerami gerami@ipm.ir 17
19. Disk Management
Foreign Filesystems
Microsoft Filesystems
FATThe File AllocationTable (FAT)
HPFS Microsoft developed the High−Performance Filesystem
(HPFS)
NTFSThe NewTechnology Filesystem (NTFS)
Network Filesystems
NFS Sun's Network Filesystem (NFS)
CodaThis is an advanced network filesystem that supports
features omitted from NFS
SMB/CIFSThe Server Message Block (SMB) protocol, which
has been renamed the Core Internet Filesystem (CIFS)
Mohammad Reza Gerami gerami@ipm.ir 19
20. File System Health Check
File System Health Check
Mohammad Reza Gerami gerami@ipm.ir 20
21. File System Health Check
On a Linux or Unix server, you can run the fsck command to check
your file system’s integrity and also make repairs when necessary.
Under normal circumstances, you probably have no reason to run this
command, and Linux will detect problems at boot and run fsck in the
event of a power failure or other abnormal shutdown. If you do need to
run it, you will have to unmount the file system you want to check.
Follow these steps:
As Root, go to single user mode:
# init 1
Unmount the partition you want to check:
# umount /dev/sda1
Run fsck:
# fsck /dev/sda1
Remount the filesystem:
# mount -a
Return to multiuser mode (Init 2 or 3)
# init 3
Mohammad Reza Gerami gerami@ipm.ir 21
23. Command-line process
Compiling and Installing software from source
Installing RPM's using the Red hat Package
Manager
Installing using Debian's apt-get
Installing with fedora / yum
Mohammad Reza Gerami gerami@ipm.ir 23
24. Compiling and Installing software
from source
Installing from source code is the most difficult
method for obtaining software on Linux and in
most cases is not necessary.
Most popular software can be found and installed
quite easily using your distribution's package
manager (see sections on "apt-get" and "yum").
Installing from source is recommended only for
experienced Linux users and/or those who aren't
afraid to break something for the purpose of
learning
Mohammad Reza Gerami gerami@ipm.ir 24
25. Compiling and Installing software
from source
Typically applications you must compile from
source will come as a ".tar.gz", ".tar.bz2", or ".zip"
file.
tar -zxvf <filename>
Configure
Make
Make install
Mohammad Reza Gerami gerami@ipm.ir 25
26. Installing RPM's using the
Redhat Package Manager
Redhat RPM's offer a flexible and easy method to
install new software. Software installed from an
RPM package differs from compiling from source
in a few ways, but the most important one of all is
the software is already compiled for you.
rpm -i <filename.rpm>
rpm -qa <package>
rpm -e <package>
Mohammad Reza Gerami gerami@ipm.ir 26
27. Installing RPM's using the
Redhat Package Manager
Installing using Debian's apt-get
apt-get install <package_name>
apt-get remove <package_name>
Installing with fedora|CentOS / yum
yum install
yum remove
yum update
Mohammad Reza Gerami gerami@ipm.ir 27
28. Graphical Based process
Using Synaptic (Fedora, Ubuntu)
UsingYaST2 (SuSE, openSuSE)
Mohammad Reza Gerami gerami@ipm.ir 28
33. Networking Tools
ping
Check a status of a host Alive or Not
ping 192.168.10.1
ethtool
Check Network Card
ethtool eth1
traceroute
see your hops between hosts
traceroute google.com
Mohammad Reza Gerami gerami@ipm.ir 33