Hi,
This presentation contains basic unix commands and its usages. i have put screenshots where ever it is applicable.
Kindly send me your comments to Ankit Mehta ankitmehta21@gmail.com
Thanks,
Ankit
ankitmehta21@gmail.com
This document provides an introduction to basic commands for using the Terminal application in Ubuntu. It explains how to open Terminal, lists common commands like ls, cal, date, time, cd, and q to navigate directories and view information. It also demonstrates using Terminal to install additional applications and provides links for further help documentation.
The document provides instructions for connecting a computer to a local area network and domain: 1) Click the network icon and properties to access network settings; 2) Configure IP and DNS addresses to match the LAN; 3) Change the computer name to match the domain registration and restart to complete connection.
The document discusses techniques for testing software security, as traditional testing methods are not well-suited for finding security bugs. It outlines several approaches for identifying unintended side effects, including monitoring for unexpected interactions with the environment, injecting faults to test error handling, and attacking dependencies and implementations. Specifically, the document recommends testing applications' use of resources like files, memory, and network availability under stressful conditions to identify potential vulnerabilities.
Hello All,
This is first part of inspirational quotes from movies. Hope it will help you to get inspired for the day.
Thanks,
Ankit
ankitmehta21@gmail.com
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help boost feelings of calmness, happiness and focus.
Elissa and Jeff continued their discussion from Part 1 on November 22, 2008. The two friends caught up on each other's lives over the past few months and shared updates about their families, careers, and future plans. They enjoyed their conversation and looked forward to seeing each other again soon.
Hi,
This presentation contains history of Unix operating system.
Kindly send me your comments to ankitmehta21@gmail.com so it will help me to improve future presentations.
Thanks,
Ankit Mehta
ankitmehta21@gmail.com
This document provides an introduction to basic commands for using the Terminal application in Ubuntu. It explains how to open Terminal, lists common commands like ls, cal, date, time, cd, and q to navigate directories and view information. It also demonstrates using Terminal to install additional applications and provides links for further help documentation.
The document provides instructions for connecting a computer to a local area network and domain: 1) Click the network icon and properties to access network settings; 2) Configure IP and DNS addresses to match the LAN; 3) Change the computer name to match the domain registration and restart to complete connection.
The document discusses techniques for testing software security, as traditional testing methods are not well-suited for finding security bugs. It outlines several approaches for identifying unintended side effects, including monitoring for unexpected interactions with the environment, injecting faults to test error handling, and attacking dependencies and implementations. Specifically, the document recommends testing applications' use of resources like files, memory, and network availability under stressful conditions to identify potential vulnerabilities.
Hello All,
This is first part of inspirational quotes from movies. Hope it will help you to get inspired for the day.
Thanks,
Ankit
ankitmehta21@gmail.com
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help boost feelings of calmness, happiness and focus.
Elissa and Jeff continued their discussion from Part 1 on November 22, 2008. The two friends caught up on each other's lives over the past few months and shared updates about their families, careers, and future plans. They enjoyed their conversation and looked forward to seeing each other again soon.
Hi,
This presentation contains history of Unix operating system.
Kindly send me your comments to ankitmehta21@gmail.com so it will help me to improve future presentations.
Thanks,
Ankit Mehta
ankitmehta21@gmail.com
This chapter discusses the history and varieties of UNIX and Linux operating systems. It describes how to install Linux, configure users and permissions, and interconnect Linux with other network operating systems using tools like Samba, WINE, VMware and Telnet. The chapter also provides examples of basic Linux commands and how to set up a Linux server with the required hardware specifications.
This document provides an overview of basic Unix commands and navigation for new Unix users. It discusses logging in, setting terminal parameters, navigating directories using commands like cd, ls, and cp. It also covers viewing files with cat and more, moving files with mv, getting help with man, and viewing users with who. The document warns against using passwd or reading mail as a new user. It describes exploring the /etc directory to view the passwd file and permissions with ls -l.
This document provides an introduction to using the command line interface in UNIX/Linux systems. It explains the basic format of UNIX commands, common conventions, and examples of familiar commands like ssh, passwd, quota, and oitcleaner. It also discusses the man pages for getting help on commands and demonstrates some common commands for navigating files and directories, copying/moving files, viewing file contents, and more. The document concludes with an overview of the pipe character and commands like ps and kill for managing processes.
This document provides an introduction to using the command line interface in UNIX/Linux systems. It explains the basic format of UNIX commands, common conventions, and examples of familiar commands like ssh, passwd, quota, and oitcleaner. It also discusses the man pages for getting help on commands and summarizes common commands like ls, cd, mkdir, rm, mv, cp, cat, more, less, head, tail, lpr, date, who, hostname, whoami, and ps. Finally, it covers the UNIX pipe operator and using nice to modify process priorities.
This document provides instructions for configuring passwordless login using SSH keys between systems. It explains that generating an SSH key pair consisting of a public and private key allows an administrator to copy the public key to other systems and gain authorized access without being prompted for a password. The document outlines the steps to generate an SSH key pair on the local system, copy the public key to a client system, and then test passwordless login. It also explains that SSH encryption protects passwords and file transfers in transit between systems.
This document provides an overview of basic commands in Kali Linux for new users. It begins by explaining that Kali Linux commands are similar to other Linux systems but with additional penetration testing and hacking tools. The document then covers over 30 basic commands in Kali Linux, providing the syntax and use case for each command. It aims to
help new users learn the basic commands needed to manage the operating system and begin using some of the security tools.
This document provides an introduction to the UNIX/Linux operating system. It discusses general remarks about UNIX/Linux, including classification and essential features. It covers first steps at the computer such as user logon/logoff. It also discusses file systems, including file types, paths, and commands like pwd, ls, and cd.
Need help in a aspect of Linux System administration I am r.pdfABHISANJEET
Need help in a aspect of Linux System administration.
I am required to address Linux administration problems Linux administration problems via
executing appropriate system commands or via editing / modifying appropriate system files.
The solutions must be for RedHat7.x/CentOS7.x and higher version to be marked properly
by automatic marking system.
My solution will have to be uploaded in a single TEXT (26 line) file, each line of the file being
answer / solution to the task / question specified. Each line has to start with the task number
followed by system command (for the solutions requiring executing system commands) or line you
would enter into shell / appropriate configuration file content (for the solutions requiring
modification of appropriate system files) to achieve requested result.
For example, if task 3 was to provide command configuring network interface eth0 so that the IP
address was 192.168.0.2, network mask was 255.255.255.128 and the broadcast address was
192.168.0.255, you would enter the line as:
3. ifconfig eth0 192.168.0.2 netmask 255.255.255.128 broadcast 192.168.0.255
These are the 26 questions :
Thanks for the help in advance!
1. Which file you would use to redefine existing system variable PATH (provide full path)? 2. How
would you redefine the PATH variable to add path to /home/john/bin directory? 3. Which file you
would use to limit maximum number of logins for a user mariusz to 3 logins at a time (provide full
path)? 4. How would you modify the above file to achieve the result (please show how the line you
would add to the file would look like)? 5. You were requested to add to the system new user called
tatiana. You want to execute the command adding the user to the system so that default shell for
tatiana was be /bin/sh and her initial / primary group was students. How would the command look
like? 6. One of the system users asked you to change his login name from pm75 to mariusz. How
would you achieve this (provide appropriate command)?7. You want to add user mariusz to ACL
(Access Control List) of file /usr/share/ccsm so that this use had read permission (assume the user
does NOT belong to the file group nor he is the file owner). 8. You want to change current
permissions for file /usr/share/ccsm to rwxrr. How the command allowing you to achieve the goal
would look like. 9. You want to check your file system supports ACL. Which command would tell
you this? 10. You want to create in the current directory symbolic link ptr to file /usr/share/ccsm.
How the command allowing you to achieve this would look like? 11. One of the system users clare
forgot her password. How the command initialising her password change would look like? Assume
you execute the command as root (in other words: what command would root execute to change
clare's password). 12. Which file you would modify to add a new DNS server (provide full path)?
13. How would the entry (line) to the above file look like if the DNS server you wanted add to the
.
This document provides an overview of the Python programming language. It describes Python as a popular programming language created by Guido van Rossum in 1991. Python can be used for web development, software development, mathematics, and system scripting. The document discusses why Python is useful due to its simple syntax, ability to work on different platforms, and because it can be treated procedurally, object-orientedly, or functionally. It also provides examples of tasks Python can perform like creating web applications, databases, workflows, and handling big data. The document concludes by covering Python syntax, variables, comments, and how to install and run a Python file.
The document discusses various techniques for hacking systems, including password cracking, privilege escalation, executing applications remotely, and using keyloggers and spyware. It provides an overview of tools that can perform functions like password cracking, sniffing network traffic, capturing credentials, escalating privileges, executing code remotely, and logging keystrokes covertly. Countermeasures to these techniques, like disabling LM hashes, changing passwords regularly, and using antivirus software, are also covered.
The document discusses the Windows command prompt (CMD), including:
1. How the command line works and how to open the command prompt in Windows.
2. How to enter commands in the command prompt and how commands can be combined.
3. An overview of common Windows CMD commands divided into categories like basics, files, system, and network, listing the command purpose and supported Windows versions.
This document provides information about various Linux commands. It begins by defining what a command is and explaining the different types of commands - built-in shell commands and external commands. It then discusses command navigation shortcuts and various file manipulation commands like mkdir, rmdir, touch, cp, rm, man, head, tail, cat, tac, more and files. The document also covers the Linux filesystem hierarchy standard and describes the main directories for binaries, configuration, data and memory. Overall, the document serves as a guide to common Linux commands and filesystem structure.
Logging on to a UNIX/Linux system requires a valid username and password. The root user has full administrative privileges. Users can log in through either a terminal window or graphical window interface. After logging in, the date command displays the current date and time, while the exit command logs the user off the system.
This document contains notes from a presentation on Windows PowerShell 2.0 given by Tom Pester on December 17, 2009. It discusses what PowerShell is, why it was created, who has access to it, key concepts like cmdlets and providers, and new features in PowerShell 2.0 such as remoting and background jobs. Recommended books and online resources for learning more about PowerShell are also provided.
This document provides an introduction to Linux, including its history from Unix and the GNU project. It describes the roles and responsibilities of a Linux system administrator, such as creating user accounts, maintaining systems, and recovering from emergencies. Tips are provided for working at the Linux command line and finding documentation. Key features of Linux include stability, security, flexibility and low cost.
Linux is an open-source operating system that can be used as a server or standalone OS. It offers advantages like stability, robustness, security, and high performance. Linux directories include / for the root directory, /bin for essential programs, /home for user files, and /var for variable data. Common Linux commands include ls to list files, cd to change directories, grep to search files, and vi/emacs for text editing. Cron jobs allow scheduling commands to run periodically using a crontab file.
Linux is an open-source operating system developed by Linus Torvalds in 1991. It has a reputation for being efficient and fast-performing. The document then lists and describes 50 common Linux commands, including their syntax and usage. Examples include commands for changing directories, copying files, displaying the date/time, searching files with grep, and more.
This document provides an overview of Linux including:
- Different pronunciations of Linux and the origins of each pronunciation.
- A definition of Linux as a generic term for Unix-like operating systems with graphical user interfaces.
- Why Linux is significant as a powerful, free, and customizable operating system that runs on multiple hardware platforms.
- An introduction to key Linux concepts like multi-user systems, multiprocessing, multitasking and open source software.
- Examples of common Linux commands for file handling, text processing, and system administration.
The document provides an overview of the UNIX operating system. It discusses the history and development of UNIX from the 1960s onward. It describes the key features of UNIX including its layered architecture, kernel, shell, process management, file system, and security features. It also covers basic UNIX commands for working with files and directories, permissions, and getting help. The objective is to introduce readers to fundamental concepts of the UNIX OS.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
This chapter discusses the history and varieties of UNIX and Linux operating systems. It describes how to install Linux, configure users and permissions, and interconnect Linux with other network operating systems using tools like Samba, WINE, VMware and Telnet. The chapter also provides examples of basic Linux commands and how to set up a Linux server with the required hardware specifications.
This document provides an overview of basic Unix commands and navigation for new Unix users. It discusses logging in, setting terminal parameters, navigating directories using commands like cd, ls, and cp. It also covers viewing files with cat and more, moving files with mv, getting help with man, and viewing users with who. The document warns against using passwd or reading mail as a new user. It describes exploring the /etc directory to view the passwd file and permissions with ls -l.
This document provides an introduction to using the command line interface in UNIX/Linux systems. It explains the basic format of UNIX commands, common conventions, and examples of familiar commands like ssh, passwd, quota, and oitcleaner. It also discusses the man pages for getting help on commands and demonstrates some common commands for navigating files and directories, copying/moving files, viewing file contents, and more. The document concludes with an overview of the pipe character and commands like ps and kill for managing processes.
This document provides an introduction to using the command line interface in UNIX/Linux systems. It explains the basic format of UNIX commands, common conventions, and examples of familiar commands like ssh, passwd, quota, and oitcleaner. It also discusses the man pages for getting help on commands and summarizes common commands like ls, cd, mkdir, rm, mv, cp, cat, more, less, head, tail, lpr, date, who, hostname, whoami, and ps. Finally, it covers the UNIX pipe operator and using nice to modify process priorities.
This document provides instructions for configuring passwordless login using SSH keys between systems. It explains that generating an SSH key pair consisting of a public and private key allows an administrator to copy the public key to other systems and gain authorized access without being prompted for a password. The document outlines the steps to generate an SSH key pair on the local system, copy the public key to a client system, and then test passwordless login. It also explains that SSH encryption protects passwords and file transfers in transit between systems.
This document provides an overview of basic commands in Kali Linux for new users. It begins by explaining that Kali Linux commands are similar to other Linux systems but with additional penetration testing and hacking tools. The document then covers over 30 basic commands in Kali Linux, providing the syntax and use case for each command. It aims to
help new users learn the basic commands needed to manage the operating system and begin using some of the security tools.
This document provides an introduction to the UNIX/Linux operating system. It discusses general remarks about UNIX/Linux, including classification and essential features. It covers first steps at the computer such as user logon/logoff. It also discusses file systems, including file types, paths, and commands like pwd, ls, and cd.
Need help in a aspect of Linux System administration I am r.pdfABHISANJEET
Need help in a aspect of Linux System administration.
I am required to address Linux administration problems Linux administration problems via
executing appropriate system commands or via editing / modifying appropriate system files.
The solutions must be for RedHat7.x/CentOS7.x and higher version to be marked properly
by automatic marking system.
My solution will have to be uploaded in a single TEXT (26 line) file, each line of the file being
answer / solution to the task / question specified. Each line has to start with the task number
followed by system command (for the solutions requiring executing system commands) or line you
would enter into shell / appropriate configuration file content (for the solutions requiring
modification of appropriate system files) to achieve requested result.
For example, if task 3 was to provide command configuring network interface eth0 so that the IP
address was 192.168.0.2, network mask was 255.255.255.128 and the broadcast address was
192.168.0.255, you would enter the line as:
3. ifconfig eth0 192.168.0.2 netmask 255.255.255.128 broadcast 192.168.0.255
These are the 26 questions :
Thanks for the help in advance!
1. Which file you would use to redefine existing system variable PATH (provide full path)? 2. How
would you redefine the PATH variable to add path to /home/john/bin directory? 3. Which file you
would use to limit maximum number of logins for a user mariusz to 3 logins at a time (provide full
path)? 4. How would you modify the above file to achieve the result (please show how the line you
would add to the file would look like)? 5. You were requested to add to the system new user called
tatiana. You want to execute the command adding the user to the system so that default shell for
tatiana was be /bin/sh and her initial / primary group was students. How would the command look
like? 6. One of the system users asked you to change his login name from pm75 to mariusz. How
would you achieve this (provide appropriate command)?7. You want to add user mariusz to ACL
(Access Control List) of file /usr/share/ccsm so that this use had read permission (assume the user
does NOT belong to the file group nor he is the file owner). 8. You want to change current
permissions for file /usr/share/ccsm to rwxrr. How the command allowing you to achieve the goal
would look like. 9. You want to check your file system supports ACL. Which command would tell
you this? 10. You want to create in the current directory symbolic link ptr to file /usr/share/ccsm.
How the command allowing you to achieve this would look like? 11. One of the system users clare
forgot her password. How the command initialising her password change would look like? Assume
you execute the command as root (in other words: what command would root execute to change
clare's password). 12. Which file you would modify to add a new DNS server (provide full path)?
13. How would the entry (line) to the above file look like if the DNS server you wanted add to the
.
This document provides an overview of the Python programming language. It describes Python as a popular programming language created by Guido van Rossum in 1991. Python can be used for web development, software development, mathematics, and system scripting. The document discusses why Python is useful due to its simple syntax, ability to work on different platforms, and because it can be treated procedurally, object-orientedly, or functionally. It also provides examples of tasks Python can perform like creating web applications, databases, workflows, and handling big data. The document concludes by covering Python syntax, variables, comments, and how to install and run a Python file.
The document discusses various techniques for hacking systems, including password cracking, privilege escalation, executing applications remotely, and using keyloggers and spyware. It provides an overview of tools that can perform functions like password cracking, sniffing network traffic, capturing credentials, escalating privileges, executing code remotely, and logging keystrokes covertly. Countermeasures to these techniques, like disabling LM hashes, changing passwords regularly, and using antivirus software, are also covered.
The document discusses the Windows command prompt (CMD), including:
1. How the command line works and how to open the command prompt in Windows.
2. How to enter commands in the command prompt and how commands can be combined.
3. An overview of common Windows CMD commands divided into categories like basics, files, system, and network, listing the command purpose and supported Windows versions.
This document provides information about various Linux commands. It begins by defining what a command is and explaining the different types of commands - built-in shell commands and external commands. It then discusses command navigation shortcuts and various file manipulation commands like mkdir, rmdir, touch, cp, rm, man, head, tail, cat, tac, more and files. The document also covers the Linux filesystem hierarchy standard and describes the main directories for binaries, configuration, data and memory. Overall, the document serves as a guide to common Linux commands and filesystem structure.
Logging on to a UNIX/Linux system requires a valid username and password. The root user has full administrative privileges. Users can log in through either a terminal window or graphical window interface. After logging in, the date command displays the current date and time, while the exit command logs the user off the system.
This document contains notes from a presentation on Windows PowerShell 2.0 given by Tom Pester on December 17, 2009. It discusses what PowerShell is, why it was created, who has access to it, key concepts like cmdlets and providers, and new features in PowerShell 2.0 such as remoting and background jobs. Recommended books and online resources for learning more about PowerShell are also provided.
This document provides an introduction to Linux, including its history from Unix and the GNU project. It describes the roles and responsibilities of a Linux system administrator, such as creating user accounts, maintaining systems, and recovering from emergencies. Tips are provided for working at the Linux command line and finding documentation. Key features of Linux include stability, security, flexibility and low cost.
Linux is an open-source operating system that can be used as a server or standalone OS. It offers advantages like stability, robustness, security, and high performance. Linux directories include / for the root directory, /bin for essential programs, /home for user files, and /var for variable data. Common Linux commands include ls to list files, cd to change directories, grep to search files, and vi/emacs for text editing. Cron jobs allow scheduling commands to run periodically using a crontab file.
Linux is an open-source operating system developed by Linus Torvalds in 1991. It has a reputation for being efficient and fast-performing. The document then lists and describes 50 common Linux commands, including their syntax and usage. Examples include commands for changing directories, copying files, displaying the date/time, searching files with grep, and more.
This document provides an overview of Linux including:
- Different pronunciations of Linux and the origins of each pronunciation.
- A definition of Linux as a generic term for Unix-like operating systems with graphical user interfaces.
- Why Linux is significant as a powerful, free, and customizable operating system that runs on multiple hardware platforms.
- An introduction to key Linux concepts like multi-user systems, multiprocessing, multitasking and open source software.
- Examples of common Linux commands for file handling, text processing, and system administration.
The document provides an overview of the UNIX operating system. It discusses the history and development of UNIX from the 1960s onward. It describes the key features of UNIX including its layered architecture, kernel, shell, process management, file system, and security features. It also covers basic UNIX commands for working with files and directories, permissions, and getting help. The objective is to introduce readers to fundamental concepts of the UNIX OS.
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Dr. Vinod Kumar Kanvaria
Exploiting Artificial Intelligence for Empowering Researchers and Faculty,
International FDP on Fundamentals of Research in Social Sciences
at Integral University, Lucknow, 06.06.2024
By Dr. Vinod Kumar Kanvaria
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
it describes the bony anatomy including the femoral head , acetabulum, labrum . also discusses the capsule , ligaments . muscle that act on the hip joint and the range of motion are outlined. factors affecting hip joint stability and weight transmission through the joint are summarized.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
How to Manage Your Lost Opportunities in Odoo 17 CRMCeline George
Odoo 17 CRM allows us to track why we lose sales opportunities with "Lost Reasons." This helps analyze our sales process and identify areas for improvement. Here's how to configure lost reasons in Odoo 17 CRM
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
This presentation was provided by Steph Pollock of The American Psychological Association’s Journals Program, and Damita Snow, of The American Society of Civil Engineers (ASCE), for the initial session of NISO's 2024 Training Series "DEIA in the Scholarly Landscape." Session One: 'Setting Expectations: a DEIA Primer,' was held June 6, 2024.
1. LINUX – GETTING Ankit Mehta
ankitmehta21
STARTED @gmail.com
ankitmehta21@gmail.com
2. LINUX INSTALLATION
Linux is freely available operating system. You can download
any of the distribution from CentOS, Fedora and if you have
very low end system you can go with DSL (Damn Small Linux)
At the beginning level I would suggest you to start installing
and using Linux on virtual machine, once you are comfortable
with operating system you can move to install it as primary or
secondary operating system.
ankitmehta21@gmail.com
3. LOGIN NAME
Choosing a login name is Linux should follow
Login name must be more than two characters long
Login name can contain lowercase and numbers
Login name must start with an lower case alphabet
Login name must not conflict with another existing username
ankitmehta21@gmail.com
4. PASSWORD
Linux password choosing guidelines
Password must have atleast 6 characters (This can be bypassed but
as per the guidelines you must follow it)
Password must contain alphabet, numeric and/or special character.
Password are case sensitive so “Creative” is different than “creative”
and “cr3@t1v3”
Some other guidelines
Avoid using easily guessed password like your family name, your
library card number your pet name.
Avoid using dictionary words
ankitmehta21@gmail.com
5. CURRENT NETWORK
Following network is used for this training
Type OS IP Address
Host Operating System Windows 7 192.168.188.1
(Connecting with putty)
Guest Operating System Cent OS 6 (X64) 192.168.188.140
ankitmehta21@gmail.com
6. CONNECTING TO LINUX
Open putty and enter destination IP address it will popup
following screen as per your configuration
ankitmehta21@gmail.com
7. ENTER USERNAME
Once you get previously mentioned screen enter desired
username to login to Linux (Make sure that user already exist
on Linux system)
ankitmehta21@gmail.com
8. ENTER PASSWORD
After entering username enter password belongs to that user
ankitmehta21@gmail.com
9. UNIX PROMPT $
Once you login to Unix system you will see prompt $, $ is the
indication that system is waiting for your command
ankitmehta21@gmail.com
10. DATE
If you want to know the system date of UNIX system you can
pass date command
ankitmehta21@gmail.com
11. CAT
To view any text file cat command is used followed by file
name
ankitmehta21@gmail.com
12. LS –L
To view the file and directory listing you can use ls -l
command
ankitmehta21@gmail.com
13. PASSWD
To change the unix system password passwd command is
used.
ankitmehta21@gmail.com
14. CTRL C
To stop execution of any command Ctrl -C can be used
ankitmehta21@gmail.com
15. CAL
To view the calendar cal command can be used.
ankitmehta21@gmail.com
16. WHO
Who command can be used to view the list of connected users
to Unix system
ankitmehta21@gmail.com
17. FINGER
Get user activity details using finger command
ankitmehta21@gmail.com
18. THANK YOU
In next presentation I will add some more commands and then
we will work on shell scripting and more from administration
front.
Kindly let me know your reviews and comments so I can
improve future presentations.
Write me at : Ankit Mehta ankitmehta21@mail.com
ankitmehta21@gmail.com