This document provides summaries of commands and configuration files related to Linux system administration. It covers topics like printing commands (lpr, lpq, lprm), init and inittab configuration, runlevels, networking commands (route, netstat), user management (userdel, passwd), file systems (e2fsck, ext2, ext3), and other administrative tools (top, ps, umount, vmstat).
This document discusses software installation and configuration of Linux services including RPM packages, YUM, DNS server, and Apache web server. It provides instructions on installing software using RPM and YUM, configuring BIND as a DNS server, and setting up an Apache web server. Key steps include installing software, editing configuration files, starting and enabling services, and testing the DNS lookups and web pages.
This document provides information about junior level Linux certification objectives related to RPM and YUM package management. It discusses using RPM and YUM to install, upgrade, remove, and query packages. It also covers verifying package integrity with RPM and how YUM resolves dependencies when installing packages.
RPM (RPM Package Manager) is a package management system that can install, uninstall, upgrade, query, and verify software packages. It uses an RPM database to track installed packages and dependencies. RPM forms the basis for the yum package manager. The rpm command can be used to install, query, upgrade, remove packages. It handles dependencies and tracks files and metadata for packages.
The document provides information about RPM (Red Hat Package Manager), including that it is the default package management system for Red Hat-based Linux distributions. It describes how RPM allows users to install, update, uninstall, query, verify and manage software packages. It also provides examples of common RPM commands and their usage, such as installing, upgrading, verifying, and querying packages.
CompTIA Linux+ Powered by LPI certifies foundational skills and knowledge of Linux. With Linux being the central operating system for much of the world’s IT infrastructure, Linux+ is an essential credential for individuals working in IT, especially those on the path of a Web and software development career. With CompTIA’s Linux+ Powered by LPI certification, you’ll acquire the fundamental skills and knowledge you need to successfully configure, manage and troubleshoot Linux systems. Recommended experience for this certification includes CompTIA A+, CompTIA Network+ and 12 months of Linux admin experience. No prerequisites required.
The document provides instructions on installing Linux including collecting hardware information beforehand, preparing disk partitions, installing from a CD-ROM, installing additional packages, and basic Linux commands. It also discusses uninstalling software using the synaptic graphical tool or apt-get command line tool and describes common Linux commands like mkdir, cd, ls, cp and their usage.
This document discusses the Linux boot process, including:
1) The boot sequence starts with the BIOS initializing and loading the boot loader like GRUB or LILO.
2) The boot loader loads the Linux kernel and initiates the kernel initialization process.
3) Once loaded, the kernel mounts the root file system and launches the init process to start system services and bring the system to the desired run level.
This document provides summaries of commands and configuration files related to Linux system administration. It covers topics like printing commands (lpr, lpq, lprm), init and inittab configuration, runlevels, networking commands (route, netstat), user management (userdel, passwd), file systems (e2fsck, ext2, ext3), and other administrative tools (top, ps, umount, vmstat).
This document discusses software installation and configuration of Linux services including RPM packages, YUM, DNS server, and Apache web server. It provides instructions on installing software using RPM and YUM, configuring BIND as a DNS server, and setting up an Apache web server. Key steps include installing software, editing configuration files, starting and enabling services, and testing the DNS lookups and web pages.
This document provides information about junior level Linux certification objectives related to RPM and YUM package management. It discusses using RPM and YUM to install, upgrade, remove, and query packages. It also covers verifying package integrity with RPM and how YUM resolves dependencies when installing packages.
RPM (RPM Package Manager) is a package management system that can install, uninstall, upgrade, query, and verify software packages. It uses an RPM database to track installed packages and dependencies. RPM forms the basis for the yum package manager. The rpm command can be used to install, query, upgrade, remove packages. It handles dependencies and tracks files and metadata for packages.
The document provides information about RPM (Red Hat Package Manager), including that it is the default package management system for Red Hat-based Linux distributions. It describes how RPM allows users to install, update, uninstall, query, verify and manage software packages. It also provides examples of common RPM commands and their usage, such as installing, upgrading, verifying, and querying packages.
CompTIA Linux+ Powered by LPI certifies foundational skills and knowledge of Linux. With Linux being the central operating system for much of the world’s IT infrastructure, Linux+ is an essential credential for individuals working in IT, especially those on the path of a Web and software development career. With CompTIA’s Linux+ Powered by LPI certification, you’ll acquire the fundamental skills and knowledge you need to successfully configure, manage and troubleshoot Linux systems. Recommended experience for this certification includes CompTIA A+, CompTIA Network+ and 12 months of Linux admin experience. No prerequisites required.
The document provides instructions on installing Linux including collecting hardware information beforehand, preparing disk partitions, installing from a CD-ROM, installing additional packages, and basic Linux commands. It also discusses uninstalling software using the synaptic graphical tool or apt-get command line tool and describes common Linux commands like mkdir, cd, ls, cp and their usage.
This document discusses the Linux boot process, including:
1) The boot sequence starts with the BIOS initializing and loading the boot loader like GRUB or LILO.
2) The boot loader loads the Linux kernel and initiates the kernel initialization process.
3) Once loaded, the kernel mounts the root file system and launches the init process to start system services and bring the system to the desired run level.
Installing and managing Linux software involves working with software packages in various formats. The main types are binary packages, which contain pre-compiled software, and source code packages, which contain the source code that needs to be compiled. Package management systems like RPM and APT automate the installation, updating, and removal of packages and their dependencies. Commands like yum, apt, and dpkg can be used to install packages, while tar is used to extract source code which then needs to be compiled before use.
The document provides an overview of basic and useful UNIX commands organized into categories including essential commands, valuable commands, fun commands, helpful commands, and useful commands. It describes commands for navigating directories, manipulating files, editing text, sending email, connecting to other systems, monitoring system usage, and more. The document is intended to help users get started with common tasks in UNIX.
Linux is a free, open-source operating system that provides functionality similar to Unix systems. The document then lists and describes several common Linux commands used to navigate directories, view files and system information, manage processes, and edit text files. It also includes a diagram of the standard Linux directory structure and brief descriptions of the purpose of each top-level directory.
This document discusses managing users and groups in Red Hat Linux 7. It explains that there are three types of users: the root superuser, normal custom users created by administrators, and system users created by packages. It describes the main files and commands used to create and manage users, including /etc/passwd, /etc/shadow, /etc/group, useradd, groupadd, and usermod. The default permissions and umask value are also covered.
The document provides an overview of common Linux commands organized into categories, with brief explanations of each command. It covers commands for working with files and directories (ls, cd, cp, rm), processes (ps, top, kill), networking (ping, ifconfig), file archiving and compression (tar, gzip), and more. It also lists important directories in the Linux file system such as /bin, /usr/bin, /etc, and directories under /usr.
Advanced Level Training on Koha / TLS (ToT)Ata Rehman
Advanced Level Training on Koha / Total Library Solution - TLS - (ToT), December 4-8, 2017 – PASTIC, Islamabad
All training material provided during this training can be found at: https://drive.google.com/drive/folders/1hwWGHV1iHgcpjK_tw6-Xgf-ZVUPchIS_
Linux is an open-source operating system based on Unix, designed for multi-user environments. The document provides an overview of basic Linux commands like ls, mkdir, cd for navigating files and directories, as well as more advanced commands for manipulating files, checking system resources, and getting system information. It also lists and describes many common Linux commands and their functions.
This document provides a quick guide to the Linux command line. It introduces Linux and the shell, and explains why the command line is useful even with graphical user interfaces. It then covers basic commands for file management, processes, archives, and input/output redirection. Finally, it briefly mentions some simple text editors and hints at using more advanced shell scripting.
Linux is an open-source operating system developed by Linus Torvalds in 1991. It has a reputation for being efficient and fast-performing. The document then lists and describes 50 common Linux commands, including their syntax and usage. Examples include commands for changing directories, copying files, displaying the date/time, searching files with grep, and more.
This document provides a summary of the Unix and GNU/Linux command line. It begins with an overview of files and file systems in Unix, including that everything is treated as a file. It then discusses command line interpreters (shells), and commands for handling files and directories like ls, cd, cp, and rm. It also covers redirecting standard input/output, pipes, and controlling processes. The document is intended as training material and provides a detailed outline of its contents.
This document provides an overview of the Linux operating system and commands. It begins with course objectives to introduce Unix concepts, commands, and the VI editor. It then discusses what an operating system is and why they are needed before exploring the evolution, flavors, and architecture of Unix/Linux. Key topics covered include the file system structure, absolute vs relative paths, how Unix sessions work, login sequences, command syntax, and standard input/output/error. The document also examines regular expressions, shell metacharacters, editors like VI, and permissions.
This document provides a summary of Linux system administration files and commands. It lists important configuration files such as /etc/passwd for user accounts, /etc/group for groups, and /etc/fstab for mounted filesystems. It also outlines commands for common system tasks like user management, networking, printing, and sendmail configuration.
The document provides summaries of common Linux commands, including their most common uses. Some key commands covered are ls, which lists files and directories; cd, which changes the current working directory; and man, which displays manuals for commands. The document also discusses commands for checking network connectivity like ping and ifconfig, managing processes like top and ps, and manipulating files and directories like touch, rm, and chmod.
Unix , Linux Commands
Unix, which is not an acronym, was developed by some of the members of the Multics team at the bell labs starting in the late 1960's by many of the same people who helped create the C programming language.
This document provides a reference sheet for common UNIX/Linux commands organized into categories such as file commands, process management, permissions, searching, compression and more. It lists basic commands for manipulating files, running processes, setting permissions on files and directories, searching for files and text, compressing files, version control, getting system information and shortcuts.
The document provides an introduction to Linux and device drivers. It discusses Linux directory structure, kernel components, kernel modules, character drivers, and registering drivers. Key topics include dynamically loading modules, major and minor numbers, private data, and communicating with hardware via I/O ports and memory mapping.
This document provides an overview of the Linux kernel, including its history, structure, build process, installation, updating, and customization. It discusses getting the kernel source code, configuring and building the kernel, installing modules and the kernel, applying updates via patches, and determining the correct driver for PCI devices by matching the vendor and device IDs. The key steps are to find the PCI IDs, search for the IDs in kernel headers to identify the driver, search the kernel makefiles and configuration to enable that driver for compilation.
This document describes the functions of various Linux commands, including commands for listing files (ls), creating directories (mkdir) and files (touch, cat), copying files (cp), changing directories (cd), moving files (mv), finding file locations (whereis, which), displaying manual pages (man, info), checking disk usage (df, du), viewing running processes (ps), setting aliases (alias), changing user identity (su, sudo), viewing command history (history), setting the system date and time (date), displaying calendars (cal), and clearing the terminal screen (clear). It provides the syntax and examples for using each command.
This document provides an overview of Linux basics including the kernel, shell, filesystem hierarchy, run levels, and booting procedure. It also describes common Linux commands for text processing, archives/compression, and system states. The key components of the Linux system covered are the BIOS, MBR, GRUB bootloader, kernel, init process, and runlevel programs. File system types like Ext2, Ext3, and Ext4 are also summarized.
This document provides an overview of a Linux project that involves setting up various services. It introduces the members and their objectives, which include DNS, DHCP, Apache, email, shell scripts, SSH, NFS, FTP, VNC, and Samba. It then describes the configuration and purpose of each service, including DHCP, DNS, Apache, email using postfix/dovecot/squirrelmail, shell scripts for file copying, SSH for secure access, NFS and FTP for file sharing, VNC for remote desktop access, and Samba for sharing with Windows clients. Diagrams are provided for FTP and NFS connections. The goal is to set up a fully functional private network with various essential Linux services.
The document provides instructions for installing and configuring Linux on a system including installing Linux, configuring the network and printers, setting up user accounts and security, installing and managing packages, and performing system maintenance. Key steps include partitioning and formatting disks during installation, configuring the network interface and services like DHCP/NFS for network booting, setting up a print server and sharing printers, and using package management tools to install and update software.
Installing and managing Linux software involves working with software packages in various formats. The main types are binary packages, which contain pre-compiled software, and source code packages, which contain the source code that needs to be compiled. Package management systems like RPM and APT automate the installation, updating, and removal of packages and their dependencies. Commands like yum, apt, and dpkg can be used to install packages, while tar is used to extract source code which then needs to be compiled before use.
The document provides an overview of basic and useful UNIX commands organized into categories including essential commands, valuable commands, fun commands, helpful commands, and useful commands. It describes commands for navigating directories, manipulating files, editing text, sending email, connecting to other systems, monitoring system usage, and more. The document is intended to help users get started with common tasks in UNIX.
Linux is a free, open-source operating system that provides functionality similar to Unix systems. The document then lists and describes several common Linux commands used to navigate directories, view files and system information, manage processes, and edit text files. It also includes a diagram of the standard Linux directory structure and brief descriptions of the purpose of each top-level directory.
This document discusses managing users and groups in Red Hat Linux 7. It explains that there are three types of users: the root superuser, normal custom users created by administrators, and system users created by packages. It describes the main files and commands used to create and manage users, including /etc/passwd, /etc/shadow, /etc/group, useradd, groupadd, and usermod. The default permissions and umask value are also covered.
The document provides an overview of common Linux commands organized into categories, with brief explanations of each command. It covers commands for working with files and directories (ls, cd, cp, rm), processes (ps, top, kill), networking (ping, ifconfig), file archiving and compression (tar, gzip), and more. It also lists important directories in the Linux file system such as /bin, /usr/bin, /etc, and directories under /usr.
Advanced Level Training on Koha / TLS (ToT)Ata Rehman
Advanced Level Training on Koha / Total Library Solution - TLS - (ToT), December 4-8, 2017 – PASTIC, Islamabad
All training material provided during this training can be found at: https://drive.google.com/drive/folders/1hwWGHV1iHgcpjK_tw6-Xgf-ZVUPchIS_
Linux is an open-source operating system based on Unix, designed for multi-user environments. The document provides an overview of basic Linux commands like ls, mkdir, cd for navigating files and directories, as well as more advanced commands for manipulating files, checking system resources, and getting system information. It also lists and describes many common Linux commands and their functions.
This document provides a quick guide to the Linux command line. It introduces Linux and the shell, and explains why the command line is useful even with graphical user interfaces. It then covers basic commands for file management, processes, archives, and input/output redirection. Finally, it briefly mentions some simple text editors and hints at using more advanced shell scripting.
Linux is an open-source operating system developed by Linus Torvalds in 1991. It has a reputation for being efficient and fast-performing. The document then lists and describes 50 common Linux commands, including their syntax and usage. Examples include commands for changing directories, copying files, displaying the date/time, searching files with grep, and more.
This document provides a summary of the Unix and GNU/Linux command line. It begins with an overview of files and file systems in Unix, including that everything is treated as a file. It then discusses command line interpreters (shells), and commands for handling files and directories like ls, cd, cp, and rm. It also covers redirecting standard input/output, pipes, and controlling processes. The document is intended as training material and provides a detailed outline of its contents.
This document provides an overview of the Linux operating system and commands. It begins with course objectives to introduce Unix concepts, commands, and the VI editor. It then discusses what an operating system is and why they are needed before exploring the evolution, flavors, and architecture of Unix/Linux. Key topics covered include the file system structure, absolute vs relative paths, how Unix sessions work, login sequences, command syntax, and standard input/output/error. The document also examines regular expressions, shell metacharacters, editors like VI, and permissions.
This document provides a summary of Linux system administration files and commands. It lists important configuration files such as /etc/passwd for user accounts, /etc/group for groups, and /etc/fstab for mounted filesystems. It also outlines commands for common system tasks like user management, networking, printing, and sendmail configuration.
The document provides summaries of common Linux commands, including their most common uses. Some key commands covered are ls, which lists files and directories; cd, which changes the current working directory; and man, which displays manuals for commands. The document also discusses commands for checking network connectivity like ping and ifconfig, managing processes like top and ps, and manipulating files and directories like touch, rm, and chmod.
Unix , Linux Commands
Unix, which is not an acronym, was developed by some of the members of the Multics team at the bell labs starting in the late 1960's by many of the same people who helped create the C programming language.
This document provides a reference sheet for common UNIX/Linux commands organized into categories such as file commands, process management, permissions, searching, compression and more. It lists basic commands for manipulating files, running processes, setting permissions on files and directories, searching for files and text, compressing files, version control, getting system information and shortcuts.
The document provides an introduction to Linux and device drivers. It discusses Linux directory structure, kernel components, kernel modules, character drivers, and registering drivers. Key topics include dynamically loading modules, major and minor numbers, private data, and communicating with hardware via I/O ports and memory mapping.
This document provides an overview of the Linux kernel, including its history, structure, build process, installation, updating, and customization. It discusses getting the kernel source code, configuring and building the kernel, installing modules and the kernel, applying updates via patches, and determining the correct driver for PCI devices by matching the vendor and device IDs. The key steps are to find the PCI IDs, search for the IDs in kernel headers to identify the driver, search the kernel makefiles and configuration to enable that driver for compilation.
This document describes the functions of various Linux commands, including commands for listing files (ls), creating directories (mkdir) and files (touch, cat), copying files (cp), changing directories (cd), moving files (mv), finding file locations (whereis, which), displaying manual pages (man, info), checking disk usage (df, du), viewing running processes (ps), setting aliases (alias), changing user identity (su, sudo), viewing command history (history), setting the system date and time (date), displaying calendars (cal), and clearing the terminal screen (clear). It provides the syntax and examples for using each command.
This document provides an overview of Linux basics including the kernel, shell, filesystem hierarchy, run levels, and booting procedure. It also describes common Linux commands for text processing, archives/compression, and system states. The key components of the Linux system covered are the BIOS, MBR, GRUB bootloader, kernel, init process, and runlevel programs. File system types like Ext2, Ext3, and Ext4 are also summarized.
This document provides an overview of a Linux project that involves setting up various services. It introduces the members and their objectives, which include DNS, DHCP, Apache, email, shell scripts, SSH, NFS, FTP, VNC, and Samba. It then describes the configuration and purpose of each service, including DHCP, DNS, Apache, email using postfix/dovecot/squirrelmail, shell scripts for file copying, SSH for secure access, NFS and FTP for file sharing, VNC for remote desktop access, and Samba for sharing with Windows clients. Diagrams are provided for FTP and NFS connections. The goal is to set up a fully functional private network with various essential Linux services.
The document provides instructions for installing and configuring Linux on a system including installing Linux, configuring the network and printers, setting up user accounts and security, installing and managing packages, and performing system maintenance. Key steps include partitioning and formatting disks during installation, configuring the network interface and services like DHCP/NFS for network booting, setting up a print server and sharing printers, and using package management tools to install and update software.
The document discusses configuring an Apache web server. It describes installing Apache packages, editing the configuration file to set the server name, document root, and default HTML file. It also covers adding authentication using .htaccess files, generating an SSL certificate, setting up the server for IP-based or name-based virtual hosting, and restarting Apache.
DNS server configurationDns server configurationThamizharasan P
The document discusses configuring a DNS server on a system. It recommends installing the bind package and modifying files in /var/named, including the main configuration file, forward lookup zone file, and reverse lookup zone file. It also notes that the DNS server IP should be added and the service restarted after configuration changes. Finally, it suggests adding client IP addresses and hostnames to the forward and reverse lookup zone files.
This document provides an overview of networking concepts including network interface cards, media, topologies, protocols, IP addressing, and network troubleshooting tools. It discusses the basic requirements for networking like NICs, media, topology, protocols, and IP addressing. It provides details on TCP and UDP protocols, IP address classes, subnet masks, gateways, and Linux network configuration files and commands.
The document provides instructions for configuring a Samba server to share files and folders with Windows clients. It outlines installing the Samba package and editing the configuration file to add a shared folder and user. It also notes stopping the iptables service and restarting Samba to share the folder, which can then be accessed from Windows by providing the username and password.
Much has been written on SELinux, and a lot of it seems confusing. It's buzzword heavy, involves locking your computer up, has a strange new set of permissions that are obscure in architecture and silently fails where things used to just work. Why use it?
Well, for most people, it's not actually that hard to understand. In this talk, Paul Wayper talks about how to make sense of what SELinux does, and how to keep it out of the way and get on with using your computer. In the process Paul will deal with the background to SELinux, what it's main aims are, and why you really do want it turned on.
The document compares the performance of NFS, GFS2, and OCFS2 filesystems on a high-performance computing cluster with nodes split across two datacenters. Generic load testing showed that NFS performance declined significantly with more than 6 nodes, while GFS2 maintained higher throughput. Further testing of GFS2 and OCFS2 using workload simulations modeling researcher usage found that OCFS2 outperformed GFS2 on small file operations and maintained high performance across nodes, making it the best choice for the shared filesystem needs of the project.
This document provides an overview of setting up a mail server on Linux. It discusses what Linux is and its features. It then describes the key components needed for a mail server, including Bind for DNS, Httpd for a web server, Dovecot for protocols, Postfix for accepting connections, and Squirrelmail for accessing the IMAP server. Instructions are provided on installing and configuring the necessary software packages to establish a functional mail server on a Linux system.
iSCSI allows storage devices to be accessed over IP networks rather than direct attaching via SCSI cables. It works by encapsulating SCSI commands and data within TCP packets. Key points:
- iSCSI targets export storage as logical units (LUNs) over iSCSI. Initiators can then access these LUNs remotely over IP networks.
- This allows centralized storage consolidation and disaster recovery mirroring between data centers connected via IP.
- Security features include CHAP authentication of initiators and targets as well as logical/physical network isolation of iSCSI traffic.
- Challenges include the different performance characteristics of SCSI versus TCP/IP networks, such as higher delays over WAN
Linux is a free Unix-type operating system created by Linus Torvalds. This document provides instructions on installing Linux on a USB drive including downloading required files, formatting the USB drive, copying installation files, and making the USB drive bootable. It also summarizes common Linux commands like useradd, userdel, groupadd, ls, cat, kill, and their usage.
This document provides an overview of the Linux operating system. It discusses that Linux is an open-source operating system that provides a structured file system, multi-user capabilities, and strong security. It describes the Linux file structure with directories like /bin, /boot, /dev, /etc, and explains commands to view processes, manage users and files, and install packages. Network services like Apache web server, OpenSSH, and FTP are also summarized.
This document provides a tutorial on Unix/Linux. It begins with an overview of the Unix system including the kernel, shell, multi-user and multi-process capabilities, and important directory structures. It then covers basic commands, relative and absolute paths, redirecting and piping output, permissions, process management, installing software, text editors, running jobs in the foreground and background, and remote login/file transfer. The goal is to introduce fundamental Unix concepts and commands to new users.
This document provides an overview of getting started with Linux. It covers topics such as what Linux is, the basic file system structure and operations, utilities for file management, process management, system administration, and common keyboard shortcuts. The document also lists some of the top Linux distributions and recommends next steps for learning more advanced topics like Vim, shell scripting, sed, awk, and pursuing Linux certification.
The document summarizes topics covered in a Linux workshop from January 20th to 25th at IIT Kanpur. It includes introductions to vi text editor commands, Linux shell, finding and searching files, grep command, SSH, SCP, processes and process handling, GUI desktop environments, text editors, terminal, and installing software using package managers.
The document describes the standard Linux filesystem hierarchy, including the purpose and some examples of the contents of the top-level directories like /bin, /boot, /dev, /etc, /home, /lib, /media, /mnt, /opt, /proc, /root, /sbin, /usr, and /var. Many directories contain essential system files and programs needed for booting, administration, and operation of the system, while others provide variable storage and mounting points for removable devices. The filesystem layout separates core operating system, user, and variable files for security and manageability.
Linux is a prominent example of free and open source software. It can be installed on a wide variety of devices from embedded systems to supercomputers. Linux is commonly used for servers, with estimates that it powers around 60% of web servers. Linux distributions package the Linux kernel with other software like utilities, libraries and desktop environments. Programming languages and build tools like GCC are supported. Embedded Linux is often used in devices due to its low cost and ease of modification.
The document discusses various topics related to software installation and system administration on Unix systems:
1) It describes different methods of software installation such as binary distributions, RPM packages, and compiling from source code. It also discusses using the RPM command line tools.
2) It provides instructions for installing specific software packages like tcpdump and ssh using the RPM package manager and compiling from source code.
3) It discusses the Unix boot process, including run levels and the roles of the kernel, init process, and rc scripts in booting into different system states.
This document provides an overview of a seminar presented on Red Hat Linux and NIS servers. It discusses key topics like the history and features of Linux, an overview of the Linux kernel and file system, Linux shells, users and permissions, RAID and LVM concepts, and configurations for common Linux server types including NIS, NFS, DNS, DHCP, FTP, SSH, Telnet, SMTP, Samba, and Apache web servers. Screenshots are also included to demonstrate aspects of the configurations.
This document provides an overview of Linux basics including the kernel, shell, filesystem hierarchy, run levels, and booting procedure. It describes key components like the kernel, shell, init process, and run level programs. It also explains basic commands for file management, text editing, archiving/compression, and system states. Formatting options and common filesystem types are outlined as well. The document is an introductory guide to core Linux concepts, components, and commands.
The document provides a list of 40 important commands for Linux, grouped into categories such as newbie commands, system information commands, file manipulation commands, and other noteworthy commands. Some of the highlighted commands include cd for changing directories, ls for listing directory contents, man for accessing command manuals, and apt-get for installing software packages on Debian-based Linux distributions. The document serves as a brief overview of fundamental Linux commands for new and experienced users.
This Slide was presented as an introduction to Linux . Students with little experience in free operating systems were encouraged to take up Linux based operating systems.
Unix is a multi-user computer operating system capable of handling activities from multiple users simultaneously. It was originally developed in 1969 at Bell Labs by Ken Thompson and Dennis Ritchie. The Unix operating system acts as an interface between the user and computer, allowing users to run multiple programs simultaneously. It became a leading operating system for commercial enterprises during the 1980s and 1990s.
This document provides an overview and introduction to basic Linux commands and directories for CAD beginners. It discusses the root and home directories, common commands like ls, cd, pwd, and man. It also covers file permissions and the .bashrc file, text editors like vi, the grep command, secure sharing with ssh and scp, compression with zip and tar, installing software from repositories or from source code, and Python package management with pip.
When you are new to Linux in 2020, go for the latest Mint or Fedora. If you only want to practice the Linux command line then install one Debian server and/or one CentOS server
(without graphical interface).
This document provides an introduction to Linux, including its history and architecture. It describes Linux's origins from Unix in the 1960s and the development of the Linux kernel by Linus Torvalds in 1991. It outlines the key components of a Linux system, including the kernel, shell, file system, processes, networking, and desktop environments. It also discusses booting a Linux system and provides resources for learning more about Linux distributions and building your own operating system.
This document contains information about Linux topics presented by Mohammad Reza Gerami. It includes sections on limiting users, sudoers, journaling filesystems, foreign filesystems, disk management, file system health checks, installing software, networking configuration, IP assignment, firewalls, and various networking tools. Each section has multiple slides with details about the given topic. The document appears to be from a Linux training course.
Solaris is a version of Unix developed by Sun Microsystems based on System V Unix. It has been widely used in enterprise environments. Learning Solaris involves understanding its design philosophy and basic commands before moving to more advanced topics. Some key commands include ps, df, and uname to check processes, disk space, and the OS version. Directories, files, and permissions can be managed using commands like mkdir, chown, chmod while groups and users are configured with useradd, groupadd, and usermod. Services are managed through SMF tools like svcadm rather than init scripts.
This document summarizes the history and development of Unix and Linux operating systems. It describes how Unix was created in 1969 at Bell Labs by Ken Thompson, Dennis Ritchie and others. Brian Kernighan named the program Unix in 1970. The operating system was later rewritten in C language by Dennis Ritchie. Linux was created by Linus Torvalds in 1991 based on Unix. The document also provides system requirements and descriptions of common Linux commands and file system structure.
Dcc3 1(cctk)support for newly added bios tokensartisriva
The document discusses new tokens added to Dell Command Configure (DCC) 3.1 to control various components in stealth mode. It provides details on getting and setting the value of each token using DCC CLI commands and lists the supported line of business and platforms. Some of the new tokens discussed include Bluetoothstealthmode, fanstealthmode, gpsstealthmode, lcdstealthmode, and others to control components like Bluetooth, fans, GPS, LCD screen in stealth mode.
Dcm9 1(omci)support for newly added bios tokensartisriva
Dell Command Monitor 9.1 supports configuration of several new BIOS tokens related to system behavior and components. These include settings for extending POST time, controlling wireless activity LEDs, enabling Intel Ready Mode Technology, configuring keyboard backlight colors, setting primary video device slots, enabling/disabling docking station ports, and adjusting various settings for stealth/quiet mode. The document provides details on each new token, including possible values and WMIC commands to check/set the token values.
This document provides an introduction to Powershell and the Dell Command | Powershell Provider (DCPP). It discusses the history and versions of Powershell, how to get help and use the Integrated Scripting Environment. It also covers the basics of Powershell cmdlet structure and aliases. The document then introduces DCPP, which can be used to configure BIOS settings on Dell devices, and provides instructions for installing DCPP either from a zip file or using the Powershell Gallery.
DCM 9.0(omci)support for newly added bios tokensartisriva
Dell Command Monitor 9.0 adds support for new BIOS tokens that control various hardware features such as cameras, USB ports, wireless radios, and fan speeds on Dell laptops and desktops. The document provides details on each new token, including the command lines to check the current setting and enable or disable the feature.
DCC 3.0(cctk)support for newly added bios tokensartisriva
The document discusses new BIOS tokens that are supported by Dell Command | Configure (DCC) version 3.0. It provides details on the get/set operations for each token using the DCC CLI, including the token name, supported line of business and platforms. The new tokens include features like the back camera, Fn lock, side/rear USB ports, keyboard backlight, GPS radio, and fan speed control. Help links for DCC are also provided.
CCTK2.2.1 support for newly added bios tokensartisriva
CCTK-2.2.1 added support for several new BIOS tokens, including PCI MMIO Size, Dell Wyse P25, Intel Platform Trust Technology, Deep Sleep Control, and Dell Reliable Memory Technology. These new tokens allow configuration of features like allocating PCI memory, enabling remote BIOS access via Dell Wyse P25, controlling Intel PTT device visibility, defining deep sleep behavior, and enabling memory error correction. The new tokens can be configured using CCTK commands like --pcimmiosize and --drmt.
Dell biz client driver cab os deployment using sccm dcipartisriva
This document discusses deploying Dell client operating systems using driver CAB files with Microsoft System Center Configuration Manager. It covers importing driver CABs, injecting WinPE drivers into boot images, creating OS images, and building a task sequence for deployment. The key steps are importing the necessary driver CABs and WinPE drivers, creating an OS image from an ISO, and building a task sequence that references these items to automate OS deployment to Dell clients.
Omci8.2 support for newly added bios tokensartisriva
OMCI-8.2 supported newly added BIOS tokens including UEFI Network Stack, OROM Keyboard Access, Peak shift, Peak Shift Battery Threshold, On-Screen Buttons, Dock Display Port 1 Video Source, Wireless Radio Control Switch, MmioAbove4Gb, Switchable Graphics, and Intel Rapid Start Technology Timer. These new tokens can be configured through WMI commands and support laptop and desktop models across Dell's Latitude, OptiPlex, and Precision lines of business.
1. This document describes how to enable and disable hard disk drive (HDD) passwords on Dell client systems using the Client Configuration Toolkit (CCTK).
2. The steps include checking for HDD availability in the BIOS, using the "hddinfo" and "hddpwd" CCTK commands to view HDD details and set passwords, rebooting the system for changes to take effect, and verifying passwords are set properly in the BIOS and through additional CCTK commands.
3. The process to clear an HDD password uses the "hddpwd=" CCTK command along with the valid password that was previously set.
Dell Cctk support for newly added bios tokensartisriva
CCTK-2.2 supports newly added BIOS tokens including UEFI Network Stack, OROM Keyboard Access, Peak Shift features, On-Screen Buttons, Advanced Battery Charging options, Dock Display Port 1 Video Source setting, Wireless Radio Control Switch, MmioAbove4Gb option, and Wake On Lan with PXE boot capability. These new tokens can be configured using the CCTK CLI to enable, disable, or set values for features on Dell platforms like Latitude, OptiPlex, and Precision systems.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Building RAG with self-deployed Milvus vector database and Snowpark Container...Zilliz
This talk will give hands-on advice on building RAG applications with an open-source Milvus database deployed as a docker container. We will also introduce the integration of Milvus with Snowpark Container Services.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Sudheer Mechineni, Head of Application Frameworks, Standard Chartered Bank
Discover how Standard Chartered Bank harnessed the power of Neo4j to transform complex data access challenges into a dynamic, scalable graph database solution. This keynote will cover their journey from initial adoption to deploying a fully automated, enterprise-grade causal cluster, highlighting key strategies for modelling organisational changes and ensuring robust disaster recovery. Learn how these innovations have not only enhanced Standard Chartered Bank’s data infrastructure but also positioned them as pioneers in the banking sector’s adoption of graph technology.
4. History
4
In 80’s, Microsoft’s DOS was the dominated OS for PC
Apple MAC was better, but expensive
UNIX was much better, but much, much more expensive. Only for
minicomputer for commercial applications
People were looking for a UNIX based system, which is cheaper and can run
on PC
Both DOS, MAC and UNIX were proprietary, i.e., the source code of their
kernel is protected
No modification is possible without paying high license fees
5. GNU
5
Established in 1984 by Richard Stallman, who believes that software should be free
from restrictions against copying or modification in order to make better and efficient
computer programs
GNU is a recursive acronym for “GNU's Not Unix”
Aim at developing a complete Unix-like operating system which is free for copying
and modification
Companies make their money by maintaining and distributing the software, e.g.
optimally packaging the software with different tools (Redhat, Slackware, Mandrake,
SuSE, etc)
Stallman built the first free GNU C Compiler in 1991. But still, an OS was yet to be
developed
6. Begin Linux
6
Andrew Tanenbaum developed Minix, a simplified version of UNIX that runs on
PC
In Sept 1991, Linus Torvalds, a second year student of Computer Science at the
University of Helsinki, developed the preliminary kernel of Linux, known as
Linux version 0.0.1
Soon more than a hundred people joined the Linux camp. Then thousands.
Then hundreds of thousands
It was licensed under GNU General Public License, thus ensuring that the
source codes will be free for all to copy, study and to change.
7. 7
At 25/11/2012 08:31pm, there are 118,240 users and 95,204 machines registered.
My guess at the number of Linux users: 63,195,939
World population: 7,096,950,557
Internet users: 2,478,272,151
– Taken from linuxcounter.net
8. Major Software from GNU Project
8
Gcc : c compiler
G++: C++ compiler
Gdb: source code debugger
GNU make: a version of make
Bison: a parser generator
Bash: command shell
GNU emacs: a text editor
9. Linux directory structure
9
/ - root directory
/bin – essential programs
/boot – boot information for linux
/dev – includes all devices
/mnt – storage devices are mounted
/proc – fluid data and status of kernel
/sbin – sys admin software
/etc – admin related config files and folders
/home
/lib
/tmp
/usr
/var
12. Linux continue to grow…
12
Mobile OS: Android is Linux based
Major Virtualization flavour: Base kernel is Linux
Citrix Xen
Vmware
Cloud solution - Openstack
17. Commands
17
Change the working directory – cd, cd~, cd /, cd /var/log
Display the working directory – pwd
Display a line of text – echo Hello
Execute a program – exec myprog
Time an operation – time lsof
Total execution time, user cpu time, system cpu time
Set options – environment variables
Terminate the shell
Exit
logout
18. MAN Page
18
1 Executable programs and shell commands
2 System calls provided by the kernel
3 Library calls provided by program libraries
4 Device files (usually stored in /dev)
5 File formats
6 Games
7 Miscellaneous (macro packages, conventions, and so on)
8 System administration commands (programs run mostly or exclusively
by root)
9 Kernel routines
19. Redirection
19
> : Creates a new file containing standard output. If the specified file exists, it’s
overwritten.
>> : Appends standard output to the existing file. If the specified file doesn’t exist,
it’s created.
2> : Creates a new file containing standard error. If the specified file exists, it’s
overwritten.
2>> : Appends standard error to the existing file. If the specified file doesn’t exist,
it’s created.
&> : Creates a new file containing both standard output and standard error. If the
specified file exists, it’s overwritten.
< : Sends the contents of the specified file to be used as standard input.
<< : Accepts text on the following lines as standard input.
20. Redirection continued…
20
<> : Causes the specified file to be used for both standard input and standard
output.
tee command
View the command and send the output to another file
lsmod | tee lsmod.txt
24. Package Concepts
24
Packages: collection of files
Installed file database
Dependencies
Checksums
Upgrades and uninstallation
Package naming: samba-4.0.12-24.i386.rpm
– Package name
– Version no
– Build no
– arhitecture
25. RPM Operations
25
-i : Installs a package;
-U : Installs a new package or upgrades an existing one
-F or --freshen : Upgrades a package only if an earlier version already exists
-q : Queries a package—finds if a package is installed, what files it contains, and so on
-V or --verify : Verifies a package—checks that its files are present and unchanged
since installation
-e : Uninstalls a package
26. rpm examples
26
rpm -qa -> lists all the installed packages
rpm -qc {pname} -> list configuartion file names for given package
rpm -qi {pnane} -> Give details of package
rpm -ql {pname} -> lists the files in a package
rpm -qR {pname} -> Lists package dependencies
rpm -qf filename -> List the package name of given file
rpm -qpl {pname} -> lists all the files in a package
rpm -qp {pname} -> list the package with given pname(*/?)
rpm -Va -> Verify all the installed packages
rpm -V {pname} -> Verify specify package
rpm -V -f {filename} {packagename} -> Verify a specified file in a package
31. alien
Covert packages from one format to another
Formats are:
Linux standard base
RPM
deb
stampede(.slp)
Solaris(.pkg)
Slackware(.tgz)
# alien --to-rpm --scripts ./mypkg.deb
33. Understanding the kernel
uname –n -> hostname
uname –s -> kernel name
uname –v -> kernel version
uname –r -> kernel release
uname –m -> machine option
uname –p -> Processor
uname –o -> Operating system
uname –i -> Hardware platform
uname –a -> all information
34. Process – ps output meaning(columns)
Username
Process ID
Parent Process ID
TTY – identifying terminal
Cpu time
Cpu priority
memory use
Command
35. Other Process related commands
Dynamic variant of process – top
nice : Run a program with modified scheduling priority. Priority ranges from
-20(most favorable) to +19(least favorable)
renice : alter priority of running processes
kill
nohup
killall
37. Hardware
BIOS – resides on the motherboard in ROM – EEPROM/Flash memory
When computer is turned on- BIOS performs POST and initializes hardware and
then load boot loader
IRQ - An interrupt request (IRQ), or interrupt, is a signal sent to the CPU instructing
it to suspend its current activity and to handle some external event such as
keyboard input. /proc/interrupts
I/O addresses (also referred to as I/O ports) are unique locations in memory that
are reserved for communications between the CPU and specific physical hardware
devices. Like IRQs, These are commonly associated with specific devices and
should not ordinarily be shared.
DMA Addresses - Direct memory addressing (DMA) is an alternative method of
communication to I/O ports. Rather than have the CPU mediate the transfer of data
between a device and memory, DMA permits the device to transfer data directly,
without the CPU’s attention. The result can be lower CPU requirements for I/O
activity, which can improve overall system performance.
/proc/dma
39. Coldplug and Hotplug devices
Colplug devices – Components internal to the computer such as memory, CPU, pci
cards etc. resides on the motherboard in ROM – EEPROM/Flash memory
Hotplug devices – Devices which can be added/removed when the system is in
running state.
42. Configuring USB devices
USB basics
USB 1.0 and USB 1.1 : 12Mbps
USB 2.0 : 48Mbps
USB 3.0 : 3.2 Gbps
USB devices: Scanner, printer, mice, digital camera, keyboard, speakers etc.
lsusb
/proc/bus/usb
usbmgr
/etc/usbmgr/usbmgr.conf
43. Systems Run Levels
0: Halt
1: single User mode
2: Multi user mode without NFS
3: Full multi user mode
4: unused
5: X11
6: reboot
48. Inode table
Owner of the file
Group of the file
File type
File access permission
Date and time of last access
Date and time of last modification
Number of links to the file
Size of the file
Addresses of blocks where the file is physically present
49. Surrogate super block and Inode table
Super block – state of the file system
Size
No of files it can accommodate
How many mores can be created
sync
55. File Access
Changing file permission: chmod
$ ls -l test
-rwxr-xr-x 1 rodsmith users 111 Apr 13 13:48 test
– “-” -> file
– d -> firectory
– l -> symbolic link
– p -> Named pipe
– s -> Socket
– b -> Block device
– c -> Character device
SUID
SGID
Sticky bit
56. Setting the default mode and group
Default permissions are configurable and defined by user mask.(umask)
• Umask Created Files Created Directories
• 000 666 (rw-rw-rw-) 777 (rwxrwxrwx)
• 002 664 (rw-rw-r--) 775 (rwxrwxr-x)
• 022 644 (rw-r--r--) 755 (rwxr-xr-x)
• 027 640 (rw-r-----) 750 (rwxr-x---)
• 077 600 (rw-------) 700 (rwx------)
• 277 400 (r--------) 500 (r-x------)
57. Managing Disk Quotas
Enabling Quota Support
Kernel 2.4.x – quota v1 support
Kernel 2.6.x – quota v2 support
/etc/fstab
/dev/hdc5 /home ext3 usrquota,grpquota 1 1
chkconfig quota on
Setting quota for users, edquota raghu
59. Regular Expressions
59
Bracket Expressions: d[aeiou]g => dag, deg, dig, dog, dug
Range Expression : a[1-5] => a1, a2, a3, a4, a5
Any single character except new line: .
Start and end of line: ^ and $
Repetition operators: * -> 0 and more), + -> 1 and more, ? -> 0 and 1
Any single character except new line: .
Multiple possible strings: Linux | Windows
Escaping: backslash
61. Sed(stream editor)
61
Modifies the contents of files
• sed [options] -f script-file [input-file]
• sed [options] script-text [input-file]
$ sed ‘s/2009/2010/’ cal-2009.txt > cal-2010.txt
62. awk
62
Print list of all processes of all the users
ps -ef | awk '{print $1"=>" $8}‘
Print all the child process of PPID 1.
ps -ef | grep -w 1 | grep -v /1 | awk '{print $2"=>"$3"=>"$8}‘
Display and create all the loaded module details in a file
lsmod | awk '{print $1}'| xargs modinfo | tee mod.txt
63. File Systems
63
Ext2/3: Native file system
Reiserfs : Suitable for small files – less than 1K
Vfat : 32bit file system compatible with win
XFS : Journaling file systems –handle large files
JFS : Handles power down and crashes
Swap: virtual memory
Iso9660 : cdfs, dvd
68. LILO – Linux Loader
Configuration file: /etc/lilo.conf
Boot loader location: boot=/dev/hda
Default: default os to boot
Boot Prompt
Boot Timeout
Linux root partition, root=/dev/hda4
Boot in read-only mode
Linux boot image: image=/kernelimage
RAM disk: initrd=oskernel imahe
Extra kernel option: mem=2048
Lilo –c – testing purpose
Lilo –v – output in verpose
69. LILO prompt
Boot: linux 1 -> To boot in single user mode 1/S/s/single can be typed
If suppose init program is corrupted
Boot: linux init=/bin/sh can be used
71. LILO and GRUB
Confidential71
LILO GRUB
/dev/hda (hd0)
/dev/hda1 (hd0,0)
/dev/hdb (hd1)
/etc/lilo.conf /boot/grub/menu.lst
lilo /etc/lilo.conf grub-install /dev/hda
72. Linux Boot Process
• System Power on-> CPU executes BIOS code->BIOS(Post, check and configure
hardware)->Boot loader kicks off->OS kernel is loaded(initialize devices, mount
boot partition, init program starts->init selects run level from /etc/inittab and default
level run level loads
Inittab entry
• id:runlevels:action:process
# Default runlevel. The runlevels used by RHS are:
# 0 - halt (Do NOT set initdefault to this)
# 1 - Single user mode
# 2 - Multiuser, without NFS (The same as 3, if you do not have networking)
# 3 - Full multiuser mode
# 4 - unused
# 5 - X11
# 6 - reboot (Do NOT set initdefault to this)
73. Linux Boot Process contd..
inittab file
id:3:initdefault:
5:2345:respawn:/sbin/mingetty tty5
chkconfig : updates and queries run level information for system services.
runlevel : Find the current and previous run level
init : parent of all the processes
telinit: tell init to switch to specified runlevel
shutdown
74. Life cycle of a process
fork and exec
init – process id 1
getty
login
sh
Who or grep or any command running on shell
kill
75. Linux installation and designing hard disk layout
/ : default root partition
/var : logs related entries
/home: User home directory
/opt: Optional packages
Swap space: typically double of RAM
77. usermod
Usermod –l [newlogin] [login]
Usermod –c [comment login]
Usermod –f [no of days] [login] => no of days password to expire
Usermod –L [login] -> lock the password and suspend the user
Usermod –U [login] -> unlock the password
Usermod –e [yyyy-mm-dd] [login] -> change the expiration date
78. Tuning User and System Environments
Global Configuration file
/etc/profile
/etc/bash.bashrc
User Configuration file
~/.profile
~/.bashrc
Configuartion file for added user’s fefault environment setting
/etc/skel
Kernel Parameter
/etc/sysctl.conf
sysctl
79. Automate system administration tasks by scheduling jobs
Manage cron and at jobs
Configure user access to cron and at services
The following is a partial list of the used files, terms, and utilities:
/etc/cron.{d,daily,hourly,monthly,weekly}
/etc/crontab
crontab –e
80. Cron job Definition
80
* * * * * Command
Minute(0-59)
Hour(0-23)
Day of month(0-31)
Month(1-12)
Day of week(1-7)
82. Systems Monitoring
Process
ps
top
Disk space
df
du
Bandwidth
tcpdump
netstat
Memory
pmap
ps
free
other commands
lsof
83. Systems Monitoring contd…
uptime: Load average is average no of processes waiting to run in 1min, 5min, and
15 mins. Ideally it should be <1.
tload is graphical presentation of uptime.
vmstat-Virtual memory usage
pmap -x pid: mapping of processes with memory resources
scsiinfo
hdparam
84. Perform security administration tasks
Audit system to find files with the suid/sgid bit set.
Set or change user passwords and password aging information.
Discovering open ports on a system: nmap, netstat
Setting up limits on user logins, processes and memory usage
ulimit
Basic sudo configuration and usage
/etc/sudoers
85. Linux Kernel
Module components in source tree: /usr/src/linux
Module components at runtime: /lib/modules/<kernelversion>/kernel.
Download latest stable kernel from www.kernel.org
Unpack the kernel
Compiling a kernel:
make config/menuconifg/xconfig
make dep
make bzImage
make modules
make modules_install
make install
Installing the kernel image using boot loader: /boot/grub/grub.conf
Reboot the system and new kernel should be up
86. Shell Scripting
Variables – strings, numbers, environment and paramter
Conditions: shell booleans
Control Structures: if, elif, for, while, until, case
Lists
Functions
Commands built into shell
Getting the result of a command
Here documents
89. Control Structures
If
if condition
then
Statements
else
Statements
fi
elif
if condition
then
Statements
elif
then
statements
else
Statements
fi
90. Control Structures contd..
for
for variable in values
do
statements
done
while
while condition do
statements
done
until
until condition
do
statements
done
91. Control Structures contd..
Case
Case variable in
pattern1 statements;;
pattern2 statements;;
pattern3 statements;;
esac
95. Basic Network Configuration
Manually and automatically configure network interfaces
Basic TCP/IP host configuration
The following is a partial list of the used files, terms, and utilities:
/etc/hostname
/etc/hosts
/etc/resolv.conf
/etc/nsswitch.conf
ifconfig
98. Network Port numbers
• Port Number TCP or UDP Purpose Example Linux Servers
20 TCP File Transfer Protocol ProFTPd, vsftpd
21 TCP FTP ProFTPd, vsftpd
22 TCP Secure Shell (SSH) OpenSSH, Dropbear
23 TCP Telnet in.telnetd
25 TCP Simple Mail Transfer Protocol (SMTP)Sendmail, Postfix,
53 TCP and UDP Domain Name System (DNS) BIND;
101. Linux Server
Web Server – Apache
Database Server – mysql, oracle
ftp server – proftp, vsftp
File server - samba
Mail server – sendmail, postfix
102. Linux Firewall
#iptables -t filter -A INPUT -p tcp --dport 22 -j DROP
#iptables -t filter -A INPUT -p udp --dport 22 -j DROP
#iptables -t filter -A INPUT -p tcp --dport 23 -j DROP
#iptables -t filter -A INPUT -p udp --dport 23 -j DROP
#iptables -t filter -P OUPUT DROP
#iptables -t filter -A OUTPUT -p tcp --dport 80 -j ACCEPT
#iptables -t filter -A OUTPUT -p udp --dport 80 -j ACCEPT
#iptables -t filter -A OUTPUT -p tcp --dport 53 -j ACCEPT
#iptables -t filter -A OUTPUT -p udp --dport 53 -j ACCEPT
# service iptables save
#service iptables restart
103. Exercise
How long the server is running and no of users who are using the system.
Create a user with your name, create a group name training, validity
period, home directory, assign training group
Search for files with specific pattern
Display line no 10 to line no 20 , from a file having 30 lines.
print file in reverse
Command to check if the all the file on given directory does not contain a
given word[e.g error]
Sort the content of a file and copy only unique entries to the new file
List files having links.
105. Exercise(Answers)
• How long the server is running and no of users who are using the system.
uptime
• Search for files ending with .log
find ./ -name “*.log”
• Display line no 10 to line no 20 , from a file having 30+ lines.
sed –n 11,20 [filename]
• Display last 10 lines
tail –n 10 [filename]
• print file in reverse
tac [filename]
106. Exercise(Answers)
• Command to check if the all the file on given directory does not contain a
given word[e.g error]
grep –vi error *.txt
• Sort the content of a file and copy only unique entries to the new file
sort a.txt | uniq > b.txt
• List files having links.
ls –l | grep “^l”
Editor's Notes
Minix is for class teaching only. No intention for commercial use