tybsc it sem 5 Linux administration notes of unit 1,2,3,4,5,6 version 3WE-IT TUTORIALS
Introduction: Introduction to UNIX, Linux, GNU and Linux distributions Duties of the System Administrator, The Linux System Administrator, Installing and Configuring Servers, Installing and Configuring Application Software,
Creating and Maintaining User Accounts, Backing Up and Restoring Files, Monitoring and Tuning Performance, Configuring a Secure System, Using Tools
to Monitor Security Booting and shutting down: Boot loaders-GRUB, LILO, Bootstrapping, Init
process, rc scripts, Enabling and disabling services.
The File System: Understanding the File System Structure, Working with Linux- Supported File Systems, Memory and Virtual
System Configuration Files: System wide Shell Configuration Scripts, System Environmental Settings, Network Configuration Files, Managing the init Scripts,
Configuration Tool, Editing Your Network Configuration
TCP/IP Networking: Understanding Network Classes, Setting Up a Network nterface Card (NIC), Understanding Subnetting, Working with Gateways and Routers, Configuring Dynamic Host Configuration Protocol, Configuring the Network Using the Network
The Network File System: NFS Overview, Planning an NFS Installation, Configuring an NFS Server, Configuring an NFS Client, Using Automount Services, Examining NFS Security
Connecting to Microsoft Networks: Installing Samba, Configuring the Samba Server, Creating Samba Users 3, Starting the Samba Server, Connecting to a Samba
Client, Connecting from a Windows PC to the Samba Server Additional Network Services: Configuring a Time Server, Providing a Caching Proxy Server
Internet Services: Secure Services, SSH, scp, sftp Less Secure Services (Telnet ,FTP, sync,rsh ,rlogin,finger,talk and ntalk, Linux Machine as a Server, Configuring
the xinetd Server, Comparing xinetd and Standalone, Configuring Linux Firewall Packages, Domain Name System: Understanding DNS, Understanding Types of Domain Servers, Examining Server Configuration Files, Configuring a Caching DNS Server, Configuring a Secondary Master DNS Server, Configuring a Primary
Master Server, Checking Configuration
Configuring Mail Services: Tracing the Email Delivery Process, Mail User Agent (MUA), Introducing SMTP, Configuring Sendmail, Using the Postfix Mail Server,
Serving Email with POP3 and IMAP, Maintaining Email Security Configuring FTP Services: Introducing vsftpd, Configuring vsftpd, Advanced FTP Server Configuration, Using SFTP
Configuring a Web Server: Introducing Apache, Configuring Apache, Implementing SSI, Enabling CGI, Enabling PHP, Creating a Secure Server with SSL System Administration: Administering Users and Groups Installing and Upgrading Software Packages
This Project Report of Web Server contains the description of Linux Operating System Administration. This is based on Redhat Linux 6. In this, the topics covered are System Administration, Server Administration, Scheduling, Web Server, Samba Server and FTP Server. This also contains the information related to configuration file like passwd. This presentation was prepared as a record of Industrial training Project.
CPU emulation has been used over the years for a multitude of objectives. It allows an application compiled for a specific target platform to be run on a host platform with a completely different or overlapping architecture set.
tybsc it sem 5 Linux administration notes of unit 1,2,3,4,5,6 version 3WE-IT TUTORIALS
Introduction: Introduction to UNIX, Linux, GNU and Linux distributions Duties of the System Administrator, The Linux System Administrator, Installing and Configuring Servers, Installing and Configuring Application Software,
Creating and Maintaining User Accounts, Backing Up and Restoring Files, Monitoring and Tuning Performance, Configuring a Secure System, Using Tools
to Monitor Security Booting and shutting down: Boot loaders-GRUB, LILO, Bootstrapping, Init
process, rc scripts, Enabling and disabling services.
The File System: Understanding the File System Structure, Working with Linux- Supported File Systems, Memory and Virtual
System Configuration Files: System wide Shell Configuration Scripts, System Environmental Settings, Network Configuration Files, Managing the init Scripts,
Configuration Tool, Editing Your Network Configuration
TCP/IP Networking: Understanding Network Classes, Setting Up a Network nterface Card (NIC), Understanding Subnetting, Working with Gateways and Routers, Configuring Dynamic Host Configuration Protocol, Configuring the Network Using the Network
The Network File System: NFS Overview, Planning an NFS Installation, Configuring an NFS Server, Configuring an NFS Client, Using Automount Services, Examining NFS Security
Connecting to Microsoft Networks: Installing Samba, Configuring the Samba Server, Creating Samba Users 3, Starting the Samba Server, Connecting to a Samba
Client, Connecting from a Windows PC to the Samba Server Additional Network Services: Configuring a Time Server, Providing a Caching Proxy Server
Internet Services: Secure Services, SSH, scp, sftp Less Secure Services (Telnet ,FTP, sync,rsh ,rlogin,finger,talk and ntalk, Linux Machine as a Server, Configuring
the xinetd Server, Comparing xinetd and Standalone, Configuring Linux Firewall Packages, Domain Name System: Understanding DNS, Understanding Types of Domain Servers, Examining Server Configuration Files, Configuring a Caching DNS Server, Configuring a Secondary Master DNS Server, Configuring a Primary
Master Server, Checking Configuration
Configuring Mail Services: Tracing the Email Delivery Process, Mail User Agent (MUA), Introducing SMTP, Configuring Sendmail, Using the Postfix Mail Server,
Serving Email with POP3 and IMAP, Maintaining Email Security Configuring FTP Services: Introducing vsftpd, Configuring vsftpd, Advanced FTP Server Configuration, Using SFTP
Configuring a Web Server: Introducing Apache, Configuring Apache, Implementing SSI, Enabling CGI, Enabling PHP, Creating a Secure Server with SSL System Administration: Administering Users and Groups Installing and Upgrading Software Packages
This Project Report of Web Server contains the description of Linux Operating System Administration. This is based on Redhat Linux 6. In this, the topics covered are System Administration, Server Administration, Scheduling, Web Server, Samba Server and FTP Server. This also contains the information related to configuration file like passwd. This presentation was prepared as a record of Industrial training Project.
CPU emulation has been used over the years for a multitude of objectives. It allows an application compiled for a specific target platform to be run on a host platform with a completely different or overlapping architecture set.
This presentation covers the understanding of system calls for various resource management and covers system calls for file management in details. The understanding of using system calls helps to start with working with device driver programming on Unix/Linux OS.
unix training | unix training videos | unix course unix online training Nancy Thomas
Website : http://www.todaycourses.com
Unix & Shell Scripting Course Content :
UNIX Background:
Introduction about Operating System(OS)
Introduction to UNIX
List of UNIX vendors available in Market
Introduction to various UNIX Implementations
History of UNIX OS Evolution from 1969
Open Source (vs.) Shared source (vs.) Closed source
Is Unix Open Source software?
UNIX (vs.) LINUX
LINUX OS background
LINUX (vs.) WINDOWS
Popular LINUX distributions/Vendors
Similarities between Unix & Linux
Differences between Unix & Linux
About POSIX standards
UNIX System architecture:
Hardware
Kernel
Shell
Utilities and User programs
Layers in Unix OS
Unix Servers/Dumb terminals/nodes
UNIX System features:
Multitasking
Multiuser
Easy Portability
Security
Communication
UNIX day-to-day used commands:
System Information commands (uname, date, etc)
man command
User Related (w, who, etc)
Terminal Related (stty, etc)
Filter commands (more, less, etc)
Miscellaneous commands (cal, banner, clear, etc)
Viewing exit status of commands
Disk Related commands
unix training, unix training videos, unix training topics, unix online training,unix classes online, unix training online, free unix training, unix courses, learn unix online, unix certification, unix course, learning linux, how to learn linux, linux training, red hat linux, how to linux, unix shell scripting, unix shell (software), unix shell scripting tutorial for beginners, unix shell scripting tutorial, unix (software), unix training in pune, unix training in hyderabad, unix training in pune
This presentation covers the understanding of system calls for various resource management and covers system calls for file management in details. The understanding of using system calls helps to start with working with device driver programming on Unix/Linux OS.
unix training | unix training videos | unix course unix online training Nancy Thomas
Website : http://www.todaycourses.com
Unix & Shell Scripting Course Content :
UNIX Background:
Introduction about Operating System(OS)
Introduction to UNIX
List of UNIX vendors available in Market
Introduction to various UNIX Implementations
History of UNIX OS Evolution from 1969
Open Source (vs.) Shared source (vs.) Closed source
Is Unix Open Source software?
UNIX (vs.) LINUX
LINUX OS background
LINUX (vs.) WINDOWS
Popular LINUX distributions/Vendors
Similarities between Unix & Linux
Differences between Unix & Linux
About POSIX standards
UNIX System architecture:
Hardware
Kernel
Shell
Utilities and User programs
Layers in Unix OS
Unix Servers/Dumb terminals/nodes
UNIX System features:
Multitasking
Multiuser
Easy Portability
Security
Communication
UNIX day-to-day used commands:
System Information commands (uname, date, etc)
man command
User Related (w, who, etc)
Terminal Related (stty, etc)
Filter commands (more, less, etc)
Miscellaneous commands (cal, banner, clear, etc)
Viewing exit status of commands
Disk Related commands
unix training, unix training videos, unix training topics, unix online training,unix classes online, unix training online, free unix training, unix courses, learn unix online, unix certification, unix course, learning linux, how to learn linux, linux training, red hat linux, how to linux, unix shell scripting, unix shell (software), unix shell scripting tutorial for beginners, unix shell scripting tutorial, unix (software), unix training in pune, unix training in hyderabad, unix training in pune
This slide explores the basics of UNIX operating system - What's UNIX? What are different types of UNIX OS? What is difference between UNIX and Linux? and much more..
UNIX Internals - UNIT-I, General Overview of the system, General Overview of the UNIX system, General Overview of the system in UNIX,General Overview of the system of UNIX
Hi,
This presentation contains history of Unix operating system.
Kindly send me your comments to ankitmehta21@gmail.com so it will help me to improve future presentations.
Thanks,
Ankit Mehta
ankitmehta21@gmail.com
User and Operating-System Interface We mentioned earlier that there ar.docxStewartyUMGlovern
User and Operating-System Interface We mentioned earlier that there are several ways for users to interface with the operating system. Here, we discuss two fundamental approaches. One provides a command-line interface, or command interpreter, that allows users to directly enter commands to be performed by the operating system. The other allows users to interface with the operating system via a graphical user interface, or GUI. 2.2.1 Command Interpreters Some operating systems include the command interpreter in the kernel. Others, such as Windows and UNIX, treat the command interpreter as a special program that is running when a job is initiated or when a user first logs on (on interactive systems). On systems with multiple command interpreters to choose from, the interpreters are known as shells. For example, on UNIX and Linux systems, a user may choose among several different shells, including the Bourne shell, C shell, Bourne-Again shell, Korn shell, and others. Third-party shells and free user-written shells are also available. Most shells provide similar functionality, and a user's choice of which shell to use is generally based on personal preference. Figure 2.2 shows the Bourne shell command interpreter being used on Solaris 10. The main function of the command interpreter is to get and execute the next user-specified command. Many of the commands given at this level manipulate files: create, delete, list, print, copy, execute, and so on. The MS-DOS and UNIX shells operate in this way. These commands can be implemented in two general ways. In one approach, the command interpreter itself contains the code to execute the command. For example, a command to delete a file may cause the command interpreter to jump to a section of its code that sets up the parameters and makes the appropriate system call. In this case, the number of commands that can be given determines the size of the command interpreter, since each command requires its own implementing code. An alternative approach - used by UNIX, among other operating systems - implements most commands through system programs. In this case, the command interpreter does not understand the command in any way; it merely uses the command to identify a file to be loaded into memory and executed. Thus, the UNIX command to delete a file rm file.txt would search for a file called rm, load the file into memory, and execute it with the parameter f i l e . t x t . The function associated with the rm command would 2.2 User and Operating-System Interface 59 Figure 2.2 The Bourne shell command interpreter in Solrais 10. be defined completely by the code in the file rm. In this way, programmers can add new commands to the system easily by creating new files with the proper names. The command-interpreter program, which can be small, does not have to be changed for new commands to be added. 2.2.2 Graphical User Interfaces A second strategy for interfacing with the operating system is through a userfriendly .
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Generative AI Deep Dive: Advancing from Proof of Concept to Production
SysProg-Tutor 02 Introduction to Unix Operating System
1. Tutor Session - 2
Chulalongkorn
Tutor Session II:
Introduction to UNIX
University
Operating System
Wongyos Keardsri (P’Bank)
Department of Computer Engineering
Faculty of Engineering, Chulalongkorn University
Bangkok, Thailand
Mobile Phone: 089-5993490
E-mail: wongyos@gmail.com, MSN: bankberrer@hotmail.com
Twitter: @wongyos
2110313 Operating Systems and System Programs (1/2010)
2. Tutor Session - 2
Tutor Outline
Chulalongkorn
University
History of UNIX Directory Navigation and
Control
Unix Structure
File Maintenance
UNIX Shell Commands
UNIX File System Display Commands
Getting Started Special Unix Features
Logging in / Exiting
Text Processing
Environment Variables
Other Useful Commands
Unix Command Line
Structure vi Editor
System Resource
Commands
2 2110313 Operating Systems and System Programs (1/2010)
3. Tutor Session - 2
History of UNIX
Chulalongkorn
University
Unix (officially trademarked as UNIX®) is a
computer operating system
In 1965, Bell Laboratories joins with MIT and
General Electric developed the new operating
system named Multics
In 1969, Some of the Bell Labs programmers
designed and implemented the first version of the
Unix File System on a PDP-7
Given the name UNIX by Brian Kernighan
3 2110313 Operating Systems and System Programs (1/2010)
4. Tutor Session - 2
History of UNIX
Chulalongkorn
University (Cont)
UNIX developer team (Bell Labs programmers)
Ken Thompson
Dennis Ritchie
Rudd Canaday
Doug McIlroy
Languages written in UNIX
BCPL (Multics)
B (Unix) Unix version 1.0
C (Unix) After Unix version 2.0
4 2110313 Operating Systems and System Programs (1/2010)
5. Tutor Session - 2
Unix Structure
Chulalongkorn
University
Unix features
Multi-user and time-sharing
Multi-tasking
Multi-level (Hierarchical file system)
Multi-processor
Simple user interface
Simple utilities
Free Unix-like operating systems
Linux
BSD
5 2110313 Operating Systems and System Programs (1/2010)
6. Tutor Session - 2
Unix Structure
Chulalongkorn
University (Cont)
Several hundred utility programs
User commands
The Unix system kernel and The shells
System calls
C library functions
Device & network interface
File format
Games and demos
System maintenance
6 2110313 Operating Systems and System Programs (1/2010)
7. Tutor Session - 2
Unix Structure
Chulalongkorn
University (Cont)
Unix System Structure
Kernel - controls hardware
- handles input/output
- manages file system
- manages memory
- schedules processes
Hardware
System Calls
Shell - accepts and executes user
Programs=Commands commands [command interpreter]
7 2110313 Operating Systems and System Programs (1/2010)
8. Tutor Session - 2
Unix Structure
Chulalongkorn
University (Cont)
UNIX shell
Bourne shell (sh) -- Written by Steve Bourne, while at
Bell Labs. First distributed with Version 7 Unix.
Bourne-Again shell (bash) -- Written as part of the
GNU project to provide a superset of Bourne Shell
functionality.
Korn shell (ksh) -- Written by David Korn, while at
Bell Labs.
Z shell (zsh) -- considered as the most complete shell
C shell (csh) -- Written by Bill Joy, while at the
University of California, Berkeley. First distributed with
BSD, circa 1979.
8 2110313 Operating Systems and System Programs (1/2010)
9. Tutor Session - 2
Unix Structure
Chulalongkorn
University (Cont)
Unix File System
/ Root
bin etc lib usr dev tmp home
sh date ls passwd group libc.so tty null
bank u50skp
bin local man
bin hello.c cpcu
Hierarchical file system
9 2110313 Operating Systems and System Programs (1/2010)
10. Tutor Session - 2
Unix Structure
Chulalongkorn
University (Cont)
Directory: etc, usr, home, bank, cpcu
File: libc.so, hello.c
Path: /home/bank/cpcu
Two special directory entries
. the current directory
.. the parent of the current directory
10 2110313 Operating Systems and System Programs (1/2010)
11. Tutor Session - 2
Getting Started
Chulalongkorn
University
Logging in
After connecting with a Unix system, a user is
prompted for a login username, then a password.
Unix is case sensitive should be typed exactly as issued
Example
login: root
password:
11 2110313 Operating Systems and System Programs (1/2010)
12. Tutor Session - 2
Getting Started
Chulalongkorn
University (Cont)
Exiting
^D indicates end of data stream; can log a
user off.
^C interrupt
logout leave the system
exit leave the shell
Terminal Type
vt100 Most computers
sun Sun workstation
xterms or xterm X-Terminal
12 2110313 Operating Systems and System Programs (1/2010)
13. Tutor Session - 2
Getting Started
Chulalongkorn
University (Cont)
Environment Variables
DISPLAY The graphical display to use, e.g.nyssa:0.0
EDITOR The path to your default editor, e.g.
/usr/bin/vi
GROUP Your login group, e.g. staff
HOME Path to your home directory, e.g.
/home/frank
HOST The hostname of your system, e.g. nyssa
LOGNAME The name you login with, e.g. frank
PATH Paths to be searched for commands,
e.g. /usr/bin:/usr/ucb:/usr/local/bin
13 2110313 Operating Systems and System Programs (1/2010)
14. Tutor Session - 2
Getting Started
Chulalongkorn
University (Cont)
Environment Variables (Cont)
PS1 The primary prompt string, Bourne
shell only (defaults $)
PS2 The secondary prompt string, Bourne
shell only (defaults >)
SHELL The login shell you’re using, e.g.
/usr/bin/csh
TERM Your terminal type, e.g. xterm
USER Your username, e.g. frank
14 2110313 Operating Systems and System Programs (1/2010)
15. Tutor Session - 2
Getting Started
Chulalongkorn
University (Cont)
Set a global environment variable
C shell:
% setenv NAME value
Bourne shell:
$ NAME=value; export NAME
List global environmental variables with the env
or printenv commands.
Unset with the unsetenv (C shell) or unset
(Bourne shell) commands.
15 2110313 Operating Systems and System Programs (1/2010)
16. Tutor Session - 2
Getting Started
Chulalongkorn
University (Cont)
Set a local shell variable Change the shell
C shell: $ /bin/sh
$ /bin/csh
% set name=value $ /bin/ksh
$ /usr/pkg/bin/bash
Bourne shell:
$ name=value
Display environment variables
echo $NAME
16 2110313 Operating Systems and System Programs (1/2010)
17. Tutor Session - 2
Getting Started
Chulalongkorn
University (Cont)
C Shell History Substitution
history recall previous commands
!! repeat last command
!n repeat command number n
!-n repeat command n from last
!str repeat command that started with
string str
!?str? repeat command with str anywhere on
the line
!?str?% select the first argument that had str in it
17 2110313 Operating Systems and System Programs (1/2010)
18. Tutor Session - 2
Getting Started
Chulalongkorn
University (Cont)
Control Key
^S pause display
^Q restart display
^C cancel operation
^U cancel line
^D signal end of file
^V treat following control character as
normal character
18 2110313 Operating Systems and System Programs (1/2010)
19. Tutor Session - 2
Unix Command Line Structure
Chulalongkorn
University
Unix Command Line Structure
$ command [options] [arguments]
Unix manual / Help
$ man command_name
$ man -k keyword
$ man -k “key words”
19 2110313 Operating Systems and System Programs (1/2010)
20. Tutor Session - 2
Unix Command Line Structure
Chulalongkorn
University (Cont)
System Resource Commands
date report the current date and time
cal report the calendar
df report the summary of disk blocks and inodes
free and in use
du report amount of disk space in use
hostname/uname display or set (super-user only)
the name of the current machine
kill send a signal to the process with the process
id number (pid#) or job control number (%n).
The default signal is to kill the process.
20 2110313 Operating Systems and System Programs (1/2010)
21. Tutor Session - 2
Unix Command Line Structure
Chulalongkorn
University (Cont)
System Resource Commands (Cont)
passwd set or change your password
ps show status of active processes
script saves everything that appears on the
screen to file until exit is executed
stty set or display terminal control options
whereis report the binary, source, and man
page locations for the command
named
which reports the path to the command or
the shell alias in use
21 2110313 Operating Systems and System Programs (1/2010)
22. Tutor Session - 2
Unix Command Line Structure
Chulalongkorn
University (Cont)
System Resource Commands (Cont)
who or w report who is logged in and what
processes are running
whoami report current user name
finger report who is logged in
ifconfig report network interfaces
su switch user
write send a message to another user
22 2110313 Operating Systems and System Programs (1/2010)
23. Tutor Session - 2
Unix Command Line Structure
Chulalongkorn
University (Cont)
Directory Navigation and Control
cd [directory]
change directory
ls [options] [directory or file]
list directory contents or file permissions
mkdir [options] directory
make a directory
pwd
print working (current) directory
rmdir [options] directory
remove a directory
23 2110313 Operating Systems and System Programs (1/2010)
24. Tutor Session - 2
Unix Command Line Structure
Chulalongkorn
University (Cont)
List file and directory contents
drwxr-xr-x 3 root wheel 512 Jul 4 23:48 2110101
drwxr-xr-x 4 root wheel 512 Aug 28 2005 2110313
drwxr-xr-x 3 root wheel 512 Aug 28 2005 Baka
-rw-r--r-- 1 root wheel 905 Jul 9 02:09 file
-rw-r--r-- 1 root wheel 105 Jul 9 00:05 hello.java
Permission mode Owner Group Size Modified/Created Filename
date
Type field Number of link
24 2110313 Operating Systems and System Programs (1/2010)
25. Tutor Session - 2
Unix Command Line Structure
Chulalongkorn
University (Cont)
Permission
Type field (first character)
Access permissions (characters 2-10):
• First 3 : user/owner
• Second 3: group
• Last 3: others
Permission mode
• d directory
• r read permission
• w write permission drwxr-xr-x
• x execute permission
• - no permission
25 2110313 Operating Systems and System Programs (1/2010)
26. Tutor Session - 2
Unix Command Line Structure
Chulalongkorn
University (Cont)
Permission number
7 111 rwx
6 110 rw-
5 101 r-x
4 100 r--
3 011 -wx
2 010 -w-
1 001 --x
0 000 ---
26 2110313 Operating Systems and System Programs (1/2010)
27. Tutor Session - 2
Unix Command Line Structure
Chulalongkorn
University (Cont)
File Maintenance Commands
chgrp [options] group file
change the group of the file
chmod [options] file
change file or directory access permissions
chown [options] owner file
change the ownership of a file; can only be done by the
superuser
cp [options] file1 file2
copy file1 into file2; file2 shouldn't already exist. This
command creates or overwrites file2.
27 2110313 Operating Systems and System Programs (1/2010)
28. Tutor Session - 2
Unix Command Line Structure
Chulalongkorn
University (Cont)
File Maintenance Commands (Cont)
mv [options] file1 file2
move file1 into file2
rm [options] file
remove (delete) a file or directory (-r recursively
deletes the directory and its contents) (-i prompts
before removing files)
28 2110313 Operating Systems and System Programs (1/2010)
29. Tutor Session - 2
Unix Command Line Structure
Chulalongkorn
University (Cont)
Display Commands
cat [options] file
concatenate (list) a file
echo [text string]
echo the text string to stdout
head [-number] file
display the first 10 (or number of) lines of a file
more (or less or pg ) [options] file
page through a text file
tail [options] file
display the last few lines (or parts) of a file
29 2110313 Operating Systems and System Programs (1/2010)
30. Tutor Session - 2
Special Unix Features
Chulalongkorn
University
I/O redirection and piping
Output redirection to a file
Input redirection from a file
Piping
Output of one command becomes the input of a
subsequent command
There are 3 standard file descriptors:
stdin 0 Standard input to the program
stdout 1 Standard output from the program
stderr 2 Standard error output from the program
30 2110313 Operating Systems and System Programs (1/2010)
31. Tutor Session - 2
Special Unix Features
Chulalongkorn
University (Cont)
File Redirection
> redirect standard output to file
command > outputfile
>> append standard output to file
command >> outputfile
< input redirection from file
command < inputfile
| pipe output to another command
command1 | command2
31 2110313 Operating Systems and System Programs (1/2010)
32. Tutor Session - 2
Special Unix Features
Chulalongkorn
University (Cont)
File Redirection (csh)
>& file redirect stdout and stderr to file
>>& file append stdout and stderr to file
|& command pipe stdout and stderr to
command
To redirect stdout and stderr to separate files:
% (command > outfile) >& errfile
32 2110313 Operating Systems and System Programs (1/2010)
33. Tutor Session - 2
Special Unix Features
Chulalongkorn
University (Cont)
File Redirection (sh)
2> file redirect stderr to file
> file 2>&1 direct both stdout and stderr to file
>> file 2>&1 append both stdout and stderr to file
2>&1|command pipe stdout and stderr to command
To redirect stdout and stderr to two separate files:
$command > outfile 2> errfile
To discard stderr:
$ command 2> /dev/null
(/dev/null is a black hole for bits)
33 2110313 Operating Systems and System Programs (1/2010)
34. Tutor Session - 2
Special Unix Features
Chulalongkorn
University (Cont)
Wild Cards
? match any single character
* match any string of zero or more characters
[abc] match anyone of the enclosed characters
[a-s] match any character in the range a through s
[!def] (sh) match any characters not one of
[^def] (csh) the enclosed characters
34 2110313 Operating Systems and System Programs (1/2010)
35. Tutor Session - 2
Special Unix Features
Chulalongkorn
University (Cont)
Control Over Command Execution
Background (non-interactive)
command &
Sequential
command1 ; command2
Subprocess (run as an atomic unit)
(command)
35 2110313 Operating Systems and System Programs (1/2010)
36. Tutor Session - 2
Special Unix Features
Chulalongkorn
University (Cont)
Control Over Command Execution (Cont)
Conditional (program exit status determines success
or failure)
• OR command1 || command2
– (run command2 if command1 fails)
• AND command1 && command2
– (run command2 if command1 succeeds)
36 2110313 Operating Systems and System Programs (1/2010)
37. Tutor Session - 2
Text Processing
Chulalongkorn
University
Filter
A filter (in Unix) is a program that reads some input,
performs a simple translation on it, and writes some
output
Examples of Unix filters
grep
sort
wc
awk
vi
sed
37 2110313 Operating Systems and System Programs (1/2010)
38. Tutor Session - 2
Text Processing
Chulalongkorn
University (Cont)
Text Processing Commands
awk [options] file
scan for patterns in a file and process the results
grep [options] 'search string' file
search the argument (in this case probably a file) for all
occurrences of the search string, and list them.
sed [options] file
stream editor for editing files from a script or from the
command line
38 2110313 Operating Systems and System Programs (1/2010)
39. Tutor Session - 2
Text Processing
Chulalongkorn
University (Cont)
Regular expressions
Regular expressions come in three different forms
• Anchor tie the pattern to a location on the line
• Character sets match a single character at a single position
• Modifiers specify how many times to repeat the previous
expression
Regular expressions can be combined to form longer
regular expressions
39 2110313 Operating Systems and System Programs (1/2010)
40. Tutor Session - 2
Text Processing
Chulalongkorn
University (Cont)
Regular expressions (Cont)
. match any single character except newline
* match zero or more instances of single
expression preceding it
[abc] match any of the characters enclosed
[a-d] match any character in enclosed range
[^abc]match any character NOT in the enclosed set
^exp regular expression must start at the beginning
of the line
40 2110313 Operating Systems and System Programs (1/2010)
41. Tutor Session - 2
Text Processing
Chulalongkorn
University (Cont)
Regular expressions (Cont)
exp$ regular expression must end at the beginning
of the line
treat the next character literally
41 2110313 Operating Systems and System Programs (1/2010)
42. Tutor Session - 2
Other Useful Commands
Chulalongkorn
University
Working With Files
cmp [options] file1 file2
compare two files and list where differences occur
(text or binary files)
cut [options] [file(s)]
cut specified field(s)/character(s) from lines in file(s)
diff [options] file1 file2
compare the two files and display the differences (text
files only)
file [options] file
classify the file type
42 2110313 Operating Systems and System Programs (1/2010)
43. Tutor Session - 2
Other Useful Commands
Chulalongkorn
University (Cont)
Working With Files (Cont)
find directory [options] [actions]
find files matching a type or pattern
ln [options] source_file
target link the source_file to the target
paste [options] file
paste field(s) onto the lines in file
sort [options] file
sort the lines of the file according to the options
chosen
43 2110313 Operating Systems and System Programs (1/2010)
44. Tutor Session - 2
Other Useful Commands
Chulalongkorn
University (Cont)
Working With Files (Cont)
strings [options] file
report any sequence of 4 or more printable characters
ending in <NL> or <NULL>. Usually used to search
binary files for ASCII strings.
tee [options] file
copy stdout to one or more files
touch [options] [date] file
create an empty file, or update the access time of an
existing file
44 2110313 Operating Systems and System Programs (1/2010)
45. Tutor Session - 2
Other Useful Commands
Chulalongkorn
University (Cont)
Working With Files (Cont)
tr [options] string1 string2
translate the characters in string1 from stdin into
those in string2 in stdout
uniq [options] file
remove repeated lines in a file
wc [options] [file(s)]
display word (or character or line) count for file(s)
45 2110313 Operating Systems and System Programs (1/2010)
46. Tutor Session - 2
Other Useful Commands
Chulalongkorn
University (Cont)
File Archiving, Compression and Conversion
compress/uncompress/zcat [options]
file[.Z]
compress or uncompress a file. Compressed files are
stored with a .Z ending.
gzip/gunzip/zcat [options] file[.gz]
compress or uncompress a file. Compressed files are
stored with a .gz ending
46 2110313 Operating Systems and System Programs (1/2010)
47. Tutor Session - 2
Other Useful Commands
Chulalongkorn
University (Cont)
File Archiving, Compression and Conversion
tar key[options] [file(s)]
tape archiver--refer to man pages for details on
creating, listing, and retrieving from archive files. Tar
files can be stored on tape or disk.
47 2110313 Operating Systems and System Programs (1/2010)
48. Tutor Session - 2
Other Useful Commands
Chulalongkorn
University (Cont)
Remote Connections
finger [options] user[@hostname]
report information about users on local and remote
machines
ftp [options] host
transfer file(s) using file transfer protocol
rcp [options] hostname
remotely copy files from this machine to another
machine
48 2110313 Operating Systems and System Programs (1/2010)
49. Tutor Session - 2
Other Useful Commands
Chulalongkorn
University (Cont)
Remote Connections
rlogin [options] hostname
login remotely to another machine
rsh [options] hostname
remote shell to run on another machine
telnet [host [port]]
communicate with another host using telnet protocol
49 2110313 Operating Systems and System Programs (1/2010)
50. Tutor Session - 2
Vi Editor
Chulalongkorn
University
UNIX Editors
vi
emacs
pico
Vi is a modal editor (2 modes)
Insert mode <i> key
• Text insertion
Command mode <escape> key
• All commands
50 2110313 Operating Systems and System Programs (1/2010)
51. Tutor Session - 2
Vi Editor
Chulalongkorn
University vi Quick Reference Guide
Cursor Movement Commands
(n) indicates a number, and is optional
(n)h left (n) space(s)
(n)j down (n) space(s)
(n)k up (n) space(s)
(n)l right (n) space(s)
^F forward one screen
^B back one screen
^D down half screen
^U up half screen
51 2110313 Operating Systems and System Programs (1/2010)
52. Tutor Session - 2
Vi Editor
Chulalongkorn
University vi Quick Reference Guide (Cont)
Cursor Movement Commands (Cont)
H beginning of top line of screen
M beginning of middle line of screen
L beginning of last line of screen
G beginning of last line of file
(n)G move to beginning of line (n)
0 (zero) beginning of line
$ end of line
(n)w forward (n) word(s)
52 2110313 Operating Systems and System Programs (1/2010)
53. Tutor Session - 2
Vi Editor
Chulalongkorn
University vi Quick Reference Guide (Cont)
Cursor Movement Commands (Cont)
(n)b back (n) word(s)
e end of word
Inserting Text
i insert text before the cursor
a append text after the cursor (does not
overwrite other text)
I insert text at the beginning of the line
A append text to the end of the line
r replace the character under the cursor with
the next character typed
53 2110313 Operating Systems and System Programs (1/2010)
54. Tutor Session - 2
Vi Editor
Chulalongkorn
University vi Quick Reference Guide (Cont)
Inserting Text (Cont)
R Overwrite characters until the end of the line
(or until escape is pressed to change
command)
o (alpha o) open new line after the current line
to type text
O (alpha O) open new line before the current
line to type text
54 2110313 Operating Systems and System Programs (1/2010)
55. Tutor Session - 2
Vi Editor
Chulalongkorn
University vi Quick Reference Guide (Cont)
Deleting Text
dd deletes current line
(n)dd deletes (n) line(s)
(n)dw deletes (n) word(s)
D deletes from cursor to end of line
x deletes current character
(n)x deletes (n) character(s)
X deletes previous character
55 2110313 Operating Systems and System Programs (1/2010)
56. Tutor Session - 2
Vi Editor
Chulalongkorn
University vi Quick Reference Guide (Cont)
Change Commands
(n)cc changes (n) characters on line(s) until end of
the line (or until escape is pressed)
cw changes characters of word until end of the
word (or until escape is pressed)
(n)cw changes characters of the next (n) words
c$ changes text to the end of the line
ct(x) changes text to the letter (x)
56 2110313 Operating Systems and System Programs (1/2010)
57. Tutor Session - 2
Vi Editor
Chulalongkorn
University vi Quick Reference Guide (Cont)
Change Commands (Cont)
C changes remaining text on the current line
(until stopped by escape key)
~ changes the case of the current character
J joins the current line and the next line
u undo the last command just done on this line
. repeats last change
s substitutes text for current character
S substitutes text for current line
57 2110313 Operating Systems and System Programs (1/2010)
58. Tutor Session - 2
Vi Editor
Chulalongkorn
University vi Quick Reference Guide (Cont)
Change Commands (Cont)
:s substitutes new word(s) for old
:< line nos effected> s/old/new/g
& repeats last substitution (:s) command.
(n)yy yanks (n) lines to buffer
y(n)w yanks (n) words to buffer
p puts yanked or deleted text after cursor
P puts yanked or deleted text before cursor
58 2110313 Operating Systems and System Programs (1/2010)
59. Tutor Session - 2
Vi Editor
Chulalongkorn
University vi Quick Reference Guide (Cont)
File Manipulation
:w(file) writes changes to file (default is
current file)
:wq writes changes to current file and quits
edit session
:w!(file) overwrites file (default is current file)
:q quits edit session w/no changes made
:q! quits edit session and discards changes
:n edits next file in argument list
59 2110313 Operating Systems and System Programs (1/2010)
60. Tutor Session - 2
Vi Editor
Chulalongkorn
University vi Quick Reference Guide (Cont)
File Manipulation (Cont)
:f(name) changes name of current file to (name)
:r(file) reads contents of file into current edit
at the current cursor position (insert a
file)
:!(command) shell escape
:r!(command) inserts result of shell command at
cursor position
ZZ write changes to current file and exit
60 2110313 Operating Systems and System Programs (1/2010)
61. Tutor Session - 2
End
Chulalongkorn
University
Question ?
… Answer
61 2110313 Operating Systems and System Programs (1/2010)