File System Overview and Interview Questions About Unix
|
|
- Coral Paul
- 3 years ago
- Views:
Transcription
1 Unix (for those who know Windows)
2 What happens? Outline What is Unix? A short history Why should you learn it? The OS structure The file system File protection Unix at Ifi Questions and answers
3 In the beginning A short history of Unix How Unix was created has influenced it: Unix was created at the AT&T s Bell Labs in It was designed by programmers to use themselves. At that time computers were small and slow. There were very few of them. The user had no graphic screen and no mouse; they had a slow teletype. In the beginning, AT&T saw no commercial future for Unix.
4 How do Unix and Windows compare? Unix vs Windows In Windows, the graphical user interface is the basis in Unix, it is a command window (but a GUI has since been added). Windows is Program/Data oriented Unix is file oriented. Windows was designed for One user one computer while Unix was multi-user from the start. Under Windows one uses a few big programs under Unix one uses many small, specialized programs.
5 How do Unix and Windows compare? For example: I want a nicely formatted sorted list of who use the computer that I am using: dag@diamant ~$ who awk {print $1} sort uniq column -x aasmunds andersmo bjarnej cristi dag eivinah elien endreak ernstgr eskil fredrihl fredrw haakonks hilia jae jimrj juanle larsg larsha mariusno martbo martinwa martiso mshaugla nikolahl oleiul oysteint per siri sivertkh svenar sveniu vegardno viet
6 How do Unix and Windows compare? Each little program has its specific task: who produces a list of all users logged onto the computer: dag@diamant ~$ who larsha pts/ :16 (c4baf5bc1.dhcp) martiso pts/ :23 ( ) : awk picks column 1. sort sorts the names. uniq removed duplicates. column formats the answer in nice columns.
7 How do Unix and Windows compare? In Windows, uppercase and lowercase letters are most often regarded as identical in Unix, they are always different. Windows uses CR+LF as line separators in text files Unix uses just LF. Conclusion Windows is the dominant OS today, so many programs exist only for Windows. Many exist for both systems, and some only for Unix. My opinion Windows is easier for computer novices Unix is better suited for programmers.
8 Is Unix alive today? Why has Unix been successful? Free versions have always been available. The source code of these versions has always been open. The basic concepts are very simple. Unix can run on quite small and simple computers. It is very easy to modify or extend it. The Internet was developed on Unix computers.
9 Does this concern you? Why you should learn about Unix? It is the second most used OS (since Mac OS X and Linux are Unix-es). It is perhaps the most common OS in computer science education and research. Some programs you need in your master project may only be available in Unix. Unix knowledge may be required in your future job.
10 Keep it simple! Structure of Unix kernel The basic structure of the Unix kernel is very simple: Kernel D D D Mouse Network card Graphics card
11 Keep it simple! The user processes all lie outside the kernel and communicate through system calls. P P P Kernel D D D Mouse Network card Graphics card
12 What is a process? Processes A Process is an essential concept in Unix. A process is an executing program (usually written in C but this is not required). Every user has at least one process and can create as many as s/he likes. Each process has a unique number called a PID. The user has complete control over his/her processes and can pause them or kill them at will. The processes communicate with the operating system using system calls.
13 A program is worth a thousand pictures Examples This little program asks the OS to know its PID: dag@padme Unix$ more pid.c #include <stdio.h> #include <sys/types.h> #include <unistd.h> int main () { printf("this process has PID=%d.\n", getpid()); return 0; } dag@padme Unix$./pid This process has PID=1764. dag@padme Unix$
14 A program is worth a thousand pictures One more The next program starts a child process (which is a clone of itself) using the fork call. The child asks (using the execl call) to be replaced by the date program. (This is the normal Unix way to start new processes.)
15 A program is worth a thousand pictures dag@padme Unix$ more run-date.c #include <stdio.h> #include <sys/types.h> #include <unistd.h> int main () { printf("this is the original process with PID=%d.\n", getpid()); if (fork()) { printf("this is still the original process with PID=%d.\n", getpid()); wait(); /* Wait until the child dies. */ } else { printf("this is the child process with PID=%d.\n", getpid()); execl("/local/gnu/bin/date", NULL); } return 0; } dag@padme Unix$./run-date This is the original process with PID=3250. This is the child process with PID=3251. This is still the original process with PID=3250. Sun Aug 22 13:38:29 CEST 2010 dag@padme Unix$
16 Is it Unix or not? The POSIX standard Unix is really defined by the system calls. Systems that adhere to the Portable Operating System Interface for Unix (POSIX), may be called Unix. There exist dozens of systems today that more or less follow POSIX. The best known is Linux.
17 A window or two is a good idea The window system The window system X is also a user process. It can communicate across the network: P P Xserver P P xeyes Kernel Kernel D D D D D D Mouse Network card Mouse Network card Graphics card Graphics card
18 At the outermost level... User interface And, outside the kernel and X, one can build a user interface, not unlike what is encountered in Windows; at Ifi, we use Gnome:
19 Various useful programs preview will display almost any file on the computer screen. Example: preview myfile print will print most kinds of files. Example: print -booklet -Pnimbus myfile windows will connect to a Windows server. Example: windows &
20 How do you store a file? File system overview In Unix, all files are placed in one file tree; the root is called /. / bin dev ifi local chmod sh null tty midgard utgard bin man a02 dag Kurs Privat www docs
21 Where is my file? File notation All files are accessible by going from the root: Unix$ ls /ifi/midgard/a02/dag/kurs/inf2100/uke-35 PS2.eps.bb eniac.eps nexta.rask uke-35-4x.pdf uke-35.pdf PS2.eps.gz mips.eps nexta.raskas uke-35.aux uke-35.snm PS2.png mips.jpg nexta.raskas~ uke-35.log uke-35.tex beregnere.eps nexta.list nexta.rask~ uke-35.nav uke-35.tex~ beregnere.jpg nexta.list~ system-3.eps uke-35.out uke-35.toc The command ls ( list files ) shows us which files we have got.
22 Where is my file? Always starting from the root is long and tedious. ~ goes directly to my personal file sub-tree. dag@padme Unix$ ls ~/Kurs/INF2100/Forelesninger/uke-35 PS2.eps.bb eniac.eps nexta.rask uke-35-4x.pdf uke-35.pdf PS2.eps.gz mips.eps nexta.raskas uke-35.aux uke-35.snm PS2.png mips.jpg nexta.raskas~ uke-35.log uke-35.tex beregnere.eps nexta.list nexta.rask~ uke-35.nav uke-35.tex~ beregnere.jpg nexta.list~ system-3.eps uke-35.out uke-35.toc
23 Where is my file? I can also access the files belonging to other users: ~name goes directly to name s personal file sub-tree; /hom/name does the same. dag@padme Unix$ ls ~dag2 Desktop RMAIL brev huskeliste mail workspace Ifi-mail RMAIL~ brev-anne inf1000.info pc secret Oblig2 WINDOWS brev~ inf2100 screen.eps.bb tmp dag@padme Unix$ ls /hom/dag2 Desktop RMAIL brev huskeliste mail workspace Ifi-mail RMAIL~ brev-anne inf1000.info pc secret Oblig2 WINDOWS brev~ inf2100 screen.eps.bb tmp
24 Where is my file? Whenever I give commands in a command window, I am positioned somewhere in the tree and can access files from there. pwd tells me where I am. cd moves me to somewhere else. Note that all folders contain these two files:. is the folder itself... is the parent folder. (Files whose name start with a. are not shown by ls, unless you use the -a option).
25 Where is my file? Unix$ pwd /hom/dag/ifi/master/unix Unix$ cd.. Master$ pwd /hom/dag/ifi/master Master$ ls P9.jpg kort.kurs~ lang.eps lang.mps welcome.aux P9c.jpg kort.log lang.kurs lang.mpx welcome.log Unix kort.mp lang.kurs~ new-master.text welcome.nav kort.eps kort.mps lang.log new-master.text~ welcome.out kort.kurs kort.mpx lang.mp welcome-handout.pdf welcome.pdf Master$ ls Unix #unix.tex# hjemme.mps kernel-3.mps kernel.5 run-date Gnome.eps hjemme.mpx kernel-4.eps kernel.log run-date.c Gnome.png hjemme.tre kernel-4.mps kernel.mp run-date.c Makefile hjemme.tre~ kernel-5.eps kernel.mpx standardbruker.eps Makefile~ kernel-1.eps kernel-5.mps kernel.mp~ standardbruker.jpg demo.tre kernel-1.mps kernel.1 mpxerr.tex unix.aux hjemme.eps kernel-2.eps kernel.2 pid unix.log hjemme.log kernel-2.mps kernel.3 pid.c unix.nav hjemme.mp kernel-3.eps kernel.4 pid.c~ unix.out
26 File protection Protection information The command ls tells us more if we give it the option -l: $ ls -l total 0 -rw dag 52 Jan 12 11:34 note -rw dag 52 Jan 12 11:46 note-anne -rw dag 0 Jan 12 11:13 note~ -rw-r--r-- 1 dag 0 Jan 12 11:13 inf1000.info In this example, only I can read note but everybody can read inf1000.info.
27 File protection To understand the file protection mechanism in Unix, you must know that Unix recognizes three different categories of users: user ( u ) is the file s owner, i.e., whoever created it. group ( g ) is the group associated with the file. other ( o ) is everybody else.
28 File protection There are three privileges for files: read ( r ) is the right to read the file. write ( w ) is the right to modify the file. execute ( x ) is the right to execute the file, i.e., to use it as a program.
29 File protection The privileges are given in groups of 3 3 letters: u g o {}}{ {}}{ {}}{ rwx r-x r-- A letter means that the user has the specified priviledge; a - shows that s/he has not.
30 File protection If I want to let everybody read note but keep inf1000.info secret, I should write $ chmod go+r note $ chmod go-r inf1000.info The protection is now: $ ls -l total 0 -rw-r--r-- 1 dag 52 Jan 12 11:34 note -rw dag 52 Jan 12 11:46 note-anne -rw dag 0 Jan 12 11:13 note~ -rw dag 0 Jan 12 11:13 inf1000.info
31 File protection Folder protection This protection mechanism is quite similar to the one for ordinary files, but there are differences: r gives the right to see the names of the files in the folder. w gives the right to create and delete files in the folder. x gives the right to access the files in the folder. Note! To access a file, a user must have access (i.e., x-priviledge) to every folder on the way down (as well as r for the file itself).
32 How do we do it at Ifi Unix at Ifi Ifi has decided to support both Unix and Windows, 1 with particular emphasis on cross-platform cooperation. User name and password is the same. The user files are available on both systems: Unix All files are directly available; ~/pc/ contains specific Windows files like Desktop and MyDocuments. Windows User files are available in M: (with an icon on the desktop). 1 Mac support is small but growing.
33 How do we do it at Ifi On any Unix computer at Ifi, the windows command will open a window running on a Windows server. On any Windows computer, the Linux icon will start a remote desktop connection to a Linux server.
34 Even from your own home Working from home If you have a broadband connection, you can access Ifi s computers from home: Using ssh (f ex Putty from the Ifi start package; see you can connect to login.ifi.uio.no. Using sftp (f ex WinSCP from the Ifi start package), you can transfer files back and forth. Note This will not give access to X facilities!
35 Or, you can try this: An alternative way From any modern Windows computer, you can start Start All Programs Accessories Remote desktop connection and connect to windows.ifi.uio.no. From this Windows server, you may connect to a Linux server. From a Mac, XQuartz will connect you. Note These will give you X facilities.
36 Where can I get help? Learning to use Unix There is a lot of information available: There are hundreds of books about different aspects of Unix; for free books, see The Ifi laptop help can help you get your portable computer to work properly. See web page IT-tjenester (in Norwegian) in Web page IT services (in English) in All Unix commands are documented; try man print.
37 Where can I get help? Assistance If you need help with a Unix (or Windows) problem, you can ask your supervisor send an til ifidrift@ifi.uio.no visit the IT support group (4th floor of the Ole-Johan Dahl building)
38 Perhaps I can help you? Any questions?
Linux command line. An introduction to the Linux command line for genomics. Susan Fairley
Linux command line An introduction to the Linux command line for genomics Susan Fairley Aims Introduce the command line Provide an awareness of basic functionality Illustrate with some examples Provide
More informationLinux Overview. Local facilities. Linux commands. The vi (gvim) editor
Linux Overview Local facilities Linux commands The vi (gvim) editor MobiLan This system consists of a number of laptop computers (Windows) connected to a wireless Local Area Network. You need to be careful
More informationsftp - secure file transfer program - how to transfer files to and from nrs-labs
last modified: 2014-01-29 p. 1 CS 111 - useful details The purpose of this handout is to summarize several details you will need for this course: 1. sftp - how to transfer files to and from nrs-labs 2.
More informationTutorial Guide to the IS Unix Service
Tutorial Guide to the IS Unix Service The aim of this guide is to help people to start using the facilities available on the Unix and Linux servers managed by Information Services. It refers in particular
More informationOPERATING SYSTEM SERVICES
OPERATING SYSTEM SERVICES USER INTERFACE Command line interface(cli):uses text commands and a method for entering them Batch interface(bi):commands and directives to control those commands are entered
More informationLinux Labs: mini survival guide
Enrique Soriano, Gorka Guardiola Laboratorio de Sistemas, Grupo de Sistemas y Comunicaciones, URJC 29 de septiembre de 2011 (cc) 2010 Grupo de Sistemas y Comunicaciones. Some rights reserved. This work
More informationLab 1 Beginning C Program
Lab 1 Beginning C Program Overview This lab covers the basics of compiling a basic C application program from a command line. Basic functions including printf() and scanf() are used. Simple command line
More informationRemote Access to Unix Machines
Remote Access to Unix Machines Alvin R. Lebeck Department of Computer Science Department of Electrical and Computer Engineering Duke University Overview We are using OIT Linux machines for some homework
More informationUniversity of Toronto
1 University of Toronto APS 105 Computer Fundamentals A Tutorial about UNIX Basics Fall 2011 I. INTRODUCTION This document serves as your introduction to the computers we will be using in this course.
More informationComputer Systems II. Unix system calls. fork( ) wait( ) exit( ) How To Create New Processes? Creating and Executing Processes
Computer Systems II Creating and Executing Processes 1 Unix system calls fork( ) wait( ) exit( ) 2 How To Create New Processes? Underlying mechanism - A process runs fork to create a child process - Parent
More informationINASP: Effective Network Management Workshops
INASP: Effective Network Management Workshops Linux Familiarization and Commands (Exercises) Based on the materials developed by NSRC for AfNOG 2013, and reused with thanks. Adapted for the INASP Network
More information1 Basic commands. 2 Terminology. CS61B, Fall 2009 Simple UNIX Commands P. N. Hilfinger
CS61B, Fall 2009 Simple UNIX Commands P. N. Hilfinger 1 Basic commands This section describes a list of commonly used commands that are available on the EECS UNIX systems. Most commands are executed by
More informationCS 103 Lab Linux and Virtual Machines
1 Introduction In this lab you will login to your Linux VM and write your first C/C++ program, compile it, and then execute it. 2 What you will learn In this lab you will learn the basic commands and navigation
More informationTutorial 0A Programming on the command line
Tutorial 0A Programming on the command line Operating systems User Software Program 1 Program 2 Program n Operating System Hardware CPU Memory Disk Screen Keyboard Mouse 2 Operating systems Microsoft Apple
More informationSecure Shell. The Protocol
Usually referred to as ssh The name is used for both the program and the protocol ssh is an extremely versatile network program data encryption and compression terminal access to remote host file transfer
More informationPuTTY/Cygwin Tutorial. By Ben Meister Written for CS 23, Winter 2007
PuTTY/Cygwin Tutorial By Ben Meister Written for CS 23, Winter 2007 This tutorial will show you how to set up and use PuTTY to connect to CS Department computers using SSH, and how to install and use the
More informationIntroduction to UNIX and SFTP
Introduction to UNIX and SFTP Introduction to UNIX 1. What is it? 2. Philosophy and issues 3. Using UNIX 4. Files & folder structure 1. What is UNIX? UNIX is an Operating System (OS) All computers require
More informationSSH Connections MACs the MAC XTerm application can be used to create an ssh connection, no utility is needed.
Overview of MSU Compute Servers The DECS Linux based compute servers are well suited for programs that are too slow to run on typical desktop computers but do not require the power of supercomputers. The
More informationTEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 3.4, Last Edited 9/10/2011 Students Name: Date of Experiment: Read the following guidelines before working in
More informationCisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)
Cisco Networking Academy Program Curriculum Scope & Sequence Fundamentals of UNIX version 2.0 (July, 2002) Course Description: Fundamentals of UNIX teaches you how to use the UNIX operating system and
More informationMobaXTerm: A good gnome-terminal like tabbed SSH client for Windows / Windows Putty Tabs Alternative
MobaXTerm: A good gnome-terminal like tabbed SSH client for Windows / Windows Putty Tabs Alternative Author : admin Last 10+ years I worked on GNU / Linux as Desktop. Last 7 years most of my SSH connections
More informationVCL Access. VCL provides access to Linux and Windows 7 Virtual Machines. Users will only see those images that they are authorized to access.
What is VCL? VCL (Virtual Computer Lab) is a service running on servers in IIT s datacenter that enables users to schedule and connect to virtual desktops running specific academic software applications
More informationIntroduction to Unix Tutorial
Topics covered in this Tutorial Introduction to Unix Tutorial 1. CSIF Computer Network 2. Local Logging in. 3. Remote computer access: ssh 4. Navigating the UNIX file structure: cd, ls, and pwd 5. Making
More informationRecommended File System Ownership and Privileges
FOR MAGENTO COMMUNITY EDITION Whenever a patch is released to fix an issue in the code, a notice is sent directly to your Admin Inbox. If the update is security related, the incoming message is colorcoded
More informationUnix Guide. Logo Reproduction. School of Computing & Information Systems. Colours red and black on white backgroun
Logo Reproduction Colours red and black on white backgroun School of Computing & Information Systems Unix Guide Mono positive black on white background 2013 Mono negative white only out of any colou 2
More informationEditing Locally and Using SFTP: the FileZilla-Sublime-Terminal Flow
Editing Locally and Using SFTP: the FileZilla-Sublime-Terminal Flow Matthew Salim, 20 May 2016 This guide focuses on effective and efficient offline editing on Sublime Text. The key is to use SFTP for
More informationUOG User Guide. Windows
UOG User Guide 21 st Century Lab - How to access your Linux Virtual Machine Windows Staff and Students are required to connect to SIT-WLAN network, follow Wireless Network Setup Guide for SIT Students
More informationCloud Server powered by Mac OS X. Getting Started Guide. Cloud Server. powered by Mac OS X. AKJZNAzsqknsxxkjnsjx Getting Started Guide Page 1
Getting Started Guide Cloud Server powered by Mac OS X Getting Started Guide Page 1 Getting Started Guide: Cloud Server powered by Mac OS X Version 1.0 (02.16.10) Copyright 2010 GoDaddy.com Software, Inc.
More informationGetting the most out of your new Aalto workstation An Aalto IT guide for personnel migrating to the new Aalto workstation environment
Getting the most out of your new Aalto workstation An Aalto IT guide for personnel migrating to the new Aalto workstation environment What services do I use with the old TKK password, and what do I use
More informationCS10110 Introduction to personal computer equipment
CS10110 Introduction to personal computer equipment PRACTICAL 4 : Process, Task and Application Management In this practical you will: Use Unix shell commands to find out about the processes the operating
More informationCPSC 226 Lab Nine Fall 2015
CPSC 226 Lab Nine Fall 2015 Directions. Our overall lab goal is to learn how to use BBB/Debian as a typical Linux/ARM embedded environment, program in a traditional Linux C programming environment, and
More informationInstalling IBM Websphere Application Server 7 and 8 on OS4 Enterprise Linux
Installing IBM Websphere Application Server 7 and 8 on OS4 Enterprise Linux By the OS4 Documentation Team Prepared by Roberto J Dohnert Copyright 2013, PC/OpenSystems LLC This whitepaper describes how
More informationLSN 10 Linux Overview
LSN 10 Linux Overview ECT362 Operating Systems Department of Engineering Technology LSN 10 Linux Overview Linux Contemporary open source implementation of UNIX available for free on the Internet Introduced
More informationCS 2112 Lab: Version Control
29 September 1 October, 2014 Version Control What is Version Control? You re emailing your project back and forth with your partner. An hour before the deadline, you and your partner both find different
More informationFile Transfer Protocol. What is Anonymous FTP? What is FTP?
File Transfer Protocol (FTP) File Transfer Protocol Sometimes browsing for information is not sufficient you may want to obtain copies of software programs or data files for your own use and manipulation.
More informationVersion control. with git and GitHub. Karl Broman. Biostatistics & Medical Informatics, UW Madison
Version control with git and GitHub Karl Broman Biostatistics & Medical Informatics, UW Madison kbroman.org github.com/kbroman @kwbroman Course web: kbroman.org/tools4rr Slides prepared with Sam Younkin
More informationWinSCP PuTTY as an alternative to F-Secure July 11, 2006
WinSCP PuTTY as an alternative to F-Secure July 11, 2006 Brief Summary of this Document F-Secure SSH Client 5.4 Build 34 is currently the Berkeley Lab s standard SSH client. It consists of three integrated
More informationCS197U: A Hands on Introduction to Unix
CS197U: A Hands on Introduction to Unix Lecture 4: My First Linux System J.D. DeVaughn-Brown University of Massachusetts Amherst Department of Computer Science jddevaughn@cs.umass.edu 1 Reminders After
More informationChapter 8 Objectives. Chapter 8 Operating Systems and Utility Programs. Operating Systems. Operating Systems. Operating Systems.
Chapter 8 Objectives Chapter 8 s and Utility Programs Describe the two types of software Understand the startup process for a personal computer Describe the term user interface Explain features common
More informationHow To Run Linux On Windows 7 (For A Non-Privileged User) On A Windows 7 Computer (For Non-Patty) On Your Computer (Windows) On An Unix Computer (Unix) On Windows) On The Same
Working from Home Tools and Technologies for Improving Your Programming Environment Daniel J. Hood danielhood@umbc.edu Overview Tools for MS Windows (and others OSs) SSH SCP X Windows Tunneling X Connections
More informationCommand Line - Part 1
Command Line - Part 1 STAT 133 Gaston Sanchez Department of Statistics, UC Berkeley gastonsanchez.com github.com/gastonstat Course web: gastonsanchez.com/teaching/stat133 GUIs 2 Graphical User Interfaces
More informationIntroduction to the UNIX Operating System and Open Windows Desktop Environment
Introduction to the UNIX Operating System and Open Windows Desktop Environment Welcome to the Unix world! And welcome to the Unity300. As you may have already noticed, there are three Sun Microsystems
More informationRECOVER ( 8 ) Maintenance Procedures RECOVER ( 8 )
NAME recover browse and recover NetWorker files SYNOPSIS recover [-f] [-n] [-q] [-u] [-i {nnyyrr}] [-d destination] [-c client] [-t date] [-sserver] [dir] recover [-f] [-n] [-u] [-q] [-i {nnyyrr}] [-I
More informationCONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities
CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities DNS name: turing.cs.montclair.edu -This server is the Departmental Server
More informationSetting up Radmind For an OSX Public Lab
Setting up Radmind For an OSX Public Lab Radmind consists of a set of about ten Unix Commands installed on both the client and server machines. A GUI application, called Radmind Assistant, provides a simplified
More informationAfter studying this lesson, you will have a clear understanding of, what an Operating System is. functions of an Operating System
After studying this lesson, you will have a clear understanding of, what an Operating System is functions of an Operating System User Interfaces how to use Windows Operating System 5.1 Introduction As
More informationC2110 UNIX and programming
C2110 UNIX and programming 3 rd Lesson Petr Kulhánek, Jakub Štěpán kulhanek@chemi.muni.cz National Centre for Biomolecular Research, Faculty of Science Masaryk University, Kotlářská 2, CZ-61137 Brno CZ.1.07/2.2.00/15.0233
More informationFile Management Where did it go? Teachers College Summer Workshop
File Management Where did it go? Teachers College Summer Workshop Barbara Wills University Computing Services Summer 2003 To Think About The Beginning of Wisdom is to Call Things by the Right Names --
More informationUNIX Basics. Ian Darwin TCP Informatics January, 2005. Presented from a Mac using Apple s Keynote presentation software
UNIX Basics Ian Darwin TCP Informatics January, 2005 Presented from a Mac using Apple s Keynote presentation software 1 What is this about? Brief Introduction to UNIX - ideas - basic commands - some examples
More informationSSH and Basic Commands
SSH and Basic Commands In this tutorial we'll introduce you to SSH - a tool that allows you to send remote commands to your Web server - and show you some simple UNIX commands to help you manage your website.
More informationXFTP 5 User Guide. The Powerful SFTP/FTP File Transfer Program. NetSarang Computer Inc.
XFTP 5 User Guide The Powerful SFTP/FTP File Transfer Program NetSarang Computer Inc. Copyright 2015 NetSarang Computer, Inc. All rights reserved. Xftp Manual This software and various documents have been
More informationKernel. What is an Operating System? Systems Software and Application Software. The core of an OS is called kernel, which. Module 9: Operating Systems
Module 9: Operating Systems Objective What is an operating system (OS)? OS kernel, and basic functions OS Examples: MS-DOS, MS Windows, Mac OS Unix/Linux Features of modern OS Graphical operating system
More informationShellshock Security Patch for X86
Shellshock Security Patch for X86 Guide for Using the FFPS Update Manager October 2014 Version 1.0. Page 1 Page 2 This page is intentionally blank Table of Contents 1.0 OVERVIEW - SHELLSHOCK/BASH SHELL
More informationLab 1: Introduction to the network lab
CSCI 312 - DATA COMMUNICATIONS AND NETWORKS FALL, 2014 Lab 1: Introduction to the network lab NOTE: Be sure to bring a flash drive to the lab; you will need it to save your data. For this and future labs,
More informationCS420: Operating Systems OS Services & System Calls
NK YORK COLLEGE OF PENNSYLVANIA HG OK 2 YORK COLLEGE OF PENNSYLVAN OS Services & System Calls James Moscola Department of Physical Sciences York College of Pennsylvania Based on Operating System Concepts,
More informationAn Introduction to Using the Command Line Interface (CLI) to Work with Files and Directories
An Introduction to Using the Command Line Interface (CLI) to Work with Files and Directories Mac OS by bertram lyons senior consultant avpreserve AVPreserve Media Archiving & Data Management Consultants
More informationOperating System Software
Operating System Software Lecture 7 The operating system Defines our computing experience. First software we see when we turn on the computer, and the last software we see when the computer is turned off.
More informationGetting Started Guide for FTP
Edition 1.0 Getting Started Guide for FTP What is FTP? FTP (File Transfer Protocol) is a standard procedure for moving files between two computers over the internet. FTP is commonly used to upload/download
More informationAlthough Mac OS X is primarily known for its GUI, the under pinnings are all Unix. This
BE Computing Web Tutorials: Server Commands Server Commands Indluded: 1. Basic Command Line Tutorial Although Mac OS X is primarily known for its GUI, the underpinnings are all Unix. This tutorial will
More information15 AFS File Sharing. Client/Server Computing. Distributed File Systems
15 AFS File Sharing Adapted from the Open AFS Guide, http://openafs.org/doc/ AFS makes it easy for people to work together on the same files, no matter where the files are located. AFS users do not have
More informationThere s a variety of software that can be used, but the approach described here uses freely available Cygwin software: (1) Cygwin/X (2) Cygwin/openssh
To do this you need two pieces of software: (1) An X server running on your PC, and (2) A secure shell for making a network connection to a UNIX host. There s a variety of software that can be used, but
More informationSUNY New Paltz Terminal Services Guidebook
SUNY New Paltz Terminal Services Guidebook Robert Trahan Last Revision 08/12/09 Contents Introduction...2 What's Included...2 How To Connect...3 Windows XP and Vista...3 Mac OS...3 Linux...4 How to use
More informationRaspberry Pi Setup Tutorial
Raspberry Pi Setup Tutorial The Raspberry Pi is basically a miniature linux- based computer. It has an ARM processor on it, specifically the ARM1176JZF- S 700 MHz processor. This is the main reason why
More informationThe System Monitor Handbook. Chris Schlaeger John Tapsell Chris Schlaeger Tobias Koenig
Chris Schlaeger John Tapsell Chris Schlaeger Tobias Koenig 2 Contents 1 Introduction 6 2 Using System Monitor 7 2.1 Getting started........................................ 7 2.2 Process Table.........................................
More information2 Advanced Session... Properties 3 Session profile... wizard. 5 Application... preferences. 3 ASCII / Binary... Transfer
Contents I Table of Contents Foreword 0 Part I SecEx Overview 3 1 What is SecEx...? 3 2 Quick start... 4 Part II Configuring SecEx 5 1 Session Profiles... 5 2 Advanced Session... Properties 6 3 Session
More information10 steps to better secure your Mac laptop from physical data theft
10 steps to better secure your Mac laptop from physical data theft Executive summary: This paper describes changes Mac users can make to improve the physical security of their laptops, discussing the context
More informationNew Lab Intro to KDE Terminal Konsole
New Lab Intro to KDE Terminal Konsole After completing this lab activity the student will be able to; Access the KDE Terminal Konsole and enter basic commands. Enter commands using a typical command line
More informationChapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014
Chapter Contents Operating Systems and File Management Section A: Operating System Basics Section B: Today s Operating Systems Section C: File Basics Section D: File Management Section E: Backup Security
More informationHP-UX Essentials and Shell Programming Course Summary
Contact Us: (616) 875-4060 HP-UX Essentials and Shell Programming Course Summary Length: 5 Days Prerequisite: Basic computer skills Recommendation Statement: Student should be able to use a computer monitor,
More informationIntroduction to Macromedia Dreamweaver MX
Introduction to Macromedia Dreamweaver MX Macromedia Dreamweaver MX is a comprehensive tool for developing and maintaining web pages. This document will take you through the basics of starting Dreamweaver
More informationOperating Systems. Notice that, before you can run programs that you write in JavaScript, you need to jump through a few hoops first
Operating Systems Notice that, before you can run programs that you write in JavaScript, you need to jump through a few hoops first JavaScript interpreter Web browser menu / icon / dock??? login??? CPU,
More informationConnecting to the School of Computing Servers and Transferring Files
Connecting to the School of Computing Servers and Transferring Files Connecting This document will provide instructions on how to connect to the School of Computing s server. Connect Using a Mac or Linux
More informationCSIL MiniCourses. Introduction To Unix (I) John Lekberg Sean Hogan Cannon Matthews Graham Smith. Updated on: 2015-10-14
CSIL MiniCourses Introduction To Unix (I) John Lekberg Sean Hogan Cannon Matthews Graham Smith Updated on: 2015-10-14 What s a Unix? 2 Now what? 2 Your Home Directory and Other Things 2 Making a New Directory
More informationWeek Overview. Running Live Linux Sending email from command line scp and sftp utilities
ULI101 Week 06a Week Overview Running Live Linux Sending email from command line scp and sftp utilities Live Linux Most major Linux distributions offer a Live version, which allows users to run the OS
More informationQUIT MACSCHOOL AND DRAG YOUR SERVER ICONS TO THE TRASH OR HIT THE DISCONNECT BUTTON BESIDE THE SERVER ICON IN THE TOP SIDEBAR
Macintosh Operating System OSX 10.3.x STARTING YOUR COMPUTER Logging in Whenever you start your computer, you will need to enter your computer password at the log in screen. When the log in screen appears,
More informationMATLAB on EC2 Instructions Guide
MATLAB on EC2 Instructions Guide Contents Welcome to MATLAB on EC2...3 What You Need to Do...3 Requirements...3 1. MathWorks Account...4 1.1. Create a MathWorks Account...4 1.2. Associate License...4 2.
More informationINSTALLING AN SSH / X-WINDOW ENVIRONMENT ON A WINDOWS PC. Nicholas Fitzkee Mississippi State University
INSTALLING AN SSH / X-WINDOW ENVIRONMENT ON A WINDOWS PC Installing Secure Shell (SSH) Client Nicholas Fitzkee Mississippi State University The first thing you will need is SSH. SSH is a program for accessing
More informationA Crash Course on UNIX
A Crash Course on UNIX UNIX is an "operating system". Interface between user and data stored on computer. A Windows-style interface is not required. Many flavors of UNIX (and windows interfaces). Solaris,
More informationCSE331: Introduction to Networks and Security. Lecture 34 Fall 2006
CSE331: Introduction to Networks and Security Lecture 34 Fall 2006 Announcements Problem with Crypto.java Look for a new Crypto.java file later today Project 4 is due Dec. 8th at midnight. Homework 3 is
More informationMac OS X. A Brief Introduction for New Radiance Users. Andrew McNeil & Giulio Antonutto
Mac OS X A Brief Introduction for New Radiance Users Andrew McNeil & Giulio Antonutto Mac OS X 2 Graphical interface 2 Window buttons 2 The Dock 2 The menu 3 Keys combinations 3 File Locations 4 root level
More informationUnit 10 : An Introduction to Linux OS
Unit 10 : An Introduction to Linux OS Linux is a true 32/64-bit operating system that run on different platforms. It is a multi-user, multi-tasking and time sharing operating system. Linux is a very stable
More informationUser's Manual. Intego Remote Management Console User's Manual Page 1
User's Manual Intego Remote Management Console User's Manual Page 1 Intego Remote Management Console for Macintosh 2007 Intego, Inc. All Rights Reserved Intego, Inc. www.intego.com This manual was written
More informationOriginal brief explanation
Original brief explanation I installed the Shoutcast server onto a desktop and made some minor configuration changes, such as setting the passwords and the maximum number of listeners. This was quite easy
More informationReflection X Advantage Help. Date
Reflection X Advantage Help Date Copyrights and Notices Attachmate Reflection 2015 Copyright 2015 Attachmate Corporation. All rights reserved. No part of the documentation materials accompanying this Attachmate
More informationUsing Virtual Machines
Using Virtual Machines We will use VMs in CIT 130 so that you can access both a Windows 7 and a Linux machine. You will be able to access these from on and off campus (off campus access will require that
More informationComputing Service G72. File Transfer Using SCP, SFTP or FTP. many leaflets can be found at: http://www.cam.ac.uk/cs/docs
Computing Service G72 File Transfer Using SCP, SFTP or FTP many leaflets can be found at: http://www.cam.ac.uk/cs/docs 50 pence April 2003 Contents Introduction Servers and clients... 2 Comparison of FTP,
More informationIntroduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
More informationUsing Network Attached Storage with Linux. by Andy Pepperdine
Using Network Attached Storage with Linux by Andy Pepperdine I acquired a WD My Cloud device to act as a demonstration, and decide whether to use it myself later. This paper is my experience of how to
More informationRunning your first Linux Program
Running your first Linux Program This document describes how edit, compile, link, and run your first linux program using: - Gnome a nice graphical user interface desktop that runs on top of X- Windows
More informationRETRIEVING NMR DATA JB Stothers NMR Facility Materials Science Addition 0216 Department of Chemistry Western University
JB Stothers NMR Facility Materials Science Addition 0216 Department of Chemistry Western University 1 1. INTRODUCTION 1.1. About these Notes and Related Notes These notes describe how to retrieve NMR data
More informationSetting Up Dreamweaver for FTP and Site Management
518 442-3608 Setting Up Dreamweaver for FTP and Site Management This document explains how to set up Dreamweaver CS5.5 so that you can transfer your files to a hosting server. The information is applicable
More informationOverview. Remote access and file transfer. SSH clients by platform. Logging in remotely
Remote access and file transfer Overview Remote logins to Bio-Linux with ssh Running software from another machine Logging in from another machine Getting files on and off Bio-Linux Transferring files
More informationARP and DNS. ARP entries are cached by network devices to save time, these cached entries make up a table
ARP and DNS Both protocols do conversions of a sort, but the distinct difference is ARP is needed for packet transfers and DNS is not needed but makes things much easier. ARP Address Resolution Protocol
More informationNew User Orientation. Welcome to Brown CS! Fall 2015 Consultants
New User Orientation Welcome to Brown CS! Fall 2015 Consultants Getting started Consultant Introduction What's my name? Why am I here? Where can you find me? Let's make some accounts! New User Orientation
More informationLab Exercise Part II: Git: A distributed version control system
Lunds tekniska högskola Datavetenskap, Nov 25, 2013 EDA260 Programvaruutveckling i grupp projekt Labb 2 (part II: Git): Labbhandledning Checked on Git versions: 1.8.1.2 Lab Exercise Part II: Git: A distributed
More informationHow to Tunnel Remote Desktop using SSH (Cygwin) for Windows XP (SP2)
How to Tunnel Remote Desktop using SSH (Cygwin) for Windows XP (SP2) The ssh server is an emulation of the UNIX environment and OpenSSH for Windows, by Redhat, called cygwin This manual covers: Installation
More informationHow Do I Recover infiniti Remotes and Line Cards?
How Do I Recover infiniti Remotes and Line Cards? Date: June 26, 2008 Overview This FAQ contains the following information and procedures pertaining to ids Release 6.0.1 and later: Before Attempting to
More informationIntroductory Note 711 & 811. Remote Access to Computer Science Linux Files Using Secure Shell Protocols
Cardiff University Cardiff School of Computer Science Prifysgol Caerdydd Ysgol Cyfrifiadureg Caerdydd Introductory Note 711 & 811 Remote Access to Computer Science Linux Files Using Secure Shell Protocols
More informationUnderstanding and Using NetInfo. Includes information on setting up Mac OS X Server and NetInfo to increase the power of your Mac OS X network
Understanding and Using NetInfo Includes information on setting up Mac OS X Server and NetInfo to increase the power of your Mac OS X network K Apple Computer, Inc. 2001 Apple Computer, Inc. All rights
More informationUsing Keil software with Linux via VirtualBox
Using Keil software with Linux via VirtualBox Introduction The Keil UVision software used to develop programs for ARM based microprocessor systems is designed to run on Microsoft Windows operating systems.
More information