CPSC 2800 Linux Hands-on Lab #7 on Linux Utilities. Project 7-1
|
|
|
- Hollie Davidson
- 10 years ago
- Views:
Transcription
1 CPSC 2800 Linux Hands-on Lab #7 on Linux Utilities Project 7-1 In this project you use the df command to determine usage of the file systems on your hard drive. Log into user account for this and the following projects. To use the df command to check file system usage: 1. Log in as root by typing su, and type password Or type sudo df and then type password , and press Enter. Record your output: 3. You can specify a file system as an argument. The statistics for that file system alone appear on the screen. Type df /dev/sda1 (or another partitioned disk appropriate to your system), and press Enter. You see the disk statistics for that volume only. Record your observation: 4. The h option causes the numbers to print in human-readable form. Instead of displaying raw numbers for size, amount of disk space used, and amount of space available, the statistics are printed in kilobyte, megabyte, or gigabyte format. Type df h and then press Enter. Record your observation: 5. If you want to log in to user account again, type login user, and type password Type clear and press Enter to clear the screen. Project 7-2 When you want to see directory, subdirectory, and file size information, use the du command. In this project you use the du command to learn about your disk use. To report on disk use: 1. To receive a report on disk usage starting at your home directory, type du more, and then press Enter. Record your output: 2. The output shows the number of blocks used in each subdirectory. Type q to exit the more command. 3. To view a similar report on disk usage by the number of bytes instead of by 512-byte blocks, start at your home directory, type du b more, and then press Enter. 4. Type q to exit the more command. 5. Like the df command, the du command supports the h option to display statistics in humanreadable format. Type du h more and then press Enter. 6. Type clear and press Enter. Project 7-3 In this project, you use the find command to search for and delete all occurrences of a.out and core. The steps that follow assume you have a source directory in your home directory. The test files, a.out and 1
2 core, are quickly created using the touch command, which, when followed by the file names, creates empty files. The tilde (~) ensures that these files go into your home and source directories. You should already have a source directory for this project. If not, create a source directory under your home directory before you start. To remove garbage files: 1. Create some garbage files, core and a.out, and place them in your home directory and in the source subdirectory under your home directory. First type touch ~/core; touch ~/a.out and press Enter to create the files in your home directory. Next type touch ~/source/core; touch ~/source/a.out and press Enter. 2. Verify that you are in your home directory, type find. "(" -name a.out -o -name core ")" and then press Enter. You should see a listing of the four files you created in step 1, the core and a.out files in the home directory and in the source directory under the home directory. 3. Remove the garbage files by typing find. "(" -name a.out -o -name core ")" -exec rm {} \; and then pressing Enter. 4. Check that the files have been removed by repeating the find command you entered in step 2. If the files have been removed, there is no output. Screen shot your work: Project 7-4 Sometimes, your system might respond slowly or seem to have delays. In these conditions, it is useful to employ the top command to monitor CPU use by processes and other system information, as you learn in this project. To use the top utility: 1. Display the CPU activity by typing top and then pressing Enter. Record your screen: 2. The processes are shown in the order of the amount of CPU time they use. After looking at the display for a short time, press q to exit from the top utility. 3. Run the top utility again. Notice that the far-left column of information, labeled PID. This column lists the process id of each process shown. Record PID of top command: 4. Press k to initiate the kill command. The top utility asks to enter the PID to kill. Enter the PID of the top command. Press Enter to kill the process (You might have to press Enter a second time to return to a command prompt.) Type clear and press Enter to clear the lines from the screen. The top utility is no longer running. 5. Run the top utility in secure mode by typing top -s and press Enter. 6. Press k to initiate kill command. Because top is running in secure mode, it displays the message can t kill in secure mode. Record your screen: 7. Press q to exit the top utility. 8. Type clear and press Enter to clear the lines from the screen. 2
3 Project 7-5 Plan to periodically monitor memory use in your computer, particularly if the computer seems to run slowly when you use specific programs. In this project, you use the free command to monitor memory. To use the free command: 1. Type free and press Enter. The command displays the amount of total, used, and free memory. It also displays the amount of shared memory, buffer memory, and cached memory. In addition, the amount of total, used, and free swap memory is shown. By default, all amounts are shown in kilobytes. 2. Type free m and press Enter to see the free command s output in megabytes. 3. Type free t and press Enter to see memory use totals: Project 7-6 There are times when you might want to send the results of the top and free utilities to a computer support person for help. In this project, you save the results from these utilities to different files and then print the files. To save and print the displays generated by the top and free utilities: 1. Redirect the output of the top utility to a file in your current directory by typing top > topdata and then press Enter. 2. Wait about 10 seconds, and then press q to exit the top utility. Type more topdata and press Enter to confirm you have written the information to the topdata file. Type q to exit the more display of the file contents. 3. Redirect the output of the free utility to a file in your current directory by typing free > freedata and then pressing Enter. Type more freedata and press Enter to verify the contents of the freedata file. Record your output: 4. Type clear and press Enter to clear the screen. Project 7-7 In Linux/Unix, you can run programs in the background. In this project, you practice running the top program in the background. To run a program in the background: 1. Experiment with running a program in the background by running the top program in the background. Type top& and press Enter. After you enter the command, the system reports the process id or PID (id that identifies the process) used by the program that you started in the background. Write down our PID: 3
4 The top utility is running, but because it runs in the background, you see no other output. 2. Continue to run the top utility in the background. Project 7-8 In this project, you learn how to use the ps command to view processes on your system. To use ps command: 1. Type ps and press Enter. The output of the ps command includes this information about each process you are running: PID Name of the station where the process started Amount of time the process has been running Name of the process Notice that top utility might still be running in the background, or you might see a message at the end of the ps display that top has stopped running. 2. To see a list of all processes running on the system, type ps a more, and press Enter. 3. Press the spacebar until the command finishes its output. 4. Notice that with the command options you ve used so far, it is difficult to tell the status of a process, such as whether or not it has finished. Type ps l (that is, a lower-case of letter l and not a one), and press Enter to see the long display. The WCHAN column shows the status of a process, such as finish. 5. Now consider that you want to know who is running a particular process, by user name. Type ps a u more and press Enter. Record your screen: Press the spacebar to scroll through the listing. Notice that many processes are being run by root as well as by your account. Project 7-9 Sometimes, you need to stop a process, such as one running in the background or one that you no longer want to use. In this project, you use the kill command to stop a process. To stop a process using the kill command: 1. In this step, you terminate the top utility that you started before and that might still be running in the background. (If you received a message that it stopped, continue anyway for practice.) Type ps and press Enter. Look at the list of processes to find the top utility s PID. 2. Type one of these commands (both perform the same operation): kill <process id> and press Enter, or kill %top and press Enter. 3. Type ps l and press Enter to see a list of the processes and to check the status of the top process. Record your output: 4
5 Project 7-10 In you often work with plain-text documents, it is helpful to know about the ispell command for spell checking. You practice using ispell in this project. To use ispell: 1. Use the vi or other editor create a file called document1. 2. Enter the following text, with misspellings: This is a document that describes our newest and fastest machinnery. Take the time to lern how to use each piece of equipment. 3. Save the file and exit the editor. 4. (Type sudo apt-get install ispell and password to install ispell if you do not have it. ) 5. Scan the file for spelling errors by typing ispell document1 and then press Enter. 6. To correct the word machinnery, look at the options at the bottom of the screen, and find the one that says machinery. Type the number of that option to correct the misspelling, or you can select the r (Replace) option, retype the word after the With: Prompt, and press Enter. Notice that the word is then corrected in the text. 7. Do the same for lern. 8. The program exists and returns you to the command line. Type cat documnet1 and press Enter. The misspelled words have been corrected. Record your screen: Project 7-11 In this project, you create two files and use the cmp command to compare the differences. To compare two files with the cmp command: 1. Use the vi or other editor to create the file file1, containing this text: This is file 1. It is a practice file. It belongs to me. 2. Save the file and exit the editor. 3. Use the editor to crate the file file2, containing the text: This is file 2. It is a practice file. It belongs to you. 4. Save the file and exit the editor. 5. At the command line, type cmp file1 file2, and press Enter. Your screen looks like: 6. This results means that the two files differ, with the first point of differences at the 14 th character in both files. 7. Type clear and press Enter to clear the screen. 5
6 Include your experiences and answers to all the underlying parts in your report. Include the following at the beginning of your report. Name: UTC ID: Course Number and Name: Semester: Lab Name and Number: I spent hours and minutes to finish this hands-on lab. I have (percent) finish this lab. I expect (A, B, C, or F) of this lab. This lab helps me to master Linux utilities and commands. Choose a number to indicate how much the lab is helpful (less helpful) (more helpful) 6
CPSC2800: Linux Hands-on Lab #3 Explore Linux file system and file security. Project 3-1
CPSC2800: Linux Hands-on Lab #3 Explore Linux file system and file security Project 3-1 Linux support many different file systems that can be mounted using the mount command. In this project, you use the
USEFUL UNIX COMMANDS
cancel cat file USEFUL UNIX COMMANDS cancel print requested with lp Display the file cat file1 file2 > files Combine file1 and file2 into files cat file1 >> file2 chgrp [options] newgroup files Append
USB 2.0 Flash Drive User Manual
USB 2.0 Flash Drive User Manual 1 INDEX Table of Contents Page 1. IMPORTANT NOTICES...3 2. PRODUCT INTRODUCTION...4 3. PRODUCT FEATURES...5 4. DRIVER INSTALLATION GUIDE...6 4.1 WINDOWS 98 / 98 SE... 6
Partek Flow Installation Guide
Partek Flow Installation Guide Partek Flow is a web based application for genomic data analysis and visualization, which can be installed on a desktop computer, compute cluster or cloud. Users can access
Hands-On UNIX Exercise:
Hands-On UNIX Exercise: This exercise takes you around some of the features of the shell. Even if you don't need to use them all straight away, it's very useful to be aware of them and to know how to deal
Thirty Useful Unix Commands
Leaflet U5 Thirty Useful Unix Commands Last revised April 1997 This leaflet contains basic information on thirty of the most frequently used Unix Commands. It is intended for Unix beginners who need a
Dalhousie University CSCI 2132 Software Development Winter 2015 Lab 7, March 11
Dalhousie University CSCI 2132 Software Development Winter 2015 Lab 7, March 11 In this lab, you will first learn how to use pointers to print memory addresses of variables. After that, you will learn
Introduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
INASP: Effective Network Management Workshops
INASP: Effective Network Management Workshops Linux Familiarization and Commands (Exercises) Based on the materials developed by NSRC for AfNOG 2013, and reused with thanks. Adapted for the INASP Network
16.4.3 Lab: Data Backup and Recovery in Windows XP
16.4.3 Lab: Data Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment The
Step One: Installing Rsnapshot and Configuring SSH Keys
Source: https://www.digitalocean.com/community/articles/how-to-installrsnapshot-on-ubuntu-12-04 What the Red Means The lines that the user needs to enter or customize will be in red in this tutorial! The
Navigating the Rescue Mode for Linux
Navigating the Rescue Mode for Linux SUPPORT GUIDE DEDICATED SERVERS ABOUT THIS GUIDE This document will take you through the process of booting your Linux server into rescue mode to identify and fix the
System Resources. To keep your system in optimum shape, you need to be CHAPTER 16. System-Monitoring Tools IN THIS CHAPTER. Console-Based Monitoring
CHAPTER 16 IN THIS CHAPTER. System-Monitoring Tools. Reference System-Monitoring Tools To keep your system in optimum shape, you need to be able to monitor it closely. Such monitoring is imperative in
Volume SYSLOG JUNCTION. User s Guide. User s Guide
Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages
Hadoop Basics with InfoSphere BigInsights
An IBM Proof of Technology Hadoop Basics with InfoSphere BigInsights Part: 1 Exploring Hadoop Distributed File System An IBM Proof of Technology Catalog Number Copyright IBM Corporation, 2013 US Government
10.3.1.6 Lab - Data Backup and Recovery in Windows XP
5.0 10.3.1.6 Lab - Data Backup and Recovery in Windows XP Introduction Print and complete this lab. In this lab, you will back up data. You will also perform a recovery of the data. Recommended Equipment
Oracle Enterprise Manager
Oracle Enterprise Manager System Monitoring Plug-in for Oracle TimesTen In-Memory Database Installation Guide Release 11.2.1 E13081-02 June 2009 This document was first written and published in November
Introduction to the UNIX Operating System and Open Windows Desktop Environment
Introduction to the UNIX Operating System and Open Windows Desktop Environment Welcome to the Unix world! And welcome to the Unity300. As you may have already noticed, there are three Sun Microsystems
System Administration and Log Management
CHAPTER 6 System Overview System Administration and Log Management Users must have sufficient access rights, or permission levels, to perform any operations on network elements (the devices, such as routers,
II. Installing Debian Linux:
Debian Linux Installation Lab Spring 2013 In this lab you will be installing Debian Linux in a KVM (Kernel Virtual Machine). You will be guided through a series of steps to setup the network (IP addresses,
AlienVault Offline Key Activation
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
How To Set Up A Backupassist For An Raspberry Netbook With A Data Host On A Nsync Server On A Usb 2 (Qnap) On A Netbook (Qnet) On An Usb 2 On A Cdnap (
WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...
Command Line - Part 1
Command Line - Part 1 STAT 133 Gaston Sanchez Department of Statistics, UC Berkeley gastonsanchez.com github.com/gastonstat Course web: gastonsanchez.com/teaching/stat133 GUIs 2 Graphical User Interfaces
Laboration 3 - Administration
Laboration 3 - Administration During this laboration we will learn how to install, configure and test servers that will allow you to have access remote machines, copy files between computers and file sharing.
Server Management Tools (ASMT)
1 Auspex Server Management Tools (ASMT) Introduction This module presents the Auspex Server Management Tools, or ASMT. This is a graphical interface which allows you to perform most NetServer system administration
Hypercosm. Studio. www.hypercosm.com
Hypercosm Studio www.hypercosm.com Hypercosm Studio Guide 3 Revision: November 2005 Copyright 2005 Hypercosm LLC All rights reserved. Hypercosm, OMAR, Hypercosm 3D Player, and Hypercosm Studio are trademarks
How to use the VCCS Student E-mail System
Page 1 of 7 How to use the VCCS Student E-mail System How to Access your Email 1. Log onto Blackboard. 2. Click on the Student Connect tab. 3. Click on the View My E-Mail link. 4. Your login name is your
Network Management & Monitoring Request Tracker (RT) Installation and Configuration
Network Management & Monitoring Request Tracker (RT) Installation and Configuration Notes: Commands preceded with "$" imply that you should execute the command as a general user - not as root. Commands
Linux Development Environment Description Based on VirtualBox Structure
Linux Development Environment Description Based on VirtualBox Structure V1.0 1 VirtualBox is open source virtual machine software. It mainly has three advantages: (1) Free (2) compact (3) powerful. At
Unix Sampler. PEOPLE whoami id who
Unix Sampler PEOPLE whoami id who finger username hostname grep pattern /etc/passwd Learn about yourself. See who is logged on Find out about the person who has an account called username on this host
Recover Data Like a Forensics Expert Using an Ubuntu Live CD
Recover Data Like a Forensics Expert Using an Ubuntu Live CD There are lots of utilities to recover deleted files, but what if you can t boot up your computer, or the whole drive has been formatted? We
Moving Files from TSO to a PC
Moving Files from TSO to a PC WIN9X004 Ginger Carey October 1999 University of Hawai i Information Technology Services "Every big problem was at one time a wee disturbance." Unknown Moving TSO files to
Do it Yourself System Administration
Do it Yourself System Administration Due to a heavy call volume, we are unable to answer your call at this time. Please remain on the line as calls will be answered in the order they were received. We
Unix Guide. Logo Reproduction. School of Computing & Information Systems. Colours red and black on white backgroun
Logo Reproduction Colours red and black on white backgroun School of Computing & Information Systems Unix Guide Mono positive black on white background 2013 Mono negative white only out of any colou 2
CMSC 216 UNIX tutorial Fall 2010
CMSC 216 UNIX tutorial Fall 2010 Larry Herman Jandelyn Plane Gwen Kaye August 28, 2010 Contents 1 Introduction 2 2 Getting started 3 2.1 Logging in........................................... 3 2.2 Logging
TOP(1) Linux User s Manual TOP(1)
NAME top display top CPU processes SYNOPSIS top [ ] [ddelay] [ppid] [q][c][c][s][s][i][niter] [b] DESCRIPTION top provides an ongoing look at processor activity in real time. It displays a listing of the
Using Secure4Audit in an IRIX 6.5 Environment
Using Secure4Audit in an IRIX 6.5 Environment Overview... 3 Icons... 3 Installation Reminders... 4 A Very Brief Overview of IRIX System auditing... 5 Installing System Auditing... 5 The System Audit Directories...
Using the Radmind Command Line Tools to. Maintain Multiple Mac OS X Machines
Using the Radmind Command Line Tools to Maintain Multiple Mac OS X Machines Version 0.8.1 This document describes how to install, configure and use the radmind client and server tools to maintain a small
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 3.4, Last Edited 9/10/2011 Students Name: Date of Experiment: Read the following guidelines before working in
University of Pennsylvania Department of Electrical and Systems Engineering Digital Audio Basics
University of Pennsylvania Department of Electrical and Systems Engineering Digital Audio Basics ESE250 Spring 2013 Lab 9: Process CPU Sharing Friday, March 15, 2013 For Lab Session: Thursday, March 21,
Linux System Administration. System Administration Tasks
System Administration Tasks User and Management useradd - Adds a new user account userdel - Deletes an existing account usermod - Modifies an existing account /etc/passwd contains user name, user ID #,
NRPE Documentation CONTENTS. 1. Introduction... a) Purpose... b) Design Overview... 2. Example Uses... a) Direct Checks... b) Indirect Checks...
Copyright (c) 1999-2007 Ethan Galstad Last Updated: May 1, 2007 CONTENTS Section 1. Introduction... a) Purpose... b) Design Overview... 2. Example Uses... a) Direct Checks... b) Indirect Checks... 3. Installation...
New Lab Intro to KDE Terminal Konsole
New Lab Intro to KDE Terminal Konsole After completing this lab activity the student will be able to; Access the KDE Terminal Konsole and enter basic commands. Enter commands using a typical command line
IDS and Penetration Testing Lab III Snort Lab
IDS and Penetration Testing Lab III Snort Lab Purpose: In this lab, we will explore a common free Intrusion Detection System called Snort. Snort was written initially for Linux/Unix, but most functionality
Part 3: Accessing Local drives and printers from the Terminal Server
In this guide: Part 1: What are Terminal Services / Remote Desktop? Part 2: Connecting to the HUSPSS Terminal Servers Part 3: Accessing Local drives and printers from the Terminal Server Part 4: Accessing
On Disk Encryption with Red Hat Enterprise Linux
On Disk Encryption with Red Hat Enterprise Linux Author: Contact: Copyright: URL: Bowe Strickland, Curriculum Manager [email protected] Copyright 2011, Red Hat, Inc. All rights reserved. http://people.redhat.com/~bowe/summit/2011/tot/on_disk_encryption
End User Setup and Handling
on IM and Presence Service, page 1 Authorization Policy Setup On IM and Presence Service, page 1 Bulk Rename User Contact IDs, page 4 Bulk Export User Contact Lists, page 5 Bulk Export Non-Presence Contact
Configuring MailArchiva with Insight Server
Copyright 2009 Bynari Inc., All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any
INSTALL ZENTYAL SERVER
GUIDE FOR Zentyal Server is a small business server based on Ubuntu s LTS server version 10.04 and the ebox platform. It also has the LXDE desktop installed with Firefox web browser and PCMAN File manager.
Reference Document. SedonaOnline Support
Document Overview This document is being provided to explain how to request a SedonaOnline password and how to use SedonaOnline to submit and view Support Tickets. Our company utilizes the SedonaOffice
VERSION 9.02 INSTALLATION GUIDE. www.pacifictimesheet.com
VERSION 9.02 INSTALLATION GUIDE www.pacifictimesheet.com PACIFIC TIMESHEET INSTALLATION GUIDE INTRODUCTION... 4 BUNDLED SOFTWARE... 4 LICENSE KEY... 4 SYSTEM REQUIREMENTS... 5 INSTALLING PACIFIC TIMESHEET
Local Caching Servers (LCS) February 2015
Local Caching Servers (LCS) February 2015 1.1 Chapter 1: Welcome to LCS The Kansas Interactive Testing Engine (KITE ) is used to deliver standardized tests via testing machines like desktop, laptop, and
System Administration Guide
www.novell.com/documentation System Administration Guide Data Synchronizer 1.2 August 22, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this
RSA SecurID Token User Guide February 12, 2015
RSA SecurID Token User Guide Page i Table of Contents Section I How to request an RSA SecurID token... 1 Section II Setting your RSA SecurID PIN... 6 Section III Setting up PuTTY on your Windows workstation
State of Michigan Data Exchange Gateway. Web-Interface Users Guide 12-07-2009
State of Michigan Data Exchange Gateway Web-Interface Users Guide 12-07-2009 Page 1 of 21 Revision History: Revision # Date Author Change: 1 8-14-2009 Mattingly Original Release 1.1 8-31-2009 MM Pgs 4,
Once you ve signed up, all you ll have to do is sign in. To sign in key in your e-mail address and password.
(1) www.marketwatch.com (2) Sign up for free membership. Pick one option. A. Click Free membership link. B. Click My Portfolios tab. C. Left column, at the bottom, click Join now! A B C Once you ve signed
Partitioning. Files on the Hard Drive. Administration of Operating Systems DO2003. Partition = Binder with index. Write file = Insert document
Administration of Operating Systems DO2003 Mounting the file structure Devices Wecksten, Mattias 2008 Partitioning Wecksten, Mattias 2008 Files on the Hard Drive Partition = Binder with index Write file
Get quick control over your Linux server with server commands
Get quick control over your Linux server with server commands by Jack Wallen Linux is a powerful environment for both the desktop and server: Both systems have matured so any action can be managed with
UNIX Comes to the Rescue: A Comparison between UNIX SAS and PC SAS
UNIX Comes to the Rescue: A Comparison between UNIX SAS and PC SAS Chii-Dean Lin, San Diego State University, San Diego, CA Ming Ji, San Diego State University, San Diego, CA ABSTRACT Running SAS under
YubiKey OSX Login. yubico. Via Yubico-PAM Challenge-Response. Version 1.6. October 24, 2015
YubiKey OSX Login Via Yubico-PAM Challenge-Response Version 1.6 October 24, 2015 YubiKey OSX Login 2015 Yubico. All rights reserved. Page 1 of 18 About Yubico Disclaimer As the inventors of the YubiKey,
System Administration
Performance Monitoring For a server, it is crucial to monitor the health of the machine You need not only real time data collection and presentation but offline statistical analysis as well Characteristics
Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide
Page 1 of 243 Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide (This is an alpha version of Benjamin Day Consulting, Inc. s installation
IUCLID 5 Guidance and support. Installation Guide Distributed Version. Linux - Apache Tomcat - PostgreSQL
IUCLID 5 Guidance and support Installation Guide Distributed Version Linux - Apache Tomcat - PostgreSQL June 2009 Legal Notice Neither the European Chemicals Agency nor any person acting on behalf of the
Customer Release Notes for Xerox Integrated Fiery Color Server for the Xerox Color C75 Press, version 1.0
Customer Release Notes for Xerox Integrated Fiery Color Server for the Xerox Color C75 Press, version 1.0 This document contains important information about this release. Be sure to provide this information
Managing Software and Configurations
55 CHAPTER This chapter describes how to manage the ASASM software and configurations and includes the following sections: Saving the Running Configuration to a TFTP Server, page 55-1 Managing Files, page
Network Security, ISA 656, Angelos Stavrou. Snort Lab
Snort Lab Purpose: In this lab, we will explore a common free Intrusion Detection System called Snort. Snort was written initially for Linux/Unix, but most functionality is now available in Windows. In
Installation Guide Mac OS X Operating Systems
Installation Guide Mac OS X Operating Systems Legal Notices Published by Toon Boom Animation Inc. Corporate Headquarters 5530 St. Patrick Suite2210 Montreal, Quebec Canada H4E 1A8 Tel: (514) 278-8666 Fax:
DocuShare Installation Guide
DocuShare Installation Guide Publication date: February 2011 This document supports DocuShare Release 6.6.1 Prepared by: Xerox Corporation DocuShare Business Unit 3400 Hillview Avenue Palo Alto, California
Using New Relic to Monitor Your Servers
TUTORIAL Using New Relic to Monitor Your Servers by Alan Skorkin Contents Introduction 3 Why Do I Need a Service to Monitor Boxes at All? 4 It Works in Real Life 4 Installing the New Relic Server Monitoring
CIT 470: Advanced Network and System Administration. Topics. Performance Monitoring. Performance Monitoring
CIT 470: Advanced Network and System Administration Performance Monitoring CIT 470: Advanced Network and System Administration Slide #1 Topics 1. Performance monitoring. 2. Performance tuning. 3. CPU 4.
NovaBACKUP Storage Server User Manual NovaStor / April 2013
NovaBACKUP Storage Server User Manual NovaStor / April 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change
Linux System Administration on Red Hat
Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with Linux or Unix systems as a user (i.e., they know file manipulation,
List of FTP commands for the Microsoft command-line FTP client
You are on the nsftools.com site This is a list of the commands available when using the Microsoft Windows command-line FTP client (requires TCP/IP to be installed). All information is from the Windows
Configuring System Message Logging
CHAPTER 25 This chapter describes how to configure system message logging on the Catalyst 2960 switch. Note For complete syntax and usage information for the commands used in this chapter, see the Cisco
HOWTO: Set up a Vyatta device with ThreatSTOP in router mode
HOWTO: Set up a Vyatta device with ThreatSTOP in router mode Overview This document explains how to set up a minimal Vyatta device in a routed configuration and then how to apply ThreatSTOP to it. It is
Download and Install the Citrix Receiver for Mac/Linux
Download and Install the Citrix Receiver for Mac/Linux NOTE: WOW can only be used with Internet Explorer for Windows. To accommodate WOW customers using Mac or Linux computers, a Citrix solution was developed
Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac
Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment. Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac 2011 ENTERPRISE DEVICE
Top 10 Things to Know about WRDS
Top 10 Things to Know about WRDS 1. Do I need special software to use WRDS? WRDS was built to allow users to use standard and popular software. There is no WRDSspecific software to install. For example,
On-Campus Employer Guide
On-Campus Employer Guide How to navigate the Career Connections Opportunities Board WELCOME! This guide will help you navigate our online job system the Career Connections Opportunities Board. With this
Lab III: Unix File Recovery Data Unit Level
New Mexico Tech Digital Forensics Fall 2006 Lab III: Unix File Recovery Data Unit Level Objectives - Review of unallocated space and extracting with dls - Interpret the file system information from the
DiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com [email protected] 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
SJRWMD Cloud-Based Email Quick-Start Guide
SJRWMD Cloud-Based Email Quick-Start Guide Your email account is now in the Microsoft cloud, also known as Office 365. This change from onpremise email provisioning to the cloud allows the agency to provide
Apple Mail... 36 Outlook Web Access (OWA)... 38 Logging In... 38 Changing Passwords... 39 Mobile Devices... 40 Blackberry...
Contents Email Accounts... 3 Adding accounts... 3 Account Modifications... 6 Adding Aliases... 7 Primary E-mail Addresses... 10 Mailbox Quotas... 12 Removing accounts... 13 Mail Forwarding and Distribution
25265 - SYSTEM ADMINISTRATION LAB
25265 - SYSTEM ADMINISTRATION LAB Ex.NO:1 Installation of Windows Server 2003 AIM: To write Installation of Windows 2003 Server. PROCEDURE: To install Windows Server 2003: 1 Insert the Windows Server 2003
An Introduction to SAS/SHARE, By Example
Paper 020-29 An Introduction to SAS/SHARE, By Example Larry Altmayer, U.S. Census Bureau, Washington, DC ABSTRACT SAS/SHARE software is a useful tool for allowing several users to simultaneously access
Local Caching Servers (LCS): User Manual
Local Caching Servers (LCS): User Manual Table of Contents Local Caching Servers... 1 Supported Browsers... 1 Getting Help... 1 System Requirements... 2 Macintosh... 2 Windows... 2 Linux... 2 Downloading
Using the Command-Line Interface
CHAPTER 1 The command-line interface (CLI) is a line-oriented user interface that provides commands for configuring, managing, and monitoring the Cisco wireless LAN controller. This chapter contains the
This presentation explains how to monitor memory consumption of DataStage processes during run time.
This presentation explains how to monitor memory consumption of DataStage processes during run time. Page 1 of 9 The objectives of this presentation are to explain why and when it is useful to monitor
User Guide and Tutorial Central Stores Online Ordering System. Central Stores Financial Services Western Washington University
User Guide and Tutorial Central Stores Online Ordering System Central Stores Financial Services Western Washington University TABLE OF CONTENTS 1. Introduction... Page 3 2. Finding and Logging into Central
Recording Supervisor Manual Presence Software
Presence Software Version 9.2 Date: 09/2014 2 Contents... 3 1. Introduction... 4 2. Installation and configuration... 5 3. Presence Recording architectures Operating modes... 5 Integrated... with Presence
Center for Faculty Development and Support. Gmail Overview
Center for Faculty Development and Support Gmail Overview Table of Contents Gmail Overview... 1 Overview... 3 Learning Objectives... 3 Access Gmail Account... 3 Compose Mail... 4 Read and Reply Mail...
An Introduction to the Linux Command Shell For Beginners
An Introduction to the Linux Command Shell For Beginners Presented by: Victor Gedris In Co-Operation With: The Ottawa Canada Linux Users Group and ExitCertified Copyright and Redistribution This manual
ORACLE NOSQL DATABASE HANDS-ON WORKSHOP Cluster Deployment and Management
ORACLE NOSQL DATABASE HANDS-ON WORKSHOP Cluster Deployment and Management Lab Exercise 1 Deploy 3x3 NoSQL Cluster into single Datacenters Objective: Learn from your experience how simple and intuitive
NetIQ Sentinel 7.0.1 Quick Start Guide
NetIQ Sentinel 7.0.1 Quick Start Guide April 2012 Getting Started Use the following information to get Sentinel installed and running quickly. Meeting System Requirements on page 1 Installing Sentinel
White Paper. Fabasoft on Linux Cluster Support. Fabasoft Folio 2015 Update Rollup 2
White Paper Fabasoft Folio 2015 Update Rollup 2 Copyright Fabasoft R&D GmbH, Linz, Austria, 2015. All rights reserved. All hardware and software names used are registered trade names and/or registered
1.0. User s Guide & Manual USB 2.0 FLASH DRIVE
1.0 USB 2.0 FLASH DRIVE User s Guide & Manual Index Introduction 1 CHAPTER1 Features & Specifications 2 CHAPTER2 System Requirements 4 CHAPTER3 Getting Started Installation of the Windows 98SE Driver 5
You can find the installer for the +Cloud Application on your SanDisk flash drive.
Installation You can find the installer for the +Cloud Application on your SanDisk flash drive. Make sure that your computer is connected to the internet. Next plug in the flash drive and double click
