Partitioning. Files on the Hard Drive. Administration of Operating Systems DO2003. Partition = Binder with index. Write file = Insert document
|
|
|
- Alisha Garrison
- 10 years ago
- Views:
Transcription
1 Administration of Operating Systems DO2003 Mounting the file structure Devices Wecksten, Mattias 2008 Partitioning Wecksten, Mattias 2008 Files on the Hard Drive Partition = Binder with index Write file = Insert document Remove file= Erase from index Format = Replace index Wecksten, Mattias
2 Disk = container of partitions HDA HDA1 HDA2 HDA3 Linux MS-dos Partitions HDA HDA1 HDA2 HDA3 /home /boot Mount partitions HDD A Partition 1, 3 Gig Partition 2, 3 Gig Partition 3, 15 Gig Partition 4, 500 Meg CD/DVD Floppy / /etc /usr /home /media /boot /mnt/cdrom /mnt/floppy 2
3 mount Mount makes it possible to mound devices into the file structure. mount /dev/hda2 /home mount -t ntfs /dev/hda1 /extra mount -t auto /dev/fd0 /mnt/floppy mount -t nfs server:/all_home /home mount t smbfs //ip/path /mountpoint Detailed structuring Partitions Minimal setup Partitions in Linux Size Required size Type Filsystem to use EXT3 SWAP Mount point Where to mount /home 3
4 Partition example Swap ~1x volatile memory (desktop). 1x - for servers. /boot Kernels + initrd (small). Partition = read only possible /usr Shared, program installations (large). /home All user files (large). Partition = portable File system commands df List partitions mount umount showmount /etc/fstab /etc/mtab Permissions Users & groups Permissions Ownership 4
5 Users and Groups Users Add a user Edit /etc/passwd Create folders... Use adduser Use the skel-folder Use third party software. Deactivate vs. remove users. /etc/passwd Name:Password:UserID:PrincipleGroup:Gecos:HomeDirectory:Shell smith:*:100:100:8a-4(office):/home/smith:/usr/bin/sh guest:*:200:0::/home/guest:/usr/bin/sh 5
6 adduser lygos% sudo adduser kalle Password: Adding user `kalle' Adding new group `kalle' (1004). Adding new user `kalle' (1004) with group `kalle'. Creating home directory `/home/kalle'. Copying files from `/etc/skel' Enter new UNIX password: Retype new UNIX password: passwd: password updated successfully Changing the user information for kalle Enter the new value, or press ENTER for the default Full Name []: Kalle Karlsson Room Number []: D687 Work Phone []: Home Phone []: Other []: Is the information correct? [y/n] y Edit groups groupadd newgrp /etc/group Change password lygos% passwd kalle passwd: Changing password for kalle Enter login(nis) password: ****** New password: ****** Re-enter new password: ****** NIS passwd/attributes changed on the server. lygos% sudo passwd kalle New password: ****** Re-enter new password: ****** NIS passwd/attributes changed on the server. lygos% _ 6
7 useradd skeleton folder % ls -A /etc/skel.bash_profile.bashrc.maildir.screenrc.tcsh.config % useradd k adam % _ Copies the skeleton to the empty user folder. How to handle MANY users? How to handle MANY users? #RNDTXT -> hgr5@%lkort5 #167 #CRYPT -> af38$12rsqqk #167 af3... 7
8 How to handle MANY users? #167 #uid #login #167 af3... admin #167 af3... user How to handle MANY users? #167 hgr CRYPT #uid #login #167 af3... Linux File Permissions 8
9 Linux file permissions drwxr-x--- 2 mayank freeos 4096 Dec 28 04:09 tmp -rw-r--r-- 1 mayank freeos 969 Dec 21 02:32 foo -rwxr-xr-x 1 mayank freeos 345 Sep 1 04:12 scr owner-group-all r read. Folders = list. Files = read. w write. Folders = change content/remove/change name. Files = write/remove/change name x execute. Fodlers = open. Files = execute. Stickybit Prevent deleteion renaming chmod +t fp setuid / setgid Files Inherit owners permissions Folders Inherit group 9
10 chmod raynas.hh.se% chmod 755 testtext.txt raynas.hh.se% ls -la testtext.txt -rwxr-xr-x 1 weck 6 Nov 3 09:31 testtext.txt raynas.hh.se% chmod 700 testtext.txt raynas.hh.se% ls -la testtext.txt -rwx weck 6 Nov 3 09:31 testtext.txt raynas.hh.se% _ chown chown -vr owner filename chown owner:group filename lygos% sudo mkdir /usr/local/pgsql lygos% sudo chown postgres /usr/local/pgsql lygos% sudo chown root:users gemensam Installation Software Updates 10
11 Install software (RedHat) rpm - single packets rpm qa rpm i <package> rpm U <package> yum packet manager Install software (Debian) dpkg packet based apt-get update - synchronize the databases apt-get upgrade apt-get install package packet manager aptitude - better than apt-get Basic Process Handeling 11
12 Scheduling RUN READY WAIT Schedule examples Schedule examples (priority) 12
13 Processes i LINUX lygos.hh.se% ps -la F S UID PID PPID C PRI NI ADDR SZ WCHAN TTY TIME CMD 8 O ? 140 pts/6 0:00 ps 8 S ? 1074? pts/2 0:05 dtsessio 8 S ? 139? pts/2 0:00 sh 8 S ? 1093? pts/2 0:08 dtfile 8 S ? 1064? pts/2 0:00 dtfile 8 S ? 318? pts/2 0:00 tcsh 8 S ? 915? pts/2 0:00 dtpad 8 S ? 139? pts/2 0:00 sh 8 S ? 688? pts/2 0:01 ttsessio lygos.hh.se% _ top load averages: 0.00, 0.00, :06:43 48 processes: 47 sleeping, 1 on cpu CPU states: 100% idle, 0.0% user, 0.0% kernel, 0.0% iowait, 0.0% swap Memory: 256M real, 119M free, 330M swap in use, 318M swap free PID USERNAME THR PRI NICE SIZE RES STATE TIME CPU COMMAND weck K 2464K sleep 0: % tcsh root K 2752K sleep 0: % sshd weck K 1248K cpu 0: % top_5.9 1 root K 184K sleep 10: % init weck K 2496K sleep 0: % sshd 209 root K 3096K sleep 22: % nscd 184 root K 1648K sleep 20: % syslogd 145 root K 1128K sleep 18: % inetd 9029 nobody K 2224K sleep 11: % lmgrd root K 1784K sleep 9: % sshd Process management If you start a program from the shell, the shell will wait for the program to exit before you can do anything more. To interrupt the program you press <ctrl><c> This usually exits the program back to the terminal. To suspend the program you press <ctrl><z> This puts the process resting in the background and you get back the terminal. To restart the program in the foreground again, give the command fg. To restart the program in the background, give the command bg. 13
14 Background processes Start a process as a background process. lygos.hh.se% netscape & [1] lygos.hh.se% _ Kill processes kill pid lygos.hh.se% ls -R /* > /dev/null & lygos.hh.se% ps PID TTY TIME CMD pts/6 0:00 ls pts/6 0:00 tcsh lygos% kill [1]Terminated ls -R /* > /dev/null lygos% _ Stop signals ALRM 14 exit HUP 1 exit INT 2 exit (equal to ctrl-c) KILL 9 exit (this signal can not be caught) PIPE 13 exit TERM 15 exit ABRT 6 core FPE 8 core ILL 4 core QUIT 3 core SEGV 11 core lygos% kill TRAP 5 core [1]Terminated ls -R /* > /dev/null lygos% _ 14
15 Filtering signals To avoid the hup signal you can start a program with nohup. lygos.hh.se% nohup netscape & [1] Sending output to nohup.out lygos.hh.se% _ Priority Lower lygos% nice -5 netscape & Increase lygos% sudo nice --5 netscape & Control priority lygos.hh.se% ps PID TTY TIME CMD pts/6 0:00 netscape pts/6 0:00 tcsh lygos% renice lygos% _ 15
Using Network Attached Storage with Linux. by Andy Pepperdine
Using Network Attached Storage with Linux by Andy Pepperdine I acquired a WD My Cloud device to act as a demonstration, and decide whether to use it myself later. This paper is my experience of how to
Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist.
Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist. Outline 1. What is authentication? a. General Informations 2. Authentication Systems in Linux a. Local
System Administration
Performance Monitoring For a server, it is crucial to monitor the health of the machine You need not only real time data collection and presentation but offline statistical analysis as well Characteristics
Linux System Administration on Red Hat
Linux System Administration on Red Hat Kenneth Ingham September 29, 2009 1 Course overview This class is for people who are familiar with Linux or Unix systems as a user (i.e., they know file manipulation,
Birmingham Environment for Academic Research. Introduction to Linux Quick Reference Guide. Research Computing Team V1.0
Birmingham Environment for Academic Research Introduction to Linux Quick Reference Guide Research Computing Team V1.0 Contents The Basics... 4 Directory / File Permissions... 5 Process Management... 6
Introduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
2. Boot using the Debian Net Install cd and when prompted to continue type "linux26", this will load the 2.6 kernel
These are the steps to build a hylafax server. 1. Build up your server hardware, preferably with RAID 5 (3 drives) plus 1 hotspare. Use a 3ware raid card, 8000 series is a good choice. Use an external
Local File Sharing in Linux
Local File Sharing in Linux Would you like to share files among multiple users on the same Linux system? Surprisingly, this is trickier to accomplish than it appears, so here is a method that works. The
http://elinux.org/r-pi_nas#install_the_samba_software
1 of 12 20 Jul 2013 Sat 9:19 PM R-Pi NAS From elinux.org Back to RPi Guides. Raspberry Pi Network Attached Storage Contents 1 What does it do? 2 What do you need? 3 What skill level is required? 4 How
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 3.4, Last Edited 9/10/2011 Students Name: Date of Experiment: Read the following guidelines before working in
CPSC 2800 Linux Hands-on Lab #7 on Linux Utilities. Project 7-1
CPSC 2800 Linux Hands-on Lab #7 on Linux Utilities Project 7-1 In this project you use the df command to determine usage of the file systems on your hard drive. Log into user account for this and the following
Allion Ingrasys Europe. NAStorage. Security policy under a UNIX/LINUX environment. Version 2.01
Allion Ingrasys Europe NAStorage Security policy under a UNIX/LINUX environment Version 2.01 Security policy under a UNIX/LINUX environment Start Enabling a Unix/Linux Network (NFS Protocol) Adding a UNIX
INASP: Effective Network Management Workshops
INASP: Effective Network Management Workshops Linux Familiarization and Commands (Exercises) Based on the materials developed by NSRC for AfNOG 2013, and reused with thanks. Adapted for the INASP Network
Installing QuickBooks Enterprise Solutions Database Manager On Different Linux Servers
Installing QuickBooks Enterprise Solutions Database Manager On Different Linux Servers 1 Contents QuickBooks Enterprise Solutions and Linux... 3 Audience of This Guide... 3 What is the Linux Database Manager
Procedure to Create and Duplicate Master LiveUSB Stick
Procedure to Create and Duplicate Master LiveUSB Stick A. Creating a Master LiveUSB stick using 64 GB USB Flash Drive 1. Formatting USB stick having Linux partition (skip this step if you are using a new
Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting
Course ID RHL200 Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting Course Description Students will experience added understanding of configuration issues of disks,
AN INTRODUCTION TO UNIX
AN INTRODUCTION TO UNIX Paul Johnson School of Mathematics September 24, 2010 OUTLINE 1 SHELL SCRIPTS Shells 2 COMMAND LINE Command Line Input/Output 3 JOBS Processes Job Control 4 NETWORKING Working From
NAStorage. Administrator Guide. Security Policy Of NAStorage Under UNIX/LINUX Environment
NAStorage Administrator Guide Security Policy Of NAStorage Under UNIX/LINUX Environment Version 1.00 10/01/2002 Prepared by: Leon Hsu TS Engineer Ingrasys Technology Inc. E-mail: [email protected] UNIX/LINUX
System Administration and your Bio-Linux Machine
System Administration and your Bio-Linux Machine System Administration and your Bio-Linux Machine...1 System Administration and your Bio-Linux Machine...2 The bare minimum of Bio-Linux system administration...
Basic Linux & Package Management. Original slides from GTFO Security
Basic Linux & Package Management Original slides from GTFO Security outline Linux What it is? Commands Filesystem / Shell Package Management Services run on Linux mail dns web central authentication router
How to Tunnel Remote Desktop using SSH (Cygwin) for Windows XP (SP2)
How to Tunnel Remote Desktop using SSH (Cygwin) for Windows XP (SP2) The ssh server is an emulation of the UNIX environment and OpenSSH for Windows, by Redhat, called cygwin This manual covers: Installation
G14 Unix Tools and Scripts to Monitor and Tune your Informix IDS Server
IBM GLOBAL SERVICES G14 Unix Tools and Scripts to Monitor and Tune your Informix IDS Server Lester Knutsen Sept. 12-16, 2005 Orlando, FL IBM Corporation 2005 Areas to Monitor and Tune CPU Usage How busy
System Resources. To keep your system in optimum shape, you need to be CHAPTER 16. System-Monitoring Tools IN THIS CHAPTER. Console-Based Monitoring
CHAPTER 16 IN THIS CHAPTER. System-Monitoring Tools. Reference System-Monitoring Tools To keep your system in optimum shape, you need to be able to monitor it closely. Such monitoring is imperative in
IMPLEMENTATION OF CIPA - PUDUCHERRY UT SERVER MANAGEMENT. Client/Server Installation Notes - Prepared by NIC, Puducherry UT.
SERVER MANAGEMENT SERVER MANAGEMENT The Police department had purchased a server exclusively for the data integration of CIPA. For this purpose a rack mount server with specifications- as per annexure
IT6204 Systems & Network Administration. (Optional)
Systems & Network Administration (Optional) INTRODUCTION This is one of the Optional courses designed for Semester 6 of the Bachelor of Information Technology Degree program. This course on Systems & Network
ICS 351: Today's plan
ICS 351: Today's plan routing protocols linux commands Routing protocols: overview maintaining the routing tables is very labor-intensive if done manually so routing tables are maintained automatically:
13. Configuring FTP Services in Knoppix
13. Configuring FTP Services in Knoppix Estimated Time: 45 minutes Objective In this lab, the student will configure Knoppix as an FTP server. Equipment The following equipment is required for this exercise:
Ubuntu Professional Training Course Overview (E-learning, Ubuntu 10.04 LTS)
Ubuntu Professional Training Course Overview (E-learning, Ubuntu 10.04 LTS) 1 of 7 Ubuntu Professional Course Overview (E-learning, Ubuntu 10.04 LTS) About the Course and Objectives The Ubuntu Professional
Installing Dspace 1.8 on Ubuntu 12.04
Installing Dspace 1.8 on Ubuntu 12.04 This is an abridged version of the dspace 1.8 installation guide, specifically targeted at getting a basic server running from scratch using Ubuntu. More information
Chapter 7: Unix Security. Chapter 7: 1
Chapter 7: Unix Security Chapter 7: 1 Objectives Understand the security features provided by a typical operating system. Introduce the basic Unix security model. See how general security principles are
Support Notes for SUSE LINUX Enterprise Server 9 Service Pack 3 for the Intel Itanium 2 Processor Family
Support Notes for SUSE LINUX Enterprise Server 9 Service Pack 3 for the Intel Itanium 2 Processor Family *5991-5301* Part number: 5991-5301 Edition: 3, E0406 Copyright 2006 Hewlett-Packard Development
Partek Flow Installation Guide
Partek Flow Installation Guide Partek Flow is a web based application for genomic data analysis and visualization, which can be installed on a desktop computer, compute cluster or cloud. Users can access
Some basic unix commands
Angling may be said to be so like the mathematics, that it can never be fully learnt. So is UNIX. IZAAK WALTON K. Nandakumar Appendix C Some basic unix commands C.1 Introduction to the shell and the desktop
Facultat d'informàtica de Barcelona Univ. Politècnica de Catalunya. Administració de Sistemes Operatius. System monitoring
Facultat d'informàtica de Barcelona Univ. Politècnica de Catalunya Administració de Sistemes Operatius System monitoring Topics 1. Introduction to OS administration 2. Installation of the OS 3. Users management
RocketRAID 2640/2642 SAS Controller Ubuntu Linux Installation Guide
RocketRAID 2640/2642 SAS Controller Ubuntu Linux Installation Guide Version 1.2 Copyright 2012 HighPoint Technologies, Inc. All rights reserved. Last updated on June 14, 2012 Table of Contents 1 Overview...
Linux Security Ideas and Tips
Linux Security Ideas and Tips Hugh Brown Sr. Systems Administrator ITS Enterprise Infrastructure University of Iowa October 8, 2014 Hugh Brown (University of Iowa) Linux Security Ideas and Tips October
Redhat 6.2 Installation Howto -Basic Proxy and Transparent
Redhat 6.2 Installation Howto -Basic Proxy and Transparent This is a guide document although very detailed in some sections. It assumes you have a have an idea about installing RH and working with Linux.
NATIONAL POPULATION REGISTER (NPR)
NATIONAL POPULATION REGISTER (NPR) Project Name: NPR Version No: 1.0.0 Release Date: Group Name: NPR-ECIL Version Date: LINUX SERVER INSTALLATION AND CONFIGURATION FOR JAVA BASED NPR DATAENTRY SOFTWARE
USEFUL UNIX COMMANDS
cancel cat file USEFUL UNIX COMMANDS cancel print requested with lp Display the file cat file1 file2 > files Combine file1 and file2 into files cat file1 >> file2 chgrp [options] newgroup files Append
How Do I Recover infiniti Remotes and Line Cards?
How Do I Recover infiniti Remotes and Line Cards? Date: June 26, 2008 Overview This FAQ contains the following information and procedures pertaining to ids Release 6.0.1 and later: Before Attempting to
WES 9.2 DRIVE CONFIGURATION WORKSHEET
WES 9.2 DRIVE CONFIGURATION WORKSHEET This packet will provide you with a paper medium external to your WES box to write down the device names, partitions, and mount points within your machine. You may
Hands-On UNIX Exercise:
Hands-On UNIX Exercise: This exercise takes you around some of the features of the shell. Even if you don't need to use them all straight away, it's very useful to be aware of them and to know how to deal
The System Monitor Handbook. Chris Schlaeger John Tapsell Chris Schlaeger Tobias Koenig
Chris Schlaeger John Tapsell Chris Schlaeger Tobias Koenig 2 Contents 1 Introduction 6 2 Using System Monitor 7 2.1 Getting started........................................ 7 2.2 Process Table.........................................
HTTP-FUSE PS3 Linux: an internet boot framework with kboot
HTTP-FUSE PS3 Linux: an internet boot framework with kboot http://openlab.jp/oscirclar/ Kuniyasu Suzaki and Toshiki Yagi National Institute of Advanced Industrial Science and Technology Embedded Linux
How to build secure Apache Tomcat deployments with RPM.
How to build secure Apache Tomcat deployments with RPM. My security experiences really tie into everyday work. A colleague called me from my last gig and asked how to build a RedHat Package Manager (RPM)
Linux FTP Server Setup
17Harrison_ch15.qxd 2/25/05 10:06 AM Page 237 C H A P T E R 15 Linux FTP Server Setup IN THIS CHAPTER FTP Overview Problems with FTP and Firewalls How to Download and Install VSFTPD How to Get VSFTPD Started
25265 - SYSTEM ADMINISTRATION LAB
25265 - SYSTEM ADMINISTRATION LAB Ex.NO:1 Installation of Windows Server 2003 AIM: To write Installation of Windows 2003 Server. PROCEDURE: To install Windows Server 2003: 1 Insert the Windows Server 2003
CA and SSL Certificates
1 For this exercise you must again be root. Login and obtain root privileges: sudo su 2 Create a working directory only accessible to root: mkdir ~/ca cd ~/ca chmod og rwx. 3 Install openssl if necessary
Newton Linux User Group Graphing SNMP with Cacti and RRDtool
Newton Linux User Group Graphing SNMP with Cacti and RRDtool Summary: Cacti is an interface that can be used to easily manage the graphing of SNMP data. These graphs allow you to visualize performance
QuickBooks Enterprise Solutions. Linux Database Server Manager Installation and Configuration Guide
QuickBooks Enterprise Solutions Linux Database Server Manager Installation and Configuration Guide Copyright Copyright 2007 Intuit Inc. All rights reserved. STATEMENTS IN THIS DOCUMENT REGARDING THIRD-PARTY
Unit objectives IBM Power Systems
User-level security Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 9.0 Unit objectives After completing this unit, you should be able to: Describe
Setup software RAID1 array on running CentOS 6.3 using mdadm. (Multiple Device Administrator) 1. Gather information about current system.
Setup software RAID1 array on running CentOS 6.3 using mdadm. (Multiple Device Administrator) All commands run from terminal as super user. Default CentOS 6.3 installation with two hard drives, /dev/sda
Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)
Cisco Networking Academy Program Curriculum Scope & Sequence Fundamentals of UNIX version 2.0 (July, 2002) Course Description: Fundamentals of UNIX teaches you how to use the UNIX operating system and
Secure Shell Demon setup under Windows XP / Windows Server 2003
Secure Shell Demon setup under Windows XP / Windows Server 2003 Configuration inside of Cygwin $ chgrp Administrators /var/{run,log,empty} $ chown Administrators /var/{run,log,empty} $ chmod 775 /var/{run,log}
SAP Netweaver 7.3 on Amazon Cloud
SAP Netweaver 7.3 on Amazon Cloud RedHat 6 Install Thusjanthan Kubendranathan M.Sc. 12 Table of Contents Amazon EC2 Setup... 4 RedHat EC2 Instance... 4 AWS Dashboard... 4 Launch an EC2 Instance... 4 EC2
CS197U: A Hands on Introduction to Unix
CS197U: A Hands on Introduction to Unix Lecture 4: My First Linux System J.D. DeVaughn-Brown University of Massachusetts Amherst Department of Computer Science [email protected] 1 Reminders After
Operating System Components and Services
Operating System Components and Services Tom Kelliher, CS 311 Feb. 6, 2012 Announcements: From last time: 1. System architecture issues. 2. I/O programming. 3. Memory hierarchy. 4. Hardware protection.
Net/FSE Installation Guide v1.0.1, 1/21/2008
1 Net/FSE Installation Guide v1.0.1, 1/21/2008 About This Gu i de This guide walks you through the installation of Net/FSE, the network forensic search engine. All support questions not answered in this
Desktop : Ubuntu 10.04 Desktop, Ubuntu 12.04 Desktop Server : RedHat EL 5, RedHat EL 6, Ubuntu 10.04 Server, Ubuntu 12.04 Server, CentOS 5, CentOS 6
201 Datavoice House, PO Box 267, Stellenbosch, 7599 16 Elektron Avenue, Technopark, Tel: +27 218886500 Stellenbosch, 7600 Fax: +27 218886502 Adept Internet (Pty) Ltd. Reg. no: 1984/01310/07 VAT No: 4620143786
Using a login script for deployment of Kaspersky Network Agent to Mac OS X clients
Using a login script for deployment of Kaspersky Network Agent to Mac OS X clients EXECUTIVE SUMMARY This document describes how an administrator can configure a login script to deploy Kaspersky Lab Network
INF-110. GPFS Installation
INF-110 GPFS Installation Overview Plan the installation Before installing any software, it is important to plan the GPFS installation by choosing the hardware, deciding which kind of disk connectivity
1. Introduction to the UNIX File System: logical vision
Unix File System 1. Introduction to the UNIX File System: logical vision Silberschatz, Galvin and Gagne 2005 Operating System Concepts 7 th Edition, Feb 6, 2005 Logical structure in each FS (System V):
LSN 10 Linux Overview
LSN 10 Linux Overview ECT362 Operating Systems Department of Engineering Technology LSN 10 Linux Overview Linux Contemporary open source implementation of UNIX available for free on the Internet Introduced
MFCF Grad Session 2015
MFCF Grad Session 2015 Agenda Introduction Help Centre and requests Dept. Grad reps Linux clusters using R with MPI Remote applications Future computing direction Technical question and answer period MFCF
TOP(1) Linux User s Manual TOP(1)
NAME top display top CPU processes SYNOPSIS top [ ] [ddelay] [ppid] [q][c][c][s][s][i][niter] [b] DESCRIPTION top provides an ongoing look at processor activity in real time. It displays a listing of the
The Linux System. o Updating without touching the user's files and configurations.
Backups In Linux The Linux System Many Linux distros set up seperate "/home" and "/" (root) partitions. User configuration files are hidden with a "." (period) in the front of the name. Separate partitions
RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux..
RH131 Red Hat Linux System Administration Course Summary For users of Linux (or UNIX) who want to start building skills in systems administration on Red Hat Linux, to a level where they can attach and
System Security Fundamentals
System Security Fundamentals Alessandro Barenghi Dipartimento di Elettronica, Informazione e Bioingegneria Politecnico di Milano alessandro.barenghi - at - polimi.it April 28, 2015 Lesson contents Overview
Planning for an Amanda Disaster Recovery System
Planning for an Amanda Disaster Recovery System Bernd Harmsen [email protected] www.datasysteme.de 22nd April 2003 Contents 1 Introduction 1 1.1 Why we need a specialized Amanda Disaster Recovery System?..............
Linux Development Environment Description Based on VirtualBox Structure
Linux Development Environment Description Based on VirtualBox Structure V1.0 1 VirtualBox is open source virtual machine software. It mainly has three advantages: (1) Free (2) compact (3) powerful. At
An A-Z Index of the Apple OS X command line (TERMINAL) The tcsh command shell of Darwin (the open source core of OSX)
An A-Z Index of the Apple OS X command line (TERMINAL) The tcsh command shell of Darwin (the open source core of OSX) alias alloc awk Create an alias List used and free memory Find and Replace text within
SSL Tunnels. Introduction
SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,
On Disk Encryption with Red Hat Enterprise Linux
On Disk Encryption with Red Hat Enterprise Linux Author: Contact: Copyright: URL: Bowe Strickland, Curriculum Manager [email protected] Copyright 2011, Red Hat, Inc. All rights reserved. http://people.redhat.com/~bowe/summit/2011/tot/on_disk_encryption
Sophos Anti-Virus for Linux configuration guide. Product version: 9
Sophos Anti-Virus for Linux configuration guide Product version: 9 Document date: September 2014 Contents 1 About this guide...8 2 About Sophos Anti-Virus for Linux...9 2.1 What Sophos Anti-Virus does...9
RocketRAID 174x SATA Controller Ubuntu Linux Installation Guide
RocketRAID 174x SATA Controller Ubuntu Linux Installation Guide Version 1.0 Copyright 2008 HighPoint Technologies, Inc. All rights reserved. Last updated on November 13, 2008 Table of Contents 1 Overview...1
Linux command line. An introduction to the Linux command line for genomics. Susan Fairley
Linux command line An introduction to the Linux command line for genomics Susan Fairley Aims Introduce the command line Provide an awareness of basic functionality Illustrate with some examples Provide
Data storage, backup and restore
, backup and restore IMT3292 - System Administration November 25, 2008 A Simple Overview 1 HW: SCSI/IDE/SATA/SAS (SAN!) 2 HW/SW: 3 SW: Logical volumes 4 SW: Journalling filesystems 5 SW/NET: Networked
Monitoring Clearswift Gateways with SCOM
Technical Guide Version 01 28/11/2014 Documentation Information File Name Document Author Document Filename Monitoring the gateways with _v1.docx Iván Blesa Monitoring the gateways with _v1.docx Issue
INSTALL ZENTYAL SERVER
GUIDE FOR Zentyal Server is a small business server based on Ubuntu s LTS server version 10.04 and the ebox platform. It also has the LXDE desktop installed with Firefox web browser and PCMAN File manager.
Redundant Array of Inexpensive/Independent Disks. RAID 0 Disk striping (best I/O performance, no redundancy!)
1 Data storage A Simple Overview 1. HW: SCSI/IDE/SATA/SAS (SAN!) 2. HW/SW: RAID 3. SW: Logical volumes 4. SW: Journalling filesystems 5. SW/NET: Networked filesystem (NAS!) DAS-NAS-SAN 2 RAID Redundant
How To Install Acronis Backup & Recovery 11.5 On A Linux Computer
Acronis Backup & Recovery 11.5 Server for Linux Update 2 Installation Guide Copyright Statement Copyright Acronis International GmbH, 2002-2013. All rights reserved. Acronis and Acronis Secure Zone are
Unix/Linux Forensics 1
Unix/Linux Forensics 1 Simple Linux Commands date display the date ls list the files in the current directory more display files one screen at a time cat display the contents of a file wc displays lines,
WebHost Manager 7 User Guide DOCUMENTATION VERSION: 1.2
WebHost Manager 7 User Guide DOCUMENTATION VERSION: 1.2 Table of contents 1 What is WebHost Manager? 10 2 How do I use WebHost Manager? 11 2.1 Installation..............................................
NRPE Documentation CONTENTS. 1. Introduction... a) Purpose... b) Design Overview... 2. Example Uses... a) Direct Checks... b) Indirect Checks...
Copyright (c) 1999-2007 Ethan Galstad Last Updated: May 1, 2007 CONTENTS Section 1. Introduction... a) Purpose... b) Design Overview... 2. Example Uses... a) Direct Checks... b) Indirect Checks... 3. Installation...
Back Up Linux And Windows Systems With BackupPC
By Falko Timme Published: 2007-01-25 14:33 Version 1.0 Author: Falko Timme Last edited 01/19/2007 This tutorial shows how you can back up Linux and Windows systems with BackupPC.
HOWTO: Set up a Vyatta device with ThreatSTOP in router mode
HOWTO: Set up a Vyatta device with ThreatSTOP in router mode Overview This document explains how to set up a minimal Vyatta device in a routed configuration and then how to apply ThreatSTOP to it. It is
CS 377: Operating Systems. Outline. A review of what you ve learned, and how it applies to a real operating system. Lecture 25 - Linux Case Study
CS 377: Operating Systems Lecture 25 - Linux Case Study Guest Lecturer: Tim Wood Outline Linux History Design Principles System Overview Process Scheduling Memory Management File Systems A review of what
Acronis Backup & Recovery 10 Server for Linux. Command Line Reference
Acronis Backup & Recovery 10 Server for Linux Command Line Reference Table of contents 1 Console mode in Linux...3 1.1 Backup, restore and other operations (trueimagecmd)... 3 1.1.1 Supported commands...
A candidate following a programme of learning leading to this unit will be able to:
Unit 24: Linux+ Learning Outcomes A candidate following a programme of learning leading to this unit will be able to: Demonstrate knowledge of planning the implementation Show knowledge of how to install
Create a virtual machine at your assigned virtual server. Use the following specs
CIS Networking Installing Ubuntu Server on Windows hyper-v Much of this information was stolen from http://www.isummation.com/blog/installing-ubuntu-server-1104-64bit-on-hyper-v/ Create a virtual machine
Massey University Follow Me Printer Setup for Linux systems
Massey University Follow Me Printer Setup for Linux systems RedHat and Debian based systems Requirements You must have an active Massey network account, i.e. you should already be able to log onto the
Lab 1: Introduction to the network lab
CSCI 312 - DATA COMMUNICATIONS AND NETWORKS FALL, 2014 Lab 1: Introduction to the network lab NOTE: Be sure to bring a flash drive to the lab; you will need it to save your data. For this and future labs,
Firebird on Linux. Author: Philippe Makowski IBPhoenix Email: [email protected] Licence: Public Documentation License Date: 2011-11-22
Author: Philippe Makowski IBPhoenix Email: [email protected] Licence: Public Documentation License Date: 2011-11-22 How to install Project packages rpm tar.gz Distributions packages Build from sources
Linux System Administration. System Administration Tasks
System Administration Tasks User and Management useradd - Adds a new user account userdel - Deletes an existing account usermod - Modifies an existing account /etc/passwd contains user name, user ID #,
System administration basics
Embedded Linux Training System administration basics Michael Opdenacker Thomas Petazzoni Free Electrons Copyright 2009, Free Electrons. Creative Commons BY SA 3.0 license Latest update: Dec 20, 2010, Document
