Navigating within the GNU/Linux Filesystem
|
|
- Gerard Fox
- 7 years ago
- Views:
Transcription
1 Navigating within the GNU/Linux Filesystem The purpose of this section is to provide a few basic GNU/Linux commands to aide new users locate areas on the ODU Turing cluster. The commands presented are a limited sample of the total population of standard commands on various GNU/Linux platforms. There are several assumptions regarding the users reading this section. Prerequisites The user has experience with some type of desktop computer with input devices that are a keyboard and mouse, or are capable of duplicating the functions of a keyboard and mouse (in short, you have used a computer prior to going through this aide). The user has network access and sufficient user credentials to connect to the ODU Turing cluster. {Note: If that is not true please refer to the Prerequisites and/or the Connecting to the ODU Turing Cluster sections of this document.} Section Terminology file - data/document that has a name, stored on a computer directory - a container, with a name that holds files stored on a computer filesystem - the hierarchy/method in which directories and files are stored on a computer or device permissions - limitations to the access given to a file or directory as read (view/open the file/directory), write (change or add a file/directory), and/or execute (run a file) Flags (switches) - additional command options that can be added when running an application pipe ([Shift] + [ ]) - a vertical line used in scripts/commands to take the output from one command and use it as input to another command. Information Technology Services - High Performance Computing Group 1 of 12
2 The command prompt and shell Upon logging into the Turing cluster, a blinking cursor is presented along side a box with information in it. This is often referred to as the command prompt. The command prompt uses a set of commands that are understood by the shell. The shell is a type of application that interprets commands, and then communicates them to the operating system. The prompt, excluding the cursor, has three main parts; the username, the cluster node (machine name), and the current working directory. In the example the ~ (tilde) is an alias (synonym for also known as ) for the user s home directory (user s personal directory). Traditional Shell (tcsh) The Turing cluster has been configured to default to the traditional shell better known as tcsh. Though several benefits of using this shell exist, three (3) particular features will be highlighted. 1. Case sensitivity The Linux operating system in general is case-sensitive. What this means to the user is that given the three (3) files filename.txt, FILENAME.TXT, and FileName.TxT ; each of the listed filenames would be considered completely separate and different by the operating system. In other words, if a user wanted to edit filename.txt but typed in FILENAME.TXT, because the [Caps Lock] was turned on; the system would not correct for the mistake, and would likely return FILENAME.TXT: Command not found. 2. [Tab] completion Tab completion allows a user at the command prompt to type a few characters of a wanted command (also works with files, and directories), and then (assuming the command is in the path) complete the command by pressing the [Tab] button on the keyboard. This becomes particularly useful when typing the names of files with long names, odd names, or paths to data. This feature can save the user a great deal of time if used consistently. 3. Command history Often commands are used repetitively while at the prompt. The commands entered into the command prompt can be seen, and reused by pressing the up arrow [ ] on the Information Technology Services - High Performance Computing Group 2 of 12
3 keyboard repeatedly. Though very useful it should be noted that there is a limit to the number of commands saved. The commands are also only held locally to the terminal or ssh session. Basic Linux commands man command_name - opens the manual for the majority of most commands. i.e. man pwd produces the manual entry for the print working directory command navigate the manual using the up [ ] and down [ ] arrow keys, or the [Page Up] and [Page Down] keys quit the manual by pressing the [Q] key pwd - print working directory, displays the path to the current directory. This can be used to determine where the user is currently located in the filesytem i.e. If pwd was run while in a user s home directory (~) on Turing, the output would be /home/username ls (the l is a lowercase L)- lists is the contents of a directory {Note: in Microsoft Windows this would be similar to double-clicking a directory to view the contents} ls can be used to view the contents of not only the current working directory, but also other directories in the filesystem. (i.e. ls /bin would list the contents of the /bin directory) ls is commonly used with additional switches such as -a (show all files), - l (long view), or in combinations such as ls -la {Note: the files/directories beginning with a. are hidden} Information Technology Services - High Performance Computing Group 3 of 12
4 mkdir directory_name - make directory, creates directories with a given name cd directory_name - change directory, changes working directory locations {Note: cd ~ always returns a user to the /home/username working directory} Information Technology Services - High Performance Computing Group 4 of 12
5 cp /current_file_location/filename /new_file_location/file_name - copy, makes a copy of a file or directory from one location in another location {Note: directories can be copied by using the -r switch (i.e. cp -r / current_directory_location /new_directory_location) Initial copied files or directories are not destroyed mv /current_file_location/filename /new_file_location/file_name - move, makes a transfers of a file or directory from one location in another location Initial moved files or directories are destroyed Information Technology Services - High Performance Computing Group 5 of 12
6 rm filename - remove, deletes a file or directory {Note: to remove a directory, use the -r switch} more filename - views the text of a file, one page at a time navigate the text by using the up [ ] and down [ ] arrow keys, [Space] bar, or the [Page Up] and [Page Down] keys quit the manual by pressing the [Q] key Information Technology Services - High Performance Computing Group 6 of 12
7 cat filename - concatenate, although design to append files, cat is most often used to view data within files grep expression filename - outputs the result of a search based on an expression in a given file {Note: grep is most commonly used in combination or piped with other commands such as more or cat} Information Technology Services - High Performance Computing Group 7 of 12
8 ./scriptname - the command./ (dot-slash) allows a users to run an application or script chmod (switches) filename - change file mode bits, use to adjust the permissions on a file. The common permissions include adding (+) or removing (-) read (r), write (w), and execute (x). Information Technology Services - High Performance Computing Group 8 of 12
9 Text Editors in the Command Line Shell A text editor is an application that allows an user to create, and modify files from the command line. This section will specifically identify two editors though others exist. The two editors discussed in this document are vi and nano. vi Basics The text editor vi (visual mode) has existed since 1976 as an editor in the UNIX operating system. Since that time many features, through the form of keyboard commands and shortcuts, have been added to the software. An improved version of vi was written and named vim (vi improved). Most commands found in vi also work within vim while providing additional features. {Note: This document provides very minimal techniques in the utilization of vi. Further techniques and features can be found through a man vi or an internet and/or internet video search for tutorials.} Creating/Opening a file vi filename - this command creates or opens a document with the filename given in the current working directory, and starts a vi session Information Technology Services - High Performance Computing Group 9 of 12
10 Command mode and Insert mode Due to the time period in which vi was originally developed, it contains two primary modes. The first mode is the command mode that is entered by pressing the [Esc] key. The second mode is the insert or editing mode, and can be entered from within the command mode by pressing the [ i ] key. {Note: To enter text into a document, the user must be in the insert mode which can be reached by pressing the letter i on the keyboard while in the command mode. If unsure which mode currently in, press the [Esc] key to enter command mode.} Command Mode = [Esc] Insert Text Mode = [Esc] and then press [ i ] Write (Save) Information not saved in a file is considered to reside in the buffer. To save the information to a file, the information in the buffer must be written into the file. To do this, from the command mode the user must type :w and press [Enter]. Write (save) to a file - Press [Esc] then type :w and lastly press [Enter] Quit (Exiting vi) Information Technology Services - High Performance Computing Group 10 of 12
11 Exiting vi can take two forms. The first exits and does not save any changes in the buffer, and the second writes the changes in the buffer to a file and then exits to the command prompt. Quit without writing buffer (no save) - Press [Esc] then type :q! and lastly press [Enter] Quit and write out the buffer (save) - Press [Esc] then type :wq and lastly press [Enter] nano Basics Nano s ANOther (nano) editor is a small, easy to use command line text editor. Creating/Opening a file nano filename - this command creates or opens a document with the filename given in the current working directory, and starts a nano session. Use the keyboard arrows to move the cursor around the session window. Text can be typed freely as well as, additional functions at the bottom of the screen can be accessed with the use of the [Ctrl] button (^ is the symbol for the [Ctrl] button) plus the letter shown. Information Technology Services - High Performance Computing Group 11 of 12
12 WriteOut (Save) Information not saved in a file is considered to reside in the buffer. To save the information to a file, the information in the buffer must be written into the file. To do this press the [Ctrl] button and the letter [O] together then press [Enter]. WriteOut (save) to a file - Press [Ctrl] and [O] and lastly press [Enter] Exiting Exiting nano can take two forms. The first exits and does not save any changes in the buffer, and the second writes the changes in the buffer to a file and then exits to the command prompt. Quit without writing buffer (no save) - Press [Ctrl] and [X] and lastly press [N] Quit and write out the buffer (save) - Press [Ctrl] and [X] and lastly press [Y] Information Technology Services - High Performance Computing Group 12 of 12
Introduction to Mac OS X
Introduction to Mac OS X The Mac OS X operating system both a graphical user interface and a command line interface. We will see how to use both to our advantage. Using DOCK The dock on Mac OS X is the
More informationCommand Line - Part 1
Command Line - Part 1 STAT 133 Gaston Sanchez Department of Statistics, UC Berkeley gastonsanchez.com github.com/gastonstat Course web: gastonsanchez.com/teaching/stat133 GUIs 2 Graphical User Interfaces
More informationBasic C Shell. helpdesk@stat.rice.edu. 11th August 2003
Basic C Shell helpdesk@stat.rice.edu 11th August 2003 This is a very brief guide to how to use cshell to speed up your use of Unix commands. Googling C Shell Tutorial can lead you to more detailed information.
More informationIntroduction to the UNIX Operating System and Open Windows Desktop Environment
Introduction to the UNIX Operating System and Open Windows Desktop Environment Welcome to the Unix world! And welcome to the Unity300. As you may have already noticed, there are three Sun Microsystems
More informationTutorial Guide to the IS Unix Service
Tutorial Guide to the IS Unix Service The aim of this guide is to help people to start using the facilities available on the Unix and Linux servers managed by Information Services. It refers in particular
More informationUnix the Bare Minimum
Unix the Bare Minimum Norman Matloff September 27, 2005 c 2001-2005, N.S. Matloff Contents 1 Purpose 2 2 Shells 2 3 Files and Directories 4 3.1 Creating Directories.......................................
More informationLab 1: Introduction to C, ASCII ART and the Linux Command Line Environment
.i.-' `-. i..' `/ \' _`.,-../ o o \.' ` ( / \ ) \\\ (_.'.'"`.`._) /// \\`._(..: :..)_.'// \`. \.:-:. /.'/ `-i-->..
More information1 Basic commands. 2 Terminology. CS61B, Fall 2009 Simple UNIX Commands P. N. Hilfinger
CS61B, Fall 2009 Simple UNIX Commands P. N. Hilfinger 1 Basic commands This section describes a list of commonly used commands that are available on the EECS UNIX systems. Most commands are executed by
More informationUniversity of Toronto
1 University of Toronto APS 105 Computer Fundamentals A Tutorial about UNIX Basics Fall 2011 I. INTRODUCTION This document serves as your introduction to the computers we will be using in this course.
More informationUnix Guide. Logo Reproduction. School of Computing & Information Systems. Colours red and black on white backgroun
Logo Reproduction Colours red and black on white backgroun School of Computing & Information Systems Unix Guide Mono positive black on white background 2013 Mono negative white only out of any colou 2
More informationLinux command line. An introduction to the Linux command line for genomics. Susan Fairley
Linux command line An introduction to the Linux command line for genomics Susan Fairley Aims Introduce the command line Provide an awareness of basic functionality Illustrate with some examples Provide
More informationWindows XP Pro: Basics 1
NORTHWEST MISSOURI STATE UNIVERSITY ONLINE USER S GUIDE 2004 Windows XP Pro: Basics 1 Getting on the Northwest Network Getting on the Northwest network is easy with a university-provided PC, which has
More informationTutorial 0A Programming on the command line
Tutorial 0A Programming on the command line Operating systems User Software Program 1 Program 2 Program n Operating System Hardware CPU Memory Disk Screen Keyboard Mouse 2 Operating systems Microsoft Apple
More informationUnix Sampler. PEOPLE whoami id who
Unix Sampler PEOPLE whoami id who finger username hostname grep pattern /etc/passwd Learn about yourself. See who is logged on Find out about the person who has an account called username on this host
More informationLECTURE-7. Introduction to DOS. Introduction to UNIX/LINUX OS. Introduction to Windows. Topics:
Topics: LECTURE-7 Introduction to DOS. Introduction to UNIX/LINUX OS. Introduction to Windows. BASIC INTRODUCTION TO DOS OPERATING SYSTEM DISK OPERATING SYSTEM (DOS) In the 1980s or early 1990s, the operating
More informationGetting Started on the Computer With Mouseaerobics! Windows XP
This handout was modified from materials supplied by the Bill and Melinda Gates Foundation through a grant to the Manchester City Library. Getting Started on the Computer With Mouseaerobics! Windows XP
More informationHOW TO USE THIS DOCUMENT READ OBEY
Exercise: Learning Batch Computing on OSCER s Linux Cluster Supercomputer This exercise will help you learn to use Boomer, the Linux cluster supercomputer administered by the OU Supercomputing Center for
More informationInstallation Guide Mac OS X Operating Systems
Installation Guide Mac OS X Operating Systems Legal Notices Published by Toon Boom Animation Inc. Corporate Headquarters 5530 St. Patrick Suite2210 Montreal, Quebec Canada H4E 1A8 Tel: (514) 278-8666 Fax:
More informationIntroduction to. UNIX Bob Booth December 2004 AP-UNIX2. University of Sheffield
Introduction to UNIX Bob Booth December 2004 AP-UNIX2 University of Sheffield Contents 1. INTRODUCTION... 3 1.1 THE SHELL... 3 1.2 FORMAT OF COMMANDS... 4 1.3 ENTERING COMMANDS... 4 2. ACCESSING UNIX MACHINES...
More informationIntroduction to Linux and Cluster Basics for the CCR General Computing Cluster
Introduction to Linux and Cluster Basics for the CCR General Computing Cluster Cynthia Cornelius Center for Computational Research University at Buffalo, SUNY 701 Ellicott St Buffalo, NY 14203 Phone: 716-881-8959
More informationAn Introduction to the Linux Command Shell For Beginners
An Introduction to the Linux Command Shell For Beginners Presented by: Victor Gedris In Co-Operation With: The Ottawa Canada Linux Users Group and ExitCertified Copyright and Redistribution This manual
More informationCommand-Line Operations : The Shell. Don't fear the command line...
Command-Line Operations : The Shell Don't fear the command line... Shell Graphical User Interface (GUI) Graphical User Interface : displays to interact with the computer - Open and manipulate files and
More informationCS 103 Lab Linux and Virtual Machines
1 Introduction In this lab you will login to your Linux VM and write your first C/C++ program, compile it, and then execute it. 2 What you will learn In this lab you will learn the basic commands and navigation
More informationLinux Overview. Local facilities. Linux commands. The vi (gvim) editor
Linux Overview Local facilities Linux commands The vi (gvim) editor MobiLan This system consists of a number of laptop computers (Windows) connected to a wireless Local Area Network. You need to be careful
More informationCommand Line Crash Course For Unix
Command Line Crash Course For Unix Controlling Your Computer From The Terminal Zed A. Shaw December 2011 Introduction How To Use This Course You cannot learn to do this from videos alone. You can learn
More informationA UNIX/Linux in a nutshell
bergman p.1/23 A UNIX/Linux in a nutshell Introduction Linux/UNIX Tommi Bergman tommi.bergman[at]csc.fi Computational Environment & Application CSC IT center for science Ltd. Espoo, Finland bergman p.2/23
More informationIntroduction to Running Hadoop on the High Performance Clusters at the Center for Computational Research
Introduction to Running Hadoop on the High Performance Clusters at the Center for Computational Research Cynthia Cornelius Center for Computational Research University at Buffalo, SUNY 701 Ellicott St
More informationCMSC 216 UNIX tutorial Fall 2010
CMSC 216 UNIX tutorial Fall 2010 Larry Herman Jandelyn Plane Gwen Kaye August 28, 2010 Contents 1 Introduction 2 2 Getting started 3 2.1 Logging in........................................... 3 2.2 Logging
More informationAgenda. Using HPC Wales 2
Using HPC Wales Agenda Infrastructure : An Overview of our Infrastructure Logging in : Command Line Interface and File Transfer Linux Basics : Commands and Text Editors Using Modules : Managing Software
More informationInstructions for Accessing the Advanced Computing Facility Supercomputing Cluster at the University of Kansas
ACF Supercomputer Access Instructions 1 Instructions for Accessing the Advanced Computing Facility Supercomputing Cluster at the University of Kansas ACF Supercomputer Access Instructions 2 Contents Instructions
More informationGeBro-BACKUP. Die Online-Datensicherung. Manual Pro Backup Client on a NAS
GeBro-BACKUP Die Online-Datensicherung. Manual Pro Backup Client on a NAS Created and tested on a QNAP TS-559 Pro Firmware 4.0.2 Intel x86 Architecture Default hardware configuration OBM v6.15.0.0 Last
More informationWord basics. Before you begin. What you'll learn. Requirements. Estimated time to complete:
Word basics Word is a powerful word processing and layout application, but to use it most effectively, you first have to understand the basics. This tutorial introduces some of the tasks and features that
More informationINASP: Effective Network Management Workshops
INASP: Effective Network Management Workshops Linux Familiarization and Commands (Exercises) Based on the materials developed by NSRC for AfNOG 2013, and reused with thanks. Adapted for the INASP Network
More informationVim, Emacs, and JUnit Testing. Audience: Students in CS 331 Written by: Kathleen Lockhart, CS Tutor
Vim, Emacs, and JUnit Testing Audience: Students in CS 331 Written by: Kathleen Lockhart, CS Tutor Overview Vim and Emacs are the two code editors available within the Dijkstra environment. While both
More informationIBM Software Hadoop Fundamentals
Hadoop Fundamentals Unit 2: Hadoop Architecture Copyright IBM Corporation, 2014 US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
More informationEditing Files on Remote File Systems
Terminal Intro (Vol 2) Paul E. Johnson 1 2 1 Department of Political Science 2 Center for Research Methods and Data Analysis, University of Kansas 2015 Outline 1 Editing Without a Mouse! Emacs nano vi
More informationComputer Basics: Tackling the mouse, keyboard, and using Windows
Computer Basics: Tackling the mouse, keyboard, and using Windows Class Description: Interested in learning how to use a computer? Come learn the computer basics at the Muhlenberg Community Library. This
More informationCPSC2800: Linux Hands-on Lab #3 Explore Linux file system and file security. Project 3-1
CPSC2800: Linux Hands-on Lab #3 Explore Linux file system and file security Project 3-1 Linux support many different file systems that can be mounted using the mount command. In this project, you use the
More informationUsing SSH Secure Shell Client for FTP
Using SSH Secure Shell Client for FTP The SSH Secure Shell for Workstations Windows client application features this secure file transfer protocol that s easy to use. Access the SSH Secure FTP by double-clicking
More informationThirty Useful Unix Commands
Leaflet U5 Thirty Useful Unix Commands Last revised April 1997 This leaflet contains basic information on thirty of the most frequently used Unix Commands. It is intended for Unix beginners who need a
More informationNew Lab Intro to KDE Terminal Konsole
New Lab Intro to KDE Terminal Konsole After completing this lab activity the student will be able to; Access the KDE Terminal Konsole and enter basic commands. Enter commands using a typical command line
More informationHadoop Basics with InfoSphere BigInsights
An IBM Proof of Technology Hadoop Basics with InfoSphere BigInsights Part: 1 Exploring Hadoop Distributed File System An IBM Proof of Technology Catalog Number Copyright IBM Corporation, 2013 US Government
More information2 Advanced Session... Properties 3 Session profile... wizard. 5 Application... preferences. 3 ASCII / Binary... Transfer
Contents I Table of Contents Foreword 0 Part I SecEx Overview 3 1 What is SecEx...? 3 2 Quick start... 4 Part II Configuring SecEx 5 1 Session Profiles... 5 2 Advanced Session... Properties 6 3 Session
More informationWINDOWS 7 MANAGE FILES AND FOLDER WITH WINDOWS EXPLORER
WINDOWS 7 MANAGE FILES AND FOLDER WITH WINDOWS EXPLORER Last Edited: 2012-07-10 1 Introduce Windows Explorer... 3 Navigate folders and their contents... 5 Organize files and folders... 8 Move or copy files
More informationHands-On UNIX Exercise:
Hands-On UNIX Exercise: This exercise takes you around some of the features of the shell. Even if you don't need to use them all straight away, it's very useful to be aware of them and to know how to deal
More informationThe Linux Operating System and Linux-Related Issues
Review Questions: The Linux Operating System and Linux-Related Issues 1. Explain what is meant by the term copyleft. 2. In what ways is the Linux operating system superior to the UNIX operating system
More informationRunning your first Linux Program
Running your first Linux Program This document describes how edit, compile, link, and run your first linux program using: - Gnome a nice graphical user interface desktop that runs on top of X- Windows
More informationMS WORD 2007 (PC) Macros and Track Changes Please note the latest Macintosh version of MS Word does not have Macros.
MS WORD 2007 (PC) Macros and Track Changes Please note the latest Macintosh version of MS Word does not have Macros. Record a macro 1. On the Developer tab, in the Code group, click Record Macro. 2. In
More informationConnecting to the ODU Turing Cluster
Connecting to the ODU Turing Cluster Section Terminology remote connection - This refers to a connection that is made over a network between two computers ssh - Secure Shell, a type of remote connection
More informationCisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)
Cisco Networking Academy Program Curriculum Scope & Sequence Fundamentals of UNIX version 2.0 (July, 2002) Course Description: Fundamentals of UNIX teaches you how to use the UNIX operating system and
More informationIntroduction to Microsoft Excel 2010
Introduction to Microsoft Excel 2010 Screen Elements Quick Access Toolbar The Ribbon Formula Bar Expand Formula Bar Button File Menu Vertical Scroll Worksheet Navigation Tabs Horizontal Scroll Bar Zoom
More informationIntroduction to Unix Tutorial
Topics covered in this Tutorial Introduction to Unix Tutorial 1. CSIF Computer Network 2. Local Logging in. 3. Remote computer access: ssh 4. Navigating the UNIX file structure: cd, ls, and pwd 5. Making
More informationHP-UX Essentials and Shell Programming Course Summary
Contact Us: (616) 875-4060 HP-UX Essentials and Shell Programming Course Summary Length: 5 Days Prerequisite: Basic computer skills Recommendation Statement: Student should be able to use a computer monitor,
More informationFEEG6002 - Applied Programming 6 - Working Remotely on Linux Server
FEEG6002 - Applied Programming 6 - Working Remotely on Linux Server Sam Sinayoko 2015-11-06 1 / 25 Outline Learning Outcomes Introduction Connecting to Linux server Transfering files to Linux server Text
More informationIUCLID 5 Guidance and support. Installation Guide Distributed Version. Linux - Apache Tomcat - PostgreSQL
IUCLID 5 Guidance and support Installation Guide Distributed Version Linux - Apache Tomcat - PostgreSQL June 2009 Legal Notice Neither the European Chemicals Agency nor any person acting on behalf of the
More informationIntroduction to the new mainframe Chapter 4: Interactive facilities of z/os: TSO/E, ISPF, and UNIX
Chapter 4: Interactive facilities of z/os: TSO/E, ISPF, and UNIX Chapter 4 objectives Be able to: Log on to z/os Run programs from the TSO READY prompt Navigate through the menu options of ISPF Use the
More informationICS 351: Today's plan
ICS 351: Today's plan routing protocols linux commands Routing protocols: overview maintaining the routing tables is very labor-intensive if done manually so routing tables are maintained automatically:
More informationBirmingham Environment for Academic Research. Introduction to Linux Quick Reference Guide. Research Computing Team V1.0
Birmingham Environment for Academic Research Introduction to Linux Quick Reference Guide Research Computing Team V1.0 Contents The Basics... 4 Directory / File Permissions... 5 Process Management... 6
More informationExcel basics. Before you begin. What you'll learn. Requirements. Estimated time to complete:
Excel basics Excel is a powerful spreadsheet and data analysis application, but to use it most effectively, you first have to understand the basics. This tutorial introduces some of the tasks and features
More informationWindows 8.1 Update 1 Supplement
Illustrated Series Guide to Windows 8.1 Update 1 Changes June 2014 Table of Contents (CTRL+Click a link to navigate directly to Part 1, 2, 3, or 4.) Part 1: What Version of Windows Am I Using? Part 2:
More informationSyntax: cd <Path> Or cd $<Custom/Standard Top Name>_TOP (In CAPS)
List of Useful Commands for UNIX SHELL Scripting We all are well aware of Unix Commands but still would like to walk you through some of the commands that we generally come across in our day to day task.
More informationUnix Tools. Overview. Editors. Editors nedit vi Browsers/HTML Editors Mail Tools Utilities xv xman ftp
Unix Tools Michael B. Spring Department of Information Science and Telecommunications University of Pittsburgh spring@imap.pitt.edu http://www.sis.pitt.edu/~spring Overview Editors nedit vi Browsers/HTML
More informationCSIL MiniCourses. Introduction To Unix (I) John Lekberg Sean Hogan Cannon Matthews Graham Smith. Updated on: 2015-10-14
CSIL MiniCourses Introduction To Unix (I) John Lekberg Sean Hogan Cannon Matthews Graham Smith Updated on: 2015-10-14 What s a Unix? 2 Now what? 2 Your Home Directory and Other Things 2 Making a New Directory
More informationAdafruit's Raspberry Pi Lesson 6. Using SSH
Adafruit's Raspberry Pi Lesson 6. Using SSH Created by Simon Monk Last updated on 2015-04-09 03:47:50 PM EDT Guide Contents Guide Contents Overview Enabling SSH Using SSH on a Mac or Linux SSH under Windows
More informationMicrosoft Access 2010 Part 1: Introduction to Access
CALIFORNIA STATE UNIVERSITY, LOS ANGELES INFORMATION TECHNOLOGY SERVICES Microsoft Access 2010 Part 1: Introduction to Access Fall 2014, Version 1.2 Table of Contents Introduction...3 Starting Access...3
More informationIT Quick Reference Guides Using Windows 7
IT Quick Reference Guides Using Windows 7 Windows Guides This sheet covers many of the basic commands for using the Windows 7 operating system. WELCOME TO WINDOWS 7 After you log into your machine, the
More informationCapture desktop image to Clipboard. Display contextual Help Window. Rename.
Shortcut CTRL+A CTRL+B CTRL+C CTRL+E CTRL+I CTRL+L CTRL+O CTRL+P CTRL+R CTRL+S CTRL+U CTRL+V CTRL+X CTRL+Z CTRL+ESC SHIFT+F10 ESC ALT ALT+ENTER ALT+F4 ALT+PRINT SCREEN PRINT SCREEN F1 F2 F3 DELETE SHIFT+DELETE
More informationA Crash Course on UNIX
A Crash Course on UNIX UNIX is an "operating system". Interface between user and data stored on computer. A Windows-style interface is not required. Many flavors of UNIX (and windows interfaces). Solaris,
More informationGetting Started with the Cadence Software
1 Getting Started with the Cadence Software In this chapter, you learn about the Cadence software environment and the Virtuoso layout editor as you do the following tasks: Copying the Tutorial Database
More information5nine Hyper-V Commander
5nine Hyper-V Commander 5nine Hyper-V Commander provides a local graphical user interface (GUI), and a Framework to manage Hyper-V R2 server and various functions such as Backup/DR, HA and P2V/V2V. It
More informationTheFinancialEdge. Journal Entry Guide
TheFinancialEdge Journal Entry Guide 101811 2011 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical, including
More informationMapping ITS s File Server Folder to Mosaic Windows to Publish a Website
Mapping ITS s File Server Folder to Mosaic Windows to Publish a Website April 16 2012 The following instructions are to show you how to map your Home drive using ITS s Network in order to publish a website
More informationSTATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
More informationIntroduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
More informationYubiKey OSX Login. yubico. Via Yubico-PAM Challenge-Response. Version 1.6. October 24, 2015
YubiKey OSX Login Via Yubico-PAM Challenge-Response Version 1.6 October 24, 2015 YubiKey OSX Login 2015 Yubico. All rights reserved. Page 1 of 18 About Yubico Disclaimer As the inventors of the YubiKey,
More informationTS-800. Configuring SSH Client Software in UNIX and Windows Environments for Use with the SFTP Access Method in SAS 9.2, SAS 9.3, and SAS 9.
TS-800 Configuring SSH Client Software in UNIX and Windows Environments for Use with the SFTP Access Method in SAS 9.2, SAS 9.3, and SAS 9.4 dsas Table of Contents Overview... 1 Configuring OpenSSH Software
More informationsftp - secure file transfer program - how to transfer files to and from nrs-labs
last modified: 2014-01-29 p. 1 CS 111 - useful details The purpose of this handout is to summarize several details you will need for this course: 1. sftp - how to transfer files to and from nrs-labs 2.
More informationBIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005
BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 PLEASE NOTE: The contents of this publication, and any associated documentation provided to you, must not be disclosed to any third party without
More informationMicrosoft Word 2010. Revising Word Documents Using Markup Tools
Microsoft Word 2010 Revising Word Documents Using Markup Tools Preface Word provides several markup tools that make document collaboration easy. Color coding, highlighting, and the ability maintain multiple
More informationMiami University RedHawk Cluster Connecting to the Cluster Using Windows
Miami University RedHawk Cluster Connecting to the Cluster Using Windows The RedHawk cluster is a general purpose research computing resource available to support the research community at Miami University.
More informationText Basics. Introduction
Text Basics Introduction PowerPoint includes all the features you need to produce professionallooking presentations. When you create a PowerPoint presentation, it is made up of a series of slides. The
More informationL01 Introduction to the Unix OS
Geophysical Computing L01-1 1. What is Unix? L01 Introduction to the Unix OS Unix is an operating system (OS): it manages the way the computer works by driving the processor, memory, disk drives, keyboards,
More informationHow to test and debug an ASP.NET application
Chapter 4 How to test and debug an ASP.NET application 113 4 How to test and debug an ASP.NET application If you ve done much programming, you know that testing and debugging are often the most difficult
More informationExtreme computing lab exercises Session one
Extreme computing lab exercises Session one Michail Basios (m.basios@sms.ed.ac.uk) Stratis Viglas (sviglas@inf.ed.ac.uk) 1 Getting started First you need to access the machine where you will be doing all
More informationModel 288B Charge Plate Graphing Software Operators Guide
Monroe Electronics, Inc. Model 288B Charge Plate Graphing Software Operators Guide P/N 0340175 288BGraph (80207) Software V2.01 100 Housel Ave PO Box 535 Lyndonville NY 14098 1-800-821-6001 585-765-2254
More informationAzMERIT Secure Browser Installation Manual For Technology Coordinators
AzMERIT Secure Browser Installation Manual For Technology Coordinators 2014-2015 Revised January 5, 2015 Prepared by the American Institutes for Research Descriptions of the operation of the Test Information
More informationIntroduction to the UNIX Operating System on IT Systems
Information Technology Rice University Document UNIX 1 June 21, 2000 Introduction to the UNIX Operating System on IT Systems This document is intended to introduce you to the UNIX operating system. It
More informationLSN 10 Linux Overview
LSN 10 Linux Overview ECT362 Operating Systems Department of Engineering Technology LSN 10 Linux Overview Linux Contemporary open source implementation of UNIX available for free on the Internet Introduced
More informationTEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 3.4, Last Edited 9/10/2011 Students Name: Date of Experiment: Read the following guidelines before working in
More informationIntroduction to Windows XP
Introduction to Windows XP Academic Computing Support Information Technology Services Tennessee Technological University January 2003 1. What s new in XP New colorful interface. More stable than 9x/Me
More informationDownloading Files using FTP
Downloading Files using FTP Transferring files to and from Barney or other server is done using the File Transfer Protocol, more commonly referred to as FTP. Using FTP, you can transfer files to and from
More informationWORDPAD TUTORIAL WINDOWS 7
WORDPAD TUTORIAL WINDOWS 7 Quick Access bar Home Tab Triangles = More Commands Groups on the Home tab Right paragraph margin Left paragraph Margin & Indent Paragraphs Ruler Hover the mouse pointer over
More informationFred Hantelmann LINUX. Start-up Guide. A self-contained introduction. With 57 Figures. Springer
Fred Hantelmann LINUX Start-up Guide A self-contained introduction With 57 Figures Springer Contents Contents Introduction 1 1.1 Linux Versus Unix 2 1.2 Kernel Architecture 3 1.3 Guide 5 1.4 Typographical
More informationInstalling Proview on an Windows XP machine
Installing Proview on an Windows XP machine This is a guide for the installation of Proview on an WindowsXP machine using VirtualBox. VirtualBox makes it possible to create virtual computers and allows
More informationVMware Horizon FLEX User Guide
Horizon FLEX 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
More informationMost of your tasks in Windows XP will involve working with information
OFFICE 1 File Management Files and Folders Most of your tasks in Windows XP will involve working with information stored on your computer. This material briefly explains how information is stored in Windows
More informationAutomate tasks with Visual Basic macros
Automate tasks with Visual Basic macros If you're not familiar with macros, don't let the term frighten you. A macro is simply a recorded set of keystrokes and instructions that you can use to automate
More informationSecure Browser Installation Manual
Secure Browser Installation Manual 2015 2016 Published August 17, 2015 Prepared by the American Institutes for Research Table of Contents Section I. Introduction to the Secure Browser Manual... 1 Scope...
More informationNo restrictions are placed upon the use of this list. Please notify us of any errors or omissions, thank you, support@elmcomputers.
This list of shortcut key combinations for Microsoft Windows is provided by ELM Computer Systems Inc. and is compiled from information found in various trade journals and internet sites. We cannot guarantee
More information