Tutorial Guide to the IS Unix Service



Similar documents
Linux Overview. Local facilities. Linux commands. The vi (gvim) editor

University of Toronto

Using SSH Secure Shell Client for FTP

Web File Management with SSH Secure Shell 3.2.3

Using SSH Secure FTP Client INFORMATION TECHNOLOGY SERVICES California State University, Los Angeles Version 2.0 Fall 2008.

Virtual Office Remote Installation Guide

Introduction to the UNIX Operating System and Open Windows Desktop Environment

Using SSH Secure File Transfer to Upload Files to Banner

Table of Contents. Welcome Login Password Assistance Self Registration Secure Mail Compose Drafts...

Introductory Note 711 & 811. Remote Access to Computer Science Linux Files Using Secure Shell Protocols

2 Advanced Session... Properties 3 Session profile... wizard. 5 Application... preferences. 3 ASCII / Binary... Transfer

USING STUFFIT DELUXE THE STUFFIT START PAGE CREATING ARCHIVES (COMPRESSED FILES)

WinSCP PuTTY as an alternative to F-Secure July 11, 2006

Introduction to Windows XP

BIGPOND ONLINE STORAGE USER GUIDE Issue August 2005

Mapping ITS s File Server Folder to Mosaic Windows to Publish a Website

Creating a Website with Publisher 2013

Installing the SSH Client v3.2.2 For Microsoft Windows

How To Use Senior Systems Cloud Services

Unix Guide. Logo Reproduction. School of Computing & Information Systems. Colours red and black on white backgroun

NetBackup Backup, Archive, and Restore Getting Started Guide

User Guide Version 3.0

Decision Support AITS University Administration. EDDIE 4.1 User Guide

Creating a Website with MS Publisher

VERITAS NetBackup 6.0

How To Configure CU*BASE Encryption

Dial-up Installation for CWOPA Users (Windows Operating System)

ProjectWise Explorer V8i User Manual for Subconsultants & Team Members

Mikogo User Guide Linux Version

PuTTY/Cygwin Tutorial. By Ben Meister Written for CS 23, Winter 2007

Lab 1 Beginning C Program

Instructions for Accessing the Advanced Computing Facility Supercomputing Cluster at the University of Kansas

CGS 1550 File Transfer Project Revised 3/10/2005

How to use SURA in three simple steps:

Personal Call Manager User Guide. BCM Business Communications Manager

SSL VPN Setup for Windows

Installation Guidelines (MySQL database & Archivists Toolkit client)

The FlexiSchools Online Order Management System Installation Guide

Results CRM 2012 User Manual

Introduction to MS WINDOWS XP

Moxa Device Manager 2.3 User s Manual

CTERA Agent for Linux

Q. The Phone Manager call banner disappears after being displayed for a couple of seconds...5 Q. The Phone Manager icon in the taskbar is blue and

Site Maintenance Using Dreamweaver

Working With Your FTP Site

OnDemand. Getting Started Guide

Legal Notes. Regarding Trademarks KYOCERA Document Solutions Inc.

Xythos on Demand Quick Start Guide For Xythos Drive

Getting Started with KompoZer

Fundamentals of UNIX Lab Networking Commands (Estimated time: 45 min.)

VoIP Quick Start Guide

Attix5 Pro Server Edition

FileZilla: Uploading/Downloading Files to SBI FTP

Remote Desktop Services

NAS 253 Introduction to Backup Plan

Uploading files to a web server using SSH Secure Shell 3.2.9

WebEx Meeting Center User's Guide

You may have been given a download link on your trial software . Use this link to download the software.

Baylor Secure Messaging. For Non-Baylor Users

Password Memory 6 User s Guide

How to FTP (How to upload files on a web-server)

Connecting to Remote Desktop Windows Users

Content Management System Help. basic tutorial on Evergreen s CMS

FTP Manager. User Guide. July Welcome to AT&T Website Solutions SM

Lab 8: Configuring Backups

6 USING WINDOWS XP 6.1 INTRODUCTION

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL

Install FileZilla Client. Connecting to an FTP server

Document Management Quick Reference Guide

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0

READYNAS INSTANT STORAGE. Quick Installation Guide

Getting the most out of your new Aalto workstation An Aalto IT guide for personnel migrating to the new Aalto workstation environment

Guide to the Configuration and Use of SFTP Clients for Uploading Digital Treatment Planning Data to ITC

Cisco Networking Academy Program Curriculum Scope & Sequence. Fundamentals of UNIX version 2.0 (July, 2002)

MAPPING THE WEBDRIVE REFERENCE GUIDE

StrikeRisk v6.0 IEC/EN Risk Management Software Getting Started

Lab 1: Create a Personal Homepage

Secure File Transfer Protocol User Guide

NETWORK PRINT MONITOR User Guide

National Fire Incident Reporting System (NFIRS 5.0) NFIRS Data Entry/Validation Tool Users Guide

Using. - Training Documentation -

The FlexiSchools Online Order Management System Installation Guide

Installing Novell Client Software (Windows 95/98)

SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems

Connecting to LRDC Fileserver Remotely Using Windows XP & SRemote VPN

Microsoft FrontPage 2003

BeamYourScreen User Guide Mac Version

HOW TO USE THE File Transfer Protocol SERVER ftp.architekturaibiznes.com.pl

FireBLAST Marketing Solution v2

Miami University RedHawk Cluster Connecting to the Cluster Using Windows

SSH and Basic Commands

WinSCP for Windows: Using SFTP to upload files to a server

Using WS_FTP. This tutorial explains how to use WS_FTP, a File Transfer Program for Microsoft Windows. INFORMATION SYSTEMS SERVICES.

Magaya Software Installation Guide

Joomla! 2.5.x Training Manual

WinSCP: Secure File Transfer Using WinSCP for Secure File Transfer on Windows

Connecting to LUA s webmail

Using Keil software with Linux via VirtualBox

After going through this lesson you would be able to:

Fairfield University Using Xythos for File Sharing

Transcription:

Tutorial Guide to the IS Unix Service The aim of this guide is to help people to start using the facilities available on the Unix and Linux servers managed by Information Services. It refers in particular to the general purpose Unix server granby. The information in this Guide is also helpful if you are using other Unix/Linux servers.

Contents 1. Servers...1 2. Username and password...1 3. Software for connecting to Unix/Linux hosts...1 4. Text-based (command line) interface via SSH...2 Multiple sessions...5 5. Text-based (command line) interface via SSH with Exceed running in background...5 6. Windows style desktop on granby...5 Points to note about using the desktop...7 Basic features of the KDE desktop...7 7. File permissions a brief description...9 8. Selecting groups of files by pattern matching...9 9. Transferring files between the server and a PC...10 10. Help information...10

1. Servers Information Services provides a Unix server known as granby for general type of work, a Linux (64 bit) server known as caunton for running specialized applications requiring intensive computing power, and also some Unix workstations in various locations. The term Unix Service in this Guide refers to all of these collectively. IS also provides access to a High Performance Computing (HPC) facility using Linux servers. This Guide refers mainly to granby, but much of the information in it is also applicable to the other servers mentioned above. You can check the availability of software on the Unix service and the HPC from the applications web page on the IS website at the link: www.nottingham.ac.uk/is/services/software/ 2. Username and password Before you can use granby, your username must be created on the Unix service. Students can register to use the Unix service from a PC in an IS Computer Room by re-entering the registration software and requesting the creation of a username on the Unix service. Members of staff should contact their School IT Representative. Having obtained a username and password for the Unix service you may use that username and password to access granby, caunton and the IS Unix workstations. After logging in for the first time, using the supplied default password, you must change your password as soon as possible to something known only to you. The change of password will be actioned on the all Unix servers and workstations mentioned above. Note that the Unix command to change your password is: passwd. Please bear in mind that Unix/Linux servers are case sensitive. Your username must be typed in lower case, and each letter of your password must be typed in the correct case in which it was set. 3. Software for connecting to Unix/Linux hosts On PCs in IS Computer Rooms, software for connecting to remote hosts is provided in the NAL folder called Accessing the Internet. If you are using another PC, such as a research group or individual staff PC in a School, you should install this software locally on the PC. For information on how to obtain the installation material, please consult the entries on SSH and Exceed on the Applications web page whose link has been given above. Exceed may be installed from the NAL folder entitled Software Installation or from a CD available from the IT Service Point, while SSH can be downloaded can the website www.ssh.com. When you run this software, it creates an interface on the PC through which you can communicate with the remote servers. Three types of interfaces are available: Tutorial Guide to the IS Unix Service 1

A text-based interface via SSH. The keyboard is used to enter commands and the remote host returns the results only in text form. The mouse cannot be used for input to the remote host, and no graphical output can be displayed. A text-based interface via SSH but with the addition of Exceed running in the background. This works as above, but now the host can launch windows to display graphical output from programs. A Windows style desktop via Exceed. This provides a fully-featured graphical desktop running on granby. Other hosts can be accessed through this desktop. If you are connecting to a University Unix/Linux server, such as granby, from outside the University, you may have to use a text-based interface as in the first method above, since it may be impossible or impractically slow to use graphical displays. A text-based interface is also preferable for short sessions. 4. Text-based (command line) interface via SSH On PCs in public access areas, SSH programs can be run from the NAL folder called Accessing the Internet. The SSH Secure Shell program is recommended. (An alternative is Putty, available in the same NAL folder.) To connect using SSH Secure Shell, double-click on the NAL icon which image is shown below: A window like the one shown below will be launched: Press Quick Connect and in the resulting Connect to Remote Host window: a) Type granby in the Host Name box (from off-campus you will need to type the full address granby.nottingham.ac.uk) b) Type your unix username in lower case in the User Name box 2 Tutorial Guide to the IS Unix Service

c) Press Connect. d) In the window which appears, enter your password. (To delete what you have typed, you can use the back space key or highlight your input with the mouse and press delete.) (Note: You can also connect to caunton or an HPC clone by typing the appropriate host name.) After logging in to granby, you can practise with the following commands in order. Command: pwd ls pico ls ls -l mkdir ls and ls -l cd pwd cd cp Comments: Stands for print working directory. Displays path of current directory. Initially will show home directory path: /home/username Lists the contents of your current directory. Initially it will be empty. This starts the text editor pico. Use this to create a file in your home directory, called, say, beeston.txt After creating and saving a file, try the ls command again. This is an example of an option with a command. The l option of the ls command produces a long list with more information about each file. Stands for make directory. Creates a new directory. For example: mkdir green creates a directory called green in the current directory. This is an example of a parameter (green) with a command (mkdir). Now with a file and a directory in the home directory, try the commands ls and ls -l. Stands for change directory. Changes the current working directory. For example: cd green makes green the current working directory. Now try the pwd command and the output will be of the form: /home/username/green To change back to the home directory, use the command: cd.. The.. (two dots) stands for the parent directory and this command changes to the directory containing the current directory. Note that the command cd without any parameter always changes to the home directory. Stands for copy. It takes two parameters and copies an existing file into another one. For example: cp beeston.txt dunkirk will create a file called dunkirk with the contents of the file beeston.txt. (If a file with the name dunkirk already existed, it would be replaced by the new file.) If the second parameter is a directory, the file is created in that Tutorial Guide to the IS Unix Service 3

ls -l mv rm and rmdir ls -lt and ls -ltr directory. Thus: cp beeston.txt green will create a file in green called beeston.txt as a copy of the file beeston.txt in the home directory. The command: cp beeston.txt green/city.txt will create a file in green called city.txt as a copy of the file beeston.txt which is in the home directory. Try ls -l in the home directory. Change to the directory green (using cd). Try ls -l in this directory. Change back to home directory. Try ls in the following form: ls -l green This is an example of a command with an option l and a parameter green. Stands for move. It takes two parameters and moves (or renames) a file to the new name. For example: mv dunkirk radford will, in effect, rename the file dunkirk as radford. It can also be used in the following forms: mv radford green which moves the file radford to the directory green with the name radford. You can give the moved file a different name by issuing the following command: mv radford green/hyson This would move the file radford to the directory green and give it the name hyson. rm stands for remove. Deletes a file. With option -i it prompts for confirmation before deleting the file. The rmdir command deletes a directory, but only if the directory has been emptied. The ls command also has an option t which causes the files to be listed in time order, with the latest appearing first in the list. Adding the option r reverses the order of the list. To see the effect, first create two files in this order: cp beeston.txt a1 cp beeston.txt z9 Now try the following three commands and check the order of the list: ls -l ls -lt ls -ltr passwd This is used to change your password. The password must be at least 6 characters long and in addition to alphanumeric characters also contain at least one non-alphanumeric character. logout This is used to end your session. You can also press ctrl-d. You can also end your session by doing disconnect in SSH. This is found in the File menu as well as on a button on the toolbar. 4 Tutorial Guide to the IS Unix Service

Multiple sessions Within an SSH session to a host, you can launch another session to the same host by selecting Window from the top menu bar and then selecting New Terminal. There is also an icon for it in the toolbar. With two sessions, you could, for example, view the contents of two different directories in different windows. 5. Text-based (command line) interface via SSH with Exceed running in background In addition to logging in via SSH as above, launch Exceed for SSH. This icon is in the same NAL folder (Accessing the Internet). When it is running, all you will notice is the presence of the Exceed tab in the Windows Task Bar. Now issue the command xclock. An X window will open, displaying a clock showing the current time. The following actions can be performed on this window using the mouse: moving, resizing, minimizing, maximizing, and closing. The following are some commands which run graphical applications or utilities on granby that you can issue and see the effect: maple -cw a mathematical application nedit an editor for text files bluefish an editor for html files kview viewer for graphical images firefox a World Wide Web browser To close Exceed, right-click on the Exceed tab in the Windows Taskbar and select close. 6. Windows style desktop on granby For this you need to launch Exceed for host login from its icon in the Accessing the Internet folder. After starting it, proceed as follows: 1. On the screen headed XDMCP Display Manager Chooser, select granby by either double-clicking on it or left-click on it and press the OK button. This screen looks as below (although you will see some other host names as well as granby): Tutorial Guide to the IS Unix Service 5

2. Then the following welcome screen appears, in which you type your username and click OK (or press Enter): 3. On the next welcome screen, before typing your password, you must first select the KDE 3 desktop. This is done as follows: a) Press and hold the Options button to display the drop-down menu. b) Bring the mouse pointer down to Session. c) In the right-hand menu that appears, click on KDE 3. d) Now make sure that the KDE 3 logo has appeared in the box on the right of the login window. You will see the screen shown above as you perform the last step in selecting the KDE 3 desktop. Note that selecting the KDE 3 desktop is only necessary the first time a username logs in. On subsequent logins under that username, KDE 3 will be selected by default. After this, type your password and click OK (or press Enter). 2. When you launch this desktop for the first time: a) The Welcome to KDE 3 screen appears. We suggest that you select Skip Wizard on it, and then Quit and Keep on the next screen in order to close this wizard. b) After the desktop launches, two further information windows are displayed. You can close these as well. c) Now you are looking at the desktop. The black background is printed with guidance on how you can change the wallpaper to something you like. 6 Tutorial Guide to the IS Unix Service

Points to note about using the desktop In this desktop only a single left click on the mouse is required to launch or open an item (rather than a double click). There may be a delay before there is any response to a left-click because you are communicating with a remote host. Using a right click at any point, you can display a drop-down menu of available actions. Basic features of the KDE desktop The Panel: This is the bar across the bottom of the desktop, with various buttons on it, as shown below. View of left side of panel: K Application Control Home Xterm Desktops Starter Centre K Application Starter button: This displays a pull-up menu whose items have further sub-menus. Everything you can do in the desktop is contained within these menus. The other buttons are short cuts to commonly required actions. Control Centre button: Launches the Control Centre which is used to customize the desktop. Practise with changing the wallpaper as follows through the Control Centre: 1. Expand Look & Feel. 2. Under it, click Background. 3. Select Wallpaper tab. 4. Click the down-arrow in the line beginning Wallpaper. A list of image filenames is displayed. 5. Take the mouse pointer to any filename and the corresponding image will be displayed in a box above it (which looks like a monitor screen). 6. Click on the desired filename to select it. 7. Press the Apply button at the bottom to apply the wallpaper. With the Control Centre still open, practise with the window controls of moving, resizing, minimizing and maximizing this window. XTerm button: Launches a text-mode window, similar to the text-based interface you used earlier, in which you can issue Unix commands. If you issue a command to run a graphical application or utility, a window will open displaying the graphical output, in which you can use graphical features. Tutorial Guide to the IS Unix Service 7

You can also connect to other servers (e.g. caunton or an HPC clone) from an XTerm window by using the ssh command, for example: ssh caunton Desktops: By default KDE3 creates four desktops. Selecting the buttons labeled 1, 2, 3 or 4 brings up the corresponding desktop. You can vary the number of desktops available by going to: Control Centre > Look&Feel >Desktop and selecting the tab Number of Desktops. Home button: This launches a file manager whose appearance is shown below. Note with the following features: Location line shows which folder s contents are being displayed. A tree view of folders is in the left column. In the main window, files and folders are represented by appropriate icons. This iconic view can be changed to the Detailed List view by buttons on the toolbar as well as by the menu selection View > View Mode. Files and folders can be filtered, i.e. only those of a certain type displayed, by going to Tools > View Filter. (To see all contents again, select Reset.) Left-click on a file to view its contents. Note change in the path in Location. The up-arrow or the left-arrow in the toolbar can be used to return to the parent folder or the last folder respectively. Right-click on file to see a drop-down menu of actions on the file (New Window to open it in an editing window, rename, delete, copy, etc.) Left-click on a folder to view its contents. Right-click on a folder and select New Window to open it in a new file manager window. Now drag and drop files from one window to the other and, when dropping, select copy or move in the destination folder. Files and folders can also be dragged to the desktop and placed on it as links (short cuts). 8 Tutorial Guide to the IS Unix Service

Right-click in the background of the contents window to display a drop-down menu to select an action (e.g. Create New to create folder or file). Panel: Buttons on the panel can be removed or moved by right-clicking on a button and selecting the appropriate action. The Panel can be configured by, for example, adding buttons for other applications. To do this, either right-click on an empty part of the Panel or press the K button and select Configure Panel in the pull-up menu. To log out from Exceed, press the K button and select the bottom item in the pull-up menu called logout. There is also a button for it towards the right hand end of the Panel. Do not simply close the Exceed application in Windows XP. 7. File permissions a brief description There are 3 types of permission of access to files and directories: r (for read): allows file and directory contents to be listed. w (for write): allows file to be edited and deleted. x (for execute): applies to script files and other executable files and to directories. There are 4 categories of user: user The user you are logged in as. group all usernames having the same first two letters or a special group. other everyone else. all everyone. Each category can be assigned any combination of rwx permissions. Permissions on files can be seen by issuing the command ls -l and looking at the set of characters in the first column. They are also displayed in the Home file manager if the Detailed List view is selected. If you want files within a directory under your username to be readable by others, then you must give the directory x and r access as well as r access to the files. If you are managing webpages then all files that you wish to be accessible to people from a web browser must be made readable to the category of other. The unix command to change permissions on files and directories is: chmod 8. Selecting groups of files by pattern matching When specifying names of files and folders in commands, the name can be specified as a pattern rather than one exact name. The command will then act on all files and folders whose names match that pattern. The * character is used in a pattern to stand for any character. For example: b* matches all names beginning with b *.txt matches all names ending in.txt pic*.jpg matches all names beginning with pic followed by any characters, or no character, followed by.jpg Tutorial Guide to the IS Unix Service 9

The echo command can be used to list the names that match a pattern. For example: echo *.txt A pattern can be used for names when issuing commands as in the examples below: cp *.txt green copies all *.txt files from current folder to the folder green rm bc* deletes all files in current folder whose names begin with bc chmod a=r * sets read permission for everyone on all files in current directory. 9. Transferring files between the server and a PC There are several FTP programs available for transferring files between a Unix host and a PC which are available in the NAL folder Accessing the Internet. Here we look at SSH FTP Client. This can be launched independently or from within SSH Secure Shell while logged in to the host. The interface is also very similar to Secure Shell. If launched independently, you need to connect to the Unix host by doing Quick Connect (similar to logging in through Secure Shell). After connecting, you will see two windows side by side. The left shows the files and folders on the local system (the PC) and the right shows the same on the remote system (the Unix host) in your home directories on each system. If FTP is launched from within Secure Shell when you are already logged in to the Unix host, then you see these two windows without needing to login. In both windows you can navigate in the filestore to display the source folder (from which you want to copy files or folders) in one window and the destination folder (to which you wish to copy) in the other window. Then you can drag files and folders from the source to the destination. 10. Help information The man command (standing for manual) can be used to display pages of information, known as man entries, about particular commands. For example, man ls will display the entry for the ls command. The listing of the entry pauses when the screen becomes full. Press Enter for the next screenful or press q to quit. In the man entry you can find out from the Options section which options are available with that command and what effect they have. There is an Examples section near the end of the entry giving some examples of how to use the command. To use the man command you have to know the name of the command about which you require information. If you want to find out the name of the command that performs a certain action (e.g. delete a file), there is a command available on granby called howto. For example, the commands: howto delete howto copy will, in each case, list names of Unix commands that can perform those actions. 10 Tutorial Guide to the IS Unix Service