Linux Networking

In: Computers and Technology

Submitted By down36
Words 1169
Pages 5
NT-1430 Unit 2 Lab
Lab Objectives * Perform basic system administration tasks * Creating users * Setting user passwords * Group membership and management * Working with the Linux filesystem structure * Creating files, directories * Commands, options, arguments * Copying files, moving/renaming files, deleting files * File and directory permissions
Lab 1
Record your answers in the spaces provided. 1. Start your virtual machine 2. Log into the system as root with the password you specified last week 3. Create a user account for yourself with the following convention:
[First Initial][Last Name] Example: John Doe would be jdoe a. Be careful, as Linux is a case-sensitive OS. Jdoe != jdoe b. Record the command used:
__________________________________________________
4. Set a password for your newly created account. Record the command used.
____________________________________________
5. Create and set passwords for the following users: c. mark d. max 6. Log out of root and log back in as your newly created account 7. Run the following commands in sequence, and then report your findings: e. ls f. ls –a g. ls –l h. ls –al

8. Run the following commands and report your results. What is different about step 6? i. ls /tmp j. ls –a /tmp k. ls –l /tmp l. ls –al /tmp

9. Which command will display your present working directory? Record the command and its results.

10. Change your directory to /tmp. What command did you use?

11. Run the command from step 8. Are the results different?

12. Run the following commands. For every command, specify if it uses an absolute or relative path, and what it does: m. cd /var/log n. cd /home/<Your username here without the <>…...

Similar Documents

Intro to Linux Networking Unit 2 Hw

...named literature, give three sets of commands you can use to create a subdirectory named classics under literature. Also give several sets of commands you can use to remove the classics directory and its contents. Creating a Subdirectoy : cd /home/max/literature : mkdir classics : ls /home/max.literature (to show directory has been created) Removing a Subdirectory :pwd (to see what directory you are in) : ls (to list your directories) : rmdir /home/max/literature/classics (removes classics directory) 4. The df utility displays all mounted filessystems along with information about each. Use the df utility with the –h(human-readable) option to answer the following questions. i. How many filesystems are mounted on your Linux system? j. Which filesystem stores your home directory? k. Assuming you answer to exercise 4a is two or more, attempt to create a hard link to a file on another filesystem. What error message do you get? What happens when you attempt to create a symbolic link to the file instead? 6. You should have read permission for the /etc/passwd file. To answer the following questions , use cat or less to display /etc/passwd. Look at the fields of information in /etc/passwd for the users on the local system. a. Which character is used to spate fields in /etc/passwd? b. How many fields are used to describe each user? c. How many users are on the local system? d. How many different login shells are in use on......

Words: 578 - Pages: 3

Linux

...NT1430 Linux Networking: Study Guide Wed 21-November-2012 Linux Commands: Know these commands and what they do: • Directory and list commands o ls, ls –l o pwd o cd / o cd and cd~ (hint: both take you to your home directory) o cd .. (takes you up one directory • Know what cp and mv do and how to use them • File viewing commands: o cat o less and more (one page at atime) o vi and view o tail (shows the last 10 lines of a file) o head (shows the top 10 lines) • chmod for changing permissions on files and directories • know the differences in read write and execute for owner group and all • > to redirect output to a file (overwrites if file exists) • >> appends to a file • & puts a process in the background while fg brings it to the foreground. • ps –ef | grep programname locates a running process for you • grep is a program that searches for a string within a directory or command output • The pipe symbol ( | ) sends output from one command to the input of another. • Know what a Linux shell script is. Direcories and file systems • / is the root of the entire file system • /usr stores program files • /home stores user home directories • /etc stores Linux configuration files • /var stores various miscellaneous files • /proc is a virtual directory that stores system performance metrics...

Words: 1137 - Pages: 5

Linux

...is also known as shell. Operating system has following components: a) Kernel b) Networking c) Security d) Shell Kernel is the core of the operating system and it acts as a bridge between application and the actual data processing done at hardware level. These facilities available to application processes through inter-process communication mechanisms and system calls. It provides the lowest-level abstraction layer for the resources that application software must control to perform its function. It also decides at a particular time which process should be allocated to the processor. It is also responsible for allocating memory to various processes. Shell is the software that provides an interface for an operating system to access the services of kernel. The primary purpose of shell is to execute another program. The user interface of the operating system is usually referred to as a shell. Shells are normally of two types: command line and graphical. Command line provides a command line interface (CLI) to the operating system whereas graphical provides a graphical user interface (GUI). Although there are more than 600 Linux distributions available for use but few are popular among the general users. Top five Linux distributions are: a) Ubuntu b) Fedora c) openSUSE d)......

Words: 785 - Pages: 4

Linux

...Red Hat Enterprise Linux 5.3 Release Manifest Package Manifest for all Architectures. Red Hat Enterprise Linux Documentation Don Domingo Copyright © 2008 . This material may only be distributed subject to the terms and conditions set forth in the Open Publication License, V1.0 or later (the latest version of the OPL is presently available at http://www.opencontent.org/openpub/). Red Hat and the Red Hat "Shadow Man" logo are registered trademarks of Red Hat, Inc. in the United States and other countries. All other trademarks referenced herein are the property of their respective owners. 1801 Varsity Drive Raleigh, NC 27606-2072 USA Phone: +1 919 754 3700 Phone: 888 733 4281 Fax: +1 919 754 3701 PO Box 13588 Research Triangle Park, NC 27709 USA Abstract This document is a record of all package changes since the last minor update of Red Hat Enterprise Linux 5 1. Added Packages ................................................................................................................... 1 2. Dropped Packages .............................................................................................................. 19 3. Updated Packages ............................................................................................................... 20 1. Added Packages cmirror-1.1.36-1.el5 • Group: System Environment/Base • Summary: cmirror - The Cluster Mirror Package • Description: cmirror - Cluster Mirroring 1 Release Manifest cmirror-kmod-0.1.21-10.el5 • Group:......

Words: 32183 - Pages: 129

Nt1430 Linux Networking (Unit 1 Linux Server Installation and Configuration)

...time or at different time. It allows many users to take advantage of the computer's resources simultaneously. Some permit 100's to 1000 users to take advantage of the computer's resources simultaneously. They are successful because of the powerful, efficient, stable and secure operating systems like LINUX. It has a capability of providing each user the same data ensuring total privacy from each user even while accessed by 100's of users simultaneously. 2. What is the Free Software Foundation/GNU? Linux? Which parts of the GNU/Linux operating system did each provide? Who else has helped build and refine this operating system? The Free Software Foundation (www.fsf.org) is the principal organizational sponsor of the GNU Project. GNU developed many of the tools, including the C compilers that are part of the GNU/Linux Operating Systems. Linux is the name of an operating system kernel developed by Linus Torvalds and expanded and improved What are multiuser by thousands of people on the Internet. Torvalds’s kernel and GNU’s tools work together as the GNU/Linux Operating System. 3. In what language is Linux written? What does the language have to do with the success of Linux? Linux is written in the C programming language and because it is written in the C language the language can be imbedded in all type of devices from TV’s, to PDA’s, cell phones, cable boxes for the reason of this language being so portable. 4. What is a shell? How does it work with the kernel? With......

Words: 1467 - Pages: 6

Linux Networking

...Linux Networking Homework ------------------------------------------------- Chapter 5 1. Which commands can you use to determine who is logged in on a specific Terminal? Who, w, hostname, finger 3. What happens when you give the following commands if the file name done already exists? $ cp to_do done $ mv to_do done Answer: Either command overwrites Done with contents of To_do. $ cp - copy files and directories,$ mv - move (rename) files 4. How can you find out which utilities are available on your system for editing files? Which utilities are available for editing on your system? Give the command apropos editor. Typical editors are vim, ex, ed, and gedit. 8. What is the result of giving the utility the name of a command that resides in a directory that is not in your search path? $ which me 10. Experiment by calling the file utility with the names of files in /usr/bin. How many different types of files are there? Approximately 20 ------------------------------------------------- Chapter 6 1. Is each of the following an absolute pathname, a relative pathname, or a simple filename? a. milk_co b. correspond/business/milk_co c. /home/max d. /home/max/literature/promo e. .. f. letter.0210 Answer: a= Directory File, b= relative c= absolute d= absolute e= relative f= Simple 2. List the commands you can use to perform these operations: a. Make your home directory the working directory b. Identify the working......

Words: 534 - Pages: 3

Linux Networking

.../home/max/literature/classics, mkdir ~max/literature/classics, or mkdir ~/literature/classics b. To remove the directory and contents rmdir /home/max/literature/classics, rmdir ~max/literature/classics, rmdir ~/literature/classics, rm -r /home/max/literature/classics 4. The df utility displays all mounted filesystems along with information about each. Use the df utility with the –h (human-readable) option to answer the following questions. $ df -h File system Size Used Avail Use% Mounted on /dev/hda1 1.4G 242M 1.1G 18% / /dev/hda3 23M 11M 10M 51% /boot /dev/hda4 1.5G 1.2G 222M 85% /home /dev/hda7 564M 17M 518M 4% /tmp /dev/hdc1 984M 92M 842M 10% /gc1 /dev/hdc2 16G 13G 1.9G 87% /gc2 a. How many filesystems are mounted on your Linux system? 6 b. Which file system stores your home directory? /dev/hda4 c. Assuming your answer to exercise 4a is two or more, attempt to create a hard link to a file on another file system. What error message do you get? What happens when you attempt to create a symbolic link to the file instead? ln: creating hard link '/tmp/xxx' to 'xxx': Invalid cross-device link. No problem creating a cross-device symbolic link. 6. You should have read permission for the /etc/passwd file. To answer the following questions, use cat or less to display /etc/passwd. Look at the fields of information in /etc/passwd for the users on the local system. a. Which character is used to separate fields in /etc/passwd? b. How many fields are......

Words: 663 - Pages: 3

It 1430 Linux Networking Week 3

...Justin Freetage IT 1430 Linux Networking Week 3 1 DNS: is a standard technology for managing the names of Web sites and other Internet domains. 2 Domain: a domain is a sub network made up of a group of clients and servers under the control of one central security database. Within a domain, users authenticate once to a centralized server known as a domain controller, rather than repeatedly authenticating to individual servers and services. Individual servers and services accept the user based on the approval of the domain controller. 3 FQDN: is a domain name that specifies its exact location in the tree hierarchy of the Domain Name System (DNS). It specifies all domain levels, including the top-level domain and the root zone. 4 DNS Resolver: The client-side of the DNS is called a DNS resolver. It is responsible for initiating and sequencing the queries that ultimately lead to a full resolution (translation) of the resource sought, e.g., translation of a domain name into an IP address. 5 Host Name: is a label that is assigned to a device connected to a computer network and that is used to identify the device in various forms of electronic communication such as the World Wide Web, e-mail or Usenet. Hostnames may be simple names consisting of a single word or phrase, or they may be structured. 6 DNS Zone: is a portion of a domain name space using the Domain Name System (DNS) for which administrative responsibility has been delegated. 7 Zone File: zone file is a text......

Words: 862 - Pages: 4

Nt1430 Linux Networking

...NT1430: Linux Networking Unit 4 Homework Assignment Chapter 14: 1. Which commands can you use from the command line to send a file to the default printer? a. lpoptions –d printer 2. Which command would you give to cancel all print jobs on the system? a. cancel job-id 3. Which commands list your outstanding print jobs? a. lpc status 4. What is the purpose of sharing a Linux printer using Samba? a. Sharing a Linux printer using Samba allows Windows and OS/2 clients to send print jobs to the printer. 5. Name three printing protocols that CUPS supports. Which is the CUPS native protocol? a. 1.) System-config-printer 2.) lpinfo Displays available drivers 3.) lpadmin configures printers b. IPP is the native protocol Chapter 10: 1. Describe the similarities and differences between these utilities: a. Scp and ftp i. SCP stands for Secure Copy Protocol, and FTP is an acronym for the File Transfer Protocol, which was the original file transfer protocol. SCP and FTP are two applications for copying files from one computer to another. Both were based on their own protocols, but both now use different prtocols. b. Ssh and telnet i. Both are text-based protocols: mouse movements cannot be transferred only keystrokes. Both are connection-oriented and are client-server protocols. The main difference is in security. SSH offers security mechanisms that protect the user against anyone with malicious intent while Telnet has no security measures whatsoever. c. Rsh......

Words: 284 - Pages: 2

Linux

...University of Sunderland School of Computing and Technology File Management System in Linux CUI Interface A Project Dissertation submitted in partial fulfillment of the Regulations governing the award of the degree of BA in Computer Studies, University of Sunderland 2006 I. Abstract This dissertation details a project to design and produce a prototype Linux character environment file manipulation assisting application. The application is offering a friendly menu driven interface to handle the jobs that non-programmers keep finding cumbersome to master when it comes to working in a Unix/Linux interface, resulting in serious mistakes and much loss of productive time. The Linux File Management System is a basic program for every user at a Unix/Linux terminal. Advantages here include the fact that the support team does not have to be burdened with solving simple file based queries by the employees. The areas of Designing GUI interfaces in Linux and Windows versus Linux Security were researched and a prototype has been designed, developed and tested. An evaluation of the overall success of the project has been conducted and recommendations for future work are also given. Words II. Table of Contents 1) Introduction.................................................................................................................................4 1.1 Overview.................................

Words: 17681 - Pages: 71

Linux Networking Unit 1 Assignment

...Unit 1 Assignment Chapter 1 ex 1. What is free software? List three characteristics of free software. Free software is software that is available for anyone to use and modify however they like. 3 characteristics of free software are that, you are free to study, redistribute, and modify it free of cost. Chapter 2 ex 1. Briefly, what does the process of installing an operating system such as Fedora/RHEL involve? Installing the Fedora/RHEL OS is copying the OS files from a CD, DVD, or Flash drive on to the hard drives of the system then setting up the config files so the Linux runs properly on the hardware. Chapter 3 ex 1. What is a live system? What advantages does it have over an installed system? A live session is a Linux session that is running on your computer without you actually installing Linux on your computer. The advantages you have by running a live session is you can preview the system without installing it and your computer will not be changed. 4. Where on the disk should you put your /boot partition or the root (/) partition if you do not use a /boot partition? Default layout 8. When does a Fedora/RHEL system start X by default? To start X by default you need to set run level 5 to be the default and it will start when the system boots. Chapter 11 ex 1. How does single-user mode differ from multiuser mode In single user mode, only the console user may be logged in, though the user can edit files and execute multiple programs simultaneousl 3. What......

Words: 426 - Pages: 2

Nt1430 Linux Networking

... * Linux is free software.  It is free to be studied, redistributed, and modified. Why is Linux popular? Why is it popular in academia? * Due to the operating system's distribution among universities, students were able to become used to its sophisticated developing environment which helped these graduates succeed in the industry as UNIX was being spread throughout the world. What are multiuser systems? Why are they successful? * Multiuser is a term that defines an operating system or application software that allows access by multiple users of a computer. They are so successful because they allow for collaborative projects to be conducted with much more ease and efficiency.  What is the Free Software Foundation/GNU? What is Linux? Which parts of the Linux operating system did each provide? Who else has helped build and refine this operating system? * The GNU is a completely free (in the freedom sense) operating system built by Richard Stallman and many of its components, except for the kernel, were completed in the early '90s. Linus Torvalds wrote the kernel for Linux, which was also intended to be a free operating system, in the early '90s. The two systems then were combined together to finish Linux, with its original kernel and added features supplied by GNU. Linux was born off the internet with hundreds of people helping to develop it in its early years. In which language is Linux written? What does the language have to do with the success of Linux? ...

Words: 520 - Pages: 3

Cis 246 Week 7 Ilab 7 Linux Networking

...CIS 246 Week 7 iLab 7 Linux Networking Purchase here http://devrycourse.com/cis-246-week-7-ilab-7-linux-networking Product Description iLab 7 of 7: Linux Networking Submit your assignment to the Dropbox located on the silver tab at the top of this page. (See the Syllabus section “Due Dates for Assignments & Exams” for due date information.) Connect to the iLab here. iLAB OVERVIEW Scenario and Summary • Before beginning work, connect to your virtual lab platform (Skillsoft / Element K). • In this lab, you will configure static networking on a Linux PC so that it can communicate with the other server in your lab environment. Additional Resource You may find this resource helpful as you prepare to complete the lab. • Local Area Network (LAN) Management iLAB STEPS STEP 1: Complete Lab Instructions Back to Top Follow the steps to complete this week’s lab, located in this document: Week 7 Lab Instructions. STEP 2: Complete Lab Report Back to Top Fill out the lab report for this week. • Week 7 Lab Report Submit your lab to the Dropbox located on the silver tab at the top of this page. For instructions on how to use the Dropbox, read these step-by-step instructions or watch this Dropbox Tutorial. CIS 246 Week 7 iLab 7 Linux Networking Purchase here http://devrycourse.com/cis-246-week-7-ilab-7-linux-networking Product Description iLab 7 of 7: Linux Networking Submit your assignment to the Dropbox located on the silver tab......

Words: 1457 - Pages: 6

Linux

...students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Blum, R. (2008). Linux® command line and shell scripting bible. Indianapolis, IN: Wiley. Love, P., Merlino, J., Zimmerman, C., Reed, J. C., & Weinstein, P. (2005). Beginning Unix®. Indianapolis, IN: Wiley. Software RedHat Linux 5 (Virtual Desktop) Article References Ahmed, M. F., & Gokhale, S. (2009). Reliable operating systems: Overview and techniques. IETE Technical Review, 26(6), 461–469. Anthes, G. (2009, June 20-July 27). UNIX turns 40. Computerworld, 43(24), 16. Berlot, M., & Sang, J. (2008, January). Dealing with process overload attacks in UNIX. Information Security Journal: A Global Perspective, 17(1), 33–44. Cantrill, B., & Bonwick, J. (2008, November). Real-world concurrency. Communications of the ACM, 51(11), 34–39. Hendler, J., Shadbolt, N., Hall, W., Berners-Lee, T., & Weitzner, D. (2008, July). Web science: An......

Words: 1560 - Pages: 7

Linux

...After researching some popular commercial windows applications, I have found a few good open-source alternatives for Linux users. The four Windows applications I researched were Adobe Acrobat, Adobe Photoshop, Internet Explorer, and Norton Anti-Virus. The most user friendly Adobe Acrobat alternative I found was PDFMod. This a very user friendly platform with a nice GUI interface that allows you to reorder, rotate, and remove pages, export images from a document, edit the title, subject, author, and keywords, and combine documents via drag and drop. This program is very simple and easy to use to modify PDF documents. Adobe Photoshop was a little harder to find a good alternative, but I think that GIMP 2.6 answers that call. GIMP is a very simple yet complex application that can be used as a simple paint program, an expert quality photo retouching program, an online batch processing system, a mass production image renderer, an image format converter, etc. You can expand GIMP with the use of plug-ins and extensions to do just about anything. Gimp also has an advanced scripting interface allows everything from the simplest task to the most complex image manipulation procedures to be easily scripted. An obvious choice for me as a replacement for Internet Explorer(due to the fact that I already use it) is Mozilla Firefox. Firefox is, in my opinion, a superior browser with better security, performance, personalization, etc. With Firefox you can sync your desktop browser with......

Words: 446 - Pages: 2