Here are the steps to complete the assignment:
1. Login as guest user (password is guest)
2. To find the present working directory: pwd
3. The root directory structure includes: /bin, /dev, /etc, /home, /lib, /root, /sbin, /tmp, /usr etc.
4. A few commands in /bin are: ls, cp, mv, rm, chmod. Commands in /sbin are: ifconfig, route, iptables etc.
5. The guest home directory is /home/guest
6. The permissions of the guest home directory are: drwxr-xr-x
7. To create a new
Here are the steps to complete the assignment:
1. Logged in as guest user
2. Present working directory is /home/guest
3. Wrote the structure of root directory /
4. A few commands in /bin are ls, cp, mv. A few in /sbin are ifconfig, route
5. Guest directory is /home/guest
6. Permissions of /home/guest are drwxr-xr-x
7. Created directory test in /home/guest
8. Copied /etc/resolv.conf to /home/guest/test
9. Renamed /home/guest/test to /home/guest/testing
10. Deleted
This document outlines the content of a Linux system and network administration course taught over 15 lectures and labs. The course covers topics such as Linux installation, desktop environments, file systems, user administration, networking configuration including DHCP, NIS, NFS, DNS, mail servers and firewalls. It also covers troubleshooting, system monitoring and installing additional software packages. The course is graded based on two exams and a lab component, and requires a minimum of 80% attendance and 60% marks to pass.
This document discusses user administration concepts and mechanisms in UNIX/Linux operating systems. It covers topics like users, groups, permissions, and how to manage users and groups. Specific commands to manage files, directories and permissions are also described, such as chown, chgrp, and chmod. The structure of standard UNIX/Linux directories like /bin, /dev, /etc, and others are outlined as well.
This document provides an introduction to the Linux operating system, including:
- A brief history of Unix from its creation in 1969 to the development of Linux in 1991.
- An overview of what Linux is and some popular Linux distributions.
- A description of the Unix/Linux file system structure and standard directory layout.
- An explanation of users, groups, and permissions and how the operating system manages access to files and programs.
- Examples of common Linux commands for navigating directories, manipulating files, and changing permissions.
- Linux originated as a clone of the UNIX operating system. Key developers included Linus Torvalds and developers from the GNU project.
- Linux is open source, multi-user, and can run on a variety of hardware. It includes components like the Linux kernel, shell, terminal emulator, and desktop environments.
- The document provides information on common Linux commands, files, users/groups, permissions, and startup scripts. It describes the Linux file system and compression/archiving utilities.
In February, 2016 I had the privilege of working with employees of STARR Computers on a course to orient them to Linux. The course was delivered over a series of 90-120 minute sessions. It was designed so that
This is a compilation of the slides which were used. There were some other resources which were shared. There were practice exercises which were designed to reinforce some concepts.
Check http://churchroadman.blogspot.com/2016/04/basic-orientation-to-linux-course.html for some other details.
NanoCdac Providing linux administration training in Hyderabad. Training includes Linux Internals and Device Drivers,Real -Time Operating System (RTLinux) Programming,Linux System programming,Linux Device Drivers Programming.Our aim is to quality training to the students and professionals Call Us-040 -23754144,+91- 9640648777
This presentation is completely designed for Industrial Training Presentation only that is needed by the Student in order to submit in the colleges. It contain Linux Introduction, Servers and Services, File System and many more about Linux
This document discusses embedded Linux programming. It covers topics such as what Linux is, the layers in a Linux system including the kernel and user programs, how Linux differs from legacy real-time operating systems, and an agenda for a course on embedded Linux driver development that covers the Linux kernel, memory management, interrupts, and networking. It also provides information on basic Linux command line tools and file permissions.
This document discusses the Linux file system structure. It begins with the root directory designated by a forward slash. Under the root are key directories like /bin, /boot, /dev, /etc, /home, /lib, /mnt, /media, /opt, /proc, /root, /sbin, /tmp, /usr, and /var that store important system files, configuration files, user files, libraries, and more. The document explains the purpose and contents of each directory to illustrate how the overall file system structure supports the functioning of the operating system.
The document provides information about Linux OS and shell programming. It discusses the history and evolution of Linux from being a student project to a robust OS. Key people involved in its development like Richard Stallman, Linus Torvalds, and Andy Tanenbaum are mentioned. The architecture of Linux including kernel, system libraries, system utilities etc. is explained. Important commands, file system structure, file permissions and text editors in Linux are also summarized.
Unix was created in 1969 by Ken Thompson at Bell Labs to allow multiple users to access a computer simultaneously. It features a multi-user design, hierarchical file system, and shell interface. The kernel handles memory management, process scheduling, and device interactions to enable these features. Common Unix commands like cat, ls, cp and rm allow users to work with files and directories from the shell. File permissions and ownership are managed through inodes to control access across users.
Get Started with Linux Management Command line Basic KnowledgeDavid Clark
Ìý
This document provides an introduction to Linux and outlines an agenda for getting started. It covers topics such as the Linux environment, file system operations and structure, utilities, permissions, processes, basic administration, and shortcuts. The document also lists common Linux distributions and gives overviews of what Linux is and its kernel development history.
This document provides an overview of shell scripting. It begins with an agenda that covers introducing UNIX/Linux and shell, basic shell scripting structure, shell programming with variables, operators, and logic structures. It then gives examples of shell scripting applications in research computing and concludes with hands-on exercises. The document discusses the history and architecture of UNIX/Linux, commonly used shells like bash and csh, and why shell scripting is useful for tasks like preparing input files, job monitoring, and output processing. It also covers basic UNIX commands, commenting in scripts, and debugging strategies.
This document provides a summary of the Unix and GNU/Linux command line. It begins with an overview of files and file systems in Unix, including that everything is treated as a file. It then discusses command line interpreters (shells), and commands for handling files and directories like ls, cd, cp, and rm. It also covers redirecting standard input/output, pipes, and controlling processes. The document is intended as training material and provides a detailed outline of its contents.
The document summarizes the contents of a training on the Unix and GNU/Linux command line. It covers shells and command line interpreters, the filesystem structure, file handling commands like ls, cd, cp, and file permissions. It also discusses standard input/output redirection, pipes, process control and environment variables. The training contents are organized into 5 sections covering these topics at an introductory level.
The document summarizes the contents of a training presentation on the Unix and GNU/Linux command line. It covers shells and command line interpreters, the filesystem structure including common directories, file handling commands like ls, cd, cp, and an introduction to pipes and I/O redirection. Special files and directories like symlinks, devices, and ~ (home directory) are explained. File permissions and ownership are also mentioned.
The document provides an overview of common Linux commands organized into categories, with brief explanations of each command. It covers commands for working with files and directories (ls, cd, cp, rm), processes (ps, top, kill), networking (ping, ifconfig), file archiving and compression (tar, gzip), and more. It also lists important directories in the Linux file system such as /bin, /usr/bin, /etc, and directories under /usr.
Lesson 2 Understanding Linux File SystemSadia Bashir
Ìý
The document provides an overview of Linux file systems and file types. It discusses:
1) The main types of files in Linux including directories, special files, links, sockets and pipes.
2) The standard Linux directory structure and the purpose of directories like /bin, /sbin, /etc, and /usr.
3) Common Linux file extensions and hidden files that begin with a dot.
4) Environment variables and how they can be used to customize a system.
5) Symbolic links and how they create references to files without copying the actual file.
The document discusses the UNIX operating system. It describes UNIX as a stable, multi-user, multi-tasking system used for servers, desktops and laptops. It also discusses the different components that make up the UNIX system, including the kernel, shell, and programs. It explains the directory structure and file hierarchy with the root directory at the top. It provides examples of different types of files and concludes by describing some basic date and time commands in UNIX.
The document discusses the UNIX operating system. It describes UNIX as a stable, multi-user operating system developed in the 1960s for servers, desktops, and laptops. The UNIX operating system consists of three main parts: the kernel, the shell, and programs. The kernel allocates resources and handles processes and communications, while the shell acts as an interface between the user and kernel. There are various versions of UNIX that share common features.
Host security measures aim to comprehensively protect individual hosts through host-centric approaches tailored to the host's architecture and configuration. This involves securing configurations, access controls, permissions and services on Unix-like systems. Common weaknesses include password issues, exploitable services and improper permissions. Unix uses users, groups and world permissions on files and directories to control access. Proper configuration of these permissions and use of setuid programs is important for security. The Unix password system has evolved from storing passwords in plaintext to using shadow files and stronger encryption.
Host security measures aim to comprehensively protect individual hosts through host-centric approaches tailored to the host's architecture and configuration. This involves securing configurations, access controls, permissions and services on Unix-like systems. Common weaknesses include password issues, exploitable services and improper permissions. Unix uses users, groups and world permissions on files and directories to control access. Sensitive system directories must have proper permissions to balance security and usability. Remote access utilities like rlogin pose risks if not properly configured, so disabling them in favor of SSH is recommended. The Unix password system has evolved from insecure early implementations to more secure modern schemes that hash passwords and store them separately from account details.
Linux is an open-source operating system that provides free and secure software. It allows applications and users to access computer devices and functions through the kernel, which manages communication between hardware, software, and processes. Files, directories, programs, and devices are all treated as files in the Linux file system hierarchy, accessed through commands like ls, mkdir, and rmdir.
This document provides an overview of getting started with Linux. It covers topics such as what Linux is, the basic file system structure and operations, utilities for file management, process management, system administration, and common keyboard shortcuts. The document also lists some of the top Linux distributions and recommends next steps for learning more advanced topics like Vim, shell scripting, sed, awk, and pursuing Linux certification.
This PDF highlights how engineering model making helps turn designs into functional prototypes, aiding in visualization, testing, and refinement. It covers different types of models used in industries like architecture, automotive, and aerospace, emphasizing cost and time efficiency.
This document discusses embedded Linux programming. It covers topics such as what Linux is, the layers in a Linux system including the kernel and user programs, how Linux differs from legacy real-time operating systems, and an agenda for a course on embedded Linux driver development that covers the Linux kernel, memory management, interrupts, and networking. It also provides information on basic Linux command line tools and file permissions.
This document discusses the Linux file system structure. It begins with the root directory designated by a forward slash. Under the root are key directories like /bin, /boot, /dev, /etc, /home, /lib, /mnt, /media, /opt, /proc, /root, /sbin, /tmp, /usr, and /var that store important system files, configuration files, user files, libraries, and more. The document explains the purpose and contents of each directory to illustrate how the overall file system structure supports the functioning of the operating system.
The document provides information about Linux OS and shell programming. It discusses the history and evolution of Linux from being a student project to a robust OS. Key people involved in its development like Richard Stallman, Linus Torvalds, and Andy Tanenbaum are mentioned. The architecture of Linux including kernel, system libraries, system utilities etc. is explained. Important commands, file system structure, file permissions and text editors in Linux are also summarized.
Unix was created in 1969 by Ken Thompson at Bell Labs to allow multiple users to access a computer simultaneously. It features a multi-user design, hierarchical file system, and shell interface. The kernel handles memory management, process scheduling, and device interactions to enable these features. Common Unix commands like cat, ls, cp and rm allow users to work with files and directories from the shell. File permissions and ownership are managed through inodes to control access across users.
Get Started with Linux Management Command line Basic KnowledgeDavid Clark
Ìý
This document provides an introduction to Linux and outlines an agenda for getting started. It covers topics such as the Linux environment, file system operations and structure, utilities, permissions, processes, basic administration, and shortcuts. The document also lists common Linux distributions and gives overviews of what Linux is and its kernel development history.
This document provides an overview of shell scripting. It begins with an agenda that covers introducing UNIX/Linux and shell, basic shell scripting structure, shell programming with variables, operators, and logic structures. It then gives examples of shell scripting applications in research computing and concludes with hands-on exercises. The document discusses the history and architecture of UNIX/Linux, commonly used shells like bash and csh, and why shell scripting is useful for tasks like preparing input files, job monitoring, and output processing. It also covers basic UNIX commands, commenting in scripts, and debugging strategies.
This document provides a summary of the Unix and GNU/Linux command line. It begins with an overview of files and file systems in Unix, including that everything is treated as a file. It then discusses command line interpreters (shells), and commands for handling files and directories like ls, cd, cp, and rm. It also covers redirecting standard input/output, pipes, and controlling processes. The document is intended as training material and provides a detailed outline of its contents.
The document summarizes the contents of a training on the Unix and GNU/Linux command line. It covers shells and command line interpreters, the filesystem structure, file handling commands like ls, cd, cp, and file permissions. It also discusses standard input/output redirection, pipes, process control and environment variables. The training contents are organized into 5 sections covering these topics at an introductory level.
The document summarizes the contents of a training presentation on the Unix and GNU/Linux command line. It covers shells and command line interpreters, the filesystem structure including common directories, file handling commands like ls, cd, cp, and an introduction to pipes and I/O redirection. Special files and directories like symlinks, devices, and ~ (home directory) are explained. File permissions and ownership are also mentioned.
The document provides an overview of common Linux commands organized into categories, with brief explanations of each command. It covers commands for working with files and directories (ls, cd, cp, rm), processes (ps, top, kill), networking (ping, ifconfig), file archiving and compression (tar, gzip), and more. It also lists important directories in the Linux file system such as /bin, /usr/bin, /etc, and directories under /usr.
Lesson 2 Understanding Linux File SystemSadia Bashir
Ìý
The document provides an overview of Linux file systems and file types. It discusses:
1) The main types of files in Linux including directories, special files, links, sockets and pipes.
2) The standard Linux directory structure and the purpose of directories like /bin, /sbin, /etc, and /usr.
3) Common Linux file extensions and hidden files that begin with a dot.
4) Environment variables and how they can be used to customize a system.
5) Symbolic links and how they create references to files without copying the actual file.
The document discusses the UNIX operating system. It describes UNIX as a stable, multi-user, multi-tasking system used for servers, desktops and laptops. It also discusses the different components that make up the UNIX system, including the kernel, shell, and programs. It explains the directory structure and file hierarchy with the root directory at the top. It provides examples of different types of files and concludes by describing some basic date and time commands in UNIX.
The document discusses the UNIX operating system. It describes UNIX as a stable, multi-user operating system developed in the 1960s for servers, desktops, and laptops. The UNIX operating system consists of three main parts: the kernel, the shell, and programs. The kernel allocates resources and handles processes and communications, while the shell acts as an interface between the user and kernel. There are various versions of UNIX that share common features.
Host security measures aim to comprehensively protect individual hosts through host-centric approaches tailored to the host's architecture and configuration. This involves securing configurations, access controls, permissions and services on Unix-like systems. Common weaknesses include password issues, exploitable services and improper permissions. Unix uses users, groups and world permissions on files and directories to control access. Proper configuration of these permissions and use of setuid programs is important for security. The Unix password system has evolved from storing passwords in plaintext to using shadow files and stronger encryption.
Host security measures aim to comprehensively protect individual hosts through host-centric approaches tailored to the host's architecture and configuration. This involves securing configurations, access controls, permissions and services on Unix-like systems. Common weaknesses include password issues, exploitable services and improper permissions. Unix uses users, groups and world permissions on files and directories to control access. Sensitive system directories must have proper permissions to balance security and usability. Remote access utilities like rlogin pose risks if not properly configured, so disabling them in favor of SSH is recommended. The Unix password system has evolved from insecure early implementations to more secure modern schemes that hash passwords and store them separately from account details.
Linux is an open-source operating system that provides free and secure software. It allows applications and users to access computer devices and functions through the kernel, which manages communication between hardware, software, and processes. Files, directories, programs, and devices are all treated as files in the Linux file system hierarchy, accessed through commands like ls, mkdir, and rmdir.
This document provides an overview of getting started with Linux. It covers topics such as what Linux is, the basic file system structure and operations, utilities for file management, process management, system administration, and common keyboard shortcuts. The document also lists some of the top Linux distributions and recommends next steps for learning more advanced topics like Vim, shell scripting, sed, awk, and pursuing Linux certification.
This PDF highlights how engineering model making helps turn designs into functional prototypes, aiding in visualization, testing, and refinement. It covers different types of models used in industries like architecture, automotive, and aerospace, emphasizing cost and time efficiency.
Optimization of Cumulative Energy, Exergy Consumption and Environmental Life ...J. Agricultural Machinery
Ìý
Optimal use of resources, including energy, is one of the most important principles in modern and sustainable agricultural systems. Exergy analysis and life cycle assessment were used to study the efficient use of inputs, energy consumption reduction, and various environmental effects in the corn production system in Lorestan province, Iran. The required data were collected from farmers in Lorestan province using random sampling. The Cobb-Douglas equation and data envelopment analysis were utilized for modeling and optimizing cumulative energy and exergy consumption (CEnC and CExC) and devising strategies to mitigate the environmental impacts of corn production. The Cobb-Douglas equation results revealed that electricity, diesel fuel, and N-fertilizer were the major contributors to CExC in the corn production system. According to the Data Envelopment Analysis (DEA) results, the average efficiency of all farms in terms of CExC was 94.7% in the CCR model and 97.8% in the BCC model. Furthermore, the results indicated that there was excessive consumption of inputs, particularly potassium and phosphate fertilizers. By adopting more suitable methods based on DEA of efficient farmers, it was possible to save 6.47, 10.42, 7.40, 13.32, 31.29, 3.25, and 6.78% in the exergy consumption of diesel fuel, electricity, machinery, chemical fertilizers, biocides, seeds, and irrigation, respectively.
Preface: The ReGenX Generator innovation operates with a US Patented Frequency Dependent Load Current Delay which delays the creation and storage of created Electromagnetic Field Energy around the exterior of the generator coil. The result is the created and Time Delayed Electromagnetic Field Energy performs any magnitude of Positive Electro-Mechanical Work at infinite efficiency on the generator's Rotating Magnetic Field, increasing its Kinetic Energy and increasing the Kinetic Energy of an EV or ICE Vehicle to any magnitude without requiring any Externally Supplied Input Energy. In Electricity Generation applications the ReGenX Generator innovation now allows all electricity to be generated at infinite efficiency requiring zero Input Energy, zero Input Energy Cost, while producing zero Greenhouse Gas Emissions, zero Air Pollution and zero Nuclear Waste during the Electricity Generation Phase. In Electric Motor operation the ReGen-X Quantum Motor now allows any magnitude of Work to be performed with zero Electric Input Energy.
Demonstration Protocol: The demonstration protocol involves three prototypes;
1. Protytpe #1, demonstrates the ReGenX Generator's Load Current Time Delay when compared to the instantaneous Load Current Sine Wave for a Conventional Generator Coil.
2. In the Conventional Faraday Generator operation the created Electromagnetic Field Energy performs Negative Work at infinite efficiency and it reduces the Kinetic Energy of the system.
3. The Magnitude of the Negative Work / System Kinetic Energy Reduction (in Joules) is equal to the Magnitude of the created Electromagnetic Field Energy (also in Joules).
4. When the Conventional Faraday Generator is placed On-Load, Negative Work is performed and the speed of the system decreases according to Lenz's Law of Induction.
5. In order to maintain the System Speed and the Electric Power magnitude to the Loads, additional Input Power must be supplied to the Prime Mover and additional Mechanical Input Power must be supplied to the Generator's Drive Shaft.
6. For example, if 100 Watts of Electric Power is delivered to the Load by the Faraday Generator, an additional >100 Watts of Mechanical Input Power must be supplied to the Generator's Drive Shaft by the Prime Mover.
7. If 1 MW of Electric Power is delivered to the Load by the Faraday Generator, an additional >1 MW Watts of Mechanical Input Power must be supplied to the Generator's Drive Shaft by the Prime Mover.
8. Generally speaking the ratio is 2 Watts of Mechanical Input Power to every 1 Watt of Electric Output Power generated.
9. The increase in Drive Shaft Mechanical Input Power is provided by the Prime Mover and the Input Energy Source which powers the Prime Mover.
10. In the Heins ReGenX Generator operation the created and Time Delayed Electromagnetic Field Energy performs Positive Work at infinite efficiency and it increases the Kinetic Energy of the system.
Integration of Additive Manufacturing (AM) with IoT : A Smart Manufacturing A...ASHISHDESAI85
Ìý
Combining 3D printing with Internet of Things (IoT) enables the creation of smart, connected, and customizable objects that can monitor, control, and optimize their performance, potentially revolutionizing various industries. oT-enabled 3D printers can use sensors to monitor the quality of prints during the printing process. If any defects or deviations from the desired specifications are detected, the printer can adjust its parameters in real time to ensure that the final product meets the required standards.
Engineering at Lovely Professional University (LPU).pdfSona
Ìý
LPU’s engineering programs provide students with the skills and knowledge to excel in the rapidly evolving tech industry, ensuring a bright and successful future. With world-class infrastructure, top-tier placements, and global exposure, LPU stands as a premier destination for aspiring engineers.
Welcome to the March 2025 issue of WIPAC Monthly the magazine brought to you by the LinkedIn Group WIPAC Monthly.
In this month's edition, on top of the month's news from the water industry we cover subjects from the intelligent use of wastewater networks, the use of machine learning in water quality as well as how, we as an industry, need to develop the skills base in developing areas such as Machine Learning and Artificial Intelligence.
Enjoy the latest edition
This presentation provides an in-depth analysis of structural quality control in the KRP 401600 section of the Copper Processing Plant-3 (MOF-3) in Uzbekistan. As a Structural QA/QC Inspector, I have identified critical welding defects, alignment issues, bolting problems, and joint fit-up concerns.
Key topics covered:
✔ Common Structural Defects – Welding porosity, misalignment, bolting errors, and more.
✔ Root Cause Analysis – Understanding why these defects occur.
✔ Corrective & Preventive Actions – Effective solutions to improve quality.
✔ Team Responsibilities – Roles of supervisors, welders, fitters, and QC inspectors.
✔ Inspection & Quality Control Enhancements – Advanced techniques for defect detection.
📌 Applicable Standards: GOST, KMK, SNK – Ensuring compliance with international quality benchmarks.
🚀 This presentation is a must-watch for:
✅ QA/QC Inspectors, Structural Engineers, Welding Inspectors, and Project Managers in the construction & oil & gas industries.
✅ Professionals looking to improve quality control processes in large-scale industrial projects.
📢 Download & share your thoughts! Let's discuss best practices for enhancing structural integrity in industrial projects.
Categories:
Engineering
Construction
Quality Control
Welding Inspection
Project Management
Tags:
#QAQC #StructuralInspection #WeldingDefects #BoltingIssues #ConstructionQuality #Engineering #GOSTStandards #WeldingInspection #QualityControl #ProjectManagement #MOF3 #CopperProcessing #StructuralEngineering #NDT #OilAndGas
1. LINUX SYSTEM AND
NETWORK ADMINISTRATION
NIKHIL RAUT
Shri Ramdeobaba College of Engineering
https://linktr.ee/nikhil_raut
2. Module I
Lecture/Lab 1
ï‚´ Introduction to UNIX
- UNIX Operating System Architecture
ï‚´ Linux Operating System
ï‚´ Users, Groups and Permissions
- Examining Permissions
Lecture/Lab 2
ï‚´ Linux Installation
ï‚´ Hard Disk Partition Details
ï‚´ Linux File System
- ext2 / ext3
ï‚´ Dual Boot Installation
Lecture/Lab 3
ï‚´ Desktop Familiarization
- Text and GUI Mode
- Virtual Terminals
- GNOME and KDE Desktop
Course Content
3. Module I
Lecture/Lab 4 & 5
ï‚´ UNIX Shell
ï‚´ UNIX Commands
ï‚´ Shell Commands
- File System Management
- File Management and Viewing
- Help, Job and Process Management
- Network Management
- System Management
- User Management
- Printing and Programming
- Document Preparation
- Miscellaneous
Lecture/Lab 6
ï‚´ System Initialization and Services
- Boot Sequence, Runlevels & Daemon Processes
ï‚´ User Administration
- User Creation/ Suspension & Deletion
- Group Administration
Course Content
4. Module I
Lecture/Lab 7
ï‚´ Network Configuration
- Configuration Utilities
- Multiple NICs
ï‚´ Task Schedulers
- cron daemons
ï‚´ Disk quota management
ï‚´ Backup and Restore
Lecture/Lab 8
ï‚´ Adding and Removing Software Packages
ï‚´ RPM Package Management
ï‚´ Setting Printer
ï‚´ System Monitoring
- File System Analysis
- System Log Files & Analysis
ï‚´ System Troubleshooting
- Filesystem Corruption and Recovery
- Things to check: The X Window System
- Service, Networking & Booting
- The Rescue Environment
- Recovery Runlevels, Boot Floppies
Course Content
5. Module II
Lecture/Lab 9
ï‚´ DHCP
- Server setup
- Client setup
ï‚´ NIS
- NIS Server setup
- NIS Clinet setup
Lecture/Lab 10
ï‚´ NFS
- NFS Serever & Client configuration
- autofs implementation
ï‚´ Samba Server
- File & Print Service
Lecture/Lab 11
ï‚´ Basic Concept of DNS
- Implementation of BIND
- forward & reverse lookup
- DNS Directives
Course Content
6. Module II
ï‚´ Lecture/Lab 12
ï‚´ Apache Web Server
- Basic Configuration
- Name based Virtual Hosting
- Restriction through htaccess
ï‚´ Lecture/Lab 13
ï‚´ Sendmail - Mail Server
- Configuring mail service
- SMTP Server
ï‚´ POP3 / IMAP Server
ï‚´ Lecture/Lab 14
ï‚´ Proxy Server - Squid
- ACL for restricting access
ï‚´ Lecture/Lab 15
ï‚´ Linux System as a Router
- Setup and configuration
- Static Routing
ï‚´ SELinux Configuration
ï‚´ Firewall Using IPTables
- Filter and NAT rules
Course Content
7. Course Schedule
The complete course, including Lectures and Labs, will
be covered in 60 Hours.
The total duration of the course will be 3.5 - 4 months.
Lectures : Every Tuesday, 6:30 – 8:30 P.M
Labs : Thursday or Friday or Monday
(One batch per day), 6:30 – 8:30 P.M
Schedule
8. Grading Guidelines
Two Exams: 40% + 40%
Lab: 20%
Minimum 80% attendance and minimum 60% marks are
necessary to clear the course.
Grading
9. References
Online on the Web
The Linux Documentation Project (LDP),
http://www.tldp.org/
Mirror: http://www.iitk.ac.in/LDP
Red Hat Linux, O'Reilly
The course slides swill be available at
http://home.iitk.ac.in/~navi/sidbilinuxcourse
Course References
10. UNIX/LINUX OPERATING SYSTEM
Introduction to Unix
History of UNIX
What is LINUX
LINUX Distributions
Unix OS Structure
Unix File System
Unix Directories, Files and Inodes
Users, Groups and Permissions
Introduction to Linux
11. UNIX
Unix is a multi-user, multi-tasking operating system.
You can have many users logged into a system
simultaneously, each running many programs.
It's the kernel's job to keep each process and user
separate and to regulate access to system hardware,
including cpu, memory, disk and other I/O devices.
Introduction to Linux
12. History of UNIX
First Version was created in Bell Labs in 1969.
Some of the Bell Labs programmers who had worked
on this project, Ken Thompson, Dennis Ritchie, Rudd
Canaday, and Doug McIlroy designed and
implemented the first version of the Unix File System
on a PDP-7 along with a few utilities. It was given the
name UNIX by Brian Kernighan.
00:00:00 Hours, Jan 1, 1970 is time zero for UNIX. It is
also called as epoch.
Introduction to Linux
13. History of UNIX
1973 Unix is re-written mostly in C, a new language
developed by Dennis Ritchie.
Being written in this high-level language greatly
decreased the effort needed to port it to new
machines.
Introduction to Linux
14. History of UNIX
1977 There were about 500 Unix sites world-wide.
1980 BSD 4.1 (Berkeley Software Development)
1983 SunOS, BSD 4.2, System V
1988 AT&T and Sun Microsystems jointly develop
System V Release 4 (SVR4). This later developed into
UnixWare and Solaris 2.
1991 Linux was originated.
Introduction to Linux
15. What is LINUX
Linux is a free Unix-type operating system originally
created by Linus Torvalds with the assistance of
developers around the world.
It originated in 1991 as a personal project of Linus
Torvalds, a Finnish graduate student.
The Kernel version 1.0 was released in 1994 and today
the most recent stable version is 2.6.9
Developed under the GNU General Public License , the
source code for Linux is freely available to everyone.
Introduction to Linux
16. LINUX Distributions
Mandrake: http://www.mandrakesoft.com/
RedHat: http://www.redhat.com/
Fedora: http://fedora.redhat.com/
SuSE/Novell: http://www.suse.com/
Debian: http://www.debian.org/
Red Hat Enterprise Linux is a Enterprise targeted Operating
System. It based on mature Open Source technology and
available at a cost with one year Red Hat Network
subscription for upgrade and support contract.
Introduction to Linux
19. File System
The Unix file system looks like an inverted tree
structure.
You start with the root directory, denoted by /, at the
top and work down through sub-directories
underneath it.
Introduction to Linux
20. File System
Each node is either a file or a directory of files, where
the latter can contain other files and directories.
You specify a file or directory by its path name, either
the full, or absolute, path name or the one relative to a
location.
The full path name starts with the root, /, and follows
the branches of the file system, each separated by /,
until you reach the desired file, e.g.:
/home/condron/source/xntp
Introduction to Linux
21. File System
A relative path name specifies the path relative to
another, usually the current working directory that you
are at. Two special directories :
. the current directory
.. the parent of the current directory
So if I'm at /home/frank and wish to specify the path
above in a relative fashion I could use:
../condron/source/xntp
This indicates that I should first go up one directory
level, then come down through the condron directory,
followed by the source directory and then to xntp.
Introduction to Linux
22. Structure of Standard Directories in
Unix/Linux
/ The ancestor of all directories on the system; all other
directories are subdirectories of this directory, either
directly or through other subdirectories.
/bin Essential tools and other programs (or binaries).
/dev Files representing the system's various hardware
devices. For example, you use the file `/dev/cdrom' to
access the CD−ROM drive.
/etc Miscellaneous system configuration files, startup
files, etc.
Introduction to Linux
23. Structure of Standard Directories in
Unix/Linux
/home The home directories for all of the system's
users.
/lib Essential system library files used by tools in `/bin'.
/proc Files that give information about current system
processes.
/root The superuser's home directory, whose username
is root. (In the past, the home directory for the
superuser was simply `/'; later, `/root' was adopted for
this purpose to reduce clutter in `/'.)
Introduction to Linux
24. Structure of Standard Directories in
Unix/Linux
/sbin Essential system administrator tools, or system
binaries.
/tmp Temporary files.
/usr Subdirectories with files related to user tools and
applications.
Introduction to Linux
25. Directories, Files and Inodes
Introduction to Linux
Every directory and file is listed in its parent
directory.
In the case of the root directory, that parent is itself.
A directory is a file that contains a table listing the
files contained within it, giving file names to the
inode numbers in the list.
The information about all the files and directories is
maintained in INODE TABLE
An Inode (Index Nodes) is an entry in the table
containing information about a file (metadata)
including file permissions, UID, GID, size, time
stamp, pointers to files data blocks on the disk etc.
26. Users, Groups and Access Permissions
Introduction to Linux
In UNIX/LINUX, there is a concept of user and an
associated group
The system determines whether or not a user or
group can access a file or program based on the
permissions assigned to them.
Apart from all the users, there is a special user
called Super User or the root which has permission
to access any file and directory
27. Access Permissions
Introduction to Linux
There are three permissions for any file, directory
or application program.
The following lists the symbols used to denote
each, along with a brief description:
r — Indicates that a given category of user can
read a file.
w — Indicates that a given category of user can
write to a file.
x — Indicates that a given category of user can
execute the file.
28. Access Permissions
Introduction to Linux
Each of the three permissions are assigned to
three defined categories of users.
The categories are:
owner — The owner of the file or
application.
group — The group that owns the file or
application.
others — All users with access to the
system.
29. Access Permissions
Introduction to Linux
One can easily view the permissions for a file by
invoking a long format listing using the command
ls -l.
For instance, if the user juan creates an executable
file named test, the output of the command ls -l test
would look like this:
-rwxrwxr-x 1 juan student 0 Sep 26 12:25 test
30. Access Permissions
Introduction to Linux
The permissions for this file are listed are listed at
the start of the line, starting with rwx.
This first set of symbols define owner access.
The next set of rwx symbols define group access
The last set of symbols defining access permitted
for all other users.
31. Access Permissions
Introduction to Linux
This listing indicates that the file is readable,
writable, and executable by the user who owns the
file (user juan) as well as the group owning the file
(which is a group named student).
The file is also world-readable and world-
executable, but not world-writable.
32. Listing the Content of a Directory
Introduction to Linux
ls is used to list the contents of a directory.
If the command ls is written with parameter –l then
the command lists contents of the working
directory with details. Example:
$ ls –l
33. Moving in Directories
Introduction to Linux
cd try_it
Changes the directory to try_it
pwd
Prints present working directory (e.g.
/home/smith/try_it)
cd .. Move to superior directory
pwd : Prints /home/smith
cd /home The absolute path
pwd : Prints /home
cd The system is returned to the user home
directory
pwd : Print /home/smith
34. Make Directory
Introduction to Linux
The command mkdir my_dir
makes new directory my_dir (the path is given
relative) as a subdirectory of the current directory.
36. Copy File
Introduction to Linux
The command cp file_1 file_2
copies file_1 to file_2. The both files must be in the
same working directory. If they are in various
directories, the path must be given.
37. Rename and/or Move the File
Introduction to Linux
The command mv file_1 file_2
moves file_1 to file_2
The both files must be in the same working
directory.
If they are in different directories, the path must be
given.
The file_1 is removed from the disk.
38. Remove File
Introduction to Linux
The command rm file_a
removes the file_a from the system
If you use wildcard. For example
rm h*c
you will remove all files beginning with h and
ending with c which are in working directory.
If you write
rm *
you will erase all files from your working directory.
39. Access Permission of File/Directory
Introduction to Linux
The ownership of the file or directory can be
changed using the command
chown <owner> <file/directory name>
The group of the file or directory can be changed
using the command
chgrp <group> <file/directory name>
The permissions of the file can be changed using
chmod command
chmod -R ### <filename or directory>
-R is optional and when used with directories will
traverse all the sub-directories of the target
directory changing ALL the permissions to ###.
41. Assignment
Introduction to Linux
Login as guest (password is guest)
Find the present Directory
Write the root directory structure
Write a few commands available in /bin and /sbin directory
Find the guest directory
Write the permissions of guest directory
Create a new Directory test in guest directory
Copy the file /etc/resolv.conf in test directory
Rename the test directory to testing
Delete the testing directory
Change the permissions of guest directory to 700
Change the permissions of /tmp directory to 700