The Unix Environment for Programming (Comp433)

Slides:



Advertisements
Similar presentations
CSE4251 The Unix Programming Environment
Advertisements

Two-Factor Authentication & Tools for Password Management August 29, 2014 Pang Chamreth, IT Development Innovations 1.
Jump to first page Unix Commands Monica Stoica Jump to first page Introduction to Unix n Unix was born in 1969 at Bell Laboratories, a research subdivision.
Chapter One The Essence of UNIX.
CS 497C – Introduction to UNIX Lecture 26: - The Process Chin-Chih Chang
Chapter 2 Accessing Your System and the Common Desktop Environment.
CIS 240 Introduction to UNIX Instructor: Sue Sampson.
Guide To UNIX Using Linux Third Edition
Click here for getting your Student User Id & password.
UNIX Utilities Learning Objectives: 1. To understand the some basic utilities of UNIX File 2. To compare UNIX shell and popular shell 3. To learn Input/Output.
2 $ command Command Line Options ls –a –l hello hi Command Arguments.
Welcome to CSE  Name: Di Cao   Classroom: DL357  Class Time: T 8:30am - 9:18am  Office.
COMP1070/2002/lec3/H.Melikian COMP1070 Lecture #3 v Operating Systems v Describe briefly operating systems service v To describe character and graphical.
EMT 2390L Lecture 2 Dr. Reyes. Outline What is the Shell Basic commands Linux Filesystem System commands.
Logging onto the Computer for the first time And Signing the Acceptable Use Policy (AUP) for Using the Internet.
UNIX Unbounded 5th Edition Amir Afzal Chapter 3 Getting Started
DAY 2 COP 3502 Fall term UNIX Versions NAMESupplier Based on AIXIBM AT&T System V A/UX Apple Computer AT&T System V DynixSequentBSD HP-UXHewlett-PackardBSD.
1 DoD Cardholder Self Registration November 21, 2008.
Agenda Overview of Seneca Computer System –File Servers / Student Computer Accounts –Telnet application –How to Logon to Learn / Phobos accounts How to.
Introduction to Unix – CS 21 Lecture 9. Lecture Overview Shell description Shell choices History Aliases Topic review.
This tip sheet focuses on the elements required to access SMART. Total Pages: 5 Accessing SMART Logging In Agency/Facility/Program Access Logging Out IGSR.
Textual Password How to use the Textual Authentication Model (AC)
Introduction to Unix (CA263) Getting Started By Tariq Ibn Aziz.
25/10/ Passwords are high value targets 2,000,000 passwords stolen from Facebook, Twitter and Google The Independent, 5 December 2013 Stolen Facebook.
Introduction to Unix Shell & Scripting with csh/tcsh  Brief Unix History  Unix Shell & Flavor  CSH/TCSH Scripts.
Lesson 2-Touring Essential Programs. Overview Development of UNIX and Linux. Commands to execute utilities. Communicating instructions to the shell. Navigating.
1 Applied CyberInfrastructure Concepts ISTA 420/520 Fall Nirav Merchant Bio Computing & iPlant Collaborative Eric Lyons.
2 nd Grade.  ______ make passwords eight or more characters long.
Password Cracking By Allison Ramondetta & Christine Giordano.
Agenda Steps to Obtain your Phobos and Matrix Accounts. How to use a Telnet Application to Access your Phobos and Matrix Accounts How to Create an Effective.
UNIX Commands COMP 1090 Introduction to Unix Fall
SAM 2003 The Student Experience. Initial Setup 1.Ensure you are connected to the Internet. 2.Launch IE (v. 5.0 or later). 3.Enter
Unix Shell Environments February 23rd, 2004 Class Meeting 6.
UNIX shell environments CS 2204 Class meeting 6 *Notes by Doug Bowman and other members of the CS faculty at Virginia Tech. Copyright
Changing Your Password General Lesson 3. Objectives Following completion of this lesson you will be able to:. Define how often a password must be changed.
Unix – Linux CS3353 Ssystem Administration. OS The Operating System – Acts as the interface to all software, hardware, and users of a computer. – Requires.
Introduction to UNIX. 2 History of Unix  1960 Software based on Hardware Limits  1969 Ken Thompson Develop a Better Programming Environment  1971 New.
Lesson 3-Touring Utilities and System Features. Overview Employing fundamental utilities. Linux terminal sessions. Managing input and output. Using special.
Basic UNIX Concepts. Why We Need an Operating System (OS) OS interacts with hardware and manages programs. A safe environment for programs to run is required.
Building Structures. Building Relationships. Passwords February 2010 Marshall Tuck.
Introduction to UNIX CS 2204 Class meeting 1 *Notes by Doug Bowman and other members of the CS faculty at Virginia Tech. Copyright
1 Day 2 Logging in, Passwords, Man, talk, write. 2 Logging in Unix is a multi user system –Many people can be using it at the same time. –Connections.
Module 1 - Introduction to Linux. Users must log-in Linux is case sensitive File and Directories naming conventions (No spaces!) Files and Directories.
The Polar Express Webquest created by Mrs. Seese.
Unix Advanced Shells Chapter 10. Unix Shells u Command Line Interpreter –once logged in, login gives control to a shell –it prompts for input, then parses,
CS 1451 UNIX OPERATING SYSTEM Lecture 1. CS 1452 OVERVIEW UNIX Operating System  Multi-Tasking  Multi-User  Interactive Supports computer systems 
Comp 145 – Introduction to UNIX $200 $400 $600 $800 $1000 $200 $400 $600 $800 $1000 $200 $400 $600 $800 $1000 $200 $400 $600 $800 $1000 Basic Concepts.
Agenda Customizing a Unix/Linux account Environment Introduction to Start-up Files (.bash_profile,.bashrc,.profile,.kshrc) Safe Methods for Changing Start-up.
For Adult Education Students Creating myLogin 1.
Interacting with a UNIX computer in the MathCS Lab.
Self Service Logon and Basic Navigation. InSITE Self Service Basic Navigation Presentation The screens will advance automatically, however you can use.
Introduction to UNIX.
Introduction to Shells
Bash Introduction (adapted from chapters 1 and 2 of bash Cookbook by Albing, Vossing, & Newham) CPTE 440 John Beckett.
UNIX Introduction History Main Features UNIX Operating System
Chapter 1 The Essence of UNIX and Linux
Unix : Introduction and Commands
Passwords.
Logging in to CIITS.
Guess the letter!.
Chapter Introduction 3.2 The UNIX Model of Ownership
start to finish – November 20181
Linux Professor Sabol.
All current PowerSchool users will need to follow these steps.
Unix Shell Environments
What is Unix? A multi-user networked operating system
Setting up Google Account
Information Now 1st – Click the home button to return to the HHS website (if you are not already there.) 2nd – Click the link for INFORMATION NOW on the.
Keeping Our Data Secure
Presentation transcript:

The Unix Environment for Programming (Comp433) 12:00-12:50 Sun/Tues Room Number: 4-19 Solane Duque

Introduction Developed as a Research Project at the AT&T Bell Labs in 1969 Characteristics of Unix Portable Multi-user Multi-tasking

About the Shell You interact with unix through a special program called the shell The shell prompt will hand over the program to the operating system after you typed in.

About UNIX Commands Commands come in two parts: Command Arguments Example: ls –l myfile

UNIX Flavors Bourne Shell (sh) C shell (sch) Others Ksh Bash tsch

Login and Logout Login to start the session using your Username Password Logout to end your session

Password Dont’s Don’t use your login name, real name, nickname, dog’s name, or any name; Don’t use a word that appears in dictionary; Don’t use easily guessed combinations of characters; Don’t write your password down.

Password Do’s Make your password at least 6 characters; Include at least one number or punctuation, and at least 2 letters; Use both upper and lower case letters; Choose a password you can remember without writing it down.

Password Example Four of five dentists recommend Trident 4oo5drT

Thank You Any questions?