CIS 155 Lecture 10, Farewell to UNIX

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

1 Configuring Internet- related services (April 22, 2015) © Abdou Illia, Spring 2015.
Jump to first page Unix Commands Monica Stoica Jump to first page Introduction to Unix n Unix was born in 1969 at Bell Laboratories, a research subdivision.
Chapter One The Essence of UNIX.
FILE TRANSFER PROTOCOL Short for File Transfer Protocol, the protocol for exchanging files over the Internet. FTP works in the same way as HTTP for transferring.
ATS Programming Short Course I INTRODUCTORY CONCEPTS Tuesday, Jan. 27 th, 2009 Essential Unix Commands.
Introducing the Command Line CMSC 121 Introduction to UNIX Much of the material in these slides was taken from Dan Hood’s CMSC 121 Lecture Notes.
Lesson 22 – Introduction to Linux Systems Administration.
UNIX Chapter 00 A “ Quick Start ” into UNIX Operating System Mr. Mohammad Smirat.
Guide To UNIX Using Linux Third Edition
Guide To UNIX Using Linux Third Edition
SoftwareTools CGS 3460, Lecture 7 Jan 25, 2006 Zhen Yang.
2440: 141 Web Site Administration Remote Web Server Access Tools Instructor: Enoch E. Damson.
Welcome to the Southeastern Louisiana University’s Online Employment Site Applicant Tutorial!
1 THE UNIX FILE SYSTEM By Chokechai Chuensukanant ID COSC 513 Operating System.
Help session: Unix basics Keith 9/9/2011. Login in Unix lab  User name: ug0xx Password: ece321 (initial)  The password will not be displayed on the.
Lesson 7-Creating and Changing Directories. Overview Using directories to create order. Managing files in directories. Using pathnames to manage files.
Chapter 9 Part II Linux Command Line Access to Linux Authenticated login using a Linux account is required to access a Linux system. The Linux prompt will.
Offline File Storage. Module 12 Offline File Storage ♦ Introduction Backup is usually done by first collecting all the data in a single archive file,
Command Line Unix for Information Professionals In web administration or information management work, I may be called upon, as an Information Professional,
Guide to Linux Installation and Administration, 2e1 Chapter 8 Basic Administration Tasks.
Lesson 11-Locating, Printing, and Archiving User Files.
Agenda User Profile File (.profile) –Keyword Shell Variables Linux (Unix) filters –Purpose –Commands: grep, sort, awk cut, tr, wc, spell.
Chapter Four UNIX File Processing. 2 Lesson A Extracting Information from Files.
Guide To UNIX Using Linux Fourth Edition
Copyright © 2007, Oracle. All rights reserved. Managing Concurrent Requests.
IT2204: Systems Administration I 1 6b). Introduction to Linux.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
Chapter Eight Exploring the UNIX Utilities. 2 Lesson A Using the UNIX Utilities.
UNIX Commands. Why UNIX Commands Are Noninteractive Command may take input from the output of another command (filters). May be scheduled to run at specific.
Lesson 9-Setting and Using Permissions. Overview Describing file permissions. Using execute permissions with a file. Changing file permissions using mnemonics.
Lesson 2-Touring Essential Programs. Overview Development of UNIX and Linux. Commands to execute utilities. Communicating instructions to the shell. Navigating.
Guide To UNIX Using Linux Third Edition Chapter 8: Exploring the UNIX/Linux Utilities.
BIF713 Basic Unix/Linux Commands Getting Help with Commands.
Agenda Basic Unix Commands (Chapters 2 & 3) Miscellaneous Commands: whereis, which, whoami, finger, passwd, cal, date Working with Files: cat, more, less.
Introduction to Programming Using C An Introduction to Operating Systems.
Manage Directories and Files in Linux Part 2. 2 Identify File Types in the Linux System The file types in Linux referred to as normal files and directories.
Lesson 3-Touring Utilities and System Features. Overview Employing fundamental utilities. Linux terminal sessions. Managing input and output. Using special.
Linux Commands C151 Multi-User Operating Systems.
File Transfer Protocol (FTP) FTP host stores files Client logs into host Client program sends command to get a file FTP host downloads the file with error.
FTP COMMANDS OBJECTIVES. General overview. Introduction to FTP server. Types of FTP users. FTP commands examples. FTP commands in action (example of use).
CSC414 “Introduction to UNIX/ Linux” Lecture 6. Schedule 1. Introduction to Unix/ Linux 2. Kernel Structure and Device Drivers. 3. System and Storage.
The Kernel At a high level, the kernel in an operating system serves as the bridge between applications and the actual data processing of the hardware.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
Linux Tutorial Lesson Two *Getting Help in Linux *Data movement and manipulation *Relative and Absolute path *Processes Note: see chapter 1,2,3 from Linux.
FILES AND EXCEPTIONS Topics Introduction to File Input and Output Using Loops to Process Files Processing Records Exceptions.
Project Management: Messages
Login The Login prompt provides access to the files located on the server.
© 2002, Cisco Systems, Inc. All rights reserved.
Linux Commands Help HANDS ON TRAINING Author: Muhammad Laique
FTP Lecture supp.
Some Linux Commands.
C151 Multi-User Operating Systems
Module 4 Remote Login.
Agenda Basic Unix Commands (Chapters 2 & 3) Miscellaneous Commands:
Shell Script Assignment 1.
Assignment Preliminaries
FTP and UNIX TOPICS Exploring your Web Hosting Site FTP UNIX
Topics Introduction to File Input and Output
Web Programming Essentials:
Configuring Internet-related services
Chapter Four UNIX File Processing.
Introduction Paul Flynn
UNIX/LINUX Commands Using BASH Copyright © 2017 – Curt Hill.
Files Management – The interfacing
Linux Shell Script Programming
Topics Introduction to File Input and Output
January 26th, 2004 Class Meeting 2
Presentation transcript:

CIS 155 Lecture 10, Farewell to UNIX UNIX Operating System CIS 155 Lecture 10, Farewell to UNIX Welcome to Lesson Ten of UNIX Operating System. This lesson is our farewell to UNIX. Please go to slide # 2

Overview Disk Space UNIX Commands Spelling Error Correction UNIX Security Using FTP Working With Compressed Files Now that we have covered the UNIX basics and you know about shell programming, it is time to add a few flourishes. The commands discussed in this lesson include disk commands, file manipulation commands, and spelling commands. You have already learned quite a few file manipulation commands, and the new commands in this lesson supplement your previous knowledge. The lesson concludes with a few security and system administration commands to help you understand more about the UNIX system and give you a more comfortable feeling about your system. Let’s begin. Please go to slide # 3

Objectives Upon completing this lesson you should be able to: Use the df and du commands Correct Spelling Errors Explain UNIX Security Use FTP Work with Compressed Files Upon completing this lesson you should be able to: Use the d-f and d-u commands; Correct Spelling Errors; Explain UNIX Security; Use F-T-P; and Work with Compressed Files. Please go to slide # 4

Disk Space Disk Space Limit i-node d-f command total amount of storage space available amount of space set aside for i-nodes i-node assigned to each file in the system contains specific file information d-f command total amount of disk space There is a limit to the number of files you can store on a disk or in a file system. That limit depends on the total amount of storage space available and the amount of space set aside for i-nodes. An i-node number is assigned to each file in the system; these numbers are kept in the i-node list. An i-node contains specific file information, such as its location on the disk, its size, and so on. You can use the d-f command to find the total amount of disk space or the space available on a specified file system. If you do not specify a particular file system on the command line, then the d-f command reports the free space for all file systems. Please go to the next slide to view a demonstration on using the d-f command to find the total amount of disk space available.

Disk Space Directory Structure for the d-u Command / usr david source You can use the d-u command to obtain a report that includes each directory in the file system, the number of blocks used by the files in that directory, and its subdirectories. This command is useful when you want to know how the space on a file system is being used. This slide shows the directory structure for the d-u command. Please go to slide # 7 memos basic C++

Disk Space The d-u Command Options Option Operation UNIX Linux Alternative -a --all Display the size of directories and files -b --bytes Displays the size of directories and files in bytes -c --summarize Displays only the total blocks for the specified directory; subdirectories are not listed   --help Displays a usage message --version Displays the version information This slide summarizes the d-u command options. Please go to slide # 8

More Unix Commands The banner Command The at Command produces output in large letters useful for creating banners, signs The at Command The at Command Options Option Operation -l Lists all jobs that are submitted with at -m Mails you a short message of confirmation at completion of the job -r Removes the specified job numbers from the queue of jobs selected by at You can use the banner command to produce output in large letters. It displays its arguments on the standard output, one argument per line. This is useful for creating banners, signs, report titles, and so on. You use the at command to run a command or list of commands at a later time. This is useful if you want to run your programs when the computer is less busy, or when you want to send mail on a certain date. You can specify the time and date part of the command in various formats, and the syntax is quite flexible. This slide shows the at command options. Please go to slide # 9

More Unix Commands The type command The time command $ type pwd [Return] pwd is a shell built-in The time command obtain information about the computer time your command uses The calendar command remind yourself of your appointments The type command is useful when you want to know more about a command. It shows whether the specified command is a shell program or a built-in command. The built-in commands are part of the shell, and no child process is created when any of them is invoked. This slide contains an example of the type command. You can use the time command to obtain information about the computer time your command uses. It reports the real time, user time, and system time. You type time followed by the command name you want to time. You can use the calendar command to remind yourself of your appointments and other things you want to do. To use this service, you must create a file called calendar in your HOME directory or the current directory. It displays those lines in the calendar file that contain today’s or tomorrow’s date. If your system is set up to run the calendar command automatically, then it sends you e mail that contains appropriate lines from your calendar file. You can also run the calendar command at the dollar sign prompt to display lines from your calendar file. Please go to slide # 10

More Unix Commands The finger command The finger command options Operation -b Suppresses displaying the user's HOME directory and shell in a long form at display –f Suppresses displaying the header in a non-long format output –h Suppresses displaying the .project ile in a long format output –l Forces long format output –p Suppresses displaying the .plan file in a long format output –s Forces short format output The who command is used to obtain information about people on the system. You can use the finger command to obtain more detailed and informative reports about the users who are logged on. By default, the finger command displays information in a multicolumn format. This slide shows some of the finger command options. Please go to slide # 11

More Unix Commands The tar command The tar command options Option Operation UNIX Linux Alternative -c -- create (create) Creates a new tarfile. Writing begins at the beginning of the tarfile -f -- file (file) Uses the next argument as a place where the archive is to be updated –r -- concatenate (replace) Writes a new archive at the end of the tarfile -t -- list (table of contents) Lists the name of the files in the tarfile -x -- extract or – get (extract) Extracts files from the tarfile -v -- verbose (verbose) Provides additional information about the tarfile entries   -- help Displays a usage message -- version Displays the version information You can use the tar command to copy a set of files into a single file called tarfile. A tarfile is usually saved to a magnetic tape, but it can be on any other media, such as a floppy disk. The tar command packs multiple files into a single file in tar-format that can be later unpacked by tar. This slide shows the command options for tar. Please go to slide # 12

Spelling Error Correction Spell Command Options Option Operation -b Checks British spelling -v Displays words that are not in the spelling list and their derivation -x Displays plausible stems for each word being checked You can use the spell command to check the spelling of the words in your documents. The spell command compares the words in a specified file against a dictionary file. It displays the words that are not found in the dictionary file. You can specify more than one file, but when no file is specified, spell gets its input from the default input device, your keyboard. This slide shows the spell command options. Please go to slide # 13

Spelling Error Correction Example of a dictionary file $ cat U_DICTIONARY grep i-node ls mkdir pwd On most UNIX systems, you can create your own dictionary file that supplements the standard dictionary with additional words. For example, you can create a file that contains the correct spellings of the special words and terms that are specific to your site or project. This slide shows an example of a dictionary file. Please go to slide # 14

UNIX Security Password Line format File Permission Numeric Equivalents Login-name:password:user-ID:group ID:user-info:directory:program File Permission Numeric Equivalents owner group others r w x 4 2 1 Information and computer time are valuable resources that require protection. System security is a very important part of multi-user systems. Security on the UNIX system is implemented by using simple commands, and the system security can be as lax or tight as you desire. There are several means available to secure your computer. All the information the system needs to know about each user is saved in a password file. The file includes each user’s password; however, it is encrypted, using an encoding method that makes the deciphering of the passwords a very difficult task. The password file contains one entry for each user. Each entry is a line that consists of seven fields separated by colons. This slide shows the line format. File security limits access to the files. The UNIX system provides you with the commands to specify who can access a file, and once accessed, what type of operation can be done on the file. This slide shows the numeric value assigned to each permission letter. Please go to slide # 15

UNIX Security Directory Permission The Superuser File Encryption read: you can use the ls command to list the filenames write: you can add or remove files from that directory execute: you can use the cd command to change to that directory or use the directory name as part of a filename The Superuser Has privileged authority and is not restricted by the file permissions File Encryption crypt command encrypts your file and makes it unreadable to others crypt command is used for both encryption and decryption Directories have permission modes that work in a similar manner to file permission modes. This slide shows the different meanings associated with directory access permissions. The superuser is a user who has privileged authority and is not restricted by the file permissions. The system administrator must be a superuser in order to perform administrative tasks such as establishing new accounts, changing passwords and so on. How can you protect your sensitive files from others? UNIX provides the crypt command, which encrypts your file and makes it unreadable to others. The crypt command changes each character in your file in a reversible way, so you can obtain the original file later. The crypt command is used for both encryption and decryption. In fact, for decryption of a file, you must provide the same key that you specified to its encryption. Please go to the next slide to view a demonstration on how to encrypt a file.

Using FTP FTP Command $ ftp server2 [Return] Username: daniel Password: The File Transfer Protocol is one of the most frequently used services available on your system. You can use the File Transfer Protocol commands to transfer files from one system to another. You issue the File Transfer Protocol command by typing f-t-p, followed by the address of another site, and then pressing the Return key. You are prompted to enter the user name and password. An example of this process is shown on this slide Please go to the next slide to view a demonstration of an F-T-P session.

Using FTP FTP Access Commands Miscellaneous FTP commands Command Description open remote host name Opens a connection to the FTP server on the specified host. It prompts you to enter the user name and password to log in on the remote host close Closes current open connection and returns to the local FTP command. At this point you may issue the open command for a different remote host quit (bye) Closes the current FTP session with the remote server and exits ftp. That is, it returns to UNIX shell level. The File Transfer Protocol connection related commands are used to establish connection to the remote site and terminate the connection at the end of the File Transfer Protocol session. The File Transfer Protocol access commands are shown on this slide. There are also miscellaneous other commands. The question mark command provides help about File Transfer Protocol commands. The exclamation point command is the shell escape command. The hash command provides feedback messages in file transfer. This slide shows a chart of these commands. Please go to slide # 20 Command Description ? or help displays an informative message about the meaning of the specified command. If no argument is given, a list of the known commands is displayed ! Switches to escape shell mode hash Displays hash sign (#) as feedback for each data block transferred. The size of a data block is 8192 bytes

UNIX Security/ Working With Compressed Files FTP login process You need to know the address or host name of a site that allows anonymous FTP You use anonymous as the user name You enter any non-empty string for the password. Some systems do password validation on anonymous logins. In this case, you give your e mail address as your password Working With Compressed Files Command Sequence for compression of file named important $ compress important [Return] $ ls Important* [Return] Important.z $_ Anonymous File Transfer Protocol uses the f-t-p command and a special restricted account named anonymous as the remote host. Using anonymous File Transfer Protocol, you can access and share many files such as documents, source code, and executable files on the Internet. There is a special login for f-t-p that allows you to anonymously access files on a remote host. This slide shows the steps in that process. You can use the compress command to reduce the size of a file to save space. When you run a compress command on a file, your original file is replaced by a file with the same name, but with a file extension period-zee. The compress command is also used with the encryption command as security measures. In this case, the file is first compressed and then encrypted by the crypt command. This slide shows the command sequences in using the compress command. Please go to slide # 21

Summary Disk Space UNIX Commands Spelling Error Correction UNIX Security Using FTP Working With Compressed Files We have now reached the end of this lesson. You should now be familiar with: Disk Space; UNIX Commands; Spelling Error Correction; UNIX Security; Using FTP; and Working With Compressed Files. This completes this lecture