Some history PDP versions BSD/Version 7 split VAX virtual memory implementations End of line 4.4 BSD System V merges Modern versions OSF/1, Solaris, HPUX.

Slides:



Advertisements
Similar presentations
Introduction to Linux Linux startup process Unix Shells and scripts.
Advertisements

Booting and Shutting Down the UNIX Operating System Arcadio A. Sincero Jr. 6/6/2001 CMSC 691X, Section 6080.
Linux can be generally divided into four major components: 1. KERNEL – OS, ultimate boss The kernel is the core program that runs programs and manages.
1 Unix Systems Administration Y. K. Chang Generic Unix Directory Structure /bin /dev /etc /sbin /home /lost+found / Root Dir /dsk /rdsk /term /pts /rmt.
Introduction to Unix (CA263) File System
Exploring the UNIX File System and File Security
Linux Intro Linux, the do it yourself OS Linux, successor to MINIX Linux, Unix for the masses (PC users) History:
The UNIX File System.
Processes & Daemons Chapter IV / Part III. Commands Internal commands: alias, cd, echo, pwd, time External commands, code is in a file: grep, ls, more.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 8: Implementing and Managing Printers.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Linux System Administration LINUX SYSTEM ADMINISTRATION.
Configuring Disk Quotas Linux System Administration To implement disk quotas, use the following steps: Enable quotas per file system by modifying /etc/fstab.
Booting and boot levels
1 TAC2000/ IP Telephony Lab Advanced Linux Administration Language: Offered in English Instructor: Dr. Quincy Wu (
System Startup & Shutdown Objectives –to interpret the Unix startup and shutdown configuration files –to be able to create a customised run level Contents.
Guide to Linux Installation and Administration, 2e1 Chapter 8 Basic Administration Tasks.
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
Unix Basics Chapter 4.
– Introduction to the Shell 10/1/2015 Introduction to the Shell – Session Introduction to the Shell – Session 2 · Permissions · Users.
Chapter Two Exploring the UNIX File System and File Security.
Agenda Link of the week Use of Virtual Machine Review week one lab assignment This week’s expected outcomes Review next lab assignments Break Out Problems.
Linux Introduction What is Linux? How do you use it?
System Startup & Shutdown
UNIX (Linux) Introduction Module-1. OS Kernel In computing, the kernel is the central component of OS. It is a bridge between applications and the actual.
INCS Virtual Data Center Security using Linux.
Hands On UNIX II Dorcas Muthoni. Processes A running instance of a program is called a "process" Identified by a numeric process id (pid)‏  unique while.
Chapter 3 & 6 Root Status and users File Ownership Every file has a owner and group –These give read,write, and execute priv’s to the owner, group, and.
Introduction to System Admin Sirak Kaewjamnong. 2 The system administration’s job  Adding a new user  Doing backup and restoring files from backups.
Linux Overview Why Linux ? Not-so-ancient history –Torvalds, Linus Torvalds, 002 the Helsinki University, as a student, low budget, work home –rapid and.
40 Years and Still Rocking the Terminal!
1 LINUX SECURITY. 2 Outline Introduction Introduction - UNIX file permission - UNIX file permission - SUID / SGID - SUID / SGID - File attributes - File.
Review Please hand in any homework and practicals Vim Scripting Inter-device communication.
System Administration – Part 2. Devices in UNIX are files: A device can be accessed with different file names All device files are stored in /dev or its.
1 Lecture 6 Introduction to Process Management COP 3353 Introduction to UNIX.
Managing Files CSCI N321 – System and Network Administration Copyright © 2000, 2007 by the Trustees of Indiana University except as noted.
Chapter 8 File System Security. File Protection Schemes Login passwords Encryption File Access Privileges.
Linux Commands C151 Multi-User Operating Systems.
COEN 250 Computer Forensics Unix System Life Response.
Review Please turn in any homework/practicals you may have Folders Paths Services Processes.
CS 245 – Part 1 Using Operating Systems and Networks for Programmers Jiang Guo Dept. of Computer Science California State University Los Angeles.
System Administration. Logging in as System Administrator System Admin login (aka superuser, aka root) –login id: root –Default PS1 prompt: # –Home directory:
Unix System Administration Booting and Shutting Down Chapter 2.
Lecture 02 File and File system. Topics Describe the layout of a Linux file system Display and set paths Describe the most important files, including.
1 CS3695 – Network Vulnerability Assessment & Risk Mitigation – Introduction to Unix & Linux.
1 Figure 6-5: Turning Off Unnecessary Services Unnecessary Services  Operating system vendors used to install many services by default  This made them.
Lecture 4 & 5: System Architecture  File systems  Devices  File system permissions  Review of Linux runlevels  In-class exercise.
C Copyright © 2006, Oracle. All rights reserved. Oracle Secure Backup Additional Installation Topics.
ORAFACT The Linux File System. ORAFACT Filesystem Support Support for dozens of filesystem types including: Minix, ext2, MS-DOS, UMSDOS, VFAT, NTFS, NFS,
UDel CISC361 Study Operating System principles - processes, threads - scheduling - mutual exclusion - synchronization - deadlocks - memory management -
Getting Started with Linux
...looking a bit closer under the hood
SYSTEM ADMINISTRATION PART I by İlker Korkmaz and Kaya Oğuz
...looking a bit closer under the hood
Linux file system "On a UNIX system, everything is a file;
Basic Commands ls cp ls –l (in detail format) echo ls –a
Hands On UNIX AfNOG 2010 Kigali, Rwanda
Linux Start Sequence Summary
Hands On UNIX AfNOG X Cairo, Egypt
Exploring the UNIX File System and File Security
Unix : Introduction and Commands
...looking a bit closer under the hood
Chapter 7 File and file System structure
UNIX Introduction.
Working with Mac OS and Linux
Chapter 4: The Linux Filesystem
Lecture 6 Introduction to Process Management
Configuring Disk Quotas
Presentation transcript:

Some history PDP versions BSD/Version 7 split VAX virtual memory implementations End of line 4.4 BSD System V merges Modern versions OSF/1, Solaris, HPUX 10 Standards

Jobs to do Add users Backup filespace User support Update software/install new System Security Performance issues Networking problems

Tools for the job ps – shows what is going on df – disc space usage netstat – network activity su – gain admin rights kill – delete a process + thought to understand why a situation has happened.

GUI’s make life easy … HPUX – SAM is a mature product Linux – –usrcfg –netcfg –rpm GUI’s can bring benefits –single machines –less understanding needed –does not help with a lot of machines

File Systems removable media –floppies –CDs discs –mount’ing – usually at startup but things may go wrong –fsck’ing - done automatically unless disc is corrupt –lost+found – where the damaged files are dropped

Files ls – modes drwxrwxrwx + t,c,b chmod – {o,g,o,a} +/- {r,w,x} –symbolic safer than numeric hidden files umask – default mode (777 – umask value) ln and ln –s

Where things live /sbin – files needed at boot time /usr/sbin – files used only by the administrator /bin and /usr/bin – main place for applications for users /etc – configuration files /dev – device file (the Unix view of the world is everything looks like a file)

How processes run command looked up in PATH –take care of order of search – this is a security risk –can also bring performance issues fork and exec –child – parent relationship for communications (or use sockets) –exit and zombies –signals (eg HUP)

More essential tools grep awk sed all subsumed into PERL –scripting version of C –wide platform availability

Starting up the machine boot process (prom to disc) single user multi-user levels –inittab –shutdown lilo –configuration of PC for multiple OS’s

Scripts in charge /etc/rc – things to do at startup now more complicated –/etc/rc? when ? is the level –/etc/rc?.d directory holding many scripts –S??name – run at startup –K??name – run at shutdown

Users and groups uid is the Unix security token groups allow sharing passwords should not be guessable –ageing –shadow files shell – bash home directory becoming another person –su - name

Backups What should be backed up? –configuration files –users files Frequency of backup –logically after every change –practically as often as can Where too? –somewhere safe! –multiple tapes in multiple locations

Restoring Need to have organised backups Takes a lot of time Educate users to use RCS Using a good backup system will automate this.

The network Security issues –no telling where a connection is from, just know last hop Services you run –keep to a minimum –keep them logged Are you protected? –block connections to certain ports –block connections from certain sites ssh rather than telnet

Printing and printers networked or hardwired –networked are dearer but simpler to manage spool machine needed – with free disc space printers break down a lot printers need a lot of consumables

What if disaster strikes corrupt kernel –have a backup kernel especially if you reconfigure the machine damaged files stop booting –have a alternative boot method – perhaps CD hackers break-in –use something like tripwire –info.cert.org –you will be down a long time

Books etc O’Reilly Guides –Essential System Administration (Frisch) –Practical Unix Security (Garfinkel/Spafford) –Programming Perl (Wall/Christiansen/Schwartz) Unix manuals for command News groups (low signal to noise) Go on a course or two!