Lesson 1-Logging On to the System. Overview Importance of UNIX/Linux. Logging on to the system.

Slides:



Advertisements
Similar presentations
Objectives Overview Define an operating system
Advertisements

A Guide to Unix Using Linux Fourth Edition
Chapter One The Essence of UNIX.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
1 Configuring Web services (Week 15, Monday 4/17/2006) © Abdou Illia, Spring 2006.
Internet Applications: Telnet, Ping and Traceroute.
Chapter 2 Accessing Your System and the Common Desktop Environment.
MCT260-Operating Systems I Operating Systems I Networking.
Chapter 5: Configuring Users and Groups. Windows Vista User Accounts User accounts are the primary means of authentication Built-in Accounts –Administrator:
Guide To UNIX Using Linux Third Edition
Guide To UNIX Using Linux Third Edition
Getting Started with Linux: Novell’s Guide to CompTIA’s Linux+ (Course 3060) Section 2 Use the Linux Desktop.
Chapter 2: Exploring the Desktop The Complete Guide to Linux System Administration.
Objectives  Understand the purpose of the superuser account  Outline the key features of the Linux desktops  Navigate through the menus  Getting help.
11 SYSTEMS ADMINISTRATION AND TERMINAL SERVICES Chapter 12.
Your Interactive Guide to the Digital World Discovering Computers 2012.
Advanced Shell Programming. 2 Objectives Use techniques to ensure a script is employing the correct shell Set the default shell Configure Bash login and.
MagicInfo Pro Server Software All control, content, and scheduling is performed within the MagicInfo Pro Server software previously installed. Before.
Chapter 9 Part II Linux Command Line Access to Linux Authenticated login using a Linux account is required to access a Linux system. The Linux prompt will.
Guide to Linux Installation and Administration, 2e1 Chapter 3 Installing Linux.
Virtual Private Networking Allows any internet enabled computer to connect to STI network. Runs at your local connection speed. Must have username and.
Connecting to Network. ♦ Overview ► A network connection is required to communicate with other computers when they are in a network. Network interface.
PHP Programming with MySQL Slide 8-1 CHAPTER 8 Working with Databases and MySQL.
Introduction to Unix/Linux Chapter One The Essence of UNIX.
CIM6400 CTNW (04/05) 1 CIM6400 CTNW Lesson 6 – More on Windows 2000.
Agenda Overview of Seneca Computer System –File Servers / Student Computer Accounts –Telnet application –How to Logon to Learn / Phobos accounts How to.
Explain the purpose of an operating system
Security Planning and Administrative Delegation Lesson 6.
Chapter 7 Working with Databases and MySQL PHP Programming with MySQL 2 nd Edition.
SUSE Linux Enterprise Desktop Administration Chapter 2 Use the Linux Desktop.
Chapter 13 Users, Groups Profiles and Policies. Learning Objectives Understand Windows XP Professional user accounts Understand the different types of.
Module 9: Preparing to Administer a Server. Overview Introduction to Administering a Server Configuring Remote Desktop to Administer a Server Managing.
CS 390 Unix Programming Summer Unix Programming - CS 3902 Course Details Online Information Please check.
Operating Systems and Using Linux CMSC 104, Lecture 3 John Y. Park 1.
1 Chapter Overview Understanding User Accounts Planning New User Accounts Creating, Modifying, and Deleting User Accounts Setting Properties for User Accounts.
1 Operating Systems and Using Linux Topics What is an Operating System? Linux Overview Frequently Used Linux Commands Reading None.
Agenda Steps to Obtain your Phobos and Matrix Accounts. How to use a Telnet Application to Access your Phobos and Matrix Accounts How to Create an Effective.
Agenda Overview of Seneca Computer System File Servers / Student Computer Accounts Telnet application How to Logon to Learn / Phobos accounts How to Change.
Security Planning and Administrative Delegation Lesson 6.
Chapter 28 - Remote Login and Remote Desktops(TELNET) Introduction Early Computers Used Textual Interfaces A Timesharing System Requires User Identification.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 6 Resolving Network Host Names.
Using ICT systems The computer. Using ICT systems Computers in an ICT System Multiple computers, usually with username and password entry Looking after.
Lesson 3-Touring Utilities and System Features. Overview Employing fundamental utilities. Linux terminal sessions. Managing input and output. Using special.
Chapter 9 Operating Systems Discovering Computers Technology in a World of Computers, Mobile Devices, and the Internet.
Configuring and Deploying Web Applications Lesson 7.
Agenda Overview of Seneca Computer System File Servers / Student Computer Accounts Telnet application How to Logon to Learn / Phobos accounts How to Change.
CS 1451 UNIX OPERATING SYSTEM Lecture 1. CS 1452 OVERVIEW UNIX Operating System  Multi-Tasking  Multi-User  Interactive Supports computer systems 
 Last lesson, the Windows Operating System was discussed along with the Windows command shell  Unix is a computer operating system, that similarly manages.
Issue Date January OKLAHOMA STATE IMMUNIZATION INFORMATION SYSTEM I IMMUNIZE. SAVE LIVES. Accessing OSIIS as a View Only User.
Lunchbox. Overview ➲ We developed a program called Lunchbox with the purpose of allowing the administrator to create a time sheet, create an employee.
HOW TO RESET YOU OFFICE 365 PASSWORD Type into your internet browser.
CHAPTER 7 Operating System Copyright © Cengage Learning. All rights reserved.
Windows XP Professional Not Finish Yet
Chapter 2 Operating Systems
Module 9: Preparing to Administer a Server
Introduction to Operating Systems
Guide to Linux Installation and Administration, 2e
User Access and User ID Commands in UNIX
Chapter 1 The Essence of UNIX and Linux
Chapter 8 Working with Databases and MySQL
PowerChart New User Tutorial
Windows xp PART 1 DR.WAFAA SHRIEF.
Lesson 16-Windows NT Security Issues
User accounts.
User accounts.
Linux Professor Sabol.
What is Unix? A multi-user networked operating system
Module 9: Preparing to Administer a Server
Security Planning and Administrative Delegation
Presentation transcript:

Lesson 1-Logging On to the System

Overview Importance of UNIX/Linux. Logging on to the system.

Importance of UNIX/Linux Most Internet servers and all the fundamental computing structures run on UNIX/Linux systems. Most communication networks run on UNIX/Linux systems. The general infrastructure for communications, programs, smart devices, and critical data is managed on UNIX/Linux systems.

Importance of UNIX/Linux Records, research, communication, development, and publications depend on applications provided by UNIX/Linux systems. File serving for desktops, , and an enormous portion of publishing run in UNIX/Linux environments.

Logging On to the System The UNIX system’s ability to serve multiple users at a time is one of its primary features. A unique account associated with a login name is created when an administrator adds a new user to a system.

Entry to the UNIX system is granted only if the user provides a login name and a password that match an established user on the system. A user having a ‘root’ login is granted the extensive powers needed to administer the system. Logging On to the System

Character Window Log On Screen

Logging On to the System Terminal Window Log on Screen

Logging On to the System Ensure that the username and password is entered using the correct character-case, since UNIX/Linux is case- sensitive. In most systems, the login name and the password are in lowercase letters. Passwords are not displayed on the screen.

Care should be taken to avoid typing mistakes. Confusion between similar looking characters should also be avoided. For example, the alphabet O and the number zero (0). Logging On to the System

Terminal Window interaction Graphical Window interaction

Terminal Window Interaction Terminal Window Screen

Terminal Window Interaction The “date” command is used to display the current date and time. The “exit” command is used to log off from the terminal environment.

Graphical Window Interaction Graphical Window Screen

Graphical Window Interaction Logoff in Graphical Window Interface

Summary A valid username and a password are required to access a UNIX/Linux system. The root user has the extensive powers needed to administer a UNIX/Linux system. A user can log in from the terminal Window or the graphical Window.