CS 1451 UNIX OPERATING SYSTEM Lecture 1. CS 1452 OVERVIEW UNIX Operating System  Multi-Tasking  Multi-User  Interactive Supports computer systems 

Slides:



Advertisements
Similar presentations
Operating Systems for Administrators Instructor: Mr. Ahmed Al Astal ITGD4104 Department Requirement for senior student University of Palestine Faculty.
Advertisements

Tutorial 8: Developing an Excel Application
A Guide to Unix Using Linux Fourth Edition
Lesson 17: Configuring Security Policies
Chapter One The Essence of UNIX.
Module 20 Troubleshooting Common SQL Server 2008 R2 Administrative Issues.
Introduction to Unix GLY 560: GIS for Earth Scientists Class Home Page:
CIS 240 Introduction to UNIX Instructor: Sue Sampson.
Chapter 2 Accessing Your System and the Common Desktop Environment.
11 SUPPORTING LOCAL USERS AND GROUPS Chapter 3. Chapter 3: Supporting Local Users and Groups2 SUPPORTING LOCAL USERS AND GROUPS  Explain the difference.
Guide To UNIX Using Linux Third Edition
CS 497C – Introduction to UNIX Lecture 1: Getting Started Chin-Chih Chang
CCNA 2 v3.1 Module 2.
UNIX chapter 03 Getting Started Mr. Mohammad Smirat.
Basic Unix Dr Tim Cutts Team Leader Systems Support Group Infrastructure Management Team.
1. 2 Overview of AT&T EPIC Ordering Process for SUS (Supply Order) Suppliers 1.AT&T User creates shopping cart on internal web-based portal 2.Shopping.
Engineering H192 - Computer Programming The Ohio State University Gateway Engineering Education Coalition Lect 4P. 1Winter Quarter Introduction to UNIX.
Objectives  Understand the purpose of the superuser account  Outline the key features of the Linux desktops  Navigate through the menus  Getting help.
Event Viewer Was of getting to event viewer Go to –Start –Control Panel, –Administrative Tools –Event Viewer Go to –Start.
1. This presentation covers :  User Interface Administration  Files System and Services Management 2.
Chapter 17: Watching Your System BAI617. Chapter Topics Working With Event Viewer Performance Monitor Resource Monitor.
1 Chapter Overview Planning an Audit Policy Implementing an Audit Policy Using Event Viewer.
Agenda What is Computer Programming? The Programming Process
Introduction: This VCSS training session has been developed to provide : I.A quick overview of VCSS II.A walk through of the main VCSS features III.Solutions.
Basic Navigation in SAP For the Windows Graphical User Interface (GUI) Click your mouse anywhere or select “Page Down” to scroll through the pages.
Chapter 9 Part II Linux Command Line Access to Linux Authenticated login using a Linux account is required to access a Linux system. The Linux prompt will.
How to access office computer from home Presented by Mingyang Wang 11/20/2007 Updated by Raja Karkutla 07/10/2009 To use SSL VPN instead of VPN Client.
1 Group Account Administration Introduction to Groups Planning a Group Strategy Creating Groups Understanding Default Groups Groups for Administrators.
Introduction to Unix/Linux Chapter One The Essence of UNIX.
Engineering H192 - Computer Programming Gateway Engineering Education Coalition Lect 4P. 1Winter Quarter Introduction to UNIX Lecture 4.
CIS250 OPERATING SYSTEMS WIN2k Lab # 3 Creating User Accounts Defining User Profiles Creating Groups Setting System Policies.
Payment Center Self Enrollment and Making a Payment Employee Paid (Individual Liability) Travel Card January 2009.
WEB PRICING SYSTEM User Manual. Click here to Log In The Defense Commissary Agency Vendor Price Change system is located at
Managing User Accounts. Module 2 – Creating and Managing Users ♦ Overview ► One should log into a Linux system with a valid user name and password granted.
Agenda Overview of Seneca Computer System –File Servers / Student Computer Accounts –Telnet application –How to Logon to Learn / Phobos accounts How to.
CS161 Topic #21 CS161 Introduction to Computer Science Topic #2.
Security Planning and Administrative Delegation Lesson 6.
Chapter 2: Getting Started Logon to Logout. In this chapter … Logging on The Shell Superuser Getting Help Logging off.
FTP Server and FTP Commands By Nanda Ganesan, Ph.D. © Nanda Ganesan, All Rights Reserved.
This tip sheet focuses on the elements required to access SMART. Total Pages: 5 Accessing SMART Logging In Agency/Facility/Program Access Logging Out IGSR.
U.S. General Services Administration SYSTEM ACCESS AND LOG-IN QUICK REFERENCE CARD This Quick Reference Card is designed to provide users of FMIS with.
Module One Logon and Overview
Before we start…Getting Started. UST Outline History Getting Started Basic commands (command line) Operations on Files and Directories Input and Output.
De Anza College Instructor: Clare Nguyen
Lesson 1-Logging On to the System. Overview Importance of UNIX/Linux. Logging on to the system.
1 Chapter Overview Understanding User Accounts Planning New User Accounts Creating, Modifying, and Deleting User Accounts Setting Properties for User Accounts.
Computers & Operating Systems
Memory & Storage Architecture Seoul National University PuTTY Usage Hyeon-gyu School of Computer Science and Engineering.
Working with Users and Groups Lesson 5. Skills Matrix Technology SkillObjective DomainObjective # Introducing User Account Control Configure and troubleshoot.
Agenda Steps to Obtain your Phobos and Matrix Accounts. How to use a Telnet Application to Access your Phobos and Matrix Accounts How to Create an Effective.
Agenda Overview of Seneca Computer System File Servers / Student Computer Accounts Telnet application How to Logon to Learn / Phobos accounts How to Change.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
1 Introduction to Auditing Auditing allows you to track User activities. Microsoft Windows 2000 activities. Windows 2000 records events in the security.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
SCSC 455 Computer Security Chapter 3 User Security.
FTP COMMANDS OBJECTIVES. General overview. Introduction to FTP server. Types of FTP users. FTP commands examples. FTP commands in action (example of use).
Agenda Overview of Seneca Computer System File Servers / Student Computer Accounts Telnet application How to Logon to Learn / Phobos accounts How to Change.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
1 Chapter Overview Using Group Objects Understanding Default Groups Creating Group Objects Managing Administrative Access.
Issue Date January OKLAHOMA STATE IMMUNIZATION INFORMATION SYSTEM I IMMUNIZE. SAVE LIVES. Accessing OSIIS as a View Only User.
Chapter 12: Authentication Basics Passwords Challenge-Response Biometrics Location Multiple Methods Computer Security: Art and Science © Matt.
LINUX Presented By Parvathy Subramanian. April 23, 2008LINUX, By Parvathy Subramanian2 Agenda ► Introduction ► Standard design for security systems ►
Passwords New Policies and You. New Password Policies Passwords Must Be Unique. (cannot be reused within 1 year) Minimum Password Length: 6 Maximum Password.
2016 TELPAS Online Testing. TELPAS Assessment Management System Accessed at
Page ADP PearsonAccess Proctor Training. Page Agenda Test Overview Testing Components Proctor Roles and Responsibilities Overview Administering the Test.
Linux CSE 1222 CSE1222: Lecture 1BThe Ohio State University1.
User Access and User ID Commands in UNIX
Introduction to Operating System (OS)
Windows xp PART 1 DR.WAFAA SHRIEF.
Lesson 16-Windows NT Security Issues
Presentation transcript:

CS 1451 UNIX OPERATING SYSTEM Lecture 1

CS 1452 OVERVIEW UNIX Operating System  Multi-Tasking  Multi-User  Interactive Supports computer systems  Standalone  Networked

CS 1453 HISTORY Created by Computer Science Research Group at Bell Labs Circa 1970 Objectives of the creators “... to create a computing environment where they themselves (the staff of CSRG) could comfortably and effectively pursue their own work - programming research.”

CS 1454 MULTI-TASKING The ability to perform several tasks -- processes -- at the same time Allows background/foreground processing

CS 1455 MULTI-USER More than one person may use the system at the same time User doing more than one thing at the same time Relatively secure environment for multiple users Multiple protection levels for files, processes

CS 1456 INTERACTIVE User issues commands System performs commands System reports results User issues more commands

CS 1457 Working in the CTU Lab Logging in and out Working with the terminal emulator

CS 1458 Handout: terminal emulator See separate handout for how to use TerraTerm Pro terminal emulator Emulator simulates a dumb terminal accessing UNIX Handout shows how start, configure emulator Use Windows services for printing – not UNIX print services

CS 1459 Login Name Login names Must be at least 6 characters long Only the first 8 characters are significant Case sensitive (as is most of UNIX) Spaces allowed, not recommended Control characters and punctuation are permitted  Most people avoid them  Control-s and control-g are not permitted

CS Login continued Best login names contain characters, mixed case, digits Login must exist on the system prior to logging in as that user Login names must be unique Only system admin (Super-User) may issue logon IDs Login entry followed by “Return”

CS Login Names Valid Entries Invalid Entries cowboy the_black_marauder(> 8 char) marauder john smith(contains a space) johnny sarah^g(contains control-g) johnnyQ sam(too short) cee3po MyLoGiN it’s_me

CS Passwords Must be at least 6 characters long Only the first eight characters are significant Case sensitive Spaces, punctuation, and control characters are permitted (but not control-s and control-g) Must be different than login name Must differ from the old password

CS Passwords Any user may change their own password Super-User (i.e., systems administrator) cannot decode your password Must be issued a new password if old one forgotten Passwords never appear on the screen

CS passwd command $ passwd system prompts for old password system then prompts for new password system then prompts for new again if change occurs no message appears = UNIX Principle: No news is good news

CS Login Failure A login failure will generate a login error which must be acknowledged If login does not exist Screen will be cleared and a new login screen generated If login does exist, but password is incorrect Only the password entry is cleared The cursor is positioned for a new password attempt. After a certain number of tries, screen is cleared or system quits talking to you

CS Login Failure (cont) Frequently a login will look correct, but is not It may contain a leading space or tab which are difficult to see If login continues to fail after several tries … Contact instructor, then system administrator.

CS Successful login See the $ prompt – you’re in System ready to accept commands

CS Minimizing, enlarging windows Use the Windows screen size controls to maximize, minimize windows DO NOT change window size during a vi editing session You can toggle from the UNIX terminal session to other Windows tools, like Word You can run multiple TerraTerm windows and sessions simultaneously