SlideShare una empresa de Scribd logo
1 de 313
Descargar para leer sin conexión
Red Hat Certified engineer course  ,[object Object],[object Object]
AGENDA ,[object Object],[object Object],[object Object],[object Object],[object Object]
Course roles  time, participate,mobile,selected,feedback
Participant Introductions   instructor  Please introduce yourself :- -name.  -job. -computer background.  -”why you are here” ? -what you will do with this course?
What is RHCT, RHCE & why ?
Course sequence
RH033: Red Hat Linux Essentials “First level”
Course Description The first course for both RHCT and RHCE certification tracks, RH033 is for who have never used Linux or UNIX, and who have no prior command line experience in any other operating system. You are taught the basics of a Red Hat Enterprise Linux environment, and it prepares you for your future role as a system administrator.
Prerequisites User-level experience with any computer system, use of menus, use of any graphical user interface. Goal A Red Hat Enterprise Linux power user who can be productive in using and customizing a Red-Hat system for common command line processes and desktop productivity roles. Audience Users who are new to Linux and have no prior UNIX or command line skills, who want to develop and practice the basic skills to use and control their own Red Hat Linux system.
Course Objectives 1. Understand the Linux file system 2. Perform common file maintenance 3. Use and customize the GNOME interface 4. Issue essential Linux commands from the command line 5. Perform common tasks using the GNOME GUI 6. Open, edit, and save text documents using the vi editor 7. File access permissions 8. Customize X Window System 9. Regular expression pattern matching and I/O redirection 10. Install, upgrade, delete and query packages on your system 11. Network utilities for the user 12. Power user utilities
RH133: Red Hat Linux System Administration   Red Hat Certified Technician (RHCT) “second level”
Course Description RH133 focuses on skills in systems administration on Red Hat Linux, to a level where you can attach and configure a workstation on an existing network. This course provides intensive hands-on training on Red Hat Enterprise Linux, and it prepare for the RHCT Certification .
Prerequisites RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux. Goal Upon successful completion of this course, students will possess basic Linux system administrator knowledge which can be proved by passing the RHCT Exam. The exam is a performance based lab exam that tests actual ability to install, configure, and attach a new Red Hat Linux system to an existing production network. Audience Linux or UNIX users who understand the basics of Red Hat Linux and desire further technical training to begin the process of becoming a system administrator.
Course Objectives 1. Install Red Hat Linux interactively and with Kickstart 2. Control common system hardware; administer Linux printing subsystem 3. Create and maintain the Linux file system 4. Perform user and group administration 5. Integrate a workstation with an existing network 6. Configure a workstation as a client to NIS, DNS, and DHCP services 7.  Automate tasks with at, cron, and anacron 8.  Back up file systems to tape and tar archive 9.  Manipulate software packages with RPM 10. Configure the X Window System and the GNOME d.e. 11. Perform performance, memory, and process mgmt. 12. Configure basic host security
RH253 Red Hat Linux Networking and Security Administration Red Hat Certified  engineer(RHCE) “third level”
Course Description RH253 arms students with in-depth knowledge needed to configure common Red Hat Enterprise Linux network services. Network and local security tasks are also topics of this course.
Prerequisites RH133 Red Hat Linux System Administration or equivalent experience with Red Hat Enterprise Linux, LAN/WAN fundamentals or equivalent, internet working with TCP/IP or equivalent. Goal Upon completion of this course, individuals can set up a Red Hat Enterprise Linux server and configure common network services and security at a basic level. Audience Linux or UNIX system administrators who already have some  experience with Red-Hat Enterprise Linux systems administration, want course in networking services and security, and want to build skills at configuring  network services and security administration .
Course Objectives 1. Networking services on Red Hat Linux server-side setup, configuration, and basic administration of common networking services: DNS, NIS, Apache, SMB, DHCP, Sendmail, FTP, proxy. 2. Introduction to security 3. Developing a security policy 4. Local security 5. Files and file system security 6. Password security 7. Kernel security 8.  Basic elements of a firewall 9.  Red Hat Linux-based security tools 10. Responding to a break-in attempt 11. Security sources and methods 12. Overview of security tools
RH033: Red Hat Linux Essentials “First level”
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Switching between virtual consoles and the graphical environment A typical Linux system will run six virtual consoles and one graphical console -Server systems often have only virtual consoles -Desktops and workstations typically have both
Switch among virtual consoles by typing: Ctrl-Alt-F[1-> 6] Access the graphical console by typing   Ctrl-Alt-F7
Elements of the X Window System -The X Window System is Linux's graphical subsystem -Xorg is the particular version of the X Window System used by Red Hat Open source implementation of X Look and behavior largely controlled by the desktop environment
[object Object],[object Object],[object Object],[object Object]
Starting the X server -On some systems, the X server starts automatically at boot time -Otherwise, if systems come up in virtual consoles, users must start the X server manually -The X server must be pre-configured by the system administrator -Log into a virtual console and run  startx  The X server appears on Ctrl-Alt-F7
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
what is shell command ? They are part of a shell, each shell (C Shell, Bourne Shell and Korn Shell) has a set of commands built into its program, the commands within each shell stay the same across Linux / Unix distributions . The user types shell commands at the shell prompt, the default of which is % for the C Shell, and $ for the Bourne Shell , Korn Shell . bash
Running Commands Commands have the following syntax: [ command   O ptions   arguments] Each item is separated by a space - Options  modify a command's behavior Single-letter options usually preceded by “-” Can be passed as -a -b -c or -abc Full-word options usually preceded by “--” [ --help] - Arguments  are file names or other data needed by the command Multiple Commands can be separated by “;”
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
  The whatis Command Displays short descriptions of commands Uses a database that is updated nightly Often not available immediately after install $  whatis   cal cal  (1)  - displays a calendar
The --help Option Displays usage summary and argument list Used by most, but not all, commands $ date --help Usage: date [OPTION]... [+FORMAT] or: date [-u|--utc|--universal] [MMDDhhmm] Display the current time in the given FORMAT, or set the system date.
Reading Usage Summaries Printed by -- help , man and others Used to describe the syntax of a command Arguments in [ ] are optional Arguments in CAPS or <> are variables Text followed by ... represents a list x|y|z means &quot;x or y or z&quot; -abc means &quot;any mix of -a, -b or -c&quot;
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
current Working Directory Each shell and system process has a current working directory  pwd   Displays the absolute path to the shell's cwd
Changing Directories cd  changes directories To an absolute or relative path:  cd /home/joshua/work   ,  cd project/docs To a directory one level up:  cd .. To your home directory:  cd To your previous working directory:  cd -
Listing Directory Contents Lists contents of the current directory or a specified directory Usage : ls  [options] [files_or_dirs] Example: ls -a (include hidden files)‏ ls -l (display extra information)‏ ls -R (recurse through directories)‏ ls -ld (directory and symlink information)‏
Copying Files and Directories cp  - copy files and directories Usage: cp [options] file  destination More than one file may be copied at a time if the destination is a directory: cp [options] file1 file2 destination
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating and Removing Files touch  - create empty files or update file timestamps rm  - remove files Usage: rm [options] <file>... Example: rm -i file (interactive)‏ rm -r directory (recursive)‏ rm -f file (force)‏
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Determining File Content Files can contain many types of data Check file type with file before opening to determine appropriate command or application to use file  [options] <filename>...
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
Permission Types Four symbols are used when displaying permissions: r : permission to read a file or list a directory's contents w : permission to write to a file or create and remove files from a directory x:  permission to execute a program or change into a directory and do a long listing of the directory - : no permission (in place of the r, w, or x)‏
Examining Permissions File permissions may be viewed using ls -l $  ls -l  /bin/login -rwxr-xr-x  1 root root 19080 Apr 1 18:26 /bin/login File type and permissions represented by a 10 character string
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Changing Permissions – Nautilus Nautilus can be used to set the permissions and group membership of files and directories. In a Nautilus window, right-click on a file Select Properties from the context menu Select the Permissions tab
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Command Line Shortcuts The Tab Key Type  Tab  to complete command lines: For the command name, it will complete a command name For an argument, it will complete a file name Examples: $ xte<Tab> $ xterm $ ls myf<Tab> $ ls myfile.txt
Command Line Shortcuts History bash stores a history of commands you've entered, which can be used to repeat commands Use history command to see list of remembered commands $ history 14 cd /tmp 15 ls -l 16 cd 17 cp /etc/passwd . 18 vi passwd
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Creating Shell Scripts Step 1: Use such as vi to create a text file containing commands -First line contains  #!/bin/bash Comment your scripts! Comments start with a #
Step 2: Make the script executable: $ chmod u+x myscript.sh To execute the new script: Place the script file in a directory in the executable path -OR-Specify the absolute or relative path to the script on the command line
Sample Shell Script #!/bin/bash # This script displays some information about your environment echo &quot;Greetings. The date and time are $(date)&quot; echo &quot;Your working directory is: $(pwd)&quot;
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
Redirecting Output to a File STDOUT and STDERR can be redirected to files: command   operator   filename Supported operators include: > Redirect STDOUT to file 2> Redirect STDERR to file &> Redirect all output to file File contents are overwritten by default. >> appends.
Redirecting Output to a File  Examples This command generates output and errors when run as non-root: $ find /etc -name passwd Operators can be used to store output and errors: $ find /etc -name passwd > find.out $ find /etc -name passwd 2> /dev/null $ find /etc -name passwd > find.out 2> find.err
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Redirecting STDOUT to a Program Examples less : View input one page at a time: $ ls -l /etc | less Input can be searched with / mail : Send input via email: $ echo &quot;test email&quot; | mail -s &quot;test&quot; user@example.com lpr  : Send input to a printer $ echo &quot;test print&quot; | lpr $ echo &quot;test print&quot; | lpr -P printer_name
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Redirecting STDIN from a File Redirect standard input with < Some commands can accept data redirected to STDIN from a file: $ tr 'a-z' 'A-Z' < .bash_profile This command will translate the uppercase characters in .bash_profile to lowercase Equivalent to: $ cat .bash_profile | tr 'a-z' 'A-Z'
Sending Multiple Lines to STDIN Redirect multiple lines from keyboard to STDIN with <<WORD -All text until  WORD  is sent to STDIN Sometimes called a heretext $ mail -s &quot;Please Call&quot; jane@example.com <<END > Hi Jane, > Please give me a call when you get in. We may need > to do some maintenance on server1. > Details when you're on-site, > Boris > END
Scripting: for loops Performs actions on each member of a set of values Example: for NAME in joe jane julie do ADDRESS=&quot;$NAME@example.com&quot; MESSAGE='Projects are due today!' echo $MESSAGE | mail -s Reminder $ADDRESS done
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Viewing File Excerpts head and tail head : Display the first 10 lines of a file Use -n to change number of lines displayed tail : Display the last 10 lines of a file Use -n to change number of lines displayed Use  -f  to &quot;follow&quot; subsequent additions to the file *Very useful for monitoring log files!
Extracting Text by Keyword grep Prints lines of files or STDIN where a pattern is matched $  grep  'john' /etc/passwd $ date --help | grep year Use  -i  to search case-insensitively Use  -n  to print line numbers of matches Use  -v  to print lines not containing pattern Use  -AX  to include the X lines after each match Use  -BX  to include the X lines before each match
Extracting Text by Column cut Display specific columns of file or STDIN data $ cut -d: -f1 /etc/passwd $ grep root /etc/passwd | cut -d: -f7 Use -d to specify the column delimiter (default is TAB)‏ Use -f to specify the column to print Use -c to cut by characters $ cut -c2-5 /usr/share/dict/words
[object Object],[object Object],[object Object],[object Object],[object Object]
Gathering Text Statistics wc (word count)‏ Counts words, lines, bytes and characters  Can act upon a file or STDIN $ wc story.txt 39  237  1901 story.txt Use -l for only line count Use -w for only word count Use -c for only byte count  Use -m for character count  (not displayed)‏
Sorting Text sort sort  text to STDOUT - original file unchanged $ sort [options] file(s)‏ Common options -r performs a reverse (descending) sort -n performs a numeric sort -f ignores (folds) case of characters in strings -u (unique) removes duplicate lines in output -t c uses c as a field separator -k X sorts by c-delimited field X Can be used multiple times
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Duplicating File Changes patch diff  output stored in a file is called a &quot;patchfile&quot; Use -u for &quot;unified&quot; diff, best in patchfiles patch duplicates changes in other files (use with care!)‏ Use -b to automatically back up changed files $ diff -u foo.conf-broken foo.conf-works > foo.patch $  patch  -b foo.conf-broken foo.patch
Spell Checking with aspell Interactively spell-check files: $  aspell  check letter.txt Non-interactively list mis-spelled words in STDIN $ aspell list < letter.txt $ aspell list < letter.txt | wc -l
Tools for Manipulating Text tr and sed Alter ( tr anslate) Characters:  tr  Converts characters in one set to corresponding characters in another set Only reads data from STDIN $  tr 'a-z' 'A-Z' < lowercase.txt Alter Strings:  sed  stream editor Performs search/replace operations on a stream of text Normally does not alter source file Use -i.bak to back-up and alter source file
Sed Examples Quote search and replace instructions! sed addresses sed 's/dog/cat/g' pets sed '1,50s/dog/cat/g' pets sed '/digby/,/duncan/s/dog/cat/g' pets Multiple sed instructions sed -e 's/dog/cat/' -e 's/hi/lo/' pets sed -f myedits pets
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Introducing vim Newer version of vi, the standard Unix text editor Executing vi runs vim by default gvim: Graphical version of vim Applications + Programming -> Vi iMproved Provided by vim-X11 package Advantages : Speed: Do more with fewer keystrokes Simplicity: No dependence on mouse/GUI Availability: Included with most Unix-like OSes Disadvantages Difficulty: Steeper learning curve than simpler editors Key bindings emphasize speed over intuitiveness
vim: A Modal Editor Keystroke behavior is dependent upon vim's &quot;mode&quot; Three main modes: Command Mode  (default): Move cursor, cut/paste  text, change mode Insert Mode : Modify text Ex Mode : Save, quit, etc Esc exits current mode EscEsc always returns to command mode
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Saving a File and Exiting vim Ex Mode Enter Ex Mode with : Creates a command prompt at bottom-left of screen Common write/quit commands: :w writes (saves) the file to disk :wq writes and quits :q! quits, even if changes are lost
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Search and Replace Command Mode Search as in less  /, n, N Search/Replace as in sed Affects current line by default Use x,y ranges  EX  :1,5s/cat/dog/ or % for whole file EX  :%s/cat/dog/gi
Manipulating Text Command Mode Change ( replace ) Delete ( cut ) Yank ( copy )‏ Line  cc  dd    yy Letter  cl  dl    yl Word  cw  dw    yw Sentence ahead  c)  d)  y)‏ Sentence behind  c(  d(    y( Paragraph above  c{  d{  y{ Paragraph below  c}  d}  y}
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Configuring vi and vim Configuring on the fly :set or :set all Configuring permanently ~/.vimrc or ~/.exrc A few common configuration items :set  number :set  autoindent :set  textwidth=65 (vim only)‏ :set  wrapmargin=15 :set  ignorcase Run :help option-list for a   complete list
Learning more vi/vim built-in help :help :help topic Use :q to exit help vimtutor  command
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network Configuration Files DNS Configuration Domain Name Service translates hostnames to network addresses Server address is specified by dhcp or in /etc/resolv.conf search example.com cracker.org nameserver 192.168.0.254 nameserver 192.168.1.254
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Finding Processes Most flexible: ps options | othercommands ps axo comm,tty | grep ttyS0 By predefined patterns: pgrep $ pgrep -U root $ pgrep -G student By exact program name: pidof $ pidof bash
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Sending Signals to Processes By PID: kill [signal] pid ... By Name: killall [signal] comm ... By pattern: pkill [-signal] pattern
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Job Control Run a process in the background Append an ampersand to the command line: firefox  & Temporarily halt a running program Use  Ctrl-z  or send signal 17 (STOP)‏ Manage background or suspended jobs List job numbers and names:  jobs Resume in the background:  bg  [%jobnum] Resume in the foreground:  fg  [%jobnum] Send a signal:  kill  [-SIGNAL] [%jobnum]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Crontab File Format Entry consists of five space-delimited fields followed by  a command line One entry per line, no limit to line length Fields are:- minute, hour, day of month, month, and day of week Comment lines begin with # for details See man 5 crontab
Grouping Commands Two ways to group commands: Compound: date; who | wc -l Commands run back-to-back Subshell: (date; who | wc -l) >> /tmp/trace All output is sent to a single STDOUT and STDERR
Exit Status Processes report success or failure with an exit status 0 for success, 1-255 for failure $? stores the exit status of the most recent command exit [num] terminates and sets status to num Example: $ ping -c1 -W1 station999 &> /dev/null $ echo $? 2
Conditional Execution Operators Commands can be run conditionally based on exit status && represents conditional AND THEN || represents conditional OR ELSE Examples: $ grep -q no_such_user /etc/passwd || echo 'No such user' $ ping -c1 -W2 station1 &> /dev/null && echo &quot;station1 is up&quot; || $(echo 'station1 is unreachable'; exit 1)‏ station1 is up
The test Command Evaluates boolean statements for use in conditional execution Returns 0 for true Returns 1 for false Examples in long form: $ test &quot;$A&quot; = &quot;$B&quot; && echo &quot;Strings are equal&quot; $ test &quot;$A&quot; -eq &quot;$B&quot; && echo &quot;Integers are equal&quot; Examples in shorthand notation: $ [ &quot;$A&quot; = &quot;$B&quot; ] && echo &quot;Strings are equal&quot; $ [ &quot;$A&quot; -eq &quot;$B&quot; ] && echo &quot;Integers are equal&quot;
File Tests File tests: -f tests to see if a file exists and is a regular file -d tests to see if a file exists and is a directory -x tests to see if a file exists and is executable [ -f ~/lib/functions ] && source ~/lib/functions
Scripting: if Statements Execute instructions based on the exit status of a command if ping -c1 -w2 localhost &> /dev/null; then echo 'localhost is UP' elif grep &quot;localhost&quot; ~/maintenance.txt &> /dev/null; then echo 'localhost is undergoing maintenance' else echo 'localhost is unexpectedly DOWN!' exit 1 fi
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bash Variables Variables are named values Useful for storing data or command output Set with VARIABLE=VALUE Referenced with $VARIABLE $ HI=&quot;Hello, and welcome to $(hostname).&quot; $ echo $HI Hello, and welcome to stationX.
Environment Variables Variables are local to a single shell by default Environment variables are inherited by child shells Set with export VARIABLE=VALUE Accessed by some programs for configuration
Aliases Aliases let you create shortcuts to commands $ alias dir='ls -laF' Use alias by itself to see all set aliases Use alias followed by an alias name to see alias value $ alias dir alias dir='ls -laF'
How bash Expands a Command Line 1. Split the line into words 2. Expand aliases 3. Expand curly-brace statements ({})‏ 4. Expand tilde statements (~)‏ 5. Expand variables ($)‏ 6. Command-substituation ($() and ``)‏ 7. Split the line into words again 8. Expand file globs (*, ?, [abc], etc)‏ 9. Prepare I/O redirections (<, >)‏ 10. Run the command!
Preventing Expansion Backslash ( ) makes the next character literal $ echo Your cost: 5.00 Your cost: $5.00 Quoting prevents expansion Single quotes (') inhibit all expansion Double quotes (&quot;) inhibit all expansion, except: $ (dollar sign) - variable expansion ` (backquotes) - command substitution (backslash) - single character inhibition ! (exclamation point) - history substitution
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Bash start up tasks: profile Stored in /etc/profile (global) and ~/. bash_profile (user)‏ Run for login shells only Used for Setting environment variables Running commands (eg mail-checker script)‏
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Scripting: Taking input with positional Parameters Positional parameters are special variables that hold the command-line arguments to the script. The positional parameters available are $1,$2, $3, etc. . These are normally assigned to more meaningful variable names to improve clarity. $* holds all command-line arguments $# holds the number of command-line arguments
Scripting: Taking input with the read command Use read to assign input values to one or more shell variables: -p designates prompt to display read reads from standard input and assigns one word to each variable Any leftover words are assigned to the last variable read -p &quot;Enter a filename: &quot; FILE
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object]
locate Examples locate foo Search for files with &quot;foo&quot; in the name or path locate -r 'foo$' Regex search for files ending in &quot;.foo&quot; Useful options -i performs a case-insensitive search -n X lists only the first X matches
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Basic find Examples find -name snow.png Search for files named snow.png find -iname snow.png Case-insensitive search for files named snow.png, Snow.png, SNOW.PNG, etc find -user joe -group joe Search for files owned by the user joe  and the group joe
find and Logical Operators Criteria are ANDed together by default. Can be OR'd or negated with -o and -not Parentheses can be used to determine logic order, but must be escaped in bash. find -user joe -not -group joe find -user joe -o -user jane find -not  -user joe -o -user jane ‏
find and Permissions Can match ownership by name or id find / -user joe -o -uid 500 Can match octal or symbolic permissions find -perm 755 matches if mode is exactly 755 find -perm +222 matches if anyone can write find -perm -222 matches if everyone can write find -perm -002 matches if other can write
find and Numeric Criteria Many find criteria take numeric values find -size 1024k Files with a size of exactly 1megabyte find -size +1024k Files with a size over 1 megabyte find -size -1024k Files with a size less than 1 megabyte
find and Access Times find can match by inode timestamps -atime when file was last read -mtime when file data last changed -ctime when file data or metadata last changed Value given is in days find -ctime -10 Files modified less than 10 days ago
Executing Commands with find Commands can be executed on found files Command must be preceded with -exec or -ok -ok prompts before acting on each file Command must end with Space Can use {} as a filename placeholder find -size +102400k -ok gzip {}
find Execution Examples find -name &quot;*.cconf&quot; -exec cp {} {}.orig Back up configuration files, adding a .orig extension find /tmp -ctime +3 -user joe -ok rm {} Prompt to remove Joe's tmp files that are over 3 days old find ~ -perm +o+w -exec chmod o-w {}  Fix other-writable files in your home directory
The Gnome Search Tool Places->Search for Files... Graphical tool for searching by name content owner/group size modification time
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Web Clients Firefox Other web browsers Non-GUI web browsers wget
Firefox Fast, lightweight, feature-rich web browser Tabbed browsing Popup blocking Cookie management Multi-engine search bar Support for many popular plug-ins Themes and Extensions
Non-GUI Web Browsers links Provided by the elinks rpm Full support for frames and ssl Examples links http://www.redhat.com links -dump http://www.redhat.com links -source http://www.redhat.com
Wget Retrieves files via HTTP and FTP Non-interactive - useful in shell scripts Can follow links and traverse directory trees on the remote server - useful for mirroring web and FTP sites
Email and Messaging Evolution Other email clients Non-GUI email clients Gaim
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Configuring Evolution Defining accounts Tools->Settings->Mail Accounts Supports IMAP, pop, Novell Groupware, Usenet and local email accounts MS Exchange support via plug-in Provided by evolution-connector rpm Install before  configuring other accounts
Configuring Evolution Defining accounts Tools->Settings->Mail Accounts Supports IMAP, pop, Novell Groupware, Usenet and local email accounts MS Exchange support via plug-in Provided by evolution-connector rpm Install before configuring other accounts
Other GUI Mail Clients Thunderbird Standalone Mozilla email client Kmail KDE email client
Non-GUI Mail Clients mutt Supports pop, imap and local mailboxes Highly configurable Mappable hotkeys Message threading and colorizing GnuPG integration Context-sensitive help with '?'
Gaim Multi-protocol Instant messaging client Available in Red Hat Enterprise Linux Client Supports AIM, MSN, ICQ, Yahoo, Jabber, Gadu-Gadu, SILC, GroupWise Messenger, IRC and Zephyr networks. Plugins can be used to add functionality.
Open Ssh: Secure Remote Shell Secure replacement for older remote-access tools Allows authenticated, encrypted access to remote systems ssh [user@]hostname ssh [user@]hostname command
scp: Secure File Transfer Secure replacement for rcp Layered on top of ssh scp source destination Remote files can be specified using: [user@]host:/path/to/file Use -r to enable recursion Use -p to preserve times and permissions Use -C to compress datastream
rsync: Efficient File Sync Efficiently copies files to or from remote systems Uses secure ssh connections for transport rsync *.conf barney:/home/joe/configs/ Faster than scp - copies differences in like files
Open Ssh Key-based Authentication Optional, password-less, but still secure, authentication Uses two keys generated by ssh-keygen: private key  stays on your system Usually passphrase-protected (recommended )‏ public key is copied to destination with ssh-copy-id ssh-copy-id [user@]host
Open Ssh Key-based Authentication continued An authentication agent stores decrypted private keys Thus, passphrase only needs to be entered once An agent is provided automatically in GNOME Otherwise, run ssh-agent bash Keys are added to the agent with ssh-add
FTP Clients CLI: lftp $ lftp ftp.example.com $ lftp -u joe ftp.example.com Automated transfers with lftpget GUI: gFTP Applications->Internet->gFTP Allows Drag-and-Drop transfers Anonymous or authenticated access Optional secure transfer via ssh (sftp)‏
Smbclient FTP-like client to access SMB/CIFS resources Examples: smbclient -L server1 lists shares on server1 smbclient -U student //server1/homes accesses a share
File Transfer with Nautilus File/Connect to Server Graphically browse with multiple protocols Allows drag-and-drop file transfers Supported connection types: FTP, SFTP, SMB, WebDAV, Secure WebDAV Can also connect via url: File/Open Location
Xorg Clients All graphical applications are X clients Can connect to remote X severs via tcp/ip Data is not encrypted but can be tunneled securely over an ssh connection ssh -X user@hostB xterm & xterm will display on hostA's X server Transmitted data will be encrypted through the ssh connection
Network Diagnostic Tools ping traceroute host dig netstat gnome-nettool (GUI)‏
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object]
/etc/passwd, /etc/shadow, and /etc/group files Authentication information is stored in plain text files: /etc/passwd /etc/shadow /etc/group /etc/gshadow
User management tools Graphical tools system-config-users Command-line useradd usermod userdel [-r]
System Users and Groups Server programs such as web or print servers typically run as unprivileged users, not as root Examples: daemon, mail, lp, nobody Running programs in this way limits the amount of damage any single program can do to the system
Monitoring Logins Connected users: w Recent Logins: last, lastb
Default Permissions Default permission for directories is 777 minus umask Default permission for files is the directory default without execute permission. umask is set with the umask command. Non-privileged users' umask is 002 Files will have permissions of 664 Directories will have permissions of 775 root's umask is 022
Special Permissions for Executables Special permissions for executables: suid : command run with permissions of the owner of the command, not executor of the command sgid : command runs with group affiliation of the group of the command
Special Permissions for Directories Special permissions for directories: sticky bit: files in directories with the sticky bit set can only be removed by the owner and root, regardless of the write permissions of the directory sgid: files created in directories with the sgid bit set have group affiliations of the group of the directory
Special Permissions for Directories Special permissions for directories: sticky bit: files in directories with the sticky bit set can only be removed by the owner and root, regardless of the write permissions of the directory sgid: files created in directories with the sgid bit set have group affiliations of the group of the directory
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Partitions and Filesystems Disk drives are divided into partitions Partitions are formatted with filesystems  allowing users to store data Default filesystem: ext3, the Third Extended Linux Filesystem Other common filesystems: ext2 and msdos (typically used for floppies)‏ iso9660 (typically used for CDs)‏ GFS and GFS2 (typically for SANs)‏
Inodes An inode table contains a list of all files in an ext2 or ext3 filesystem An inode (index node) is an entry in the table, containing information about a file (the metadata), including: file type, permissions, UID, GID the link count (count of path names pointing to this file)‏ the file's size and various time stamps pointers to the file's data blocks on disk other data about the file
Directories The computer's reference for a file is the inode number The human way to reference a file is by file name A directory is a mapping between the human name for the file and the computer's inode number
cp and inodes The cp command: 1. Allocates a free inode number, placing a new entry in the inode table 2. Creates a dentry in the directory, associating a name with the inode number 3. Copies data into the new file
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
rm and inodes The rm command: 1. Decrements the link count, thus freeing the inode number to be reused 2. Places data blocks on the free list 3. Removes the directory entry Data is not actually removed, but will be overwritten when the data blocks are used by another file
Hard Links hard link adds an additional pathname to reference a single file One physical file on the filesystem Each directory references the same inode number Increments the link count The rm command decrements the link count File exists as long as at least one link remains When the link count is zero, the file is removed Cannot span drives or partitions Syntax: ln filename [linkname]
Symbolic (or Soft) Links A symbolic link points to another file ls -l  displays the link name and the referenced file lrwxrwxrwx 1 joe joe 11 Sep 25 18:02 pf -> /etc/passwd File type: l for symbolic link The content of a symbolic link is the name of the file that it references Syntax: ln -s filename linkname
The Seven Fundamental Filetypes ls -l symbol File Type -  regular file d  directory l  symbolic link b  block special file c  character special file p  named pipe s  socket
Checking Free Space df  - Reports disk space usage Reports total kilobytes, kilobytes used, kilobytes free per file system -h and -H display sizes in easier to read units du  - Reports disk space usage Reports kilobytes used per directory Includes subtotals for each subdirectory -s option only reports single directorysummary Also takes -h and -H options Applications->System Tools->Disk Usage Analyzer or baobab - Reports disk space usage graphically
Removable Media Mounting means making a foreign filesystem look like part of the main tree. Before accessing, media must be mounted Before removing, media must be unmounted By default, non-root users may only mount certain devices (cd, dvd, floppy, usb, etc)‏ Mountpoints are usually under /media
Mounting CDs and DVDs Automatically mounted in Gnome/KDE Otherwise, must be manually mounted CD/DVD Reader mount /media/cdrom CD/DVD Writer mount /media/cdrecorder eject command unmounts and ejects the disk
Mounting USB Media Detected by the kernel as SCSI devices /dev/sdaX or /dev/sdbX or similar Automatically mounted in Gnome/KDE Icon created in Computer window Mounted under /media/Device ID Device ID is built into device by vendor
Archiving Files and Compressing Archives Archiving places many files into one target file Easier to back up, store, and transfer tar  - standard Linux archiving command Archives are commonly compressed Algorithm applied that compresses file Uncompressing restores the original file tar natively supports compression using gzip and gunzip, or bzip2 and bunzip2
Creating, Listing, and Extracting File Archives Action arguments (one is required): -c create an archive -t list an archive -x extract files from an archive Typically required: -f archivename name of file archive Optional arguments: -z use gzip compression -j use bzip2 compression -v be verbose
Creating File Archives: Other Tools zip and unzip Supports pkzip-compatible archives Example: zip etc.zip /etc unzip etc.zip file-roller Graphical, multi-format archiving tool
End of Unit 16 Questions ...? Summary Linux filesystem structure Using removable media Using unformatted floppies Archiving and compression
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Planning an Installation What hardware does the system use? Check hardware compatibility Read the RELEASE-NOTES file on the first CD or at http://www.redhat.com Provides valuable summary of features and gotchas
Performing an Installation Installer can be started from: CD-ROM or DVD-ROM USB Device Network (PXE)‏ Supported installation sources: Network Server (ftp, http or nfs)‏ CD-ROM or DVD-ROM Hard Disk
Managing Services What is a service? Graphical Interface to Service Management system-config-services Command Line Interface to Service Management service chkconfig
Managing Software Software is provided as RPM packages Easy installation and removal Software information stored in a local database Packages are provided by Red Hat Network Centralized ma
  Red Hat Certified engineer course
  Red Hat Certified engineer course
  Red Hat Certified engineer course
  Red Hat Certified engineer course
  Red Hat Certified engineer course
  Red Hat Certified engineer course
  Red Hat Certified engineer course
  Red Hat Certified engineer course
  Red Hat Certified engineer course
  Red Hat Certified engineer course
  Red Hat Certified engineer course
  Red Hat Certified engineer course
  Red Hat Certified engineer course
  Red Hat Certified engineer course

Más contenido relacionado

La actualidad más candente

Virtualization VMWare technology
Virtualization VMWare technologyVirtualization VMWare technology
Virtualization VMWare technologysanjoysanyal
 
Virtual Infrastructure Overview
Virtual Infrastructure OverviewVirtual Infrastructure Overview
Virtual Infrastructure Overviewvalerian_ceaus
 
Introduction to Hyper-V
Introduction to Hyper-VIntroduction to Hyper-V
Introduction to Hyper-VMark Wilson
 
Apache CloudStack Architecture by Alex Huang
Apache CloudStack Architecture by Alex HuangApache CloudStack Architecture by Alex Huang
Apache CloudStack Architecture by Alex Huangbuildacloud
 
Best Network Performance Monitoring Tool
Best Network Performance Monitoring ToolBest Network Performance Monitoring Tool
Best Network Performance Monitoring ToolJoe Shestak
 
Network Monitoring System
Network Monitoring SystemNetwork Monitoring System
Network Monitoring SystemRofiq Fauzi
 
Virtualization Architecture & KVM
Virtualization Architecture & KVMVirtualization Architecture & KVM
Virtualization Architecture & KVMPradeep Kumar
 
Red hat linux essentials
Red hat linux essentialsRed hat linux essentials
Red hat linux essentialsHaitham Raik
 
VMware vSphere technical presentation
VMware vSphere technical presentationVMware vSphere technical presentation
VMware vSphere technical presentationaleyeldean
 
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...Edureka!
 
An Introduction to VMware NSX
An Introduction to VMware NSXAn Introduction to VMware NSX
An Introduction to VMware NSXScott Lowe
 
Linux Administration
Linux AdministrationLinux Administration
Linux AdministrationHarish1983
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network servicesUc Man
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualizationAhmad Hafeezi
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage VirtualizationMehul Jariwala
 

La actualidad más candente (20)

Nfs
NfsNfs
Nfs
 
Linux introduction
Linux introductionLinux introduction
Linux introduction
 
Virtualization VMWare technology
Virtualization VMWare technologyVirtualization VMWare technology
Virtualization VMWare technology
 
Virtual Infrastructure Overview
Virtual Infrastructure OverviewVirtual Infrastructure Overview
Virtual Infrastructure Overview
 
Introduction to Hyper-V
Introduction to Hyper-VIntroduction to Hyper-V
Introduction to Hyper-V
 
Apache CloudStack Architecture by Alex Huang
Apache CloudStack Architecture by Alex HuangApache CloudStack Architecture by Alex Huang
Apache CloudStack Architecture by Alex Huang
 
Nfs
NfsNfs
Nfs
 
Best Network Performance Monitoring Tool
Best Network Performance Monitoring ToolBest Network Performance Monitoring Tool
Best Network Performance Monitoring Tool
 
Network Monitoring System
Network Monitoring SystemNetwork Monitoring System
Network Monitoring System
 
The kvm virtualization way
The kvm virtualization wayThe kvm virtualization way
The kvm virtualization way
 
Virtualization Architecture & KVM
Virtualization Architecture & KVMVirtualization Architecture & KVM
Virtualization Architecture & KVM
 
Red hat linux essentials
Red hat linux essentialsRed hat linux essentials
Red hat linux essentials
 
VMware vSphere technical presentation
VMware vSphere technical presentationVMware vSphere technical presentation
VMware vSphere technical presentation
 
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
VMware Tutorial For Beginners | VMware Workstation | VMware Virtualization | ...
 
An Introduction to VMware NSX
An Introduction to VMware NSXAn Introduction to VMware NSX
An Introduction to VMware NSX
 
Linux Administration
Linux AdministrationLinux Administration
Linux Administration
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
 
System and network administration network services
System and network administration network servicesSystem and network administration network services
System and network administration network services
 
Introduction to virtualization
Introduction to virtualizationIntroduction to virtualization
Introduction to virtualization
 
Storage Virtualization
Storage VirtualizationStorage Virtualization
Storage Virtualization
 

Destacado

Red hat enterprise linux 7 (rhel 7)
Red hat enterprise linux 7 (rhel 7)Red hat enterprise linux 7 (rhel 7)
Red hat enterprise linux 7 (rhel 7)Ramola Dhande
 
A Container Stack for Openstack - OpenStack Silicon Valley
A Container Stack for Openstack - OpenStack Silicon ValleyA Container Stack for Openstack - OpenStack Silicon Valley
A Container Stack for Openstack - OpenStack Silicon ValleyStephen Gordon
 
Deploying Containers at Scale on OpenStack
Deploying Containers at Scale on OpenStackDeploying Containers at Scale on OpenStack
Deploying Containers at Scale on OpenStackStephen Gordon
 
Containers for the Enterprise: Delivering OpenShift on OpenStack for Performa...
Containers for the Enterprise: Delivering OpenShift on OpenStack for Performa...Containers for the Enterprise: Delivering OpenShift on OpenStack for Performa...
Containers for the Enterprise: Delivering OpenShift on OpenStack for Performa...Stephen Gordon
 
Deep Dive: OpenStack Summit (Red Hat Summit 2014)
Deep Dive: OpenStack Summit (Red Hat Summit 2014)Deep Dive: OpenStack Summit (Red Hat Summit 2014)
Deep Dive: OpenStack Summit (Red Hat Summit 2014)Stephen Gordon
 
Rh124 red-hat-system-administration-i
Rh124 red-hat-system-administration-iRh124 red-hat-system-administration-i
Rh124 red-hat-system-administration-ialimemar66
 
Work Flow for Solo Developers and Small Teams
Work Flow for Solo Developers and Small TeamsWork Flow for Solo Developers and Small Teams
Work Flow for Solo Developers and Small TeamsEmma Jane Hogbin Westby
 
Talk on PHP Day Uruguay about Docker
Talk on PHP Day Uruguay about DockerTalk on PHP Day Uruguay about Docker
Talk on PHP Day Uruguay about DockerWellington Silva
 
Unix tutorial-08
Unix tutorial-08Unix tutorial-08
Unix tutorial-08Tushar Jain
 
Ras pioverview
Ras pioverviewRas pioverview
Ras pioverviewAlec Clews
 
Linux fundamental - Chap 16 System Rescue
Linux fundamental - Chap 16 System RescueLinux fundamental - Chap 16 System Rescue
Linux fundamental - Chap 16 System RescueKenny (netman)
 
Linux pipe & redirection
Linux pipe & redirectionLinux pipe & redirection
Linux pipe & redirectionColin Su
 
Perintah dasar linux
Perintah dasar linuxPerintah dasar linux
Perintah dasar linuxAcep Nugraha
 
Linux network monitoring hands-on pratice
Linux network monitoring hands-on praticeLinux network monitoring hands-on pratice
Linux network monitoring hands-on praticeKenny (netman)
 
Linux fundamentals
Linux fundamentalsLinux fundamentals
Linux fundamentalschakrikolla
 

Destacado (20)

Red hat enterprise linux 7 (rhel 7)
Red hat enterprise linux 7 (rhel 7)Red hat enterprise linux 7 (rhel 7)
Red hat enterprise linux 7 (rhel 7)
 
A Container Stack for Openstack - OpenStack Silicon Valley
A Container Stack for Openstack - OpenStack Silicon ValleyA Container Stack for Openstack - OpenStack Silicon Valley
A Container Stack for Openstack - OpenStack Silicon Valley
 
Deploying Containers at Scale on OpenStack
Deploying Containers at Scale on OpenStackDeploying Containers at Scale on OpenStack
Deploying Containers at Scale on OpenStack
 
Containers for the Enterprise: Delivering OpenShift on OpenStack for Performa...
Containers for the Enterprise: Delivering OpenShift on OpenStack for Performa...Containers for the Enterprise: Delivering OpenShift on OpenStack for Performa...
Containers for the Enterprise: Delivering OpenShift on OpenStack for Performa...
 
Deep Dive: OpenStack Summit (Red Hat Summit 2014)
Deep Dive: OpenStack Summit (Red Hat Summit 2014)Deep Dive: OpenStack Summit (Red Hat Summit 2014)
Deep Dive: OpenStack Summit (Red Hat Summit 2014)
 
Rh124 red-hat-system-administration-i
Rh124 red-hat-system-administration-iRh124 red-hat-system-administration-i
Rh124 red-hat-system-administration-i
 
Sahul
SahulSahul
Sahul
 
Work Flow for Solo Developers and Small Teams
Work Flow for Solo Developers and Small TeamsWork Flow for Solo Developers and Small Teams
Work Flow for Solo Developers and Small Teams
 
Talk on PHP Day Uruguay about Docker
Talk on PHP Day Uruguay about DockerTalk on PHP Day Uruguay about Docker
Talk on PHP Day Uruguay about Docker
 
Unix tutorial-08
Unix tutorial-08Unix tutorial-08
Unix tutorial-08
 
Ras pioverview
Ras pioverviewRas pioverview
Ras pioverview
 
Chap 18 net
Chap 18 netChap 18 net
Chap 18 net
 
Linux fundamental - Chap 16 System Rescue
Linux fundamental - Chap 16 System RescueLinux fundamental - Chap 16 System Rescue
Linux fundamental - Chap 16 System Rescue
 
Linux Commands
Linux CommandsLinux Commands
Linux Commands
 
Chap 17 advfs
Chap 17 advfsChap 17 advfs
Chap 17 advfs
 
Linux pipe & redirection
Linux pipe & redirectionLinux pipe & redirection
Linux pipe & redirection
 
Perintah dasar linux
Perintah dasar linuxPerintah dasar linux
Perintah dasar linux
 
Linux network monitoring hands-on pratice
Linux network monitoring hands-on praticeLinux network monitoring hands-on pratice
Linux network monitoring hands-on pratice
 
Linux fundamentals
Linux fundamentalsLinux fundamentals
Linux fundamentals
 
Basics of-linux
Basics of-linuxBasics of-linux
Basics of-linux
 

Similar a Red Hat Certified engineer course

Similar a Red Hat Certified engineer course (20)

Red Hart Linux
Red Hart LinuxRed Hart Linux
Red Hart Linux
 
saran_new
saran_newsaran_new
saran_new
 
Red hat linux essentials
Red hat linux essentialsRed hat linux essentials
Red hat linux essentials
 
Suresh nayak linux administrator
Suresh nayak linux administratorSuresh nayak linux administrator
Suresh nayak linux administrator
 
Lpi lição 01 exam 102 objectives
Lpi lição 01  exam 102 objectivesLpi lição 01  exam 102 objectives
Lpi lição 01 exam 102 objectives
 
Rhce syllabus | Red Hat Linux Training: IPSR Solutions
Rhce syllabus | Red Hat Linux Training: IPSR SolutionsRhce syllabus | Red Hat Linux Training: IPSR Solutions
Rhce syllabus | Red Hat Linux Training: IPSR Solutions
 
VINDS resume brk
VINDS resume brkVINDS resume brk
VINDS resume brk
 
linux training in Chandigarh
linux training in Chandigarhlinux training in Chandigarh
linux training in Chandigarh
 
Give a Boost to Your Exam Preparation with Red Hat RHCSA (EX200) Certification
Give a Boost to Your Exam Preparation with Red Hat RHCSA (EX200) CertificationGive a Boost to Your Exam Preparation with Red Hat RHCSA (EX200) Certification
Give a Boost to Your Exam Preparation with Red Hat RHCSA (EX200) Certification
 
2008-09-09 IBM Interaction Conference, Red Hat Update for System z
2008-09-09 IBM Interaction Conference, Red Hat Update for System z2008-09-09 IBM Interaction Conference, Red Hat Update for System z
2008-09-09 IBM Interaction Conference, Red Hat Update for System z
 
Why Drupal is Rockstar?
Why Drupal is Rockstar?Why Drupal is Rockstar?
Why Drupal is Rockstar?
 
Ch01
Ch01Ch01
Ch01
 
Ram
RamRam
Ram
 
sankar
sankarsankar
sankar
 
linux installation.pdf
linux installation.pdflinux installation.pdf
linux installation.pdf
 
LINUX ADMIN. RESUME.
LINUX ADMIN. RESUME.LINUX ADMIN. RESUME.
LINUX ADMIN. RESUME.
 
Linux
LinuxLinux
Linux
 
Rhel7 vs rhel6
Rhel7 vs rhel6Rhel7 vs rhel6
Rhel7 vs rhel6
 
Linux: Everyting-as-a-service
Linux: Everyting-as-a-serviceLinux: Everyting-as-a-service
Linux: Everyting-as-a-service
 
Resume_MayureshDeshpande
Resume_MayureshDeshpandeResume_MayureshDeshpande
Resume_MayureshDeshpande
 

Último

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFMichael Gough
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesThousandEyes
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...amber724300
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 

Último (20)

A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
All These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDFAll These Sophisticated Attacks, Can We Really Detect Them - PDF
All These Sophisticated Attacks, Can We Really Detect Them - PDF
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyesAssure Ecommerce and Retail Operations Uptime with ThousandEyes
Assure Ecommerce and Retail Operations Uptime with ThousandEyes
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
JET Technology Labs White Paper for Virtualized Security and Encryption Techn...
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 

Red Hat Certified engineer course

  • 1.
  • 2.
  • 3. Course roles time, participate,mobile,selected,feedback
  • 4. Participant Introductions instructor Please introduce yourself :- -name. -job. -computer background. -”why you are here” ? -what you will do with this course?
  • 5. What is RHCT, RHCE & why ?
  • 7. RH033: Red Hat Linux Essentials “First level”
  • 8. Course Description The first course for both RHCT and RHCE certification tracks, RH033 is for who have never used Linux or UNIX, and who have no prior command line experience in any other operating system. You are taught the basics of a Red Hat Enterprise Linux environment, and it prepares you for your future role as a system administrator.
  • 9. Prerequisites User-level experience with any computer system, use of menus, use of any graphical user interface. Goal A Red Hat Enterprise Linux power user who can be productive in using and customizing a Red-Hat system for common command line processes and desktop productivity roles. Audience Users who are new to Linux and have no prior UNIX or command line skills, who want to develop and practice the basic skills to use and control their own Red Hat Linux system.
  • 10. Course Objectives 1. Understand the Linux file system 2. Perform common file maintenance 3. Use and customize the GNOME interface 4. Issue essential Linux commands from the command line 5. Perform common tasks using the GNOME GUI 6. Open, edit, and save text documents using the vi editor 7. File access permissions 8. Customize X Window System 9. Regular expression pattern matching and I/O redirection 10. Install, upgrade, delete and query packages on your system 11. Network utilities for the user 12. Power user utilities
  • 11. RH133: Red Hat Linux System Administration Red Hat Certified Technician (RHCT) “second level”
  • 12. Course Description RH133 focuses on skills in systems administration on Red Hat Linux, to a level where you can attach and configure a workstation on an existing network. This course provides intensive hands-on training on Red Hat Enterprise Linux, and it prepare for the RHCT Certification .
  • 13. Prerequisites RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux. Goal Upon successful completion of this course, students will possess basic Linux system administrator knowledge which can be proved by passing the RHCT Exam. The exam is a performance based lab exam that tests actual ability to install, configure, and attach a new Red Hat Linux system to an existing production network. Audience Linux or UNIX users who understand the basics of Red Hat Linux and desire further technical training to begin the process of becoming a system administrator.
  • 14. Course Objectives 1. Install Red Hat Linux interactively and with Kickstart 2. Control common system hardware; administer Linux printing subsystem 3. Create and maintain the Linux file system 4. Perform user and group administration 5. Integrate a workstation with an existing network 6. Configure a workstation as a client to NIS, DNS, and DHCP services 7. Automate tasks with at, cron, and anacron 8. Back up file systems to tape and tar archive 9. Manipulate software packages with RPM 10. Configure the X Window System and the GNOME d.e. 11. Perform performance, memory, and process mgmt. 12. Configure basic host security
  • 15. RH253 Red Hat Linux Networking and Security Administration Red Hat Certified engineer(RHCE) “third level”
  • 16. Course Description RH253 arms students with in-depth knowledge needed to configure common Red Hat Enterprise Linux network services. Network and local security tasks are also topics of this course.
  • 17. Prerequisites RH133 Red Hat Linux System Administration or equivalent experience with Red Hat Enterprise Linux, LAN/WAN fundamentals or equivalent, internet working with TCP/IP or equivalent. Goal Upon completion of this course, individuals can set up a Red Hat Enterprise Linux server and configure common network services and security at a basic level. Audience Linux or UNIX system administrators who already have some experience with Red-Hat Enterprise Linux systems administration, want course in networking services and security, and want to build skills at configuring network services and security administration .
  • 18. Course Objectives 1. Networking services on Red Hat Linux server-side setup, configuration, and basic administration of common networking services: DNS, NIS, Apache, SMB, DHCP, Sendmail, FTP, proxy. 2. Introduction to security 3. Developing a security policy 4. Local security 5. Files and file system security 6. Password security 7. Kernel security 8. Basic elements of a firewall 9. Red Hat Linux-based security tools 10. Responding to a break-in attempt 11. Security sources and methods 12. Overview of security tools
  • 19. RH033: Red Hat Linux Essentials “First level”
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52. Switching between virtual consoles and the graphical environment A typical Linux system will run six virtual consoles and one graphical console -Server systems often have only virtual consoles -Desktops and workstations typically have both
  • 53. Switch among virtual consoles by typing: Ctrl-Alt-F[1-> 6] Access the graphical console by typing Ctrl-Alt-F7
  • 54. Elements of the X Window System -The X Window System is Linux's graphical subsystem -Xorg is the particular version of the X Window System used by Red Hat Open source implementation of X Look and behavior largely controlled by the desktop environment
  • 55.
  • 56. Starting the X server -On some systems, the X server starts automatically at boot time -Otherwise, if systems come up in virtual consoles, users must start the X server manually -The X server must be pre-configured by the system administrator -Log into a virtual console and run startx The X server appears on Ctrl-Alt-F7
  • 57.
  • 58.
  • 59.
  • 60.
  • 61.
  • 62.
  • 63.
  • 64.
  • 65. what is shell command ? They are part of a shell, each shell (C Shell, Bourne Shell and Korn Shell) has a set of commands built into its program, the commands within each shell stay the same across Linux / Unix distributions . The user types shell commands at the shell prompt, the default of which is % for the C Shell, and $ for the Bourne Shell , Korn Shell . bash
  • 66. Running Commands Commands have the following syntax: [ command O ptions arguments] Each item is separated by a space - Options modify a command's behavior Single-letter options usually preceded by “-” Can be passed as -a -b -c or -abc Full-word options usually preceded by “--” [ --help] - Arguments are file names or other data needed by the command Multiple Commands can be separated by “;”
  • 67.
  • 68.
  • 69. The whatis Command Displays short descriptions of commands Uses a database that is updated nightly Often not available immediately after install $ whatis cal cal (1) - displays a calendar
  • 70. The --help Option Displays usage summary and argument list Used by most, but not all, commands $ date --help Usage: date [OPTION]... [+FORMAT] or: date [-u|--utc|--universal] [MMDDhhmm] Display the current time in the given FORMAT, or set the system date.
  • 71. Reading Usage Summaries Printed by -- help , man and others Used to describe the syntax of a command Arguments in [ ] are optional Arguments in CAPS or <> are variables Text followed by ... represents a list x|y|z means &quot;x or y or z&quot; -abc means &quot;any mix of -a, -b or -c&quot;
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 82.
  • 83.
  • 84.
  • 85.
  • 86.
  • 87. current Working Directory Each shell and system process has a current working directory pwd Displays the absolute path to the shell's cwd
  • 88. Changing Directories cd changes directories To an absolute or relative path: cd /home/joshua/work , cd project/docs To a directory one level up: cd .. To your home directory: cd To your previous working directory: cd -
  • 89. Listing Directory Contents Lists contents of the current directory or a specified directory Usage : ls [options] [files_or_dirs] Example: ls -a (include hidden files)‏ ls -l (display extra information)‏ ls -R (recurse through directories)‏ ls -ld (directory and symlink information)‏
  • 90. Copying Files and Directories cp - copy files and directories Usage: cp [options] file destination More than one file may be copied at a time if the destination is a directory: cp [options] file1 file2 destination
  • 91.
  • 92.
  • 93. Creating and Removing Files touch - create empty files or update file timestamps rm - remove files Usage: rm [options] <file>... Example: rm -i file (interactive)‏ rm -r directory (recursive)‏ rm -f file (force)‏
  • 94.
  • 95.
  • 96.
  • 97. Determining File Content Files can contain many types of data Check file type with file before opening to determine appropriate command or application to use file [options] <filename>...
  • 98.
  • 99.
  • 100.
  • 101.
  • 102.
  • 103.
  • 104.
  • 105. Permission Types Four symbols are used when displaying permissions: r : permission to read a file or list a directory's contents w : permission to write to a file or create and remove files from a directory x: permission to execute a program or change into a directory and do a long listing of the directory - : no permission (in place of the r, w, or x)‏
  • 106. Examining Permissions File permissions may be viewed using ls -l $ ls -l /bin/login -rwxr-xr-x 1 root root 19080 Apr 1 18:26 /bin/login File type and permissions represented by a 10 character string
  • 107.
  • 108.
  • 109.
  • 110.
  • 111. Changing Permissions – Nautilus Nautilus can be used to set the permissions and group membership of files and directories. In a Nautilus window, right-click on a file Select Properties from the context menu Select the Permissions tab
  • 112.
  • 113.
  • 114.
  • 115.
  • 116. Command Line Shortcuts The Tab Key Type Tab to complete command lines: For the command name, it will complete a command name For an argument, it will complete a file name Examples: $ xte<Tab> $ xterm $ ls myf<Tab> $ ls myfile.txt
  • 117. Command Line Shortcuts History bash stores a history of commands you've entered, which can be used to repeat commands Use history command to see list of remembered commands $ history 14 cd /tmp 15 ls -l 16 cd 17 cp /etc/passwd . 18 vi passwd
  • 118.
  • 119.
  • 120.
  • 121.
  • 122.
  • 123.
  • 124. Creating Shell Scripts Step 1: Use such as vi to create a text file containing commands -First line contains #!/bin/bash Comment your scripts! Comments start with a #
  • 125. Step 2: Make the script executable: $ chmod u+x myscript.sh To execute the new script: Place the script file in a directory in the executable path -OR-Specify the absolute or relative path to the script on the command line
  • 126. Sample Shell Script #!/bin/bash # This script displays some information about your environment echo &quot;Greetings. The date and time are $(date)&quot; echo &quot;Your working directory is: $(pwd)&quot;
  • 127.
  • 128.
  • 129.
  • 130.
  • 131. Redirecting Output to a File STDOUT and STDERR can be redirected to files: command operator filename Supported operators include: > Redirect STDOUT to file 2> Redirect STDERR to file &> Redirect all output to file File contents are overwritten by default. >> appends.
  • 132. Redirecting Output to a File Examples This command generates output and errors when run as non-root: $ find /etc -name passwd Operators can be used to store output and errors: $ find /etc -name passwd > find.out $ find /etc -name passwd 2> /dev/null $ find /etc -name passwd > find.out 2> find.err
  • 133.
  • 134. Redirecting STDOUT to a Program Examples less : View input one page at a time: $ ls -l /etc | less Input can be searched with / mail : Send input via email: $ echo &quot;test email&quot; | mail -s &quot;test&quot; user@example.com lpr : Send input to a printer $ echo &quot;test print&quot; | lpr $ echo &quot;test print&quot; | lpr -P printer_name
  • 135.
  • 136.
  • 137. Redirecting STDIN from a File Redirect standard input with < Some commands can accept data redirected to STDIN from a file: $ tr 'a-z' 'A-Z' < .bash_profile This command will translate the uppercase characters in .bash_profile to lowercase Equivalent to: $ cat .bash_profile | tr 'a-z' 'A-Z'
  • 138. Sending Multiple Lines to STDIN Redirect multiple lines from keyboard to STDIN with <<WORD -All text until WORD is sent to STDIN Sometimes called a heretext $ mail -s &quot;Please Call&quot; jane@example.com <<END > Hi Jane, > Please give me a call when you get in. We may need > to do some maintenance on server1. > Details when you're on-site, > Boris > END
  • 139. Scripting: for loops Performs actions on each member of a set of values Example: for NAME in joe jane julie do ADDRESS=&quot;$NAME@example.com&quot; MESSAGE='Projects are due today!' echo $MESSAGE | mail -s Reminder $ADDRESS done
  • 140.
  • 141.
  • 142.
  • 143.
  • 144.
  • 145.
  • 146. Viewing File Excerpts head and tail head : Display the first 10 lines of a file Use -n to change number of lines displayed tail : Display the last 10 lines of a file Use -n to change number of lines displayed Use -f to &quot;follow&quot; subsequent additions to the file *Very useful for monitoring log files!
  • 147. Extracting Text by Keyword grep Prints lines of files or STDIN where a pattern is matched $ grep 'john' /etc/passwd $ date --help | grep year Use -i to search case-insensitively Use -n to print line numbers of matches Use -v to print lines not containing pattern Use -AX to include the X lines after each match Use -BX to include the X lines before each match
  • 148. Extracting Text by Column cut Display specific columns of file or STDIN data $ cut -d: -f1 /etc/passwd $ grep root /etc/passwd | cut -d: -f7 Use -d to specify the column delimiter (default is TAB)‏ Use -f to specify the column to print Use -c to cut by characters $ cut -c2-5 /usr/share/dict/words
  • 149.
  • 150. Gathering Text Statistics wc (word count)‏ Counts words, lines, bytes and characters Can act upon a file or STDIN $ wc story.txt 39 237 1901 story.txt Use -l for only line count Use -w for only word count Use -c for only byte count Use -m for character count (not displayed)‏
  • 151. Sorting Text sort sort text to STDOUT - original file unchanged $ sort [options] file(s)‏ Common options -r performs a reverse (descending) sort -n performs a numeric sort -f ignores (folds) case of characters in strings -u (unique) removes duplicate lines in output -t c uses c as a field separator -k X sorts by c-delimited field X Can be used multiple times
  • 152.
  • 153. Duplicating File Changes patch diff output stored in a file is called a &quot;patchfile&quot; Use -u for &quot;unified&quot; diff, best in patchfiles patch duplicates changes in other files (use with care!)‏ Use -b to automatically back up changed files $ diff -u foo.conf-broken foo.conf-works > foo.patch $ patch -b foo.conf-broken foo.patch
  • 154. Spell Checking with aspell Interactively spell-check files: $ aspell check letter.txt Non-interactively list mis-spelled words in STDIN $ aspell list < letter.txt $ aspell list < letter.txt | wc -l
  • 155. Tools for Manipulating Text tr and sed Alter ( tr anslate) Characters: tr Converts characters in one set to corresponding characters in another set Only reads data from STDIN $ tr 'a-z' 'A-Z' < lowercase.txt Alter Strings: sed stream editor Performs search/replace operations on a stream of text Normally does not alter source file Use -i.bak to back-up and alter source file
  • 156. Sed Examples Quote search and replace instructions! sed addresses sed 's/dog/cat/g' pets sed '1,50s/dog/cat/g' pets sed '/digby/,/duncan/s/dog/cat/g' pets Multiple sed instructions sed -e 's/dog/cat/' -e 's/hi/lo/' pets sed -f myedits pets
  • 157.
  • 158.
  • 159.
  • 160.
  • 161. Introducing vim Newer version of vi, the standard Unix text editor Executing vi runs vim by default gvim: Graphical version of vim Applications + Programming -> Vi iMproved Provided by vim-X11 package Advantages : Speed: Do more with fewer keystrokes Simplicity: No dependence on mouse/GUI Availability: Included with most Unix-like OSes Disadvantages Difficulty: Steeper learning curve than simpler editors Key bindings emphasize speed over intuitiveness
  • 162. vim: A Modal Editor Keystroke behavior is dependent upon vim's &quot;mode&quot; Three main modes: Command Mode (default): Move cursor, cut/paste text, change mode Insert Mode : Modify text Ex Mode : Save, quit, etc Esc exits current mode EscEsc always returns to command mode
  • 163.
  • 164.
  • 165.
  • 166. Saving a File and Exiting vim Ex Mode Enter Ex Mode with : Creates a command prompt at bottom-left of screen Common write/quit commands: :w writes (saves) the file to disk :wq writes and quits :q! quits, even if changes are lost
  • 167.
  • 168.
  • 169. Search and Replace Command Mode Search as in less /, n, N Search/Replace as in sed Affects current line by default Use x,y ranges EX :1,5s/cat/dog/ or % for whole file EX :%s/cat/dog/gi
  • 170. Manipulating Text Command Mode Change ( replace ) Delete ( cut ) Yank ( copy )‏ Line cc dd yy Letter cl dl yl Word cw dw yw Sentence ahead c) d) y)‏ Sentence behind c( d( y( Paragraph above c{ d{ y{ Paragraph below c} d} y}
  • 171.
  • 172.
  • 173.
  • 174. Configuring vi and vim Configuring on the fly :set or :set all Configuring permanently ~/.vimrc or ~/.exrc A few common configuration items :set number :set autoindent :set textwidth=65 (vim only)‏ :set wrapmargin=15 :set ignorcase Run :help option-list for a complete list
  • 175. Learning more vi/vim built-in help :help :help topic Use :q to exit help vimtutor command
  • 176.
  • 177.
  • 178.
  • 179.
  • 180.
  • 181.
  • 182.
  • 183.
  • 184. Network Configuration Files DNS Configuration Domain Name Service translates hostnames to network addresses Server address is specified by dhcp or in /etc/resolv.conf search example.com cracker.org nameserver 192.168.0.254 nameserver 192.168.1.254
  • 185.
  • 186.
  • 187.
  • 188.
  • 189.
  • 190.
  • 191.
  • 192.
  • 193.
  • 194.
  • 195. Finding Processes Most flexible: ps options | othercommands ps axo comm,tty | grep ttyS0 By predefined patterns: pgrep $ pgrep -U root $ pgrep -G student By exact program name: pidof $ pidof bash
  • 196.
  • 197. Sending Signals to Processes By PID: kill [signal] pid ... By Name: killall [signal] comm ... By pattern: pkill [-signal] pattern
  • 198.
  • 199.
  • 200.
  • 201. Job Control Run a process in the background Append an ampersand to the command line: firefox & Temporarily halt a running program Use Ctrl-z or send signal 17 (STOP)‏ Manage background or suspended jobs List job numbers and names: jobs Resume in the background: bg [%jobnum] Resume in the foreground: fg [%jobnum] Send a signal: kill [-SIGNAL] [%jobnum]
  • 202.
  • 203. Crontab File Format Entry consists of five space-delimited fields followed by a command line One entry per line, no limit to line length Fields are:- minute, hour, day of month, month, and day of week Comment lines begin with # for details See man 5 crontab
  • 204. Grouping Commands Two ways to group commands: Compound: date; who | wc -l Commands run back-to-back Subshell: (date; who | wc -l) >> /tmp/trace All output is sent to a single STDOUT and STDERR
  • 205. Exit Status Processes report success or failure with an exit status 0 for success, 1-255 for failure $? stores the exit status of the most recent command exit [num] terminates and sets status to num Example: $ ping -c1 -W1 station999 &> /dev/null $ echo $? 2
  • 206. Conditional Execution Operators Commands can be run conditionally based on exit status && represents conditional AND THEN || represents conditional OR ELSE Examples: $ grep -q no_such_user /etc/passwd || echo 'No such user' $ ping -c1 -W2 station1 &> /dev/null && echo &quot;station1 is up&quot; || $(echo 'station1 is unreachable'; exit 1)‏ station1 is up
  • 207. The test Command Evaluates boolean statements for use in conditional execution Returns 0 for true Returns 1 for false Examples in long form: $ test &quot;$A&quot; = &quot;$B&quot; && echo &quot;Strings are equal&quot; $ test &quot;$A&quot; -eq &quot;$B&quot; && echo &quot;Integers are equal&quot; Examples in shorthand notation: $ [ &quot;$A&quot; = &quot;$B&quot; ] && echo &quot;Strings are equal&quot; $ [ &quot;$A&quot; -eq &quot;$B&quot; ] && echo &quot;Integers are equal&quot;
  • 208. File Tests File tests: -f tests to see if a file exists and is a regular file -d tests to see if a file exists and is a directory -x tests to see if a file exists and is executable [ -f ~/lib/functions ] && source ~/lib/functions
  • 209. Scripting: if Statements Execute instructions based on the exit status of a command if ping -c1 -w2 localhost &> /dev/null; then echo 'localhost is UP' elif grep &quot;localhost&quot; ~/maintenance.txt &> /dev/null; then echo 'localhost is undergoing maintenance' else echo 'localhost is unexpectedly DOWN!' exit 1 fi
  • 210.
  • 211.
  • 212.
  • 213. Bash Variables Variables are named values Useful for storing data or command output Set with VARIABLE=VALUE Referenced with $VARIABLE $ HI=&quot;Hello, and welcome to $(hostname).&quot; $ echo $HI Hello, and welcome to stationX.
  • 214. Environment Variables Variables are local to a single shell by default Environment variables are inherited by child shells Set with export VARIABLE=VALUE Accessed by some programs for configuration
  • 215. Aliases Aliases let you create shortcuts to commands $ alias dir='ls -laF' Use alias by itself to see all set aliases Use alias followed by an alias name to see alias value $ alias dir alias dir='ls -laF'
  • 216. How bash Expands a Command Line 1. Split the line into words 2. Expand aliases 3. Expand curly-brace statements ({})‏ 4. Expand tilde statements (~)‏ 5. Expand variables ($)‏ 6. Command-substituation ($() and ``)‏ 7. Split the line into words again 8. Expand file globs (*, ?, [abc], etc)‏ 9. Prepare I/O redirections (<, >)‏ 10. Run the command!
  • 217. Preventing Expansion Backslash ( ) makes the next character literal $ echo Your cost: 5.00 Your cost: $5.00 Quoting prevents expansion Single quotes (') inhibit all expansion Double quotes (&quot;) inhibit all expansion, except: $ (dollar sign) - variable expansion ` (backquotes) - command substitution (backslash) - single character inhibition ! (exclamation point) - history substitution
  • 218.
  • 219. Bash start up tasks: profile Stored in /etc/profile (global) and ~/. bash_profile (user)‏ Run for login shells only Used for Setting environment variables Running commands (eg mail-checker script)‏
  • 220.
  • 221.
  • 222. Scripting: Taking input with positional Parameters Positional parameters are special variables that hold the command-line arguments to the script. The positional parameters available are $1,$2, $3, etc. . These are normally assigned to more meaningful variable names to improve clarity. $* holds all command-line arguments $# holds the number of command-line arguments
  • 223. Scripting: Taking input with the read command Use read to assign input values to one or more shell variables: -p designates prompt to display read reads from standard input and assigns one word to each variable Any leftover words are assigned to the last variable read -p &quot;Enter a filename: &quot; FILE
  • 224.
  • 225.
  • 226.
  • 227.
  • 228. locate Examples locate foo Search for files with &quot;foo&quot; in the name or path locate -r 'foo$' Regex search for files ending in &quot;.foo&quot; Useful options -i performs a case-insensitive search -n X lists only the first X matches
  • 229.
  • 230. Basic find Examples find -name snow.png Search for files named snow.png find -iname snow.png Case-insensitive search for files named snow.png, Snow.png, SNOW.PNG, etc find -user joe -group joe Search for files owned by the user joe and the group joe
  • 231. find and Logical Operators Criteria are ANDed together by default. Can be OR'd or negated with -o and -not Parentheses can be used to determine logic order, but must be escaped in bash. find -user joe -not -group joe find -user joe -o -user jane find -not -user joe -o -user jane ‏
  • 232. find and Permissions Can match ownership by name or id find / -user joe -o -uid 500 Can match octal or symbolic permissions find -perm 755 matches if mode is exactly 755 find -perm +222 matches if anyone can write find -perm -222 matches if everyone can write find -perm -002 matches if other can write
  • 233. find and Numeric Criteria Many find criteria take numeric values find -size 1024k Files with a size of exactly 1megabyte find -size +1024k Files with a size over 1 megabyte find -size -1024k Files with a size less than 1 megabyte
  • 234. find and Access Times find can match by inode timestamps -atime when file was last read -mtime when file data last changed -ctime when file data or metadata last changed Value given is in days find -ctime -10 Files modified less than 10 days ago
  • 235. Executing Commands with find Commands can be executed on found files Command must be preceded with -exec or -ok -ok prompts before acting on each file Command must end with Space Can use {} as a filename placeholder find -size +102400k -ok gzip {}
  • 236. find Execution Examples find -name &quot;*.cconf&quot; -exec cp {} {}.orig Back up configuration files, adding a .orig extension find /tmp -ctime +3 -user joe -ok rm {} Prompt to remove Joe's tmp files that are over 3 days old find ~ -perm +o+w -exec chmod o-w {} Fix other-writable files in your home directory
  • 237. The Gnome Search Tool Places->Search for Files... Graphical tool for searching by name content owner/group size modification time
  • 238.
  • 239.
  • 240.
  • 241. Web Clients Firefox Other web browsers Non-GUI web browsers wget
  • 242. Firefox Fast, lightweight, feature-rich web browser Tabbed browsing Popup blocking Cookie management Multi-engine search bar Support for many popular plug-ins Themes and Extensions
  • 243. Non-GUI Web Browsers links Provided by the elinks rpm Full support for frames and ssl Examples links http://www.redhat.com links -dump http://www.redhat.com links -source http://www.redhat.com
  • 244. Wget Retrieves files via HTTP and FTP Non-interactive - useful in shell scripts Can follow links and traverse directory trees on the remote server - useful for mirroring web and FTP sites
  • 245. Email and Messaging Evolution Other email clients Non-GUI email clients Gaim
  • 246.
  • 247. Configuring Evolution Defining accounts Tools->Settings->Mail Accounts Supports IMAP, pop, Novell Groupware, Usenet and local email accounts MS Exchange support via plug-in Provided by evolution-connector rpm Install before configuring other accounts
  • 248. Configuring Evolution Defining accounts Tools->Settings->Mail Accounts Supports IMAP, pop, Novell Groupware, Usenet and local email accounts MS Exchange support via plug-in Provided by evolution-connector rpm Install before configuring other accounts
  • 249. Other GUI Mail Clients Thunderbird Standalone Mozilla email client Kmail KDE email client
  • 250. Non-GUI Mail Clients mutt Supports pop, imap and local mailboxes Highly configurable Mappable hotkeys Message threading and colorizing GnuPG integration Context-sensitive help with '?'
  • 251. Gaim Multi-protocol Instant messaging client Available in Red Hat Enterprise Linux Client Supports AIM, MSN, ICQ, Yahoo, Jabber, Gadu-Gadu, SILC, GroupWise Messenger, IRC and Zephyr networks. Plugins can be used to add functionality.
  • 252. Open Ssh: Secure Remote Shell Secure replacement for older remote-access tools Allows authenticated, encrypted access to remote systems ssh [user@]hostname ssh [user@]hostname command
  • 253. scp: Secure File Transfer Secure replacement for rcp Layered on top of ssh scp source destination Remote files can be specified using: [user@]host:/path/to/file Use -r to enable recursion Use -p to preserve times and permissions Use -C to compress datastream
  • 254. rsync: Efficient File Sync Efficiently copies files to or from remote systems Uses secure ssh connections for transport rsync *.conf barney:/home/joe/configs/ Faster than scp - copies differences in like files
  • 255. Open Ssh Key-based Authentication Optional, password-less, but still secure, authentication Uses two keys generated by ssh-keygen: private key stays on your system Usually passphrase-protected (recommended )‏ public key is copied to destination with ssh-copy-id ssh-copy-id [user@]host
  • 256. Open Ssh Key-based Authentication continued An authentication agent stores decrypted private keys Thus, passphrase only needs to be entered once An agent is provided automatically in GNOME Otherwise, run ssh-agent bash Keys are added to the agent with ssh-add
  • 257. FTP Clients CLI: lftp $ lftp ftp.example.com $ lftp -u joe ftp.example.com Automated transfers with lftpget GUI: gFTP Applications->Internet->gFTP Allows Drag-and-Drop transfers Anonymous or authenticated access Optional secure transfer via ssh (sftp)‏
  • 258. Smbclient FTP-like client to access SMB/CIFS resources Examples: smbclient -L server1 lists shares on server1 smbclient -U student //server1/homes accesses a share
  • 259. File Transfer with Nautilus File/Connect to Server Graphically browse with multiple protocols Allows drag-and-drop file transfers Supported connection types: FTP, SFTP, SMB, WebDAV, Secure WebDAV Can also connect via url: File/Open Location
  • 260. Xorg Clients All graphical applications are X clients Can connect to remote X severs via tcp/ip Data is not encrypted but can be tunneled securely over an ssh connection ssh -X user@hostB xterm & xterm will display on hostA's X server Transmitted data will be encrypted through the ssh connection
  • 261. Network Diagnostic Tools ping traceroute host dig netstat gnome-nettool (GUI)‏
  • 262.
  • 263.
  • 264.
  • 265.
  • 266. /etc/passwd, /etc/shadow, and /etc/group files Authentication information is stored in plain text files: /etc/passwd /etc/shadow /etc/group /etc/gshadow
  • 267. User management tools Graphical tools system-config-users Command-line useradd usermod userdel [-r]
  • 268. System Users and Groups Server programs such as web or print servers typically run as unprivileged users, not as root Examples: daemon, mail, lp, nobody Running programs in this way limits the amount of damage any single program can do to the system
  • 269. Monitoring Logins Connected users: w Recent Logins: last, lastb
  • 270. Default Permissions Default permission for directories is 777 minus umask Default permission for files is the directory default without execute permission. umask is set with the umask command. Non-privileged users' umask is 002 Files will have permissions of 664 Directories will have permissions of 775 root's umask is 022
  • 271. Special Permissions for Executables Special permissions for executables: suid : command run with permissions of the owner of the command, not executor of the command sgid : command runs with group affiliation of the group of the command
  • 272. Special Permissions for Directories Special permissions for directories: sticky bit: files in directories with the sticky bit set can only be removed by the owner and root, regardless of the write permissions of the directory sgid: files created in directories with the sgid bit set have group affiliations of the group of the directory
  • 273. Special Permissions for Directories Special permissions for directories: sticky bit: files in directories with the sticky bit set can only be removed by the owner and root, regardless of the write permissions of the directory sgid: files created in directories with the sgid bit set have group affiliations of the group of the directory
  • 274.
  • 275.
  • 276.
  • 277. Partitions and Filesystems Disk drives are divided into partitions Partitions are formatted with filesystems allowing users to store data Default filesystem: ext3, the Third Extended Linux Filesystem Other common filesystems: ext2 and msdos (typically used for floppies)‏ iso9660 (typically used for CDs)‏ GFS and GFS2 (typically for SANs)‏
  • 278. Inodes An inode table contains a list of all files in an ext2 or ext3 filesystem An inode (index node) is an entry in the table, containing information about a file (the metadata), including: file type, permissions, UID, GID the link count (count of path names pointing to this file)‏ the file's size and various time stamps pointers to the file's data blocks on disk other data about the file
  • 279. Directories The computer's reference for a file is the inode number The human way to reference a file is by file name A directory is a mapping between the human name for the file and the computer's inode number
  • 280. cp and inodes The cp command: 1. Allocates a free inode number, placing a new entry in the inode table 2. Creates a dentry in the directory, associating a name with the inode number 3. Copies data into the new file
  • 281.
  • 282. rm and inodes The rm command: 1. Decrements the link count, thus freeing the inode number to be reused 2. Places data blocks on the free list 3. Removes the directory entry Data is not actually removed, but will be overwritten when the data blocks are used by another file
  • 283. Hard Links hard link adds an additional pathname to reference a single file One physical file on the filesystem Each directory references the same inode number Increments the link count The rm command decrements the link count File exists as long as at least one link remains When the link count is zero, the file is removed Cannot span drives or partitions Syntax: ln filename [linkname]
  • 284. Symbolic (or Soft) Links A symbolic link points to another file ls -l displays the link name and the referenced file lrwxrwxrwx 1 joe joe 11 Sep 25 18:02 pf -> /etc/passwd File type: l for symbolic link The content of a symbolic link is the name of the file that it references Syntax: ln -s filename linkname
  • 285. The Seven Fundamental Filetypes ls -l symbol File Type - regular file d directory l symbolic link b block special file c character special file p named pipe s socket
  • 286. Checking Free Space df - Reports disk space usage Reports total kilobytes, kilobytes used, kilobytes free per file system -h and -H display sizes in easier to read units du - Reports disk space usage Reports kilobytes used per directory Includes subtotals for each subdirectory -s option only reports single directorysummary Also takes -h and -H options Applications->System Tools->Disk Usage Analyzer or baobab - Reports disk space usage graphically
  • 287. Removable Media Mounting means making a foreign filesystem look like part of the main tree. Before accessing, media must be mounted Before removing, media must be unmounted By default, non-root users may only mount certain devices (cd, dvd, floppy, usb, etc)‏ Mountpoints are usually under /media
  • 288. Mounting CDs and DVDs Automatically mounted in Gnome/KDE Otherwise, must be manually mounted CD/DVD Reader mount /media/cdrom CD/DVD Writer mount /media/cdrecorder eject command unmounts and ejects the disk
  • 289. Mounting USB Media Detected by the kernel as SCSI devices /dev/sdaX or /dev/sdbX or similar Automatically mounted in Gnome/KDE Icon created in Computer window Mounted under /media/Device ID Device ID is built into device by vendor
  • 290. Archiving Files and Compressing Archives Archiving places many files into one target file Easier to back up, store, and transfer tar - standard Linux archiving command Archives are commonly compressed Algorithm applied that compresses file Uncompressing restores the original file tar natively supports compression using gzip and gunzip, or bzip2 and bunzip2
  • 291. Creating, Listing, and Extracting File Archives Action arguments (one is required): -c create an archive -t list an archive -x extract files from an archive Typically required: -f archivename name of file archive Optional arguments: -z use gzip compression -j use bzip2 compression -v be verbose
  • 292. Creating File Archives: Other Tools zip and unzip Supports pkzip-compatible archives Example: zip etc.zip /etc unzip etc.zip file-roller Graphical, multi-format archiving tool
  • 293. End of Unit 16 Questions ...? Summary Linux filesystem structure Using removable media Using unformatted floppies Archiving and compression
  • 294.
  • 295.
  • 296. Planning an Installation What hardware does the system use? Check hardware compatibility Read the RELEASE-NOTES file on the first CD or at http://www.redhat.com Provides valuable summary of features and gotchas
  • 297. Performing an Installation Installer can be started from: CD-ROM or DVD-ROM USB Device Network (PXE)‏ Supported installation sources: Network Server (ftp, http or nfs)‏ CD-ROM or DVD-ROM Hard Disk
  • 298. Managing Services What is a service? Graphical Interface to Service Management system-config-services Command Line Interface to Service Management service chkconfig
  • 299. Managing Software Software is provided as RPM packages Easy installation and removal Software information stored in a local database Packages are provided by Red Hat Network Centralized ma