SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
1
So you’re new to Linux?

    • Just got thrown a Red Hat cd and need to get
      going?
    • Told to change a few files?
    • Scared to death you’ll destroy something?
    • Yeah… we know. This will get you through the
      tough stuff



www.StrongbackConsulting.com                         2
Basics – getting connected

    •      First, you need to launch a console
    •      DOS it is NOT
         –        Use / not 
         –        No such thing and C: drives or D: drives
    •      If you’re on the Linux Desktop, use these command consoles:
         –        Gnome Console (Gnome)
         –        Konsole (KDE)




www.StrongbackConsulting.com
Putty setup

    •      Connect remotely using putty
         –        Download the putty.exe:
                  •      http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html

    •      Get your connection parameters
         –        Host name
         –        Ssh port
         –        SSL certificate (if required)
    •      Setup a connection


www.StrongbackConsulting.com
Connection settings

    •      Launch Putty.exe
    •      Enter your connection parms
    •      Click “Open”
    •      Login with given credentials




www.StrongbackConsulting.com
Navigating around
    pwd = present working directory
    whoami = tells you what user you are logged in as
    ls = list directory contents
           -l = show long format, -h = helpful format of sizes (MB, GB, KB, etc)
           -a = show all contents including hidden files
    cd = change directory
           . single period for current directory
           .. two periods to move one directory up
           ~ shortcut for the home directory (i.e. ~ = /home/myuserid)
    passwd = change your password
www.StrongbackConsulting.com
Reading up (or down)

    cat = concatenate file to standard output (i.e. spit out the contents to the console)

           -this is good for short files, but for long files, try…

    more = take a long file and page through it, one screen at a time

           +num = switch to cause more to start at line number num

    tail = show the tail end of a file

           -x = show x numbers of lines from the bottom up. (i.e. tail -50)

    less = similar to more but allows backward movement in the file, and starts faster




www.StrongbackConsulting.com
What’s happening

   ps = shows the system processes and open files
        –ef = shows everything formatted
        ps –ef | grep xxxx allows you to search the process stack for string xxxx
   top = topaz, the system processor activity




www.StrongbackConsulting.com
Managing Files & Directories
    rm = remove file or directory
           -r = recourse through and remove directory
    chmod = change mode, or file permissions (read, write, execute)
           ex: chmod 755 install.sh, gives this a permission set of rwxr-xr-x
    chown = change owner
           ex: chown jdoe:users install.sh
    mkdir = make directory
    touch = create an empty file, or update timestamps on a file
    cp = copy , mv = move

www.StrongbackConsulting.com
Directory Permissions
    •      Read, Write, & Execute.
         –        read = 1
         –        write = 2
         –        execute = 4
    •      Add them together to get the sum permission.
    •      Permissions display as 10 total bits
         –        ex: drwxr-xr-x      2 root root   4096 Feb 20   2009 home
         –        directory, owner, group, everyone else
                         d      rwx      r-x         r-x



www.StrongbackConsulting.com
Editing – vi(m)
    •        Universal editor for Linux / Unix
    •        vim is the successor to vi
         –        More capable, syntax highlighting, extensible configuration file, etc.

    Two modes, command mode and edit mode
    Command mode commands
        i = insert at cursor position, a = append after cursor position (both
    change into the edit mode)
             x = delete character, dd = delete line
             ESC = escape back to command mode
       :q = quit, :w = write (or save), :wq = write then quit, :q! quit and
    abandon changes

www.StrongbackConsulting.com
Advanced Commands
   to avoid at first…but master later


    System processes                    System config commands
    mount, unmount , smbmount           yast, yum
    shutdown, kill                      rpm, apt-get
    fdisk, fsck                         tar, zip
    sudo, su                            chkconfig
    netstat, tracert                    ifconfig, iwconfig
    rsync



www.StrongbackConsulting.com
Linux Resources

    • One URL to rule them all:
                      https://delicious.com/strongback/linux



    *Delicious is a social bookmark sharing site. This URL above is for linux, but you an easily find
    our other links on other subjects by navigating to other tags. The tag is the last word in the
    URL.




www.StrongbackConsulting.com
Connect with us
                      Subscribe to us at
                      http://feeds.feedburner.com/StrongbackConsulting

                       Discover us at:
                       http://www.strongback.us


                       Socialize with us on Facebook & LinkedIn
                       http://www.facebook.com/StrongbackConsulting

                       http://www.linkedin.com/company/290754


                         Watch Us at Youtube and Vimeo
                         http://www.youtube.com/user/strongbackconsulting
                         https://vimeo.com/user7519232



www.StrongbackConsulting.com

Contenu connexe

Tendances

Linux files and file permission
Linux files and file permissionLinux files and file permission
Linux files and file permissionU.P Police
 
Access control list acl - permissions in linux
Access control list acl  - permissions in linuxAccess control list acl  - permissions in linux
Access control list acl - permissions in linuxSreenatha Reddy K R
 
Unix cmd on_free_bsd
Unix cmd on_free_bsdUnix cmd on_free_bsd
Unix cmd on_free_bsd小均 張
 
Operating Systems 1
Operating Systems 1Operating Systems 1
Operating Systems 1hutchison
 
06 users groups_and_permissions
06 users groups_and_permissions06 users groups_and_permissions
06 users groups_and_permissionsShay Cohen
 
Basic Cli By M Fawzy
Basic Cli By M FawzyBasic Cli By M Fawzy
Basic Cli By M FawzyMahmoud Fawzy
 
Operating Systems 2
Operating Systems 2Operating Systems 2
Operating Systems 2hutchison
 
Linux command line cheatsheet
Linux command line cheatsheetLinux command line cheatsheet
Linux command line cheatsheetWe Ihaveapc
 
Writing flexible filesystems in FUSE-Python
Writing flexible filesystems in FUSE-PythonWriting flexible filesystems in FUSE-Python
Writing flexible filesystems in FUSE-PythonAnurag Patel
 
Rhel 6.2 complete ebook
Rhel 6.2 complete ebookRhel 6.2 complete ebook
Rhel 6.2 complete ebookYash Gulati
 

Tendances (20)

File permissions
File permissionsFile permissions
File permissions
 
Linux files and file permission
Linux files and file permissionLinux files and file permission
Linux files and file permission
 
Access control list acl - permissions in linux
Access control list acl  - permissions in linuxAccess control list acl  - permissions in linux
Access control list acl - permissions in linux
 
Redis
RedisRedis
Redis
 
Unix cmd on_free_bsd
Unix cmd on_free_bsdUnix cmd on_free_bsd
Unix cmd on_free_bsd
 
Users and groups
Users and groupsUsers and groups
Users and groups
 
Operating Systems 1
Operating Systems 1Operating Systems 1
Operating Systems 1
 
Basics of Linux
Basics of LinuxBasics of Linux
Basics of Linux
 
06 users groups_and_permissions
06 users groups_and_permissions06 users groups_and_permissions
06 users groups_and_permissions
 
Unix tutorial for beginners
Unix tutorial for beginnersUnix tutorial for beginners
Unix tutorial for beginners
 
Basic Cli By M Fawzy
Basic Cli By M FawzyBasic Cli By M Fawzy
Basic Cli By M Fawzy
 
Python & FUSE
Python & FUSEPython & FUSE
Python & FUSE
 
Operating Systems 2
Operating Systems 2Operating Systems 2
Operating Systems 2
 
Linux command line cheatsheet
Linux command line cheatsheetLinux command line cheatsheet
Linux command line cheatsheet
 
Linux basics
Linux basicsLinux basics
Linux basics
 
Writing flexible filesystems in FUSE-Python
Writing flexible filesystems in FUSE-PythonWriting flexible filesystems in FUSE-Python
Writing flexible filesystems in FUSE-Python
 
Filepermissions in linux
Filepermissions in linuxFilepermissions in linux
Filepermissions in linux
 
2011 - DDU - Intro to Drush
2011 - DDU - Intro to Drush2011 - DDU - Intro to Drush
2011 - DDU - Intro to Drush
 
Rhel 6.2 complete ebook
Rhel 6.2 complete ebookRhel 6.2 complete ebook
Rhel 6.2 complete ebook
 
ubunturef
ubunturefubunturef
ubunturef
 

Similaire à Linux 101

24HOP Introduction to Linux for SQL Server DBAs
24HOP Introduction to Linux for SQL Server DBAs24HOP Introduction to Linux for SQL Server DBAs
24HOP Introduction to Linux for SQL Server DBAsKellyn Pot'Vin-Gorman
 
Linuxtraining 130710022121-phpapp01
Linuxtraining 130710022121-phpapp01Linuxtraining 130710022121-phpapp01
Linuxtraining 130710022121-phpapp01Chander Pandey
 
Using filesystem capabilities with rsync
Using filesystem capabilities with rsyncUsing filesystem capabilities with rsync
Using filesystem capabilities with rsyncHazel Smith
 
Topic 3-1_More_Linux_Commands.pptx
Topic 3-1_More_Linux_Commands.pptxTopic 3-1_More_Linux_Commands.pptx
Topic 3-1_More_Linux_Commands.pptxdulala3
 
BITS: Introduction to Linux - Text manipulation tools for bioinformatics
BITS: Introduction to Linux - Text manipulation tools for bioinformaticsBITS: Introduction to Linux - Text manipulation tools for bioinformatics
BITS: Introduction to Linux - Text manipulation tools for bioinformaticsBITS
 
Learning Linux v2.1
Learning Linux v2.1Learning Linux v2.1
Learning Linux v2.1sdiviney
 
Shared Coursework in Cyber Security Instructions Manual .docx
Shared Coursework in Cyber Security Instructions Manual .docxShared Coursework in Cyber Security Instructions Manual .docx
Shared Coursework in Cyber Security Instructions Manual .docxedgar6wallace88877
 
Most frequently used unix commands for database administrator
Most frequently used unix commands for database administratorMost frequently used unix commands for database administrator
Most frequently used unix commands for database administratorDinesh jaisankar
 
05. Ubuntu Terminal Commands.pptx
05. Ubuntu Terminal Commands.pptx05. Ubuntu Terminal Commands.pptx
05. Ubuntu Terminal Commands.pptxDIVKAGAMESTERBAIK
 
Linux week 2
Linux week 2Linux week 2
Linux week 2Vinoth Sn
 

Similaire à Linux 101 (20)

24HOP Introduction to Linux for SQL Server DBAs
24HOP Introduction to Linux for SQL Server DBAs24HOP Introduction to Linux for SQL Server DBAs
24HOP Introduction to Linux for SQL Server DBAs
 
Linuxtraining 130710022121-phpapp01
Linuxtraining 130710022121-phpapp01Linuxtraining 130710022121-phpapp01
Linuxtraining 130710022121-phpapp01
 
Solaris basics
Solaris basicsSolaris basics
Solaris basics
 
Using filesystem capabilities with rsync
Using filesystem capabilities with rsyncUsing filesystem capabilities with rsync
Using filesystem capabilities with rsync
 
3. introduction of centos
3. introduction of centos3. introduction of centos
3. introduction of centos
 
Linux Fundamentals
Linux FundamentalsLinux Fundamentals
Linux Fundamentals
 
Topic 3-1_More_Linux_Commands.pptx
Topic 3-1_More_Linux_Commands.pptxTopic 3-1_More_Linux_Commands.pptx
Topic 3-1_More_Linux_Commands.pptx
 
Divya
DivyaDivya
Divya
 
Divya
DivyaDivya
Divya
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
 
BITS: Introduction to Linux - Text manipulation tools for bioinformatics
BITS: Introduction to Linux - Text manipulation tools for bioinformaticsBITS: Introduction to Linux - Text manipulation tools for bioinformatics
BITS: Introduction to Linux - Text manipulation tools for bioinformatics
 
Learning Linux v2.1
Learning Linux v2.1Learning Linux v2.1
Learning Linux v2.1
 
redhat_by_Cbitss.ppt
redhat_by_Cbitss.pptredhat_by_Cbitss.ppt
redhat_by_Cbitss.ppt
 
Shared Coursework in Cyber Security Instructions Manual .docx
Shared Coursework in Cyber Security Instructions Manual .docxShared Coursework in Cyber Security Instructions Manual .docx
Shared Coursework in Cyber Security Instructions Manual .docx
 
Most frequently used unix commands for database administrator
Most frequently used unix commands for database administratorMost frequently used unix commands for database administrator
Most frequently used unix commands for database administrator
 
Linux
LinuxLinux
Linux
 
#WeSpeakLinux Session
#WeSpeakLinux Session#WeSpeakLinux Session
#WeSpeakLinux Session
 
Linux
Linux Linux
Linux
 
05. Ubuntu Terminal Commands.pptx
05. Ubuntu Terminal Commands.pptx05. Ubuntu Terminal Commands.pptx
05. Ubuntu Terminal Commands.pptx
 
Linux week 2
Linux week 2Linux week 2
Linux week 2
 

Plus de Strongback Consulting

IBM Collaborative Lifecycle Management Solution for DevOps v6
IBM Collaborative Lifecycle Management Solution for DevOps v6IBM Collaborative Lifecycle Management Solution for DevOps v6
IBM Collaborative Lifecycle Management Solution for DevOps v6Strongback Consulting
 
Tips for Developing and Testing IBM HATS Applications
Tips for Developing and Testing IBM HATS ApplicationsTips for Developing and Testing IBM HATS Applications
Tips for Developing and Testing IBM HATS ApplicationsStrongback Consulting
 
Patterns and Antipatterns for Adopting IBM DevOps Tools
Patterns and Antipatterns for Adopting IBM DevOps ToolsPatterns and Antipatterns for Adopting IBM DevOps Tools
Patterns and Antipatterns for Adopting IBM DevOps ToolsStrongback Consulting
 
How Arcad Skipper pack works for the IBM i
How Arcad Skipper pack works for the IBM iHow Arcad Skipper pack works for the IBM i
How Arcad Skipper pack works for the IBM iStrongback Consulting
 
Being Smart about C/C++ Development on AIX and Linux
Being Smart about C/C++ Development on AIX and Linux Being Smart about C/C++ Development on AIX and Linux
Being Smart about C/C++ Development on AIX and Linux Strongback Consulting
 
Making Rational HATS a Strategic Investment
Making Rational HATS a Strategic InvestmentMaking Rational HATS a Strategic Investment
Making Rational HATS a Strategic InvestmentStrongback Consulting
 
How to become a Rational Developer for IBM i Power User
How to become a Rational Developer for IBM i Power UserHow to become a Rational Developer for IBM i Power User
How to become a Rational Developer for IBM i Power UserStrongback Consulting
 
Software Archaeology and Code Refactoring with Rational Developer for System ...
Software Archaeology and Code Refactoring with Rational Developer for System ...Software Archaeology and Code Refactoring with Rational Developer for System ...
Software Archaeology and Code Refactoring with Rational Developer for System ...Strongback Consulting
 
Software Archaeology with RDz and RAA
Software Archaeology with RDz and RAASoftware Archaeology with RDz and RAA
Software Archaeology with RDz and RAAStrongback Consulting
 
Teaching old dogs new tricks with Rational Developer for System i
Teaching old dogs new tricks with Rational Developer for System iTeaching old dogs new tricks with Rational Developer for System i
Teaching old dogs new tricks with Rational Developer for System iStrongback Consulting
 
IBM Innovate 2013: Making Rational HATS a Strategic Investment
IBM Innovate 2013: Making Rational HATS a Strategic InvestmentIBM Innovate 2013: Making Rational HATS a Strategic Investment
IBM Innovate 2013: Making Rational HATS a Strategic InvestmentStrongback Consulting
 
How a tactical HATS solution became a strategic asset - A Customer Story
How a tactical HATS solution became a strategic asset - A Customer StoryHow a tactical HATS solution became a strategic asset - A Customer Story
How a tactical HATS solution became a strategic asset - A Customer StoryStrongback Consulting
 
Rational collaborative-lifecycle-management-2012
Rational collaborative-lifecycle-management-2012Rational collaborative-lifecycle-management-2012
Rational collaborative-lifecycle-management-2012Strongback Consulting
 
Build Smarter User Interfaces for Legacy Applications with IBM Rational Host ...
Build Smarter User Interfaces for Legacy Applications with IBM Rational Host ...Build Smarter User Interfaces for Legacy Applications with IBM Rational Host ...
Build Smarter User Interfaces for Legacy Applications with IBM Rational Host ...Strongback Consulting
 
Collaborative Lifecycle Managmenent - an Introduction
Collaborative Lifecycle Managmenent - an IntroductionCollaborative Lifecycle Managmenent - an Introduction
Collaborative Lifecycle Managmenent - an IntroductionStrongback Consulting
 
IBM Innovate 2011- What every System i Developer Needs to Know
IBM Innovate 2011- What every System i Developer Needs to KnowIBM Innovate 2011- What every System i Developer Needs to Know
IBM Innovate 2011- What every System i Developer Needs to KnowStrongback Consulting
 

Plus de Strongback Consulting (20)

IBM Collaborative Lifecycle Management Solution for DevOps v6
IBM Collaborative Lifecycle Management Solution for DevOps v6IBM Collaborative Lifecycle Management Solution for DevOps v6
IBM Collaborative Lifecycle Management Solution for DevOps v6
 
Tips for Developing and Testing IBM HATS Applications
Tips for Developing and Testing IBM HATS ApplicationsTips for Developing and Testing IBM HATS Applications
Tips for Developing and Testing IBM HATS Applications
 
Patterns and Antipatterns for Adopting IBM DevOps Tools
Patterns and Antipatterns for Adopting IBM DevOps ToolsPatterns and Antipatterns for Adopting IBM DevOps Tools
Patterns and Antipatterns for Adopting IBM DevOps Tools
 
How Arcad Skipper pack works for the IBM i
How Arcad Skipper pack works for the IBM iHow Arcad Skipper pack works for the IBM i
How Arcad Skipper pack works for the IBM i
 
Being Smart about C/C++ Development on AIX and Linux
Being Smart about C/C++ Development on AIX and Linux Being Smart about C/C++ Development on AIX and Linux
Being Smart about C/C++ Development on AIX and Linux
 
Making Rational HATS a Strategic Investment
Making Rational HATS a Strategic InvestmentMaking Rational HATS a Strategic Investment
Making Rational HATS a Strategic Investment
 
How to become a Rational Developer for IBM i Power User
How to become a Rational Developer for IBM i Power UserHow to become a Rational Developer for IBM i Power User
How to become a Rational Developer for IBM i Power User
 
Software Archaeology and Code Refactoring with Rational Developer for System ...
Software Archaeology and Code Refactoring with Rational Developer for System ...Software Archaeology and Code Refactoring with Rational Developer for System ...
Software Archaeology and Code Refactoring with Rational Developer for System ...
 
Software Archaeology with RDz and RAA
Software Archaeology with RDz and RAASoftware Archaeology with RDz and RAA
Software Archaeology with RDz and RAA
 
IBM Rational HATS Overview 2013
IBM Rational HATS Overview 2013IBM Rational HATS Overview 2013
IBM Rational HATS Overview 2013
 
Teaching old dogs new tricks with Rational Developer for System i
Teaching old dogs new tricks with Rational Developer for System iTeaching old dogs new tricks with Rational Developer for System i
Teaching old dogs new tricks with Rational Developer for System i
 
IBM Innovate 2013: Making Rational HATS a Strategic Investment
IBM Innovate 2013: Making Rational HATS a Strategic InvestmentIBM Innovate 2013: Making Rational HATS a Strategic Investment
IBM Innovate 2013: Making Rational HATS a Strategic Investment
 
How a tactical HATS solution became a strategic asset - A Customer Story
How a tactical HATS solution became a strategic asset - A Customer StoryHow a tactical HATS solution became a strategic asset - A Customer Story
How a tactical HATS solution became a strategic asset - A Customer Story
 
Rational collaborative-lifecycle-management-2012
Rational collaborative-lifecycle-management-2012Rational collaborative-lifecycle-management-2012
Rational collaborative-lifecycle-management-2012
 
Build Smarter User Interfaces for Legacy Applications with IBM Rational Host ...
Build Smarter User Interfaces for Legacy Applications with IBM Rational Host ...Build Smarter User Interfaces for Legacy Applications with IBM Rational Host ...
Build Smarter User Interfaces for Legacy Applications with IBM Rational Host ...
 
Collaborative Quality Management
Collaborative Quality ManagementCollaborative Quality Management
Collaborative Quality Management
 
Rational HATS and HIS v8 Overview
Rational HATS and HIS v8 OverviewRational HATS and HIS v8 Overview
Rational HATS and HIS v8 Overview
 
Collaborative Lifecycle Managmenent - an Introduction
Collaborative Lifecycle Managmenent - an IntroductionCollaborative Lifecycle Managmenent - an Introduction
Collaborative Lifecycle Managmenent - an Introduction
 
IBM Innovate 2011- What every System i Developer Needs to Know
IBM Innovate 2011- What every System i Developer Needs to KnowIBM Innovate 2011- What every System i Developer Needs to Know
IBM Innovate 2011- What every System i Developer Needs to Know
 
Rational HATS overview 7.5.1
Rational HATS overview 7.5.1Rational HATS overview 7.5.1
Rational HATS overview 7.5.1
 

Dernier

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Dernier (20)

Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

Linux 101

  • 1. 1
  • 2. So you’re new to Linux? • Just got thrown a Red Hat cd and need to get going? • Told to change a few files? • Scared to death you’ll destroy something? • Yeah… we know. This will get you through the tough stuff www.StrongbackConsulting.com 2
  • 3. Basics – getting connected • First, you need to launch a console • DOS it is NOT – Use / not – No such thing and C: drives or D: drives • If you’re on the Linux Desktop, use these command consoles: – Gnome Console (Gnome) – Konsole (KDE) www.StrongbackConsulting.com
  • 4. Putty setup • Connect remotely using putty – Download the putty.exe: • http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html • Get your connection parameters – Host name – Ssh port – SSL certificate (if required) • Setup a connection www.StrongbackConsulting.com
  • 5. Connection settings • Launch Putty.exe • Enter your connection parms • Click “Open” • Login with given credentials www.StrongbackConsulting.com
  • 6. Navigating around pwd = present working directory whoami = tells you what user you are logged in as ls = list directory contents -l = show long format, -h = helpful format of sizes (MB, GB, KB, etc) -a = show all contents including hidden files cd = change directory . single period for current directory .. two periods to move one directory up ~ shortcut for the home directory (i.e. ~ = /home/myuserid) passwd = change your password www.StrongbackConsulting.com
  • 7. Reading up (or down) cat = concatenate file to standard output (i.e. spit out the contents to the console) -this is good for short files, but for long files, try… more = take a long file and page through it, one screen at a time +num = switch to cause more to start at line number num tail = show the tail end of a file -x = show x numbers of lines from the bottom up. (i.e. tail -50) less = similar to more but allows backward movement in the file, and starts faster www.StrongbackConsulting.com
  • 8. What’s happening ps = shows the system processes and open files –ef = shows everything formatted ps –ef | grep xxxx allows you to search the process stack for string xxxx top = topaz, the system processor activity www.StrongbackConsulting.com
  • 9. Managing Files & Directories rm = remove file or directory -r = recourse through and remove directory chmod = change mode, or file permissions (read, write, execute) ex: chmod 755 install.sh, gives this a permission set of rwxr-xr-x chown = change owner ex: chown jdoe:users install.sh mkdir = make directory touch = create an empty file, or update timestamps on a file cp = copy , mv = move www.StrongbackConsulting.com
  • 10. Directory Permissions • Read, Write, & Execute. – read = 1 – write = 2 – execute = 4 • Add them together to get the sum permission. • Permissions display as 10 total bits – ex: drwxr-xr-x 2 root root 4096 Feb 20 2009 home – directory, owner, group, everyone else d rwx r-x r-x www.StrongbackConsulting.com
  • 11. Editing – vi(m) • Universal editor for Linux / Unix • vim is the successor to vi – More capable, syntax highlighting, extensible configuration file, etc. Two modes, command mode and edit mode Command mode commands i = insert at cursor position, a = append after cursor position (both change into the edit mode) x = delete character, dd = delete line ESC = escape back to command mode :q = quit, :w = write (or save), :wq = write then quit, :q! quit and abandon changes www.StrongbackConsulting.com
  • 12. Advanced Commands to avoid at first…but master later System processes System config commands mount, unmount , smbmount yast, yum shutdown, kill rpm, apt-get fdisk, fsck tar, zip sudo, su chkconfig netstat, tracert ifconfig, iwconfig rsync www.StrongbackConsulting.com
  • 13. Linux Resources • One URL to rule them all: https://delicious.com/strongback/linux *Delicious is a social bookmark sharing site. This URL above is for linux, but you an easily find our other links on other subjects by navigating to other tags. The tag is the last word in the URL. www.StrongbackConsulting.com
  • 14. Connect with us Subscribe to us at http://feeds.feedburner.com/StrongbackConsulting Discover us at: http://www.strongback.us Socialize with us on Facebook & LinkedIn http://www.facebook.com/StrongbackConsulting http://www.linkedin.com/company/290754 Watch Us at Youtube and Vimeo http://www.youtube.com/user/strongbackconsulting https://vimeo.com/user7519232 www.StrongbackConsulting.com