SlideShare a Scribd company logo
1 of 13
Download to read offline
Linux System
Administration
What is linux?
• On the server side a linux know as stable and
reliable platform which providing the database to the
system. •There are two properties:-
•Linux pros
•Linux cons
• ls –l
-rw-rwx- -x 1 roll no Vispute 1251 Aug 2 10.31 chap01
Basic commands
• Pwd
• Ls
• Cd
• Mkdir
• Rmdir
• Touch
• Cat
• Rm
Introduc on to Linux
1. Linux itself sufficient OS.
2. Mul user and mul tasking .
3. One of the open source so ware used source code.
4. Provide high security level.
5. Func onality and interface.
6. X-86 compa ble microprocessor.
7. Use interfaces .
8. K-desktop and GENOME.
9. Characteris cs of linux:-
Linux distribu on
1. Distorts
2. 3 a ributes
• Hardware
• Ease of use
• The size of so ware repository
• Linux distribu on packages • 1
fedora
• 2 mandriva
• 3 knoppix
• 4 debian
• 5 suse
• 6 ubuntu
• Debian:-
• -its used as a based for many other distribu on.
• -Debian founda on is based on open source philosophy
• Debian focused mainly in three branches
• 1) Stable
• 2) Unstable
• 3) Tes ng
• It have various features
• Knoppix:-
• Designed to be used as a live CD
• Efficient compression mechanism and automa c hardware detec on
• Suse:-
• It is user friendly
• Use distribu on packages
• Provides configura on tools such as YaST.
• It is stable distribu on package.
• Ubuntu:-
• It refers to distribu on package based on Unstable branche of debian
distribu on.
Du es of the system administrator
• Self sufficient opera ng system.
• No one whose computer is connected to the internet for instance has
been protect or secure to the effects or poorly administered system as
demonstrated by DDoS and email Microvirus a acks.
• Superuser.
• LSA responsible for business network which include of dozen of
machines • User requirements
• Access every things
• Responsibility change from pla orm to pla orm
• Other features
• 1 installa on and configura on severs
• 2 installa on and configura on applica on so ware
• 3 crea ng and maintaining user accounts • 4
backing up and restoring files
• 5 monitoring and tuning performance
• 6 configuring a secure system
• 7 using tools to monitor security
Installing and configuring servers
• Server provide services
• Reqired graphical layer
• This is a server
• MOS and ND
• Provide various features
• Take print
• Security issue arise
• X-server ,local webserver, local p server and local mail server
Installing and configuring applica on so ware
• Individual user able to install some applica on in their home
directories and customiza on
• Install linux file hierarchy
• Loca on of Installa on is important
• Correct configura on possible
• Provide mechanism
• Set baseline
• Skeleton configura on
• System Administra on provides a set of ac vi es
Crea ng and maintaining user accounts
• Access any account
• Why account create for each user
• Aaccess account by user
• System Administra on task
• Users responsibility
Backing up and restoring files
• Data is important
• Avoid loss of data
• Files can be lost
• Causes of loss data
• How to minimize the disrup on of data • What is backup
• What is restoring
• Choose suitable medium
• What and how factors
• Maintain backup services
• Restoring based on level of damage • H/W & S/W failure causes
• Tes ng backup media
Monitoring and Tuning performance • Constant
assessment done by system administrator • Examin the applica on with
logical and physical structure • Con nues diagnosing and monitoring
tools • Ex
• Tuning is required for user
• How system performance tools work
• Need of system administrator
Configuring a secure system • System administrator
task
• Security system
• Protect system
• Prevent personal informa on
• Required precau ons while connec ng internet • Features
Using tools to monitor security
• Linux is the preferred os for those who demand secure network but
can easily be exploited by hackers as it is open source.

More Related Content

Similar to linux - Google Docs.pdf

Chapter one_oS.ppt
Chapter one_oS.pptChapter one_oS.ppt
Chapter one_oS.pptmiki304759
 
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)Andrejs Prokopjevs
 
System software and its types
System software and its typesSystem software and its types
System software and its typessamina khan
 
UNIT 5-UNDERSTANDING THE OPERATION OF A NETWORK.pptx
UNIT 5-UNDERSTANDING THE OPERATION OF A NETWORK.pptxUNIT 5-UNDERSTANDING THE OPERATION OF A NETWORK.pptx
UNIT 5-UNDERSTANDING THE OPERATION OF A NETWORK.pptxLeahRachael
 
Introduction to Operating Systems - Mary Margarat
Introduction to Operating Systems - Mary MargaratIntroduction to Operating Systems - Mary Margarat
Introduction to Operating Systems - Mary MargaratMary Margarat
 
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...Vincent Giersch
 
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptxTckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptxAlfredObia1
 
Operating system lect3 Autosaved.pptx
Operating system lect3 Autosaved.pptxOperating system lect3 Autosaved.pptx
Operating system lect3 Autosaved.pptxAryanGour1
 
Thick Client Penetration Testing.pdf
Thick Client Penetration Testing.pdfThick Client Penetration Testing.pdf
Thick Client Penetration Testing.pdfSouvikRoy114738
 
gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1Anne Starr
 
operating system ondesktop computer ( laptop)
operating system ondesktop  computer ( laptop)operating system ondesktop  computer ( laptop)
operating system ondesktop computer ( laptop)BandaruGowtham1
 

Similar to linux - Google Docs.pdf (20)

Chapter one_oS.ppt
Chapter one_oS.pptChapter one_oS.ppt
Chapter one_oS.ppt
 
Operating System
Operating SystemOperating System
Operating System
 
Chapter08
Chapter08Chapter08
Chapter08
 
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
Security of Oracle EBS - How I can Protect my System (UKOUG APPS 18 edition)
 
W982 05092004
W982 05092004W982 05092004
W982 05092004
 
System software and its types
System software and its typesSystem software and its types
System software and its types
 
UNIT 5-UNDERSTANDING THE OPERATION OF A NETWORK.pptx
UNIT 5-UNDERSTANDING THE OPERATION OF A NETWORK.pptxUNIT 5-UNDERSTANDING THE OPERATION OF A NETWORK.pptx
UNIT 5-UNDERSTANDING THE OPERATION OF A NETWORK.pptx
 
Chap2
Chap2Chap2
Chap2
 
Introduction to Operating Systems - Mary Margarat
Introduction to Operating Systems - Mary MargaratIntroduction to Operating Systems - Mary Margarat
Introduction to Operating Systems - Mary Margarat
 
Lec # 1 chapter 2
Lec # 1 chapter 2Lec # 1 chapter 2
Lec # 1 chapter 2
 
Prashanth kumarResume(1)
Prashanth kumarResume(1)Prashanth kumarResume(1)
Prashanth kumarResume(1)
 
Linux
LinuxLinux
Linux
 
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
UKC - Feb 2013 - Analyzing the security of Windows 7 and Linux for cloud comp...
 
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptxTckhjhhjbbggujvg Day13-Post-Exploitation.pptx
Tckhjhhjbbggujvg Day13-Post-Exploitation.pptx
 
Unit 2.pptx
Unit 2.pptxUnit 2.pptx
Unit 2.pptx
 
Unit 2.pptx
Unit 2.pptxUnit 2.pptx
Unit 2.pptx
 
Operating system lect3 Autosaved.pptx
Operating system lect3 Autosaved.pptxOperating system lect3 Autosaved.pptx
Operating system lect3 Autosaved.pptx
 
Thick Client Penetration Testing.pdf
Thick Client Penetration Testing.pdfThick Client Penetration Testing.pdf
Thick Client Penetration Testing.pdf
 
gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1gkkCloudtechnologyassociate(cta)day 1
gkkCloudtechnologyassociate(cta)day 1
 
operating system ondesktop computer ( laptop)
operating system ondesktop  computer ( laptop)operating system ondesktop  computer ( laptop)
operating system ondesktop computer ( laptop)
 

Recently uploaded

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 

Recently uploaded (20)

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

linux - Google Docs.pdf

  • 1. Linux System Administration What is linux? • On the server side a linux know as stable and reliable platform which providing the database to the system. •There are two properties:-
  • 2. •Linux pros •Linux cons • ls –l -rw-rwx- -x 1 roll no Vispute 1251 Aug 2 10.31 chap01 Basic commands • Pwd • Ls • Cd • Mkdir • Rmdir
  • 3. • Touch • Cat • Rm Introduc on to Linux 1. Linux itself sufficient OS. 2. Mul user and mul tasking . 3. One of the open source so ware used source code. 4. Provide high security level. 5. Func onality and interface. 6. X-86 compa ble microprocessor. 7. Use interfaces .
  • 4. 8. K-desktop and GENOME. 9. Characteris cs of linux:- Linux distribu on 1. Distorts 2. 3 a ributes • Hardware • Ease of use • The size of so ware repository • Linux distribu on packages • 1 fedora • 2 mandriva • 3 knoppix • 4 debian
  • 5. • 5 suse • 6 ubuntu • Debian:- • -its used as a based for many other distribu on. • -Debian founda on is based on open source philosophy • Debian focused mainly in three branches • 1) Stable • 2) Unstable • 3) Tes ng • It have various features • Knoppix:- • Designed to be used as a live CD
  • 6. • Efficient compression mechanism and automa c hardware detec on • Suse:- • It is user friendly • Use distribu on packages • Provides configura on tools such as YaST. • It is stable distribu on package. • Ubuntu:- • It refers to distribu on package based on Unstable branche of debian distribu on. Du es of the system administrator
  • 7. • Self sufficient opera ng system. • No one whose computer is connected to the internet for instance has been protect or secure to the effects or poorly administered system as demonstrated by DDoS and email Microvirus a acks. • Superuser. • LSA responsible for business network which include of dozen of machines • User requirements • Access every things • Responsibility change from pla orm to pla orm • Other features • 1 installa on and configura on severs
  • 8. • 2 installa on and configura on applica on so ware • 3 crea ng and maintaining user accounts • 4 backing up and restoring files • 5 monitoring and tuning performance • 6 configuring a secure system • 7 using tools to monitor security Installing and configuring servers • Server provide services • Reqired graphical layer • This is a server
  • 9. • MOS and ND • Provide various features • Take print • Security issue arise • X-server ,local webserver, local p server and local mail server Installing and configuring applica on so ware • Individual user able to install some applica on in their home directories and customiza on • Install linux file hierarchy • Loca on of Installa on is important • Correct configura on possible
  • 10. • Provide mechanism • Set baseline • Skeleton configura on • System Administra on provides a set of ac vi es Crea ng and maintaining user accounts • Access any account • Why account create for each user • Aaccess account by user • System Administra on task • Users responsibility
  • 11. Backing up and restoring files • Data is important • Avoid loss of data • Files can be lost • Causes of loss data • How to minimize the disrup on of data • What is backup • What is restoring • Choose suitable medium • What and how factors • Maintain backup services • Restoring based on level of damage • H/W & S/W failure causes • Tes ng backup media
  • 12. Monitoring and Tuning performance • Constant assessment done by system administrator • Examin the applica on with logical and physical structure • Con nues diagnosing and monitoring tools • Ex • Tuning is required for user • How system performance tools work • Need of system administrator Configuring a secure system • System administrator task • Security system
  • 13. • Protect system • Prevent personal informa on • Required precau ons while connec ng internet • Features Using tools to monitor security • Linux is the preferred os for those who demand secure network but can easily be exploited by hackers as it is open source.