SlideShare une entreprise Scribd logo
1  sur  26
Learning Linux
Linux Overview
Its a elongated version of UNIX where UNIX is
developed from a useless OS to Advance OS

Invented by LINUS , trying to make UNIX to
have a free system that completely compatible
with UNIX following the POSIK standards

It can be modified to the users need and can
be developed too and work on embedded
system

Many software engineers are using Linux for
there extensional need which are not provided
by the version of windows and Macintosh
Linux versions
Some Linux versions as
•
SUSE Linux
•
Ubuntu 1.0.10,Linux essential
•
Cent OS 5,6 essential
•
Fedora User,Desktop essential
•
Caldera open Linux
•
Slackware Linux
Linux advantages and
disadvantages
Advantage of Linux

Its free of cost

Its portable to any
hardware

Made to keep on running

Its secure and versatile

Its scalable

Has short debugging time
Disadvantages of Linux

There are far too many
distributions

Not very user friendly

Confusing for beginners

Changing versions

Frequent updated

Sometimes complicated
Booting process

Booting is a process or set of operations that loads and hence starts the
operating system starting from the point where the system is powered on

initially when the system is powered on a a relatively small program stored
in read-only memory (ROM) along with a small amount of needed data, to
access the nonvolatile device or devices from which the operating system
programs and data can be loaded into RAM.

all the other devices are not activated so booting is the process which
connect the hardware by launching a boot loader and connects to the
operating system of the RAM
Booting in windows

Turn on the power

CPU pins are reset and registers are set to
specific values

CPU jumps to address of bios

Bios runs the post and necessary checks

Bios runs the jump to MBR(MASTER BOOT
RECORD)

Primary boot loader runs from MBR and jumps to
secondary boot loader

Secondary boot loader loads operation system
Booting in Linux
Booting in Linux is done by following steps

BIOS is set up it loads and perform some checks and
gives control to MBR

MBR loads and it contains the info of the GRUB and
executes it

GRUB loads the kernel and has knowledge of the file
system and init images

KERNEL executes and runs /bin/init initial program of
RAM disk

INIT initiates the run level by selecting mode of run
level

RUN LEVEL runs and gives control to operating
system
Installation of Linux Cent OS 5

INSERT DISK-->POWER THE SYSTER ON-->
RUN BIOS SETUP--> CHANGE BOOT PRIORITY TO DVD--> EXIT

Select the install or updated existing system option

Skip installation media checks

Click next on welcome window

Choose language

Choose keyboard formate

Select the instilation device type (basic or specific
storage drive)

Specify host name if necessary

Partitioning , package selection
and rebooting

Select network device and edit

Click on connect automatically or on DNV or enter
manually

Select network setting and apply

Select time zone

Type the password which is to be the root password and
confirm password and click next

Select partition of the system as needed or customize

Select the required package of software

installation will start once done click on reboot

Initialization is done now start using the system
File system of Linux
File system
• /bin- Common programs, shared by the system, the
system administrator and the users.
• /boot- The startup files and the kernel, vmlinuz. In
some recent distributions also grub data. Grub is
the GRand Unified Boot loader and is an attempt to
get rid of the many different boot-loaders we know
today.
• /dev - Contains references to all the CPU peripheral
hardware, which are represented as files with
special properties.
• /etc - Most important system configuration files are
in /etc
• /home - Home directories of the common users
• /initrd- (on some distributions) Information for
booting.
• /lib- Library files, includes files for all kinds of
programs needed by the system and the users.
• /lost+found- Files that were saved during failures
are here.
• /misc- For miscellaneous purposes.
• /mnt - Standard mount point for external file
systems,
• /net - Standard mount point for entire remote file
systems
• /opt - contains extra and third party software.
• /proc - containing information about system
resources.
• /root - The administrative user's home
directory.
• /sbin - Programs for use by the system and
the system administrator.
• /tmp - Temporary space for use by the system,
cleaned upon reboot
• /usr - Programs, libraries, documentation etc.
for all user-related programs.
• /var -Storage for all variable files and
temporary files created by users, such as log
files, the mail queue
Linux File Permissions
These read, write, and execute permissions are
defined for:
• user - the user that owners the file
• group - users in the files group
other - every other user
There are also three other components when it
comes to file mode bits, namely
• the setuid bit
• the setgid bit
• the sticky bit.
Read write execute
The repeated rwx sequences represent the notion of
read (r), write (w), and execute (x)
permissions for user, group, and other (in that order). The
possible file types
• - = Regular File
• d = Directory
• l = Symbolic Link
• b = Block Special Device
• c = Character Device
• s = Unix Socket (local domain socket)
• p = Named Pipe
Special modes
Setuid - Set User ID When the setuid bit is set for a
program, on execution the process's effective user ID
gets set to that of the program file itself the lower case
"s" where the "x" was. If however, the file didn't have the
"x" permissions for the user, and then had the setuid bit
set to S
Setgid - Set Group ID When the setgid bit is set for a
program, on execution the process's effective group ID
gets set to that of the program file the setgid bit is
shown as either an "S" or "s".
Sticky Bit -When a directory has the sticky bit set, only
root or the file's owner has permission to change files in
that directory. The letter's "T" and "t" are used to indicate
Permissions: Octal
Representation
• Permissions In Plain English Symbolic Octal
• read,write,and execute rwx 7
• read and write rw- 6
• read and execute r-x 5
• read r-- 4
• write and execute -wx 3
• write -w- 2
• execute --x 1
• no permissions --- 0
The command takes the general form: 
chmod  MODE  file  There  are  two  ways  to  represent  the 
MODE:
(1) Using symbolic modes (letters to indicate the categories 
and permission)
(2)  Using  numeric  modes  (An  octal  (base  8)  number  that 
represents the mode)
In  order  to  change  the  permissions  of  a  file  using  symbolic 
permissions, use the command format: 
chmod SYMBOLIC/NUMERIC­MODE FILENAME
Chmod (changing permission)
NUMERICAL MODE
• chmod 400 file To protect a file against accidental overwriting.
• chmod 500 directory To protect yourself from accidentally removing,
renaming or moving files from this directory.
• chmod 600 file A private file only changeable by the user who
entered this command.
• chmod 644 file A publicly readable file that can only be changed by
the issuing user.
• chmod 660 file Users belonging to your group can change this file,
others don't have any access to it at all.
• chmod 700 file Protects a file against any access from other users,
while the issuing user still has full access.
• chmod 755 directory For files that should be readable and executable
by others, but only changeable by the issuing user.
• chmod 775 file Standard file sharing mode for a group.
•
SYMBOLIC MODE
• chmod a=rwx filename the a means all and rwx means set
read,write, and execute. chmod ugo=rwx filename or chmod
ugo+=rwx filenameRegarding just the symbolic mode part of
the command, here are a few more examples:
• To add read permission for all:a+r To remove permissions for
all:a-r
• To add execute permissions for all:a+x To remove execute
permissions for all:a-x
• To remove execute permissions from group and other (i.e from
all users except the file's owner): go-x To remove permissions
to do anything from all users except the owner: go=
• The setuid bit can be set using: u+s The setuid bit can be
removed using: u-s
• setgid can be set using: g+s and removed using: g-s
• The sticky bit can be set by using: +t and removed using: -t
• To assign read, write permissions only for user and group:ug=rw
• To add read, write permissions to user and group to the
permissions that already exist:ug+=rw
• To remove execute permissions from group and other (i.e from all
users except the file's owner):go-x
• To remove permissions for all: a-r To add execute permissions for
all: a+x remove execute permissions for all: a-x
• To assign read, write permissions only for user and group: ug=rw To
add read, write permissions to user and group to the permissions
that already exist: ug+=rw To add read, write permissions to user and
group to the permissions that already exist: ug+=rw
• To remove execute permissions from group and other (i.e from all
users except the file's owner): go-x To remove permissions to do
anything from all users except the owner: go=
• The setuid bit can be set using: u+S The setuid bit can be removed
using: u-s
• setgid can be set using: g+s removed using: g-s
• set by using: +t removed using: -t
UNMASK
• octal numbers are preceded by a 0 (in the same way
hex would be preceded by 0x), so the umask value
itself is actually 002.
• This value is an octal (base 8, digits 0-7) value which
is subtracted from a base value of 777 for directories,
or subtracted from a base value of 666 for files.
• A umask of 002 basically means don't remove any
permissions from the base value for "user" or "group",
but "other" is not allowed write permission (write
permission is octal 2, or binary 010 meaning -w-).
Chown and Chgrp command
• The chown command can be applied to
change both user and group ownership of a
file, while chgrp only changes group
ownership. Of course the system will check if
the user issuing one of these commands has
sufficient permissions on the file(s) she wants
to change.
• In order to only change the user ownership of
a file, use this syntax:
chown/chgrp newuser file
Commands till now
• bash ­GNU shell program.
• cat file(s)­Send content of file(s) to standard output.
• cd directory or root­ Enter directory or cd is a bash built­
in command.
• chgrp newgroup file(s)­ Change the group ownership of 
file(s) to newgroup
• chmod mode file(s)­ Change access permissions on 
file(s)
• chown newowner[:[newgroup]] file(s)­  Change file 
owner and group ownership.
• df file­Reports on used disk space on the partition 
containing file.
• fdisk­to know hard disk size
• echo string­Display a line of text export Part of bash that 
announces variables and their values to the system.
• find  path  expression­find  files  in  the  file  system 
hierarchy
• locate searchstring­Print all accessible files matching the 
search pattern.
• ls file(s)­Prints directory content.
• man  command­Format  and  display  online  (system) 
manual pages for command.
• Pwd ­Print the present or current working directory.
• umask [value] ­Show or change new file creation mode.

Contenu connexe

Tendances

Tendances (20)

Linux command ppt
Linux command pptLinux command ppt
Linux command ppt
 
Linux Administration
Linux AdministrationLinux Administration
Linux Administration
 
Linux basics part 1
Linux basics part 1Linux basics part 1
Linux basics part 1
 
Linux - Introductions to Linux Operating System
Linux - Introductions to Linux Operating SystemLinux - Introductions to Linux Operating System
Linux - Introductions to Linux Operating System
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
 
Introduction to Linux basic
Introduction to Linux basicIntroduction to Linux basic
Introduction to Linux basic
 
Presentation on linux
Presentation on linuxPresentation on linux
Presentation on linux
 
Linux
LinuxLinux
Linux
 
what is LINUX ? presentation.
what is LINUX ? presentation.what is LINUX ? presentation.
what is LINUX ? presentation.
 
Linux commands and file structure
Linux commands and file structureLinux commands and file structure
Linux commands and file structure
 
Linux OS presentation
Linux OS presentationLinux OS presentation
Linux OS presentation
 
Linux os and its features
Linux os and its featuresLinux os and its features
Linux os and its features
 
Linux file system
Linux file systemLinux file system
Linux file system
 
Introduction to Linux
Introduction to Linux Introduction to Linux
Introduction to Linux
 
Linux Advantages and Disadvantages
Linux Advantages and DisadvantagesLinux Advantages and Disadvantages
Linux Advantages and Disadvantages
 
Intro to linux
Intro to linuxIntro to linux
Intro to linux
 
Linux ppt
Linux pptLinux ppt
Linux ppt
 
Linux distributions
Linux    distributionsLinux    distributions
Linux distributions
 
Linux seminar
Linux seminarLinux seminar
Linux seminar
 
An Introduction To Linux
An Introduction To LinuxAn Introduction To Linux
An Introduction To Linux
 

En vedette (17)

File permission in linux
File permission in linuxFile permission in linux
File permission in linux
 
Chmod
ChmodChmod
Chmod
 
06 users groups_and_permissions
06 users groups_and_permissions06 users groups_and_permissions
06 users groups_and_permissions
 
Linux-Permission
Linux-PermissionLinux-Permission
Linux-Permission
 
Linux ppt
Linux pptLinux ppt
Linux ppt
 
Red hat linux essentials
Red hat linux essentialsRed hat linux essentials
Red hat linux essentials
 
JBoss Application Server 7
JBoss Application Server 7JBoss Application Server 7
JBoss Application Server 7
 
Shell scripting
Shell scriptingShell scripting
Shell scripting
 
Linux Introduction
Linux IntroductionLinux Introduction
Linux Introduction
 
Kernel (computing)
Kernel (computing)Kernel (computing)
Kernel (computing)
 
Intro to Linux Shell Scripting
Intro to Linux Shell ScriptingIntro to Linux Shell Scripting
Intro to Linux Shell Scripting
 
Kernel mode vs user mode in linux
Kernel mode vs user mode in linuxKernel mode vs user mode in linux
Kernel mode vs user mode in linux
 
Shell programming
Shell programmingShell programming
Shell programming
 
Shell Scripting in Linux
Shell Scripting in LinuxShell Scripting in Linux
Shell Scripting in Linux
 
Kernel (OS)
Kernel (OS)Kernel (OS)
Kernel (OS)
 
Unix Operating System
Unix Operating SystemUnix Operating System
Unix Operating System
 
Linux File System
Linux File SystemLinux File System
Linux File System
 

Similaire à Linux

How to Audit Linux - Gene Kartavtsev, ISACA MN
How to Audit Linux - Gene Kartavtsev, ISACA MNHow to Audit Linux - Gene Kartavtsev, ISACA MN
How to Audit Linux - Gene Kartavtsev, ISACA MNGene Kartavtsev
 
Linux: Everyting-as-a-service
Linux: Everyting-as-a-serviceLinux: Everyting-as-a-service
Linux: Everyting-as-a-serviceRohit Sansiya
 
24HOP Introduction to Linux for SQL Server DBAs
24HOP Introduction to Linux for SQL Server DBAs24HOP Introduction to Linux for SQL Server DBAs
24HOP Introduction to Linux for SQL Server DBAsKellyn Pot'Vin-Gorman
 
Topic 3-1_More_Linux_Commands.pptx
Topic 3-1_More_Linux_Commands.pptxTopic 3-1_More_Linux_Commands.pptx
Topic 3-1_More_Linux_Commands.pptxdulala3
 
Unix Shell Script - 2 Days Session.pptx
Unix Shell Script - 2 Days Session.pptxUnix Shell Script - 2 Days Session.pptx
Unix Shell Script - 2 Days Session.pptxRajesh Kumar
 
Course 102: Lecture 14: Users and Permissions
Course 102: Lecture 14: Users and PermissionsCourse 102: Lecture 14: Users and Permissions
Course 102: Lecture 14: Users and PermissionsAhmed El-Arabawy
 
Linuxtraining 130710022121-phpapp01
Linuxtraining 130710022121-phpapp01Linuxtraining 130710022121-phpapp01
Linuxtraining 130710022121-phpapp01Chander Pandey
 
Linux week 2
Linux week 2Linux week 2
Linux week 2Vinoth Sn
 
Linux Basics
Linux BasicsLinux Basics
Linux BasicsLokesh C
 

Similaire à Linux (20)

Basic orientation to Linux
Basic orientation to LinuxBasic orientation to Linux
Basic orientation to Linux
 
How to Audit Linux - Gene Kartavtsev, ISACA MN
How to Audit Linux - Gene Kartavtsev, ISACA MNHow to Audit Linux - Gene Kartavtsev, ISACA MN
How to Audit Linux - Gene Kartavtsev, ISACA MN
 
CSA-lecture 6.pptx
CSA-lecture 6.pptxCSA-lecture 6.pptx
CSA-lecture 6.pptx
 
Linux: Everyting-as-a-service
Linux: Everyting-as-a-serviceLinux: Everyting-as-a-service
Linux: Everyting-as-a-service
 
24HOP Introduction to Linux for SQL Server DBAs
24HOP Introduction to Linux for SQL Server DBAs24HOP Introduction to Linux for SQL Server DBAs
24HOP Introduction to Linux for SQL Server DBAs
 
3. introduction of centos
3. introduction of centos3. introduction of centos
3. introduction of centos
 
Topic 3-1_More_Linux_Commands.pptx
Topic 3-1_More_Linux_Commands.pptxTopic 3-1_More_Linux_Commands.pptx
Topic 3-1_More_Linux_Commands.pptx
 
#WeSpeakLinux Session
#WeSpeakLinux Session#WeSpeakLinux Session
#WeSpeakLinux Session
 
Linux Presentation
Linux PresentationLinux Presentation
Linux Presentation
 
Linux Security
Linux SecurityLinux Security
Linux Security
 
Solaris basics
Solaris basicsSolaris basics
Solaris basics
 
Unix Shell Script - 2 Days Session.pptx
Unix Shell Script - 2 Days Session.pptxUnix Shell Script - 2 Days Session.pptx
Unix Shell Script - 2 Days Session.pptx
 
4. Centos Administration
4. Centos Administration4. Centos Administration
4. Centos Administration
 
Linux filesystemhierarchy
Linux filesystemhierarchyLinux filesystemhierarchy
Linux filesystemhierarchy
 
Linux Internals - Part I
Linux Internals - Part ILinux Internals - Part I
Linux Internals - Part I
 
Course 102: Lecture 14: Users and Permissions
Course 102: Lecture 14: Users and PermissionsCourse 102: Lecture 14: Users and Permissions
Course 102: Lecture 14: Users and Permissions
 
Linux 4 you
Linux 4 youLinux 4 you
Linux 4 you
 
Linuxtraining 130710022121-phpapp01
Linuxtraining 130710022121-phpapp01Linuxtraining 130710022121-phpapp01
Linuxtraining 130710022121-phpapp01
 
Linux week 2
Linux week 2Linux week 2
Linux week 2
 
Linux Basics
Linux BasicsLinux Basics
Linux Basics
 

Plus de Patruni Chidananda Sastry (14)

Spread spectrum
Spread spectrumSpread spectrum
Spread spectrum
 
Power consumption by means of wi fi
Power consumption by means of wi fiPower consumption by means of wi fi
Power consumption by means of wi fi
 
Digital thermometer ppt
Digital thermometer pptDigital thermometer ppt
Digital thermometer ppt
 
Microcontroller 8051
Microcontroller 8051Microcontroller 8051
Microcontroller 8051
 
Gps
Gps Gps
Gps
 
Basics of electronics
Basics of electronicsBasics of electronics
Basics of electronics
 
Mail server
Mail serverMail server
Mail server
 
C tutorial
C tutorialC tutorial
C tutorial
 
Dns
DnsDns
Dns
 
Raid
Raid Raid
Raid
 
Raid intro
Raid introRaid intro
Raid intro
 
SEO AND DIGITAL MARKETING
SEO AND DIGITAL MARKETINGSEO AND DIGITAL MARKETING
SEO AND DIGITAL MARKETING
 
Moisture controller report total
Moisture controller report totalMoisture controller report total
Moisture controller report total
 
Linux basics andng hosti
Linux basics andng hostiLinux basics andng hosti
Linux basics andng hosti
 

Dernier

Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Roomdivyansh0kumar0
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 

Dernier (20)

Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130  Available With RoomVIP Kolkata Call Girl Kestopur 👉 8250192130  Available With Room
VIP Kolkata Call Girl Kestopur 👉 8250192130 Available With Room
 
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 22 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 

Linux

  • 2. Linux Overview Its a elongated version of UNIX where UNIX is developed from a useless OS to Advance OS  Invented by LINUS , trying to make UNIX to have a free system that completely compatible with UNIX following the POSIK standards  It can be modified to the users need and can be developed too and work on embedded system  Many software engineers are using Linux for there extensional need which are not provided by the version of windows and Macintosh
  • 3. Linux versions Some Linux versions as • SUSE Linux • Ubuntu 1.0.10,Linux essential • Cent OS 5,6 essential • Fedora User,Desktop essential • Caldera open Linux • Slackware Linux
  • 4. Linux advantages and disadvantages Advantage of Linux  Its free of cost  Its portable to any hardware  Made to keep on running  Its secure and versatile  Its scalable  Has short debugging time Disadvantages of Linux  There are far too many distributions  Not very user friendly  Confusing for beginners  Changing versions  Frequent updated  Sometimes complicated
  • 5. Booting process  Booting is a process or set of operations that loads and hence starts the operating system starting from the point where the system is powered on  initially when the system is powered on a a relatively small program stored in read-only memory (ROM) along with a small amount of needed data, to access the nonvolatile device or devices from which the operating system programs and data can be loaded into RAM.  all the other devices are not activated so booting is the process which connect the hardware by launching a boot loader and connects to the operating system of the RAM
  • 6. Booting in windows  Turn on the power  CPU pins are reset and registers are set to specific values  CPU jumps to address of bios  Bios runs the post and necessary checks  Bios runs the jump to MBR(MASTER BOOT RECORD)  Primary boot loader runs from MBR and jumps to secondary boot loader  Secondary boot loader loads operation system
  • 7. Booting in Linux Booting in Linux is done by following steps  BIOS is set up it loads and perform some checks and gives control to MBR  MBR loads and it contains the info of the GRUB and executes it  GRUB loads the kernel and has knowledge of the file system and init images  KERNEL executes and runs /bin/init initial program of RAM disk  INIT initiates the run level by selecting mode of run level  RUN LEVEL runs and gives control to operating system
  • 8. Installation of Linux Cent OS 5  INSERT DISK-->POWER THE SYSTER ON--> RUN BIOS SETUP--> CHANGE BOOT PRIORITY TO DVD--> EXIT  Select the install or updated existing system option  Skip installation media checks  Click next on welcome window  Choose language  Choose keyboard formate  Select the instilation device type (basic or specific storage drive)  Specify host name if necessary 
  • 9. Partitioning , package selection and rebooting  Select network device and edit  Click on connect automatically or on DNV or enter manually  Select network setting and apply  Select time zone  Type the password which is to be the root password and confirm password and click next  Select partition of the system as needed or customize  Select the required package of software  installation will start once done click on reboot  Initialization is done now start using the system
  • 12. • /bin- Common programs, shared by the system, the system administrator and the users. • /boot- The startup files and the kernel, vmlinuz. In some recent distributions also grub data. Grub is the GRand Unified Boot loader and is an attempt to get rid of the many different boot-loaders we know today. • /dev - Contains references to all the CPU peripheral hardware, which are represented as files with special properties. • /etc - Most important system configuration files are in /etc • /home - Home directories of the common users
  • 13. • /initrd- (on some distributions) Information for booting. • /lib- Library files, includes files for all kinds of programs needed by the system and the users. • /lost+found- Files that were saved during failures are here. • /misc- For miscellaneous purposes. • /mnt - Standard mount point for external file systems, • /net - Standard mount point for entire remote file systems • /opt - contains extra and third party software.
  • 14. • /proc - containing information about system resources. • /root - The administrative user's home directory. • /sbin - Programs for use by the system and the system administrator. • /tmp - Temporary space for use by the system, cleaned upon reboot • /usr - Programs, libraries, documentation etc. for all user-related programs. • /var -Storage for all variable files and temporary files created by users, such as log files, the mail queue
  • 15. Linux File Permissions These read, write, and execute permissions are defined for: • user - the user that owners the file • group - users in the files group other - every other user There are also three other components when it comes to file mode bits, namely • the setuid bit • the setgid bit • the sticky bit.
  • 16. Read write execute The repeated rwx sequences represent the notion of read (r), write (w), and execute (x) permissions for user, group, and other (in that order). The possible file types • - = Regular File • d = Directory • l = Symbolic Link • b = Block Special Device • c = Character Device • s = Unix Socket (local domain socket) • p = Named Pipe
  • 17. Special modes Setuid - Set User ID When the setuid bit is set for a program, on execution the process's effective user ID gets set to that of the program file itself the lower case "s" where the "x" was. If however, the file didn't have the "x" permissions for the user, and then had the setuid bit set to S Setgid - Set Group ID When the setgid bit is set for a program, on execution the process's effective group ID gets set to that of the program file the setgid bit is shown as either an "S" or "s". Sticky Bit -When a directory has the sticky bit set, only root or the file's owner has permission to change files in that directory. The letter's "T" and "t" are used to indicate
  • 18. Permissions: Octal Representation • Permissions In Plain English Symbolic Octal • read,write,and execute rwx 7 • read and write rw- 6 • read and execute r-x 5 • read r-- 4 • write and execute -wx 3 • write -w- 2 • execute --x 1 • no permissions --- 0
  • 19. The command takes the general form:  chmod  MODE  file  There  are  two  ways  to  represent  the  MODE: (1) Using symbolic modes (letters to indicate the categories  and permission) (2)  Using  numeric  modes  (An  octal  (base  8)  number  that  represents the mode) In  order  to  change  the  permissions  of  a  file  using  symbolic  permissions, use the command format:  chmod SYMBOLIC/NUMERIC­MODE FILENAME Chmod (changing permission)
  • 20. NUMERICAL MODE • chmod 400 file To protect a file against accidental overwriting. • chmod 500 directory To protect yourself from accidentally removing, renaming or moving files from this directory. • chmod 600 file A private file only changeable by the user who entered this command. • chmod 644 file A publicly readable file that can only be changed by the issuing user. • chmod 660 file Users belonging to your group can change this file, others don't have any access to it at all. • chmod 700 file Protects a file against any access from other users, while the issuing user still has full access. • chmod 755 directory For files that should be readable and executable by others, but only changeable by the issuing user. • chmod 775 file Standard file sharing mode for a group. •
  • 21. SYMBOLIC MODE • chmod a=rwx filename the a means all and rwx means set read,write, and execute. chmod ugo=rwx filename or chmod ugo+=rwx filenameRegarding just the symbolic mode part of the command, here are a few more examples: • To add read permission for all:a+r To remove permissions for all:a-r • To add execute permissions for all:a+x To remove execute permissions for all:a-x • To remove execute permissions from group and other (i.e from all users except the file's owner): go-x To remove permissions to do anything from all users except the owner: go= • The setuid bit can be set using: u+s The setuid bit can be removed using: u-s • setgid can be set using: g+s and removed using: g-s • The sticky bit can be set by using: +t and removed using: -t
  • 22. • To assign read, write permissions only for user and group:ug=rw • To add read, write permissions to user and group to the permissions that already exist:ug+=rw • To remove execute permissions from group and other (i.e from all users except the file's owner):go-x • To remove permissions for all: a-r To add execute permissions for all: a+x remove execute permissions for all: a-x • To assign read, write permissions only for user and group: ug=rw To add read, write permissions to user and group to the permissions that already exist: ug+=rw To add read, write permissions to user and group to the permissions that already exist: ug+=rw • To remove execute permissions from group and other (i.e from all users except the file's owner): go-x To remove permissions to do anything from all users except the owner: go= • The setuid bit can be set using: u+S The setuid bit can be removed using: u-s • setgid can be set using: g+s removed using: g-s • set by using: +t removed using: -t
  • 23. UNMASK • octal numbers are preceded by a 0 (in the same way hex would be preceded by 0x), so the umask value itself is actually 002. • This value is an octal (base 8, digits 0-7) value which is subtracted from a base value of 777 for directories, or subtracted from a base value of 666 for files. • A umask of 002 basically means don't remove any permissions from the base value for "user" or "group", but "other" is not allowed write permission (write permission is octal 2, or binary 010 meaning -w-).
  • 24. Chown and Chgrp command • The chown command can be applied to change both user and group ownership of a file, while chgrp only changes group ownership. Of course the system will check if the user issuing one of these commands has sufficient permissions on the file(s) she wants to change. • In order to only change the user ownership of a file, use this syntax: chown/chgrp newuser file
  • 25. Commands till now • bash ­GNU shell program. • cat file(s)­Send content of file(s) to standard output. • cd directory or root­ Enter directory or cd is a bash built­ in command. • chgrp newgroup file(s)­ Change the group ownership of  file(s) to newgroup • chmod mode file(s)­ Change access permissions on  file(s) • chown newowner[:[newgroup]] file(s)­  Change file  owner and group ownership. • df file­Reports on used disk space on the partition  containing file.
  • 26. • fdisk­to know hard disk size • echo string­Display a line of text export Part of bash that  announces variables and their values to the system. • find  path  expression­find  files  in  the  file  system  hierarchy • locate searchstring­Print all accessible files matching the  search pattern. • ls file(s)­Prints directory content. • man  command­Format  and  display  online  (system)  manual pages for command. • Pwd ­Print the present or current working directory. • umask [value] ­Show or change new file creation mode.