Professional Documents
Culture Documents
INTRODUCTION TO LINUX
~~Group
Discussion~~
Earn points…
Simple commands
Command options
Command arguments
Command history
o Enter your login name and password (both are case sensitive)
Systems (eg servers) which do not run a graphical desktop will present a
command line login
Please:
o Log out
– For a multiuser system, every user should have its own right to access files
and directories
Device drivers
– Interfaces between the kernel and the BIOS
– Different device has different driver
Normal files
o A set of contiguous data identified by a name.
o Includes text files, graphics files, executable programs( c++ file etc;
Directories
o Directories contain named 'links' to other files
Symbolic Links
o References to files located at other points in the file system
o Allow a single file to be referenced using multiple names
o Symbolic links can be opened like regular files, but the operation is
automatically redirected to the file that the link points to.
o Case sensitive
Some characters have special meaning to the shell. They are awkward
to work with in file names and are best avoided:
o Recommend use only upper and lower case letters, digits, and '_'
o Similar to \ in DOS
Note that the open source community does not always follow this
guideline. When applications are installed by compiling from source
code, the default installation directory is usually /usr/local
o This can be changed using command line options when the application is
installed
o The /proc file system contains a illusionary file system. It does not
exist on a disk. Instead, the kernel creates it in memory.
o Subdirectories include:
o ext2
o ext3
o Extension of ext2.
o Much faster to check file system consistency after a crash
Can choose file system types at installation time
$ ls -l /home/tux/reports/July_Conf
o What happens?
5.Use the su command to switch to a super user shell
7.Do a long listing of sample and verify the ownership and group.
Forces removal of
kurt's home directory
2. Create two new users with user names catbert and dogbert and UIDs 610
and 611 respectively. Their home directories should be created as
/new1/catbert and /new1/dogbert and should be populated with initial
configuration files from /etc/skel. Their primary group should be
hacker and they should both have secondary membership of the groups
audio and video
3. Set passwords for these two accounts. Make sure you remember them!
4. Examine the /etc/group and /etc/passwd files and verify that the entries
for the hacker group and the catbert and dogbert accounts are as you
expect.
By time sharing
running A B A B A B C A B C A C A B
Time
C Executes
B Sleeps
B Awakes
C Terminates
B B
sleep
Advantages:
Disadvantages:
Command Description
vi filename Creates a new file if it already does not exist,
otherwise opens existing file.
vi -R filename Opens an existing file in read only mode.
view filename Opens an existing file in read only mode.
Following is the example to create a new file testfile if it already does not exist
in the current working directory:
$vi testfile
As a result you would see a screen something like as follows −
|
~
~
Command Description
>> Shifts the current line to the right by one shift width.