Suse Fundamentals
Suse Fundamentals
Fundamentals
COU RSE 3071
Part # 100-005096-001
Version 2
w w w. n o v e l l . c o m
Proprietary Statement
Trademarks
Disclaimer
Novell, Inc. makes no representations or warranties with respect to
the contents or use of this manual, and specifically disclaims any
express or implied warranties of merchantability or fitness for any
particular purpose.
Further, Novell, Inc. reserves the right to revise this publication and
to make changes in its content at any time, without obligation to
notify any person or entity of such revisions or changes.
Further, Novell, Inc. makes no representations or warranties with
respect to any NetWare software, and specifically disclaims any
express or implied warranties of merchantability or fitness for any
particular purpose.
Further, Novell, Inc. reserves the right to make changes to any and
all parts of NetWare software at any time, without obligation to
notify any person or entity of such changes.
This Novell Training Manual is published solely to instruct students
in the use of Novell networking software. Although third-party
application software packages are used in Novell training courses,
this is for demonstration purposes only and shall not constitute an
endorsement of any of these software applications.
Further, Novell, Inc. does not represent itself as having any
particular expertise in these application software packages and any
use by students of the same shall be done at the students own risk.
Software Piracy
Throughout the world, unauthorized duplication of software is
subject to both criminal and civil penalties.
If you know of illegal copying of software, contact your local
Software Antipiracy Hotline.
For the Hotline number for your area, access Novells World Wide
Web page at http://www.novell.com and look for the piracy page
under Programs.
Or, contact Novells anti-piracy headquarters in the U.S. at 800PIRATES (747-2837) or 801-861-7101.
Other Trademarks
Adaptec is a registered trademark of Adaptec, Inc. AMD is a
trademark of Advanced Micro Devices. AppleShare and AppleTalk
are registered trademarks of Apple Computer, Inc. ARCserv is a
registered trademark of Cheyenne Software, Inc. Btrieve is a
registered trademark of Pervasive Software, Inc. EtherTalk is a
registered trademark of Apple Computer, Inc. Java is a trademark or
registered trademark of Sun Microsystems, Inc. in the United States
and other countries. Linux is a registered trademark of Linus
Torvalds. LocalTalk is a registered trademark of Apple Computer,
Inc. Lotus Notes is a registered trademark of Lotus Development
Corporation. Macintosh is a registered trademark of Apple
Computer, Inc. Netscape Communicator is a trademark of Netscape
Communications Corporation. Netscape Navigator is a registered
trademark of Netscape Communications Corporation. Pentium is a
registered trademark of Intel Corporation. Solaris is a registered
trademark of Sun Microsystems, Inc. The Norton AntiVirus is a
trademark of Symantec Corporation. TokenTalk is a registered
trademark of Apple Computer, Inc. Tru64 is a trademark of Digital
Equipment Corp. UnitedLinux is a registered trademark of
UnitedLinux. UNIX is a registered trademark of the Open Group.
WebSphere is a trademark of International Business Machines
Corporation. Windows and Windows NT are registered trademarks
of Microsoft Corporation.
All other third-party trademarks are the property of their respective
owners.
Contents
Contents
Introduction
Course Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intro-2
Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intro-2
Certification and Prerequisites. . . . . . . . . . . . . . . . . . . . . . . Intro-3
SUSE Linux Enterprise Server 10 Support and
Maintenance. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intro-5
Novell Customer Center . . . . . . . . . . . . . . . . . . . . . . . . . . . Intro-6
SUSE Linux Enterprise Server 10 Online Resources . . . . . Intro-7
Agenda . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intro-8
Scenario . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intro-9
Exercise Conventions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . Intro-10
SECTION 1
Objective 1
Objective 2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
TOC-1
Objective 3
1-11
1-13
1-15
1-22
1-34
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-35
SECTION 2
Objective 1
Objective 2
Objective 3
2-6
2-9
2-11
2-12
2-15
2-20
2-21
2-23
TOC-2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Contents
SECTION 3
Objective 1
Objective 2
Objective 3
Objective 4
Objective 5
SECTION 4
Objective 1
Objective 2
Objective 3
Objective 4
Version 2
4-12
4-13
4-13
4-14
4-15
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
TOC-3
Objective 5
SECTION 5
Objective 1
TOC-4
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Contents
Objective 2
Objective 3
5-27
5-27
5-28
5-28
5-28
5-28
Objective 4
Objective 5
5-33
5-34
5-34
5-35
5-37
Version 2
5-29
5-30
5-31
5-32
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-38
5-41
5-42
5-43
5-44
5-46
5-47
5-50
TOC-5
Objective 6
Objective 7
5-52
5-54
5-57
5-59
5-60
5-61
5-62
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5-68
SECTION 6
Objective 1
Objective 2
Objective 3
TOC-6
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Contents
Objective 4
Objective 5
6-14
6-17
6-18
6-20
SECTION 7
Objective 1
Objective 2
7-5
7-5
7-6
7-9
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-10
SECTION 8
Objective 1
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
TOC-7
Objective 2
Objective 3
Manage User and Group Accounts from the Command Line . 8-28
Manage User Accounts from the Command Line . . . . . . . . .
Manage Groups from the Command Line . . . . . . . . . . . . . . .
Create Text Login Messages . . . . . . . . . . . . . . . . . . . . . . . . .
Exercise 8-3 Create and Manage Users and Groups from the
Command Line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Objective 4
8-37
Objective 5
8-28
8-34
8-36
8-38
8-41
8-43
8-45
8-46
8-48
Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8-55
APPENDIX A
Objective 1
TOC-8
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Contents
Objective 2
Log in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-5
Objective 3
Objective 4
Objective 5
A-10
A-10
A-12
A-13
Objective 6
APPENDIX B
Index
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
TOC-9
TOC-10
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Introduction
Introduction
x
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Intro-1
Course Objectives
This course teaches you the following concepts and skills
fundamental to understanding SUSE Linux Enterprise Server 10:
Audience
While the primary audience for this course are administrators who
are interested in Linux, certification candidates with experience in
other operating systems can also use this course to begin preparing
for the Novell CLP 10 Practicum.
Intro-2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Introduction
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Intro-3
Intro-4
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Introduction
For more information about Novell certification programs and taking the
Novell CLP 10 Practicum, see http://www.novell.com/training/certinfo,
http://www.novell.com/training/certinfo/clp10, and
http://www.novell.com/training/certinfo/cle10.
You can obtain your free 30-day support and maintenance code at
http://www.novell.com/products/linuxenterpriseserver/eval.html.
Version 2
You will need to have or create a Novell login account to access the 30-day
evaluation.
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Intro-5
Intro-6
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Introduction
http://www.novell.com/products/linuxenterpriseserver/
This is the Novell home page for SUSE Linux Enterprise Server
10.
http://www.novell.com/documentation/sles10/index.html
This is the Novell Documentation web site for SUSE Linux
Enterprise Server 10.
http://support.novell.com/linux/
This is the home page for all Novell Linux support, and
includes links to support options such as the Knowledgebase,
downloads, and FAQs.
http://www.novell.com/coolsolutions
This Novell web site provides the latest implementation
guidelines and suggestions from Novell on a variety of
products, including SUSE Linux.
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Intro-7
Agenda
The following is the agenda for this 3-day course:
Table Intro-1
Day 1
Day 2
Day 3
Intro-8
Section
Duration
Introduction
00:30
01:30
01:30
02:30
05:00
02:30
00:30
03:00
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Introduction
Scenario
You are system administrator for your Digital Airlines office. The
management is considering migration of some network services to
SUSE Linux Enterprise Server 10 servers.
As system administrator, you decide to do the following:
Learn how to get help for all problems you might have.
Once you complete this training, you will be able to install SUSE
Linux Enterprise Server 10 and set up a system for further tests.
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Intro-9
Exercise Conventions
When working through an exercise, you will see conventions that
indicate information you need to enter that is specific to your server.
The following describes the most common conventions:
Enter and Type. The words enter and type have distinct
meanings.
The word enter means to type text in a field or at a command
line and press the Enter key when necessary. The word type
means to type text without pressing the Enter key.
If you are directed to type a value, make sure you do not press
the Enter key or you might activate a process that you are not
ready to start.
Intro-10
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
SECTION 1
Objectives
Version 2
1.
2.
3.
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
1-1
Objective 1
1-2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
1-3
Intel/AMD: 32 bit
Intel/AMD: 64 bit
SPARC (Sun)
IBM pSeries
Embedded
1-4
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
1-5
Linus Torvalds made the source code of his Linux kernel available
with the GPL (GNU General Public License). The GPL allows
everyone to read and edit the source code. The GPL license also
requires any edited source code to be made available to the public.
Linux rapidly developed into a project involving many people,
although the development of the system's core (Linux kernel) is still
coordinated by Linus Torvalds. All kernel modifications are
integrated by him.
The functions of the kernel include input and output control, device
control, process management, and file management. Other system
components (shell utilities, network programs, and implementations
of the kernel for non-Intel processors) are looked after by other
people or groups.
1-6
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
1-7
Objective 2
1-8
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Process A has received access to Res.1 and would now also like
access to Res.2. In the meantime, however, B has already
gained access to Res.2 and, in turn, would like access to Res.1
as well.
If these two processes wait until what they need is available,
nothing more will happen-they are deadlocked.
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
1-9
1-10
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Objective 3
Installation Options
Basic Installation
Configuration
256 MB RAM
512 MB to 3 GB RAM
Network interface
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
1-11
x
1-12
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Installation Options
When you boot your computer from the installation DVD, the
following welcome screen appears:
Figure 1-3
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
1-13
1-14
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Basic Installation
At the beginning, YaST asks you for the language to be used during
the installation process.
Figure 1-4
If you selected a language in the boot menu by pressing F2, this dialog does
not appear.
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
1-15
Before you can install SUSE Linux Enterprise Server 10, you must
read and accept the following Novell Software License Agreement
by selecting Yes, I Agree to the Licence Agreement and Next.
Figure 1-5
1-16
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
1-17
After selecting Next, you have to select the time zone you are living
in and the time zone your hardware clock is set to.
Figure 1-7
Select Next.
1-18
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
1-19
The Expert tab also includes these three sections and some more:
Booting. Lets you install and configure the GRUB boot loader.
1-20
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
1-21
Configuration
During the configuration phase of the installation, you configure the
following:
Root Password
Network Devices
Services
Users
Hardware
Root Password
1-22
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
1-23
Network Devices
Network Interfaces
DSL Connections
ISDN Adapters
Modems
1-24
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
At the top of the list, there are two more items concerning network
shown:
At the bottom of the list, there are two more items concerning
network shown:
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
1-25
1-26
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Services
In the next dialog you can configure two very important services:
Figure 1-15
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
1-27
Users
1-28
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
We will not use LDAP authentication in this course. The topic is covered in
SUSE Linux Enterprise Server 10: Networking Services (Course 3074). In
this course, only the local authentication is explained.
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
1-29
1-30
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
1-31
Hardware
Graphics Cards
Printers
Sound
YaST configures the graphics card and the sound card automatically.
YaST also detects local printers automatically. Confirm the settings
and write them to the system by selecting Next.
1-32
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
The last dialog tells you that the installation was successful.
Figure 1-20
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
1-33
Exercise 1-1
1-34
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Summary
Objective
Summary
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
1-35
Objective
Summary
Environment
Basic installation
Configuration
1-36
Installation
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
SECTION 2
Objectives
Version 2
1.
2.
3.
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
2-1
Introduction
You cannot install Windows without its graphical user interface
(GUI). In Linux, the GUI is a normal application that you can
choose whether or not to install.
Most services in Linux can be configured by editing an ASCII text
file, so you do not need a GUI if you want your computer to act
only as a server.
Not installing a graphical user interface has the following
advantages:
2-2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Objective 1
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
2-3
The communication between X server and X client uses the network protocol
TCP/IPeven if the server and client run on the same computer.
2-4
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
2-5
Objective 2
Log in
Log in
If computer users want to work with a multiuser-capable operating
system, they must first identify themselves to the operating system.
For this purpose, they need
2-6
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
When the computer is booted and ready for work, the following
login dialog appears:
Figure 2-2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
2-7
2-8
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
At the right side of the Computer menu, select the Log Out entry.
After selecting Log Out, a confirmation dialog appears.
Figure 2-5
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
2-9
If you are at the login screen, there are four options availabe in the
lower left corner:
Only root is allowed to reboot the system. So you have to enter the root
password.
If you switch the machine off too soon, this could possibly lead
to loss of data.
x
2-10
You should always shut down your computer before you turn it off.
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Exercise 2-1
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
2-11
There is a menu at the left side of the panel. This menu is labeled
Computer. It is called the main menu.
The empty space in the middle of the panel includes the task
manager. All opened windows on the screen will be listed here.
At the right of the panel there are some more items. Which icons are
available depends from your hardware:
2-12
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
At the top of the left frame there is a pull-down menu showing three
different filters:
Version 2
Favorite Applications
Recent Documents
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
2-13
The right frame of the application browser shows a list of the most
important installed applications. The applications are grouped and
you can see a list of the groups in the left frame. Select a group to
see only the applications that belong to this group.
The filter option adds even more flexibility. Enter a part of the name
of the application you want to start in the Filter textbox in the left
frame. The filtered applications are shown immediately in the right
frame.
2-14
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
In the right frame of the main menu, there are five system options:
At the bottom of the right frame you can see the status of your hard
drives and network.
To start an application select the icon in the main menu or the
application browser with a single mouse click.
Version 2
Desktop
Panel
Main Menu
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
2-15
Desktop
At the top of the pop-up menu there are three entries to create a new
item:
Figure 2-10
2-16
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Figure 2-11
Version 2
Type. You can create launchers for different file types (e.g.,
application, directory, link, device) using this dialog.
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
2-17
Figure 2-12
Panel
2-18
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Main Menu
Only the user root is allowed to add a new entry to a menu. Normal
users are only allowed to declare favorite applications. Therefore do
the following:
1.
Version 2
2.
3.
Select an application item in the right frame with the right mouse
botton.
4.
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
2-19
Exercise 2-2
2-20
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
2-21
At the top of the side panel there is a menu where you can select the
content of the side panel:
Tree. Shows the file system tree and the tree of the home
directory.
Figure 2-16
2-22
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Exercise 2-3
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
2-23
Objective 3
da51 login:
From here you can enter your login name and password. To logout
enter exit.
2-24
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
The terminal appears inside a window with options you can select to
modify the display of the terminal (such as font and background
color).
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
2-25
Exercise 2-4
2-26
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Summary
Objective
Summary
Environment
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
2-27
2-28
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
SECTION 3
Objectives
Version 2
1.
2.
3.
4.
5.
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
3-1
Objective 1
Command
Terminal in X Window
Command Line
yast2
Qt
ncurses
yast
ncurses
ncurses
In the graphical interface, you can control YaST with the mouse. To
start it, select YaST from the main menu (application group:
System). You are asked to enter the root password.
Figure 3-1
3-2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
You control the ncurses interface with the keyboard. To start the
ncurses interface of YaST, you can start a terminal emulation from
your GNOME desktop by selecting Gnome Terminal from the
main menu (application group: System).
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
3-3
Press Tab to move from one box to another or to the text buttons. To
go back to the previous box, press Shift+Tab. Use the arrow keys to
navigate within the box. Mark highlighted menu items by pressing
the Spacebar.
To select a menu item, press Enter. You can often press Alt and the
highlighted letter to access an item directly.
Except for the controls and the appearance, the graphical mode and
the text mode of YaST are identical.
You can list the available YaST modules with the yast -l or yast
--list command. To start an individual module, specify its name. For
example, you can enter the following to start the software
installation module:
yast sw_single
3-4
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
You can enter the software module name with the yast or yast2
command, as in the following:
To install a software package you can also enter yast -i package.rpm. The
package is installed directly without any dialogs.
yast --help
yast -h
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
3-5
Exercise 3-1
3-6
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Objective 2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
3-7
3-8
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Objective 3
Figure 3-4
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
3-9
Using the traditional method, the next dialog shows the detected
network cards.
Figure 3-5
3-10
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
From this dialog, you enter details of the interface to configure such
as Network Device Type (Ethernet) and Configuration Name (0).
Under Kernel Module, enter the name of the module to load. You
can select the card model from a list of network cards.
Some kernel modules can be configured more precisely by adding
options or parameters for the kernel. Details about parameters for
specific modules can be found in the kernel documentation.
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
3-11
From this dialog you enter the following information to integrate the
network device into an existing network:
3-12
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Figure 3-8
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
3-13
3-14
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
3-15
3-16
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
Internal Zone
Demilitarized Zone
External Zone
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
3-17
Manually.
Never.
After you save the configuration with YaST, the ethernet card
should be available in the computer. You can verify this with the ip
command, as shown in the following:
da51:~ # ip address show
1: lo: <LOOPBACK,UP> mtu 16436 qdisc noqueue
link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00
inet 127.0.0.1/8 brd 127.255.255.255 scope host lo
inet6 ::1/128 scope host
2: eth0: <BROADCAST,MULTICAST,UP> mtu 1500 qdisc pfifo_fast
qlen 100
link/ether 00:e0:7d:9e:02:e8 brd ff:ff:ff:ff:ff:ff
inet 10.0.0.51/24 brd 10.0.0.255 scope global eth0
inet6 fec0::1:200:1cff:feb5:6516/64 scope site dynamic
valid_lft 2591994sec preferred_lft 604794sec
inet6 fe80::200:1cff:feb5:6516/10 scope link
3: sit0@NONE: <NOARP> mtu 1480 qdisc noop
link/sit 0.0.0.0 brd 0.0.0.0
3-18
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
3-19
Exercise 3-2
3-20
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Objective 4
Figure 3-12
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
3-21
To help you find the software you want to install, you can choose
from different filters listed in the drop-down list in the top left
corner of the window labeled Filter. The following filters are
available:
Search. Lets you enter a search term and where you want YaST
to search for the software package.
To find a package, select the Search filter, enter the package name
or parts of the package name or some keywords in the Search field;
then select Search.
3-22
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
The matched packages are listed in the right area. The installation
state is shown by a small symbol in front of the package name. The
most commonly displayed symbols include the following:
Figure 3-13
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
3-23
Objective 5
Figure 3-14
To add a new source, select the Add drop-down list and select the
type of installation source. Depending on the type of source, you
might have to provide additional information (such as the IP address
of an installation server).
To edit the configuration of an existing installation source, select the
source in the list and select Edit.
3-24
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
3-25
Exercise 3-3
3-26
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Summary
Objective
Summary
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
3-27
Objective
Summary
Static IP address
Network mask
Host name
Name server
Routing (gateway)
3-28
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
Objective
Summary
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
3-29
3-30
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
SECTION 4
Objectives
Version 2
1.
2.
3.
4.
5.
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
4-1
Objective 1
If the English man pages are not shown automatically with the man
command, you can display the English version of the man page by
using the variable LANG=en_EN.
For example, to display the English version of the man page for the
man command, enter the following:
geeko@da51:~ > LANG=en_EN man man
4-2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
The following is the first page of the manual pages for the man
command:
man(1)
man(1)
NAME
man an interface to the on-line reference manuals
SYNOPSIS
man [-c|-w|-tZT device] [-adhu7V] [-m system[,...]] [-L
locale] [-p string] [-M path] [-P pager] [-r prompt] [-S
list] [-e extension] [[section] page ...] ...
man -l [-7] [-tZT device] [-p string] [-P pager] [-r
prompt] file ...
man -k [apropos options] regexp ...
man -f [whatis options] page ...
DESCRIPTION
man is the system's manual pager. Each page
argument given to man is normally the name of
a program, utility or function. The manual
page associated with each of these arguments
is then found and displayed. A section, if
provided, will direct man to look only in that
section of the manual. The default action
is to search in all of the available sections,
following a pre-defined order and to show
only the first page found, even if page exists
in several sections.
The header of each manual page contains the command name at the
left and right sides and the section number to which the manual
page belongs. In the center of the header is the name of the section.
The last line usually contains the date of the last changes.
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
4-3
Part
Contents
NAME
SYNOPSIS
DESCRIPTION
OPTIONS
COMMANDS
FILES
SEE ALSO
DIAGNOSTICS
EXAMPLES
BUGS
4-4
Key Command
Description
Space
PageDown
PageUp
Down-arrow, Enter
Up-arrow
End
Home
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Key Command
Description
/expression
?expression
Version 2
Section
Contents
System calls
Device files
Games
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
4-5
4-6
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Manual pages whose output is marked with p are POSIX manual pages of
the uname command (uname (1p)) and the function (uname (3p)). POSIX
(Portable Operating System Interface for UniX) was developed from the
IEEE and the Open Group for Unix as standarized interface between
application and operating system.
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
4-7
Exercise 4-1
4-8
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Objective 2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
4-9
The following are the most commonly used key commands for the
command info:
Table 4-4
4-10
Key Command
Description
Space, PageDown
Backspace, PageUp
Tab
Enter
Display help.
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Exercise 4-2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
4-11
Objective 3
Release Notes
Manuals
Howtos
Release Notes
When you complete the installation of SUSE Linux Enterprise
Server, the release notes appear in a window.
Figure 4-1
4-12
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
If you want to access these release notes later, you can find them in
the directory:
/usr/share/doc/release-notes/
SUSE_Linux_Enterprise_Server_10/
There are two release note files available:
RELEASE-NOTES.en.html
RELEASE-NOTES.en.rtf
Manuals
The administration manual is also installed during the installation of
SUSE Linux Enterprise Server 10.
In /usr/share/doc/manual/sles-admin_en/ there is a PDF version
of the manual.
If you prefer HTML, an HTML version is available in the html/
subfolder.
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
4-13
Howtos
You can find additional information (including background
material) in the howtos. There is a howto for almost every
imaginable topic in Linux.
On SUSE Linux Enterprise Server 10 the howtos are not installed
by default, but you can install them manually later.
The howtos are also available in different formats, such as ASCII,
PostScript, and HTML. In addition, many of the howtos have been
translated into various languages.
SUSE Linux Enterprise Server installation media contain a large
number of howtos. The howtos of the Linux Documentation Project
(TLDP) in HTML format are installed in the
/usr/share/doc/howto/en/html/ directory.
You can also install the howtos in ASCII format (package howto,
ASCII format). After installation, you can find them in the
/usr/share/doc/howto/en/txt/ directory.
You can find a list of all current howtos (together with available
translations) at http://www.tldp.org/.
4-14
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Exercise 4-3
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
4-15
Objective 4
Figure 4-2
4-16
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Objective 5
http://www.novell.com/linux/
http://www.tldp.org
To find other sources of information, you can use a search web site
such as Google. Google offers a special search web site for
questions about Linux at www.google.com/linux.
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
4-17
Exercise 4-4
4-18
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Summary
Objective
Summary
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
4-19
Objective
Summary
Papers
/usr/share/doc/release-notes/
In /usr/share/doc/manual/
sles-admin_en/ there is a PDF
and an HTML version of the
administrator manual available.
Howtos are not available after the
installation of the SUSE Linux
Enterprise Server 10. If you install
them manually, you can find them
in the following directory:
/usr/share/doc/howto/en/
For most installed packages, there
are help files available in the
following directory:
/usr/share/doc/packages/
package-name
4. Use GUI-Based Help
4-20
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Objective
Summary
Version 2
http://www.novell.com/linux/suse
http://www.tldp.org
http://www.cert.org
http://www.securityfocus.com
http://www.kernel.org
http://www.google.com/linux
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
4-21
4-22
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
SECTION 5
In this section, you learn about the structure of the Linux file system
and the most important file operation commands for working at the
command line.
Objectives
Version 2
1.
2.
3.
4.
5.
6.
7.
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-1
Objective 1
5-2
Root Directory /
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
Libraries (/lib)
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-3
5-4
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
The absolute path always begins with a slash (/), the symbol for
the root directory.
Figure 5-2
In this figure the current position in the file system is geekos home
directory. To change into the /etc directory, you can use the
following commands:
absolute: cd /etc
relative: cd ../../etc
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-5
Root Directory /
The root directory refers to the highest layer of the file system tree.
Normally only directories (not files) are located here. When the
system is booted, the partition on which this directory is located is
the first one mounted.
As the kernel cannot fulfill all the tasks of the operating system, all
programs that are run at system start must be available on this
partition (they cannot be located on another partition).
The following directories always have to be on the same partition as
the root directory: /bin, /dev, /etc, /lib, and /sbin.
5-6
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
File
Description
/bin/bash
/bin/cat
Displaying files
/bin/cp
Copying files
/bin/dd
/bin/gzip
Compressing files
/bin/mount
/bin/rm
Deleting files
/bin/vi
vi editor
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-7
5-8
/data1
/data2
...
/dataX
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
In this example, the major device number 3 is listed for all files.
This refers to the driver for IDE hard drives. The minor device
numbers run from 1 to 15 (for SCSI hard drives) and up to 63 (for
IDE hard drives) and refer to the various possible partitions.
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-9
5-10
Device
Device File
Description
Terminals
/dev/console
/dev/tty1
Serial ports
/dev/ttyS0
/dev/ttyS*
Parallel ports
/dev/lp0
/dev/lp*
/dev/fd0
/dev/fd*
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
Device
Device File
Description
/dev/hda
/dev/hdc
/dev/hd*
/dev/hd*
/dev/sda
/dev/sda*
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-11
Device
Device File
Description
/dev/sda
/dev/sda*
/dev/scd0
/dev/scd*
5-12
File
Description
/etc/SuSE-release
/etc/inittab
/etc/init.d/*
/etc/modprobe.conf
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
File
Description
/etc/DIR_COLORS
/etc/X11/xorg.conf
/etc/fstab
/etc/profile
/etc/passwd
/etc/shadow
/etc/group
/etc/cups/*
/etc/hosts
/etc/motd
/etc/issue
/etc/sysconfig/*
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-13
File
Description
.profile
.bashrc
.bash_history
If there are no special settings, the home directories of all users are
located beneath the /home directory. The home directory of a user
can also be addressed via the short cut ~, so ~/.bashrc refers to the
.bashrc file in the user's home directory.
In many cases, the /home directory is located on a different partition
or can even be located on a different computer (with central
administration of home directories).
5-14
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Libraries (/lib)
Many programs use specific functions that are also used by other
programs. Such standard functions are removed from the actual
program, stored in the system, and only called up when the program
runs. They are called shared libraries.
The /lib directory contains the libraries that are used by programs in
the /bin and /sbin directories. The kernel modules (hardware drivers
not compiled into the kernel) are located in the /lib/modules/
directory.
You can find additional libraries below the /usr directory.
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-15
File
Description
/sbin/SuSEconfig
/sbin/conf.d/*
5-16
/sbin/yast
/sbin/fdisk
Modifies partitions.
/sbin/fsck*
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
File
Description
/sbin/init
/sbin/mkfs*
/sbin/shutdown
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-17
5-18
Directory
Description
/usr/X11R6/
/usr/bin/
/usr/lib/
Libraries
/usr/local/
/usr/sbin/
/usr/share/doc/
Documentation
/usr/share/man/
/usr/src/
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Directory
Description
/var/lib/
/var/log/
/var/run/
/var/spool/
/var/lock/
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-19
5-20
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
Apr
Mar
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
Apr
5 17:28 .
30 15:09 ..
5 17:36 attr
5 17:36 auxv
5 17:28 cmdline
5 17:36 cwd -> /
5 17:36 delay
5 17:36 environ
5 17:28 exe -> /sbin/init
5 17:36 fd
5 17:36 map_base
5 17:36 maps
5 17:36 mem
5 17:36 mounts
5 17:36 root -> /
5 17:28 stat
5 17:36 statm
5 17:36 status
5 17:36 task
5 17:36 wchan
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
The contents of the files can be viewed with the cat command,
which shows the status of the process, as in the following:
da51:~ # cat /proc/1/status
Name: init
State: S (sleeping)
SleepAVG:
26%
Tgid: 1
Pid: 1
PPid: 0
TracerPid:
0
Uid: 0
0
0
0
Gid: 0
0
0
0
FDSize: 32
Groups:
VmSize:
588 kB
VmLck:
0 kB
VmRSS:
108 kB
VmData:
136 kB
VmStk:
8 kB
VmExe:
432 kB
VmLib:
0 kB
Threads:
1
SigPnd: 0000000000000000
ShdPnd: 0000000000000000
SigBlk: 0000000000000000
SigIgn: ffffffffd770d8fc
SigCgt: 00000000288b2603
CapInh: 0000000000000000
CapPrm: 00000000ffffffff
CapEff: 00000000fffffeff
da51:~ #
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-21
File
Description
/proc/cpuinfo
/proc/dma
/proc/interrupts
/proc/ioports
/proc/filesystems
/proc/modules
Active modules
/proc/mounts
/proc/net/*
/proc/partitions
Existing partitions
/proc/bus/pci
/proc/bus/scsi/
/proc/sys/*
/proc/version
Kernel version
5-22
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
All files on this partition can now be reached via the /mnt directory.
To remove this partition again, you use the umount command:
da51:~ # umount /mnt
If you do not include any options with the mount command, the
program tries out several file system formats. If you want to specify
a specific file system, use the option -t.
If the file system format is not supported by the kernel, the
command is aborted, and you receive an error message. In this case,
you must compile a new kernel that supports the file system format.
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-23
5-24
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Directory
Description
/home
Home directories
/opt
Applications
/usr
Version 2
Directory
Description
/bin
Important programs
/boot
/dev
Device files
/etc
Configuration files
/lib
Libraries
/sbin
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-25
Exercise 5-1
5-26
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Objective 2
Normal Files
Directories
Device Files
Links
Sockets
FIFOs
Normal Files
Normal files refer to files as they are also known in other operating
systems: a set of contiguous data addressed with one name. This
includes all the files normally expected under this term (ASCII
texts, executable programs, graphics files, etc.).
The names for such files can be freely chosen and there is no
division into file name and file type (such as report.txt).
A number of file names still retain this structure, but these are
requirements of the corresponding applications, such as a word
processing program or a compiler.
Directories
Directories contain two entries with which the structure of the
hierarchical file system is implemented.
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-27
One of these entries (.) points to the directory itself. The other
entry (..) points to the entry one level higher in the hierarchy.
Device Files
Each piece of hardware in a Linux system is represented by a device
file. These files represent links between the hardware components
or the device drivers in the kernel and the applications.
Every program that wants to access hardware must access it through
the corresponding device file. The programs write to or read from a
device file. The kernel then ensures that the data finds its way to the
hardware or can be read from the file.
Links
Links are references to files located at other points in the file
system. Data maintenance is simplified through the use of such
links. Changes only need to be made to the original file. The
changes are then automatically valid for all links.
Sockets
A socket refers to a special file with which data exchange between
two locally running processes can be implemented through the file
system.
FIFOs
FIFO (first in first out) or named pipe is a term used for files used to
exchange data between processes. However, the file can only
exchange data in one direction.
5-28
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Objective 3
cd
ls
pwd
cd
You can use the cd command (change directory) to change between
directories. Some examples include the following:
Table 5-11
Version 2
Command
Meaning
cd plan
cd /etc
cd
cd ..
cd ../..
cd -
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-29
ls
The ls command (list) lists the specified files. If a directory is
included with ls, the directory's contents are displayed. Without an
option, the contents of the current directory are listed.
The following are the most important options you can use with ls:
Table 5-12
5-30
Option
Meaning
None
-a
-F
-l
-t
-R
-u
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
pwd
You can use the pwd command (print working directory) to display
the path of the current directory. If you enter pwd with the -P
option, pwd prints the physical directory without any symbolic
links:
geeko@da51:~ > ls -l doc/
lrwxrwxrwx 1 geeko users
/usr/share/doc/
geeko@da51:~ > cd doc/
geeko@da51:~ > pwd
/home/geeko/doc
geeko@da51:~ > pwd -P
/usr/share/doc
geeko@da51:~ >
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-31
Exercise 5-2
5-32
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Objective 4
Command
Description
-a
-m
-r file
-t time
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-33
5-34
Keystroke
Description
Spacebar
Down arrow
Up arrow
/pattern
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Keystroke
Description
?pattern
Quit.
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-35
5-36
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Exercise 5-3
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-37
Objective 5
Create Directories
Link Files
You can use the mv command (move) to move one or more files to
another directory, as in the following:
mv *.txt /tmp
You can also use the mv command to rename a file, as in the
following:
mv recipe new_recipe
5-38
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
The following are some important options you can use with mv:
Table 5-15
Option
Description
-i
-u
You can copy files and directories (using the option -r) with the cp
command (copy). The syntax for using cp is
cp source destination
When using the cp command, you need to remember the following:
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-39
> ls -a proposals
quarterly-1 quarterly-2 quarterly-3
> cp -r proposals/. proposals_old
> ls -a proposals_old
quarterly-1 quarterly-2 quarterly-3
To avoid copying the hidden files, you would enter the following:
geeko@da51:~ > cp -r proposals/* proposals_old
geeko@da51:~ > ls -a proposals_old
. .. quarterly-1 quarterly-2 quarterly-3 quarterly-4
5-40
Option
Description
-a, --archive
--help
-i, --interactive
-s, --symbolic-link
-l, --link
-u, --update
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Exercise 5-4
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-41
Create Directories
You can use the mkdir command (make directory) to create new
directories (such as mkdir proposal). The option -p lets you create
a complete path, as in the following:
mkdir -p proposal/january
5-42
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Exercise 5-5
Create Directories
In this exercise, you create the new directories with the mkdir
command.
You will find this exercise in the workbook.
(End of Exercise)
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-43
You can use the rmdir (remove directory) command to remove the
indicated the directory or directories (for example, rmdir
proposal). The directory or directories must be empty before you
can delete them.
5-44
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
The following are some important options you can use with rm:
Table 5-17
Version 2
Option
Description
-i
-r
-f
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-45
Exercise 5-6
5-46
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Link Files
File system formats in Linux keep data and administration
information separate. How data is organized differs from one file
system format to another.
Each file is described by an inode (index node or information node).
To see the inode number you can enter ls -i.
Each of these inodes has a size of 128-bytes and contains all the
information about this file apart from the filename. This includes
information such as details of the owner, access permissions, the
size, various time details (time of modification, time of access, time
of modification of the inode), and the links to the data blocks of this
file.
The ln command creates a link. A link is a reference to a file.
Through a link, you can access a file from anywhere in the file
system using different names for it. This means that the file itself
exists only once on the system, but it can be found under different
names.
Linux recognizes two kinds of links:
Hard links
Symbolic links
You create a hard link by using the ln command, which points to the
inode of an already existing file. Thereafter, the file can be accessed
under both namesthat of the file and that of the link, and you can
no longer discern which name existed first or how the original file
and the link differ.
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-47
Hard links can only be used when both the file and the link are in
the same file system (on the same partition), because inode numbers
are only unique within the same file system.
You can create a symbolic link with the command ln and the option
-s. A symbolic link is assigned its own inodethe link refers to a
file, so a distinction can always be made between the link and the
actual file.
The following is an example of creating a symbolic link:
geeko@da51:~/sell > ls -li
total 4
88658 -rw-r--r-- 1 geeko users 82 2004-04-06 14:21 old
geeko@da51:~/sell > ln -s old new
geeko@da51:~/sell > ls -li
total 4
88658 -rw-r--r-- 1 geeko users 82 2004-04-06 14:21 old
88657 lrwxrwxrwx 1 geeko users 3 2004-04-06 14:27 new ->
old
geeko@da51:~/sell >
With symbolic links, the limits of the file system can be overcome,
because the name of the object is shown, not the object itself. The
disadvantage is that a symbolic link can point to a non-existing
object if the object and its corresponding name no longer exist.
5-48
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
If you erase the old file in the above example, new will point to a
non-existing file. You can not see in the ls output, that the link is
broken:
geeko@da51:~/sell > rm old
geeko@da51:~/sell > ls -li
total 0
88657 lrwxrwxrwx 1 geeko users 3 2004-04-06 14:27 new ->
old
geeko@da51:~/sell >
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-49
Exercise 5-7
Link Files
In this exercise, you create a symbolic link and a hardlink with the
ln command.
You will find this exercise in the workbook.
(End of Exercise)
5-50
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Objective 6
File
file
File1
File1a
File1b
File2
File2a
MyFile
Search String
Files Found
File?
File1
File2
File*
File
File1
File1a
File1b
File2
File2a
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-51
Search String
Files Found
?ile*
File
file
File1
File1a
File1b
File2
File2a
find
locate
whereis
which
type
5-52
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
In the Name contains field, enter a part of the filename you want to
find.
Enter the directory you want to search in Look in Folder. Select
Find to start the search process. All matching files and directories
are shown in the lower window with details of their locations.
Further settings can be made when you open the menu under Select
More Options. Select a search rule from the pulldown menu
Available Options.
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-53
After selecting Add, a new text field is added and you can enter the
information the option needs. To remove a search rule, select
Remove next to the rule.
Figure 5-4
find
To search for files on the command line, you can use the find
command. The following is the syntax for the find command:
find path criterion action
The command has a multitude of options, a few of which are
explained here. You can use the following arguments with the
command:
5-54
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Table 5-19
Version 2
Description
-ctime [+/-]days
-gid number
-group name
-name pattern
-size [+/-]size
-type file_type
-uid number
-user name
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-55
-print (default)
-exec command
With the option -exec, you can call up another command. This
option is frequently used to link find and grep as in the following:
geeko@da51:~ > find ~ -name letter* -type f -exec grep
appointment {} \;
appointment for next meeting: 23.08.
/home/geeko/letters/letter_Smith
geeko@da51:~ >
In this example, the find command searches for files starting with
letter in their names, and then passes the names of the files found
with -exec to the following command (in this case grep
appointment {}).
The two brackets {} stand as placeholders for the filenames which
are found and passed to the grep command. The semicolon closes
the -exec instruction. As this is a special character, it is masked by
placing a backslash in front of it.
When grep is used alone, it searches for a specific expression in a
file whose exact position in the file system is known. When used in
combination with find, the search is for a file that contains a certain
expression, but whose location is unknown.
5-56
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
locate
The locate command is an alternative to find -name (the package
findutils-locate must be installed). The find command must search
through the selected part of the file system, a process that can be
quite slow.
On the other hand, locate searches through a database previously
created for this purpose (/var/lib/locatedb), making it much faster.
The database is automatically created and updated daily by SUSE
Linux Enterprise Server. But changes made after the update has
been performed are not taken into account by locate, unless the
database is updated manually using the updatedb command.
The following example shows the output of locate:
geeko@da51:~ > locate letter_Miller
/home/geeko/letters/letter_Miller
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-57
The following example shows that a search with locate returns all
files whose names contain the search string:
geeko@da51:~ > locate umount
/bin/umount
/lib/klibc/bin/umount
/opt/kde3/share/icons/crystalsvg/scalable/devices/3floppy_
umount.svgz
/opt/kde3/share/icons/crystalsvg/scalable/devices/5floppy_
umount.svgz
/opt/kde3/share/icons/crystalsvg/scalable/devices/camera_u
mount.svgz
/opt/kde3/share/icons/crystalsvg/scalable/devices/cdaudio_
umount.svgz
/opt/kde3/share/icons/crystalsvg/scalable/devices/cdrom_um
ount.svgz
/opt/kde3/share/icons/crystalsvg/scalable/devices/cdwriter
_umount.svgz
/opt/kde3/share/icons/crystalsvg/scalable/devices/dvd_umou
nt.svgz
/opt/kde3/share/icons/crystalsvg/scalable/devices/hdd_umou
nt.svgz
/opt/kde3/share/icons/crystalsvg/scalable/devices/mo_umoun
t.svgz
/opt/kde3/share/icons/crystalsvg/scalable/devices/nfs_umou
nt.svgz
/opt/kde3/share/icons/crystalsvg/scalable/devices/zip_umou
nt.svgz
/usr/bin/humount
/usr/bin/smbumount
/usr/share/man/man1/humount.1.gz
/usr/share/man/man2/umount.2.gz
/usr/share/man/man2/umount2.2.gz
/usr/share/man/man8/smbumount.8.gz
/usr/share/man/man8/umount.8.gz
geeko@da51:~ >
b
5-58
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
whereis
The whereis command returns the binaries (option -b), manual
pages (option -m), and the source code (option -s) of the specified
command.
If no option is used, all this information is returned, provided the
information is available. This command is faster than find, but it is
less thorough.
The following is an example of using whereis:
geeko@da51:~ > whereis grep
grep: /bin/grep /usr/bin/grep
/usr/share/man/man1/grep.1.gz
/usr/share/man/man1p/grep.1p.gz
geeko@da51:~ > whereis -b grep
grep: /bin/grep /usr/bin/grep
geeko@da51:~ > whereis -m grep
grep: /usr/share/man/man1/grep.1.gz
/usr/share/man/man1p/grep.1p.gz
geeko@da51:~ > whereis -s grep
grep:
geeko@da51:~ >
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-59
which
The which command searches all paths listed in the variable PATH
for the specified command and returns the full path of the
command. In the variable PATH the most important directories are
listed where the shell looks for executable files.
To see the content of a variable use the echo command and add a $ in front
of the variables name. To see the content of the variable PATH enter echo
$PATH.
5-60
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
type
The type command command can be used to find out what kind of
command is executed when command is entereda shell built in
command (an essential command that is hardcoded in the shell), an
external command (called by the shell), an alias, or a function. The
option -a delivers all instances of a command bearing this name in
the file system.
The following is an example of using the type command:
geeko@da51:~ > type type
type is a shell built in
geeko@da51:~ > type grep
grep is /usr/bin/grep
geeko@da51:~ > type -a grep
grep is /usr/bin/grep
grep is /bin/grep
geeko@da51:~ >
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-61
Exercise 5-8
5-62
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Objective 7
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-63
The following are options you can use with the grep command:
Table 5-20
Option
Description
-i
Ignores case.
-l
Shows only the names of files that contain the search string.
-r
-v
-n
-h
5-64
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Character
Meaning
Example
\<
Beginning of the
word
\>
[abc]
[0-9]
Version 2
[^xyz]
None of the
characters
Any number
(including none) of
preceding single
character
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-65
5-66
Character
Meaning
Example
{min,max}
The preceding
expression min
times at minimum
and max times at
maximum
The expression
before or after
( ...)
Enclose alternatives
for grouping with
others
\?
www\.novell\.com: matches
www.novell.com, literally (with the
dot not being treated as a
metacharacter); this is also
necessary for parentheses, e.g.,
matching a parenthetical pattern
would require the expression
\([a-zA-Z]+\)
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Exercise 5-9
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-67
Summary
Objective
Summary
As a relative path
As an absolute path
5-68
Normal files
Directories
Links
Device files
Sockets
FIFOs
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Objective
Summary
Directory Contents
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-69
Objective
Summary
5-70
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Objective
Summary
(continued)
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-71
Objective
Summary
5-72
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Objective
Summary
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
5-73
5-74
Objective
Summary
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
SECTION 6
In this section, you learn about the basic features of the bash shell.
In addition, you are introduced to some important administration
commands.
Objectives
Version 2
1.
2.
3.
4.
5.
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
6-1
Objective 1
Types of Shells
Types of Shells
UNIX has a whole series of shells, most of which are provided by
Linux in freely usable versions. The following are examples of
some popular shells:
6-2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Every shell can be started like a program and you can switch at any
time to a different shell. For example, you can switch to the C shell
by entering tcsh; you can switch to the Korn shell by entering ksh.
Unlike most other programs, the shell does not terminate on its own.
You need to enter the exit command to return to the previous shell.
A shell is started at a text console right after a user logs in. This is
called the login shell. Which shell is started for which user is
determined in the user database.
The standard Linux shell is bash, so we will only cover bash shell in
this objective.
Login Shells
Non-Login Shells
Login Shells
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
6-3
2.
Aliases
Non-Login Shells
6-4
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
6-5
Objective 2
History Function
History Function
bash stores the commands you enter so you have easy access to
them. By default, the commands are written in the .bash_history
file in the user's home directory. In SUSE Linux Enterprise Server,
the size of this file is set to a maximum of 1,000 entries.
You can display the content of the file by using the history
command.
You can display the commands stored in the history cache (one at a
time) by using the arrow keys. Up-arrow shows the previous
command; the Down-arrow shows the next command. After finding
the desired command, edit it as needed then execute it by pressing
Enter.
When browsing the entries of the history, you can also select
specific commands. Typing one or several letters, and pressing
PageUp or PageDown, displays the preceding or next command in
the history cache beginning with this letter.
If you enter part of the command (not necessarily the beginning of
the command), pressing Ctrl+r searches the history list for
matching commands and displays them. Searching starts with the
last command executed.
6-6
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
6-7
Exercise 6-1
6-8
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Objective 3
Variables
Aliases
Variables
With shell and environment variables, you are able to configure the
behavior of the shell and to adjust its environment to your own
requirements.
The convention is to write variables such as PATH in uppercase
letters. If you set your own variables, they should also be written in
capitals for the sake of clarity.
Environment variables are used to control the behavior of a program
that is started from a shell. Shell variables, on the other hand, are
used to control the behavior of shell itself.
Some important environment variables include the following:
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
6-9
Aliases
Defining aliases allows you to create shortcuts for commands and
their options or to create commands with entirely different names.
On a SUSE Linux Enterprise Server 10, whenever you enter the dir,
md, or ls command, for instance, you will be using aliases.
You can find out about the aliases defined on your system with the
alias command. This will show you that dir, for instance, is an alias
for ls -l and that md is an alias for mkdir -p.
The following are examples of aliases through which new
commands are defined:
geeko@da51:~> alias md
alias md='mkdir -p'
geeko@da51:~> alias dir
alias dir='ls -l'
6-10
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
6-11
An alias defined in this way is only valid for the current shell and
will not be inherited by subshells, as in the following:
geeko@da51:~> alias ps="echo Hello"
geeko@da51:~> ps
Hello
geeko@da51:~> bash
geeko@da51:~> ps
PID TTY
TIME CMD
858 pts/0 00:00:00 bash
895 pts/1 00:00:00 bash
...
6-12
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Exercise 6-2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
6-13
Objective 4
6-14
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
6-15
You can see the diffences between UTF-8 and POSIX encoding,
when you use the ls command. For user Geeko, the content of the
/usr/share/doc/packages/yast2-users/ directory looks like this:
geeko@da51:~> ls -l /usr/share/doc/packages/yast2-users/
total 65
drwxr-xr-x 2 root root 1352 2006-02-02 15:42 autodocs
-rw-r--r-- 1 root root 17992 2006-01-27 00:34 COPYING
-rw-r--r-- 1 root root 17992 2006-01-27 00:34
COPYRIGHT.english
-rw-r--r-- 1 root root 2013 2005-09-08 02:36 crack.html
-rw-r--r-- 1 root root
75 2006-01-27 00:34 README
-rw-r--r-- 1 root root
193 2005-09-08 02:36 TODO.txt
-rw-r--r-- 1 root root 9583 2005-09-08 02:36 users.html
geeko@da51:~>
The first file in the list of the normal user is autodocs. The first file
in the list of user root is COPYING.
In the POSIX encoding table all the lowercase characters are behind
the uppercase characters. In UTF-8 the lowercase a follows the
uppercase A immediately.
This means, between A and C in POSIX, the only character is
B. But in UTF-8, there are a, B and b in between.
6-16
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
x
b
x
Version 2
Search Pattern
Description
[0-9]
[a-ek-s]
[abcdefg]
[!abc]
Some of the search patterns have a different meaning than they have as
regular expressions.
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
6-17
> ls xc*
xcmsdb xconsole xcursorgen xcutsel
> ls xc[alo]*
xconsole
> ls xc[!o]*
xcmsdb xcursorgen xcutsel
> ls xc*l*
xconsole xcutsel
If search patterns (wild cards) are given on the command line, the
shell tries to compare these with the filenames in the file system
and, if they match, the expression is replaced with all the filenames
found.
6-18
$HOME
$HOME
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
$HOME'
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
6-19
Exercise 6-3
6-20
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Objective 5
Figure 6-1
Standard
input 0
command
Standard
error
output
Standard
>_
output 1
>_
Version 2
Channel
Number Assigned
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
6-21
Each channel can be redirected by the shell. For example, stdin can
come from a file or stdout and stderr can be directed to a file. The
following are the redirection characters:
Table 6-3
Redirection Character
Description
<
>
2>
6-22
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
First, the standard output is redirected to the list file (> list); then the
standard error output is directed to the standard output (2>&1). The
& refers to the file descriptor that follows (1 for the standard
output).
You can display the contents of the list file by using the cat
command, as in the following:
geeko@da51:~> cat list
/bin/ls: /recipe: No such file or directory
/opt:
gnome
kde3
First, the text is redirected to the greetings file through the >
command. The mail program, mail, receives its input from the
greetings file (not the keyboard), and then the email program sends
the email to the user tux.
The output of one command can be used as the input for another
command by using the pipe ( | ):
command1 | command2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
6-23
6-24
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Link
Result
command1 || command2
test
The recipe file does not exist and the ls recipe command leads to an
error. Because of this the ls ~ command in the first line is executed
and in the fourth line not.
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
6-25
Exercise 6-4
6-26
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Summary
Objective
Summary
Login Shells
Non-login Shells
/etc/profile
~/.profile
/etc/bash.bashrc
/etc/bash.bashrc.local
~/.bashrc
/etc/bash.bashrc
/etc/bash.bashrc.local
~/.bashrc
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
6-27
Objective
Summary
Command Line
6-28
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Objective
Summary
Line Tasks
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
6-29
Objective
Summary
6-30
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Objective
Summary
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
6-31
6-32
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
SECTION 7
Objectives
Version 2
1.
2.
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
7-1
Objective 1
vi
emacs
xemacs
xedit
gedit
kwrite
Every text editor has advantages and disadvantages. There are two
kinds of editors:
Graphical editors
The main advantage of command line editors is that you do not need
a graphical user interface to use them.
7-2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Graphical editors are (normally) easy to use and do not need big
explanations. An example is the editor gedit that can be started from
the main menu (application group Tools).
Figure 7-1
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
7-3
Objective 2
vi
emacs
7-4
Start vi
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Start vi
You can start vi by entering vi or vim, followed by various options,
and the name of a file to edit, as in the following example:
vi exercise
If a file does not yet exist, it is created. The text of the file appears
in an editor at the command line:
Figure 7-2
The sign ~ indicates lines that do not exist yet. The cursor is on
the first line.
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
7-5
7-6
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Command
Result
i or Insert
x or Delete
dd
yy
p, P
ZZ
/pattern
?pattern
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
7-7
7-8
Command
Result
:q
:q!
:wq or :x
:w
:w file
Saves the current file under the name file. (Note: You
continue editing the original file, not the new file.)
If you want to configure vi, you have to edit the ~/.vimrc file. By default, this
file does not exist.
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Exercise 7-1
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
7-9
Summary
Objective
Summary
graphical editors
Command-line mode: vi
accepts commands from the
command line. Enter causes
the command to be executed
and automatically switches back
to the command mode.
7-10
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
SECTION 8
Objectives
Version 2
1.
2.
3.
4.
5.
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-1
Objective 1
A user name
A password
8-2
All users who intend to create web pages can be placed in the
group webedit.
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Of course, file permissions for the directory in which the web pages
are located must be set so that the group webedit is able to write
(save files).
As with users, each group is also allocated a number internally
called the GID (Group ID), and can be one of the following types:
Normal groups
User Administration
From the YaST Control Center, select Security and Users >
User Management, or from a terminal window, enter yast2
users.
Group Administration
From the YaST Control Center, select Security and Users >
Group Management, or from a terminal window, enter yast2
groups.
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-3
User Administration
8-4
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Customize Filter. This option lets you combine listed user sets
(such as Local Users and System Users) to display a
customized view (with Custom) of the users list.
Additional sets of users (such as LDAP users) are added to the Set
Filter drop-down list as you configure and start services on your
server.
You can create a new user account or edit an existing account by
selecting Add or Edit.
The following appears:
Figure 8-2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-5
8-6
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
To set the properties of the user (such as the UID, the home
directory, the login shell, group affiliation, and additional user
account comments), select the Details tab. The following appears:
Figure 8-3
User ID (uid). For normal users, you should use a UID greater
than 999 because the lower UIDs are used by the system for
special purposes and pseudo logins.
If you change the UID of an existing user, the permissions of
the files of this user owns must be changed. This is done
automatically for the files in the user's home directory, but not
for files located elsewhere.
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-7
If this does not happen automatically, you can change the permissions
of the user files in the home directory (as root) by entering
chown -R username /home/username.
8-8
Login Shell. From the drop-down list select the default login
shell for this user from the shells installed on your system.
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-9
Expiration date. Enter the date when the account expires. The
date must be in the format YYYY-MM-DD.
Leave the field empty if the account never expires.
Save the settings for the new or edited user by selecting Accept.
A new user appears in the list.
Configure your server with the new settings by selecting Finish.
8-10
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Group Administration
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-11
Additional sets of groups are added to the Set Filter drop-down list
(such as LDAP) as you configure and start services on your server.
You can create a new group or edit an existing group by selecting
Add or Edit. The following appears when you select Edit:
Figure 8-6
8-12
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
/etc/passwd
/etc/shadow
/etc/group
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-13
Exercise 8-1
8-14
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Objective 2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-15
8-16
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
For example, all users who intend to create web pages can be placed
in the group webedit. Of course, file permissions for the directory in
which the web pages are located must be set so that members of the
group webedit are able to write and read files.
You can use the id command to display information about a users
UID and which groups she is assigned to. For example, entering id
geeko provides information about the user geeko:
geeko@da51:~> id
uid=1000(geeko) gid=100(users)
groups=16(dialout),33(video),100(users)
geeko@da51:~>
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-17
8-18
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
You should avoid using the root account when performing day-to-day tasks
that do not involve system management.
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-19
The Linux system stores all user and group configuration data in the
following files:
/etc/passwd
/etc/shadow
/etc/group
Whenever possible, you should not modify these files with an editor. Instead
use the Security and Users modules provided in YaST or the command line
tools described in Manage User and Group Accounts from the Command
Line on 8-28.
/etc/passwd
The /etc/passwd file stores information for each user such as the
user name, the UID, the home directory, and the login shell.
In the past, /etc/passwd also contained the encrypted password.
However, because the file needs to be readable by all (e.g., to show
user and group names when using ls -l), the encrypted password is
now stored in /etc/shadow, which is only readable by root and
members of the group shadow.
8-20
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Each line in the /etc/password file represents one user, and contains
the following information (separated by colons):
Figure 8-7
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-21
Login shell. This is the shell that is started for a user after he or
she has successfully logged in. In Linux this is normally
/bin/bash (Bourne Again Shell).
The shell must be listed in the /etc/shells file.
b
8-22
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
/etc/shadow
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-23
Each line in the /etc/shadow file belongs to one user and contains
the following fields:
Figure 8-8
The above illustration shows the entry for the user geeko with an
encrypted password. The plain text password is novell.
The encrypted password is coded with the Blowfish function. The
encrypted word consists of letters, digits, and some special
characters. If an invalid character occurs in the password field (such
as * or !), that user has an invalid password.
Many users, such as wwwrun (Apache Web server) or bin have an
asterisk (*) in the password field. This means that these users can
not log in to the system, but are needed for special applications.
If the password field is empty, then the user can log in to the system
without entering a password. A password should always be set in a
Linux system.
The information at the end of each line determines some limits:
8-24
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Limit. Number of days after the password expires that the user
can continue to log in.
Enter -1 for unlimited access. (This does not make sense, of
course.)
Lock. Date when the account expires. The date must be in the
format YYYY-MM-DD.
Leave the field empty if the account never expires.
/etc/group
Each line in the file represents a single group record, and contains
the group name, the GID (group ID), and the members of the group.
For example
video:x:33:geeko
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-25
This is the entry for the group video in /etc/group and has a GID of
33. The user geeko is member of this group. The second field (x) is
the password field.
The /etc/groups file shows secondary group memberships, but does
not identify the primary group for a user.
8-26
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Exercise 8-2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-27
Objective 3
useradd. You can create a new user account with the useradd
command. If no option is specified, the useradd command
creates a user without a home directory and without a valid
password.
The following are the most important options of the useradd
command:
8-28
-c. When creating a new user, you can enter text for the
comment field by using the option -c (comment).
-u. This option specifies the UID of the new account. If this
option is not given, the next free UID is used (at maximum
60000).
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
-g. This option defines the primary group of the user. You
can specify either the GID or the name of the group.
-p. This option lets you create a password for a new user.
The following is an example:
useradd -m -p "ghvkuzfFGW6cw" geeko
The encrypted password must be given here, not the plain text
password. The program mkpasswd can be used to generate
encrypted passwords. The program is located in the package whois.
With useradd, the user is created and with passwd the password
is assigned.
When creating a user account, the necessary standard
configuration information (effective group, location of the home
directory, default shell, etc.) is derived from the
/etc/default/useradd and /etc/login.defs files.
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-29
8-30
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-31
Table 8-1
8-32
Description
-i number
-n number
-w number
-x number
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-33
8-34
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
You can learn more about these commands by referring to the online manual
pages (such as man groupadd) or online help page (such as groupadd
--help).
In this example you can see that the current group (users) is
replaced with a new group (video).
A password is requested if the group has a password and the user is
not listed in the group file as being a member of that group.
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-35
Make sure you add one or two empty lines at the end of the
messages, or it will run into the command line prompt.
8-36
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Exercise 8-3
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-37
Objective 4
-. Normal file
d. Directory
l. Link
8-38
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Each file (and directory) can belong to only one user and one group.
The name of the file owner is shown in the ls output next to the file
permissions (geeko). The name of the owning group is shown next
to the file owner (users).
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-39
You can also view permissions, owner, and group from Nautilus file
manager. Right-click the icon of the file you want to look at, select
Properties from the pop-up menu, and select the Permissons tab.
Figure 8-9
From this dialog, you can change the Read and Write permissions
for Owner, Group, and Others by selecting the appropriate option.
If you have the appropriate permissions, you can also modify the
user and group ownership of the file or directory by entering an user
or group in the appropriate field.
Modify the permissions and ownership as desired.
8-40
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Example
Result
chmod u+x
chmod g=rw
chmod u=rwx
chmod u=rwx,g=rw,o=r
chmod +x
chmod a+x
In the following example, the user geeko allows the other members
of the group users to write to the hello.txt file by using chmod:
geeko@da51:~
-rw-r--r-- 1
geeko@da51:~
geeko@da51:~
-rw-rw-r-- 1
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-41
Read: 4
Write: 2
Execute: 1
8-42
Owner
Group
Others
rwx
r-x
r--
421 (4+2+1=7)
4-1 (4+1=5)
4-- (4)
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Example
Result
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-43
The user can also do the same with chgrp using the following
syntax:
chgrp new_group file
The user can only change the group affiliation of the file that he
owns if he is a member of the new group.
In the following example, root changes the ownership of the file
hello.txt from geeko to the user tux by using chown:
da51:/tmp # ls -la hello.txt
-rw-r--r-- 1 geeko users 0 2006-04-06 12:43 hello.txt
da51:/tmp # chown tux.users hello.txt
da51:/tmp # ls -la hello.txt
-rw-r--r-- 1 tux users 0 2006-04-06 12:43 hello.txt
da51:/tmp #
Of course, root and the file owner continue to have rights to access
the file.
Although the group has changed, the owner permissions remain the
same.
8-44
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Exercise 8-4
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-45
Directories
Default Permissions
umask
Result
8-46
Files
rwx
rwx
rwx
rw-
rw-
rw-
---
-w-
-w-
---
-w-
-w-
rwx
r-x
r-x
rw-
r--
r--
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
11:18
11:18
11:18
11:18
11:18
11:18
example1
example2
example3
exampledir1
exampledir2
exampledir3
By entering umask 077 you restrict access to the owner and root
only; the group and others do not have any access permissions.
umask without any parameter shows the current value of the umask.
da51:~ # umask
0022
da51:~ #
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-47
Letter
Number
Name
Files
Directories
Sticky bit
not applicable
SGID (set
GroupID)
When a program
is run, this sets
the group ID of
the process to
that of the group
of the file.
Files created in
this directory
belong to the
group to which
the directory
belongs and not
to the primary
group of the user.
New directories
created in this
directory inherit
the SGID bit.
8-48
SUID (set
UserID)
Not applicable
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
You set the sticky bit with chmod, either via the permissions of
others (such as chmod o+t /tmp) or numerically (such as
chmod 1777 /tmp).
The sticky bit on older UNIX systems enabled the storing of an executable
program in memory after it had been terminated, so it could be quickly
restarted. However, with modern UNIX and Linux systems, this only affects
directories.
The sticky bit is listed in the permissions for Others (t), as in the
following:
geeko@da51:~ > ls -ld /tmp
drwxrwxrwt 15 root root 608 2006-04-06 12:45 /tmp
geeko@da51:~ >
Each user is allowed to change his password, but to write it into the
/etc/shadow file root permissions are needed.
The following is an example for SGID:
geeko@da51:~ > ls -l /usr/bin/wall
-rwxr-sr-x 1 root tty 10192 2006-03-22 05:24 /usr/bin/wall
geeko@da51:~ >
With wall, you can send messages to all virtual terminals. If you use
wall, this command is executed with the permissions of the group
tty.
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-49
If the attributes SUID or SGID are set, the programs are carried out
with the privileges the owner (in the example for SUID above: root)
or the group (in the example for SGID above: tty) have.
If root is the owner of the program, the program is carried out with
the permissions of root. Unfortunately, there is a security risk in
doing this.
For example, it could be possible for a user to take advantage of an
error in the program, retaining root privileges after the process has
been ended.
8-50
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Objective 5
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-51
x
8-52
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
This list is not complete. There can be more password files on your system,
depending on your system configuration and your software selection.
The SUID bit. If the SUID bit is set for an executable, the
program is started under the user ID of the owner of the file. In
most cases, this is used to allow normal users to run
applications with the rights of the root users.
This bit should only be set for applications that are well tested
and in cases where no other way can be used to grant access to
a specific task.
An attacker could get access to the root account by exploiting
an application that runs under the UID of root.
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-53
The SGID bit. If this bit is set, it lets a program run under the
GID of the group the executable file belongs to. It should be
used as carefully as the SUID bit.
The sticky bit. The sticky bit can influence the security of a
system in a positive way. In a globally writable directory, it
prevents users from deleting each others files that are stored in
these directories.
Typical application areas for the sticky bit include directories
for temporary storage (such as /tmp and /var/tmp). Such a
directory must be writable by all users of a system.
However, the write permissions for a directory not only include
the permission to create files and subdirectories, but also the
permission to delete these, regardless of whether the user has
access to these files and subdirectories.
If the sticky bit is set for such a writable directory, deleting or
renaming files in this directory is only possible if one of the
following conditions is fulfilled:
8-54
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Summary
Objective
Summary
Version 2
/etc/passwd
/etc/shadow
/etc/group
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-55
Objective
Summary
Security Features
To maintain an environment
where data and applications are
secure, you learned about the
following:
8-56
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Objective
Summary
Version 2
useradd
userdel
usermod
passwd
groupadd
groupdel
groupmod
newgrp
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-57
Objective
Summary
Ownership
8-58
chmod
chown
chgrp
umask
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Objective
Summary
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
8-59
8-60
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
APPENDIX A
Version 2
Log in
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
A-1
Objective 1
A-2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
A-3
Exercise A-1
A-4
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Objective 2
Log in
If you installed only KDE and uninstalled GNOME, the KDE login
dialog appears.
Figure A-3
You can enter your username and password or select the user icon at
the left and enter your password. Press Enter to login or select the
small arrow botton next to the Password textbox.
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
A-5
Here select KDE and OK. Then you can enter your username and
your password.
Before KDE starts, the login manager wants to know whether KDE
should be the new default or you want to start it just for this session.
Figure A-5
A-6
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
A-7
Objective 3
Figure A-7
At the bottom of the KDE menu, select the Log Out entry. You can
also right-click on the window background and select the same
option from the popup menu.
After selecting Logout, a confirmation dialog appears.
Figure A-8
A-8
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
End Current Session. You are logged out and the login screen
re-appears, allowing you or another person to log in.
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
A-9
Objective 4
The Desktop
Virtual Desktops
The Desktop
On the desktop you will see only a few icons. You can start the
applications associated with these icons by selecting them once with
your left mouse button.
You can move the icons by dragging them with the mouse.
A-10
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
The following are the most commonly used icons and their
functions (from left to right):
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
A-11
A-12
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Virtual Desktops
If you are working with several programs concurrently, the screen
can quickly become cluttered with open windows. In Linux, you can
bring order to this chaos by changing to another (virtual) desktop.
You can switch between the various desktops via the control panel.
Figure A-11
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
A-13
Objective 5
Desktop
Kicker
KDE Menu
Desktop
You can create a new icon on your desktop in different ways. For
simplicity, we will describe only one method.
To create an icon for an application on your desktop, select the item
in your KDE menu. Hold down the left mouse button, move the
mouse pointer to free space on your desktop and release the mouse
button. In the menu that appears, select Copy Here.
Kicker
You can add new icons or applets to the control panel by
right-clicking on a free area of the panel, and then selecting Add
Application to Panel or Add Applet to Panel.
You can remove a program from the control panel by right-clicking
its icon in the control panel and then selecting Remove program
Button.
You can move icons in the panel by holding down the middle mouse
button or by choosing Move program Button from the context
menu.
A-14
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
KDE Menu
To make changes in your KDE menu, start the KDE Menu Editor by
selecting the KDE menu icon with the right mouse button and
selecting Menu Editor. The following appears:
Figure A-12
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
A-15
Objective 6
Figure A-13
A-16
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
If you select the arrow pointing upwards, you will move from the
current directory to the next highest directory (from /home/tux/ to
/home/). The arrow pointing to the left returns you to the previously
visited location. You can move forward again with the right arrow.
You can open a directory and view its contents by selecting the
directory in the file view. If you select a normal file, KDE tries to
open it or starts a program to open it.
Selecting the house symbol in the toolbar takes you directly to your
own home directory (for example, /home/geeko/).
The second method of navigating is provided by the navigation area.
If you select a directory in the navigation area, its contents are
displayed in the file view.
You can double-click the directory in the navigation area to open it
and view all subdirectories in it. Double-click the directory again to
close it.
Version 2
If you prefer a detailed list that displays information about each file in the
tree, activate the tree view by selecting the second icon from the right in the
toolbar.
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
A-17
Exercise A-2
A-18
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Summary
Objective
Summary
Desktop
Environment
4. Identify KDE
Desktop
Components
Version 2
The Desktop
Virtual Desktops
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
A-19
Objective
Summary
5. Manage Icons in
the KDE
Environment
A-20
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
APPENDIX B
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
B-1
Network Types
Network Topology
Elements of a Network
Network Types
On the basis of the geographical area covered, a network can be
classified into the following types:
B-2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
B-3
Organization A
Organization B
B-4
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Sales
Division
Internet
Marketing
Division
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
B-5
Client/Server Network
Peer-to-Peer Network
Client/Server Network
B-6
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Peer-to-Peer Network
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
B-7
Network Topology
A topology is a pictorial representation of the layout of a network.
Selecting an appropriate network topology enables you to create an
efficient, reliable, and cost-effective network.
The following are the types of network topologies:
Bus
Ring
Star
Mesh
Wireless
Bus
Terminator
Coaxial Cable
Terminator
B-8
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
B-9
Ring
B-10
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Star
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
B-11
B-12
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Mesh
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
B-13
Router A
Router B
Router D
Internet
Router C
B-14
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
The partial mesh topology is less expensive than the full mesh
topology.
Wireless
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
B-15
B-16
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Elements of a Network
The following are the elements of a network:
Network Nodes
Transmission Media
Network Protocols
Network Services
Network Nodes
Transmission Media
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
B-17
Microwave
Ring
Bounded
Transmission
Medium
Star
Bus
B-18
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Network Protocols
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
B-19
B-20
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
x
b
Version 2
For details on TCP and UDP protocols see Transmission Control Protocol
(TCP) on B-36 and User Datagram Protocol (UDP) on B-40.
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
B-21
Network Services
B-22
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
ISO/OSI
Reference Model
TCP/IP
Reference Model
Application Layer
Presentation Layer
Application Layer
Session Layer
Transport Layer
Transport Layer
Network Layer
Internet Layer
With the TCP/IP model, the 3 upper layers of the OSI model are
combined into the application layer and the two lower layers into
the network access layer.
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
B-23
Internet Layer
Transport Layer
Application Layer
In the TCP/IP layer model, the physical layer and the data link layer
of the OSI model are combined into the network access layer:
Figure B-12
Network Access Layer:
ethernet, FDDI,
token ring, token bus,
serial line (PPP, SLP)
Application Layer
Transport Layer
Internet Layer
B-24
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Ethernet
Token bus
Token ring
Internet Layer
Internet Layer:
Ensures connection between individual
hosts in the network beyond the limits
of individual networks in the internet.
Main tasks:
Providing an address space
for the internet, and
data transfer between hosts
routing.
Application Layer
Transport Layer
Internet Layer
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
B-25
The main tasks of the Internet layer are providing an address space
for the Internet, routing, and data transfer between end systems
(host computers).
The following are protocols of the Internet layer (with IP as the
most popular):
B-26
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Host A
Host B
Host C
ping C
2.
3.
Host A memorizes the reply to its query in a cache. You can view
this cache with the arp command (/sbin/arp\). The command also
provides options for editing the cache, such as deleting an invalid
assignment of a MAC address to an IP address (arp -d hostname).
b
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
B-27
B-28
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Bits
0
Version
8
IHL
12
20
TOS
Identification
TTL
16
24
28
32
Total Length
Flags
Protocol
Fragment Offset
Header Checksum
Source Address
IP-Header
Destination Address
Options
Padding
Data
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
B-29
R (Reserved, 1 bit)
B-30
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
B-31
B-32
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Internet Protocol (IP) was not designed for the purpose of ensuring
faultless data transmission.
In the event of a communication problem during the transmission of
an IP datagram, the sender of the datagram receives a corresponding
error report through ICMP.
However, this error report can only be transmitted to the sender of
the IP datagram if a gateway or the recipient of the IP datagram can
analyze the error that occurred.
Because of this, ICMP (as defined in RFC 792) is a protocol that is
usually used for transmitting error reports to the senders of IP
datagrams.
For example, an IP datagram should be sent to a specific destination
network through a specific router. However, the router in question is
not able to reach the destination, so a destination unreachable
message is sent.
Or, if the router notices that the received packet can reach the
destination quicker if another path (another gateway), a redirect
message is sent.
The analysis tool ping also uses the ICMP protocol for transmitting
ping control messages (echo request and echo reply).
In turn, ICMP uses IP for transmitting the control messages, and
packs the control messages into the data section of the IP header.
ICMP places the type ID of the control message in the first octet of
the data section in the IP header. The type IP classifies the control
message and defines which and how much data is contained in the
subsequent bytes of the datagram.
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
B-33
Type
Name
Description
Echo Reply
Destination
Unreachable
A destination (host/network/protocol/port)
cannot be reached.
Source Quench
Redirect
Message
Echo Request
11
Time Exceeded
12
Parameter
Problem
13
Timestamp
Request
14
Timestamp
Reply
Bits
0
4
Type
12
16
20
Code
24
28
32
Checksum
ICMP Message
B-34
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
ICMP-Header
Version 2
Transport Layer
Transport Layer:
Enables communication between
source and destination host.
Application Layer
Internet Layer
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
B-35
B-36
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Bits
0
12
16
Source Port
20
24
28
32
Destination Port
Sequence Number
Acknowledgement Number
Data
Offset
Reserved
Control Bit
Checksum
TCP-Header
Window
Urgent Pointer
Options
Padding
Data
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
B-37
Urgent Pointer (16 bits). If the URG bit is set, this field points
to the sequence number of the last byte in a sequence of urgent
data.
B-38
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Client
Request
Server
SYN (400)
SYNchronize Flag
Sequence No. 400
SYNchronize Flag
Confirm the
Request
SYN (600)
ACK (401)
ACKnowledgement Flag
Sequence No. 400 + 1
Data
ACK (601)
ACKnowledgement Flag
Sequence No. 600 + 1
The client sends a TCP packet to the server with the SYN flag set.
This tells the server that the client wants to synchronize a
connection. The SYN flag is used to synchronize the
connection.
Version 2
2.
3.
The server sends a TCP packet to the client with a SYN flag set
(with sequence number 600) and an ACK flag with sequence
number 401 (Client SYN +1).
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
B-39
The client receives the packet and knows that the server is ready
for the data transmission.
It starts the transmission of the first data packet in which the
ACK flag is set with the sequence number 601 (Server-SYN
+1), acknowledging the receipt of the last TCP packet from the
server.
5.
B-40
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Bits
0
12
16
20
24
28
Source Port
Destination Port
Length
Checksum
32
UDP-Header
Data
Length (16 bits) (In Bytes). Length of the UDP header and the
encapsulated data. The minimum value is 8.
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
B-41
SSH. Port 22
Telnet. Port 23
SMTP. Port 25
DNS. Port 53
HTTP. Port 80
For TCP and UDP, the port numbers are assigned separately. For
example, port 4912 for UDP can specify a different service from the
same port number for TCP.
B-42
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
For a table listing the port numbers of frequently used services, see the file
/etc/services.
Application Layer
Application Layer:
Combines all higher-level protocols
of the TCP/IP model.
Application Layer
Protocols are:
Telnet, FTP, SMTP, DNS, HTTP, etc.
Transport Layer
Internet Layer
Version 2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
B-43
B-44
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Index
Index
Symbols
5-2
.alias 6-12, 6-29
.bash_history 5-14, 6-6
.bashrc 5-14, 6-4, 6-12
.profile 5-14, 6-4
/ 5-16
/dev/null 5-10, 6-22
/etc/bash.bashrc 6-4, 6-11
/etc/group 8-13
/etc/passwd 1-281-29, 8-13, 8-18, 8-208-21
/etc/profile 6-4
/etc/shadow 8-13, 8-18, 8-228-23
/etc/sysconfig/ 3-7, 5-16
| 6-23
~ 5-14, 7-5
A
absolute path 5-4, 5-68
acceleration 1-14
ACPI 1-14, 1-36
address B-27, B-30
administrator 1-23, 2-6, 5-16, 6-7
alias 6-4, 6-106-11, 6-29
AppAmor 5-17
application browser 2-14
ASCII 4-134-14
Assembler 1-3
Version 2
asynchronous B-25
authentication 1-281-29
auto login 1-30
Autoyast 1-33
B
backslash 5-2, 5-56
backup 1-19
bash 5-14, 6-1, 6-3, 6-56-6
binary 5-7, 5-16, 5-59, B-31
Blowfish 8-6, 8-33
boot 5-25
boot loader 1-20, 5-8
boot menu 1-14
boot option 1-14
booting 1-13, 1-17, 1-20, 2-7, 5-8
bottom panel 2-9, 2-182-19
bound B-21
Bourne again shell 6-2
Bourne shell 6-2
bracket 5-56
branch 5-4
BSD 1-35
BSD UNIX 1-3
C
C 1-3
C shell 6-2
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Index-1
CA 1-27
cable B-1, B-8B-9, B-11, B-14B-15, B-18,
B-31
cache 6-6
cat 5-21, 5-34
CD 5-9
cd 5-29, 5-69
CD-ROM 5-115-12, 5-24
Certificate Authority 1-27
channel 5-9, 6-21
character 6-17, 7-7
class B-31
client B-1
clock 1-18, 2-12
color 5-13, 6-4
command 6-11
command line 5-1
command mode 7-10
command-line mode 7-6, 7-8, 7-10
compatibility 1-12
completion 6-5
component B-17, B-35, B-37, B-41
configuration 3-1
connection B-1
content 5-21
cp 5-39, 5-70
create B-3B-4, B-6B-8
CUPS 5-13
E
echo 6-9, 6-25
editor 7-2, 7-47-6, 7-10
egrep 5-64, 5-73
emacs 7-2, 7-4
emblem 2-22
ep 5-63
error 1-14, 2-2, 5-23, 6-216-22, 6-25, 8-13
ethernet 3-11, 3-18
exit 6-3, 6-7
expiration 8-98-10
external zone 3-17
D
data channels 6-21
database 5-57
date 2-12, 8-10
day 8-9
default gateway 3-16
Index-2
F
FHS 5-2, 5-6, 5-8, 5-12, 5-18, 5-68
FIFO 5-68
file manager 2-21
file name 5-56
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Index
G
gateway 3-16
GID 5-55, 8-3, 8-11, 8-13, 8-16, 8-22
global B-6
GNOME 2-4, 2-6, 2-8, 2-10, 2-12, 2-15, 2-25,
3-3, 4-16, 5-15
Google 4-17
GPL 1-6
graphical user interface 2-12-3, 2-17, 6-6
graphics card 1-32
grep 5-56, 5-63, 5-73
group 5-13, 8-28-4, 8-78-8, 8-11, 8-13,
8-158-16, 8-22
Group ID 5-55, 8-3, 8-11, 8-16
groups 8-17
GRUB 1-20, 5-8
GUI 2-2, 4-16
guidelines 1-11
Version 2
H
hard disk 1-19
hard disk acceleration 1-14
hard drive 5-115-12, 5-23
hardware 1-201-21, 1-32, 5-9, B-26B-27
hardware clock 1-18
hardware information 1-19
head 5-35, 5-70
header B-29B-30, B-33B-38, B-41
help 4-164-17
hexadecimal B-26
hierarchy 5-2, 5-4, 5-6, 5-18
History 1-2
history 6-6, 6-28
HOME 6-9
home directory 2-21, 5-14, 5-16, 5-25, 6-6,
6-9, 8-78-8, 8-19, 8-22
host 3-15
host name 1-22, 3-15
hostname 3-133-14
hotplug 3-18
howto 4-14, 4-20
HP-UX 1-3
HTML 4-134-14, 4-20
HTTP B-44
I
I/O port 5-22
icon 2-152-19, 2-22
id 6-7, 8-17
IDE 5-9, 5-11
ifup 3-9
info 4-19
init 5-12, 5-205-21
inode 5-475-48
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Index-3
input 6-216-23
insert mode 7-67-7, 7-10
installation 1-11, 1-131-15, 1-201-22,
1-261-27, 1-31, 1-33, 1-36,
4-124-13, 5-8
interface 3-9, 3-11, 3-173-18
internal zone 3-17
Internet
protocol B-28, B-32B-33
internet 1-26
interrupt 5-22
intrusion 5-17
IP
address B-27
ip 3-18
IP address 3-123-13, 3-15, 5-13
IPv4 3-12
ISDN 1-24
K
KDE 2-4, 2-10, 5-15
kernel 1-51-6, 5-6, 5-85-9, 5-175-18,
5-225-23, 6-2
kernel module 3-103-11, 5-12, 5-15
keyboard 1-19, 2-32-4, 2-24, 3-3, 5-2
Korn shell 6-2
L
LAN B-3B-4
LANG 6-146-15, 6-17
language 1-141-15, 1-20, 2-10
launcher 2-17
LDAP 1-271-29, 8-3, 8-5, 8-12
less 4-19, 5-34, 5-69
Library 5-25
Index-4
M
MAC OS 1-8
mail 1-27, 1-30
major device 5-9
man 4-19, 5-585-59, 5-65
man page 5-18
manual 4-13
mask 6-18, 6-30
MBR 5-8
md 6-10
media 5-15
memory test 1-14
meta characters 5-645-65
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Index
Metacity 2-4
minor device 5-9
MIT 2-3
mkdir 5-42, 5-70
mknod 5-10
mode 7-6
modem 1-24
monitor 2-24, B-28
mount 5-15, 5-225-24
mount point 5-8
mouse 2-32-4, 5-9
MTU 3-18
MULTICS 1-2
multiprocessor system 1-9
multitasking 1-81-9, 1-36, 8-2, 8-15
multitasking, preemptive 1-8
multithreading 1-9, 1-36
multiuser 1-8, 2-6, 2-24, 8-18-2, 8-158-16
mv 5-38, 5-70
N
name 1-30
name server 3-13, 3-15
Nautilus 2-21, 5-71
ncurses 3-23-3
network 1-241-25, 1-27, 2-3, 3-9, 3-12,
3-14, 3-16, 3-18, B-3B-4
network card 3-103-11, 3-17
network device 1-24
network interface 1-24, 3-9
network mask 3-13
NetworkManager 1-25, 3-9
NFS B-22
NIS 1-28
node B-13, B-17, B-19, B-22
Version 2
O
online help 4-16
OpenLDAP 1-27
operating system 1-81-9, 1-13, 1-20, 1-36,
2-52-6, 5-17, 6-2, 8-2
operating systems 1-8
options B-38
output 6-216-23
owner 8-15
P
package 1-12, 4-13, 4-20
packages 1-21
panel 2-9, 2-12, 2-182-19
parallel port 5-10
partition 1-12, 1-191-21, 5-6, 5-85-9,
5-115-12, 5-14, 5-16, 5-225-24
partitioning table 1-19
password 1-221-24, 1-30, 2-6, 2-8, 2-24,
3-2, 3-4, 5-13, 8-2, 8-6, 8-9, 8-13,
8-16, 8-198-20, 8-24
patch 1-26
PATH 5-60, 5-72, 6-9
path 5-4, 5-54, B-33
pattern 5-55, 5-63, 6-18
PCI 5-22
PDF 4-13, 4-20
performance 2-2
permission 5-47, 8-1, 8-15
physical B-13, B-15B-16, B-21, B-24
pipe 6-23, 6-31
port 1-25, B-21, B-34, B-37, B-41B-43
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Index-5
Q
QT 3-2
queue 5-19
quote 6-18
R
RAID 1-12
RAM 1-14
reboot 1-22, 2-10
redirection 6-22
reference 5-47, 5-71
regular expression 5-635-64, 6-19
Reiser 1-12
relative path 5-4, 5-68
Release Notes 4-12
release notes 1-26, 1-31, 4-13, 4-20
repair 1-14, 1-17
requirements 1-111-12, B-36
rescue system 1-14
resource 5-17
Index-6
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2
Index
T
tail 5-35, 5-70
task manager 2-12
TC shell 6-2
TCP/IP 2-4
tcsh 6-3
teletype 2-24
Version 2
U
UCS 6-15
UID 5-21, 5-55, 8-2, 8-4, 8-7, 8-168-17,
8-22
umlauts 5-2
umount 5-235-24
unalias 6-11
Unicode 6-15
UNIX 1-3, 1-8, 1-28, 1-35, 5-2, 5-27, 6-2,
7-4, 7-10
unmount 5-24
update 1-17, 1-26, 2-12, A-11
updatedb 5-57, 5-72
USER 6-9
user 1-28, 1-301-31, 2-19, 2-21, 3-18,
5-125-14, 5-165-17, 5-20, 6-4,
6-6, 6-9, 6-27, 8-18-2, 8-48-10,
8-13, 8-158-19, 8-22, 8-24
User ID 5-55, 8-2, 8-16
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Index-7
Y
YaST 1-15, 1-191-20, 1-22, 1-24, 1-26,
1-301-32, 3-13-5, 3-7, 3-93-11,
3-13, 3-18, 8-28-3, 8-13
V
variable 5-60, 5-72, 6-96-10, 6-19, 6-29
version B-29
vi 7-2, 7-47-7, 7-10
vim 7-47-5
virtual desktop 2-4
virtual file system 5-20
virtual terminal 2-242-25
virus 5-17
volume control 2-12
Z
zone 3-17
W
web server 5-17
welcome message 5-13
whereis 5-72
which 5-60, 5-72
whoami 6-7
wild card 6-18
window manager 2-4, 2-10
Windows 1-19, 1-281-29, 2-2
X
X client 2-32-4
X server 2-32-5
X Window System 2-32-4, 5-13, 5-18
X11 2-3
XFree86 2-3
XOrg 2-3
Index-8
Copying all or part of this manual, or distributing such copies, is strictly prohibited.
To report suspected copying, please call 1-800-PIRATES.
Version 2