Linux, Command Line & Metacentrum

Total Page:16

File Type:pdf, Size:1020Kb

Linux, Command Line & Metacentrum Introduction Linux UN*X Command line Text Scripting Software MetaCentrum Administration Git The End Linux, command line & MetaCentrum Use of Linux command line not only for CESNET’s MetaCentrum Vojtěch Zeisek Department of Botany, Faculty of Science, Charles University, Prague Institute of Botany, Czech Academy of Sciences, Průhonice https://trapa.cz/, [email protected] February 6 to 8, 2018 . Vojtěch Zeisek (https://trapa.cz/) Linux, command line & MetaCentrum February 6 to 8, 2018 1 / 232 Introduction Linux UN*X Command line Text Scripting Software MetaCentrum Administration Git The End Outline I 1 Introduction Learning machine What it is a “UNIX” Licenses and money 2 Linux Choose one Differences 3 UN*X Disks and filesystems Types of users Files and directories Permissions Text 4 Command line . SSH — secure shell and screen . Vojtěch Zeisek (https://trapa.cz/) Linux, command line & MetaCentrum February 6 to 8, 2018 2 / 232 Introduction Linux UN*X Command line Text Scripting Software MetaCentrum Administration Git The End Outline II BASH and others Variables Input, output and their redirecting Information and processes Directories Archives Searching Network Parallelisation Timing 5 Text Reading Extractions AWK Manipulations . Vojtěch Zeisek (https://trapa.cz/) Linux, command line & MetaCentrum February 6 to 8, 2018 3 / 232 Introduction Linux UN*X Command line Text Scripting Software MetaCentrum Administration Git The End Outline III Comparisons Editors Regular expressions 6 Scripting Basic skeleton BASH variables Functions Reading variables Branching the code Loops 7 Software Packages Compilation Java Windows applications . Vojtěch Zeisek (https://trapa.cz/) Linux, command line & MetaCentrum February 6 to 8, 2018 4 / 232 Introduction Linux UN*X Command line Text Scripting Software MetaCentrum Administration Git The End Outline IV 8 MetaCentrum Information Usage Tasks Graphical connection 9 Administration System services 10 Git 11 The End Resources The very end . Vojtěch Zeisek (https://trapa.cz/) Linux, command line & MetaCentrum February 6 to 8, 2018 5 / 232 Introduction Linux UN*X Command line Text Scripting Software MetaCentrum Administration Git The End Learning machine What it is a “UNIX” Licenses and money Introduction 1 Introduction Learning machine What it is a “UNIX” Licenses and money . Vojtěch Zeisek (https://trapa.cz/) Linux, command line & MetaCentrum February 6 to 8, 2018 6 / 232 Introduction Linux UN*X Command line Text Scripting Software MetaCentrum Administration Git The End Learning machine What it is a “UNIX” Licenses and money The course information • The course page: https://trapa.cz/en/course-linux-command-line-2018 • Česky: https://trapa.cz/cs/kurz-prikazove-radky-linuxu-2018 • Subject in SIS: https://is.cuni.cz/studium/eng/predmety/ index.php?do=predmet&kod=MB120C17 • Česky: https://is.cuni.cz/studium/predmety/index.php?do= predmet&kod=MB120C17 • For students having subscribed the subject, requirements are on next slide • Working version is available at https://github.com/V-Z/ course-linux-command-line-bash-scripting-metacentrum — feel free to contribute, request new parts or report bugs . Vojtěch Zeisek (https://trapa.cz/) Linux, command line & MetaCentrum February 6 to 8, 2018 7 / 232 Introduction Linux UN*X Command line Text Scripting Software MetaCentrum Administration Git The End Learning machine What it is a “UNIX” Licenses and money Requirements to exam (“zápočet”) 1 Be present whole course. 2 Be active — ask and answer questions. 3 Write short script solving any task the student is (going to be) solving. E.g. prepare script to process student’s data on MetaCentrum. Or short script to do anything the student needs to do. This will be very individual. According to topics and interests of every student. Students can of course discuss with anyone, use Internet, manuals, etc. The aim is learn how to solve real problem the student has/is going to have. 4 Write at least one page (can be split into multiple articles) on Wikipedia about any topic discussed during the course. Again, this is very open, students can write about any topic they like. I prefer native language of the student (typically to make larger non-English Wikipedia). Vojtěch Zeisek (https://trapa.cz/) Linux, command line & MetaCentrum February 6 to 8, 2018 8 / 232 Introduction Linux UN*X Command line Text Scripting Software MetaCentrum Administration Git The End Learning machine What it is a “UNIX” Licenses and money Materials to help you… • Download the presentation from https://soubory.trapa.cz/ linuxcourse/linux_bash_metacentrum_course.pdf • Download the scripts and toy data from https://soubory.trapa.cz/linuxcourse/scripts_data.zip • Note: Open the scripts in some good text editor (slide 68) — showing syntax highlight, line numbers, etc. (NO Windows notepad); the files are in UTF-8 encoding and with UNIX end of lines (so that too silly programs like Windows notepad won’t be able to open them correctly) • Never ever open any script file in software like MS Word — they destroy quotation marks and other things by “typographical enhancements” making the script unusable . Vojtěch Zeisek (https://trapa.cz/) Linux, command line & MetaCentrum February 6 to 8, 2018 9 / 232 Introduction Linux UN*X Command line Text Scripting Software MetaCentrum Administration Git The End Learning machine What it is a “UNIX” Licenses and money Virtual machine for learning • If you do not have Linux installed, download and install VirtualBox from https: //www.virtualbox.org/ • Download openSUSE Leap 42.3 Linux distribution for this course from ftp://botany. natur.cuni.cz/openSUSE_ Leap_Linux_course.ova (3.7 GB) • Launch VirtualBox and go to menu File | Import appliance… to import it. When do, launch it (Start) . Vojtěch Zeisek (https://trapa.cz/) Linux, command line & MetaCentrum February 6 to 8, 2018 10 / 232 Introduction Linux UN*X Command line Text Scripting Software MetaCentrum Administration Git The End Learning machine What it is a “UNIX” Licenses and money VirtualBox shared folder I VirtualBox can be configured to share folder with host operating system . Vojtěch Zeisek (https://trapa.cz/) Linux, command line & MetaCentrum February 6 to 8, 2018 11 / 232 Introduction Linux UN*X Command line Text Scripting Software MetaCentrum Administration Git The End Learning machine What it is a “UNIX” Licenses and money VirtualBox shared folder II Go to menu “Devices | Shared Folders” and set pair of folders 1 sudo mount -t vboxsf -o uid=$UID,gid=$(id -g) shared /mnt . Vojtěch Zeisek (https://trapa.cz/) Linux, command line & MetaCentrum February 6 to 8, 2018 12 / 232 Introduction Linux UN*X Command line Text Scripting Software MetaCentrum Administration Git The End Learning machine What it is a “UNIX” Licenses and money What it is UNIX, Linux and GNU I • UNIX • Originally developed in Bell labs of AT&T in 1696, written in C, since then huge radiation, hybridization, HGT, … • Trademark — only systems passing certain conditions (paid certification) can be called “UNIX” — Solaris, HP-UX, AIX, etc. (commercial systems for big servers) • Main principles: simple, multitasking, hierarchical, network, for more users (takes cares about permissions etc.), configuration written in plain text files, important relationships among applications (generally one application = one task — they are chained), work primarily with text, has kernel and API (interface to communicate with the rest of the system) • UNIX-like (UN*X, *nix) • Systems compatible with UNIX (Linux, BSD and its variants, macOS, …) • Mainly open-source (UNIX is commonly commercial — source code is not available for public, but its specification is) . Vojtěch Zeisek (https://trapa.cz/) Linux, command line & MetaCentrum February 6 to 8, 2018 13 / 232 Introduction Linux UN*X Command line Text Scripting Software MetaCentrum Administration Git The End Learning machine What it is a “UNIX” Licenses and money What it is UNIX, Linux and GNU II • Nowadays prevailing over “old” UNIX systems, used in many devices from tiny embedded toys to huge data centers • Try to provide same quality as paid systems, but (mostly) for free • Many courts about copyrights, parts of code, patents — USA allow software patents, EU not — GNU, Linux, BSD, etc. try to ensure to have only code not covered by any patents to avoid possible courts • GNU • “GNU’s Not Unix!” — but it is compatible, respects its principles • Since 1984 Richard Stallman (founder of Free Software Foundation) tried to make new kernel (Hurd — not finished yet…) • Generally set of basic system tools — working with many kernels (Linux BSD*, Mac’s Darwin, …), also present in many commercial paid UNIX systems • Source code is free — anyone can study it (Security!), report bugs, contribute, modify, share it, … • GNU General Public License (GPL) — free spirit of open-source — license, idea, how to share software . Vojtěch Zeisek (https://trapa.cz/) Linux, command line & MetaCentrum February 6 to 8, 2018 14 / 232 Introduction Linux UN*X Command line Text Scripting Software MetaCentrum Administration Git The End Learning machine What it is a “UNIX” Licenses and money What it is UNIX, Linux and GNU III • Linux • First version of kernel written by Linus Torvalds in Helsinki in 1991 • Kernel was in principle inspired by various UNIX systems and using GNU tools for work • Quickly became popular — anyone can take it and use for any needs • Used in small embedded (commonly network) devices, mobile devices (book readers, Android, …), personal computers, servers (from home level to biggest
Recommended publications
  • RACF Tips Volume 3, Issue 1, January 2009
    Volume 3 Issue 1 IPS RSH RACF T January For Administrators, Auditors, and Analysts 2009 Specifying a Replacement ID used to change a file's attributes for Program Control, APF Authorized, and Shared Library. with IRRRID00 . To generate commands to delete an ID and all references to it, use RACF's IRRRID00 utility. You simply enter the ID in the SYSIN DD Temporary Access with statement of the IRRRID00 job like so: CONNECT REVOKE(date) //SYSIN DD * USERX You may occasionally need to permit a user temporary access to a resource. One way to do If USERX is the owner of a profile or connect, so is to grant a group access to the resource IRRRID00 generates commands like: and connect the user to that group with a revoke date. The command to set the connect revoke CONNECT RDSADM GROUP(RACFSTC) OWNER(?USERX) date would look something like this: In these cases, you need to change ?USERX to CONNECT USERA GROUP(TEMPACC) REVOKE(1/20/09) a valid replacement ID. This can be done manually or with ISPF EDIT CHANGE. On the date specified with the revoke, RACF will no longer allow the user to have the access Alternatively, you can tell IRRRID00 which permitted to the group. If you want to remove the replacement ID to use when it builds the revoke date but leave the connect intact, enter: commands. If, for instance, you want to replace every occurrence of USERX with USERJ, enter CONNECT USERA GROUP(TEMPACC) NOREVOKE the following in the SYSIN DD: A banking client of ours used this capability to //SYSIN DD * govern access to APF-authorized libraries.
    [Show full text]
  • Administering Unidata on UNIX Platforms
    C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta UniData Administering UniData on UNIX Platforms UDT-720-ADMU-1 C:\Program Files\Adobe\FrameMaker8\UniData 7.2\7.2rebranded\ADMINUNIX\ADMINUNIXTITLE.fm March 5, 2010 1:34 pm Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Beta Notices Edition Publication date: July, 2008 Book number: UDT-720-ADMU-1 Product version: UniData 7.2 Copyright © Rocket Software, Inc. 1988-2010. All Rights Reserved. Trademarks The following trademarks appear in this publication: Trademark Trademark Owner Rocket Software™ Rocket Software, Inc. Dynamic Connect® Rocket Software, Inc. RedBack® Rocket Software, Inc. SystemBuilder™ Rocket Software, Inc. UniData® Rocket Software, Inc. UniVerse™ Rocket Software, Inc. U2™ Rocket Software, Inc. U2.NET™ Rocket Software, Inc. U2 Web Development Environment™ Rocket Software, Inc. wIntegrate® Rocket Software, Inc. Microsoft® .NET Microsoft Corporation Microsoft® Office Excel®, Outlook®, Word Microsoft Corporation Windows® Microsoft Corporation Windows® 7 Microsoft Corporation Windows Vista® Microsoft Corporation Java™ and all Java-based trademarks and logos Sun Microsystems, Inc. UNIX® X/Open Company Limited ii SB/XA Getting Started The above trademarks are property of the specified companies in the United States, other countries, or both. All other products or services mentioned in this document may be covered by the trademarks, service marks, or product names as designated by the companies who own or market them. License agreement This software and the associated documentation are proprietary and confidential to Rocket Software, Inc., are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice.
    [Show full text]
  • LS-09EN. OS Permissions. SUID/SGID/Sticky. Extended Attributes
    Operating Systems LS-09. OS Permissions. SUID/SGID/Sticky. Extended Attributes. Operating System Concepts 1.1 ys©2019 Linux/UNIX Security Basics Agenda ! UID ! GID ! Superuser ! File Permissions ! Umask ! RUID/EUID, RGID/EGID ! SUID, SGID, Sticky bits ! File Extended Attributes ! Mount/umount ! Windows Permissions ! File Systems Restriction Operating System Concepts 1.2 ys©2019 Domain Implementation in Linux/UNIX ! Two types domain (subjects) groups ! User Domains = User ID (UID>0) or User Group ID (GID>0) ! Superuser Domains = Root ID (UID=0) or Root Group ID (root can do everything, GID=0) ! Domain switch accomplished via file system. ! Each file has associated with it a domain bit (SetUID bit = SUID bit). ! When file is executed and SUID=on, then Effective UID is set to Owner of the file being executed. When execution completes Efective UID is reset to Real UID. ! Each subject (process) and object (file, socket,etc) has a 16-bit UID. ! Each object also has a 16-bit GID and each subject has one or more GIDs. ! Objects have access control lists that specify read, write, and execute permissions for user, group, and world. Operating System Concepts 1.3 ys©2019 Subjects and Objects Subjects = processes Objects = files (regular, directory, (Effective UID, EGID) devices /dev, ram /proc) RUID (EUID) Owner permissions (UID) RGID-main (EGID) Group Owner permissions (GID) +RGID-list Others RUID, RGID Others ID permissions Operating System Concepts 1.4 ys©2019 The Superuser (root) • Almost every Unix system comes with a special user in the /etc/passwd file with a UID=0. This user is known as the superuser and is normally given the username root.
    [Show full text]
  • Freiesmagazin 12/2012
    freiesMagazin Dezember 2012 Topthemen dieser Ausgabe Slackware 14.0 Seite 3 Die wohl älteste noch aktive Linux-Distribution hat nach überdurchschnittlich langer Entwick- lungszeit die neue Version 14.0 veröffentlicht. Der Artikel gibt eine Übersicht über Altes und Neues, was sich seit Version 9.0 so alles geändert hat – und was nicht. (weiterlesen) Video Disk Recoder auf Basis von easyVDR 1.0 Seite 10 Der Artikel erklärt den Aufbau eines MediaCenters auf Basis der Distribution easyVDR und stellt die Neuerungen der Version 1.0 sowie deren Installation und Konfiguration vor. Der Schwerpunkt des Artikels liegt dabei in der Hardwareauswahl und den neuen Features der jetzt auf der Linux-Distribution Ubuntu basierten Version 1.0 sowie der „easy“ Inbetriebnahme dieser. (weiterlesen) Softmaker Office 2012 Seite 25 Der Markt für Büroprogramme ist unübersichtlich: In der Windows-Welt gilt Microsoft Office trotz der saftigen Preise immer noch als Referenz. Unter Linux dürfte dagegen LibreOffice mitt- lerweile den Stand eines Standards erreicht haben. Hinzu kommen noch zahlreiche freie An- wendungen und diverse kommerzielle Alternativen. Eines der Programme mit professionellem Anspruch ist SoftMaker Office, das nicht nur Nischenmärkte unter verschiedenen Systemen besetzen, sondern eine Alternative zu den Platzhirschen sein will. (weiterlesen) © freiesMagazin CC-BY-SA 3.0 Ausgabe 12/2012 ISSN 1867-7991 MAGAZIN Editorial Sechster Programmierwettbewerb werden dann ebenfalls einige Meta-Daten zu der Inhalt Linux allgemein Im März 2012 gab es mit dem fünften Wett- jeweiligen Ausgabe angezeigt. Slackware 14.0 S. 3 bewerb ein kleines Zwischenspiel außer der Aber auch so haben wir weiter an der CSS-Datei Video Disk Recoder auf Basis von S.
    [Show full text]
  • NETS1028 06 Backup and Change Mgmt
    Security Design Backup and Change Management System Examination System Configuration Firewalls and Filters Hardening Software Backups and Change Management Access Control and Authentication Virtual Private Networking Logging and Monitoring Security Policy and Management Support SELinux Linux Systems Security NETS1028 LINUX SYSTEMS SECURITY - DENNIS SIMPSON ©2015-2021 Backup • Security breaches can cast doubt on entire installations or render them corrupt • Files or entire systems may have to be recovered from backup • Many tools are available to help with this task in Linux • Two of the more commonly used ones are rsync and duplicity https://en.wikipedia.org/wiki/Rsync http://duplicity.nongnu.org/features.html NETS1028 LINUX SYSTEMS SECURITY - DENNIS SIMPSON ©2015-2021 Legacy Tools • cp is the original way to make a copy of files, but assumptions people make cause problems in using it • GUI-based drag and drop tools make the assumptions problem worse • cpio, tar are archival tools created to copy files to backup media (tape by default) - satisfactory for years but they make it cumbersome to manage backup media https://en.wikipedia.org/wiki/Manuscript_culture • Various software packages provide frontends to these tools in order to make backup/restore easier to manage and more robust NETS1028 LINUX SYSTEMS SECURITY - DENNIS SIMPSON ©2015-2021 Rsync • Rsync has a command line interface which resembles a smart cp, and provides a base for many backup software packages with GUIs • Can preserve special files such as links and devices • Can copy
    [Show full text]
  • The Kdesvn Handbook
    The kdesvn Handbook Rajko Albrecht The kdesvn Handbook 2 Contents 1 Introduction 7 1.1 Terms . .7 2 Using kdesvn 8 2.1 kdesvn features . .8 2.2 Beginning with subversion and kdesvn . .8 2.2.1 Creating a working copy . .9 2.2.2 Committing local changes . .9 2.2.3 Update working copy . .9 2.2.4 Adding and Deleting from working copy . .9 2.2.4.1 Add items . 10 2.2.4.2 Deleting items from working copy and unversion . 10 2.2.5 Displaying logs . 10 2.2.5.1 The log display dialog . 10 2.3 Working on repositories . 11 2.3.1 Restoring deleted items . 11 2.3.2 Importing folders . 11 2.3.2.1 With drag and drop . 11 2.3.2.2 Select folder to import with directory-browser . 11 2.4 Other Operations . 11 2.4.1 Merge . 11 2.4.1.1 Internal merge . 12 2.4.1.2 Using external program for merge . 12 2.4.2 Resolving conflicts . 12 2.5 Properties used by kdesvn for configuration . 13 2.5.1 Bugtracker integration . 13 2.6 The revision tree . 13 2.6.1 Requirements . 14 2.7 Internal log cache . 14 2.7.1 Offline mode . 14 2.7.2 Log cache and revision tree . 14 The kdesvn Handbook 2.8 Meaning of icon overlays . 14 2.9 kdesvn and passwords . 16 2.9.1 Not saving passwords . 16 2.9.2 Saving passwords in KWallet . 16 2.9.3 Saving to subversion’s own password storage .
    [Show full text]
  • Text Processing Tools
    Tools for processing text David Morgan Tools of interest here sort paste uniq join xxd comm tr fmt sed fold head file tail dd cut strings 1 sort sorts lines by default can delimit fields in lines ( -t ) can sort by field(s) as key(s) (-k ) can sort fields of numerals numerically ( -n ) Sort by fields as keys default sort sort on shell (7 th :-delimited) field UID as secondary (tie-breaker) field 2 Do it numerically versus How sort defines text ’s “fields ” by default ( a space character, ascii 32h = ٠ ) ٠bar an 8-character string ٠foo “By default, fields are separated by the empty string between a non-blank character and a blank character.” ٠bar separator is the empty string between non-blank “o” and the space ٠foo 1 2 ٠bar and the string has these 2 fields, by default ٠foo 3 How sort defines text ’s “fields ” by –t specification (not default) ( a space character, ascii 32h = ٠ ) ٠bar an 8-character string ٠foo “ `-t SEPARATOR' Use character SEPARATOR as the field separator... The field separator is not considered to be part of either the field preceding or the field following ” separators are the blanks themselves, and fields are ' "٠ " ٠bar with `sort -t ٠foo whatever they separate 12 3 ٠bar and the string has these 3 fields ٠foo data sort fields delimited by vertical bars field versus sort field ("1941:japan") ("1941") 4 sort efficiency bubble sort of n items, processing grows as n 2 shell sort as n 3/2 heapsort/mergesort/quicksort as n log n technique matters sort command highly evolved and optimized – better than you could do it yourself Big -O: " bogdown propensity" how much growth requires how much time 5 sort stability stable if input order of key-equal records preserved in output unstable if not sort is not stable GNU sort has –stable option sort stability 2 outputs, from same input (all keys identical) not stable stable 6 uniq operates on sorted input omits repeated lines counts them uniq 7 xxd make hexdump of file or input your friend testing intermediate pipeline data cf.
    [Show full text]
  • Version 7.8-Systemd
    Linux From Scratch Version 7.8-systemd Created by Gerard Beekmans Edited by Douglas R. Reno Linux From Scratch: Version 7.8-systemd by Created by Gerard Beekmans and Edited by Douglas R. Reno Copyright © 1999-2015 Gerard Beekmans Copyright © 1999-2015, Gerard Beekmans All rights reserved. This book is licensed under a Creative Commons License. Computer instructions may be extracted from the book under the MIT License. Linux® is a registered trademark of Linus Torvalds. Linux From Scratch - Version 7.8-systemd Table of Contents Preface .......................................................................................................................................................................... vii i. Foreword ............................................................................................................................................................. vii ii. Audience ............................................................................................................................................................ vii iii. LFS Target Architectures ................................................................................................................................ viii iv. LFS and Standards ............................................................................................................................................ ix v. Rationale for Packages in the Book .................................................................................................................... x vi. Prerequisites
    [Show full text]
  • Beyond Compare User Guide
    Copyright © 2012 Scooter Software, Inc. Beyond Compare Copyright © 2012 Scooter Software, Inc. All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval systems - without the written permission of the publisher. Products that are referred to in this document may be either trademarks and/or registered trademarks of the respective owners. The publisher and the author make no claim to these trademarks. While every precaution has been taken in the preparation of this document, the publisher and the author assume no responsibility for errors or omissions, or for damages resulting from the use of information contained in this document or from the use of programs and source code that may accompany it. In no event shall the publisher and the author be liable for any loss of profit or any other commercial damage caused or alleged to have been caused directly or indirectly by this document. Published: July 2012 Contents 3 Table of Contents Part 1 Welcome 7 1 What's. .N..e..w............................................................................................................................. 8 2 Standa..r.d.. .v..s. .P..r..o..................................................................................................................... 9 Part 2 Using Beyond Compare 11 1 Home. .V...i.e..w..........................................................................................................................
    [Show full text]
  • QLOAD Queue Load / Unload Utility for IBM MQ
    Queue Load / Unload Utility for IBM MQ User Guide Version 9.1.1 27th August 2020 Paul Clarke MQGem Software Limited [email protected] Queue Load / Unload Utility for IBM MQ Take Note! Before using this User's Guide and the product it supports, be sure to read the general information under "Notices” Twenty-fourth Edition, August 2020 This edition applies to Version 9.1.1 of Queue Load / Unload Utility for IBM MQ and to all subsequent releases and modifications until otherwise indicated in new editions. (c) Copyright MQGem Software Limited 2015, 2020. All rights reserved. ii Queue Load / Unload Utility for IBM MQ Notices The following paragraph does not apply in any country where such provisions are inconsistent with local law. MQGEM SOFTWARE LIMITED PROVIDES THIS PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore this statement may not apply to you. The information contained in this document has not be submitted to any formal test and is distributed AS IS. The use of the information or the implementation of any of these techniques is a customer responsibility and depends on the customer's ability to evaluate and integrate them into the customer's operational environment. While each item has been reviewed by MQGem Software for accuracy in a specific situation, there is no guarantee that the same or similar results will be obtained elsewhere.
    [Show full text]
  • The Linux Command Line
    The Linux Command Line Fifth Internet Edition William Shotts A LinuxCommand.org Book Copyright ©2008-2019, William E. Shotts, Jr. This work is licensed under the Creative Commons Attribution-Noncommercial-No De- rivative Works 3.0 United States License. To view a copy of this license, visit the link above or send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042. A version of this book is also available in printed form, published by No Starch Press. Copies may be purchased wherever fine books are sold. No Starch Press also offers elec- tronic formats for popular e-readers. They can be reached at: https://www.nostarch.com. Linux® is the registered trademark of Linus Torvalds. All other trademarks belong to their respective owners. This book is part of the LinuxCommand.org project, a site for Linux education and advo- cacy devoted to helping users of legacy operating systems migrate into the future. You may contact the LinuxCommand.org project at http://linuxcommand.org. Release History Version Date Description 19.01A January 28, 2019 Fifth Internet Edition (Corrected TOC) 19.01 January 17, 2019 Fifth Internet Edition. 17.10 October 19, 2017 Fourth Internet Edition. 16.07 July 28, 2016 Third Internet Edition. 13.07 July 6, 2013 Second Internet Edition. 09.12 December 14, 2009 First Internet Edition. Table of Contents Introduction....................................................................................................xvi Why Use the Command Line?......................................................................................xvi
    [Show full text]
  • Légende : Montage Webdav/DAFVS2 [Tuto/Howto] [GNU/Linux] Montage
    Nebuleuse0rion Lost in the Digital Dimension Search… Quick links FAQ Register Login Index ‹ Techno ‹ Operating System ‹ Memory [Tuto/HowTo] Monter dossier distant sur Raspberry Pi & Ubuntu/Debian Post Reply Search this topic… 7 posts • Page 1 of 1 [Tuto/HowTo] Monter dossier distant sur Raspberry Pi & Ubuntu/Debian by voxdemonix » Mon Apr 25, 2016 12:45 pm P voxdemonix o s Posts: 830 t Joined: Mon Feb 02, 2015 7:28 pm Licence du tuto : - - L'ensemble de ces tutos fonctionne sur : Raspbian, (X|K|L)Ubuntu, Debian et tout ses dérivés Légende : 1. Montage Webdav/DAVFS 2. Montage Webdav/DAVFS via SSH Tunneling over Tor 3. Montage SSHFS 4. Montage SFTP 5. Monter un volume/répertoire GlusterFS 6. Montage Webdav/DAFVS2 cross-canal via SSH Tunneling Last edited by voxdemonix on Sun Dec 18, 2016 6:22 pm, edited 25 times in total. ~ Infernalis Creatorem ~ Rejoins le côté obscure, on a des cookies ! Donation Bitcoin : 1N8QGrhJGWdZNQNSspm3rSGjtXaXv9Ngat Donation Dash : XmowiBRku3tsEREp7PhpheY4TgeLLDyKdM T o Re: [Tuto/HowTo] Monter dossier distant sur Raspberry Pi & Ubuntu/Debian p by voxdemonix » Sat Apr 30, 2016 11:20 pm P o voxdemonix s Montage Webdav/DAFVS2 Posts: 830 t DAFVS2 est entre autre utilisé pour monter localement des dossiers distant hébergés sur un serveur owncloud/nextcloud. Il Joined: Mon Feb 02, 2015 7:28 pm utilise le protocole HTTP(S) se qui le rend plus lent (lag) mais compatible avec le Web. Si vous souhaitez effectuer le montage à travers internet (si vous êtes en adressage dynamique) il vous est conseillé d'utiliser un nom de domaine (ou plusieurs) et/ou un Tor Hidden Service.
    [Show full text]