Commands for TCP/IP Cont

Total Page:16

File Type:pdf, Size:1020Kb

Commands for TCP/IP Cont INTRODUCTION z/OS Console Commands for TCP/IP cont... z/VM Operator Commands This summary lists many of the commonly used commands (with • D TCPIP,{procname},HELP - display list of TCP/IP display Note: Requires class B authority to issue the following commands. brief descriptions) for FTP and TCP/IP, as well as related z/OS, options. These include -NETSTAT, TELNET, HELP, • Q MITIME - Display MIH times for devices. z/VM, VSE, Linux, and VTAM commands. DISPLAY, VARY, OMPROUTE, SYSPLEX, STOR. • Q OSA ACTIVE|ALL - display status of OSA devices. This is only a summary. If you need details about a command, refer • D TCPIP,{procname},Netstat,ALLCONN|CONN - display • Q rdev|rdev-rdev - Display status of real device(s). to the appropriate documentation. socket information for the TCP/IP stack. • Q PATHS rdev|rdev-rdev - Display path status to real NOTE: All commands are for current operating system releases • D TCPIP,{procname},Netstat,ARP - display contents of ARP device(s) (PIM, PAM, LPM). as of 26 November 2002. If using an earlier release, some cache for the TCP/IP stack. • Q CHPID cc - Display real CHPID status. commands may not work. • D TCPIP,{procname},Netstat,DEVlinks - display Device and • VARY OFF|ON rdev|rdev-rdev - vary device(s) off or online link status for the TCP/IP stack. • VARY OFF|ON PATH cc FROM|TO rdev|rdev-rdev - • D TCPIP,{procname},Netstat,HOME - display the IP change the status of a path to device(s). TCP/IP Commands for TSO/E address(es) for the TCP/IP stack. • VARY OFF|ON CHPID cc - configure a CHPID off or on to Note: The following TCP/IP commands should be done from the • D TCPIP,{procname},Netstat,ROUTE - display the routing both hardware and software. TSO command panel or the READY prompt. table for the TCP/IP stack. z/VM TCP/IP Commands Note: hostname may be the IP address of the host, or the host • V TCPIP,{procname},HELP - display list of TCP/IP vary Note: Your CMS userid must be linked to the TCPMAINT 592 name of the host. options. These include - HELP, OBEYFILE, PKTTRACE, minidisk to execute the following commands. • FTP hostname {port} - Connect to remote host to get/put files. DATTRACE, START, STOP, PURGECACHE Note: hostname may be the IP address of the host, or the host Defaults to port 21. • V TCPIP,{procname},PURGECACHE,linkname - purge name of the host. • HOMETEST - Validate TCP/IP configuration. ARP cache for the specified adapter (linkname from • FTP hostname {port} - Connect to remote host to get/put files. • NETSTAT option {TCP procname} - Display network status NETSTAT,DEVLINKS). Defaults to port 21. Enter FTP ? for list of options. of local host. Use ? for list of options. • V TCPIP,{procname},START|STOP,devname - Start or stop • HOMETEST - Validate TCP/IP configuration. • NETSTAT ALLCON|CONN - Display port connections for the device name identified in NETSTAT DEV output. • IFCONFIG - display network interfaces. the TCP/IP stack. • V TCPIP,{procname},Telnet,xxxx - performs specified • IFCONFIG interface UP|DOWN - Start or stop the specified • NETSTAT ARP ALL|ipaddress - Display ARP cache for the function for TELNET. network interface. TCP/IP stack. ACT|INACT,luname - Enables|disables lu as VTAM • NETSTAT option - Display network status of local host. Use ? • NETSTAT DEV - Display the status of the device(s) and session candidate for list of options. link(s) for the TCP/IP stack. QUIESCE - Blocks new connections. • NETSTAT ALLCON|CONN - Display all port connections • NETSTAT GATE|ROUTE - Display routing information for RESUME - Ends QUIESCEd state. for the TCP/IP stack. the TCP/IP stack. (Different views) STOP - Ends telnet connections and closes port. • NETSTAT ARP *|ipaddress - Display ARP cache for the • NETSTAT HOME - Display IP address(es) for the stack. Related z/OS Console Commands TCP/IP stack. • PING hostname - Sends an echo request to a host name or • D IOS,MIH,DEV=dddd - MIH value for device • NETSTAT DEV - Display the status of the device(s) and address to determine if the computer is accessible. Use ? for list Note: The value for "c's and d's" in the following Display link(s) for the TCP/IP stack. of options. Matrix (D M) command is optional, but if included, must be in • NETSTAT GATE - Display TCP/IP routing information. • TELNET hostname {port} - Log on to remote host. By default, parentheses (). • NETSTAT HOME - Display IP address(es) in TCP/IP stack. port 23 is used. Use ? for list of options. • D M=CHP{(cc)}|DEV{(dddd)} - Status of CHPID cc, or • NETSTAT OBEY START|STOP devname - Start or stop the • TRACERTE hostname - Trace hops from this host to summary of all CHPIDs if (cc) is not provided. device name identified in NETSTAT DEV output. destination host. Use ? for list of options. Display CHPIDs/device status or summary of CHPID status of • PING hostname - Sends an echo request to a host name or z/OS Console Commands for TCP/IP all devices if (dddd) is not provided. address to determine if the computer is accessible. Use ? for list Note: If multiple stacks are running, you must identify the stack in • D U,,ALLOC|OFFLINE|ONLINE - Display information for of options. the procname field. all devices by selected status. • TELNET hostname {port} - Log on to remote host. By default, • D TCPIP - list names and status of TCP/IP stacks. • D U,,,dddd{,nnn} - Display status of devices starting at device port 23 is used. Use ? for list of options. dddd for nnn number of devices (default 16). • TRACERTE hostname - Trace hops from this host to • SETIOS MIH,DEV=ddd,TIME=mm:ss - set MIH time for destination host. Use ? for list of options. specified device. VSE TCP/IP Commands • V dddd|dddd-dddd,OFFLINE|ONLINE - vary device(s) Note: hostname may be the IP address of the host, or the host offline or online. name of the host. • CF CHP(cc),ONline|OFFline - Configure online/offline • PING hostname - Sends an echo request to a host name or CHPID cc to MVS & hardware. address to determine if the computer is accessible. • Query ARP{,IP=hostname} - Display contents of ARP cache for the TCP/IP stack. VSE TCP/IP Commands cont... TCP/IP Commands for OS/2 cont… TCP/IP Commands for Linux • Query CON{,IP=hostname} - Display port connections for • NETSTAT -A - Display host network address. The commands are listed in upper case for presentation only. They the TCP/IP stack. • NETSTAT -C - Display host ICMP statistics. should be entered in lower case. • Query LINKs{,ID=name} - Display link status. • NETSTAT -H - host name for specified IP address. • ARP - Display ARP cache. Use -? for options. • Query MASKs - Display contents of subnet mask table. • NETSTAT -I - Display host IP statistics. • DMESG |MORE - Display complete information about the • Query ROUTes{ID=name|,IP=hostname} - Display routing • NETSTAT -N - Display host network interface details. (Like Linux environment including network devices. ( |MORE keeps table for the TCP/IP stack. MAC, speed, and statistics) output from scrolling.) ( > filename to send to a file.) • STATUS dddd - Display device status • NETSTAT -P - Display host ARP cache. • FTP hostname|ipaddress - Connect to remote host to get/put • START LINK=name -start a link in the TCP/IP stack. • NETSTAT -R - Display host routes. files. Defaults to port 21. Use -? for options. • STOP LINK=name -suspends attempts to activate a link. • NETSTAT -S - Display host sockets. • IFCONFIG - display network interfaces (like LO,EN0,TR0) • Note: Use with CTCA and cross-partition links (not OSA). • NETSTAT -T - Display host TCP statistics. • IFCONFIG interface UP|DOWN - Start or stop the selected • TRACERT hostname - Trace hops from this host to • NETSTAT -U - Display host UDP statistics. network interface(EN0,TR0, etc). destination host. • PING hostname - Sends an echo request to a host name or For the following NETSTAT commands, adding N to the option VTAM Commands address to determine if computer is accessible. (To cancel, use will display numerical output. AddingV will display verbose. VTAM commands related to OSA cards. Ctrl + C.) Use -? for list of options. • NETSTAT -A - Display all sockets. • D NET,ID=name - display network named in ID field • TELNET {-p port} hostname - Log on to remote host. By • NETSTAT -I - Display interface table. Additional parameters that may be added: default, port 23 is used. Use -? for list of options. • NETSTAT -R - Display host routes. ,SCOPE=ONLY|ACT|ALL|INACT • TRACERTE hostname - Trace hops from this host to • PING hostname|ipaddress - Sends an echo request to a host to ,E - Gives extended information about the node. destination host. Use -? for list of options. determine if the computer is accessible. Use -? for options. • D NET,MAJNODES|APPLS - Shows status of all active TCP/IP Commands for Windows1 • ROUTE - Displays IP routing table. major nodes or applications. Commands should work for Windows 95, 98, NT, & 2000 1. • TELNET hostname|ipaddress {port} - Log on to remote host. • D NET,PENDING - Lists nodes in pending states. Commands must be done from a command prompt window. By default, port 23 is used. Use -? for options. • D NET,TRL - display list of TRLEs. The commands are listed in upper case for presentation only. They • TRACEROUTE hostname|ipaddress - Trace hops from this • D NET,TRL,TRLE=trlename - display status of specific should be entered in lower case. host to destination host. Use -? for list of options. TRLE. (Use this command to display the devices assigned to a Note: hostname may be the IP address of the host, or the host FTP Subcommands QDIO (or MPC) OSA-Express resource.) name of the host. • ascii - ASCII transfer of text files. • V NET,ACT,ID=ISTTRL,UPDATE=ALL - Deletes all • ARP -A - Display ARP cache.
Recommended publications
  • 1 A) Login to the System B) Use the Appropriate Command to Determine Your Login Shell C) Use the /Etc/Passwd File to Verify the Result of Step B
    CSE ([email protected] II-Sem) EXP-3 1 a) Login to the system b) Use the appropriate command to determine your login shell c) Use the /etc/passwd file to verify the result of step b. d) Use the ‘who’ command and redirect the result to a file called myfile1. Use the more command to see the contents of myfile1. e) Use the date and who commands in sequence (in one line) such that the output of date will display on the screen and the output of who will be redirected to a file called myfile2. Use the more command to check the contents of myfile2. 2 a) Write a “sed” command that deletes the first character in each line in a file. b) Write a “sed” command that deletes the character before the last character in each line in a file. c) Write a “sed” command that swaps the first and second words in each line in a file. a. Log into the system When we return on the system one screen will appear. In this we have to type 100.0.0.9 then we enter into editor. It asks our details such as Login : krishnasai password: Then we get log into the commands. bphanikrishna.wordpress.com FOSS-LAB Page 1 of 10 CSE ([email protected] II-Sem) EXP-3 b. use the appropriate command to determine your login shell Syntax: $ echo $SHELL Output: $ echo $SHELL /bin/bash Description:- What is "the shell"? Shell is a program that takes your commands from the keyboard and gives them to the operating system to perform.
    [Show full text]
  • RED HAT ENTERPRISE LINUX 5, 6, and 7 Common Administrative
    RED HAT ENTERPRISE LINUX 5, 6, AND 7 SOFTWARE MANAGEMENT NETWORKING Common administrative commands TASK RHEL TASK RHEL yum install iptables and ip6tables 5 6 5 yum groupinstall /etc/sysconfig/ip*tables Install software iptables and ip6tables 1 Be aware of potential issues when using subscription-manager yum install 7 Configure firewall /etc/sysconfig/ip*tables 6 SYSTEM BASICS on Red Hat Enterprise Linux 5: https://access.redhat.com/ yum group install system-config-firewall solutions/129003. TASK RHEL yum info firewall-cmd 2 Subscription-manager is used for Satellite 6, Satellite 5.6 with 5 6 7 SAM and newer, and Red Hat’s CDN. yum groupinfo firewall-config /etc/sysconfig/rhn/systemid 5 3 RHN tools are deprecated on Red Hat Enterprise Linux 7. View software info /etc/hosts yum info 5 6 rhn_register should be used for Satellite server 5.6 and newer 7 /etc/resolv.conf /etc/sysconfig/rhn/systemid yum group info View subscription information 6 only. For details, see: Satellite 5.6 unable to register RHEL 7 Configure name subscription-manager identity client system due to rhn-setup package not included in Minimal resolution /etc/hosts installation (https://access.redhat.com/solutions/737373) Update software yum update 5 6 7 /etc/resolv.conf 7 subscription-manager identity 7 nmcli con mod rhn_register 5 Upgrade software yum upgrade 5 6 7 /etc/sysconfig/network 5 6 subscription-manager 1 Configure hostname hostnamectl rhn_register Configure software subscription-manager repos 5 6 7 /etc/hostname 7 rhnreg_ks 6 /etc/yum.repos.d/*.repo Configure
    [Show full text]
  • Shell Scripting with Bash
    Introduction to Shell Scripting with Bash Charles Jahnke Research Computing Services Information Services & Technology Topics for Today ● Introductions ● Basic Terminology ● How to get help ● Command-line vs. Scripting ● Variables ● Handling Arguments ● Standard I/O, Pipes, and Redirection ● Control Structures (loops and If statements) ● SCC Job Submission Example Research Computing Services Research Computing Services (RCS) A group within Information Services & Technology at Boston University provides computing, storage, and visualization resources and services to support research that has specialized or highly intensive computation, storage, bandwidth, or graphics requirements. Three Primary Services: ● Research Computation ● Research Visualization ● Research Consulting and Training Breadth of Research on the Shared Computing Cluster (SCC) Me ● Research Facilitator and Administrator ● Background in biomedical engineering, bioinformatics, and IT systems ● Offices on both CRC and BUMC ○ Most of our staff on the Charles River Campus, some dedicated to BUMC ● Contact: [email protected] You ● Who has experience programming? ● Using Linux? ● Using the Shared Computing Cluster (SCC)? Basic Terminology The Command-line The line on which commands are typed and passed to the shell. Username Hostname Current Directory [username@scc1 ~]$ Prompt Command Line (input) The Shell ● The interface between the user and the operating system ● Program that interprets and executes input ● Provides: ○ Built-in commands ○ Programming control structures ○ Environment
    [Show full text]
  • Understanding MPLS OAM Capabilities to Troubleshoot MPLS Networks
    Understanding MPLS OAM capabilities to troubleshoot MPLS Networks Mukhtiar A. Shaikh ([email protected]) Moiz Moizuddin ([email protected]) 1 Agenda • MPLS Overview • Existing Ping/Trace Capabilities • LSP Ping/Trace –Theory of Operation –MPLS Echo Packet –Configuration and Troubleshooting Using LSP Ping/Trace •LSP Ping •LSP Trace –AToM VCCV • Summary 222 MPLS OAM Overview • Converged network implies a wide range of applications and OAM needs • IP Based Tools A flexible set of tools LSP Ping / Traceroute End-End OAM Attachment VC OAM’s MPLS OAM Attachment VC OAM’s Ingress Egress LSP Created by LDP and/or RSVP-TE CE PE PE CE PWE3 or VPN Label 333 Agenda • MPLS Overview • Existing Ping/Trace Capabilities • LSP Ping/Trace –Theory of Operation –MPLS Echo Packet –Configuration and Troubleshooting Using LSP Ping/Trace •LSP Ping •LSP Trace –AToM VCCV • Summary 444 IP Ping • PING makes use of the Internet Control Message Protocol (ICMP) protocol • Ping message of 2 types type=8: ICMP echo request messages type=0: ICMP echo reply message • Optional data field is used to store the time at which the ICMP echo request message has been send • The Round Trip Time (RTT) 555 IP Traceroute • Traceroute makes use of the Internet Control Message Protocol (ICMP) protocol and TTL field on the IP header • Traceroute is sent in a UDP packet encapsulated on an IP packet • TTL-field of an IP datagram is processed by each hop in two possible ways If a hop holds IP-datagram for more than one second, it decrements the TTL-field of that IP datagram by the number
    [Show full text]
  • Windows Command Prompt Cheatsheet
    Windows Command Prompt Cheatsheet - Command line interface (as opposed to a GUI - graphical user interface) - Used to execute programs - Commands are small programs that do something useful - There are many commands already included with Windows, but we will use a few. - A filepath is where you are in the filesystem • C: is the C drive • C:\user\Documents is the Documents folder • C:\user\Documents\hello.c is a file in the Documents folder Command What it Does Usage dir Displays a list of a folder’s files dir (shows current folder) and subfolders dir myfolder cd Displays the name of the current cd filepath chdir directory or changes the current chdir filepath folder. cd .. (goes one directory up) md Creates a folder (directory) md folder-name mkdir mkdir folder-name rm Deletes a folder (directory) rm folder-name rmdir rmdir folder-name rm /s folder-name rmdir /s folder-name Note: if the folder isn’t empty, you must add the /s. copy Copies a file from one location to copy filepath-from filepath-to another move Moves file from one folder to move folder1\file.txt folder2\ another ren Changes the name of a file ren file1 file2 rename del Deletes one or more files del filename exit Exits batch script or current exit command control echo Used to display a message or to echo message turn off/on messages in batch scripts type Displays contents of a text file type myfile.txt fc Compares two files and displays fc file1 file2 the difference between them cls Clears the screen cls help Provides more details about help (lists all commands) DOS/Command Prompt help command commands Source: https://technet.microsoft.com/en-us/library/cc754340.aspx.
    [Show full text]
  • Command Line Interface Specification Windows
    Command Line Interface Specification Windows Online Backup Client version 4.3.x 1. Introduction The CloudBackup Command Line Interface (CLI for short) makes it possible to access the CloudBackup Client software from the command line. The following actions are implemented: backup, delete, dir en restore. These actions are described in more detail in the following paragraphs. For all actions applies that a successful action is indicated by means of exit code 0. In all other cases a status code of 1 will be used. 2. Configuration The command line client needs a configuration file. This configuration file may have the same layout as the configuration file for the full CloudBackup client. This configuration file is expected to reside in one of the following folders: CLI installation location or the settings folder in the CLI installation location. The name of the configuration file must be: Settings.xml. Example: if the CLI is installed in C:\Windows\MyBackup\, the configuration file may be in one of the two following locations: C:\Windows\MyBackup\Settings.xml C:\Windows\MyBackup\Settings\Settings.xml If both are present, the first form has precedence. Also the customer needs to edit the CloudBackup.Console.exe.config file which is located in the program file directory and edit the following line: 1 <add key="SettingsFolder" value="%settingsfilelocation%" /> After making these changes the customer can use the CLI instruction to make backups and restore data. 2.1 Configuration Error Handling If an error is found in the configuration file, the command line client will issue an error message describing which value or setting or option is causing the error and terminate with an exit value of 1.
    [Show full text]
  • Mac Keyboard Shortcuts Cut, Copy, Paste, and Other Common Shortcuts
    Mac keyboard shortcuts By pressing a combination of keys, you can do things that normally need a mouse, trackpad, or other input device. To use a keyboard shortcut, hold down one or more modifier keys while pressing the last key of the shortcut. For example, to use the shortcut Command-C (copy), hold down Command, press C, then release both keys. Mac menus and keyboards often use symbols for certain keys, including the modifier keys: Command ⌘ Option ⌥ Caps Lock ⇪ Shift ⇧ Control ⌃ Fn If you're using a keyboard made for Windows PCs, use the Alt key instead of Option, and the Windows logo key instead of Command. Some Mac keyboards and shortcuts use special keys in the top row, which include icons for volume, display brightness, and other functions. Press the icon key to perform that function, or combine it with the Fn key to use it as an F1, F2, F3, or other standard function key. To learn more shortcuts, check the menus of the app you're using. Every app can have its own shortcuts, and shortcuts that work in one app may not work in another. Cut, copy, paste, and other common shortcuts Shortcut Description Command-X Cut: Remove the selected item and copy it to the Clipboard. Command-C Copy the selected item to the Clipboard. This also works for files in the Finder. Command-V Paste the contents of the Clipboard into the current document or app. This also works for files in the Finder. Command-Z Undo the previous command. You can then press Command-Shift-Z to Redo, reversing the undo command.
    [Show full text]
  • Don't Trust Traceroute (Completely)
    Don’t Trust Traceroute (Completely) Pietro Marchetta, Valerio Persico, Ethan Katz-Bassett Antonio Pescapé University of Southern California, CA, USA University of Napoli Federico II, Italy [email protected] {pietro.marchetta,valerio.persico,pescape}@unina.it ABSTRACT In this work, we propose a methodology based on the alias resolu- tion process to demonstrate that the IP level view of the route pro- vided by traceroute may be a poor representation of the real router- level route followed by the traffic. More precisely, we show how the traceroute output can lead one to (i) inaccurately reconstruct the route by overestimating the load balancers along the paths toward the destination and (ii) erroneously infer routing changes. Categories and Subject Descriptors C.2.1 [Computer-communication networks]: Network Architec- ture and Design—Network topology (a) Traceroute reports two addresses at the 8-th hop. The common interpretation is that the 7-th hop is splitting the traffic along two Keywords different forwarding paths (case 1); another explanation is that the 8- th hop is an RFC compliant router using multiple interfaces to reply Internet topology; Traceroute; IP alias resolution; IP to Router to the source (case 2). mapping 1 1. INTRODUCTION 0.8 Operators and researchers rely on traceroute to measure routes and they assume that, if traceroute returns different IPs at a given 0.6 hop, it indicates different paths. However, this is not always the case. Although state-of-the-art implementations of traceroute al- 0.4 low to trace all the paths
    [Show full text]
  • This Document Explains How to Copy Ondemand5 Data to Your Hard Drive
    Copying Your Repair DVD Data To Your Hard Drive Introduction This document explains how to copy OnDemand5 Repair data to your hard drive, and how to configure your OnDemand software appropriately. The document is intended for your network professional as a practical guide for implementing Mitchell1’s quarterly updates. The document provides two methods; one using the Xcopy command in a DOS window, and the other using standard Windows Copy and Paste functionality. Preparing your System You will need 8 Gigabytes of free space per DVD to be copied onto a hard drive. Be sure you have the necessary space before beginning this procedure. Turn off screen savers, power down options or any other program that may interfere with this process. IMPORTANT NOTICE – USE AT YOUR OWN RISK: This information is provided as a courtesy to assist those who desire to copy their DVD disks to their hard drive. Minimal technical assistance is available for this procedure. It is not recommended due to the high probability of failure due to DVD drive/disk read problems, over heating, hard drive write errors and memory overrun issues. This procedure is very detailed and should only be performed by users who are very familiar with Windows and/or DOS commands. Novice computers users should not attempt this procedure. Copying Repair data from a DVD is a time-consuming process. Depending on the speed of your processor and/or network, could easily require two or more hours per disk. For this reason, we recommend that you perform the actual copying of data during non-business evening or weekend hours.
    [Show full text]
  • Dig, a DNS Query Tool for Windows and Replacement for Nslookup 2008-04-15 15:29
    dig, a DNS query tool for Windows and replacement for nslookup 2008-04-15 15:29 Disclaimer dig (dig for Windows ) (dig is a powerful tool to investigate [digging into] the DNS system) Source of the binary is from ftp.isc.org Manual Page of dig, in the cryptic Unix style, for reference only. (1) Download: Windows 2000 or Windows XP or Windows Vista ( dig version 9.3.2) Create a folder c:\dig Download this dig-files.zip and save it to c:\dig Use winzip or equivalent to extract the files in dig-files.zip to c:\dig Note: If msvcr70.dll already exists in %systemroot%\system32\ , then you can delete c:\dig\msvcr70.dll Note: Included in dig-files.zip is a command line whois, version 4.7.11: The canonical site of the whois source code is http://ftp.debian.org/debian/pool/main/w/whois/ The whois.exe file inside dig-files.zip is compiled using cygwin c++ compiler. (2) Do a file integrity check (why ? Because some virus checkers destroy dll files) Click Start.. Run ... type CMD (a black screen pops up) cd c:\dig sha1 * You should see some SHA1 hashes (in here, SHA1 hash is used as an integrity check, similar to checksums). Compare your hashes with the following table. SHA1 v1.0 [GPLed] by Stephan T. Lavavej, http://stl.caltech.edu 6CA70A2B 11026203 EABD7D65 4ADEFE3D 6C933EDA cygwin1.dll 57487BAE AA0EB284 8557B7CA 54ED9183 EAFC73FA dig.exe 97DBD755 D67A5829 C138A470 8BE7A4F2 6ED0894C host.exe D22E4B89 56E1831F F0F9D076 20EC19BF 171F0C29 libbind9.dll 81588F0B E7D3C6B3 20EDC314 532D9F2D 0A105594 libdns.dll E0BD7187 BBC01003 ABFE7472 E64B68CD 1BDB6BAB libeay32.dll F445362E 728A9027 96EC6871 A79C6307 054974E4 libisc.dll B3255C0E 4808A703 F95C217A 91FFCD69 40E680C9 libisccfg.dll DFBDE4F9 E25FD49A 0846E97F D813D687 6DC94067 liblwres.dll 61B8F573 DB448AE6 351AE347 5C2E7C48 2D81533C msvcr70.dll BDA14B28 7987E168 F359F0C9 DD96866D 04AB189B resolv.conf 1112343A 319C3EEE E44BF261 AE196C96 289C70E2 sha1.exe 21D20035 2A5B64E2 69FEA407 4D78053F 3C7A2738 whois.exe If your hashes are the same as the above table, then your files pass the integrity check.
    [Show full text]
  • “Linux at the Command Line” Don Johnson of BU IS&T  We’Ll Start with a Sign in Sheet
    “Linux at the Command Line” Don Johnson of BU IS&T We’ll start with a sign in sheet. We’ll end with a class evaluation. We’ll cover as much as we can in the time allowed; if we don’t cover everything, you’ll pick it up as you continue working with Linux. This is a hands-on, lab class; ask questions at any time. Commands for you to type are in BOLD The Most Common O/S Used By BU Researchers When Working on a Server or Computer Cluster Linux is a Unix clone begun in 1991 and written from scratch by Linus Torvalds with assistance from a loosely-knit team of hackers across the Net. 64% of the world’s servers run some variant of Unix or Linux. The Android phone and the Kindle run Linux. a set of small Linux is an O/S core programs written by written by Linus Richard Stallman and Torvalds and others others. They are the AND GNU utilities. http://www.gnu.org/ Network: ssh, scp Shells: BASH, TCSH, clear, history, chsh, echo, set, setenv, xargs System Information: w, whoami, man, info, which, free, echo, date, cal, df, free Command Information: man, info Symbols: |, >, >>, <, ;, ~, ., .. Filters: grep, egrep, more, less, head, tail Hotkeys: <ctrl><c>, <ctrl><d> File System: ls, mkdir, cd, pwd, mv, touch, file, find, diff, cmp, du, chmod, find File Editors: gedit, nedit You need a “xterm” emulation – software that emulates an “X” terminal and that connects using the “SSH” Secure Shell protocol. ◦ Windows Use StarNet “X-Win32:” http://www.bu.edu/tech/support/desktop/ distribution/xwindows/xwin32/ ◦ Mac OS X “Terminal” is already installed Why? Darwin, the system on which Apple's Mac OS X is built, is a derivative of 4.4BSD-Lite2 and FreeBSD.
    [Show full text]
  • Dell EMC Powerstore CLI Guide
    Dell EMC PowerStore CLI Guide May 2020 Rev. A01 Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2020 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners. Contents Additional Resources.......................................................................................................................4 Chapter 1: Introduction................................................................................................................... 5 Overview.................................................................................................................................................................................5 Use PowerStore CLI in scripts.......................................................................................................................................5 Set up the PowerStore CLI client........................................................................................................................................5 Install the PowerStore CLI client..................................................................................................................................
    [Show full text]